@super-protocol/sdk-js 4.0.15 → 4.0.17

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,237 +0,0 @@
1
- "use strict";
2
- var __importDefault = (this && this.__importDefault) || function (mod) {
3
- return (mod && mod.__esModule) ? mod : { "default": mod };
4
- };
5
- Object.defineProperty(exports, "__esModule", { value: true });
6
- exports.CertificateGenerator = void 0;
7
- const assert_1 = __importDefault(require("assert"));
8
- const node_forge_1 = __importDefault(require("node-forge"));
9
- const x509_1 = require("@peculiar/x509");
10
- const setup_crypto_js_1 = require("./setup-crypto.js");
11
- const CryptoKeysTransformer_js_1 = require("../utils/CryptoKeysTransformer.js");
12
- const helper_js_1 = require("../utils/helper.js");
13
- const helper_js_2 = require("./helper.js");
14
- const ONE_HOUR_MS = 60 * 60 * 1000; // 1 hour in milliseconds
15
- const notAllowedCertificateCustomExtensions = [...Object.values(node_forge_1.default.pki.oids)];
16
- class CertificateGenerator {
17
- /**
18
- * Generates certificate based on the provided parameters.
19
- * @param params - Parameters for generating the certificate.
20
- * @returns The generated certificate in PEM format.
21
- */
22
- static async generateCert(params) {
23
- const ca = Boolean(params.ca);
24
- const { publicKey: subjectPublicKey, privateKey: signerPrivateKey } = await CertificateGenerator.getCryptoKeys(params);
25
- const signingAlgorithm = subjectPublicKey.algorithm;
26
- const extensions = [new x509_1.BasicConstraintsExtension(ca, undefined, true)];
27
- const extendedKeyUsageItems = [];
28
- if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
29
- const generalNames = params.dnsNames.map((dnsName) => ({
30
- type: ((0, helper_js_1.isIpAddress)(dnsName) ? 'ip' : 'dns'),
31
- value: dnsName,
32
- }));
33
- extensions.push(new x509_1.SubjectAlternativeNameExtension(generalNames));
34
- extendedKeyUsageItems.push(...[x509_1.ExtendedKeyUsage.serverAuth, x509_1.ExtendedKeyUsage.clientAuth]);
35
- }
36
- if (params.ocspSigning) {
37
- extendedKeyUsageItems.push(x509_1.ExtendedKeyUsage.ocspSigning);
38
- }
39
- if (params.ocspExtension) {
40
- const { ocspUrl, issuerCertUrl } = params.ocspExtension;
41
- extensions.push(new x509_1.AuthorityInfoAccessExtension({
42
- ocsp: [ocspUrl],
43
- ...(issuerCertUrl ? { caIssuers: [issuerCertUrl] } : {}),
44
- }));
45
- }
46
- if (extendedKeyUsageItems.length) {
47
- extensions.push(new x509_1.ExtendedKeyUsageExtension(extendedKeyUsageItems, false));
48
- }
49
- let keyUsageFlags = x509_1.KeyUsageFlags.digitalSignature | x509_1.KeyUsageFlags.keyEncipherment;
50
- if (params.ca) {
51
- keyUsageFlags |= x509_1.KeyUsageFlags.keyCertSign;
52
- }
53
- extensions.push(new x509_1.KeyUsagesExtension(keyUsageFlags, true));
54
- const signerPublicKey = await CryptoKeysTransformer_js_1.CryptoKeysTransformer.cryptoPublicFromCryptoPrivate(signerPrivateKey);
55
- extensions.push(...[
56
- await x509_1.AuthorityKeyIdentifierExtension.create(signerPublicKey),
57
- await x509_1.SubjectKeyIdentifierExtension.create(subjectPublicKey),
58
- ]);
59
- if (params.customExtensions?.length) {
60
- const filteredExtensions = params.customExtensions.filter((ext) => !notAllowedCertificateCustomExtensions.includes(ext.oid));
61
- for (const customExtension of filteredExtensions) {
62
- if (!customExtension.oid || !customExtension.value) {
63
- throw new Error('Custom extension OID and value are required');
64
- }
65
- extensions.push(new x509_1.Extension(customExtension.oid, false, customExtension.value));
66
- }
67
- }
68
- const createCertificateParams = {
69
- serialNumber: helper_js_2.CertificatesHelper.generateSerialNumber().toString(16),
70
- issuer: helper_js_2.CertificatesHelper.serializePrincipalInfo(params.issuer),
71
- subject: helper_js_2.CertificatesHelper.serializePrincipalInfo(params.subject),
72
- notBefore: new Date(Date.now() - ONE_HOUR_MS), //1 hour ago to avoid clock skew issues between servers
73
- notAfter: params.notAfter,
74
- publicKey: subjectPublicKey,
75
- signingKey: signerPrivateKey,
76
- signingAlgorithm,
77
- extensions,
78
- };
79
- const cert = await x509_1.X509CertificateGenerator.create(createCertificateParams);
80
- return cert.toString('pem');
81
- }
82
- /**
83
- * Generates a pair of cryptographic keys based on the specified signature algorithm.
84
- * @param signatureAlgorithm - The algorithm to use for key generation.
85
- * @returns A promise that resolves to a CryptoKeyPair containing the public and private keys.
86
- */
87
- static generateKeys(signatureAlgorithm) {
88
- const algorithm = CertificateGenerator.getAlgorithm(signatureAlgorithm);
89
- return setup_crypto_js_1.cryptoProvider.subtle.generateKey(algorithm, true, ['sign', 'verify']);
90
- }
91
- /**
92
- * Generates a Certificate Signing Request (CSR) based on the provided parameters.
