add debug logging
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
Timo Hocker 2022-01-05 12:32:04 +01:00
parent 2a51e0a753
commit b58af27719
Signed by: Timo
GPG Key ID: DFAC2CF4E1D1BEC9
8 changed files with 153 additions and 13 deletions

View File

@ -8,6 +8,9 @@
import { IncomingMessage, ServerResponse } from 'http'; import { IncomingMessage, ServerResponse } from 'http';
import { to_utf8 } from '@sapphirecode/encoding-helper'; import { to_utf8 } from '@sapphirecode/encoding-helper';
import auth from './Authority'; import auth from './Authority';
import { debug } from './debug';
const logger = debug ('auth');
interface AccessSettings { interface AccessSettings {
access_token_expires_in: number access_token_expires_in: number
@ -74,6 +77,7 @@ class AuthRequest {
this._cookie_name = cookie; this._cookie_name = cookie;
this._refresh_cookie_name = refresh_cookie; this._refresh_cookie_name = refresh_cookie;
this._is_successful = false; this._is_successful = false;
logger ('started processing new auth request');
} }
private default_header (set_content = true) { private default_header (set_content = true) {
@ -92,6 +96,7 @@ class AuthRequest {
data, data,
leave_open leave_open
}: AccessSettings): Promise<AccessResult> { }: AccessSettings): Promise<AccessResult> {
logger ('allowed access');
this.default_header (typeof redirect_to !== 'string' && !leave_open); this.default_header (typeof redirect_to !== 'string' && !leave_open);
const at = await auth.sign ( const at = await auth.sign (
@ -114,6 +119,7 @@ class AuthRequest {
cookies.push (`${this._cookie_name}=${at.signature}`); cookies.push (`${this._cookie_name}=${at.signature}`);
if (include_refresh_token) { if (include_refresh_token) {
logger ('including refresh token');
if (typeof refresh_token_expires_in !== 'number') if (typeof refresh_token_expires_in !== 'number')
throw new Error ('no expiry time defined for refresh tokens'); throw new Error ('no expiry time defined for refresh tokens');
const rt = await auth.sign ( const rt = await auth.sign (
@ -130,6 +136,7 @@ class AuthRequest {
} }
if (cookies.length > 0) { if (cookies.length > 0) {
logger ('sending %d cookies', cookies.length);
this.response.setHeader ( this.response.setHeader (
'Set-Cookie', 'Set-Cookie',
cookies cookies
@ -139,6 +146,7 @@ class AuthRequest {
this._is_successful = true; this._is_successful = true;
if (typeof redirect_to === 'string') { if (typeof redirect_to === 'string') {
logger ('redirecting to %s', redirect_to);
this.response.setHeader ('Location', redirect_to); this.response.setHeader ('Location', redirect_to);
this.response.statusCode = 302; this.response.statusCode = 302;
if (!leave_open) if (!leave_open)
@ -147,6 +155,7 @@ class AuthRequest {
} }
if (!leave_open) { if (!leave_open) {
logger ('finishing http request');
this.response.writeHead (200); this.response.writeHead (200);
this.response.end (JSON.stringify (res)); this.response.end (JSON.stringify (res));
} }
@ -160,6 +169,7 @@ class AuthRequest {
data?: Record<string, unknown>, data?: Record<string, unknown>,
leave_open = false leave_open = false
): Promise<string> { ): Promise<string> {
logger ('allowed part token');
this.default_header (); this.default_header ();
const pt = await auth.sign ( const pt = await auth.sign (
@ -175,6 +185,7 @@ class AuthRequest {
}; };
if (!leave_open) { if (!leave_open) {
logger ('finishing http request');
this.response.writeHead (200); this.response.writeHead (200);
this.response.end (JSON.stringify (res)); this.response.end (JSON.stringify (res));
} }
@ -184,9 +195,11 @@ class AuthRequest {
} }
public invalid (error_description?: string, leave_open = false): void { public invalid (error_description?: string, leave_open = false): void {
