@azure/keyvault-admin 4.6.0 → 4.6.1-alpha.20241112.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/commonjs/accessControlClient.d.ts +3 -3
- package/dist/commonjs/accessControlClient.d.ts.map +1 -1
- package/dist/commonjs/accessControlClient.js.map +1 -1
- package/dist/commonjs/accessControlModels.d.ts +2 -2
- package/dist/commonjs/accessControlModels.d.ts.map +1 -1
- package/dist/commonjs/accessControlModels.js.map +1 -1
- package/dist/commonjs/backupClient.d.ts +3 -3
- package/dist/commonjs/backupClient.d.ts.map +1 -1
- package/dist/commonjs/backupClient.js.map +1 -1
- package/dist/commonjs/backupClientModels.d.ts +2 -2
- package/dist/commonjs/backupClientModels.d.ts.map +1 -1
- package/dist/commonjs/backupClientModels.js.map +1 -1
- package/dist/commonjs/constants.js +1 -1
- package/dist/commonjs/constants.js.map +1 -1
- package/dist/commonjs/generated/keyVaultClientContext.js +1 -1
- package/dist/commonjs/generated/keyVaultClientContext.js.map +1 -1
- package/dist/commonjs/lro/backup/operation.d.ts +5 -4
- package/dist/commonjs/lro/backup/operation.d.ts.map +1 -1
- package/dist/commonjs/lro/backup/operation.js.map +1 -1
- package/dist/commonjs/lro/backup/poller.d.ts +4 -3
- package/dist/commonjs/lro/backup/poller.d.ts.map +1 -1
- package/dist/commonjs/lro/backup/poller.js.map +1 -1
- package/dist/commonjs/lro/keyVaultAdminPoller.d.ts +4 -3
- package/dist/commonjs/lro/keyVaultAdminPoller.d.ts.map +1 -1
- package/dist/commonjs/lro/keyVaultAdminPoller.js.map +1 -1
- package/dist/commonjs/lro/restore/operation.d.ts +5 -4
- package/dist/commonjs/lro/restore/operation.d.ts.map +1 -1
- package/dist/commonjs/lro/restore/operation.js.map +1 -1
- package/dist/commonjs/lro/restore/poller.d.ts +4 -3
- package/dist/commonjs/lro/restore/poller.d.ts.map +1 -1
- package/dist/commonjs/lro/restore/poller.js.map +1 -1
- package/dist/commonjs/lro/selectiveKeyRestore/operation.d.ts +5 -4
- package/dist/commonjs/lro/selectiveKeyRestore/operation.d.ts.map +1 -1
- package/dist/commonjs/lro/selectiveKeyRestore/operation.js.map +1 -1
- package/dist/commonjs/lro/selectiveKeyRestore/poller.d.ts +4 -3
- package/dist/commonjs/lro/selectiveKeyRestore/poller.d.ts.map +1 -1
- package/dist/commonjs/lro/selectiveKeyRestore/poller.js.map +1 -1
- package/dist/commonjs/mappings.d.ts +2 -2
- package/dist/commonjs/mappings.d.ts.map +1 -1
- package/dist/commonjs/mappings.js.map +1 -1
- package/dist/commonjs/settingsClient.d.ts +2 -2
- package/dist/commonjs/settingsClient.d.ts.map +1 -1
- package/dist/commonjs/settingsClient.js.map +1 -1
- package/dist/commonjs/settingsClientModels.d.ts +1 -1
- package/dist/commonjs/settingsClientModels.d.ts.map +1 -1
- package/dist/commonjs/settingsClientModels.js.map +1 -1
- package/dist/commonjs/tsdoc-metadata.json +1 -1
- package/dist/esm/accessControlClient.d.ts +3 -3
- package/dist/esm/accessControlClient.d.ts.map +1 -1
- package/dist/esm/accessControlClient.js.map +1 -1
- package/dist/esm/accessControlModels.d.ts +2 -2
- package/dist/esm/accessControlModels.d.ts.map +1 -1
- package/dist/esm/accessControlModels.js.map +1 -1
- package/dist/esm/backupClient.d.ts +3 -3
- package/dist/esm/backupClient.d.ts.map +1 -1
- package/dist/esm/backupClient.js.map +1 -1
- package/dist/esm/backupClientModels.d.ts +2 -2
- package/dist/esm/backupClientModels.d.ts.map +1 -1
- package/dist/esm/backupClientModels.js.map +1 -1
- package/dist/esm/constants.js +1 -1
- package/dist/esm/constants.js.map +1 -1
- package/dist/esm/generated/keyVaultClientContext.js +1 -1
- package/dist/esm/generated/keyVaultClientContext.js.map +1 -1
- package/dist/esm/lro/backup/operation.d.ts +5 -4
- package/dist/esm/lro/backup/operation.d.ts.map +1 -1
- package/dist/esm/lro/backup/operation.js +1 -1
- package/dist/esm/lro/backup/operation.js.map +1 -1
- package/dist/esm/lro/backup/poller.d.ts +4 -3
- package/dist/esm/lro/backup/poller.d.ts.map +1 -1
- package/dist/esm/lro/backup/poller.js +1 -1
