@flink-app/github-app-plugin 0.12.1-alpha.47 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +153 -129
- package/dist/GitHubAppPlugin.js +1 -2
- package/dist/services/WebhookValidator.d.ts +0 -2
- package/dist/utils/error-utils.js +4 -4
- package/dist/utils/jwt-utils.js +2 -3
- package/dist/utils/state-utils.js +3 -4
- package/dist/utils/webhook-signature-utils.d.ts +0 -2
- package/dist/utils/webhook-signature-utils.js +1 -2
- package/package.json +35 -40
- package/tsconfig.json +1 -1
package/CHANGELOG.md
CHANGED
|
@@ -1,5 +1,11 @@
|
|
|
1
1
|
# Changelog
|
|
2
2
|
|
|
3
|
+
## 0.13.0
|
|
4
|
+
|
|
5
|
+
### Minor Changes
|
|
6
|
+
|
|
7
|
+
- Migrate to pnpm and streamlines build process.
|
|
8
|
+
|
|
3
9
|
All notable changes to the GitHub App Plugin will be documented in this file.
|
|
4
10
|
|
|
5
11
|
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
|
|
@@ -10,137 +16,151 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
10
16
|
### Added
|
|
11
17
|
|
|
12
18
|
#### Core Features
|
|
13
|
-
|
|
14
|
-
-
|
|
15
|
-
-
|
|
16
|
-
-
|
|
17
|
-
-
|
|
18
|
-
-
|
|
19
|
-
-
|
|
20
|
-
-
|
|
21
|
-
-
|
|
22
|
-
-
|
|
19
|
+
|
|
20
|
+
- GitHub App installation flow with CSRF protection using state parameter
|
|
21
|
+
- JWT signing with RSA private key (RS256 algorithm)
|
|
22
|
+
- Automatic detection of PKCS#1 and PKCS#8 private key formats
|
|
23
|
+
- Installation access token management with automatic caching (55-minute TTL)
|
|
24
|
+
- Automatic token refresh when expired
|
|
25
|
+
- Webhook integration with HMAC-SHA256 signature validation
|
|
26
|
+
- Constant-time comparison for security-critical validations
|
|
27
|
+
- GitHub API client wrapper with automatic token injection
|
|
28
|
+
- Repository access verification
|
|
29
|
+
- Standalone plugin architecture (works without JWT Auth Plugin)
|
|
23
30
|
|
|
24
31
|
#### Database
|
|
25
|
-
|
|
26
|
-
-
|
|
27
|
-
-
|
|
28
|
-
-
|
|
29
|
-
-
|
|
32
|
+
|
|
33
|
+
- `GitHubAppSessionRepo` for CSRF session storage with TTL index (default: 10 minutes)
|
|
34
|
+
- `GitHubInstallationRepo` for installation-to-user mappings
|
|
35
|
+
- `GitHubWebhookEventRepo` for optional webhook event logging
|
|
36
|
+
- Configurable collection names for all repositories
|
|
37
|
+
- Automatic TTL index creation for session cleanup
|
|
30
38
|
|
|
31
39
|
#### API Handlers
|
|
32
|
-
|
|
33
|
-
-
|
|
34
|
-
-
|
|
35
|
-
-
|
|
36
|
-
-
|
|
40
|
+
|
|
41
|
+
- `GET /github-app/install` - Initiate GitHub App installation
|
|
42
|
+
- `GET /github-app/callback` - Handle installation callback
|
|
43
|
+
- `POST /github-app/webhook` - Receive and validate webhook events
|
|
44
|
+
- `DELETE /github-app/installation/:id` - Uninstall GitHub App
|
|
45
|
+
- Optional handler registration via `registerRoutes` config option
|
|
37
46
|
|
|
38
47
|
#### Context API
|
|
39
|
-
|
|
40
|
-
-
|
|
41
|
-
-
|
|
42
|
-
-
|
|
43
|
-
-
|
|
44
|
-
-
|
|
45
|
-
-
|
|
46
|
-
-
|
|
48
|
+
|
|
49
|
+
- `getClient(installationId)` - Get GitHub API client for installation
|
|
50
|
+
- `getInstallation(userId)` - Get first installation for user
|
|
51
|
+
- `getInstallations(userId)` - Get all installations for user
|
|
52
|
+
- `deleteInstallation(userId, installationId)` - Delete installation
|
|
53
|
+
- `hasRepositoryAccess(userId, owner, repo)` - Verify repository access
|
|
54
|
+
- `getInstallationToken(installationId)` - Get raw installation token (advanced usage)
