-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathpackage.json
More file actions
94 lines (94 loc) · 3.95 KB
/
package.json
File metadata and controls
94 lines (94 loc) · 3.95 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
{
"name": "serverless-ssh-ca",
"private": true,
"cloudflare": {
"bindings": {
"ISSUER_DN": {
"description": "This is the issuer name for your SSH certificate authority"
},
"JWT_JWKS_URL": {
"description": "This is the URL for the JWKS so the CA can verify the JWT provided by the client"
},
"JWT_AUD": {
"description": "The expected audience (AUD) of the JWT. May be a comma seperated list, a single string or a blank string to disable validating the AUD claim of the JWT"
},
"JWT_ISSUER": {
"description": "The issuer of the JWT access and identity tokens provided by the client"
},
"JWT_ALGORITHMS": {
"description": "The supported JWT algorithms as a comma seperated list"
},
"JWT_SSH_CERTIFICATE_PRINCIPALS_CLAIM": {
"description": "The OIDC 'group' claim that contains additional SSH principals to add to the certificate. If ommitted only the default claims (via 'SSH_CERTIFICATE_PRINCIPALS' and 'SSH_CERTIFICATE_INCLUDE_SELF') are added"
},
"SSH_CERTIFICATE_LIFETIME": {
"description": "The lifetime of the issued SSH certificates in human readable form (ie '24 hours'), although the client may request a shorter duration"
},
"SSH_CERTIFICATE_PRINCIPALS": {
"description": "A comma seperated list of additional principals to add to all issued user certificates"
},
"SSH_CERTIFICATE_INCLUDE_SELF": {
"description": "Whether to add the users own name as a valid principal (based on the part before the @ symbol in the JWT email claim)"
},
"SSH_CERTIFICATE_EXTENSIONS": {
"description": "A comma serverless list of SSH extensions to add to the certificate, although the client may request a smaller list"
},
"SSH_HOST_CERTIFICATE_LIFETIME": {
"description": "The lifetime of issued Host SSH certificates in human readable form (ie '45 days'), although the client may request a shorter duration"
},
"SSH_HOST_CERTIFICATE_ALLOWED_EMAILS": {
"description": "A comma seperated list of users who are permitted to request SSH host certificates based on the email claim from the OIDC IdP"
},
"SSH_HOST_CERTIFICATE_ALLOWED_ROLES": {
"description": "A comma seperated list of roles who are permitted to request SSH host certificates based on the role claim from the OIDC IdP"
},
"SSH_HOST_CERTIFICATE_ALLOWED_ROLES_CLAIM": {
"description": "The claim that contains the roles who are permitted to request SSH host certificates"
},
"PRIVATE_KEY": {
"description": "The ECDSA private key to use in OpenSSH format"
},
"CERTIFICATE_REQUEST_TIME_SKEW_MAX": {
"description": "The maximum time offset/skew allowed for certificate requests from a client in human readable form (ie '5 minutes')"
},
"DB_CERTIFICATE_RETENTION": {
"description": "The period of time to retain issued certificates in the database (ie '1 year' or 'infinite' to never purge the database)"
},
"LOG_LEVEL": {
"description": "Set this to debug to enable additional Worker logging"
}
}
},
"scripts": {
"build": "wrangler deploy --dry-run --outdir dist",
"deploy": "npm-run-all migrations:apply:deploy wrangler:deploy",
"dev": "npm-run-all migrations:apply:dev wrangler:dev",
"cf-typegen": "wrangler types",
"coverage": "vitest run --coverage",
"migrations:apply:dev": "wrangler d1 migrations apply DB --local",
"migrations:apply:deploy": "wrangler d1 migrations apply DB --remote",
"test": "vitest run",
"wrangler:dev": "wrangler dev",
"wrangler:deploy": "wrangler deploy"
},
"dependencies": {
"@andrewheberle/ts-slog": "^1.3.0",
"@cloudflare/actors": "^0.0.1-beta.6",
"chanfana": "^3.0.0",
"hono": "^4.10.6",
"itty-time": "^2.0.2",
"jose": "^6.0.12",
"sshpk": "^1.18.0",
"zod": "^4.0.0"
},
"devDependencies": {
"@cloudflare/vitest-pool-workers": "^0.14.0",
"@types/sshpk": "^1.17.4",
"@vitest/coverage-istanbul": "^4.1.1",
"npm-run-all2": "^8.0.0",
"tsx": "^4.21.0",
"typescript": "^6.0.0",
"vitest": "^4.1.1",
"wrangler": "^4.73.0"
}
}