@commit451/salamander 1.2.1 ā 1.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +42 -42
- package/bin/salamander.js +1 -1
- package/dist/commands/runner-selection.d.ts +1 -1
- package/dist/commands/runner-selection.d.ts.map +1 -1
- package/dist/commands/runner-selection.js +75 -12
- package/dist/commands/runner-selection.js.map +1 -1
- package/dist/config/firebase.d.ts +2 -0
- package/dist/config/firebase.d.ts.map +1 -1
- package/dist/config/firebase.js +16 -0
- package/dist/config/firebase.js.map +1 -1
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +19 -0
- package/dist/index.js.map +1 -1
- package/dist/services/auth.d.ts +1 -0
- package/dist/services/auth.d.ts.map +1 -1
- package/dist/services/auth.js +51 -61
- package/dist/services/auth.js.map +1 -1
- package/dist/services/command-listener.d.ts +1 -0
- package/dist/services/command-listener.d.ts.map +1 -1
- package/dist/services/command-listener.js +30 -7
- package/dist/services/command-listener.js.map +1 -1
- package/dist/services/crypto.d.ts +52 -0
- package/dist/services/crypto.d.ts.map +1 -0
- package/dist/services/crypto.js +104 -0
- package/dist/services/crypto.js.map +1 -0
- package/dist/services/key-manager.d.ts +45 -0
- package/dist/services/key-manager.d.ts.map +1 -0
- package/dist/services/key-manager.js +123 -0
- package/dist/services/key-manager.js.map +1 -0
- package/dist/services/multi-device-key-manager.d.ts +56 -0
- package/dist/services/multi-device-key-manager.d.ts.map +1 -0
- package/dist/services/multi-device-key-manager.js +159 -0
- package/dist/services/multi-device-key-manager.js.map +1 -0
- package/dist/services/runner.d.ts.map +1 -1
- package/dist/services/runner.js +56 -19
- package/dist/services/runner.js.map +1 -1
- package/dist/utils/file-persistence.d.ts +19 -0
- package/dist/utils/file-persistence.d.ts.map +1 -0
- package/dist/utils/file-persistence.js +64 -0
- package/dist/utils/file-persistence.js.map +1 -0
- package/dist/utils/storage.d.ts +5 -0
- package/dist/utils/storage.d.ts.map +1 -1
- package/dist/utils/storage.js +14 -0
- package/dist/utils/storage.js.map +1 -1
- package/package.json +52 -52
|
@@ -10,6 +10,7 @@ export class CommandListener {
|
|
|
10
10
|
activeListeners = new Map();
|
|
11
11
|
isShuttingDown = false;
|
|
12
12
|
rl = null;
|
|
13
|
+
quitResolve = null;
|
|
13
14
|
static getInstance() {
|
|
14
15
|
if (!CommandListener.instance) {
|
|
15
16
|
CommandListener.instance = new CommandListener();
|
|
@@ -17,6 +18,8 @@ export class CommandListener {
|
|
|
17
18
|
return CommandListener.instance;
|
|
18
19
|
}
|
|
19
20
|
async startListening(runner) {
|
|
21
|
+
// Reset state for reuse after returning from menu
|
|
22
|
+
this.isShuttingDown = false;
|
|
20
23
|
if (this.activeListeners.has(runner.id)) {
|
|
21
24
|
console.log(chalk.yellow(`Already listening to runner "${runner.name}"`));
|
|
22
25
|
return;
|
|
@@ -58,7 +61,7 @@ export class CommandListener {
|
|
|
58
61
|
console.log(chalk.yellow(' This bypasses normal permission checks for file access and operations'));
|
|
59
62
|
console.log(chalk.yellow(' Be careful about what directories you run this in and what commands you execute'));
|
|
60
63
|
console.log('');
|
|
61
|
-
console.log(chalk.gray(`
|
|
64
|
+
console.log(chalk.gray(` Type 'q' to return to menu, or press Ctrl+C to exit`));
|
|
62
65
|
console.log(chalk.gray(` Keep in mind, if your machine goes to sleep, it won't process commands`));
|
|
63
66
|
// Set up non-blocking readline for local commands
|
|
64
67
|
this.setupLocalCommandPrompt(runner.id, encryptionCode);
|
|
@@ -133,6 +136,10 @@ export class CommandListener {
|
|
|
133
136
|
// Also handle uncaught exceptions
|
|
134
137
|
process.on('uncaughtException', cleanup);
|
|
135
138
|
process.on('unhandledRejection', cleanup);
|
|
139
|
+
// Wait until user types 'q' to return to menu
|
|
140
|
+
return new Promise((resolve) => {
|
|
141
|
+
this.quitResolve = resolve;
|
|
142
|
+
});
|
|
136
143
|
}
|
|
137
144
|
setupLocalCommandPrompt(runnerId, encryptionCode) {
|
|
138
145
|
if (this.isShuttingDown)
|
|
@@ -144,20 +151,36 @@ export class CommandListener {
|
|
|
144
151
|
output: process.stdout,
|
|
145
152
|
prompt: chalk.green('> ')
|
|
146
153
|
});
|
|
147
|
-
console.log(chalk.cyan(
|
|
154
|
+
console.log(chalk.cyan("\nš¬ Enter a command, type 'q' to return to menu, or Ctrl+C to exit:"));
|
|
148
155
|
this.rl.prompt();
|
|
149
156
|
// Listen for line events (non-blocking)
|
|
150
157
|
this.rl.on('line', async (userInput) => {
|
|
151
158
|
if (this.isShuttingDown)
|
|
152
159
|
return;
|
|
160
|
+
const trimmedInput = userInput.trim();
|
|
161
|
+
// Handle quit command to return to menu
|
|
162
|
+
if (trimmedInput === 'q') {
|
|
163
|
+
console.log(chalk.blue('\nReturning to menu...'));
|
|
164
|
+
this.isShuttingDown = true;
|
|
165
|
+
await this.stopListening(runnerId);
|
|
166
|
+
// Clean up process handlers before returning to menu
|
|
167
|
+
process.removeAllListeners('SIGINT');
|
|
168
|
+
process.removeAllListeners('SIGTERM');
|
|
169
|
+
process.removeAllListeners('uncaughtException');
|
|
170
|
+
process.removeAllListeners('unhandledRejection');
|
|
171
|
+
if (this.quitResolve) {
|
|
172
|
+
this.quitResolve();
|
|
173
|
+
this.quitResolve = null;
|
|
174
|
+
}
|
|
175
|
+
return;
|
|
176
|
+
}
|
|
153
177
|
// If user provided input, send it as a command
|
|
154
|
-
if (
|
|
155
|
-
|
|
156
|
-
console.log(chalk.cyan(`š¤ Sending command: ${command}`));
|
|
178
|
+
if (trimmedInput.length > 0) {
|
|
179
|
+
console.log(chalk.cyan(`š¤ Sending command: ${trimmedInput}`));
|
|
157
180
|
try {
|
|
158
181
|
// Encrypt the command
|
|
159
|
-
const encryptResult = EncryptionService.encrypt(
|
|
160
|
-
const encryptedCommand = encryptResult.success ? encryptResult.encrypted :
|
|
182
|
+
const encryptResult = EncryptionService.encrypt(trimmedInput, encryptionCode);
|
|
183
|
+
const encryptedCommand = encryptResult.success ? encryptResult.encrypted : trimmedInput;
|
|
161
184
|
// Create a user message in Firestore
|
|
162
185
|
await RunnerService.createMessage(runnerId, {
|
|
163
186
|
content: encryptedCommand,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"command-listener.js","sourceRoot":"","sources":["../../src/services/command-listener.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,MAAM,OAAO,CAAC;AAC1B,OAAO,KAAK,QAAQ,MAAM,mBAAmB,CAAC;AAE9C,OAAO,EAAC,aAAa,EAAC,MAAM,aAAa,CAAC;AAC1C,OAAO,EAAC,eAAe,EAAC,MAAM,eAAe,CAAC;AAC9C,OAAO,EAAC,gBAAgB,EAAC,MAAM,oBAAoB,CAAC;AACpD,OAAO,EAAC,iBAAiB,EAAC,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAC,cAAc,EAAE,cAAc,EAAC,MAAM,qBAAqB,CAAC;AAEnE,MAAM,OAAO,eAAe;IAChB,MAAM,CAAC,QAAQ,GAA2B,IAAI,CAAC;IAC/C,eAAe,GAA4B,IAAI,GAAG,EAAE,CAAC;IACrD,cAAc,GAAG,KAAK,CAAC;IACvB,EAAE,GAA8B,IAAI,CAAC;
|
|
1
|
+
{"version":3,"file":"command-listener.js","sourceRoot":"","sources":["../../src/services/command-listener.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,MAAM,OAAO,CAAC;AAC1B,OAAO,KAAK,QAAQ,MAAM,mBAAmB,CAAC;AAE9C,OAAO,EAAC,aAAa,EAAC,MAAM,aAAa,CAAC;AAC1C,OAAO,EAAC,eAAe,EAAC,MAAM,eAAe,CAAC;AAC9C,OAAO,EAAC,gBAAgB,EAAC,MAAM,oBAAoB,CAAC;AACpD,OAAO,EAAC,iBAAiB,EAAC,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAC,cAAc,EAAE,cAAc,EAAC,MAAM,qBAAqB,CAAC;AAEnE,MAAM,OAAO,eAAe;IAChB,MAAM,CAAC,QAAQ,GAA2B,IAAI,CAAC;IAC/C,eAAe,GAA4B,IAAI,GAAG,EAAE,CAAC;IACrD,cAAc,GAAG,KAAK,CAAC;IACvB,EAAE,GAA8B,IAAI,CAAC;IACrC,WAAW,GAAwB,IAAI,CAAC;IAEhD,MAAM,CAAC,WAAW;QACd,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE,CAAC;YAC5B,eAAe,CAAC,QAAQ,GAAG,IAAI,eAAe,EAAE,CAAC;QACrD,CAAC;QACD,OAAO,eAAe,CAAC,QAAQ,CAAC;IACpC,CAAC;IAED,KAAK,CAAC,cAAc,CAAC,MAAc;QAC/B,kDAAkD;QAClD,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC;QAE5B,IAAI,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,EAAE,CAAC;YACtC,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,MAAM,CAAC,gCAAgC,MAAM,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC;YAC1E,OAAO;QACX,CAAC;QAED,gCAAgC;QAChC,MAAM,QAAQ,GAAG,gBAAgB,EAAE,CAAC;QACpC,IAAI,MAAM,CAAC,SAAS,KAAK,QAAQ,EAAE,CAAC;YAChC,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACzD,CAAC;QAED,mCAAmC;QACnC,IAAI,cAAsB,CAAC;QAC3B,MAAM,gBAAgB,GAAG,MAAM,cAAc,EAAE,CAAC;QAEhD,IAAI,gBAAgB,EAAE,cAAc,EAAE,CAAC;YACnC,cAAc,GAAG,gBAAgB,CAAC,cAAc,CAAC;QACrD,CAAC;aAAM,CAAC;YACJ,sCAAsC;YACtC,cAAc,GAAG,iBAAiB,CAAC,oBAAoB,EAAE,CAAC;YAE1D,kBAAkB;YAClB,MAAM,cAAc,CAAC,EAAC,cAAc,EAAC,CAAC,CAAC;QAC3C,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,gDAAgD,MAAM,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC;QACxF,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,iBAAiB,MAAM,CAAC,SAAS,EAAE,CAAC,CAAC,CAAC;QAC7D,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,YAAY,MAAM,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC;QACzD,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAGhB,sCAAsC;QACtC,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC;QACtD,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,MAAM,cAAc,EAAE,CAAC,CAAC,CAAC;QACjD,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,8DAA8D,CAAC,CAAC,CAAC;QACxF,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,gFAAgF,CAAC,CAAC,CAAC;QAC1G,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAEhB,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,CAAC;QAClD,IAAI,MAAM,CAAC,UAAU,KAAK,QAAQ,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,MAAM,CAAC,yEAAyE,CAAC,CAAC,CAAC;QACzG,CAAC;aAAM,IAAI,MAAM,CAAC,UAAU,KAAK,OAAO,EAAE,CAAC;YACvC,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,MAAM,CAAC,+EAA+E,CAAC,CAAC,CAAC;QAC/G,CAAC;QACD,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,MAAM,CAAC,0EAA0E,CAAC,CAAC,CAAC;QACtG,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,MAAM,CAAC,oFAAoF,CAAC,CAAC,CAAC;QAChH,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAChB,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,wDAAwD,CAAC,CAAC,CAAC;QAClF,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,2EAA2E,CAAC,CAAC,CAAC;QAErG,kDAAkD;QAClD,IAAI,CAAC,uBAAuB,CAAC,MAAM,CAAC,EAAE,EAAE,cAAc,CAAC,CAAC;QAExD,MAAM,WAAW,GAAG,aAAa,CAAC,cAAc,CAAC,MAAM,CAAC,EAAE,EAAE,KAAK,EAAE,aAAa,EAAE,EAAE;YAChF,IAAI,CAAC,aAAa,IAAI,IAAI,CAAC,cAAc;gBAAE,OAAO;YAElD,IAAI,aAAa,CAAC,cAAc,EAAE,CAAC;gBAC/B,8BAA8B;gBAC9B,MAAM,aAAa,GAAG,iBAAiB,CAAC,OAAO,CAAC,aAAa,CAAC,cAAc,EAAE,cAAc,CAAC,CAAC;gBAE9F,IAAI,CAAC,aAAa,CAAC,OAAO,EAAE,CAAC;oBACzB,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,gCAAgC,aAAa,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC;oBACvF,wBAAwB;oBACxB,MAAM,aAAa,CAAC,mBAAmB,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;oBACnD,OAAO;gBACX,CAAC;gBAED,MAAM,gBAAgB,GAAG,aAAa,CAAC,SAAS,CAAC;gBACjD,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,wBAAwB,gBAAgB,EAAE,CAAC,CAAC,CAAC;gBAEpE,IAAI,CAAC;oBACD,wCAAwC;oBACxC,MAAM,aAAa,CAAC,mBAAmB,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;oBAEnD,gCAAgC;oBAChC,MAAM,MAAM,GAAG,MAAM,eAAe,CAAC,cAAc,CAAC,aAAa,EAAE,gBAAgB,CAAC,CAAC;oBAErF,qBAAqB;oBACrB,MAAM,aAAa,GAAG,iBAAiB,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;oBAC/E,MAAM,eAAe,GAAG,aAAa,CAAC,OAAO,CAAC,CAAC,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC;oBAExF,0CAA0C;oBAC1C,MAAM,aAAa,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,EAAE;wBACzC,OAAO,EAAE,eAAe;wBACxB,UAAU,EAAE,MAAM,CAAC,IAAI;wBACvB,IAAI,EAAE,QAAQ;qBACjB,CAAC,CAAC;oBAEH,2DAA2D;oBAC3D,MAAM,aAAa,CAAC,wBAAwB,CAAC,MAAM,CAAC,EAAE,EAAE,eAAe,EAAE,MAAM,CAAC,QAAQ,CAAC,CAAC;oBAE1F,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC;oBAC3C,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC,CAAC;gBAC3D,CAAC;gBAAC,OAAO,KAAU,EAAE,CAAC;oBAClB,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,+BAA+B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC;oBAEzE,MAAM,YAAY,GAAG,4BAA4B,KAAK,CAAC,OAAO,EAAE,CAAC;oBAEjE,4BAA4B;oBAC5B,MAAM,aAAa,GAAG,iBAAiB,CAAC,OAAO,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;oBAC9E,MAAM,cAAc,GAAG,aAAa,CAAC,OAAO,CAAC,CAAC,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC;oBAEtF,IAAI,CAAC;wBACD,yCAAyC;wBACzC,MAAM,aAAa,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,EAAE;4BACzC,OAAO,EAAE,cAAc;4BACvB,UAAU,EAAE,MAAM,CAAC,IAAI;4BACvB,IAAI,EAAE,QAAQ;yBACjB,CAAC,CAAC;wBAEH,MAAM,aAAa,CAAC,wBAAwB,CAAC,MAAM,CAAC,EAAE,EAAE,cAAc,CAAC,CAAC;oBAC5E,CAAC;oBAAC,OAAO,WAAW,EAAE,CAAC;wBACnB,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,2CAA2C,CAAC,CAAC,CAAC;oBAC1E,CAAC;oBAED,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC,CAAC;gBAC3D,CAAC;YACL,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,EAAE,WAAW,CAAC,CAAC;QAEjD,2BAA2B;QAC3B,MAAM,OAAO,GAAG,KAAK,IAAI,EAAE;YACvB,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;YAC3B,MAAM,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YACpC,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,sBAAsB,MAAM,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC;YAC9D,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QACpB,CAAC,CAAC;QAEF,sEAAsE;QACtE,OAAO,CAAC,kBAAkB,CAAC,QAAQ,CAAC,CAAC;QACrC,OAAO,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;QAEtC,OAAO,CAAC,EAAE,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC;QAE/B,kCAAkC;QAClC,OAAO,CAAC,EAAE,CAAC,mBAAmB,EAAE,OAAO,CAAC,CAAC;QACzC,OAAO,CAAC,EAAE,CAAC,oBAAoB,EAAE,OAAO,CAAC,CAAC;QAE1C,8CAA8C;QAC9C,OAAO,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,EAAE;YACjC,IAAI,CAAC,WAAW,GAAG,OAAO,CAAC;QAC/B,CAAC,CAAC,CAAC;IACP,CAAC;IAEO,uBAAuB,CAAC,QAAgB,EAAE,cAAsB;QACpE,IAAI,IAAI,CAAC,cAAc;YAAE,OAAO;QAEhC,gDAAgD;QAChD,IAAI,CAAC,IAAI,CAAC,EAAE,EAAE,CAAC;YACX,IAAI,CAAC,EAAE,GAAG,QAAQ,CAAC,eAAe,CAAC;gBAC/B,KAAK,EAAE,OAAO,CAAC,KAAK;gBACpB,MAAM,EAAE,OAAO,CAAC,MAAM;gBACtB,MAAM,EAAE,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC;aAC5B,CAAC,CAAC;YAEH,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,sEAAsE,CAAC,CAAC,CAAC;YAChG,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC;YAEjB,wCAAwC;YACxC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,SAAiB,EAAE,EAAE;gBAC3C,IAAI,IAAI,CAAC,cAAc;oBAAE,OAAO;gBAEhC,MAAM,YAAY,GAAG,SAAS,CAAC,IAAI,EAAE,CAAC;gBAEtC,wCAAwC;gBACxC,IAAI,YAAY,KAAK,GAAG,EAAE,CAAC;oBACvB,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC;oBAClD,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;oBAC3B,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;oBACnC,qDAAqD;oBACrD,OAAO,CAAC,kBAAkB,CAAC,QAAQ,CAAC,CAAC;oBACrC,OAAO,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;oBACtC,OAAO,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,CAAC;oBAChD,OAAO,CAAC,kBAAkB,CAAC,oBAAoB,CAAC,CAAC;oBACjD,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;wBACnB,IAAI,CAAC,WAAW,EAAE,CAAC;wBACnB,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC;oBAC5B,CAAC;oBACD,OAAO;gBACX,CAAC;gBAED,+CAA+C;gBAC/C,IAAI,YAAY,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC1B,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,uBAAuB,YAAY,EAAE,CAAC,CAAC,CAAC;oBAE/D,IAAI,CAAC;wBACD,sBAAsB;wBACtB,MAAM,aAAa,GAAG,iBAAiB,CAAC,OAAO,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;wBAC9E,MAAM,gBAAgB,GAAG,aAAa,CAAC,OAAO,CAAC,CAAC,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC;wBAExF,qCAAqC;wBACrC,MAAM,aAAa,CAAC,aAAa,CAAC,QAAQ,EAAE;4BACxC,OAAO,EAAE,gBAAgB;4BACzB,UAAU,EAAE,EAAE;4BACd,IAAI,EAAE,MAAM;yBACf,CAAC,CAAC;wBAEH,8EAA8E;wBAC9E,MAAM,aAAa,CAAC,YAAY,CAAC,QAAQ,EAAE,gBAAgB,CAAC,CAAC;wBAE7D,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,kCAAkC,CAAC,CAAC,CAAC;wBAC5D,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC;oBAC7C,CAAC;oBAAC,OAAO,KAAU,EAAE,CAAC;wBAClB,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,+BAA+B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC;oBAC7E,CAAC;gBACL,CAAC;gBAED,qCAAqC;gBACrC,IAAI,CAAC,IAAI,CAAC,cAAc,IAAI,IAAI,CAAC,EAAE,EAAE,CAAC;oBAClC,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC;gBACrB,CAAC;YACL,CAAC,CAAC,CAAC;QACP,CAAC;IACL,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,QAAgB;QAChC,MAAM,WAAW,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QACvD,IAAI,WAAW,EAAE,CAAC;YACd,WAAW,EAAE,CAAC;YACd,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;QAC1C,CAAC;QAED,wCAAwC;QACxC,IAAI,IAAI,CAAC,EAAE,EAAE,CAAC;YACV,IAAI,CAAC,EAAE,CAAC,KAAK,EAAE,CAAC;YAChB,IAAI,CAAC,EAAE,GAAG,IAAI,CAAC;QACnB,CAAC;IACL,CAAC;IAED,KAAK,CAAC,OAAO;QACT,6CAA6C;QAC7C,KAAK,MAAM,CAAC,EAAE,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,eAAe,CAAC,OAAO,EAAE,EAAE,CAAC;YAC7D,IAAI,CAAC;gBACD,WAAW,EAAE,CAAC;YAClB,CAAC;YAAC,MAAM,CAAC;gBACL,QAAQ;YACZ,CAAC;oBAAS,CAAC;gBACP,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YACpC,CAAC;QACL,CAAC;QAED,sCAAsC;QACtC,IAAI,IAAI,CAAC,EAAE,EAAE,CAAC;YACV,IAAI,CAAC,EAAE,CAAC,KAAK,EAAE,CAAC;YAChB,IAAI,CAAC,EAAE,GAAG,IAAI,CAAC;QACnB,CAAC;IACL,CAAC"}
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
