node-opcua-crypto 1.7.4 → 1.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.fossa.yml +18 -18
- package/.github/FUNDING.yml +12 -12
- package/.github/workflows/main.yml +32 -32
- package/.prettierrc.js +6 -6
- package/LICENSE +22 -22
- package/README.md +14 -14
- package/dist/asn1.d.ts +69 -0
- package/dist/asn1.js +349 -0
- package/dist/asn1.js.map +1 -0
- package/dist/buffer_utils.d.ts +6 -0
- package/dist/buffer_utils.js +22 -0
- package/dist/buffer_utils.js.map +1 -0
- package/dist/common.d.ts +11 -0
- package/dist/common.js +3 -0
- package/dist/common.js.map +1 -0
- package/dist/crypto_explore_certificate.d.ts +95 -0
- package/dist/crypto_explore_certificate.js +547 -0
- package/dist/crypto_explore_certificate.js.map +1 -0
- package/dist/crypto_utils.d.ts +106 -0
- package/dist/crypto_utils.js +370 -0
- package/dist/crypto_utils.js.map +1 -0
- package/dist/derived_keys.d.ts +72 -0
- package/dist/derived_keys.js +247 -0
- package/dist/derived_keys.js.map +1 -0
- package/dist/explore_certificate.d.ts +30 -0
- package/dist/explore_certificate.js +44 -0
- package/dist/explore_certificate.js.map +1 -0
- package/dist/explore_certificate_revocation_list.d.ts +30 -0
- package/dist/explore_certificate_revocation_list.js +67 -0
- package/dist/explore_certificate_revocation_list.js.map +1 -0
- package/dist/index.d.ts +10 -0
- package/dist/index.js +23 -0
- package/dist/index.js.map +1 -0
- package/dist/oid_map.d.ts +7 -0
- package/dist/oid_map.js +262 -0
- package/dist/oid_map.js.map +1 -0
- package/dist/source/asn1.d.ts +73 -73
- package/dist/source/asn1.js +359 -359
- package/dist/source/buffer_utils.d.ts +6 -5
- package/dist/source/buffer_utils.js +21 -21
- package/dist/source/common.d.ts +12 -12
- package/dist/source/common.js +2 -2
- package/dist/source/crypto_explore_certificate.d.ts +107 -107
- package/dist/source/crypto_explore_certificate.js +600 -600
- package/dist/source/crypto_utils.d.ts +78 -78
- package/dist/source/crypto_utils.js +280 -280
- package/dist/source/derived_keys.d.ts +72 -72
- package/dist/source/derived_keys.js +248 -245
- package/dist/source/derived_keys.js.map +1 -1
- package/dist/source/explore_certificate.d.ts +30 -30
- package/dist/source/explore_certificate.js +43 -43
- package/dist/source/explore_certificate_revocation_list.d.ts +28 -28
- package/dist/source/explore_certificate_revocation_list.js +44 -44
- package/dist/source/explore_certificate_signing_request.d.ts +13 -13
- package/dist/source/explore_certificate_signing_request.js +44 -44
- package/dist/source/explore_private_key.d.ts +29 -29
- package/dist/source/explore_private_key.js +96 -96
- package/dist/source/index.d.ts +13 -13
- package/dist/source/index.js +25 -25
- package/dist/source/oid_map.d.ts +7 -7
- package/dist/source/oid_map.js +303 -303
- package/dist/source/public_private_match.d.ts +3 -3
- package/dist/source/public_private_match.js +16 -16
- package/dist/source/verify_certificate_signature.d.ts +10 -10
- package/dist/source/verify_certificate_signature.js +101 -101
- package/dist/source_nodejs/index.d.ts +3 -3
- package/dist/source_nodejs/index.js +15 -15
- package/dist/source_nodejs/read.d.ts +29 -29
- package/dist/source_nodejs/read.js +94 -94
- package/dist/source_nodejs/read_certificate_revocation_list.d.ts +2 -2
- package/dist/source_nodejs/read_certificate_revocation_list.js +27 -27
- package/dist/source_nodejs/read_certificate_signing_request.d.ts +3 -3
- package/dist/source_nodejs/read_certificate_signing_request.js +27 -27
- package/dist/verify_cerficate_signature.d.ts +10 -0
- package/dist/verify_cerficate_signature.js +102 -0
- package/dist/verify_cerficate_signature.js.map +1 -0
- package/index.d.ts +2 -2
- package/index.js +4 -4
- package/index_web.js +3 -3
- package/package.json +17 -17
- package/source/asn1.ts +404 -404
- package/source/buffer_utils.ts +18 -18
- package/source/common.ts +13 -13
- package/source/crypto_explore_certificate.ts +763 -763
- package/source/crypto_utils.ts +321 -321
- package/source/derived_keys.ts +287 -284
- package/source/explore_certificate.ts +66 -66
- package/source/explore_certificate_revocation_list.ts +93 -93
- package/source/explore_certificate_signing_request.ts +58 -58
- package/source/explore_private_key.ts +121 -121
