Socket
Socket
Sign inDemoInstall

residue

Package Overview
Dependencies
2
Maintainers
1
Versions
94
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

Comparing version 2.0.1 to 2.1.0

3

CHANGELOG.md
# Change Log
## [2.1.0]
- Private key uses hex
## [2.0.1]

@@ -4,0 +7,0 @@ - Compatibility with server 2.0.0

2

package.json
{
"name": "residue",
"version": "2.0.1",
"version": "2.1.0",
"description": "Library to interact with residue server seamlessly.",

@@ -5,0 +5,0 @@ "main": "src/residue.js",

@@ -32,7 +32,2 @@

url: "<host_where_residue_server_is_listening>:<residue_connection_port>",
access_codes: [
{
... logger_id and code
}
],
application_id: <app_name [optional]>,

@@ -45,3 +40,3 @@ rsa_key_size: <key_size_for_initial_final_key_transmission [optional]>,

client_public_key: <full_path_of_public_key> [must be provided with client_id],
client_key_secret: <secret (passphrase) for encrypted private key if any>,
client_key_secret: <base16 encoded secret (passphrase) for encrypted private key if any>,
server_public_key: <full_path_of_server_public_key>

@@ -71,2 +66,7 @@ }

// ALTERNATIVELY
residue.connect({
url: ...
});
logger.info('simple log');

@@ -73,0 +73,0 @@

@@ -541,3 +541,4 @@ //

key: fs.readFileSync(path.resolve(Params.options.client_private_key)).toString(),
passphrase: Params.options.client_key_secret || null,
passphrase: Params.options.client_key_secret
? new Buffer(Params.options.client_key_secret, 'hex').toString('utf-8') : null,
padding: crypto.constants.RSA_PKCS1_PADDING,

@@ -544,0 +545,0 @@ },

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc