update
This commit is contained in:
202
package/node_modules/@sigstore/protobuf-specs/LICENSE
generated
vendored
Normal file
202
package/node_modules/@sigstore/protobuf-specs/LICENSE
generated
vendored
Normal file
@@ -0,0 +1,202 @@
|
||||
|
||||
Apache License
|
||||
Version 2.0, January 2004
|
||||
http://www.apache.org/licenses/
|
||||
|
||||
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||
|
||||
1. Definitions.
|
||||
|
||||
"License" shall mean the terms and conditions for use, reproduction,
|
||||
and distribution as defined by Sections 1 through 9 of this document.
|
||||
|
||||
"Licensor" shall mean the copyright owner or entity authorized by
|
||||
the copyright owner that is granting the License.
|
||||
|
||||
"Legal Entity" shall mean the union of the acting entity and all
|
||||
other entities that control, are controlled by, or are under common
|
||||
control with that entity. For the purposes of this definition,
|
||||
"control" means (i) the power, direct or indirect, to cause the
|
||||
direction or management of such entity, whether by contract or
|
||||
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||
|
||||
"You" (or "Your") shall mean an individual or Legal Entity
|
||||
exercising permissions granted by this License.
|
||||
|
||||
"Source" form shall mean the preferred form for making modifications,
|
||||
including but not limited to software source code, documentation
|
||||
source, and configuration files.
|
||||
|
||||
"Object" form shall mean any form resulting from mechanical
|
||||
transformation or translation of a Source form, including but
|
||||
not limited to compiled object code, generated documentation,
|
||||
and conversions to other media types.
|
||||
|
||||
"Work" shall mean the work of authorship, whether in Source or
|
||||
Object form, made available under the License, as indicated by a
|
||||
copyright notice that is included in or attached to the work
|
||||
(an example is provided in the Appendix below).
|
||||
|
||||
"Derivative Works" shall mean any work, whether in Source or Object
|
||||
form, that is based on (or derived from) the Work and for which the
|
||||
editorial revisions, annotations, elaborations, or other modifications
|
||||
represent, as a whole, an original work of authorship. For the purposes
|
||||
of this License, Derivative Works shall not include works that remain
|
||||
separable from, or merely link (or bind by name) to the interfaces of,
|
||||
the Work and Derivative Works thereof.
|
||||
|
||||
"Contribution" shall mean any work of authorship, including
|
||||
the original version of the Work and any modifications or additions
|
||||
to that Work or Derivative Works thereof, that is intentionally
|
||||
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||
or by an individual or Legal Entity authorized to submit on behalf of
|
||||
the copyright owner. For the purposes of this definition, "submitted"
|
||||
means any form of electronic, verbal, or written communication sent
|
||||
to the Licensor or its representatives, including but not limited to
|
||||
communication on electronic mailing lists, source code control systems,
|
||||
and issue tracking systems that are managed by, or on behalf of, the
|
||||
Licensor for the purpose of discussing and improving the Work, but
|
||||
excluding communication that is conspicuously marked or otherwise
|
||||
designated in writing by the copyright owner as "Not a Contribution."
|
||||
|
||||
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||
on behalf of whom a Contribution has been received by Licensor and
|
||||
subsequently incorporated within the Work.
|
||||
|
||||
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||
this License, each Contributor hereby grants to You a perpetual,
|
||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||
copyright license to reproduce, prepare Derivative Works of,
|
||||
publicly display, publicly perform, sublicense, and distribute the
|
||||
Work and such Derivative Works in Source or Object form.
|
||||
|
||||
3. Grant of Patent License. Subject to the terms and conditions of
|
||||
this License, each Contributor hereby grants to You a perpetual,
|
||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||
(except as stated in this section) patent license to make, have made,
|
||||
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||
where such license applies only to those patent claims licensable
|
||||
by such Contributor that are necessarily infringed by their
|
||||
Contribution(s) alone or by combination of their Contribution(s)
|
||||
with the Work to which such Contribution(s) was submitted. If You
|
||||
institute patent litigation against any entity (including a
|
||||
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||
or a Contribution incorporated within the Work constitutes direct
|
||||
or contributory patent infringement, then any patent licenses
|
||||
granted to You under this License for that Work shall terminate
|
||||
as of the date such litigation is filed.
|
||||
|
||||
4. Redistribution. You may reproduce and distribute copies of the
|
||||
Work or Derivative Works thereof in any medium, with or without
|
||||
modifications, and in Source or Object form, provided that You
|
||||
meet the following conditions:
|
||||
|
||||
(a) You must give any other recipients of the Work or
|
||||
Derivative Works a copy of this License; and
|
||||
|
||||
(b) You must cause any modified files to carry prominent notices
|
||||
stating that You changed the files; and
|
||||
|
||||
(c) You must retain, in the Source form of any Derivative Works
|
||||
that You distribute, all copyright, patent, trademark, and
|
||||
attribution notices from the Source form of the Work,
|
||||
excluding those notices that do not pertain to any part of
|
||||
the Derivative Works; and
|
||||
|
||||
(d) If the Work includes a "NOTICE" text file as part of its
|
||||
distribution, then any Derivative Works that You distribute must
|
||||
include a readable copy of the attribution notices contained
|
||||
within such NOTICE file, excluding those notices that do not
|
||||
pertain to any part of the Derivative Works, in at least one
|
||||
of the following places: within a NOTICE text file distributed
|
||||
as part of the Derivative Works; within the Source form or
|
||||
documentation, if provided along with the Derivative Works; or,
|
||||
within a display generated by the Derivative Works, if and
|
||||
wherever such third-party notices normally appear. The contents
|
||||
of the NOTICE file are for informational purposes only and
|
||||
do not modify the License. You may add Your own attribution
|
||||
notices within Derivative Works that You distribute, alongside
|
||||
or as an addendum to the NOTICE text from the Work, provided
|
||||
that such additional attribution notices cannot be construed
|
||||
as modifying the License.
|
||||
|
||||
You may add Your own copyright statement to Your modifications and
|
||||
may provide additional or different license terms and conditions
|
||||
for use, reproduction, or distribution of Your modifications, or
|
||||
for any such Derivative Works as a whole, provided Your use,
|
||||
reproduction, and distribution of the Work otherwise complies with
|
||||
the conditions stated in this License.
|
||||
|
||||
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||
any Contribution intentionally submitted for inclusion in the Work
|
||||
by You to the Licensor shall be under the terms and conditions of
|
||||
this License, without any additional terms or conditions.
|
||||
Notwithstanding the above, nothing herein shall supersede or modify
|
||||
the terms of any separate license agreement you may have executed
|
||||
with Licensor regarding such Contributions.
|
||||
|
||||
6. Trademarks. This License does not grant permission to use the trade
|
||||
names, trademarks, service marks, or product names of the Licensor,
|
||||
except as required for reasonable and customary use in describing the
|
||||
origin of the Work and reproducing the content of the NOTICE file.
|
||||
|
||||
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||
agreed to in writing, Licensor provides the Work (and each
|
||||
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||
implied, including, without limitation, any warranties or conditions
|
||||
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||
appropriateness of using or redistributing the Work and assume any
|
||||
risks associated with Your exercise of permissions under this License.
|
||||
|
||||
8. Limitation of Liability. In no event and under no legal theory,
|
||||
whether in tort (including negligence), contract, or otherwise,
|
||||
unless required by applicable law (such as deliberate and grossly
|
||||
negligent acts) or agreed to in writing, shall any Contributor be
|
||||
liable to You for damages, including any direct, indirect, special,
|
||||
incidental, or consequential damages of any character arising as a
|
||||
result of this License or out of the use or inability to use the
|
||||
Work (including but not limited to damages for loss of goodwill,
|
||||
work stoppage, computer failure or malfunction, or any and all
|
||||
other commercial damages or losses), even if such Contributor
|
||||
has been advised of the possibility of such damages.
|
||||
|
||||
9. Accepting Warranty or Additional Liability. While redistributing
|
||||
the Work or Derivative Works thereof, You may choose to offer,
|
||||
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||
or other liability obligations and/or rights consistent with this
|
||||
License. However, in accepting such obligations, You may act only
|
||||
on Your own behalf and on Your sole responsibility, not on behalf
|
||||
of any other Contributor, and only if You agree to indemnify,
|
||||
defend, and hold each Contributor harmless for any liability
|
||||
incurred by, or claims asserted against, such Contributor by reason
|
||||
of your accepting any such warranty or additional liability.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
APPENDIX: How to apply the Apache License to your work.
|
||||
|
||||
To apply the Apache License to your work, attach the following
|
||||
boilerplate notice, with the fields enclosed by brackets "[]"
|
||||
replaced with your own identifying information. (Don't include
|
||||
the brackets!) The text should be enclosed in the appropriate
|
||||
comment syntax for the file format. We also recommend that a
|
||||
file or class name and description of purpose be included on the
|
||||
same "printed page" as the copyright notice for easier
|
||||
identification within third-party archives.
