feat: 添加多项功能和修复
功能新增: - OSS 存储使用情况显示(文件页面) - OSS 当日流量统计(阿里云云监控API) - 分享页面路由修复(/s/xxx 格式支持) Bug修复: - 修复分享页面资源路径(相对路径改绝对路径) - 修复分享码获取逻辑(支持路径格式) - 修复OSS配额undefined显示问题 - 修复登录流程OSS配置检查 - 修复文件数为null时的显示问题 依赖更新: - 添加 @alicloud/cms20190101 云监控SDK - 添加 @alicloud/openapi-client Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
66
backend/node_modules/@alicloud/darabonba-signature-util/dist/client.d.ts
generated
vendored
Normal file
66
backend/node_modules/@alicloud/darabonba-signature-util/dist/client.d.ts
generated
vendored
Normal file
@@ -0,0 +1,66 @@
|
||||
/// <reference types="node" />
|
||||
export default class Client {
|
||||
/**
|
||||
* HmacSHA1 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA1Sign(stringToSign: string, secret: string): Buffer;
|
||||
/**
|
||||
* HmacSHA1 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA1SignByBytes(stringToSign: string, secret: Buffer): Buffer;
|
||||
/**
|
||||
* HmacSHA256 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA256Sign(stringToSign: string, secret: string): Buffer;
|
||||
/**
|
||||
* HmacSHA256 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA256SignByBytes(stringToSign: string, secret: Buffer): Buffer;
|
||||
/**
|
||||
* HmacSM3 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSM3Sign(stringToSign: string, secret: string): Buffer;
|
||||
/**
|
||||
* HmacSM3 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSM3SignByBytes(stringToSign: string, secret: Buffer): Buffer;
|
||||
/**
|
||||
* SHA256withRSA Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static SHA256withRSASign(stringToSign: string, secret: string): Buffer;
|
||||
/**
|
||||
* MD5 Signature
|
||||
*
|
||||
* @param stringToSign string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static MD5Sign(stringToSign: string): Buffer;
|
||||
/**
|
||||
* MD5 Signature
|
||||
*
|
||||
* @param bytesToSign bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static MD5SignForBytes(bytesToSign: Buffer): Buffer;
|
||||
}
|
||||
112
backend/node_modules/@alicloud/darabonba-signature-util/dist/client.js
generated
vendored
Normal file
112
backend/node_modules/@alicloud/darabonba-signature-util/dist/client.js
generated
vendored
Normal file
@@ -0,0 +1,112 @@
|
||||
"use strict";
|
||||
var __importDefault = (this && this.__importDefault) || function (mod) {
|
||||
return (mod && mod.__esModule) ? mod : { "default": mod };
|
||||
};
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
// This file is auto-generated, don't edit it
|
||||
/**
|
||||
* Signature Util for Darabonba.
|
||||
*/
|
||||
const crypto_1 = __importDefault(require("crypto"));
|
||||
class Client {
|
||||
/**
|
||||
* HmacSHA1 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA1Sign(stringToSign, secret) {
|
||||
const obj = crypto_1.default.createHmac('sha1', secret);
|
||||
obj.update(stringToSign);
|
||||
return obj.digest();
|
||||
}
|
||||
/**
|
||||
* HmacSHA1 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA1SignByBytes(stringToSign, secret) {
|
||||
return Client.HmacSHA1Sign(stringToSign, secret.toString());
|
||||
}
|
||||
/**
|
||||
* HmacSHA256 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA256Sign(stringToSign, secret) {
|
||||
const obj = crypto_1.default.createHmac('sha256', secret);
|
||||
obj.update(stringToSign);
|
||||
return obj.digest();
|
||||
}
|
||||
/**
|
||||
* HmacSHA256 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA256SignByBytes(stringToSign, secret) {
|
||||
return Client.HmacSHA256Sign(stringToSign, secret.toString());
|
||||
}
|
||||
/**
|