- package/dist/esm/lro/backup/poller.js.map +1 -1
- package/dist/esm/lro/keyVaultAdminPoller.d.ts +4 -3
- package/dist/esm/lro/keyVaultAdminPoller.d.ts.map +1 -1
- package/dist/esm/lro/keyVaultAdminPoller.js.map +1 -1
- package/dist/esm/lro/restore/operation.d.ts +5 -4
- package/dist/esm/lro/restore/operation.d.ts.map +1 -1
- package/dist/esm/lro/restore/operation.js +1 -1
- package/dist/esm/lro/restore/operation.js.map +1 -1
- package/dist/esm/lro/restore/poller.d.ts +4 -3
- package/dist/esm/lro/restore/poller.d.ts.map +1 -1
- package/dist/esm/lro/restore/poller.js +1 -1
- package/dist/esm/lro/restore/poller.js.map +1 -1
- package/dist/esm/lro/selectiveKeyRestore/operation.d.ts +5 -4
- package/dist/esm/lro/selectiveKeyRestore/operation.d.ts.map +1 -1
- package/dist/esm/lro/selectiveKeyRestore/operation.js +1 -1
- package/dist/esm/lro/selectiveKeyRestore/operation.js.map +1 -1
- package/dist/esm/lro/selectiveKeyRestore/poller.d.ts +4 -3
- package/dist/esm/lro/selectiveKeyRestore/poller.d.ts.map +1 -1
- package/dist/esm/lro/selectiveKeyRestore/poller.js +1 -1
- package/dist/esm/lro/selectiveKeyRestore/poller.js.map +1 -1
- package/dist/esm/mappings.d.ts +2 -2
- package/dist/esm/mappings.d.ts.map +1 -1
- package/dist/esm/mappings.js.map +1 -1
- package/dist/esm/settingsClient.d.ts +2 -2
- package/dist/esm/settingsClient.d.ts.map +1 -1
- package/dist/esm/settingsClient.js.map +1 -1
- package/dist/esm/settingsClientModels.d.ts +1 -1
- package/dist/esm/settingsClientModels.d.ts.map +1 -1
- package/dist/esm/settingsClientModels.js.map +1 -1
- package/dist/keyvault-admin.d.ts +6 -6
- package/package.json +7 -11
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"poller.js","sourceRoot":"","sources":["../../../../src/lro/selectiveKeyRestore/poller.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;
|
|
1
|
+
{"version":3,"file":"poller.js","sourceRoot":"","sources":["../../../../src/lro/selectiveKeyRestore/poller.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AAGlC,OAAO,EAAE,mBAAmB,EAAE,MAAM,2BAA2B,CAAC;AAKhE,OAAO,EAAE,wCAAwC,EAAE,MAAM,gBAAgB,CAAC;AAU1E;;GAEG;AACH,MAAM,OAAO,iCAAkC,SAAQ,mBAGtD;IACC,YAAY,OAAiD;QAC3D,MAAM,EACJ,MAAM,EACN,QAAQ,EACR,OAAO,EACP,SAAS,EACT,QAAQ,EACR,UAAU,EACV,cAAc,EACd,YAAY,GAAG,IAAI,EACnB,UAAU,GACX,GAAG,OAAO,CAAC;QAEZ,IAAI,KAAgE,CAAC;QAErE,IAAI,UAAU,EAAE,CAAC;YACf,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,KAAK,CAAC;QACvC,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,wCAAwC,iCAEvD,KAAK,KACR,OAAO,EACP,SAAS,EAAE,SAAS,EACpB,QAAQ;YACR,UAAU,KAEZ,QAAQ,EACR,MAAM,EACN,cAAc,CACf,CAAC;QAEF,KAAK,CAAC,SAAS,CAAC,CAAC;QAEjB,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;IACnC,CAAC;CACF","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type { KeyVaultAdminPollerOptions } from \"../keyVaultAdminPoller.js\";\nimport { KeyVaultAdminPoller } from \"../keyVaultAdminPoller.js\";\nimport type {\n KeyVaultSelectiveKeyRestoreOperationState,\n KeyVaultSelectiveKeyRestorePollOperationState,\n} from \"./operation.js\";\nimport { KeyVaultSelectiveKeyRestorePollOperation } from \"./operation.js\";\nimport type { KeyVaultSelectiveKeyRestoreResult } from \"../../backupClientModels.js\";\n\nexport interface KeyVaultSelectiveKeyRestorePollerOptions extends KeyVaultAdminPollerOptions {\n keyName: string;\n folderUri: string;\n sasToken?: string;\n folderName: string;\n}\n\n/**\n * Class that creates a poller that waits until a key of a Key Vault backup ends up being restored.\n */\nexport class KeyVaultSelectiveKeyRestorePoller extends KeyVaultAdminPoller<\n KeyVaultSelectiveKeyRestoreOperationState,\n KeyVaultSelectiveKeyRestoreResult\n> {\n constructor(options: KeyVaultSelectiveKeyRestorePollerOptions) {\n const {\n client,\n vaultUrl,\n keyName,\n folderUri,\n sasToken,\n folderName,\n requestOptions,\n intervalInMs = 2000,\n resumeFrom,\n } = options;\n\n let state: KeyVaultSelectiveKeyRestorePollOperationState | undefined;\n\n if (resumeFrom) {\n state = JSON.parse(resumeFrom).state;\n }\n\n const operation = new KeyVaultSelectiveKeyRestorePollOperation(\n {\n ...state,\n keyName,\n folderUri: folderUri,\n sasToken,\n folderName,\n },\n vaultUrl,\n client,\n requestOptions,\n );\n\n super(operation);\n\n this.intervalInMs = intervalInMs;\n }\n}\n"]}
