@tailor-platform/sdk 0.23.1 → 0.23.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +14 -0
- package/dist/cli/index.mjs +1 -1
- package/dist/cli/lib.d.mts +1 -1
- package/dist/cli/lib.mjs +1 -1
- package/dist/configure/index.d.mts +2 -2
- package/dist/{index-BQiLyB2M.d.mts → index-CANeLBB6.d.mts} +2 -2
- package/dist/{list-CW_wMSAo.mjs → list-BvYJeydE.mjs} +33 -31
- package/dist/{list-CW_wMSAo.mjs.map → list-BvYJeydE.mjs.map} +1 -1
- package/dist/{types-DggA2jOF.d.mts → types-CgO-wV9v.d.mts} +9 -9
- package/dist/utils/test/index.d.mts +2 -2
- package/package.json +1 -1
package/CHANGELOG.md
CHANGED
|
@@ -1,5 +1,19 @@
|
|
|
1
1
|
# @tailor-platform/sdk
|
|
2
2
|
|
|
3
|
+
## 0.23.2
|
|
4
|
+
|
|
5
|
+
### Patch Changes
|
|
6
|
+
|
|
7
|
+
- [#296](https://github.com/tailor-platform/sdk/pull/296) [`adb9a9d`](https://github.com/tailor-platform/sdk/commit/adb9a9d5d6dad4b961fb8dd448ea2b08d610fc5b) Thanks [@toiroakr](https://github.com/toiroakr)! - Fix service deletion order to prevent "used by gateway(s)" error
|
|
8
|
+
|
|
9
|
+
When deleting subgraph services (TailorDB, Pipeline, Auth, IdP), the deletion would fail with an error like "Failed to delete AuthService: auth xxx is used by gateway(s)" because the Application was still referencing them.
|
|
10
|
+
|
|
11
|
+
This fix separates the deletion phases:
|
|
12
|
+
- `delete-resources`: Deletes resources (types, resolvers, clients, etc.) before Application update
|
|
13
|
+
- `delete-services`: Deletes services after Application is deleted
|
|
14
|
+
|
|
15
|
+
This ensures services are deleted only after the Application no longer references them.
|
|
16
|
+
|
|
3
17
|
## 0.23.1
|
|
4
18
|
|
|
5
19
|
### Patch Changes
|
package/dist/cli/index.mjs
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
2
|
import "../chunk-DhYkiPYI.mjs";
|
|
3
3
|
import "../config-CtRi0Lgg.mjs";
|
|
4
|
-
import { $ as jsonArgs, A as printData, B as loadAccessToken, D as tokenCommand, G as fetchUserInfo, H as readPlatformConfig, I as loadConfig, J as readPackageJson, K as initOAuth2Client, M as generateCommand, O as listCommand$5, P as applyCommand, Q as deploymentArgs, R as apiCommand, S as listCommand$6, U as writePlatformConfig, V as loadWorkspaceId, W as fetchAll, X as commonArgs, Y as PATScope, Z as confirmationArgs, a as createCommand$3, d as listCommand$7, et as withCommonArgs, h as executionsCommand, l as startCommand, nt as logger, p as getCommand$2, q as initOperatorClient, r as deleteCommand$3, s as resumeCommand, t as listCommand$8, tt as workspaceArgs, w as getCommand$1, x as removeCommand, y as showCommand, z as fetchLatestToken } from "../list-
|
|
4
|
+
import { $ as jsonArgs, A as printData, B as loadAccessToken, D as tokenCommand, G as fetchUserInfo, H as readPlatformConfig, I as loadConfig, J as readPackageJson, K as initOAuth2Client, M as generateCommand, O as listCommand$5, P as applyCommand, Q as deploymentArgs, R as apiCommand, S as listCommand$6, U as writePlatformConfig, V as loadWorkspaceId, W as fetchAll, X as commonArgs, Y as PATScope, Z as confirmationArgs, a as createCommand$3, d as listCommand$7, et as withCommonArgs, h as executionsCommand, l as startCommand, nt as logger, p as getCommand$2, q as initOperatorClient, r as deleteCommand$3, s as resumeCommand, t as listCommand$8, tt as workspaceArgs, w as getCommand$1, x as removeCommand, y as showCommand, z as fetchLatestToken } from "../list-BvYJeydE.mjs";
|
|
5
5
|