|
||||
|
||||
Copyright 2023 The Sigstore Authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
89
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/envelope.js
generated
vendored
Normal file
89
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/envelope.js
generated
vendored
Normal file
@@ -0,0 +1,89 @@
|
||||
"use strict";
|
||||
/* eslint-disable */
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.Signature = exports.Envelope = void 0;
|
||||
function createBaseEnvelope() {
|
||||
return { payload: Buffer.alloc(0), payloadType: "", signatures: [] };
|
||||
}
|
||||
exports.Envelope = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
payload: isSet(object.payload) ? Buffer.from(bytesFromBase64(object.payload)) : Buffer.alloc(0),
|
||||
payloadType: isSet(object.payloadType) ? String(object.payloadType) : "",
|
||||
signatures: Array.isArray(object?.signatures) ? object.signatures.map((e) => exports.Signature.fromJSON(e)) : [],
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.payload !== undefined &&
|
||||
(obj.payload = base64FromBytes(message.payload !== undefined ? message.payload : Buffer.alloc(0)));
|
||||
message.payloadType !== undefined && (obj.payloadType = message.payloadType);
|
||||
if (message.signatures) {
|
||||
obj.signatures = message.signatures.map((e) => e ? exports.Signature.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.signatures = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseSignature() {
|
||||
return { sig: Buffer.alloc(0), keyid: "" };
|
||||
}
|
||||
exports.Signature = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
sig: isSet(object.sig) ? Buffer.from(bytesFromBase64(object.sig)) : Buffer.alloc(0),
|
||||
keyid: isSet(object.keyid) ? String(object.keyid) : "",
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.sig !== undefined && (obj.sig = base64FromBytes(message.sig !== undefined ? message.sig : Buffer.alloc(0)));
|
||||
message.keyid !== undefined && (obj.keyid = message.keyid);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
var tsProtoGlobalThis = (() => {
|
||||
if (typeof globalThis !== "undefined") {
|
||||
return globalThis;
|
||||
}
|
||||
if (typeof self !== "undefined") {
|
||||
return self;
|
||||
}
|
||||
if (typeof window !== "undefined") {
|
||||
return window;
|
||||
}
|
||||
if (typeof global !== "undefined") {
|
||||
return global;
|
||||
}
|
||||
throw "Unable to locate global object";
|
||||
})();
|
||||
function bytesFromBase64(b64) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return Uint8Array.from(tsProtoGlobalThis.Buffer.from(b64, "base64"));
|
||||
}
|
||||
else {
|
||||
const bin = tsProtoGlobalThis.atob(b64);
|
||||
const arr = new Uint8Array(bin.length);
|
||||
for (let i = 0; i < bin.length; ++i) {
|
||||
arr[i] = bin.charCodeAt(i);
|
||||
}
|
||||
return arr;
|
||||
}
|
||||
}
|
||||
function base64FromBytes(arr) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return tsProtoGlobalThis.Buffer.from(arr).toString("base64");
|
||||
}
|
||||
else {
|
||||
const bin = [];
|
||||
arr.forEach((byte) => {
|
||||
bin.push(String.fromCharCode(byte));
|
||||
});
|
||||
return tsProtoGlobalThis.btoa(bin.join(""));
|
||||
}
|
||||
}
|
||||
function isSet(value) {
|
||||
return value !== null && value !== undefined;
|
||||
}
|
||||
185
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/events.js
generated
vendored
Normal file
185
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/events.js
generated
vendored
Normal file
@@ -0,0 +1,185 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.CloudEventBatch = exports.CloudEvent_CloudEventAttributeValue = exports.CloudEvent_AttributesEntry = exports.CloudEvent = void 0;
|
||||
/* eslint-disable */
|
||||
const any_1 = require("./google/protobuf/any");
|
||||
const timestamp_1 = require("./google/protobuf/timestamp");
|
||||
function createBaseCloudEvent() {
|
||||
return { id: "", source: "", specVersion: "", type: "", attributes: {}, data: undefined };
|
||||
}
|
||||
exports.CloudEvent = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
id: isSet(object.id) ? String(object.id) : "",
|
||||
source: isSet(object.source) ? String(object.source) : "",
|
||||
specVersion: isSet(object.specVersion) ? String(object.specVersion) : "",
|
||||
type: isSet(object.type) ? String(object.type) : "",
|
||||
attributes: isObject(object.attributes)
|
||||
? Object.entries(object.attributes).reduce((acc, [key, value]) => {
|
||||
acc[key] = exports.CloudEvent_CloudEventAttributeValue.fromJSON(value);
|
||||
return acc;
|
||||
}, {})
|
||||
: {},
|
||||
data: isSet(object.binaryData)
|
||||
? { $case: "binaryData", binaryData: Buffer.from(bytesFromBase64(object.binaryData)) }
|
||||
: isSet(object.textData)
|
||||
? { $case: "textData", textData: String(object.textData) }
|
||||
: isSet(object.protoData)
|
||||
? { $case: "protoData", protoData: any_1.Any.fromJSON(object.protoData) }
|
||||
: undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.id !== undefined && (obj.id = message.id);
|
||||
message.source !== undefined && (obj.source = message.source);
|
||||
message.specVersion !== undefined && (obj.specVersion = message.specVersion);
|
||||
message.type !== undefined && (obj.type = message.type);
|
||||
obj.attributes = {};
|
||||
if (message.attributes) {
|
||||
Object.entries(message.attributes).forEach(([k, v]) => {
|
||||
obj.attributes[k] = exports.CloudEvent_CloudEventAttributeValue.toJSON(v);
|
||||
});
|
||||
}
|
||||
message.data?.$case === "binaryData" &&
|
||||
(obj.binaryData = message.data?.binaryData !== undefined ? base64FromBytes(message.data?.binaryData) : undefined);
|
||||
message.data?.$case === "textData" && (obj.textData = message.data?.textData);
|
||||
message.data?.$case === "protoData" &&
|
||||
(obj.protoData = message.data?.protoData ? any_1.Any.toJSON(message.data?.protoData) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseCloudEvent_AttributesEntry() {
|
||||
return { key: "", value: undefined };
|
||||
}
|
||||
exports.CloudEvent_AttributesEntry = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
key: isSet(object.key) ? String(object.key) : "",
|
||||
value: isSet(object.value) ? exports.CloudEvent_CloudEventAttributeValue.fromJSON(object.value) : undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.key !== undefined && (obj.key = message.key);
|
||||
message.value !== undefined &&
|
||||
(obj.value = message.value ? exports.CloudEvent_CloudEventAttributeValue.toJSON(message.value) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseCloudEvent_CloudEventAttributeValue() {
|
||||
return { attr: undefined };
|
||||
}
|
||||
exports.CloudEvent_CloudEventAttributeValue = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
attr: isSet(object.ceBoolean)
|
||||
? { $case: "ceBoolean", ceBoolean: Boolean(object.ceBoolean) }
|
||||
: isSet(object.ceInteger)
|
||||
? { $case: "ceInteger", ceInteger: Number(object.ceInteger) }
|
||||
: isSet(object.ceString)
|
||||
? { $case: "ceString", ceString: String(object.ceString) }
|
||||
: isSet(object.ceBytes)
|
||||
? { $case: "ceBytes", ceBytes: Buffer.from(bytesFromBase64(object.ceBytes)) }
|
||||
: isSet(object.ceUri)
|
||||
? { $case: "ceUri", ceUri: String(object.ceUri) }
|
||||
: isSet(object.ceUriRef)
|
||||
? { $case: "ceUriRef", ceUriRef: String(object.ceUriRef) }
|
||||
: isSet(object.ceTimestamp)
|
||||
? { $case: "ceTimestamp", ceTimestamp: fromJsonTimestamp(object.ceTimestamp) }
|
||||
: undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.attr?.$case === "ceBoolean" && (obj.ceBoolean = message.attr?.ceBoolean);
|
||||
message.attr?.$case === "ceInteger" && (obj.ceInteger = Math.round(message.attr?.ceInteger));
|
||||
message.attr?.$case === "ceString" && (obj.ceString = message.attr?.ceString);
|
||||
message.attr?.$case === "ceBytes" &&
|
||||
(obj.ceBytes = message.attr?.ceBytes !== undefined ? base64FromBytes(message.attr?.ceBytes) : undefined);
|
||||
message.attr?.$case === "ceUri" && (obj.ceUri = message.attr?.ceUri);
|
||||
message.attr?.$case === "ceUriRef" && (obj.ceUriRef = message.attr?.ceUriRef);
|
||||
message.attr?.$case === "ceTimestamp" && (obj.ceTimestamp = message.attr?.ceTimestamp.toISOString());
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseCloudEventBatch() {
|
||||
return { events: [] };
|
||||
}
|
||||
exports.CloudEventBatch = {
|
||||
fromJSON(object) {
|
||||
return { events: Array.isArray(object?.events) ? object.events.map((e) => exports.CloudEvent.fromJSON(e)) : [] };
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
if (message.events) {
|
||||
obj.events = message.events.map((e) => e ? exports.CloudEvent.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.events = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
var tsProtoGlobalThis = (() => {
|
||||
if (typeof globalThis !== "undefined") {
|
||||
return globalThis;
|
||||
}
|
||||
if (typeof self !== "undefined") {
|
||||
return self;
|
||||
}
|
||||
if (typeof window !== "undefined") {
|
||||
return window;
|
||||
}
|
||||
if (typeof global !== "undefined") {
|
||||
return global;
|
||||
}
|
||||
throw "Unable to locate global object";
|
||||
})();
|
||||
function bytesFromBase64(b64) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return Uint8Array.from(tsProtoGlobalThis.Buffer.from(b64, "base64"));
|
||||
}
|
||||
else {
|
||||
const bin = tsProtoGlobalThis.atob(b64);
|
||||
const arr = new Uint8Array(bin.length);
|
||||
for (let i = 0; i < bin.length; ++i) {
|
||||
arr[i] = bin.charCodeAt(i);
|
||||
}
|
||||
return arr;
|
||||
}
|
||||
}
|
||||
function base64FromBytes(arr) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return tsProtoGlobalThis.Buffer.from(arr).toString("base64");
|
||||
}
|
||||
else {
|
||||
const bin = [];
|
||||
arr.forEach((byte) => {
|
||||
bin.push(String.fromCharCode(byte));
|
||||
});
|
||||
return tsProtoGlobalThis.btoa(bin.join(""));
|
||||
}
|
||||
}
|
||||
function fromTimestamp(t) {
|
||||
let millis = Number(t.seconds) * 1000;
|
||||
millis += t.nanos / 1000000;
|
||||
return new Date(millis);
|
||||
}
|
||||
function fromJsonTimestamp(o) {
|
||||
if (o instanceof Date) {
|
||||
return o;
|
||||
}
|
||||
else if (typeof o === "string") {
|
||||
return new Date(o);
|
||||
}
|
||||
else {
|
||||
return fromTimestamp(timestamp_1.Timestamp.fromJSON(o));
|
||||
}
|
||||
}
|
||||
function isObject(value) {
|
||||
return typeof value === "object" && value !== null;
|
||||
}
|
||||
function isSet(value) {
|
||||
return value !== null && value !== undefined;
|
||||
}
|
||||
119
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/google/api/field_behavior.js
generated
vendored
Normal file
119
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/google/api/field_behavior.js
generated
vendored
Normal file
@@ -0,0 +1,119 @@
|
||||
"use strict";
|
||||
/* eslint-disable */
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fieldBehaviorToJSON = exports.fieldBehaviorFromJSON = exports.FieldBehavior = void 0;
|
||||
/**
|
||||
* An indicator of the behavior of a given field (for example, that a field
|
||||
* is required in requests, or given as output but ignored as input).
|
||||
* This **does not** change the behavior in protocol buffers itself; it only
|
||||
* denotes the behavior and may affect how API tooling handles the field.
|
||||
*
|
||||
* Note: This enum **may** receive new values in the future.
|
||||
*/
|
||||
var FieldBehavior;
|
||||
(function (FieldBehavior) {
|
||||
/** FIELD_BEHAVIOR_UNSPECIFIED - Conventional default for enums. Do not use this. */
|
||||
FieldBehavior[FieldBehavior["FIELD_BEHAVIOR_UNSPECIFIED"] = 0] = "FIELD_BEHAVIOR_UNSPECIFIED";
|
||||
/**
|
||||
* OPTIONAL - Specifically denotes a field as optional.
|
||||
* While all fields in protocol buffers are optional, this may be specified
|
||||
* for emphasis if appropriate.
|
||||
*/
|
||||
FieldBehavior[FieldBehavior["OPTIONAL"] = 1] = "OPTIONAL";
|
||||
/**
|
||||
* REQUIRED - Denotes a field as required.
|
||||
* This indicates that the field **must** be provided as part of the request,
|
||||
* and failure to do so will cause an error (usually `INVALID_ARGUMENT`).
|
||||
*/
|
||||
FieldBehavior[FieldBehavior["REQUIRED"] = 2] = "REQUIRED";
|
||||
/**
|
||||
* OUTPUT_ONLY - Denotes a field as output only.
|
||||
* This indicates that the field is provided in responses, but including the
|
||||
* field in a request does nothing (the server *must* ignore it and
|
||||
* *must not* throw an error as a result of the field's presence).
|
||||
*/
|
||||
FieldBehavior[FieldBehavior["OUTPUT_ONLY"] = 3] = "OUTPUT_ONLY";
|
||||
/**
|
||||
* INPUT_ONLY - Denotes a field as input only.
|
||||
* This indicates that the field is provided in requests, and the
|
||||
* corresponding field is not included in output.
|
||||
*/
|
||||
FieldBehavior[FieldBehavior["INPUT_ONLY"] = 4] = "INPUT_ONLY";
|
||||
/**
|
||||
* IMMUTABLE - Denotes a field as immutable.
|
||||
* This indicates that the field may be set once in a request to create a
|
||||
* resource, but may not be changed thereafter.
|
||||
*/
|
||||
FieldBehavior[FieldBehavior["IMMUTABLE"] = 5] = "IMMUTABLE";
|
||||
/**
|
||||
* UNORDERED_LIST - Denotes that a (repeated) field is an unordered list.
|
||||
* This indicates that the service may provide the elements of the list
|
||||
* in any arbitrary order, rather than the order the user originally
|
||||
* provided. Additionally, the list's order may or may not be stable.