|
|
55
|
+
- `clearTokenCache()` - Clear all cached installation tokens
|
|
56
|
+
- `options` - Read-only access to plugin configuration
|
|
47
57
|
|
|
48
58
|
#### GitHub API Client Methods
|
|
49
|
-
|
|
50
|
-
-
|
|
51
|
-
-
|
|
52
|
-
-
|
|
53
|
-
-
|
|
59
|
+
|
|
60
|
+
- `getRepositories()` - List accessible repositories
|
|
61
|
+
- `getRepository(owner, repo)` - Get repository details
|
|
62
|
+
- `getContents(owner, repo, path)` - Get file contents
|
|
63
|
+
- `createIssue(owner, repo, params)` - Create GitHub issue
|
|
64
|
+
- `request(method, endpoint, data)` - Generic API request with retry logic
|
|
54
65
|
|
|
55
66
|
#### Configuration Options
|
|
56
|
-
|
|
57
|
-
-
|
|
58
|
-
-
|
|
59
|
-
-
|
|
60
|
-
-
|
|
61
|
-
-
|
|
67
|
+
|
|
68
|
+
- Required: `appId`, `privateKey`, `webhookSecret`, `clientId`, `clientSecret`
|
|
69
|
+
- Optional: `appSlug`, `baseUrl` (default: https://api.github.com)
|
|
70
|
+
- Callbacks: `onInstallationSuccess` (required), `onInstallationError`, `onWebhookEvent`
|
|
71
|
+
- Database: `sessionsCollectionName`, `installationsCollectionName`, `webhookEventsCollectionName`
|
|
72
|
+
- Cache: `tokenCacheTTL` (default: 3300 seconds), `sessionTTL` (default: 600 seconds)
|
|
73
|
+
- Features: `registerRoutes` (default: true), `logWebhookEvents` (default: false)
|
|
62
74
|
|
|
63
75
|
#### Security Features
|
|
64
|
-
|
|
65
|
-
-
|
|
66
|
-
-
|
|
67
|
-
-
|
|
68
|
-
-
|
|
69
|
-
-
|
|
70
|
-
-
|
|
76
|
+
|
|
77
|
+
- Private key validation on plugin initialization
|
|
78
|
+
- CSRF protection with cryptographically secure state parameter (32 bytes)
|
|
79
|
+
- Webhook signature validation using HMAC-SHA256
|
|
80
|
+
- Constant-time comparison for state and signature validation
|
|
81
|
+
- Installation tokens cached in memory only (never in database)
|
|
82
|
+
- One-time use sessions (deleted after successful callback)
|
|
83
|
+
- Automatic session expiration via MongoDB TTL indexes
|
|
71
84
|
|
|
72
85
|
#### Error Handling
|
|
73
|
-
|
|
74
|
-
-
|
|
75
|
-
-
|
|
76
|
-
-
|
|
77
|
-
-
|
|
78
|
-
-
|
|
86
|
+
|
|
87
|
+
- Kebab-case error codes for frontend translation
|
|
88
|
+
- Comprehensive error codes: `invalid-state`, `session-expired`, `installation-not-found`, `invalid-private-key`, `jwt-signing-failed`, `token-exchange-failed`, `webhook-signature-invalid`, `webhook-payload-invalid`, `repository-not-accessible`, `installation-suspended`, `installation-not-owned`, `api-rate-limit`, `network-error`, `server-error`
|
|
89
|
+
- User-friendly error messages with actionable hints
|
|
90
|
+
- Detailed error logging for debugging
|
|
91
|
+
- Graceful handling of GitHub API failures
|
|
92
|
+
- Retry logic with exponential backoff for rate limits
|
|
79
93
|
|
|
80
94
|
#### Documentation
|
|
81
|
-
|
|
82
|
-
-
|
|
83
|
-
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
-
|
|
93
|
-
-
|
|
95
|
+
|
|
96
|
+
- Comprehensive README.md with step-by-step guides
|
|
97
|
+
- SECURITY.md covering all security considerations
|
|
98
|
+
- 8 complete usage examples:
|
|
99
|
+
- `basic-installation.ts` - Basic GitHub App installation with standalone auth
|
|
100
|
+
- `webhook-handling.ts` - Process webhook events (push, PR, installation)
|
|
101
|
+
- `repository-access.ts` - Access repositories via API client
|
|
102
|
+
- `create-issue.ts` - Create GitHub issue with permission check
|
|
103
|
+
