@mikeyt23/node-cli-utils 2.0.0-beta.1 → 2.0.0-beta.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (81) hide show
  1. package/dist/cjs/DependencyChecker.d.ts +26 -0
  2. package/dist/cjs/DependencyChecker.d.ts.map +1 -0
  3. package/dist/cjs/DependencyChecker.js +200 -0
  4. package/dist/cjs/GitUtility.d.ts +7 -0
  5. package/dist/cjs/GitUtility.d.ts.map +1 -0
  6. package/dist/cjs/GitUtility.js +49 -0
  7. package/dist/cjs/NixUtil.d.ts +8 -0
  8. package/dist/cjs/NixUtil.d.ts.map +1 -0
  9. package/dist/cjs/NixUtil.js +50 -0
  10. package/dist/cjs/TarballUtility.d.ts +17 -7
  11. package/dist/cjs/TarballUtility.d.ts.map +1 -1
  12. package/dist/cjs/TarballUtility.js +18 -24
  13. package/dist/cjs/certUtils.d.ts +53 -17
  14. package/dist/cjs/certUtils.d.ts.map +1 -1
  15. package/dist/cjs/certUtils.js +176 -111
  16. package/dist/cjs/colors.d.ts +17 -0
  17. package/dist/cjs/colors.d.ts.map +1 -0
  18. package/dist/cjs/colors.js +30 -0
  19. package/dist/cjs/dbMigrationUtils.js +44 -54
  20. package/dist/cjs/dotnetUtils.d.ts.map +1 -1
  21. package/dist/cjs/dotnetUtils.js +4 -2
  22. package/dist/cjs/esmSpecific.d.mts +5 -0
  23. package/dist/cjs/esmSpecific.d.mts.map +1 -1
  24. package/dist/cjs/esmSpecific.mjs +6 -1
  25. package/dist/cjs/generalUtils.d.ts +252 -26
  26. package/dist/cjs/generalUtils.d.ts.map +1 -1
  27. package/dist/cjs/generalUtils.js +503 -107
  28. package/dist/cjs/generalUtilsInternal.d.ts +9 -3
  29. package/dist/cjs/generalUtilsInternal.d.ts.map +1 -1
  30. package/dist/cjs/generalUtilsInternal.js +160 -59
  31. package/dist/cjs/hostFileUtils.d.ts +18 -0
  32. package/dist/cjs/hostFileUtils.d.ts.map +1 -0
  33. package/dist/cjs/hostFileUtils.js +100 -0
  34. package/dist/cjs/index.d.ts +1 -0
  35. package/dist/cjs/index.d.ts.map +1 -1
  36. package/dist/cjs/index.js +2 -1
  37. package/dist/cjs/runWhileParentAlive.js +7 -9
  38. package/dist/cjs/testUtils.d.ts +11 -0
  39. package/dist/cjs/testUtils.d.ts.map +1 -0
  40. package/dist/cjs/testUtils.js +58 -0
  41. package/dist/esm/DependencyChecker.d.ts +26 -0
  42. package/dist/esm/DependencyChecker.d.ts.map +1 -0
  43. package/dist/esm/DependencyChecker.js +172 -0
  44. package/dist/esm/GitUtility.d.ts +7 -0
  45. package/dist/esm/GitUtility.d.ts.map +1 -0
  46. package/dist/esm/GitUtility.js +43 -0
  47. package/dist/esm/NixUtil.d.ts +8 -0
  48. package/dist/esm/NixUtil.d.ts.map +1 -0
  49. package/dist/esm/NixUtil.js +46 -0
  50. package/dist/esm/TarballUtility.d.ts +17 -7
  51. package/dist/esm/TarballUtility.d.ts.map +1 -1
  52. package/dist/esm/TarballUtility.js +21 -25
  53. package/dist/esm/certUtils.d.ts +53 -17
  54. package/dist/esm/certUtils.d.ts.map +1 -1
  55. package/dist/esm/certUtils.js +173 -86
  56. package/dist/esm/colors.d.ts +17 -0
  57. package/dist/esm/colors.d.ts.map +1 -0
  58. package/dist/esm/colors.js +20 -0
  59. package/dist/esm/dbMigrationUtils.js +45 -55
  60. package/dist/esm/dotnetUtils.d.ts.map +1 -1
  61. package/dist/esm/dotnetUtils.js +4 -2
  62. package/dist/esm/esmSpecific.d.mts +5 -0
  63. package/dist/esm/esmSpecific.d.mts.map +1 -1
  64. package/dist/esm/esmSpecific.mjs +6 -1
  65. package/dist/esm/generalUtils.d.ts +252 -26
  66. package/dist/esm/generalUtils.d.ts.map +1 -1
  67. package/dist/esm/generalUtils.js +477 -105
  68. package/dist/esm/generalUtilsInternal.d.ts +9 -3
  69. package/dist/esm/generalUtilsInternal.d.ts.map +1 -1
  70. package/dist/esm/generalUtilsInternal.js +151 -57
  71. package/dist/esm/hostFileUtils.d.ts +18 -0
  72. package/dist/esm/hostFileUtils.d.ts.map +1 -0
  73. package/dist/esm/hostFileUtils.js +85 -0
  74. package/dist/esm/index.d.ts +1 -0
  75. package/dist/esm/index.d.ts.map +1 -1
  76. package/dist/esm/index.js +2 -1
  77. package/dist/esm/runWhileParentAlive.js +8 -10
  78. package/dist/esm/testUtils.d.ts +11 -0
  79. package/dist/esm/testUtils.d.ts.map +1 -0
  80. package/dist/esm/testUtils.js +47 -0
  81. package/package.json +38 -2
@@ -1,30 +1,66 @@
1
+ /** Control what is logged when running certUtils functions. */
2
+ export interface CertLogOptions {
3
+ logSpawnOutput: boolean;
4
+ logTraceMessages: boolean;
5
+ logElevatedPermissionsMessage: boolean;
6
+ logSuccess: boolean;
7
+ }
8
+ export interface GenerateCertOptions extends CertLogOptions {
9
+ /** The directory to write the generated cert files to. Defaults to `./cert`. */
10
+ outputDirectory: string;
11
+ }
12
+ /** Subject, thumbprint or path to the pfx file. Used with the {@link winUninstallCert} function. */
13
+ export type CertIdentifier = string | {
14
+ thumbprint: string;
15
+ } | {
16
+ pfxPath: string;
17
+ };
18
+ /** The subject or path to the pfx file. Used with the {@link winCertIsInstalled} function. */
19
+ export type CertIdentifierWithoutThumbprint = string | {
20
+ pfxPath: string;
21
+ };
22
+ /** Cert info returned by {@link winGetPfxInfo}. */
23
+ export type CertInfo = {
24
+ subject: string;
25
+ thumbprint: string;
26
+ pfxPath: string;
27
+ };
1
28
  /**
2
29
  * Wrapper function for calling openssl to generate a self-signed cert to be used for developing a local website with trusted https.
3
30
  * @param url The url to generate a cert for. This will be used as the common name (CN) in the cert as well as the filename for the generated cert files.
4
- * @param outputDirectory The directory to write the generated cert files to. Defaults to './cert'.
31
+ * @param options Options for generating the cert.
32
+ * @returns The path to the generated pfx file.
5
33
  */
6
- export declare function generateCertWithOpenSsl(url: string, outputDirectory?: string): Promise<void>;
34
+ export declare function generateCertWithOpenSsl(url: string, options?: Partial<GenerateCertOptions>): Promise<string>;
7
35
  /**
8
- * Uses Powershell to install a cert to the local machine's trusted root store. Must have admin permissions.
9
- *
10
- * If the cert is already installed, this method will do nothing.
11
- * @param urlOrCertFilename The url or cert filename to install. The url + '.pfx' or the cert filename passed must match a file that exists in the certDirectory.
12
- * @param certDirectory The directory to look for the cert file in. Defaults to './cert'.
36
+ * Uses Powershell to install a cert to the local machine's trusted root store. Must have elevated permissions.
37
+ * If the cert is already installed, this function will do nothing.
38
+ * @param pfxPath The path to the pfx file to install.
13
39
  */
14
- export declare function winInstallCert(urlOrCertFilename: string, certDirectory?: string): Promise<void>;
40
+ export declare function winInstallCert(pfxPath: string, options?: Partial<CertLogOptions>): Promise<void>;
15
41
  /**
16
- * Uses Powershell to uninstall a cert from the local machine's trusted root store. Must have admin permissions.
17
- * @param urlOrSubject The url or subject of the cert to uninstall. If the cert was installed with the winInstallCert method, this will be the url passed to that method.
42
+ * Uses Powershell to check if a cert is already installed to the local machine's trusted root store.
43
+ * Uses the subject of the cert in order to avoid false negatives from regenerating the same self-signed cert
44
+ * with the same subject but different thumbprint. Note that this method is geared towards use with certs generated
45
+ * with the {@link generateCertWithOpenSsl} function, so this may not work using subject if your subject is not precisely "`CN=<url>`".
