@medusajs/types 1.12.0-preview-20240519090452 → 1.12.0-preview-20240519115302
Sign up to get free protection for your applications and to get access to all the features.
@@ -61,7 +61,7 @@ type SessionOptions = {
|
|
61
61
|
*/
|
62
62
|
saveUninitialized?: boolean;
|
63
63
|
/**
|
64
|
-
* The secret to sign the session ID cookie. By default, the value of `
|
64
|
+
* The secret to sign the session ID cookie. By default, the value of `http.cookieSecret` is used.
|
65
65
|
* Refer to [express-session’s documentation](https://www.npmjs.com/package/express-session#secret) for details.
|
66
66
|
*/
|
67
67
|
secret?: string;
|
@@ -103,191 +103,6 @@ export type HttpCompressionOptions = {
|
|
103
103
|
* Essential configurations related to the Medusa backend, such as database and CORS configurations.
|
104
104
|
*/
|
105
105
|
export type ProjectConfigOptions = {
|
106
|
-
/**
|
107
|
-
* The Medusa backend’s API Routes are protected by Cross-Origin Resource Sharing (CORS). So, only allowed URLs or URLs matching a specified pattern can send requests to the backend’s API Routes.
|
108
|
-
*
|
109
|
-
* `store_cors` is a string used to specify the accepted URLs or patterns for store API Routes. It can either be one accepted origin, or a comma-separated list of accepted origins.
|
110
|
-
*
|
111
|
-
* Every origin in that list must either be:
|
112
|
-
*
|
113
|
-
* 1. A URL. For example, `http://localhost:8000`. The URL must not end with a backslash;
|
114
|
-
* 2. Or a regular expression pattern that can match more than one origin. For example, `.example.com`. The regex pattern that the backend tests for is `^([\/~@;%#'])(.*?)\1([gimsuy]*)$`.
|
115
|
-
*
|
116
|
-
* @example
|
117
|
-
* Some example values of common use cases:
|
118
|
-
*
|
119
|
-
* ```bash
|
120
|
-
* # Allow different ports locally starting with 800
|
121
|
-
* STORE_CORS=/http:\/\/localhost:800\d+$/
|
122
|
-
*
|
123
|
-
* # Allow any origin ending with vercel.app. For example, storefront.vercel.app
|
124
|
-
* STORE_CORS=/vercel\.app$/
|
125
|
-
*
|
126
|
-
* # Allow all HTTP requests
|
127
|
-
* STORE_CORS=/http:\/\/.+/
|
128
|
-
* ```
|
129
|
-
*
|
130
|
-
* Then, set the configuration in `medusa-config.js`:
|
131
|
-
*
|
132
|
-
* ```js title="medusa-config.js"
|
133
|
-
* module.exports = {
|
134
|
-
* projectConfig: {
|
135
|
-
* store_cors: process.env.STORE_CORS,
|
136
|
-
* // ...
|
137
|
-
* },
|
138
|
-
* // ...
|
139
|
-
* }
|
140
|
-
* ```
|
141
|
-
*
|
142
|
-
* If you’re adding the value directly within `medusa-config.js`, make sure to add an extra escaping `/` for every backslash in the pattern. For example:
|
143
|
-
*
|
144
|
-
* ```js title="medusa-config.js"
|
145
|
-
* module.exports = {
|
146
|
-
* projectConfig: {
|
147
|
-
* store_cors: "/vercel\\.app$/",
|
148
|
-
* // ...
|
149
|
-
* },
|
150
|
-
* // ...
|
151
|
-
* }
|
152
|
-
* ```
|
153
|
-
*/
|
154
|
-
store_cors?: string;
|
155
|
-
/**
|
156
|
-
* The Medusa backend’s API Routes are protected by Cross-Origin Resource Sharing (CORS). So, only allowed URLs or URLs matching a specified pattern can send requests to the backend’s API Routes.
|
157
|
-
*
|
158
|
-
* `admin_cors` is a string used to specify the accepted URLs or patterns for admin API Routes. It can either be one accepted origin, or a comma-separated list of accepted origins.
