node-opcua-server-configuration 2.163.1 → 2.165.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/clientTools/certificate_types.d.ts +15 -0
- package/dist/clientTools/certificate_types.js +19 -0
- package/dist/clientTools/certificate_types.js.map +1 -0
- package/dist/clientTools/get_certificate_key_type.d.ts +6 -0
- package/dist/clientTools/get_certificate_key_type.js +55 -0
- package/dist/clientTools/get_certificate_key_type.js.map +1 -0
- package/dist/clientTools/index.d.ts +2 -1
- package/dist/clientTools/index.js +2 -17
- package/dist/clientTools/index.js.map +1 -1
- package/dist/clientTools/push_certificate_management_client.d.ts +10 -10
- package/dist/clientTools/push_certificate_management_client.js +85 -89
- package/dist/clientTools/push_certificate_management_client.js.map +1 -1
- package/dist/index.d.ts +9 -7
- package/dist/index.js +9 -23
- package/dist/index.js.map +1 -1
- package/dist/push_certificate_manager.d.ts +6 -5
- package/dist/push_certificate_manager.js +1 -2
- package/dist/server/certificate_validation.d.ts +15 -0
- package/dist/server/certificate_validation.js +76 -0
- package/dist/server/certificate_validation.js.map +1 -0
- package/dist/server/file_transaction_manager.d.ts +30 -0
- package/dist/server/file_transaction_manager.js +223 -0
- package/dist/server/file_transaction_manager.js.map +1 -0
- package/dist/server/install_certificate_file_watcher.d.ts +1 -1
- package/dist/server/install_certificate_file_watcher.js +8 -14
- package/dist/server/install_certificate_file_watcher.js.map +1 -1
- package/dist/server/install_push_certitifate_management.d.ts +6 -6
- package/dist/server/install_push_certitifate_management.js +59 -81
- package/dist/server/install_push_certitifate_management.js.map +1 -1
- package/dist/server/promote_trust_list.d.ts +1 -1
- package/dist/server/promote_trust_list.js +348 -82
- package/dist/server/promote_trust_list.js.map +1 -1
- package/dist/server/push_certificate_manager/apply_changes.d.ts +4 -0
- package/dist/server/push_certificate_manager/apply_changes.js +65 -0
- package/dist/server/push_certificate_manager/apply_changes.js.map +1 -0
- package/dist/server/push_certificate_manager/create_signing_request.d.ts +5 -0
- package/dist/server/push_certificate_manager/create_signing_request.js +108 -0
- package/dist/server/push_certificate_manager/create_signing_request.js.map +1 -0
- package/dist/server/push_certificate_manager/get_rejected_list.d.ts +3 -0
- package/dist/server/push_certificate_manager/get_rejected_list.js +46 -0
- package/dist/server/push_certificate_manager/get_rejected_list.js.map +1 -0
- package/dist/server/push_certificate_manager/internal_context.d.ts +35 -0
- package/dist/server/push_certificate_manager/internal_context.js +45 -0
- package/dist/server/push_certificate_manager/internal_context.js.map +1 -0
- package/dist/server/push_certificate_manager/subject_to_string.d.ts +3 -0
- package/dist/server/push_certificate_manager/subject_to_string.js +27 -0
- package/dist/server/push_certificate_manager/subject_to_string.js.map +1 -0
- package/dist/server/push_certificate_manager/update_certificate.d.ts +5 -0
- package/dist/server/push_certificate_manager/update_certificate.js +134 -0
- package/dist/server/push_certificate_manager/update_certificate.js.map +1 -0
- package/dist/server/push_certificate_manager/util.d.ts +29 -0