logger ('rejecting invalid request');
this.default_header (); this.default_header ();
this.response.statusCode = 400; this.response.statusCode = 400;
if (!leave_open) { if (!leave_open) {
logger ('finishing http request');
this.response.end (JSON.stringify ({ this.response.end (JSON.stringify ({
error: 'invalid_request', error: 'invalid_request',
error_description error_description
@ -195,12 +208,15 @@ class AuthRequest {
} }
public deny (leave_open = false): void { public deny (leave_open = false): void {
logger ('denied access');
this.default_header (); this.default_header ();
this.response.statusCode = 401; this.response.statusCode = 401;
if (!leave_open) if (!leave_open) {
logger ('finishing http request');
this.response.end (JSON.stringify ({ error: 'invalid_client' })); this.response.end (JSON.stringify ({ error: 'invalid_client' }));
} }
} }
}
type AuthRequestHandler = (req: AuthRequest) => Promise<void> | void; type AuthRequestHandler = (req: AuthRequest) => Promise<void> | void;
@ -222,6 +238,7 @@ function process_request (
return default_handler (request); return default_handler (request);
if ((/Basic/ui).test (token?.groups?.type as string)) { if ((/Basic/ui).test (token?.groups?.type as string)) {
logger ('found basic login data');
request.is_basic = true; request.is_basic = true;
let login = token?.groups?.token as string; let login = token?.groups?.token as string;
@ -235,6 +252,7 @@ function process_request (
} }
if ((/Bearer/ui).test (token?.groups?.type as string)) { if ((/Bearer/ui).test (token?.groups?.type as string)) {
logger ('found bearer login data');
request.is_bearer = true; request.is_bearer = true;
request.token = token?.groups?.token; request.token = token?.groups?.token;
@ -243,6 +261,8 @@ function process_request (
if (!token_data.valid) if (!token_data.valid)
return default_handler (request); return default_handler (request);
logger ('bearer token is valid');
request.token_data = token_data.data; request.token_data = token_data.data;
request.token_id = token_data.id; request.token_id = token_data.id;
@ -251,6 +271,7 @@ function process_request (
&& typeof options.refresh !== 'undefined' && typeof options.refresh !== 'undefined'
&& token_data.type === 'refresh_token' && token_data.type === 'refresh_token'
) { ) {
logger ('found refresh token, emitting new access token');
request.allow_access (options.refresh); request.allow_access (options.refresh);
return Promise.resolve (); return Promise.resolve ();
} }
@ -262,13 +283,16 @@ function process_request (
&& typeof token_data.next_module !== 'undefined' && typeof token_data.next_module !== 'undefined'
&& Object.keys (options.modules) && Object.keys (options.modules)
.includes (token_data.next_module) .includes (token_data.next_module)
) ) {
logger ('processing module %s', token_data.next_module);
return options.modules[token_data.next_module] (request); return options.modules[token_data.next_module] (request);
}
request.invalid ('invalid bearer type'); request.invalid ('invalid bearer type');
return Promise.resolve (); return Promise.resolve ();
} }
logger ('no matching login method, triggering default handler');
return default_handler (request); return default_handler (request);
} }
@ -277,6 +301,7 @@ export default function create_auth_handler (
default_handler: AuthRequestHandler, default_handler: AuthRequestHandler,
options?: CreateHandlerOptions options?: CreateHandlerOptions
): AuthHandler { ): AuthHandler {
logger ('creating new auth handler');
if ( if (
typeof options?.cookie_name !== 'undefined' typeof options?.cookie_name !== 'undefined'
&& options.cookie_name === options.refresh_cookie_name && options.cookie_name === options.refresh_cookie_name

