/third_party/node/deps/npm/node_modules/tuf-js/dist/ |
D | store.js | 5 const error_1 = require("./error"); constant 36 throw new error_1.RepositoryError(`Expected 'root', got ${newRoot.signed.type}`); 42 …throw new error_1.BadVersionError(`Expected version ${this.root.signed.version + 1}, got ${newRoot… 52 throw new error_1.RuntimeError('Cannot update timestamp after snapshot'); 55 throw new error_1.ExpiredMetadataError('Final root.json is expired'); 60 … throw new error_1.RepositoryError(`Expected 'timestamp', got ${newTimestamp.signed.type}`); 68 …throw new error_1.BadVersionError(`New timestamp version ${newTimestamp.signed.version} is less th… 72 …throw new error_1.EqualVersionError(`New timestamp version ${newTimestamp.signed.version} is equal… 79 …throw new error_1.BadVersionError(`New snapshot version ${newSnapshotMeta.version} is less than cu… 91 throw new error_1.RuntimeError('Cannot update snapshot before timestamp'); [all …]
|
D | updater.js | 35 const error_1 = require("./error"); constant 96 throw new error_1.ValueError('Target base URL not set'); 189 if (error instanceof error_1.EqualVersionError) { 225 throw new error_1.RuntimeError(`Unable to load snapshot metadata error ${error}`); 260 throw new error_1.RuntimeError(`Unable to load targets error ${error}`); 326 throw new error_1.ValueError('Target directory not set'); 339 … throw new error_1.PersistError(`Failed to persist metadata ${metaDataName} error: ${error}`);
|
/third_party/node/deps/npm/node_modules/@sigstore/core/dist/asn1/ |
D | obj.js | 20 const error_1 = require("./error"); constant 58 throw new error_1.ASN1TypeError('not a boolean'); 66 throw new error_1.ASN1TypeError('not an integer'); 74 throw new error_1.ASN1TypeError('not an OID'); 87 throw new error_1.ASN1TypeError('not a date'); 95 throw new error_1.ASN1TypeError('not a bit string'); 140 throw new error_1.ASN1ParseError('invalid length'); 149 throw new error_1.ASN1ParseError('invalid length');
|
D | length.js | 19 const error_1 = require("./error"); constant 34 throw new error_1.ASN1ParseError('length exceeds 6 byte limit'); 43 throw new error_1.ASN1ParseError('indefinite length encoding not supported');
|
/third_party/node/deps/npm/node_modules/@tufjs/models/dist/ |
D | file.js | 9 const error_1 = require("./error"); constant 17 throw new error_1.ValueError('Metafile version must be at least 1'); 40 …throw new error_1.LengthOrHashMismatchError(`Expected length ${this.length} but got ${data.length}… 51 … throw new error_1.LengthOrHashMismatchError(`Hash algorithm ${key} not supported`); 55 … throw new error_1.LengthOrHashMismatchError(`Expected hash ${value} but got ${observedHash}`); 128 throw new error_1.LengthOrHashMismatchError(`Hash algorithm ${key} not supported`); 143 …throw new error_1.LengthOrHashMismatchError(`Expected length ${this.length} but got ${observedLeng… 150 … throw new error_1.LengthOrHashMismatchError(`Expected hash ${expected} but got ${actual}`); 181 throw new error_1.ValueError('Length must be at least 0');
|
D | key.js | 8 const error_1 = require("./error"); constant 26 throw new error_1.UnsignedMetadataError('no signature for key found in metadata'); 28 throw new error_1.UnsignedMetadataError('no public key found'); 37 throw new error_1.UnsignedMetadataError(`failed to verify ${this.keyID} signature`); 41 if (error instanceof error_1.UnsignedMetadataError) { 44 throw new error_1.UnsignedMetadataError(`failed to verify ${this.keyID} signature`);
|
D | metadata.js | 10 const error_1 = require("./error"); constant 65 throw new error_1.ValueError(`No delegations found for ${delegatedRole}`); 81 throw new error_1.ValueError(`no delegation found for ${delegatedRole}`); 99 …throw new error_1.UnsignedMetadataError(`${delegatedRole} was signed by ${signingKeys.size}/${role… 126 throw new error_1.ValueError(`expected '${type}', got ${signed['_type']}`);
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/timestamp/ |
D | checkpoint.js | 20 const error_1 = require("../error"); constant 50 throw new error_1.VerificationError({ 58 throw new error_1.VerificationError({ 91 throw new error_1.VerificationError({ 109 throw new error_1.VerificationError({ 121 throw new error_1.VerificationError({ 147 throw new error_1.VerificationError({
|
D | tsa.js | 5 const error_1 = require("../error"); constant 32 throw new error_1.VerificationError({ 51 throw new error_1.VerificationError({ 59 throw new error_1.VerificationError({
|
D | merkle.js | 20 const error_1 = require("../error"); constant 28 throw new error_1.VerificationError({ 37 throw new error_1.VerificationError({ 50 throw new error_1.VerificationError({
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/ |
