@anvil-works/anvil-cli 0.7.0-canary.7 → 0.7.0-canary.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/cli.js CHANGED
@@ -14247,17 +14247,13 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14247
14247
  function getAuthFilePath(gitDir) {
14248
14248
  return external_path_default().join(gitDir, "anvil-auth.json");
14249
14249
  }
14250
- const KEY_ENV = "ANVIL_AUTH_FILE_ENCRYPTION_KEY";
14251
- function getEncryptionKey() {
14252
- const keyBase64 = process.env[KEY_ENV];
14253
- if (!keyBase64) return null;
14254
- const key = Buffer.from(keyBase64, "base64");
14255
- if (32 !== key.length) throw new Error(`${KEY_ENV} must be a base64-encoded 32-byte key`);
14250
+ function decodeKey(b64key) {
14251
+ const key = Buffer.from(b64key, "base64");
14252
+ if (32 !== key.length) throw new Error("Encryption key must be a base64-encoded 32-byte key");
14256
14253
  return key;
14257
14254
  }
14258
- function maybeEncrypt(plainText) {
14259
- const key = getEncryptionKey();
14260
- if (!key) return plainText;
14255
+ function encrypt(plainText, b64key) {
14256
+ const key = decodeKey(b64key);
14261
14257
  const iv = external_node_crypto_default().randomBytes(12);
14262
14258
  const cipher = external_node_crypto_default().createCipheriv("aes-256-gcm", key, iv);
14263
14259
  const ciphertext = Buffer.concat([
@@ -14273,9 +14269,8 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14273
14269
  ciphertext: ciphertext.toString("base64")
14274
14270
  }, null, 2);
14275
14271
  }
14276
- function maybeDecrypt(json) {
14277
- const key = getEncryptionKey();
14278
- if (!key) return json;
14272
+ function decrypt(json, b64key) {
14273
+ const key = decodeKey(b64key);
14279
14274
  const payload = JSON.parse(json);
14280
14275
  if (1 !== payload.version || "aes-256-gcm" !== payload.algorithm) throw new Error("Unsupported encrypted file format");
14281
14276
  const iv = Buffer.from(payload.iv, "base64");
@@ -14288,7 +14283,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14288
14283
  decipher.final()
14289
14284
  ]).toString("utf8");
14290
14285
  }
14291
- async function writeAuthToFile(repoPath, auth) {
14286
+ async function writeAuthToFile(repoPath, auth, encryptionKey) {
14292
14287
  const git = esm_default(repoPath);
14293
14288
  const gitDir = await getRepositoryGitDir(repoPath, git);
14294
14289
  const authFilePath = getAuthFilePath(gitDir);
@@ -14296,7 +14291,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14296
14291
  recursive: true
14297
14292
  });
14298
14293
  const authJson = JSON.stringify(auth, null, 2);
14299
- await external_fs_.promises.writeFile(authFilePath, maybeEncrypt(authJson), {
14294
+ await external_fs_.promises.writeFile(authFilePath, encrypt(authJson, encryptionKey), {
14300
14295
  mode: 384
14301
14296
  });
14302
14297
  await external_fs_.promises.chmod(authFilePath, 448);
@@ -14314,7 +14309,8 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14314
14309
  const authFilePath = getAuthFilePath(gitDir);
14315
14310
  if (!external_fs_default().existsSync(authFilePath)) return;
14316
14311
  const authJson = await external_fs_.promises.readFile(authFilePath, "utf8");
14317
