@mikeyt23/node-cli-utils 1.4.1 → 2.0.0-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +45 -87
- package/dist/cjs/GitUtility.d.ts +7 -0
- package/dist/cjs/GitUtility.d.ts.map +1 -0
- package/dist/cjs/GitUtility.js +49 -0
- package/dist/cjs/NodeCliUtilsConfig.d.ts +21 -0
- package/dist/cjs/NodeCliUtilsConfig.d.ts.map +1 -0
- package/dist/cjs/NodeCliUtilsConfig.js +41 -0
- package/dist/cjs/TarballUtility.d.ts +63 -0
- package/dist/cjs/TarballUtility.d.ts.map +1 -0
- package/dist/cjs/TarballUtility.js +143 -0
- package/dist/cjs/certUtils.d.ts +66 -0
- package/dist/cjs/certUtils.d.ts.map +1 -0
- package/dist/cjs/certUtils.js +283 -0
- package/dist/cjs/dbMigrationUtils.d.ts +39 -0
- package/dist/cjs/dbMigrationUtils.d.ts.map +1 -0
- package/dist/cjs/dbMigrationUtils.js +195 -0
- package/dist/cjs/dotnetUtils.d.ts +25 -0
- package/dist/cjs/dotnetUtils.d.ts.map +1 -0
- package/dist/cjs/dotnetUtils.js +61 -0
- package/dist/cjs/esmSpecific.d.mts +7 -0
- package/dist/cjs/esmSpecific.d.mts.map +1 -0
- package/dist/cjs/esmSpecific.mjs +15 -0
- package/dist/cjs/generalUtils.d.ts +565 -0
- package/dist/cjs/generalUtils.d.ts.map +1 -0
- package/dist/cjs/generalUtils.js +1068 -0
- package/dist/cjs/generalUtilsInternal.d.ts +15 -0
- package/dist/cjs/generalUtilsInternal.d.ts.map +1 -0
- package/dist/cjs/generalUtilsInternal.js +317 -0
- package/dist/cjs/hostsUtils.d.ts +16 -0
- package/dist/cjs/hostsUtils.d.ts.map +1 -0
- package/dist/cjs/hostsUtils.js +82 -0
- package/dist/cjs/index.d.ts +4 -0
- package/dist/cjs/index.d.ts.map +1 -0
- package/dist/cjs/index.js +25 -0
- package/dist/cjs/package.json +5 -0
- package/dist/cjs/runWhileParentAlive.d.ts +2 -0
- package/dist/cjs/runWhileParentAlive.d.ts.map +1 -0
- package/dist/cjs/runWhileParentAlive.js +159 -0
- package/dist/esm/GitUtility.d.ts +7 -0
- package/dist/esm/GitUtility.d.ts.map +1 -0
- package/dist/esm/GitUtility.js +43 -0
- package/dist/esm/NodeCliUtilsConfig.d.ts +21 -0
- package/dist/esm/NodeCliUtilsConfig.d.ts.map +1 -0
- package/dist/esm/NodeCliUtilsConfig.js +35 -0
- package/dist/esm/TarballUtility.d.ts +63 -0
- package/dist/esm/TarballUtility.d.ts.map +1 -0
- package/dist/esm/TarballUtility.js +139 -0
- package/dist/esm/certUtils.d.ts +66 -0
- package/dist/esm/certUtils.d.ts.map +1 -0
- package/dist/esm/certUtils.js +271 -0
- package/dist/esm/dbMigrationUtils.d.ts +39 -0
- package/dist/esm/dbMigrationUtils.d.ts.map +1 -0
- package/dist/esm/dbMigrationUtils.js +184 -0
- package/dist/esm/dotnetUtils.d.ts +25 -0
- package/dist/esm/dotnetUtils.d.ts.map +1 -0
- package/dist/esm/dotnetUtils.js +54 -0
- package/dist/esm/esmSpecific.d.mts +7 -0
- package/dist/esm/esmSpecific.d.mts.map +1 -0
- package/dist/esm/esmSpecific.mjs +11 -0
- package/dist/esm/generalUtils.d.ts +565 -0
- package/dist/esm/generalUtils.d.ts.map +1 -0
- package/dist/esm/generalUtils.js +976 -0
- package/dist/esm/generalUtilsInternal.d.ts +15 -0
- package/dist/esm/generalUtilsInternal.d.ts.map +1 -0
- package/dist/esm/generalUtilsInternal.js +278 -0
- package/dist/esm/hostsUtils.d.ts +16 -0
- package/dist/esm/hostsUtils.d.ts.map +1 -0
- package/dist/esm/hostsUtils.js +69 -0
- package/dist/esm/index.d.ts +4 -0
- package/dist/esm/index.d.ts.map +1 -0
- package/dist/esm/index.js +4 -0
- package/dist/esm/runWhileParentAlive.d.ts +2 -0
- package/dist/esm/runWhileParentAlive.d.ts.map +1 -0
- package/dist/esm/runWhileParentAlive.js +151 -0
- package/package.json +69 -10
- package/index.js +0 -627
|
@@ -0,0 +1,271 @@
|
|
|
1
|
+
import fs from 'node:fs';
|
|
2
|
+
import fsp from 'node:fs/promises';
|
|
3
|
+
import path from 'node:path';
|
|
4
|
+
import { Emoji, ensureDirectory, getPowershellHackArgs, isPlatformMac, isPlatformWindows, logIf, red, requireString, requireValidPath, simpleSpawnSync, spawnAsync, stringToNonEmptyLines, whichSync } from './generalUtils.js';
|
|
5
|
+
const defaultCertLogOptions = {
|
|
6
|
+
logSpawnOutput: false,
|
|
7
|
+
logTraceMessages: false,
|
|
8
|
+
logElevatedPermissionsMessage: true,
|
|
9
|
+
logSuccess: true
|
|
10
|
+
};
|
|
11
|
+
/**
|
|
12
|
+
* Wrapper function for calling openssl to generate a self-signed cert to be used for developing a local website with trusted https.
|
|
13
|
+
* @param url The url to generate a cert for. This will be used as the common name (CN) in the cert as well as the filename for the generated cert files.
|
|
14
|
+
* @param options Options for generating the cert.
|
|
15
|
+
* @returns The path to the generated pfx file.
|
|
16
|
+
*/
|
|
17
|
+
export async function generateCertWithOpenSsl(url, options) {
|
|
18
|
+
requireString('url', url);
|
|
19
|
+
throwIfMaybeBadUrlChars(url);
|
|
20
|
+
const isMac = isPlatformMac();
|
|
21
|
+
const mergedOptions = { ...defaultCertLogOptions, outputDirectory: './cert', ...options };
|
|
22
|
+
const spawnArgs = { cwd: mergedOptions.outputDirectory, stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' };
|
|
23
|
+
logIf(mergedOptions.logTraceMessages, 'checking if openssl is installed');
|
|
24
|
+
let brewOpenSslPath = '';
|
|
25
|
+
if (!isMac) {
|
|
26
|
+
const openSslPath = whichSync('openssl').location;
|
|
27
|
+
if (!openSslPath) {
|
|
28
|
+
throw Error('openssl is required but was not found');
|
|
29
|
+
}
|
|
30
|
+
logIf(mergedOptions.logTraceMessages, `using openssl at: ${openSslPath}`);
|
|
31
|
+
}
|
|
32
|
+
else if (isMac) {
|
|
33
|
+
const brewOpenSslDirectory = getBrewOpensslPath();
|
|
34
|
+
if (!brewOpenSslDirectory) {
|
|
35
|
+
throw Error('openssl (brew version) is required but was not found');
|
|
36
|
+
}
|
|
37
|
+
brewOpenSslPath = `${getBrewOpensslPath()}/bin/openssl`;
|
|
38
|
+
if (!fs.existsSync(brewOpenSslPath)) {
|
|
39
|
+
throw Error(`openssl (brew version) is required but was not found at: ${brewOpenSslPath}`);
|
|
40
|
+
}
|
|
41
|
+
else {
|
|
42
|
+
logIf(mergedOptions.logTraceMessages, `using openssl at: ${brewOpenSslPath}`);
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
ensureDirectory(mergedOptions.outputDirectory);
|
|
46
|
+
const crtName = url + '.crt';
|
|
47
|
+
const keyName = url + '.key';
|
|
48
|
+
const pfxName = url + '.pfx';
|
|
49
|
+
const sanCnfName = url + '.cnf';
|
|
50
|
+
const filesToCheck = [crtName, keyName, pfxName, sanCnfName];
|
|
51
|
+
for (const file of filesToCheck) {
|
|
52
|
+
const filePath = path.join(mergedOptions.outputDirectory, file);
|
|
53
|
+
if (fs.existsSync(filePath)) {
|
|
54
|
+
throw Error(`${Emoji.Stop} File ${filePath} already exists. Delete or rename all of the following files from '${mergedOptions.outputDirectory}' if you want to generate a new cert: ${filesToCheck.join(', ')}.`);
|
|
55
|
+
}
|
|
56
|
+
}
|
|
57
|
+
logIf(mergedOptions.logTraceMessages, `writing ${sanCnfName} file for use with openssl command`);
|
|
58
|
+
const sanCnfContents = getSanCnfFileContents(url);
|
|
59
|
+
const sanCnfPath = path.join(mergedOptions.outputDirectory, sanCnfName);
|
|
60
|
+
await fsp.writeFile(sanCnfPath, sanCnfContents);
|
|
61
|
+
logIf(mergedOptions.logTraceMessages, `attempting to generate cert ${pfxName}`);
|
|
62
|
+
const genKeyAndCrtArgs = `req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout ${keyName} -out ${crtName} -subj /CN=${url} -config ${sanCnfName}`.split(' ');
|
|
63
|
+
const command = isMac ? brewOpenSslPath : 'openssl';
|
|
64
|
+
let result = await spawnAsync(command, genKeyAndCrtArgs, spawnArgs);
|
|
65
|
+
throwIfSpawnResultError(result);
|
|
66
|
+
logIf(mergedOptions.logTraceMessages, 'converting key and crt to pfx');
|
|
67
|
+
const convertToPfxArgs = `pkcs12 -certpbe AES-256-CBC -export -out ${pfxName} -aes256 -inkey ${keyName} -in ${crtName} -password pass:`.split(' ');
|
|
68
|
+
result = await spawnAsync(command, convertToPfxArgs, spawnArgs);
|
|
69
|
+
throwIfSpawnResultError(result);
|
|
70
|
+
const pfxPath = path.join(mergedOptions.outputDirectory, pfxName);
|
|
71
|
+
logIf(mergedOptions.logSuccess, `${Emoji.GreenCheck} Successfully generated cert: ${pfxPath}`);
|
|
72
|
+
return pfxPath;
|
|
73
|
+
}
|
|
74
|
+
/**
|
|
75
|
+
* Uses Powershell to install a cert to the local machine's trusted root store. Must have elevated permissions.
