@lilaquadrat/studio 2.4.0 → 2.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/main.d.ts +2 -1
- package/lib/main.d.ts.map +1 -1
- package/lib/main.js +3 -1
- package/lib/main.js.map +1 -1
- package/lib/src/AzureVault.class.d.ts +15 -0
- package/lib/src/AzureVault.class.d.ts.map +1 -0
- package/lib/src/AzureVault.class.js +30 -0
- package/lib/src/AzureVault.class.js.map +1 -0
- package/lib/src/AzureVault.d.ts +14 -0
- package/lib/src/AzureVault.d.ts.map +1 -0
- package/lib/src/AzureVault.js +30 -0
- package/lib/src/AzureVault.js.map +1 -0
- package/lib/src/classes/AzureVault.class.d.ts +15 -0
- package/lib/src/classes/AzureVault.class.d.ts.map +1 -0
- package/lib/src/classes/AzureVault.class.js +30 -0
- package/lib/src/classes/AzureVault.class.js.map +1 -0
- package/lib/src/dns.challenge.class.d.ts +3 -3
- package/lib/src/dns.challenge.class.d.ts.map +1 -1
- package/lib/src/dns.challenge.class.js.map +1 -1
- package/lib/src/domain.class.d.ts +8 -3
- package/lib/src/domain.class.d.ts.map +1 -1
- package/lib/src/domain.class.js +42 -4
- package/lib/src/domain.class.js.map +1 -1
- package/package.json +5 -2
package/lib/main.d.ts
CHANGED
|
@@ -11,4 +11,5 @@ import modelsClass, { Models } from './src/classes/models.class';
|
|
|
11
11
|
import ControllerBase from './src/classes/ControllerBase.class';
|
|
12
12
|
import mongoClass, { MongoClass } from './src/classes/mongo.class';
|
|
13
13
|
import respondCode from './src/functions/respondCode';
|
|
14
|
-
|
|
14
|
+
import AzureVault from './src/AzureVault';
|
|
15
|
+
export { Immutable, ShareClientFactory, SSLChallenge, Nginx, Domain, DockerCompose, conf, Modelv2, Models, modelsClass, logger, MongoClass, mongoClass, respondCode, ControllerBase, AzureVault };
|
package/lib/main.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"main.d.ts","sourceRoot":"","sources":["../main.ts"],"names":[],"mappings":"AAAA,OAAO,SAAS,MAAM,uBAAuB,CAAC;AAC9C,OAAO,kBAAkB,MAAM,gCAAgC,CAAC;AAEhE,OAAO,YAAY,MAAM,4BAA4B,CAAC;AACtD,OAAO,KAAK,MAAM,mBAAmB,CAAC;AACtC,OAAO,MAAM,MAAM,oBAAoB,CAAC;AACxC,OAAO,aAAa,MAAM,4BAA4B,CAAC;AACvD,OAAO,IAAI,MAAM,kBAAkB,CAAC;AACpC,OAAO,MAAM,MAAM,cAAc,CAAC;AAClC,OAAO,OAAO,MAAM,6BAA6B,CAAC;AAClD,OAAO,WAAW,EAAE,EAAC,MAAM,EAAC,MAAM,4BAA4B,CAAC;AAC/D,OAAO,cAAc,MAAM,oCAAoC,CAAC;
|
|
1
|
+
{"version":3,"file":"main.d.ts","sourceRoot":"","sources":["../main.ts"],"names":[],"mappings":"AAAA,OAAO,SAAS,MAAM,uBAAuB,CAAC;AAC9C,OAAO,kBAAkB,MAAM,gCAAgC,CAAC;AAEhE,OAAO,YAAY,MAAM,4BAA4B,CAAC;AACtD,OAAO,KAAK,MAAM,mBAAmB,CAAC;AACtC,OAAO,MAAM,MAAM,oBAAoB,CAAC;AACxC,OAAO,aAAa,MAAM,4BAA4B,CAAC;AACvD,OAAO,IAAI,MAAM,kBAAkB,CAAC;AACpC,OAAO,MAAM,MAAM,cAAc,CAAC;AAClC,OAAO,OAAO,MAAM,6BAA6B,CAAC;AAClD,OAAO,WAAW,EAAE,EAAC,MAAM,EAAC,MAAM,4BAA4B,CAAC;AAC/D,OAAO,cAAc,MAAM,oCAAoC,CAAC;AAEhE,OAAO,UAAU,EAAE,EAAE,UAAU,EAAE,MAAM,2BAA2B,CAAC;AAEnE,OAAO,WAAW,MAAM,6BAA6B,CAAC;AACtD,OAAO,UAAU,MAAM,kBAAkB,CAAC;AAE1C,OAAO,EACH,SAAS,EACT,kBAAkB,EAClB,YAAY,EACZ,KAAK,EACL,MAAM,EACN,aAAa,EACb,IAAI,EACJ,OAAO,EACP,MAAM,EACN,WAAW,EACX,MAAM,EACN,UAAU,EACV,UAAU,EACV,WAAW,EACX,cAAc,EACd,UAAU,EACb,CAAA"}
|
package/lib/main.js
CHANGED
|
@@ -22,7 +22,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
22
22
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
23
23
|
};
|
|
24
24
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
25
|
-
exports.ControllerBase = exports.respondCode = exports.mongoClass = exports.MongoClass = exports.logger = exports.modelsClass = exports.Models = exports.Modelv2 = exports.conf = exports.DockerCompose = exports.Domain = exports.Nginx = exports.SSLChallenge = exports.ShareClientFactory = exports.Immutable = void 0;
|
|
25
|
+
exports.AzureVault = exports.ControllerBase = exports.respondCode = exports.mongoClass = exports.MongoClass = exports.logger = exports.modelsClass = exports.Models = exports.Modelv2 = exports.conf = exports.DockerCompose = exports.Domain = exports.Nginx = exports.SSLChallenge = exports.ShareClientFactory = exports.Immutable = void 0;
|
|
26
26
|
const Immutable_class_1 = __importDefault(require("./src/Immutable.class"));
|
|
27
27
|
exports.Immutable = Immutable_class_1.default;
|
|
28
28
|
const ShareClientFactory_class_1 = __importDefault(require("./src/ShareClientFactory.class"));
|
|
@@ -51,4 +51,6 @@ exports.mongoClass = mongo_class_1.default;
|
|
|
51
51
|
