@anvil-works/anvil-cli 0.7.0-canary.7 → 0.7.0-canary.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli.js +13 -17
- package/dist/commands/checkout.d.ts +4 -1
- package/dist/commands/checkout.d.ts.map +1 -1
- package/dist/index.js +13 -17
- package/dist/services/git-auth.d.ts +1 -1
- package/dist/services/git-auth.d.ts.map +1 -1
- package/package.json +1 -1
package/dist/cli.js
CHANGED
|
@@ -14247,17 +14247,13 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14247
14247
|
function getAuthFilePath(gitDir) {
|
|
14248
14248
|
return external_path_default().join(gitDir, "anvil-auth.json");
|
|
14249
14249
|
}
|
|
14250
|
-
|
|
14251
|
-
|
|
14252
|
-
|
|
14253
|
-
if (!keyBase64) return null;
|
|
14254
|
-
const key = Buffer.from(keyBase64, "base64");
|
|
14255
|
-
if (32 !== key.length) throw new Error(`${KEY_ENV} must be a base64-encoded 32-byte key`);
|
|
14250
|
+
function decodeKey(b64key) {
|
|
14251
|
+
const key = Buffer.from(b64key, "base64");
|
|
14252
|
+
if (32 !== key.length) throw new Error("Encryption key must be a base64-encoded 32-byte key");
|
|
14256
14253
|
return key;
|
|
14257
14254
|
}
|
|
14258
|
-
function
|
|
14259
|
-
const key =
|
|
14260
|
-
if (!key) return plainText;
|
|
14255
|
+
function encrypt(plainText, b64key) {
|
|
14256
|
+
const key = decodeKey(b64key);
|
|
14261
14257
|
const iv = external_node_crypto_default().randomBytes(12);
|
|
14262
14258
|
const cipher = external_node_crypto_default().createCipheriv("aes-256-gcm", key, iv);
|
|
14263
14259
|
const ciphertext = Buffer.concat([
|
|
@@ -14273,9 +14269,8 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14273
14269
|
ciphertext: ciphertext.toString("base64")
|
|
14274
14270
|
}, null, 2);
|
|
14275
14271
|
}
|
|
14276
|
-
function
|
|
14277
|
-
const key =
|
|
14278
|
-
if (!key) return json;
|
|
14272
|
+
function decrypt(json, b64key) {
|
|
14273
|
+
const key = decodeKey(b64key);
|
|
14279
14274
|
const payload = JSON.parse(json);
|
|
14280
14275
|
if (1 !== payload.version || "aes-256-gcm" !== payload.algorithm) throw new Error("Unsupported encrypted file format");
|
|
14281
14276
|
const iv = Buffer.from(payload.iv, "base64");
|
|
@@ -14288,7 +14283,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14288
14283
|
decipher.final()
|
|
14289
14284
|
]).toString("utf8");
|
|
14290
14285
|
}
|
|
14291
|
-
async function writeAuthToFile(repoPath, auth) {
|
|
14286
|
+
async function writeAuthToFile(repoPath, auth, encryptionKey) {
|
|
14292
14287
|
const git = esm_default(repoPath);
|
|
14293
14288
|
const gitDir = await getRepositoryGitDir(repoPath, git);
|
|
14294
14289
|
const authFilePath = getAuthFilePath(gitDir);
|
|
@@ -14296,7 +14291,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14296
14291
|
recursive: true
|
|
14297
14292
|
});
|
|
14298
14293
|
const authJson = JSON.stringify(auth, null, 2);
|
|
14299
|
-
await external_fs_.promises.writeFile(authFilePath,
|
|
14294
|
+
await external_fs_.promises.writeFile(authFilePath, encrypt(authJson, encryptionKey), {
|
|
14300
14295
|
mode: 384
|
|
14301
14296
|
});
|
|
14302
14297
|
await external_fs_.promises.chmod(authFilePath, 448);
|
|
@@ -14314,7 +14309,8 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14314
14309
|
const authFilePath = getAuthFilePath(gitDir);
|
|
14315
14310
|
if (!external_fs_default().existsSync(authFilePath)) return;
|
|
14316
14311
|
