@kalphq/cli 0.0.0-dev-20260513012830 → 0.0.0-dev-20260513145227
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{add-CTF5QIGY.js → add-KTFK7GHV.js} +7 -5
- package/dist/{add-CTF5QIGY.js.map → add-KTFK7GHV.js.map} +1 -1
- package/dist/{agents-RICTNA5H.js → agents-QLWNNAXD.js} +9 -5
- package/dist/agents-QLWNNAXD.js.map +1 -0
- package/dist/chunk-5ATINSVP.js +210904 -0
- package/dist/chunk-5ATINSVP.js.map +1 -0
- package/dist/{chunk-TPG7QMXB.js → chunk-5J2WLD3O.js} +7 -5
- package/dist/{chunk-TPG7QMXB.js.map → chunk-5J2WLD3O.js.map} +1 -1
- package/dist/chunk-EXXTCGKR.js +77 -0
- package/dist/chunk-EXXTCGKR.js.map +1 -0
- package/dist/{chunk-FP3ZLBYT.js → chunk-IZXCZ3IA.js} +2 -2
- package/dist/{chunk-DHCCSWJN.js → chunk-XVD3FFOJ.js} +37 -104
- package/dist/chunk-XVD3FFOJ.js.map +1 -0
- package/dist/{chunk-EHNC6ITP.js → chunk-YE2SFYAJ.js} +10 -1
- package/dist/chunk-YE2SFYAJ.js.map +1 -0
- package/dist/chunk-ZWE3DS7E.js +39 -0
- package/dist/chunk-ZWE3DS7E.js.map +1 -0
- package/dist/{create-XC55BUCS.js → create-265DBQ72.js} +7 -1
- package/dist/create-265DBQ72.js.map +1 -0
- package/dist/{delete-BQFFYYWZ.js → delete-5RN5RRDK.js} +7 -5
- package/dist/{delete-BQFFYYWZ.js.map → delete-5RN5RRDK.js.map} +1 -1
- package/dist/{delete-K5Z552BS.js → delete-AF2GT6S4.js} +12 -16
- package/dist/delete-AF2GT6S4.js.map +1 -0
- package/dist/{deploy-2JMOUTWG.js → deploy-RWZFKSHR.js} +9 -3
- package/dist/deploy-RWZFKSHR.js.map +1 -0
- package/dist/{dev-X43HHIYV.js → dev-XI5WA3NA.js} +8 -2
- package/dist/dev-XI5WA3NA.js.map +1 -0
- package/dist/index.js +10 -9
- package/dist/index.js.map +1 -1
- package/dist/list-NM727WK3.js +161 -0
- package/dist/list-NM727WK3.js.map +1 -0
- package/dist/{list-JXR4IULK.js → list-SU5CSX3P.js} +30 -9
- package/dist/list-SU5CSX3P.js.map +1 -0
- package/dist/{login-MGPA2VYV.js → login-G3RY64KU.js} +2 -1
- package/dist/{login-MGPA2VYV.js.map → login-G3RY64KU.js.map} +1 -1
- package/dist/{logout-U5V5K775.js → logout-VVQ6OD4D.js} +2 -1
- package/dist/{logout-U5V5K775.js.map → logout-VVQ6OD4D.js.map} +1 -1
- package/dist/pull-2ODHRCHG.js +84 -0
- package/dist/pull-2ODHRCHG.js.map +1 -0
- package/dist/{push-WHPQXAY7.js → push-7DIL7IRB.js} +9 -3
- package/dist/push-7DIL7IRB.js.map +1 -0
- package/dist/{secrets-Z53FLH56.js → secrets-RNM6LSXT.js} +10 -5
- package/dist/secrets-RNM6LSXT.js.map +1 -0
- package/dist/{sync-RPXLLOTK.js → sync-6EXHV3IT.js} +20 -7
- package/dist/sync-6EXHV3IT.js.map +1 -0
- package/package.json +4 -4
- package/dist/agents-RICTNA5H.js.map +0 -1
- package/dist/chunk-DHCCSWJN.js.map +0 -1
- package/dist/chunk-EHNC6ITP.js.map +0 -1
- package/dist/chunk-MMS3GWBG.js +0 -50