import { register } from "node:module";
|
|
6
6
|
import { defineCommand, runCommand, runMain } from "citty";
|
|
7
7
|
import { generateCodeVerifier } from "@badgateway/oauth2-client";
|
package/dist/cli/lib.d.mts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/// <reference path="./../user-defined.d.ts" />
|
|
2
|
-
import { J as IdProviderConfig, P as ParsedTailorDBType, X as OAuth2ClientInput, _t as Resolver, d as AppConfig, h as Generator, m as CodeGeneratorBase, t as Executor } from "../types-
|
|
2
|
+
import { J as IdProviderConfig, P as ParsedTailorDBType, X as OAuth2ClientInput, _t as Resolver, d as AppConfig, h as Generator, m as CodeGeneratorBase, t as Executor } from "../types-CgO-wV9v.mjs";
|
|
3
3
|
import "citty";
|
|
4
4
|
import { z } from "zod";
|
|
5
5
|
import { OAuth2Client } from "@badgateway/oauth2-client";
|
package/dist/cli/lib.mjs
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import "../chunk-DhYkiPYI.mjs";
|
|
2
2
|
import "../config-CtRi0Lgg.mjs";
|
|
3
|
-
import { B as loadAccessToken, C as listOAuth2Clients, E as getMachineUserToken, F as generateUserTypes, I as loadConfig, L as apiCall, N as apply, T as getOAuth2Client, V as loadWorkspaceId, _ as listWorkflowExecutions, b as remove, c as resumeWorkflow, f as listWorkflows, g as getWorkflowExecution, i as deleteWorkspace, j as generate, k as listMachineUsers, m as getWorkflow, n as listWorkspaces, o as createWorkspace, u as startWorkflow, v as show } from "../list-
|
|
3
|
+
import { B as loadAccessToken, C as listOAuth2Clients, E as getMachineUserToken, F as generateUserTypes, I as loadConfig, L as apiCall, N as apply, T as getOAuth2Client, V as loadWorkspaceId, _ as listWorkflowExecutions, b as remove, c as resumeWorkflow, f as listWorkflows, g as getWorkflowExecution, i as deleteWorkspace, j as generate, k as listMachineUsers, m as getWorkflow, n as listWorkspaces, o as createWorkspace, u as startWorkflow, v as show } from "../list-BvYJeydE.mjs";
|
|
4
4
|
import { register } from "node:module";
|
|
5
5
|
|
|
6
6
|
//#region src/cli/lib.ts
|
|
@@ -1,4 +1,4 @@
|
|
|
1
1
|
/// <reference path="./../user-defined.d.ts" />
|
|
2
|
-
import { $ as SCIMAttribute, A as TailorDBType, B as AuthConfig, C as ResolverExternalConfig, D as ExecutorServiceInput, E as ExecutorServiceConfig, F as PermissionCondition, G as AuthServiceInput, H as AuthInvoker, I as TailorTypeGqlPermission, J as IdProviderConfig, K as BuiltinIdP, L as TailorTypePermission, O as TailorDBField, Q as SAML, R as unsafeAllowAllGqlPermission, S as defineIdp, T as ResolverServiceInput, U as AuthOwnConfig, V as AuthExternalConfig, W as defineAuth, X as OAuth2ClientInput, Y as OAuth2ClientGrantType, Z as OIDC, _ as WorkflowServiceInput, _t as Resolver, at as TenantProviderConfig, b as IdPConfig, ct as UserAttributeMap, dt as AttributeList, et as SCIMAttributeMapping, f as defineConfig, ft as AttributeMap, g as WorkflowServiceConfig, gt as QueryType, ht as TailorField, it as SCIMResource, j as db, k as TailorDBInstance, lt as UsernameFieldKey, mt as unauthenticatedTailorUser, nt as SCIMAuthorization, ot as UserAttributeKey, p as defineGenerators, pt as TailorUser, q as IDToken, rt as SCIMConfig, st as UserAttributeListKey, tt as SCIMAttributeType, ut as ValueOperand, v as StaticWebsiteConfig, w as ResolverServiceConfig, x as IdPExternalConfig, y as defineStaticWebSite, z as unsafeAllowAllTypePermission } from "../types-
|
|
3
|
-