- `with-jwt-auth.ts` - Optional integration with JWT Auth Plugin
|
|
104
|
+
- `organization-installation.ts` - Organization-level installation
|
|
105
|
+
- `error-handling.ts` - Comprehensive error handling
|
|
106
|
+
- `multi-event-webhook.ts` - Handle multiple webhook event types
|
|
107
|
+
- JSDoc comments on all public interfaces
|
|
108
|
+
- TypeScript type exports for all schemas and interfaces
|
|
94
109
|
|
|
95
110
|
#### Testing
|
|
96
|
-
|
|
97
|
-
-
|
|
98
|
-
-
|
|
99
|
-
-
|
|
100
|
-
-
|
|
101
|
-
-
|
|
102
|
-
-
|
|
103
|
-
-
|
|
104
|
-
-
|
|
105
|
-
-
|
|
106
|
-
-
|
|
107
|
-
-
|
|
111
|
+
|
|
112
|
+
- Project initialization tests
|
|
113
|
+
- Schema and repository tests
|
|
114
|
+
- JWT utilities tests (PKCS#1 and PKCS#8 support)
|
|
115
|
+
- Webhook signature validation tests
|
|
116
|
+
- Token cache tests
|
|
117
|
+
- Error utilities tests
|
|
118
|
+
- Authentication service tests
|
|
119
|
+
- API client tests
|
|
120
|
+
- Handler tests (installation flow, callbacks, webhooks)
|
|
121
|
+
- Plugin initialization tests
|
|
122
|
+
- Integration tests for end-to-end flows
|
|
123
|
+
- Security tests for CSRF and signature validation
|
|
108
124
|
|
|
109
125
|
### Features Highlights
|
|
110
126
|
|
|
111
127
|
#### Standalone Architecture
|
|
112
|
-
|
|
113
|
-
- Plugin
|
|
114
|
-
-
|
|
115
|
-
-
|
|
128
|
+
|
|
129
|
+
- **No dependencies on JWT Auth Plugin** - Works with any authentication system
|
|
130
|
+
- Plugin agnostic about authentication mechanism
|
|
131
|
+
- Developers can use sessions, custom tokens, or any auth system
|
|
132
|
+
- Optional integration with JWT Auth Plugin available
|
|
116
133
|
|
|
117
134
|
#### Token Management
|
|
118
|
-
|
|
119
|
-
-
|
|
120
|
-
-
|
|
121
|
-
-
|
|
135
|
+
|
|
136
|
+
- **Automatic caching** - Reduces GitHub API calls
|
|
137
|
+
- **Smart expiration** - Caches for 55 minutes (tokens expire at 60 minutes)
|
|
138
|
+
- **Automatic refresh** - Seamless token renewal
|
|
139
|
+
- **Memory-only storage** - Enhanced security
|
|
122
140
|
|
|
123
141
|
#### Webhook Security
|
|
124
|
-
|
|
125
|
-
-
|
|
126
|
-
-
|
|
142
|
+
|
|
143
|
+
- **Signature validation** - HMAC-SHA256 with constant-time comparison
|
|
144
|
+
- **Automatic validation** - No manual verification needed
|
|
145
|
+
- **Rejection of invalid webhooks** - Returns 401 for invalid signatures
|
|
127
146
|
|
|
128
147
|
#### Developer Experience
|
|
129
|
-
|
|
130
|
-
-
|
|
131
|
-
-
|
|
132
|
-
-
|
|
133
|
-
-
|
|
148
|
+
|
|
149
|
+
- **TypeScript-first** - Full type safety
|
|
150
|
+
- **Auto-registration** - Handlers, repos, and jobs automatically registered
|
|
151
|
+
- **Comprehensive examples** - 8 working examples covering all use cases
|
|
152
|
+
- **Clear error messages** - Actionable error codes with hints
|
|
153
|
+
- **Flexible configuration** - Sensible defaults, customizable when needed
|
|
134
154
|
|
|
135
155
|
### Known Limitations
|
|
136
156
|
|
|
137
|
-
-
|
|
138
|
-
-
|
|
139
|
-
-
|
|
140
|
-
-
|
|
141
|
-
-
|
|
142
|
-
-
|
|
143
|
-
-
|
|
157
|
+
- Single GitHub App per Flink application (multi-tenant support deferred to future)
|
|
158
|
+
- No proactive token refresh before expiration (refreshes on-demand when expired)
|
|
159
|
+
- GitHub Enterprise Server support via `baseUrl` option but not explicitly tested
|
|
160
|
+
- No GraphQL API support (REST API only)
|
|
161
|
+
