@mikeyt23/node-cli-utils 1.4.1 → 2.0.0-beta.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (76) hide show
  1. package/README.md +45 -87
  2. package/dist/cjs/GitUtility.d.ts +7 -0
  3. package/dist/cjs/GitUtility.d.ts.map +1 -0
  4. package/dist/cjs/GitUtility.js +49 -0
  5. package/dist/cjs/NodeCliUtilsConfig.d.ts +21 -0
  6. package/dist/cjs/NodeCliUtilsConfig.d.ts.map +1 -0
  7. package/dist/cjs/NodeCliUtilsConfig.js +41 -0
  8. package/dist/cjs/TarballUtility.d.ts +63 -0
  9. package/dist/cjs/TarballUtility.d.ts.map +1 -0
  10. package/dist/cjs/TarballUtility.js +143 -0
  11. package/dist/cjs/certUtils.d.ts +66 -0
  12. package/dist/cjs/certUtils.d.ts.map +1 -0
  13. package/dist/cjs/certUtils.js +283 -0
  14. package/dist/cjs/dbMigrationUtils.d.ts +39 -0
  15. package/dist/cjs/dbMigrationUtils.d.ts.map +1 -0
  16. package/dist/cjs/dbMigrationUtils.js +195 -0
  17. package/dist/cjs/dotnetUtils.d.ts +25 -0
  18. package/dist/cjs/dotnetUtils.d.ts.map +1 -0
  19. package/dist/cjs/dotnetUtils.js +61 -0
  20. package/dist/cjs/esmSpecific.d.mts +7 -0
  21. package/dist/cjs/esmSpecific.d.mts.map +1 -0
  22. package/dist/cjs/esmSpecific.mjs +15 -0
  23. package/dist/cjs/generalUtils.d.ts +565 -0
  24. package/dist/cjs/generalUtils.d.ts.map +1 -0
  25. package/dist/cjs/generalUtils.js +1068 -0
  26. package/dist/cjs/generalUtilsInternal.d.ts +15 -0
  27. package/dist/cjs/generalUtilsInternal.d.ts.map +1 -0
  28. package/dist/cjs/generalUtilsInternal.js +317 -0
  29. package/dist/cjs/hostsUtils.d.ts +16 -0
  30. package/dist/cjs/hostsUtils.d.ts.map +1 -0
  31. package/dist/cjs/hostsUtils.js +82 -0
  32. package/dist/cjs/index.d.ts +4 -0
  33. package/dist/cjs/index.d.ts.map +1 -0
  34. package/dist/cjs/index.js +25 -0
  35. package/dist/cjs/package.json +5 -0
  36. package/dist/cjs/runWhileParentAlive.d.ts +2 -0
  37. package/dist/cjs/runWhileParentAlive.d.ts.map +1 -0
  38. package/dist/cjs/runWhileParentAlive.js +159 -0
  39. package/dist/esm/GitUtility.d.ts +7 -0
  40. package/dist/esm/GitUtility.d.ts.map +1 -0
  41. package/dist/esm/GitUtility.js +43 -0
  42. package/dist/esm/NodeCliUtilsConfig.d.ts +21 -0
  43. package/dist/esm/NodeCliUtilsConfig.d.ts.map +1 -0
  44. package/dist/esm/NodeCliUtilsConfig.js +35 -0
  45. package/dist/esm/TarballUtility.d.ts +63 -0
  46. package/dist/esm/TarballUtility.d.ts.map +1 -0
  47. package/dist/esm/TarballUtility.js +139 -0
  48. package/dist/esm/certUtils.d.ts +66 -0
  49. package/dist/esm/certUtils.d.ts.map +1 -0
  50. package/dist/esm/certUtils.js +271 -0
  51. package/dist/esm/dbMigrationUtils.d.ts +39 -0
  52. package/dist/esm/dbMigrationUtils.d.ts.map +1 -0
  53. package/dist/esm/dbMigrationUtils.js +184 -0
  54. package/dist/esm/dotnetUtils.d.ts +25 -0
  55. package/dist/esm/dotnetUtils.d.ts.map +1 -0
  56. package/dist/esm/dotnetUtils.js +54 -0
  57. package/dist/esm/esmSpecific.d.mts +7 -0
  58. package/dist/esm/esmSpecific.d.mts.map +1 -0
  59. package/dist/esm/esmSpecific.mjs +11 -0
  60. package/dist/esm/generalUtils.d.ts +565 -0
  61. package/dist/esm/generalUtils.d.ts.map +1 -0
  62. package/dist/esm/generalUtils.js +976 -0
  63. package/dist/esm/generalUtilsInternal.d.ts +15 -0
  64. package/dist/esm/generalUtilsInternal.d.ts.map +1 -0
  65. package/dist/esm/generalUtilsInternal.js +278 -0
  66. package/dist/esm/hostsUtils.d.ts +16 -0
  67. package/dist/esm/hostsUtils.d.ts.map +1 -0
  68. package/dist/esm/hostsUtils.js +69 -0
  69. package/dist/esm/index.d.ts +4 -0
  70. package/dist/esm/index.d.ts.map +1 -0
  71. package/dist/esm/index.js +4 -0
  72. package/dist/esm/runWhileParentAlive.d.ts +2 -0
  73. package/dist/esm/runWhileParentAlive.d.ts.map +1 -0
  74. package/dist/esm/runWhileParentAlive.js +151 -0
  75. package/package.json +69 -10
  76. package/index.js +0 -627
@@ -0,0 +1,283 @@
1
+ "use strict";
2
+ var __importDefault = (this && this.__importDefault) || function (mod) {
3
+ return (mod && mod.__esModule) ? mod : { "default": mod };
4
+ };
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ exports.linuxInstallCert = exports.winGetPfxInfo = exports.winUninstallCert = exports.winCertIsInstalled = exports.winInstallCert = exports.generateCertWithOpenSsl = void 0;
7
+ const node_fs_1 = __importDefault(require("node:fs"));
8
+ const promises_1 = __importDefault(require("node:fs/promises"));
9
+ const node_path_1 = __importDefault(require("node:path"));
10
+ const generalUtils_js_1 = require("./generalUtils.js");
11
+ const defaultCertLogOptions = {
12
+ logSpawnOutput: false,
13
+ logTraceMessages: false,
14
+ logElevatedPermissionsMessage: true,
15
+ logSuccess: true
16
+ };
17
+ /**
18
+ * Wrapper function for calling openssl to generate a self-signed cert to be used for developing a local website with trusted https.
19
+ * @param url The url to generate a cert for. This will be used as the common name (CN) in the cert as well as the filename for the generated cert files.
20
+ * @param options Options for generating the cert.
21
+ * @returns The path to the generated pfx file.
22
+ */
23
+ async function generateCertWithOpenSsl(url, options) {
24
+ (0, generalUtils_js_1.requireString)('url', url);
25
+ throwIfMaybeBadUrlChars(url);
26
+ const isMac = (0, generalUtils_js_1.isPlatformMac)();
27
+ const mergedOptions = { ...defaultCertLogOptions, outputDirectory: './cert', ...options };
28
+ const spawnArgs = { cwd: mergedOptions.outputDirectory, stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' };
29
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, 'checking if openssl is installed');
30
+ let brewOpenSslPath = '';
31
+ if (!isMac) {
32
+ const openSslPath = (0, generalUtils_js_1.whichSync)('openssl').location;
33
+ if (!openSslPath) {
34
+ throw Error('openssl is required but was not found');
35
+ }
36
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, `using openssl at: ${openSslPath}`);
37
+ }
38
+ else if (isMac) {
39
+ const brewOpenSslDirectory = getBrewOpensslPath();
40
+ if (!brewOpenSslDirectory) {
41
+ throw Error('openssl (brew version) is required but was not found');
42
+ }
43
+ brewOpenSslPath = `${getBrewOpensslPath()}/bin/openssl`;
44
+ if (!node_fs_1.default.existsSync(brewOpenSslPath)) {
45
+ throw Error(`openssl (brew version) is required but was not found at: ${brewOpenSslPath}`);
46
+ }
47
+ else {
48
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, `using openssl at: ${brewOpenSslPath}`);
49
+ }
50
+ }
51
+ (0, generalUtils_js_1.ensureDirectory)(mergedOptions.outputDirectory);
52
+ const crtName = url + '.crt';
53
+ const keyName = url + '.key';
54
+ const pfxName = url + '.pfx';
55
+ const sanCnfName = url + '.cnf';
56
+ const filesToCheck = [crtName, keyName, pfxName, sanCnfName];
57
+ for (const file of filesToCheck) {
58
+ const filePath = node_path_1.default.join(mergedOptions.outputDirectory, file);
59
+ if (node_fs_1.default.existsSync(filePath)) {
60
+ throw Error(`${generalUtils_js_1.Emoji.Stop} File ${filePath} already exists. Delete or rename all of the following files from '${mergedOptions.outputDirectory}' if you want to generate a new cert: ${filesToCheck.join(', ')}.`);
61
+ }
62
+ }
63
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, `writing ${sanCnfName} file for use with openssl command`);
64
+ const sanCnfContents = getSanCnfFileContents(url);
65
+ const sanCnfPath = node_path_1.default.join(mergedOptions.outputDirectory, sanCnfName);
66
+ await promises_1.default.writeFile(sanCnfPath, sanCnfContents);
67
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, `attempting to generate cert ${pfxName}`);
68
+ const genKeyAndCrtArgs = `req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout ${keyName} -out ${crtName} -subj /CN=${url} -config ${sanCnfName}`.split(' ');
69
+ const command = isMac ? brewOpenSslPath : 'openssl';
70
+ let result = await (0, generalUtils_js_1.spawnAsync)(command, genKeyAndCrtArgs, spawnArgs);
71
+ throwIfSpawnResultError(result);
72
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, 'converting key and crt to pfx');
73
+ const convertToPfxArgs = `pkcs12 -certpbe AES-256-CBC -export -out ${pfxName} -aes256 -inkey ${keyName} -in ${crtName} -password pass:`.split(' ');
74
+ result = await (0, generalUtils_js_1.spawnAsync)(command, convertToPfxArgs, spawnArgs);
75
+ throwIfSpawnResultError(result);
76
+ const pfxPath = node_path_1.default.join(mergedOptions.outputDirectory, pfxName);
77
+ (0, generalUtils_js_1.logIf)(mergedOptions.logSuccess, `${generalUtils_js_1.Emoji.GreenCheck} Successfully generated cert: ${pfxPath}`);
78
+ return pfxPath;
79
+ }
80
+ exports.generateCertWithOpenSsl = generateCertWithOpenSsl;
81
+ /**
82
+ * Uses Powershell to install a cert to the local machine's trusted root store. Must have elevated permissions.
