@php-wasm/web 3.0.22 → 3.0.33
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/index.cjs +14 -13
- package/index.cjs.map +1 -1
- package/index.js +535 -489
- package/index.js.map +1 -1
- package/lib/extensions/intl/get-intl-extension-module.d.ts +11 -0
- package/lib/extensions/intl/with-intl.d.ts +2 -0
- package/lib/firewall-interference-error.d.ts +13 -0
- package/lib/get-php-loader-module.d.ts +6 -1
- package/lib/index.d.ts +1 -0
- package/lib/load-runtime.d.ts +1 -1
- package/lib/test-utils/generate-certificate.d.ts +6 -0
- package/package.json +20 -9
- package/{php/asyncify/8_4_14/php_8_4.wasm → shared/icu.dat} +0 -0
- package/test/playwright/globals.d.ts +1 -0
- package/test/playwright/reporter.d.ts +6 -0
- package/lib/with-icu-data.d.ts +0 -2
- package/php/asyncify/7_0_33/php_7_0.wasm +0 -0
- package/php/asyncify/7_1_30/php_7_1.wasm +0 -0
- package/php/asyncify/7_2_34/php_7_2.wasm +0 -0
- package/php/asyncify/7_3_33/php_7_3.wasm +0 -0
- package/php/asyncify/7_4_33/php_7_4.wasm +0 -0
- package/php/asyncify/8_0_30/php_8_0.wasm +0 -0
- package/php/asyncify/8_1_33/php_8_1.wasm +0 -0
- package/php/asyncify/8_2_29/php_8_2.wasm +0 -0
- package/php/asyncify/8_3_27/php_8_3.wasm +0 -0
- package/php/asyncify/php_7_0.js +0 -79
- package/php/asyncify/php_7_1.js +0 -79
- package/php/asyncify/php_7_2.js +0 -112
- package/php/asyncify/php_7_3.js +0 -112
- package/php/asyncify/php_7_4.js +0 -112
- package/php/asyncify/php_8_0.js +0 -112
- package/php/asyncify/php_8_1.js +0 -112
- package/php/asyncify/php_8_2.js +0 -112
- package/php/asyncify/php_8_3.js +0 -112
- package/php/asyncify/php_8_4.js +0 -112
- package/php/jspi/7_0_33/php_7_0.wasm +0 -0
- package/php/jspi/7_1_30/php_7_1.wasm +0 -0
- package/php/jspi/7_2_34/php_7_2.wasm +0 -0
- package/php/jspi/7_3_33/php_7_3.wasm +0 -0
- package/php/jspi/7_4_33/php_7_4.wasm +0 -0
- package/php/jspi/8_0_30/php_8_0.wasm +0 -0
- package/php/jspi/8_1_33/php_8_1.wasm +0 -0
- package/php/jspi/8_2_29/php_8_2.wasm +0 -0
- package/php/jspi/8_3_27/php_8_3.wasm +0 -0
- package/php/jspi/8_4_14/php_8_4.wasm +0 -0
- package/php/jspi/php_7_0.js +0 -79
- package/php/jspi/php_7_1.js +0 -79
- package/php/jspi/php_7_2.js +0 -112
- package/php/jspi/php_7_3.js +0 -112
- package/php/jspi/php_7_4.js +0 -112
- package/php/jspi/php_8_0.js +0 -112
- package/php/jspi/php_8_1.js +0 -112
- package/php/jspi/php_8_2.js +0 -112
- package/php/jspi/php_8_3.js +0 -112
- package/php/jspi/php_8_4.js +0 -112
package/README.md
CHANGED
|
@@ -8,7 +8,7 @@ Here's how to use it:
|
|
|
8
8
|
import { PHP, PHPRequestHandler } from '@php-wasm/universal';
|
|
9
9
|
import { loadWebRuntime } from '@php-wasm/web';
|
|
10
10
|
|
|
11
|
-
// loadWebRuntime() calls import('php.wasm') and import('
|
|
11
|
+
// loadWebRuntime() calls import('php.wasm') and import('icu.dat') internally.
|
|
12
12
|
// Your bundler must resolve import('php.wasm') as a static file URL.
|
|
13
13
|
// If you use Webpack, you can use the file-loader to do so.
|
|
14
14
|
const php = new PHP(await loadWebRuntime('8.3'));
|
package/index.cjs
CHANGED
|
@@ -1,21 +1,22 @@
|
|
|
1
|
-
"use strict";var Le=Object.create;var j=Object.defineProperty;var me=Object.getOwnPropertyDescriptor;var ge=Object.getOwnPropertyNames;var Ke=Object.getPrototypeOf,Ie=Object.prototype.hasOwnProperty;var De=(s,e,t,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of ge(e))!Ie.call(s,n)&&n!==t&&j(s,n,{get:()=>e[n],enumerable:!(r=me(e,n))||r.enumerable});return s};var H=(s,e,t)=>(t=s!=null?Le(Ke(s)):{},De(e||!s||!s.__esModule?j(t,"default",{value:s,enumerable:!0}):t,s));Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const f=require("@php-wasm/universal"),We=require("wasm-feature-detect"),A=require("@php-wasm/util"),B=require("@php-wasm/logger"),G=require("@php-wasm/web-service-worker"),$=require("@php-wasm/fs-journal");async function ae(s=f.LatestSupportedPHPVersion){if(await We.jspi())switch(s){case"8.4":return await import("./php/jspi/php_8_4.js");case"8.3":return await import("./php/jspi/php_8_3.js");case"8.2":return await import("./php/jspi/php_8_2.js");case"8.1":return await import("./php/jspi/php_8_1.js");case"8.0":return await import("./php/jspi/php_8_0.js");case"7.4":return await import("./php/jspi/php_7_4.js");case"7.3":return await import("./php/jspi/php_7_3.js");case"7.2":return await import("./php/jspi/php_7_2.js")}else switch(s){case"8.4":return await import("./php/asyncify/php_8_4.js");case"8.3":return await import("./php/asyncify/php_8_3.js");case"8.2":return await import("./php/asyncify/php_8_2.js");case"8.1":return await import("./php/asyncify/php_8_1.js");case"8.0":return await import("./php/asyncify/php_8_0.js");case"7.4":return await import("./php/asyncify/php_7_4.js");case"7.3":return await import("./php/asyncify/php_7_3.js");case"7.2":return await import("./php/asyncify/php_7_2.js")}throw new Error(`Unsupported PHP version ${s}`)}function w(s){return Object.fromEntries(Object.entries(s).map(([e,t])=>[t,e]))}function D(s){return new Uint8Array([s>>8&255,s&255])}function L(s){return new Uint8Array([s>>16&255,s>>8&255,s&255])}function V(s){const e=new ArrayBuffer(8);return new DataView(e).setBigUint64(0,BigInt(s),!1),new Uint8Array(e)}class g{constructor(e){this.offset=0,this.buffer=e,this.view=new DataView(e)}readUint8(){const e=this.view.getUint8(this.offset);return this.offset+=1,e}readUint16(){const e=this.view.getUint16(this.offset);return this.offset+=2,e}readUint32(){const e=this.view.getUint32(this.offset);return this.offset+=4,e}readUint8Array(e){const t=this.buffer.slice(this.offset,this.offset+e);return this.offset+=e,new Uint8Array(t)}isFinished(){return this.offset>=this.buffer.byteLength}}class v{constructor(e){this.offset=0,this.buffer=new ArrayBuffer(e),this.uint8Array=new Uint8Array(this.buffer),this.view=new DataView(this.buffer)}writeUint8(e){this.view.setUint8(this.offset,e),this.offset+=1}writeUint16(e){this.view.setUint16(this.offset,e),this.offset+=2}writeUint32(e){this.view.setUint32(this.offset,e),this.offset+=4}writeUint8Array(e){this.uint8Array.set(e,this.offset),this.offset+=e.length}}const R={server_name:0,max_fragment_length:1,client_certificate_url:2,trusted_ca_keys:3,truncated_hmac:4,status_request:5,user_mapping:6,client_authz:7,server_authz:8,cert_type:9,supported_groups:10,ec_point_formats:11,srp:12,signature_algorithms:13,use_srtp:14,heartbeat:15,application_layer_protocol_negotiation:16,status_request_v2:17,signed_certificate_timestamp:18,client_certificate_type:19,server_certificate_type:20,padding:21,encrypt_then_mac:22,extended_master_secret:23,token_binding:24,cached_info:25,tls_its:26,compress_certificate:27,record_size_limit:28,pwd_protect:29,pwo_clear:30,password_salt:31,ticket_pinning:32,tls_cert_with_extern_psk:33,delegated_credential:34,session_ticket:35,TLMSP:36,TLMSP_proxying:37,TLMSP_delegate:38,supported_ekt_ciphers:39,pre_shared_key:41,early_data:42,supported_versions:43,cookie:44,psk_key_exchange_modes:45,reserved:46,certificate_authorities:47,oid_filters:48,post_handshake_auth:49,signature_algorithms_cert:50,key_share:51,transparency_info:52,connection_id:54},be=w(R),_e={host_name:0},Re=w(_e);class oe{static decodeFromClient(e){const t=new DataView(e.buffer);let r=0;const n=t.getUint16(r);r+=2;const i=[];for(;r<n+2;){const a=e[r];r+=1;const _=t.getUint16(r);r+=2;const c=e.slice(r,r+_);switch(r+=_,a){case _e.host_name:i.push({name_type:Re[a],name:{host_name:new TextDecoder().decode(c)}});break;default:throw new Error(`Unsupported name type ${a}`)}}return{server_name_list:i}}static encodeForClient(e){if(e!=null&&e.server_name_list.length)throw new Error("Encoding non-empty lists for ClientHello is not supported yet. Only empty lists meant for ServerHello are supported today.");const t=new v(4);return t.writeUint16(R.server_name),t.writeUint16(0),t.uint8Array}}const ce={TLS1_CK_PSK_WITH_RC4_128_SHA:138,TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA:139,TLS1_CK_PSK_WITH_AES_128_CBC_SHA:140,TLS1_CK_PSK_WITH_AES_256_CBC_SHA:141,TLS1_CK_DHE_PSK_WITH_RC4_128_SHA:142,TLS1_CK_DHE_PSK_WITH_3DES_EDE_CBC_SHA:143,TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA:144,TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA:145,TLS1_CK_RSA_PSK_WITH_RC4_128_SHA:146,TLS1_CK_RSA_PSK_WITH_3DES_EDE_CBC_SHA:147,TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA:148,TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA:149,TLS1_CK_PSK_WITH_AES_128_GCM_SHA256:168,TLS1_CK_PSK_WITH_AES_256_GCM_SHA384:169,TLS1_CK_DHE_PSK_WITH_AES_128_GCM_SHA256:170,TLS1_CK_DHE_PSK_WITH_AES_256_GCM_SHA384:171,TLS1_CK_RSA_PSK_WITH_AES_128_GCM_SHA256:172,TLS1_CK_RSA_PSK_WITH_AES_256_GCM_SHA384:173,TLS1_CK_PSK_WITH_AES_128_CBC_SHA256:174,TLS1_CK_PSK_WITH_AES_256_CBC_SHA384:175,TLS1_CK_PSK_WITH_NULL_SHA256:176,TLS1_CK_PSK_WITH_NULL_SHA384:177,TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA256:178,TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA384:179,TLS1_CK_DHE_PSK_WITH_NULL_SHA256:180,TLS1_CK_DHE_PSK_WITH_NULL_SHA384:181,TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA256:182,TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA384:183,TLS1_CK_RSA_PSK_WITH_NULL_SHA256:184,TLS1_CK_RSA_PSK_WITH_NULL_SHA384:185,TLS1_CK_PSK_WITH_NULL_SHA:44,TLS1_CK_DHE_PSK_WITH_NULL_SHA:45,TLS1_CK_RSA_PSK_WITH_NULL_SHA:46,TLS1_CK_RSA_WITH_AES_128_SHA:47,TLS1_CK_DH_DSS_WITH_AES_128_SHA:48,TLS1_CK_DH_RSA_WITH_AES_128_SHA:49,TLS1_CK_DHE_DSS_WITH_AES_128_SHA:50,TLS1_CK_DHE_RSA_WITH_AES_128_SHA:51,TLS1_CK_ADH_WITH_AES_128_SHA:52,TLS1_CK_RSA_WITH_AES_256_SHA:53,TLS1_CK_DH_DSS_WITH_AES_256_SHA:54,TLS1_CK_DH_RSA_WITH_AES_256_SHA:55,TLS1_CK_DHE_DSS_WITH_AES_256_SHA:56,TLS1_CK_DHE_RSA_WITH_AES_256_SHA:57,TLS1_CK_ADH_WITH_AES_256_SHA:58,TLS1_CK_RSA_WITH_NULL_SHA256:59,TLS1_CK_RSA_WITH_AES_128_SHA256:60,TLS1_CK_RSA_WITH_AES_256_SHA256:61,TLS1_CK_DH_DSS_WITH_AES_128_SHA256:62,TLS1_CK_DH_RSA_WITH_AES_128_SHA256:63,TLS1_CK_DHE_DSS_WITH_AES_128_SHA256:64,TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA:65,TLS1_CK_DH_DSS_WITH_CAMELLIA_128_CBC_SHA:66,TLS1_CK_DH_RSA_WITH_CAMELLIA_128_CBC_SHA:67,TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA:68,TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA:69,TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA:70,TLS1_CK_DHE_RSA_WITH_AES_128_SHA256:103,TLS1_CK_DH_DSS_WITH_AES_256_SHA256:104,TLS1_CK_DH_RSA_WITH_AES_256_SHA256:105,TLS1_CK_DHE_DSS_WITH_AES_256_SHA256:106,TLS1_CK_DHE_RSA_WITH_AES_256_SHA256:107,TLS1_CK_ADH_WITH_AES_128_SHA256:108,TLS