Socket
Socket
Sign inDemoInstall

pem

Package Overview
Dependencies
Maintainers
2
Versions
56
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

pem - npm Package Compare versions

Comparing version 1.14.3 to 1.14.4

docs/docco/docco.css

8

CHANGELOG.md

@@ -0,1 +1,9 @@

## [1.14.4](https://github.com/Dexus/pem/compare/v1.14.3...v1.14.4) (2020-01-25)
### Bug Fixes
* travis.yaml ([0768ade](https://github.com/Dexus/pem/commit/0768ade631033c1bb35d0bd207d80cc87b5f1813))
* update readme and deps ([59c17d1](https://github.com/Dexus/pem/commit/59c17d15674787f3a7ef9a38c9660b9ee77e770f))
## [1.14.3](https://github.com/Dexus/pem/compare/v1.14.2...v1.14.3) (2019-09-17)

@@ -2,0 +10,0 @@

30

HISTORY.md

@@ -7,2 +7,21 @@ ### Changelog

#### [v1.14.3](https://github.com/Dexus/pem/compare/v1.14.2...v1.14.3)
> 17 September 2019
- fix readCertificateInfo for the case when cert subject is empty [`#264`](https://github.com/Dexus/pem/pull/264)
- Greenkeeper/mocha 6.1.4 [`#252`](https://github.com/Dexus/pem/pull/252)
- Chore(deps): Bump lodash from 4.17.11 to 4.17.14 [`#253`](https://github.com/Dexus/pem/pull/253)
- Update marked to the latest version 🚀 [`#249`](https://github.com/Dexus/pem/pull/249)
- Greenkeeper/eslint plugin import 2.18.0 [`#250`](https://github.com/Dexus/pem/pull/250)
- Chore(deps): Bump js-yaml from 3.12.0 to 3.13.1 [`#248`](https://github.com/Dexus/pem/pull/248)
- Chore(deps-dev): Bump marked from 0.6.0 to 0.6.1 [`#247`](https://github.com/Dexus/pem/pull/247)
- Chore(deps): Bump lodash from 4.17.5 to 4.17.11 [`#242`](https://github.com/Dexus/pem/pull/242)
- fix(package): fix #264 & remove package-lock.josn [`#264`](https://github.com/Dexus/pem/issues/264)
- Greenkeeper/mocha 6.1.4 (#252) [`#235`](https://github.com/Dexus/pem/issues/235)
- chore(package): update eslint-plugin-import to version 2.18.0 [`#237`](https://github.com/Dexus/pem/issues/237)
- chore(release): 1.14.3 [skip ci] [`97643fa`](https://github.com/Dexus/pem/commit/97643faee7897d62eeea55fef4ba9303d6305b3f)
- chore(package): update lockfile package-lock.json [`200c2b3`](https://github.com/Dexus/pem/commit/200c2b37397e65d118c62fad594220e85eaa3c98)
- Update package-lock.json [`e4051f6`](https://github.com/Dexus/pem/commit/e4051f64cadb077e95383fbd847ef73698df3119)
#### [v1.14.2](https://github.com/Dexus/pem/compare/v1.14.1...v1.14.2)

@@ -64,15 +83,8 @@

#### [v1.12.8](https://github.com/Dexus/pem/compare/v1.12.7...v1.12.8)
#### v1.12.8
> 11 September 2018
- fix(pem): allow utf8 charset in fields [`2cb97aa`](https://github.com/Dexus/pem/commit/2cb97aa4d4b9de22f6a28b8cbbe95d3310b226b0)
- chore(package): dep updates and changelog [`98a63c9`](https://github.com/Dexus/pem/commit/98a63c94b27f81984288cf5bccf5619ac8c55cf4)
- fix(pem): allow utf8 charset in fields [`2cb97aa`](https://github.com/Dexus/pem/commit/2cb97aa4d4b9de22f6a28b8cbbe95d3310b226b0)
- fix(package): dep updates and fix deprecated api [`610a403`](https://github.com/Dexus/pem/commit/610a403fef97ad6fcea0b8f6ce2d7d5160eb9f16)
#### v1.12.7
> 11 September 2018
- fix(package): fix fetchCertificate to list all infos [`#196`](https://github.com/Dexus/pem/issues/196)
- chore(release): 1.12.7 [skip ci] [`7d33439`](https://github.com/Dexus/pem/commit/7d33439f2ec68360a1e0176d4888b3cd18664c0b)

