@entity-access/server-pages 1.0.29 → 1.0.31
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.vscode/settings.json +1 -0
- package/dist/Content.d.ts +6 -6
- package/dist/Content.d.ts.map +1 -1
- package/dist/Content.js +21 -37
- package/dist/Content.js.map +1 -1
- package/dist/Page.d.ts +11 -40
- package/dist/Page.d.ts.map +1 -1
- package/dist/Page.js +5 -3
- package/dist/Page.js.map +1 -1
- package/dist/ServerPages.d.ts +13 -5
- package/dist/ServerPages.d.ts.map +1 -1
- package/dist/ServerPages.js +99 -81
- package/dist/ServerPages.js.map +1 -1
- package/dist/core/AsyncStream.d.ts +16 -0
- package/dist/core/AsyncStream.d.ts.map +1 -0
- package/dist/core/AsyncStream.js +55 -0
- package/dist/core/AsyncStream.js.map +1 -0
- package/dist/core/FileApi.d.ts +5 -0
- package/dist/core/FileApi.d.ts.map +1 -0
- package/dist/core/FileApi.js +95 -0
- package/dist/core/FileApi.js.map +1 -0
- package/dist/core/LocalFile.d.ts +2 -1
- package/dist/core/LocalFile.d.ts.map +1 -1
- package/dist/core/LocalFile.js +8 -0
- package/dist/core/LocalFile.js.map +1 -1
- package/dist/core/RouteTree.js +1 -1
- package/dist/core/RouteTree.js.map +1 -1
- package/dist/core/SessionUser.d.ts +2 -2
- package/dist/core/SessionUser.d.ts.map +1 -1
- package/dist/core/SessionUser.js.map +1 -1
- package/dist/core/Wrapped.d.ts +70 -0
- package/dist/core/Wrapped.d.ts.map +1 -0
- package/dist/core/Wrapped.js +253 -0
- package/dist/core/Wrapped.js.map +1 -0
- package/dist/core/cached.d.ts +2 -0
- package/dist/core/cached.d.ts.map +1 -0
- package/dist/core/cached.js +3 -0
- package/dist/core/cached.js.map +1 -0
- package/dist/decorators/Authorize.d.ts +2 -0
- package/dist/decorators/Authorize.d.ts.map +1 -0
- package/dist/decorators/Authorize.js +3 -0
- package/dist/decorators/Authorize.js.map +1 -0
- package/dist/parsers/json/jsonParser.d.ts +2 -0
- package/dist/parsers/json/jsonParser.d.ts.map +1 -0
- package/dist/parsers/json/jsonParser.js +3 -0
- package/dist/parsers/json/jsonParser.js.map +1 -0
- package/dist/services/CookieService.d.ts +3 -3
- package/dist/services/CookieService.d.ts.map +1 -1
- package/dist/services/CookieService.js +2 -4
- package/dist/services/CookieService.js.map +1 -1
- package/dist/ssl/ACME.d.ts +37 -0
- package/dist/ssl/ACME.d.ts.map +1 -0
- package/dist/ssl/ACME.js +200 -0
- package/dist/ssl/ACME.js.map +1 -0
- package/dist/ssl/ChallengeStore.d.ts +8 -0
- package/dist/ssl/ChallengeStore.d.ts.map +1 -0
- package/dist/ssl/ChallengeStore.js +34 -0
- package/dist/ssl/ChallengeStore.js.map +1 -0
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/package.json +4 -6
- package/self-signed/cert.crt +22 -0
- package/self-signed/key.pem +27 -0
- package/src/Content.tsx +28 -43
- package/src/Page.tsx +18 -62
- package/src/ServerPages.ts +114 -76
- package/src/core/AsyncStream.ts +83 -0
- package/src/core/FileApi.ts +52 -0
- package/src/core/LocalFile.ts +11 -2
- package/src/core/RouteTree.ts +1 -1
- package/src/core/SessionUser.ts +2 -2
- package/src/core/Wrapped.ts +359 -0
- package/src/core/cached.ts +3 -0
- package/src/decorators/Authorize.ts +3 -0
- package/src/parsers/json/jsonParser.ts +3 -0
- package/src/services/CookieService.ts +4 -6
- package/src/ssl/ACME.ts +247 -0
- package/src/ssl/ChallengeStore.ts +26 -0
- package/test.js +1 -3
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cached.d.ts","sourceRoot":"","sources":["../../src/core/cached.ts"],"names":[],"mappings":"AAAA,wBAAgB,MAAM,SAErB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cached.js","sourceRoot":"","sources":["../../src/core/cached.ts"],"names":[],"mappings":"AAAA,MAAM,UAAU,MAAM;AAEtB,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"Authorize.d.ts","sourceRoot":"","sources":["../../src/decorators/Authorize.ts"],"names":[],"mappings":"AAAA,wBAAgB,SAAS,SAExB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"Authorize.js","sourceRoot":"","sources":["../../src/decorators/Authorize.ts"],"names":[],"mappings":"AAAA,MAAM,UAAU,SAAS;AAEzB,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"jsonParser.d.ts","sourceRoot":"","sources":["../../../src/parsers/json/jsonParser.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,OAAO,UAAU,UAAU,SAEjC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"jsonParser.js","sourceRoot":"","sources":["../../../src/parsers/json/jsonParser.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,OAAO,UAAU,UAAU;AAElC,CAAC"}