D | certificate.js | 4 const error_1 = require("../error"); constant 29 throw new error_1.VerificationError({ 60 throw new error_1.VerificationError({ 78 throw new error_1.VerificationError({ 148 throw new error_1.VerificationError({ 156 throw new error_1.VerificationError({ 166 throw new error_1.VerificationError({ 184 throw new error_1.VerificationError({
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/tlog/ |
D | dsse.js | 19 const error_1 = require("../error"); constant 26 throw new error_1.VerificationError({ 37 throw new error_1.VerificationError({ 45 throw new error_1.VerificationError({ 53 throw new error_1.VerificationError({
|
D | intoto.js | 19 const error_1 = require("../error"); constant 26 throw new error_1.VerificationError({ 37 throw new error_1.VerificationError({ 46 throw new error_1.VerificationError({ 54 throw new error_1.VerificationError({
|
D | hashedrekord.js | 19 const error_1 = require("../error"); constant 26 throw new error_1.VerificationError({ 39 throw new error_1.VerificationError({ 47 throw new error_1.VerificationError({
|
D | index.js | 19 const error_1 = require("../error"); constant 28 throw new error_1.VerificationError({ 42 throw new error_1.VerificationError({
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/ |
D | verifier.js | 20 const error_1 = require("./error"); constant 60 throw new error_1.VerificationError({ 66 throw new error_1.VerificationError({ 72 throw new error_1.VerificationError({ 90 throw new error_1.VerificationError({ 96 throw new error_1.VerificationError({ 112 throw new error_1.VerificationError({
|
D | policy.js | 4 const error_1 = require("./error"); constant 7 throw new error_1.PolicyError({ 18 throw new error_1.PolicyError({
|
D | index.js | 22 var error_1 = require("./error"); variable 23 Object.defineProperty(exports, "PolicyError", { enumerable: true, get: function () { return error_1… 24 …orts, "VerificationError", { enumerable: true, get: function () { return error_1.VerificationError…
|
/third_party/node/deps/npm/node_modules/@sigstore/tuf/dist/ |
D | target.js | 23 const error_1 = require("./error"); constant 30 reject(new error_1.TUFError({ 52 throw new error_1.TUFError({ 59 throw new error_1.TUFError({ 72 throw new error_1.TUFError({
|
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/external/ |
D | rekor.js | 24 const error_1 = require("./error"); constant 52 await (0, error_1.checkStatus)(response); 64 await (0, error_1.checkStatus)(response); 80 await (0, error_1.checkStatus)(response); 96 await (0, error_1.checkStatus)(response);
|
/third_party/node/deps/npm/node_modules/@tufjs/models/dist/utils/ |
D | key.js | 8 const error_1 = require("../error"); constant 28 throw new error_1.UnsupportedAlgorithmError(`Unsupported key type: ${keyInfo.keyType}`); 35 throw new error_1.CryptoError('Invalid key format'); 45 … throw new error_1.UnsupportedAlgorithmError(`Unsupported RSA scheme: ${keyInfo.scheme}`); 57 throw new error_1.CryptoError('Invalid key format'); 76 throw new error_1.CryptoError('Invalid key format');
|
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/signer/fulcio/ |
D | index.js | 19 const error_1 = require("../../error"); constant 46 throw new error_1.InternalError({ 55 throw new error_1.InternalError({ 79 throw new error_1.InternalError({
|
/third_party/node/deps/npm/node_modules/@sigstore/core/dist/rfc3161/ |
D | timestamp.js | 45 const error_1 = require("./error"); constant 93 throw new error_1.RFC3161TimestampVerificationError('timeStampToken is missing'); 97 …throw new error_1.RFC3161TimestampVerificationError(`incorrect content type: ${this.contentType}`); 101 …throw new error_1.RFC3161TimestampVerificationError(`incorrect encapsulated content type: ${this.e… 115 … throw new error_1.RFC3161TimestampVerificationError('signed data does not match tstInfo'); 125 throw new error_1.RFC3161TimestampVerificationError('signature verification failed');
|
/third_party/node/deps/npm/node_modules/@sigstore/bundle/dist/ |
D | validate.js | 19 const error_1 = require("./error"); constant 27 throw new error_1.ValidationError('invalid bundle', invalidValues); 37 throw new error_1.ValidationError('invalid v0.1 bundle', invalidValues); 58 throw new error_1.ValidationError('invalid v0.2 bundle', invalidValues); 69 throw new error_1.ValidationError('invalid bundle', invalidValues);
|
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/witness/tlog/ |
D | client.js | 19 const error_1 = require("../../error"); constant 46 … (0, error_1.internalError)(err, 'TLOG_FETCH_ENTRY_ERROR', 'error fetching tlog entry'); 50 … (0, error_1.internalError)(err, 'TLOG_CREATE_ENTRY_ERROR', 'error creating tlog entry');
|