export interface KeyPair {
|
|
2
|
+
publicKey: string;
|
|
3
|
+
privateKey: string;
|
|
4
|
+
}
|
|
5
|
+
export interface EncryptedMessage {
|
|
6
|
+
encryptedData: string;
|
|
7
|
+
iv: string;
|
|
8
|
+
tag: string;
|
|
9
|
+
}
|
|
10
|
+
export declare class CryptoService {
|
|
11
|
+
private static readonly ALGORITHM;
|
|
12
|
+
private static readonly IV_LENGTH;
|
|
13
|
+
private static readonly TAG_LENGTH;
|
|
14
|
+
private static readonly KEY_LENGTH;
|
|
15
|
+
/**
|
|
16
|
+
* Generate an ECDH key pair for key exchange
|
|
17
|
+
*/
|
|
18
|
+
static generateECDHKeyPair(): KeyPair;
|
|
19
|
+
/**
|
|
20
|
+
* Derive a shared secret from ECDH key exchange
|
|
21
|
+
*/
|
|
22
|
+
static deriveSharedSecret(privateKey: string, publicKey: string): string;
|
|
23
|
+
/**
|
|
24
|
+
* Encrypt a message using AES-256-GCM
|
|
25
|
+
*/
|
|
26
|
+
static encrypt(message: string, key: string): EncryptedMessage;
|
|
27
|
+
/**
|
|
28
|
+
* Decrypt a message using AES-256-GCM
|
|
29
|
+
*/
|
|
30
|
+
static decrypt(encryptedMessage: EncryptedMessage, key: string): string;
|
|
31
|
+
/**
|
|
32
|
+
* Generate a random 256-bit key for symmetric encryption
|
|
33
|
+
*/
|
|
34
|
+
static generateRandomKey(): string;
|
|
35
|
+
/**
|
|
36
|
+
* Check if a message appears to be encrypted
|
|
37
|
+
*/
|
|
38
|
+
static isEncrypted(message: string): boolean;
|
|
39
|
+
/**
|
|
40
|
+
* Safely encrypt a message, handling both string and object inputs
|
|
41
|
+
*/
|
|
42
|
+
static safeEncrypt(data: any, key: string): string;
|
|
43
|
+
/**
|
|
44
|
+
* Safely decrypt a message, throwing error if decryption fails
|
|
45
|
+
*/
|
|
46
|
+
static safeDecrypt(encryptedData: string, key: string): string;
|
|
47
|
+
/**
|
|
48
|
+
* Create a hash of the key for identification purposes
|
|
49
|
+
*/
|
|
50
|
+
static createKeyHash(key: string): string;
|
|
51
|
+
}
|
|
52
|
+
//# sourceMappingURL=crypto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../../src/services/crypto.ts"],"names":[],"mappings":"AAEA,MAAM,WAAW,OAAO;IACpB,SAAS,EAAE,MAAM,CAAC;IAClB,UAAU,EAAE,MAAM,CAAC;CACtB;AAED,MAAM,WAAW,gBAAgB;IAC7B,aAAa,EAAE,MAAM,CAAC;IACtB,EAAE,EAAE,MAAM,CAAC;IACX,GAAG,EAAE,MAAM,CAAC;CACf;AAED,qBAAa,aAAa;IACtB,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,CAAiB;IAClD,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,CAAM;IACvC,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,UAAU,CAAM;IACxC,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,UAAU,CAAM;IAExC;;OAEG;IACH,MAAM,CAAC,mBAAmB,IAAI,OAAO;IAUrC;;OAEG;IACH,MAAM,CAAC,kBAAkB,CAAC,UAAU,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,GAAG,MAAM;IAYxE;;OAEG;IACH,MAAM,CAAC,OAAO,CAAC,OAAO,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,GAAG,gBAAgB;IAmB9D;;OAEG;IACH,MAAM,CAAC,OAAO,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,GAAG,EAAE,MAAM,GAAG,MAAM;IAevE;;OAEG;IACH,MAAM,CAAC,iBAAiB,IAAI,MAAM;IAKlC;;OAEG;IACH,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO;IAS5C;;OAEG;IACH,MAAM,CAAC,WAAW,CAAC,IAAI,EAAE,GAAG,EAAE,GAAG,EAAE,MAAM,GAAG,MAAM;IAMlD;;OAEG;IACH,MAAM,CAAC,WAAW,CAAC,aAAa,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,GAAG,MAAM;IAS9D;;OAEG;IACH,MAAM,CAAC,aAAa,CAAC,GAAG,EAAE,MAAM,GAAG,MAAM;CAG5C"}
|
|
@@ -0,0 +1,104 @@
|
|
|
1
|
+
import * as crypto from 'node:crypto';
|
|
2
|
+
export class CryptoService {
|
|
3
|
+
static ALGORITHM = 'aes-256-gcm';
|
|
4
|
+
static IV_LENGTH = 16;
|
|
5
|
+
static TAG_LENGTH = 16;
|
|
6
|
+
static KEY_LENGTH = 32;
|
|
7
|
+
/**
|
|
8
|
+
* Generate an ECDH key pair for key exchange
|
|
9
|
+
*/
|
|
10
|
+
static generateECDHKeyPair() {
|
|
11
|
+
const ecdh = crypto.createECDH('secp256k1');
|
|
12
|
+
ecdh.generateKeys();
|
|
13
|
+
return {
|
|
14
|
+
publicKey: ecdh.getPublicKey('base64'),
|
|
15
|
+
privateKey: ecdh.getPrivateKey('base64')
|
|
16
|
+
};
|
|
17
|
+
}
|
|
18
|
+
/**
|
|
19
|
+
* Derive a shared secret from ECDH key exchange
|
|
20
|
+
*/
|
|
21
|
+
static deriveSharedSecret(privateKey, publicKey) {
|
|
22
|
+
const ecdh = crypto.createECDH('secp256k1');
|
|
23
|
+
ecdh.setPrivateKey(privateKey, 'base64');
|
|
24
|
+
const sharedSecret = ecdh.computeSecret(publicKey, 'base64');
|
|
25
|
+
// Use HKDF to derive a proper encryption key
|
|
26
|
+
const derivedKey = crypto.hkdfSync('sha256', sharedSecret, '', 'salamander-e2e-encryption', CryptoService.KEY_LENGTH);
|
|
27
|
+
return Buffer.from(derivedKey).toString('base64');
|
|
28
|
+
}
|
|
29
|
+
/**
|
|
30
|
+
* Encrypt a message using AES-256-GCM
|
|
31
|
+
*/
|
|
32
|
+
static encrypt(message, key) {
|
|
33
|
+
const keyBuffer = Buffer.from(key, 'base64');
|
|
34
|
+
const iv = crypto.randomBytes(CryptoService.IV_LENGTH);
|
|
35
|
+
const cipher = crypto.createCipheriv(CryptoService.ALGORITHM, keyBuffer, iv);
|
|
36
|
+
cipher.setAAD(Buffer.from('salamander'));
|
|
37
|
+
let encryptedData = cipher.update(message, 'utf8', 'base64');
|
|
38
|
+
encryptedData += cipher.final('base64');
|
|
39
|
+
const tag = cipher.getAuthTag();
|
|
40
|
+
return {
|
|
41
|
+
encryptedData,
|
|
42
|
+
iv: iv.toString('base64'),
|
|
43
|
+
tag: tag.toString('base64')
|
|
44
|
+
};
|
|
45
|
+
}
|
|
46
|
+
/**
|
|
47
|
+
* Decrypt a message using AES-256-GCM
|
|
48
|
+
*/
|
|
49
|
+
static decrypt(encryptedMessage, key) {
|
|
50
|
+
const keyBuffer = Buffer.from(key, 'base64');
|
|
51
|
+
const iv = Buffer.from(encryptedMessage.iv, 'base64');
|
|
52
|
+
const tag = Buffer.from(encryptedMessage.tag, 'base64');
|
|
53
|
+
const decipher = crypto.createDecipheriv(CryptoService.ALGORITHM, keyBuffer, iv);