|
|
@@ -1,11 +1,11 @@
|
|
|
1
|
-
import { Request, Response } from "express";
|
|
2
1
|
import SessionUser from "../core/SessionUser.js";
|
|
2
|
+
import { WrappedResponse } from "../core/Wrapped.js";
|
|
3
3
|
export default class CookieService {
|
|
4
4
|
private tokenService;
|
|
5
5
|
private userSessionProvider;
|
|
6
6
|
clearCache: (userID: any, broadcast?: boolean) => void;
|
|
7
|
-
|
|
8
|
-
createSessionUserFromCookie(cookie: string, ip: string, resp?:
|
|
7
|
+
get cookieName(): any;
|
|
8
|
+
createSessionUserFromCookie(cookie: string, ip: string, resp?: WrappedResponse): Promise<SessionUser>;
|
|
9
9
|
private getVerifiedUser;
|
|
10
10
|
private createUserInfo;
|
|
11
11
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"CookieService.d.ts","sourceRoot":"","sources":["../../src/services/CookieService.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"CookieService.d.ts","sourceRoot":"","sources":["../../src/services/CookieService.ts"],"names":[],"mappings":"AAKA,OAAO,WAAW,MAAM,wBAAwB,CAAC;AAEjD,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;AAkDrD,MAAM,CAAC,OAAO,OAAO,aAAa;IAG9B,OAAO,CAAC,YAAY,CAAe;IAGnC,OAAO,CAAC,mBAAmB,CAAsB;IAE1C,UAAU,6CAAc;IAE/B,IAAW,UAAU,QAEpB;IAEK,2BAA2B,CAAC,MAAM,EAAE,MAAM,EAAE,EAAE,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,eAAe;IA0BpF,OAAO,CAAC,eAAe;YA4BT,cAAc;CAa/B"}
|
|
@@ -59,10 +59,8 @@ let CookieService = class CookieService {
|
|
|
59
59
|
constructor() {
|
|
60
60
|
this.clearCache = clearCache;
|
|
61
61
|
}
|
|
62
|
-
|
|
63
|
-
cookieName ??= this.tokenService.authCookieName;
|
|
64
|
-
const sessionCookie = req.cookies[cookieName];
|
|
65
|
-
return req.user = await this.createSessionUserFromCookie(sessionCookie, req.ip, resp);
|
|
62
|
+
get cookieName() {
|
|
63
|
+
return cookieName ??= this.tokenService.authCookieName;
|
|
66
64
|
}
|
|
67
65
|
async createSessionUserFromCookie(cookie, ip, resp) {
|
|
68
66
|
const user = new SessionUser(resp, cookieName, this.tokenService);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"CookieService.js","sourceRoot":"","sources":["../../src/services/CookieService.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,MAAM,EAAE,EAAE,cAAc,EAAsC,MAAM,4CAA4C,CAAC;AACxH,OAAO,YAA6B,MAAM,mBAAmB,CAAC;AAC9D,OAAO,UAAU,MAAM,8DAA8D,CAAC;
|
|
1
|
+
{"version":3,"file":"CookieService.js","sourceRoot":"","sources":["../../src/services/CookieService.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,MAAM,EAAE,EAAE,cAAc,EAAsC,MAAM,4CAA4C,CAAC;AACxH,OAAO,YAA6B,MAAM,mBAAmB,CAAC;AAC9D,OAAO,UAAU,MAAM,8DAA8D,CAAC;AAEtF,OAAO,OAAO,MAAM,SAAS,CAAC;AAC9B,OAAO,WAAW,MAAM,wBAAwB,CAAC;AACjD,OAAO,mBAAmB,MAAM,0BAA0B,CAAC;AAG3D;;;GAGG;AACH,MAAM,WAAW,GAAG,IAAI,GAAG,EAAiB,CAAC;AAC7C,MAAM,YAAY,GAAG,IAAI,UAAU,EAAgC,CAAC;AAEpE,IAAI,UAAU,GAAG,IAAI,CAAC;AAEtB,MAAM,WAAW,GAAG,MAAM,CAAC,aAAa,CAAC,CAAC;AAE1C,MAAM,OAAO,GAAG,IAAI,oBAAoB,CAAS,CAAC,SAAS,EAAE,EAAE;IAC3D,WAAW,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;AAClC,CAAC,CAAC,CAAC;AAEH,MAAM,UAAU,GAAG,CAAC,MAAM,EAAE,SAAS,GAAG,IAAI,EAAE,EAAE;IAC5C,MAAM,MAAM,GAAG,WAAW,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACvC,IAAI,MAAM,EAAE,CAAC;QACT,YAAY,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;IAChC,CAAC;IACD,IAAI,CAAC,SAAS,EAAE,CAAC;QACb,OAAO;IACX,CAAC;IACD,MAAM,YAAY,GAAG;QACjB,IAAI,EAAE,4BAA4B;QAClC,MAAM;KACT,CAAC;IACF,IAAI,OAAO,CAAC,QAAQ,EAAE,CAAC;QACnB,OAAO,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;IAC/B,CAAC;SAAM,CAAC;QACJ,IAAG,OAAO,CAAC,OAAO,EAAE,CAAC;YACjB,KAAK,MAAM,GAAG,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;gBAChC,IAAI,MAAM,CAAC,SAAS,CAAC,cAAc,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,GAAG,CAAC,EAAE,CAAC;oBAC7D,MAAM,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;oBACrC,OAAO,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBAC/B,CAAC;YACL,CAAC;QACL,CAAC;IACL,CAAC;AACL,CAAC,CAAC;AAEF,OAAO,CAAC,EAAE,CAAC,SAAS,EAAE,CAAC,GAAQ,EAAE,EAAE;IAC/B,IAAI,GAAG,CAAC,IAAI,KAAK,4BAA4B,EAAE,CAAC;QAC5C,UAAU,CAAC,GAAG,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IAClC,CAAC;AACL,CAAC,CAAC,CAAC;AAGY,IAAM,aAAa,GAAnB,MAAM,aAAa;IAAnB;QAQJ,eAAU,GAAG,UAAU,CAAC;IAyEnC,CAAC;IAvEG,IAAW,UAAU;QACjB,OAAO,UAAU,KAAK,IAAI,CAAC,YAAY,CAAC,cAAc,CAAC;IAC3D,CAAC;IAED,KAAK,CAAC,2BAA2B,CAAC,MAAc,EAAE,EAAU,EAAE,IAAsB;QAChF,MAAM,IAAI,GAAG,IAAI,WAAW,CAAC,IAAI,EAAE,UAAU,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;QAClE,IAAI,CAAC;YACD,IAAI,CAAC,SAAS,GAAG,EAAE,CAAC;YACpB,IAAI,MAAM,EAAE,CAAC;gBACT,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;gBACpD,IAAI,QAAQ,EAAE,SAAS,EAAE,CAAC;oBACtB,IAAI,CAAC,SAAS,GAAG,QAAQ,CAAC,SAAS,CAAC;gBACxC,CAAC;gBACD,IAAI,QAAQ,EAAE,MAAM,EAAE,CAAC;oBACnB,IAAI,CAAC,WAAW,CAAC,GAAG,QAAQ,CAAC;oBAC7B,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;wBACzB,IAAI,MAAM,CAAC,SAAS,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,CAAC,EAAE,CAAC;4BACtD,MAAM,OAAO,GAAG,QAAQ,CAAC,GAAG,CAAC,CAAC;4BAC9B,IAAI,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC;wBACxB,CAAC;oBACL,CAAC;gBACL,CAAC;YACL,CAAC;YACD,OAAO,IAAI,CAAC;QAChB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YACrB,OAAO,IAAI,CAAC;QAChB,CAAC;IACL,CAAC;IAEO,eAAe,CAAC,MAAc;QAElC,OAAO,YAAY,CAAC,gBAAgB,CAAC,MAAM,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE;YAErD,MAAM,YAAY,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAgB,CAAC;YACvD,IAAI,CAAC,YAAY,CAAC,EAAE,EAAE,CAAC;gBACnB,OAAO,EAAE,CAAC;YACd,CAAC;YAED,IAAG,CAAC,MAAM,IAAI,CAAC,YAAY,CAAC,aAAa,CAAC,YAAY,EAAE,KAAK,CAAC,EAAE,CAAC;gBAC7D,OAAO,EAAE,CAAC;YACd,CAAC;YAED,IAAI,CAAC,YAAY,CAAC,MAAM,EAAE,CAAC;gBACvB,OAAO;oBACH,SAAS,EAAE,YAAY,CAAC,EAAE;iBAC7B,CAAC;YACN,CAAC;YAED,IAAI,OAAO,YAAY,CAAC,MAAM,KAAK,QAAQ,EAAE,CAAC;gBAC1C,YAAY,CAAC,MAAM,GAAG,IAAI,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;YACxD,CAAC;YAED,MAAM,CAAC,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;YAC1D,OAAO,CAAC,CAAC;QACb,CAAC,CAAC,CAAC;IACP,CAAC;IAEO,KAAK,CAAC,cAAc,CAAC,MAAc,EAAE,YAAyB;QAClE,MAAM,CAAC,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,cAAc,CAAC,YAAY,CAAC,CAAC;QACtE,IAAI,CAAC,KAAK,IAAI,EAAE,CAAC;YACb,OAAO,EAAE,CAAC;QACd,CAAC;QACD,IAAI,CAAC,CAAC,MAAM,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,CAAC,OAAO,EAAE,CAAC;YAC/C,OAAO,EAAE,CAAC;QACd,CAAC;QACD,OAAO,CAAC,QAAQ,CAAC,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC;QAC9B,WAAW,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAClC,OAAO,CAAC,CAAC;IACb,CAAC;CAEJ,CAAA;AA9EW;IADP,MAAM;8BACe,YAAY;mDAAC;AAG3B;IADP,MAAM;8BACsB,mBAAmB;0DAAC;AANhC,aAAa;IADjC,cAAc;GACM,aAAa,CAiFjC;eAjFoB,aAAa"}
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
/// <reference types="node" resolution-mode="require"/>
|
|
2
|
+
import * as tls from "node:tls";
|
|
3
|
+
export interface IAcmeOptions {
|
|
4
|
+
sslMode?: string;
|
|
5
|
+
accountPrivateKeyPath?: string;
|
|
6
|
+
emailAddress?: string;
|
|
7
|
+
mode?: "production" | "self-signed" | "staging";
|
|
8
|
+
endPoint?: string;
|
|
9
|
+
eabKid?: string;
|
|
10
|
+
eabHmac?: string;
|
|
11
|
+
}
|
|
12
|
+
export interface ICertOptions extends IAcmeOptions {
|
|
13
|
+
host: string;
|
|
14
|
+
}
|
|
15
|
+
export default class ACME {
|
|
16
|
+
private challengeStore;
|
|
17
|
+
private map;
|
|
18
|
+
getSecureContext(options: ICertOptions): Promise<tls.SecureContext>;
|
|
19
|
+
setup({ host, sslMode, accountPrivateKeyPath, emailAddress, mode, endPoint, eabKid, eabHmac }: {
|
|
20
|
+
host: any;
|
|
21
|
+
sslMode?: string;
|
|
22
|
+
accountPrivateKeyPath?: string;