- package/dist/server/push_certificate_manager/util.js +117 -0
- package/dist/server/push_certificate_manager/util.js.map +1 -0
- package/dist/server/push_certificate_manager_helpers.d.ts +5 -2
- package/dist/server/push_certificate_manager_helpers.js +110 -113
- package/dist/server/push_certificate_manager_helpers.js.map +1 -1
- package/dist/server/push_certificate_manager_server_impl.d.ts +37 -30
- package/dist/server/push_certificate_manager_server_impl.js +58 -438
- package/dist/server/push_certificate_manager_server_impl.js.map +1 -1
- package/dist/server/roles_and_permissions.d.ts +1 -1
- package/dist/server/roles_and_permissions.js +24 -27
- package/dist/server/roles_and_permissions.js.map +1 -1
- package/dist/server/tools.d.ts +1 -1
- package/dist/server/tools.js +7 -13
- package/dist/server/tools.js.map +1 -1
- package/dist/server/trust_list_server.d.ts +2 -2
- package/dist/server/trust_list_server.js +40 -29
- package/dist/server/trust_list_server.js.map +1 -1
- package/dist/standard_certificate_types.js +6 -9
- package/dist/standard_certificate_types.js.map +1 -1
- package/dist/trust_list.d.ts +2 -2
- package/dist/trust_list.js +1 -2
- package/dist/trust_list_impl.js +1 -2
- package/dist/trust_list_impl.js.map +1 -1
- package/package.json +30 -30
- package/source/clientTools/certificate_types.ts +21 -0
- package/source/clientTools/get_certificate_key_type.ts +73 -0
- package/source/clientTools/index.ts +2 -1
- package/source/clientTools/push_certificate_management_client.ts +49 -44
- package/source/index.ts +9 -7
- package/source/push_certificate_manager.ts +17 -18
- package/source/server/certificate_validation.ts +103 -0
- package/source/server/file_transaction_manager.ts +253 -0
- package/source/server/install_certificate_file_watcher.ts +15 -11
- package/source/server/install_push_certitifate_management.ts +52 -68
- package/source/server/promote_trust_list.ts +392 -73
- package/source/server/push_certificate_manager/apply_changes.ts +73 -0
- package/source/server/push_certificate_manager/create_signing_request.ts +137 -0
- package/source/server/push_certificate_manager/get_rejected_list.ts +63 -0
- package/source/server/push_certificate_manager/internal_context.ts +63 -0
- package/source/server/push_certificate_manager/subject_to_string.ts +25 -0
- package/source/server/push_certificate_manager/update_certificate.ts +203 -0
- package/source/server/push_certificate_manager/util.ts +145 -0
- package/source/server/push_certificate_manager_helpers.ts +62 -52
- package/source/server/push_certificate_manager_server_impl.ts +133 -552
- package/source/server/roles_and_permissions.ts +7 -8
- package/source/server/tools.ts +2 -5
- package/source/server/trust_list_server.ts +24 -9
- package/source/standard_certificate_types.ts +2 -3
- package/source/trust_list.ts +26 -33
|
@@ -1,33 +1,24 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.installPushCertificateManagementOnServer = installPushCertificateManagementOnServer;
|
|
7
1
|
/**
|
|
8
2
|
* @module node-opcua-server-configuration-server
|
|
9
3
|
*/
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
const node_opcua_hostname_1 = require("node-opcua-hostname");
|
|
20
|
-
const push_certificate_manager_helpers_1 = require("./push_certificate_manager_helpers");
|
|
4
|
+
import fs from "node:fs";
|
