@nsshunt/stsrunnerframework 1.0.45 → 1.0.47
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/stsrunnerframework.mjs +337 -336
- package/dist/stsrunnerframework.mjs.map +1 -1
- package/dist/stsrunnerframework.umd.js +280 -279
- package/dist/stsrunnerframework.umd.js.map +1 -1
- package/package.json +6 -5
- package/types/commonTypes.d.ts +19 -2
- package/types/commonTypes.d.ts.map +1 -1
- package/types/index.d.ts +1 -0
- package/types/index.d.ts.map +1 -1
- package/types/rest01Client.d.ts +4 -15
- package/types/rest01Client.d.ts.map +1 -1
|
@@ -13,8 +13,10 @@ var __privateAdd = (obj, member, value) => member.has(obj) ? __typeError("Cannot
|
|
|
13
13
|
var __privateSet = (obj, member, value, setter) => (__accessCheck(obj, member, "write to private field"), setter ? setter.call(obj, value) : member.set(obj, value), value);
|
|
14
14
|
var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "access private method"), method);
|
|
15
15
|
|
|
16
|
-
var _options3, _rest01Client, _accessToken2, _agentManager, _authUtilsNode,
|
|
16
|
+
var _options3, _rest01Client, _accessToken2, _agentManager, _authUtilsNode, _GetAccessToken, _collectorCollectorPort, _runners, _options4, _rest01Client2, _workerId, _debug, _SetMessagePort, _AddRunner, _WorkerInstance_instances, SleepImmediate_fn, _StartRunner, _StopAllRunners, _StopRunner, _TerminateRunner, _PauseRunner, _ResumeRunner, _ResetRunner, _ExecuteRunner, _UpdateOptions, _workersEx, _options5, _STSInstrumentController, _telemetryProcessor, _rest01Client3, _debug2, _STSWorkerManager_instances, CreateRunnerCopy_fn, _SetRunnerIntoWorker, _ProcessTelemetry, _ProcessCompleted, _CreateAsyncRunner, _PostMessageToWorker, _StartRunner2, _ResetRunner2, _ExecuteRunner2, _StopRunner2, _TerminateRunner2, _PauseRunner2, _ResumeRunner2, _BroadcastCommandToAllRunners, _PauseWorker, _ResumeWorker, _StopWorker, _StartWorker, _ResetWorker, _ExecuteWorker, _BroadcastUpdateCommandToAllRunners, _UpdateOptionsWorker, _TerminateWorker, _UpdateOptions2;
|
|
17
17
|
const URI_BASE_VUEUTILS = "/";
|
|
18
|
+
const STS_RF_RES_PREFIX = "STS_R_RF_";
|
|
19
|
+
const STS_RF_RES_ENT_PREFIX = "STS_RE_RF_";
|
|
18
20
|
var eIWMessageCommands = /* @__PURE__ */ ((eIWMessageCommands2) => {
|
|
19
21
|
eIWMessageCommands2["InstrumentTelemetry"] = "__STS__InstrumentTelemetry";
|
|
20
22
|
eIWMessageCommands2["MessagePort"] = "__STS__MessagePort";
|
|
@@ -1089,11 +1091,11 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1089
1091
|
const offset = isBackground ? 10 : 0;
|
|
1090
1092
|
const styles = {};
|
|
1091
1093
|
for (const [sourceSpace, suite] of Object.entries(colorConvert2)) {
|
|
1092
|
-
const
|
|
1094
|
+
const name = sourceSpace === "ansi16" ? "ansi" : sourceSpace;
|
|
1093
1095
|
if (sourceSpace === targetSpace) {
|
|
1094
|
-
styles[
|
|
1096
|
+
styles[name] = wrap2(identity, offset);
|
|
1095
1097
|
} else if (typeof suite === "object") {
|
|
1096
|
-
styles[
|
|
1098
|
+
styles[name] = wrap2(suite[targetSpace], offset);
|
|
1097
1099
|
}
|
|
1098
1100
|
}
|
|
1099
1101
|
return styles;
|
|
@@ -1190,16 +1192,16 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1190
1192
|
})(ansiStyles$3);
|
|
1191
1193
|
return ansiStyles$3.exports;
|
|
1192
1194
|
}
|
|
1193
|
-
var browser$
|
|
1195
|
+
var browser$4;
|
|
1194
1196
|
var hasRequiredBrowser$3;
|
|
1195
1197
|
function requireBrowser$3() {
|
|
1196
|
-
if (hasRequiredBrowser$3) return browser$
|
|
1198
|
+
if (hasRequiredBrowser$3) return browser$4;
|
|
1197
1199
|
hasRequiredBrowser$3 = 1;
|
|
1198
|
-
browser$
|
|
1200
|
+
browser$4 = {
|
|
1199
1201
|
stdout: false,
|
|
1200
1202
|
stderr: false
|
|
1201
1203
|
};
|
|
1202
|
-
return browser$
|
|
1204
|
+
return browser$4;
|
|
1203
1205
|
}
|
|
1204
1206
|
var util$3;
|
|
1205
1207
|
var hasRequiredUtil$3;
|
|
@@ -1272,7 +1274,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1272
1274
|
}
|
|
1273
1275
|
return ESCAPES.get(c) || c;
|
|
1274
1276
|
}
|
|
1275
|
-
function parseArguments(
|
|
1277
|
+
function parseArguments(name, arguments_) {
|
|
1276
1278
|
const results = [];
|
|
1277
1279
|
const chunks = arguments_.trim().split(/\s*,\s*/g);
|
|
1278
1280
|
let matches;
|
|
@@ -1283,7 +1285,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1283
1285
|
} else if (matches = chunk.match(STRING_REGEX)) {
|
|
1284
1286
|
results.push(matches[2].replace(ESCAPE_REGEX, (m, escape, character) => escape ? unescape2(escape) : character));
|
|
1285
1287
|
} else {
|
|
1286
|
-
throw new Error(`Invalid Chalk template style argument: ${chunk} (in style '${
|
|
1288
|
+
throw new Error(`Invalid Chalk template style argument: ${chunk} (in style '${name}')`);
|
|
1287
1289
|
}
|
|
1288
1290
|
}
|
|
1289
1291
|
return results;
|
|
@@ -1293,12 +1295,12 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1293
1295
|
const results = [];
|
|
1294
1296
|
let matches;
|
|
1295
1297
|
while ((matches = STYLE_REGEX.exec(style)) !== null) {
|
|
1296
|
-
const
|
|
1298
|
+
const name = matches[1];
|
|
1297
1299
|
if (matches[2]) {
|
|
1298
|
-
const args = parseArguments(
|
|
1299
|
-
results.push([
|
|
1300
|
+
const args = parseArguments(name, matches[2]);
|
|
1301
|
+
results.push([name].concat(args));
|
|
1300
1302
|
} else {
|
|
1301
|
-
results.push([
|
|
1303
|
+
results.push([name]);
|
|
1302
1304
|
}
|
|
1303
1305
|
}
|
|
1304
1306
|
return results;
|
|
@@ -1752,20 +1754,20 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1752
1754
|
const reduceDescriptors = (obj, reducer) => {
|
|
1753
1755
|
const descriptors2 = Object.getOwnPropertyDescriptors(obj);
|
|
1754
1756
|
const reducedDescriptors = {};
|
|
1755
|
-
forEach(descriptors2, (descriptor,
|
|
1757
|
+
forEach(descriptors2, (descriptor, name) => {
|
|
1756
1758
|
let ret;
|
|
1757
|
-
if ((ret = reducer(descriptor,
|
|
1758
|
-
reducedDescriptors[
|
|
1759
|
+
if ((ret = reducer(descriptor, name, obj)) !== false) {
|
|
1760
|
+
reducedDescriptors[name] = ret || descriptor;
|
|
1759
1761
|
}
|
|
1760
1762
|
});
|
|
1761
1763
|
Object.defineProperties(obj, reducedDescriptors);
|
|
1762
1764
|
};
|
|
1763
1765
|
const freezeMethods = (obj) => {
|
|
1764
|
-
reduceDescriptors(obj, (descriptor,
|
|
1765
|
-
if (isFunction(obj) && ["arguments", "caller", "callee"].indexOf(
|
|
1766
|
+
reduceDescriptors(obj, (descriptor, name) => {
|
|
1767
|
+
if (isFunction(obj) && ["arguments", "caller", "callee"].indexOf(name) !== -1) {
|
|
1766
1768
|
return false;
|
|
1767
1769
|
}
|
|
1768
|
-
const value2 = obj[
|
|
1770
|
+
const value2 = obj[name];
|
|
1769
1771
|
if (!isFunction(value2)) return;
|
|
1770
1772
|
descriptor.enumerable = false;
|
|
1771
1773
|
if ("writable" in descriptor) {
|
|
@@ -1774,7 +1776,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1774
1776
|
}
|
|
1775
1777
|
if (!descriptor.set) {
|
|
1776
1778
|
descriptor.set = () => {
|
|
1777
|
-
throw Error("Can not rewrite read-only method '" +
|
|
1779
|
+
throw Error("Can not rewrite read-only method '" + name + "'");
|
|
1778
1780
|
};
|
|
1779
1781
|
}
|
|
1780
1782
|
});
|
|
@@ -1916,7 +1918,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1916
1918
|
setImmediate: _setImmediate,
|
|
1917
1919
|
asap
|
|
1918
1920
|
};
|
|
1919
|
-
function AxiosError(message2, code, config2, request2, response) {
|
|
1921
|
+
function AxiosError$1(message2, code, config2, request2, response) {
|
|
1920
1922
|
Error.call(this);
|
|
1921
1923
|
if (Error.captureStackTrace) {
|
|
1922
1924
|
Error.captureStackTrace(this, this.constructor);
|
|
@@ -1933,7 +1935,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1933
1935
|
this.status = response.status ? response.status : null;
|
|
1934
1936
|
}
|
|
1935
1937
|
}
|
|
1936
|
-
utils$3.inherits(AxiosError, Error, {
|
|
1938
|
+
utils$3.inherits(AxiosError$1, Error, {
|
|
1937
1939
|
toJSON: function toJSON() {
|
|
1938
1940
|
return {
|
|
1939
1941
|
// Standard
|
|
@@ -1954,7 +1956,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1954
1956
|
};
|
|
1955
1957
|
}
|
|
1956
1958
|
});
|
|
1957
|
-
const prototype$1 = AxiosError.prototype;
|
|
1959
|
+
const prototype$1 = AxiosError$1.prototype;
|
|
1958
1960
|
const descriptors = {};
|
|
1959
1961
|
[
|
|
1960
1962
|
"ERR_BAD_OPTION_VALUE",
|
|
@@ -1973,16 +1975,16 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
1973
1975
|
].forEach((code) => {
|
|
1974
1976
|
descriptors[code] = { value: code };
|
|
1975
1977
|
});
|
|
1976
|
-
Object.defineProperties(AxiosError, descriptors);
|
|
1978
|
+
Object.defineProperties(AxiosError$1, descriptors);
|
|
1977
1979
|
Object.defineProperty(prototype$1, "isAxiosError", { value: true });
|
|
1978
|
-
AxiosError.from = (error, code, config2, request2, response, customProps) => {
|
|
1980
|
+
AxiosError$1.from = (error, code, config2, request2, response, customProps) => {
|
|
1979
1981
|
const axiosError = Object.create(prototype$1);
|
|
1980
1982
|
utils$3.toFlatObject(error, axiosError, function filter(obj) {
|
|
1981
1983
|
return obj !== Error.prototype;
|
|
1982
1984
|
}, (prop) => {
|
|
1983
1985
|
return prop !== "isAxiosError";
|
|
1984
1986
|
});
|
|
1985
|
-
AxiosError.call(axiosError, error.message, code, config2, request2, response);
|
|
1987
|
+
AxiosError$1.call(axiosError, error.message, code, config2, request2, response);
|
|
1986
1988
|
axiosError.cause = error;
|
|
1987
1989
|
axiosError.name = error.name;
|
|
1988
1990
|
customProps && Object.assign(axiosError, customProps);
|
|
@@ -2008,7 +2010,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2008
2010
|
const predicates = utils$3.toFlatObject(utils$3, {}, null, function filter(prop) {
|
|
2009
2011
|
return /^is[A-Z]/.test(prop);
|
|
2010
2012
|
});
|
|
2011
|
-
