@simplewebauthn/server
Advanced tools
Comparing version 0.10.3 to 0.10.4
/// <reference types="node" /> | ||
import type { PublicKeyCredentialRequestOptionsJSON, PublicKeyCredentialDescriptorJSON } from '@simplewebauthn/typescript-types'; | ||
import type { AuthenticationExtensionsClientInputs, PublicKeyCredentialRequestOptionsJSON, PublicKeyCredentialDescriptorJSON, UserVerificationRequirement } from '@simplewebauthn/typescript-types'; | ||
declare type Options = { | ||
@@ -4,0 +4,0 @@ allowCredentials: PublicKeyCredentialDescriptorJSON[]; |
@@ -1,2 +0,2 @@ | ||
import { AssertionCredentialJSON, AuthenticatorDevice } from '@simplewebauthn/typescript-types'; | ||
import { AssertionCredentialJSON, AuthenticatorDevice, UserVerificationRequirement } from '@simplewebauthn/typescript-types'; | ||
declare type Options = { | ||
@@ -3,0 +3,0 @@ credential: AssertionCredentialJSON; |
/// <reference types="node" /> | ||
import type { PublicKeyCredentialCreationOptionsJSON, PublicKeyCredentialDescriptorJSON } from '@simplewebauthn/typescript-types'; | ||
import type { AttestationConveyancePreference, AuthenticationExtensionsClientInputs, AuthenticatorSelectionCriteria, COSEAlgorithmIdentifier, PublicKeyCredentialCreationOptionsJSON, PublicKeyCredentialDescriptorJSON } from '@simplewebauthn/typescript-types'; | ||
declare type Options = { | ||
@@ -4,0 +4,0 @@ rpName: string; |
@@ -17,3 +17,3 @@ "use strict"; | ||
var result = {}; | ||
if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); | ||
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); | ||
__setModuleDefault(result, mod); | ||
@@ -20,0 +20,0 @@ return result; |
@@ -17,3 +17,3 @@ "use strict"; | ||
var result = {}; | ||
if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); | ||
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); | ||
__setModuleDefault(result, mod); | ||
@@ -20,0 +20,0 @@ return result; |
@@ -1,2 +0,2 @@ | ||
import { AttestationCredentialJSON } from '@simplewebauthn/typescript-types'; | ||
import { AttestationCredentialJSON, COSEAlgorithmIdentifier } from '@simplewebauthn/typescript-types'; | ||
import { ATTESTATION_FORMATS } from "../helpers/decodeAttestationObject"; | ||
@@ -3,0 +3,0 @@ declare type Options = { |
@@ -17,3 +17,3 @@ "use strict"; | ||
var result = {}; | ||
if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); | ||
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); | ||
__setModuleDefault(result, mod); | ||
@@ -20,0 +20,0 @@ return result; |
/// <reference types="node" /> | ||
import type { SigningSchemeHash } from 'node-rsa'; | ||
import { COSEAlgorithmIdentifier } from '@simplewebauthn/typescript-types'; | ||
/** | ||
@@ -4,0 +5,0 @@ * Takes COSE-encoded public key and converts it to PKCS key |
"use strict"; | ||
var __importDefault = (this && this.__importDefault) || function (mod) { | ||
return (mod && mod.__esModule) ? mod : { "default": mod }; | ||
}; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.COSEALGHASH = exports.COSECRV = exports.COSERSASCHEME = exports.COSEKTY = exports.COSEKEYS = void 0; | ||
const cbor_1 = __importDefault(require("cbor")); | ||
const decodeCbor_1 = require("./decodeCbor"); | ||
/** | ||
@@ -12,3 +9,3 @@ * Takes COSE-encoded public key and converts it to PKCS key | ||
function convertCOSEtoPKCS(cosePublicKey) { | ||
const struct = cbor_1.default.decodeFirstSync(cosePublicKey); | ||
const struct = decodeCbor_1.decodeCborFirst(cosePublicKey); | ||
const tag = Buffer.from([0x04]); | ||
@@ -15,0 +12,0 @@ const x = struct.get(COSEKEYS.x); |
"use strict"; | ||
var __importDefault = (this && this.__importDefault) || function (mod) { | ||
return (mod && mod.__esModule) ? mod : { "default": mod }; | ||
}; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
const cbor_1 = __importDefault(require("cbor")); | ||
const decodeCbor_1 = require("./decodeCbor"); | ||
function decodeCredentialPublicKey(publicKey) { | ||
return cbor_1.default.decodeFirstSync(publicKey); | ||
return decodeCbor_1.decodeCborFirst(publicKey); | ||
} | ||
exports.default = decodeCredentialPublicKey; | ||
//# sourceMappingURL=decodeCredentialPublicKey.js.map |
@@ -28,3 +28,3 @@ "use strict"; | ||
if (certAuthKeyID) { | ||
