@mikeyt23/node-cli-utils 2.0.0-beta.1 → 2.0.0-beta.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/DependencyChecker.d.ts +26 -0
- package/dist/cjs/DependencyChecker.d.ts.map +1 -0
- package/dist/cjs/DependencyChecker.js +200 -0
- package/dist/cjs/GitUtility.d.ts +7 -0
- package/dist/cjs/GitUtility.d.ts.map +1 -0
- package/dist/cjs/GitUtility.js +49 -0
- package/dist/cjs/NixUtil.d.ts +8 -0
- package/dist/cjs/NixUtil.d.ts.map +1 -0
- package/dist/cjs/NixUtil.js +50 -0
- package/dist/cjs/TarballUtility.d.ts +17 -7
- package/dist/cjs/TarballUtility.d.ts.map +1 -1
- package/dist/cjs/TarballUtility.js +18 -24
- package/dist/cjs/certUtils.d.ts +53 -17
- package/dist/cjs/certUtils.d.ts.map +1 -1
- package/dist/cjs/certUtils.js +176 -111
- package/dist/cjs/colors.d.ts +17 -0
- package/dist/cjs/colors.d.ts.map +1 -0
- package/dist/cjs/colors.js +30 -0
- package/dist/cjs/dbMigrationUtils.js +44 -54
- package/dist/cjs/dotnetUtils.d.ts.map +1 -1
- package/dist/cjs/dotnetUtils.js +4 -2
- package/dist/cjs/esmSpecific.d.mts +5 -0
- package/dist/cjs/esmSpecific.d.mts.map +1 -1
- package/dist/cjs/esmSpecific.mjs +6 -1
- package/dist/cjs/generalUtils.d.ts +252 -26
- package/dist/cjs/generalUtils.d.ts.map +1 -1
- package/dist/cjs/generalUtils.js +503 -107
- package/dist/cjs/generalUtilsInternal.d.ts +9 -3
- package/dist/cjs/generalUtilsInternal.d.ts.map +1 -1
- package/dist/cjs/generalUtilsInternal.js +160 -59
- package/dist/cjs/hostFileUtils.d.ts +18 -0
- package/dist/cjs/hostFileUtils.d.ts.map +1 -0
- package/dist/cjs/hostFileUtils.js +100 -0
- package/dist/cjs/index.d.ts +1 -0
- package/dist/cjs/index.d.ts.map +1 -1
- package/dist/cjs/index.js +2 -1
- package/dist/cjs/runWhileParentAlive.js +7 -9
- package/dist/cjs/testUtils.d.ts +11 -0
- package/dist/cjs/testUtils.d.ts.map +1 -0
- package/dist/cjs/testUtils.js +58 -0
- package/dist/esm/DependencyChecker.d.ts +26 -0
- package/dist/esm/DependencyChecker.d.ts.map +1 -0
- package/dist/esm/DependencyChecker.js +172 -0
- package/dist/esm/GitUtility.d.ts +7 -0
- package/dist/esm/GitUtility.d.ts.map +1 -0
- package/dist/esm/GitUtility.js +43 -0
- package/dist/esm/NixUtil.d.ts +8 -0
- package/dist/esm/NixUtil.d.ts.map +1 -0
- package/dist/esm/NixUtil.js +46 -0
- package/dist/esm/TarballUtility.d.ts +17 -7
- package/dist/esm/TarballUtility.d.ts.map +1 -1
- package/dist/esm/TarballUtility.js +21 -25
- package/dist/esm/certUtils.d.ts +53 -17
- package/dist/esm/certUtils.d.ts.map +1 -1
- package/dist/esm/certUtils.js +173 -86
- package/dist/esm/colors.d.ts +17 -0
- package/dist/esm/colors.d.ts.map +1 -0
- package/dist/esm/colors.js +20 -0
- package/dist/esm/dbMigrationUtils.js +45 -55
- package/dist/esm/dotnetUtils.d.ts.map +1 -1
- package/dist/esm/dotnetUtils.js +4 -2
- package/dist/esm/esmSpecific.d.mts +5 -0
- package/dist/esm/esmSpecific.d.mts.map +1 -1
- package/dist/esm/esmSpecific.mjs +6 -1
- package/dist/esm/generalUtils.d.ts +252 -26
- package/dist/esm/generalUtils.d.ts.map +1 -1
- package/dist/esm/generalUtils.js +477 -105
- package/dist/esm/generalUtilsInternal.d.ts +9 -3
- package/dist/esm/generalUtilsInternal.d.ts.map +1 -1
- package/dist/esm/generalUtilsInternal.js +151 -57
- package/dist/esm/hostFileUtils.d.ts +18 -0
- package/dist/esm/hostFileUtils.d.ts.map +1 -0
- package/dist/esm/hostFileUtils.js +85 -0
- package/dist/esm/index.d.ts +1 -0
- package/dist/esm/index.d.ts.map +1 -1
- package/dist/esm/index.js +2 -1
- package/dist/esm/runWhileParentAlive.js +8 -10
- package/dist/esm/testUtils.d.ts +11 -0
- package/dist/esm/testUtils.d.ts.map +1 -0
- package/dist/esm/testUtils.js +47 -0
- package/package.json +38 -2
package/dist/esm/certUtils.d.ts
CHANGED
|
@@ -1,30 +1,66 @@
|
|
|
1
|
+
/** Control what is logged when running certUtils functions. */
|
|
2
|
+
export interface CertLogOptions {
|
|
3
|
+
logSpawnOutput: boolean;
|
|
4
|
+
logTraceMessages: boolean;
|
|
5
|
+
logElevatedPermissionsMessage: boolean;
|
|
6
|
+
logSuccess: boolean;
|
|
7
|
+
}
|
|
8
|
+
export interface GenerateCertOptions extends CertLogOptions {
|
|
9
|
+
/** The directory to write the generated cert files to. Defaults to `./cert`. */
|
|
10
|
+
outputDirectory: string;
|
|
11
|
+
}
|
|
12
|
+
/** Subject, thumbprint or path to the pfx file. Used with the {@link winUninstallCert} function. */
|
|
13
|
+
export type CertIdentifier = string | {
|
|
14
|
+
thumbprint: string;
|
|
15
|
+
} | {
|
|
16
|
+
pfxPath: string;
|
|
17
|
+
};
|
|
18
|
+
/** The subject or path to the pfx file. Used with the {@link winCertIsInstalled} function. */
|
|
19
|
+
export type CertIdentifierWithoutThumbprint = string | {
|
|
20
|
+
pfxPath: string;
|
|
21
|
+
};
|
|
22
|
+
/** Cert info returned by {@link winGetPfxInfo}. */
|
|
23
|
+
export type CertInfo = {
|
|
24
|
+
subject: string;
|
|
25
|
+
thumbprint: string;
|
|
26
|
+
pfxPath: string;
|
|
27
|
+
};
|
|
1
28
|
/**
|
|
2
29
|
* Wrapper function for calling openssl to generate a self-signed cert to be used for developing a local website with trusted https.