93
- * @param params - Parameters for generating the CSR.
94
- * @returns The generated CSR in PEM format.
95
- */
96
- static async generateCsr(params) {
97
- const keys = await CertificateGenerator.getCryptoKeys(params);
98
- const signingAlgorithm = keys.publicKey.algorithm;
99
- signingAlgorithm.hash = { name: 'SHA-256' };
100
- const extensions = [];
101
- if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
102
- const generalNames = params.dnsNames.map((dnsName) => ({
103
- type: ((0, helper_js_1.isIpAddress)(dnsName) ? 'ip' : 'dns'),
104
- value: dnsName,
105
- }));
106
- extensions.push(new x509_1.SubjectAlternativeNameExtension(generalNames));
107
- }
108
- if (params.customExtensions?.length) {
109
- for (const customExtension of params.customExtensions) {
110
- if (!customExtension.oid || !customExtension.value) {
111
- throw new Error(`Some custom extension missed OID or value`);
112
- }
113
- extensions.push(new x509_1.Extension(customExtension.oid, false, customExtension.value));
114
- }
115
- }
116
- const createCsrParams = {
117
- name: helper_js_2.CertificatesHelper.serializePrincipalInfo(params.subject),
118
- keys,
119
- signingAlgorithm,
120
- extensions,
121
- };
122
- const csr = await x509_1.Pkcs10CertificateRequestGenerator.create(createCsrParams);
123
- return csr.toString('pem');
124
- }
125
- /**
126
- * Verifies self-signed certificate
127
- * @param rawCert - the certificate
128
- * @returns An object containing the verification result.
129
- */
130
- static verifySelfSignedCert(rawCert) {
131
- const cert = new x509_1.X509Certificate(rawCert);
132
- if (cert.issuer !== cert.subject) {
133
- return Promise.resolve({ isValid: false });
134
- }
135
- return cert.verify().then((isValid) => ({ isValid }));
136
- }
137
- /**
138
- * Parses a certificate
139
- * @param rawCert - the certificate
140
- * @returns An object containing the parsed certificate details.
141
- */
142
- static async parseCert(rawCert) {
143
- const cert = new x509_1.X509Certificate(rawCert);
144
- const publicKey = await setup_crypto_js_1.cryptoProvider.subtle.importKey('spki', cert.publicKey.rawData, Object.assign(cert.signatureAlgorithm, cert.publicKey.algorithm), true, ['verify']);
145
- const authorityKeyIdentifierExt = cert.extensions.find((ext) => ext instanceof x509_1.AuthorityKeyIdentifierExtension);
146
- const authorityKeyIdentifier = authorityKeyIdentifierExt?.keyId;
147
- const subjectKeyIdentifierExt = cert.extensions.find((ext) => ext instanceof x509_1.SubjectKeyIdentifierExtension);
148
- const subjectKeyIdentifier = subjectKeyIdentifierExt?.keyId;
149
- return {
150
- serialNumberHex: cert.serialNumber,
151
- publicKey,
152
- subject: cert.subject,
153
- issuer: cert.issuer,
154
- notBefore: cert.notBefore,
155
- notAfter: cert.notAfter,
156
- dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(cert.extensions),
157
- authorityKeyIdentifier,
158
- subjectKeyIdentifier,
159
- extensions: cert.extensions
160
- .filter((ext) => ext.type !== node_forge_1.default.pki.oids['subjectAltName'])
161
- .map((ext) => ({
162
- oid: ext.type,
163
- value: Buffer.from(ext.value),
164
- })),
165
- };
166
- }
167
- /**
168
- * Checks and parses a Certificate Signing Request (CSR) in PEM format.
169
- * @param csrPem - The CSR in PEM format.
170
- * @returns An object containing the parsed CSR details.
171
- */
172
- static async checkAndParseCsr(csrPem) {
173
- const csr = new x509_1.Pkcs10CertificateRequest(csrPem);
174
- const isValid = await csr.verify();
175
- if (!isValid) {
176
- throw new Error('CSR signature verification failed');
177
- }
178
- const publicKey = await setup_crypto_js_1.cryptoProvider.subtle.importKey('spki', csr.publicKey.rawData, Object.assign(csr.signatureAlgorithm, csr.publicKey.algorithm), true, ['verify']);
179
- const parsedCsr = {
180
- subject: csr.subject,
181
- publicKey,
182
- dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(csr.extensions),
183
- extensions: csr.extensions
184
- .filter((ext) => ext.type !== node_forge_1.default.pki.oids['subjectAltName'])
185
- .map((ext) => ({
186
- oid: ext.type,
187
- value: Buffer.from(ext.value),
188
- })),
189
- };
190
- return parsedCsr;
191
- }
192
- static async getCryptoKeys({ privateKey, publicKey }) {
193
- const [pubKey, privKey] = await Promise.all([
194
- typeof publicKey === 'string'
195
- ? CryptoKeysTransformer_js_1.CryptoKeysTransformer.spkiPemToCryptoKey(publicKey)
196
- : publicKey,
197
- typeof privateKey === 'string'
198
- ? CryptoKeysTransformer_js_1.CryptoKeysTransformer.pkcs8PemToCryptoKey(privateKey)
199
- : privateKey,
200
- ]);
201
- assert_1.default.deepEqual(pubKey.algorithm, privKey.algorithm, 'Both keys must have same algorithm defined');
202
- return { publicKey: pubKey, privateKey: privKey };
203
- }
204
- static getAlgorithm(signatureAlgorithm) {
205
- switch (signatureAlgorithm) {
206
- case 'RSASSA-PKCS1-SHA256':
207
- return {
208
- name: 'RSASSA-PKCS1-v1_5',
209
- hash: 'SHA-256',