|
|
76
|
+
* If the cert is already installed, this function will do nothing.
|
|
77
|
+
* @param pfxPath The path to the pfx file to install.
|
|
78
|
+
*/
|
|
79
|
+
export async function winInstallCert(pfxPath, options) {
|
|
80
|
+
if (!isPlatformWindows()) {
|
|
81
|
+
throw Error('winInstallCert is only supported on Windows');
|
|
82
|
+
}
|
|
83
|
+
validatePfxPath(pfxPath);
|
|
84
|
+
const mergedOptions = { ...defaultCertLogOptions, ...options };
|
|
85
|
+
logIf(mergedOptions.logElevatedPermissionsMessage, getRequiresElevatedPermissionsMessage(true));
|
|
86
|
+
if (await winCertIsInstalled({ pfxPath }, mergedOptions)) {
|
|
87
|
+
const certInfo = await winGetPfxInfo(pfxPath);
|
|
88
|
+
logIf(mergedOptions.logTraceMessages, `${Emoji.Warning} certificate '${pfxPath}' with subject '${certInfo.subject}' is already installed - to install it again, first uninstall it manually or with the winUninstallCert function`);
|
|
89
|
+
return;
|
|
90
|
+
}
|
|
91
|
+
logIf(mergedOptions.logTraceMessages, `installing cert '${pfxPath}'`);
|
|
92
|
+
const psCommandArgs = getPowershellHackArgs(`Import-PfxCertificate -FilePath '${pfxPath}' -CertStoreLocation Cert:\\LocalMachine\\Root`);
|
|
93
|
+
const result = await spawnAsync('powershell', psCommandArgs, { stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' });
|
|
94
|
+
throwIfSpawnResultError(result);
|
|
95
|
+
logIf(mergedOptions.logSuccess, `${Emoji.GreenCheck} Successfully installed cert: ${pfxPath}`);
|
|
96
|
+
}
|
|
97
|
+
/**
|
|
98
|
+
* Uses Powershell to check if a cert is already installed to the local machine's trusted root store.
|
|
99
|
+
* Uses the subject of the cert in order to avoid false negatives from regenerating the same self-signed cert
|
|
100
|
+
* with the same subject but different thumbprint. Note that this method is geared towards use with certs generated
|
|
101
|
+
* with the {@link generateCertWithOpenSsl} function, so this may not work using subject if your subject is not precisely "`CN=<url>`".
|
|
102
|
+
* @param identifier The subject or path to the pfx file of the cert to check.
|
|
103
|
+
* @returns `true` if the cert is already installed, `false` otherwise.
|
|
104
|
+
*/
|
|
105
|
+
export async function winCertIsInstalled(identifier, options) {
|
|
106
|
+
if (!isPlatformWindows()) {
|
|
107
|
+
throw new Error('winCertIsInstalled is only supported on Windows');
|
|
108
|
+
}
|
|
109
|
+
const mergedOptions = { ...defaultCertLogOptions, ...options };
|
|
110
|
+
let psCommandArgs;
|
|
111
|
+
// Get the count of certs installed with the same subject as the one we're trying to install
|
|
112
|
+
if (typeof identifier === 'string') {
|
|
113
|
+
requireString('subject', identifier);
|
|
114
|
+
validateSubject(identifier);
|
|
115
|
+
const subject = identifier.startsWith('CN=') ? identifier : `CN=${identifier}`;
|
|
116
|
+
psCommandArgs = getPowershellHackArgs(`Write-Host (Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -eq '${subject}' } | Measure-Object).Count`);
|
|
117
|
+
}
|
|
118
|
+
else if ('pfxPath' in identifier) {
|
|
119
|
+
validatePfxPath(identifier.pfxPath);
|
|
120
|
+
psCommandArgs = getPowershellHackArgs(`Write-Host (Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -eq (Get-PfxCertificate -FilePath '${identifier.pfxPath}').Subject } | Measure-Object).Count`);
|
|
121
|
+
}
|
|
122
|
+
const tracePart = (typeof identifier === 'string') ? `subject ${identifier}` : `pfxPath ${identifier.pfxPath}`;
|
|
123
|
+
logIf(mergedOptions.logTraceMessages, `checking if cert with ${tracePart} is already installed`);
|
|
124
|
+
const result = await spawnAsync('powershell', psCommandArgs, { stdio: 'pipe' });
|
|
125
|
+
throwIfSpawnResultError(result);
|
|
126
|
+
const lines = stringToNonEmptyLines(result.stdout);
|
|
127
|
+
if (lines.length !== 1) {
|
|
128
|
+
throw new Error(`Unexpected output from powershell command to check if the cert is already installed: ${result.stdout}`);
|
|
129
|
+
}
|
|
130
|
+
return lines[0].trim() !== '0';
|
|
131
|
+
}
|
|
132
|
+
/**
|
|
133
|
+
* Uses Powershell to uninstall a cert from the local machine's trusted root store. Must have elevated permissions.
|
|
134
|
+
* @param identifier The subject, thumbprint or path to the pfx file of the cert to uninstall.
|
|
135
|
+
* @param options Options for uninstalling the cert.
|
|
136
|
+
*/
|
|
137
|
+
export async function winUninstallCert(identifier, options) {
|
|
138
|
+
if (!isPlatformWindows()) {
|
|
139
|
+
throw new Error('winUninstallCert is only supported on Windows');
|
|
140
|
+
}
|
|
141
|
+
const mergedOptions = { ...defaultCertLogOptions, ...options };
|
|
142
|
+
logIf(mergedOptions.logElevatedPermissionsMessage, getRequiresElevatedPermissionsMessage(false));
|
|
143
|
+
let psCommandArgs;
|
|
144
|
+
if (typeof identifier === 'string') {
|
|
145
|
+
requireString('subject', identifier);
|
|
146
|
+
validateSubject(identifier);
|
|
147
|
+
psCommandArgs = getPowershellHackArgs(`Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Subject -match '${identifier}' } | Remove-Item`);
|
|
148
|
+
}
|
|
149
|
+
else if ('thumbprint' in identifier) {
|
|
150
|
+
validateNoQuotes('thumbprint', identifier.thumbprint);
|
|
151
|
+
psCommandArgs = getPowershellHackArgs(`Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Thumbprint -eq '${identifier.thumbprint}' } | Remove-Item`);
|
|
152
|
+
}
|
|
153
|
+
else if ('pfxPath' in identifier) {
|
|
154
|
+
validatePfxPath(identifier.pfxPath);
|
|
155
|
+
psCommandArgs = getPowershellHackArgs(`$thumbprint = (Get-PfxCertificate -FilePath '${identifier.pfxPath}').Thumbprint; Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object { $_.Thumbprint -eq $thumbprint } | Remove-Item`);
|
|
156
|
+
}
|
|
157
|
+
const tracePart = typeof identifier === 'string' ? `'${identifier}'` : JSON.stringify(identifier);
|
|
158
|
+
logIf(mergedOptions.logTraceMessages, `uninstalling cert ${tracePart}`);
|
|
159
|
+
const result = await spawnAsync('powershell', psCommandArgs, { stdio: mergedOptions.logSpawnOutput ? 'inherit' : 'pipe' });
|
|
160
|
+
throwIfSpawnResultError(result);
|
|
161
|
+
logIf(mergedOptions.logSuccess, `${Emoji.GreenCheck} Successfully uninstalled cert`);
|
|
162
|
+
}
|
|
163
|
+
/**
|
|
164
|
+
* Uses Powershell to get info about a cert.
|
|
165
|
+
* @param pfxPath The path to the pfx file to get info for.
|
|
166
|
+
* @returns The subject, thumbprint and pfxPath of the cert.