const cached = cacheRevokedCerts[certAuthKeyID.kid]; | ||
const cached = cacheRevokedCerts[certAuthKeyID.kid.hex]; | ||
if (cached) { | ||
@@ -78,3 +78,3 @@ const now = new Date(); | ||
if (certAuthKeyID) { | ||
cacheRevokedCerts[certAuthKeyID.kid] = newCached; | ||
cacheRevokedCerts[certAuthKeyID.kid.hex] = newCached; | ||
} | ||
@@ -81,0 +81,0 @@ return newCached.revokedCerts.indexOf(certSerialHex) >= 0; |
@@ -7,2 +7,3 @@ "use strict"; | ||
const cbor_1 = __importDefault(require("cbor")); | ||
const decodeCbor_1 = require("./decodeCbor"); | ||
/** | ||
@@ -43,3 +44,3 @@ * Make sense of the authData buffer contained in an Attestation | ||
// Decode the next CBOR item in the buffer, then re-encode it back to a Buffer | ||
const firstDecoded = cbor_1.default.decodeFirstSync(intBuffer); | ||
const firstDecoded = decodeCbor_1.decodeCborFirst(intBuffer); | ||
const firstEncoded = Buffer.from(cbor_1.default.encode(firstDecoded)); | ||
@@ -51,3 +52,3 @@ credentialPublicKey = firstEncoded; | ||
if (flags.ed) { | ||
const firstDecoded = cbor_1.default.decodeFirstSync(intBuffer); | ||
const firstDecoded = decodeCbor_1.decodeCborFirst(intBuffer); | ||
const firstEncoded = Buffer.from(cbor_1.default.encode(firstDecoded)); | ||
@@ -54,0 +55,0 @@ extensionsDataBuffer = firstEncoded; |
/** | ||
* @packageDocumentation | ||
* @module @simplewebauthn/server | ||
* @preferred | ||
*/ | ||
@@ -6,0 +5,0 @@ import generateAttestationOptions from "./attestation/generateAttestationOptions"; |
@@ -10,3 +10,2 @@ "use strict"; | ||
* @module @simplewebauthn/server | ||
* @preferred | ||
*/ | ||
@@ -13,0 +12,0 @@ const generateAttestationOptions_1 = __importDefault(require("./attestation/generateAttestationOptions")); |
{ | ||
"name": "@simplewebauthn/server", | ||
"version": "0.10.3", | ||
"version": "0.10.4", | ||
"description": "SimpleWebAuthn for Servers", | ||
@@ -35,19 +35,19 @@ "main": "dist/index.js", | ||
"dependencies": { | ||
"@peculiar/asn1-android": "2.0.23", | ||
"@peculiar/asn1-schema": "2.0.23", | ||
"@peculiar/asn1-x509": "2.0.23", | ||
"@simplewebauthn/typescript-types": "^0.10.0", | ||
"base64url": "3.0.1", | ||
"cbor": "5.0.2", | ||
"elliptic": "6.5.3", | ||
"jsrsasign": "8.0.20", | ||
"jwk-to-pem": "2.0.4", | ||
"node-fetch": "2.6.0", | ||
"node-rsa": "1.1.1" | ||
"@peculiar/asn1-android": "^2.0.26", | ||
"@peculiar/asn1-schema": "^2.0.26", | ||
"@peculiar/asn1-x509": "^2.0.26", | ||
"@simplewebauthn/typescript-types": "^0.10.4", | ||
"base64url": "^3.0.1", | ||
"cbor": "^5.1.0", | ||
"elliptic": "^6.5.3", | ||
"jsrsasign": "^10.0.5", | ||
"jwk-to-pem": "^2.0.4", | ||
"node-fetch": "^2.6.0", | ||
"node-rsa": "^1.1.1" | ||
}, | ||
"gitHead": "c7859df0c5d29931a35c3e7b7345f91ae55c3dcf", | ||
"gitHead": "9a360ddfe82a5dbe1bc2201aeb68139a95612b5e", | ||
"devDependencies": { | ||
"@types/cbor": "^5.0.1", | ||
"@types/elliptic": "^6.4.12", | ||
"@types/jsrsasign": "^8.0.5", | ||
"@types/jsrsasign": "^8.0.8", | ||
"@types/jwk-to-pem": "^2.0.0", | ||
@@ -54,0 +54,0 @@ "@types/node-fetch": "^2.5.7", |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
198415
106
3118
+ Added@peculiar/asn1-android@2.3.13(transitive)
+ Added@peculiar/asn1-schema@2.3.13(transitive)
+ Added@peculiar/asn1-x509@2.3.13(transitive)
+ Addedasn1js@3.0.5(transitive)
+ Addedcbor@5.2.0(transitive)
+ Addedelliptic@6.6.1(transitive)
+ Addedjsrsasign@10.9.0(transitive)
+ Addedjwk-to-pem@2.0.6(transitive)
+ Addednode-fetch@2.7.0(transitive)
+ Addedtr46@0.0.3(transitive)
+ Addedwebidl-conversions@3.0.1(transitive)
+ Addedwhatwg-url@5.0.0(transitive)
- Removed@peculiar/asn1-android@2.0.23(transitive)
- Removed@peculiar/asn1-schema@2.0.23(transitive)
- Removed@peculiar/asn1-x509@2.0.23(transitive)
- Removed@types/asn1js@0.0.2(transitive)
- Removed@types/pvutils@1.0.4(transitive)
- Removedasn1js@2.4.0(transitive)
- Removedcbor@5.0.2(transitive)
- Removedelliptic@6.5.3(transitive)
- Removedjsrsasign@8.0.20(transitive)
- Removedjwk-to-pem@2.0.4(transitive)
- Removednode-fetch@2.6.0(transitive)
Updated@peculiar/asn1-x509@^2.0.26
Updatedbase64url@^3.0.1
Updatedcbor@^5.1.0
Updatedelliptic@^6.5.3
Updatedjsrsasign@^10.0.5
Updatedjwk-to-pem@^2.0.4
Updatednode-fetch@^2.6.0
Updatednode-rsa@^1.1.1