83
+ * If the cert is already installed, this function will do nothing.
84
+ * @param pfxPath The path to the pfx file to install.
85
+ */
86
+ async function winInstallCert(pfxPath, options) {
87
+ if (!(0, generalUtils_js_1.isPlatformWindows)()) {
88
+ throw Error('winInstallCert is only supported on Windows');
89
+ }
90
+ validatePfxPath(pfxPath);
91
+ const mergedOptions = { ...defaultCertLogOptions, ...options };
92
+ (0, generalUtils_js_1.logIf)(mergedOptions.logElevatedPermissionsMessage, getRequiresElevatedPermissionsMessage(true));
93
+ if (await winCertIsInstalled({ pfxPath }, mergedOptions)) {
94
+ const certInfo = await winGetPfxInfo(pfxPath);
95
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, `${generalUtils_js_1.Emoji.Warning} certificate '${pfxPath}' with subject '${certInfo.subject}' is already installed - to install it again, first uninstall it manually or with the winUninstallCert function`);
96
+ return;
97
+ }
98
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, `installing cert '${pfxPath}'`);
99
+ const psCommandArgs = (0, generalUtils_js_1.getPowershellHackArgs)(`Import-PfxCertificate -FilePath '${pfxPath}' -CertStoreLocation Cert:\\LocalMachine\\Root`);
100
+ const result = await (0, generalUtils_js_1.spawnAsync)('powershell', psCommandArgs, { stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' });
101
+ throwIfSpawnResultError(result);
102
+ (0, generalUtils_js_1.logIf)(mergedOptions.logSuccess, `${generalUtils_js_1.Emoji.GreenCheck} Successfully installed cert: ${pfxPath}`);
103
+ }
104
+ exports.winInstallCert = winInstallCert;
105
+ /**
106
+ * Uses Powershell to check if a cert is already installed to the local machine's trusted root store.
107
+ * Uses the subject of the cert in order to avoid false negatives from regenerating the same self-signed cert
108
+ * with the same subject but different thumbprint. Note that this method is geared towards use with certs generated
109
+ * with the {@link generateCertWithOpenSsl} function, so this may not work using subject if your subject is not precisely "`CN=<url>`".
110
+ * @param identifier The subject or path to the pfx file of the cert to check.
111
+ * @returns `true` if the cert is already installed, `false` otherwise.
112
+ */
113
+ async function winCertIsInstalled(identifier, options) {
114
+ if (!(0, generalUtils_js_1.isPlatformWindows)()) {
115
+ throw new Error('winCertIsInstalled is only supported on Windows');
116
+ }
117
+ const mergedOptions = { ...defaultCertLogOptions, ...options };
118
+ let psCommandArgs;
119
+ // Get the count of certs installed with the same subject as the one we're trying to install
120
+ if (typeof identifier === 'string') {
121
+ (0, generalUtils_js_1.requireString)('subject', identifier);
122
+ validateSubject(identifier);
123
+ const subject = identifier.startsWith('CN=') ? identifier : `CN=${identifier}`;
124
+ psCommandArgs = (0, generalUtils_js_1.getPowershellHackArgs)(`Write-Host (Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -eq '${subject}' } | Measure-Object).Count`);
125
+ }
126
+ else if ('pfxPath' in identifier) {
127
+ validatePfxPath(identifier.pfxPath);
128
+ psCommandArgs = (0, generalUtils_js_1.getPowershellHackArgs)(`Write-Host (Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -eq (Get-PfxCertificate -FilePath '${identifier.pfxPath}').Subject } | Measure-Object).Count`);
129
+ }
130
+ const tracePart = (typeof identifier === 'string') ? `subject ${identifier}` : `pfxPath ${identifier.pfxPath}`;
131
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, `checking if cert with ${tracePart} is already installed`);
132
+ const result = await (0, generalUtils_js_1.spawnAsync)('powershell', psCommandArgs, { stdio: 'pipe' });
133
+ throwIfSpawnResultError(result);
134
+ const lines = (0, generalUtils_js_1.stringToNonEmptyLines)(result.stdout);
135
+ if (lines.length !== 1) {
136
+ throw new Error(`Unexpected output from powershell command to check if the cert is already installed: ${result.stdout}`);
137
+ }
138
+ return lines[0].trim() !== '0';
139
+ }
140
+ exports.winCertIsInstalled = winCertIsInstalled;
141
+ /**
142
+ * Uses Powershell to uninstall a cert from the local machine's trusted root store. Must have elevated permissions.
143
+ * @param identifier The subject, thumbprint or path to the pfx file of the cert to uninstall.
144
+ * @param options Options for uninstalling the cert.
145
+ */
146
+ async function winUninstallCert(identifier, options) {
147
+ if (!(0, generalUtils_js_1.isPlatformWindows)()) {
148
+ throw new Error('winUninstallCert is only supported on Windows');
149
+ }
150
+ const mergedOptions = { ...defaultCertLogOptions, ...options };
151
+ (0, generalUtils_js_1.logIf)(mergedOptions.logElevatedPermissionsMessage, getRequiresElevatedPermissionsMessage(false));
152
+ let psCommandArgs;
153
+ if (typeof identifier === 'string') {
154
+ (0, generalUtils_js_1.requireString)('subject', identifier);
155
+ validateSubject(identifier);
156
+ psCommandArgs = (0, generalUtils_js_1.getPowershellHackArgs)(`Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -match '${identifier}' } | Remove-Item`);
157
+ }
158
+ else if ('thumbprint' in identifier) {
159
+ validateNoQuotes('thumbprint', identifier.thumbprint);
160
+ psCommandArgs = (0, generalUtils_js_1.getPowershellHackArgs)(`Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Thumbprint -eq '${identifier.thumbprint}' } | Remove-Item`);
161
+ }
162
+ else if ('pfxPath' in identifier) {
163
+ validatePfxPath(identifier.pfxPath);
164
+ psCommandArgs = (0, generalUtils_js_1.getPowershellHackArgs)(`$thumbprint = (Get-PfxCertificate -FilePath '${identifier.pfxPath}').Thumbprint; Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Thumbprint -eq $thumbprint } | Remove-Item`);
165
+ }
166
+ const tracePart = typeof identifier === 'string' ? `'${identifier}'` : JSON.stringify(identifier);
167
+ (0, generalUtils_js_1.logIf)(mergedOptions.logTraceMessages, `uninstalling cert ${tracePart}`);
168
+ const result = await (0, generalUtils_js_1.spawnAsync)('powershell', psCommandArgs, { stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' });
169
+ throwIfSpawnResultError(result);
170
+ (0, generalUtils_js_1.logIf)(mergedOptions.logSuccess, `${generalUtils_js_1.Emoji.GreenCheck} Successfully uninstalled cert`);
171
+ }
172
+ exports.winUninstallCert = winUninstallCert;
173
+ /**
174
+ * Uses Powershell to get info about a cert.