|
|
167
|
+
*/
|
|
168
|
+
export async function winGetPfxInfo(pfxPath) {
|
|
169
|
+
if (!isPlatformWindows()) {
|
|
170
|
+
throw new Error('winGetPfxInfo is only supported on Windows');
|
|
171
|
+
}
|
|
172
|
+
validatePfxPath(pfxPath);
|
|
173
|
+
const psCommandArgs = getPowershellHackArgs(`Get-PfxCertificate -FilePath '${pfxPath}' | Select-Object -Property Subject, Thumbprint, @{Name='PfxPath';Expression={'${pfxPath}'}} | ConvertTo-Json`);
|
|
174
|
+
const result = await spawnAsync('powershell', psCommandArgs, { stdio: 'pipe' });
|
|
175
|
+
throwIfSpawnResultError(result);
|
|
176
|
+
const json = result.stdout.trim();
|
|
177
|
+
const parsedJson = JSON.parse(json);
|
|
178
|
+
const certInfo = {
|
|
179
|
+
subject: parsedJson.Subject,
|
|
180
|
+
thumbprint: parsedJson.Thumbprint,
|
|
181
|
+
pfxPath: parsedJson.PfxPath
|
|
182
|
+
};
|
|
183
|
+
return certInfo;
|
|
184
|
+
}
|
|
185
|
+
/**
|
|
186
|
+
* Does not actually do anything - just outputs the manual instructions for installing a cert for use by chrome on linux.
|
|
187
|
+
*/
|
|
188
|
+
export function linuxInstallCert() {
|
|
189
|
+
const instructions = `Automated linux cert install not supported (chrome does not use system certs without significant extra configuration).
|
|
190
|
+
Manual Instructions:
|
|
191
|
+
- In Chrome, go to chrome://settings/certificates
|
|
192
|
+
- Select Authorities -> import
|
|
193
|
+
- Select your generated .crt file (in the ./cert/ directory by default - if you haven't generated it, see the generateCertWithOpenSsl function)
|
|
194
|
+
- Check box for "Trust certificate for identifying websites"
|
|
195
|
+
- Click OK
|
|
196
|
+
- Reload site`;
|
|
197
|
+
console.log(instructions);
|
|
198
|
+
}
|
|
199
|
+
function throwIfMaybeBadUrlChars(url, varName = 'url') {
|
|
200
|
+
if (url.includes(' ')) {
|
|
201
|
+
throw Error(`${varName} should not contain spaces`);
|
|
202
|
+
}
|
|
203
|
+
if (url.includes('/')) {
|
|
204
|
+
throw Error(`${varName} should not contain forward slashes`);
|
|
205
|
+
}
|
|
206
|
+
if (url.includes('\\')) {
|
|
207
|
+
throw Error(`${varName} should not contain backslashes`);
|
|
208
|
+
}
|
|
209
|
+
}
|
|
210
|
+
function getBrewOpensslPath() {
|
|
211
|
+
const brewResult = simpleSpawnSync('brew', ['--prefix', 'openssl']);
|
|
212
|
+
if (brewResult.error) {
|
|
213
|
+
throw Error('error attempting to find openssl installed by brew');
|
|
214
|
+
}
|
|
215
|
+
if (brewResult.stdoutLines.length === 0 || brewResult.stdoutLines.length > 1) {
|
|
216
|
+
throw new Error(`unexpected output from brew command 'brew --prefix openssl': ${brewResult.stdout}`);
|
|
217
|
+
}
|
|
218
|
+
return brewResult.stdoutLines[0];
|
|
219
|
+
}
|
|
220
|
+
function getSanCnfFileContents(url) {
|
|
221
|
+
return sanCnfTemplate.replace(/{{url}}/g, url);
|
|
222
|
+
}
|
|
223
|
+
function validateSubject(subject) {
|
|
224
|
+
if (subject.includes('\\') || subject.includes('/') || subject.endsWith('.pfx')) {
|
|
225
|
+
throw new Error(`The subject appears to be a file path, which is not allowed. Did you mean to pass something like this instead: { pfxPath: '${subject}' } ?`);
|
|
226
|
+
}
|
|
227
|
+
validateNoQuotes('subject', subject);
|
|
228
|
+
}
|
|
229
|
+
function validateNoQuotes(name, value) {
|
|
230
|
+
if (value.includes("'") || value.includes('"')) {
|
|
231
|
+
throw new Error(`The value passed for '${name}' contains a single or double quote, which is not allowed.`);
|
|
232
|
+
}
|
|
233
|
+
}
|
|
234
|
+
function throwIfSpawnResultError(result) {
|
|
235
|
+
if (result.code !== 0) {
|
|
236
|
+
// There won't be any stderr if stdio was set to 'inherit', so we're checking first
|
|
237
|
+
if (result.stderr) {
|
|
238
|
+
console.error(red('Error:'), result.stderr);
|
|
239
|
+
}
|
|
240
|
+
throw Error(`Spawned command failed with exit code ${result.code}`);
|
|
241
|
+
}
|
|
242
|
+
}
|
|
243
|
+
function validatePfxPath(pfxPath) {
|
|
244
|
+
if (!pfxPath.endsWith('.pfx')) {
|
|
245
|
+
throw new Error('pfxPath must end with .pfx');
|
|
246
|
+
}
|
|
247
|
+
requireValidPath('pfxPath', pfxPath);
|
|
248
|
+
validateNoQuotes('pfxPath', pfxPath);
|
|
249
|
+
}
|
|
250
|
+
function getRequiresElevatedPermissionsMessage(isInstall = true) {
|
|
251
|
+
return `${Emoji.Info} Important: ${isInstall ? '' : 'un'}installing a certificate requires elevated permissions`;
|
|
252
|
+
}
|
|
253
|
+
// Newer cert requirements force the need for "extension info" with DNS and IP info, but openssl v1.x doesn't support that with the
|
|
254
|
+
// CLI option -addext, so we're using a san.cnf file instead and passing this into the CLI command with the -config option.
|
|
255
|
+
const sanCnfTemplate = `[req]
|
|
256
|
+
distinguished_name=req
|
|
257
|
+
x509_extensions = v3_req
|
|
258
|
+
prompt = no
|
|
259
|
+
|
|
260
|
+
[req_distinguished_name]
|
|
261
|
+
CN = {{url}}
|
|
262
|
+
|
|
263
|
+
[v3_req]
|
|
264
|
+
subjectAltName = @alt_names
|
|
265
|
+
|
|
266
|
+
[alt_names]
|
|
267
|
+
DNS.1 = {{url}}
|
|
268
|
+
IP.1 = 127.0.0.1
|
|
269
|
+
|
|
270
|
+
`;
|
|
271
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certUtils.js","sourceRoot":"","sources":["../../src/certUtils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,SAAS,CAAA;AACxB,OAAO,GAAG,MAAM,kBAAkB,CAAA;AAClC,OAAO,IAAI,MAAM,WAAW,CAAA;AAC5B,OAAO,EACL,KAAK,EAGL,eAAe,EACf,qBAAqB,EACrB,aAAa,EACb,iBAAiB,EACjB,KAAK,EACL,GAAG,EACH,aAAa,EACb,gBAAgB,EAChB,eAAe,EACf,UAAU,EACV,qBAAqB,EACrB,SAAS,EACV,MAAM,mBAAmB,CAAA;AAe1B,MAAM,qBAAqB,GAAmB;IAC5C,cAAc,EAAE,KAAK;IACrB,gBAAgB,EAAE,KAAK;IACvB,6BAA6B,EAAE,IAAI;IACnC,UAAU,EAAE,IAAI;CACjB,CAAA;AAWD;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,uBAAuB,CAAC,GAAW,EAAE,OAAsC;IAC/F,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAA;IACzB,uBAAuB,CAAC,GAAG,CAAC,CAAA;IAC5B,MAAM,KAAK,GAAG,aAAa,EAAE,CAAA;IAE7B,MAAM,aAAa,GAAwB,EAAE,GAAG,qBAAqB,EAAE,eAAe,EAAE,QAAQ,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9G,MAAM,SAAS,GAAmC,EAAE,GAAG,EAAE,aAAa,CAAC,eAAe,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAA;IAElJ,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,kCAAkC,CAAC,CAAA;IAEzE,IAAI,eAAe,GAAW,EAAE,CAAA;IAChC,IAAI,CAAC,KAAK,EAAE;QACV,MAAM,WAAW,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC,QAAQ,CAAA;QACjD,IAAI,CAAC,WAAW,EAAE;YAChB,MAAM,KAAK,CAAC,uCAAuC,CAAC,CAAA;SACrD;QACD,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,WAAW,EAAE,CAAC,CAAA;KAC1E;SAAM,IAAI,KAAK,EAAE;QAChB,MAAM,oBAAoB,GAAG,kBAAkB,EAAE,CAAA;QACjD,IAAI,CAAC,oBAAoB,EAAE;YACzB,MAAM,KAAK,CAAC,sDAAsD,CAAC,CAAA;SACpE;QACD,eAAe,GAAG,GAAG,kBAAkB,EAAE,cAAc,CAAA;QACvD,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,eAAe,CAAC,EAAE;YACnC,MAAM,KAAK,CAAC,4DAA4D,eAAe,EAAE,CAAC,CAAA;SAC3F;aAAM;YACL,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,eAAe,EAAE,CAAC,CAAA;SAC9E;KACF;IAED,eAAe,CAAC,aAAa,CAAC,eAAe,CAAC,CAAA;IAC9C,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,OAAO,GAAG,GAAG,GAAG,MAAM,CAAA;IAC5B,MAAM,UAAU,GAAG,GAAG,GAAG,MAAM,CAAA;IAE/B,MAAM,YAAY,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,UAAU,CAAC,CAAA;IAC5D,KAAK,MAAM,IAAI,IAAI,YAAY,EAAE;QAC/B,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,CAAA;QAC/D,IAAI,EAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE;YAC3B,MAAM,KAAK,CAAC,GAAG,KAAK,CAAC,IAAI,SAAS,QAAQ,sEAAsE,aAAa,CAAC,eAAe,yCAAyC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;SAClN;KACF;IAED,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,WAAW,UAAU,oCAAoC,CAAC,CAAA;IAChG,MAAM,cAAc,GAAG,qBAAqB,CAAC,GAAG,CAAC,CAAA;IACjD,MAAM,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,UAAU,CAAC,CAAA