node-opcua-server-configuration 2.97.0 → 2.98.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. package/dist/clientTools/index.d.ts +1 -1
  2. package/dist/clientTools/index.js +17 -17
  3. package/dist/clientTools/push_certificate_management_client.d.ts +176 -176
  4. package/dist/clientTools/push_certificate_management_client.js +463 -463
  5. package/dist/clientTools/push_certificate_management_client.js.map +1 -1
  6. package/dist/index.d.ts +10 -10
  7. package/dist/index.js +27 -27
  8. package/dist/push_certificate_manager.d.ts +141 -141
  9. package/dist/push_certificate_manager.js +2 -2
  10. package/dist/server/install_certificate_file_watcher.d.ts +5 -5
  11. package/dist/server/install_certificate_file_watcher.js +23 -23
  12. package/dist/server/install_push_certitifate_management.d.ts +19 -19
  13. package/dist/server/install_push_certitifate_management.js +215 -215
  14. package/dist/server/promote_trust_list.d.ts +6 -6
  15. package/dist/server/promote_trust_list.js +175 -175
  16. package/dist/server/push_certificate_manager_helpers.d.ts +4 -4
  17. package/dist/server/push_certificate_manager_helpers.js +411 -411
  18. package/dist/server/push_certificate_manager_server_impl.d.ts +47 -47
  19. package/dist/server/push_certificate_manager_server_impl.js +525 -525
  20. package/dist/server/roles_and_permissions.d.ts +3 -3
  21. package/dist/server/roles_and_permissions.js +38 -38
  22. package/dist/server/tools.d.ts +3 -3
  23. package/dist/server/tools.js +19 -19
  24. package/dist/server/trust_list_server.d.ts +13 -13
  25. package/dist/server/trust_list_server.js +89 -89
  26. package/dist/standard_certificate_types.d.ts +6 -6
  27. package/dist/standard_certificate_types.js +13 -13
  28. package/dist/trust_list.d.ts +79 -79
  29. package/dist/trust_list.js +2 -2
  30. package/dist/trust_list_impl.js +25 -25
  31. package/package.json +32 -28
  32. package/bin/configurator.ts +0 -304
@@ -1,216 +1,216 @@
1
- "use strict";
2
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
- return new (P || (P = Promise))(function (resolve, reject) {
5
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
- step((generator = generator.apply(thisArg, _arguments || [])).next());
9
- });
10
- };
11
- Object.defineProperty(exports, "__esModule", { value: true });
12
- exports.installPushCertificateManagementOnServer = void 0;
13
- /**
14
- * @module node-opcua-server-configuration-server
15
- */
16
- const fs = require("fs");
17
- const os = require("os");
18
- const path = require("path");
19
- const crypto_1 = require("crypto");
20
- const chalk = require("chalk");
21
- const node_opcua_assert_1 = require("node-opcua-assert");
22
- const node_opcua_crypto_1 = require("node-opcua-crypto");
23
- const node_opcua_debug_1 = require("node-opcua-debug");
24
- const node_opcua_hostname_1 = require("node-opcua-hostname");
25
- const push_certificate_manager_helpers_1 = require("./push_certificate_manager_helpers");
26
- // node 14 onward : import { readFile } from "fs/promises";
27
- const { readFile } = fs.promises;
28
- const debugLog = (0, node_opcua_debug_1.make_debugLog)("ServerConfiguration");
29
- const errorLog = (0, node_opcua_debug_1.make_errorLog)("ServerConfiguration");
30
- const doDebug = (0, node_opcua_debug_1.checkDebugFlag)("ServerConfiguration");
31
- function getCertificate() {
32
- if (!this.$$certificate) {
33
- const certificateChain = getCertificateChain.call(this);
34
- this.$$certificate = (0, node_opcua_crypto_1.split_der)(certificateChain)[0];
35
- }
36
- return this.$$certificate;
37
- }
38
- function getCertificateChain() {
39
- if (!this.$$certificateChain) {
40
- throw new Error("internal Error. cannot find $$certificateChain");
41