@@ -104,3 +104,3 @@ 'use strict'

if (!Array.isArray(pathBundleIN.ca)) {
pathBundleIN.ca = [ pathBundleIN.ca ]
pathBundleIN.ca = [pathBundleIN.ca]
}

@@ -165,3 +165,3 @@ pathBundleIN.ca.forEach(function (ca) {

if (!Array.isArray(pathBundleIN.ca)) {
pathBundleIN.ca = [ pathBundleIN.ca ]
pathBundleIN.ca = [pathBundleIN.ca]
}

@@ -174,4 +174,4 @@ pathBundleIN.ca.forEach(function (ca) {

var delTempPWFiles = []
helper.createPasswordFile({ 'cipher': '', 'password': password, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ 'cipher': '', 'password': password, 'passType': 'out' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: password, passType: 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: password, passType: 'out' }, params, delTempPWFiles)
openssl.spawnWrapper(params, false, function (error, code) {

@@ -208,4 +208,4 @@ function done (error) {

var delTempPWFiles = []
helper.createPasswordFile({ 'cipher': '', 'password': password, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ 'cipher': '', 'password': password, 'passType': 'out' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: password, passType: 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: password, passType: 'out' }, params, delTempPWFiles)
openssl.spawnWrapper(params, false, function (error, code) {

@@ -258,3 +258,3 @@ function done (error) {

if (!Array.isArray(pathBundleIN.ca)) {
pathBundleIN.ca = [ pathBundleIN.ca ]
pathBundleIN.ca = [pathBundleIN.ca]
}

@@ -267,4 +267,4 @@ pathBundleIN.ca.forEach(function (ca) {

var delTempPWFiles = [tmpfile]
helper.createPasswordFile({ 'cipher': '', 'password': password, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ 'cipher': '', 'password': password, 'passType': 'out' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: password, passType: 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: password, passType: 'out' }, params, delTempPWFiles)
openssl.spawnWrapper(params, false, function (error, code) {

@@ -271,0 +271,0 @@ function done (error) {

@@ -74,3 +74,3 @@ 'use strict'

module.exports.createPasswordFile = function (options, params, PasswordFileArray) {
if (!options || !options.hasOwnProperty('password') || !options.hasOwnProperty('passType') || !/^(word|in|out)$/.test(options.passType)) {
if (!options || !Object.prototype.hasOwnProperty.call(options, 'password') || !Object.prototype.hasOwnProperty.call(options, 'passType') || !/^(word|in|out)$/.test(options.passType)) {
return false

@@ -77,0 +77,0 @@ }

@@ -72,3 +72,3 @@ 'use strict'

if (options && options.cipher && (Number(helper.ciphers.indexOf(options.cipher)) !== -1) && options.password) {
helper.createPasswordFile({ 'cipher': options.cipher, 'password': options.password, 'passType': 'out' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: options.cipher, password: options.password, passType: 'out' }, params, delTempPWFiles)
}

@@ -267,3 +267,3 @@

if (options.clientKeyPassword) {
helper.createPasswordFile({ 'cipher': '', 'password': options.clientKeyPassword, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: options.clientKeyPassword, passType: 'in' }, params, delTempPWFiles)
}

@@ -400,3 +400,3 @@

if (options.serviceKeyPassword) {
helper.createPasswordFile({ 'cipher': '', 'password': options.serviceKeyPassword, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: options.serviceKeyPassword, passType: 'in' }, params, delTempPWFiles)
}