46
+ * @param identifier The subject or path to the pfx file of the cert to check.
47
+ * @returns `true` if the cert is already installed, `false` otherwise.
18
48
  */
19
- export declare function winUninstallCert(urlOrSubject: string): Promise<void>;
49
+ export declare function winCertIsInstalled(identifier: CertIdentifierWithoutThumbprint, options?: Partial<CertLogOptions>): Promise<boolean>;
20
50
  /**
21
- * Does not actually do anything - just outputs the manual instructions for installing a cert for use by chrome on linux.
51
+ * Uses Powershell to uninstall a cert from the local machine's trusted root store. Must have elevated permissions.
52
+ * @param identifier The subject, thumbprint or path to the pfx file of the cert to uninstall.
53
+ * @param options Options for uninstalling the cert.
22
54
  */
23
- export declare function linuxInstallCert(): void;
55
+ export declare function winUninstallCert(identifier: CertIdentifier, options?: Partial<CertLogOptions>): Promise<void>;
24
56
  /**
25
- * Uses Powershell to check if a cert is already installed to the local machine's trusted root store.
26
- * @param urlOrSubject The url or subject of the cert to check. If the cert was installed with the winInstallCert method, this will be the url passed to that method.
27
- * @returns `true` if the cert is already installed, `false` otherwise.
57
+ * Uses Powershell to get info about a cert.
58
+ * @param pfxPath The path to the pfx file to get info for.
59
+ * @returns The subject, thumbprint and pfxPath of the cert.
28
60
  */
29
- export declare function winCertAlreadyInstalled(urlOrSubject: string): Promise<boolean>;
61
+ export declare function winGetPfxInfo(pfxPath: string): Promise<CertInfo>;
62
+ /**
63
+ * Does not actually do anything - just outputs the manual instructions for installing a cert for use by chrome on linux.
64
+ */
65
+ export declare function linuxInstallCert(): void;
30
66
  //# sourceMappingURL=certUtils.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"certUtils.d.ts","sourceRoot":"","sources":["../../src/certUtils.ts"],"names":[],"mappings":"AASA;;;;GAIG;AACH,wBAAsB,uBAAuB,CAAC,GAAG,EAAE,MAAM,EAAE,eAAe,GAAE,MAAiB,iBAuD5F;AAED;;;;;;GAMG;AACH,wBAAsB,cAAc,CAAC,iBAAiB,EAAE,MAAM,EAAE,aAAa,SAAW,iBA8BvF;AAED;;;GAGG;AACH,wBAAsB,gBAAgB,CAAC,YAAY,EAAE,MAAM,iBAY1D;AAED;;GAEG;AACH,wBAAgB,gBAAgB,SAU/B;AAED;;;;GAIG;AACH,wBAAsB,uBAAuB,CAAC,YAAY,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAmBpF"}
1
+ {"version":3,"file":"certUtils.d.ts","sourceRoot":"","sources":["../../src/certUtils.ts"],"names":[],"mappings":"AAqBA,+DAA+D;AAC/D,MAAM,WAAW,cAAc;IAC7B,cAAc,EAAE,OAAO,CAAA;IACvB,gBAAgB,EAAE,OAAO,CAAA;IACzB,6BAA6B,EAAE,OAAO,CAAA;IACtC,UAAU,EAAE,OAAO,CAAA;CACpB;AAED,MAAM,WAAW,mBAAoB,SAAQ,cAAc;IACzD,gFAAgF;IAChF,eAAe,EAAE,MAAM,CAAA;CACxB;AASD,oGAAoG;AACpG,MAAM,MAAM,cAAc,GAAG,MAAM,GAAG;IAAE,UAAU,EAAE,MAAM,CAAA;CAAE,GAAG;IAAE,OAAO,EAAE,MAAM,CAAA;CAAE,CAAA;AAElF,8FAA8F;AAC9F,MAAM,MAAM,+BAA+B,GAAG,MAAM,GAAG;IAAE,OAAO,EAAE,MAAM,CAAA;CAAE,CAAA;AAE1E,mDAAmD;AACnD,MAAM,MAAM,QAAQ,GAAG;IAAE,OAAO,EAAE,MAAM,CAAC;IAAC,UAAU,EAAE,MAAM,CAAC;IAAC,OAAO,EAAE,MAAM,CAAA;CAAE,CAAA;AAE/E;;;;;GAKG;AACH,wBAAsB,uBAAuB,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,OAAO,CAAC,mBAAmB,CAAC,GAAG,OAAO,CAAC,MAAM,CAAC,CAkElH;AAED;;;;GAIG;AACH,wBAAsB,cAAc,CAAC,OAAO,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,OAAO,CAAC,cAAc,CAAC,iBAwBtF;AAED;;;;;;;GAOG;AACH,wBAAsB,kBAAkB,CAAC,UAAU,EAAE,+BAA+B,EAAE,OAAO,CAAC,EAAE,OAAO,CAAC,cAAc,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC,CAkCzI;AAED;;;;GAIG;AACH,wBAAsB,gBAAgB,CAAC,UAAU,EAAE,cAAc,EAAE,OAAO,CAAC,EAAE,OAAO,CAAC,cAAc,CAAC,iBA+BnG;AAED;;;;GAIG;AACH,wBAAsB,aAAa,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAqBtE;AAED;;GAEG;AACH,wBAAgB,gBAAgB,SAU/B"}
@@ -1,28 +1,34 @@
1
1
  import fs from 'node:fs';
2
2
  import fsp from 'node:fs/promises';
3
3
  import path from 'node:path';
4
- import * as nodeCliUtils from './generalUtils.js';
5
- import { log } from './generalUtils.js';
6
- const requiresAdminMessage = `➡️ Important: Requires admin permissions`;
7
- const powershellHackPrefix = `$env:PSModulePath = [Environment]::GetEnvironmentVariable('PSModulePath', 'Machine'); `;
4
+ import { Emoji, ensureDirectory, getPowershellHackArgs, isPlatformMac, isPlatformWindows, logIf, requireString, requireValidPath, simpleSpawnSync, spawnAsync, stringToNonEmptyLines, whichSync } from './generalUtils.js';
5
+ import { red } from './colors.js';
6
+ const defaultCertLogOptions = {
7
+ logSpawnOutput: false,
8
+ logTraceMessages: false,
9
+ logElevatedPermissionsMessage: true,
10
+ logSuccess: true
11
+ };
8
12
  /**
9
13
  * Wrapper function for calling openssl to generate a self-signed cert to be used for developing a local website with trusted https.
10
14
  * @param url The url to generate a cert for. This will be used as the common name (CN) in the cert as well as the filename for the generated cert files.
11
- * @param outputDirectory The directory to write the generated cert files to. Defaults to './cert'.
15
+ * @param options Options for generating the cert.
16
+ * @returns The path to the generated pfx file.