- No advanced rate limit handling with queuing (basic retry logic included)
|
|
162
|
+
- No webhook event replay mechanism
|
|
163
|
+
- No repository permission auditing features
|
|
144
164
|
|
|
145
165
|
### Breaking Changes
|
|
146
166
|
|
|
@@ -157,44 +177,48 @@ None (initial release)
|
|
|
157
177
|
## Roadmap
|
|
158
178
|
|
|
159
179
|
### Planned for v0.2.0
|
|
160
|
-
|
|
161
|
-
-
|
|
162
|
-
-
|
|
163
|
-
-
|
|
164
|
-
-
|
|
165
|
-
-
|
|
180
|
+
|
|
181
|
+
- Multi-tenant support (multiple GitHub Apps per Flink application)
|
|
182
|
+
- Proactive token refresh before expiration
|
|
183
|
+
- Enhanced rate limit handling with request queuing
|
|
184
|
+
- Webhook event replay mechanism for failed deliveries
|
|
185
|
+
- GitHub Actions integration
|
|
186
|
+
- GraphQL API support
|
|
166
187
|
|
|
167
188
|
### Planned for v0.3.0
|
|
168
|
-
|
|
169
|
-
-
|
|
170
|
-
-
|
|
171
|
-
-
|
|
172
|
-
-
|
|
173
|
-
-
|
|
189
|
+
|
|
190
|
+
- Repository permission auditing
|
|
191
|
+
- Installation analytics and reporting
|
|
192
|
+
- Batch operations for multiple repositories
|
|
193
|
+
- Advanced webhook event filtering
|
|
194
|
+
- Custom event processors registry
|
|
195
|
+
- Webhook event transformation pipeline
|
|
174
196
|
|
|
175
197
|
### Planned for v1.0.0
|
|
176
|
-
|
|
177
|
-
-
|
|
178
|
-
-
|
|
179
|
-
-
|
|
180
|
-
-
|
|
181
|
-
-
|
|
198
|
+
|
|
199
|
+
- Production-ready stability
|
|
200
|
+
- Comprehensive GitHub Enterprise Server testing
|
|
201
|
+
- Performance optimizations
|
|
202
|
+
- Advanced caching strategies
|
|
203
|
+
- Complete test coverage (>90%)
|
|
204
|
+
- Security audit and hardening
|
|
182
205
|
|
|
183
206
|
### Future Considerations
|
|
184
|
-
|
|
185
|
-
-
|
|
186
|
-
-
|
|
187
|
-
-
|
|
188
|
-
-
|
|
189
|
-
-
|
|
207
|
+
|
|
208
|
+
- GitHub Packages integration
|
|
209
|
+
- Container Registry support
|
|
210
|
+
- Deployment status integration
|
|
211
|
+
- Check runs and check suites support
|
|
212
|
+
- Team management features
|
|
213
|
+
- Marketplace integration
|
|
190
214
|
|
|
191
215
|
## Support
|
|
192
216
|
|
|
193
|
-
-
|
|
194
|
-
-
|
|
195
|
-
-
|
|
196
|
-
-
|
|
197
|
-
-
|
|
217
|
+
- **Documentation:** [README.md](./README.md)
|
|
218
|
+
- **Security:** [SECURITY.md](./SECURITY.md)
|
|
219
|
+
- **Examples:** [examples/](./examples/)
|
|
220
|
+
- **Issues:** [GitHub Issues](https://github.com/your-org/flink-framework/issues)
|
|
221
|
+
- **Discussions:** [GitHub Discussions](https://github.com/your-org/flink-framework/discussions)
|
|
198
222
|
|
|
199
223
|
## Contributing
|
|
200
224
|
|
package/dist/GitHubAppPlugin.js
CHANGED
|
@@ -26,7 +26,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
26
26
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
27
27
|
};
|
|
28
28
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
|
-
exports.githubAppPlugin =
|
|
29
|
+
exports.githubAppPlugin = githubAppPlugin;
|
|
30
30
|
const flink_1 = require("@flink-app/flink");
|
|
31
31
|
const GitHubAppSessionRepo_1 = __importDefault(require("./repos/GitHubAppSessionRepo"));
|
|
32
32
|
const GitHubInstallationRepo_1 = __importDefault(require("./repos/GitHubInstallationRepo"));
|
|
@@ -373,4 +373,3 @@ function githubAppPlugin(options) {
|
|
|
373
373
|
init,
|
|
374
374
|
};
|
|
375
375
|
}
|
|
376
|
-
exports.githubAppPlugin = githubAppPlugin;
|
|
@@ -8,7 +8,10 @@
|
|
|
8
8
|
* Error codes use kebab-case for frontend translation consistency.
