@tailor-platform/sdk 1.17.0 → 1.17.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +8 -0
- package/dist/{application-DYfVZVPT.mjs → application-BMDE8KqK.mjs} +92 -36
- package/dist/application-BMDE8KqK.mjs.map +1 -0
- package/dist/{application-D5ZEr4zk.mjs → application-Dni_W16P.mjs} +1 -1
- package/dist/cli/index.mjs +2 -2
- package/dist/cli/lib.d.mts +13 -3
- package/dist/cli/lib.mjs +2 -2
- package/dist/configure/index.d.mts +3 -3
- package/dist/{index-qQXpN674.d.mts → index-CVcYqZSf.d.mts} +4 -3
- package/dist/plugin/index.d.mts +1 -1
- package/dist/{types-DzvazVmg.d.mts → types-CZZBCaxB.d.mts} +7 -7
- package/dist/{types-BeNtD-fA.d.mts → types-DthzUFfx.d.mts} +5 -2
- package/dist/{update-DQKCUNmr.mjs → update-CUBVjZbL.mjs} +20 -18
- package/dist/update-CUBVjZbL.mjs.map +1 -0
- package/dist/utils/test/index.d.mts +3 -3
- package/package.json +1 -1
- package/dist/application-DYfVZVPT.mjs.map +0 -1
- package/dist/update-DQKCUNmr.mjs.map +0 -1
|
@@ -1,4 +1,4 @@
|
|
|
1
1
|
import "./chunk-GMkBE123.mjs";
|
|
2
|
-
import { n as generatePluginFilesIfNeeded, r as loadApplication, t as defineApplication } from "./application-
|
|
2
|
+
import { n as generatePluginFilesIfNeeded, r as loadApplication, t as defineApplication } from "./application-BMDE8KqK.mjs";
|
|
3
3
|
|
|
4
4
|
export { defineApplication };
|
package/dist/cli/index.mjs
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
2
|
import "../chunk-GMkBE123.mjs";
|
|
3
3
|
import "../schema-R5TxC5Pn.mjs";
|
|
4
|
-
import { $ as jobsCommand, A as generateCommand, Bt as getNamespacesWithMigrations, C as resumeCommand, F as removeCommand$1, Ft as loadDiff, G as generateCommand$1, Gt as commonArgs, H as listCommand$6, I as listCommand$7, J as triggerCommand, Jt as jsonArgs, Kt as confirmationArgs, Mt as getMigrationFiles, N as showCommand, O as truncateCommand, Ot as formatMigrationNumber, Pt as isValidMigrationNumber, R as getCommand$2, S as healthCommand, T as listCommand$8, V as tokenCommand, Vt as trnPrefix, Wt as apiCommand, X as listCommand$5, Xt as workspaceArgs, Yt as withCommonArgs, _ as createCommand$3, a as listCommand$10, b as listCommand$9, d as listCommand$11, dt as getCommand$1, h as deleteCommand$3, it as getCommand$3, j as logBetaWarning, jt as getMigrationFilePath, l as restoreCommand, lt as functionExecutionStatusToString, mt as applyCommand, nt as startCommand, ot as executionsCommand, p as getCommand$4, q as webhookCommand, qt as deploymentArgs, r as removeCommand, s as inviteCommand, t as updateCommand$2, ut as formatKeyValueTable, vt as parseMigrationLabelNumber } from "../update-
|
|
5
|
-
import { E as readPackageJson, S as initOperatorClient, Z as PATScope, _ as writePlatformConfig, b as fetchUserInfo, ct as styles, d as fetchLatestToken, f as loadAccessToken, g as readPlatformConfig, h as loadWorkspaceId, i as loadConfig, st as logger, v as fetchAll, x as initOAuth2Client, z as FunctionExecution_Type } from "../application-
|
|
4
|
+
import { $ as jobsCommand, A as generateCommand, Bt as getNamespacesWithMigrations, C as resumeCommand, F as removeCommand$1, Ft as loadDiff, G as generateCommand$1, Gt as commonArgs, H as listCommand$6, I as listCommand$7, J as triggerCommand, Jt as jsonArgs, Kt as confirmationArgs, Mt as getMigrationFiles, N as showCommand, O as truncateCommand, Ot as formatMigrationNumber, Pt as isValidMigrationNumber, R as getCommand$2, S as healthCommand, T as listCommand$8, V as tokenCommand, Vt as trnPrefix, Wt as apiCommand, X as listCommand$5, Xt as workspaceArgs, Yt as withCommonArgs, _ as createCommand$3, a as listCommand$10, b as listCommand$9, d as listCommand$11, dt as getCommand$1, h as deleteCommand$3, it as getCommand$3, j as logBetaWarning, jt as getMigrationFilePath, l as restoreCommand, lt as functionExecutionStatusToString, mt as applyCommand, nt as startCommand, ot as executionsCommand, p as getCommand$4, q as webhookCommand, qt as deploymentArgs, r as removeCommand, s as inviteCommand, t as updateCommand$2, ut as formatKeyValueTable, vt as parseMigrationLabelNumber } from "../update-CUBVjZbL.mjs";
|
|
5
|
+
import { E as readPackageJson, S as initOperatorClient, Z as PATScope, _ as writePlatformConfig, b as fetchUserInfo, ct as styles, d as fetchLatestToken, f as loadAccessToken, g as readPlatformConfig, h as loadWorkspaceId, i as loadConfig, st as logger, v as fetchAll, x as initOAuth2Client, z as FunctionExecution_Type } from "../application-BMDE8KqK.mjs";
|
|
6
6
|
import { createRequire, register } from "node:module";
|
|
7
7
|
import { arg, defineCommand, runCommand, runMain } from "politty";
|
|
8
8
|
import { withCompletionCommand } from "politty/completion";
|
package/dist/cli/lib.d.mts
CHANGED
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
/// <reference path="./../user-defined.d.ts" />
|
|
2
|
-
import { F as Plugin, I as PluginAttachment, d as IdProviderConfig, lt as Resolver, n as TypeSourceInfoEntry, p as OAuth2ClientInput, t as TailorDBType } from "../types-
|
|
3
|
-
import { C as ScheduleTriggerInput, b as IncomingWebhookTrigger, c as CodeGeneratorBase, p as Executor, t as AppConfig } from "../types-
|
|
4
|
-
import "politty";
|
|
2
|
+
import { F as Plugin, I as PluginAttachment, d as IdProviderConfig, lt as Resolver, n as TypeSourceInfoEntry, p as OAuth2ClientInput, t as TailorDBType } from "../types-CZZBCaxB.mjs";
|
|
3
|
+
import { C as ScheduleTriggerInput, b as IncomingWebhookTrigger, c as CodeGeneratorBase, p as Executor, t as AppConfig } from "../types-DthzUFfx.mjs";
|
|
5
4
|
import { z } from "zod";
|
|
6
5
|
import { OAuth2Client } from "@badgateway/oauth2-client";
|
|
7
6
|
import { Duration, FieldMask, Timestamp, Value } from "@bufbuild/protobuf/wkt";
|
|
@@ -11309,10 +11308,21 @@ declare type IdPUserAuthPolicy = Message<"tailor.v1.IdPUserAuthPolicy"> & {
|
|
|
11309
11308
|
* allow_google_oauth enables "Sign in with Google" for this namespace.