|
159
|
-
*
|
160
|
-
* Every origin in that list must either be:
|
161
|
-
*
|
162
|
-
* 1. A URL. For example, `http://localhost:7001`. The URL must not end with a backslash;
|
163
|
-
* 2. Or a regular expression pattern that can match more than one origin. For example, `.example.com`. The regex pattern that the backend tests for is `^([\/~@;%#'])(.*?)\1([gimsuy]*)$`.
|
164
|
-
*
|
165
|
-
* @example
|
166
|
-
* Some example values of common use cases:
|
167
|
-
*
|
168
|
-
* ```bash
|
169
|
-
* # Allow different ports locally starting with 700
|
170
|
-
* ADMIN_CORS=/http:\/\/localhost:700\d+$/
|
171
|
-
*
|
172
|
-
* # Allow any origin ending with vercel.app. For example, admin.vercel.app
|
173
|
-
* ADMIN_CORS=/vercel\.app$/
|
174
|
-
*
|
175
|
-
* # Allow all HTTP requests
|
176
|
-
* ADMIN_CORS=/http:\/\/.+/
|
177
|
-
* ```
|
178
|
-
*
|
179
|
-
* Then, set the configuration in `medusa-config.js`:
|
180
|
-
*
|
181
|
-
* ```js title="medusa-config.js"
|
182
|
-
* module.exports = {
|
183
|
-
* projectConfig: {
|
184
|
-
* admin_cors: process.env.ADMIN_CORS,
|
185
|
-
* // ...
|
186
|
-
* },
|
187
|
-
* // ...
|
188
|
-
* }
|
189
|
-
* ```
|
190
|
-
*
|
191
|
-
* If you’re adding the value directly within `medusa-config.js`, make sure to add an extra escaping `/` for every backslash in the pattern. For example:
|
192
|
-
*
|
193
|
-
* ```js title="medusa-config.js"
|
194
|
-
* module.exports = {
|
195
|
-
* projectConfig: {
|
196
|
-
* admin_cors: "/http:\\/\\/localhost:700\\d+$/",
|
197
|
-
* // ...
|
198
|
-
* },
|
199
|
-
* // ...
|
200
|
-
* }
|
201
|
-
* ```
|
202
|
-
*/
|
203
|
-
admin_cors?: string;
|
204
|
-
/**
|
205
|
-
* The Medusa backend’s API Routes are protected by Cross-Origin Resource Sharing (CORS). So, only allowed URLs or URLs matching a specified pattern can send requests to the backend’s API Routes.
|
206
|
-
*
|
207
|
-
* `auth_cors` is a string used to specify the accepted URLs or patterns for API Routes starting with `/auth`. It can either be one accepted origin, or a comma-separated list of accepted origins.
|
208
|
-
*
|
209
|
-
* Every origin in that list must either be:
|
210
|
-
*
|
211
|
-
* 1. A URL. For example, `http://localhost:7001`. The URL must not end with a backslash;
|
212
|
-
* 2. Or a regular expression pattern that can match more than one origin. For example, `.example.com`. The regex pattern that the backend tests for is `^([\/~@;%#'])(.*?)\1([gimsuy]*)$`.
|
213
|
-
*
|
214
|
-
* @example
|
215
|
-
* Some example values of common use cases:
|
216
|
-
*
|
217
|
-
* ```bash
|
218
|
-
* # Allow different ports locally starting with 700
|
219
|
-
* AUTH_CORS=/http:\/\/localhost:700\d+$/
|
220
|
-
*
|
221
|
-
* # Allow any origin ending with vercel.app. For example, admin.vercel.app
|
222
|
-
* AUTH_CORS=/vercel\.app$/
|
223
|
-
*
|
224
|
-
* # Allow all HTTP requests
|
225
|
-
* AUTH_CORS=/http:\/\/.+/
|
226
|
-
* ```
|
227
|
-
*
|
228
|
-
* Then, set the configuration in `medusa-config.js`:
|
229
|
-
*
|
230
|
-
* ```js title="medusa-config.js"
|
231
|
-
* module.exports = {
|
232
|
-
* projectConfig: {
|
233
|
-
* auth_cors: process.env.AUTH_CORS,
|
234
|
-
* // ...
|
235
|
-
* },
|
236
|
-
* // ...
