diff --git a/website/README.md b/website/README.md
index 94ee1fc85667..1ba095b62e86 100644
--- a/website/README.md
+++ b/website/README.md
@@ -80,6 +80,24 @@ The significant keys in the YAML frontmatter are:
> ⚠️Since `api` is a reserved directory within NextJS, all `/api/**` pages are
> listed under the `/pages/api-docs` path.
+### Code Highlighting
+
+Code is highlighted using [prism](https://prismjs.com/). Feel free to check out [all the supported languages](https://prismjs.com/#supported-languages) that can be used for code blocks. All code blocks should be tagged with a language as such:
+
+````md
+```language
+// code to be highlighted
+```
+````
+
+If you have a code block that displays a command intended to be run from the terminal, it can be tagged with `shell-session`. This is distinct from `shell` which should represent a shell script. The following example shows a correctly formatted terminal command snippet:
+
+````md
+```shell-session
+$ cowsay "hello world"
+```
+````
+
### Editing Sidebars
The structure of the sidebars are controlled by files in the [`/data`
@@ -105,7 +123,7 @@ links to the binaries and will not compile. So this version number should be
changed _only after a release_.
The `data/version.js` also contains a global variable, `CHANGELOG_URL`, that
-should be updated to point to the latest changelog URL for the particular
+should be updated to point to the latest changelog URL for the particular
release version. The URL should be based off the `master` blob such that
it always reflects the most up-to-date changes.
@@ -161,6 +179,9 @@ present by default with markdown, detailed below:
include](https://github.com/hashicorp/remark-plugins/tree/master/plugins/include-markdown#include-markdown-plugin).
It's worth noting as well that all includes resolve from
`website/pages/partials` by default.
+
+ > **Note:** Changes to partials will not trigger a hot reload in development
+
- If you see `# Headline ((#slug))`, this is an example of an [anchor link
alias](https://github.com/hashicorp/remark-plugins/tree/je.anchor-link-adjustments/plugins/anchor-links#anchor-link-aliases).
It adds an extra permalink to a headline for compatibility and is removed from
@@ -193,6 +214,12 @@ present by default with markdown, detailed below:
items, make sure to tag someone from the digital marketing development team on
your pull request, they will help to ensure as much compatibility as possible.
+There are also some custom components available for use within markdown files, see
+the links below for more information on usage:
+
+- [Enterprise Alert](components/enterprise-alert/README.md)
+- [Tabs](components/tabs/README.md)
+
### Redirects
This website structures URLs based on the filesystem layout. This means that if a
diff --git a/website/_redirects b/website/_redirects
index 73672f65a430..f1c82a71a610 100644
--- a/website/_redirects
+++ b/website/_redirects
@@ -1,3 +1,9 @@
+
+# REDIRECTS FILE
+#
+# See https://www.netlify.com/docs/redirects/ for documentation. Please do not
+# modify or delete existing redirects without first verifying internally.
+
/downloads.html /downloads 301!
/community.html /community 301!
/api-docs/index /api-docs 301!
diff --git a/website/components/docs-page/img/github-icon.svg b/website/components/docs-page/img/github-icon.svg
deleted file mode 100644
index db631454102e..000000000000
--- a/website/components/docs-page/img/github-icon.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/website/components/docs-page/index.jsx b/website/components/docs-page/index.jsx
deleted file mode 100644
index c03249042583..000000000000
--- a/website/components/docs-page/index.jsx
+++ /dev/null
@@ -1,57 +0,0 @@
-import DocsSidenav from '@hashicorp/react-docs-sidenav'
-import Content from '@hashicorp/react-content'
-import InlineSvg from '@hashicorp/react-inline-svg'
-import githubIcon from './img/github-icon.svg?include'
-import Link from 'next/link'
-import Head from 'next/head'
-import HashiHead from '@hashicorp/react-head'
-
-export default function DocsPage({
- children,
- path,
- orderData,
- frontMatter,
- category,
- pageMeta
-}) {
- return (
-
-
- {pageMeta.deprecated && }
-
-
-
-
- )
-}
-
-export async function getInitialProps({ asPath }) {
- return { path: asPath }
-}
diff --git a/website/components/docs-page/style.css b/website/components/docs-page/style.css
deleted file mode 100644
index 7f2e761e70a8..000000000000
--- a/website/components/docs-page/style.css
+++ /dev/null
@@ -1,81 +0,0 @@
-#p-docs {
- & .content-wrap {
- display: flex;
- flex-direction: column;
- flex-wrap: wrap;
- flex: 1 0 auto;
- position: relative;
- width: 100%;
-
- @media (min-width: 940px) {
- flex-direction: row;
- margin-top: 72px;
- margin-bottom: 24px;
- }
- }
-
- & #inner {
- @media screen {
- margin: 64px 0;
- overflow: auto;
- width: 100%;
- }
-
- @media (min-width: 940px) {
- flex: 1;
- margin: 0;
- }
-
- & .g-content {
- @media (max-width: 939px) {
- padding-left: 0;
- padding-right: 0;
- }
-
- & > h1:first-child {
- margin-top: 0;
- }
- }
-
- & .g-section-header {
- margin-bottom: 100px;
- }
-
- /* TODO: this should be applied in global styles, temporary override here */
- & pre,
- & code {
- @media screen {
- font-size: 0.875em;
- }
- }
-
- & pre code {
- font-size: 1em;
- }
- }
-
- & #edit-this-page {
- margin-bottom: 48px;
- display: flex;
- justify-content: flex-end;
-
- & a {
- color: var(--gray-1);
- display: flex;
- align-items: center;
- opacity: 0.5;
- transition: opacity 0.4s ease;
- padding-right: 32px;
-
- &:hover {
- opacity: 1;
- }
-
- & > div {
- margin-right: 9px;
- width: 23px;
- height: 22px;
- }
- }
- }
-}
diff --git a/website/components/enterprise-alert/README.md b/website/components/enterprise-alert/README.md
new file mode 100644
index 000000000000..8ee603b149f5
--- /dev/null
+++ b/website/components/enterprise-alert/README.md
@@ -0,0 +1,27 @@
+# Enterprise Alert Component
+
+This component is an easy way to mark some content as only applicable to the enterprise version of vault. It can be used in any documentation pages in a variety of ways. The basic implementation is written as such, on its own line within a markdown file:
+
+```jsx
+
+```
+
+And renders [like this](https://p176.p0.n0.cdn.getcloudapp.com/items/geuWOzkz/Screen%20Shot%202020-05-08%20at%204.17.34%20PM.png?v=2ace1c70f48cf1bbdd17f9ce96684453)
+
+The default text can also be replaced with custom text as such:
+
+```jsx
+
+ Custom text with a link
+
+```
+
+Which renders [as such](https://p176.p0.n0.cdn.getcloudapp.com/items/v1uDE2vQ/Screen%20Shot%202020-05-08%20at%204.18.22%20PM.png?v=3a45268830fac868be50047060bb4303)
+
+Finally, it can be rendered inline as a "tag" to mark a section or option as enterprise only by adding the `inline` attribute:
+
+```jsx
+
+```
+
+This is typically used after a list item, or after a headline. It renders [as such](https://p176.p0.n0.cdn.getcloudapp.com/items/KouqnrOm/Screen%20Shot%202020-05-08%20at%204.16.34%20PM.png?v=ac21328916aa98a1a853cde5989058bd)
diff --git a/website/components/enterprise-alert/index.jsx b/website/components/enterprise-alert/index.jsx
new file mode 100644
index 000000000000..744229c53b39
--- /dev/null
+++ b/website/components/enterprise-alert/index.jsx
@@ -0,0 +1,5 @@
+import EnterpriseAlert from '@hashicorp/react-enterprise-alert'
+
+export default function EnterpriseAlertConsul(props) {
+ return
+}
diff --git a/website/components/footer/index.jsx b/website/components/footer/index.jsx
new file mode 100644
index 000000000000..8d14a5d27a9f
--- /dev/null
+++ b/website/components/footer/index.jsx
@@ -0,0 +1,30 @@
+import Link from 'next/link'
+
+export default function Footer({ openConsentManager }) {
+ return (
+
+ )
+}
diff --git a/website/components/footer/style.css b/website/components/footer/style.css
new file mode 100644
index 000000000000..bd11930e6c72
--- /dev/null
+++ b/website/components/footer/style.css
@@ -0,0 +1,32 @@
+.g-footer {
+ padding: 25px 0 17px 0;
+ flex-shrink: 0;
+ display: flex;
+
+ & .g-container {
+ display: flex;
+ justify-content: space-between;
+ flex-wrap: wrap;
+ }
+
+ & a {
+ color: black;
+ opacity: 0.5;
+ transition: opacity 0.25s ease;
+ cursor: pointer;
+ display: inline-block;
+
+ &:hover {
+ opacity: 1;
+ }
+ }
+
+ & .left > a {
+ margin-right: 20px;
+ margin-bottom: 8px;
+
+ &:last-child {
+ margin-right: 0;
+ }
+ }
+}
diff --git a/website/components/tabs/README.md b/website/components/tabs/README.md
new file mode 100644
index 000000000000..bdf31a710f7e
--- /dev/null
+++ b/website/components/tabs/README.md
@@ -0,0 +1,61 @@
+# Tabs Component
+
+> An MDX-compatible Tabs component
+
+This React component renders tabbed content.
+
+## Usage
+
+- Use the `` tag in your markdown file to begin a tabbed content section.
+- Use the `` tag with a `heading` prop to separate your markdown
+
+### Important
+
+A line must be skipped between the `` and your markdown (for both above and below said markdown). [This is a limitation of MDX also pointed out by the Docusaurus folks 🔗 ](https://v2.docusaurus.io/docs/markdown-features/#multi-language-support-code-blocks)
+
+### Example
+
+```mdx
+
+
+
+### Content
+
+
+
+
+### Content
+
+
+
+```
+
+### Component Props
+
+`` can be provided any arbitrary `children` so long as the `heading` prop is present the React or HTML tag used to wrap markdown, that said, we provide the `` component to separate your tab content without rendering extra, unnecessary markup.
+
+This works:
+
+```mdx
+
+
+
+### Content
+
+
+....
+
+```
+
+This _does not_ work:
+
+```mdx
+
+
+
+### Content
+
+
+....
+
+```
diff --git a/website/components/tabs/index.jsx b/website/components/tabs/index.jsx
new file mode 100644
index 000000000000..23862510d907
--- /dev/null
+++ b/website/components/tabs/index.jsx
@@ -0,0 +1,17 @@
+import ReactTabs from '@hashicorp/react-tabs'
+
+export default function Tabs({ children }) {
+ return (
+ ({
+ heading: Block.props.heading,
+ // eslint-disable-next-line react/display-name
+ tabChildren: () => Block,
+ }))}
+ />
+ )
+}
+
+export function Tab({ children }) {
+ return <>{children}>
+}
diff --git a/website/components/tabs/style.css b/website/components/tabs/style.css
new file mode 100644
index 000000000000..bedf96b4e039
--- /dev/null
+++ b/website/components/tabs/style.css
@@ -0,0 +1,8 @@
+/* This is a CSS overwrite on top of the existing component styles to accommodate the Learn layout */
+.g-tabs {
+ & .g-grid-container,
+ & > .g-grid-container {
+ padding-left: 0;
+ padding-right: 0;
+ }
+}
diff --git a/website/layouts/api.jsx b/website/layouts/api.jsx
index 24a206d72a32..892edeae9712 100644
--- a/website/layouts/api.jsx
+++ b/website/layouts/api.jsx
@@ -1,23 +1,41 @@
-import DocsPage, { getInitialProps } from '../components/docs-page'
-import orderData from '../data/api-navigation.js'
-import { frontMatter } from '../pages/api-docs/**/*.mdx'
+import DocsPage from '@hashicorp/react-docs-page'
+import order from '../data/api-navigation.js'
+import { frontMatter as data } from '../pages/api-docs/**/*.mdx'
+import { MDXProvider } from '@mdx-js/react'
+import Head from 'next/head'
+import Link from 'next/link'
+import Tabs, { Tab } from '../components/tabs'
+import EnterpriseAlert from '../components/enterprise-alert'
-function ApiLayoutWrapper(pageMeta) {
+const DEFAULT_COMPONENTS = { Tabs, Tab, EnterpriseAlert }
+
+export default function ApiLayoutWrapper(pageMeta) {
function ApiLayout(props) {
return (
-
+
+
+
)
}
- ApiLayout.getInitialProps = getInitialProps
+ ApiLayout.getInitialProps = ({ asPath }) => ({ path: asPath })
return ApiLayout
}
-
-export default ApiLayoutWrapper
diff --git a/website/layouts/docs.jsx b/website/layouts/docs.jsx
index c6ce5be2bb84..5053dbee6894 100644
--- a/website/layouts/docs.jsx
+++ b/website/layouts/docs.jsx
@@ -1,23 +1,41 @@
-import DocsPage, { getInitialProps } from '../components/docs-page'
-import orderData from '../data/docs-navigation.js'
-import { frontMatter } from '../pages/docs/**/*.mdx'
+import DocsPage from '@hashicorp/react-docs-page'
+import order from '../data/docs-navigation.js'
+import { frontMatter as data } from '../pages/docs/**/*.mdx'
+import { MDXProvider } from '@mdx-js/react'
+import Head from 'next/head'
+import Link from 'next/link'
+import Tabs, { Tab } from '../components/tabs'
+import EnterpriseAlert from '../components/enterprise-alert'
-function DocsLayoutWrapper(pageMeta) {
+const DEFAULT_COMPONENTS = { Tabs, Tab, EnterpriseAlert }
+
+export default function DocsLayoutWrapper(pageMeta) {
function DocsLayout(props) {
return (
-
+
+
+
)
}
- DocsLayout.getInitialProps = getInitialProps
+ DocsLayout.getInitialProps = ({ asPath }) => ({ path: asPath })
return DocsLayout
}
-
-export default DocsLayoutWrapper
diff --git a/website/layouts/guides.jsx b/website/layouts/guides.jsx
index 52e75ff0e5af..426f713b2abe 100644
--- a/website/layouts/guides.jsx
+++ b/website/layouts/guides.jsx
@@ -1,23 +1,41 @@
-import DocsPage, { getInitialProps } from '../components/docs-page'
-import orderData from '../data/guides-navigation.js'
-import { frontMatter } from '../pages/guides/**/*.mdx'
+import DocsPage from '@hashicorp/react-docs-page'
+import order from '../data/guides-navigation.js'
+import { frontMatter as data } from '../pages/guides/**/*.mdx'
+import { MDXProvider } from '@mdx-js/react'
+import Head from 'next/head'
+import Link from 'next/link'
+import Tabs, { Tab } from '../components/tabs'
+import EnterpriseAlert from '../components/enterprise-alert'
-function GuidesLayoutWrapper(pageMeta) {
+const DEFAULT_COMPONENTS = { Tabs, Tab, EnterpriseAlert }
+
+export default function GuidesLayoutWrapper(pageMeta) {
function GuidesLayout(props) {
return (
-
+
+
+
)
}
- GuidesLayout.getInitialProps = getInitialProps
+ GuidesLayout.getInitialProps = ({ asPath }) => ({ path: asPath })
return GuidesLayout
}
-
-export default GuidesLayoutWrapper
diff --git a/website/layouts/intro.jsx b/website/layouts/intro.jsx
index c96a4dd66846..0e2ab80ec5e4 100644
--- a/website/layouts/intro.jsx
+++ b/website/layouts/intro.jsx
@@ -1,23 +1,41 @@
-import DocsPage, { getInitialProps } from '../components/docs-page'
-import orderData from '../data/intro-navigation.js'
-import { frontMatter } from '../pages/intro/**/*.mdx'
+import DocsPage from '@hashicorp/react-docs-page'
+import order from '../data/intro-navigation.js'
+import { frontMatter as data } from '../pages/intro/**/*.mdx'
+import { MDXProvider } from '@mdx-js/react'
+import Head from 'next/head'
+import Link from 'next/link'
+import Tabs, { Tab } from '../components/tabs'
+import EnterpriseAlert from '../components/enterprise-alert'
-function IntroLayoutWrapper(pageMeta) {
+const DEFAULT_COMPONENTS = { Tabs, Tab, EnterpriseAlert }
+
+export default function IntroLayoutWrapper(pageMeta) {
function IntroLayout(props) {
return (
-
+
+
+
)
}
- IntroLayout.getInitialProps = getInitialProps
+ IntroLayout.getInitialProps = ({ asPath }) => ({ path: asPath })
return IntroLayout
}
-
-export default IntroLayoutWrapper
diff --git a/website/lib/bugsnag.js b/website/lib/bugsnag.js
deleted file mode 100644
index d8b7143114de..000000000000
--- a/website/lib/bugsnag.js
+++ /dev/null
@@ -1,17 +0,0 @@
-import React from 'react'
-import bugsnag from '@bugsnag/js'
-import bugsnagReact from '@bugsnag/plugin-react'
-
-const apiKey =
- typeof window === 'undefined'
- ? 'fb2dc40bb48b17140628754eac6c1b11'
- : '07ff2d76ce27aded8833bf4804b73350'
-
-const bugsnagClient = bugsnag({
- apiKey,
- releaseStage: process.env.NODE_ENV || 'development'
-})
-
-bugsnagClient.use(bugsnagReact, React)
-
-export default bugsnagClient
diff --git a/website/lib/consent-manager-config.js b/website/lib/consent-manager-config.js
deleted file mode 100644
index de55948685f1..000000000000
--- a/website/lib/consent-manager-config.js
+++ /dev/null
@@ -1,76 +0,0 @@
-const isProd = process.env.NODE_ENV === 'production'
-
-const segmentWriteKey = isProd
- ? 'OdSFDq9PfujQpmkZf03dFpcUlywme4sC'
- : '0EXTgkNx0Ydje2PGXVbRhpKKoe5wtzcE'
-
-// TODO: refactor into web components
-let utilityServerRoot = isProd
- ? 'https://util.hashicorp.com'
- : 'https://hashicorp-web-util-staging.herokuapp.com'
-
-if (process.env.UTIL_SERVER) {
- utilityServerRoot = process.env.UTIL_SERVER.replace(/\/$/, '')
-}
-
-// Consent manager configuration
-export default {
- version: 3,
- container: '#consent-manager',
- companyName: 'HashiCorp',
- privacyPolicyLink: '/privacy',
- segmentWriteKey: segmentWriteKey,
- utilServerRoot: utilityServerRoot,
- segmentServices: [
- {
- key: 'googleanalytics',
- name: 'Google Analytics',
- description:
- 'Google Analytics is a popular service for tracking web traffic. We use this data to determine what content our users find important so that we can dedicate more resources toward it.',
- category: 'Analytics'
- },
- {
- name: 'Hotjar',
- description:
- 'Hotjar is a service that generates heatmaps of where users click on our sites. We use this information to ensure that our site is not confusing, and simple to use and navigate.',
- category: 'Analytics'
- },
- {
- name: 'LinkedIn Insight Tag',
- description:
- 'This small script allows us to see how effective our linkedin campaigns are by showing which users have clicked through to our site.',
- category: 'Analytics'
- },
- {
- name: 'Marketo V2',
- description:
- 'Marketo is a marketing automation tool that allows us to segment users into different categories based off of their behaviors. We use this information to provide tailored information to users in our email campaigns.'
- }
- ],
- categories: [
- {
- name: 'Functional',
- description:
- 'Functional services provide a utility to the website, such as the ability to log in, or to get live support. Disabling any of these scripts will cause that utility to be missing from the site.'
- },
- {
- name: 'Analytics',
- description:
- 'Analytics services keep track of page traffic and user behavior while browsing the site. We use this data internally to improve the usability and performance of the site. Disabling any of these scripts makes it more difficult for us to understand how our site is being used, and slower to improve it.'
- },
- {
- name: 'Email Marketing',
- description:
- 'Email Marketing services track user behavior while browsing the site. We use this data internally in our marketing efforts to provide users contextually relevant information based off of their behaviors. Disabling any of these scripts makes it more difficult for us to provide you contextually relevant information.'
- }
- ],
- additionalServices: [
- {
- name: 'OptinMonster',
- description:
- "OptinMonster is a service that we use to show a prompt to sign up for our newsletter if it's perceived that you are interested in our content.",
- category: 'Functional',
- body: `var om598c8e3a6e43d,om598c8e3a6e43d_poll=function(){var r=0;return function(n,l){clearInterval(r),r=setInterval(n,l)}}();!function(e,t,n){if(e.getElementById(n)){om598c8e3a6e43d_poll(function(){if(window['om_loaded']){if(!om598c8e3a6e43d){om598c8e3a6e43d=new OptinMonsterApp();return om598c8e3a6e43d.init({"s":"35109.598c8e3a6e43d","staging":0,"dev":0,"beta":0});}}},25);return;}var d=false,o=e.createElement(t);o.id=n,o.src="https://a.optnmstr.com/app/js/api.min.js",o.async=true,o.onload=o.onreadystatechange=function(){if(!d){if(!this.readyState||this.readyState==="loaded"||this.readyState==="complete"){try{d=om_loaded=true;om598c8e3a6e43d=new OptinMonsterApp();om598c8e3a6e43d.init({"s":"35109.598c8e3a6e43d","staging":0,"dev":0,"beta":0});o.onload=o.onreadystatechange=null;}catch(t){}}}};(document.getElementsByTagName("head")[0]||document.documentElement).appendChild(o)}(document,"script","omapi-script");`
- }
- ]
-}
diff --git a/website/lib/globalThis.js b/website/lib/globalThis.js
deleted file mode 100644
index 7b499bd67186..000000000000
--- a/website/lib/globalThis.js
+++ /dev/null
@@ -1,9 +0,0 @@
-!(function define(Object) {
- Object
- ? typeof globalThis == 'object' ||
- Object.prototype.__defineGetter__('_', define) ||
- // eslint-disable-next-line no-undef
- _ ||
- delete Object.prototype._
- : (this.globalThis = this)
-})(Object)
diff --git a/website/netlify.toml b/website/netlify.toml
index 6a2e35b5217a..26b41d1c7e24 100644
--- a/website/netlify.toml
+++ b/website/netlify.toml
@@ -6,6 +6,9 @@
publish = "out"
command = "npm run static"
+[build.environment]
+ NODE_OPTIONS = '--max-old-space-size=4096'
+
[context.production]
environment = { HASHI_ENV = "production", NODE_ENV = "production"}
@@ -14,7 +17,7 @@
[[redirects]]
from = "/*"
- to = "/404/index.html"
+ to = "/404.html"
status = 404
[[headers]]
diff --git a/website/next.config.js b/website/next.config.js
index 6566928356ef..7789e7001727 100644
--- a/website/next.config.js
+++ b/website/next.config.js
@@ -7,7 +7,6 @@ module.exports = withHashicorp({
mdx: { resolveIncludes: path.join(__dirname, 'pages') },
})({
experimental: {
- css: true,
modern: true,
polyfillsOptimization: true,
rewrites: () => [
@@ -25,6 +24,9 @@ module.exports = withHashicorp({
],
},
env: {
- HASHI_ENV: process.env.HASHI_ENV,
+ HASHI_ENV: process.env.HASHI_ENV || 'development',
+ SEGMENT_WRITE_KEY: 'OdSFDq9PfujQpmkZf03dFpcUlywme4sC',
+ BUGSNAG_CLIENT_KEY: '07ff2d76ce27aded8833bf4804b73350',
+ BUGSNAG_SERVER_KEY: 'fb2dc40bb48b17140628754eac6c1b11',
},
})
diff --git a/website/package-lock.json b/website/package-lock.json
index 3b189c26ca56..97001dca033b 100644
--- a/website/package-lock.json
+++ b/website/package-lock.json
@@ -1,13 +1,13 @@
{
- "name": "vault-docs-platform",
- "version": "0.0.1",
+ "name": "vault-docs",
+ "version": "1.0.0",
"lockfileVersion": 1,
"requires": true,
"dependencies": {
"@ampproject/toolbox-core": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/@ampproject/toolbox-core/-/toolbox-core-2.0.0.tgz",
- "integrity": "sha512-xAJOmh6MPS2mdHNsK8mj1t8TLh6mlehirh0fOBsRhKCNCJXgg4Gfd2u5igy8VFq9sYnuWP/npFyjGX36qpXW5Q==",
+ "version": "2.3.0",
+ "resolved": "https://registry.npmjs.org/@ampproject/toolbox-core/-/toolbox-core-2.3.0.tgz",
+ "integrity": "sha512-NT+kVR5Rm2cxp12h40IXgPRWmq0cpUdmcgZmgdelplp/q//4aWkt2+llGHR2foQJkwICxMVVlb/XidsHz0Rh9g==",
"requires": {
"cross-fetch": "3.0.4"
},
@@ -20,24 +20,35 @@
"node-fetch": "2.6.0",
"whatwg-fetch": "3.0.0"
}
+ },
+ "node-fetch": {
+ "version": "2.6.0",
+ "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.0.tgz",
+ "integrity": "sha512-8dG4H5ujfvFiqDmVu9fQ5bOHUC15JMjMY/Zumv26oOvvVJjM67KF8koCWIabKQ1GJIa9r2mMZscBq/TbdOcmNA=="
+ },
+ "whatwg-fetch": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/whatwg-fetch/-/whatwg-fetch-3.0.0.tgz",
+ "integrity": "sha512-9GSJUgz1D4MfyKU7KRqwOjXCXTqWdFNvEr7eUBYchQiVc744mqK/MzXPNR2WsPkmkOa4ywfg8C2n8h+13Bey1Q=="
}
}
},
"@ampproject/toolbox-optimizer": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/@ampproject/toolbox-optimizer/-/toolbox-optimizer-2.0.1.tgz",
- "integrity": "sha512-zroXqrV7mY77+/6hV7kaaWxp4LA85V0B/2vg7WdF+FrwiO9Wior/lIW8UbpRek6INjw0VOp1ED73MmGJkwaDhA==",
- "requires": {
- "@ampproject/toolbox-core": "^2.0.0",
- "@ampproject/toolbox-runtime-version": "^2.0.0",
- "@ampproject/toolbox-script-csp": "^2.0.0",
- "@ampproject/toolbox-validator-rules": "^2.0.0",
- "css": "2.2.4",
+ "version": "2.2.0",
+ "resolved": "https://registry.npmjs.org/@ampproject/toolbox-optimizer/-/toolbox-optimizer-2.2.0.tgz",
+ "integrity": "sha512-lEujArv6jyl/mEab0uBZ25oMkf+kf8cpTuHPcy8k3+jtomNyVtd94lbSWbQtomsEnYQ0MA9MvLvCJXsJz1fQcg==",
+ "requires": {
+ "@ampproject/toolbox-core": "^2.2.0",
+ "@ampproject/toolbox-runtime-version": "^2.2.0",
+ "@ampproject/toolbox-script-csp": "^2.2.0",
+ "@ampproject/toolbox-validator-rules": "^2.2.0",
+ "cssnano": "4.1.10",
"domhandler": "3.0.0",
"domutils": "2.0.0",
"htmlparser2": "4.1.0",
"normalize-html-whitespace": "1.0.0",
- "terser": "4.6.7"
+ "postcss-safe-parser": "4.0.2",
+ "terser": "4.6.8"
},
"dependencies": {
"domelementtype": {
@@ -54,41 +65,26 @@
"domelementtype": "^2.0.1",
"domhandler": "^3.0.0"
}
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
- "terser": {
- "version": "4.6.7",
- "resolved": "https://registry.npmjs.org/terser/-/terser-4.6.7.tgz",
- "integrity": "sha512-fmr7M1f7DBly5cX2+rFDvmGBAaaZyPrHYK4mMdHEDAdNTqXSZgSOfqsfGq2HqPGT/1V0foZZuCZFx8CHKgAk3g==",
- "requires": {
- "commander": "^2.20.0",
- "source-map": "~0.6.1",
- "source-map-support": "~0.5.12"
- }
}
}
},
"@ampproject/toolbox-runtime-version": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/@ampproject/toolbox-runtime-version/-/toolbox-runtime-version-2.0.0.tgz",
- "integrity": "sha512-7XDlo7l4Ozpc/XWmJeYNF0ZfXCy7Vdh07spN+xEOst8gF99yaavZRNVkdgyTxLR3BpY9RIqqhSs6OxfkOKlRZQ==",
+ "version": "2.3.1",
+ "resolved": "https://registry.npmjs.org/@ampproject/toolbox-runtime-version/-/toolbox-runtime-version-2.3.1.tgz",
+ "integrity": "sha512-ocDCSaSUlbgPbuXRVyLU7k+dLGYluKrnfSPKXIwwpGkwNw58JOddvgnQGyB0R/2Ma36nxFA8AAyxjnghLSScpg==",
"requires": {
- "@ampproject/toolbox-core": "^2.0.0"
+ "@ampproject/toolbox-core": "^2.3.0"
}
},
"@ampproject/toolbox-script-csp": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/@ampproject/toolbox-script-csp/-/toolbox-script-csp-2.0.0.tgz",
- "integrity": "sha512-9mW3yiKwjORi0ViuayphVZii9MwiPhneZGZWy+kN44xr3SpN7iQC52/WWWTBOZX9z1zaUh8DqGc//VFY5ILSAw=="
+ "version": "2.3.0",
+ "resolved": "https://registry.npmjs.org/@ampproject/toolbox-script-csp/-/toolbox-script-csp-2.3.0.tgz",
+ "integrity": "sha512-Qba53ohvCH79sYl5O8K5GMSo/372OjuyxNc+XySG26sAsG26WpBKJEE0HTr8rsa//CD3Fc92FieT1gK5U/jK4Q=="
},
"@ampproject/toolbox-validator-rules": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/@ampproject/toolbox-validator-rules/-/toolbox-validator-rules-2.0.0.tgz",
- "integrity": "sha512-5f2IvT1m/zNtqfNXFE9V4ZtKofIttST65QL1wf4lKjBhJsbZgAAeR/u4DgOvftRVRmgn6IpUiWY1pt9xWaI5yA==",
+ "version": "2.3.0",
+ "resolved": "https://registry.npmjs.org/@ampproject/toolbox-validator-rules/-/toolbox-validator-rules-2.3.0.tgz",
+ "integrity": "sha512-S10YIyOKettoRDWoyRymRyjzWZD4/qW7YfHNhHAS13QVneabRcU5MF7vEwkG6dHWx/UdufT5GbqYnvpQRMNt3Q==",
"requires": {
"cross-fetch": "3.0.4"
},
@@ -101,63 +97,19 @@
"node-fetch": "2.6.0",
"whatwg-fetch": "3.0.0"
}
+ },
+ "node-fetch": {
+ "version": "2.6.0",
+ "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.0.tgz",
+ "integrity": "sha512-8dG4H5ujfvFiqDmVu9fQ5bOHUC15JMjMY/Zumv26oOvvVJjM67KF8koCWIabKQ1GJIa9r2mMZscBq/TbdOcmNA=="
+ },
+ "whatwg-fetch": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/whatwg-fetch/-/whatwg-fetch-3.0.0.tgz",
+ "integrity": "sha512-9GSJUgz1D4MfyKU7KRqwOjXCXTqWdFNvEr7eUBYchQiVc744mqK/MzXPNR2WsPkmkOa4ywfg8C2n8h+13Bey1Q=="
}
}
},
- "@apollo/react-common": {
- "version": "3.1.3",
- "resolved": "https://registry.npmjs.org/@apollo/react-common/-/react-common-3.1.3.tgz",
- "integrity": "sha512-Q7ZjDOeqjJf/AOGxUMdGxKF+JVClRXrYBGVq+SuVFqANRpd68MxtVV2OjCWavsFAN0eqYnRqRUrl7vtUCiJqeg==",
- "requires": {
- "ts-invariant": "^0.4.4",
- "tslib": "^1.10.0"
- }
- },
- "@apollo/react-components": {
- "version": "3.1.3",
- "resolved": "https://registry.npmjs.org/@apollo/react-components/-/react-components-3.1.3.tgz",
- "integrity": "sha512-H0l2JKDQMz+LkM93QK7j3ThbNXkWQCduN3s3eKxFN3Rdg7rXsrikJWvx2wQ868jmqy0VhwJbS1vYdRLdh114uQ==",
- "requires": {
- "@apollo/react-common": "^3.1.3",
- "@apollo/react-hooks": "^3.1.3",
- "prop-types": "^15.7.2",
- "ts-invariant": "^0.4.4",
- "tslib": "^1.10.0"
- }
- },
- "@apollo/react-hoc": {
- "version": "3.1.3",
- "resolved": "https://registry.npmjs.org/@apollo/react-hoc/-/react-hoc-3.1.3.tgz",
- "integrity": "sha512-oCPma0uBVPTcYTR5sOvtMbpaWll4xDBvYfKr6YkDorUcQVeNzFu1LK1kmQjJP64bKsaziKYji5ibFaeCnVptmA==",
- "requires": {
- "@apollo/react-common": "^3.1.3",
- "@apollo/react-components": "^3.1.3",
- "hoist-non-react-statics": "^3.3.0",
- "ts-invariant": "^0.4.4",
- "tslib": "^1.10.0"
- }
- },
- "@apollo/react-hooks": {
- "version": "3.1.3",
- "resolved": "https://registry.npmjs.org/@apollo/react-hooks/-/react-hooks-3.1.3.tgz",
- "integrity": "sha512-reIRO9xKdfi+B4gT/o/hnXuopUnm7WED/ru8VQydPw+C/KG/05Ssg1ZdxFKHa3oxwiTUIDnevtccIH35POanbA==",
- "requires": {
- "@apollo/react-common": "^3.1.3",
- "@wry/equality": "^0.1.9",
- "ts-invariant": "^0.4.4",
- "tslib": "^1.10.0"
- }
- },
- "@apollo/react-ssr": {
- "version": "3.1.3",
- "resolved": "https://registry.npmjs.org/@apollo/react-ssr/-/react-ssr-3.1.3.tgz",
- "integrity": "sha512-fUTmEYHxSTX1GA43B8vICxXXplpcEBnDwn0IgdAc3eG0p2YK97ZrJDRFCJ5vD7fyDZsrYhMf+rAI3sd+H2SS+A==",
- "requires": {
- "@apollo/react-common": "^3.1.3",
- "@apollo/react-hooks": "^3.1.3",
- "tslib": "^1.10.0"
- }
- },
"@babel/code-frame": {
"version": "7.8.3",
"resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.8.3.tgz",
@@ -189,117 +141,47 @@
"source-map": "^0.5.0"
},
"dependencies": {
- "@babel/generator": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.9.4.tgz",
- "integrity": "sha512-rjP8ahaDy/ouhrvCoU1E5mqaitWrxwuNGU+dy1EpaoK48jZay4MdkskKGIMHLZNewg8sAsqpGSREJwP0zH3YQA==",
- "requires": {
- "@babel/types": "^7.9.0",
- "jsesc": "^2.5.1",
- "lodash": "^4.17.13",
- "source-map": "^0.5.0"
- }
- },
- "@babel/helper-module-transforms": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.9.0.tgz",
- "integrity": "sha512-0FvKyu0gpPfIQ8EkxlrAydOWROdHpBmiCiRwLkUiBGhCUPRRbVD2/tm3sFr/c/GWFrQ/ffutGUAnx7V0FzT2wA==",
- "requires": {
- "@babel/helper-module-imports": "^7.8.3",
- "@babel/helper-replace-supers": "^7.8.6",
- "@babel/helper-simple-access": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/template": "^7.8.6",
- "@babel/types": "^7.9.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/helper-replace-supers": {
- "version": "7.8.6",
- "resolved": "https://registry.npmjs.org/@babel/helper-replace-supers/-/helper-replace-supers-7.8.6.tgz",
- "integrity": "sha512-PeMArdA4Sv/Wf4zXwBKPqVj7n9UF/xg6slNRtZW84FM7JpE1CbG8B612FyM4cxrf4fMAMGO0kR7voy1ForHHFA==",
- "requires": {
- "@babel/helper-member-expression-to-functions": "^7.8.3",
- "@babel/helper-optimise-call-expression": "^7.8.3",
- "@babel/traverse": "^7.8.6",
- "@babel/types": "^7.8.6"
- }
- },
- "@babel/helpers": {
- "version": "7.9.2",
- "resolved": "https://registry.npmjs.org/@babel/helpers/-/helpers-7.9.2.tgz",
- "integrity": "sha512-JwLvzlXVPjO8eU9c/wF9/zOIN7X6h8DYf7mG4CiFRZRvZNKEF5dQ3H3V+ASkHoIB3mWhatgl5ONhyqHRI6MppA==",
- "requires": {
- "@babel/template": "^7.8.3",
- "@babel/traverse": "^7.9.0",
- "@babel/types": "^7.9.0"
- }
- },
- "@babel/parser": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.9.4.tgz",
- "integrity": "sha512-bC49otXX6N0/VYhgOMh4gnP26E9xnDZK3TmbNpxYzzz9BQLBosQwfyOe9/cXUU3txYhTzLCbcqd5c8y/OmCjHA=="
- },
- "@babel/template": {
- "version": "7.8.6",
- "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.6.tgz",
- "integrity": "sha512-zbMsPMy/v0PWFZEhQJ66bqjhH+z0JgMoBWuikXybgG3Gkd/3t5oQ1Rw2WQhnSrsOmsKXnZOx15tkC4qON/+JPg==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/parser": "^7.8.6",
- "@babel/types": "^7.8.6"
- }
- },
- "@babel/traverse": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.9.0.tgz",
- "integrity": "sha512-jAZQj0+kn4WTHO5dUZkZKhbFrqZE7K5LAQ5JysMnmvGij+wOdr+8lWqPeW0BcF4wFwrEXXtdGO7wcV6YPJcf3w==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.9.0",
- "@babel/helper-function-name": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/parser": "^7.9.0",
- "@babel/types": "^7.9.0",
- "debug": "^4.1.0",
- "globals": "^11.1.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- },
"json5": {
- "version": "2.1.2",
- "resolved": "https://registry.npmjs.org/json5/-/json5-2.1.2.tgz",
- "integrity": "sha512-MoUOQ4WdiN3yxhm7NEVJSJrieAo5hNSLQ5sj05OTRHPL9HOBy8u4Bu88jsC1jvqAdN+E1bJmsUcZH+1HQxliqQ==",
+ "version": "2.1.3",
+ "resolved": "https://registry.npmjs.org/json5/-/json5-2.1.3.tgz",
+ "integrity": "sha512-KXPvOm8K9IJKFM0bmdn8QXh7udDh1g/giieX0NLCaMnb4hEiVFqnop2ImTXCc5e0/oHz3LTqmHGtExn5hfMkOA==",
"requires": {
"minimist": "^1.2.5"
}
},
- "minimist": {
- "version": "1.2.5",
- "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz",
- "integrity": "sha512-FM9nNUYrRBAELZQT3xeZQ7fmMOBg6nWNmJKTcgsJeaLstP/UODVpGsr5OhXhhXg6f+qtJ8uiZ+PUxkDWcgIXLw=="
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ },
+ "source-map": {
+ "version": "0.5.7",
+ "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.5.7.tgz",
+ "integrity": "sha1-igOdLRAh0i0eoUyA2OpGi6LvP8w="
}
}
},
"@babel/generator": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.8.3.tgz",
- "integrity": "sha512-WjoPk8hRpDRqqzRpvaR8/gDUPkrnOOeuT2m8cNICJtZH6mwaCo3v0OKMI7Y6SM1pBtyijnLtAL0HDi41pf41ug==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.9.6.tgz",
+ "integrity": "sha512-+htwWKJbH2bL72HRluF8zumBxzuX0ZZUFl3JLNyoUjM/Ho8wnVpPXM6aUz8cfKDqQ/h7zHqKt4xzJteUosckqQ==",
"requires": {
- "@babel/types": "^7.8.3",
+ "@babel/types": "^7.9.6",
"jsesc": "^2.5.1",
"lodash": "^4.17.13",
"source-map": "^0.5.0"
+ },
+ "dependencies": {
+ "jsesc": {
+ "version": "2.5.2",
+ "resolved": "https://registry.npmjs.org/jsesc/-/jsesc-2.5.2.tgz",
+ "integrity": "sha512-OYu7XEzjkCQ3C5Ps3QIZsQfNpqoJyZZA99wd9aWd05NCtC5pWOkShK2mkL6HXQR6/Cy2lbNdPlZBpuQHXE63gA=="
+ },
+ "source-map": {
+ "version": "0.5.7",
+ "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.5.7.tgz",
+ "integrity": "sha1-igOdLRAh0i0eoUyA2OpGi6LvP8w="
+ }
}
},
"@babel/helper-annotate-as-pure": {
@@ -320,34 +202,34 @@
}
},
"@babel/helper-builder-react-jsx": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/helper-builder-react-jsx/-/helper-builder-react-jsx-7.8.3.tgz",
- "integrity": "sha512-JT8mfnpTkKNCboTqZsQTdGo3l3Ik3l7QIt9hh0O9DYiwVel37VoJpILKM4YFbP2euF32nkQSb+F9cUk9b7DDXQ==",
+ "version": "7.9.0",
+ "resolved": "https://registry.npmjs.org/@babel/helper-builder-react-jsx/-/helper-builder-react-jsx-7.9.0.tgz",
+ "integrity": "sha512-weiIo4gaoGgnhff54GQ3P5wsUQmnSwpkvU0r6ZHq6TzoSzKy4JxHEgnxNytaKbov2a9z/CVNyzliuCOUPEX3Jw==",
"requires": {
- "@babel/types": "^7.8.3",
- "esutils": "^2.0.0"
+ "@babel/helper-annotate-as-pure": "^7.8.3",
+ "@babel/types": "^7.9.0"
}
},
- "@babel/helper-call-delegate": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/helper-call-delegate/-/helper-call-delegate-7.8.3.tgz",
- "integrity": "sha512-6Q05px0Eb+N4/GTyKPPvnkig7Lylw+QzihMpws9iiZQv7ZImf84ZsZpQH7QoWN4n4tm81SnSzPgHw2qtO0Zf3A==",
+ "@babel/helper-builder-react-jsx-experimental": {
+ "version": "7.9.5",
+ "resolved": "https://registry.npmjs.org/@babel/helper-builder-react-jsx-experimental/-/helper-builder-react-jsx-experimental-7.9.5.tgz",
+ "integrity": "sha512-HAagjAC93tk748jcXpZ7oYRZH485RCq/+yEv9SIWezHRPv9moZArTnkUNciUNzvwHUABmiWKlcxJvMcu59UwTg==",
"requires": {
- "@babel/helper-hoist-variables": "^7.8.3",
- "@babel/traverse": "^7.8.3",
- "@babel/types": "^7.8.3"
+ "@babel/helper-annotate-as-pure": "^7.8.3",
+ "@babel/helper-module-imports": "^7.8.3",
+ "@babel/types": "^7.9.5"
}
},
"@babel/helper-create-class-features-plugin": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/helper-create-class-features-plugin/-/helper-create-class-features-plugin-7.8.3.tgz",
- "integrity": "sha512-qmp4pD7zeTxsv0JNecSBsEmG1ei2MqwJq4YQcK3ZWm/0t07QstWfvuV/vm3Qt5xNMFETn2SZqpMx2MQzbtq+KA==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/helper-create-class-features-plugin/-/helper-create-class-features-plugin-7.9.6.tgz",
+ "integrity": "sha512-6N9IeuyHvMBRyjNYOMJHrhwtu4WJMrYf8hVbEHD3pbbbmNOk1kmXSQs7bA4dYDUaIx4ZEzdnvo6NwC3WHd/Qow==",
"requires": {
- "@babel/helper-function-name": "^7.8.3",
+ "@babel/helper-function-name": "^7.9.5",
"@babel/helper-member-expression-to-functions": "^7.8.3",
"@babel/helper-optimise-call-expression": "^7.8.3",
"@babel/helper-plugin-utils": "^7.8.3",
- "@babel/helper-replace-supers": "^7.8.3",
+ "@babel/helper-replace-supers": "^7.9.6",
"@babel/helper-split-export-declaration": "^7.8.3"
}
},
@@ -381,13 +263,13 @@
}
},
"@babel/helper-function-name": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/helper-function-name/-/helper-function-name-7.8.3.tgz",
- "integrity": "sha512-BCxgX1BC2hD/oBlIFUgOCQDOPV8nSINxCwM3o93xP4P9Fq6aV5sgv2cOOITDMtCfQ+3PvHp3l689XZvAM9QyOA==",
+ "version": "7.9.5",
+ "resolved": "https://registry.npmjs.org/@babel/helper-function-name/-/helper-function-name-7.9.5.tgz",
+ "integrity": "sha512-JVcQZeXM59Cd1qanDUxv9fgJpt3NeKUaqBqUEvfmQ+BCOKq2xUgaWZW2hr0dkbyJgezYuplEoh5knmrnS68efw==",
"requires": {
"@babel/helper-get-function-arity": "^7.8.3",
"@babel/template": "^7.8.3",
- "@babel/types": "^7.8.3"
+ "@babel/types": "^7.9.5"
}
},
"@babel/helper-get-function-arity": {
@@ -423,15 +305,16 @@
}
},
"@babel/helper-module-transforms": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.8.3.tgz",
- "integrity": "sha512-C7NG6B7vfBa/pwCOshpMbOYUmrYQDfCpVL/JCRu0ek8B5p8kue1+BCXpg2vOYs7w5ACB9GTOBYQ5U6NwrMg+3Q==",
+ "version": "7.9.0",
+ "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.9.0.tgz",
+ "integrity": "sha512-0FvKyu0gpPfIQ8EkxlrAydOWROdHpBmiCiRwLkUiBGhCUPRRbVD2/tm3sFr/c/GWFrQ/ffutGUAnx7V0FzT2wA==",
"requires": {
"@babel/helper-module-imports": "^7.8.3",
+ "@babel/helper-replace-supers": "^7.8.6",
"@babel/helper-simple-access": "^7.8.3",
"@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/template": "^7.8.3",
- "@babel/types": "^7.8.3",
+ "@babel/template": "^7.8.6",
+ "@babel/types": "^7.9.0",
"lodash": "^4.17.13"
}
},
@@ -469,14 +352,14 @@
}
},
"@babel/helper-replace-supers": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/helper-replace-supers/-/helper-replace-supers-7.8.3.tgz",
- "integrity": "sha512-xOUssL6ho41U81etpLoT2RTdvdus4VfHamCuAm4AHxGr+0it5fnwoVdwUJ7GFEqCsQYzJUhcbsN9wB9apcYKFA==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/helper-replace-supers/-/helper-replace-supers-7.9.6.tgz",
+ "integrity": "sha512-qX+chbxkbArLyCImk3bWV+jB5gTNU/rsze+JlcF6Nf8tVTigPJSI1o1oBow/9Resa1yehUO9lIipsmu9oG4RzA==",
"requires": {
"@babel/helper-member-expression-to-functions": "^7.8.3",
"@babel/helper-optimise-call-expression": "^7.8.3",
- "@babel/traverse": "^7.8.3",
- "@babel/types": "^7.8.3"
+ "@babel/traverse": "^7.9.6",
+ "@babel/types": "^7.9.6"
}
},
"@babel/helper-simple-access": {
@@ -497,9 +380,9 @@
}
},
"@babel/helper-validator-identifier": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/helper-validator-identifier/-/helper-validator-identifier-7.9.0.tgz",
- "integrity": "sha512-6G8bQKjOh+of4PV/ThDm/rRqlU7+IGoJuofpagU5GlEl29Vv0RGqqt86ZGRV8ZuSOY3o+8yXl5y782SMcG7SHw=="
+ "version": "7.9.5",
+ "resolved": "https://registry.npmjs.org/@babel/helper-validator-identifier/-/helper-validator-identifier-7.9.5.tgz",
+ "integrity": "sha512-/8arLKUFq882w4tWGj9JYzRpAlZgiWUJ+dtteNTDqrRBz9Iguck9Rn3ykuBDoUwh2TO4tSAJlrxDUOXWklJe4g=="
},
"@babel/helper-wrap-function": {
"version": "7.8.3",
@@ -513,66 +396,22 @@
}
},
"@babel/helpers": {
- "version": "7.9.2",
- "resolved": "https://registry.npmjs.org/@babel/helpers/-/helpers-7.9.2.tgz",
- "integrity": "sha512-JwLvzlXVPjO8eU9c/wF9/zOIN7X6h8DYf7mG4CiFRZRvZNKEF5dQ3H3V+ASkHoIB3mWhatgl5ONhyqHRI6MppA==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/helpers/-/helpers-7.9.6.tgz",
+ "integrity": "sha512-tI4bUbldloLcHWoRUMAj4g1bF313M/o6fBKhIsb3QnGVPwRm9JsNf/gqMkQ7zjqReABiffPV6RWj7hEglID5Iw==",
"requires": {
"@babel/template": "^7.8.3",
- "@babel/traverse": "^7.9.0",
- "@babel/types": "^7.9.0"
- },
- "dependencies": {
- "@babel/generator": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.9.4.tgz",
- "integrity": "sha512-rjP8ahaDy/ouhrvCoU1E5mqaitWrxwuNGU+dy1EpaoK48jZay4MdkskKGIMHLZNewg8sAsqpGSREJwP0zH3YQA==",
- "requires": {
- "@babel/types": "^7.9.0",
- "jsesc": "^2.5.1",
- "lodash": "^4.17.13",
- "source-map": "^0.5.0"
- }
- },
- "@babel/parser": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.9.4.tgz",
- "integrity": "sha512-bC49otXX6N0/VYhgOMh4gnP26E9xnDZK3TmbNpxYzzz9BQLBosQwfyOe9/cXUU3txYhTzLCbcqd5c8y/OmCjHA=="
- },
- "@babel/traverse": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.9.0.tgz",
- "integrity": "sha512-jAZQj0+kn4WTHO5dUZkZKhbFrqZE7K5LAQ5JysMnmvGij+wOdr+8lWqPeW0BcF4wFwrEXXtdGO7wcV6YPJcf3w==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.9.0",
- "@babel/helper-function-name": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/parser": "^7.9.0",
- "@babel/types": "^7.9.0",
- "debug": "^4.1.0",
- "globals": "^11.1.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
+ "@babel/traverse": "^7.9.6",
+ "@babel/types": "^7.9.6"
}
},
"@babel/highlight": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.8.3.tgz",
- "integrity": "sha512-PX4y5xQUvy0fnEVHrYOarRPXVWafSjTW9T0Hab8gVIawpl2Sj0ORyrygANq+KjcNlSSTw0YCLSNA8OyZ1I4yEg==",
+ "version": "7.9.0",
+ "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.9.0.tgz",
+ "integrity": "sha512-lJZPilxX7Op3Nv/2cvFdnlepPXDxi29wxteT57Q965oc5R9v86ztx0jfxVrTcBk8C2kcPkkDa2Z4T3ZsPPVWsQ==",
"requires": {
+ "@babel/helper-validator-identifier": "^7.9.0",
"chalk": "^2.0.0",
- "esutils": "^2.0.2",
"js-tokens": "^4.0.0"
},
"dependencies": {
@@ -585,13 +424,18 @@
"escape-string-regexp": "^1.0.5",
"supports-color": "^5.3.0"
}
+ },
+ "js-tokens": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-4.0.0.tgz",
+ "integrity": "sha512-RdJUflcE3cUzKiMqQgsCu06FPu9UdIJO0beYbPhHN4k6apgJtifcoCtT9bcxOpYBtpD2kCM6Sbzg4CausW/PKQ=="
}
}
},
"@babel/parser": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.8.3.tgz",
- "integrity": "sha512-/V72F4Yp/qmHaTALizEm9Gf2eQHV3QyTL3K0cNfijwnMnb1L+LDlAubb/ZnSdGAVzVSWakujHYs1I26x66sMeQ=="
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.9.6.tgz",
+ "integrity": "sha512-AoeIEJn8vt+d/6+PXDRPaksYhnlbMIiejioBZvvMQsOjW/JYK6k/0dKnvvP3EhK5GfMBWDPtrxRtegWdAcdq9Q=="
},
"@babel/plugin-proposal-async-generator-functions": {
"version": "7.8.3",
@@ -604,12 +448,12 @@
}
},
"@babel/plugin-proposal-class-properties": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-class-properties/-/plugin-proposal-class-properties-7.8.3.tgz",
- "integrity": "sha512-EqFhbo7IosdgPgZggHaNObkmO1kNUe3slaKu54d5OWvy+p9QIKOzK1GAEpAIsZtWVtPXUHSMcT4smvDrCfY4AA==",
+ "version": "7.7.0",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-class-properties/-/plugin-proposal-class-properties-7.7.0.tgz",
+ "integrity": "sha512-tufDcFA1Vj+eWvwHN+jvMN6QsV5o+vUlytNKrbMiCeDL0F2j92RURzUsUMWE5EJkLyWxjdUslCsMQa9FWth16A==",
"requires": {
- "@babel/helper-create-class-features-plugin": "^7.8.3",
- "@babel/helper-plugin-utils": "^7.8.3"
+ "@babel/helper-create-class-features-plugin": "^7.7.0",
+ "@babel/helper-plugin-utils": "^7.0.0"
}
},
"@babel/plugin-proposal-dynamic-import": {
@@ -659,12 +503,13 @@
}
},
"@babel/plugin-proposal-object-rest-spread": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-object-rest-spread/-/plugin-proposal-object-rest-spread-7.8.3.tgz",
- "integrity": "sha512-8qvuPwU/xxUCt78HocNlv0mXXo0wdh9VT1R04WU8HGOfaOob26pF+9P5/lYjN/q7DHOX1bvX60hnhOvuQUJdbA==",
+ "version": "7.9.5",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-object-rest-spread/-/plugin-proposal-object-rest-spread-7.9.5.tgz",
+ "integrity": "sha512-VP2oXvAf7KCYTthbUHwBlewbl1Iq059f6seJGsxMizaCdgHIeczOr7FBqELhSqfkIl04Fi8okzWzl63UKbQmmg==",
"requires": {
"@babel/helper-plugin-utils": "^7.8.3",
- "@babel/plugin-syntax-object-rest-spread": "^7.8.0"
+ "@babel/plugin-syntax-object-rest-spread": "^7.8.0",
+ "@babel/plugin-transform-parameters": "^7.9.5"
}
},
"@babel/plugin-proposal-optional-catch-binding": {
@@ -710,14 +555,6 @@
"@babel/helper-plugin-utils": "^7.8.0"
}
},
- "@babel/plugin-syntax-class-properties": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-class-properties/-/plugin-syntax-class-properties-7.8.3.tgz",
- "integrity": "sha512-UcAyQWg2bAN647Q+O811tG9MrJ38Z10jjhQdKNAL8fsyPzE3cCN/uT+f55cFVY4aGO4jqJAvmqsuY3GQDwAoXg==",
- "requires": {
- "@babel/helper-plugin-utils": "^7.8.3"
- }
- },
"@babel/plugin-syntax-dynamic-import": {
"version": "7.2.0",
"resolved": "https://registry.npmjs.org/@babel/plugin-syntax-dynamic-import/-/plugin-syntax-dynamic-import-7.2.0.tgz",
@@ -726,14 +563,6 @@
"@babel/helper-plugin-utils": "^7.0.0"
}
},
- "@babel/plugin-syntax-flow": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-flow/-/plugin-syntax-flow-7.8.3.tgz",
- "integrity": "sha512-innAx3bUbA0KSYj2E2MNFSn9hiCeowOFLxlsuhXzw8hMQnzkDomUr9QCD7E9VF60NmnG1sNTuuv6Qf4f8INYsg==",
- "requires": {
- "@babel/helper-plugin-utils": "^7.8.3"
- }
- },
"@babel/plugin-syntax-json-strings": {
"version": "7.8.3",
"resolved": "https://registry.npmjs.org/@babel/plugin-syntax-json-strings/-/plugin-syntax-json-strings-7.8.3.tgz",
@@ -842,16 +671,16 @@
}
},
"@babel/plugin-transform-classes": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-classes/-/plugin-transform-classes-7.8.3.tgz",
- "integrity": "sha512-SjT0cwFJ+7Rbr1vQsvphAHwUHvSUPmMjMU/0P59G8U2HLFqSa082JO7zkbDNWs9kH/IUqpHI6xWNesGf8haF1w==",
+ "version": "7.9.5",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-transform-classes/-/plugin-transform-classes-7.9.5.tgz",
+ "integrity": "sha512-x2kZoIuLC//O5iA7PEvecB105o7TLzZo8ofBVhP79N+DO3jaX+KYfww9TQcfBEZD0nikNyYcGB1IKtRq36rdmg==",
"requires": {
"@babel/helper-annotate-as-pure": "^7.8.3",
"@babel/helper-define-map": "^7.8.3",
- "@babel/helper-function-name": "^7.8.3",
+ "@babel/helper-function-name": "^7.9.5",
"@babel/helper-optimise-call-expression": "^7.8.3",
"@babel/helper-plugin-utils": "^7.8.3",
- "@babel/helper-replace-supers": "^7.8.3",
+ "@babel/helper-replace-supers": "^7.8.6",
"@babel/helper-split-export-declaration": "^7.8.3",
"globals": "^11.1.0"
}
@@ -865,9 +694,9 @@
}
},
"@babel/plugin-transform-destructuring": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-destructuring/-/plugin-transform-destructuring-7.8.3.tgz",
- "integrity": "sha512-H4X646nCkiEcHZUZaRkhE2XVsoz0J/1x3VVujnn96pSoGCtKPA99ZZA+va+gK+92Zycd6OBKCD8tDb/731bhgQ==",
+ "version": "7.9.5",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-transform-destructuring/-/plugin-transform-destructuring-7.9.5.tgz",
+ "integrity": "sha512-j3OEsGel8nHL/iusv/mRd5fYZ3DrOxWC82x0ogmdN/vHfAP4MYw+AFKYanzWlktNwikKvlzUV//afBW5FTp17Q==",
"requires": {
"@babel/helper-plugin-utils": "^7.8.3"
}
@@ -898,19 +727,10 @@
"@babel/helper-plugin-utils": "^7.8.3"
}
},
- "@babel/plugin-transform-flow-strip-types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-flow-strip-types/-/plugin-transform-flow-strip-types-7.9.0.tgz",
- "integrity": "sha512-7Qfg0lKQhEHs93FChxVLAvhBshOPQDtJUTVHr/ZwQNRccCm4O9D79r9tVSoV8iNwjP1YgfD+e/fgHcPkN1qEQg==",
- "requires": {
- "@babel/helper-plugin-utils": "^7.8.3",
- "@babel/plugin-syntax-flow": "^7.8.3"
- }
- },
"@babel/plugin-transform-for-of": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-for-of/-/plugin-transform-for-of-7.8.3.tgz",
- "integrity": "sha512-ZjXznLNTxhpf4Q5q3x1NsngzGA38t9naWH8Gt+0qYZEJAcvPI9waSStSh56u19Ofjr7QmD0wUsQ8hw8s/p1VnA==",
+ "version": "7.9.0",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-transform-for-of/-/plugin-transform-for-of-7.9.0.tgz",
+ "integrity": "sha512-lTAnWOpMwOXpyDx06N+ywmF3jNbafZEqZ96CGYabxHrxNX8l5ny7dt4bK/rGwAh9utyP2b2Hv7PlZh1AAS54FQ==",
"requires": {
"@babel/helper-plugin-utils": "^7.8.3"
}
@@ -941,193 +761,35 @@
}
},
"@babel/plugin-transform-modules-amd": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-modules-amd/-/plugin-transform-modules-amd-7.9.0.tgz",
- "integrity": "sha512-vZgDDF003B14O8zJy0XXLnPH4sg+9X5hFBBGN1V+B2rgrB+J2xIypSN6Rk9imB2hSTHQi5OHLrFWsZab1GMk+Q==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-transform-modules-amd/-/plugin-transform-modules-amd-7.9.6.tgz",
+ "integrity": "sha512-zoT0kgC3EixAyIAU+9vfaUVKTv9IxBDSabgHoUCBP6FqEJ+iNiN7ip7NBKcYqbfUDfuC2mFCbM7vbu4qJgOnDw==",
"requires": {
"@babel/helper-module-transforms": "^7.9.0",
"@babel/helper-plugin-utils": "^7.8.3",
- "babel-plugin-dynamic-import-node": "^2.3.0"
- },
- "dependencies": {
- "@babel/generator": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.9.4.tgz",
- "integrity": "sha512-rjP8ahaDy/ouhrvCoU1E5mqaitWrxwuNGU+dy1EpaoK48jZay4MdkskKGIMHLZNewg8sAsqpGSREJwP0zH3YQA==",
- "requires": {
- "@babel/types": "^7.9.0",
- "jsesc": "^2.5.1",
- "lodash": "^4.17.13",
- "source-map": "^0.5.0"
- }
- },
- "@babel/helper-module-transforms": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.9.0.tgz",
- "integrity": "sha512-0FvKyu0gpPfIQ8EkxlrAydOWROdHpBmiCiRwLkUiBGhCUPRRbVD2/tm3sFr/c/GWFrQ/ffutGUAnx7V0FzT2wA==",
- "requires": {
- "@babel/helper-module-imports": "^7.8.3",
- "@babel/helper-replace-supers": "^7.8.6",
- "@babel/helper-simple-access": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/template": "^7.8.6",
- "@babel/types": "^7.9.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/helper-replace-supers": {
- "version": "7.8.6",
- "resolved": "https://registry.npmjs.org/@babel/helper-replace-supers/-/helper-replace-supers-7.8.6.tgz",
- "integrity": "sha512-PeMArdA4Sv/Wf4zXwBKPqVj7n9UF/xg6slNRtZW84FM7JpE1CbG8B612FyM4cxrf4fMAMGO0kR7voy1ForHHFA==",
- "requires": {
- "@babel/helper-member-expression-to-functions": "^7.8.3",
- "@babel/helper-optimise-call-expression": "^7.8.3",
- "@babel/traverse": "^7.8.6",
- "@babel/types": "^7.8.6"
- }
- },
- "@babel/parser": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.9.4.tgz",
- "integrity": "sha512-bC49otXX6N0/VYhgOMh4gnP26E9xnDZK3TmbNpxYzzz9BQLBosQwfyOe9/cXUU3txYhTzLCbcqd5c8y/OmCjHA=="
- },
- "@babel/template": {
- "version": "7.8.6",
- "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.6.tgz",
- "integrity": "sha512-zbMsPMy/v0PWFZEhQJ66bqjhH+z0JgMoBWuikXybgG3Gkd/3t5oQ1Rw2WQhnSrsOmsKXnZOx15tkC4qON/+JPg==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/parser": "^7.8.6",
- "@babel/types": "^7.8.6"
- }
- },
- "@babel/traverse": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.9.0.tgz",
- "integrity": "sha512-jAZQj0+kn4WTHO5dUZkZKhbFrqZE7K5LAQ5JysMnmvGij+wOdr+8lWqPeW0BcF4wFwrEXXtdGO7wcV6YPJcf3w==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.9.0",
- "@babel/helper-function-name": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/parser": "^7.9.0",
- "@babel/types": "^7.9.0",
- "debug": "^4.1.0",
- "globals": "^11.1.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
+ "babel-plugin-dynamic-import-node": "^2.3.3"
}
},
"@babel/plugin-transform-modules-commonjs": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-modules-commonjs/-/plugin-transform-modules-commonjs-7.8.3.tgz",
- "integrity": "sha512-JpdMEfA15HZ/1gNuB9XEDlZM1h/gF/YOH7zaZzQu2xCFRfwc01NXBMHHSTT6hRjlXJJs5x/bfODM3LiCk94Sxg==",
+ "version": "7.7.0",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-transform-modules-commonjs/-/plugin-transform-modules-commonjs-7.7.0.tgz",
+ "integrity": "sha512-KEMyWNNWnjOom8vR/1+d+Ocz/mILZG/eyHHO06OuBQ2aNhxT62fr4y6fGOplRx+CxCSp3IFwesL8WdINfY/3kg==",
"requires": {
- "@babel/helper-module-transforms": "^7.8.3",
- "@babel/helper-plugin-utils": "^7.8.3",
- "@babel/helper-simple-access": "^7.8.3",
+ "@babel/helper-module-transforms": "^7.7.0",
+ "@babel/helper-plugin-utils": "^7.0.0",
+ "@babel/helper-simple-access": "^7.7.0",
"babel-plugin-dynamic-import-node": "^2.3.0"
}
},
"@babel/plugin-transform-modules-systemjs": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-modules-systemjs/-/plugin-transform-modules-systemjs-7.9.0.tgz",
- "integrity": "sha512-FsiAv/nao/ud2ZWy4wFacoLOm5uxl0ExSQ7ErvP7jpoihLR6Cq90ilOFyX9UXct3rbtKsAiZ9kFt5XGfPe/5SQ==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-transform-modules-systemjs/-/plugin-transform-modules-systemjs-7.9.6.tgz",
+ "integrity": "sha512-NW5XQuW3N2tTHim8e1b7qGy7s0kZ2OH3m5octc49K1SdAKGxYxeIx7hiIz05kS1R2R+hOWcsr1eYwcGhrdHsrg==",
"requires": {
"@babel/helper-hoist-variables": "^7.8.3",
"@babel/helper-module-transforms": "^7.9.0",
"@babel/helper-plugin-utils": "^7.8.3",
- "babel-plugin-dynamic-import-node": "^2.3.0"
- },
- "dependencies": {
- "@babel/generator": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.9.4.tgz",
- "integrity": "sha512-rjP8ahaDy/ouhrvCoU1E5mqaitWrxwuNGU+dy1EpaoK48jZay4MdkskKGIMHLZNewg8sAsqpGSREJwP0zH3YQA==",
- "requires": {
- "@babel/types": "^7.9.0",
- "jsesc": "^2.5.1",
- "lodash": "^4.17.13",
- "source-map": "^0.5.0"
- }
- },
- "@babel/helper-module-transforms": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.9.0.tgz",
- "integrity": "sha512-0FvKyu0gpPfIQ8EkxlrAydOWROdHpBmiCiRwLkUiBGhCUPRRbVD2/tm3sFr/c/GWFrQ/ffutGUAnx7V0FzT2wA==",
- "requires": {
- "@babel/helper-module-imports": "^7.8.3",
- "@babel/helper-replace-supers": "^7.8.6",
- "@babel/helper-simple-access": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/template": "^7.8.6",
- "@babel/types": "^7.9.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/helper-replace-supers": {
- "version": "7.8.6",
- "resolved": "https://registry.npmjs.org/@babel/helper-replace-supers/-/helper-replace-supers-7.8.6.tgz",
- "integrity": "sha512-PeMArdA4Sv/Wf4zXwBKPqVj7n9UF/xg6slNRtZW84FM7JpE1CbG8B612FyM4cxrf4fMAMGO0kR7voy1ForHHFA==",
- "requires": {
- "@babel/helper-member-expression-to-functions": "^7.8.3",
- "@babel/helper-optimise-call-expression": "^7.8.3",
- "@babel/traverse": "^7.8.6",
- "@babel/types": "^7.8.6"
- }
- },
- "@babel/parser": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.9.4.tgz",
- "integrity": "sha512-bC49otXX6N0/VYhgOMh4gnP26E9xnDZK3TmbNpxYzzz9BQLBosQwfyOe9/cXUU3txYhTzLCbcqd5c8y/OmCjHA=="
- },
- "@babel/template": {
- "version": "7.8.6",
- "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.6.tgz",
- "integrity": "sha512-zbMsPMy/v0PWFZEhQJ66bqjhH+z0JgMoBWuikXybgG3Gkd/3t5oQ1Rw2WQhnSrsOmsKXnZOx15tkC4qON/+JPg==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/parser": "^7.8.6",
- "@babel/types": "^7.8.6"
- }
- },
- "@babel/traverse": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.9.0.tgz",
- "integrity": "sha512-jAZQj0+kn4WTHO5dUZkZKhbFrqZE7K5LAQ5JysMnmvGij+wOdr+8lWqPeW0BcF4wFwrEXXtdGO7wcV6YPJcf3w==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.9.0",
- "@babel/helper-function-name": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/parser": "^7.9.0",
- "@babel/types": "^7.9.0",
- "debug": "^4.1.0",
- "globals": "^11.1.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
+ "babel-plugin-dynamic-import-node": "^2.3.3"
}
},
"@babel/plugin-transform-modules-umd": {
@@ -1137,85 +799,6 @@
"requires": {
"@babel/helper-module-transforms": "^7.9.0",
"@babel/helper-plugin-utils": "^7.8.3"
- },
- "dependencies": {
- "@babel/generator": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.9.4.tgz",
- "integrity": "sha512-rjP8ahaDy/ouhrvCoU1E5mqaitWrxwuNGU+dy1EpaoK48jZay4MdkskKGIMHLZNewg8sAsqpGSREJwP0zH3YQA==",
- "requires": {
- "@babel/types": "^7.9.0",
- "jsesc": "^2.5.1",
- "lodash": "^4.17.13",
- "source-map": "^0.5.0"
- }
- },
- "@babel/helper-module-transforms": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.9.0.tgz",
- "integrity": "sha512-0FvKyu0gpPfIQ8EkxlrAydOWROdHpBmiCiRwLkUiBGhCUPRRbVD2/tm3sFr/c/GWFrQ/ffutGUAnx7V0FzT2wA==",
- "requires": {
- "@babel/helper-module-imports": "^7.8.3",
- "@babel/helper-replace-supers": "^7.8.6",
- "@babel/helper-simple-access": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/template": "^7.8.6",
- "@babel/types": "^7.9.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/helper-replace-supers": {
- "version": "7.8.6",
- "resolved": "https://registry.npmjs.org/@babel/helper-replace-supers/-/helper-replace-supers-7.8.6.tgz",
- "integrity": "sha512-PeMArdA4Sv/Wf4zXwBKPqVj7n9UF/xg6slNRtZW84FM7JpE1CbG8B612FyM4cxrf4fMAMGO0kR7voy1ForHHFA==",
- "requires": {
- "@babel/helper-member-expression-to-functions": "^7.8.3",
- "@babel/helper-optimise-call-expression": "^7.8.3",
- "@babel/traverse": "^7.8.6",
- "@babel/types": "^7.8.6"
- }
- },
- "@babel/parser": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.9.4.tgz",
- "integrity": "sha512-bC49otXX6N0/VYhgOMh4gnP26E9xnDZK3TmbNpxYzzz9BQLBosQwfyOe9/cXUU3txYhTzLCbcqd5c8y/OmCjHA=="
- },
- "@babel/template": {
- "version": "7.8.6",
- "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.6.tgz",
- "integrity": "sha512-zbMsPMy/v0PWFZEhQJ66bqjhH+z0JgMoBWuikXybgG3Gkd/3t5oQ1Rw2WQhnSrsOmsKXnZOx15tkC4qON/+JPg==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/parser": "^7.8.6",
- "@babel/types": "^7.8.6"
- }
- },
- "@babel/traverse": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.9.0.tgz",
- "integrity": "sha512-jAZQj0+kn4WTHO5dUZkZKhbFrqZE7K5LAQ5JysMnmvGij+wOdr+8lWqPeW0BcF4wFwrEXXtdGO7wcV6YPJcf3w==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.9.0",
- "@babel/helper-function-name": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/parser": "^7.9.0",
- "@babel/types": "^7.9.0",
- "debug": "^4.1.0",
- "globals": "^11.1.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
}
},
"@babel/plugin-transform-named-capturing-groups-regex": {
@@ -1244,11 +827,10 @@
}
},
"@babel/plugin-transform-parameters": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-parameters/-/plugin-transform-parameters-7.8.3.tgz",
- "integrity": "sha512-/pqngtGb54JwMBZ6S/D3XYylQDFtGjWrnoCF4gXZOUpFV/ujbxnoNGNvDGu6doFWRPBveE72qTx/RRU44j5I/Q==",
+ "version": "7.9.5",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-transform-parameters/-/plugin-transform-parameters-7.9.5.tgz",
+ "integrity": "sha512-0+1FhHnMfj6lIIhVvS4KGQJeuhe1GI//h5uptK4PvLt+BGBxsoUJbd3/IW002yk//6sZPlFgsG1hY6OHLcy6kA==",
"requires": {
- "@babel/helper-call-delegate": "^7.8.3",
"@babel/helper-get-function-arity": "^7.8.3",
"@babel/helper-plugin-utils": "^7.8.3"
}
@@ -1270,11 +852,12 @@
}
},
"@babel/plugin-transform-react-jsx": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-react-jsx/-/plugin-transform-react-jsx-7.8.3.tgz",
- "integrity": "sha512-r0h+mUiyL595ikykci+fbwm9YzmuOrUBi0b+FDIKmi3fPQyFokWVEMJnRWHJPPQEjyFJyna9WZC6Viv6UHSv1g==",
+ "version": "7.9.4",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-transform-react-jsx/-/plugin-transform-react-jsx-7.9.4.tgz",
+ "integrity": "sha512-Mjqf3pZBNLt854CK0C/kRuXAnE6H/bo7xYojP+WGtX8glDGSibcwnsWwhwoSuRg0+EBnxPC1ouVnuetUIlPSAw==",
"requires": {
- "@babel/helper-builder-react-jsx": "^7.8.3",
+ "@babel/helper-builder-react-jsx": "^7.9.0",
+ "@babel/helper-builder-react-jsx-experimental": "^7.9.0",
"@babel/helper-plugin-utils": "^7.8.3",
"@babel/plugin-syntax-jsx": "^7.8.3"
}
@@ -1322,6 +905,13 @@
"@babel/helper-plugin-utils": "^7.0.0",
"resolve": "^1.8.1",
"semver": "^5.5.1"
+ },
+ "dependencies": {
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ }
}
},
"@babel/plugin-transform-shorthand-properties": {
@@ -1367,11 +957,11 @@
}
},
"@babel/plugin-transform-typescript": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-typescript/-/plugin-transform-typescript-7.9.4.tgz",
- "integrity": "sha512-yeWeUkKx2auDbSxRe8MusAG+n4m9BFY/v+lPjmQDgOFX5qnySkUY5oXzkp6FwPdsYqnKay6lorXYdC0n3bZO7w==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/plugin-transform-typescript/-/plugin-transform-typescript-7.9.6.tgz",
+ "integrity": "sha512-8OvsRdvpt3Iesf2qsAn+YdlwAJD7zJ+vhFZmDCa4b8dTp7MmHtKk5FF2mCsGxjZwuwsy/yIIay/nLmxST1ctVQ==",
"requires": {
- "@babel/helper-create-class-features-plugin": "^7.8.3",
+ "@babel/helper-create-class-features-plugin": "^7.9.6",
"@babel/helper-plugin-utils": "^7.8.3",
"@babel/plugin-syntax-typescript": "^7.8.3"
}
@@ -1441,6 +1031,13 @@
"invariant": "^2.2.2",
"js-levenshtein": "^1.1.3",
"semver": "^5.5.0"
+ },
+ "dependencies": {
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ }
}
},
"@babel/preset-modules": {
@@ -1477,83 +1074,76 @@
}
},
"@babel/runtime": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.8.3.tgz",
- "integrity": "sha512-fVHx1rzEmwB130VTkLnxR+HmxcTjGzH12LYQcFFoBwakMd3aOMD4OsRN7tGG/UOYE2ektgFrS8uACAoRk1CY0w==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.9.6.tgz",
+ "integrity": "sha512-64AF1xY3OAkFHqOb9s4jpgk1Mm5vDZ4L3acHvAml+53nO1XbXLuDodsVpO4OIUsmemlUHMxNdYMNJmsvOwLrvQ==",
"requires": {
- "regenerator-runtime": "^0.13.2"
+ "regenerator-runtime": "^0.13.4"
}
},
"@babel/runtime-corejs3": {
- "version": "7.9.2",
- "resolved": "https://registry.npmjs.org/@babel/runtime-corejs3/-/runtime-corejs3-7.9.2.tgz",
- "integrity": "sha512-HHxmgxbIzOfFlZ+tdeRKtaxWOMUoCG5Mu3wKeUmOxjYrwb3AAHgnmtCUbPPK11/raIWLIBK250t8E2BPO0p7jA==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/runtime-corejs3/-/runtime-corejs3-7.9.6.tgz",
+ "integrity": "sha512-6toWAfaALQjt3KMZQc6fABqZwUDDuWzz+cAfPhqyEnzxvdWOAkjwPNxgF8xlmo7OWLsSjaKjsskpKHRLaMArOA==",
"requires": {
"core-js-pure": "^3.0.0",
"regenerator-runtime": "^0.13.4"
- },
- "dependencies": {
- "regenerator-runtime": {
- "version": "0.13.5",
- "resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.13.5.tgz",
- "integrity": "sha512-ZS5w8CpKFinUzOwW3c83oPeVXoNsrLsaCoLtJvAClH135j/R77RuymhiSErhm2lKcwSCIpmvIWSbDkIfAqKQlA=="
- }
}
},
"@babel/template": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.3.tgz",
- "integrity": "sha512-04m87AcQgAFdvuoyiQ2kgELr2tV8B4fP/xJAVUL3Yb3bkNdMedD3d0rlSQr3PegP0cms3eHjl1F7PWlvWbU8FQ==",
+ "version": "7.8.6",
+ "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.6.tgz",
+ "integrity": "sha512-zbMsPMy/v0PWFZEhQJ66bqjhH+z0JgMoBWuikXybgG3Gkd/3t5oQ1Rw2WQhnSrsOmsKXnZOx15tkC4qON/+JPg==",
"requires": {
"@babel/code-frame": "^7.8.3",
- "@babel/parser": "^7.8.3",
- "@babel/types": "^7.8.3"
+ "@babel/parser": "^7.8.6",
+ "@babel/types": "^7.8.6"
}
},
"@babel/traverse": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.8.3.tgz",
- "integrity": "sha512-we+a2lti+eEImHmEXp7bM9cTxGzxPmBiVJlLVD+FuuQMeeO7RaDbutbgeheDkw+Xe3mCfJHnGOWLswT74m2IPg==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.9.6.tgz",
+ "integrity": "sha512-b3rAHSjbxy6VEAvlxM8OV/0X4XrG72zoxme6q1MOoe2vd0bEc+TwayhuC1+Dfgqh1QEG+pj7atQqvUprHIccsg==",
"requires": {
"@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.8.3",
- "@babel/helper-function-name": "^7.8.3",
+ "@babel/generator": "^7.9.6",
+ "@babel/helper-function-name": "^7.9.5",
"@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/parser": "^7.8.3",
- "@babel/types": "^7.8.3",
+ "@babel/parser": "^7.9.6",
+ "@babel/types": "^7.9.6",
"debug": "^4.1.0",
"globals": "^11.1.0",
"lodash": "^4.17.13"
}
},
"@babel/types": {
- "version": "7.8.3",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz",
- "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==",
+ "version": "7.9.6",
+ "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.6.tgz",
+ "integrity": "sha512-qxXzvBO//jO9ZnoasKF1uJzHd2+M6Q2ZPIVfnFps8JJvXy0ZBbwbNOmE6SGIY5XOY6d1Bo5lb9d9RJ8nv3WSeA==",
"requires": {
- "esutils": "^2.0.2",
+ "@babel/helper-validator-identifier": "^7.9.5",
"lodash": "^4.17.13",
"to-fast-properties": "^2.0.0"
}
},
"@bugsnag/browser": {
- "version": "6.5.2",
- "resolved": "https://registry.npmjs.org/@bugsnag/browser/-/browser-6.5.2.tgz",
- "integrity": "sha512-XFKKorJc92ivLnlHHhLiPvkP03tZ5y7n0Z2xO6lOU7t+jWF5YapgwqQAda/TWvyYO38B/baWdnOpWMB3QmjhkA=="
+ "version": "7.0.1",
+ "resolved": "https://registry.npmjs.org/@bugsnag/browser/-/browser-7.0.1.tgz",
+ "integrity": "sha512-UbgX17kMWOz43h4Cm9ZZDotxPWTQYd7LToSVBYVxsaI7RZCk3ci8r/ws1uoGwAsmuUfObcvQR2dYzAYRVer4EA=="
},
"@bugsnag/js": {
- "version": "6.5.2",
- "resolved": "https://registry.npmjs.org/@bugsnag/js/-/js-6.5.2.tgz",
- "integrity": "sha512-4ibw624fM5+Y/WSuo3T/MsJVtslsPV8X0MxFuRxdvpKVUXX216d8hN8E/bG4hr7aipqQOGhBYDqSzeL2wgmh0Q==",
+ "version": "7.0.2",
+ "resolved": "https://registry.npmjs.org/@bugsnag/js/-/js-7.0.2.tgz",
+ "integrity": "sha512-ZeShkcs/gP9FS9ffwL9dr3c/bq+y/NcOUomcfOAV7u1BRWn3sCeBOHiChoL3polXteqkQ5G5BKq/KRUW9Lqm8w==",
"requires": {
- "@bugsnag/browser": "^6.5.2",
- "@bugsnag/node": "^6.5.2"
+ "@bugsnag/browser": "^7.0.1",
+ "@bugsnag/node": "^7.0.1"
}
},
"@bugsnag/node": {
- "version": "6.5.2",
- "resolved": "https://registry.npmjs.org/@bugsnag/node/-/node-6.5.2.tgz",
- "integrity": "sha512-KQ1twKoOttMCYsHv7OXUVsommVcrk6RGQ5YoZGlTbREhccbzsvjbiXPKiY31Qc7OXKvaJwSXhnOKrQTpRleFUg==",
+ "version": "7.0.1",
+ "resolved": "https://registry.npmjs.org/@bugsnag/node/-/node-7.0.1.tgz",
+ "integrity": "sha512-/TB0W2hCm1l0XAnUn58MJsRMTA+ti0/4fNU9sPpCMEJkfatnRzGCscpYOvbzSARTW1xG445HZkYeAeRome/v8w==",
"requires": {
"byline": "^5.0.0",
"error-stack-parser": "^2.0.2",
@@ -1563,9 +1153,9 @@
}
},
"@bugsnag/plugin-react": {
- "version": "6.5.0",
- "resolved": "https://registry.npmjs.org/@bugsnag/plugin-react/-/plugin-react-6.5.0.tgz",
- "integrity": "sha512-kbyFSnQ4QLGjN04t9MbuD5KLWI2qQpjrgKrJvJNKM8xyeVIJYpkjx//TsDzG4ujNFVkwaP3bT48j85rf4EJNqA=="
+ "version": "7.0.1",
+ "resolved": "https://registry.npmjs.org/@bugsnag/plugin-react/-/plugin-react-7.0.1.tgz",
+ "integrity": "sha512-SRgk3vxZJZyyysTdp6A3ZZD6CuvLH5h03I5YVxA8hAezTh/P0L5c3smqIir1/O7djr90WmI8pTwFvE8mwVAFaA=="
},
"@csstools/convert-colors": {
"version": "1.4.0",
@@ -1577,340 +1167,6 @@
"resolved": "https://registry.npmjs.org/@csstools/normalize.css/-/normalize.css-10.1.0.tgz",
"integrity": "sha512-ij4wRiunFfaJxjB0BdrYHIH8FxBJpOwNPhhAcunlmPdXudL1WQV1qoP9un6JsEBAgQH+7UXyyjh0g7jTxXK6tg=="
},
- "@graphql-codegen/core": {
- "version": "1.13.1",
- "resolved": "https://registry.npmjs.org/@graphql-codegen/core/-/core-1.13.1.tgz",
- "integrity": "sha512-suAJPWlC0zMxExTLVUvwgn72Lp0qdrjk8Mxc+GK/JRRxkyIPLoWGjlZyojbQwC8PbrXFS+Th2k4nx8naa/tpwg==",
- "requires": {
- "@graphql-codegen/plugin-helpers": "1.13.1",
- "@graphql-toolkit/common": "0.9.9",
- "@graphql-toolkit/schema-merging": "0.9.9",
- "tslib": "1.11.1"
- },
- "dependencies": {
- "tslib": {
- "version": "1.11.1",
- "resolved": "https://registry.npmjs.org/tslib/-/tslib-1.11.1.tgz",
- "integrity": "sha512-aZW88SY8kQbU7gpV19lN24LtXh/yD4ZZg6qieAJDDg+YBsJcSmLGK9QpnUjAKVG/xefmvJGd1WUmfpT/g6AJGA=="
- }
- }
- },
- "@graphql-codegen/fragment-matcher": {
- "version": "1.13.1",
- "resolved": "https://registry.npmjs.org/@graphql-codegen/fragment-matcher/-/fragment-matcher-1.13.1.tgz",
- "integrity": "sha512-xpUUaN7ApAQeL6UCTa0yqERZRoEFLkm2Qu2SNp8PXjGmRFdBKmMTG7jwAwQ2uZa39Dmlmw/KCNSxHedkHXNiuA==",
- "requires": {
- "@graphql-codegen/plugin-helpers": "1.13.1"
- }
- },
- "@graphql-codegen/plugin-helpers": {
- "version": "1.13.1",
- "resolved": "https://registry.npmjs.org/@graphql-codegen/plugin-helpers/-/plugin-helpers-1.13.1.tgz",
- "integrity": "sha512-75GkqYnpt79hHxnVNSaVn9ESHB2ORglTcJWfnKKuO5e6/IbW/TsMB9OR683W6Y9c+nZLmwrVJVCVYLckST+1EA==",
- "requires": {
- "@graphql-toolkit/common": "0.9.9",
- "camel-case": "4.1.1",
- "common-tags": "1.8.0",
- "constant-case": "3.0.3",
- "import-from": "3.0.0",
- "lower-case": "2.0.1",
- "param-case": "3.0.3",
- "pascal-case": "3.1.1",
- "tslib": "1.11.1",
- "upper-case": "2.0.1"
- },
- "dependencies": {
- "tslib": {
- "version": "1.11.1",
- "resolved": "https://registry.npmjs.org/tslib/-/tslib-1.11.1.tgz",
- "integrity": "sha512-aZW88SY8kQbU7gpV19lN24LtXh/yD4ZZg6qieAJDDg+YBsJcSmLGK9QpnUjAKVG/xefmvJGd1WUmfpT/g6AJGA=="
- }
- }
- },
- "@graphql-codegen/typescript": {
- "version": "1.13.1",
- "resolved": "https://registry.npmjs.org/@graphql-codegen/typescript/-/typescript-1.13.1.tgz",
- "integrity": "sha512-Ob3Uw+Mp5p90mYFSKwk7iDLClmWjCScAv60mM441y4kmXlIQ79o3n3YIC5ZqUmmclarS7MGnkdpgcsgrOQNMrw==",
- "requires": {
- "@graphql-codegen/plugin-helpers": "1.13.1",
- "@graphql-codegen/visitor-plugin-common": "1.13.1",
- "auto-bind": "4.0.0",
- "tslib": "1.11.1"
- },
- "dependencies": {
- "tslib": {
- "version": "1.11.1",
- "resolved": "https://registry.npmjs.org/tslib/-/tslib-1.11.1.tgz",
- "integrity": "sha512-aZW88SY8kQbU7gpV19lN24LtXh/yD4ZZg6qieAJDDg+YBsJcSmLGK9QpnUjAKVG/xefmvJGd1WUmfpT/g6AJGA=="
- }
- }
- },
- "@graphql-codegen/visitor-plugin-common": {
- "version": "1.13.1",
- "resolved": "https://registry.npmjs.org/@graphql-codegen/visitor-plugin-common/-/visitor-plugin-common-1.13.1.tgz",
- "integrity": "sha512-ZdWuONFqDWmYuNVmgSiwDk39Pwp8UEnkd9dhceZ46cOyp8sfB9UPcSZg+Sq7Ku0zam9B2pWpUlr6gLadnbzEFQ==",
- "requires": {
- "@graphql-codegen/plugin-helpers": "1.13.1",
- "@graphql-toolkit/relay-operation-optimizer": "0.9.9",
- "array.prototype.flatmap": "1.2.3",
- "auto-bind": "4.0.0",
- "dependency-graph": "0.9.0",
- "graphql-tag": "2.10.3",
- "pascal-case": "3.1.1",
- "tslib": "1.11.1"
- },
- "dependencies": {
- "tslib": {
- "version": "1.11.1",
- "resolved": "https://registry.npmjs.org/tslib/-/tslib-1.11.1.tgz",
- "integrity": "sha512-aZW88SY8kQbU7gpV19lN24LtXh/yD4ZZg6qieAJDDg+YBsJcSmLGK9QpnUjAKVG/xefmvJGd1WUmfpT/g6AJGA=="
- }
- }
- },
- "@graphql-toolkit/code-file-loader": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/code-file-loader/-/code-file-loader-0.7.5.tgz",
- "integrity": "sha512-nJVkmcvYRfcx+wxJR7hyjmko4gEZSJOhp0UEPny3LOf4PIDUvDvtsKmz1P4J2RIRph9wieEG0jgkLoEvqE7vCA==",
- "requires": {
- "@graphql-toolkit/common": "0.7.5",
- "@graphql-toolkit/graphql-tag-pluck": "0.7.5",
- "tslib": "1.10.0"
- },
- "dependencies": {