;IACvE,MAAM,GAAG,CAAC,SAAS,CAAC,UAAU,EAAE,cAAc,CAAC,CAAA;IAE/C,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,+BAA+B,OAAO,EAAE,CAAC,CAAA;IAC/E,MAAM,gBAAgB,GAAG,gEAAgE,OAAO,SAAS,OAAO,cAAc,GAAG,YAAY,UAAU,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IACpK,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAA;IACnD,IAAI,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,EAAE,gBAAgB,EAAE,SAAS,CAAC,CAAA;IACnE,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,+BAA+B,CAAC,CAAA;IACtE,MAAM,gBAAgB,GAAG,4CAA4C,OAAO,mBAAmB,OAAO,QAAQ,OAAO,kBAAkB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IAClJ,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,EAAE,gBAAgB,EAAE,SAAS,CAAC,CAAA;IAC/D,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,OAAO,CAAC,CAAA;IAEjE,KAAK,CAAC,aAAa,CAAC,UAAU,EAAE,GAAG,KAAK,CAAC,UAAU,iCAAiC,OAAO,EAAE,CAAC,CAAA;IAE9F,OAAO,OAAO,CAAA;AAChB,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,cAAc,CAAC,OAAe,EAAE,OAAiC;IACrF,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,KAAK,CAAC,6CAA6C,CAAC,CAAA;KAC3D;IACD,eAAe,CAAC,OAAO,CAAC,CAAA;IAExB,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,KAAK,CAAC,aAAa,CAAC,6BAA6B,EAAE,qCAAqC,CAAC,IAAI,CAAC,CAAC,CAAA;IAE/F,IAAI,MAAM,kBAAkB,CAAC,EAAE,OAAO,EAAE,EAAE,aAAa,CAAC,EAAE;QACxD,MAAM,QAAQ,GAAG,MAAM,aAAa,CAAC,OAAO,CAAC,CAAA;QAC7C,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,GAAG,KAAK,CAAC,OAAO,iBAAiB,OAAO,mBAAmB,QAAQ,CAAC,OAAO,iHAAiH,CAAC,CAAA;QACnO,OAAM;KACP;IAED,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,oBAAoB,OAAO,GAAG,CAAC,CAAA;IAErE,MAAM,aAAa,GAAG,qBAAqB,CAAC,oCAAoC,OAAO,gDAAgD,CAAC,CAAA;IACxI,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAA;IAE1H,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,KAAK,CAAC,aAAa,CAAC,UAAU,EAAE,GAAG,KAAK,CAAC,UAAU,iCAAiC,OAAO,EAAE,CAAC,CAAA;AAChG,CAAC;AAED;;;;;;;GAOG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,UAA2C,EAAE,OAAiC;IACrH,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAA;KACnE;IAED,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,IAAI,aAAa,CAAA;IAEjB,4FAA4F;IAC5F,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE;QAClC,aAAa,CAAC,SAAS,EAAE,UAAU,CAAC,CAAA;QACpC,eAAe,CAAC,UAAU,CAAC,CAAA;QAC3B,MAAM,OAAO,GAAG,UAAU,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,MAAM,UAAU,EAAE,CAAA;QAC9E,aAAa,GAAG,qBAAqB,CAAC,wFAAwF,OAAO,6BAA6B,CAAC,CAAA;KACpK;SAAM,IAAI,SAAS,IAAI,UAAU,EAAE;QAClC,eAAe,CAAC,UAAU,CAAC,OAAO,CAAC,CAAA;QACnC,aAAa,GAAG,qBAAqB,CAAC,sHAAsH,UAAU,CAAC,OAAO,sCAAsC,CAAC,CAAA;KACtN;IAED,MAAM,SAAS,GAAG,CAAC,OAAO,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,WAAW,UAAU,EAAE,CAAC,CAAC,CAAC,WAAW,UAAU,CAAC,OAAO,EAAE,CAAA;IAC9G,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,yBAAyB,SAAS,uBAAuB,CAAC,CAAA;IAEhG,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC,CAAA;IAE/E,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,KAAK,GAAG,qBAAqB,CAAC,MAAM,CAAC,MAAM,CAAC,CAAA;IAElD,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE;QACtB,MAAM,IAAI,KAAK,CAAC,wFAAwF,MAAM,CAAC,MAAM,EAAE,CAAC,CAAA;KACzH;IAED,OAAO,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,KAAK,GAAG,CAAA;AAChC,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,UAA0B,EAAE,OAAiC;IAClG,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAA;KACjE;IAED,MAAM,aAAa,GAAG,EAAE,GAAG,qBAAqB,EAAE,GAAG,OAAO,EAAE,CAAA;IAE9D,KAAK,CAAC,aAAa,CAAC,6BAA6B,EAAE,qCAAqC,CAAC,KAAK,CAAC,CAAC,CAAA;IAEhG,IAAI,aAAa,CAAA;IAEjB,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE;QAClC,aAAa,CAAC,SAAS,EAAE,UAAU,CAAC,CAAA;QACpC,eAAe,CAAC,UAAU,CAAC,CAAA;QAC3B,aAAa,GAAG,qBAAqB,CAAC,+EAA+E,UAAU,mBAAmB,CAAC,CAAA;KACpJ;SAAM,IAAI,YAAY,IAAI,UAAU,EAAE;QACrC,gBAAgB,CAAC,YAAY,EAAE,UAAU,CAAC,UAAU,CAAC,CAAA;QACrD,aAAa,GAAG,qBAAqB,CAAC,+EAA+E,UAAU,CAAC,UAAU,mBAAmB,CAAC,CAAA;KAC/J;SAAM,IAAI,SAAS,IAAI,UAAU,EAAE;QAClC,eAAe,CAAC,UAAU,CAAC,OAAO,CAAC,CAAA;QACnC,aAAa,GAAG,qBAAqB,CAAC,gDAAgD,UAAU,CAAC,OAAO,uHAAuH,CAAC,CAAA;KACjO;IAED,MAAM,SAAS,GAAG,OAAO,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,IAAI,UAAU,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,CAAA;IACjG,KAAK,CAAC,aAAa,CAAC,gBAAgB,EAAE,qBAAqB,SAAS,EAAE,CAAC,CAAA;IAEvE,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,aAAa,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAA;IAE1H,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,KAAK,CAAC,aAAa,CAAC,UAAU,EAAE,GAAG,KAAK,CAAC,UAAU,gCAAgC,CAAC,CAAA;AACtF,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,aAAa,CAAC,OAAe;IACjD,IAAI,CAAC,iBAAiB,EAAE,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAA;KAC9D;IACD,eAAe,CAAC,OAAO,CAAC,CAAA;IAExB,MAAM,aAAa,GAAG,qBAAqB,CAAC,iCAAiC,OAAO,kFAAkF,OAAO,sBAAsB,CAAC,CAAA;IACpM,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,YAAY,EAAE,aAAa,EAAE,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC,CAAA;IAE/E,uBAAuB,CAAC,MAAM,CAAC,CAAA;IAE/B,MAAM,IAAI,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CAAA;IACjC,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAA;IAEnC,MAAM,QAAQ,GAAa;QACzB,OAAO,EAAE,UAAU,CAAC,OAAO;QAC3B,UAAU,EAAE,UAAU,CAAC,UAAU;QACjC,OAAO,EAAE,UAAU,CAAC,OAAO;KAC5B,CAAA;IAED,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,gBAAgB;IAC9B,MAAM,YAAY,GAAG;;;;;;;cAOT,CAAA;IACZ,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAA;AAC3B,CAAC;AAED,SAAS,uBAAuB,CAAC,GAAW,EAAE,OAAO,GAAG,KAAK;IAC3D,IAAI,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACrB,MAAM,KAAK,CAAC,GAAG,OAAO,4BAA4B,CAAC,CAAA;KACpD;IACD,IAAI,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACrB,MAAM,KAAK,CAAC,GAAG,OAAO,qCAAqC,CAAC,CAAA;KAC7D;IACD,IAAI,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE;QACtB,MAAM,KAAK,CAAC,GAAG,OAAO,iCAAiC,CAAC,CAAA;KACzD;AACH,CAAC;AAED,SAAS,kBAAkB;IACzB,MAAM,UAAU,GAAG,eAAe,CAAC,MAAM,EAAE,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC,CAAA;IACnE,IAAI,UAAU,CAAC,KAAK,EAAE;QACpB,MAAM,KAAK,CAAC,oDAAoD,CAAC,CAAA;KAClE;IACD,IAAI,UAAU,CAAC,WAAW,CAAC,MAAM,KAAK,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE;QAC5E,MAAM,IAAI,KAAK,CAAC,gEAAgE,UAAU,CAAC,MAAM,EAAE,CAAC,CAAA;KACrG;IACD,OAAO,UAAU,CAAC,WAAW,CAAC,CAAC,CAAC,CAAA;AAClC,CAAC;AAED,SAAS,qBAAqB,CAAC,GAAW;IACxC,OAAO,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,GAAG,CAAC,CAAA;AAChD,CAAC;AAED,SAAS,eAAe,CAAC,OAAe;IACtC,IAAI,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;QAC/E,MAAM,IAAI,KAAK,CAAC,8HAA8H,OAAO,OAAO,CAAC,CAAA;KAC9J;IACD,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;AACtC,CAAC;AAED,SAAS,gBAAgB,CAAC,IAAY,EAAE,KAAa;IACnD,IAAI,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QAC9C,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,4DAA4D,CAAC,CAAA;KAC3G;AACH,CAAC;AAED,SAAS,uBAAuB,CAAC,MAAmB;IAClD,IAAI,MAAM,CAAC,IAAI,KAAK,CAAC,EAAE;QACrB,mFAAmF;QACnF,IAAI,MAAM,CAAC,MAAM,EAAE;YACjB,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC,MAAM,CAAC,CAAA;SAC5C;QACD,MAAM,KAAK,CAAC,yCAAyC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAA;KACpE;AACH,CAAC;AAED,SAAS,eAAe,CAAC,OAAe;IACtC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;QAC7B,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAA;KAC9C;IACD,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;IACpC,gBAAgB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;AACtC,CAAC;AAED,SAAS,qCAAqC,CAAC,SAAS,GAAG,IAAI;IAC7D,OAAO,GAAG,KAAK,CAAC,IAAI,eAAe,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,wDAAwD,CAAA;AAClH,CAAC;AAED,mIAAmI;AACnI,2HAA2H;AAC3H,MAAM,cAAc,GAAG;;;;;;;;;;;;;;;CAetB,CAAA"}
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Wrapper function for `dotnet ef`. If you don't pass `false` for `noBuild`, be sure the project has already been built by some other means.