|
237
|
-
* }
|
238
|
-
* ```
|
239
|
-
*
|
240
|
-
* If you’re adding the value directly within `medusa-config.js`, make sure to add an extra escaping `/` for every backslash in the pattern. For example:
|
241
|
-
*
|
242
|
-
* ```js title="medusa-config.js"
|
243
|
-
* module.exports = {
|
244
|
-
* projectConfig: {
|
245
|
-
* auth_cors: "/http:\\/\\/localhost:700\\d+$/",
|
246
|
-
* // ...
|
247
|
-
* },
|
248
|
-
* // ...
|
249
|
-
* }
|
250
|
-
* ```
|
251
|
-
*/
|
252
|
-
auth_cors?: string;
|
253
|
-
/**
|
254
|
-
* A random string used to create cookie tokens. Although this configuration option is not required, it’s highly recommended to set it for better security.
|
255
|
-
*
|
256
|
-
* In a development environment, if this option is not set, the default secret is `supersecret` However, in production, if this configuration is not set, an error is thrown and
|
257
|
-
* the backend crashes.
|
258
|
-
*
|
259
|
-
* @example
|
260
|
-
* ```js title="medusa-config.js"
|
261
|
-
* module.exports = {
|
262
|
-
* projectConfig: {
|
263
|
-
* cookie_secret: process.env.COOKIE_SECRET ||
|
264
|
-
* "supersecret",
|
265
|
-
* // ...
|
266
|
-
* },
|
267
|
-
* // ...
|
268
|
-
* }
|
269
|
-
* ```
|
270
|
-
*/
|
271
|
-
cookie_secret?: string;
|
272
|
-
/**
|
273
|
-
* A random string used to create authentication tokens. Although this configuration option is not required, it’s highly recommended to set it for better security.
|
274
|
-
*
|
275
|
-
* In a development environment, if this option is not set the default secret is `supersecret` However, in production, if this configuration is not set an error, an
|
276
|
-
* error is thrown and the backend crashes.
|
277
|
-
*
|
278
|
-
* @example
|
279
|
-
* ```js title="medusa-config.js"
|
280
|
-
* module.exports = {
|
281
|
-
* projectConfig: {
|
282
|
-
* jwt_secret: process.env.JWT_SECRET ||
|
283
|
-
* "supersecret",
|
284
|
-
* // ...
|
285
|
-
* },
|
286
|
-
* // ...
|
287
|
-
* }
|
288
|
-
* ```
|
289
|
-
*/
|
290
|
-
jwt_secret?: string;
|
291
106
|
/**
|
292
107
|
* The name of the database to connect to. If specified in `database_url`, then it’s not required to include it.
|
293
108
|
*
|
@@ -542,6 +357,7 @@ export type ProjectConfigOptions = {
|
|
542
357
|
*/
|
543
358
|
session_options?: SessionOptions;
|
544
359
|
/**
|
360
|
+
* @deprecated - use `http.compression` instead
|
545
361
|
* Configure HTTP compression from the application layer. If you have access to the HTTP server, the recommended approach would be to enable it there.
|
546
362
|
* However, some platforms don't offer access to the HTTP layer and in those cases, this is a good alternative.
|
547
363
|
*
|
@@ -602,6 +418,267 @@ export type ProjectConfigOptions = {
|
|
602
418
|
* ```
|
603
419
|
*/
|
604
420
|
worker_mode?: "shared" | "worker" | "server";
|
421
|
+
/**
|
422
|
+
* Configure the application's http-specific settings
|
423
|
+
*
|
424
|
+
* @example
|
425
|
+
* ```js title="medusa-config.js"
|
426
|
+
* module.exports = {
|
427
|
+
* projectConfig: {
|
428
|
+
* http: {
|
429
|
+
* cookieSecret: "some-super-secret",
|
430
|
+
* compression: { ... },
|
431
|
+
* }
|
432
|
+
* // ...
|
433
|
+
* },
|
434
|
+
* // ...
|
435
|
+
* }
|
436
|
+
* ```
|
437
|
+
*/
|
438
|
+
http: {
|
439
|
+
/**
|
440
|
+
* A random string used to create authentication tokens in the http layer. Although this configuration option is not required, it’s highly recommended to set it for better security.