Object.defineProperty(exports, "MongoClass", { enumerable: true, get: function () { return mongo_class_1.MongoClass; } });
|
|
52
52
|
const respondCode_1 = __importDefault(require("./src/functions/respondCode"));
|
|
53
53
|
exports.respondCode = respondCode_1.default;
|
|
54
|
+
const AzureVault_1 = __importDefault(require("./src/AzureVault"));
|
|
55
|
+
exports.AzureVault = AzureVault_1.default;
|
|
54
56
|
//# sourceMappingURL=main.js.map
|
package/lib/main.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"main.js","sourceRoot":"","sources":["../main.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;AAAA,4EAA8C;
|
|
1
|
+
{"version":3,"file":"main.js","sourceRoot":"","sources":["../main.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;AAAA,4EAA8C;AAmB1C,oBAnBG,yBAAS,CAmBH;AAlBb,8FAAgE;AAmB5D,6BAnBG,kCAAkB,CAmBH;AAjBtB,sFAAsD;AAkBlD,uBAlBG,8BAAY,CAkBH;AAjBhB,oEAAsC;AAkBlC,gBAlBG,qBAAK,CAkBH;AAjBT,sEAAwC;AAkBpC,iBAlBG,sBAAM,CAkBH;AAjBV,sFAAuD;AAkBnD,wBAlBG,8BAAa,CAkBH;AAjBjB,kEAAoC;AAkBhC,eAlBG,oBAAI,CAkBH;AAjBR,0DAAkC;AAqB9B,iBArBG,gBAAM,CAqBH;AApBV,gFAAkD;AAiB9C,kBAjBG,uBAAO,CAiBH;AAhBX,2EAA+D;AAkB3D,sBAlBG,sBAAW,CAkBH;AADX,uFAjBiB,qBAAM,OAiBjB;AAhBV,8FAAgE;AAsB5D,yBAtBG,8BAAc,CAsBH;AApBlB,yEAAmE;AAkB/D,qBAlBG,qBAAU,CAkBH;AADV,2FAjBiB,wBAAU,OAiBjB;AAfd,8EAAsD;AAiBlD,sBAjBG,qBAAW,CAiBH;AAhBf,kEAA0C;AAkBtC,qBAlBG,oBAAU,CAkBH"}
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { ClientSecretCredential, DefaultAzureCredential } from '@azure/identity';
|
|
2
|
+
declare const _default: {
|
|
3
|
+
certificates: {
|
|
4
|
+
import: (name: string, cert: Uint8Array, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<void>;
|
|
5
|
+
get: (name: string, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-certificates").KeyVaultCertificateWithPolicy>;
|
|
6
|
+
};
|
|
7
|
+
keys: {
|
|
8
|
+
get: (name: string, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-keys").KeyVaultKey>;
|
|
9
|
+
};
|
|
10
|
+
secrets: {
|
|
11
|
+
get: (name: string, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-secrets").KeyVaultSecret>;
|
|
12
|
+
};
|
|
13
|
+
};
|
|
14
|
+
export default _default;
|
|
15
|
+
//# sourceMappingURL=AzureVault.class.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AzureVault.class.d.ts","sourceRoot":"","sources":["../../src/AzureVault.class.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,sBAAsB,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;;;uBAYrE,MAAM,QACN,UAAU,OACX,MAAM,eACE,sBAAsB,GAAG,sBAAsB;oBASlD,MAAM,OAAO,MAAM,eAAe,sBAAsB,GAAG,sBAAsB;;;oBAUjF,MAAM,OAAO,MAAM,eAAe,sBAAsB,GAAG,sBAAsB;;;oBAUjF,MAAM,OAAO,MAAM,eAAe,sBAAsB,GAAG,sBAAsB;;;AArCjG,wBA6CE"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const keyvault_certificates_1 = require("@azure/keyvault-certificates");
|
|
4
|
+
const keyvault_keys_1 = require("@azure/keyvault-keys");
|
|
5
|
+
const keyvault_secrets_1 = require("@azure/keyvault-secrets");
|
|
6
|
+
exports.default = {
|
|
7
|
+
certificates: {
|
|
8
|
+
import: async (name, cert, url, credentials) => {
|
|
9
|
+
const client = new keyvault_certificates_1.CertificateClient(url, credentials);
|
|
10
|
+
await client.importCertificate(name, cert);
|
|
11
|
+
},
|
|
12
|
+
get: (name, url, credentials) => {
|
|
13
|
+
const client = new keyvault_certificates_1.CertificateClient(url, credentials);
|
|
14
|
+
return client.getCertificate(name);
|
|
15
|
+
},
|
|
16
|
+
},
|
|
17
|
+
keys: {
|
|
18
|
+
get: (name, url, credentials) => {
|
|
19
|
+
const client = new keyvault_keys_1.KeyClient(url, credentials);
|
|
20
|
+
return client.getKey(name);
|
|
21
|
+
},
|
|
22
|
+
},
|
|
23
|
+
secrets: {
|
|
24
|
+
get: (name, url, credentials) => {
|
|
25
|
+
const client = new keyvault_secrets_1.SecretClient(url, credentials);
|
|
26
|
+
return client.getSecret(name);
|
|
27
|
+
},
|
|
28
|
+
},
|
|
29
|
+
};
|
|
30
|
+