import { A as WORKFLOW_JOB_BRAND, C as GqlOperation, D as Workflow, E as WorkflowOperation, F as createWorkflowJob, I as createResolver, L as Env, M as WorkflowJobContext, N as WorkflowJobInput, O as WorkflowConfig, P as WorkflowJobOutput, S as FunctionOperation, T as WebhookOperation, _ as ResolverExecutedTrigger, a as Trigger, b as recordUpdatedTrigger, c as IncomingWebhookTrigger, d as scheduleTrigger, f as RecordCreatedArgs, g as ResolverExecutedArgs, h as RecordUpdatedArgs, i as createExecutor, j as WorkflowJob, k as createWorkflow, l as incomingWebhookTrigger, m as RecordTrigger, n as output, o as IncomingWebhookArgs, p as RecordDeletedArgs, r as t, s as IncomingWebhookRequest, t as infer, u as ScheduleTrigger, v as recordCreatedTrigger, w as Operation, x as resolverExecutedTrigger, y as recordDeletedTrigger } from "../index-
|
|
2
|
+
import { $ as SCIMAttribute, A as TailorDBType, B as AuthConfig, C as ResolverExternalConfig, D as ExecutorServiceInput, E as ExecutorServiceConfig, F as PermissionCondition, G as AuthServiceInput, H as AuthInvoker, I as TailorTypeGqlPermission, J as IdProviderConfig, K as BuiltinIdP, L as TailorTypePermission, O as TailorDBField, Q as SAML, R as unsafeAllowAllGqlPermission, S as defineIdp, T as ResolverServiceInput, U as AuthOwnConfig, V as AuthExternalConfig, W as defineAuth, X as OAuth2ClientInput, Y as OAuth2ClientGrantType, Z as OIDC, _ as WorkflowServiceInput, _t as Resolver, at as TenantProviderConfig, b as IdPConfig, ct as UserAttributeMap, dt as AttributeList, et as SCIMAttributeMapping, f as defineConfig, ft as AttributeMap, g as WorkflowServiceConfig, gt as QueryType, ht as TailorField, it as SCIMResource, j as db, k as TailorDBInstance, lt as UsernameFieldKey, mt as unauthenticatedTailorUser, nt as SCIMAuthorization, ot as UserAttributeKey, p as defineGenerators, pt as TailorUser, q as IDToken, rt as SCIMConfig, st as UserAttributeListKey, tt as SCIMAttributeType, ut as ValueOperand, v as StaticWebsiteConfig, w as ResolverServiceConfig, x as IdPExternalConfig, y as defineStaticWebSite, z as unsafeAllowAllTypePermission } from "../types-CgO-wV9v.mjs";
|
|
3
|
+
import { A as WORKFLOW_JOB_BRAND, C as GqlOperation, D as Workflow, E as WorkflowOperation, F as createWorkflowJob, I as createResolver, L as Env, M as WorkflowJobContext, N as WorkflowJobInput, O as WorkflowConfig, P as WorkflowJobOutput, S as FunctionOperation, T as WebhookOperation, _ as ResolverExecutedTrigger, a as Trigger, b as recordUpdatedTrigger, c as IncomingWebhookTrigger, d as scheduleTrigger, f as RecordCreatedArgs, g as ResolverExecutedArgs, h as RecordUpdatedArgs, i as createExecutor, j as WorkflowJob, k as createWorkflow, l as incomingWebhookTrigger, m as RecordTrigger, n as output, o as IncomingWebhookArgs, p as RecordDeletedArgs, r as t, s as IncomingWebhookRequest, t as infer, u as ScheduleTrigger, v as recordCreatedTrigger, w as Operation, x as resolverExecutedTrigger, y as recordDeletedTrigger } from "../index-CANeLBB6.mjs";
|
|
4
4
|