||||
* HmacSM3 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSM3Sign(stringToSign, secret) {
|
||||
const obj = crypto_1.default.createHmac('sm3', secret);
|
||||
obj.update(stringToSign);
|
||||
return obj.digest();
|
||||
}
|
||||
/**
|
||||
* HmacSM3 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSM3SignByBytes(stringToSign, secret) {
|
||||
return Client.HmacSM3Sign(stringToSign, secret.toString());
|
||||
}
|
||||
/**
|
||||
* SHA256withRSA Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static SHA256withRSASign(stringToSign, secret) {
|
||||
const PEM_BEGIN = "-----BEGIN PRIVATE KEY-----\n";
|
||||
const PEM_END = "\n-----END PRIVATE KEY-----";
|
||||
if (!secret.startsWith(PEM_BEGIN)) {
|
||||
secret = PEM_BEGIN + secret;
|
||||
}
|
||||
if (!secret.endsWith(PEM_END)) {
|
||||
secret = secret + PEM_END;
|
||||
}
|
||||
var signerObject = crypto_1.default.createSign("RSA-SHA256");
|
||||
signerObject.update(stringToSign);
|
||||
var signature = signerObject.sign({ key: secret, padding: crypto_1.default.constants.RSA_PKCS1_PADDING });
|
||||
return signature;
|
||||
}
|
||||
/**
|
||||
* MD5 Signature
|
||||
*
|
||||
* @param stringToSign string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static MD5Sign(stringToSign) {
|
||||
return crypto_1.default.createHash('md5').update(stringToSign, 'utf8').digest();
|
||||
}
|
||||
/**
|
||||
* MD5 Signature
|
||||
*
|
||||
* @param bytesToSign bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static MD5SignForBytes(bytesToSign) {
|
||||
return Client.MD5Sign(bytesToSign.toString());
|
||||
}
|
||||
}
|
||||
exports.default = Client;
|
||||
//# sourceMappingURL=client.js.map
|
||||
1
backend/node_modules/@alicloud/darabonba-signature-util/dist/client.js.map
generated
vendored
Normal file
1
backend/node_modules/@alicloud/darabonba-signature-util/dist/client.js.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"client.js","sourceRoot":"","sources":["../src/client.ts"],"names":[],"mappings":";;;;;AAAA,6CAA6C;AAC7C;;GAEG;AACH,oDAA4B;AAG5B,MAAqB,MAAM;IAEzB;;;;;OAKG;IACH,MAAM,CAAC,YAAY,CAAC,YAAoB,EAAE,MAAc;QACtD,MAAM,GAAG,GAAG,gBAAM,CAAC,UAAU,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC9C,GAAG,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QACzB,OAAO,GAAG,CAAC,MAAM,EAAE,CAAC;IACtB,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,mBAAmB,CAAC,YAAoB,EAAE,MAAc;QAC7D,OAAO,MAAM,CAAC,YAAY,CAAC,YAAY,EAAE,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAC;IAC9D,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,cAAc,CAAC,YAAoB,EAAE,MAAc;QACxD,MAAM,GAAG,GAAG,gBAAM,CAAC,UAAU,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;QAChD,GAAG,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QACzB,OAAO,GAAG,CAAC,MAAM,EAAE,CAAC;IACtB,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,qBAAqB,CAAC,YAAoB,EAAE,MAAc;QAC/D,OAAO,MAAM,CAAC,cAAc,CAAC,YAAY,EAAE,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAC;IAChE,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,WAAW,CAAC,YAAoB,EAAE,MAAc;QACrD,MAAM,GAAG,GAAG,gBAAM,CAAC,UAAU,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAC7C,GAAG,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QACzB,OAAO,GAAG,CAAC,MAAM,EAAE,CAAC;IACtB,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,kBAAkB,CAAC,YAAoB,EAAE,MAAc;QAC5D,OAAO,MAAM,CAAC,WAAW,CAAC,YAAY,EAAE,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAC;IAC7D,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,iBAAiB,CAAC,YAAoB,EAAE,MAAc;QAC3D,MAAM,SAAS,GAAG,+BAA+B,CAAC;QAClD,MAAM,OAAO,GAAG,6BAA6B,CAAC;QAC