|
package/dist/esm/mappings.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
import { KeyVaultRoleAssignment, KeyVaultRoleDefinition } from "./accessControlModels.js";
|
|
2
|
-
import { RoleAssignment, RoleDefinition } from "./generated/models/index.js";
|
|
1
|
+
import type { KeyVaultRoleAssignment, KeyVaultRoleDefinition } from "./accessControlModels.js";
|
|
2
|
+
import type { RoleAssignment, RoleDefinition } from "./generated/models/index.js";
|
|
3
3
|
export declare const mappings: {
|
|
4
4
|
roleAssignment: {
|
|
5
5
|
generatedToPublic(roleAssignment: RoleAssignment): KeyVaultRoleAssignment;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"mappings.d.ts","sourceRoot":"","sources":["../../src/mappings.ts"],"names":[],"mappings":"AAGA,OAAO,
|
|
1
|
+
{"version":3,"file":"mappings.d.ts","sourceRoot":"","sources":["../../src/mappings.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EACV,sBAAsB,EACtB,sBAAsB,EAEvB,MAAM,0BAA0B,CAAC;AAClC,OAAO,KAAK,EAAE,cAAc,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAElF,eAAO,MAAM,QAAQ;;0CAEiB,cAAc,GAAG,sBAAsB;;;0CAgBvC,cAAc,GAAG,sBAAsB;;8BAejD,MAAM,GAAG;QAAE,UAAU,EAAE,MAAM,CAAC;QAAC,SAAS,EAAE,MAAM,CAAA;KAAE;CAc7E,CAAC"}
|
package/dist/esm/mappings.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"mappings.js","sourceRoot":"","sources":["../../src/mappings.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AASlC,MAAM,CAAC,MAAM,QAAQ,GAAG;IACtB,cAAc,EAAE;QACd,iBAAiB,CAAC,cAA8B;YAC9C,MAAM,EAAE,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,UAAU,EAAE,GAAG,cAAc,CAAC;YACtD,MAAM,EAAE,KAAK,EAAE,gBAAgB,EAAE,WAAW,EAAE,GAAG,UAAU,IAAI,EAAE,CAAC;YAClE,OAAO;gBACL,EAAE,EAAE,EAAG;gBACP,IAAI,EAAE,IAAK;gBACX,IAAI,EAAE,IAAK;gBACX,UAAU,EAAE;oBACV,KAAK,EAAE,KAA0B;oBACjC,gBAAgB,EAAE,gBAAiB;oBACnC,WAAW,EAAE,WAAY;iBAC1B;aACF,CAAC;QACJ,CAAC;KACF;IACD,cAAc,EAAE;QACd,iBAAiB,CAAC,cAA8B;YAC9C,MAAM,EAAE,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,QAAQ,EAAE,WAAW,EAAE,QAAQ,EAAE,WAAW,EAAE,gBAAgB,EAAE,GACtF,cAAc,CAAC;YACjB,OAAO;gBACL,EAAE,EAAE,EAAG;gBACP,IAAI,EAAE,IAAK;gBACX,IAAI,EAAE,IAAK;gBACX,QAAQ,EAAE,QAAS;gBACnB,WAAW,EAAE,WAAY;gBACzB,QAAQ,EAAE,QAAS;gBACnB,WAAW,EAAE,WAAY;gBACzB,gBAAgB,EAAE,gBAAiB;aACpC,CAAC;QACJ,CAAC;KACF;IACD,cAAc,CAAC,SAAiB;QAC9B,MAAM,QAAQ,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACtC,MAAM,UAAU,GAAG,QAAQ,CAAC,GAAG,EAAE,CAAC;QAClC,MAAM,UAAU,GAAG,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAEtC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QACzE,CAAC;QAED,OAAO;YACL,UAAU;YACV,SAAS,EAAE,UAAU;SACtB,CAAC;IACJ,CAAC;CACF,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport {\n KeyVaultRoleAssignment,\n KeyVaultRoleDefinition,\n KeyVaultRoleScope,\n} from \"./accessControlModels.js\";\nimport { RoleAssignment, RoleDefinition } from \"./generated/models/index.js\";\n\nexport const mappings = {\n roleAssignment: {\n generatedToPublic(roleAssignment: RoleAssignment): KeyVaultRoleAssignment {\n const { id, name, type, properties } = roleAssignment;\n const { scope, roleDefinitionId, principalId } = properties || {};\n return {\n id: id!,\n name: name!,\n kind: type!,\n properties: {\n scope: scope as KeyVaultRoleScope,\n roleDefinitionId: roleDefinitionId!,\n principalId: principalId!,\n },\n };\n },\n },\n roleDefinition: {\n generatedToPublic(roleDefinition: RoleDefinition): KeyVaultRoleDefinition {\n const { id, name, type, roleName, description, roleType, permissions, assignableScopes } =\n roleDefinition;\n return {\n id: id!,\n name: name!,\n kind: type!,\n roleName: roleName!,\n description: description!,\n roleType: roleType!,\n permissions: permissions!,\n assignableScopes: assignableScopes!,\n };\n },\n },\n folderUriParts(folderUri: string): { folderName: string; folderUri: string } {\n const uriParts = folderUri.split(\"/\");\n const folderName = uriParts.pop();\n const storageUri = uriParts.join(\"/\");\n\n if (!folderName) {\n throw new Error(\"The provided folder URI is missing the folder name.\");\n }\n\n return {\n folderName,\n folderUri: storageUri,\n };\n },\n};\n"]}
