mirror of
https://github.com/denoland/deno.git
synced 2024-12-14 19:37:59 -05:00
ce75e31625
This commit changes "include_js_files!" macro from "deno_core" in a way that "dir" option doesn't cause specifiers to be rewritten to include it. Example: ``` include_js_files! { dir "js", "hello.js", } ``` The above definition required embedders to use: `import ... from "internal:<ext_name>/js/hello.js"`. But with this change, the "js" directory in which the files are stored is an implementation detail, which for embedders results in: `import ... from "internal:<ext_name>/hello.js"`. The directory the files are stored in, is an implementation detail and in some cases might result in a significant size difference for the snapshot. As an example, in "deno_node" extension, we store the source code in "polyfills" directory; which resulted in each specifier to look like "internal:deno_node/polyfills/<module_name>", but with this change it's "internal:deno_node/<module_name>". Given that "deno_node" has over 100 files, many of them having several import specifiers to the same extension, this change removes 10 characters from each import specifier.
186 lines
4.2 KiB
TypeScript
186 lines
4.2 KiB
TypeScript
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
|
|
// Copyright Joyent, Inc. and Node.js contributors. All rights reserved. MIT license.
|
|
|
|
import { KeyObject } from "internal:deno_node/internal/crypto/keys.ts";
|
|
import { Buffer } from "internal:deno_node/buffer.ts";
|
|
import { ERR_INVALID_ARG_TYPE } from "internal:deno_node/internal/errors.ts";
|
|
import { isArrayBufferView } from "internal:deno_node/internal/util/types.ts";
|
|
import { notImplemented } from "internal:deno_node/_utils.ts";
|
|
import { BinaryLike } from "internal:deno_node/internal/crypto/types.ts";
|
|
|
|
// deno-lint-ignore no-explicit-any
|
|
export type PeerCertificate = any;
|
|
|
|
export interface X509CheckOptions {
|
|
/**
|
|
* @default 'always'
|
|
*/
|
|
subject: "always" | "never";
|
|
/**
|
|
* @default true
|
|
*/
|
|
wildcards: boolean;
|
|
/**
|
|
* @default true
|
|
*/
|
|
partialWildcards: boolean;
|
|
/**
|
|
* @default false
|
|
*/
|
|
multiLabelWildcards: boolean;
|
|
/**
|
|
* @default false
|
|
*/
|
|
singleLabelSubdomains: boolean;
|
|
}
|
|
|
|
export class X509Certificate {
|
|
constructor(buffer: BinaryLike) {
|
|
if (typeof buffer === "string") {
|
|
buffer = Buffer.from(buffer);
|
|
}
|
|
|
|
if (!isArrayBufferView(buffer)) {
|
|
throw new ERR_INVALID_ARG_TYPE(
|
|
"buffer",
|
|
["string", "Buffer", "TypedArray", "DataView"],
|
|
buffer,
|
|
);
|
|
}
|
|
|
|
notImplemented("crypto.X509Certificate");
|
|
}
|
|
|
|
get ca(): boolean {
|
|
notImplemented("crypto.X509Certificate.prototype.ca");
|
|
|
|
return false;
|
|
}
|
|
|
|
checkEmail(
|
|
_email: string,
|
|
_options?: Pick<X509CheckOptions, "subject">,
|
|
): string | undefined {
|
|
notImplemented("crypto.X509Certificate.prototype.checkEmail");
|
|
}
|
|
|
|
checkHost(_name: string, _options?: X509CheckOptions): string | undefined {
|
|
notImplemented("crypto.X509Certificate.prototype.checkHost");
|
|
}
|
|
|
|
checkIP(_ip: string): string | undefined {
|
|
notImplemented("crypto.X509Certificate.prototype.checkIP");
|
|
}
|
|
|
|
checkIssued(_otherCert: X509Certificate): boolean {
|
|
notImplemented("crypto.X509Certificate.prototype.checkIssued");
|
|
}
|
|
|
|
checkPrivateKey(_privateKey: KeyObject): boolean {
|
|
notImplemented("crypto.X509Certificate.prototype.checkPrivateKey");
|
|
}
|
|
|
|
get fingerprint(): string {
|
|
notImplemented("crypto.X509Certificate.prototype.fingerprint");
|
|
|
|
return "";
|
|
}
|
|
|
|
get fingerprint256(): string {
|
|
notImplemented("crypto.X509Certificate.prototype.fingerprint256");
|
|
|
|
return "";
|
|
}
|
|
|
|
get fingerprint512(): string {
|
|
notImplemented("crypto.X509Certificate.prototype.fingerprint512");
|
|
|
|
return "";
|
|
}
|
|
|
|
get infoAccess(): string | undefined {
|
|
notImplemented("crypto.X509Certificate.prototype.infoAccess");
|
|
|
|
return "";
|
|
}
|
|
|
|
get issuer(): string {
|
|
notImplemented("crypto.X509Certificate.prototype.issuer");
|
|
|
|
return "";
|
|
}
|
|
|
|
get issuerCertificate(): X509Certificate | undefined {
|
|
notImplemented("crypto.X509Certificate.prototype.issuerCertificate");
|
|
|
|
return {} as X509Certificate;
|
|
}
|
|
|
|
get keyUsage(): string[] {
|
|
notImplemented("crypto.X509Certificate.prototype.keyUsage");
|
|
|
|
return [];
|
|
}
|
|
|
|
get publicKey(): KeyObject {
|
|
notImplemented("crypto.X509Certificate.prototype.publicKey");
|
|
|
|
return {} as KeyObject;
|
|
}
|
|
|
|
get raw(): Buffer {
|
|
notImplemented("crypto.X509Certificate.prototype.raw");
|
|
|
|
return {} as Buffer;
|
|
}
|
|
|
|
get serialNumber(): string {
|
|
notImplemented("crypto.X509Certificate.prototype.serialNumber");
|
|
|
|
return "";
|
|
}
|
|
|
|
get subject(): string {
|
|
notImplemented("crypto.X509Certificate.prototype.subject");
|
|
|
|
return "";
|
|
}
|
|
|
|
get subjectAltName(): string | undefined {
|
|
notImplemented("crypto.X509Certificate.prototype.subjectAltName");
|
|
|
|
return "";
|
|
}
|
|
|
|
toJSON(): string {
|
|
return this.toString();
|
|
}
|
|
|
|
toLegacyObject(): PeerCertificate {
|
|
notImplemented("crypto.X509Certificate.prototype.toLegacyObject");
|
|
}
|
|
|
|
toString(): string {
|
|
notImplemented("crypto.X509Certificate.prototype.toString");
|
|
}
|
|
|
|
get validFrom(): string {
|
|
notImplemented("crypto.X509Certificate.prototype.validFrom");
|
|
|
|
return "";
|
|
}
|
|
|
|
get validTo(): string {
|
|
notImplemented("crypto.X509Certificate.prototype.validTo");
|
|
|
|
return "";
|
|
}
|
|
|
|
verify(_publicKey: KeyObject): boolean {
|
|
notImplemented("crypto.X509Certificate.prototype.verify");
|
|
}
|
|
}
|
|
|
|
export default {
|
|
X509Certificate,
|
|
};
|