|
|
11310
11309
|
* When enabled, users can authenticate using their Google account.
|
|
11311
11310
|
* Cannot be enabled when use_non_email_identifier is true.
|
|
11311
|
+
* Requires allowed_email_domains to be set.
|
|
11312
11312
|
*
|
|
11313
11313
|
* @generated from field: bool allow_google_oauth = 10;
|
|
11314
11314
|
*/
|
|
11315
11315
|
allowGoogleOauth: boolean;
|
|
11316
|
+
|
|
11317
|
+
/**
|
|
11318
|
+
* disable_password_auth disables password-based authentication for this namespace.
|
|
11319
|
+
* When enabled, users cannot sign in or reset their password using email/password.
|
|
11320
|
+
* Requires allow_google_oauth to be enabled.
|
|
11321
|
+
* Cannot be used with allow_self_password_reset.
|
|
11322
|
+
*
|
|
11323
|
+
* @generated from field: bool disable_password_auth = 11;
|
|
11324
|
+
*/
|
|
11325
|
+
disablePasswordAuth: boolean;
|
|
11316
11326
|
};
|
|
11317
11327
|
/**
|
|
11318
11328
|
* IdPLang represents the IETF BCP 47 language subtag.
|
package/dist/cli/lib.mjs
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import "../chunk-GMkBE123.mjs";
|
|
2
2
|
import "../schema-R5TxC5Pn.mjs";
|
|
3
|
-
import { At as getMigrationDirPath, B as getMachineUserToken, Bt as getNamespacesWithMigrations, Ct as MIGRATE_FILE_NAME, D as truncate, Dt as createSnapshotFromLocalTypes, E as listWorkflows, Et as compareSnapshots, Ht as generateUserTypes, It as reconstructSnapshotFromMigrations, K as listWebhookExecutors, L as listOAuth2Clients, Lt as formatDiffSummary, M as show, Mt as getMigrationFiles, Nt as getNextMigrationNumber, P as remove, Q as getExecutorJob, Rt as formatMigrationDiff, St as INITIAL_SCHEMA_NUMBER, Tt as compareLocalTypesWithSnapshot, U as listMachineUsers, Ut as apiCall, W as generate, Y as triggerExecutor, Z as listExecutors, _t as MIGRATION_LABEL_KEY, at as getWorkflow, bt as DB_TYPES_FILE_NAME, c as inviteUser, ct as listWorkflowExecutions, et as listExecutorJobs, f as listWorkspaces, ft as getExecutor, g as deleteWorkspace, gt as waitForExecution, ht as executeScript, i as removeUser, jt as getMigrationFilePath, k as generate$1, kt as getLatestMigrationNumber, m as getWorkspace, n as updateUser, o as listUsers, pt as apply, rt as startWorkflow, st as getWorkflowExecution, tt as watchExecutorJob, u as restoreWorkspace, v as createWorkspace, w as resumeWorkflow, wt as SCHEMA_FILE_NAME, x as getAppHealth, xt as DIFF_FILE_NAME, y as listApps, yt as bundleMigrationScript, z as getOAuth2Client, zt as hasChanges } from "../update-
|
|
4
|
-
import { S as initOperatorClient, f as loadAccessToken, h as loadWorkspaceId, i as loadConfig, o as getDistDir, st as logger } from "../application-
|
|
3
|
+
import { At as getMigrationDirPath, B as getMachineUserToken, Bt as getNamespacesWithMigrations, Ct as MIGRATE_FILE_NAME, D as truncate, Dt as createSnapshotFromLocalTypes, E as listWorkflows, Et as compareSnapshots, Ht as generateUserTypes, It as reconstructSnapshotFromMigrations, K as listWebhookExecutors, L as listOAuth2Clients, Lt as formatDiffSummary, M as show, Mt as getMigrationFiles, Nt as getNextMigrationNumber, P as remove, Q as getExecutorJob, Rt as formatMigrationDiff, St as INITIAL_SCHEMA_NUMBER, Tt as compareLocalTypesWithSnapshot, U as listMachineUsers, Ut as apiCall, W as generate, Y as triggerExecutor, Z as listExecutors, _t as MIGRATION_LABEL_KEY, at as getWorkflow, bt as DB_TYPES_FILE_NAME, c as inviteUser, ct as listWorkflowExecutions, et as listExecutorJobs, f as listWorkspaces, ft as getExecutor, g as deleteWorkspace, gt as waitForExecution, ht as executeScript, i as removeUser, jt as getMigrationFilePath, k as generate$1, kt as getLatestMigrationNumber, m as getWorkspace, n as updateUser, o as listUsers, pt as apply, rt as startWorkflow, st as getWorkflowExecution, tt as watchExecutorJob, u as restoreWorkspace, v as createWorkspace, w as resumeWorkflow, wt as SCHEMA_FILE_NAME, x as getAppHealth, xt as DIFF_FILE_NAME, y as listApps, yt as bundleMigrationScript, z as getOAuth2Client, zt as hasChanges } from "../update-CUBVjZbL.mjs";
|
|
4
|
+
import { S as initOperatorClient, f as loadAccessToken, h as loadWorkspaceId, i as loadConfig, o as getDistDir, st as logger } from "../application-BMDE8KqK.mjs";
|
|
5
5
|
import { createRequire, register } from "node:module";
|
|
6
6
|
import * as fs$1 from "node:fs";
|
|
7
7
|
import * as path from "pathe";
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/// <reference path="./../user-defined.d.ts" />
|
|
2
|
-
import { $ as unsafeAllowAllTypePermission, A as TailorDBField, B as PluginGeneratedExecutor, C as UserAttributeKey, Ct as unauthenticatedTailorUser, D as ValueOperand, E as UsernameFieldKey, F as Plugin, G as PluginOutput, H as PluginGeneratedResolver, I as PluginAttachment, J as TypePluginOutput, K as PluginProcessContext, L as PluginConfigs, M as TailorDBType, N as db, O as TailorAnyDBField, P as NamespacePluginOutput, Q as unsafeAllowAllGqlPermission, R as PluginExecutorContext, S as TenantProviderConfig, St as TailorUser, T as UserAttributeMap, U as PluginGeneratedType, V as PluginGeneratedExecutorWithFile, W as PluginNamespaceProcessContext, X as TailorTypeGqlPermission, Y as PermissionCondition, Z as TailorTypePermission, _ as SCIMAttributeMapping, _t as Env, b as SCIMConfig, bt as AttributeList, c as BuiltinIdP, ct as QueryType, d as IdProviderConfig, f as OAuth2ClientGrantType, ft as ResolverServiceConfig, g as SCIMAttribute, h as SAML, i as AuthExternalConfig, j as TailorDBInstance, k as TailorAnyDBType, l as DefinedAuth, lt as Resolver, m as OIDC, o as AuthOwnConfig, p as OAuth2ClientInput, pt as ResolverServiceInput, q as TailorDBTypeForPlugin, r as AuthConfig, s as AuthServiceInput, st as TailorField, u as IDToken, ut as ResolverExternalConfig, v as SCIMAttributeType, w as UserAttributeListKey, x as SCIMResource, xt as AttributeMap, y as SCIMAuthorization, z as PluginExecutorContextBase } from "../types-