|
|
1
|
+
{"version":3,"file":"mappings.js","sourceRoot":"","sources":["../../src/mappings.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AASlC,MAAM,CAAC,MAAM,QAAQ,GAAG;IACtB,cAAc,EAAE;QACd,iBAAiB,CAAC,cAA8B;YAC9C,MAAM,EAAE,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,UAAU,EAAE,GAAG,cAAc,CAAC;YACtD,MAAM,EAAE,KAAK,EAAE,gBAAgB,EAAE,WAAW,EAAE,GAAG,UAAU,IAAI,EAAE,CAAC;YAClE,OAAO;gBACL,EAAE,EAAE,EAAG;gBACP,IAAI,EAAE,IAAK;gBACX,IAAI,EAAE,IAAK;gBACX,UAAU,EAAE;oBACV,KAAK,EAAE,KAA0B;oBACjC,gBAAgB,EAAE,gBAAiB;oBACnC,WAAW,EAAE,WAAY;iBAC1B;aACF,CAAC;QACJ,CAAC;KACF;IACD,cAAc,EAAE;QACd,iBAAiB,CAAC,cAA8B;YAC9C,MAAM,EAAE,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,QAAQ,EAAE,WAAW,EAAE,QAAQ,EAAE,WAAW,EAAE,gBAAgB,EAAE,GACtF,cAAc,CAAC;YACjB,OAAO;gBACL,EAAE,EAAE,EAAG;gBACP,IAAI,EAAE,IAAK;gBACX,IAAI,EAAE,IAAK;gBACX,QAAQ,EAAE,QAAS;gBACnB,WAAW,EAAE,WAAY;gBACzB,QAAQ,EAAE,QAAS;gBACnB,WAAW,EAAE,WAAY;gBACzB,gBAAgB,EAAE,gBAAiB;aACpC,CAAC;QACJ,CAAC;KACF;IACD,cAAc,CAAC,SAAiB;QAC9B,MAAM,QAAQ,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACtC,MAAM,UAAU,GAAG,QAAQ,CAAC,GAAG,EAAE,CAAC;QAClC,MAAM,UAAU,GAAG,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAEtC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QACzE,CAAC;QAED,OAAO;YACL,UAAU;YACV,SAAS,EAAE,UAAU;SACtB,CAAC;IACJ,CAAC;CACF,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type {\n KeyVaultRoleAssignment,\n KeyVaultRoleDefinition,\n KeyVaultRoleScope,\n} from \"./accessControlModels.js\";\nimport type { RoleAssignment, RoleDefinition } from \"./generated/models/index.js\";\n\nexport const mappings = {\n roleAssignment: {\n generatedToPublic(roleAssignment: RoleAssignment): KeyVaultRoleAssignment {\n const { id, name, type, properties } = roleAssignment;\n const { scope, roleDefinitionId, principalId } = properties || {};\n return {\n id: id!,\n name: name!,\n kind: type!,\n properties: {\n scope: scope as KeyVaultRoleScope,\n roleDefinitionId: roleDefinitionId!,\n principalId: principalId!,\n },\n };\n },\n },\n roleDefinition: {\n generatedToPublic(roleDefinition: RoleDefinition): KeyVaultRoleDefinition {\n const { id, name, type, roleName, description, roleType, permissions, assignableScopes } =\n roleDefinition;\n return {\n id: id!,\n name: name!,\n kind: type!,\n roleName: roleName!,\n description: description!,\n roleType: roleType!,\n permissions: permissions!,\n assignableScopes: assignableScopes!,\n };\n },\n },\n folderUriParts(folderUri: string): { folderName: string; folderUri: string } {\n const uriParts = folderUri.split(\"/\");\n const folderName = uriParts.pop();\n const storageUri = uriParts.join(\"/\");\n\n if (!folderName) {\n throw new Error(\"The provided folder URI is missing the folder name.\");\n }\n\n return {\n folderName,\n folderUri: storageUri,\n };\n },\n};\n"]}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
import { TokenCredential } from "@azure/core-auth";
|
|
2
|
-
import { UpdateSettingOptions, GetSettingOptions, ListSettingsOptions, ListSettingsResponse, KeyVaultSetting, SettingsClientOptions, BooleanKeyVaultSetting } from "./settingsClientModels.js";
|
|
1
|
+
import type { TokenCredential } from "@azure/core-auth";
|
|
2
|
+
import type { UpdateSettingOptions, GetSettingOptions, ListSettingsOptions, ListSettingsResponse, KeyVaultSetting, SettingsClientOptions, BooleanKeyVaultSetting } from "./settingsClientModels.js";
|
|
3
3
|
/**
|
|
4
4
|
* Determines whether a given {@link KeyVaultSetting} is a {@link BooleanKeyVaultSetting}, i.e. has a boolean value.