1_CK_ADH_WITH_AES_256_SHA256:109,TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA:132,TLS1_CK_DH_DSS_WITH_CAMELLIA_256_CBC_SHA:133,TLS1_CK_DH_RSA_WITH_CAMELLIA_256_CBC_SHA:134,TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA:135,TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA:136,TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA:137,TLS1_CK_RSA_WITH_SEED_SHA:150,TLS1_CK_DH_DSS_WITH_SEED_SHA:151,TLS1_CK_DH_RSA_WITH_SEED_SHA:152,TLS1_CK_DHE_DSS_WITH_SEED_SHA:153,TLS1_CK_DHE_RSA_WITH_SEED_SHA:154,TLS1_CK_ADH_WITH_SEED_SHA:155,TLS1_CK_RSA_WITH_AES_128_GCM_SHA256:156,TLS1_CK_RSA_WITH_AES_256_GCM_SHA384:157,TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256:158,TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384:159,TLS1_CK_DH_RSA_WITH_AES_128_GCM_SHA256:160,TLS1_CK_DH_RSA_WITH_AES_256_GCM_SHA384:161,TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256:162,TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384:163,TLS1_CK_DH_DSS_WITH_AES_128_GCM_SHA256:164,TLS1_CK_DH_DSS_WITH_AES_256_GCM_SHA384:165,TLS1_CK_ADH_WITH_AES_128_GCM_SHA256:166,TLS1_CK_ADH_WITH_AES_256_GCM_SHA384:167,TLS1_CK_RSA_WITH_AES_128_CCM:49308,TLS1_CK_RSA_WITH_AES_256_CCM:49309,TLS1_CK_DHE_RSA_WITH_AES_128_CCM:49310,TLS1_CK_DHE_RSA_WITH_AES_256_CCM:49311,TLS1_CK_RSA_WITH_AES_128_CCM_8:49312,TLS1_CK_RSA_WITH_AES_256_CCM_8:49313,TLS1_CK_DHE_RSA_WITH_AES_128_CCM_8:49314,TLS1_CK_DHE_RSA_WITH_AES_256_CCM_8:49315,TLS1_CK_PSK_WITH_AES_128_CCM:49316,TLS1_CK_PSK_WITH_AES_256_CCM:49317,TLS1_CK_DHE_PSK_WITH_AES_128_CCM:49318,TLS1_CK_DHE_PSK_WITH_AES_256_CCM:49319,TLS1_CK_PSK_WITH_AES_128_CCM_8:49320,TLS1_CK_PSK_WITH_AES_256_CCM_8:49321,TLS1_CK_DHE_PSK_WITH_AES_128_CCM_8:49322,TLS1_CK_DHE_PSK_WITH_AES_256_CCM_8:49323,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM:49324,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM:49325,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM_8:49326,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM_8:49327,TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA256:186,TLS1_CK_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256:187,TLS1_CK_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256:188,TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256:189,TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:190,TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA256:191,TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA256:192,TLS1_CK_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256:193,TLS1_CK_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256:194,TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256:195,TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256:196,TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA256:197,TLS1_CK_ECDH_ECDSA_WITH_NULL_SHA:49153,TLS1_CK_ECDH_ECDSA_WITH_RC4_128_SHA:49154,TLS1_CK_ECDH_ECDSA_WITH_DES_192_CBC3_SHA:49155,TLS1_CK_ECDH_ECDSA_WITH_AES_128_CBC_SHA:49156,TLS1_CK_ECDH_ECDSA_WITH_AES_256_CBC_SHA:49157,TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA:49158,TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA:49159,TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA:49160,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA:49161,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA:49162,TLS1_CK_ECDH_RSA_WITH_NULL_SHA:49163,TLS1_CK_ECDH_RSA_WITH_RC4_128_SHA:49164,TLS1_CK_ECDH_RSA_WITH_DES_192_CBC3_SHA:49165,TLS1_CK_ECDH_RSA_WITH_AES_128_CBC_SHA:49166,TLS1_CK_ECDH_RSA_WITH_AES_256_CBC_SHA:49167,TLS1_CK_ECDHE_RSA_WITH_NULL_SHA:49168,TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA:49169,TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA:49170,TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA:49171,TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA:49172,TLS1_CK_ECDH_anon_WITH_NULL_SHA:49173,TLS1_CK_ECDH_anon_WITH_RC4_128_SHA:49174,TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA:49175,TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA:49176,TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA:49177,TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA:49178,TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA:49179,TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA:49180,TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA:49181,TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA:49182,TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA:49183,TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA:49184,TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA:49185,TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA:49186,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256:49187,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384:49188,TLS1_CK_ECDH_ECDSA_WITH_AES_128_SHA256:49189,TLS1_CK_ECDH_ECDSA_WITH_AES_256_SHA384:49190,TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256:49191,TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384:49192,TLS1_CK_ECDH_RSA_WITH_AES_128_SHA256:49193,TLS1_CK_ECDH_RSA_WITH_AES_256_SHA384:49194,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:49195,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:49196,TLS1_CK_ECDH_ECDSA_WITH_AES_128_GCM_SHA256:49197,TLS1_CK_ECDH_ECDSA_WITH_AES_256_GCM_SHA384:49198,TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256:49199,TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384:49200,TLS1_CK_ECDH_RSA_WITH_AES_128_GCM_SHA256:49201,TLS1_CK_ECDH_RSA_WITH_AES_256_GCM_SHA384:49202,TLS1_CK_ECDHE_PSK_WITH_RC4_128_SHA:49203,TLS1_CK_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA:49204,TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA:49205,TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA:49206,TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA256:49207,TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA384:49208,TLS1_CK_ECDHE_PSK_WITH_NULL_SHA:49209,TLS1_CK_ECDHE_PSK_WITH_NULL_SHA256:49210,TLS1_CK_ECDHE_PSK_WITH_NULL_SHA384:49211,TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:49266,TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:49267,TLS1_CK_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:49268,TLS1_CK_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:49269,TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:49270,TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384:49271,TLS1_CK_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256:49272,TLS1_CK_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384:49273,TLS1_CK_PSK_WITH_CAMELLIA_128_CBC_SHA256:49300,TLS1_CK_PSK_WITH_CAMELLIA_256_CBC_SHA384:49301,TLS1_CK_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:49302,TLS1_CK_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:49303,TLS1_CK_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256:49304,TLS1_CK_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384:49305,TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:49306,TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:49307,TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305:52392,TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305:52393,TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305:52394,TLS1_CK_PSK_WITH_CHACHA20_POLY1305:52395,TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305:52396,TLS1_CK_DHE_PSK_WITH_CHACHA20_POLY1305:52397,TLS1_CK_RSA_PSK_WITH_CHACHA20_POLY1305:52398},z=w(ce),Se={secp256r1:23,secp384r1:24,secp521r1:25,x25519:29,x448:30},Y=w(Se);class Pe{static decodeFromClient(e){const t=new g(e.buffer);t.readUint16();const r=[];for(;!t.isFinished();){const n=t.readUint16();n in Y&&r.push(Y[n])}return r}static encodeForClient(e){const t=new v(6);return t.writeUint16(R.supported_groups),t.writeUint16(2),t.writeUint16(Se[e]),t.uint8Array}}const Ce={uncompressed:0,ansiX962_compressed_prime:1,ansiX962_compressed_char2:2},J=w(Ce);class Ue{static decodeFromClient(e){const t=new g(e.buffer),r=t.readUint8(),n=[];for(let i=0;i<r;i++){const a=t.readUint8();a in J&&n.push(J[a])}return n}static encodeForClient(e){const t=new v(6);return t.writeUint16(R.ec_point_formats),t.writeUint16(2),t.writeUint8(1),t.writeUint8(Ce[e]),t.uint8Array}}const O={anonymous:0,rsa:1,dsa:2,ecdsa:3},Z=w(O),F={none:0,md5:1,sha1:2,sha224:3,sha256:4,sha384:5,sha512:6},X=w(F);class Be{static decodeFromClient(e){const t=new g(e.buffer);t.readUint16();const r=[];for(;!t.isFinished();){const n=t.readUint8(),i=t.readUint8();if(Z[i]){if(!X[n]){B.logger.warn(`Unknown hash algorithm: ${n}`);continue}r.push({algorithm:Z[i],hash:X[n]})}}return r}static encodeforClient(e,t){const r=new v(6);return r.writeUint16(R.signature_algorithms),r.writeUint16(2),r.writeUint8(F[e]),r.writeUint8(O[t]),r.uint8Array}}const Q={server_name:oe,signature_algorithms:Be,supported_groups:Pe,ec_point_formats:Ue};function ve(s){const e=new g(s.buffer),t=[];for(;!e.isFinished();){const r=e.offset,n=e.readUint16(),i=be[n],a=e.readUint16(),_=e.readUint8Array(a);if(!