|
|
3
|
+
*
|
|
4
|
+
* Docs for "dotnet ef" CLI: https://learn.microsoft.com/en-us/ef/core/cli/dotnet.
|
|
5
|
+
* @param projectPath Path to project that has the DbContext and Migration files used for the `--project` argument
|
|
6
|
+
* @param dbContextName The name of the DbContext class used for the `--context` argument
|
|
7
|
+
* @param args Arguments to pass to the `dotnet ef` CLI
|
|
8
|
+
* @param noBuild If true, the `--no-build` argument will be passed to the `dotnet ef` CLI (default: true)
|
|
9
|
+
*/
|
|
10
|
+
export declare function dotnetEfCommand(projectPath: string, dbContextName: string, args: string[], noBuild?: boolean): Promise<number>;
|
|
11
|
+
/**
|
|
12
|
+
* Wrapper function for `dotnet ef migrations list`.
|
|
13
|
+
* @param projectPath The path to the project that contains the DbContext and Migration files
|
|
14
|
+
* @param dbContextName The name of the DbContext class
|
|
15
|
+
*/
|
|
16
|
+
export declare function efMigrationsList(projectPath: string, dbContextName: string): Promise<void>;
|
|
17
|
+
/**
|
|
18
|
+
* Wrapper function for `dotnet ef database update <migration_name>`.
|
|
19
|
+
* @param projectPath The path to the project that contains the DbContext and Migration files
|
|
20
|
+
* @param dbContextName The name of the DbContext class
|
|
21
|
+
* @param migrationName The name of the migration to update to (optional). If not provided, all migrations will be applied.
|
|
22
|
+
*/
|
|
23
|
+
export declare function efMigrationsUpdate(projectPath: string, dbContextName: string, migrationName?: string): Promise<void>;
|
|
24
|
+
/**
|
|
25
|
+
*
|
|
26
|
+
* @param projectPath The path to the project that contains the DbContext and Migration files
|
|
27
|
+
* @param dbContextName The name of the DbContext class
|
|
28
|
+
* @param migrationName The name of the migration to add
|
|
29
|
+
* @param withBoilerplate If true, boilerplate will be added to the migration C# file and empty Up and Down SQL files will be created
|
|
30
|
+
*/
|
|
31
|
+
export declare function efAddMigration(projectPath: string, dbContextName: string, migrationName: string, withBoilerplate?: boolean): Promise<void>;
|
|
32
|
+
/**
|
|
33
|
+
*
|
|
34
|
+
* @param projectPath The path to the project that contains the DbContext and Migration files
|
|
35
|
+
* @param dbContextName The name of the DbContext class
|
|
36
|
+
* @param skipConfirm If `true`, the user will not be prompted to confirm the removal of the last migration
|
|
37
|
+
*/
|
|
38
|
+
export declare function efRemoveLastMigration(projectPath: string, dbContextName: string, skipConfirm?: boolean): Promise<void>;
|
|
39
|
+
//# sourceMappingURL=dbMigrationUtils.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"dbMigrationUtils.d.ts","sourceRoot":"","sources":["../../src/dbMigrationUtils.ts"],"names":[],"mappings":"AAKA;;;;;;;;GAQG;AACH,wBAAsB,eAAe,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,EAAE,OAAO,UAAO,GAAG,OAAO,CAAC,MAAM,CAAC,CAKjI;AAED;;;;GAIG;AACH,wBAAsB,gBAAgB,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,iBAEhF;AAED;;;;;GAKG;AACH,wBAAsB,kBAAkB,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,aAAa,CAAC,EAAE,MAAM,iBAE1G;AAED;;;;;;GAMG;AACH,wBAAsB,cAAc,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,eAAe,UAAQ,iBAY9H;AAED;;;;;GAKG;AACH,wBAAsB,qBAAqB,CAAC,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,WAAW,UAAQ,iBAe1G"}
|
|
@@ -0,0 +1,184 @@
|
|
|
1
|
+
import { Emoji, getConfirmation, log, requireString, requireValidPath, spawnAsync } from './generalUtils.js';
|
|
2
|
+
import path from 'node:path';
|
|
3
|
+
import fs from 'node:fs';
|
|
4
|
+
import fsp from 'node:fs/promises';
|
|
5
|
+
/**
|
|
6
|
+
* Wrapper function for `dotnet ef`. If you don't pass `false` for `noBuild`, be sure the project has already been built by some other means.
|
|
7
|
+
*
|
|
8
|
+
* Docs for "dotnet ef" CLI: https://learn.microsoft.com/en-us/ef/core/cli/dotnet.
|
|
9
|
+
* @param projectPath Path to project that has the DbContext and Migration files used for the `--project` argument
|
|
10
|
+
* @param dbContextName The name of the DbContext class used for the `--context` argument
|
|
11
|
+
* @param args Arguments to pass to the `dotnet ef` CLI
|
|
12
|
+
* @param noBuild If true, the `--no-build` argument will be passed to the `dotnet ef` CLI (default: true)
|
|
13
|
+
*/
|
|
14
|
+
export async function dotnetEfCommand(projectPath, dbContextName, args, noBuild = true) {
|
|
15
|
+
requireValidPath('projectPath', projectPath);
|
|
16
|
+
requireString('dbContextName', dbContextName);
|
|
17
|
+
const result = await spawnAsync('dotnet', ['ef', '--project', projectPath, ...args, '--context', dbContextName, ...(noBuild ? ['--no-build'] : [])]);
|
|
18
|
+
return result.code;
|
|
19
|
+
}
|
|
20
|
+
/**
|
|
21
|
+
* Wrapper function for `dotnet ef migrations list`.
|
|
22
|
+
* @param projectPath The path to the project that contains the DbContext and Migration files
|
|
23
|
+
* @param dbContextName The name of the DbContext class
|
|
24
|
+
*/
|
|
25
|
+
export async function efMigrationsList(projectPath, dbContextName) {
|
|
26
|
+
await dotnetEfCommand(projectPath, dbContextName, ['migrations', 'list']);
|
|
27
|
+
}
|
|
28
|
+
/**
|
|
29
|
+
* Wrapper function for `dotnet ef database update <migration_name>`.
|
|
30
|
+
* @param projectPath The path to the project that contains the DbContext and Migration files
|
|
31
|
+
* @param dbContextName The name of the DbContext class
|
|
32
|
+
* @param migrationName The name of the migration to update to (optional). If not provided, all migrations will be applied.