|
|
5
5
|
*/
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"settingsClient.d.ts","sourceRoot":"","sources":["../../src/settingsClient.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;
|
|
1
|
+
{"version":3,"file":"settingsClient.d.ts","sourceRoot":"","sources":["../../src/settingsClient.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AAMxD,OAAO,KAAK,EACV,oBAAoB,EACpB,iBAAiB,EACjB,mBAAmB,EACnB,oBAAoB,EACpB,eAAe,EACf,qBAAqB,EACrB,sBAAsB,EACvB,MAAM,2BAA2B,CAAC;AAkBnC;;GAEG;AACH,wBAAgB,gBAAgB,CAAC,OAAO,EAAE,eAAe,GAAG,OAAO,IAAI,sBAAsB,CAE5F;AAED;;;GAGG;AACH,qBAAa,sBAAsB;IACjC;;OAEG;IACH,SAAgB,QAAQ,EAAE,MAAM,CAAC;IAEjC;;OAEG;IACH,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAiB;IAExC;;;;;;;;;;;;;;;;;OAiBG;gBAES,QAAQ,EAAE,MAAM,EAAE,UAAU,EAAE,eAAe,EAAE,OAAO,GAAE,qBAA0B;IA0B9F;;;;;OAKG;IACG,aAAa,CACjB,OAAO,EAAE,eAAe,EACxB,OAAO,GAAE,oBAAyB,GACjC,OAAO,CAAC,eAAe,CAAC;IAM3B;;;;;OAKG;IACG,UAAU,CAAC,WAAW,EAAE,MAAM,EAAE,OAAO,GAAE,iBAAsB,GAAG,OAAO,CAAC,eAAe,CAAC;IAIhG;;;;OAIG;IAEG,WAAW,CAAC,OAAO,GAAE,mBAAwB,GAAG,OAAO,CAAC,oBAAoB,CAAC;CAIpF"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"settingsClient.js","sourceRoot":"","sources":["../../src/settingsClient.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AAGlC,OAAO,EAAE,4BAA4B,EAAE,MAAM,wBAAwB,CAAC;AACtE,OAAO,EAAE,kBAAkB,EAAE,MAAM,gBAAgB,CAAC;
|
|
1
|
+
{"version":3,"file":"settingsClient.js","sourceRoot":"","sources":["../../src/settingsClient.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AAGlC,OAAO,EAAE,4BAA4B,EAAE,MAAM,wBAAwB,CAAC;AACtE,OAAO,EAAE,kBAAkB,EAAE,MAAM,gBAAgB,CAAC;AAEpD,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,MAAM,EAAE,MAAM,UAAU,CAAC;AAWlC,SAAS,WAAW,CAAC,gBAAkC;IACrD,IAAI,gBAAgB,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QACxC,OAAO;YACL,IAAI,EAAE,SAAS;YACf,IAAI,EAAE,gBAAgB,CAAC,IAAI;YAC3B,KAAK,EAAE,gBAAgB,CAAC,KAAK,KAAK,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK;SACxD,CAAC;IACJ,CAAC;SAAM,CAAC;QACN,OAAO;YACL,IAAI,EAAE,gBAAgB,CAAC,IAAI;YAC3B,IAAI,EAAE,gBAAgB,CAAC,IAAI;YAC3B,KAAK,EAAE,gBAAgB,CAAC,KAAK;SAC9B,CAAC;IACJ,CAAC;AACH,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,gBAAgB,CAAC,OAAwB;IACvD,OAAO,OAAO,CAAC,IAAI,KAAK,SAAS,IAAI,OAAO,OAAO,CAAC,KAAK,KAAK,SAAS,CAAC;AAC1E,CAAC;AAED;;;GAGG;AACH,MAAM,OAAO,sBAAsB;IAWjC;;;;;;;;;;;;;;;;;OAiBG;IACH,8DAA8D;IAC9D,YAAY,QAAgB,EAAE,UAA2B,EAAE,UAAiC,EAAE;QAC5F,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;QAEzB,MAAM,UAAU,GAAG,OAAO,CAAC,cAAc,IAAI,kBAAkB,CAAC;QAEhE,MAAM,aAAa,mCACd,OAAO,KACV,cAAc,EAAE;gBACd,MAAM,EAAE,MAAM,CAAC,IAAI;gBACnB,4BAA4B,EAAE;oBAC5B,sBAAsB;oBACtB,4BAA4B;oBAC5B,+BAA+B;iBAChC;aACF,GACF,CAAC;QAEF,IAAI,CAAC,MAAM,GAAG,IAAI,cAAc,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;QAE5D,wGAAwG;QACxG,2EAA2E;QAC3E,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,CAAC,4BAA4B,CAAC,UAAU,EAAE,aAAa,CAAC,EAAE;YACtF,aAAa,EAAE,CAAC,uBAAuB,CAAC;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,aAAa,CACjB,OAAwB,EACxB,UAAgC,EAAE;QAElC,OAAO,WAAW,CAChB,MAAM,IAAI,CAAC,MAAM,CAAC,aAAa,CAAC,IAAI,CAAC,QAAQ,EAAE,OAAO,CAAC,IAAI,EAAE,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,EAAE,OAAO,CAAC,CAC7F,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,UAAU,CAAC,WAAmB,EAAE,UAA6B,EAAE;QACnE,OAAO,WAAW,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC,CAAC;IACxF,CAAC;IAED;;;;OAIG;IACH,8DAA8D;IAC9D,KAAK,CAAC,WAAW,CAAC,UAA+B,EAAE;;QACjD,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;QAC3E,OAAO,EAAE,QAAQ,EAAE,MAAA,QAAQ,aAAR,QAAQ,uBAAR,QAAQ,CAAE,GAAG,CAAC,WAAW,CAAC,mCAAI,EAAE,EAAE,CAAC;IACxD,CAAC;CACF","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type { TokenCredential } from \"@azure/core-auth\";\nimport { keyVaultAuthenticationPolicy } from \"@azure/keyvault-common\";\nimport { LATEST_API_VERSION } from \"./constants.js\";\nimport type { Setting as GeneratedSetting } from \"./generated/index.js\";\nimport { KeyVaultClient } from \"./generated/index.js\";\nimport { logger } from \"./log.js\";\nimport type {\n UpdateSettingOptions,\n GetSettingOptions,\n ListSettingsOptions,\n ListSettingsResponse,\n KeyVaultSetting,\n SettingsClientOptions,\n BooleanKeyVaultSetting,\n} from \"./settingsClientModels.js\";\n\nfunction makeSetting(generatedSetting: GeneratedSetting): KeyVaultSetting {\n if (generatedSetting.type === \"boolean\") {\n return {\n kind: \"boolean\",\n name: generatedSetting.name,\n value: generatedSetting.value === \"true\" ? true : false,\n };\n } else {\n return {\n kind: generatedSetting.type,\n name: generatedSetting.name,\n value: generatedSetting.value,\n };\n }\n}\n\n/**\n * Determines whether a given {@link KeyVaultSetting} is a {@link BooleanKeyVaultSetting}, i.e. has a boolean value.