|
5
|
+
import path from "node:path";
|
|
6
|
+
import chalk from "chalk";
|
|
7
|
+
import { assert } from "node-opcua-assert";
|
|
8
|
+
import { readPrivateKey } from "node-opcua-crypto";
|
|
9
|
+
import { convertPEMtoDER, split_der } from "node-opcua-crypto/web";
|
|
10
|
+
import { checkDebugFlag, make_debugLog, make_errorLog } from "node-opcua-debug";
|
|
11
|
+
import { getFullyQualifiedDomainName, getIpAddresses } from "node-opcua-hostname";
|
|
12
|
+
import { installPushCertificateManagement } from "./push_certificate_manager_helpers.js";
|
|
21
13
|
// node 14 onward : import { readFile } from "fs/promises";
|
|
22
|
-
const { readFile } =
|
|
23
|
-
const debugLog =
|
|
24
|
-
const errorLog =
|
|
25
|
-
const doDebug =
|
|
26
|
-
doDebug;
|
|
14
|
+
const { readFile } = fs.promises;
|
|
15
|
+
const debugLog = make_debugLog("ServerConfiguration");
|
|
16
|
+
const errorLog = make_errorLog("ServerConfiguration");
|
|
17
|
+
const doDebug = checkDebugFlag("ServerConfiguration");
|
|
27
18
|
function getCertificate() {
|
|
28
19
|
if (!this.$$certificate) {
|
|
29
20
|
const certificateChain = getCertificateChain.call(this);
|
|
30
|
-
this.$$certificate =
|
|
21
|
+
this.$$certificate = split_der(certificateChain)[0];
|
|
31
22
|
}
|
|
32
23
|
return this.$$certificate;
|
|
33
24
|
}
|
|
@@ -38,79 +29,68 @@ function getCertificateChain() {
|
|
|
38
29
|
return this.$$certificateChain;
|
|
39
30
|
}
|
|
40
31
|
function getPrivateKey() {
|
|
41
|
-
//
|
|
32
|
+
// c8 ignore next
|
|
42
33
|
if (!this.$$privateKey) {
|
|
43
34
|
throw new Error("internal Error. cannot find $$privateKey");
|
|
44
35
|
}
|
|
45
36
|
return this.$$privateKey;
|
|
46
37
|
}
|
|
47
|
-
async function getIpAddresses() {
|
|
48
|
-
const ipAddresses = [];
|
|
49
|
-
const netInterfaces = os_1.default.networkInterfaces();
|
|
50
|
-
for (const interfaceName of Object.keys(netInterfaces)) {
|
|
51
|
-
if (!netInterfaces[interfaceName]) {
|
|
52
|
-
continue;
|
|
53
|
-
}
|
|
54
|
-
for (const interFace of netInterfaces[interfaceName]) {
|
|
55
|
-
if ("IPv4" !== interFace.family || interFace.internal !== false) {
|
|
56
|
-
// skip over internal (i.e. 127.0.0.1) and non-ipv4 addresses
|
|
57
|
-
continue;
|
|
58
|
-
}
|
|
59
|
-
ipAddresses.push(interFace.address);
|
|
60
|
-
}
|
|
61
|
-
}
|
|
62
|
-
return ipAddresses;
|
|
63
|
-
}
|
|
64
38
|
/**
|
|
65
39
|
*
|
|
66
40
|
*/
|
|
67
41
|
async function install() {
|
|
68
|
-
debugLog("install push certificate management", this.serverCertificateManager.rootDir);
|
|
69
|
-
|
|
70
|
-
|
|
42
|
+
doDebug && debugLog("install push certificate management", this.serverCertificateManager.rootDir);
|
|
43
|
+
Object.defineProperty(this, "privateKeyFile", {
|
|
44
|
+
get: () => this.serverCertificateManager.privateKey,
|
|
45
|
+
configurable: true
|
|
46
|
+
});
|
|
47
|
+
Object.defineProperty(this, "certificateFile", {
|
|
48
|
+
get: () => path.join(this.serverCertificateManager.rootDir, "own/certs/certificate.pem"),
|
|
49
|
+
configurable: true
|
|
50
|
+
});
|
|
71
51
|
if (!this.$$privateKey) {
|
|
72
|
-
this.$$privateKey =
|
|
52
|
+
this.$$privateKey = readPrivateKey(this.serverCertificateManager.privateKey);
|
|
73
53
|
}
|
|
74
54
|
if (!this.$$certificateChain) {
|
|
75
55
|
const certificateFile = this.certificateFile;
|
|
76
|
-
if (!