- "@graphql-toolkit/common": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.7.5.tgz",
- "integrity": "sha512-pu7tKY6KW7+4noJQPCbIxKzv54tSl/FME9wU0rNSwcr4O3By+pv7VCYXxkhCSnftJcXsXAuAcdjcV2CBsjnZNg==",
- "requires": {
- "@kamilkisiela/graphql-tools": "4.0.6",
- "aggregate-error": "3.0.1",
- "is-glob": "4.0.1",
- "lodash": "4.17.15"
- }
- }
- }
- },
- "@graphql-toolkit/common": {
- "version": "0.9.9",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.9.9.tgz",
- "integrity": "sha512-1ucXoQ5yczsu46l52wkmJgnaM8nw9CHUsJzOL4HoQsnvSVKieueRTx/Ef924G/fqQ1TtPyUal/+pPw4i9Sl+6A==",
- "requires": {
- "aggregate-error": "3.0.1",
- "graphql-tools-fork": "8.9.6",
- "lodash": "4.17.15"
- }
- },
- "@graphql-toolkit/core": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/core/-/core-0.7.5.tgz",
- "integrity": "sha512-KKiWCZuFeuVHs3lvmVhx1savsov9J1PHXKebMl2DsK1+Yg/IuA7KjS2vWXQzRwBl6u/JeLDDK628hsfj8V2zKg==",
- "requires": {
- "@graphql-toolkit/common": "0.7.5",
- "@graphql-toolkit/schema-merging": "0.7.5",
- "aggregate-error": "3.0.1",
- "globby": "10.0.1",
- "graphql-import": "0.7.1",
- "is-glob": "4.0.1",
- "tslib": "^1.9.3",
- "valid-url": "1.0.9"
- },
- "dependencies": {
- "@graphql-toolkit/common": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.7.5.tgz",
- "integrity": "sha512-pu7tKY6KW7+4noJQPCbIxKzv54tSl/FME9wU0rNSwcr4O3By+pv7VCYXxkhCSnftJcXsXAuAcdjcV2CBsjnZNg==",
- "requires": {
- "@kamilkisiela/graphql-tools": "4.0.6",
- "aggregate-error": "3.0.1",
- "is-glob": "4.0.1",
- "lodash": "4.17.15"
- }
- },
- "@graphql-toolkit/schema-merging": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/schema-merging/-/schema-merging-0.7.5.tgz",
- "integrity": "sha512-6HJb0bFqkJn45MMWLpt1K0kPJlbyGUaXFuBMY+yQ6fr70U01VjWc/RpXm9JO9FzlpzmtaMGd2HcsWC+7mAddtg==",
- "requires": {
- "@graphql-toolkit/common": "0.7.5",
- "@kamilkisiela/graphql-tools": "4.0.6",
- "deepmerge": "4.2.2",
- "tslib": "1.10.0"
- }
- }
- }
- },
- "@graphql-toolkit/file-loading": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/file-loading/-/file-loading-0.7.5.tgz",
- "integrity": "sha512-T0iVpepkn/P7tS9EgVlHrKuX1RgMZGU9/PjGQyiFDgJzvctSYly8RsWe+bN4temPxoB/KHSWuNuNMpKHm+dQsw==",
- "requires": {
- "@graphql-toolkit/common": "0.7.5",
- "@kamilkisiela/graphql-tools": "4.0.6",
- "globby": "10.0.1"
- },
- "dependencies": {
- "@graphql-toolkit/common": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.7.5.tgz",
- "integrity": "sha512-pu7tKY6KW7+4noJQPCbIxKzv54tSl/FME9wU0rNSwcr4O3By+pv7VCYXxkhCSnftJcXsXAuAcdjcV2CBsjnZNg==",
- "requires": {
- "@kamilkisiela/graphql-tools": "4.0.6",
- "aggregate-error": "3.0.1",
- "is-glob": "4.0.1",
- "lodash": "4.17.15"
- }
- }
- }
- },
- "@graphql-toolkit/graphql-file-loader": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/graphql-file-loader/-/graphql-file-loader-0.7.5.tgz",
- "integrity": "sha512-KGvUyPfxwenRBgMvHP5WGQ3JHgAp0UCRdwQkXJtIEh9GmZJ6WVNOw2ZUMAeVTSeE/5LdQURYlFwgtWlFU++g5A==",
- "requires": {
- "@graphql-toolkit/common": "0.7.5",
- "graphql-import": "0.7.1",
- "tslib": "1.10.0"
- },
- "dependencies": {
- "@graphql-toolkit/common": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.7.5.tgz",
- "integrity": "sha512-pu7tKY6KW7+4noJQPCbIxKzv54tSl/FME9wU0rNSwcr4O3By+pv7VCYXxkhCSnftJcXsXAuAcdjcV2CBsjnZNg==",
- "requires": {
- "@kamilkisiela/graphql-tools": "4.0.6",
- "aggregate-error": "3.0.1",
- "is-glob": "4.0.1",
- "lodash": "4.17.15"
- }
- }
- }
- },
- "@graphql-toolkit/graphql-tag-pluck": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/graphql-tag-pluck/-/graphql-tag-pluck-0.7.5.tgz",
- "integrity": "sha512-dvbdwTivzWP66wtqSSJnr6Wesgk6zSo1M8XQGuMtsHmgbhXWwrlGYvz7CEUn0cIFKpi5cpyduKZG8Xy3UX6sIQ==",
- "requires": {
- "@babel/parser": "7.7.7",
- "@babel/traverse": "7.7.4",
- "@babel/types": "7.7.4",
- "vue-template-compiler": "^2.6.10"
- },
- "dependencies": {
- "@babel/parser": {
- "version": "7.7.7",
- "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.7.7.tgz",
- "integrity": "sha512-WtTZMZAZLbeymhkd/sEaPD8IQyGAhmuTuvTzLiCFM7iXiVdY0gc0IaI+cW0fh1BnSMbJSzXX6/fHllgHKwHhXw=="
- },
- "@babel/traverse": {
- "version": "7.7.4",
- "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.7.4.tgz",
- "integrity": "sha512-P1L58hQyupn8+ezVA2z5KBm4/Zr4lCC8dwKCMYzsa5jFMDMQAzaBNy9W5VjB+KAmBjb40U7a/H6ao+Xo+9saIw==",
- "requires": {
- "@babel/code-frame": "^7.5.5",
- "@babel/generator": "^7.7.4",
- "@babel/helper-function-name": "^7.7.4",
- "@babel/helper-split-export-declaration": "^7.7.4",
- "@babel/parser": "^7.7.4",
- "@babel/types": "^7.7.4",
- "debug": "^4.1.0",
- "globals": "^11.1.0",
- "lodash": "^4.17.13"
- }
- },
- "@babel/types": {
- "version": "7.7.4",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.7.4.tgz",
- "integrity": "sha512-cz5Ji23KCi4T+YIE/BolWosrJuSmoZeN1EFnRtBwF+KKLi8GG/Z2c2hOJJeCXPk4mwk4QFvTmwIodJowXgttRA==",
- "requires": {
- "esutils": "^2.0.2",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
- }
- },
- "@graphql-toolkit/json-file-loader": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/json-file-loader/-/json-file-loader-0.7.5.tgz",
- "integrity": "sha512-JRoqNV4FBsV0t2qo3nb++wfWgQzfToEERrnJc11EWCXgMkn0jMfWFHYru+gqCvSvzcoa3fymD3ceDUxZ4ERlgw==",
- "requires": {
- "@graphql-toolkit/common": "0.7.5",
- "tslib": "1.10.0"
- },
- "dependencies": {
- "@graphql-toolkit/common": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.7.5.tgz",
- "integrity": "sha512-pu7tKY6KW7+4noJQPCbIxKzv54tSl/FME9wU0rNSwcr4O3By+pv7VCYXxkhCSnftJcXsXAuAcdjcV2CBsjnZNg==",
- "requires": {
- "@kamilkisiela/graphql-tools": "4.0.6",
- "aggregate-error": "3.0.1",
- "is-glob": "4.0.1",
- "lodash": "4.17.15"
- }
- }
- }
- },
- "@graphql-toolkit/relay-operation-optimizer": {
- "version": "0.9.9",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/relay-operation-optimizer/-/relay-operation-optimizer-0.9.9.tgz",
- "integrity": "sha512-NyuWj6XgL0ReF9BS2fik3gFU/DOWNvq8tJgzZtGt7hhGxNcbuoh5bnaszOtlfTPjqgZHBMDsC5h3QW8NP7qGpg==",
- "requires": {
- "@graphql-toolkit/common": "0.9.9",
- "relay-compiler": "9.0.0"
- }
- },
- "@graphql-toolkit/schema-merging": {
- "version": "0.9.9",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/schema-merging/-/schema-merging-0.9.9.tgz",
- "integrity": "sha512-Y3lMlvI32nqFF9yZpVOAoJ8H/0l2CU9hMV3XyRhRC3hfk1vUotYmg5BqSZvjqZP57wo6fk1TDB93VXGef8ttQg==",
- "requires": {
- "@graphql-toolkit/common": "0.9.9",
- "deepmerge": "4.2.2",
- "graphql-tools-fork": "8.9.6",
- "tslib": "1.11.1"
- },
- "dependencies": {
- "tslib": {
- "version": "1.11.1",
- "resolved": "https://registry.npmjs.org/tslib/-/tslib-1.11.1.tgz",
- "integrity": "sha512-aZW88SY8kQbU7gpV19lN24LtXh/yD4ZZg6qieAJDDg+YBsJcSmLGK9QpnUjAKVG/xefmvJGd1WUmfpT/g6AJGA=="
- }
- }
- },
- "@graphql-toolkit/url-loader": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/url-loader/-/url-loader-0.7.5.tgz",
- "integrity": "sha512-Fc+BsTPhnQXe8CGI2hyUnhTu7EKsZ2q6GuKadUe1Ft3FSb4Rm8dJd0JdFgPWw6M5f1CNxaT5dR06P3yNyeO9MA==",
- "requires": {
- "@graphql-toolkit/common": "0.7.5",
- "cross-fetch": "3.0.4",
- "tslib": "1.10.0",
- "valid-url": "1.0.9"
- },
- "dependencies": {
- "@graphql-toolkit/common": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.7.5.tgz",
- "integrity": "sha512-pu7tKY6KW7+4noJQPCbIxKzv54tSl/FME9wU0rNSwcr4O3By+pv7VCYXxkhCSnftJcXsXAuAcdjcV2CBsjnZNg==",
- "requires": {
- "@kamilkisiela/graphql-tools": "4.0.6",
- "aggregate-error": "3.0.1",
- "is-glob": "4.0.1",
- "lodash": "4.17.15"
- }
- },
- "cross-fetch": {
- "version": "3.0.4",
- "resolved": "https://registry.npmjs.org/cross-fetch/-/cross-fetch-3.0.4.tgz",
- "integrity": "sha512-MSHgpjQqgbT/94D4CyADeNoYh52zMkCX4pcJvPP5WqPsLFMKjr2TCMg381ox5qI0ii2dPwaLx/00477knXqXVw==",
- "requires": {
- "node-fetch": "2.6.0",
- "whatwg-fetch": "3.0.0"
- }
- }
- }
- },
"@hapi/address": {
"version": "2.1.4",
"resolved": "https://registry.npmjs.org/@hapi/address/-/address-2.1.4.tgz",
@@ -1946,9 +1202,9 @@
}
},
"@hashicorp/js-utils": {
- "version": "1.0.8-alpha.0",
- "resolved": "https://registry.npmjs.org/@hashicorp/js-utils/-/js-utils-1.0.8-alpha.0.tgz",
- "integrity": "sha512-Sa51DV8GPlvmrcRP9t7HlOysqEZeZ4xrCC2Jga7olONKaDfw+Jip1+ihJFeBszMaa9nvu2uB0Kxpxn0W9w9s2w=="
+ "version": "1.0.9-alpha.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/js-utils/-/js-utils-1.0.9-alpha.0.tgz",
+ "integrity": "sha512-/Mgw6ufzjsysw5U0v7c0tCXMQeE4BSbGeasDaTuh1r6jQ+2Cokl1XhPqKqXn4+xkcx3CIVdyoUYOSLmgzutn3Q=="
},
"@hashicorp/localstorage-polyfill": {
"version": "1.0.12",
@@ -1956,151 +1212,44 @@
"integrity": "sha512-wUWfaiEUo+2qcBjzYKwGpjqFsMCcD+Z4egF/2DHL13kvNZgbFMRBgSww0/bmOVq7ovhp3BnMRiHKZvcugRr1OQ=="
},
"@hashicorp/nextjs-scripts": {
- "version": "6.2.0-9",
- "resolved": "https://registry.npmjs.org/@hashicorp/nextjs-scripts/-/nextjs-scripts-6.2.0-9.tgz",
- "integrity": "sha512-0o0E63JTCCLG/M4yIff2HuD3yu32u25cxVyezFNvAD76TZgf6IX0UDkkrB83/xuKdmiFnJx3Fq3CKX1CE6OvCA==",
- "requires": {
- "@graphql-codegen/core": "^1.13.1",
- "@graphql-codegen/fragment-matcher": "^1.13.1",
- "@graphql-codegen/typescript": "^1.13.1",
- "@hashicorp/remark-plugins": "^2.0.3",
- "@next/bundle-analyzer": "^9.3.1",
- "@typescript-eslint/eslint-plugin": "^2.25.0",
- "@typescript-eslint/parser": "^2.25.0",
- "@zeit/next-css": "^1.0.1",
- "apollo-cache-inmemory": "^1.6.5",
- "apollo-client": "^2.6.8",
- "apollo-link": "^1.2.13",
- "apollo-link-error": "^1.1.12",
- "apollo-link-http": "^1.5.16",
- "babel-eslint": "^10.1.0",
- "chalk": "^3.0.0",
- "debug": "^4.1.1",
- "ejs": "^3.0.1",
- "eslint": "^6.8.0",
- "eslint-config-prettier": "^6.10.1",
- "eslint-plugin-jsx-a11y": "^6.2.3",
- "eslint-plugin-prettier": "^3.1.2",
- "eslint-plugin-react": "^7.19.0",
- "fs-extra": "^9.0.0",
- "glob": "^7.1.6",
- "graphql": "^14.6.0",
- "graphql-request": "^1.8.2",
- "graphql-tag-pluck": "^0.8.7",
- "graphql-toolkit": "^0.7.5",
- "husky": "^4.2.3",
- "inquirer": "^7.1.0",
- "lint-staged": "^10.0.9",
- "next-mdx-enhanced": "^2.4.0",
- "next-optimized-images": "^2.5.5",
- "next-plugin-graphql": "0.0.2",
- "next-routes": "^1.4.2",
- "next-transpile-modules": "^2.3.1",
- "node-fetch": "^2.6.0",
- "open": "^7.0.3",
- "postcss-flexbugs-fixes": "^4.2.0",
- "postcss-normalize": "^8.0.1",
- "postcss-preset-env": "^6.7.0",
- "prettier": "^2.0.2",
- "pretty-quick": "^2.0.1",
- "react": "^16.13.1",
- "react-apollo": "^3.1.3",
- "react-dom": "^16.13.1",
- "readdirp": "^3.4.0",
- "rehype-highlight": "^4.0.0",
- "signale": "^1.4.0",
- "stringify-object": "^3.3.0",
- "typescript": "^3.8.3",
- "typewriter": "^7.0.1"
- },
- "dependencies": {
- "postcss": {
- "version": "7.0.27",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.27.tgz",
- "integrity": "sha512-WuQETPMcW9Uf1/22HWUWP9lgsIC+KEHg2kozMflKjbeUtw9ujvFX6QmIfozaErDkmLWS9WEnEdEe6Uo9/BNTdQ==",
- "requires": {
- "chalk": "^2.4.2",
- "source-map": "^0.6.1",
- "supports-color": "^6.1.0"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- },
- "dependencies": {
- "supports-color": {
- "version": "5.5.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
- "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- }
- }
- },
- "postcss-flexbugs-fixes": {
- "version": "4.2.0",
- "resolved": "https://registry.npmjs.org/postcss-flexbugs-fixes/-/postcss-flexbugs-fixes-4.2.0.tgz",
- "integrity": "sha512-QRE0n3hpkxxS/OGvzOa+PDuy4mh/Jg4o9ui22/ko5iGYOG3M5dfJabjnAZjTdh2G9F85c7Hv8hWcEDEKW/xceQ==",
- "requires": {
- "postcss": "^7.0.26"
- }
- },
- "prettier": {
- "version": "2.0.2",
- "resolved": "https://registry.npmjs.org/prettier/-/prettier-2.0.2.tgz",
- "integrity": "sha512-5xJQIPT8BraI7ZnaDwSbu5zLrB6vvi8hVV58yHQ+QK64qrY40dULy0HSRlQ2/2IdzeBpjhDkqdcFBnFeDEMVdg=="
- },
- "react": {
- "version": "16.13.1",
- "resolved": "https://registry.npmjs.org/react/-/react-16.13.1.tgz",
- "integrity": "sha512-YMZQQq32xHLX0bz5Mnibv1/LHb3Sqzngu7xstSM+vrkE5Kzr9xE0yMByK5kMoTK30YVJE61WfbxIFFvfeDKT1w==",
- "requires": {
- "loose-envify": "^1.1.0",
- "object-assign": "^4.1.1",
- "prop-types": "^15.6.2"
- }
- },
- "react-dom": {
- "version": "16.13.1",
- "resolved": "https://registry.npmjs.org/react-dom/-/react-dom-16.13.1.tgz",
- "integrity": "sha512-81PIMmVLnCNLO/fFOQxdQkvEq/+Hfpv24XNJfpyZhTRfO0QcmQIF/PgCa1zCOj2w1hrn12MFLyaJ/G0+Mxtfag==",
- "requires": {
- "loose-envify": "^1.1.0",
- "object-assign": "^4.1.1",
- "prop-types": "^15.6.2",
- "scheduler": "^0.19.1"
- }
- },
- "readdirp": {
- "version": "3.4.0",
- "resolved": "https://registry.npmjs.org/readdirp/-/readdirp-3.4.0.tgz",
- "integrity": "sha512-0xe001vZBnJEK+uKcj8qOhyAKPzIT+gStxWr3LCB0DwcXR5NZJ3IaC+yGnHCYzB/S7ov3m3EEbZI2zeNvX+hGQ==",
- "requires": {
- "picomatch": "^2.2.1"
- }
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
+ "version": "7.1.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/nextjs-scripts/-/nextjs-scripts-7.1.0.tgz",
+ "integrity": "sha512-CH7dumgoA6MOSrZ6JWGVAHK4m4HBoS2Z2ACYJKB7QpgAfaTUvBKRHGO1VI4X0GNf4b801b/dwxL8kiqJupsTqQ==",
+ "requires": {
+ "@bugsnag/js": "7.0.2",
+ "@bugsnag/plugin-react": "7.0.1",
+ "@hashicorp/react-consent-manager": "2.1.0",
+ "@hashicorp/remark-plugins": "2.2.0",
+ "@mapbox/rehype-prism": "0.4.0",
+ "@next/bundle-analyzer": "9.3.6",
+ "@typescript-eslint/eslint-plugin": "2.31.0",
+ "@typescript-eslint/parser": "2.31.0",
+ "babel-eslint": "10.1.0",
+ "chalk": "4.0.0",
+ "debug": "4.1.1",
+ "ejs": "3.1.2",
+ "eslint": "7.0.0",
+ "eslint-config-prettier": "6.11.0",
+ "eslint-plugin-jsx-a11y": "6.2.3",
+ "eslint-plugin-prettier": "3.1.3",
+ "eslint-plugin-react": "7.19.0",
+ "fs-extra": "9.0.0",
+ "inquirer": "7.1.0",
+ "lint-staged": "10.2.2",
+ "next-mdx-enhanced": "2.5.0",
+ "next-optimized-images": "2.6.0",
+ "next-transpile-modules": "3.3.0",
+ "nprogress": "0.2.0",
+ "open": "7.0.3",
+ "postcss-flexbugs-fixes": "4.2.1",
+ "postcss-normalize": "9.0.0",
+ "postcss-preset-env": "6.7.0",
+ "pretty-quick": "2.0.1",
+ "readdirp": "3.4.0",
+ "rivet-graphql": "0.0.2",
+ "signale": "1.4.0",
+ "typescript": "3.9.2",
+ "typewriter": "7.1.0"
}
},
"@hashicorp/react-alert": {
@@ -2109,48 +1258,59 @@
"integrity": "sha512-9CvkSJ2Onvy+1sXg0n0E3V4X0tl4u9wmp10ISQ4Wh55tstVeBBj/WhqBg8+MZlm9Ib9K903J2A3aDSWBo6k44w=="
},
"@hashicorp/react-button": {
- "version": "2.1.6",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-button/-/react-button-2.1.6.tgz",
- "integrity": "sha512-6ReNt9nbjsp//SSWErw/lQzf1unwzzIPdV/7FmJEOXSbmNVyeNJMyOOyFen/XhxUZefX2SuPtP3n48Q2U7bu0g==",
+ "version": "2.2.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-button/-/react-button-2.2.0.tgz",
+ "integrity": "sha512-UUwn+yFWlTIGjWbPu2Z1griHPT0ywu/ECVAJ7OVqx9ZKXUxr0DOnwMGuqrkZS34hg/mmUAzYQhWqo8fycoQXig==",
"requires": {
- "@hashicorp/react-global-styles": "^4.0.10",
+ "@hashicorp/react-global-styles": "^4.4.0",
"@hashicorp/react-inline-svg": "^1.0.0",
"slugify": "^1.3.6"
}
},
"@hashicorp/react-case-study-slider": {
- "version": "2.0.10",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-case-study-slider/-/react-case-study-slider-2.0.10.tgz",
- "integrity": "sha512-kC0GZ1k47LINWz840maksEgzbwS1xqjegUWcTHsIHbp15dIWW9s1rkj/Ltc0LOvce3+Kl+qNOlE6TK7hMQwFfg==",
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-case-study-slider/-/react-case-study-slider-2.1.0.tgz",
+ "integrity": "sha512-ICE+qoFmiDcK8wK8XX+Y3xUQ9+4AWIkwauBmZA/B1jlQwJPQaHDJn21BU8fwS8vkoozvNDwXwy6DGxIH+X5DKA==",
"requires": {
- "@hashicorp/react-button": "^2.1.6",
+ "@hashicorp/react-button": "^2.2.0",
"@hashicorp/react-image": "^2.0.1",
"marked": "^0.7.0"
}
},
- "@hashicorp/react-checkbox-input": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-checkbox-input/-/react-checkbox-input-2.0.0.tgz",
- "integrity": "sha512-DlJVJjV2jcS+2aG80qpeL1B9InvLQvxSMvjX9T8VVnZNnTu+CCQQuND5pW6aNQCRRvypPYXAe+FAsnOjKJDepA==",
- "requires": {
- "uuid": "^3.3.2"
- }
- },
"@hashicorp/react-code-block": {
- "version": "1.2.6",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-code-block/-/react-code-block-1.2.6.tgz",
- "integrity": "sha512-Uy/d74i0AH0qf3RwDLQVjih9s3GztC4Wbjjo4vkHTqcC7dNGBN9P+vDas4kuRN+npoha2la8ikD7CNRw47noiA==",
+ "version": "1.2.7",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-code-block/-/react-code-block-1.2.7.tgz",
+ "integrity": "sha512-UDrE3rvczajwjI9tyYlf7+HEjK8N5pk7r1TCar+3p0C49uplISzhmZjQc4AvrrceLTyMbt/TbWG40RhSVdAd5A==",
"requires": {
"@tippy.js/react": "^2.1.2",
"highlight.js": "^9.15.6"
+ },
+ "dependencies": {
+ "@tippy.js/react": {
+ "version": "2.2.3",
+ "resolved": "https://registry.npmjs.org/@tippy.js/react/-/react-2.2.3.tgz",
+ "integrity": "sha512-5XYvbQujzDj9r00JYEz/cBtm6DutjOdv2azdco53B+eWF7FDBCQfkLVn87wimfEpmGK0vqRQv/cwFxFcoOP98Q==",
+ "requires": {
+ "prop-types": "^15.6.2",
+ "tippy.js": "^4.3.4"
+ }
+ },
+ "tippy.js": {
+ "version": "4.3.5",
+ "resolved": "https://registry.npmjs.org/tippy.js/-/tippy.js-4.3.5.tgz",
+ "integrity": "sha512-NDq3efte8nGK6BOJ1dDN1/WelAwfmh3UtIYXXck6+SxLzbIQNZE/cmRSnwScZ/FyiKdIcvFHvYUgqmoGx8CcyA==",
+ "requires": {
+ "popper.js": "^1.14.7"
+ }
+ }
}
},
"@hashicorp/react-consent-manager": {
- "version": "2.0.6",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-consent-manager/-/react-consent-manager-2.0.6.tgz",
- "integrity": "sha512-ERfE5McIuR836gsbLQlVJ9XM40UF65OEVS6oCfcvLNYTpGgylAWmYlvIaBEAsOtzG8pD1uzFdu7bQuiR+aYZug==",
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-consent-manager/-/react-consent-manager-2.1.0.tgz",
+ "integrity": "sha512-3AV6acJmj6bnYAy2mBA04/fuaigOafzG68N43XZaA720VX+wBLVR4TOrtHpPpOfQJ2yR/4RVRcAzqzjYG8+pHA==",
"requires": {
- "@hashicorp/react-button": "^2.1.6",
+ "@hashicorp/react-button": "^2.2.0",
"@hashicorp/react-toggle": "^1.0.1",
"@segment/in-eu": "^0.2.1",
"js-cookie": "^2.2.0",
@@ -2163,53 +1323,73 @@
"resolved": "https://registry.npmjs.org/@hashicorp/react-content/-/react-content-3.0.0-0.tgz",
"integrity": "sha512-yP5d8zA6az3rvL1vHjsV8c9jUl05M06knvtmMdP4VYlkElikeoJ0kd/oJi0n1Zb5s4Pe4k7zOZah7VmYLYdwyw=="
},
+ "@hashicorp/react-docs-page": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-docs-page/-/react-docs-page-2.0.0.tgz",
+ "integrity": "sha512-0C8qjJHl/6QGbgsJG/yY+ixYCtrkb03qjzTUuZtgHIKtsYnxjqhJuTB8p2BtePXfRzEjjjhoZ0VRhJsB8OOGQA==",
+ "requires": {
+ "@hashicorp/react-content": "^2.2.1",
+ "@hashicorp/react-docs-sidenav": "^3.2.3",
+ "@hashicorp/react-head": "^1.0.0",
+ "@hashicorp/react-inline-svg": "^1.0.0"
+ },
+ "dependencies": {
+ "@hashicorp/react-content": {
+ "version": "2.2.1",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-content/-/react-content-2.2.1.tgz",
+ "integrity": "sha512-1CHIwS/hUrZEVArGLHXhqyGwmpIl6Un6DNFq0281MUtMGpGKP56Y4kSLYSqtTNuNBmG8zoDboaJ/qBXJMq5f+Q=="
+ }
+ }
+ },
"@hashicorp/react-docs-sidenav": {
- "version": "3.0.4",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-docs-sidenav/-/react-docs-sidenav-3.0.4.tgz",
- "integrity": "sha512-GoUPDEm63IB6XCsC6STcHSnKQLTl/4DBZzBhXf1MJjf0mhbn9h6gYvbliNBpfQoJHGShev+2jB7POsQT25MT0w==",
+ "version": "3.2.3",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-docs-sidenav/-/react-docs-sidenav-3.2.3.tgz",
+ "integrity": "sha512-s4ryCcgOwq7ISJw5K5m2Y2E07QqHztk6dOlfUE9XNJcGpioTQWIJNugc6jnrsirtaUnP8jwnuxJCVZwu4osE2A==",
"requires": {
"@hashicorp/react-link-wrap": "^0.0.3",
"fuzzysearch": "^1.0.3"
}
},
- "@hashicorp/react-docs-sitemap": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-docs-sitemap/-/react-docs-sitemap-1.0.0.tgz",
- "integrity": "sha512-hMmGfwNUBJjZE/hW6+dfCDwwfqqye+BIIcQgpoiHTrv6y9bPprPAQ6k5NRhBGtpkP1My4C5MQVQKBwHt+jIa/Q=="
- },
- "@hashicorp/react-footer": {
- "version": "3.1.11",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-footer/-/react-footer-3.1.11.tgz",
- "integrity": "sha512-IJ2/4svsmbORB5F7lH/14yicg7rCJR37W0+b7hsrENGh5acalSbi2VSBoGVOR3Jw3KcVvAIe3LRjo94QCZFOAA==",
+ "@hashicorp/react-enterprise-alert": {
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-enterprise-alert/-/react-enterprise-alert-2.1.0.tgz",
+ "integrity": "sha512-SYSn7I23aPQewdw43DtDm8tgeUXmlRIxX1UKpGqE1gmBOk9ygEBdyd5OZ/Cecg+doIKJwWB7V9uv2vMu6+GSFQ==",
"requires": {
- "@hashicorp/react-newsletter-signup-form": "^2.0.7"
+ "@hashicorp/js-utils": "^1.0.9-alpha.0"
}
},
"@hashicorp/react-global-styles": {
- "version": "4.0.10",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-global-styles/-/react-global-styles-4.0.10.tgz",
- "integrity": "sha512-4YA2Svko3GqrfEdHWV08Yk3VIkNiMK5pVqslzDhVGnFNXP5FjL9G8c6RVrGXbgSY8Qwh8nBs1xJSalJGJynaUg=="
+ "version": "4.4.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-global-styles/-/react-global-styles-4.4.0.tgz",
+ "integrity": "sha512-lv6XR2plm2m3+qO6VE+RYquTzOODIt3mQ/1fBT1bn7wsR0qxFiuryW4JfsF94oCGk++LkDkRt/8V742HiT+fHw=="
},
"@hashicorp/react-head": {
- "version": "0.1.1",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-head/-/react-head-0.1.1.tgz",
- "integrity": "sha512-t1eXCDp9mcAL32xaGrFqyQIpUlXqtH8IIYobUFcfxjNIEaMz+8sLYWZ9AbZwZJ3yPGqBezoEortUGAYT/EUFyQ=="
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-head/-/react-head-1.0.0.tgz",
+ "integrity": "sha512-s3klBASVhR8+mwF2SEBGxWk631OU/RecAvR59ry0n3cRFIj8dmIMYl1lcKCRHz28yDdPhYRWOpiHOmtckrg50w=="
},
"@hashicorp/react-hero": {
- "version": "3.0.4",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-hero/-/react-hero-3.0.4.tgz",
- "integrity": "sha512-OByGem2xVwz74qDGtP8yZkudu3d2zsznflp/8E47U5hmj2/RIV1dUYOT4imWPJCOMc5ipExxrF9RJIkTlrVaQA==",
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-hero/-/react-hero-3.1.0.tgz",
+ "integrity": "sha512-pX8Rnj+0dby47AtG9+07V35lA+1n9mXBogrJVpePBvYteV7KoGNtgq39ACOiMm14OjRtMxWxqwHzm4SvQRvQrA==",
"requires": {
"@hashicorp/js-utils": "^1.0.8-alpha.0",
"@hashicorp/localstorage-polyfill": "^1.0.12",
"@hashicorp/react-alert": "^2.0.0",
- "@hashicorp/react-button": "^2.1.6",
+ "@hashicorp/react-button": "^2.2.0",
"@hashicorp/react-image": "^2.0.1",
"@hashicorp/react-text-input": "^2.0.1",
"formik": "^1.5.8",
"marked": "^0.7.0",
"promise-polyfill": "^8.1.0",
"query-string": "^5.1.1"
+ },
+ "dependencies": {
+ "@hashicorp/js-utils": {
+ "version": "1.0.8-alpha.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/js-utils/-/js-utils-1.0.8-alpha.0.tgz",
+ "integrity": "sha512-Sa51DV8GPlvmrcRP9t7HlOysqEZeZ4xrCC2Jga7olONKaDfw+Jip1+ihJFeBszMaa9nvu2uB0Kxpxn0W9w9s2w=="
+ }
}
},
"@hashicorp/react-image": {
@@ -2235,13 +1415,32 @@
}
},
"@hashicorp/react-logo-grid": {
- "version": "2.0.8",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-logo-grid/-/react-logo-grid-2.0.8.tgz",
- "integrity": "sha512-563eKeXQWzm0f1v97MUNlcnUuF3uc6+gTUNFBy053iu5Oe4G2CLht8CHIjuKvWvTV2t9BU7hbBuNZdL55w6tdw==",
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-logo-grid/-/react-logo-grid-2.1.0.tgz",
+ "integrity": "sha512-Lu77jHxRpGsQhg7PsltTF8KeaTOlXhzbidh4qqnhdSnmFQP3aPy+m9rV2PDJem69TZYkqFrlivCVhmtS2y0wKg==",
"requires": {
- "@hashicorp/react-button": "^2.1.6",
+ "@hashicorp/react-button": "^2.2.0",
"@hashicorp/react-image": "^2.0.1",
"@tippy.js/react": "^2.1.2"
+ },
+ "dependencies": {
+ "@tippy.js/react": {
+ "version": "2.2.3",
+ "resolved": "https://registry.npmjs.org/@tippy.js/react/-/react-2.2.3.tgz",
+ "integrity": "sha512-5XYvbQujzDj9r00JYEz/cBtm6DutjOdv2azdco53B+eWF7FDBCQfkLVn87wimfEpmGK0vqRQv/cwFxFcoOP98Q==",
+ "requires": {
+ "prop-types": "^15.6.2",
+ "tippy.js": "^4.3.4"
+ }
+ },
+ "tippy.js": {
+ "version": "4.3.5",
+ "resolved": "https://registry.npmjs.org/tippy.js/-/tippy.js-4.3.5.tgz",
+ "integrity": "sha512-NDq3efte8nGK6BOJ1dDN1/WelAwfmh3UtIYXXck6+SxLzbIQNZE/cmRSnwScZ/FyiKdIcvFHvYUgqmoGx8CcyA==",
+ "requires": {
+ "popper.js": "^1.14.7"
+ }
+ }
}
},
"@hashicorp/react-mega-nav": {
@@ -2252,28 +1451,12 @@
"@hashicorp/react-inline-svg": "^1.0.0"
}
},
- "@hashicorp/react-newsletter-signup-form": {
- "version": "2.0.7",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-newsletter-signup-form/-/react-newsletter-signup-form-2.0.7.tgz",
- "integrity": "sha512-mTLjOF+qbq67SNNSrVyrkkZ6F9Z+K1yj//3BbRp2s4pw6aFs0Ofenc24ZVKmlzsfvpJLcVPQbfwp9NE08znUlQ==",
+ "@hashicorp/react-product-downloader": {
+ "version": "3.2.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-product-downloader/-/react-product-downloader-3.2.0.tgz",
+ "integrity": "sha512-J29P0Kgyx/E55tUvwgP1pcBGhczjlo7pgVFMyv9Chbw31uqEpVKGFav6lJxvZuk5AxYnSPg7S6hbF1D1v6RFbA==",
"requires": {
- "@hashicorp/localstorage-polyfill": "^1.0.12",
- "@hashicorp/react-button": "^2.1.6",
- "@hashicorp/react-checkbox-input": "^2.0.0",
- "@hashicorp/react-text-input": "^2.0.1",
- "formik": "^1.5.8",
- "js-cookie": "^2.2.0",
- "promise-polyfill": "^8.1.0",
- "query-string": "^5.1.1",
- "unfetch": "^4.1.0"
- }
- },
- "@hashicorp/react-product-downloader": {
- "version": "3.0.3",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-product-downloader/-/react-product-downloader-3.0.3.tgz",
- "integrity": "sha512-qg/hirxeFcWCd7p7FzA16c4nWQ8kddf5KSY6l+vC4Oox4YRYfrJrfRLHJGof1i4PQ1cUjeg+NK90WHOIQQiFyg==",
- "requires": {
- "@hashicorp/react-button": "^2.1.6"
+ "@hashicorp/react-button": "^2.2.0"
}
},
"@hashicorp/react-section-header": {
@@ -2283,22 +1466,15 @@
"requires": {
"@hashicorp/js-utils": "^1.0.9-alpha.0",
"marked": "^0.7.0"
- },
- "dependencies": {
- "@hashicorp/js-utils": {
- "version": "1.0.9-alpha.0",
- "resolved": "https://registry.npmjs.org/@hashicorp/js-utils/-/js-utils-1.0.9-alpha.0.tgz",
- "integrity": "sha512-/Mgw6ufzjsysw5U0v7c0tCXMQeE4BSbGeasDaTuh1r6jQ+2Cokl1XhPqKqXn4+xkcx3CIVdyoUYOSLmgzutn3Q=="
- }
}
},
"@hashicorp/react-subnav": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-subnav/-/react-subnav-3.0.0.tgz",
- "integrity": "sha512-2Mea/0xKcOt+si766rb7J0lXq7WM/WwdNqmjCDbUZkXF0MlpzHe2uD3qfyMYu58aUyDJ+pFr8kQXjoNLpSRQXg==",
+ "version": "3.2.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-subnav/-/react-subnav-3.2.0.tgz",
+ "integrity": "sha512-BENkZ33q8NXMAu1g2hWSvQa3DAKGawetjDpu+Na8Sj0q+32R3hvBlaFszl8KRbDU/3E15mSfQfv9/EFp2J453A==",
"requires": {
- "@hashicorp/react-button": "^2.1.6",
- "@hashicorp/react-global-styles": "^4.0.10",
+ "@hashicorp/react-button": "^2.2.0",
+ "@hashicorp/react-global-styles": "^4.4.0",
"@hashicorp/react-inline-svg": "^1.0.0",
"@hashicorp/react-link-wrap": "1.0.0",
"@primer/octicons-react": "^9.4.0",
@@ -2312,15 +1488,25 @@
}
}
},
+ "@hashicorp/react-tabs": {
+ "version": "0.4.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-tabs/-/react-tabs-0.4.0.tgz",
+ "integrity": "sha512-KSkd3akWC9843ybMEw1Ahga/yCfiG2BWLvjb1Hl1qVWrYIHPAYQ+W+mLvMRKJrGPlCMCTqpiNR5bK8iBvcDC/Q==",
+ "requires": {
+ "@hashicorp/react-global-styles": "^4.4.0",
+ "@hashicorp/react-inline-svg": "^1.0.0",
+ "@tippy.js/react": "^3.1.1"
+ }
+ },
"@hashicorp/react-text-and-content": {
- "version": "4.0.6",
- "resolved": "https://registry.npmjs.org/@hashicorp/react-text-and-content/-/react-text-and-content-4.0.6.tgz",
- "integrity": "sha512-9Whvw601i1BjRe0QDJ0iQ2T1ZJMCFgCh546XpYOyuVfSFom4sJOXDISAM2Mb/350R+Vy/Rn3vDtmTWPwoxK9Ow==",
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/react-text-and-content/-/react-text-and-content-4.1.0.tgz",
+ "integrity": "sha512-Xk+VBzdXvX+vA9+6V2IrQr1K0uqv2thpahjyiIUmAn9/1JvS47MbdXay/7HDqB31xD20JEGGjt+g0tMXRvxaVA==",
"requires": {
- "@hashicorp/react-button": "^2.1.6",
- "@hashicorp/react-code-block": "^1.2.6",
+ "@hashicorp/react-button": "^2.2.0",
+ "@hashicorp/react-code-block": "^1.2.7",
"@hashicorp/react-image": "^2.0.1",
- "@hashicorp/react-logo-grid": "^2.0.8",
+ "@hashicorp/react-logo-grid": "^2.1.0",
"marked": "^0.7.0"
}
},
@@ -2330,6 +1516,13 @@
"integrity": "sha512-pgOFY3JOKAP9LAO7fJNVFvGhDGpYM3X0joKspSMG9CNdvN0qSDJB+FNIZN5w+LwyZNpkXsdS26kU8vHSZTG4IQ==",
"requires": {
"uuid": "^3.3.2"
+ },
+ "dependencies": {
+ "uuid": {
+ "version": "3.4.0",
+ "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz",
+ "integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A=="
+ }
}
},
"@hashicorp/react-toggle": {
@@ -2357,9 +1550,9 @@
}
},
"@hashicorp/remark-plugins": {
- "version": "2.0.3",
- "resolved": "https://registry.npmjs.org/@hashicorp/remark-plugins/-/remark-plugins-2.0.3.tgz",
- "integrity": "sha512-Ehp9rA7POJy5xKc+HhnQ2oq6InV9DvVdaLNVs8G6ros5d9Wv7WrXr4HawW1BDPnRgjkgV1RotY2efUmRVMKC+w==",
+ "version": "2.2.0",
+ "resolved": "https://registry.npmjs.org/@hashicorp/remark-plugins/-/remark-plugins-2.2.0.tgz",
+ "integrity": "sha512-Hxu4PHzIpRNC0y7I4RKNMAyOPk2Fpj06tghKMftk3h22QAlP0emrNo2e5gQ6s0Y/kZGeceLGkKVqezLPJfqaAQ==",
"requires": {
"github-slugger": "^1.3.0",
"remark": "^11.0.2",
@@ -2370,164 +1563,155 @@
"unist-util-visit": "^2.0.2"
}
},
- "@kamilkisiela/graphql-tools": {
- "version": "4.0.6",
- "resolved": "https://registry.npmjs.org/@kamilkisiela/graphql-tools/-/graphql-tools-4.0.6.tgz",
- "integrity": "sha512-IPWa+dOFCE4zaCsrJrAMp7yWXnfOZLNhqoMEOmn958WkLM0mmsDc/W/Rh7/7xopIT6P0oizb6/N1iH5HnNXOUA==",
+ "@mapbox/rehype-prism": {
+ "version": "0.4.0",
+ "resolved": "https://registry.npmjs.org/@mapbox/rehype-prism/-/rehype-prism-0.4.0.tgz",
+ "integrity": "sha512-3lOB7cClhuKj4isJQITZp+YGXSmJ3cU71nmZ3vic4zpYrUlotNAogazelzz4QeJC16KsKv3pzP3mer3fgESeCg==",
"requires": {
- "apollo-link": "^1.2.3",
- "apollo-utilities": "^1.0.1",
- "deprecated-decorator": "^0.1.6",
- "iterall": "^1.1.3",
- "uuid": "^3.1.0"
+ "hast-util-to-string": "^1.0.0",
+ "refractor": "^2.3.0",
+ "unist-util-visit": "^1.1.3"
+ },
+ "dependencies": {
+ "unist-util-visit": {
+ "version": "1.4.1",
+ "resolved": "https://registry.npmjs.org/unist-util-visit/-/unist-util-visit-1.4.1.tgz",
+ "integrity": "sha512-AvGNk7Bb//EmJZyhtRUnNMEpId/AZ5Ph/KUpTI09WHQuDZHKovQ1oEv3mfmKpWKtoMzyMC4GLBm1Zy5k12fjIw==",
+ "requires": {
+ "unist-util-visit-parents": "^2.0.0"
+ }
+ }
}
},
"@mdx-js/loader": {
- "version": "1.5.8",
- "resolved": "https://registry.npmjs.org/@mdx-js/loader/-/loader-1.5.8.tgz",
- "integrity": "sha512-Tmrx1ZSTDEBF6oBG6aoEmLNhKVvLqfCQe7mpnTFDjAG0O26E96m45Saj/FJkl373ulJ8BRED2EamNjejrKoeJQ==",
+ "version": "1.6.1",
+ "resolved": "https://registry.npmjs.org/@mdx-js/loader/-/loader-1.6.1.tgz",
+ "integrity": "sha512-v1+q2NEjHQYiMAQVdCw9TA41I9XRJkJYAm8vPKyDIqAqqlq3QAvsAHyHKMpjXldzREfAMW1yckFqIl2ym10AEw==",
"requires": {
- "@mdx-js/mdx": "^1.5.8",
- "@mdx-js/react": "^1.5.8",
- "loader-utils": "1.2.3"
+ "@mdx-js/mdx": "^1.6.1",
+ "@mdx-js/react": "^1.6.1",
+ "loader-utils": "2.0.0"
+ },
+ "dependencies": {
+ "json5": {
+ "version": "2.1.3",
+ "resolved": "https://registry.npmjs.org/json5/-/json5-2.1.3.tgz",
+ "integrity": "sha512-KXPvOm8K9IJKFM0bmdn8QXh7udDh1g/giieX0NLCaMnb4hEiVFqnop2ImTXCc5e0/oHz3LTqmHGtExn5hfMkOA==",
+ "requires": {
+ "minimist": "^1.2.5"
+ }
+ },
+ "loader-utils": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.0.tgz",
+ "integrity": "sha512-rP4F0h2RaWSvPEkD7BLDFQnvSf+nK+wr3ESUjNTyAGobqrijmW92zc+SO6d4p4B1wh7+B/Jg1mkQe5NYUEHtHQ==",
+ "requires": {
+ "big.js": "^5.2.2",
+ "emojis-list": "^3.0.0",
+ "json5": "^2.1.2"
+ }
+ }
}
},
"@mdx-js/mdx": {
- "version": "1.5.8",
- "resolved": "https://registry.npmjs.org/@mdx-js/mdx/-/mdx-1.5.8.tgz",
- "integrity": "sha512-OzanPTN0p9GZOEVeEuEa8QsjxxGyfFOOnI/+V1oC1su9UIN4KUg1k4n/hWTZC+VZhdW1Lfj6+Ho8nIs6L+pbDA==",
+ "version": "1.6.1",
+ "resolved": "https://registry.npmjs.org/@mdx-js/mdx/-/mdx-1.6.1.tgz",
+ "integrity": "sha512-DLnHbYZGoXSzfIHKgEtsO4qP8029YbdyJvC746PwfPNrRyGciPsqgWmfz/nEXt/fg+UMBG/6/cZaZx/hvyxnyg==",
"requires": {
- "@babel/core": "7.8.4",
+ "@babel/core": "7.9.0",
"@babel/plugin-syntax-jsx": "7.8.3",
"@babel/plugin-syntax-object-rest-spread": "7.8.3",
- "@mdx-js/util": "^1.5.8",
- "babel-plugin-apply-mdx-type-prop": "^1.5.8",
- "babel-plugin-extract-import-names": "^1.5.8",
+ "@mdx-js/util": "^1.6.1",
+ "babel-plugin-apply-mdx-type-prop": "^1.6.1",
+ "babel-plugin-extract-import-names": "^1.6.1",
"camelcase-css": "2.0.1",
"detab": "2.0.3",
"hast-util-raw": "5.0.2",
"lodash.uniq": "4.5.0",
- "mdast-util-to-hast": "7.0.0",
- "remark-mdx": "^1.5.8",
- "remark-parse": "7.0.2",
- "remark-squeeze-paragraphs": "3.0.4",
+ "mdast-util-to-hast": "8.2.0",
+ "remark-footnotes": "1.0.0",
+ "remark-mdx": "^1.6.1",
+ "remark-parse": "8.0.2",
+ "remark-squeeze-paragraphs": "4.0.0",
"style-to-object": "0.3.0",
- "unified": "8.4.2",
+ "unified": "9.0.0",
"unist-builder": "2.0.3",
"unist-util-visit": "2.0.2"
},
"dependencies": {
- "@babel/core": {
- "version": "7.8.4",
- "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.8.4.tgz",
- "integrity": "sha512-0LiLrB2PwrVI+a2/IEskBopDYSd8BCb3rOvH7D5tzoWd696TBEduBvuLVm4Nx6rltrLZqvI3MCalB2K2aVzQjA==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.8.4",
- "@babel/helpers": "^7.8.4",
- "@babel/parser": "^7.8.4",
- "@babel/template": "^7.8.3",
- "@babel/traverse": "^7.8.4",
- "@babel/types": "^7.8.3",
- "convert-source-map": "^1.7.0",
- "debug": "^4.1.0",
- "gensync": "^1.0.0-beta.1",
- "json5": "^2.1.0",
- "lodash": "^4.17.13",
- "resolve": "^1.3.2",
- "semver": "^5.4.1",
- "source-map": "^0.5.0"
- }
- },
- "@babel/generator": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.9.4.tgz",
- "integrity": "sha512-rjP8ahaDy/ouhrvCoU1E5mqaitWrxwuNGU+dy1EpaoK48jZay4MdkskKGIMHLZNewg8sAsqpGSREJwP0zH3YQA==",
+ "parse-entities": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/parse-entities/-/parse-entities-2.0.0.tgz",
+ "integrity": "sha512-kkywGpCcRYhqQIchaWqZ875wzpS/bMKhz5HnN3p7wveJTkTtyAB/AlnS0f8DFSqYW1T82t6yEAkEcB+A1I3MbQ==",
"requires": {
- "@babel/types": "^7.9.0",
- "jsesc": "^2.5.1",
- "lodash": "^4.17.13",
- "source-map": "^0.5.0"
- },
- "dependencies": {
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
+ "character-entities": "^1.0.0",
+ "character-entities-legacy": "^1.0.0",
+ "character-reference-invalid": "^1.0.0",
+ "is-alphanumerical": "^1.0.0",
+ "is-decimal": "^1.0.0",
+ "is-hexadecimal": "^1.0.0"
}
},
- "@babel/helpers": {
- "version": "7.9.2",
- "resolved": "https://registry.npmjs.org/@babel/helpers/-/helpers-7.9.2.tgz",
- "integrity": "sha512-JwLvzlXVPjO8eU9c/wF9/zOIN7X6h8DYf7mG4CiFRZRvZNKEF5dQ3H3V+ASkHoIB3mWhatgl5ONhyqHRI6MppA==",
+ "remark-parse": {
+ "version": "8.0.2",
+ "resolved": "https://registry.npmjs.org/remark-parse/-/remark-parse-8.0.2.tgz",
+ "integrity": "sha512-eMI6kMRjsAGpMXXBAywJwiwAse+KNpmt+BK55Oofy4KvBZEqUDj6mWbGLJZrujoPIPPxDXzn3T9baRlpsm2jnQ==",
+ "requires": {
+ "ccount": "^1.0.0",
+ "collapse-white-space": "^1.0.2",
+ "is-alphabetical": "^1.0.0",
+ "is-decimal": "^1.0.0",
+ "is-whitespace-character": "^1.0.0",
+ "is-word-character": "^1.0.0",
+ "markdown-escapes": "^1.0.0",
+ "parse-entities": "^2.0.0",
+ "repeat-string": "^1.5.4",
+ "state-toggle": "^1.0.0",
+ "trim": "0.0.1",
+ "trim-trailing-lines": "^1.0.0",
+ "unherit": "^1.0.4",
+ "unist-util-remove-position": "^2.0.0",
+ "vfile-location": "^3.0.0",
+ "xtend": "^4.0.1"
+ }
+ },
+ "unified": {
+ "version": "9.0.0",
+ "resolved": "https://registry.npmjs.org/unified/-/unified-9.0.0.tgz",
+ "integrity": "sha512-ssFo33gljU3PdlWLjNp15Inqb77d6JnJSfyplGJPT/a+fNRNyCBeveBAYJdO5khKdF6WVHa/yYCC7Xl6BDwZUQ==",
+ "requires": {
+ "bail": "^1.0.0",
+ "extend": "^3.0.0",
+ "is-buffer": "^2.0.0",
+ "is-plain-obj": "^2.0.0",
+ "trough": "^1.0.0",
+ "vfile": "^4.0.0"
+ }
+ },
+ "unist-util-remove-position": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/unist-util-remove-position/-/unist-util-remove-position-2.0.1.tgz",
+ "integrity": "sha512-fDZsLYIe2uT+oGFnuZmy73K6ZxOPG/Qcm+w7jbEjaFcJgbQ6cqjs/eSPzXhsmGpAsWPkqZM9pYjww5QTn3LHMA==",
"requires": {
- "@babel/template": "^7.8.3",
- "@babel/traverse": "^7.9.0",
- "@babel/types": "^7.9.0"
- },
- "dependencies": {
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
+ "unist-util-visit": "^2.0.0"
}
},
- "@babel/parser": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.9.4.tgz",
- "integrity": "sha512-bC49otXX6N0/VYhgOMh4gnP26E9xnDZK3TmbNpxYzzz9BQLBosQwfyOe9/cXUU3txYhTzLCbcqd5c8y/OmCjHA=="
- },
- "@babel/traverse": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.9.0.tgz",
- "integrity": "sha512-jAZQj0+kn4WTHO5dUZkZKhbFrqZE7K5LAQ5JysMnmvGij+wOdr+8lWqPeW0BcF4wFwrEXXtdGO7wcV6YPJcf3w==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.9.0",
- "@babel/helper-function-name": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/parser": "^7.9.0",
- "@babel/types": "^7.9.0",
- "debug": "^4.1.0",
- "globals": "^11.1.0",
- "lodash": "^4.17.13"
- },
- "dependencies": {
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
- }
+ "vfile-location": {
+ "version": "3.0.1",
+ "resolved": "https://registry.npmjs.org/vfile-location/-/vfile-location-3.0.1.tgz",
+ "integrity": "sha512-yYBO06eeN/Ki6Kh1QAkgzYpWT1d3Qln+ZCtSbJqFExPl1S3y2qqotJQXoh6qEvl/jDlgpUJolBn3PItVnnZRqQ=="
}
}
},
"@mdx-js/react": {
- "version": "1.5.8",
- "resolved": "https://registry.npmjs.org/@mdx-js/react/-/react-1.5.8.tgz",
- "integrity": "sha512-L3rehITVxqDHOPJFGBSHKt3Mv/p3MENYlGIwLNYU89/iVqTLMD/vz8hL9RQtKqRoMbKuWpzzLlKIObqJzthNYg=="
+ "version": "1.6.1",
+ "resolved": "https://registry.npmjs.org/@mdx-js/react/-/react-1.6.1.tgz",
+ "integrity": "sha512-jXBSWdWFPK2fs3johKb0hQFsf/x/C24XQYQwMhj8FxwlBgf7+NGATwXFs6pGkKd5/JfK9HXmbOcQ78MYoIZyxA=="
},
"@mdx-js/util": {
- "version": "1.5.8",
- "resolved": "https://registry.npmjs.org/@mdx-js/util/-/util-1.5.8.tgz",
- "integrity": "sha512-a7Gjjw8bfBSertA/pTWBA/9WKEhgaSxvQE2NTSUzaknrzGFOhs4alZSHh3RHmSFdSWv5pUuzAgsWseMLhWEVkQ=="
+ "version": "1.6.1",
+ "resolved": "https://registry.npmjs.org/@mdx-js/util/-/util-1.6.1.tgz",
+ "integrity": "sha512-A3TBBjg5iVo8S4TTG0VrW8G9YNLob4+M6rALKjY8Sxr9zPExWQ7iTPUSvJVE7YhF9E08EQMubx1vRal3jtpJ9Q=="
},
"@mrmlnc/readdir-enhanced": {
"version": "2.2.1",
@@ -2539,48 +1723,23 @@
}
},
"@next/bundle-analyzer": {
- "version": "9.3.2",
- "resolved": "https://registry.npmjs.org/@next/bundle-analyzer/-/bundle-analyzer-9.3.2.tgz",
- "integrity": "sha512-EvMzpzJTsFCtqz2Wf1cIvz4WFj0fEdFujopCDwv0PP2Wxu+h29zf0f3PEUf/T2YqctpvHe0GjfD+JZcR3yotRw==",
+ "version": "9.3.6",
+ "resolved": "https://registry.npmjs.org/@next/bundle-analyzer/-/bundle-analyzer-9.3.6.tgz",
+ "integrity": "sha512-9Xrtd7aSd7dWWsBXBoW8JQ0xNTj1xNX3NoBge5UxRI5vb2e5rY9e0hLECVBvUzuMl86WgW//dOWVikB94DrhfA==",
"requires": {
"webpack-bundle-analyzer": "3.6.1"
}
},
- "@next/polyfill-nomodule": {
- "version": "9.3.3",
- "resolved": "https://registry.npmjs.org/@next/polyfill-nomodule/-/polyfill-nomodule-9.3.3.tgz",
- "integrity": "sha512-IsJeoEMleAqDU7kVuAxBael+z6CFyLyK0opEmubsCw6Ve6xAI291qCYJuOQK8IiG3693g7N7Nfr8Osh6NG0NvQ=="
- },
- "@nodelib/fs.scandir": {
- "version": "2.1.3",
- "resolved": "https://registry.npmjs.org/@nodelib/fs.scandir/-/fs.scandir-2.1.3.tgz",
- "integrity": "sha512-eGmwYQn3gxo4r7jdQnkrrN6bY478C3P+a/y72IJukF8LjB6ZHeB3c+Ehacj3sYeSmUXGlnA67/PmbM9CVwL7Dw==",
- "requires": {
- "@nodelib/fs.stat": "2.0.3",
- "run-parallel": "^1.1.9"
- },
- "dependencies": {
- "@nodelib/fs.stat": {
- "version": "2.0.3",
- "resolved": "https://registry.npmjs.org/@nodelib/fs.stat/-/fs.stat-2.0.3.tgz",
- "integrity": "sha512-bQBFruR2TAwoevBEd/NWMoAAtNGzTRgdrqnYCc7dhzfoNvqPzLyqlEQnzZ3kVnNrSp25iyxE00/3h2fqGAGArA=="
- }
- }
+ "@next/react-refresh-utils": {
+ "version": "9.3.6",
+ "resolved": "https://registry.npmjs.org/@next/react-refresh-utils/-/react-refresh-utils-9.3.6.tgz",
+ "integrity": "sha512-XgxPc3WAkNpzD9xYtN4bd3wpV39WhnHYSwXGovVVcImXY6yn1as6hDgwkbuLADY/SHLIu2AI6CTVq0JDoTC/+g=="
},
"@nodelib/fs.stat": {
"version": "1.1.3",
"resolved": "https://registry.npmjs.org/@nodelib/fs.stat/-/fs.stat-1.1.3.tgz",
"integrity": "sha512-shAmDyaQC4H92APFoIaVDHCx5bStIocgvbwQyxPRrbUY20V1EYTbSDchWbuwlMG3V17cprZhA6+78JfB+3DTPw=="
},
- "@nodelib/fs.walk": {
- "version": "1.2.4",
- "resolved": "https://registry.npmjs.org/@nodelib/fs.walk/-/fs.walk-1.2.4.tgz",
- "integrity": "sha512-1V9XOY4rDW0rehzbrcqAmHnz8e7SKvX27gh8Gt2WgB0+pdzdiLV83p72kZPU+jvMbS1qU5mauP2iOvO8rhmurQ==",
- "requires": {
- "@nodelib/fs.scandir": "2.1.3",
- "fastq": "^1.6.0"
- }
- },
"@primer/octicons-react": {
"version": "9.6.0",
"resolved": "https://registry.npmjs.org/@primer/octicons-react/-/octicons-react-9.6.0.tgz",
@@ -2628,12 +1787,12 @@
}
},
"@tippy.js/react": {
- "version": "2.2.3",
- "resolved": "https://registry.npmjs.org/@tippy.js/react/-/react-2.2.3.tgz",
- "integrity": "sha512-5XYvbQujzDj9r00JYEz/cBtm6DutjOdv2azdco53B+eWF7FDBCQfkLVn87wimfEpmGK0vqRQv/cwFxFcoOP98Q==",
+ "version": "3.1.1",
+ "resolved": "https://registry.npmjs.org/@tippy.js/react/-/react-3.1.1.tgz",
+ "integrity": "sha512-KF45vW/jKh/nBXk/2zzTFslv/T46zOMkIoDJ56ymZ+M00yHttk58J5wZ29oqGqDIUnobWSZD+cFpbR4u/UUvgw==",
"requires": {
"prop-types": "^15.6.2",
- "tippy.js": "^4.3.4"
+ "tippy.js": "^5.1.1"
}
},
"@types/color-name": {
@@ -2646,21 +1805,6 @@
"resolved": "https://registry.npmjs.org/@types/eslint-visitor-keys/-/eslint-visitor-keys-1.0.0.tgz",
"integrity": "sha512-OCutwjDZ4aFS6PB1UZ988C4YgwlBHJd6wCeQqaLdmadZ/7e+w79+hbMUFC1QXDNCmdyoRfAFdm0RypzwR+Qpag=="
},
- "@types/events": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/@types/events/-/events-3.0.0.tgz",
- "integrity": "sha512-EaObqwIvayI5a8dCzhFrjKzVwKLxjoG9T6Ppd5CEo07LRKfQ8Yokw54r5+Wq7FaBQ+yXRvQAYPrHwya1/UFt9g=="
- },
- "@types/glob": {
- "version": "7.1.1",
- "resolved": "https://registry.npmjs.org/@types/glob/-/glob-7.1.1.tgz",
- "integrity": "sha512-1Bh06cbWJUHMC97acuD6UMG29nMt0Aqz1vF3guLfG+kHHJhy3AyohZFFxYk2f7Q1SQIrNwvncxAE0N/9s70F2w==",
- "requires": {
- "@types/events": "*",
- "@types/minimatch": "*",
- "@types/node": "*"
- }
- },
"@types/json-schema": {
"version": "7.0.4",
"resolved": "https://registry.npmjs.org/@types/json-schema/-/json-schema-7.0.4.tgz",
@@ -2679,11 +1823,6 @@
"resolved": "https://registry.npmjs.org/@types/minimatch/-/minimatch-3.0.3.tgz",
"integrity": "sha512-tHq6qdbT9U1IRSGf14CL0pUlULksvY9OZ+5eEgl1N7t+OA3tGvNpxJCzuKQlsNgCVwbAs670L1vcVQi8j9HjnA=="
},
- "@types/node": {
- "version": "12.12.31",
- "resolved": "https://registry.npmjs.org/@types/node/-/node-12.12.31.tgz",
- "integrity": "sha512-T+wnJno8uh27G9c+1T+a1/WYCHzLeDqtsGJkoEdSp2X8RTh3oOCZQcUnjAx90CS8cmmADX51O0FI/tu9s0yssg=="
- },
"@types/parse-json": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/@types/parse-json/-/parse-json-4.0.0.tgz",
@@ -2704,48 +1843,43 @@
"resolved": "https://registry.npmjs.org/@types/yoga-layout/-/yoga-layout-1.9.1.tgz",
"integrity": "sha512-OpfgQXWLZn5Dl7mOd8dBNcV8NywXbYYoHjUpa64vJ/RQABaxMzJ5bVicKLGIvIiMnQPtPgKNgXb5jkv9fkOQtw=="
},
- "@types/zen-observable": {
- "version": "0.8.0",
- "resolved": "https://registry.npmjs.org/@types/zen-observable/-/zen-observable-0.8.0.tgz",
- "integrity": "sha512-te5lMAWii1uEJ4FwLjzdlbw3+n0FZNOvFXHxQDKeT0dilh7HOzdMzV2TrJVUzq8ep7J4Na8OUYPRLSQkJHAlrg=="
- },
"@typescript-eslint/eslint-plugin": {
- "version": "2.25.0",
- "resolved": "https://registry.npmjs.org/@typescript-eslint/eslint-plugin/-/eslint-plugin-2.25.0.tgz",
- "integrity": "sha512-W2YyMtjmlrOjtXc+FtTelVs9OhuR6OlYc4XKIslJ8PUJOqgYYAPRJhAqkYRQo3G4sjvG8jSodsNycEn4W2gHUw==",
+ "version": "2.31.0",
+ "resolved": "https://registry.npmjs.org/@typescript-eslint/eslint-plugin/-/eslint-plugin-2.31.0.tgz",
+ "integrity": "sha512-iIC0Pb8qDaoit+m80Ln/aaeu9zKQdOLF4SHcGLarSeY1gurW6aU4JsOPMjKQwXlw70MvWKZQc6S2NamA8SJ/gg==",
"requires": {
- "@typescript-eslint/experimental-utils": "2.25.0",
+ "@typescript-eslint/experimental-utils": "2.31.0",
"functional-red-black-tree": "^1.0.1",
"regexpp": "^3.0.0",
"tsutils": "^3.17.1"
}
},
"@typescript-eslint/experimental-utils": {
- "version": "2.25.0",
- "resolved": "https://registry.npmjs.org/@typescript-eslint/experimental-utils/-/experimental-utils-2.25.0.tgz",
- "integrity": "sha512-0IZ4ZR5QkFYbaJk+8eJ2kYeA+1tzOE1sBjbwwtSV85oNWYUBep+EyhlZ7DLUCyhMUGuJpcCCFL0fDtYAP1zMZw==",
+ "version": "2.31.0",
+ "resolved": "https://registry.npmjs.org/@typescript-eslint/experimental-utils/-/experimental-utils-2.31.0.tgz",
+ "integrity": "sha512-MI6IWkutLYQYTQgZ48IVnRXmLR/0Q6oAyJgiOror74arUMh7EWjJkADfirZhRsUMHeLJ85U2iySDwHTSnNi9vA==",
"requires": {
"@types/json-schema": "^7.0.3",
- "@typescript-eslint/typescript-estree": "2.25.0",
+ "@typescript-eslint/typescript-estree": "2.31.0",
"eslint-scope": "^5.0.0",
"eslint-utils": "^2.0.0"
}
},
"@typescript-eslint/parser": {
- "version": "2.25.0",
- "resolved": "https://registry.npmjs.org/@typescript-eslint/parser/-/parser-2.25.0.tgz",
- "integrity": "sha512-mccBLaBSpNVgp191CP5W+8U1crTyXsRziWliCqzj02kpxdjKMvFHGJbK33NroquH3zB/gZ8H511HEsJBa2fNEg==",
+ "version": "2.31.0",
+ "resolved": "https://registry.npmjs.org/@typescript-eslint/parser/-/parser-2.31.0.tgz",
+ "integrity": "sha512-uph+w6xUOlyV2DLSC6o+fBDzZ5i7+3/TxAsH4h3eC64tlga57oMb96vVlXoMwjR/nN+xyWlsnxtbDkB46M2EPQ==",
"requires": {
"@types/eslint-visitor-keys": "^1.0.0",
- "@typescript-eslint/experimental-utils": "2.25.0",
- "@typescript-eslint/typescript-estree": "2.25.0",
+ "@typescript-eslint/experimental-utils": "2.31.0",
+ "@typescript-eslint/typescript-estree": "2.31.0",
"eslint-visitor-keys": "^1.1.0"
}
},
"@typescript-eslint/typescript-estree": {
- "version": "2.25.0",
- "resolved": "https://registry.npmjs.org/@typescript-eslint/typescript-estree/-/typescript-estree-2.25.0.tgz",
- "integrity": "sha512-VUksmx5lDxSi6GfmwSK7SSoIKSw9anukWWNitQPqt58LuYrKalzsgeuignbqnB+rK/xxGlSsCy8lYnwFfB6YJg==",
+ "version": "2.31.0",
+ "resolved": "https://registry.npmjs.org/@typescript-eslint/typescript-estree/-/typescript-estree-2.31.0.tgz",
+ "integrity": "sha512-vxW149bXFXXuBrAak0eKHOzbcu9cvi6iNcJDzEtOkRwGHxJG15chiAQAwhLOsk+86p9GTr/TziYvw+H9kMaIgA==",
"requires": {
"debug": "^4.1.1",
"eslint-visitor-keys": "^1.1.0",
@@ -2754,190 +1888,165 @@
"lodash": "^4.17.15",
"semver": "^6.3.0",
"tsutils": "^3.17.1"
- },
- "dependencies": {
- "semver": {
- "version": "6.3.0",
- "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
- "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
- }
}
},
"@webassemblyjs/ast": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/ast/-/ast-1.8.5.tgz",
- "integrity": "sha512-aJMfngIZ65+t71C3y2nBBg5FFG0Okt9m0XEgWZ7Ywgn1oMAT8cNwx00Uv1cQyHtidq0Xn94R4TAywO+LCQ+ZAQ==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/ast/-/ast-1.9.0.tgz",
+ "integrity": "sha512-C6wW5L+b7ogSDVqymbkkvuW9kruN//YisMED04xzeBBqjHa2FYnmvOlS6Xj68xWQRgWvI9cIglsjFowH/RJyEA==",
"requires": {
- "@webassemblyjs/helper-module-context": "1.8.5",
- "@webassemblyjs/helper-wasm-bytecode": "1.8.5",
- "@webassemblyjs/wast-parser": "1.8.5"
+ "@webassemblyjs/helper-module-context": "1.9.0",
+ "@webassemblyjs/helper-wasm-bytecode": "1.9.0",
+ "@webassemblyjs/wast-parser": "1.9.0"
}
},
"@webassemblyjs/floating-point-hex-parser": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/floating-point-hex-parser/-/floating-point-hex-parser-1.8.5.tgz",
- "integrity": "sha512-9p+79WHru1oqBh9ewP9zW95E3XAo+90oth7S5Re3eQnECGq59ly1Ri5tsIipKGpiStHsUYmY3zMLqtk3gTcOtQ=="
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/floating-point-hex-parser/-/floating-point-hex-parser-1.9.0.tgz",
+ "integrity": "sha512-TG5qcFsS8QB4g4MhrxK5TqfdNe7Ey/7YL/xN+36rRjl/BlGE/NcBvJcqsRgCP6Z92mRE+7N50pRIi8SmKUbcQA=="
},
"@webassemblyjs/helper-api-error": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-api-error/-/helper-api-error-1.8.5.tgz",
- "integrity": "sha512-Za/tnzsvnqdaSPOUXHyKJ2XI7PDX64kWtURyGiJJZKVEdFOsdKUCPTNEVFZq3zJ2R0G5wc2PZ5gvdTRFgm81zA=="
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-api-error/-/helper-api-error-1.9.0.tgz",
+ "integrity": "sha512-NcMLjoFMXpsASZFxJ5h2HZRcEhDkvnNFOAKneP5RbKRzaWJN36NC4jqQHKwStIhGXu5mUWlUUk7ygdtrO8lbmw=="
},
"@webassemblyjs/helper-buffer": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-buffer/-/helper-buffer-1.8.5.tgz",
- "integrity": "sha512-Ri2R8nOS0U6G49Q86goFIPNgjyl6+oE1abW1pS84BuhP1Qcr5JqMwRFT3Ah3ADDDYGEgGs1iyb1DGX+kAi/c/Q=="
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-buffer/-/helper-buffer-1.9.0.tgz",
+ "integrity": "sha512-qZol43oqhq6yBPx7YM3m9Bv7WMV9Eevj6kMi6InKOuZxhw+q9hOkvq5e/PpKSiLfyetpaBnogSbNCfBwyB00CA=="
},
"@webassemblyjs/helper-code-frame": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-code-frame/-/helper-code-frame-1.8.5.tgz",
- "integrity": "sha512-VQAadSubZIhNpH46IR3yWO4kZZjMxN1opDrzePLdVKAZ+DFjkGD/rf4v1jap744uPVU6yjL/smZbRIIJTOUnKQ==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-code-frame/-/helper-code-frame-1.9.0.tgz",
+ "integrity": "sha512-ERCYdJBkD9Vu4vtjUYe8LZruWuNIToYq/ME22igL+2vj2dQ2OOujIZr3MEFvfEaqKoVqpsFKAGsRdBSBjrIvZA==",
"requires": {
- "@webassemblyjs/wast-printer": "1.8.5"
+ "@webassemblyjs/wast-printer": "1.9.0"
}
},
"@webassemblyjs/helper-fsm": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-fsm/-/helper-fsm-1.8.5.tgz",
- "integrity": "sha512-kRuX/saORcg8se/ft6Q2UbRpZwP4y7YrWsLXPbbmtepKr22i8Z4O3V5QE9DbZK908dh5Xya4Un57SDIKwB9eow=="
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-fsm/-/helper-fsm-1.9.0.tgz",
+ "integrity": "sha512-OPRowhGbshCb5PxJ8LocpdX9Kl0uB4XsAjl6jH/dWKlk/mzsANvhwbiULsaiqT5GZGT9qinTICdj6PLuM5gslw=="
},
"@webassemblyjs/helper-module-context": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-module-context/-/helper-module-context-1.8.5.tgz",
- "integrity": "sha512-/O1B236mN7UNEU4t9X7Pj38i4VoU8CcMHyy3l2cV/kIF4U5KoHXDVqcDuOs1ltkac90IM4vZdHc52t1x8Yfs3g==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-module-context/-/helper-module-context-1.9.0.tgz",
+ "integrity": "sha512-MJCW8iGC08tMk2enck1aPW+BE5Cw8/7ph/VGZxwyvGbJwjktKkDK7vy7gAmMDx88D7mhDTCNKAW5tED+gZ0W8g==",
"requires": {
- "@webassemblyjs/ast": "1.8.5",
- "mamacro": "^0.0.3"
+ "@webassemblyjs/ast": "1.9.0"
}
},
"@webassemblyjs/helper-wasm-bytecode": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-wasm-bytecode/-/helper-wasm-bytecode-1.8.5.tgz",
- "integrity": "sha512-Cu4YMYG3Ddl72CbmpjU/wbP6SACcOPVbHN1dI4VJNJVgFwaKf1ppeFJrwydOG3NDHxVGuCfPlLZNyEdIYlQ6QQ=="
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-wasm-bytecode/-/helper-wasm-bytecode-1.9.0.tgz",
+ "integrity": "sha512-R7FStIzyNcd7xKxCZH5lE0Bqy+hGTwS3LJjuv1ZVxd9O7eHCedSdrId/hMOd20I+v8wDXEn+bjfKDLzTepoaUw=="
},
"@webassemblyjs/helper-wasm-section": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-wasm-section/-/helper-wasm-section-1.8.5.tgz",
- "integrity": "sha512-VV083zwR+VTrIWWtgIUpqfvVdK4ff38loRmrdDBgBT8ADXYsEZ5mPQ4Nde90N3UYatHdYoDIFb7oHzMncI02tA==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/helper-wasm-section/-/helper-wasm-section-1.9.0.tgz",
+ "integrity": "sha512-XnMB8l3ek4tvrKUUku+IVaXNHz2YsJyOOmz+MMkZvh8h1uSJpSen6vYnw3IoQ7WwEuAhL8Efjms1ZWjqh2agvw==",
"requires": {
- "@webassemblyjs/ast": "1.8.5",
- "@webassemblyjs/helper-buffer": "1.8.5",
- "@webassemblyjs/helper-wasm-bytecode": "1.8.5",
- "@webassemblyjs/wasm-gen": "1.8.5"
+ "@webassemblyjs/ast": "1.9.0",
+ "@webassemblyjs/helper-buffer": "1.9.0",
+ "@webassemblyjs/helper-wasm-bytecode": "1.9.0",
+ "@webassemblyjs/wasm-gen": "1.9.0"
}
},
"@webassemblyjs/ieee754": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/ieee754/-/ieee754-1.8.5.tgz",
- "integrity": "sha512-aaCvQYrvKbY/n6wKHb/ylAJr27GglahUO89CcGXMItrOBqRarUMxWLJgxm9PJNuKULwN5n1csT9bYoMeZOGF3g==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/ieee754/-/ieee754-1.9.0.tgz",
+ "integrity": "sha512-dcX8JuYU/gvymzIHc9DgxTzUUTLexWwt8uCTWP3otys596io0L5aW02Gb1RjYpx2+0Jus1h4ZFqjla7umFniTg==",
"requires": {
"@xtuc/ieee754": "^1.2.0"
}
},
"@webassemblyjs/leb128": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/leb128/-/leb128-1.8.5.tgz",
- "integrity": "sha512-plYUuUwleLIziknvlP8VpTgO4kqNaH57Y3JnNa6DLpu/sGcP6hbVdfdX5aHAV716pQBKrfuU26BJK29qY37J7A==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/leb128/-/leb128-1.9.0.tgz",
+ "integrity": "sha512-ENVzM5VwV1ojs9jam6vPys97B/S65YQtv/aanqnU7D8aSoHFX8GyhGg0CMfyKNIHBuAVjy3tlzd5QMMINa7wpw==",
"requires": {
"@xtuc/long": "4.2.2"
}
},
"@webassemblyjs/utf8": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/utf8/-/utf8-1.8.5.tgz",
- "integrity": "sha512-U7zgftmQriw37tfD934UNInokz6yTmn29inT2cAetAsaU9YeVCveWEwhKL1Mg4yS7q//NGdzy79nlXh3bT8Kjw=="
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/utf8/-/utf8-1.9.0.tgz",
+ "integrity": "sha512-GZbQlWtopBTP0u7cHrEx+73yZKrQoBMpwkGEIqlacljhXCkVM1kMQge/Mf+csMJAjEdSwhOyLAS0AoR3AG5P8w=="
},
"@webassemblyjs/wasm-edit": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/wasm-edit/-/wasm-edit-1.8.5.tgz",
- "integrity": "sha512-A41EMy8MWw5yvqj7MQzkDjU29K7UJq1VrX2vWLzfpRHt3ISftOXqrtojn7nlPsZ9Ijhp5NwuODuycSvfAO/26Q==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/wasm-edit/-/wasm-edit-1.9.0.tgz",
+ "integrity": "sha512-FgHzBm80uwz5M8WKnMTn6j/sVbqilPdQXTWraSjBwFXSYGirpkSWE2R9Qvz9tNiTKQvoKILpCuTjBKzOIm0nxw==",
"requires": {
- "@webassemblyjs/ast": "1.8.5",
- "@webassemblyjs/helper-buffer": "1.8.5",
- "@webassemblyjs/helper-wasm-bytecode": "1.8.5",
- "@webassemblyjs/helper-wasm-section": "1.8.5",
- "@webassemblyjs/wasm-gen": "1.8.5",
- "@webassemblyjs/wasm-opt": "1.8.5",
- "@webassemblyjs/wasm-parser": "1.8.5",
- "@webassemblyjs/wast-printer": "1.8.5"
+ "@webassemblyjs/ast": "1.9.0",
+ "@webassemblyjs/helper-buffer": "1.9.0",
+ "@webassemblyjs/helper-wasm-bytecode": "1.9.0",
+ "@webassemblyjs/helper-wasm-section": "1.9.0",
+ "@webassemblyjs/wasm-gen": "1.9.0",
+ "@webassemblyjs/wasm-opt": "1.9.0",
+ "@webassemblyjs/wasm-parser": "1.9.0",
+ "@webassemblyjs/wast-printer": "1.9.0"
}
},
"@webassemblyjs/wasm-gen": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/wasm-gen/-/wasm-gen-1.8.5.tgz",
- "integrity": "sha512-BCZBT0LURC0CXDzj5FXSc2FPTsxwp3nWcqXQdOZE4U7h7i8FqtFK5Egia6f9raQLpEKT1VL7zr4r3+QX6zArWg==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/wasm-gen/-/wasm-gen-1.9.0.tgz",
+ "integrity": "sha512-cPE3o44YzOOHvlsb4+E9qSqjc9Qf9Na1OO/BHFy4OI91XDE14MjFN4lTMezzaIWdPqHnsTodGGNP+iRSYfGkjA==",
"requires": {
- "@webassemblyjs/ast": "1.8.5",
- "@webassemblyjs/helper-wasm-bytecode": "1.8.5",
- "@webassemblyjs/ieee754": "1.8.5",
- "@webassemblyjs/leb128": "1.8.5",
- "@webassemblyjs/utf8": "1.8.5"
+ "@webassemblyjs/ast": "1.9.0",
+ "@webassemblyjs/helper-wasm-bytecode": "1.9.0",
+ "@webassemblyjs/ieee754": "1.9.0",
+ "@webassemblyjs/leb128": "1.9.0",
+ "@webassemblyjs/utf8": "1.9.0"
}
},
"@webassemblyjs/wasm-opt": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/wasm-opt/-/wasm-opt-1.8.5.tgz",
- "integrity": "sha512-HKo2mO/Uh9A6ojzu7cjslGaHaUU14LdLbGEKqTR7PBKwT6LdPtLLh9fPY33rmr5wcOMrsWDbbdCHq4hQUdd37Q==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/wasm-opt/-/wasm-opt-1.9.0.tgz",
+ "integrity": "sha512-Qkjgm6Anhm+OMbIL0iokO7meajkzQD71ioelnfPEj6r4eOFuqm4YC3VBPqXjFyyNwowzbMD+hizmprP/Fwkl2A==",
"requires": {
- "@webassemblyjs/ast": "1.8.5",
- "@webassemblyjs/helper-buffer": "1.8.5",
- "@webassemblyjs/wasm-gen": "1.8.5",
- "@webassemblyjs/wasm-parser": "1.8.5"
+ "@webassemblyjs/ast": "1.9.0",
+ "@webassemblyjs/helper-buffer": "1.9.0",
+ "@webassemblyjs/wasm-gen": "1.9.0",
+ "@webassemblyjs/wasm-parser": "1.9.0"
}
},
"@webassemblyjs/wasm-parser": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/wasm-parser/-/wasm-parser-1.8.5.tgz",
- "integrity": "sha512-pi0SYE9T6tfcMkthwcgCpL0cM9nRYr6/6fjgDtL6q/ZqKHdMWvxitRi5JcZ7RI4SNJJYnYNaWy5UUrHQy998lw==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/wasm-parser/-/wasm-parser-1.9.0.tgz",
+ "integrity": "sha512-9+wkMowR2AmdSWQzsPEjFU7njh8HTO5MqO8vjwEHuM+AMHioNqSBONRdr0NQQ3dVQrzp0s8lTcYqzUdb7YgELA==",
"requires": {
- "@webassemblyjs/ast": "1.8.5",
- "@webassemblyjs/helper-api-error": "1.8.5",
- "@webassemblyjs/helper-wasm-bytecode": "1.8.5",
- "@webassemblyjs/ieee754": "1.8.5",
- "@webassemblyjs/leb128": "1.8.5",
- "@webassemblyjs/utf8": "1.8.5"
+ "@webassemblyjs/ast": "1.9.0",
+ "@webassemblyjs/helper-api-error": "1.9.0",
+ "@webassemblyjs/helper-wasm-bytecode": "1.9.0",
+ "@webassemblyjs/ieee754": "1.9.0",
+ "@webassemblyjs/leb128": "1.9.0",
+ "@webassemblyjs/utf8": "1.9.0"
}
},
"@webassemblyjs/wast-parser": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/wast-parser/-/wast-parser-1.8.5.tgz",
- "integrity": "sha512-daXC1FyKWHF1i11obK086QRlsMsY4+tIOKgBqI1lxAnkp9xe9YMcgOxm9kLe+ttjs5aWV2KKE1TWJCN57/Btsg==",
- "requires": {
- "@webassemblyjs/ast": "1.8.5",
- "@webassemblyjs/floating-point-hex-parser": "1.8.5",
- "@webassemblyjs/helper-api-error": "1.8.5",
- "@webassemblyjs/helper-code-frame": "1.8.5",
- "@webassemblyjs/helper-fsm": "1.8.5",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/wast-parser/-/wast-parser-1.9.0.tgz",
+ "integrity": "sha512-qsqSAP3QQ3LyZjNC/0jBJ/ToSxfYJ8kYyuiGvtn/8MK89VrNEfwj7BPQzJVHi0jGTRK2dGdJ5PRqhtjzoww+bw==",
+ "requires": {
+ "@webassemblyjs/ast": "1.9.0",
+ "@webassemblyjs/floating-point-hex-parser": "1.9.0",
+ "@webassemblyjs/helper-api-error": "1.9.0",
+ "@webassemblyjs/helper-code-frame": "1.9.0",
+ "@webassemblyjs/helper-fsm": "1.9.0",
"@xtuc/long": "4.2.2"
}
},
"@webassemblyjs/wast-printer": {
- "version": "1.8.5",
- "resolved": "https://registry.npmjs.org/@webassemblyjs/wast-printer/-/wast-printer-1.8.5.tgz",
- "integrity": "sha512-w0U0pD4EhlnvRyeJzBqaVSJAo9w/ce7/WPogeXLzGkO6hzhr4GnQIZ4W4uUt5b9ooAaXPtnXlj0gzsXEOUNYMg==",
+ "version": "1.9.0",
+ "resolved": "https://registry.npmjs.org/@webassemblyjs/wast-printer/-/wast-printer-1.9.0.tgz",
+ "integrity": "sha512-2J0nE95rHXHyQ24cWjMKJ1tqB/ds8z/cyeOZxJhcb+rW+SQASVjuznUSmdz5GpVJTzU8JkhYut0D3siFDD6wsA==",
"requires": {
- "@webassemblyjs/ast": "1.8.5",
- "@webassemblyjs/wast-parser": "1.8.5",
+ "@webassemblyjs/ast": "1.9.0",
+ "@webassemblyjs/wast-parser": "1.9.0",
"@xtuc/long": "4.2.2"
}
},
- "@wry/context": {
- "version": "0.4.4",
- "resolved": "https://registry.npmjs.org/@wry/context/-/context-0.4.4.tgz",
- "integrity": "sha512-LrKVLove/zw6h2Md/KZyWxIkFM6AoyKp71OqpH9Hiip1csjPVoD3tPxlbQUNxEnHENks3UGgNpSBCAfq9KWuag==",
- "requires": {
- "@types/node": ">=6",
- "tslib": "^1.9.3"
- }
- },
- "@wry/equality": {
- "version": "0.1.9",
- "resolved": "https://registry.npmjs.org/@wry/equality/-/equality-0.1.9.tgz",
- "integrity": "sha512-mB6ceGjpMGz1ZTza8HYnrPGos2mC6So4NhS1PtZ8s4Qt0K7fBiIGhpSxUbQmhwcSWE3no+bYxmI2OL6KuXYmoQ==",
- "requires": {
- "tslib": "^1.9.3"
- }
- },
"@xtuc/ieee754": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/@xtuc/ieee754/-/ieee754-1.2.0.tgz",
@@ -2948,59 +2057,6 @@
"resolved": "https://registry.npmjs.org/@xtuc/long/-/long-4.2.2.tgz",
"integrity": "sha512-NuHqBY1PB/D8xU6s/thBgOAiAP7HOYDQ32+BFZILJ8ivkUkAHQnWfn6WhL79Owj1qmUnoN/YPhktdIoucipkAQ=="
},
- "@zeit/next-css": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/@zeit/next-css/-/next-css-1.0.1.tgz",
- "integrity": "sha512-yfHPRy/ne/5SddVClsoy+fpU7e0Cs1gkWA67/wm2uIu+9rznF45yQLxHEt5dPGF3h6IiIh7ZtIgA8VV8YKq87A==",
- "requires": {
- "css-loader": "1.0.0",
- "extracted-loader": "1.0.4",
- "find-up": "2.1.0",
- "ignore-loader": "0.1.2",
- "mini-css-extract-plugin": "0.4.3",
- "postcss-loader": "3.0.0"
- },
- "dependencies": {
- "find-up": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/find-up/-/find-up-2.1.0.tgz",
- "integrity": "sha1-RdG35QbHF93UgndaK3eSCjwMV6c=",
- "requires": {
- "locate-path": "^2.0.0"
- }
- },
- "locate-path": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-2.0.0.tgz",
- "integrity": "sha1-K1aLJl7slExtnA3pw9u7ygNUzY4=",
- "requires": {
- "p-locate": "^2.0.0",
- "path-exists": "^3.0.0"
- }
- },
- "p-limit": {
- "version": "1.3.0",
- "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-1.3.0.tgz",
- "integrity": "sha512-vvcXsLAJ9Dr5rQOPk7toZQZJApBl2K4J6dANSsEuh6QI41JYcsS/qhTGa9ErIUUgK3WNQoJYvylxvjqmiqEA9Q==",
- "requires": {
- "p-try": "^1.0.0"
- }
- },
- "p-locate": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-2.0.0.tgz",
- "integrity": "sha1-IKAQOyIqcMj9OcwuWAaA893l7EM=",
- "requires": {
- "p-limit": "^1.1.0"
- }
- },
- "p-try": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/p-try/-/p-try-1.0.0.tgz",
- "integrity": "sha1-y8ec26+P1CKOE/Yh8rGiN8GyB7M="
- }
- }
- },
"accepts": {
"version": "1.3.7",
"resolved": "https://registry.npmjs.org/accepts/-/accepts-1.3.7.tgz",
@@ -3011,9 +2067,9 @@
}
},
"acorn": {
- "version": "6.4.1",
- "resolved": "https://registry.npmjs.org/acorn/-/acorn-6.4.1.tgz",
- "integrity": "sha512-ZVA9k326Nwrj3Cj9jlh3wGFutC2ZornPNARZwsNYqQYgN0EsV2d53w5RN/co65Ohn4sUAUtb1rSUAOD6XN9idA=="
+ "version": "7.2.0",
+ "resolved": "https://registry.npmjs.org/acorn/-/acorn-7.2.0.tgz",
+ "integrity": "sha512-apwXVmYVpQ34m/i71vrApRrRKCWQnZZF1+npOD0WV5xZFfwWOmKGQ2RWlfdy9vWITsenisM8M0Qeq8agcFHNiQ=="
},
"acorn-jsx": {
"version": "5.2.0",
@@ -3041,6 +2097,21 @@
"version": "5.0.0",
"resolved": "https://registry.npmjs.org/camelcase/-/camelcase-5.0.0.tgz",
"integrity": "sha512-faqwZqnWxbxn+F1d399ygeamQNy3lPp/H9H6rNrqYh4FSVCtcY+3cub1MxA8o9mDd55mM8Aghuu/kuyYA6VTsA=="
+ },
+ "emojis-list": {
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/emojis-list/-/emojis-list-2.1.0.tgz",
+ "integrity": "sha1-TapNnbAPmBmIDHn6RXrlsJof04k="
+ },
+ "loader-utils": {
+ "version": "1.2.3",
+ "resolved": "https://registry.npmjs.org/loader-utils/-/loader-utils-1.2.3.tgz",
+ "integrity": "sha512-fkpz8ejdnEMG3s37wGL07iSBDg99O9D5yflE9RGNH3hRdx9SOwYfnGYdZOUIZitN8E+E2vkq3MUMYMvPYl5ZZA==",
+ "requires": {
+ "big.js": "^5.2.2",
+ "emojis-list": "^2.0.0",
+ "json5": "^1.0.1"
+ }
}
}
},
@@ -3054,9 +2125,9 @@
}
},
"ajv": {
- "version": "6.11.0",
- "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.11.0.tgz",
- "integrity": "sha512-nCprB/0syFYy9fVYU1ox1l2KN8S9I+tziH8D4zdZuLT3N6RMlGSGt5FSTpAiHB/Whv8Qs1cWHma1aMKZyaHRKA==",
+ "version": "6.12.2",
+ "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.12.2.tgz",
+ "integrity": "sha512-k+V+hzjm5q/Mr8ef/1Y9goCmlsK4I6Sm74teeyGvFk1XrOsbsKLjEdrvny42CZ+a8sXbk8KWpY/bDwS+FLL2UQ==",
"requires": {
"fast-deep-equal": "^3.1.1",
"fast-json-stable-stringify": "^2.0.0",
@@ -3074,30 +2145,10 @@
"resolved": "https://registry.npmjs.org/ajv-keywords/-/ajv-keywords-3.4.1.tgz",
"integrity": "sha512-RO1ibKvd27e6FEShVFfPALuHI3WjSVNeK5FIsmme/LYRNxjKuNj+Dt7bucLa6NdSv3JcVTyMlm9kGR84z1XpaQ=="
},
- "amphtml-validator": {
- "version": "1.0.30",
- "resolved": "https://registry.npmjs.org/amphtml-validator/-/amphtml-validator-1.0.30.tgz",
- "integrity": "sha512-CaEm2ivIi4M4QTiFnCE9t4MRgawCf88iAV/+VsS0zEw6T4VBU6zoXcgn4L+dt6/WZ/NYxKpc38duSoRLqZJhNQ==",
- "requires": {
- "colors": "1.2.5",
- "commander": "2.15.1",
- "promise": "8.0.1"
- },
- "dependencies": {
- "commander": {
- "version": "2.15.1",
- "resolved": "https://registry.npmjs.org/commander/-/commander-2.15.1.tgz",
- "integrity": "sha512-VlfT9F3V0v+jr4yxPc5gg9s62/fIVWsd2Bk2iD435um1NlGMYdVCq+MjcXnhYq2icNOizHr1kK+5TI6H0Hy0ag=="
- },
- "promise": {
- "version": "8.0.1",
- "resolved": "https://registry.npmjs.org/promise/-/promise-8.0.1.tgz",
- "integrity": "sha1-5F1osAoXZHttpxG/he1u1HII9FA=",
- "requires": {
- "asap": "~2.0.3"
- }
- }
- }
+ "alphanum-sort": {
+ "version": "1.0.2",
+ "resolved": "https://registry.npmjs.org/alphanum-sort/-/alphanum-sort-1.0.2.tgz",
+ "integrity": "sha1-l6ERlkmyEa0zaR2fn0hqjsn74KM="
},
"analytics-node": {
"version": "3.4.0-beta.1",
@@ -3112,6 +2163,13 @@
"ms": "^2.0.0",
"remove-trailing-slash": "^0.1.0",
"uuid": "^3.2.1"
+ },
+ "dependencies": {
+ "uuid": {
+ "version": "3.4.0",
+ "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz",
+ "integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A=="
+ }
}
},
"ansi-colors": {
@@ -3120,22 +2178,24 @@
"integrity": "sha512-hHUXGagefjN2iRrID63xckIvotOXOojhQKWIPUZ4mNUZ9nLZW+7FMNoE1lOkEhNWYsx/7ysGIuJYCiMAA9FnrA=="
},
"ansi-escapes": {
- "version": "4.3.0",
- "resolved": "https://registry.npmjs.org/ansi-escapes/-/ansi-escapes-4.3.0.tgz",
- "integrity": "sha512-EiYhwo0v255HUL6eDyuLrXEkTi7WwVCLAw+SeOQ7M7qdun1z1pum4DEm/nuqIVbPvi9RPPc9k9LbyBv6H0DwVg==",
+ "version": "4.3.1",
+ "resolved": "https://registry.npmjs.org/ansi-escapes/-/ansi-escapes-4.3.1.tgz",
+ "integrity": "sha512-JWF7ocqNrp8u9oqpgV+wH5ftbt+cfvv+PTjOvKLT3AdYly/LmORARfEVT1iyjwN+4MqE5UmVKoAdIBqeoCHgLA==",
"requires": {
- "type-fest": "^0.8.1"
+ "type-fest": "^0.11.0"
+ },
+ "dependencies": {
+ "type-fest": {
+ "version": "0.11.0",
+ "resolved": "https://registry.npmjs.org/type-fest/-/type-fest-0.11.0.tgz",
+ "integrity": "sha512-OdjXJxnCN1AvyLSzeKIgXTXxV+99ZuXl3Hpo9XpJAv9MBcHrrJOQ5kV7ypXOuQie+AmWG25hLbiKdwYTifzcfQ=="
+ }
}
},
- "ansi-html": {
- "version": "0.0.7",
- "resolved": "https://registry.npmjs.org/ansi-html/-/ansi-html-0.0.7.tgz",
- "integrity": "sha1-gTWEAhliqenm/QOflA0S9WynhZ4="
- },
"ansi-regex": {
- "version": "4.1.0",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz",
- "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg=="
+ "version": "2.1.1",
+ "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz",
+ "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8="
},
"ansi-styles": {
"version": "3.2.1",
@@ -3159,103 +2219,15 @@
"picomatch": "^2.0.4"
}
},
- "apollo-cache": {
- "version": "1.3.4",
- "resolved": "https://registry.npmjs.org/apollo-cache/-/apollo-cache-1.3.4.tgz",
- "integrity": "sha512-7X5aGbqaOWYG+SSkCzJNHTz2ZKDcyRwtmvW4mGVLRqdQs+HxfXS4dUS2CcwrAj449se6tZ6NLUMnjko4KMt3KA==",
- "requires": {
- "apollo-utilities": "^1.3.3",
- "tslib": "^1.10.0"
- }
- },
- "apollo-cache-inmemory": {
- "version": "1.6.5",
- "resolved": "https://registry.npmjs.org/apollo-cache-inmemory/-/apollo-cache-inmemory-1.6.5.tgz",
- "integrity": "sha512-koB76JUDJaycfejHmrXBbWIN9pRKM0Z9CJGQcBzIOtmte1JhEBSuzsOUu7NQgiXKYI4iGoMREcnaWffsosZynA==",
- "requires": {
- "apollo-cache": "^1.3.4",
- "apollo-utilities": "^1.3.3",
- "optimism": "^0.10.0",
- "ts-invariant": "^0.4.0",
- "tslib": "^1.10.0"
- }
- },
- "apollo-client": {
- "version": "2.6.8",
- "resolved": "https://registry.npmjs.org/apollo-client/-/apollo-client-2.6.8.tgz",
- "integrity": "sha512-0zvJtAcONiozpa5z5zgou83iEKkBaXhhSSXJebFHRXs100SecDojyUWKjwTtBPn9HbM6o5xrvC5mo9VQ5fgAjw==",
- "requires": {
- "@types/zen-observable": "^0.8.0",
- "apollo-cache": "1.3.4",
- "apollo-link": "^1.0.0",
- "apollo-utilities": "1.3.3",
- "symbol-observable": "^1.0.2",
- "ts-invariant": "^0.4.0",
- "tslib": "^1.10.0",
- "zen-observable": "^0.8.0"
- }
- },
- "apollo-link": {
- "version": "1.2.13",
- "resolved": "https://registry.npmjs.org/apollo-link/-/apollo-link-1.2.13.tgz",
- "integrity": "sha512-+iBMcYeevMm1JpYgwDEIDt/y0BB7VWyvlm/7x+TIPNLHCTCMgcEgDuW5kH86iQZWo0I7mNwQiTOz+/3ShPFmBw==",
- "requires": {
- "apollo-utilities": "^1.3.0",
- "ts-invariant": "^0.4.0",
- "tslib": "^1.9.3",
- "zen-observable-ts": "^0.8.20"
- }
- },
- "apollo-link-error": {
- "version": "1.1.12",
- "resolved": "https://registry.npmjs.org/apollo-link-error/-/apollo-link-error-1.1.12.tgz",
- "integrity": "sha512-psNmHyuy3valGikt/XHJfe0pKJnRX19tLLs6P6EHRxg+6q6JMXNVLYPaQBkL0FkwdTCB0cbFJAGRYCBviG8TDA==",
- "requires": {
- "apollo-link": "^1.2.13",
- "apollo-link-http-common": "^0.2.15",
- "tslib": "^1.9.3"
- }
- },
- "apollo-link-http": {
- "version": "1.5.16",
- "resolved": "https://registry.npmjs.org/apollo-link-http/-/apollo-link-http-1.5.16.tgz",
- "integrity": "sha512-IA3xA/OcrOzINRZEECI6IdhRp/Twom5X5L9jMehfzEo2AXdeRwAMlH5LuvTZHgKD8V1MBnXdM6YXawXkTDSmJw==",
- "requires": {
- "apollo-link": "^1.2.13",
- "apollo-link-http-common": "^0.2.15",
- "tslib": "^1.9.3"
- }
- },
- "apollo-link-http-common": {
- "version": "0.2.15",
- "resolved": "https://registry.npmjs.org/apollo-link-http-common/-/apollo-link-http-common-0.2.15.tgz",
- "integrity": "sha512-+Heey4S2IPsPyTf8Ag3PugUupASJMW894iVps6hXbvwtg1aHSNMXUYO5VG7iRHkPzqpuzT4HMBanCTXPjtGzxg==",
- "requires": {
- "apollo-link": "^1.2.13",
- "ts-invariant": "^0.4.0",
- "tslib": "^1.9.3"
- }
- },
- "apollo-utilities": {
- "version": "1.3.3",
- "resolved": "https://registry.npmjs.org/apollo-utilities/-/apollo-utilities-1.3.3.tgz",
- "integrity": "sha512-F14aX2R/fKNYMvhuP2t9GD9fggID7zp5I96MF5QeKYWDWTrkRdHRp4+SVfXUVN+cXOaB/IebfvRtzPf25CM0zw==",
- "requires": {
- "@wry/equality": "^0.1.2",
- "fast-json-stable-stringify": "^2.0.0",
- "ts-invariant": "^0.4.0",
- "tslib": "^1.10.0"
- }
- },
"aproba": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/aproba/-/aproba-1.2.0.tgz",
"integrity": "sha512-Y9J6ZjXtoYh8RnXVCMOU/ttDmk1aBjunq9vO0ta5x85WDQiQfUF9sIPBITdbiiIVcBo03Hi3jMxigBtsddlXRw=="
},
"arch": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/arch/-/arch-2.1.1.tgz",
- "integrity": "sha512-BLM56aPo9vLLFVa8+/+pJLnrZ7QGGTVHWsCwieAWT9o9K8UeGaQbzZbGoabWLOo2ksBCztoXdqBZBplqLDDCSg=="
+ "version": "2.1.2",
+ "resolved": "https://registry.npmjs.org/arch/-/arch-2.1.2.tgz",
+ "integrity": "sha512-NTBIIbAfkJeIletyABbVtdPgeKfDafR+1mZV/AyyfC1UkVkp9iUjV+wwmqtUgphHYajbI86jejBJp5e+jkGTiQ=="
},
"archive-type": {
"version": "4.0.0",
@@ -3340,9 +2312,12 @@
}
},
"array-union": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/array-union/-/array-union-2.1.0.tgz",
- "integrity": "sha512-HGyxoOTYUyCM6stUe6EJgnd4EoewAI7zMdfqO+kGjnlZmBDz/cR5pf8r/cR4Wq60sL/p0IkcjUEEPwS3GFrIyw=="
+ "version": "1.0.2",
+ "resolved": "https://registry.npmjs.org/array-union/-/array-union-1.0.2.tgz",
+ "integrity": "sha1-mjRBDk9OPaI96jdb5b5w8kd47Dk=",
+ "requires": {
+ "array-uniq": "^1.0.1"
+ }
},
"array-uniq": {
"version": "1.0.3",
@@ -3354,16 +2329,6 @@
