PHP WebShell
Текущая директория: /usr/lib/node_modules/bitgo/node_modules/@expo/devcert/dist
Просмотр файла: certificate-authority.js
"use strict";
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.default = installCertificateAuthority;
exports.withCertificateAuthorityCredentials = withCertificateAuthorityCredentials;
exports.ensureCACertReadable = ensureCACertReadable;
exports.uninstall = uninstall;
const fs_1 = require("fs");
const debug_1 = __importDefault(require("debug"));
const constants_1 = require("./constants");
const platforms_1 = __importDefault(require("./platforms"));
const utils_1 = require("./utils");
const certificates_1 = require("./certificates");
const debug = (0, debug_1.default)('devcert:certificate-authority');
/**
* Install the once-per-machine trusted root CA. We'll use this CA to sign
* per-app certs.
*/
async function installCertificateAuthority(options = {}) {
debug(`Uninstalling existing certificates, which will be void once any existing CA is gone`);
uninstall();
(0, constants_1.ensureConfigDirs)();
debug(`Making a temp working directory for files to copied in`);
let rootKeyPath = (0, utils_1.mktmp)();
debug(`Generating the OpenSSL configuration needed to setup the certificate authority`);
seedConfigFiles();
debug(`Generating a private key`);
(0, certificates_1.generateKey)(rootKeyPath);
debug(`Generating a CA certificate`);
(0, utils_1.openssl)(['req', '-new', '-x509', '-config', constants_1.caSelfSignConfig, '-key', rootKeyPath, '-out', constants_1.rootCACertPath, '-days', '825']);
debug('Saving certificate authority credentials');
await saveCertificateAuthorityCredentials(rootKeyPath);
debug(`Adding the root certificate authority to trust stores`);
await platforms_1.default.addToTrustStores(constants_1.rootCACertPath, options);
}
/**
* Initializes the files OpenSSL needs to sign certificates as a certificate
* authority, as well as our CA setup version
*/
function seedConfigFiles() {
// This is v2 of the devcert certificate authority setup
(0, fs_1.writeFileSync)(constants_1.caVersionFile, '2');
// OpenSSL CA files
(0, fs_1.writeFileSync)(constants_1.opensslDatabaseFilePath, '');
(0, fs_1.writeFileSync)(constants_1.opensslSerialFilePath, '01');
}
async function withCertificateAuthorityCredentials(cb) {
debug(`Retrieving devcert's certificate authority credentials`);
let tmpCAKeyPath = (0, utils_1.mktmp)();
let caKey = await platforms_1.default.readProtectedFile(constants_1.rootCAKeyPath);
(0, fs_1.writeFileSync)(tmpCAKeyPath, caKey);
await cb({ caKeyPath: tmpCAKeyPath, caCertPath: constants_1.rootCACertPath });
(0, fs_1.unlinkSync)(tmpCAKeyPath);
}
async function saveCertificateAuthorityCredentials(keypath) {
debug(`Saving devcert's certificate authority credentials`);
let key = (0, fs_1.readFileSync)(keypath, 'utf-8');
await platforms_1.default.writeProtectedFile(constants_1.rootCAKeyPath, key);
}
function certErrors() {
try {
(0, utils_1.openssl)(['x509', '-in', constants_1.rootCACertPath, '-noout']);
return '';
}
catch (e) {
return e.toString();
}
}
// This function helps to migrate from v1.0.x to >= v1.1.0.
/**
* Smoothly migrate the certificate storage from v1.0.x to >= v1.1.0.
* In v1.1.0 there are new options for retrieving the CA cert directly,
* to help third-party Node apps trust the root CA.
*
* If a v1.0.x cert already exists, then devcert has written it with
* platform.writeProtectedFile(), so an unprivileged readFile cannot access it.
* Pre-detect and remedy this; it should only happen once per installation.
*/
async function ensureCACertReadable(options = {}) {
if (!certErrors()) {
return;
}
/**
* on windows, writeProtectedFile left the cert encrypted on *nix, the cert
* has no read permissions either way, openssl will fail and that means we
* have to fix it
*/
try {
const caFileContents = await platforms_1.default.readProtectedFile(constants_1.rootCACertPath);
platforms_1.default.deleteProtectedFiles(constants_1.rootCACertPath);
(0, fs_1.writeFileSync)(constants_1.rootCACertPath, caFileContents);
}
catch (e) {
return installCertificateAuthority(options);
}
// double check that we have a live one
const remainingErrors = certErrors();
if (remainingErrors) {
return installCertificateAuthority(options);
}
}
/**
* Remove as much of the devcert files and state as we can. This is necessary
* when generating a new root certificate, and should be available to API
* consumers as well.
