@pulumi/artifactory 6.0.0 → 6.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/artifactory",
3
- "version": "v6.0.0",
3
+ "version": "v6.0.1",
4
4
  "description": "A Pulumi package for creating and managing artifactory cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
package/scopedToken.d.ts CHANGED
@@ -80,7 +80,10 @@ export declare class ScopedToken extends pulumi.CustomResource {
80
80
  */
81
81
  readonly accessToken: pulumi.Output<string>;
82
82
  /**
83
- * A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to total 255 characters. Default to '*@*' if not set. Service ID must begin with valid JFrog service type. Options: jfrt, jfxr, jfpip, jfds, jfmc, jfac, jfevt, jfmd, jfcon, or *. For instructions to retrieve the Artifactory Service ID see this [documentation](https://jfrog.com/help/r/jfrog-rest-apis/get-service-id)
83
+ * A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to
84
+ * total 255 characters. Default to '*@*' if not set. Service ID must begin with valid JFrog service type. Options: jfrt,
85
+ * jfxr, jfpip, jfds, jfmc, jfac, jfevt, jfmd, jfcon, or *. For instructions to retrieve the Artifactory Service ID see
86
+ * this [documentation](https://jfrog.com/help/r/jfrog-rest-apis/get-service-id)
84
87
  */
85
88
  readonly audiences: pulumi.Output<string[] | undefined>;
86
89
  /**
@@ -88,7 +91,14 @@ export declare class ScopedToken extends pulumi.CustomResource {
88
91
  */
89
92
  readonly description: pulumi.Output<string>;
90
93
  /**
91
- * The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is mandatory, what is the default expiry, and what is the maximum expiry allowed. Must be non-negative. Default value is based on configuration in 'access.config.yaml'. See [API documentation](https://jfrog.com/help/r/jfrog-rest-apis/create-token) for details. Access Token would not be saved by Artifactory if this is less than the persistence threshold value (default to 10800 seconds) set in Access configuration. See [official documentation](https://jfrog.com/help/r/jfrog-platform-administration-documentation/using-the-revocable-and-persistency-thresholds) for details.
94
+ * The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is
95
+ * mandatory, what is the default expiry, and what is the maximum expiry allowed. Must be non-negative. Default value is
96
+ * based on configuration in 'access.config.yaml'. See [API
97
+ * documentation](https://jfrog.com/help/r/jfrog-rest-apis/revoke-token-by-id) for details. Access Token would not be saved
98
+ * by Artifactory if this is less than the persistence threshold value (default to 10800 seconds) set in Access
99
+ * configuration. See [official
100
+ * documentation](https://jfrog.com/help/r/jfrog-platform-administration-documentation/using-the-revocable-and-persistency-thresholds)
101
+ * for details.
92
102
  */
93
103
  readonly expiresIn: pulumi.Output<number>;
94
104
  /**
@@ -96,11 +106,12 @@ export declare class ScopedToken extends pulumi.CustomResource {
96
106
  */
97
107
  readonly expiry: pulumi.Output<number>;
98
108
  /**
99
- * The grant type used to authenticate the request. In this case, the only value supported is `clientCredentials` which is also the default value if this parameter is not specified.
109
+ * The grant type used to authenticate the request. In this case, the only value supported is `client_credentials` which is
110
+ * also the default value if this parameter is not specified.
100
111
  */
101
112
  readonly grantType: pulumi.Output<string>;
102
113
  /**
103
- * Also create a reference token which can be used like an API key.
114
+ * Also create a reference token which can be used like an API key. Default is `false`.
104
115
  */
105
116
  readonly includeReferenceToken: pulumi.Output<boolean>;
106
117
  /**
@@ -128,8 +139,23 @@ export declare class ScopedToken extends pulumi.CustomResource {
128
139
  */
129
140
  readonly refreshable: pulumi.Output<boolean>;
130
141
  /**
131
- * The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can set any scope, while non-admin users can only set the scope to a subset of the groups to which they belong.