|
441
|
+
*
|
442
|
+
* In a development environment, if this option is not set the default secret is `supersecret` However, in production, if this configuration is not set an error, an
|
443
|
+
* error is thrown and the backend crashes.
|
444
|
+
*
|
445
|
+
* @example
|
446
|
+
* ```js title="medusa-config.js"
|
447
|
+
* module.exports = {
|
448
|
+
* projectConfig: {
|
449
|
+
* http: {
|
450
|
+
* cookieSecret: "supersecret"
|
451
|
+
* }
|
452
|
+
* },
|
453
|
+
* // ...
|
454
|
+
* }
|
455
|
+
* ```
|
456
|
+
*/
|
457
|
+
jwtSecret?: string;
|
458
|
+
/**
|
459
|
+
* The expiration time for the JWT token. If not provided, the default value is `24h`.
|
460
|
+
*
|
461
|
+
* @example
|
462
|
+
* ```js title="medusa-config.js"
|
463
|
+
* module.exports = {
|
464
|
+
* projectConfig: {
|
465
|
+
* http: {
|
466
|
+
* jwtExpiresIn: "2d"
|
467
|
+
* }
|
468
|
+
* },
|
469
|
+
* // ...
|
470
|
+
* }
|
471
|
+
* ```
|
472
|
+
*/
|
473
|
+
jwtExpiresIn?: string;
|
474
|
+
/**
|
475
|
+
* A random string used to create cookie tokens in the http layer. Although this configuration option is not required, it’s highly recommended to set it for better security.
|
476
|
+
*
|
477
|
+
* In a development environment, if this option is not set, the default secret is `supersecret` However, in production, if this configuration is not set, an error is thrown and
|
478
|
+
* the backend crashes.
|
479
|
+
*
|
480
|
+
* @example
|
481
|
+
* ```js title="medusa-config.js"
|
482
|
+
* module.exports = {
|
483
|
+
* projectConfig: {
|
484
|
+
* http: {
|
485
|
+
* cookieSecret: "supersecret"
|
486
|
+
* }
|
487
|
+
* // ...
|
488
|
+
* },
|
489
|
+
* // ...
|
490
|
+
* }
|
491
|
+
* ```
|
492
|
+
*/
|
493
|
+
cookieSecret?: string;
|
494
|
+
/**
|
495
|
+
* The Medusa backend’s API Routes are protected by Cross-Origin Resource Sharing (CORS). So, only allowed URLs or URLs matching a specified pattern can send requests to the backend’s API Routes.
|
496
|
+
*
|
497
|
+
* `cors` is a string used to specify the accepted URLs or patterns for API Routes starting with `/auth`. It can either be one accepted origin, or a comma-separated list of accepted origins.
|
498
|
+
*
|
499
|
+
* Every origin in that list must either be:
|
500
|
+
*
|
501
|
+
* 1. A URL. For example, `http://localhost:7001`. The URL must not end with a backslash;
|
502
|
+
* 2. Or a regular expression pattern that can match more than one origin. For example, `.example.com`. The regex pattern that the backend tests for is `^([\/~@;%#'])(.*?)\1([gimsuy]*)$`.
|
503
|
+
*
|
504
|
+
* @example
|
505
|
+
* Some example values of common use cases:
|
506
|
+
*
|
507
|
+
* ```bash
|
508
|
+
* # Allow different ports locally starting with 700
|
509
|
+
* AUTH_CORS=/http:\/\/localhost:700\d+$/
|
510
|
+
*
|
511
|
+
* # Allow any origin ending with vercel.app. For example, admin.vercel.app
|
512
|
+
* AUTH_CORS=/vercel\.app$/
|
513
|
+
*
|
514
|
+
* # Allow all HTTP requests
|
515
|
+
* AUTH_CORS=/http:\/\/.+/
|
516
|
+
* ```
|
517
|
+
*
|
518
|
+
* Then, set the configuration in `medusa-config.js`:
|
519
|
+
*
|
520
|
+
* ```js title="medusa-config.js"
|
521
|
+
* module.exports = {
|
522
|
+
* projectConfig: {
|
523
|
+
* http: {
|
524
|
+
* authCors: process.env.AUTH_CORS
|
525
|
+
* }
|
526
|
+
* // ...