\n */\nexport function isBooleanSetting(setting: KeyVaultSetting): setting is BooleanKeyVaultSetting {\n return setting.kind === \"boolean\" && typeof setting.value === \"boolean\";\n}\n\n/**\n * The KeyVaultSettingsClient provides asynchronous methods to create, update, get and list\n * settings for the Azure Key Vault.\n */\nexport class KeyVaultSettingsClient {\n /**\n * The base URL to the vault.\n */\n public readonly vaultUrl: string;\n\n /**\n * A reference to the auto-generated Key Vault HTTP client.\n */\n private readonly client: KeyVaultClient;\n\n /**\n * Creates an instance of the KeyVaultSettingsClient.\n *\n * Example usage:\n * ```ts\n * import { KeyVaultSettingsClient } from \"@azure/keyvault-admin\";\n * import { DefaultAzureCredential } from \"@azure/identity\";\n *\n * let vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * let credentials = new DefaultAzureCredential();\n *\n * let client = new KeyVaultSettingsClient(vaultUrl, credentials);\n * ```\n * @param vaultUrl - the URL of the Key Vault. It should have this shape: `https://${your-key-vault-name}.vault.azure.net`. You should validate that this URL references a valid Key Vault or Managed HSM resource. See https://aka.ms/azsdk/blog/vault-uri for details.\n * @param credential - An object that implements the `TokenCredential` interface used to authenticate requests to the service. Use the \\@azure/identity package to create a credential that suits your needs.\n * @param options - options used to configure Key Vault API requests.\n\n */\n // eslint-disable-next-line @azure/azure-sdk/ts-naming-options\n constructor(vaultUrl: string, credential: TokenCredential, options: SettingsClientOptions = {}) {\n this.vaultUrl = vaultUrl;\n\n const apiVersion = options.serviceVersion || LATEST_API_VERSION;\n\n const clientOptions = {\n ...options,\n loggingOptions: {\n logger: logger.info,\n additionalAllowedHeaderNames: [\n \"x-ms-keyvault-region\",\n \"x-ms-keyvault-network-info\",\n \"x-ms-keyvault-service-version\",\n ],\n },\n };\n\n this.client = new KeyVaultClient(apiVersion, clientOptions);\n\n // The authentication policy must come after the deserialization policy since the deserialization policy\n // converts 401 responses to an Error, and we don't want to deal with that.\n this.client.pipeline.addPolicy(keyVaultAuthenticationPolicy(credential, clientOptions), {\n afterPolicies: [\"deserializationPolicy\"],\n });\n }\n\n /**\n * Updates the named account setting.\n *\n * @param setting - the setting to update. The name of the setting must be a valid settings option.\n * @param options - the optional parameters.\n */\n async updateSetting(\n setting: KeyVaultSetting,\n options: UpdateSettingOptions = {},\n ): Promise<KeyVaultSetting> {\n return makeSetting(\n await this.client.updateSetting(this.vaultUrl, setting.name, String(setting.value), options),\n );\n }\n\n /**\n * Get the value of a specific account setting.\n *\n * @param settingName - the name of the setting.\n * @param options - the optional parameters.\n */\n async getSetting(settingName: string, options: GetSettingOptions = {}): Promise<KeyVaultSetting> {\n return makeSetting(await this.client.getSetting(this.vaultUrl, settingName, options));\n }\n\n /**\n * List the account's settings.\n *\n * @param options - the optional parameters.\n */\n // eslint-disable-next-line @azure/azure-sdk/ts-naming-options\n async getSettings(options: ListSettingsOptions = {}): Promise<ListSettingsResponse> {\n const { settings } = await this.client.getSettings(this.vaultUrl, options);\n return { settings: settings?.map(makeSetting) ?? [] };\n }\n}\n"]}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import type { CommonClientOptions, OperationOptions } from "@azure/core-client";
|
|
2
|
-
import { SUPPORTED_API_VERSIONS } from "./constants.js";
|
|
2
|
+
import type { SUPPORTED_API_VERSIONS } from "./constants.js";
|
|
3
3
|
/**
|
|
4
4
|
* The optional parameters accepted by the KeyVaultSettingsClient.
|
|
5
5
|
*/
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"settingsClientModels.d.ts","sourceRoot":"","sources":["../../src/settingsClientModels.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,mBAAmB,EAAE,gBAAgB,EAAE,MAAM,oBAAoB,CAAC;AAChF,OAAO,EAAE,sBAAsB,EAAE,MAAM,gBAAgB,CAAC;
|
|
1
|
+
{"version":3,"file":"settingsClientModels.d.ts","sourceRoot":"","sources":["../../src/settingsClientModels.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,mBAAmB,EAAE,gBAAgB,EAAE,MAAM,oBAAoB,CAAC;AAChF,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,gBAAgB,CAAC;AAE7D;;GAEG;AACH,MAAM,WAAW,qBAAsB,SAAQ,mBAAmB;IAChE;;OAEG;IACH,cAAc,CAAC,EAAE,sBAAsB,CAAC;IAExC;;;OAGG;IACH,oCAAoC,CAAC,EAAE,OAAO,CAAC;CAChD;AAED;;GAEG;AACH,MAAM,WAAW,oBAAqB,SAAQ,gBAAgB;CAAG;AAEjE;;GAEG;AACH,MAAM,WAAW,iBAAkB,SAAQ,gBAAgB;CAAG;AAE9D;;GAEG;AACH,MAAM,WAAW,mBAAoB,SAAQ,gBAAgB;CAAG;AAEhE;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B;;OAEG;IACH,IAAI,CAAC,EAAE,MAAM,CAAC;IAEd;;OAEG;IACH,IAAI,EAAE,MAAM,CAAC;IAEb;;OAEG;IACH,KAAK,EAAE,OAAO,CAAC;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,sBAAuB,SAAQ,eAAe;IAC7D;;OAEG;IACH,IAAI,EAAE,SAAS,CAAC;IAEhB;;OAEG;IACH,KAAK,EAAE,OAAO,CAAC;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,oBAAoB;IACnC;;OAEG;IACH,QAAQ,EAAE,eAAe,EAAE,CAAC;CAC7B"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"settingsClientModels.js","sourceRoot":"","sources":["../../src/settingsClientModels.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type { CommonClientOptions, OperationOptions } from \"@azure/core-client\";\nimport { SUPPORTED_API_VERSIONS } from \"./constants.js\";\n\n/**\n * The optional parameters accepted by the KeyVaultSettingsClient.\n */\nexport interface SettingsClientOptions extends CommonClientOptions {\n /**\n * The accepted versions of the Key Vault's service API.\n */\n serviceVersion?: SUPPORTED_API_VERSIONS;\n\n /**\n * Whether to disable verification that the authentication challenge resource matches the Key Vault or Managed HSM domain.\n * Defaults to false.\n */\n disableChallengeResourceVerification?: boolean;\n}\n\n/**\n * An interface representing the optional parameters that can be passed to {@link KeyVaultSettingsClient.updateSetting}\n */\nexport interface UpdateSettingOptions extends OperationOptions {}\n\n/**\n * An interface representing the optional parameters that can be passed to {@link KeyVaultSettingsClient.getSetting}\n */\nexport interface GetSettingOptions extends OperationOptions {}\n\n/**\n * An interface representing the optional parameters that can be passed to {@link KeyVaultSettingsClient.listSettings}\n */\nexport interface ListSettingsOptions extends OperationOptions {}\n\n/**\n * A Key Vault setting.\n */\nexport interface KeyVaultSetting {\n /**\n * The kind of the setting.\n */\n kind?: string;\n\n /**\n * The name of the setting.\n */\n name: string;\n\n /**\n * The value of a setting. The type of the value depends on the value of the kind property.\n */\n value: unknown;\n}\n\n/**\n * A Key Vault setting of boolean type. To check if a given KeyVaultSetting is a boolean, use {@link isBooleanSetting}.\n */\nexport interface BooleanKeyVaultSetting extends KeyVaultSetting {\n /**\n * The kind of the setting.\n */\n kind: \"boolean\";\n\n /**\n * The value of the setting as a boolean.\n */\n value: boolean;\n}\n\n/**\n * An interface representing the response returned by {@link KeyVaultSettingsClient.listSettings}\n */\nexport interface ListSettingsResponse {\n /**\n * The account's settings.\n */\n settings: KeyVaultSetting[];\n}\n"]}
|
|
1
|
+
{"version":3,"file":"settingsClientModels.js","sourceRoot":"","sources":["../../src/settingsClientModels.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type { CommonClientOptions, OperationOptions } from \"@azure/core-client\";\nimport type { SUPPORTED_API_VERSIONS } from \"./constants.js\";\n\n/**\n * The optional parameters accepted by the KeyVaultSettingsClient.\n */\nexport interface SettingsClientOptions extends CommonClientOptions {\n /**\n * The accepted versions of the Key Vault's service API.\n */\n serviceVersion?: SUPPORTED_API_VERSIONS;\n\n /**\n * Whether to disable verification that the authentication challenge resource matches the Key Vault or Managed HSM domain.\n * Defaults to false.\n */\n disableChallengeResourceVerification?: boolean;\n}\n\n/**\n * An interface representing the optional parameters that can be passed to {@link KeyVaultSettingsClient.updateSetting}\n */\nexport interface UpdateSettingOptions extends OperationOptions {}\n\n/**\n * An interface representing the optional parameters that can be passed to {@link KeyVaultSettingsClient.getSetting}\n */\nexport interface GetSettingOptions extends OperationOptions {}\n\n/**\n * An interface representing the optional parameters that can be passed to {@link KeyVaultSettingsClient.listSettings}\n */\nexport interface ListSettingsOptions extends OperationOptions {}\n\n/**\n * A Key Vault setting.\n */\nexport interface KeyVaultSetting {\n /**\n * The kind of the setting.\n */\n kind?: string;\n\n /**\n * The name of the setting.\n */\n name: string;\n\n /**\n * The value of a setting. The type of the value depends on the value of the kind property.\n */\n value: unknown;\n}\n\n/**\n * A Key Vault setting of boolean type. To check if a given KeyVaultSetting is a boolean, use {@link isBooleanSetting}.\n */\nexport interface BooleanKeyVaultSetting extends KeyVaultSetting {\n /**\n * The kind of the setting.\n */\n kind: \"boolean\";\n\n /**\n * The value of the setting as a boolean.\n */\n value: boolean;\n}\n\n/**\n * An interface representing the response returned by {@link KeyVaultSettingsClient.listSettings}\n */\nexport interface ListSettingsResponse {\n /**\n * The account's settings.\n */\n settings: KeyVaultSetting[];\n}\n"]}
|
package/dist/keyvault-admin.d.ts
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
|
-
import { CommonClientOptions } from '@azure/core-client';
|
|
2
|
-
import { OperationOptions } from '@azure/core-client';
|
|
3
|
-
import { PagedAsyncIterableIterator } from '@azure/core-paging';
|
|
4
|
-
import { PollerLike } from '@azure/core-lro';
|
|
5
|
-
import { PollOperationState } from '@azure/core-lro';
|
|
6
|
-
import { TokenCredential } from '@azure/core-auth';
|
|
1
|
+
import type { CommonClientOptions } from '@azure/core-client';
|
|
2
|
+
import type { OperationOptions } from '@azure/core-client';
|
|
3
|
+
import type { PagedAsyncIterableIterator } from '@azure/core-paging';
|
|
4
|
+
import type { PollerLike } from '@azure/core-lro';
|
|
5
|
+
import type { PollOperationState } from '@azure/core-lro';
|
|
6
|
+
import type { TokenCredential } from '@azure/core-auth';
|
|
7
7
|
|
|
8
8
|
/**
|
|
9
9
|
* The optional parameters accepted by the Key Vault's AccessControlClient
|
package/package.json
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
"name": "@azure/keyvault-admin",
|
|
3
3
|
"sdk-type": "client",
|
|
4
4
|
"author": "Microsoft Corporation",
|
|
5
|
-
"version": "4.6.
|
|
5
|
+
"version": "4.6.1-alpha.20241112.1",
|
|
6
6
|
"license": "MIT",
|
|
7
7
|
"description": "Isomorphic client library for Azure KeyVault's administrative functions.",
|
|
8
8
|
"homepage": "https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/keyvault/keyvault-admin/README.md",
|
|
@@ -35,19 +35,18 @@
|
|
|
35
35
|
"LICENSE"
|
|
36
36
|
],
|
|
37
37
|
"scripts": {
|
|
38
|
-
"audit": "node ../../../common/scripts/rush-audit.js && rimraf node_modules package-lock.json && npm i --package-lock-only 2>&1 && npm audit",
|
|
39
38
|
"build": "npm run clean && dev-tool run build-package && dev-tool run extract-api",
|
|
40
39
|
"build:samples": "echo Obsolete.",
|
|
41
40
|
"build:test": "npm run clean && dev-tool run build-package",
|
|
42
41
|
"check-format": "dev-tool run vendored prettier --list-different --config ../../../.prettierrc.json --ignore-path ../../../.prettierignore \"src/**/*.ts\" \"test/**/*.ts\" \"samples-dev/**/*.ts\" \"*.{js,json}\"",
|
|
43
|
-
"clean": "rimraf --glob dist dist-* types *.tgz *.log statistics.html coverage && rimraf --glob src/**/*.js && rimraf --glob test/**/*.js",
|
|
42
|
+
"clean": "dev-tool run vendored rimraf --glob dist dist-* types *.tgz *.log statistics.html coverage && dev-tool run vendored rimraf --glob src/**/*.js && dev-tool run vendored rimraf --glob test/**/*.js",
|
|
44
43
|
"execute:samples": "dev-tool samples run samples-dev",
|
|
45
44
|
"extract-api": "dev-tool run build-package && dev-tool run extract-api",
|
|
46
45
|
"format": "dev-tool run vendored prettier --write --config ../../../.prettierrc.json --ignore-path ../../../.prettierignore \"src/**/*.ts\" \"test/**/*.ts\" \"samples-dev/**/*.ts\" \"*.{js,json}\"",
|
|
47
46
|
"generate:client": "autorest --typescript swagger/README.md",
|
|
48
47
|
"integration-test": "npm run integration-test:node && npm run integration-test:browser",
|
|
49
48
|
"integration-test:browser": "echo skipped",
|
|
50
|
-
"integration-test:node": "cross-env TEST_MODE=live dev-tool run test:vitest --no-test-proxy",
|
|
49
|
+
"integration-test:node": "dev-tool run vendored cross-env TEST_MODE=live dev-tool run test:vitest --no-test-proxy",
|
|
51
50
|
"lint": "eslint package.json api-extractor.json src",
|
|
52
51
|
"lint:fix": "eslint package.json src --fix --fix-type [problem,suggestion]",
|
|
53
52
|
"pack": "npm pack 2>&1",
|
|
@@ -105,21 +104,18 @@
|
|
|
105
104
|
},
|
|
106
105
|
"devDependencies": {
|
|
107
106
|
"@azure-tools/test-credential": "^2.0.0",
|
|
108
|
-
"@azure-tools/test-recorder": "
|
|
109
|
-
"@azure-tools/test-utils-vitest": "
|
|
110
|
-
"@azure/dev-tool": "
|
|
111
|
-
"@azure/eslint-plugin-azure-sdk": "
|
|
107
|
+
"@azure-tools/test-recorder": ">=4.1.0-alpha <4.1.0-alphb",
|
|
108
|
+
"@azure-tools/test-utils-vitest": ">=1.0.0-alpha <1.0.0-alphb",
|
|
109
|
+
"@azure/dev-tool": ">=1.0.0-alpha <1.0.0-alphb",
|
|
110
|
+
"@azure/eslint-plugin-azure-sdk": ">=3.0.0-alpha <3.0.0-alphb",
|
|
112
111
|
"@azure/identity": "^4.0.1",
|
|
113
112
|
"@azure/keyvault-keys": "^4.2.1",
|
|
114
|
-
"@microsoft/api-extractor": "^7.31.11",
|
|
115
113
|
"@types/node": "^18.0.0",
|
|
116
114
|
"@vitest/browser": "^2.0.5",
|
|
117
115
|
"@vitest/coverage-istanbul": "^2.0.5",
|
|
118
|
-
"cross-env": "^7.0.2",
|
|
119
116
|
"dotenv": "^16.0.0",
|
|
120
117
|
"eslint": "^9.9.0",
|
|
121
118
|
"playwright": "^1.46.0",
|
|
122
|
-
"rimraf": "^5.0.5",
|
|
123
119
|
"typescript": "~5.6.2",
|
|
124
120
|
"vitest": "^2.0.5"
|
|
125
121
|
},
|