commit dbeaf99781279f553dcc06806cafe34ed9016a62 Author: jasinco Date: Sun May 4 10:12:11 2025 +0800 init diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..cfd6112 --- /dev/null +++ b/.gitignore @@ -0,0 +1,18 @@ +# Python-generated files +__pycache__/ +*.py[oc] +build/ +dist/ +wheels/ +*.egg-info + +# test pem +certs/rootCA.pem +certs/rootCA-key.pem +certs/issue +certs/req + +cert.db + +# Virtual environments +.venv diff --git a/.python-version b/.python-version new file mode 100644 index 0000000..24ee5b1 --- /dev/null +++ b/.python-version @@ -0,0 +1 @@ +3.13 diff --git a/README.md b/README.md new file mode 100644 index 0000000..2f42688 --- /dev/null +++ b/README.md @@ -0,0 +1,16 @@ +# TCIVS INTRA CA Management Server +# Setup +## Requirements: uv python3 +## Commands +``` +uv pip sync ./deploy_requirements.txt +# copy your rootCA certificate to ./certs/ and either change your name to rootCA-key, rootCA or edit the main.py CA,CA_KEY variable +copy rootCA.pem ./certs/ +copy rootCA-key.pem ./certs/ +# Adapt into your HTTP server like nginx to secure your /admin panel +vim /etc/nginx/ +# Add the service file to /etc/systemd/system/ +cp ./certieer.service /etc/systemd/system +systemctl daemon-reload +systemctl enable --now +``` diff --git a/certieer.service b/certieer.service new file mode 100644 index 0000000..e07a829 --- /dev/null +++ b/certieer.service @@ -0,0 +1,10 @@ +[Unit] +Description=TCIVS INTRA CA cert management server + +[Service] +Type=simple +ExecStart=uv run gunicord -w 4 'main:create_app()' +User=1000 + +[Install] +WantedBy=default.target diff --git a/certs/issue.cfg b/certs/issue.cfg new file mode 100644 index 0000000..9c400f9 --- /dev/null +++ b/certs/issue.cfg @@ -0,0 +1,28 @@ +[ usr_cert ] + +# These extensions are added when 'ca' signs a request. + +# This goes against PKIX guidelines but some CAs do it and some software +# requires this to avoid interpreting an end user certificate as a CA. + +basicConstraints=CA:FALSE + +# This is typical in keyUsage for a client certificate. +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# PKIX recommendations harmless if included in all certificates. +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer + +# This stuff is for subjectAltName and issuerAltname. +# Import the email address. +#subjectAltName=email:copy dns:copy ip:copy +# An alternative to produce certificates that aren't +# deprecated according to PKIX. +# subjectAltName=email:move + +# Copy subject details +# issuerAltName=issuer:copy + +# This is required for TSA certificates. +# extendedKeyUsage = critical,timeStamping diff --git a/deploy_requirements.txt b/deploy_requirements.txt new file mode 100644 index 0000000..94f8763 --- /dev/null +++ b/deploy_requirements.txt @@ -0,0 +1,9 @@ +blinker==1.9.0 +click==8.1.8 +flask==3.1.0 +gunicorn==23.0.0 +itsdangerous==2.2.0 +jinja2==3.1.6 +markupsafe==3.0.2 +packaging==25.0 +werkzeug==3.1.3 diff --git a/main.py b/main.py new file mode 100644 index 0000000..f907212 --- /dev/null +++ b/main.py @@ -0,0 +1,185 @@ +from flask import