- package/source/index.ts +13 -13
- package/source/oid_map.ts +310 -310
- package/source/public_private_match.ts +17 -17
- package/source/verify_certificate_signature.ts +105 -105
- package/source_nodejs/index.ts +2 -2
- package/source_nodejs/read.ts +95 -95
- package/source_nodejs/read_certificate_revocation_list.ts +14 -14
- package/source_nodejs/read_certificate_signing_request.ts +17 -17
- package/test_certificate.ts +34 -34
- package/tsconfig.json +18 -18
- package/tslint.json +34 -34
- package/pnpm-lock.yaml +0 -1689
|
@@ -1,28 +1,28 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
-
});
|
|
10
|
-
};
|
|
11
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.readCertificateSigningRequest = void 0;
|
|
13
|
-
const fs = require("fs");
|
|
14
|
-
const util_1 = require("util");
|
|
15
|
-
const crypto_utils_1 = require("../source/crypto_utils");
|
|
16
|
-
function readCertificateSigningRequest(filename) {
|
|
17
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
18
|
-
const csr = yield (0, util_1.promisify)(fs.readFile)(filename);
|
|
19
|
-
if (csr[0] === 0x30 && csr[1] === 0x82) {
|
|
20
|
-
// der format
|
|
21
|
-
return csr;
|
|
22
|
-
}
|
|
23
|
-
const raw_crl = csr.toString();
|
|
24
|
-
return (0, crypto_utils_1.convertPEMtoDER)(raw_crl);
|
|
25
|
-
});
|
|
26
|
-
}
|
|
27
|
-
exports.readCertificateSigningRequest = readCertificateSigningRequest;
|
|
1
|
+
"use strict";
|
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
+
});
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.readCertificateSigningRequest = void 0;
|
|
13
|
+
const fs = require("fs");
|
|
14
|
+
const util_1 = require("util");
|
|
15
|
+
const crypto_utils_1 = require("../source/crypto_utils");
|
|
16
|
+
function readCertificateSigningRequest(filename) {
|
|
17
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
18
|
+
const csr = yield (0, util_1.promisify)(fs.readFile)(filename);
|
|
19
|
+
if (csr[0] === 0x30 && csr[1] === 0x82) {
|
|
20
|
+
// der format
|
|
21
|
+
return csr;
|
|
22
|
+
}
|
|
23
|
+
const raw_crl = csr.toString();
|
|
24
|
+
return (0, crypto_utils_1.convertPEMtoDER)(raw_crl);
|
|
25
|
+
});
|
|
26
|
+
}
|
|
27
|
+
exports.readCertificateSigningRequest = readCertificateSigningRequest;
|
|
28
28
|
//# sourceMappingURL=read_certificate_signing_request.js.map
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
/// <reference types="node" />
|
|
2
|
+
import { Certificate } from "./common";
|
|
3
|
+
export declare function verifyCertificateOrClrSignature(certificateOrCrl: Buffer, parentCerticate: Certificate): boolean;
|
|
4
|
+
export declare function verifyCertificateSignature(certificate: Certificate, parentCerticate: Certificate): boolean;
|
|
5
|
+
export declare function verifyCertificateRevocationListSignature(certificateRevocationList: Certificate, parentCerticate: Certificate): boolean;
|
|
6
|
+
export declare type _VerifyStatus = "BadCertificateIssuerUseNotAllowed" | "BadCertificateInvalid" | "Good";
|
|
7
|
+
export declare function verifyCertificateChain(certificateChain: Certificate[]): Promise<{
|
|
8
|
+
status: _VerifyStatus;
|
|
9
|
+
reason: string;
|
|
10
|
+
}>;
|
|
@@ -0,0 +1,102 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// tslint:disable: no-console
|
|
3
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
4
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
5
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
6
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
7
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
8
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
9
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
10
|
+
});
|
|
11
|
+
};
|
|
12
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
13
|
+
exports.verifyCertificateChain = exports.verifyCertificateRevocationListSignature = exports.verifyCertificateSignature = exports.verifyCertificateOrClrSignature = void 0;
|
|
14
|
+
// Now that we got a hash of the orginal certificate,
|
|
15
|
+
// we need to verify if we can obtain the same hash by using the same hashing function
|
|
16
|
+
// (in this case SHA-384). In order to do that, we need to extract just the body of
|
|
17
|
+
// the signed certificate. Which, in our case, is everything but the signature.