|
|
23
|
+
emailAddress?: string;
|
|
24
|
+
mode?: "production" | "self-signed" | "staging";
|
|
25
|
+
endPoint?: string;
|
|
26
|
+
eabKid?: string;
|
|
27
|
+
eabHmac?: string;
|
|
28
|
+
}): Promise<{
|
|
29
|
+
key: any;
|
|
30
|
+
cert: any;
|
|
31
|
+
}>;
|
|
32
|
+
setupSelfSigned(sslMode?: string): {
|
|
33
|
+
key: any;
|
|
34
|
+
cert: any;
|
|
35
|
+
};
|
|
36
|
+
}
|
|
37
|
+
//# sourceMappingURL=ACME.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ACME.d.ts","sourceRoot":"","sources":["../../src/ssl/ACME.ts"],"names":[],"mappings":";AAUA,OAAO,KAAK,GAAG,MAAM,UAAU,CAAC;AAEhC,MAAM,WAAW,YAAY;IACzB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,qBAAqB,CAAC,EAAE,MAAM,CAAC;IAC/B,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,IAAI,CAAC,EAAG,YAAY,GAAG,aAAa,GAAG,SAAS,CAAC;IACjD,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,OAAO,CAAC,EAAE,MAAM,CAAA;CACnB;AAED,MAAM,WAAW,YAAa,SAAQ,YAAY;IAC9C,IAAI,EAAE,MAAM,CAAC;CAChB;AAGD,MAAM,CAAC,OAAO,OAAO,IAAI;IAGrB,OAAO,CAAC,cAAc,CAAiB;IAEvC,OAAO,CAAC,GAAG,CAAwC;IAEtC,gBAAgB,CAAC,OAAO,EAAE,YAAY;IAatC,KAAK,CAAC,EACf,IAAI,EACJ,OAAc,EACd,qBAA4B,EAC5B,YAAiB,EACjB,IAA+D,EAC/D,QAAa,EACb,MAAW,EACX,OAAY,EACf;;;;;;;;;KAAA;;;;IAsHM,eAAe,CAAC,OAAO,SAAO;;;;CAwExC"}
|
package/dist/ssl/ACME.js
ADDED
|
@@ -0,0 +1,200 @@
|
|
|
1
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
2
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
3
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
4
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
|
+
};
|
|
7
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
8
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
9
|
+
};
|
|
10
|
+
import * as forge from "node-forge";
|
|
11
|
+
import * as crypto from "crypto";
|
|
12
|
+
import * as acme from "acme-client";
|
|
13
|
+
import DateTime from "@entity-access/entity-access/dist/types/DateTime.js";
|
|
14
|
+
import cluster from "cluster";
|
|
15
|
+
import { existsSync, writeFileSync, readFileSync, unlinkSync } from "fs";
|
|
16
|
+
import { join } from "path";
|
|
17
|
+
import ensureDir, { deleteIfExists } from "../core/FileApi.js";
|
|
18
|
+
import Inject, { RegisterSingleton } from "@entity-access/entity-access/dist/di/di.js";
|
|
19
|
+
import ChallengeStore from "./ChallengeStore.js";
|
|
20
|
+
import * as tls from "node:tls";
|
|
21
|
+
;
|
|
22
|
+
let ACME = class ACME {
|
|
23
|
+
constructor() {
|
|
24
|
+
this.map = new Map();
|
|
25
|
+
}
|
|
26
|
+
async getSecureContext(options) {
|
|
27
|
+
const { host } = options;
|
|
28
|
+
let sc = this.map.get(host);
|
|
29
|
+
if (sc) {
|
|
30
|
+
return sc;
|
|
31
|
+
}
|
|
32
|
+
const { key, cert } = await this.setup(options);
|
|
33
|
+
sc = tls.createSecureContext({ cert, key });
|
|
34
|
+
this.map.set(host, sc);
|
|
35
|
+
return sc;
|
|
36
|
+
}
|
|
37
|
+
async setup({ host, sslMode = "./", accountPrivateKeyPath = "./", emailAddress = "", mode = "production", endPoint = "", eabKid = "", eabHmac = "" }) {
|
|
38
|
+
if (mode === "self-signed") {
|
|
39
|
+
return this.setupSelfSigned(sslMode);
|
|
40
|
+
}
|
|
41
|
+
const hostRoot = join(sslMode, host);
|
|
42
|
+
ensureDir(hostRoot);
|
|
43
|
+
const keyPath = join(hostRoot, "cert.key");
|
|
44
|
+
const certPath = join(hostRoot, "cert.crt");
|
|
45
|
+
const logs = [];
|
|
46
|
+
try {
|
|
47
|
+
const maintainerEmail = emailAddress;
|
|
48
|
+
let externalAccountBinding;
|
|
49
|
+
if (eabKid) {
|
|
50
|
+
externalAccountBinding = {
|
|
51
|
+
kid: eabKid,
|
|
52
|
+
hmacKey: eabHmac
|
|
53
|
+
};
|
|
54
|
+
}
|
|
55
|
+
let cert;
|
|
56
|
+
let key;
|
|
57
|
+
if (!existsSync(keyPath)) {
|
|
58
|
+
deleteIfExists(certPath);
|
|
59
|
+
key = (await acme.crypto.createPrivateRsaKey()).toString();
|
|
60
|
+
writeFileSync(keyPath, key);
|
|
61
|
+
console.log(`Creating key at ${keyPath}`);
|
|
62
|
+
}
|
|
63
|
+
else {
|
|
64
|
+
key = readFileSync(keyPath, "utf8");
|
|
65
|
+
}
|
|
66
|
+
// load cert...