Flask, make_response, redirect, render_template, request, g, send_file +import subprocess +from uuid import uuid4 +from base64 import b32encode, b64encode +from pathlib import Path +import sqlite3 + +app = Flask(__name__) +CERT_LOCATION = Path("./certs/") + +CA_PEM = Path("./certs/rootCA.pem") +CA_KEY = Path("./certs/rootCA-key.pem") + + +def save_csr(text: str): + req_path = CERT_LOCATION / "req" + if not req_path.exists() or not req_path.is_dir(): + req_path.mkdir() + fname_id = b32encode(uuid4().bytes_le).decode() + fname = f"{fname_id}.csr" + with open(req_path / fname, "w") as f: + f.write(text) + return fname_id + + +def get_db(): + db = getattr(g, "_database", None) + if db is None: + db = g._database = sqlite3.connect("cert.db") + return db + + +@app.teardown_appcontext +def close_connection(exception): + db = getattr(g, "_database", None) + if db is not None: + db.close() + + +@app.post("/reqcert") +def reqcert(): + csr = request.form["csr"] + name = request.form["name"] + openssl_check = subprocess.Popen( + ["openssl", "req", "-verify"], + stdin=subprocess.PIPE, + stdout=subprocess.PIPE, + stderr=subprocess.PIPE, + ) + openssl_check.communicate(csr.encode()) + if openssl_check.returncode: + return make_response( + "" + ) + + fname = save_csr(csr) + cur = get_db().cursor() + id_tk = request.cookies.get("id_tk") + cur.execute( + "INSERT INTO request (id, name, csr) VALUES (?,?,?)", [id_tk, name, fname] + ) + get_db().commit() + cur.close() + + return redirect("/") + + +@app.get("/download_pem/") +def download_der(filename: str): + uid = request.cookies.get("id_tk") + if not uid: + return "" + cur = get_db().cursor() + record = cur.execute( + "SELECT name FROM issued WHERE id=? AND filename=?", [uid, filename] + ).fetchall() + if len(record) != 1: + return "" + + cert_dir_path = Path("./certs/issue") + if not (cert_dir_path / (filename + ".pem")).exists(): + return "" + + return send_file( + cert_dir_path / (filename + ".pem"), download_name=f"{record[0][0]}.pem" + ) + + +@app.get("/") +def root(): + id_tk = request.cookies.get("id_tk") + if id_tk: + cursor = get_db().cursor() + issued = cursor.execute( + "SELECT name, filename FROM issued WHERE id=?", + [id_tk], + ).fetchall() + pending = cursor.execute( + "SELECT name FROM request WHERE id=?", [id_tk] + ).fetchall() + cursor.close() + + return render_template( + "index.html", + issued=issued, + pending=pending, + ) + resp = make_response(render_template("index.html", issued=[], pending=[])) + resp.set_cookie("id_tk", b64encode(uuid4().bytes).decode()) + return resp + + +def init_db(): + with app.app_context(): + db = get_db() + try: + with app.open_resource("schema.sql", mode="r") as f: + db.cursor().executescript(f.read()).close() + db.commit() + except sqlite3.OperationalError as e: + print(e) + + +@app.get("/admin") +def admin_index(): + cursor = get_db().cursor() + certreqs = cursor.execute("SELECT name,csr FROM request").fetchall() + cursor.close() + print(certreqs) + return render_template("admin.html", reqs=certreqs) + + +@app.get("/admin/issue") +def issue(): + id = request.args.get("id") + csr_dir_path = Path("./certs/req/") + cert_dir_path = Path("./certs/issue") + if not cert_dir_path.exists(): + cert_dir_path.mkdir() + if not id or not (csr_dir_path / (id + ".csr")).is_file(): + return "Failed" + + openssl_call = subprocess.run( + [ + "openssl", + "x509", + "-in", + (csr_dir_path / (id + ".csr")).as_posix(), + "-req", + "-extfile", + "./certs/issue.cfg", + "-extensions", + "usr_cert", + "-copy_extensions", + "copy", + "-CA", + CA_PEM.as_posix(), + "-CAkey", + CA_KEY.as_posix(), + "-outform", + "pem", + "-out", + (cert_dir_path / (id + ".pem")), + ], + ) + if openssl_call.returncode == 0: + cursor = get_db().cursor() + rec = cursor.execute( + "DELETE FROM request WHERE csr=? RETURNING id,name,csr", [id] + ).fetchone() + cursor.execute("INSERT INTO issued (id,name,filename) VALUES (?,?,?)", rec) + get_db().commit() + cursor.close() + + return redirect("/admin") + return "" + + +def create_app(): + init_db() + return app + + +if __name__ == "__main__": + create_app().run() diff --git a/nginx_template.conf b/nginx_template.conf new file mode 100644 index 0000000..30181a1 --- /dev/null +++ b/nginx_template.conf @@ -0,0 +1,22 @@ +server { + listen 443 ssl http2; + server_name ca.tcivs.intra; + proxy_buffers 8 16k; + proxy_buffer_size 32k + location /admin { + # Your Auth provider + # @include authentik.conf + proxy_pass http://127.0.0.1:8000/admin/; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header X-Forwarded-Host $host; + proxy_set_header X-Forwarded-Prefix /; + } + location / { + proxy_pass http://127.0.0.1:8000/; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header X-Forwarded-Host $host; + proxy_set_header X-Forwarded-Prefix /; + } +} diff --git a/pyproject.toml b/pyproject.toml new file mode 100644 index 0000000..0910782 --- /dev/null +++ b/pyproject.toml @@ -0,0 +1,9 @@ +[project] +name = "certieer" +version = "0.1.0" +description = "Add your description here" +readme = "README.md" +requires-python = ">=3.13" +dependencies = [ + "flask>=3.1.0", +] diff --git a/schema.sql b/schema.sql new file mode 100644 index 0000000..da3619f --- /dev/null +++ b/schema.sql @@ -0,0 +1,2 @@ +CREATE TABLE issued (id char(24) NOT NULL, name varchar(100) NOT NULL , filename varchar(100) NOT NULL); +CREATE TABLE request (id char(24) NOT NULL, name varchar(100) NOT NULL , csr varchar(100) NOT NULL); diff --git a/templates/admin.html b/templates/admin.html new file mode 100644 index 0000000..5ff1a0f --- /dev/null +++ b/templates/admin.html @@ -0,0 +1,27 @@ + + + + + + TCIVS ACME Admin + + + + + + + + + {% for i in reqs %} + + + + + + {% endfor %} + +
nameidIssue
{{i[0]|safe}}{{i[1]|safe}} + Issue +
+ + diff --git a/templates/index.html b/templates/index.html new file mode 100644 index 0000000..3ee54de --- /dev/null +++ b/templates/index.html @@ -0,0 +1,44 @@ + + + + + + TCIVS Cyber Intra Certificate Request + + + + + + + + + {% for record in issued %} + + + + + {% endfor %} + +
NameIssued
{{record[0]|safe}}Download PEM
+ + + + + + {% for pd in pending %} + + + + {% endfor %} + +
Pending
{{pd[0]|safe}}
+