|
|
18
|
+
// The start of the body is always the first digit of the second line of the following command:
|
|
19
|
+
const crypto = require("crypto");
|
|
20
|
+
const crypto_explore_certificate_1 = require("./crypto_explore_certificate");
|
|
21
|
+
const crypto_utils_1 = require("./crypto_utils");
|
|
22
|
+
const asn1_1 = require("./asn1");
|
|
23
|
+
function verifyCertificateOrClrSignature(certificateOrCrl, parentCerticate) {
|
|
24
|
+
const block_info = asn1_1.readTag(certificateOrCrl, 0);
|
|
25
|
+
const blocks = asn1_1._readStruct(certificateOrCrl, block_info);
|
|
26
|
+
const bufferToBeSigned = certificateOrCrl.slice(block_info.position, blocks[1].position - 2);
|
|
27
|
+
//xx console.log("bufferToBeSigned = ", bufferToBeSigned.length, bufferToBeSigned.toString("hex").substr(0, 50), bufferToBeSigned.toString("hex").substr(-10));
|
|
28
|
+
const signatureAlgorithm = asn1_1._readAlgorithmIdentifier(certificateOrCrl, blocks[1]);
|
|
29
|
+
const signatureValue = asn1_1._readSignatureValueBin(certificateOrCrl, blocks[2]);
|
|
30
|
+
const p = crypto_explore_certificate_1.split_der(parentCerticate)[0];
|
|
31
|
+
//xx const publicKey = extractPublicKeyFromCertificateSync(p);
|
|
32
|
+
const certPem = crypto_utils_1.toPem(p, "CERTIFICATE");
|
|
33
|
+
const verify = crypto.createVerify(signatureAlgorithm.identifier);
|
|
34
|
+
verify.update(bufferToBeSigned);
|
|
35
|
+
verify.end();
|
|
36
|
+
return verify.verify(certPem, signatureValue);
|
|
37
|
+
}
|
|
38
|
+
exports.verifyCertificateOrClrSignature = verifyCertificateOrClrSignature;
|
|
39
|
+
function verifyCertificateSignature(certificate, parentCerticate) {
|
|
40
|
+
return verifyCertificateOrClrSignature(certificate, parentCerticate);
|
|
41
|
+
}
|
|
42
|
+
exports.verifyCertificateSignature = verifyCertificateSignature;
|
|
43
|
+
function verifyCertificateRevocationListSignature(certificateRevocationList, parentCerticate) {
|
|
44
|
+
return verifyCertificateOrClrSignature(certificateRevocationList, parentCerticate);
|
|
45
|
+
}
|
|
46
|
+
exports.verifyCertificateRevocationListSignature = verifyCertificateRevocationListSignature;
|
|
47
|
+
function verifyCertificateChain(certificateChain) {
|
|
48
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
49
|
+
// verify that all the certificate
|
|
50
|
+
// second certificate must be used for CertificateSign
|
|
51
|
+
for (let index = 1; index < certificateChain.length; index++) {
|
|
52
|
+
const cert = certificateChain[index - 1];
|
|
53
|
+
const certParent = certificateChain[index];
|
|
54
|
+
// parent child must have keyCertSign
|
|
55
|
+
const certParentInfo = crypto_explore_certificate_1.exploreCertificate(certParent);
|
|
56
|
+
const keyUsage = certParentInfo.tbsCertificate.extensions.keyUsage;
|
|
57
|
+
// istanbul ignore next
|
|
58
|
+
if (!keyUsage.keyCertSign) {
|
|
59
