Skip to content

Commit 34d173e

Browse files
committed
chore: minor cleanup
1 parent 399a051 commit 34d173e

File tree

6 files changed

+24
-31
lines changed

6 files changed

+24
-31
lines changed

lib/index.ts

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,5 +25,3 @@ export * from "./pki/certificate_manager";
2525
export * from "./misc/subject";
2626

2727
export { CertificateAuthority } from "./ca/certificate_authority";
28-
// export * from "./misc/install_prerequisite";
29-
// export * from "./toolbox/with_openssl/toolbox";

lib/pki/certificate_manager.ts

Lines changed: 17 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -53,11 +53,10 @@ import { SubjectOptions } from "../misc/subject";
5353
import { CertificateStatus, Filename, KeySize, Thumbprint } from "../toolbox/common";
5454

5555
import { debugLog, warningLog } from "../toolbox/debug";
56-
import { make_path, mkdir } from "../toolbox/common2";
56+
import { make_path, mkdirSync } from "../toolbox/common2";
5757

5858
import { CreateSelfSignCertificateParam, CreateSelfSignCertificateWithConfigParam } from "../toolbox/common";
59-
import { createCertificateSigningRequestWithOpenSSL, dumpCertificate } from "../toolbox/with_openssl";
60-
import { createSelfSignedCertificate } from "../toolbox/without_openssl";
59+
import { createCertificateSigningRequestAsync, createSelfSignedCertificate } from "../toolbox/without_openssl";
6160

6261
import _simple_config_template from "./templates/simple_config_template.cnf";
6362
/**
@@ -266,7 +265,7 @@ export class CertificateManager {
266265
this.location = make_path(options.location, "");
267266
this.keySize = options.keySize;
268267

269-
mkdir(options.location);
268+
mkdirSync(options.location);
270269

271270
// istanbul ignore next
272271
if (!fs.existsSync(this.location)) {
@@ -583,18 +582,18 @@ export class CertificateManager {
583582
private async _initialize(): Promise<void> {
584583
assert((this.state = CertificateManagerState.Initializing));
585584
const pkiDir = this.location;
586-
mkdir(pkiDir);
587-
mkdir(path.join(pkiDir, "own"));
588-
mkdir(path.join(pkiDir, "own/certs"));
589-
mkdir(path.join(pkiDir, "own/private"));
590-
mkdir(path.join(pkiDir, "rejected"));
591-
mkdir(path.join(pkiDir, "trusted"));
592-
mkdir(path.join(pkiDir, "trusted/certs"));
593-
mkdir(path.join(pkiDir, "trusted/crl"));
594-
595-
mkdir(path.join(pkiDir, "issuers"));
596-
mkdir(path.join(pkiDir, "issuers/certs")); // contains Trusted CA certificates
597-
mkdir(path.join(pkiDir, "issuers/crl")); // contains CRL of revoked CA certificates
585+
mkdirSync(pkiDir);
586+
mkdirSync(path.join(pkiDir, "own"));
587+
mkdirSync(path.join(pkiDir, "own/certs"));
588+
mkdirSync(path.join(pkiDir, "own/private"));
589+
mkdirSync(path.join(pkiDir, "rejected"));
590+
mkdirSync(path.join(pkiDir, "trusted"));
591+
mkdirSync(path.join(pkiDir, "trusted/certs"));
592+
mkdirSync(path.join(pkiDir, "trusted/crl"));
593+
594+
mkdirSync(path.join(pkiDir, "issuers"));
595+
mkdirSync(path.join(pkiDir, "issuers/certs")); // contains Trusted CA certificates
596+
mkdirSync(path.join(pkiDir, "issuers/crl")); // contains CRL of revoked CA certificates
598597