+ + +
+ + + +
+ + diff --git a/uv.lock b/uv.lock new file mode 100644 index 0000000..f4a68bc --- /dev/null +++ b/uv.lock @@ -0,0 +1,121 @@ +version = 1 +revision = 2 +requires-python = ">=3.13" + +[[package]] +name = "blinker" +version = "1.9.0" +source = { registry = "https://pypi.org/simple" } +sdist = { url = "https://files.pythonhosted.org/packages/21/28/9b3f50ce0e048515135495f198351908d99540d69bfdc8c1d15b73dc55ce/blinker-1.9.0.tar.gz", hash = "sha256:b4ce2265a7abece45e7cc896e98dbebe6cead56bcf805a3d23136d145f5445bf", size = 22460, upload_time = "2024-11-08T17:25:47.436Z" } +wheels = [ + { url = "https://files.pythonhosted.org/packages/10/cb/f2ad4230dc2eb1a74edf38f1a38b9b52277f75bef262d8908e60d957e13c/blinker-1.9.0-py3-none-any.whl", hash = "sha256:ba0efaa9080b619ff2f3459d1d500c57bddea4a6b424b60a91141db6fd2f08bc", size = 8458, upload_time = "2024-11-08T17:25:46.184Z" }, +] + +[[package]] +name = "certieer" +version = "0.1.0" +source = { virtual = "." } +dependencies = [ + { name = "flask" }, +] + +[package.metadata] +requires-dist = [{ name = "flask", specifier = ">=3.1.0" }] + +[[package]] +name = "click" +version = "8.1.8" +source = { registry = "https://pypi.org/simple" } +dependencies = [ + { name = "colorama", marker = "sys_platform == 'win32'" }, +] +sdist = { url = "https://files.pythonhosted.org/packages/b9/2e/0090cbf739cee7d23781ad4b89a9894a41538e4fcf4c31dcdd705b78eb8b/click-8.1.8.tar.gz", hash = "sha256:ed53c9d8990d83c2a27deae68e4ee337473f6330c040a31d4225c9574d16096a", size = 226593, upload_time = "2024-12-21T18:38:44.339Z" } +wheels = [ + { url = "https://files.pythonhosted.org/packages/7e/d4/7ebdbd03970677812aac39c869717059dbb71a4cfc033ca6e5221787892c/click-8.1.8-py3-none-any.whl", hash = "sha256:63c132bbbed01578a06712a2d1f497bb62d9c1c0d329b7903a866228027263b2", size = 98188, upload_time = "2024-12-21T18:38:41.666Z" }, +] + +[[package]] +name = "colorama" +version = "0.4.6" +source = { registry = "https://pypi.org/simple" } +sdist = { url = "https://files.pythonhosted.org/packages/d8/53/6f443c9a4a8358a93a6792e2acffb9d9d5cb0a5cfd8802644b7b1c9a02e4/colorama-0.4.6.tar.gz", hash = "sha256:08695f5cb7ed6e0531a20572697297273c47b8cae5a63ffc6d6ed5c201be6e44", size = 27697, upload_time = "2022-10-25T02:36:22.414Z" } +wheels = [ + { url = "https://files.pythonhosted.org/packages/d1/d6/3965ed04c63042e047cb6a3e6ed1a63a35087b6a609aa3a15ed8ac56c221/colorama-0.4.6-py2.py3-none-any.whl", hash = "sha256:4f1d9991f5acc0ca119f9d443620b77f9d6b33703e51011c16baf57afb285fc6", size = 25335, upload_time = "2022-10-25T02:36:20.889Z" }, +] + +[[package]] +name = "flask" +version = "3.1.0" +source = { registry = "https://pypi.org/simple" } +dependencies = [ + { name = "blinker" }, + { name = "click" }, + { name = "itsdangerous" }, + { name = "jinja2" }, + { name = "werkzeug" }, +] +sdist = { url = "https://files.pythonhosted.org/packages/89/50/dff6380f1c7f84135484e176e0cac8690af72fa90e932ad2a0a60e28c69b/flask-3.1.0.tar.gz", hash = "sha256:5f873c5184c897c8d9d1b05df1e3d01b14910ce69607a117bd3277098a5836ac", size = 680824, upload_time = "2024-11-13T18:24:38.127Z" } +wheels = [ + { url = "https://files.pythonhosted.org/packages/af/47/93213ee66ef8fae3b93b3e29206f6b251e65c97bd91d8e1c5596ef15af0a/flask-3.1.0-py3-none-any.whl", hash = "sha256:d667207822eb83f1c4b50949b1623c8fc8d51f2341d65f72e1a1815397551136", size = 102979, upload_time = "2024-11-13T18:24:36.135Z" }, +] + +[[package]] +name = "itsdangerous" +version = "2.2.0" +source = { registry = "https://pypi.org/simple" } +sdist = { url = "https://files.pythonhosted.org/packages/9c/cb/8ac0172223afbccb63986cc25049b154ecfb5e85932587206f42317be31d/itsdangerous-2.2.0.tar.gz", hash = "sha256:e0050c0b7da1eea53ffaf149c0cfbb5c6e2e2b69c4bef22c81fa6eb73e5f6173", size = 54410, upload_time = "2024-04-16T21:28:15.614Z" } +wheels = [ + { url = "https://files.pythonhosted.org/packages/04/96/92447566d16df59b2a776c0fb82dbc4d9e07cd95062562af01e408583fc4/itsdangerous-2.2.0-py3-none-any.whl", hash = "sha256:c6242fc49e35958c8b15141343aa660db5fc54d4f13a1db01a3f5891b98700ef", size = 16234, upload_time = "2024-04-16T21:28:14.499Z" }, +] + +[[package]] +name = "jinja2" +version = "3.1.6" +source = { registry = "https://pypi.org/simple" } +dependencies = [ + { name = "markupsafe" }, +] +sdist = { url = "https://files.pythonhosted.org/packages/df/bf/f7da0350254c0ed7c72f3e33cef02e048281fec7ecec5f032d4aac52226b/jinja2-3.1.6.tar.gz", hash = "sha256:0137fb05990d35f1275a587e9aee6d56da821fc83491a0fb838183be43f66d6d", size = 245115, upload_time = "2025-03-05T20:05:02.478Z" } +wheels = [ + { url = "https://files.pythonhosted.org/packages/62/a1/3d680cbfd5f4b8f15abc1d571870c5fc3e594bb582bc3b64ea099db13e56/jinja2-3.1.6-py3-none-any.whl", hash = "sha256:85ece4451f492d0c13c5dd7c13a64681a86afae63a5f347908daf103ce6d2f67", size = 134899, upload_time = "2025-03-05T20:05:00.369Z" }, +] + +[[package]] +name = "markupsafe" +version = "3.0.2" +source = { registry = "https://pypi.org/simple" } +sdist = { url = "https://files.pythonhosted.org/packages/b2/97/5d42485e71dfc078108a86d6de8fa46db44a1a9295e89c5d6d4a06e23a62/markupsafe-3.0.2.tar.gz", hash = "sha256:ee55d3edf80167e48ea11a923c7386f4669df67d7994554387f84e7d8b0a2bf0", size = 20537, upload_time = "2024-10-18T15:21:54.129Z" } +wheels = [ + { url = "https://files.pythonhosted.org/packages/83/0e/67eb10a7ecc77a0c2bbe2b0235765b98d164d81600746914bebada795e97/MarkupSafe-3.0.2-cp313-cp313-macosx_10_13_universal2.whl", hash = "sha256:ba9527cdd4c926ed0760bc301f6728ef34d841f405abf9d4f959c478421e4efd", size = 14274, upload_time = "2024-10-18T15:21:24.577Z" }, + { url = "https://files.pythonhosted.org/packages/2b/6d/9409f3684d3335375d04e5f05744dfe7e9f120062c9857df4ab490a1031a/MarkupSafe-3.0.2-cp313-cp313-macosx_11_0_arm64.whl", hash = "sha256:f8b3d067f2e40fe93e1ccdd6b2e1d16c43140e76f02fb1319a05cf2b79d99430", size = 12352, upload_time = "2024-10-18T15:21:25.382Z" }, + { url = "https://files.pythonhosted.org/packages/d2/f5/6eadfcd3885ea85fe2a7c128315cc1bb7241e1987443d78c8fe712d03091/MarkupSafe-3.0.2-cp313-cp313-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:569511d3b58c8791ab4c2e1285575265991e6d8f8700c7be0e88f86cb0672094", size = 24122, upload_time = "2024-10-18T15:21:26.199Z" }, + { url = "https://files.pythonhosted.org/packages/0c/91/96cf928db8236f1bfab6ce15ad070dfdd02ed88261c2afafd4b43575e9e9/MarkupSafe-3.0.2-cp313-cp313-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:15ab75ef81add55874e7ab7055e9c397312385bd9ced94920f2802310c930396", size = 23085, upload_time = "2024-10-18T15:21:27.029Z" }, + { url = "https://files.pythonhosted.org/packages/c2/cf/c9d56af24d56ea04daae7ac0940232d31d5a8354f2b457c6d856b2057d69/MarkupSafe-3.0.2-cp313-cp313-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:f3818cb119498c0678015754eba762e0d61e5b52d34c8b13d770f0719f7b1d79", size = 22978, upload_time = "2024-10-18T15:21:27.846Z" }, + { url = "https://files.pythonhosted.org/packages/2a/9f/8619835cd6a711d6272d62abb78c033bda638fdc54c4e7f4272cf1c0962b/MarkupSafe-3.0.2-cp313-cp313-musllinux_1_2_aarch64.whl", hash = "sha256:cdb82a876c47801bb54a690c5ae105a46b392ac6099881cdfb9f6e95e4014c6a", size = 24208, upload_time = "2024-10-18T15:21:28.744Z" }, + { url = "https://files.pythonhosted.org/packages/f9/bf/176950a1792b2cd2102b8ffeb5133e1ed984547b75db47c25a67d3359f77/MarkupSafe-3.0.2-cp313-cp313-musllinux_1_2_i686.whl", hash = "sha256:cabc348d87e913db6ab4aa100f01b08f481097838bdddf7c7a84b7575b7309ca", size = 23357, upload_time = "2024-10-18T15:21:29.545Z" }, + { url = "https://files.pythonhosted.org/packages/ce/4f/9a02c1d335caabe5c4efb90e1b6e8ee944aa245c1aaaab8e8a618987d816/MarkupSafe-3.0.2-cp313-cp313-musllinux_1_2_x86_64.whl", hash = "sha256:444dcda765c8a838eaae23112db52f1efaf750daddb2d9ca300bcae1039adc5c", size = 23344, upload_time = "2024-10-18T15:21:30.366Z" }, + { url = "https://files.pythonhosted.org/packages/ee/55/c271b57db36f748f0e04a759ace9f8f759ccf22b4960c270c78a394f58be/MarkupSafe-3.0.2-cp313-cp313-win32.whl", hash = "sha256:bcf3e58998965654fdaff38e58584d8937aa3096ab5354d493c77d1fdd66d7a1", size = 15101, upload_time = "2024-10-18T15:21:31.207Z" }, + { url = "https://files.pythonhosted.org/packages/29/88/07df22d2dd4df40aba9f3e402e6dc1b8ee86297dddbad4872bd5e7b0094f/MarkupSafe-3.0.2-cp313-cp313-win_amd64.whl", hash = "sha256:e6a2a455bd412959b57a172ce6328d2dd1f01cb2135efda2e4576e8a23fa3b0f", size = 15603, upload_time = "2024-10-18T15:21:32.032Z" }, + { url = "https://files.pythonhosted.org/packages/62/6a/8b89d24db2d32d433dffcd6a8779159da109842434f1dd2f6e71f32f738c/MarkupSafe-3.0.2-cp313-cp313t-macosx_10_13_universal2.whl", hash = "sha256:b5a6b3ada725cea8a5e634536b1b01c30bcdcd7f9c6fff4151548d5bf6b3a36c", size = 14510, upload_time = "2024-10-18T15:21:33.625Z" }, + { url = "https://files.pythonhosted.org/packages/7a/06/a10f955f70a2e5a9bf78d11a161029d278eeacbd35ef806c3fd17b13060d/MarkupSafe-3.0.2-cp313-cp313t-macosx_11_0_arm64.whl", hash = "sha256:a904af0a6162c73e3edcb969eeeb53a63ceeb5d8cf642fade7d39e7963a22ddb", size = 12486, upload_time = "2024-10-18T15:21:34.611Z" }, + { url = "https://files.pythonhosted.org/packages/34/cf/65d4a571869a1a9078198ca28f39fba5fbb910f952f9dbc5220afff9f5e6/MarkupSafe-3.0.2-cp313-cp313t-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:4aa4e5faecf353ed117801a068ebab7b7e09ffb6e1d5e412dc852e0da018126c", size = 25480, upload_time = "2024-10-18T15:21:35.398Z" }, + { url = "https://files.pythonhosted.org/packages/0c/e3/90e9651924c430b885468b56b3d597cabf6d72be4b24a0acd1fa0e12af67/MarkupSafe-3.0.2-cp313-cp313t-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:c0ef13eaeee5b615fb07c9a7dadb38eac06a0608b41570d8ade51c56539e509d", size = 23914, upload_time = "2024-10-18T15:21:36.231Z" }, + { url = "https://files.pythonhosted.org/packages/66/8c/6c7cf61f95d63bb866db39085150df1f2a5bd3335298f14a66b48e92659c/MarkupSafe-3.0.2-cp313-cp313t-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:d16a81a06776313e817c951135cf7340a3e91e8c1ff2fac444cfd75fffa04afe", size = 23796, upload_time = "2024-10-18T15:21:37.073Z" }, + { url = "https://files.pythonhosted.org/packages/bb/35/cbe9238ec3f47ac9a7c8b3df7a808e7cb50fe149dc7039f5f454b3fba218/MarkupSafe-3.0.2-cp313-cp313t-musllinux_1_2_aarch64.whl", hash = "sha256:6381026f158fdb7c72a168278597a5e3a5222e83ea18f543112b2662a9b699c5", size = 25473, upload_time = "2024-10-18T15:21:37.932Z" }, + { url = "https://files.pythonhosted.org/packages/e6/32/7621a4382488aa283cc05e8984a9c219abad3bca087be9ec77e89939ded9/MarkupSafe-3.0.2-cp313-cp313t-musllinux_1_2_i686.whl", hash = "sha256:3d79d162e7be8f996986c064d1c7c817f6df3a77fe3d6859f6f9e7be4b8c213a", size = 24114, upload_time = "2024-10-18T15:21:39.799Z" }, + { url = "https://files.pythonhosted.org/packages/0d/80/0985960e4b89922cb5a0bac0ed39c5b96cbc1a536a99f30e8c220a996ed9/MarkupSafe-3.0.2-cp313-cp313t-musllinux_1_2_x86_64.whl", hash = "sha256:131a3c7689c85f5ad20f9f6fb1b866f402c445b220c19fe4308c0b147ccd2ad9", size = 24098, upload_time = "2024-10-18T15:21:40.813Z" }, + { url = "https://files.pythonhosted.org/packages/82/78/fedb03c7d5380df2427038ec8d973587e90561b2d90cd472ce9254cf348b/MarkupSafe-3.0.2-cp313-cp313t-win32.whl", hash = "sha256:ba8062ed2cf21c07a9e295d5b8a2a5ce678b913b45fdf68c32d95d6c1291e0b6", size = 15208, upload_time = "2024-10-18T15:21:41.814Z" }, + { url = "https://files.pythonhosted.org/packages/4f/65/6079a46068dfceaeabb5dcad6d674f5f5c61a6fa5673746f42a9f4c233b3/MarkupSafe-3.0.2-cp313-cp313t-win_amd64.whl", hash = "sha256:e444a31f8db13eb18ada366ab3cf45fd4b31e4db1236a4448f68778c1d1a5a2f", size = 15739, upload_time = "2024-10-18T15:21:42.784Z" }, +] + +[[package]] +name = "werkzeug" +version = "3.1.3" +source = { registry = "https://pypi.org/simple" } +dependencies = [ + { name = "markupsafe" }, +] +sdist = { url = "https://files.pythonhosted.org/packages/9f/69/83029f1f6300c5fb2471d621ab06f6ec6b3324685a2ce0f9777fd4a8b71e/werkzeug-3.1.3.tar.gz", hash = "sha256:60723ce945c19328679790e3282cc758aa4a6040e4bb330f53d30fa546d44746", size = 806925, upload_time = "2024-11-08T15:52:18.093Z" } +wheels = [ + { url = "https://files.pythonhosted.org/packages/52/24/ab44c871b0f07f491e5d2ad12c9bd7358e527510618cb1b803a88e986db1/werkzeug-3.1.3-py3-none-any.whl", hash = "sha256:54b78bf3716d19a65be4fceccc0d1d7b89e608834989dfae50ea87564639213e", size = 224498, upload_time = "2024-11-08T15:52:16.132Z" }, +]