- }
42
- return this.$$certificateChain;
43
- }
44
- function getPrivateKey() {
45
- // istanbul ignore next
46
- if (!this.$$privateKey) {
47
- throw new Error("internal Error. cannot find $$privateKey");
48
- }
49
- return this.$$privateKey;
50
- }
51
- function getIpAddresses() {
52
- return __awaiter(this, void 0, void 0, function* () {
53
- const ipAddresses = [];
54
- const netInterfaces = os.networkInterfaces();
55
- for (const interfaceName of Object.keys(netInterfaces)) {
56
- if (!netInterfaces[interfaceName]) {
57
- continue;
58
- }
59
- for (const interFace of netInterfaces[interfaceName]) {
60
- if ("IPv4" !== interFace.family || interFace.internal !== false) {
61
- // skip over internal (i.e. 127.0.0.1) and non-ipv4 addresses
62
- continue;
63
- }
64
- ipAddresses.push(interFace.address);
65
- }
66
- }
67
- return ipAddresses;
68
- });
69
- }
70
- /**
71
- *
72
- */
73
- function install() {
74
- return __awaiter(this, void 0, void 0, function* () {
75
- debugLog("install push certificate management", this.serverCertificateManager.rootDir);
76
- this.__defineGetter__("privateKeyFile", () => this.serverCertificateManager.privateKey);
77
- this.__defineGetter__("certificateFile", () => path.join(this.serverCertificateManager.rootDir, "own/certs/certificate.pem"));
78
- if (!this.$$privateKey) {
79
- this.$$privateKey = (0, crypto_1.createPrivateKey)(yield readFile(this.serverCertificateManager.privateKey, "utf8"));
80
- }
81
- if (!this.$$certificateChain) {
82
- const certificateFile = this.certificateFile;
83
- if (!fs.existsSync(certificateFile)) {
84
- // this is the first time server is launch
85
- // let's create a default self signed certificate with limited validity
86
- const fqdn = yield (0, node_opcua_hostname_1.getFullyQualifiedDomainName)();
87
- const ipAddresses = yield getIpAddresses();
88
- const applicationUri = (this.serverInfo ? this.serverInfo.applicationUri : null) || "uri:MISSING";
89
- const options = {
90
- applicationUri,
91
- dns: [fqdn],
92
- ip: ipAddresses,
93
- subject: "/CN=" + applicationUri + ";/L=Paris",
94
- startDate: new Date(),
95
- validity: 365 * 5,
96
- /* */
97
- outputFile: certificateFile
98
- };
99
- debugLog("creating self signed certificate", options);
100
- yield this.serverCertificateManager.createSelfSignedCertificate(options);
101
- }
102
- const certificatePEM = yield readFile(certificateFile, "utf8");
103
- this.$$certificateChain = (0, node_opcua_crypto_1.convertPEMtoDER)(certificatePEM);
104
- // await this.serverCertificateManager.trustCertificate( this.$$certificateChain);
105
- }
106
- });
107
- }
108
- function getCertificateChainEP() {
109
- const certificateFile = path.join(this.certificateManager.rootDir, "own/certs/certificate.pem");
110
- const certificatePEM = fs.readFileSync(certificateFile, "utf8");
111
- const $$certificateChain = (0, node_opcua_crypto_1.convertPEMtoDER)(certificatePEM);
112
- const thumbprint = (0, node_opcua_crypto_1.makeSHA1Thumbprint)($$certificateChain);
113
- return $$certificateChain;
114
- }
115
- function getPrivateKeyEP() {
116
- const $$privateKey = (0, crypto_1.createPrivateKey)(fs.readFileSync(this.certificateManager.privateKey, "utf8"));
117
- return $$privateKey;
118
- }
119
- function onCertificateAboutToChange(server) {
120
- return __awaiter(this, void 0, void 0, function* () {
121
- debugLog(chalk.yellow(" onCertificateAboutToChange => Suspending End points"));
122
- yield server.suspendEndPoints();
123
- debugLog(chalk.yellow(" onCertificateAboutToChange => End points suspended"));
124
- });
125
- }
126
- /**
127
- * onCertificateChange is called when the serverConfiguration notifies
128
- * that the server certificate and/or private key has changed.