9C,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE;YACjC,MAAM,GAAG,SAAS,GAAG,MAAM,CAAC;SAC7B;QACD,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE;YAC7B,MAAM,GAAG,MAAM,GAAG,OAAO,CAAC;SAC3B;QACD,IAAI,YAAY,GAAG,gBAAM,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;QACnD,YAAY,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QAClC,IAAI,SAAS,GAAG,YAAY,CAAC,IAAI,CAAC,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,gBAAM,CAAC,SAAS,CAAC,iBAAiB,EAAE,CAAC,CAAC;QAChG,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,OAAO,CAAC,YAAoB;QACjC,OAAO,gBAAM,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,YAAY,EAAE,MAAM,CAAC,CAAC,MAAM,EAAE,CAAC;IACxE,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,eAAe,CAAC,WAAmB;QACxC,OAAO,MAAM,CAAC,OAAO,CAAC,WAAW,CAAC,QAAQ,EAAE,CAAC,CAAC;IAChD,CAAC;CAEF;AA7GD,yBA6GC"}
|
||||
46
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/dist/client.d.ts
generated
vendored
Normal file
46
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/dist/client.d.ts
generated
vendored
Normal file
@@ -0,0 +1,46 @@
|
||||
/// <reference types="node" />
|
||||
export default class Client {
|
||||
/**
|
||||
* Encode the URL
|
||||
* @param url string
|
||||
* @return encoded string
|
||||
*/
|
||||
static urlEncode(url: string): string;
|
||||
/**
|
||||
* Special encoding for url params.
|
||||
* @param params string
|
||||
* @return encoded string
|
||||
*/
|
||||
static percentEncode(raw: string): string;
|
||||
/**
|
||||
* Encode the partial path of url.
|
||||
* @param path string
|
||||
* @return encoded string
|
||||
*/
|
||||
static pathEncode(path: string): string;
|
||||
/**
|
||||
* Hex encode for byte array.
|
||||
* @param raw byte array
|
||||
* @return encoded string
|
||||
*/
|
||||
static hexEncode(raw: Buffer): string;
|
||||
/**
|
||||
* Hash the raw data with signatureAlgorithm.
|
||||
* @param raw hashing data
|
||||
* @param signatureAlgorithm the autograph method
|
||||
* @return hashed bytes
|
||||
*/
|
||||
static hash(raw: Buffer, signatureAlgorithm: string): Buffer;
|
||||
/**
|
||||
* Base64 encoder for byte array.
|
||||
* @param raw byte array
|
||||
* @return encoded string
|
||||
*/
|
||||
static base64EncodeToString(raw: Buffer): string;
|
||||
/**
|
||||
* Base64 dncoder for string.
|
||||
* @param src string
|
||||
* @return dncoded byte array
|
||||
*/
|
||||
static base64Decode(src: string): Buffer;
|
||||
}
|
||||
117
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/dist/client.js
generated
vendored
Normal file
117
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/dist/client.js
generated
vendored
Normal file
@@ -0,0 +1,117 @@
|
||||
"use strict";
|
||||
var __importDefault = (this && this.__importDefault) || function (mod) {
|
||||
return (mod && mod.__esModule) ? mod : { "default": mod };
|
||||
};
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
const crypto_1 = __importDefault(require("crypto"));
|
||||
class Client {
|
||||
/**
|
||||
* Encode the URL
|
||||
* @param url string
|
||||
* @return encoded string
|
||||
*/
|
||||
static urlEncode(url) {
|
||||
//URLEncoder.encode(url, URL_ENCODING)
|
||||
return url != null ? encodeURIComponent(url) : '';
|
||||
}
|
||||
/**
|
||||
* Special encoding for url params.
|
||||
* @param params string
|
||||
* @return encoded string
|
||||
*/
|
||||
static percentEncode(raw) {
|
||||
return raw != null ? encodeURIComponent(raw).replace('+', '%20')
|
||||
.replace('*', '%2A').replace('%7E', '~') : null;
|
||||
}
|
||||
/**
|
||||
* Encode the partial path of url.
