+12
-4
@@ -381,10 +381,20 @@ // Copyright 2018 AJ ONeal. All rights reserved | ||
| Object.keys(challenge).forEach(function (key) { | ||
| auth[key] = challenge[key]; | ||
| // don't confused devs with the id url | ||
| if ('url' === key) { | ||
| //auth.uri = challenge.url; | ||
| } else { | ||
| auth[key] = challenge[key]; | ||
| } | ||
| }); | ||
| // batteries-included helpers | ||
| auth.hostname = request.identifier.value; | ||
| auth.hostname = auth.identifier.value; | ||
| // because I'm not 100% clear if the wildcard identifier does or doesn't have the leading *. in all cases | ||
| auth.altname = ACME._untame(auth.identifier.value, auth.wildcard); | ||
| auth.thumbprint = me.RSA.thumbprint(options.accountKeypair); | ||
| // keyAuthorization = token || '.' || base64url(JWK_Thumbprint(accountKey)) | ||
| auth.keyAuthorization = challenge.token + '.' + auth.thumbprint; | ||
| // conflicts with ACME challenge id url, if we ever decide to use it, but this just makes sense | ||
| // (as opposed to httpUrl or challengeUrl or uri, etc - I'd be happier to call the id url a uri) | ||
| auth.url = 'http://' + auth.identifier.value + ACME.challengePrefixes['http-01'] + '/' + auth.token; | ||
| auth.dnsHost = dnsPrefix + '.' + auth.hostname.replace('*.', ''); | ||
@@ -394,4 +404,2 @@ auth.dnsAuthorization = ACME._toWebsafeBase64( | ||
| ); | ||
| // because I'm not 100% clear if the wildcard identifier does or doesn't have the leading *. in all cases | ||
| auth.altname = ACME._untame(request.identifier.value, request.wildcard); | ||
@@ -398,0 +406,0 @@ return auth; |
+1
-1
| { | ||
| "name": "acme-v2", | ||
| "version": "1.7.5", | ||
| "version": "1.7.6", | ||
| "description": "Free SSL. A framework for building Let's Encrypt v2 clients, and other ACME v2 (draft 11) clients. Successor to le-acme-core.js", | ||
@@ -5,0 +5,0 @@ "homepage": "https://git.coolaj86.com/coolaj86/acme-v2.js", |
Network access
Supply chain riskThis module accesses the network.
Found 3 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 3 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
77857
0.53%1305
0.62%