|
|
56
|
+
if (!fs.existsSync(certificateFile)) {
|
|
77
57
|
// this is the first time server is launch
|
|
78
58
|
// let's create a default self signed certificate with limited validity
|
|
79
|
-
const fqdn = await
|
|
59
|
+
const fqdn = await getFullyQualifiedDomainName();
|
|
80
60
|
const ipAddresses = await getIpAddresses();
|
|
81
61
|
const applicationUri = (this.serverInfo ? this.serverInfo.applicationUri : null) || "uri:MISSING";
|
|
82
62
|
const options = {
|
|
83
63
|
applicationUri,
|
|
84
64
|
dns: [fqdn],
|
|
85
65
|
ip: ipAddresses,
|
|
86
|
-
subject:
|
|
66
|
+
subject: `/CN=${applicationUri};/L=Paris`,
|
|
87
67
|
startDate: new Date(),
|
|
88
68
|
validity: 365 * 5, // five year
|
|
89
69
|
/* */
|
|
90
70
|
outputFile: certificateFile
|
|
91
71
|
};
|
|
92
|
-
debugLog("creating self signed certificate", options);
|
|
72
|
+
doDebug && debugLog("creating self signed certificate", options);
|
|
93
73
|
await this.serverCertificateManager.createSelfSignedCertificate(options);
|
|
94
74
|
}
|
|
95
75
|
const certificatePEM = await readFile(certificateFile, "utf8");
|
|
96
|
-
this.$$certificateChain =
|
|
76
|
+
this.$$certificateChain = convertPEMtoDER(certificatePEM);
|
|
97
77
|
// await this.serverCertificateManager.trustCertificate( this.$$certificateChain);
|
|
98
78
|
}
|
|
99
79
|
}
|
|
100
80
|
function getCertificateChainEP() {
|
|
101
|
-
const certificateFile =
|
|
102
|
-
const certificatePEM =
|
|
103
|
-
const $$certificateChain =
|
|
81
|
+
const certificateFile = path.join(this.certificateManager.rootDir, "own/certs/certificate.pem");
|
|
82
|
+
const certificatePEM = fs.readFileSync(certificateFile, "utf8");
|
|
83
|
+
const $$certificateChain = convertPEMtoDER(certificatePEM);
|
|
104
84
|
return $$certificateChain;
|
|
105
85
|
}
|
|
106
86
|
function getPrivateKeyEP() {
|
|
107
|
-
const privateKey =
|
|
87
|
+
const privateKey = readPrivateKey(this.certificateManager.privateKey);
|
|
108
88
|
return privateKey;
|
|
109
89
|
}
|
|
110
90
|
async function onCertificateAboutToChange(server) {
|
|
111
|
-
debugLog(
|
|
91
|
+
doDebug && debugLog(chalk.yellow(" onCertificateAboutToChange => Suspending End points"));
|
|
112
92
|
await server.suspendEndPoints();
|
|
113
|
-
debugLog(
|
|
93
|
+
doDebug && debugLog(chalk.yellow(" onCertificateAboutToChange => End points suspended"));
|
|
114
94
|
}
|
|
115
95
|
/**
|
|
116
96
|
* onCertificateChange is called when the serverConfiguration notifies
|
|
@@ -122,37 +102,35 @@ async function onCertificateAboutToChange(server) {
|
|
|
122
102
|
* @param server
|
|
123
103
|
*/
|
|
124
104
|
async function onCertificateChange(server) {
|
|
125
|
-
debugLog("on CertificateChanged");
|
|
105
|
+
doDebug && debugLog("on CertificateChanged");
|
|
126
106
|
const _server = server;
|
|
127
|
-
_server.$$privateKey =
|
|
128
|
-
const certificateFile =
|
|
129
|
-
const certificatePEM =
|
|
107
|
+
_server.$$privateKey = readPrivateKey(server.serverCertificateManager.privateKey);