|
|
54
|
+
decipher.setAAD(Buffer.from('salamander'));
|
|
55
|
+
decipher.setAuthTag(tag);
|
|
56
|
+
let decryptedData = decipher.update(encryptedMessage.encryptedData, 'base64', 'utf8');
|
|
57
|
+
decryptedData += decipher.final('utf8');
|
|
58
|
+
return decryptedData;
|
|
59
|
+
}
|
|
60
|
+
/**
|
|
61
|
+
* Generate a random 256-bit key for symmetric encryption
|
|
62
|
+
*/
|
|
63
|
+
static generateRandomKey() {
|
|
64
|
+
const key = crypto.randomBytes(CryptoService.KEY_LENGTH);
|
|
65
|
+
return key.toString('base64');
|
|
66
|
+
}
|
|
67
|
+
/**
|
|
68
|
+
* Check if a message appears to be encrypted
|
|
69
|
+
*/
|
|
70
|
+
static isEncrypted(message) {
|
|
71
|
+
try {
|
|
72
|
+
const parsed = JSON.parse(message);
|
|
73
|
+
return parsed.encryptedData && parsed.iv && parsed.tag;
|
|
74
|
+
}
|
|
75
|
+
catch {
|
|
76
|
+
return false;
|
|
77
|
+
}
|
|
78
|
+
}
|
|
79
|
+
/**
|
|
80
|
+
* Safely encrypt a message, handling both string and object inputs
|
|
81
|
+
*/
|
|
82
|
+
static safeEncrypt(data, key) {
|
|
83
|
+
const message = typeof data === 'string' ? data : JSON.stringify(data);
|
|
84
|
+
const encrypted = this.encrypt(message, key);
|
|
85
|
+
return JSON.stringify(encrypted);
|
|
86
|
+
}
|
|
87
|
+
/**
|
|
88
|
+
* Safely decrypt a message, throwing error if decryption fails
|
|
89
|
+
*/
|
|
90
|
+
static safeDecrypt(encryptedData, key) {
|
|
91
|
+
if (!this.isEncrypted(encryptedData)) {
|
|
92
|
+
throw new Error('Message is not encrypted - encryption is required');
|
|
93
|
+
}
|
|
94
|
+
const encryptedMessage = JSON.parse(encryptedData);
|
|
95
|
+
return this.decrypt(encryptedMessage, key);
|
|
96
|
+
}
|
|
97
|
+
/**
|
|
98
|
+
* Create a hash of the key for identification purposes
|
|
99
|
+
*/
|
|
100
|
+
static createKeyHash(key) {
|
|
101
|
+
return crypto.createHash('sha256').update(key).digest('hex').substring(0, 16);
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
//# sourceMappingURL=crypto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"crypto.js","sourceRoot":"","sources":["../../src/services/crypto.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,MAAM,MAAM,aAAa,CAAC;AAatC,MAAM,OAAO,aAAa;IACd,MAAM,CAAU,SAAS,GAAG,aAAa,CAAC;IAC1C,MAAM,CAAU,SAAS,GAAG,EAAE,CAAC;IAC/B,MAAM,CAAU,UAAU,GAAG,EAAE,CAAC;IAChC,MAAM,CAAU,UAAU,GAAG,EAAE,CAAC;IAExC;;OAEG;IACH,MAAM,CAAC,mBAAmB;QACtB,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC;QAC5C,IAAI,CAAC,YAAY,EAAE,CAAC;QAEpB,OAAO;YACH,SAAS,EAAE,IAAI,CAAC,YAAY,CAAC,QAAQ,CAAC;YACtC,UAAU,EAAE,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC;SAC3C,CAAC;IACN,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,kBAAkB,CAAC,UAAkB,EAAE,SAAiB;QAC3D,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC;QAC5C,IAAI,CAAC,aAAa,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;QAEzC,MAAM,YAAY,GAAG,IAAI,CAAC,aAAa,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAE7D,6CAA6C;QAC7C,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,QAAQ,EAAE,YAAY,EAAE,EAAE,EAAE,2BAA2B,EAAE,aAAa,CAAC,UAAU,CAAC,CAAC;QAEtH,OAAO,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;IACtD,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,OAAO,CAAC,OAAe,EAAE,GAAW;QACvC,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;QAC7C,MAAM,EAAE,GAAG,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC;QAEvD,MAAM,MAAM,GAAG,MAAM,CAAC,cAAc,CAAC,aAAa,CAAC,SAAS,EAAE,SAAS,EAAE,EAAE,CAAC,CAAC;QAC7E,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;QAEzC,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM,CAAC,OAAO,EAAE,MAAM,EAAE,QAAQ,CAAC,CAAC;QAC7D,aAAa,IAAI,MAAM,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC;QAExC,MAAM,GAAG,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;QAEhC,OAAO;YACH,aAAa;YACb,EAAE,EAAE,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC;YACzB,GAAG,EAAE,GAAG,CAAC,QAAQ,CAAC,QAAQ,CAAC;SAC9B,CAAC;IACN,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,OAAO,CAAC,gBAAkC,EAAE,GAAW;QAC1D,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;QAC7C,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,CAAC,gBAAgB,CAAC,EAAE,EAAE,QAAQ,CAAC,CAAC;QACtD,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,gBAAgB,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;QAExD,MAAM,QAAQ,GAAG,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,SAAS,EAAE,SAAS,EAAE,EAAE,CAAC,CAAC;QACjF,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;QAC3C,QAAQ,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;QAEzB,IAAI,aAAa,GAAG,QAAQ,CAAC,MAAM,CAAC,gBAAgB,CAAC,aAAa,EAAE,QAAQ,EAAE,MAAM,CAAC,CAAC;QACtF,aAAa,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC;QAExC,OAAO,aAAa,CAAC;IACzB,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,iBAAiB;QACpB,MAAM,GAAG,GAAG,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QACzD,OAAO,GAAG,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;IAClC,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,WAAW,CAAC,OAAe;QAC9B,IAAI,CAAC;YACD,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YACnC,OAAO,MAAM,CAAC,aAAa,IAAI,MAAM,CAAC,EAAE,IAAI,MAAM,CAAC,GAAG,CAAC;QAC3D,CAAC;QAAC,MAAM,CAAC;YACL,OAAO,KAAK,CAAC;QACjB,CAAC;IACL,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,WAAW,CAAC,IAAS,EAAE,GAAW;QACrC,MAAM,OAAO,GAAG,OAAO,IAAI,KAAK,QAAQ,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;QACvE,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;QAC7C,OAAO,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC;IACrC,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,WAAW,CAAC,aAAqB,EAAE,GAAW;QACjD,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,aAAa,CAAC,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CAAC,mDAAmD,CAAC,CAAC;QACzE,CAAC;QAED,MAAM,gBAAgB,GAAqB,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;QACrE,OAAO,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,GAAG,CAAC,CAAC;IAC/C,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,aAAa,CAAC,GAAW;QAC5B,OAAO,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAClF,CAAC"}
