0
Fork 0
mirror of https://github.com/logto-io/logto.git synced 2025-03-31 22:51:25 -05:00

Merge pull request #5745 from logto-io/yemq-update-cloud-client-calls

refactor(core): update cloud dependency, cloud client calls
This commit is contained in:
Darcy Ye 2024-04-19 00:47:26 +08:00 committed by GitHub
commit bb4382e0a8
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
14 changed files with 457 additions and 89 deletions

View file

@ -52,7 +52,7 @@
"access": "public"
},
"devDependencies": {
"@logto/cloud": "0.2.5-821690c",
"@logto/cloud": "0.2.5-e5d8200",
"@rollup/plugin-commonjs": "^25.0.7",
"@rollup/plugin-json": "^6.1.0",
"@rollup/plugin-node-resolve": "^15.2.3",

View file

@ -27,7 +27,7 @@
"devDependencies": {
"@fontsource/roboto-mono": "^5.0.0",
"@jest/types": "^29.5.0",
"@logto/cloud": "0.2.5-821690c",
"@logto/cloud": "0.2.5-e5d8200",
"@logto/connector-kit": "workspace:^3.0.0",
"@logto/core-kit": "workspace:^2.4.0",
"@logto/language-kit": "workspace:^1.1.0",

View file

@ -111,6 +111,7 @@ function InstructionTab({ isActive }: Props) {
language="typescript"
className={styles.sampleCode}
value={environmentVariablesCodeExample}
path="file:///env-variables-sample.js"
height="400px"
theme="logto-dark"
options={sampleCodeEditorOptions}

View file

@ -20,70 +20,43 @@ import {
* JWT token code editor configuration
*/
const accessTokenJwtCustomizerDefinition = `
declare global {
export interface CustomJwtClaims extends Record<string, any> {}
declare interface CustomJwtClaims extends Record<string, any> {}
/** Logto internal data that can be used to pass additional information
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} user - The user info associated with the token.
*/
export type Data = {
user: ${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext};
}
export interface Exports {
/**
* This function is called during the access token generation process to get custom claims for the JWT token.
*
* @param {${JwtCustomizerTypeDefinitionKey.AccessTokenPayload}} token -The JWT token.
* @param {Data} data - Logto internal data that can be used to pass additional information
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} data.user - The user info associated with the token.
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} envVariables - The environment variables.
*
* @returns The custom claims.
*/
getCustomJwtClaims: (token: ${JwtCustomizerTypeDefinitionKey.AccessTokenPayload}, data: Data, envVariables: ${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}) => Promise<CustomJwtClaims>;
}
const exports: Exports;
/** Logto internal data that can be used to pass additional information
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} user - The user info associated with the token.
*/
declare type Context = {
user: ${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext};
}
export { exports as default };
`;
declare type Payload = {
token: ${JwtCustomizerTypeDefinitionKey.AccessTokenPayload};
context: Context;
environmentVariables: ${JwtCustomizerTypeDefinitionKey.EnvironmentVariables};
};`;
const clientCredentialsJwtCustomizerDefinition = `
declare global {
export interface CustomJwtClaims extends Record<string, any> {}
declare interface CustomJwtClaims extends Record<string, any> {}
export interface Exports {
/**