175
+ * @param pfxPath The path to the pfx file to get info for.
176
+ * @returns The subject, thumbprint and pfxPath of the cert.
177
+ */
178
+ async function winGetPfxInfo(pfxPath) {
179
+ if (!(0, generalUtils_js_1.isPlatformWindows)()) {
180
+ throw new Error('winGetPfxInfo is only supported on Windows');
181
+ }
182
+ validatePfxPath(pfxPath);
183
+ const psCommandArgs = (0, generalUtils_js_1.getPowershellHackArgs)(`Get-PfxCertificate -FilePath '${pfxPath}' | Select-Object -Property Subject, Thumbprint, @{Name='PfxPath';Expression={'${pfxPath}'}} | ConvertTo-Json`);
184
+ const result = await (0, generalUtils_js_1.spawnAsync)('powershell', psCommandArgs, { stdio: 'pipe' });
185
+ throwIfSpawnResultError(result);
186
+ const json = result.stdout.trim();
187
+ const parsedJson = JSON.parse(json);
188
+ const certInfo = {
189
+ subject: parsedJson.Subject,
190
+ thumbprint: parsedJson.Thumbprint,
191
+ pfxPath: parsedJson.PfxPath
192
+ };
193
+ return certInfo;
194
+ }
195
+ exports.winGetPfxInfo = winGetPfxInfo;
196
+ /**
197
+ * Does not actually do anything - just outputs the manual instructions for installing a cert for use by chrome on linux.
198
+ */
199
+ function linuxInstallCert() {
200
+ const instructions = `Automated linux cert install not supported (chrome does not use system certs without significant extra configuration).
201
+ Manual Instructions:
202
+ - In Chrome, go to chrome://settings/certificates
203
+ - Select Authorities -> import
204
+ - Select your generated .crt file (in the ./cert/ directory by default - if you haven't generated it, see the generateCertWithOpenSsl function)
205
+ - Check box for "Trust certificate for identifying websites"
206
+ - Click OK
207
+ - Reload site`;
208
+ console.log(instructions);
209
+ }
210
+ exports.linuxInstallCert = linuxInstallCert;
211
+ function throwIfMaybeBadUrlChars(url, varName = 'url') {
212
+ if (url.includes(' ')) {
213
+ throw Error(`${varName} should not contain spaces`);
214
+ }
215
+ if (url.includes('/')) {
216
+ throw Error(`${varName} should not contain forward slashes`);
217
+ }
218
+ if (url.includes('\\')) {
219
+ throw Error(`${varName} should not contain backslashes`);
220
+ }
221
+ }
222
+ function getBrewOpensslPath() {
223
+ const brewResult = (0, generalUtils_js_1.simpleSpawnSync)('brew', ['--prefix', 'openssl']);
224
+ if (brewResult.error) {
225
+ throw Error('error attempting to find openssl installed by brew');
226
+ }
227
+ if (brewResult.stdoutLines.length === 0 || brewResult.stdoutLines.length > 1) {
228
+ throw new Error(`unexpected output from brew command 'brew --prefix openssl': ${brewResult.stdout}`);
229
+ }
230
+ return brewResult.stdoutLines[0];
231
+ }
232
+ function getSanCnfFileContents(url) {
233
+ return sanCnfTemplate.replace(/{{url}}/g, url);
234
+ }
235
+ function validateSubject(subject) {
236
+ if (subject.includes('\\') || subject.includes('/') || subject.endsWith('.pfx')) {
237
+ throw new Error(`The subject appears to be a file path, which is not allowed. Did you mean to pass something like this instead: { pfxPath: '${subject}' } ?`);
238
+ }
239
+ validateNoQuotes('subject', subject);
240
+ }
241
+ function validateNoQuotes(name, value) {
242
+ if (value.includes("'") || value.includes('"')) {
243
+ throw new Error(`The value passed for '${name}' contains a single or double quote, which is not allowed.`);
244
+ }
245
+ }
246
+ function throwIfSpawnResultError(result) {
247
+ if (result.code !== 0) {
248
+ // There won't be any stderr if stdio was set to 'inherit', so we're checking first
249
+ if (result.stderr) {
250
+ console.error((0, generalUtils_js_1.red)('Error:'), result.stderr);
251
+ }
252
+ throw Error(`Spawned command failed with exit code ${result.code}`);
253
+ }
254
+ }
255
+ function validatePfxPath(pfxPath) {
256
+ if (!pfxPath.endsWith('.pfx')) {
257
+ throw new Error('pfxPath must end with .pfx');
258
+ }
259
+ (0, generalUtils_js_1.requireValidPath)('pfxPath', pfxPath);
260
+ validateNoQuotes('pfxPath', pfxPath);
261
+ }
262
+ function getRequiresElevatedPermissionsMessage(isInstall = true) {
263
+ return `${generalUtils_js_1.Emoji.Info} Important: ${isInstall ? '' : 'un'}installing a certificate requires elevated permissions`;
264
+ }
265
+ // Newer cert requirements force the need for "extension info" with DNS and IP info, but openssl v1.x doesn't support that with the
266
+ // CLI option -addext, so we're using a san.cnf file instead and passing this into the CLI command with the -config option.
267
+ const sanCnfTemplate = `[req]
268
+ distinguished_name=req
269
+ x509_extensions = v3_req
270
+ prompt = no
271
+
272
+ [req_distinguished_name]
273
+ CN = {{url}}
274
+
275
+ [v3_req]
276
+ subjectAltName = @alt_names
277
+
278
+ [alt_names]
279
+ DNS.1 = {{url}}
280
+ IP.1 = 127.0.0.1
281
+
282
+ `;
283
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certUtils.js","sourceRoot":"","sources":["../../src/certUtils.ts"],"names":[],"mappings":";;;;;;AAAA,sDAAwB;AACxB,gEAAkC;AAClC,0DAA4B;AAC5B,uDAgB0B;AAe1B,MAAM,qBAAqB,GAAmB;IAC5C,cAAc,EAAE,KAAK;IACrB,gBAAgB,EAAE,KAAK;IACvB,6BAA6B,EAAE,IAAI;IACnC,UAAU,EAAE,IAAI;CACjB,CAAA;AAWD;;;;;GAKG;AACI,KAAK,UAAU,uBAAuB,CAAC,GAAW,EAAE,OAAsC;IAC/F,IAAA,+BAAa,EAAC,KAAK,EAAE,GAAG,CAAC,CAAA;IACzB,uBAAuB,CAAC,GAAG,CAAC,CAAA;IAC5B,MAAM,KAAK,GAAG,IAAA,+BAAa,GAAE,CAAA;IAE7B,MAAM,aAAa,GAAwB,EAAE,GAAG,qBAAqB,EAAE,eAAe,EAAE,QAAQ,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9G,MAAM,SAAS,GAAmC,EAAE,GAAG,EAAE,aAAa,CAAC,eAAe,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAA;IAElJ,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,kCAAkC,CAAC,CAAA;IAEzE,IAAI,eAAe,GAAW,EAAE,CAAA;IAChC,IAAI,CAAC,KAAK,EAAE;QACV,MAAM,WAAW,GAAG,IAAA,2BAAS,EAAC,SAAS,CAAC,CAAC,QAAQ,CAAA;QACjD,IAAI,CAAC,WAAW,EAAE;YAChB,MAAM,KAAK,CAAC,uCAAuC,CAAC,CAAA;SACrD;QACD,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,WAAW,EAAE,CAAC,CAAA;KAC1E;SAAM,IAAI,KAAK,EAAE;QAChB,MAAM,oBAAoB,GAAG,kBAAkB,EAAE,CAAA;QACjD,IAAI,CAAC,oBAAoB,EAAE;YACzB,MAAM,KAAK,CAAC,sDAAsD,CAAC,CAAA;SACpE;QACD,eAAe,GAAG,GAAG,kBAAkB,EAAE,cAAc,CAAA;QACvD,IAAI,CAAC,iBAAE,CAAC,UAAU,CAAC,eAAe,CAAC,EAAE;YACnC,MAAM,KAAK,CAAC,4DAA4D,eAAe,EAAE,CAAC,CAAA;SAC3F;aAAM;YACL,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,eAAe,EAAE,CAAC,CAAA;SAC9E;KACF;IAED,IAAA,iCAAe,EAAC,aAAa,CAAC,eAAe,CAAC,CAAA;IAC9C,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,UAAU,GAAG,GAAG,GAAG,MAAM,CAAA;IAE/B,MAAM,YAAY,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,UAAU,CAAC,CAAA;IAC5D,KAAK,MAAM,IAAI,IAAI,YAAY,EAAE;QAC/B,MAAM,QAAQ,GAAG,mBAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,CAAA;QAC/D,IAAI,iBAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE;YAC3B,MAAM,KAAK,CAAC,GAAG,uBAAK,CAAC,IAAI,SAAS,QAAQ,sEAAsE,aAAa,CAAC,eAAe,yCAAyC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;SAClN;KACF;IAED,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,WAAW,UAAU,oCAAoC,CAAC,CAAA;IAChG,MAAM,cAAc,GAAG,qBAAqB,CAAC,GAAG,CAAC,CAAA;IACjD,MAAM,UAAU,GAAG,mBAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,UAAU,CAAC,CAAA;IACvE,MAAM,kBAAG,CAAC,SAAS,CAAC,UAAU,EAAE,cAAc,CAAC,CAAA;IAE/C,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,+BAA+B,OAAO,EAAE,CAAC,CAAA;IAC/E,MAAM,gBAAgB,GAAG,gEAAgE,OAAO,SAAS,OAAO,cAAc,GAAG,YAAY,UAAU,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IACpK,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAA;IACnD,IAAI,MAAM,GAAG,MAAM,IAAA,4BAAU,EAAC,OAAO,EAAE,gBAAgB,EAAE,SAAS,CAAC,CAAA;IACnE,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,+BAA+B,CAAC,CAAA;IACtE,MAAM,gBAAgB,GAAG,4CAA4C,OAAO,mBAAmB,OAAO,QAAQ,OAAO,kBAAkB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IAClJ,MAAM,GAAG,MAAM,IAAA,4BAAU,EAAC,OAAO,EAAE,gBAAgB,EAAE,SAAS,CAAC,CAAA;IAC/D,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,OAAO,GAAG,mBAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,OAAO,CAAC,CAAA;IAEjE,IAAA,uBAAK,EAAC,aAAa,CAAC,UAAU,EAAE,GAAG,uBAAK,CAAC,UAAU,iCAAiC,OAAO,EAAE,CAAC,CAAA;IAE9F,OAAO,OAAO,CAAA;AAChB,CAAC;AAlED,0DAkEC;AAED;;;;GAIG;AACI,KAAK,UAAU,cAAc,CAAC,OAAe,EAAE,OAAiC;IACrF,IAAI,CAAC,IAAA,mCAAiB,GAAE,EAAE;QACxB,MAAM,KAAK,CAAC,6CAA6C,CAAC,CAAA;KAC3D;IACD,eAAe,CAAC,OAAO,CAAC,CAAA;IAExB,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,IAAA,uBAAK,EAAC,aAAa,CAAC,6BAA6B,EAAE,qCAAqC,CAAC,IAAI,CAAC,CAAC,CAAA;IAE/F,IAAI,MAAM,kBAAkB,CAAC,EAAE,OAAO,EAAE,EAAE,aAAa,CAAC,EAAE;QACxD,MAAM,QAAQ,GAAG,MAAM,aAAa,CAAC,OAAO,CAAC,CAAA;QAC7C,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,GAAG,uBAAK,CAAC,OAAO,iBAAiB,OAAO,mBAAmB,QAAQ,CAAC,OAAO,iHAAiH,CAAC,CAAA;QACnO,OAAM;KACP;IAED,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,oBAAoB,OAAO,GAAG,CAAC,CAAA;IAErE,MAAM,aAAa,GAAG,IAAA,uCAAqB,EAAC,oCAAoC,OAAO,gDAAgD,CAAC,CAAA;IACxI,MAAM,MAAM,GAAG,MAAM,IAAA,4BAAU,EAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAA;IAE1H,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,IAAA,uBAAK,EAAC,aAAa,CAAC,UAAU,EAAE,GAAG,uBAAK,CAAC,UAAU,iCAAiC,OAAO,EAAE,CAAC,CAAA;AAChG,CAAC;AAxBD,wCAwBC;AAED;;;;;;;GAOG;AACI,KAAK,UAAU,kBAAkB,CAAC,UAA2C,EAAE,OAAiC;IACrH,IAAI,CAAC,IAAA,mCAAiB,GAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAA;KACnE;IAED,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,IAAI,aAAa,CAAA;IAEjB,4FAA4F;IAC5F,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE;QAClC,IAAA,+BAAa,EAAC,SAAS,EAAE,UAAU,CAAC,CAAA;QACpC,eAAe,CAAC,UAAU,CAAC,CAAA;QAC3B,MAAM,OAAO,GAAG,UAAU,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,MAAM,UAAU,EAAE,CAAA;QAC9E,aAAa,GAAG,IAAA,uCAAqB,EAAC,wFAAwF,OAAO,6BAA6B,CAAC,CAAA;KACpK;SAAM,IAAI,SAAS,IAAI,UAAU,EAAE;QAClC,eAAe,CAAC,UAAU,CAAC,OAAO,CAAC,CAAA;QACnC,aAAa,GAAG,IAAA,uCAAqB,EAAC,sHAAsH,UAAU,CAAC,OAAO,sCAAsC,CAAC,CAAA;KACtN;IAED,MAAM,SAAS,GAAG,CAAC,OAAO,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,WAAW,UAAU,EAAE,CAAC,CAAC,CAAC,WAAW,UAAU,CAAC,OAAO,EAAE,CAAA;IAC9G,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,yBAAyB,SAAS,uBAAuB,CAAC,CAAA;IAEhG,MAAM,MAAM,GAAG,MAAM,IAAA,4BAAU,EAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC,CAAA;IAE/E,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,KAAK,GAAG,IAAA,uCAAqB,EAAC,MAAM,CAAC,MAAM,CAAC,CAAA;IAElD,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE;QACtB,MAAM,IAAI,KAAK,CAAC,wFAAwF,MAAM,CAAC,MAAM,EAAE,CAAC,CAAA;KACzH;IAED,OAAO,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,KAAK,GAAG,CAAA;AAChC,CAAC;AAlCD,gDAkCC;AAED;;;;GAIG;AACI,KAAK,UAAU,gBAAgB,CAAC,UAA0B,EAAE,OAAiC;IAClG,IAAI,CAAC,IAAA,mCAAiB,GAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAA;KACjE;IAED,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,IAAA,uBAAK,EAAC,aAAa,CAAC,6BAA6B,EAAE,qCAAqC,CAAC,KAAK,CAAC,CAAC,CAAA;IAEhG,IAAI,aAAa,CAAA;IAEjB,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE;QAClC,IAAA,+BAAa,EAAC,SAAS,EAAE,UAAU,CAAC,CAAA;QACpC,eAAe,CAAC,UAAU,CAAC,CAAA;QAC3B,aAAa,GAAG,IAAA,uCAAqB,EAAC,+EAA+E,UAAU,mBAAmB,CAAC,CAAA;KACpJ;SAAM,IAAI,YAAY,IAAI,UAAU,EAAE;QACrC,gBAAgB,CAAC,YAAY,EAAE,UAAU,CAAC,UAAU,CAAC,CAAA;QACrD,aAAa,GAAG,IAAA,uCAAqB,EAAC,+EAA+E,UAAU,CAAC,UAAU,mBAAmB,CAAC,CAAA;KAC/J;SAAM,IAAI,SAAS,IAAI,UAAU,EAAE;QAClC,eAAe,CAAC,UAAU,CAAC,OAAO,CAAC,CAAA;QACnC,aAAa,GAAG,IAAA,uCAAqB,EAAC,gDAAgD,UAAU,CAAC,OAAO,uHAAuH,CAAC,CAAA;KACjO;IAED,MAAM,SAAS,GAAG,OAAO,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,IAAI,UAAU,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,CAAA;IACjG,IAAA,uBAAK,EAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,SAAS,EAAE,CAAC,CAAA;IAEvE,MAAM,MAAM,GAAG,MAAM,IAAA,4BAAU,EAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAA;IAE1H,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,IAAA,uBAAK,EAAC,aAAa,CAAC,UAAU,EAAE,GAAG,uBAAK,CAAC,UAAU,gCAAgC,CAAC,CAAA;AACtF,CAAC;AA/BD,4CA+BC;AAED;;;;GAIG;AACI,KAAK,UAAU,aAAa,CAAC,OAAe;IACjD,IAAI,CAAC,IAAA,mCAAiB,GAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAA;KAC9D;IACD,eAAe,CAAC,OAAO,CAAC,CAAA;IAExB,MAAM,aAAa,GAAG,IAAA,uCAAqB,EAAC,iCAAiC,OAAO,kFAAkF,OAAO,sBAAsB,CAAC,CAAA;IACpM,MAAM,MAAM,GAAG,MAAM,IAAA,4BAAU,EAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC,CAAA;IAE/E,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,IAAI,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CAAA;IACjC,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAA;IAEnC,MAAM,QAAQ,GAAa;QACzB,OAAO,EAAE,UAAU,CAAC,OAAO;QAC3B,UAAU,EAAE,UAAU,CAAC,UAAU;QACjC,OAAO,EAAE,UAAU,CAAC,OAAO;KAC5B,CAAA;IAED,OAAO,QAAQ,CAAA;AACjB,CAAC;AArBD,sCAqBC;AAED;;GAEG;AACH,SAAgB,gBAAgB;IAC9B,MAAM,YAAY,GAAG;;;;;;;cAOT,CAAA;IACZ,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAA;AAC3B,CAAC;AAVD,4CAUC;AAED,SAAS,uBAAuB,CAAC,GAAW,EAAE,OAAO,GAAG,KAAK;IAC3D,IAAI,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACrB,MAAM,KAAK,CAAC,GAAG,OAAO,4BAA4B,CAAC,CAAA;KACpD;IACD,IAAI,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACrB,MAAM,KAAK,CAAC,GAAG,OAAO,qCAAqC,CAAC,CAAA;KAC7D;IACD,IAAI,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE;QACtB,MAAM,KAAK,CAAC,GAAG,OAAO,iCAAiC,CAAC,CAAA;KACzD;AACH,CAAC;AAED,SAAS,kBAAkB;IACzB,MAAM,UAAU,GAAG,IAAA,iCAAe,EAAC,MAAM,EAAE,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC,CAAA;IACnE,IAAI,UAAU,CAAC,KAAK,EAAE;QACpB,MAAM,KAAK,CAAC,oDAAoD,CAAC,CAAA;KAClE;IACD,IAAI,UAAU,CAAC,WAAW,CAAC,MAAM,KAAK,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE;QAC5E,MAAM,IAAI,KAAK,CAAC,gEAAgE,UAAU,CAAC,MAAM,EAAE,CAAC,CAAA;KACrG;IACD,OAAO,UAAU,CAAC,WAAW,CAAC,CAAC,CAAC,CAAA;AAClC,CAAC;AAED,SAAS,qBAAqB,CAAC,GAAW;IACxC,OAAO,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,GAAG,CAAC,CAAA;AAChD,CAAC;AAED,SAAS,eAAe,CAAC,OAAe;IACtC,IAAI,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;QAC/E,MAAM,IAAI,KAAK,CAAC,8HAA8H,OAAO,OAAO,CAAC,CAAA;KAC9J;IACD,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;AACtC,CAAC;AAED,SAAS,gBAAgB,CAAC,IAAY,EAAE,KAAa;IACnD,IAAI,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QAC9C,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,4DAA4D,CAAC,CAAA;KAC3G;AACH,CAAC;AAED,SAAS,uBAAuB,CAAC,MAAmB;IAClD,IAAI,MAAM,CAAC,IAAI,KAAK,CAAC,EAAE;QACrB,mFAAmF;QACnF,IAAI,MAAM,CAAC,MAAM,EAAE;YACjB,OAAO,CAAC,KAAK,CAAC,IAAA,qBAAG,EAAC,QAAQ,CAAC,EAAE,MAAM,CAAC,MAAM,CAAC,CAAA;SAC5C;QACD,MAAM,KAAK,CAAC,yCAAyC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAA;KACpE;AACH,CAAC;AAED,SAAS,eAAe,CAAC,OAAe;IACtC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;QAC7B,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAA;KAC9C;IACD,IAAA,kCAAgB,EAAC,SAAS,EAAE,OAAO,CAAC,CAAA;IACpC,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;AACtC,CAAC;AAED,SAAS,qCAAqC,CAAC,SAAS,GAAG,IAAI;IAC7D,OAAO,GAAG,uBAAK,CAAC,IAAI,eAAe,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,wDAAwD,CAAA;AAClH,CAAC;AAED,mIAAmI;AACnI,2HAA2H;AAC3H,MAAM,cAAc,GAAG;;;;;;;;;;;;;;;CAetB,CAAA"}
@@ -0,0 +1,39 @@
1
+ /**
2
+ * Wrapper function for `dotnet ef`. If you don't pass `false` for `noBuild`, be sure the project has already been built by some other means.
3
+ *
4
+ * Docs for "dotnet ef" CLI: https://learn.microsoft.com/en-us/ef/core/cli/dotnet.
5
+ * @param projectPath Path to project that has the DbContext and Migration files used for the `--project` argument
6
+ * @param dbContextName The name of the DbContext class used for the `--context` argument
7
+ * @param args Arguments to pass to the `dotnet ef` CLI
8
+ * @param noBuild If true, the `--no-build` argument will be passed to the `dotnet ef` CLI (default: true)
9
+ */
10
+ export declare function dotnetEfCommand(projectPath: string, dbContextName: string, args: string[], noBuild?: boolean): Promise<number>;
11
+ /**
12
+ * Wrapper function for `dotnet ef migrations list`.
13
+ * @param projectPath The path to the project that contains the DbContext and Migration files
14
+ * @param dbContextName The name of the DbContext class
15
+ */
16
+ export declare function efMigrationsList(projectPath: string, dbContextName: string): Promise<void>;
17
+ /**
18
+ * Wrapper function for `dotnet ef database update <migration_name>`.
19
+ * @param projectPath The path to the project that contains the DbContext and Migration files
20
+ * @param dbContextName The name of the DbContext class
21
+ * @param migrationName The name of the migration to update to (optional). If not provided, all migrations will be applied.
22
+ */
23
+ export declare function efMigrationsUpdate(projectPath: string, dbContextName: string, migrationName?: string): Promise<void>;
24
+ /**
25
+ *
26
+ * @param projectPath The path to the project that contains the DbContext and Migration files
27
+ * @param dbContextName The name of the DbContext class
28
+ * @param migrationName The name of the migration to add
29
+ * @param withBoilerplate If true, boilerplate will be added to the migration C# file and empty Up and Down SQL files will be created
30
+ */
31
+ export declare function efAddMigration(projectPath: string, dbContextName: string, migrationName: string, withBoilerplate?: boolean): Promise<void>;
32
+ /**
33
+ *
34
+ * @param projectPath The path to the project that contains the DbContext and Migration files
35
+ * @param dbContextName The name of the DbContext class
36
+ * @param skipConfirm If `true`, the user will not be prompted to confirm the removal of the last migration
37
+ */
38
+ export declare function efRemoveLastMigration(projectPath: string, dbContextName: string, skipConfirm?: boolean): Promise<void>;
39
+ //# sourceMappingURL=dbMigrationUtils.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"dbMigrationUtils.d.ts","sourceRoot":"","sources":["../../src/dbMigrationUtils.ts"],"names":[],"mappings":"AAKA;;;;;;;;GAQG;AACH,wBAAsB,eAAe,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,EAAE,OAAO,UAAO,GAAG,OAAO,CAAC,MAAM,CAAC,CAKjI;AAED;;;;GAIG;AACH,wBAAsB,gBAAgB,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,iBAEhF;AAED;;;;;GAKG;AACH,wBAAsB,kBAAkB,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,aAAa,CAAC,EAAE,MAAM,iBAE1G;AAED;;;;;;GAMG;AACH,wBAAsB,cAAc,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,eAAe,UAAQ,iBAY9H;AAED;;;;;GAKG;AACH,wBAAsB,qBAAqB,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,WAAW,UAAQ,iBAe1G"}
@@ -0,0 +1,195 @@
1
+ "use strict";
2
+ var __importDefault = (this && this.__importDefault) || function (mod) {
3
+ return (mod && mod.__esModule) ? mod : { "default": mod };
4
+ };
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ exports.efRemoveLastMigration = exports.efAddMigration = exports.efMigrationsUpdate = exports.efMigrationsList = exports.dotnetEfCommand = void 0;
7
+ const generalUtils_js_1 = require("./generalUtils.js");
8
+ const node_path_1 = __importDefault(require("node:path"));
9
+ const node_fs_1 = __importDefault(require("node:fs"));
10
+ const promises_1 = __importDefault(require("node:fs/promises"));
11
+ /**
12
+ * Wrapper function for `dotnet ef`. If you don't pass `false` for `noBuild`, be sure the project has already been built by some other means.
13
+ *
14
+ * Docs for "dotnet ef" CLI: https://learn.microsoft.com/en-us/ef/core/cli/dotnet.