|
|
3
30
|
* @param url The url to generate a cert for. This will be used as the common name (CN) in the cert as well as the filename for the generated cert files.
|
|
4
|
-
* @param
|
|
31
|
+
* @param options Options for generating the cert.
|
|
32
|
+
* @returns The path to the generated pfx file.
|
|
5
33
|
*/
|
|
6
|
-
export declare function generateCertWithOpenSsl(url: string,
|
|
34
|
+
export declare function generateCertWithOpenSsl(url: string, options?: Partial<GenerateCertOptions>): Promise<string>;
|
|
7
35
|
/**
|
|
8
|
-
* Uses Powershell to install a cert to the local machine's trusted root store. Must have
|
|
9
|
-
*
|
|
10
|
-
*
|
|
11
|
-
* @param urlOrCertFilename The url or cert filename to install. The url + '.pfx' or the cert filename passed must match a file that exists in the certDirectory.
|
|
12
|
-
* @param certDirectory The directory to look for the cert file in. Defaults to './cert'.
|
|
36
|
+
* Uses Powershell to install a cert to the local machine's trusted root store. Must have elevated permissions.
|
|
37
|
+
* If the cert is already installed, this function will do nothing.
|
|
38
|
+
* @param pfxPath The path to the pfx file to install.
|
|
13
39
|
*/
|
|
14
|
-
export declare function winInstallCert(
|
|
40
|
+
export declare function winInstallCert(pfxPath: string, options?: Partial<CertLogOptions>): Promise<void>;
|
|
15
41
|
/**
|
|
16
|
-
* Uses Powershell to
|
|
17
|
-
*
|
|
42
|
+
* Uses Powershell to check if a cert is already installed to the local machine's trusted root store.
|
|
43
|
+
* Uses the subject of the cert in order to avoid false negatives from regenerating the same self-signed cert
|
|
44
|
+
* with the same subject but different thumbprint. Note that this method is geared towards use with certs generated
|
|
45
|
+
* with the {@link generateCertWithOpenSsl} function, so this may not work using subject if your subject is not precisely "`CN=<url>`".
|
|
46
|
+
* @param identifier The subject or path to the pfx file of the cert to check.
|
|
47
|
+
* @returns `true` if the cert is already installed, `false` otherwise.
|
|
18
48
|
*/
|
|
19
|
-
export declare function
|
|
49
|
+
export declare function winCertIsInstalled(identifier: CertIdentifierWithoutThumbprint, options?: Partial<CertLogOptions>): Promise<boolean>;
|
|
20
50
|
/**
|
|
21
|
-
*
|
|
51
|
+
* Uses Powershell to uninstall a cert from the local machine's trusted root store. Must have elevated permissions.
|
|
52
|
+
* @param identifier The subject, thumbprint or path to the pfx file of the cert to uninstall.
|
|
53
|
+
* @param options Options for uninstalling the cert.
|
|
22
54
|
*/
|
|
23
|
-
export declare function
|
|
55
|
+
export declare function winUninstallCert(identifier: CertIdentifier, options?: Partial<CertLogOptions>): Promise<void>;
|
|
24
56
|
/**
|
|
25
|
-
* Uses Powershell to
|
|
26
|
-
* @param
|
|
27
|
-
* @returns
|
|
57
|
+
* Uses Powershell to get info about a cert.
|
|
58
|
+
* @param pfxPath The path to the pfx file to get info for.
|
|
59
|
+
* @returns The subject, thumbprint and pfxPath of the cert.
|
|
28
60
|
*/
|
|
29
|
-
export declare function
|
|
61
|
+
export declare function winGetPfxInfo(pfxPath: string): Promise<CertInfo>;
|
|
62
|
+
/**
|
|
63
|
+
* Does not actually do anything - just outputs the manual instructions for installing a cert for use by chrome on linux.
|
|
64
|
+
*/
|
|
65
|
+
export declare function linuxInstallCert(): void;
|
|
30
66
|
//# sourceMappingURL=certUtils.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"certUtils.d.ts","sourceRoot":"","sources":["../../src/certUtils.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"certUtils.d.ts","sourceRoot":"","sources":["../../src/certUtils.ts"],"names":[],"mappings":"AAqBA,+DAA+D;AAC/D,MAAM,WAAW,cAAc;IAC7B,cAAc,EAAE,OAAO,CAAA;IACvB,gBAAgB,EAAE,OAAO,CAAA;IACzB,6BAA6B,EAAE,OAAO,CAAA;IACtC,UAAU,EAAE,OAAO,CAAA;CACpB;AAED,MAAM,WAAW,mBAAoB,SAAQ,cAAc;IACzD,gFAAgF;IAChF,eAAe,EAAE,MAAM,CAAA;CACxB;AASD,oGAAoG;AACpG,MAAM,MAAM,cAAc,GAAG,MAAM,GAAG;IAAE,UAAU,EAAE,MAAM,CAAA;CAAE,GAAG;IAAE,OAAO,EAAE,MAAM,CAAA;CAAE,CAAA;AAElF,8FAA8F;AAC9F,MAAM,MAAM,+BAA+B,GAAG,MAAM,GAAG;IAAE,OAAO,EAAE,MAAM,CAAA;CAAE,CAAA;AAE1E,mDAAmD;AACnD,MAAM,MAAM,QAAQ,GAAG;IAAE,OAAO,EAAE,MAAM,CAAC;IAAC,UAAU,EAAE,MAAM,CAAC;IAAC,OAAO,EAAE,MAAM,CAAA;CAAE,CAAA;AAE/E;;;;;GAKG;AACH,wBAAsB,uBAAuB,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,OAAO,CAAC,mBAAmB,CAAC,GAAG,OAAO,CAAC,MAAM,CAAC,CAkElH;AAED;;;;GAIG;AACH,wBAAsB,cAAc,CAAC,OAAO,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,OAAO,CAAC,cAAc,CAAC,iBAwBtF;AAED;;;;;;;GAOG;AACH,wBAAsB,kBAAkB,CAAC,UAAU,EAAE,+BAA+B,EAAE,OAAO,CAAC,EAAE,OAAO,CAAC,cAAc,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC,CAkCzI;AAED;;;;GAIG;AACH,wBAAsB,gBAAgB,CAAC,UAAU,EAAE,cAAc,EAAE,OAAO,CAAC,EAAE,OAAO,CAAC,cAAc,CAAC,iBA+BnG;AAED;;;;GAIG;AACH,wBAAsB,aAAa,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAqBtE;AAED;;GAEG;AACH,wBAAgB,gBAAgB,SAU/B"}
|
package/dist/esm/certUtils.js
CHANGED
|
@@ -1,28 +1,34 @@
|
|
|
1
1
|
import fs from 'node:fs';
|
|
2
2
|
import fsp from 'node:fs/promises';
|
|
3
3
|
import path from 'node:path';
|
|
4
|
-
import
|
|
5
|
-
import {
|
|
6
|
-
const
|
|
7
|
-
|
|
4
|
+
import { Emoji, ensureDirectory, getPowershellHackArgs, isPlatformMac, isPlatformWindows, logIf, requireString, requireValidPath, simpleSpawnSync, spawnAsync, stringToNonEmptyLines, whichSync } from './generalUtils.js';
|
|
5
|
+
import { red } from './colors.js';
|
|
6
|
+
const defaultCertLogOptions = {
|
|
7
|
+
logSpawnOutput: false,
|
|
8
|
+
logTraceMessages: false,
|
|
9
|
+
logElevatedPermissionsMessage: true,
|
|
10
|
+
logSuccess: true
|
|
11
|
+
};
|
|
8
12
|
/**
|
|
9
13
|
* Wrapper function for calling openssl to generate a self-signed cert to be used for developing a local website with trusted https.