function toFormData(obj, formData, options) {
|
|
2013
|
+
function toFormData$1(obj, formData, options) {
|
|
2012
2014
|
if (!utils$3.isObject(obj)) {
|
|
2013
2015
|
throw new TypeError("target must be an object");
|
|
2014
2016
|
}
|
|
@@ -2035,7 +2037,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2035
2037
|
return value2.toISOString();
|
|
2036
2038
|
}
|
|
2037
2039
|
if (!useBlob && utils$3.isBlob(value2)) {
|
|
2038
|
-
throw new AxiosError("Blob is not supported. Use a Buffer instead.");
|
|
2040
|
+
throw new AxiosError$1("Blob is not supported. Use a Buffer instead.");
|
|
2039
2041
|
}
|
|
2040
2042
|
if (utils$3.isArrayBuffer(value2) || utils$3.isTypedArray(value2)) {
|
|
2041
2043
|
return useBlob && typeof Blob === "function" ? new Blob([value2]) : Buffer.from(value2);
|
|
@@ -2114,11 +2116,11 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2114
2116
|
}
|
|
2115
2117
|
function AxiosURLSearchParams(params, options) {
|
|
2116
2118
|
this._pairs = [];
|
|
2117
|
-
params && toFormData(params, this, options);
|
|
2119
|
+
params && toFormData$1(params, this, options);
|
|
2118
2120
|
}
|
|
2119
2121
|
const prototype = AxiosURLSearchParams.prototype;
|
|
2120
|
-
prototype.append = function append(
|
|
2121
|
-
this._pairs.push([
|
|
2122
|
+
prototype.append = function append(name, value2) {
|
|
2123
|
+
this._pairs.push([name, value2]);
|
|
2122
2124
|
};
|
|
2123
2125
|
prototype.toString = function toString2(encoder2) {
|
|
2124
2126
|
const _encode = encoder2 ? function(value2) {
|
|
@@ -2256,7 +2258,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2256
2258
|
...platform$1
|
|
2257
2259
|
};
|
|
2258
2260
|
function toURLEncodedForm(data, options) {
|
|
2259
|
-
return toFormData(data, new platform.classes.URLSearchParams(), Object.assign({
|
|
2261
|
+
return toFormData$1(data, new platform.classes.URLSearchParams(), Object.assign({
|
|
2260
2262
|
visitor: function(value2, key, path, helpers) {
|
|
2261
2263
|
if (platform.isNode && utils$3.isBuffer(value2)) {
|
|
2262
2264
|
this.append(key, value2.toString("base64"));
|
|
@@ -2266,8 +2268,8 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2266
2268
|
}
|
|
2267
2269
|
}, options));
|
|
2268
2270
|
}
|
|
2269
|
-
function parsePropPath(
|
|
2270
|
-
return utils$3.matchAll(/\w+|\[(\w*)]/g,
|
|
2271
|
+
function parsePropPath(name) {
|
|
2272
|
+
return utils$3.matchAll(/\w+|\[(\w*)]/g, name).map((match) => {
|
|
2271
2273
|
return match[0] === "[]" ? "" : match[1] || match[0];
|
|
2272
2274
|
});
|
|
2273
2275
|
}
|
|
@@ -2285,32 +2287,32 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2285
2287
|
}
|
|
2286
2288
|
function formDataToJSON(formData) {
|
|
2287
2289
|
function buildPath(path, value2, target, index) {
|
|
2288
|
-
let
|
|
2289
|
-
if (
|
|
2290
|
-
const isNumericKey = Number.isFinite(+
|
|
2290
|
+
let name = path[index++];
|
|
2291
|
+
if (name === "__proto__") return true;
|
|
2292
|
+
const isNumericKey = Number.isFinite(+name);
|
|
2291
2293
|
const isLast = index >= path.length;
|
|
2292
|
-
|
|
2294
|
+
name = !name && utils$3.isArray(target) ? target.length : name;
|
|
2293
2295
|
if (isLast) {
|
|
2294
|
-
if (utils$3.hasOwnProp(target,
|
|
2295
|
-
target[
|
|
2296
|
+
if (utils$3.hasOwnProp(target, name)) {
|
|
2297
|
+
target[name] = [target[name], value2];
|
|
2296
2298
|
} else {
|
|
2297
|
-
target[
|
|
2299
|
+
target[name] = value2;
|
|
2298
2300
|
}
|
|
2299
2301
|
return !isNumericKey;
|
|
2300
2302
|
}
|
|
2301
|
-
if (!target[
|
|
2302
|
-
target[
|
|
2303
|
+
if (!target[name] || !utils$3.isObject(target[name])) {
|
|
2304
|
+
target[name] = [];
|
|
2303
2305
|
}
|
|
2304
|
-
const result = buildPath(path, value2, target[
|
|
2305
|
-
if (result && utils$3.isArray(target[
|
|
2306
|
-
target[
|
|
2306
|
+
const result = buildPath(path, value2, target[name], index);
|
|
2307
|
+
if (result && utils$3.isArray(target[name])) {
|
|
2308
|
+
target[name] = arrayToObject(target[name]);
|
|
2307
2309
|
}
|
|
2308
2310
|
return !isNumericKey;
|
|
2309
2311
|
}
|
|
2310
2312
|
if (utils$3.isFormData(formData) && utils$3.isFunction(formData.entries)) {
|
|
2311
2313
|
const obj = {};
|
|
2312
|
-
utils$3.forEachEntry(formData, (
|
|
2313
|
-
buildPath(parsePropPath(
|
|
2314
|
+
utils$3.forEachEntry(formData, (name, value2) => {
|
|
2315
|
+
buildPath(parsePropPath(name), value2, obj, 0);
|
|
2314
2316
|
});
|
|
2315
2317
|
return obj;
|
|
2316
2318
|
}
|
|
@@ -2327,7 +2329,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2327
2329
|
}
|
|
2328
2330
|
}
|
|
2329
2331
|
}
|
|
2330
|
-
return (
|
|
2332
|
+
return (encoder2 || JSON.stringify)(rawValue);
|
|
2331
2333
|
}
|
|
2332
2334
|
const defaults = {
|
|
2333
2335
|
transitional: transitionalDefaults,
|
|
@@ -2360,7 +2362,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2360
2362
|
}
|
|
2361
2363
|
if ((isFileList2 = utils$3.isFileList(data)) || contentType.indexOf("multipart/form-data") > -1) {
|
|
2362
2364
|
const _FormData = this.env && this.env.FormData;
|
|
2363
|
-
return toFormData(
|
|
2365
|
+
return toFormData$1(
|
|
2364
2366
|
isFileList2 ? { "files[]": data } : data,
|
|
2365
2367
|
_FormData && new _FormData(),
|
|
2366
2368
|
this.formSerializer
|
|
@@ -2388,7 +2390,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2388
2390
|
} catch (e) {
|
|
2389
2391
|
if (strictJSONParsing) {
|
|
2390
2392
|
if (e.name === "SyntaxError") {
|
|
2391
|
-
throw AxiosError.from(e, AxiosError.ERR_BAD_RESPONSE, this, null, this.response);
|
|
2393
|
+
throw AxiosError$1.from(e, AxiosError$1.ERR_BAD_RESPONSE, this, null, this.response);
|
|
2392
2394
|
}
|
|
2393
2395
|
throw e;
|
|
2394
2396
|
}
|
|
@@ -2516,7 +2518,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2516
2518
|
});
|
|
2517
2519
|
});
|
|
2518
2520
|
}
|
|
2519
|
-
class AxiosHeaders {
|
|
2521
|
+
let AxiosHeaders$1 = class AxiosHeaders {
|
|
2520
2522
|
constructor(headers) {
|
|
2521
2523
|
headers && this.set(headers);
|
|
2522
2524
|
}
|
|
@@ -2671,9 +2673,9 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2671
2673
|
utils$3.isArray(header) ? header.forEach(defineAccessor) : defineAccessor(header);
|
|
2672
2674
|
return this;
|
|
2673
2675
|
}
|
|
2674
|
-
}
|
|
2675
|
-
AxiosHeaders.accessor(["Content-Type", "Content-Length", "Accept", "Accept-Encoding", "User-Agent", "Authorization"]);
|
|
2676
|
-
utils$3.reduceDescriptors(AxiosHeaders.prototype, ({ value: value2 }, key) => {
|
|
2676
|
+
};
|
|
2677
|
+
AxiosHeaders$1.accessor(["Content-Type", "Content-Length", "Accept", "Accept-Encoding", "User-Agent", "Authorization"]);
|
|
2678
|
+
utils$3.reduceDescriptors(AxiosHeaders$1.prototype, ({ value: value2 }, key) => {
|
|
2677
2679
|
let mapped = key[0].toUpperCase() + key.slice(1);
|
|
2678
2680
|
return {
|
|
2679
2681
|
get: () => value2,
|
|
@@ -2682,11 +2684,11 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2682
2684
|
}
|
|
2683
2685
|
};
|
|
2684
2686
|
});
|
|
2685
|
-
utils$3.freezeMethods(AxiosHeaders);
|
|
2687
|
+
utils$3.freezeMethods(AxiosHeaders$1);
|
|
2686
2688
|
function transformData(fns, response) {
|
|
2687
2689
|
const config2 = this || defaults;
|
|
2688
2690
|
const context = response || config2;
|
|
2689
|
-
const headers = AxiosHeaders.from(context.headers);
|
|
2691
|
+
const headers = AxiosHeaders$1.from(context.headers);
|
|
2690
2692
|
let data = context.data;
|
|
2691
2693
|
utils$3.forEach(fns, function transform(fn) {
|
|
2692
2694
|
data = fn.call(config2, data, headers.normalize(), response ? response.status : void 0);
|
|
@@ -2694,14 +2696,14 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2694
2696
|
headers.normalize();
|
|
2695
2697
|
return data;
|
|
2696
2698
|
}
|
|
2697
|
-
function isCancel(value2) {
|
|
2699
|
+
function isCancel$1(value2) {
|
|
2698
2700
|
return !!(value2 && value2.__CANCEL__);
|
|
2699
2701
|
}
|
|
2700
|
-
function CanceledError(message2, config2, request2) {
|
|
2701
|
-
AxiosError.call(this, message2 == null ? "canceled" : message2, AxiosError.ERR_CANCELED, config2, request2);
|
|
2702
|
+
function CanceledError$1(message2, config2, request2) {
|
|
2703
|
+
AxiosError$1.call(this, message2 == null ? "canceled" : message2, AxiosError$1.ERR_CANCELED, config2, request2);
|
|
2702
2704
|
this.name = "CanceledError";
|
|
2703
2705
|
}
|
|
2704
|
-
utils$3.inherits(CanceledError, AxiosError, {
|
|
2706
|
+
utils$3.inherits(CanceledError$1, AxiosError$1, {
|
|
2705
2707
|
__CANCEL__: true
|
|
2706
2708
|
});
|
|
2707
2709
|
function settle(resolve, reject, response) {
|
|
@@ -2709,9 +2711,9 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2709
2711
|
if (!response.status || !validateStatus || validateStatus(response.status)) {
|
|
2710
2712
|
resolve(response);
|
|
2711
2713
|
} else {
|
|
2712
|
-
reject(new AxiosError(
|
|
2714
|
+
reject(new AxiosError$1(
|
|
2713
2715
|
"Request failed with status code " + response.status,
|
|
2714
|
-
[AxiosError.ERR_BAD_REQUEST, AxiosError.ERR_BAD_RESPONSE][Math.floor(response.status / 100) - 4],
|
|
2716
|
+
[AxiosError$1.ERR_BAD_REQUEST, AxiosError$1.ERR_BAD_RESPONSE][Math.floor(response.status / 100) - 4],
|
|
2715
2717
|
response.config,
|
|
2716
2718
|
response.request,
|
|
2717
2719
|
response
|
|
@@ -2830,20 +2832,20 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2830
2832
|
const cookies = platform.hasStandardBrowserEnv ? (
|
|
2831
2833
|
// Standard browser envs support document.cookie
|
|
2832
2834
|
{
|
|
2833
|
-
write(
|
|
2834
|
-
const cookie2 = [
|
|
2835
|
+
write(name, value2, expires, path, domain, secure) {
|
|
2836
|
+
const cookie2 = [name + "=" + encodeURIComponent(value2)];
|
|
2835
2837
|