|
||||
* @param path string
|
||||
* @return encoded string
|
||||
*/
|
||||
static pathEncode(path) {
|
||||
if (!path || path === '/') {
|
||||
return path;
|
||||
}
|
||||
let paths = path.split('/');
|
||||
let sb = [];
|
||||
for (let s of paths) {
|
||||
sb.push(Client.percentEncode(s));
|
||||
}
|
||||
return sb.join('/');
|
||||
}
|
||||
/**
|
||||
* Hex encode for byte array.
|
||||
* @param raw byte array
|
||||
* @return encoded string
|
||||
*/
|
||||
static hexEncode(raw) {
|
||||
if (raw === null) {
|
||||
return null;
|
||||
}
|
||||
return raw.toString("hex");
|
||||
}
|
||||
/**
|
||||
* Hash the raw data with signatureAlgorithm.
|
||||
* @param raw hashing data
|
||||
* @param signatureAlgorithm the autograph method
|
||||
* @return hashed bytes
|
||||
*/
|
||||
static hash(raw, signatureAlgorithm) {
|
||||
if (signatureAlgorithm == null) {
|
||||
return null;
|
||||
}
|
||||
if (signatureAlgorithm === "ACS3-HMAC-SHA256" || signatureAlgorithm === "ACS3-RSA-SHA256") {
|
||||
const obj = crypto_1.default.createHash('sha256');
|
||||
obj.update(raw);
|
||||
return obj.digest();
|
||||
}
|
||||
else if (signatureAlgorithm == "ACS3-HMAC-SM3") {
|
||||
const obj = crypto_1.default.createHash('sm3');
|
||||
obj.update(raw);
|
||||
return obj.digest();
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Base64 encoder for byte array.
|
||||
* @param raw byte array
|
||||
* @return encoded string
|
||||
*/
|
||||
static base64EncodeToString(raw) {
|
||||
return raw.toString('base64');
|
||||
}
|
||||
/**
|
||||
* Base64 dncoder for string.
|
||||
* @param src string
|
||||
* @return dncoded byte array
|
||||
*/
|
||||
static base64Decode(src) {
|
||||
/** Convert Base64 data to a string */
|
||||
var toBinaryTable = [-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 62, -1, -1, -1, 63,
|
||||
52, 53, 54, 55, 56, 57, 58, 59, 60, 61, -1, -1, -1, 0, -1, -1, -1, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14,
|
||||
15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, -1, -1, -1, -1, -1, -1, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40,
|
||||
41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, -1, -1, -1, -1, -1
|
||||
];
|
||||
var result = '';
|
||||
var leftbits = 0;
|
||||
var leftdata = 0;
|
||||
for (var i = 0; i < src.length; i++) {
|
||||
var c = toBinaryTable[src.charCodeAt(i) & 0x7f];
|
||||
var padding = (src.charCodeAt(i) == '='.charCodeAt(0));
|
||||
if (c == -1)
|
||||
continue;
|
||||
leftdata = (leftdata << 6) | c;
|
||||
leftbits += 6;
|
||||
if (leftbits >= 8) {
|
||||
leftbits -= 8;
|
||||
if (!padding)
|
||||
result += String.fromCharCode((leftdata >> leftbits) & 0xff);
|
||||
leftdata &= (1 << leftbits) - 1;
|
||||
}
|
||||
}
|
||||
if (leftbits)
|
||||
throw Error('Corrupted base64 string');
|
||||
return Buffer.from(result);
|
||||
}
|
||||
}
|
||||
exports.default = Client;
|
||||
//# sourceMappingURL=client.js.map
|
||||
1
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/dist/client.js.map
generated
vendored
Normal file
1
