New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More
Socket
Sign inDemoInstall
Socket

@backstage/integration

Package Overview
Dependencies
Maintainers
4
Versions
1002
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@backstage/integration - npm Package Compare versions

Comparing version

to
0.3.0

75

CHANGELOG.md
# @backstage/integration
## 0.3.0
### Minor Changes
- ed6baab66: - Deprecating the `scaffolder.${provider}.token` auth duplication and favoring `integrations.${provider}` instead. If you receive deprecation warnings your config should change like the following:
```yaml
scaffolder:
github:
token:
$env: GITHUB_TOKEN
visibility: public
```
To something that looks like this:
```yaml
integration:
github:
- host: github.com
token:
$env: GITHUB_TOKEN
scaffolder:
github:
visibility: public
```
You can also configure multiple different hosts under the `integration` config like the following:
```yaml
integration:
github:
- host: github.com
token:
$env: GITHUB_TOKEN
- host: ghe.mycompany.com
token:
$env: GITHUB_ENTERPRISE_TOKEN
```
This of course is the case for all the providers respectively.
- Adding support for cross provider scaffolding, you can now create repositories in for example Bitbucket using a template residing in GitHub.
- Fix GitLab scaffolding so that it returns a `catalogInfoUrl` which automatically imports the project into the catalog.
- The `Store Path` field on the `scaffolder` frontend has now changed so that you require the full URL to the desired destination repository.
`backstage/new-repository` would become `https://github.com/backstage/new-repository` if provider was GitHub for example.
### Patch Changes
- 0b135e7e0: Add support for GitHub Apps authentication for backend plugins.
`GithubCredentialsProvider` requests and caches GitHub credentials based on a repository or organization url.
The `GithubCredentialsProvider` class should be considered stateful since tokens will be cached internally.
Consecutive calls to get credentials will return the same token, tokens older than 50 minutes will be considered expired and reissued.
`GithubCredentialsProvider` will default to the configured access token if no GitHub Apps are configured.
More information on how to create and configure a GitHub App to use with backstage can be found in the documentation.
Usage:
```javascript
const credentialsProvider = new GithubCredentialsProvider(config);
const { token, headers } = await credentialsProvider.getCredentials({
url: 'https://github.com/',
});
```
Updates `GithubUrlReader` to use the `GithubCredentialsProvider`.
- fa8ba330a: Fix GitLab API base URL and add it by default to the gitlab.com host
## 0.2.0

@@ -4,0 +79,0 @@

100

config.d.ts

@@ -18,29 +18,115 @@ /*

export interface Config {
/** Configuration for integrations towards various external repository provider systems */
integrations?: {
/** Integration configuration for Azure */
azure?: Array<{
/** @visibility frontend */
/**
* The hostname of the given Azure instance
* @visibility frontend
*/
host: string;
/**
* Token used to authenticate requests.
* @visibility secret
*/
token?: string;
}>;
/** Integration configuration for Bitbucket */
bitbucket?: Array<{
/** @visibility frontend */
/**
* The hostname of the given Bitbucket instance
* @visibility frontend
*/
host: string;
/** @visibility frontend */
/**
* Token used to authenticate requests.
* @visibility secret
*/
token?: string;
/**
* The base url for the Bitbucket API, for example https://api.bitbucket.org/2.0
* @visibility frontend
*/
apiBaseUrl?: string;
/**
* The username to use for authenticated requests.
* @visibility secret
*/
username?: string;
/**
* Bitbucket app password used to authenticate requests.
* @visibility secret
*/
appPassword?: string;
}>;
/** Integration configuration for GitHub */
github?: Array<{
/** @visibility frontend */
/**
* The hostname of the given GitHub instance
* @visibility frontend
*/
host: string;
/** @visibility frontend */
/**
* Token used to authenticate requests.
* @visibility secret
*/
token?: string;
/**
* The base url for the GitHub API, for example https://api.github.com
* @visibility frontend
*/
apiBaseUrl?: string;
/** @visibility frontend */
/**
* The base url for GitHub raw resources, for example https://raw.githubusercontent.com
* @visibility frontend
*/
rawBaseUrl?: string;
/**
* GitHub Apps configuration
* @visibility backend
*/
apps?: Array<{
/**
* The numeric GitHub App ID
*/
appId: number;
/**
* The private key to use for auth against the app
* @visibility secret
*/
privateKey: string;
/**
* The secret used for webhooks
* @visibility secret
*/
webhookSecret: string;
/**
* The client ID to use
*/
clientId: string;
/**
* The client secret to use
* @visibility secret
*/
clientSecret: string;
}>;
}>;
/** Integration configuration for GitLab */
gitlab?: Array<{
/** @visibility frontend */
/**
* The hostname of the given GitLab instance
* @visibility frontend
*/
host: string;
/**
* Token used to authenticate requests.
* @visibility secret
*/
token?: string;
}>;
};
}