12
17
  */
13
- export async function generateCertWithOpenSsl(url, outputDirectory = './cert') {
14
- nodeCliUtils.requireString('url', url);
18
+ export async function generateCertWithOpenSsl(url, options) {
19
+ requireString('url', url);
15
20
  throwIfMaybeBadUrlChars(url);
16
- const isMac = nodeCliUtils.isPlatformMac();
17
- const spawnArgs = { cwd: outputDirectory };
18
- log('- checking if openssl is installed');
21
+ const isMac = isPlatformMac();
22
+ const mergedOptions = { ...defaultCertLogOptions, outputDirectory: './cert', ...options };
23
+ const spawnArgs = { cwd: mergedOptions.outputDirectory, stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' };
24
+ logIf(mergedOptions.logTraceMessages, 'checking if openssl is installed');
19
25
  let brewOpenSslPath = '';
20
26
  if (!isMac) {
21
- const openSslPath = nodeCliUtils.whichSync('openssl').location;
27
+ const openSslPath = whichSync('openssl').location;
22
28
  if (!openSslPath) {
23
29
  throw Error('openssl is required but was not found');
24
30
  }
25
- log(`- using openssl at: ${openSslPath}`);
31
+ logIf(mergedOptions.logTraceMessages, `using openssl at: ${openSslPath}`);
26
32
  }
27
33
  else if (isMac) {
28
34
  const brewOpenSslDirectory = getBrewOpensslPath();
@@ -34,77 +40,148 @@ export async function generateCertWithOpenSsl(url, outputDirectory = './cert') {
34
40
  throw Error(`openssl (brew version) is required but was not found at: ${brewOpenSslPath}`);
35
41
  }
36
42
  else {
37
- log(`- using openssl at: ${brewOpenSslPath}`);
43
+ logIf(mergedOptions.logTraceMessages, `using openssl at: ${brewOpenSslPath}`);
38
44
  }
39
45
  }
40
- nodeCliUtils.ensureDirectory(outputDirectory);
41
- const keyName = url + '.key';
46
+ ensureDirectory(mergedOptions.outputDirectory);
42
47
  const crtName = url + '.crt';
48
+ const keyName = url + '.key';
43
49
  const pfxName = url + '.pfx';
44
- const pfxPath = path.join(outputDirectory, pfxName);
45
- if (fs.existsSync(pfxPath)) {
46
- throw Error(`File ${pfxPath} already exists. Delete or rename this file if you want to generate a new cert.`);
50
+ const sanCnfName = url + '.cnf';
51
+ const filesToCheck = [crtName, keyName, pfxName, sanCnfName];
52
+ for (const file of filesToCheck) {
53
+ const filePath = path.join(mergedOptions.outputDirectory, file);
54
+ if (fs.existsSync(filePath)) {
55
+ throw Error(`${Emoji.Stop} File ${filePath} already exists. Delete or rename all of the following files from '${mergedOptions.outputDirectory}' if you want to generate a new cert: ${filesToCheck.join(', ')}.`);
56
+ }
47
57
  }
48
- log('- writing san.cnf file for use with openssl command');
58
+ logIf(mergedOptions.logTraceMessages, `writing ${sanCnfName} file for use with openssl command`);
49
59
  const sanCnfContents = getSanCnfFileContents(url);
50
- const sanCnfPath = path.join(outputDirectory, 'san.cnf');
60
+ const sanCnfPath = path.join(mergedOptions.outputDirectory, sanCnfName);
51
61
  await fsp.writeFile(sanCnfPath, sanCnfContents);
52
- log(`- attempting to generate cert ${pfxName}`);
53
- const genKeyAndCrtArgs = `req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout ${keyName} -out ${crtName} -subj /CN=${url} -config san.cnf`.split(' ');
62
+ logIf(mergedOptions.logTraceMessages, `attempting to generate cert ${pfxName}`);
63
+ const genKeyAndCrtArgs = `req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout ${keyName} -out ${crtName} -subj /CN=${url} -config ${sanCnfName}`.split(' ');
54
64
  const command = isMac ? brewOpenSslPath : 'openssl';
55
- let result = await nodeCliUtils.spawnAsync(command, genKeyAndCrtArgs, spawnArgs);
56
- if (result.code !== 0) {
57
- throw Error(`openssl command to generate key and crt files failed with exit code ${result.code}`);
58
- }
59
- log('- converting key and crt to pfx');
65
+ let result = await spawnAsync(command, genKeyAndCrtArgs, spawnArgs);
66
+ throwIfSpawnResultError(result);
67
+ logIf(mergedOptions.logTraceMessages, 'converting key and crt to pfx');
60
68
  const convertToPfxArgs = `pkcs12 -certpbe AES-256-CBC -export -out ${pfxName} -aes256 -inkey ${keyName} -in ${crtName} -password pass:`.split(' ');
61
- result = await nodeCliUtils.spawnAsync(command, convertToPfxArgs, spawnArgs);
62
- if (result.code !== 0) {
63
- throw Error(`openssl command to convert key and crt files to a pfx failed with exit code ${result.code}`);
64
- }
69
+ result = await spawnAsync(command, convertToPfxArgs, spawnArgs);
70
+ throwIfSpawnResultError(result);
71
+ const pfxPath = path.join(mergedOptions.outputDirectory, pfxName);
72
+ logIf(mergedOptions.logSuccess, `${Emoji.GreenCheck} Successfully generated cert: ${pfxPath}`);
73
+ return pfxPath;
65
74
  }
66
75
  /**
67
- * Uses Powershell to install a cert to the local machine's trusted root store. Must have admin permissions.
68
- *
69
- * If the cert is already installed, this method will do nothing.
70
- * @param urlOrCertFilename The url or cert filename to install. The url + '.pfx' or the cert filename passed must match a file that exists in the certDirectory.
71
- * @param certDirectory The directory to look for the cert file in. Defaults to './cert'.
76
+ * Uses Powershell to install a cert to the local machine's trusted root store. Must have elevated permissions.
77
+ * If the cert is already installed, this function will do nothing.
78
+ * @param pfxPath The path to the pfx file to install.
72
79
  */
73
- export async function winInstallCert(urlOrCertFilename, certDirectory = './cert') {
74
- nodeCliUtils.requireString('urlOrCertFilename', urlOrCertFilename);
75
- nodeCliUtils.requireValidPath('certDirectory', certDirectory);
76
- throwIfMaybeBadUrlChars(urlOrCertFilename, 'urlOrCertFilename');
77
- if (!nodeCliUtils.isPlatformWindows()) {
78
- throw Error('This method is only supported on Windows');
79
- }
80
- log(requiresAdminMessage);
81
- if (await winCertAlreadyInstalled(urlOrCertFilename)) {
82
- log(`certificate for ${urlOrCertFilename} is already installed - to install it again, first uninstall it manually or with the winUninstallCert method`);
80
+ export async function winInstallCert(pfxPath, options) {
81
+ if (!isPlatformWindows()) {
82
+ throw Error('winInstallCert is only supported on Windows');
83
+ }
84
+ validatePfxPath(pfxPath);
85
+ const mergedOptions = { ...defaultCertLogOptions, ...options };
86
+ logIf(mergedOptions.logElevatedPermissionsMessage, getRequiresElevatedPermissionsMessage(true));
87
+ if (await winCertIsInstalled({ pfxPath }, mergedOptions)) {
88
+ const certInfo = await winGetPfxInfo(pfxPath);
89
+ logIf(mergedOptions.logTraceMessages, `${Emoji.Warning} certificate '${pfxPath}' with subject '${certInfo.subject}' is already installed - to install it again, first uninstall it manually or with the winUninstallCert function`);
83
90
  return;
84
91
  }
85
- const certName = urlOrCertFilename.endsWith('.pfx') ? urlOrCertFilename : urlOrCertFilename + '.pfx';
86
- const certPath = path.join(certDirectory, certName);
87
- if (!fs.existsSync(certPath)) {
88
- throw Error(`File ${certPath} does not exist. Generate this first if you want to install it.`);
92
+ logIf(mergedOptions.logTraceMessages, `installing cert '${pfxPath}'`);
93
+ const psCommandArgs = getPowershellHackArgs(`Import-PfxCertificate -FilePath '${pfxPath}' -CertStoreLocation Cert:\\LocalMachine\\Root`);
94
+ const result = await spawnAsync('powershell', psCommandArgs, { stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' });
95
+ throwIfSpawnResultError(result);
96
+ logIf(mergedOptions.logSuccess, `${Emoji.GreenCheck} Successfully installed cert: ${pfxPath}`);
97
+ }
98
+ /**
99
+ * Uses Powershell to check if a cert is already installed to the local machine's trusted root store.
100
+ * Uses the subject of the cert in order to avoid false negatives from regenerating the same self-signed cert
101
+ * with the same subject but different thumbprint. Note that this method is geared towards use with certs generated
102
+ * with the {@link generateCertWithOpenSsl} function, so this may not work using subject if your subject is not precisely "`CN=<url>`".
103
+ * @param identifier The subject or path to the pfx file of the cert to check.
104
+ * @returns `true` if the cert is already installed, `false` otherwise.
105
+ */
106
+ export async function winCertIsInstalled(identifier, options) {
107
+ if (!isPlatformWindows()) {
108
+ throw new Error('winCertIsInstalled is only supported on Windows');
109
+ }
110
+ const mergedOptions = { ...defaultCertLogOptions, ...options };
111
+ let psCommandArgs;
112
+ // Get the count of certs installed with the same subject as the one we're trying to install
113
+ if (typeof identifier === 'string') {
114
+ requireString('subject', identifier);
115
+ validateSubject(identifier);
116
+ const subject = identifier.startsWith('CN=') ? identifier : `CN=${identifier}`;
117
+ psCommandArgs = getPowershellHackArgs(`Write-Host (Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -eq '${subject}' } | Measure-Object).Count`);
89
118
  }
90
- const psCommand = `${powershellHackPrefix}Import-PfxCertificate -FilePath '${certPath}' -CertStoreLocation Cert:\\LocalMachine\\Root`;
91
- const result = await nodeCliUtils.spawnAsync('powershell', ['-NoProfile', '-ExecutionPolicy', 'Bypass', '-Command', psCommand]);
92
- if (result.code !== 0) {
93
- throw Error(`powershell command to install cert failed with exit code ${result.code}`);
119
+ else if ('pfxPath' in identifier) {
120
+ validatePfxPath(identifier.pfxPath);
121
+ psCommandArgs = getPowershellHackArgs(`Write-Host (Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -eq (Get-PfxCertificate -FilePath '${identifier.pfxPath}').Subject } | Measure-Object).Count`);
122
+ }
123
+ const tracePart = (typeof identifier === 'string') ? `subject ${identifier}` : `pfxPath ${identifier.pfxPath}`;
124
+ logIf(mergedOptions.logTraceMessages, `checking if cert with ${tracePart} is already installed`);
125
+ const result = await spawnAsync('powershell', psCommandArgs, { stdio: 'pipe' });
126
+ throwIfSpawnResultError(result);
127
+ const lines = stringToNonEmptyLines(result.stdout);
128
+ if (lines.length !== 1) {
129
+ throw new Error(`Unexpected output from powershell command to check if the cert is already installed: ${result.stdout}`);
94
130
  }
131
+ return lines[0].trim() !== '0';
95
132
  }
96
133
  /**
97
- * Uses Powershell to uninstall a cert from the local machine's trusted root store. Must have admin permissions.