const authJson = await external_fs_.promises.readFile(authFilePath, "utf8");
|
|
14317
|
-
|
|
14312
|
+
const key = process.env["ANVIL_AUTH_FILE_ENCRYPTION_KEY"];
|
|
14313
|
+
if (key) return JSON.parse(decrypt(authJson, key));
|
|
14318
14314
|
};
|
|
14319
14315
|
function getDefaultAnvilUrl() {
|
|
14320
14316
|
return resolveAnvilUrl();
|
|
@@ -14403,7 +14399,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14403
14399
|
if (inMemoryAuth) inMemoryAuth.tokens = newTokens;
|
|
14404
14400
|
else if (repoAuth) {
|
|
14405
14401
|
repoAuth.tokens = newTokens;
|
|
14406
|
-
await writeAuthToFile(repoContext, repoAuth);
|
|
14402
|
+
await writeAuthToFile(repoContext, repoAuth, process.env["ANVIL_AUTH_FILE_ENCRYPTION_KEY"]);
|
|
14407
14403
|
} else {
|
|
14408
14404
|
let accountUsername = username;
|
|
14409
14405
|
if (!accountUsername) {
|
|
@@ -19352,7 +19348,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
19352
19348
|
} catch (e) {
|
|
19353
19349
|
throw new Error(`Checkout clone succeeded, but failed to configure repository credentials: ${errors_getErrorMessage(e)}. The repository exists at ${destinationDisplay}, but Git auth bridge setup is incomplete.`);
|
|
19354
19350
|
}
|
|
19355
|
-
if (options.storeAuth) await deps.writeAuthToFile(destinationPath, options.storeAuth);
|
|
19351
|
+
if (options.storeAuth) await deps.writeAuthToFile(destinationPath, options.storeAuth.auth, options.storeAuth.encryptionKey);
|
|
19356
19352
|
return {
|
|
19357
19353
|
appId: parsed.appId,
|
|
19358
19354
|
appName: validation.app_name,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"checkout.d.ts","sourceRoot":"","sources":["../../src/commands/checkout.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,OAAO,EAAgB,MAAM,WAAW,CAAC;AASlD,OAAO,EAAiB,mBAAmB,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAC1F,OAAO,EAAE,QAAQ,EAAqB,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAClF,OAAO,EAAE,qBAAqB,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAE9E,OAAO,EAAE,YAAY,EAAiE,MAAM,uBAAuB,CAAC;AAGpH,OAAO,EAAE,0BAA0B,EAAE,MAAM,mBAAmB,CAAC;AAE/D,MAAM,WAAW,mBAAmB;IAChC,KAAK,EAAE,MAAM,CAAC;IACd,WAAW,CAAC,EAAE,MAAM,CAAC;CACxB;AAED;;;;GAIG;AACH,MAAM,WAAW,eAAe;IAC5B,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,SAAS,CAAC,EAAE,QAAQ,CAAC;
|
|
1
|
+
{"version":3,"file":"checkout.d.ts","sourceRoot":"","sources":["../../src/commands/checkout.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,OAAO,EAAgB,MAAM,WAAW,CAAC;AASlD,OAAO,EAAiB,mBAAmB,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAC1F,OAAO,EAAE,QAAQ,EAAqB,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAClF,OAAO,EAAE,qBAAqB,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAE9E,OAAO,EAAE,YAAY,EAAiE,MAAM,uBAAuB,CAAC;AAGpH,OAAO,EAAE,0BAA0B,EAAE,MAAM,mBAAmB,CAAC;AAE/D,MAAM,WAAW,mBAAmB;IAChC,KAAK,EAAE,MAAM,CAAC;IACd,WAAW,CAAC,EAAE,MAAM,CAAC;CACxB;AAED;;;;GAIG;AACH,MAAM,WAAW,eAAe;IAC5B,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,SAAS,CAAC,EAAE;QACR,IAAI,EAAE,QAAQ,CAAC;QACf,aAAa,EAAE,MAAM,CAAC;KACzB,CAAC;CACL;AAED,MAAM,WAAW,cAAc;IAC3B,KAAK,EAAE,MAAM,CAAC;IACd,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,eAAe,EAAE,MAAM,CAAC;IACxB,kBAAkB,EAAE,MAAM,CAAC;IAC3B,QAAQ,EAAE,MAAM,CAAC;IACjB,UAAU,EAAE,MAAM,CAAC;CACtB;AAED;;GAEG;AACH,MAAM,WAAW,oBAAoB;IACjC,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,OAAO,CAAC,EAAE,OAAO,CAAC;CACrB;AAED;;;GAGG;AACH,MAAM,WAAW,qBAAqB;IAClC,iBAAiB,EAAE,OAAO,iBAAiB,CAAC;IAC5C,aAAa,EAAE,OAAO,aAAa,CAAC;IACpC,mBAAmB,EAAE,OAAO,mBAAmB,CAAC;IAChD,KAAK,EAAE,CAAC,OAAO,EAAE,MAAM,EAAE,eAAe,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,oBAAoB,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACnG,qBAAqB,EAAE,OAAO,qBAAqB,CAAC;IACpD,eAAe,EAAE,OAAO,eAAe,CAAC;CAC3C;AAoBD;;;;;GAKG;AACH,wBAAgB,kBAAkB,CAAC,KAAK,EAAE,MAAM,GAAG,mBAAmB,CAmCrE;AAED,wBAAgB,qBAAqB,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,CAO1D;AAaD,wBAAgB,8BAA8B,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,MAAM,GAAG,MAAM,CAQtF;AAED,wBAAsB,kBAAkB,CAAC,WAAW,CAAC,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAiCzG;AAmBD,wBAAsB,mBAAmB,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAkB9E;AAED,wBAAsB,mBAAmB,CAAC,eAAe,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAUnF;AAED,wBAAsB,2BAA2B,CAAC,eAAe,EAAE,MAAM,EAAE,KAAK,UAAQ,GAAG,OAAO,CAAC,IAAI,CAAC,CAiBvG;AAED,wBAAsB,uBAAuB,CACzC,QAAQ,EAAE,MAAM,EAChB,QAAQ,EAAE,MAAM,GAAG,SAAS,EAC5B,IAAI,GAAE,qBAA2C,GAClD,OAAO,CAAC,MAAM,CAAC,CASjB;AAsBD;;;GAGG;AACH,wBAAsB,uBAAuB,CACzC,QAAQ,EAAE,MAAM,EAChB,gBAAgB,CAAC,EAAE,MAAM,EACzB,WAAW,GAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,EAAE,CAAqB,GACpE,OAAO,CAAC,MAAM,GAAG,SAAS,GAAG,IAAI,CAAC,CA6BpC;AAmBD,wBAAsB,eAAe,CACjC,OAAO,EAAE,eAAe,EACxB,IAAI,GAAE,qBAA2C,GAClD,OAAO,CAAC,cAAc,CAAC,CAqGzB;AAyFD,wBAAsB,yBAAyB,CAC3C,eAAe,EAAE,MAAM,EACvB,sBAAsB,CAAC,EAAE,MAAM,EAC/B,IAAI,CAAC,EAAE,YAAY,GACpB,OAAO,CAAC,IAAI,CAAC,CAEf;AAED,wBAAgB,uBAAuB,CAAC,OAAO,EAAE,OAAO,GAAG,IAAI,CA2F9D"}
|
package/dist/index.js
CHANGED
|
@@ -14218,17 +14218,13 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14218
14218
|
function getAuthFilePath(gitDir) {
|
|
14219
14219
|
return external_path_default().join(gitDir, "anvil-auth.json");
|
|
14220
14220
|
}
|
|
14221
|
-
|
|
14222
|
-
|
|
14223
|
-
|
|
14224
|
-
if (!keyBase64) return null;
|
|
14225
|
-
const key = Buffer.from(keyBase64, "base64");
|
|
14226
|
-
if (32 !== key.length) throw new Error(`${KEY_ENV} must be a base64-encoded 32-byte key`);
|
|
14221
|
+
function decodeKey(b64key) {
|
|
14222
|
+
const key = Buffer.from(b64key, "base64");
|
|
14223
|
+
if (32 !== key.length) throw new Error("Encryption key must be a base64-encoded 32-byte key");
|
|
14227
14224
|
return key;
|
|
14228
14225
|
}
|
|
14229
|
-
function
|
|
14230
|
-
const key =
|
|
14231
|
-
if (!key) return plainText;
|
|
14226
|
+
function encrypt(plainText, b64key) {
|
|
14227
|
+
const key = decodeKey(b64key);
|
|
14232
14228
|
const iv = external_node_crypto_default().randomBytes(12);
|
|
14233
14229
|
const cipher = external_node_crypto_default().createCipheriv("aes-256-gcm", key, iv);
|
|
14234
14230
|
const ciphertext = Buffer.concat([
|
|
@@ -14244,9 +14240,8 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14244
14240
|
ciphertext: ciphertext.toString("base64")
|
|
14245
14241
|
}, null, 2);
|
|
14246
14242
|
}
|
|
14247
|
-
function
|
|
14248
|
-
const key =
|
|
14249
|
-
if (!key) return json;
|
|
14243
|
+
function decrypt(json, b64key) {
|
|
14244
|
+
const key = decodeKey(b64key);
|
|
14250
14245
|
const payload = JSON.parse(json);
|
|
14251
14246
|
if (1 !== payload.version || "aes-256-gcm" !== payload.algorithm) throw new Error("Unsupported encrypted file format");
|
|
14252
14247
|
const iv = Buffer.from(payload.iv, "base64");
|
|