View File

@ -12,6 +12,9 @@ import {
} from '@sapphirecode/crypto-helper'; } from '@sapphirecode/crypto-helper';
import keystore from './KeyStore'; import keystore from './KeyStore';
import blacklist from './Blacklist'; import blacklist from './Blacklist';
import { debug } from './debug';
const logger = debug ('authority');
// eslint-disable-next-line no-shadow // eslint-disable-next-line no-shadow
type TokenType = 'access_token' | 'none' | 'part_token' | 'refresh_token' type TokenType = 'access_token' | 'none' | 'part_token' | 'refresh_token'
@ -39,6 +42,7 @@ interface SignatureOptions
class Authority { class Authority {
public verify (key: string): VerificationResult { public verify (key: string): VerificationResult {
logger ('verifying token');
const result: VerificationResult = { const result: VerificationResult = {
authorized: false, authorized: false,
valid: false, valid: false,
@ -59,6 +63,7 @@ class Authority {
); );
if (data === null) { if (data === null) {
logger ('token invalid');
result.error = 'invalid signature'; result.error = 'invalid signature';
return result; return result;
} }
@ -66,7 +71,10 @@ class Authority {
result.id = data.id; result.id = data.id;
result.type = data.type; result.type = data.type;
logger ('parsing token %s %s', result.type, result.id);
if (!blacklist.is_valid (data.id)) { if (!blacklist.is_valid (data.id)) {
logger ('token is blacklisted');
result.error = 'blacklisted'; result.error = 'blacklisted';
return result; return result;
} }
@ -76,6 +84,12 @@ class Authority {
result.next_module = data.next_module; result.next_module = data.next_module;
result.data = data.obj; result.data = data.obj;
logger (
'valid %s; targeting module %s',
result.type,
result.next_module
);
return result; return result;
} }
@ -84,6 +98,7 @@ class Authority {
valid_for: number, valid_for: number,
options?: SignatureOptions options?: SignatureOptions
): Promise<SignatureResult> { ): Promise<SignatureResult> {
logger ('signing new %s', type);
const time = Date.now (); const time = Date.now ();
const key = await keystore.get_sign_key (time / 1000, valid_for); const key = await keystore.get_sign_key (time / 1000, valid_for);
const attributes = { const attributes = {
@ -95,6 +110,7 @@ class Authority {
next_module: options?.next_module next_module: options?.next_module
}; };
const signature = sign_object (options?.data, key, attributes); const signature = sign_object (options?.data, key, attributes);
logger ('created token %s', attributes.id);
return { id: attributes.id, signature }; return { id: attributes.id, signature };
} }
} }

View File

@ -5,6 +5,10 @@
* Created by Timo Hocker <timo@scode.ovh>, December 2020 * Created by Timo Hocker <timo@scode.ovh>, December 2020
*/ */
import { debug } from './debug';
const logger = debug ('blacklist');
interface Signature { interface Signature {
hash: string; hash: string;
iat: number; iat: number;
@ -18,6 +22,7 @@ class Blacklist {
} }
public clear (before: number = Number.POSITIVE_INFINITY): void { public clear (before: number = Number.POSITIVE_INFINITY): void {
logger ('clearing blacklist');
for (let i = this._signatures.length - 1; i >= 0; i--) { for (let i = this._signatures.length - 1; i >= 0; i--) {
if (this._signatures[i].iat < before) if (this._signatures[i].iat < before)
this._signatures.splice (i, 1); this._signatures.splice (i, 1);
@ -25,10 +30,12 @@ class Blacklist {
} }
public add_signature (hash: string): void { public add_signature (hash: string): void {
logger ('blacklisting signature %s', hash);
this._signatures.push ({ iat: Date.now (), hash }); this._signatures.push ({ iat: Date.now (), hash });
} }
public remove_signature (hash: string): void { public remove_signature (hash: string): void {
logger ('removing signature from blacklist %s', hash);
for (let i = this._signatures.length - 1; i >= 0; i--) { for (let i = this._signatures.length - 1; i >= 0; i--) {
if (this._signatures[i].hash === hash) if (this._signatures[i].hash === hash)
this._signatures.splice (i, 1); this._signatures.splice (i, 1);
@ -36,19 +43,25 @@ class Blacklist {
} }
public is_valid (hash: string): boolean { public is_valid (hash: string): boolean {
logger ('checking signature for blacklist entry %s', hash);
for (const sig of this._signatures) { for (const sig of this._signatures) {
if (sig.hash === hash) if (sig.hash === hash) {
logger ('found matching blacklist entry');
return false; return false;
} }
}
logger ('signature is not blacklisted');
return true; return true;
} }
public export_blacklist (): Signature[] { public export_blacklist (): Signature[] {
logger ('exporting blacklist');
return this._signatures; return this._signatures;
} }
public import_blacklist (data: Signature[]): void { public import_blacklist (data: Signature[]): void {
logger ('importing %d blacklist entries', data.length);
this._signatures.push (...data); this._signatures.push (...data);
} }
} }