132
- * The supported scopes include:
142
+ * The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can
143
+ * set any scope, while non-admin users can only set the scope to a subset of the groups to which they belong. The
144
+ * supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
145
+ * will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
146
+ * grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
147
+ * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to inicate the
148
+ * group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
149
+ * livelogsrThe scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
150
+ * total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
151
+ * API. A permission can be represented as a scope token string in the following format:
152
+ * `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
153
+ * from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
154
+ * `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
155
+ * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are <r, w, d,
156
+ * a, m> or any combination of these actions .To allow all actions - use `*` Examples: `["applied-permissions/user",
157
+ * "artifact:generic-local:r"]` `["applied-permissions/group", "artifact:generic-local/path:*"]`
158
+ * `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
133
159
  */
134
160
  readonly scopes: pulumi.Output<string[]>;
135
161
  /**
@@ -141,7 +167,9 @@ export declare class ScopedToken extends pulumi.CustomResource {
141
167
  */
142
168
  readonly tokenType: pulumi.Output<string>;
143
169
  /**
144
- * The user name for which this token is created. The username is based on the authenticated user - either from the user of the authenticated token or based on the username (if basic auth was used). The username is then used to set the subject of the token: \n\n/users/\n\n. Limited to 255 characters.
170
+ * The user name for which this token is created. The username is based on the authenticated user - either from the user of
171
+ * the authenticated token or based on the username (if basic auth was used). The username is then used to set the subject
172
+ * of the token: <service-id>/users/<username>. Limited to 255 characters.
145
173
  */
146
174
  readonly username: pulumi.Output<string | undefined>;
147
175
  /**
@@ -162,7 +190,10 @@ export interface ScopedTokenState {
162
190
  */
163
191
  accessToken?: pulumi.Input<string>;
164
192
  /**
165
- * A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to total 255 characters. Default to '*@*' if not set. Service ID must begin with valid JFrog service type. Options: jfrt, jfxr, jfpip, jfds, jfmc, jfac, jfevt, jfmd, jfcon, or *. For instructions to retrieve the Artifactory Service ID see this [documentation](https://jfrog.com/help/r/jfrog-rest-apis/get-service-id)
193
+ * A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to
194
+ * total 255 characters. Default to '*@*' if not set. Service ID must begin with valid JFrog service type. Options: jfrt,
195
+ * jfxr, jfpip, jfds, jfmc, jfac, jfevt, jfmd, jfcon, or *. For instructions to retrieve the Artifactory Service ID see
196
+ * this [documentation](https://jfrog.com/help/r/jfrog-rest-apis/get-service-id)
166
197
  */
167
198
  audiences?: pulumi.Input<pulumi.Input<string>[]>;
168
199
  /**
@@ -170,7 +201,14 @@ export interface ScopedTokenState {
170
201
  */
171
202
  description?: pulumi.Input<string>;
172
203
  /**
173
- * The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is mandatory, what is the default expiry, and what is the maximum expiry allowed. Must be non-negative. Default value is based on configuration in 'access.config.yaml'. See [API documentation](https://jfrog.com/help/r/jfrog-rest-apis/create-token) for details. Access Token would not be saved by Artifactory if this is less than the persistence threshold value (default to 10800 seconds) set in Access configuration. See [official documentation](https://jfrog.com/help/r/jfrog-platform-administration-documentation/using-the-revocable-and-persistency-thresholds) for details.
204
+ * The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is
205
+ * mandatory, what is the default expiry, and what is the maximum expiry allowed. Must be non-negative. Default value is
206
+ * based on configuration in 'access.config.yaml'. See [API
207
+ * documentation](https://jfrog.com/help/r/jfrog-rest-apis/revoke-token-by-id) for details. Access Token would not be saved
208
+ * by Artifactory if this is less than the persistence threshold value (default to 10800 seconds) set in Access
209
+ * configuration. See [official
210
+ * documentation](https://jfrog.com/help/r/jfrog-platform-administration-documentation/using-the-revocable-and-persistency-thresholds)
211
+ * for details.