*
* Not all of it will be removable. If certutil is not installed, we'll leave
* Firefox alone. We try to remove files with maximum permissions, and if that
* fails, we'll silently fail.
*
* It's also possible that the command to untrust will not work, and we'll
* silently fail that as well; with no existing certificates anymore, the
* security exposure there is minimal.
*/
function uninstall() {
platforms_1.default.removeFromTrustStores(constants_1.rootCACertPath);
platforms_1.default.deleteProtectedFiles(constants_1.domainsDir);
platforms_1.default.deleteProtectedFiles(constants_1.rootCADir);
platforms_1.default.deleteProtectedFiles((0, constants_1.getLegacyConfigDir)());
}
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certificate-authority.js","sourceRoot":"./","sources":["certificate-authority.ts"],"names":[],"mappings":";;;;;AA8BA,8CAsBC;AAcD,kFAOC;AA4BD,oDAsBC;AAeD,8BAKC;AA/ID,2BAIY;AACZ,kDAAgC;AAEhC,2CAWqB;AACrB,4DAA0C;AAC1C,mCAAyC;AACzC,iDAA6C;AAG7C,MAAM,KAAK,GAAG,IAAA,eAAW,EAAC,+BAA+B,CAAC,CAAC;AAE3D;;;GAGG;AACY,KAAK,UAAU,2BAA2B,CAAC,UAAmB,EAAE;IAC7E,KAAK,CAAC,qFAAqF,CAAC,CAAC;IAC7F,SAAS,EAAE,CAAC;IACZ,IAAA,4BAAgB,GAAE,CAAC;IAEnB,KAAK,CAAC,wDAAwD,CAAC,CAAC;IAChE,IAAI,WAAW,GAAG,IAAA,aAAK,GAAE,CAAC;IAE1B,KAAK,CAAC,gFAAgF,CAAC,CAAC;IACxF,eAAe,EAAE,CAAC;IAElB,KAAK,CAAC,0BAA0B,CAAC,CAAC;IAClC,IAAA,0BAAW,EAAC,WAAW,CAAC,CAAC;IAEzB,KAAK,CAAC,6BAA6B,CAAC,CAAC;IACrC,IAAA,eAAO,EAAC,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,EAAE,SAAS,EAAE,4BAAgB,EAAE,MAAM,EAAE,WAAW,EAAE,MAAM,EAAE,0BAAc,EAAE,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC;IAE5H,KAAK,CAAC,0CAA0C,CAAC,CAAC;IAClD,MAAM,mCAAmC,CAAC,WAAW,CAAC,CAAC;IAEvD,KAAK,CAAC,uDAAuD,CAAC,CAAC;IAC/D,MAAM,mBAAe,CAAC,gBAAgB,CAAC,0BAAc,EAAE,OAAO,CAAC,CAAC;AAClE,CAAC;AAED;;;GAGG;AACH,SAAS,eAAe;IACtB,wDAAwD;IACxD,IAAA,kBAAS,EAAC,yBAAa,EAAE,GAAG,CAAC,CAAC;IAC9B,mBAAmB;IACnB,IAAA,kBAAS,EAAC,mCAAuB,EAAE,EAAE,CAAC,CAAC;IACvC,IAAA,kBAAS,EAAC,iCAAqB,EAAE,IAAI,CAAC,CAAC;AACzC,CAAC;AAEM,KAAK,UAAU,mCAAmC,CAAC,EAAkG;IAC1J,KAAK,CAAC,wDAAwD,CAAC,CAAC;IAChE,IAAI,YAAY,GAAG,IAAA,aAAK,GAAE,CAAC;IAC3B,IAAI,KAAK,GAAG,MAAM,mBAAe,CAAC,iBAAiB,CAAC,yBAAa,CAAC,CAAC;IACnE,IAAA,kBAAS,EAAC,YAAY,EAAE,KAAK,CAAC,CAAC;IAC/B,MAAM,EAAE,CAAC,EAAE,SAAS,EAAE,YAAY,EAAE,UAAU,EAAE,0BAAc,EAAE,CAAC,CAAC;IAClE,IAAA,eAAE,EAAC,YAAY,CAAC,CAAC;AACnB,CAAC;AAED,KAAK,UAAU,mCAAmC,CAAC,OAAe;IAChE,KAAK,CAAC,oDAAoD,CAAC,CAAC;IAC5D,IAAI,GAAG,GAAG,IAAA,iBAAQ,EAAC,OAAO,EAAE,OAAO,CAAC,CAAC;IACrC,MAAM,mBAAe,CAAC,kBAAkB,CAAC,yBAAa,EAAE,GAAG,CAAC,CAAC;AAC/D,CAAC;AAGD,SAAS,UAAU;IACjB,IAAI,CAAC;QACH,IAAA,eAAO,EAAC,CAAC,MAAM,EAAE,KAAK,EAAE,0BAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;QACnD,OAAO,EAAE,CAAC;IACZ,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,CAAC,QAAQ,EAAE,CAAC;IACtB,CAAC;AACH,CAAC;AAED,2DAA2D;AAC3D;;;;;;;;GAQG;AACI,KAAK,UAAU,oBAAoB,CAAC,UAAmB,EAAE;IAC9D,IAAI,CAAC,UAAU,EAAE,EAAE,CAAC;QAClB,OAAO;IACT,CAAC;IACD;;;;OAIG;IACH,IAAI,CAAC;QACH,MAAM,cAAc,GAAG,MAAM,mBAAe,CAAC,iBAAiB,CAAC,0BAAc,CAAC,CAAC;QAC/E,mBAAe,CAAC,oBAAoB,CAAC,0BAAc,CAAC,CAAC;QACrD,IAAA,kBAAS,EAAC,0BAAc,EAAE,cAAc,CAAC,CAAC;IAC5C,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,2BAA2B,CAAC,OAAO,CAAC,CAAC;IAC9C,CAAC;IAED,uCAAuC;IACvC,MAAM,eAAe,GAAG,UAAU,EAAE,CAAC;IACrC,IAAI,eAAe,EAAE,CAAC;QACpB,OAAO,2BAA2B,CAAC,OAAO,CAAC,CAAC;IAC9C,CAAC;AACH,CAAC;AAED;;;;;;;;;;;;GAYG;AACH,SAAgB,SAAS;IACvB,mBAAe,CAAC,qBAAqB,CAAC,0BAAc,CAAC,CAAC;IACtD,mBAAe,CAAC,oBAAoB,CAAC,sBAAU,CAAC,CAAC;IACjD,mBAAe,CAAC,oBAAoB,CAAC,qBAAS,CAAC,CAAC;IAChD,mBAAe,CAAC,oBAAoB,CAAC,IAAA,8BAAkB,GAAE,CAAC,CAAC;AAC7D,CAAC","sourcesContent":["import {\n  unlinkSync as rm,\n  readFileSync as readFile,\n  writeFileSync as writeFile\n} from 'fs';\nimport createDebug from 'debug';\n\nimport {\n  domainsDir,\n  rootCADir,\n  ensureConfigDirs,\n  getLegacyConfigDir,\n  rootCAKeyPath,\n  rootCACertPath,\n  caSelfSignConfig,\n  opensslSerialFilePath,\n  opensslDatabaseFilePath,\n  caVersionFile\n} from './constants';\nimport currentPlatform from './platforms';\nimport { openssl, mktmp } from './utils';\nimport { generateKey } from './certificates';\nimport { Options } from './index';\n\nconst debug = createDebug('devcert:certificate-authority');\n\n/**\n * Install the once-per-machine trusted root CA. We'll use this CA to sign\n * per-app certs.\n */\nexport default async function installCertificateAuthority(options: Options = {}): Promise<void> {\n  debug(`Uninstalling existing certificates, which will be void once any existing CA is gone`);\n  uninstall();\n  ensureConfigDirs();\n\n  debug(`Making a temp working directory for files to copied in`);\n  let rootKeyPath = mktmp();\n\n  debug(`Generating the OpenSSL configuration needed to setup the certificate authority`);\n  seedConfigFiles();\n\n  debug(`Generating a private key`);\n  generateKey(rootKeyPath);\n\n  debug(`Generating a CA certificate`);\n  openssl(['req', '-new', '-x509', '-config', caSelfSignConfig, '-key', rootKeyPath, '-out', rootCACertPath, '-days', '825']);\n\n  debug('Saving certificate authority credentials');\n  await saveCertificateAuthorityCredentials(rootKeyPath);\n\n  debug(`Adding the root certificate authority to trust stores`);\n  await currentPlatform.addToTrustStores(rootCACertPath, options);\n}\n\n/**\n * Initializes the files OpenSSL needs to sign certificates as a certificate\n * authority, as well as our CA setup version\n */\nfunction seedConfigFiles() {\n  // This is v2 of the devcert certificate authority setup\n  writeFile(caVersionFile, '2');\n  // OpenSSL CA files\n  writeFile(opensslDatabaseFilePath, '');\n  writeFile(opensslSerialFilePath, '01');\n}\n\nexport async function withCertificateAuthorityCredentials(cb: ({ caKeyPath, caCertPath }: { caKeyPath: string, caCertPath: string }) => Promise<void> | void) {\n  debug(`Retrieving