View File

@ -9,6 +9,9 @@ import { IncomingMessage, ServerResponse } from 'http';
import { run_regex } from '@sapphirecode/utilities'; import { run_regex } from '@sapphirecode/utilities';
import authority from './Authority'; import authority from './Authority';
import { AuthRequest, AccessSettings } from './AuthHandler'; import { AuthRequest, AccessSettings } from './AuthHandler';
import { debug } from './debug';
const logger = debug ('gateway');
type AnyFunc = (...args: unknown[]) => unknown; type AnyFunc = (...args: unknown[]) => unknown;
type Gateway = ( type Gateway = (
@ -38,6 +41,7 @@ class GatewayClass {
private _options: GatewayOptions; private _options: GatewayOptions;
public constructor (options: GatewayOptions = {}) { public constructor (options: GatewayOptions = {}) {
logger ('creating new gateway');
if ( if (
typeof options.cookie_name === 'string' typeof options.cookie_name === 'string'
&& options.cookie_name === options.refresh_cookie_name && options.cookie_name === options.refresh_cookie_name
@ -48,12 +52,15 @@ class GatewayClass {
} }
public deny (res: ServerResponse): void { public deny (res: ServerResponse): void {
logger ('denied http request');
res.statusCode = 403; res.statusCode = 403;
res.end (); res.end ();
} }
public redirect (res: ServerResponse): void { public redirect (res: ServerResponse): void {
logger ('redirecting http request to %s', this._options.redirect_url);
if (typeof this._options.redirect_url !== 'string') { if (typeof this._options.redirect_url !== 'string') {
logger ('no redirect url defined');
this.deny (res); this.deny (res);
return; return;
} }
@ -63,16 +70,19 @@ class GatewayClass {
} }
public get_header_auth (req: IncomingMessage): string | null { public get_header_auth (req: IncomingMessage): string | null {
logger ('extracting authorization header');
const auth_header = req.headers.authorization; const auth_header = req.headers.authorization;
const auth = (/(?<type>\w+) (?<data>.*)/u).exec (auth_header || ''); const auth = (/(?<type>\w+) (?<data>.*)/u).exec (auth_header || '');
if (auth === null) if (auth === null)
return null; return null;
if (auth.groups?.type !== 'Bearer') if (auth.groups?.type !== 'Bearer')
return null; return null;
logger ('found bearer token');
return auth.groups?.data; return auth.groups?.data;
} }
public get_cookie_auth (req: IncomingMessage): AuthCookies { public get_cookie_auth (req: IncomingMessage): AuthCookies {
logger ('extracting tokens from cookies');
const result: AuthCookies = { const result: AuthCookies = {
access_cookie: null, access_cookie: null,
refresh_cookie: null refresh_cookie: null
@ -84,6 +94,7 @@ class GatewayClass {
cookie_regex, cookie_regex,
req.headers.cookie, req.headers.cookie,
(res: RegExpMatchArray) => { (res: RegExpMatchArray) => {
logger ('parsing cookie %s', res.groups?.name);
if (res.groups?.name === this._options.cookie_name) if (res.groups?.name === this._options.cookie_name)
result.access_cookie = res.groups?.value as string; result.access_cookie = res.groups?.value as string;
else if (res.groups?.name === this._options.refresh_cookie_name) else if (res.groups?.name === this._options.refresh_cookie_name)
@ -91,22 +102,28 @@ class GatewayClass {
} }
); );
logger ('parsed cookies: %O', result);
return result; return result;
} }
public authenticate (req: IncomingMessage): boolean { public authenticate (req: IncomingMessage): boolean {
logger ('authenticating incoming request');
const cookies = this.get_cookie_auth (req); const cookies = this.get_cookie_auth (req);
let auth = this.get_header_auth (req); let auth = this.get_header_auth (req);
if (auth === null) if (auth === null)
auth = cookies.access_cookie; auth = cookies.access_cookie;
if (auth === null) if (auth === null) {
logger ('found no auth token');
return false; return false;
}
const ver = authority.verify (auth); const ver = authority.verify (auth);
logger ('setting connection info');
const con = req.connection as unknown as Record<string, unknown>; const con = req.connection as unknown as Record<string, unknown>;
con.auth = { token_id: ver.id, token_data: ver.data }; con.auth = { token_id: ver.id, token_data: ver.data };
logger ('token valid: %s', ver.authorized);
return ver.authorized; return ver.authorized;
} }
@ -120,12 +137,17 @@ class GatewayClass {
) )
return false; return false;
logger ('trying to apply refresh token');
const refresh = this.get_cookie_auth (req).refresh_cookie; const refresh = this.get_cookie_auth (req).refresh_cookie;
if (refresh === null) if (refresh === null) {
logger ('could not find refresh token');
return false; return false;
}
const ver = authority.verify (refresh); const ver = authority.verify (refresh);
if (ver.type === 'refresh_token' && ver.valid) { if (ver.type === 'refresh_token' && ver.valid) {
logger ('refresh token valid, generating new tokens');
const auth_request = new AuthRequest ( const auth_request = new AuthRequest (
req, req,
res, res,
@ -139,15 +161,18 @@ class GatewayClass {
leave_open: true leave_open: true
}); });
logger ('setting connection info');
const con = req.connection as unknown as Record<string, unknown>; const con = req.connection as unknown as Record<string, unknown>;
con.auth = { con.auth = {
token_id: refresh_result.access_token_id, token_id: refresh_result.access_token_id,
token_data: this._options.refresh_settings.data token_data: this._options.refresh_settings.data
}; };
logger ('tokens refreshed');
return true; return true;
} }
logger ('refresh token invalid');
return false; return false;
} }
@ -156,10 +181,17 @@ class GatewayClass {
res: ServerResponse, res: ServerResponse,
next: AnyFunc next: AnyFunc
): Promise<unknown> { ): Promise<unknown> {
if (this.authenticate (req)) logger ('processing incoming http request');
if (this.authenticate (req)) {
logger ('authentification successful, calling next handler');
return next (); return next ();
if (await this.try_refresh (req, res)) }
if (await this.try_refresh (req, res)) {
logger ('refresh successful, calling next handler');
return next (); return next ();
}
logger ('could not verify session, redirecting to auth gateway');
return this.redirect (res); return this.redirect (res);
} }
} }