|
|
3
|
-
import { d as WorkflowServiceInput, g as ExecutorServiceInput, h as ExecutorServiceConfig, n as IdPConfig, o as StaticWebsiteConfig, r as IdPExternalConfig, s as defineStaticWebSite, u as WorkflowServiceConfig } from "../types-
|
|
4
|
-
import { $ as defineAuth, A as idpUserCreatedTrigger, B as WebhookOperation, C as RecordTrigger, D as authAccessTokenIssuedTrigger, E as ResolverExecutedTrigger, F as recordUpdatedTrigger, G as WORKFLOW_TEST_ENV_KEY, H as Workflow, I as resolverExecutedTrigger, J as WorkflowJobInput, K as WorkflowJob, L as FunctionOperation, M as idpUserUpdatedTrigger, N as recordCreatedTrigger, O as authAccessTokenRefreshedTrigger, P as recordDeletedTrigger, Q as AuthInvoker, R as GqlOperation, S as RecordDeletedArgs, T as ResolverExecutedArgs, U as WorkflowConfig, V as WorkflowOperation, W as createWorkflow, X as createWorkflowJob, Y as WorkflowJobOutput, Z as createResolver, _ as AuthAccessTokenArgs, a as defineGenerators, b as IdpUserTrigger, c as createExecutor, d as IncomingWebhookRequest, f as IncomingWebhookTrigger, g as scheduleTrigger, h as ScheduleTrigger, i as defineConfig, j as idpUserDeletedTrigger, k as authAccessTokenRevokedTrigger, l as Trigger, m as ScheduleArgs, n as output, o as definePlugins, p as incomingWebhookTrigger, q as WorkflowJobContext, r as t, s as defineIdp, t as infer, u as IncomingWebhookArgs, v as AuthAccessTokenTrigger, w as RecordUpdatedArgs, x as RecordCreatedArgs, y as IdpUserArgs, z as Operation } from "../index-
|
|
2
|
+
import { $ as unsafeAllowAllTypePermission, A as TailorDBField, B as PluginGeneratedExecutor, C as UserAttributeKey, Ct as unauthenticatedTailorUser, D as ValueOperand, E as UsernameFieldKey, F as Plugin, G as PluginOutput, H as PluginGeneratedResolver, I as PluginAttachment, J as TypePluginOutput, K as PluginProcessContext, L as PluginConfigs, M as TailorDBType, N as db, O as TailorAnyDBField, P as NamespacePluginOutput, Q as unsafeAllowAllGqlPermission, R as PluginExecutorContext, S as TenantProviderConfig, St as TailorUser, T as UserAttributeMap, U as PluginGeneratedType, V as PluginGeneratedExecutorWithFile, W as PluginNamespaceProcessContext, X as TailorTypeGqlPermission, Y as PermissionCondition, Z as TailorTypePermission, _ as SCIMAttributeMapping, _t as Env, b as SCIMConfig, bt as AttributeList, c as BuiltinIdP, ct as QueryType, d as IdProviderConfig, f as OAuth2ClientGrantType, ft as ResolverServiceConfig, g as SCIMAttribute, h as SAML, i as AuthExternalConfig, j as TailorDBInstance, k as TailorAnyDBType, l as DefinedAuth, lt as Resolver, m as OIDC, o as AuthOwnConfig, p as OAuth2ClientInput, pt as ResolverServiceInput, q as TailorDBTypeForPlugin, r as AuthConfig, s as AuthServiceInput, st as TailorField, u as IDToken, ut as ResolverExternalConfig, v as SCIMAttributeType, w as UserAttributeListKey, x as SCIMResource, xt as AttributeMap, y as SCIMAuthorization, z as PluginExecutorContextBase } from "../types-CZZBCaxB.mjs";
|
|
3
|
+
import { d as WorkflowServiceInput, g as ExecutorServiceInput, h as ExecutorServiceConfig, n as IdPConfig, o as StaticWebsiteConfig, r as IdPExternalConfig, s as defineStaticWebSite, u as WorkflowServiceConfig } from "../types-DthzUFfx.mjs";
|
|
4
|
+
import { $ as defineAuth, A as idpUserCreatedTrigger, B as WebhookOperation, C as RecordTrigger, D as authAccessTokenIssuedTrigger, E as ResolverExecutedTrigger, F as recordUpdatedTrigger, G as WORKFLOW_TEST_ENV_KEY, H as Workflow, I as resolverExecutedTrigger, J as WorkflowJobInput, K as WorkflowJob, L as FunctionOperation, M as idpUserUpdatedTrigger, N as recordCreatedTrigger, O as authAccessTokenRefreshedTrigger, P as recordDeletedTrigger, Q as AuthInvoker, R as GqlOperation, S as RecordDeletedArgs, T as ResolverExecutedArgs, U as WorkflowConfig, V as WorkflowOperation, W as createWorkflow, X as createWorkflowJob, Y as WorkflowJobOutput, Z as createResolver, _ as AuthAccessTokenArgs, a as defineGenerators, b as IdpUserTrigger, c as createExecutor, d as IncomingWebhookRequest, f as IncomingWebhookTrigger, g as scheduleTrigger, h as ScheduleTrigger, i as defineConfig, j as idpUserDeletedTrigger, k as authAccessTokenRevokedTrigger, l as Trigger, m as ScheduleArgs, n as output, o as definePlugins, p as incomingWebhookTrigger, q as WorkflowJobContext, r as t, s as defineIdp, t as infer, u as IncomingWebhookArgs, v as AuthAccessTokenTrigger, w as RecordUpdatedArgs, x as RecordCreatedArgs, y as IdpUserArgs, z as Operation } from "../index-CVcYqZSf.mjs";
|
|
5
5
|