174
212
  */
175
213
  expiresIn?: pulumi.Input<number>;
176
214
  /**
@@ -178,11 +216,12 @@ export interface ScopedTokenState {
178
216
  */
179
217
  expiry?: pulumi.Input<number>;
180
218
  /**
181
- * The grant type used to authenticate the request. In this case, the only value supported is `clientCredentials` which is also the default value if this parameter is not specified.
219
+ * The grant type used to authenticate the request. In this case, the only value supported is `client_credentials` which is
220
+ * also the default value if this parameter is not specified.
182
221
  */
183
222
  grantType?: pulumi.Input<string>;
184
223
  /**
185
- * Also create a reference token which can be used like an API key.
224
+ * Also create a reference token which can be used like an API key. Default is `false`.
186
225
  */
187
226
  includeReferenceToken?: pulumi.Input<boolean>;
188
227
  /**
@@ -210,8 +249,23 @@ export interface ScopedTokenState {
210
249
  */
211
250
  refreshable?: pulumi.Input<boolean>;
212
251
  /**
213
- * The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can set any scope, while non-admin users can only set the scope to a subset of the groups to which they belong.
214
- * The supported scopes include:
252
+ * The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can
253
+ * set any scope, while non-admin users can only set the scope to a subset of the groups to which they belong. The
254
+ * supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
255
+ * will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
256
+ * grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
257
+ * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to inicate the
258
+ * group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
259
+ * livelogsrThe scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
260
+ * total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
261
+ * API. A permission can be represented as a scope token string in the following format:
262
+ * `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
263
+ * from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
264
+ * `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
265
+ * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are <r, w, d,
266
+ * a, m> or any combination of these actions .To allow all actions - use `*` Examples: `["applied-permissions/user",
267
+ * "artifact:generic-local:r"]` `["applied-permissions/group", "artifact:generic-local/path:*"]`
268
+ * `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
215
269
  */
216
270
  scopes?: pulumi.Input<pulumi.Input<string>[]>;
217
271
  /**
@@ -223,7 +277,9 @@ export interface ScopedTokenState {
223
277
  */
224
278
  tokenType?: pulumi.Input<string>;
225
279
  /**
226
- * The user name for which this token is created. The username is based on the authenticated user - either from the user of the authenticated token or based on the username (if basic auth was used). The username is then used to set the subject of the token: \n\n/users/\n\n. Limited to 255 characters.
280
+ * The user name for which this token is created. The username is based on the authenticated user - either from the user of
281
+ * the authenticated token or based on the username (if basic auth was used). The username is then used to set the subject
282
+ * of the token: <service-id>/users/<username>. Limited to 255 characters.
227
283
  */
228
284
  username?: pulumi.Input<string>;
229
285
  }
@@ -232,7 +288,10 @@ export interface ScopedTokenState {
232
288
  */
233
289
  export interface ScopedTokenArgs {
234
290
  /**
235
- * A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to total 255 characters. Default to '*@*' if not set. Service ID must begin with valid JFrog service type. Options: jfrt, jfxr, jfpip, jfds, jfmc, jfac, jfevt, jfmd, jfcon, or *. For instructions to retrieve the Artifactory Service ID see this [documentation](https://jfrog.com/help/r/jfrog-rest-apis/get-service-id)
291
+ * A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to
292
+ * total 255 characters. Default to '*@*' if not set. Service ID must begin with valid JFrog service type. Options: jfrt,
293
+ * jfxr, jfpip, jfds, jfmc, jfac, jfevt, jfmd, jfcon, or *. For instructions to retrieve the Artifactory Service ID see
294
+ * this [documentation](https://jfrog.com/help/r/jfrog-rest-apis/get-service-id)
236
295
  */
237
296
  audiences?: pulumi.Input<pulumi.Input<string>[]>;
238
297
  /**
@@ -240,15 +299,23 @@ export interface ScopedTokenArgs {
240
299
  */
241
300
  description?: pulumi.Input<string>;
242
301
  /**
243
- * The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is mandatory, what is the default expiry, and what is the maximum expiry allowed. Must be non-negative. Default value is based on configuration in 'access.config.yaml'. See [API documentation](https://jfrog.com/help/r/jfrog-rest-apis/create-token) for details. Access Token would not be saved by Artifactory if this is less than the persistence threshold value (default to 10800 seconds) set in Access configuration. See [official documentation](https://jfrog.com/help/r/jfrog-platform-administration-documentation/using-the-revocable-and-persistency-thresholds) for details.