View File

@ -7,6 +7,9 @@
import { generate_keypair, random_hex } from '@sapphirecode/crypto-helper'; import { generate_keypair, random_hex } from '@sapphirecode/crypto-helper';
import { to_b58 } from '@sapphirecode/encoding-helper'; import { to_b58 } from '@sapphirecode/encoding-helper';
import { debug } from './debug';
const logger = debug ('keystore');
const renew_interval = 3600; const renew_interval = 3600;
@ -28,6 +31,7 @@ type KeyStoreData = Record<string, KeyPair>;
type KeyStoreExport = LabelledKey[]; type KeyStoreExport = LabelledKey[];
async function create_key (valid_for: number) { async function create_key (valid_for: number) {
logger ('generating new key');
const time = (new Date) const time = (new Date)
.getTime (); .getTime ();
const pair = await generate_keypair (); const pair = await generate_keypair ();
@ -57,6 +61,7 @@ class KeyStore {
this.garbage_collect (); this.garbage_collect ();
}, renew_interval); }, renew_interval);
this._instance = to_b58 (random_hex (16), 'hex'); this._instance = to_b58 (random_hex (16), 'hex');
logger ('created keystore instance %s', this._instance);
} }
private get_index (iat: number, instance = this._instance): string { private get_index (iat: number, instance = this._instance): string {
@ -72,19 +77,29 @@ class KeyStore {
const entry = this._keys[index]; const entry = this._keys[index];
if (typeof entry.private_key !== 'undefined' if (typeof entry.private_key !== 'undefined'
&& entry.private_key.valid_until < time && entry.private_key.valid_until < time
) ) {
logger ('deleting expired private key');
delete entry.private_key; delete entry.private_key;
}
if (entry.public_key.valid_until < time) if (entry.public_key.valid_until < time) {
logger ('deleting expired key pair');
delete this._keys[index]; delete this._keys[index];
} }
} }
}
public async get_sign_key ( public async get_sign_key (
iat: number, iat: number,
valid_for: number, valid_for: number,
instance?: string instance?: string
): Promise<string> { ): Promise<string> {
logger (
'querying key from %s for timestamp %d, valid for %d',
instance,
iat,
valid_for
);
if (valid_for <= 0) if (valid_for <= 0)
throw new Error ('cannot create infinitely valid key'); throw new Error ('cannot create infinitely valid key');
@ -98,21 +113,27 @@ class KeyStore {
.getTime () + (valid_for * 1000); .getTime () + (valid_for * 1000);
if (typeof this._keys[index] !== 'undefined') { if (typeof this._keys[index] !== 'undefined') {
logger ('loading existing key');
const key = this._keys[index]; const key = this._keys[index];
if (key.public_key.valid_until < valid_until)
key.public_key.valid_until = valid_until;
if (typeof key.private_key === 'undefined') if (typeof key.private_key === 'undefined')
throw new Error ('cannot access already expired keys'); throw new Error ('cannot access already expired keys');
if (key.public_key.valid_until < valid_until) {
logger ('updating key valid timespan to match new value');
key.public_key.valid_until = valid_until;
}
return key.private_key?.key as string; return key.private_key?.key as string;
} }
logger ('key does not exist, creating a new one');