export { AttributeList, AttributeMap, AuthConfig, AuthExternalConfig, AuthInvoker, AuthOwnConfig, AuthServiceInput, BuiltinIdP, Env, ExecutorServiceConfig, ExecutorServiceInput, FunctionOperation, GqlOperation, IDToken, IdPConfig, IdPExternalConfig, IdProviderConfig, IncomingWebhookArgs, IncomingWebhookRequest, IncomingWebhookTrigger, OAuth2ClientInput as OAuth2Client, OAuth2ClientGrantType, OIDC, Operation, PermissionCondition, QueryType, RecordCreatedArgs, RecordDeletedArgs, RecordTrigger, RecordUpdatedArgs, Resolver, ResolverExecutedArgs, ResolverExecutedTrigger, ResolverExternalConfig, ResolverServiceConfig, ResolverServiceInput, SAML, SCIMAttribute, SCIMAttributeMapping, SCIMAttributeType, SCIMAuthorization, SCIMConfig, SCIMResource, ScheduleTrigger, StaticWebsiteConfig, TailorDBField, TailorDBInstance, TailorDBType, TailorField, TailorTypeGqlPermission, TailorTypePermission, TailorUser, TenantProviderConfig, Trigger, UserAttributeKey, UserAttributeListKey, UserAttributeMap, UsernameFieldKey, ValueOperand, WORKFLOW_JOB_BRAND, WebhookOperation, Workflow, WorkflowConfig, WorkflowJob, WorkflowJobContext, WorkflowJobInput, WorkflowJobOutput, WorkflowOperation, WorkflowServiceConfig, WorkflowServiceInput, createExecutor, createResolver, createWorkflow, createWorkflowJob, db, defineAuth, defineConfig, defineGenerators, defineIdp, defineStaticWebSite, incomingWebhookTrigger, infer, output, recordCreatedTrigger, recordDeletedTrigger, recordUpdatedTrigger, resolverExecutedTrigger, scheduleTrigger, t, unauthenticatedTailorUser, unsafeAllowAllGqlPermission, unsafeAllowAllTypePermission };
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/// <reference path="./user-defined.d.ts" />
|
|
2
|
-
import { A as TailorDBType, Ct as InferFieldsOutput, H as AuthInvoker, M as AllowedValues, N as AllowedValuesOutput, St as FieldOutput, Tt as output$1, a as IncomingWebhookTrigger$1, bt as FieldMetadata, c as ScheduleTriggerInput, ht as TailorField, i as GqlOperation$1, l as WebhookOperation$1, n as ExecutorInput, o as RecordTrigger$1, pt as TailorUser, r as FunctionOperation$1, s as ResolverExecutedTrigger$1, u as WorkflowOperation$1, vt as ResolverInput, wt as JsonCompatible, xt as FieldOptions, yt as ArrayFieldOutput } from "./types-
|
|
2
|
+
import { A as TailorDBType, Ct as InferFieldsOutput, H as AuthInvoker, M as AllowedValues, N as AllowedValuesOutput, St as FieldOutput, Tt as output$1, a as IncomingWebhookTrigger$1, bt as FieldMetadata, c as ScheduleTriggerInput, ht as TailorField, i as GqlOperation$1, l as WebhookOperation$1, n as ExecutorInput, o as RecordTrigger$1, pt as TailorUser, r as FunctionOperation$1, s as ResolverExecutedTrigger$1, u as WorkflowOperation$1, vt as ResolverInput, wt as JsonCompatible, xt as FieldOptions, yt as ArrayFieldOutput } from "./types-CgO-wV9v.mjs";
|
|
3
3
|
import { EmptyObject, JsonPrimitive, Jsonifiable, Jsonify } from "type-fest";
|
|
4
4
|
import { Client } from "@urql/core";
|
|
5
5
|
import { StandardCRON } from "ts-cron-validator";
|
|
@@ -355,4 +355,4 @@ declare namespace t {
|
|
|
355
355
|
}
|
|
356
356
|
//#endregion
|
|
357
357
|
export { WORKFLOW_JOB_BRAND as A, GqlOperation as C, Workflow as D, WorkflowOperation as E, createWorkflowJob as F, createResolver as I, Env as L, WorkflowJobContext as M, WorkflowJobInput as N, WorkflowConfig as O, WorkflowJobOutput as P, FunctionOperation as S, WebhookOperation as T, ResolverExecutedTrigger as _, Trigger as a, recordUpdatedTrigger as b, IncomingWebhookTrigger as c, scheduleTrigger as d, RecordCreatedArgs as f, ResolverExecutedArgs as g, RecordUpdatedArgs as h, createExecutor as i, WorkflowJob as j, createWorkflow as k, incomingWebhookTrigger as l, RecordTrigger as m, output as n, IncomingWebhookArgs as o, RecordDeletedArgs as p, t as r, IncomingWebhookRequest as s, infer as t, ScheduleTrigger as u, recordCreatedTrigger as v, Operation as w, resolverExecutedTrigger as x, recordDeletedTrigger as y };