|
||||
*/
|
||||
FieldBehavior[FieldBehavior["UNORDERED_LIST"] = 6] = "UNORDERED_LIST";
|
||||
})(FieldBehavior = exports.FieldBehavior || (exports.FieldBehavior = {}));
|
||||
function fieldBehaviorFromJSON(object) {
|
||||
switch (object) {
|
||||
case 0:
|
||||
case "FIELD_BEHAVIOR_UNSPECIFIED":
|
||||
return FieldBehavior.FIELD_BEHAVIOR_UNSPECIFIED;
|
||||
case 1:
|
||||
case "OPTIONAL":
|
||||
return FieldBehavior.OPTIONAL;
|
||||
case 2:
|
||||
case "REQUIRED":
|
||||
return FieldBehavior.REQUIRED;
|
||||
case 3:
|
||||
case "OUTPUT_ONLY":
|
||||
return FieldBehavior.OUTPUT_ONLY;
|
||||
case 4:
|
||||
case "INPUT_ONLY":
|
||||
return FieldBehavior.INPUT_ONLY;
|
||||
case 5:
|
||||
case "IMMUTABLE":
|
||||
return FieldBehavior.IMMUTABLE;
|
||||
case 6:
|
||||
case "UNORDERED_LIST":
|
||||
return FieldBehavior.UNORDERED_LIST;
|
||||
default:
|
||||
throw new tsProtoGlobalThis.Error("Unrecognized enum value " + object + " for enum FieldBehavior");
|
||||
}
|
||||
}
|
||||
exports.fieldBehaviorFromJSON = fieldBehaviorFromJSON;
|
||||
function fieldBehaviorToJSON(object) {
|
||||
switch (object) {
|
||||
case FieldBehavior.FIELD_BEHAVIOR_UNSPECIFIED:
|
||||
return "FIELD_BEHAVIOR_UNSPECIFIED";
|
||||
case FieldBehavior.OPTIONAL:
|
||||
return "OPTIONAL";
|
||||
case FieldBehavior.REQUIRED:
|
||||
return "REQUIRED";
|
||||
case FieldBehavior.OUTPUT_ONLY:
|
||||
return "OUTPUT_ONLY";
|
||||
case FieldBehavior.INPUT_ONLY:
|
||||
return "INPUT_ONLY";
|
||||
case FieldBehavior.IMMUTABLE:
|
||||
return "IMMUTABLE";
|
||||
case FieldBehavior.UNORDERED_LIST:
|
||||
return "UNORDERED_LIST";
|
||||
default:
|
||||
throw new tsProtoGlobalThis.Error("Unrecognized enum value " + object + " for enum FieldBehavior");
|
||||
}
|
||||
}
|
||||
exports.fieldBehaviorToJSON = fieldBehaviorToJSON;
|
||||
var tsProtoGlobalThis = (() => {
|
||||
if (typeof globalThis !== "undefined") {
|
||||
return globalThis;
|
||||
}
|
||||
if (typeof self !== "undefined") {
|
||||
return self;
|
||||
}
|
||||
if (typeof window !== "undefined") {
|
||||
return window;
|
||||
}
|
||||
if (typeof global !== "undefined") {
|
||||
return global;
|
||||
}
|
||||
throw "Unable to locate global object";
|
||||
})();
|
||||
65
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/google/protobuf/any.js
generated
vendored
Normal file
65
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/google/protobuf/any.js
generated
vendored
Normal file
@@ -0,0 +1,65 @@
|
||||
"use strict";
|
||||
/* eslint-disable */
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.Any = void 0;
|
||||
function createBaseAny() {
|
||||
return { typeUrl: "", value: Buffer.alloc(0) };
|
||||
}
|
||||
exports.Any = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
typeUrl: isSet(object.typeUrl) ? String(object.typeUrl) : "",
|
||||
value: isSet(object.value) ? Buffer.from(bytesFromBase64(object.value)) : Buffer.alloc(0),
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.typeUrl !== undefined && (obj.typeUrl = message.typeUrl);
|
||||
message.value !== undefined &&
|
||||
(obj.value = base64FromBytes(message.value !== undefined ? message.value : Buffer.alloc(0)));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
var tsProtoGlobalThis = (() => {
|
||||
if (typeof globalThis !== "undefined") {
|
||||
return globalThis;
|
||||
}
|
||||
if (typeof self !== "undefined") {
|
||||
return self;
|
||||
}
|
||||
if (typeof window !== "undefined") {
|
||||
return window;
|
||||
}
|
||||
if (typeof global !== "undefined") {
|
||||
return global;
|
||||
}
|
||||
throw "Unable to locate global object";
|
||||
})();
|
||||
function bytesFromBase64(b64) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return Uint8Array.from(tsProtoGlobalThis.Buffer.from(b64, "base64"));
|
||||
}
|
||||
else {
|
||||
const bin = tsProtoGlobalThis.atob(b64);
|
||||
const arr = new Uint8Array(bin.length);
|
||||
for (let i = 0; i < bin.length; ++i) {
|
||||
arr[i] = bin.charCodeAt(i);
|
||||
}
|
||||
return arr;
|
||||
}
|
||||
}
|
||||
function base64FromBytes(arr) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return tsProtoGlobalThis.Buffer.from(arr).toString("base64");
|
||||
}
|
||||
else {
|
||||
const bin = [];
|
||||
arr.forEach((byte) => {
|
||||
bin.push(String.fromCharCode(byte));
|
||||
});
|
||||
return tsProtoGlobalThis.btoa(bin.join(""));
|
||||
}
|
||||
}
|
||||
function isSet(value) {
|
||||
return value !== null && value !== undefined;
|
||||
}
|
||||
1308
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/google/protobuf/descriptor.js
generated
vendored
Normal file
1308
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/google/protobuf/descriptor.js
generated
vendored
Normal file
File diff suppressed because it is too large
Load Diff
24
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/google/protobuf/timestamp.js
generated
vendored
Normal file
24
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/google/protobuf/timestamp.js
generated
vendored
Normal file
@@ -0,0 +1,24 @@
|
||||
"use strict";
|
||||
/* eslint-disable */
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.Timestamp = void 0;
|
||||
function createBaseTimestamp() {
|
||||
return { seconds: "0", nanos: 0 };
|
||||
}
|
||||
exports.Timestamp = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
seconds: isSet(object.seconds) ? String(object.seconds) : "0",
|
||||
nanos: isSet(object.nanos) ? Number(object.nanos) : 0,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.seconds !== undefined && (obj.seconds = message.seconds);
|
||||
message.nanos !== undefined && (obj.nanos = Math.round(message.nanos));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function isSet(value) {
|
||||
return value !== null && value !== undefined;
|
||||
}
|
||||
112
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_bundle.js
generated
vendored
Normal file
112
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_bundle.js
generated
vendored
Normal file
@@ -0,0 +1,112 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.Bundle = exports.VerificationMaterial = exports.TimestampVerificationData = void 0;
|
||||
/* eslint-disable */
|
||||
const envelope_1 = require("./envelope");
|
||||
const sigstore_common_1 = require("./sigstore_common");
|
||||
const sigstore_rekor_1 = require("./sigstore_rekor");
|
||||
function createBaseTimestampVerificationData() {
|
||||
return { rfc3161Timestamps: [] };
|
||||
}
|
||||
exports.TimestampVerificationData = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
rfc3161Timestamps: Array.isArray(object?.rfc3161Timestamps)
|
||||
? object.rfc3161Timestamps.map((e) => sigstore_common_1.RFC3161SignedTimestamp.fromJSON(e))
|
||||
: [],
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
if (message.rfc3161Timestamps) {
|
||||
obj.rfc3161Timestamps = message.rfc3161Timestamps.map((e) => e ? sigstore_common_1.RFC3161SignedTimestamp.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.rfc3161Timestamps = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseVerificationMaterial() {
|
||||
return { content: undefined, tlogEntries: [], timestampVerificationData: undefined };
|
||||
}
|
||||
exports.VerificationMaterial = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
content: isSet(object.publicKey)
|
||||
? { $case: "publicKey", publicKey: sigstore_common_1.PublicKeyIdentifier.fromJSON(object.publicKey) }
|
||||
: isSet(object.x509CertificateChain)
|
||||
? {
|
||||
$case: "x509CertificateChain",
|
||||
x509CertificateChain: sigstore_common_1.X509CertificateChain.fromJSON(object.x509CertificateChain),
|
||||
}
|
||||
: isSet(object.certificate)
|
||||
? { $case: "certificate", certificate: sigstore_common_1.X509Certificate.fromJSON(object.certificate) }
|
||||
: undefined,
|
||||
tlogEntries: Array.isArray(object?.tlogEntries)
|
||||
? object.tlogEntries.map((e) => sigstore_rekor_1.TransparencyLogEntry.fromJSON(e))
|
||||
: [],
|
||||
timestampVerificationData: isSet(object.timestampVerificationData)
|
||||
? exports.TimestampVerificationData.fromJSON(object.timestampVerificationData)
|
||||
: undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.content?.$case === "publicKey" &&
|
||||
(obj.publicKey = message.content?.publicKey ? sigstore_common_1.PublicKeyIdentifier.toJSON(message.content?.publicKey) : undefined);
|
||||
message.content?.$case === "x509CertificateChain" &&
|
||||
(obj.x509CertificateChain = message.content?.x509CertificateChain
|
||||
? sigstore_common_1.X509CertificateChain.toJSON(message.content?.x509CertificateChain)
|
||||
: undefined);
|
||||
message.content?.$case === "certificate" &&
|
||||
(obj.certificate = message.content?.certificate
|
||||
? sigstore_common_1.X509Certificate.toJSON(message.content?.certificate)
|
||||
: undefined);
|
||||
if (message.tlogEntries) {
|
||||
obj.tlogEntries = message.tlogEntries.map((e) => e ? sigstore_rekor_1.TransparencyLogEntry.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.tlogEntries = [];
|
||||
}
|
||||
message.timestampVerificationData !== undefined &&
|
||||
(obj.timestampVerificationData = message.timestampVerificationData
|
||||
? exports.TimestampVerificationData.toJSON(message.timestampVerificationData)
|
||||
: undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseBundle() {
|
||||
return { mediaType: "", verificationMaterial: undefined, content: undefined };
|
||||
}
|
||||
exports.Bundle = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
mediaType: isSet(object.mediaType) ? String(object.mediaType) : "",
|
||||
verificationMaterial: isSet(object.verificationMaterial)
|
||||
? exports.VerificationMaterial.fromJSON(object.verificationMaterial)
|
||||
: undefined,
|
||||
content: isSet(object.messageSignature)
|
||||
? { $case: "messageSignature", messageSignature: sigstore_common_1.MessageSignature.fromJSON(object.messageSignature) }
|
||||
: isSet(object.dsseEnvelope)
|
||||
? { $case: "dsseEnvelope", dsseEnvelope: envelope_1.Envelope.fromJSON(object.dsseEnvelope) }
|
||||
: undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.mediaType !== undefined && (obj.mediaType = message.mediaType);
|
||||
message.verificationMaterial !== undefined && (obj.verificationMaterial = message.verificationMaterial
|
||||
? exports.VerificationMaterial.toJSON(message.verificationMaterial)
|
||||
: undefined);
|
||||
message.content?.$case === "messageSignature" && (obj.messageSignature = message.content?.messageSignature
|
||||
? sigstore_common_1.MessageSignature.toJSON(message.content?.messageSignature)
|
||||
: undefined);
|
||||
message.content?.$case === "dsseEnvelope" &&
|
||||
(obj.dsseEnvelope = message.content?.dsseEnvelope ? envelope_1.Envelope.toJSON(message.content?.dsseEnvelope) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function isSet(value) {
|
||||
return value !== null && value !== undefined;
|
||||
}
|
||||
588
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_common.js
generated
vendored
Normal file
588
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_common.js
generated
vendored
Normal file
@@ -0,0 +1,588 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.TimeRange = exports.X509CertificateChain = exports.SubjectAlternativeName = exports.X509Certificate = exports.DistinguishedName = exports.ObjectIdentifierValuePair = exports.ObjectIdentifier = exports.PublicKeyIdentifier = exports.PublicKey = exports.RFC3161SignedTimestamp = exports.LogId = exports.MessageSignature = exports.HashOutput = exports.subjectAlternativeNameTypeToJSON = exports.subjectAlternativeNameTypeFromJSON = exports.SubjectAlternativeNameType = exports.publicKeyDetailsToJSON = exports.publicKeyDetailsFromJSON = exports.PublicKeyDetails = exports.hashAlgorithmToJSON = exports.hashAlgorithmFromJSON = exports.HashAlgorithm = void 0;
|
||||
/* eslint-disable */
|
||||
const timestamp_1 = require("./google/protobuf/timestamp");
|
||||
/**
|
||||
* Only a subset of the secure hash standard algorithms are supported.