export { AttributeList, AttributeMap, AuthAccessTokenArgs, AuthAccessTokenTrigger, AuthConfig, AuthExternalConfig, AuthInvoker, AuthOwnConfig, AuthServiceInput, BuiltinIdP, DefinedAuth, Env, ExecutorServiceConfig, ExecutorServiceInput, FunctionOperation, GqlOperation, IDToken, IdPConfig, IdPExternalConfig, IdProviderConfig, IdpUserArgs, IdpUserTrigger, IncomingWebhookArgs, IncomingWebhookRequest, IncomingWebhookTrigger, NamespacePluginOutput, OAuth2ClientInput as OAuth2Client, OAuth2ClientGrantType, OIDC, Operation, PermissionCondition, Plugin, PluginAttachment, PluginConfigs, PluginExecutorContext, PluginExecutorContextBase, PluginGeneratedExecutor, PluginGeneratedExecutorWithFile, PluginGeneratedResolver, PluginGeneratedType, PluginNamespaceProcessContext, PluginOutput, PluginProcessContext, QueryType, RecordCreatedArgs, RecordDeletedArgs, RecordTrigger, RecordUpdatedArgs, Resolver, ResolverExecutedArgs, ResolverExecutedTrigger, ResolverExternalConfig, ResolverServiceConfig, ResolverServiceInput, SAML, SCIMAttribute, SCIMAttributeMapping, SCIMAttributeType, SCIMAuthorization, SCIMConfig, SCIMResource, ScheduleArgs, ScheduleTrigger, StaticWebsiteConfig, TailorAnyDBField, TailorAnyDBType, TailorDBField, TailorDBInstance, TailorDBType, TailorDBTypeForPlugin, TailorField, TailorTypeGqlPermission, TailorTypePermission, TailorUser, TenantProviderConfig, Trigger, TypePluginOutput, UserAttributeKey, UserAttributeListKey, UserAttributeMap, UsernameFieldKey, ValueOperand, WORKFLOW_TEST_ENV_KEY, WebhookOperation, Workflow, WorkflowConfig, WorkflowJob, WorkflowJobContext, WorkflowJobInput, WorkflowJobOutput, WorkflowOperation, WorkflowServiceConfig, WorkflowServiceInput, authAccessTokenIssuedTrigger, authAccessTokenRefreshedTrigger, authAccessTokenRevokedTrigger, createExecutor, createResolver, createWorkflow, createWorkflowJob, db, defineAuth, defineConfig, defineGenerators, defineIdp, definePlugins, defineStaticWebSite, idpUserCreatedTrigger, idpUserDeletedTrigger, idpUserUpdatedTrigger, incomingWebhookTrigger, infer, output, recordCreatedTrigger, recordDeletedTrigger, recordUpdatedTrigger, resolverExecutedTrigger, scheduleTrigger, t, unauthenticatedTailorUser, unsafeAllowAllGqlPermission, unsafeAllowAllTypePermission };
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
/// <reference path="./user-defined.d.ts" />
|
|
2
|
-
import { F as Plugin, M as TailorDBType, St as TailorUser, T as UserAttributeMap, Tt as AllowedValuesOutput, a as AuthInvoker$1, at as TailorFieldType, dt as ResolverInput, et as ArrayFieldOutput, gt as output$1, ht as JsonCompatible, it as FieldOutput, j as TailorDBInstance, l as DefinedAuth, mt as InferFieldsOutput, nt as FieldMetadata, ot as TailorAnyField, rt as FieldOptions, s as AuthServiceInput, st as TailorField, tt as DefinedFieldMetadata, vt as TailorEnv, w as UserAttributeListKey, wt as AllowedValues, yt as TailorActor } from "./types-
|
|
3
|
-
import { C as ScheduleTriggerInput, S as ResolverExecutedTrigger$1, T as WorkflowOperation$1, _ as FunctionOperation$1, a as IdpDefinitionBrand, b as IncomingWebhookTrigger$1, f as AuthAccessTokenTrigger$1, i as IdPInput, l as GeneratorConfig, m as ExecutorInput, t as AppConfig, v as GqlOperation$1, w as WebhookOperation$1, x as RecordTrigger$1, y as IdpUserTrigger$1 } from "./types-
|
|
2
|
+
import { F as Plugin, M as TailorDBType, St as TailorUser, T as UserAttributeMap, Tt as AllowedValuesOutput, a as AuthInvoker$1, at as TailorFieldType, dt as ResolverInput, et as ArrayFieldOutput, gt as output$1, ht as JsonCompatible, it as FieldOutput, j as TailorDBInstance, l as DefinedAuth, mt as InferFieldsOutput, nt as FieldMetadata, ot as TailorAnyField, rt as FieldOptions, s as AuthServiceInput, st as TailorField, tt as DefinedFieldMetadata, vt as TailorEnv, w as UserAttributeListKey, wt as AllowedValues, yt as TailorActor } from "./types-CZZBCaxB.mjs";
|
|
3
|
+
import { C as ScheduleTriggerInput, S as ResolverExecutedTrigger$1, T as WorkflowOperation$1, _ as FunctionOperation$1, a as IdpDefinitionBrand, b as IncomingWebhookTrigger$1, f as AuthAccessTokenTrigger$1, i as IdPInput, l as GeneratorConfig, m as ExecutorInput, t as AppConfig, v as GqlOperation$1, w as WebhookOperation$1, x as RecordTrigger$1, y as IdpUserTrigger$1 } from "./types-DthzUFfx.mjs";
|
|
4
4
|
import * as zod0 from "zod";
|
|
5
5
|
import { JsonPrimitive, Jsonifiable, Jsonify } from "type-fest";
|
|
6
6
|
import { Client } from "@urql/core";
|
|
@@ -611,6 +611,7 @@ declare function defineIdp<const TClients extends string[]>(name: string, config
|
|
|
611
611
|
passwordMaxLength?: number | undefined;
|
|
612
612
|
allowedEmailDomains?: string[] | undefined;
|
|
613
613
|
allowGoogleOauth?: boolean | undefined;
|
|
614
|
+
disablePasswordAuth?: boolean | undefined;
|
|
614
615
|
} | undefined;
|
|
615
616
|
readonly publishUserEvents?: boolean | undefined;
|
|
616
617
|
readonly clients: TClients;
|
|
@@ -730,4 +731,4 @@ declare namespace t {
|
|
|
730
731
|
}
|
|
731
732
|
//#endregion
|
|
732
733
|
export { defineAuth as $, idpUserCreatedTrigger as A, WebhookOperation as B, RecordTrigger as C, authAccessTokenIssuedTrigger as D, ResolverExecutedTrigger as E, recordUpdatedTrigger as F, WORKFLOW_TEST_ENV_KEY as G, Workflow as H, resolverExecutedTrigger as I, WorkflowJobInput as J, WorkflowJob as K, FunctionOperation as L, idpUserUpdatedTrigger as M, recordCreatedTrigger as N, authAccessTokenRefreshedTrigger as O, recordDeletedTrigger as P, AuthInvoker as Q, GqlOperation as R, RecordDeletedArgs as S, ResolverExecutedArgs as T, WorkflowConfig as U, WorkflowOperation as V, createWorkflow as W, createWorkflowJob as X, WorkflowJobOutput as Y, createResolver as Z, AuthAccessTokenArgs as _, defineGenerators as a, IdpUserTrigger as b, createExecutor as c, IncomingWebhookRequest as d, IncomingWebhookTrigger as f, scheduleTrigger as g, ScheduleTrigger as h, defineConfig as i, idpUserDeletedTrigger as j, authAccessTokenRevokedTrigger as k, Trigger as l, ScheduleArgs as m, output as n, definePlugins as o, incomingWebhookTrigger as p, WorkflowJobContext as q, t as r, defineIdp as s, infer as t, IncomingWebhookArgs as u, AuthAccessTokenTrigger as v, RecordUpdatedArgs as w, RecordCreatedArgs as x, IdpUserArgs as y, Operation as z };