599598
if (!fs.existsSync(this.configFile) || !fs.existsSync(this.privateKey)) {
600599
return await this.withLock2(async () => {
@@ -705,7 +704,7 @@ export class CertificateManager {
705704
const now = new Date();
706705
const today = now.toISOString().slice(0, 10) + "_" + now.getTime();
707706
const certificateSigningRequestFilename = path.join(this.rootDir, "own/certs", "certificate_" + today + ".csr");
708-
await createCertificateSigningRequestWithOpenSSL(certificateSigningRequestFilename, _params);
707+
await createCertificateSigningRequestAsync(certificateSigningRequestFilename, _params);
709708
return certificateSigningRequestFilename;
710709
});
711710
}
@@ -817,11 +816,7 @@ export class CertificateManager {
817816
wantedIssuerKey,
818817
selectedTrustedCertificates.length,
819818
);
820-
for (const entry of selectedTrustedCertificates) {
821-
const data = await dumpCertificate(entry.filename);
822-
debugLog(" ", entry.filename);
823-
debugLog(data);
824-
}
819+
825820
}
826821
return selectedTrustedCertificates.length > 0 ? selectedTrustedCertificates[0].certificate : null;
827822
}

lib/toolbox/common2.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ export function certificateFileExist(certificateFile: string): boolean {
4040
return true;
4141
}
4242

43-
export async function mkdir(folder: string): Promise<void> {
43+
export function mkdirSync(folder: string): void {
4444
if (!fs.existsSync(folder)) {
4545
// istanbul ignore next
4646
debugLog(chalk.white(" .. constructing "), folder);

lib/toolbox/without_openssl/create_certificate_signing_request.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ import assert from "assert";
2323
import fs from "fs";
2424
import { CreateCertificateSigningRequestWithConfigOptions } from "../common";
2525
import { Subject, pemToPrivateKey } from "node-opcua-crypto";
26+
import { createCertificateSigningRequest } from "node-opcua-crypto";
2627
import { display, displaySubtitle } from "../display";
27-
import { createCertificateSigningRequest as createCertificateSigningRequest1 } from "node-opcua-crypto";
2828

2929
/**
3030
* create a certificate signing request
@@ -50,7 +50,7 @@ export async function createCertificateSigningRequestAsync(
5050
const privateKeyPem = await fs.promises.readFile(params.privateKey, "utf-8");
5151
const privateKey = await pemToPrivateKey(privateKeyPem);
5252

53-
const { csr } = await createCertificateSigningRequest1({
53+
const { csr } = await createCertificateSigningRequest({
5454
privateKey,
5555
dns: params.dns,
5656
ip: params.ip,

test/helpers.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
import path from "path";
22
import rimraf from "rimraf";
33

4-
import { g_config, mkdir, warningLog } from "../lib/index";
4+
import { g_config, mkdirSync, warningLog } from "../lib/index";
55

66
const tmpFolder = path.join(__dirname, "../tmp");
77

@@ -46,7 +46,7 @@ export function beforeTest(self: Mocha.Suite, nextFunction?: () => Promise<void>
4646
warningLog(" .... cleaning temporary folders ...", tmpFolder);
4747
await rimraf(tmpFolder);
4848
warningLog(" ..... folder cleaned");
49-
await mkdir(tmpFolder);
49+
mkdirSync(tmpFolder);
5050
warningLog(" ..... creating empty folder", tmpFolder);
5151
}
5252
await next();

test/test_toolbox.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ import fs from "fs";
22
import path from "path";
33
import "should";
44

5-
import { mkdir, warningLog } from "../lib";
5+
import { mkdirSync, warningLog } from "../lib";
66
import { getPublicKeyFromCertificate, getPublicKeyFromPrivateKey } from "../lib/toolbox/with_openssl";
77
import { beforeTest } from "./helpers";
88
import { generatePrivateKeyFile } from "node-opcua-crypto";
@@ -16,7 +16,7 @@ describe("testing NodeOPCUA PKI Toolbox", function (this: Mocha.Suite) {
1616
before(async () => {
1717

1818
privateKey = path.join(testData.tmpFolder, "some_private_key");
19-
await mkdir(testData.tmpFolder);
19+
mkdirSync(testData.tmpFolder);
2020

2121
warningLog("generating private key");
2222
await generatePrivateKeyFile(privateKey, 2048);

0 commit comments

Comments
 (0)