(i in Q))continue;const c=Q[i];t.push({type:i,data:c.decodeFromClient(_),raw:s.slice(r,r+4+a)})}return t}async function k(s,e,t,r){const n=A.concatArrayBuffers([e,t]),i=await crypto.subtle.importKey("raw",s,{name:"HMAC",hash:{name:"SHA-256"}},!1,["sign"]);let a=n;const _=[];for(;A.concatArrayBuffers(_).byteLength<r;){a=await ee(i,a);const S=A.concatArrayBuffers([a,n]),h=await ee(i,S);_.push(h)}return A.concatArrayBuffers(_).slice(0,r)}async function ee(s,e){return await crypto.subtle.sign({name:"HMAC",hash:"SHA-256"},s,e)}const Me={Null:0},Ne={Warning:1,Fatal:2},Ae=w(Ne),xe={CloseNotify:0,UnexpectedMessage:10,BadRecordMac:20,DecryptionFailed:21,RecordOverflow:22,DecompressionFailure:30,HandshakeFailure:40,NoCertificate:41,BadCertificate:42,UnsupportedCertificate:43,CertificateRevoked:44,CertificateExpired:45,CertificateUnknown:46,IllegalParameter:47,UnknownCa:48,AccessDenied:49,DecodeError:50,DecryptError:51,ExportRestriction:60,ProtocolVersion:70,InsufficientSecurity:71,InternalError:80,UserCanceled:90,NoRenegotiation:100,UnsupportedExtension:110},he=w(xe),C={ChangeCipherSpec:20,Alert:21,Handshake:22,ApplicationData:23},E={HelloRequest:0,ClientHello:1,ServerHello:2,Certificate:11,ServerKeyExchange:12,ServerHelloDone:14,ClientKeyExchange:16,Finished:20},ke={NamedCurve:3},qe={secp256r1:23};class te extends Error{}const U=new Uint8Array([3,3]),Oe=crypto.subtle.generateKey({name:"ECDH",namedCurve:"P-256"},!0,["deriveKey","deriveBits"]);class Fe{constructor(){this.receivedRecordSequenceNumber=0,this.sentRecordSequenceNumber=0,this.closed=!1,this.receivedBytesBuffer=new Uint8Array,this.receivedTLSRecords=[],this.partialTLSMessages={},this.handshakeMessages=[],this.MAX_CHUNK_SIZE=1024*16,this.clientEnd={upstream:new TransformStream,downstream:new TransformStream},this.clientDownstreamWriter=this.clientEnd.downstream.writable.getWriter(),this.clientUpstreamReader=this.clientEnd.upstream.readable.getReader(),this.serverEnd={upstream:new TransformStream,downstream:je(this.MAX_CHUNK_SIZE)},this.serverUpstreamWriter=this.serverEnd.upstream.writable.getWriter();const e=this;this.serverEnd.downstream.readable.pipeTo(new WritableStream({async write(t){await e.writeTLSRecord(C.ApplicationData,t)},async abort(t){e.clientDownstreamWriter.releaseLock(),e.clientEnd.downstream.writable.abort(t),e.close()},close(){e.close()}})).catch(()=>{})}async close(){if(!this.closed){this.closed=!0;try{await this.clientDownstreamWriter.close()}catch{}try{await this.clientUpstreamReader.cancel()}catch{}try{await this.serverUpstreamWriter.close()}catch{}try{await this.clientEnd.upstream.readable.cancel()}catch{}try{await this.clientEnd.downstream.writable.close()}catch{}}}async TLSHandshake(e,t){const r=await this.readNextHandshakeMessage(E.ClientHello);if(!r.body.cipher_suites.length)throw new Error("Client did not propose any supported cipher suites.");const n=crypto.getRandomValues(new Uint8Array(32));await this.writeTLSRecord(C.Handshake,I.serverHello(r.body,n,Me.Null)),await this.writeTLSRecord(C.Handshake,I.certificate(t));const i=await Oe,a=r.body.random,_=await I.ECDHEServerKeyExchange(a,n,i,e);await this.writeTLSRecord(C.Handshake,_),await this.writeTLSRecord(C.Handshake,I.serverHelloDone());const c=await this.readNextHandshakeMessage(E.ClientKeyExchange);await this.readNextMessage(C.ChangeCipherSpec),this.sessionKeys=await this.deriveSessionKeys({clientRandom:a,serverRandom:n,serverPrivateKey:i.privateKey,clientPublicKey:await crypto.subtle.importKey("raw",c.body.exchange_keys,{name:"ECDH",namedCurve:"P-256"},!1,[])}),await this.readNextHandshakeMessage(E.Finished),await this.writeTLSRecord(C.ChangeCipherSpec,I.changeCipherSpec()),await this.writeTLSRecord(C.Handshake,await I.createFinishedMessage(this.handshakeMessages,this.sessionKeys.masterSecret)),this.handshakeMessages=[],this.pollForClientMessages()}async deriveSessionKeys({clientRandom:e,serverRandom:t,serverPrivateKey:r,clientPublicKey:n}){const i=await crypto.subtle.deriveBits({name:"ECDH",public:n},r,256),a=new Uint8Array(await k(i,new TextEncoder().encode("master secret"),A.concatUint8Arrays([e,t]),48)),_=await k(a,new TextEncoder().encode("key expansion"),A.concatUint8Arrays([t,e]),40),c=new g(_),S=c.readUint8Array(16),h=c.readUint8Array(16),l=c.readUint8Array(4),u=c.readUint8Array(4);return{masterSecret:a,clientWriteKey:await crypto.subtle.importKey("raw",S,{name:"AES-GCM"},!1,["encrypt","decrypt"]),serverWriteKey:await crypto.subtle.importKey("raw",h,{name:"AES-GCM"},!1,["encrypt","decrypt"]),clientIV:l,serverIV:u}}async readNextHandshakeMessage(e){const t=await this.readNextMessage(C.Handshake);if(t.msg_type!==e)throw new Error(`Expected ${e} message`);return t}async readNextMessage(e){let t,r=!1;do t=await this.readNextTLSRecord(e),r=await this.accumulateUntilMessageIsComplete(t);while(r===!1);const n=p.TLSMessage(t.type,r);return t.type===C.Handshake&&this.handshakeMessages.push(t.fragment),n}async readNextTLSRecord(e){for(;;){for(let _=0;_<this.receivedTLSRecords.length;_++){const c=this.receivedTLSRecords[_];if(c.type===e)return this.receivedTLSRecords.splice(_,1),c}const t=await this.pollBytes(5),r=t[3]<<8|t[4],n=t[0],i=await this.pollBytes(r),a={type:n,version:{major:t[1],minor:t[2]},length:r,fragment:this.sessionKeys&&n!==C.ChangeCipherSpec?await this.decryptData(n,i):i};if(a.type===C.Alert){const _=Ae[a.fragment[0]],c=he[a.fragment[1]];throw new Error(`TLS non-warning alert received: ${_} ${c}`)}this.receivedTLSRecords.push(a)}}async pollBytes(e){for(;this.receivedBytesBuffer.length<e;){const{value:r,done:n}=await this.clientUpstreamReader.read();if(n)throw await this.close(),new te("TLS connection closed");if(this.receivedBytesBuffer=A.concatUint8Arrays([this.receivedBytesBuffer,r]),this.receivedBytesBuffer.length>=e)break;await new Promise(i=>setTimeout(i,100))}const t=this.receivedBytesBuffer.slice(0,e);return this.receivedBytesBuffer=this.receivedBytesBuffer.slice(e),t}async pollForClientMessages(){try{for(;;){const e=await this.readNextMessage(C.ApplicationData);this.serverUpstreamWriter.write(e.body)}}catch(e){if(e instanceof te)return;throw e}}async decryptData(e,t){const r=this.sessionKeys.clientIV,n=t.slice(0,8),i=new Uint8Array([...r,...n]),a=await crypto.subtle.decrypt({name:"AES-GCM",iv:i,additionalData:new Uint8Array([...V(this.receivedRecordSequenceNumber),e,...U,...D(t.length-8-16)]),tagLength:128},this.sessionKeys.clientWriteKey,t.slice(8));return++this.receivedRecordSequenceNumber,new Uint8Array(a)}async accumulateUntilMessageIsComplete(e){this.partialTLSMessages[e.type]=A.concatUint8Arrays([this.partialTLSMessages[e.type]||new Uint8Array,e.fragment]);const t=this.partialTLSMessages[e.type];switch(e.type){case C.Handshake:{if(t.length<4)return!1;const r=t[1]<<8|t[2];if(t.length<3+r)return!1;break}case C.Alert:{if(t.length<2)return!1;break}case C.ChangeCipherSpec:case C.ApplicationData:break;default:throw new Error(`TLS: Unsupported record type ${e.type}`)}return delete this.partialTLSMessages[e.type],t}async writeTLSRecord(e,t){e===C.Handshake&&this.handshakeMessages.push(t),this.sessionKeys&&e!==C.ChangeCipherSpec&&(t=await this.encryptData(e,t));const r=U,n=t.length,i=new Uint8Array(5);i[0]=e,i[1]=r[0],i[2]=r[1],i[3]=n>>8&255,i[4]=n&255;const a=A.concatUint8Arrays([i,t]);this.clientDownstreamWriter.write(a)}async encryptData(e,t){const r=this.sessionKeys.serverIV,n=crypto.getRandomValues(new Uint8Array(8)),i=new Uint8Array([...r,...n]),a=new Uint8Array([...V(this.sentRecordSequenceNumber),e,...U,...D(t.length)]),_=await crypto.subtle.encrypt({name:"AES-GCM",iv:i,additionalData:a,tagLength:128},this.sessionKeys.serverWriteKey,t);return++this.sentRecordSequenceNumber,A.concatUint8Arrays([n,new Uint8Array(_)])}}class p{static TLSMessage(e,t){switch(e){case C.Handshake:return p.clientHandshake(t);case C.Alert:return p.alert(t);case C.ChangeCipherSpec:return p.changeCipherSpec();case C.ApplicationData:return p.applicationData(t);default:throw new Error(`TLS: Unsupported TLS record type ${e}`)}}static parseCipherSuites(e){const t=new g(e);t.readUint16();const r=[];for(;!t.isFinished();){const n=t.readUint16();n in z&&r.push(z[n])}return r}static applicationData(e){return{type:C.ApplicationData,body:e}}static changeCipherSpec(){return{type:C.ChangeCipherSpec,body:new Uint8Array}}static alert(e){return{type:C.Alert,level:Ae[e[0]],description:he[e[1]]}}static clientHandshake(e){const t=e[0],r=e[1]<<16|e[2]<<8|e[3],n=e.slice(4);let i;switch(t){case E.HelloRequest:i=p.clientHelloRequestPayload();break;case E.ClientHello:i=p.clientHelloPayload(n);break;case E.ClientKeyExchange:i=p.clientKeyExchangePayload(n);break;case E.Finished:i=p.clientFinishedPayload(n);break;default:throw new Error(`Invalid handshake type ${t}`)}return{type:C.Handshake,msg_type:t,length:r,body:i}}static clientHelloRequestPayload(){return{}}static clientHelloPayload(e){const t=new g(e.buffer),r={client_version:t.readUint8Array(2),random:t.readUint8Array(32)},n=t.readUint8();r.session_id=t.readUint8Array(n);const i=t.readUint16();r.cipher_suites=p.parseCipherSuites(t.readUint8Array(i).buffer);const a=t.readUint8();r.compression_methods=t.readUint8Array(a);const _=t.readUint16();return r.extensions=ve(t.readUint8Array(_)),r}static clientKeyExchangePayload(e){return{exchange_keys:e.slice(1,e.length)}}static clientFinishedPayload(e){return{verify_data:e}}}function je(s){return new TransformStream({transform(e,t){for(;e.length>0;)t.enqueue(e.slice(0,s)),e=e.slice(s)}})}class I{static certificate(e){const t=[];for(const i of e)t.push(L(i.byteLength)),t.push(new Uint8Array(i));const r=A.concatUint8Arrays(t),n=new Uint8Array([...L(r.byteLength),...r]);return new Uint8Array([E.Certificate,...L(n.length),...n])}static async ECDHEServerKeyExchange(e,t,r,n){const i=new Uint8Array(await crypto.subtle.exportKey("raw",r.publicKey)),a=new Uint8Array([ke.NamedCurve,...D(qe.secp256r1),i.byteLength,...i]),_=await crypto.subtle.sign({name:"RSASSA-PKCS1-v1_5",hash:"SHA-256"},n,new Uint8Array([...e,...t,...a])),c=new Uint8Array(_),S=new Uint8Array([F.sha256,O.rsa]),h=new Uint8Array([...a,...S,...D(c.length),...c]);return new Uint8Array([E.ServerKeyExchange,...L(h.length),...h])}static serverHello(e,t,r){const n=e.extensions.map(_=>{switch(_.type){case"server_name":return oe.encodeForClient()}}).filter(_=>_!==void 0),i=A.concatUint8Arrays(n),a=new Uint8Array([...U,...t,e.session_id.length,...e.session_id,...D(ce.TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256),r,...D(i.length),...i]);return new Uint8Array([E.ServerHello,...L(a.length),...a])}static serverHelloDone(){return new Uint8Array([E.ServerHelloDone,...L(0)])}static async createFinishedMessage(e,t){const r=await crypto.subtle.digest("SHA-256",A.concatUint8Arrays(e)),n=new Uint8Array(await k(t,new TextEncoder().encode("server finished"),r,12));return new Uint8Array([E.Finished,...L(n.length),...n])}static changeCipherSpec(){return new Uint8Array([1])}}function le(s,e){return Ve.generateCertificate(s,e)}function Ge(s){return`-----BEGIN CERTIFICATE-----
|
|
2
|
-
${He(ue(
|
|
3
|
-
-----END CERTIFICATE-----`}async function
|
|
1
|
+