|
|
108
|
+
const certificateFile = path.join(server.serverCertificateManager.rootDir, "own/certs/certificate.pem");
|
|
109
|
+
const certificatePEM = fs.readFileSync(certificateFile, "utf8");
|
|
130
110
|
const privateKeyFile = server.serverCertificateManager.privateKey;
|
|
131
|
-
const privateKey =
|
|
111
|
+
const privateKey = readPrivateKey(privateKeyFile);
|
|
132
112
|
// also reread the private key
|
|
133
|
-
_server.$$certificateChain =
|
|
113
|
+
_server.$$certificateChain = convertPEMtoDER(certificatePEM);
|
|
134
114
|
_server.$$privateKey = privateKey;
|
|
135
115
|
// note : $$certificate will be reconstructed on demand
|
|
136
|
-
_server.$$certificate =
|
|
116
|
+
_server.$$certificate = split_der(_server.$$certificateChain)[0];
|
|
137
117
|
setTimeout(async () => {
|
|
138
118
|
try {
|
|
139
|
-
debugLog(
|
|
119
|
+
doDebug && debugLog(chalk.yellow(" onCertificateChange => shutting down channels"));
|
|
140
120
|
await server.shutdownChannels();
|
|
141
|
-
debugLog(
|
|
142
|
-
debugLog(
|
|
121
|
+
doDebug && debugLog(chalk.yellow(" onCertificateChange => channels shut down"));
|
|
122
|
+
doDebug && debugLog(chalk.yellow(" onCertificateChange => resuming end points"));
|
|
143
123
|
await server.resumeEndPoints();
|
|
144
|
-
debugLog(
|
|
145
|
-
debugLog(
|
|
124
|
+
doDebug && debugLog(chalk.yellow(" onCertificateChange => end points resumed"));
|
|
125
|
+
debugLog(chalk.yellow("channels have been closed -> client should reconnect "));
|
|
146
126
|
}
|
|
147
127
|
catch (err) {
|
|
148
|
-
|
|
149
|
-
errorLog("Error in CertificateChanged handler ", err.message);
|
|
150
|
-
}
|
|
128
|
+
errorLog("Error in CertificateChanged handler ", err.message);
|
|
151
129
|
debugLog("err = ", err);
|
|
152
130
|
}
|
|
153
131
|
}, 2000);
|
|
154
132
|
}
|
|
155
|
-
async function installPushCertificateManagementOnServer(server) {
|
|
133
|
+
export async function installPushCertificateManagementOnServer(server) {
|
|
156
134
|
if (!server.engine || !server.engine.addressSpace) {
|
|
157
135
|
throw new Error("Server must have a valid address space." +
|
|
158
136
|
"you need to call installPushCertificateManagementOnServer after server has been initialized");
|
|
@@ -168,32 +146,32 @@ async function installPushCertificateManagementOnServer(server) {
|
|
|
168
146
|
endpoint.getCertificateChain = getCertificateChainEP;
|
|
169
147
|
endpoint.getPrivateKey = getPrivateKeyEP;
|
|
170
148
|
for (const e of endpoint.endpointDescriptions()) {
|
|
171
|
-
|
|
172
|
-
|
|
173
|
-
|
|
149
|
+
Object.defineProperty(e, "serverCertificate", {
|
|
150
|
+
get: () => endpoint.getCertificate(),
|
|
151
|
+
configurable: true
|
|
174
152
|
});
|
|
175
153
|
}
|
|
176
154
|
}
|
|
177
|
-
await
|
|
155
|
+
await installPushCertificateManagement(server.engine.addressSpace, {
|
|
178
156
|
applicationGroup: server.serverCertificateManager,
|
|
179
157
|
userTokenGroup: server.userCertificateManager,