129
- *
130
- * this function suspends all endpoint listeners and stop all existing channels
131
- * then start all endpoint listener
132
- *
133
- * @param server
134
- */
135
- function onCertificateChange(server) {
136
- return __awaiter(this, void 0, void 0, function* () {
137
- debugLog("on CertificateChanged");
138
- const _server = server;
139
- _server.$$privateKey = (0, crypto_1.createPrivateKey)(fs.readFileSync(server.serverCertificateManager.privateKey, "utf8"));
140
- const certificateFile = path.join(server.serverCertificateManager.rootDir, "own/certs/certificate.pem");
141
- const certificatePEM = fs.readFileSync(certificateFile, "utf8");
142
- const privateKeyFile = server.serverCertificateManager.privateKey;
143
- const privateKey = (0, crypto_1.createPrivateKey)(fs.readFileSync(privateKeyFile, "utf8"));
144
- // also reread the private key
145
- _server.$$certificateChain = (0, node_opcua_crypto_1.convertPEMtoDER)(certificatePEM);
146
- _server.$$privateKey = privateKey;
147
- // note : $$certificate will be reconstructed on demand
148
- _server.$$certificate = (0, node_opcua_crypto_1.split_der)(_server.$$certificateChain)[0];
149
- setTimeout(() => __awaiter(this, void 0, void 0, function* () {
150
- try {
151
- debugLog(chalk.yellow(" onCertificateChange => shutting down channels"));
152
- yield server.shutdownChannels();
153
- debugLog(chalk.yellow(" onCertificateChange => channels shut down"));
154
- debugLog(chalk.yellow(" onCertificateChange => resuming end points"));
155
- yield server.resumeEndPoints();
156
- debugLog(chalk.yellow(" onCertificateChange => end points resumed"));
157
- debugLog(chalk.yellow("channels have been closed -> client should reconnect "));
158
- }
159
- catch (err) {
160
- if (err instanceof Error) {
161
- errorLog("Error in CertificateChanged handler ", err.message);
162
- }
163
- debugLog("err = ", err);
164
- }
165
- }), 2000);
166
- });
167
- }
168
- function installPushCertificateManagementOnServer(server) {
169
- return __awaiter(this, void 0, void 0, function* () {
170
- if (!server.engine || !server.engine.addressSpace) {
171
- throw new Error("Server must have a valid address space." +
172
- "you need to call installPushCertificateManagementOnServer after server has been initialized");
173
- }
174
- yield install.call(server);
175
- server.getCertificate = getCertificate;
176
- server.getCertificateChain = getCertificateChain;
177
- server.getPrivateKey = getPrivateKey;
178
- for (const endpoint of server.endpoints) {
179
- const endpointPriv = endpoint;
180
- endpointPriv._certificateChain = null;
181
- endpointPriv._privateKey = null;
182
- endpoint.getCertificateChain = getCertificateChainEP;
183
- endpoint.getPrivateKey = getPrivateKeyEP;
184
- for (const e of endpoint.endpointDescriptions()) {
185
- // e.serverCertificate = null;
186
- e.__defineGetter__("serverCertificate", function () {
187
- return endpoint.getCertificate();
188
- });
189
- }
190
- }
191
- yield (0, push_certificate_manager_helpers_1.installPushCertificateManagement)(server.engine.addressSpace, {
192
- applicationGroup: server.serverCertificateManager,
193
- userTokenGroup: server.userCertificateManager,
194
- applicationUri: server.serverInfo.applicationUri || "InvalidURI"
195
- });
196
- const serverConfiguration = server.engine.addressSpace.rootFolder.objects.server.getChildByName("ServerConfiguration");
197
- const serverConfigurationPriv = serverConfiguration;
198
- (0, node_opcua_assert_1.assert)(serverConfigurationPriv.$pushCertificateManager);
199
- serverConfigurationPriv.$pushCertificateManager.on("CertificateAboutToChange", (actionQueue) => {
200
- actionQueue.push(() => __awaiter(this, void 0, void 0, function* () {
201
- debugLog("CertificateAboutToChange Event received");
202