"use strict";var me=Object.create;var G=Object.defineProperty;var ge=Object.getOwnPropertyDescriptor;var Ie=Object.getOwnPropertyNames;var Ke=Object.getPrototypeOf,De=Object.prototype.hasOwnProperty;var We=(i,e,t,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of Ie(e))!De.call(i,n)&&n!==t&&G(i,n,{get:()=>e[n],enumerable:!(r=ge(e,n))||r.enumerable});return i};var H=(i,e,t)=>(t=i!=null?me(Ke(i)):{},We(e||!i||!i.__esModule?G(t,"default",{value:i,enumerable:!0}):t,i));Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const d=require("@php-wasm/universal"),h=require("@php-wasm/util"),M=require("@php-wasm/logger"),k=require("@php-wasm/web-service-worker"),Pe=require("@wp-playground/common"),$=require("@php-wasm/fs-journal");async function ae(i=d.LatestSupportedPHPVersion){switch(i){case"8.5":return(await import("@php-wasm/web-8-5")).getPHPLoaderModule();case"8.4":return(await import("@php-wasm/web-8-4")).getPHPLoaderModule();case"8.3":return(await import("@php-wasm/web-8-3")).getPHPLoaderModule();case"8.2":return(await import("@php-wasm/web-8-2")).getPHPLoaderModule();case"8.1":return(await import("@php-wasm/web-8-1")).getPHPLoaderModule();case"8.0":return(await import("@php-wasm/web-8-0")).getPHPLoaderModule();case"7.4":return(await import("@php-wasm/web-7-4")).getPHPLoaderModule();case"7.3":return(await import("@php-wasm/web-7-3")).getPHPLoaderModule();case"7.2":return(await import("@php-wasm/web-7-2")).getPHPLoaderModule()}throw new Error(`Unsupported PHP version ${i}`)}function w(i){return Object.fromEntries(Object.entries(i).map(([e,t])=>[t,e]))}function W(i){return new Uint8Array([i>>8&255,i&255])}function m(i){return new Uint8Array([i>>16&255,i>>8&255,i&255])}function V(i){const e=new ArrayBuffer(8);return new DataView(e).setBigUint64(0,BigInt(i),!1),new Uint8Array(e)}class I{constructor(e){this.offset=0,this.buffer=e,this.view=new DataView(e)}readUint8(){const e=this.view.getUint8(this.offset);return this.offset+=1,e}readUint16(){const e=this.view.getUint16(this.offset);return this.offset+=2,e}readUint32(){const e=this.view.getUint32(this.offset);return this.offset+=4,e}readUint8Array(e){const t=this.buffer.slice(this.offset,this.offset+e);return this.offset+=e,new Uint8Array(t)}isFinished(){return this.offset>=this.buffer.byteLength}}class v{constructor(e){this.offset=0,this.buffer=new ArrayBuffer(e),this.uint8Array=new Uint8Array(this.buffer),this.view=new DataView(this.buffer)}writeUint8(e){this.view.setUint8(this.offset,e),this.offset+=1}writeUint16(e){this.view.setUint16(this.offset,e),this.offset+=2}writeUint32(e){this.view.setUint32(this.offset,e),this.offset+=4}writeUint8Array(e){this.uint8Array.set(e,this.offset),this.offset+=e.length}}const R={server_name:0,max_fragment_length:1,client_certificate_url:2,trusted_ca_keys:3,truncated_hmac:4,status_request:5,user_mapping:6,client_authz:7,server_authz:8,cert_type:9,supported_groups:10,ec_point_formats:11,srp:12,signature_algorithms:13,use_srtp:14,heartbeat:15,application_layer_protocol_negotiation:16,status_request_v2:17,signed_certificate_timestamp:18,client_certificate_type:19,server_certificate_type:20,padding:21,encrypt_then_mac:22,extended_master_secret:23,token_binding:24,cached_info:25,tls_its:26,compress_certificate:27,record_size_limit:28,pwd_protect:29,pwo_clear:30,password_salt:31,ticket_pinning:32,tls_cert_with_extern_psk:33,delegated_credential:34,session_ticket:35,TLMSP:36,TLMSP_proxying:37,TLMSP_delegate:38,supported_ekt_ciphers:39,pre_shared_key:41,early_data:42,supported_versions:43,cookie:44,psk_key_exchange_modes:45,reserved:46,certificate_authorities:47,oid_filters:48,post_handshake_auth:49,signature_algorithms_cert:50,key_share:51,transparency_info:52,connection_id:54},be=w(R),_e={host_name:0},Re=w(_e);class oe{static decodeFromClient(e){const t=new DataView(e.buffer);let r=0;const n=t.getUint16(r);r+=2;const s=[];for(;r<n+2;){const a=e[r];r+=1;const _=t.getUint16(r);r+=2;const S=e.slice(r,r+_);switch(r+=_,a){case _e.host_name:s.push({name_type:Re[a],name:{host_name:new TextDecoder().decode(S)}});break;default:throw new Error(`Unsupported name type ${a}`)}}return{server_name_list:s}}static encodeForClient(e){if(e!=null&&e.server_name_list.length)throw new Error("Encoding non-empty lists for ClientHello is not supported yet. Only empty lists meant for ServerHello are supported today.");const t=new v(4);return t.writeUint16(R.server_name),t.writeUint16(0),t.uint8Array}}const ce={TLS1_CK_PSK_WITH_RC4_128_SHA:138,TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA:139,TLS1_CK_PSK_WITH_AES_128_CBC_SHA:140,TLS1_CK_PSK_WITH_AES_256_CBC_SHA:141,TLS1_CK_DHE_PSK_WITH_RC4_128_SHA:142,TLS1_CK_DHE_PSK_WITH_3DES_EDE_CBC_SHA:143,TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA:144,TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA:145,TLS1_CK_RSA_PSK_WITH_RC4_128_SHA:146,TLS1_CK_RSA_PSK_WITH_3DES_EDE_CBC_SHA:147,TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA:148,TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA:149,TLS1_CK_PSK_WITH_AES_128_GCM_SHA256:168,TLS1_CK_PSK_WITH_AES_256_GCM_SHA384:169,TLS1_CK_DHE_PSK_WITH_AES_128_GCM_SHA256:170,TLS1_CK_DHE_PSK_WITH_AES_256_GCM_SHA384:171,TLS1_CK_RSA_PSK_WITH_AES_128_GCM_SHA256:172,TLS1_CK_RSA_PSK_WITH_AES_256_GCM_SHA384:173,TLS1_CK_PSK_WITH_AES_128_CBC_SHA256:174,TLS1_CK_PSK_WITH_AES_256_CBC_SHA384:175,TLS1_CK_PSK_WITH_NULL_SHA256:176,TLS1_CK_PSK_WITH_NULL_SHA384:177,TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA256:178,TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA384:179,TLS1_CK_DHE_PSK_WITH_NULL_SHA256:180,TLS1_CK_DHE_PSK_WITH_NULL_SHA384:181,TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA256:182,TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA384:183,TLS1_CK_RSA_PSK_WITH_NULL_SHA256:184,TLS1_CK_RSA_PSK_WITH_NULL_SHA384:185,TLS1_CK_PSK_WITH_NULL_SHA:44,TLS1_CK_DHE_PSK_WITH_NULL_SHA:45,TLS1_CK_RSA_PSK_WITH_NULL_SHA:46,TLS1_CK_RSA_WITH_AES_128_SHA:47,TLS1_CK_DH_DSS_WITH_AES_128_SHA:48,TLS1_CK_DH_RSA_WITH_AES_128_SHA:49,TLS1_CK_DHE_DSS_WITH_AES_128_SHA:50,TLS1_CK_DHE_RSA_WITH_AES_128_SHA:51,TLS1_CK_ADH_WITH_AES_128_SHA:52,TLS1_CK_RSA_WITH_AES_256_SHA:53,TLS1_CK_DH_DSS_WITH_AES_256_SHA:54,TLS1_CK_DH_RSA_WITH_AES_256_SHA:55,TLS1_CK_DHE_DSS_WITH_AES_256_SHA:56,TLS1_CK_DHE_RSA_WITH_AES_256_SHA:57,TLS1_CK_ADH_WITH_AES_256_SHA:58,TLS1_CK_RSA_WITH_NULL_SHA256:59,TLS1_CK_RSA_WITH_AES_128_SHA256:60,TLS1_CK_RSA_WITH_AES_256_SHA256:61,TLS1_CK_DH_DSS_WITH_AES_128_SHA256:62,TLS1_CK_DH_RSA_WITH_AES_128_SHA256:63,TLS1_CK_DHE_DSS_WITH_AES_128_SHA256:64,TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA:65,TLS1_CK_DH_DSS_WITH_CAMELLIA_128_CBC_SHA:66,TLS1_CK_DH_RSA_WITH_CAMELLIA_128_CBC_SHA:67,TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA:68,TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA:69,TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA:70,TLS1_CK_DHE_RSA_WITH_AES_128_SHA256:103,TLS1_CK_DH_DSS_WITH_AES_256_SHA256:104,TLS1_CK_DH_RSA_WITH_AES_256_SHA256:105,TLS1_CK_DHE_DSS_WITH_AES_256_SHA256:106,TLS1_CK_DHE_RSA_WITH_AES_256_SHA256:107,TLS1_CK_ADH_WITH_AES_128_SHA256:108,TLS1_CK_ADH_WITH_AES_256_SHA256:109,TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA:132,TLS1_CK_DH_DSS_WITH_CAMELLIA_256_CBC_SHA:133,TLS1_CK_DH_RSA_WITH_CAMELLIA_256_CBC_SHA:134,TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA:135,TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA:136,TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA:137,TLS1_CK_RSA_WITH_SEED_SHA:150,TLS1_CK_DH_DSS_WITH_SEED_SHA:151,TLS1_CK_DH_RSA_WITH_SEED_SHA:152,TLS1_CK_DHE_DSS_WITH_SEED_SHA:153,TLS1_CK_DHE_RSA_WITH_SEED_SHA:154,TLS1_CK_ADH_WITH_SEED_SHA:155,TLS1_CK_RSA_WITH_AES_128_GCM_SHA256:156,TLS1_CK_RSA_WITH_AES_256_GCM_SHA384:157,TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256:158,TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384:159,TLS1_CK_DH_RSA_WITH_AES_128_GCM_SHA256:160,TLS1_CK_DH_RSA_WITH_AES_256_GCM_SHA384:161,TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256:162,TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384:163,TLS1_CK_DH_DSS_WITH_AES_128_GCM_SHA256:164,TLS1_CK_DH_DSS_WITH_AES_256_GCM_SHA384:165,TLS1_CK_ADH_WITH_AES_128_GCM_SHA256:166,TLS1_CK_ADH_WITH_AES_256_GCM_SHA384:167,TLS1_CK_RSA_WITH_AES_128_CCM:49308,TLS1_CK_RSA_WITH_AES_256_CCM:49309,TLS1_CK_DHE_RSA_WITH_AES_128_CCM:49310,TLS1_CK_DHE_RSA_WITH_AES_256_CCM:49311,TLS1_CK_RSA_WITH_AES_128_CCM_8:49312,TLS1_CK_RSA_WITH_AES_256_CCM_8:49313,TLS1_CK_DHE_RSA_WITH_AES_128_CCM_8:49314,TLS1_CK_DHE_RSA_WITH_AES_256_CCM_8:49315,TLS1_CK_PSK_WITH_AES_128_CCM:49316,TLS1_CK_PSK_WITH_AES_256_CCM:49317,TLS1_CK_DHE_PSK_WITH_AES_128_CCM:49318,TLS1_CK_DHE_PSK_WITH_AES_256_CCM:49319,TLS1_CK_PSK_WITH_AES_128_CCM_8:49320,TLS1_CK_PSK_WITH_AES_256_CCM_8:49321,TLS1_CK_DHE_PSK_WITH_AES_128_CCM_8:49322,TLS1_CK_DHE_PSK_WITH_AES_256_CCM_8:49323,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM:49324,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM:49325,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM_8:49326,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM_8:49327,TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA256:186,TLS1_CK_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256:187,TLS1_CK_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256:188,TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256:189,TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:190,TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA256:191,TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA256:192,TLS1_CK_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256:193,TLS1_CK_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256:194,TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256:195,TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256:196,TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA256:197,TLS1_CK_ECDH_ECDSA_WITH_NULL_SHA:49153,TLS1_CK_ECDH_ECDSA_WITH_RC4_128_SHA:49154,TLS1_CK_ECDH_ECDSA_WITH_DES_192_CBC3_SHA:49155,TLS1_CK_ECDH_ECDSA_WITH_AES_128_CBC_SHA:49156,TLS1_CK_ECDH_ECDSA_WITH_AES_256_CBC_SHA:49157,TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA:49158,TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA:49159,TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA:49160,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA:49161,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA:49162,TLS1_CK_ECDH_RSA_WITH_NULL_SHA:49163,TLS1_CK_ECDH_RSA_WITH_RC4_128_SHA:49164,TLS1_CK_ECDH_RSA_WITH_DES_192_CBC3_SHA:49165,TLS1_CK_ECDH_RSA_WITH_AES_128_CBC_SHA:49166,TLS1_CK_ECDH_RSA_WITH_AES_256_CBC_SHA:49167,TLS1_CK_ECDHE_RSA_WITH_NULL_SHA:49168,TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA:49169,TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA:49170,TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA:49171,TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA:49172,TLS1_CK_ECDH_anon_WITH_NULL_SHA:49173,TLS1_CK_ECDH_anon_WITH_RC4_128_SHA:49174,TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA:49175,TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA:49176,TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA:49177,TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA:49178,TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA:49179,TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA:49180,TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA:49181,TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA:49182,TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA:49183,TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA:49184,TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA:49185,TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA:49186,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256:49187,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384:49188,TLS1_CK_ECDH_ECDSA_WITH_AES_128_SHA256:49189,TLS1_CK_ECDH_ECDSA_WITH_AES_256_SHA384:49190,TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256:49191,TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384:49192,TLS1_CK_ECDH_RSA_WITH_AES_128_SHA256:49193,TLS1_CK_ECDH_RSA_WITH_AES_256_SHA384:49194,TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:49195,TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:49196,TLS1_CK_ECDH_ECDSA_WITH_AES_128_GCM_SHA256:49197,TLS1_CK_ECDH_ECDSA_WITH_AES_256_GCM_SHA384:49198,TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256:49199,TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384:49200,TLS1_CK_ECDH_RSA_WITH_AES_128_GCM_SHA256:49201,TLS1_CK_ECDH_RSA_WITH_AES_256_GCM_SHA384:49202,TLS1_CK_ECDHE_PSK_WITH_RC4_128_SHA:49203,TLS1_CK_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA:49204,TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA:49205,TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA:49206,TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA256:49207,TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA384:49208,TLS1_CK_ECDHE_PSK_WITH_NULL_SHA:49209,TLS1_CK_ECDHE_PSK_WITH_NULL_SHA256:49210,TLS1_CK_ECDHE_PSK_WITH_NULL_SHA384:49211,TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:49266,TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:49267,TLS1_CK_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:49268,TLS1_CK_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:49269,TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:49270,TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384:49271,TLS1_CK_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256:49272,TLS1_CK_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384:49273,TLS1_CK_PSK_WITH_CAMELLIA_128_CBC_SHA256:49300,TLS1_CK_PSK_WITH_CAMELLIA_256_CBC_SHA384:49301,TLS1_CK_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:49302,TLS1_CK_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:49303,TLS1_CK_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256:49304,TLS1_CK_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384:49305,TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:49306,TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:49307,TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305:52392,TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305:52393,TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305:52394,TLS1_CK_PSK_WITH_CHACHA20_POLY1305:52395,TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305:52396,TLS1_CK_DHE_PSK_WITH_CHACHA20_POLY1305:52397,TLS1_CK_RSA_PSK_WITH_CHACHA20_POLY1305:52398},z=w(ce),Se={secp256r1:23,secp384r1:24,secp521r1:25,x25519:29,x448:30},Y=w(Se);class Ue{static decodeFromClient(e){const t=new I(e.buffer);t.readUint16();const r=[];for(;!t.isFinished();){const n=t.readUint16();n in Y&&r.push(Y[n])}return r}static encodeForClient(e){const t=new v(6);return t.writeUint16(R.supported_groups),t.writeUint16(2),t.writeUint16(Se[e]),t.uint8Array}}const le={uncompressed:0,ansiX962_compressed_prime:1,ansiX962_compressed_char2:2},J=w(le);class Be{static decodeFromClient(e){const t=new I(e.buffer),r=t.readUint8(),n=[];for(let s=0;s<r;s++){const a=t.readUint8();a in J&&n.push(J[a])}return n}static encodeForClient(e){const t=new v(6);return t.writeUint16(R.ec_point_formats),t.writeUint16(2),t.writeUint8(1),t.writeUint8(le[e]),t.uint8Array}}const O={anonymous:0,rsa:1,dsa:2,ecdsa:3},X=w(O),j={none:0,md5:1,sha1:2,sha224:3,sha256:4,sha384:5,sha512:6},Z=w(j);class Me{static decodeFromClient(e){const t=new I(e.buffer);t.readUint16();const r=[];for(;!t.isFinished();){const n=t.readUint8(),s=t.readUint8();if(X[s]){if(!Z[n]){M.logger.warn(`Unknown hash algorithm: ${n}`);continue}r.push({algorithm:X[s],hash:Z[n]})}}return r}static encodeforClient(e,t){const r=new v(6);return r.writeUint16(R.signature_algorithms),r.writeUint16(2),r.writeUint8(j[e]),r.writeUint8(O[t]),r.uint8Array}}const Q={server_name:oe,signature_algorithms:Me,supported_groups:Ue,ec_point_formats:Be};function ve(i){const e=new I(i.buffer),t=[];for(;!e.isFinished();){const r=e.offset,n=e.readUint16(),s=be[n],a=e.readUint16(),_=e.readUint8Array(a);if(!(s in Q))continue;const S=Q[s];t.push({type:s,data:S.decodeFromClient(_),raw:i.slice(r,r+4+a)})}return t}async function q(i,e,t,r){const n=h.concatArrayBuffers([e,t]),s=await crypto.subtle.importKey("raw",i,{name:"HMAC",hash:{name:"SHA-256"}},!1,["sign"]);let a=n;const _=[];for(;h.concatArrayBuffers(_).byteLength<r;){a=await ee(s,a);const c=h.concatArrayBuffers([a,n]),C=await ee(s,c);_.push(C)}return h.concatArrayBuffers(_).slice(0,r)}async function ee(i,e){return await crypto.subtle.sign({name:"HMAC",hash:"SHA-256"},i,e)}const xe={Null:0},Ne={Warning:1,Fatal:2},Ce=w(Ne),ke={CloseNotify:0,UnexpectedMessage:10,BadRecordMac:20,DecryptionFailed:21,RecordOverflow:22,DecompressionFailure:30,HandshakeFailure:40,NoCertificate:41,BadCertificate:42,UnsupportedCertificate:43,CertificateRevoked:44,CertificateExpired:45,CertificateUnknown:46,IllegalParameter:47,UnknownCa:48,AccessDenied:49,DecodeError:50,DecryptError:51,ExportRestriction:60,ProtocolVersion:70,InsufficientSecurity:71,InternalError:80,UserCanceled:90,NoRenegotiation:100,UnsupportedExtension:110},he=w(ke),l={ChangeCipherSpec:20,Alert:21,Handshake:22,ApplicationData:23},f={HelloRequest:0,ClientHello:1,ServerHello:2,Certificate:11,ServerKeyExchange:12,ServerHelloDone:14,ClientKeyExchange:16,Finished:20},qe={NamedCurve:3},Fe={secp256r1:23};class te extends Error{}const B=new Uint8Array([3,3]),Oe=crypto.subtle.generateKey({name:"ECDH",namedCurve:"P-256"},!0,["deriveKey","deriveBits"]);class je{constructor(){this.receivedRecordSequenceNumber=0,this.sentRecordSequenceNumber=0,this.closed=!1,this.receivedBytesBuffer=new Uint8Array,this.receivedTLSRecords=[],this.partialTLSMessages={},this.handshakeMessages=[],this.MAX_CHUNK_SIZE=1024*16,this.clientEnd={upstream:new TransformStream,downstream:new TransformStream},this.clientDownstreamWriter=this.clientEnd.downstream.writable.getWriter(),this.clientUpstreamReader=this.clientEnd.upstream.readable.getReader(),this.serverEnd={upstream:new TransformStream,downstream:Ge(this.MAX_CHUNK_SIZE)},this.serverUpstreamWriter=this.serverEnd.upstream.writable.getWriter();const e=this;this.serverEnd.downstream.readable.pipeTo(new WritableStream({async write(t){await e.writeTLSRecord(l.ApplicationData,t)},async abort(t){e.clientDownstreamWriter.releaseLock(),e.clientEnd.downstream.writable.abort(t),e.close()},close(){e.close()}})).catch(()=>{})}async close(){if(!this.closed){this.closed=!0;try{await this.clientDownstreamWriter.close()}catch{}try{await this.clientUpstreamReader.cancel()}catch{}try{await this.serverUpstreamWriter.close()}catch{}try{await this.clientEnd.upstream.readable.cancel()}catch{}try{await this.clientEnd.downstream.writable.close()}catch{}}}async TLSHandshake(e,t){const r=await this.readNextHandshakeMessage(f.ClientHello);if(!r.body.cipher_suites.length)throw new Error("Client did not propose any supported cipher suites.");const n=crypto.getRandomValues(new Uint8Array(32));await this.writeTLSRecord(l.Handshake,D.serverHello(r.body,n,xe.Null)),await this.writeTLSRecord(l.Handshake,D.certificate(t));const s=await Oe,a=r.body.random,_=await D.ECDHEServerKeyExchange(a,n,s,e);await this.writeTLSRecord(l.Handshake,_),await this.writeTLSRecord(l.Handshake,D.serverHelloDone());const S=await this.readNextHandshakeMessage(f.ClientKeyExchange);await this.readNextMessage(l.ChangeCipherSpec),this.sessionKeys=await this.deriveSessionKeys({clientRandom:a,serverRandom:n,serverPrivateKey:s.privateKey,clientPublicKey:await crypto.subtle.importKey("raw",S.body.exchange_keys,{name:"ECDH",namedCurve:"P-256"},!1,[])}),await this.readNextHandshakeMessage(f.Finished),await this.writeTLSRecord(l.ChangeCipherSpec,D.changeCipherSpec()),await this.writeTLSRecord(l.Handshake,await D.createFinishedMessage(this.handshakeMessages,this.sessionKeys.masterSecret)),this.handshakeMessages=[],this.pollForClientMessages()}async deriveSessionKeys({clientRandom:e,serverRandom:t,serverPrivateKey:r,clientPublicKey:n}){const s=await crypto.subtle.deriveBits({name:"ECDH",public:n},r,256),a=new Uint8Array(await q(s,new TextEncoder().encode("master secret"),h.concatUint8Arrays([e,t]),48)),_=await q(a,new TextEncoder().encode("key expansion"),h.concatUint8Arrays([t,e]),40),S=new I(_),c=S.readUint8Array(16),C=S.readUint8Array(16),A=S.readUint8Array(4),u=S.readUint8Array(4);return{masterSecret:a,clientWriteKey:await crypto.subtle.importKey("raw",c,{name:"AES-GCM"},!1,["encrypt","decrypt"]),serverWriteKey:await crypto.subtle.importKey("raw",C,{name:"AES-GCM"},!1,["encrypt","decrypt"]),clientIV:A,serverIV:u}}async readNextHandshakeMessage(e){const t=await this.readNextMessage(l.Handshake);if(t.msg_type!==e)throw new Error(`Expected ${e} message`);return t}async readNextMessage(e){let t,r=!1;do t=await this.readNextTLSRecord(e),r=await this.accumulateUntilMessageIsComplete(t);while(r===!1);const n=p.TLSMessage(t.type,r);return t.type===l.Handshake&&this.handshakeMessages.push(t.fragment),n}async readNextTLSRecord(e){for(;;){for(let _=0;_<this.receivedTLSRecords.length;_++){const S=this.receivedTLSRecords[_];if(S.type===e)return this.receivedTLSRecords.splice(_,1),S}const t=await this.pollBytes(5),r=t[3]<<8|t[4],n=t[0],s=await this.pollBytes(r),a={type:n,version:{major:t[1],minor:t[2]},length:r,fragment:this.sessionKeys&&n!