|
|
358
|
-
//# sourceMappingURL=index-
|
|
358
|
+
//# sourceMappingURL=index-CANeLBB6.d.mts.map
|
|
@@ -100949,17 +100949,15 @@ async function applyIdP(client, result, phase = "create-update") {
|
|
|
100949
100949
|
secretmanagerSecretValue: update.clientSecret
|
|
100950
100950
|
});
|
|
100951
100951
|
})]);
|
|
100952
|
-
} else if (phase === "delete") {
|
|
100953
|
-
await
|
|
100954
|
-
|
|
100955
|
-
|
|
100956
|
-
|
|
100957
|
-
|
|
100958
|
-
|
|
100959
|
-
|
|
100960
|
-
|
|
100961
|
-
await Promise.all(changeSet.service.deletes.map((del) => client.deleteIdPService(del.request)));
|
|
100962
|
-
}
|
|
100952
|
+
} else if (phase === "delete-resources") await Promise.all(changeSet.client.deletes.map(async (del) => {
|
|
100953
|
+
await client.deleteIdPClient(del.request);
|
|
100954
|
+
const vaultName = `idp-${del.request.namespaceName}-${del.request.name}`;
|
|
100955
|
+
await client.deleteSecretManagerVault({
|
|
100956
|
+
workspaceId: del.request.workspaceId,
|
|
100957
|
+
secretmanagerVaultName: vaultName
|
|
100958
|
+
});
|
|
100959
|
+
}));
|
|
100960
|
+
else if (phase === "delete-services") await Promise.all(changeSet.service.deletes.map((del) => client.deleteIdPService(del.request)));
|
|
100963
100961
|
}
|
|
100964
100962
|
async function planIdP({ client, workspaceId, application, forRemoval }) {
|
|
100965
100963
|
const idps = forRemoval ? [] : application.idpServices;
|
|
@@ -101175,7 +101173,7 @@ async function applyAuth(client, result, phase = "create-update") {
|
|
|
101175
101173
|
})]);
|
|
101176
101174
|
await Promise.all([...changeSet.scim.creates.map((create$1) => client.createAuthSCIMConfig(create$1.request)), ...changeSet.scim.updates.map((update) => client.updateAuthSCIMConfig(update.request))]);
|
|
101177
101175
|
await Promise.all([...changeSet.scimResource.creates.map((create$1) => client.createAuthSCIMResource(create$1.request)), ...changeSet.scimResource.updates.map((update) => client.updateAuthSCIMResource(update.request))]);
|
|
101178
|
-
} else if (phase === "delete") {
|
|
101176
|
+
} else if (phase === "delete-resources") {
|
|
101179
101177
|
await Promise.all(changeSet.scimResource.deletes.map((del) => client.deleteAuthSCIMResource(del.request)));
|
|
101180
101178
|
await Promise.all(changeSet.scim.deletes.map((del) => client.deleteAuthSCIMConfig(del.request)));
|
|
101181
101179
|
await Promise.all(changeSet.oauth2Client.deletes.map((del) => client.deleteAuthOAuth2Client(del.request)));
|
|
@@ -101183,8 +101181,7 @@ async function applyAuth(client, result, phase = "create-update") {
|
|
|
101183
101181
|
await Promise.all(changeSet.tenantConfig.deletes.map((del) => client.deleteTenantConfig(del.request)));
|
|
101184
101182
|
await Promise.all(changeSet.userProfileConfig.deletes.map((del) => client.deleteUserProfileConfig(del.request)));
|
|
101185
101183
|
await Promise.all(changeSet.idpConfig.deletes.map((del) => client.deleteAuthIDPConfig(del.request)));
|
|
101186
|
-
|
|
101187
|
-
}
|
|
101184
|
+
} else if (phase === "delete-services") await Promise.all(changeSet.service.deletes.map((del) => client.deleteAuthService(del.request)));
|
|
101188
101185
|
}
|
|
101189
101186
|
async function planAuth({ client, workspaceId, application, forRemoval }) {
|
|
101190
101187
|
const auths = [];
|
|
@@ -102330,10 +102327,8 @@ async function applyPipeline(client, result, phase = "create-update") {
|
|
|
102330
102327