* This function is called during the access token generation process to get custom claims for the JWT token.
*
* @param {${JwtCustomizerTypeDefinitionKey.ClientCredentialsPayload}} token -The JWT token.
*
* @returns The custom claims.
*/
getCustomJwtClaims: (token: ${JwtCustomizerTypeDefinitionKey.ClientCredentialsPayload}, envVariables: ${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}) => Promise<CustomJwtClaims>;
}
const exports: Exports;
}
export { exports as default };
`;
declare type Payload = {
token: ${JwtCustomizerTypeDefinitionKey.AccessTokenPayload};
environmentVariables: ${JwtCustomizerTypeDefinitionKey.EnvironmentVariables};
};`;
export const defaultAccessTokenJwtCustomizerCode = `/**
* This function is called during the access token generation process to get custom claims for the JWT token.
* Limit custom claims to under 50KB.
*
* @param {${JwtCustomizerTypeDefinitionKey.AccessTokenPayload}} token -The JWT token.
* @param {Data} data - Logto internal data that can be used to pass additional information
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} data.user - The user info associated with the token.
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} [envVariables] - The environment variables.
*
* @param {Payload} payload - The input payload of the function.
* @param {${JwtCustomizerTypeDefinitionKey.AccessTokenPayload}} payload.token -The JWT token.
* @param {Context} payload.context - Logto internal data that can be used to pass additional information
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} payload.context.user - The user info associated with the token.
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} [payload.environmentVariables] - The environment variables.
*
* @returns The custom claims.
*/
exports.getCustomJwtClaims = async (token, data, envVariables) => {
const getCustomJwtClaims = async ({ token, context, environmentVariables }) => {
return {};
}`;
@ -91,13 +64,14 @@ export const defaultClientCredentialsJwtCustomizerCode = `/**
* This function is called during the access token generation process to get custom claims for the JWT token.
* Limit custom claims to under 50KB.
*
* @param {${JwtCustomizerTypeDefinitionKey.ClientCredentialsPayload}} token -The JWT token.
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} [envVariables] - The environment variables.
* @param {Payload} payload - The input payload of the function.
* @param {${JwtCustomizerTypeDefinitionKey.ClientCredentialsPayload}} payload.token -The JWT token.
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} [payload.environmentVariables] - The environment variables.
*
* @returns The custom claims.
*/
exports.getCustomJwtClaims = async (token, envVariables) => {
const getCustomJwtClaims = async ({ token, environmentVariables }) => {
return {};
}`;
@ -170,15 +144,15 @@ return {
externalData: data,
};`;
export const environmentVariablesCodeExample = `exports.getCustomJwtClaims = async (token, data, envVariables) => {
const { apiKey } = envVariables;
export const environmentVariablesCodeExample = `const getCustomJwtClaimsSample = async ({ environmentVariables }) => {
const { apiKey } = environmentVariables;
const response = await fetch('https://api.example.com/data', {
headers: {
Authorization: apiKey,
}
});
const data = await response.json();
return {

