init
This commit is contained in:
11
mc_test/node_modules/@electron/osx-sign/dist/esm/flat.d.ts
generated
vendored
Executable file
11
mc_test/node_modules/@electron/osx-sign/dist/esm/flat.d.ts
generated
vendored
Executable file
@ -0,0 +1,11 @@
|
||||
import { FlatOptions } from './types';
|
||||
/**
|
||||
* This function is exported and returns a promise flattening the application.
|
||||
*/
|
||||
export declare function buildPkg(_opts: FlatOptions): Promise<void>;
|
||||
/**
|
||||
* This function is exported with normal callback implementation.
|
||||
*
|
||||
* @deprecated Please use the promise based "buildPkg" method
|
||||
*/
|
||||
export declare const flat: (opts: FlatOptions, cb?: ((error?: Error) => void) | undefined) => void;
|
||||
125
mc_test/node_modules/@electron/osx-sign/dist/esm/flat.js
generated
vendored
Executable file
125
mc_test/node_modules/@electron/osx-sign/dist/esm/flat.js
generated
vendored
Executable file
@ -0,0 +1,125 @@
|
||||
import * as path from 'path';
|
||||
import { debugLog, debugWarn, execFileAsync, validateOptsApp, validateOptsPlatform } from './util';
|
||||
import { findIdentities } from './util-identities';
|
||||
const pkgVersion = require('../../package.json').version;
|
||||
/**
|
||||
* This function returns a promise validating all options passed in opts.
|
||||
* @function
|
||||
* @param {Object} opts - Options.
|
||||
* @returns {Promise} Promise.
|
||||
*/
|
||||
async function validateFlatOpts(opts) {
|
||||
await validateOptsApp(opts);
|
||||
let pkg = opts.pkg;
|
||||
if (pkg) {
|
||||
if (typeof pkg !== 'string')
|
||||
throw new Error('`pkg` must be a string.');
|
||||
if (path.extname(pkg) !== '.pkg') {
|
||||
throw new Error('Extension of output package must be `.pkg`.');
|
||||
}
|
||||
}
|
||||
else {
|
||||
debugWarn('No `pkg` passed in arguments, will fallback to default inferred from the given application.');
|
||||
pkg = path.join(path.dirname(opts.app), path.basename(opts.app, '.app') + '.pkg');
|
||||
}
|
||||
let install = opts.install;
|
||||
if (install) {
|
||||
if (typeof install !== 'string') {
|
||||
return Promise.reject(new Error('`install` must be a string.'));
|
||||
}
|
||||
}
|
||||
else {
|
||||
debugWarn('No `install` passed in arguments, will fallback to default `/Applications`.');
|
||||
install = '/Applications';
|
||||
}
|
||||
return Object.assign(Object.assign({}, opts), { pkg,
|
||||
install, platform: await validateOptsPlatform(opts) });
|
||||
}
|
||||
/**
|
||||
* This function returns a promise flattening the application.
|
||||
* @function
|
||||
* @param {Object} opts - Options.
|
||||
* @returns {Promise} Promise.
|
||||
*/
|
||||
async function buildApplicationPkg(opts, identity) {
|
||||
const args = ['--component', opts.app, opts.install, '--sign', identity.name, opts.pkg];
|
||||
if (opts.keychain) {
|
||||
args.unshift('--keychain', opts.keychain);
|
||||
}
|
||||
if (opts.scripts) {
|
||||
args.unshift('--scripts', opts.scripts);
|
||||
}
|
||||
debugLog('Flattening... ' + opts.app);
|
||||
await execFileAsync('productbuild', args);
|
||||
}
|
||||
/**
|
||||
* This function is exported and returns a promise flattening the application.
|
||||
*/
|
||||
export async function buildPkg(_opts) {
|
||||
debugLog('@electron/osx-sign@%s', pkgVersion);
|
||||
const validatedOptions = await validateFlatOpts(_opts);
|
||||
let identities = [];
|
||||
let identityInUse = null;
|
||||
if (validatedOptions.identity) {
|
||||
debugLog('`identity` passed in arguments.');
|
||||
if (validatedOptions.identityValidation === false) {
|
||||
// Do nothing
|
||||
}
|
||||
else {
|
||||
identities = await findIdentities(validatedOptions.keychain || null, validatedOptions.identity);
|
||||
}
|
||||
}
|
||||
else {
|
||||
debugWarn('No `identity` passed in arguments...');
|
||||
if (validatedOptions.platform === 'mas') {
|
||||
debugLog('Finding `3rd Party Mac Developer Installer` certificate for flattening app distribution in the Mac App Store...');
|
||||
identities = await findIdentities(validatedOptions.keychain || null, '3rd Party Mac Developer Installer:');
|
||||
}
|
||||
else {
|
||||
debugLog('Finding `Developer ID Application` certificate for distribution outside the Mac App Store...');
|
||||
identities = await findIdentities(validatedOptions.keychain || null, 'Developer ID Installer:');
|
||||
}
|
||||
}
|
||||
if (identities.length > 0) {
|
||||
// Provisioning profile(s) found
|
||||
if (identities.length > 1) {
|
||||
debugWarn('Multiple identities found, will use the first discovered.');
|
||||
}
|
||||
else {
|
||||
debugLog('Found 1 identity.');
|
||||
}
|
||||
identityInUse = identities[0];
|
||||
}
|
||||
else {
|
||||
// No identity found
|
||||
throw new Error('No identity found for signing.');
|
||||
}
|
||||
debugLog('Flattening application...', '\n', '> Application:', validatedOptions.app, '\n', '> Package output:', validatedOptions.pkg, '\n', '> Install path:', validatedOptions.install, '\n', '> Identity:', validatedOptions.identity, '\n', '> Scripts:', validatedOptions.scripts);
|
||||
await buildApplicationPkg(validatedOptions, identityInUse);
|
||||
debugLog('Application flattened.');
|
||||
}
|
||||
/**
|
||||
* This function is exported with normal callback implementation.
|
||||
*
|
||||
* @deprecated Please use the promise based "buildPkg" method
|
||||
*/
|
||||
export const flat = (opts, cb) => {
|
||||
buildPkg(opts)
|
||||
.then(() => {
|
||||
debugLog('Application flattened, saved to: ' + opts.app);
|
||||
if (cb)
|
||||
cb();
|
||||
})
|
||||
.catch((err) => {
|
||||
debugLog('Flat failed:');
|
||||
if (err.message)
|
||||
debugLog(err.message);
|
||||
else if (err.stack)
|
||||
debugLog(err.stack);
|
||||
else
|
||||
debugLog(err);
|
||||
if (cb)
|
||||
cb(err);
|
||||
});
|
||||
};
|
||||
//# sourceMappingURL=flat.js.map
|
||||
1
mc_test/node_modules/@electron/osx-sign/dist/esm/flat.js.map
generated
vendored
Executable file
1
mc_test/node_modules/@electron/osx-sign/dist/esm/flat.js.map
generated
vendored
Executable file
@ -0,0 +1 @@
|
||||
{"version":3,"file":"flat.js","sourceRoot":"","sources":["../../src/flat.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,aAAa,EAAE,eAAe,EAAE,oBAAoB,EAAE,MAAM,QAAQ,CAAC;AAEnG,OAAO,EAAY,cAAc,EAAE,MAAM,mBAAmB,CAAC;AAI7D,MAAM,UAAU,GAAG,OAAO,CAAC,oBAAoB,CAAC,CAAC,OAAiB,CAAC;AAEnE;;;;;GAKG;AACH,KAAK,UAAU,gBAAgB,CAAE,IAAiB;IAChD,MAAM,eAAe,CAAC,IAAI,CAAC,CAAC;IAE5B,IAAI,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC;IACnB,IAAI,GAAG,EAAE;QACP,IAAI,OAAO,GAAG,KAAK,QAAQ;YAAE,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;QACxE,IAAI,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,KAAK,MAAM,EAAE;YAChC,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;SAChE;KACF;SAAM;QACL,SAAS,CACP,6FAA6F,CAC9F,CAAC;QACF,GAAG,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,GAAG,MAAM,CAAC,CAAC;KACnF;IAED,IAAI,OAAO,GAAG,IAAI,CAAC,OAAO,CAAC;IAC3B,IAAI,OAAO,EAAE;QACX,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE;YAC/B,OAAO,OAAO,CAAC,MAAM,CAAC,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC,CAAC;SACjE;KACF;SAAM;QACL,SAAS,CAAC,6EAA6E,CAAC,CAAC;QACzF,OAAO,GAAG,eAAe,CAAC;KAC3B;IAED,uCACK,IAAI,KACP,GAAG;QACH,OAAO,EACP,QAAQ,EAAE,MAAM,oBAAoB,CAAC,IAAI,CAAC,IAC1C;AACJ,CAAC;AAED;;;;;GAKG;AACH,KAAK,UAAU,mBAAmB,CAAE,IAA0B,EAAE,QAAkB;IAChF,MAAM,IAAI,GAAG,CAAC,aAAa,EAAE,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,OAAO,EAAE,QAAQ,EAAE,QAAQ,CAAC,IAAI,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC;IACxF,IAAI,IAAI,CAAC,QAAQ,EAAE;QACjB,IAAI,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;KAC3C;IACD,IAAI,IAAI,CAAC,OAAO,EAAE;QAChB,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,IAAI,CAAC,OAAO,CAAC,CAAC;KACzC;IAED,QAAQ,CAAC,gBAAgB,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC;IACtC,MAAM,aAAa,CAAC,cAAc,EAAE,IAAI,CAAC,CAAC;AAC5C,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,QAAQ,CAAE,KAAkB;IAChD,QAAQ,CAAC,uBAAuB,EAAE,UAAU,CAAC,CAAC;IAC9C,MAAM,gBAAgB,GAAG,MAAM,gBAAgB,CAAC,KAAK,CAAC,CAAC;IACvD,IAAI,UAAU,GAAe,EAAE,CAAC;IAChC,IAAI,aAAa,GAAoB,IAAI,CAAC;IAE1C,IAAI,gBAAgB,CAAC,QAAQ,EAAE;QAC7B,QAAQ,CAAC,iCAAiC,CAAC,CAAC;QAC5C,IAAI,gBAAgB,CAAC,kBAAkB,KAAK,KAAK,EAAE;YACjD,aAAa;SACd;aAAM;YACL,UAAU,GAAG,MAAM,cAAc,CAAC,gBAAgB,CAAC,QAAQ,IAAI,IAAI,EAAE,gBAAgB,CAAC,QAAQ,CAAC,CAAC;SACjG;KACF;SAAM;QACL,SAAS,CAAC,sCAAsC,CAAC,CAAC;QAClD,IAAI,gBAAgB,CAAC,QAAQ,KAAK,KAAK,EAAE;YACvC,QAAQ,CACN,iHAAiH,CAClH,CAAC;YACF,UAAU,GAAG,MAAM,cAAc,CAC/B,gBAAgB,CAAC,QAAQ,IAAI,IAAI,EACjC,oCAAoC,CACrC,CAAC;SACH;aAAM;YACL,QAAQ,CACN,8FAA8F,CAC/F,CAAC;YACF,UAAU,GAAG,MAAM,cAAc,CAAC,gBAAgB,CAAC,QAAQ,IAAI,IAAI,EAAE,yBAAyB,CAAC,CAAC;SACjG;KACF;IAED,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE;QACzB,gCAAgC;QAChC,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE;YACzB,SAAS,CAAC,2DAA2D,CAAC,CAAC;SACxE;aAAM;YACL,QAAQ,CAAC,mBAAmB,CAAC,CAAC;SAC/B;QACD,aAAa,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;KAC/B;SAAM;QACL,oBAAoB;QACpB,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;KACnD;IAED,QAAQ,CACN,2BAA2B,EAC3B,IAAI,EACJ,gBAAgB,EAChB,gBAAgB,CAAC,GAAG,EACpB,IAAI,EACJ,mBAAmB,EACnB,gBAAgB,CAAC,GAAG,EACpB,IAAI,EACJ,iBAAiB,EACjB,gBAAgB,CAAC,OAAO,EACxB,IAAI,EACJ,aAAa,EACb,gBAAgB,CAAC,QAAQ,EACzB,IAAI,EACJ,YAAY,EACZ,gBAAgB,CAAC,OAAO,CACzB,CAAC;IACF,MAAM,mBAAmB,CAAC,gBAAgB,EAAE,aAAa,CAAC,CAAC;IAE3D,QAAQ,CAAC,wBAAwB,CAAC,CAAC;AACrC,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,MAAM,IAAI,GAAG,CAAC,IAAiB,EAAE,EAA4B,EAAE,EAAE;IACtE,QAAQ,CAAC,IAAI,CAAC;SACX,IAAI,CAAC,GAAG,EAAE;QACT,QAAQ,CAAC,mCAAmC,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC;QACzD,IAAI,EAAE;YAAE,EAAE,EAAE,CAAC;IACf,CAAC,CAAC;SACD,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;QACb,QAAQ,CAAC,cAAc,CAAC,CAAC;QACzB,IAAI,GAAG,CAAC,OAAO;YAAE,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;aAClC,IAAI,GAAG,CAAC,KAAK;YAAE,QAAQ,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;;YACnC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACnB,IAAI,EAAE;YAAE,EAAE,CAAC,GAAG,CAAC,CAAC;IAClB,CAAC,CAAC,CAAC;AACP,CAAC,CAAC"}
|
||||
4
mc_test/node_modules/@electron/osx-sign/dist/esm/index.d.ts
generated
vendored
Executable file
4
mc_test/node_modules/@electron/osx-sign/dist/esm/index.d.ts
generated
vendored
Executable file
@ -0,0 +1,4 @@
|
||||
import { sign, signApp } from './sign';
|
||||
import { flat, buildPkg } from './flat';
|
||||
export { sign, flat, signApp as signAsync, signApp, buildPkg as flatAsync, buildPkg };
|
||||
export * from './types';
|
||||
14
mc_test/node_modules/@electron/osx-sign/dist/esm/index.js
generated
vendored
Executable file
14
mc_test/node_modules/@electron/osx-sign/dist/esm/index.js
generated
vendored
Executable file
@ -0,0 +1,14 @@
|
||||
import { sign, signApp } from './sign';
|
||||
import { flat, buildPkg } from './flat';
|
||||
// TODO: Remove and leave only proper named exports, but for non-breaking change reasons
|
||||
// we need to keep this weirdness for now
|
||||
module.exports = sign;
|
||||
module.exports.sign = sign;
|
||||
module.exports.signAsync = signApp;
|
||||
module.exports.signApp = signApp;
|
||||
module.exports.flat = flat;
|
||||
module.exports.flatAsync = buildPkg;
|
||||
module.exports.buildPkg = buildPkg;
|
||||
export { sign, flat, signApp as signAsync, signApp, buildPkg as flatAsync, buildPkg };
|
||||
export * from './types';
|
||||
//# sourceMappingURL=index.js.map
|
||||
1
mc_test/node_modules/@electron/osx-sign/dist/esm/index.js.map
generated
vendored
Executable file
1
mc_test/node_modules/@electron/osx-sign/dist/esm/index.js.map
generated
vendored
Executable file
@ -0,0 +1 @@
|
||||
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,MAAM,QAAQ,CAAC;AACvC,OAAO,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,QAAQ,CAAC;AAExC,wFAAwF;AACxF,yCAAyC;AACzC,MAAM,CAAC,OAAO,GAAG,IAAI,CAAC;AACtB,MAAM,CAAC,OAAO,CAAC,IAAI,GAAG,IAAI,CAAC;AAC3B,MAAM,CAAC,OAAO,CAAC,SAAS,GAAG,OAAO,CAAC;AACnC,MAAM,CAAC,OAAO,CAAC,OAAO,GAAG,OAAO,CAAC;AACjC,MAAM,CAAC,OAAO,CAAC,IAAI,GAAG,IAAI,CAAC;AAC3B,MAAM,CAAC,OAAO,CAAC,SAAS,GAAG,QAAQ,CAAC;AACpC,MAAM,CAAC,OAAO,CAAC,QAAQ,GAAG,QAAQ,CAAC;AAEnC,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,IAAI,SAAS,EAAE,OAAO,EAAE,QAAQ,IAAI,SAAS,EAAE,QAAQ,EAAE,CAAC;AACtF,cAAc,SAAS,CAAC"}
|
||||
11
mc_test/node_modules/@electron/osx-sign/dist/esm/sign.d.ts
generated
vendored
Executable file
11
mc_test/node_modules/@electron/osx-sign/dist/esm/sign.d.ts
generated
vendored
Executable file
@ -0,0 +1,11 @@
|
||||
import { SignOptions } from './types';
|
||||
/**
|
||||
* This function returns a promise signing the application.
|
||||
*/
|
||||
export declare function signApp(_opts: SignOptions): Promise<void>;
|
||||
/**
|
||||
* This function is a legacy callback implementation.
|
||||
*
|
||||
* @deprecated Please use the promise based "signApp" method
|
||||
*/
|
||||
export declare const sign: (opts: SignOptions, cb?: ((error?: Error) => void) | undefined) => void;
|
||||
332
mc_test/node_modules/@electron/osx-sign/dist/esm/sign.js
generated
vendored
Executable file
332
mc_test/node_modules/@electron/osx-sign/dist/esm/sign.js
generated
vendored
Executable file
@ -0,0 +1,332 @@
|
||||
import * as fs from 'fs-extra';
|
||||
import * as os from 'os';
|
||||
import * as path from 'path';
|
||||
import * as plist from 'plist';
|
||||
import compareVersion from 'compare-version';
|
||||
import { debugLog, debugWarn, getAppContentsPath, execFileAsync, validateOptsApp, validateOptsPlatform, walkAsync } from './util';
|
||||
import { Identity, findIdentities } from './util-identities';
|
||||
import { preEmbedProvisioningProfile, getProvisioningProfile } from './util-provisioning-profiles';
|
||||
import { preAutoEntitlements } from './util-entitlements';
|
||||
const pkgVersion = require('../../package.json').version;
|
||||
const osRelease = os.release();
|
||||
/**
|
||||
* This function returns a promise validating opts.binaries, the additional binaries to be signed along with the discovered enclosed components.
|
||||
*/
|
||||
async function validateOptsBinaries(opts) {
|
||||
if (opts.binaries) {
|
||||
if (!Array.isArray(opts.binaries)) {
|
||||
throw new Error('Additional binaries should be an Array.');
|
||||
}
|
||||
// TODO: Presence check for binary files, reject if any does not exist
|
||||
}
|
||||
}
|
||||
function validateOptsIgnore(ignore) {
|
||||
if (ignore && !(ignore instanceof Array)) {
|
||||
return [ignore];
|
||||
}
|
||||
}
|
||||
/**
|
||||
* This function returns a promise validating all options passed in opts.
|
||||
*/
|
||||
async function validateSignOpts(opts) {
|
||||
await validateOptsBinaries(opts);
|
||||
await validateOptsApp(opts);
|
||||
if (opts.provisioningProfile && typeof opts.provisioningProfile !== 'string') {
|
||||
throw new Error('Path to provisioning profile should be a string.');
|
||||
}
|
||||
if (opts.type && opts.type !== 'development' && opts.type !== 'distribution') {
|
||||
throw new Error('Type must be either `development` or `distribution`.');
|
||||
}
|
||||
const platform = await validateOptsPlatform(opts);
|
||||
const cloned = Object.assign(Object.assign({}, opts), { ignore: validateOptsIgnore(opts.ignore), type: opts.type || 'distribution', platform });
|
||||
return cloned;
|
||||
}
|
||||
/**
|
||||
* This function returns a promise verifying the code sign of application bundle.
|
||||
*/
|
||||
async function verifySignApplication(opts) {
|
||||
// Verify with codesign
|
||||
debugLog('Verifying application bundle with codesign...');
|
||||
await execFileAsync('codesign', ['--verify', '--deep'].concat(opts.strictVerify !== false && compareVersion(osRelease, '15.0.0') >= 0 // Strict flag since darwin 15.0.0 --> OS X 10.11.0 El Capitan
|
||||
? [
|
||||
'--strict' +
|
||||
(opts.strictVerify
|
||||
? '=' + opts.strictVerify // Array should be converted to a comma separated string
|
||||
: '')
|
||||
]
|
||||
: [], ['--verbose=2', opts.app]));
|
||||
}
|
||||
function defaultOptionsForFile(filePath, platform) {
|
||||
const entitlementsFolder = path.resolve(__dirname, '..', '..', 'entitlements');
|
||||
let entitlementsFile;
|
||||
if (platform === 'darwin') {
|
||||
// Default Entitlements
|
||||
// c.f. https://source.chromium.org/chromium/chromium/src/+/main:chrome/app/app-entitlements.plist
|
||||
// Also include JIT for main process V8
|
||||
entitlementsFile = path.resolve(entitlementsFolder, 'default.darwin.plist');
|
||||
// Plugin helper
|
||||
// c.f. https://source.chromium.org/chromium/chromium/src/+/main:chrome/app/helper-plugin-entitlements.plist
|
||||
if (filePath.includes('(Plugin).app')) {
|
||||
entitlementsFile = path.resolve(entitlementsFolder, 'default.darwin.plugin.plist');
|
||||
// GPU Helper
|
||||
// c.f. https://source.chromium.org/chromium/chromium/src/+/main:chrome/app/helper-gpu-entitlements.plist
|
||||
}
|
||||
else if (filePath.includes('(GPU).app')) {
|
||||
entitlementsFile = path.resolve(entitlementsFolder, 'default.darwin.gpu.plist');
|
||||
// Renderer Helper
|
||||
// c.f. https://source.chromium.org/chromium/chromium/src/+/main:chrome/app/helper-renderer-entitlements.plist
|
||||
}
|
||||
else if (filePath.includes('(Renderer).app')) {
|
||||
entitlementsFile = path.resolve(entitlementsFolder, 'default.darwin.renderer.plist');
|
||||
}
|
||||
}
|
||||
else {
|
||||
// Default entitlements
|
||||
// TODO: Can these be more scoped like the non-mas variant?