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/dist/client.js.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"client.js","sourceRoot":"","sources":["../src/client.ts"],"names":[],"mappings":";;;;;AAKA,oDAA4B;AAG5B,MAAqB,MAAM;IAEzB;;;;OAIG;IACH,MAAM,CAAC,SAAS,CAAC,GAAW;QAC1B,sCAAsC;QACtC,OAAO,GAAG,IAAI,IAAI,CAAC,CAAC,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;IACpD,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,aAAa,CAAC,GAAW;QAC9B,OAAO,GAAG,IAAI,IAAI,CAAC,CAAC,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC,OAAO,CAAC,GAAG,EAAE,KAAK,CAAC;aAC7D,OAAO,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC;IACpD,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,UAAU,CAAC,IAAY;QAC5B,IAAI,CAAC,IAAI,IAAI,IAAI,KAAK,GAAG,EAAE;YACzB,OAAO,IAAI,CAAC;SACb;QACD,IAAI,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAC5B,IAAI,EAAE,GAAG,EAAE,CAAC;QACZ,KAAK,IAAI,CAAC,IAAI,KAAK,EAAE;YACnB,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;SAClC;QACD,OAAO,EAAE,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACtB,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,SAAS,CAAC,GAAW;QAC1B,IAAI,GAAG,KAAK,IAAI,EAAE;YAChB,OAAO,IAAI,CAAC;SACb;QACD,OAAO,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC7B,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,IAAI,CAAC,GAAW,EAAE,kBAA0B;QACjD,IAAI,kBAAkB,IAAI,IAAI,EAAE;YAC9B,OAAO,IAAI,CAAC;SACb;QACD,IAAI,kBAAkB,KAAK,kBAAkB,IAAI,kBAAkB,KAAK,iBAAiB,EAAE;YACzF,MAAM,GAAG,GAAG,gBAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;YACxC,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YAChB,OAAO,GAAG,CAAC,MAAM,EAAE,CAAC;SACrB;aAAM,IAAI,kBAAkB,IAAI,eAAe,EAAE;YAChD,MAAM,GAAG,GAAG,gBAAM,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;YACrC,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YAChB,OAAO,GAAG,CAAC,MAAM,EAAE,CAAC;SACrB;IACH,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,oBAAoB,CAAC,GAAW;QACrC,OAAO,GAAG,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;IAChC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,YAAY,CAAC,GAAW;QAC7B,sCAAsC;QACtC,IAAI,aAAa,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE;YACjN,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE;YACnH,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE;YAC9H,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC;SAC/D,CAAC;QACF,IAAI,MAAM,GAAG,EAAE,CAAC;QAChB,IAAI,QAAQ,GAAG,CAAC,CAAC;QACjB,IAAI,QAAQ,GAAG,CAAC,CAAC;QACjB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;YACnC,IAAI,CAAC,GAAG,aAAa,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC,CAAC;YAChD,IAAI,OAAO,GAAG,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI,GAAG,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC;YACvD,IAAI,CAAC,IAAI,CAAC,CAAC;gBAAE,SAAS;YACtB,QAAQ,GAAG,CAAC,QAAQ,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC;YAC/B,QAAQ,IAAI,CAAC,CAAC;YACd,IAAI,QAAQ,IAAI,CAAC,EAAE;gBACjB,QAAQ,IAAI,CAAC,CAAC;gBACd,IAAI,CAAC,OAAO;oBACV,MAAM,IAAI,MAAM,CAAC,YAAY,CAAC,CAAC,QAAQ,IAAI,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC;gBAC/D,QAAQ,IAAI,CAAC,CAAC,IAAI,QAAQ,CAAC,GAAG,CAAC,CAAC;aACjC;SACF;QACD,IAAI,QAAQ;YACV,MAAM,KAAK,CAAC,yBAAyB,CAAC,CAAC;QACzC,OAAO,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAC7B,CAAC;CAEF;AAlHD,yBAkHC"}
|
||||
39