|
||||
* See <https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf> for more
|
||||
* details.
|
||||
* UNSPECIFIED SHOULD not be used, primary reason for inclusion is to force
|
||||
* any proto JSON serialization to emit the used hash algorithm, as default
|
||||
* option is to *omit* the default value of an enum (which is the first
|
||||
* value, represented by '0'.
|
||||
*/
|
||||
var HashAlgorithm;
|
||||
(function (HashAlgorithm) {
|
||||
HashAlgorithm[HashAlgorithm["HASH_ALGORITHM_UNSPECIFIED"] = 0] = "HASH_ALGORITHM_UNSPECIFIED";
|
||||
HashAlgorithm[HashAlgorithm["SHA2_256"] = 1] = "SHA2_256";
|
||||
HashAlgorithm[HashAlgorithm["SHA2_384"] = 2] = "SHA2_384";
|
||||
HashAlgorithm[HashAlgorithm["SHA2_512"] = 3] = "SHA2_512";
|
||||
HashAlgorithm[HashAlgorithm["SHA3_256"] = 4] = "SHA3_256";
|
||||
HashAlgorithm[HashAlgorithm["SHA3_384"] = 5] = "SHA3_384";
|
||||
})(HashAlgorithm = exports.HashAlgorithm || (exports.HashAlgorithm = {}));
|
||||
function hashAlgorithmFromJSON(object) {
|
||||
switch (object) {
|
||||
case 0:
|
||||
case "HASH_ALGORITHM_UNSPECIFIED":
|
||||
return HashAlgorithm.HASH_ALGORITHM_UNSPECIFIED;
|
||||
case 1:
|
||||
case "SHA2_256":
|
||||
return HashAlgorithm.SHA2_256;
|
||||
case 2:
|
||||
case "SHA2_384":
|
||||
return HashAlgorithm.SHA2_384;
|
||||
case 3:
|
||||
case "SHA2_512":
|
||||
return HashAlgorithm.SHA2_512;
|
||||
case 4:
|
||||
case "SHA3_256":
|
||||
return HashAlgorithm.SHA3_256;
|
||||
case 5:
|
||||
case "SHA3_384":
|
||||
return HashAlgorithm.SHA3_384;
|
||||
default:
|
||||
throw new tsProtoGlobalThis.Error("Unrecognized enum value " + object + " for enum HashAlgorithm");
|
||||
}
|
||||
}
|
||||
exports.hashAlgorithmFromJSON = hashAlgorithmFromJSON;
|
||||
function hashAlgorithmToJSON(object) {
|
||||
switch (object) {
|
||||
case HashAlgorithm.HASH_ALGORITHM_UNSPECIFIED:
|
||||
return "HASH_ALGORITHM_UNSPECIFIED";
|
||||
case HashAlgorithm.SHA2_256:
|
||||
return "SHA2_256";
|
||||
case HashAlgorithm.SHA2_384:
|
||||
return "SHA2_384";
|
||||
case HashAlgorithm.SHA2_512:
|
||||
return "SHA2_512";
|
||||
case HashAlgorithm.SHA3_256:
|
||||
return "SHA3_256";
|
||||
case HashAlgorithm.SHA3_384:
|
||||
return "SHA3_384";
|
||||
default:
|
||||
throw new tsProtoGlobalThis.Error("Unrecognized enum value " + object + " for enum HashAlgorithm");
|
||||
}
|
||||
}
|
||||
exports.hashAlgorithmToJSON = hashAlgorithmToJSON;
|
||||
/**
|
||||
* Details of a specific public key, capturing the the key encoding method,
|
||||
* and signature algorithm.
|
||||
*
|
||||
* PublicKeyDetails captures the public key/hash algorithm combinations
|
||||
* recommended in the Sigstore ecosystem.
|
||||
*
|
||||
* This is modelled as a linear set as we want to provide a small number of
|
||||
* opinionated options instead of allowing every possible permutation.
|
||||
*
|
||||
* Any changes to this enum MUST be reflected in the algorithm registry.
|
||||
* See: docs/algorithm-registry.md
|
||||
*
|
||||
* To avoid the possibility of contradicting formats such as PKCS1 with
|
||||
* ED25519 the valid permutations are listed as a linear set instead of a
|
||||
* cartesian set (i.e one combined variable instead of two, one for encoding
|
||||
* and one for the signature algorithm).
|
||||
*/
|
||||
var PublicKeyDetails;
|
||||
(function (PublicKeyDetails) {
|
||||
PublicKeyDetails[PublicKeyDetails["PUBLIC_KEY_DETAILS_UNSPECIFIED"] = 0] = "PUBLIC_KEY_DETAILS_UNSPECIFIED";
|
||||
/**
|
||||
* PKCS1_RSA_PKCS1V5 - RSA
|
||||
*
|
||||
* @deprecated
|
||||
*/
|
||||
PublicKeyDetails[PublicKeyDetails["PKCS1_RSA_PKCS1V5"] = 1] = "PKCS1_RSA_PKCS1V5";
|
||||
/**
|
||||
* PKCS1_RSA_PSS - See RFC8017
|
||||
*
|
||||
* @deprecated
|
||||
*/
|
||||
PublicKeyDetails[PublicKeyDetails["PKCS1_RSA_PSS"] = 2] = "PKCS1_RSA_PSS";
|
||||
/** @deprecated */
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_RSA_PKCS1V5"] = 3] = "PKIX_RSA_PKCS1V5";
|
||||
/** @deprecated */
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_RSA_PSS"] = 4] = "PKIX_RSA_PSS";
|
||||
/** PKIX_RSA_PKCS1V15_2048_SHA256 - RSA public key in PKIX format, PKCS#1v1.5 signature */
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_RSA_PKCS1V15_2048_SHA256"] = 9] = "PKIX_RSA_PKCS1V15_2048_SHA256";
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_RSA_PKCS1V15_3072_SHA256"] = 10] = "PKIX_RSA_PKCS1V15_3072_SHA256";
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_RSA_PKCS1V15_4096_SHA256"] = 11] = "PKIX_RSA_PKCS1V15_4096_SHA256";
|
||||
/** PKIX_RSA_PSS_2048_SHA256 - RSA public key in PKIX format, RSASSA-PSS signature */
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_RSA_PSS_2048_SHA256"] = 16] = "PKIX_RSA_PSS_2048_SHA256";
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_RSA_PSS_3072_SHA256"] = 17] = "PKIX_RSA_PSS_3072_SHA256";
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_RSA_PSS_4096_SHA256"] = 18] = "PKIX_RSA_PSS_4096_SHA256";
|
||||
/**
|
||||
* PKIX_ECDSA_P256_HMAC_SHA_256 - ECDSA
|
||||
*
|
||||
* @deprecated
|
||||
*/
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_ECDSA_P256_HMAC_SHA_256"] = 6] = "PKIX_ECDSA_P256_HMAC_SHA_256";
|
||||
/** PKIX_ECDSA_P256_SHA_256 - See NIST FIPS 186-4 */
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_ECDSA_P256_SHA_256"] = 5] = "PKIX_ECDSA_P256_SHA_256";
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_ECDSA_P384_SHA_384"] = 12] = "PKIX_ECDSA_P384_SHA_384";
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_ECDSA_P521_SHA_512"] = 13] = "PKIX_ECDSA_P521_SHA_512";
|
||||
/** PKIX_ED25519 - Ed 25519 */
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_ED25519"] = 7] = "PKIX_ED25519";
|
||||
PublicKeyDetails[PublicKeyDetails["PKIX_ED25519_PH"] = 8] = "PKIX_ED25519_PH";
|
||||
/**
|
||||
* LMS_SHA256 - LMS and LM-OTS
|
||||
*
|
||||
* These keys and signatures may be used by private Sigstore
|
||||
* deployments, but are not currently supported by the public
|
||||
* good instance.
|
||||
*
|
||||
* USER WARNING: LMS and LM-OTS are both stateful signature schemes.
|
||||
* Using them correctly requires discretion and careful consideration
|
||||
* to ensure that individual secret keys are not used more than once.
|
||||
* In addition, LM-OTS is a single-use scheme, meaning that it
|
||||
* MUST NOT be used for more than one signature per LM-OTS key.
|
||||
* If you cannot maintain these invariants, you MUST NOT use these
|
||||
* schemes.