98
- * @param urlOrSubject The url or subject of the cert to uninstall. If the cert was installed with the winInstallCert method, this will be the url passed to that method.
134
+ * Uses Powershell to uninstall a cert from the local machine's trusted root store. Must have elevated permissions.
135
+ * @param identifier The subject, thumbprint or path to the pfx file of the cert to uninstall.
136
+ * @param options Options for uninstalling the cert.
99
137
  */
100
- export async function winUninstallCert(urlOrSubject) {
101
- nodeCliUtils.requireString('urlOrSubject', urlOrSubject);
102
- log(requiresAdminMessage);
103
- const psCommand = `${powershellHackPrefix}Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -match '${urlOrSubject}' } | Remove-Item`;
104
- const result = await nodeCliUtils.spawnAsync('powershell', ['-NoProfile', '-ExecutionPolicy', 'Bypass', '-Command', psCommand]);
105
- if (result.code !== 0) {
106
- throw Error(`powershell command to uninstall cert failed with exit code ${result.code}`);
138
+ export async function winUninstallCert(identifier, options) {
139
+ if (!isPlatformWindows()) {
140
+ throw new Error('winUninstallCert is only supported on Windows');
141
+ }
142
+ const mergedOptions = { ...defaultCertLogOptions, ...options };
143
+ logIf(mergedOptions.logElevatedPermissionsMessage, getRequiresElevatedPermissionsMessage(false));
144
+ let psCommandArgs;
145
+ if (typeof identifier === 'string') {
146
+ requireString('subject', identifier);
147
+ validateSubject(identifier);
148
+ psCommandArgs = getPowershellHackArgs(`Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -match '${identifier}' } | Remove-Item`);
149
+ }
150
+ else if ('thumbprint' in identifier) {
151
+ validateNoQuotes('thumbprint', identifier.thumbprint);
152
+ psCommandArgs = getPowershellHackArgs(`Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Thumbprint -eq '${identifier.thumbprint}' } | Remove-Item`);
153
+ }
154
+ else if ('pfxPath' in identifier) {
155
+ validatePfxPath(identifier.pfxPath);
156
+ psCommandArgs = getPowershellHackArgs(`$thumbprint = (Get-PfxCertificate -FilePath '${identifier.pfxPath}').Thumbprint; Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Thumbprint -eq $thumbprint } | Remove-Item`);
157
+ }
158
+ const tracePart = typeof identifier === 'string' ? `'${identifier}'` : JSON.stringify(identifier);
159
+ logIf(mergedOptions.logTraceMessages, `uninstalling cert ${tracePart}`);
160
+ const result = await spawnAsync('powershell', psCommandArgs, { stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' });
161
+ throwIfSpawnResultError(result);
162
+ logIf(mergedOptions.logSuccess, `${Emoji.GreenCheck} Successfully uninstalled cert`);
163
+ }
164
+ /**
165
+ * Uses Powershell to get info about a cert.
166
+ * @param pfxPath The path to the pfx file to get info for.
167
+ * @returns The subject, thumbprint and pfxPath of the cert.
168
+ */
169
+ export async function winGetPfxInfo(pfxPath) {
170
+ if (!isPlatformWindows()) {
171
+ throw new Error('winGetPfxInfo is only supported on Windows');
107
172
  }
173
+ validatePfxPath(pfxPath);
174
+ const psCommandArgs = getPowershellHackArgs(`Get-PfxCertificate -FilePath '${pfxPath}' | Select-Object -Property Subject, Thumbprint, @{Name='PfxPath';Expression={'${pfxPath}'}} | ConvertTo-Json`);
175
+ const result = await spawnAsync('powershell', psCommandArgs, { stdio: 'pipe' });
176
+ throwIfSpawnResultError(result);
177
+ const json = result.stdout.trim();
178
+ const parsedJson = JSON.parse(json);
179
+ const certInfo = {
180
+ subject: parsedJson.Subject,
181
+ thumbprint: parsedJson.Thumbprint,
182
+ pfxPath: parsedJson.PfxPath
183
+ };
184
+ return certInfo;
108
185
  }
109
186
  /**
110
187
  * Does not actually do anything - just outputs the manual instructions for installing a cert for use by chrome on linux.
@@ -114,32 +191,12 @@ export function linuxInstallCert() {
114
191
  Manual Instructions:
115
192
  - In Chrome, go to chrome://settings/certificates
116
193
  - Select Authorities -> import
117
- - Select your generated .crt file (in the ./cert/ directory by default - if you haven't generated it, see the generateCertWithOpenSsl method)
194
+ - Select your generated .crt file (in the ./cert/ directory by default - if you haven't generated it, see the generateCertWithOpenSsl function)
118
195
  - Check box for "Trust certificate for identifying websites"
119
196
  - Click OK
120
197
  - Reload site`;
121
198
  console.log(instructions);
122
199
  }
123
- /**
124
- * Uses Powershell to check if a cert is already installed to the local machine's trusted root store.
125
- * @param urlOrSubject The url or subject of the cert to check. If the cert was installed with the winInstallCert method, this will be the url passed to that method.
126
- * @returns `true` if the cert is already installed, `false` otherwise.
127
- */
128
- export async function winCertAlreadyInstalled(urlOrSubject) {
129
- const psCommand = `${powershellHackPrefix}Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -match '${urlOrSubject}' }`;
130
- // The stdio option of 'pipe' is important here - if left to default of spawnAsync ('inherit'), stdout will be empty
131
- const result = await nodeCliUtils.spawnAsync('powershell', ['-NoProfile', '-ExecutionPolicy', 'Bypass', '-Command', psCommand], { stdio: ['inherit', 'pipe', 'pipe'] });
132
- if (result.code !== 0) {
133
- throw Error(`powershell command to find installed cert failed with exit code ${result.code}`);
134
- }
135
- const lines = nodeCliUtils.stringToNonEmptyLines(result.stdout);
136
- for (const line of lines) {
137
- if (line.includes(urlOrSubject)) {
138
- return true;
139
- }
140
- }
141
- return false;
142
- }
143
200
  function throwIfMaybeBadUrlChars(url, varName = 'url') {
144
201
  if (url.includes(' ')) {
145
202
  throw Error(`${varName} should not contain spaces`);
@@ -152,7 +209,7 @@ function throwIfMaybeBadUrlChars(url, varName = 'url') {
152
209
  }
153
210
  }
154
211
  function getBrewOpensslPath() {
155
- const brewResult = nodeCliUtils.simpleSpawnSync('brew', ['--prefix', 'openssl']);
212
+ const brewResult = simpleSpawnSync('brew', ['--prefix', 'openssl']);
156
213
  if (brewResult.error) {
157
214
  throw Error('error attempting to find openssl installed by brew');
158
215
  }
@@ -164,6 +221,36 @@ function getBrewOpensslPath() {
164
221
  function getSanCnfFileContents(url) {
165
222
  return sanCnfTemplate.replace(/{{url}}/g, url);
166
223
  }
224
+ function validateSubject(subject) {
225
+ if (subject.includes('\\') || subject.includes('/') || subject.endsWith('.pfx')) {
226
+ throw new Error(`The subject appears to be a file path, which is not allowed. Did you mean to pass something like this instead: { pfxPath: '${subject}' } ?`);
227
+ }
228
+ validateNoQuotes('subject', subject);
229
+ }
230
+ function validateNoQuotes(name, value) {
231
+ if (value.includes("'") || value.includes('"')) {
232
+ throw new Error(`The value passed for '${name}' contains a single or double quote, which is not allowed.`);
233
+ }
234
+ }
235
+ function throwIfSpawnResultError(result) {
236
+ if (result.code !== 0) {
237
+ // There won't be any stderr if stdio was set to 'inherit', so we're checking first
238
+ if (result.stderr) {
239
+ console.error(red('Error:'), result.stderr);
240
+ }
241
+ throw Error(`Spawned command failed with exit code ${result.code}`);
242
+ }
243
+ }
244
+ function validatePfxPath(pfxPath) {
245
+ if (!pfxPath.endsWith('.pfx')) {
246
+ throw new Error('pfxPath must end with .pfx');
247
+ }
248
+ requireValidPath('pfxPath', pfxPath);
249
+ validateNoQuotes('pfxPath', pfxPath);
250
+ }
251
+ function getRequiresElevatedPermissionsMessage(isInstall = true) {
252
+ return `${Emoji.Info} Important: ${isInstall ? '' : 'un'}installing a certificate requires elevated permissions`;
253
+ }
167
254
  // Newer cert requirements force the need for "extension info" with DNS and IP info, but openssl v1.x doesn't support that with the
168
255
  // CLI option -addext, so we're using a san.cnf file instead and passing this into the CLI command with the -config option.