210
- publicExponent: new Uint8Array([1, 0, 1]), // 65537
211
- modulusLength: 2048,
212
- };
213
- case 'ECDSA-P-256-SHA256':
214
- return {
215
- name: 'ECDSA',
216
- namedCurve: 'P-256',
217
- };
218
- case 'ECDSA-secp256k1-SHA256':
219
- return {
220
- name: 'ECDSA',
221
- namedCurve: 'K-256',
222
- };
223
- default:
224
- throw new Error(`Unsupported signature algorithm: ${signatureAlgorithm}`);
225
- }
226
- }
227
- static extractDnsNamesFromExtensions(extensions) {
228
- const subjectAltNameExt = extensions.find((ext) => ext.type === node_forge_1.default.pki.oids['subjectAltName']);
229
- if (!subjectAltNameExt) {
230
- return;
231
- }
232
- const dnsNames = subjectAltNameExt.names.items.map((item) => item.value);
233
- return dnsNames;
234
- }
235
- }
236
- exports.CertificateGenerator = CertificateGenerator;
237
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"generator.js","sourceRoot":"","sources":["../../../src/certificates/generator.ts"],"names":[],"mappings":";;;;;;AAAA,oDAA4B;AAC5B,4DAA+B;AAC/B,yCAoBwB;AAUxB,uDAAmD;AACnD,gFAA0E;AAC1E,kDAAiD;AACjD,2CAAiD;AAEjD,MAAM,WAAW,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,yBAAyB;AAE7D,MAAM,qCAAqC,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,oBAAK,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;AAEjF,MAAa,oBAAoB;IAC/B;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,MAA0B;QAClD,MAAM,EAAE,GAAG,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QAE9B,MAAM,EAAE,SAAS,EAAE,gBAAgB,EAAE,UAAU,EAAE,gBAAgB,EAAE,GACjE,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACnD,MAAM,gBAAgB,GAAG,gBAAgB,CAAC,SAAyB,CAAC;QAEpE,MAAM,UAAU,GAAgB,CAAC,IAAI,gCAAyB,CAAC,EAAE,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC,CAAC;QAErF,MAAM,qBAAqB,GAAuB,EAAE,CAAC;QAErD,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,IAAA,uBAAW,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,sCAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;YAEnE,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC,uBAAgB,CAAC,UAAU,EAAE,uBAAgB,CAAC,UAAU,CAAC,CAAC,CAAC;QAC5F,CAAC;QAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YACvB,qBAAqB,CAAC,IAAI,CAAC,uBAAgB,CAAC,WAAW,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;YACzB,MAAM,EAAE,OAAO,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC,aAAa,CAAC;YACxD,UAAU,CAAC,IAAI,CACb,IAAI,mCAA4B,CAAC;gBAC/B,IAAI,EAAE,CAAC,OAAO,CAAC;gBACf,GAAG,CAAC,aAAa,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;aACzD,CAAC,CACH,CAAC;QACJ,CAAC;QAED,IAAI,qBAAqB,CAAC,MAAM,EAAE,CAAC;YACjC,UAAU,CAAC,IAAI,CAAC,IAAI,gCAAyB,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC,CAAC;QAC/E,CAAC;QAED,IAAI,aAAa,GAAG,oBAAa,CAAC,gBAAgB,GAAG,oBAAa,CAAC,eAAe,CAAC;QACnF,IAAI,MAAM,CAAC,EAAE,EAAE,CAAC;YACd,aAAa,IAAI,oBAAa,CAAC,WAAW,CAAC;QAC7C,CAAC;QACD,UAAU,CAAC,IAAI,CAAC,IAAI,yBAAkB,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC,CAAC;QAE7D,MAAM,eAAe,GACnB,MAAM,gDAAqB,CAAC,6BAA6B,CAAC,gBAAgB,CAAC,CAAC;QAC9E,UAAU,CAAC,IAAI,CACb,GAAG;YACD,MAAM,sCAA+B,CAAC,MAAM,CAAC,eAAe,CAAC;YAC7D,MAAM,oCAA6B,CAAC,MAAM,CAAC,gBAAgB,CAAC;SAC7D,CACF,CAAC;QAEF,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,MAAM,kBAAkB,GAAG,MAAM,CAAC,gBAAgB,CAAC,MAAM,CACvD,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC,qCAAqC,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,CAClE,CAAC;YACF,KAAK,MAAM,eAAe,IAAI,kBAAkB,EAAE,CAAC;gBACjD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;gBACjE,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,gBAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,uBAAuB,GAAgC;YAC3D,YAAY,EAAE,8BAAkB,CAAC,oBAAoB,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC;YACpE,MAAM,EAAE,8BAAkB,CAAC,sBAAsB,CAAC,MAAM,CAAC,MAAM,CAAC;YAChE,OAAO,EAAE,8BAAkB,CAAC,sBAAsB,CAAC,MAAM,CAAC,OAAO,CAAC;YAClE,SAAS,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,WAAW,CAAC,EAAE,uDAAuD;YACtG,QAAQ,EAAE,MAAM,CAAC,QAAQ;YACzB,SAAS,EAAE,gBAAgB;YAC3B,UAAU,EAAE,gBAAgB;YAC5B,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,IAAI,GAAG,MAAM,+BAAwB,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;QAE5E,OAAO,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC9B,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,YAAY,CAAC,kBAAsC;QACxD,MAAM,SAAS,GAAG,oBAAoB,CAAC,YAAY,CAAC,kBAAkB,CAAC,CAAC;QACxE,OAAO,gCAAc,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,EAAE,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;IAChF,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,MAAyB;QAChD,MAAM,IAAI,GAAG,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QAC9D,MAAM,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,SAAyB,CAAC;QAClE,gBAAgB,CAAC,IAAI,GAAG,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;QAE5C,MAAM,UAAU,GAAgB,EAAE,CAAC;QAEnC,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,IAAA,uBAAW,EAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,sCAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,KAAK,MAAM,eAAe,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;gBACtD