|
|
9
9
|
*/
|
|
10
10
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
11
|
-
exports.
|
|
11
|
+
exports.GitHubAppErrorCodes = void 0;
|
|
12
|
+
exports.createGitHubAppError = createGitHubAppError;
|
|
13
|
+
exports.validatePrivateKey = validatePrivateKey;
|
|
14
|
+
exports.handleGitHubAPIError = handleGitHubAPIError;
|
|
12
15
|
/**
|
|
13
16
|
* GitHub App error codes
|
|
14
17
|
*
|
|
@@ -50,7 +53,6 @@ function createGitHubAppError(code, message, details) {
|
|
|
50
53
|
details,
|
|
51
54
|
};
|
|
52
55
|
}
|
|
53
|
-
exports.createGitHubAppError = createGitHubAppError;
|
|
54
56
|
/**
|
|
55
57
|
* Validate private key format
|
|
56
58
|
*
|
|
@@ -71,7 +73,6 @@ function validatePrivateKey(privateKey) {
|
|
|
71
73
|
}
|
|
72
74
|
return true;
|
|
73
75
|
}
|
|
74
|
-
exports.validatePrivateKey = validatePrivateKey;
|
|
75
76
|
/**
|
|
76
77
|
* Map GitHub API errors to standardized errors
|
|
77
78
|
*
|
|
@@ -118,4 +119,3 @@ function handleGitHubAPIError(error) {
|
|
|
118
119
|
status: error.status,
|
|
119
120
|
});
|
|
120
121
|
}
|
|
121
|
-
exports.handleGitHubAPIError = handleGitHubAPIError;
|
package/dist/utils/jwt-utils.js
CHANGED
|
@@ -9,7 +9,8 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
9
9
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
10
10
|
};
|
|
11
11
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.
|
|
12
|
+
exports.detectPEMFormat = detectPEMFormat;
|
|
13
|
+
exports.generateJWT = generateJWT;
|
|
13
14
|
const jsonwebtoken_1 = __importDefault(require("jsonwebtoken"));
|
|
14
15
|
/**
|
|
15
16
|
* Detect PEM format (PKCS#1 or PKCS#8)
|
|
@@ -31,7 +32,6 @@ function detectPEMFormat(privateKey) {
|
|
|
31
32
|
}
|
|
32
33
|
throw new Error("Invalid PEM format. Expected PKCS#1 (BEGIN RSA PRIVATE KEY) or PKCS#8 (BEGIN PRIVATE KEY).");
|
|
33
34
|
}
|
|
34
|
-
exports.detectPEMFormat = detectPEMFormat;
|
|
35
35
|
/**
|
|
36
36
|
* Generate GitHub App JWT
|
|
37
37
|
*
|
|
@@ -64,4 +64,3 @@ function generateJWT(appId, privateKey) {
|
|
|
64
64
|
throw new Error(`Failed to sign JWT: ${error.message}`);
|
|
65
65
|
}
|
|
66
66
|
}
|
|
67
|
-
exports.generateJWT = generateJWT;
|
|
@@ -11,7 +11,9 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
11
11
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
12
12
|
};
|
|
13
13
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
14
|
-
exports.