|
||||
*/
|
||||
PublicKeyDetails[PublicKeyDetails["LMS_SHA256"] = 14] = "LMS_SHA256";
|
||||
PublicKeyDetails[PublicKeyDetails["LMOTS_SHA256"] = 15] = "LMOTS_SHA256";
|
||||
})(PublicKeyDetails = exports.PublicKeyDetails || (exports.PublicKeyDetails = {}));
|
||||
function publicKeyDetailsFromJSON(object) {
|
||||
switch (object) {
|
||||
case 0:
|
||||
case "PUBLIC_KEY_DETAILS_UNSPECIFIED":
|
||||
return PublicKeyDetails.PUBLIC_KEY_DETAILS_UNSPECIFIED;
|
||||
case 1:
|
||||
case "PKCS1_RSA_PKCS1V5":
|
||||
return PublicKeyDetails.PKCS1_RSA_PKCS1V5;
|
||||
case 2:
|
||||
case "PKCS1_RSA_PSS":
|
||||
return PublicKeyDetails.PKCS1_RSA_PSS;
|
||||
case 3:
|
||||
case "PKIX_RSA_PKCS1V5":
|
||||
return PublicKeyDetails.PKIX_RSA_PKCS1V5;
|
||||
case 4:
|
||||
case "PKIX_RSA_PSS":
|
||||
return PublicKeyDetails.PKIX_RSA_PSS;
|
||||
case 9:
|
||||
case "PKIX_RSA_PKCS1V15_2048_SHA256":
|
||||
return PublicKeyDetails.PKIX_RSA_PKCS1V15_2048_SHA256;
|
||||
case 10:
|
||||
case "PKIX_RSA_PKCS1V15_3072_SHA256":
|
||||
return PublicKeyDetails.PKIX_RSA_PKCS1V15_3072_SHA256;
|
||||
case 11:
|
||||
case "PKIX_RSA_PKCS1V15_4096_SHA256":
|
||||
return PublicKeyDetails.PKIX_RSA_PKCS1V15_4096_SHA256;
|
||||
case 16:
|
||||
case "PKIX_RSA_PSS_2048_SHA256":
|
||||
return PublicKeyDetails.PKIX_RSA_PSS_2048_SHA256;
|
||||
case 17:
|
||||
case "PKIX_RSA_PSS_3072_SHA256":
|
||||
return PublicKeyDetails.PKIX_RSA_PSS_3072_SHA256;
|
||||
case 18:
|
||||
case "PKIX_RSA_PSS_4096_SHA256":
|
||||
return PublicKeyDetails.PKIX_RSA_PSS_4096_SHA256;
|
||||
case 6:
|
||||
case "PKIX_ECDSA_P256_HMAC_SHA_256":
|
||||
return PublicKeyDetails.PKIX_ECDSA_P256_HMAC_SHA_256;
|
||||
case 5:
|
||||
case "PKIX_ECDSA_P256_SHA_256":
|
||||
return PublicKeyDetails.PKIX_ECDSA_P256_SHA_256;
|
||||
case 12:
|
||||
case "PKIX_ECDSA_P384_SHA_384":
|
||||
return PublicKeyDetails.PKIX_ECDSA_P384_SHA_384;
|
||||
case 13:
|
||||
case "PKIX_ECDSA_P521_SHA_512":
|
||||
return PublicKeyDetails.PKIX_ECDSA_P521_SHA_512;
|
||||
case 7:
|
||||
case "PKIX_ED25519":
|
||||
return PublicKeyDetails.PKIX_ED25519;
|
||||
case 8:
|
||||
case "PKIX_ED25519_PH":
|
||||
return PublicKeyDetails.PKIX_ED25519_PH;
|
||||
case 14:
|
||||
case "LMS_SHA256":
|
||||
return PublicKeyDetails.LMS_SHA256;
|
||||
case 15:
|
||||
case "LMOTS_SHA256":
|
||||
return PublicKeyDetails.LMOTS_SHA256;
|
||||
default:
|
||||
throw new tsProtoGlobalThis.Error("Unrecognized enum value " + object + " for enum PublicKeyDetails");
|
||||
}
|
||||
}
|
||||
exports.publicKeyDetailsFromJSON = publicKeyDetailsFromJSON;
|
||||
function publicKeyDetailsToJSON(object) {
|
||||
switch (object) {
|
||||
case PublicKeyDetails.PUBLIC_KEY_DETAILS_UNSPECIFIED:
|
||||
return "PUBLIC_KEY_DETAILS_UNSPECIFIED";
|
||||
case PublicKeyDetails.PKCS1_RSA_PKCS1V5:
|
||||
return "PKCS1_RSA_PKCS1V5";
|
||||
case PublicKeyDetails.PKCS1_RSA_PSS:
|
||||
return "PKCS1_RSA_PSS";
|
||||
case PublicKeyDetails.PKIX_RSA_PKCS1V5:
|
||||
return "PKIX_RSA_PKCS1V5";
|
||||
case PublicKeyDetails.PKIX_RSA_PSS:
|
||||
return "PKIX_RSA_PSS";
|
||||
case PublicKeyDetails.PKIX_RSA_PKCS1V15_2048_SHA256:
|
||||
return "PKIX_RSA_PKCS1V15_2048_SHA256";
|
||||
case PublicKeyDetails.PKIX_RSA_PKCS1V15_3072_SHA256:
|
||||
return "PKIX_RSA_PKCS1V15_3072_SHA256";
|
||||
case PublicKeyDetails.PKIX_RSA_PKCS1V15_4096_SHA256:
|
||||
return "PKIX_RSA_PKCS1V15_4096_SHA256";
|
||||
case PublicKeyDetails.PKIX_RSA_PSS_2048_SHA256:
|
||||
return "PKIX_RSA_PSS_2048_SHA256";
|
||||
case PublicKeyDetails.PKIX_RSA_PSS_3072_SHA256:
|
||||
return "PKIX_RSA_PSS_3072_SHA256";
|
||||
case PublicKeyDetails.PKIX_RSA_PSS_4096_SHA256:
|
||||
return "PKIX_RSA_PSS_4096_SHA256";
|
||||
case PublicKeyDetails.PKIX_ECDSA_P256_HMAC_SHA_256:
|
||||
return "PKIX_ECDSA_P256_HMAC_SHA_256";
|
||||
case PublicKeyDetails.PKIX_ECDSA_P256_SHA_256:
|
||||
return "PKIX_ECDSA_P256_SHA_256";
|
||||
case PublicKeyDetails.PKIX_ECDSA_P384_SHA_384:
|
||||
return "PKIX_ECDSA_P384_SHA_384";
|
||||
case PublicKeyDetails.PKIX_ECDSA_P521_SHA_512:
|
||||
return "PKIX_ECDSA_P521_SHA_512";
|
||||
case PublicKeyDetails.PKIX_ED25519:
|
||||
return "PKIX_ED25519";
|
||||
case PublicKeyDetails.PKIX_ED25519_PH:
|
||||
return "PKIX_ED25519_PH";
|
||||
case PublicKeyDetails.LMS_SHA256:
|
||||
return "LMS_SHA256";
|
||||
case PublicKeyDetails.LMOTS_SHA256:
|
||||
return "LMOTS_SHA256";
|
||||
default:
|
||||
throw new tsProtoGlobalThis.Error("Unrecognized enum value " + object + " for enum PublicKeyDetails");
|
||||
}
|
||||
}
|
||||
exports.publicKeyDetailsToJSON = publicKeyDetailsToJSON;
|
||||
var SubjectAlternativeNameType;
|
||||
(function (SubjectAlternativeNameType) {
|
||||
SubjectAlternativeNameType[SubjectAlternativeNameType["SUBJECT_ALTERNATIVE_NAME_TYPE_UNSPECIFIED"] = 0] = "SUBJECT_ALTERNATIVE_NAME_TYPE_UNSPECIFIED";
|
||||
SubjectAlternativeNameType[SubjectAlternativeNameType["EMAIL"] = 1] = "EMAIL";
|
||||
SubjectAlternativeNameType[SubjectAlternativeNameType["URI"] = 2] = "URI";
|
||||
/**
|
||||
* OTHER_NAME - OID 1.3.6.1.4.1.57264.1.7
|
||||
* See https://github.com/sigstore/fulcio/blob/main/docs/oid-info.md#1361415726417--othername-san
|
||||
* for more details.
|
||||
*/
|
||||
SubjectAlternativeNameType[SubjectAlternativeNameType["OTHER_NAME"] = 3] = "OTHER_NAME";
|
||||
})(SubjectAlternativeNameType = exports.SubjectAlternativeNameType || (exports.SubjectAlternativeNameType = {}));
|
||||
function subjectAlternativeNameTypeFromJSON(object) {
|
||||
switch (object) {
|
||||
case 0:
|
||||
case "SUBJECT_ALTERNATIVE_NAME_TYPE_UNSPECIFIED":
|
||||
return SubjectAlternativeNameType.SUBJECT_ALTERNATIVE_NAME_TYPE_UNSPECIFIED;
|
||||
case 1:
|
||||
case "EMAIL":
|
||||
return SubjectAlternativeNameType.EMAIL;
|
||||
case 2:
|
||||
case "URI":
|
||||
return SubjectAlternativeNameType.URI;
|
||||
case 3:
|
||||
case "OTHER_NAME":
|
||||
return SubjectAlternativeNameType.OTHER_NAME;
|
||||
default:
|
||||
throw new tsProtoGlobalThis.Error("Unrecognized enum value " + object + " for enum SubjectAlternativeNameType");
|
||||
}
|
||||
}
|
||||
exports.subjectAlternativeNameTypeFromJSON = subjectAlternativeNameTypeFromJSON;
|
||||
function subjectAlternativeNameTypeToJSON(object) {
|
||||
switch (object) {
|
||||
case SubjectAlternativeNameType.SUBJECT_ALTERNATIVE_NAME_TYPE_UNSPECIFIED:
|
||||
return "SUBJECT_ALTERNATIVE_NAME_TYPE_UNSPECIFIED";
|
||||
case SubjectAlternativeNameType.EMAIL:
|
||||
return "EMAIL";
|
||||
case SubjectAlternativeNameType.URI:
|
||||
return "URI";
|
||||
case SubjectAlternativeNameType.OTHER_NAME:
|
||||
return "OTHER_NAME";
|
||||
default:
|
||||
throw new tsProtoGlobalThis.Error("Unrecognized enum value " + object + " for enum SubjectAlternativeNameType");
|
||||
}
|
||||
}
|
||||
exports.subjectAlternativeNameTypeToJSON = subjectAlternativeNameTypeToJSON;
|
||||
function createBaseHashOutput() {
|
||||
return { algorithm: 0, digest: Buffer.alloc(0) };
|
||||
}
|
||||
exports.HashOutput = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
algorithm: isSet(object.algorithm) ? hashAlgorithmFromJSON(object.algorithm) : 0,
|
||||
digest: isSet(object.digest) ? Buffer.from(bytesFromBase64(object.digest)) : Buffer.alloc(0),
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.algorithm !== undefined && (obj.algorithm = hashAlgorithmToJSON(message.algorithm));
|
||||
message.digest !== undefined &&
|
||||
(obj.digest = base64FromBytes(message.digest !== undefined ? message.digest : Buffer.alloc(0)));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseMessageSignature() {
|
||||
return { messageDigest: undefined, signature: Buffer.alloc(0) };
|
||||
}
|
||||
exports.MessageSignature = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
messageDigest: isSet(object.messageDigest) ? exports.HashOutput.fromJSON(object.messageDigest) : undefined,
|
||||
signature: isSet(object.signature) ? Buffer.from(bytesFromBase64(object.signature)) : Buffer.alloc(0),
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.messageDigest !== undefined &&
|
||||
(obj.messageDigest = message.messageDigest ? exports.HashOutput.toJSON(message.messageDigest) : undefined);
|
||||
message.signature !== undefined &&
|
||||
(obj.signature = base64FromBytes(message.signature !== undefined ? message.signature : Buffer.alloc(0)));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseLogId() {
|
||||
return { keyId: Buffer.alloc(0) };
|
||||
}
|
||||
exports.LogId = {
|
||||
fromJSON(object) {
|
||||
return { keyId: isSet(object.keyId) ? Buffer.from(bytesFromBase64(object.keyId)) : Buffer.alloc(0) };
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.keyId !== undefined &&
|
||||
(obj.keyId = base64FromBytes(message.keyId !== undefined ? message.keyId : Buffer.alloc(0)));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseRFC3161SignedTimestamp() {
|
||||
return { signedTimestamp: Buffer.alloc(0) };
|
||||
}
|
||||
exports.RFC3161SignedTimestamp = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
signedTimestamp: isSet(object.signedTimestamp)
|
||||
? Buffer.from(bytesFromBase64(object.signedTimestamp))
|
||||
: Buffer.alloc(0),
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.signedTimestamp !== undefined &&
|
||||
(obj.signedTimestamp = base64FromBytes(message.signedTimestamp !== undefined ? message.signedTimestamp : Buffer.alloc(0)));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBasePublicKey() {
|
||||
return { rawBytes: undefined, keyDetails: 0, validFor: undefined };
|
||||
}
|
||||
exports.PublicKey = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
rawBytes: isSet(object.rawBytes) ? Buffer.from(bytesFromBase64(object.rawBytes)) : undefined,
|
||||
keyDetails: isSet(object.keyDetails) ? publicKeyDetailsFromJSON(object.keyDetails) : 0,
|
||||
validFor: isSet(object.validFor) ? exports.TimeRange.fromJSON(object.validFor) : undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.rawBytes !== undefined &&
|
||||
(obj.rawBytes = message.rawBytes !== undefined ? base64FromBytes(message.rawBytes) : undefined);
|
||||
message.keyDetails !== undefined && (obj.keyDetails = publicKeyDetailsToJSON(message.keyDetails));
|
||||
message.validFor !== undefined &&
|
||||
(obj.validFor = message.validFor ? exports.TimeRange.toJSON(message.validFor) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBasePublicKeyIdentifier() {
|
||||
return { hint: "" };
|
||||
}
|
||||
exports.PublicKeyIdentifier = {
|
||||
fromJSON(object) {
|
||||
return { hint: isSet(object.hint) ? String(object.hint) : "" };
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.hint !== undefined && (obj.hint = message.hint);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseObjectIdentifier() {
|
||||
return { id: [] };
|
||||
}
|
||||
exports.ObjectIdentifier = {
|
||||
fromJSON(object) {
|
||||
return { id: Array.isArray(object?.id) ? object.id.map((e) => Number(e)) : [] };
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
if (message.id) {
|
||||
obj.id = message.id.map((e) => Math.round(e));
|
||||
}
|
||||
else {
|
||||
obj.id = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseObjectIdentifierValuePair() {
|
||||
return { oid: undefined, value: Buffer.alloc(0) };
|
||||
}
|
||||
exports.ObjectIdentifierValuePair = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
oid: isSet(object.oid) ? exports.ObjectIdentifier.fromJSON(object.oid) : undefined,
|
||||
value: isSet(object.value) ? Buffer.from(bytesFromBase64(object.value)) : Buffer.alloc(0),
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.oid !== undefined && (obj.oid = message.oid ? exports.ObjectIdentifier.toJSON(message.oid) : undefined);