|
||||
entitlementsFile = path.resolve(entitlementsFolder, 'default.mas.plist');
|
||||
// If it is not the top level app bundle, we sign with inherit
|
||||
if (filePath.includes('.app/')) {
|
||||
entitlementsFile = path.resolve(entitlementsFolder, 'default.mas.child.plist');
|
||||
}
|
||||
}
|
||||
return {
|
||||
entitlements: entitlementsFile,
|
||||
hardenedRuntime: true,
|
||||
requirements: undefined,
|
||||
signatureFlags: undefined,
|
||||
timestamp: undefined
|
||||
};
|
||||
}
|
||||
async function mergeOptionsForFile(opts, defaults) {
|
||||
const mergedPerFileOptions = Object.assign({}, defaults);
|
||||
if (opts) {
|
||||
if (opts.entitlements !== undefined) {
|
||||
if (Array.isArray(opts.entitlements)) {
|
||||
const entitlements = opts.entitlements.reduce((dict, entitlementKey) => (Object.assign(Object.assign({}, dict), { [entitlementKey]: true })), {});
|
||||
const dir = await fs.mkdtemp(path.resolve(os.tmpdir(), 'tmp-entitlements-'));
|
||||
const entitlementsPath = path.join(dir, 'entitlements.plist');
|
||||
await fs.writeFile(entitlementsPath, plist.build(entitlements), 'utf8');
|
||||
opts.entitlements = entitlementsPath;
|
||||
}
|
||||
mergedPerFileOptions.entitlements = opts.entitlements;
|
||||
}
|
||||
if (opts.hardenedRuntime !== undefined) {
|
||||
mergedPerFileOptions.hardenedRuntime = opts.hardenedRuntime;
|
||||
}
|
||||
if (opts.requirements !== undefined)
|
||||
mergedPerFileOptions.requirements = opts.requirements;
|
||||
if (opts.signatureFlags !== undefined) {
|
||||
mergedPerFileOptions.signatureFlags = opts.signatureFlags;
|
||||
}
|
||||
if (opts.timestamp !== undefined)
|
||||
mergedPerFileOptions.timestamp = opts.timestamp;
|
||||
}
|
||||
return mergedPerFileOptions;
|
||||
}
|
||||
/**
|
||||
* This function returns a promise codesigning only.
|
||||
*/
|
||||
async function signApplication(opts, identity) {
|
||||
function shouldIgnoreFilePath(filePath) {
|
||||
if (opts.ignore) {
|
||||
return opts.ignore.some(function (ignore) {
|
||||
if (typeof ignore === 'function') {
|
||||
return ignore(filePath);
|
||||
}
|
||||
return filePath.match(ignore);
|
||||
});
|
||||
}
|
||||
return false;
|
||||
}
|
||||
const children = await walkAsync(getAppContentsPath(opts));
|
||||
if (opts.binaries)
|
||||
children.push(...opts.binaries);
|
||||
const args = ['--sign', identity.hash || identity.name, '--force'];
|
||||
if (opts.keychain) {
|
||||
args.push('--keychain', opts.keychain);
|
||||
}
|
||||
/**
|
||||
* Sort the child paths by how deep they are in the file tree. Some arcane apple
|
||||
* logic expects the deeper files to be signed first otherwise strange errors get
|
||||
* thrown our way
|
||||
*/
|
||||
children.sort((a, b) => {
|
||||
const aDepth = a.split(path.sep).length;
|
||||
const bDepth = b.split(path.sep).length;
|
||||
return bDepth - aDepth;
|
||||
});
|
||||
for (const filePath of [...children, opts.app]) {
|
||||
if (shouldIgnoreFilePath(filePath)) {
|
||||
debugLog('Skipped... ' + filePath);
|
||||
continue;
|
||||
}
|
||||
const perFileOptions = await mergeOptionsForFile(opts.optionsForFile ? opts.optionsForFile(filePath) : null, defaultOptionsForFile(filePath, opts.platform));
|
||||
// preAutoEntitlements should only be applied to the top level app bundle.
|
||||
// Applying it other files will cause the app to crash and be rejected by Apple.
|
||||
if (!filePath.includes('.app/')) {
|
||||
if (opts.preAutoEntitlements === false) {
|
||||
debugWarn('Pre-sign operation disabled for entitlements automation.');
|
||||
}
|
||||
else {
|
||||
debugLog('Pre-sign operation enabled for entitlements automation with versions >= `1.1.1`:', '\n', '* Disable by setting `pre-auto-entitlements` to `false`.');
|
||||
if (!opts.version || compareVersion(opts.version, '1.1.1') >= 0) {
|
||||
// Enable Mac App Store sandboxing without using temporary-exception, introduced in Electron v1.1.1. Relates to electron#5601
|
||||
const newEntitlements = await preAutoEntitlements(opts, perFileOptions, {
|
||||
identity,
|
||||
provisioningProfile: opts.provisioningProfile
|
||||
? await getProvisioningProfile(opts.provisioningProfile, opts.keychain)
|
||||
: undefined
|
||||
});
|
||||
// preAutoEntitlements may provide us new entitlements, if so we update our options
|
||||
// and ensure that entitlements-loginhelper has a correct default value
|
||||
if (newEntitlements) {
|
||||
perFileOptions.entitlements = newEntitlements;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
debugLog('Signing... ' + filePath);
|
||||
const perFileArgs = [...args];
|
||||
if (perFileOptions.requirements) {
|
||||
perFileArgs.push('--requirements', perFileOptions.requirements);
|
||||
}
|
||||
if (perFileOptions.timestamp) {
|
||||
perFileArgs.push('--timestamp=' + perFileOptions.timestamp);
|
||||
}
|
||||
else {
|
||||
perFileArgs.push('--timestamp');
|
||||
}
|
||||
let optionsArguments = [];
|
||||
if (perFileOptions.signatureFlags) {
|
||||
if (Array.isArray(perFileOptions.signatureFlags)) {
|
||||
optionsArguments.push(...perFileOptions.signatureFlags);
|
||||
}
|
||||
else {
|
||||
const flags = perFileOptions.signatureFlags.split(',').map(function (flag) {
|
||||
return flag.trim();
|
||||
});
|
||||
optionsArguments.push(...flags);
|
||||
}
|
||||
}
|
||||
if (perFileOptions.hardenedRuntime || optionsArguments.includes('runtime')) {
|
||||
// Hardened runtime since darwin 17.7.0 --> macOS 10.13.6
|
||||
if (compareVersion(osRelease, '17.7.0') >= 0) {
|
||||
optionsArguments.push('runtime');
|
||||
}
|
||||
else {
|
||||
// Remove runtime if passed in with --signature-flags
|
||||
debugLog('Not enabling hardened runtime, current macOS version too low, requires 10.13.6 and higher');
|
||||
optionsArguments = optionsArguments.filter((arg) => {
|
||||
return arg !== 'runtime';
|
||||
});
|
||||
}
|
||||
}
|
||||
if (optionsArguments.length) {
|
||||
perFileArgs.push('--options', [...new Set(optionsArguments)].join(','));
|
||||
}
|
||||
await execFileAsync('codesign', perFileArgs.concat('--entitlements', perFileOptions.entitlements, filePath));
|
||||
}
|
||||
// Verify code sign
|
||||
debugLog('Verifying...');
|
||||
await verifySignApplication(opts);
|
||||
debugLog('Verified.');
|
||||
// Check entitlements if applicable
|
||||
debugLog('Displaying entitlements...');
|
||||
const result = await execFileAsync('codesign', [
|
||||
'--display',
|
||||
'--entitlements',
|
||||
':-',
|
||||
opts.app
|
||||
]);
|
||||
debugLog('Entitlements:', '\n', result);
|
||||
}
|
||||
/**
|
||||
* This function returns a promise signing the application.
|
||||
*/
|
||||
export async function signApp(_opts) {
|
||||
debugLog('electron-osx-sign@%s', pkgVersion);
|
||||
const validatedOpts = await validateSignOpts(_opts);
|
||||
let identities = [];
|
||||
let identityInUse = null;
|
||||
// Determine identity for signing
|
||||
if (validatedOpts.identity) {
|
||||
debugLog('`identity` passed in arguments.');
|
||||
if (validatedOpts.identityValidation === false) {
|
||||
identityInUse = new Identity(validatedOpts.identity);
|
||||
}
|
||||
else {
|
||||
identities = await findIdentities(validatedOpts.keychain || null, validatedOpts.identity);
|
||||
}
|
||||
}
|
||||
else {
|
||||
debugWarn('No `identity` passed in arguments...');
|
||||
if (validatedOpts.platform === 'mas') {
|
||||
if (validatedOpts.type === 'distribution') {
|
||||
debugLog('Finding `3rd Party Mac Developer Application` certificate for signing app distribution in the Mac App Store...');
|
||||
identities = await findIdentities(validatedOpts.keychain || null, '3rd Party Mac Developer Application:');
|
||||
}
|
||||
else {
|
||||
debugLog('Finding `Mac Developer` certificate for signing app in development for the Mac App Store signing...');
|
||||
identities = await findIdentities(validatedOpts.keychain || null, 'Mac Developer:');
|
||||
}
|
||||
}
|
||||
else {
|
||||
debugLog('Finding `Developer ID Application` certificate for distribution outside the Mac App Store...');
|
||||
identities = await findIdentities(validatedOpts.keychain || null, 'Developer ID Application:');
|
||||
}
|
||||
}
|
||||
if (!identityInUse) {
|
||||
if (identities.length > 0) {
|
||||
// Identity(/ies) found
|
||||
if (identities.length > 1) {
|
||||
debugWarn('Multiple identities found, will use the first discovered.');
|
||||
}
|
||||
else {
|
||||
debugLog('Found 1 identity.');
|
||||
}
|
||||
identityInUse = identities[0];
|
||||
}
|
||||
else {
|
||||
// No identity found
|
||||
throw new Error('No identity found for signing.');
|
||||
}
|
||||
}
|
||||
// Pre-sign operations
|
||||
if (validatedOpts.preEmbedProvisioningProfile === false) {
|
||||
debugWarn('Pre-sign operation disabled for provisioning profile embedding:', '\n', '* Enable by setting `pre-embed-provisioning-profile` to `true`.');
|
||||
}
|
||||
else {
|
||||
debugLog('Pre-sign operation enabled for provisioning profile:', '\n', '* Disable by setting `pre-embed-provisioning-profile` to `false`.');
|
||||
await preEmbedProvisioningProfile(validatedOpts, validatedOpts.provisioningProfile
|
||||
? await getProvisioningProfile(validatedOpts.provisioningProfile, validatedOpts.keychain)
|
||||
: null);
|
||||
}
|
||||
debugLog('Signing application...', '\n', '> Application:', validatedOpts.app, '\n', '> Platform:', validatedOpts.platform, '\n', '> Additional binaries:', validatedOpts.binaries, '\n', '> Identity:', validatedOpts.identity);
|
||||
await signApplication(validatedOpts, identityInUse);
|
||||
// Post-sign operations
|
||||
debugLog('Application signed.');
|
||||
}
|
||||
/**
|
||||
* This function is a legacy callback implementation.