- return JSON.parse(maybeDecrypt(authJson));
14312
+ const key = process.env["ANVIL_AUTH_FILE_ENCRYPTION_KEY"];
14313
+ if (key) return JSON.parse(decrypt(authJson, key));
14318
14314
  };
14319
14315
  function getDefaultAnvilUrl() {
14320
14316
  return resolveAnvilUrl();
@@ -14403,7 +14399,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14403
14399
  if (inMemoryAuth) inMemoryAuth.tokens = newTokens;
14404
14400
  else if (repoAuth) {
14405
14401
  repoAuth.tokens = newTokens;
14406
- await writeAuthToFile(repoContext, repoAuth);
14402
+ await writeAuthToFile(repoContext, repoAuth, process.env["ANVIL_AUTH_FILE_ENCRYPTION_KEY"]);
14407
14403
  } else {
14408
14404
  let accountUsername = username;
14409
14405
  if (!accountUsername) {
@@ -19352,7 +19348,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
19352
19348
  } catch (e) {
19353
19349
  throw new Error(`Checkout clone succeeded, but failed to configure repository credentials: ${errors_getErrorMessage(e)}. The repository exists at ${destinationDisplay}, but Git auth bridge setup is incomplete.`);
19354
19350
  }
19355
- if (options.storeAuth) await deps.writeAuthToFile(destinationPath, options.storeAuth);
19351
+ if (options.storeAuth) await deps.writeAuthToFile(destinationPath, options.storeAuth.auth, options.storeAuth.encryptionKey);
19356
19352
  return {
19357
19353
  appId: parsed.appId,
19358
19354
  appName: validation.app_name,
@@ -27,7 +27,10 @@ export interface CheckoutOptions {
27
27
  origin?: string;
28
28
  quiet?: boolean;
29
29
  verbose?: boolean;
30
- storeAuth?: AuthData;
30
+ storeAuth?: {
31
+ auth: AuthData;
32
+ encryptionKey: string;
33
+ };
31
34
  }
32
35
  export interface CheckoutResult {
33
36
  appId: string;
@@ -1 +1 @@
1
- {"version":3,"file":"checkout.d.ts","sourceRoot":"","sources":["../../src/commands/checkout.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,OAAO,EAAgB,MAAM,WAAW,CAAC;AASlD,OAAO,EAAiB,mBAAmB,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAC1F,OAAO,EAAE,QAAQ,EAAqB,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAClF,OAAO,EAAE,qBAAqB,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAE9E,OAAO,EAAE,YAAY,EAAiE,MAAM,uBAAuB,CAAC;AAGpH,OAAO,EAAE,0BAA0B,EAAE,MAAM,mBAAmB,CAAC;AAE/D,MAAM,WAAW,mBAAmB;IAChC,KAAK,EAAE,MAAM,CAAC;IACd,WAAW,CAAC,EAAE,MAAM,CAAC;CACxB;AAED;;;;GAIG;AACH,MAAM,WAAW,eAAe;IAC5B,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,SAAS,CAAC,EAAE,QAAQ,CAAC;CACxB;AAED,MAAM,WAAW,cAAc;IAC3B,KAAK,EAAE,MAAM,CAAC;IACd,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,eAAe,EAAE,MAAM,CAAC;IACxB,kBAAkB,EAAE,MAAM,CAAC;IAC3B,QAAQ,EAAE,MAAM,CAAC;IACjB,UAAU,EAAE,MAAM,CAAC;CACtB;AAED;;GAEG;AACH,MAAM,WAAW,oBAAoB;IACjC,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,OAAO,CAAC,EAAE,OAAO,CAAC;CACrB;AAED;;;GAGG;AACH,MAAM,WAAW,qBAAqB;IAClC,iBAAiB,EAAE,OAAO,iBAAiB,CAAC;IAC5C,aAAa,EAAE,OAAO,aAAa,CAAC;IACpC,mBAAmB,EAAE,OAAO,mBAAmB,CAAC;IAChD,KAAK,EAAE,CAAC,OAAO,EAAE,MAAM,EAAE,eAAe,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,oBAAoB,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACnG,qBAAqB,EAAE,OAAO,qBAAqB,CAAC;IACpD,eAAe,EAAE,OAAO,eAAe,CAAC;CAC3C;AAoBD;;;;;GAKG;AACH,wBAAgB,kBAAkB