@@ -7,2 +7,5 @@ 'use strict';

var fetch = require('cross-fetch');
var authApp = require('@octokit/auth-app');
var rest = require('@octokit/rest');
var luxon = require('luxon');

@@ -101,2 +104,38 @@ function _interopDefaultLegacy (e) { return e && typeof e === 'object' && 'default' in e ? e : { 'default': e }; }

}
function getAzureCommitsUrl(url) {
var _a;
try {
const parsedUrl = new URL(url);
const [
empty,
userOrOrg,
project,
srcKeyword,
repoName
] = parsedUrl.pathname.split("/");
const ref = (_a = parsedUrl.searchParams.get("version")) == null ? void 0 : _a.substr(2);
if (!!empty || !userOrOrg || !project || srcKeyword !== "_git" || !repoName) {
throw new Error("Wrong Azure Devops URL");
}
parsedUrl.pathname = [
empty,
userOrOrg,
project,
"_apis",
"git",
"repositories",
repoName,
"commits"
].join("/");
const queryParams = [];
if (ref) {
queryParams.push(`searchCriteria.itemVersion.version=${ref}`);
}
parsedUrl.search = queryParams.join("&");
parsedUrl.protocol = "https";
return parsedUrl.toString();
} catch (e) {
throw new Error(`Incorrect URL: ${url}, ${e}`);
}
}
function getAzureRequestOptions(config2, additionalHeaders) {

@@ -222,3 +261,3 @@ const headers = additionalHeaders ? {...additionalHeaders} : {};

function readGitHubIntegrationConfig(config2) {
var _a;
var _a, _b;
const host = (_a = config2.getOptionalString("host")) != null ? _a : GITHUB_HOST;

@@ -228,2 +267,9 @@ let apiBaseUrl = config2.getOptionalString("apiBaseUrl");

const token = config2.getOptionalString("token");
const apps = (_b = config2.getOptionalConfigArray("apps")) == null ? void 0 : _b.map((c) => ({
appId: c.getNumber("appId"),
clientId: c.getString("clientId"),
clientSecret: c.getString("clientSecret"),
webhookSecret: c.getString("webhookSecret"),
privateKey: c.getString("privateKey")
}));
if (!isValidHost(host)) {

@@ -242,3 +288,3 @@ throw new Error(`Invalid GitHub integration config, '${host}' is not a valid host`);

}
return {host, apiBaseUrl, rawBaseUrl, token};
return {host, apiBaseUrl, rawBaseUrl, token, apps};
}