utils$3.isNumber(expires) && cookie2.push("expires=" + new Date(expires).toGMTString());
|
|
2836
2838
|
utils$3.isString(path) && cookie2.push("path=" + path);
|
|
2837
2839
|
utils$3.isString(domain) && cookie2.push("domain=" + domain);
|
|
2838
2840
|
secure === true && cookie2.push("secure");
|
|
2839
2841
|
document.cookie = cookie2.join("; ");
|
|
2840
2842
|
},
|
|
2841
|
-
read(
|
|
2842
|
-
const match = document.cookie.match(new RegExp("(^|;\\s*)(" +
|
|
2843
|
+
read(name) {
|
|
2844
|
+
const match = document.cookie.match(new RegExp("(^|;\\s*)(" + name + ")=([^;]*)"));
|
|
2843
2845
|
return match ? decodeURIComponent(match[3]) : null;
|
|
2844
2846
|
},
|
|
2845
|
-
remove(
|
|
2846
|
-
this.write(
|
|
2847
|
+
remove(name) {
|
|
2848
|
+
this.write(name, "", Date.now() - 864e5);
|
|
2847
2849
|
}
|
|
2848
2850
|
}
|
|
2849
2851
|
) : (
|
|
@@ -2870,8 +2872,8 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2870
2872
|
}
|
|
2871
2873
|
return requestedURL;
|
|
2872
2874
|
}
|
|
2873
|
-
const headersToObject = (thing) => thing instanceof AxiosHeaders ? { ...thing } : thing;
|
|
2874
|
-
function mergeConfig(config1, config2) {
|
|
2875
|
+
const headersToObject = (thing) => thing instanceof AxiosHeaders$1 ? { ...thing } : thing;
|
|
2876
|
+
function mergeConfig$1(config1, config2) {
|
|
2875
2877
|
config2 = config2 || {};
|
|
2876
2878
|
const config3 = {};
|
|
2877
2879
|
function getMergedValue(target, source2, prop, caseless) {
|
|
@@ -2949,9 +2951,9 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2949
2951
|
return config3;
|
|
2950
2952
|
}
|
|
2951
2953
|
const resolveConfig = (config2) => {
|
|
2952
|
-
const newConfig = mergeConfig({}, config2);
|
|
2954
|
+
const newConfig = mergeConfig$1({}, config2);
|
|
2953
2955
|
let { data, withXSRFToken, xsrfHeaderName, xsrfCookieName, headers, auth } = newConfig;
|
|
2954
|
-
newConfig.headers = headers = AxiosHeaders.from(headers);
|
|
2956
|
+
newConfig.headers = headers = AxiosHeaders$1.from(headers);
|
|
2955
2957
|
newConfig.url = buildURL(buildFullPath(newConfig.baseURL, newConfig.url), config2.params, config2.paramsSerializer);
|
|
2956
2958
|
if (auth) {
|
|
2957
2959
|
headers.set(
|
|
@@ -2984,7 +2986,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
2984
2986
|
return new Promise(function dispatchXhrRequest(resolve, reject) {
|
|
2985
2987
|
const _config = resolveConfig(config2);
|
|
2986
2988
|
let requestData = _config.data;
|
|
2987
|
-
const requestHeaders = AxiosHeaders.from(_config.headers).normalize();
|
|
2989
|
+
const requestHeaders = AxiosHeaders$1.from(_config.headers).normalize();
|
|
2988
2990
|
let { responseType, onUploadProgress, onDownloadProgress } = _config;
|
|
2989
2991
|
let onCanceled;
|
|
2990
2992
|
let uploadThrottled, downloadThrottled;
|
|
@@ -3002,7 +3004,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3002
3004
|
if (!request2) {
|
|
3003
3005
|
return;
|
|
3004
3006
|
}
|
|
3005
|
-
const responseHeaders = AxiosHeaders.from(
|
|
3007
|
+
const responseHeaders = AxiosHeaders$1.from(
|
|
3006
3008
|
"getAllResponseHeaders" in request2 && request2.getAllResponseHeaders()
|
|
3007
3009
|
);
|
|
3008
3010
|
const responseData = !responseType || responseType === "text" || responseType === "json" ? request2.responseText : request2.response;
|
|
@@ -3040,11 +3042,11 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3040
3042
|
if (!request2) {
|
|
3041
3043
|
return;
|
|
3042
3044
|
}
|
|
3043
|
-
reject(new AxiosError("Request aborted", AxiosError.ECONNABORTED, config2, request2));
|
|
3045
|
+
reject(new AxiosError$1("Request aborted", AxiosError$1.ECONNABORTED, config2, request2));
|
|
3044
3046
|
request2 = null;
|
|
3045
3047
|
};
|
|
3046
3048
|
request2.onerror = function handleError() {
|
|
3047
|
-
reject(new AxiosError("Network Error", AxiosError.ERR_NETWORK, config2, request2));
|
|
3049
|
+
reject(new AxiosError$1("Network Error", AxiosError$1.ERR_NETWORK, config2, request2));
|
|
3048
3050
|
request2 = null;
|
|
3049
3051
|
};
|
|
3050
3052
|
request2.ontimeout = function handleTimeout() {
|
|
@@ -3053,9 +3055,9 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3053
3055
|
if (_config.timeoutErrorMessage) {
|
|
3054
3056
|
timeoutErrorMessage = _config.timeoutErrorMessage;
|
|
3055
3057
|
}
|
|
3056
|
-
reject(new AxiosError(
|
|
3058
|
+
reject(new AxiosError$1(
|
|
3057
3059
|
timeoutErrorMessage,
|
|
3058
|
-
transitional.clarifyTimeoutError ? AxiosError.ETIMEDOUT : AxiosError.ECONNABORTED,
|
|
3060
|
+
transitional.clarifyTimeoutError ? AxiosError$1.ETIMEDOUT : AxiosError$1.ECONNABORTED,
|
|
3059
3061
|
config2,
|
|
3060
3062
|
request2
|
|
3061
3063
|
));
|
|
@@ -3087,7 +3089,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3087
3089
|
if (!request2) {
|
|
3088
3090
|
return;
|
|
3089
3091
|
}
|
|
3090
|
-
reject(!cancel || cancel.type ? new CanceledError(null, config2, request2) : cancel);
|
|
3092
|
+
reject(!cancel || cancel.type ? new CanceledError$1(null, config2, request2) : cancel);
|
|
3091
3093
|
request2.abort();
|
|
3092
3094
|
request2 = null;
|
|
3093
3095
|
};
|
|
@@ -3098,7 +3100,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3098
3100
|
}
|
|
3099
3101
|
const protocol = parseProtocol(_config.url);
|
|
3100
3102
|
if (protocol && platform.protocols.indexOf(protocol) === -1) {
|
|
3101
|
-
reject(new AxiosError("Unsupported protocol " + protocol + ":", AxiosError.ERR_BAD_REQUEST, config2));
|
|
3103
|
+
reject(new AxiosError$1("Unsupported protocol " + protocol + ":", AxiosError$1.ERR_BAD_REQUEST, config2));
|
|
3102
3104
|
return;
|
|
3103
3105
|
}
|
|
3104
3106
|
request2.send(requestData || null);
|
|
@@ -3114,12 +3116,12 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3114
3116
|
aborted = true;
|
|
3115
3117
|
unsubscribe();
|
|
3116
3118
|
const err = reason instanceof Error ? reason : this.reason;
|
|
3117
|
-
controller.abort(err instanceof AxiosError ? err : new CanceledError(err instanceof Error ? err.message : err));
|
|
3119
|
+
controller.abort(err instanceof AxiosError$1 ? err : new CanceledError$1(err instanceof Error ? err.message : err));
|
|
3118
3120
|
}
|
|
3119
3121
|
};
|
|
3120
3122
|
let timer = timeout && setTimeout(() => {
|
|
3121
3123
|
timer = null;
|
|
3122
|
-
onabort(new AxiosError(`timeout ${timeout} of ms exceeded`, AxiosError.ETIMEDOUT));
|
|
3124
|
+
onabort(new AxiosError$1(`timeout ${timeout} of ms exceeded`, AxiosError$1.ETIMEDOUT));
|
|
3123
3125
|
}, timeout);
|
|
3124
3126
|
const unsubscribe = () => {
|
|
3125
3127
|
if (signals) {
|
|
@@ -3242,7 +3244,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3242
3244
|
isFetchSupported && ((res) => {
|
|
3243
3245
|
["text", "arrayBuffer", "blob", "formData", "stream"].forEach((type) => {
|
|
3244
3246
|
!resolvers[type] && (resolvers[type] = utils$3.isFunction(res[type]) ? (res2) => res2[type]() : (_, config2) => {
|
|
3245
|
-
throw new AxiosError(`Response type '${type}' is not supported`, AxiosError.ERR_NOT_SUPPORT, config2);
|
|
3247
|
+
throw new AxiosError$1(`Response type '${type}' is not supported`, AxiosError$1.ERR_NOT_SUPPORT, config2);
|
|
3246
3248
|
});
|
|
3247
3249
|
});
|
|
3248
3250
|
})(new Response());
|
|
@@ -3354,7 +3356,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3354
3356
|
return await new Promise((resolve, reject) => {
|
|
3355
3357
|
settle(resolve, reject, {
|
|
3356
3358
|
data: responseData,
|
|
3357
|
-
headers: AxiosHeaders.from(response.headers),
|
|
3359
|
+
headers: AxiosHeaders$1.from(response.headers),
|
|
3358
3360
|
status: response.status,
|
|
3359
3361
|
statusText: response.statusText,
|
|
3360
3362
|
config: config2,
|
|
@@ -3365,13 +3367,13 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3365
3367
|
unsubscribe && unsubscribe();
|
|
3366
3368
|
if (err && err.name === "TypeError" && /fetch/i.test(err.message)) {
|
|
3367
3369
|
throw Object.assign(
|
|
3368
|
-
new AxiosError("Network Error", AxiosError.ERR_NETWORK, config2, request2),
|
|
3370
|
+
new AxiosError$1("Network Error", AxiosError$1.ERR_NETWORK, config2, request2),
|
|
3369
3371
|
{
|
|
3370
3372
|
cause: err.cause || err
|
|
3371
3373
|
}
|
|
3372
3374
|
);
|
|
3373
3375
|
}
|
|
3374
|
-
throw AxiosError.from(err, err && err.code, config2, request2);
|
|
3376
|
+
throw AxiosError$1.from(err, err && err.code, config2, request2);
|
|
3375
3377
|
}
|
|
3376
3378
|
});
|
|
3377
3379
|
const knownAdapters = {
|
|
@@ -3404,7 +3406,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3404
3406
|
if (!isResolvedHandle(nameOrAdapter)) {
|
|
3405
3407
|
adapter = knownAdapters[(id = String(nameOrAdapter)).toLowerCase()];
|
|
3406
3408
|
if (adapter === void 0) {
|
|
3407
|
-
throw new AxiosError(`Unknown adapter '${id}'`);
|
|
3409
|
+
throw new AxiosError$1(`Unknown adapter '${id}'`);
|
|
3408
3410
|
}
|
|
3409
3411
|
}
|
|
3410
3412
|
if (adapter) {
|
|
@@ -3417,7 +3419,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3417
3419
|
([id, state]) => `adapter ${id} ` + (state === false ? "is not supported by the environment" : "is not available in the build")
|
|
3418
3420
|
);
|
|
3419
3421
|
let s = length ? reasons.length > 1 ? "since :\n" + reasons.map(renderReason).join("\n") : " " + renderReason(reasons[0]) : "as no adapter specified";
|
|
3420
|
-
throw new AxiosError(
|
|
3422
|
+
throw new AxiosError$1(
|
|
3421
3423
|
`There is no suitable adapter to dispatch the request ` + s,
|
|
3422
3424
|
"ERR_NOT_SUPPORT"
|
|
3423
3425
|
);
|
|
@@ -3431,12 +3433,12 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3431
3433
|
config2.cancelToken.throwIfRequested();
|
|
3432
3434
|
}
|
|
3433
3435
|
if (config2.signal && config2.signal.aborted) {
|