==l.ChangeCipherSpec?await this.decryptData(n,s):s};if(a.type===l.Alert){const _=Ce[a.fragment[0]],S=he[a.fragment[1]];throw new Error(`TLS non-warning alert received: ${_} ${S}`)}this.receivedTLSRecords.push(a)}}async pollBytes(e){for(;this.receivedBytesBuffer.length<e;){const{value:r,done:n}=await this.clientUpstreamReader.read();if(n)throw await this.close(),new te("TLS connection closed");if(this.receivedBytesBuffer=h.concatUint8Arrays([this.receivedBytesBuffer,r]),this.receivedBytesBuffer.length>=e)break;await new Promise(s=>setTimeout(s,100))}const t=this.receivedBytesBuffer.slice(0,e);return this.receivedBytesBuffer=this.receivedBytesBuffer.slice(e),t}async pollForClientMessages(){try{for(;;){const e=await this.readNextMessage(l.ApplicationData);this.serverUpstreamWriter.write(e.body)}}catch(e){if(e instanceof te)return;throw e}}async decryptData(e,t){const r=this.sessionKeys.clientIV,n=t.slice(0,8),s=new Uint8Array([...r,...n]),a=await crypto.subtle.decrypt({name:"AES-GCM",iv:s,additionalData:new Uint8Array([...V(this.receivedRecordSequenceNumber),e,...B,...W(t.length-8-16)]),tagLength:128},this.sessionKeys.clientWriteKey,t.slice(8));return++this.receivedRecordSequenceNumber,new Uint8Array(a)}async accumulateUntilMessageIsComplete(e){this.partialTLSMessages[e.type]=h.concatUint8Arrays([this.partialTLSMessages[e.type]||new Uint8Array,e.fragment]);const t=this.partialTLSMessages[e.type];switch(e.type){case l.Handshake:{if(t.length<4)return!1;const r=t[1]<<8|t[2];if(t.length<3+r)return!1;break}case l.Alert:{if(t.length<2)return!1;break}case l.ChangeCipherSpec:case l.ApplicationData:break;default:throw new Error(`TLS: Unsupported record type ${e.type}`)}return delete this.partialTLSMessages[e.type],t}async writeTLSRecord(e,t){e===l.Handshake&&this.handshakeMessages.push(t),this.sessionKeys&&e!==l.ChangeCipherSpec&&(t=await this.encryptData(e,t));const r=B,n=t.length,s=new Uint8Array(5);s[0]=e,s[1]=r[0],s[2]=r[1],s[3]=n>>8&255,s[4]=n&255;const a=h.concatUint8Arrays([s,t]);this.clientDownstreamWriter.write(a)}async encryptData(e,t){const r=this.sessionKeys.serverIV,n=crypto.getRandomValues(new Uint8Array(8)),s=new Uint8Array([...r,...n]),a=new Uint8Array([...V(this.sentRecordSequenceNumber),e,...B,...W(t.length)]),_=await crypto.subtle.encrypt({name:"AES-GCM",iv:s,additionalData:a,tagLength:128},this.sessionKeys.serverWriteKey,t);return++this.sentRecordSequenceNumber,h.concatUint8Arrays([n,new Uint8Array(_)])}}class p{static TLSMessage(e,t){switch(e){case l.Handshake:return p.clientHandshake(t);case l.Alert:return p.alert(t);case l.ChangeCipherSpec:return p.changeCipherSpec();case l.ApplicationData:return p.applicationData(t);default:throw new Error(`TLS: Unsupported TLS record type ${e}`)}}static parseCipherSuites(e){const t=new I(e);t.readUint16();const r=[];for(;!t.isFinished();){const n=t.readUint16();n in z&&r.push(z[n])}return r}static applicationData(e){return{type:l.ApplicationData,body:e}}static changeCipherSpec(){return{type:l.ChangeCipherSpec,body:new Uint8Array}}static alert(e){return{type:l.Alert,level:Ce[e[0]],description:he[e[1]]}}static clientHandshake(e){const t=e[0],r=e[1]<<16|e[2]<<8|e[3],n=e.slice(4);let s;switch(t){case f.HelloRequest:s=p.clientHelloRequestPayload();break;case f.ClientHello:s=p.clientHelloPayload(n);break;case f.ClientKeyExchange:s=p.clientKeyExchangePayload(n);break;case f.Finished:s=p.clientFinishedPayload(n);break;default:throw new Error(`Invalid handshake type ${t}`)}return{type:l.Handshake,msg_type:t,length:r,body:s}}static clientHelloRequestPayload(){return{}}static clientHelloPayload(e){const t=new I(e.buffer),r={client_version:t.readUint8Array(2),random:t.readUint8Array(32)},n=t.readUint8();r.session_id=t.readUint8Array(n);const s=t.readUint16();r.cipher_suites=p.parseCipherSuites(t.readUint8Array(s).buffer);const a=t.readUint8();r.compression_methods=t.readUint8Array(a);const _=t.readUint16();return r.extensions=ve(t.readUint8Array(_)),r}static clientKeyExchangePayload(e){return{exchange_keys:e.slice(1,e.length)}}static clientFinishedPayload(e){return{verify_data:e}}}function Ge(i){return new TransformStream({transform(e,t){for(;e.length>0;)t.enqueue(e.slice(0,i)),e=e.slice(i)}})}class D{static certificate(e){const t=[];for(const s of e)t.push(m(s.byteLength)),t.push(new Uint8Array(s));const r=h.concatUint8Arrays(t),n=new Uint8Array([...m(r.byteLength),...r]);return new Uint8Array([f.Certificate,...m(n.length),...n])}static async ECDHEServerKeyExchange(e,t,r,n){const s=new Uint8Array(await crypto.subtle.exportKey("raw",r.publicKey)),a=new Uint8Array([qe.NamedCurve,...W(Fe.secp256r1),s.byteLength,...s]),_=await crypto.subtle.sign({name:"RSASSA-PKCS1-v1_5",hash:"SHA-256"},n,new Uint8Array([...e,...t,...a])),S=new Uint8Array(_),c=new Uint8Array([j.sha256,O.rsa]),C=new Uint8Array([...a,...c,...W(S.length),...S]);return new Uint8Array([f.ServerKeyExchange,...m(C.length),...C])}static serverHello(e,t,r){const n=e.extensions.map(_=>{switch(_.type){case"server_name":return oe.encodeForClient()}}).filter(_=>_!==void 0),s=h.concatUint8Arrays(n),a=new Uint8Array([...B,...t,e.session_id.length,...e.session_id,...W(ce.TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256),r,...W(s.length),...s]);return new Uint8Array([f.ServerHello,...m(a.length),...a])}static serverHelloDone(){return new Uint8Array([f.ServerHelloDone,...m(0)])}static async createFinishedMessage(e,t){const r=await crypto.subtle.digest("SHA-256",h.concatUint8Arrays(e)),n=new Uint8Array(await q(t,new TextEncoder().encode("server finished"),r,12));return new Uint8Array([f.Finished,...m(n.length),...n])}static changeCipherSpec(){return new Uint8Array([1])}}function Ae(i,e){return ze.generateCertificate(i,e)}function $e(i){return`-----BEGIN CERTIFICATE-----
|
|
2
|
+
${He(ue(i.buffer))}
|
|
3
|
+
-----END CERTIFICATE-----`}async function Ve(i){const e=await crypto.subtle.exportKey("pkcs8",i);return`-----BEGIN PRIVATE KEY-----
|
|
4
4
|
${He(ue(e))}
|
|
5
|
-
-----END PRIVATE KEY-----`}class
|
|
6
|
-
`))||
|
|
5
|
+
-----END PRIVATE KEY-----`}class ze{static async generateCertificate(e,t){const r=await crypto.subtle.generateKey({name:"RSASSA-PKCS1-v1_5",hash:"SHA-256",modulusLength:2048,publicExponent:new Uint8Array([1,0,1])},!0,["sign","verify"]),n=await this.signingRequest(e,r.publicKey),s=await this.sign(n,(t==null?void 0:t.privateKey)??r.privateKey);return{keyPair:r,certificate:s,tbsCertificate:n,tbsDescription:e}}static async sign(e,t){const r=await crypto.subtle.sign({name:"RSASSA-PKCS1-v1_5",hash:"SHA-256"},t,e.buffer);return o.sequence([new Uint8Array(e.buffer),this.signatureAlgorithm("sha256WithRSAEncryption"),o.bitString(new Uint8Array(r))])}static async signingRequest(e,t){const r=[];return e.keyUsage&&r.push(this.keyUsage(e.keyUsage)),e.extKeyUsage&&r.push(this.extKeyUsage(e.extKeyUsage)),e.subjectAltNames&&r.push(this.subjectAltName(e.subjectAltNames)),e.nsCertType&&r.push(this.nsCertType(e.nsCertType)),e.basicConstraints&&r.push(this.basicConstraints(e.basicConstraints)),o.sequence([this.version(e.version),this.serialNumber(e.serialNumber),this.signatureAlgorithm(e.signatureAlgorithm),this.distinguishedName(e.issuer??e.subject),this.validity(e.validity),this.distinguishedName(e.subject),await this.subjectPublicKeyInfo(t),this.extensions(r)])}static version(e=2){return o.ASN1(160,o.integer(new Uint8Array([e])))}static serialNumber(e=crypto.getRandomValues(new Uint8Array(4))){return o.integer(e)}static signatureAlgorithm(e="sha256WithRSAEncryption"){return o.sequence([o.objectIdentifier(L(e)),o.null()])}static async subjectPublicKeyInfo(e){return new Uint8Array(await crypto.subtle.exportKey("spki",e))}static extensions(e){return o.ASN1(163,o.sequence(e))}static distinguishedName(e){const t=[];for(const[r,n]of Object.entries(e)){const s=[o.objectIdentifier(L(r))];switch(r){case"countryName":s.push(o.printableString(n));break;default:s.push(o.utf8String(n))}t.push(o.set([o.sequence(s)]))}return o.sequence(t)}static validity(e){return o.sequence([o.ASN1(T.UTCTime,new TextEncoder().encode(ne((e==null?void 0:e.notBefore)??new Date))),o.ASN1(T.UTCTime,new TextEncoder().encode(ne((e==null?void 0:e.notAfter)??Je(new Date,10))))])}static basicConstraints({ca:e=!0,pathLenConstraint:t=void 0}){const r=[o.boolean(e)];return t!==void 0&&r.push(o.integer(new Uint8Array([t]))),o.sequence([o.objectIdentifier(L("basicConstraints")),o.octetString(o.sequence(r))])}static keyUsage(e){const t=new Uint8Array([0]);return e!=null&&e.digitalSignature&&(t[0]|=1),e!=null&&e.nonRepudiation&&(t[0]|=2),e!=null&&e.keyEncipherment&&(t[0]|=4),e!=null&&e.dataEncipherment&&(t[0]|=8),e!=null&&e.keyAgreement&&(t[0]|=16),e!=null&&e.keyCertSign&&(t[0]|=32),e!=null&&e.cRLSign&&(t[0]|=64),e!=null&&e.encipherOnly&&(t[0]|=128),e!=null&&e.decipherOnly&&(t[0]|=64),o.sequence([o.objectIdentifier(L("keyUsage")),o.boolean(!0),o.octetString(o.bitString(t))])}static extKeyUsage(e={}){return o.sequence([o.objectIdentifier(L("extKeyUsage")),o.boolean(!0),o.octetString(o.sequence(Object.entries(e).map(([t,r])=>r?o.objectIdentifier(L(t)):o.null())))])}static nsCertType(e){const t=new Uint8Array([0]);return e.client&&(t[0]|=1),e.server&&(t[0]|=2),e.email&&(t[0]|=4),e.objsign&&(t[0]|=8),e.sslCA&&(t[0]|=16),e.emailCA&&(t[0]|=32),e.objCA&&(t[0]|=64),o.sequence([o.objectIdentifier(L("nsCertType")),o.octetString(t)])}static subjectAltName(e){var s,a;const t=((s=e.dnsNames)==null?void 0:s.map(_=>{const S=o.ia5String(_);return o.contextSpecific(2,S)}))||[],r=((a=e.ipAddresses)==null?void 0:a.map(_=>{const S=o.ia5String(_);return o.contextSpecific(7,S)}))||[],n=o.octetString(o.sequence([...t,...r]));return o.sequence([o.objectIdentifier(L("subjectAltName")),o.boolean(!0),n])}}const