@@ -409,3 +409,3 @@ tmpfiles.push(options.serviceCertificate)

if (options.serviceKeyPassword) {
helper.createPasswordFile({ 'cipher': '', 'password': options.serviceKeyPassword, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: options.serviceKeyPassword, passType: 'in' }, params, delTempPWFiles)
}

@@ -450,3 +450,3 @@ tmpfiles.push(options.serviceKey)

if (options.clientKeyPassword) {
helper.createPasswordFile({ 'cipher': '', 'password': options.clientKeyPassword, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: options.clientKeyPassword, passType: 'in' }, params, delTempPWFiles)
}

@@ -601,3 +601,3 @@

if (password) {
helper.createPasswordFile({ 'cipher': '', 'password': password, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: password, passType: 'in' }, params, delTempPWFiles)
}

@@ -746,7 +746,7 @@

// create password file for the import "-passin"
helper.createPasswordFile({ 'cipher': options.cipher, 'password': options.clientKeyPassword, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: options.cipher, password: options.clientKeyPassword, passType: 'in' }, params, delTempPWFiles)
}
// NOTICE: The password field is needed! self if it is empty.
// create password file for the password "-password"
helper.createPasswordFile({ 'cipher': '', 'password': password, 'passType': 'word' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: password, passType: 'word' }, params, delTempPWFiles)

@@ -801,3 +801,3 @@ params.push('-in')

helper.createPasswordFile({ 'cipher': '', 'password': options.p12Password, 'passType': 'in' }, args, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: options.p12Password, passType: 'in' }, args, delTempPWFiles)

@@ -810,3 +810,3 @@ if (Buffer.isBuffer(bufferOrPath)) {

if (options.clientKeyPassword) {
helper.createPasswordFile({ 'cipher': '', 'password': options.clientKeyPassword, 'passType': 'out' }, args, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: options.clientKeyPassword, passType: 'out' }, args, delTempPWFiles)
} else {

@@ -879,3 +879,3 @@ args.push('-nodes')

if (passphrase) {
helper.createPasswordFile({ 'cipher': '', 'password': passphrase, 'passType': 'in' }, params, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: passphrase, passType: 'in' }, params, delTempPWFiles)
}

@@ -923,3 +923,3 @@

helper.createPasswordFile({ 'cipher': '', 'password': passphrase, 'passType': 'in' }, args, delTempPWFiles)
helper.createPasswordFile({ cipher: '', password: passphrase, passType: 'in' }, args, delTempPWFiles)

@@ -926,0 +926,0 @@ if (Buffer.isBuffer(bufferOrPath)) {

@@ -13,3 +13,3 @@ {

"description": "Create private keys and certificates with node.js and io.js",
"version": "1.14.3",
"version": "1.14.4",
"repository": {