|
|
14
|
+
exports.generateState = generateState;
|
|
15
|
+
exports.validateState = validateState;
|
|
16
|
+
exports.generateSessionId = generateSessionId;
|
|
15
17
|
const crypto_1 = __importDefault(require("crypto"));
|
|
16
18
|
/**
|
|
17
19
|
* Generate a cryptographically secure state parameter
|
|
@@ -25,7 +27,6 @@ const crypto_1 = __importDefault(require("crypto"));
|
|
|
25
27
|
function generateState() {
|
|
26
28
|
return crypto_1.default.randomBytes(32).toString("hex");
|
|
27
29
|
}
|
|
28
|
-
exports.generateState = generateState;
|
|
29
30
|
/**
|
|
30
31
|
* Validate state parameter using constant-time comparison
|
|
31
32
|
*
|
|
@@ -59,7 +60,6 @@ function validateState(provided, stored) {
|
|
|
59
60
|
return false;
|
|
60
61
|
}
|
|
61
62
|
}
|
|
62
|
-
exports.validateState = validateState;
|
|
63
63
|
/**
|
|
64
64
|
* Generate a session ID for installation flow tracking
|
|
65
65
|
*
|
|
@@ -71,4 +71,3 @@ exports.validateState = validateState;
|
|
|
71
71
|
function generateSessionId() {
|
|
72
72
|
return crypto_1.default.randomBytes(16).toString("hex");
|
|
73
73
|
}
|
|
74
|
-
exports.generateSessionId = generateSessionId;
|
|
@@ -9,7 +9,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
9
9
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
10
10
|
};
|
|
11
11
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.validateWebhookSignature =
|
|
12
|
+
exports.validateWebhookSignature = validateWebhookSignature;
|
|
13
13
|
const crypto_1 = __importDefault(require("crypto"));
|
|
14
14
|
/**
|
|
15
15
|
* Validate GitHub webhook signature
|
|
@@ -54,4 +54,3 @@ function validateWebhookSignature(payload, signature, secret) {
|
|
|
54
54
|
return false;
|
|
55
55
|
}
|
|
56
56
|
}
|
|
57
|
-
exports.validateWebhookSignature = validateWebhookSignature;
|
package/package.json
CHANGED
|
@@ -1,41 +1,36 @@
|
|
|
1
1
|
{
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
"
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
"
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
"
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
"
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
"
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
"tsc-watch": "^4.2.9",
|
|
38
|
-
"typescript": "5.4.5"
|
|
39
|
-
},
|
|
40
|
-
"gitHead": "a98a0af7f11e4a97f68da4d0d67677df7d2a2749"
|
|
41
|
-
}
|
|
2
|
+
"name": "@flink-app/github-app-plugin",
|
|
3
|
+
"version": "0.13.0",
|
|
4
|
+
"description": "Flink plugin for GitHub App integration with installation management and webhook handling",
|
|
5
|
+
"author": "joel@frost.se",
|
|
6
|
+
"license": "MIT",
|
|
7
|
+
"types": "dist/index.d.ts",
|
|
8
|
+
"main": "dist/index.js",
|
|
9
|
+
"publishConfig": {
|
|
10
|
+
"access": "public"
|
|
11
|
+
},
|
|
12
|
+
"peerDependencies": {
|
|
13
|
+
"mongodb": "^6.15.0"
|
|
14
|
+
},
|
|
15
|
+
"dependencies": {
|
|
16
|
+
"jsonwebtoken": "^9.0.2"
|
|
17
|
+
},
|
|
18
|
+
"devDependencies": {
|
|
19
|
+
"@types/jasmine": "^3.7.1",
|
|
20
|
+
"@types/jsonwebtoken": "^9.0.5",
|
|
21
|
+
"@types/node": "22.13.10",
|
|
22
|
+
"mongodb-memory-server": "^10.2.3",
|
|
23
|
+
"ts-node": "^10.9.2",
|
|
24
|
+
"tsc-watch": "^4.2.9",
|
|
25
|
+
"@flink-app/test-utils": "0.13.0",
|
|
26
|
+
"@flink-app/flink": "0.13.0"
|
|
27
|
+
},
|
|
28
|
+
"gitHead": "4243e3b3cd6d4e1ca001a61baa8436bf2bbe4113",
|
|
29
|
+
"scripts": {
|
|
30
|
+
"test": "jasmine-ts --config=./spec/support/jasmine.json",
|
|
31
|
+
"test:watch": "nodemon --ext ts --exec 'jasmine-ts --config=./spec/support/jasmine.json'",
|
|
32
|
+
"build": "tsc --project tsconfig.dist.json",
|
|
33
|
+
"watch": "tsc-watch --project tsconfig.dist.json",
|
|
34
|
+
"clean": "rimraf dist .flink"
|
|
35
|
+
}
|
|
36
|
+
}
|