- yield onCertificateAboutToChange(server);
203
- debugLog("CertificateAboutToChange Event processed");
204
- }));
205
- });
206
- serverConfigurationPriv.$pushCertificateManager.on("CertificateChanged", (actionQueue) => {
207
- actionQueue.push(() => __awaiter(this, void 0, void 0, function* () {
208
- debugLog("CertificateChanged Event received");
209
- yield onCertificateChange(server);
210
- debugLog("CertificateChanged Event processed");
211
- }));
212
- });
213
- });
214
- }
215
- exports.installPushCertificateManagementOnServer = installPushCertificateManagementOnServer;
1
+ "use strict";
2
+ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
+ function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
+ return new (P || (P = Promise))(function (resolve, reject) {
5
+ function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
+ function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
+ function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
+ step((generator = generator.apply(thisArg, _arguments || [])).next());
9
+ });
10
+ };
11
+ Object.defineProperty(exports, "__esModule", { value: true });
12
+ exports.installPushCertificateManagementOnServer = void 0;
13
+ /**
14
+ * @module node-opcua-server-configuration-server
15
+ */
16
+ const fs = require("fs");
17
+ const os = require("os");
18
+ const path = require("path");
19
+ const crypto_1 = require("crypto");
20
+ const chalk = require("chalk");
21
+ const node_opcua_assert_1 = require("node-opcua-assert");
22
+ const node_opcua_crypto_1 = require("node-opcua-crypto");
23
+ const node_opcua_debug_1 = require("node-opcua-debug");
24
+ const node_opcua_hostname_1 = require("node-opcua-hostname");
25
+ const push_certificate_manager_helpers_1 = require("./push_certificate_manager_helpers");
26
+ // node 14 onward : import { readFile } from "fs/promises";
27
+ const { readFile } = fs.promises;
28
+ const debugLog = (0, node_opcua_debug_1.make_debugLog)("ServerConfiguration");
29
+ const errorLog = (0, node_opcua_debug_1.make_errorLog)("ServerConfiguration");
30
+ const doDebug = (0, node_opcua_debug_1.checkDebugFlag)("ServerConfiguration");
31
+ function getCertificate() {
32
+ if (!this.$$certificate) {
33
+ const certificateChain = getCertificateChain.call(this);
34
+ this.$$certificate = (0, node_opcua_crypto_1.split_der)(certificateChain)[0];
35
+ }
36
+ return this.$$certificate;
37
+ }
38
+ function getCertificateChain() {
39
+ if (!this.$$certificateChain) {
40
+ throw new Error("internal Error. cannot find $$certificateChain");
41
+ }
42
+ return this.$$certificateChain;
43
+ }
44
+ function getPrivateKey() {
45
+ // istanbul ignore next
46
+ if (!this.$$privateKey) {
47
+ throw new Error("internal Error. cannot find $$privateKey");
48
+ }
49
+ return this.$$privateKey;
50
+ }
51
+ function getIpAddresses() {
52
+ return __awaiter(this, void 0, void 0, function* () {
53
+ const ipAddresses = [];
54
+ const netInterfaces = os.networkInterfaces();
55
+ for (const interfaceName of Object.keys(netInterfaces)) {
56
+ if (!netInterfaces[interfaceName]) {
57
+ continue;
58
+ }
59
+ for (const interFace of netInterfaces[interfaceName]) {
60
+ if ("IPv4" !== interFace.family || interFace.internal !== false) {
61
+ // skip over internal (i.e. 127.0.0.1) and non-ipv4 addresses
62
+ continue;
63
+ }
64
+ ipAddresses.push(interFace.address);
65
+ }
66
+ }
67
+ return ipAddresses;
68
+ });
69
+ }
70
+ /**
71
+ *
72
+ */
73
+ function install() {
74
+ return __awaiter(this, void 0, void 0, function* () {
75
+ debugLog("install push certificate management", this.serverCertificateManager.rootDir);
76
+ this.__defineGetter__("privateKeyFile", () => this.serverCertificateManager.privateKey);
77
+ this.__defineGetter__("certificateFile", () => path.join(this.serverCertificateManager.rootDir, "own/certs/certificate.pem"));