|
|
10
14
|
* @param url The url to generate a cert for. This will be used as the common name (CN) in the cert as well as the filename for the generated cert files.
|
|
11
|
-
* @param
|
|
15
|
+
* @param options Options for generating the cert.
|
|
16
|
+
* @returns The path to the generated pfx file.
|
|
12
17
|
*/
|
|
13
|
-
export async function generateCertWithOpenSsl(url,
|
|
14
|
-
|
|
18
|
+
export async function generateCertWithOpenSsl(url, options) {
|
|
19
|
+
requireString('url', url);
|
|
15
20
|
throwIfMaybeBadUrlChars(url);
|
|
16
|
-
const isMac =
|
|
17
|
-
const
|
|
18
|
-
|
|
21
|
+
const isMac = isPlatformMac();
|
|
22
|
+
const mergedOptions = { ...defaultCertLogOptions, outputDirectory: './cert', ...options };
|
|
23
|
+
const spawnArgs = { cwd: mergedOptions.outputDirectory, stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' };
|
|
24
|
+
logIf(mergedOptions.logTraceMessages, 'checking if openssl is installed');
|
|
19
25
|
let brewOpenSslPath = '';
|
|
20
26
|
if (!isMac) {
|
|
21
|
-
const openSslPath =
|
|
27
|
+
const openSslPath = whichSync('openssl').location;
|
|
22
28
|
if (!openSslPath) {
|
|
23
29
|
throw Error('openssl is required but was not found');
|
|
24
30
|
}
|
|
25
|
-
|
|
31
|
+
logIf(mergedOptions.logTraceMessages, `using openssl at: ${openSslPath}`);
|
|
26
32
|
}
|
|
27
33
|
else if (isMac) {
|
|
28
34
|
const brewOpenSslDirectory = getBrewOpensslPath();
|
|
@@ -34,77 +40,148 @@ export async function generateCertWithOpenSsl(url, outputDirectory = './cert') {
|
|
|
34
40
|
throw Error(`openssl (brew version) is required but was not found at: ${brewOpenSslPath}`);
|
|
35
41
|
}
|
|
36
42
|
else {
|
|
37
|
-
|
|
43
|
+
logIf(mergedOptions.logTraceMessages, `using openssl at: ${brewOpenSslPath}`);
|
|
38
44
|
}
|
|
39
45
|
}
|
|
40
|
-
|
|
41
|
-
const keyName = url + '.key';
|
|
46
|
+
ensureDirectory(mergedOptions.outputDirectory);
|
|
42
47
|
const crtName = url + '.crt';
|
|
48
|
+
const keyName = url + '.key';
|
|
43
49
|
const pfxName = url + '.pfx';
|
|
44
|
-
const
|
|
45
|
-
|
|
46
|
-
|
|
50
|
+
const sanCnfName = url + '.cnf';
|
|
51
|
+
const filesToCheck = [crtName, keyName, pfxName, sanCnfName];
|
|
52
|
+
for (const file of filesToCheck) {
|
|
53
|
+
const filePath = path.join(mergedOptions.outputDirectory, file);
|
|
54
|
+
if (fs.existsSync(filePath)) {
|
|
55
|
+
throw Error(`${Emoji.Stop} File ${filePath} already exists. Delete or rename all of the following files from '${mergedOptions.outputDirectory}' if you want to generate a new cert: ${filesToCheck.join(', ')}.`);
|
|
56
|
+
}
|
|
47
57
|
}
|
|
48
|
-
|
|
58
|
+
logIf(mergedOptions.logTraceMessages, `writing ${sanCnfName} file for use with openssl command`);
|
|
49
59
|
const sanCnfContents = getSanCnfFileContents(url);
|
|
50
|
-
const sanCnfPath = path.join(outputDirectory,
|
|
60
|
+
const sanCnfPath = path.join(mergedOptions.outputDirectory, sanCnfName);
|
|
51
61
|
await fsp.writeFile(sanCnfPath, sanCnfContents);
|
|
52
|
-
|
|
53
|
-
const genKeyAndCrtArgs = `req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout ${keyName} -out ${crtName} -subj /CN=${url} -config
|
|
62
|
+
logIf(mergedOptions.logTraceMessages, `attempting to generate cert ${pfxName}`);
|
|
63
|
+
const genKeyAndCrtArgs = `req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout ${keyName} -out ${crtName} -subj /CN=${url} -config ${sanCnfName}`.split(' ');
|
|
54
64
|
const command = isMac ? brewOpenSslPath : 'openssl';
|
|
55
|
-
let result = await
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
}
|
|
59
|
-
log('- converting key and crt to pfx');
|
|
65
|
+
let result = await spawnAsync(command, genKeyAndCrtArgs, spawnArgs);
|
|
66
|
+
throwIfSpawnResultError(result);
|
|
67
|
+
logIf(mergedOptions.logTraceMessages, 'converting key and crt to pfx');
|
|
60
68
|
const convertToPfxArgs = `pkcs12 -certpbe AES-256-CBC -export -out ${pfxName} -aes256 -inkey ${keyName} -in ${crtName} -password pass:`.split(' ');
|
|
61
|
-
result = await
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
}
|
|
69
|
+
result = await spawnAsync(command, convertToPfxArgs, spawnArgs);
|
|
70
|
+
throwIfSpawnResultError(result);
|
|
71
|
+
const pfxPath = path.join(mergedOptions.outputDirectory, pfxName);
|
|
72
|
+
logIf(mergedOptions.logSuccess, `${Emoji.GreenCheck} Successfully generated cert: ${pfxPath}`);
|
|
73
|
+
return pfxPath;
|
|
65
74
|
}
|
|
66
75
|
/**
|
|
67
|
-
* Uses Powershell to install a cert to the local machine's trusted root store. Must have
|
|
68
|
-
*
|
|
69
|
-
*
|
|
70
|
-
* @param urlOrCertFilename The url or cert filename to install. The url + '.pfx' or the cert filename passed must match a file that exists in the certDirectory.