169
256
  const sanCnfTemplate = `[req]
@@ -182,4 +269,4 @@ DNS.1 = {{url}}
182
269
  IP.1 = 127.0.0.1
183
270
 
184
271
  `;
185
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2VydFV0aWxzLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vc3JjL2NlcnRVdGlscy50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxPQUFPLEVBQUUsTUFBTSxTQUFTLENBQUE7QUFDeEIsT0FBTyxHQUFHLE1BQU0sa0JBQWtCLENBQUE7QUFDbEMsT0FBTyxJQUFJLE1BQU0sV0FBVyxDQUFBO0FBQzVCLE9BQU8sS0FBSyxZQUFZLE1BQU0sbUJBQW1CLENBQUE7QUFDakQsT0FBTyxFQUFFLEdBQUcsRUFBRSxNQUFNLG1CQUFtQixDQUFBO0FBRXZDLE1BQU0sb0JBQW9CLEdBQUcsMENBQTBDLENBQUE7QUFDdkUsTUFBTSxvQkFBb0IsR0FBRyx3RkFBd0YsQ0FBQTtBQUVySDs7OztHQUlHO0FBQ0gsTUFBTSxDQUFDLEtBQUssVUFBVSx1QkFBdUIsQ0FBQyxHQUFXLEVBQUUsa0JBQTBCLFFBQVE7SUFDM0YsWUFBWSxDQUFDLGFBQWEsQ0FBQyxLQUFLLEVBQUUsR0FBRyxDQUFDLENBQUE7SUFDdEMsdUJBQXVCLENBQUMsR0FBRyxDQUFDLENBQUE7SUFDNUIsTUFBTSxLQUFLLEdBQUcsWUFBWSxDQUFDLGFBQWEsRUFBRSxDQUFBO0lBQzFDLE1BQU0sU0FBUyxHQUFHLEVBQUUsR0FBRyxFQUFFLGVBQWUsRUFBRSxDQUFBO0lBRTFDLEdBQUcsQ0FBQyxvQ0FBb0MsQ0FBQyxDQUFBO0lBQ3pDLElBQUksZUFBZSxHQUFXLEVBQUUsQ0FBQTtJQUNoQyxJQUFJLENBQUMsS0FBSyxFQUFFO1FBQ1YsTUFBTSxXQUFXLEdBQUcsWUFBWSxDQUFDLFNBQVMsQ0FBQyxTQUFTLENBQUMsQ0FBQyxRQUFRLENBQUE7UUFDOUQsSUFBSSxDQUFDLFdBQVcsRUFBRTtZQUNoQixNQUFNLEtBQUssQ0FBQyx1Q0FBdUMsQ0FBQyxDQUFBO1NBQ3JEO1FBQ0QsR0FBRyxDQUFDLHVCQUF1QixXQUFXLEVBQUUsQ0FBQyxDQUFBO0tBQzFDO1NBQU0sSUFBSSxLQUFLLEVBQUU7UUFDaEIsTUFBTSxvQkFBb0IsR0FBRyxrQkFBa0IsRUFBRSxDQUFBO1FBQ2pELElBQUksQ0FBQyxvQkFBb0IsRUFBRTtZQUN6QixNQUFNLEtBQUssQ0FBQyxzREFBc0QsQ0FBQyxDQUFBO1NBQ3BFO1FBQ0QsZUFBZSxHQUFHLEdBQUcsa0JBQWtCLEVBQUUsY0FBYyxDQUFBO1FBQ3ZELElBQUksQ0FBQyxFQUFFLENBQUMsVUFBVSxDQUFDLGVBQWUsQ0FBQyxFQUFFO1lBQ25DLE1BQU0sS0FBSyxDQUFDLDREQUE0RCxlQUFlLEVBQUUsQ0FBQyxDQUFBO1NBQzNGO2FBQU07WUFDTCxHQUFHLENBQUMsdUJBQXVCLGVBQWUsRUFBRSxDQUFDLENBQUE7U0FDOUM7S0FDRjtJQUVELFlBQVksQ0FBQyxlQUFlLENBQUMsZUFBZSxDQUFDLENBQUE7SUFDN0MsTUFBTSxPQUFPLEdBQUcsR0FBRyxHQUFHLE1BQU0sQ0FBQTtJQUM1QixNQUFNLE9BQU8sR0FBRyxHQUFHLEdBQUcsTUFBTSxDQUFBO0lBQzVCLE1BQU0sT0FBTyxHQUFHLEdBQUcsR0FBRyxNQUFNLENBQUE7SUFDNUIsTUFBTSxPQUFPLEdBQUcsSUFBSSxDQUFDLElBQUksQ0FBQyxlQUFlLEVBQUUsT0FBTyxDQUFDLENBQUE7SUFDbkQsSUFBSSxFQUFFLENBQUMsVUFBVSxDQUFDLE9BQU8sQ0FBQyxFQUFFO1FBQzFCLE1BQU0sS0FBSyxDQUFDLFFBQVEsT0FBTyxpRkFBaUYsQ0FBQyxDQUFBO0tBQzlHO0lBRUQsR0FBRyxDQUFDLHFEQUFxRCxDQUFDLENBQUE7SUFDMUQsTUFBTSxjQUFjLEdBQUcscUJBQXFCLENBQUMsR0FBRyxDQUFDLENBQUE7SUFDakQsTUFBTSxVQUFVLEdBQUcsSUFBSSxDQUFDLElBQUksQ0FBQyxlQUFlLEVBQUUsU0FBUyxDQUFDLENBQUE7SUFDeEQsTUFBTSxHQUFHLENBQUMsU0FBUyxDQUFDLFVBQVUsRUFBRSxjQUFjLENBQUMsQ0FBQTtJQUUvQyxHQUFHLENBQUMsaUNBQWlDLE9BQU8sRUFBRSxDQUFDLENBQUE7SUFDL0MsTUFBTSxnQkFBZ0IsR0FBRyxnRUFBZ0UsT0FBTyxTQUFTLE9BQU8sY0FBYyxHQUFHLGtCQUFrQixDQUFDLEtBQUssQ0FBQyxHQUFHLENBQUMsQ0FBQTtJQUM5SixNQUFNLE9BQU8sR0FBRyxLQUFLLENBQUMsQ0FBQyxDQUFDLGVBQWUsQ0FBQyxDQUFDLENBQUMsU0FBUyxDQUFBO0lBQ25ELElBQUksTUFBTSxHQUFHLE1BQU0sWUFBWSxDQUFDLFVBQVUsQ0FBQyxPQUFPLEVBQUUsZ0JBQWdCLEVBQUUsU0FBUyxDQUFDLENBQUE7SUFDaEYsSUFBSSxNQUFNLENBQUMsSUFBSSxLQUFLLENBQUMsRUFBRTtRQUNyQixNQUFNLEtBQUssQ0FBQyx1RUFBdUUsTUFBTSxDQUFDLElBQUksRUFBRSxDQUFDLENBQUE7S0FDbEc7SUFFRCxHQUFHLENBQUMsaUNBQWlDLENBQUMsQ0FBQTtJQUN0QyxNQUFNLGdCQUFnQixHQUFHLDRDQUE0QyxPQUFPLG1CQUFtQixPQUFPLFFBQVEsT0FBTyxrQkFBa0IsQ0FBQyxLQUFLLENBQUMsR0FBRyxDQUFDLENBQUE7SUFDbEosTUFBTSxHQUFHLE1BQU0sWUFBWSxDQUFDLFVBQVUsQ0FBQyxPQUFPLEVBQUUsZ0JBQWdCLEVBQUUsU0FBUyxDQUFDLENBQUE7SUFDNUUsSUFBSSxNQUFNLENBQUMsSUFBSSxLQUFLLENBQUMsRUFBRTtRQUNyQixNQUFNLEtBQUssQ0FBQywrRUFBK0UsTUFBTSxDQUFDLElBQUksRUFBRSxDQUFDLENBQUE7S0FDMUc7QUFDSCxDQUFDO0FBRUQ7Ozs7OztHQU1HO0FBQ0gsTUFBTSxDQUFDLEtBQUssVUFBVSxjQUFjLENBQUMsaUJBQXlCLEVBQUUsYUFBYSxHQUFHLFFBQVE7SUFDdEYsWUFBWSxDQUFDLGFBQWEsQ0FBQyxtQkFBbUIsRUFBRSxpQkFBaUIsQ0FBQyxDQUFBO0lBQ2xFLFlBQVksQ0FBQyxnQkFBZ0IsQ0FBQyxlQUFlLEVBQUUsYUFBYSxDQUFDLENBQUE7SUFDN0QsdUJBQXVCLENBQUMsaUJBQWlCLEVBQUUsbUJBQW1CLENBQUMsQ0FBQTtJQUUvRCxJQUFJLENBQUMsWUFBWSxDQUFDLGlCQUFpQixFQUFFLEVBQUU7UUFDckMsTUFBTSxLQUFLLENBQUMsMENBQTBDLENBQUMsQ0FBQTtLQUN4RDtJQUVELEdBQUcsQ0FBQyxvQkFBb0IsQ0FBQyxDQUFBO0lBRXpCLElBQUksTUFBTSx1QkFBdUIsQ0FBQyxpQkFBaUIsQ0FBQyxFQUFFO1FBQ3BELEdBQUcsQ0FBQyxtQkFBbUIsaUJBQWlCLDhHQUE4RyxDQUFDLENBQUE7UUFDdkosT0FBTTtLQUNQO0lBRUQsTUFBTSxRQUFRLEdBQUcsaUJBQWlCLENBQUMsUUFBUSxDQUFDLE1BQU0sQ0FBQyxDQUFDLENBQUMsQ0FBQyxpQkFBaUIsQ0FBQyxDQUFDLENBQUMsaUJBQWlCLEdBQUcsTUFBTSxDQUFBO0lBRXBHLE1BQU0sUUFBUSxHQUFHLElBQUksQ0FBQyxJQUFJLENBQUMsYUFBYSxFQUFFLFFBQVEsQ0FBQyxDQUFBO0lBRW5ELElBQUksQ0FBQyxFQUFFLENBQUMsVUFBVSxDQUFDLFFBQVEsQ0FBQyxFQUFFO1FBQzVCLE1BQU0sS0FBSyxDQUFDLFFBQVEsUUFBUSxpRUFBaUUsQ0FBQyxDQUFBO0tBQy9GO0lBRUQsTUFBTSxTQUFTLEdBQUcsR0FBRyxvQkFBb0Isb0NBQW9DLFFBQVEsZ0RBQWdELENBQUE7SUFFckksTUFBTSxNQUFNLEdBQUcsTUFBTSxZQUFZLENBQUMsVUFBVSxDQUFDLFlBQVksRUFBRSxDQUFDLFlBQVksRUFBRSxrQkFBa0IsRUFBRSxRQUFRLEVBQUUsVUFBVSxFQUFFLFNBQVMsQ0FBQyxDQUFDLENBQUE7SUFDL0gsSUFBSSxNQUFNLENBQUMsSUFBSSxLQUFLLENBQUMsRUFBRTtRQUNyQixNQUFNLEtBQUssQ0FBQyw0REFBNEQsTUFBTSxDQUFDLElBQUksRUFBRSxDQUFDLENBQUE7S0FDdkY7QUFDSCxDQUFDO0FBRUQ7OztHQUdHO0FBQ0gsTUFBTSxDQUFDLEtBQUssVUFBVSxnQkFBZ0IsQ0FBQyxZQUFvQjtJQUN6RCxZQUFZLENBQUMsYUFBYSxDQUFDLGNBQWMsRUFBRSxZQUFZLENBQUMsQ0FBQTtJQUV4RCxHQUFHLENBQUMsb0JBQW9CLENBQUMsQ0FBQTtJQUV6QixNQUFNLFNBQVMsR0FBRyxHQUFHLG9CQUFvQiwrRUFBK0UsWUFBWSxtQkFBbUIsQ0FBQTtJQUV2SixNQUFNLE1BQU0sR0FBRyxNQUFNLFlBQVksQ0FBQyxVQUFVLENBQUMsWUFBWSxFQUFFLENBQUMsWUFBWSxFQUFFLGtCQUFrQixFQUFFLFFBQVEsRUFBRSxVQUFVLEVBQUUsU0FBUyxDQUFDLENBQUMsQ0FBQTtJQUUvSCxJQUFJLE1BQU0sQ0FBQyxJQUFJLEtBQUssQ0FBQyxFQUFFO1FBQ3JCLE1BQU0sS0FBSyxDQUFDLDhEQUE4RCxNQUFNLENBQUMsSUFBSSxFQUFFLENBQUMsQ0FBQTtLQUN6RjtBQUNILENBQUM7QUFFRDs7R0FFRztBQUNILE1BQU0sVUFBVSxnQkFBZ0I7SUFDOUIsTUFBTSxZQUFZLEdBQUc7Ozs7Ozs7Y0FPVCxDQUFBO0lBQ1osT0FBTyxDQUFDLEdBQUcsQ0FBQyxZQUFZLENBQUMsQ0FBQTtBQUMzQixDQUFDO0FBRUQ7Ozs7R0FJRztBQUNILE1BQU0sQ0FBQyxLQUFLLFVBQVUsdUJBQXVCLENBQUMsWUFBb0I7SUFDaEUsTUFBTSxTQUFTLEdBQUcsR0FBRyxvQkFBb0IsK0VBQStFLFlBQVksS0FBSyxDQUFBO0lBRXpJLG9IQUFvSDtJQUNwSCxNQUFNLE1BQU0sR0FBRyxNQUFNLFlBQVksQ0FBQyxVQUFVLENBQUMsWUFBWSxFQUFFLENBQUMsWUFBWSxFQUFFLGtCQUFrQixFQUFFLFFBQVEsRUFBRSxVQUFVLEVBQUUsU0FBUyxDQUFDLEVBQUUsRUFBRSxLQUFLLEVBQUUsQ0FBQyxTQUFTLEVBQUUsTUFBTSxFQUFFLE1BQU0sQ0FBQyxFQUFFLENBQUMsQ0FBQTtJQUV2SyxJQUFJLE1BQU0sQ0FBQyxJQUFJLEtBQUssQ0FBQyxFQUFFO1FBQ3JCLE1BQU0sS0FBSyxDQUFDLG1FQUFtRSxNQUFNLENBQUMsSUFBSSxFQUFFLENBQUMsQ0FBQTtLQUM5RjtJQUVELE1BQU0sS0FBSyxHQUFHLFlBQVksQ0FBQyxxQkFBcUIsQ0FBQyxNQUFNLENBQUMsTUFBTSxDQUFDLENBQUE7SUFFL0QsS0FBSyxNQUFNLElBQUksSUFBSSxLQUFLLEVBQUU7UUFDeEIsSUFBSSxJQUFJLENBQUMsUUFBUSxDQUFDLFlBQVksQ0FBQyxFQUFFO1lBQy9CLE9BQU8sSUFBSSxDQUFBO1NBQ1o7S0FDRjtJQUVELE9BQU8sS0FBSyxDQUFBO0FBQ2QsQ0FBQztBQUVELFNBQVMsdUJBQXVCLENBQUMsR0FBVyxFQUFFLE9BQU8sR0FBRyxLQUFLO0lBQzNELElBQUksR0FBRyxDQUFDLFFBQVEsQ0FBQyxHQUFHLENBQUMsRUFBRTtRQUNyQixNQUFNLEtBQUssQ0FBQyxHQUFHLE9BQU8sNEJBQTRCLENBQUMsQ0FBQTtLQUNwRDtJQUNELElBQUksR0FBRyxDQUFDLFFBQVEsQ0FBQyxHQUFHLENBQUMsRUFBRTtRQUNyQixNQUFNLEtBQUssQ0FBQyxHQUFHLE9BQU8scUNBQXFDLENBQUMsQ0FBQTtLQUM3RDtJQUNELElBQUksR0FBRyxDQUFDLFFBQVEsQ0FBQyxJQUFJLENBQUMsRUFBRTtRQUN0QixNQUFNLEtBQUssQ0FBQyxHQUFHLE9BQU8saUNBQWlDLENBQUMsQ0FBQTtLQUN6RDtBQUNILENBQUM7QUFFRCxTQUFTLGtCQUFrQjtJQUN6QixNQUFNLFVBQVUsR0FBRyxZQUFZLENBQUMsZUFBZSxDQUFDLE1BQU0sRUFBRSxDQUFDLFVBQVUsRUFBRSxTQUFTLENBQUMsQ0FBQyxDQUFBO0lBQ2hGLElBQUksVUFBVSxDQUFDLEtBQUssRUFBRTtRQUNwQixNQUFNLEtBQUssQ0FBQyxvREFBb0QsQ0FBQyxDQUFBO0tBQ2xFO0lBQ0QsSUFBSSxVQUFVLENBQUMsV0FBVyxDQUFDLE1BQU0sS0FBSyxDQUFDLElBQUksVUFBVSxDQUFDLFdBQVcsQ0FBQyxNQUFNLEdBQUcsQ0FBQyxFQUFFO1FBQzVFLE1BQU0sSUFBSSxLQUFLLENBQUMsZ0VBQWdFLFVBQVUsQ0FBQyxNQUFNLEVBQUUsQ0FBQyxDQUFBO0tBQ3JHO0lBQ0QsT0FBTyxVQUFVLENBQUMsV0FBVyxDQUFDLENBQUMsQ0FBQyxDQUFBO0FBQ2xDLENBQUM7QUFFRCxTQUFTLHFCQUFxQixDQUFDLEdBQVc7SUFDeEMsT0FBTyxjQUFjLENBQUMsT0FBTyxDQUFDLFVBQVUsRUFBRSxHQUFHLENBQUMsQ0FBQTtBQUNoRCxDQUFDO0FBRUQsbUlBQW1JO0FBQ25JLDJIQUEySDtBQUMzSCxNQUFNLGNBQWMsR0FBRzs7Ozs7Ozs7Ozs7Ozs7O0NBZXRCLENBQUEifQ==
272
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certUtils.js","sourceRoot":"","sources":["../../src/certUtils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,SAAS,CAAA;AACxB,OAAO,GAAG,MAAM,kBAAkB,CAAA;AAClC,OAAO,IAAI,MAAM,WAAW,CAAA;AAC5B,OAAO,EACL,KAAK,EAGL,eAAe,EACf,qBAAqB,EACrB,aAAa,EACb,iBAAiB,EACjB,KAAK,EACL,aAAa,EACb,gBAAgB,EAChB,eAAe,EACf,UAAU,EACV,qBAAqB,EACrB,SAAS,EACV,MAAM,mBAAmB,CAAA;AAC1B,OAAO,EAAE,GAAG,EAAE,MAAM,aAAa,CAAA;AAejC,MAAM,qBAAqB,GAAmB;IAC5C,cAAc,EAAE,KAAK;IACrB,gBAAgB,EAAE,KAAK;IACvB,6BAA6B,EAAE,IAAI;IACnC,UAAU,EAAE,IAAI;CACjB,CAAA;AAWD;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,uBAAuB,CAAC,GAAW,EAAE,OAAsC;IAC/F,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAA;IACzB,uBAAuB,CAAC,GAAG,CAAC,CAAA;IAC5B,MAAM,KAAK,GAAG,aAAa,EAAE,CAAA;IAE7B,MAAM,aAAa,GAAwB,EAAE,GAAG,qBAAqB,EAAE,eAAe,EAAE,QAAQ,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9G,MAAM,SAAS,GAAmC,EAAE,GAAG,EAAE,aAAa,CAAC,eAAe,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAA;IAElJ,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,kCAAkC,CAAC,CAAA;IAEzE,IAAI,eAAe,GAAW,EAAE,CAAA;IAChC,IAAI,CAAC,KAAK,EAAE;QACV,MAAM,WAAW,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC,QAAQ,CAAA;QACjD,IAAI,CAAC,WAAW,EAAE;YAChB,MAAM,KAAK,CAAC,uCAAuC,CAAC,CAAA;SACrD;QACD,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,WAAW,EAAE,CAAC,CAAA;KAC1E;SAAM,IAAI,KAAK,EAAE;QAChB,MAAM,oBAAoB,GAAG,kBAAkB,EAAE,CAAA;QACjD,IAAI,CAAC,oBAAoB,EAAE;YACzB,MAAM,KAAK,CAAC,sDAAsD,CAAC,CAAA;SACpE;QACD,eAAe,GAAG,GAAG,kBAAkB,EAAE,cAAc,CAAA;QACvD,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,eAAe,CAAC,EAAE;YACnC,MAAM,KAAK,CAAC,4DAA4D,eAAe,EAAE,CAAC,CAAA;SAC3F;aAAM;YACL,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,eAAe,EAAE,CAAC,CAAA;SAC9E;KACF;IAED,eAAe,CAAC,aAAa,CAAC,eAAe,CAAC,CAAA;IAC9C,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,UAAU,GAAG,GAAG,GAAG,MAAM,CAAA;IAE/B,MAAM,YAAY,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,UAAU,CAAC,CAAA;IAC5D,KAAK,MAAM,IAAI,IAAI,YAAY,EAAE;QAC/B,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,CAAA;QAC/D,IAAI,EAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE;YAC3B,MAAM,KAAK,CAAC,GAAG,KAAK,CAAC,IAAI,SAAS,QAAQ,sEAAsE,aAAa