|
3434
|
-
throw new CanceledError(null, config2);
|
|
3436
|
+
throw new CanceledError$1(null, config2);
|
|
3435
3437
|
}
|
|
3436
3438
|
}
|
|
3437
3439
|
function dispatchRequest(config2) {
|
|
3438
3440
|
throwIfCancellationRequested(config2);
|
|
3439
|
-
config2.headers = AxiosHeaders.from(config2.headers);
|
|
3441
|
+
config2.headers = AxiosHeaders$1.from(config2.headers);
|
|
3440
3442
|
config2.data = transformData.call(
|
|
3441
3443
|
config2,
|
|
3442
3444
|
config2.transformRequest
|
|
@@ -3452,10 +3454,10 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3452
3454
|
config2.transformResponse,
|
|
3453
3455
|
response
|
|
3454
3456
|
);
|
|
3455
|
-
response.headers = AxiosHeaders.from(response.headers);
|
|
3457
|
+
response.headers = AxiosHeaders$1.from(response.headers);
|
|
3456
3458
|
return response;
|
|
3457
3459
|
}, function onAdapterRejection(reason) {
|
|
3458
|
-
if (!isCancel(reason)) {
|
|
3460
|
+
if (!isCancel$1(reason)) {
|
|
3459
3461
|
throwIfCancellationRequested(config2);
|
|
3460
3462
|
if (reason && reason.response) {
|
|
3461
3463
|
reason.response.data = transformData.call(
|
|
@@ -3463,13 +3465,13 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3463
3465
|
config2.transformResponse,
|
|
3464
3466
|
reason.response
|
|
3465
3467
|
);
|
|
3466
|
-
reason.response.headers = AxiosHeaders.from(reason.response.headers);
|
|
3468
|
+
reason.response.headers = AxiosHeaders$1.from(reason.response.headers);
|
|
3467
3469
|
}
|
|
3468
3470
|
}
|
|
3469
3471
|
return Promise.reject(reason);
|
|
3470
3472
|
});
|
|
3471
3473
|
}
|
|
3472
|
-
const VERSION = "1.7.9";
|
|
3474
|
+
const VERSION$1 = "1.7.9";
|
|
3473
3475
|
const validators$2 = {};
|
|
3474
3476
|
["object", "boolean", "number", "function", "string", "symbol"].forEach((type, i) => {
|
|
3475
3477
|
validators$2[type] = function validator2(thing) {
|
|
@@ -3479,13 +3481,13 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3479
3481
|
const deprecatedWarnings = {};
|
|
3480
3482
|
validators$2.transitional = function transitional(validator2, version2, message2) {
|
|
3481
3483
|
function formatMessage(opt, desc) {
|
|
3482
|
-
return "[Axios v" + VERSION + "] Transitional option '" + opt + "'" + desc + (message2 ? ". " + message2 : "");
|
|
3484
|
+
return "[Axios v" + VERSION$1 + "] Transitional option '" + opt + "'" + desc + (message2 ? ". " + message2 : "");
|
|
3483
3485
|
}
|
|
3484
3486
|
return (value2, opt, opts) => {
|
|
3485
3487
|
if (validator2 === false) {
|
|
3486
|
-
throw new AxiosError(
|
|
3488
|
+
throw new AxiosError$1(
|
|
3487
3489
|
formatMessage(opt, " has been removed" + (version2 ? " in " + version2 : "")),
|
|
3488
|
-
AxiosError.ERR_DEPRECATED
|
|
3490
|
+
AxiosError$1.ERR_DEPRECATED
|
|
3489
3491
|
);
|
|
3490
3492
|
}
|
|
3491
3493
|
if (version2 && !deprecatedWarnings[opt]) {
|
|
@@ -3508,7 +3510,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3508
3510
|
};
|
|
3509
3511
|
function assertOptions(options, schema, allowUnknown) {
|
|
3510
3512
|
if (typeof options !== "object") {
|
|
3511
|
-
throw new AxiosError("options must be an object", AxiosError.ERR_BAD_OPTION_VALUE);
|
|
3513
|
+
throw new AxiosError$1("options must be an object", AxiosError$1.ERR_BAD_OPTION_VALUE);
|
|
3512
3514
|
}
|
|
3513
3515
|
const keys = Object.keys(options);
|
|
3514
3516
|
let i = keys.length;
|
|
@@ -3519,12 +3521,12 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3519
3521
|
const value2 = options[opt];
|
|
3520
3522
|
const result = value2 === void 0 || validator2(value2, opt, options);
|
|
3521
3523
|
if (result !== true) {
|
|
3522
|
-
throw new AxiosError("option " + opt + " must be " + result, AxiosError.ERR_BAD_OPTION_VALUE);
|
|
3524
|
+
throw new AxiosError$1("option " + opt + " must be " + result, AxiosError$1.ERR_BAD_OPTION_VALUE);
|
|
3523
3525
|
}
|
|
3524
3526
|
continue;
|
|
3525
3527
|
}
|
|
3526
3528
|
if (allowUnknown !== true) {
|
|
3527
|
-
throw new AxiosError("Unknown option " + opt, AxiosError.ERR_BAD_OPTION);
|
|
3529
|
+
throw new AxiosError$1("Unknown option " + opt, AxiosError$1.ERR_BAD_OPTION);
|
|
3528
3530
|
}
|
|
3529
3531
|
}
|
|
3530
3532
|
}
|
|
@@ -3533,7 +3535,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3533
3535
|
validators: validators$2
|
|
3534
3536
|
};
|
|
3535
3537
|
const validators$1 = validator.validators;
|
|
3536
|
-
class Axios {
|
|
3538
|
+
let Axios$1 = class Axios {
|
|
3537
3539
|
constructor(instanceConfig) {
|
|
3538
3540
|
this.defaults = instanceConfig;
|
|
3539
3541
|
this.interceptors = {
|
|
@@ -3576,7 +3578,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3576
3578
|
} else {
|
|
3577
3579
|
config2 = configOrUrl || {};
|
|
3578
3580
|
}
|
|
3579
|
-
config2 = mergeConfig(this.defaults, config2);
|
|
3581
|
+
config2 = mergeConfig$1(this.defaults, config2);
|
|
3580
3582
|
const { transitional, paramsSerializer, headers } = config2;
|
|
3581
3583
|
if (transitional !== void 0) {
|
|
3582
3584
|
validator.assertOptions(transitional, {
|
|
@@ -3612,7 +3614,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3612
3614
|
delete headers[method];
|
|
3613
3615
|
}
|
|
3614
3616
|
);
|
|
3615
|
-
config2.headers = AxiosHeaders.concat(contextHeaders, headers);
|
|
3617
|
+
config2.headers = AxiosHeaders$1.concat(contextHeaders, headers);
|
|
3616
3618
|
const requestInterceptorChain = [];
|
|
3617
3619
|
let synchronousRequestInterceptors = true;
|
|
3618
3620
|
this.interceptors.request.forEach(function unshiftRequestInterceptors(interceptor2) {
|
|
@@ -3666,14 +3668,14 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3666
3668
|
return promise;
|
|
3667
3669
|
}
|
|
3668
3670
|
getUri(config2) {
|
|
3669
|
-
config2 = mergeConfig(this.defaults, config2);
|
|
3671
|
+
config2 = mergeConfig$1(this.defaults, config2);
|
|
3670
3672
|
const fullPath = buildFullPath(config2.baseURL, config2.url);
|
|
3671
3673
|
return buildURL(fullPath, config2.params, config2.paramsSerializer);
|
|
3672
3674
|
}
|
|
3673
|
-
}
|
|
3675
|
+
};
|
|
3674
3676
|
utils$3.forEach(["delete", "get", "head", "options"], function forEachMethodNoData(method) {
|
|
3675
|
-
Axios.prototype[method] = function(url, config2) {
|
|
3676
|
-
return this.request(mergeConfig(config2 || {}, {
|
|
3677
|
+
Axios$1.prototype[method] = function(url, config2) {
|
|
3678
|
+
return this.request(mergeConfig$1(config2 || {}, {
|
|
3677
3679
|
method,
|
|
3678
3680
|
url,
|
|
3679
3681
|
data: (config2 || {}).data
|
|
@@ -3683,7 +3685,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3683
3685
|
utils$3.forEach(["post", "put", "patch"], function forEachMethodWithData(method) {
|
|
3684
3686
|
function generateHTTPMethod(isForm) {
|
|
3685
3687
|
return function httpMethod(url, data, config2) {
|
|
3686
|
-
return this.request(mergeConfig(config2 || {}, {
|
|
3688
|
+
return this.request(mergeConfig$1(config2 || {}, {
|
|
3687
3689
|
method,
|
|
3688
3690
|
headers: isForm ? {
|
|
3689
3691
|
"Content-Type": "multipart/form-data"
|
|
@@ -3693,10 +3695,10 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3693
3695
|
}));
|
|
3694
3696
|
};
|
|
3695
3697
|
}
|
|
3696
|
-
Axios.prototype[method] = generateHTTPMethod();
|
|
3697
|
-
Axios.prototype[method + "Form"] = generateHTTPMethod(true);
|
|
3698
|
+
Axios$1.prototype[method] = generateHTTPMethod();
|
|
3699
|
+
Axios$1.prototype[method + "Form"] = generateHTTPMethod(true);
|
|
3698
3700
|
});
|
|
3699
|
-
|
|
3701
|
+
let CancelToken$1 = class CancelToken2 {
|
|
3700
3702
|
constructor(executor) {
|
|
3701
3703
|
if (typeof executor !== "function") {
|
|
3702
3704
|
throw new TypeError("executor must be a function.");
|
|
@@ -3729,7 +3731,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3729
3731
|
if (token.reason) {
|
|
3730
3732
|
return;
|
|
3731
3733
|
}
|
|
3732
|
-
token.reason = new CanceledError(message2, config2, request2);
|
|
3734
|
+
token.reason = new CanceledError$1(message2, config2, request2);
|
|
3733
3735
|
resolvePromise(token.reason);
|
|
3734
3736
|
});
|
|
3735
3737
|
}
|
|
@@ -3782,7 +3784,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3782
3784
|
*/
|
|
3783
3785
|
static source() {
|
|
3784
3786
|
let cancel;
|
|
3785
|
-
const token = new
|
|
3787
|
+
const token = new CancelToken2(function executor(c) {
|
|
3786
3788
|
cancel = c;
|
|
3787
3789
|
});
|
|
3788
3790
|
return {
|
|
@@ -3790,16 +3792,16 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3790
3792
|
cancel
|
|
3791
3793
|
};
|
|
3792
3794
|
}
|
|
3793
|
-
}
|
|
3794
|
-
function spread(callback) {
|
|
3795
|
+
};
|
|
3796
|
+
function spread$1(callback) {
|
|
3795
3797
|
return function wrap2(arr) {
|
|
3796
3798
|
return callback.apply(null, arr);
|
|
3797
3799
|
};
|
|
3798
3800
|
}
|
|
3799
|
-
function isAxiosError(payload) {
|
|
3801
|
+
function isAxiosError$1(payload) {
|
|
3800
3802
|
return utils$3.isObject(payload) && payload.isAxiosError === true;
|
|
3801
3803
|
}
|
|
3802
|
-
const HttpStatusCode = {
|
|
3804
|
+
const HttpStatusCode$1 = {
|
|
3803
3805
|
Continue: 100,
|
|
3804
3806
|
SwitchingProtocols: 101,
|
|
3805
3807
|
Processing: 102,
|
|
@@ -3864,39 +3866,57 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3864
3866
|
NotExtended: 510,
|
|
3865
3867
|
NetworkAuthenticationRequired: 511
|
|
3866
3868
|
};
|
|
3867
|
-
Object.entries(HttpStatusCode).forEach(([key, value2]) => {
|
|
3868
|
-
HttpStatusCode[value2] = key;
|
|
3869
|
+
Object.entries(HttpStatusCode$1).forEach(([key, value2]) => {
|
|
3870
|
+
HttpStatusCode$1[value2] = key;
|
|
3869
3871
|
});
|
|
3870
3872
|
function createInstance(defaultConfig) {
|
|
3871
|
-
const context = new Axios(defaultConfig);
|
|
3872
|
-