|
|
71
|
-
* @param certDirectory The directory to look for the cert file in. Defaults to './cert'.
|
|
76
|
+
* Uses Powershell to install a cert to the local machine's trusted root store. Must have elevated permissions.
|
|
77
|
+
* If the cert is already installed, this function will do nothing.
|
|
78
|
+
* @param pfxPath The path to the pfx file to install.
|
|
72
79
|
*/
|
|
73
|
-
export async function winInstallCert(
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
80
|
+
export async function winInstallCert(pfxPath, options) {
|
|
81
|
+
if (!isPlatformWindows()) {
|
|
82
|
+
throw Error('winInstallCert is only supported on Windows');
|
|
83
|
+
}
|
|
84
|
+
validatePfxPath(pfxPath);
|
|
85
|
+
const mergedOptions = { ...defaultCertLogOptions, ...options };
|
|
86
|
+
logIf(mergedOptions.logElevatedPermissionsMessage, getRequiresElevatedPermissionsMessage(true));
|
|
87
|
+
if (await winCertIsInstalled({ pfxPath }, mergedOptions)) {
|
|
88
|
+
const certInfo = await winGetPfxInfo(pfxPath);
|
|
89
|
+
logIf(mergedOptions.logTraceMessages, `${Emoji.Warning} certificate '${pfxPath}' with subject '${certInfo.subject}' is already installed - to install it again, first uninstall it manually or with the winUninstallCert function`);
|
|
83
90
|
return;
|
|
84
91
|
}
|
|
85
|
-
|
|
86
|
-
const
|
|
87
|
-
|
|
88
|
-
|
|
92
|
+
logIf(mergedOptions.logTraceMessages, `installing cert '${pfxPath}'`);
|
|
93
|
+
const psCommandArgs = getPowershellHackArgs(`Import-PfxCertificate -FilePath '${pfxPath}' -CertStoreLocation Cert:\\LocalMachine\\Root`);
|
|
94
|
+
const result = await spawnAsync('powershell', psCommandArgs, { stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' });
|
|
95
|
+
throwIfSpawnResultError(result);
|
|
96
|
+
logIf(mergedOptions.logSuccess, `${Emoji.GreenCheck} Successfully installed cert: ${pfxPath}`);
|
|
97
|
+
}
|
|
98
|
+
/**
|
|
99
|
+
* Uses Powershell to check if a cert is already installed to the local machine's trusted root store.
|
|
100
|
+
* Uses the subject of the cert in order to avoid false negatives from regenerating the same self-signed cert
|
|
101
|
+
* with the same subject but different thumbprint. Note that this method is geared towards use with certs generated
|
|
102
|
+
* with the {@link generateCertWithOpenSsl} function, so this may not work using subject if your subject is not precisely "`CN=<url>`".
|
|
103
|
+
* @param identifier The subject or path to the pfx file of the cert to check.
|
|
104
|
+
* @returns `true` if the cert is already installed, `false` otherwise.
|
|
105
|
+
*/
|
|
106
|
+
export async function winCertIsInstalled(identifier, options) {
|
|
107
|
+
if (!isPlatformWindows()) {
|
|
108
|
+
throw new Error('winCertIsInstalled is only supported on Windows');
|
|
109
|
+
}
|
|
110
|
+
const mergedOptions = { ...defaultCertLogOptions, ...options };
|
|
111
|
+
let psCommandArgs;
|
|
112
|
+
// Get the count of certs installed with the same subject as the one we're trying to install
|
|
113
|
+
if (typeof identifier === 'string') {
|
|
114
|
+
requireString('subject', identifier);
|
|
115
|
+
validateSubject(identifier);
|
|
116
|
+
const subject = identifier.startsWith('CN=') ? identifier : `CN=${identifier}`;
|
|
117
|
+
psCommandArgs = getPowershellHackArgs(`Write-Host (Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -eq '${subject}' } | Measure-Object).Count`);
|
|
89
118
|
}
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
119
|
+
else if ('pfxPath' in identifier) {
|
|
120
|
+
validatePfxPath(identifier.pfxPath);
|
|
121
|
+
psCommandArgs = getPowershellHackArgs(`Write-Host (Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -eq (Get-PfxCertificate -FilePath '${identifier.pfxPath}').Subject } | Measure-Object).Count`);
|
|
122
|
+
}
|
|
123
|
+
const tracePart = (typeof identifier === 'string') ? `subject ${identifier}` : `pfxPath ${identifier.pfxPath}`;
|
|
124
|
+
logIf(mergedOptions.logTraceMessages, `checking if cert with ${tracePart} is already installed`);
|
|
125
|
+
const result = await spawnAsync('powershell', psCommandArgs, { stdio: 'pipe' });
|
|
126
|
+
throwIfSpawnResultError(result);
|
|
127
|
+
const lines = stringToNonEmptyLines(result.stdout);
|
|
128
|
+
if (lines.length !== 1) {
|
|
129
|
+
throw new Error(`Unexpected output from powershell command to check if the cert is already installed: ${result.stdout}`);
|
|
94
130
|
}
|
|
131
|
+
return lines[0].trim() !== '0';
|
|
95
132
|
}
|
|
96
133
|
/**
|
|
97
|
-
* Uses Powershell to uninstall a cert from the local machine's trusted root store. Must have
|
|
98
|
-
* @param
|
|
134
|
+
* Uses Powershell to uninstall a cert from the local machine's trusted root store. Must have elevated permissions.
|
|
135
|
+
* @param identifier The subject, thumbprint or path to the pfx file of the cert to uninstall.
|
|
136
|
+
* @param options Options for uninstalling the cert.