devcert's certificate authority credentials`);\n  let tmpCAKeyPath = mktmp();\n  let caKey = await currentPlatform.readProtectedFile(rootCAKeyPath);\n  writeFile(tmpCAKeyPath, caKey);\n  await cb({ caKeyPath: tmpCAKeyPath, caCertPath: rootCACertPath });\n  rm(tmpCAKeyPath);\n}\n\nasync function saveCertificateAuthorityCredentials(keypath: string) {\n  debug(`Saving devcert's certificate authority credentials`);\n  let key = readFile(keypath, 'utf-8');\n  await currentPlatform.writeProtectedFile(rootCAKeyPath, key);\n}\n\n\nfunction certErrors(): string {\n  try {\n    openssl(['x509', '-in', rootCACertPath, '-noout']);\n    return '';\n  } catch (e) {\n    return e.toString();\n  }\n}\n\n// This function helps to migrate from v1.0.x to >= v1.1.0.\n/**\n * Smoothly migrate the certificate storage from v1.0.x to >= v1.1.0.\n * In v1.1.0 there are new options for retrieving the CA cert directly,\n * to help third-party Node apps trust the root CA.\n * \n * If a v1.0.x cert already exists, then devcert has written it with\n * platform.writeProtectedFile(), so an unprivileged readFile cannot access it.\n * Pre-detect and remedy this; it should only happen once per installation.\n */\nexport async function ensureCACertReadable(options: Options = {}): Promise<void> {\n  if (!certErrors()) {\n    return;\n  }\n  /**\n   * on windows, writeProtectedFile left the cert encrypted on *nix, the cert\n   * has no read permissions either way, openssl will fail and that means we\n   * have to fix it\n   */\n  try {\n    const caFileContents = await currentPlatform.readProtectedFile(rootCACertPath);\n    currentPlatform.deleteProtectedFiles(rootCACertPath);\n    writeFile(rootCACertPath, caFileContents);\n  } catch (e) {\n    return installCertificateAuthority(options);\n  }\n  \n  // double check that we have a live one\n  const remainingErrors = certErrors();\n  if (remainingErrors) {\n    return installCertificateAuthority(options);\n  }\n}\n\n/**\n * Remove as much of the devcert files and state as we can. This is necessary\n * when generating a new root certificate, and should be available to API\n * consumers as well.\n * \n * Not all of it will be removable. If certutil is not installed, we'll leave\n * Firefox alone. We try to remove files with maximum permissions, and if that\n * fails, we'll silently fail.\n * \n * It's also possible that the command to untrust will not work, and we'll\n * silently fail that as well; with no existing certificates anymore, the\n * security exposure there is minimal.\n */\nexport function uninstall(): void {\n  currentPlatform.removeFromTrustStores(rootCACertPath);\n  currentPlatform.deleteProtectedFiles(domainsDir);\n  currentPlatform.deleteProtectedFiles(rootCADir);\n  currentPlatform.deleteProtectedFiles(getLegacyConfigDir());\n}"]}Выполнить команду
Для локальной разработки. Не используйте в интернете!