|
||||
*
|
||||
* @deprecated Please use the promise based "signApp" method
|
||||
*/
|
||||
export const sign = (opts, cb) => {
|
||||
signApp(opts)
|
||||
.then(() => {
|
||||
debugLog('Application signed: ' + opts.app);
|
||||
if (cb)
|
||||
cb();
|
||||
})
|
||||
.catch((err) => {
|
||||
if (err.message)
|
||||
debugLog(err.message);
|
||||
else if (err.stack)
|
||||
debugLog(err.stack);
|
||||
else
|
||||
debugLog(err);
|
||||
if (cb)
|
||||
cb(err);
|
||||
});
|
||||
};
|
||||
//# sourceMappingURL=sign.js.map
|
||||
1
mc_test/node_modules/@electron/osx-sign/dist/esm/sign.js.map
generated
vendored
Executable file
1
mc_test/node_modules/@electron/osx-sign/dist/esm/sign.js.map
generated
vendored
Executable file
File diff suppressed because one or more lines are too long
73
mc_test/node_modules/@electron/osx-sign/dist/esm/types.d.ts
generated
vendored
Executable file
73
mc_test/node_modules/@electron/osx-sign/dist/esm/types.d.ts
generated
vendored
Executable file
@ -0,0 +1,73 @@
|
||||
export type ElectronMacPlatform = 'darwin' | 'mas';
|
||||
type SigningDistributionType = 'development' | 'distribution';
|
||||
export type BaseSignOptions = Readonly<{
|
||||
app: string;
|
||||
identity?: string;
|
||||
platform?: ElectronMacPlatform;
|
||||
keychain?: string;
|
||||
}>;
|
||||
type OnlyValidatedBaseSignOptions = {
|
||||
platform: ElectronMacPlatform;
|
||||
};
|
||||
/**
|
||||
* Any missing options will use the default values, providing a partial
|
||||
* structure will shallow merge with the default values.
|
||||
*/
|
||||
export type PerFileSignOptions = {
|
||||
/**
|
||||
* The entitlements file to use when signing this file
|
||||
*/
|
||||
entitlements?: string | string[];
|
||||
/**
|
||||
* Whether to enable hardened runtime for this file. Enabled by default.
|
||||
*/
|
||||
hardenedRuntime?: boolean;
|
||||
/**
|
||||
* The designated requirements to embed when signing this file
|
||||
*/
|
||||
requirements?: string;
|
||||
/**
|
||||
* See --options of the "codesign" command.
|
||||
*
|
||||
* https://www.manpagez.com/man/1/codesign
|
||||
*/
|
||||
signatureFlags?: string | string[];
|
||||
/**
|
||||
* The timestamp server to use when signing, by default uses the Apple provided
|
||||
* timestamp server.
|
||||
*/
|
||||
timestamp?: string;
|
||||
};
|
||||
type OnlySignOptions = {
|
||||
binaries?: string[];
|
||||
optionsForFile?: (filePath: string) => PerFileSignOptions;
|
||||
identityValidation?: boolean;
|
||||
ignore?: string | string[] | ((file: string) => boolean);
|
||||
preAutoEntitlements?: boolean;
|
||||
preEmbedProvisioningProfile?: boolean;
|
||||
provisioningProfile?: string;
|
||||
strictVerify?: boolean;
|
||||
type?: SigningDistributionType;
|
||||
version?: string;
|
||||
};
|
||||
type OnlyValidatedSignOptions = {
|
||||
ignore?: (string | ((file: string) => boolean))[];
|
||||
type: SigningDistributionType;
|
||||
};
|
||||
type OnlyFlatOptions = {
|
||||
identityValidation?: boolean;
|
||||
install?: string;
|
||||
pkg?: string;
|
||||
scripts?: string;
|
||||
};
|
||||
type OnlyValidatedFlatOptions = {
|
||||
install: string;
|
||||
pkg: string;
|
||||
};
|
||||
type ValidatedForm<UnValidated, Validated> = Omit<UnValidated, keyof Validated> & Validated;
|
||||
export type ValidatedBaseSignOptions = Readonly<ValidatedForm<BaseSignOptions, OnlyValidatedBaseSignOptions>>;
|
||||
export type SignOptions = Readonly<OnlySignOptions & BaseSignOptions>;
|
||||
export type ValidatedSignOptions = Readonly<ValidatedForm<OnlySignOptions, OnlyValidatedSignOptions> & ValidatedBaseSignOptions>;
|
||||
export type FlatOptions = Readonly<OnlyFlatOptions & BaseSignOptions>;
|
||||
export type ValidatedFlatOptions = Readonly<ValidatedForm<OnlyFlatOptions, OnlyValidatedFlatOptions> & ValidatedBaseSignOptions>;
|
||||
export {};
|
||||
2
mc_test/node_modules/@electron/osx-sign/dist/esm/types.js
generated
vendored
Executable file
2
mc_test/node_modules/@electron/osx-sign/dist/esm/types.js
generated
vendored
Executable file
@ -0,0 +1,2 @@
|
||||
export {};
|
||||
//# sourceMappingURL=types.js.map
|
||||
1
mc_test/node_modules/@electron/osx-sign/dist/esm/types.js.map
generated
vendored
Executable file
1
mc_test/node_modules/@electron/osx-sign/dist/esm/types.js.map
generated
vendored
Executable file
@ -0,0 +1 @@
|
||||
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../src/types.ts"],"names":[],"mappings":""}
|
||||
17
mc_test/node_modules/@electron/osx-sign/dist/esm/util-entitlements.d.ts
generated
vendored
Executable file
17
mc_test/node_modules/@electron/osx-sign/dist/esm/util-entitlements.d.ts
generated
vendored
Executable file
@ -0,0 +1,17 @@
|
||||
import { PerFileSignOptions, ValidatedSignOptions } from './types';
|
||||
import { Identity } from './util-identities';
|
||||
import { ProvisioningProfile } from './util-provisioning-profiles';
|
||||
type ComputedOptions = {
|
||||
identity: Identity;
|
||||
provisioningProfile?: ProvisioningProfile;
|
||||
};
|
||||
/**
|
||||
* This function returns a promise completing the entitlements automation: The
|
||||
* process includes checking in `Info.plist` for `ElectronTeamID` or setting
|
||||
* parsed value from identity, and checking in entitlements file for
|
||||
* `com.apple.security.application-groups` or inserting new into array. A
|
||||
* temporary entitlements file may be created to replace the input for any
|
||||
* changes introduced.
|
||||
*/
|
||||
export declare function preAutoEntitlements(opts: ValidatedSignOptions, perFileOpts: PerFileSignOptions, computed: ComputedOptions): Promise<void | string>;
|
||||
export {};
|
||||
106
mc_test/node_modules/@electron/osx-sign/dist/esm/util-entitlements.js
generated
vendored
Executable file
106
mc_test/node_modules/@electron/osx-sign/dist/esm/util-entitlements.js
generated
vendored
Executable file
@ -0,0 +1,106 @@
|
||||
import * as fs from 'fs-extra';
|
||||
import * as os from 'os';
|
||||
import * as path from 'path';
|
||||
import * as plist from 'plist';
|
||||
import { debugLog, getAppContentsPath } from './util';
|
||||
const preAuthMemo = new Map();
|
||||
/**
|
||||
* This function returns a promise completing the entitlements automation: The
|
||||
* process includes checking in `Info.plist` for `ElectronTeamID` or setting
|
||||
* parsed value from identity, and checking in entitlements file for
|
||||
* `com.apple.security.application-groups` or inserting new into array. A
|
||||
* temporary entitlements file may be created to replace the input for any
|
||||
* changes introduced.