this._keys[index] = await create_key (valid_for); this._keys[index] = await create_key (valid_for);
return this._keys[index].private_key?.key as string; return this._keys[index].private_key?.key as string;
} }
public get_key (iat: number, instance?: string): string { public get_key (iat: number, instance?: string): string {
logger ('querying public key from %s for timestamp %d', instance, iat);
const index = this.get_index (iat, instance); const index = this.get_index (iat, instance);
if (typeof this._keys[index] === 'undefined') if (typeof this._keys[index] === 'undefined')
@ -123,6 +144,7 @@ class KeyStore {
} }
public export_verification_data (): KeyStoreExport { public export_verification_data (): KeyStoreExport {
logger ('exporting public keys');
this.garbage_collect (); this.garbage_collect ();
const out: KeyStoreExport = []; const out: KeyStoreExport = [];
for (const index of Object.keys (this._keys)) for (const index of Object.keys (this._keys))
@ -132,6 +154,7 @@ class KeyStore {
} }
public import_verification_data (data: KeyStoreExport): void { public import_verification_data (data: KeyStoreExport): void {
logger ('importing %d public keys', data.length);
for (const key of data) { for (const key of data) {
if (typeof this._keys[key.index] !== 'undefined') if (typeof this._keys[key.index] !== 'undefined')
throw new Error ('cannot import to the same instance'); throw new Error ('cannot import to the same instance');
@ -146,6 +169,7 @@ class KeyStore {
} }
public reset_instance (): void { public reset_instance (): void {
logger ('resetting keystore');
this._instance = to_b58 (random_hex (16), 'hex'); this._instance = to_b58 (random_hex (16), 'hex');
this._keys = {}; this._keys = {};
} }

9
lib/debug.ts Normal file
View File

@ -0,0 +1,9 @@
import build_debug from 'debug';
function debug (scope: string): build_debug.Debugger {
const namespace = `sapphirecode:auth-server-helper:${scope}`;
console.log ('register debugger', namespace);
return build_debug (namespace);
}
export { debug };

View File

@ -1,6 +1,6 @@
{ {
"name": "@sapphirecode/auth-server-helper", "name": "@sapphirecode/auth-server-helper",
"version": "2.2.1", "version": "2.2.2",
"main": "dist/index.js", "main": "dist/index.js",
"author": { "author": {
"name": "Timo Hocker", "name": "Timo Hocker",
@ -17,6 +17,7 @@
"@sapphirecode/eslint-config-ts": "^1.1.27", "@sapphirecode/eslint-config-ts": "^1.1.27",
"@stryker-mutator/core": "^4.3.1", "@stryker-mutator/core": "^4.3.1",
"@stryker-mutator/jasmine-runner": "^4.3.1", "@stryker-mutator/jasmine-runner": "^4.3.1",
"@types/debug": "^4.1.7",
"@types/jasmine": "^3.6.2", "@types/jasmine": "^3.6.2",
"@types/node": "^10.0.0", "@types/node": "^10.0.0",
"eslint": "^7.14.0", "eslint": "^7.14.0",
@ -46,7 +47,8 @@
"dependencies": { "dependencies": {
"@sapphirecode/crypto-helper": "^1.3.0", "@sapphirecode/crypto-helper": "^1.3.0",
"@sapphirecode/encoding-helper": "^1.1.0", "@sapphirecode/encoding-helper": "^1.1.0",
"@sapphirecode/utilities": "^1.8.8" "@sapphirecode/utilities": "^1.8.8",
"debug": "^4.3.3"
}, },
"engines": { "engines": {
"node": ">=10.0.0" "node": ">=10.0.0"