78
+ if (!this.$$privateKey) {
79
+ this.$$privateKey = (0, crypto_1.createPrivateKey)(yield readFile(this.serverCertificateManager.privateKey, "utf8"));
80
+ }
81
+ if (!this.$$certificateChain) {
82
+ const certificateFile = this.certificateFile;
83
+ if (!fs.existsSync(certificateFile)) {
84
+ // this is the first time server is launch
85
+ // let's create a default self signed certificate with limited validity
86
+ const fqdn = yield (0, node_opcua_hostname_1.getFullyQualifiedDomainName)();
87
+ const ipAddresses = yield getIpAddresses();
88
+ const applicationUri = (this.serverInfo ? this.serverInfo.applicationUri : null) || "uri:MISSING";
89
+ const options = {
90
+ applicationUri,
91
+ dns: [fqdn],
92
+ ip: ipAddresses,
93
+ subject: "/CN=" + applicationUri + ";/L=Paris",
94
+ startDate: new Date(),
95
+ validity: 365 * 5,
96
+ /* */
97
+ outputFile: certificateFile
98
+ };
99
+ debugLog("creating self signed certificate", options);
100
+ yield this.serverCertificateManager.createSelfSignedCertificate(options);
101
+ }
102
+ const certificatePEM = yield readFile(certificateFile, "utf8");
103
+ this.$$certificateChain = (0, node_opcua_crypto_1.convertPEMtoDER)(certificatePEM);
104
+ // await this.serverCertificateManager.trustCertificate( this.$$certificateChain);
105
+ }
106
+ });
107
+ }
108
+ function getCertificateChainEP() {
109
+ const certificateFile = path.join(this.certificateManager.rootDir, "own/certs/certificate.pem");
110
+ const certificatePEM = fs.readFileSync(certificateFile, "utf8");
111
+ const $$certificateChain = (0, node_opcua_crypto_1.convertPEMtoDER)(certificatePEM);
112
+ const thumbprint = (0, node_opcua_crypto_1.makeSHA1Thumbprint)($$certificateChain);
113
+ return $$certificateChain;
114
+ }
115
+ function getPrivateKeyEP() {
116
+ const $$privateKey = (0, crypto_1.createPrivateKey)(fs.readFileSync(this.certificateManager.privateKey, "utf8"));
117
+ return $$privateKey;
118
+ }
119
+ function onCertificateAboutToChange(server) {
120
+ return __awaiter(this, void 0, void 0, function* () {
121
+ debugLog(chalk.yellow(" onCertificateAboutToChange => Suspending End points"));
122
+ yield server.suspendEndPoints();
123
+ debugLog(chalk.yellow(" onCertificateAboutToChange => End points suspended"));
124
+ });
125
+ }
126
+ /**
127
+ * onCertificateChange is called when the serverConfiguration notifies
128
+ * that the server certificate and/or private key has changed.
129
+ *
130
+ * this function suspends all endpoint listeners and stop all existing channels
131
+ * then start all endpoint listener
132
+ *
133
+ * @param server
134
+ */
135
+ function onCertificateChange(server) {
136
+ return __awaiter(this, void 0, void 0, function* () {
137
+ debugLog("on CertificateChanged");
138
+ const _server = server;
139
+ _server.$$privateKey = (0, crypto_1.createPrivateKey)(fs.readFileSync(server.serverCertificateManager.privateKey, "utf8"));
140
+ const certificateFile = path.join(server.serverCertificateManager.rootDir, "own/certs/certificate.pem");
141
+ const certificatePEM = fs.readFileSync(certificateFile, "utf8");
142
+ const privateKeyFile = server.serverCertificateManager.privateKey;
143
+ const privateKey = (0, crypto_1.createPrivateKey)(fs.readFileSync(privateKeyFile, "utf8"));
144
+ // also reread the private key
145
+ _server.$$certificateChain = (0, node_opcua_crypto_1.convertPEMtoDER)(certificatePEM);
146
+ _server.$$privateKey = privateKey;
147
+ // note : $$certificate will be reconstructed on demand
148
+ _server.$$certificate = (0, node_opcua_crypto_1.split_der)(_server.$$certificateChain)[0];
149
+ setTimeout(() => __awaiter(this, void 0, void 0, function* () {
150
+ try {
151
+ debugLog(chalk.yellow(" onCertificateChange => shutting down channels"));
152