|
||||
*/
|
||||
export async function preAutoEntitlements(opts, perFileOpts, computed) {
|
||||
var _a;
|
||||
if (!perFileOpts.entitlements)
|
||||
return;
|
||||
const memoKey = [opts.app, perFileOpts.entitlements].join('---');
|
||||
if (preAuthMemo.has(memoKey))
|
||||
return preAuthMemo.get(memoKey);
|
||||
// If entitlements file not provided, default will be used. Fixes #41
|
||||
const appInfoPath = path.join(getAppContentsPath(opts), 'Info.plist');
|
||||
debugLog('Automating entitlement app group...', '\n', '> Info.plist:', appInfoPath, '\n');
|
||||
let entitlements;
|
||||
if (typeof perFileOpts.entitlements === 'string') {
|
||||
const entitlementsContents = await fs.readFile(perFileOpts.entitlements, 'utf8');
|
||||
entitlements = plist.parse(entitlementsContents);
|
||||
}
|
||||
else {
|
||||
entitlements = perFileOpts.entitlements.reduce((dict, entitlementKey) => (Object.assign(Object.assign({}, dict), { [entitlementKey]: true })), {});
|
||||
}
|
||||
if (!entitlements['com.apple.security.app-sandbox']) {
|
||||
// Only automate when app sandbox enabled by user
|
||||
return;
|
||||
}
|
||||
const appInfoContents = await fs.readFile(appInfoPath, 'utf8');
|
||||
const appInfo = plist.parse(appInfoContents);
|
||||
// Use ElectronTeamID in Info.plist if already specified
|
||||
if (appInfo.ElectronTeamID) {
|
||||
debugLog('`ElectronTeamID` found in `Info.plist`: ' + appInfo.ElectronTeamID);
|
||||
}
|
||||
else {
|
||||
// The team identifier in signing identity should not be trusted
|
||||
if (computed.provisioningProfile) {
|
||||
appInfo.ElectronTeamID =
|
||||
computed.provisioningProfile.message.Entitlements['com.apple.developer.team-identifier'];
|
||||
debugLog('`ElectronTeamID` not found in `Info.plist`, use parsed from provisioning profile: ' +
|
||||
appInfo.ElectronTeamID);
|
||||
}
|
||||
else {
|
||||
const teamID = (_a = /^.+\((.+?)\)$/g.exec(computed.identity.name)) === null || _a === void 0 ? void 0 : _a[1];
|
||||
if (!teamID) {
|
||||
throw new Error(`Could not automatically determine ElectronTeamID from identity: ${computed.identity.name}`);
|
||||
}
|
||||
appInfo.ElectronTeamID = teamID;
|
||||
debugLog('`ElectronTeamID` not found in `Info.plist`, use parsed from signing identity: ' +
|
||||
appInfo.ElectronTeamID);
|
||||
}
|
||||
await fs.writeFile(appInfoPath, plist.build(appInfo), 'utf8');
|
||||
debugLog('`Info.plist` updated:', '\n', '> Info.plist:', appInfoPath);
|
||||
}
|
||||
const appIdentifier = appInfo.ElectronTeamID + '.' + appInfo.CFBundleIdentifier;
|
||||
// Insert application identifier if not exists
|
||||
if (entitlements['com.apple.application-identifier']) {
|
||||
debugLog('`com.apple.application-identifier` found in entitlements file: ' +
|
||||
entitlements['com.apple.application-identifier']);
|
||||
}
|
||||
else {
|
||||
debugLog('`com.apple.application-identifier` not found in entitlements file, new inserted: ' +
|
||||
appIdentifier);
|
||||
entitlements['com.apple.application-identifier'] = appIdentifier;
|
||||
}
|
||||
// Insert developer team identifier if not exists
|
||||
if (entitlements['com.apple.developer.team-identifier']) {
|
||||
debugLog('`com.apple.developer.team-identifier` found in entitlements file: ' +
|
||||
entitlements['com.apple.developer.team-identifier']);
|
||||
}
|
||||
else {
|
||||
debugLog('`com.apple.developer.team-identifier` not found in entitlements file, new inserted: ' +
|
||||
appInfo.ElectronTeamID);
|
||||
entitlements['com.apple.developer.team-identifier'] = appInfo.ElectronTeamID;
|
||||
}
|
||||
// Init entitlements app group key to array if not exists
|
||||
if (!entitlements['com.apple.security.application-groups']) {
|
||||
entitlements['com.apple.security.application-groups'] = [];
|
||||
}
|
||||
// Insert app group if not exists
|
||||
if (Array.isArray(entitlements['com.apple.security.application-groups']) &&
|
||||
entitlements['com.apple.security.application-groups'].indexOf(appIdentifier) === -1) {
|
||||
debugLog('`com.apple.security.application-groups` not found in entitlements file, new inserted: ' +
|
||||
appIdentifier);
|
||||
entitlements['com.apple.security.application-groups'].push(appIdentifier);
|
||||
}
|
||||
else {
|
||||
debugLog('`com.apple.security.application-groups` found in entitlements file: ' + appIdentifier);
|
||||
}
|
||||
// Create temporary entitlements file
|
||||
const dir = await fs.mkdtemp(path.resolve(os.tmpdir(), 'tmp-entitlements-'));
|
||||
const entitlementsPath = path.join(dir, 'entitlements.plist');
|
||||
await fs.writeFile(entitlementsPath, plist.build(entitlements), 'utf8');
|
||||
debugLog('Entitlements file updated:', '\n', '> Entitlements:', entitlementsPath);
|
||||
preAuthMemo.set(memoKey, entitlementsPath);
|
||||
return entitlementsPath;
|
||||
}
|
||||
//# sourceMappingURL=util-entitlements.js.map
|
||||
1
mc_test/node_modules/@electron/osx-sign/dist/esm/util-entitlements.js.map
generated
vendored
Executable file
1
mc_test/node_modules/@electron/osx-sign/dist/esm/util-entitlements.js.map
generated
vendored
Executable file
@ -0,0 +1 @@
|
||||
{"version":3,"file":"util-entitlements.js","sourceRoot":"","sources":["../../src/util-entitlements.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,MAAM,UAAU,CAAC;AAC/B,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,KAAK,MAAM,OAAO,CAAC;AAE/B,OAAO,EAAE,QAAQ,EAAE,kBAAkB,EAAE,MAAM,QAAQ,CAAC;AAStD,MAAM,WAAW,GAAG,IAAI,GAAG,EAAkB,CAAC;AAE9C;;;;;;;GAOG;AACH,MAAM,CAAC,KAAK,UAAU,mBAAmB,CACvC,IAA0B,EAC1B,WAA+B,EAC/B,QAAyB;;IAEzB,IAAI,CAAC,WAAW,CAAC,YAAY;QAAE,OAAO;IAEtC,MAAM,OAAO,GAAG,CAAC,IAAI,CAAC,GAAG,EAAE,WAAW,CAAC,YAAY,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IACjE,IAAI,WAAW,CAAC,GAAG,CAAC,OAAO,CAAC;QAAE,OAAO,WAAW,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IAE9D,qEAAqE;IACrE,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,YAAY,CAAC,CAAC;IAEtE,QAAQ,CACN,qCAAqC,EACrC,IAAI,EACJ,eAAe,EACf,WAAW,EACX,IAAI,CACL,CAAC;IACF,IAAI,YAAiC,CAAC;IACtC,IAAI,OAAO,WAAW,CAAC,YAAY,KAAK,QAAQ,EAAE;QAChD,MAAM,oBAAoB,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,WAAW,CAAC,YAAY,EAAE,MAAM,CAAC,CAAC;QACjF,YAAY,GAAG,KAAK,CAAC,KAAK,CAAC,oBAAoB,CAAwB,CAAC;KACzE;SAAM;QACL,YAAY,GAAG,WAAW,CAAC,YAAY,CAAC,MAAM,CAAsB,CAAC,IAAI,EAAE,cAAc,EAAE,EAAE,CAAC,iCACzF,IAAI,KACP,CAAC,cAAc,CAAC,EAAE,IAAI,IACtB,EAAE,EAAE,CAAC,CAAC;KACT;IACD,IAAI,CAAC,YAAY,CAAC,gCAAgC,CAAC,EAAE;QACnD,iDAAiD;QACjD,OAAO;KACR;IAED,MAAM,eAAe,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IAC/D,MAAM,OAAO,GAAG,KAAK,CAAC,KAAK,CAAC,eAAe,CAAwB,CAAC;IACpE,wDAAwD;IACxD,IAAI,OAAO,CAAC,cAAc,EAAE;QAC1B,QAAQ,CAAC,0CAA0C,GAAG,OAAO,CAAC,cAAc,CAAC,CAAC;KAC/E;SAAM;QACL,gEAAgE;QAChE,IAAI,QAAQ,CAAC,mBAAmB,EAAE;YAChC,OAAO,CAAC,cAAc;gBACpB,QAAQ,CAAC,mBAAmB,CAAC,OAAO,CAAC,YAAY,CAAC,qCAAqC,CAAC,CAAC;YAC3F,QAAQ,CACN,oFAAoF;gBAClF,OAAO,CAAC,cAAc,CACzB,CAAC;SACH;aAAM;YACL,MAAM,MAAM,GAAG,MAAA,gBAAgB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,IAAI,CAAC,0CAAG,CAAC,CAAC,CAAC;YAClE,IAAI,CAAC,MAAM,EAAE;gBACX,MAAM,IAAI,KAAK,CAAC,mEAAmE,QAAQ,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC,CAAC;aAC9G;YACD,OAAO,CAAC,cAAc,GAAG,MAAM,CAAC;YAChC,QAAQ,CACN,gFAAgF;gBAC9E,OAAO,CAAC,cAAc,CACzB,CAAC;SACH;QACD,MAAM,EAAE,CAAC,SAAS,CAAC,WAAW,EAAE,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,MAAM,CAAC,CAAC;QAE9D,QAAQ,CAAC,uBAAuB,EAAE,IAAI,EAAE,eAAe,EAAE,WAAW,CAAC,CAAC;KACvE;IAED,MAAM,aAAa,GAAG,OAAO,CAAC,cAAc,GAAG,GAAG,GAAG,OAAO,CAAC,kBAAkB,CAAC;IAChF,8CAA8C;IAC9C,IAAI,YAAY,CAAC,kCAAkC,CAAC,EAAE;QACpD,QAAQ,CACN,iEAAiE;YAC/D,YAAY,CAAC,kCAAkC,CAAC,CACnD,CAAC;KACH;SAAM;QACL,QAAQ,CACN,mFAAmF;YACjF,aAAa,CAChB,CAAC;QACF,YAAY,CAAC,kCAAkC,CAAC,GAAG,aAAa,CAAC;KAClE;IACD,iDAAiD;IACjD,IAAI,YAAY,CAAC,qCAAqC,CAAC,EAAE;QACvD,QAAQ,CACN,oEAAoE;YAClE,YAAY,CAAC,qCAAqC,CAAC,CACtD,CAAC;KACH;SAAM;QACL,QAAQ,CACN,sFAAsF;YACpF,OAAO,CAAC,cAAc,CACzB,CAAC;QACF,YAAY,CAAC,qCAAqC,CAAC,GAAG,OAAO,CAAC,cAAc,CAAC;KAC9E;IACD,yDAAyD;IACzD,IAAI,CAAC,YAAY,CAAC,uCAAuC,CAAC,EAAE;QAC1D,YAAY,CAAC,uCAAuC,CAAC,GAAG,EAAE,CAAC;KAC5D;IACD,iCAAiC;IACjC,IACE,KAAK,CAAC,OAAO,CAAC,YAAY,CAAC,uCAAuC,CAAC,CAAC;QACpE,YAAY,CAAC,uCAAuC,CAAC,CAAC,OAAO,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,EACnF;QACA,QAAQ,CACN,wFAAwF;YACtF,aAAa,CAChB,CAAC;QACF,YAAY,CAAC,uCAAuC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;KAC3E;SAAM;QACL,QAAQ,CACN,sEAAsE,GAAG,aAAa,CACvF,CAAC;KACH;IACD,qCAAqC;IACrC,MAAM,GAAG,GAAG,MAAM,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC,MAAM,EAAE,EAAE,mBAAmB,CAAC,CAAC,CAAC;IAC7E,MAAM,gBAAgB,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,oBAAoB,CAAC,CAAC;IAC9D,MAAM,EAAE,CAAC,SAAS,CAAC,gBAAgB,EAAE,KAAK,CAAC,KAAK,CAAC,YAAY,CAAC,EAAE,MAAM,CAAC,CAAC;IACxE,QAAQ,CAAC,4BAA4B,EAAE,IAAI,EAAE,iBAAiB,EAAE,gBAAgB,CAAC,CAAC;IAElF,WAAW,CAAC,GAAG,CAAC,OAAO,EAAE,gBAAgB,CAAC,CAAC;IAC3C,OAAO,gBAAgB,CAAC;AAC1B,CAAC"}