|
527
|
+
* },
|
528
|
+
* // ...
|
529
|
+
* }
|
530
|
+
* ```
|
531
|
+
*
|
532
|
+
* If you’re adding the value directly within `medusa-config.js`, make sure to add an extra escaping `/` for every backslash in the pattern. For example:
|
533
|
+
*
|
534
|
+
* ```js title="medusa-config.js"
|
535
|
+
* module.exports = {
|
536
|
+
* projectConfig: {
|
537
|
+
* http: {
|
538
|
+
* authCors: "/http:\\/\\/localhost:700\\d+$/",
|
539
|
+
* }
|
540
|
+
* // ...
|
541
|
+
* },
|
542
|
+
* // ...
|
543
|
+
* }
|
544
|
+
* ```
|
545
|
+
*/
|
546
|
+
authCors: string;
|
547
|
+
/**
|
548
|
+
*
|
549
|
+
* Configure HTTP compression from the application layer. If you have access to the HTTP server, the recommended approach would be to enable it there.
|
550
|
+
* However, some platforms don't offer access to the HTTP layer and in those cases, this is a good alternative.
|
551
|
+
*
|
552
|
+
* Its value is an object that has the following properties:
|
553
|
+
*
|
554
|
+
* If you enable HTTP compression and you want to disable it for specific API Routes, you can pass in the request header `"x-no-compression": true`.
|
555
|
+
*
|
556
|
+
* @example
|
557
|
+
* ```js title="medusa-config.js"
|
558
|
+
* module.exports = {
|
559
|
+
* projectConfig: {
|
560
|
+
* http: {
|
561
|
+
* compression: {
|
562
|
+
* enabled: true,
|
563
|
+
* level: 6,
|
564
|
+
* memLevel: 8,
|
565
|
+
* threshold: 1024,
|
566
|
+
* }
|
567
|
+
* },
|
568
|
+
* // ...
|
569
|
+
* },
|
570
|
+
* // ...
|
571
|
+
* }
|
572
|
+
* ```
|
573
|
+
*/
|
574
|
+
compression?: HttpCompressionOptions;
|
575
|
+
/**
|
576
|
+
* The Medusa backend’s API Routes are protected by Cross-Origin Resource Sharing (CORS). So, only allowed URLs or URLs matching a specified pattern can send requests to the backend’s API Routes.
|
577
|
+
*
|
578
|
+
* `store_cors` is a string used to specify the accepted URLs or patterns for store API Routes. It can either be one accepted origin, or a comma-separated list of accepted origins.
|
579
|
+
*
|
580
|
+
* Every origin in that list must either be:
|
581
|
+
*
|
582
|
+
* 1. A URL. For example, `http://localhost:8000`. The URL must not end with a backslash;
|
583
|
+
* 2. Or a regular expression pattern that can match more than one origin. For example, `.example.com`. The regex pattern that the backend tests for is `^([\/~@;%#'])(.*?)\1([gimsuy]*)$`.
|
584
|
+
*
|
585
|
+
* @example
|
586
|
+
* Some example values of common use cases:
|
587
|
+
*
|
588
|
+
* ```bash
|
589
|
+
* # Allow different ports locally starting with 800
|
590
|
+
* STORE_CORS=/http:\/\/localhost:800\d+$/
|
591
|
+
*
|
592
|
+
* # Allow any origin ending with vercel.app. For example, storefront.vercel.app
|
593
|
+
* STORE_CORS=/vercel\.app$/
|
594
|
+
*
|
595
|
+
* # Allow all HTTP requests
|
596
|
+
* STORE_CORS=/http:\/\/.+/
|
597
|
+
* ```
|
598
|
+
*
|
599
|
+
* Then, set the configuration in `medusa-config.js`:
|
600
|
+
*
|
601
|
+
* ```js title="medusa-config.js"
|
602
|
+
* module.exports = {
|
603
|
+
* projectConfig: {
|
604
|
+
* http: {
|
605
|
+
* storeCors: process.env.STORE_CORS,
|
606
|
+
* }
|
607
|
+
* // ...
|
608
|
+
* },
|
609
|
+
* // ...