@@ -44,29 +44,29 @@ "type": "git",

"os-tmpdir": "^1.0.1",
"which": "^1.3.1"
"which": "^2.0.2"
},
"devDependencies": {
"@deineagenturug/docdash": "^0.4.1",
"@semantic-release/changelog": "^3.0.0",
"@semantic-release/git": "^7.0.4",
"@semantic-release/github": "^5.0.5",
"@semantic-release/npm": "^5.0.4",
"ajv": "^6.6.1",
"auto-changelog": "^1.8.0",
"@deineagenturug/docdash": "^0.4.2",
"@semantic-release/changelog": "^3.0.6",
"@semantic-release/git": "^8.0.0",
"@semantic-release/github": "^6.0.2",
"@semantic-release/npm": "^6.0.0",
"ajv": "^6.11.0",
"auto-changelog": "^1.16.2",
"chai": "^4.1.2",
"cross-env": "^5.2.0",
"cross-env": "^7.0.0",
"dirty-chai": "^2.0.1",
"docco": "^0.8.0",
"eslint": "^5.5.0",
"eslint-config-standard": "^12.0.0",
"eslint-plugin-import": "2.18.1",
"eslint-plugin-json": "^1.2.1",
"eslint-plugin-markdown": "^1.0.0-beta.8",
"eslint-plugin-node": "^8.0.0",
"eslint": "^6.8.0",
"eslint-config-standard": "^14.1.0",
"eslint-plugin-import": "^2.20.0",
"eslint-plugin-json": "^2.0.1",
"eslint-plugin-markdown": "^1.0.1",
"eslint-plugin-node": "^11.0.0",
"eslint-plugin-promise": "^4.0.1",
"eslint-plugin-standard": "^4.0.0",
"jsdoc": "^3.5.5",
"marked": "^0.7.0",
"mocha": "^6.1.4",
"nyc": "^13.1.0",
"semantic-release": "^15.12.5",
"marked": "^0.8.0",
"mocha": "^7.0.0",
"nyc": "^15.0.0",
"semantic-release": "^16.0.3",
"travis-deploy-once": "^5.0.10"

@@ -73,0 +73,0 @@ },

@@ -6,3 +6,3 @@ pem

[![Build Status](https://secure.travis-ci.org/Dexus/pem.png)](http://travis-ci.org/Dexus/pem) [![npm version](https://badge.fury.io/js/pem.svg)](http://badge.fury.io/js/pem) [![npm downloads](https://img.shields.io/npm/dt/pem.svg)](https://www.npmjs.com/package/pem) [![pem documentation](https://img.shields.io/badge/pem-documentation-0099ff.svg?style=flat)](https://www.deineagentur.com/projects/pem) [![Greenkeeper badge](https://badges.greenkeeper.io/Dexus/pem.svg)](https://greenkeeper.io/)
[![Build Status](https://secure.travis-ci.org/Dexus/pem.png)](http://travis-ci.org/Dexus/pem) [![npm version](https://badge.fury.io/js/pem.svg)](http://badge.fury.io/js/pem) [![npm downloads](https://img.shields.io/npm/dt/pem.svg)](https://www.npmjs.com/package/pem) [![pem documentation](https://img.shields.io/badge/pem-documentation-0099ff.svg?style=flat)](https://dexus.github.io/pem/jsdoc/) [![Greenkeeper badge](https://badges.greenkeeper.io/Dexus/pem.svg)](https://greenkeeper.io/)

@@ -58,3 +58,3 @@

## API
Please have a look into the [API documentation](https://www.deineagentur.com/projects/pem/index.html).
Please have a look into the [API documentation](https://dexus.github.io/pem/jsdoc/).

@@ -61,0 +61,0 @@ _we had to clean up a bit_

@@ -507,27 +507,27 @@ 'use strict'

hlp.checkCertificateData(data, {
'commonName': 'Описание сайта',
'country': 'RU',
'dc': '',
'emailAddress': 'envek@envek.name',
'issuer': {
'commonName': 'Описание сайта',
'country': 'RU',
'dc': '',
'locality': 'Москва',
'organization': 'Моя компания',
'organizationUnit': 'Моё подразделение',
'state': ''
commonName: 'Описание сайта',
country: 'RU',
dc: '',
emailAddress: 'envek@envek.name',
issuer: {
commonName: 'Описание сайта',
country: 'RU',
dc: '',
locality: 'Москва',
organization: 'Моя компания',
organizationUnit: 'Моё подразделение',
state: ''
},
'locality': 'Москва',
'organization': 'Моя компания',
'organizationUnit': 'Моё подразделение',
'san': {
'dns': [
locality: 'Москва',
organization: 'Моя компания',
organizationUnit: 'Моё подразделение',
san: {
dns: [
'example.com',
'*.example.com'
],
'email': [],
'ip': []
email: [],
ip: []
},
'state': ''
state: ''
})

@@ -534,0 +534,0 @@ hlp.checkTmpEmpty()

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc