WIP - add extractor, generate snippet_data
This commit is contained in:
10
node_modules/devcert-san/dist/constants.d.ts
generated
vendored
Normal file
10
node_modules/devcert-san/dist/constants.d.ts
generated
vendored
Normal file
@ -0,0 +1,10 @@
|
||||
export declare const isMac: boolean;
|
||||
export declare const isLinux: boolean;
|
||||
export declare const isWindows: boolean;
|
||||
export declare let configDir: string;
|
||||
export declare const configPath: (...pathSegments: string[]) => string;
|
||||
export declare const opensslConfTemplate: string;
|
||||
export declare const opensslConfPath: string;
|
||||
export declare const rootKeyPath: string;
|
||||
export declare const rootCertPath: string;
|
||||
export declare const caCertsDir: string;
|
||||
24
node_modules/devcert-san/dist/constants.js
generated
vendored
Normal file
24
node_modules/devcert-san/dist/constants.js
generated
vendored
Normal file
@ -0,0 +1,24 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
const path = require("path");
|
||||
const mkdirp = require("mkdirp");
|
||||
exports.isMac = process.platform === 'darwin';
|
||||
exports.isLinux = process.platform === 'linux';
|
||||
exports.isWindows = process.platform === 'win32';
|
||||
if (exports.isWindows && process.env.LOCALAPPDATA) {
|
||||
exports.configDir = path.join(process.env.LOCALAPPDATA, 'devcert', 'config');
|
||||
}
|
||||
else {
|
||||
let uid = process.getuid && process.getuid();
|
||||
let userHome = (exports.isLinux && uid === 0) ? path.resolve('/usr/local/share') : require('os').homedir();
|
||||
exports.configDir = path.join(userHome, '.config', 'devcert');
|
||||
}
|
||||
exports.configPath = path.join.bind(path, exports.configDir);
|
||||
exports.opensslConfTemplate = path.join(__dirname, '..', 'openssl.conf');
|
||||
exports.opensslConfPath = exports.configPath('openssl.conf');
|
||||
exports.rootKeyPath = exports.configPath('devcert-ca-root.key');
|
||||
exports.rootCertPath = exports.configPath('devcert-ca-root.crt');
|
||||
exports.caCertsDir = exports.configPath('certs');
|
||||
mkdirp.sync(exports.configDir);
|
||||
mkdirp.sync(exports.caCertsDir);
|
||||
//# sourceMappingURL=data:application/json;base64,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
|
||||
20
node_modules/devcert-san/dist/index.d.ts
generated
vendored
Normal file
20
node_modules/devcert-san/dist/index.d.ts
generated
vendored
Normal file
@ -0,0 +1,20 @@
|
||||
/// <reference types="node" />
|
||||
/**
|
||||
* Request an SSL certificate for the given app name signed by the devcert root certificate
|
||||
* authority. If devcert has previously generated a certificate for that app name on this machine,
|
||||
* it will reuse that certificate.
|
||||
*
|
||||
* If this is the first time devcert is being run on this machine, it will generate and attempt to
|
||||
* install a root certificate authority.
|
||||
*
|
||||
* Returns a promise that resolves with { keyPath, certPath, key, cert }, where `key` and `cert` are
|
||||
* Buffers with the contents of `keyPath` and `certPath`, respectively.