|
|
180
158
|
applicationUri: server.serverInfo.applicationUri || "InvalidURI"
|
|
181
159
|
});
|
|
182
160
|
const serverConfiguration = server.engine.addressSpace.rootFolder.objects.server.getChildByName("ServerConfiguration");
|
|
183
161
|
const serverConfigurationPriv = serverConfiguration;
|
|
184
|
-
|
|
162
|
+
assert(serverConfigurationPriv.$pushCertificateManager);
|
|
185
163
|
serverConfigurationPriv.$pushCertificateManager.on("CertificateAboutToChange", (actionQueue) => {
|
|
186
164
|
actionQueue.push(async () => {
|
|
187
|
-
debugLog("CertificateAboutToChange Event received");
|
|
165
|
+
doDebug && debugLog("CertificateAboutToChange Event received");
|
|
188
166
|
await onCertificateAboutToChange(server);
|
|
189
|
-
debugLog("CertificateAboutToChange Event processed");
|
|
167
|
+
doDebug && debugLog("CertificateAboutToChange Event processed");
|
|
190
168
|
});
|
|
191
169
|
});
|
|
192
170
|
serverConfigurationPriv.$pushCertificateManager.on("CertificateChanged", (actionQueue) => {
|
|
193
171
|
actionQueue.push(async () => {
|
|
194
|
-
debugLog("CertificateChanged Event received");
|
|
172
|
+
doDebug && debugLog("CertificateChanged Event received");
|
|
195
173
|
await onCertificateChange(server);
|
|
196
|
-
debugLog("CertificateChanged Event processed");
|
|
174
|
+
doDebug && debugLog("CertificateChanged Event processed");
|
|
197
175
|
});
|
|
198
176
|
});
|
|
199
177
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"install_push_certitifate_management.js","sourceRoot":"","sources":["../../source/server/install_push_certitifate_management.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"install_push_certitifate_management.js","sourceRoot":"","sources":["../../source/server/install_push_certitifate_management.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,MAAM,SAAS,CAAC;AACzB,OAAO,IAAI,MAAM,WAAW,CAAC;AAE7B,OAAO,KAAK,MAAM,OAAO,CAAC;AAG1B,OAAO,EAAE,MAAM,EAAE,MAAM,mBAAmB,CAAC;AAG3C,OAAO,EAAE,cAAc,EAAE,MAAM,mBAAmB,CAAC;AACnD,OAAO,EAAoB,eAAe,EAAmB,SAAS,EAAE,MAAM,uBAAuB,CAAC;AACtG,OAAO,EAAE,cAAc,EAAE,aAAa,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAChF,OAAO,EAAE,2BAA2B,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAC;AAIlF,OAAO,EAAE,gCAAgC,EAAE,MAAM,uCAAuC,CAAC;AAGzF,4DAA4D;AAC5D,MAAM,EAAE,QAAQ,EAAE,GAAG,EAAE,CAAC,QAAQ,CAAC;AAEjC,MAAM,QAAQ,GAAG,aAAa,CAAC,qBAAqB,CAAC,CAAC;AACtD,MAAM,QAAQ,GAAG,aAAa,CAAC,qBAAqB,CAAC,CAAC;AACtD,MAAM,OAAO,GAAG,cAAc,CAAC,qBAAqB,CAAC,CAAC;AAatD,SAAS,cAAc;IACnB,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;QACtB,MAAM,gBAAgB,GAAG,mBAAmB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACxD,IAAI,CAAC,aAAa,GAAG,SAAS,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC;IACxD,CAAC;IACD,OAAO,IAAI,CAAC,aAAa,CAAC;AAC9B,CAAC;AAED,SAAS,mBAAmB;IACxB,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;IACtE,CAAC;IACD,OAAO,IAAI,CAAC,kBAAkB,CAAC;AACnC,CAAC;AAED,SAAS,aAAa;IAClB,iBAAiB;IACjB,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