|
|
33
|
+
*/
|
|
34
|
+
export async function efMigrationsUpdate(projectPath, dbContextName, migrationName) {
|
|
35
|
+
await dotnetEfCommand(projectPath, dbContextName, ['database', 'update', ...(migrationName ? [migrationName] : [])]);
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
*
|
|
39
|
+
* @param projectPath The path to the project that contains the DbContext and Migration files
|
|
40
|
+
* @param dbContextName The name of the DbContext class
|
|
41
|
+
* @param migrationName The name of the migration to add
|
|
42
|
+
* @param withBoilerplate If true, boilerplate will be added to the migration C# file and empty Up and Down SQL files will be created
|
|
43
|
+
*/
|
|
44
|
+
export async function efAddMigration(projectPath, dbContextName, migrationName, withBoilerplate = false) {
|
|
45
|
+
const projectDirectory = projectPath.endsWith('.csproj') ? projectPath.substring(0, projectPath.lastIndexOf('/')) : projectPath;
|
|
46
|
+
const migrationsOutputDir = getMigrationsProjectRelativePath(dbContextName);
|
|
47
|
+
await dotnetEfCommand(projectPath, dbContextName, ['migrations', 'add', migrationName, '-o', migrationsOutputDir]);
|
|
48
|
+
if (withBoilerplate) {
|
|
49
|
+
try {
|
|
50
|
+
await addDbMigrationBoilerplate(projectDirectory, dbContextName, migrationName);
|
|
51
|
+
}
|
|
52
|
+
catch (error) {
|
|
53
|
+
console.error(error);
|
|
54
|
+
await efRemoveLastMigration(projectPath, dbContextName, true);
|
|
55
|
+
}
|
|
56
|
+
}
|
|
57
|
+
}
|
|
58
|
+
/**
|
|
59
|
+
*
|
|
60
|
+
* @param projectPath The path to the project that contains the DbContext and Migration files
|
|
61
|
+
* @param dbContextName The name of the DbContext class
|
|
62
|
+
* @param skipConfirm If `true`, the user will not be prompted to confirm the removal of the last migration
|
|
63
|
+
*/
|
|
64
|
+
export async function efRemoveLastMigration(projectPath, dbContextName, skipConfirm = false) {
|
|
65
|
+
const lastMigrationName = await getLastMigrationName(projectPath, dbContextName);
|
|
66
|
+
if (!skipConfirm && !await getConfirmation(`Are you sure you want to remove the last migration: ➡️${lastMigrationName}?`)) {
|
|
67
|
+
return;
|
|
68
|
+
}
|
|
69
|
+
const returnCode = await dotnetEfCommand(projectPath, dbContextName, ['migrations', 'remove']);
|
|
70
|
+
if (returnCode !== 0) {
|
|
71
|
+
throw new Error(`dotnet ef migrations remove returned non-zero exit code: ${returnCode}`);
|
|
72
|
+
}
|
|
73
|
+
log(`Removing migration SQL script files for migration if they're empty`);
|
|
74
|
+
await deleteScriptFileIfEmpty(getScriptPath(projectPath, lastMigrationName, true));
|
|
75
|
+
await deleteScriptFileIfEmpty(getScriptPath(projectPath, lastMigrationName, false));
|
|
76
|
+
}
|
|
77
|
+
async function deleteScriptFileIfEmpty(scriptPath) {
|
|
78
|
+
if (fs.existsSync(scriptPath)) {
|
|
79
|
+
const scriptContents = fs.readFileSync(scriptPath, { encoding: 'utf8' });
|
|
80
|
+
if (scriptContents.trim().length === 0) {
|
|
81
|
+
await fsp.unlink(scriptPath);
|
|
82
|
+
}
|
|
83
|
+
else {
|
|
84
|
+
log(`${Emoji.Warning} Skipping deletion of non-empty script file: ${scriptPath}`);
|
|
85
|
+
}
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
async function getLastMigrationName(projectPath, dbContextName) {
|
|
89
|
+
const migrationsDirectory = getMigrationsDirectory(projectPath, dbContextName);
|
|
90
|
+
const filenames = fs.readdirSync(migrationsDirectory);
|
|
91
|
+
const migrationNames = filenames.filter(filename => filename.endsWith('.cs') &&
|
|
92
|
+
!filename.endsWith('.Designer.cs') &&
|
|
93
|
+
!filename.endsWith('.ModelSnapshot.cs') &&
|
|
94
|
+
filename.includes('_')).map(filename => filename.substring(0, filename.length - 3));
|
|
95
|
+
const migrationNamesWithTimestamps = migrationNames.map(migrationName => {
|
|
96
|
+
const timestamp = migrationName.substring(0, 14);
|
|
97
|
+
const name = migrationName.substring(15);
|
|
98
|
+
return { timestamp, name };
|
|
99
|
+
});
|
|
100
|
+
log(`Found migrations: ${migrationNamesWithTimestamps.map(m => m.name).join(', ')}`);
|
|
101
|
+
log(`Found timestamps: ${migrationNamesWithTimestamps.map(m => m.timestamp).join(', ')}`);
|
|
102
|
+
const sortedMigrationNames = [...migrationNamesWithTimestamps].sort((a, b) => a.timestamp.localeCompare(b.timestamp));
|
|
103
|
+
const lastMigrationName = sortedMigrationNames[sortedMigrationNames.length - 1].name;
|
|
104
|
+
return lastMigrationName;
|
|
105
|
+
}
|
|
106
|
+
function getMigrationsProjectRelativePath(dbContextName) {
|
|
107
|
+
return `Migrations/${dbContextName}Migrations`;
|
|
108
|
+
}
|
|
109
|
+
function getMigrationsDirectory(projectDirectory, dbContextName) {
|
|
110
|
+
return path.join(projectDirectory, `Migrations/${dbContextName}Migrations`);
|
|
111
|
+
}
|
|
112
|
+
function getScriptPath(projectDirectory, migrationName, isUp) {
|
|
113
|
+
return path.join(projectDirectory, `Scripts/${migrationName}${isUp ? '' : '_Down'}.sql`);
|
|
114
|
+
}
|
|
115
|
+
async function getCSharpMigrationFilePath(projectDirectory, dbContextName, migrationName) {
|
|
116
|
+
const migrationsOutputDir = getMigrationsDirectory(projectDirectory, dbContextName);
|
|
117
|
+
if (!fs.existsSync(migrationsOutputDir)) {
|
|
118
|
+
throw new Error(`Unable to add migration C# boilerplate - could not find migrations output directory: ${migrationsOutputDir}`);
|
|
119
|
+
}
|
|
120
|
+
log(`Checking for generated C# file 📄XXXX_${migrationName}.cs in directory 📁${migrationsOutputDir}`);
|
|
121
|
+
const filenamePattern = `_${migrationName}.cs`;
|
|
122
|
+
const filenames = fs.readdirSync(migrationsOutputDir).filter(filename => filename.endsWith(filenamePattern));
|
|
123
|
+
if (!filenames || filenames.length === 0) {
|
|
124
|
+
throw new Error(`Auto-generated migration file not found - migrations output directory has no C# files ending with : ${filenamePattern}`);
|
|
125
|
+
}
|
|
126
|
+
if (filenames.length > 1) {
|
|
127
|
+
throw new Error(`Auto-generated migration file not found - migrations output directory has multiple C# files with the same migration name: ${filenames.join(', ')}`);
|
|
128
|
+
}
|
|
129
|
+
const filename = filenames[0];
|
|
130
|
+
const filePath = path.join(migrationsOutputDir, filename);
|
|
131
|
+
if (!fs.existsSync(filePath)) {
|
|
132
|
+
throw new Error(`Issue generating file path for migration (bad file path): ${filePath}`);
|
|
133
|
+
}
|
|
134
|
+
return filePath;
|
|
135
|
+
}
|
|
136
|
+
async function addDbMigrationBoilerplate(projectDirectory, dbContextName, migrationName) {
|
|
137
|
+
const filePath = await getCSharpMigrationFilePath(projectDirectory, dbContextName, migrationName);
|
|
138
|
+
log(`Replacing file contents with boilerplate for file 📄${filePath}`);
|
|
139
|
+
const newFileContents = cSharpMigrationFileTemplate
|
|
140
|
+
.replaceAll(contextNamePlaceholder, dbContextName)
|
|
141
|
+
.replaceAll(migrationNamePlaceholder, migrationName);
|
|
142
|
+
await fsp.writeFile(filePath, newFileContents, { encoding: 'utf8' });
|
|
143
|
+
log(`Updated file with boilerplate - please ensure it is correct: 📄${filePath}`);
|
|
144
|
+
const upScriptPath = path.join(projectDirectory, `Scripts/${migrationName}.sql`);
|
|
145
|
+
const downScriptPath = path.join(projectDirectory, `Scripts/${migrationName}_Down.sql`);
|
|
146
|
+
log('\nCreating corresponding empty sql files (no action will be taken if they already exist):');
|
|
147
|
+
log(` - 📄${upScriptPath}`);
|
|
148
|
+
log(` - 📄${downScriptPath}\n`);
|
|
149
|
+
await writeEmptySqlFileIfNotExists(upScriptPath, 'Up');
|
|
150
|
+
await writeEmptySqlFileIfNotExists(downScriptPath, 'Down');
|
|
151
|
+
}
|
|
152
|
+
async function writeEmptySqlFileIfNotExists(scriptPath, scriptType) {
|
|
153
|
+
if (!fs.existsSync(scriptPath)) {
|
|
154
|
+
await fsp.writeFile(scriptPath, '', { encoding: 'utf8' });
|
|
155
|
+
}
|
|
156
|
+
else {
|
|
157
|
+
log(`Skipping ${scriptType} sql script (already exists)`);