|
|
733
|
-
//# sourceMappingURL=index-
|
|
734
|
+
//# sourceMappingURL=index-CVcYqZSf.d.mts.map
|
package/dist/plugin/index.d.mts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/// <reference path="./../user-defined.d.ts" />
|
|
2
|
-
import { k as TailorAnyDBType, vt as TailorEnv, yt as TailorActor } from "../types-
|
|
2
|
+
import { k as TailorAnyDBType, vt as TailorEnv, yt as TailorActor } from "../types-CZZBCaxB.mjs";
|
|
3
3
|
|
|
4
4
|
//#region src/plugin/with-context.d.ts
|
|
5
5
|
|
|
@@ -677,11 +677,11 @@ declare const TailorFieldSchema: z.ZodObject<{
|
|
|
677
677
|
type: z.ZodEnum<{
|
|
678
678
|
string: "string";
|
|
679
679
|
boolean: "boolean";
|
|
680
|
+
date: "date";
|
|
681
|
+
enum: "enum";
|
|
680
682
|
uuid: "uuid";
|
|
681
683
|
integer: "integer";
|
|
682
684
|
float: "float";
|
|
683
|
-
enum: "enum";
|
|
684
|
-
date: "date";
|
|
685
685
|
datetime: "datetime";
|
|
686
686
|
time: "time";
|
|
687
687
|
nested: "nested";
|
|
@@ -710,11 +710,11 @@ declare const ResolverSchema: z.ZodObject<{
|
|
|
710
710
|
type: z.ZodEnum<{
|
|
711
711
|
string: "string";
|
|
712
712
|
boolean: "boolean";
|
|
713
|
+
date: "date";
|
|
714
|
+
enum: "enum";
|
|
713
715
|
uuid: "uuid";
|
|
714
716
|
integer: "integer";
|
|
715
717
|
float: "float";
|
|
716
|
-
enum: "enum";
|
|
717
|
-
date: "date";
|
|
718
718
|
datetime: "datetime";
|
|
719
719
|
time: "time";
|
|
720
720
|
nested: "nested";
|
|
@@ -740,11 +740,11 @@ declare const ResolverSchema: z.ZodObject<{
|
|
|
740
740
|
type: z.ZodEnum<{
|
|
741
741
|
string: "string";
|
|
742
742
|
boolean: "boolean";
|
|
743
|
+
date: "date";
|
|
744
|
+
enum: "enum";
|
|
743
745
|
uuid: "uuid";
|
|
744
746
|
integer: "integer";
|
|
745
747
|
float: "float";
|
|
746
|
-
enum: "enum";
|
|
747
|
-
date: "date";
|
|
748
748
|
datetime: "datetime";
|
|
749
749
|
time: "time";
|
|
750
750
|
nested: "nested";
|
|
@@ -2439,4 +2439,4 @@ interface TailorDBType {
|
|
|
2439
2439
|
}
|
|
2440
2440
|
//#endregion
|
|
2441
2441
|
export { unsafeAllowAllTypePermission as $, TailorDBField as A, PluginGeneratedExecutor as B, UserAttributeKey as C, unauthenticatedTailorUser as Ct, ValueOperand as D, UsernameFieldKey as E, TailorDBServiceInput as Et, Plugin as F, PluginOutput as G, PluginGeneratedResolver as H, PluginAttachment as I, TypePluginOutput as J, PluginProcessContext as K, PluginConfigs as L, TailorDBType$1 as M, db as N, TailorAnyDBField as O, NamespacePluginOutput as P, unsafeAllowAllGqlPermission as Q, PluginExecutorContext as R, TenantProviderConfig as S, TailorUser as St, UserAttributeMap as T, AllowedValuesOutput as Tt, PluginGeneratedType as U, PluginGeneratedExecutorWithFile as V, PluginNamespaceProcessContext as W, TailorTypeGqlPermission as X, PermissionCondition as Y, TailorTypePermission as Z, SCIMAttributeMapping as _, Env as _t, AuthInvoker as a, TailorFieldType as at, SCIMConfig as b, AttributeList as bt, BuiltinIdP as c, QueryType as ct, IdProviderConfig as d, ResolverInput as dt, ArrayFieldOutput as et, OAuth2ClientGrantType as f, ResolverServiceConfig as ft, SCIMAttribute as g, output as gt, SAML as h, JsonCompatible as ht, AuthExternalConfig as i, FieldOutput$1 as it, TailorDBInstance as j, TailorAnyDBType as k, DefinedAuth as l, Resolver as lt, OIDC as m, InferFieldsOutput as mt, TypeSourceInfoEntry as n, FieldMetadata as nt, AuthOwnConfig as o, TailorAnyField as ot, OAuth2ClientInput as p, ResolverServiceInput as pt, TailorDBTypeForPlugin as q, AuthConfig as r, FieldOptions as rt, AuthServiceInput as s, TailorField as st, TailorDBType as t, DefinedFieldMetadata as tt, IDToken as u, ResolverExternalConfig as ut, SCIMAttributeType as v, TailorEnv as vt, UserAttributeListKey as w, AllowedValues as wt, SCIMResource as x, AttributeMap as xt, SCIMAuthorization as y, TailorActor as yt, PluginExecutorContextBase as z };
|
|
2442
|
-
//# sourceMappingURL=types-
|
|
2442
|
+
//# sourceMappingURL=types-CZZBCaxB.d.mts.map
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/// <reference path="./user-defined.d.ts" />
|
|
2
|
-
import { Et as TailorDBServiceInput, c as BuiltinIdP, pt as ResolverServiceInput, r as AuthConfig } from "./types-
|
|
2
|
+
import { Et as TailorDBServiceInput, c as BuiltinIdP, pt as ResolverServiceInput, r as AuthConfig } from "./types-CZZBCaxB.mjs";
|
|
3
3
|
import { z } from "zod";
|
|
4
4
|
|
|
5
5
|
//#region src/parser/service/executor/schema.d.ts
|
|
@@ -283,6 +283,7 @@ declare const IdPSchema: z.core.$ZodBranded<z.ZodObject<{
|
|
|
283
283
|
passwordMaxLength: z.ZodOptional<z.ZodNumber>;
|
|
284
284
|
allowedEmailDomains: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
285
285
|
allowGoogleOauth: z.ZodOptional<z.ZodBoolean>;
|
|
286
|
+
disablePasswordAuth: z.ZodOptional<z.ZodBoolean>;
|
|
286
287
|
}, z.core.$strip>, z.ZodTransform<{
|
|
287
288
|
useNonEmailIdentifier?: boolean | undefined;
|
|
288
289
|
allowSelfPasswordReset?: boolean | undefined;
|
|
@@ -294,6 +295,7 @@ declare const IdPSchema: z.core.$ZodBranded<z.ZodObject<{
|
|
|
294
295
|
passwordMaxLength?: number | undefined;
|
|
295
296
|
allowedEmailDomains?: string[] | undefined;
|
|
296
297
|
allowGoogleOauth?: boolean | undefined;
|
|
298
|
+