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;gBAC/D,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,gBAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,eAAe,GAAyC;YAC5D,IAAI,EAAE,8BAAkB,CAAC,sBAAsB,CAAC,MAAM,CAAC,OAAO,CAAC;YAC/D,IAAI;YACJ,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,wCAAiC,CAAC,MAAM,CAAC,eAAe,CAAC,CAAC;QAE5E,OAAO,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC7B,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,oBAAoB,CAAC,OAAuB;QACjD,MAAM,IAAI,GAAG,IAAI,sBAAe,CAAC,OAAO,CAAC,CAAC;QAE1C,IAAI,IAAI,CAAC,MAAM,KAAK,IAAI,CAAC,OAAO,EAAE,CAAC;YACjC,OAAO,OAAO,CAAC,OAAO,CAAC,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,CAAC;QAC7C,CAAC;QAED,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;IACxD,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CAAC,OAAuB;QAC5C,MAAM,IAAI,GAAG,IAAI,sBAAe,CAAC,OAAO,CAAC,CAAC;QAE1C,MAAM,SAAS,GAAG,MAAM,gCAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,IAAI,CAAC,SAAS,CAAC,OAAO,EACtB,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAChE,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,MAAM,yBAAyB,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CACpD,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,YAAY,sCAA+B,CACT,CAAC;QACjD,MAAM,sBAAsB,GAAG,yBAAyB,EAAE,KAAK,CAAC;QAEhE,MAAM,uBAAuB,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAClD,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,YAAY,oCAA6B,CACT,CAAC;QAC/C,MAAM,oBAAoB,GAAG,uBAAuB,EAAE,KAAK,CAAC;QAE5D,OAAO;YACL,eAAe,EAAE,IAAI,CAAC,YAAY;YAClC,SAAS;YACT,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,MAAM,EAAE,IAAI,CAAC,MAAM;YACnB,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,IAAI,CAAC,UAAU,CAAC;YAC7E,sBAAsB;YACtB,oBAAoB;YACpB,UAAU,EAAE,IAAI,CAAC,UAAU;iBACxB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,oBAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,MAAM,GAAG,GAAG,IAAI,+BAAwB,CAAC,MAAM,CAAC,CAAC;QAEjD,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,MAAM,EAAE,CAAC;QACnC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,SAAS,GAAG,MAAM,gCAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,GAAG,CAAC,SAAS,CAAC,OAAO,EACrB,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,kBAAkB,EAAE,GAAG,CAAC,SAAS,CAAC,SAAS,CAAC,EAC9D,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,MAAM,SAAS,GAAc;YAC3B,OAAO,EAAE,GAAG,CAAC,OAAO;YACpB,SAAS;YACT,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,GAAG,CAAC,UAAU,CAAC;YAC5E,UAAU,EAAE,GAAG,CAAC,UAAU;iBACvB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,oBAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;QAEF,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,aAAa,CAAC,EAAE,UAAU,EAAE,SAAS,EAAmB;QAI3E,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YAC1C,OAAO,SAAS,KAAK,QAAQ;gBAC3B,CAAC,CAAC,gDAAqB,CAAC,kBAAkB,CAAC,SAAS,CAAC;gBACrD,CAAC,CAAC,SAAS;YACb,OAAO,UAAU,KAAK,QAAQ;gBAC5B,CAAC,CAAC,gDAAqB,CAAC,mBAAmB,CAAC,UAAU,CAAC;gBACvD,CAAC,CAAC,UAAU;SACf,CAAC,CAAC;QAEH,gBAAM,CAAC,SAAS,CACd,MAAM,CAAC,SAAS,EAChB,OAAO,CAAC,SAAS,EACjB,4CAA4C,CAC7C,CAAC;QAEF,OAAO,EAAE,SAAS,EAAE,MAAM,EAAE,UAAU,EAAE,OAAO,EAAE,CAAC;IACpD,CAAC;IAEO,MAAM,CAAC,YAAY,CAAC,kBAA0B;QACpD,QAAQ,kBAAkB,EAAE,CAAC;YAC3B,KAAK,qBAAqB;gBACxB,OAAO;oBACL,IAAI,EAAE,mBAAmB;oBACzB,IAAI,EAAE,SAAS;oBACf,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,QAAQ;oBACnD,aAAa,EAAE,IAAI;iBACpB,CAAC;YACJ,KAAK,oBAAoB;gBACvB,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ,KAAK,wBAAwB;gBAC3B,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ;gBACE,MAAM,IAAI,KAAK,CAAC,oCAAoC,kBAAkB,EAAE,CAAC,CAAC;QAC9E,CAAC;IACH,CAAC;IAEO,MAAM,CAAC,6BAA6B,CAAC,UAAuB;QAClE,MAAM,iBAAiB,GAAG,UAAU,CAAC,IAAI,CACvC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,oBAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CACR,CAAC;QACjD,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACvB,OAAO;QACT,CAAC;QAED,MAAM,QAAQ,GAAG,iBAAiB,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACzE,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF;AArSD,oDAqSC"}
@@ -1,230 +0,0 @@
1
- import assert from 'assert';
2
- import forge from 'node-forge';
3
- import { X509CertificateGenerator, BasicConstraintsExtension, ExtendedKeyUsageExtension, Extension, SubjectAlternativeNameExtension, ExtendedKeyUsage, KeyUsageFlags, KeyUsagesExtension, Pkcs10CertificateRequestGenerator, Pkcs10CertificateRequest, X509Certificate, AuthorityInfoAccessExtension, AuthorityKeyIdentifierExtension, SubjectKeyIdentifierExtension, } from '@peculiar/x509';
4
- import { cryptoProvider } from './setup-crypto.js';
5
- import { CryptoKeysTransformer } from '../utils/CryptoKeysTransformer.js';
6
- import { isIpAddress } from '../utils/helper.js';
7
- import { CertificatesHelper } from './helper.js';
8
- const ONE_HOUR_MS = 60 * 60 * 1000; // 1 hour in milliseconds
9
- const notAllowedCertificateCustomExtensions = [...Object.values(forge.pki.oids)];
10
- export class CertificateGenerator {
11
- /**
12
- * Generates certificate based on the provided parameters.