302
+ * The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is
303
+ * mandatory, what is the default expiry, and what is the maximum expiry allowed. Must be non-negative. Default value is
304
+ * based on configuration in 'access.config.yaml'. See [API
305
+ * documentation](https://jfrog.com/help/r/jfrog-rest-apis/revoke-token-by-id) for details. Access Token would not be saved
306
+ * by Artifactory if this is less than the persistence threshold value (default to 10800 seconds) set in Access
307
+ * configuration. See [official
308
+ * documentation](https://jfrog.com/help/r/jfrog-platform-administration-documentation/using-the-revocable-and-persistency-thresholds)
309
+ * for details.
244
310
  */
245
311
  expiresIn?: pulumi.Input<number>;
246
312
  /**
247
- * The grant type used to authenticate the request. In this case, the only value supported is `clientCredentials` which is also the default value if this parameter is not specified.
313
+ * The grant type used to authenticate the request. In this case, the only value supported is `client_credentials` which is
314
+ * also the default value if this parameter is not specified.
248
315
  */
249
316
  grantType?: pulumi.Input<string>;
250
317
  /**
251
- * Also create a reference token which can be used like an API key.
318
+ * Also create a reference token which can be used like an API key. Default is `false`.
252
319
  */
253
320
  includeReferenceToken?: pulumi.Input<boolean>;
254
321
  /**
@@ -260,12 +327,29 @@ export interface ScopedTokenArgs {
260
327
  */
261
328
  refreshable?: pulumi.Input<boolean>;
262
329
  /**
263
- * The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can set any scope, while non-admin users can only set the scope to a subset of the groups to which they belong.
264
- * The supported scopes include:
330
+ * The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can
331
+ * set any scope, while non-admin users can only set the scope to a subset of the groups to which they belong. The
332
+ * supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
333
+ * will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
334
+ * grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
335
+ * `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to inicate the
336
+ * group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
337
+ * livelogsrThe scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
338
+ * total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
339
+ * API. A permission can be represented as a scope token string in the following format:
340
+ * `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
341
+ * from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
342
+ * `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
343
+ * can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are <r, w, d,
344
+ * a, m> or any combination of these actions .To allow all actions - use `*` Examples: `["applied-permissions/user",
345
+ * "artifact:generic-local:r"]` `["applied-permissions/group", "artifact:generic-local/path:*"]`
346
+ * `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
265
347
  */
266
348
  scopes?: pulumi.Input<pulumi.Input<string>[]>;
267
349
  /**
268
- * The user name for which this token is created. The username is based on the authenticated user - either from the user of the authenticated token or based on the username (if basic auth was used). The username is then used to set the subject of the token: \n\n/users/\n\n. Limited to 255 characters.
350
+ * The user name for which this token is created. The username is based on the authenticated user - either from the user of
351
+ * the authenticated token or based on the username (if basic auth was used). The username is then used to set the subject
352
+ * of the token: <service-id>/users/<username>. Limited to 255 characters.
269
353
  */
270
354
  username?: pulumi.Input<string>;
271
355
  }
@@ -1 +1 @@
1
- {"version":3,"file":"scopedToken.js","sourceRoot":"","sources":["../scopedToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IAgFD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACrD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,EAAE,gBAAgB,EAAE,cAAc,CAAC,EAAE,CAAC;QAClG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AAxJL,kCAyJC;AA3IG,gBAAgB;AACO,wBAAY,GAAG,2CAA2C,CAAC"}
1
+ {"version":3,"file":"scopedToken.js","sourceRoot":"","sources":["../scopedToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA4GD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACrD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,EAAE,gBAAgB,EAAE,cAAc,CAAC,EAAE,CAAC;QAClG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AApLL,kCAqLC;AAvKG,gBAAgB;AACO,wBAAY,GAAG,2CAA2C,CAAC"}