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/package.json
generated
vendored
Normal file
39
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/package.json
generated
vendored
Normal file
@@ -0,0 +1,39 @@
|
||||
{
|
||||
"name": "@alicloud/darabonba-encode-util",
|
||||
"version": "0.0.1",
|
||||
"description": "",
|
||||
"main": "dist/client.js",
|
||||
"scripts": {
|
||||
"test": "mocha -r ts-node/register ./tests/*test.ts",
|
||||
"test-cov": "nyc -e .ts -r=html -r=text -r=lcov npm run test",
|
||||
"build": "tsc",
|
||||
"prepublishOnly": "tsc"
|
||||
},
|
||||
"author": "",
|
||||
"license": "ISC",
|
||||
"devDependencies": {
|
||||
"@types/chai": "^4.2.22",
|
||||
"@types/mocha": "^9.0.0",
|
||||
"@types/node": "^12.20.37",
|
||||
"@types/should": "^13.0.0",
|
||||
"@types/sinon": "^10.0.6",
|
||||
"chai": "^4.3.4",
|
||||
"cross-env": "^7.0.3",
|
||||
"mocha": "^9.1.3",
|
||||
"nyc": "^15.1.0",
|
||||
"should": "^13.2.3",
|
||||
"sinon": "^12.0.1",
|
||||
"source-map-support": "^0.5.16",
|
||||
"ts-node": "^8.10.2",
|
||||
"tsconfig-paths": "^3.12.0",
|
||||
"typescript": "^3.7.5"
|
||||
},
|
||||
"dependencies": {
|
||||
"@alicloud/tea-typescript": "^1.7.1",
|
||||
"moment": "^2.29.1"
|
||||
},
|
||||
"files": [
|
||||
"dist",
|
||||
"src"
|
||||
]
|
||||
}
|
||||
123
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/src/client.ts
generated
vendored
Normal file
123
backend/node_modules/@alicloud/darabonba-signature-util/node_modules/@alicloud/darabonba-encode-util/src/client.ts
generated
vendored
Normal file
@@ -0,0 +1,123 @@
|
||||
// This file is auto-generated, don't edit it
|
||||
/**
|
||||
* Encode Util for Darabonba.
|
||||
*/
|
||||
import * as $tea from '@alicloud/tea-typescript';
|
||||
import crypto from 'crypto';
|
||||
|
||||
|
||||
export default class Client {
|
||||
|
||||
/**
|
||||
* Encode the URL
|
||||
* @param url string
|
||||
* @return encoded string
|
||||
*/
|
||||
static urlEncode(url: string): string {
|
||||
//URLEncoder.encode(url, URL_ENCODING)
|
||||
return url != null ? encodeURIComponent(url) : '';
|
||||
}
|
||||
|
||||
/**
|
||||
* Special encoding for url params.
|
||||
* @param params string
|
||||
* @return encoded string
|
||||
*/
|
||||
static percentEncode(raw: string): string {
|
||||
return raw != null ? encodeURIComponent(raw).replace('+', '%20')
|
||||
.replace('*', '%2A').replace('%7E', '~') : null;
|
||||
}
|
||||
|
||||
/**
|
||||
* Encode the partial path of url.
|
||||
* @param path string
|
||||
* @return encoded string
|
||||
*/
|
||||
static pathEncode(path: string): string {
|
||||
if (!path || path === '/') {
|
||||
return path;
|
||||
}
|
||||
let paths = path.split('/');
|
||||
let sb = [];
|
||||
for (let s of paths) {
|
||||
sb.push(Client.percentEncode(s));
|
||||
}
|
||||
return sb.join('/');
|
||||
}
|
||||
|
||||
/**
|
||||
* Hex encode for byte array.
|
||||
* @param raw byte array
|
||||
* @return encoded string
|
||||
*/
|
||||
static hexEncode(raw: Buffer): string {
|
||||
if (raw === null) {
|
||||
return null;
|
||||
}
|
||||
return raw.toString("hex");
|
||||
}
|
||||
|
||||
/**
|
||||
* Hash the raw data with signatureAlgorithm.