@@ -14259,7 +14254,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14259
14254
|
decipher.final()
|
|
14260
14255
|
]).toString("utf8");
|
|
14261
14256
|
}
|
|
14262
|
-
async function writeAuthToFile(repoPath, auth) {
|
|
14257
|
+
async function writeAuthToFile(repoPath, auth, encryptionKey) {
|
|
14263
14258
|
const git = esm_default(repoPath);
|
|
14264
14259
|
const gitDir = await getRepositoryGitDir(repoPath, git);
|
|
14265
14260
|
const authFilePath = getAuthFilePath(gitDir);
|
|
@@ -14267,7 +14262,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14267
14262
|
recursive: true
|
|
14268
14263
|
});
|
|
14269
14264
|
const authJson = JSON.stringify(auth, null, 2);
|
|
14270
|
-
await external_fs_.promises.writeFile(authFilePath,
|
|
14265
|
+
await external_fs_.promises.writeFile(authFilePath, encrypt(authJson, encryptionKey), {
|
|
14271
14266
|
mode: 384
|
|
14272
14267
|
});
|
|
14273
14268
|
await external_fs_.promises.chmod(authFilePath, 448);
|
|
@@ -14285,7 +14280,8 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14285
14280
|
const authFilePath = getAuthFilePath(gitDir);
|
|
14286
14281
|
if (!external_fs_default().existsSync(authFilePath)) return;
|
|
14287
14282
|
const authJson = await external_fs_.promises.readFile(authFilePath, "utf8");
|
|
14288
|
-
|
|
14283
|
+
const key = process.env["ANVIL_AUTH_FILE_ENCRYPTION_KEY"];
|
|
14284
|
+
if (key) return JSON.parse(decrypt(authJson, key));
|
|
14289
14285
|
};
|
|
14290
14286
|
function getDefaultAnvilUrl() {
|
|
14291
14287
|
return resolveAnvilUrl();
|
|
@@ -14384,7 +14380,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
14384
14380
|
if (inMemoryAuth) inMemoryAuth.tokens = newTokens;
|
|
14385
14381
|
else if (repoAuth) {
|
|
14386
14382
|
repoAuth.tokens = newTokens;
|
|
14387
|
-
await writeAuthToFile(repoContext, repoAuth);
|
|
14383
|
+
await writeAuthToFile(repoContext, repoAuth, process.env["ANVIL_AUTH_FILE_ENCRYPTION_KEY"]);
|
|
14388
14384
|
} else {
|
|
14389
14385
|
let accountUsername = username;
|
|
14390
14386
|
if (!accountUsername) {
|
|
@@ -18546,7 +18542,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
|
|
|
18546
18542
|
} catch (e) {
|
|
18547
18543
|
throw new Error(`Checkout clone succeeded, but failed to configure repository credentials: ${errors_getErrorMessage(e)}. The repository exists at ${destinationDisplay}, but Git auth bridge setup is incomplete.`);
|
|
18548
18544
|
}
|
|
18549
|
-
if (options.storeAuth) await deps.writeAuthToFile(destinationPath, options.storeAuth);
|
|
18545
|
+
if (options.storeAuth) await deps.writeAuthToFile(destinationPath, options.storeAuth.auth, options.storeAuth.encryptionKey);
|
|
18550
18546
|
return {
|
|
18551
18547
|
appId: parsed.appId,
|
|
18552
18548
|
appName: validation.app_name,
|
|
@@ -31,6 +31,6 @@ export declare function hardenCheckoutGitAuth(options: {
|
|
|
31
31
|
cleanRemoteUrl: string;
|
|
32
32
|
}>;
|
|
33
33
|
export declare function parseAppIdFromGitPath(pathValue?: string): string | undefined;
|
|
34
|
-
export declare function writeAuthToFile(repoPath: string, auth: AuthData): Promise<string>;
|
|
34
|
+
export declare function writeAuthToFile(repoPath: string, auth: AuthData, encryptionKey: string): Promise<string>;
|
|
35
35
|
export declare const readAuthFromRepo: (repoPath: string) => Promise<AuthData | undefined>;
|
|
36
36
|