|
|
67
|
+
if (existsSync(certPath)) {
|
|
68
|
+
cert = readFileSync(certPath, "utf8");
|
|
69
|
+
const certificate = new crypto.X509Certificate(cert);
|
|
70
|
+
const validTo = DateTime.parse(certificate.validTo).diff(DateTime.now);
|
|
71
|
+
if (validTo.totalDays > 30) {
|
|
72
|
+
console.log(`Reusing certificate, valid for ${validTo.totalDays}`);
|
|
73
|
+
return { cert, key };
|
|
74
|
+
}
|
|
75
|
+
console.log(`Deleting old certificates`);
|
|
76
|
+
unlinkSync(certPath);
|
|
77
|
+
}
|
|
78
|
+
if (!cluster.isPrimary) {
|
|
79
|
+
console.log(`Generating Self Signed SSL Certificate for ${host} in cluster worker. Contact administrator.`);
|
|
80
|
+
return this.setupSelfSigned();
|
|
81
|
+
}
|
|
82
|
+
let accountKey;
|
|
83
|
+
if (existsSync(accountPrivateKeyPath)) {
|
|
84
|
+
console.log("Reusing the account private key.");
|
|
85
|
+
accountKey = readFileSync(accountPrivateKeyPath);
|
|
86
|
+
}
|
|
87
|
+
else {
|
|
88
|
+
console.log("Creating new private key.");
|
|
89
|
+
accountKey = await acme.crypto.createPrivateKey();
|
|
90
|
+
writeFileSync(accountPrivateKeyPath, accountKey);
|
|
91
|
+
}
|
|
92
|
+
acme.setLogger((message) => {
|
|
93
|
+
// console.log(message);
|
|
94
|
+
logs.push(message);
|
|
95
|
+
});
|
|
96
|
+
let altNames;
|
|
97
|
+
// auto renew...
|
|
98
|
+
const client = new acme.Client({
|
|
99
|
+
directoryUrl: endPoint || acme.directory.letsencrypt[mode],
|
|
100
|
+
accountKey,
|
|
101
|
+
externalAccountBinding,
|
|
102
|
+
});
|
|
103
|
+
/* Create CSR */
|
|
104
|
+
const [csrKey, csr] = await acme.crypto.createCsr({
|
|
105
|
+
commonName: host,
|
|
106
|
+
altNames
|
|
107
|
+
}, key);
|
|
108
|
+
/* Certificate */
|
|
109
|
+
cert = await client.auto({
|
|
110
|
+
csr,
|
|
111
|
+
email: maintainerEmail,
|
|
112
|
+
termsOfServiceAgreed: true,
|
|
113
|
+
skipChallengeVerification: true,
|
|
114
|
+
challengePriority: ["http-01"],
|
|
115
|
+
challengeCreateFn: (authz, challenge, keyAuthorization) => {
|
|
116
|
+
if (challenge.type !== "http-01") {
|
|
117
|
+
return;
|
|
118
|
+
}
|
|
119
|
+
return this.challengeStore.save(challenge.token, keyAuthorization);
|
|
120
|
+
},
|
|
121
|
+
challengeRemoveFn: (authz, challenge, keyAuthorization) => {
|
|
122
|
+
return this.challengeStore.remove(challenge.token);
|
|
123
|
+
},
|
|
124
|
+
});
|
|
125
|
+
writeFileSync(certPath, cert);
|
|
126
|
+
return { cert, key };
|
|
127
|
+
}
|
|
128
|
+
catch (error) {
|
|
129
|
+
console.log(logs.join("\n"));
|
|
130
|
+
console.error(error);
|
|
131
|
+
throw error;
|
|
132
|
+
}
|
|
133
|
+
}
|
|
134
|
+
setupSelfSigned(sslMode = "./") {
|
|
135
|
+
const selfSigned = `${sslMode}/self-signed/`;
|
|
136
|
+
ensureDir(selfSigned);
|
|
137
|
+
const certPath = `${selfSigned}/cert.crt`;
|
|
138
|
+
const keyPath = `${selfSigned}/key.pem`;
|
|
139
|
+
let key;
|
|
140
|
+
let cert;
|
|
141
|
+
if (existsSync(certPath) && existsSync(keyPath)) {
|
|
142
|
+
key = readFileSync(keyPath);
|
|
143
|
+
cert = readFileSync(certPath);
|
|
144
|
+
return { key, cert };
|
|
145
|
+
}
|
|
146
|
+
const pki = forge.default.pki;
|
|
147
|
+
// generate a key pair or use one you have already
|
|
148
|
+
const keys = pki.rsa.generateKeyPair(2048);
|
|
149
|
+
// create a new certificate
|
|
150
|
+
const crt = pki.createCertificate();
|
|
151
|
+
// fill the required fields
|
|
152
|
+
crt.publicKey = keys.publicKey;
|
|
153
|
+
crt.serialNumber = '01';
|
|
154
|
+
crt.validity.notBefore = new Date();
|
|
155
|
+
crt.validity.notAfter = new Date();
|
|
156
|
+
crt.validity.notAfter.setFullYear(crt.validity.notBefore.getFullYear() + 40);
|
|
157
|
+
// use your own attributes here, or supply a csr (check the docs)
|
|
158
|
+
const attrs = [
|
|
159
|
+
{
|
|
160
|
+