//# sourceMappingURL=AzureVault.class.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AzureVault.class.js","sourceRoot":"","sources":["../../src/AzureVault.class.ts"],"names":[],"mappings":";;AACA,wEAAiE;AACjE,wDAAiD;AACjD,8DAAuD;AAIvD,kBAAe;IAEb,YAAY,EAAE;QAEZ,MAAM,EAAE,KAAK,EACX,IAAY,EACZ,IAAgB,EAChB,GAAW,EACX,WAA4D,EAC5D,EAAE;YAEF,MAAM,MAAM,GAAG,IAAI,yCAAiB,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YAEvD,MAAM,MAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;QAE7C,CAAC;QAED,GAAG,EAAE,CAAC,IAAY,EAAE,GAAW,EAAE,WAA4D,EAAE,EAAE;YAE/F,MAAM,MAAM,GAAG,IAAI,yCAAiB,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YACvD,OAAO,MAAM,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QAErC,CAAC;KAEF;IAED,IAAI,EAAE;QACJ,GAAG,EAAE,CAAC,IAAY,EAAE,GAAW,EAAE,WAA4D,EAAE,EAAE;YAE/F,MAAM,MAAM,GAAG,IAAI,yBAAS,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YAC/C,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAE7B,CAAC;KAEF;IAED,OAAO,EAAE;QACP,GAAG,EAAE,CAAC,IAAY,EAAE,GAAW,EAAE,WAA4D,EAAE,EAAE;YAE/F,MAAM,MAAM,GAAG,IAAI,+BAAY,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YAClD,OAAO,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;QAEhC,CAAC;KACF;CAEF,CAAC"}
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
import { ClientSecretCredential, DefaultAzureCredential } from '@azure/identity';
|
|
2
|
+
declare const _default: {
|
|
3
|
+
certificates: {
|
|
4
|
+
import: (name: string, cert: Uint8Array, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-certificates").KeyVaultCertificateWithPolicy>;
|
|
5
|
+
get: (name: string, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-certificates").KeyVaultCertificateWithPolicy>;
|
|
6
|
+
};
|
|
7
|
+
keys: {
|
|
8
|
+
get: (name: string, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-keys").KeyVaultKey>;
|
|
9
|
+
};
|
|
10
|
+
secrets: {
|
|
11
|
+
get: (name: string, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-secrets").KeyVaultSecret>;
|
|
12
|
+
};
|
|
13
|
+
};
|
|
14
|
+
export default _default;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AzureVault.d.ts","sourceRoot":"","sources":["../../src/AzureVault.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,sBAAsB,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;;;uBAUrE,MAAM,QACN,UAAU,OACX,MAAM,eACE,sBAAsB,GAAG,sBAAsB;oBAQlD,MAAM,OAAO,MAAM,eAAe,sBAAsB,GAAG,sBAAsB;;;oBAUjF,MAAM,OAAO,MAAM,eAAe,sBAAsB,GAAG,sBAAsB;;;oBAUjF,MAAM,OAAO,MAAM,eAAe,sBAAsB,GAAG,sBAAsB;;;AApCjG,wBA4CE"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const keyvault_certificates_1 = require("@azure/keyvault-certificates");
|
|
4
|
+
const keyvault_keys_1 = require("@azure/keyvault-keys");
|
|
5
|
+
const keyvault_secrets_1 = require("@azure/keyvault-secrets");
|
|
6
|
+
exports.default = {
|
|
7
|
+
certificates: {
|
|
8
|
+
import: (name, cert, url, credentials) => {
|
|
9
|
+
const client = new keyvault_certificates_1.CertificateClient(url, credentials);
|
|
10
|
+
return client.importCertificate(name, cert);
|
|
11
|
+
},
|
|
12
|
+
get: (name, url, credentials) => {
|
|
13
|
+
const client = new keyvault_certificates_1.CertificateClient(url, credentials);
|
|
14
|
+
return client.getCertificate(name);
|
|
15
|
+
},
|
|
16
|
+
},
|
|
17
|
+
keys: {
|
|
18
|
+
get: (name, url, credentials) => {
|
|
19
|
+
const client = new keyvault_keys_1.KeyClient(url, credentials);
|
|
20
|
+
return client.getKey(name);
|
|
21
|
+
},
|
|
22
|
+
},
|
|
23
|
+
secrets: {
|
|
24
|
+
get: (name, url, credentials) => {
|
|
25
|
+
const client = new keyvault_secrets_1.SecretClient(url, credentials);
|
|
26
|
+
return client.getSecret(name);
|
|
27
|
+
},
|
|
28
|
+
},
|
|
29
|
+
};
|
|
30
|
+
//# sourceMappingURL=AzureVault.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AzureVault.js","sourceRoot":"","sources":["../../src/AzureVault.ts"],"names":[],"mappings":";;AACA,wEAAiE;AACjE,wDAAiD;AACjD,8DAAuD;AAEvD,kBAAe;IAEb,YAAY,EAAE;QAEZ,MAAM,EAAE,CACN,IAAY,EACZ,IAAgB,EAChB,GAAW,EACX,WAA4D,EAC5D,EAAE;YAEF,MAAM,MAAM,GAAG,IAAI,yCAAiB,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YACvD,OAAO,MAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;QAE9C,CAAC;QAED,GAAG,EAAE,CAAC,IAAY,EAAE,GAAW,EAAE,WAA4D,EAAE,EAAE;YAE/F,MAAM,MAAM,GAAG,IAAI,yCAAiB,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YACvD,OAAO,MAAM,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QAErC,CAAC;KAEF;IAED,IAAI,EAAE;QACJ,GAAG,EAAE,CAAC,IAAY,EAAE,GAAW,EAAE,WAA4D,EAAE,EAAE;YAE/F,MAAM,MAAM,GAAG,IAAI,yBAAS,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YAC/C,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAE7B,CAAC;KAEF;IAED,OAAO,EAAE;QACP,GAAG,EAAE,CAAC,IAAY,EAAE,GAAW,EAAE,WAA4D,EAAE,EAAE;YAE/F,MAAM,MAAM,GAAG,IAAI,+BAAY,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YAClD,OAAO,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;QAEhC,CAAC;KACF;CAEF,CAAC"}