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
const contextNamePlaceholder = '{{context_name}}';
|
|
161
|
+
const migrationNamePlaceholder = '{{migration_name}}';
|
|
162
|
+
const cSharpMigrationFileTemplate = `using Microsoft.EntityFrameworkCore.Migrations;
|
|
163
|
+
using MikeyT.DbMigrations;
|
|
164
|
+
|
|
165
|
+
#nullable disable
|
|
166
|
+
|
|
167
|
+
namespace DbMigrator.Migrations.${contextNamePlaceholder}Migrations
|
|
168
|
+
{
|
|
169
|
+
public partial class ${migrationNamePlaceholder} : Migration
|
|
170
|
+
{
|
|
171
|
+
protected override void Up(MigrationBuilder migrationBuilder)
|
|
172
|
+
{
|
|
173
|
+
MigrationScriptRunner.RunScript(migrationBuilder, "${migrationNamePlaceholder}.sql");
|
|
174
|
+
}
|
|
175
|
+
|
|
176
|
+
protected override void Down(MigrationBuilder migrationBuilder)
|
|
177
|
+
{
|
|
178
|
+
MigrationScriptRunner.RunScript(migrationBuilder, "${migrationNamePlaceholder}_Down.sql");
|
|
179
|
+
}
|
|
180
|
+
}
|
|
181
|
+
}
|
|
182
|
+
|
|
183
|
+
`;
|
|
184
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dbMigrationUtils.js","sourceRoot":"","sources":["../../src/dbMigrationUtils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,EAAE,eAAe,EAAE,GAAG,EAAE,aAAa,EAAE,gBAAgB,EAAE,UAAU,EAAE,MAAM,mBAAmB,CAAA;AAC5G,OAAO,IAAI,MAAM,WAAW,CAAA;AAC5B,OAAO,EAAE,MAAM,SAAS,CAAA;AACxB,OAAO,GAAG,MAAM,kBAAkB,CAAA;AAElC;;;;;;;;GAQG;AACH,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,WAAmB,EAAE,aAAqB,EAAE,IAAc,EAAE,OAAO,GAAG,IAAI;IAC9G,gBAAgB,CAAC,aAAa,EAAE,WAAW,CAAC,CAAA;IAC5C,aAAa,CAAC,eAAe,EAAE,aAAa,CAAC,CAAA;IAC7C,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,QAAQ,EAAE,CAAC,IAAI,EAAE,WAAW,EAAE,WAAW,EAAE,GAAG,IAAI,EAAE,WAAW,EAAE,aAAa,EAAE,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAA;IACpJ,OAAO,MAAM,CAAC,IAAI,CAAA;AACpB,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,WAAmB,EAAE,aAAqB;IAC/E,MAAM,eAAe,CAAC,WAAW,EAAE,aAAa,EAAE,CAAC,YAAY,EAAE,MAAM,CAAC,CAAE,CAAA;AAC5E,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,WAAmB,EAAE,aAAqB,EAAE,aAAsB;IACzG,MAAM,eAAe,CAAC,WAAW,EAAE,aAAa,EAAE,CAAC,UAAU,EAAE,QAAQ,EAAE,GAAG,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAA;AACtH,CAAC;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,cAAc,CAAC,WAAmB,EAAE,aAAqB,EAAE,aAAqB,EAAE,eAAe,GAAG,KAAK;IAC7H,MAAM,gBAAgB,GAAG,WAAW,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,EAAE,WAAW,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,WAAW,CAAA;IAC/H,MAAM,mBAAmB,GAAG,gCAAgC,CAAC,aAAa,CAAC,CAAA;IAC3E,MAAM,eAAe,CAAC,WAAW,EAAE,aAAa,EAAE,CAAC,YAAY,EAAE,KAAK,EAAE,aAAa,EAAE,IAAI,EAAE,mBAAmB,CAAC,CAAC,CAAA;IAClH,IAAI,eAAe,EAAE;QACnB,IAAI;YACF,MAAM,yBAAyB,CAAC,gBAAgB,EAAE,aAAa,EAAE,aAAa,CAAC,CAAA;SAChF;QAAC,OAAO,KAAK,EAAE;YACd,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAA;YACpB,MAAM,qBAAqB,CAAC,WAAW,EAAE,aAAa,EAAE,IAAI,CAAC,CAAA;SAC9D;KACF;AACH,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,qBAAqB,CAAC,WAAmB,EAAE,aAAqB,EAAE,WAAW,GAAG,KAAK;IACzG,MAAM,iBAAiB,GAAG,MAAM,oBAAoB,CAAC,WAAW,EAAE,aAAa,CAAC,CAAA;IAEhF,IAAI,CAAC,WAAW,IAAI,CAAC,MAAM,eAAe,CAAC,yDAAyD,iBAAiB,GAAG,CAAC,EAAE;QACzH,OAAM;KACP;IAED,MAAM,UAAU,GAAG,MAAM,eAAe,CAAC,WAAW,EAAE,aAAa,EAAE,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,CAAA;IAC9F,IAAI,UAAU,KAAK,CAAC,EAAE;QACpB,MAAM,IAAI,KAAK,CAAC,4DAA4D,UAAU,EAAE,CAAC,CAAA;KAC1F;IAED,GAAG,CAAC,oEAAoE,CAAC,CAAA;IACzE,MAAM,uBAAuB,CAAC,aAAa,CAAC,WAAW,EAAE,iBAAiB,EAAE,IAAI,CAAC,CAAC,CAAA;IAClF,MAAM,uBAAuB,CAAC,aAAa,CAAC,WAAW,EAAE,iBAAiB,EAAE,KAAK,CAAC,CAAC,CAAA;AACrF,CAAC;AAED,KAAK,UAAU,uBAAuB,CAAC,UAAkB;IACvD,IAAI,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC,EAAE;QAC7B,MAAM,cAAc,GAAG,EAAE,CAAC,YAAY,CAAC,UAAU,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,CAAC,CAAA;QACxE,IAAI,cAAc,CAAC,IAAI,EAAE,CAAC,MAAM,KAAK,CAAC,EAAE;YACtC,MAAM,GAAG,CAAC,MAAM,CAAC,UAAU,CAAC,CAAA;SAC7B;aAAM;YACL,GAAG,CAAC,GAAG,KAAK,CAAC,OAAO,gDAAgD,UAAU,EAAE,CAAC,CAAA;SAClF;KACF;AACH,CAAC;AAED,KAAK,UAAU,oBAAoB,CAAC,WAAmB,EAAE,aAAqB;IAC5E,MAAM,mBAAmB,GAAG,sBAAsB,CAAC,WAAW,EAAE,aAAa,CAAC,CAAA;IAC9E,MAAM,SAAS,GAAG,EAAE,CAAC,WAAW,CAAC,mBAAmB,CAAC,CAAA;IACrD,MAAM,cAAc,GAAG,SAAS,CAAC,MAAM,CAAC,QAAQ,CAAC,EAAE,CACjD,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC;QACxB,CAAC,QAAQ,CAAC,QAAQ,CAAC,cAAc,CAAC;QAClC,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,CAAC;QACvC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,EAAE,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAA;IACrF,MAAM,4BAA4B,GAAG,cAAc,CAAC,GAAG,CAAC,aAAa,CAAC,EAAE;QACtE,MAAM,SAAS,GAAG,aAAa,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,CAAA;QAChD,MAAM,IAAI,GAAG,aAAa,CAAC,SAAS,CAAC,EAAE,CAAC,CAAA;QACxC,OAAO,EAAE,SAAS,EAAE,IAAI,EAAE,CAAA;IAC5B,CAAC,CAAC,CAAA;IACF,GAAG,CAAC,qBAAqB,4BAA4B,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAA;IACpF,GAAG,CAAC,qBAAqB,4BAA4B,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAA;IACzF,MAAM,oBAAoB,GAAG,CAAC,GAAG,4BAA4B,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAA;IACrH,MAAM,iBAAiB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,IAAI,CAAA;IACpF,OAAO,iBAAiB,CAAA;AAC1B,CAAC;AAED,SAAS,gCAAgC,CAAC,aAAqB;IAC7D,OAAO,cAAc,aAAa,YAAY,CAAA;AAChD,CAAC;AAED,SAAS,sBAAsB,CAAC,gBAAwB,EAAE,aAAqB;IAC7E,OAAO,IAAI,CAAC,IAAI,CAAC,gBAAgB,EAAE,cAAc,aAAa,YAAY,CAAC,CAAA;AAC7E,CAAC;AAED,SAAS,aAAa,CAAC,gBAAwB,EAAE,aAAqB,EAAE,IAAa;IACnF,OAAO,IAAI,CAAC,IAAI,CAAC,gBAAgB,EAAE,WAAW,aAAa,GAAG,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,MAAM,CAAC,CAAA;AAC1F,CAAC;AAED,KAAK,UAAU,0BAA0B,CAAC,gBAAwB,EAAE,aAAqB,EAAE,aAAqB;IAC9G,MAAM,mBAAmB,GAAG,sBAAsB,CAAC,gBAAgB,EAAE,aAAa,CAAC,CAAA;IAEnF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,mBAAmB,CAAC,EAAE;QACvC,MAAM,IAAI,KAAK,CAAC,wFAAwF,mBAAmB,EAAE,CAAC,CAAA;KAC/H;IAED,GAAG,CAAC,yCAAyC,aAAa,sBAAsB,mBAAmB,EAAE,CAAC,CAAA;IAEtG,MAAM,eAAe,GAAG,IAAI,aAAa,KAAK,CAAA;IAC9C,MAAM,SAAS,GAAG,EAAE,CAAC,WAAW,CAAC,mBAAmB,CAAC,CAAC,MAAM,CAAC,QAAQ,CAAC,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC,CAAA;IAC5G,IAAI,CAAC,SAAS,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE;QACxC,MAAM,IAAI,KAAK,CAAC,uGAAuG,eAAe,EAAE,CAAC,CAAA;KAC1I;IAED,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE;QACxB,MAAM,IAAI,KAAK,CAAC,6HAA6H,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAA;KACrK;IAED,MAAM,QAAQ,GAAG,SAAS,CAAC,CAAC,CAAC,CAAA;IAC7B,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAA;IAEzD,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE;QAC5B,MAAM,IAAI,KAAK,CAAC,6DAA6D,QAAQ,EAAE,CAAC,CAAA;KACzF;IAED,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED,KAAK,UAAU,yBAAyB,CAAC,gBAAwB,EAAE,aAAqB,EAAE,aAAqB;IAC7G,MAAM,QAAQ,GAAG,MAAM,0BAA0B,CAAC,gBAAgB,EAAE,aAAa,EAAE,aAAa,CAAC,CAAA;IAEjG,GAAG,CAAC,uDAAuD,QAAQ,EAAE,CAAC,CAAA;IAEtE,MAAM,eAAe,GAAG,2BAA2B;SAChD,UAAU,CAAC,sBAAsB,EAAE,aAAa,CAAC;SACjD,UAAU,CAAC,wBAAwB,EAAE,aAAa,CAAC,CAAA;IAEtD,MAAM,GAAG,CAAC,SAAS,CAAC,QAAQ,EAAE,eAAe,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,CAAC,CAAA;IAEpE,GAAG,CAAC,kEAAkE,QAAQ,EAAE,CAAC,CAAA;IAEjF,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,gBAAgB,EAAE,WAAW,aAAa,MAAM,CAAC,CAAA;IAChF,MAAM,cAAc,GAAG,IAAI,CAAC,IAAI,CAAC,gBAAgB,EAAE,WAAW,aAAa,WAAW,CAAC,CAAA;IAEvF,GAAG,CAAC,2FAA2F,CAAC,CAAA;IAChG,GAAG,CAAC,SAAS,YAAY,EAAE,CAAC,CAAA;IAC5B,GAAG,CAAC,SAAS,cAAc,IAAI,CAAC,CAAA;IAEhC,MAAM,4BAA4B,CAAC,YAAY,EAAE,IAAI,CAAC,CAAA;IACtD,MAAM,4BAA4B,CAAC,cAAc,EAAE,MAAM,CAAC,CAAA;AAC5D,CAAC;AAED,KAAK,UAAU,4BAA4B,CAAC,UAAkB,EAAE,UAAyB;IACvF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC,EAAE;QAC9B,MAAM,GAAG,CAAC,SAAS,CAAC,UAAU,EAAE,EAAE,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,CAAC,CAAA;KAC1D;SAAM;QACL,GAAG,CAAC,YAAY,UAAU,8BAA8B,CAAC,CAAA;KAC1D;AACH,CAAC;AAED,MAAM,sBAAsB,GAAG,kBAAkB,CAAA;AACjD,MAAM,wBAAwB,GAAG,oBAAoB,CAAA;AACrD,MAAM,2BAA2B,GAAG;;;;;kCAKF,sBAAsB;;2BAE7B,wBAAwB;;;;iEAIc,wBAAwB;;;;;iEAKxB,wBAAwB;;;;;CAKxF,CAAA"}
|
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Runs dotnet build on the specified project.