@@ -289,9 +335,145 @@ function readGitHubIntegrationConfigs(configs) {

class Cache {
constructor() {
this.tokenCache = new Map();
this.isNotExpired = (date) => date.diff(luxon.DateTime.local(), "minutes").minutes > 50;
}
async getOrCreateToken(key, supplier) {
const item = this.tokenCache.get(key);
if (item && this.isNotExpired(item.expiresAt)) {
return {accessToken: item.token};
}
const result = await supplier();
this.tokenCache.set(key, result);
return {accessToken: result.token};
}
}
const HEADERS = {
Accept: "application/vnd.github.machine-man-preview+json"
};
class GithubAppManager {
constructor(config2, baseUrl) {
this.cache = new Cache();
this.baseAuthConfig = {
appId: config2.appId,
privateKey: config2.privateKey
};
this.appClient = new rest.Octokit({
baseUrl,
headers: HEADERS,
authStrategy: authApp.createAppAuth,
auth: this.baseAuthConfig
});
}
async getInstallationCredentials(owner, repo) {
const {
installationId,
suspended,
repositorySelection
} = await this.getInstallationData(owner);
if (suspended) {
throw new Error(`The GitHub application for ${[owner, repo].filter(Boolean).join("/")} is suspended`);
}
if (repositorySelection !== "all" && !repo) {
throw new Error(`The Backstage GitHub application used in the ${owner} organization must be installed for the entire organization to be able to issue credentials without a specified repository.`);
}
const cacheKey = !repo ? owner : `${owner}/${repo}`;
const repositories = repositorySelection !== "all" ? [repo] : void 0;
return this.cache.getOrCreateToken(cacheKey, async () => {
const result = await this.appClient.apps.createInstallationAccessToken({
installation_id: installationId,
headers: HEADERS,
repositories
});
return {
token: result.data.token,
expiresAt: luxon.DateTime.fromISO(result.data.expires_at)
};
});
}
async getInstallationData(owner) {
var _a, _b;
try {
this.installations = await this.appClient.apps.listInstallations({
headers: {
"If-None-Match": (_a = this.installations) == null ? void 0 : _a.headers.etag,
Accept: HEADERS.Accept
}
});
} catch (error) {
if (error.status !== 304) {
throw error;
}
}
const installation = (_b = this.installations) == null ? void 0 : _b.data.find((inst) => {
var _a2;
return ((_a2 = inst.account) == null ? void 0 : _a2.login) === owner;
});
if (installation) {
return {
installationId: installation.id,
suspended: Boolean(installation.suspended_by),
repositorySelection: installation.repository_selection
};
}
const notFoundError = new Error(`No app installation found for ${owner} in ${this.baseAuthConfig.appId}`);
notFoundError.name = "NotFoundError";
throw notFoundError;
}
}
class GithubAppCredentialsMux {
constructor(config2) {
var _a, _b;
this.apps = (_b = (_a = config2.apps) == null ? void 0 : _a.map((ac) => new GithubAppManager(ac, config2.apiBaseUrl))) != null ? _b : [];
}
async getAppToken(owner, repo) {
if (this.apps.length === 0) {
return void 0;
}
const results = await Promise.all(this.apps.map((app) => app.getInstallationCredentials(owner, repo).then((credentials) => ({credentials, error: void 0}), (error) => ({credentials: void 0, error}))));
const result = results.find((result2) => result2.credentials);
if (result) {
return result.credentials.accessToken;
}
const errors = results.map((r) => r.error);
const notNotFoundError = errors.find((err) => err.name !== "NotFoundError");
if (notNotFoundError) {
throw notNotFoundError;
}
return void 0;
}
}
class GithubCredentialsProvider {
constructor(githubAppCredentialsMux, token) {
this.githubAppCredentialsMux = githubAppCredentialsMux;
this.token = token;
}
static create(config2) {
return new GithubCredentialsProvider(new GithubAppCredentialsMux(config2), config2.token);
}
async getCredentials(opts) {
const parsed = parseGitUrl__default['default'](opts.url);
const owner = parsed.owner || parsed.name;
const repo = parsed.owner ? parsed.name : void 0;
let token = await this.githubAppCredentialsMux.getAppToken(owner, repo);
if (!token) {
token = this.token;
}
return {
headers: token ? {
Authorization: `Bearer ${token}`
} : void 0,
token
};
}
}
const GITLAB_HOST = "gitlab.com";
const GITLAB_API_BASE_URL = "gitlab.com/api/v4";
const GITLAB_API_BASE_URL = "https://gitlab.com/api/v4";
function readGitLabIntegrationConfig(config2) {
var _a;
var _a, _b;
const host = (_a = config2.getOptionalString("host")) != null ? _a : GITLAB_HOST;
let apiBaseUrl = config2.getOptionalString("apiBaseUrl");
const token = config2.getOptionalString("token");
const baseUrl = (_b = config2.getOptionalString("baseUrl")) != null ? _b : `https://${host}`;
if (!isValidHost(host)) {