|
||||
6
mc_test/node_modules/@electron/osx-sign/dist/esm/util-identities.d.ts
generated
vendored
Executable file
6
mc_test/node_modules/@electron/osx-sign/dist/esm/util-identities.d.ts
generated
vendored
Executable file
@ -0,0 +1,6 @@
|
||||
export declare class Identity {
|
||||
name: string;
|
||||
hash?: string | undefined;
|
||||
constructor(name: string, hash?: string | undefined);
|
||||
}
|
||||
export declare function findIdentities(keychain: string | null, identity: string): Promise<Identity[]>;
|
||||
30
mc_test/node_modules/@electron/osx-sign/dist/esm/util-identities.js
generated
vendored
Executable file
30
mc_test/node_modules/@electron/osx-sign/dist/esm/util-identities.js
generated
vendored
Executable file
@ -0,0 +1,30 @@
|
||||
import { debugLog, compactFlattenedList, execFileAsync } from './util';
|
||||
export class Identity {
|
||||
constructor(name, hash) {
|
||||
this.name = name;
|
||||
this.hash = hash;
|
||||
}
|
||||
}
|
||||
export async function findIdentities(keychain, identity) {
|
||||
// Only to look for valid identities, excluding those flagged with
|
||||
// CSSMERR_TP_CERT_EXPIRED or CSSMERR_TP_NOT_TRUSTED. Fixes #9
|
||||
const args = [
|
||||
'find-identity',
|
||||
'-v'
|
||||
];
|
||||
if (keychain) {
|
||||
args.push(keychain);
|
||||
}
|
||||
const result = await execFileAsync('security', args);
|
||||
const identities = result.split('\n').map(function (line) {
|
||||
if (line.indexOf(identity) >= 0) {
|
||||
const identityFound = line.substring(line.indexOf('"') + 1, line.lastIndexOf('"'));
|
||||
const identityHashFound = line.substring(line.indexOf(')') + 2, line.indexOf('"') - 1);
|
||||
debugLog('Identity:', '\n', '> Name:', identityFound, '\n', '> Hash:', identityHashFound);
|
||||
return new Identity(identityFound, identityHashFound);
|
||||
}
|
||||
return null;
|
||||
});
|
||||
return compactFlattenedList(identities);
|
||||
}
|
||||
//# sourceMappingURL=util-identities.js.map
|
||||
1
mc_test/node_modules/@electron/osx-sign/dist/esm/util-identities.js.map
generated
vendored
Executable file
1
mc_test/node_modules/@electron/osx-sign/dist/esm/util-identities.js.map
generated
vendored
Executable file
@ -0,0 +1 @@
|
||||
{"version":3,"file":"util-identities.js","sourceRoot":"","sources":["../../src/util-identities.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,oBAAoB,EAAE,aAAa,EAAE,MAAM,QAAQ,CAAC;AAEvE,MAAM,OAAO,QAAQ;IACnB,YAAoB,IAAY,EAAS,IAAa;QAAlC,SAAI,GAAJ,IAAI,CAAQ;QAAS,SAAI,GAAJ,IAAI,CAAS;IAAG,CAAC;CAC3D;AAED,MAAM,CAAC,KAAK,UAAU,cAAc,CAAE,QAAuB,EAAE,QAAgB;IAC7E,kEAAkE;IAClE,8DAA8D;IAE9D,MAAM,IAAI,GAAG;QACX,eAAe;QACf,IAAI;KACL,CAAC;IACF,IAAI,QAAQ,EAAE;QACZ,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;KACrB;IAED,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC;IACrD,MAAM,UAAU,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,UAAU,IAAI;QACtD,IAAI,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE;YAC/B,MAAM,aAAa,GAAG,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC,CAAC;YACnF,MAAM,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC,CAAC;YACvF,QAAQ,CAAC,WAAW,EAAE,IAAI,EACxB,SAAS,EAAE,aAAa,EAAE,IAAI,EAC9B,SAAS,EAAE,iBAAiB,CAAC,CAAC;YAChC,OAAO,IAAI,QAAQ,CAAC,aAAa,EAAE,iBAAiB,CAAC,CAAC;SACvD;QAED,OAAO,IAAI,CAAC;IACd,CAAC,CAAC,CAAC;IAEH,OAAO,oBAAoB,CAAC,UAAU,CAAC,CAAC;AAC1C,CAAC"}
|
||||
25
mc_test/node_modules/@electron/osx-sign/dist/esm/util-provisioning-profiles.d.ts
generated
vendored
Executable file
25
mc_test/node_modules/@electron/osx-sign/dist/esm/util-provisioning-profiles.d.ts
generated
vendored
Executable file
@ -0,0 +1,25 @@
|
||||
import { ElectronMacPlatform, ValidatedSignOptions } from './types';
|
||||
export declare class ProvisioningProfile {
|
||||
filePath: string;
|
||||
message: any;
|
||||
constructor(filePath: string, message: any);
|
||||
get name(): string;
|
||||
get platforms(): ElectronMacPlatform[];
|
||||
get type(): "development" | "distribution";
|
||||
}
|
||||
/**
|
||||
* Returns a promise resolving to a ProvisioningProfile instance based on file.
|
||||
* @function
|
||||
* @param {string} filePath - Path to provisioning profile.
|
||||
* @param {string} keychain - Keychain to use when unlocking provisioning profile.
|
||||
* @returns {Promise} Promise.
|
||||
*/
|
||||
export declare function getProvisioningProfile(filePath: string, keychain?: string | null): Promise<ProvisioningProfile>;
|
||||
/**
|
||||
* Returns a promise resolving to a list of suitable provisioning profile within the current working directory.
|
||||
*/
|
||||
export declare function findProvisioningProfiles(opts: ValidatedSignOptions): Promise<ProvisioningProfile[]>;
|
||||
/**
|
||||
* Returns a promise embedding the provisioning profile in the app Contents folder.
|
||||
*/
|
||||
export declare function preEmbedProvisioningProfile(opts: ValidatedSignOptions, profile: ProvisioningProfile | null): Promise<void>;
|
||||
115
mc_test/node_modules/@electron/osx-sign/dist/esm/util-provisioning-profiles.js
generated
vendored
Executable file
115
mc_test/node_modules/@electron/osx-sign/dist/esm/util-provisioning-profiles.js
generated
vendored
Executable file
@ -0,0 +1,115 @@
|
||||
import * as fs from 'fs-extra';
|
||||
import * as path from 'path';
|
||||
import plist from 'plist';
|
||||
import { debugLog, debugWarn, getAppContentsPath, compactFlattenedList, execFileAsync } from './util';
|
||||
export class ProvisioningProfile {
|
||||
constructor(filePath, message) {
|
||||
this.filePath = filePath;
|
||||
this.message = message;
|
||||
}
|
||||
get name() {
|
||||
return this.message.Name;
|
||||
}
|
||||
get platforms() {
|
||||
if ('ProvisionsAllDevices' in this.message)
|
||||
return ['darwin'];
|
||||
// Developer ID
|
||||
else if (this.type === 'distribution')
|
||||
return ['mas'];
|
||||
// Mac App Store
|
||||
else
|
||||
return ['darwin', 'mas']; // Mac App Development
|
||||
}
|
||||
get type() {
|
||||
if ('ProvisionedDevices' in this.message)
|
||||
return 'development';
|
||||
// Mac App Development
|
||||
else
|
||||
return 'distribution'; // Developer ID or Mac App Store
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Returns a promise resolving to a ProvisioningProfile instance based on file.
|
||||
* @function
|
||||
* @param {string} filePath - Path to provisioning profile.
|
||||
* @param {string} keychain - Keychain to use when unlocking provisioning profile.
|
||||
* @returns {Promise} Promise.
|
||||
*/
|
||||
export async function getProvisioningProfile(filePath, keychain = null) {
|
||||
const securityArgs = [
|
||||
'cms',
|
||||
'-D',
|
||||
'-i',
|
||||
filePath // Use infile as source of data
|
||||
];
|
||||
if (keychain) {
|
||||
securityArgs.push('-k', keychain);
|
||||
}
|
||||
const result = await execFileAsync('security', securityArgs);
|
||||
const provisioningProfile = new ProvisioningProfile(filePath, plist.parse(result));
|
||||
debugLog('Provisioning profile:', '\n', '> Name:', provisioningProfile.name, '\n', '> Platforms:', provisioningProfile.platforms, '\n', '> Type:', provisioningProfile.type, '\n', '> Path:', provisioningProfile.filePath, '\n', '> Message:', provisioningProfile.message);
|
||||
return provisioningProfile;
|
||||
}
|
||||
/**
|
||||
* Returns a promise resolving to a list of suitable provisioning profile within the current working directory.
|
||||
*/
|
||||
export async function findProvisioningProfiles(opts) {
|
||||
const cwd = process.cwd();
|
||||
const children = await fs.readdir(cwd);
|
||||
const foundProfiles = compactFlattenedList(await Promise.all(children.map(async (child) => {
|
||||
const filePath = path.resolve(cwd, child);
|
||||
const stat = await fs.stat(filePath);
|
||||
if (stat.isFile() && path.extname(filePath) === '.provisionprofile') {
|
||||
return filePath;
|
||||
}
|
||||
return null;
|
||||
})));
|
||||
return compactFlattenedList(await Promise.all(foundProfiles.map(async (filePath) => {
|
||||
const profile = await getProvisioningProfile(filePath);
|
||||
if (profile.platforms.indexOf(opts.platform) >= 0 && profile.type === opts.type) {
|
||||
return profile;
|
||||
}
|
||||
debugWarn('Provisioning profile above ignored, not for ' + opts.platform + ' ' + opts.type + '.');
|
||||
return null;
|
||||
})));
|
||||
}
|
||||
/**
|
||||
* Returns a promise embedding the provisioning profile in the app Contents folder.
|
||||
*/
|
||||
export async function preEmbedProvisioningProfile(opts, profile) {
|
||||
async function embedProvisioningProfile(profile) {
|
||||
debugLog('Looking for existing provisioning profile...');
|
||||
const embeddedFilePath = path.join(getAppContentsPath(opts), 'embedded.provisionprofile');
|
||||
if (await fs.pathExists(embeddedFilePath)) {
|
||||
debugLog('Found embedded provisioning profile:', '\n', '* Please manually remove the existing file if not wanted.', '\n', '* Current file at:', embeddedFilePath);
|
||||
}
|
||||
else {
|
||||
debugLog('Embedding provisioning profile...');
|
||||
await fs.copy(profile.filePath, embeddedFilePath);
|
||||
}
|
||||
}
|
||||
if (profile) {
|
||||
// User input provisioning profile
|
||||
return await embedProvisioningProfile(profile);
|
||||
}
|
||||
else {
|
||||
// Discover provisioning profile
|
||||
debugLog('No `provisioning-profile` passed in arguments, will find in current working directory and in user library...');
|
||||
const profiles = await findProvisioningProfiles(opts);
|
||||
if (profiles.length > 0) {
|
||||
// Provisioning profile(s) found
|
||||
if (profiles.length > 1) {
|
||||
debugLog('Multiple provisioning profiles found, will use the first discovered.');
|
||||
}
|
||||
else {
|
||||
debugLog('Found 1 provisioning profile.');
|
||||
}
|
||||
await embedProvisioningProfile(profiles[0]);
|
||||
}
|
||||
else {
|
||||
// No provisioning profile found
|
||||
debugLog('No provisioning profile found, will not embed profile in app contents.');
|
||||
}
|
||||
}
|
||||
}
|
||||
//# sourceMappingURL=util-provisioning-profiles.js.map
|
||||
1
mc_test/node_modules/@electron/osx-sign/dist/esm/util-provisioning-profiles.js.map
generated
vendored
Executable file
1
mc_test/node_modules/@electron/osx-sign/dist/esm/util-provisioning-profiles.js.map
generated
vendored
Executable file
@ -0,0 +1 @@
|
||||
{"version":3,"file":"util-provisioning-profiles.js","sourceRoot":"","sources":["../../src/util-provisioning-profiles.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,MAAM,UAAU,CAAC;AAC/B,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,MAAM,OAAO,CAAC;AAG1B,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,kBAAkB,EAAE,oBAAoB,EAAE,aAAa,EAAE,MAAM,QAAQ,CAAC;AAEtG,MAAM,OAAO,mBAAmB;IAC9B,YAAoB,QAAgB,EAAS,OAAY;QAArC,aAAQ,GAAR,QAAQ,CAAQ;QAAS,YAAO,GAAP,OAAO,CAAK;IAAG,CAAC;IAE7D,IAAI,IAAI;QACN,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;IAC3B,CAAC;IAED,IAAI,SAAS;QACX,IAAI,sBAAsB,IAAI,IAAI,CAAC,OAAO;YAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;QAC9D,eAAe;aACV,IAAI,IAAI,CAAC,IAAI,KAAK,cAAc;YAAE,OAAO,CAAC,KAAK,CAAC,CAAC;QACtD,gBAAgB;;YACX,OAAO,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC,CAAC,sBAAsB;IACvD,CAAC;IAED,IAAI,IAAI;QACN,IAAI,oBAAoB,IAAI,IAAI,CAAC,OAAO;YAAE,OAAO,aAAa,CAAC;QAC/D,sBAAsB;;YACjB,OAAO,cAAc,CAAC,CAAC,gCAAgC;IAC9D,CAAC;CACF;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,sBAAsB,CAAE,QAAgB,EAAE,WAA0B,IAAI;IAC5F,MAAM,YAAY,GAAG;QACnB,KAAK;QACL,IAAI;QACJ,IAAI;QACJ,QAAQ,CAAC,+BAA+B;KACzC,CAAC;IAEF,IAAI,QAAQ,EAAE;QACZ,YAAY,CAAC,IAAI,CAAC,IAAI,EAAE,QAAQ,CAAC,CAAC;KACnC;IAED,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC;IAC7D,MAAM,mBAAmB,GAAG,IAAI,mBAAmB,CAAC,QAAQ,EAAE,KAAK,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC;IACnF,QAAQ,CACN,uBAAuB,EACvB,IAAI,EACJ,SAAS,EACT,mBAAmB,CAAC,IAAI,EACxB,IAAI,EACJ,cAAc,EACd,mBAAmB,CAAC,SAAS,EAC7B,IAAI,EACJ,SAAS,EACT,mBAAmB,CAAC,IAAI,EACxB,IAAI,EACJ,SAAS,EACT,mBAAmB,CAAC,QAAQ,EAC5B,IAAI,EACJ,YAAY,EACZ,mBAAmB,CAAC,OAAO,CAC5B,CAAC;IACF,OAAO,mBAAmB,CAAC;AAC7B,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,wBAAwB,CAAE,IAA0B;IACxE,MAAM,GAAG,GAAG,OAAO,CAAC,GAAG,EAAE,CAAC;IAC1B,MAAM,QAAQ,GAAG,MAAM,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;IACvC,MAAM,aAAa,GAAG,oBAAoB,CACxC,MAAM,OAAO,CAAC,GAAG,CACf,QAAQ,CAAC,GAAG,CAAC,KAAK,EAAE,KAAK,EAAE,EAAE;QAC3B,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;QAC1C,MAAM,IAAI,GAAG,MAAM,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACrC,IAAI,IAAI,CAAC,MAAM,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,KAAK,mBAAmB,EAAE;YACnE,OAAO,QAAQ,CAAC;SACjB;QACD,OAAO,IAAI,CAAC;IACd,CAAC,CAAC,CACH,CACF,CAAC;IAEF,OAAO,oBAAoB,CACzB,MAAM,OAAO,CAAC,GAAG,CACf,aAAa,CAAC,GAAG,CAAC,KAAK,EAAE,QAAQ,EAAE,EAAE;QACnC,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAAC,QAAQ,CAAC,CAAC;QACvD,IAAI,OAAO,CAAC,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,OAAO,CAAC,IAAI,KAAK,IAAI,CAAC,IAAI,EAAE;YAAE,OAAO,OAAO,CAAC;SAAE;QACpG,SAAS,CACP,8CAA8C,GAAG,IAAI,CAAC,QAAQ,GAAG,GAAG,GAAG,IAAI,CAAC,IAAI,GAAG,GAAG,CACvF,CAAC;QACF,OAAO,IAAI,CAAC;IACd,CAAC,CAAC,CACH,CACF,CAAC;AACJ,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,2BAA2B,CAAE,IAA0B,EAAE,OAAmC;IAChH,KAAK,UAAU,wBAAwB,CAAE,OAA4B;QACnE,QAAQ,CAAC,8CAA8C,CAAC,CAAC;QACzD,MAAM,gBAAgB,GAAG,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,2BAA2B,CAAC,CAAC;QAE1F,IAAI,MAAM,EAAE,CAAC,UAAU,CAAC,gBAAgB,CAAC,EAAE;YACzC,QAAQ,CACN,sCAAsC,EACtC,IAAI,EACJ,2DAA2D,EAC3D,IAAI,EACJ,oBAAoB,EACpB,gBAAgB,CACjB,CAAC;SACH;aAAM;YACL,QAAQ,CAAC,mCAAmC,CAAC,CAAC;YAC9C,MAAM,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,gBAAgB,CAAC,CAAC;SACnD;IACH,CAAC;IAED,IAAI,OAAO,EAAE;QACX,kCAAkC;QAClC,OAAO,MAAM,wBAAwB,CAAC,OAAO,CAAC,CAAC;KAChD;SAAM;QACL,gCAAgC;QAChC,QAAQ,CACN,8GAA8G,CAC/G,CAAC;QACF,MAAM,QAAQ,GAAG,MAAM,wBAAwB,CAAC,IAAI,CAAC,CAAC;QACtD,IAAI,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;YACvB,gCAAgC;YAChC,IAAI,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;gBACvB,QAAQ,CAAC,sEAAsE,CAAC,CAAC;aAClF;iBAAM;gBACL,QAAQ,CAAC,+BAA+B,CAAC,CAAC;aAC3C;YACD,MAAM,wBAAwB,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC;SAC7C;aAAM;YACL,gCAAgC;YAChC,QAAQ,CAAC,wEAAwE,CAAC,CAAC;SACpF;KACF;AACH,CAAC"}
|
||||
35
mc_test/node_modules/@electron/osx-sign/dist/esm/util.d.ts
generated
vendored
Executable file
35
mc_test/node_modules/@electron/osx-sign/dist/esm/util.d.ts
generated
vendored
Executable file
@ -0,0 +1,35 @@
|
||||
/// <reference types="node" />
|
||||
import * as child from 'child_process';
|
||||
import debug from 'debug';
|
||||
import { BaseSignOptions, ElectronMacPlatform } from './types';
|
||||
export declare const debugLog: debug.Debugger;
|
||||
export declare const debugWarn: debug.Debugger;
|
||||
export declare function execFileAsync(file: string, args: string[], options?: child.ExecFileOptions): Promise<string>;
|
||||
type DeepListItem<T> = null | T | DeepListItem<T>[];
|
||||
type DeepList<T> = DeepListItem<T>[];
|
||||
export declare function compactFlattenedList<T>(list: DeepList<T>): T[];
|
||||
/**
|
||||
* Returns the path to the "Contents" folder inside the application bundle
|
||||
*/
|
||||
export declare function getAppContentsPath(opts: BaseSignOptions): string;
|
||||
/**
|
||||
* Returns the path to app "Frameworks" within contents.
|
||||
*/
|
||||
export declare function getAppFrameworksPath(opts: BaseSignOptions): string;
|
||||
export declare function detectElectronPlatform(opts: BaseSignOptions): Promise<ElectronMacPlatform>;
|
||||
/**
|
||||
* This function returns a promise validating opts.app, the application to be signed or flattened.
|
||||
*/
|
||||
export declare function validateOptsApp(opts: BaseSignOptions): Promise<void>;
|
||||
/**
|
||||
* This function returns a promise validating opts.platform, the platform of Electron build. It allows auto-discovery if no opts.platform is specified.
|
||||
*/
|
||||
export declare function validateOptsPlatform(opts: BaseSignOptions): Promise<ElectronMacPlatform>;
|
||||
/**
|
||||
* This function returns a promise resolving all child paths within the directory specified.
|
||||
* @function
|
||||
* @param {string} dirPath - Path to directory.
|
||||
* @returns {Promise} Promise resolving child paths needing signing in order.
|
||||
*/
|
||||
export declare function walkAsync(dirPath: string): Promise<string[]>;
|
||||
export {};
|
||||
145
mc_test/node_modules/@electron/osx-sign/dist/esm/util.js
generated
vendored
Executable file
145
mc_test/node_modules/@electron/osx-sign/dist/esm/util.js
generated
vendored
Executable file
@ -0,0 +1,145 @@
|
||||
import * as child from 'child_process';
|
||||
import * as fs from 'fs-extra';
|
||||
import { isBinaryFile } from 'isbinaryfile';
|
||||
import * as path from 'path';
|
||||
import debug from 'debug';
|
||||
export const debugLog = debug('electron-osx-sign');
|
||||
debugLog.log = console.log.bind(console);
|
||||
export const debugWarn = debug('electron-osx-sign:warn');
|
||||
debugWarn.log = console.warn.bind(console);
|
||||
const removePassword = function (input) {
|
||||
return input.replace(/(-P |pass:|\/p|-pass )([^ ]+)/, function (_, p1) {
|
||||
return `${p1}***`;
|
||||
});
|
||||
};
|
||||
export async function execFileAsync(file, args, options = {}) {
|
||||
if (debugLog.enabled) {
|
||||
debugLog('Executing...', file, args && Array.isArray(args) ? removePassword(args.join(' ')) : '');
|
||||
}
|
||||
return new Promise(function (resolve, reject) {
|
||||
child.execFile(file, args, options, function (err, stdout, stderr) {
|
||||
if (err) {
|
||||
debugLog('Error executing file:', '\n', '> Stdout:', stdout, '\n', '> Stderr:', stderr);
|
||||
reject(err);
|
||||
return;
|
||||
}
|
||||
resolve(stdout);
|
||||
});
|
||||
});
|
||||
}
|
||||
export function compactFlattenedList(list) {
|
||||
const result = [];
|
||||
function populateResult(list) {
|
||||
if (!Array.isArray(list)) {
|
||||
if (list)
|
||||
result.push(list);
|
||||
}
|
||||
else if (list.length > 0) {
|
||||
for (const item of list)
|
||||
if (item)
|
||||
populateResult(item);
|
||||
}
|
||||
}
|
||||
populateResult(list);
|
||||
return result;
|
||||
}
|
||||
/**
|
||||
* Returns the path to the "Contents" folder inside the application bundle
|
||||
*/
|
||||
export function getAppContentsPath(opts) {
|
||||
return path.join(opts.app, 'Contents');
|
||||
}
|
||||
/**
|
||||
* Returns the path to app "Frameworks" within contents.