//# sourceMappingURL=git-auth.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"git-auth.d.ts","sourceRoot":"","sources":["../../src/services/git-auth.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAC,QAAQ,EAAC,MAAM,QAAQ,CAAC;AAIrC,MAAM,WAAW,cAAc;IAC3B,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,QAAQ,CAAC,EAAE,MAAM,CAAC;CACrB;AAkBD,wBAAgB,6BAA6B,CAAC,OAAO,EAAE;IACnD,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,EAAE,MAAM,CAAC;IACnB,QAAQ,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC;CAC9B,GAAG,MAAM,CAcT;AAWD,wBAAsB,iBAAiB,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,cAAc,CAAC,CAUhG;AAED,wBAAsB,iBAAiB,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,OAAO,EAAE,cAAc,GAAG,OAAO,CAAC,IAAI,CAAC,CAQ/G;AAED,wBAAgB,oBAAoB,CAAC,KAAK,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,MAAM,CAI5E;AAED,wBAAgB,yBAAyB,CAAC,UAAU,EAAE,MAAM,GAAG,MAAM,CA2BpE;AAiCD,wBAAgB,6BAA6B,CAAC,OAAO,CAAC,EAAE;IACpD,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B,mBAAmB,CAAC,EAAE,MAAM,MAAM,CAAC;CACtC,GAAG,MAAM,CAWT;AA0BD,wBAAsB,+BAA+B,CACjD,QAAQ,EAAE,MAAM,EAChB,QAAQ,EAAE,MAAM,EAChB,OAAO,CAAC,EAAE;IACN,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,QAAQ,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC;CAC9B,GACF,OAAO,CAAC,IAAI,CAAC,CA2Cf;AAED,wBAAsB,qBAAqB,CAAC,OAAO,EAAE;IACjD,QAAQ,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,MAAM,CAAC;IACd,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,UAAU,CAAC,EAAE,MAAM,CAAC;CACvB,GAAG,OAAO,CAAC;IAAE,cAAc,EAAE,MAAM,CAAA;CAAE,CAAC,CAiBtC;AAED,wBAAgB,qBAAqB,CAAC,SAAS,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,SAAS,CAK5E;AA+
|
|
1
|
+
{"version":3,"file":"git-auth.d.ts","sourceRoot":"","sources":["../../src/services/git-auth.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAC,QAAQ,EAAC,MAAM,QAAQ,CAAC;AAIrC,MAAM,WAAW,cAAc;IAC3B,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,QAAQ,CAAC,EAAE,MAAM,CAAC;CACrB;AAkBD,wBAAgB,6BAA6B,CAAC,OAAO,EAAE;IACnD,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,EAAE,MAAM,CAAC;IACnB,QAAQ,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC;CAC9B,GAAG,MAAM,CAcT;AAWD,wBAAsB,iBAAiB,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,cAAc,CAAC,CAUhG;AAED,wBAAsB,iBAAiB,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,OAAO,EAAE,cAAc,GAAG,OAAO,CAAC,IAAI,CAAC,CAQ/G;AAED,wBAAgB,oBAAoB,CAAC,KAAK,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,MAAM,CAI5E;AAED,wBAAgB,yBAAyB,CAAC,UAAU,EAAE,MAAM,GAAG,MAAM,CA2BpE;AAiCD,wBAAgB,6BAA6B,CAAC,OAAO,CAAC,EAAE;IACpD,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B,mBAAmB,CAAC,EAAE,MAAM,MAAM,CAAC;CACtC,GAAG,MAAM,CAWT;AA0BD,wBAAsB,+BAA+B,CACjD,QAAQ,EAAE,MAAM,EAChB,QAAQ,EAAE,MAAM,EAChB,OAAO,CAAC,EAAE;IACN,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,QAAQ,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC;CAC9B,GACF,OAAO,CAAC,IAAI,CAAC,CA2Cf;AAED,wBAAsB,qBAAqB,CAAC,OAAO,EAAE;IACjD,QAAQ,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,MAAM,CAAC;IACd,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,UAAU,CAAC,EAAE,MAAM,CAAC;CACvB,GAAG,OAAO,CAAC;IAAE,cAAc,EAAE,MAAM,CAAA;CAAE,CAAC,CAiBtC;AAED,wBAAgB,qBAAqB,CAAC,SAAS,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,SAAS,CAK5E;AA+DD,wBAAsB,eAAe,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,aAAa,EAAE,MAAM,mBAe5F;AAED,eAAO,MAAM,gBAAgB,GAAU,UAAU,MAAM,KAAG,OAAO,CAAC,QAAQ,GAAG,SAAS,CAiBrF,CAAC"}
|