@@ -305,3 +487,3 @@ throw new Error(`Invalid GitLab integration config, '${host}' is not a valid host`);

}
return {host, token, apiBaseUrl};
return {host, token, apiBaseUrl, baseUrl};
}

@@ -311,3 +493,3 @@ function readGitLabIntegrationConfigs(configs) {

if (!result.some((c) => c.host === GITLAB_HOST)) {
result.push({host: GITLAB_HOST});
result.push({host: GITLAB_HOST, apiBaseUrl: GITLAB_API_BASE_URL});
}

@@ -507,3 +689,5 @@ return result;

exports.GithubCredentialsProvider = GithubCredentialsProvider;
exports.ScmIntegrations = ScmIntegrations;
exports.getAzureCommitsUrl = getAzureCommitsUrl;
exports.getAzureDownloadUrl = getAzureDownloadUrl;

@@ -510,0 +694,0 @@ exports.getAzureFileFetchUrl = getAzureFileFetchUrl;

@@ -53,2 +53,8 @@ import { Config } from '@backstage/config';

/**
* Given a URL, return the API URL to fetch commits on the branch.
*
* @param url A URL pointing to a repository or a sub-path
*/
declare function getAzureCommitsUrl(url: string): string;
/**
* Gets the request options necessary to make requests to a given provider.

@@ -179,4 +185,37 @@ *

token?: string;
/**
* The GitHub Apps configuration to use for requests to this provider.
*
* If no apps are specified, token or anonymous is used.
*/
apps?: GithubAppConfig[];
};
/**
* The configuration parameters for authenticating a GitHub Application.
* A Github Apps configuration can be generated using the `backstage-cli create-github-app` command.
*/
declare type GithubAppConfig = {
/**
* Unique app identifier, found at https://github.com/organizations/$org/settings/apps/$AppName
*/
appId: number;
/**
* The private key is used by the GitHub App integration to authenticate the app.
* A private key can be generated from the app at https://github.com/organizations/$org/settings/apps/$AppName
*/
privateKey: string;
/**
* Webhook secret can be configured at https://github.com/organizations/$org/settings/apps/$AppName
*/
webhookSecret: string;
/**
* Found at https://github.com/organizations/$org/settings/apps/$AppName
*/
clientId: string;
/**
* Client secrets can be generated at https://github.com/organizations/$org/settings/apps/$AppName
*/
clientSecret: string;
};
/**
* Reads a single GitHub integration config.

@@ -215,2 +254,27 @@ *

declare type GithubCredentials = {
headers?: {
[name: string]: string;
};
token?: string;
};
declare class GithubCredentialsProvider {
private readonly githubAppCredentialsMux;
private readonly token?;
static create(config: GitHubIntegrationConfig): GithubCredentialsProvider;
private constructor();
/**
* Returns GithubCredentials for requested url.
* Consecutive calls to this method with the same url will return cached credentials.
* The shortest lifetime for a token returned is 10 minutes.
* @param opts containing the organization or repository url
* @returns {Promise} of @type {GithubCredentials}.
* @example
* const { token, headers } = await getCredentials({url: 'github.com/backstage/foobar'})
*/
getCredentials(opts: {
url: string;
}): Promise<GithubCredentials>;
}
/**

@@ -240,2 +304,9 @@ * The configuration parameters for a single GitLab integration.

token?: string;
/**
* The baseUrl of this provider, e.g "https://gitlab.com",
* which is passed into the gitlab client.
*
* If no baseUrl is provided, it will default to https://${host}
*/
baseUrl?: string;
};