|
|
3
|
+
* @param projectPath Path to project file (like .csproj) or directory of project to build
|
|
4
|
+
* @throws A {@link SpawnError} if the spawned process exits with a non-zero exit code
|
|
5
|
+
*/
|
|
6
|
+
export declare function dotnetBuild(projectPath: string): Promise<void>;
|
|
7
|
+
/**
|
|
8
|
+
* Helper method to spawn a process and run 'dotnet publish'.
|
|
9
|
+
* @param projectPath Path to project file (like .csproj) or directory of project to build
|
|
10
|
+
* @param configuration Build configuration, such as 'Release'
|
|
11
|
+
* @param outputDir The relative or absolute path for the build output
|
|
12
|
+
* @param cwd Optionally run the command from another current working directory
|
|
13
|
+
*/
|
|
14
|
+
export declare function dotnetPublish(projectPath?: string, configuration?: string, outputDir?: string, cwd?: string): Promise<void>;
|
|
15
|
+
/**
|
|
16
|
+
* Spawns a process that runs the necessary commands to install or update the dotnet-ef tool globally on the system.
|
|
17
|
+
*/
|
|
18
|
+
export declare function installOrUpdateDotnetEfTool(): Promise<void>;
|
|
19
|
+
/**
|
|
20
|
+
* Spawns a process that runs the following commands to clean and re-install the dotnet dev certs:
|
|
21
|
+
* - dotnet dev-certs https --clean
|
|
22
|
+
* - dotnet dev-certs https -t
|
|
23
|
+
*/
|
|
24
|
+
export declare function configureDotnetDevCerts(): Promise<void>;
|
|
25
|
+
//# sourceMappingURL=dotnetUtils.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"dotnetUtils.d.ts","sourceRoot":"","sources":["../../src/dotnetUtils.ts"],"names":[],"mappings":"AAMA;;;;GAIG;AACH,wBAAsB,WAAW,CAAC,WAAW,EAAE,MAAM,iBAGpD;AAED;;;;;;GAMG;AACH,wBAAsB,aAAa,CAAC,WAAW,GAAE,MAAa,EAAE,aAAa,GAAE,MAAkB,EAAE,SAAS,GAAE,MAAkB,EAAE,GAAG,CAAC,EAAE,MAAM,iBAY7I;AAED;;GAEG;AACH,wBAAsB,2BAA2B,kBAShD;AAED;;;;GAIG;AACH,wBAAsB,uBAAuB,kBAG5C"}
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
import { log, requireString, requireValidPath, spawnAsync, trace, whichSync } from './generalUtils.js';
|
|
2
|
+
/**
|
|
3
|
+
* Runs dotnet build on the specified project.
|
|
4
|
+
* @param projectPath Path to project file (like .csproj) or directory of project to build
|
|
5
|
+
* @throws A {@link SpawnError} if the spawned process exits with a non-zero exit code
|
|
6
|
+
*/
|
|
7
|
+
export async function dotnetBuild(projectPath) {
|
|
8
|
+
requireValidPath('projectPath', projectPath);
|
|
9
|
+
await spawnAsync('dotnet', ['build', projectPath], { throwOnNonZero: true });
|
|
10
|
+
}
|
|
11
|
+
/**
|
|
12
|
+
* Helper method to spawn a process and run 'dotnet publish'.
|
|
13
|
+
* @param projectPath Path to project file (like .csproj) or directory of project to build
|
|
14
|
+
* @param configuration Build configuration, such as 'Release'
|
|
15
|
+
* @param outputDir The relative or absolute path for the build output
|
|
16
|
+
* @param cwd Optionally run the command from another current working directory
|
|
17
|
+
*/
|
|
18
|
+
export async function dotnetPublish(projectPath = './', configuration = 'Release', outputDir = 'publish', cwd) {
|
|
19
|
+
requireValidPath('projectPath', projectPath);
|
|
20
|
+
requireString('outputDir', outputDir);
|
|
21
|
+
requireString('configuration', configuration);
|
|
22
|
+
if (cwd) {
|
|
23
|
+
requireValidPath('cwd', cwd);
|
|
24
|
+
}
|
|
25
|
+
const args = ['publish', projectPath, '-c', configuration, '-o', outputDir];
|
|
26
|
+
const traceMessage = `running dotnet ${args.join(' ')}`;
|
|
27
|
+
const traceAdditional = cwd ? ` in cwd ${cwd}` : '';
|
|
28
|
+
trace(`${traceMessage}${traceAdditional}`);
|
|
29
|
+
await spawnAsync('dotnet', args, { cwd: cwd });
|
|
30
|
+
}
|
|
31
|
+
/**
|
|
32
|
+
* Spawns a process that runs the necessary commands to install or update the dotnet-ef tool globally on the system.
|
|
33
|
+
*/
|
|
34
|
+
export async function installOrUpdateDotnetEfTool() {
|
|
35
|
+
const installed = whichSync('dotnet-ef').location;
|
|
36
|
+
if (installed) {
|
|
37
|
+
log('dotnet-ef tool already installed, updating...');
|
|
38
|
+
}
|
|
39
|
+
else {
|
|
40
|
+
log('dotnet-ef tool not installed, installing...');
|
|
41
|
+
}
|
|
42
|
+
const args = ['tool', installed ? 'update' : 'install', '--global', 'dotnet-ef'];
|
|
43
|
+
await spawnAsync('dotnet', args);
|
|
44
|
+
}
|
|
45
|
+
/**
|
|
46
|
+
* Spawns a process that runs the following commands to clean and re-install the dotnet dev certs:
|
|
47
|
+
* - dotnet dev-certs https --clean
|
|
48
|
+
* - dotnet dev-certs https -t
|
|
49
|
+
*/
|
|
50
|
+
export async function configureDotnetDevCerts() {
|
|
51
|
+
await spawnAsync('dotnet', ['dev-certs', 'https', '--clean']);
|
|
52
|
+
await spawnAsync('dotnet', ['dev-certs', 'https', '-t']);
|
|
53
|
+
}
|
|
54
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Only dynamically import this if ESM is detected. This allows a CJS-specific build to avoid
|
|
3
|
+
* an error it would otherwise encounter when parsing import.meta.url.
|
|
4
|
+
* @returns the file path of the currently executing script
|
|
5
|
+
*/
|
|
6
|
+
export declare const getImportMetaUrlFilePath: () => string;
|
|
7
|
+
//# sourceMappingURL=esmSpecific.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"esmSpecific.d.mts","sourceRoot":"","sources":["../../src/esmSpecific.mts"],"names":[],"mappings":"AAEA;;;;GAIG;AACH,eAAO,MAAM,wBAAwB,cAGpC,CAAA"}
|