|
||||
*/
|
||||
export default function devcert(appName: string, options?: {
|
||||
installCertutil?: boolean;
|
||||
}): Promise<{
|
||||
keyPath: string;
|
||||
certPath: string;
|
||||
key: Buffer;
|
||||
cert: Buffer;
|
||||
}>;
|
||||
61
node_modules/devcert-san/dist/index.js
generated
vendored
Normal file
61
node_modules/devcert-san/dist/index.js
generated
vendored
Normal file
File diff suppressed because one or more lines are too long
1
node_modules/devcert-san/dist/root-authority.d.ts
generated
vendored
Normal file
1
node_modules/devcert-san/dist/root-authority.d.ts
generated
vendored
Normal file
@ -0,0 +1 @@
|
||||
export default function installCertificateAuthority(installCertutil: boolean): Promise<void>;
|
||||
229
node_modules/devcert-san/dist/root-authority.js
generated
vendored
Normal file
229
node_modules/devcert-san/dist/root-authority.js
generated
vendored
Normal file
File diff suppressed because one or more lines are too long
6
node_modules/devcert-san/dist/utils.d.ts
generated
vendored
Normal file
6
node_modules/devcert-san/dist/utils.d.ts
generated
vendored
Normal file
@ -0,0 +1,6 @@
|
||||
/// <reference types="node" />
|
||||
import { ExecSyncOptions } from 'child_process';
|
||||
export declare function openssl(cmd: string): Buffer;
|
||||
export declare function run(cmd: string, options?: ExecSyncOptions): Buffer;
|
||||
export declare function waitForUser(): Promise<{}>;
|
||||
export declare function generateKey(filename: string): void;
|
||||
37
node_modules/devcert-san/dist/utils.js
generated
vendored
Normal file
37
node_modules/devcert-san/dist/utils.js
generated
vendored
Normal file
@ -0,0 +1,37 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
const fs_1 = require("fs");
|
||||
const child_process_1 = require("child_process");
|
||||
const createDebug = require("debug");
|
||||
const path = require("path");
|
||||
const constants_1 = require("./constants");
|
||||
const debug = createDebug('devcert');
|
||||
function openssl(cmd) {
|
||||
return run(`openssl ${cmd}`, {
|
||||
stdio: 'ignore',
|
||||
env: Object.assign({
|
||||
RANDFILE: path.join(constants_1.configPath('.rnd'))
|
||||
}, process.env)
|
||||
});
|
||||
}
|
||||
exports.openssl = openssl;
|
||||
function run(cmd, options = {}) {
|
||||
debug(`exec: \`${cmd}\``);
|
||||
return child_process_1.execSync(cmd, options);
|
||||
}
|
||||
exports.run = run;
|
||||
function waitForUser() {
|
||||
return new Promise((resolve) => {
|
||||
process.stdin.resume();
|
||||
process.stdin.on('data', resolve);
|
||||
});
|
||||
}
|
||||
exports.waitForUser = waitForUser;
|
||||
// Generate a cryptographic key, used to sign certificates or certificate signing requests.
|
||||
function generateKey(filename) {
|
||||
debug(`generateKey: ${filename}`);
|
||||
openssl(`genrsa -out ${filename} 2048`);
|
||||
fs_1.chmodSync(filename, 400);
|
||||
}
|
||||