disablePasswordAuth?: boolean | undefined;
|
|
297
299
|
}, {
|
|
298
300
|
useNonEmailIdentifier?: boolean | undefined;
|
|
299
301
|
allowSelfPasswordReset?: boolean | undefined;
|
|
@@ -305,6 +307,7 @@ declare const IdPSchema: z.core.$ZodBranded<z.ZodObject<{
|
|
|
305
307
|
passwordMaxLength?: number | undefined;
|
|
306
308
|
allowedEmailDomains?: string[] | undefined;
|
|
307
309
|
allowGoogleOauth?: boolean | undefined;
|
|
310
|
+
disablePasswordAuth?: boolean | undefined;
|
|
308
311
|
}>>>;
|
|
309
312
|
publishUserEvents: z.ZodOptional<z.ZodBoolean>;
|
|
310
313
|
}, z.core.$strip>, "IdPConfig", "out">;
|
|
@@ -366,4 +369,4 @@ interface AppConfig<Auth extends AuthConfig = AuthConfig, Idp extends IdPConfig[
|
|
|
366
369
|
}
|
|
367
370
|
//#endregion
|
|
368
371
|
export { ScheduleTriggerInput as C, ResolverExecutedTrigger as S, WorkflowOperation as T, FunctionOperation as _, IdpDefinitionBrand as a, IncomingWebhookTrigger as b, CodeGeneratorBase as c, WorkflowServiceInput as d, AuthAccessTokenTrigger as f, ExecutorServiceInput as g, ExecutorServiceConfig as h, IdPInput as i, GeneratorConfig as l, ExecutorInput as m, IdPConfig as n, StaticWebsiteConfig as o, Executor as p, IdPExternalConfig as r, defineStaticWebSite as s, AppConfig as t, WorkflowServiceConfig as u, GqlOperation as v, WebhookOperation as w, RecordTrigger as x, IdpUserTrigger as y };
|
|
369
|
-
//# sourceMappingURL=types-
|
|
372
|
+
//# sourceMappingURL=types-DthzUFfx.d.mts.map
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { t as db } from "./schema-R5TxC5Pn.mjs";
|
|
2
|
-
import { $ as UserProfileProviderConfig_UserProfileProviderType, A as TailorDBGQLPermission_Action, B as ExecutorJobStatus, C as platformBaseUrl, D as WorkspacePlatformUserRole, E as readPackageJson, F as TailorDBType_PermitAction, G as AuthOAuth2Client_ClientType, H as ExecutorTriggerType, I as PipelineResolver_OperationType, J as AuthSCIMAttribute_Type, K as AuthOAuth2Client_GrantType, L as IdPLang, M as TailorDBGQLPermission_Permit, N as TailorDBType_Permission_Operator, O as WorkflowExecution_Status, P as TailorDBType_Permission_Permit, Q as TenantProviderConfig_TenantProviderType, R as FunctionExecution_Status, S as initOperatorClient, T as userAgent, U as AuthIDPConfig_AuthType, V as ExecutorTargetType, W as AuthInvokerSchema, X as AuthSCIMConfig_AuthorizationType, Y as AuthSCIMAttribute_Uniqueness, _ as writePlatformConfig, a as hasDependency, at as ApplicationSchemaUpdateAttemptStatus, c as OAuth2ClientSchema, ct as styles, et as GetApplicationSchemaHealthResponse_ApplicationSchemaHealthStatus, f as loadAccessToken, g as readPlatformConfig, h as loadWorkspaceId, i as loadConfig, it as PageDirection, j as TailorDBGQLPermission_Operator, k as WorkflowJobExecution_Status, l as stringifyFunction, lt as symbols, m as loadOrganizationId, n as generatePluginFilesIfNeeded, nt as Condition_Operator, o as getDistDir, ot as Subgraph_ServiceType, p as loadFolderId, q as AuthSCIMAttribute_Mutability, r as loadApplication, rt as FilterSchema, s as createExecutorService, st as logger, t as defineApplication, tt as ConditionSchema, u as tailorUserMap, v as fetchAll, w as resolveStaticWebsiteUrls, y as fetchMachineUserToken } from "./application-
|
|
2
|
+
import { $ as UserProfileProviderConfig_UserProfileProviderType, A as TailorDBGQLPermission_Action, B as ExecutorJobStatus, C as platformBaseUrl, D as WorkspacePlatformUserRole, E as readPackageJson, F as TailorDBType_PermitAction, G as AuthOAuth2Client_ClientType, H as ExecutorTriggerType, I as PipelineResolver_OperationType, J as AuthSCIMAttribute_Type, K as AuthOAuth2Client_GrantType, L as IdPLang, M as TailorDBGQLPermission_Permit, N as TailorDBType_Permission_Operator, O as WorkflowExecution_Status, P as TailorDBType_Permission_Permit, Q as TenantProviderConfig_TenantProviderType, R as FunctionExecution_Status, S as initOperatorClient, T as userAgent, U as AuthIDPConfig_AuthType, V as ExecutorTargetType, W as AuthInvokerSchema, X as AuthSCIMConfig_AuthorizationType, Y as AuthSCIMAttribute_Uniqueness, _ as writePlatformConfig, a as hasDependency, at as ApplicationSchemaUpdateAttemptStatus, c as OAuth2ClientSchema, ct as styles, et as GetApplicationSchemaHealthResponse_ApplicationSchemaHealthStatus, f as loadAccessToken, g as readPlatformConfig, h as loadWorkspaceId, i as loadConfig, it as PageDirection, j as TailorDBGQLPermission_Operator, k as WorkflowJobExecution_Status, l as stringifyFunction, lt as symbols, m as loadOrganizationId, n as generatePluginFilesIfNeeded, nt as Condition_Operator, o as getDistDir, ot as Subgraph_ServiceType, p as loadFolderId, q as AuthSCIMAttribute_Mutability, r as loadApplication, rt as FilterSchema, s as createExecutorService, st as logger, t as defineApplication, tt as ConditionSchema, u as tailorUserMap, v as fetchAll, w as resolveStaticWebsiteUrls, y as fetchMachineUserToken } from "./application-BMDE8KqK.mjs";
|
|
3
3
|
import { createRequire } from "node:module";
|
|
4
4
|
import { arg, defineCommand, runCommand } from "politty";
|
|
5
5
|
import { z } from "zod";
|
|
@@ -2135,7 +2135,7 @@ function workflowJobFunctionName(jobName) {
|
|
|
2135
2135
|
function collectFunctionEntries(application, workflowJobs) {
|
|
2136
2136
|
const entries = [];
|
|
2137
2137
|
const distDir = getDistDir();
|
|
2138
|
-
for (const app of application.applications) for (const pipeline of app.resolverServices) for (const resolver of Object.values(pipeline.