const instance = bind(Axios.prototype.request, context);
|
|
3873
|
-
utils$3.extend(instance, Axios.prototype, context, { allOwnKeys: true });
|
|
3873
|
+
const context = new Axios$1(defaultConfig);
|
|
3874
|
+
const instance = bind(Axios$1.prototype.request, context);
|
|
3875
|
+
utils$3.extend(instance, Axios$1.prototype, context, { allOwnKeys: true });
|
|
3874
3876
|
utils$3.extend(instance, context, null, { allOwnKeys: true });
|
|
3875
3877
|
instance.create = function create(instanceConfig) {
|
|
3876
|
-
return createInstance(mergeConfig(defaultConfig, instanceConfig));
|
|
3878
|
+
return createInstance(mergeConfig$1(defaultConfig, instanceConfig));
|
|
3877
3879
|
};
|
|
3878
3880
|
return instance;
|
|
3879
3881
|
}
|
|
3880
3882
|
const axios = createInstance(defaults);
|
|
3881
|
-
axios.Axios = Axios;
|
|
3882
|
-
axios.CanceledError = CanceledError;
|
|
3883
|
-
axios.CancelToken = CancelToken;
|
|
3884
|
-
axios.isCancel = isCancel;
|
|
3885
|
-
axios.VERSION = VERSION;
|
|
3886
|
-
axios.toFormData = toFormData;
|
|
3887
|
-
axios.AxiosError = AxiosError;
|
|
3883
|
+
axios.Axios = Axios$1;
|
|
3884
|
+
axios.CanceledError = CanceledError$1;
|
|
3885
|
+
axios.CancelToken = CancelToken$1;
|
|
3886
|
+
axios.isCancel = isCancel$1;
|
|
3887
|
+
axios.VERSION = VERSION$1;
|
|
3888
|
+
axios.toFormData = toFormData$1;
|
|
3889
|
+
axios.AxiosError = AxiosError$1;
|
|
3888
3890
|
axios.Cancel = axios.CanceledError;
|
|
3889
|
-
axios.all = function
|
|
3891
|
+
axios.all = function all2(promises) {
|
|
3890
3892
|
return Promise.all(promises);
|
|
3891
3893
|
};
|
|
3892
|
-
axios.spread = spread;
|
|
3893
|
-
axios.isAxiosError = isAxiosError;
|
|
3894
|
-
axios.mergeConfig = mergeConfig;
|
|
3895
|
-
axios.AxiosHeaders = AxiosHeaders;
|
|
3894
|
+
axios.spread = spread$1;
|
|
3895
|
+
axios.isAxiosError = isAxiosError$1;
|
|
3896
|
+
axios.mergeConfig = mergeConfig$1;
|
|
3897
|
+
axios.AxiosHeaders = AxiosHeaders$1;
|
|
3896
3898
|
axios.formToJSON = (thing) => formDataToJSON(utils$3.isHTMLForm(thing) ? new FormData(thing) : thing);
|
|
3897
3899
|
axios.getAdapter = adapters.getAdapter;
|
|
3898
|
-
axios.HttpStatusCode = HttpStatusCode;
|
|
3900
|
+
axios.HttpStatusCode = HttpStatusCode$1;
|
|
3899
3901
|
axios.default = axios;
|
|
3902
|
+
const {
|
|
3903
|
+
Axios,
|
|
3904
|
+
AxiosError,
|
|
3905
|
+
CanceledError,
|
|
3906
|
+
isCancel,
|
|
3907
|
+
CancelToken,
|
|
3908
|
+
VERSION,
|
|
3909
|
+
all,
|
|
3910
|
+
Cancel,
|
|
3911
|
+
isAxiosError,
|
|
3912
|
+
spread,
|
|
3913
|
+
toFormData,
|
|
3914
|
+
AxiosHeaders,
|
|
3915
|
+
HttpStatusCode,
|
|
3916
|
+
formToJSON,
|
|
3917
|
+
getAdapter,
|
|
3918
|
+
mergeConfig
|
|
3919
|
+
} = axios;
|
|
3900
3920
|
var __defProp$1 = Object.defineProperty;
|
|
3901
3921
|
var __typeError$1 = (msg) => {
|
|
3902
3922
|
throw TypeError(msg);
|
|
@@ -3935,7 +3955,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3935
3955
|
});
|
|
3936
3956
|
return a;
|
|
3937
3957
|
}
|
|
3938
|
-
var main$
|
|
3958
|
+
var main$1 = { exports: {} };
|
|
3939
3959
|
const __viteBrowserExternal$2 = {};
|
|
3940
3960
|
const __viteBrowserExternal$1$1 = /* @__PURE__ */ Object.freeze(/* @__PURE__ */ Object.defineProperty({
|
|
3941
3961
|
__proto__: null,
|
|
@@ -3948,7 +3968,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
3948
3968
|
};
|
|
3949
3969
|
var hasRequiredMain$1;
|
|
3950
3970
|
function requireMain$1() {
|
|
3951
|
-
if (hasRequiredMain$1) return main$
|
|
3971
|
+
if (hasRequiredMain$1) return main$1.exports;
|
|
3952
3972
|
hasRequiredMain$1 = 1;
|
|
3953
3973
|
const fs = require$$0$3;
|
|
3954
3974
|
const path = require$$1;
|
|
@@ -4203,15 +4223,15 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
4203
4223
|
parse: parse2,
|
|
4204
4224
|
populate
|
|
4205
4225
|
};
|
|
4206
|
-
main$
|
|
4207
|
-
main$
|
|
4208
|
-
main$
|
|
4209
|
-
main$
|
|
4210
|
-
main$
|
|
4211
|
-
main$
|
|
4212
|
-
main$
|
|
4213
|
-
main$
|
|
4214
|
-
return main$
|
|
4226
|
+
main$1.exports.configDotenv = DotenvModule.configDotenv;
|
|
4227
|
+
main$1.exports._configVault = DotenvModule._configVault;
|
|
4228
|
+
main$1.exports._parseVault = DotenvModule._parseVault;
|
|
4229
|
+
main$1.exports.config = DotenvModule.config;
|
|
4230
|
+
main$1.exports.decrypt = DotenvModule.decrypt;
|
|
4231
|
+
main$1.exports.parse = DotenvModule.parse;
|
|
4232
|
+
main$1.exports.populate = DotenvModule.populate;
|
|
4233
|
+
main$1.exports = DotenvModule;
|
|
4234
|
+
return main$1.exports;
|
|
4215
4235
|
}
|
|
4216
4236
|
var mainExports$1 = requireMain$1();
|
|
4217
4237
|
const dotenv$1 = /* @__PURE__ */ getDefaultExportFromCjs(mainExports$1);
|
|
@@ -5221,11 +5241,11 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
5221
5241
|
const offset = isBackground ? 10 : 0;
|
|
5222
5242
|
const styles = {};
|
|
5223
5243
|
for (const [sourceSpace, suite] of Object.entries(colorConvert2)) {
|
|
5224
|
-
const
|
|
5244
|
+
const name = sourceSpace === "ansi16" ? "ansi" : sourceSpace;
|
|
5225
5245
|
if (sourceSpace === targetSpace) {
|
|
5226
|
-
styles[
|
|
5246
|
+
styles[name] = wrap2(identity, offset);
|
|
5227
5247
|
} else if (typeof suite === "object") {
|
|
5228
|
-
styles[
|
|
5248
|
+
styles[name] = wrap2(suite[targetSpace], offset);
|
|
5229
5249
|
}
|
|
5230
5250
|
}
|
|
5231
5251
|
return styles;
|
|
@@ -5404,7 +5424,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
5404
5424
|
}
|
|
5405
5425
|
return ESCAPES.get(c) || c;
|
|
5406
5426
|
}
|
|
5407
|
-
function parseArguments(
|
|
5427
|
+
function parseArguments(name, arguments_) {
|
|
5408
5428
|
const results = [];
|
|
5409
5429
|
const chunks = arguments_.trim().split(/\s*,\s*/g);
|
|
5410
5430
|
let matches;
|
|
@@ -5415,7 +5435,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
5415
5435
|
} else if (matches = chunk.match(STRING_REGEX)) {
|
|
5416
5436
|
results.push(matches[2].replace(ESCAPE_REGEX, (m, escape, character) => escape ? unescape2(escape) : character));
|
|
5417
5437
|
} else {
|
|
5418
|
-
throw new Error(`Invalid Chalk template style argument: ${chunk} (in style '${
|
|
5438
|
+
throw new Error(`Invalid Chalk template style argument: ${chunk} (in style '${name}')`);
|
|
5419
5439
|
}
|
|
5420
5440
|
}
|
|
5421
5441
|
return results;
|
|
@@ -5425,12 +5445,12 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
5425
5445
|
const results = [];
|
|
5426
5446
|
let matches;
|
|
5427
5447
|
while ((matches = STYLE_REGEX.exec(style)) !== null) {
|
|
5428
|
-
const
|
|
5448
|
+
const name = matches[1];
|
|
5429
5449
|
if (matches[2]) {
|
|
5430
|
-
const args = parseArguments(
|
|
5431
|
-
results.push([
|
|
5450
|
+
const args = parseArguments(name, matches[2]);
|
|
5451
|
+
results.push([name].concat(args));
|
|
5432
5452
|
} else {
|
|
5433
|
-
results.push([
|
|
5453
|
+
results.push([name]);
|
|
5434
5454
|
}
|
|
5435
5455
|
}
|
|
5436
5456
|
return results;
|
|
@@ -6923,11 +6943,11 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
6923
6943
|
const offset = isBackground ? 10 : 0;
|
|
6924
6944
|
const styles = {};
|
|
6925
6945
|
for (const [sourceSpace, suite] of Object.entries(colorConvert2)) {
|
|
6926
|
-
const
|
|
6946
|
+
const name = sourceSpace === "ansi16" ? "ansi" : sourceSpace;
|
|
6927
6947
|
if (sourceSpace === targetSpace) {
|
|
6928
|
-
styles[
|
|
6948
|
+
styles[name] = wrap2(identity, offset);
|
|
6929
6949
|
} else if (typeof suite === "object") {
|
|
6930
|
-
styles[
|
|
6950
|
+
styles[name] = wrap2(suite[targetSpace], offset);
|
|
6931
6951
|
}
|
|
6932
6952
|
}
|
|
6933
6953
|
return styles;
|
|
@@ -7024,16 +7044,16 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
7024
7044
|
})(ansiStyles$2);
|
|
7025
7045
|
return ansiStyles$2.exports;
|
|
7026
7046
|
}
|
|
7027
|
-
var browser$
|
|
7047
|
+
var browser$3;
|
|
7028
7048
|
var hasRequiredBrowser$2;
|
|
7029
7049
|
function requireBrowser$2() {
|
|
7030
|
-
if (hasRequiredBrowser$2) return browser$
|
|
7050
|
+
if (hasRequiredBrowser$2) return browser$3;
|
|
7031
7051
|
hasRequiredBrowser$2 = 1;
|
|
7032
|
-
browser$
|
|
7052
|
+
browser$3 = {
|
|
7033
7053
|
stdout: false,
|
|
7034
7054
|
stderr: false
|
|
7035
7055
|
};
|
|
7036
|
-
return browser$
|
|
7056
|
+
return browser$3;
|
|
7037
7057
|
}
|
|
7038
7058
|
var util$2;
|
|
7039
7059
|
var hasRequiredUtil$2;
|
|
@@ -7106,7 +7126,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
7106
7126
|
}
|
|
7107
7127
|
return ESCAPES.get(c) || c;
|
|
7108
7128
|
}
|
|
7109
|
-
function parseArguments(
|
|
7129
|
+
function parseArguments(name, arguments_) {
|
|
7110
7130
|
const results = [];
|
|
7111
7131
|
const chunks = arguments_.trim().split(/\s*,\s*/g);
|
|
7112
7132
|
let matches;
|
|
@@ -7117,7 +7137,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
7117
7137
|
} else if (matches = chunk.match(STRING_REGEX)) {
|
|
7118
7138
|
results.push(matches[2].replace(ESCAPE_REGEX, (m, escape, character) => escape ? unescape2(escape) : character));
|
|
7119
7139
|
} else {
|
|
7120
|
-
throw new Error(`Invalid Chalk template style argument: ${chunk} (in style '${
|
|
7140
|
+
throw new Error(`Invalid Chalk template style argument: ${chunk} (in style '${name}')`);
|
|
7121
7141
|
}
|
|
7122
7142
|
}
|
|
7123
7143
|
return results;
|
|
@@ -7127,12 +7147,12 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
7127
7147
|
const results = [];
|
|
7128
7148
|
let matches;
|
|
7129
7149
|
while ((matches = STYLE_REGEX.exec(style)) !== null) {
|
|
7130
|
-
const
|
|
7150
|
+
const name = matches[1];
|
|
7131
7151
|
if (matches[2]) {
|
|
7132
|
-
const args = parseArguments(
|
|
7133
|
-
results.push([
|
|
7152
|
+
const args = parseArguments(name, matches[2]);