"resolved": "https://registry.npmjs.org/array-unique/-/array-unique-0.3.2.tgz",
"integrity": "sha1-qJS3XUvE9s1nnvMkSp/Y9Gri1Cg="
},
- "array.prototype.flatmap": {
- "version": "1.2.3",
- "resolved": "https://registry.npmjs.org/array.prototype.flatmap/-/array.prototype.flatmap-1.2.3.tgz",
- "integrity": "sha512-OOEk+lkePcg+ODXIpvuU9PAryCikCJyo7GlDG1upleEpQRx6mzL9puEBkozQ5iAx20KV0l3DbyQwqciJtqe5Pg==",
- "requires": {
- "define-properties": "^1.1.3",
- "es-abstract": "^1.17.0-next.1",
- "function-bind": "^1.1.1"
- }
- },
"arrify": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/arrify/-/arrify-1.0.1.tgz",
@@ -3382,6 +2347,13 @@
"bn.js": "^4.0.0",
"inherits": "^2.0.1",
"minimalistic-assert": "^1.0.0"
+ },
+ "dependencies": {
+ "bn.js": {
+ "version": "4.11.8",
+ "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.11.8.tgz",
+ "integrity": "sha512-ItfYfPLkWHUjckQCk8xC+LwxgK8NYcXywGigJgSwOP8Y2iyWT4f2vsZnoOXTTbo+o5yXmIUJ4gn5538SO5S3gA=="
+ }
}
},
"assert": {
@@ -3397,11 +2369,6 @@
"resolved": "https://registry.npmjs.org/assign-symbols/-/assign-symbols-1.0.0.tgz",
"integrity": "sha1-WWZ/QfrdTyDMvCu5a41Pf3jsA2c="
},
- "ast-types": {
- "version": "0.13.2",
- "resolved": "https://registry.npmjs.org/ast-types/-/ast-types-0.13.2.tgz",
- "integrity": "sha512-uWMHxJxtfj/1oZClOxDEV1sQ1HCDkA4MG8Gr69KKeBjEVH0R84WlejZ0y2DcwyBlpAEMltmVYkVgqfLFb2oyiA=="
- },
"ast-types-flow": {
"version": "0.0.7",
"resolved": "https://registry.npmjs.org/ast-types-flow/-/ast-types-flow-0.0.7.tgz",
@@ -3412,6 +2379,11 @@
"resolved": "https://registry.npmjs.org/astral-regex/-/astral-regex-1.0.0.tgz",
"integrity": "sha512-+Ryf6g3BKoRc7jfp7ad8tM4TtMiaWvbF/1/sQcZPkkS7ag3D5nMBCe2UfOTONtAkaG0tO0ij3C5Lwmf1EiyjHg=="
},
+ "async": {
+ "version": "0.9.2",
+ "resolved": "https://registry.npmjs.org/async/-/async-0.9.2.tgz",
+ "integrity": "sha1-rqdNXmHB+JlhO/ZL2mbUx48v0X0="
+ },
"async-each": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/async-each/-/async-each-1.0.3.tgz",
@@ -3422,24 +2394,6 @@
"resolved": "https://registry.npmjs.org/async-limiter/-/async-limiter-1.0.1.tgz",
"integrity": "sha512-csOlWGAcRFJaI6m+F2WKdnMKr4HhdhFVBk0H/QbJFMCr+uO2kwohwXQPxw/9OCxp05r5ghVBFSyioixx3gfkNQ=="
},
- "async-retry": {
- "version": "1.2.3",
- "resolved": "https://registry.npmjs.org/async-retry/-/async-retry-1.2.3.tgz",
- "integrity": "sha512-tfDb02Th6CE6pJUF2gjW5ZVjsgwlucVXOEQMvEX9JgSJMs9gAX+Nz3xRuJBKuUYjTSYORqvDBORdAQ3LU59g7Q==",
- "requires": {
- "retry": "0.12.0"
- }
- },
- "async-sema": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/async-sema/-/async-sema-3.0.0.tgz",
- "integrity": "sha512-zyCMBDl4m71feawrxYcVbHxv/UUkqm4nKJiLu3+l9lfiQha6jQ/9dxhrXLnzzBXVFqCTDwiUkZOz9XFbdEGQsg=="
- },
- "asynckit": {
- "version": "0.4.0",
- "resolved": "https://registry.npmjs.org/asynckit/-/asynckit-0.4.0.tgz",
- "integrity": "sha1-x57Zf380y48robyXkLzDZkdLS3k="
- },
"at-least-node": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/at-least-node/-/at-least-node-1.0.0.tgz",
@@ -3455,35 +2409,18 @@
"resolved": "https://registry.npmjs.org/auto-bind/-/auto-bind-4.0.0.tgz",
"integrity": "sha512-Hdw8qdNiqdJ8LqT0iK0sVzkFbzg6fhnQqqfWhBDxcHZvU75+B+ayzTy8x+k5Ix0Y92XOhOUlx74ps+bA6BeYMQ=="
},
- "autodll-webpack-plugin": {
- "version": "0.4.2",
- "resolved": "https://registry.npmjs.org/autodll-webpack-plugin/-/autodll-webpack-plugin-0.4.2.tgz",
- "integrity": "sha512-JLrV3ErBNKVkmhi0celM6PJkgYEtztFnXwsNBApjinpVHtIP3g/m2ZZSOvsAe7FoByfJzDhpOXBKFbH3k2UNjw==",
+ "autoprefixer": {
+ "version": "9.7.6",
+ "resolved": "https://registry.npmjs.org/autoprefixer/-/autoprefixer-9.7.6.tgz",
+ "integrity": "sha512-F7cYpbN7uVVhACZTeeIeealwdGM6wMtfWARVLTy5xmKtgVdBNJvbDRoCK3YO1orcs7gv/KwYlb3iXwu9Ug9BkQ==",
"requires": {
- "bluebird": "^3.5.0",
- "del": "^3.0.0",
- "find-cache-dir": "^1.0.0",
- "lodash": "^4.17.4",
- "make-dir": "^1.0.0",
- "memory-fs": "^0.4.1",
- "read-pkg": "^2.0.0",
- "tapable": "^1.0.0",
- "webpack-merge": "^4.1.0",
- "webpack-sources": "^1.0.1"
- }
- },
- "autoprefixer": {
- "version": "9.7.4",
- "resolved": "https://registry.npmjs.org/autoprefixer/-/autoprefixer-9.7.4.tgz",
- "integrity": "sha512-g0Ya30YrMBAEZk60lp+qfX5YQllG+S5W3GYCFvyHTvhOki0AEQJLPEcIuGRsqVwLi8FvXPVtwTGhfr38hVpm0g==",
- "requires": {
- "browserslist": "^4.8.3",
- "caniuse-lite": "^1.0.30001020",
+ "browserslist": "^4.11.1",
+ "caniuse-lite": "^1.0.30001039",
"chalk": "^2.4.2",
"normalize-range": "^0.1.2",
"num2fraction": "^1.2.2",
- "postcss": "^7.0.26",
- "postcss-value-parser": "^4.0.2"
+ "postcss": "^7.0.27",
+ "postcss-value-parser": "^4.0.3"
},
"dependencies": {
"chalk": {
@@ -3496,35 +2433,10 @@
"supports-color": "^5.3.0"
}
},
- "postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
- "requires": {
- "chalk": "^2.4.2",
- "source-map": "^0.6.1",
- "supports-color": "^6.1.0"
- },
- "dependencies": {
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
"postcss-value-parser": {
- "version": "4.0.2",
- "resolved": "https://registry.npmjs.org/postcss-value-parser/-/postcss-value-parser-4.0.2.tgz",
- "integrity": "sha512-LmeoohTpp/K4UiyQCwuGWlONxXamGzCMtFxLq4W1nZVGIQLYvMCJx3yAF9qyyuFpflABI9yVdtJAqbihOsCsJQ=="
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/postcss-value-parser/-/postcss-value-parser-4.1.0.tgz",
+ "integrity": "sha512-97DXOFbQJhk71ne5/Mt6cOu6yxsSfM0QGQyl0L25Gca4yGWEGJaig7l7gbCX623VqTBNGLRLaVUCnNkcedlRSQ=="
}
}
},
@@ -3535,19 +2447,12 @@
"requires": {
"follow-redirects": "1.5.10",
"is-buffer": "^2.0.2"
- },
- "dependencies": {
- "is-buffer": {
- "version": "2.0.4",
- "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-2.0.4.tgz",
- "integrity": "sha512-Kq1rokWXOPXWuaMAqZiJW4XxsmD9zGx9q4aePabbn3qCRGedtH7Cm+zV8WETitMfu1wdh+Rvd6w5egwSngUX2A=="
- }
}
},
"axios-retry": {
- "version": "3.1.2",
- "resolved": "https://registry.npmjs.org/axios-retry/-/axios-retry-3.1.2.tgz",
- "integrity": "sha512-+X0mtJ3S0mmia1kTVi1eA3DAC+oWnT2A29g3CpkzcBPMT6vJm+hn/WiV9wPt/KXLHVmg5zev9mWqkPx7bHMovg==",
+ "version": "3.1.8",
+ "resolved": "https://registry.npmjs.org/axios-retry/-/axios-retry-3.1.8.tgz",
+ "integrity": "sha512-yPw5Y4Bg6Dgmhm35KaJFtlh23s1TecW0HsUerK4/IS1UKl0gtN2aJqdEKtVomiOS/bDo5w4P3sqgki/M10eF8Q==",
"requires": {
"is-retry-allowed": "^1.1.0"
}
@@ -3567,11 +2472,6 @@
"js-tokens": "^3.0.2"
},
"dependencies": {
- "ansi-regex": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz",
- "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8="
- },
"ansi-styles": {
"version": "2.2.1",
"resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-2.2.1.tgz",
@@ -3589,19 +2489,6 @@
"supports-color": "^2.0.0"
}
},
- "js-tokens": {
- "version": "3.0.2",
- "resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-3.0.2.tgz",
- "integrity": "sha1-mGbfOVECEw449/mWvOtlRDIJwls="
- },
- "strip-ansi": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz",
- "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=",
- "requires": {
- "ansi-regex": "^2.0.0"
- }
- },
"supports-color": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-2.0.0.tgz",
@@ -3609,11 +2496,6 @@
}
}
},
- "babel-core": {
- "version": "7.0.0-bridge.0",
- "resolved": "https://registry.npmjs.org/babel-core/-/babel-core-7.0.0-bridge.0.tgz",
- "integrity": "sha512-poPX9mZH/5CSanm50Q+1toVci6pv5KSRv/5TWCwtzQS5XEwn40BcCrgIeMFWP9CKKIniKXNxoIOnOq4VVlGXhg=="
- },
"babel-eslint": {
"version": "10.1.0",
"resolved": "https://registry.npmjs.org/babel-eslint/-/babel-eslint-10.1.0.tgz",
@@ -3627,67 +2509,27 @@
"resolve": "^1.12.0"
}
},
- "babel-loader": {
- "version": "8.0.6",
- "resolved": "https://registry.npmjs.org/babel-loader/-/babel-loader-8.0.6.tgz",
- "integrity": "sha512-4BmWKtBOBm13uoUwd08UwjZlaw3O9GWf456R9j+5YykFZ6LUIjIKLc0zEZf+hauxPOJs96C8k6FvYD09vWzhYw==",
- "requires": {
- "find-cache-dir": "^2.0.0",
- "loader-utils": "^1.0.2",
- "mkdirp": "^0.5.1",
- "pify": "^4.0.1"
- },
- "dependencies": {
- "find-cache-dir": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/find-cache-dir/-/find-cache-dir-2.1.0.tgz",
- "integrity": "sha512-Tq6PixE0w/VMFfCgbONnkiQIVol/JJL7nRMi20fqzA4NRs9AfeqMGeRdPi3wIhYkxjeBaWh2rxwapn5Tu3IqOQ==",
- "requires": {
- "commondir": "^1.0.1",
- "make-dir": "^2.0.0",
- "pkg-dir": "^3.0.0"
- }
- },
- "make-dir": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/make-dir/-/make-dir-2.1.0.tgz",
- "integrity": "sha512-LS9X+dc8KLxXCb8dni79fLIIUA5VyZoyjSMCwTluaXA0o27cCK0bhXkpgw+sTXVpPy/lSO57ilRixqk0vDmtRA==",
- "requires": {
- "pify": "^4.0.1",
- "semver": "^5.6.0"
- }
- },
- "pkg-dir": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/pkg-dir/-/pkg-dir-3.0.0.tgz",
- "integrity": "sha512-/E57AYkoeQ25qkxMj5PBOVgF8Kiu/h7cYS30Z5+R7WaiCCBfLq58ZI/dSeaEKb9WVJV5n/03QwrN3IeWIFllvw==",
- "requires": {
- "find-up": "^3.0.0"
- }
- }
- }
- },
"babel-plugin-apply-mdx-type-prop": {
- "version": "1.5.8",
- "resolved": "https://registry.npmjs.org/babel-plugin-apply-mdx-type-prop/-/babel-plugin-apply-mdx-type-prop-1.5.8.tgz",
- "integrity": "sha512-xYp5F9mAnZdDRFSd1vF3XQ0GQUbIulCpnuht2jCmK30GAHL8szVL7TgzwhEGamQ6yJmP/gEyYNM9OR5D2n26eA==",
+ "version": "1.6.1",
+ "resolved": "https://registry.npmjs.org/babel-plugin-apply-mdx-type-prop/-/babel-plugin-apply-mdx-type-prop-1.6.1.tgz",
+ "integrity": "sha512-chjmLo1x7fCpDRICGUlbkwf2E6sMVG9jjG6PtPBWnQfMEjgV03Gh0jSVGbZJsEUxcMqOpHSsIXvPz1sYip6X3g==",
"requires": {
"@babel/helper-plugin-utils": "7.8.3",
- "@mdx-js/util": "^1.5.8"
+ "@mdx-js/util": "^1.6.1"
}
},
"babel-plugin-dynamic-import-node": {
- "version": "2.3.0",
- "resolved": "https://registry.npmjs.org/babel-plugin-dynamic-import-node/-/babel-plugin-dynamic-import-node-2.3.0.tgz",
- "integrity": "sha512-o6qFkpeQEBxcqt0XYlWzAVxNCSCZdUgcR8IRlhD/8DylxjjO4foPcvTW0GGKa/cVt3rvxZ7o5ippJ+/0nvLhlQ==",
+ "version": "2.3.3",
+ "resolved": "https://registry.npmjs.org/babel-plugin-dynamic-import-node/-/babel-plugin-dynamic-import-node-2.3.3.tgz",
+ "integrity": "sha512-jZVI+s9Zg3IqA/kdi0i6UDCybUI3aSBLnglhYbSSjKlV7yF1F/5LWv8MakQmvYpnbJDS6fcBL2KzHSxNCMtWSQ==",
"requires": {
"object.assign": "^4.1.0"
}
},
"babel-plugin-extract-import-names": {
- "version": "1.5.8",
- "resolved": "https://registry.npmjs.org/babel-plugin-extract-import-names/-/babel-plugin-extract-import-names-1.5.8.tgz",
- "integrity": "sha512-LcLfP8ZRBZMdMAXHLugyvvd5PY0gMmLMWFogWAUsG32X6TYW2Eavx+il2bw73KDbW+UdCC1bAJ3NuU25T1MI3g==",
+ "version": "1.6.1",
+ "resolved": "https://registry.npmjs.org/babel-plugin-extract-import-names/-/babel-plugin-extract-import-names-1.6.1.tgz",
+ "integrity": "sha512-u0uRrPyygx4RlNva1aqz7DM9UBpsQJQZ4NyakHVJF18s73H/iiyXuc+X7k+9tHeN0WKLsohQUGzGLli6z5a0Zw==",
"requires": {
"@babel/helper-plugin-utils": "7.8.3"
}
@@ -3706,11 +2548,6 @@
"resolved": "https://registry.npmjs.org/babel-plugin-syntax-jsx/-/babel-plugin-syntax-jsx-6.18.0.tgz",
"integrity": "sha1-CvMqmm4Tyno/1QaeYtew9Y0NiUY="
},
- "babel-plugin-syntax-trailing-function-commas": {
- "version": "7.0.0-beta.0",
- "resolved": "https://registry.npmjs.org/babel-plugin-syntax-trailing-function-commas/-/babel-plugin-syntax-trailing-function-commas-7.0.0-beta.0.tgz",
- "integrity": "sha512-Xj9XuRuz3nTSbaTXWv3itLOcxyF4oPD8douBBmj7U9BBC6nEBYfyOJYQMf/8PJAFotC62UY5dFfIGEPr7WswzQ=="
- },
"babel-plugin-transform-define": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/babel-plugin-transform-define/-/babel-plugin-transform-define-2.0.0.tgz",
@@ -3725,40 +2562,6 @@
"resolved": "https://registry.npmjs.org/babel-plugin-transform-react-remove-prop-types/-/babel-plugin-transform-react-remove-prop-types-0.4.24.tgz",
"integrity": "sha512-eqj0hVcJUR57/Ug2zE1Yswsw4LhuqqHhD+8v120T1cl3kjg76QwtyBrdIk4WVwK+lAhBJVYCd/v+4nc4y+8JsA=="
},
- "babel-preset-fbjs": {
- "version": "3.3.0",
- "resolved": "https://registry.npmjs.org/babel-preset-fbjs/-/babel-preset-fbjs-3.3.0.tgz",
- "integrity": "sha512-7QTLTCd2gwB2qGoi5epSULMHugSVgpcVt5YAeiFO9ABLrutDQzKfGwzxgZHLpugq8qMdg/DhRZDZ5CLKxBkEbw==",
- "requires": {
- "@babel/plugin-proposal-class-properties": "^7.0.0",
- "@babel/plugin-proposal-object-rest-spread": "^7.0.0",
- "@babel/plugin-syntax-class-properties": "^7.0.0",
- "@babel/plugin-syntax-flow": "^7.0.0",
- "@babel/plugin-syntax-jsx": "^7.0.0",
- "@babel/plugin-syntax-object-rest-spread": "^7.0.0",
- "@babel/plugin-transform-arrow-functions": "^7.0.0",
- "@babel/plugin-transform-block-scoped-functions": "^7.0.0",
- "@babel/plugin-transform-block-scoping": "^7.0.0",
- "@babel/plugin-transform-classes": "^7.0.0",
- "@babel/plugin-transform-computed-properties": "^7.0.0",
- "@babel/plugin-transform-destructuring": "^7.0.0",
- "@babel/plugin-transform-flow-strip-types": "^7.0.0",
- "@babel/plugin-transform-for-of": "^7.0.0",
- "@babel/plugin-transform-function-name": "^7.0.0",
- "@babel/plugin-transform-literals": "^7.0.0",
- "@babel/plugin-transform-member-expression-literals": "^7.0.0",
- "@babel/plugin-transform-modules-commonjs": "^7.0.0",
- "@babel/plugin-transform-object-super": "^7.0.0",
- "@babel/plugin-transform-parameters": "^7.0.0",
- "@babel/plugin-transform-property-literals": "^7.0.0",
- "@babel/plugin-transform-react-display-name": "^7.0.0",
- "@babel/plugin-transform-react-jsx": "^7.0.0",
- "@babel/plugin-transform-shorthand-properties": "^7.0.0",
- "@babel/plugin-transform-spread": "^7.0.0",
- "@babel/plugin-transform-template-literals": "^7.0.0",
- "babel-plugin-syntax-trailing-function-commas": "^7.0.0-beta.0"
- }
- },
"bail": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/bail/-/bail-1.0.5.tgz",
@@ -3880,6 +2683,24 @@
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz",
"integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ="
+ },
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
+ },
+ "npm-run-path": {
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/npm-run-path/-/npm-run-path-2.0.2.tgz",
+ "integrity": "sha1-NakjLfo11wZ7TLLd8jV7GHFTbF8=",
+ "requires": {
+ "path-key": "^2.0.0"
+ }
+ },
+ "p-finally": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
+ "integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4="
}
}
},
@@ -3920,6 +2741,24 @@
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz",
"integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ="
+ },
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
+ },
+ "npm-run-path": {
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/npm-run-path/-/npm-run-path-2.0.2.tgz",
+ "integrity": "sha1-NakjLfo11wZ7TLLd8jV7GHFTbF8=",
+ "requires": {
+ "path-key": "^2.0.0"
+ }
+ },
+ "p-finally": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
+ "integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4="
}
}
},
@@ -3930,6 +2769,48 @@
"requires": {
"execa": "^1.0.0",
"find-versions": "^3.0.0"
+ },
+ "dependencies": {
+ "execa": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/execa/-/execa-1.0.0.tgz",
+ "integrity": "sha512-adbxcyWV46qiHyvSp50TKt05tB4tK3HcmF7/nxfAdhnox83seTDbwnaqKO4sXRy7roHAIFqJP/Rw/AuEbX61LA==",
+ "requires": {
+ "cross-spawn": "^6.0.0",
+ "get-stream": "^4.0.0",
+ "is-stream": "^1.1.0",
+ "npm-run-path": "^2.0.0",
+ "p-finally": "^1.0.0",
+ "signal-exit": "^3.0.0",
+ "strip-eof": "^1.0.0"
+ }
+ },
+ "get-stream": {
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-4.1.0.tgz",
+ "integrity": "sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w==",
+ "requires": {
+ "pump": "^3.0.0"
+ }
+ },
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
+ },
+ "npm-run-path": {
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/npm-run-path/-/npm-run-path-2.0.2.tgz",
+ "integrity": "sha1-NakjLfo11wZ7TLLd8jV7GHFTbF8=",
+ "requires": {
+ "path-key": "^2.0.0"
+ }
+ },
+ "p-finally": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
+ "integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4="
+ }
}
},
"bin-version-check": {
@@ -3940,6 +2821,13 @@
"bin-version": "^3.0.0",
"semver": "^5.6.0",
"semver-truncate": "^1.1.2"
+ },
+ "dependencies": {
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ }
}
},
"bin-wrapper": {
@@ -4089,6 +2977,11 @@
"p-timeout": "^2.0.1"
}
},
+ "p-finally": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
+ "integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4="
+ },
"p-timeout": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/p-timeout/-/p-timeout-2.0.1.tgz",
@@ -4136,9 +3029,9 @@
"integrity": "sha512-XpNj6GDQzdfW+r2Wnn7xiSAd7TM3jzkxGXBGTtWKuSXv1xUV+azxAm8jdWZN06QTQk+2N2XB9jRDkvbmQmcRtg=="
},
"bn.js": {
- "version": "4.11.8",
- "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.11.8.tgz",
- "integrity": "sha512-ItfYfPLkWHUjckQCk8xC+LwxgK8NYcXywGigJgSwOP8Y2iyWT4f2vsZnoOXTTbo+o5yXmIUJ4gn5538SO5S3gA=="
+ "version": "5.1.1",
+ "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-5.1.1.tgz",
+ "integrity": "sha512-IUTD/REb78Z2eodka1QZyyEk66pciRcP6Sroka0aI3tG/iwIdYLrBD62RsubR7vqdt3WyX8p4jxeatzmRSphtA=="
},
"body-parser": {
"version": "1.19.0",
@@ -4164,11 +3057,6 @@
"requires": {
"ms": "2.0.0"
}
- },
- "ms": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
- "integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
}
}
},
@@ -4187,30 +3075,11 @@
}
},
"braces": {
- "version": "2.3.2",
- "resolved": "https://registry.npmjs.org/braces/-/braces-2.3.2.tgz",
- "integrity": "sha512-aNdbnj9P8PjdXU4ybaWLK2IF3jc/EoDYbC7AazW6to3TRsfXxscC9UXOB5iDiEQrkyIbWp2SLQda4+QAa7nc3w==",
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.2.tgz",
+ "integrity": "sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==",
"requires": {
- "arr-flatten": "^1.1.0",
- "array-unique": "^0.3.2",
- "extend-shallow": "^2.0.1",
- "fill-range": "^4.0.0",
- "isobject": "^3.0.1",
- "repeat-element": "^1.1.2",
- "snapdragon": "^0.8.1",
- "snapdragon-node": "^2.0.1",
- "split-string": "^3.0.2",
- "to-regex": "^3.0.1"
- },
- "dependencies": {
- "extend-shallow": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
- "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
- "requires": {
- "is-extendable": "^0.1.0"
- }
- }
+ "fill-range": "^7.0.1"
}
},
"brorand": {
@@ -4259,20 +3128,40 @@
"requires": {
"bn.js": "^4.1.0",
"randombytes": "^2.0.1"
+ },
+ "dependencies": {
+ "bn.js": {
+ "version": "4.11.8",
+ "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.11.8.tgz",
+ "integrity": "sha512-ItfYfPLkWHUjckQCk8xC+LwxgK8NYcXywGigJgSwOP8Y2iyWT4f2vsZnoOXTTbo+o5yXmIUJ4gn5538SO5S3gA=="
+ }
}
},
"browserify-sign": {
- "version": "4.0.4",
- "resolved": "https://registry.npmjs.org/browserify-sign/-/browserify-sign-4.0.4.tgz",
- "integrity": "sha1-qk62jl17ZYuqa/alfmMMvXqT0pg=",
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/browserify-sign/-/browserify-sign-4.1.0.tgz",
+ "integrity": "sha512-VYxo7cDCeYUoBZ0ZCy4UyEUCP3smyBd4DRQM5nrFS1jJjPJjX7rP3oLRpPoWfkhQfyJ0I9ZbHbKafrFD/SGlrg==",
"requires": {
- "bn.js": "^4.1.1",
- "browserify-rsa": "^4.0.0",
- "create-hash": "^1.1.0",
- "create-hmac": "^1.1.2",
- "elliptic": "^6.0.0",
- "inherits": "^2.0.1",
- "parse-asn1": "^5.0.0"
+ "bn.js": "^5.1.1",
+ "browserify-rsa": "^4.0.1",
+ "create-hash": "^1.2.0",
+ "create-hmac": "^1.1.7",
+ "elliptic": "^6.5.2",
+ "inherits": "^2.0.4",
+ "parse-asn1": "^5.1.5",
+ "readable-stream": "^3.6.0"
+ },
+ "dependencies": {
+ "readable-stream": {
+ "version": "3.6.0",
+ "resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-3.6.0.tgz",
+ "integrity": "sha512-BViHy7LKeTz4oNnkcLJ+lVSL6vpiFeX6/d3oSH8zCW7UxP2onchk+vTGB143xuFjHS3deTgkKoXXymXqymiIdA==",
+ "requires": {
+ "inherits": "^2.0.3",
+ "string_decoder": "^1.1.1",
+ "util-deprecate": "^1.0.1"
+ }
+ }
}
},
"browserify-zlib": {
@@ -4284,27 +3173,20 @@
}
},
"browserslist": {
- "version": "4.8.5",
- "resolved": "https://registry.npmjs.org/browserslist/-/browserslist-4.8.5.tgz",
- "integrity": "sha512-4LMHuicxkabIB+n9874jZX/az1IaZ5a+EUuvD7KFOu9x/Bd5YHyO0DIz2ls/Kl8g0ItS4X/ilEgf4T1Br0lgSg==",
- "requires": {
- "caniuse-lite": "^1.0.30001022",
- "electron-to-chromium": "^1.3.338",
- "node-releases": "^1.1.46"
- }
- },
- "bser": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/bser/-/bser-2.1.1.tgz",
- "integrity": "sha512-gQxTNE/GAfIIrmHLUE3oJyp5FO6HRBfhjnw4/wMmA63ZGDJnWBmgY/lyQBpnDUkGmAhbSe39tx2d/iTOAfglwQ==",
+ "version": "4.12.0",
+ "resolved": "https://registry.npmjs.org/browserslist/-/browserslist-4.12.0.tgz",
+ "integrity": "sha512-UH2GkcEDSI0k/lRkuDSzFl9ZZ87skSy9w2XAn1MsZnL+4c4rqbBd3e82UWHbYDpztABrPBhZsTEeuxVfHppqDg==",
"requires": {
- "node-int64": "^0.4.0"
+ "caniuse-lite": "^1.0.30001043",
+ "electron-to-chromium": "^1.3.413",
+ "node-releases": "^1.1.53",
+ "pkg-up": "^2.0.0"
}
},
"buffer": {
- "version": "5.4.3",
- "resolved": "https://registry.npmjs.org/buffer/-/buffer-5.4.3.tgz",
- "integrity": "sha512-zvj65TkFeIt3i6aj5bIvJDzjjQQGs4o/sNoezg1F1kYap9Nu2jcUdpwzRSJTHMMzG0H7bZkn4rNQpImhuxWX2A==",
+ "version": "5.6.0",
+ "resolved": "https://registry.npmjs.org/buffer/-/buffer-5.6.0.tgz",
+ "integrity": "sha512-/gDYp/UtU0eA1ys8bOs9J6a+E/KWIY+DZ+Q2WESNUA0jFRsJOc0SNUO6xJ5SGA1xueg3NL65W6s+NY5l9cunuw==",
"requires": {
"base64-js": "^1.0.2",
"ieee754": "^1.1.4"
@@ -4329,11 +3211,6 @@
"resolved": "https://registry.npmjs.org/buffer-crc32/-/buffer-crc32-0.2.13.tgz",
"integrity": "sha1-DTM+PwDqxQqhRUq9MO+MKl2ackI="
},
- "buffer-equal-constant-time": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/buffer-equal-constant-time/-/buffer-equal-constant-time-1.0.1.tgz",
- "integrity": "sha1-+OcRMvf/5uAaXJaXpMbz5I1cyBk="
- },
"buffer-fill": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/buffer-fill/-/buffer-fill-1.0.0.tgz",
@@ -4344,11 +3221,6 @@
"resolved": "https://registry.npmjs.org/buffer-from/-/buffer-from-1.1.1.tgz",
"integrity": "sha512-MQcXEUbCKtEo7bhqEs6560Hyd4XaovZlO/k9V3hjVUF/zwW7KBVdSK4gIt/bzwS9MbR5qob+F5jusZsb0YQK2A=="
},
- "buffer-json": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/buffer-json/-/buffer-json-2.0.0.tgz",
- "integrity": "sha512-+jjPFVqyfF1esi9fvfUs3NqM0pH1ziZ36VP4hmA/y/Ssfo/5w5xHKfTw9BwQjoJ1w/oVtpLomqwUHKdefGyuHw=="
- },
"buffer-xor": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/buffer-xor/-/buffer-xor-1.0.3.tgz",
@@ -4422,64 +3294,6 @@
"unset-value": "^1.0.0"
}
},
- "cache-loader": {
- "version": "4.1.0",
- "resolved": "https://registry.npmjs.org/cache-loader/-/cache-loader-4.1.0.tgz",
- "integrity": "sha512-ftOayxve0PwKzBF/GLsZNC9fJBXl8lkZE3TOsjkboHfVHVkL39iUEs1FO07A33mizmci5Dudt38UZrrYXDtbhw==",
- "requires": {
- "buffer-json": "^2.0.0",
- "find-cache-dir": "^3.0.0",
- "loader-utils": "^1.2.3",
- "mkdirp": "^0.5.1",
- "neo-async": "^2.6.1",
- "schema-utils": "^2.0.0"
- },
- "dependencies": {
- "ajv": {
- "version": "6.12.0",
- "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.12.0.tgz",
- "integrity": "sha512-D6gFiFA0RRLyUbvijN74DWAjXSFxWKaWP7mldxkVhyhAV3+SWA9HEJPHQ2c9soIeTFJqcSdFDGFgdqs1iUU2Hw==",
- "requires": {
- "fast-deep-equal": "^3.1.1",
- "fast-json-stable-stringify": "^2.0.0",
- "json-schema-traverse": "^0.4.1",
- "uri-js": "^4.2.2"
- }
- },
- "find-cache-dir": {
- "version": "3.3.1",
- "resolved": "https://registry.npmjs.org/find-cache-dir/-/find-cache-dir-3.3.1.tgz",
- "integrity": "sha512-t2GDMt3oGC/v+BMwzmllWDuJF/xcDtE5j/fCGbqDD7OLuJkj0cfh1YSA5VKPvwMeLFLNDBkwOKZ2X85jGLVftQ==",
- "requires": {
- "commondir": "^1.0.1",
- "make-dir": "^3.0.2",
- "pkg-dir": "^4.1.0"
- }
- },
- "make-dir": {
- "version": "3.0.2",
- "resolved": "https://registry.npmjs.org/make-dir/-/make-dir-3.0.2.tgz",
- "integrity": "sha512-rYKABKutXa6vXTXhoV18cBE7PaewPXHe/Bdq4v+ZLMhxbWApkFFplT0LcbMW+6BbjnQXzZ/sAvSE/JdguApG5w==",
- "requires": {
- "semver": "^6.0.0"
- }
- },
- "schema-utils": {
- "version": "2.6.5",
- "resolved": "https://registry.npmjs.org/schema-utils/-/schema-utils-2.6.5.tgz",
- "integrity": "sha512-5KXuwKziQrTVHh8j/Uxz+QUbxkaLW9X/86NBlx/gnKgtsZA2GIVMUn17qWhRFwF8jdYb3Dig5hRO/W5mZqy6SQ==",
- "requires": {
- "ajv": "^6.12.0",
- "ajv-keywords": "^3.4.1"
- }
- },
- "semver": {
- "version": "6.3.0",
- "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
- "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
- }
- }
- },
"cacheable-request": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/cacheable-request/-/cacheable-request-6.1.0.tgz",
@@ -4494,14 +3308,6 @@
"responselike": "^1.0.2"
},
"dependencies": {
- "get-stream": {
- "version": "5.1.0",
- "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-5.1.0.tgz",
- "integrity": "sha512-EXr1FOzrzTfGeL0gQdeFEvOMm2mzMOglyiOXSTpPC+iAjAKftbr3jpCMWynogwYnM+eSj9sHGc6wjIcDvYiygw==",
- "requires": {
- "pump": "^3.0.0"
- }
- },
"lowercase-keys": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/lowercase-keys/-/lowercase-keys-2.0.0.tgz",
@@ -4535,15 +3341,6 @@
"resolved": "https://registry.npmjs.org/callsites/-/callsites-2.0.0.tgz",
"integrity": "sha1-BuuE8A7qQT2oav/vrL/7Ngk7PFA="
},
- "camel-case": {
- "version": "4.1.1",
- "resolved": "https://registry.npmjs.org/camel-case/-/camel-case-4.1.1.tgz",
- "integrity": "sha512-7fa2WcG4fYFkclIvEmxBbTvmibwF2/agfEBc6q3lOpVu0A13ltLsA+Hr/8Hp6kp5f+G7hKi6t8lys6XxP+1K6Q==",
- "requires": {
- "pascal-case": "^3.1.1",
- "tslib": "^1.10.0"
- }
- },
"camelcase": {
"version": "5.3.1",
"resolved": "https://registry.npmjs.org/camelcase/-/camelcase-5.3.1.tgz",
@@ -4570,10 +3367,21 @@
}
}
},
+ "caniuse-api": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/caniuse-api/-/caniuse-api-3.0.0.tgz",
+ "integrity": "sha512-bsTwuIg/BZZK/vreVTYYbSWoe2F+71P7K5QGEX+pT250DZbfU1MQ5prOKpPR+LL6uWKK3KMwMCAS74QB3Um1uw==",
+ "requires": {
+ "browserslist": "^4.0.0",
+ "caniuse-lite": "^1.0.0",
+ "lodash.memoize": "^4.1.2",
+ "lodash.uniq": "^4.5.0"
+ }
+ },
"caniuse-lite": {
- "version": "1.0.30001023",
- "resolved": "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001023.tgz",
- "integrity": "sha512-C5TDMiYG11EOhVOA62W1p3UsJ2z4DsHtMBQtjzp3ZsUglcQn62WOUgW0y795c7A5uZ+GCEIvzkMatLIlAsbNTA=="
+ "version": "1.0.30001055",
+ "resolved": "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001055.tgz",
+ "integrity": "sha512-MbwsBmKrBSKIWldfdIagO5OJWZclpJtS4h0Jrk/4HFrXJxTdVdH23Fd+xCiHriVGvYcWyW8mR/CPsYajlH8Iuw=="
},
"caw": {
"version": "2.0.1",
@@ -4592,9 +3400,9 @@
"integrity": "sha512-MOli1W+nfbPLlKEhInaxhRdp7KVLFxLN5ykwzHgLsLI3H3gs5jjFAK4Eoj3OzzcxCtumDaI8onoVDeQyWaNTkw=="
},
"chalk": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-3.0.0.tgz",
- "integrity": "sha512-4D3B6Wf41KOYRFdszmDqMCGq5VV/uMAB273JILmO+3jAlh8X4qDtdtgCR3fxtbLEMzSx22QdhnDcJvu2u1fVwg==",
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/chalk/-/chalk-4.0.0.tgz",
+ "integrity": "sha512-N9oWFcegS0sFr9oh1oz2d7Npos6vNoWW9HvtCg5N1KRFpUhaAhvTv5Y58g880fZaEYSNm3qDz8SU1UrGvp+n7A==",
"requires": {
"ansi-styles": "^4.1.0",
"supports-color": "^7.1.0"
@@ -4673,9 +3481,9 @@
"integrity": "sha512-YpeKZngUmG65rLudJ4taU7VLkOCTMhNl/u4ctNC56LQS/zJTyNH0Lrtwm1tfTsbLlwvlfsA2d1c8vCf/Kh2KwQ=="
},
"chokidar": {
- "version": "3.3.1",
- "resolved": "https://registry.npmjs.org/chokidar/-/chokidar-3.3.1.tgz",
- "integrity": "sha512-4QYCEWOcK3OJrxwvyyAOxFuhpvOVCYkr33LPfFNBjAD/w3sEzWsp2BUOkI4l9bHvWioAd0rc6NlHUOEaWkTeqg==",
+ "version": "3.4.0",
+ "resolved": "https://registry.npmjs.org/chokidar/-/chokidar-3.4.0.tgz",
+ "integrity": "sha512-aXAaho2VJtisB/1fg1+3nlLJqGOuewTzQpd/Tz0yTg2R0e4IGtshYvtjowyEumcBv2z+y4+kc75Mz7j5xJskcQ==",
"requires": {
"anymatch": "~3.1.1",
"braces": "~3.0.2",
@@ -4684,46 +3492,7 @@
"is-binary-path": "~2.1.0",
"is-glob": "~4.0.1",
"normalize-path": "~3.0.0",
- "readdirp": "~3.3.0"
- },
- "dependencies": {
- "braces": {
- "version": "3.0.2",
- "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.2.tgz",
- "integrity": "sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==",
- "requires": {
- "fill-range": "^7.0.1"
- }
- },
- "fill-range": {
- "version": "7.0.1",
- "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.0.1.tgz",
- "integrity": "sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==",
- "requires": {
- "to-regex-range": "^5.0.1"
- }
- },
- "glob-parent": {
- "version": "5.1.1",
- "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz",
- "integrity": "sha512-FnI+VGOpnlGHWZxthPGR+QhR78fuiK0sNLkHQv+bL9fQi57lNNdquIbna/WrfROrolq8GK5Ek6BiMwqL/voRYQ==",
- "requires": {
- "is-glob": "^4.0.1"
- }
- },
- "is-number": {
- "version": "7.0.0",
- "resolved": "https://registry.npmjs.org/is-number/-/is-number-7.0.0.tgz",
- "integrity": "sha512-41Cifkg6e8TylSpdtTpeLVMqvSBEVzTttHvERD741+pnZ8ANv0004MRL43QKPDlK9cGvNp6NZWZUBlbGXYxxng=="
- },
- "to-regex-range": {
- "version": "5.0.1",
- "resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-5.0.1.tgz",
- "integrity": "sha512-65P7iz6X5yEr1cwcgvQxbbIw7Uk3gOy5dIdtZ4rDveLqhrdJP+Li/Hx6tyK0NEb+2GCyneCMJiGqrADCSNk8sQ==",
- "requires": {
- "is-number": "^7.0.0"
- }
- }
+ "readdirp": "~3.4.0"
}
},
"chownr": {
@@ -4793,56 +3562,68 @@
"integrity": "sha512-1QL4544moEsDVH9T/l6Cemov/37iv1RtoKf7NJ04A60+4MREXNfx/QvavbH6QoGdsD4N4Mwy49cmaINR/o2mdg=="
},
"cli-truncate": {
- "version": "0.2.1",
- "resolved": "https://registry.npmjs.org/cli-truncate/-/cli-truncate-0.2.1.tgz",
- "integrity": "sha1-nxXPuwcFAFNpIWxiasfQWrkN1XQ=",
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/cli-truncate/-/cli-truncate-2.1.0.tgz",
+ "integrity": "sha512-n8fOixwDD6b/ObinzTrp1ZKFzbgvKZvuz/TvejnLn1aQfC6r52XEx85FmuC+3HI+JM7coBRXUvNqEU2PHVrHpg==",
"requires": {
- "slice-ansi": "0.0.4",
- "string-width": "^1.0.1"
+ "slice-ansi": "^3.0.0",
+ "string-width": "^4.2.0"
},
"dependencies": {
- "ansi-regex": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz",
- "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8="
- },
- "is-fullwidth-code-point": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-1.0.0.tgz",
- "integrity": "sha1-754xOG8DGn8NZDr4L95QxFfvAMs=",
+ "ansi-styles": {
+ "version": "4.2.1",
+ "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-4.2.1.tgz",
+ "integrity": "sha512-9VGjrMsG1vePxcSweQsN20KY/c4zN0h9fLjqAbwbPfahM3t+NL+M9HC8xeXG2I8pX5NoamTGNuomEUFI7fcUjA==",
"requires": {
- "number-is-nan": "^1.0.0"
+ "@types/color-name": "^1.1.1",
+ "color-convert": "^2.0.1"
}
},
- "slice-ansi": {
- "version": "0.0.4",
- "resolved": "https://registry.npmjs.org/slice-ansi/-/slice-ansi-0.0.4.tgz",
- "integrity": "sha1-7b+JA/ZvfOL46v1s7tZeJkyDGzU="
+ "astral-regex": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/astral-regex/-/astral-regex-2.0.0.tgz",
+ "integrity": "sha512-Z7tMw1ytTXt5jqMcOP+OQteU1VuNK9Y02uuJtKQ1Sv69jXQKKg5cibLwGJow8yzZP+eAc18EmLGPal0bp36rvQ=="
},
- "string-width": {
- "version": "1.0.2",
- "resolved": "https://registry.npmjs.org/string-width/-/string-width-1.0.2.tgz",
- "integrity": "sha1-EYvfW4zcUaKn5w0hHgfisLmxB9M=",
+ "color-convert": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/color-convert/-/color-convert-2.0.1.tgz",
+ "integrity": "sha512-RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ==",
"requires": {
- "code-point-at": "^1.0.0",
- "is-fullwidth-code-point": "^1.0.0",
- "strip-ansi": "^3.0.0"
+ "color-name": "~1.1.4"
}
},
- "strip-ansi": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz",
- "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=",
+ "color-name": {
+ "version": "1.1.4",
+ "resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.4.tgz",
+ "integrity": "sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA=="
+ },
+ "slice-ansi": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/slice-ansi/-/slice-ansi-3.0.0.tgz",
+ "integrity": "sha512-pSyv7bSTC7ig9Dcgbw9AuRNUb5k5V6oDudjZoMBSr13qpLBG7tB+zgCkARjq7xIUgdz5P1Qe8u+rSGdouOOIyQ==",
"requires": {
- "ansi-regex": "^2.0.0"
+ "ansi-styles": "^4.0.0",
+ "astral-regex": "^2.0.0",
+ "is-fullwidth-code-point": "^3.0.0"
}
}
}
},
"cli-width": {
- "version": "2.2.0",
- "resolved": "https://registry.npmjs.org/cli-width/-/cli-width-2.2.0.tgz",
- "integrity": "sha1-/xnt6Kml5XkyQUewwR8PvLq+1jk="
+ "version": "2.2.1",
+ "resolved": "https://registry.npmjs.org/cli-width/-/cli-width-2.2.1.tgz",
+ "integrity": "sha512-GRMWDxpOB6Dgk2E5Uo+3eEBvtOOlimMmpbFiKuLFnQzYDavtLFY3K5ona41jgN/WdRZtG7utuVSVTL4HbZHGkw=="
+ },
+ "clipboard": {
+ "version": "2.0.6",
+ "resolved": "https://registry.npmjs.org/clipboard/-/clipboard-2.0.6.tgz",
+ "integrity": "sha512-g5zbiixBRk/wyKakSwCKd7vQXDjFnAMGHoEyBogG/bw9kTD9GvdAvaoRR1ALcEzt3pVKxZR0pViekPMIS0QyGg==",
+ "optional": true,
+ "requires": {
+ "good-listener": "^1.2.2",
+ "select": "^1.1.2",
+ "tiny-emitter": "^2.0.0"
+ }
},
"cliui": {
"version": "5.0.0",
@@ -4852,6 +3633,51 @@
"string-width": "^3.1.0",
"strip-ansi": "^5.2.0",
"wrap-ansi": "^5.1.0"
+ },
+ "dependencies": {
+ "ansi-regex": {
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz",
+ "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg=="
+ },
+ "emoji-regex": {
+ "version": "7.0.3",
+ "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-7.0.3.tgz",
+ "integrity": "sha512-CwBLREIQ7LvYFB0WyRvwhq5N5qPhc6PMjD6bYggFlI5YyDgl+0vxq5VHbMOFqLg7hfWzmu8T5Z1QofhmTIhItA=="
+ },
+ "is-fullwidth-code-point": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-2.0.0.tgz",
+ "integrity": "sha1-o7MKXE8ZkYMWeqq5O+764937ZU8="
+ },
+ "string-width": {
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/string-width/-/string-width-3.1.0.tgz",
+ "integrity": "sha512-vafcv6KjVZKSgz06oM/H6GDBrAtz8vdhQakGjFIvNrHA6y3HCF1CInLy+QLq8dTJPQ1b+KDUqDFctkdRW44e1w==",
+ "requires": {
+ "emoji-regex": "^7.0.1",
+ "is-fullwidth-code-point": "^2.0.0",
+ "strip-ansi": "^5.1.0"
+ }
+ },
+ "strip-ansi": {
+ "version": "5.2.0",
+ "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz",
+ "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==",
+ "requires": {
+ "ansi-regex": "^4.1.0"
+ }
+ },
+ "wrap-ansi": {
+ "version": "5.1.0",
+ "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-5.1.0.tgz",
+ "integrity": "sha512-QC1/iN/2/RPVJ5jYK8BGttj5z83LmSKmvbvrXPNCLZSEb32KKVDJDl/MOt2N01qU2H/FkzEa9PKto1BqDjtd7Q==",
+ "requires": {
+ "ansi-styles": "^3.2.0",
+ "string-width": "^3.0.0",
+ "strip-ansi": "^5.0.0"
+ }
+ }
}
},
"clone": {
@@ -4899,11 +3725,6 @@
}
}
},
- "code-point-at": {
- "version": "1.1.0",
- "resolved": "https://registry.npmjs.org/code-point-at/-/code-point-at-1.1.0.tgz",
- "integrity": "sha1-DQcLTQQ6W+ozovGkDi7bPZpMz3c="
- },
"collapse-white-space": {
"version": "1.0.6",
"resolved": "https://registry.npmjs.org/collapse-white-space/-/collapse-white-space-1.0.6.tgz",
@@ -4918,6 +3739,15 @@
"object-visit": "^1.0.0"
}
},
+ "color": {
+ "version": "3.1.2",
+ "resolved": "https://registry.npmjs.org/color/-/color-3.1.2.tgz",
+ "integrity": "sha512-vXTJhHebByxZn3lDvDJYw4lR5+uB3vuoHsuYA5AKuxRVn5wzzIfQKGLBmgdVRHKTJYeK5rvJcHnrd0Li49CFpg==",
+ "requires": {
+ "color-convert": "^1.9.1",
+ "color-string": "^1.5.2"
+ }
+ },
"color-convert": {
"version": "1.9.3",
"resolved": "https://registry.npmjs.org/color-convert/-/color-convert-1.9.3.tgz",
@@ -4931,17 +3761,13 @@
"resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.3.tgz",
"integrity": "sha1-p9BVi9icQveV3UIyj3QIMcpTvCU="
},
- "colors": {
- "version": "1.2.5",
- "resolved": "https://registry.npmjs.org/colors/-/colors-1.2.5.tgz",
- "integrity": "sha512-erNRLao/Y3Fv54qUa0LBB+//Uf3YwMUmdJinN20yMXm9zdKKqH9wt7R9IIVZ+K7ShzfpLV/Zg8+VyrBJYB4lpg=="
- },
- "combined-stream": {
- "version": "1.0.8",
- "resolved": "https://registry.npmjs.org/combined-stream/-/combined-stream-1.0.8.tgz",
- "integrity": "sha512-FQN4MRfuJeHf7cBbBMJFXhKSDq+2kAArBlmRBvcvFE5BB1HZKXtSFASDhdlz9zOYwxh8lDdnvmMOe/+5cdoEdg==",
+ "color-string": {
+ "version": "1.5.3",
+ "resolved": "https://registry.npmjs.org/color-string/-/color-string-1.5.3.tgz",
+ "integrity": "sha512-dC2C5qeWoYkxki5UAXapdjqO672AM4vZuPGRQfO8b5HKuKGBbKWpITyDYN7TOFKvRW7kOgAn3746clDBMDJyQw==",
"requires": {
- "delayed-stream": "~1.0.0"
+ "color-name": "^1.0.0",
+ "simple-swizzle": "^0.2.2"
}
},
"comma-separated-tokens": {
@@ -4954,11 +3780,6 @@
"resolved": "https://registry.npmjs.org/commander/-/commander-2.20.3.tgz",
"integrity": "sha512-GpVkmM8vF2vQUkj2LvZmD35JxeJOLCwJ9cUkugyk2nuhbv3+mJvpLYYt+0+USMxE+oj+ey/lJEnhZw75x/OMcQ=="
},
- "common-tags": {
- "version": "1.8.0",
- "resolved": "https://registry.npmjs.org/common-tags/-/common-tags-1.8.0.tgz",
- "integrity": "sha512-6P6g0uetGpW/sdyUy/iQQCbFF0kWVMSIVSyYz7Zgjcgh8mgw8PQzDNZeyZ5DQ2gM7LBoZPHmnjz8rUthkBG5tw=="
- },
"commondir": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/commondir/-/commondir-1.0.1.tgz",
@@ -4967,7 +3788,8 @@
"compare-versions": {
"version": "3.6.0",
"resolved": "https://registry.npmjs.org/compare-versions/-/compare-versions-3.6.0.tgz",
- "integrity": "sha512-W6Af2Iw1z4CB7q4uU4hv646dW9GQuBM+YpC0UvUCWSD8w90SJjp+ujJuXaEMtAXBtSqGfMPuFOVn4/+FlaqfBA=="
+ "integrity": "sha512-W6Af2Iw1z4CB7q4uU4hv646dW9GQuBM+YpC0UvUCWSD8w90SJjp+ujJuXaEMtAXBtSqGfMPuFOVn4/+FlaqfBA==",
+ "dev": true
},
"component-emitter": {
"version": "1.3.0",
@@ -4987,48 +3809,6 @@
"arity-n": "^1.0.4"
}
},
- "compressible": {
- "version": "2.0.18",
- "resolved": "https://registry.npmjs.org/compressible/-/compressible-2.0.18.tgz",
- "integrity": "sha512-AF3r7P5dWxL8MxyITRMlORQNaOA2IkAFaTr4k7BUumjPtRpGDTZpl0Pb1XCO6JeDCBdp126Cgs9sMxqSjgYyRg==",
- "requires": {
- "mime-db": ">= 1.43.0 < 2"
- }
- },
- "compression": {
- "version": "1.7.4",
- "resolved": "https://registry.npmjs.org/compression/-/compression-1.7.4.tgz",
- "integrity": "sha512-jaSIDzP9pZVS4ZfQ+TzvtiWhdpFhE2RDHz8QJkpX9SIpLq88VueF5jJw6t+6CUQcAoA6t+x89MLrWAqpfDE8iQ==",
- "requires": {
- "accepts": "~1.3.5",
- "bytes": "3.0.0",
- "compressible": "~2.0.16",
- "debug": "2.6.9",
- "on-headers": "~1.0.2",
- "safe-buffer": "5.1.2",
- "vary": "~1.1.2"
- },
- "dependencies": {
- "bytes": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/bytes/-/bytes-3.0.0.tgz",
- "integrity": "sha1-0ygVQE1olpn4Wk6k+odV3ROpYEg="
- },
- "debug": {
- "version": "2.6.9",
- "resolved": "https://registry.npmjs.org/debug/-/debug-2.6.9.tgz",
- "integrity": "sha512-bC7ElrdJaJnPbAP+1EotYvqZsb3ecl5wi6Bfi6BJTUcNowp6cvspg0jXznRTKDjm/E7AdgFBVeAPVMNcKGsHMA==",
- "requires": {
- "ms": "2.0.0"
- }
- },
- "ms": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
- "integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
- }
- }
- },
"concat-map": {
"version": "0.0.1",
"resolved": "https://registry.npmjs.org/concat-map/-/concat-map-0.0.1.tgz",
@@ -5045,35 +3825,6 @@
"typedarray": "^0.0.6"
}
},
- "conf": {
- "version": "5.0.0",
- "resolved": "https://registry.npmjs.org/conf/-/conf-5.0.0.tgz",
- "integrity": "sha512-lRNyt+iRD4plYaOSVTxu1zPWpaH0EOxgFIR1l3mpC/DGZ7XzhoGFMKmbl54LAgXcSu6knqWgOwdINkqm58N85A==",
- "requires": {
- "ajv": "^6.10.0",
- "dot-prop": "^5.0.0",
- "env-paths": "^2.2.0",
- "json-schema-typed": "^7.0.0",
- "make-dir": "^3.0.0",
- "pkg-up": "^3.0.1",
- "write-file-atomic": "^3.0.0"
- },
- "dependencies": {
- "make-dir": {
- "version": "3.0.2",
- "resolved": "https://registry.npmjs.org/make-dir/-/make-dir-3.0.2.tgz",
- "integrity": "sha512-rYKABKutXa6vXTXhoV18cBE7PaewPXHe/Bdq4v+ZLMhxbWApkFFplT0LcbMW+6BbjnQXzZ/sAvSE/JdguApG5w==",
- "requires": {
- "semver": "^6.0.0"
- }
- },
- "semver": {
- "version": "6.3.0",
- "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
- "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
- }
- }
- },
"config-chain": {
"version": "1.1.12",
"resolved": "https://registry.npmjs.org/config-chain/-/config-chain-1.1.12.tgz",
@@ -5093,16 +3844,6 @@
"resolved": "https://registry.npmjs.org/console-stream/-/console-stream-0.1.1.tgz",
"integrity": "sha1-oJX+B7IEZZVfL6/Si11yvM2UnUQ="
},
- "constant-case": {
- "version": "3.0.3",
- "resolved": "https://registry.npmjs.org/constant-case/-/constant-case-3.0.3.tgz",
- "integrity": "sha512-FXtsSnnrFYpzDmvwDGQW+l8XK3GV1coLyBN0eBz16ZUzGaZcT2ANVCJmLeuw2GQgxKHQIe9e0w2dzkSfaRlUmA==",
- "requires": {
- "no-case": "^3.0.3",
- "tslib": "^1.10.0",
- "upper-case": "^2.0.1"
- }
- },
"constants-browserify": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/constants-browserify/-/constants-browserify-1.0.0.tgz",
@@ -5158,16 +3899,16 @@
"integrity": "sha1-Z29us8OZl8LuGsOpJP1hJHSPV40="
},
"core-js": {
- "version": "2.6.11",
- "resolved": "https://registry.npmjs.org/core-js/-/core-js-2.6.11.tgz",
- "integrity": "sha512-5wjnpaT/3dV+XB4borEsnAYQchn00XSgTAWKDkEqv+K8KevjbzmofK6hfJ9TZIlpj2N0xQpazy7PiRQiWHqzWg=="
+ "version": "1.2.7",
+ "resolved": "https://registry.npmjs.org/core-js/-/core-js-1.2.7.tgz",
+ "integrity": "sha1-ZSKUwUZR2yj6k70tX/KYOk8IxjY="
},
"core-js-compat": {
- "version": "3.6.4",
- "resolved": "https://registry.npmjs.org/core-js-compat/-/core-js-compat-3.6.4.tgz",
- "integrity": "sha512-zAa3IZPvsJ0slViBQ2z+vgyyTuhd3MFn1rBQjZSKVEgB0UMYhUkCj9jJUVPgGTGqWvsBVmfnruXgTcNyTlEiSA==",
+ "version": "3.6.5",
+ "resolved": "https://registry.npmjs.org/core-js-compat/-/core-js-compat-3.6.5.tgz",
+ "integrity": "sha512-7ItTKOhOZbznhXAQ2g/slGg1PJV5zDO/WdkTwi7UEOJmkvsE32PWvx6mKtDjiMpjnR2CNf6BAD6sSxIlv7ptng==",
"requires": {
- "browserslist": "^4.8.3",
+ "browserslist": "^4.8.5",
"semver": "7.0.0"
},
"dependencies": {
@@ -5179,9 +3920,9 @@
}
},
"core-js-pure": {
- "version": "3.6.4",
- "resolved": "https://registry.npmjs.org/core-js-pure/-/core-js-pure-3.6.4.tgz",
- "integrity": "sha512-epIhRLkXdgv32xIUFaaAry2wdxZYBi6bgM7cB136dzzXXa+dFyRLTZeLUJxnd8ShrmyVXBub63n2NHo2JAt8Cw=="
+ "version": "3.6.5",
+ "resolved": "https://registry.npmjs.org/core-js-pure/-/core-js-pure-3.6.5.tgz",
+ "integrity": "sha512-lacdXOimsiD0QyNf9BC/mxivNJ/ybBGJXQFKzRekp1WTHoVUWsUHEn+2T8GJAzzIhyOuXA+gOxCVN3l+5PLPUA=="
},
"core-util-is": {
"version": "1.0.2",
@@ -5206,6 +3947,13 @@
"requires": {
"bn.js": "^4.1.0",
"elliptic": "^6.0.0"
+ },
+ "dependencies": {
+ "bn.js": {
+ "version": "4.11.8",
+ "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.11.8.tgz",
+ "integrity": "sha512-ItfYfPLkWHUjckQCk8xC+LwxgK8NYcXywGigJgSwOP8Y2iyWT4f2vsZnoOXTTbo+o5yXmIUJ4gn5538SO5S3gA=="
+ }
}
},
"create-hash": {
@@ -5240,27 +3988,6 @@
"requires": {
"fbjs": "^0.8.0",
"gud": "^1.0.0"
- },
- "dependencies": {
- "core-js": {
- "version": "1.2.7",
- "resolved": "https://registry.npmjs.org/core-js/-/core-js-1.2.7.tgz",
- "integrity": "sha1-ZSKUwUZR2yj6k70tX/KYOk8IxjY="
- },
- "fbjs": {
- "version": "0.8.17",
- "resolved": "https://registry.npmjs.org/fbjs/-/fbjs-0.8.17.tgz",
- "integrity": "sha1-xNWY6taUkRJlPWWIsBpc3Nn5D90=",
- "requires": {
- "core-js": "^1.0.0",
- "isomorphic-fetch": "^2.1.1",
- "loose-envify": "^1.0.0",
- "object-assign": "^4.1.0",
- "promise": "^7.1.1",
- "setimmediate": "^1.0.5",
- "ua-parser-js": "^0.7.18"
- }
- }
}
},
"cross-fetch": {
@@ -5270,18 +3997,6 @@
"requires": {
"node-fetch": "2.1.2",
"whatwg-fetch": "2.0.4"
- },
- "dependencies": {
- "node-fetch": {
- "version": "2.1.2",
- "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.1.2.tgz",
- "integrity": "sha1-q4hOjn5X44qUR1POxwb3iNF2i7U="
- },
- "whatwg-fetch": {
- "version": "2.0.4",
- "resolved": "https://registry.npmjs.org/whatwg-fetch/-/whatwg-fetch-2.0.4.tgz",
- "integrity": "sha512-dcQ1GWpOD/eEQ97k66aiEVpNnapVj90/+R+SXTPYGHpYBBypfKJEQjLrvMZ7YXbKm21gXd4NcuxUTjiv1YtLng=="
- }
}
},
"cross-spawn": {
@@ -5294,6 +4009,13 @@
"semver": "^5.5.0",
"shebang-command": "^1.2.0",
"which": "^1.2.9"
+ },
+ "dependencies": {
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ }
}
},
"crypt": {
@@ -5328,13 +4050,6 @@
"source-map": "^0.6.1",
"source-map-resolve": "^0.5.2",
"urix": "^0.1.0"
- },
- "dependencies": {
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- }
}
},
"css-blank-pseudo": {
@@ -5343,6 +4058,20 @@
"integrity": "sha512-LHz35Hr83dnFeipc7oqFDmsjHdljj3TQtxGGiNWSOsTLIAubSm4TEz8qCaKFpk7idaQ1GfWscF4E6mgpBysA1w==",
"requires": {
"postcss": "^7.0.5"
+ }
+ },
+ "css-color-names": {
+ "version": "0.0.4",
+ "resolved": "https://registry.npmjs.org/css-color-names/-/css-color-names-0.0.4.tgz",
+ "integrity": "sha1-gIrcLnnPhHOAabZGyyDsJ762KeA="
+ },
+ "css-declaration-sorter": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/css-declaration-sorter/-/css-declaration-sorter-4.0.1.tgz",
+ "integrity": "sha512-BcxQSKTSEEQUftYpBVnsH4SF05NTuBokb19/sBt6asXGKZ/6VP7PLG1CBCkFDYOnhXhPh0jMhO6xZ71oYHXHBA==",
+ "requires": {
+ "postcss": "^7.0.1",
+ "timsort": "^0.3.0"
},
"dependencies": {
"chalk": {
@@ -5366,20 +4095,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -5397,6 +4121,65 @@
"requires": {
"postcss": "^7.0.6",
"postcss-selector-parser": "^5.0.0-rc.4"
+ }
+ },
+ "css-prefers-color-scheme": {
+ "version": "3.1.1",
+ "resolved": "https://registry.npmjs.org/css-prefers-color-scheme/-/css-prefers-color-scheme-3.1.1.tgz",
+ "integrity": "sha512-MTu6+tMs9S3EUqzmqLXEcgNRbNkkD/TGFvowpeoWJn5Vfq7FMgsmRQs9X5NXAURiOBmOxm/lLjsDNXDE6k9bhg==",
+ "requires": {
+ "postcss": "^7.0.5"
+ }
+ },
+ "css-select": {
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/css-select/-/css-select-2.1.0.tgz",
+ "integrity": "sha512-Dqk7LQKpwLoH3VovzZnkzegqNSuAziQyNZUcrdDM401iY+R5NkGBXGmtO05/yaXQziALuPogeG0b7UAgjnTJTQ==",
+ "requires": {
+ "boolbase": "^1.0.0",
+ "css-what": "^3.2.1",
+ "domutils": "^1.7.0",
+ "nth-check": "^1.0.2"
+ }
+ },
+ "css-select-base-adapter": {
+ "version": "0.1.1",
+ "resolved": "https://registry.npmjs.org/css-select-base-adapter/-/css-select-base-adapter-0.1.1.tgz",
+ "integrity": "sha512-jQVeeRG70QI08vSTwf1jHxp74JoZsr2XSgETae8/xC8ovSnL2WF87GTLO86Sbwdt2lK4Umg4HnnwMO4YF3Ce7w=="
+ },
+ "css-tree": {
+ "version": "1.0.0-alpha.37",
+ "resolved": "https://registry.npmjs.org/css-tree/-/css-tree-1.0.0-alpha.37.tgz",
+ "integrity": "sha512-DMxWJg0rnz7UgxKT0Q1HU/L9BeJI0M6ksor0OgqOnF+aRCDWg/N2641HmVyU9KVIu0OVVWOb2IpC9A+BJRnejg==",
+ "requires": {
+ "mdn-data": "2.0.4",
+ "source-map": "^0.6.1"
+ }
+ },
+ "css-what": {
+ "version": "3.2.1",
+ "resolved": "https://registry.npmjs.org/css-what/-/css-what-3.2.1.tgz",
+ "integrity": "sha512-WwOrosiQTvyms+Ti5ZC5vGEK0Vod3FTt1ca+payZqvKuGJF+dq7bG63DstxtN0dpm6FxY27a/zS3Wten+gEtGw=="
+ },
+ "cssdb": {
+ "version": "4.4.0",
+ "resolved": "https://registry.npmjs.org/cssdb/-/cssdb-4.4.0.tgz",
+ "integrity": "sha512-LsTAR1JPEM9TpGhl/0p3nQecC2LJ0kD8X5YARu1hk/9I1gril5vDtMZyNxcEpxxDj34YNck/ucjuoUd66K03oQ=="
+ },
+ "cssesc": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/cssesc/-/cssesc-3.0.0.tgz",
+ "integrity": "sha512-/Tb/JcjK111nNScGob5MNtsntNM1aCNUDipB/TkwZFhyDrrE47SOx/18wF2bbjgc3ZzCSKW1T5nt5EbFoAz/Vg=="
+ },
+ "cssnano": {
+ "version": "4.1.10",
+ "resolved": "https://registry.npmjs.org/cssnano/-/cssnano-4.1.10.tgz",
+ "integrity": "sha512-5wny+F6H4/8RgNlaqab4ktc3e0/blKutmq8yNlBFXA//nSFFAqAngjNVRzUvCgYROULmZZUoosL/KSoZo5aUaQ==",
+ "requires": {
+ "cosmiconfig": "^5.0.0",
+ "cssnano-preset-default": "^4.0.7",
+ "is-resolvable": "^1.0.0",
+ "postcss": "^7.0.0"
},
"dependencies": {
"chalk": {
@@ -5420,20 +4203,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -5444,31 +4222,41 @@
}
}
},
- "css-loader": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/css-loader/-/css-loader-1.0.0.tgz",
- "integrity": "sha512-tMXlTYf3mIMt3b0dDCOQFJiVvxbocJ5Ho577WiGPYPZcqVEO218L2iU22pDXzkTZCLDE+9AmGSUkWxeh/nZReA==",
- "requires": {
- "babel-code-frame": "^6.26.0",
- "css-selector-tokenizer": "^0.7.0",
- "icss-utils": "^2.1.0",
- "loader-utils": "^1.0.2",
- "lodash.camelcase": "^4.3.0",
- "postcss": "^6.0.23",
- "postcss-modules-extract-imports": "^1.2.0",
- "postcss-modules-local-by-default": "^1.2.0",
- "postcss-modules-scope": "^1.1.0",
- "postcss-modules-values": "^1.3.0",
- "postcss-value-parser": "^3.3.0",
- "source-list-map": "^2.0.0"
- }
- },
- "css-prefers-color-scheme": {
- "version": "3.1.1",
- "resolved": "https://registry.npmjs.org/css-prefers-color-scheme/-/css-prefers-color-scheme-3.1.1.tgz",
- "integrity": "sha512-MTu6+tMs9S3EUqzmqLXEcgNRbNkkD/TGFvowpeoWJn5Vfq7FMgsmRQs9X5NXAURiOBmOxm/lLjsDNXDE6k9bhg==",
+ "cssnano-preset-default": {
+ "version": "4.0.7",
+ "resolved": "https://registry.npmjs.org/cssnano-preset-default/-/cssnano-preset-default-4.0.7.tgz",
+ "integrity": "sha512-x0YHHx2h6p0fCl1zY9L9roD7rnlltugGu7zXSKQx6k2rYw0Hi3IqxcoAGF7u9Q5w1nt7vK0ulxV8Lo+EvllGsA==",
"requires": {
- "postcss": "^7.0.5"
+ "css-declaration-sorter": "^4.0.1",
+ "cssnano-util-raw-cache": "^4.0.1",
+ "postcss": "^7.0.0",
+ "postcss-calc": "^7.0.1",
+ "postcss-colormin": "^4.0.3",
+ "postcss-convert-values": "^4.0.1",
+ "postcss-discard-comments": "^4.0.2",
+ "postcss-discard-duplicates": "^4.0.2",
+ "postcss-discard-empty": "^4.0.1",
+ "postcss-discard-overridden": "^4.0.1",
+ "postcss-merge-longhand": "^4.0.11",
+ "postcss-merge-rules": "^4.0.3",
+ "postcss-minify-font-values": "^4.0.2",
+ "postcss-minify-gradients": "^4.0.2",
+ "postcss-minify-params": "^4.0.2",
+ "postcss-minify-selectors": "^4.0.2",
+ "postcss-normalize-charset": "^4.0.1",
+ "postcss-normalize-display-values": "^4.0.2",
+ "postcss-normalize-positions": "^4.0.2",
+ "postcss-normalize-repeat-style": "^4.0.2",
+ "postcss-normalize-string": "^4.0.2",
+ "postcss-normalize-timing-functions": "^4.0.2",
+ "postcss-normalize-unicode": "^4.0.1",
+ "postcss-normalize-url": "^4.0.1",
+ "postcss-normalize-whitespace": "^4.0.2",
+ "postcss-ordered-values": "^4.1.2",
+ "postcss-reduce-initial": "^4.0.3",
+ "postcss-reduce-transforms": "^4.0.2",
+ "postcss-svgo": "^4.0.2",
+ "postcss-unique-selectors": "^4.0.1"
},
"dependencies": {
"chalk": {
@@ -5492,20 +4280,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -5516,69 +4299,22 @@
}
}
},
- "css-select": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/css-select/-/css-select-2.1.0.tgz",
- "integrity": "sha512-Dqk7LQKpwLoH3VovzZnkzegqNSuAziQyNZUcrdDM401iY+R5NkGBXGmtO05/yaXQziALuPogeG0b7UAgjnTJTQ==",
- "requires": {
- "boolbase": "^1.0.0",
- "css-what": "^3.2.1",
- "domutils": "^1.7.0",
- "nth-check": "^1.0.2"
- }
- },
- "css-select-base-adapter": {
- "version": "0.1.1",
- "resolved": "https://registry.npmjs.org/css-select-base-adapter/-/css-select-base-adapter-0.1.1.tgz",
- "integrity": "sha512-jQVeeRG70QI08vSTwf1jHxp74JoZsr2XSgETae8/xC8ovSnL2WF87GTLO86Sbwdt2lK4Umg4HnnwMO4YF3Ce7w=="
+ "cssnano-util-get-arguments": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/cssnano-util-get-arguments/-/cssnano-util-get-arguments-4.0.0.tgz",
+ "integrity": "sha1-7ToIKZ8h11dBsg87gfGU7UnMFQ8="
},
- "css-selector-tokenizer": {
- "version": "0.7.2",
- "resolved": "https://registry.npmjs.org/css-selector-tokenizer/-/css-selector-tokenizer-0.7.2.tgz",
- "integrity": "sha512-yj856NGuAymN6r8bn8/Jl46pR+OC3eEvAhfGYDUe7YPtTPAYrSSw4oAniZ9Y8T5B92hjhwTBLUen0/vKPxf6pw==",
- "requires": {
- "cssesc": "^3.0.0",
- "fastparse": "^1.1.2",
- "regexpu-core": "^4.6.0"
- }
+ "cssnano-util-get-match": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/cssnano-util-get-match/-/cssnano-util-get-match-4.0.0.tgz",
+ "integrity": "sha1-wOTKB/U4a7F+xeUiULT1lhNlFW0="
},
- "css-tree": {
- "version": "1.0.0-alpha.37",
- "resolved": "https://registry.npmjs.org/css-tree/-/css-tree-1.0.0-alpha.37.tgz",
- "integrity": "sha512-DMxWJg0rnz7UgxKT0Q1HU/L9BeJI0M6ksor0OgqOnF+aRCDWg/N2641HmVyU9KVIu0OVVWOb2IpC9A+BJRnejg==",
+ "cssnano-util-raw-cache": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/cssnano-util-raw-cache/-/cssnano-util-raw-cache-4.0.1.tgz",
+ "integrity": "sha512-qLuYtWK2b2Dy55I8ZX3ky1Z16WYsx544Q0UWViebptpwn/xDBmog2TLg4f+DBMg1rJ6JDWtn96WHbOKDWt1WQA==",
"requires": {
- "mdn-data": "2.0.4",
- "source-map": "^0.6.1"
- },
- "dependencies": {
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- }
- }
- },
- "css-what": {
- "version": "3.2.1",
- "resolved": "https://registry.npmjs.org/css-what/-/css-what-3.2.1.tgz",
- "integrity": "sha512-WwOrosiQTvyms+Ti5ZC5vGEK0Vod3FTt1ca+payZqvKuGJF+dq7bG63DstxtN0dpm6FxY27a/zS3Wten+gEtGw=="
- },
- "cssdb": {
- "version": "4.4.0",
- "resolved": "https://registry.npmjs.org/cssdb/-/cssdb-4.4.0.tgz",
- "integrity": "sha512-LsTAR1JPEM9TpGhl/0p3nQecC2LJ0kD8X5YARu1hk/9I1gril5vDtMZyNxcEpxxDj34YNck/ucjuoUd66K03oQ=="
- },
- "cssesc": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/cssesc/-/cssesc-3.0.0.tgz",
- "integrity": "sha512-/Tb/JcjK111nNScGob5MNtsntNM1aCNUDipB/TkwZFhyDrrE47SOx/18wF2bbjgc3ZzCSKW1T5nt5EbFoAz/Vg=="
- },
- "cssnano-preset-simple": {
- "version": "1.0.3",
- "resolved": "https://registry.npmjs.org/cssnano-preset-simple/-/cssnano-preset-simple-1.0.3.tgz",
- "integrity": "sha512-TMtCiUf75Kw+RCyBcYSz14cEmjKb+QI9KDUZbuinqdaZvc7qOuTKU27FTIfnCorbekmA7EGMC3tgN7J4vt1N1Q==",
- "requires": {
- "postcss": "^7.0.18"
+ "postcss": "^7.0.0"
},
"dependencies": {
"chalk": {
@@ -5602,20 +4338,15 @@
}
},
"postcss": {
- "version": "7.0.27",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.27.tgz",
- "integrity": "sha512-WuQETPMcW9Uf1/22HWUWP9lgsIC+KEHg2kozMflKjbeUtw9ujvFX6QmIfozaErDkmLWS9WEnEdEe6Uo9/BNTdQ==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -5626,68 +4357,35 @@
}
}
},
- "cssnano-simple": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/cssnano-simple/-/cssnano-simple-1.0.0.tgz",
- "integrity": "sha512-B7u9vvtXEqeU2rzdt+Kfw5O9Nd46R7KNjJoP7Y5lGQs6c7n1Et5Ilofh2W9OjBV/ZiJV5+7j9ShWgiYNtH/57A==",
+ "cssnano-util-same-parent": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/cssnano-util-same-parent/-/cssnano-util-same-parent-4.0.1.tgz",
+ "integrity": "sha512-WcKx5OY+KoSIAxBW6UBBRay1U6vkYheCdjyVNDm85zt5K9mHoGOfsOsqIszfAqrQQFIIKgjh2+FDgIj/zsl21Q=="
+ },
+ "csso": {
+ "version": "4.0.3",
+ "resolved": "https://registry.npmjs.org/csso/-/csso-4.0.3.tgz",
+ "integrity": "sha512-NL3spysxUkcrOgnpsT4Xdl2aiEiBG6bXswAABQVHcMrfjjBisFOKwLDOmf4wf32aPdcJws1zds2B0Rg+jqMyHQ==",
"requires": {
- "cssnano-preset-simple": "^1.0.0",
- "postcss": "^7.0.18"
+ "css-tree": "1.0.0-alpha.39"
},
"dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- },
- "dependencies": {
- "supports-color": {
- "version": "5.5.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
- "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss": {
- "version": "7.0.27",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.27.tgz",
- "integrity": "sha512-WuQETPMcW9Uf1/22HWUWP9lgsIC+KEHg2kozMflKjbeUtw9ujvFX6QmIfozaErDkmLWS9WEnEdEe6Uo9/BNTdQ==",
+ "css-tree": {
+ "version": "1.0.0-alpha.39",
+ "resolved": "https://registry.npmjs.org/css-tree/-/css-tree-1.0.0-alpha.39.tgz",
+ "integrity": "sha512-7UvkEYgBAHRG9Nt980lYxjsTrCyHFN53ky3wVsDkiMdVqylqRt+Zc+jm5qw7/qyOvN2dHSYtX0e4MbCCExSvnA==",
"requires": {
- "chalk": "^2.4.2",
- "source-map": "^0.6.1",
- "supports-color": "^6.1.0"
+ "mdn-data": "2.0.6",
+ "source-map": "^0.6.1"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
+ "mdn-data": {
+ "version": "2.0.6",
+ "resolved": "https://registry.npmjs.org/mdn-data/-/mdn-data-2.0.6.tgz",
+ "integrity": "sha512-rQvjv71olwNHgiTbfPZFkJtjNMciWgswYeciZhtvWLO8bmX3TnhyA62I6sTWOyZssWHJJjY6/KiWwqQsWWsqOA=="
}
}
},
- "csso": {
- "version": "4.0.2",
- "resolved": "https://registry.npmjs.org/csso/-/csso-4.0.2.tgz",
- "integrity": "sha512-kS7/oeNVXkHWxby5tHVxlhjizRCSv8QdU7hB2FpdAibDU8FjTAolhNjKNTiLzXtUrKT6HwClE81yXwEk1309wg==",
- "requires": {
- "css-tree": "1.0.0-alpha.37"
- }
- },
"currently-unhandled": {
"version": "0.4.1",
"resolved": "https://registry.npmjs.org/currently-unhandled/-/currently-unhandled-0.4.1.tgz",
@@ -5721,23 +4419,19 @@
"integrity": "sha512-ZMvxkAyEpBTvBFk+DPjcK0ObNy8GM4gmrGG1qIu0EXb/zj25vjRWNnhLHKZw4JlOLo02oWlwDeqo98GuBlJcIg==",
"dev": true
},
- "date-fns": {
- "version": "1.30.1",
- "resolved": "https://registry.npmjs.org/date-fns/-/date-fns-1.30.1.tgz",
- "integrity": "sha512-hBSVCvSmWC+QypYObzwGOd9wqdDpOt+0wl0KbU+R+uuZBS1jN8VsD1ss3irQDknRj5NvxiTF6oj/nDRnN/UQNw=="
- },
- "de-indent": {
- "version": "1.0.2",
- "resolved": "https://registry.npmjs.org/de-indent/-/de-indent-1.0.2.tgz",
- "integrity": "sha1-sgOOhG3DO6pXlhKNCAS0VbjB4h0=",
- "optional": true
- },
"debug": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/debug/-/debug-4.1.1.tgz",
"integrity": "sha512-pYAIzeRo8J6KPEaJ0VWOh5Pzkbw/RetuzehGM7QRRX5he4fPHx2rdKMB256ehJCkX+XRQm16eZLqLNS8RSZXZw==",
"requires": {
"ms": "^2.1.1"
+ },
+ "dependencies": {
+ "ms": {
+ "version": "2.1.2",
+ "resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz",
+ "integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w=="
+ }
}
},
"decamelize": {
@@ -5751,9 +4445,9 @@
"integrity": "sha1-6zkTMzRYd1y4TNGh+uBiEGu4dUU="
},
"decompress": {
- "version": "4.2.0",
- "resolved": "https://registry.npmjs.org/decompress/-/decompress-4.2.0.tgz",
- "integrity": "sha1-eu3YVCflqS2s/lVnSnxQXpbQH50=",
+ "version": "4.2.1",
+ "resolved": "https://registry.npmjs.org/decompress/-/decompress-4.2.1.tgz",
+ "integrity": "sha512-e48kc2IjU+2Zw8cTb6VZcJQ3lgVbS4uuB1TfCHbiZIP/haNXm+SVyhu+87jts5/3ROpd82GSVCoNs/z8l4ZOaQ==",
"requires": {
"decompress-tar": "^4.0.0",
"decompress-tarbz2": "^4.0.0",
@@ -5794,6 +4488,11 @@
"version": "5.2.0",
"resolved": "https://registry.npmjs.org/file-type/-/file-type-5.2.0.tgz",
"integrity": "sha1-LdvqfHP/42No365J3DOMBYwritY="
+ },
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
}
}
},
@@ -5813,6 +4512,11 @@
"version": "6.2.0",
"resolved": "https://registry.npmjs.org/file-type/-/file-type-6.2.0.tgz",
"integrity": "sha512-YPcTBDV+2Tm0VqjybVd32MHdlEGAtuxS3VAYsumFokDSMG+ROT5wawGlnHDoz7bfMcMDt9hxuXvXwoKUx2fkOg=="
+ },
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
}
}
},
@@ -5830,6 +4534,11 @@
"version": "5.2.0",
"resolved": "https://registry.npmjs.org/file-type/-/file-type-5.2.0.tgz",
"integrity": "sha1-LdvqfHP/42No365J3DOMBYwritY="
+ },
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
}
}
},
@@ -5881,9 +4590,9 @@
"integrity": "sha1-s2nW+128E+7PUk+RsHD+7cNXzzQ="
},
"deepmerge": {
- "version": "4.2.2",
- "resolved": "https://registry.npmjs.org/deepmerge/-/deepmerge-4.2.2.tgz",
- "integrity": "sha512-FJ3UgI4gIl+PHZm53knsuSFpE+nESMr7M4v9QcgB7S63Kj/6WqMiFQJpBBYz1Pt+66bZpP3Q7Lye0Oo9MPKEdg=="
+ "version": "2.2.1",
+ "resolved": "https://registry.npmjs.org/deepmerge/-/deepmerge-2.2.1.tgz",
+ "integrity": "sha512-R9hc1Xa/NOBi9WRVUWg19rl1UB7Tt4kuPd+thNJgFZoxXsTz7ncaPaeIm+40oSGuP33DfMb4sZt1QIGiJzC4EA=="
},
"defaults": {
"version": "1.0.3",
@@ -5943,78 +4652,17 @@
}
}
},
- "del": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/del/-/del-3.0.0.tgz",
- "integrity": "sha1-U+z2mf/LyzljdpGrE7rxYIGXZuU=",
- "requires": {
- "globby": "^6.1.0",
- "is-path-cwd": "^1.0.0",
- "is-path-in-cwd": "^1.0.0",
- "p-map": "^1.1.1",
- "pify": "^3.0.0",
- "rimraf": "^2.2.8"
- },
- "dependencies": {
- "array-union": {
- "version": "1.0.2",
- "resolved": "https://registry.npmjs.org/array-union/-/array-union-1.0.2.tgz",
- "integrity": "sha1-mjRBDk9OPaI96jdb5b5w8kd47Dk=",
- "requires": {
- "array-uniq": "^1.0.1"
- }
- },
- "globby": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/globby/-/globby-6.1.0.tgz",
- "integrity": "sha1-9abXDoOV4hyFj7BInWTfAkJNUGw=",
- "requires": {
- "array-union": "^1.0.1",
- "glob": "^7.0.3",
- "object-assign": "^4.0.1",
- "pify": "^2.0.0",
- "pinkie-promise": "^2.0.0"
- },
- "dependencies": {
- "pify": {
- "version": "2.3.0",
- "resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz",
- "integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw="
- }
- }
- },
- "p-map": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/p-map/-/p-map-1.2.0.tgz",
- "integrity": "sha512-r6zKACMNhjPJMTl8KcFH4li//gkrXWfbD6feV8l6doRHlzljFWGJ2AP6iKaCJXyZmAUMOPtvbW7EXkbWO/pLEA=="
- },
- "pify": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz",
- "integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY="
- }
- }
- },
- "delayed-stream": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/delayed-stream/-/delayed-stream-1.0.0.tgz",
- "integrity": "sha1-3zrhmayt+31ECqrgsp4icrJOxhk="
+ "delegate": {
+ "version": "3.2.0",
+ "resolved": "https://registry.npmjs.org/delegate/-/delegate-3.2.0.tgz",
+ "integrity": "sha512-IofjkYBZaZivn0V8nnsMJGBr4jVLxHDheKSW88PyxS5QC4Vo9ZbZVvhzlSxY87fVq3STR6r+4cGepyHkcWOQSw==",
+ "optional": true
},
"depd": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/depd/-/depd-1.1.2.tgz",
"integrity": "sha1-m81S4UwJd2PnSbJ0xDRu0uVgtak="
},
- "dependency-graph": {
- "version": "0.9.0",
- "resolved": "https://registry.npmjs.org/dependency-graph/-/dependency-graph-0.9.0.tgz",
- "integrity": "sha512-9YLIBURXj4DJMFALxXw9K3Y3rwb5Fk0X5/8ipCzaN84+gKxoHK43tVKRNakCQbiEx07E8Uwhuq21BpUagFhZ8w=="
- },
- "deprecated-decorator": {
- "version": "0.1.6",
- "resolved": "https://registry.npmjs.org/deprecated-decorator/-/deprecated-decorator-0.1.6.tgz",
- "integrity": "sha1-AJZjF7ehL+kvPMgx91g68ym4bDc="
- },
"des.js": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/des.js/-/des.js-1.0.1.tgz",
@@ -6037,11 +4685,6 @@
"repeat-string": "^1.5.4"
}
},
- "devalue": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/devalue/-/devalue-2.0.1.tgz",
- "integrity": "sha512-I2TiqT5iWBEyB8GRfTDP0hiLZ0YeDJZ+upDxjBfOC2lebO5LezQMv7QvIUTzdb64jQyAKLf1AHADtGN+jw6v8Q=="
- },
"diffie-hellman": {
"version": "5.0.3",
"resolved": "https://registry.npmjs.org/diffie-hellman/-/diffie-hellman-5.0.3.tgz",
@@ -6050,14 +4693,37 @@
"bn.js": "^4.1.0",
"miller-rabin": "^4.0.0",
"randombytes": "^2.0.0"
+ },
+ "dependencies": {
+ "bn.js": {
+ "version": "4.11.8",
+ "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.11.8.tgz",
+ "integrity": "sha512-ItfYfPLkWHUjckQCk8xC+LwxgK8NYcXywGigJgSwOP8Y2iyWT4f2vsZnoOXTTbo+o5yXmIUJ4gn5538SO5S3gA=="
+ }
}
},
"dir-glob": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/dir-glob/-/dir-glob-3.0.1.tgz",
- "integrity": "sha512-WkrWp9GR4KXfKGYzOLmTuGVi1UWFfws377n9cc55/tb6DuqyF6pcQ5AbiHEshaDpY9v6oaSr2XCDidGmMwdzIA==",
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/dir-glob/-/dir-glob-2.0.0.tgz",
+ "integrity": "sha512-37qirFDz8cA5fimp9feo43fSuRo2gHwaIn6dXL8Ber1dGwUosDrGZeCCXq57WnIqE4aQ+u3eQZzsk1yOzhdwag==",
"requires": {
- "path-type": "^4.0.0"
+ "arrify": "^1.0.1",
+ "path-type": "^3.0.0"
+ },
+ "dependencies": {
+ "path-type": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/path-type/-/path-type-3.0.0.tgz",
+ "integrity": "sha512-T2ZUsdZFHgA3u4e5PfPbjd7HDDpxPnQb5jN0SrDsjNSuVXHJqtwTnWqG0B1jZrgmJ/7lj1EmVIByWt1gxGkWvg==",
+ "requires": {
+ "pify": "^3.0.0"
+ }
+ },
+ "pify": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz",
+ "integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY="
+ }
}
},
"doctrine": {
@@ -6118,15 +4784,6 @@
"domelementtype": "1"
}
},
- "dot-case": {
- "version": "3.0.3",
- "resolved": "https://registry.npmjs.org/dot-case/-/dot-case-3.0.3.tgz",
- "integrity": "sha512-7hwEmg6RiSQfm/GwPL4AAWXKy3YNNZA3oFv2Pdiey0mwkRCPZ9x6SZbkLcn8Ma5PYeVokzoD4Twv2n7LKp5WeA==",
- "requires": {
- "no-case": "^3.0.3",
- "tslib": "^1.10.0"
- }
- },
"dot-prop": {
"version": "5.2.0",
"resolved": "https://registry.npmjs.org/dot-prop/-/dot-prop-5.2.0.tgz",
@@ -6196,6 +4853,11 @@
"resolved": "https://registry.npmjs.org/is-plain-obj/-/is-plain-obj-1.1.0.tgz",
"integrity": "sha1-caUMhCnfync8kqOQpKA7OfzVHT4="
},
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
+ },
"p-cancelable": {
"version": "0.3.0",
"resolved": "https://registry.npmjs.org/p-cancelable/-/p-cancelable-0.3.0.tgz",
@@ -6242,33 +4904,28 @@
"stream-shift": "^1.0.0"
}
},
- "ecdsa-sig-formatter": {
- "version": "1.0.11",
- "resolved": "https://registry.npmjs.org/ecdsa-sig-formatter/-/ecdsa-sig-formatter-1.0.11.tgz",
- "integrity": "sha512-nagl3RYrbNv6kQkeJIpt6NJZy8twLB/2vtz6yN9Z4vRKHN4/QZJIEbqohALSgwKdnksuY3k5Addp5lg8sVoVcQ==",
- "requires": {
- "safe-buffer": "^5.0.1"
- }
- },
"ee-first": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/ee-first/-/ee-first-1.1.1.tgz",
"integrity": "sha1-WQxhFWsK4vTwJVcyoViyZrxWsh0="
},
"ejs": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/ejs/-/ejs-3.0.1.tgz",
- "integrity": "sha512-cuIMtJwxvzumSAkqaaoGY/L6Fc/t6YvoP9/VIaK0V/CyqKLEQ8sqODmYfy/cjXEdZ9+OOL8TecbJu+1RsofGDw=="
+ "version": "3.1.2",
+ "resolved": "https://registry.npmjs.org/ejs/-/ejs-3.1.2.tgz",
+ "integrity": "sha512-zFuywxrAWtX5Mk2KAuoJNkXXbfezpNA0v7i+YC971QORguPekpjpAgeOv99YWSdKXwj7JxI2QAWDeDkE8fWtXw==",
+ "requires": {
+ "jake": "^10.6.1"
+ }
},
"electron-to-chromium": {
- "version": "1.3.340",
- "resolved": "https://registry.npmjs.org/electron-to-chromium/-/electron-to-chromium-1.3.340.tgz",
- "integrity": "sha512-hRFBAglhcj5iVYH+o8QU0+XId1WGoc0VGowJB1cuJAt3exHGrivZvWeAO5BRgBZqwZtwxjm8a5MQeGoT/Su3ww=="
+ "version": "1.3.432",
+ "resolved": "https://registry.npmjs.org/electron-to-chromium/-/electron-to-chromium-1.3.432.tgz",
+ "integrity": "sha512-/GdNhXyLP5Yl2322CUX/+Xi8NhdHBqL6lD9VJVKjH6CjoPGakvwZ5CpKgj/oOlbzuWWjOvMjDw1bBuAIRCNTlw=="
},
"elegant-spinner": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/elegant-spinner/-/elegant-spinner-1.0.1.tgz",
- "integrity": "sha1-2wQ1IcldfjA/2PNFvtwzSc+wcp4="
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/elegant-spinner/-/elegant-spinner-2.0.0.tgz",
+ "integrity": "sha512-5YRYHhvhYzV/FC4AiMdeSIg3jAYGq9xFvbhZMpPlJoBsfYgrw2DSCYeXfat6tYBu45PWiyRr3+flaCPPmviPaA=="
},
"elliptic": {
"version": "6.5.2",
@@ -6282,17 +4939,24 @@
"inherits": "^2.0.1",
"minimalistic-assert": "^1.0.0",
"minimalistic-crypto-utils": "^1.0.0"
+ },
+ "dependencies": {
+ "bn.js": {
+ "version": "4.11.8",
+ "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.11.8.tgz",
+ "integrity": "sha512-ItfYfPLkWHUjckQCk8xC+LwxgK8NYcXywGigJgSwOP8Y2iyWT4f2vsZnoOXTTbo+o5yXmIUJ4gn5538SO5S3gA=="
+ }
}
},
"emoji-regex": {
- "version": "7.0.3",
- "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-7.0.3.tgz",
- "integrity": "sha512-CwBLREIQ7LvYFB0WyRvwhq5N5qPhc6PMjD6bYggFlI5YyDgl+0vxq5VHbMOFqLg7hfWzmu8T5Z1QofhmTIhItA=="
+ "version": "6.1.1",
+ "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-6.1.1.tgz",
+ "integrity": "sha1-xs0OwbBkLio8Z6ETfvxeeW2k+I4="
},
"emojis-list": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/emojis-list/-/emojis-list-2.1.0.tgz",
- "integrity": "sha1-TapNnbAPmBmIDHn6RXrlsJof04k="
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/emojis-list/-/emojis-list-3.0.0.tgz",
+ "integrity": "sha512-/kyM18EfinwXZbno9FyUGeFh87KC8HRQBQGildHZbEuRyWFOmv1U10o9BBp8XVZDVNNuQKyIGIu5ZYAAXJ0V2Q=="
},
"encodeurl": {
"version": "1.0.2",
@@ -6336,15 +5000,18 @@
}
}
},
- "entities": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/entities/-/entities-2.0.0.tgz",
- "integrity": "sha512-D9f7V0JSRwIxlRI2mjMqufDrRDnx8p+eEOz7aUM9SuvF8gsBzra0/6tbjl1m8eQHrZlYj6PxqE00hZ1SAIKPLw=="
+ "enquirer": {
+ "version": "2.3.5",
+ "resolved": "https://registry.npmjs.org/enquirer/-/enquirer-2.3.5.tgz",
+ "integrity": "sha512-BNT1C08P9XD0vNg3J475yIUG+mVdp9T6towYFHUv897X0KoHBjB1shyrNmhmtHWKP17iSWgo7Gqh7BBuzLZMSA==",
+ "requires": {
+ "ansi-colors": "^3.2.1"
+ }
},
- "env-paths": {
- "version": "2.2.0",
- "resolved": "https://registry.npmjs.org/env-paths/-/env-paths-2.2.0.tgz",
- "integrity": "sha512-6u0VYSCo/OW6IoD5WCLLy9JUGARbamfSavcNXry/eu8aHVFei6CD3Sw+VGX5alea1i9pgPHW0mbu6Xj0uBh7gA=="
+ "entities": {
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/entities/-/entities-2.0.2.tgz",
+ "integrity": "sha512-dmD3AvJQBUjKpcNkoqr+x+IF0SdRtPz9Vk0uTy4yWqga9ibB6s4v++QFWNohjiUGoMlF552ZvNyXDxz5iW0qmw=="
},
"errno": {
"version": "0.1.7",
@@ -6371,9 +5038,9 @@
}
},
"es-abstract": {
- "version": "1.17.4",
- "resolved": "https://registry.npmjs.org/es-abstract/-/es-abstract-1.17.4.tgz",
- "integrity": "sha512-Ae3um/gb8F0mui/jPL+QiqmglkUsaQf7FwBEHYIFkztkneosu9imhqHpBzQ3h1vit8t5iQ74t6PEVvphBZiuiQ==",
+ "version": "1.17.5",
+ "resolved": "https://registry.npmjs.org/es-abstract/-/es-abstract-1.17.5.tgz",
+ "integrity": "sha512-BR9auzDbySxOcfog0tLECW8l28eRGpDpU3Dm3Hp4q/N+VtLTmyj4EUN088XZWQDW/hzj6sYRDXeOFsaAODKvpg==",
"requires": {
"es-to-primitive": "^1.2.1",
"function-bind": "^1.1.1",
@@ -6438,21 +5105,21 @@
"integrity": "sha1-G2HAViGQqN/2rjuyzwIAyhMLhtQ="
},
"eslint": {
- "version": "6.8.0",
- "resolved": "https://registry.npmjs.org/eslint/-/eslint-6.8.0.tgz",
- "integrity": "sha512-K+Iayyo2LtyYhDSYwz5D5QdWw0hCacNzyq1Y821Xna2xSJj7cijoLLYmLxTQgcgZ9mC61nryMy9S7GRbYpI5Ig==",
+ "version": "7.0.0",
+ "resolved": "https://registry.npmjs.org/eslint/-/eslint-7.0.0.tgz",
+ "integrity": "sha512-qY1cwdOxMONHJfGqw52UOpZDeqXy8xmD0u8CT6jIstil72jkhURC704W8CFyTPDPllz4z4lu0Ql1+07PG/XdIg==",
"requires": {
"@babel/code-frame": "^7.0.0",
"ajv": "^6.10.0",
- "chalk": "^2.1.0",
- "cross-spawn": "^6.0.5",
+ "chalk": "^4.0.0",
+ "cross-spawn": "^7.0.2",
"debug": "^4.0.1",
"doctrine": "^3.0.0",
"eslint-scope": "^5.0.0",
- "eslint-utils": "^1.4.3",
+ "eslint-utils": "^2.0.0",
"eslint-visitor-keys": "^1.1.0",
- "espree": "^6.1.2",
- "esquery": "^1.0.1",
+ "espree": "^7.0.0",
+ "esquery": "^1.2.0",
"esutils": "^2.0.2",
"file-entry-cache": "^5.0.1",
"functional-red-black-tree": "^1.0.1",
@@ -6465,46 +5132,34 @@
"is-glob": "^4.0.0",
"js-yaml": "^3.13.1",
"json-stable-stringify-without-jsonify": "^1.0.1",
- "levn": "^0.3.0",
+ "levn": "^0.4.1",
"lodash": "^4.17.14",
"minimatch": "^3.0.4",
- "mkdirp": "^0.5.1",
"natural-compare": "^1.4.0",
- "optionator": "^0.8.3",
+ "optionator": "^0.9.1",
"progress": "^2.0.0",
- "regexpp": "^2.0.1",
- "semver": "^6.1.2",
- "strip-ansi": "^5.2.0",