15
+ * @param projectPath Path to project that has the DbContext and Migration files used for the `--project` argument
16
+ * @param dbContextName The name of the DbContext class used for the `--context` argument
17
+ * @param args Arguments to pass to the `dotnet ef` CLI
18
+ * @param noBuild If true, the `--no-build` argument will be passed to the `dotnet ef` CLI (default: true)
19
+ */
20
+ async function dotnetEfCommand(projectPath, dbContextName, args, noBuild = true) {
21
+ (0, generalUtils_js_1.requireValidPath)('projectPath', projectPath);
22
+ (0, generalUtils_js_1.requireString)('dbContextName', dbContextName);
23
+ const result = await (0, generalUtils_js_1.spawnAsync)('dotnet', ['ef', '--project', projectPath, ...args, '--context', dbContextName, ...(noBuild ? ['--no-build'] : [])]);
24
+ return result.code;
25
+ }
26
+ exports.dotnetEfCommand = dotnetEfCommand;
27
+ /**
28
+ * Wrapper function for `dotnet ef migrations list`.
29
+ * @param projectPath The path to the project that contains the DbContext and Migration files
30
+ * @param dbContextName The name of the DbContext class
31
+ */
32
+ async function efMigrationsList(projectPath, dbContextName) {
33
+ await dotnetEfCommand(projectPath, dbContextName, ['migrations', 'list']);
34
+ }
35
+ exports.efMigrationsList = efMigrationsList;
36
+ /**
37
+ * Wrapper function for `dotnet ef database update <migration_name>`.
38
+ * @param projectPath The path to the project that contains the DbContext and Migration files
39
+ * @param dbContextName The name of the DbContext class
40
+ * @param migrationName The name of the migration to update to (optional). If not provided, all migrations will be applied.
41
+ */
42
+ async function efMigrationsUpdate(projectPath, dbContextName, migrationName) {
43
+ await dotnetEfCommand(projectPath, dbContextName, ['database', 'update', ...(migrationName ? [migrationName] : [])]);
44
+ }
45
+ exports.efMigrationsUpdate = efMigrationsUpdate;
46
+ /**
47
+ *
48
+ * @param projectPath The path to the project that contains the DbContext and Migration files
49
+ * @param dbContextName The name of the DbContext class
50
+ * @param migrationName The name of the migration to add
51
+ * @param withBoilerplate If true, boilerplate will be added to the migration C# file and empty Up and Down SQL files will be created
52
+ */
53
+ async function efAddMigration(projectPath, dbContextName, migrationName, withBoilerplate = false) {
54
+ const projectDirectory = projectPath.endsWith('.csproj') ? projectPath.substring(0, projectPath.lastIndexOf('/')) : projectPath;
55
+ const migrationsOutputDir = getMigrationsProjectRelativePath(dbContextName);
56
+ await dotnetEfCommand(projectPath, dbContextName, ['migrations', 'add', migrationName, '-o', migrationsOutputDir]);
57
+ if (withBoilerplate) {
58
+ try {
59
+ await addDbMigrationBoilerplate(projectDirectory, dbContextName, migrationName);
60
+ }
61
+ catch (error) {
62
+ console.error(error);
63
+ await efRemoveLastMigration(projectPath, dbContextName, true);
64
+ }
65
+ }
66
+ }
67
+ exports.efAddMigration = efAddMigration;
68
+ /**
69
+ *
70
+ * @param projectPath The path to the project that contains the DbContext and Migration files
71
+ * @param dbContextName The name of the DbContext class
72
+ * @param skipConfirm If `true`, the user will not be prompted to confirm the removal of the last migration
73
+ */
74
+ async function efRemoveLastMigration(projectPath, dbContextName, skipConfirm = false) {
75
+ const lastMigrationName = await getLastMigrationName(projectPath, dbContextName);
76
+ if (!skipConfirm && !await (0, generalUtils_js_1.getConfirmation)(`Are you sure you want to remove the last migration: ➡️${lastMigrationName}?`)) {
77
+ return;
78
+ }
79
+ const returnCode = await dotnetEfCommand(projectPath, dbContextName, ['migrations', 'remove']);
80
+ if (returnCode !== 0) {
81
+ throw new Error(`dotnet ef migrations remove returned non-zero exit code: ${returnCode}`);
82
+ }
83
+ (0, generalUtils_js_1.log)(`Removing migration SQL script files for migration if they're empty`);
84
+ await deleteScriptFileIfEmpty(getScriptPath(projectPath, lastMigrationName, true));
85
+ await deleteScriptFileIfEmpty(getScriptPath(projectPath, lastMigrationName, false));
86
+ }
87
+ exports.efRemoveLastMigration = efRemoveLastMigration;
88
+ async function deleteScriptFileIfEmpty(scriptPath) {
89
+ if (node_fs_1.default.existsSync(scriptPath)) {
90
+ const scriptContents = node_fs_1.default.readFileSync(scriptPath, { encoding: 'utf8' });
91
+ if (scriptContents.trim().length === 0) {
92
+ await promises_1.default.unlink(scriptPath);
93
+ }
94
+ else {
95
+ (0, generalUtils_js_1.log)(`${generalUtils_js_1.Emoji.Warning} Skipping deletion of non-empty script file: ${scriptPath}`);
96
+ }
97
+ }
98
+ }
99
+ async function getLastMigrationName(projectPath, dbContextName) {
100
+ const migrationsDirectory = getMigrationsDirectory(projectPath, dbContextName);
101
+ const filenames = node_fs_1.default.readdirSync(migrationsDirectory);
102
+ const migrationNames = filenames.filter(filename => filename.endsWith('.cs') &&
103
+ !filename.endsWith('.Designer.cs') &&
104
+ !filename.endsWith('.ModelSnapshot.cs') &&
105
+ filename.includes('_')).map(filename => filename.substring(0, filename.length - 3));
106
+ const migrationNamesWithTimestamps = migrationNames.map(migrationName => {
107
+ const timestamp = migrationName.substring(0, 14);
108
+ const name = migrationName.substring(15);
109
+ return { timestamp, name };
110
+ });
111
+ (0, generalUtils_js_1.log)(`Found migrations: ${migrationNamesWithTimestamps.map(m => m.name).join(', ')}`);
112
+ (0, generalUtils_js_1.log)(`Found timestamps: ${migrationNamesWithTimestamps.map(m => m.timestamp).join(', ')}`);
113
+ const sortedMigrationNames = [...migrationNamesWithTimestamps].sort((a, b) => a.timestamp.localeCompare(b.timestamp));
114
+ const lastMigrationName = sortedMigrationNames[sortedMigrationNames.length - 1].name;
115
+ return lastMigrationName;
116
+ }
117
+ function getMigrationsProjectRelativePath(dbContextName) {
118
+ return `Migrations/${dbContextName}Migrations`;
119
+ }
120
+ function getMigrationsDirectory(projectDirectory, dbContextName) {
121