|
|
7153
|
+
results.push([name].concat(args));
|
|
7134
7154
|
} else {
|
|
7135
|
-
results.push([
|
|
7155
|
+
results.push([name]);
|
|
7136
7156
|
}
|
|
7137
7157
|
}
|
|
7138
7158
|
return results;
|
|
@@ -11644,9 +11664,9 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
11644
11664
|
}
|
|
11645
11665
|
return ms2 + " ms";
|
|
11646
11666
|
}
|
|
11647
|
-
function plural(ms2, msAbs, n,
|
|
11667
|
+
function plural(ms2, msAbs, n, name) {
|
|
11648
11668
|
var isPlural = msAbs >= n * 1.5;
|
|
11649
|
-
return Math.round(ms2 / n) + " " +
|
|
11669
|
+
return Math.round(ms2 / n) + " " + name + (isPlural ? "s" : "");
|
|
11650
11670
|
}
|
|
11651
11671
|
return ms;
|
|
11652
11672
|
}
|
|
@@ -11745,11 +11765,11 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
11745
11765
|
}
|
|
11746
11766
|
return value2;
|
|
11747
11767
|
};
|
|
11748
|
-
const createToken = (
|
|
11768
|
+
const createToken = (name, value2, isGlobal) => {
|
|
11749
11769
|
const safe = makeSafeRegex(value2);
|
|
11750
11770
|
const index = R++;
|
|
11751
|
-
debug(
|
|
11752
|
-
t[
|
|
11771
|
+
debug(name, index, value2);
|
|
11772
|
+
t[name] = index;
|
|
11753
11773
|
src2[index] = value2;
|
|
11754
11774
|
safeSrc[index] = safe;
|
|
11755
11775
|
re2[index] = new RegExp(value2, isGlobal ? "g" : void 0);
|
|
@@ -14020,7 +14040,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
14020
14040
|
return value2 === 0 ? value2 : 0;
|
|
14021
14041
|
}
|
|
14022
14042
|
value2 = toNumber(value2);
|
|
14023
|
-
if (value2 === INFINITY || value2 === -
|
|
14043
|
+
if (value2 === INFINITY || value2 === -Infinity) {
|
|
14024
14044
|
var sign2 = value2 < 0 ? -1 : 1;
|
|
14025
14045
|
return sign2 * MAX_INTEGER;
|
|
14026
14046
|
}
|
|
@@ -14106,7 +14126,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
14106
14126
|
return value2 === 0 ? value2 : 0;
|
|
14107
14127
|
}
|
|
14108
14128
|
value2 = toNumber(value2);
|
|
14109
|
-
if (value2 === INFINITY || value2 === -
|
|
14129
|
+
if (value2 === INFINITY || value2 === -Infinity) {
|
|
14110
14130
|
var sign2 = value2 < 0 ? -1 : 1;
|
|
14111
14131
|
return sign2 * MAX_INTEGER;
|
|
14112
14132
|
}
|
|
@@ -14265,7 +14285,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
14265
14285
|
return value2 === 0 ? value2 : 0;
|
|
14266
14286
|
}
|
|
14267
14287
|
value2 = toNumber(value2);
|
|
14268
|
-
if (value2 === INFINITY || value2 === -
|
|
14288
|
+
if (value2 === INFINITY || value2 === -Infinity) {
|
|
14269
14289
|
var sign2 = value2 < 0 ? -1 : 1;
|
|
14270
14290
|
return sign2 * MAX_INTEGER;
|
|
14271
14291
|
}
|
|
@@ -14594,7 +14614,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
14594
14614
|
}
|
|
14595
14615
|
}
|
|
14596
14616
|
var src = { exports: {} };
|
|
14597
|
-
var browser$
|
|
14617
|
+
var browser$2 = { exports: {} };
|
|
14598
14618
|
var common;
|
|
14599
14619
|
var hasRequiredCommon;
|
|
14600
14620
|
function requireCommon() {
|
|
@@ -14723,19 +14743,19 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
14723
14743
|
createDebug.enable("");
|
|
14724
14744
|
return namespaces;
|
|
14725
14745
|
}
|
|
14726
|
-
function enabled(
|
|
14727
|
-
if (
|
|
14746
|
+
function enabled(name) {
|
|
14747
|
+
if (name[name.length - 1] === "*") {
|
|
14728
14748
|
return true;
|
|
14729
14749
|
}
|
|
14730
14750
|
let i;
|
|
14731
14751
|
let len;
|
|
14732
14752
|
for (i = 0, len = createDebug.skips.length; i < len; i++) {
|
|
14733
|
-
if (createDebug.skips[i].test(
|
|
14753
|
+
if (createDebug.skips[i].test(name)) {
|
|
14734
14754
|
return false;
|
|
14735
14755
|
}
|
|
14736
14756
|
}
|
|
14737
14757
|
for (i = 0, len = createDebug.names.length; i < len; i++) {
|
|
14738
|
-
if (createDebug.names[i].test(
|
|
14758
|
+
if (createDebug.names[i].test(name)) {
|
|
14739
14759
|
return true;
|
|
14740
14760
|
}
|
|
14741
14761
|
}
|
|
@@ -14761,7 +14781,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
14761
14781
|
}
|
|
14762
14782
|
var hasRequiredBrowser$1;
|
|
14763
14783
|
function requireBrowser$1() {
|
|
14764
|
-
if (hasRequiredBrowser$1) return browser$
|
|
14784
|
+
if (hasRequiredBrowser$1) return browser$2.exports;
|
|
14765
14785
|
hasRequiredBrowser$1 = 1;
|
|
14766
14786
|
(function(module2, exports3) {
|
|
14767
14787
|
exports3.formatArgs = formatArgs;
|
|
@@ -14928,8 +14948,8 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
14928
14948
|
return "[UnexpectedJSONParseError]: " + error.message;
|
|
14929
14949
|
}
|
|
14930
14950
|
};
|
|
14931
|
-
})(browser$
|
|
14932
|
-
return browser$
|
|
14951
|
+
})(browser$2, browser$2.exports);
|
|
14952
|
+
return browser$2.exports;
|
|
14933
14953
|
}
|
|
14934
14954
|
const crypto$1 = crypto;
|
|
14935
14955
|
const isCryptoKey = (key) => key instanceof CryptoKey;
|
|
@@ -15246,11 +15266,11 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
15246
15266
|
}
|
|
15247
15267
|
return out === 0;
|
|
15248
15268
|
};
|
|
15249
|
-
function unusable(
|
|
15250
|
-
return new TypeError(`CryptoKey does not support this operation, its ${prop} must be ${
|
|
15269
|
+
function unusable(name, prop = "algorithm.name") {
|
|
15270
|
+
return new TypeError(`CryptoKey does not support this operation, its ${prop} must be ${name}`);
|
|
15251
15271
|
}
|
|
15252
|
-
function isAlgorithm(algorithm,
|
|
15253
|
-
return algorithm.name ===
|
|
15272
|
+
function isAlgorithm(algorithm, name) {
|
|
15273
|
+
return algorithm.name === name;
|
|
15254
15274
|
}
|
|
15255
15275
|
function getHashLength(hash) {
|
|
15256
15276
|
return parseInt(hash.name.slice(4), 10);
|
|
@@ -15425,7 +15445,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
15425
15445
|
const isKeyLike = (key) => {
|
|
15426
15446
|
return isCryptoKey(key);
|
|
15427
15447
|
};
|
|
15428
|
-
const types
|
|
15448
|
+
const types = ["CryptoKey"];
|
|
15429
15449
|
async function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {
|
|
15430
15450
|
if (!(cek instanceof Uint8Array)) {
|
|
15431
15451
|
throw new TypeError(invalidKeyInput(cek, "Uint8Array"));
|
|
@@ -15477,7 +15497,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
15477
15497
|
}
|
|
15478
15498
|
const decrypt$2 = async (enc, cek, ciphertext, iv, tag, aad) => {
|
|
15479
15499
|
if (!isCryptoKey(cek) && !(cek instanceof Uint8Array)) {
|
|
15480
|
-
throw new TypeError(invalidKeyInput(cek, ...types
|
|
15500
|
+
throw new TypeError(invalidKeyInput(cek, ...types, "Uint8Array"));
|
|
15481
15501
|
}
|
|
15482
15502
|
checkIvLength(enc, iv);
|
|
15483
15503
|
switch (enc) {
|
|
@@ -15558,7 +15578,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
15558
15578
|
if (key instanceof Uint8Array) {
|
|
15559
15579
|
return crypto$1.subtle.importKey("raw", key, "AES-KW", true, [usage]);
|
|
15560
15580
|
}
|
|
15561
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
15581
|
+
throw new TypeError(invalidKeyInput(key, ...types, "Uint8Array"));
|
|
15562
15582
|
}
|
|
15563
15583
|
const wrap$1 = async (alg, key, cek) => {
|
|
15564
15584
|
const cryptoKey = await getCryptoKey$2(key, alg, "wrapKey");
|
|
@@ -15574,11 +15594,11 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
15574
15594
|
};
|
|
15575
15595
|
async function deriveKey$1(publicKey, privateKey, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) {
|
|
15576
15596
|
if (!isCryptoKey(publicKey)) {
|
|
15577
|
-
throw new TypeError(invalidKeyInput(publicKey, ...types
|
|
15597
|
+
throw new TypeError(invalidKeyInput(publicKey, ...types));
|
|
15578
15598
|
}
|
|
15579
15599
|
checkEncCryptoKey(publicKey, "ECDH");
|
|
15580
15600
|
if (!isCryptoKey(privateKey)) {
|
|
15581
|
-
throw new TypeError(invalidKeyInput(privateKey, ...types
|
|
15601
|
+
throw new TypeError(invalidKeyInput(privateKey, ...types));
|
|
15582
15602
|
}
|
|
15583
15603
|
checkEncCryptoKey(privateKey, "ECDH", "deriveBits");
|
|
15584
15604
|
const value2 = concat(lengthAndInput(encoder.encode(algorithm)), lengthAndInput(apu), lengthAndInput(apv), uint32be(keyLength));
|
|
@@ -15598,13 +15618,13 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
15598
15618
|
}
|
|
15599
15619
|
async function generateEpk(key) {
|
|
15600
15620
|
if (!isCryptoKey(key)) {
|
|
15601
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
15621
|
+
throw new TypeError(invalidKeyInput(key, ...types));
|
|
15602
15622
|
}
|
|
15603
15623
|
return crypto$1.subtle.generateKey(key.algorithm, true, ["deriveBits"]);
|
|
15604
15624
|
}
|
|
15605
15625
|
function ecdhAllowed(key) {
|
|
15606
15626
|
if (!isCryptoKey(key)) {
|
|
15607
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
15627
|
+
throw new TypeError(invalidKeyInput(key, ...types));
|
|
15608
15628
|
}
|
|
15609
15629
|
return ["P-256", "P-384", "P-521"].includes(key.algorithm.namedCurve) || key.algorithm.name === "X25519" || key.algorithm.name === "X448";
|
|
15610
15630
|
}
|
|
@@ -15621,7 +15641,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
15621
15641
|
checkEncCryptoKey(key, alg, "deriveBits", "deriveKey");
|
|
15622
15642
|
return key;
|
|
15623
15643
|
}
|
|
15624
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
15644
|
+
throw new TypeError(invalidKeyInput(key, ...types, "Uint8Array"));
|
|
15625
15645
|
}
|
|
15626
15646
|
async function deriveKey(p2s$1, alg, p2c, key) {
|
|
15627
15647
|
checkP2s(p2s$1);
|
|
@@ -15676,7 +15696,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
15676
15696
|
};
|
|
15677
15697
|
const encrypt$1 = async (alg, key, cek) => {
|
|
15678
15698
|
if (!isCryptoKey(key)) {
|
|
15679
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
15699
|
+
throw new TypeError(invalidKeyInput(key, ...types));
|
|
15680
15700
|
}
|
|
15681
15701
|