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { ClientSecretCredential, DefaultAzureCredential } from '@azure/identity';
|
|
2
|
+
declare const _default: {
|
|
3
|
+
certificates: {
|
|
4
|
+
import: (name: string, cert: Uint8Array, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<void>;
|
|
5
|
+
get: (name: string, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-certificates").KeyVaultCertificateWithPolicy>;
|
|
6
|
+
};
|
|
7
|
+
keys: {
|
|
8
|
+
get: (name: string, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-keys").KeyVaultKey>;
|
|
9
|
+
};
|
|
10
|
+
secrets: {
|
|
11
|
+
get: (name: string, url: string, credentials: ClientSecretCredential | DefaultAzureCredential) => Promise<import("@azure/keyvault-secrets").KeyVaultSecret>;
|
|
12
|
+
};
|
|
13
|
+
};
|
|
14
|
+
export default _default;
|
|
15
|
+
//# sourceMappingURL=AzureVault.class.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AzureVault.class.d.ts","sourceRoot":"","sources":["../../../src/classes/AzureVault.class.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,sBAAsB,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;;;uBAYrE,MAAM,QACN,UAAU,OACX,MAAM,eACE,sBAAsB,GAAG,sBAAsB;oBASlD,MAAM,OAAO,MAAM,eAAe,sBAAsB,GAAG,sBAAsB;;;oBAUjF,MAAM,OAAO,MAAM,eAAe,sBAAsB,GAAG,sBAAsB;;;oBAUjF,MAAM,OAAO,MAAM,eAAe,sBAAsB,GAAG,sBAAsB;;;AArCjG,wBA6CE"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const keyvault_certificates_1 = require("@azure/keyvault-certificates");
|
|
4
|
+
const keyvault_keys_1 = require("@azure/keyvault-keys");
|
|
5
|
+
const keyvault_secrets_1 = require("@azure/keyvault-secrets");
|
|
6
|
+
exports.default = {
|
|
7
|
+
certificates: {
|
|
8
|
+
import: async (name, cert, url, credentials) => {
|
|
9
|
+
const client = new keyvault_certificates_1.CertificateClient(url, credentials);
|
|
10
|
+
await client.importCertificate(name, cert);
|
|
11
|
+
},
|
|
12
|
+
get: (name, url, credentials) => {
|
|
13
|
+
const client = new keyvault_certificates_1.CertificateClient(url, credentials);
|
|
14
|
+
return client.getCertificate(name);
|
|
15
|
+
},
|
|
16
|
+
},
|
|
17
|
+
keys: {
|
|
18
|
+
get: (name, url, credentials) => {
|
|
19
|
+
const client = new keyvault_keys_1.KeyClient(url, credentials);
|
|
20
|
+
return client.getKey(name);
|
|
21
|
+
},
|
|
22
|
+
},
|
|
23
|
+
secrets: {
|
|
24
|
+
get: (name, url, credentials) => {
|
|
25
|
+
const client = new keyvault_secrets_1.SecretClient(url, credentials);
|
|
26
|
+
return client.getSecret(name);
|
|
27
|
+
},
|
|
28
|
+
},
|
|
29
|
+
};
|
|
30
|
+
//# sourceMappingURL=AzureVault.class.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AzureVault.class.js","sourceRoot":"","sources":["../../../src/classes/AzureVault.class.ts"],"names":[],"mappings":";;AACA,wEAAiE;AACjE,wDAAiD;AACjD,8DAAuD;AAIvD,kBAAe;IAEb,YAAY,EAAE;QAEZ,MAAM,EAAE,KAAK,EACX,IAAY,EACZ,IAAgB,EAChB,GAAW,EACX,WAA4D,EAC5D,EAAE;YAEF,MAAM,MAAM,GAAG,IAAI,yCAAiB,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YAEvD,MAAM,MAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;QAE7C,CAAC;QAED,GAAG,EAAE,CAAC,IAAY,EAAE,GAAW,EAAE,WAA4D,EAAE,EAAE;YAE/F,MAAM,MAAM,GAAG,IAAI,yCAAiB,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YACvD,OAAO,MAAM,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QAErC,CAAC;KAEF;IAED,IAAI,EAAE;QACJ,GAAG,EAAE,CAAC,IAAY,EAAE,GAAW,EAAE,WAA4D,EAAE,EAAE;YAE/F,MAAM,MAAM,GAAG,IAAI,yBAAS,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YAC/C,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAE7B,CAAC;KAEF;IAED,OAAO,EAAE;QACP,GAAG,EAAE,CAAC,IAAY,EAAE,GAAW,EAAE,WAA4D,EAAE,EAAE;YAE/F,MAAM,MAAM,GAAG,IAAI,+BAAY,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;YAClD,OAAO,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;QAEhC,CAAC;KACF;CAEF,CAAC"}
|
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
import { DnsManagementClient } from '@azure/arm-dns';
|
|
2
|
-
import { ClientSecretCredential } from '@azure/identity';
|
|
2
|
+
import { ClientSecretCredential, DefaultAzureCredential } from '@azure/identity';
|
|
3
3
|
export default class DnsSslChallenge {
|
|
4
4
|
company: string;
|
|
5
5
|
project: string;
|
|
6
6
|
subscriptionId: string;
|
|
7
|
-
credentials: ClientSecretCredential;
|
|
7
|
+