|
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
import { KeyPair } from './crypto.js';
|
|
2
|
+
export declare class KeyManagerService {
|
|
3
|
+
private static readonly KEYS_STORAGE_KEY;
|
|
4
|
+
private static readonly KEY_EXPIRY_DAYS;
|
|
5
|
+
/**
|
|
6
|
+
* Initialize keys for a new runner
|
|
7
|
+
*/
|
|
8
|
+
static initializeRunnerKeys(runnerId: string): Promise<KeyPair>;
|
|
9
|
+
/**
|
|
10
|
+
* Complete the key exchange with the Flutter app's public key
|
|
11
|
+
*/
|
|
12
|
+
static completeKeyExchange(runnerId: string, flutterPublicKey: string): Promise<string>;
|
|
13
|
+
/**
|
|
14
|
+
* Get the shared secret for encryption/decryption
|
|
15
|
+
*/
|
|
16
|
+
static getSharedSecret(runnerId: string): Promise<string | null>;
|
|
17
|
+
/**
|
|
18
|
+
* Get the CLI's public key for a runner
|
|
19
|
+
*/
|
|
20
|
+
static getPublicKey(runnerId: string): Promise<string | null>;
|
|
21
|
+
/**
|
|
22
|
+
* Check if keys exist and are properly initialized for a runner
|
|
23
|
+
*/
|
|
24
|
+
static hasValidKeys(runnerId: string): Promise<boolean>;
|
|
25
|
+
/**
|
|
26
|
+
* Rotate keys for a runner (generate new key pair)
|
|
27
|
+
*/
|
|
28
|
+
static rotateKeys(runnerId: string): Promise<KeyPair>;
|
|
29
|
+
/**
|
|
30
|
+
* Remove keys for a runner (when runner is deleted)
|
|
31
|
+
*/
|
|
32
|
+
static removeRunnerKeys(runnerId: string): Promise<void>;
|
|
33
|
+
/**
|
|
34
|
+
* Get all runners that have encryption keys
|
|
35
|
+
*/
|
|
36
|
+
static getEncryptedRunnerIds(): Promise<string[]>;
|
|
37
|
+
/**
|
|
38
|
+
* Cleanup expired keys
|
|
39
|
+
*/
|
|
40
|
+
static cleanupExpiredKeys(): Promise<number>;
|
|
41
|
+
private static getRunnerKeys;
|
|
42
|
+
private static storeRunnerKeys;
|
|
43
|
+
private static getAllStoredKeys;
|
|
44
|
+
}
|
|
45
|
+
//# sourceMappingURL=key-manager.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"key-manager.d.ts","sourceRoot":"","sources":["../../src/services/key-manager.ts"],"names":[],"mappings":"AAAA,OAAO,EAAgB,OAAO,EAAC,MAAM,aAAa,CAAC;AAUnD,qBAAa,iBAAiB;IAC1B,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,gBAAgB,CAA4B;IACpE,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,eAAe,CAAM;IAE7C;;OAEG;WACU,oBAAoB,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAYrE;;OAEG;WACU,mBAAmB,CAAC,QAAQ,EAAE,MAAM,EAAE,gBAAgB,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAoB7F;;OAEG;WACU,eAAe,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;IAetE;;OAEG;WACU,YAAY,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;IAKnE;;OAEG;WACU,YAAY,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAK7D;;OAEG;WACU,UAAU,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAK3D;;OAEG;WACU,gBAAgB,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAM9D;;OAEG;WACU,qBAAqB,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC;IAQvD;;OAEG;WACU,kBAAkB,IAAI,OAAO,CAAC,MAAM,CAAC;mBAwB7B,aAAa;mBAKb,eAAe;mBAMf,gBAAgB;CAGxC"}
|
|
@@ -0,0 +1,123 @@
|
|
|
1
|
+
import { CryptoService } from './crypto.js';
|
|
2
|
+
import { StorageService } from '../utils/storage.js';
|
|
3
|
+
export class KeyManagerService {
|
|
4
|
+
static KEYS_STORAGE_KEY = 'salamander_runner_keys';
|
|
5
|
+
static KEY_EXPIRY_DAYS = 30;
|
|
6
|
+
/**
|
|
7
|
+
* Initialize keys for a new runner
|
|
8
|
+
*/
|
|
9
|
+
static async initializeRunnerKeys(runnerId) {
|
|
10
|
+
const ecdhKeyPair = CryptoService.generateECDHKeyPair();
|
|
11
|
+
const runnerKeys = {
|
|
12
|
+
ecdhKeyPair,
|
|
13
|
+
createdAt: Date.now()
|
|
14
|
+
};
|
|
15
|
+
await this.storeRunnerKeys(runnerId, runnerKeys);
|
|
16
|
+
return ecdhKeyPair;
|
|
17
|
+
}
|
|
18
|
+
/**
|
|
19
|
+
* Complete the key exchange with the Flutter app's public key
|
|
20
|
+
*/
|
|
21
|
+
static async completeKeyExchange(runnerId, flutterPublicKey) {
|
|
22
|
+
const runnerKeys = await this.getRunnerKeys(runnerId);
|
|
23
|
+
if (!runnerKeys) {
|
|
24
|
+
throw new Error(`No keys found for runner ${runnerId}`);
|
|
25
|
+
}
|
|
26
|
+
// Derive shared secret using our private key and Flutter's public key
|
|
27
|
+
const sharedSecret = CryptoService.deriveSharedSecret(runnerKeys.ecdhKeyPair.privateKey, flutterPublicKey);
|
|
28
|
+
// Update stored keys with shared secret
|
|
29
|
+
runnerKeys.sharedSecret = sharedSecret;
|
|
30
|
+
runnerKeys.keyHash = CryptoService.createKeyHash(sharedSecret);
|
|
31
|
+
await this.storeRunnerKeys(runnerId, runnerKeys);
|
|
32
|
+
return sharedSecret;
|
|
33
|
+
}
|
|
34
|
+
/**
|
|
35
|
+
* Get the shared secret for encryption/decryption
|
|
36
|
+
*/
|
|
37
|
+
static async getSharedSecret(runnerId) {
|
|
38
|
+
const runnerKeys = await this.getRunnerKeys(runnerId);
|
|
39
|
+
if (!runnerKeys?.sharedSecret) {
|
|
40
|
+
return null;
|
|
41
|
+
}
|
|
42
|
+
// Check if keys are expired
|
|
43
|
+
const daysSinceCreation = (Date.now() - runnerKeys.createdAt) / (1000 * 60 * 60 * 24);
|
|
44
|
+
if (daysSinceCreation > this.KEY_EXPIRY_DAYS) {
|
|
45
|
+
console.warn(`Keys for runner ${runnerId} have expired. Consider key rotation.`);
|
|
46
|
+
}
|
|
47
|
+
return runnerKeys.sharedSecret;