- "strip-json-comments": "^3.0.1",
+ "regexpp": "^3.1.0",
+ "semver": "^7.2.1",
+ "strip-ansi": "^6.0.0",
+ "strip-json-comments": "^3.1.0",
"table": "^5.2.3",
"text-table": "^0.2.0",
"v8-compile-cache": "^2.0.3"
},
"dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- }
- },
- "eslint-utils": {
- "version": "1.4.3",
- "resolved": "https://registry.npmjs.org/eslint-utils/-/eslint-utils-1.4.3.tgz",
- "integrity": "sha512-fbBN5W2xdY45KulGXmLHZ3c3FHfVYmKg0IrAKGOkT/464PQsx2UeIzfz1RmEci+KLm1bBaAzZAh8+/E+XAeZ8Q==",
- "requires": {
- "eslint-visitor-keys": "^1.1.0"
- }
+ "ansi-regex": {
+ "version": "5.0.0",
+ "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz",
+ "integrity": "sha512-bY6fj56OUQ0hU1KjFNDQuJFezqKdrAyFdIevADiqrWHwSlbmBNMHp5ak2f40Pm8JTFyM2mqxkG6ngkHO11f/lg=="
},
- "glob-parent": {
- "version": "5.1.1",
- "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz",
- "integrity": "sha512-FnI+VGOpnlGHWZxthPGR+QhR78fuiK0sNLkHQv+bL9fQi57lNNdquIbna/WrfROrolq8GK5Ek6BiMwqL/voRYQ==",
+ "cross-spawn": {
+ "version": "7.0.2",
+ "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.2.tgz",
+ "integrity": "sha512-PD6G8QG3S4FK/XCGFbEQrDqO2AnMMsy0meR7lerlIOHAAbkuavGU/pOqprrlvfTNjvowivTeBsjebAL0NSoMxw==",
"requires": {
- "is-glob": "^4.0.1"
+ "path-key": "^3.1.0",
+ "shebang-command": "^2.0.0",
+ "which": "^2.0.1"
}
},
"globals": {
@@ -6524,10 +5179,10 @@
"resolve-from": "^4.0.0"
}
},
- "regexpp": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/regexpp/-/regexpp-2.0.1.tgz",
- "integrity": "sha512-lv0M6+TkDVniA3aD1Eg0DVpfU/booSu7Eev3TDO/mZKHBfVjgCGTV4t4buppESEYDtkArYFOxTJWv6S5C+iaNw=="
+ "path-key": {
+ "version": "3.1.1",
+ "resolved": "https://registry.npmjs.org/path-key/-/path-key-3.1.1.tgz",
+ "integrity": "sha512-ojmeN0qd+y0jszEtoY48r0Peq5dwMEkIlCOu6Q5f41lfkswXuKtYrhgoTpLnyIcHm24Uhqx+5Tqm2InSwLhE6Q=="
},
"resolve-from": {
"version": "4.0.0",
@@ -6535,16 +5190,45 @@
"integrity": "sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g=="
},
"semver": {
- "version": "6.3.0",
- "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
- "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
+ "version": "7.3.2",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-7.3.2.tgz",
+ "integrity": "sha512-OrOb32TeeambH6UrhtShmF7CRDqhL6/5XpPNp2DuRH6+9QLw/orhp72j87v8Qa1ScDkvrrBNpZcDejAirJmfXQ=="
+ },
+ "shebang-command": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/shebang-command/-/shebang-command-2.0.0.tgz",
+ "integrity": "sha512-kHxr2zZpYtdmrN1qDjrrX/Z1rR1kG8Dx+gkpK1G4eXmvXswmcE1hTWBWYUzlraYw1/yZp6YuDY77YtvbN0dmDA==",
+ "requires": {
+ "shebang-regex": "^3.0.0"
+ }
+ },
+ "shebang-regex": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/shebang-regex/-/shebang-regex-3.0.0.tgz",
+ "integrity": "sha512-7++dFhtcx3353uBaq8DDR4NuxBetBzC7ZQOhmTQInHEd6bSrXdiEyzCvG07Z44UYdLShWUyXt5M/yhz8ekcb1A=="
+ },
+ "strip-ansi": {
+ "version": "6.0.0",
+ "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-6.0.0.tgz",
+ "integrity": "sha512-AuvKTrTfQNYNIctbR1K/YGTR1756GycPsg7b9bdV9Duqur4gv6aKqHXah67Z8ImS7WEz5QVcOtlfW2rZEugt6w==",
+ "requires": {
+ "ansi-regex": "^5.0.0"
+ }
+ },
+ "which": {
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/which/-/which-2.0.2.tgz",
+ "integrity": "sha512-BLI3Tl1TW3Pvl70l3yq3Y64i+awpwXqsGBYWkkqMtnbXgrMD+yj7rhW0kuEDxzJaYXGjEW5ogapKNMEKNMjibA==",
+ "requires": {
+ "isexe": "^2.0.0"
+ }
}
}
},
"eslint-config-prettier": {
- "version": "6.10.1",
- "resolved": "https://registry.npmjs.org/eslint-config-prettier/-/eslint-config-prettier-6.10.1.tgz",
- "integrity": "sha512-svTy6zh1ecQojvpbJSgH3aei/Rt7C6i090l5f2WQ4aB05lYHeZIR1qL4wZyyILTbtmnbHP5Yn8MrsOJMGa8RkQ==",
+ "version": "6.11.0",
+ "resolved": "https://registry.npmjs.org/eslint-config-prettier/-/eslint-config-prettier-6.11.0.tgz",
+ "integrity": "sha512-oB8cpLWSAjOVFEJhhyMZh6NOEOtBVziaqdDQ86+qhDHFbZXoRTM7pNSvFRfW/W/L/LrQ38C99J5CGuRBBzBsdA==",
"requires": {
"get-stdin": "^6.0.0"
}
@@ -6563,12 +5247,19 @@
"emoji-regex": "^7.0.2",
"has": "^1.0.3",
"jsx-ast-utils": "^2.2.1"
+ },
+ "dependencies": {
+ "emoji-regex": {
+ "version": "7.0.3",
+ "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-7.0.3.tgz",
+ "integrity": "sha512-CwBLREIQ7LvYFB0WyRvwhq5N5qPhc6PMjD6bYggFlI5YyDgl+0vxq5VHbMOFqLg7hfWzmu8T5Z1QofhmTIhItA=="
+ }
}
},
"eslint-plugin-prettier": {
- "version": "3.1.2",
- "resolved": "https://registry.npmjs.org/eslint-plugin-prettier/-/eslint-plugin-prettier-3.1.2.tgz",
- "integrity": "sha512-GlolCC9y3XZfv3RQfwGew7NnuFDKsfI4lbvRK+PIIo23SFH+LemGs4cKwzAaRa+Mdb+lQO/STaIayno8T5sJJA==",
+ "version": "3.1.3",
+ "resolved": "https://registry.npmjs.org/eslint-plugin-prettier/-/eslint-plugin-prettier-3.1.3.tgz",
+ "integrity": "sha512-+HG5jmu/dN3ZV3T6eCD7a4BlAySdN7mLIbJYo0z1cFQuI+r2DiTJEFeF68ots93PsnrMxbzIZ2S/ieX+mkrBeQ==",
"requires": {
"prettier-linter-helpers": "^1.0.0"
}
@@ -6599,19 +5290,6 @@
"requires": {
"esutils": "^2.0.2"
}
- },
- "resolve": {
- "version": "1.15.1",
- "resolved": "https://registry.npmjs.org/resolve/-/resolve-1.15.1.tgz",
- "integrity": "sha512-84oo6ZTtoTUpjgNEr5SJyzQhzL72gaRodsSfyxC/AXRvwu0Yse9H8eF9IpGo7b8YetZhlI6v7ZQ6bKBFV/6S7w==",
- "requires": {
- "path-parse": "^1.0.6"
- }
- },
- "semver": {
- "version": "6.3.0",
- "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
- "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
}
}
},
@@ -6638,20 +5316,13 @@
"integrity": "sha512-8y9YjtM1JBJU/A9Kc+SbaOV4y29sSWckBwMHa+FGtVj5gN/sbnKDf6xJUl+8g7FAij9LVaP8C24DUiH/f/2Z9A=="
},
"espree": {
- "version": "6.2.1",
- "resolved": "https://registry.npmjs.org/espree/-/espree-6.2.1.tgz",
- "integrity": "sha512-ysCxRQY3WaXJz9tdbWOwuWr5Y/XrPTGX9Kiz3yoUXwW0VZ4w30HTkQLaGx/+ttFjF8i+ACbArnB4ce68a9m5hw==",
+ "version": "7.0.0",
+ "resolved": "https://registry.npmjs.org/espree/-/espree-7.0.0.tgz",
+ "integrity": "sha512-/r2XEx5Mw4pgKdyb7GNLQNsu++asx/dltf/CI8RFi9oGHxmQFgvLbc5Op4U6i8Oaj+kdslhJtVlEZeAqH5qOTw==",
"requires": {
"acorn": "^7.1.1",
"acorn-jsx": "^5.2.0",
"eslint-visitor-keys": "^1.1.0"
- },
- "dependencies": {
- "acorn": {
- "version": "7.1.1",
- "resolved": "https://registry.npmjs.org/acorn/-/acorn-7.1.1.tgz",
- "integrity": "sha512-add7dgA5ppRPxCFJoAGfMDi7PIBXq1RtGo7BhbLaxwrXPOmw8gq48Y9ozT01hUKy9byMjlR20EJhu5zlkErEkg=="
- }
}
},
"esprima": {
@@ -6660,17 +5331,17 @@
"integrity": "sha512-eGuFFw7Upda+g4p+QHvnW0RyTX/SVeJBDM/gCtMARO0cLuT2HcEKnTPvhjV6aGeqrCB/sbNop0Kszm0jsaWU4A=="
},
"esquery": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/esquery/-/esquery-1.2.0.tgz",
- "integrity": "sha512-weltsSqdeWIX9G2qQZz7KlTRJdkkOCTPgLYJUz1Hacf48R4YOwGPHO3+ORfWedqJKbq5WQmsgK90n+pFLIKt/Q==",
+ "version": "1.3.1",
+ "resolved": "https://registry.npmjs.org/esquery/-/esquery-1.3.1.tgz",
+ "integrity": "sha512-olpvt9QG0vniUBZspVRN6lwB7hOZoTRtT+jzR+tS4ffYx2mzbw+z0XCOk44aaLYKApNX5nMm+E+P6o25ip/DHQ==",
"requires": {
- "estraverse": "^5.0.0"
+ "estraverse": "^5.1.0"
},
"dependencies": {
"estraverse": {
- "version": "5.0.0",
- "resolved": "https://registry.npmjs.org/estraverse/-/estraverse-5.0.0.tgz",
- "integrity": "sha512-j3acdrMzqrxmJTNj5dbr1YbjacrYgAxVMeF0gK16E3j494mOe7xygM/ZLIguEQ0ETwAg2hlJCtHRGav+y0Ny5A=="
+ "version": "5.1.0",
+ "resolved": "https://registry.npmjs.org/estraverse/-/estraverse-5.1.0.tgz",
+ "integrity": "sha512-FyohXK+R0vE+y1nHLoBM7ZTyqRpqAlhdZHCWIWEviFLiGB8b04H6bQs8G+XTthacvT8VuwvteiP7RJSxMs8UEw=="
}
}
},
@@ -6697,11 +5368,6 @@
"resolved": "https://registry.npmjs.org/etag/-/etag-1.8.1.tgz",
"integrity": "sha1-Qa4u62XvpiJorr/qg6x9eSmbCIc="
},
- "eventemitter3": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/eventemitter3/-/eventemitter3-4.0.0.tgz",
- "integrity": "sha512-qerSRB0p+UDEssxTtm6EDKcE7W4OaoisfIMl4CngyEhjpYglocpNg6UEqCvemdGhosAsg4sO2dXJOdyBifPGCg=="
- },
"events": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/events/-/events-3.1.0.tgz",
@@ -6757,6 +5423,24 @@
"resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz",
"integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ="
},
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
+ },
+ "npm-run-path": {
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/npm-run-path/-/npm-run-path-2.0.2.tgz",
+ "integrity": "sha1-NakjLfo11wZ7TLLd8jV7GHFTbF8=",
+ "requires": {
+ "path-key": "^2.0.0"
+ }
+ },
+ "p-finally": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
+ "integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4="
+ },
"pify": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz",
@@ -6765,17 +5449,57 @@
}
},
"execa": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/execa/-/execa-1.0.0.tgz",
- "integrity": "sha512-adbxcyWV46qiHyvSp50TKt05tB4tK3HcmF7/nxfAdhnox83seTDbwnaqKO4sXRy7roHAIFqJP/Rw/AuEbX61LA==",
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/execa/-/execa-4.0.1.tgz",
+ "integrity": "sha512-SCjM/zlBdOK8Q5TIjOn6iEHZaPHFsMoTxXQ2nvUvtPnuohz3H2dIozSg+etNR98dGoYUp2ENSKLL/XaMmbxVgw==",
"requires": {
- "cross-spawn": "^6.0.0",
- "get-stream": "^4.0.0",
- "is-stream": "^1.1.0",
- "npm-run-path": "^2.0.0",
- "p-finally": "^1.0.0",
- "signal-exit": "^3.0.0",
- "strip-eof": "^1.0.0"
+ "cross-spawn": "^7.0.0",
+ "get-stream": "^5.0.0",
+ "human-signals": "^1.1.1",
+ "is-stream": "^2.0.0",
+ "merge-stream": "^2.0.0",
+ "npm-run-path": "^4.0.0",
+ "onetime": "^5.1.0",
+ "signal-exit": "^3.0.2",
+ "strip-final-newline": "^2.0.0"
+ },
+ "dependencies": {
+ "cross-spawn": {
+ "version": "7.0.2",
+ "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.2.tgz",
+ "integrity": "sha512-PD6G8QG3S4FK/XCGFbEQrDqO2AnMMsy0meR7lerlIOHAAbkuavGU/pOqprrlvfTNjvowivTeBsjebAL0NSoMxw==",
+ "requires": {
+ "path-key": "^3.1.0",
+ "shebang-command": "^2.0.0",
+ "which": "^2.0.1"
+ }
+ },
+ "path-key": {
+ "version": "3.1.1",
+ "resolved": "https://registry.npmjs.org/path-key/-/path-key-3.1.1.tgz",
+ "integrity": "sha512-ojmeN0qd+y0jszEtoY48r0Peq5dwMEkIlCOu6Q5f41lfkswXuKtYrhgoTpLnyIcHm24Uhqx+5Tqm2InSwLhE6Q=="
+ },
+ "shebang-command": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/shebang-command/-/shebang-command-2.0.0.tgz",
+ "integrity": "sha512-kHxr2zZpYtdmrN1qDjrrX/Z1rR1kG8Dx+gkpK1G4eXmvXswmcE1hTWBWYUzlraYw1/yZp6YuDY77YtvbN0dmDA==",
+ "requires": {
+ "shebang-regex": "^3.0.0"
+ }
+ },
+ "shebang-regex": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/shebang-regex/-/shebang-regex-3.0.0.tgz",
+ "integrity": "sha512-7++dFhtcx3353uBaq8DDR4NuxBetBzC7ZQOhmTQInHEd6bSrXdiEyzCvG07Z44UYdLShWUyXt5M/yhz8ekcb1A=="
+ },
+ "which": {
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/which/-/which-2.0.2.tgz",
+ "integrity": "sha512-BLI3Tl1TW3Pvl70l3yq3Y64i+awpwXqsGBYWkkqMtnbXgrMD+yj7rhW0kuEDxzJaYXGjEW5ogapKNMEKNMjibA==",
+ "requires": {
+ "isexe": "^2.0.0"
+ }
+ }
}
},
"executable": {
@@ -6822,19 +5546,6 @@
"requires": {
"is-descriptor": "^0.1.0"
}
- },
- "extend-shallow": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
- "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
- "requires": {
- "is-extendable": "^0.1.0"
- }
- },
- "ms": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
- "integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
}
}
},
@@ -6882,11 +5593,6 @@
"requires": {
"ms": "2.0.0"
}
- },
- "ms": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
- "integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
}
}
},
@@ -6928,22 +5634,11 @@
"integrity": "sha512-fjquC59cD7CyW6urNXK0FBufkZcoiGG80wTuPujX590cB5Ttln20E2UB4S/WARVqhXffZl2LNgS+gQdPIIim/g=="
},
"extend-shallow": {
- "version": "3.0.2",
- "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-3.0.2.tgz",
- "integrity": "sha1-Jqcarwc7OfshJxcnRhMcJwQCjbg=",
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
+ "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
"requires": {
- "assign-symbols": "^1.0.0",
- "is-extendable": "^1.0.1"
- },
- "dependencies": {
- "is-extendable": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/is-extendable/-/is-extendable-1.0.1.tgz",
- "integrity": "sha512-arnXMxT1hhoKo9k1LZdmlNyJdDDfy2v0fXjFlmok4+i8ul/6WlbVge9bhM74OpNPQPMGUToDtz+KXa1PneJxOA==",
- "requires": {
- "is-plain-object": "^2.0.4"
- }
- }
+ "is-extendable": "^0.1.0"
}
},
"external-editor": {
@@ -6979,14 +5674,6 @@
"is-descriptor": "^1.0.0"
}
},
- "extend-shallow": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
- "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
- "requires": {
- "is-extendable": "^0.1.0"
- }
- },
"is-accessor-descriptor": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/is-accessor-descriptor/-/is-accessor-descriptor-1.0.0.tgz",
@@ -7015,16 +5702,6 @@
}
}
},
- "extract-files": {
- "version": "7.0.0",
- "resolved": "https://registry.npmjs.org/extract-files/-/extract-files-7.0.0.tgz",
- "integrity": "sha512-3AUlT7TD+DbQXNe3t70QrgJU6Wgcp7rk1Zm0vqWz8OYnw4vxihgG0TgZ2SIGrVqScc4WfOu7B4a0BezGJ0YqvQ=="
- },
- "extracted-loader": {
- "version": "1.0.4",
- "resolved": "https://registry.npmjs.org/extracted-loader/-/extracted-loader-1.0.4.tgz",
- "integrity": "sha512-G8A0hT/WCWIjesZm7BwbWdST5dQ08GNnCpTrJT/k/FYzuiJwlV1gyWjnuoizOzAR4jpEYXG2J++JyEKN/EB26Q=="
- },
"fast-deep-equal": {
"version": "3.1.1",
"resolved": "https://registry.npmjs.org/fast-deep-equal/-/fast-deep-equal-3.1.1.tgz",
@@ -7046,6 +5723,146 @@
"is-glob": "^4.0.0",
"merge2": "^1.2.3",
"micromatch": "^3.1.10"
+ },
+ "dependencies": {
+ "braces": {
+ "version": "2.3.2",
+ "resolved": "https://registry.npmjs.org/braces/-/braces-2.3.2.tgz",
+ "integrity": "sha512-aNdbnj9P8PjdXU4ybaWLK2IF3jc/EoDYbC7AazW6to3TRsfXxscC9UXOB5iDiEQrkyIbWp2SLQda4+QAa7nc3w==",
+ "requires": {
+ "arr-flatten": "^1.1.0",
+ "array-unique": "^0.3.2",
+ "extend-shallow": "^2.0.1",
+ "fill-range": "^4.0.0",
+ "isobject": "^3.0.1",
+ "repeat-element": "^1.1.2",
+ "snapdragon": "^0.8.1",
+ "snapdragon-node": "^2.0.1",
+ "split-string": "^3.0.2",
+ "to-regex": "^3.0.1"
+ },
+ "dependencies": {
+ "extend-shallow": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
+ "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
+ "requires": {
+ "is-extendable": "^0.1.0"
+ }
+ }
+ }
+ },
+ "extend-shallow": {
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-3.0.2.tgz",
+ "integrity": "sha1-Jqcarwc7OfshJxcnRhMcJwQCjbg=",
+ "requires": {
+ "assign-symbols": "^1.0.0",
+ "is-extendable": "^1.0.1"
+ },
+ "dependencies": {
+ "is-extendable": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/is-extendable/-/is-extendable-1.0.1.tgz",
+ "integrity": "sha512-arnXMxT1hhoKo9k1LZdmlNyJdDDfy2v0fXjFlmok4+i8ul/6WlbVge9bhM74OpNPQPMGUToDtz+KXa1PneJxOA==",
+ "requires": {
+ "is-plain-object": "^2.0.4"
+ }
+ }
+ }
+ },
+ "fill-range": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-4.0.0.tgz",
+ "integrity": "sha1-1USBHUKPmOsGpj3EAtJAPDKMOPc=",
+ "requires": {
+ "extend-shallow": "^2.0.1",
+ "is-number": "^3.0.0",
+ "repeat-string": "^1.6.1",
+ "to-regex-range": "^2.1.0"
+ },
+ "dependencies": {
+ "extend-shallow": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
+ "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
+ "requires": {
+ "is-extendable": "^0.1.0"
+ }
+ }
+ }
+ },
+ "glob-parent": {
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz",
+ "integrity": "sha1-nmr2KZ2NO9K9QEMIMr0RPfkGxa4=",
+ "requires": {
+ "is-glob": "^3.1.0",
+ "path-dirname": "^1.0.0"
+ },
+ "dependencies": {
+ "is-glob": {
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/is-glob/-/is-glob-3.1.0.tgz",
+ "integrity": "sha1-e6WuJCF4BKxwcHuWkiVnSGzD6Eo=",
+ "requires": {
+ "is-extglob": "^2.1.0"
+ }
+ }
+ }
+ },
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ },
+ "is-number": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/is-number/-/is-number-3.0.0.tgz",
+ "integrity": "sha1-JP1iAaR4LPUFYcgQJ2r8fRLXEZU=",
+ "requires": {
+ "kind-of": "^3.0.2"
+ },
+ "dependencies": {
+ "kind-of": {
+ "version": "3.2.2",
+ "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
+ "integrity": "sha1-MeohpzS6ubuw8yRm2JOupR5KPGQ=",
+ "requires": {
+ "is-buffer": "^1.1.5"
+ }
+ }
+ }
+ },
+ "micromatch": {
+ "version": "3.1.10",
+ "resolved": "https://registry.npmjs.org/micromatch/-/micromatch-3.1.10.tgz",
+ "integrity": "sha512-MWikgl9n9M3w+bpsY3He8L+w9eF9338xRl8IAO5viDizwSzziFEyUzo2xrrloB64ADbTf8uA8vRqqttDTOmccg==",
+ "requires": {
+ "arr-diff": "^4.0.0",
+ "array-unique": "^0.3.2",
+ "braces": "^2.3.1",
+ "define-property": "^2.0.2",
+ "extend-shallow": "^3.0.2",
+ "extglob": "^2.0.4",
+ "fragment-cache": "^0.2.1",
+ "kind-of": "^6.0.2",
+ "nanomatch": "^1.2.9",
+ "object.pick": "^1.3.0",
+ "regex-not": "^1.0.0",
+ "snapdragon": "^0.8.1",
+ "to-regex": "^3.0.2"
+ }
+ },
+ "to-regex-range": {
+ "version": "2.1.1",
+ "resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-2.1.1.tgz",
+ "integrity": "sha1-fIDBe53+vlmeJzZ+DU3VWQFB2zg=",
+ "requires": {
+ "is-number": "^3.0.0",
+ "repeat-string": "^1.6.1"
+ }
+ }
}
},
"fast-json-stable-stringify": {
@@ -7058,42 +5875,12 @@
"resolved": "https://registry.npmjs.org/fast-levenshtein/-/fast-levenshtein-2.0.6.tgz",
"integrity": "sha1-PYpcZog6FqMMqGQ+hR8Zuqd5eRc="
},
- "fastparse": {
- "version": "1.1.2",
- "resolved": "https://registry.npmjs.org/fastparse/-/fastparse-1.1.2.tgz",
- "integrity": "sha512-483XLLxTVIwWK3QTrMGRqUfUpoOs/0hbQrl2oz4J0pAcm3A3bu84wxTFqGqkJzewCLdME38xJLJAxBABfQT8sQ=="
- },
- "fastq": {
- "version": "1.6.1",
- "resolved": "https://registry.npmjs.org/fastq/-/fastq-1.6.1.tgz",
- "integrity": "sha512-mpIH5sKYueh3YyeJwqtVo8sORi0CgtmkVbK6kZStpQlZBYQuTzG2CZ7idSiJuA7bY0SFCWUc5WIs+oYumGCQNw==",
- "requires": {
- "reusify": "^1.0.4"
- }
- },
- "fault": {
- "version": "1.0.4",
- "resolved": "https://registry.npmjs.org/fault/-/fault-1.0.4.tgz",
- "integrity": "sha512-CJ0HCB5tL5fYTEA7ToAq5+kTwd++Borf1/bifxd9iT70QcXr4MRrO3Llf8Ifs70q+SJcGHFtnIE/Nw6giCtECA==",
- "requires": {
- "format": "^0.2.0"
- }
- },
- "fb-watchman": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/fb-watchman/-/fb-watchman-2.0.1.tgz",
- "integrity": "sha512-DkPJKQeY6kKwmuMretBhr7G6Vodr7bFwDYTXIkfG1gjvNpaxBTQV3PbXg6bR1c1UP4jPOX0jHUbbHANL9vRjVg==",
- "requires": {
- "bser": "2.1.1"
- }
- },
"fbjs": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/fbjs/-/fbjs-1.0.0.tgz",
- "integrity": "sha512-MUgcMEJaFhCaF1QtWGnmq9ZDRAzECTCRAF7O6UZIlAlkTs1SasiX9aP0Iw7wfD2mJ7wDTNfg2w7u5fSCwJk1OA==",
+ "version": "0.8.17",
+ "resolved": "https://registry.npmjs.org/fbjs/-/fbjs-0.8.17.tgz",
+ "integrity": "sha1-xNWY6taUkRJlPWWIsBpc3Nn5D90=",
"requires": {
- "core-js": "^2.4.1",
- "fbjs-css-vars": "^1.0.0",
+ "core-js": "^1.0.0",
"isomorphic-fetch": "^2.1.1",
"loose-envify": "^1.0.0",
"object-assign": "^4.1.0",
@@ -7102,11 +5889,6 @@
"ua-parser-js": "^0.7.18"
}
},
- "fbjs-css-vars": {
- "version": "1.0.2",
- "resolved": "https://registry.npmjs.org/fbjs-css-vars/-/fbjs-css-vars-1.0.2.tgz",
- "integrity": "sha512-b2XGFAFdWZWg0phtAWLHCk836A1Xann+I+Dgd3Gk64MHKZO44FfoD1KxyvbSh0qZsIoXQGGlVztIY+oitJPpRQ=="
- },
"fd-slicer": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/fd-slicer/-/fd-slicer-1.1.0.tgz",
@@ -7121,9 +5903,9 @@
"integrity": "sha512-0btnI/H8f2pavGMN8w40mlSKOfTK2SVJmBfBeVIj3kNw0swwgzyRq0d5TJVOwodFmtvpPeWPN/MCcfuWF0Ezbw=="
},
"figures": {
- "version": "3.1.0",
- "resolved": "https://registry.npmjs.org/figures/-/figures-3.1.0.tgz",
- "integrity": "sha512-ravh8VRXqHuMvZt/d8GblBeqDMkdJMBdv/2KntFH+ra5MXkO7nxNKpzQ3n6QD/2da1kH0aWmNISdvhM7gl2gVg==",
+ "version": "3.2.0",
+ "resolved": "https://registry.npmjs.org/figures/-/figures-3.2.0.tgz",
+ "integrity": "sha512-yaduQFRKLXYOGgEn6AZau90j3ggSOyiqXU0F9JZfeXYhNa+Jk4X+s45A2zg5jns87GAFa34BBm2kXw4XpNcbdg==",
"requires": {
"escape-string-regexp": "^1.0.5"
}
@@ -7156,6 +5938,14 @@
"integrity": "sha512-0Zt+s3L7Vf1biwWZ29aARiVYLx7iMGnEUl9x33fbB/j3jR81u/O2LbqK+Bm1CDSNDKVtJ/YjwY7TUd5SkeLQLw==",
"optional": true
},
+ "filelist": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/filelist/-/filelist-1.0.1.tgz",
+ "integrity": "sha512-8zSK6Nu0DQIC08mUC46sWGXi+q3GGpKydAG36k+JDba6VRpkevvOWUW5a/PhShij4+vHT9M+ghgG7eM+a9JDUQ==",
+ "requires": {
+ "minimatch": "^3.0.4"
+ }
+ },
"filename-reserved-regex": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/filename-reserved-regex/-/filename-reserved-regex-2.0.0.tgz",
@@ -7177,24 +5967,11 @@
"integrity": "sha512-7KjR1vv6qnicaPMi1iiTcI85CyYwRO/PSFCu6SvqL8jN2Wjt/NIYQTFtFs7fSDCYOstUkEWIQGFUg5YZQfjlcg=="
},
"fill-range": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-4.0.0.tgz",
- "integrity": "sha1-1USBHUKPmOsGpj3EAtJAPDKMOPc=",
+ "version": "7.0.1",
+ "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.0.1.tgz",
+ "integrity": "sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==",
"requires": {
- "extend-shallow": "^2.0.1",
- "is-number": "^3.0.0",
- "repeat-string": "^1.6.1",
- "to-regex-range": "^2.1.0"
- },
- "dependencies": {
- "extend-shallow": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
- "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
- "requires": {
- "is-extendable": "^0.1.0"
- }
- }
+ "to-regex-range": "^5.0.1"
}
},
"finalhandler": {
@@ -7218,83 +5995,40 @@
"requires": {
"ms": "2.0.0"
}
- },
- "ms": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
- "integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
}
}
},
- "finally-polyfill": {
- "version": "0.1.0",
- "resolved": "https://registry.npmjs.org/finally-polyfill/-/finally-polyfill-0.1.0.tgz",
- "integrity": "sha512-J1LEcZ5VXe1l3sEO+S//WqL5wcJ/ep7QeKJA6HhNZrcEEFj0eyC8IW3DEZhxySI2bx3r85dwAXz+vYPGuHx5UA=="
- },
"find-cache-dir": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/find-cache-dir/-/find-cache-dir-1.0.0.tgz",
- "integrity": "sha1-kojj6ePMN0hxfTnq3hfPcfww7m8=",
+ "version": "3.3.1",
+ "resolved": "https://registry.npmjs.org/find-cache-dir/-/find-cache-dir-3.3.1.tgz",
+ "integrity": "sha512-t2GDMt3oGC/v+BMwzmllWDuJF/xcDtE5j/fCGbqDD7OLuJkj0cfh1YSA5VKPvwMeLFLNDBkwOKZ2X85jGLVftQ==",
"requires": {
"commondir": "^1.0.1",
- "make-dir": "^1.0.0",
- "pkg-dir": "^2.0.0"
+ "make-dir": "^3.0.2",
+ "pkg-dir": "^4.1.0"
},
"dependencies": {
- "find-up": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/find-up/-/find-up-2.1.0.tgz",
- "integrity": "sha1-RdG35QbHF93UgndaK3eSCjwMV6c=",
- "requires": {
- "locate-path": "^2.0.0"
- }
- },
- "locate-path": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-2.0.0.tgz",
- "integrity": "sha1-K1aLJl7slExtnA3pw9u7ygNUzY4=",
- "requires": {
- "p-locate": "^2.0.0",
- "path-exists": "^3.0.0"
- }
- },
- "p-limit": {
- "version": "1.3.0",
- "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-1.3.0.tgz",
- "integrity": "sha512-vvcXsLAJ9Dr5rQOPk7toZQZJApBl2K4J6dANSsEuh6QI41JYcsS/qhTGa9ErIUUgK3WNQoJYvylxvjqmiqEA9Q==",
- "requires": {
- "p-try": "^1.0.0"
- }
- },
- "p-locate": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-2.0.0.tgz",
- "integrity": "sha1-IKAQOyIqcMj9OcwuWAaA893l7EM=",
+ "make-dir": {
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/make-dir/-/make-dir-3.1.0.tgz",
+ "integrity": "sha512-g3FeP20LNwhALb/6Cz6Dd4F2ngze0jz7tbzrD2wAV+o9FeNHe4rL+yK2md0J/fiSf1sa1ADhXqi5+oVwOM/eGw==",
"requires": {
- "p-limit": "^1.1.0"
+ "semver": "^6.0.0"
}
},
- "p-try": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/p-try/-/p-try-1.0.0.tgz",
- "integrity": "sha1-y8ec26+P1CKOE/Yh8rGiN8GyB7M="
- },
- "pkg-dir": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/pkg-dir/-/pkg-dir-2.0.0.tgz",
- "integrity": "sha1-9tXREJ4Z1j7fQo4L1X4Sd3YVM0s=",
- "requires": {
- "find-up": "^2.1.0"
- }
+ "semver": {
+ "version": "6.3.0",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
+ "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
}
}
},
"find-up": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/find-up/-/find-up-3.0.0.tgz",
- "integrity": "sha512-1yD6RmLI1XBfxugvORwlck6f75tYL+iR0jqwsOrOxMZyGYqUuDhJ0l4AXdO1iX/FTs9cBAMEk1gWSEx1kSbylg==",
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/find-up/-/find-up-2.1.0.tgz",
+ "integrity": "sha1-RdG35QbHF93UgndaK3eSCjwMV6c=",
"requires": {
- "locate-path": "^3.0.0"
+ "locate-path": "^2.0.0"
}
},
"find-versions": {
@@ -7316,9 +6050,9 @@
}
},
"flatted": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/flatted/-/flatted-2.0.1.tgz",
- "integrity": "sha512-a1hQMktqW9Nmqr5aktAux3JMNqaucxGcjtjWnZLHX7yyPCmlSV3M54nGYbqT8K+0GhF3NBgmJCc3ma+WOgX8Jg=="
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/flatted/-/flatted-2.0.2.tgz",
+ "integrity": "sha512-r5wGx7YeOwNWNlCA0wQ86zKyDLMQr+/RB8xy74M4hTphfmjlijTSSXGuH8rnvKZnfT9i+75zmd8jcKdMR4O6jA=="
},
"flatten": {
"version": "1.0.3",
@@ -7349,11 +6083,6 @@
"requires": {
"ms": "2.0.0"
}
- },
- "ms": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
- "integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
}
}
},
@@ -7377,33 +6106,142 @@
"worker-rpc": "^0.1.0"
},
"dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
+ "braces": {
+ "version": "2.3.2",
+ "resolved": "https://registry.npmjs.org/braces/-/braces-2.3.2.tgz",
+ "integrity": "sha512-aNdbnj9P8PjdXU4ybaWLK2IF3jc/EoDYbC7AazW6to3TRsfXxscC9UXOB5iDiEQrkyIbWp2SLQda4+QAa7nc3w==",
+ "requires": {
+ "arr-flatten": "^1.1.0",
+ "array-unique": "^0.3.2",
+ "extend-shallow": "^2.0.1",
+ "fill-range": "^4.0.0",
+ "isobject": "^3.0.1",
+ "repeat-element": "^1.1.2",
+ "snapdragon": "^0.8.1",
+ "snapdragon-node": "^2.0.1",
+ "split-string": "^3.0.2",
+ "to-regex": "^3.0.1"
+ },
+ "dependencies": {
+ "extend-shallow": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
+ "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
+ "requires": {
+ "is-extendable": "^0.1.0"
+ }
+ }
+ }
+ },
+ "chalk": {
+ "version": "2.4.2",
+ "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
+ "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
+ "requires": {
"ansi-styles": "^3.2.1",
"escape-string-regexp": "^1.0.5",
"supports-color": "^5.3.0"
}
+ },
+ "extend-shallow": {
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-3.0.2.tgz",
+ "integrity": "sha1-Jqcarwc7OfshJxcnRhMcJwQCjbg=",
+ "requires": {
+ "assign-symbols": "^1.0.0",
+ "is-extendable": "^1.0.1"
+ },
+ "dependencies": {
+ "is-extendable": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/is-extendable/-/is-extendable-1.0.1.tgz",
+ "integrity": "sha512-arnXMxT1hhoKo9k1LZdmlNyJdDDfy2v0fXjFlmok4+i8ul/6WlbVge9bhM74OpNPQPMGUToDtz+KXa1PneJxOA==",
+ "requires": {
+ "is-plain-object": "^2.0.4"
+ }
+ }
+ }
+ },
+ "fill-range": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-4.0.0.tgz",
+ "integrity": "sha1-1USBHUKPmOsGpj3EAtJAPDKMOPc=",
+ "requires": {
+ "extend-shallow": "^2.0.1",
+ "is-number": "^3.0.0",
+ "repeat-string": "^1.6.1",
+ "to-regex-range": "^2.1.0"
+ },
+ "dependencies": {
+ "extend-shallow": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
+ "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
+ "requires": {
+ "is-extendable": "^0.1.0"
+ }
+ }
+ }
+ },
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ },
+ "is-number": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/is-number/-/is-number-3.0.0.tgz",
+ "integrity": "sha1-JP1iAaR4LPUFYcgQJ2r8fRLXEZU=",
+ "requires": {
+ "kind-of": "^3.0.2"
+ },
+ "dependencies": {
+ "kind-of": {
+ "version": "3.2.2",
+ "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
+ "integrity": "sha1-MeohpzS6ubuw8yRm2JOupR5KPGQ=",
+ "requires": {
+ "is-buffer": "^1.1.5"
+ }
+ }
+ }
+ },
+ "micromatch": {
+ "version": "3.1.10",
+ "resolved": "https://registry.npmjs.org/micromatch/-/micromatch-3.1.10.tgz",
+ "integrity": "sha512-MWikgl9n9M3w+bpsY3He8L+w9eF9338xRl8IAO5viDizwSzziFEyUzo2xrrloB64ADbTf8uA8vRqqttDTOmccg==",
+ "requires": {
+ "arr-diff": "^4.0.0",
+ "array-unique": "^0.3.2",
+ "braces": "^2.3.1",
+ "define-property": "^2.0.2",
+ "extend-shallow": "^3.0.2",
+ "extglob": "^2.0.4",
+ "fragment-cache": "^0.2.1",
+ "kind-of": "^6.0.2",
+ "nanomatch": "^1.2.9",
+ "object.pick": "^1.3.0",
+ "regex-not": "^1.0.0",
+ "snapdragon": "^0.8.1",
+ "to-regex": "^3.0.2"
+ }
+ },
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ },
+ "to-regex-range": {
+ "version": "2.1.1",
+ "resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-2.1.1.tgz",
+ "integrity": "sha1-fIDBe53+vlmeJzZ+DU3VWQFB2zg=",
+ "requires": {
+ "is-number": "^3.0.0",
+ "repeat-string": "^1.6.1"
+ }
}
}
},
- "form-data": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/form-data/-/form-data-3.0.0.tgz",
- "integrity": "sha512-CKMFDglpbMi6PyN+brwB9Q/GOw0eAnsrEZDgcsH5Krhz5Od/haKHAX0NmQfha2zPPz0JpWzA7GJHGSnvCRLWsg==",
- "requires": {
- "asynckit": "^0.4.0",
- "combined-stream": "^1.0.8",
- "mime-types": "^2.1.12"
- }
- },
- "format": {
- "version": "0.2.2",
- "resolved": "https://registry.npmjs.org/format/-/format-0.2.2.tgz",
- "integrity": "sha1-1hcBB+nv3E7TDJ3DkBbflCtctYs="
- },
"formik": {
"version": "1.5.8",
"resolved": "https://registry.npmjs.org/formik/-/formik-1.5.8.tgz",
@@ -7418,13 +6256,6 @@
"react-fast-compare": "^2.0.1",
"tiny-warning": "^1.0.2",
"tslib": "^1.9.3"
- },
- "dependencies": {
- "deepmerge": {
- "version": "2.2.1",
- "resolved": "https://registry.npmjs.org/deepmerge/-/deepmerge-2.2.1.tgz",
- "integrity": "sha512-R9hc1Xa/NOBi9WRVUWg19rl1UB7Tt4kuPd+thNJgFZoxXsTz7ncaPaeIm+40oSGuP33DfMb4sZt1QIGiJzC4EA=="
- }
}
},
"forwarded": {
@@ -7487,9 +6318,9 @@
"integrity": "sha1-FQStJSMVjKpA20onh8sBQRmU6k8="
},
"fsevents": {
- "version": "2.1.2",
- "resolved": "https://registry.npmjs.org/fsevents/-/fsevents-2.1.2.tgz",
- "integrity": "sha512-R4wDiBwZ0KzpgOWetKDug1FZcYhqYnUYKtfZYt4mD5SBz76q0KR4Q9o7GIPamsVPGmW3EYPPJ0dOOjvx32ldZA==",
+ "version": "2.1.3",
+ "resolved": "https://registry.npmjs.org/fsevents/-/fsevents-2.1.3.tgz",
+ "integrity": "sha512-Auw9a4AxqWpa9GUfj370BMPzzyncfBABW8Mab7BGWBYDj4Isgq+cDKtx0i6u9jcX9pQDnswsaaOTgTmA5pEjuQ==",
"optional": true
},
"function-bind": {
@@ -7541,9 +6372,9 @@
"integrity": "sha512-jp4tHawyV7+fkkSKyvjuLZswblUtz+SQKzSWnBbii16BuZksJlU1wuBYXY75r+duh/llF1ur6oNwi+2ZzjKZ7g=="
},
"get-stream": {
- "version": "4.1.0",
- "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-4.1.0.tgz",
- "integrity": "sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w==",
+ "version": "5.1.0",
+ "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-5.1.0.tgz",
+ "integrity": "sha512-EXr1FOzrzTfGeL0gQdeFEvOMm2mzMOglyiOXSTpPC+iAjAKftbr3jpCMWynogwYnM+eSj9sHGc6wjIcDvYiygw==",
"requires": {
"pump": "^3.0.0"
}
@@ -7559,13 +6390,6 @@
"integrity": "sha512-gwJScWVNhFYSRDvURk/8yhcFBee6aFjye2a7Lhb2bUyRulpIoek9p0I9Kt7PT67d/nUlZbFu8L9RLiA0woQN8Q==",
"requires": {
"emoji-regex": ">=6.0.0 <=6.1.1"
- },
- "dependencies": {
- "emoji-regex": {
- "version": "6.1.1",
- "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-6.1.1.tgz",
- "integrity": "sha1-xs0OwbBkLio8Z6ETfvxeeW2k+I4="
- }
}
},
"glob": {
@@ -7582,22 +6406,11 @@
}
},
"glob-parent": {
- "version": "3.1.0",
- "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz",
- "integrity": "sha1-nmr2KZ2NO9K9QEMIMr0RPfkGxa4=",
+ "version": "5.1.1",
+ "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz",
+ "integrity": "sha512-FnI+VGOpnlGHWZxthPGR+QhR78fuiK0sNLkHQv+bL9fQi57lNNdquIbna/WrfROrolq8GK5Ek6BiMwqL/voRYQ==",
"requires": {
- "is-glob": "^3.1.0",
- "path-dirname": "^1.0.0"
- },
- "dependencies": {
- "is-glob": {
- "version": "3.1.0",
- "resolved": "https://registry.npmjs.org/is-glob/-/is-glob-3.1.0.tgz",
- "integrity": "sha1-e6WuJCF4BKxwcHuWkiVnSGzD6Eo=",
- "requires": {
- "is-extglob": "^2.1.0"
- }
- }
+ "is-glob": "^4.0.1"
}
},
"glob-to-regexp": {
@@ -7611,91 +6424,40 @@
"integrity": "sha512-WOBp/EEGUiIsJSp7wcv/y6MO+lV9UoncWqxuFfm8eBwzWNgyfBd6Gz+IeKQ9jCmyhoH99g15M3T+QaVHFjizVA=="
},
"globby": {
- "version": "10.0.1",
- "resolved": "https://registry.npmjs.org/globby/-/globby-10.0.1.tgz",
- "integrity": "sha512-sSs4inE1FB2YQiymcmTv6NWENryABjUNPeWhOvmn4SjtKybglsyPZxFB3U1/+L1bYi0rNZDqCLlHyLYDl1Pq5A==",
- "requires": {
- "@types/glob": "^7.1.1",
- "array-union": "^2.1.0",
- "dir-glob": "^3.0.1",
- "fast-glob": "^3.0.3",
- "glob": "^7.1.3",
- "ignore": "^5.1.1",
- "merge2": "^1.2.3",
- "slash": "^3.0.0"
+ "version": "8.0.2",
+ "resolved": "https://registry.npmjs.org/globby/-/globby-8.0.2.tgz",
+ "integrity": "sha512-yTzMmKygLp8RUpG1Ymu2VXPSJQZjNAZPD4ywgYEaG7e4tBJeUQBO8OpXrf1RCNcEs5alsoJYPAMiIHP0cmeC7w==",
+ "requires": {
+ "array-union": "^1.0.1",
+ "dir-glob": "2.0.0",
+ "fast-glob": "^2.0.2",
+ "glob": "^7.1.2",
+ "ignore": "^3.3.5",
+ "pify": "^3.0.0",
+ "slash": "^1.0.0"
},
"dependencies": {
- "@nodelib/fs.stat": {
- "version": "2.0.3",
- "resolved": "https://registry.npmjs.org/@nodelib/fs.stat/-/fs.stat-2.0.3.tgz",
- "integrity": "sha512-bQBFruR2TAwoevBEd/NWMoAAtNGzTRgdrqnYCc7dhzfoNvqPzLyqlEQnzZ3kVnNrSp25iyxE00/3h2fqGAGArA=="
- },
- "braces": {
- "version": "3.0.2",
- "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.2.tgz",
- "integrity": "sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==",
- "requires": {
- "fill-range": "^7.0.1"
- }
- },
- "fast-glob": {
- "version": "3.2.2",
- "resolved": "https://registry.npmjs.org/fast-glob/-/fast-glob-3.2.2.tgz",
- "integrity": "sha512-UDV82o4uQyljznxwMxyVRJgZZt3O5wENYojjzbaGEGZgeOxkLFf+V4cnUD+krzb2F72E18RhamkMZ7AdeggF7A==",
- "requires": {
- "@nodelib/fs.stat": "^2.0.2",
- "@nodelib/fs.walk": "^1.2.3",
- "glob-parent": "^5.1.0",
- "merge2": "^1.3.0",
- "micromatch": "^4.0.2",
- "picomatch": "^2.2.1"
- }
- },
- "fill-range": {
- "version": "7.0.1",
- "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.0.1.tgz",
- "integrity": "sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==",
- "requires": {
- "to-regex-range": "^5.0.1"
- }
- },
- "glob-parent": {
- "version": "5.1.1",
- "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz",
- "integrity": "sha512-FnI+VGOpnlGHWZxthPGR+QhR78fuiK0sNLkHQv+bL9fQi57lNNdquIbna/WrfROrolq8GK5Ek6BiMwqL/voRYQ==",
- "requires": {
- "is-glob": "^4.0.1"
- }
- },
"ignore": {
- "version": "5.1.4",
- "resolved": "https://registry.npmjs.org/ignore/-/ignore-5.1.4.tgz",
- "integrity": "sha512-MzbUSahkTW1u7JpKKjY7LCARd1fU5W2rLdxlM4kdkayuCwZImjkpluF9CM1aLewYJguPDqewLam18Y6AU69A8A=="
- },
- "is-number": {
- "version": "7.0.0",
- "resolved": "https://registry.npmjs.org/is-number/-/is-number-7.0.0.tgz",
- "integrity": "sha512-41Cifkg6e8TylSpdtTpeLVMqvSBEVzTttHvERD741+pnZ8ANv0004MRL43QKPDlK9cGvNp6NZWZUBlbGXYxxng=="
- },
- "micromatch": {
- "version": "4.0.2",
- "resolved": "https://registry.npmjs.org/micromatch/-/micromatch-4.0.2.tgz",
- "integrity": "sha512-y7FpHSbMUMoyPbYUSzO6PaZ6FyRnQOpHuKwbo1G+Knck95XVU4QAiKdGEnj5wwoS7PlOgthX/09u5iFJ+aYf5Q==",
- "requires": {
- "braces": "^3.0.1",
- "picomatch": "^2.0.5"
- }
+ "version": "3.3.10",
+ "resolved": "https://registry.npmjs.org/ignore/-/ignore-3.3.10.tgz",
+ "integrity": "sha512-Pgs951kaMm5GXP7MOvxERINe3gsaVjUWFm+UZPSq9xYriQAksyhg0csnS0KXSNRD5NmNdapXEpjxG49+AKh/ug=="
},
- "to-regex-range": {
- "version": "5.0.1",
- "resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-5.0.1.tgz",
- "integrity": "sha512-65P7iz6X5yEr1cwcgvQxbbIw7Uk3gOy5dIdtZ4rDveLqhrdJP+Li/Hx6tyK0NEb+2GCyneCMJiGqrADCSNk8sQ==",
- "requires": {
- "is-number": "^7.0.0"
- }
+ "pify": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz",
+ "integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY="
}
}
},
+ "good-listener": {
+ "version": "1.2.2",
+ "resolved": "https://registry.npmjs.org/good-listener/-/good-listener-1.2.2.tgz",
+ "integrity": "sha1-1TswzfkxPf+33JoNR3CWqm0UXFA=",
+ "optional": true,
+ "requires": {
+ "delegate": "^3.1.2"
+ }
+ },
"got": {
"version": "9.6.0",
"resolved": "https://registry.npmjs.org/got/-/got-9.6.0.tgz",
@@ -7712,12 +6474,22 @@
"p-cancelable": "^1.0.0",
"to-readable-stream": "^1.0.0",
"url-parse-lax": "^3.0.0"
+ },
+ "dependencies": {
+ "get-stream": {
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-4.1.0.tgz",
+ "integrity": "sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w==",
+ "requires": {
+ "pump": "^3.0.0"
+ }
+ }
}
},
"graceful-fs": {
- "version": "4.2.3",
- "resolved": "https://registry.npmjs.org/graceful-fs/-/graceful-fs-4.2.3.tgz",
- "integrity": "sha512-a30VEBm4PEdx1dRB7MFK7BejejvCvBronbLjht+sHuGYj8PHs7M/5Z+rt5lw551vZ7yfTCj4Vuyy3mSJytDWRQ=="
+ "version": "4.2.4",
+ "resolved": "https://registry.npmjs.org/graceful-fs/-/graceful-fs-4.2.4.tgz",
+ "integrity": "sha512-WjKPNJF79dtJAVniUlGGWHYGz2jWxT6VhN/4m1NdkbZ2nOsEF+cI1Edgql5zCRhs/VsQYRvrXctxktVXZUkixw=="
},
"graceful-readlink": {
"version": "1.0.1",
@@ -7732,22 +6504,6 @@
"iterall": "^1.2.2"
}
},
- "graphql-import": {
- "version": "0.7.1",
- "resolved": "https://registry.npmjs.org/graphql-import/-/graphql-import-0.7.1.tgz",
- "integrity": "sha512-YpwpaPjRUVlw2SN3OPljpWbVRWAhMAyfSba5U47qGMOSsPLi2gYeJtngGpymjm9nk57RFWEpjqwh4+dpYuFAPw==",
- "requires": {
- "lodash": "^4.17.4",
- "resolve-from": "^4.0.0"
- },
- "dependencies": {
- "resolve-from": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-4.0.0.tgz",
- "integrity": "sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g=="
- }
- }
- },
"graphql-request": {
"version": "1.8.2",
"resolved": "https://registry.npmjs.org/graphql-request/-/graphql-request-1.8.2.tgz",
@@ -7756,83 +6512,6 @@
"cross-fetch": "2.2.2"
}
},
- "graphql-tag": {
- "version": "2.10.3",
- "resolved": "https://registry.npmjs.org/graphql-tag/-/graphql-tag-2.10.3.tgz",
- "integrity": "sha512-4FOv3ZKfA4WdOKJeHdz6B3F/vxBLSgmBcGeAFPf4n1F64ltJUvOOerNj0rsJxONQGdhUMynQIvd6LzB+1J5oKA=="
- },
- "graphql-tag-pluck": {
- "version": "0.8.7",
- "resolved": "https://registry.npmjs.org/graphql-tag-pluck/-/graphql-tag-pluck-0.8.7.tgz",
- "integrity": "sha512-yuWcQislvBPHorFQzmZ9/yY0nPD1rn1kBNOr6iPXzT+iJ/i/pciq8Z7ilnVJAGKaJXV58ovD+AWWYYjX6IFF9g==",
- "requires": {
- "@babel/parser": "^7.4.4",
- "@babel/traverse": "^7.4.4",
- "@babel/types": "^7.4.4",
- "source-map-support": "^0.5.12"
- }
- },
- "graphql-toolkit": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/graphql-toolkit/-/graphql-toolkit-0.7.5.tgz",
- "integrity": "sha512-8fagZhEP+bygbcW9uhYIzR7BVZLtobCJmO26fgbqJcnRqsFuclSg2fcrNJbeSGjefrEWHnFcgYcQehbSE8oW9g==",
- "requires": {
- "@graphql-toolkit/code-file-loader": "0.7.5",
- "@graphql-toolkit/common": "0.7.5",
- "@graphql-toolkit/core": "0.7.5",
- "@graphql-toolkit/file-loading": "0.7.5",
- "@graphql-toolkit/graphql-file-loader": "0.7.5",
- "@graphql-toolkit/json-file-loader": "0.7.5",
- "@graphql-toolkit/schema-merging": "0.7.5",
- "@graphql-toolkit/url-loader": "0.7.5"
- },
- "dependencies": {
- "@graphql-toolkit/common": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.7.5.tgz",
- "integrity": "sha512-pu7tKY6KW7+4noJQPCbIxKzv54tSl/FME9wU0rNSwcr4O3By+pv7VCYXxkhCSnftJcXsXAuAcdjcV2CBsjnZNg==",
- "requires": {
- "@kamilkisiela/graphql-tools": "4.0.6",
- "aggregate-error": "3.0.1",
- "is-glob": "4.0.1",
- "lodash": "4.17.15"
- }
- },
- "@graphql-toolkit/schema-merging": {
- "version": "0.7.5",
- "resolved": "https://registry.npmjs.org/@graphql-toolkit/schema-merging/-/schema-merging-0.7.5.tgz",
- "integrity": "sha512-6HJb0bFqkJn45MMWLpt1K0kPJlbyGUaXFuBMY+yQ6fr70U01VjWc/RpXm9JO9FzlpzmtaMGd2HcsWC+7mAddtg==",
- "requires": {
- "@graphql-toolkit/common": "0.7.5",
- "@kamilkisiela/graphql-tools": "4.0.6",
- "deepmerge": "4.2.2",
- "tslib": "1.10.0"
- }
- }
- }
- },
- "graphql-tools-fork": {
- "version": "8.9.6",
- "resolved": "https://registry.npmjs.org/graphql-tools-fork/-/graphql-tools-fork-8.9.6.tgz",
- "integrity": "sha512-hkhzIuN63/6zzJ/qzz6mGPOywhjvz06v1QBs6cUVa+UQ7tlzuzOkxRf2i7TqFOM3igK0vMCk3MTXx5iU/G8zEg==",
- "requires": {
- "apollo-link": "^1.2.13",
- "apollo-link-http-common": "^0.2.15",
- "deprecated-decorator": "^0.1.6",
- "extract-files": "^7.0.0",
- "form-data": "^3.0.0",
- "iterall": "^1.3.0",
- "node-fetch": "^2.6.0",
- "uuid": "^7.0.1"
- },
- "dependencies": {
- "uuid": {
- "version": "7.0.2",
- "resolved": "https://registry.npmjs.org/uuid/-/uuid-7.0.2.tgz",
- "integrity": "sha512-vy9V/+pKG+5ZTYKf+VcphF5Oc6EFiu3W8Nv3P3zIh0EqVI80ZxOzuPfe9EHjkFNvf8+xuTHVeei4Drydlx4zjw=="
- }
- }
- },
"gray-matter": {
"version": "4.0.2",
"resolved": "https://registry.npmjs.org/gray-matter/-/gray-matter-4.0.2.tgz",
@@ -7867,13 +6546,6 @@
"optimist": "^0.6.1",
"source-map": "^0.6.1",
"uglify-js": "^3.1.4"
- },
- "dependencies": {
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- }
}
},
"has": {
@@ -7890,13 +6562,6 @@
"integrity": "sha1-NPUEnOHs3ysGSa8+8k5F7TVBbZE=",
"requires": {
"ansi-regex": "^2.0.0"
- },
- "dependencies": {
- "ansi-regex": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz",
- "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8="
- }
}
},
"has-flag": {
@@ -7941,6 +6606,29 @@
"kind-of": "^4.0.0"
},
"dependencies": {
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ },
+ "is-number": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/is-number/-/is-number-3.0.0.tgz",
+ "integrity": "sha1-JP1iAaR4LPUFYcgQJ2r8fRLXEZU=",
+ "requires": {
+ "kind-of": "^3.0.2"
+ },
+ "dependencies": {
+ "kind-of": {
+ "version": "3.2.2",
+ "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
+ "integrity": "sha1-MeohpzS6ubuw8yRm2JOupR5KPGQ=",
+ "requires": {
+ "is-buffer": "^1.1.5"
+ }
+ }
+ }
+ },
"kind-of": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-4.0.0.tgz",
@@ -7952,12 +6640,30 @@
}
},
"hash-base": {
- "version": "3.0.4",
- "resolved": "https://registry.npmjs.org/hash-base/-/hash-base-3.0.4.tgz",
- "integrity": "sha1-X8hoaEfs1zSZQDMZprCj8/auSRg=",
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/hash-base/-/hash-base-3.1.0.tgz",
+ "integrity": "sha512-1nmYp/rhMDiE7AYkDw+lLwlAzz0AntGIe51F3RfFfEqyQ3feY2eI/NcwC6umIQVOASPMsWJLJScWKSSvzL9IVA==",
"requires": {
- "inherits": "^2.0.1",
- "safe-buffer": "^5.0.1"
+ "inherits": "^2.0.4",
+ "readable-stream": "^3.6.0",
+ "safe-buffer": "^5.2.0"
+ },
+ "dependencies": {
+ "readable-stream": {
+ "version": "3.6.0",
+ "resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-3.6.0.tgz",
+ "integrity": "sha512-BViHy7LKeTz4oNnkcLJ+lVSL6vpiFeX6/d3oSH8zCW7UxP2onchk+vTGB143xuFjHS3deTgkKoXXymXqymiIdA==",
+ "requires": {
+ "inherits": "^2.0.3",
+ "string_decoder": "^1.1.1",
+ "util-deprecate": "^1.0.1"
+ }
+ },
+ "safe-buffer": {
+ "version": "5.2.1",
+ "resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.1.tgz",
+ "integrity": "sha512-rp3So07KcdmmKbGvgaNxQSJr7bGVSVk5S9Eq1F+ppbRo70+YeaDxkw5Dd8NPN+GD6bjnYm2VuPuCXmpuYvmCXQ=="
+ }
}
},
"hash.js": {
@@ -8009,11 +6715,6 @@
"xtend": "^4.0.1"
}
},
- "hast-util-is-element": {
- "version": "1.0.4",
- "resolved": "https://registry.npmjs.org/hast-util-is-element/-/hast-util-is-element-1.0.4.tgz",
- "integrity": "sha512-NFR6ljJRvDcyPP5SbV7MyPBgF47X3BsskLnmw1U34yL+X6YC0MoBx9EyMg8Jtx4FzGH95jw8+c1VPLHaRA0wDQ=="
- },
"hast-util-parse-selector": {
"version": "2.2.4",
"resolved": "https://registry.npmjs.org/hast-util-parse-selector/-/hast-util-parse-selector-2.2.4.tgz",
@@ -8046,15 +6747,10 @@
"zwitch": "^1.0.0"
}
},
- "hast-util-to-text": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/hast-util-to-text/-/hast-util-to-text-2.0.0.tgz",
- "integrity": "sha512-idXqFGmKInLKcFMbLvh0fldmV94o+aOdXL/z5H5XhPhUp/5vzycu7i15c8V9kC6W3XgGHg2uuiIcRJlWtESVfQ==",
- "requires": {
- "hast-util-is-element": "^1.0.0",
- "repeat-string": "^1.0.0",
- "unist-util-find-after": "^3.0.0"
- }
+ "hast-util-to-string": {
+ "version": "1.0.3",
+ "resolved": "https://registry.npmjs.org/hast-util-to-string/-/hast-util-to-string-1.0.3.tgz",
+ "integrity": "sha512-3lDgDE5OdpTfP3aFeKRWEwdIZ4vprztvp+AoD+RhF7uGOBs1yBDWZFadxnjcUV4KCoI3vB9A7gdFO98hEXA90w=="
},
"hastscript": {
"version": "5.1.2",
@@ -8067,11 +6763,10 @@
"space-separated-tokens": "^1.0.0"
}
},
- "he": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/he/-/he-1.2.0.tgz",
- "integrity": "sha512-F/1DnUGPopORZi0ni+CvrCgHQ5FyEAHRLSApuYWMmrbSwoN2Mn/7k+Gl38gJnR7yyDZk6WLXwiGod1JOWNDKGw==",
- "optional": true
+ "hex-color-regex": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/hex-color-regex/-/hex-color-regex-1.1.0.tgz",
+ "integrity": "sha512-l9sfDFsuqtOqKDsQdqrMRk0U85RZc0RtOR9yPI7mRVOa4FsR/BVnZ0shmQRM96Ji99kYZP/7hn1cedc1+ApsTQ=="
},
"highlight.js": {
"version": "9.18.1",
@@ -8089,9 +6784,9 @@
}
},
"hoist-non-react-statics": {
- "version": "3.3.1",
- "resolved": "https://registry.npmjs.org/hoist-non-react-statics/-/hoist-non-react-statics-3.3.1.tgz",
- "integrity": "sha512-wbg3bpgA/ZqWrZuMOeJi8+SKMhr7X9TesL/rXMjTzh0p0JUBo3II8DHboYbuIXWRlttrUFxwcu/5kygrCw8fJw==",
+ "version": "3.3.2",
+ "resolved": "https://registry.npmjs.org/hoist-non-react-statics/-/hoist-non-react-statics-3.3.2.tgz",
+ "integrity": "sha512-/gGivxi8JPKWNm/W0jSmzcMPpfpPLc3dY/6GxhX2hQ9iGj3aDfklV4ET7NjKpSinLpJ5vafa9iiGIEZg10SfBw==",
"requires": {
"react-is": "^16.7.0"
}
@@ -8102,20 +6797,25 @@
"integrity": "sha512-HRcs+2mr52W0K+x8RzcLzuPPmVIKMSv97RGHy0Ea9y/mpcaK+xTrjICA04KAHi4GRzxliNqNJEFYWHghy3rSfQ=="
},
"hosted-git-info": {
- "version": "2.8.5",
- "resolved": "https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.8.5.tgz",
- "integrity": "sha512-kssjab8CvdXfcXMXVcvsXum4Hwdq9XGtRD3TteMEvEbq0LXyiNQr6AprqKqfeaDXze7SxWvRxdpwE6ku7ikLkg=="
+ "version": "2.8.8",
+ "resolved": "https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.8.8.tgz",
+ "integrity": "sha512-f/wzC2QaWBs7t9IYqB4T3sR1xviIViXJRJTWBlx2Gf3g0Xi5vI7Yy4koXQ1c9OYDGHN9sBy1DQ2AB8fqZBWhUg=="
+ },
+ "hsl-regex": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/hsl-regex/-/hsl-regex-1.0.0.tgz",
+ "integrity": "sha1-1JMwx4ntgZ4nakwNJy3/owsY/m4="
+ },
+ "hsla-regex": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/hsla-regex/-/hsla-regex-1.0.0.tgz",
+ "integrity": "sha1-wc56MWjIxmFAM6S194d/OyJfnDg="
},
"html-comment-regex": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/html-comment-regex/-/html-comment-regex-1.1.2.tgz",
"integrity": "sha512-P+M65QY2JQ5Y0G9KKdlDpo0zK+/OHptU5AaBwUfAIDJZk1MYf32Frm84EcOytfJE0t5JvkAnKlmjsXDnWzCJmQ=="
},
- "html-entities": {
- "version": "1.2.1",
- "resolved": "https://registry.npmjs.org/html-entities/-/html-entities-1.2.1.tgz",
- "integrity": "sha1-DfKTUfByEWNRXfueVUPl9u7VFi8="
- },
"html-void-elements": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/html-void-elements/-/html-void-elements-1.0.5.tgz",
@@ -8138,9 +6838,9 @@
"integrity": "sha512-5HOHUDsYZWV8FGWN0Njbr/Rn7f/eWSQi1v7+HsUVwXgn8nWWlL64zKDkS0n8ZmQ3mlWOMuXOnR+7Nx/5tMO5AQ=="
},
"domutils": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/domutils/-/domutils-2.0.0.tgz",
- "integrity": "sha512-n5SelJ1axbO636c2yUtOGia/IcJtVtlhQbFiVDBZHKV5ReJO1ViX7sFEemtuyoAnBxk5meNSYgA8V4s0271efg==",
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/domutils/-/domutils-2.1.0.tgz",
+ "integrity": "sha512-CD9M0Dm1iaHfQ1R/TI+z3/JWp/pgub0j4jIQKH89ARR4ATAV2nbaOQS5XxU9maJP5jHaPdDDQSEHuE2UmpUTKg==",
"requires": {
"dom-serializer": "^0.2.1",
"domelementtype": "^2.0.1",
@@ -8173,16 +6873,6 @@
}
}
},
- "http-proxy": {
- "version": "1.18.0",
- "resolved": "https://registry.npmjs.org/http-proxy/-/http-proxy-1.18.0.tgz",
- "integrity": "sha512-84I2iJM/n1d4Hdgc6y2+qY5mDaz2PUVjlg9znE9byl+q0uC3DeByqBGReQu5tpLK0TAqTIXScRUV+dg7+bUPpQ==",
- "requires": {
- "eventemitter3": "^4.0.0",
- "follow-redirects": "^1.0.0",
- "requires-port": "^1.0.0"
- }
- },
"https-browserify": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/https-browserify/-/https-browserify-1.0.0.tgz",
@@ -8194,13 +6884,14 @@
"integrity": "sha512-SEQu7vl8KjNL2eoGBLF3+wAjpsNfA9XMlXAYj/3EdaNfAlxKthD1xjEQfGOUhllCGGJVNY34bRr6lPINhNjyZw=="
},
"husky": {
- "version": "4.2.3",
- "resolved": "https://registry.npmjs.org/husky/-/husky-4.2.3.tgz",
- "integrity": "sha512-VxTsSTRwYveKXN4SaH1/FefRJYCtx+wx04sSVcOpD7N2zjoHxa+cEJ07Qg5NmV3HAK+IRKOyNVpi2YBIVccIfQ==",
+ "version": "4.2.5",
+ "resolved": "https://registry.npmjs.org/husky/-/husky-4.2.5.tgz",
+ "integrity": "sha512-SYZ95AjKcX7goYVZtVZF2i6XiZcHknw50iXvY7b0MiGoj5RwdgRQNEHdb+gPDPCXKlzwrybjFjkL6FOj8uRhZQ==",
+ "dev": true,
"requires": {
- "chalk": "^3.0.0",
+ "chalk": "^4.0.0",
"ci-info": "^2.0.0",
- "compare-versions": "^3.5.1",
+ "compare-versions": "^3.6.0",
"cosmiconfig": "^6.0.0",
"find-versions": "^3.2.0",
"opencollective-postinstall": "^2.0.2",
@@ -8214,6 +6905,7 @@
"version": "6.0.0",
"resolved": "https://registry.npmjs.org/cosmiconfig/-/cosmiconfig-6.0.0.tgz",
"integrity": "sha512-xb3ZL6+L8b9JLLCx3ZdoZy4+2ECphCMo2PwqgP1tlfVq6M6YReyzBJtvWWtbDSpNr9hn96pkCiZqUcFEc+54Qg==",
+ "dev": true,
"requires": {
"@types/parse-json": "^4.0.0",
"import-fresh": "^3.1.0",
@@ -8226,6 +6918,7 @@
"version": "3.2.1",
"resolved": "https://registry.npmjs.org/import-fresh/-/import-fresh-3.2.1.tgz",
"integrity": "sha512-6e1q1cnWP2RXD9/keSkxHScg508CdXqXWgWBaETNhyuBFz+kUZlKboh+ISK+bU++DmbHimVBrOz/zzPe0sZ3sQ==",
+ "dev": true,
"requires": {
"parent-module": "^1.0.0",
"resolve-from": "^4.0.0"
@@ -8235,6 +6928,7 @@
"version": "5.0.0",
"resolved": "https://registry.npmjs.org/parse-json/-/parse-json-5.0.0.tgz",
"integrity": "sha512-OOY5b7PAEFV0E2Fir1KOkxchnZNCdowAJgQ5NuxjpBKTRP3pQhwkrkxqQjeoKJ+fO7bCpmIZaogI4eZGDMEGOw==",
+ "dev": true,
"requires": {
"@babel/code-frame": "^7.0.0",
"error-ex": "^1.3.1",
@@ -8245,7 +6939,14 @@
"resolve-from": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-4.0.0.tgz",
- "integrity": "sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g=="
+ "integrity": "sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g==",
+ "dev": true
+ },
+ "slash": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz",
+ "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==",
+ "dev": true
}
}
},
@@ -8257,19 +6958,6 @@
"safer-buffer": ">= 2.1.2 < 3"
}
},
- "icss-replace-symbols": {
- "version": "1.1.0",
- "resolved": "https://registry.npmjs.org/icss-replace-symbols/-/icss-replace-symbols-1.1.0.tgz",
- "integrity": "sha1-Bupvg2ead0njhs/h/oEq5dsiPe0="
- },
- "icss-utils": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/icss-utils/-/icss-utils-2.1.0.tgz",
- "integrity": "sha1-g/Cg7DeL8yRheLbCrZE28TWxyWI=",
- "requires": {
- "postcss": "^6.0.1"
- }
- },
"ieee754": {
"version": "1.1.13",
"resolved": "https://registry.npmjs.org/ieee754/-/ieee754-1.1.13.tgz",
@@ -8285,11 +6973,6 @@
"resolved": "https://registry.npmjs.org/ignore/-/ignore-4.0.6.tgz",
"integrity": "sha512-cyFDKrqc/YdcWFniJhzI42+AzS+gNwmUzOSFcRCQYwySuBBBy/KjuxWLZ/FHEH6Moq1NizMOBWyTcv8O4OZIMg=="
},
- "ignore-loader": {
- "version": "0.1.2",
- "resolved": "https://registry.npmjs.org/ignore-loader/-/ignore-loader-0.1.2.tgz",
- "integrity": "sha1-2B8kA3bQuk8Nd4lyw60lh0EXpGM="
- },
"imagemin": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/imagemin/-/imagemin-6.1.0.tgz",
@@ -8301,83 +6984,60 @@
"p-pipe": "^1.1.0",
"pify": "^4.0.1",
"replace-ext": "^1.0.0"
+ }
+ },
+ "imagemin-mozjpeg": {
+ "version": "8.0.0",
+ "resolved": "https://registry.npmjs.org/imagemin-mozjpeg/-/imagemin-mozjpeg-8.0.0.tgz",
+ "integrity": "sha512-+EciPiIjCb8JWjQNr1q8sYWYf7GDCNDxPYnkD11TNIjjWNzaV+oTg4DpOPQjl5ZX/KRCPMEgS79zLYAQzLitIA==",
+ "requires": {
+ "execa": "^1.0.0",
+ "is-jpg": "^2.0.0",
+ "mozjpeg": "^6.0.0"
},
"dependencies": {
- "array-union": {
- "version": "1.0.2",
- "resolved": "https://registry.npmjs.org/array-union/-/array-union-1.0.2.tgz",
- "integrity": "sha1-mjRBDk9OPaI96jdb5b5w8kd47Dk=",
- "requires": {
- "array-uniq": "^1.0.1"
- }
- },
- "dir-glob": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/dir-glob/-/dir-glob-2.0.0.tgz",
- "integrity": "sha512-37qirFDz8cA5fimp9feo43fSuRo2gHwaIn6dXL8Ber1dGwUosDrGZeCCXq57WnIqE4aQ+u3eQZzsk1yOzhdwag==",
+ "execa": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/execa/-/execa-1.0.0.tgz",
+ "integrity": "sha512-adbxcyWV46qiHyvSp50TKt05tB4tK3HcmF7/nxfAdhnox83seTDbwnaqKO4sXRy7roHAIFqJP/Rw/AuEbX61LA==",
"requires": {
- "arrify": "^1.0.1",
- "path-type": "^3.0.0"
+ "cross-spawn": "^6.0.0",
+ "get-stream": "^4.0.0",
+ "is-stream": "^1.1.0",
+ "npm-run-path": "^2.0.0",
+ "p-finally": "^1.0.0",
+ "signal-exit": "^3.0.0",
+ "strip-eof": "^1.0.0"
}
},
- "globby": {
- "version": "8.0.2",
- "resolved": "https://registry.npmjs.org/globby/-/globby-8.0.2.tgz",
- "integrity": "sha512-yTzMmKygLp8RUpG1Ymu2VXPSJQZjNAZPD4ywgYEaG7e4tBJeUQBO8OpXrf1RCNcEs5alsoJYPAMiIHP0cmeC7w==",
- "requires": {
- "array-union": "^1.0.1",
- "dir-glob": "2.0.0",
- "fast-glob": "^2.0.2",
- "glob": "^7.1.2",
- "ignore": "^3.3.5",
- "pify": "^3.0.0",
- "slash": "^1.0.0"
- },
- "dependencies": {
- "pify": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz",
- "integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY="
- }
+ "get-stream": {
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-4.1.0.tgz",
+ "integrity": "sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w==",
+ "requires": {
+ "pump": "^3.0.0"
}
},
- "ignore": {
- "version": "3.3.10",
- "resolved": "https://registry.npmjs.org/ignore/-/ignore-3.3.10.tgz",
- "integrity": "sha512-Pgs951kaMm5GXP7MOvxERINe3gsaVjUWFm+UZPSq9xYriQAksyhg0csnS0KXSNRD5NmNdapXEpjxG49+AKh/ug=="
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
},
- "path-type": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/path-type/-/path-type-3.0.0.tgz",
- "integrity": "sha512-T2ZUsdZFHgA3u4e5PfPbjd7HDDpxPnQb5jN0SrDsjNSuVXHJqtwTnWqG0B1jZrgmJ/7lj1EmVIByWt1gxGkWvg==",
+ "npm-run-path": {
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/npm-run-path/-/npm-run-path-2.0.2.tgz",
+ "integrity": "sha1-NakjLfo11wZ7TLLd8jV7GHFTbF8=",
"requires": {
- "pify": "^3.0.0"
- },
- "dependencies": {
- "pify": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz",
- "integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY="
- }
+ "path-key": "^2.0.0"
}
},
- "slash": {
+ "p-finally": {
"version": "1.0.0",
- "resolved": "https://registry.npmjs.org/slash/-/slash-1.0.0.tgz",
- "integrity": "sha1-xB8vbDn8FtHNF61LXYlhFK5HDVU="
+ "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
+ "integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4="
}
}
},
- "imagemin-mozjpeg": {
- "version": "8.0.0",
- "resolved": "https://registry.npmjs.org/imagemin-mozjpeg/-/imagemin-mozjpeg-8.0.0.tgz",
- "integrity": "sha512-+EciPiIjCb8JWjQNr1q8sYWYf7GDCNDxPYnkD11TNIjjWNzaV+oTg4DpOPQjl5ZX/KRCPMEgS79zLYAQzLitIA==",
- "requires": {
- "execa": "^1.0.0",
- "is-jpg": "^2.0.0",
- "mozjpeg": "^6.0.0"
- }
- },
"imagemin-optipng": {
"version": "7.1.0",
"resolved": "https://registry.npmjs.org/imagemin-optipng/-/imagemin-optipng-7.1.0.tgz",
@@ -8405,34 +7065,6 @@
"loader-utils": "^1.1.0"
}
},
- "immutable": {
- "version": "3.7.6",
- "resolved": "https://registry.npmjs.org/immutable/-/immutable-3.7.6.tgz",
- "integrity": "sha1-E7TTyxK++hVIKib+Gy665kAHHks="
- },
- "import-cwd": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/import-cwd/-/import-cwd-2.1.0.tgz",
- "integrity": "sha1-qmzzbnInYShcs3HsZRn1PiQ1sKk=",
- "requires": {
- "import-from": "^2.1.0"
- },
- "dependencies": {
- "import-from": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/import-from/-/import-from-2.1.0.tgz",
- "integrity": "sha1-M1238qev/VOqpHHUuAId7ja387E=",
- "requires": {
- "resolve-from": "^3.0.0"
- }
- },
- "resolve-from": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-3.0.0.tgz",
- "integrity": "sha1-six699nWiBvItuZTM17rywoYh0g="
- }
- }
- },
"import-fresh": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/import-fresh/-/import-fresh-2.0.0.tgz",
@@ -8440,21 +7072,6 @@
"requires": {
"caller-path": "^2.0.0",
"resolve-from": "^3.0.0"
- },
- "dependencies": {
- "resolve-from": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-3.0.0.tgz",
- "integrity": "sha1-six699nWiBvItuZTM17rywoYh0g="
- }
- }
- },
- "import-from": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/import-from/-/import-from-3.0.0.tgz",
- "integrity": "sha512-CiuXOFFSzkU5x/CR0+z7T91Iht4CXgfCxVOFRhh2Zyhg5wOpWvvDLQUsWl+gcN+QscYBjez8hDCt85O7RLDttQ==",
- "requires": {
- "resolve-from": "^5.0.0"
}
},
"import-lazy": {
@@ -8527,9 +7144,9 @@
},
"dependencies": {
"ansi-regex": {
- "version": "5.0.0",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz",
- "integrity": "sha512-bY6fj56OUQ0hU1KjFNDQuJFezqKdrAyFdIevADiqrWHwSlbmBNMHp5ak2f40Pm8JTFyM2mqxkG6ngkHO11f/lg=="
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz",
+ "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg=="
},
"ansi-styles": {
"version": "4.2.1",
@@ -8550,13 +7167,13 @@
"resolved": "https://registry.npmjs.org/astral-regex/-/astral-regex-2.0.0.tgz",
"integrity": "sha512-Z7tMw1ytTXt5jqMcOP+OQteU1VuNK9Y02uuJtKQ1Sv69jXQKKg5cibLwGJow8yzZP+eAc18EmLGPal0bp36rvQ=="
},
- "cli-truncate": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/cli-truncate/-/cli-truncate-2.1.0.tgz",
- "integrity": "sha512-n8fOixwDD6b/ObinzTrp1ZKFzbgvKZvuz/TvejnLn1aQfC6r52XEx85FmuC+3HI+JM7coBRXUvNqEU2PHVrHpg==",
+ "chalk": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/chalk/-/chalk-3.0.0.tgz",
+ "integrity": "sha512-4D3B6Wf41KOYRFdszmDqMCGq5VV/uMAB273JILmO+3jAlh8X4qDtdtgCR3fxtbLEMzSx22QdhnDcJvu2u1fVwg==",
"requires": {
- "slice-ansi": "^3.0.0",
- "string-width": "^4.2.0"
+ "ansi-styles": "^4.1.0",
+ "supports-color": "^7.1.0"
}
},
"color-convert": {
@@ -8573,14 +7190,19 @@
"integrity": "sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA=="
},
"emoji-regex": {
- "version": "8.0.0",
- "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-8.0.0.tgz",
- "integrity": "sha512-MSjYzcWNOA0ewAHpz0MxpYFvwg6yjy1NG3xteoqz644VCo/RPgnr1/GGt+ic3iJTzQ8Eu3TdM14SawnVUmGE6A=="
+ "version": "7.0.3",
+ "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-7.0.3.tgz",
+ "integrity": "sha512-CwBLREIQ7LvYFB0WyRvwhq5N5qPhc6PMjD6bYggFlI5YyDgl+0vxq5VHbMOFqLg7hfWzmu8T5Z1QofhmTIhItA=="
+ },
+ "has-flag": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-4.0.0.tgz",
+ "integrity": "sha512-EykJT/Q1KjTWctppgIAgfSO0tKVuZUjhgMr17kqTumMl6Afv3EISleU7qZUzoXDFTAHTDC4NOoG/ZxU3EvlMPQ=="
},
"is-fullwidth-code-point": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-3.0.0.tgz",
- "integrity": "sha512-zymm5+u+sCsSWyD9qNaejV3DFvhCKclKdizYaJUuHA83RLjb7nSuGnddCHGv0hk+KY7BMAlsWeK4Ueg6EV6XQg=="
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-2.0.0.tgz",
+ "integrity": "sha1-o7MKXE8ZkYMWeqq5O+764937ZU8="
},
"log-update": {
"version": "3.4.0",
@@ -8597,11 +7219,6 @@
"resolved": "https://registry.npmjs.org/ansi-escapes/-/ansi-escapes-3.2.0.tgz",
"integrity": "sha512-cBhpre4ma+U0T1oM5fXg7Dy1Jw7zzwv7lt/GoCpr+hDQJoYnKVPLL4dCvSEFMmQurOQvSrwT7SL/DAlhBI97RQ=="
},
- "ansi-regex": {
- "version": "4.1.0",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz",
- "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg=="
- },
"ansi-styles": {
"version": "3.2.1",
"resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-3.2.1.tgz",
@@ -8631,34 +7248,6 @@
"resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.3.tgz",
"integrity": "sha1-p9BVi9icQveV3UIyj3QIMcpTvCU="
},
- "emoji-regex": {
- "version": "7.0.3",
- "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-7.0.3.tgz",
- "integrity": "sha512-CwBLREIQ7LvYFB0WyRvwhq5N5qPhc6PMjD6bYggFlI5YyDgl+0vxq5VHbMOFqLg7hfWzmu8T5Z1QofhmTIhItA=="
- },
- "is-fullwidth-code-point": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-2.0.0.tgz",
- "integrity": "sha1-o7MKXE8ZkYMWeqq5O+764937ZU8="
- },
- "string-width": {
- "version": "3.1.0",
- "resolved": "https://registry.npmjs.org/string-width/-/string-width-3.1.0.tgz",
- "integrity": "sha512-vafcv6KjVZKSgz06oM/H6GDBrAtz8vdhQakGjFIvNrHA6y3HCF1CInLy+QLq8dTJPQ1b+KDUqDFctkdRW44e1w==",
- "requires": {
- "emoji-regex": "^7.0.1",
- "is-fullwidth-code-point": "^2.0.0",
- "strip-ansi": "^5.1.0"
- }
- },
- "strip-ansi": {
- "version": "5.2.0",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz",
- "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==",
- "requires": {
- "ansi-regex": "^4.1.0"
- }
- },
"wrap-ansi": {
"version": "5.1.0",
"resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-5.1.0.tgz",
@@ -8693,15 +7282,6 @@
"signal-exit": "^3.0.2"
}
},
- "scheduler": {
- "version": "0.18.0",
- "resolved": "https://registry.npmjs.org/scheduler/-/scheduler-0.18.0.tgz",
- "integrity": "sha512-agTSHR1Nbfi6ulI0kYNK0203joW2Y5W4po4l+v03tOoiJKpTBbxpNhWDvqc/4IcOw+KLmSiQLTasZ4cab2/UWQ==",
- "requires": {
- "loose-envify": "^1.1.0",
- "object-assign": "^4.1.1"
- }
- },
"slice-ansi": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/slice-ansi/-/slice-ansi-3.0.0.tgz",
@@ -8710,45 +7290,50 @@
"ansi-styles": "^4.0.0",
"astral-regex": "^2.0.0",
"is-fullwidth-code-point": "^3.0.0"
+ },
+ "dependencies": {
+ "is-fullwidth-code-point": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-3.0.0.tgz",
+ "integrity": "sha512-zymm5+u+sCsSWyD9qNaejV3DFvhCKclKdizYaJUuHA83RLjb7nSuGnddCHGv0hk+KY7BMAlsWeK4Ueg6EV6XQg=="
+ }
}
},
"string-width": {
- "version": "4.2.0",
- "resolved": "https://registry.npmjs.org/string-width/-/string-width-4.2.0.tgz",
- "integrity": "sha512-zUz5JD+tgqtuDjMhwIg5uFVV3dtqZ9yQJlZVfq4I01/K5Paj5UHj7VyrQOJvzawSVlKpObApbfD0Ed6yJc+1eg==",
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/string-width/-/string-width-3.1.0.tgz",
+ "integrity": "sha512-vafcv6KjVZKSgz06oM/H6GDBrAtz8vdhQakGjFIvNrHA6y3HCF1CInLy+QLq8dTJPQ1b+KDUqDFctkdRW44e1w==",
"requires": {
- "emoji-regex": "^8.0.0",
- "is-fullwidth-code-point": "^3.0.0",
- "strip-ansi": "^6.0.0"
+ "emoji-regex": "^7.0.1",
+ "is-fullwidth-code-point": "^2.0.0",
+ "strip-ansi": "^5.1.0"
}
},
"strip-ansi": {
- "version": "6.0.0",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-6.0.0.tgz",
- "integrity": "sha512-AuvKTrTfQNYNIctbR1K/YGTR1756GycPsg7b9bdV9Duqur4gv6aKqHXah67Z8ImS7WEz5QVcOtlfW2rZEugt6w==",
+ "version": "5.2.0",
+ "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz",
+ "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==",
"requires": {
- "ansi-regex": "^5.0.0"
+ "ansi-regex": "^4.1.0"
}
},
- "wrap-ansi": {
- "version": "6.2.0",
- "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-6.2.0.tgz",
- "integrity": "sha512-r6lPcBGxZXlIcymEu7InxDMhdW0KDxpLgoFLcguasxCaJ/SOIZwINatK9KY/tf+ZrlywOKU0UDj3ATXUBfxJXA==",
+ "supports-color": {
+ "version": "7.1.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-7.1.0.tgz",
+ "integrity": "sha512-oRSIpR8pxT1Wr2FquTNnGet79b3BWljqOuoW/h4oBhxJ/HUbX5nX6JSruTkvXDCFMwDPvsaTTbvMLKZWSy0R5g==",
"requires": {
- "ansi-styles": "^4.0.0",
- "string-width": "^4.1.0",
- "strip-ansi": "^6.0.0"
+ "has-flag": "^4.0.0"
}
}
}
},
"ink-link": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/ink-link/-/ink-link-1.0.0.tgz",
- "integrity": "sha512-oIyGm7UYz5e9j9xc3zgzkYBYLCcRKg/deA3jieXqQT6F4mnhdlTQfLv8zfNt+IMsouPEEKuLPZGE5no5SAIEPQ==",
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/ink-link/-/ink-link-1.1.0.tgz",
+ "integrity": "sha512-a716nYz4YDPu8UOA2PwabTZgTvZa3SYB/70yeXVmTOKFAEdMbJyGSVeNuB7P+aM2olzDj9AGVchA7W5QytF9uA==",
"requires": {
"prop-types": "^15.7.2",
- "terminal-link": "^1.2.0"
+ "terminal-link": "^2.1.1"
}
},
"ink-select-input": {
@@ -8788,6 +7373,52 @@
"requires": {
"chalk": "^3.0.0",
"prop-types": "^15.5.10"
+ },
+ "dependencies": {
+ "ansi-styles": {
+ "version": "4.2.1",
+ "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-4.2.1.tgz",
+ "integrity": "sha512-9VGjrMsG1vePxcSweQsN20KY/c4zN0h9fLjqAbwbPfahM3t+NL+M9HC8xeXG2I8pX5NoamTGNuomEUFI7fcUjA==",
+ "requires": {
+ "@types/color-name": "^1.1.1",
+ "color-convert": "^2.0.1"
+ }
+ },
+ "chalk": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/chalk/-/chalk-3.0.0.tgz",
+ "integrity": "sha512-4D3B6Wf41KOYRFdszmDqMCGq5VV/uMAB273JILmO+3jAlh8X4qDtdtgCR3fxtbLEMzSx22QdhnDcJvu2u1fVwg==",
+ "requires": {
+ "ansi-styles": "^4.1.0",
+ "supports-color": "^7.1.0"
+ }
+ },
+ "color-convert": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/color-convert/-/color-convert-2.0.1.tgz",
+ "integrity": "sha512-RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ==",
+ "requires": {
+ "color-name": "~1.1.4"
+ }
+ },
+ "color-name": {
+ "version": "1.1.4",
+ "resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.4.tgz",
+ "integrity": "sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA=="
+ },
+ "has-flag": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-4.0.0.tgz",
+ "integrity": "sha512-EykJT/Q1KjTWctppgIAgfSO0tKVuZUjhgMr17kqTumMl6Afv3EISleU7qZUzoXDFTAHTDC4NOoG/ZxU3EvlMPQ=="
+ },
+ "supports-color": {
+ "version": "7.1.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-7.1.0.tgz",
+ "integrity": "sha512-oRSIpR8pxT1Wr2FquTNnGet79b3BWljqOuoW/h4oBhxJ/HUbX5nX6JSruTkvXDCFMwDPvsaTTbvMLKZWSy0R5g==",
+ "requires": {
+ "has-flag": "^4.0.0"
+ }
+ }
}
},
"inline-style-parser": {
@@ -8820,26 +7451,42 @@
"resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz",
"integrity": "sha512-bY6fj56OUQ0hU1KjFNDQuJFezqKdrAyFdIevADiqrWHwSlbmBNMHp5ak2f40Pm8JTFyM2mqxkG6ngkHO11f/lg=="
},
- "emoji-regex": {
- "version": "8.0.0",
- "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-8.0.0.tgz",
- "integrity": "sha512-MSjYzcWNOA0ewAHpz0MxpYFvwg6yjy1NG3xteoqz644VCo/RPgnr1/GGt+ic3iJTzQ8Eu3TdM14SawnVUmGE6A=="
+ "ansi-styles": {
+ "version": "4.2.1",
+ "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-4.2.1.tgz",
+ "integrity": "sha512-9VGjrMsG1vePxcSweQsN20KY/c4zN0h9fLjqAbwbPfahM3t+NL+M9HC8xeXG2I8pX5NoamTGNuomEUFI7fcUjA==",
+ "requires": {
+ "@types/color-name": "^1.1.1",
+ "color-convert": "^2.0.1"
+ }
},
- "is-fullwidth-code-point": {
+ "chalk": {
"version": "3.0.0",
- "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-3.0.0.tgz",
- "integrity": "sha512-zymm5+u+sCsSWyD9qNaejV3DFvhCKclKdizYaJUuHA83RLjb7nSuGnddCHGv0hk+KY7BMAlsWeK4Ueg6EV6XQg=="
+ "resolved": "https://registry.npmjs.org/chalk/-/chalk-3.0.0.tgz",
+ "integrity": "sha512-4D3B6Wf41KOYRFdszmDqMCGq5VV/uMAB273JILmO+3jAlh8X4qDtdtgCR3fxtbLEMzSx22QdhnDcJvu2u1fVwg==",
+ "requires": {
+ "ansi-styles": "^4.1.0",
+ "supports-color": "^7.1.0"
+ }
},
- "string-width": {
- "version": "4.2.0",
- "resolved": "https://registry.npmjs.org/string-width/-/string-width-4.2.0.tgz",
- "integrity": "sha512-zUz5JD+tgqtuDjMhwIg5uFVV3dtqZ9yQJlZVfq4I01/K5Paj5UHj7VyrQOJvzawSVlKpObApbfD0Ed6yJc+1eg==",
+ "color-convert": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/color-convert/-/color-convert-2.0.1.tgz",
+ "integrity": "sha512-RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ==",
"requires": {
- "emoji-regex": "^8.0.0",
- "is-fullwidth-code-point": "^3.0.0",
- "strip-ansi": "^6.0.0"
+ "color-name": "~1.1.4"
}
},
+ "color-name": {
+ "version": "1.1.4",
+ "resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.4.tgz",
+ "integrity": "sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA=="
+ },
+ "has-flag": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-4.0.0.tgz",
+ "integrity": "sha512-EykJT/Q1KjTWctppgIAgfSO0tKVuZUjhgMr17kqTumMl6Afv3EISleU7qZUzoXDFTAHTDC4NOoG/ZxU3EvlMPQ=="
+ },
"strip-ansi": {
"version": "6.0.0",
"resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-6.0.0.tgz",
@@ -8847,6 +7494,14 @@
"requires": {
"ansi-regex": "^5.0.0"
}
+ },
+ "supports-color": {
+ "version": "7.1.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-7.1.0.tgz",
+ "integrity": "sha512-oRSIpR8pxT1Wr2FquTNnGet79b3BWljqOuoW/h4oBhxJ/HUbX5nX6JSruTkvXDCFMwDPvsaTTbvMLKZWSy0R5g==",
+ "requires": {
+ "has-flag": "^4.0.0"
+ }
}
}
},
@@ -8895,6 +7550,11 @@
"kind-of": "^3.0.2"
},
"dependencies": {
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ },
"kind-of": {
"version": "3.2.2",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
@@ -8938,9 +7598,9 @@
}
},
"is-buffer": {
- "version": "1.1.6",
- "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
- "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ "version": "2.0.4",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-2.0.4.tgz",
+ "integrity": "sha512-Kq1rokWXOPXWuaMAqZiJW4XxsmD9zGx9q4aePabbn3qCRGedtH7Cm+zV8WETitMfu1wdh+Rvd6w5egwSngUX2A=="
},
"is-callable": {
"version": "1.1.5",
@@ -8955,6 +7615,19 @@
"ci-info": "^2.0.0"
}
},
+ "is-color-stop": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-color-stop/-/is-color-stop-1.1.0.tgz",
+ "integrity": "sha1-z/9HGu5N1cnhWFmPvhKWe1za00U=",
+ "requires": {
+ "css-color-names": "^0.0.4",
+ "hex-color-regex": "^1.1.0",
+ "hsl-regex": "^1.0.0",
+ "hsla-regex": "^1.0.0",
+ "rgb-regex": "^1.0.1",
+ "rgba-regex": "^1.0.0"
+ }
+ },
"is-data-descriptor": {
"version": "0.1.4",
"resolved": "https://registry.npmjs.org/is-data-descriptor/-/is-data-descriptor-0.1.4.tgz",
@@ -8963,6 +7636,11 @@
"kind-of": "^3.0.2"
},
"dependencies": {
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ },
"kind-of": {
"version": "3.2.2",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
@@ -9021,17 +7699,14 @@
"integrity": "sha1-qIwCU1eR8C7TfHahueqXc8gz+MI="
},
"is-finite": {
- "version": "1.0.2",
- "resolved": "https://registry.npmjs.org/is-finite/-/is-finite-1.0.2.tgz",
- "integrity": "sha1-zGZ3aVYCvlUO8R6LSqYwU0K20Ko=",
- "requires": {
- "number-is-nan": "^1.0.0"
- }
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-finite/-/is-finite-1.1.0.tgz",
+ "integrity": "sha512-cdyMtqX/BOqqNBBiKlIVkytNHm49MtMlYyn1zxzvJKWmFMlGzm+ry5BBfYyeY9YmNKbRSo/o7OX9w9ale0wg3w=="