|
610
|
+
* }
|
611
|
+
* ```
|
612
|
+
*
|
613
|
+
* If you’re adding the value directly within `medusa-config.js`, make sure to add an extra escaping `/` for every backslash in the pattern. For example:
|
614
|
+
*
|
615
|
+
* ```js title="medusa-config.js"
|
616
|
+
* module.exports = {
|
617
|
+
* projectConfig: {
|
618
|
+
* http: {
|
619
|
+
* storeCors: "/vercel\\.app$/",
|
620
|
+
* }
|
621
|
+
* // ...
|
622
|
+
* },
|
623
|
+
* // ...
|
624
|
+
* }
|
625
|
+
* ```
|
626
|
+
*/
|
627
|
+
storeCors: string;
|
628
|
+
/**
|
629
|
+
* The Medusa backend’s API Routes are protected by Cross-Origin Resource Sharing (CORS). So, only allowed URLs or URLs matching a specified pattern can send requests to the backend’s API Routes.
|
630
|
+
*
|
631
|
+
* `admin_cors` is a string used to specify the accepted URLs or patterns for admin API Routes. It can either be one accepted origin, or a comma-separated list of accepted origins.
|
632
|
+
*
|
633
|
+
* Every origin in that list must either be:
|
634
|
+
*
|
635
|
+
* 1. A URL. For example, `http://localhost:7001`. The URL must not end with a backslash;
|
636
|
+
* 2. Or a regular expression pattern that can match more than one origin. For example, `.example.com`. The regex pattern that the backend tests for is `^([\/~@;%#'])(.*?)\1([gimsuy]*)$`.
|
637
|
+
*
|
638
|
+
* @example
|
639
|
+
* Some example values of common use cases:
|
640
|
+
*
|
641
|
+
* ```bash
|
642
|
+
* # Allow different ports locally starting with 700
|
643
|
+
* ADMIN_CORS=/http:\/\/localhost:700\d+$/
|
644
|
+
*
|
645
|
+
* # Allow any origin ending with vercel.app. For example, admin.vercel.app
|
646
|
+
* ADMIN_CORS=/vercel\.app$/
|
647
|
+
*
|
648
|
+
* # Allow all HTTP requests
|
649
|
+
* ADMIN_CORS=/http:\/\/.+/
|
650
|
+
* ```
|
651
|
+
*
|
652
|
+
* Then, set the configuration in `medusa-config.js`:
|
653
|
+
*
|
654
|
+
* ```js title="medusa-config.js"
|
655
|
+
* module.exports = {
|
656
|
+
* projectConfig: {
|
657
|
+
* http: {
|
658
|
+
* adminCors: process.env.ADMIN_CORS,
|
659
|
+
* }
|
660
|
+
* // ...
|
661
|
+
* },
|
662
|
+
* // ...
|
663
|
+
* }
|
664
|
+
* ```
|
665
|
+
*
|
666
|
+
* If you’re adding the value directly within `medusa-config.js`, make sure to add an extra escaping `/` for every backslash in the pattern. For example:
|
667
|
+
*
|
668
|
+
* ```js title="medusa-config.js"
|
669
|
+
* module.exports = {
|
670
|
+
* projectConfig: {
|
671
|
+
* http: {
|
672
|
+
* adminCors: process.env.ADMIN_CORS,
|
673
|
+
* }
|
674
|
+
* // ...
|
675
|
+
* },
|
676
|
+
* // ...