View file

@ -92,7 +92,7 @@
"zod": "^3.22.4"
},
"devDependencies": {
"@logto/cloud": "0.2.5-821690c",
"@logto/cloud": "0.2.5-e5d8200",
"@silverhand/eslint-config": "6.0.1",
"@silverhand/ts-config": "6.0.0",
"@types/debug": "^4.1.7",

View file

@ -0,0 +1,357 @@
import { LogtoJwtTokenKey } from '@logto/schemas';
import { cond } from '@silverhand/essentials';
import deepmerge from 'deepmerge';
describe('Test the deploy custom JWT script', () => {
describe('Test script when both AccessToken & ClientCredentials scripts are existing', () => {
it.each(Object.values(LogtoJwtTokenKey))('test %s script', (key) => {
expect(
deepmerge(
{
[LogtoJwtTokenKey.AccessToken]: {
production: `${LogtoJwtTokenKey.AccessToken}-production`,
},
[LogtoJwtTokenKey.ClientCredentials]: {
production: `${LogtoJwtTokenKey.ClientCredentials}-production`,
},
},
{
[key]: {
test: `${key}-test`,
},
}
)
).toEqual({
[LogtoJwtTokenKey.AccessToken]: {
production: `${LogtoJwtTokenKey.AccessToken}-production`,
...cond(key === LogtoJwtTokenKey.AccessToken && { test: `${key}-test` }),
},
[LogtoJwtTokenKey.ClientCredentials]: {
production: `${LogtoJwtTokenKey.ClientCredentials}-production`,
...cond(key === LogtoJwtTokenKey.ClientCredentials && { test: `${key}-test` }),
},
});
});
});
describe('Test script:', () => {
// Test it.each() can not be nested, so we have to test each key separately.
it.each(Object.values(LogtoJwtTokenKey))(
`when ${LogtoJwtTokenKey.AccessToken} script is existing, test $s script`,
(testingKey) => {
const existingKey = LogtoJwtTokenKey.AccessToken;
const existingScript = {
[existingKey]: {
production: `${existingKey}-production`,
},
};
expect(
deepmerge(existingScript, {
[testingKey]: {
test: `${testingKey}-test`,
},
})
).toEqual(
existingKey === testingKey
? {
[existingKey]: {
production: `${existingKey}-production`,
test: `${existingKey}-test`,
},
}
: {
[existingKey]: {
production: `${existingKey}-production`,
},
[testingKey]: {
test: `${testingKey}-test`,
},
}
);
}
);
it.each(Object.values(LogtoJwtTokenKey))(
`when ${LogtoJwtTokenKey.ClientCredentials} script is existing, test $s script`,
(testingKey) => {
const existingKey = LogtoJwtTokenKey.ClientCredentials;
const existingScript = {
[existingKey]: {
production: `${existingKey}-production`,
},
};
expect(
deepmerge(existingScript, {
[testingKey]: {
test: `${testingKey}-test`,
},
})
).toEqual(
existingKey === testingKey
? {
[existingKey]: {
production: `${existingKey}-production`,
test: `${existingKey}-test`,
},
}
: {
[existingKey]: {
production: `${existingKey}-production`,
},
[testingKey]: {
test: `${testingKey}-test`,
},
}
);
}
);
});
describe('Test script when both AccessToken & ClientCredentials scripts are not existing', () => {
it.each(Object.values(LogtoJwtTokenKey))('test %s script', (key) => {
expect(
deepmerge(
{},
{
[key]: `${key}-test`,
}
)
).toEqual({
[key]: `${key}-test`,
});
});
});
});
describe('Test deploy custom JWT script', () => {
describe('Deploy script when both AccessToken & ClientCredentials scripts are existing', () => {
it.each(Object.values(LogtoJwtTokenKey))('deploy %s script', (key) => {
expect(
deepmerge(
{
[LogtoJwtTokenKey.AccessToken]: {
production: `${LogtoJwtTokenKey.AccessToken}-production`,
},
[LogtoJwtTokenKey.ClientCredentials]: {
production: `${LogtoJwtTokenKey.ClientCredentials}-production`,
},
},
{
[key]: {
production: `${key}-production-new`,
},
}
)
).toEqual({
[LogtoJwtTokenKey.AccessToken]: {
production: `${LogtoJwtTokenKey.AccessToken}-production${
key === LogtoJwtTokenKey.AccessToken ? '-new' : ''
}`,
},
[LogtoJwtTokenKey.ClientCredentials]: {
production: `${LogtoJwtTokenKey.ClientCredentials}-production${
key === LogtoJwtTokenKey.ClientCredentials ? '-new' : ''
}`,
},
});
});
});
describe('Deploy script:', () => {