},
"is-fullwidth-code-point": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-2.0.0.tgz",
- "integrity": "sha1-o7MKXE8ZkYMWeqq5O+764937ZU8="
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-3.0.0.tgz",
+ "integrity": "sha512-zymm5+u+sCsSWyD9qNaejV3DFvhCKclKdizYaJUuHA83RLjb7nSuGnddCHGv0hk+KY7BMAlsWeK4Ueg6EV6XQg=="
},
"is-glob": {
"version": "4.0.1",
@@ -9057,22 +7732,9 @@
"integrity": "sha1-q5124dtM7VHjXeDHLr7PCfc0zeg="
},
"is-number": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/is-number/-/is-number-3.0.0.tgz",
- "integrity": "sha1-JP1iAaR4LPUFYcgQJ2r8fRLXEZU=",
- "requires": {
- "kind-of": "^3.0.2"
- },
- "dependencies": {
- "kind-of": {
- "version": "3.2.2",
- "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
- "integrity": "sha1-MeohpzS6ubuw8yRm2JOupR5KPGQ=",
- "requires": {
- "is-buffer": "^1.1.5"
- }
- }
- }
+ "version": "7.0.0",
+ "resolved": "https://registry.npmjs.org/is-number/-/is-number-7.0.0.tgz",
+ "integrity": "sha512-41Cifkg6e8TylSpdtTpeLVMqvSBEVzTttHvERD741+pnZ8ANv0004MRL43QKPDlK9cGvNp6NZWZUBlbGXYxxng=="
},
"is-obj": {
"version": "1.0.1",
@@ -9084,39 +7746,10 @@
"resolved": "https://registry.npmjs.org/is-object/-/is-object-1.0.1.tgz",
"integrity": "sha1-iVJojF7C/9awPsyF52ngKQMINHA="
},
- "is-observable": {
- "version": "1.1.0",
- "resolved": "https://registry.npmjs.org/is-observable/-/is-observable-1.1.0.tgz",
- "integrity": "sha512-NqCa4Sa2d+u7BWc6CukaObG3Fh+CU9bvixbpcXYhy2VvYS7vVGIdAgnIS5Ks3A/cqk4rebLJ9s8zBstT2aKnIA==",
- "requires": {
- "symbol-observable": "^1.1.0"
- }
- },
- "is-path-cwd": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/is-path-cwd/-/is-path-cwd-1.0.0.tgz",
- "integrity": "sha1-0iXsIxMuie3Tj9p2dHLmLmXxEG0="
- },
- "is-path-in-cwd": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/is-path-in-cwd/-/is-path-in-cwd-1.0.1.tgz",
- "integrity": "sha512-FjV1RTW48E7CWM7eE/J2NJvAEEVektecDBVBE5Hh3nM1Jd0kvhHtX68Pr3xsDf857xt3Y4AkwVULK1Vku62aaQ==",
- "requires": {
- "is-path-inside": "^1.0.0"
- }
- },
- "is-path-inside": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/is-path-inside/-/is-path-inside-1.0.1.tgz",
- "integrity": "sha1-jvW33lBDej/cprToZe96pVy0gDY=",
- "requires": {
- "path-is-inside": "^1.0.1"
- }
- },
- "is-plain-obj": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/is-plain-obj/-/is-plain-obj-2.1.0.tgz",
- "integrity": "sha512-YWnfyRwxL/+SsrWYfOpUtz5b3YD+nyfkHvjbcanzk8zgyO4ASD67uVMRt8k5bM4lLMDnXfriRhOpemw+NfT1eA=="
+ "is-plain-obj": {
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/is-plain-obj/-/is-plain-obj-2.1.0.tgz",
+ "integrity": "sha512-YWnfyRwxL/+SsrWYfOpUtz5b3YD+nyfkHvjbcanzk8zgyO4ASD67uVMRt8k5bM4lLMDnXfriRhOpemw+NfT1eA=="
},
"is-plain-object": {
"version": "2.0.4",
@@ -9131,11 +7764,6 @@
"resolved": "https://registry.npmjs.org/is-png/-/is-png-2.0.0.tgz",
"integrity": "sha512-4KPGizaVGj2LK7xwJIz8o5B2ubu1D/vcQsgOGFEDlpcvgZHto4gBnyd0ig7Ws+67ixmwKoNmu0hYnpo6AaKb5g=="
},
- "is-promise": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/is-promise/-/is-promise-2.1.0.tgz",
- "integrity": "sha1-eaKp7OfwlugPNtKy87wWwf9L8/o="
- },
"is-regex": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.0.5.tgz",
@@ -9149,15 +7777,20 @@
"resolved": "https://registry.npmjs.org/is-regexp/-/is-regexp-1.0.0.tgz",
"integrity": "sha1-/S2INUXEa6xaYz57mgnof6LLUGk="
},
+ "is-resolvable": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-resolvable/-/is-resolvable-1.1.0.tgz",
+ "integrity": "sha512-qgDYXFSR5WvEfuS5dMj6oTMEbrrSaM0CrFk2Yiq/gXnBvD9pMa2jGXxyhGLfvhZpuMZe18CJpFxAt3CRs42NMg=="
+ },
"is-retry-allowed": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/is-retry-allowed/-/is-retry-allowed-1.2.0.tgz",
"integrity": "sha512-RUbUeKwvm3XG2VYamhJL1xFktgjvPzL0Hq8C+6yrWIswDy3BIXGqCxhxkc30N9jqK311gVU137K8Ei55/zVJRg=="
},
"is-stream": {
- "version": "1.1.0",
- "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
- "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-2.0.0.tgz",
+ "integrity": "sha512-XCoy+WlUr7d1+Z8GgSuXmpuUFC9fOhRXglJMx+dwLKTkL44Cjd4W1Z5P+BQZpr+cR93aGP4S/s7Ftw6Nd/kiEw=="
},
"is-string": {
"version": "1.0.5",
@@ -9180,11 +7813,6 @@
"has-symbols": "^1.0.1"
}
},
- "is-typedarray": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/is-typedarray/-/is-typedarray-1.0.0.tgz",
- "integrity": "sha1-5HnICFjfDBsR3dppQPlgEfzaSpo="
- },
"is-utf8": {
"version": "0.2.1",
"resolved": "https://registry.npmjs.org/is-utf8/-/is-utf8-0.2.1.tgz",
@@ -9206,9 +7834,12 @@
"integrity": "sha512-5SMO8RVennx3nZrqtKwCGyyetPE9VDba5ugvKLaD4KopPG5kR4mQ7tNt/r7feL5yt5h3lpuBbIUmCOG2eSzXHA=="
},
"is-wsl": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/is-wsl/-/is-wsl-2.1.1.tgz",
- "integrity": "sha512-umZHcSrwlDHo2TGMXv0DZ8dIUGunZ2Iv68YZnrmCiBPkZ4aaOhtv7pXJKeki9k3qJ3RJr0cDyitcl5wEH3AYog=="
+ "version": "2.2.0",
+ "resolved": "https://registry.npmjs.org/is-wsl/-/is-wsl-2.2.0.tgz",
+ "integrity": "sha512-fKzAra0rGJUUBwGBgNkHZuToZcn+TtXHpeCgmkMJMMYx1sQDYaCSyjJBSCa2nH1DGm7s3n1oBnohoVTBaN7Lww==",
+ "requires": {
+ "is-docker": "^2.0.0"
+ }
},
"isarray": {
"version": "1.0.0",
@@ -9239,6 +7870,11 @@
"whatwg-fetch": ">=0.10.0"
},
"dependencies": {
+ "is-stream": {
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
+ "integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
+ },
"node-fetch": {
"version": "1.7.3",
"resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-1.7.3.tgz",
@@ -9257,6 +7893,13 @@
"requires": {
"node-fetch": "^2.2.0",
"unfetch": "^4.0.0"
+ },
+ "dependencies": {
+ "node-fetch": {
+ "version": "2.6.0",
+ "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.0.tgz",
+ "integrity": "sha512-8dG4H5ujfvFiqDmVu9fQ5bOHUC15JMjMY/Zumv26oOvvVJjM67KF8koCWIabKQ1GJIa9r2mMZscBq/TbdOcmNA=="
+ }
}
},
"isurl": {
@@ -9273,6 +7916,29 @@
"resolved": "https://registry.npmjs.org/iterall/-/iterall-1.3.0.tgz",
"integrity": "sha512-QZ9qOMdF+QLHxy1QIpUHUU1D5pS2CG2P69LF6L6CPjPYA/XMOmKV3PZpawHoAjHNyB0swdVTRxdYT4tbBbxqwg=="
},
+ "jake": {
+ "version": "10.6.1",
+ "resolved": "https://registry.npmjs.org/jake/-/jake-10.6.1.tgz",
+ "integrity": "sha512-pHUK3+V0BjOb1XSi95rbBksrMdIqLVC9bJqDnshVyleYsET3H0XAq+3VB2E3notcYvv4wRdRHn13p7vobG+wfQ==",
+ "requires": {
+ "async": "0.9.x",
+ "chalk": "^2.4.2",
+ "filelist": "^1.0.1",
+ "minimatch": "^3.0.4"
+ },
+ "dependencies": {
+ "chalk": {
+ "version": "2.4.2",
+ "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
+ "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
+ "requires": {
+ "ansi-styles": "^3.2.1",
+ "escape-string-regexp": "^1.0.5",
+ "supports-color": "^5.3.0"
+ }
+ }
+ }
+ },
"jest-worker": {
"version": "24.9.0",
"resolved": "https://registry.npmjs.org/jest-worker/-/jest-worker-24.9.0.tgz",
@@ -9308,9 +7974,9 @@
"integrity": "sha512-X2BB11YZtrRqY4EnQcLX5Rh373zbK4alC1FW7D7MBhL2gtcC17cTnr6DmfHZeS0s2rTHjUTMMHfG7gO8SSdw+g=="
},
"js-tokens": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-4.0.0.tgz",
- "integrity": "sha512-RdJUflcE3cUzKiMqQgsCu06FPu9UdIJO0beYbPhHN4k6apgJtifcoCtT9bcxOpYBtpD2kCM6Sbzg4CausW/PKQ=="
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-3.0.2.tgz",
+ "integrity": "sha1-mGbfOVECEw449/mWvOtlRDIJwls="
},
"js-yaml": {
"version": "3.13.1",
@@ -9322,9 +7988,9 @@
}
},
"jsesc": {
- "version": "2.5.2",
- "resolved": "https://registry.npmjs.org/jsesc/-/jsesc-2.5.2.tgz",
- "integrity": "sha512-OYu7XEzjkCQ3C5Ps3QIZsQfNpqoJyZZA99wd9aWd05NCtC5pWOkShK2mkL6HXQR6/Cy2lbNdPlZBpuQHXE63gA=="
+ "version": "0.5.0",
+ "resolved": "https://registry.npmjs.org/jsesc/-/jsesc-0.5.0.tgz",
+ "integrity": "sha1-597mbjXW/Bb3EP6R1c9p9w8IkR0="
},
"json-buffer": {
"version": "3.0.0",
@@ -9341,11 +8007,6 @@
"resolved": "https://registry.npmjs.org/json-schema-traverse/-/json-schema-traverse-0.4.1.tgz",
"integrity": "sha512-xbbCH5dCYU5T8LcEhhuh7HJ88HXuW3qsI3Y0zOZFKfZEHcpWiHU/Jxzk629Brsab/mMiHQti9wMP+845RPe3Vg=="
},
- "json-schema-typed": {
- "version": "7.0.3",
- "resolved": "https://registry.npmjs.org/json-schema-typed/-/json-schema-typed-7.0.3.tgz",
- "integrity": "sha512-7DE8mpG+/fVw+dTpjbxnx47TaMnDfOI1jwft9g1VybltZCduyRQPJPvc+zzKY9WPHxhPWczyFuYa6I8Mw4iU5A=="
- },
"json-stable-stringify": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/json-stable-stringify/-/json-stable-stringify-1.0.1.tgz",
@@ -9360,9 +8021,9 @@
"integrity": "sha1-nbe1lJatPzz+8wp1FC0tkwrXJlE="
},
"json5": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/json5/-/json5-2.1.1.tgz",
- "integrity": "sha512-l+3HXD0GEI3huGq1njuqtzYK8OYJyXMkOLtQ53pjWh89tvWS2h6l+1zMkYWqlb57+SiQodKZyvMEFb2X+KrFhQ==",
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/json5/-/json5-1.0.1.tgz",
+ "integrity": "sha512-aKS4WQjPenRxiQsC93MNfjx+nbF4PAdYzmd/1JIj8HYzqfbu86beTuNgXDzPknWk0n0uARlyewZo4s++ES36Ow==",
"requires": {
"minimist": "^1.2.0"
}
@@ -9381,23 +8042,6 @@
"resolved": "https://registry.npmjs.org/jsonify/-/jsonify-0.0.0.tgz",
"integrity": "sha1-LHS27kHZPKUbe1qu6PUDYx0lKnM="
},
- "jsonwebtoken": {
- "version": "8.5.1",
- "resolved": "https://registry.npmjs.org/jsonwebtoken/-/jsonwebtoken-8.5.1.tgz",
- "integrity": "sha512-XjwVfRS6jTMsqYs0EsuJ4LGxXV14zQybNd4L2r0UvbVnSF9Af8x7p5MzbJ90Ioz/9TI41/hTCvznF/loiSzn8w==",
- "requires": {
- "jws": "^3.2.2",
- "lodash.includes": "^4.3.0",
- "lodash.isboolean": "^3.0.3",
- "lodash.isinteger": "^4.0.4",
- "lodash.isnumber": "^3.0.3",
- "lodash.isplainobject": "^4.0.6",
- "lodash.isstring": "^4.0.1",
- "lodash.once": "^4.0.0",
- "ms": "^2.1.1",
- "semver": "^5.6.0"
- }
- },
"jstz": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/jstz/-/jstz-2.1.1.tgz",
@@ -9412,25 +8056,6 @@
"object.assign": "^4.1.0"
}
},
- "jwa": {
- "version": "1.4.1",
- "resolved": "https://registry.npmjs.org/jwa/-/jwa-1.4.1.tgz",
- "integrity": "sha512-qiLX/xhEEFKUAJ6FiBMbes3w9ATzyk5W7Hvzpa/SLYdxNtng+gcurvrI7TbACjIXlsJyr05/S1oUhZrc63evQA==",
- "requires": {
- "buffer-equal-constant-time": "1.0.1",
- "ecdsa-sig-formatter": "1.0.11",
- "safe-buffer": "^5.0.1"
- }
- },
- "jws": {
- "version": "3.2.2",
- "resolved": "https://registry.npmjs.org/jws/-/jws-3.2.2.tgz",
- "integrity": "sha512-YHlZCB6lMTllWDtSPHz/ZXTsi8S00usEV6v1tjq8tOUZzw7DpSDWVXjXDre6ed1w/pd495ODpHZYSdkRTsa0HA==",
- "requires": {
- "jwa": "^1.4.1",
- "safe-buffer": "^5.0.1"
- }
- },
"keyv": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/keyv/-/keyv-3.1.0.tgz",
@@ -9452,34 +8077,13 @@
"package-json": "^6.3.0"
}
},
- "launch-editor": {
- "version": "2.2.1",
- "resolved": "https://registry.npmjs.org/launch-editor/-/launch-editor-2.2.1.tgz",
- "integrity": "sha512-On+V7K2uZK6wK7x691ycSUbLD/FyKKelArkbaAMSSJU8JmqmhwN2+mnJDNINuJWSrh2L0kDk+ZQtbC/gOWUwLw==",
- "requires": {
- "chalk": "^2.3.0",
- "shell-quote": "^1.6.1"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- }
- }
- }
- },
"levn": {
- "version": "0.3.0",
- "resolved": "https://registry.npmjs.org/levn/-/levn-0.3.0.tgz",
- "integrity": "sha1-OwmSTt+fCDwEkP3UwLxEIeBHZO4=",
+ "version": "0.4.1",
+ "resolved": "https://registry.npmjs.org/levn/-/levn-0.4.1.tgz",
+ "integrity": "sha512-+bT2uH4E5LGE7h/n3evcS/sQlJXCpIp6ym8OWJ5eV6+67Dsql/LaaT7qJBAt2rzfoa/5QBGBhxDix1dMt2kQKQ==",
"requires": {
- "prelude-ls": "~1.1.2",
- "type-check": "~0.3.2"
+ "prelude-ls": "^1.2.1",
+ "type-check": "~0.4.0"
}
},
"lines-and-columns": {
@@ -9488,17 +8092,17 @@
"integrity": "sha1-HADHQ7QzzQpOgHWPe2SldEDZ/wA="
},
"lint-staged": {
- "version": "10.0.9",
- "resolved": "https://registry.npmjs.org/lint-staged/-/lint-staged-10.0.9.tgz",
- "integrity": "sha512-NKJHYgRa8oI9c4Ic42ZtF2XA6Ps7lFbXwg3q0ZEP0r55Tw3YWykCW1RzW6vu+QIGqbsy7DxndvKu93Wtr5vPQw==",
+ "version": "10.2.2",
+ "resolved": "https://registry.npmjs.org/lint-staged/-/lint-staged-10.2.2.tgz",
+ "integrity": "sha512-78kNqNdDeKrnqWsexAmkOU3Z5wi+1CsQmUmfCuYgMTE8E4rAIX8RHW7xgxwAZ+LAayb7Cca4uYX4P3LlevzjVg==",
"requires": {
- "chalk": "^3.0.0",
- "commander": "^4.0.1",
+ "chalk": "^4.0.0",
+ "commander": "^5.0.0",
"cosmiconfig": "^6.0.0",
"debug": "^4.1.1",
"dedent": "^0.7.0",
- "execa": "^3.4.0",
- "listr": "^0.14.3",
+ "execa": "^4.0.0",
+ "listr2": "1.3.8",
"log-symbols": "^3.0.0",
"micromatch": "^4.0.2",
"normalize-path": "^3.0.0",
@@ -9507,18 +8111,10 @@
"stringify-object": "^3.3.0"
},
"dependencies": {
- "braces": {
- "version": "3.0.2",
- "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.2.tgz",
- "integrity": "sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==",
- "requires": {
- "fill-range": "^7.0.1"
- }
- },
"commander": {
- "version": "4.1.1",
- "resolved": "https://registry.npmjs.org/commander/-/commander-4.1.1.tgz",
- "integrity": "sha512-NOKm8xhkzAjzFx8B2v5OAHT+u5pRQc2UCa2Vq9jYL/31o2wi9mxBA7LIFs3sV5VSC49z6pEhfbMULvShKj26WA=="
+ "version": "5.1.0",
+ "resolved": "https://registry.npmjs.org/commander/-/commander-5.1.0.tgz",
+ "integrity": "sha512-P0CysNDQ7rtVw4QIQtm+MRxV66vKFSvlsQvGYXZWR3qFU0jlMKHZZZgw8e+8DSah4UDKMqnknRDQz+xuQXQ/Zg=="
},
"cosmiconfig": {
"version": "6.0.0",
@@ -9532,49 +8128,6 @@
"yaml": "^1.7.2"
}
},
- "cross-spawn": {
- "version": "7.0.1",
- "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.1.tgz",
- "integrity": "sha512-u7v4o84SwFpD32Z8IIcPZ6z1/ie24O6RU3RbtL5Y316l3KuHVPx9ItBgWQ6VlfAFnRnTtMUrsQ9MUUTuEZjogg==",
- "requires": {
- "path-key": "^3.1.0",
- "shebang-command": "^2.0.0",
- "which": "^2.0.1"
- }
- },
- "execa": {
- "version": "3.4.0",
- "resolved": "https://registry.npmjs.org/execa/-/execa-3.4.0.tgz",
- "integrity": "sha512-r9vdGQk4bmCuK1yKQu1KTwcT2zwfWdbdaXfCtAh+5nU/4fSX+JAb7vZGvI5naJrQlvONrEB20jeruESI69530g==",
- "requires": {
- "cross-spawn": "^7.0.0",
- "get-stream": "^5.0.0",
- "human-signals": "^1.1.1",
- "is-stream": "^2.0.0",
- "merge-stream": "^2.0.0",
- "npm-run-path": "^4.0.0",
- "onetime": "^5.1.0",
- "p-finally": "^2.0.0",
- "signal-exit": "^3.0.2",
- "strip-final-newline": "^2.0.0"
- }
- },
- "fill-range": {
- "version": "7.0.1",
- "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.0.1.tgz",
- "integrity": "sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==",
- "requires": {
- "to-regex-range": "^5.0.1"
- }
- },
- "get-stream": {
- "version": "5.1.0",
- "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-5.1.0.tgz",
- "integrity": "sha512-EXr1FOzrzTfGeL0gQdeFEvOMm2mzMOglyiOXSTpPC+iAjAKftbr3jpCMWynogwYnM+eSj9sHGc6wjIcDvYiygw==",
- "requires": {
- "pump": "^3.0.0"
- }
- },
"import-fresh": {
"version": "3.2.1",
"resolved": "https://registry.npmjs.org/import-fresh/-/import-fresh-3.2.1.tgz",
@@ -9584,38 +8137,6 @@
"resolve-from": "^4.0.0"
}
},
- "is-number": {
- "version": "7.0.0",
- "resolved": "https://registry.npmjs.org/is-number/-/is-number-7.0.0.tgz",
- "integrity": "sha512-41Cifkg6e8TylSpdtTpeLVMqvSBEVzTttHvERD741+pnZ8ANv0004MRL43QKPDlK9cGvNp6NZWZUBlbGXYxxng=="
- },
- "is-stream": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-2.0.0.tgz",
- "integrity": "sha512-XCoy+WlUr7d1+Z8GgSuXmpuUFC9fOhRXglJMx+dwLKTkL44Cjd4W1Z5P+BQZpr+cR93aGP4S/s7Ftw6Nd/kiEw=="
- },
- "micromatch": {
- "version": "4.0.2",
- "resolved": "https://registry.npmjs.org/micromatch/-/micromatch-4.0.2.tgz",
- "integrity": "sha512-y7FpHSbMUMoyPbYUSzO6PaZ6FyRnQOpHuKwbo1G+Knck95XVU4QAiKdGEnj5wwoS7PlOgthX/09u5iFJ+aYf5Q==",
- "requires": {
- "braces": "^3.0.1",
- "picomatch": "^2.0.5"
- }
- },
- "npm-run-path": {
- "version": "4.0.1",
- "resolved": "https://registry.npmjs.org/npm-run-path/-/npm-run-path-4.0.1.tgz",
- "integrity": "sha512-S48WzZW777zhNIrn7gxOlISNAqi9ZC/uQFnRdbeIHhZhCA6UqpkOT8T1G7BvfdgP4Er8gF4sUbaS0i7QvIfCWw==",
- "requires": {
- "path-key": "^3.0.0"
- }
- },
- "p-finally": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-2.0.1.tgz",
- "integrity": "sha512-vpm09aKwq6H9phqRQzecoDpD8TmVyGw70qmWlyq5onxY7tqyTTFVvxMykxQSQKILBSFlbXpypIw2T1Ml7+DDtw=="
- },
"parse-json": {
"version": "5.0.0",
"resolved": "https://registry.npmjs.org/parse-json/-/parse-json-5.0.0.tgz",
@@ -9627,212 +8148,89 @@
"lines-and-columns": "^1.1.6"
}
},
- "path-key": {
- "version": "3.1.1",
- "resolved": "https://registry.npmjs.org/path-key/-/path-key-3.1.1.tgz",
- "integrity": "sha512-ojmeN0qd+y0jszEtoY48r0Peq5dwMEkIlCOu6Q5f41lfkswXuKtYrhgoTpLnyIcHm24Uhqx+5Tqm2InSwLhE6Q=="
- },
"resolve-from": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-4.0.0.tgz",
"integrity": "sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g=="
- },
- "shebang-command": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/shebang-command/-/shebang-command-2.0.0.tgz",
- "integrity": "sha512-kHxr2zZpYtdmrN1qDjrrX/Z1rR1kG8Dx+gkpK1G4eXmvXswmcE1hTWBWYUzlraYw1/yZp6YuDY77YtvbN0dmDA==",
- "requires": {
- "shebang-regex": "^3.0.0"
- }
- },
- "shebang-regex": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/shebang-regex/-/shebang-regex-3.0.0.tgz",
- "integrity": "sha512-7++dFhtcx3353uBaq8DDR4NuxBetBzC7ZQOhmTQInHEd6bSrXdiEyzCvG07Z44UYdLShWUyXt5M/yhz8ekcb1A=="
- },
- "to-regex-range": {
- "version": "5.0.1",
- "resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-5.0.1.tgz",
- "integrity": "sha512-65P7iz6X5yEr1cwcgvQxbbIw7Uk3gOy5dIdtZ4rDveLqhrdJP+Li/Hx6tyK0NEb+2GCyneCMJiGqrADCSNk8sQ==",
- "requires": {
- "is-number": "^7.0.0"
- }
- },
- "which": {
- "version": "2.0.2",
- "resolved": "https://registry.npmjs.org/which/-/which-2.0.2.tgz",
- "integrity": "sha512-BLI3Tl1TW3Pvl70l3yq3Y64i+awpwXqsGBYWkkqMtnbXgrMD+yj7rhW0kuEDxzJaYXGjEW5ogapKNMEKNMjibA==",
- "requires": {
- "isexe": "^2.0.0"
- }
}
}
},
- "listr": {
- "version": "0.14.3",
- "resolved": "https://registry.npmjs.org/listr/-/listr-0.14.3.tgz",
- "integrity": "sha512-RmAl7su35BFd/xoMamRjpIE4j3v+L28o8CT5YhAXQJm1fD+1l9ngXY8JAQRJ+tFK2i5njvi0iRUKV09vPwA0iA==",
+ "listr2": {
+ "version": "1.3.8",
+ "resolved": "https://registry.npmjs.org/listr2/-/listr2-1.3.8.tgz",
+ "integrity": "sha512-iRDRVTgSDz44tBeBBg/35TQz4W+EZBWsDUq7hPpqeUHm7yLPNll0rkwW3lIX9cPAK7l+x95mGWLpxjqxftNfZA==",
"requires": {
"@samverschueren/stream-to-observable": "^0.3.0",
- "is-observable": "^1.1.0",
- "is-promise": "^2.1.0",
- "is-stream": "^1.1.0",
- "listr-silent-renderer": "^1.1.1",
- "listr-update-renderer": "^0.5.0",
- "listr-verbose-renderer": "^0.5.0",
- "p-map": "^2.0.0",
- "rxjs": "^6.3.3"
- }
- },
- "listr-silent-renderer": {
- "version": "1.1.1",
- "resolved": "https://registry.npmjs.org/listr-silent-renderer/-/listr-silent-renderer-1.1.1.tgz",
- "integrity": "sha1-kktaN1cVN3C/Go4/v3S4u/P5JC4="
- },
- "listr-update-renderer": {
- "version": "0.5.0",
- "resolved": "https://registry.npmjs.org/listr-update-renderer/-/listr-update-renderer-0.5.0.tgz",
- "integrity": "sha512-tKRsZpKz8GSGqoI/+caPmfrypiaq+OQCbd+CovEC24uk1h952lVj5sC7SqyFUm+OaJ5HN/a1YLt5cit2FMNsFA==",
- "requires": {
- "chalk": "^1.1.3",
- "cli-truncate": "^0.2.1",
- "elegant-spinner": "^1.0.1",
- "figures": "^1.7.0",
- "indent-string": "^3.0.0",
- "log-symbols": "^1.0.2",
- "log-update": "^2.3.0",
- "strip-ansi": "^3.0.1"
+ "chalk": "^3.0.0",
+ "cli-cursor": "^3.1.0",
+ "cli-truncate": "^2.1.0",
+ "elegant-spinner": "^2.0.0",
+ "enquirer": "^2.3.4",
+ "figures": "^3.2.0",
+ "indent-string": "^4.0.0",
+ "log-update": "^4.0.0",
+ "p-map": "^4.0.0",
+ "pad": "^3.2.0",
+ "rxjs": "^6.3.3",
+ "through": "^2.3.8",
+ "uuid": "^7.0.2"
},
"dependencies": {
- "ansi-regex": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz",
- "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8="
- },
"ansi-styles": {
- "version": "2.2.1",
- "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-2.2.1.tgz",
- "integrity": "sha1-tDLdM1i2NM914eRmQ2gkBTPB3b4="
+ "version": "4.2.1",
+ "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-4.2.1.tgz",
+ "integrity": "sha512-9VGjrMsG1vePxcSweQsN20KY/c4zN0h9fLjqAbwbPfahM3t+NL+M9HC8xeXG2I8pX5NoamTGNuomEUFI7fcUjA==",
+ "requires": {
+ "@types/color-name": "^1.1.1",
+ "color-convert": "^2.0.1"
+ }
},
"chalk": {
- "version": "1.1.3",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-1.1.3.tgz",
- "integrity": "sha1-qBFcVeSnAv5NFQq9OHKCKn4J/Jg=",
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/chalk/-/chalk-3.0.0.tgz",
+ "integrity": "sha512-4D3B6Wf41KOYRFdszmDqMCGq5VV/uMAB273JILmO+3jAlh8X4qDtdtgCR3fxtbLEMzSx22QdhnDcJvu2u1fVwg==",
"requires": {
- "ansi-styles": "^2.2.1",
- "escape-string-regexp": "^1.0.2",
- "has-ansi": "^2.0.0",
- "strip-ansi": "^3.0.0",
- "supports-color": "^2.0.0"
+ "ansi-styles": "^4.1.0",
+ "supports-color": "^7.1.0"
}
},
- "figures": {
- "version": "1.7.0",
- "resolved": "https://registry.npmjs.org/figures/-/figures-1.7.0.tgz",
- "integrity": "sha1-y+Hjr/zxzUS4DK3+0o3Hk6lwHS4=",
+ "color-convert": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/color-convert/-/color-convert-2.0.1.tgz",
+ "integrity": "sha512-RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ==",
"requires": {
- "escape-string-regexp": "^1.0.5",
- "object-assign": "^4.1.0"
+ "color-name": "~1.1.4"
}
},
- "indent-string": {
- "version": "3.2.0",
- "resolved": "https://registry.npmjs.org/indent-string/-/indent-string-3.2.0.tgz",
- "integrity": "sha1-Sl/W0nzDMvN+VBmlBNu4NxBckok="
+ "color-name": {
+ "version": "1.1.4",
+ "resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.4.tgz",
+ "integrity": "sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA=="
},
- "log-symbols": {
- "version": "1.0.2",
- "resolved": "https://registry.npmjs.org/log-symbols/-/log-symbols-1.0.2.tgz",
- "integrity": "sha1-N2/3tY6jCGoPCfrMdGF+ylAeGhg=",
- "requires": {
- "chalk": "^1.0.0"
- }
+ "has-flag": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-4.0.0.tgz",
+ "integrity": "sha512-EykJT/Q1KjTWctppgIAgfSO0tKVuZUjhgMr17kqTumMl6Afv3EISleU7qZUzoXDFTAHTDC4NOoG/ZxU3EvlMPQ=="
},
- "strip-ansi": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz",
- "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=",
+ "supports-color": {
+ "version": "7.1.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-7.1.0.tgz",
+ "integrity": "sha512-oRSIpR8pxT1Wr2FquTNnGet79b3BWljqOuoW/h4oBhxJ/HUbX5nX6JSruTkvXDCFMwDPvsaTTbvMLKZWSy0R5g==",
"requires": {
- "ansi-regex": "^2.0.0"
+ "has-flag": "^4.0.0"
}
- },
- "supports-color": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-2.0.0.tgz",
- "integrity": "sha1-U10EXOa2Nj+kARcIRimZXp3zJMc="
}
}
},
- "listr-verbose-renderer": {
- "version": "0.5.0",
- "resolved": "https://registry.npmjs.org/listr-verbose-renderer/-/listr-verbose-renderer-0.5.0.tgz",
- "integrity": "sha512-04PDPqSlsqIOaaaGZ+41vq5FejI9auqTInicFRndCBgE3bXG8D6W1I+mWhk+1nqbHmyhla/6BUrd5OSiHwKRXw==",
+ "load-json-file": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-4.0.0.tgz",
+ "integrity": "sha1-L19Fq5HjMhYjT9U62rZo607AmTs=",
"requires": {
- "chalk": "^2.4.1",
- "cli-cursor": "^2.1.0",
- "date-fns": "^1.27.2",
- "figures": "^2.0.0"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- }
- },
- "cli-cursor": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/cli-cursor/-/cli-cursor-2.1.0.tgz",
- "integrity": "sha1-s12sN2R5+sw+lHR9QdDQ9SOP/LU=",
- "requires": {
- "restore-cursor": "^2.0.0"
- }
- },
- "figures": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/figures/-/figures-2.0.0.tgz",
- "integrity": "sha1-OrGi0qYsi/tDGgyUy3l6L84nyWI=",
- "requires": {
- "escape-string-regexp": "^1.0.5"
- }
- },
- "mimic-fn": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-1.2.0.tgz",
- "integrity": "sha512-jf84uxzwiuiIVKiOLpfYk7N46TSy8ubTonmneY9vrpHNAnp0QBt2BxWV9dO3/j+BoVAb+a5G6YDPW3M5HOdMWQ=="
- },
- "onetime": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/onetime/-/onetime-2.0.1.tgz",
- "integrity": "sha1-BnQoIw/WdEOyeUsiu6UotoZ5YtQ=",
- "requires": {
- "mimic-fn": "^1.0.0"
- }
- },
- "restore-cursor": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/restore-cursor/-/restore-cursor-2.0.0.tgz",
- "integrity": "sha1-n37ih/gv0ybU/RYpI9YhKe7g368=",
- "requires": {
- "onetime": "^2.0.0",
- "signal-exit": "^3.0.2"
- }
- }
- }
- },
- "load-json-file": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-4.0.0.tgz",
- "integrity": "sha1-L19Fq5HjMhYjT9U62rZo607AmTs=",
- "requires": {
- "graceful-fs": "^4.1.2",
- "parse-json": "^4.0.0",
- "pify": "^3.0.0",
- "strip-bom": "^3.0.0"
+ "graceful-fs": "^4.1.2",
+ "parse-json": "^4.0.0",
+ "pify": "^3.0.0",
+ "strip-bom": "^3.0.0"
},
"dependencies": {
"pify": {
@@ -9848,31 +8246,21 @@
"integrity": "sha512-Jsmr89RcXGIwivFY21FcRrisYZfvLMTWx5kOLc+JTxtpBOG6xML0vzbc6SEQG2FO9/4Fc3wW4LVcB5DmGflaRw=="
},
"loader-utils": {
- "version": "1.2.3",
- "resolved": "https://registry.npmjs.org/loader-utils/-/loader-utils-1.2.3.tgz",
- "integrity": "sha512-fkpz8ejdnEMG3s37wGL07iSBDg99O9D5yflE9RGNH3hRdx9SOwYfnGYdZOUIZitN8E+E2vkq3MUMYMvPYl5ZZA==",
+ "version": "1.4.0",
+ "resolved": "https://registry.npmjs.org/loader-utils/-/loader-utils-1.4.0.tgz",
+ "integrity": "sha512-qH0WSMBtn/oHuwjy/NucEgbx5dbxxnxup9s4PVXJUDHZBQY+s0NWA9rJf53RBnQZxfch7euUui7hpoAPvALZdA==",
"requires": {
"big.js": "^5.2.2",
- "emojis-list": "^2.0.0",
+ "emojis-list": "^3.0.0",
"json5": "^1.0.1"
- },
- "dependencies": {
- "json5": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/json5/-/json5-1.0.1.tgz",
- "integrity": "sha512-aKS4WQjPenRxiQsC93MNfjx+nbF4PAdYzmd/1JIj8HYzqfbu86beTuNgXDzPknWk0n0uARlyewZo4s++ES36Ow==",
- "requires": {
- "minimist": "^1.2.0"
- }
- }
}
},
"locate-path": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-3.0.0.tgz",
- "integrity": "sha512-7AO748wWnIhNqAuaty2ZWHkQHRSNfPVIsPIfwEOWO22AmaoVrWavlOcMR5nzTLNYvp36X220/maaRsrec1G65A==",
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-2.0.0.tgz",
+ "integrity": "sha1-K1aLJl7slExtnA3pw9u7ygNUzY4=",
"requires": {
- "p-locate": "^3.0.0",
+ "p-locate": "^2.0.0",
"path-exists": "^3.0.0"
}
},
@@ -9891,55 +8279,20 @@
"resolved": "https://registry.npmjs.org/lodash._reinterpolate/-/lodash._reinterpolate-3.0.0.tgz",
"integrity": "sha1-DM8tiRZq8Ds2Y8eWU4t1rG4RTZ0="
},
- "lodash.camelcase": {
- "version": "4.3.0",
- "resolved": "https://registry.npmjs.org/lodash.camelcase/-/lodash.camelcase-4.3.0.tgz",
- "integrity": "sha1-soqmKIorn8ZRA1x3EfZathkDMaY="
- },
- "lodash.curry": {
- "version": "4.1.1",
- "resolved": "https://registry.npmjs.org/lodash.curry/-/lodash.curry-4.1.1.tgz",
- "integrity": "sha1-JI42By7ekGUB11lmIAqG2riyMXA="
- },
- "lodash.includes": {
- "version": "4.3.0",
- "resolved": "https://registry.npmjs.org/lodash.includes/-/lodash.includes-4.3.0.tgz",
- "integrity": "sha1-YLuYqHy5I8aMoeUTJUgzFISfVT8="
- },
- "lodash.isboolean": {
- "version": "3.0.3",
- "resolved": "https://registry.npmjs.org/lodash.isboolean/-/lodash.isboolean-3.0.3.tgz",
- "integrity": "sha1-bC4XHbKiV82WgC/UOwGyDV9YcPY="
- },
"lodash.isequal": {
"version": "4.5.0",
"resolved": "https://registry.npmjs.org/lodash.isequal/-/lodash.isequal-4.5.0.tgz",
"integrity": "sha1-QVxEePK8wwEgwizhDtMib30+GOA="
},
- "lodash.isinteger": {
- "version": "4.0.4",
- "resolved": "https://registry.npmjs.org/lodash.isinteger/-/lodash.isinteger-4.0.4.tgz",
- "integrity": "sha1-YZwK89A/iwTDH1iChAt3sRzWg0M="
- },
- "lodash.isnumber": {
- "version": "3.0.3",
- "resolved": "https://registry.npmjs.org/lodash.isnumber/-/lodash.isnumber-3.0.3.tgz",
- "integrity": "sha1-POdoEMWSjQM1IwGsKHMX8RwLH/w="
- },
- "lodash.isplainobject": {
- "version": "4.0.6",
- "resolved": "https://registry.npmjs.org/lodash.isplainobject/-/lodash.isplainobject-4.0.6.tgz",
- "integrity": "sha1-fFJqUtibRcRcxpC4gWO+BJf1UMs="
- },
"lodash.isstring": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/lodash.isstring/-/lodash.isstring-4.0.1.tgz",
"integrity": "sha1-1SfftUVuynzJu5XV2ur4i6VKVFE="
},
- "lodash.once": {
- "version": "4.1.1",
- "resolved": "https://registry.npmjs.org/lodash.once/-/lodash.once-4.1.1.tgz",
- "integrity": "sha1-DdOXEhPHxW34gJd9UEyI+0cal6w="
+ "lodash.memoize": {
+ "version": "4.1.2",
+ "resolved": "https://registry.npmjs.org/lodash.memoize/-/lodash.memoize-4.1.2.tgz",
+ "integrity": "sha1-vMbEmkKihA7Zl/Mj6tpezRguC/4="
},
"lodash.template": {
"version": "4.5.0",
@@ -9989,79 +8342,51 @@
}
},
"log-update": {
- "version": "2.3.0",
- "resolved": "https://registry.npmjs.org/log-update/-/log-update-2.3.0.tgz",
- "integrity": "sha1-iDKP19HOeTiykoN0bwsbwSayRwg=",
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/log-update/-/log-update-4.0.0.tgz",
+ "integrity": "sha512-9fkkDevMefjg0mmzWFBW8YkFP91OrizzkW3diF7CpG+S2EYdy4+TVfGwz1zeF8x7hCx1ovSPTOE9Ngib74qqUg==",
"requires": {
- "ansi-escapes": "^3.0.0",
- "cli-cursor": "^2.0.0",
- "wrap-ansi": "^3.0.1"
+ "ansi-escapes": "^4.3.0",
+ "cli-cursor": "^3.1.0",
+ "slice-ansi": "^4.0.0",
+ "wrap-ansi": "^6.2.0"
},
"dependencies": {
- "ansi-escapes": {
- "version": "3.2.0",
- "resolved": "https://registry.npmjs.org/ansi-escapes/-/ansi-escapes-3.2.0.tgz",
- "integrity": "sha512-cBhpre4ma+U0T1oM5fXg7Dy1Jw7zzwv7lt/GoCpr+hDQJoYnKVPLL4dCvSEFMmQurOQvSrwT7SL/DAlhBI97RQ=="
- },
- "ansi-regex": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-3.0.0.tgz",
- "integrity": "sha1-7QMXwyIGT3lGbAKWa922Bas32Zg="
- },
- "cli-cursor": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/cli-cursor/-/cli-cursor-2.1.0.tgz",
- "integrity": "sha1-s12sN2R5+sw+lHR9QdDQ9SOP/LU=",
+ "ansi-styles": {
+ "version": "4.2.1",
+ "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-4.2.1.tgz",
+ "integrity": "sha512-9VGjrMsG1vePxcSweQsN20KY/c4zN0h9fLjqAbwbPfahM3t+NL+M9HC8xeXG2I8pX5NoamTGNuomEUFI7fcUjA==",
"requires": {
- "restore-cursor": "^2.0.0"
+ "@types/color-name": "^1.1.1",
+ "color-convert": "^2.0.1"
}
},
- "mimic-fn": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-1.2.0.tgz",
- "integrity": "sha512-jf84uxzwiuiIVKiOLpfYk7N46TSy8ubTonmneY9vrpHNAnp0QBt2BxWV9dO3/j+BoVAb+a5G6YDPW3M5HOdMWQ=="
+ "astral-regex": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/astral-regex/-/astral-regex-2.0.0.tgz",
+ "integrity": "sha512-Z7tMw1ytTXt5jqMcOP+OQteU1VuNK9Y02uuJtKQ1Sv69jXQKKg5cibLwGJow8yzZP+eAc18EmLGPal0bp36rvQ=="
},
- "onetime": {
+ "color-convert": {
"version": "2.0.1",
- "resolved": "https://registry.npmjs.org/onetime/-/onetime-2.0.1.tgz",
- "integrity": "sha1-BnQoIw/WdEOyeUsiu6UotoZ5YtQ=",
- "requires": {
- "mimic-fn": "^1.0.0"
- }
- },
- "restore-cursor": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/restore-cursor/-/restore-cursor-2.0.0.tgz",
- "integrity": "sha1-n37ih/gv0ybU/RYpI9YhKe7g368=",
+ "resolved": "https://registry.npmjs.org/color-convert/-/color-convert-2.0.1.tgz",
+ "integrity": "sha512-RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ==",
"requires": {
- "onetime": "^2.0.0",
- "signal-exit": "^3.0.2"
+ "color-name": "~1.1.4"
}
},
- "string-width": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/string-width/-/string-width-2.1.1.tgz",
- "integrity": "sha512-nOqH59deCq9SRHlxq1Aw85Jnt4w6KvLKqWVik6oA9ZklXLNIOlqg4F2yrT1MVaTjAqvVwdfeZ7w7aCvJD7ugkw==",
- "requires": {
- "is-fullwidth-code-point": "^2.0.0",
- "strip-ansi": "^4.0.0"
- }
+ "color-name": {
+ "version": "1.1.4",
+ "resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.4.tgz",
+ "integrity": "sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA=="
},
- "strip-ansi": {
+ "slice-ansi": {
"version": "4.0.0",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-4.0.0.tgz",
- "integrity": "sha1-qEeQIusaw2iocTibY1JixQXuNo8=",
- "requires": {
- "ansi-regex": "^3.0.0"
- }
- },
- "wrap-ansi": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-3.0.1.tgz",
- "integrity": "sha1-KIoE2H7aXChuBg3+jxNc6NAH+Lo=",
+ "resolved": "https://registry.npmjs.org/slice-ansi/-/slice-ansi-4.0.0.tgz",
+ "integrity": "sha512-qMCMfhY040cVHT43K9BFygqYbUPFZKHOg7K73mtTWJRb8pyP3fzf4Ixd5SzdEJQ6MRUg/WBnOLxghZtKKurENQ==",
"requires": {
- "string-width": "^2.1.1",
- "strip-ansi": "^4.0.0"
+ "ansi-styles": "^4.0.0",
+ "astral-regex": "^2.0.0",
+ "is-fullwidth-code-point": "^3.0.0"
}
}
}
@@ -10113,35 +8438,11 @@
"signal-exit": "^3.0.0"
}
},
- "lower-case": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/lower-case/-/lower-case-2.0.1.tgz",
- "integrity": "sha512-LiWgfDLLb1dwbFQZsSglpRj+1ctGnayXz3Uv0/WO8n558JycT5fg6zkNcnW0G68Nn0aEldTFeEfmjCfmqry/rQ==",
- "requires": {
- "tslib": "^1.10.0"
- }
- },
"lowercase-keys": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/lowercase-keys/-/lowercase-keys-1.0.1.tgz",
"integrity": "sha512-G2Lj61tXDnVFFOi8VZds+SoQjtQC3dgokKdDG2mTm1tx4m50NUHBOZSBwQQHyy0V12A0JTG4icfZQH+xPyh8VA=="
},
- "lowlight": {
- "version": "1.13.1",
- "resolved": "https://registry.npmjs.org/lowlight/-/lowlight-1.13.1.tgz",
- "integrity": "sha512-kQ71/T6RksEVz9AlPq07/2m+SU/1kGvt9k39UtvHX760u4SaWakaYH7hYgH5n6sTsCWk4MVYzUzLU59aN5CSmQ==",
- "requires": {
- "fault": "^1.0.0",
- "highlight.js": "~9.16.0"
- },
- "dependencies": {
- "highlight.js": {
- "version": "9.16.2",
- "resolved": "https://registry.npmjs.org/highlight.js/-/highlight.js-9.16.2.tgz",
- "integrity": "sha512-feMUrVLZvjy0oC7FVJQcSQRqbBq9kwqnYE4+Kj9ZjbHh3g+BisiPgF49NyQbVLNdrL/qqZr3Ca9yOKwgn2i/tw=="
- }
- }
- },
"lpad-align": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/lpad-align/-/lpad-align-1.1.2.tgz",
@@ -10192,11 +8493,6 @@
}
}
},
- "mamacro": {
- "version": "0.0.3",
- "resolved": "https://registry.npmjs.org/mamacro/-/mamacro-0.0.3.tgz",
- "integrity": "sha512-qMEwh+UujcQ+kbz3T6V+wAmO2U8veoq2w+3wY8MquqwVA3jChfwY+Tk52GZKDfACEPjuZ7r2oJLejwpt8jtwTA=="
- },
"map-cache": {
"version": "0.2.2",
"resolved": "https://registry.npmjs.org/map-cache/-/map-cache-0.2.2.tgz",
@@ -10238,6 +8534,13 @@
"charenc": "~0.0.1",
"crypt": "~0.0.1",
"is-buffer": "~1.1.1"
+ },
+ "dependencies": {
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ }
}
},
"md5.js": {
@@ -10251,11 +8554,11 @@
}
},
"mdast-squeeze-paragraphs": {
- "version": "3.0.5",
- "resolved": "https://registry.npmjs.org/mdast-squeeze-paragraphs/-/mdast-squeeze-paragraphs-3.0.5.tgz",
- "integrity": "sha512-xX6Vbe348Y/rukQlG4W3xH+7v4ZlzUbSY4HUIQCuYrF2DrkcHx584mCaFxkWoDZKNUfyLZItHC9VAqX3kIP7XA==",
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/mdast-squeeze-paragraphs/-/mdast-squeeze-paragraphs-4.0.0.tgz",
+ "integrity": "sha512-zxdPn69hkQ1rm4J+2Cs2j6wDEv7O17TfXTJ33tl/+JPIoEmtV9t2ZzBM5LPHE8QlHsmVD8t3vPKCyY3oH+H8MQ==",
"requires": {
- "unist-util-remove": "^1.0.0"
+ "unist-util-remove": "^2.0.0"
}
},
"mdast-util-compact": {
@@ -10277,32 +8580,22 @@
}
},
"mdast-util-definitions": {
- "version": "1.2.5",
- "resolved": "https://registry.npmjs.org/mdast-util-definitions/-/mdast-util-definitions-1.2.5.tgz",
- "integrity": "sha512-CJXEdoLfiISCDc2JB6QLb79pYfI6+GcIH+W2ox9nMc7od0Pz+bovcHsiq29xAQY6ayqe/9CsK2VzkSJdg1pFYA==",
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/mdast-util-definitions/-/mdast-util-definitions-2.0.1.tgz",
+ "integrity": "sha512-Co+DQ6oZlUzvUR7JCpP249PcexxygiaKk9axJh+eRzHDZJk2julbIdKB4PXHVxdBuLzvJ1Izb+YDpj2deGMOuA==",
"requires": {
- "unist-util-visit": "^1.0.0"
- },
- "dependencies": {
- "unist-util-visit": {
- "version": "1.4.1",
- "resolved": "https://registry.npmjs.org/unist-util-visit/-/unist-util-visit-1.4.1.tgz",
- "integrity": "sha512-AvGNk7Bb//EmJZyhtRUnNMEpId/AZ5Ph/KUpTI09WHQuDZHKovQ1oEv3mfmKpWKtoMzyMC4GLBm1Zy5k12fjIw==",
- "requires": {
- "unist-util-visit-parents": "^2.0.0"
- }
- }
+ "unist-util-visit": "^2.0.0"
}
},
"mdast-util-to-hast": {
- "version": "7.0.0",
- "resolved": "https://registry.npmjs.org/mdast-util-to-hast/-/mdast-util-to-hast-7.0.0.tgz",
- "integrity": "sha512-vxnXKSZgvPG2grZM3kxaF052pxsLtq8TPAkiMkqYj1nFTOazYUPXt3LFYIEB6Ws/IX7Uyvljzk64kD6DwZl/wQ==",
+ "version": "8.2.0",
+ "resolved": "https://registry.npmjs.org/mdast-util-to-hast/-/mdast-util-to-hast-8.2.0.tgz",
+ "integrity": "sha512-WjH/KXtqU66XyTJQ7tg7sjvTw1OQcVV0hKdFh3BgHPwZ96fSBCQ/NitEHsN70Mmnggt+5eUUC7pCnK+2qGQnCA==",
"requires": {
"collapse-white-space": "^1.0.0",
"detab": "^2.0.0",
- "mdast-util-definitions": "^1.2.0",
- "mdurl": "^1.0.1",
+ "mdast-util-definitions": "^2.0.0",
+ "mdurl": "^1.0.0",
"trim-lines": "^1.0.0",
"unist-builder": "^2.0.0",
"unist-util-generated": "^1.0.0",
@@ -10377,23 +8670,12 @@
"integrity": "sha512-jo1OfR4TaEwd5HOrt5+tAZ9mqT4jmpNAusXtyfNzqVm9uiSYFZlKM1wYL4oU7azZW/PxQW53wM0S6OR1JHNa2g=="
},
"micromatch": {
- "version": "3.1.10",
- "resolved": "https://registry.npmjs.org/micromatch/-/micromatch-3.1.10.tgz",
- "integrity": "sha512-MWikgl9n9M3w+bpsY3He8L+w9eF9338xRl8IAO5viDizwSzziFEyUzo2xrrloB64ADbTf8uA8vRqqttDTOmccg==",
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/micromatch/-/micromatch-4.0.2.tgz",
+ "integrity": "sha512-y7FpHSbMUMoyPbYUSzO6PaZ6FyRnQOpHuKwbo1G+Knck95XVU4QAiKdGEnj5wwoS7PlOgthX/09u5iFJ+aYf5Q==",
"requires": {
- "arr-diff": "^4.0.0",
- "array-unique": "^0.3.2",
- "braces": "^2.3.1",
- "define-property": "^2.0.2",
- "extend-shallow": "^3.0.2",
- "extglob": "^2.0.4",
- "fragment-cache": "^0.2.1",
- "kind-of": "^6.0.2",
- "nanomatch": "^1.2.9",
- "object.pick": "^1.3.0",
- "regex-not": "^1.0.0",
- "snapdragon": "^0.8.1",
- "to-regex": "^3.0.2"
+ "braces": "^3.0.1",
+ "picomatch": "^2.0.5"
}
},
"miller-rabin": {
@@ -10403,6 +8685,13 @@
"requires": {
"bn.js": "^4.0.0",
"brorand": "^1.0.1"
+ },
+ "dependencies": {
+ "bn.js": {
+ "version": "4.11.8",
+ "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.11.8.tgz",
+ "integrity": "sha512-ItfYfPLkWHUjckQCk8xC+LwxgK8NYcXywGigJgSwOP8Y2iyWT4f2vsZnoOXTTbo+o5yXmIUJ4gn5538SO5S3gA=="
+ }
}
},
"mime": {
@@ -10411,16 +8700,16 @@
"integrity": "sha512-x0Vn8spI+wuJ1O6S7gnbaQg8Pxh4NNHb7KSINmEWKiPE4RKOplvijn+NkmYmmRgP68mc70j2EbeTFRsrswaQeg=="
},
"mime-db": {
- "version": "1.43.0",
- "resolved": "https://registry.npmjs.org/mime-db/-/mime-db-1.43.0.tgz",
- "integrity": "sha512-+5dsGEEovYbT8UY9yD7eE4XTc4UwJ1jBYlgaQQF38ENsKR3wj/8q8RFZrF9WIZpB2V1ArTVFUva8sAul1NzRzQ=="
+ "version": "1.44.0",
+ "resolved": "https://registry.npmjs.org/mime-db/-/mime-db-1.44.0.tgz",
+ "integrity": "sha512-/NOTfLrsPBVeH7YtFPgsVWveuL+4SjjYxaQ1xtM1KMFj7HdxlBlxeyNLzhyJVx7r4rZGJAZ/6lkKCitSc/Nmpg=="
},
"mime-types": {
- "version": "2.1.26",
- "resolved": "https://registry.npmjs.org/mime-types/-/mime-types-2.1.26.tgz",
- "integrity": "sha512-01paPWYgLrkqAyrlDorC1uDwl2p3qZT7yl806vW7DvDoxwXi46jsjFbg+WdwotBIk6/MbEhO/dh5aZ5sNj/dWQ==",
+ "version": "2.1.27",
+ "resolved": "https://registry.npmjs.org/mime-types/-/mime-types-2.1.27.tgz",
+ "integrity": "sha512-JIhqnCasI9yD+SsmkquHBxTSEuZdQX5BuQnS2Vc7puQQQ+8yiP5AY5uWhpdv4YL4VM5c6iliiYWPgJ/nJQLp7w==",
"requires": {
- "mime-db": "1.43.0"
+ "mime-db": "1.44.0"
}
},
"mimic-fn": {
@@ -10433,16 +8722,6 @@
"resolved": "https://registry.npmjs.org/mimic-response/-/mimic-response-1.0.1.tgz",
"integrity": "sha512-j5EctnkH7amfV/q5Hgmoal1g2QHFJRraOtmx0JpIqkxhBhI/lJSl1nMpQ45hVarwNETOoWEimndZ4QK0RHxuxQ=="
},
- "mini-css-extract-plugin": {
- "version": "0.4.3",
- "resolved": "https://registry.npmjs.org/mini-css-extract-plugin/-/mini-css-extract-plugin-0.4.3.tgz",
- "integrity": "sha512-Mxs0nxzF1kxPv4TRi2NimewgXlJqh0rGE30vviCU2WHrpbta6wklnUV9dr9FUtoAHmB3p3LeXEC+ZjgHvB0Dzg==",
- "requires": {
- "loader-utils": "^1.1.0",
- "schema-utils": "^1.0.0",
- "webpack-sources": "^1.1.0"
- }
- },
"minimalistic-assert": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/minimalistic-assert/-/minimalistic-assert-1.0.1.tgz",
@@ -10462,9 +8741,9 @@
}
},
"minimist": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz",
- "integrity": "sha1-o1AIsg9BOD7sH7kU9M1d95omQoQ="
+ "version": "1.2.5",
+ "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz",
+ "integrity": "sha512-FM9nNUYrRBAELZQT3xeZQ7fmMOBg6nWNmJKTcgsJeaLstP/UODVpGsr5OhXhhXg6f+qtJ8uiZ+PUxkDWcgIXLw=="
},
"mississippi": {
"version": "3.0.0",
@@ -10503,18 +8782,11 @@
}
},
"mkdirp": {
- "version": "0.5.1",
- "resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-0.5.1.tgz",
- "integrity": "sha1-MAV0OOrGz3+MR2fzhkjWaX11yQM=",
+ "version": "0.5.5",
+ "resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-0.5.5.tgz",
+ "integrity": "sha512-NKmAlESf6jMGym1++R0Ra7wvhV+wFW63FaSOFPwRahvea0gMUcGUhVeAg/0BC0wiv9ih5NYPB1Wn1UEI1/L+xQ==",
"requires": {
- "minimist": "0.0.8"
- },
- "dependencies": {
- "minimist": {
- "version": "0.0.8",
- "resolved": "https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz",
- "integrity": "sha1-hX/Kv8M5fSYluCKCYuhqp6ARsF0="
- }
+ "minimist": "^1.2.5"
}
},
"move-concurrently": {
@@ -10546,9 +8818,9 @@
"integrity": "sha512-d2RKzMD4JNyHMbnbWnznPaa8vbdlq/4pNZ3IgdaGrVbBhebBsGUUE/6qorTMYNS6TwuH3ilfOlD2bf4Igh8CKg=="
},
"ms": {
- "version": "2.1.2",
- "resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz",
- "integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w=="
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
+ "integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
},
"multimatch": {
"version": "4.0.0",
@@ -10562,6 +8834,11 @@
"minimatch": "^3.0.4"
},
"dependencies": {
+ "array-union": {
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/array-union/-/array-union-2.1.0.tgz",
+ "integrity": "sha512-HGyxoOTYUyCM6stUe6EJgnd4EoewAI7zMdfqO+kGjnlZmBDz/cR5pf8r/cR4Wq60sL/p0IkcjUEEPwS3GFrIyw=="
+ },
"arrify": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/arrify/-/arrify-2.0.1.tgz",
@@ -10575,9 +8852,9 @@
"integrity": "sha512-nnbWWOkoWyUsTjKrhgD0dcz22mdkSnpYqbEjIm2nhwhuxlSkpywJmBo8h0ZqJdkp73mb90SssHkN4rsRaBAfAA=="
},
"nan": {
- "version": "2.14.0",
- "resolved": "https://registry.npmjs.org/nan/-/nan-2.14.0.tgz",
- "integrity": "sha512-INOFj37C7k3AfaNTtX8RhsTw7qRy7eLET14cROi9+5HAVbbHuIWUHEauBv5qT4Av2tWasiTY1Jw6puUNqRJXQg==",
+ "version": "2.14.1",
+ "resolved": "https://registry.npmjs.org/nan/-/nan-2.14.1.tgz",
+ "integrity": "sha512-isWHgVjnFjh2x2yuJ/tj3JbwoHu3UC2dX5G/88Cm24yB6YopVgxvBObDY7n5xW6ExmFhJpSEQqFPvq9zaXc8Jw==",
"optional": true
},
"nanomatch": {
@@ -10596,12 +8873,31 @@
"regex-not": "^1.0.0",
"snapdragon": "^0.8.1",
"to-regex": "^3.0.1"
+ },
+ "dependencies": {
+ "extend-shallow": {
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-3.0.2.tgz",
+ "integrity": "sha1-Jqcarwc7OfshJxcnRhMcJwQCjbg=",
+ "requires": {
+ "assign-symbols": "^1.0.0",
+ "is-extendable": "^1.0.1"
+ }
+ },
+ "is-extendable": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/is-extendable/-/is-extendable-1.0.1.tgz",
+ "integrity": "sha512-arnXMxT1hhoKo9k1LZdmlNyJdDDfy2v0fXjFlmok4+i8ul/6WlbVge9bhM74OpNPQPMGUToDtz+KXa1PneJxOA==",
+ "requires": {
+ "is-plain-object": "^2.0.4"
+ }
+ }
}
},
"native-url": {
- "version": "0.2.6",
- "resolved": "https://registry.npmjs.org/native-url/-/native-url-0.2.6.tgz",
- "integrity": "sha512-k4bDC87WtgrdD362gZz6zoiXQrl40kYlBmpfmSjwRO1VU0V5ccwJTlxuE72F6m3V0vc1xOf6n3UCP9QyerRqmA==",
+ "version": "0.3.1",
+ "resolved": "https://registry.npmjs.org/native-url/-/native-url-0.3.1.tgz",
+ "integrity": "sha512-VL0XRW8nNBdSpxqZCbLJKrLHmIMn82FZ8pJzriJgyBmErjdEtrUX6eZAJbtHjlkMooEWUV+EtJ0D5tOP3+1Piw==",
"requires": {
"querystring": "^0.2.0"
}
@@ -10622,11 +8918,11 @@
"integrity": "sha512-iyam8fBuCUpWeKPGpaNMetEocMt364qkCsfL9JuhjXX6dRnguRVOfk2GZaDpPjcOKiiXCPINZC1GczQ7iTq3Zw=="
},
"next": {
- "version": "9.3.3",
- "resolved": "https://registry.npmjs.org/next/-/next-9.3.3.tgz",
- "integrity": "sha512-YIuHOLmEi4NYsXwOij3KL2NAOTDlsuxSoSzjdxD/NHYpAkfQ5z5ComR0HsnA5fpv0/waKtb22H9piR4vP6Sxsg==",
+ "version": "9.3.6",
+ "resolved": "https://registry.npmjs.org/next/-/next-9.3.6.tgz",
+ "integrity": "sha512-b46i+qw2SYMVTOObc7GqUizt1zH1fB3T5qcOiCpl9utD7/LcWZkSxSPe7ZJtpAdFnl8V/7A58ADSvU1oxDDWug==",
"requires": {
- "@ampproject/toolbox-optimizer": "2.0.1",
+ "@ampproject/toolbox-optimizer": "2.2.0",
"@babel/core": "7.7.2",
"@babel/plugin-proposal-class-properties": "7.7.0",
"@babel/plugin-proposal-nullish-coalescing-operator": "7.7.4",
@@ -10642,79 +8938,32 @@
"@babel/preset-react": "7.7.0",
"@babel/preset-typescript": "7.7.2",
"@babel/runtime": "7.7.2",
- "@babel/types": "7.7.4",
- "@next/polyfill-nomodule": "9.3.3",
- "amphtml-validator": "1.0.30",
- "async-retry": "1.2.3",
- "async-sema": "3.0.0",
- "autodll-webpack-plugin": "0.4.2",
- "babel-core": "7.0.0-bridge.0",
- "babel-loader": "8.0.6",
+ "@next/react-refresh-utils": "9.3.6",
"babel-plugin-syntax-jsx": "6.18.0",
"babel-plugin-transform-define": "2.0.0",
"babel-plugin-transform-react-remove-prop-types": "0.4.24",
"browserslist": "4.8.3",
- "cache-loader": "4.1.0",
- "chalk": "2.4.2",
- "ci-info": "2.0.0",
- "compression": "1.7.4",
- "conf": "5.0.0",
- "content-type": "1.0.4",
- "cookie": "0.4.0",
- "css-loader": "3.3.0",
- "cssnano-simple": "1.0.0",
- "devalue": "2.0.1",
- "escape-string-regexp": "2.0.0",
- "etag": "1.8.1",
- "file-loader": "4.2.0",
- "finally-polyfill": "0.1.0",
- "find-up": "4.0.0",
+ "css-loader": "3.5.3",
+ "find-cache-dir": "3.3.1",
"fork-ts-checker-webpack-plugin": "3.1.1",
- "fresh": "0.5.2",
- "gzip-size": "5.1.1",
- "http-proxy": "1.18.0",
- "ignore-loader": "0.1.2",
- "is-docker": "2.0.0",
- "is-wsl": "2.1.1",
"jest-worker": "24.9.0",
- "json5": "2.1.2",
- "jsonwebtoken": "8.5.1",
- "launch-editor": "2.2.1",
"loader-utils": "2.0.0",
- "lodash.curry": "4.1.1",
- "lru-cache": "5.1.1",
"mini-css-extract-plugin": "0.8.0",
- "native-url": "0.2.6",
- "node-fetch": "2.6.0",
- "ora": "3.4.0",
- "path-to-regexp": "6.1.0",
+ "mkdirp": "0.5.3",
+ "native-url": "0.3.1",
"pnp-webpack-plugin": "1.5.0",
- "postcss-flexbugs-fixes": "4.2.0",
- "postcss-loader": "3.0.0",
- "postcss-preset-env": "6.7.0",
+ "postcss": "7.0.27",
"prop-types": "15.7.2",
"prop-types-exact": "1.2.0",
- "raw-body": "2.4.0",
- "react-error-overlay": "5.1.6",
"react-is": "16.8.6",
- "recast": "0.18.5",
+ "react-refresh": "0.8.1",
"resolve-url-loader": "3.1.1",
"sass-loader": "8.0.2",
- "send": "0.17.1",
- "source-map": "0.6.1",
- "string-hash": "1.1.3",
- "strip-ansi": "5.2.0",
- "style-loader": "1.0.0",
+ "style-loader": "1.2.0",
"styled-jsx": "3.2.5",
- "terser": "4.4.2",
- "thread-loader": "2.1.3",
- "unfetch": "4.1.0",
- "url": "0.11.0",
"use-subscription": "1.1.1",
"watchpack": "2.0.0-beta.13",
- "webpack": "4.42.0",
- "webpack-dev-middleware": "3.7.0",
- "webpack-hot-middleware": "2.25.0",
+ "webpack": "4.43.0",
"webpack-sources": "1.4.3"
},
"dependencies": {
@@ -10737,22 +8986,6 @@
"resolve": "^1.3.2",
"semver": "^5.4.1",
"source-map": "^0.5.0"
- },
- "dependencies": {
- "source-map": {
- "version": "0.5.7",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.5.7.tgz",
- "integrity": "sha1-igOdLRAh0i0eoUyA2OpGi6LvP8w="
- }
- }
- },
- "@babel/plugin-proposal-class-properties": {
- "version": "7.7.0",
- "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-class-properties/-/plugin-proposal-class-properties-7.7.0.tgz",
- "integrity": "sha512-tufDcFA1Vj+eWvwHN+jvMN6QsV5o+vUlytNKrbMiCeDL0F2j92RURzUsUMWE5EJkLyWxjdUslCsMQa9FWth16A==",
- "requires": {
- "@babel/helper-create-class-features-plugin": "^7.7.0",
- "@babel/helper-plugin-utils": "^7.0.0"
}
},
"@babel/plugin-proposal-object-rest-spread": {
@@ -10764,17 +8997,6 @@
"@babel/plugin-syntax-object-rest-spread": "^7.2.0"
}
},
- "@babel/plugin-transform-modules-commonjs": {
- "version": "7.7.0",
- "resolved": "https://registry.npmjs.org/@babel/plugin-transform-modules-commonjs/-/plugin-transform-modules-commonjs-7.7.0.tgz",
- "integrity": "sha512-KEMyWNNWnjOom8vR/1+d+Ocz/mILZG/eyHHO06OuBQ2aNhxT62fr4y6fGOplRx+CxCSp3IFwesL8WdINfY/3kg==",
- "requires": {
- "@babel/helper-module-transforms": "^7.7.0",
- "@babel/helper-plugin-utils": "^7.0.0",
- "@babel/helper-simple-access": "^7.7.0",
- "babel-plugin-dynamic-import-node": "^2.3.0"
- }
- },
"@babel/runtime": {
"version": "7.7.2",
"resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.7.2.tgz",
@@ -10783,27 +9005,6 @@
"regenerator-runtime": "^0.13.2"
}
},
- "@babel/types": {
- "version": "7.7.4",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.7.4.tgz",
- "integrity": "sha512-cz5Ji23KCi4T+YIE/BolWosrJuSmoZeN1EFnRtBwF+KKLi8GG/Z2c2hOJJeCXPk4mwk4QFvTmwIodJowXgttRA==",
- "requires": {
- "esutils": "^2.0.2",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- },
- "ajv": {
- "version": "6.12.0",
- "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.12.0.tgz",
- "integrity": "sha512-D6gFiFA0RRLyUbvijN74DWAjXSFxWKaWP7mldxkVhyhAV3+SWA9HEJPHQ2c9soIeTFJqcSdFDGFgdqs1iUU2Hw==",
- "requires": {
- "fast-deep-equal": "^3.1.1",
- "fast-json-stable-stringify": "^2.0.0",
- "json-schema-traverse": "^0.4.1",
- "uri-js": "^4.2.2"
- }
- },
"browserslist": {
"version": "4.8.3",
"resolved": "https://registry.npmjs.org/browserslist/-/browserslist-4.8.3.tgz",
@@ -10824,30 +9025,34 @@
"supports-color": "^5.3.0"
},
"dependencies": {
- "escape-string-regexp": {
- "version": "1.0.5",
- "resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-1.0.5.tgz",
- "integrity": "sha1-G2HAViGQqN/2rjuyzwIAyhMLhtQ="
+ "supports-color": {
+ "version": "5.5.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
+ "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
+ "requires": {
+ "has-flag": "^3.0.0"
+ }
}
}
},
"css-loader": {
- "version": "3.3.0",
- "resolved": "https://registry.npmjs.org/css-loader/-/css-loader-3.3.0.tgz",
- "integrity": "sha512-x9Y1vvHe5RR+4tzwFdWExPueK00uqFTCw7mZy+9aE/X1SKWOArm5luaOrtJ4d05IpOwJ6S86b/tVcIdhw1Bu4A==",
+ "version": "3.5.3",
+ "resolved": "https://registry.npmjs.org/css-loader/-/css-loader-3.5.3.tgz",
+ "integrity": "sha512-UEr9NH5Lmi7+dguAm+/JSPovNjYbm2k3TK58EiwQHzOHH5Jfq1Y+XoP2bQO6TMn7PptMd0opxxedAWcaSTRKHw==",
"requires": {
"camelcase": "^5.3.1",
"cssesc": "^3.0.0",
"icss-utils": "^4.1.1",
"loader-utils": "^1.2.3",
"normalize-path": "^3.0.0",
- "postcss": "^7.0.23",
+ "postcss": "^7.0.27",
"postcss-modules-extract-imports": "^2.0.0",
"postcss-modules-local-by-default": "^3.0.2",
- "postcss-modules-scope": "^2.1.1",
+ "postcss-modules-scope": "^2.2.0",
"postcss-modules-values": "^3.0.0",
- "postcss-value-parser": "^4.0.2",
- "schema-utils": "^2.6.0"
+ "postcss-value-parser": "^4.0.3",
+ "schema-utils": "^2.6.6",
+ "semver": "^6.3.0"
},
"dependencies": {
"json5": {
@@ -10867,56 +9072,14 @@
"emojis-list": "^3.0.0",
"json5": "^1.0.1"
}
+ },
+ "semver": {
+ "version": "6.3.0",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
+ "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
}
}
},
- "emojis-list": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/emojis-list/-/emojis-list-3.0.0.tgz",
- "integrity": "sha512-/kyM18EfinwXZbno9FyUGeFh87KC8HRQBQGildHZbEuRyWFOmv1U10o9BBp8XVZDVNNuQKyIGIu5ZYAAXJ0V2Q=="
- },
- "escape-string-regexp": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-2.0.0.tgz",
- "integrity": "sha512-UpzcLCXolUWcNu5HtVMHYdXJjArjsF9C0aNnquZYY4uW/Vu0miy5YoWvbV345HauVvcAUnpRuhMMcqTcGOY2+w=="
- },
- "file-loader": {
- "version": "4.2.0",
- "resolved": "https://registry.npmjs.org/file-loader/-/file-loader-4.2.0.tgz",
- "integrity": "sha512-+xZnaK5R8kBJrHK0/6HRlrKNamvVS5rjyuju+rnyxRGuwUJwpAMsVzUl5dz6rK8brkzjV6JpcFNjp6NqV0g1OQ==",
- "requires": {
- "loader-utils": "^1.2.3",
- "schema-utils": "^2.0.0"
- },
- "dependencies": {
- "json5": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/json5/-/json5-1.0.1.tgz",
- "integrity": "sha512-aKS4WQjPenRxiQsC93MNfjx+nbF4PAdYzmd/1JIj8HYzqfbu86beTuNgXDzPknWk0n0uARlyewZo4s++ES36Ow==",
- "requires": {
- "minimist": "^1.2.0"
- }
- },
- "loader-utils": {
- "version": "1.4.0",
- "resolved": "https://registry.npmjs.org/loader-utils/-/loader-utils-1.4.0.tgz",
- "integrity": "sha512-qH0WSMBtn/oHuwjy/NucEgbx5dbxxnxup9s4PVXJUDHZBQY+s0NWA9rJf53RBnQZxfch7euUui7hpoAPvALZdA==",
- "requires": {
- "big.js": "^5.2.2",
- "emojis-list": "^3.0.0",
- "json5": "^1.0.1"
- }
- }
- }
- },
- "find-up": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/find-up/-/find-up-4.0.0.tgz",
- "integrity": "sha512-zoH7ZWPkRdgwYCDVoQTzqjG8JSPANhtvLhh4KVUHyKnaUJJrNeFmWIkTcNuJmR3GLMEmGYEf2S2bjgx26JTF+Q==",
- "requires": {
- "locate-path": "^5.0.0"
- }
- },
"icss-utils": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/icss-utils/-/icss-utils-4.1.1.tgz",
@@ -10931,9 +9094,9 @@
"integrity": "sha1-caUMhCnfync8kqOQpKA7OfzVHT4="
},
"json5": {
- "version": "2.1.2",
- "resolved": "https://registry.npmjs.org/json5/-/json5-2.1.2.tgz",
- "integrity": "sha512-MoUOQ4WdiN3yxhm7NEVJSJrieAo5hNSLQ5sj05OTRHPL9HOBy8u4Bu88jsC1jvqAdN+E1bJmsUcZH+1HQxliqQ==",
+ "version": "2.1.3",
+ "resolved": "https://registry.npmjs.org/json5/-/json5-2.1.3.tgz",
+ "integrity": "sha512-KXPvOm8K9IJKFM0bmdn8QXh7udDh1g/giieX0NLCaMnb4hEiVFqnop2ImTXCc5e0/oHz3LTqmHGtExn5hfMkOA==",
"requires": {
"minimist": "^1.2.5"
}
@@ -10948,22 +9111,6 @@
"json5": "^2.1.2"
}
},
- "locate-path": {
- "version": "5.0.0",
- "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-5.0.0.tgz",
- "integrity": "sha512-t7hw9pI+WvuwNJXwk5zVHpyhIqzg2qTlklJOf0mVxGSbe3Fp2VieZcduNYjaLDoy6p9uGpQEGWG87WpMKlNq8g==",
- "requires": {
- "p-locate": "^4.1.0"
- }
- },
- "lru-cache": {
- "version": "5.1.1",
- "resolved": "https://registry.npmjs.org/lru-cache/-/lru-cache-5.1.1.tgz",
- "integrity": "sha512-KpNARQA3Iwv+jTA0utUVVbrh+Jlrr1Fv0e56GGzAFOXN7dk/FviaDW8LHmK52DlcH4WP2n6gI8vN1aesBFgo9w==",
- "requires": {
- "yallist": "^3.0.2"
- }
- },
"mini-css-extract-plugin": {
"version": "0.8.0",
"resolved": "https://registry.npmjs.org/mini-css-extract-plugin/-/mini-css-extract-plugin-0.8.0.tgz",
@@ -11005,10 +9152,13 @@
}
}
},
- "minimist": {
- "version": "1.2.5",
- "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz",
- "integrity": "sha512-FM9nNUYrRBAELZQT3xeZQ7fmMOBg6nWNmJKTcgsJeaLstP/UODVpGsr5OhXhhXg6f+qtJ8uiZ+PUxkDWcgIXLw=="
+ "mkdirp": {
+ "version": "0.5.3",
+ "resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-0.5.3.tgz",
+ "integrity": "sha512-P+2gwrFqx8lhew375MQHHeTlY8AuOJSrGf0R5ddkEndUkmwpgUob/vQuBD1V22/Cw1/lJr4x+EjllSezBThzBg==",
+ "requires": {
+ "minimist": "^1.2.5"
+ }
},
"normalize-url": {
"version": "1.9.1",
@@ -11021,19 +9171,6 @@
"sort-keys": "^1.0.0"
}
},
- "p-locate": {
- "version": "4.1.0",
- "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-4.1.0.tgz",
- "integrity": "sha512-R79ZZ/0wAxKGu3oYMlz8jy/kbhsNrS7SKZ7PxEHBgJ5+F2mtFW2fK2cOtBh1cHYkQsbzFV7I+EoRKe6Yt0oK7A==",
- "requires": {
- "p-limit": "^2.2.0"
- }
- },
- "path-to-regexp": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-6.1.0.tgz",
- "integrity": "sha512-h9DqehX3zZZDCEm+xbfU0ZmwCGFCAAraPJWMXJ4+v32NjZJilVg3k1TcKsRgIb8IQ/izZSaydDc1OhJCZvs2Dw=="
- },
"postcss": {
"version": "7.0.27",
"resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.27.tgz",
@@ -11044,13 +9181,10 @@
"supports-color": "^6.1.0"
},
"dependencies": {
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
+ "source-map": {
+ "version": "0.6.1",
+ "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
+ "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
}
}
},
@@ -11102,9 +9236,9 @@
}
},
"postcss-value-parser": {
- "version": "4.0.3",
- "resolved": "https://registry.npmjs.org/postcss-value-parser/-/postcss-value-parser-4.0.3.tgz",
- "integrity": "sha512-N7h4pG+Nnu5BEIzyeaaIYWs0LI5XC40OrRh5L60z0QjFsqGWcHcbkBvpe1WYpcIS9yQ8sOi/vIPt1ejQCrMVrg=="
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/postcss-value-parser/-/postcss-value-parser-4.1.0.tgz",
+ "integrity": "sha512-97DXOFbQJhk71ne5/Mt6cOu6yxsSfM0QGQyl0L25Gca4yGWEGJaig7l7gbCX623VqTBNGLRLaVUCnNkcedlRSQ=="
},
"prepend-http": {
"version": "1.0.4",
@@ -11126,14 +9260,19 @@
"integrity": "sha512-aUk3bHfZ2bRSVFFbbeVS4i+lNPZr3/WM5jT2J5omUVV1zzcs1nAaf3l51ctA5FFvCRbhrH0bdAsRRQddFJZPtA=="
},
"schema-utils": {
- "version": "2.6.5",
- "resolved": "https://registry.npmjs.org/schema-utils/-/schema-utils-2.6.5.tgz",
- "integrity": "sha512-5KXuwKziQrTVHh8j/Uxz+QUbxkaLW9X/86NBlx/gnKgtsZA2GIVMUn17qWhRFwF8jdYb3Dig5hRO/W5mZqy6SQ==",
+ "version": "2.6.6",
+ "resolved": "https://registry.npmjs.org/schema-utils/-/schema-utils-2.6.6.tgz",
+ "integrity": "sha512-wHutF/WPSbIi9x6ctjGGk2Hvl0VOz5l3EKEuKbjPlB30mKZUzb9A5k9yEXRX3pwyqVLPvpfZZEllaFq/M718hA==",
"requires": {
"ajv": "^6.12.0",
"ajv-keywords": "^3.4.1"
}
},
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ },
"sort-keys": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/sort-keys/-/sort-keys-1.1.2.tgz",
@@ -11143,23 +9282,26 @@
}
},
"source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
+ "version": "0.5.7",
+ "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.5.7.tgz",
+ "integrity": "sha1-igOdLRAh0i0eoUyA2OpGi6LvP8w="
},
- "yallist": {
- "version": "3.1.1",
- "resolved": "https://registry.npmjs.org/yallist/-/yallist-3.1.1.tgz",
- "integrity": "sha512-a4UGQaWPH59mOXUYnAG2ewncQS4i4F43Tv3JoAM+s2VDAmS9NsK8GpDMLrCHPksFT7h3K6TOoUNn2pb7RoXx4g=="
+ "supports-color": {
+ "version": "6.1.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
+ "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
+ "requires": {
+ "has-flag": "^3.0.0"
+ }
}
}
},
"next-mdx-enhanced": {
- "version": "2.4.0",
- "resolved": "https://registry.npmjs.org/next-mdx-enhanced/-/next-mdx-enhanced-2.4.0.tgz",
- "integrity": "sha512-rmm85LP5SYMtrtqGj9rrgK/3Jrqq8YrE+mL7R/RI8vakd1zZTrkfnG/ZRt9V6kakAXK+A3oOJbz8Kg33xVnZ6A==",
+ "version": "2.5.0",
+ "resolved": "https://registry.npmjs.org/next-mdx-enhanced/-/next-mdx-enhanced-2.5.0.tgz",
+ "integrity": "sha512-VA4iiC0/zETZqK0oleLIAxpYue/PGJxem/fD/d+iJd5yGpsjQYURuy0pWphRGyFHrWpYLgkFbGr3qubqpjPZdg==",
"requires": {
- "@mdx-js/loader": "^1.5.1",
+ "@mdx-js/loader": "^1.5.5",
"debug": "^4.1.1",
"fs-extra": "^8.1.0",
"glob": "^7.1.6",
@@ -11195,9 +9337,9 @@
}
},
"next-optimized-images": {
- "version": "2.5.5",
- "resolved": "https://registry.npmjs.org/next-optimized-images/-/next-optimized-images-2.5.5.tgz",
- "integrity": "sha512-bmSBsAcc0E+TuYF/72tO7pT0zHbMMPHt/OcmoOWa7vPNZv/rwj5YZeUlok+Ux1BnGINRWPgZKHxNiix+ZSKg7A==",
+ "version": "2.6.0",
+ "resolved": "https://registry.npmjs.org/next-optimized-images/-/next-optimized-images-2.6.0.tgz",
+ "integrity": "sha512-z+dASQLXIJPrc1iBt+jm5bravXud3nZ3de3Y3HgUNpJNUdkweym91dvKVgmvpXkEaNzExArybuSVNhOB2vR5qA==",
"requires": {
"chalk": "^2.4.2",
"figures": "^3.0.0",
@@ -11220,62 +9362,36 @@
}
}
},
- "next-plugin-graphql": {
- "version": "0.0.2",
- "resolved": "https://registry.npmjs.org/next-plugin-graphql/-/next-plugin-graphql-0.0.2.tgz",
- "integrity": "sha512-PgRqONNSF+lTyrtraNC7wJWNYq1U4v4jgIHmvTXYvdtYEz7oeuNNqk3N8mlunV2WzntpSFSe0BCdinRN25tkmQ==",
- "requires": {
- "graphql-tag": "^2.10.0"
- }
- },
- "next-routes": {
- "version": "1.4.2",
- "resolved": "https://registry.npmjs.org/next-routes/-/next-routes-1.4.2.tgz",
- "integrity": "sha512-1Ljs0BEV9IGcJLKxC/WZUtmftSvmkY6DlI8fVs8dClCoR82QRzBGRka/L/XB76wE5814MMeP9qVJYQil0FE9QQ==",
- "requires": {
- "path-to-regexp": "^2.1.0"
- },
- "dependencies": {
- "path-to-regexp": {
- "version": "2.4.0",
- "resolved": "https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-2.4.0.tgz",
- "integrity": "sha512-G6zHoVqC6GGTQkZwF4lkuEyMbVOjoBKAEybQUypI1WTkqinCOrq2x6U2+phkJ1XsEMTy4LjtwPI7HW+NVrRR2w=="
- }
- }
- },
"next-tick": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/next-tick/-/next-tick-1.0.0.tgz",
"integrity": "sha1-yobR/ogoFpsBICCOPchCS524NCw="
},
"next-transpile-modules": {
- "version": "2.3.1",
- "resolved": "https://registry.npmjs.org/next-transpile-modules/-/next-transpile-modules-2.3.1.tgz",
- "integrity": "sha512-euNOBAk/CXZA6binwL47+QpcxAmK1pzH2zjF7XnRN55f2iuN/ecpUw5p3x4bikFu0yDPtSLS92nv9fcgcCo0vg=="
+ "version": "3.3.0",
+ "resolved": "https://registry.npmjs.org/next-transpile-modules/-/next-transpile-modules-3.3.0.tgz",
+ "integrity": "sha512-QIaBunwtC9oNaluQvfJw5hv1uXSAlTzDCc7/FUxZw5Rnm0yo1HJjW6YodFvA+7Xm9k/2fZV2itF99vMBwTOUjQ==",
+ "requires": {
+ "micromatch": "^4.0.2",
+ "slash": "^3.0.0"
+ },
+ "dependencies": {
+ "slash": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz",
+ "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q=="
+ }
+ }
},
"nice-try": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/nice-try/-/nice-try-1.0.5.tgz",
"integrity": "sha512-1nh45deeb5olNY7eX82BkPO7SSxR5SSYJiPTrTdFUVYwAl8CKMA5N9PjTYkHiRjisVcxcQ1HXdLhx2qxxJzLNQ=="
},
- "no-case": {
- "version": "3.0.3",
- "resolved": "https://registry.npmjs.org/no-case/-/no-case-3.0.3.tgz",
- "integrity": "sha512-ehY/mVQCf9BL0gKfsJBvFJen+1V//U+0HQMPrWct40ixE4jnv0bfvxDbWtAHL9EcaPEOJHVVYKoQn1TlZUB8Tw==",
- "requires": {
- "lower-case": "^2.0.1",
- "tslib": "^1.10.0"
- }
- },
"node-fetch": {
- "version": "2.6.0",
- "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.0.tgz",
- "integrity": "sha512-8dG4H5ujfvFiqDmVu9fQ5bOHUC15JMjMY/Zumv26oOvvVJjM67KF8koCWIabKQ1GJIa9r2mMZscBq/TbdOcmNA=="
- },
- "node-int64": {
- "version": "0.4.0",
- "resolved": "https://registry.npmjs.org/node-int64/-/node-int64-0.4.0.tgz",
- "integrity": "sha1-h6kGXNs1XTGC2PlM4RGIuCXGijs="
+ "version": "2.1.2",
+ "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.1.2.tgz",
+ "integrity": "sha1-q4hOjn5X44qUR1POxwb3iNF2i7U="
},
"node-libs-browser": {
"version": "2.2.1",
@@ -11343,19 +9459,9 @@
"integrity": "sha512-QNABxbrPa3qEIfrE6GOJ7BYIuignnJw7iQ2YPbc3Nla1HzRJjXzZOiikfF8m7eAMfichLt3M4VgLOetqgDmgGQ=="
},
"node-releases": {
- "version": "1.1.47",
- "resolved": "https://registry.npmjs.org/node-releases/-/node-releases-1.1.47.tgz",
- "integrity": "sha512-k4xjVPx5FpwBUj0Gw7uvFOTF4Ep8Hok1I6qjwL3pLfwe7Y0REQSAqOwwv9TWBCUtMHxcXfY4PgRLRozcChvTcA==",
- "requires": {
- "semver": "^6.3.0"
- },
- "dependencies": {
- "semver": {
- "version": "6.3.0",
- "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
- "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
- }
- }
+ "version": "1.1.55",
+ "resolved": "https://registry.npmjs.org/node-releases/-/node-releases-1.1.55.tgz",
+ "integrity": "sha512-H3R3YR/8TjT5WPin/wOoHOUPHgvj8leuU/Keta/rwelEQN9pA/S2Dx8/se4pZ2LBxSd0nAGzsNzhqwa77v7F1w=="
},
"normalize-html-whitespace": {
"version": "1.0.0",
@@ -11371,6 +9477,13 @@
"resolve": "^1.10.0",
"semver": "2 || 3 || 4 || 5",
"validate-npm-package-license": "^3.0.1"
+ },
+ "dependencies": {
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ }
}
},
"normalize-path": {
@@ -11405,11 +9518,18 @@
}
},
"npm-run-path": {
- "version": "2.0.2",
- "resolved": "https://registry.npmjs.org/npm-run-path/-/npm-run-path-2.0.2.tgz",
- "integrity": "sha1-NakjLfo11wZ7TLLd8jV7GHFTbF8=",
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/npm-run-path/-/npm-run-path-4.0.1.tgz",
+ "integrity": "sha512-S48WzZW777zhNIrn7gxOlISNAqi9ZC/uQFnRdbeIHhZhCA6UqpkOT8T1G7BvfdgP4Er8gF4sUbaS0i7QvIfCWw==",
"requires": {
- "path-key": "^2.0.0"
+ "path-key": "^3.0.0"
+ },
+ "dependencies": {
+ "path-key": {
+ "version": "3.1.1",
+ "resolved": "https://registry.npmjs.org/path-key/-/path-key-3.1.1.tgz",
+ "integrity": "sha512-ojmeN0qd+y0jszEtoY48r0Peq5dwMEkIlCOu6Q5f41lfkswXuKtYrhgoTpLnyIcHm24Uhqx+5Tqm2InSwLhE6Q=="
+ }
}
},
"nprogress": {
@@ -11425,21 +9545,11 @@
"boolbase": "~1.0.0"
}
},
- "nullthrows": {
- "version": "1.1.1",
- "resolved": "https://registry.npmjs.org/nullthrows/-/nullthrows-1.1.1.tgz",
- "integrity": "sha512-2vPPEi+Z7WqML2jZYddDIfy5Dqb0r2fze2zTxNNknZaFpVHU3mFB3R+DWeJWGVx0ecvttSGlJTI+WG+8Z4cDWw=="
- },
"num2fraction": {
"version": "1.2.2",
"resolved": "https://registry.npmjs.org/num2fraction/-/num2fraction-1.2.2.tgz",
"integrity": "sha1-b2gragJ6Tp3fpFZM0lidHU5mnt4="
},
- "number-is-nan": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/number-is-nan/-/number-is-nan-1.0.1.tgz",
- "integrity": "sha1-CXtgK1NCKlIsGvuHkDGDNpQaAR0="
- },
"object-assign": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/object-assign/-/object-assign-4.1.1.tgz",
@@ -11463,6 +9573,11 @@
"is-descriptor": "^0.1.0"
}
},
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ },
"kind-of": {
"version": "3.2.2",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
@@ -11565,11 +9680,6 @@
"ee-first": "1.1.1"
}
},
- "on-headers": {
- "version": "1.0.2",
- "resolved": "https://registry.npmjs.org/on-headers/-/on-headers-1.0.2.tgz",
- "integrity": "sha512-pZAE+FJLoyITytdqK0U5s+FIpjN0JP3OzFi/u8Rx+EV5/W+JTWGXG8xFzevE7AjBfDqHv/8vL8qQsIhHnqRkrA=="
- },
"once": {
"version": "1.4.0",
"resolved": "https://registry.npmjs.org/once/-/once-1.4.0.tgz",
@@ -11598,21 +9708,14 @@
"opencollective-postinstall": {
"version": "2.0.2",
"resolved": "https://registry.npmjs.org/opencollective-postinstall/-/opencollective-postinstall-2.0.2.tgz",
- "integrity": "sha512-pVOEP16TrAO2/fjej1IdOyupJY8KDUM1CvsaScRbw6oddvpQoOfGk4ywha0HKKVAD6RkW4x6Q+tNBwhf3Bgpuw=="
+ "integrity": "sha512-pVOEP16TrAO2/fjej1IdOyupJY8KDUM1CvsaScRbw6oddvpQoOfGk4ywha0HKKVAD6RkW4x6Q+tNBwhf3Bgpuw==",
+ "dev": true
},
"opener": {
"version": "1.5.1",
"resolved": "https://registry.npmjs.org/opener/-/opener-1.5.1.tgz",
"integrity": "sha512-goYSy5c2UXE4Ra1xixabeVh1guIX/ZV/YokJksb6q2lubWu6UbvPQ20p542/sFIll1nl8JnCyK9oBaOcCWXwvA=="
},
- "optimism": {
- "version": "0.10.3",
- "resolved": "https://registry.npmjs.org/optimism/-/optimism-0.10.3.tgz",
- "integrity": "sha512-9A5pqGoQk49H6Vhjb9kPgAeeECfUDF6aIICbMDL23kDLStBn1MWk3YvcZ4xWF9CsSf6XEgvRLkXy4xof/56vVw==",
- "requires": {
- "@wry/context": "^0.4.0"
- }
- },
"optimist": {
"version": "0.6.1",
"resolved": "https://registry.npmjs.org/optimist/-/optimist-0.6.1.tgz",
@@ -11630,16 +9733,16 @@
}
},
"optionator": {
- "version": "0.8.3",
- "resolved": "https://registry.npmjs.org/optionator/-/optionator-0.8.3.tgz",
- "integrity": "sha512-+IW9pACdk3XWmmTXG8m3upGUJst5XRGzxMRjXzAuJ1XnIFNvfhjjIuYkDvysnPQ7qzqVzLt78BCruntqRhWQbA==",
+ "version": "0.9.1",
+ "resolved": "https://registry.npmjs.org/optionator/-/optionator-0.9.1.tgz",
+ "integrity": "sha512-74RlY5FCnhq4jRxVUPKDaRwrVNXMqsGsiW6AJw4XK8hmtm10wC0ypZBLw5IIp85NZMr91+qd1RvvENwg7jjRFw==",
"requires": {
- "deep-is": "~0.1.3",
- "fast-levenshtein": "~2.0.6",
- "levn": "~0.3.0",
- "prelude-ls": "~1.1.2",
- "type-check": "~0.3.2",
- "word-wrap": "~1.2.3"
+ "deep-is": "^0.1.3",
+ "fast-levenshtein": "^2.0.6",
+ "levn": "^0.4.1",
+ "prelude-ls": "^1.2.1",
+ "type-check": "^0.4.0",
+ "word-wrap": "^1.2.3"
}
},
"optipng-bin": {
@@ -11652,74 +9755,6 @@
"logalot": "^2.0.0"
}
},
- "ora": {
- "version": "3.4.0",
- "resolved": "https://registry.npmjs.org/ora/-/ora-3.4.0.tgz",
- "integrity": "sha512-eNwHudNbO1folBP3JsZ19v9azXWtQZjICdr3Q0TDPIaeBQ3mXLrh54wM+er0+hSp+dWKf+Z8KM58CYzEyIYxYg==",
- "requires": {
- "chalk": "^2.4.2",
- "cli-cursor": "^2.1.0",
- "cli-spinners": "^2.0.0",
- "log-symbols": "^2.2.0",
- "strip-ansi": "^5.2.0",
- "wcwidth": "^1.0.1"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- }
- },
- "cli-cursor": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/cli-cursor/-/cli-cursor-2.1.0.tgz",
- "integrity": "sha1-s12sN2R5+sw+lHR9QdDQ9SOP/LU=",
- "requires": {
- "restore-cursor": "^2.0.0"
- }
- },
- "cli-spinners": {
- "version": "2.2.0",
- "resolved": "https://registry.npmjs.org/cli-spinners/-/cli-spinners-2.2.0.tgz",
- "integrity": "sha512-tgU3fKwzYjiLEQgPMD9Jt+JjHVL9kW93FiIMX/l7rivvOD4/LL0Mf7gda3+4U2KJBloybwgj5KEoQgGRioMiKQ=="
- },
- "log-symbols": {
- "version": "2.2.0",
- "resolved": "https://registry.npmjs.org/log-symbols/-/log-symbols-2.2.0.tgz",
- "integrity": "sha512-VeIAFslyIerEJLXHziedo2basKbMKtTw3vfn5IzG0XTjhAVEJyNHnL2p7vc+wBDSdQuUpNw3M2u6xb9QsAY5Eg==",
- "requires": {
- "chalk": "^2.0.1"
- }
- },
- "mimic-fn": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-1.2.0.tgz",
- "integrity": "sha512-jf84uxzwiuiIVKiOLpfYk7N46TSy8ubTonmneY9vrpHNAnp0QBt2BxWV9dO3/j+BoVAb+a5G6YDPW3M5HOdMWQ=="
- },
- "onetime": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/onetime/-/onetime-2.0.1.tgz",
- "integrity": "sha1-BnQoIw/WdEOyeUsiu6UotoZ5YtQ=",
- "requires": {
- "mimic-fn": "^1.0.0"
- }
- },
- "restore-cursor": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/restore-cursor/-/restore-cursor-2.0.0.tgz",
- "integrity": "sha1-n37ih/gv0ybU/RYpI9YhKe7g368=",
- "requires": {
- "onetime": "^2.0.0",
- "signal-exit": "^3.0.2"
- }
- }
- }
- },
"os-browserify": {
"version": "0.3.0",
"resolved": "https://registry.npmjs.org/os-browserify/-/os-browserify-0.3.0.tgz",
@@ -11752,9 +9787,9 @@
}
},
"p-finally": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
- "integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4="
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-2.0.1.tgz",
+ "integrity": "sha512-vpm09aKwq6H9phqRQzecoDpD8TmVyGw70qmWlyq5onxY7tqyTTFVvxMykxQSQKILBSFlbXpypIw2T1Ml7+DDtw=="
},
"p-is-promise": {
"version": "1.1.0",
@@ -11762,25 +9797,28 @@
"integrity": "sha1-nJRWmJ6fZYgBewQ01WCXZ1w9oF4="
},
"p-limit": {
- "version": "2.2.2",
- "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.2.tgz",
- "integrity": "sha512-WGR+xHecKTr7EbUEhyLSh5Dube9JtdiG78ufaeLxTgpudf/20KqyMioIUZJAezlTIi6evxuoUs9YXc11cU+yzQ==",
+ "version": "1.3.0",
+ "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-1.3.0.tgz",
+ "integrity": "sha512-vvcXsLAJ9Dr5rQOPk7toZQZJApBl2K4J6dANSsEuh6QI41JYcsS/qhTGa9ErIUUgK3WNQoJYvylxvjqmiqEA9Q==",
"requires": {
- "p-try": "^2.0.0"
+ "p-try": "^1.0.0"
}
},
"p-locate": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-3.0.0.tgz",
- "integrity": "sha512-x+12w/To+4GFfgJhBEpiDcLozRJGegY+Ei7/z0tSLkMmxGZNybVMSfWj9aJn8Z5Fc7dBUNJOOVgPv2H7IwulSQ==",
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-2.0.0.tgz",
+ "integrity": "sha1-IKAQOyIqcMj9OcwuWAaA893l7EM=",
"requires": {
- "p-limit": "^2.0.0"
+ "p-limit": "^1.1.0"
}