@@ -381,2 +452,2 @@ /**

export { AzureIntegrationConfig, BitbucketIntegrationConfig, GitHubIntegrationConfig, GitLabIntegrationConfig, ScmIntegration, ScmIntegrationRegistry, ScmIntegrations, getAzureDownloadUrl, getAzureFileFetchUrl, getAzureRequestOptions, getBitbucketDefaultBranch, getBitbucketDownloadUrl, getBitbucketFileFetchUrl, getBitbucketRequestOptions, getGitHubFileFetchUrl, getGitHubRequestOptions, getGitLabFileFetchUrl, getGitLabRequestOptions, readAzureIntegrationConfig, readAzureIntegrationConfigs, readBitbucketIntegrationConfig, readBitbucketIntegrationConfigs, readGitHubIntegrationConfig, readGitHubIntegrationConfigs, readGitLabIntegrationConfig, readGitLabIntegrationConfigs };
export { AzureIntegrationConfig, BitbucketIntegrationConfig, GitHubIntegrationConfig, GitLabIntegrationConfig, GithubCredentialsProvider, ScmIntegration, ScmIntegrationRegistry, ScmIntegrations, getAzureCommitsUrl, getAzureDownloadUrl, getAzureFileFetchUrl, getAzureRequestOptions, getBitbucketDefaultBranch, getBitbucketDownloadUrl, getBitbucketFileFetchUrl, getBitbucketRequestOptions, getGitHubFileFetchUrl, getGitHubRequestOptions, getGitLabFileFetchUrl, getGitLabRequestOptions, readAzureIntegrationConfig, readAzureIntegrationConfigs, readBitbucketIntegrationConfig, readBitbucketIntegrationConfigs, readGitHubIntegrationConfig, readGitHubIntegrationConfigs, readGitLabIntegrationConfig, readGitLabIntegrationConfigs };
import parseGitUrl from 'git-url-parse';
import fetch from 'cross-fetch';
import { createAppAuth } from '@octokit/auth-app';
import { Octokit } from '@octokit/rest';
import { DateTime } from 'luxon';

@@ -91,2 +94,38 @@ function isValidHost(url) {

}
function getAzureCommitsUrl(url) {
var _a;
try {
const parsedUrl = new URL(url);
const [
empty,
userOrOrg,
project,
srcKeyword,
repoName
] = parsedUrl.pathname.split("/");
const ref = (_a = parsedUrl.searchParams.get("version")) == null ? void 0 : _a.substr(2);
if (!!empty || !userOrOrg || !project || srcKeyword !== "_git" || !repoName) {
throw new Error("Wrong Azure Devops URL");
}
parsedUrl.pathname = [
empty,
userOrOrg,
project,
"_apis",
"git",
"repositories",
repoName,
"commits"
].join("/");
const queryParams = [];
if (ref) {
queryParams.push(`searchCriteria.itemVersion.version=${ref}`);
}
parsedUrl.search = queryParams.join("&");
parsedUrl.protocol = "https";
return parsedUrl.toString();
} catch (e) {
throw new Error(`Incorrect URL: ${url}, ${e}`);
}
}
function getAzureRequestOptions(config2, additionalHeaders) {

@@ -212,3 +251,3 @@ const headers = additionalHeaders ? {...additionalHeaders} : {};

function readGitHubIntegrationConfig(config2) {
var _a;
var _a, _b;
const host = (_a = config2.getOptionalString("host")) != null ? _a : GITHUB_HOST;

@@ -218,2 +257,9 @@ let apiBaseUrl = config2.getOptionalString("apiBaseUrl");

const token = config2.getOptionalString("token");
const apps = (_b = config2.getOptionalConfigArray("apps")) == null ? void 0 : _b.map((c) => ({
appId: c.getNumber("appId"),
clientId: c.getString("clientId"),
clientSecret: c.getString("clientSecret"),
webhookSecret: c.getString("webhookSecret"),
privateKey: c.getString("privateKey")
}));
if (!isValidHost(host)) {

@@ -232,3 +278,3 @@ throw new Error(`Invalid GitHub integration config, '${host}' is not a valid host`);

}
return {host, apiBaseUrl, rawBaseUrl, token};
return {host, apiBaseUrl, rawBaseUrl, token, apps};
}