13
- * @param params - Parameters for generating the certificate.
14
- * @returns The generated certificate in PEM format.
15
- */
16
- static async generateCert(params) {
17
- const ca = Boolean(params.ca);
18
- const { publicKey: subjectPublicKey, privateKey: signerPrivateKey } = await CertificateGenerator.getCryptoKeys(params);
19
- const signingAlgorithm = subjectPublicKey.algorithm;
20
- const extensions = [new BasicConstraintsExtension(ca, undefined, true)];
21
- const extendedKeyUsageItems = [];
22
- if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
23
- const generalNames = params.dnsNames.map((dnsName) => ({
24
- type: (isIpAddress(dnsName) ? 'ip' : 'dns'),
25
- value: dnsName,
26
- }));
27
- extensions.push(new SubjectAlternativeNameExtension(generalNames));
28
- extendedKeyUsageItems.push(...[ExtendedKeyUsage.serverAuth, ExtendedKeyUsage.clientAuth]);
29
- }
30
- if (params.ocspSigning) {
31
- extendedKeyUsageItems.push(ExtendedKeyUsage.ocspSigning);
32
- }
33
- if (params.ocspExtension) {
34
- const { ocspUrl, issuerCertUrl } = params.ocspExtension;
35
- extensions.push(new AuthorityInfoAccessExtension({
36
- ocsp: [ocspUrl],
37
- ...(issuerCertUrl ? { caIssuers: [issuerCertUrl] } : {}),
38
- }));
39
- }
40
- if (extendedKeyUsageItems.length) {
41
- extensions.push(new ExtendedKeyUsageExtension(extendedKeyUsageItems, false));
42
- }
43
- let keyUsageFlags = KeyUsageFlags.digitalSignature | KeyUsageFlags.keyEncipherment;
44
- if (params.ca) {
45
- keyUsageFlags |= KeyUsageFlags.keyCertSign;
46
- }
47
- extensions.push(new KeyUsagesExtension(keyUsageFlags, true));
48
- const signerPublicKey = await CryptoKeysTransformer.cryptoPublicFromCryptoPrivate(signerPrivateKey);
49
- extensions.push(...[
50
- await AuthorityKeyIdentifierExtension.create(signerPublicKey),
51
- await SubjectKeyIdentifierExtension.create(subjectPublicKey),
52
- ]);
53
- if (params.customExtensions?.length) {
54
- const filteredExtensions = params.customExtensions.filter((ext) => !notAllowedCertificateCustomExtensions.includes(ext.oid));
55
- for (const customExtension of filteredExtensions) {
56
- if (!customExtension.oid || !customExtension.value) {
57
- throw new Error('Custom extension OID and value are required');
58
- }
59
- extensions.push(new Extension(customExtension.oid, false, customExtension.value));
60
- }
61
- }
62
- const createCertificateParams = {
63
- serialNumber: CertificatesHelper.generateSerialNumber().toString(16),
64
- issuer: CertificatesHelper.serializePrincipalInfo(params.issuer),
65
- subject: CertificatesHelper.serializePrincipalInfo(params.subject),
66
- notBefore: new Date(Date.now() - ONE_HOUR_MS), //1 hour ago to avoid clock skew issues between servers
67
- notAfter: params.notAfter,
68
- publicKey: subjectPublicKey,
69
- signingKey: signerPrivateKey,
70
- signingAlgorithm,
71
- extensions,
72
- };
73
- const cert = await X509CertificateGenerator.create(createCertificateParams);
74
- return cert.toString('pem');
75
- }
76
- /**
77
- * Generates a pair of cryptographic keys based on the specified signature algorithm.
78
- * @param signatureAlgorithm - The algorithm to use for key generation.
79
- * @returns A promise that resolves to a CryptoKeyPair containing the public and private keys.
80
- */
81
- static generateKeys(signatureAlgorithm) {
82
- const algorithm = CertificateGenerator.getAlgorithm(signatureAlgorithm);
83
- return cryptoProvider.subtle.generateKey(algorithm, true, ['sign', 'verify']);
84
- }
85
- /**
86
- * Generates a Certificate Signing Request (CSR) based on the provided parameters.
87
- * @param params - Parameters for generating the CSR.
88
- * @returns The generated CSR in PEM format.