|
|
99
137
|
*/
|
|
100
|
-
export async function winUninstallCert(
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
const
|
|
105
|
-
|
|
106
|
-
|
|
138
|
+
export async function winUninstallCert(identifier, options) {
|
|
139
|
+
if (!isPlatformWindows()) {
|
|
140
|
+
throw new Error('winUninstallCert is only supported on Windows');
|
|
141
|
+
}
|
|
142
|
+
const mergedOptions = { ...defaultCertLogOptions, ...options };
|
|
143
|
+
logIf(mergedOptions.logElevatedPermissionsMessage, getRequiresElevatedPermissionsMessage(false));
|
|
144
|
+
let psCommandArgs;
|
|
145
|
+
if (typeof identifier === 'string') {
|
|
146
|
+
requireString('subject', identifier);
|
|
147
|
+
validateSubject(identifier);
|
|
148
|
+
psCommandArgs = getPowershellHackArgs(`Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -match '${identifier}' } | Remove-Item`);
|
|
149
|
+
}
|
|
150
|
+
else if ('thumbprint' in identifier) {
|
|
151
|
+
validateNoQuotes('thumbprint', identifier.thumbprint);
|
|
152
|
+
psCommandArgs = getPowershellHackArgs(`Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Thumbprint -eq '${identifier.thumbprint}' } | Remove-Item`);
|
|
153
|
+
}
|
|
154
|
+
else if ('pfxPath' in identifier) {
|
|
155
|
+
validatePfxPath(identifier.pfxPath);
|
|
156
|
+
psCommandArgs = getPowershellHackArgs(`$thumbprint = (Get-PfxCertificate -FilePath '${identifier.pfxPath}').Thumbprint; Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Thumbprint -eq $thumbprint } | Remove-Item`);
|
|
157
|
+
}
|
|
158
|
+
const tracePart = typeof identifier === 'string' ? `'${identifier}'` : JSON.stringify(identifier);
|
|
159
|
+
logIf(mergedOptions.logTraceMessages, `uninstalling cert ${tracePart}`);
|
|
160
|
+
const result = await spawnAsync('powershell', psCommandArgs, { stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' });
|
|
161
|
+
throwIfSpawnResultError(result);
|
|
162
|
+
logIf(mergedOptions.logSuccess, `${Emoji.GreenCheck} Successfully uninstalled cert`);
|
|
163
|
+
}
|
|
164
|
+
/**
|
|
165
|
+
* Uses Powershell to get info about a cert.
|
|
166
|
+
* @param pfxPath The path to the pfx file to get info for.
|
|
167
|
+
* @returns The subject, thumbprint and pfxPath of the cert.
|
|
168
|
+
*/
|
|
169
|
+
export async function winGetPfxInfo(pfxPath) {
|
|
170
|
+
if (!isPlatformWindows()) {
|
|
171
|
+
throw new Error('winGetPfxInfo is only supported on Windows');
|
|
107
172
|
}
|
|
173
|
+
validatePfxPath(pfxPath);
|
|
174
|
+
const psCommandArgs = getPowershellHackArgs(`Get-PfxCertificate -FilePath '${pfxPath}' | Select-Object -Property Subject, Thumbprint, @{Name='PfxPath';Expression={'${pfxPath}'}} | ConvertTo-Json`);
|
|
175
|
+
const result = await spawnAsync('powershell', psCommandArgs, { stdio: 'pipe' });
|
|
176
|
+
throwIfSpawnResultError(result);
|
|
177
|
+
const json = result.stdout.trim();
|
|
178
|
+
const parsedJson = JSON.parse(json);
|
|
179
|
+
const certInfo = {
|
|
180
|
+
subject: parsedJson.Subject,
|
|
181
|
+
thumbprint: parsedJson.Thumbprint,
|
|
182
|
+
pfxPath: parsedJson.PfxPath
|
|
183
|
+
};
|
|
184
|
+
return certInfo;
|
|
108
185
|
}
|
|
109
186
|
/**
|
|
110
187
|
* Does not actually do anything - just outputs the manual instructions for installing a cert for use by chrome on linux.
|
|
@@ -114,32 +191,12 @@ export function linuxInstallCert() {
|
|
|
114
191
|
Manual Instructions:
|
|
115
192
|
- In Chrome, go to chrome://settings/certificates
|
|
116
193
|
- Select Authorities -> import
|
|
117
|
-
- Select your generated .crt file (in the ./cert/ directory by default - if you haven't generated it, see the generateCertWithOpenSsl
|
|
194
|
+
- Select your generated .crt file (in the ./cert/ directory by default - if you haven't generated it, see the generateCertWithOpenSsl function)
|
|
118
195
|
- Check box for "Trust certificate for identifying websites"
|
|
119
196
|
- Click OK
|
|
120
197
|
- Reload site`;
|
|
121
198
|
console.log(instructions);
|
|
122
199
|
}
|
|
123
|
-
/**
|
|
124
|
-
* Uses Powershell to check if a cert is already installed to the local machine's trusted root store.
|
|
125
|
-
* @param urlOrSubject The url or subject of the cert to check. If the cert was installed with the winInstallCert method, this will be the url passed to that method.
|
|
126
|
-
* @returns `true` if the cert is already installed, `false` otherwise.
|
|
127
|
-
*/
|
|
128
|
-
export async function winCertAlreadyInstalled(urlOrSubject) {
|
|
129
|
-
const psCommand = `${powershellHackPrefix}Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -match '${urlOrSubject}' }`;
|
|
130
|
-
// The stdio option of 'pipe' is important here - if left to default of spawnAsync ('inherit'), stdout will be empty
|
|
131
|
-
const result = await nodeCliUtils.spawnAsync('powershell', ['-NoProfile', '-ExecutionPolicy', 'Bypass', '-Command', psCommand], { stdio: ['inherit', 'pipe', 'pipe'] });
|
|
132
|
-
if (result.code !== 0) {
|
|
133
|
-
throw Error(`powershell command to find installed cert failed with exit code ${result.code}`);
|
|
134
|
-
}
|
|
135
|
-
const lines = nodeCliUtils.stringToNonEmptyLines(result.stdout);