@@ -279,9 +325,145 @@ function readGitHubIntegrationConfigs(configs) {

class Cache {
constructor() {
this.tokenCache = new Map();
this.isNotExpired = (date) => date.diff(DateTime.local(), "minutes").minutes > 50;
}
async getOrCreateToken(key, supplier) {
const item = this.tokenCache.get(key);
if (item && this.isNotExpired(item.expiresAt)) {
return {accessToken: item.token};
}
const result = await supplier();
this.tokenCache.set(key, result);
return {accessToken: result.token};
}
}
const HEADERS = {
Accept: "application/vnd.github.machine-man-preview+json"
};
class GithubAppManager {
constructor(config2, baseUrl) {
this.cache = new Cache();
this.baseAuthConfig = {
appId: config2.appId,
privateKey: config2.privateKey
};
this.appClient = new Octokit({
baseUrl,
headers: HEADERS,
authStrategy: createAppAuth,
auth: this.baseAuthConfig
});
}
async getInstallationCredentials(owner, repo) {
const {
installationId,
suspended,
repositorySelection
} = await this.getInstallationData(owner);
if (suspended) {
throw new Error(`The GitHub application for ${[owner, repo].filter(Boolean).join("/")} is suspended`);
}
if (repositorySelection !== "all" && !repo) {
throw new Error(`The Backstage GitHub application used in the ${owner} organization must be installed for the entire organization to be able to issue credentials without a specified repository.`);
}
const cacheKey = !repo ? owner : `${owner}/${repo}`;
const repositories = repositorySelection !== "all" ? [repo] : void 0;
return this.cache.getOrCreateToken(cacheKey, async () => {
const result = await this.appClient.apps.createInstallationAccessToken({
installation_id: installationId,
headers: HEADERS,
repositories
});
return {
token: result.data.token,
expiresAt: DateTime.fromISO(result.data.expires_at)
};
});
}
async getInstallationData(owner) {
var _a, _b;
try {
this.installations = await this.appClient.apps.listInstallations({
headers: {
"If-None-Match": (_a = this.installations) == null ? void 0 : _a.headers.etag,
Accept: HEADERS.Accept
}
});
} catch (error) {
if (error.status !== 304) {
throw error;
}
}
const installation = (_b = this.installations) == null ? void 0 : _b.data.find((inst) => {
var _a2;
return ((_a2 = inst.account) == null ? void 0 : _a2.login) === owner;
});
if (installation) {
return {
installationId: installation.id,
suspended: Boolean(installation.suspended_by),
repositorySelection: installation.repository_selection
};
}
const notFoundError = new Error(`No app installation found for ${owner} in ${this.baseAuthConfig.appId}`);
notFoundError.name = "NotFoundError";
throw notFoundError;
}
}
class GithubAppCredentialsMux {
constructor(config2) {
var _a, _b;
this.apps = (_b = (_a = config2.apps) == null ? void 0 : _a.map((ac) => new GithubAppManager(ac, config2.apiBaseUrl))) != null ? _b : [];
}
async getAppToken(owner, repo) {
if (this.apps.length === 0) {
return void 0;
}
const results = await Promise.all(this.apps.map((app) => app.getInstallationCredentials(owner, repo).then((credentials) => ({credentials, error: void 0}), (error) => ({credentials: void 0, error}))));
const result = results.find((result2) => result2.credentials);
if (result) {
return result.credentials.accessToken;
}
const errors = results.map((r) => r.error);
const notNotFoundError = errors.find((err) => err.name !== "NotFoundError");
if (notNotFoundError) {
throw notNotFoundError;
}
return void 0;
}
}
class GithubCredentialsProvider {
constructor(githubAppCredentialsMux, token) {
this.githubAppCredentialsMux = githubAppCredentialsMux;
this.token = token;
}
static create(config2) {
return new GithubCredentialsProvider(new GithubAppCredentialsMux(config2), config2.token);
}
async getCredentials(opts) {
const parsed = parseGitUrl(opts.url);
const owner = parsed.owner || parsed.name;
const repo = parsed.owner ? parsed.name : void 0;
let token = await this.githubAppCredentialsMux.getAppToken(owner, repo);
if (!token) {
token = this.token;
}
return {
headers: token ? {
Authorization: `Bearer ${token}`
} : void 0,
token
};
}
}
const GITLAB_HOST = "gitlab.com";
const GITLAB_API_BASE_URL = "gitlab.com/api/v4";
const GITLAB_API_BASE_URL = "https://gitlab.com/api/v4";
function readGitLabIntegrationConfig(config2) {
var _a;
var _a, _b;
const host = (_a = config2.getOptionalString("host")) != null ? _a : GITLAB_HOST;
let apiBaseUrl = config2.getOptionalString("apiBaseUrl");
const token = config2.getOptionalString("token");
const baseUrl = (_b = config2.getOptionalString("baseUrl")) != null ? _b : `https://${host}`;
if (!isValidHost(host)) {