},
"p-map": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/p-map/-/p-map-2.1.0.tgz",
- "integrity": "sha512-y3b8Kpd8OAN444hxfBbFfj1FY/RjtTd8tzYwhUqNYXx0fXx2iX4maP4Qr6qhIKbQXI02wTLAda4fYUbDagTUFw=="
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/p-map/-/p-map-4.0.0.tgz",
+ "integrity": "sha512-/bjOqmgETBYB5BoEeGVea8dmvHb2m9GLy1E9W43yeyfP6QQCZGFNa+XRceJEuDB6zqr+gKpIAmlLebMpykw/MQ==",
+ "requires": {
+ "aggregate-error": "^3.0.0"
+ }
},
"p-map-series": {
"version": "1.0.0",
@@ -11806,12 +9844,19 @@
"integrity": "sha1-XrOzU7f86Z8QGhA4iAuwVOu+o4Y=",
"requires": {
"p-finally": "^1.0.0"
+ },
+ "dependencies": {
+ "p-finally": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
+ "integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4="
+ }
}
},
"p-try": {
- "version": "2.2.0",
- "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz",
- "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ=="
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/p-try/-/p-try-1.0.0.tgz",
+ "integrity": "sha1-y8ec26+P1CKOE/Yh8rGiN8GyB7M="
},
"package-json": {
"version": "6.5.0",
@@ -11822,13 +9867,14 @@
"registry-auth-token": "^4.0.0",
"registry-url": "^5.0.0",
"semver": "^6.2.0"
- },
- "dependencies": {
- "semver": {
- "version": "6.3.0",
- "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
- "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
- }
+ }
+ },
+ "pad": {
+ "version": "3.2.0",
+ "resolved": "https://registry.npmjs.org/pad/-/pad-3.2.0.tgz",
+ "integrity": "sha512-2u0TrjcGbOjBTJpyewEl4hBO3OeX5wWue7eIFPzQTg6wFSvoaHcBTTUY5m+n0hd04gmTCPuY0kCpVIVuw5etwg==",
+ "requires": {
+ "wcwidth": "^1.0.1"
}
},
"pako": {
@@ -11846,15 +9892,6 @@
"readable-stream": "^2.1.5"
}
},
- "param-case": {
- "version": "3.0.3",
- "resolved": "https://registry.npmjs.org/param-case/-/param-case-3.0.3.tgz",
- "integrity": "sha512-VWBVyimc1+QrzappRs7waeN2YmoZFCGXWASRYX1/rGHtXqEcrGEIDm+jqIwFa2fRXNgQEwrxaYuIrX0WcAguTA==",
- "requires": {
- "dot-case": "^3.0.3",
- "tslib": "^1.10.0"
- }
- },
"parent-module": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/parent-module/-/parent-module-1.0.1.tgz",
@@ -11915,15 +9952,6 @@
"resolved": "https://registry.npmjs.org/parseurl/-/parseurl-1.3.3.tgz",
"integrity": "sha512-CiyeOxFT/JZyN5m0z9PfXw4SCBJ6Sygz1Dpl0wqjlhDEGGBP1GnsUVEL0p63hoG1fcj3fHynXi9NYO4nWOL+qQ=="
},
- "pascal-case": {
- "version": "3.1.1",
- "resolved": "https://registry.npmjs.org/pascal-case/-/pascal-case-3.1.1.tgz",
- "integrity": "sha512-XIeHKqIrsquVTQL2crjq3NfJUxmdLasn3TYOU0VBM+UX2a6ztAWBlJQBePLGY7VHW8+2dRadeIPK5+KImwTxQA==",
- "requires": {
- "no-case": "^3.0.3",
- "tslib": "^1.10.0"
- }
- },
"pascalcase": {
"version": "0.1.1",
"resolved": "https://registry.npmjs.org/pascalcase/-/pascalcase-0.1.1.tgz",
@@ -11949,11 +9977,6 @@
"resolved": "https://registry.npmjs.org/path-is-absolute/-/path-is-absolute-1.0.1.tgz",
"integrity": "sha1-F0uSaHNVNP+8es5r9TpanhtcX18="
},
- "path-is-inside": {
- "version": "1.0.2",
- "resolved": "https://registry.npmjs.org/path-is-inside/-/path-is-inside-1.0.2.tgz",
- "integrity": "sha1-NlQX3t5EQw0cEa9hAn+s8HS9/FM="
- },
"path-key": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/path-key/-/path-key-2.0.1.tgz",
@@ -11992,9 +10015,9 @@
"integrity": "sha1-elfrVQpng/kRUzH89GY9XI4AelA="
},
"picomatch": {
- "version": "2.2.1",
- "resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.2.1.tgz",
- "integrity": "sha512-ISBaA8xQNmwELC7eOjqFKMESB2VIqt4PPDD0nsS95b/9dZXvVKOlz9keMSnoGGKcOHXfTvDD6WMaRoSc9UuhRA=="
+ "version": "2.2.2",
+ "resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.2.2.tgz",
+ "integrity": "sha512-q0M/9eZHzmr0AulXyPwNfZjtwZ/RBZlbN3K3CErVrk50T2ASYI7Bye0EvekFY3IP1Nt2DHu0re+V2ZHIpMkuWg=="
},
"pify": {
"version": "4.0.1",
@@ -12021,60 +10044,20 @@
"requires": {
"find-up": "^2.0.0",
"load-json-file": "^4.0.0"
+ }
+ },
+ "pkg-dir": {
+ "version": "4.2.0",
+ "resolved": "https://registry.npmjs.org/pkg-dir/-/pkg-dir-4.2.0.tgz",
+ "integrity": "sha512-HRDzbaKjC+AOWVXxAU/x54COGeIv9eb+6CkDSQoNTt4XyWoIJvuPsXizxu/Fr23EiekbtZwmh1IcIG/l/a10GQ==",
+ "requires": {
+ "find-up": "^4.0.0"
},
"dependencies": {
"find-up": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/find-up/-/find-up-2.1.0.tgz",
- "integrity": "sha1-RdG35QbHF93UgndaK3eSCjwMV6c=",
- "requires": {
- "locate-path": "^2.0.0"
- }
- },
- "locate-path": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-2.0.0.tgz",
- "integrity": "sha1-K1aLJl7slExtnA3pw9u7ygNUzY4=",
- "requires": {
- "p-locate": "^2.0.0",
- "path-exists": "^3.0.0"
- }
- },
- "p-limit": {
- "version": "1.3.0",
- "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-1.3.0.tgz",
- "integrity": "sha512-vvcXsLAJ9Dr5rQOPk7toZQZJApBl2K4J6dANSsEuh6QI41JYcsS/qhTGa9ErIUUgK3WNQoJYvylxvjqmiqEA9Q==",
- "requires": {
- "p-try": "^1.0.0"
- }
- },
- "p-locate": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-2.0.0.tgz",
- "integrity": "sha1-IKAQOyIqcMj9OcwuWAaA893l7EM=",
- "requires": {
- "p-limit": "^1.1.0"
- }
- },
- "p-try": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/p-try/-/p-try-1.0.0.tgz",
- "integrity": "sha1-y8ec26+P1CKOE/Yh8rGiN8GyB7M="
- }
- }
- },
- "pkg-dir": {
- "version": "4.2.0",
- "resolved": "https://registry.npmjs.org/pkg-dir/-/pkg-dir-4.2.0.tgz",
- "integrity": "sha512-HRDzbaKjC+AOWVXxAU/x54COGeIv9eb+6CkDSQoNTt4XyWoIJvuPsXizxu/Fr23EiekbtZwmh1IcIG/l/a10GQ==",
- "requires": {
- "find-up": "^4.0.0"
- },
- "dependencies": {
- "find-up": {
- "version": "4.1.0",
- "resolved": "https://registry.npmjs.org/find-up/-/find-up-4.1.0.tgz",
- "integrity": "sha512-PpOwAdQ/YlXQ2vj8a3h8IipDuYRi3wceVQQGYWxNINccq40Anw7BlsEXCMbt1Zt+OLA6Fq9suIpIWD0OsnISlw==",
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/find-up/-/find-up-4.1.0.tgz",
+ "integrity": "sha512-PpOwAdQ/YlXQ2vj8a3h8IipDuYRi3wceVQQGYWxNINccq40Anw7BlsEXCMbt1Zt+OLA6Fq9suIpIWD0OsnISlw==",
"requires": {
"locate-path": "^5.0.0",
"path-exists": "^4.0.0"
@@ -12088,6 +10071,14 @@
"p-locate": "^4.1.0"
}
},
+ "p-limit": {
+ "version": "2.3.0",
+ "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.3.0.tgz",
+ "integrity": "sha512-//88mFWSJx8lxCzwdAABTJL2MyWB12+eIY7MDL2SqLmAkeKU9qxRvWuSyTjm3FUmpBEMuFfckAIqEaVGUDxb6w==",
+ "requires": {
+ "p-try": "^2.0.0"
+ }
+ },
"p-locate": {
"version": "4.1.0",
"resolved": "https://registry.npmjs.org/p-locate/-/p-locate-4.1.0.tgz",
@@ -12096,6 +10087,11 @@
"p-limit": "^2.2.0"
}
},
+ "p-try": {
+ "version": "2.2.0",
+ "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz",
+ "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ=="
+ },
"path-exists": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/path-exists/-/path-exists-4.0.0.tgz",
@@ -12104,11 +10100,11 @@
}
},
"pkg-up": {
- "version": "3.1.0",
- "resolved": "https://registry.npmjs.org/pkg-up/-/pkg-up-3.1.0.tgz",
- "integrity": "sha512-nDywThFk1i4BQK4twPQ6TA4RT8bDY96yeuCVBWL3ePARCiEKDRSrNGbFIgUJpLp+XeIR65v8ra7WuJOFUBtkMA==",
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/pkg-up/-/pkg-up-2.0.0.tgz",
+ "integrity": "sha1-yBmscoBZpGHKscOImivjxJoATX8=",
"requires": {
- "find-up": "^3.0.0"
+ "find-up": "^2.1.0"
}
},
"please-upgrade-node": {
@@ -12138,39 +10134,13 @@
"integrity": "sha1-AerA/jta9xoqbAL+q7jB/vfgDqs="
},
"postcss": {
- "version": "6.0.23",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-6.0.23.tgz",
- "integrity": "sha512-soOk1h6J3VMTZtVeVpv15/Hpdl2cBLX3CAw4TAbkpTJiNPk9YP/zWcD1ND+xEtvyuuvKzbxliTOIyvkSeSJ6ag==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
- "chalk": "^2.4.1",
+ "chalk": "^2.4.2",
"source-map": "^0.6.1",
- "supports-color": "^5.4.0"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- }
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- }
- }
- },
- "postcss-attribute-case-insensitive": {
- "version": "4.0.2",
- "resolved": "https://registry.npmjs.org/postcss-attribute-case-insensitive/-/postcss-attribute-case-insensitive-4.0.2.tgz",
- "integrity": "sha512-clkFxk/9pcdb4Vkn0hAHq3YnxBQ2p0CGD1dy24jN+reBck+EWxMbxSUqN4Yj7t0w8csl87K6p0gxBe1utkJsYA==",
- "requires": {
- "postcss": "^7.0.2",
- "postcss-selector-parser": "^6.0.2"
+ "supports-color": "^6.1.0"
},
"dependencies": {
"chalk": {
@@ -12193,21 +10163,25 @@
}
}
},
- "cssesc": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/cssesc/-/cssesc-3.0.0.tgz",
- "integrity": "sha512-/Tb/JcjK111nNScGob5MNtsntNM1aCNUDipB/TkwZFhyDrrE47SOx/18wF2bbjgc3ZzCSKW1T5nt5EbFoAz/Vg=="
- },
- "postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "supports-color": {
+ "version": "6.1.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
+ "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
"requires": {
- "chalk": "^2.4.2",
- "source-map": "^0.6.1",
- "supports-color": "^6.1.0"
+ "has-flag": "^3.0.0"
}
- },
+ }
+ }
+ },
+ "postcss-attribute-case-insensitive": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-attribute-case-insensitive/-/postcss-attribute-case-insensitive-4.0.2.tgz",
+ "integrity": "sha512-clkFxk/9pcdb4Vkn0hAHq3YnxBQ2p0CGD1dy24jN+reBck+EWxMbxSUqN4Yj7t0w8csl87K6p0gxBe1utkJsYA==",
+ "requires": {
+ "postcss": "^7.0.2",
+ "postcss-selector-parser": "^6.0.2"
+ },
+ "dependencies": {
"postcss-selector-parser": {
"version": "6.0.2",
"resolved": "https://registry.npmjs.org/postcss-selector-parser/-/postcss-selector-parser-6.0.2.tgz",
@@ -12217,19 +10191,6 @@
"indexes-of": "^1.0.1",
"uniq": "^1.0.1"
}
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
}
}
},
@@ -12239,6 +10200,16 @@
"integrity": "sha512-qfVjLfq7HFd2e0HW4s1dvU8X080OZdG46fFbIBFjW7US7YPDcWfRvdElvwMJr2LI6hMmD+7LnH2HcmXTs+uOig==",
"requires": {
"postcss": "^7"
+ }
+ },
+ "postcss-calc": {
+ "version": "7.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-calc/-/postcss-calc-7.0.2.tgz",
+ "integrity": "sha512-rofZFHUg6ZIrvRwPeFktv06GdbDYLcGqh9EwiMutZg+a0oePCCw1zHOEiji6LCpyRcjTREtPASuUqeAvYlEVvQ==",
+ "requires": {
+ "postcss": "^7.0.27",
+ "postcss-selector-parser": "^6.0.2",
+ "postcss-value-parser": "^4.0.2"
},
"dependencies": {
"chalk": {
@@ -12262,19 +10233,29 @@
}
},
"postcss": {
- "version": "7.0.27",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.27.tgz",
- "integrity": "sha512-WuQETPMcW9Uf1/22HWUWP9lgsIC+KEHg2kozMflKjbeUtw9ujvFX6QmIfozaErDkmLWS9WEnEdEe6Uo9/BNTdQ==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
+ "postcss-selector-parser": {
+ "version": "6.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-selector-parser/-/postcss-selector-parser-6.0.2.tgz",
+ "integrity": "sha512-36P2QR59jDTOAiIkqEprfJDsoNrvwFei3eCqKd1Y0tUsBimsq39BLp7RD+JWny3WgB1zGhJX8XVePwm9k4wdBg==",
+ "requires": {
+ "cssesc": "^3.0.0",
+ "indexes-of": "^1.0.1",
+ "uniq": "^1.0.1"
+ }
+ },
+ "postcss-value-parser": {
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/postcss-value-parser/-/postcss-value-parser-4.1.0.tgz",
+ "integrity": "sha512-97DXOFbQJhk71ne5/Mt6cOu6yxsSfM0QGQyl0L25Gca4yGWEGJaig7l7gbCX623VqTBNGLRLaVUCnNkcedlRSQ=="
},
"supports-color": {
"version": "6.1.0",
@@ -12293,6 +10274,56 @@
"requires": {
"postcss": "^7.0.2",
"postcss-values-parser": "^2.0.0"
+ }
+ },
+ "postcss-color-gray": {
+ "version": "5.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-color-gray/-/postcss-color-gray-5.0.0.tgz",
+ "integrity": "sha512-q6BuRnAGKM/ZRpfDascZlIZPjvwsRye7UDNalqVz3s7GDxMtqPY6+Q871liNxsonUw8oC61OG+PSaysYpl1bnw==",
+ "requires": {
+ "@csstools/convert-colors": "^1.4.0",
+ "postcss": "^7.0.5",
+ "postcss-values-parser": "^2.0.0"
+ }
+ },
+ "postcss-color-hex-alpha": {
+ "version": "5.0.3",
+ "resolved": "https://registry.npmjs.org/postcss-color-hex-alpha/-/postcss-color-hex-alpha-5.0.3.tgz",
+ "integrity": "sha512-PF4GDel8q3kkreVXKLAGNpHKilXsZ6xuu+mOQMHWHLPNyjiUBOr75sp5ZKJfmv1MCus5/DWUGcK9hm6qHEnXYw==",
+ "requires": {
+ "postcss": "^7.0.14",
+ "postcss-values-parser": "^2.0.1"
+ }
+ },
+ "postcss-color-mod-function": {
+ "version": "3.0.3",
+ "resolved": "https://registry.npmjs.org/postcss-color-mod-function/-/postcss-color-mod-function-3.0.3.tgz",
+ "integrity": "sha512-YP4VG+xufxaVtzV6ZmhEtc+/aTXH3d0JLpnYfxqTvwZPbJhWqp8bSY3nfNzNRFLgB4XSaBA82OE4VjOOKpCdVQ==",
+ "requires": {
+ "@csstools/convert-colors": "^1.4.0",
+ "postcss": "^7.0.2",
+ "postcss-values-parser": "^2.0.0"
+ }
+ },
+ "postcss-color-rebeccapurple": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-color-rebeccapurple/-/postcss-color-rebeccapurple-4.0.1.tgz",
+ "integrity": "sha512-aAe3OhkS6qJXBbqzvZth2Au4V3KieR5sRQ4ptb2b2O8wgvB3SJBsdG+jsn2BZbbwekDG8nTfcCNKcSfe/lEy8g==",
+ "requires": {
+ "postcss": "^7.0.2",
+ "postcss-values-parser": "^2.0.0"
+ }
+ },
+ "postcss-colormin": {
+ "version": "4.0.3",
+ "resolved": "https://registry.npmjs.org/postcss-colormin/-/postcss-colormin-4.0.3.tgz",
+ "integrity": "sha512-WyQFAdDZpExQh32j0U0feWisZ0dmOtPl44qYmJKkq9xFWY3p+4qnRzCHeNrkeRhwPHz9bQ3mo0/yVkaply0MNw==",
+ "requires": {
+ "browserslist": "^4.0.0",
+ "color": "^3.0.0",
+ "has": "^1.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -12316,20 +10347,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12340,14 +10366,13 @@
}
}
},
- "postcss-color-gray": {
- "version": "5.0.0",
- "resolved": "https://registry.npmjs.org/postcss-color-gray/-/postcss-color-gray-5.0.0.tgz",
- "integrity": "sha512-q6BuRnAGKM/ZRpfDascZlIZPjvwsRye7UDNalqVz3s7GDxMtqPY6+Q871liNxsonUw8oC61OG+PSaysYpl1bnw==",
+ "postcss-convert-values": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-convert-values/-/postcss-convert-values-4.0.1.tgz",
+ "integrity": "sha512-Kisdo1y77KUC0Jmn0OXU/COOJbzM8cImvw1ZFsBgBgMgb1iL23Zs/LXRe3r+EZqM3vGYKdQ2YJVQ5VkJI+zEJQ==",
"requires": {
- "@csstools/convert-colors": "^1.4.0",
- "postcss": "^7.0.5",
- "postcss-values-parser": "^2.0.0"
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -12371,20 +10396,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12395,13 +10415,47 @@
}
}
},
- "postcss-color-hex-alpha": {
- "version": "5.0.3",
- "resolved": "https://registry.npmjs.org/postcss-color-hex-alpha/-/postcss-color-hex-alpha-5.0.3.tgz",
- "integrity": "sha512-PF4GDel8q3kkreVXKLAGNpHKilXsZ6xuu+mOQMHWHLPNyjiUBOr75sp5ZKJfmv1MCus5/DWUGcK9hm6qHEnXYw==",
+ "postcss-custom-media": {
+ "version": "7.0.8",
+ "resolved": "https://registry.npmjs.org/postcss-custom-media/-/postcss-custom-media-7.0.8.tgz",
+ "integrity": "sha512-c9s5iX0Ge15o00HKbuRuTqNndsJUbaXdiNsksnVH8H4gdc+zbLzr/UasOwNG6CTDpLFekVY4672eWdiiWu2GUg==",
"requires": {
- "postcss": "^7.0.14",
+ "postcss": "^7.0.14"
+ }
+ },
+ "postcss-custom-properties": {
+ "version": "8.0.11",
+ "resolved": "https://registry.npmjs.org/postcss-custom-properties/-/postcss-custom-properties-8.0.11.tgz",
+ "integrity": "sha512-nm+o0eLdYqdnJ5abAJeXp4CEU1c1k+eB2yMCvhgzsds/e0umabFrN6HoTy/8Q4K5ilxERdl/JD1LO5ANoYBeMA==",
+ "requires": {
+ "postcss": "^7.0.17",
"postcss-values-parser": "^2.0.1"
+ }
+ },
+ "postcss-custom-selectors": {
+ "version": "5.1.2",
+ "resolved": "https://registry.npmjs.org/postcss-custom-selectors/-/postcss-custom-selectors-5.1.2.tgz",
+ "integrity": "sha512-DSGDhqinCqXqlS4R7KGxL1OSycd1lydugJ1ky4iRXPHdBRiozyMHrdu0H3o7qNOCiZwySZTUI5MV0T8QhCLu+w==",
+ "requires": {
+ "postcss": "^7.0.2",
+ "postcss-selector-parser": "^5.0.0-rc.3"
+ }
+ },
+ "postcss-dir-pseudo-class": {
+ "version": "5.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-dir-pseudo-class/-/postcss-dir-pseudo-class-5.0.0.tgz",
+ "integrity": "sha512-3pm4oq8HYWMZePJY+5ANriPs3P07q+LW6FAdTlkFH2XqDdP4HeeJYMOzn0HYLhRSjBO3fhiqSwwU9xEULSrPgw==",
+ "requires": {
+ "postcss": "^7.0.2",
+ "postcss-selector-parser": "^5.0.0-rc.3"
+ }
+ },
+ "postcss-discard-comments": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-discard-comments/-/postcss-discard-comments-4.0.2.tgz",
+ "integrity": "sha512-RJutN259iuRf3IW7GZyLM5Sw4GLTOH8FmsXBnv8Ab/Tc2k4SR4qbV4DNbyyY4+Sjo362SyDmW2DQ7lBSChrpkg==",
+ "requires": {
+ "postcss": "^7.0.0"
},
"dependencies": {
"chalk": {
@@ -12425,20 +10479,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12449,14 +10498,12 @@
}
}
},
- "postcss-color-mod-function": {
- "version": "3.0.3",
- "resolved": "https://registry.npmjs.org/postcss-color-mod-function/-/postcss-color-mod-function-3.0.3.tgz",
- "integrity": "sha512-YP4VG+xufxaVtzV6ZmhEtc+/aTXH3d0JLpnYfxqTvwZPbJhWqp8bSY3nfNzNRFLgB4XSaBA82OE4VjOOKpCdVQ==",
+ "postcss-discard-duplicates": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-discard-duplicates/-/postcss-discard-duplicates-4.0.2.tgz",
+ "integrity": "sha512-ZNQfR1gPNAiXZhgENFfEglF93pciw0WxMkJeVmw8eF+JZBbMD7jp6C67GqJAXVZP2BWbOztKfbsdmMp/k8c6oQ==",
"requires": {
- "@csstools/convert-colors": "^1.4.0",
- "postcss": "^7.0.2",
- "postcss-values-parser": "^2.0.0"
+ "postcss": "^7.0.0"
},
"dependencies": {
"chalk": {
@@ -12480,20 +10527,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12504,13 +10546,12 @@
}
}
},
- "postcss-color-rebeccapurple": {
+ "postcss-discard-empty": {
"version": "4.0.1",
- "resolved": "https://registry.npmjs.org/postcss-color-rebeccapurple/-/postcss-color-rebeccapurple-4.0.1.tgz",
- "integrity": "sha512-aAe3OhkS6qJXBbqzvZth2Au4V3KieR5sRQ4ptb2b2O8wgvB3SJBsdG+jsn2BZbbwekDG8nTfcCNKcSfe/lEy8g==",
+ "resolved": "https://registry.npmjs.org/postcss-discard-empty/-/postcss-discard-empty-4.0.1.tgz",
+ "integrity": "sha512-B9miTzbznhDjTfjvipfHoqbWKwd0Mj+/fL5s1QOz06wufguil+Xheo4XpOnc4NqKYBCNqqEzgPv2aPBIJLox0w==",
"requires": {
- "postcss": "^7.0.2",
- "postcss-values-parser": "^2.0.0"
+ "postcss": "^7.0.0"
},
"dependencies": {
"chalk": {
@@ -12534,20 +10575,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12558,12 +10594,12 @@
}
}
},
- "postcss-custom-media": {
- "version": "7.0.8",
- "resolved": "https://registry.npmjs.org/postcss-custom-media/-/postcss-custom-media-7.0.8.tgz",
- "integrity": "sha512-c9s5iX0Ge15o00HKbuRuTqNndsJUbaXdiNsksnVH8H4gdc+zbLzr/UasOwNG6CTDpLFekVY4672eWdiiWu2GUg==",
+ "postcss-discard-overridden": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-discard-overridden/-/postcss-discard-overridden-4.0.1.tgz",
+ "integrity": "sha512-IYY2bEDD7g1XM1IDEsUT4//iEYCxAmP5oDSFMVU/JVvT7gh+l4fmjciLqGgwjdWpQIdb0Che2VX00QObS5+cTg==",
"requires": {
- "postcss": "^7.0.14"
+ "postcss": "^7.0.0"
},
"dependencies": {
"chalk": {
@@ -12587,20 +10623,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12611,13 +10642,117 @@
}
}
},
- "postcss-custom-properties": {
- "version": "8.0.11",
- "resolved": "https://registry.npmjs.org/postcss-custom-properties/-/postcss-custom-properties-8.0.11.tgz",
- "integrity": "sha512-nm+o0eLdYqdnJ5abAJeXp4CEU1c1k+eB2yMCvhgzsds/e0umabFrN6HoTy/8Q4K5ilxERdl/JD1LO5ANoYBeMA==",
- "requires": {
- "postcss": "^7.0.17",
- "postcss-values-parser": "^2.0.1"
+ "postcss-double-position-gradients": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-double-position-gradients/-/postcss-double-position-gradients-1.0.0.tgz",
+ "integrity": "sha512-G+nV8EnQq25fOI8CH/B6krEohGWnF5+3A6H/+JEpOncu5dCnkS1QQ6+ct3Jkaepw1NGVqqOZH6lqrm244mCftA==",
+ "requires": {
+ "postcss": "^7.0.5",
+ "postcss-values-parser": "^2.0.0"
+ }
+ },
+ "postcss-env-function": {
+ "version": "2.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-env-function/-/postcss-env-function-2.0.2.tgz",
+ "integrity": "sha512-rwac4BuZlITeUbiBq60h/xbLzXY43qOsIErngWa4l7Mt+RaSkT7QBjXVGTcBHupykkblHMDrBFh30zchYPaOUw==",
+ "requires": {
+ "postcss": "^7.0.2",
+ "postcss-values-parser": "^2.0.0"
+ }
+ },
+ "postcss-flexbugs-fixes": {
+ "version": "4.2.1",
+ "resolved": "https://registry.npmjs.org/postcss-flexbugs-fixes/-/postcss-flexbugs-fixes-4.2.1.tgz",
+ "integrity": "sha512-9SiofaZ9CWpQWxOwRh1b/r85KD5y7GgvsNt1056k6OYLvWUun0czCvogfJgylC22uJTwW1KzY3Gz65NZRlvoiQ==",
+ "requires": {
+ "postcss": "^7.0.26"
+ }
+ },
+ "postcss-focus-visible": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-focus-visible/-/postcss-focus-visible-4.0.0.tgz",
+ "integrity": "sha512-Z5CkWBw0+idJHSV6+Bgf2peDOFf/x4o+vX/pwcNYrWpXFrSfTkQ3JQ1ojrq9yS+upnAlNRHeg8uEwFTgorjI8g==",
+ "requires": {
+ "postcss": "^7.0.2"
+ }
+ },
+ "postcss-focus-within": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-focus-within/-/postcss-focus-within-3.0.0.tgz",
+ "integrity": "sha512-W0APui8jQeBKbCGZudW37EeMCjDeVxKgiYfIIEo8Bdh5SpB9sxds/Iq8SEuzS0Q4YFOlG7EPFulbbxujpkrV2w==",
+ "requires": {
+ "postcss": "^7.0.2"
+ }
+ },
+ "postcss-font-variant": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-font-variant/-/postcss-font-variant-4.0.0.tgz",
+ "integrity": "sha512-M8BFYKOvCrI2aITzDad7kWuXXTm0YhGdP9Q8HanmN4EF1Hmcgs1KK5rSHylt/lUJe8yLxiSwWAHdScoEiIxztg==",
+ "requires": {
+ "postcss": "^7.0.2"
+ }
+ },
+ "postcss-gap-properties": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-gap-properties/-/postcss-gap-properties-2.0.0.tgz",
+ "integrity": "sha512-QZSqDaMgXCHuHTEzMsS2KfVDOq7ZFiknSpkrPJY6jmxbugUPTuSzs/vuE5I3zv0WAS+3vhrlqhijiprnuQfzmg==",
+ "requires": {
+ "postcss": "^7.0.2"
+ }
+ },
+ "postcss-image-set-function": {
+ "version": "3.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-image-set-function/-/postcss-image-set-function-3.0.1.tgz",
+ "integrity": "sha512-oPTcFFip5LZy8Y/whto91L9xdRHCWEMs3e1MdJxhgt4jy2WYXfhkng59fH5qLXSCPN8k4n94p1Czrfe5IOkKUw==",
+ "requires": {
+ "postcss": "^7.0.2",
+ "postcss-values-parser": "^2.0.0"
+ }
+ },
+ "postcss-initial": {
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-initial/-/postcss-initial-3.0.2.tgz",
+ "integrity": "sha512-ugA2wKonC0xeNHgirR4D3VWHs2JcU08WAi1KFLVcnb7IN89phID6Qtg2RIctWbnvp1TM2BOmDtX8GGLCKdR8YA==",
+ "requires": {
+ "lodash.template": "^4.5.0",
+ "postcss": "^7.0.2"
+ }
+ },
+ "postcss-lab-function": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-lab-function/-/postcss-lab-function-2.0.1.tgz",
+ "integrity": "sha512-whLy1IeZKY+3fYdqQFuDBf8Auw+qFuVnChWjmxm/UhHWqNHZx+B99EwxTvGYmUBqe3Fjxs4L1BoZTJmPu6usVg==",
+ "requires": {
+ "@csstools/convert-colors": "^1.4.0",
+ "postcss": "^7.0.2",
+ "postcss-values-parser": "^2.0.0"
+ }
+ },
+ "postcss-logical": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-logical/-/postcss-logical-3.0.0.tgz",
+ "integrity": "sha512-1SUKdJc2vuMOmeItqGuNaC+N8MzBWFWEkAnRnLpFYj1tGGa7NqyVBujfRtgNa2gXR+6RkGUiB2O5Vmh7E2RmiA==",
+ "requires": {
+ "postcss": "^7.0.2"
+ }
+ },
+ "postcss-media-minmax": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-media-minmax/-/postcss-media-minmax-4.0.0.tgz",
+ "integrity": "sha512-fo9moya6qyxsjbFAYl97qKO9gyre3qvbMnkOZeZwlsW6XYFsvs2DMGDlchVLfAd8LHPZDxivu/+qW2SMQeTHBw==",
+ "requires": {
+ "postcss": "^7.0.2"
+ }
+ },
+ "postcss-merge-longhand": {
+ "version": "4.0.11",
+ "resolved": "https://registry.npmjs.org/postcss-merge-longhand/-/postcss-merge-longhand-4.0.11.tgz",
+ "integrity": "sha512-alx/zmoeXvJjp7L4mxEMjh8lxVlDFX1gqWHzaaQewwMZiVhLo42TEClKaeHbRf6J7j82ZOdTJ808RtN0ZOZwvw==",
+ "requires": {
+ "css-color-names": "0.0.4",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0",
+ "stylehacks": "^4.0.0"
},
"dependencies": {
"chalk": {
@@ -12641,20 +10776,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12665,13 +10795,17 @@
}
}
},
- "postcss-custom-selectors": {
- "version": "5.1.2",
- "resolved": "https://registry.npmjs.org/postcss-custom-selectors/-/postcss-custom-selectors-5.1.2.tgz",
- "integrity": "sha512-DSGDhqinCqXqlS4R7KGxL1OSycd1lydugJ1ky4iRXPHdBRiozyMHrdu0H3o7qNOCiZwySZTUI5MV0T8QhCLu+w==",
+ "postcss-merge-rules": {
+ "version": "4.0.3",
+ "resolved": "https://registry.npmjs.org/postcss-merge-rules/-/postcss-merge-rules-4.0.3.tgz",
+ "integrity": "sha512-U7e3r1SbvYzO0Jr3UT/zKBVgYYyhAz0aitvGIYOYK5CPmkNih+WDSsS5tvPrJ8YMQYlEMvsZIiqmn7HdFUaeEQ==",
"requires": {
- "postcss": "^7.0.2",
- "postcss-selector-parser": "^5.0.0-rc.3"
+ "browserslist": "^4.0.0",
+ "caniuse-api": "^3.0.0",
+ "cssnano-util-same-parent": "^4.0.0",
+ "postcss": "^7.0.0",
+ "postcss-selector-parser": "^3.0.0",
+ "vendors": "^1.0.0"
},
"dependencies": {
"chalk": {
@@ -12695,19 +10829,24 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
+ "postcss-selector-parser": {
+ "version": "3.1.2",
+ "resolved": "https://registry.npmjs.org/postcss-selector-parser/-/postcss-selector-parser-3.1.2.tgz",
+ "integrity": "sha512-h7fJ/5uWuRVyOtkO45pnt1Ih40CEleeyCHzipqAZO2e5H20g25Y48uYnFUiShvY4rZWNJ/Bib/KVPmanaCtOhA==",
+ "requires": {
+ "dot-prop": "^5.2.0",
+ "indexes-of": "^1.0.1",
+ "uniq": "^1.0.1"
+ }
},
"supports-color": {
"version": "6.1.0",
@@ -12719,13 +10858,13 @@
}
}
},
- "postcss-dir-pseudo-class": {
- "version": "5.0.0",
- "resolved": "https://registry.npmjs.org/postcss-dir-pseudo-class/-/postcss-dir-pseudo-class-5.0.0.tgz",
- "integrity": "sha512-3pm4oq8HYWMZePJY+5ANriPs3P07q+LW6FAdTlkFH2XqDdP4HeeJYMOzn0HYLhRSjBO3fhiqSwwU9xEULSrPgw==",
+ "postcss-minify-font-values": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-minify-font-values/-/postcss-minify-font-values-4.0.2.tgz",
+ "integrity": "sha512-j85oO6OnRU9zPf04+PZv1LYIYOprWm6IA6zkXkrJXyRveDEuQggG6tvoy8ir8ZwjLxLuGfNkCZEQG7zan+Hbtg==",
"requires": {
- "postcss": "^7.0.2",
- "postcss-selector-parser": "^5.0.0-rc.3"
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -12749,20 +10888,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12773,13 +10907,15 @@
}
}
},
- "postcss-double-position-gradients": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/postcss-double-position-gradients/-/postcss-double-position-gradients-1.0.0.tgz",
- "integrity": "sha512-G+nV8EnQq25fOI8CH/B6krEohGWnF5+3A6H/+JEpOncu5dCnkS1QQ6+ct3Jkaepw1NGVqqOZH6lqrm244mCftA==",
+ "postcss-minify-gradients": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-minify-gradients/-/postcss-minify-gradients-4.0.2.tgz",
+ "integrity": "sha512-qKPfwlONdcf/AndP1U8SJ/uzIJtowHlMaSioKzebAXSG4iJthlWC9iSWznQcX4f66gIWX44RSA841HTHj3wK+Q==",
"requires": {
- "postcss": "^7.0.5",
- "postcss-values-parser": "^2.0.0"
+ "cssnano-util-get-arguments": "^4.0.0",
+ "is-color-stop": "^1.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -12803,20 +10939,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12827,13 +10958,17 @@
}
}
},
- "postcss-env-function": {
- "version": "2.0.2",
- "resolved": "https://registry.npmjs.org/postcss-env-function/-/postcss-env-function-2.0.2.tgz",
- "integrity": "sha512-rwac4BuZlITeUbiBq60h/xbLzXY43qOsIErngWa4l7Mt+RaSkT7QBjXVGTcBHupykkblHMDrBFh30zchYPaOUw==",
+ "postcss-minify-params": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-minify-params/-/postcss-minify-params-4.0.2.tgz",
+ "integrity": "sha512-G7eWyzEx0xL4/wiBBJxJOz48zAKV2WG3iZOqVhPet/9geefm/Px5uo1fzlHu+DOjT+m0Mmiz3jkQzVHe6wxAWg==",
"requires": {
- "postcss": "^7.0.2",
- "postcss-values-parser": "^2.0.0"
+ "alphanum-sort": "^1.0.0",
+ "browserslist": "^4.0.0",
+ "cssnano-util-get-arguments": "^4.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0",
+ "uniqs": "^2.0.0"
},
"dependencies": {
"chalk": {
@@ -12857,20 +10992,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12881,12 +11011,15 @@
}
}
},
- "postcss-flexbugs-fixes": {
- "version": "4.2.0",
- "resolved": "https://registry.npmjs.org/postcss-flexbugs-fixes/-/postcss-flexbugs-fixes-4.2.0.tgz",
- "integrity": "sha512-QRE0n3hpkxxS/OGvzOa+PDuy4mh/Jg4o9ui22/ko5iGYOG3M5dfJabjnAZjTdh2G9F85c7Hv8hWcEDEKW/xceQ==",
+ "postcss-minify-selectors": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-minify-selectors/-/postcss-minify-selectors-4.0.2.tgz",
+ "integrity": "sha512-D5S1iViljXBj9kflQo4YutWnJmwm8VvIsU1GeXJGiG9j8CIg9zs4voPMdQDUmIxetUOh60VilsNzCiAFTOqu3g==",
"requires": {
- "postcss": "^7.0.26"
+ "alphanum-sort": "^1.0.0",
+ "has": "^1.0.0",
+ "postcss": "^7.0.0",
+ "postcss-selector-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -12910,19 +11043,24 @@
}
},
"postcss": {
- "version": "7.0.27",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.27.tgz",
- "integrity": "sha512-WuQETPMcW9Uf1/22HWUWP9lgsIC+KEHg2kozMflKjbeUtw9ujvFX6QmIfozaErDkmLWS9WEnEdEe6Uo9/BNTdQ==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
+ "postcss-selector-parser": {
+ "version": "3.1.2",
+ "resolved": "https://registry.npmjs.org/postcss-selector-parser/-/postcss-selector-parser-3.1.2.tgz",
+ "integrity": "sha512-h7fJ/5uWuRVyOtkO45pnt1Ih40CEleeyCHzipqAZO2e5H20g25Y48uYnFUiShvY4rZWNJ/Bib/KVPmanaCtOhA==",
+ "requires": {
+ "dot-prop": "^5.2.0",
+ "indexes-of": "^1.0.1",
+ "uniq": "^1.0.1"
+ }
},
"supports-color": {
"version": "6.1.0",
@@ -12934,12 +11072,31 @@
}
}
},
- "postcss-focus-visible": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/postcss-focus-visible/-/postcss-focus-visible-4.0.0.tgz",
- "integrity": "sha512-Z5CkWBw0+idJHSV6+Bgf2peDOFf/x4o+vX/pwcNYrWpXFrSfTkQ3JQ1ojrq9yS+upnAlNRHeg8uEwFTgorjI8g==",
+ "postcss-nesting": {
+ "version": "7.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-nesting/-/postcss-nesting-7.0.1.tgz",
+ "integrity": "sha512-FrorPb0H3nuVq0Sff7W2rnc3SmIcruVC6YwpcS+k687VxyxO33iE1amna7wHuRVzM8vfiYofXSBHNAZ3QhLvYg==",
"requires": {
"postcss": "^7.0.2"
+ }
+ },
+ "postcss-normalize": {
+ "version": "9.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-normalize/-/postcss-normalize-9.0.0.tgz",
+ "integrity": "sha512-//kq5O1xkygzN1iCioFIBtzyVTgB6ce9+Hu0mNHuUhPn+FnnFSPybe5kBemnUPPqd7QrHc+kdX6GVECUWdU2uQ==",
+ "requires": {
+ "@csstools/normalize.css": "*",
+ "postcss": "^7.0.27",
+ "postcss-browser-comments": "^3.0.0",
+ "sanitize.css": "*"
+ }
+ },
+ "postcss-normalize-charset": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-normalize-charset/-/postcss-normalize-charset-4.0.1.tgz",
+ "integrity": "sha512-gMXCrrlWh6G27U0hF3vNvR3w8I1s2wOBILvA87iNXaPvSNo5uZAMYsZG7XjCUf1eVxuPfyL4TJ7++SGZLc9A3g==",
+ "requires": {
+ "postcss": "^7.0.0"
},
"dependencies": {
"chalk": {
@@ -12963,20 +11120,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -12987,12 +11139,14 @@
}
}
},
- "postcss-focus-within": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/postcss-focus-within/-/postcss-focus-within-3.0.0.tgz",
- "integrity": "sha512-W0APui8jQeBKbCGZudW37EeMCjDeVxKgiYfIIEo8Bdh5SpB9sxds/Iq8SEuzS0Q4YFOlG7EPFulbbxujpkrV2w==",
+ "postcss-normalize-display-values": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-normalize-display-values/-/postcss-normalize-display-values-4.0.2.tgz",
+ "integrity": "sha512-3F2jcsaMW7+VtRMAqf/3m4cPFhPD3EFRgNs18u+k3lTJJlVe7d0YPO+bnwqo2xg8YiRpDXJI2u8A0wqJxMsQuQ==",
"requires": {
- "postcss": "^7.0.2"
+ "cssnano-util-get-match": "^4.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13016,20 +11170,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13040,12 +11189,15 @@
}
}
},
- "postcss-font-variant": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/postcss-font-variant/-/postcss-font-variant-4.0.0.tgz",
- "integrity": "sha512-M8BFYKOvCrI2aITzDad7kWuXXTm0YhGdP9Q8HanmN4EF1Hmcgs1KK5rSHylt/lUJe8yLxiSwWAHdScoEiIxztg==",
+ "postcss-normalize-positions": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-normalize-positions/-/postcss-normalize-positions-4.0.2.tgz",
+ "integrity": "sha512-Dlf3/9AxpxE+NF1fJxYDeggi5WwV35MXGFnnoccP/9qDtFrTArZ0D0R+iKcg5WsUd8nUYMIl8yXDCtcrT8JrdA==",
"requires": {
- "postcss": "^7.0.2"
+ "cssnano-util-get-arguments": "^4.0.0",
+ "has": "^1.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13069,20 +11221,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13093,12 +11240,15 @@
}
}
},
- "postcss-gap-properties": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/postcss-gap-properties/-/postcss-gap-properties-2.0.0.tgz",
- "integrity": "sha512-QZSqDaMgXCHuHTEzMsS2KfVDOq7ZFiknSpkrPJY6jmxbugUPTuSzs/vuE5I3zv0WAS+3vhrlqhijiprnuQfzmg==",
+ "postcss-normalize-repeat-style": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-normalize-repeat-style/-/postcss-normalize-repeat-style-4.0.2.tgz",
+ "integrity": "sha512-qvigdYYMpSuoFs3Is/f5nHdRLJN/ITA7huIoCyqqENJe9PvPmLhNLMu7QTjPdtnVf6OcYYO5SHonx4+fbJE1+Q==",
"requires": {
- "postcss": "^7.0.2"
+ "cssnano-util-get-arguments": "^4.0.0",
+ "cssnano-util-get-match": "^4.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13122,20 +11272,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13146,13 +11291,14 @@
}
}
},
- "postcss-image-set-function": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/postcss-image-set-function/-/postcss-image-set-function-3.0.1.tgz",
- "integrity": "sha512-oPTcFFip5LZy8Y/whto91L9xdRHCWEMs3e1MdJxhgt4jy2WYXfhkng59fH5qLXSCPN8k4n94p1Czrfe5IOkKUw==",
+ "postcss-normalize-string": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-normalize-string/-/postcss-normalize-string-4.0.2.tgz",
+ "integrity": "sha512-RrERod97Dnwqq49WNz8qo66ps0swYZDSb6rM57kN2J+aoyEAJfZ6bMx0sx/F9TIEX0xthPGCmeyiam/jXif0eA==",
"requires": {
- "postcss": "^7.0.2",
- "postcss-values-parser": "^2.0.0"
+ "has": "^1.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13176,20 +11322,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13200,13 +11341,14 @@
}
}
},
- "postcss-initial": {
- "version": "3.0.2",
- "resolved": "https://registry.npmjs.org/postcss-initial/-/postcss-initial-3.0.2.tgz",
- "integrity": "sha512-ugA2wKonC0xeNHgirR4D3VWHs2JcU08WAi1KFLVcnb7IN89phID6Qtg2RIctWbnvp1TM2BOmDtX8GGLCKdR8YA==",
+ "postcss-normalize-timing-functions": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-normalize-timing-functions/-/postcss-normalize-timing-functions-4.0.2.tgz",
+ "integrity": "sha512-acwJY95edP762e++00Ehq9L4sZCEcOPyaHwoaFOhIwWCDfik6YvqsYNxckee65JHLKzuNSSmAdxwD2Cud1Z54A==",
"requires": {
- "lodash.template": "^4.5.0",
- "postcss": "^7.0.2"
+ "cssnano-util-get-match": "^4.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13230,20 +11372,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13254,14 +11391,14 @@
}
}
},
- "postcss-lab-function": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/postcss-lab-function/-/postcss-lab-function-2.0.1.tgz",
- "integrity": "sha512-whLy1IeZKY+3fYdqQFuDBf8Auw+qFuVnChWjmxm/UhHWqNHZx+B99EwxTvGYmUBqe3Fjxs4L1BoZTJmPu6usVg==",
+ "postcss-normalize-unicode": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-normalize-unicode/-/postcss-normalize-unicode-4.0.1.tgz",
+ "integrity": "sha512-od18Uq2wCYn+vZ/qCOeutvHjB5jm57ToxRaMeNuf0nWVHaP9Hua56QyMF6fs/4FSUnVIw0CBPsU0K4LnBPwYwg==",
"requires": {
- "@csstools/convert-colors": "^1.4.0",
- "postcss": "^7.0.2",
- "postcss-values-parser": "^2.0.0"
+ "browserslist": "^4.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13285,20 +11422,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13309,24 +11441,15 @@
}
}
},
- "postcss-load-config": {
- "version": "2.1.0",
- "resolved": "https://registry.npmjs.org/postcss-load-config/-/postcss-load-config-2.1.0.tgz",
- "integrity": "sha512-4pV3JJVPLd5+RueiVVB+gFOAa7GWc25XQcMp86Zexzke69mKf6Nx9LRcQywdz7yZI9n1udOxmLuAwTBypypF8Q==",
- "requires": {
- "cosmiconfig": "^5.0.0",
- "import-cwd": "^2.0.0"
- }
- },
- "postcss-loader": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/postcss-loader/-/postcss-loader-3.0.0.tgz",
- "integrity": "sha512-cLWoDEY5OwHcAjDnkyRQzAXfs2jrKjXpO/HQFcc5b5u/r7aa471wdmChmwfnv7x2u840iat/wi0lQ5nbRgSkUA==",
+ "postcss-normalize-url": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-normalize-url/-/postcss-normalize-url-4.0.1.tgz",
+ "integrity": "sha512-p5oVaF4+IHwu7VpMan/SSpmpYxcJMtkGppYf0VbdH5B6hN8YNmVyJLuY9FmLQTzY3fag5ESUUHDqM+heid0UVA==",
"requires": {
- "loader-utils": "^1.1.0",
+ "is-absolute-url": "^2.0.0",
+ "normalize-url": "^3.0.0",
"postcss": "^7.0.0",
- "postcss-load-config": "^2.0.0",
- "schema-utils": "^1.0.0"
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13349,21 +11472,26 @@
}
}
},
+ "is-absolute-url": {
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/is-absolute-url/-/is-absolute-url-2.1.0.tgz",
+ "integrity": "sha1-UFMN+4T8yap9vnhS6Do3uTufKqY="
+ },
+ "normalize-url": {
+ "version": "3.3.0",
+ "resolved": "https://registry.npmjs.org/normalize-url/-/normalize-url-3.3.0.tgz",
+ "integrity": "sha512-U+JJi7duF1o+u2pynbp2zXDW2/PADgC30f0GsHZtRh+HOcXHnw137TrNlyxxRvWW5fjKd3bcLHPxofWuCjaeZg=="
+ },
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13374,12 +11502,13 @@
}
}
},
- "postcss-logical": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/postcss-logical/-/postcss-logical-3.0.0.tgz",
- "integrity": "sha512-1SUKdJc2vuMOmeItqGuNaC+N8MzBWFWEkAnRnLpFYj1tGGa7NqyVBujfRtgNa2gXR+6RkGUiB2O5Vmh7E2RmiA==",
+ "postcss-normalize-whitespace": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-normalize-whitespace/-/postcss-normalize-whitespace-4.0.2.tgz",
+ "integrity": "sha512-tO8QIgrsI3p95r8fyqKV+ufKlSHh9hMJqACqbv2XknufqEDhDvbguXGBBqxw9nsQoXWf0qOqppziKJKHMD4GtA==",
"requires": {
- "postcss": "^7.0.2"
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13403,20 +11532,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13427,12 +11551,14 @@
}
}
},
- "postcss-media-minmax": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/postcss-media-minmax/-/postcss-media-minmax-4.0.0.tgz",
- "integrity": "sha512-fo9moya6qyxsjbFAYl97qKO9gyre3qvbMnkOZeZwlsW6XYFsvs2DMGDlchVLfAd8LHPZDxivu/+qW2SMQeTHBw==",
+ "postcss-ordered-values": {
+ "version": "4.1.2",
+ "resolved": "https://registry.npmjs.org/postcss-ordered-values/-/postcss-ordered-values-4.1.2.tgz",
+ "integrity": "sha512-2fCObh5UanxvSxeXrtLtlwVThBvHn6MQcu4ksNT2tsaV2Fg76R2CV98W7wNSlX+5/pFwEyaDwKLLoEV7uRybAw==",
"requires": {
- "postcss": "^7.0.2"
+ "cssnano-util-get-arguments": "^4.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13456,20 +11582,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13480,47 +11601,93 @@
}
}
},
- "postcss-modules-extract-imports": {
- "version": "1.2.1",
- "resolved": "https://registry.npmjs.org/postcss-modules-extract-imports/-/postcss-modules-extract-imports-1.2.1.tgz",
- "integrity": "sha512-6jt9XZwUhwmRUhb/CkyJY020PYaPJsCyt3UjbaWo6XEbH/94Hmv6MP7fG2C5NDU/BcHzyGYxNtHvM+LTf9HrYw==",
+ "postcss-overflow-shorthand": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-overflow-shorthand/-/postcss-overflow-shorthand-2.0.0.tgz",
+ "integrity": "sha512-aK0fHc9CBNx8jbzMYhshZcEv8LtYnBIRYQD5i7w/K/wS9c2+0NSR6B3OVMu5y0hBHYLcMGjfU+dmWYNKH0I85g==",
"requires": {
- "postcss": "^6.0.1"
+ "postcss": "^7.0.2"
}
},
- "postcss-modules-local-by-default": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/postcss-modules-local-by-default/-/postcss-modules-local-by-default-1.2.0.tgz",
- "integrity": "sha1-99gMOYxaOT+nlkRmvRlQCn1hwGk=",
+ "postcss-page-break": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-page-break/-/postcss-page-break-2.0.0.tgz",
+ "integrity": "sha512-tkpTSrLpfLfD9HvgOlJuigLuk39wVTbbd8RKcy8/ugV2bNBUW3xU+AIqyxhDrQr1VUj1RmyJrBn1YWrqUm9zAQ==",
"requires": {
- "css-selector-tokenizer": "^0.7.0",
- "postcss": "^6.0.1"
+ "postcss": "^7.0.2"
}
},
- "postcss-modules-scope": {
- "version": "1.1.0",
- "resolved": "https://registry.npmjs.org/postcss-modules-scope/-/postcss-modules-scope-1.1.0.tgz",
- "integrity": "sha1-1upkmUx5+XtipytCb75gVqGUu5A=",
+ "postcss-place": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-place/-/postcss-place-4.0.1.tgz",
+ "integrity": "sha512-Zb6byCSLkgRKLODj/5mQugyuj9bvAAw9LqJJjgwz5cYryGeXfFZfSXoP1UfveccFmeq0b/2xxwcTEVScnqGxBg==",
"requires": {
- "css-selector-tokenizer": "^0.7.0",
- "postcss": "^6.0.1"
+ "postcss": "^7.0.2",
+ "postcss-values-parser": "^2.0.0"
}
},
- "postcss-modules-values": {
- "version": "1.3.0",
- "resolved": "https://registry.npmjs.org/postcss-modules-values/-/postcss-modules-values-1.3.0.tgz",
- "integrity": "sha1-7P+p1+GSUYOJ9CrQ6D9yrsRW6iA=",
+ "postcss-preset-env": {
+ "version": "6.7.0",
+ "resolved": "https://registry.npmjs.org/postcss-preset-env/-/postcss-preset-env-6.7.0.tgz",
+ "integrity": "sha512-eU4/K5xzSFwUFJ8hTdTQzo2RBLbDVt83QZrAvI07TULOkmyQlnYlpwep+2yIK+K+0KlZO4BvFcleOCCcUtwchg==",
+ "requires": {
+ "autoprefixer": "^9.6.1",
+ "browserslist": "^4.6.4",
+ "caniuse-lite": "^1.0.30000981",
+ "css-blank-pseudo": "^0.1.4",
+ "css-has-pseudo": "^0.10.0",
+ "css-prefers-color-scheme": "^3.1.1",
+ "cssdb": "^4.4.0",
+ "postcss": "^7.0.17",
+ "postcss-attribute-case-insensitive": "^4.0.1",
+ "postcss-color-functional-notation": "^2.0.1",
+ "postcss-color-gray": "^5.0.0",
+ "postcss-color-hex-alpha": "^5.0.3",
+ "postcss-color-mod-function": "^3.0.3",
+ "postcss-color-rebeccapurple": "^4.0.1",
+ "postcss-custom-media": "^7.0.8",
+ "postcss-custom-properties": "^8.0.11",
+ "postcss-custom-selectors": "^5.1.2",
+ "postcss-dir-pseudo-class": "^5.0.0",
+ "postcss-double-position-gradients": "^1.0.0",
+ "postcss-env-function": "^2.0.2",
+ "postcss-focus-visible": "^4.0.0",
+ "postcss-focus-within": "^3.0.0",
+ "postcss-font-variant": "^4.0.0",
+ "postcss-gap-properties": "^2.0.0",
+ "postcss-image-set-function": "^3.0.1",
+ "postcss-initial": "^3.0.0",
+ "postcss-lab-function": "^2.0.1",
+ "postcss-logical": "^3.0.0",
+ "postcss-media-minmax": "^4.0.0",
+ "postcss-nesting": "^7.0.0",
+ "postcss-overflow-shorthand": "^2.0.0",
+ "postcss-page-break": "^2.0.0",
+ "postcss-place": "^4.0.1",
+ "postcss-pseudo-class-any-link": "^6.0.0",
+ "postcss-replace-overflow-wrap": "^3.0.0",
+ "postcss-selector-matches": "^4.0.0",
+ "postcss-selector-not": "^4.0.0"
+ }
+ },
+ "postcss-pseudo-class-any-link": {
+ "version": "6.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-pseudo-class-any-link/-/postcss-pseudo-class-any-link-6.0.0.tgz",
+ "integrity": "sha512-lgXW9sYJdLqtmw23otOzrtbDXofUdfYzNm4PIpNE322/swES3VU9XlXHeJS46zT2onFO7V1QFdD4Q9LiZj8mew==",
"requires": {
- "icss-replace-symbols": "^1.1.0",
- "postcss": "^6.0.1"
+ "postcss": "^7.0.2",
+ "postcss-selector-parser": "^5.0.0-rc.3"
}
},
- "postcss-nesting": {
- "version": "7.0.1",
- "resolved": "https://registry.npmjs.org/postcss-nesting/-/postcss-nesting-7.0.1.tgz",
- "integrity": "sha512-FrorPb0H3nuVq0Sff7W2rnc3SmIcruVC6YwpcS+k687VxyxO33iE1amna7wHuRVzM8vfiYofXSBHNAZ3QhLvYg==",
+ "postcss-reduce-initial": {
+ "version": "4.0.3",
+ "resolved": "https://registry.npmjs.org/postcss-reduce-initial/-/postcss-reduce-initial-4.0.3.tgz",
+ "integrity": "sha512-gKWmR5aUulSjbzOfD9AlJiHCGH6AEVLaM0AV+aSioxUDd16qXP1PCh8d1/BGVvpdWn8k/HiK7n6TjeoXN1F7DA==",
"requires": {
- "postcss": "^7.0.2"
+ "browserslist": "^4.0.0",
+ "caniuse-api": "^3.0.0",
+ "has": "^1.0.0",
+ "postcss": "^7.0.0"
},
"dependencies": {
"chalk": {
@@ -13544,20 +11711,15 @@
}
},
"postcss": {
- "version": "7.0.27",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.27.tgz",
- "integrity": "sha512-WuQETPMcW9Uf1/22HWUWP9lgsIC+KEHg2kozMflKjbeUtw9ujvFX6QmIfozaErDkmLWS9WEnEdEe6Uo9/BNTdQ==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13568,16 +11730,15 @@
}
}
},
- "postcss-normalize": {
- "version": "8.0.1",
- "resolved": "https://registry.npmjs.org/postcss-normalize/-/postcss-normalize-8.0.1.tgz",
- "integrity": "sha512-rt9JMS/m9FHIRroDDBGSMsyW1c0fkvOJPy62ggxSHUldJO7B195TqFMqIf+lY5ezpDcYOV4j86aUp3/XbxzCCQ==",
+ "postcss-reduce-transforms": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-reduce-transforms/-/postcss-reduce-transforms-4.0.2.tgz",
+ "integrity": "sha512-EEVig1Q2QJ4ELpJXMZR8Vt5DQx8/mo+dGWSR7vWXqcob2gQLyQGsionYcGKATXvQzMPn6DSN1vTN7yFximdIAg==",
"requires": {
- "@csstools/normalize.css": "^10.1.0",
- "browserslist": "^4.6.2",
- "postcss": "^7.0.17",
- "postcss-browser-comments": "^3.0.0",
- "sanitize.css": "^10.0.0"
+ "cssnano-util-get-match": "^4.0.0",
+ "has": "^1.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0"
},
"dependencies": {
"chalk": {
@@ -13601,20 +11762,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13625,12 +11781,20 @@
}
}
},
- "postcss-overflow-shorthand": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/postcss-overflow-shorthand/-/postcss-overflow-shorthand-2.0.0.tgz",
- "integrity": "sha512-aK0fHc9CBNx8jbzMYhshZcEv8LtYnBIRYQD5i7w/K/wS9c2+0NSR6B3OVMu5y0hBHYLcMGjfU+dmWYNKH0I85g==",
+ "postcss-replace-overflow-wrap": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-replace-overflow-wrap/-/postcss-replace-overflow-wrap-3.0.0.tgz",
+ "integrity": "sha512-2T5hcEHArDT6X9+9dVSPQdo7QHzG4XKclFT8rU5TzJPDN7RIRTbO9c4drUISOVemLj03aezStHCR2AIcr8XLpw==",
"requires": {
"postcss": "^7.0.2"
+ }
+ },
+ "postcss-safe-parser": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-safe-parser/-/postcss-safe-parser-4.0.2.tgz",
+ "integrity": "sha512-Uw6ekxSWNLCPesSv/cmqf2bY/77z11O7jZGPax3ycZMFU/oi2DMH9i89AdHc1tRwFg/arFoEwX0IS3LCUxJh1g==",
+ "requires": {
+ "postcss": "^7.0.26"
},
"dependencies": {
"chalk": {
@@ -13654,20 +11818,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13678,66 +11837,50 @@
}
}
},
- "postcss-page-break": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/postcss-page-break/-/postcss-page-break-2.0.0.tgz",
- "integrity": "sha512-tkpTSrLpfLfD9HvgOlJuigLuk39wVTbbd8RKcy8/ugV2bNBUW3xU+AIqyxhDrQr1VUj1RmyJrBn1YWrqUm9zAQ==",
+ "postcss-selector-matches": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-selector-matches/-/postcss-selector-matches-4.0.0.tgz",
+ "integrity": "sha512-LgsHwQR/EsRYSqlwdGzeaPKVT0Ml7LAT6E75T8W8xLJY62CE4S/l03BWIt3jT8Taq22kXP08s2SfTSzaraoPww==",
"requires": {
+ "balanced-match": "^1.0.0",
+ "postcss": "^7.0.2"
+ }
+ },
+ "postcss-selector-not": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-selector-not/-/postcss-selector-not-4.0.0.tgz",
+ "integrity": "sha512-W+bkBZRhqJaYN8XAnbbZPLWMvZD1wKTu0UxtFKdhtGjWYmxhkUneoeOhRJKdAE5V7ZTlnbHfCR+6bNwK9e1dTQ==",
+ "requires": {
+ "balanced-match": "^1.0.0",
"postcss": "^7.0.2"
+ }
+ },
+ "postcss-selector-parser": {
+ "version": "5.0.0",
+ "resolved": "https://registry.npmjs.org/postcss-selector-parser/-/postcss-selector-parser-5.0.0.tgz",
+ "integrity": "sha512-w+zLE5Jhg6Liz8+rQOWEAwtwkyqpfnmsinXjXg6cY7YIONZZtgvE0v2O0uhQBs0peNomOJwWRKt6JBfTdTd3OQ==",
+ "requires": {
+ "cssesc": "^2.0.0",
+ "indexes-of": "^1.0.1",
+ "uniq": "^1.0.1"
},
"dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- },
- "dependencies": {
- "supports-color": {
- "version": "5.5.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
- "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
- "requires": {
- "chalk": "^2.4.2",
- "source-map": "^0.6.1",
- "supports-color": "^6.1.0"
- }
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
+ "cssesc": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/cssesc/-/cssesc-2.0.0.tgz",
+ "integrity": "sha512-MsCAG1z9lPdoO/IUMLSBWBSVxVtJ1395VGIQ+Fc2gNdkQ1hNDnQdw3YhA71WJCBW1vdwA0cAnk/DnW6bqoEUYg=="
}
}
},
- "postcss-place": {
- "version": "4.0.1",
- "resolved": "https://registry.npmjs.org/postcss-place/-/postcss-place-4.0.1.tgz",
- "integrity": "sha512-Zb6byCSLkgRKLODj/5mQugyuj9bvAAw9LqJJjgwz5cYryGeXfFZfSXoP1UfveccFmeq0b/2xxwcTEVScnqGxBg==",
+ "postcss-svgo": {
+ "version": "4.0.2",
+ "resolved": "https://registry.npmjs.org/postcss-svgo/-/postcss-svgo-4.0.2.tgz",
+ "integrity": "sha512-C6wyjo3VwFm0QgBy+Fu7gCYOkCmgmClghO+pjcxvrcBKtiKt0uCF+hvbMO1fyv5BMImRK90SMb+dwUnfbGd+jw==",
"requires": {
- "postcss": "^7.0.2",
- "postcss-values-parser": "^2.0.0"
+ "is-svg": "^3.0.0",
+ "postcss": "^7.0.0",
+ "postcss-value-parser": "^3.0.0",
+ "svgo": "^1.0.0"
},
"dependencies": {
"chalk": {
@@ -13760,21 +11903,24 @@
}
}
},
+ "is-svg": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/is-svg/-/is-svg-3.0.0.tgz",
+ "integrity": "sha512-gi4iHK53LR2ujhLVVj+37Ykh9GLqYHX6JOVXbLAucaG/Cqw9xwdFOjDM2qeifLs1sF1npXXFvDu0r5HNgCMrzQ==",
+ "requires": {
+ "html-comment-regex": "^1.1.0"
+ }
+ },
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13785,48 +11931,14 @@
}
}
},
- "postcss-preset-env": {
- "version": "6.7.0",
- "resolved": "https://registry.npmjs.org/postcss-preset-env/-/postcss-preset-env-6.7.0.tgz",
- "integrity": "sha512-eU4/K5xzSFwUFJ8hTdTQzo2RBLbDVt83QZrAvI07TULOkmyQlnYlpwep+2yIK+K+0KlZO4BvFcleOCCcUtwchg==",
+ "postcss-unique-selectors": {
+ "version": "4.0.1",
+ "resolved": "https://registry.npmjs.org/postcss-unique-selectors/-/postcss-unique-selectors-4.0.1.tgz",
+ "integrity": "sha512-+JanVaryLo9QwZjKrmJgkI4Fn8SBgRO6WXQBJi7KiAVPlmxikB5Jzc4EvXMT2H0/m0RjrVVm9rGNhZddm/8Spg==",
"requires": {
- "autoprefixer": "^9.6.1",
- "browserslist": "^4.6.4",
- "caniuse-lite": "^1.0.30000981",
- "css-blank-pseudo": "^0.1.4",
- "css-has-pseudo": "^0.10.0",
- "css-prefers-color-scheme": "^3.1.1",
- "cssdb": "^4.4.0",
- "postcss": "^7.0.17",
- "postcss-attribute-case-insensitive": "^4.0.1",
- "postcss-color-functional-notation": "^2.0.1",
- "postcss-color-gray": "^5.0.0",
- "postcss-color-hex-alpha": "^5.0.3",
- "postcss-color-mod-function": "^3.0.3",
- "postcss-color-rebeccapurple": "^4.0.1",
- "postcss-custom-media": "^7.0.8",
- "postcss-custom-properties": "^8.0.11",
- "postcss-custom-selectors": "^5.1.2",
- "postcss-dir-pseudo-class": "^5.0.0",
- "postcss-double-position-gradients": "^1.0.0",
- "postcss-env-function": "^2.0.2",
- "postcss-focus-visible": "^4.0.0",
- "postcss-focus-within": "^3.0.0",
- "postcss-font-variant": "^4.0.0",
- "postcss-gap-properties": "^2.0.0",
- "postcss-image-set-function": "^3.0.1",
- "postcss-initial": "^3.0.0",
- "postcss-lab-function": "^2.0.1",
- "postcss-logical": "^3.0.0",
- "postcss-media-minmax": "^4.0.0",
- "postcss-nesting": "^7.0.0",
- "postcss-overflow-shorthand": "^2.0.0",
- "postcss-page-break": "^2.0.0",
- "postcss-place": "^4.0.1",
- "postcss-pseudo-class-any-link": "^6.0.0",
- "postcss-replace-overflow-wrap": "^3.0.0",
- "postcss-selector-matches": "^4.0.0",
- "postcss-selector-not": "^4.0.0"
+ "alphanum-sort": "^1.0.0",
+ "postcss": "^7.0.0",
+ "uniqs": "^2.0.0"
},
"dependencies": {
"chalk": {
@@ -13850,20 +11962,15 @@
}
},
"postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
"requires": {
"chalk": "^2.4.2",
"source-map": "^0.6.1",
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -13874,238 +11981,6 @@
}
}
},
- "postcss-pseudo-class-any-link": {
- "version": "6.0.0",
- "resolved": "https://registry.npmjs.org/postcss-pseudo-class-any-link/-/postcss-pseudo-class-any-link-6.0.0.tgz",
- "integrity": "sha512-lgXW9sYJdLqtmw23otOzrtbDXofUdfYzNm4PIpNE322/swES3VU9XlXHeJS46zT2onFO7V1QFdD4Q9LiZj8mew==",
- "requires": {
- "postcss": "^7.0.2",
- "postcss-selector-parser": "^5.0.0-rc.3"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- },
- "dependencies": {
- "supports-color": {
- "version": "5.5.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
- "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
- "requires": {
- "chalk": "^2.4.2",
- "source-map": "^0.6.1",
- "supports-color": "^6.1.0"
- }
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss-replace-overflow-wrap": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/postcss-replace-overflow-wrap/-/postcss-replace-overflow-wrap-3.0.0.tgz",
- "integrity": "sha512-2T5hcEHArDT6X9+9dVSPQdo7QHzG4XKclFT8rU5TzJPDN7RIRTbO9c4drUISOVemLj03aezStHCR2AIcr8XLpw==",
- "requires": {
- "postcss": "^7.0.2"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- },
- "dependencies": {
- "supports-color": {
- "version": "5.5.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
- "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
- "requires": {
- "chalk": "^2.4.2",
- "source-map": "^0.6.1",
- "supports-color": "^6.1.0"
- }
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss-selector-matches": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/postcss-selector-matches/-/postcss-selector-matches-4.0.0.tgz",
- "integrity": "sha512-LgsHwQR/EsRYSqlwdGzeaPKVT0Ml7LAT6E75T8W8xLJY62CE4S/l03BWIt3jT8Taq22kXP08s2SfTSzaraoPww==",
- "requires": {
- "balanced-match": "^1.0.0",
- "postcss": "^7.0.2"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- },
- "dependencies": {
- "supports-color": {
- "version": "5.5.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
- "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
- "requires": {
- "chalk": "^2.4.2",
- "source-map": "^0.6.1",
- "supports-color": "^6.1.0"
- }
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss-selector-not": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/postcss-selector-not/-/postcss-selector-not-4.0.0.tgz",
- "integrity": "sha512-W+bkBZRhqJaYN8XAnbbZPLWMvZD1wKTu0UxtFKdhtGjWYmxhkUneoeOhRJKdAE5V7ZTlnbHfCR+6bNwK9e1dTQ==",
- "requires": {
- "balanced-match": "^1.0.0",
- "postcss": "^7.0.2"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- },
- "dependencies": {
- "supports-color": {
- "version": "5.5.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
- "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss": {
- "version": "7.0.26",
- "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz",
- "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==",
- "requires": {
- "chalk": "^2.4.2",
- "source-map": "^0.6.1",
- "supports-color": "^6.1.0"
- }
- },
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
- "supports-color": {
- "version": "6.1.0",
- "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
- "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
- "requires": {
- "has-flag": "^3.0.0"
- }
- }
- }
- },
- "postcss-selector-parser": {
- "version": "5.0.0",
- "resolved": "https://registry.npmjs.org/postcss-selector-parser/-/postcss-selector-parser-5.0.0.tgz",
- "integrity": "sha512-w+zLE5Jhg6Liz8+rQOWEAwtwkyqpfnmsinXjXg6cY7YIONZZtgvE0v2O0uhQBs0peNomOJwWRKt6JBfTdTd3OQ==",
- "requires": {
- "cssesc": "^2.0.0",
- "indexes-of": "^1.0.1",
- "uniq": "^1.0.1"
- },
- "dependencies": {
- "cssesc": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/cssesc/-/cssesc-2.0.0.tgz",
- "integrity": "sha512-MsCAG1z9lPdoO/IUMLSBWBSVxVtJ1395VGIQ+Fc2gNdkQ1hNDnQdw3YhA71WJCBW1vdwA0cAnk/DnW6bqoEUYg=="
- }
- }
- },
"postcss-value-parser": {
"version": "3.3.1",
"resolved": "https://registry.npmjs.org/postcss-value-parser/-/postcss-value-parser-3.3.1.tgz",
@@ -14132,9 +12007,9 @@
}
},
"prelude-ls": {
- "version": "1.1.2",
- "resolved": "https://registry.npmjs.org/prelude-ls/-/prelude-ls-1.1.2.tgz",
- "integrity": "sha1-IZMqVJ9eUv/ZqCf1cOBL5iqX2lQ="
+ "version": "1.2.1",
+ "resolved": "https://registry.npmjs.org/prelude-ls/-/prelude-ls-1.2.1.tgz",
+ "integrity": "sha512-vkcDPrRZo1QZLbn5RLGPpg/WmIQ65qoWWhcGKf/b5eplkkarX0m9z8ppCat4mlOqUsWpyNuYgO3VRyrYHSzX5g=="
},
"prepend-http": {
"version": "2.0.0",
@@ -14142,9 +12017,9 @@
"integrity": "sha1-6SQ0v6XqjBn0HN/UAddBo8gZ2Jc="
},
"prettier": {
- "version": "2.0.2",
- "resolved": "https://registry.npmjs.org/prettier/-/prettier-2.0.2.tgz",
- "integrity": "sha512-5xJQIPT8BraI7ZnaDwSbu5zLrB6vvi8hVV58yHQ+QK64qrY40dULy0HSRlQ2/2IdzeBpjhDkqdcFBnFeDEMVdg==",
+ "version": "2.0.5",
+ "resolved": "https://registry.npmjs.org/prettier/-/prettier-2.0.5.tgz",
+ "integrity": "sha512-7PtVymN48hGcO4fGjybyBSIWDsLU4H4XlvOHfq91pz9kkGlonzwTfYkaIEwiRg/dAJF9YlbsduBAgtYLi+8cFg==",
"dev": true
},
"prettier-linter-helpers": {
@@ -14179,9 +12054,9 @@
}
},
"cross-spawn": {
- "version": "7.0.1",
- "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.1.tgz",
- "integrity": "sha512-u7v4o84SwFpD32Z8IIcPZ6z1/ie24O6RU3RbtL5Y316l3KuHVPx9ItBgWQ6VlfAFnRnTtMUrsQ9MUUTuEZjogg==",
+ "version": "7.0.2",
+ "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.2.tgz",
+ "integrity": "sha512-PD6G8QG3S4FK/XCGFbEQrDqO2AnMMsy0meR7lerlIOHAAbkuavGU/pOqprrlvfTNjvowivTeBsjebAL0NSoMxw==",
"requires": {
"path-key": "^3.1.0",
"shebang-command": "^2.0.0",
@@ -14213,24 +12088,11 @@
"path-exists": "^4.0.0"
}
},
- "get-stream": {
- "version": "5.1.0",
- "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-5.1.0.tgz",
- "integrity": "sha512-EXr1FOzrzTfGeL0gQdeFEvOMm2mzMOglyiOXSTpPC+iAjAKftbr3jpCMWynogwYnM+eSj9sHGc6wjIcDvYiygw==",
- "requires": {
- "pump": "^3.0.0"
- }
- },
"ignore": {
"version": "5.1.4",
"resolved": "https://registry.npmjs.org/ignore/-/ignore-5.1.4.tgz",
"integrity": "sha512-MzbUSahkTW1u7JpKKjY7LCARd1fU5W2rLdxlM4kdkayuCwZImjkpluF9CM1aLewYJguPDqewLam18Y6AU69A8A=="
},
- "is-stream": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/is-stream/-/is-stream-2.0.0.tgz",
- "integrity": "sha512-XCoy+WlUr7d1+Z8GgSuXmpuUFC9fOhRXglJMx+dwLKTkL44Cjd4W1Z5P+BQZpr+cR93aGP4S/s7Ftw6Nd/kiEw=="
- },
"locate-path": {
"version": "5.0.0",
"resolved": "https://registry.npmjs.org/locate-path/-/locate-path-5.0.0.tgz",
@@ -14247,10 +12109,13 @@
"path-key": "^3.0.0"
}
},
- "p-finally": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-2.0.1.tgz",
- "integrity": "sha512-vpm09aKwq6H9phqRQzecoDpD8TmVyGw70qmWlyq5onxY7tqyTTFVvxMykxQSQKILBSFlbXpypIw2T1Ml7+DDtw=="
+ "p-limit": {
+ "version": "2.3.0",
+ "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.3.0.tgz",
+ "integrity": "sha512-//88mFWSJx8lxCzwdAABTJL2MyWB12+eIY7MDL2SqLmAkeKU9qxRvWuSyTjm3FUmpBEMuFfckAIqEaVGUDxb6w==",
+ "requires": {
+ "p-try": "^2.0.0"
+ }
},
"p-locate": {
"version": "4.1.0",
@@ -14260,6 +12125,11 @@
"p-limit": "^2.2.0"
}
},
+ "p-try": {
+ "version": "2.2.0",
+ "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz",
+ "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ=="
+ },
"path-exists": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/path-exists/-/path-exists-4.0.0.tgz",
@@ -14293,6 +12163,14 @@
}
}
},
+ "prismjs": {
+ "version": "1.17.1",
+ "resolved": "https://registry.npmjs.org/prismjs/-/prismjs-1.17.1.tgz",
+ "integrity": "sha512-PrEDJAFdUGbOP6xK/UsfkC5ghJsPJviKgnQOoxaDbBjwc8op68Quupwt1DeAFoG8GImPhiKXAvvsH7wDSLsu1Q==",
+ "requires": {
+ "clipboard": "^2.0.0"
+ }
+ },
"private": {
"version": "0.1.8",
"resolved": "https://registry.npmjs.org/private/-/private-0.1.8.tgz",
@@ -14352,9 +12230,9 @@
}
},
"property-information": {
- "version": "5.4.0",
- "resolved": "https://registry.npmjs.org/property-information/-/property-information-5.4.0.tgz",
- "integrity": "sha512-nmMWAm/3vKFGmmOWOcdLjgq/Hlxa+hsuR/px1Lp/UGEyc5A22A6l78Shc2C0E71sPmAqglni+HrS7L7VJ7AUCA==",
+ "version": "5.5.0",
+ "resolved": "https://registry.npmjs.org/property-information/-/property-information-5.5.0.tgz",
+ "integrity": "sha512-RgEbCx2HLa1chNgvChcx+rrCWD0ctBmGSE0M7lVm1yyv4UbvbrWoXp/BkVLZefzjrRBGW8/Js6uh/BnlHXFyjA==",
"requires": {
"xtend": "^4.0.0"
}
@@ -14394,6 +12272,13 @@
"parse-asn1": "^5.0.0",
"randombytes": "^2.0.1",
"safe-buffer": "^5.1.2"
+ },
+ "dependencies": {
+ "bn.js": {
+ "version": "4.11.8",
+ "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.11.8.tgz",
+ "integrity": "sha512-ItfYfPLkWHUjckQCk8xC+LwxgK8NYcXywGigJgSwOP8Y2iyWT4f2vsZnoOXTTbo+o5yXmIUJ4gn5538SO5S3gA=="
+ }
}
},
"pump": {
@@ -14531,18 +12416,6 @@
"prop-types": "^15.6.2"
}
},
- "react-apollo": {
- "version": "3.1.3",
- "resolved": "https://registry.npmjs.org/react-apollo/-/react-apollo-3.1.3.tgz",
- "integrity": "sha512-orCZNoAkgveaK5b75y7fw1MSqSHOU/Wuu9rRFOGmRQBSQVZjvV4DI+hj604rHmuN9+WDABxb5W48wTa0F/xNZQ==",
- "requires": {
- "@apollo/react-common": "^3.1.3",
- "@apollo/react-components": "^3.1.3",
- "@apollo/react-hoc": "^3.1.3",
- "@apollo/react-hooks": "^3.1.3",
- "@apollo/react-ssr": "^3.1.3"
- }
- },
"react-dom": {
"version": "16.13.1",
"resolved": "https://registry.npmjs.org/react-dom/-/react-dom-16.13.1.tgz",
@@ -14552,22 +12425,28 @@
"object-assign": "^4.1.1",
"prop-types": "^15.6.2",
"scheduler": "^0.19.1"
+ },
+ "dependencies": {
+ "scheduler": {
+ "version": "0.19.1",
+ "resolved": "https://registry.npmjs.org/scheduler/-/scheduler-0.19.1.tgz",
+ "integrity": "sha512-n/zwRWRYSUj0/3g/otKDRPMh6qv2SYMWNq85IEa8iZyAv8od9zDYpGSnpBEjNgcMNq6Scbu5KfIPxNF72R/2EA==",
+ "requires": {
+ "loose-envify": "^1.1.0",
+ "object-assign": "^4.1.1"
+ }
+ }
}
},
- "react-error-overlay": {
- "version": "5.1.6",
- "resolved": "https://registry.npmjs.org/react-error-overlay/-/react-error-overlay-5.1.6.tgz",
- "integrity": "sha512-X1Y+0jR47ImDVr54Ab6V9eGk0Hnu7fVWGeHQSOXHf/C2pF9c6uy3gef8QUeuUiWlNb0i08InPSE5a/KJzNzw1Q=="
- },
"react-fast-compare": {
"version": "2.0.4",
"resolved": "https://registry.npmjs.org/react-fast-compare/-/react-fast-compare-2.0.4.tgz",
"integrity": "sha512-suNP+J1VU1MWFKcyt7RtjiSWUjvidmQSlqu+eHslq+342xCbGTYmC0mEhPCOHxlW0CywylOC1u2DFAT+bv4dBw=="
},
"react-is": {
- "version": "16.12.0",
- "resolved": "https://registry.npmjs.org/react-is/-/react-is-16.12.0.tgz",
- "integrity": "sha512-rPCkf/mWBtKc97aLL9/txD8DZdemK0vkA3JMLShjlJB3Pj3s+lpf1KaBzMfQrAmhMQB0n1cU/SUGgKKBCe837Q=="
+ "version": "16.13.1",
+ "resolved": "https://registry.npmjs.org/react-is/-/react-is-16.13.1.tgz",
+ "integrity": "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ=="
},
"react-reconciler": {
"version": "0.24.0",
@@ -14578,38 +12457,33 @@
"object-assign": "^4.1.1",
"prop-types": "^15.6.2",
"scheduler": "^0.18.0"
- },
- "dependencies": {
- "scheduler": {
- "version": "0.18.0",
- "resolved": "https://registry.npmjs.org/scheduler/-/scheduler-0.18.0.tgz",
- "integrity": "sha512-agTSHR1Nbfi6ulI0kYNK0203joW2Y5W4po4l+v03tOoiJKpTBbxpNhWDvqc/4IcOw+KLmSiQLTasZ4cab2/UWQ==",
- "requires": {
- "loose-envify": "^1.1.0",
- "object-assign": "^4.1.1"
- }
- }
}
},
+ "react-refresh": {
+ "version": "0.8.1",
+ "resolved": "https://registry.npmjs.org/react-refresh/-/react-refresh-0.8.1.tgz",
+ "integrity": "sha512-xZIKi49RtLUUSAZ4a4ut2xr+zr4+glOD5v0L413B55MPvlg4EQ6Ctx8PD4CmjlPGoAWmSCTmmkY59TErizNsow=="
+ },
"read-pkg": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/read-pkg/-/read-pkg-2.0.0.tgz",
- "integrity": "sha1-jvHAYjxqbbDcZxPEv6xGMysjaPg=",
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/read-pkg/-/read-pkg-1.1.0.tgz",
+ "integrity": "sha1-9f+qXs0pyzHAR0vKfXVra7KePyg=",
"requires": {
- "load-json-file": "^2.0.0",
+ "load-json-file": "^1.0.0",
"normalize-package-data": "^2.3.2",
- "path-type": "^2.0.0"
+ "path-type": "^1.0.0"
},
"dependencies": {
"load-json-file": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-2.0.0.tgz",
- "integrity": "sha1-eUfkIUmvgNaWy/eXvKq8/h/inKg=",
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-1.1.0.tgz",
+ "integrity": "sha1-lWkFcI1YtLq0wiYbBPWfMcmTdMA=",
"requires": {
"graceful-fs": "^4.1.2",
"parse-json": "^2.2.0",
"pify": "^2.0.0",
- "strip-bom": "^3.0.0"
+ "pinkie-promise": "^2.0.0",
+ "strip-bom": "^2.0.0"
}
},
"parse-json": {
@@ -14621,17 +12495,27 @@
}
},
"path-type": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/path-type/-/path-type-2.0.0.tgz",
- "integrity": "sha1-8BLMuEFbcJb8LaoQVMPXI4lZTHM=",
+ "version": "1.1.0",
+ "resolved": "https://registry.npmjs.org/path-type/-/path-type-1.1.0.tgz",
+ "integrity": "sha1-WcRPfuSR2nBNpBXaWkBwuk+P5EE=",
"requires": {
- "pify": "^2.0.0"
+ "graceful-fs": "^4.1.2",
+ "pify": "^2.0.0",
+ "pinkie-promise": "^2.0.0"
}
},
"pify": {
"version": "2.3.0",
"resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz",
"integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw="
+ },
+ "strip-bom": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/strip-bom/-/strip-bom-2.0.0.tgz",
+ "integrity": "sha1-YhmoVhZSBJHzV4i9vxRHqZx+aw4=",
+ "requires": {
+ "is-utf8": "^0.2.0"
+ }
}
}
},
@@ -14653,26 +12537,6 @@
"pinkie-promise": "^2.0.0"
}
},
- "load-json-file": {
- "version": "1.1.0",
- "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-1.1.0.tgz",
- "integrity": "sha1-lWkFcI1YtLq0wiYbBPWfMcmTdMA=",
- "requires": {
- "graceful-fs": "^4.1.2",
- "parse-json": "^2.2.0",
- "pify": "^2.0.0",
- "pinkie-promise": "^2.0.0",
- "strip-bom": "^2.0.0"
- }
- },
- "parse-json": {
- "version": "2.2.0",
- "resolved": "https://registry.npmjs.org/parse-json/-/parse-json-2.2.0.tgz",
- "integrity": "sha1-9ID0BDTvgHQfhGkJn43qGPVaTck=",
- "requires": {
- "error-ex": "^1.2.0"
- }
- },
"path-exists": {
"version": "2.1.0",
"resolved": "https://registry.npmjs.org/path-exists/-/path-exists-2.1.0.tgz",
@@ -14680,39 +12544,6 @@
"requires": {
"pinkie-promise": "^2.0.0"
}
- },
- "path-type": {
- "version": "1.1.0",
- "resolved": "https://registry.npmjs.org/path-type/-/path-type-1.1.0.tgz",
- "integrity": "sha1-WcRPfuSR2nBNpBXaWkBwuk+P5EE=",
- "requires": {
- "graceful-fs": "^4.1.2",
- "pify": "^2.0.0",
- "pinkie-promise": "^2.0.0"
- }
- },
- "pify": {
- "version": "2.3.0",
- "resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz",
- "integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw="
- },
- "read-pkg": {
- "version": "1.1.0",
- "resolved": "https://registry.npmjs.org/read-pkg/-/read-pkg-1.1.0.tgz",
- "integrity": "sha1-9f+qXs0pyzHAR0vKfXVra7KePyg=",
- "requires": {
- "load-json-file": "^1.0.0",
- "normalize-package-data": "^2.3.2",
- "path-type": "^1.0.0"
- }
- },
- "strip-bom": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/strip-bom/-/strip-bom-2.0.0.tgz",
- "integrity": "sha1-YhmoVhZSBJHzV4i9vxRHqZx+aw4=",
- "requires": {
- "is-utf8": "^0.2.0"
- }
}
}
},
@@ -14731,29 +12562,11 @@
}
},
"readdirp": {
- "version": "3.3.0",
- "resolved": "https://registry.npmjs.org/readdirp/-/readdirp-3.3.0.tgz",
- "integrity": "sha512-zz0pAkSPOXXm1viEwygWIPSPkcBYjW1xU5j/JBh5t9bGCJwa6f9+BJa6VaB2g+b55yVrmXzqkyLf4xaWYM0IkQ==",
- "requires": {
- "picomatch": "^2.0.7"
- }
- },
- "recast": {
- "version": "0.18.5",
- "resolved": "https://registry.npmjs.org/recast/-/recast-0.18.5.tgz",
- "integrity": "sha512-sD1WJrpLQAkXGyQZyGzTM75WJvyAd98II5CHdK3IYbt/cZlU0UzCRVU11nUFNXX9fBVEt4E9ajkMjBlUlG+Oog==",
+ "version": "3.4.0",
+ "resolved": "https://registry.npmjs.org/readdirp/-/readdirp-3.4.0.tgz",
+ "integrity": "sha512-0xe001vZBnJEK+uKcj8qOhyAKPzIT+gStxWr3LCB0DwcXR5NZJ3IaC+yGnHCYzB/S7ov3m3EEbZI2zeNvX+hGQ==",
"requires": {
- "ast-types": "0.13.2",
- "esprima": "~4.0.0",
- "private": "^0.1.8",
- "source-map": "~0.6.1"
- },
- "dependencies": {
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- }
+ "picomatch": "^2.2.1"
}
},
"redent": {
@@ -14780,15 +12593,33 @@
"resolved": "https://registry.npmjs.org/reflect.ownkeys/-/reflect.ownkeys-0.2.0.tgz",
"integrity": "sha1-dJrO7H8/34tj+SegSAnpDFwLNGA="
},
+ "refractor": {
+ "version": "2.10.1",
+ "resolved": "https://registry.npmjs.org/refractor/-/refractor-2.10.1.tgz",
+ "integrity": "sha512-Xh9o7hQiQlDbxo5/XkOX6H+x/q8rmlmZKr97Ie1Q8ZM32IRRd3B/UxuA/yXDW79DBSXGWxm2yRTbcTVmAciJRw==",
+ "requires": {
+ "hastscript": "^5.0.0",
+ "parse-entities": "^1.1.2",
+ "prismjs": "~1.17.0"
+ }
+ },
"regenerate": {
"version": "1.4.0",
"resolved": "https://registry.npmjs.org/regenerate/-/regenerate-1.4.0.tgz",
"integrity": "sha512-1G6jJVDWrt0rK99kBjvEtziZNCICAuvIPkSiUFIQxVP06RCVpq3dmDo2oi6ABpYaDYaTRr67BEhL8r1wgEZZKg=="
},
+ "regenerate-unicode-properties": {
+ "version": "8.2.0",
+ "resolved": "https://registry.npmjs.org/regenerate-unicode-properties/-/regenerate-unicode-properties-8.2.0.tgz",
+ "integrity": "sha512-F9DjY1vKLo/tPePDycuH3dn9H1OTPIkVD9Kz4LODu+F2C75mgjAJ7x/gwy6ZcSNRAAkhNlJSOHRe8k3p+K9WhA==",
+ "requires": {
+ "regenerate": "^1.4.0"
+ }
+ },
"regenerator-runtime": {
- "version": "0.13.3",
- "resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.13.3.tgz",
- "integrity": "sha512-naKIZz2GQ8JWh///G7L3X6LaQUAMp2lvb1rvwwsURe/VXwD6VMfr+/1NuNw3ag8v2kY1aQ/go5SNn79O9JU7yw=="
+ "version": "0.13.5",
+ "resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.13.5.tgz",
+ "integrity": "sha512-ZS5w8CpKFinUzOwW3c83oPeVXoNsrLsaCoLtJvAClH135j/R77RuymhiSErhm2lKcwSCIpmvIWSbDkIfAqKQlA=="
},
"regenerator-transform": {
"version": "0.14.4",
@@ -14797,21 +12628,6 @@
"requires": {
"@babel/runtime": "^7.8.4",
"private": "^0.1.8"
- },
- "dependencies": {
- "@babel/runtime": {
- "version": "7.9.2",
- "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.9.2.tgz",
- "integrity": "sha512-NE2DtOdufG7R5vnfQUTehdTfNycfUANEtCa9PssN9O/xmTzP4E08UI797ixaei6hBEVL9BI/PsdJS5x7mWoB9Q==",
- "requires": {
- "regenerator-runtime": "^0.13.4"
- }
- },
- "regenerator-runtime": {
- "version": "0.13.5",
- "resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.13.5.tgz",
- "integrity": "sha512-ZS5w8CpKFinUzOwW3c83oPeVXoNsrLsaCoLtJvAClH135j/R77RuymhiSErhm2lKcwSCIpmvIWSbDkIfAqKQlA=="
- }
}
},
"regex-not": {
@@ -14821,6 +12637,25 @@
"requires": {
"extend-shallow": "^3.0.2",
"safe-regex": "^1.1.0"
+ },
+ "dependencies": {
+ "extend-shallow": {
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-3.0.2.tgz",
+ "integrity": "sha1-Jqcarwc7OfshJxcnRhMcJwQCjbg=",
+ "requires": {
+ "assign-symbols": "^1.0.0",
+ "is-extendable": "^1.0.1"
+ }
+ },
+ "is-extendable": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/is-extendable/-/is-extendable-1.0.1.tgz",
+ "integrity": "sha512-arnXMxT1hhoKo9k1LZdmlNyJdDDfy2v0fXjFlmok4+i8ul/6WlbVge9bhM74OpNPQPMGUToDtz+KXa1PneJxOA==",
+ "requires": {
+ "is-plain-object": "^2.0.4"
+ }
+ }
}
},
"regex-parser": {
@@ -14838,9 +12673,9 @@
}
},
"regexpp": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/regexpp/-/regexpp-3.0.0.tgz",
- "integrity": "sha512-Z+hNr7RAVWxznLPuA7DIh8UNX1j9CDrUQxskw9IrBE1Dxue2lyXT+shqEIeLUjrokxIP8CMy1WkjgG3rTsd5/g=="
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/regexpp/-/regexpp-3.1.0.tgz",
+ "integrity": "sha512-ZOIzd8yVsQQA7j8GCSlPGXwg5PfmA1mrq0JP4nGhh54LaKN3xdai/vHUDu74pKwV8OxseMS65u2NImosQcSD0Q=="
},
"regexpu-core": {
"version": "4.7.0",
@@ -14853,21 +12688,6 @@
"regjsparser": "^0.6.4",
"unicode-match-property-ecmascript": "^1.0.4",
"unicode-match-property-value-ecmascript": "^1.2.0"
- },
- "dependencies": {
- "regenerate-unicode-properties": {
- "version": "8.2.0",
- "resolved": "https://registry.npmjs.org/regenerate-unicode-properties/-/regenerate-unicode-properties-8.2.0.tgz",
- "integrity": "sha512-F9DjY1vKLo/tPePDycuH3dn9H1OTPIkVD9Kz4LODu+F2C75mgjAJ7x/gwy6ZcSNRAAkhNlJSOHRe8k3p+K9WhA==",
- "requires": {
- "regenerate": "^1.4.0"
- }
- },
- "unicode-match-property-value-ecmascript": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/unicode-match-property-value-ecmascript/-/unicode-match-property-value-ecmascript-1.2.0.tgz",
- "integrity": "sha512-wjuQHGQVofmSJv1uVISKLE5zO2rNGzM/KCYZch/QQvez7C1hUhBIuZ701fYXExuufJFMPhv2SyL8CyoIfMLbIQ=="
- }
}
},
"registry-auth-token": {
@@ -14897,67 +12717,6 @@
"integrity": "sha512-64O87/dPDgfk8/RQqC4gkZoGyyWFIEUTTh80CU6CWuK5vkCGyekIx+oKcEIYtP/RAxSQltCZHCNu/mdd7fqlJw==",
"requires": {
"jsesc": "~0.5.0"
- },
- "dependencies": {
- "jsesc": {
- "version": "0.5.0",
- "resolved": "https://registry.npmjs.org/jsesc/-/jsesc-0.5.0.tgz",
- "integrity": "sha1-597mbjXW/Bb3EP6R1c9p9w8IkR0="
- }
- }
- },
- "rehype-highlight": {
- "version": "4.0.0",
- "resolved": "https://registry.npmjs.org/rehype-highlight/-/rehype-highlight-4.0.0.tgz",
- "integrity": "sha512-yYlmkMRhFP5JGehMLUIcboySiJSOriflbiwPjCmBKBnsMB8DcY4klyRlclbBEltJLRh1F66HNjZkmgq+dbKQPA==",
- "requires": {
- "hast-util-to-text": "^2.0.0",
- "lowlight": "^1.10.0",
- "unist-util-visit": "^2.0.0"
- }
- },
- "relay-compiler": {
- "version": "9.0.0",
- "resolved": "https://registry.npmjs.org/relay-compiler/-/relay-compiler-9.0.0.tgz",
- "integrity": "sha512-V509bPZMqVvITUcgXFgvO9pcnAKzF7pJXObnxfglOl3JsfJeDwTW1fu/CzPtvk5suxVMK6Cn9fMxZK2GdRXqYQ==",
- "requires": {
- "@babel/core": "^7.0.0",
- "@babel/generator": "^7.5.0",
- "@babel/parser": "^7.0.0",
- "@babel/runtime": "^7.0.0",
- "@babel/traverse": "^7.0.0",
- "@babel/types": "^7.0.0",
- "babel-preset-fbjs": "^3.3.0",
- "chalk": "^2.4.1",
- "fast-glob": "^2.2.2",
- "fb-watchman": "^2.0.0",
- "fbjs": "^1.0.0",
- "immutable": "~3.7.6",
- "nullthrows": "^1.1.1",
- "relay-runtime": "9.0.0",
- "signedsource": "^1.0.0",
- "yargs": "^14.2.0"
- },
- "dependencies": {
- "chalk": {
- "version": "2.4.2",
- "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
- "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
- "requires": {
- "ansi-styles": "^3.2.1",
- "escape-string-regexp": "^1.0.5",
- "supports-color": "^5.3.0"
- }
- }
- }
- },
- "relay-runtime": {
- "version": "9.0.0",
- "resolved": "https://registry.npmjs.org/relay-runtime/-/relay-runtime-9.0.0.tgz",
- "integrity": "sha512-bBNeNmwMOnqtCvuPnWdgflFSVwuUbGV7m7os8qHCUCSJ52DT5B/m6K4wisVh3eZ0QWYr7hheRDfmR/3UEdUe5A==",
- "requires": {
- "@babel/runtime": "^7.0.0",
- "fbjs": "^1.0.0"
}
},
"remark": {
@@ -14970,120 +12729,87 @@
"unified": "^8.2.0"
}
},
+ "remark-footnotes": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/remark-footnotes/-/remark-footnotes-1.0.0.tgz",
+ "integrity": "sha512-X9Ncj4cj3/CIvLI2Z9IobHtVi8FVdUrdJkCNaL9kdX8ohfsi18DXHsCVd/A7ssARBdccdDb5ODnt62WuEWaM/g=="
+ },
"remark-mdx": {
- "version": "1.5.8",
- "resolved": "https://registry.npmjs.org/remark-mdx/-/remark-mdx-1.5.8.tgz",
- "integrity": "sha512-wtqqsDuO/mU/ucEo/CDp0L8SPdS2oOE6PRsMm+lQ9TLmqgep4MBmyH8bLpoc8Wf7yjNmae/5yBzUN1YUvR/SsQ==",
+ "version": "1.6.1",
+ "resolved": "https://registry.npmjs.org/remark-mdx/-/remark-mdx-1.6.1.tgz",
+ "integrity": "sha512-UyCqqYFv9l5dstX29QpdqMprBHyUYUEQHOUe0MdFUIm1XATxfVGHbRPtVBFz4ccd5NV1UL/rmsruo9WOswwmpQ==",
"requires": {
- "@babel/core": "7.8.4",
+ "@babel/core": "7.9.0",
"@babel/helper-plugin-utils": "7.8.3",
- "@babel/plugin-proposal-object-rest-spread": "7.8.3",
+ "@babel/plugin-proposal-object-rest-spread": "7.9.5",
"@babel/plugin-syntax-jsx": "7.8.3",
- "@mdx-js/util": "^1.5.8",
+ "@mdx-js/util": "^1.6.1",
"is-alphabetical": "1.0.4",
- "remark-parse": "7.0.2",
- "unified": "8.4.2"
+ "remark-parse": "8.0.2",
+ "unified": "9.0.0"
},
"dependencies": {
- "@babel/core": {
- "version": "7.8.4",
- "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.8.4.tgz",
- "integrity": "sha512-0LiLrB2PwrVI+a2/IEskBopDYSd8BCb3rOvH7D5tzoWd696TBEduBvuLVm4Nx6rltrLZqvI3MCalB2K2aVzQjA==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.8.4",
- "@babel/helpers": "^7.8.4",
- "@babel/parser": "^7.8.4",
- "@babel/template": "^7.8.3",
- "@babel/traverse": "^7.8.4",
- "@babel/types": "^7.8.3",
- "convert-source-map": "^1.7.0",
- "debug": "^4.1.0",
- "gensync": "^1.0.0-beta.1",
- "json5": "^2.1.0",
- "lodash": "^4.17.13",
- "resolve": "^1.3.2",
- "semver": "^5.4.1",
- "source-map": "^0.5.0"
- }
- },
- "@babel/generator": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.9.4.tgz",
- "integrity": "sha512-rjP8ahaDy/ouhrvCoU1E5mqaitWrxwuNGU+dy1EpaoK48jZay4MdkskKGIMHLZNewg8sAsqpGSREJwP0zH3YQA==",
+ "parse-entities": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/parse-entities/-/parse-entities-2.0.0.tgz",
+ "integrity": "sha512-kkywGpCcRYhqQIchaWqZ875wzpS/bMKhz5HnN3p7wveJTkTtyAB/AlnS0f8DFSqYW1T82t6yEAkEcB+A1I3MbQ==",
"requires": {
- "@babel/types": "^7.9.0",
- "jsesc": "^2.5.1",
- "lodash": "^4.17.13",
- "source-map": "^0.5.0"
- },
- "dependencies": {
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
+ "character-entities": "^1.0.0",
+ "character-entities-legacy": "^1.0.0",
+ "character-reference-invalid": "^1.0.0",
+ "is-alphanumerical": "^1.0.0",
+ "is-decimal": "^1.0.0",
+ "is-hexadecimal": "^1.0.0"
}
},
- "@babel/helpers": {
- "version": "7.9.2",
- "resolved": "https://registry.npmjs.org/@babel/helpers/-/helpers-7.9.2.tgz",
- "integrity": "sha512-JwLvzlXVPjO8eU9c/wF9/zOIN7X6h8DYf7mG4CiFRZRvZNKEF5dQ3H3V+ASkHoIB3mWhatgl5ONhyqHRI6MppA==",
+ "remark-parse": {
+ "version": "8.0.2",
+ "resolved": "https://registry.npmjs.org/remark-parse/-/remark-parse-8.0.2.tgz",
+ "integrity": "sha512-eMI6kMRjsAGpMXXBAywJwiwAse+KNpmt+BK55Oofy4KvBZEqUDj6mWbGLJZrujoPIPPxDXzn3T9baRlpsm2jnQ==",
+ "requires": {
+ "ccount": "^1.0.0",
+ "collapse-white-space": "^1.0.2",
+ "is-alphabetical": "^1.0.0",
+ "is-decimal": "^1.0.0",
+ "is-whitespace-character": "^1.0.0",
+ "is-word-character": "^1.0.0",
+ "markdown-escapes": "^1.0.0",
+ "parse-entities": "^2.0.0",
+ "repeat-string": "^1.5.4",
+ "state-toggle": "^1.0.0",
+ "trim": "0.0.1",
+ "trim-trailing-lines": "^1.0.0",
+ "unherit": "^1.0.4",
+ "unist-util-remove-position": "^2.0.0",
+ "vfile-location": "^3.0.0",
+ "xtend": "^4.0.1"
+ }
+ },
+ "unified": {
+ "version": "9.0.0",
+ "resolved": "https://registry.npmjs.org/unified/-/unified-9.0.0.tgz",
+ "integrity": "sha512-ssFo33gljU3PdlWLjNp15Inqb77d6JnJSfyplGJPT/a+fNRNyCBeveBAYJdO5khKdF6WVHa/yYCC7Xl6BDwZUQ==",
+ "requires": {
+ "bail": "^1.0.0",
+ "extend": "^3.0.0",
+ "is-buffer": "^2.0.0",
+ "is-plain-obj": "^2.0.0",
+ "trough": "^1.0.0",
+ "vfile": "^4.0.0"
+ }
+ },
+ "unist-util-remove-position": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/unist-util-remove-position/-/unist-util-remove-position-2.0.1.tgz",
+ "integrity": "sha512-fDZsLYIe2uT+oGFnuZmy73K6ZxOPG/Qcm+w7jbEjaFcJgbQ6cqjs/eSPzXhsmGpAsWPkqZM9pYjww5QTn3LHMA==",
"requires": {
- "@babel/template": "^7.8.3",
- "@babel/traverse": "^7.9.0",
- "@babel/types": "^7.9.0"
- },
- "dependencies": {
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
+ "unist-util-visit": "^2.0.0"
}
},
- "@babel/parser": {
- "version": "7.9.4",
- "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.9.4.tgz",
- "integrity": "sha512-bC49otXX6N0/VYhgOMh4gnP26E9xnDZK3TmbNpxYzzz9BQLBosQwfyOe9/cXUU3txYhTzLCbcqd5c8y/OmCjHA=="
- },
- "@babel/traverse": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.9.0.tgz",
- "integrity": "sha512-jAZQj0+kn4WTHO5dUZkZKhbFrqZE7K5LAQ5JysMnmvGij+wOdr+8lWqPeW0BcF4wFwrEXXtdGO7wcV6YPJcf3w==",
- "requires": {
- "@babel/code-frame": "^7.8.3",
- "@babel/generator": "^7.9.0",
- "@babel/helper-function-name": "^7.8.3",
- "@babel/helper-split-export-declaration": "^7.8.3",
- "@babel/parser": "^7.9.0",
- "@babel/types": "^7.9.0",
- "debug": "^4.1.0",
- "globals": "^11.1.0",
- "lodash": "^4.17.13"
- },
- "dependencies": {
- "@babel/types": {
- "version": "7.9.0",
- "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.9.0.tgz",
- "integrity": "sha512-BS9JKfXkzzJl8RluW4JGknzpiUV7ZrvTayM6yfqLTVBEnFtyowVIOu6rqxRd5cVO6yGoWf4T8u8dgK9oB+GCng==",
- "requires": {
- "@babel/helper-validator-identifier": "^7.9.0",
- "lodash": "^4.17.13",
- "to-fast-properties": "^2.0.0"
- }
- }
- }
+ "vfile-location": {
+ "version": "3.0.1",
+ "resolved": "https://registry.npmjs.org/vfile-location/-/vfile-location-3.0.1.tgz",
+ "integrity": "sha512-yYBO06eeN/Ki6Kh1QAkgzYpWT1d3Qln+ZCtSbJqFExPl1S3y2qqotJQXoh6qEvl/jDlgpUJolBn3PItVnnZRqQ=="
}
}
},
@@ -15110,11 +12836,11 @@
}
},
"remark-squeeze-paragraphs": {
- "version": "3.0.4",
- "resolved": "https://registry.npmjs.org/remark-squeeze-paragraphs/-/remark-squeeze-paragraphs-3.0.4.tgz",
- "integrity": "sha512-Wmz5Yj9q+W1oryo8BV17JrOXZgUKVcpJ2ApE2pwnoHwhFKSk4Wp2PmFNbmJMgYSqAdFwfkoe+TSYop5Fy8wMgA==",
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/remark-squeeze-paragraphs/-/remark-squeeze-paragraphs-4.0.0.tgz",
+ "integrity": "sha512-8qRqmL9F4nuLPIgl92XUuxI3pFxize+F1H0e/W3llTk0UsjJaj01+RrirkMw7P21RKe4X6goQhYRSvNWX+70Rw==",
"requires": {
- "mdast-squeeze-paragraphs": "^3.0.0"
+ "mdast-squeeze-paragraphs": "^4.0.0"
}
},
"remark-stringify": {
@@ -15181,23 +12907,18 @@
"resolved": "https://registry.npmjs.org/require-main-filename/-/require-main-filename-2.0.0.tgz",
"integrity": "sha512-NKN5kMDylKuldxYLSUfrbo5Tuzh4hd+2E8NPPX02mZtn1VuREQToYe/ZdlJy+J3uCpfaiGF05e7B8W0iXbQHmg=="
},
- "requires-port": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/requires-port/-/requires-port-1.0.0.tgz",
- "integrity": "sha1-kl0mAdOaxIXgkc8NpcbmlNw9yv8="
- },
"resolve": {
- "version": "1.14.2",
- "resolved": "https://registry.npmjs.org/resolve/-/resolve-1.14.2.tgz",
- "integrity": "sha512-EjlOBLBO1kxsUxsKjLt7TAECyKW6fOh1VRkykQkKGzcBbjjPIxBqGh0jf7GJ3k/f5mxMqW3htMD3WdTUVtW8HQ==",
+ "version": "1.17.0",
+ "resolved": "https://registry.npmjs.org/resolve/-/resolve-1.17.0.tgz",
+ "integrity": "sha512-ic+7JYiV8Vi2yzQGFWOkiZD5Z9z7O2Zhm9XMaTxdJExKasieFCr+yXZ/WmXsckHiKl12ar0y6XiXDx3m4RHn1w==",
"requires": {
"path-parse": "^1.0.6"
}
},
"resolve-from": {
- "version": "5.0.0",
- "resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-5.0.0.tgz",
- "integrity": "sha512-qYg9KP24dD5qka9J47d0aVky0N+b4fTU89LN9iDnjB5waksiC49rvMB0PrUJQGoTmH50XPiqOvAjDfaijGxYZw=="
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-3.0.0.tgz",
+ "integrity": "sha1-six699nWiBvItuZTM17rywoYh0g="
},
"resolve-url": {
"version": "0.2.1",
@@ -15241,6 +12962,21 @@
}
}
},
+ "emojis-list": {
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/emojis-list/-/emojis-list-2.1.0.tgz",
+ "integrity": "sha1-TapNnbAPmBmIDHn6RXrlsJof04k="
+ },
+ "loader-utils": {
+ "version": "1.2.3",
+ "resolved": "https://registry.npmjs.org/loader-utils/-/loader-utils-1.2.3.tgz",
+ "integrity": "sha512-fkpz8ejdnEMG3s37wGL07iSBDg99O9D5yflE9RGNH3hRdx9SOwYfnGYdZOUIZitN8E+E2vkq3MUMYMvPYl5ZZA==",
+ "requires": {
+ "big.js": "^5.2.2",
+ "emojis-list": "^2.0.0",
+ "json5": "^1.0.1"
+ }
+ },
"postcss": {
"version": "7.0.21",
"resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz",
@@ -15251,11 +12987,6 @@
"supports-color": "^6.1.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- },
"supports-color": {
"version": "6.1.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
@@ -15288,16 +13019,6 @@
"resolved": "https://registry.npmjs.org/ret/-/ret-0.1.15.tgz",
"integrity": "sha512-TTlYpa+OL+vMMNG24xSlQGEJ3B/RzEfUlLct7b5G/ytav+wPrplCpVMFuwzXbkecJrb6IYo1iFb0S9v37754mg=="
},
- "retry": {
- "version": "0.12.0",
- "resolved": "https://registry.npmjs.org/retry/-/retry-0.12.0.tgz",
- "integrity": "sha1-G0KmJmoh8HQh0bC1S33BZ7AcATs="
- },
- "reusify": {
- "version": "1.0.4",
- "resolved": "https://registry.npmjs.org/reusify/-/reusify-1.0.4.tgz",
- "integrity": "sha512-U9nH88a3fc/ekCF1l0/UP1IosiuIjyTh7hBvXVMHYgVcfGvt897Xguj2UOLDeI5BG2m7/uwyaLVT6fbtCwTyzw=="
- },
"rework": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/rework/-/rework-1.0.1.tgz",
@@ -15319,6 +13040,16 @@
"resolved": "https://registry.npmjs.org/rework-visit/-/rework-visit-1.0.0.tgz",
"integrity": "sha1-mUWygD8hni96ygCtuLyfZA+ELJo="
},
+ "rgb-regex": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/rgb-regex/-/rgb-regex-1.0.1.tgz",
+ "integrity": "sha1-wODWiC3w4jviVKR16O3UGRX+rrE="
+ },
+ "rgba-regex": {
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/rgba-regex/-/rgba-regex-1.0.0.tgz",
+ "integrity": "sha1-QzdOLiyglosO8VI0YLfXMP8i7rM="
+ },
"rimraf": {
"version": "2.6.3",
"resolved": "https://registry.npmjs.org/rimraf/-/rimraf-2.6.3.tgz",
@@ -15336,18 +13067,19 @@
"inherits": "^2.0.1"
}
},
- "run-async": {
- "version": "2.4.0",
- "resolved": "https://registry.npmjs.org/run-async/-/run-async-2.4.0.tgz",
- "integrity": "sha512-xJTbh/d7Lm7SBhc1tNvTpeCHaEzoyxPrqNlvSdMfBTYwaY++UJFyXUOxAtsRUXjlqOfj8luNaR9vjCh4KeV+pg==",
+ "rivet-graphql": {
+ "version": "0.0.2",
+ "resolved": "https://registry.npmjs.org/rivet-graphql/-/rivet-graphql-0.0.2.tgz",
+ "integrity": "sha512-l3OVdEx7ZyECF/xIItCkMnyFIX1V/xY+HgrfrxjqEg4L9vz3U/qD853eB8fUa79P4pzFQ3FxRU2t2BKB6cyJTQ==",
"requires": {
- "is-promise": "^2.1.0"
+ "graphql": "^14.5.8",
+ "graphql-request": "^1.8.2"
}
},
- "run-parallel": {
- "version": "1.1.9",
- "resolved": "https://registry.npmjs.org/run-parallel/-/run-parallel-1.1.9.tgz",
- "integrity": "sha512-DEqnSRTDw/Tc3FXf49zedI638Z9onwUotBMiUFKmrO2sdFKIbXamXGQ3Axd4qgphxKB4kw/qP1w5kTxnfU1B9Q=="
+ "run-async": {
+ "version": "2.4.1",
+ "resolved": "https://registry.npmjs.org/run-async/-/run-async-2.4.1.tgz",
+ "integrity": "sha512-tvVnVv01b8c1RrA6Ep7JkStj85Guv/YrMcwqYQnwjsAS2cTmmPGBBjAjpCW7RrSodNSoE2/qg9O4bceNvUuDgQ=="
},
"run-queue": {
"version": "1.0.3",
@@ -15358,9 +13090,9 @@
}
},
"rxjs": {
- "version": "6.5.4",
- "resolved": "https://registry.npmjs.org/rxjs/-/rxjs-6.5.4.tgz",
- "integrity": "sha512-naMQXcgEo3csAEGvw/NydRA0fuS2nDZJiw1YUWFKU7aPPAPGZEsD4Iimit96qwCieH6y614MCLYwdkrWx7z/7Q==",
+ "version": "6.5.5",
+ "resolved": "https://registry.npmjs.org/rxjs/-/rxjs-6.5.5.tgz",
+ "integrity": "sha512-WfQI+1gohdf0Dai/Bbmk5L5ItH5tYqm3ki2c5GdWhKjalzjg93N3avFjVStyZZz+A2Em+ZxKH5bNghw9UeylGQ==",
"requires": {
"tslib": "^1.9.0"
}
@@ -15384,9 +13116,9 @@
"integrity": "sha512-YZo3K82SD7Riyi0E1EQPojLz7kpepnSQI9IyPbHHg1XXXevb5dJI7tpyN2ADxGcQbHG7vcyRHk0cbwqcQriUtg=="
},
"sanitize.css": {
- "version": "10.0.0",
- "resolved": "https://registry.npmjs.org/sanitize.css/-/sanitize.css-10.0.0.tgz",
- "integrity": "sha512-vTxrZz4dX5W86M6oVWVdOVe72ZiPs41Oi7Z6Km4W5Turyz28mrXSJhhEBZoRtzJWIv3833WKVwLSDWWkEfupMg=="
+ "version": "11.0.0",
+ "resolved": "https://registry.npmjs.org/sanitize.css/-/sanitize.css-11.0.0.tgz",
+ "integrity": "sha512-Ox0X2lk0kOGeODJgT9S9HFv0j5Cz89ir9ILylj62/vejHPdMmahmetfocoQwyiAnseeXyDa+KIbO6ZQJe5n2Lg=="
},
"sass-loader": {
"version": "8.0.2",
@@ -15400,21 +13132,10 @@
"semver": "^6.3.0"
},
"dependencies": {
- "ajv": {
- "version": "6.12.0",
- "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.12.0.tgz",
- "integrity": "sha512-D6gFiFA0RRLyUbvijN74DWAjXSFxWKaWP7mldxkVhyhAV3+SWA9HEJPHQ2c9soIeTFJqcSdFDGFgdqs1iUU2Hw==",
- "requires": {
- "fast-deep-equal": "^3.1.1",
- "fast-json-stable-stringify": "^2.0.0",
- "json-schema-traverse": "^0.4.1",
- "uri-js": "^4.2.2"
- }
- },
"schema-utils": {
- "version": "2.6.5",
- "resolved": "https://registry.npmjs.org/schema-utils/-/schema-utils-2.6.5.tgz",
- "integrity": "sha512-5KXuwKziQrTVHh8j/Uxz+QUbxkaLW9X/86NBlx/gnKgtsZA2GIVMUn17qWhRFwF8jdYb3Dig5hRO/W5mZqy6SQ==",
+ "version": "2.6.6",
+ "resolved": "https://registry.npmjs.org/schema-utils/-/schema-utils-2.6.6.tgz",
+ "integrity": "sha512-wHutF/WPSbIi9x6ctjGGk2Hvl0VOz5l3EKEuKbjPlB30mKZUzb9A5k9yEXRX3pwyqVLPvpfZZEllaFq/M718hA==",
"requires": {
"ajv": "^6.12.0",
"ajv-keywords": "^3.4.1"
@@ -15433,9 +13154,9 @@
"integrity": "sha512-NqVDv9TpANUjFm0N8uM5GxL36UgKi9/atZw+x7YFnQ8ckwFGKrl4xX4yWtrey3UJm5nP1kUbnYgLopqWNSRhWw=="
},
"scheduler": {
- "version": "0.19.1",
- "resolved": "https://registry.npmjs.org/scheduler/-/scheduler-0.19.1.tgz",
- "integrity": "sha512-n/zwRWRYSUj0/3g/otKDRPMh6qv2SYMWNq85IEa8iZyAv8od9zDYpGSnpBEjNgcMNq6Scbu5KfIPxNF72R/2EA==",
+ "version": "0.18.0",
+ "resolved": "https://registry.npmjs.org/scheduler/-/scheduler-0.18.0.tgz",
+ "integrity": "sha512-agTSHR1Nbfi6ulI0kYNK0203joW2Y5W4po4l+v03tOoiJKpTBbxpNhWDvqc/4IcOw+KLmSiQLTasZ4cab2/UWQ==",
"requires": {
"loose-envify": "^1.1.0",
"object-assign": "^4.1.1"
@@ -15458,16 +13179,6 @@
"requires": {
"extend-shallow": "^2.0.1",
"kind-of": "^6.0.0"
- },
- "dependencies": {
- "extend-shallow": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
- "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
- "requires": {
- "is-extendable": "^0.1.0"
- }
- }
}
},
"seek-bzip": {
@@ -15488,10 +13199,16 @@
}
}
},
+ "select": {
+ "version": "1.1.2",
+ "resolved": "https://registry.npmjs.org/select/-/select-1.1.2.tgz",
+ "integrity": "sha1-DnNQrN7ICxEIUoeG7B1EGNEbOW0=",
+ "optional": true
+ },
"semver": {
- "version": "5.7.1",
- "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
- "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ "version": "6.3.0",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
+ "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
},
"semver-compare": {
"version": "1.0.0",
@@ -15509,6 +13226,13 @@
"integrity": "sha1-V/Qd5pcHpicJp+AQS6IRcQnqR+g=",
"requires": {
"semver": "^5.3.0"
+ },
+ "dependencies": {
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
+ }
}
},
"send": {
@@ -15583,16 +13307,6 @@
"is-extendable": "^0.1.1",
"is-plain-object": "^2.0.3",
"split-string": "^3.0.1"
- },
- "dependencies": {
- "extend-shallow": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
- "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
- "requires": {
- "is-extendable": "^0.1.0"
- }
- }
}
},
"setimmediate": {
@@ -15635,11 +13349,6 @@
"resolved": "https://registry.npmjs.org/shebang-regex/-/shebang-regex-1.0.0.tgz",
"integrity": "sha1-2kL0l0DAtC2yypcoVxyxkMmO/qM="
},
- "shell-quote": {
- "version": "1.7.2",
- "resolved": "https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz",
- "integrity": "sha512-mRz/m/JVscCrkMyPqHc/bczi3OQHkLTqXHEFu0zDhK/qfv3UcOA4SVmRCLmos4bhjr9ekVQubj/R7waKapmiQg=="
- },
"side-channel": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/side-channel/-/side-channel-1.0.2.tgz",
@@ -15650,9 +13359,9 @@
}
},
"signal-exit": {
- "version": "3.0.2",
- "resolved": "https://registry.npmjs.org/signal-exit/-/signal-exit-3.0.2.tgz",
- "integrity": "sha1-tf3AjxKH6hF4Yo5BXiUTK3NkbG0="
+ "version": "3.0.3",
+ "resolved": "https://registry.npmjs.org/signal-exit/-/signal-exit-3.0.3.tgz",
+ "integrity": "sha512-VUJ49FC8U1OxwZLxIbTTrDvLnf/6TDgxZcK8wxR8zs13xpx7xbG60ndBlhNrFi2EMuFRoeDoJO7wthSLq42EjA=="
},
"signale": {
"version": "1.4.0",
@@ -15684,15 +13393,25 @@
}
}
},
- "signedsource": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/signedsource/-/signedsource-1.0.0.tgz",
- "integrity": "sha1-HdrOSYF5j5O9gzlzgD2A1S6TrWo="
+ "simple-swizzle": {
+ "version": "0.2.2",
+ "resolved": "https://registry.npmjs.org/simple-swizzle/-/simple-swizzle-0.2.2.tgz",
+ "integrity": "sha1-pNprY1/8zMoz9w0Xy5JZLeleVXo=",
+ "requires": {
+ "is-arrayish": "^0.3.1"
+ },
+ "dependencies": {
+ "is-arrayish": {
+ "version": "0.3.2",
+ "resolved": "https://registry.npmjs.org/is-arrayish/-/is-arrayish-0.3.2.tgz",
+ "integrity": "sha512-eVRqCvVlZbuw3GrM63ovNSNAeA1K16kaR/LRY/92w0zxQ5/1YzwblUX652i4Xs9RwAGjW9d9y6X88t8OaAJfWQ=="
+ }
+ }
},
"slash": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz",
- "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q=="
+ "version": "1.0.0",
+ "resolved": "https://registry.npmjs.org/slash/-/slash-1.0.0.tgz",
+ "integrity": "sha1-xB8vbDn8FtHNF61LXYlhFK5HDVU="
},
"slice-ansi": {
"version": "2.1.0",
@@ -15702,6 +13421,13 @@
"ansi-styles": "^3.2.0",
"astral-regex": "^1.0.0",
"is-fullwidth-code-point": "^2.0.0"
+ },
+ "dependencies": {
+ "is-fullwidth-code-point": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-2.0.0.tgz",
+ "integrity": "sha1-o7MKXE8ZkYMWeqq5O+764937ZU8="
+ }
}
},
"slugify": {
@@ -15740,18 +13466,10 @@
"is-descriptor": "^0.1.0"
}
},
- "extend-shallow": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
- "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
- "requires": {
- "is-extendable": "^0.1.0"
- }
- },
- "ms": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
- "integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
+ "source-map": {
+ "version": "0.5.7",
+ "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.5.7.tgz",
+ "integrity": "sha1-igOdLRAh0i0eoUyA2OpGi6LvP8w="
}
}
},
@@ -15809,6 +13527,11 @@
"kind-of": "^3.2.0"
},
"dependencies": {
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ },
"kind-of": {
"version": "3.2.2",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
@@ -15856,9 +13579,9 @@
"integrity": "sha512-qnQ7gVMxGNxsiL4lEuJwe/To8UnK7fAnmbGEEH8RpLouuKbeEm0lhbQVFIrNSuB+G7tVrAlVsZgETT5nljf+Iw=="
},
"source-map": {
- "version": "0.5.7",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.5.7.tgz",
- "integrity": "sha1-igOdLRAh0i0eoUyA2OpGi6LvP8w="
+ "version": "0.6.1",
+ "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
+ "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
},
"source-map-resolve": {
"version": "0.5.3",
@@ -15873,19 +13596,12 @@
}
},
"source-map-support": {
- "version": "0.5.16",
- "resolved": "https://registry.npmjs.org/source-map-support/-/source-map-support-0.5.16.tgz",
- "integrity": "sha512-efyLRJDr68D9hBBNIPWFjhpFzURh+KJykQwvMyW5UiZzYwoF6l4YMMDIJJEyFWxWCqfyxLzz6tSfUFR+kXXsVQ==",
+ "version": "0.5.19",
+ "resolved": "https://registry.npmjs.org/source-map-support/-/source-map-support-0.5.19.tgz",
+ "integrity": "sha512-Wonm7zOCIJzBGQdB+thsPar0kYuCIzYvxZwlBa87yi/Mdjv7Tip2cyVbLj5o0cFPN4EVkuTwb3GDDyUx2DGnGw==",
"requires": {
"buffer-from": "^1.0.0",
"source-map": "^0.6.0"
- },
- "dependencies": {
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- }
}
},
"source-map-url": {
@@ -15908,9 +13624,9 @@
}
},
"spdx-exceptions": {
- "version": "2.2.0",
- "resolved": "https://registry.npmjs.org/spdx-exceptions/-/spdx-exceptions-2.2.0.tgz",
- "integrity": "sha512-2XQACfElKi9SlVb1CYadKDXvoajPgBVPn/gOQLrTvHdElaVhr7ZEbqJaRnJLVNeaI4cMEAgVCeBMKF6MWRDCRA=="
+ "version": "2.3.0",
+ "resolved": "https://registry.npmjs.org/spdx-exceptions/-/spdx-exceptions-2.3.0.tgz",
+ "integrity": "sha512-/tTrYOC7PPI1nUAgx34hUpqXuyJG+DTHJTnIULG4rDygi4xu/tfgmq1e1cIRwRzwZgo4NLySi+ricLkZkw4i5A=="
},
"spdx-expression-parse": {
"version": "3.0.0",
@@ -15932,6 +13648,25 @@
"integrity": "sha512-NzNVhJDYpwceVVii8/Hu6DKfD2G+NrQHlS/V/qgv763EYudVwEcMQNxd2lh+0VrUByXN/oJkl5grOhYWvQUYiw==",
"requires": {
"extend-shallow": "^3.0.0"
+ },
+ "dependencies": {
+ "extend-shallow": {
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-3.0.2.tgz",
+ "integrity": "sha1-Jqcarwc7OfshJxcnRhMcJwQCjbg=",
+ "requires": {
+ "assign-symbols": "^1.0.0",
+ "is-extendable": "^1.0.1"
+ }
+ },
+ "is-extendable": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/is-extendable/-/is-extendable-1.0.1.tgz",
+ "integrity": "sha512-arnXMxT1hhoKo9k1LZdmlNyJdDDfy2v0fXjFlmok4+i8ul/6WlbVge9bhM74OpNPQPMGUToDtz+KXa1PneJxOA==",
+ "requires": {
+ "is-plain-object": "^2.0.4"
+ }
+ }
}
},
"sprintf-js": {
@@ -15949,11 +13684,6 @@
"lpad-align": "^1.0.1"
},
"dependencies": {
- "ansi-regex": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz",
- "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8="
- },
"ansi-styles": {
"version": "2.2.1",
"resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-2.2.1.tgz",
@@ -15971,14 +13701,6 @@
"supports-color": "^2.0.0"
}
},
- "strip-ansi": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz",
- "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=",
- "requires": {
- "ansi-regex": "^2.0.0"
- }
- },
"supports-color": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-2.0.0.tgz",
@@ -16098,16 +13820,51 @@
"requires": {
"astral-regex": "^1.0.0",
"strip-ansi": "^5.2.0"
+ },
+ "dependencies": {
+ "ansi-regex": {
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz",
+ "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg=="
+ },
+ "strip-ansi": {
+ "version": "5.2.0",
+ "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz",
+ "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==",
+ "requires": {
+ "ansi-regex": "^4.1.0"
+ }
+ }
}
},
"string-width": {
- "version": "3.1.0",
- "resolved": "https://registry.npmjs.org/string-width/-/string-width-3.1.0.tgz",
- "integrity": "sha512-vafcv6KjVZKSgz06oM/H6GDBrAtz8vdhQakGjFIvNrHA6y3HCF1CInLy+QLq8dTJPQ1b+KDUqDFctkdRW44e1w==",
+ "version": "4.2.0",
+ "resolved": "https://registry.npmjs.org/string-width/-/string-width-4.2.0.tgz",
+ "integrity": "sha512-zUz5JD+tgqtuDjMhwIg5uFVV3dtqZ9yQJlZVfq4I01/K5Paj5UHj7VyrQOJvzawSVlKpObApbfD0Ed6yJc+1eg==",
"requires": {
- "emoji-regex": "^7.0.1",
- "is-fullwidth-code-point": "^2.0.0",
- "strip-ansi": "^5.1.0"
+ "emoji-regex": "^8.0.0",
+ "is-fullwidth-code-point": "^3.0.0",
+ "strip-ansi": "^6.0.0"
+ },
+ "dependencies": {
+ "ansi-regex": {
+ "version": "5.0.0",
+ "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz",
+ "integrity": "sha512-bY6fj56OUQ0hU1KjFNDQuJFezqKdrAyFdIevADiqrWHwSlbmBNMHp5ak2f40Pm8JTFyM2mqxkG6ngkHO11f/lg=="
+ },
+ "emoji-regex": {
+ "version": "8.0.0",
+ "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-8.0.0.tgz",
+ "integrity": "sha512-MSjYzcWNOA0ewAHpz0MxpYFvwg6yjy1NG3xteoqz644VCo/RPgnr1/GGt+ic3iJTzQ8Eu3TdM14SawnVUmGE6A=="
+ },
+ "strip-ansi": {
+ "version": "6.0.0",
+ "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-6.0.0.tgz",
+ "integrity": "sha512-AuvKTrTfQNYNIctbR1K/YGTR1756GycPsg7b9bdV9Duqur4gv6aKqHXah67Z8ImS7WEz5QVcOtlfW2rZEugt6w==",
+ "requires": {
+ "ansi-regex": "^5.0.0"
+ }
+ }
}
},
"string.prototype.matchall": {
@@ -16123,22 +13880,42 @@
"side-channel": "^1.0.2"
}
},
+ "string.prototype.trimend": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/string.prototype.trimend/-/string.prototype.trimend-1.0.1.tgz",
+ "integrity": "sha512-LRPxFUaTtpqYsTeNKaFOw3R4bxIzWOnbQ837QfBylo8jIxtcbK/A/sMV7Q+OAV/vWo+7s25pOE10KYSjaSO06g==",
+ "requires": {
+ "define-properties": "^1.1.3",
+ "es-abstract": "^1.17.5"
+ }
+ },
"string.prototype.trimleft": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/string.prototype.trimleft/-/string.prototype.trimleft-2.1.1.tgz",
- "integrity": "sha512-iu2AGd3PuP5Rp7x2kEZCrB2Nf41ehzh+goo8TV7z8/XDBbsvc6HQIlUl9RjkZ4oyrW1XM5UwlGl1oVEaDjg6Ag==",
+ "version": "2.1.2",
+ "resolved": "https://registry.npmjs.org/string.prototype.trimleft/-/string.prototype.trimleft-2.1.2.tgz",
+ "integrity": "sha512-gCA0tza1JBvqr3bfAIFJGqfdRTyPae82+KTnm3coDXkZN9wnuW3HjGgN386D7hfv5CHQYCI022/rJPVlqXyHSw==",
"requires": {
"define-properties": "^1.1.3",
- "function-bind": "^1.1.1"
+ "es-abstract": "^1.17.5",
+ "string.prototype.trimstart": "^1.0.0"
}
},
"string.prototype.trimright": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/string.prototype.trimright/-/string.prototype.trimright-2.1.1.tgz",
- "integrity": "sha512-qFvWL3/+QIgZXVmJBfpHmxLB7xsUXz6HsUmP8+5dRaC3Q7oKUv9Vo6aMCRZC1smrtyECFsIT30PqBJ1gTjAs+g==",
+ "version": "2.1.2",
+ "resolved": "https://registry.npmjs.org/string.prototype.trimright/-/string.prototype.trimright-2.1.2.tgz",
+ "integrity": "sha512-ZNRQ7sY3KroTaYjRS6EbNiiHrOkjihL9aQE/8gfQ4DtAC/aEBRHFJa44OmoWxGGqXuJlfKkZW4WcXErGr+9ZFg==",
"requires": {
"define-properties": "^1.1.3",
- "function-bind": "^1.1.1"
+ "es-abstract": "^1.17.5",
+ "string.prototype.trimend": "^1.0.0"
+ }
+ },
+ "string.prototype.trimstart": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/string.prototype.trimstart/-/string.prototype.trimstart-1.0.1.tgz",
+ "integrity": "sha512-XxZn+QpvrBI1FOcg6dIpxUPgWCPuNXvMD72aaRaUQv1eD4e/Qy8i/hFTe0BUmD60p/QA6bh1avmuPTfNjqVWRw==",
+ "requires": {
+ "define-properties": "^1.1.3",
+ "es-abstract": "^1.17.5"
}
},
"string_decoder": {
@@ -16172,11 +13949,11 @@
}
},
"strip-ansi": {
- "version": "5.2.0",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz",
- "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==",
+ "version": "3.0.1",
+ "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz",
+ "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=",
"requires": {
- "ansi-regex": "^4.1.0"
+ "ansi-regex": "^2.0.0"
}
},
"strip-bom": {
@@ -16223,9 +14000,9 @@
}
},
"strip-json-comments": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/strip-json-comments/-/strip-json-comments-3.0.1.tgz",
- "integrity": "sha512-VTyMAUfdm047mwKl+u79WIdrZxtFtn+nBxHeb844XBQ9uMNTuTHdx2hc5RiAJYqwTj3wc/xe5HLSdJSkJ+WfZw=="
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/strip-json-comments/-/strip-json-comments-3.1.0.tgz",
+ "integrity": "sha512-e6/d0eBu7gHtdCqFt0xJr642LdToM5/cN4Qb9DbHjVx1CP5RyeM+zH7pbecEmDv/lBqb0QH+6Uqq75rxFPkM0w=="
},
"strip-outer": {
"version": "1.0.1",
@@ -16236,29 +14013,36 @@
}
},
"style-loader": {
- "version": "1.0.0",
- "resolved": "https://registry.npmjs.org/style-loader/-/style-loader-1.0.0.tgz",
- "integrity": "sha512-B0dOCFwv7/eY31a5PCieNwMgMhVGFe9w+rh7s/Bx8kfFkrth9zfTZquoYvdw8URgiqxObQKcpW51Ugz1HjfdZw==",
+ "version": "1.2.0",
+ "resolved": "https://registry.npmjs.org/style-loader/-/style-loader-1.2.0.tgz",
+ "integrity": "sha512-HC8WcGnjwNrKji7HSBqFOhGNUSt7UDU/jHxT6bA83Gk+JWJBmgitWlGihc0V1w6ZvwlzcX5LJOsofZzSP7b1tQ==",
"requires": {
- "loader-utils": "^1.2.3",
- "schema-utils": "^2.0.1"
+ "loader-utils": "^2.0.0",
+ "schema-utils": "^2.6.6"
},
"dependencies": {
- "ajv": {
- "version": "6.12.0",
- "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.12.0.tgz",
- "integrity": "sha512-D6gFiFA0RRLyUbvijN74DWAjXSFxWKaWP7mldxkVhyhAV3+SWA9HEJPHQ2c9soIeTFJqcSdFDGFgdqs1iUU2Hw==",
+ "json5": {
+ "version": "2.1.3",
+ "resolved": "https://registry.npmjs.org/json5/-/json5-2.1.3.tgz",
+ "integrity": "sha512-KXPvOm8K9IJKFM0bmdn8QXh7udDh1g/giieX0NLCaMnb4hEiVFqnop2ImTXCc5e0/oHz3LTqmHGtExn5hfMkOA==",
+ "requires": {
+ "minimist": "^1.2.5"
+ }
+ },
+ "loader-utils": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.0.tgz",
+ "integrity": "sha512-rP4F0h2RaWSvPEkD7BLDFQnvSf+nK+wr3ESUjNTyAGobqrijmW92zc+SO6d4p4B1wh7+B/Jg1mkQe5NYUEHtHQ==",
"requires": {
- "fast-deep-equal": "^3.1.1",
- "fast-json-stable-stringify": "^2.0.0",
- "json-schema-traverse": "^0.4.1",
- "uri-js": "^4.2.2"
+ "big.js": "^5.2.2",
+ "emojis-list": "^3.0.0",
+ "json5": "^2.1.2"
}
},
"schema-utils": {
- "version": "2.6.5",
- "resolved": "https://registry.npmjs.org/schema-utils/-/schema-utils-2.6.5.tgz",
- "integrity": "sha512-5KXuwKziQrTVHh8j/Uxz+QUbxkaLW9X/86NBlx/gnKgtsZA2GIVMUn17qWhRFwF8jdYb3Dig5hRO/W5mZqy6SQ==",
+ "version": "2.6.6",
+ "resolved": "https://registry.npmjs.org/schema-utils/-/schema-utils-2.6.6.tgz",
+ "integrity": "sha512-wHutF/WPSbIi9x6ctjGGk2Hvl0VOz5l3EKEuKbjPlB30mKZUzb9A5k9yEXRX3pwyqVLPvpfZZEllaFq/M718hA==",
"requires": {
"ajv": "^6.12.0",
"ajv-keywords": "^3.4.1"
@@ -16289,6 +14073,31 @@
"stylis-rule-sheet": "0.0.10"
},
"dependencies": {
+ "@babel/types": {
+ "version": "7.8.3",
+ "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz",
+ "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==",
+ "requires": {
+ "esutils": "^2.0.2",
+ "lodash": "^4.17.13",
+ "to-fast-properties": "^2.0.0"
+ }
+ },
+ "emojis-list": {
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/emojis-list/-/emojis-list-2.1.0.tgz",
+ "integrity": "sha1-TapNnbAPmBmIDHn6RXrlsJof04k="
+ },
+ "loader-utils": {
+ "version": "1.2.3",
+ "resolved": "https://registry.npmjs.org/loader-utils/-/loader-utils-1.2.3.tgz",
+ "integrity": "sha512-fkpz8ejdnEMG3s37wGL07iSBDg99O9D5yflE9RGNH3hRdx9SOwYfnGYdZOUIZitN8E+E2vkq3MUMYMvPYl5ZZA==",
+ "requires": {
+ "big.js": "^5.2.2",
+ "emojis-list": "^2.0.0",
+ "json5": "^1.0.1"
+ }
+ },
"source-map": {
"version": "0.7.3",
"resolved": "https://registry.npmjs.org/source-map/-/source-map-0.7.3.tgz",
@@ -16296,6 +14105,66 @@
}
}
},
+ "stylehacks": {
+ "version": "4.0.3",
+ "resolved": "https://registry.npmjs.org/stylehacks/-/stylehacks-4.0.3.tgz",
+ "integrity": "sha512-7GlLk9JwlElY4Y6a/rmbH2MhVlTyVmiJd1PfTCqFaIBEGMYNsrO/v3SeGTdhBThLg4Z+NbOk/qFMwCa+J+3p/g==",
+ "requires": {
+ "browserslist": "^4.0.0",
+ "postcss": "^7.0.0",
+ "postcss-selector-parser": "^3.0.0"
+ },
+ "dependencies": {
+ "chalk": {
+ "version": "2.4.2",
+ "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
+ "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
+ "requires": {
+ "ansi-styles": "^3.2.1",
+ "escape-string-regexp": "^1.0.5",
+ "supports-color": "^5.3.0"
+ },
+ "dependencies": {
+ "supports-color": {
+ "version": "5.5.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
+ "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
+ "requires": {
+ "has-flag": "^3.0.0"
+ }
+ }
+ }
+ },
+ "postcss": {
+ "version": "7.0.30",
+ "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.30.tgz",
+ "integrity": "sha512-nu/0m+NtIzoubO+xdAlwZl/u5S5vi/y6BCsoL8D+8IxsD3XvBS8X4YEADNIVXKVuQvduiucnRv+vPIqj56EGMQ==",
+ "requires": {
+ "chalk": "^2.4.2",
+ "source-map": "^0.6.1",
+ "supports-color": "^6.1.0"
+ }
+ },
+ "postcss-selector-parser": {
+ "version": "3.1.2",
+ "resolved": "https://registry.npmjs.org/postcss-selector-parser/-/postcss-selector-parser-3.1.2.tgz",
+ "integrity": "sha512-h7fJ/5uWuRVyOtkO45pnt1Ih40CEleeyCHzipqAZO2e5H20g25Y48uYnFUiShvY4rZWNJ/Bib/KVPmanaCtOhA==",
+ "requires": {
+ "dot-prop": "^5.2.0",
+ "indexes-of": "^1.0.1",
+ "uniq": "^1.0.1"
+ }
+ },
+ "supports-color": {
+ "version": "6.1.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-6.1.0.tgz",
+ "integrity": "sha512-qe1jfm1Mg7Nq/NSh6XE24gPXROEVsWHxC1LIx//XNlD9iw7YZQGjZNjYN7xGaEG6iKdA8EtNFW6R0gjnVXp+wQ==",
+ "requires": {
+ "has-flag": "^3.0.0"
+ }
+ }
+ }
+ },
"stylis": {
"version": "3.5.4",
"resolved": "https://registry.npmjs.org/stylis/-/stylis-3.5.4.tgz",
@@ -16315,18 +14184,26 @@
}
},
"supports-hyperlinks": {
- "version": "1.0.1",
- "resolved": "https://registry.npmjs.org/supports-hyperlinks/-/supports-hyperlinks-1.0.1.tgz",
- "integrity": "sha512-HHi5kVSefKaJkGYXbDuKbUGRVxqnWGn3J2e39CYcNJEfWciGq2zYtOhXLTlvrOZW1QU7VX67w7fMmWafHX9Pfw==",
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/supports-hyperlinks/-/supports-hyperlinks-2.1.0.tgz",
+ "integrity": "sha512-zoE5/e+dnEijk6ASB6/qrK+oYdm2do1hjoLWrqUC/8WEIW1gbxFcKuBof7sW8ArN6e+AYvsE8HBGiVRWL/F5CA==",
"requires": {
- "has-flag": "^2.0.0",
- "supports-color": "^5.0.0"
+ "has-flag": "^4.0.0",
+ "supports-color": "^7.0.0"
},
"dependencies": {
"has-flag": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-2.0.0.tgz",
- "integrity": "sha1-6CB68cx7MNRGzHC3NLXovhj4jVE="
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-4.0.0.tgz",
+ "integrity": "sha512-EykJT/Q1KjTWctppgIAgfSO0tKVuZUjhgMr17kqTumMl6Afv3EISleU7qZUzoXDFTAHTDC4NOoG/ZxU3EvlMPQ=="
+ },
+ "supports-color": {
+ "version": "7.1.0",
+ "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-7.1.0.tgz",
+ "integrity": "sha512-oRSIpR8pxT1Wr2FquTNnGet79b3BWljqOuoW/h4oBhxJ/HUbX5nX6JSruTkvXDCFMwDPvsaTTbvMLKZWSy0R5g==",
+ "requires": {
+ "has-flag": "^4.0.0"
+ }
}
}
},
@@ -16362,11 +14239,6 @@
}
}
},
- "symbol-observable": {
- "version": "1.2.0",
- "resolved": "https://registry.npmjs.org/symbol-observable/-/symbol-observable-1.2.0.tgz",
- "integrity": "sha512-e900nM8RRtGhlV36KGEU9k65K3mPb1WV70OdjfxlG2EAuM1noi/E/BaW/uMhL7bPEssK8QV57vN3esixjUvcXQ=="
- },
"table": {
"version": "5.4.6",
"resolved": "https://registry.npmjs.org/table/-/table-5.4.6.tgz",
@@ -16376,6 +14248,41 @@
"lodash": "^4.17.14",
"slice-ansi": "^2.1.0",
"string-width": "^3.0.0"
+ },
+ "dependencies": {
+ "ansi-regex": {
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz",
+ "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg=="
+ },
+ "emoji-regex": {
+ "version": "7.0.3",
+ "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-7.0.3.tgz",
+ "integrity": "sha512-CwBLREIQ7LvYFB0WyRvwhq5N5qPhc6PMjD6bYggFlI5YyDgl+0vxq5VHbMOFqLg7hfWzmu8T5Z1QofhmTIhItA=="
+ },
+ "is-fullwidth-code-point": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-2.0.0.tgz",
+ "integrity": "sha1-o7MKXE8ZkYMWeqq5O+764937ZU8="
+ },
+ "string-width": {
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/string-width/-/string-width-3.1.0.tgz",
+ "integrity": "sha512-vafcv6KjVZKSgz06oM/H6GDBrAtz8vdhQakGjFIvNrHA6y3HCF1CInLy+QLq8dTJPQ1b+KDUqDFctkdRW44e1w==",
+ "requires": {
+ "emoji-regex": "^7.0.1",
+ "is-fullwidth-code-point": "^2.0.0",
+ "strip-ansi": "^5.1.0"
+ }
+ },
+ "strip-ansi": {
+ "version": "5.2.0",
+ "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz",
+ "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==",
+ "requires": {
+ "ansi-regex": "^4.1.0"
+ }
+ }
}
},
"tapable": {
@@ -16409,39 +14316,32 @@
"requires": {
"temp-dir": "^1.0.0",
"uuid": "^3.0.1"
+ },
+ "dependencies": {
+ "uuid": {
+ "version": "3.4.0",
+ "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz",
+ "integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A=="
+ }
}
},
"terminal-link": {
- "version": "1.3.0",
- "resolved": "https://registry.npmjs.org/terminal-link/-/terminal-link-1.3.0.tgz",
- "integrity": "sha512-nFaWG/gs3brGi3opgWU2+dyFGbQ7tueSRYOBOD8URdDXCbAGqDEZzuskCc+okCClYcJFDPwn8e2mbv4FqAnWFA==",
+ "version": "2.1.1",
+ "resolved": "https://registry.npmjs.org/terminal-link/-/terminal-link-2.1.1.tgz",
+ "integrity": "sha512-un0FmiRUQNr5PJqy9kP7c40F5BOfpGlYTrxonDChEZB7pzZxRNp/bt+ymiy9/npwXya9KH99nJ/GXFIiUkYGFQ==",
"requires": {
- "ansi-escapes": "^3.2.0",
- "supports-hyperlinks": "^1.0.1"
- },
- "dependencies": {
- "ansi-escapes": {
- "version": "3.2.0",
- "resolved": "https://registry.npmjs.org/ansi-escapes/-/ansi-escapes-3.2.0.tgz",
- "integrity": "sha512-cBhpre4ma+U0T1oM5fXg7Dy1Jw7zzwv7lt/GoCpr+hDQJoYnKVPLL4dCvSEFMmQurOQvSrwT7SL/DAlhBI97RQ=="
- }
+ "ansi-escapes": "^4.2.1",
+ "supports-hyperlinks": "^2.0.0"
}
},
"terser": {
- "version": "4.4.2",
- "resolved": "https://registry.npmjs.org/terser/-/terser-4.4.2.tgz",
- "integrity": "sha512-Uufrsvhj9O1ikwgITGsZ5EZS6qPokUOkCegS7fYOdGTv+OA90vndUbU6PEjr5ePqHfNUbGyMO7xyIZv2MhsALQ==",
+ "version": "4.6.8",
+ "resolved": "https://registry.npmjs.org/terser/-/terser-4.6.8.tgz",
+ "integrity": "sha512-drV7ga6ZlIpBtitvb87Uk7P7gAJkCt3j/TqZr9wwF4Dlt0MBn52ANIAyuvP1F605WdPY4w6vT63u6KTWqaXFRQ==",
"requires": {
"commander": "^2.20.0",
"source-map": "~0.6.1",
"source-map-support": "~0.5.12"
- },
- "dependencies": {
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- }
}
},
"terser-webpack-plugin": {
@@ -16470,11 +14370,28 @@
"pkg-dir": "^3.0.0"
}
},
+ "find-up": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/find-up/-/find-up-3.0.0.tgz",
+ "integrity": "sha512-1yD6RmLI1XBfxugvORwlck6f75tYL+iR0jqwsOrOxMZyGYqUuDhJ0l4AXdO1iX/FTs9cBAMEk1gWSEx1kSbylg==",
+ "requires": {
+ "locate-path": "^3.0.0"
+ }
+ },
"is-wsl": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/is-wsl/-/is-wsl-1.1.0.tgz",
"integrity": "sha1-HxbkqiKwTRM2tmGIpmrzxgDDpm0="
},
+ "locate-path": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-3.0.0.tgz",
+ "integrity": "sha512-7AO748wWnIhNqAuaty2ZWHkQHRSNfPVIsPIfwEOWO22AmaoVrWavlOcMR5nzTLNYvp36X220/maaRsrec1G65A==",
+ "requires": {
+ "p-locate": "^3.0.0",
+ "path-exists": "^3.0.0"
+ }
+ },
"make-dir": {
"version": "2.1.0",
"resolved": "https://registry.npmjs.org/make-dir/-/make-dir-2.1.0.tgz",
@@ -16484,6 +14401,27 @@
"semver": "^5.6.0"
}
},
+ "p-limit": {
+ "version": "2.3.0",
+ "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.3.0.tgz",
+ "integrity": "sha512-//88mFWSJx8lxCzwdAABTJL2MyWB12+eIY7MDL2SqLmAkeKU9qxRvWuSyTjm3FUmpBEMuFfckAIqEaVGUDxb6w==",
+ "requires": {
+ "p-try": "^2.0.0"
+ }
+ },
+ "p-locate": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-3.0.0.tgz",
+ "integrity": "sha512-x+12w/To+4GFfgJhBEpiDcLozRJGegY+Ei7/z0tSLkMmxGZNybVMSfWj9aJn8Z5Fc7dBUNJOOVgPv2H7IwulSQ==",
+ "requires": {
+ "p-limit": "^2.0.0"
+ }
+ },
+ "p-try": {
+ "version": "2.2.0",
+ "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz",
+ "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ=="
+ },
"pkg-dir": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/pkg-dir/-/pkg-dir-3.0.0.tgz",
@@ -16492,10 +14430,10 @@
"find-up": "^3.0.0"
}
},
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
+ "semver": {
+ "version": "5.7.1",
+ "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz",
+ "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ=="
}
}
},
@@ -16504,16 +14442,6 @@
"resolved": "https://registry.npmjs.org/text-table/-/text-table-0.2.0.tgz",
"integrity": "sha1-f17oI66AUgfACvLfSoTsP8+lcLQ="
},
- "thread-loader": {
- "version": "2.1.3",
- "resolved": "https://registry.npmjs.org/thread-loader/-/thread-loader-2.1.3.tgz",
- "integrity": "sha512-wNrVKH2Lcf8ZrWxDF/khdlLlsTMczdcwPA9VEK4c2exlEPynYWxi9op3nPTo5lAnDIkE0rQEB3VBP+4Zncc9Hg==",
- "requires": {
- "loader-runner": "^2.3.1",
- "loader-utils": "^1.1.0",
- "neo-async": "^2.6.0"
- }
- },
"through": {
"version": "2.3.8",
"resolved": "https://registry.npmjs.org/through/-/through-2.3.8.tgz",
@@ -16541,17 +14469,28 @@
"setimmediate": "^1.0.4"
}
},
- "tiny-warning": {
- "version": "1.0.3",
- "resolved": "https://registry.npmjs.org/tiny-warning/-/tiny-warning-1.0.3.tgz",
- "integrity": "sha512-lBN9zLN/oAf68o3zNXYrdCt1kP8WsiGW8Oo2ka41b2IM5JL/S1CTyX1rW0mb/zSuJun0ZUrDxx4sqvYS2FWzPA=="
+ "timsort": {
+ "version": "0.3.0",
+ "resolved": "https://registry.npmjs.org/timsort/-/timsort-0.3.0.tgz",
+ "integrity": "sha1-QFQRqOfmM5/mTbmiNN4R3DHgK9Q="
+ },
+ "tiny-emitter": {
+ "version": "2.1.0",
+ "resolved": "https://registry.npmjs.org/tiny-emitter/-/tiny-emitter-2.1.0.tgz",
+ "integrity": "sha512-NB6Dk1A9xgQPMoGqC5CVXn123gWyte215ONT5Pp5a0yt4nlEoO1ZWeCwpncaekPHXO60i47ihFnZPiRPjRMq4Q==",
+ "optional": true
+ },
+ "tiny-warning": {
+ "version": "1.0.3",
+ "resolved": "https://registry.npmjs.org/tiny-warning/-/tiny-warning-1.0.3.tgz",
+ "integrity": "sha512-lBN9zLN/oAf68o3zNXYrdCt1kP8WsiGW8Oo2ka41b2IM5JL/S1CTyX1rW0mb/zSuJun0ZUrDxx4sqvYS2FWzPA=="
},
"tippy.js": {
- "version": "4.3.5",
- "resolved": "https://registry.npmjs.org/tippy.js/-/tippy.js-4.3.5.tgz",
- "integrity": "sha512-NDq3efte8nGK6BOJ1dDN1/WelAwfmh3UtIYXXck6+SxLzbIQNZE/cmRSnwScZ/FyiKdIcvFHvYUgqmoGx8CcyA==",
+ "version": "5.2.1",
+ "resolved": "https://registry.npmjs.org/tippy.js/-/tippy.js-5.2.1.tgz",
+ "integrity": "sha512-66UT6JRVn3dXNCORE+0UvUK3JZqV/VhLlU6HTDm3FmrweUUFUxUGvT8tUQ7ycMp+uhuLAwQw6dBabyC+iKf/MA==",
"requires": {
- "popper.js": "^1.14.7"
+ "popper.js": "^1.16.0"
}
},
"tmp": {
@@ -16585,6 +14524,11 @@
"kind-of": "^3.0.2"
},
"dependencies": {
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ },
"kind-of": {
"version": "3.2.2",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
@@ -16609,15 +14553,33 @@
"extend-shallow": "^3.0.2",
"regex-not": "^1.0.2",
"safe-regex": "^1.1.0"
+ },
+ "dependencies": {
+ "extend-shallow": {
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-3.0.2.tgz",
+ "integrity": "sha1-Jqcarwc7OfshJxcnRhMcJwQCjbg=",
+ "requires": {
+ "assign-symbols": "^1.0.0",
+ "is-extendable": "^1.0.1"
+ }
+ },
+ "is-extendable": {
+ "version": "1.0.1",
+ "resolved": "https://registry.npmjs.org/is-extendable/-/is-extendable-1.0.1.tgz",
+ "integrity": "sha512-arnXMxT1hhoKo9k1LZdmlNyJdDDfy2v0fXjFlmok4+i8ul/6WlbVge9bhM74OpNPQPMGUToDtz+KXa1PneJxOA==",
+ "requires": {
+ "is-plain-object": "^2.0.4"
+ }
+ }
}
},
"to-regex-range": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-2.1.1.tgz",
- "integrity": "sha1-fIDBe53+vlmeJzZ+DU3VWQFB2zg=",
+ "version": "5.0.1",
+ "resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-5.0.1.tgz",
+ "integrity": "sha512-65P7iz6X5yEr1cwcgvQxbbIw7Uk3gOy5dIdtZ4rDveLqhrdJP+Li/Hx6tyK0NEb+2GCyneCMJiGqrADCSNk8sQ==",
"requires": {
- "is-number": "^3.0.0",
- "repeat-string": "^1.6.1"
+ "is-number": "^7.0.0"
}
},
"to-vfile": {
@@ -16627,13 +14589,6 @@
"requires": {
"is-buffer": "^2.0.0",
"vfile": "^4.0.0"
- },
- "dependencies": {
- "is-buffer": {
- "version": "2.0.4",
- "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-2.0.4.tgz",
- "integrity": "sha512-Kq1rokWXOPXWuaMAqZiJW4XxsmD9zGx9q4aePabbn3qCRGedtH7Cm+zV8WETitMfu1wdh+Rvd6w5egwSngUX2A=="
- }
}
},
"toidentifier": {
@@ -16684,23 +14639,15 @@
"resolved": "https://registry.npmjs.org/tryer/-/tryer-1.0.1.tgz",
"integrity": "sha512-c3zayb8/kWWpycWYg87P71E1S1ZL6b6IJxfb5fvsUgsf0S2MVGaDhDXXjDMpdCpfWXqptc+4mXwmiy1ypXqRAA=="
},
- "ts-invariant": {
- "version": "0.4.4",
- "resolved": "https://registry.npmjs.org/ts-invariant/-/ts-invariant-0.4.4.tgz",
- "integrity": "sha512-uEtWkFM/sdZvRNNDL3Ehu4WVpwaulhwQszV8mrtcdeE8nN00BV9mAmQ88RkrBhFgl9gMgvjJLAQcZbnPXI9mlA==",
- "requires": {
- "tslib": "^1.9.3"
- }
- },
"ts-pnp": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/ts-pnp/-/ts-pnp-1.2.0.tgz",
"integrity": "sha512-csd+vJOb/gkzvcCHgTGSChYpy5f1/XKNsmvBGO4JXS+z1v2HobugDz4s1IeFXM3wZB44uczs+eazB5Q/ccdhQw=="
},
"tslib": {
- "version": "1.10.0",
- "resolved": "https://registry.npmjs.org/tslib/-/tslib-1.10.0.tgz",
- "integrity": "sha512-qOebF53frne81cf0S9B41ByenJ3/IuH8yJKngAX35CmiZySA0khhkovshKK+jGCaMnVomla7gVlIcc3EvKPbTQ=="
+ "version": "1.11.2",
+ "resolved": "https://registry.npmjs.org/tslib/-/tslib-1.11.2.tgz",
+ "integrity": "sha512-tTSkux6IGPnUGUd1XAZHcpu85MOkIl5zX49pO+jfsie3eP0B6pyhOlLXm3cAC6T7s+euSDDUUV+Acop5WmtkVg=="
},
"tsutils": {
"version": "3.17.1",
@@ -16729,11 +14676,11 @@
"integrity": "sha512-+5nt5AAniqsCnu2cEQQdpzCAh33kVx8n0VoFidKpB1dVVLAN/F+bgVOqOJqOnEnrhp222clB5p3vUlD+1QAnfg=="
},
"type-check": {
- "version": "0.3.2",
- "resolved": "https://registry.npmjs.org/type-check/-/type-check-0.3.2.tgz",
- "integrity": "sha1-WITKtRLPHTVeP7eE8wgEsrUg23I=",
+ "version": "0.4.0",
+ "resolved": "https://registry.npmjs.org/type-check/-/type-check-0.4.0.tgz",
+ "integrity": "sha512-XleUoc9uwGXqjWwXaUTZAmzMcFZ5858QA2vvx1Ur5xIcixXIP+8LnFDgRplU30us6teqdlskFfu+ae4K79Ooew==",
"requires": {
- "prelude-ls": "~1.1.2"
+ "prelude-ls": "^1.2.1"
}
},
"type-fest": {
@@ -16755,23 +14702,15 @@
"resolved": "https://registry.npmjs.org/typedarray/-/typedarray-0.0.6.tgz",
"integrity": "sha1-hnrHTjhkGHsdPUfZlqeOxciDB3c="
},
- "typedarray-to-buffer": {
- "version": "3.1.5",
- "resolved": "https://registry.npmjs.org/typedarray-to-buffer/-/typedarray-to-buffer-3.1.5.tgz",
- "integrity": "sha512-zdu8XMNEDepKKR+XYOXAVPtWui0ly0NtohUscw+UmaHiAWT8hrV1rr//H6V+0DvJ3OQ19S979M0laLfX8rm82Q==",
- "requires": {
- "is-typedarray": "^1.0.0"
- }
- },
"typescript": {
- "version": "3.8.3",
- "resolved": "https://registry.npmjs.org/typescript/-/typescript-3.8.3.tgz",
- "integrity": "sha512-MYlEfn5VrLNsgudQTVJeNaQFUAI7DkhnOjdpAp4T+ku1TfQClewlbSuTVHiA+8skNBgaf02TL/kLOvig4y3G8w=="
+ "version": "3.9.2",
+ "resolved": "https://registry.npmjs.org/typescript/-/typescript-3.9.2.tgz",
+ "integrity": "sha512-q2ktq4n/uLuNNShyayit+DTobV2ApPEo/6so68JaD5ojvc/6GClBipedB9zNWYxRSAlZXAe405Rlijzl6qDiSw=="
},
"typewriter": {
- "version": "7.0.1",
- "resolved": "https://registry.npmjs.org/typewriter/-/typewriter-7.0.1.tgz",
- "integrity": "sha512-5HkRuZxvMcbHyS2m6XEJEbLSmo2h27+RLOLb2KEw0CvH8erCOMMVdFdHYe4wEFPhZDNk1QK9qblSnWlrPBEFCQ==",
+ "version": "7.1.0",
+ "resolved": "https://registry.npmjs.org/typewriter/-/typewriter-7.1.0.tgz",
+ "integrity": "sha512-sdSqoyAMG/CkFbmL1vIe3VoNMmdmIbDVLmDApudrwjq9JHg+aE123GOFAaRRvJA0TP9esWmGgQCZaej5LWP0IA==",
"requires": {
"@hapi/joi": "^15.1.1",
"analytics-node": "3.4.0-beta.1",
@@ -16806,37 +14745,6 @@
"version": "1.19.1",
"resolved": "https://registry.npmjs.org/prettier/-/prettier-1.19.1.tgz",
"integrity": "sha512-s7PoyDv/II1ObgQunCbB9PdLmUcBZcnWOcxDh7O0N/UwDEsHyqkW+Qh28jW+mVuCdx7gLB0BotYI1Y6uI9iyew=="
- },
- "semver": {
- "version": "6.3.0",
- "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
- "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw=="
- },
- "yargs": {
- "version": "13.3.2",
- "resolved": "https://registry.npmjs.org/yargs/-/yargs-13.3.2.tgz",
- "integrity": "sha512-AX3Zw5iPruN5ie6xGRIDgqkT+ZhnRlZMLMHAs8tg7nRruy2Nb+i5o9bwghAogtM08q1dpr2LVoS8KSTMYpWXUw==",
- "requires": {
- "cliui": "^5.0.0",
- "find-up": "^3.0.0",
- "get-caller-file": "^2.0.1",
- "require-directory": "^2.1.1",
- "require-main-filename": "^2.0.0",
- "set-blocking": "^2.0.0",
- "string-width": "^3.0.0",
- "which-module": "^2.0.0",
- "y18n": "^4.0.0",
- "yargs-parser": "^13.1.2"
- }
- },
- "yargs-parser": {
- "version": "13.1.2",
- "resolved": "https://registry.npmjs.org/yargs-parser/-/yargs-parser-13.1.2.tgz",
- "integrity": "sha512-3lbsNRf/j+A4QuSZfDRA7HRSfWrzO0YjqTJd5kjAq37Zep1CEgaYmrH9Q3GwPiB9cHyd1Y1UwggGhJGoxipbzg==",
- "requires": {
- "camelcase": "^5.0.0",
- "decamelize": "^1.2.0"
- }
}
}
},
@@ -16846,27 +14754,18 @@
"integrity": "sha512-+O8/qh/Qj8CgC6eYBVBykMrNtp5Gebn4dlGD/kKXVkJNDwyrAwSIqwz8CDf+tsAIWVycKcku6gIXJ0qwx/ZXaQ=="
},
"uglify-js": {
- "version": "3.8.0",
- "resolved": "https://registry.npmjs.org/uglify-js/-/uglify-js-3.8.0.tgz",
- "integrity": "sha512-ugNSTT8ierCsDHso2jkBHXYrU8Y5/fY2ZUprfrJUiD7YpuFvV4jODLFmb3h4btQjqr5Nh4TX4XtgDfCU1WdioQ==",
+ "version": "3.9.2",
+ "resolved": "https://registry.npmjs.org/uglify-js/-/uglify-js-3.9.2.tgz",
+ "integrity": "sha512-zGVwKslUAD/EeqOrD1nQaBmXIHl1Vw371we8cvS8I6mYK9rmgX5tv8AAeJdfsQ3Kk5mGax2SVV/AizxdNGhl7Q==",
"optional": true,
"requires": {
- "commander": "~2.20.3",
- "source-map": "~0.6.1"
- },
- "dependencies": {
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g==",
- "optional": true
- }
+ "commander": "~2.20.3"
}
},
"unbzip2-stream": {
- "version": "1.3.3",
- "resolved": "https://registry.npmjs.org/unbzip2-stream/-/unbzip2-stream-1.3.3.tgz",
- "integrity": "sha512-fUlAF7U9Ah1Q6EieQ4x4zLNejrRvDWUYmxXUpN3uziFYCHapjWFaCAnreY9bGgxzaMCFAPPpYNng57CypwJVhg==",
+ "version": "1.4.2",
+ "resolved": "https://registry.npmjs.org/unbzip2-stream/-/unbzip2-stream-1.4.2.tgz",
+ "integrity": "sha512-pZMVAofMrrHX6Ik39hCk470kulCbmZ2SWfQLPmTWqfJV/oUm0gn1CblvHdUu4+54Je6Jq34x8kY6XjTy6dMkOg==",
"requires": {
"buffer": "^5.2.1",
"through": "^2.3.8"
@@ -16900,6 +14799,11 @@
"unicode-property-aliases-ecmascript": "^1.0.4"
}
},
+ "unicode-match-property-value-ecmascript": {
+ "version": "1.2.0",
+ "resolved": "https://registry.npmjs.org/unicode-match-property-value-ecmascript/-/unicode-match-property-value-ecmascript-1.2.0.tgz",
+ "integrity": "sha512-wjuQHGQVofmSJv1uVISKLE5zO2rNGzM/KCYZch/QQvez7C1hUhBIuZ701fYXExuufJFMPhv2SyL8CyoIfMLbIQ=="
+ },
"unicode-property-aliases-ecmascript": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/unicode-property-aliases-ecmascript/-/unicode-property-aliases-ecmascript-1.1.0.tgz",
@@ -16933,6 +14837,11 @@
"resolved": "https://registry.npmjs.org/uniq/-/uniq-1.0.1.tgz",
"integrity": "sha1-sxxa6CVIRKOoKBVBzisEuGWnNP8="
},
+ "uniqs": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/uniqs/-/uniqs-2.0.0.tgz",
+ "integrity": "sha1-/+3ks2slKQaW5uFl1KWe25mOawI="
+ },
"unique-filename": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/unique-filename/-/unique-filename-1.1.1.tgz",
@@ -16954,14 +14863,6 @@
"resolved": "https://registry.npmjs.org/unist-builder/-/unist-builder-2.0.3.tgz",
"integrity": "sha512-f98yt5pnlMWlzP539tPc4grGMsFaQQlP/vM396b00jngsiINumNmsY8rkXjfoi1c6QaM8nQ3vaGDuoKWbe/1Uw=="
},
- "unist-util-find-after": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/unist-util-find-after/-/unist-util-find-after-3.0.0.tgz",
- "integrity": "sha512-ojlBqfsBftYXExNu3+hHLfJQ/X1jYY/9vdm4yZWjIbf0VuWF6CRufci1ZyoD/wV2TYMKxXUoNuoqwy+CkgzAiQ==",
- "requires": {
- "unist-util-is": "^4.0.0"
- }
- },
"unist-util-flatmap": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/unist-util-flatmap/-/unist-util-flatmap-1.0.0.tgz",
@@ -16992,18 +14893,11 @@
"integrity": "sha512-w+PkwCbYSFw8vpgWD0v7zRCl1FpY3fjDSQ3/N/wNd9Ffa4gPi8+4keqt99N3XW6F99t/mUzp2xAhNmfKWp95QA=="
},
"unist-util-remove": {
- "version": "1.0.3",
- "resolved": "https://registry.npmjs.org/unist-util-remove/-/unist-util-remove-1.0.3.tgz",
- "integrity": "sha512-mB6nCHCQK0pQffUAcCVmKgIWzG/AXs/V8qpS8K72tMPtOSCMSjDeMc5yN+Ye8rB0FhcE+JvW++o1xRNc0R+++g==",
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/unist-util-remove/-/unist-util-remove-2.0.0.tgz",
+ "integrity": "sha512-HwwWyNHKkeg/eXRnE11IpzY8JT55JNM1YCwwU9YNCnfzk6s8GhPXrVBBZWiwLeATJbI7euvoGSzcy9M29UeW3g==",
"requires": {
- "unist-util-is": "^3.0.0"
- },
- "dependencies": {
- "unist-util-is": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/unist-util-is/-/unist-util-is-3.0.0.tgz",
- "integrity": "sha512-sVZZX3+kspVNmLWBPAB6r+7D9ZgAFPNWm66f7YNb420RlQSbn+n8rG8dGZSkrER7ZIXGQYNm5pqC3v3HopH24A=="
- }
+ "unist-util-is": "^4.0.0"
}
},
"unist-util-remove-position": {
@@ -17124,14 +15018,6 @@
"resolved": "https://registry.npmjs.org/upath/-/upath-1.2.0.tgz",
"integrity": "sha512-aZwGpamFO61g3OlfT7OQCHqhGnW43ieH9WZeP7QxN/G/jS4jfqUkZxoryvJgVPEcrl5NL/ggHsSmLMHuH64Lhg=="
},
- "upper-case": {
- "version": "2.0.1",
- "resolved": "https://registry.npmjs.org/upper-case/-/upper-case-2.0.1.tgz",
- "integrity": "sha512-laAsbea9SY5osxrv7S99vH9xAaJKrw5Qpdh4ENRLcaxipjKsiaBwiAsxfa8X5mObKNTQPsupSq0J/VIxsSJe3A==",
- "requires": {
- "tslib": "^1.10.0"
- }
- },
"uri-js": {
"version": "4.2.2",
"resolved": "https://registry.npmjs.org/uri-js/-/uri-js-4.2.2.tgz",
@@ -17172,9 +15058,9 @@
},
"dependencies": {
"mime": {
- "version": "2.4.4",
- "resolved": "https://registry.npmjs.org/mime/-/mime-2.4.4.tgz",
- "integrity": "sha512-LRxmNwziLPT828z+4YkNzloCFC2YM4wrB99k+AV5ZbEyfGNWfG8SO1FUXLmLDBSo89NrJZ4DIWeLjy1CHGhMGA=="
+ "version": "2.4.5",
+ "resolved": "https://registry.npmjs.org/mime/-/mime-2.4.5.tgz",
+ "integrity": "sha512-3hQhEUF027BuxZjQA3s7rIv/7VCQPa27hN9u9g87sEkWaKwQPuXOkVKtOeiyUrnWqTDiOs8Ed2rwg733mB0R5w=="
}
}
},
@@ -17238,20 +15124,15 @@
"integrity": "sha1-n5VxD1CiZ5R7LMwSR0HBAoQn5xM="
},
"uuid": {
- "version": "3.4.0",
- "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz",
- "integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A=="
+ "version": "7.0.3",
+ "resolved": "https://registry.npmjs.org/uuid/-/uuid-7.0.3.tgz",
+ "integrity": "sha512-DPSke0pXhTZgoF/d+WSt2QaKMCFSfx7QegxEWT+JOuHF5aWrKEn0G+ztjuJg/gG8/ItK+rbPCD/yNv8yyih6Cg=="
},
"v8-compile-cache": {
"version": "2.1.0",
"resolved": "https://registry.npmjs.org/v8-compile-cache/-/v8-compile-cache-2.1.0.tgz",
"integrity": "sha512-usZBT3PW+LOjM25wbqIlZwPeJV+3OSz3M1k1Ws8snlW39dZyYL9lOGC5FgPVHfk0jKmjiDV8Z0mIbVQPiwFs7g=="
},
- "valid-url": {
- "version": "1.0.9",
- "resolved": "https://registry.npmjs.org/valid-url/-/valid-url-1.0.9.tgz",
- "integrity": "sha1-HBRHm0DxOXp1eC8RXkCGRHQzogA="
- },
"validate-npm-package-license": {
"version": "3.0.4",
"resolved": "https://registry.npmjs.org/validate-npm-package-license/-/validate-npm-package-license-3.0.4.tgz",
@@ -17266,23 +15147,21 @@
"resolved": "https://registry.npmjs.org/vary/-/vary-1.1.2.tgz",
"integrity": "sha1-IpnwLG3tMNSllhsLn3RSShj2NPw="
},
+ "vendors": {
+ "version": "1.0.4",
+ "resolved": "https://registry.npmjs.org/vendors/-/vendors-1.0.4.tgz",
+ "integrity": "sha512-/juG65kTL4Cy2su4P8HjtkTxk6VmJDiOPBufWniqQ6wknac6jNiXS9vU+hO3wgusiyqWlzTbVHi0dyJqRONg3w=="
+ },
"vfile": {
- "version": "4.0.3",
- "resolved": "https://registry.npmjs.org/vfile/-/vfile-4.0.3.tgz",
- "integrity": "sha512-lREgT5sF05TQk68LO6APy0In+TkFGnFEgKChK2+PHIaTrFQ9oHCKXznZ7VILwgYVBcl0gv4lGATFZBLhi2kVQg==",
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/vfile/-/vfile-4.1.0.tgz",
+ "integrity": "sha512-BaTPalregj++64xbGK6uIlsurN3BCRNM/P2Pg8HezlGzKd1O9PrwIac6bd9Pdx2uTb0QHoioZ+rXKolbVXEgJg==",
"requires": {
"@types/unist": "^2.0.0",
"is-buffer": "^2.0.0",
"replace-ext": "1.0.0",
"unist-util-stringify-position": "^2.0.0",
"vfile-message": "^2.0.0"
- },
- "dependencies": {
- "is-buffer": {
- "version": "2.0.4",
- "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-2.0.4.tgz",
- "integrity": "sha512-Kq1rokWXOPXWuaMAqZiJW4XxsmD9zGx9q4aePabbn3qCRGedtH7Cm+zV8WETitMfu1wdh+Rvd6w5egwSngUX2A=="
- }
}
},
"vfile-location": {
@@ -17291,9 +15170,9 @@
"integrity": "sha512-sSFdyCP3G6Ka0CEmN83A2YCMKIieHx0EDaj5IDP4g1pa5ZJ4FJDvpO0WODLxo4LUX4oe52gmSCK7Jw4SBghqxA=="
},
"vfile-message": {
- "version": "2.0.3",
- "resolved": "https://registry.npmjs.org/vfile-message/-/vfile-message-2.0.3.tgz",
- "integrity": "sha512-qQg/2z8qnnBHL0psXyF72kCjb9YioIynvyltuNKFaUhRtqTIcIMP3xnBaPzirVZNuBrUe1qwFciSx2yApa4byw==",
+ "version": "2.0.4",
+ "resolved": "https://registry.npmjs.org/vfile-message/-/vfile-message-2.0.4.tgz",
+ "integrity": "sha512-DjssxRGkMvifUOJre00juHoP9DPWuzjxKuMDrhNbk2TdaYYBNMStsNhEOt3idrtI12VQYM/1+iM0KOzXi4pxwQ==",
"requires": {
"@types/unist": "^2.0.0",
"unist-util-stringify-position": "^2.0.0"
@@ -17304,16 +15183,6 @@
"resolved": "https://registry.npmjs.org/vm-browserify/-/vm-browserify-1.1.2.tgz",
"integrity": "sha512-2ham8XPWTONajOR0ohOKOHXkm3+gaBmGut3SRuu75xLd/RRaY6vqgh8NBYYk7+RW3u5AtzPQZG8F10LHkl0lAQ=="
},
- "vue-template-compiler": {
- "version": "2.6.11",
- "resolved": "https://registry.npmjs.org/vue-template-compiler/-/vue-template-compiler-2.6.11.tgz",
- "integrity": "sha512-KIq15bvQDrcCjpGjrAhx4mUlyyHfdmTaoNfeoATHLAiWB+MU3cx4lOzMwrnUh9cCxy0Lt1T11hAFY6TQgroUAA==",
- "optional": true,
- "requires": {
- "de-indent": "^1.0.2",
- "he": "^1.1.0"
- }
- },
"watchpack": {
"version": "2.0.0-beta.13",
"resolved": "https://registry.npmjs.org/watchpack/-/watchpack-2.0.0-beta.13.tgz",
@@ -17344,15 +15213,15 @@
"integrity": "sha512-wYxSGajtmoP4WxfejAPIr4l0fVh+jeMXZb08wNc0tMg6xsfZXj3cECqIK0G7ZAqUq0PP8WlMDtaOGVBTAWztNw=="
},
"webpack": {
- "version": "4.42.0",
- "resolved": "https://registry.npmjs.org/webpack/-/webpack-4.42.0.tgz",
- "integrity": "sha512-EzJRHvwQyBiYrYqhyjW9AqM90dE4+s1/XtCfn7uWg6cS72zH+2VPFAlsnW0+W0cDi0XRjNKUMoJtpSi50+Ph6w==",
- "requires": {
- "@webassemblyjs/ast": "1.8.5",
- "@webassemblyjs/helper-module-context": "1.8.5",
- "@webassemblyjs/wasm-edit": "1.8.5",
- "@webassemblyjs/wasm-parser": "1.8.5",
- "acorn": "^6.2.1",
+ "version": "4.43.0",
+ "resolved": "https://registry.npmjs.org/webpack/-/webpack-4.43.0.tgz",
+ "integrity": "sha512-GW1LjnPipFW2Y78OOab8NJlCflB7EFskMih2AHdvjbpKMeDJqEgSx24cXXXiPS65+WSwVyxtDsJH6jGX2czy+g==",
+ "requires": {
+ "@webassemblyjs/ast": "1.9.0",
+ "@webassemblyjs/helper-module-context": "1.9.0",
+ "@webassemblyjs/wasm-edit": "1.9.0",
+ "@webassemblyjs/wasm-parser": "1.9.0",
+ "acorn": "^6.4.1",
"ajv": "^6.10.2",
"ajv-keywords": "^3.4.1",
"chrome-trace-event": "^1.0.2",
@@ -17363,16 +15232,21 @@
"loader-utils": "^1.2.3",
"memory-fs": "^0.4.1",
"micromatch": "^3.1.10",
- "mkdirp": "^0.5.1",
+ "mkdirp": "^0.5.3",
"neo-async": "^2.6.1",
"node-libs-browser": "^2.2.1",
"schema-utils": "^1.0.0",
"tapable": "^1.1.3",
"terser-webpack-plugin": "^1.4.3",
- "watchpack": "^1.6.0",
+ "watchpack": "^1.6.1",
"webpack-sources": "^1.4.1"
},
"dependencies": {
+ "acorn": {
+ "version": "6.4.1",
+ "resolved": "https://registry.npmjs.org/acorn/-/acorn-6.4.1.tgz",
+ "integrity": "sha512-ZVA9k326Nwrj3Cj9jlh3wGFutC2ZornPNARZwsNYqQYgN0EsV2d53w5RN/co65Ohn4sUAUtb1rSUAOD6XN9idA=="
+ },
"anymatch": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/anymatch/-/anymatch-2.0.0.tgz",
@@ -17397,6 +15271,33 @@
"resolved": "https://registry.npmjs.org/binary-extensions/-/binary-extensions-1.13.1.tgz",
"integrity": "sha512-Un7MIEDdUC5gNpcGDV97op1Ywk748MpHcFTHoYs6qnj1Z3j7I53VG3nwZhKzoBZmbdRNnb6WRdFlwl7tSDuZGw=="
},
+ "braces": {
+ "version": "2.3.2",
+ "resolved": "https://registry.npmjs.org/braces/-/braces-2.3.2.tgz",
+ "integrity": "sha512-aNdbnj9P8PjdXU4ybaWLK2IF3jc/EoDYbC7AazW6to3TRsfXxscC9UXOB5iDiEQrkyIbWp2SLQda4+QAa7nc3w==",
+ "requires": {
+ "arr-flatten": "^1.1.0",
+ "array-unique": "^0.3.2",
+ "extend-shallow": "^2.0.1",
+ "fill-range": "^4.0.0",
+ "isobject": "^3.0.1",
+ "repeat-element": "^1.1.2",
+ "snapdragon": "^0.8.1",
+ "snapdragon-node": "^2.0.1",
+ "split-string": "^3.0.2",
+ "to-regex": "^3.0.1"
+ },
+ "dependencies": {
+ "extend-shallow": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
+ "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
+ "requires": {
+ "is-extendable": "^0.1.0"
+ }
+ }
+ }
+ },
"chokidar": {
"version": "2.1.8",
"resolved": "https://registry.npmjs.org/chokidar/-/chokidar-2.1.8.tgz",
@@ -17425,487 +15326,72 @@
"estraverse": "^4.1.1"
}
},
- "fsevents": {
- "version": "1.2.12",
- "resolved": "https://registry.npmjs.org/fsevents/-/fsevents-1.2.12.tgz",
- "integrity": "sha512-Ggd/Ktt7E7I8pxZRbGIs7vwqAPscSESMrCSkx2FtWeqmheJgCo2R74fTsZFCifr0VTPwqRpPv17+6b8Zp7th0Q==",
- "optional": true,
+ "extend-shallow": {
+ "version": "3.0.2",
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-3.0.2.tgz",
+ "integrity": "sha1-Jqcarwc7OfshJxcnRhMcJwQCjbg=",
"requires": {
- "bindings": "^1.5.0",
- "nan": "^2.12.1",
- "node-pre-gyp": "*"
+ "assign-symbols": "^1.0.0",
+ "is-extendable": "^1.0.1"
},
"dependencies": {
- "abbrev": {
- "version": "1.1.1",
- "bundled": true,
- "optional": true
- },
- "ansi-regex": {
- "version": "2.1.1",
- "bundled": true,
- "optional": true
- },
- "aproba": {
- "version": "1.2.0",
- "bundled": true,
- "optional": true
- },
- "are-we-there-yet": {
- "version": "1.1.5",
- "bundled": true,
- "optional": true,
- "requires": {
- "delegates": "^1.0.0",
- "readable-stream": "^2.0.6"
- }
- },
- "balanced-match": {
- "version": "1.0.0",
- "bundled": true,
- "optional": true
- },
- "brace-expansion": {
- "version": "1.1.11",
- "bundled": true,
- "optional": true,
- "requires": {
- "balanced-match": "^1.0.0",
- "concat-map": "0.0.1"
- }
- },
- "chownr": {
- "version": "1.1.4",
- "bundled": true,
- "optional": true
- },
- "code-point-at": {
- "version": "1.1.0",
- "bundled": true,
- "optional": true
- },
- "concat-map": {
- "version": "0.0.1",
- "bundled": true,
- "optional": true
- },
- "console-control-strings": {
- "version": "1.1.0",
- "bundled": true,
- "optional": true
- },
- "core-util-is": {
- "version": "1.0.2",
- "bundled": true,
- "optional": true
- },
- "debug": {
- "version": "3.2.6",
- "bundled": true,
- "optional": true,
- "requires": {
- "ms": "^2.1.1"
- }
- },
- "deep-extend": {
- "version": "0.6.0",
- "bundled": true,
- "optional": true
- },
- "delegates": {
- "version": "1.0.0",
- "bundled": true,
- "optional": true
- },
- "detect-libc": {
- "version": "1.0.3",
- "bundled": true,
- "optional": true
- },
- "fs-minipass": {
- "version": "1.2.7",
- "bundled": true,
- "optional": true,
- "requires": {
- "minipass": "^2.6.0"
- }
- },
- "fs.realpath": {
- "version": "1.0.0",
- "bundled": true,
- "optional": true
- },
- "gauge": {
- "version": "2.7.4",
- "bundled": true,
- "optional": true,
- "requires": {
- "aproba": "^1.0.3",
- "console-control-strings": "^1.0.0",
- "has-unicode": "^2.0.0",
- "object-assign": "^4.1.0",
- "signal-exit": "^3.0.0",
- "string-width": "^1.0.1",
- "strip-ansi": "^3.0.1",
- "wide-align": "^1.1.0"
- }
- },
- "glob": {
- "version": "7.1.6",
- "bundled": true,
- "optional": true,
- "requires": {
- "fs.realpath": "^1.0.0",
- "inflight": "^1.0.4",
- "inherits": "2",
- "minimatch": "^3.0.4",
- "once": "^1.3.0",
- "path-is-absolute": "^1.0.0"
- }
- },
- "has-unicode": {
- "version": "2.0.1",
- "bundled": true,
- "optional": true
- },
- "iconv-lite": {
- "version": "0.4.24",
- "bundled": true,
- "optional": true,
- "requires": {
- "safer-buffer": ">= 2.1.2 < 3"
- }
- },
- "ignore-walk": {
- "version": "3.0.3",
- "bundled": true,
- "optional": true,
- "requires": {
- "minimatch": "^3.0.4"
- }
- },
- "inflight": {
- "version": "1.0.6",
- "bundled": true,
- "optional": true,
- "requires": {
- "once": "^1.3.0",
- "wrappy": "1"
- }
- },
- "inherits": {
- "version": "2.0.4",
- "bundled": true,
- "optional": true
- },
- "ini": {
- "version": "1.3.5",
- "bundled": true,
- "optional": true
- },
- "is-fullwidth-code-point": {
- "version": "1.0.0",
- "bundled": true,
- "optional": true,
- "requires": {
- "number-is-nan": "^1.0.0"
- }
- },
- "isarray": {
- "version": "1.0.0",
- "bundled": true,
- "optional": true
- },
- "minimatch": {
- "version": "3.0.4",
- "bundled": true,
- "optional": true,
- "requires": {
- "brace-expansion": "^1.1.7"
- }
- },
- "minimist": {
- "version": "1.2.5",
- "bundled": true,
- "optional": true
- },
- "minipass": {
- "version": "2.9.0",
- "bundled": true,
- "optional": true,
- "requires": {
- "safe-buffer": "^5.1.2",
- "yallist": "^3.0.0"
- }
- },
- "minizlib": {
- "version": "1.3.3",
- "bundled": true,
- "optional": true,
- "requires": {
- "minipass": "^2.9.0"
- }
- },
- "mkdirp": {
- "version": "0.5.3",
- "bundled": true,
- "optional": true,
- "requires": {
- "minimist": "^1.2.5"
- }
- },
- "ms": {
- "version": "2.1.2",
- "bundled": true,
- "optional": true
- },
- "needle": {
- "version": "2.3.3",
- "bundled": true,
- "optional": true,
- "requires": {
- "debug": "^3.2.6",
- "iconv-lite": "^0.4.4",
- "sax": "^1.2.4"
- }
- },
- "node-pre-gyp": {
- "version": "0.14.0",
- "bundled": true,
- "optional": true,
- "requires": {
- "detect-libc": "^1.0.2",
- "mkdirp": "^0.5.1",
- "needle": "^2.2.1",
- "nopt": "^4.0.1",
- "npm-packlist": "^1.1.6",
- "npmlog": "^4.0.2",
- "rc": "^1.2.7",
- "rimraf": "^2.6.1",
- "semver": "^5.3.0",
- "tar": "^4.4.2"
- }
- },
- "nopt": {
- "version": "4.0.3",
- "bundled": true,
- "optional": true,
- "requires": {
- "abbrev": "1",
- "osenv": "^0.1.4"
- }
- },
- "npm-bundled": {
- "version": "1.1.1",
- "bundled": true,
- "optional": true,
- "requires": {
- "npm-normalize-package-bin": "^1.0.1"
- }
- },
- "npm-normalize-package-bin": {
+ "is-extendable": {
"version": "1.0.1",
- "bundled": true,
- "optional": true
- },
- "npm-packlist": {
- "version": "1.4.8",
- "bundled": true,
- "optional": true,
- "requires": {
- "ignore-walk": "^3.0.1",
- "npm-bundled": "^1.0.1",
- "npm-normalize-package-bin": "^1.0.1"
- }
- },
- "npmlog": {
- "version": "4.1.2",
- "bundled": true,
- "optional": true,
- "requires": {
- "are-we-there-yet": "~1.1.2",
- "console-control-strings": "~1.1.0",
- "gauge": "~2.7.3",
- "set-blocking": "~2.0.0"
- }
- },
- "number-is-nan": {
- "version": "1.0.1",
- "bundled": true,
- "optional": true
- },
- "object-assign": {
- "version": "4.1.1",
- "bundled": true,
- "optional": true
- },
- "once": {
- "version": "1.4.0",
- "bundled": true,
- "optional": true,
- "requires": {
- "wrappy": "1"
- }
- },
- "os-homedir": {
- "version": "1.0.2",
- "bundled": true,
- "optional": true
- },
- "os-tmpdir": {
- "version": "1.0.2",
- "bundled": true,
- "optional": true
- },
- "osenv": {
- "version": "0.1.5",
- "bundled": true,
- "optional": true,
- "requires": {
- "os-homedir": "^1.0.0",
- "os-tmpdir": "^1.0.0"
- }
- },
- "path-is-absolute": {
- "version": "1.0.1",
- "bundled": true,
- "optional": true
- },
- "process-nextick-args": {
- "version": "2.0.1",
- "bundled": true,
- "optional": true
- },
- "rc": {
- "version": "1.2.8",
- "bundled": true,
- "optional": true,
- "requires": {
- "deep-extend": "^0.6.0",
- "ini": "~1.3.0",
- "minimist": "^1.2.0",
- "strip-json-comments": "~2.0.1"
- }
- },
- "readable-stream": {
- "version": "2.3.7",
- "bundled": true,
- "optional": true,
- "requires": {
- "core-util-is": "~1.0.0",
- "inherits": "~2.0.3",
- "isarray": "~1.0.0",
- "process-nextick-args": "~2.0.0",
- "safe-buffer": "~5.1.1",
- "string_decoder": "~1.1.1",
- "util-deprecate": "~1.0.1"
- }
- },
- "rimraf": {
- "version": "2.7.1",
- "bundled": true,
- "optional": true,
+ "resolved": "https://registry.npmjs.org/is-extendable/-/is-extendable-1.0.1.tgz",
+ "integrity": "sha512-arnXMxT1hhoKo9k1LZdmlNyJdDDfy2v0fXjFlmok4+i8ul/6WlbVge9bhM74OpNPQPMGUToDtz+KXa1PneJxOA==",
"requires": {
- "glob": "^7.1.3"
+ "is-plain-object": "^2.0.4"
}
- },
- "safe-buffer": {
- "version": "5.1.2",
- "bundled": true,
- "optional": true
- },
- "safer-buffer": {
- "version": "2.1.2",
- "bundled": true,
- "optional": true
- },
- "sax": {
- "version": "1.2.4",
- "bundled": true,
- "optional": true
- },
- "semver": {
- "version": "5.7.1",
- "bundled": true,
- "optional": true
- },
- "set-blocking": {
- "version": "2.0.0",
- "bundled": true,
- "optional": true
- },
- "signal-exit": {
- "version": "3.0.2",
- "bundled": true,
- "optional": true
- },
- "string-width": {
- "version": "1.0.2",
- "bundled": true,
- "optional": true,
- "requires": {
- "code-point-at": "^1.0.0",
- "is-fullwidth-code-point": "^1.0.0",
- "strip-ansi": "^3.0.0"
- }
- },
- "string_decoder": {
- "version": "1.1.1",
- "bundled": true,
- "optional": true,
- "requires": {
- "safe-buffer": "~5.1.0"
- }
- },
- "strip-ansi": {
- "version": "3.0.1",
- "bundled": true,
- "optional": true,
- "requires": {
- "ansi-regex": "^2.0.0"
- }
- },
- "strip-json-comments": {
+ }
+ }
+ },
+ "fill-range": {
+ "version": "4.0.0",
+ "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-4.0.0.tgz",
+ "integrity": "sha1-1USBHUKPmOsGpj3EAtJAPDKMOPc=",
+ "requires": {
+ "extend-shallow": "^2.0.1",