credentials: ClientSecretCredential | DefaultAzureCredential;
|
|
8
8
|
client: DnsManagementClient;
|
|
9
9
|
dnsZone: string;
|
|
10
|
-
constructor(dnsZone: string, credentials: ClientSecretCredential, subscriptionId: string);
|
|
10
|
+
constructor(dnsZone: string, credentials: ClientSecretCredential | DefaultAzureCredential, subscriptionId: string);
|
|
11
11
|
init(data: any): void;
|
|
12
12
|
get(data: any): void;
|
|
13
13
|
zones(): string[];
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"dns.challenge.class.d.ts","sourceRoot":"","sources":["../../src/dns.challenge.class.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AACrD,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"dns.challenge.class.d.ts","sourceRoot":"","sources":["../../src/dns.challenge.class.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AACrD,OAAO,EAAE,sBAAsB,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AAGjF,MAAM,CAAC,OAAO,OAAO,eAAe;IAElC,OAAO,EAAE,MAAM,CAAC;IAEhB,OAAO,EAAE,MAAM,CAAC;IAEhB,cAAc,EAAE,MAAM,CAAC;IAEvB,WAAW,EAAE,sBAAsB,GAAG,sBAAsB,CAAC;IAE7D,MAAM,EAAE,mBAAmB,CAAC;IAE5B,OAAO,EAAE,MAAM,CAAC;gBAEJ,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,sBAAsB,GAAG,sBAAsB,EAAE,cAAc,EAAE,MAAM;IAQjH,IAAI,CAAC,IAAI,KAAA;IAQT,GAAG,CAAC,IAAI,KAAA;IAOR,KAAK;IAML,GAAG,CAAC,IAAI,KAAA;IAwBF,MAAM,CAAC,IAAI,KAAA;CAWlB"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"dns.challenge.class.js","sourceRoot":"","sources":["../../src/dns.challenge.class.ts"],"names":[],"mappings":";;;;;AAAA,4CAAqD;AAErD,sDAA8B;AAE9B,MAAqB,eAAe;IAclC,YAAY,OAAe,EAAE,
|
|
1
|
+
{"version":3,"file":"dns.challenge.class.js","sourceRoot":"","sources":["../../src/dns.challenge.class.ts"],"names":[],"mappings":";;;;;AAAA,4CAAqD;AAErD,sDAA8B;AAE9B,MAAqB,eAAe;IAclC,YAAY,OAAe,EAAE,WAA4D,EAAE,cAAsB;QAE/G,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QAC/B,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;QACrC,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;IAEzB,CAAC;IAED,IAAI,CAAC,IAAI;QAEP,gBAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;QAC/B,gBAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QACnB,IAAI,CAAC,MAAM,GAAG,IAAI,6BAAmB,CAAC,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,cAAc,CAAC,CAAC;IAE/E,CAAC;IAED,GAAG,CAAC,IAAI;QAEN,gBAAM,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;QAC9B,gBAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErB,CAAC;IAED,KAAK;QAEH,OAAO,CAAC,oBAAoB,CAAC,CAAC;IAEhC,CAAC;IAED,GAAG,CAAC,IAAI;QAEN,gBAAM,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;QAC9B,gBAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAEnB,OAAO,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,cAAc,CAC1C,qBAAqB,EACrB,IAAI,CAAC,OAAO,EACZ,IAAI,CAAC,SAAS,CAAC,SAAS,EACxB,KAAK,EACL;YACE,GAAG,EAAE,GAAG;YACR,IAAI,EAAE,GAAG,IAAI,CAAC,SAAS,CAAC,SAAS,IAAI,IAAI,CAAC,OAAO,EAAE;YACnD,UAAU,EACV;gBACE;oBACE,KAAK,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC;iBACzC;aACF;SACF,CACF,CAAC;IAEJ,CAAC;IAED,KAAK,CAAC,MAAM,CAAC,IAAI;QAEf,kIAAkI;QAElI,gBAAM,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC;QAClC,gBAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAEnB,OAAO,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC,qBAAqB,EAAE,IAAI,CAAC,OAAO,EAAE,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC;IAE7G,CAAC;CAEF;AA9ED,kCA8EC"}
|
|
@@ -1,12 +1,13 @@
|
|
|
1
1
|
/// <reference types="node" />
|
|
2
2
|
import tls, { PeerCertificate } from 'tls';
|
|
3
|
-
import { ClientSecretCredential } from '@azure/identity';
|
|
3
|
+
import { ClientSecretCredential, DefaultAzureCredential } from '@azure/identity';
|
|
4
4
|
import { ShareClientInterface, Wildcardcertificates } from '../interfaces';
|
|
5
5
|
export default class Domain {
|
|
6
6
|
shareClient: ShareClientInterface;
|
|
7
7
|
acme_email: string;
|
|
8
8
|
acme_directory: string;
|
|
9
|
-
constructor(acme_email: string,
|
|
9
|
+
constructor(acme_email: string, acmeMode: 'staging' | 'live', shareClient: ShareClientInterface);
|
|
10
|
+
static createCsr(privateKey: string): Promise<string>;
|
|
10
11
|
getBase(domain: string, privateKey: string, privateServerKey: string): Promise<{
|
|
11
12
|
acme: any;
|
|
12
13
|
account: any;
|
|
@@ -14,7 +15,11 @@ export default class Domain {
|
|
|
14
15
|
csr: any;
|
|
15
16
|
domains: string[];
|
|
16
17
|
}>;
|
|
17
|
-
|
|
18
|
+
/**