Ye={"1.2.840.113549.1.1.1":"rsaEncryption","1.2.840.113549.1.1.4":"md5WithRSAEncryption","1.2.840.113549.1.1.5":"sha1WithRSAEncryption","1.2.840.113549.1.1.7":"RSAES-OAEP","1.2.840.113549.1.1.8":"mgf1","1.2.840.113549.1.1.9":"pSpecified","1.2.840.113549.1.1.10":"RSASSA-PSS","1.2.840.113549.1.1.11":"sha256WithRSAEncryption","1.2.840.113549.1.1.12":"sha384WithRSAEncryption","1.2.840.113549.1.1.13":"sha512WithRSAEncryption","1.3.101.112":"EdDSA25519","1.2.840.10040.4.3":"dsa-with-sha1","1.3.14.3.2.7":"desCBC","1.3.14.3.2.26":"sha1","1.3.14.3.2.29":"sha1WithRSASignature","2.16.840.1.101.3.4.2.1":"sha256","2.16.840.1.101.3.4.2.2":"sha384","2.16.840.1.101.3.4.2.3":"sha512","2.16.840.1.101.3.4.2.4":"sha224","2.16.840.1.101.3.4.2.5":"sha512-224","2.16.840.1.101.3.4.2.6":"sha512-256","1.2.840.113549.2.2":"md2","1.2.840.113549.2.5":"md5","1.2.840.113549.1.7.1":"data","1.2.840.113549.1.7.2":"signedData","1.2.840.113549.1.7.3":"envelopedData","1.2.840.113549.1.7.4":"signedAndEnvelopedData","1.2.840.113549.1.7.5":"digestedData","1.2.840.113549.1.7.6":"encryptedData","1.2.840.113549.1.9.1":"emailAddress","1.2.840.113549.1.9.2":"unstructuredName","1.2.840.113549.1.9.3":"contentType","1.2.840.113549.1.9.4":"messageDigest","1.2.840.113549.1.9.5":"signingTime","1.2.840.113549.1.9.6":"counterSignature","1.2.840.113549.1.9.7":"challengePassword","1.2.840.113549.1.9.8":"unstructuredAddress","1.2.840.113549.1.9.14":"extensionRequest","1.2.840.113549.1.9.20":"friendlyName","1.2.840.113549.1.9.21":"localKeyId","1.2.840.113549.1.9.22.1":"x509Certificate","1.2.840.113549.1.12.10.1.1":"keyBag","1.2.840.113549.1.12.10.1.2":"pkcs8ShroudedKeyBag","1.2.840.113549.1.12.10.1.3":"certBag","1.2.840.113549.1.12.10.1.4":"crlBag","1.2.840.113549.1.12.10.1.5":"secretBag","1.2.840.113549.1.12.10.1.6":"safeContentsBag","1.2.840.113549.1.5.13":"pkcs5PBES2","1.2.840.113549.1.5.12":"pkcs5PBKDF2","1.2.840.113549.1.12.1.1":"pbeWithSHAAnd128BitRC4","1.2.840.113549.1.12.1.2":"pbeWithSHAAnd40BitRC4","1.2.840.113549.1.12.1.3":"pbeWithSHAAnd3-KeyTripleDES-CBC","1.2.840.113549.1.12.1.4":"pbeWithSHAAnd2-KeyTripleDES-CBC","1.2.840.113549.1.12.1.5":"pbeWithSHAAnd128BitRC2-CBC","1.2.840.113549.1.12.1.6":"pbewithSHAAnd40BitRC2-CBC","1.2.840.113549.2.7":"hmacWithSHA1","1.2.840.113549.2.8":"hmacWithSHA224","1.2.840.113549.2.9":"hmacWithSHA256","1.2.840.113549.2.10":"hmacWithSHA384","1.2.840.113549.2.11":"hmacWithSHA512","1.2.840.113549.3.7":"des-EDE3-CBC","2.16.840.1.101.3.4.1.2":"aes128-CBC","2.16.840.1.101.3.4.1.22":"aes192-CBC","2.16.840.1.101.3.4.1.42":"aes256-CBC","2.5.4.3":"commonName","2.5.4.4":"surname","2.5.4.5":"serialNumber","2.5.4.6":"countryName","2.5.4.7":"localityName","2.5.4.8":"stateOrProvinceName","2.5.4.9":"streetAddress","2.5.4.10":"organizationName","2.5.4.11":"organizationalUnitName","2.5.4.12":"title","2.5.4.13":"description","2.5.4.15":"businessCategory","2.5.4.17":"postalCode","2.5.4.42":"givenName","1.3.6.1.4.1.311.60.2.1.2":"jurisdictionOfIncorporationStateOrProvinceName","1.3.6.1.4.1.311.60.2.1.3":"jurisdictionOfIncorporationCountryName","2.16.840.1.113730.1.1":"nsCertType","2.16.840.1.113730.1.13":"nsComment","2.5.29.14":"subjectKeyIdentifier","2.5.29.15":"keyUsage","2.5.29.17":"subjectAltName","2.5.29.18":"issuerAltName","2.5.29.19":"basicConstraints","2.5.29.31":"cRLDistributionPoints","2.5.29.32":"certificatePolicies","2.5.29.35":"authorityKeyIdentifier","2.5.29.37":"extKeyUsage","1.3.6.1.4.1.11129.2.4.2":"timestampList","1.3.6.1.5.5.7.1.1":"authorityInfoAccess","1.3.6.1.5.5.7.3.1":"serverAuth","1.3.6.1.5.5.7.3.2":"clientAuth","1.3.6.1.5.5.7.3.3":"codeSigning","1.3.6.1.5.5.7.3.4":"emailProtection","1.3.6.1.5.5.7.3.8":"timeStamping"};function L(i){for(const[e,t]of Object.entries(Ye))if(t===i)return e;throw new Error(`OID not found for name: ${i}`)}const re=32,T={Boolean:1,Integer:2,BitString:3,OctetString:4,Null:5,OID:6,Utf8String:12,Sequence:16|re,Set:17|re,PrintableString:19,IA5String:22,UTCTime:23};class o{static length_(e){if(e<128)return new Uint8Array([e]);{let t=e;const r=[];for(;t>0;)r.unshift(t&255),t>>=8;const n=r.length,s=new Uint8Array(1+n);s[0]=128|n;for(let a=0;a<n;a++)s[a+1]=r[a];return s}}static ASN1(e,t){const r=o.length_(t.length),n=new Uint8Array(1+r.length+t.length);return n[0]=e,n.set(r,1),n.set(t,1+r.length),n}static integer(e){if(e[0]>127){const t=new Uint8Array(e.length+1);t[0]=0,t.set(e,1),e=t}return o.ASN1(T.Integer,e)}static bitString(e){const t=new Uint8Array([0]),r=new Uint8Array(t.length+e.length);return r.set(t),r.set(e,t.length),o.ASN1(T.BitString,r)}static octetString(e){return o.ASN1(T.OctetString,e)}static null(){return o.ASN1(T.Null,new Uint8Array(0))}static objectIdentifier(e){const t=e.split(".").map(Number),n=[t[0]*40+t[1]];for(let s=2;s<t.length;s++){let a=t[s];const _=[];do _.unshift(a&127),a>>=7;while(a>0);for(let S=0;S<_.length-1;S++)_[S]|=128;n.push(..._)}return o.ASN1(T.OID,new Uint8Array(n))}static utf8String(e){const t=new TextEncoder().encode(e);return o.ASN1(T.Utf8String,t)}static printableString(e){const t=new TextEncoder().encode(e);return o.ASN1(T.PrintableString,t)}static sequence(e){return o.ASN1(T.Sequence,h.concatUint8Arrays(e))}static set(e){return o.ASN1(T.Set,h.concatUint8Arrays(e))}static ia5String(e){const t=new TextEncoder().encode(e);return o.ASN1(T.IA5String,t)}static contextSpecific(e,t,r=!1){const n=(r?160:128)|e;return o.ASN1(n,t)}static boolean(e){return o.ASN1(T.Boolean,new Uint8Array([e?255:0]))}}function ue(i){return btoa(String.fromCodePoint(...new Uint8Array(i)))}function He(i){var e;return((e=i.match(/.{1,64}/g))==null?void 0:e.join(`
|
|
6
|
+
`))||i}function ne(i){const e=i.getUTCFullYear().toString().substr(2),t=b(i.getUTCMonth()+1),r=b(i.getUTCDate()),n=b(i.getUTCHours()),s=b(i.getUTCMinutes()),a=b(i.getUTCSeconds());return`${e}${t}${r}${n}${s}${a}Z`}function b(i){return i.toString().padStart(2,"0")}function Je(i,e){const t=new Date(i);return t.setUTCFullYear(t.getUTCFullYear()+e),t}class de extends Error{constructor(e,t,r){super(`Could not fetch ${e} – your network appears to be blocking this request (HTTP ${t}). This often happens on school, university, or corporate networks. Try switching to a different network or using a VPN.`),this.name="FirewallInterferenceError",this.url=e,this.status=t,this.statusText=r}}const Xe="X-Playground-Cors-Proxy";async function Ee(i,e,t,r){var c;let n=typeof i=="string"?new Request(i,e):i;const s=r?new URL(r):null;let a=s?new URL(n.url,s):new URL(n.url);if(a.protocol==="http:"){a.protocol="https:";const C=a.toString();n=await k.cloneRequest(n,{url:C}),a=new URL(C)}if(!t)return await fetch(n);if(s&&a.protocol===s.protocol&&a.hostname===s.hostname&&a.port===s.port&&a.pathname.startsWith(s.pathname))return await fetch(n);const[_,S]=await k.teeRequest(n);try{return await fetch(_)}catch{const A=((c=new Headers(S.headers).get("x-cors-proxy-allowed-request-headers"))==null?void 0:c.split(","))||[],u=A.includes("authorization")||A.includes("cookie"),E=await k.cloneRequest(S,{url:`${t}${n.url}`,...u&&{credentials:"include"}}),y=await fetch(E,e);if(!y.headers.has(Xe))throw new de(n.url,y.status,y.statusText);return y}}class Ze extends TransformStream{constructor(){let e=new Uint8Array(0),t="SCAN_CHUNK_SIZE",r=0;super({transform(n,s){for(e=h.concatUint8Arrays([e,n]);e.length>0;)if(t==="SCAN_CHUNK_SIZE"){if(e.length<3)return;let a=0;for(;a<e.length;){const c=e[a];if(!(c>=48&&c<=57||c>=97&&c<=102||c>=65&&c<=70))break;a++}if(a===0)throw new Error("Invalid chunk size format");if(e.length<a+2)return;if(e[a]!==13||e[a+1]!==10)throw new Error("Invalid chunk size format. Expected CRLF after chunk size");const _=new TextDecoder().decode(e.slice(0,a)),S=parseInt(_,16);if(e=e.slice(a+2),S===0){t="SCAN_FINAL_CHUNK",s.terminate();return}r=S,t="SCAN_CHUNK_DATA"}else if(t==="SCAN_CHUNK_DATA"){const a=Math.min(r,e.length),_=e.slice(0,a);e=e.slice(a),r-=a,s.enqueue(_),r===0&&(t="SCAN_CHUNK_TRAILER")}else if(t==="SCAN_CHUNK_TRAILER"){if(e.length<2)return;if(e[0]!==13||e[1]!==10)throw new Error("Invalid chunk trailer format. Expected CRLF after chunk data");e=e.slice(2),t="SCAN_CHUNK_SIZE"}}})}}const Qe=(i,e)=>({...i,websocket:{url:(t,r,n)=>`ws://playground.internal/?${new URLSearchParams({host:r,port:n}).toString()}`,subprotocol:"binary",decorator:()=>class extends et{constructor(t,r){super(t,r,{CAroot:e.CAroot,corsProxyUrl:e.corsProxyUrl})}}}});class et{constructor(e,t,{CAroot:r,corsProxyUrl:n,outputType:s="messages"}={}){this.CONNECTING=0,this.OPEN=1,this.CLOSING=2,this.CLOSED=3,this.readyState=this.CONNECTING,this.binaryType="blob",this.bufferedAmount=0,this.extensions="",this.protocol="ws",this.host="",this.port=0,this.listeners=new Map,this.clientUpstream=new TransformStream,this.clientUpstreamWriter=this.clientUpstream.writable.getWriter(),this.clientDownstream=new TransformStream,this.fetchInitiated=!1,this.bufferedBytesFromClient=new Uint8Array(0),this.url=e,this.options=t;const a=new URL(e);this.host=a.searchParams.get("host"),this.port=parseInt(a.searchParams.get("port"),10),this.binaryType="arraybuffer",this.corsProxyUrl=n,this.CAroot=r,s==="messages"&&this.clientDownstream.readable.pipeTo(new WritableStream({write:_=>{this.emit("message",{data:_})},abort:()=>{this.emit("error",new Error("ECONNREFUSED")),this.close()},close:()=>{this.close()}})).catch(()=>{}),this.readyState=this.OPEN,this.emit("open")}on(e,t){this.addEventListener(e,t)}once(e,t){const r=n=>{t(n),this.removeEventListener(e,r)};this.addEventListener(e,r)}addEventListener(e,t){this.listeners.has(e)||this.listeners.set(e,new Set),this.listeners.get(e).add(t)}removeListener(e,t){this.removeEventListener(e,t)}removeEventListener(e,t){const r=this.listeners.get(e);r&&r.delete(t)}emit(e,t={}){e==="message"?this.onmessage(t):e==="close"?this.onclose(t):e==="error"?this.onerror(t):e==="open"&&this.onopen(t);const r=this.listeners.get(e);if(r)for(const n of r)n(t)}onclose(e){}onerror(e){}onmessage(e){}onopen(e){}send(e){if(!(this.readyState===this.CLOSING||this.readyState===this.CLOSED)&&(this.clientUpstreamWriter.write(new Uint8Array(e)),!this.fetchInitiated))switch(this.bufferedBytesFromClient=h.concatUint8Arrays([this.bufferedBytesFromClient,new Uint8Array(e)]),rt(this.port,this.bufferedBytesFromClient)){case!1:return;case"other":this.emit("error",new Error("Unsupported protocol")),this.close();break;case"tls":this.fetchOverTLS(),this.fetchInitiated=!0;break;case"http":this.fetchOverHTTP(),this.fetchInitiated=!0;break}}async fetchOverTLS(){if(!this.CAroot)throw new Error("TLS protocol is only supported when the TCPOverFetchWebsocket is instantiated with a CAroot");const e=await Ae({subject:{commonName:this.host,organizationName:this.host,countryName:"US"},issuer:this.CAroot.tbsDescription.subject},this.CAroot.keyPair),t=new je;this.clientUpstream.readable.pipeTo(t.clientEnd.upstream.writable).catch(()=>{}),t.clientEnd.downstream.readable.pipeTo(this.clientDownstream.writable).catch(()=>{}),await t.TLSHandshake(e.keyPair.privateKey,[e.certificate,this.CAroot.certificate]);const r=await g.parseHttpRequest(t.serverEnd.upstream.readable,this.host,"https");try{await g.fetchRawResponseBytes(r,this.corsProxyUrl).pipeTo(t.serverEnd.downstream.writable)}catch{}}async fetchOverHTTP(){const e=await g.parseHttpRequest(this.clientUpstream.readable,this.host,"http");try{await g.fetchRawResponseBytes(e,this.corsProxyUrl).pipeTo(this.clientDownstream.writable)}catch{}}close(){this.emit("message",{data:new Uint8Array(0)}),this.readyState=this.CLOSING,this.emit("close"),this.readyState=this.CLOSED}}const tt=["GET","POST","HEAD","PATCH","OPTIONS","DELETE","PUT","TRACE"];function rt(i,e){if(e.length<8)return!1;if(i===443&&e[0]===l.Handshake&&e[1]===3&&e[2]>=1&&e[2]<=3)return"tls";const r=new TextDecoder("latin1",{fatal:!0}).decode(e);return tt.some(s=>r.startsWith(s+" "))?"http":"other"}class g{static fetchRawResponseBytes(e,t){return new ReadableStream({async start(r){var _;let n;try{n=await Ee(e,void 0,t)}catch(S){r.enqueue(new TextEncoder().encode(`HTTP/1.1 400 Bad Request\r