- package/dist/chunk-MMS3GWBG.js.map +0 -1
- package/dist/create-XC55BUCS.js.map +0 -1
- package/dist/delete-K5Z552BS.js.map +0 -1
- package/dist/deploy-2JMOUTWG.js.map +0 -1
- package/dist/dev-X43HHIYV.js.map +0 -1
- package/dist/list-4HHUQLZ2.js +0 -142
- package/dist/list-4HHUQLZ2.js.map +0 -1
- package/dist/list-JXR4IULK.js.map +0 -1
- package/dist/push-WHPQXAY7.js.map +0 -1
- package/dist/secrets-Z53FLH56.js.map +0 -1
- package/dist/sync-RPXLLOTK.js.map +0 -1
- /package/dist/{chunk-FP3ZLBYT.js.map → chunk-IZXCZ3IA.js.map} +0 -0
|
@@ -1,22 +1,24 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
2
|
import {
|
|
3
3
|
generateTypes
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-5ATINSVP.js";
|
|
5
5
|
import {
|
|
6
6
|
mergeSecrets,
|
|
7
7
|
readLocalSecretsFromConfig,
|
|
8
8
|
writeLocalSecretsToConfig
|
|
9
|
-
} from "./chunk-
|
|
9
|
+
} from "./chunk-YE2SFYAJ.js";
|
|
10
10
|
import {
|
|
11
11
|
resolveSecretsRuntimeConfigPath
|
|
12
|
-
} from "./chunk-
|
|
12
|
+
} from "./chunk-IZXCZ3IA.js";
|
|
13
13
|
import "./chunk-INB3LG6O.js";
|
|
14
14
|
import {
|
|
15
15
|
requireAuth,
|
|
16
16
|
resolveProvider
|
|
17
17
|
} from "./chunk-S3KAVLVM.js";
|
|
18
18
|
import "./chunk-FO24J6XL.js";
|
|
19
|
-
import "./chunk-
|
|
19
|
+
import "./chunk-XVD3FFOJ.js";
|
|
20
|
+
import "./chunk-EXXTCGKR.js";
|
|
21
|
+
import "./chunk-ZWE3DS7E.js";
|
|
20
22
|
|
|
21
23
|
// src/commands/secrets/add.ts
|
|
22
24
|
import { defineCommand } from "citty";
|
|
@@ -123,4 +125,4 @@ var add_default = defineCommand({
|
|
|
123
125
|
export {
|
|
124
126
|
add_default as default
|
|
125
127
|
};
|
|
126
|
-
//# sourceMappingURL=add-
|
|
128
|
+
//# sourceMappingURL=add-KTFK7GHV.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/commands/secrets/add.ts"],"sourcesContent":["import { defineCommand } from \"citty\";\nimport * as p from \"@clack/prompts\";\nimport pc from \"picocolors\";\nimport { requireAuth } from \"@/utils/auth\";\nimport { generateTypes } from \"@/utils/codegen\";\nimport { resolveProvider } from \"@/utils/providers\";\nimport {\n mergeSecrets,\n readLocalSecretsFromConfig,\n writeLocalSecretsToConfig,\n} from \"@/utils/secrets-config\";\nimport { resolveSecretsRuntimeConfigPath } from \"@/utils/secrets-runtime\";\n\nconst LOGO = \"🦋\";\n\nexport default defineCommand({\n meta: {\n name: \"add\",\n description: \"Add a secret to remote runtime and local config\",\n },\n args: {\n key: {\n type: \"string\",\n alias: \"k\",\n description: \"Secret key (UPPER_SNAKE_CASE)\",\n },\n value: {\n type: \"string\",\n alias: \"v\",\n description: \"Secret value\",\n },\n help: {\n type: \"boolean\",\n alias: \"h\",\n description: \"Show help\",\n default: false,\n },\n },\n async run({ args }) {\n const cwd = process.cwd();\n\n if (args.help) {\n p.log.info(`${pc.bold(\"Usage\")}: kalp secrets add -k <KEY> -v <VALUE>`);\n return;\n }\n\n p.intro(`${LOGO} ${pc.bold(\"kalp secrets add\")}`);\n\n await requireAuth().catch(() => {\n p.log.error(\"Not authenticated. Run `kalp login` first.