|
|
19
|
+
* creates a letsencrypt wildcard SSL certificate on the given azure subscription
|
|
20
|
+
*/
|
|
21
|
+
createWildcard(domain: string, privateKey: any, privateServerKey: any, credentials: ClientSecretCredential | DefaultAzureCredential, azureSubscriptionId: string): Promise<Wildcardcertificates>;
|
|
22
|
+
convertToPfx(certificate: string, privateKey: string, tempName: string): Promise<Buffer>;
|
|
18
23
|
/**
|
|
19
24
|
* creates a letsencrypt certificate for all given domain
|
|
20
25
|
* http challenge will be used
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"domain.class.d.ts","sourceRoot":"","sources":["../../src/domain.class.ts"],"names":[],"mappings":";
|
|
1
|
+
{"version":3,"file":"domain.class.d.ts","sourceRoot":"","sources":["../../src/domain.class.ts"],"names":[],"mappings":";AAMA,OAAO,GAAG,EAAE,EAAE,eAAe,EAAE,MAAM,KAAK,CAAC;AAK3C,OAAO,EAAE,sBAAsB,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AAIjF,OAAO,EAAE,oBAAoB,EAAE,oBAAoB,EAAE,MAAM,eAAe,CAAC;AAK3E,MAAM,CAAC,OAAO,OAAO,MAAM;IAEzB,WAAW,EAAE,oBAAoB,CAAC;IAElC,UAAU,EAAE,MAAM,CAAC;IAEnB,cAAc,EAAE,MAAM,CAAC;gBAEX,UAAU,EAAE,MAAM,EAAE,QAAQ,EAAE,SAAS,GAAG,MAAM,EAAE,WAAW,EAAE,oBAAoB;IAU/F,MAAM,CAAC,SAAS,CAAC,UAAU,EAAE,MAAM;IA4B7B,OAAO,CAAC,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,EAAE,gBAAgB,EAAE,MAAM;;;;;;;IA+B1E;;OAEG;IACG,cAAc,CAClB,MAAM,EAAE,MAAM,EACd,UAAU,EAAE,GAAG,EACf,gBAAgB,EAAE,GAAG,EACrB,WAAW,EAAE,sBAAsB,GAAG,sBAAsB,EAC5D,mBAAmB,EAAE,MAAM;IAmB7B,YAAY,CAAC,WAAW,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM;IA8BtE;;;OAGG;IACH,SAAS,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,eAAe,CAAC;IAgE5F,qBAAqB,CAAC,IAAI,EAAE,MAAM,GAAG,eAAe;IAapD,QAAQ,CAAC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM;IAiBzD;;;;;;;OAOG;IACH,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM;CAMzE"}
|
package/lib/src/domain.class.js
CHANGED
|
@@ -7,18 +7,37 @@ const acme_1 = __importDefault(require("@root/acme"));
|
|
|
7
7
|
const csr_1 = __importDefault(require("@root/csr"));
|
|
8
8
|
const packer_1 = __importDefault(require("@root/pem/packer"));
|
|
9
9
|
const keypairs_1 = __importDefault(require("@root/keypairs"));
|
|
10
|
+
const child_process_1 = require("child_process");
|
|
10
11
|
const tls_1 = __importDefault(require("tls"));
|
|
11
12
|
const net_1 = __importDefault(require("net"));
|
|
12
13
|
const dns_1 = __importDefault(require("dns"));
|
|
14
|
+
const fs_1 = __importDefault(require("fs"));
|
|
13
15
|
const http_challenge_class_1 = __importDefault(require("./http.challenge.class"));
|
|
14
16
|
const logger_1 = __importDefault(require("./logger"));
|
|
15
17
|
const dns_challenge_class_1 = __importDefault(require("./dns.challenge.class"));
|
|
16
18
|
const dns = dns_1.default.promises;
|
|
17
19
|
class Domain {
|
|
18
|
-
constructor(acme_email,
|
|
20
|
+
constructor(acme_email, acmeMode, shareClient) {
|
|
19
21
|
this.shareClient = shareClient;
|
|
20
22
|
this.acme_email = acme_email;
|
|
21
|
-
this.acme_directory =
|
|
23
|
+
this.acme_directory = acmeMode === 'live'
|
|
24
|
+
? 'https://acme-v02.api.letsencrypt.org/directory'
|
|
25
|
+
: 'https://acme-staging-v02.api.letsencrypt.org/';
|
|
26
|
+
}
|
|
27
|
+
static createCsr(privateKey) {
|
|
28
|
+
return new Promise((resolve, reject) => {
|
|
29
|
+
// eslint-disable-next-line max-len
|
|
30
|
+
child_process_1.exec(`openssl req -new -key <(echo "${privateKey}") -subj "/C=GB/ST=London/L=London/O=Global Security/OU=IT Department/CN=example.com"`, { timeout: 5000 }, (e, stdout, stderr) => {
|
|
31
|
+
// if (this.debug) {
|
|
32
|
+
logger_1.default.debug('stdout ', stdout);
|
|
33
|
+
logger_1.default.debug('stderr ', stderr);
|
|
34
|
+
// }
|
|
35
|
+
if (e instanceof Error) {
|
|
36
|
+
return reject(e);
|
|
37
|
+
}
|
|
38
|
+
return resolve(stdout);
|
|
39
|
+
});
|
|
40
|
+
});
|
|
22
41
|
}
|
|
23
42
|
async getBase(domain, privateKey, privateServerKey) {
|
|
24
43
|
const domains = [domain];
|
|
@@ -41,7 +60,10 @@ class Domain {
|
|
|
41
60
|
domains,
|
|
42
61
|
};
|
|
43
62
|
}
|
|
44
|
-
|
|
63
|
+
/**
|
|
64
|
+
* creates a letsencrypt wildcard SSL certificate on the given azure subscription
|
|
65
|
+
*/
|
|
66
|
+
async createWildcard(domain, privateKey, privateServerKey, credentials, azureSubscriptionId) {
|
|
45
67
|