|
||||
* @param raw hashing data
|
||||
* @param signatureAlgorithm the autograph method
|
||||
* @return hashed bytes
|
||||
*/
|
||||
static hash(raw: Buffer, signatureAlgorithm: string): Buffer {
|
||||
if (signatureAlgorithm == null) {
|
||||
return null;
|
||||
}
|
||||
if (signatureAlgorithm === "ACS3-HMAC-SHA256" || signatureAlgorithm === "ACS3-RSA-SHA256") {
|
||||
const obj = crypto.createHash('sha256');
|
||||
obj.update(raw);
|
||||
return obj.digest();
|
||||
} else if (signatureAlgorithm == "ACS3-HMAC-SM3") {
|
||||
const obj = crypto.createHash('sm3');
|
||||
obj.update(raw);
|
||||
return obj.digest();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Base64 encoder for byte array.
|
||||
* @param raw byte array
|
||||
* @return encoded string
|
||||
*/
|
||||
static base64EncodeToString(raw: Buffer): string {
|
||||
return raw.toString('base64');
|
||||
}
|
||||
|
||||
/**
|
||||
* Base64 dncoder for string.
|
||||
* @param src string
|
||||
* @return dncoded byte array
|
||||
*/
|
||||
static base64Decode(src: string): Buffer {
|
||||
/** Convert Base64 data to a string */
|
||||
var toBinaryTable = [-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 62, -1, -1, -1, 63,
|
||||
52, 53, 54, 55, 56, 57, 58, 59, 60, 61, -1, -1, -1, 0, -1, -1, -1, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14,
|
||||
15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, -1, -1, -1, -1, -1, -1, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40,
|
||||
41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, -1, -1, -1, -1, -1
|
||||
];
|
||||
var result = '';
|
||||
var leftbits = 0;
|
||||
var leftdata = 0;
|
||||
for (var i = 0; i < src.length; i++) {
|
||||
var c = toBinaryTable[src.charCodeAt(i) & 0x7f];
|
||||
var padding = (src.charCodeAt(i) == '='.charCodeAt(0));
|
||||
if (c == -1) continue;
|
||||
leftdata = (leftdata << 6) | c;
|
||||
leftbits += 6;
|
||||
if (leftbits >= 8) {
|
||||
leftbits -= 8;
|
||||
if (!padding)
|
||||
result += String.fromCharCode((leftdata >> leftbits) & 0xff);
|
||||
leftdata &= (1 << leftbits) - 1;
|
||||
}
|
||||
}
|
||||
if (leftbits)
|
||||
throw Error('Corrupted base64 string');
|
||||
return Buffer.from(result);
|
||||
}
|
||||
|
||||
}
|
||||
37
backend/node_modules/@alicloud/darabonba-signature-util/package.json
generated
vendored
Normal file
37
backend/node_modules/@alicloud/darabonba-signature-util/package.json
generated
vendored
Normal file
@@ -0,0 +1,37 @@
|
||||
{
|
||||
"name": "@alicloud/darabonba-signature-util",
|
||||
"version": "0.0.4",
|
||||
"description": "",
|
||||
"main": "dist/client.js",
|
||||
"scripts": {
|
||||
"test": "mocha -r ts-node/register ./tests/*test.ts",
|
||||
"test-cov": "nyc -e .ts -r=html -r=text -r=lcov npm run test",
|
||||
"build": "tsc",
|
||||
"prepublishOnly": "tsc"
|
||||
},
|
||||
"author": "",
|
||||
"license": "ISC",
|
||||
"devDependencies": {
|
||||
"@types/mocha": "^9.0.0",
|
||||
"@types/node": "^12.20.37",
|
||||
"@types/should": "^13.0.0",
|
||||
"@types/sinon": "^10.0.6",
|
||||
"chai": "^4.3.4",
|
||||
"cross-env": "^7.0.3",
|
||||
"mocha": "^9.1.3",
|
||||
"nyc": "^15.1.0",
|
||||
"should": "^13.2.3",
|
||||
"sinon": "^12.0.1",
|
||||
"source-map-support": "^0.5.16",
|
||||
"ts-node": "^8.10.2",
|
||||
"tsconfig-paths": "^3.12.0",
|
||||
"typescript": "^3.7.5"
|
||||
},
|
||||
"dependencies": {
|
||||
"@alicloud/darabonba-encode-util": "^0.0.1"
|
||||
},
|
||||
"files": [
|
||||
"dist",
|
||||
"src"
|
||||
]
|
||||
}
|
||||
117
backend/node_modules/@alicloud/darabonba-signature-util/src/client.ts
generated
vendored
Normal file
117
backend/node_modules/@alicloud/darabonba-signature-util/src/client.ts
generated
vendored
Normal file
@@ -0,0 +1,117 @@
|
||||
// This file is auto-generated, don't edit it
|
||||
/**
|
||||
* Signature Util for Darabonba.
|
||||
*/
|
||||
import crypto from 'crypto';
|
||||
|
||||
|
||||
export default class Client {
|
||||
|
||||
/**
|
||||
* HmacSHA1 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA1Sign(stringToSign: string, secret: string): Buffer {
|
||||
const obj = crypto.createHmac('sha1', secret);
|
||||
obj.update(stringToSign);
|
||||
return obj.digest();
|
||||
}
|
||||
|
||||
/**
|
||||
* HmacSHA1 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA1SignByBytes(stringToSign: string, secret: Buffer): Buffer {
|
||||
return Client.HmacSHA1Sign(stringToSign, secret.toString());
|
||||
}
|
||||
|
||||
/**
|
||||
* HmacSHA256 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA256Sign(stringToSign: string, secret: string): Buffer {
|
||||
const obj = crypto.createHmac('sha256', secret);
|
||||
obj.update(stringToSign);
|
||||
return obj.digest();
|
||||
}
|
||||
|
||||
/**
|
||||
* HmacSHA256 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSHA256SignByBytes(stringToSign: string, secret: Buffer): Buffer {
|
||||
return Client.HmacSHA256Sign(stringToSign, secret.toString());
|
||||
}
|
||||
|
||||
/**
|
||||
* HmacSM3 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSM3Sign(stringToSign: string, secret: string): Buffer {
|
||||
const obj = crypto.createHmac('sm3', secret);
|
||||
obj.update(stringToSign);
|
||||
return obj.digest();
|
||||
}
|
||||
|
||||
/**
|
||||
* HmacSM3 Signature
|
||||
* @param stringToSign string
|
||||
* @param secret bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static HmacSM3SignByBytes(stringToSign: string, secret: Buffer): Buffer {
|
||||
return Client.HmacSM3Sign(stringToSign, secret.toString());
|
||||
}
|
||||
|
||||
/**
|
||||
* SHA256withRSA Signature
|
||||
* @param stringToSign string
|
||||
* @param secret string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static SHA256withRSASign(stringToSign: string, secret: string): Buffer {
|
||||
const PEM_BEGIN = "-----BEGIN PRIVATE KEY-----\n";
|
||||
const PEM_END = "\n-----END PRIVATE KEY-----";
|
||||
if (!secret.startsWith(PEM_BEGIN)) {
|
||||
secret = PEM_BEGIN + secret;
|
||||
}
|
||||
if (!secret.endsWith(PEM_END)) {
|
||||
secret = secret + PEM_END;
|
||||
}
|
||||
var signerObject = crypto.createSign("RSA-SHA256");
|
||||
signerObject.update(stringToSign);
|
||||
var signature = signerObject.sign({ key: secret, padding: crypto.constants.RSA_PKCS1_PADDING });
|
||||
return signature;
|
||||
}
|
||||
|
||||
/**
|
||||
* MD5 Signature
|
||||
*
|
||||
* @param stringToSign string
|
||||
* @return signed bytes
|
||||
*/
|
||||
static MD5Sign(stringToSign: string): Buffer {
|
||||
return crypto.createHash('md5').update(stringToSign, 'utf8').digest();
|
||||
}
|
||||
|
||||
/**
|
||||
* MD5 Signature
|
||||
*
|
||||
* @param bytesToSign bytes
|
||||
* @return signed bytes
|
||||
*/
|
||||
static MD5SignForBytes(bytesToSign: Buffer): Buffer {
|
||||
return Client.MD5Sign(bytesToSign.toString());
|
||||
}
|
||||
|
||||
}
|
||||
Reference in New Issue
Block a user