|
await client.setMetadata(update.metaRequest);
|
|
102331
102328
|
})]);
|
|
102332
102329
|
await Promise.all([...changeSet.resolver.creates.map((create$1) => client.createPipelineResolver(create$1.request)), ...changeSet.resolver.updates.map((update) => client.updatePipelineResolver(update.request))]);
|
|
102333
|
-
} else if (phase === "delete")
|
|
102334
|
-
|
|
102335
|
-
await Promise.all(changeSet.service.deletes.map((del) => client.deletePipelineService(del.request)));
|
|
102336
|
-
}
|
|
102330
|
+
} else if (phase === "delete-resources") await Promise.all(changeSet.resolver.deletes.map((del) => client.deletePipelineResolver(del.request)));
|
|
102331
|
+
else if (phase === "delete-services") await Promise.all(changeSet.service.deletes.map((del) => client.deletePipelineService(del.request)));
|
|
102337
102332
|
}
|
|
102338
102333
|
async function planPipeline({ client, workspaceId, application, forRemoval }) {
|
|
102339
102334
|
const pipelines = [];
|
|
@@ -102681,11 +102676,10 @@ async function applyTailorDB(client, result, phase = "create-update") {
|
|
|
102681
102676
|
}), ...changeSet.service.updates.map((update) => client.setMetadata(update.metaRequest))]);
|
|
102682
102677
|
await Promise.all([...changeSet.type.creates.map((create$1) => client.createTailorDBType(create$1.request)), ...changeSet.type.updates.map((update) => client.updateTailorDBType(update.request))]);
|
|
102683
102678
|
await Promise.all([...changeSet.gqlPermission.creates.map((create$1) => client.createTailorDBGQLPermission(create$1.request)), ...changeSet.gqlPermission.updates.map((update) => client.updateTailorDBGQLPermission(update.request))]);
|
|
102684
|
-
} else if (phase === "delete") {
|
|
102679
|
+
} else if (phase === "delete-resources") {
|
|
102685
102680
|
await Promise.all(changeSet.gqlPermission.deletes.map((del) => client.deleteTailorDBGQLPermission(del.request)));
|
|
102686
102681
|
await Promise.all(changeSet.type.deletes.map((del) => client.deleteTailorDBType(del.request)));
|
|
102687
|
-
|
|
102688
|
-
}
|
|
102682
|
+
} else if (phase === "delete-services") await Promise.all(changeSet.service.deletes.map((del) => client.deleteTailorDBService(del.request)));
|
|
102689
102683
|
}
|
|
102690
102684
|
async function planTailorDB({ client, workspaceId, application, forRemoval }) {
|
|
102691
102685
|
const tailordbs = [];
|
|
@@ -103484,10 +103478,10 @@ async function apply(options) {
|
|
|
103484
103478
|
await applyIdP(client, idp, "create-update");
|
|
103485
103479
|
await applyAuth(client, auth, "create-update");
|
|
103486
103480
|
await applyPipeline(client, pipeline, "create-update");
|
|
103487
|
-
await applyPipeline(client, pipeline, "delete");
|
|
103488
|
-
await applyAuth(client, auth, "delete");
|
|
103489
|
-
await applyIdP(client, idp, "delete");
|
|
103490
|
-
await applyTailorDB(client, tailorDB, "delete");
|
|
103481
|
+
await applyPipeline(client, pipeline, "delete-resources");
|
|
103482
|
+
await applyAuth(client, auth, "delete-resources");
|
|
103483
|
+
await applyIdP(client, idp, "delete-resources");
|
|
103484
|
+
await applyTailorDB(client, tailorDB, "delete-resources");
|
|
103491
103485
|
await applyApplication(client, app, "create-update");
|
|
103492
103486
|
await applyExecutor(client, executor, "create-update");
|
|
103493
103487
|
await applyWorkflow(client, workflow, "create-update");
|
|
@@ -103495,6 +103489,10 @@ async function apply(options) {