|
677
|
+
* }
|
678
|
+
* ```
|
679
|
+
*/
|
680
|
+
adminCors: string;
|
681
|
+
};
|
605
682
|
};
|
606
683
|
/**
|
607
684
|
* @interface
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"config-module.d.ts","sourceRoot":"","sources":["../../src/common/config-module.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,yBAAyB,EACzB,yBAAyB,EAC1B,MAAM,gBAAgB,CAAA;AAEvB,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,SAAS,CAAA;AAC3C,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,SAAS,CAAA;AAC5C,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,MAAM,CAAA;AAExC;;;;GAIG;AACH,MAAM,MAAM,YAAY,GAAG;IACzB;;;OAGG;IACH,OAAO,CAAC,EAAE,OAAO,CAAA;IACjB;;;;;;;;OAQG;IACH,IAAI,CAAC,EAAE,IAAI,MAAM,EAAE,CAAA;IACnB;;;OAGG;IACH,MAAM,CAAC,EAAE,MAAM,CAAA;IACf;;;OAGG;IACH,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,YAAY,KAAK,YAAY,CAAA;CAC9C,CAAA;AAED;;;;GAIG;AACH,KAAK,cAAc,GAAG;IACpB;;;OAGG;IACH,IAAI,CAAC,EAAE,MAAM,CAAA;IACb;;;OAGG;IACH,MAAM,CAAC,EAAE,OAAO,CAAA;IAChB;;;OAGG;IACH,OAAO,CAAC,EAAE,OAAO,CAAA;IACjB;;;OAGG;IACH,iBAAiB,CAAC,EAAE,OAAO,CAAA;IAC3B;;;OAGG;IACH,MAAM,CAAC,EAAE,MAAM,CAAA;IACf;;;OAGG;IACH,GAAG,CAAC,EAAE,MAAM,CAAA;CACb,CAAA;AAED;;;;GAIG;AACH,MAAM,MAAM,sBAAsB,GAAG;IACnC;;OAEG;IACH,OAAO,CAAC,EAAE,OAAO,CAAA;IACjB;;;OAGG;IACH,KAAK,CAAC,EAAE,MAAM,CAAA;IACd;;;OAGG;IACH,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB;;;OAGG;IACH,SAAS,CAAC,EAAE,MAAM,GAAG,MAAM,CAAA;CAC5B,CAAA;AAED;;;;GAIG;AACH,MAAM,MAAM,oBAAoB,GAAG;IACjC
|
1
|
+
{"version":3,"file":"config-module.d.ts","sourceRoot":"","sources":["../../src/common/config-module.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,yBAAyB,EACzB,yBAAyB,EAC1B,MAAM,gBAAgB,CAAA;AAEvB,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,SAAS,CAAA;AAC3C,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,SAAS,CAAA;AAC5C,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,MAAM,CAAA;AAExC;;;;GAIG;AACH,MAAM,MAAM,YAAY,GAAG;IACzB;;;OAGG;IACH,OAAO,CAAC,EAAE,OAAO,CAAA;IACjB;;;;;;;;OAQG;IACH,IAAI,CAAC,EAAE,IAAI,MAAM,EAAE,CAAA;IACnB;;;OAGG;IACH,MAAM,CAAC,EAAE,MAAM,CAAA;IACf;;;OAGG;IACH,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,YAAY,KAAK,YAAY,CAAA;CAC9C,CAAA;AAED;;;;GAIG;AACH,KAAK,cAAc,GAAG;IACpB;;;OAGG;IACH,IAAI,CAAC,EAAE,MAAM,CAAA;IACb;;;OAGG;IACH,MAAM,CAAC,EAAE,OAAO,CAAA;IAChB;;;OAGG;IACH,OAAO,CAAC,EAAE,OAAO,CAAA;IACjB;;;OAGG;IACH,iBAAiB,CAAC,EAAE,OAAO,CAAA;IAC3B;;;OAGG;IACH,MAAM,CAAC,EAAE,MAAM,CAAA;IACf;;;OAGG;IACH,GAAG,CAAC,EAAE,MAAM,CAAA;CACb,CAAA;AAED;;;;GAIG;AACH,MAAM,MAAM,sBAAsB,GAAG;IACnC;;OAEG;IACH,OAAO,CAAC,EAAE,OAAO,CAAA;IACjB;;;OAGG;IACH,KAAK,CAAC,EAAE,MAAM,CAAA;IACd;;;OAGG;IACH,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB;;;OAGG;IACH,SAAS,CAAC,EAAE