const optionsBase = await this.getBase(domain, privateKey, privateServerKey);
|
|
46
68
|
const options = {
|
|
47
69
|
account: optionsBase.account,
|
|
@@ -49,11 +71,27 @@ class Domain {
|
|
|
49
71
|
csr: optionsBase.csr,
|
|
50
72
|
domains: optionsBase.domains,
|
|
51
73
|
challenges: {
|
|
52
|
-
'dns-01': new dns_challenge_class_1.default(domain, credentials,
|
|
74
|
+
'dns-01': new dns_challenge_class_1.default(domain, credentials, azureSubscriptionId),
|
|
53
75
|
},
|
|
54
76
|
};
|
|
55
77
|
return optionsBase.acme.certificates.create(options);
|
|
56
78
|
}
|
|
79
|
+
convertToPfx(certificate, privateKey, tempName) {
|
|
80
|
+
return new Promise((resolve, reject) => {
|
|
81
|
+
// eslint-disable-next-line max-len
|
|
82
|
+
child_process_1.exec(`openssl pkcs12 -export -passout pass: -inkey <(echo "${privateKey}") -in <(echo "${certificate}") -out ${tempName}.pfx`, { timeout: 5000 }, (e, stdout, stderr) => {
|
|
83
|
+
// if (this.debug) {
|
|
84
|
+
logger_1.default.debug('stdout ', stdout);
|
|
85
|
+
logger_1.default.debug('stderr ', stderr);
|
|
86
|
+
// }
|
|
87
|
+
if (e instanceof Error) {
|
|
88
|
+
return reject(e);
|
|
89
|
+
}
|
|
90
|
+
const content = fs_1.default.readFileSync(`${tempName}.pfx`);
|
|
91
|
+
return resolve(content);
|
|
92
|
+
});
|
|
93
|
+
});
|
|
94
|
+
}
|
|
57
95
|
/**
|
|
58
96
|
* creates a letsencrypt certificate for all given domain
|
|
59
97
|
* http challenge will be used
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"domain.class.js","sourceRoot":"","sources":["../../src/domain.class.ts"],"names":[],"mappings":";;;;;AAAA,sDAA8B;AAC9B,oDAA4B;AAC5B,8DAAmC;AACnC,8DAAsC;
|
|
1
|
+
{"version":3,"file":"domain.class.js","sourceRoot":"","sources":["../../src/domain.class.ts"],"names":[],"mappings":";;;;;AAAA,sDAA8B;AAC9B,oDAA4B;AAC5B,8DAAmC;AACnC,8DAAsC;AACtC,iDAAqC;AAErC,8CAA2C;AAC3C,8CAAsB;AAEtB,8CAAsB;AAGtB,4CAAoB;AACpB,kFAAsD;AACtD,sDAA8B;AAE9B,gFAAoD;AAEpD,MAAM,GAAG,GAAG,aAAG,CAAC,QAAQ,CAAC;AAEzB,MAAqB,MAAM;IAQzB,YAAY,UAAkB,EAAE,QAA4B,EAAE,WAAiC;QAE7F,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QAC/B,IAAI,CAAC,UAAU,GAAG,UAAU,CAAC;QAC7B,IAAI,CAAC,cAAc,GAAG,QAAQ,KAAK,MAAM;YACvC,CAAC,CAAC,gDAAgD;YAClD,CAAC,CAAC,+CAA+C,CAAC;IAEtD,CAAC;IAED,MAAM,CAAC,SAAS,CAAC,UAAkB;QAEjC,OAAO,IAAI,OAAO,CAAS,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YAE7C,mCAAmC;YACnC,oBAAI,CAAC,iCAAiC,UAAU,uFAAuF,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,EAAE;gBAEhL,oBAAoB;gBAEpB,gBAAM,CAAC,KAAK,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;gBAChC,gBAAM,CAAC,KAAK,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;gBAEhC,IAAI;gBAEJ,IAAI,CAAC,YAAY,KAAK,EAAE;oBAEtB,OAAO,MAAM,CAAC,CAAC,CAAC,CAAC;iBAElB;gBAED,OAAO,OAAO,CAAC,MAAM,CAAC,CAAC;YAEzB,CAAC,CAAC,CAAC;QAEL,CAAC,CAAC,CAAC;IAEL,CAAC;IAED,KAAK,CAAC,OAAO,CAAC,MAAc,EAAE,UAAkB,EAAE,gBAAwB;QAExE,MAAM,OAAO,GAAG,CAAC,MAAM,CAAC,CAAC;QACzB,MAAM,IAAI,GAAG,cAAI,CAAC,MAAM,CAAC,EAAE,eAAe,EAAE,IAAI,CAAC,UAAU,EAAE,YAAY,EAAE,iBAAiB,EAAE,MAAM,EAAE,GAAG,EAAE,GAAG,CAAC,EAAE,CAAC,CAAC;QACnH,MAAM,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAErC,MAAM,UAAU,GAAG,MAAM,kBAAQ,CAAC,MAAM,CAAC,EAAE,GAAG,EAAE,UAAU,EAAE,CAAC,CAAC;QAC9D,MAAM,SAAS,GAAG,MAAM,kBAAQ,CAAC,MAAM,CAAC,EAAE,GAAG,EAAE,gBAAgB,EAAE,CAAC,CAAC;QAEnE,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,UAAU,EAAE,eAAe,EAAE,IAAI,CAAC,UAAU,EAAE,YAAY,EAAE,IAAI,EAAE,CAAC,CAAC;QAEjH,MAAM,GAAG,GAAG,MAAM,aAAG,CAAC,GAAG,CACvB;YACE,OAAO;YACP,GAAG,EAAE,SAAS;YACd,QAAQ,EAAE,KAAK;SAChB,CACF,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,gBAAG,CAAC,SAAS,CAAC,EAAE,IAAI,EAAE,qBAAqB,EAAE,KAAK,EAAE,GAAG,EAAE,CAAC,CAAC;QAE7E,OAAO;YACL,IAAI;YACJ,OAAO;YACP,UAAU;YACV,GAAG;YACH,OAAO;SACR,CAAC;IAEJ,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,cAAc,CAClB,MAAc,EACd,UAAe,EACf,gBAAqB,EACrB,WAA4D,EAC5D,mBAA2B;QAG3B,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,UAAU,EAAE,gBAAgB,CAAC,CAAC;QAE7E,MAAM,OAAO,GAAG;YACd,OAAO,EAAE,WAAW,CAAC,OAAO;YAC5B,UAAU,EAAE,WAAW,CAAC,UAAU;YAClC,GAAG,EAAE,WAAW,CAAC,GAAG;YACpB,OAAO,EAAE,WAAW,CAAC,OAAO;YAC5B,UAAU,EAAE;gBACV,QAAQ,EAAE,IAAI,6BAAe,CAAC,MAAM,EAAE,WAAW,EAAE,mBAAmB,CAAC;aACxE;SACF,CAAC;QAEF,OAAO,WAAW,CAAC,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,OAAO,CAAkC,CAAC;IAExF,CAAC;IAED,YAAY,CAAC,WAAmB,EAAE,UAAkB,EAAE,QAAgB;QAEpE,OAAO,IAAI,OAAO,CAAS,