|
||||
*/
|
||||
export function getAppFrameworksPath(opts) {
|
||||
return path.join(getAppContentsPath(opts), 'Frameworks');
|
||||
}
|
||||
export async function detectElectronPlatform(opts) {
|
||||
const appFrameworksPath = getAppFrameworksPath(opts);
|
||||
if (await fs.pathExists(path.resolve(appFrameworksPath, 'Squirrel.framework'))) {
|
||||
return 'darwin';
|
||||
}
|
||||
else {
|
||||
return 'mas';
|
||||
}
|
||||
}
|
||||
/**
|
||||
* This function returns a promise resolving the file path if file binary.
|
||||
*/
|
||||
async function getFilePathIfBinary(filePath) {
|
||||
if (await isBinaryFile(filePath)) {
|
||||
return filePath;
|
||||
}
|
||||
return null;
|
||||
}
|
||||
/**
|
||||
* This function returns a promise validating opts.app, the application to be signed or flattened.
|
||||
*/
|
||||
export async function validateOptsApp(opts) {
|
||||
if (!opts.app) {
|
||||
throw new Error('Path to application must be specified.');
|
||||
}
|
||||
if (path.extname(opts.app) !== '.app') {
|
||||
throw new Error('Extension of application must be `.app`.');
|
||||
}
|
||||
if (!(await fs.pathExists(opts.app))) {
|
||||
throw new Error(`Application at path "${opts.app}" could not be found`);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* This function returns a promise validating opts.platform, the platform of Electron build. It allows auto-discovery if no opts.platform is specified.
|
||||
*/
|
||||
export async function validateOptsPlatform(opts) {
|
||||
if (opts.platform) {
|
||||
if (opts.platform === 'mas' || opts.platform === 'darwin') {
|
||||
return opts.platform;
|
||||
}
|
||||
else {
|
||||
debugWarn('`platform` passed in arguments not supported, checking Electron platform...');
|
||||
}
|
||||
}
|
||||
else {
|
||||
debugWarn('No `platform` passed in arguments, checking Electron platform...');
|
||||
}
|
||||
return await detectElectronPlatform(opts);
|
||||
}
|
||||
/**
|
||||
* This function returns a promise resolving all child paths within the directory specified.
|
||||
* @function
|
||||
* @param {string} dirPath - Path to directory.
|
||||
* @returns {Promise} Promise resolving child paths needing signing in order.
|
||||
*/
|
||||
export async function walkAsync(dirPath) {
|
||||
debugLog('Walking... ' + dirPath);
|
||||
async function _walkAsync(dirPath) {
|
||||
const children = await fs.readdir(dirPath);
|
||||
return await Promise.all(children.map(async (child) => {
|
||||
const filePath = path.resolve(dirPath, child);
|
||||
const stat = await fs.stat(filePath);
|
||||
if (stat.isFile()) {
|
||||
switch (path.extname(filePath)) {
|
||||
case '.cstemp': // Temporary file generated from past codesign
|
||||
debugLog('Removing... ' + filePath);
|
||||
await fs.remove(filePath);
|
||||
return null;
|
||||
default:
|
||||
return await getFilePathIfBinary(filePath);
|
||||
}
|
||||
}
|
||||
else if (stat.isDirectory() && !stat.isSymbolicLink()) {
|
||||
const walkResult = await _walkAsync(filePath);
|
||||
switch (path.extname(filePath)) {
|
||||
case '.app': // Application
|
||||
case '.framework': // Framework
|
||||
walkResult.push(filePath);
|
||||
}
|
||||
return walkResult;
|
||||
}
|
||||
return null;
|
||||
}));
|
||||
}
|
||||
const allPaths = await _walkAsync(dirPath);
|
||||
return compactFlattenedList(allPaths);
|
||||
}
|
||||
//# sourceMappingURL=util.js.map
|
||||
1
mc_test/node_modules/@electron/osx-sign/dist/esm/util.js.map
generated
vendored
Executable file
1
mc_test/node_modules/@electron/osx-sign/dist/esm/util.js.map
generated
vendored
Executable file
@ -0,0 +1 @@
|
||||
{"version":3,"file":"util.js","sourceRoot":"","sources":["../../src/util.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,KAAK,MAAM,eAAe,CAAC;AACvC,OAAO,KAAK,EAAE,MAAM,UAAU,CAAC;AAC/B,OAAO,EAAE,YAAY,EAAE,MAAM,cAAc,CAAC;AAC5C,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAE7B,OAAO,KAAK,MAAM,OAAO,CAAC;AAG1B,MAAM,CAAC,MAAM,QAAQ,GAAG,KAAK,CAAC,mBAAmB,CAAC,CAAC;AACnD,QAAQ,CAAC,GAAG,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;AAEzC,MAAM,CAAC,MAAM,SAAS,GAAG,KAAK,CAAC,wBAAwB,CAAC,CAAC;AACzD,SAAS,CAAC,GAAG,GAAG,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;AAE3C,MAAM,cAAc,GAAG,UAAU,KAAa;IAC5C,OAAO,KAAK,CAAC,OAAO,CAAC,+BAA+B,EAAE,UAAU,CAAC,EAAE,EAAE;QACnE,OAAO,GAAG,EAAE,KAAK,CAAC;IACpB,CAAC,CAAC,CAAC;AACL,CAAC,CAAC;AAEF,MAAM,CAAC,KAAK,UAAU,aAAa,CACjC,IAAY,EACZ,IAAc,EACd,UAAiC,EAAE;IAEnC,IAAI,QAAQ,CAAC,OAAO,EAAE;QACpB,QAAQ,CACN,cAAc,EACd,IAAI,EACJ,IAAI,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAClE,CAAC;KACH;IAED,OAAO,IAAI,OAAO,CAAC,UAAU,OAAO,EAAE,MAAM;QAC1C,KAAK,CAAC,QAAQ,CAAC,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,GAAG,EAAE,MAAM,EAAE,MAAM;YAC/D,IAAI,GAAG,EAAE;gBACP,QAAQ,CAAC,uBAAuB,EAAE,IAAI,EAAE,WAAW,EAAE,MAAM,EAAE,IAAI,EAAE,WAAW,EAAE,MAAM,CAAC,CAAC;gBACxF,MAAM,CAAC,GAAG,CAAC,CAAC;gBACZ,OAAO;aACR;YACD,OAAO,CAAC,MAAM,CAAC,CAAC;QAClB,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC;AAKD,MAAM,UAAU,oBAAoB,CAAK,IAAiB;IACxD,MAAM,MAAM,GAAQ,EAAE,CAAC;IAEvB,SAAS,cAAc,CAAE,IAAqB;QAC5C,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE;YACxB,IAAI,IAAI;gBAAE,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;SAC7B;aAAM,IAAI,IAAI,CAAC,MAAM,GAAG,CAAC,EAAE;YAC1B,KAAK,MAAM,IAAI,IAAI,IAAI;gBAAE,IAAI,IAAI;oBAAE,cAAc,CAAC,IAAI,CAAC,CAAC;SACzD;IACH,CAAC;IAED,cAAc,CAAC,IAAI,CAAC,CAAC;IACrB,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,kBAAkB,CAAE,IAAqB;IACvD,OAAO,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,UAAU,CAAC,CAAC;AACzC,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,oBAAoB,CAAE,IAAqB;IACzD,OAAO,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,YAAY,CAAC,CAAC;AAC3D,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,sBAAsB,CAAE,IAAqB;IACjE,MAAM,iBAAiB,GAAG,oBAAoB,CAAC,IAAI,CAAC,CAAC;IACrD,IAAI,MAAM,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,OAAO,CAAC,iBAAiB,EAAE,oBAAoB,CAAC,CAAC,EAAE;QAC9E,OAAO,QAAQ,CAAC;KACjB;SAAM;QACL,OAAO,KAAK,CAAC;KACd;AACH,CAAC;AAED;;GAEG;AACH,KAAK,UAAU,mBAAmB,CAAE,QAAgB;IAClD,IAAI,MAAM,YAAY,CAAC,QAAQ,CAAC,EAAE;QAChC,OAAO,QAAQ,CAAC;KACjB;IACD,OAAO,IAAI,CAAC;AACd,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,eAAe,CAAE,IAAqB;IAC1D,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;QACb,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;KAC3D;IACD,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,MAAM,EAAE;QACrC,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;KAC7D;IACD,IAAI,CAAC,CAAC,MAAM,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE;QACpC,MAAM,IAAI,KAAK,CAAC,wBAAwB,IAAI,CAAC,GAAG,sBAAsB,CAAC,CAAC;KACzE;AACH,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,oBAAoB,CAAE,IAAqB;IAC/D,IAAI,IAAI,CAAC,QAAQ,EAAE;QACjB,IAAI,IAAI,CAAC,QAAQ,KAAK,KAAK,IAAI,IAAI,CAAC,QAAQ,KAAK,QAAQ,EAAE;YACzD,OAAO,IAAI,CAAC,QAAQ,CAAC;SACtB;aAAM;YACL,SAAS,CAAC,6EAA6E,CAAC,CAAC;SAC1F;KACF;SAAM;QACL,SAAS,CAAC,kEAAkE,CAAC,CAAC;KAC/E;IAED,OAAO,MAAM,sBAAsB,CAAC,IAAI,CAAC,CAAC;AAC5C,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,SAAS,CAAE,OAAe;IAC9C,QAAQ,CAAC,aAAa,GAAG,OAAO,CAAC,CAAC;IAElC,KAAK,UAAU,UAAU,CAAE,OAAe;QACxC,MAAM,QAAQ,GAAG,MAAM,EAAE,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC3C,OAAO,MAAM,OAAO,CAAC,GAAG,CACtB,QAAQ,CAAC,GAAG,CAAC,KAAK,EAAE,KAAK,EAAE,EAAE;YAC3B,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;YAE9C,MAAM,IAAI,GAAG,MAAM,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YACrC,IAAI,IAAI,CAAC,MAAM,EAAE,EAAE;gBACjB,QAAQ,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE;oBAC9B,KAAK,SAAS,EAAE,8CAA8C;wBAC5D,QAAQ,CAAC,cAAc,GAAG,QAAQ,CAAC,CAAC;wBACpC,MAAM,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;wBAC1B,OAAO,IAAI,CAAC;oBACd;wBACE,OAAO,MAAM,mBAAmB,CAAC,QAAQ,CAAC,CAAC;iBAC9C;aACF;iBAAM,IAAI,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE,EAAE;gBACvD,MAAM,UAAU,GAAG,MAAM,UAAU,CAAC,QAAQ,CAAC,CAAC;gBAC9C,QAAQ,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE;oBAC9B,KAAK,MAAM,CAAC,CAAC,cAAc;oBAC3B,KAAK,YAAY,EAAE,YAAY;wBAC7B,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;iBAC7B;gBACD,OAAO,UAAU,CAAC;aACnB;YACD,OAAO,IAAI,CAAC;QACd,CAAC,CAAC,CACH,CAAC;IACJ,CAAC;IAED,MAAM,QAAQ,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,CAAC;IAC3C,OAAO,oBAAoB,CAAC,QAAQ,CAAC,CAAC;AACxC,CAAC"}
|
||||
Reference in New Issue
Block a user