+ yield server.shutdownChannels();
153
+ debugLog(chalk.yellow(" onCertificateChange => channels shut down"));
154
+ debugLog(chalk.yellow(" onCertificateChange => resuming end points"));
155
+ yield server.resumeEndPoints();
156
+ debugLog(chalk.yellow(" onCertificateChange => end points resumed"));
157
+ debugLog(chalk.yellow("channels have been closed -> client should reconnect "));
158
+ }
159
+ catch (err) {
160
+ if (err instanceof Error) {
161
+ errorLog("Error in CertificateChanged handler ", err.message);
162
+ }
163
+ debugLog("err = ", err);
164
+ }
165
+ }), 2000);
166
+ });
167
+ }
168
+ function installPushCertificateManagementOnServer(server) {
169
+ return __awaiter(this, void 0, void 0, function* () {
170
+ if (!server.engine || !server.engine.addressSpace) {
171
+ throw new Error("Server must have a valid address space." +
172
+ "you need to call installPushCertificateManagementOnServer after server has been initialized");
173
+ }
174
+ yield install.call(server);
175
+ server.getCertificate = getCertificate;
176
+ server.getCertificateChain = getCertificateChain;
177
+ server.getPrivateKey = getPrivateKey;
178
+ for (const endpoint of server.endpoints) {
179
+ const endpointPriv = endpoint;
180
+ endpointPriv._certificateChain = null;
181
+ endpointPriv._privateKey = null;
182
+ endpoint.getCertificateChain = getCertificateChainEP;
183
+ endpoint.getPrivateKey = getPrivateKeyEP;
184
+ for (const e of endpoint.endpointDescriptions()) {
185
+ // e.serverCertificate = null;
186
+ e.__defineGetter__("serverCertificate", function () {
187
+ return endpoint.getCertificate();
188
+ });
189
+ }
190
+ }
191
+ yield (0, push_certificate_manager_helpers_1.installPushCertificateManagement)(server.engine.addressSpace, {
192
+ applicationGroup: server.serverCertificateManager,
193
+ userTokenGroup: server.userCertificateManager,
194
+ applicationUri: server.serverInfo.applicationUri || "InvalidURI"
195
+ });
196
+ const serverConfiguration = server.engine.addressSpace.rootFolder.objects.server.getChildByName("ServerConfiguration");
197
+ const serverConfigurationPriv = serverConfiguration;
198
+ (0, node_opcua_assert_1.assert)(serverConfigurationPriv.$pushCertificateManager);
199
+ serverConfigurationPriv.$pushCertificateManager.on("CertificateAboutToChange", (actionQueue) => {
200
+ actionQueue.push(() => __awaiter(this, void 0, void 0, function* () {
201
+ debugLog("CertificateAboutToChange Event received");
202
+ yield onCertificateAboutToChange(server);
203
+ debugLog("CertificateAboutToChange Event processed");
204
+ }));
205
+ });
206
+ serverConfigurationPriv.$pushCertificateManager.on("CertificateChanged", (actionQueue) => {
207
+ actionQueue.push(() => __awaiter(this, void 0, void 0, function* () {
208
+ debugLog("CertificateChanged Event received");
209
+ yield onCertificateChange(server);
210
+ debugLog("CertificateChanged Event processed");
211
+ }));
212
+ });
213
+ });
214
+ }
215
+ exports.installPushCertificateManagementOnServer = installPushCertificateManagementOnServer;
216
216
  //# sourceMappingURL=install_push_certitifate_management.js.map
@@ -1,6 +1,6 @@
1
- /**
2
- * @module node-opcua-server-configuration
3
- */
4
- import { UATrustList, UAObject, UAVariable } from "node-opcua-address-space";
5
- export declare function promoteTrustList(trustList: UATrustList): Promise<void>;
6
- export declare function installAccessRestrictionOnTrustList(trustList: UAVariable | UAObject): void;
1
+ /**
2
+ * @module node-opcua-server-configuration
3
+ */
4
+ import { UATrustList, UAObject, UAVariable } from "node-opcua-address-space";
5
+ export declare function promoteTrustList(trustList: UATrustList): Promise<void>;
6
+ export declare function installAccessRestrictionOnTrustList(trustList: UAVariable | UAObject): void;