|
|
2138
|
+
for (const app of application.applications) for (const pipeline of app.resolverServices) for (const resolver of Object.values(pipeline.resolvers)) {
|
|
2139
2139
|
const scriptPath = path.join(distDir, "resolvers", `${resolver.name}.js`);
|
|
2140
2140
|
try {
|
|
2141
2141
|
const content = fs$2.readFileSync(scriptPath, "utf-8");
|
|
@@ -2150,7 +2150,7 @@ function collectFunctionEntries(application, workflowJobs) {
|
|
|
2150
2150
|
}
|
|
2151
2151
|
}
|
|
2152
2152
|
if (application.executorService) {
|
|
2153
|
-
const executors = application.executorService.
|
|
2153
|
+
const executors = application.executorService.executors;
|
|
2154
2154
|
for (const executor of Object.values(executors)) if (executor.operation.kind === "function" || executor.operation.kind === "jobFunction") {
|
|
2155
2155
|
const scriptPath = path.join(distDir, "executors", `${executor.name}.js`);
|
|
2156
2156
|
try {
|
|
@@ -2796,7 +2796,7 @@ async function planResolvers(client, workspaceId, pipelines, executors, deletedS
|
|
|
2796
2796
|
existingResolvers.forEach((resolver) => {
|
|
2797
2797
|
existingNameSet.add(resolver.name);
|
|
2798
2798
|
});
|
|
2799
|
-
for (const resolver of Object.values(pipeline.
|
|
2799
|
+
for (const resolver of Object.values(pipeline.resolvers)) if (existingNameSet.has(resolver.name)) {
|
|
2800
2800
|
changeSet.updates.push({
|
|
2801
2801
|
name: resolver.name,
|
|
2802
2802
|
request: {
|
|
@@ -4824,7 +4824,7 @@ async function applyTailorDB(client, result, phase = "create-update") {
|
|
|
4824
4824
|
let pendingMigrations = [];
|
|
4825
4825
|
const typesByNamespace = /* @__PURE__ */ new Map();
|
|
4826
4826
|
for (const tailordb of migrationContext.application.tailorDBServices) {
|
|
4827
|
-
const types = tailordb.
|
|
4827
|
+
const types = tailordb.types;
|
|
4828
4828
|
if (types) typesByNamespace.set(tailordb.namespace, types);
|
|
4829
4829
|
}
|
|
4830
4830
|
pendingMigrations = await validateAndDetectMigrations(client, migrationContext.workspaceId, typesByNamespace, migrationContext.config, migrationContext.noSchemaCheck);
|
|
@@ -5244,7 +5244,7 @@ async function planTypes(client, workspaceId, tailordbs, executors, deletedServi
|
|
|
5244
5244
|
const existingTypes = await fetchTypes(tailordb.namespace);
|
|
5245
5245
|
const existingNameSet = /* @__PURE__ */ new Set();
|
|
5246
5246
|
existingTypes.forEach((type) => existingNameSet.add(type.name));
|
|
5247
|
-
const types = filteredTypesByNamespace?.get(tailordb.namespace) ?? tailordb.
|
|
5247
|
+
const types = filteredTypesByNamespace?.get(tailordb.namespace) ?? tailordb.types;
|
|
5248
5248
|
for (const typeName of Object.keys(types)) {
|
|
5249
5249
|
const tailordbType = generateTailorDBTypeManifest(types[typeName], executorUsedTypes, tailordb.config.gqlOperations);
|
|
5250
5250
|
if (existingNameSet.has(typeName)) {
|
|
@@ -5544,7 +5544,7 @@ async function planGqlPermissions(client, workspaceId, tailordbs, deletedService
|
|
|
5544
5544
|
existingGqlPermissions.forEach((gqlPermission) => {
|
|
5545
5545
|
existingNameSet.add(gqlPermission.typeName);
|
|
5546
5546
|
});
|
|
5547
|
-
const types = tailordb.
|
|
5547
|
+
const types = tailordb.types;
|
|
5548
5548
|
for (const typeName of Object.keys(types)) {
|
|
5549
5549
|
const gqlPermission = types[typeName].permissions.gql;
|
|
5550
5550
|
if (!gqlPermission) continue;
|
|
@@ -5950,7 +5950,7 @@ async function apply(options) {
|
|
|
5950
5950
|
config,
|
|
5951
5951
|
configPath: config.path
|
|
5952
5952
|
});
|
|
5953
|
-
const { application,
|
|
5953
|
+
const { application, workflowBuildResult } = await loadApplication({
|
|
5954
5954
|
config,
|
|
5955
5955
|
pluginManager
|
|
5956
5956
|
});
|
|
@@ -5963,7 +5963,8 @@ async function apply(options) {
|
|
|
5963
5963
|
workspaceId: options?.workspaceId,
|
|
5964
5964
|
profile: options?.profile
|
|
5965
5965
|
});
|
|
5966
|
-
const
|
|
5966
|
+
const workflowService = application.workflowService;
|
|
5967
|
+
const functionEntries = collectFunctionEntries(application, workflowService?.jobs ?? []);
|
|
5967
5968
|
const ctx = {
|
|
5968
5969
|
client,
|
|
5969
5970
|
workspaceId,
|
|
@@ -5980,7 +5981,7 @@ async function apply(options) {
|
|
|
5980
5981
|
const pipeline = await planPipeline(ctx);
|
|
5981
5982
|
const app = await planApplication(ctx);
|
|
5982
5983
|
const executor = await planExecutor(ctx);
|
|
5983
|
-
const workflow = await planWorkflow(client, workspaceId, application.name,
|
|
5984
|
+
const workflow = await planWorkflow(client, workspaceId, application.name, workflowService?.workflows ?? {}, workflowBuildResult?.mainJobDeps ?? {});
|
|
5984
5985
|
const allConflicts = [
|
|
5985
5986
|
...functionRegistry.conflicts,
|
|
5986
5987
|
...tailorDB.conflicts,
|
|
@@ -8417,9 +8418,9 @@ function createGenerationManager(params) {
|
|
|
8417
8418
|
await db$1.loadTypes();
|
|
8418
8419
|
await db$1.processNamespacePlugins();
|
|
8419
8420
|
services.tailordb[namespace] = {
|
|
8420
|
-
types: db$1.