,CAAC,KAAK,EAAE,MAAM,GAAG,mBAAmB,CAmCrE;AAED,wBAAgB,qBAAqB,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,CAO1D;AAaD,wBAAgB,8BAA8B,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,MAAM,GAAG,MAAM,CAQtF;AAED,wBAAsB,kBAAkB,CAAC,WAAW,CAAC,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAiCzG;AAmBD,wBAAsB,mBAAmB,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAkB9E;AAED,wBAAsB,mBAAmB,CAAC,eAAe,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAUnF;AAED,wBAAsB,2BAA2B,CAAC,eAAe,EAAE,MAAM,EAAE,KAAK,UAAQ,GAAG,OAAO,CAAC,IAAI,CAAC,CAiBvG;AAED,wBAAsB,uBAAuB,CACzC,QAAQ,EAAE,MAAM,EAChB,QAAQ,EAAE,MAAM,GAAG,SAAS,EAC5B,IAAI,GAAE,qBAA2C,GAClD,OAAO,CAAC,MAAM,CAAC,CASjB;AAsBD;;;GAGG;AACH,wBAAsB,uBAAuB,CACzC,QAAQ,EAAE,MAAM,EAChB,gBAAgB,CAAC,EAAE,MAAM,EACzB,WAAW,GAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,EAAE,CAAqB,GACpE,OAAO,CAAC,MAAM,GAAG,SAAS,GAAG,IAAI,CAAC,CA6BpC;AAmBD,wBAAsB,eAAe,CACjC,OAAO,EAAE,eAAe,EACxB,IAAI,GAAE,qBAA2C,GAClD,OAAO,CAAC,cAAc,CAAC,CAqGzB;AAyFD,wBAAsB,yBAAyB,CAC3C,eAAe,EAAE,MAAM,EACvB,sBAAsB,CAAC,EAAE,MAAM,EAC/B,IAAI,CAAC,EAAE,YAAY,GACpB,OAAO,CAAC,IAAI,CAAC,CAEf;AAED,wBAAgB,uBAAuB,CAAC,OAAO,EAAE,OAAO,GAAG,IAAI,CA2F9D"}
1
+ {"version":3,"file":"checkout.d.ts","sourceRoot":"","sources":["../../src/commands/checkout.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,OAAO,EAAgB,MAAM,WAAW,CAAC;AASlD,OAAO,EAAiB,mBAAmB,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;AAC1F,OAAO,EAAE,QAAQ,EAAqB,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAClF,OAAO,EAAE,qBAAqB,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAE9E,OAAO,EAAE,YAAY,EAAiE,MAAM,uBAAuB,CAAC;AAGpH,OAAO,EAAE,0BAA0B,EAAE,MAAM,mBAAmB,CAAC;AAE/D,MAAM,WAAW,mBAAmB;IAChC,KAAK,EAAE,MAAM,CAAC;IACd,WAAW,CAAC,EAAE,MAAM,CAAC;CACxB;AAED;;;;GAIG;AACH,MAAM,WAAW,eAAe;IAC5B,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,SAAS,CAAC,EAAE;QACR,IAAI,EAAE,QAAQ,CAAC;QACf,aAAa,EAAE,MAAM,CAAC;KACzB,CAAC;CACL;AAED,MAAM,WAAW,cAAc;IAC3B,KAAK,EAAE,MAAM,CAAC;IACd,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,eAAe,EAAE,MAAM,CAAC;IACxB,kBAAkB,EAAE,MAAM,CAAC;IAC3B,QAAQ,EAAE,MAAM,CAAC;IACjB,UAAU,EAAE,MAAM,CAAC;CACtB;AAED;;GAEG;AACH,MAAM,WAAW,oBAAoB;IACjC,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,OAAO,CAAC,EAAE,OAAO,CAAC;CACrB;AAED;;;GAGG;AACH,MAAM,WAAW,qBAAqB;IAClC,iBAAiB,EAAE,OAAO,iBAAiB,CAAC;IAC5C,aAAa,EAAE,OAAO,aAAa,CAAC;IACpC,mBAAmB,EAAE,OAAO,mBAAmB,CAAC;IAChD,KAAK,EAAE,CAAC,OAAO,EAAE,MAAM,EAAE,eAAe,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,oBAAoB,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACnG,qBAAqB,EAAE,OAAO,qBAAqB,CAAC;IACpD,eAAe,EAAE,OAAO,eAAe,CAAC;CAC3C;AAoBD;;;;;GAKG;AACH,wBAAgB,kBAAkB,CAAC,KAAK,EAAE,MAAM,GAAG,mBAAmB,CAmCrE;AAED,wBAAgB,qBAAqB,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,CAO1D;AAaD,wBAAgB,8BAA8B,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,MAAM,GAAG,MAAM,CAQtF;AAED,wBAAsB,kBAAkB,CAAC,WAAW,CAAC,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAiCzG;AAmBD,wBAAsB,mBAAmB,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAkB9E;AAED,wBAAsB,mBAAmB,CAAC,eAAe,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAUnF;AAED,wBAAsB,2BAA2B,CAAC,eAAe,EAAE,MAAM,EAAE,KAAK,UAAQ,GAAG,OAAO,CAAC,IAAI,CAAC,CAiBvG;AAED,wBAAsB,uBAAuB,CACzC,QAAQ,EAAE,MAAM,EAChB,QAAQ,EAAE,MAAM,GAAG,SAAS,EAC5B,IAAI,GAAE,qBAA2C,GAClD,OAAO,CAAC,MAAM,CAAC,CASjB;AAsBD;;;GAGG;AACH,wBAAsB,uBAAuB,CACzC,QAAQ,EAAE,MAAM,EAChB,gBAAgB,CAAC,EAAE,MAAM,EACzB,WAAW,GAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,EAAE,CAAqB,GACpE,OAAO,CAAC,MAAM,GAAG,SAAS,GAAG,IAAI,CAAC,CA6BpC;AAmBD,wBAAsB,eAAe,CACjC,OAAO,EAAE,eAAe,EACxB,IAAI,GAAE,qBAA2C,GAClD,OAAO,CAAC,cAAc,CAAC,CAqGzB;AAyFD,wBAAsB,yBAAyB,CAC3C,eAAe,EAAE,MAAM,EACvB,sBAAsB,CAAC,EAAE,MAAM,EAC/B,IAAI,CAAC,EAAE,YAAY,GACpB,OAAO,CAAC,IAAI,CAAC,CAEf;AAED,wBAAgB,uBAAuB,CAAC,OAAO,EAAE,OAAO,GAAG,IAAI,CA2F9D"}
package/dist/index.js CHANGED
@@ -14218,17 +14218,13 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14218
14218
  function getAuthFilePath(gitDir) {
14219
14219
  return external_path_default().join(gitDir, "anvil-auth.json");
14220
14220
  }
14221
- const KEY_ENV = "ANVIL_AUTH_FILE_ENCRYPTION_KEY";
14222
- function getEncryptionKey() {
14223
- const keyBase64 = process.env[KEY_ENV];
14224
- if (!keyBase64) return null;
14225
- const key = Buffer.from(keyBase64, "base64");
14226
- if (32 !== key.length) throw new Error(`${KEY_ENV} must be a base64-encoded 32-byte key`);
14221
+ function decodeKey(b64key) {
14222
+ const key = Buffer.from(b64key, "base64");
14223
+ if (32 !== key.length) throw new Error("Encryption key must be a base64-encoded 32-byte key");
14227
14224
  return key;
14228
14225
  }
14229
- function maybeEncrypt(plainText) {
14230
- const key = getEncryptionKey();
14231
- if (!key) return plainText;
14226
+ function encrypt(plainText, b64key) {
14227
+ const key = decodeKey(b64key);
14232
14228
  const iv = external_node_crypto_default().randomBytes(12);
14233
14229
  const cipher = external_node_crypto_default().createCipheriv("aes-256-gcm", key, iv);
14234
14230
  const ciphertext = Buffer.concat([
@@ -14244,9 +14240,8 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14244
14240
  ciphertext: ciphertext.toString("base64")
14245
14241
  }, null, 2);
14246
14242
  }
14247
- function maybeDecrypt(json) {
14248
- const key = getEncryptionKey();
14249
- if (!key) return json;
14243
+ function decrypt(json, b64key) {
14244
+ const key = decodeKey(b64key);
14250
14245
  const payload = JSON.parse(json);
14251
14246
  if (1 !== payload.version || "aes-256-gcm" !== payload.algorithm) throw new Error("Unsupported encrypted file format");
14252
14247
  const iv = Buffer.from(payload.iv, "base64");
@@ -14259,7 +14254,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14259
14254
  decipher.final()
14260
14255
  ]).toString("utf8");
14261
14256
  }
14262
- async function writeAuthToFile(repoPath, auth) {
14257
+ async function writeAuthToFile(repoPath, auth, encryptionKey) {
14263
14258
  const git = esm_default(repoPath);
14264
14259
  const gitDir = await getRepositoryGitDir(repoPath, git);
14265
14260
  const authFilePath = getAuthFilePath(gitDir);
@@ -14267,7 +14262,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14267
14262
  recursive: true
14268
14263
  });
14269
14264
  const authJson = JSON.stringify(auth, null, 2);
14270