,CAAC,eAAe,yCAAyC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;SAClN;KACF;IAED,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,WAAW,UAAU,oCAAoC,CAAC,CAAA;IAChG,MAAM,cAAc,GAAG,qBAAqB,CAAC,GAAG,CAAC,CAAA;IACjD,MAAM,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,UAAU,CAAC,CAAA;IACvE,MAAM,GAAG,CAAC,SAAS,CAAC,UAAU,EAAE,cAAc,CAAC,CAAA;IAE/C,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,+BAA+B,OAAO,EAAE,CAAC,CAAA;IAC/E,MAAM,gBAAgB,GAAG,gEAAgE,OAAO,SAAS,OAAO,cAAc,GAAG,YAAY,UAAU,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IACpK,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAA;IACnD,IAAI,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,EAAE,gBAAgB,EAAE,SAAS,CAAC,CAAA;IACnE,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,+BAA+B,CAAC,CAAA;IACtE,MAAM,gBAAgB,GAAG,4CAA4C,OAAO,mBAAmB,OAAO,QAAQ,OAAO,kBAAkB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IAClJ,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,EAAE,gBAAgB,EAAE,SAAS,CAAC,CAAA;IAC/D,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,OAAO,CAAC,CAAA;IAEjE,KAAK,CAAC,aAAa,CAAC,UAAU,EAAE,GAAG,KAAK,CAAC,UAAU,iCAAiC,OAAO,EAAE,CAAC,CAAA;IAE9F,OAAO,OAAO,CAAA;AAChB,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,cAAc,CAAC,OAAe,EAAE,OAAiC;IACrF,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,KAAK,CAAC,6CAA6C,CAAC,CAAA;KAC3D;IACD,eAAe,CAAC,OAAO,CAAC,CAAA;IAExB,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,KAAK,CAAC,aAAa,CAAC,6BAA6B,EAAE,qCAAqC,CAAC,IAAI,CAAC,CAAC,CAAA;IAE/F,IAAI,MAAM,kBAAkB,CAAC,EAAE,OAAO,EAAE,EAAE,aAAa,CAAC,EAAE;QACxD,MAAM,QAAQ,GAAG,MAAM,aAAa,CAAC,OAAO,CAAC,CAAA;QAC7C,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,GAAG,KAAK,CAAC,OAAO,iBAAiB,OAAO,mBAAmB,QAAQ,CAAC,OAAO,iHAAiH,CAAC,CAAA;QACnO,OAAM;KACP;IAED,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,oBAAoB,OAAO,GAAG,CAAC,CAAA;IAErE,MAAM,aAAa,GAAG,qBAAqB,CAAC,oCAAoC,OAAO,gDAAgD,CAAC,CAAA;IACxI,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAA;IAE1H,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,KAAK,CAAC,aAAa,CAAC,UAAU,EAAE,GAAG,KAAK,CAAC,UAAU,iCAAiC,OAAO,EAAE,CAAC,CAAA;AAChG,CAAC;AAED;;;;;;;GAOG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,UAA2C,EAAE,OAAiC;IACrH,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAA;KACnE;IAED,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,IAAI,aAAa,CAAA;IAEjB,4FAA4F;IAC5F,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE;QAClC,aAAa,CAAC,SAAS,EAAE,UAAU,CAAC,CAAA;QACpC,eAAe,CAAC,UAAU,CAAC,CAAA;QAC3B,MAAM,OAAO,GAAG,UAAU,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,MAAM,UAAU,EAAE,CAAA;QAC9E,aAAa,GAAG,qBAAqB,CAAC,wFAAwF,OAAO,6BAA6B,CAAC,CAAA;KACpK;SAAM,IAAI,SAAS,IAAI,UAAU,EAAE;QAClC,eAAe,CAAC,UAAU,CAAC,OAAO,CAAC,CAAA;QACnC,aAAa,GAAG,qBAAqB,CAAC,sHAAsH,UAAU,CAAC,OAAO,sCAAsC,CAAC,CAAA;KACtN;IAED,MAAM,SAAS,GAAG,CAAC,OAAO,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,WAAW,UAAU,EAAE,CAAC,CAAC,CAAC,WAAW,UAAU,CAAC,OAAO,EAAE,CAAA;IAC9G,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,yBAAyB,SAAS,uBAAuB,CAAC,CAAA;IAEhG,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC,CAAA;IAE/E,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,KAAK,GAAG,qBAAqB,CAAC,MAAM,CAAC,MAAM,CAAC,CAAA;IAElD,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE;QACtB,MAAM,IAAI,KAAK,CAAC,wFAAwF,MAAM,CAAC,MAAM,EAAE,CAAC,CAAA;KACzH;IAED,OAAO,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,KAAK,GAAG,CAAA;AAChC,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,UAA0B,EAAE,OAAiC;IAClG,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAA;KACjE;IAED,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,KAAK,CAAC,aAAa,CAAC,6BAA6B,EAAE,qCAAqC,CAAC,KAAK,CAAC,CAAC,CAAA;IAEhG,IAAI,aAAa,CAAA;IAEjB,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE;QAClC,aAAa,CAAC,SAAS,EAAE,UAAU,CAAC,CAAA;QACpC,eAAe,CAAC,UAAU,CAAC,CAAA;QAC3B,aAAa,GAAG,qBAAqB,CAAC,+EAA+E,UAAU,mBAAmB,CAAC,CAAA;KACpJ;SAAM,IAAI,YAAY,IAAI,UAAU,EAAE;QACrC,gBAAgB,CAAC,YAAY,EAAE,UAAU,CAAC,UAAU,CAAC,CAAA;QACrD,aAAa,GAAG,qBAAqB,CAAC,+EAA+E,UAAU,CAAC,UAAU,mBAAmB,CAAC,CAAA;KAC/J;SAAM,IAAI,SAAS,IAAI,UAAU,EAAE;QAClC,eAAe,CAAC,UAAU,CAAC,OAAO,CAAC,CAAA;QACnC,aAAa,GAAG,qBAAqB,CAAC,gDAAgD,UAAU,CAAC,OAAO,uHAAuH,CAAC,CAAA;KACjO;IAED,MAAM,SAAS,GAAG,OAAO,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,IAAI,UAAU,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,CAAA;IACjG,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,SAAS,EAAE,CAAC,CAAA;IAEvE,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAA;IAE1H,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,KAAK,CAAC,aAAa,CAAC,UAAU,EAAE,GAAG,KAAK,CAAC,UAAU,gCAAgC,CAAC,CAAA;AACtF,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,aAAa,CAAC,OAAe;IACjD,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAA;KAC9D;IACD,eAAe,CAAC,OAAO,CAAC,CAAA;IAExB,MAAM,aAAa,GAAG,qBAAqB,CAAC,iCAAiC,OAAO,kFAAkF,OAAO,sBAAsB,CAAC,CAAA;IACpM,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC,CAAA;IAE/E,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,IAAI,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CAAA;IACjC,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAA;IAEnC,MAAM,QAAQ,GAAa;QACzB,OAAO,EAAE,UAAU,CAAC,OAAO;QAC3B,UAAU,EAAE,UAAU,CAAC,UAAU;QACjC,OAAO,EAAE,UAAU,CAAC,OAAO;KAC5B,CAAA;IAED,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,gBAAgB;IAC9B,MAAM,YAAY,GAAG;;;;;;;cAOT,CAAA;IACZ,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAA;AAC3B,CAAC;AAED,SAAS,uBAAuB,CAAC,GAAW,EAAE,OAAO,GAAG,KAAK;IAC3D,IAAI,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACrB,MAAM,KAAK,CAAC,GAAG,OAAO,4BAA4B,CAAC,CAAA;KACpD;IACD,IAAI,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACrB,MAAM,KAAK,CAAC,GAAG,OAAO,qCAAqC,CAAC,CAAA;KAC7D;IACD,IAAI,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE;QACtB,MAAM,KAAK,CAAC,GAAG,OAAO,iCAAiC,CAAC,CAAA;KACzD;AACH,CAAC;AAED,SAAS,kBAAkB;IACzB,MAAM,UAAU,GAAG,eAAe,CAAC,MAAM,EAAE,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC,CAAA;IACnE,IAAI,UAAU,CAAC,KAAK,EAAE;QACpB,MAAM,KAAK,CAAC,oDAAoD,CAAC,CAAA;KAClE;IACD,IAAI,UAAU,CAAC,WAAW,CAAC,MAAM,KAAK,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE;QAC5E,MAAM,IAAI,KAAK,CAAC,gEAAgE,UAAU,CAAC,MAAM,EAAE,CAAC,CAAA;KACrG;IACD,OAAO,UAAU,CAAC,WAAW,CAAC,CAAC,CAAC,CAAA;AAClC,CAAC;AAED,SAAS,qBAAqB,CAAC,GAAW;IACxC,OAAO,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,GAAG,CAAC,CAAA;AAChD,CAAC;AAED,SAAS,eAAe,CAAC,OAAe;IACtC,IAAI,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;QAC/E,MAAM,IAAI,KAAK,CAAC,8HAA8H,OAAO,OAAO,CAAC,CAAA;KAC9J;IACD,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;AACtC,CAAC;AAED,SAAS,gBAAgB,CAAC,IAAY,EAAE,KAAa;IACnD,IAAI,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QAC9C,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,4DAA4D,CAAC,CAAA;KAC3G;AACH,CAAC;AAED,SAAS,uBAAuB,CAAC,MAAmB;IAClD,IAAI,MAAM,CAAC,IAAI,KAAK,CAAC,EAAE;QACrB,mFAAmF;QACnF,IAAI,MAAM,CAAC,MAAM,EAAE;YACjB,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC,MAAM,CAAC,CAAA;SAC5C;QACD,MAAM,KAAK,CAAC,yCAAyC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAA;KACpE;AACH,CAAC;AAED,SAAS,eAAe,CAAC,OAAe;IACtC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;QAC7B,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAA;KAC9C;IACD,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;IACpC,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;AACtC,CAAC;AAED,SAAS,qCAAqC,CAAC,SAAS,GAAG,IAAI;IAC7D,OAAO,GAAG,KAAK,CAAC,IAAI,eAAe,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,wDAAwD,CAAA;AAClH,CAAC;AAED,mIAAmI;AACnI,2HAA2H;AAC3H,MAAM,cAAc,GAAG;;;;;;;;;;;;;;;CAetB,CAAA"}
@@ -0,0 +1,17 @@
1
+ export declare enum AnsiColor {
2
+ RESET = "\u001B[0m",
3
+ RED = "\u001B[31m",
4
+ GREEN = "\u001B[32m",
5
+ YELLOW = "\u001B[33m",
6
+ CYAN = "\u001B[96m",
7
+ GRAY = "\u001B[90m",
8
+ PURPLE = "\u001B[35m"
9
+ }
10
+ export declare const color: (str: string, colorAnsiCode: AnsiColor) => string;
11
+ export declare const red: (str: string) => string;
12
+ export declare const green: (str: string) => string;
13
+ export declare const cyan: (str: string) => string;
14
+ export declare const gray: (str: string) => string;
15
+ export declare const purple: (str: string) => string;
16
+ export declare const yellow: (str: string) => string;
17
+ //# sourceMappingURL=colors.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"colors.d.ts","sourceRoot":"","sources":["../../src/colors.ts"],"names":[],"mappings":"AAAA,oBAAY,SAAS;IACnB,KAAK,cAAY;IACjB,GAAG,eAAa;IAChB,KAAK,eAAa;IAClB,MAAM,eAAa;IACnB,IAAI,eAAa;IACjB,IAAI,eAAa;IACjB,MAAM,eAAa;CACpB;AAED,eAAO,MAAM,KAAK,QAAS,MAAM,iBAAiB,SAAS,KAAG,MAE7D,CAAA;AAED,eAAO,MAAM,GAAG,QAAS,MAAM,WAA8B,CAAA;AAC7D,eAAO,MAAM,KAAK,QAAS,MAAM,WAAgC,CAAA;AACjE,eAAO,MAAM,IAAI,QAAS,MAAM,WAA+B,CAAA;AAC/D,eAAO,MAAM,IAAI,QAAS,MAAM,WAA+B,CAAA;AAC/D,eAAO,MAAM,MAAM,QAAS,MAAM,WAAiC,CAAA;AACnE,eAAO,MAAM,MAAM,QAAS,MAAM,WAAiC,CAAA"}
@@ -0,0 +1,20 @@
1
+ export var AnsiColor;
2
+ (function (AnsiColor) {
3
+ AnsiColor["RESET"] = "\u001B[0m";
4
+ AnsiColor["RED"] = "\u001B[31m";
5
+ AnsiColor["GREEN"] = "\u001B[32m";
6
+ AnsiColor["YELLOW"] = "\u001B[33m";
7
+ AnsiColor["CYAN"] = "\u001B[96m";
8
+ AnsiColor["GRAY"] = "\u001B[90m";
9
+ AnsiColor["PURPLE"] = "\u001B[35m";
10
+ })(AnsiColor || (AnsiColor = {}));
11
+ export const color = (str, colorAnsiCode) => {
12
+ return `${colorAnsiCode}${str}${AnsiColor.RESET}`;
13
+ };
14
+ export const red = (str) => color(str, AnsiColor.RED);
15
+ export const green = (str) => color(str, AnsiColor.GREEN);
16
+ export const cyan = (str) => color(str, AnsiColor.CYAN);
17
+ export const gray = (str) => color(str, AnsiColor.GRAY);
18
+ export const purple = (str) => color(str, AnsiColor.PURPLE);
19
+ export const yellow = (str) => color(str, AnsiColor.YELLOW);
20
+ //# sourceMappingURL=data:application/json;base64,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