checkEncCryptoKey(key, alg, "encrypt", "wrapKey");
|
|
15682
15702
|
checkKeyLength(alg, key);
|
|
@@ -15691,7 +15711,7 @@ var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "acce
|
|
|
15691
15711
|
};
|
|
15692
15712
|
const decrypt = async (alg, key, encryptedKey) => {
|
|
15693
15713
|
if (!isCryptoKey(key)) {
|
|
15694
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
15714
|
+
throw new TypeError(invalidKeyInput(key, ...types));
|
|
15695
15715
|
}
|
|
15696
15716
|
checkEncCryptoKey(key, alg, "decrypt", "unwrapKey");
|
|
15697
15717
|
checkKeyLength(alg, key);
|
|
@@ -15730,7 +15750,7 @@ ${newlined}
|
|
|
15730
15750
|
};
|
|
15731
15751
|
const genericExport = async (keyType, keyFormat, key) => {
|
|
15732
15752
|
if (!isCryptoKey(key)) {
|
|
15733
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
15753
|
+
throw new TypeError(invalidKeyInput(key, ...types));
|
|
15734
15754
|
}
|
|
15735
15755
|
if (!key.extractable) {
|
|
15736
15756
|
throw new TypeError("CryptoKey is not extractable");
|
|
@@ -16107,30 +16127,30 @@ ${newlined}
|
|
|
16107
16127
|
if (key instanceof Uint8Array)
|
|
16108
16128
|
return;
|
|
16109
16129
|
if (!isKeyLike(key)) {
|
|
16110
|
-
throw new TypeError(withAlg(alg, key, ...types
|
|
16130
|
+
throw new TypeError(withAlg(alg, key, ...types, "Uint8Array"));
|
|
16111
16131
|
}
|
|
16112
16132
|
if (key.type !== "secret") {
|
|
16113
|
-
throw new TypeError(`${types
|
|
16133
|
+
throw new TypeError(`${types.join(" or ")} instances for symmetric algorithms must be of type "secret"`);
|
|
16114
16134
|
}
|
|
16115
16135
|
};
|
|
16116
16136
|
const asymmetricTypeCheck = (alg, key, usage) => {
|
|
16117
16137
|
if (!isKeyLike(key)) {
|
|
16118
|
-
throw new TypeError(withAlg(alg, key, ...types
|
|
16138
|
+
throw new TypeError(withAlg(alg, key, ...types));
|
|
16119
16139
|
}
|
|
16120
16140
|
if (key.type === "secret") {
|
|
16121
|
-
throw new TypeError(`${types
|
|
16141
|
+
throw new TypeError(`${types.join(" or ")} instances for asymmetric algorithms must not be of type "secret"`);
|
|
16122
16142
|
}
|
|
16123
16143
|
if (usage === "sign" && key.type === "public") {
|
|
16124
|
-
throw new TypeError(`${types
|
|
16144
|
+
throw new TypeError(`${types.join(" or ")} instances for asymmetric algorithm signing must be of type "private"`);
|
|
16125
16145
|
}
|
|
16126
16146
|
if (usage === "decrypt" && key.type === "public") {
|
|
16127
|
-
throw new TypeError(`${types
|
|
16147
|
+
throw new TypeError(`${types.join(" or ")} instances for asymmetric algorithm decryption must be of type "private"`);
|
|
16128
16148
|
}
|
|
16129
16149
|
if (key.algorithm && usage === "verify" && key.type === "private") {
|
|
16130
|
-
throw new TypeError(`${types
|
|
16150
|
+
throw new TypeError(`${types.join(" or ")} instances for asymmetric algorithm verifying must be of type "public"`);
|
|
16131
16151
|
}
|
|
16132
16152
|
if (key.algorithm && usage === "encrypt" && key.type === "private") {
|
|
16133
|
-
throw new TypeError(`${types
|
|
16153
|
+
throw new TypeError(`${types.join(" or ")} instances for asymmetric algorithm encryption must be of type "public"`);
|
|
16134
16154
|
}
|
|
16135
16155
|
};
|
|
16136
16156
|
const checkKeyType = (alg, key, usage) => {
|
|
@@ -16179,7 +16199,7 @@ ${newlined}
|
|
|
16179
16199
|
}
|
|
16180
16200
|
const encrypt = async (enc, plaintext, cek, iv, aad) => {
|
|
16181
16201
|
if (!isCryptoKey(cek) && !(cek instanceof Uint8Array)) {
|
|
16182
|
-
throw new TypeError(invalidKeyInput(cek, ...types
|
|
16202
|
+
throw new TypeError(invalidKeyInput(cek, ...types, "Uint8Array"));
|
|
16183
16203
|
}
|
|
16184
16204
|
checkIvLength(enc, iv);
|
|
16185
16205
|
switch (enc) {
|
|
@@ -16561,7 +16581,7 @@ ${newlined}
|
|
|
16561
16581
|
};
|
|
16562
16582
|
}
|
|
16563
16583
|
if (!isCryptoKey(key)) {
|
|
16564
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
16584
|
+
throw new TypeError(invalidKeyInput(key, ...types, "Uint8Array"));
|
|
16565
16585
|
}
|
|
16566
16586
|
if (!key.extractable) {
|
|
16567
16587
|
throw new TypeError("non-extractable CryptoKey cannot be exported as a JWK");
|
|
@@ -17000,11 +17020,11 @@ ${newlined}
|
|
|
17000
17020
|
}
|
|
17001
17021
|
if (key instanceof Uint8Array) {
|
|
17002
17022
|
if (!alg.startsWith("HS")) {
|
|
17003
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
17023
|
+
throw new TypeError(invalidKeyInput(key, ...types));
|
|
17004
17024
|
}
|
|
17005
17025
|
return crypto$1.subtle.importKey("raw", key, { hash: `SHA-${alg.slice(-3)}`, name: "HMAC" }, false, [usage]);
|
|
17006
17026
|
}
|
|
17007
|
-
throw new TypeError(invalidKeyInput(key, ...types
|
|
17027
|
+
throw new TypeError(invalidKeyInput(key, ...types, "Uint8Array"));
|
|
17008
17028
|
}
|
|
17009
17029
|
const verify = async (alg, key, signature, data) => {
|
|
17010
17030
|
const cryptoKey = await getCryptoKey(alg, key, "verify");
|
|
@@ -17636,9 +17656,9 @@ ${newlined}
|
|
|
17636
17656
|
return enc.encrypt(key, options);
|
|
17637
17657
|
}
|
|
17638
17658
|
}
|
|
17639
|
-
const check = (value2,
|
|
17659
|
+
const check = (value2, description) => {
|
|
17640
17660
|
if (typeof value2 !== "string" || !value2) {
|
|
17641
|
-
throw new JWKInvalid(`${
|
|
17661
|
+
throw new JWKInvalid(`${description} missing or invalid`);
|
|
17642
17662
|
}
|
|
17643
17663
|
};
|
|
17644
17664
|
async function calculateJwkThumbprint(jwk, digestAlgorithm) {
|
|
@@ -18128,7 +18148,7 @@ ${newlined}
|
|
|
18128
18148
|
return generateSecret$1(alg, options);
|
|
18129
18149
|
}
|
|
18130
18150
|
const value = "WebCryptoAPI";
|
|
18131
|
-
const browser$
|
|
18151
|
+
const browser$1 = /* @__PURE__ */ Object.freeze(/* @__PURE__ */ Object.defineProperty({
|
|
18132
18152
|
__proto__: null,
|
|
18133
18153
|
CompactEncrypt,
|
|
18134
18154
|
CompactSign,
|
|
@@ -18167,7 +18187,7 @@ ${newlined}
|
|
|
18167
18187
|
jwtDecrypt,
|
|
18168
18188
|
jwtVerify
|
|
18169
18189
|
}, Symbol.toStringTag, { value: "Module" }));
|
|
18170
|
-
const require$$0$1 = /* @__PURE__ */ getAugmentedNamespace$1(browser$
|
|
18190
|
+
const require$$0$1 = /* @__PURE__ */ getAugmentedNamespace$1(browser$1);
|
|
18171
18191
|
var JwksError_1;
|
|
18172
18192
|
var hasRequiredJwksError;
|
|
18173
18193
|
function requireJwksError() {
|
|
@@ -20619,48 +20639,20 @@ ${newlined}
|
|
|
20619
20639
|
}
|
|
20620
20640
|
var srcExports = requireSrc();
|
|
20621
20641
|
const jwksClient = /* @__PURE__ */ getDefaultExportFromCjs$1(srcExports);
|
|
20622
|
-
var main
|
|
20642
|
+
var main = { exports: {} };
|
|
20623
20643
|
const __viteBrowserExternal = {};
|
|
20624
20644
|
const __viteBrowserExternal$1 = /* @__PURE__ */ Object.freeze(/* @__PURE__ */ Object.defineProperty({
|
|
20625
20645
|
__proto__: null,
|
|
20626
20646
|
default: __viteBrowserExternal
|
|
20627
20647
|
}, Symbol.toStringTag, { value: "Module" }));
|
|
20628
20648
|
const require$$0 = /* @__PURE__ */ getAugmentedNamespace$1(__viteBrowserExternal$1);
|
|
20629
|
-
const name = "dotenv";
|
|
20630
20649
|
const version = "16.4.7";
|
|
20631
|
-
const description = "Loads environment variables from .env file";
|
|
20632
|
-
const main = "lib/main.js";
|
|
20633
|
-
const types = "lib/main.d.ts";
|
|
20634
|
-
const exports$1 = { ".": { "types": "./lib/main.d.ts", "require": "./lib/main.js", "default": "./lib/main.js" }, "./config": "./config.js", "./config.js": "./config.js", "./lib/env-options": "./lib/env-options.js", "./lib/env-options.js": "./lib/env-options.js", "./lib/cli-options": "./lib/cli-options.js", "./lib/cli-options.js": "./lib/cli-options.js", "./package.json": "./package.json" };
|
|
20635
|
-
const scripts = { "dts-check": "tsc --project tests/types/tsconfig.json", "lint": "standard", "pretest": "npm run lint && npm run dts-check", "test": "tap run --allow-empty-coverage --disable-coverage --timeout=60000", "test:coverage": "tap run --show-full-coverage --timeout=60000 --coverage-report=lcov", "prerelease": "npm test", "release": "standard-version" };
|
|
20636
|
-
const repository = { "type": "git", "url": "git://github.com/motdotla/dotenv.git" };
|
|
20637
|
-
const funding = "https://dotenvx.com";
|
|
20638
|
-
const keywords = ["dotenv", "env", ".env", "environment", "variables", "config", "settings"];
|
|
20639
|
-
const readmeFilename = "README.md";
|
|
20640
|
-
const license = "BSD-2-Clause";
|
|
20641
|
-
const devDependencies = { "@types/node": "^18.11.3", "decache": "^4.6.2", "sinon": "^14.0.1", "standard": "^17.0.0", "standard-version": "^9.5.0", "tap": "^19.2.0", "typescript": "^4.8.4" };
|
|
20642
|
-
const engines = { "node": ">=12" };
|
|
20643
|
-
const browser$1 = { "fs": false };
|
|
20644
20650
|
const require$$4 = {
|
|
20645
|
-
|
|
20646
|
-
version,
|
|
20647
|
-
description,
|
|
20648
|
-
main,
|
|
20649
|
-
types,
|
|
20650
|
-
exports: exports$1,
|
|
20651
|
-
scripts,
|
|
20652
|
-
repository,
|
|
20653
|
-
funding,
|
|
20654
|
-
keywords,
|
|
20655
|
-
readmeFilename,
|
|
20656
|
-
license,
|
|
20657
|
-
devDependencies,
|
|
20658
|
-
engines,
|
|
20659
|
-
browser: browser$1
|
|
20651
|
+
version
|
|
20660
20652
|
};
|
|
20661
20653
|
var hasRequiredMain;
|
|
20662
20654
|
function requireMain() {
|
|
20663
|
-
if (hasRequiredMain) return main
|
|
20655
|
+
if (hasRequiredMain) return main.exports;
|
|
20664
20656
|
hasRequiredMain = 1;
|
|
20665
20657
|
const fs = require$$0;
|
|
20666
20658
|
const path = require$$1;
|
|
@@ -20915,15 +20907,15 @@ ${newlined}
|
|
|
20915
20907
|
parse: parse2,
|
|
20916
20908
|
populate
|
|
20917
20909
|
};
|
|
20918
|
-
main
|
|
20919
|
-
main
|
|
20920
|
-
main
|
|
20921
|
-
main
|
|
20922
|
-
main
|
|
20923
|
-
main
|
|
20924
|
-
main
|
|
20925
|