|
+
return {
|
|
60
|
+
status: "BadCertificateIssuerUseNotAllowed",
|
|
61
|
+
reason: "One of the certificate in the chain has not keyUsage set for Certificate Signing",
|
|
62
|
+
};
|
|
63
|
+
}
|
|
64
|
+
const parentSignChild = verifyCertificateSignature(cert, certParent);
|
|
65
|
+
if (!parentSignChild) {
|
|
66
|
+
return {
|
|
67
|
+
status: "BadCertificateInvalid",
|
|
68
|
+
reason: "One of the certificate in the chain is not signing the previous certificate",
|
|
69
|
+
};
|
|
70
|
+
}
|
|
71
|
+
const certInfo = crypto_explore_certificate_1.exploreCertificate(cert);
|
|
72
|
+
// istanbul ignore next
|
|
73
|
+
if (!certInfo.tbsCertificate.extensions) {
|
|
74
|
+
return {
|
|
75
|
+
status: "BadCertificateInvalid",
|
|
76
|
+
reason: "Cannot finx X409 Extension 3 in certificate",
|
|
77
|
+
};
|
|
78
|
+
}
|
|
79
|
+
// istanbul ignore next
|
|
80
|
+
if (!certParentInfo.tbsCertificate.extensions || !certInfo.tbsCertificate.extensions.authorityKeyIdentifier) {
|
|
81
|
+
return {
|
|
82
|
+
status: "BadCertificateInvalid",
|
|
83
|
+
reason: "Cannot finx X409 Extension 3 in certificate (parent)",
|
|
84
|
+
};
|
|
85
|
+
}
|
|
86
|
+
// istanbul ignore next
|
|
87
|
+
if (certParentInfo.tbsCertificate.extensions.subjectKeyIdentifier !==
|
|
88
|
+
certInfo.tbsCertificate.extensions.authorityKeyIdentifier.keyIdentifier) {
|
|
89
|
+
return {
|
|
90
|
+
status: "BadCertificateInvalid",
|
|
91
|
+
reason: "subjectKeyIdentifier authorityKeyIdentifier in child certificate do not match subjectKeyIdentifier of parent certificate",
|
|
92
|
+
};
|
|
93
|
+
}
|
|
94
|
+
}
|
|
95
|
+
return {
|
|
96
|
+
status: "Good",
|
|
97
|
+
reason: `certificate chain is valid(length = ${certificateChain.length})`,
|
|
98
|
+
};
|
|
99
|
+
});
|
|
100
|
+
}
|
|
101
|
+
exports.verifyCertificateChain = verifyCertificateChain;
|
|
102
|
+
//# sourceMappingURL=verify_cerficate_signature.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"verify_cerficate_signature.js","sourceRoot":"","sources":["../lib/verify_cerficate_signature.ts"],"names":[],"mappings":";AAAA,6BAA6B;;;;;;;;;;;;AAE7B,qDAAqD;AACrD,sFAAsF;AACtF,mFAAmF;AACnF,+EAA+E;AAC/E,+FAA+F;AAC/F,iCAAiC;AAGjC,6EAGsC;AACtC,iDAAuC;AACvC,iCAOgB;AAMhB,SAAgB,+BAA+B,CAC3C,gBAAwB,EACxB,eAA4B;IAG5B,MAAM,UAAU,GAAG,cAAO,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC;IAChD,MAAM,MAAM,GAAG,kBAAW,CAAC,gBAAgB,EAAE,UAAU,CAAC,CAAC;IACzD,MAAM,gBAAgB,GAAG,gBAAgB,CAAC,KAAK,CAAC,UAAU,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,CAAC,CAAC,CAAC;IAE7F,gKAAgK;IAChK,MAAM,kBAAkB,GAAG,+BAAwB,CAAC,gBAAgB,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;IACjF,MAAM,cAAc,GAAG,6BAAsB,CAAC,gBAAgB,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;IAE3E,MAAM,CAAC,GAAG,sCAAS,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC;IACxC,iEAAiE;IACjE,MAAM,OAAO,GAAG,oBAAK,CAAC,CAAC,EAAE,aAAa,CAAC,CAAC;IACxC,MAAM,MAAM,GAAG,MAAM,CAAC,YAAY,CAAC,kBAAkB,CAAC,UAAU,CAAC,CAAC;IAClE,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC;IAChC,MAAM,CAAC,GAAG,EAAE,CAAC;IACb,OAAO,MAAM,CAAC,MAAM,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;AAClD,CAAC;AApBD,0EAoBC;AAED,SAAgB,0BAA0B,CACtC,WAAwB,EACxB,eAA4B;IAE5B,OAAO,+BAA+B,CAAC,WAAW,EAAE,eAAe,CAAC,CAAA;AACxE,CAAC;AALD,gEAKC;AACD,SAAgB,wCAAwC,CACpD,yBAAsC,EACtC,eAA4B;IAE5B,OAAO,+BAA+B,CAAC,yBAAyB,EAAE,eAAe,CAAC,CAAA;AACtF,CAAC;AALD,4FAKC;AAID,SAAsB,sBAAsB,CAAC,gBAA+B;;QACxE,kCAAkC;QAClC,sDAAsD;QAEtD,KAAK,IAAI,KAAK,GAAG,CAAC,EAAE,KAAK,GAAG,gBAAgB,CAAC,MAAM,EAAE,KAAK,EAAE,EAAE;YAC1D,MAAM,IAAI,GAAG,gBAAgB,CAAC,KAAK,GAAG,CAAC,CAAC,CAAC;YACzC,MAAM,UAAU,GAAG,gBAAgB,CAAC,KAAK,CAAC,CAAC;YAE3C,qCAAqC;YACrC,MAAM,cAAc,GAAG,+CAAkB,CAAC,UAAU,CAAC,CAAC;YACtD,MAAM,QAAQ,GAAG,cAAc,CAAC,cAAc,CAAC,UAAW,CAAC,QAAS,CAAC;YAErE,uBAAuB;YACvB,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE;gBACvB,OAAO;oBACH,MAAM,EAAE,mCAAmC;oBAC3C,MAAM,EAAE,kFAAkF;iBAC7F,CAAC;aACL;YAED,MAAM,eAAe,GAAG,0BAA0B,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;YACrE,IAAI,CAAC,eAAe,EAAE;gBAClB,OAAO;oBACH,MAAM,EAAE,uBAAuB;oBAC/B,MAAM,EAAE,6EAA6E;iBACxF,CAAC;aACL;YACD,MAAM,QAAQ,GAAG,+CAAkB,CAAC,IAAI,CAAC,CAAC;YAE1C,uBAAuB;YACvB,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC,UAAU,EAAE;gBACrC,OAAO;oBACH,MAAM,EAAE,uBAAuB;oBAC/B,MAAM,EAAE,6CAA6C;iBACxD,CAAC;aACL;YAED,uBAAuB;YACvB,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,UAAU,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC,UAAU,CAAC,sBAAsB,EAAE;gBACzG,OAAO;oBACH,MAAM,EAAE,uBAAuB;oBAC/B,MAAM,EAAE,sDAAsD;iBACjE,CAAC;aACL;YAED,uBAAuB;YACvB,IACI,cAAc,CAAC,cAAc,CAAC,UAAU,CAAC,oBAAoB;gBAC7D,QAAQ,CAAC,cAAc,CAAC,UAAU,CAAC,sBAAsB,CAAC,aAAa,EACzE;gBACE,OAAO;oBACH,MAAM,EAAE,uBAAuB;oBAC/B,MAAM,EACF,0HAA0H;iBACjI,CAAC;aACL;SACJ;QACD,OAAO;YACH,MAAM,EAAE,MAAM;YACd,MAAM,EAAE,uCAAuC,gBAAgB,CAAC,MAAM,GAAG;SAC5E,CAAC;IACN,CAAC;CAAA;AA7DD,wDA6DC"}
|
package/index.d.ts
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
export * from "./dist/source";
|
|
2
|
-
export * from "./dist/source_nodejs";
|
|
1
|
+
export * from "./dist/source";
|
|
2
|
+
export * from "./dist/source_nodejs";
|
package/index.js
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
module.exports = {
|
|
2
|
-
...require("./dist/source"),
|
|
3
|
-
...require("./dist/source_nodejs"),
|
|
4
|
-
};
|
|
1
|
+
module.exports = {
|
|
2
|
+
...require("./dist/source"),
|
|
3
|
+
...require("./dist/source_nodejs"),
|
|
4
|
+
};
|
package/index_web.js
CHANGED
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
module.exports = {
|
|
2
|
-
...require("./dist/source"),
|
|
3
|
-
};
|
|
1
|
+
module.exports = {
|
|
2
|
+
...require("./dist/source"),
|
|
3
|
+
};
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "node-opcua-crypto",
|
|
3
|
-
"version": "1.