// Test it.each() can not be nested, so we have to test each key separately.
it.each(Object.values(LogtoJwtTokenKey))(
`when ${LogtoJwtTokenKey.AccessToken} script is existing, deploy $s script`,
(deployingKey) => {
const existingKey = LogtoJwtTokenKey.AccessToken;
const existingScript = {
[existingKey]: {
production: `${existingKey}-production`,
},
};
expect(
deepmerge(existingScript, {
[deployingKey]: {
production: `${deployingKey}-production-new`,
},
})
).toEqual(
existingKey === deployingKey
? {
[existingKey]: {
production: `${existingKey}-production-new`,
},
}
: {
[existingKey]: {
production: `${existingKey}-production`,
},
[deployingKey]: {
production: `${deployingKey}-production-new`,
},
}
);
}
);
it.each(Object.values(LogtoJwtTokenKey))(
`when ${LogtoJwtTokenKey.ClientCredentials} script is existing, deploy $s script`,
(deployingKey) => {
const existingKey = LogtoJwtTokenKey.ClientCredentials;
const existingScript = {
[existingKey]: {
production: `${existingKey}-production`,
},
};
expect(
deepmerge(existingScript, {
[deployingKey]: {
production: `${deployingKey}-production-new`,
},
})
).toEqual(
existingKey === deployingKey
? {
[existingKey]: {
production: `${existingKey}-production-new`,
},
}
: {
[existingKey]: {
production: `${existingKey}-production`,
},
[deployingKey]: {
production: `${deployingKey}-production-new`,
},
}
);
}
);
});
describe('Deploy script when both AccessToken & ClientCredentials scripts are not existing', () => {
it.each(Object.values(LogtoJwtTokenKey))('deploy %s script', (key) => {
expect(
deepmerge(
{},
{
[key]: {
production: `${key}-production-new`,
},
}
)
).toEqual({
[key]: {
production: `${key}-production-new`,
},
});
});
});
});
describe('Test undeploy custom JWT script', () => {
describe('Undeploy script when both AccessToken & ClientCredentials scripts are existing', () => {
it.each(Object.values(LogtoJwtTokenKey))('undeploy %s script', (key) => {
expect(
deepmerge(
{
[LogtoJwtTokenKey.AccessToken]: {
production: `${LogtoJwtTokenKey.AccessToken}-production`,
},
[LogtoJwtTokenKey.ClientCredentials]: {
production: `${LogtoJwtTokenKey.ClientCredentials}-production`,
},
},
{
[key]: {
production: undefined,
},
}
)
).toEqual({
[LogtoJwtTokenKey.AccessToken]: {
production:
key === LogtoJwtTokenKey.AccessToken
? undefined
: `${LogtoJwtTokenKey.AccessToken}-production`,
},
[LogtoJwtTokenKey.ClientCredentials]: {
production:
key === LogtoJwtTokenKey.ClientCredentials
? undefined
: `${LogtoJwtTokenKey.ClientCredentials}-production`,
},
});
});
});
describe('Undeploy script:', () => {
// Test it.each() can not be nested, so we have to test each key separately.
it.each(Object.values(LogtoJwtTokenKey))(
`when ${LogtoJwtTokenKey.AccessToken} script is existing, undeploy $s script`,
(undeployingKey) => {
const existingKey = LogtoJwtTokenKey.AccessToken;
const existingScript = {
[existingKey]: {
production: `${existingKey}-production`,
},
};
expect(
deepmerge(existingScript, {
[undeployingKey]: {
production: undefined,
},
})
).toEqual(
existingKey === undeployingKey
? {
[existingKey]: {
production: undefined,
},
}
: {
[existingKey]: {
production: `${existingKey}-production`,
},
[undeployingKey]: {
production: undefined,
},
}
);
}
);
it.each(Object.values(LogtoJwtTokenKey))(
`when ${LogtoJwtTokenKey.ClientCredentials} script is existing, undeploy $s script`,
(undeployingKey) => {
const existingKey = LogtoJwtTokenKey.ClientCredentials;
const existingScript = {
[existingKey]: {
production: `${existingKey}-production`,
},
};
expect(
deepmerge(existingScript, {
[undeployingKey]: {
production: undefined,
},
})
).toEqual(
existingKey === undeployingKey
? {
[existingKey]: {
production: undefined,
},
}
: {
[existingKey]: {
production: `${existingKey}-production`,
},
[undeployingKey]: {
production: undefined,
},
}
);
}
);
});
});