|
||||
message.value !== undefined &&
|
||||
(obj.value = base64FromBytes(message.value !== undefined ? message.value : Buffer.alloc(0)));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseDistinguishedName() {
|
||||
return { organization: "", commonName: "" };
|
||||
}
|
||||
exports.DistinguishedName = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
organization: isSet(object.organization) ? String(object.organization) : "",
|
||||
commonName: isSet(object.commonName) ? String(object.commonName) : "",
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.organization !== undefined && (obj.organization = message.organization);
|
||||
message.commonName !== undefined && (obj.commonName = message.commonName);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseX509Certificate() {
|
||||
return { rawBytes: Buffer.alloc(0) };
|
||||
}
|
||||
exports.X509Certificate = {
|
||||
fromJSON(object) {
|
||||
return { rawBytes: isSet(object.rawBytes) ? Buffer.from(bytesFromBase64(object.rawBytes)) : Buffer.alloc(0) };
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.rawBytes !== undefined &&
|
||||
(obj.rawBytes = base64FromBytes(message.rawBytes !== undefined ? message.rawBytes : Buffer.alloc(0)));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseSubjectAlternativeName() {
|
||||
return { type: 0, identity: undefined };
|
||||
}
|
||||
exports.SubjectAlternativeName = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
type: isSet(object.type) ? subjectAlternativeNameTypeFromJSON(object.type) : 0,
|
||||
identity: isSet(object.regexp)
|
||||
? { $case: "regexp", regexp: String(object.regexp) }
|
||||
: isSet(object.value)
|
||||
? { $case: "value", value: String(object.value) }
|
||||
: undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.type !== undefined && (obj.type = subjectAlternativeNameTypeToJSON(message.type));
|
||||
message.identity?.$case === "regexp" && (obj.regexp = message.identity?.regexp);
|
||||
message.identity?.$case === "value" && (obj.value = message.identity?.value);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseX509CertificateChain() {
|
||||
return { certificates: [] };
|
||||
}
|
||||
exports.X509CertificateChain = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
certificates: Array.isArray(object?.certificates)
|
||||
? object.certificates.map((e) => exports.X509Certificate.fromJSON(e))
|
||||
: [],
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
if (message.certificates) {
|
||||
obj.certificates = message.certificates.map((e) => e ? exports.X509Certificate.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.certificates = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseTimeRange() {
|
||||
return { start: undefined, end: undefined };
|
||||
}
|
||||
exports.TimeRange = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
start: isSet(object.start) ? fromJsonTimestamp(object.start) : undefined,
|
||||
end: isSet(object.end) ? fromJsonTimestamp(object.end) : undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.start !== undefined && (obj.start = message.start.toISOString());
|
||||
message.end !== undefined && (obj.end = message.end.toISOString());
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
var tsProtoGlobalThis = (() => {
|
||||
if (typeof globalThis !== "undefined") {
|
||||
return globalThis;
|
||||
}
|
||||
if (typeof self !== "undefined") {
|
||||
return self;
|
||||
}
|
||||
if (typeof window !== "undefined") {
|
||||
return window;
|
||||
}
|
||||
if (typeof global !== "undefined") {
|
||||
return global;
|
||||
}
|
||||
throw "Unable to locate global object";
|
||||
})();
|
||||
function bytesFromBase64(b64) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return Uint8Array.from(tsProtoGlobalThis.Buffer.from(b64, "base64"));
|
||||
}
|
||||
else {
|
||||
const bin = tsProtoGlobalThis.atob(b64);
|
||||
const arr = new Uint8Array(bin.length);
|
||||
for (let i = 0; i < bin.length; ++i) {
|
||||
arr[i] = bin.charCodeAt(i);
|
||||
}
|
||||
return arr;
|
||||
}
|
||||
}
|
||||
function base64FromBytes(arr) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return tsProtoGlobalThis.Buffer.from(arr).toString("base64");
|
||||
}
|
||||
else {
|
||||
const bin = [];
|
||||
arr.forEach((byte) => {
|
||||
bin.push(String.fromCharCode(byte));
|
||||
});
|
||||
return tsProtoGlobalThis.btoa(bin.join(""));
|
||||
}
|
||||
}
|
||||
function fromTimestamp(t) {
|
||||
let millis = Number(t.seconds) * 1000;
|
||||
millis += t.nanos / 1000000;
|
||||
return new Date(millis);
|
||||
}
|
||||
function fromJsonTimestamp(o) {
|
||||
if (o instanceof Date) {
|
||||
return o;
|
||||
}
|
||||
else if (typeof o === "string") {
|
||||
return new Date(o);
|
||||
}
|
||||
else {
|
||||
return fromTimestamp(timestamp_1.Timestamp.fromJSON(o));
|
||||
}
|
||||
}
|
||||
function isSet(value) {
|
||||
return value !== null && value !== undefined;
|
||||
}
|
||||
167
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_rekor.js
generated
vendored
Normal file
167
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_rekor.js
generated
vendored
Normal file
@@ -0,0 +1,167 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.TransparencyLogEntry = exports.InclusionPromise = exports.InclusionProof = exports.Checkpoint = exports.KindVersion = void 0;
|
||||
/* eslint-disable */
|
||||
const sigstore_common_1 = require("./sigstore_common");
|
||||
function createBaseKindVersion() {
|
||||
return { kind: "", version: "" };
|
||||
}
|
||||
exports.KindVersion = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
kind: isSet(object.kind) ? String(object.kind) : "",
|
||||
version: isSet(object.version) ? String(object.version) : "",
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.kind !== undefined && (obj.kind = message.kind);
|
||||
message.version !== undefined && (obj.version = message.version);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseCheckpoint() {
|
||||
return { envelope: "" };
|
||||
}
|
||||
exports.Checkpoint = {
|
||||
fromJSON(object) {
|
||||
return { envelope: isSet(object.envelope) ? String(object.envelope) : "" };
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.envelope !== undefined && (obj.envelope = message.envelope);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseInclusionProof() {
|
||||
return { logIndex: "0", rootHash: Buffer.alloc(0), treeSize: "0", hashes: [], checkpoint: undefined };
|
||||
}
|
||||
exports.InclusionProof = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
logIndex: isSet(object.logIndex) ? String(object.logIndex) : "0",
|
||||
rootHash: isSet(object.rootHash) ? Buffer.from(bytesFromBase64(object.rootHash)) : Buffer.alloc(0),
|
||||
treeSize: isSet(object.treeSize) ? String(object.treeSize) : "0",
|
||||
hashes: Array.isArray(object?.hashes) ? object.hashes.map((e) => Buffer.from(bytesFromBase64(e))) : [],
|
||||
checkpoint: isSet(object.checkpoint) ? exports.Checkpoint.fromJSON(object.checkpoint) : undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.logIndex !== undefined && (obj.logIndex = message.logIndex);
|
||||
message.rootHash !== undefined &&
|
||||
(obj.rootHash = base64FromBytes(message.rootHash !== undefined ? message.rootHash : Buffer.alloc(0)));
|
||||
message.treeSize !== undefined && (obj.treeSize = message.treeSize);
|
||||
if (message.hashes) {
|
||||
obj.hashes = message.hashes.map((e) => base64FromBytes(e !== undefined ? e : Buffer.alloc(0)));
|
||||
}
|
||||
else {
|
||||
obj.hashes = [];
|
||||
}
|
||||
message.checkpoint !== undefined &&
|
||||
(obj.checkpoint = message.checkpoint ? exports.Checkpoint.toJSON(message.checkpoint) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseInclusionPromise() {
|
||||
return { signedEntryTimestamp: Buffer.alloc(0) };
|
||||
}
|
||||
exports.InclusionPromise = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
signedEntryTimestamp: isSet(object.signedEntryTimestamp)
|
||||
? Buffer.from(bytesFromBase64(object.signedEntryTimestamp))
|
||||
: Buffer.alloc(0),
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.signedEntryTimestamp !== undefined &&
|
||||
(obj.signedEntryTimestamp = base64FromBytes(message.signedEntryTimestamp !== undefined ? message.signedEntryTimestamp : Buffer.alloc(0)));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseTransparencyLogEntry() {
|
||||
return {
|
||||
logIndex: "0",
|
||||
logId: undefined,
|
||||
kindVersion: undefined,
|
||||
integratedTime: "0",
|
||||
inclusionPromise: undefined,
|
||||
inclusionProof: undefined,
|
||||
canonicalizedBody: Buffer.alloc(0),
|
||||
};
|
||||
}
|
||||
exports.TransparencyLogEntry = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
logIndex: isSet(object.logIndex) ? String(object.logIndex) : "0",
|
||||
logId: isSet(object.logId) ? sigstore_common_1.LogId.fromJSON(object.logId) : undefined,
|
||||
kindVersion: isSet(object.kindVersion) ? exports.KindVersion.fromJSON(object.kindVersion) : undefined,
|
||||
integratedTime: isSet(object.integratedTime) ? String(object.integratedTime) : "0",
|
||||
inclusionPromise: isSet(object.inclusionPromise) ? exports.InclusionPromise.fromJSON(object.inclusionPromise) : undefined,
|
||||
inclusionProof: isSet(object.inclusionProof) ? exports.InclusionProof.fromJSON(object.inclusionProof) : undefined,
|
||||
canonicalizedBody: isSet(object.canonicalizedBody)
|
||||
? Buffer.from(bytesFromBase64(object.canonicalizedBody))
|
||||
: Buffer.alloc(0),
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.logIndex !== undefined && (obj.logIndex = message.logIndex);
|
||||
message.logId !== undefined && (obj.logId = message.logId ? sigstore_common_1.LogId.toJSON(message.logId) : undefined);
|
||||
message.kindVersion !== undefined &&
|
||||
(obj.kindVersion = message.kindVersion ? exports.KindVersion.toJSON(message.kindVersion) : undefined);
|
||||
message.integratedTime !== undefined && (obj.integratedTime = message.integratedTime);
|
||||
message.inclusionPromise !== undefined &&
|
||||
(obj.inclusionPromise = message.inclusionPromise ? exports.InclusionPromise.toJSON(message.inclusionPromise) : undefined);
|
||||
message.inclusionProof !== undefined &&
|
||||
(obj.inclusionProof = message.inclusionProof ? exports.InclusionProof.toJSON(message.inclusionProof) : undefined);
|
||||
message.canonicalizedBody !== undefined &&
|
||||
(obj.canonicalizedBody = base64FromBytes(message.canonicalizedBody !== undefined ? message.canonicalizedBody : Buffer.alloc(0)));
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
var tsProtoGlobalThis = (() => {
|
||||
if (typeof globalThis !== "undefined") {
|
||||
return globalThis;
|
||||
}
|
||||
if (typeof self !== "undefined") {
|
||||
return self;
|
||||
}
|
||||
if (typeof window !== "undefined") {
|
||||
return window;
|
||||
}
|
||||
if (typeof global !== "undefined") {
|
||||
return global;
|
||||
}
|
||||
throw "Unable to locate global object";
|
||||
})();
|
||||
function bytesFromBase64(b64) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return Uint8Array.from(tsProtoGlobalThis.Buffer.from(b64, "base64"));
|
||||
}
|
||||
else {
|
||||
const bin = tsProtoGlobalThis.atob(b64);
|
||||
const arr = new Uint8Array(bin.length);
|
||||
for (let i = 0; i < bin.length; ++i) {
|
||||
arr[i] = bin.charCodeAt(i);
|
||||
}
|
||||
return arr;
|
||||
}
|
||||
}
|
||||
function base64FromBytes(arr) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return tsProtoGlobalThis.Buffer.from(arr).toString("base64");
|
||||
}
|
||||
else {
|
||||
const bin = [];
|
||||
arr.forEach((byte) => {
|
||||