-
main
|
|
20926
|
-
return main
|
|
20910
|
+
main.exports.configDotenv = DotenvModule.configDotenv;
|
|
20911
|
+
main.exports._configVault = DotenvModule._configVault;
|
|
20912
|
+
main.exports._parseVault = DotenvModule._parseVault;
|
|
20913
|
+
main.exports.config = DotenvModule.config;
|
|
20914
|
+
main.exports.decrypt = DotenvModule.decrypt;
|
|
20915
|
+
main.exports.parse = DotenvModule.parse;
|
|
20916
|
+
main.exports.populate = DotenvModule.populate;
|
|
20917
|
+
main.exports = DotenvModule;
|
|
20918
|
+
return main.exports;
|
|
20927
20919
|
}
|
|
20928
20920
|
var mainExports = requireMain();
|
|
20929
20921
|
const dotenv = /* @__PURE__ */ getDefaultExportFromCjs$1(mainExports);
|
|
@@ -21933,11 +21925,11 @@ ${newlined}
|
|
|
21933
21925
|
const offset = isBackground ? 10 : 0;
|
|
21934
21926
|
const styles = {};
|
|
21935
21927
|
for (const [sourceSpace, suite] of Object.entries(colorConvert2)) {
|
|
21936
|
-
const
|
|
21928
|
+
const name = sourceSpace === "ansi16" ? "ansi" : sourceSpace;
|
|
21937
21929
|
if (sourceSpace === targetSpace) {
|
|
21938
|
-
styles[
|
|
21930
|
+
styles[name] = wrap2(identity, offset);
|
|
21939
21931
|
} else if (typeof suite === "object") {
|
|
21940
|
-
styles[
|
|
21932
|
+
styles[name] = wrap2(suite[targetSpace], offset);
|
|
21941
21933
|
}
|
|
21942
21934
|
}
|
|
21943
21935
|
return styles;
|
|
@@ -22116,7 +22108,7 @@ ${newlined}
|
|
|
22116
22108
|
}
|
|
22117
22109
|
return ESCAPES.get(c) || c;
|
|
22118
22110
|
}
|
|
22119
|
-
function parseArguments(
|
|
22111
|
+
function parseArguments(name, arguments_) {
|
|
22120
22112
|
const results = [];
|
|
22121
22113
|
const chunks = arguments_.trim().split(/\s*,\s*/g);
|
|
22122
22114
|
let matches;
|
|
@@ -22127,7 +22119,7 @@ ${newlined}
|
|
|
22127
22119
|
} else if (matches = chunk.match(STRING_REGEX)) {
|
|
22128
22120
|
results.push(matches[2].replace(ESCAPE_REGEX, (m, escape, character) => escape ? unescape2(escape) : character));
|
|
22129
22121
|
} else {
|
|
22130
|
-
throw new Error(`Invalid Chalk template style argument: ${chunk} (in style '${
|
|
22122
|
+
throw new Error(`Invalid Chalk template style argument: ${chunk} (in style '${name}')`);
|
|
22131
22123
|
}
|
|
22132
22124
|
}
|
|
22133
22125
|
return results;
|
|
@@ -22137,12 +22129,12 @@ ${newlined}
|
|
|
22137
22129
|
const results = [];
|
|
22138
22130
|
let matches;
|
|
22139
22131
|
while ((matches = STYLE_REGEX.exec(style)) !== null) {
|
|
22140
|
-
const
|
|
22132
|
+
const name = matches[1];
|
|
22141
22133
|
if (matches[2]) {
|
|
22142
|
-
const args = parseArguments(
|
|
22143
|
-
results.push([
|
|
22134
|
+
const args = parseArguments(name, matches[2]);
|
|
22135
|
+
results.push([name].concat(args));
|
|
22144
22136
|
} else {
|
|
22145
|
-
results.push([
|
|
22137
|
+
results.push([name]);
|
|
22146
22138
|
}
|
|
22147
22139
|
}
|
|
22148
22140
|
return results;
|
|
@@ -22929,8 +22921,6 @@ ${newlined}
|
|
|
22929
22921
|
__privateGet2(this, _options2).logger.debug(message2);
|
|
22930
22922
|
};
|
|
22931
22923
|
chalk$1.level = 3;
|
|
22932
|
-
const STS_RF_RES_PREFIX = "STS_R_RF_";
|
|
22933
|
-
const STS_RF_RES_ENT_PREFIX = "STS_RE_RF_";
|
|
22934
22924
|
class Rest01Client {
|
|
22935
22925
|
constructor(options) {
|
|
22936
22926
|
__privateAdd(this, _options3);
|
|
@@ -22938,7 +22928,6 @@ ${newlined}
|
|
|
22938
22928
|
__privateAdd(this, _accessToken2, null);
|
|
22939
22929
|
__privateAdd(this, _agentManager);
|
|
22940
22930
|
__privateAdd(this, _authUtilsNode);
|
|
22941
|
-
__privateAdd(this, _MAX_KEEP_TIME_IN_SECONDS, 120);
|
|
22942
22931
|
__privateAdd(this, _GetAccessToken, async () => {
|
|
22943
22932
|
if (!__privateGet(this, _accessToken2)) {
|
|
22944
22933
|
const api = "api://e0bdc5db-7d7c-4c9b-b248-0263991ef7c3";
|
|
@@ -22976,18 +22965,28 @@ ${newlined}
|
|
|
22976
22965
|
stsutils.defaultLogger.error(`WorkerInstance: #AddRunner.PostEntity.Error(): [${error}]`);
|
|
22977
22966
|
});
|
|
22978
22967
|
});
|
|
22968
|
+
__publicField(this, "GetResource", async (resourceTestRunnerMetadata) => {
|
|
22969
|
+
return await __privateGet(this, _rest01Client).GetResource(resourceTestRunnerMetadata, "", (error) => {
|
|
22970
|
+
stsutils.defaultLogger.error(`Rest01Client: GetResource.Error(): [${error}]`);
|
|
22971
|
+
});
|
|
22972
|
+
});
|
|
22979
22973
|
__publicField(this, "GetResources", async () => {
|
|
22980
22974
|
const getResourceParams = new URLSearchParams({
|
|
22981
22975
|
filter: `${STS_RF_RES_PREFIX}%`,
|
|
22982
|
-
limit:
|
|
22976
|
+
limit: __privateGet(this, _options3).queryRecordLimit.toString()
|
|
22983
22977
|
});
|
|
22984
22978
|
return await __privateGet(this, _rest01Client).GetResources(getResourceParams.toString(), (error) => {
|
|
22985
22979
|
stsutils.defaultLogger.error(`Rest01Client: GetResources.Error(): [${error}]`);
|
|
22986
22980
|
});
|
|
22987
22981
|
});
|
|
22982
|
+
__publicField(this, "GetEntity", async (resourceEntityTestRunnerMetadata) => {
|
|
22983
|
+
return await __privateGet(this, _rest01Client).GetEntity(resourceEntityTestRunnerMetadata, "", (error) => {
|
|
22984
|
+
stsutils.defaultLogger.error(`Rest01Client: GetEntity.Error(): [${error}]`);
|
|
22985
|
+
});
|
|
22986
|
+
});
|
|
22988
22987
|
__publicField(this, "GetEntities", async (resourceTestRunnerMetadata) => {
|
|
22989
22988
|
const getResourceEntityParams = new URLSearchParams({
|
|
22990
|
-
limit:
|
|
22989
|
+
limit: __privateGet(this, _options3).queryRecordLimit.toString()
|
|
22991
22990
|
});
|
|
22992
22991
|
return await __privateGet(this, _rest01Client).GetEntities(resourceTestRunnerMetadata, getResourceEntityParams.toString(), (error) => {
|
|
22993
22992
|
stsutils.defaultLogger.error(`Rest01Client: GetEntities.Error(): [${error}]`);
|
|
@@ -22997,7 +22996,7 @@ ${newlined}
|
|
|
22997
22996
|
const resources = await this.GetResources();
|
|
22998
22997
|
const promArray = [];
|
|
22999
22998
|
const getResourceEntityParams = new URLSearchParams({
|
|
23000
|
-
limit:
|
|
22999
|
+
limit: __privateGet(this, _options3).queryRecordLimit.toString()
|
|
23001
23000
|
});
|
|
23002
23001
|
if (resources) {
|
|
23003
23002
|
resources.forEach((r) => {
|
|
@@ -23015,7 +23014,7 @@ ${newlined}
|
|
|
23015
23014
|
const promArray = [];
|
|
23016
23015
|
if (resources) {
|
|
23017
23016
|
resources.forEach((r) => {
|
|
23018
|
-
if (timeSinceEpochInSeconds - r.lastRefresh > __privateGet(this,
|
|
23017
|
+
if (timeSinceEpochInSeconds - r.lastRefresh > __privateGet(this, _options3).maxKeepAliveInSeconds) {
|
|
23019
23018
|
promArray.push(__privateGet(this, _rest01Client).DeleteResource(r, (error) => {
|
|
23020
23019
|
stsutils.defaultLogger.error(`Rest01Client: PurgeOldResources.Error(): [${error}]`);
|
|
23021
23020
|
}));
|
|
@@ -23041,7 +23040,7 @@ ${newlined}
|
|
|
23041
23040
|
agentManager: __privateGet(this, _agentManager)
|
|
23042
23041
|
}));
|
|
23043
23042
|
__privateSet(this, _rest01Client, new STSRest01Client({
|
|
23044
|
-
endpoint:
|
|
23043
|
+
endpoint: __privateGet(this, _options3).rest01EndPoint,
|
|
23045
23044
|
logger: stsutils.defaultLogger,
|
|
23046
23045
|
testingMode: false,
|
|
23047
23046
|
GetAccessToken: async () => {
|
|
@@ -23062,7 +23061,6 @@ ${newlined}
|
|
|
23062
23061
|
_accessToken2 = new WeakMap();
|
|
23063
23062
|
_agentManager = new WeakMap();
|
|
23064
23063
|
_authUtilsNode = new WeakMap();
|
|
23065
|
-
_MAX_KEEP_TIME_IN_SECONDS = new WeakMap();
|
|
23066
23064
|
_GetAccessToken = new WeakMap();
|
|
23067
23065
|
chalk$1.level = 3;
|
|
23068
23066
|
class WorkerInstance {
|
|
@@ -23254,7 +23252,7 @@ ${newlined}
|
|
|
23254
23252
|
__privateGet(this, _debug).call(this, `ProcessMessage::#workerId: [${__privateGet(this, _workerId)}]`);
|
|
23255
23253
|
__privateGet(this, _debug).call(this, `ProcessMessage::#options: [${JSON.stringify(__privateGet(this, _options4))}]`);
|
|
23256
23254
|
__privateSet(this, _rest01Client2, new Rest01Client({
|
|
23257
|
-
|
|
23255
|
+
...__privateGet(this, _options4).rest01ClientOptions
|
|
23258
23256
|
}));
|
|
23259
23257
|
break;
|
|
23260
23258
|
case eIWMessageCommands.AddRunner:
|
|
@@ -23466,7 +23464,7 @@ ${newlined}
|
|
|
23466
23464
|
const native = { randomUUID };
|
|
23467
23465
|
function v4(options, buf, offset) {
|
|
23468
23466
|
var _a;
|
|
23469
|
-
if (native.randomUUID &&
|
|
23467
|
+
if (native.randomUUID && true && !options) {
|
|
23470
23468
|
return native.randomUUID();
|
|
23471
23469
|
}
|
|
23472
23470
|
options = options || {};
|
|
@@ -23897,7 +23895,7 @@ ${newlined}
|
|
|
23897
23895
|
__privateSet(this, _STSInstrumentController, __privateGet(this, _options5).publishInstrumentController);
|
|
23898
23896
|
__privateSet(this, _telemetryProcessor, new TelemetryProcessor());
|
|
23899
23897
|
__privateSet(this, _rest01Client3, new Rest01Client({
|
|
23900
|
-
|
|
23898
|
+
...__privateGet(this, _options5).rest01ClientOptions
|
|
23901
23899
|
}));
|
|
23902
23900
|
}
|
|
23903
23901
|
get WorkersEx() {
|
|
@@ -23951,7 +23949,10 @@ ${newlined}
|
|
|
23951
23949
|
exports2.IRunnerState = IRunnerState;
|
|
23952
23950
|
exports2.IWorkerState = IWorkerState;
|
|
23953
23951
|
exports2.PublishMessageCommandsTestRunner = PublishMessageCommandsTestRunner;
|
|
23952
|
+
exports2.Rest01Client = Rest01Client;
|
|
23954
23953
|
exports2.STSWorkerManager = STSWorkerManager;
|
|
23954
|
+
exports2.STS_RF_RES_ENT_PREFIX = STS_RF_RES_ENT_PREFIX;
|
|
23955
|
+
exports2.STS_RF_RES_PREFIX = STS_RF_RES_PREFIX;
|
|
23955
23956
|
exports2.URI_BASE_VUEUTILS = URI_BASE_VUEUTILS;
|
|
23956
23957
|
exports2.WorkerInstance = WorkerInstance;
|
|
23957
23958
|
exports2.eIWMessageCommands = eIWMessageCommands;
|