QACrB,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;IAChE,CAAC;IACD,OAAO,IAAI,CAAC,YAAY,CAAC;AAC7B,CAAC;AAID;;GAEG;AACH,KAAK,UAAU,OAAO;IAClB,OAAO,IAAI,QAAQ,CAAC,qCAAqC,EAAE,IAAI,CAAC,wBAAwB,CAAC,OAAO,CAAC,CAAC;IAElG,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;QAC1C,GAAG,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,wBAAwB,CAAC,UAAU;QACnD,YAAY,EAAE,IAAI;KACrB,CAAC,CAAC;IACH,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,iBAAiB,EAAE;QAC3C,GAAG,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,wBAAwB,CAAC,OAAO,EAAE,2BAA2B,CAAC;QACxF,YAAY,EAAE,IAAI;KACrB,CAAC,CAAC;IAEH,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QACrB,IAAI,CAAC,YAAY,GAAG,cAAc,CAAC,IAAI,CAAC,wBAAwB,CAAC,UAAU,CAAC,CAAC;IACjF,CAAC;IAED,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE,CAAC;QAC3B,MAAM,eAAe,GAAG,IAAI,CAAC,eAAe,CAAC;QAE7C,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,eAAe,CAAC,EAAE,CAAC;YAClC,0CAA0C;YAC1C,uEAAuE;YAEvE,MAAM,IAAI,GAAG,MAAM,2BAA2B,EAAE,CAAC;YACjD,MAAM,WAAW,GAAG,MAAM,cAAc,EAAE,CAAC;YAE3C,MAAM,cAAc,GAAG,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,aAAa,CAAC;YAElG,MAAM,OAAO,GAAG;gBACZ,cAAc;gBAEd,GAAG,EAAE,CAAC,IAAI,CAAC;gBACX,EAAE,EAAE,WAAW;gBAEf,OAAO,EAAE,OAAO,cAAc,WAAW;gBAEzC,SAAS,EAAE,IAAI,IAAI,EAAE;gBAErB,QAAQ,EAAE,GAAG,GAAG,CAAC,EAAE,YAAY;gBAE/B,KAAK;gBACL,UAAU,EAAE,eAAe;aAC9B,CAAC;YAEF,OAAO,IAAI,QAAQ,CAAC,kCAAkC,EAAE,OAAO,CAAC,CAAC;YACjE,MAAM,IAAI,CAAC,wBAAwB,CAAC,2BAA2B,CAAC,OAAO,CAAC,CAAC;QAC7E,CAAC;QACD,MAAM,cAAc,GAAG,MAAM,QAAQ,CAAC,eAAe,EAAE,MAAM,CAAC,CAAC;QAE/D,IAAI,CAAC,kBAAkB,GAAG,eAAe,CAAC,cAAc,CAAC,CAAC;QAE1D,mFAAmF;IACvF,CAAC;AACL,CAAC;AAED,SAAS,qBAAqB;IAC1B,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,2BAA2B,CAAC,CAAC;IAChG,MAAM,cAAc,GAAG,EAAE,CAAC,YAAY,CAAC,eAAe,EAAE,MAAM,CAAC,CAAC;IAChE,MAAM,kBAAkB,GAAG,eAAe,CAAC,cAAc,CAAC,CAAC;IAC3D,OAAO,kBAAkB,CAAC;AAC9B,CAAC;AAED,SAAS,eAAe;IACpB,MAAM,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,kBAAkB,CAAC,UAAU,CAAC,CAAC;IACtE,OAAO,UAAU,CAAC;AACtB,CAAC;AAED,KAAK,UAAU,0BAA0B,CAAC,MAAmB;IACzD,OAAO,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,sDAAsD,CAAC,CAAC,CAAC;IAC1F,MAAM,MAAM,CAAC,gBAAgB,EAAE,CAAC;IAChC,OAAO,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,qDAAqD,CAAC,CAAC,CAAC;AAC7F,CAAC;AAED;;;;;;;;GAQG;AACH,KAAK,UAAU,mBAAmB,CAAC,MAAmB;IAClD,OAAO,IAAI,QAAQ,CAAC,uBAAuB,CAAC,CAAC;IAE7C,MAAM,OAAO,GAAG,MAAuC,CAAC;IAExD,OAAO,CAAC,YAAY,GAAG,cAAc,CAAC,MAAM,CAAC,wBAAwB,CAAC,UAAU,CAAC,CAAC;IAClF,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,wBAAwB,CAAC,OAAO,EAAE,2BAA2B,CAAC,CAAC;IACxG,MAAM,cAAc,GAAG,EAAE,CAAC,YAAY,CAAC,eAAe,EAAE,MAAM,CAAC,CAAC;IAEhE,MAAM,cAAc,GAAG,MAAM,CAAC,wBAAwB,CAAC,UAAU,CAAC;IAClE,MAAM,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC,CAAC;IAClD,8BAA8B;IAE9B,OAAO,CAAC,kBAAkB,GAAG,eAAe,CAAC,cAAc,CAAC,CAAC;IAC7D,OAAO,CAAC,YAAY,GAAG,UAAU,CAAC;IAClC,uDAAuD;IACvD,OAAO,CAAC,aAAa,GAAG,SAAS,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC;IAEjE,UAAU,CAAC,KAAK,IAAI,EAAE;QAClB,IAAI,CAAC;YACD,OAAO,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,gDAAgD,CAAC,CAAC,CAAC;YACpF,MAAM,MAAM,CAAC,gBAAgB,EAAE,CAAC;YAChC,OAAO,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,4CAA4C,CAAC,CAAC,CAAC;YAEhF,OAAO,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,6CAA6C,CAAC,CAAC,CAAC;YACjF,MAAM,MAAM,CAAC,eAAe,EAAE,CAAC;YAC/B,OAAO,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,4CAA4C,CAAC,CAAC,CAAC;YAEhF,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,uDAAuD,CAAC,CAAC,CAAC;QACpF,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACX,QAAQ,CAAC,sCAAsC,EAAG,GAAa,CAAC,OAAO,CAAC,CAAC;YACzE,QAAQ,CAAC,QAAQ,EAAE,GAAG,CAAC,CAAC;QAC5B,CAAC;IACL,CAAC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAWD,MAAM,CAAC,KAAK,UAAU,wCAAwC,CAAC,MAAmB;IAC9E,IAAI,CAAC,MAAM,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC;QAChD,MAAM,IAAI,KAAK,CACX,yCAAyC;YACrC,6FAA6F,CACpG,CAAC;IACN,CAAC;IACD,MAAM,OAAO,CAAC,IAAI,CAAC,MAAuC,CAAC,CAAC;IAE5D,MAAM,CAAC,cAAc,GAAG,cAAc,CAAC;IACvC,MAAM,CAAC,mBAAmB,GAAG,mBAAmB,CAAC;IACjD,MAAM,CAAC,aAAa,GAAG,aAAa,CAAC;IAErC,KAAK,MAAM,QAAQ,IAAI,MAAM,CAAC,SAAS,EAAE,CAAC;QACtC,MAAM,YAAY,GAA0B,QAA4C,CAAC;QACzF,YAAY,CAAC,iBAAiB,GAAG,IAAI,CAAC;QACtC,YAAY,CAAC,WAAW,GAAG,IAAI,CAAC;QAEhC,QAAQ,CAAC,mBAAmB,GAAG,qBAAqB,CAAC;QACrD,QAAQ,CAAC,aAAa,GAAG,eAAe,CAAC;QAEzC,KAAK,MAAM,CAAC,IAAI,QAAQ,CAAC,oBAAoB,EAAE,EAAE,CAAC;YAC9C,MAAM,CAAC,cAAc,CAAC,CAAC,EAAE,mBAAmB,EAAE;gBAC1C,GAAG,EAAE,GAAG,EAAE,CAAC,QAAQ,CAAC,cAAc,EAAE;gBACpC,YAAY,EAAE,IAAI;aACrB,CAAC,CAAC;QACP,CAAC;IACL,CAAC;IAED,MAAM,gCAAgC,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,EAAE;QAC/D,gBAAgB,EAAE,MAAM,CAAC,wBAAwB;QACjD,cAAc,EAAE,MAAM,CAAC,sBAAsB;QAE7C,cAAc,EAAE,MAAM,CAAC,UAAU,CAAC,cAAc,IAAI,YAAY;KACnE,CAAC,CAAC;IAEH,MAAM,mBAAmB,GAAG,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,MAAM,CAAC,cAAc,CAAC,qBAAqB,CAAC,CAAC;IACvH,MAAM,uBAAuB,GAAG,mBAA8C,CAAC;IAC/E,MAAM,CAAC,uBAAuB,CAAC,uBAAuB,CAAC,CAAC;IAExD,uBAAuB,CAAC,uBAAuB,CAAC,EAAE,CAAC,0BAA0B,EAAE,CAAC,WAAwB,EAAE,EAAE;QACxG,WAAW,CAAC,IAAI,CAAC,KAAK,IAAmB,EAAE;YACvC,OAAO,IAAI,QAAQ,CAAC,yCAAyC,CAAC,CAAC;YAC/D,MAAM,0BAA0B,CAAC,MAAM,CAAC,CAAC;YACzC,OAAO,IAAI,QAAQ,CAAC,0CAA0C,CAAC,CAAC;QACpE,CAAC,CAAC,CAAC;IACP,CAAC,CAAC,CAAC;IACH,uBAAuB,CAAC,uBAAuB,CAAC,EAAE,CAAC,oBAAoB,EAAE,CAAC,WAAwB,EAAE,EAAE;QAClG,WAAW,CAAC,IAAI,CAAC,KAAK,IAAmB,EAAE;YACvC,OAAO,IAAI,QAAQ,CAAC,mCAAmC,CAAC,CAAC;YACzD,MAAM,mBAAmB,CAAC,MAAM,CAAC,CAAC;YAClC,OAAO,IAAI,QAAQ,CAAC,oCAAoC,CAAC,CAAC;QAC9D,CAAC,CAAC,CAAC;IACP,CAAC,CAAC,CAAC;AACP,CAAC"}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* @module node-opcua-server-configuration
|
|
3
3
|
*/
|
|
4
|
-
import {
|
|
4
|
+
import type { UAObject, UATrustList, UAVariable } from "node-opcua-address-space";
|
|
5
5
|
export declare function promoteTrustList(trustList: UATrustList): Promise<void>;
|
|
6
6
|
export declare function installAccessRestrictionOnTrustList(trustList: UAVariable | UAObject): void;
|