@vizamodo/aws-sts-core 0.4.3 → 0.4.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/sts/issue.js +21 -77
  2. package/package.json +1 -1
package/dist/sts/issue.js CHANGED
@@ -1,10 +1,10 @@
1
+ import { getCachedOrFetch, wrapResult } from "@vizamodo/edge-cache-core";
1
2
  import { canonicalizeHeaders } from "../sigv4/headers";
2
3
  import { buildCanonicalRequest } from "../sigv4/canonical";
3
4
  import { buildStringToSign } from "../sigv4/string-to-sign";
4
5
  import { signStringToSign } from "./signer";
5
6
  import { InternalError } from "./errors";
6
7
  import { sha256Hex } from "../crypto/sha256";
7
- import { getCachedOrFetch, wrapResult } from "@vizamodo/edge-cache-core";
8
8
  // ── Constants ──────────────────────────────────────────────────────────────
9
9
  const ALGORITHM = "AWS4-X509-ECDSA-SHA256";
10
10
  const SERVICE = "rolesanywhere";
@@ -30,10 +30,6 @@ let signingKeyPromise = null;
30
30
  let cachedSigningKey = null;
31
31
  let cachedCertBase64 = null;
32
32
  let cachedPrivateKeyBase64 = null;
33
- // ── Isolate-level cert-serial cache ───────────────────────────────────────
34
- // DER walk is CPU-bound; the cert rarely rotates within an isolate lifetime.
35
- let cachedCertSerialDec = null;
36
- let cachedCertSerialSource = null;
37
33
  // ── Test utilities ─────────────────────────────────────────────────────────
38
34
  /**
39
35
  * Reset isolate-level signing material and cert serial caches.
@@ -47,8 +43,6 @@ export function resetIsolateCache() {
47
43
  cachedSigningKey = null;
48
44
  cachedCertBase64 = null;
49
45
  cachedPrivateKeyBase64 = null;
50
- cachedCertSerialDec = null;
51
- cachedCertSerialSource = null;
52
46
  }
53
47
  // ── Signing material ───────────────────────────────────────────────────────
54
48
  async function getSigningMaterial(certBase64, privateKeyPkcs8Base64) {
@@ -135,35 +129,6 @@ async function fetchCredentials(input) {
135
129
  });
136
130
  const signatureHex = await signStringToSign(stringToSign, signingKey);
137
131
  const certSerialDec = getCertSerialDec(normalizedCert);
138
- // 🔍 Deep debug helper (compare with working version)
139
- function debugAwsSigning() {
140
- try {
141
- console.debug("[aws-debug][input]", {
142
- roleArn,
143
- profileArn,
144
- trustAnchorArn,
145
- region,
146
- sessionTtl,
147
- });
148
- console.debug("[aws-debug][cert]", {
149
- length: normalizedCert.length,
150
- preview: normalizedCert.slice(0, 30),
151
- });
152
- console.debug("[aws-debug][serial]", {
153
- serialDec: certSerialDec,
154
- serialHex: BigInt(certSerialDec).toString(16),
155
- });
156
- console.debug("[aws-debug][headers]", baseHeaders);
157
- console.debug("[aws-debug][signedHeaders]", signedHeaders);
158
- console.debug("[aws-debug][canonicalRequest]", canonicalRequest);
159
- console.debug("[aws-debug][stringToSign]", stringToSign);
160
- console.debug("[aws-debug][signatureHex]", signatureHex);
161
- }
162
- catch (e) {
163
- console.warn("[aws-debug][error]", e);
164
- }
165
- }
166
- debugAwsSigning();
167
132
  const finalHeaders = new Headers({
168
133
  "Content-Type": "application/json",
169
134
  "X-Amz-Date": amzDate,
@@ -183,12 +148,7 @@ async function fetchCredentials(input) {
183
148
  throw new InternalError("aws_unreachable");
184
149
  }
185
150
  if (!res.ok) {
186
- const text = await res.text().catch(() => "<no-body>");
187
- console.error("[aws-rejected]", {
188
- status: res.status,
189
- body: text,
190
- region,
191
- });
151
+ console.warn("[aws-rejected]", { status: res.status, region });
192
152
  throw new InternalError("aws_rejected");
193
153
  }
194
154
  const json = await res.json();
@@ -223,15 +183,9 @@ function normalizeCert(raw) {
223
183
  }
224
184
  return raw.replace(/\s+/g, "");
225
185
  }
226
- /** Return cert serial as decimal string, using isolate-level cache. */
186
+ /** Extract cert serial as decimal string from DER-encoded base64 cert. */
227
187
  function getCertSerialDec(normalizedCert) {
228
- if (cachedCertSerialDec && cachedCertSerialSource === normalizedCert) {
229
- return cachedCertSerialDec;
230
- }
231
- const serial = parseCertSerialDec(normalizedCert);
232
- cachedCertSerialDec = serial;
233
- cachedCertSerialSource = normalizedCert;
234
- return serial;
188
+ return parseCertSerialDec(normalizedCert);
235
189
  }
236
190
  /**
237
191
  * Minimal DER walk to extract the certificate serial number as a decimal string.