|
|
136
|
-
for (const line of lines) {
|
|
137
|
-
if (line.includes(urlOrSubject)) {
|
|
138
|
-
return true;
|
|
139
|
-
}
|
|
140
|
-
}
|
|
141
|
-
return false;
|
|
142
|
-
}
|
|
143
200
|
function throwIfMaybeBadUrlChars(url, varName = 'url') {
|
|
144
201
|
if (url.includes(' ')) {
|
|
145
202
|
throw Error(`${varName} should not contain spaces`);
|
|
@@ -152,7 +209,7 @@ function throwIfMaybeBadUrlChars(url, varName = 'url') {
|
|
|
152
209
|
}
|
|
153
210
|
}
|
|
154
211
|
function getBrewOpensslPath() {
|
|
155
|
-
const brewResult =
|
|
212
|
+
const brewResult = simpleSpawnSync('brew', ['--prefix', 'openssl']);
|
|
156
213
|
if (brewResult.error) {
|
|
157
214
|
throw Error('error attempting to find openssl installed by brew');
|
|
158
215
|
}
|
|
@@ -164,6 +221,36 @@ function getBrewOpensslPath() {
|
|
|
164
221
|
function getSanCnfFileContents(url) {
|
|
165
222
|
return sanCnfTemplate.replace(/{{url}}/g, url);
|
|
166
223
|
}
|
|
224
|
+
function validateSubject(subject) {
|
|
225
|
+
if (subject.includes('\\') || subject.includes('/') || subject.endsWith('.pfx')) {
|
|
226
|
+
throw new Error(`The subject appears to be a file path, which is not allowed. Did you mean to pass something like this instead: { pfxPath: '${subject}' } ?`);
|
|
227
|
+
}
|
|
228
|
+
validateNoQuotes('subject', subject);
|
|
229
|
+
}
|
|
230
|
+
function validateNoQuotes(name, value) {
|
|
231
|
+
if (value.includes("'") || value.includes('"')) {
|
|
232
|
+
throw new Error(`The value passed for '${name}' contains a single or double quote, which is not allowed.`);
|
|
233
|
+
}
|
|
234
|
+
}
|
|
235
|
+
function throwIfSpawnResultError(result) {
|
|
236
|
+
if (result.code !== 0) {
|
|
237
|
+
// There won't be any stderr if stdio was set to 'inherit', so we're checking first
|
|
238
|
+
if (result.stderr) {
|
|
239
|
+
console.error(red('Error:'), result.stderr);
|
|
240
|
+
}
|
|
241
|
+
throw Error(`Spawned command failed with exit code ${result.code}`);
|
|
242
|
+
}
|
|
243
|
+
}
|
|
244
|
+
function validatePfxPath(pfxPath) {
|
|
245
|
+
if (!pfxPath.endsWith('.pfx')) {
|
|
246
|
+
throw new Error('pfxPath must end with .pfx');
|
|
247
|
+
}
|
|
248
|
+
requireValidPath('pfxPath', pfxPath);
|
|
249
|
+
validateNoQuotes('pfxPath', pfxPath);
|
|
250
|
+
}
|
|
251
|
+
function getRequiresElevatedPermissionsMessage(isInstall = true) {
|
|
252
|
+
return `${Emoji.Info} Important: ${isInstall ? '' : 'un'}installing a certificate requires elevated permissions`;
|
|
253
|
+
}
|
|
167
254
|
// Newer cert requirements force the need for "extension info" with DNS and IP info, but openssl v1.x doesn't support that with the
|
|
168
255
|
// CLI option -addext, so we're using a san.cnf file instead and passing this into the CLI command with the -config option.
|
|
169
256
|
const sanCnfTemplate = `[req]
|
|
@@ -182,4 +269,4 @@ DNS.1 = {{url}}
|
|
|
182
269
|
IP.1 = 127.0.0.1
|
|
183
270
|
|
|
184
271
|
`;
|
|
185
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
272
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certUtils.js","sourceRoot":"","sources":["../../src/certUtils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,SAAS,CAAA;AACxB,OAAO,GAAG,MAAM,kBAAkB,CAAA;AAClC,OAAO,IAAI,MAAM,WAAW,CAAA;AAC5B,OAAO,EACL,KAAK,EAGL,eAAe,EACf,qBAAqB,EACrB,aAAa,EACb,iBAAiB,EACjB,KAAK,EACL,aAAa,EACb,gBAAgB,EAChB,eAAe,EACf,UAAU,EACV,qBAAqB,EACrB,SAAS,EACV,MAAM,mBAAmB,CAAA;AAC1B,OAAO,EAAE,GAAG,EAAE,MAAM,aAAa,CAAA;AAejC,MAAM,qBAAqB,GAAmB;IAC5C,cAAc,EAAE,KAAK;IACrB,gBAAgB,EAAE,KAAK;IACvB,6BAA6B,EAAE,IAAI;IACnC,UAAU,EAAE,IAAI;CACjB,CAAA;AAWD;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,uBAAuB,CAAC,GAAW,EAAE,OAAsC;IAC/F,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAA;IACzB,uBAAuB,CAAC,GAAG,CAAC,CAAA;IAC5B,MAAM,KAAK,GAAG,aAAa,EAAE,CAAA;IAE7B,MAAM,aAAa,GAAwB,EAAE,GAAG,qBAAqB,EAAE,eAAe,EAAE,QAAQ,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9G,MAAM,SAAS,GAAmC,EAAE,GAAG,EAAE,aAAa,CAAC,eAAe,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAA;IAElJ,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,kCAAkC,CAAC,CAAA;IAEzE,IAAI,eAAe,GAAW,EAAE,CAAA;IAChC,IAAI,CAAC,KAAK,EAAE;QACV,MAAM,WAAW,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC,QAAQ,CAAA;QACjD,IAAI,CAAC,WAAW,EAAE;YAChB,MAAM,KAAK,CAAC,uCAAuC,CAAC,CAAA;SACrD;QACD,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,WAAW,EAAE,CAAC,CAAA;KAC1E;SAAM,IAAI,KAAK,EAAE;QAChB,MAAM,oBAAoB,GAAG,kBAAkB,EAAE,CAAA;QACjD,IAAI,CAAC,oBAAoB,EAAE;YACzB,MAAM,KAAK,CAAC,sDAAsD,CAAC,CAAA;SACpE;QACD,eAAe,GAAG,GAAG,kBAAkB,EAAE,cAAc,CAAA;QACvD,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,eAAe,CAAC,EAAE;YACnC,MAAM,KAAK,CAAC,4DAA4D,eAAe,EAAE,CAAC,CAAA;SAC3F;aAAM;YACL,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,eAAe,EAAE,CAAC,CAAA;SAC9E;KACF;IAED,eAAe,CAAC,aAAa,CAAC,eAAe,CAAC,CAAA;IAC9C,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,UAAU,GAAG,GAAG,GAAG,MAAM,CAAA;IAE/B,MAAM,YAAY,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,UAAU,CAAC,CAAA;IAC5D,KAAK,MAAM,IAAI,IAAI,YAAY,EAAE;QAC/B,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,CAAA;QAC/D,IAAI,EAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE;YAC3B,MAAM,KAAK,CAAC,GAAG,KAAK,CAAC,IAAI,SAAS,QAAQ,sEAAsE,aAAa,CAAC,eAAe,yCAAyC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;SAClN;KACF;IAED,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,WAAW,UAAU,oCAAoC,CAAC,CAAA;IAChG,MAAM,cAAc,GAAG,qBAAqB,CAAC,GAAG,CAAC,CAAA;IACjD,MAAM,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,UAAU,CAAC,CAAA;IACvE,MAAM,GAAG,CAAC,SAAS,CAAC,UAAU,EAAE,cAAc,CAAC,CAAA;IAE/C,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,+BAA+B,OAAO,EAAE,CAAC,CAAA;IAC/E,MAAM,gBAAgB,GAAG,gEAAgE,OAAO,SAAS,OAAO,cAAc,GAAG,YAAY,UAAU,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IACpK,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAA;IACnD,IAAI,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,EAAE,gBAAgB,EAAE,SAAS,CAAC,CAAA;IACnE,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,+BAA+B,CAAC,CAAA;IACtE,MAAM,gBAAgB,GAAG,4CAA4C,OAAO,mBAAmB,OAAO,QAAQ,OAAO,kBAAkB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IAClJ,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,EAAE,gBAAgB,EAAE,SAAS,CAAC,CAAA;IAC/D,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,OAAO,CAAC,CAAA;IAEjE,KAAK,CAAC,aAAa,CAAC,UAAU,EAAE,GAAG,KAAK,CAAC,UAAU,iCAAiC,OAAO,EAAE,CAAC,CAAA;IAE9F,OAAO,OAAO,CAAA;AAChB,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,cAAc,CAAC,OAAe,EAAE,OAAiC;IACrF,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,KAAK,CAAC,6CAA6C,CAAC,CAAA;KAC3D;IACD,eAAe,CAAC,OAAO,CAAC,CAAA;IAExB,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,KAAK,CAAC,aAAa,CAAC,6BAA6B,EAAE,qCAAqC,CAAC,IAAI,CAAC,CAAC,CAAA;IAE/F,IAAI,MAAM,kBAAkB,CAAC,EAAE,OAAO,EAAE,EAAE,aAAa,CAAC,EAAE;QACxD,MAAM,QAAQ,GAAG,MAAM,aAAa,CAAC,OAAO,CAAC,CAAA;QAC7C,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,GAAG,KAAK,CAAC,OAAO,iBAAiB,OAAO,mBAAmB,QAAQ,CAAC,OAAO,iHAAiH,CAAC,CAAA;QACnO,OAAM;KACP;IAED,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,oBAAoB,OAAO,GAAG,CAAC,CAAA;IAErE,MAAM,aAAa,GAAG,qBAAqB,CAAC,oCAAoC,OAAO,gDAAgD,CAAC,CAAA;IACxI,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAA;IAE1H,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,KAAK,CAAC,aAAa,CAAC,UAAU,EAAE,GAAG,KAAK,CAAC,UAAU,iCAAiC,OAAO,EAAE,CAAC,CAAA;AAChG,CAAC;AAED;;;;;;;GAOG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,UAA2C,EAAE,OAAiC;IACrH,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAA;KACnE;IAED,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,IAAI,aAAa,CAAA;IAEjB,4FAA4F;IAC5F,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE;QAClC,aAAa,CAAC,SAAS,EAAE,UAAU,CAAC,CAAA;QACpC,eAAe,CAAC,UAAU,CAAC,CAAA;QAC3B,MAAM,OAAO,GAAG,UAAU,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,MAAM,UAAU,EAAE,CAAA;QAC9E,aAAa,GAAG,qBAAqB,CAAC,wFAAwF,OAAO,6BAA6B,CAAC,CAAA;KACpK;SAAM,IAAI,SAAS,IAAI,UAAU,EAAE;QAClC,eAAe,CAAC,UAAU,CAAC,OAAO,CAAC,CAAA;QACnC,aAAa,GAAG,qBAAqB,CAAC,sHAAsH,UAAU,CAAC,OAAO,sCAAsC,CAAC,CAAA;KACtN;IAED,MAAM,SAAS,GAAG,CAAC,OAAO,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,WAAW,UAAU,EAAE,CAAC,CAAC,CAAC,WAAW,UAAU,CAAC,OAAO,EAAE,CAAA;IAC9G,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,yBAAyB,SAAS,uBAAuB,CAAC,CAAA;IAEhG,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC,CAAA;IAE/E,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,KAAK,GAAG,qBAAqB,CAAC,MAAM,CAAC,MAAM,CAAC,CAAA;IAElD,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE;QACtB,MAAM,IAAI,KAAK,CAAC,wFAAwF,MAAM,CAAC,MAAM,EAAE,CAAC,CAAA;KACzH;IAED,OAAO,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,KAAK,GAAG,CAAA;AAChC,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,UAA0B,EAAE,OAAiC;IAClG,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAA;KACjE;IAED,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,KAAK,CAAC,aAAa,CAAC,6BAA6B,EAAE,qCAAqC,CAAC,KAAK,CAAC,CAAC,CAAA;IAEhG,IAAI,aAAa,CAAA;IAEjB,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE;QAClC,aAAa,CAAC,SAAS,EAAE,UAAU,CAAC,CAAA;QACpC,eAAe,CAAC,UAAU,CAAC,CAAA;QAC3B,aAAa,GAAG,qBAAqB,CAAC,+EAA+E,UAAU,mBAAmB,CAAC,CAAA;KACpJ;SAAM,IAAI,YAAY,IAAI,UAAU,EAAE;QACrC,gBAAgB,CAAC,YAAY,EAAE,UAAU,CAAC,UAAU,CAAC,CAAA;QACrD,aAAa,GAAG,qBAAqB,CAAC,+EAA+E,UAAU,CAAC,UAAU,mBAAmB,CAAC,CAAA;KAC/J;SAAM,IAAI,SAAS,IAAI,UAAU,EAAE;QAClC,eAAe,CAAC,UAAU,CAAC,OAAO,CAAC,CAAA;QACnC,aAAa,GAAG,qBAAqB,CAAC,gDAAgD,UAAU,CAAC,OAAO,uHAAuH,CAAC,CAAA;KACjO;IAED,MAAM,SAAS,GAAG,OAAO,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,IAAI,UAAU,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,CAAA;IACjG,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,SAAS,EAAE,CAAC,CAAA;IAEvE,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAA;IAE1H,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,KAAK,CAAC,aAAa,CAAC,UAAU,EAAE,GAAG,KAAK,CAAC,UAAU,gCAAgC,CAAC,CAAA;AACtF,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,aAAa,CAAC,OAAe;IACjD,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAA;KAC9D;IACD,eAAe,CAAC,OAAO,CAAC,CAAA;IAExB,MAAM,aAAa,GAAG,qBAAqB,CAAC,iCAAiC,OAAO,kFAAkF,OAAO,sBAAsB,CAAC,CAAA;IACpM,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC,CAAA;IAE/E,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,IAAI,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CAAA;IACjC,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAA;IAEnC,MAAM,QAAQ,GAAa;QACzB,OAAO,EAAE,UAAU,CAAC,OAAO;QAC3B,UAAU,EAAE,UAAU,CAAC,UAAU;QACjC,OAAO,EAAE,UAAU,CAAC,OAAO;KAC5B,CAAA;IAED,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,gBAAgB;IAC9B,MAAM,YAAY,GAAG;;;;;;;cAOT,CAAA;IACZ,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAA;AAC3B,CAAC;AAED,SAAS,uBAAuB,CAAC,GAAW,EAAE,OAAO,GAAG,KAAK;IAC3D,IAAI,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACrB,MAAM,KAAK,CAAC,GAAG,OAAO,4BAA4B,CAAC,CAAA;KACpD;IACD,IAAI,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACrB,MAAM,KAAK,CAAC,GAAG,OAAO,qCAAqC,CAAC,CAAA;KAC7D;IACD,IAAI,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE;QACtB,MAAM,KAAK,CAAC,GAAG,OAAO,iCAAiC,CAAC,CAAA;KACzD;AACH,CAAC;AAED,SAAS,kBAAkB;IACzB,MAAM,UAAU,GAAG,eAAe,CAAC,MAAM,EAAE,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC,CAAA;IACnE,IAAI,UAAU,CAAC,KAAK,EAAE;QACpB,MAAM,KAAK,CAAC,oDAAoD,CAAC,CAAA;KAClE;IACD,IAAI,UAAU,CAAC,WAAW,CAAC,MAAM,KAAK,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE;QAC5E,MAAM,IAAI,KAAK,CAAC,gEAAgE,UAAU,CAAC,MAAM,EAAE,CAAC,CAAA;KACrG;IACD,OAAO,UAAU,CAAC,WAAW,CAAC,CAAC,CAAC,CAAA;AAClC,CAAC;AAED,SAAS,qBAAqB,CAAC,GAAW;IACxC,OAAO,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,GAAG,CAAC,CAAA;AAChD,CAAC;AAED,SAAS,eAAe,CAAC,OAAe;IACtC,IAAI,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;QAC/E,MAAM,IAAI,KAAK,CAAC,8HAA8H,OAAO,OAAO,CAAC,CAAA;KAC9J;IACD,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;AACtC,CAAC;AAED,SAAS,gBAAgB,CAAC,IAAY,EAAE,KAAa;IACnD,IAAI,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QAC9C,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,4DAA4D,CAAC,CAAA;KAC3G;AACH,CAAC;AAED,SAAS,uBAAuB,CAAC,MAAmB;IAClD,IAAI,MAAM,CAAC,IAAI,KAAK,CAAC,EAAE;QACrB,mFAAmF;QACnF,IAAI,MAAM,CAAC,MAAM,EAAE;YACjB,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC,MAAM,CAAC,CAAA;SAC5C;QACD,MAAM,KAAK,CAAC,yCAAyC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAA;KACpE;AACH,CAAC;AAED,SAAS,eAAe,CAAC,OAAe;IACtC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;QAC7B,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAA;KAC9C;IACD,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;IACpC,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;AACtC,CAAC;AAED,SAAS,qCAAqC,CAAC,SAAS,GAAG,IAAI;IAC7D,OAAO,GAAG,KAAK,CAAC,IAAI,eAAe,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,wDAAwD,CAAA;AAClH,CAAC;AAED,mIAAmI;AACnI,2HAA2H;AAC3H,MAAM,cAAc,GAAG;;;;;;;;;;;;;;;CAetB,CAAA"}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
export declare enum AnsiColor {
|
|
2
|
+
RESET = "\u001B[0m",
|
|
3
|
+
RED = "\u001B[31m",
|
|
4
|
+
GREEN = "\u001B[32m",
|
|
5
|
+
YELLOW = "\u001B[33m",
|
|
6
|
+
CYAN = "\u001B[96m",
|
|
7
|
+
GRAY = "\u001B[90m",
|
|
8
|
+
PURPLE = "\u001B[35m"
|
|
9
|
+
}
|
|
10
|
+
export declare const color: (str: string, colorAnsiCode: AnsiColor) => string;
|
|
11
|
+
export declare const red: (str: string) => string;
|
|
12
|
+
export declare const green: (str: string) => string;
|
|
13
|
+
export declare const cyan: (str: string) => string;
|
|
14
|
+
export declare const gray: (str: string) => string;
|
|
15
|
+
export declare const purple: (str: string) => string;
|
|
16
|
+
export declare const yellow: (str: string) => string;
|
|
17
|
+
//# sourceMappingURL=colors.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"colors.d.ts","sourceRoot":"","sources":["../../src/colors.ts"],"names":[],"mappings":"AAAA,oBAAY,SAAS;IACnB,KAAK,cAAY;IACjB,GAAG,eAAa;IAChB,KAAK,eAAa;IAClB,MAAM,eAAa;IACnB,IAAI,eAAa;IACjB,IAAI,eAAa;IACjB,MAAM,eAAa;CACpB;AAED,eAAO,MAAM,KAAK,QAAS,MAAM,iBAAiB,SAAS,KAAG,MAE7D,CAAA;AAED,eAAO,MAAM,GAAG,QAAS,MAAM,WAA8B,CAAA;AAC7D,eAAO,MAAM,KAAK,QAAS,MAAM,WAAgC,CAAA;AACjE,eAAO,MAAM,IAAI,QAAS,MAAM,WAA+B,CAAA;AAC/D,eAAO,MAAM,IAAI,QAAS,MAAM,WAA+B,CAAA;AAC/D,eAAO,MAAM,MAAM,QAAS,MAAM,WAAiC,CAAA;AACnE,eAAO,MAAM,MAAM,QAAS,MAAM,WAAiC,CAAA"}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
export var AnsiColor;
|
|
2
|
+
(function (AnsiColor) {
|
|
3
|
+
AnsiColor["RESET"] = "\u001B[0m";
|
|
4
|
+
AnsiColor["RED"] = "\u001B[31m";
|
|
5
|
+
AnsiColor["GREEN"] = "\u001B[32m";
|
|
6
|
+
AnsiColor["YELLOW"] = "\u001B[33m";
|
|
7
|
+
AnsiColor["CYAN"] = "\u001B[96m";
|
|
8
|
+
AnsiColor["GRAY"] = "\u001B[90m";
|
|
9
|
+
AnsiColor["PURPLE"] = "\u001B[35m";
|
|
10
|
+
})(AnsiColor || (AnsiColor = {}));
|
|
11
|
+
export const color = (str, colorAnsiCode) => {
|
|
12
|
+
return `${colorAnsiCode}${str}${AnsiColor.RESET}`;
|
|
13
|
+
};
|
|
14
|
+
export const red = (str) => color(str, AnsiColor.RED);
|
|
15
|
+
export const green = (str) => color(str, AnsiColor.GREEN);
|
|
16
|
+
export const cyan = (str) => color(str, AnsiColor.CYAN);
|
|
17
|
+
export const gray = (str) => color(str, AnsiColor.GRAY);
|
|
18
|
+
export const purple = (str) => color(str, AnsiColor.PURPLE);
|
|
19
|
+
export const yellow = (str) => color(str, AnsiColor.YELLOW);
|
|
20
|
+
//# sourceMappingURL=data:application/json;base64,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
|