+ return node_path_1.default.join(projectDirectory, `Migrations/${dbContextName}Migrations`);
122
+ }
123
+ function getScriptPath(projectDirectory, migrationName, isUp) {
124
+ return node_path_1.default.join(projectDirectory, `Scripts/${migrationName}${isUp ? '' : '_Down'}.sql`);
125
+ }
126
+ async function getCSharpMigrationFilePath(projectDirectory, dbContextName, migrationName) {
127
+ const migrationsOutputDir = getMigrationsDirectory(projectDirectory, dbContextName);
128
+ if (!node_fs_1.default.existsSync(migrationsOutputDir)) {
129
+ throw new Error(`Unable to add migration C# boilerplate - could not find migrations output directory: ${migrationsOutputDir}`);
130
+ }
131
+ (0, generalUtils_js_1.log)(`Checking for generated C# file 📄XXXX_${migrationName}.cs in directory 📁${migrationsOutputDir}`);
132
+ const filenamePattern = `_${migrationName}.cs`;
133
+ const filenames = node_fs_1.default.readdirSync(migrationsOutputDir).filter(filename => filename.endsWith(filenamePattern));
134
+ if (!filenames || filenames.length === 0) {
135
+ throw new Error(`Auto-generated migration file not found - migrations output directory has no C# files ending with : ${filenamePattern}`);
136
+ }
137
+ if (filenames.length > 1) {
138
+ throw new Error(`Auto-generated migration file not found - migrations output directory has multiple C# files with the same migration name: ${filenames.join(', ')}`);
139
+ }
140
+ const filename = filenames[0];
141
+ const filePath = node_path_1.default.join(migrationsOutputDir, filename);
142
+ if (!node_fs_1.default.existsSync(filePath)) {
143
+ throw new Error(`Issue generating file path for migration (bad file path): ${filePath}`);
144
+ }
145
+ return filePath;
146
+ }
147
+ async function addDbMigrationBoilerplate(projectDirectory, dbContextName, migrationName) {
148
+ const filePath = await getCSharpMigrationFilePath(projectDirectory, dbContextName, migrationName);
149
+ (0, generalUtils_js_1.log)(`Replacing file contents with boilerplate for file 📄${filePath}`);
150
+ const newFileContents = cSharpMigrationFileTemplate
151
+ .replaceAll(contextNamePlaceholder, dbContextName)
152
+ .replaceAll(migrationNamePlaceholder, migrationName);
153
+ await promises_1.default.writeFile(filePath, newFileContents, { encoding: 'utf8' });
154
+ (0, generalUtils_js_1.log)(`Updated file with boilerplate - please ensure it is correct: 📄${filePath}`);
155
+ const upScriptPath = node_path_1.default.join(projectDirectory, `Scripts/${migrationName}.sql`);
156
+ const downScriptPath = node_path_1.default.join(projectDirectory, `Scripts/${migrationName}_Down.sql`);
157
+ (0, generalUtils_js_1.log)('\nCreating corresponding empty sql files (no action will be taken if they already exist):');
158
+ (0, generalUtils_js_1.log)(` - 📄${upScriptPath}`);
159
+ (0, generalUtils_js_1.log)(` - 📄${downScriptPath}\n`);
160
+ await writeEmptySqlFileIfNotExists(upScriptPath, 'Up');
161
+ await writeEmptySqlFileIfNotExists(downScriptPath, 'Down');
162
+ }
163
+ async function writeEmptySqlFileIfNotExists(scriptPath, scriptType) {
164
+ if (!node_fs_1.default.existsSync(scriptPath)) {
165
+ await promises_1.default.writeFile(scriptPath, '', { encoding: 'utf8' });
166
+ }
167
+ else {
168
+ (0, generalUtils_js_1.log)(`Skipping ${scriptType} sql script (already exists)`);
169
+ }
170
+ }
171
+ const contextNamePlaceholder = '{{context_name}}';
172
+ const migrationNamePlaceholder = '{{migration_name}}';
173
+ const cSharpMigrationFileTemplate = `using Microsoft.EntityFrameworkCore.Migrations;
174
+ using MikeyT.DbMigrations;
175
+
176
+ #nullable disable
177
+
178
+ namespace DbMigrator.Migrations.${contextNamePlaceholder}Migrations
179
+ {
180
+ public partial class ${migrationNamePlaceholder} : Migration
181
+ {
182
+ protected override void Up(MigrationBuilder migrationBuilder)
183
+ {
184
+ MigrationScriptRunner.RunScript(migrationBuilder, "${migrationNamePlaceholder}.sql");
185
+ }
186
+
187
+ protected override void Down(MigrationBuilder migrationBuilder)
188
+ {
189
+ MigrationScriptRunner.RunScript(migrationBuilder, "${migrationNamePlaceholder}_Down.sql");
190
+ }
191
+ }
192
+ }
193
+
194
+ `;
195
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dbMigrationUtils.js","sourceRoot":"","sources":["../../src/dbMigrationUtils.ts"],"names":[],"mappings":";;;;;;AAAA,uDAA4G;AAC5G,0DAA4B;AAC5B,sDAAwB;AACxB,gEAAkC;AAElC;;;;;;;;GAQG;AACI,KAAK,UAAU,eAAe,CAAC,WAAmB,EAAE,aAAqB,EAAE,IAAc,EAAE,OAAO,GAAG,IAAI;IAC9G,IAAA,kCAAgB,EAAC,aAAa,EAAE,WAAW,CAAC,CAAA;IAC5C,IAAA,+BAAa,EAAC,eAAe,EAAE,aAAa,CAAC,CAAA;IAC7C,MAAM,MAAM,GAAG,MAAM,IAAA,4BAAU,EAAC,QAAQ,EAAE,CAAC,IAAI,EAAE,WAAW,EAAE,WAAW,EAAE,GAAG,IAAI,EAAE,WAAW,EAAE,aAAa,EAAE,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAA;IACpJ,OAAO,MAAM,CAAC,IAAI,CAAA;AACpB,CAAC;AALD,0CAKC;AAED;;;;GAIG;AACI,KAAK,UAAU,gBAAgB,CAAC,WAAmB,EAAE,aAAqB;IAC/E,MAAM,eAAe,CAAC,WAAW,EAAE,aAAa,EAAE,CAAC,YAAY,EAAE,MAAM,CAAC,CAAE,CAAA;AAC5E,CAAC;AAFD,4CAEC;AAED;;;;;GAKG;AACI,KAAK,UAAU,kBAAkB,CAAC,WAAmB,EAAE,aAAqB,EAAE,aAAsB;IACzG,MAAM,eAAe,CAAC,WAAW,EAAE,aAAa,EAAE,CAAC,UAAU,EAAE,QAAQ,EAAE,GAAG,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAA;AACtH,CAAC;AAFD,gDAEC;AAED;;;;;;GAMG;AACI,KAAK,UAAU,cAAc,CAAC,WAAmB,EAAE,aAAqB,EAAE,aAAqB,EAAE,eAAe,GAAG,KAAK;IAC7H,MAAM,gBAAgB,GAAG,WAAW,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,EAAE,WAAW,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,WAAW,CAAA;IAC/H,MAAM,mBAAmB,GAAG,gCAAgC,CAAC,aAAa,CAAC,CAAA;IAC3E,MAAM,eAAe,CAAC,WAAW,EAAE,aAAa,EAAE,CAAC,YAAY,EAAE,KAAK,EAAE,aAAa,EAAE,IAAI,EAAE,mBAAmB,CAAC,CAAC,CAAA;IAClH,IAAI,eAAe,EAAE;QACnB,IAAI;YACF,MAAM,yBAAyB,CAAC,gBAAgB,EAAE,aAAa,EAAE,aAAa,CAAC,CAAA;SAChF;QAAC,OAAO,KAAK,EAAE;YACd,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAA;YACpB,MAAM,qBAAqB,CAAC,WAAW,EAAE,aAAa,EAAE,IAAI,CAAC,CAAA;SAC9D;KACF;AACH,CAAC;AAZD,wCAYC;AAED;;;;;GAKG;AACI,KAAK,UAAU,qBAAqB,CAAC,WAAmB,EAAE,aAAqB,EAAE,WAAW,GAAG,KAAK;IACzG,MAAM,iBAAiB,GAAG,MAAM,oBAAoB,CAAC,WAAW,EAAE,aAAa,CAAC,CAAA;IAEhF,IAAI,CAAC,WAAW,IAAI,CAAC,MAAM,IAAA,iCAAe,EAAC,yDAAyD,iBAAiB,GAAG,CAAC,EAAE;QACzH,OAAM;KACP;IAED,MAAM,UAAU,GAAG,MAAM,eAAe,CAAC,WAAW,EAAE,aAAa,EAAE,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,CAAA;IAC9F,IAAI,UAAU,KAAK,CAAC,EAAE;QACpB,MAAM,IAAI,KAAK,CAAC,4DAA4D,UAAU,EAAE,CAAC,CAAA;KAC1F;IAED,IAAA,qBAAG,EAAC,oEAAoE,CAAC,CAAA;IACzE,MAAM,uBAAuB,CAAC,aAAa,CAAC,WAAW,EAAE,iBAAiB,EAAE,IAAI,CAAC,CAAC,CAAA;IAClF,MAAM,uBAAuB,CAAC,aAAa,CAAC,WAAW,EAAE,iBAAiB,EAAE,KAAK,CAAC,CAAC,CAAA;AACrF,CAAC;AAfD,sDAeC;AAED,KAAK,UAAU,uBAAuB,CAAC,UAAkB;IACvD,IAAI,iBAAE,CAAC,UAAU,CAAC,UAAU,CAAC,EAAE;QAC7B,MAAM,cAAc,GAAG,iBAAE,CAAC,YAAY,CAAC,UAAU,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,CAAC,CAAA;QACxE,IAAI,cAAc,CAAC,IAAI,EAAE,CAAC,MAAM,KAAK,CAAC,EAAE;YACtC,MAAM,kBAAG,CAAC,MAAM,CAAC,UAAU,CAAC,CAAA;SAC7B;aAAM;YACL,IAAA,qBAAG,EAAC,GAAG,uBAAK,CAAC,OAAO,gDAAgD,UAAU,EAAE,CAAC,CAAA;SAClF;KACF;AACH,CAAC;AAED,KAAK,UAAU,oBAAoB,CAAC,WAAmB,EAAE,aAAqB;IAC5E,MAAM,mBAAmB,GAAG,sBAAsB,CAAC,WAAW,EAAE,aAAa,CAAC,CAAA;IAC9E,MAAM,SAAS,GAAG,iBAAE,CAAC,WAAW,CAAC,mBAAmB,CAAC,CAAA;IACrD,MAAM,cAAc,GAAG,SAAS,CAAC,MAAM,CAAC,QAAQ,CAAC,EAAE,CACjD,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC;QACxB,CAAC,QAAQ,CAAC,QAAQ,CAAC,cAAc,CAAC;QAClC,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,CAAC;QACvC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,EAAE,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAA;IACrF,MAAM,4BAA4B,GAAG,cAAc,CAAC,GAAG,CAAC,aAAa,CAAC,EAAE;QACtE,MAAM,SAAS,GAAG,aAAa,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,CAAA;QAChD,MAAM,IAAI,GAAG,aAAa,CAAC,SAAS,CAAC,EAAE,CAAC,CAAA;QACxC,OAAO,EAAE,SAAS,EAAE,IAAI,EAAE,CAAA;IAC5B,CAAC,CAAC,CAAA;IACF,IAAA,qBAAG,EAAC,qBAAqB,4BAA4B,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAA;IACpF,IAAA,qBAAG,EAAC,qBAAqB,4BAA4B,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAA;IACzF,MAAM,oBAAoB,GAAG,CAAC,GAAG,4BAA4B,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAA;IACrH,MAAM,iBAAiB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,IAAI,CAAA;IACpF,OAAO,iBAAiB,CAAA;AAC1B,CAAC;AAED,SAAS,gCAAgC,CAAC,aAAqB;IAC7D,OAAO,cAAc,aAAa,YAAY,CAAA;AAChD,CAAC;AAED,SAAS,sBAAsB,CAAC,gBAAwB,EAAE,aAAqB;IAC7E,OAAO,mBAAI,CAAC,IAAI,CAAC,gBAAgB,EAAE,cAAc,aAAa,YAAY,CAAC,CAAA;AAC7E,CAAC;AAED,SAAS,aAAa,CAAC,gBAAwB,EAAE,aAAqB,EAAE,IAAa;IACnF,OAAO,mBAAI,CAAC,IAAI,CAAC,gBAAgB,EAAE,WAAW,aAAa,GAAG,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,MAAM,CAAC,CAAA;AAC1F,CAAC;AAED,KAAK,UAAU,0BAA0B,CAAC,gBAAwB,EAAE,aAAqB,EAAE,aAAqB;IAC9G,MAAM,mBAAmB,GAAG,sBAAsB,CAAC,gBAAgB,EAAE,aAAa,CAAC,CAAA;IAEnF,IAAI,CAAC,iBAAE,CAAC,UAAU,CAAC,mBAAmB,CAAC,EAAE;QACvC,MAAM,IAAI,KAAK,CAAC,wFAAwF,mBAAmB,EAAE,CAAC,CAAA;KAC/H;IAED,IAAA,qBAAG,EAAC,yCAAyC,aAAa,sBAAsB,mBAAmB,EAAE,CAAC,CAAA;IAEtG,MAAM,eAAe,GAAG,IAAI,aAAa,KAAK,CAAA;IAC9C,MAAM,SAAS,GAAG,iBAAE,CAAC,WAAW,CAAC,mBAAmB,CAAC,CAAC,MAAM,CAAC,QAAQ,CAAC,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC,CAAA;IAC5G,IAAI,CAAC,SAAS,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE;QACxC,MAAM,IAAI,KAAK,CAAC,uGAAuG,eAAe,EAAE,CAAC,CAAA;KAC1I;IAED,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,6HAA6H,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAA;KACrK;IAED,MAAM,QAAQ,GAAG,SAAS,CAAC,CAAC,CAAC,CAAA;IAC7B,MAAM,QAAQ,GAAG,mBAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAA;IAEzD,IAAI,CAAC,iBAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE;QAC5B,MAAM,IAAI,KAAK,CAAC,6DAA6D,QAAQ,EAAE,CAAC,CAAA;KACzF;IAED,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED,KAAK,UAAU,yBAAyB,CAAC,gBAAwB,EAAE,aAAqB,EAAE,aAAqB;IAC7G,MAAM,QAAQ,GAAG,MAAM,0BAA0B,CAAC,gBAAgB,EAAE,aAAa,EAAE,aAAa,CAAC,CAAA;IAEjG,IAAA,qBAAG,EAAC,uDAAuD,QAAQ,EAAE,CAAC,CAAA;IAEtE,MAAM,eAAe,GAAG,2BAA2B;SAChD,UAAU,CAAC,sBAAsB,EAAE,aAAa,CAAC;SACjD,UAAU,CAAC,wBAAwB,EAAE,aAAa,CAAC,CAAA;IAEtD,MAAM,kBAAG,CAAC,SAAS,CAAC,QAAQ,EAAE,eAAe,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,CAAC,CAAA;IAEpE,IAAA,qBAAG,EAAC,kEAAkE,QAAQ,EAAE,CAAC,CAAA;IAEjF,MAAM,YAAY,GAAG,mBAAI,CAAC,IAAI,CAAC,gBAAgB,EAAE,WAAW,aAAa,MAAM,CAAC,CAAA;IAChF,MAAM,cAAc,GAAG,mBAAI,CAAC,IAAI,CAAC,gBAAgB,EAAE,WAAW,aAAa,WAAW,CAAC,CAAA;IAEvF,IAAA,qBAAG,EAAC,2FAA2F,CAAC,CAAA;IAChG,IAAA,qBAAG,EAAC,SAAS,YAAY,EAAE,CAAC,CAAA;IAC5B,IAAA,qBAAG,EAAC,SAAS,cAAc,IAAI,CAAC,CAAA;IAEhC,MAAM,4BAA4B,CAAC,YAAY,EAAE,IAAI,CAAC,CAAA;IACtD,MAAM,4BAA4B,CAAC,cAAc,EAAE,MAAM,CAAC,CAAA;AAC5D,CAAC;AAED,KAAK,UAAU,4BAA4B,CAAC,UAAkB,EAAE,UAAyB;IACvF,IAAI,CAAC,iBAAE,CAAC,UAAU,CAAC,UAAU,CAAC,EAAE;QAC9B,MAAM,kBAAG,CAAC,SAAS,CAAC,UAAU,EAAE,EAAE,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,CAAC,CAAA;KAC1D;SAAM;QACL,IAAA,qBAAG,EAAC,YAAY,UAAU,8BAA8B,CAAC,CAAA;KAC1D;AACH,CAAC;AAED,MAAM,sBAAsB,GAAG,kBAAkB,CAAA;AACjD,MAAM,wBAAwB,GAAG,oBAAoB,CAAA;AACrD,MAAM,2BAA2B,GAAG;;;;;kCAKF,sBAAsB;;2BAE7B,wBAAwB;;;;iEAIc,wBAAwB;;;;;iEAKxB,wBAAwB;;;;;CAKxF,CAAA"}
@@ -0,0 +1,25 @@
1
+ /**
2
+ * Runs dotnet build on the specified project.
3
+ * @param projectPath Path to project file (like .csproj) or directory of project to build
4
+ * @throws A {@link SpawnError} if the spawned process exits with a non-zero exit code
5
+ */
6
+ export declare function dotnetBuild(projectPath: string): Promise<void>;
7
+ /**
8
+ * Helper method to spawn a process and run 'dotnet publish'.
9
+ * @param projectPath Path to project file (like .csproj) or directory of project to build
10
+ * @param configuration Build configuration, such as 'Release'
11
+ * @param outputDir The relative or absolute path for the build output
12
+ * @param cwd Optionally run the command from another current working directory
13
+ */
14
+ export declare function dotnetPublish(projectPath?: string, configuration?: string, outputDir?: string, cwd?: string): Promise<void>;
15
+ /**
16
+ * Spawns a process that runs the necessary commands to install or update the dotnet-ef tool globally on the system.
17
+ */
18
+ export declare function installOrUpdateDotnetEfTool(): Promise<void>;
19
+ /**
20
+ * Spawns a process that runs the following commands to clean and re-install the dotnet dev certs:
21
+ * - dotnet dev-certs https --clean
22
+ * - dotnet dev-certs https -t
23
+ */
24
+ export declare function configureDotnetDevCerts(): Promise<void>;
25
+ //# sourceMappingURL=dotnetUtils.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"dotnetUtils.d.ts","sourceRoot":"","sources":["../../src/dotnetUtils.ts"],"names":[],"mappings":"AAMA;;;;GAIG;AACH,wBAAsB,WAAW,CAAC,WAAW,EAAE,MAAM,iBAGpD;AAED;;;;;;GAMG;AACH,wBAAsB,aAAa,CAAC,WAAW,GAAE,MAAa,EAAE,aAAa,GAAE,MAAkB,EAAE,SAAS,GAAE,MAAkB,EAAE,GAAG,CAAC,EAAE,MAAM,iBAY7I;AAED;;GAEG;AACH,wBAAsB,2BAA2B,kBAShD;AAED;;;;GAIG;AACH,wBAAsB,uBAAuB,kBAG5C"}