bin.push(String.fromCharCode(byte));
|
||||
});
|
||||
return tsProtoGlobalThis.btoa(bin.join(""));
|
||||
}
|
||||
}
|
||||
function isSet(value) {
|
||||
return value !== null && value !== undefined;
|
||||
}
|
||||
158
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_trustroot.js
generated
vendored
Normal file
158
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_trustroot.js
generated
vendored
Normal file
@@ -0,0 +1,158 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.ClientTrustConfig = exports.SigningConfig = exports.TrustedRoot = exports.CertificateAuthority = exports.TransparencyLogInstance = void 0;
|
||||
/* eslint-disable */
|
||||
const sigstore_common_1 = require("./sigstore_common");
|
||||
function createBaseTransparencyLogInstance() {
|
||||
return { baseUrl: "", hashAlgorithm: 0, publicKey: undefined, logId: undefined, checkpointKeyId: undefined };
|
||||
}
|
||||
exports.TransparencyLogInstance = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
baseUrl: isSet(object.baseUrl) ? String(object.baseUrl) : "",
|
||||
hashAlgorithm: isSet(object.hashAlgorithm) ? (0, sigstore_common_1.hashAlgorithmFromJSON)(object.hashAlgorithm) : 0,
|
||||
publicKey: isSet(object.publicKey) ? sigstore_common_1.PublicKey.fromJSON(object.publicKey) : undefined,
|
||||
logId: isSet(object.logId) ? sigstore_common_1.LogId.fromJSON(object.logId) : undefined,
|
||||
checkpointKeyId: isSet(object.checkpointKeyId) ? sigstore_common_1.LogId.fromJSON(object.checkpointKeyId) : undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.baseUrl !== undefined && (obj.baseUrl = message.baseUrl);
|
||||
message.hashAlgorithm !== undefined && (obj.hashAlgorithm = (0, sigstore_common_1.hashAlgorithmToJSON)(message.hashAlgorithm));
|
||||
message.publicKey !== undefined &&
|
||||
(obj.publicKey = message.publicKey ? sigstore_common_1.PublicKey.toJSON(message.publicKey) : undefined);
|
||||
message.logId !== undefined && (obj.logId = message.logId ? sigstore_common_1.LogId.toJSON(message.logId) : undefined);
|
||||
message.checkpointKeyId !== undefined &&
|
||||
(obj.checkpointKeyId = message.checkpointKeyId ? sigstore_common_1.LogId.toJSON(message.checkpointKeyId) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseCertificateAuthority() {
|
||||
return { subject: undefined, uri: "", certChain: undefined, validFor: undefined };
|
||||
}
|
||||
exports.CertificateAuthority = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
subject: isSet(object.subject) ? sigstore_common_1.DistinguishedName.fromJSON(object.subject) : undefined,
|
||||
uri: isSet(object.uri) ? String(object.uri) : "",
|
||||
certChain: isSet(object.certChain) ? sigstore_common_1.X509CertificateChain.fromJSON(object.certChain) : undefined,
|
||||
validFor: isSet(object.validFor) ? sigstore_common_1.TimeRange.fromJSON(object.validFor) : undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.subject !== undefined &&
|
||||
(obj.subject = message.subject ? sigstore_common_1.DistinguishedName.toJSON(message.subject) : undefined);
|
||||
message.uri !== undefined && (obj.uri = message.uri);
|
||||
message.certChain !== undefined &&
|
||||
(obj.certChain = message.certChain ? sigstore_common_1.X509CertificateChain.toJSON(message.certChain) : undefined);
|
||||
message.validFor !== undefined &&
|
||||
(obj.validFor = message.validFor ? sigstore_common_1.TimeRange.toJSON(message.validFor) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseTrustedRoot() {
|
||||
return { mediaType: "", tlogs: [], certificateAuthorities: [], ctlogs: [], timestampAuthorities: [] };
|
||||
}
|
||||
exports.TrustedRoot = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
mediaType: isSet(object.mediaType) ? String(object.mediaType) : "",
|
||||
tlogs: Array.isArray(object?.tlogs) ? object.tlogs.map((e) => exports.TransparencyLogInstance.fromJSON(e)) : [],
|
||||
certificateAuthorities: Array.isArray(object?.certificateAuthorities)
|
||||
? object.certificateAuthorities.map((e) => exports.CertificateAuthority.fromJSON(e))
|
||||
: [],
|
||||
ctlogs: Array.isArray(object?.ctlogs)
|
||||
? object.ctlogs.map((e) => exports.TransparencyLogInstance.fromJSON(e))
|
||||
: [],
|
||||
timestampAuthorities: Array.isArray(object?.timestampAuthorities)
|
||||
? object.timestampAuthorities.map((e) => exports.CertificateAuthority.fromJSON(e))
|
||||
: [],
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.mediaType !== undefined && (obj.mediaType = message.mediaType);
|
||||
if (message.tlogs) {
|
||||
obj.tlogs = message.tlogs.map((e) => e ? exports.TransparencyLogInstance.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.tlogs = [];
|
||||
}
|
||||
if (message.certificateAuthorities) {
|
||||
obj.certificateAuthorities = message.certificateAuthorities.map((e) => e ? exports.CertificateAuthority.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.certificateAuthorities = [];
|
||||
}
|
||||
if (message.ctlogs) {
|
||||
obj.ctlogs = message.ctlogs.map((e) => e ? exports.TransparencyLogInstance.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.ctlogs = [];
|
||||
}
|
||||
if (message.timestampAuthorities) {
|
||||
obj.timestampAuthorities = message.timestampAuthorities.map((e) => e ? exports.CertificateAuthority.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.timestampAuthorities = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseSigningConfig() {
|
||||
return { caUrl: "", oidcUrl: "", tlogUrls: [], tsaUrls: [] };
|
||||
}
|
||||
exports.SigningConfig = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
caUrl: isSet(object.caUrl) ? String(object.caUrl) : "",
|
||||
oidcUrl: isSet(object.oidcUrl) ? String(object.oidcUrl) : "",
|
||||
tlogUrls: Array.isArray(object?.tlogUrls) ? object.tlogUrls.map((e) => String(e)) : [],
|
||||
tsaUrls: Array.isArray(object?.tsaUrls) ? object.tsaUrls.map((e) => String(e)) : [],
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.caUrl !== undefined && (obj.caUrl = message.caUrl);
|
||||
message.oidcUrl !== undefined && (obj.oidcUrl = message.oidcUrl);
|
||||
if (message.tlogUrls) {
|
||||
obj.tlogUrls = message.tlogUrls.map((e) => e);
|
||||
}
|
||||
else {
|
||||
obj.tlogUrls = [];
|
||||
}
|
||||
if (message.tsaUrls) {
|
||||
obj.tsaUrls = message.tsaUrls.map((e) => e);
|
||||
}
|
||||
else {
|
||||
obj.tsaUrls = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseClientTrustConfig() {
|
||||
return { mediaType: "", trustedRoot: undefined, signingConfig: undefined };
|
||||
}
|
||||
exports.ClientTrustConfig = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
mediaType: isSet(object.mediaType) ? String(object.mediaType) : "",
|
||||
trustedRoot: isSet(object.trustedRoot) ? exports.TrustedRoot.fromJSON(object.trustedRoot) : undefined,
|
||||
signingConfig: isSet(object.signingConfig) ? exports.SigningConfig.fromJSON(object.signingConfig) : undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.mediaType !== undefined && (obj.mediaType = message.mediaType);
|
||||
message.trustedRoot !== undefined &&
|
||||
(obj.trustedRoot = message.trustedRoot ? exports.TrustedRoot.toJSON(message.trustedRoot) : undefined);
|
||||
message.signingConfig !== undefined &&
|
||||
(obj.signingConfig = message.signingConfig ? exports.SigningConfig.toJSON(message.signingConfig) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function isSet(value) {
|
||||
return value !== null && value !== undefined;
|
||||
}
|
||||
324
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_verification.js
generated
vendored
Normal file
324
package/node_modules/@sigstore/protobuf-specs/dist/__generated__/sigstore_verification.js
generated
vendored
Normal file
@@ -0,0 +1,324 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.Input = exports.Artifact = exports.ArtifactVerificationOptions_ObserverTimestampOptions = exports.ArtifactVerificationOptions_TlogIntegratedTimestampOptions = exports.ArtifactVerificationOptions_TimestampAuthorityOptions = exports.ArtifactVerificationOptions_CtlogOptions = exports.ArtifactVerificationOptions_TlogOptions = exports.ArtifactVerificationOptions = exports.PublicKeyIdentities = exports.CertificateIdentities = exports.CertificateIdentity = void 0;
|
||||
/* eslint-disable */
|
||||
const sigstore_bundle_1 = require("./sigstore_bundle");
|
||||
const sigstore_common_1 = require("./sigstore_common");
|
||||
const sigstore_trustroot_1 = require("./sigstore_trustroot");
|
||||
function createBaseCertificateIdentity() {
|
||||
return { issuer: "", san: undefined, oids: [] };
|
||||
}
|
||||
exports.CertificateIdentity = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
issuer: isSet(object.issuer) ? String(object.issuer) : "",
|
||||
san: isSet(object.san) ? sigstore_common_1.SubjectAlternativeName.fromJSON(object.san) : undefined,
|
||||
oids: Array.isArray(object?.oids) ? object.oids.map((e) => sigstore_common_1.ObjectIdentifierValuePair.fromJSON(e)) : [],
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.issuer !== undefined && (obj.issuer = message.issuer);
|
||||
message.san !== undefined && (obj.san = message.san ? sigstore_common_1.SubjectAlternativeName.toJSON(message.san) : undefined);
|
||||
if (message.oids) {
|
||||
obj.oids = message.oids.map((e) => e ? sigstore_common_1.ObjectIdentifierValuePair.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.oids = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseCertificateIdentities() {
|
||||
return { identities: [] };
|
||||
}
|
||||
exports.CertificateIdentities = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
identities: Array.isArray(object?.identities)
|
||||
? object.identities.map((e) => exports.CertificateIdentity.fromJSON(e))
|
||||
: [],
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
if (message.identities) {
|
||||
obj.identities = message.identities.map((e) => e ? exports.CertificateIdentity.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.identities = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBasePublicKeyIdentities() {
|
||||
return { publicKeys: [] };
|
||||
}
|
||||
exports.PublicKeyIdentities = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
publicKeys: Array.isArray(object?.publicKeys) ? object.publicKeys.map((e) => sigstore_common_1.PublicKey.fromJSON(e)) : [],
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
if (message.publicKeys) {
|
||||
obj.publicKeys = message.publicKeys.map((e) => e ? sigstore_common_1.PublicKey.toJSON(e) : undefined);
|
||||
}
|
||||
else {
|
||||
obj.publicKeys = [];
|
||||
}
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseArtifactVerificationOptions() {
|
||||
return {
|
||||
signers: undefined,
|
||||
tlogOptions: undefined,
|
||||
ctlogOptions: undefined,
|
||||
tsaOptions: undefined,
|
||||
integratedTsOptions: undefined,
|
||||
observerOptions: undefined,
|
||||
};
|
||||
}
|
||||
exports.ArtifactVerificationOptions = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
signers: isSet(object.certificateIdentities)
|
||||
? {
|
||||
$case: "certificateIdentities",
|
||||
certificateIdentities: exports.CertificateIdentities.fromJSON(object.certificateIdentities),
|
||||
}
|
||||
: isSet(object.publicKeys)
|
||||
? { $case: "publicKeys", publicKeys: exports.PublicKeyIdentities.fromJSON(object.publicKeys) }
|
||||
: undefined,
|
||||
tlogOptions: isSet(object.tlogOptions)
|
||||
? exports.ArtifactVerificationOptions_TlogOptions.fromJSON(object.tlogOptions)
|
||||
: undefined,
|
||||
ctlogOptions: isSet(object.ctlogOptions)
|
||||
? exports.ArtifactVerificationOptions_CtlogOptions.fromJSON(object.ctlogOptions)
|
||||
: undefined,
|
||||