name: 'commonName',
|
|
161
|
+
value: 'dev.socialmail.in'
|
|
162
|
+
}, {
|
|
163
|
+
name: 'countryName',
|
|
164
|
+
value: 'IN'
|
|
165
|
+
}, {
|
|
166
|
+
shortName: 'ST',
|
|
167
|
+
value: 'Maharashtra'
|
|
168
|
+
}, {
|
|
169
|
+
name: 'localityName',
|
|
170
|
+
value: 'Navi Mumbai'
|
|
171
|
+
}, {
|
|
172
|
+
name: 'organizationName',
|
|
173
|
+
value: 'NeuroSpeech Technologies Pvt Ltd'
|
|
174
|
+
}, {
|
|
175
|
+
shortName: 'OU',
|
|
176
|
+
value: 'Test'
|
|
177
|
+
}
|
|
178
|
+
];
|
|
179
|
+
// here we set subject and issuer as the same one
|
|
180
|
+
crt.setSubject(attrs);
|
|
181
|
+
crt.setIssuer(attrs);
|
|
182
|
+
// the actual certificate signing
|
|
183
|
+
crt.sign(keys.privateKey);
|
|
184
|
+
// now convert the Forge certificate to PEM format
|
|
185
|
+
cert = pki.certificateToPem(crt);
|
|
186
|
+
key = pki.privateKeyToPem(keys.privateKey);
|
|
187
|
+
writeFileSync(certPath, cert);
|
|
188
|
+
writeFileSync(keyPath, key);
|
|
189
|
+
return { key, cert };
|
|
190
|
+
}
|
|
191
|
+
};
|
|
192
|
+
__decorate([
|
|
193
|
+
Inject,
|
|
194
|
+
__metadata("design:type", ChallengeStore)
|
|
195
|
+
], ACME.prototype, "challengeStore", void 0);
|
|
196
|
+
ACME = __decorate([
|
|
197
|
+
RegisterSingleton
|
|
198
|
+
], ACME);
|
|
199
|
+
export default ACME;
|
|
200
|
+
//# sourceMappingURL=ACME.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ACME.js","sourceRoot":"","sources":["../../src/ssl/ACME.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,KAAK,KAAK,MAAM,YAAY,CAAC;AACpC,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AACjC,OAAO,KAAK,IAAI,MAAM,aAAa,CAAC;AACpC,OAAO,QAAQ,MAAM,qDAAqD,CAAC;AAC3E,OAAO,OAAO,MAAM,SAAS,CAAC;AAC9B,OAAO,EAAE,UAAU,EAAE,aAAa,EAAE,YAAY,EAAE,UAAU,EAAa,MAAM,IAAI,CAAC;AACpF,OAAO,EAAE,IAAI,EAAE,MAAM,MAAM,CAAA;AAC3B,OAAO,SAAS,EAAE,EAAE,cAAc,EAAE,MAAM,oBAAoB,CAAC;AAC/D,OAAO,MAAM,EAAE,EAAE,iBAAiB,EAAE,MAAM,4CAA4C,CAAC;AACvF,OAAO,cAAc,MAAM,qBAAqB,CAAC;AACjD,OAAO,KAAK,GAAG,MAAM,UAAU,CAAC;AAc/B,CAAC;AAGa,IAAM,IAAI,GAAV,MAAM,IAAI;IAAV;QAKH,QAAG,GAAG,IAAI,GAAG,EAA6B,CAAC;IAsNvD,CAAC;IApNU,KAAK,CAAC,gBAAgB,CAAC,OAAqB;QAC/C,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAC;QACzB,IAAI,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QAC5B,IAAI,EAAE,EAAE,CAAC;YACL,OAAO,EAAE,CAAC;QACd,CAAC;QAED,MAAM,EAAE,GAAG,EAAG,IAAI,EAAE,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,CAAA;QAChD,EAAE,GAAG,GAAG,CAAC,mBAAmB,CAAC,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC;QAC5C,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QACvB,OAAO,EAAE,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,KAAK,CAAC,EACf,IAAI,EACJ,OAAO,GAAG,IAAI,EACd,qBAAqB,GAAG,IAAI,EAC5B,YAAY,GAAG,EAAE,EACjB,IAAI,GAAG,YAAwD,EAC/D,QAAQ,GAAG,EAAE,EACb,MAAM,GAAG,EAAE,EACX,OAAO,GAAG,EAAE,EACf;QAEG,IAAI,IAAI,KAAK,aAAa,EAAE,CAAC;YACzB,OAAO,IAAI,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACzC,CAAC;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAErC,SAAS,CAAC,QAAQ,CAAC,CAAC;QAEpB,MAAM,OAAO,GAAG,IAAI,CAAC,QAAQ,EAAE,UAAU,CAAC,CAAC;QAC3C,MAAM,QAAQ,GAAG,IAAI,CAAC,QAAQ,EAAE,UAAU,CAAC,CAAC;QAE5C,MAAM,IAAI,GAAG,EAAE,CAAC;QAEhB,IAAI,CAAC;YAED,MAAM,eAAe,GAAG,YAAY,CAAC;YAErC,IAAI,sBAAsB,CAAC;YAE3B,IAAI,MAAM,EAAE,CAAC;gBACT,sBAAsB,GAAG;oBACrB,GAAG,EAAE,MAAM;oBACX,OAAO,EAAE,OAAO;iBACnB,CAAC;YACN,CAAC;YAED,IAAI,IAAW,CAAC;YAChB,IAAI,GAAU,CAAC;YAEf,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC;gBACvB,cAAc,CAAC,QAAQ,CAAC,CAAC;gBACzB,GAAG,GAAG,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,mBAAmB,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC;gBAC3D,aAAa,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;gBAC5B,OAAO,CAAC,GAAG,CAAC,mBAAmB,OAAO,EAAE,CAAC,CAAC;YAC9C,CAAC;iBAAM,CAAC;gBACJ,GAAG,GAAG,YAAY,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