89
- */
90
- static async generateCsr(params) {
91
- const keys = await CertificateGenerator.getCryptoKeys(params);
92
- const signingAlgorithm = keys.publicKey.algorithm;
93
- signingAlgorithm.hash = { name: 'SHA-256' };
94
- const extensions = [];
95
- if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
96
- const generalNames = params.dnsNames.map((dnsName) => ({
97
- type: (isIpAddress(dnsName) ? 'ip' : 'dns'),
98
- value: dnsName,
99
- }));
100
- extensions.push(new SubjectAlternativeNameExtension(generalNames));
101
- }
102
- if (params.customExtensions?.length) {
103
- for (const customExtension of params.customExtensions) {
104
- if (!customExtension.oid || !customExtension.value) {
105
- throw new Error(`Some custom extension missed OID or value`);
106
- }
107
- extensions.push(new Extension(customExtension.oid, false, customExtension.value));
108
- }
109
- }
110
- const createCsrParams = {
111
- name: CertificatesHelper.serializePrincipalInfo(params.subject),
112
- keys,
113
- signingAlgorithm,
114
- extensions,
115
- };
116
- const csr = await Pkcs10CertificateRequestGenerator.create(createCsrParams);
117
- return csr.toString('pem');
118
- }
119
- /**
120
- * Verifies self-signed certificate
121
- * @param rawCert - the certificate
122
- * @returns An object containing the verification result.
123
- */
124
- static verifySelfSignedCert(rawCert) {
125
- const cert = new X509Certificate(rawCert);
126
- if (cert.issuer !== cert.subject) {
127
- return Promise.resolve({ isValid: false });
128
- }
129
- return cert.verify().then((isValid) => ({ isValid }));
130
- }
131
- /**
132
- * Parses a certificate
133
- * @param rawCert - the certificate
134
- * @returns An object containing the parsed certificate details.
135
- */
136
- static async parseCert(rawCert) {
137
- const cert = new X509Certificate(rawCert);
138
- const publicKey = await cryptoProvider.subtle.importKey('spki', cert.publicKey.rawData, Object.assign(cert.signatureAlgorithm, cert.publicKey.algorithm), true, ['verify']);
139
- const authorityKeyIdentifierExt = cert.extensions.find((ext) => ext instanceof AuthorityKeyIdentifierExtension);
140
- const authorityKeyIdentifier = authorityKeyIdentifierExt?.keyId;
141
- const subjectKeyIdentifierExt = cert.extensions.find((ext) => ext instanceof SubjectKeyIdentifierExtension);
142
- const subjectKeyIdentifier = subjectKeyIdentifierExt?.keyId;
143
- return {
144
- serialNumberHex: cert.serialNumber,
145
- publicKey,
146
- subject: cert.subject,
147
- issuer: cert.issuer,
148
- notBefore: cert.notBefore,
149
- notAfter: cert.notAfter,
150
- dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(cert.extensions),
151
- authorityKeyIdentifier,
152
- subjectKeyIdentifier,
153
- extensions: cert.extensions
154
- .filter((ext) => ext.type !== forge.pki.oids['subjectAltName'])
155
- .map((ext) => ({
156
- oid: ext.type,
157
- value: Buffer.from(ext.value),
158
- })),
159
- };
160
- }
161
- /**
162
- * Checks and parses a Certificate Signing Request (CSR) in PEM format.
163
- * @param csrPem - The CSR in PEM format.
164
- * @returns An object containing the parsed CSR details.
165
- */
166
- static async checkAndParseCsr(csrPem) {
167
- const csr = new Pkcs10CertificateRequest(csrPem);
168
- const isValid = await csr.verify();
169
- if (!isValid) {
170
- throw new Error('CSR signature verification failed');
171
- }
172
- const publicKey = await cryptoProvider.subtle.importKey('spki', csr.publicKey.rawData, Object.assign(csr.signatureAlgorithm, csr.publicKey.algorithm), true, ['verify']);
173
- const parsedCsr = {
174
- subject: csr.subject,
175
- publicKey,
176
- dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(csr.extensions),
177
- extensions: csr.extensions
178
- .filter((ext) => ext.type !== forge.pki.oids['subjectAltName'])
179
- .map((ext) => ({
180
- oid: ext.type,
181
- value: Buffer.from(ext.value),
182
- })),
183
- };
184
- return parsedCsr;
185
- }
186
- static async getCryptoKeys({ privateKey, publicKey }) {
187
- const [pubKey, privKey] = await Promise.all([
188
- typeof publicKey === 'string'
189
- ? CryptoKeysTransformer.spkiPemToCryptoKey(publicKey)
190
- : publicKey,
191
- typeof privateKey === 'string'
192
- ? CryptoKeysTransformer.pkcs8PemToCryptoKey(privateKey)
193
- : privateKey,
194
- ]);
195
- assert.deepEqual(pubKey.algorithm, privKey.algorithm, 'Both keys must have same algorithm defined');
196
- return { publicKey: pubKey, privateKey: privKey };
197