exports.generateKey = generateKey;
|
||||
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidXRpbHMuanMiLCJzb3VyY2VSb290IjoiL1VzZXJzL2phc29ubWlsbGVyL1Byb2plY3RzL2l0YWx5L2RldmNlcnQvIiwic291cmNlcyI6WyJ1dGlscy50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOztBQUFBLDJCQUErQjtBQUMvQixpREFBZ0U7QUFDaEUscUNBQXFDO0FBQ3JDLDZCQUE2QjtBQUU3QiwyQ0FFcUI7QUFFckIsTUFBTSxLQUFLLEdBQUcsV0FBVyxDQUFDLFNBQVMsQ0FBQyxDQUFDO0FBRXJDLGlCQUF3QixHQUFXO0lBQ2pDLE1BQU0sQ0FBQyxHQUFHLENBQUMsV0FBWSxHQUFJLEVBQUUsRUFBRTtRQUM3QixLQUFLLEVBQUUsUUFBUTtRQUNmLEdBQUcsRUFBRSxNQUFNLENBQUMsTUFBTSxDQUFDO1lBQ2pCLFFBQVEsRUFBRSxJQUFJLENBQUMsSUFBSSxDQUFDLHNCQUFVLENBQUMsTUFBTSxDQUFDLENBQUM7U0FDeEMsRUFBRSxPQUFPLENBQUMsR0FBRyxDQUFDO0tBQ2hCLENBQUMsQ0FBQztBQUNMLENBQUM7QUFQRCwwQkFPQztBQUVELGFBQW9CLEdBQVcsRUFBRSxVQUEyQixFQUFFO0lBQzVELEtBQUssQ0FBQyxXQUFZLEdBQUksSUFBSSxDQUFDLENBQUM7SUFDNUIsTUFBTSxDQUFDLHdCQUFRLENBQUMsR0FBRyxFQUFFLE9BQU8sQ0FBQyxDQUFDO0FBQ2hDLENBQUM7QUFIRCxrQkFHQztBQUVEO0lBQ0UsTUFBTSxDQUFDLElBQUksT0FBTyxDQUFDLENBQUMsT0FBTztRQUN6QixPQUFPLENBQUMsS0FBSyxDQUFDLE1BQU0sRUFBRSxDQUFDO1FBQ3ZCLE9BQU8sQ0FBQyxLQUFLLENBQUMsRUFBRSxDQUFDLE1BQU0sRUFBRSxPQUFPLENBQUMsQ0FBQztJQUNwQyxDQUFDLENBQUMsQ0FBQztBQUNMLENBQUM7QUFMRCxrQ0FLQztBQUVELDJGQUEyRjtBQUMzRixxQkFBNEIsUUFBZ0I7SUFDMUMsS0FBSyxDQUFDLGdCQUFpQixRQUFTLEVBQUUsQ0FBQyxDQUFDO0lBQ3BDLE9BQU8sQ0FBQyxlQUFnQixRQUFTLE9BQU8sQ0FBQyxDQUFDO0lBQzFDLGNBQVMsQ0FBQyxRQUFRLEVBQUUsR0FBRyxDQUFDLENBQUM7QUFDM0IsQ0FBQztBQUpELGtDQUlDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IHsgY2htb2RTeW5jIH0gZnJvbSAnZnMnO1xuaW1wb3J0IHsgZXhlYywgZXhlY1N5bmMsIEV4ZWNTeW5jT3B0aW9ucyB9IGZyb20gJ2NoaWxkX3Byb2Nlc3MnO1xuaW1wb3J0ICogYXMgY3JlYXRlRGVidWcgZnJvbSAnZGVidWcnO1xuaW1wb3J0ICogYXMgcGF0aCBmcm9tICdwYXRoJztcblxuaW1wb3J0IHtcbiAgY29uZmlnUGF0aCxcbn0gZnJvbSAnLi9jb25zdGFudHMnO1xuXG5jb25zdCBkZWJ1ZyA9IGNyZWF0ZURlYnVnKCdkZXZjZXJ0Jyk7XG5cbmV4cG9ydCBmdW5jdGlvbiBvcGVuc3NsKGNtZDogc3RyaW5nKSB7XG4gIHJldHVybiBydW4oYG9wZW5zc2wgJHsgY21kIH1gLCB7XG4gICAgc3RkaW86ICdpZ25vcmUnLFxuICAgIGVudjogT2JqZWN0LmFzc2lnbih7XG4gICAgICBSQU5ERklMRTogcGF0aC5qb2luKGNvbmZpZ1BhdGgoJy5ybmQnKSlcbiAgICB9LCBwcm9jZXNzLmVudilcbiAgfSk7XG59XG5cbmV4cG9ydCBmdW5jdGlvbiBydW4oY21kOiBzdHJpbmcsIG9wdGlvbnM6IEV4ZWNTeW5jT3B0aW9ucyA9IHt9KSB7XG4gIGRlYnVnKGBleGVjOiBcXGAkeyBjbWQgfVxcYGApO1xuICByZXR1cm4gZXhlY1N5bmMoY21kLCBvcHRpb25zKTtcbn1cblxuZXhwb3J0IGZ1bmN0aW9uIHdhaXRGb3JVc2VyKCkge1xuICByZXR1cm4gbmV3IFByb21pc2UoKHJlc29sdmUpID0+IHtcbiAgICBwcm9jZXNzLnN0ZGluLnJlc3VtZSgpO1xuICAgIHByb2Nlc3Muc3RkaW4ub24oJ2RhdGEnLCByZXNvbHZlKTtcbiAgfSk7XG59XG5cbi8vIEdlbmVyYXRlIGEgY3J5cHRvZ3JhcGhpYyBrZXksIHVzZWQgdG8gc2lnbiBjZXJ0aWZpY2F0ZXMgb3IgY2VydGlmaWNhdGUgc2lnbmluZyByZXF1ZXN0cy5cbmV4cG9ydCBmdW5jdGlvbiBnZW5lcmF0ZUtleShmaWxlbmFtZTogc3RyaW5nKTogdm9pZCB7XG4gIGRlYnVnKGBnZW5lcmF0ZUtleTogJHsgZmlsZW5hbWUgfWApO1xuICBvcGVuc3NsKGBnZW5yc2EgLW91dCAkeyBmaWxlbmFtZSB9IDIwNDhgKTtcbiAgY2htb2RTeW5jKGZpbGVuYW1lLCA0MDApO1xufVxuIl19
|
||||
Reference in New Issue
Block a user