;YACxC,CAAC;YAED,eAAe;YACf,IAAI,UAAU,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACvB,IAAI,GAAG,YAAY,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;gBACtC,MAAM,WAAW,GAAG,IAAI,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC;gBACrD,MAAM,OAAO,GAAG,QAAQ,CAAC,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;gBACvE,IAAI,OAAO,CAAC,SAAS,GAAG,EAAE,EAAE,CAAC;oBACzB,OAAO,CAAC,GAAG,CAAC,kCAAkC,OAAO,CAAC,SAAS,EAAE,CAAC,CAAC;oBACnE,OAAO,EAAE,IAAI,EAAG,GAAG,EAAE,CAAC;gBAC1B,CAAC;gBACD,OAAO,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;gBACzC,UAAU,CAAC,QAAQ,CAAC,CAAC;YACzB,CAAC;YAED,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,CAAC;gBACrB,OAAO,CAAC,GAAG,CAAC,8CAA8C,IAAI,4CAA4C,CAAC,CAAC;gBAC5G,OAAO,IAAI,CAAC,eAAe,EAAE,CAAC;YAClC,CAAC;YAED,IAAI,UAAU,CAAC;YACf,IAAI,UAAU,CAAC,qBAAqB,CAAC,EAAG,CAAC;gBACrC,OAAO,CAAC,GAAG,CAAC,kCAAkC,CAAC,CAAC;gBAChD,UAAU,GAAG,YAAY,CAAC,qBAAqB,CAAC,CAAC;YACrD,CAAC;iBAAM,CAAC;gBACJ,OAAO,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;gBACzC,UAAU,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,gBAAgB,EAAE,CAAC;gBAClD,aAAa,CAAC,qBAAqB,EAAE,UAAU,CAAC,CAAC;YACrD,CAAC;YAED,IAAI,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,EAAE;gBACvB,wBAAwB;gBACxB,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YACvB,CAAC,CAAC,CAAC;YAEH,IAAI,QAAQ,CAAC;YAEb,gBAAgB;YAChB,MAAM,MAAM,GAAG,IAAI,IAAI,CAAC,MAAM,CAAC;gBAC3B,YAAY,EAAE,QAAQ,IAAI,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,IAAI,CAAC;gBAC1D,UAAU;gBACV,sBAAsB;aACzB,CAAC,CAAC;YAEH,gBAAgB;YAChB,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC;gBAC9C,UAAU,EAAE,IAAI;gBAChB,QAAQ;aACX,EAAE,GAAG,CAAC,CAAC;YAIR,iBAAiB;YACjB,IAAI,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC;gBACrB,GAAG;gBACH,KAAK,EAAE,eAAe;gBACtB,oBAAoB,EAAE,IAAI;gBAC1B,yBAAyB,EAAE,IAAI;gBAC/B,iBAAiB,EAAE,CAAC,SAAS,CAAC;gBAC9B,iBAAiB,EAAE,CAAC,KAAK,EAAE,SAAS,EAAE,gBAAgB,EAAE,EAAE;oBACtD,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;wBAC/B,OAAO;oBACX,CAAC;oBACD,OAAO,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,SAAS,CAAC,KAAK,EAAE,gBAAgB,CAAC,CAAC;gBACvE,CAAC;gBACD,iBAAiB,EAAE,CAAC,KAAK,EAAE,SAAS,EAAE,gBAAgB,EAAE,EAAE;oBACtD,OAAO,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;gBACvD,CAAC;aACJ,CAAC,CAAC;YAEH,aAAa,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;YAE9B,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;QACzB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;YAC7B,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YACrB,MAAM,KAAK,CAAC;QAChB,CAAC;IACL,CAAC;IAEM,eAAe,CAAC,OAAO,GAAG,IAAI;QAEjC,MAAM,UAAU,GAAG,GAAG,OAAO,eAAe,CAAC;QAE7C,SAAS,CAAC,UAAU,CAAC,CAAC;QAEtB,MAAM,QAAQ,GAAI,GAAG,UAAU,WAAW,CAAC;QAC3C,MAAM,OAAO,GAAI,GAAG,UAAU,UAAU,CAAC;QAEzC,IAAI,GAAG,CAAC;QACR,IAAI,IAAI,CAAC;QAET,IAAI,UAAU,CAAC,QAAQ,CAAC,IAAI,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC;YAC9C,GAAG,GAAG,YAAY,CAAC,OAAO,CAAC,CAAC;YAC5B,IAAI,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAC;YAC9B,OAAO,EAAE,GAAG,EAAE,IAAI,EAAE,CAAC;QACzB,CAAC;QAED,MAAM,GAAG,GAAG,KAAK,CAAC,OAAO,CAAC,GAAG,CAAC;QAE9B,kDAAkD;QAClD,MAAM,IAAI,GAAG,GAAG,CAAC,GAAG,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC;QAE3C,2BAA2B;QAC3B,MAAM,GAAG,GAAG,GAAG,CAAC,iBAAiB,EAAE,CAAC;QAEpC,2BAA2B;QAC3B,GAAG,CAAC,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC;QAC/B,GAAG,CAAC,YAAY,GAAG,IAAI,CAAC;QACxB,GAAG,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC;QACpC,GAAG,CAAC,QAAQ,CAAC,QAAQ,GAAG,IAAI,IAAI,EAAE,CAAC;QACnC,GAAG,CAAC,QAAQ,CAAC,QAAQ,CAAC,WAAW,CAAC,GAAG,CAAC,QAAQ,CAAC,SAAS,CAAC,WAAW,EAAE,GAAG,EAAE,CAAC,CAAC;QAE7E,iEAAiE;QACjE,MAAM,KAAK,GAAG;YACV;gBACI,IAAI,EAAE,YAAY;gBAClB,KAAK,EAAE,mBAAmB;aAC7B,EAAE;gBACC,IAAI,EAAE,aAAa;gBACnB,KAAK,EAAE,IAAI;aACd,EAAE;gBACC,SAAS,EAAE,IAAI