@@ -295,3 +477,3 @@ throw new Error(`Invalid GitLab integration config, '${host}' is not a valid host`);

}
return {host, token, apiBaseUrl};
return {host, token, apiBaseUrl, baseUrl};
}

@@ -301,3 +483,3 @@ function readGitLabIntegrationConfigs(configs) {

if (!result.some((c) => c.host === GITLAB_HOST)) {
result.push({host: GITLAB_HOST});
result.push({host: GITLAB_HOST, apiBaseUrl: GITLAB_API_BASE_URL});
}

@@ -497,3 +679,3 @@ return result;

export { ScmIntegrations, getAzureDownloadUrl, getAzureFileFetchUrl, getAzureRequestOptions, getBitbucketDefaultBranch, getBitbucketDownloadUrl, getBitbucketFileFetchUrl, getBitbucketRequestOptions, getGitHubFileFetchUrl, getGitHubRequestOptions, getGitLabFileFetchUrl, getGitLabRequestOptions, readAzureIntegrationConfig, readAzureIntegrationConfigs, readBitbucketIntegrationConfig, readBitbucketIntegrationConfigs, readGitHubIntegrationConfig, readGitHubIntegrationConfigs, readGitLabIntegrationConfig, readGitLabIntegrationConfigs };
export { GithubCredentialsProvider, ScmIntegrations, getAzureCommitsUrl, getAzureDownloadUrl, getAzureFileFetchUrl, getAzureRequestOptions, getBitbucketDefaultBranch, getBitbucketDownloadUrl, getBitbucketFileFetchUrl, getBitbucketRequestOptions, getGitHubFileFetchUrl, getGitHubRequestOptions, getGitLabFileFetchUrl, getGitLabRequestOptions, readAzureIntegrationConfig, readAzureIntegrationConfigs, readBitbucketIntegrationConfig, readBitbucketIntegrationConfigs, readGitHubIntegrationConfig, readGitHubIntegrationConfigs, readGitLabIntegrationConfig, readGitLabIntegrationConfigs };
//# sourceMappingURL=index.esm.js.map

12

package.json
{
"name": "@backstage/integration",
"version": "0.2.0",
"version": "0.3.0",
"main": "dist/index.cjs.js",

@@ -33,9 +33,13 @@ "types": "dist/index.d.ts",

"@backstage/config": "^0.1.2",
"@octokit/auth-app": "^2.10.5",
"@octokit/rest": "^18.0.12",
"cross-fetch": "^3.0.6",
"git-url-parse": "^11.4.3"
"git-url-parse": "^11.4.3",
"luxon": "^1.25.0"
},
"devDependencies": {
"@backstage/cli": "^0.4.6",
"@backstage/cli": "^0.4.7",
"@backstage/test-utils": "^0.1.5",
"@types/jest": "^26.0.7",
"@types/luxon": "^1.25.0",
"msw": "^0.21.2"

@@ -48,4 +52,4 @@ },

"configSchema": "config.d.ts",
"gitHead": "78a04ec03473ae52e3bff84d61e75c6aaaeee261",
"gitHead": "52df679661a17c595a1288a1550b6e9f2dca5de6",
"module": "dist/index.esm.js"
}

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet