Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
57 changes: 29 additions & 28 deletions .github/local-actions/branch-manager/main.js
Original file line number Diff line number Diff line change
Expand Up @@ -229,6 +229,7 @@ var require_file_command = __commonJS({
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.prepareKeyValueMessage = exports.issueFileCommand = void 0;
var crypto = __importStar(__require("crypto"));
var fs2 = __importStar(__require("fs"));
var os3 = __importStar(__require("os"));
var utils_1 = require_utils();
Expand Down Expand Up @@ -3677,11 +3678,11 @@ var require_util2 = __commonJS({
var assert = __require("assert");
var { isUint8Array } = __require("util/types");
var supportedHashes = [];
var crypto2;
var crypto;
try {
crypto2 = __require("crypto");
crypto = __require("crypto");
const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
supportedHashes = crypto2.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
supportedHashes = crypto.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
} catch {
}
function responseURL(response) {
Expand Down Expand Up @@ -3946,7 +3947,7 @@ var require_util2 = __commonJS({
}
}
function bytesMatch(bytes, metadataList) {
if (crypto2 === void 0) {
if (crypto === void 0) {
return true;
}
const parsedMetadata = parseMetadata(metadataList);
Expand All @@ -3961,7 +3962,7 @@ var require_util2 = __commonJS({
for (const item of metadata) {
const algorithm = item.algo;
const expectedValue = item.hash;
let actualValue = crypto2.createHash(algorithm).update(bytes).digest("base64");
let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64");
if (actualValue[actualValue.length - 1] === "=") {
if (actualValue[actualValue.length - 2] === "=") {
actualValue = actualValue.slice(0, -2);
Expand Down Expand Up @@ -16098,9 +16099,9 @@ var require_connection = __commonJS({
channels.open = diagnosticsChannel.channel("undici:websocket:open");
channels.close = diagnosticsChannel.channel("undici:websocket:close");
channels.socketError = diagnosticsChannel.channel("undici:websocket:socket_error");
var crypto2;
var crypto;
try {
crypto2 = __require("crypto");
crypto = __require("crypto");
} catch {
}
function establishWebSocketConnection(url, protocols, ws, onEstablish, options) {
Expand All @@ -16119,7 +16120,7 @@ var require_connection = __commonJS({
const headersList = new Headers(options.headers)[kHeadersList];
request2.headersList = headersList;
}
const keyValue = crypto2.randomBytes(16).toString("base64");
const keyValue = crypto.randomBytes(16).toString("base64");
request2.headersList.append("sec-websocket-key", keyValue);
request2.headersList.append("sec-websocket-version", "13");
for (const protocol of protocols) {
Expand Down Expand Up @@ -16149,7 +16150,7 @@ var require_connection = __commonJS({
return;
}
const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
const digest = crypto2.createHash("sha1").update(keyValue + uid).digest("base64");
const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64");
if (secWSAccept !== digest) {
failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
return;
Expand Down Expand Up @@ -16229,15 +16230,15 @@ var require_frame = __commonJS({
""(exports, module) {
"use strict";
var { maxUnsigned16Bit } = require_constants5();
var crypto2;
var crypto;
try {
crypto2 = __require("crypto");
crypto = __require("crypto");
} catch {
}
var WebsocketFrameSend = class {
constructor(data) {
this.frameData = data;
this.maskKey = crypto2.randomBytes(4);
this.maskKey = crypto.randomBytes(4);
}
createFrame(opcode) {
var _a2;
Expand Down Expand Up @@ -31774,7 +31775,7 @@ var require_tmp = __commonJS({
""(exports, module) {
var fs2 = __require("fs");
var path4 = __require("path");
var crypto2 = __require("crypto");
var crypto = __require("crypto");
var osTmpDir = require_os_tmpdir();
var _c = process.binding("constants");
var tmpDir = osTmpDir();
Expand All @@ -31792,9 +31793,9 @@ var require_tmp = __commonJS({
function _randomChars(howMany) {
var value = [], rnd = null;
try {
rnd = crypto2.randomBytes(howMany);
rnd = crypto.randomBytes(howMany);
} catch (e) {
rnd = crypto2.pseudoRandomBytes(howMany);
rnd = crypto.pseudoRandomBytes(howMany);
}
for (var i = 0; i < howMany; i++) {
value.push(RANDOM_CHARS[rnd[i] % RANDOM_CHARS.length]);
Expand Down Expand Up @@ -38279,11 +38280,11 @@ var require_util9 = __commonJS({
var { isUint8Array } = __require("node:util/types");
var { webidl } = require_webidl2();
var supportedHashes = [];
var crypto2;
var crypto;
try {
crypto2 = __require("node:crypto");
crypto = __require("node:crypto");
const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
supportedHashes = crypto2.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
supportedHashes = crypto.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
} catch {
}
function responseURL(response) {
Expand Down Expand Up @@ -38543,7 +38544,7 @@ var require_util9 = __commonJS({
}
}
function bytesMatch(bytes, metadataList) {
if (crypto2 === void 0) {
if (crypto === void 0) {
return true;
}
const parsedMetadata = parseMetadata(metadataList);
Expand All @@ -38558,7 +38559,7 @@ var require_util9 = __commonJS({
for (const item of metadata) {
const algorithm = item.algo;
const expectedValue = item.hash;
let actualValue = crypto2.createHash(algorithm).update(bytes).digest("base64");
let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64");
if (actualValue[actualValue.length - 1] === "=") {
if (actualValue[actualValue.length - 2] === "=") {
actualValue = actualValue.slice(0, -2);
Expand Down Expand Up @@ -50244,13 +50245,13 @@ var require_frame2 = __commonJS({
"use strict";
var { maxUnsigned16Bit } = require_constants11();
var BUFFER_SIZE = 16386;
var crypto2;
var crypto;
var buffer = null;
var bufIdx = BUFFER_SIZE;
try {
crypto2 = __require("node:crypto");
crypto = __require("node:crypto");
} catch {
crypto2 = {
crypto = {
randomFillSync: function randomFillSync(buffer2, _offset, _size) {
for (let i = 0; i < buffer2.length; ++i) {
buffer2[i] = Math.random() * 255 | 0;
Expand All @@ -50262,7 +50263,7 @@ var require_frame2 = __commonJS({
function generateMask() {
if (bufIdx === BUFFER_SIZE) {
bufIdx = 0;
crypto2.randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
crypto.randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
}
return [buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++]];
}
Expand Down Expand Up @@ -50331,9 +50332,9 @@ var require_connection2 = __commonJS({
var { Headers, getHeadersList } = require_headers2();
var { getDecodeSplit } = require_util9();
var { WebsocketFrameSend } = require_frame2();
var crypto2;
var crypto;
try {
crypto2 = __require("node:crypto");
crypto = __require("node:crypto");
} catch {
}
function establishWebSocketConnection(url, protocols, client, ws, onEstablish, options) {
Expand All @@ -50353,7 +50354,7 @@ var require_connection2 = __commonJS({
const headersList = getHeadersList(new Headers(options.headers));
request2.headersList = headersList;
}
const keyValue = crypto2.randomBytes(16).toString("base64");
const keyValue = crypto.randomBytes(16).toString("base64");
request2.headersList.append("sec-websocket-key", keyValue);
request2.headersList.append("sec-websocket-version", "13");
for (const protocol of protocols) {
Expand Down Expand Up @@ -50384,7 +50385,7 @@ var require_connection2 = __commonJS({
return;
}
const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
const digest = crypto2.createHash("sha1").update(keyValue + uid).digest("base64");
const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64");
if (secWSAccept !== digest) {
failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
return;
Expand Down
57 changes: 29 additions & 28 deletions .github/local-actions/changelog/main.js
Original file line number Diff line number Diff line change
Expand Up @@ -229,6 +229,7 @@ var require_file_command = __commonJS({
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.prepareKeyValueMessage = exports.issueFileCommand = void 0;
var crypto = __importStar(__require("crypto"));
var fs = __importStar(__require("fs"));
var os3 = __importStar(__require("os"));
var utils_1 = require_utils();
Expand Down Expand Up @@ -3677,11 +3678,11 @@ var require_util2 = __commonJS({
var assert = __require("assert");
var { isUint8Array } = __require("util/types");
var supportedHashes = [];
var crypto2;
var crypto;
try {
crypto2 = __require("crypto");
crypto = __require("crypto");
const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
supportedHashes = crypto2.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
supportedHashes = crypto.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
} catch {
}
function responseURL(response) {
Expand Down Expand Up @@ -3946,7 +3947,7 @@ var require_util2 = __commonJS({
}
}
function bytesMatch(bytes, metadataList) {
if (crypto2 === void 0) {
if (crypto === void 0) {
return true;
}
const parsedMetadata = parseMetadata(metadataList);
Expand All @@ -3961,7 +3962,7 @@ var require_util2 = __commonJS({
for (const item of metadata) {
const algorithm = item.algo;
const expectedValue = item.hash;
let actualValue = crypto2.createHash(algorithm).update(bytes).digest("base64");
let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64");
if (actualValue[actualValue.length - 1] === "=") {
if (actualValue[actualValue.length - 2] === "=") {
actualValue = actualValue.slice(0, -2);
Expand Down Expand Up @@ -16098,9 +16099,9 @@ var require_connection = __commonJS({
channels.open = diagnosticsChannel.channel("undici:websocket:open");
channels.close = diagnosticsChannel.channel("undici:websocket:close");
channels.socketError = diagnosticsChannel.channel("undici:websocket:socket_error");
var crypto2;
var crypto;
try {
crypto2 = __require("crypto");
crypto = __require("crypto");
} catch {
}
function establishWebSocketConnection(url, protocols, ws, onEstablish, options) {
Expand All @@ -16119,7 +16120,7 @@ var require_connection = __commonJS({
const headersList = new Headers(options.headers)[kHeadersList];
request2.headersList = headersList;
}
const keyValue = crypto2.randomBytes(16).toString("base64");
const keyValue = crypto.randomBytes(16).toString("base64");
request2.headersList.append("sec-websocket-key", keyValue);
request2.headersList.append("sec-websocket-version", "13");
for (const protocol of protocols) {
Expand Down Expand Up @@ -16149,7 +16150,7 @@ var require_connection = __commonJS({
return;
}
const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
const digest = crypto2.createHash("sha1").update(keyValue + uid).digest("base64");
const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64");
if (secWSAccept !== digest) {
failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
return;
Expand Down Expand Up @@ -16229,15 +16230,15 @@ var require_frame = __commonJS({
""(exports, module) {
"use strict";
var { maxUnsigned16Bit } = require_constants5();
var crypto2;
var crypto;
try {
crypto2 = __require("crypto");
crypto = __require("crypto");
} catch {
}
var WebsocketFrameSend = class {
constructor(data) {
this.frameData = data;
this.maskKey = crypto2.randomBytes(4);
this.maskKey = crypto.randomBytes(4);
}
createFrame(opcode) {
var _a2;
Expand Down Expand Up @@ -22806,11 +22807,11 @@ var require_util9 = __commonJS({
var { isUint8Array } = __require("node:util/types");
var { webidl } = require_webidl2();
var supportedHashes = [];
var crypto2;
var crypto;
try {
crypto2 = __require("node:crypto");
crypto = __require("node:crypto");
const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
supportedHashes = crypto2.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
supportedHashes = crypto.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
} catch {
}
function responseURL(response) {
Expand Down Expand Up @@ -23070,7 +23071,7 @@ var require_util9 = __commonJS({
}
}
function bytesMatch(bytes, metadataList) {
if (crypto2 === void 0) {
if (crypto === void 0) {
return true;
}
const parsedMetadata = parseMetadata(metadataList);
Expand All @@ -23085,7 +23086,7 @@ var require_util9 = __commonJS({
for (const item of metadata) {
const algorithm = item.algo;
const expectedValue = item.hash;
let actualValue = crypto2.createHash(algorithm).update(bytes).digest("base64");
let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64");
if (actualValue[actualValue.length - 1] === "=") {
if (actualValue[actualValue.length - 2] === "=") {
actualValue = actualValue.slice(0, -2);
Expand Down Expand Up @@ -34771,13 +34772,13 @@ var require_frame2 = __commonJS({
"use strict";
var { maxUnsigned16Bit } = require_constants10();
var BUFFER_SIZE = 16386;
var crypto2;
var crypto;
var buffer = null;
var bufIdx = BUFFER_SIZE;
try {
crypto2 = __require("node:crypto");
crypto = __require("node:crypto");
} catch {
crypto2 = {
crypto = {
randomFillSync: function randomFillSync(buffer2, _offset, _size) {
for (let i = 0; i < buffer2.length; ++i) {
buffer2[i] = Math.random() * 255 | 0;
Expand All @@ -34789,7 +34790,7 @@ var require_frame2 = __commonJS({
function generateMask() {
if (bufIdx === BUFFER_SIZE) {
bufIdx = 0;
crypto2.randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
crypto.randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
}
return [buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++]];
}
Expand Down Expand Up @@ -34858,9 +34859,9 @@ var require_connection2 = __commonJS({
var { Headers, getHeadersList } = require_headers2();
var { getDecodeSplit } = require_util9();
var { WebsocketFrameSend } = require_frame2();
var crypto2;
var crypto;
try {
crypto2 = __require("node:crypto");
crypto = __require("node:crypto");
} catch {
}
function establishWebSocketConnection(url, protocols, client, ws, onEstablish, options) {
Expand All @@ -34880,7 +34881,7 @@ var require_connection2 = __commonJS({
const headersList = getHeadersList(new Headers(options.headers));
request2.headersList = headersList;
}
const keyValue = crypto2.randomBytes(16).toString("base64");
const keyValue = crypto.randomBytes(16).toString("base64");
request2.headersList.append("sec-websocket-key", keyValue);
request2.headersList.append("sec-websocket-version", "13");
for (const protocol of protocols) {
Expand Down Expand Up @@ -34911,7 +34912,7 @@ var require_connection2 = __commonJS({
return;
}
const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
const digest = crypto2.createHash("sha1").update(keyValue + uid).digest("base64");
const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64");
if (secWSAccept !== digest) {
failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
return;
Expand Down Expand Up @@ -53540,7 +53541,7 @@ var require_tmp = __commonJS({
""(exports, module) {
var fs = __require("fs");
var path2 = __require("path");
var crypto2 = __require("crypto");
var crypto = __require("crypto");
var osTmpDir = require_os_tmpdir();
var _c = process.binding("constants");
var tmpDir = osTmpDir();
Expand All @@ -53558,9 +53559,9 @@ var require_tmp = __commonJS({
function _randomChars(howMany) {
var value = [], rnd = null;
try {
rnd = crypto2.randomBytes(howMany);
rnd = crypto.randomBytes(howMany);
} catch (e) {
rnd = crypto2.pseudoRandomBytes(howMany);
rnd = crypto.pseudoRandomBytes(howMany);
}
for (var i = 0; i < howMany; i++) {
value.push(RANDOM_CHARS[rnd[i] % RANDOM_CHARS.length]);
Expand Down
Loading