|
|
8421
|
-
sourceInfo: db$1.
|
|
8422
|
-
pluginAttachments: db$1.
|
|
8421
|
+
types: db$1.types,
|
|
8422
|
+
sourceInfo: db$1.typeSourceInfo,
|
|
8423
|
+
pluginAttachments: db$1.pluginAttachments
|
|
8423
8424
|
};
|
|
8424
8425
|
} catch (error) {
|
|
8425
8426
|
logger.error(`Error loading types for TailorDB service ${styles.bold(namespace)}`);
|
|
@@ -8441,7 +8442,7 @@ function createGenerationManager(params) {
|
|
|
8441
8442
|
try {
|
|
8442
8443
|
await resolverService.loadResolvers();
|
|
8443
8444
|
services.resolver[namespace] = {};
|
|
8444
|
-
Object.entries(resolverService.
|
|
8445
|
+
Object.entries(resolverService.resolvers).forEach(([_, resolver]) => {
|
|
8445
8446
|
services.resolver[namespace][resolver.name] = resolver;
|
|
8446
8447
|
});
|
|
8447
8448
|
} catch (error) {
|
|
@@ -8459,7 +8460,7 @@ function createGenerationManager(params) {
|
|
|
8459
8460
|
await executorService.loadExecutors();
|
|
8460
8461
|
if (pluginExecutorFiles.length > 0) await executorService.loadPluginExecutorFiles([...pluginExecutorFiles]);
|
|
8461
8462
|
}
|
|
8462
|
-
const allExecutors = executorService?.
|
|
8463
|
+
const allExecutors = executorService?.executors ?? {};
|
|
8463
8464
|
Object.entries(allExecutors).forEach(([key, executor]) => {
|
|
8464
8465
|
services.executor[key] = executor;
|
|
8465
8466
|
});
|
|
@@ -9487,7 +9488,7 @@ async function generate(options) {
|
|
|
9487
9488
|
if (options.init) await handleInitOption(namespacesWithMigrations, options.yes);
|
|
9488
9489
|
let pluginManager;
|
|
9489
9490
|
if (plugins.length > 0) pluginManager = new PluginManager(plugins);
|
|
9490
|
-
const { defineApplication: defineApplication$1 } = await import("./application-
|
|
9491
|
+
const { defineApplication: defineApplication$1 } = await import("./application-Dni_W16P.mjs");
|
|
9491
9492
|
const application = defineApplication$1({
|
|
9492
9493
|
config,
|
|
9493
9494
|
pluginManager
|
|
@@ -9502,7 +9503,8 @@ async function generate(options) {
|
|
|
9502
9503
|
}
|
|
9503
9504
|
await tailordbService.loadTypes();
|
|
9504
9505
|
await tailordbService.processNamespacePlugins();
|
|
9505
|
-
const
|
|
9506
|
+
const localTypesObj = tailordbService.types;
|
|
9507
|
+
const currentSnapshot = createSnapshotFromLocalTypes(localTypesObj, namespace);
|
|
9506
9508
|
let previousSnapshot = null;
|
|
9507
9509
|
try {
|
|
9508
9510
|
previousSnapshot = reconstructSnapshotFromMigrations(migrationsDir);
|
|
@@ -10698,4 +10700,4 @@ const updateCommand = defineCommand({
|
|
|
10698
10700
|
|
|
10699
10701
|
//#endregion
|
|
10700
10702
|
export { jobsCommand as $, generateCommand as A, getMigrationDirPath as At, getMachineUserToken as B, getNamespacesWithMigrations as Bt, resumeCommand as C, MIGRATE_FILE_NAME as Ct, truncate as D, createSnapshotFromLocalTypes as Dt, listWorkflows as E, compareSnapshots as Et, removeCommand$1 as F, loadDiff as Ft, generateCommand$1 as G, commonArgs as Gt, listCommand$5 as H, generateUserTypes as Ht, listCommand$4 as I, reconstructSnapshotFromMigrations as It, triggerCommand as J, jsonArgs as Jt, listWebhookExecutors as K, confirmationArgs as Kt, listOAuth2Clients as L, formatDiffSummary as Lt, show as M, getMigrationFiles as Mt, showCommand as N, getNextMigrationNumber as Nt, truncateCommand as O, formatMigrationNumber as Ot, remove as P, isValidMigrationNumber as Pt, getExecutorJob as Q, getCommand$1 as R, formatMigrationDiff as Rt, healthCommand as S, INITIAL_SCHEMA_NUMBER as St, listCommand$3 as T, compareLocalTypesWithSnapshot as Tt, listMachineUsers as U, apiCall as Ut, tokenCommand as V, trnPrefix as Vt, generate$1 as W, apiCommand as Wt, listCommand$6 as X, workspaceArgs as Xt, triggerExecutor as Y, withCommonArgs as Yt, listExecutors as Z, createCommand as _, MIGRATION_LABEL_KEY as _t, listCommand as a, getWorkflow as at, listCommand$2 as b, DB_TYPES_FILE_NAME as bt, inviteUser as c, listWorkflowExecutions as ct, listCommand$1 as d, getCommand$3 as dt, listExecutorJobs as et, listWorkspaces as f, getExecutor as ft, deleteWorkspace as g, waitForExecution$1 as gt, deleteCommand as h, executeScript as ht, removeUser as i, getCommand$2 as it, logBetaWarning as j, getMigrationFilePath as jt, generate as k, getLatestMigrationNumber as kt, restoreCommand as l, functionExecutionStatusToString as lt, getWorkspace as m, applyCommand as mt, updateUser as n, startCommand as nt, listUsers as o, executionsCommand as ot, getCommand as p, apply as pt, webhookCommand as q, deploymentArgs as qt, removeCommand as r, startWorkflow as rt, inviteCommand as s, getWorkflowExecution as st, updateCommand as t, watchExecutorJob as tt, restoreWorkspace as u, formatKeyValueTable as ut, createWorkspace as v, parseMigrationLabelNumber as vt, resumeWorkflow as w, SCHEMA_FILE_NAME as wt, getAppHealth as x, DIFF_FILE_NAME as xt, listApps as y, bundleMigrationScript as yt, getOAuth2Client as z, hasChanges as zt };
|
|
10701
|
-
//# sourceMappingURL=update-
|
|
10703
|
+
//# sourceMappingURL=update-CUBVjZbL.mjs.map
|