View file

@ -10,12 +10,16 @@ import {
} from '@logto/schemas';
import { assert } from '@silverhand/essentials';
import chalk from 'chalk';
import deepmerge from 'deepmerge';
import { ZodError, z } from 'zod';
import RequestError from '#src/errors/RequestError/index.js';
import type Queries from '#src/tenants/Queries.js';
import { consoleLog } from '#src/utils/console.js';
import { getJwtCustomizerScripts } from '#src/utils/custom-jwt.js';
import {
getJwtCustomizerScripts,
type CustomJwtDeployRequestBody,
} from '#src/utils/custom-jwt/index.js';
import { type CloudConnectionLibrary } from './cloud-connection.js';
@ -143,14 +147,14 @@ export const createLogtoConfigLibrary = ({
* @params payload - The latest JWT customizer payload needs to be deployed.
* @params payload.key - The tokenType of the JWT customizer.
* @params payload.value - JWT customizer value
* @params payload.isTest - Whether the JWT customizer is for test environment.
* @params payload.useCase - The use case of JWT customizer script, can be either `test` or `production`.
*/
const deployJwtCustomizerScript = async <T extends LogtoJwtTokenKey>(
cloudConnection: CloudConnectionLibrary,
payload: {
key: T;
value: JwtCustomizerType[T];
isTest?: boolean;
useCase: 'test' | 'production';
}
) => {
const [client, jwtCustomizers] = await Promise.all([
@ -160,17 +164,24 @@ export const createLogtoConfigLibrary = ({
const customizerScriptsFromDatabase = getJwtCustomizerScripts(jwtCustomizers);
const newCustomizerScripts: { [key in LogtoJwtTokenKey]?: string } = {
[payload.key]: payload.value.script,
const newCustomizerScripts: CustomJwtDeployRequestBody = {
/**
* There are at most 4 custom JWT scripts in the `CustomJwtDeployRequestBody`-typed object,
* and can be indexed by `data[CustomJwtType][UseCase]`.
*
* Per our design, each script will be deployed as a API endpoint in the Cloudflare
* worker service. A production script will be deployed to `/api/custom-jwt`
* endpoint and a test script will be deployed to `/api/custom-jwt/test` endpoint.
*
* If the current use case is `test`, then the script should be deployed to a `/test` endpoint;
* otherwise, the script should be deployed to the `/api/custom-jwt` endpoint and overwrite
* previous handler of the API endpoint.
*/
[payload.key]: { [payload.useCase]: payload.value.script },
};
await client.put(`/api/services/custom-jwt/worker`, {
body: {
production: payload.isTest
? customizerScriptsFromDatabase
: { ...customizerScriptsFromDatabase, ...newCustomizerScripts },
test: payload.isTest ? newCustomizerScripts : undefined,
},
body: deepmerge(customizerScriptsFromDatabase, newCustomizerScripts),
});
};
@ -191,16 +202,17 @@ export const createLogtoConfigLibrary = ({
return;
}
// Remove the JWT customizer script from the existing JWT customizer scripts and redeploy.
// Remove the JWT customizer script (of given `key`) from the existing JWT customizer scripts and redeploy.
const customizerScriptsFromDatabase = getJwtCustomizerScripts(jwtCustomizers);
const newCustomizerScripts: CustomJwtDeployRequestBody = {
[key]: {
production: undefined,
test: undefined,
},
};
await client.put(`/api/services/custom-jwt/worker`, {
body: {
production: {
...customizerScriptsFromDatabase,
[key]: undefined,
},
},
body: deepmerge(customizerScriptsFromDatabase, newCustomizerScripts),
});
};

View file

@ -139,6 +139,7 @@ export const getExtraTokenClaimsForJwtCustomization = async (
// eslint-disable-next-line no-restricted-syntax
context: { user: logtoUserInfo as Record<string, Json> },
},
search: {},
});
} catch (error: unknown) {
const entry = new LogEntry(

View file

@ -60,6 +60,7 @@ describe('configs JWT customizer routes', () => {
{
key: LogtoJwtTokenKey.AccessToken,
value: mockJwtCustomizerConfigForAccessToken.value,
useCase: 'production',
}
);
@ -104,6 +105,7 @@ describe('configs JWT customizer routes', () => {
{
key: LogtoJwtTokenKey.AccessToken,
value: mockJwtCustomizerConfigForAccessToken.value,
useCase: 'production',
}
);
@ -168,12 +170,15 @@ describe('configs JWT customizer routes', () => {
{
key: LogtoJwtTokenKey.ClientCredentials,
value: payload,
isTest: true,
useCase: 'test',
}
);
expect(mockCloudClient.post).toHaveBeenCalledWith('/api/services/custom-jwt', {
body: payload,
search: {
isTest: 'true',
},
});
expect(response.status).toEqual(200);

View file

@ -86,6 +86,7 @@ export default function logtoConfigJwtCustomizerRoutes<T extends AuthedRouter>(
await deployJwtCustomizerScript(cloudConnection, {
key,
value: body,
useCase: 'production',
});
}
@ -129,6 +130,7 @@ export default function logtoConfigJwtCustomizerRoutes<T extends AuthedRouter>(
await deployJwtCustomizerScript(cloudConnection, {
key,
value: body,
useCase: 'production',
});
}
@ -228,7 +230,7 @@ export default function logtoConfigJwtCustomizerRoutes<T extends AuthedRouter>(
? LogtoJwtTokenKey.AccessToken
: LogtoJwtTokenKey.ClientCredentials,
value: body,
isTest: true,
useCase: 'test',
});
const client = await cloudConnection.getClient();
@ -236,6 +238,7 @@ export default function logtoConfigJwtCustomizerRoutes<T extends AuthedRouter>(
try {
ctx.body = await client.post(`/api/services/custom-jwt`, {
body,
search: { isTest: 'true' },
});
} catch (error: unknown) {
/**