|
|
48
|
+
}
|
|
49
|
+
/**
|
|
50
|
+
* Get the CLI's public key for a runner
|
|
51
|
+
*/
|
|
52
|
+
static async getPublicKey(runnerId) {
|
|
53
|
+
const runnerKeys = await this.getRunnerKeys(runnerId);
|
|
54
|
+
return runnerKeys?.ecdhKeyPair.publicKey ?? null;
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* Check if keys exist and are properly initialized for a runner
|
|
58
|
+
*/
|
|
59
|
+
static async hasValidKeys(runnerId) {
|
|
60
|
+
const runnerKeys = await this.getRunnerKeys(runnerId);
|
|
61
|
+
return !!(runnerKeys?.ecdhKeyPair && runnerKeys?.sharedSecret);
|
|
62
|
+
}
|
|
63
|
+
/**
|
|
64
|
+
* Rotate keys for a runner (generate new key pair)
|
|
65
|
+
*/
|
|
66
|
+
static async rotateKeys(runnerId) {
|
|
67
|
+
console.log(`Rotating keys for runner ${runnerId}`);
|
|
68
|
+
return await this.initializeRunnerKeys(runnerId);
|
|
69
|
+
}
|
|
70
|
+
/**
|
|
71
|
+
* Remove keys for a runner (when runner is deleted)
|
|
72
|
+
*/
|
|
73
|
+
static async removeRunnerKeys(runnerId) {
|
|
74
|
+
const allKeys = await this.getAllStoredKeys();
|
|
75
|
+
delete allKeys[runnerId];
|
|
76
|
+
await StorageService.set(this.KEYS_STORAGE_KEY, allKeys);
|
|
77
|
+
}
|
|
78
|
+
/**
|
|
79
|
+
* Get all runners that have encryption keys
|
|
80
|
+
*/
|
|
81
|
+
static async getEncryptedRunnerIds() {
|
|
82
|
+
const allKeys = await this.getAllStoredKeys();
|
|
83
|
+
return Object.keys(allKeys).filter(runnerId => {
|
|
84
|
+
const keys = allKeys[runnerId];
|
|
85
|
+
return keys?.sharedSecret;
|
|
86
|
+
});
|
|
87
|
+
}
|
|
88
|
+
/**
|
|
89
|
+
* Cleanup expired keys
|
|
90
|
+
*/
|
|
91
|
+
static async cleanupExpiredKeys() {
|
|
92
|
+
const allKeys = await this.getAllStoredKeys();
|
|
93
|
+
const now = Date.now();
|
|
94
|
+
let cleanedCount = 0;
|
|
95
|
+
const updatedKeys = {};
|
|
96
|
+
for (const [runnerId, keys] of Object.entries(allKeys)) {
|
|
97
|
+
const daysSinceCreation = (now - keys.createdAt) / (1000 * 60 * 60 * 24);
|
|
98
|
+
if (daysSinceCreation <= this.KEY_EXPIRY_DAYS) {
|
|
99
|
+
updatedKeys[runnerId] = keys;
|
|
100
|
+
}
|
|
101
|
+
else {
|
|
102
|
+
cleanedCount++;
|
|
103
|
+
console.log(`Cleaned up expired keys for runner ${runnerId}`);
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
await StorageService.set(this.KEYS_STORAGE_KEY, updatedKeys);
|
|
107
|
+
return cleanedCount;
|
|
108
|
+
}
|
|
109
|
+
// Private helper methods
|
|
110
|
+
static async getRunnerKeys(runnerId) {
|
|
111
|
+
const allKeys = await this.getAllStoredKeys();
|
|
112
|
+
return allKeys[runnerId] ?? null;
|
|
113
|
+
}
|
|
114
|
+
static async storeRunnerKeys(runnerId, keys) {
|
|
115
|
+
const allKeys = await this.getAllStoredKeys();
|
|
116
|
+
allKeys[runnerId] = keys;
|
|
117
|
+
await StorageService.set(this.KEYS_STORAGE_KEY, allKeys);
|
|
118
|
+
}
|
|
119
|
+
static async getAllStoredKeys() {
|
|
120
|
+
return (await StorageService.get(this.KEYS_STORAGE_KEY)) ?? {};
|
|
121
|
+
}
|
|
122
|
+
}
|
|
123
|
+
//# sourceMappingURL=key-manager.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"key-manager.js","sourceRoot":"","sources":["../../src/services/key-manager.ts"],"names":[],"mappings":"AAAA,OAAO,EAAC,aAAa,EAAU,MAAM,aAAa,CAAC;AACnD,OAAO,EAAC,cAAc,EAAC,MAAM,qBAAqB,CAAC;AASnD,MAAM,OAAO,iBAAiB;IAClB,MAAM,CAAU,gBAAgB,GAAG,wBAAwB,CAAC;IAC5D,MAAM,CAAU,eAAe,GAAG,EAAE,CAAC;IAE7C;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,oBAAoB,CAAC,QAAgB;QAC9C,MAAM,WAAW,GAAG,aAAa,CAAC,mBAAmB,EAAE,CAAC;QAExD,MAAM,UAAU,GAAe;YAC3B,WAAW;YACX,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;SACxB,CAAC;QAEF,MAAM,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE,UAAU,CAAC,CAAC;QACjD,OAAO,WAAW,CAAC;IACvB,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,mBAAmB,CAAC,QAAgB,EAAE,gBAAwB;QACvE,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;QACtD,IAAI,CAAC,UAAU,EAAE,CAAC;YACd,MAAM,IAAI,KAAK,CAAC,4BAA4B,QAAQ,EAAE,CAAC,CAAC;QAC5D,CAAC;QAED,sEAAsE;QACtE,MAAM,YAAY,GAAG,aAAa,CAAC,kBAAkB,CACjD,UAAU,CAAC,WAAW,CAAC,UAAU,EACjC,gBAAgB,CACnB,CAAC;QAEF,wCAAwC;QACxC,UAAU,CAAC,YAAY,GAAG,YAAY,CAAC;QACvC,UAAU,CAAC,OAAO,GAAG,aAAa,CAAC,aAAa,CAAC,YAAY,CAAC,CAAC;QAE/D,MAAM,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE,UAAU,CAAC,CAAC;QACjD,OAAO,YAAY,CAAC;IACxB,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,QAAgB;QACzC,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;QACtD,IAAI,CAAC,UAAU,EAAE,YAAY,EAAE,CAAC;YAC5B,OAAO,IAAI,CAAC;QAChB,CAAC;QAED,4BAA4B;QAC5B,MAAM,iBAAiB,GAAG,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,UAAU,CAAC,SAAS,CAAC,GAAG,CAAC,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC;QACtF,IAAI,iBAAiB,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;YAC3C,OAAO,CAAC,IAAI,CAAC,mBAAmB,QAAQ,uCAAuC,CAAC,CAAC;QACrF,CAAC;QAED,OAAO,UAAU,CAAC,YAAY,CAAC;IACnC,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,QAAgB;QACtC,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,UAAU,EAAE,WAAW,CAAC,SAAS,IAAI,IAAI,CAAC;IACrD,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,QAAgB;QACtC,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,CAAC,CAAC,CAAC,UAAU,EAAE,WAAW,IAAI,UAAU,EAAE,YAAY,CAAC,CAAC;IACnE,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,QAAgB;QACpC,OAAO,CAAC,GAAG,CAAC,4BAA4B,QAAQ,EAAE,CAAC,CAAC;QACpD,OAAO,MAAM,IAAI,CAAC,oBAAoB,CAAC,QAAQ,CAAC,CAAC;IACrD,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,QAAgB;QAC1C,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC9C,OAAO,OAAO,CAAC,QAAQ,CAAC,CAAC;QACzB,MAAM,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,EAAE,OAAO,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,qBAAqB;QAC9B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC9C,OAAO,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,MAAM,CAAC,QAAQ,CAAC,EAAE;YAC1C,MAAM,IAAI,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC;YAC/B,OAAO,IAAI,EAAE,YAAY,CAAC;QAC9B,CAAC,CAAC,CAAC;IACP,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC3B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC9C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,IAAI,YAAY,GAAG,CAAC,CAAC;QAErB,MAAM,WAAW,GAA+B,EAAE,CAAC;QAEnD,KAAK,MAAM,CAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC;YACrD,MAAM,iBAAiB,GAAG,CAAC,GAAG,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC;YAEzE,IAAI,iBAAiB,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;gBAC5C,WAAW,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC;YACjC,CAAC;iBAAM,CAAC;gBACJ,YAAY,EAAE,CAAC;gBACf,OAAO,CAAC,GAAG,CAAC,sCAAsC,QAAQ,EAAE,CAAC,CAAC;YAClE,CAAC;QACL,CAAC;QAED,MAAM,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,EAAE,WAAW,CAAC,CAAC;QAC7D,OAAO,YAAY,CAAC;IACxB,CAAC;IAED,yBAAyB;IAEjB,MAAM,CAAC,KAAK,CAAC,aAAa,CAAC,QAAgB;QAC/C,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC9C,OAAO,OAAO,CAAC,QAAQ,CAAC,IAAI,IAAI,CAAC;IACrC,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,QAAgB,EAAE,IAAgB;QACnE,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC9C,OAAO,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC;QACzB,MAAM,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,EAAE,OAAO,CAAC,CAAC;IAC7D,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,gBAAgB;QACjC,OAAO,CAAC,MAAM,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,IAAI,EAAE,CAAC;IACnE,CAAC"}
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
import { type DeviceKey } from '../types/runner.js';
|
|
2
|
+
export declare class MultiDeviceKeyManagerService {
|
|
3
|
+
private static readonly KEYS_STORAGE_KEY;
|
|
4
|
+
private static readonly KEY_EXPIRY_DAYS;
|
|
5
|
+
/**
|
|
6
|
+
* Initialize keys for a new runner (CLI side)
|
|
7
|
+
*/
|
|
8
|
+
static initializeRunnerKeys(runnerId: string): Promise<{
|
|
9
|
+
publicKey: string;
|
|
10
|
+
privateKey: string;
|
|
11
|
+
}>;
|
|
12
|
+
/**
|
|
13
|
+
* Register a new device and derive shared secret
|
|
14
|
+
*/
|
|
15
|
+
static registerDevice(runnerId: string, deviceKey: DeviceKey): Promise<string>;
|
|
16
|
+
/**
|
|
17
|
+
* Remove a device from the runner
|
|
18
|
+
*/
|
|
19
|
+
static removeDevice(runnerId: string, deviceId: string): Promise<void>;
|
|
20
|
+
/**
|
|
21
|
+
* Get shared secret for specific device
|
|
22
|
+
*/
|
|
23
|
+
static getSharedSecret(runnerId: string, deviceId: string): Promise<string | null>;
|
|
24
|
+
/**
|
|
25
|
+
* Get all registered device IDs for a runner
|
|
26
|
+
*/
|
|
27
|
+
static getRegisteredDevices(runnerId: string): Promise<string[]>;
|
|
28
|
+
/**
|
|
29
|
+
* Encrypt command for specific device
|
|
30
|
+
*/
|
|
31
|
+
static encryptForDevice(runnerId: string, deviceId: string, command: string): Promise<string>;
|
|
32
|
+
/**
|
|
33
|
+
* Encrypt command for all registered devices
|
|
34
|
+
*/
|
|
35
|
+
static encryptForAllDevices(runnerId: string, command: string): Promise<Record<string, string>>;
|
|
36
|
+
/**
|
|
37
|
+
* Decrypt command from specific device
|
|
38
|
+
*/
|
|
39
|
+
static decryptFromDevice(runnerId: string, deviceId: string, encryptedCommand: string): Promise<string>;
|
|
40
|
+
/**
|
|
41
|
+
* Check if runner has any registered devices
|
|
42
|
+
*/
|
|
43
|
+
static hasRegisteredDevices(runnerId: string): Promise<boolean>;
|
|
44
|
+
/**
|
|
45
|
+
* Clean up all keys for a runner
|
|
46
|
+
*/
|
|
47
|
+
static removeRunnerKeys(runnerId: string): Promise<void>;
|
|
48
|
+
/**
|
|
49
|
+
* Get CLI's public key for a runner
|
|
50
|
+
*/
|
|
51
|
+
static getCliPublicKey(runnerId: string): Promise<string | null>;
|
|
52
|
+
private static getRunnerKeys;
|
|
53
|
+
private static storeRunnerKeys;
|
|
54
|
+
private static getAllStoredKeys;
|
|
55
|
+
}
|
|
56
|
+
//# sourceMappingURL=multi-device-key-manager.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"multi-device-key-manager.d.ts","sourceRoot":"","sources":["../../src/services/multi-device-key-manager.ts"],"names":[],"mappings":"AAEA,OAAO,EAAC,KAAK,SAAS,EAAC,MAAM,oBAAoB,CAAC;AASlD,qBAAa,4BAA4B;IACrC,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,gBAAgB,CAAkC;IAC1E,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,eAAe,CAAM;IAE7C;;OAEG;WACU,oBAAoB,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC;QAAC,SAAS,EAAE,MAAM,CAAC;QAAC,UAAU,EAAE,MAAM,CAAA;KAAC,CAAC;IAcrG;;OAEG;WACU,cAAc,CAAC,QAAQ,EAAE,MAAM,EAAE,SAAS,EAAE,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC;IA6BpF;;OAEG;WACU,YAAY,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAa5E;;OAEG;WACU,eAAe,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;IAexF;;OAEG;WACU,oBAAoB,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,EAAE,CAAC;IAStE;;OAEG;WACU,gBAAgB,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IASnG;;OAEG;WACU,oBAAoB,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IAuBrG;;OAEG;WACU,iBAAiB,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,EAAE,gBAAgB,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAS7G;;OAEG;WACU,oBAAoB,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAKrE;;OAEG;WACU,gBAAgB,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAO9D;;OAEG;WACU,eAAe,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;mBAOjD,aAAa;mBAKb,eAAe;mBAMf,gBAAgB;CAGxC"}
|