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YAE7C,mCAAmC;YACnC,oBAAI,CAAC,wDAAwD,UAAU,kBAAkB,WAAW,WAAW,QAAQ,MAAM,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,EAAE;gBAEtK,oBAAoB;gBAEpB,gBAAM,CAAC,KAAK,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;gBAChC,gBAAM,CAAC,KAAK,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;gBAEhC,IAAI;gBAEJ,IAAI,CAAC,YAAY,KAAK,EAAE;oBAEtB,OAAO,MAAM,CAAC,CAAC,CAAC,CAAC;iBAElB;gBAED,MAAM,OAAO,GAAG,YAAE,CAAC,YAAY,CAAC,GAAG,QAAQ,MAAM,CAAC,CAAC;gBAEnD,OAAO,OAAO,CAAC,OAAO,CAAC,CAAC;YAE1B,CAAC,CAAC,CAAC;QAEL,CAAC,CAAC,CAAC;IAEL,CAAC;IAED;;;OAGG;IACH,SAAS,CAAC,OAAiB,EAAE,OAAe,EAAE,OAAe;QAE3D,IAAI,OAAO,CAAC;QACZ,IAAI,UAAU,CAAC;QACf,IAAI,SAAS,CAAC;QAEd,MAAM,IAAI,GAAG,cAAI,CAAC,MAAM,CAAC,EAAE,eAAe,EAAE,IAAI,CAAC,UAAU,EAAE,YAAY,EAAE,iBAAiB,EAAE,MAAM,EAAE,GAAG,EAAE,GAAG,CAAC,EAAE,CAAC,CAAC;QAEnH,OAAO,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC;aAClC,IAAI,CAAC,KAAK,IAAI,EAAE;YAEf,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC;YACtE,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,OAAO,EAAE,oBAAoB,CAAC,CAAC;YAEnF,UAAU,GAAG,MAAM,kBAAQ,CAAC,MAAM,CAAC,EAAE,GAAG,EAAE,UAAU,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;YACnE,SAAS,GAAG,MAAM,kBAAQ,CAAC,MAAM,CAAC,EAAE,GAAG,EAAE,gBAAgB,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;YAExE,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,UAAU,EAAE,eAAe,EAAE,IAAI,CAAC,UAAU,EAAE,YAAY,EAAE,IAAI,EAAE,CAAC,CAAC;QAEpG,CAAC,CAAC;aACD,IAAI,CAAC,CAAC,WAAW,EAAE,EAAE;YAEpB,OAAO,GAAG,WAAW,CAAC;YAEtB,OAAO,aAAG,CAAC,GAAG,CACZ;gBACE,OAAO;gBACP,GAAG,EAAE,SAAS;gBACd,QAAQ,EAAE,KAAK;aAChB,CACF,CAAC;QAEJ,CAAC,CAAC;aACD,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,gBAAG,CAAC,SAAS,CAAC,EAAE,IAAI,EAAE,qBAAqB,EAAE,KAAK,EAAE,GAAG,EAAE,CAAC,CAAC;aACzE,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE;YAEZ,MAAM,OAAO,GAAG;gBACd,OAAO;gBACP,UAAU;gBACV,GAAG;gBACH,OAAO;gBACP,UAAU,EAAE;oBACV,SAAS,EAAE,IAAI,8BAAgB,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC;iBACpE;aACF,CAAC;YAEF,OAAO,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;QAE3C,CAAC,CAAC;aACD,IAAI,CAAC,KAAK,EAAE,KAAK,EAAE,EAAE;YAEpB,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,QAAQ,OAAO,IAAI,OAAO,QAAQ,EAAE,eAAe,EAAE,GAAG,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC;YACpH,OAAO,IAAI,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC;QAErE,CAAC,CAAC;aACD,IAAI,CAAC,CAAC,WAAgC,EAAE,EAAE;YAEzC,gBAAM,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;YAC5B,OAAO,WAAW,CAAC;QAErB,CAAC,CAAC,CAAC;IAEP,CAAC;IAED,qBAAqB,CAAC,IAAY;QAEhC,MAAM,aAAa,GAAG,aAAG,CAAC,mBAAmB,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC;QAExD,MAAM,YAAY,GAAG,IAAI,aAAG,CAAC,SAAS,CAAC,IAAI,aAAG,CAAC,MAAM,EAAE,EAAE,EAAE,aAAa,EAAE,CAAC,CAAC;QAE5E,MAAM,OAAO,GAAG,YAAY,CAAC,cAAc,EAAqB,CAAC;QACjE,YAAY,CAAC,OAAO,EAAE,CAAC;QAEvB,OAAO,OAAO,CAAC;IAEjB,CAAC;IAED,QAAQ,CAAC,MAAc,EAAE,OAAe,EAAE,OAAe;QAEvD,OAAO,GAAG,CAAC,UAAU,CAAC,MAAM,CAAC;aAC1B,IAAI,CAAC,CAAC,OAAO,EAAE,EAAE;YAEhB,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,OAAO,IAAI,OAAO,EAAE,CAAC,EAAE;gBAEtD,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;aAEzC;YAED,OAAO,IAAI,CAAC;QAEd,CAAC,CAAC,CAAC;IAEP,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,gBAAgB,CAAC,MAAc,EAAE,OAAe,EAAE,OAAe;QAEtE,OAAO,GAAG,OAAO,IAAI,OAAO,IAAI,MAAM,EAAE,CAAC;IAE3C,CAAC;CAEF;AAtPD,yBAsPC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@lilaquadrat/studio",
|
|
3
|
-
"version": "2.4.
|
|
3
|
+
"version": "2.4.1",
|
|
4
4
|
"description": "classes and tools for STUDIO",
|
|
5
5
|
"license": "MIT",
|
|
6
6
|
"homepage": "https://lilaquadrat.de",
|
|
@@ -10,7 +10,7 @@
|
|
|
10
10
|
"url": "https://lilaquadrat.de"
|
|
11
11
|
},
|
|
12
12
|
"scripts": {
|
|
13
|
-
"start": "tsc --watch",
|
|
13
|
+
"start": "tsc --watch --declarationMap",
|
|
14
14
|
"prepublish": "tsc"
|
|
15
15
|
},
|
|
16
16
|
"files": [
|
|
@@ -37,6 +37,9 @@
|
|
|
37
37
|
"dependencies": {
|
|
38
38
|
"@azure/arm-dns": "^5.0.0",
|
|
39
39
|
"@azure/identity": "^2.0.4",
|
|
40
|
+
"@azure/keyvault-certificates": "^4.4.0",
|
|
41
|
+
"@azure/keyvault-keys": "^4.4.0",
|
|
42
|
+
"@azure/keyvault-secrets": "^4.4.0",
|
|
40
43
|
"@azure/storage-blob": "^12.2.0-preview.1",
|
|
41
44
|
"@azure/storage-file-share": "^12.2.0-preview.1",
|
|
42
45
|
"@azure/storage-queue": "^12.7.0",
|