tsaOptions: isSet(object.tsaOptions)
|
||||
? exports.ArtifactVerificationOptions_TimestampAuthorityOptions.fromJSON(object.tsaOptions)
|
||||
: undefined,
|
||||
integratedTsOptions: isSet(object.integratedTsOptions)
|
||||
? exports.ArtifactVerificationOptions_TlogIntegratedTimestampOptions.fromJSON(object.integratedTsOptions)
|
||||
: undefined,
|
||||
observerOptions: isSet(object.observerOptions)
|
||||
? exports.ArtifactVerificationOptions_ObserverTimestampOptions.fromJSON(object.observerOptions)
|
||||
: undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.signers?.$case === "certificateIdentities" &&
|
||||
(obj.certificateIdentities = message.signers?.certificateIdentities
|
||||
? exports.CertificateIdentities.toJSON(message.signers?.certificateIdentities)
|
||||
: undefined);
|
||||
message.signers?.$case === "publicKeys" && (obj.publicKeys = message.signers?.publicKeys
|
||||
? exports.PublicKeyIdentities.toJSON(message.signers?.publicKeys)
|
||||
: undefined);
|
||||
message.tlogOptions !== undefined && (obj.tlogOptions = message.tlogOptions
|
||||
? exports.ArtifactVerificationOptions_TlogOptions.toJSON(message.tlogOptions)
|
||||
: undefined);
|
||||
message.ctlogOptions !== undefined && (obj.ctlogOptions = message.ctlogOptions
|
||||
? exports.ArtifactVerificationOptions_CtlogOptions.toJSON(message.ctlogOptions)
|
||||
: undefined);
|
||||
message.tsaOptions !== undefined && (obj.tsaOptions = message.tsaOptions
|
||||
? exports.ArtifactVerificationOptions_TimestampAuthorityOptions.toJSON(message.tsaOptions)
|
||||
: undefined);
|
||||
message.integratedTsOptions !== undefined && (obj.integratedTsOptions = message.integratedTsOptions
|
||||
? exports.ArtifactVerificationOptions_TlogIntegratedTimestampOptions.toJSON(message.integratedTsOptions)
|
||||
: undefined);
|
||||
message.observerOptions !== undefined && (obj.observerOptions = message.observerOptions
|
||||
? exports.ArtifactVerificationOptions_ObserverTimestampOptions.toJSON(message.observerOptions)
|
||||
: undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseArtifactVerificationOptions_TlogOptions() {
|
||||
return { threshold: 0, performOnlineVerification: false, disable: false };
|
||||
}
|
||||
exports.ArtifactVerificationOptions_TlogOptions = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
threshold: isSet(object.threshold) ? Number(object.threshold) : 0,
|
||||
performOnlineVerification: isSet(object.performOnlineVerification)
|
||||
? Boolean(object.performOnlineVerification)
|
||||
: false,
|
||||
disable: isSet(object.disable) ? Boolean(object.disable) : false,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.threshold !== undefined && (obj.threshold = Math.round(message.threshold));
|
||||
message.performOnlineVerification !== undefined &&
|
||||
(obj.performOnlineVerification = message.performOnlineVerification);
|
||||
message.disable !== undefined && (obj.disable = message.disable);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseArtifactVerificationOptions_CtlogOptions() {
|
||||
return { threshold: 0, disable: false };
|
||||
}
|
||||
exports.ArtifactVerificationOptions_CtlogOptions = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
threshold: isSet(object.threshold) ? Number(object.threshold) : 0,
|
||||
disable: isSet(object.disable) ? Boolean(object.disable) : false,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.threshold !== undefined && (obj.threshold = Math.round(message.threshold));
|
||||
message.disable !== undefined && (obj.disable = message.disable);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseArtifactVerificationOptions_TimestampAuthorityOptions() {
|
||||
return { threshold: 0, disable: false };
|
||||
}
|
||||
exports.ArtifactVerificationOptions_TimestampAuthorityOptions = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
threshold: isSet(object.threshold) ? Number(object.threshold) : 0,
|
||||
disable: isSet(object.disable) ? Boolean(object.disable) : false,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.threshold !== undefined && (obj.threshold = Math.round(message.threshold));
|
||||
message.disable !== undefined && (obj.disable = message.disable);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseArtifactVerificationOptions_TlogIntegratedTimestampOptions() {
|
||||
return { threshold: 0, disable: false };
|
||||
}
|
||||
exports.ArtifactVerificationOptions_TlogIntegratedTimestampOptions = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
threshold: isSet(object.threshold) ? Number(object.threshold) : 0,
|
||||
disable: isSet(object.disable) ? Boolean(object.disable) : false,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.threshold !== undefined && (obj.threshold = Math.round(message.threshold));
|
||||
message.disable !== undefined && (obj.disable = message.disable);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseArtifactVerificationOptions_ObserverTimestampOptions() {
|
||||
return { threshold: 0, disable: false };
|
||||
}
|
||||
exports.ArtifactVerificationOptions_ObserverTimestampOptions = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
threshold: isSet(object.threshold) ? Number(object.threshold) : 0,
|
||||
disable: isSet(object.disable) ? Boolean(object.disable) : false,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.threshold !== undefined && (obj.threshold = Math.round(message.threshold));
|
||||
message.disable !== undefined && (obj.disable = message.disable);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseArtifact() {
|
||||
return { data: undefined };
|
||||
}
|
||||
exports.Artifact = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
data: isSet(object.artifactUri)
|
||||
? { $case: "artifactUri", artifactUri: String(object.artifactUri) }
|
||||
: isSet(object.artifact)
|
||||
? { $case: "artifact", artifact: Buffer.from(bytesFromBase64(object.artifact)) }
|
||||
: undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.data?.$case === "artifactUri" && (obj.artifactUri = message.data?.artifactUri);
|
||||
message.data?.$case === "artifact" &&
|
||||
(obj.artifact = message.data?.artifact !== undefined ? base64FromBytes(message.data?.artifact) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
function createBaseInput() {
|
||||
return {
|
||||
artifactTrustRoot: undefined,
|
||||
artifactVerificationOptions: undefined,
|
||||
bundle: undefined,
|
||||
artifact: undefined,
|
||||
};
|
||||
}
|
||||
exports.Input = {
|
||||
fromJSON(object) {
|
||||
return {
|
||||
artifactTrustRoot: isSet(object.artifactTrustRoot) ? sigstore_trustroot_1.TrustedRoot.fromJSON(object.artifactTrustRoot) : undefined,
|
||||
artifactVerificationOptions: isSet(object.artifactVerificationOptions)
|
||||
? exports.ArtifactVerificationOptions.fromJSON(object.artifactVerificationOptions)
|
||||
: undefined,
|
||||
bundle: isSet(object.bundle) ? sigstore_bundle_1.Bundle.fromJSON(object.bundle) : undefined,
|
||||
artifact: isSet(object.artifact) ? exports.Artifact.fromJSON(object.artifact) : undefined,
|
||||
};
|
||||
},
|
||||
toJSON(message) {
|
||||
const obj = {};
|
||||
message.artifactTrustRoot !== undefined &&
|
||||
(obj.artifactTrustRoot = message.artifactTrustRoot ? sigstore_trustroot_1.TrustedRoot.toJSON(message.artifactTrustRoot) : undefined);
|
||||
message.artifactVerificationOptions !== undefined &&
|
||||
(obj.artifactVerificationOptions = message.artifactVerificationOptions
|
||||
? exports.ArtifactVerificationOptions.toJSON(message.artifactVerificationOptions)
|
||||
: undefined);
|
||||
message.bundle !== undefined && (obj.bundle = message.bundle ? sigstore_bundle_1.Bundle.toJSON(message.bundle) : undefined);
|
||||
message.artifact !== undefined && (obj.artifact = message.artifact ? exports.Artifact.toJSON(message.artifact) : undefined);
|
||||
return obj;
|
||||
},
|
||||
};
|
||||
var tsProtoGlobalThis = (() => {
|
||||
if (typeof globalThis !== "undefined") {
|
||||
return globalThis;
|
||||
}
|
||||
if (typeof self !== "undefined") {
|
||||
return self;
|
||||
}
|
||||
if (typeof window !== "undefined") {
|
||||
return window;
|
||||
}
|
||||
if (typeof global !== "undefined") {
|
||||
return global;
|
||||
}
|
||||
throw "Unable to locate global object";
|
||||
})();
|
||||
function bytesFromBase64(b64) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return Uint8Array.from(tsProtoGlobalThis.Buffer.from(b64, "base64"));
|
||||
}
|
||||
else {
|
||||
const bin = tsProtoGlobalThis.atob(b64);
|
||||
const arr = new Uint8Array(bin.length);
|
||||
for (let i = 0; i < bin.length; ++i) {
|
||||
arr[i] = bin.charCodeAt(i);
|
||||
}
|
||||
return arr;
|
||||
}
|
||||
}
|
||||
function base64FromBytes(arr) {
|
||||
if (tsProtoGlobalThis.Buffer) {
|
||||
return tsProtoGlobalThis.Buffer.from(arr).toString("base64");
|
||||
}
|
||||
else {
|
||||
const bin = [];
|
||||
arr.forEach((byte) => {
|
||||
bin.push(String.fromCharCode(byte));
|
||||
});
|
||||
return tsProtoGlobalThis.btoa(bin.join(""));
|
||||
}
|
||||
}
|
||||
function isSet(value) {
|
||||
return value !== null && value !== undefined;
|
||||
}
|
||||
37
package/node_modules/@sigstore/protobuf-specs/dist/index.js
generated
vendored
Normal file
37
package/node_modules/@sigstore/protobuf-specs/dist/index.js
generated
vendored
Normal file
@@ -0,0 +1,37 @@
|
||||
"use strict";
|
||||
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
||||
if (k2 === undefined) k2 = k;
|
||||
var desc = Object.getOwnPropertyDescriptor(m, k);
|
||||
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
||||
desc = { enumerable: true, get: function() { return m[k]; } };
|
||||
}
|
||||
Object.defineProperty(o, k2, desc);
|
||||
}) : (function(o, m, k, k2) {
|
||||
if (k2 === undefined) k2 = k;
|
||||
o[k2] = m[k];
|
||||
}));
|
||||
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
||||
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
||||
};
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
/*
|
||||
Copyright 2023 The Sigstore Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
__exportStar(require("./__generated__/envelope"), exports);
|
||||
__exportStar(require("./__generated__/sigstore_bundle"), exports);
|
||||
__exportStar(require("./__generated__/sigstore_common"), exports);
|
||||
__exportStar(require("./__generated__/sigstore_rekor"), exports);
|
||||
__exportStar(require("./__generated__/sigstore_trustroot"), exports);
|
||||
__exportStar(require("./__generated__/sigstore_verification"), exports);
|
||||
31
package/node_modules/@sigstore/protobuf-specs/package.json
generated
vendored
Normal file
31
package/node_modules/@sigstore/protobuf-specs/package.json
generated
vendored
Normal file
@@ -0,0 +1,31 @@
|
||||
{
|
||||
"name": "@sigstore/protobuf-specs",
|
||||
"version": "0.3.2",
|
||||
"description": "code-signing for npm packages",
|
||||
"main": "dist/index.js",
|
||||
"types": "dist/index.d.ts",
|
||||
"scripts": {
|
||||
"build": "tsc"
|
||||
},
|
||||
"repository": {
|
||||
"type": "git",
|
||||
"url": "git+https://github.com/sigstore/protobuf-specs.git"
|
||||
},
|
||||
"files": [
|
||||
"dist"
|
||||
],
|
||||
"author": "bdehamer@github.com",
|
||||
"license": "Apache-2.0",
|
||||
"bugs": {
|
||||
"url": "https://github.com/sigstore/protobuf-specs/issues"
|
||||
},
|
||||
"homepage": "https://github.com/sigstore/protobuf-specs#readme",
|
||||
"devDependencies": {
|
||||
"@tsconfig/node16": "^16.1.1",
|
||||
"@types/node": "^18.14.0",
|
||||
"typescript": "^4.9.5"
|
||||
},
|
||||
"engines": {
|
||||
"node": "^16.14.0 || >=18.0.0"
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user