|
|
3
|
+
"version": "1.9.0",
|
|
4
4
|
"description": "Crypto tools for Node-OPCUA",
|
|
5
5
|
"main": "./index.js",
|
|
6
6
|
"types": "./index.d.ts",
|
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
"cost-of-modules": "npx cost-of-modules --no-install",
|
|
16
16
|
"release-it": "npx release-it",
|
|
17
17
|
"prettier-format": "prettier --config .prettierrc.js lib/**/*.ts test/**/*.ts --write",
|
|
18
|
-
"ncu": "npx npm-check-updates -u"
|
|
18
|
+
"ncu": "npx npm-check-updates -u -x env-paths,chalk"
|
|
19
19
|
},
|
|
20
20
|
"keywords": [
|
|
21
21
|
"OPCUA",
|
|
@@ -28,28 +28,28 @@
|
|
|
28
28
|
"author": "Etienne Rossignon",
|
|
29
29
|
"license": "MIT",
|
|
30
30
|
"devDependencies": {
|
|
31
|
-
"@types/mocha": "^9.
|
|
32
|
-
"@types/node": "^
|
|
33
|
-
"@typescript-eslint/eslint-plugin": "^
|
|
34
|
-
"@typescript-eslint/parser": "^
|
|
35
|
-
"eslint": "^
|
|
36
|
-
"eslint-config-prettier": "^8.
|
|
31
|
+
"@types/mocha": "^9.1.0",
|
|
32
|
+
"@types/node": "^17.0.21",
|
|
33
|
+
"@typescript-eslint/eslint-plugin": "^5.12.1",
|
|
34
|
+
"@typescript-eslint/parser": "^5.12.1",
|
|
35
|
+
"eslint": "^8.10.0",
|
|
36
|
+
"eslint-config-prettier": "^8.4.0",
|
|
37
37
|
"eslint-plugin-prettier": "^4.0.0",
|
|
38
|
-
"lorem-ipsum": "^2.0.
|
|
39
|
-
"mocha": "^9.
|
|
40
|
-
"prettier": "^2.
|
|
38
|
+
"lorem-ipsum": "^2.0.4",
|
|
39
|
+
"mocha": "^9.2.1",
|
|
40
|
+
"prettier": "^2.5.1",
|
|
41
41
|
"should": "^13.2.3",
|
|
42
42
|
"source-map": "^0.7.3",
|
|
43
|
-
"source-map-support": "^0.5.
|
|
44
|
-
"ts-node": "^10.
|
|
45
|
-
"typescript": "^4.
|
|
43
|
+
"source-map-support": "^0.5.21",
|
|
44
|
+
"ts-node": "^10.5.0",
|
|
45
|
+
"typescript": "^4.5.5"
|
|
46
46
|
},
|
|
47
47
|
"dependencies": {
|
|
48
48
|
"better-assert": "^1.0.2",
|
|
49
49
|
"chalk": "^4.1.2",
|
|
50
|
-
"hexy": "
|
|
51
|
-
"jsrsasign": "^10.
|
|
52
|
-
"sshpk": "^1.
|
|
50
|
+
"hexy": "0.3.4",
|
|
51
|
+
"jsrsasign": "^10.5.8",
|
|
52
|
+
"sshpk": "^1.17.0"
|
|
53
53
|
},
|
|
54
54
|
"repository": {
|
|
55
55
|
"type": "git",
|