\");\n process.exit(1);\n });\n\n let key = args.key?.trim();\n let value = args.value;\n\n if (!key) {\n const input = await p.text({\n message: \"Secret key name\",\n placeholder: \"STRIPE_SECRET_KEY\",\n validate: (v) => {\n if (!v) return \"Key is required\";\n if (!/^[A-Z_][A-Z0-9_]*$/.test(v)) {\n return \"Key must be UPPER_SNAKE_CASE\";\n }\n },\n });\n if (p.isCancel(input)) {\n p.outro(\"Cancelled\");\n return;\n }\n key = String(input).trim();\n }\n\n if (!/^[A-Z_][A-Z0-9_]*$/.test(key)) {\n p.log.error(\"Invalid key. Use UPPER_SNAKE_CASE.\");\n process.exit(1);\n }\n\n if (!value) {\n const input = await p.password({\n message: `Enter value for ${key}`,\n mask: \"*\",\n });\n if (p.isCancel(input)) {\n p.outro(\"Cancelled\");\n return;\n }\n value = String(input);\n }\n\n const trimmedValue = value.trim();\n if (!trimmedValue) {\n p.log.error(\"Secret value cannot be empty.\");\n process.exit(1);\n }\n\n const spinner = p.spinner();\n spinner.start(`Adding ${pc.cyan(key)} to remote runtime`);\n\n try {\n const configPath = await resolveSecretsRuntimeConfigPath(cwd);\n const provider = resolveProvider();\n await provider.putSecret({\n cwd,\n configPath,\n name: key,\n value: trimmedValue,\n });\n\n const localSecrets = await readLocalSecretsFromConfig(cwd);\n const merged = mergeSecrets(localSecrets, [key]);\n await writeLocalSecretsToConfig(cwd, merged);\n await generateTypes(cwd);\n\n spinner.stop(`Secret ${pc.cyan(key)} added`);\n p.outro(\"Done\");\n } catch (error) {\n spinner.stop(\"Failed to add secret\");\n p.log.error(error instanceof Error ? error.message : String(error));\n process.exit(1);\n }\n },\n});\n"],"mappings":"
|
|
1
|
+
{"version":3,"sources":["../src/commands/secrets/add.ts"],"sourcesContent":["import { defineCommand } from \"citty\";\nimport * as p from \"@clack/prompts\";\nimport pc from \"picocolors\";\nimport { requireAuth } from \"@/utils/auth\";\nimport { generateTypes } from \"@/utils/codegen\";\nimport { resolveProvider } from \"@/utils/providers\";\nimport {\n mergeSecrets,\n readLocalSecretsFromConfig,\n writeLocalSecretsToConfig,\n} from \"@/utils/secrets-config\";\nimport { resolveSecretsRuntimeConfigPath } from \"@/utils/secrets-runtime\";\n\nconst LOGO = \"🦋\";\n\nexport default defineCommand({\n meta: {\n name: \"add\",\n description: \"Add a secret to remote runtime and local config\",\n },\n args: {\n key: {\n type: \"string\",\n alias: \"k\",\n description: \"Secret key (UPPER_SNAKE_CASE)\",\n },\n value: {\n type: \"string\",\n alias: \"v\",\n description: \"Secret value\",\n },\n help: {\n type: \"boolean\",\n alias: \"h\",\n description: \"Show help\",\n default: false,\n },\n },\n async run({ args }) {\n const cwd = process.cwd();\n\n if (args.help) {\n p.log.info(`${pc.bold(\"Usage\")}: kalp secrets add -k <KEY> -v <VALUE>`);\n return;\n }\n\n p.intro(`${LOGO} ${pc.bold(\"kalp secrets add\")}`);\n\n await requireAuth().catch(() => {\n p.log.error(\"Not authenticated. Run `kalp login` first.\");\n process.exit(1);\n });\n\n let key = args.key?.trim();\n let value = args.value;\n\n if (!key) {\n const input = await p.text({\n message: \"Secret key name\",\n placeholder: \"STRIPE_SECRET_KEY\",\n validate: (v) => {\n if (!v) return \"Key is required\";\n if (!/^[A-Z_][A-Z0-9_]*$/.test(v)) {\n return \"Key must be UPPER_SNAKE_CASE\";\n }\n },\n });\n if (p.isCancel(input)) {\n p.outro(\"Cancelled\");\n return;\n }\n key = String(input).trim();\n }\n\n if (!/^[A-Z_][A-Z0-9_]*$/.test(key)) {\n p.log.error(\"Invalid key. Use UPPER_SNAKE_CASE.\");\n process.exit(1);\n }\n\n if (!value) {\n const input = await p.password({\n message: `Enter value for ${key}`,\n mask: \"*\",\n });\n if (p.isCancel(input)) {\n p.outro(\"Cancelled\");\n return;\n }\n value = String(input);\n }\n\n const trimmedValue = value.trim();\n if (!trimmedValue) {\n p.log.error(\"Secret value cannot be empty.\");\n process.exit(1);\n }\n\n const spinner = p.spinner();\n spinner.start(`Adding ${pc.cyan(key)} to remote runtime`);\n\n try {\n const configPath = await resolveSecretsRuntimeConfigPath(cwd);\n const provider = resolveProvider();\n await provider.putSecret({\n cwd,\n configPath,\n name: key,\n value: trimmedValue,\n });\n\n const localSecrets = await readLocalSecretsFromConfig(cwd);\n const merged = mergeSecrets(localSecrets, [key]);\n await writeLocalSecretsToConfig(cwd, merged);\n await generateTypes(cwd);\n\n spinner.stop(`Secret ${pc.cyan(key)} added`);\n p.outro(\"Done\");\n } catch (error) {\n spinner.stop(\"Failed to add secret\");\n p.log.error(error instanceof Error ? error.message : String(error));\n process.exit(1);\n }\n },\n});\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;AAAA,SAAS,qBAAqB;AAC9B,YAAY,OAAO;AACnB,OAAO,QAAQ;AAWf,IAAM,OAAO;AAEb,IAAO,cAAQ,cAAc;AAAA,EAC3B,MAAM;AAAA,IACJ,MAAM;AAAA,IACN,aAAa;AAAA,EACf;AAAA,EACA,MAAM;AAAA,IACJ,KAAK;AAAA,MACH,MAAM;AAAA,MACN,OAAO;AAAA,MACP,aAAa;AAAA,IACf;AAAA,IACA,OAAO;AAAA,MACL,MAAM;AAAA,MACN,OAAO;AAAA,MACP,aAAa;AAAA,IACf;AAAA,IACA,MAAM;AAAA,MACJ,MAAM;AAAA,MACN,OAAO;AAAA,MACP,aAAa;AAAA,MACb,SAAS;AAAA,IACX;AAAA,EACF;AAAA,EACA,MAAM,IAAI,EAAE,KAAK,GAAG;AAClB,UAAM,MAAM,QAAQ,IAAI;AAExB,QAAI,KAAK,MAAM;AACb,MAAE,MAAI,KAAK,GAAG,GAAG,KAAK,OAAO,CAAC,wCAAwC;AACtE;AAAA,IACF;AAEA,IAAE,QAAM,GAAG,IAAI,IAAI,GAAG,KAAK,kBAAkB,CAAC,EAAE;AAEhD,UAAM,YAAY,EAAE,MAAM,MAAM;AAC9B,MAAE,MAAI,MAAM,4CAA4C;AACxD,cAAQ,KAAK,CAAC;AAAA,IAChB,CAAC;AAED,QAAI,MAAM,KAAK,KAAK,KAAK;AACzB,QAAI,QAAQ,KAAK;AAEjB,QAAI,CAAC,KAAK;AACR,YAAM,QAAQ,MAAQ,OAAK;AAAA,QACzB,SAAS;AAAA,QACT,aAAa;AAAA,QACb,UAAU,CAAC,MAAM;AACf,cAAI,CAAC,EAAG,QAAO;AACf,cAAI,CAAC,qBAAqB,KAAK,CAAC,GAAG;AACjC,mBAAO;AAAA,UACT;AAAA,QACF;AAAA,MACF,CAAC;AACD,UAAM,WAAS,KAAK,GAAG;AACrB,QAAE,QAAM,WAAW;AACnB;AAAA,MACF;AACA,YAAM,OAAO,KAAK,EAAE,KAAK;AAAA,IAC3B;AAEA,QAAI,CAAC,qBAAqB,KAAK,GAAG,GAAG;AACnC,MAAE,MAAI,MAAM,oCAAoC;AAChD,cAAQ,KAAK,CAAC;AAAA,IAChB;AAEA,QAAI,CAAC,OAAO;AACV,YAAM,QAAQ,MAAQ,WAAS;AAAA,QAC7B,SAAS,mBAAmB,GAAG;AAAA,QAC/B,MAAM;AAAA,MACR,CAAC;AACD,UAAM,WAAS,KAAK,GAAG;AACrB,QAAE,QAAM,WAAW;AACnB;AAAA,MACF;AACA,cAAQ,OAAO,KAAK;AAAA,IACtB;AAEA,UAAM,eAAe,MAAM,KAAK;AAChC,QAAI,CAAC,cAAc;AACjB,MAAE,MAAI,MAAM,+BAA+B;AAC3C,cAAQ,KAAK,CAAC;AAAA,IAChB;AAEA,UAAMA,WAAY,UAAQ;AAC1B,IAAAA,SAAQ,MAAM,UAAU,GAAG,KAAK,GAAG,CAAC,oBAAoB;AAExD,QAAI;AACF,YAAM,aAAa,MAAM,gCAAgC,GAAG;AAC5D,YAAM,WAAW,gBAAgB;AACjC,YAAM,SAAS,UAAU;AAAA,QACvB;AAAA,QACA;AAAA,QACA,MAAM;AAAA,QACN,OAAO;AAAA,MACT,CAAC;AAED,YAAM,eAAe,MAAM,2BAA2B,GAAG;AACzD,YAAM,SAAS,aAAa,cAAc,CAAC,GAAG,CAAC;AAC/C,YAAM,0BAA0B,KAAK,MAAM;AAC3C,YAAM,cAAc,GAAG;AAEvB,MAAAA,SAAQ,KAAK,UAAU,GAAG,KAAK,GAAG,CAAC,QAAQ;AAC3C,MAAE,QAAM,MAAM;AAAA,IAChB,SAAS,OAAO;AACd,MAAAA,SAAQ,KAAK,sBAAsB;AACnC,MAAE,MAAI,MAAM,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK,CAAC;AAClE,cAAQ,KAAK,CAAC;AAAA,IAChB;AAAA,EACF;AACF,CAAC;","names":["spinner"]}
|
|
@@ -1,4 +1,5 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
|
+
import "./chunk-ZWE3DS7E.js";
|
|
2
3
|
|
|
3
4
|
// src/commands/agents/index.ts
|
|
4
5
|
import { defineCommand } from "citty";
|
|
@@ -19,22 +20,25 @@ var agents_default = defineCommand({
|
|
|
19
20
|
}
|
|
20
21
|
},
|
|
21
22
|
subCommands: {
|
|
22
|
-
list: () => import("./list-
|
|
23
|
-
delete: () => import("./delete-
|
|
23
|
+
list: () => import("./list-NM727WK3.js").then((r) => r.default),
|
|
24
|
+
delete: () => import("./delete-AF2GT6S4.js").then((r) => r.default)
|
|
24
25
|
},
|
|
25
26
|
run({ args }) {
|
|
27
|
+
const subcommand = process.argv[3];
|
|
28
|
+
if (subcommand && subcommand !== "--help" && subcommand !== "-h") {
|
|
29
|
+
return;
|
|
30
|
+
}
|
|
26
31
|
p.intro(`${LOGO} ${pc.bold("kalp agents")}`);
|
|
27
32
|
p.log.message(pc.bold("Available subcommands:"));
|
|
28
|
-
p.log.message(` ${pc.cyan("list")}
|
|
33
|
+
p.log.message(` ${pc.cyan("list")} List remote agents`);
|
|
29
34
|
p.log.message(` ${pc.cyan("delete")} Delete an agent from remote runtime`);
|
|
30
35
|
p.log.message("");
|
|
31
36
|
p.log.message(
|
|
32
37
|
`Run ${pc.cyan("kalp agents <subcommand> --help")} for more info.`
|
|
33
38
|
);
|
|
34
|
-
p.outro(args.help ? pc.dim("Done") : pc.dim("Select a subcommand above."));
|
|
35
39
|
}
|
|
36
40
|
});
|
|
37
41
|
export {
|
|
38
42
|
agents_default as default
|
|
39
43
|
};
|
|
40
|
-
//# sourceMappingURL=agents-
|
|
44
|
+
//# sourceMappingURL=agents-QLWNNAXD.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/commands/agents/index.ts"],"sourcesContent":["import { defineCommand } from \"citty\";\nimport * as p from \"@clack/prompts\";\nimport pc from \"picocolors\";\n\nconst LOGO = \"🦋\";\n\nexport default defineCommand({\n meta: {\n name: \"agents\",\n description: \"Inspect and manage project agents\",\n },\n args: {\n help: {\n type: \"boolean\",\n alias: \"h\",\n description: \"Show help\",\n default: false,\n },\n },\n subCommands: {\n list: () => import(\"./list\").then((r) => r.default),\n delete: () => import(\"./delete\").then((r) => r.default),\n },\n run({ args }) {\n const subcommand = process.argv[3];\n if (subcommand && subcommand !== \"--help\" && subcommand !== \"-h\") {\n return;\n }\n\n p.intro(`${LOGO} ${pc.bold(\"kalp agents\")}`);\n p.log.message(pc.bold(\"Available subcommands:\"));\n p.log.message(` ${pc.cyan(\"list\")} List remote agents`);\n p.log.message(` ${pc.cyan(\"delete\")} Delete an agent from remote runtime`);\n p.log.message(\"\");\n p.log.message(\n `Run ${pc.cyan(\"kalp agents <subcommand> --help\")} for more info.`,\n );\n },\n});\n"],"mappings":";;;;AAAA,SAAS,qBAAqB;AAC9B,YAAY,OAAO;AACnB,OAAO,QAAQ;AAEf,IAAM,OAAO;AAEb,IAAO,iBAAQ,cAAc;AAAA,EAC3B,MAAM;AAAA,IACJ,MAAM;AAAA,IACN,aAAa;AAAA,EACf;AAAA,EACA,MAAM;AAAA,IACJ,MAAM;AAAA,MACJ,MAAM;AAAA,MACN,OAAO;AAAA,MACP,aAAa;AAAA,MACb,SAAS;AAAA,IACX;AAAA,EACF;AAAA,EACA,aAAa;AAAA,IACX,MAAM,MAAM,OAAO,oBAAQ,EAAE,KAAK,CAAC,MAAM,EAAE,OAAO;AAAA,IAClD,QAAQ,MAAM,OAAO,sBAAU,EAAE,KAAK,CAAC,MAAM,EAAE,OAAO;AAAA,EACxD;AAAA,EACA,IAAI,EAAE,KAAK,GAAG;AACZ,UAAM,aAAa,QAAQ,KAAK,CAAC;AACjC,QAAI,cAAc,eAAe,YAAY,eAAe,MAAM;AAChE;AAAA,IACF;AAEA,IAAE,QAAM,GAAG,IAAI,IAAI,GAAG,KAAK,aAAa,CAAC,EAAE;AAC3C,IAAE,MAAI,QAAQ,GAAG,KAAK,wBAAwB,CAAC;AAC/C,IAAE,MAAI,QAAQ,KAAK,GAAG,KAAK,MAAM,CAAC,wBAAwB;AAC1D,IAAE,MAAI,QAAQ,KAAK,GAAG,KAAK,QAAQ,CAAC,uCAAuC;AAC3E,IAAE,MAAI,QAAQ,EAAE;AAChB,IAAE,MAAI;AAAA,MACJ,OAAO,GAAG,KAAK,iCAAiC,CAAC;AAAA,IACnD;AAAA,EACF;AACF,CAAC;","names":[]}
|