- await external_fs_.promises.writeFile(authFilePath, maybeEncrypt(authJson), {
14265
+ await external_fs_.promises.writeFile(authFilePath, encrypt(authJson, encryptionKey), {
14271
14266
  mode: 384
14272
14267
  });
14273
14268
  await external_fs_.promises.chmod(authFilePath, 448);
@@ -14285,7 +14280,8 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14285
14280
  const authFilePath = getAuthFilePath(gitDir);
14286
14281
  if (!external_fs_default().existsSync(authFilePath)) return;
14287
14282
  const authJson = await external_fs_.promises.readFile(authFilePath, "utf8");
14288
- return JSON.parse(maybeDecrypt(authJson));
14283
+ const key = process.env["ANVIL_AUTH_FILE_ENCRYPTION_KEY"];
14284
+ if (key) return JSON.parse(decrypt(authJson, key));
14289
14285
  };
14290
14286
  function getDefaultAnvilUrl() {
14291
14287
  return resolveAnvilUrl();
@@ -14384,7 +14380,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
14384
14380
  if (inMemoryAuth) inMemoryAuth.tokens = newTokens;
14385
14381
  else if (repoAuth) {
14386
14382
  repoAuth.tokens = newTokens;
14387
- await writeAuthToFile(repoContext, repoAuth);
14383
+ await writeAuthToFile(repoContext, repoAuth, process.env["ANVIL_AUTH_FILE_ENCRYPTION_KEY"]);
14388
14384
  } else {
14389
14385
  let accountUsername = username;
14390
14386
  if (!accountUsername) {
@@ -18546,7 +18542,7 @@ Promise.resolve(executeGitCredentialOperation(process.argv[2] || "get", {
18546
18542
  } catch (e) {
18547
18543
  throw new Error(`Checkout clone succeeded, but failed to configure repository credentials: ${errors_getErrorMessage(e)}. The repository exists at ${destinationDisplay}, but Git auth bridge setup is incomplete.`);
18548
18544
  }
18549
- if (options.storeAuth) await deps.writeAuthToFile(destinationPath, options.storeAuth);
18545
+ if (options.storeAuth) await deps.writeAuthToFile(destinationPath, options.storeAuth.auth, options.storeAuth.encryptionKey);
18550
18546
  return {
18551
18547
  appId: parsed.appId,
18552
18548
  appName: validation.app_name,
@@ -31,6 +31,6 @@ export declare function hardenCheckoutGitAuth(options: {
31
31
  cleanRemoteUrl: string;
32
32
  }>;
33
33
  export declare function parseAppIdFromGitPath(pathValue?: string): string | undefined;
34
- export declare function writeAuthToFile(repoPath: string, auth: AuthData): Promise<string>;
34
+ export declare function writeAuthToFile(repoPath: string, auth: AuthData, encryptionKey: string): Promise<string>;
35
35
  export declare const readAuthFromRepo: (repoPath: string) => Promise<AuthData | undefined>;
36
36
  //# sourceMappingURL=git-auth.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"git-auth.d.ts","sourceRoot":"","sources":["../../src/services/git-auth.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAC,QAAQ,EAAC,MAAM,QAAQ,CAAC;AAIrC,MAAM,WAAW,cAAc;IAC3B,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,QAAQ,CAAC,EAAE,MAAM,CAAC;CACrB;AAkBD,wBAAgB,6BAA6B,CAAC,OAAO,EAAE;IACnD,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,EAAE,MAAM,CAAC;IACnB,QAAQ,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC;CAC9B,GAAG,MAAM,CAcT;AAWD,wBAAsB,iBAAiB,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,cAAc,CAAC,CAUhG;AAED,wBAAsB,iBAAiB,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,OAAO,EAAE,cAAc,GAAG,OAAO,CAAC,IAAI,CAAC,CAQ/G;AAED,wBAAgB,oBAAoB,CAAC,KAAK,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,MAAM,CAI5E;AAED,wBAAgB,yBAAyB,CAAC,UAAU,EAAE,MAAM,GAAG,MAAM,CA2BpE;AAiCD,wBAAgB,6BAA6B,CAAC,OAAO,CAAC,EAAE;IACpD,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B,mBAAmB,CAAC,EAAE,MAAM,MAAM,CAAC;CACtC,GAAG,MAAM,CAWT;AA0BD,wBAAsB,+BAA+B,CACjD,QAAQ,EAAE,MAAM,EAChB,QAAQ,EAAE,MAAM,EAChB,OAAO,CAAC,EAAE;IACN,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,QAAQ,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC;CAC9B,GACF,OAAO,CAAC,IAAI,CAAC,CA2Cf;AAED,wBAAsB,qBAAqB,CAAC,OAAO,EAAE;IACjD,QAAQ,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,MAAM,CAAC;IACd,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,UAAU,CAAC,EAAE,MAAM,CAAC;CACvB,GAAG,OAAO,CAAC;IAAE,cAAc,EAAE,MAAM,CAAA;CAAE,CAAC,CAiBtC;AAED,wBAAgB,qBAAqB,CAAC,SAAS,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,SAAS,CAK5E;AA+ED,wBAAsB,eAAe,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI,EAAE,QAAQ,mBAerE;AAED,eAAO,MAAM,gBAAgB,GAAU,UAAU,MAAM,KAAG,OAAO,CAAC,QAAQ,GAAG,SAAS,CAYrF,CAAC"}
1
+ {"version":3,"file":"git-auth.d.ts","sourceRoot":"","sources":["../../src/services/git-auth.ts"],"names":[],"mappings":"AAMA,OAAO,KAAK,EAAC,QAAQ,EAAC,MAAM,QAAQ,CAAC;AAIrC,MAAM,WAAW,cAAc;IAC3B,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,QAAQ,CAAC,EAAE,MAAM,CAAC;CACrB;AAkBD,wBAAgB,6BAA6B,CAAC,OAAO,EAAE;IACnD,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,EAAE,MAAM,CAAC;IACnB,QAAQ,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC;CAC9B,GAAG,MAAM,CAcT;AAWD,wBAAsB,iBAAiB,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,cAAc,CAAC,CAUhG;AAED,wBAAsB,iBAAiB,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,OAAO,EAAE,cAAc,GAAG,OAAO,CAAC,IAAI,CAAC,CAQ/G;AAED,wBAAgB,oBAAoB,CAAC,KAAK,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,MAAM,CAI5E;AAED,wBAAgB,yBAAyB,CAAC,UAAU,EAAE,MAAM,GAAG,MAAM,CA2BpE;AAiCD,wBAAgB,6BAA6B,CAAC,OAAO,CAAC,EAAE;IACpD,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B,mBAAmB,CAAC,EAAE,MAAM,MAAM,CAAC;CACtC,GAAG,MAAM,CAWT;AA0BD,wBAAsB,+BAA+B,CACjD,QAAQ,EAAE,MAAM,EAChB,QAAQ,EAAE,MAAM,EAChB,OAAO,CAAC,EAAE;IACN,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,QAAQ,CAAC,EAAE,MAAM,CAAC,QAAQ,CAAC;CAC9B,GACF,OAAO,CAAC,IAAI,CAAC,CA2Cf;AAED,wBAAsB,qBAAqB,CAAC,OAAO,EAAE;IACjD,QAAQ,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,MAAM,CAAC;IACd,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,UAAU,CAAC,EAAE,MAAM,CAAC;CACvB,GAAG,OAAO,CAAC;IAAE,cAAc,EAAE,MAAM,CAAA;CAAE,CAAC,CAiBtC;AAED,wBAAgB,qBAAqB,CAAC,SAAS,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,SAAS,CAK5E;AA+DD,wBAAsB,eAAe,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,aAAa,EAAE,MAAM,mBAe5F;AAED,eAAO,MAAM,gBAAgB,GAAU,UAAU,MAAM,KAAG,OAAO,CAAC,QAAQ,GAAG,SAAS,CAiBrF,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@anvil-works/anvil-cli",
3
- "version": "0.7.0-canary.7",
3
+ "version": "0.7.0-canary.8",
4
4
  "description": "CLI tool for developing Anvil apps locally",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/api.d.ts",