,MAAM,GAAG,MAAM,CAAA;CAC5B,CAAA;AAED;;;;GAIG;AACH,MAAM,MAAM,oBAAoB,GAAG;IACjC;;;;;;;;;;;;;;;;;OAiBG;IACH,iBAAiB,CAAC,EAAE,MAAM,CAAA;IAE1B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAmCG;IACH,YAAY,CAAC,EAAE,MAAM,CAAA;IACrB;;;;;;;;;;;;;OAaG;IACH,eAAe,CAAC,EAAE,MAAM,CAAA;IAExB;;;;;;;;;;;;;;;;;;;;;OAqBG;IACH,gBAAgB,EAAE,aAAa,CAAA;IAE/B;;;;;;OAMG;IACH,aAAa,CAAC,EAAE,MAAM,CAAA;IAEtB;;;;;;;;;;;;;;;;;;;;OAoBG;IACH,cAAc,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG;QACzC;;WAEG;QACH,GAAG,EAAE;YACH;;eAEG;YACH,kBAAkB,EAAE,KAAK,CAAA;SAC1B,CAAA;KACF,CAAA;IAED;;;;;;;;;;;;;;;;;;;;OAoBG;IACH,uBAAuB,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG;QAClD,UAAU,CAAC,EAAE;YACX;;eAEG;YACH,GAAG,CAAC,EAAE;gBACJ;;mBAEG;gBACH,kBAAkB,CAAC,EAAE,KAAK,CAAA;aAC3B,CAAA;SACF,CAAA;KACF,CAAA;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACH,SAAS,CAAC,EAAE,MAAM,CAAA;IAElB;;;;;;;;;;;;;;;;OAgBG;IACH,YAAY,CAAC,EAAE,MAAM,CAAA;IAErB;;;;;;;;;;;;;;;;;OAiBG;IACH,aAAa,CAAC,EAAE,YAAY,CAAA;IAE5B;;;;;;;;;;;;;;;;OAgBG;IACH,eAAe,CAAC,EAAE,cAAc,CAAA;IAEhC;;;;;;;;;;;;;;;;;;;;;;;;OAwBG;IACH,gBAAgB,CAAC,EAAE,sBAAsB,CAAA;IAEzC;;;;;;;;;;;;;OAaG;IACH,eAAe,CAAC,EAAE,MAAM,CAAA;IAExB;;;;;;;;;;;;;;;;;;;OAmBG;IACH,WAAW,CAAC,EAAE,QAAQ,GAAG,QAAQ,GAAG,QAAQ,CAAA;IAE5C;;;;;;;;;;;;;;;;OAgBG;IACH,IAAI,EAAE;QACJ;;;;;;;;;;;;;;;;;WAiBG;QACH,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB;;;;;;;;;;;;;;WAcG;QACH,YAAY,CAAC,EAAE,MAAM,CAAA;QACrB;;;;;;;;;;;;;;;;;;WAkBG;QACH,YAAY,CAAC,EAAE,MAAM,CAAA;QACrB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WAmDG;QACH,QAAQ,EAAE,MAAM,CAAA;QAChB;;;;;;;;;;;;;;;;;;;;;;;;;;WA0BG;QACH,WAAW,CAAC,EAAE,sBAAsB,CAAA;QACpC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WAmDG;QACH,SAAS,EAAE,MAAM,CAAA;QACjB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WAmDG;QACH,SAAS,EAAE,MAAM,CAAA;KAClB,CAAA;CACF,CAAA;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,MAAM,MAAM,YAAY,GAAG;IACzB;;OAEG;IACH,aAAa,EAAE,oBAAoB,CAAA;IAEnC;;OAEG;IACH,KAAK,CAAC,EAAE,YAAY,CAAA;IAEpB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACH,OAAO,EAAE,CACL;QACE,OAAO,EAAE,MAAM,CAAA;QACf,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;KACjC,GACD,MAAM,CACT,EAAE,CAAA;IAEH;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAoCG;IACH,OAAO,CAAC,EAAE,MAAM,CACd,MAAM,EACN,OAAO,GAAG,OAAO,CAAC,yBAAyB,GAAG,yBAAyB,CAAC,CACzE,CAAA;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACH,YAAY,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,GAAG,MAAM,CAAC,CAAA;CAC/C,CAAA;AAED,MAAM,MAAM,aAAa,GAAG;IAC1B,OAAO,EAAE,MAAM,CAAA;IACf,IAAI,EAAE,MAAM,CAAA;IACZ,EAAE,EAAE,MAAM,CAAA;IACV,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IAChC,OAAO,EAAE,MAAM,CAAA;CAChB,CAAA"}
|