|
|
7
7
|
Content-Length: 0\r
|
|
8
8
|
\r
|
|
9
|
-
`)),r.error(
|
|
10
|
-
`)),r.enqueue(
|
|
11
|
-
`))),
|
|
9
|
+
`)),r.error(S);return}r.enqueue(g.headersAsBytes(n));const s=(_=n.body)==null?void 0:_.getReader();if(!s){r.close();return}const a=new TextEncoder;for(;;){const{done:S,value:c}=await s.read();if(c&&(r.enqueue(a.encode(`${c.length.toString(16)}\r
|
|
10
|
+
`)),r.enqueue(c),r.enqueue(a.encode(`\r
|
|
11
|
+
`))),S){r.enqueue(a.encode(`0\r
|
|
12
12
|
\r
|
|
13
|
-
`)),r.close();return}}}})}static headersAsBytes(e){const t=`HTTP/1.1 ${e.status} ${e.statusText}`,r={};e.headers.forEach((a,_)=>{r[_.toLowerCase()]=a}),delete r["content-length"],r["transfer-encoding"]="chunked";const n=[];for(const[a,_]of Object.entries(r))n.push(`${a}: ${_}`);const
|
|
13
|
+
`)),r.close();return}}}})}static headersAsBytes(e){const t=`HTTP/1.1 ${e.status} ${e.statusText}`,r={};e.headers.forEach((a,_)=>{r[_.toLowerCase()]=a}),delete r["content-length"],r["transfer-encoding"]="chunked";const n=[];for(const[a,_]of Object.entries(r))n.push(`${a}: ${_}`);const s=[t,...n].join(`\r
|
|
14
14
|
`)+`\r
|
|
15
15
|
\r
|
|
16
|
-
`;return new TextEncoder().encode(
|
|
16
|
+
`;return new TextEncoder().encode(s)}static async parseHttpRequest(e,t,r){let n=new Uint8Array(0),s=!1,a=-1;const _=e.getReader();for(;a===-1;){const{done:x,value:U}=await _.read();if(x){s=!0;break}n=h.concatUint8Arrays([n,U]),a=nt(n,new Uint8Array([13,10,13,10]))}_.releaseLock();const S=n.slice(0,a),c=g.parseRequestHeaders(S),C=c.headers.get("Transfer-Encoding")!==null?"chunked":"content-length",A=c.headers.get("Content-Length")!==null?parseInt(c.headers.get("Content-Length"),10):void 0,u=n.slice(a+4);let E;if(c.method!=="GET"){const x=e.getReader();let U=u.length,N=u.slice(-6);const pe=new TextEncoder().encode(`0\r
|
|
17
17
|
\r
|
|
18
|
-
`);
|
|
19
|
-
`)[0],[n,
|
|
20
|
-
`).slice(1)){if(_==="")break;const[c
|
|
18
|
+
`);E=new ReadableStream({async start(P){u.length>0&&P.enqueue(u),s&&P.close()},async pull(P){const{done:we,value:K}=await x.read();if(U+=(K==null?void 0:K.length)||0,K&&(P.enqueue(K),N=h.concatUint8Arrays([N,K||new Uint8Array]).slice(-5)),we||C==="content-length"&&A!==void 0&&U>=A||C==="chunked"&&N.every((ye,Le)=>ye===pe[Le])){P.close();return}}}),C==="chunked"&&(E=E.pipeThrough(new Ze))}const y=c.headers.get("Host")??t,fe=new URL(c.path,r+"://"+y);return new Request(fe.toString(),{method:c.method,headers:c.headers,body:E,duplex:"half"})}static parseRequestHeaders(e){const t=new TextDecoder().decode(e),r=t.split(`
|
|
19
|
+
`)[0],[n,s]=r.split(" "),a=new Headers;for(const _ of t.split(`\r
|
|
20
|
+
`).slice(1)){if(_==="")break;const[S,c]=_.split(": ");a.set(S,c)}return{method:n,path:s,headers:a}}}function nt(i,e){const t=i.length,r=e.length,n=t-r;for(let s=0;s<=n;s++){let a=!0;for(let _=0;_<r;_++)if(i[s+_]!==e[_]){a=!1;break}if(a)return s}return-1}async function st(i=d.LatestSupportedPHPVersion){switch(i){case"8.5":return(await import("@php-wasm/web-8-5")).getIntlExtensionPath();case"8.4":return(await import("@php-wasm/web-8-4")).getIntlExtensionPath();case"8.3":return(await import("@php-wasm/web-8-3")).getIntlExtensionPath();case"8.2":return(await import("@php-wasm/web-8-2")).getIntlExtensionPath();case"8.1":return(await import("@php-wasm/web-8-1")).getIntlExtensionPath();case"8.0":return(await import("@php-wasm/web-8-0")).getIntlExtensionPath();case"7.4":return(await import("@php-wasm/web-7-4")).getIntlExtensionPath();case"7.3":return(await import("@php-wasm/web-7-3")).getIntlExtensionPath();case"7.2":return(await import("@php-wasm/web-7-2")).getIntlExtensionPath()}throw new Error(`Unsupported PHP version ${i}`)}async function it(i=d.LatestSupportedPHPVersion,e){const t=Pe.createMemoizedFetch(fetch),r="intl.so",n="icu.dat",s=await st(i),a=(await import("./lib/extensions/intl/shared/icu.dat")).default,[_,S]=await Promise.all([t(s).then(c=>c.arrayBuffer()),t(a).then(c=>c.arrayBuffer())]);return{...e,ENV:{...e.ENV,PHP_INI_SCAN_DIR:"/internal/shared/extensions",ICU_DATA:"/internal/shared"},onRuntimeInitialized:c=>{e.onRuntimeInitialized&&e.onRuntimeInitialized(c),d.FSHelpers.fileExists(c.FS,"/internal/shared/extensions")||c.FS.mkdirTree("/internal/shared/extensions"),d.FSHelpers.fileExists(c.FS,`/internal/shared/extensions/${r}`)||c.FS.writeFile(`/internal/shared/extensions/${r}`,new Uint8Array(_)),d.FSHelpers.fileExists(c.FS,"/internal/shared/extensions/intl.ini")||c.FS.writeFile("/internal/shared/extensions/intl.ini",[`extension=/internal/shared/extensions/${r}`].join(`
|
|
21
|
+
`)),d.FSHelpers.fileExists(c.FS,`${c.ENV.ICU_DATA}/${n}`)||(c.FS.mkdirTree(c.ENV.ICU_DATA),c.FS.writeFile(`${c.ENV.ICU_DATA}/icudt74l.dat`,new Uint8Array(S)))}}}const at=()=>({websocket:{decorator:i=>class extends i{constructor(){try{super()}catch{}}send(){return null}}}});async function _t(i,e={}){var s;"setImmediate"in globalThis||(globalThis.setImmediate=a=>setTimeout(a,0));let t={...at(),...e.emscriptenOptions||{}};e.tcpOverFetch&&(t=Qe(t,e.tcpOverFetch)),e.withIntl&&(t=it(i,t));const[r,n]=await Promise.all([ae(i),t]);return(s=e.onPhpLoaderModuleLoaded)==null||s.call(e,r),await d.loadPHPRuntime(r,n)}function ot(i,e){window.addEventListener("message",t=>{t.source===i.contentWindow&&(e&&t.origin!==e||typeof t.data!="object"||t.data.type!=="relay"||window.parent.postMessage(t.data,"*"))}),window.addEventListener("message",t=>{var r;t.source===window.parent&&(typeof t.data!="object"||t.data.type!=="relay"||(r=i==null?void 0:i.contentWindow)==null||r.postMessage(t.data))})}async function ct(i){const e=new Worker(i,{type:"module"});return new Promise((t,r)=>{e.onerror=s=>{const a=new Error(`WebWorker failed to load at ${i}. ${s.message?`Original error: ${s.message}`:""}`);a.filename=s.filename,r(a)};function n(s){s.data==="worker-script-started"&&(t(e),e.removeEventListener("message",n))}e.addEventListener("message",n)})}function St(i,e={initialSync:{}}){return e={...e,initialSync:{...e.initialSync,direction:e.initialSync.direction??"opfs-to-memfs"}},async function(t,r,n){return e.initialSync.direction==="opfs-to-memfs"?(d.FSHelpers.fileExists(r,n)&&d.FSHelpers.rmdir(r,n),d.FSHelpers.mkdir(r,n),await lt(r,i,n)):await Te(r,i,n,e.initialSync.onProgress),ht(t,i,n)}}async function lt(i,e,t){d.FSHelpers.mkdir(i,t);const r=new h.Semaphore({concurrency:40}),n=[],s=[[e,t]];for(;s.length>0;){const[a,_]=s.pop();for await(const S of a.values()){const c=r.run(async()=>{const C=h.joinPaths(_,S.name);if(S.kind==="directory"){try{i.mkdir(C)}catch(A){if((A==null?void 0:A.errno)!==20)throw M.logger.error(A),A}s.push([S,C])}else if(S.kind==="file"){const A=await S.getFile(),u=new Uint8Array(await A.arrayBuffer());i.createDataFile(_,S.name,u,!0,!0,!0)}n.splice(n.indexOf(c),1)});n.push(c)}for(;s.length===0&&n.length>0;)await Promise.any(n)}}async function Te(i,e,t,r){i.mkdirTree(t);const n=[];async function s(C,A){await Promise.all(i.readdir(C).filter(u=>u!=="."&&u!=="..").map(async u=>{const E=h.joinPaths(C,u);if(!Ct(i,E)){n.push([A,E,u]);return}const y=await A.getDirectoryHandle(u,{create:!0});return await s(E,y)}))}await s(t,e);let a=0;const _=r&&Ht(r,100),S=100,c=new Set;try{for(const[C,A,u]of n){const E=F(C,u,i,A).then(()=>{a++,c.delete(E),_==null||_({files:a,total:n.length})});c.add(E),c.size>=S&&(await Promise.race(c),_==null||_({files:a,total:n.length}))}}finally{await Promise.allSettled(c)}}function Ct(i,e){return i.isDir(i.lookupPath(e,{follow:!0}).node.mode)}async function F(i,e,t,r){let n;try{n=t.readFile(r,{encoding:"binary"})}catch{return}const s=await i.getFileHandle(e,{create:!0}),a=s.createWritable!==void 0?await s.createWritable():await s.createSyncAccessHandle();try{await a.truncate(0),await a.write(n)}finally{await a.close()}}function ht(i,e,t){const r=[],n=$.journalFSEvents(i,t,_=>{r.push(_)}),s=new At(i,e,t);async function a(){if(r.length===0)return;const _=await i.semaphore.acquire(),S=[...r];r.splice(0,S.length);const c=$.normalizeFilesystemOperations(S);try{for(const C of c)await s.processEntry(C)}finally{_()}}return i.addEventListener("request.end",a),i.addEventListener("filesystem.write",a),function(){n(),i.removeEventListener("request.end",a),i.removeEventListener("filesystem.write",a)}}class At{constructor(e,t,r){this.php=e,this.opfs=t,this.memfsRoot=se(r)}toOpfsPath(e){return se(e.substring(this.memfsRoot.length))}async processEntry(e){if(!e.path.startsWith(this.memfsRoot)||e.path===this.memfsRoot)return;const t=this.toOpfsPath(e.path),r=await ie(this.opfs,t),n=ut(t);if(n)try{if(e.operation==="DELETE")try{await r.removeEntry(n,{recursive:!0})}catch{}else if(e.operation==="CREATE")e.nodeType==="directory"?await r.getDirectoryHandle(n,{create:!0}):await r.getFileHandle(n,{create:!0});else if(e.operation==="WRITE")await F(r,n,this.php[d.__private__dont__use].FS,e.path);else if(e.operation==="RENAME"&&e.toPath.startsWith(this.memfsRoot)){const s=this.toOpfsPath(e.toPath),a=await ie(this.opfs,s);if(e.nodeType==="directory"){const _=await a.getDirectoryHandle(n,{create:!0});await Te(this.php[d.__private__dont__use].FS,_,e.toPath),await r.removeEntry(n,{recursive:!0})}else{try{await r.removeEntry(n)}catch{}await F(a,h.basename(s),this.php[d.__private__dont__use].FS,e.toPath)}}}catch(s){throw M.logger.log({entry:e,name:n}),M.logger.error(s),s}}}function se(i){return i.replace(/\/$/,"").replace(/\/\/+/g,"/")}function ut(i){return i.substring(i.lastIndexOf("/")+1)}async function ie(i,e){const t=e.replace(/^\/+|\/+$/g,"").replace(/\/+/,"/");if(!t)return i;const r=t.split("/");let n=i;for(let s=0;s<r.length-1;s++){const a=r[s];n=await n.getDirectoryHandle(a,{create:!0})}return n}function Ht(i,e){let t=0,r,n;return function(...a){n=a;const _=Date.now()-t;if(r===void 0){const S=Math.max(0,e-_);r=setTimeout(()=>{r=void 0,t=Date.now(),i(...n)},S)}}}Object.defineProperty(exports,"consumeAPI",{enumerable:!0,get:()=>d.consumeAPI});Object.defineProperty(exports,"exposeAPI",{enumerable:!0,get:()=>d.exposeAPI});exports.FirewallInterferenceError=de;exports.certificateToPEM=$e;exports.createDirectoryHandleMountHandler=St;exports.fetchWithCorsProxy=Ee;exports.generateCertificate=Ae;exports.getPHPLoaderModule=ae;exports.loadWebRuntime=_t;exports.privateKeyToPEM=Ve;exports.setupPostMessageRelay=ot;exports.spawnPHPWorkerThread=ct;
|
|
21
22
|
//# sourceMappingURL=index.cjs.map
|