|
|
|
103495
103489
|
await applyExecutor(client, executor, "delete");
|
|
103496
103490
|
await applyStaticWebsite(client, staticWebsite, "delete");
|
|
103497
103491
|
await applyApplication(client, app, "delete");
|
|
103492
|
+
await applyPipeline(client, pipeline, "delete-services");
|
|
103493
|
+
await applyAuth(client, auth, "delete-services");
|
|
103494
|
+
await applyIdP(client, idp, "delete-services");
|
|
103495
|
+
await applyTailorDB(client, tailorDB, "delete-services");
|
|
103498
103496
|
logger.success("Successfully applied changes.");
|
|
103499
103497
|
}
|
|
103500
103498
|
async function buildPipeline(namespace, config, triggerContext) {
|
|
@@ -104591,12 +104589,16 @@ async function execRemove(client, workspaceId, application, confirm) {
|
|
|
104591
104589
|
if (confirm) await confirm();
|
|
104592
104590
|
await applyWorkflow(client, workflow, "delete");
|
|
104593
104591
|
await applyExecutor(client, executor, "delete");
|
|
104594
|
-
await applyApplication(client, app, "delete");
|
|
104595
|
-
await applyPipeline(client, pipeline, "delete");
|
|
104596
|
-
await applyAuth(client, auth, "delete");
|
|
104597
|
-
await applyIdP(client, idp, "delete");
|
|
104598
104592
|
await applyStaticWebsite(client, staticWebsite, "delete");
|
|
104599
|
-
await
|
|
104593
|
+
await applyApplication(client, app, "delete");
|
|
104594
|
+
await applyPipeline(client, pipeline, "delete-resources");
|
|
104595
|
+
await applyPipeline(client, pipeline, "delete-services");
|
|
104596
|
+
await applyAuth(client, auth, "delete-resources");
|
|
104597
|
+
await applyAuth(client, auth, "delete-services");
|
|
104598
|
+
await applyIdP(client, idp, "delete-resources");
|
|
104599
|
+
await applyIdP(client, idp, "delete-services");
|
|
104600
|
+
await applyTailorDB(client, tailorDB, "delete-resources");
|
|
104601
|
+
await applyTailorDB(client, tailorDB, "delete-services");
|
|
104600
104602
|
}
|
|
104601
104603
|
async function remove(options) {
|
|
104602
104604
|
const { client, workspaceId, application } = await loadOptions$1(options);
|
|
@@ -105600,4 +105602,4 @@ const listCommand = defineCommand({
|
|
|
105600
105602
|
|
|
105601
105603
|
//#endregion
|
|
105602
105604
|
export { jsonArgs as $, printData as A, loadAccessToken as B, listOAuth2Clients as C, tokenCommand as D, getMachineUserToken as E, generateUserTypes as F, fetchUserInfo as G, readPlatformConfig as H, loadConfig as I, readPackageJson as J, initOAuth2Client as K, apiCall as L, generateCommand as M, apply as N, listCommand$3 as O, applyCommand as P, deploymentArgs as Q, apiCommand as R, listCommand$2 as S, getOAuth2Client as T, writePlatformConfig as U, loadWorkspaceId as V, fetchAll as W, commonArgs as X, PATScope as Y, confirmationArgs as Z, listWorkflowExecutions as _, createCommand as a, remove as b, resumeWorkflow as c, listCommand$1 as d, withCommonArgs as et, listWorkflows as f, getWorkflowExecution as g, executionsCommand as h, deleteWorkspace as i, generate as j, listMachineUsers as k, startCommand as l, getWorkflow as m, listWorkspaces as n, logger as nt, createWorkspace as o, getCommand as p, initOperatorClient as q, deleteCommand as r, resumeCommand as s, listCommand as t, workspaceArgs as tt, startWorkflow as u, show as v, getCommand$1 as w, removeCommand as x, showCommand as y, fetchLatestToken as z };
|
|
105603
|
-
//# sourceMappingURL=list-
|
|
105605
|
+
//# sourceMappingURL=list-BvYJeydE.mjs.map
|