- }
198
- static getAlgorithm(signatureAlgorithm) {
199
- switch (signatureAlgorithm) {
200
- case 'RSASSA-PKCS1-SHA256':
201
- return {
202
- name: 'RSASSA-PKCS1-v1_5',
203
- hash: 'SHA-256',
204
- publicExponent: new Uint8Array([1, 0, 1]), // 65537
205
- modulusLength: 2048,
206
- };
207
- case 'ECDSA-P-256-SHA256':
208
- return {
209
- name: 'ECDSA',
210
- namedCurve: 'P-256',
211
- };
212
- case 'ECDSA-secp256k1-SHA256':
213
- return {
214
- name: 'ECDSA',
215
- namedCurve: 'K-256',
216
- };
217
- default:
218
- throw new Error(`Unsupported signature algorithm: ${signatureAlgorithm}`);
219
- }
220
- }
221
- static extractDnsNamesFromExtensions(extensions) {
222
- const subjectAltNameExt = extensions.find((ext) => ext.type === forge.pki.oids['subjectAltName']);
223
- if (!subjectAltNameExt) {
224
- return;
225
- }
226
- const dnsNames = subjectAltNameExt.names.items.map((item) => item.value);
227
- return dnsNames;
228
- }
229
- }
230
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"generator.js","sourceRoot":"","sources":["../../../src/certificates/generator.ts"],"names":[],"mappings":"AAAA,OAAO,MAAM,MAAM,QAAQ,CAAC;AAC5B,OAAO,KAAK,MAAM,YAAY,CAAC;AAC/B,OAAO,EAEL,wBAAwB,EACxB,yBAAyB,EACzB,yBAAyB,EACzB,SAAS,EACT,+BAA+B,EAG/B,gBAAgB,EAChB,aAAa,EACb,kBAAkB,EAClB,iCAAiC,EAEjC,wBAAwB,EACxB,eAAe,EACf,4BAA4B,EAC5B,+BAA+B,EAC/B,6BAA6B,GAE9B,MAAM,gBAAgB,CAAC;AAUxB,OAAO,EAAE,cAAc,EAAE,MAAM,mBAAmB,CAAC;AACnD,OAAO,EAAE,qBAAqB,EAAE,MAAM,mCAAmC,CAAC;AAC1E,OAAO,EAAE,WAAW,EAAE,MAAM,oBAAoB,CAAC;AACjD,OAAO,EAAE,kBAAkB,EAAE,MAAM,aAAa,CAAC;AAEjD,MAAM,WAAW,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,yBAAyB;AAE7D,MAAM,qCAAqC,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;AAEjF,MAAM,OAAO,oBAAoB;IAC/B;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,MAA0B;QAClD,MAAM,EAAE,GAAG,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QAE9B,MAAM,EAAE,SAAS,EAAE,gBAAgB,EAAE,UAAU,EAAE,gBAAgB,EAAE,GACjE,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACnD,MAAM,gBAAgB,GAAG,gBAAgB,CAAC,SAAyB,CAAC;QAEpE,MAAM,UAAU,GAAgB,CAAC,IAAI,yBAAyB,CAAC,EAAE,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC,CAAC;QAErF,MAAM,qBAAqB,GAAuB,EAAE,CAAC;QAErD,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;YAEnE,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC,gBAAgB,CAAC,UAAU,EAAE,gBAAgB,CAAC,UAAU,CAAC,CAAC,CAAC;QAC5F,CAAC;QAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YACvB,qBAAqB,CAAC,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;YACzB,MAAM,EAAE,OAAO,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC,aAAa,CAAC;YACxD,UAAU,CAAC,IAAI,CACb,IAAI,4BAA4B,CAAC;gBAC/B,IAAI,EAAE,CAAC,OAAO,CAAC;gBACf,GAAG,CAAC,aAAa,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;aACzD,CAAC,CACH,CAAC;QACJ,CAAC;QAED,IAAI,qBAAqB,CAAC,MAAM,EAAE,CAAC;YACjC,UAAU,CAAC,IAAI,CAAC,IAAI,yBAAyB,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC,CAAC;QAC/E,CAAC;QAED,IAAI,aAAa,GAAG,aAAa,CAAC,gBAAgB,GAAG,aAAa,CAAC,eAAe,CAAC;QACnF,IAAI,MAAM,CAAC,EAAE,EAAE,CAAC;YACd,aAAa,IAAI,aAAa,CAAC,WAAW,CAAC;QAC7C,CAAC;QACD,UAAU,CAAC,IAAI,CAAC,IAAI,kBAAkB,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC,CAAC;QAE7D,MAAM,eAAe,GACnB,MAAM,qBAAqB,CAAC,6BAA6B,CAAC,gBAAgB,CAAC,CAAC;QAC9E,UAAU,CAAC,IAAI,CACb,GAAG;YACD,MAAM,+BAA+B,CAAC,MAAM,CAAC,eAAe,CAAC;YAC7D,MAAM,6BAA6B,CAAC,MAAM,CAAC,gBAAgB,CAAC;SAC7D,CACF,CAAC;QAEF,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,MAAM,kBAAkB,GAAG,MAAM,CAAC,gBAAgB,CAAC,MAAM,CACvD,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC,qCAAqC,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,CAClE,CAAC;YACF,KAAK,MAAM,eAAe,IAAI,kBAAkB,EAAE,CAAC;gBACjD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;gBACjE,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,SAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,uBAAuB,GAAgC;YAC3D,YAAY,EAAE,kBAAkB,CAAC,oBAAoB,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC;YACpE,MAAM,EAAE,kBAAkB,CAAC,sBAAsB,CAAC,MAAM,CAAC,MAAM,CAAC;YAChE,OAAO,EAAE,kBAAkB,CAAC,sBAAsB,CAAC,MAAM,CAAC,OAAO,CAAC;YAClE,SAAS,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,WAAW,CAAC,EAAE,uDAAuD;YACtG,QAAQ,EAAE,MAAM,CAAC,QAAQ;YACzB,SAAS,EAAE,gBAAgB;YAC3B,UAAU,EAAE,gBAAgB;YAC5B,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,IAAI,GAAG,MAAM,wBAAwB,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;QAE5E,OAAO,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC9B,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,YAAY,CAAC,kBAAsC;QACxD,MAAM,SAAS,GAAG,oBAAoB,CAAC,YAAY,CAAC,kBAAkB,CAAC,CAAC;QACxE,OAAO,cAAc,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,EAAE,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;IAChF,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,MAAyB;QAChD,MAAM,IAAI,GAAG,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QAC9D,MAAM,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,SAAyB,CAAC;QAClE,gBAAgB,CAAC,IAAI,GAAG,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;QAE5C,MAAM,UAAU,GAAgB,EAAE,CAAC;QAEnC,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,KAAK,MAAM,eAAe,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;gBACtD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;gBAC/D,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,SAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,eAAe,GAAyC;YAC5D,IAAI,EAAE,kBAAkB,CAAC,sBAAsB,CAAC,MAAM,CAAC,OAAO,CAAC;YAC/D,IAAI;YACJ,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,iCAAiC,CAAC,MAAM,CAAC,eAAe,CAAC,CAAC;QAE5E,OAAO,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC7B,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,oBAAoB,CAAC,OAAuB;QACjD,MAAM,IAAI,GAAG,IAAI,eAAe,CAAC,OAAO,CAAC,CAAC;QAE1C,IAAI,IAAI,CAAC,MAAM,KAAK,IAAI,CAAC,OAAO,EAAE,CAAC;YACjC,OAAO,OAAO,CAAC,OAAO,CAAC,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,CAAC;QAC7C,CAAC;QAED,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;IACxD,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CAAC,OAAuB;QAC5C,MAAM,IAAI,GAAG,IAAI,eAAe,CAAC,OAAO,CAAC,CAAC;QAE1C,MAAM,SAAS,GAAG,MAAM,cAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,IAAI,CAAC,SAAS,CAAC,OAAO,EACtB,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAChE,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,MAAM,yBAAyB,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CACpD,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,YAAY,+BAA+B,CACT,CAAC;QACjD,MAAM,sBAAsB,GAAG,yBAAyB,EAAE,KAAK,CAAC;QAEhE,MAAM,uBAAuB,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAClD,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,YAAY,6BAA6B,CACT,CAAC;QAC/C,MAAM,oBAAoB,GAAG,uBAAuB,EAAE,KAAK,CAAC;QAE5D,OAAO;YACL,eAAe,EAAE,IAAI,CAAC,YAAY;YAClC,SAAS;YACT,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,MAAM,EAAE,IAAI,CAAC,MAAM;YACnB,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,IAAI,CAAC,UAAU,CAAC;YAC7E,sBAAsB;YACtB,oBAAoB;YACpB,UAAU,EAAE,IAAI,CAAC,UAAU;iBACxB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,MAAM,GAAG,GAAG,IAAI,wBAAwB,CAAC,MAAM,CAAC,CAAC;QAEjD,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,MAAM,EAAE,CAAC;QACnC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,SAAS,GAAG,MAAM,cAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,GAAG,CAAC,SAAS,CAAC,OAAO,EACrB,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,kBAAkB,EAAE,GAAG,CAAC,SAAS,CAAC,SAAS,CAAC,EAC9D,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,MAAM,SAAS,GAAc;YAC3B,OAAO,EAAE,GAAG,CAAC,OAAO;YACpB,SAAS;YACT,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,GAAG,CAAC,UAAU,CAAC;YAC5E,UAAU,EAAE,GAAG,CAAC,UAAU;iBACvB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;QAEF,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,aAAa,CAAC,EAAE,UAAU,EAAE,SAAS,EAAmB;QAI3E,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YAC1C,OAAO,SAAS,KAAK,QAAQ;gBAC3B,CAAC,CAAC,qBAAqB,CAAC,kBAAkB,CAAC,SAAS,CAAC;gBACrD,CAAC,CAAC,SAAS;YACb,OAAO,UAAU,KAAK,QAAQ;gBAC5B,CAAC,CAAC,qBAAqB,CAAC,mBAAmB,CAAC,UAAU,CAAC;gBACvD,CAAC,CAAC,UAAU;SACf,CAAC,CAAC;QAEH,MAAM,CAAC,SAAS,CACd,MAAM,CAAC,SAAS,EAChB,OAAO,CAAC,SAAS,EACjB,4CAA4C,CAC7C,CAAC;QAEF,OAAO,EAAE,SAAS,EAAE,MAAM,EAAE,UAAU,EAAE,OAAO,EAAE,CAAC;IACpD,CAAC;IAEO,MAAM,CAAC,YAAY,CAAC,kBAA0B;QACpD,QAAQ,kBAAkB,EAAE,CAAC;YAC3B,KAAK,qBAAqB;gBACxB,OAAO;oBACL,IAAI,EAAE,mBAAmB;oBACzB,IAAI,EAAE,SAAS;oBACf,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,QAAQ;oBACnD,aAAa,EAAE,IAAI;iBACpB,CAAC;YACJ,KAAK,oBAAoB;gBACvB,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ,KAAK,wBAAwB;gBAC3B,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ;gBACE,MAAM,IAAI,KAAK,CAAC,oCAAoC,kBAAkB,EAAE,CAAC,CAAC;QAC9E,CAAC;IACH,CAAC;IAEO,MAAM,CAAC,6BAA6B,CAAC,UAAuB;QAClE,MAAM,iBAAiB,GAAG,UAAU,CAAC,IAAI,CACvC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CACR,CAAC;QACjD,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACvB,OAAO;QACT,CAAC;QAED,MAAM,QAAQ,GAAG,iBAAiB,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACzE,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF"}