;gBACf,KAAK,EAAE,aAAa;aACvB,EAAE;gBACC,IAAI,EAAE,cAAc;gBACpB,KAAK,EAAE,aAAa;aACvB,EAAE;gBACC,IAAI,EAAE,kBAAkB;gBACxB,KAAK,EAAE,kCAAkC;aAC5C,EAAE;gBACC,SAAS,EAAE,IAAI;gBACf,KAAK,EAAE,MAAM;aAChB;SACJ,CAAC;QAEF,iDAAiD;QACjD,GAAG,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;QACtB,GAAG,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;QAErB,iCAAiC;QACjC,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAE1B,kDAAkD;QAClD,IAAI,GAAG,GAAG,CAAC,gBAAgB,CAAC,GAAG,CAAC,CAAC;QACjC,GAAG,GAAG,GAAG,CAAC,eAAe,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAE3C,aAAa,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;QAC9B,aAAa,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;QAE5B,OAAO,EAAE,GAAG,EAAE,IAAI,EAAE,CAAC;IACzB,CAAC;CACJ,CAAA;AAxNW;IADP,MAAM;8BACiB,cAAc;4CAAC;AAHtB,IAAI;IADxB,iBAAiB;GACG,IAAI,CA2NxB;eA3NoB,IAAI"}
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
/// <reference types="node" resolution-mode="require"/>
|
|
2
|
+
export default class ChallengeStore {
|
|
3
|
+
constructor();
|
|
4
|
+
get(name: string): Promise<Buffer>;
|
|
5
|
+
save(name: string, value: string): Promise<void>;
|
|
6
|
+
remove(name: string): Promise<void>;
|
|
7
|
+
}
|
|
8
|
+
//# sourceMappingURL=ChallengeStore.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ChallengeStore.d.ts","sourceRoot":"","sources":["../../src/ssl/ChallengeStore.ts"],"names":[],"mappings":";AAQA,MAAM,CAAC,OAAO,OAAO,cAAc;;IAMzB,GAAG,CAAC,IAAI,EAAE,MAAM;IAIhB,IAAI,CAAC,IAAI,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM;IAIhC,MAAM,CAAC,IAAI,EAAE,MAAM;CAG5B"}
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
2
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
3
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
4
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
|
+
};
|
|
7
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
8
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
9
|
+
};
|
|
10
|
+
import { RegisterSingleton } from "@entity-access/entity-access/dist/di/di.js";
|
|
11
|
+
import ensureDir from "../core/FileApi.js";
|
|
12
|
+
import { readFileSync, unlinkSync, writeFileSync } from "fs";
|
|
13
|
+
import { join } from "node:path";
|
|
14
|
+
const path = "./challenges";
|
|
15
|
+
let ChallengeStore = class ChallengeStore {
|
|
16
|
+
constructor() {
|
|
17
|
+
ensureDir(path);
|
|
18
|
+
}
|
|
19
|
+
async get(name) {
|
|
20
|
+
return readFileSync(join(path, name));
|
|
21
|
+
}
|
|
22
|
+
async save(name, value) {
|
|
23
|
+
writeFileSync(join(path, name), value, "utf8");
|
|
24
|
+
}
|
|
25
|
+
async remove(name) {
|
|
26
|
+
unlinkSync(join(path, name));
|
|
27
|
+
}
|
|
28
|
+
};
|
|
29
|
+
ChallengeStore = __decorate([
|
|
30
|
+
RegisterSingleton,
|
|
31
|
+
__metadata("design:paramtypes", [])
|
|
32
|
+
], ChallengeStore);
|
|
33
|
+
export default ChallengeStore;
|
|
34
|
+
//# sourceMappingURL=ChallengeStore.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ChallengeStore.js","sourceRoot":"","sources":["../../src/ssl/ChallengeStore.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,4CAA4C,CAAC;AAC/E,OAAO,SAAS,MAAM,oBAAoB,CAAC;AAC3C,OAAO,EAAE,YAAY,EAAE,UAAU,EAAE,aAAa,EAAE,MAAM,IAAI,CAAC;AAC7D,OAAO,EAAE,IAAI,EAAE,MAAM,WAAW,CAAC;AAEjC,MAAM,IAAI,GAAG,cAAc,CAAC;AAGb,IAAM,cAAc,GAApB,MAAM,cAAc;IAE/B;QACI,SAAS,CAAC,IAAI,CAAC,CAAC;IACpB,CAAC;IAED,KAAK,CAAC,GAAG,CAAC,IAAY;QAClB,OAAO,YAAY,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;IAC1C,CAAC;IAED,KAAK,CAAC,IAAI,CAAC,IAAY,EAAE,KAAa;QAClC,aAAa,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,KAAK,EAAE,MAAM,CAAC,CAAC;IACnD,CAAC;IAED,KAAK,CAAC,MAAM,CAAC,IAAY;QACrB,UAAU,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;IACjC,CAAC;CACJ,CAAA;AAjBoB,cAAc;IADlC,iBAAiB;;GACG,cAAc,CAiBlC;eAjBoB,cAAc"}
|