@@ -255,42 +209,32 @@ function parseCertSerialDec(normalizedCertBase64) {
255
209
  len = (len << 8) | der[offset++];
256
210
  return len;
257
211
  }
258
- // Certificate ::= SEQUENCE
259
212
  if (der[offset++] !== 0x30)
260
213
  throw new Error("bad cert");
261
214
  readLen();
262
- // tbsCertificate ::= SEQUENCE
263
215
  if (der[offset++] !== 0x30)
264
216
  throw new Error("bad tbs");
265
217
  readLen();
266
- // Optional version [0] EXPLICIT
218
+ // Skip optional [0] EXPLICIT version field.
267
219
  if (der[offset] === 0xa0) {
268
- offset++; // tag
269
- offset += readLen(); // skip content
220
+ offset++;
221
+ offset += readLen();
270
222
  }
271
- // Now scan for first INTEGER with "real" length (>2 bytes)
272
- while (offset < der.length) {
273
- if (der[offset++] !== 0x02)
274
- continue;
275
- const len = readLen();
276
- if (len <= 2) {
277
- offset += len; // skip small integers (likely version)
278
- continue;
279
- }
280
- if (offset + len > der.length)
281
- throw new Error("DER overflow");
282
- let serial = der.slice(offset, offset + len);
283
- // Strip leading 0x00 ONLY if it's padding
284
- if (serial.length > 1 && serial[0] === 0x00 && (serial[1] & 0x80) === 0) {
285
- serial = serial.slice(1);
286
- }
287
- let serialBig = 0n;
288
- for (let i = 0; i < serial.length; i++) {
289
- serialBig = (serialBig << 8n) | BigInt(serial[i]);
290
- }
291
- return serialBig.toString();
223
+ if (der[offset++] !== 0x02)
224
+ throw new Error("bad serial tag");
225
+ const serialLen = readLen();
226
+ if (offset + serialLen > der.length)
227
+ throw new Error("DER overflow");
228
+ let serial = der.slice(offset, offset + serialLen);
229
+ // Strip ASN.1 sign-extension padding byte.
230
+ if (serial.length > 1 && serial[0] === 0x00) {
231
+ serial = serial.slice(1);
232
+ }
233
+ let serialBig = 0n;
234
+ for (let i = 0; i < serial.length; i++) {
235
+ serialBig = (serialBig << 8n) | BigInt(serial[i]);
292
236
  }
293
- throw new Error("serial not found");
237
+ return serialBig.toString();
294
238
  }
295
239
  catch (e) {
296
240
  console.error("[parseCertSerialDec] failed", e);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@vizamodo/aws-sts-core",
3
- "version": "0.4.3",
3
+ "version": "0.4.5",
4
4
  "description": "Pure AWS STS + SigV4 (X509 Roles Anywhere) core logic",
5
5
  "type": "module",
6
6
  "main": "dist/index.js",