Skip to content

Commit

Permalink
Update capabilities.json
Browse files Browse the repository at this point in the history
Signed-off-by: Anders Eknert <[email protected]>
  • Loading branch information
anderseknert committed May 22, 2024
1 parent 1b0e3fa commit 0d2ecb5
Showing 1 changed file with 106 additions and 0 deletions.
106 changes: 106 additions & 0 deletions build/capabilities.json
Original file line number Diff line number Diff line change
Expand Up @@ -947,6 +947,57 @@
"type": "function"
}
},
{
"name": "crypto.x509.parse_and_verify_certificates_with_options",
"description": "Returns one or more certificates from the given string containing PEM\nor base64 encoded DER certificates after verifying the supplied certificates form a complete\ncertificate chain back to a trusted root. A config option passed as the second argument can\nbe used to configure the validation options used.\n\nThe first certificate is treated as the root and the last is treated as the leaf,\nwith all others being treated as intermediates.",
"decl": {
"args": [
{
"description": "base64 encoded DER or PEM data containing two or more certificates where the first is a root CA, the last is a leaf certificate, and all others are intermediate CAs",
"name": "certs",
"type": "string"
},
{
"description": "object containing extra configs to verify the validity of certificates. `options` object supports four fields which maps to same fields in [x509.VerifyOptions struct](https://pkg.go.dev/crypto/x509#VerifyOptions). `DNSName`, `CurrentTime`: Nanoseconds since the Unix Epoch as a number, `MaxConstraintComparisons` and `KeyUsages`. `KeyUsages` is list and can have possible values as in: `\"KeyUsageAny\"`, `\"KeyUsageServerAuth\"`, `\"KeyUsageClientAuth\"`, `\"KeyUsageCodeSigning\"`, `\"KeyUsageEmailProtection\"`, `\"KeyUsageIPSECEndSystem\"`, `\"KeyUsageIPSECTunnel\"`, `\"KeyUsageIPSECUser\"`, `\"KeyUsageTimeStamping\"`, `\"KeyUsageOCSPSigning\"`, `\"KeyUsageMicrosoftServerGatedCrypto\"`, `\"KeyUsageNetscapeServerGatedCrypto\"`, `\"KeyUsageMicrosoftCommercialCodeSigning\"`, `\"KeyUsageMicrosoftKernelCodeSigning\"` ",
"dynamic": {
"key": {
"type": "string"
},
"value": {
"type": "any"
}
},
"name": "options",
"type": "object"
}
],
"result": {
"description": "array of `[valid, certs]`: if the input certificate chain could be verified then `valid` is `true` and `certs` is an array of X.509 certificates represented as objects; if the input certificate chain could not be verified then `valid` is `false` and `certs` is `[]`",
"name": "output",
"static": [
{
"type": "boolean"
},
{
"dynamic": {
"dynamic": {
"key": {
"type": "string"
},
"value": {
"type": "any"
}
},
"type": "object"
},
"type": "array"
}
],
"type": "array"
},
"type": "function"
}
},
{
"name": "crypto.x509.parse_certificate_request",
"description": "Returns a PKCS #10 certificate signing request from the given PEM-encoded PKCS#10 certificate signing request.",
Expand Down Expand Up @@ -2752,6 +2803,61 @@
"type": "function"
}
},
{
"name": "json.marshal_with_options",
"description": "Serializes the input term JSON, with additional formatting options via the `opts` parameter. `opts` accepts keys `pretty` (enable multi-line/formatted JSON), `prefix` (string to prefix lines with, default empty string) and `indent` (string to indent with, default `\\t`).",
"categories": [
"encoding"
],
"decl": {
"args": [
{
"description": "the term to serialize",
"name": "x",
"type": "any"
},
{
"description": "encoding options",
"dynamic": {
"key": {
"type": "string"
},
"value": {
"type": "any"
}
},
"name": "opts",
"static": [
{
"key": "indent",
"value": {
"type": "string"
}
},
{
"key": "prefix",
"value": {
"type": "string"
}
},
{
"key": "pretty",
"value": {
"type": "boolean"
}
}
],
"type": "object"
}
],
"result": {
"description": "the JSON string representation of `x`, with configured prefix/indent string(s) as appropriate",
"name": "y",
"type": "string"
},
"type": "function"
}
},
{
"name": "json.match_schema",
"description": "Checks that the document matches the JSON schema.",
Expand Down

0 comments on commit 0d2ecb5

Please sign in to comment.