View File

@ -503,6 +503,13 @@
dependencies: dependencies:
lodash.flatmap "~4.5.0" lodash.flatmap "~4.5.0"
"@types/debug@^4.1.7":
version "4.1.7"
resolved "https://registry.yarnpkg.com/@types/debug/-/debug-4.1.7.tgz#7cc0ea761509124709b8b2d1090d8f6c17aadb82"
integrity sha512-9AonUzyTjXXhEOa0DnqpzZi6VHlqKMswga9EXjpXnnqxwLtdvPPtlO8evrI5D9S6asFRCQ6v+wpiUKbw+vKqyg==
dependencies:
"@types/ms" "*"
"@types/jasmine@^3.6.2": "@types/jasmine@^3.6.2":
version "3.7.1" version "3.7.1"
resolved "https://registry.yarnpkg.com/@types/jasmine/-/jasmine-3.7.1.tgz#35b86511a389673ac1a706c6010b35788a0d998d" resolved "https://registry.yarnpkg.com/@types/jasmine/-/jasmine-3.7.1.tgz#35b86511a389673ac1a706c6010b35788a0d998d"
@ -518,6 +525,11 @@
resolved "https://registry.yarnpkg.com/@types/json5/-/json5-0.0.29.tgz#ee28707ae94e11d2b827bcbe5270bcea7f3e71ee" resolved "https://registry.yarnpkg.com/@types/json5/-/json5-0.0.29.tgz#ee28707ae94e11d2b827bcbe5270bcea7f3e71ee"
integrity sha1-7ihweulOEdK4J7y+UnC86n8+ce4= integrity sha1-7ihweulOEdK4J7y+UnC86n8+ce4=
"@types/ms@*":
version "0.7.31"
resolved "https://registry.yarnpkg.com/@types/ms/-/ms-0.7.31.tgz#31b7ca6407128a3d2bbc27fe2d21b345397f6197"
integrity sha512-iiUgKzV9AuaEkZqkOLDIvlQiL6ltuZd9tGcW3gwpnX8JbuiuhFlEGmmFXEXkN50Cvq7Os88IY2v0dkDqXYWVgA==
"@types/node@^10.0.0": "@types/node@^10.0.0":
version "10.17.59" version "10.17.59"
resolved "https://registry.yarnpkg.com/@types/node/-/node-10.17.59.tgz#03f440ccf746a27f7da6e141e6cbae64681dbd2f" resolved "https://registry.yarnpkg.com/@types/node/-/node-10.17.59.tgz#03f440ccf746a27f7da6e141e6cbae64681dbd2f"
@ -967,6 +979,13 @@ debug@^4.0.1, debug@^4.1.0, debug@^4.1.1:
dependencies: dependencies:
ms "2.1.2" ms "2.1.2"
debug@^4.3.3:
version "4.3.3"
resolved "https://registry.yarnpkg.com/debug/-/debug-4.3.3.tgz#04266e0b70a98d4462e6e288e38259213332b664"
integrity sha512-/zxw5+vh1Tfv+4Qn7a5nsbcJKPaSvCDhojn6FEl9vupwK2VCSDtEiEtqr8DFtzYFOdz63LBkxec7DYuc2jon6Q==
dependencies:
ms "2.1.2"
decamelize@^1.2.0: decamelize@^1.2.0:
version "1.2.0" version "1.2.0"
resolved "https://registry.yarnpkg.com/decamelize/-/decamelize-1.2.0.tgz#f6534d15148269b20352e7bee26f501f9a191290" resolved "https://registry.yarnpkg.com/decamelize/-/decamelize-1.2.0.tgz#f6534d15148269b20352e7bee26f501f9a191290"