View file

@ -1,8 +1,10 @@
import { LogtoJwtTokenKey, type JwtCustomizerType } from '@logto/schemas';
import { type CustomJwtDeployRequestBody } from './types.js';
export const getJwtCustomizerScripts = (jwtCustomizers: Partial<JwtCustomizerType>) => {
// eslint-disable-next-line no-restricted-syntax -- enable to infer the type using `Object.fromEntries`
return Object.fromEntries(
Object.values(LogtoJwtTokenKey).map((key) => [key, jwtCustomizers[key]?.script])
) as { [key in LogtoJwtTokenKey]?: string };
Object.values(LogtoJwtTokenKey).map((key) => [key, { production: jwtCustomizers[key]?.script }])
) as CustomJwtDeployRequestBody;
};

View file

@ -0,0 +1,2 @@
export * from './custom-jwt.js';
export * from './types.js';

View file

@ -0,0 +1,8 @@
import type router from '@logto/cloud/routes';
import { type GuardedPayload, type RouterRoutes } from '@withtyped/client';
type PutRoutes = RouterRoutes<typeof router>['put'];
export type CustomJwtDeployRequestBody = GuardedPayload<
PutRoutes['/api/services/custom-jwt/worker']
>['body'];

19
pnpm-lock.yaml generated
View file

@ -1211,8 +1211,8 @@ importers:
version: 3.22.4
devDependencies:
'@logto/cloud':
specifier: 0.2.5-821690c
version: 0.2.5-821690c(zod@3.22.4)
specifier: 0.2.5-e5d8200
version: 0.2.5-e5d8200(zod@3.22.4)
'@rollup/plugin-commonjs':
specifier: ^25.0.7
version: 25.0.7(rollup@4.12.0)
@ -2688,8 +2688,8 @@ importers:
specifier: ^29.5.0
version: 29.5.0
'@logto/cloud':
specifier: 0.2.5-821690c
version: 0.2.5-821690c(zod@3.22.4)
specifier: 0.2.5-e5d8200
version: 0.2.5-e5d8200(zod@3.22.4)
'@logto/connector-kit':
specifier: workspace:^3.0.0
version: link:../toolkit/connector-kit
@ -3184,8 +3184,8 @@ importers:
version: 3.22.4
devDependencies:
'@logto/cloud':
specifier: 0.2.5-821690c
version: 0.2.5-821690c(zod@3.22.4)
specifier: 0.2.5-e5d8200
version: 0.2.5-e5d8200(zod@3.22.4)
'@silverhand/eslint-config':
specifier: 6.0.1
version: 6.0.1(eslint@8.57.0)(prettier@3.0.0)(typescript@5.3.3)
@ -6690,8 +6690,8 @@ packages:
jose: 5.2.2
dev: true
/@logto/cloud@0.2.5-821690c(zod@3.22.4):
resolution: {integrity: sha512-eVTlJxknWbvmaeaitKzPPMTx6C4GK4TLTb97hFr91E2u6SwKP+csE3oMBgL7ZdoDLOGG+nY+j08JpVMQ8QdOWw==}
/@logto/cloud@0.2.5-e5d8200(zod@3.22.4):
resolution: {integrity: sha512-/ZPaiIU7ORfKtNqsopVg4jxDt/sM6CGAGny06ppv/2FNsL7h8rX6JXOUyyKmT6ffCh/K/5s2HZe7v86zx5gENQ==}
engines: {node: ^20.9.0}
dependencies:
'@silverhand/essentials': 2.9.0
@ -17833,6 +17833,9 @@ packages:
resolution: {integrity: sha512-2GTVocFkwblV/TIg9AmT7TI2fO4xdWkyN8aFUEVtiVNWt96GTR3FgQyHFValfCbcj1k9Xf962Ws2hYXYUr9k1Q==}
engines: {node: '>= 12.0.0'}
hasBin: true
peerDependenciesMeta:
'@parcel/core':
optional: true
dependencies:
'@parcel/config-default': 2.9.3(@parcel/core@2.9.3)(postcss@8.4.31)
'@parcel/core': 2.9.3