+ "is-number": "^3.0.0",
+ "repeat-string": "^1.6.1",
+ "to-regex-range": "^2.1.0"
+ },
+ "dependencies": {
+ "extend-shallow": {
"version": "2.0.1",
- "bundled": true,
- "optional": true
- },
- "tar": {
- "version": "4.4.13",
- "bundled": true,
- "optional": true,
+ "resolved": "https://registry.npmjs.org/extend-shallow/-/extend-shallow-2.0.1.tgz",
+ "integrity": "sha1-Ua99YUrZqfYQ6huvu5idaxxWiQ8=",
"requires": {
- "chownr": "^1.1.1",
- "fs-minipass": "^1.2.5",
- "minipass": "^2.8.6",
- "minizlib": "^1.2.1",
- "mkdirp": "^0.5.0",
- "safe-buffer": "^5.1.2",
- "yallist": "^3.0.3"
+ "is-extendable": "^0.1.0"
}
- },
- "util-deprecate": {
- "version": "1.0.2",
- "bundled": true,
- "optional": true
- },
- "wide-align": {
- "version": "1.1.3",
- "bundled": true,
- "optional": true,
+ }
+ }
+ },
+ "fsevents": {
+ "version": "1.2.13",
+ "resolved": "https://registry.npmjs.org/fsevents/-/fsevents-1.2.13.tgz",
+ "integrity": "sha512-oWb1Z6mkHIskLzEJ/XWX0srkpkTQ7vaopMQkyaEIoq0fmtFVxOthb8cCxeT+p3ynTdkk/RZwbgG4brR5BeWECw==",
+ "optional": true,
+ "requires": {
+ "bindings": "^1.5.0",
+ "nan": "^2.12.1"
+ }
+ },
+ "glob-parent": {
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz",
+ "integrity": "sha1-nmr2KZ2NO9K9QEMIMr0RPfkGxa4=",
+ "requires": {
+ "is-glob": "^3.1.0",
+ "path-dirname": "^1.0.0"
+ },
+ "dependencies": {
+ "is-glob": {
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/is-glob/-/is-glob-3.1.0.tgz",
+ "integrity": "sha1-e6WuJCF4BKxwcHuWkiVnSGzD6Eo=",
"requires": {
- "string-width": "^1.0.2 || 2"
+ "is-extglob": "^2.1.0"
}
- },
- "wrappy": {
- "version": "1.0.2",
- "bundled": true,
- "optional": true
- },
- "yallist": {
- "version": "3.1.1",
- "bundled": true,
- "optional": true
}
}
},
@@ -17917,6 +15403,49 @@
"binary-extensions": "^1.0.0"
}
},
+ "is-buffer": {
+ "version": "1.1.6",
+ "resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
+ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
+ },
+ "is-number": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/is-number/-/is-number-3.0.0.tgz",
+ "integrity": "sha1-JP1iAaR4LPUFYcgQJ2r8fRLXEZU=",
+ "requires": {
+ "kind-of": "^3.0.2"
+ },
+ "dependencies": {
+ "kind-of": {
+ "version": "3.2.2",
+ "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
+ "integrity": "sha1-MeohpzS6ubuw8yRm2JOupR5KPGQ=",
+ "requires": {
+ "is-buffer": "^1.1.5"
+ }
+ }
+ }
+ },
+ "micromatch": {
+ "version": "3.1.10",
+ "resolved": "https://registry.npmjs.org/micromatch/-/micromatch-3.1.10.tgz",
+ "integrity": "sha512-MWikgl9n9M3w+bpsY3He8L+w9eF9338xRl8IAO5viDizwSzziFEyUzo2xrrloB64ADbTf8uA8vRqqttDTOmccg==",
+ "requires": {
+ "arr-diff": "^4.0.0",
+ "array-unique": "^0.3.2",
+ "braces": "^2.3.1",
+ "define-property": "^2.0.2",
+ "extend-shallow": "^3.0.2",
+ "extglob": "^2.0.4",
+ "fragment-cache": "^0.2.1",
+ "kind-of": "^6.0.2",
+ "nanomatch": "^1.2.9",
+ "object.pick": "^1.3.0",
+ "regex-not": "^1.0.0",
+ "snapdragon": "^0.8.1",
+ "to-regex": "^3.0.2"
+ }
+ },
"readdirp": {
"version": "2.2.1",
"resolved": "https://registry.npmjs.org/readdirp/-/readdirp-2.2.1.tgz",
@@ -17927,6 +15456,15 @@
"readable-stream": "^2.0.2"
}
},
+ "to-regex-range": {
+ "version": "2.1.1",
+ "resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-2.1.1.tgz",
+ "integrity": "sha1-fIDBe53+vlmeJzZ+DU3VWQFB2zg=",
+ "requires": {
+ "is-number": "^3.0.0",
+ "repeat-string": "^1.6.1"
+ }
+ },
"watchpack": {
"version": "1.6.1",
"resolved": "https://registry.npmjs.org/watchpack/-/watchpack-1.6.1.tgz",
@@ -17959,11 +15497,6 @@
"ws": "^6.0.0"
},
"dependencies": {
- "acorn": {
- "version": "7.1.1",
- "resolved": "https://registry.npmjs.org/acorn/-/acorn-7.1.1.tgz",
- "integrity": "sha512-add7dgA5ppRPxCFJoAGfMDi7PIBXq1RtGo7BhbLaxwrXPOmw8gq48Y9ozT01hUKy9byMjlR20EJhu5zlkErEkg=="
- },
"chalk": {
"version": "2.4.2",
"resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
@@ -17981,67 +15514,6 @@
}
}
},
- "webpack-dev-middleware": {
- "version": "3.7.0",
- "resolved": "https://registry.npmjs.org/webpack-dev-middleware/-/webpack-dev-middleware-3.7.0.tgz",
- "integrity": "sha512-qvDesR1QZRIAZHOE3iQ4CXLZZSQ1lAUsSpnQmlB1PBfoN/xdRjmge3Dok0W4IdaVLJOGJy3sGI4sZHwjRU0PCA==",
- "requires": {
- "memory-fs": "^0.4.1",
- "mime": "^2.4.2",
- "range-parser": "^1.2.1",
- "webpack-log": "^2.0.0"
- },
- "dependencies": {
- "mime": {
- "version": "2.4.4",
- "resolved": "https://registry.npmjs.org/mime/-/mime-2.4.4.tgz",
- "integrity": "sha512-LRxmNwziLPT828z+4YkNzloCFC2YM4wrB99k+AV5ZbEyfGNWfG8SO1FUXLmLDBSo89NrJZ4DIWeLjy1CHGhMGA=="
- }
- }
- },
- "webpack-hot-middleware": {
- "version": "2.25.0",
- "resolved": "https://registry.npmjs.org/webpack-hot-middleware/-/webpack-hot-middleware-2.25.0.tgz",
- "integrity": "sha512-xs5dPOrGPCzuRXNi8F6rwhawWvQQkeli5Ro48PRuQh8pYPCPmNnltP9itiUPT4xI8oW+y0m59lyyeQk54s5VgA==",
- "requires": {
- "ansi-html": "0.0.7",
- "html-entities": "^1.2.0",
- "querystring": "^0.2.0",
- "strip-ansi": "^3.0.0"
- },
- "dependencies": {
- "ansi-regex": {
- "version": "2.1.1",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz",
- "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8="
- },
- "strip-ansi": {
- "version": "3.0.1",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz",
- "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=",
- "requires": {
- "ansi-regex": "^2.0.0"
- }
- }
- }
- },
- "webpack-log": {
- "version": "2.0.0",
- "resolved": "https://registry.npmjs.org/webpack-log/-/webpack-log-2.0.0.tgz",
- "integrity": "sha512-cX8G2vR/85UYG59FgkoMamwHUIkSSlV3bBMRsbxVXVUk2j6NleCKjQ/WE9eYg9WY4w25O9w8wKP4rzNZFmUcUg==",
- "requires": {
- "ansi-colors": "^3.0.0",
- "uuid": "^3.3.2"
- }
- },
- "webpack-merge": {
- "version": "4.2.2",
- "resolved": "https://registry.npmjs.org/webpack-merge/-/webpack-merge-4.2.2.tgz",
- "integrity": "sha512-TUE1UGoTX2Cd42j3krGYqObZbOD+xF7u28WB7tfUordytSjbWTIjK/8V0amkBfTYN4/pB/GIDlJZZ657BGG19g==",
- "requires": {
- "lodash": "^4.17.15"
- }
- },
"webpack-sources": {
"version": "1.4.3",
"resolved": "https://registry.npmjs.org/webpack-sources/-/webpack-sources-1.4.3.tgz",
@@ -18049,19 +15521,12 @@
"requires": {
"source-list-map": "^2.0.0",
"source-map": "~0.6.1"
- },
- "dependencies": {
- "source-map": {
- "version": "0.6.1",
- "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
- "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
- }
}
},
"whatwg-fetch": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/whatwg-fetch/-/whatwg-fetch-3.0.0.tgz",
- "integrity": "sha512-9GSJUgz1D4MfyKU7KRqwOjXCXTqWdFNvEr7eUBYchQiVc744mqK/MzXPNR2WsPkmkOa4ywfg8C2n8h+13Bey1Q=="
+ "version": "2.0.4",
+ "resolved": "https://registry.npmjs.org/whatwg-fetch/-/whatwg-fetch-2.0.4.tgz",
+ "integrity": "sha512-dcQ1GWpOD/eEQ97k66aiEVpNnapVj90/+R+SXTPYGHpYBBypfKJEQjLrvMZ7YXbKm21gXd4NcuxUTjiv1YtLng=="
},
"which": {
"version": "1.3.1",
@@ -18079,7 +15544,8 @@
"which-pm-runs": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/which-pm-runs/-/which-pm-runs-1.0.0.tgz",
- "integrity": "sha1-Zws6+8VS4LVd9rd4DKdGFfI60cs="
+ "integrity": "sha1-Zws6+8VS4LVd9rd4DKdGFfI60cs=",
+ "dev": true
},
"widest-line": {
"version": "3.1.0",
@@ -18087,41 +15553,6 @@
"integrity": "sha512-NsmoXalsWVDMGupxZ5R08ka9flZjjiLvHVAWYOKtiKM8ujtZWr9cRffak+uSE48+Ob8ObalXpwyeUiyDD6QFgg==",
"requires": {
"string-width": "^4.0.0"
- },
- "dependencies": {
- "ansi-regex": {
- "version": "5.0.0",
- "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz",
- "integrity": "sha512-bY6fj56OUQ0hU1KjFNDQuJFezqKdrAyFdIevADiqrWHwSlbmBNMHp5ak2f40Pm8JTFyM2mqxkG6ngkHO11f/lg=="
- },
- "emoji-regex": {
- "version": "8.0.0",
- "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-8.0.0.tgz",
- "integrity": "sha512-MSjYzcWNOA0ewAHpz0MxpYFvwg6yjy1NG3xteoqz644VCo/RPgnr1/GGt+ic3iJTzQ8Eu3TdM14SawnVUmGE6A=="
- },
- "is-fullwidth-code-point": {
- "version": "3.0.0",
- "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-3.0.0.tgz",
- "integrity": "sha512-zymm5+u+sCsSWyD9qNaejV3DFvhCKclKdizYaJUuHA83RLjb7nSuGnddCHGv0hk+KY7BMAlsWeK4Ueg6EV6XQg=="
- },
- "string-width": {
- "version": "4.2.0",
- "resolved": "https://registry.npmjs.org/string-width/-/string-width-4.2.0.tgz",
- "integrity": "sha512-zUz5JD+tgqtuDjMhwIg5uFVV3dtqZ9yQJlZVfq4I01/K5Paj5UHj7VyrQOJvzawSVlKpObApbfD0Ed6yJc+1eg==",
- "requires": {
- "emoji-regex": "^8.0.0",
- "is-fullwidth-code-point": "^3.0.0",
- "strip-ansi": "^6.0.0"
- }
- },
- "strip-ansi": {
- "version": "6.0.0",
- "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-6.0.0.tgz",
- "integrity": "sha512-AuvKTrTfQNYNIctbR1K/YGTR1756GycPsg7b9bdV9Duqur4gv6aKqHXah67Z8ImS7WEz5QVcOtlfW2rZEugt6w==",
- "requires": {
- "ansi-regex": "^5.0.0"
- }
- }
}
},
"word-wrap": {
@@ -18151,13 +15582,50 @@
}
},
"wrap-ansi": {
- "version": "5.1.0",
- "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-5.1.0.tgz",
- "integrity": "sha512-QC1/iN/2/RPVJ5jYK8BGttj5z83LmSKmvbvrXPNCLZSEb32KKVDJDl/MOt2N01qU2H/FkzEa9PKto1BqDjtd7Q==",
+ "version": "6.2.0",
+ "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-6.2.0.tgz",
+ "integrity": "sha512-r6lPcBGxZXlIcymEu7InxDMhdW0KDxpLgoFLcguasxCaJ/SOIZwINatK9KY/tf+ZrlywOKU0UDj3ATXUBfxJXA==",
"requires": {
- "ansi-styles": "^3.2.0",
- "string-width": "^3.0.0",
- "strip-ansi": "^5.0.0"
+ "ansi-styles": "^4.0.0",
+ "string-width": "^4.1.0",
+ "strip-ansi": "^6.0.0"
+ },
+ "dependencies": {
+ "ansi-regex": {
+ "version": "5.0.0",
+ "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz",
+ "integrity": "sha512-bY6fj56OUQ0hU1KjFNDQuJFezqKdrAyFdIevADiqrWHwSlbmBNMHp5ak2f40Pm8JTFyM2mqxkG6ngkHO11f/lg=="
+ },
+ "ansi-styles": {
+ "version": "4.2.1",
+ "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-4.2.1.tgz",
+ "integrity": "sha512-9VGjrMsG1vePxcSweQsN20KY/c4zN0h9fLjqAbwbPfahM3t+NL+M9HC8xeXG2I8pX5NoamTGNuomEUFI7fcUjA==",
+ "requires": {
+ "@types/color-name": "^1.1.1",
+ "color-convert": "^2.0.1"
+ }
+ },
+ "color-convert": {
+ "version": "2.0.1",
+ "resolved": "https://registry.npmjs.org/color-convert/-/color-convert-2.0.1.tgz",
+ "integrity": "sha512-RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ==",
+ "requires": {
+ "color-name": "~1.1.4"
+ }
+ },
+ "color-name": {
+ "version": "1.1.4",
+ "resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.4.tgz",
+ "integrity": "sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA=="
+ },
+ "strip-ansi": {
+ "version": "6.0.0",
+ "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-6.0.0.tgz",
+ "integrity": "sha512-AuvKTrTfQNYNIctbR1K/YGTR1756GycPsg7b9bdV9Duqur4gv6aKqHXah67Z8ImS7WEz5QVcOtlfW2rZEugt6w==",
+ "requires": {
+ "ansi-regex": "^5.0.0"
+ }
+ }
}
},
"wrappy": {
@@ -18173,17 +15641,6 @@
"mkdirp": "^0.5.1"
}
},
- "write-file-atomic": {
- "version": "3.0.3",
- "resolved": "https://registry.npmjs.org/write-file-atomic/-/write-file-atomic-3.0.3.tgz",
- "integrity": "sha512-AvHcyZ5JnSfq3ioSyjrBkH9yW4m7Ayk8/9My/DD9onKeu/94fwrMocemO2QAJFAlnnDN+ZDS+ZjAR5ua1/PV/Q==",
- "requires": {
- "imurmurhash": "^0.1.4",
- "is-typedarray": "^1.0.0",
- "signal-exit": "^3.0.2",
- "typedarray-to-buffer": "^3.1.5"
- }
- },
"ws": {
"version": "6.2.1",
"resolved": "https://registry.npmjs.org/ws/-/ws-6.2.1.tgz",
@@ -18216,20 +15673,19 @@
"integrity": "sha1-HBH5IY8HYImkfdUS+TxmmaaoHVI="
},
"yaml": {
- "version": "1.7.2",
- "resolved": "https://registry.npmjs.org/yaml/-/yaml-1.7.2.tgz",
- "integrity": "sha512-qXROVp90sb83XtAoqE8bP9RwAkTTZbugRUTm5YeFCBfNRPEp2YzTeqWiz7m5OORHzEvrA/qcGS8hp/E+MMROYw==",
+ "version": "1.9.2",
+ "resolved": "https://registry.npmjs.org/yaml/-/yaml-1.9.2.tgz",
+ "integrity": "sha512-HPT7cGGI0DuRcsO51qC1j9O16Dh1mZ2bnXwsi0jrSpsLz0WxOLSLXfkABVl6bZO629py3CU+OMJtpNHDLB97kg==",
"requires": {
- "@babel/runtime": "^7.6.3"
+ "@babel/runtime": "^7.9.2"
}
},
"yargs": {
- "version": "14.2.3",
- "resolved": "https://registry.npmjs.org/yargs/-/yargs-14.2.3.tgz",
- "integrity": "sha512-ZbotRWhF+lkjijC/VhmOT9wSgyBQ7+zr13+YLkhfsSiTriYsMzkTUFP18pFhWwBeMa5gUc1MzbhrO6/VB7c9Xg==",
+ "version": "13.3.2",
+ "resolved": "https://registry.npmjs.org/yargs/-/yargs-13.3.2.tgz",
+ "integrity": "sha512-AX3Zw5iPruN5ie6xGRIDgqkT+ZhnRlZMLMHAs8tg7nRruy2Nb+i5o9bwghAogtM08q1dpr2LVoS8KSTMYpWXUw==",
"requires": {
"cliui": "^5.0.0",
- "decamelize": "^1.2.0",
"find-up": "^3.0.0",
"get-caller-file": "^2.0.1",
"require-directory": "^2.1.1",
@@ -18238,13 +15694,86 @@
"string-width": "^3.0.0",
"which-module": "^2.0.0",
"y18n": "^4.0.0",
- "yargs-parser": "^15.0.1"
+ "yargs-parser": "^13.1.2"
+ },
+ "dependencies": {
+ "ansi-regex": {
+ "version": "4.1.0",
+ "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz",
+ "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg=="
+ },
+ "emoji-regex": {
+ "version": "7.0.3",
+ "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-7.0.3.tgz",
+ "integrity": "sha512-CwBLREIQ7LvYFB0WyRvwhq5N5qPhc6PMjD6bYggFlI5YyDgl+0vxq5VHbMOFqLg7hfWzmu8T5Z1QofhmTIhItA=="
+ },
+ "find-up": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/find-up/-/find-up-3.0.0.tgz",
+ "integrity": "sha512-1yD6RmLI1XBfxugvORwlck6f75tYL+iR0jqwsOrOxMZyGYqUuDhJ0l4AXdO1iX/FTs9cBAMEk1gWSEx1kSbylg==",
+ "requires": {
+ "locate-path": "^3.0.0"
+ }
+ },
+ "is-fullwidth-code-point": {
+ "version": "2.0.0",
+ "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-2.0.0.tgz",
+ "integrity": "sha1-o7MKXE8ZkYMWeqq5O+764937ZU8="
+ },
+ "locate-path": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-3.0.0.tgz",
+ "integrity": "sha512-7AO748wWnIhNqAuaty2ZWHkQHRSNfPVIsPIfwEOWO22AmaoVrWavlOcMR5nzTLNYvp36X220/maaRsrec1G65A==",
+ "requires": {
+ "p-locate": "^3.0.0",
+ "path-exists": "^3.0.0"
+ }
+ },
+ "p-limit": {
+ "version": "2.3.0",
+ "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.3.0.tgz",
+ "integrity": "sha512-//88mFWSJx8lxCzwdAABTJL2MyWB12+eIY7MDL2SqLmAkeKU9qxRvWuSyTjm3FUmpBEMuFfckAIqEaVGUDxb6w==",
+ "requires": {
+ "p-try": "^2.0.0"
+ }
+ },
+ "p-locate": {
+ "version": "3.0.0",
+ "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-3.0.0.tgz",
+ "integrity": "sha512-x+12w/To+4GFfgJhBEpiDcLozRJGegY+Ei7/z0tSLkMmxGZNybVMSfWj9aJn8Z5Fc7dBUNJOOVgPv2H7IwulSQ==",
+ "requires": {
+ "p-limit": "^2.0.0"
+ }
+ },
+ "p-try": {
+ "version": "2.2.0",
+ "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz",
+ "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ=="
+ },
+ "string-width": {
+ "version": "3.1.0",
+ "resolved": "https://registry.npmjs.org/string-width/-/string-width-3.1.0.tgz",
+ "integrity": "sha512-vafcv6KjVZKSgz06oM/H6GDBrAtz8vdhQakGjFIvNrHA6y3HCF1CInLy+QLq8dTJPQ1b+KDUqDFctkdRW44e1w==",
+ "requires": {
+ "emoji-regex": "^7.0.1",
+ "is-fullwidth-code-point": "^2.0.0",
+ "strip-ansi": "^5.1.0"
+ }
+ },
+ "strip-ansi": {
+ "version": "5.2.0",
+ "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz",
+ "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==",
+ "requires": {
+ "ansi-regex": "^4.1.0"
+ }
+ }
}
},
"yargs-parser": {
- "version": "15.0.1",
- "resolved": "https://registry.npmjs.org/yargs-parser/-/yargs-parser-15.0.1.tgz",
- "integrity": "sha512-0OAMV2mAZQrs3FkNpDQcBk1x5HXb8X4twADss4S0Iuk+2dGnLOE/fRHrsYm542GduMveyA77OF4wrNJuanRCWw==",
+ "version": "13.1.2",
+ "resolved": "https://registry.npmjs.org/yargs-parser/-/yargs-parser-13.1.2.tgz",
+ "integrity": "sha512-3lbsNRf/j+A4QuSZfDRA7HRSfWrzO0YjqTJd5kjAq37Zep1CEgaYmrH9Q3GwPiB9cHyd1Y1UwggGhJGoxipbzg==",
"requires": {
"camelcase": "^5.0.0",
"decamelize": "^1.2.0"
@@ -18267,20 +15796,6 @@
"@types/yoga-layout": "1.9.1"
}
},
- "zen-observable": {
- "version": "0.8.15",
- "resolved": "https://registry.npmjs.org/zen-observable/-/zen-observable-0.8.15.tgz",
- "integrity": "sha512-PQ2PC7R9rslx84ndNBZB/Dkv8V8fZEpk83RLgXtYd0fwUgEjseMn1Dgajh2x6S8QbZAFa9p2qVCEuYZNgve0dQ=="
- },
- "zen-observable-ts": {
- "version": "0.8.20",
- "resolved": "https://registry.npmjs.org/zen-observable-ts/-/zen-observable-ts-0.8.20.tgz",
- "integrity": "sha512-2rkjiPALhOtRaDX6pWyNqK1fnP5KkJJybYebopNSn6wDG1lxBoFs2+nwwXKoA6glHIrtwrfBBy6da0stkKtTAA==",
- "requires": {
- "tslib": "^1.9.3",
- "zen-observable": "^0.8.0"
- }
- },
"zwitch": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/zwitch/-/zwitch-1.0.5.tgz",
diff --git a/website/package.json b/website/package.json
index 212059906387..e16c919f7765 100644
--- a/website/package.json
+++ b/website/package.json
@@ -1,51 +1,43 @@
{
- "name": "vault-docs-platform",
- "description": "Description of your website",
- "version": "0.0.1",
+ "name": "vault-docs",
+ "description": "HashiCorp Vault documentation website",
+ "version": "1.0.0",
"author": "HashiCorp",
"dependencies": {
- "@bugsnag/js": "^6.5.2",
- "@bugsnag/plugin-react": "^6.5.0",
- "@hashicorp/nextjs-scripts": "^6.2.0-9",
- "@hashicorp/react-button": "^2.1.6",
- "@hashicorp/react-case-study-slider": "^2.0.10",
- "@hashicorp/react-consent-manager": "^2.0.6",
+ "@hashicorp/nextjs-scripts": "^7.1.0",
+ "@hashicorp/react-button": "^2.2.0",
+ "@hashicorp/react-case-study-slider": "^2.1.0",
"@hashicorp/react-content": "^3.0.0-0",
- "@hashicorp/react-docs-sidenav": "^3.0.4",
- "@hashicorp/react-docs-sitemap": "^1.0.0",
- "@hashicorp/react-footer": "3.1.11",
- "@hashicorp/react-global-styles": "^4.0.10",
- "@hashicorp/react-head": "^0.1.1",
- "@hashicorp/react-hero": "3.0.4",
+ "@hashicorp/react-docs-page": "^2.0.0",
+ "@hashicorp/react-docs-sidenav": "^3.2.3",
+ "@hashicorp/react-enterprise-alert": "^2.1.0",
+ "@hashicorp/react-global-styles": "^4.4.0",
+ "@hashicorp/react-head": "^1.0.0",
+ "@hashicorp/react-hero": "3.1.0",
"@hashicorp/react-image": "^2.0.1",
"@hashicorp/react-inline-svg": "^1.0.0",
"@hashicorp/react-mega-nav": "^4.0.1-2",
- "@hashicorp/react-product-downloader": "^3.0.3",
+ "@hashicorp/react-product-downloader": "^3.2.0",
"@hashicorp/react-section-header": "^2.0.0",
- "@hashicorp/react-subnav": "^3.0.0",
- "@hashicorp/react-text-and-content": "^4.0.6",
+ "@hashicorp/react-subnav": "^3.2.0",
+ "@hashicorp/react-tabs": "^0.4.0",
+ "@hashicorp/react-text-and-content": "^4.1.0",
"@hashicorp/react-use-cases": "^1.0.4",
"@hashicorp/react-vertical-text-block-list": "^2.0.1",
"babel-plugin-import-glob-array": "^0.2.0",
- "highlight.js": "^9.18.1",
"imagemin-mozjpeg": "^8.0.0",
"imagemin-optipng": "^7.1.0",
"imagemin-svgo": "^7.1.0",
- "isomorphic-unfetch": "^3.0.0",
- "marked": "^0.7.0",
- "next": "^9.3.3",
- "nprogress": "^0.2.0",
+ "next": "9.3.6",
"react": "^16.13.1",
- "react-dom": "^16.13.1",
- "slugify": "^1.4.0",
- "stringify-object": "^3.3.0"
+ "react-dom": "^16.13.1"
},
"devDependencies": {
"dart-linkcheck": "^2.0.15",
"glob": "^7.1.6",
- "husky": "^4.2.3",
+ "husky": "^4.2.5",
"inquirer": "^7.1.0",
- "prettier": "^2.0.2"
+ "prettier": "^2.0.5"
},
"husky": {
"hooks": {
@@ -54,15 +46,15 @@
},
"main": "index.js",
"scripts": {
- "build": "node --max-old-space-size=2048 ./node_modules/.bin/next build",
+ "build": "next build",
+ "clear_babel_cache": "rm -rf .next/cache/next-babel-loader",
"dynamic": "NODE_ENV=production next build && next start",
- "export": "node --max-old-space-size=2048 ./node_modules/.bin/next export",
+ "export": "next export",
"format": "next-hashicorp format",
"generate:component": "next-hashicorp generate component",
+ "linkcheck": "linkcheck https://www.vaultproject.io",
"lint": "next-hashicorp lint",
"start": "npm run clear_babel_cache && next dev",
- "static": "npm run clear_babel_cache && npm run build && npm run export && cp _redirects out/.",
- "clear_babel_cache": "rm -rf .next/cache/next-babel-loader",
- "linkcheck": "linkcheck https://www.vaultproject.io"
+ "static": "npm run clear_babel_cache && npm run build && npm run export && cp _redirects out/."
}
}
diff --git a/website/pages/404.jsx b/website/pages/404.jsx
new file mode 100644
index 000000000000..66f42b934452
--- /dev/null
+++ b/website/pages/404.jsx
@@ -0,0 +1,2 @@
+import NotFound from './not-found'
+export default NotFound
diff --git a/website/pages/404/index.js b/website/pages/404/index.js
deleted file mode 100644
index 54f7b607c14c..000000000000
--- a/website/pages/404/index.js
+++ /dev/null
@@ -1,36 +0,0 @@
-import Link from 'next/link'
-import { useEffect } from 'react'
-
-function FourOhFour() {
- useEffect(() => {
- /* eslint-disable no-undef */
- if (
- typeof globalThis?.analytics?.track === 'function' &&
- typeof globalThis?.document?.referrer === 'string' &&
- typeof globalThis?.location?.href === 'string'
- )
- globalThis.analytics.track({
- event: '404 Response',
- action: globalThis.location.href,
- label: globalThis.document.referrer
- })
- /* eslint-enable no-undef */
- }, [])
-
- return (
-
- )
-}
-
-export default FourOhFour
diff --git a/website/pages/_app.js b/website/pages/_app.js
index 58ec49d941dd..c23343b760e4 100644
--- a/website/pages/_app.js
+++ b/website/pages/_app.js
@@ -1,98 +1,90 @@
import './style.css'
-import '../lib/globalThis'
-import App from 'next/app'
-import NProgress from 'nprogress'
+import '@hashicorp/nextjs-scripts/lib/nprogress/style.css'
+
import Router from 'next/router'
import Head from 'next/head'
+import { ErrorBoundary } from '@hashicorp/nextjs-scripts/lib/bugsnag'
+import createConsentManager from '@hashicorp/nextjs-scripts/lib/consent-manager'
+import NProgress from '@hashicorp/nextjs-scripts/lib/nprogress'
+import useAnchorLinkAnalytics from '@hashicorp/nextjs-scripts/lib/anchor-link-analytics'
import HashiHead from '@hashicorp/react-head'
import ProductSubnav from '../components/subnav'
import MegaNav from '@hashicorp/react-mega-nav'
-import Footer from '@hashicorp/react-footer'
-import { ConsentManager, open } from '@hashicorp/react-consent-manager'
-import consentManagerConfig from '../lib/consent-manager-config'
-import bugsnagClient from '../lib/bugsnag'
+import Footer from '../components/footer'
import Error from './_error'
-Router.events.on('routeChangeStart', NProgress.start)
-Router.events.on('routeChangeError', NProgress.done)
-Router.events.on('routeChangeComplete', url => {
- setTimeout(() => window.analytics.page(url), 0)
- NProgress.done()
+NProgress({ Router })
+const { ConsentManager, openConsentManager } = createConsentManager({
+ preset: 'oss',
})
-// Bugsnag
-const ErrorBoundary = bugsnagClient.getPlugin('react')
+function App({ Component, pageProps }) {
+ useAnchorLinkAnalytics()
-class NextApp extends App {
- static async getInitialProps({ Component, ctx }) {
- let pageProps = {}
+ return (
+
+
+
+
+
+
+
+
+ )
+}
- if (Component.getInitialProps) {
- pageProps = await Component.getInitialProps(ctx)
- } else if (Component.isMDXComponent) {
- // fix for https://github.com/mdx-js/mdx/issues/382
- const mdxLayoutComponent = Component({}).props.originalType
- if (mdxLayoutComponent.getInitialProps) {
- pageProps = await mdxLayoutComponent.getInitialProps(ctx)
- }
- }
+App.getInitialProps = async ({ Component, ctx }) => {
+ let pageProps = {}
- return { pageProps }
+ if (Component.getInitialProps) {
+ pageProps = await Component.getInitialProps(ctx)
+ } else if (Component.isMDXComponent) {
+ // fix for https://github.com/mdx-js/mdx/issues/382
+ const mdxLayoutComponent = Component({}).props.originalType
+ if (mdxLayoutComponent.getInitialProps) {
+ pageProps = await mdxLayoutComponent.getInitialProps(ctx)
+ }
}
- render() {
- const { Component, pageProps } = this.props
-
- return (
-
-
-
-
-
-
-
-
- )
- }
+ return { pageProps }
}
-export default NextApp
+export default App
diff --git a/website/pages/_error.jsx b/website/pages/_error.jsx
index d7dcbcdde55d..e4f36158e34a 100644
--- a/website/pages/_error.jsx
+++ b/website/pages/_error.jsx
@@ -1,13 +1,14 @@
-import React from 'react'
-import bugsnagClient from '../lib/bugsnag'
-import FourOhFour from './404'
+import NotFound from './404'
+import Bugsnag from '@hashicorp/nextjs-scripts/lib/bugsnag'
-export default class Page extends React.Component {
- static async getInitialProps(ctx) {
- if (ctx.err) bugsnagClient.notify(ctx.err)
- }
+function Error({ statusCode }) {
+ return
+}
- render() {
- return
- }
+Error.getInitialProps = ({ res, err }) => {
+ if (err) Bugsnag.notify(err)
+ const statusCode = res ? res.statusCode : err ? err.statusCode : 404
+ return { statusCode }
}
+
+export default Error
diff --git a/website/pages/api-docs/auth/alicloud/index.mdx b/website/pages/api-docs/auth/alicloud/index.mdx
index 905180d79826..c24b8c4318ce 100644
--- a/website/pages/api-docs/auth/alicloud/index.mdx
+++ b/website/pages/api-docs/auth/alicloud/index.mdx
@@ -42,7 +42,7 @@ will be able to perform the login operation.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -64,7 +64,7 @@ Returns the previously registered role configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/alicloud/role/dev-role
@@ -94,7 +94,7 @@ Lists all the roles that are registered with the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -125,7 +125,7 @@ Deletes the previously registered role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -164,7 +164,7 @@ GetCallerIdentity request.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/auth/approle/index.mdx b/website/pages/api-docs/auth/approle/index.mdx
index 9beede8ff8e5..1004d2d697f5 100644
--- a/website/pages/api-docs/auth/approle/index.mdx
+++ b/website/pages/api-docs/auth/approle/index.mdx
@@ -25,7 +25,7 @@ This endpoint returns a list the existing AppRoles in the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -93,7 +93,7 @@ enabled while creating or updating a role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -115,7 +115,7 @@ Reads the properties of an existing AppRole.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/approle/role/application1
@@ -158,7 +158,7 @@ Deletes an existing AppRole from the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -179,7 +179,7 @@ Reads the RoleID of an existing AppRole.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/approle/role/application1/role-id
@@ -224,7 +224,7 @@ Updates the RoleID of an existing AppRole to a custom value.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -284,7 +284,7 @@ itself, and also to delete the SecretID from the AppRole.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -324,7 +324,7 @@ This includes the accessors for "custom" SecretIDs as well.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -376,7 +376,7 @@ Reads out the properties of a SecretID.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -407,7 +407,7 @@ Destroy an AppRole secret ID.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -438,7 +438,7 @@ Reads out the properties of a SecretID.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -469,7 +469,7 @@ Destroy an AppRole secret ID by its accessor.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -512,7 +512,7 @@ Assigns a "custom" SecretID against an existing AppRole. This is used in the
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -564,7 +564,7 @@ AppRole (such as client IP CIDR) are also evaluated.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
@@ -626,7 +626,7 @@ storage method so should be used sparingly.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/auth/aws/index.mdx b/website/pages/api-docs/auth/aws/index.mdx
index 3d5522c4b20f..e7066a8b0f60 100644
--- a/website/pages/api-docs/auth/aws/index.mdx
+++ b/website/pages/api-docs/auth/aws/index.mdx
@@ -78,7 +78,7 @@ capabilities, the credentials are fetched automatically.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -96,7 +96,7 @@ Returns the previously configured AWS access credentials.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/aws/config/client
@@ -127,7 +127,7 @@ Deletes the previously configured AWS access credentials.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -196,7 +196,7 @@ This configures the way that Vault interacts with the
### Sample Request
-```
+```shell-session
$ curl \
-- header "X-Vault-Token:..." \
--request POST
@@ -214,7 +214,7 @@ Returns the previously configured Identity integration configuration
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token:..." \
http://127.0.0.1:8200/v1/auth/aws/config/identity
@@ -263,7 +263,7 @@ using the "type" parameter.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -285,7 +285,7 @@ Returns the previously configured AWS public key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
@@ -312,7 +312,7 @@ Removes the previously configured AWS public key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -329,7 +329,7 @@ Lists all the AWS public certificates that are registered with the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -376,7 +376,7 @@ when validating IAM principals or EC2 instances in the particular AWS account.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -399,7 +399,7 @@ Returns the previously configured STS role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333
@@ -425,7 +425,7 @@ Lists all the AWS Account IDs for which an STS role is registered.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -457,7 +457,7 @@ Deletes a previously configured AWS account/STS role association.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -490,7 +490,7 @@ Configures the periodic tidying operation of the whitelisted identity entries.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -508,7 +508,7 @@ Returns the previously configured periodic whitelist tidying settings.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
@@ -535,7 +535,7 @@ Deletes the previously configured periodic whitelist tidying settings.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -568,7 +568,7 @@ Configures the periodic tidying operation of the blacklisted role tag entries.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -586,7 +586,7 @@ Returns the previously configured periodic blacklist tidying settings.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
@@ -613,7 +613,7 @@ Deletes the previously configured periodic blacklist tidying settings.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -789,7 +789,7 @@ list in order to satisfy that constraint.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -811,7 +811,7 @@ Returns the previously registered role configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/aws/role/dev-role
@@ -842,7 +842,7 @@ Lists all the roles that are registered with the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -873,7 +873,7 @@ Deletes the previously registered role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -932,7 +932,7 @@ given instance can be allowed to gain in a worst-case scenario.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1025,7 +1025,7 @@ along with its RSA digest can be supplied to this endpoint.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
@@ -1073,7 +1073,7 @@ token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1096,7 +1096,7 @@ Returns the blacklist entry of a previously blacklisted role tag.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
@@ -1123,7 +1123,7 @@ Lists all the role tags that are blacklisted.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -1158,7 +1158,7 @@ Deletes a blacklisted role tag.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -1182,7 +1182,7 @@ Cleans up the entries in the blacklist based on expiration time on the entry and
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1206,7 +1206,7 @@ successful login.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/aws/identity-whitelist/i-aab47d37
@@ -1236,7 +1236,7 @@ Lists all the instance IDs that are in the whitelist of successful logins.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -1269,7 +1269,7 @@ Deletes a cache of the successful login from an instance.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -1293,7 +1293,7 @@ Cleans up the entries in the whitelist based on expiration time and
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/auth/azure/index.mdx b/website/pages/api-docs/auth/azure/index.mdx
index 801a9f9fca02..8866c5615ff3 100644
--- a/website/pages/api-docs/auth/azure/index.mdx
+++ b/website/pages/api-docs/auth/azure/index.mdx
@@ -48,7 +48,7 @@ virtual machine.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -66,7 +66,7 @@ Returns the previously configured config, including credentials.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/auth/azure/config
@@ -97,7 +97,7 @@ Deletes the previously configured Azure config and credentials.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -145,7 +145,7 @@ entities attempting to login.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -167,7 +167,7 @@ Returns the previously registered role configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/auth/azure/role/dev-role
@@ -206,7 +206,7 @@ Lists all the roles that are registered with the plugin.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -241,7 +241,7 @@ Deletes the previously registered role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -287,7 +287,7 @@ entity and then authorizes the entity for the given role.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/auth/cert/index.mdx b/website/pages/api-docs/auth/cert/index.mdx
index ca9d11b8dad8..ccbd7d58e9a0 100644
--- a/website/pages/api-docs/auth/cert/index.mdx
+++ b/website/pages/api-docs/auth/cert/index.mdx
@@ -78,7 +78,7 @@ Sets a CA cert and associated parameters in a role name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -100,7 +100,7 @@ Gets information associated with the named role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/cert/certs/test-ca
@@ -138,7 +138,7 @@ Lists configured certificate names.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -175,7 +175,7 @@ Deletes the named role and CA cert from the method mount.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -205,7 +205,7 @@ Sets a named CRL.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -229,7 +229,7 @@ arbitrary size, these are returned as strings.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/cert/crls/custom-crl
@@ -266,7 +266,7 @@ Deletes the named CRL from the auth method mount.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -297,7 +297,7 @@ Configuration options for the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -334,7 +334,7 @@ https://tools.ietf.org/html/rfc6125#section-2.3)
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--cert cert.pem \
diff --git a/website/pages/api-docs/auth/cf/index.mdx b/website/pages/api-docs/auth/cf/index.mdx
index 6c0165fac97d..75636fc8df33 100644
--- a/website/pages/api-docs/auth/cf/index.mdx
+++ b/website/pages/api-docs/auth/cf/index.mdx
@@ -66,7 +66,7 @@ documentation](/docs/auth/cf).
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -84,7 +84,7 @@ Returns the present CF configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/cf/config
@@ -117,7 +117,7 @@ Deletes the present CF configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -177,7 +177,7 @@ will be able to authenticate against this role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -195,7 +195,7 @@ Returns a CF role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/cf/roles/:role
@@ -227,7 +227,7 @@ Deletes a CF role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -244,7 +244,7 @@ Returns a CF role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST
@@ -314,7 +314,7 @@ rsa.SignPSS(rand.Reader, rsaPrivateKey, crypto.SHA256, checksum, nil)
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/auth/gcp/index.mdx b/website/pages/api-docs/auth/gcp/index.mdx
index 98254de01a23..6180a56f2bb1 100644
--- a/website/pages/api-docs/auth/gcp/index.mdx
+++ b/website/pages/api-docs/auth/gcp/index.mdx
@@ -85,7 +85,7 @@ to confirm signed JWTs passed in during login.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -103,7 +103,7 @@ Returns the configuration, if any, including credentials.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/gcp/config
@@ -227,7 +227,7 @@ Example `gce` role:
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -267,7 +267,7 @@ service accounts on the role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -307,7 +307,7 @@ remove labels (keys, values, or both) from the list of keys on the role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -329,7 +329,7 @@ Returns the previously registered role configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/gcp/role/my-role
@@ -368,7 +368,7 @@ Lists all the roles that are registered with the plugin.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -399,7 +399,7 @@ Deletes the previously registered role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -440,7 +440,7 @@ role.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/auth/github/index.mdx b/website/pages/api-docs/auth/github/index.mdx
index a08356cd1366..a6893856c995 100644
--- a/website/pages/api-docs/auth/github/index.mdx
+++ b/website/pages/api-docs/auth/github/index.mdx
@@ -43,7 +43,7 @@ distinction between the `create` and `update` capabilities inside ACL policies.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -61,7 +61,7 @@ Reads the GitHub configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/github/config
@@ -108,7 +108,7 @@ Map a list of policies to a team that exists in the configured GitHub organizati
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -126,7 +126,7 @@ Reads the GitHub team policy mapping.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/github/map/teams/dev
@@ -174,7 +174,7 @@ organization.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -195,7 +195,7 @@ Reads the GitHub user policy mapping.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/github/map/users/sethvargo
@@ -241,7 +241,7 @@ Login using GitHub access token.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
http://127.0.0.1:8200/v1/auth/github/login
diff --git a/website/pages/api-docs/auth/jwt/index.mdx b/website/pages/api-docs/auth/jwt/index.mdx
index 5e54d7d9d1e6..22845590b660 100644
--- a/website/pages/api-docs/auth/jwt/index.mdx
+++ b/website/pages/api-docs/auth/jwt/index.mdx
@@ -35,7 +35,7 @@ set.
- `oidc_client_secret` `(string: )` - The OAuth Client Secret from the provider for OIDC roles.
- `oidc_response_mode` `(string: )` - The response mode to be used in the OAuth2 request. Allowed values are "query" and "form_post". Defaults to "query".
- `oidc_response_types` `(comma-separated string, or array of strings: )` - The response types to request. Allowed values are "code" and "id_token". Defaults to "code".
- Note: "id_token" may only be used if "oidc_response_mode" is set to "form_post".
+ Note: "id_token" may only be used if "oidc_response_mode" is set to "form_post".
- `jwks_url` `(string: )` - JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
- `jwks_ca_pem` `(string: )` - The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
- `jwt_validation_pubkeys` `(comma-separated string, or array of strings: )` - A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with "jwks_url" or "oidc_discovery_url".
@@ -54,7 +54,7 @@ set.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -72,7 +72,7 @@ Returns the previously configured config.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/auth/jwt/config
@@ -127,9 +127,9 @@ entities attempting to login. At least one of the bound values must be set.
The expected value may be a single string or a list of strings. The interpretation of the bound
claim values is configured with `bound_claims_type`.
- `bound_claims_type` `(string: "string")` - Configures the interpretation of the bound_claims values.
- If `"string"` (the default), the values will treated as string literals and must match exactly.
- If set to `"glob"`, the values will be interpreted as globs, with `*` matching any number of
- characters.
+ If `"string"` (the default), the values will treated as string literals and must match exactly.
+ If set to `"glob"`, the values will be interpreted as globs, with `*` matching any number of
+ characters.
- `groups_claim` `(string: )` - The claim to use to uniquely identify
the set of groups to which the user belongs; this will be used as the names
for the Identity group aliases created due to a successful login. The claim
@@ -168,7 +168,7 @@ entities attempting to login. At least one of the bound values must be set.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -190,7 +190,7 @@ Returns the previously registered role configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/auth/jwt/role/dev-role
@@ -232,7 +232,7 @@ Lists all the roles that are registered with the plugin.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -267,7 +267,7 @@ Deletes the previously registered role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -302,7 +302,7 @@ Obtain an authorization URL from Vault to start an OIDC login flow.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
@@ -341,7 +341,7 @@ against any bound claims, and if valid a Vault token will be returned.
### Sample Request
-```
+```shell-session
$ curl \
https://127.0.0.1:8200/v1/auth/jwt/oidc/callback?state=n2kfh3nsl&code=mn2ldl2nv98h2jl&nonce=ni42i2idj2jj
```
@@ -392,7 +392,7 @@ entity and then authorizes the entity for the given role.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/auth/kerberos/index.mdx b/website/pages/api-docs/auth/kerberos/index.mdx
index aa157bd22e59..c7b8bbcbc0cd 100644
--- a/website/pages/api-docs/auth/kerberos/index.mdx
+++ b/website/pages/api-docs/auth/kerberos/index.mdx
@@ -37,7 +37,7 @@ for verifying inbound SPNEGO tokens.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -65,7 +65,7 @@ The keytab is not returned because it is sensitive information.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/kerberos/config
@@ -151,7 +151,7 @@ This endpoint configures LDAP in the Kerberos auth method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -189,7 +189,7 @@ This endpoint retrieves the LDAP configuration for the Kerberos auth method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/kerberos/config/ldap
@@ -236,7 +236,7 @@ This endpoint returns a list of existing LDAP groups in the Kerberos auth method
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -273,7 +273,7 @@ This endpoint returns the policies associated with a Kerberos LDAP group.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/kerberos/groups/admins
@@ -317,7 +317,7 @@ This endpoint creates or updates LDAP group policies.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -339,7 +339,7 @@ This endpoint deletes the LDAP group and policy association.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -391,7 +391,7 @@ sWw
### Sample Request
-```
+```shell-session
$ curl \
--header "Authorization: Negotiate YIIFSw...sWw" \
--request POST \
diff --git a/website/pages/api-docs/auth/kubernetes/index.mdx b/website/pages/api-docs/auth/kubernetes/index.mdx
index 653fd1606d86..3b38f1164bae 100644
--- a/website/pages/api-docs/auth/kubernetes/index.mdx
+++ b/website/pages/api-docs/auth/kubernetes/index.mdx
@@ -53,7 +53,7 @@ access the Kubernetes API.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -71,7 +71,7 @@ Returns the previously configured config, including credentials.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/kubernetes/config
@@ -126,7 +126,7 @@ entities attempting to login.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -148,7 +148,7 @@ Returns the previously registered role configuration.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
@@ -180,7 +180,7 @@ Lists all the roles that are registered with the auth method.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -211,7 +211,7 @@ Deletes the previously registered role.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -247,7 +247,7 @@ entity and then authorizes the entity for the given role.
### Sample Request
-```text
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/auth/ldap/index.mdx b/website/pages/api-docs/auth/ldap/index.mdx
index 43ae3c3224bd..c77777f7dfe6 100644
--- a/website/pages/api-docs/auth/ldap/index.mdx
+++ b/website/pages/api-docs/auth/ldap/index.mdx
@@ -89,7 +89,7 @@ This endpoint configures the LDAP auth method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -127,7 +127,7 @@ This endpoint retrieves the LDAP configuration for the auth method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/ldap/config
@@ -174,7 +174,7 @@ This endpoint returns a list of existing groups in the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -211,7 +211,7 @@ This endpoint returns the policies associated with a LDAP group.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/ldap/groups/admins
@@ -258,7 +258,7 @@ This endpoint creates or updates LDAP group policies.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -280,7 +280,7 @@ This endpoint deletes the LDAP group and policy association.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -297,7 +297,7 @@ This endpoint returns a list of existing users in the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -334,7 +334,7 @@ This endpoint returns the policies associated with a LDAP user.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
@@ -384,7 +384,7 @@ This endpoint creates or updates LDAP users policies and group associations.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -406,7 +406,7 @@ This endpoint deletes the LDAP user and policy association.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -436,7 +436,7 @@ This endpoint allows you to log in with LDAP credentials
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/auth/oci/index.mdx b/website/pages/api-docs/auth/oci/index.mdx
index 9f5bf11c6894..751ef0903421 100644
--- a/website/pages/api-docs/auth/oci/index.mdx
+++ b/website/pages/api-docs/auth/oci/index.mdx
@@ -37,7 +37,7 @@ Configure your home tenancy in the Vault, so that only users or instances from y
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -55,7 +55,7 @@ Returns the previously configured config.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/oci/config
@@ -98,7 +98,7 @@ Create a Vault administrator role in the OCI Auth method.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -120,7 +120,7 @@ Returns the previously registered role configuration.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/oci/role/devrole
@@ -152,7 +152,7 @@ Lists all the roles that are registered with the auth method.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -183,7 +183,7 @@ Deletes the previously registered role.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -223,7 +223,7 @@ entity and then authorizes the entity for the given role.
### Sample Request
-```text
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/auth/okta/index.mdx b/website/pages/api-docs/auth/okta/index.mdx
index 68570b00420e..bf2d210013df 100644
--- a/website/pages/api-docs/auth/okta/index.mdx
+++ b/website/pages/api-docs/auth/okta/index.mdx
@@ -52,7 +52,7 @@ distinction between the `create` and `update` capabilities inside ACL policies.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -70,7 +70,7 @@ Reads the Okta configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/okta/config
@@ -112,7 +112,7 @@ List the users configured in the Okta method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -157,7 +157,7 @@ Registers a new user and maps a set of policies to it.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -179,7 +179,7 @@ Reads the properties of an existing username.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/okta/users/test-user
@@ -215,7 +215,7 @@ Deletes an existing username from the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -232,7 +232,7 @@ List the groups configured in the Okta method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -276,7 +276,7 @@ Registers a new group and maps a set of policies to it.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -298,7 +298,7 @@ Reads the properties of an existing group.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/okta/groups/admins
@@ -333,7 +333,7 @@ Deletes an existing group from the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -363,7 +363,7 @@ Login with the username and password.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/auth/radius/index.mdx b/website/pages/api-docs/auth/radius/index.mdx
index 3bca5f3eb42c..29f460e54065 100644
--- a/website/pages/api-docs/auth/radius/index.mdx
+++ b/website/pages/api-docs/auth/radius/index.mdx
@@ -52,7 +52,7 @@ RADIUS.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -83,7 +83,7 @@ distinction between the `create` and `update` capabilities inside ACL policies.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -105,7 +105,7 @@ Reads the properties of an existing username.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/radius/users/test-user
@@ -140,7 +140,7 @@ Deletes an existing username from the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -157,7 +157,7 @@ List the users registered with the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -204,7 +204,7 @@ Login with the username and password.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/auth/token/index.mdx b/website/pages/api-docs/auth/token/index.mdx
index b37a9f01207c..aa988166d720 100644
--- a/website/pages/api-docs/auth/token/index.mdx
+++ b/website/pages/api-docs/auth/token/index.mdx
@@ -23,7 +23,7 @@ large numbers of tokens and their associated leases at once.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -121,7 +121,7 @@ during this call.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -182,7 +182,7 @@ Returns information about the client token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -228,7 +228,7 @@ Returns information about the current client token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/token/lookup-self
@@ -284,7 +284,7 @@ Returns information about the client token from the accessor.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -347,7 +347,7 @@ if there is a lease associated with it.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -396,7 +396,7 @@ possible only if there is a lease associated with it.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -447,7 +447,7 @@ renewal is possible only if there is a lease associated with it.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -494,7 +494,7 @@ generated with it are also revoked.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -513,7 +513,7 @@ revoked, all dynamic secrets generated with it are also revoked.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -544,7 +544,7 @@ revoke a token and its children.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -578,7 +578,7 @@ endpoint.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -600,7 +600,7 @@ Fetches the named role configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/token/roles/nomad
@@ -644,7 +644,7 @@ List available token roles.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST
@@ -724,7 +724,7 @@ tokens created against a role to be revoked using the
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST
@@ -746,7 +746,7 @@ This endpoint deletes the named token role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -766,7 +766,7 @@ storage method so should be used sparingly.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/auth/userpass/index.mdx b/website/pages/api-docs/auth/userpass/index.mdx
index d17899e25952..bccb070555d3 100644
--- a/website/pages/api-docs/auth/userpass/index.mdx
+++ b/website/pages/api-docs/auth/userpass/index.mdx
@@ -45,7 +45,7 @@ Create a new user or update an existing user. This path honors the distinction b
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -63,7 +63,7 @@ Reads the properties of an existing username.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
@@ -100,7 +100,7 @@ This endpoint deletes the user from the method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -130,7 +130,7 @@ Update password for an existing user.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -161,7 +161,7 @@ Update policies for an existing user.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -179,7 +179,7 @@ List available userpass users.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -219,7 +219,7 @@ Login with the username and password.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
diff --git a/website/pages/api-docs/index.html.md.erb b/website/pages/api-docs/index.html.md.erb
deleted file mode 100644
index 140695c363e7..000000000000
--- a/website/pages/api-docs/index.html.md.erb
+++ /dev/null
@@ -1,4 +0,0 @@
----
-layout: "api"
-page_title: "Vault API Documentation"
----
\ No newline at end of file
diff --git a/website/pages/api-docs/index.mdx b/website/pages/api-docs/index.mdx
index eaacd54871d3..44ba357e2c62 100644
--- a/website/pages/api-docs/index.mdx
+++ b/website/pages/api-docs/index.mdx
@@ -63,7 +63,7 @@ Thus, it would be equivalent to the above example to set `X-Vault-Namespace` to
For example, the following two commands result in equivalent requests:
-```shell
+```shell-session
$ curl \
-H "X-Vault-Token: f3b09679-3001-009d-2b80-9c306ab81aa6" \
-H "X-Vault-Namespace: ns1/ns2/" \
@@ -71,7 +71,7 @@ $ curl \
http://127.0.0.1:8200/v1/secret/foo
```
-```shell
+```shell-session
$ curl \
-H "X-Vault-Token: f3b09679-3001-009d-2b80-9c306ab81aa6" \
-X GET \
@@ -100,7 +100,7 @@ is mounted by default on a fresh Vault install and is of type `kv`.
Here is an example of reading a secret using cURL:
-```shell
+```shell-session
$ curl \
-H "X-Vault-Token: f3b09679-3001-009d-2b80-9c306ab81aa6" \
-X GET \
@@ -117,7 +117,7 @@ parameter `list=true`, or you can use the `LIST` HTTP verb. For the `kv`
backend, listing is allowed on directories only, and returns the keys in the
given directory:
-```shell
+```shell-session
$ curl \
-H "X-Vault-Token: f3b09679-3001-009d-2b80-9c306ab81aa6" \
-X LIST \
@@ -143,7 +143,7 @@ with a JSON body like:
Here is an example of writing a secret using cURL:
-```shell
+```shell-session
$ curl \
-H "X-Vault-Token: f3b09679-3001-009d-2b80-9c306ab81aa6" \
-H "Content-Type: application/json" \
@@ -166,7 +166,7 @@ Requests that are sent to a [Vault Agent][agent] that is configured to use the
`require_request_header` option must include the `X-Vault-Request` header
entry, e.g.:
-```shell
+```shell-session
$ curl \
-H "X-Vault-Token: f3b09679-3001-009d-2b80-9c306ab81aa6" \
-H "X-Vault-Request: true" \
@@ -191,7 +191,7 @@ OpenAPI document in the `openapi` attribute. This document is relevant for the p
Example request:
-```shell
+```shell-session
$ curl \
-H "X-Vault-Token: f3b09679-3001-009d-2b80-9c306ab81aa6" \
http://127.0.0.1:8200/v1/secret?help=1
@@ -200,7 +200,6 @@ $ curl \
Example response:
```javascript
-
{
"help": "## DESCRIPTION\n\nThis backend provides a versioned key-value store. The kv backend reads and\nwrites arbitrary secrets to the storage backend. The secrets are\nencrypted/decrypted by Vault: they are never stored unencrypted in the backend\nand the backend never has an opportunity to see the unencrypted value. Each key\ncan have a configured number of versions, and versions can be retrieved based on\ntheir version numbers.\n\n## PATHS\n\nThe following paths are supported by this backend. To view help for\nany of the paths below, use the help command with any route matching\nthe path pattern. Note that depending on the policy of your auth token,\nyou may or may not be able to access certain paths.\n\n ^.*$\n\n\n ^config$\n Configures settings for the KV store\n\n ^data/(?P.*)$\n Write, Read, and Delete data in the Key-Value Store.\n\n ^delete/(?P.*)$\n Marks one or more versions as deleted in the KV store.\n\n ^destroy/(?P.*)$\n Permanently removes one or more versions in the KV store\n\n ^metadata/(?P.*)$\n Configures settings for the KV store\n\n ^undelete/(?P.*)$\n Undeletes one or more versions from the KV store.",
"openapi": {
diff --git a/website/pages/api-docs/libraries.mdx b/website/pages/api-docs/libraries.mdx
index 35005f12535e..b946480acf95 100644
--- a/website/pages/api-docs/libraries.mdx
+++ b/website/pages/api-docs/libraries.mdx
@@ -20,7 +20,7 @@ These libraries are officially maintained by HashiCorp.
- [Vault Go Client](https://github.com/hashicorp/vault/tree/master/api)
-```shell
+```shell-session
$ go get github.com/hashicorp/vault/api
```
@@ -28,7 +28,7 @@ $ go get github.com/hashicorp/vault/api
- [Vault Ruby Client](https://github.com/hashicorp/vault-ruby)
-```shell
+```shell-session
$ gem install vault
```
@@ -41,7 +41,7 @@ These libraries are provided by the community.
- [ansible-vault](https://github.com/jhaals/ansible-vault) lookup plugin without third-party dependencies.
- [Ansible Modules Hashivault](https://pypi.python.org/pypi/ansible-modules-hashivault)
-```shell
+```shell-session
$ pip install ansible-modules-hashivault
```
@@ -49,13 +49,13 @@ $ pip install ansible-modules-hashivault
- [VaultSharp](https://github.com/rajanadar/VaultSharp) (.NET Standard 2.0 & 1.3, .NET Core >= 1.0.0, .NET 4.5, .NET 4.6, Mono, iOS, Android, Mac, UWP etc.)
-```shell
+```shell-session
$ Install-Package VaultSharp
```
- [Vault.NET](https://github.com/Chatham/Vault.NET)
-```shell
+```shell-session
$ Install-Package Vault
```
@@ -80,7 +80,7 @@ $ Install-Package Vault
- [vc](https://github.com/adfinis-sygroup/vault-client)
-```shell
+```shell-session
$ go get github.com/adfinis-sygroup/vault-client
```
@@ -88,13 +88,13 @@ $ go get github.com/adfinis-sygroup/vault-client
- [vault-tool](https://hackage.haskell.org/package/vault-tool)
-```shell
+```shell-session
$ cabal install vault-tool
```
- [gothic](http://hackage.haskell.org/package/gothic)
-```shell
+```shell-session
$ stack install gothic
```
@@ -111,7 +111,7 @@ $ stack install gothic
- [node-vault](https://github.com/kr1sp1n/node-vault)
-```shell
+```shell-session
$ npm install node-vault
```
@@ -119,19 +119,19 @@ $ npm install node-vault
- [vault-php-sdk](https://github.com/jippi/vault-php-sdk)
-```shell
+```shell-session
$ composer require jippi/vault-php-sdk
```
- [vault-php-sdk](https://github.com/violuke/vault-php-sdk) extended from jipppi
-```shell
+```shell-session
$ composer require violuke/vault-php-sdk
```
- [vault-php](https://github.com/CSharpRU/vault-php)
-```shell
+```shell-session
$ composer require csharpru/vault-php
```
@@ -147,13 +147,13 @@ Install-Module Zyborg.Vault
- [HVAC](https://github.com/ianunruh/hvac)
-```shell
+```shell-session
$ pip install hvac
```
- [Async-HVAC](https://github.com/Aloomaio/async-hvac)
-```shell
+```shell-session
$ pip install async-hvac
```
diff --git a/website/pages/api-docs/secret/ad/index.mdx b/website/pages/api-docs/secret/ad/index.mdx
index 0588d5d7f2b2..12e6879bd9f0 100644
--- a/website/pages/api-docs/secret/ad/index.mdx
+++ b/website/pages/api-docs/secret/ad/index.mdx
@@ -68,7 +68,7 @@ valid AD credentials with proper permissions.
### Sample Post Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -126,7 +126,7 @@ When adding a role, Vault verifies its associated service account exists.
### Sample Post Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -172,7 +172,7 @@ The `creds` endpoint offers the credential information for a given role.
### Sample Get Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -217,7 +217,7 @@ When adding a service account to the library, Vault verifies it already exists i
### Sample Post Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -274,7 +274,7 @@ Returns a `200` if a credential is available, and a `400` if no credential is av
### Sample Post Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -332,7 +332,7 @@ in _by this particular call_.
### Sample Post Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -373,7 +373,7 @@ $ curl \
### Sample Get Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -428,7 +428,7 @@ Generally, `rotate-root` returns a 204. However, if `rotate-root` is already in
### Sample Get Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
diff --git a/website/pages/api-docs/secret/alicloud/index.mdx b/website/pages/api-docs/secret/alicloud/index.mdx
index a773afb700f0..d908c07e0a16 100644
--- a/website/pages/api-docs/secret/alicloud/index.mdx
+++ b/website/pages/api-docs/secret/alicloud/index.mdx
@@ -44,7 +44,7 @@ the policies that should be attached to the access key you provide.
### Sample Post Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -91,7 +91,7 @@ The `role` endpoint configures how Vault will generate credentials for users of
### Sample Post Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -189,7 +189,7 @@ role must be created before queried.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/alicloud/creds/example-role
diff --git a/website/pages/api-docs/secret/aws/index.mdx b/website/pages/api-docs/secret/aws/index.mdx
index f5146898fb01..329aea919679 100644
--- a/website/pages/api-docs/secret/aws/index.mdx
+++ b/website/pages/api-docs/secret/aws/index.mdx
@@ -71,7 +71,7 @@ valid AWS credentials with proper permissions.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -90,7 +90,7 @@ This endpoint allows you to read non-secure values that have been configured in
### Sample Request
-```
+```shell-session
$ curl
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/aws/config/root
@@ -133,7 +133,7 @@ There are no parameters to this operation.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -181,7 +181,7 @@ optional, as there are default values for `lease` and `lease_max`.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -199,7 +199,7 @@ This endpoint returns the current lease settings for the AWS secrets engine.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/aws/config/lease
@@ -285,7 +285,7 @@ mixed with the parameters listed above.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -332,7 +332,7 @@ then it will show up in the response as `invalid_data`.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/aws/roles/example-role
@@ -376,7 +376,7 @@ This endpoint lists all existing roles in the secrets engine.
### Sample Request
-```shell
+```shell-session
$ curl
--header "X-Vault-Token: ..." \
--request LIST \
@@ -409,7 +409,7 @@ exist, a 404 is returned.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -454,7 +454,7 @@ credentials retrieved through `/aws/creds` must be of the `iam_user` type.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/aws/creds/example-role
diff --git a/website/pages/api-docs/secret/azure/index.mdx b/website/pages/api-docs/secret/azure/index.mdx
index 054064baba9a..e9b5930b3d88 100644
--- a/website/pages/api-docs/secret/azure/index.mdx
+++ b/website/pages/api-docs/secret/azure/index.mdx
@@ -50,7 +50,7 @@ service principals. Environment variables will override any parameters set in th
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -68,7 +68,7 @@ Return the stored configuration, omitting `client_secret`.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -99,7 +99,7 @@ Deletes the stored Azure configuration and credentials.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -154,7 +154,7 @@ information about roles.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -172,7 +172,7 @@ Lists all of the roles that are registered with the plugin.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -203,7 +203,7 @@ This endpoint generates a new service principal based on the named role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/azure/creds/my-role
diff --git a/website/pages/api-docs/secret/cassandra/index.mdx b/website/pages/api-docs/secret/cassandra/index.mdx
index 0d98c155b2fe..483140bbd2d0 100644
--- a/website/pages/api-docs/secret/cassandra/index.mdx
+++ b/website/pages/api-docs/secret/cassandra/index.mdx
@@ -99,7 +99,7 @@ the issue command from the PKI backend.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -150,7 +150,7 @@ This endpoint creates or updates the role definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -173,7 +173,7 @@ This endpoint queries the role definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/cassandra/roles/my-role
@@ -207,7 +207,7 @@ This endpoint deletes the role definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -230,7 +230,7 @@ role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/cassandra/creds/my-role
diff --git a/website/pages/api-docs/secret/consul/index.mdx b/website/pages/api-docs/secret/consul/index.mdx
index 5ac6a2ba4061..33630979b62b 100644
--- a/website/pages/api-docs/secret/consul/index.mdx
+++ b/website/pages/api-docs/secret/consul/index.mdx
@@ -56,7 +56,7 @@ Consul tokens.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--header "X-Vault-Token: ..." \
@@ -122,7 +122,7 @@ To create a client token with a custom policy:
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--header "X-Vault-Token: ..." \
@@ -173,7 +173,7 @@ If no role exists with that name, a 404 is returned.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/consul/roles/example-role
@@ -201,7 +201,7 @@ This endpoint lists all existing roles in the secrets engine.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -234,7 +234,7 @@ not exist, this endpoint will still return a successful response.
### Sample Request
-```
+```shell-session
$ curl \
--request DELETE \
--header "X-Vault-Token: ..." \
@@ -257,7 +257,7 @@ definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/consul/creds/example-role
diff --git a/website/pages/api-docs/secret/cubbyhole/index.mdx b/website/pages/api-docs/secret/cubbyhole/index.mdx
index c063c0d2f72d..41aca4f99969 100644
--- a/website/pages/api-docs/secret/cubbyhole/index.mdx
+++ b/website/pages/api-docs/secret/cubbyhole/index.mdx
@@ -31,7 +31,7 @@ This endpoint retrieves the secret at the specified location.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/cubbyhole/my-secret
@@ -68,7 +68,7 @@ not return a value. The values themselves are not accessible via this command.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -123,7 +123,7 @@ This endpoint stores a secret at the specified location.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -146,7 +146,7 @@ This endpoint deletes the secret at the specified location.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/secret/databases/cassandra.mdx b/website/pages/api-docs/secret/databases/cassandra.mdx
index 39f7ee999ed6..ad5f609c8e8d 100644
--- a/website/pages/api-docs/secret/databases/cassandra.mdx
+++ b/website/pages/api-docs/secret/databases/cassandra.mdx
@@ -108,7 +108,7 @@ the issue command from the PKI secrets engine.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/elasticdb.mdx b/website/pages/api-docs/secret/databases/elasticdb.mdx
index 7d7db2b36ace..fc5b982d08ac 100644
--- a/website/pages/api-docs/secret/databases/elasticdb.mdx
+++ b/website/pages/api-docs/secret/databases/elasticdb.mdx
@@ -52,7 +52,7 @@ has a number of parameters to further configure a connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/hanadb.mdx b/website/pages/api-docs/secret/databases/hanadb.mdx
index a59598f13a3e..c65a5887dd61 100644
--- a/website/pages/api-docs/secret/databases/hanadb.mdx
+++ b/website/pages/api-docs/secret/databases/hanadb.mdx
@@ -39,7 +39,7 @@ has a number of parameters to further configure a connection.
`max_open_connections` it will be reduced to be equal.
- `max_connection_lifetime` `(string: "0s")` - Specifies the maximum amount of
- time a connection may be reused. If <= 0s connections are reused forever.
+ time a connection may be reused. If <= 0s connections are reused forever.
- `username` `(string: "")` - The root credential username used in the connection URL.
@@ -61,7 +61,7 @@ has a number of parameters to further configure a connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/influxdb.mdx b/website/pages/api-docs/secret/databases/influxdb.mdx
index 3e4207f76437..678b80b3b399 100644
--- a/website/pages/api-docs/secret/databases/influxdb.mdx
+++ b/website/pages/api-docs/secret/databases/influxdb.mdx
@@ -90,7 +90,7 @@ the issue command from the PKI secrets engine.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/mongodb.mdx b/website/pages/api-docs/secret/databases/mongodb.mdx
index 568c85a75c1d..181e663fdff6 100644
--- a/website/pages/api-docs/secret/databases/mongodb.mdx
+++ b/website/pages/api-docs/secret/databases/mongodb.mdx
@@ -41,7 +41,6 @@ has a number of parameters to further configure a connection.
- `tls_ca` `(string: "")` - x509 CA file for validating the certificate presented by the
MongoDB server. Must be PEM encoded.
-
### Sample Payload
```json
@@ -57,7 +56,7 @@ has a number of parameters to further configure a connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/mongodbatlas.mdx b/website/pages/api-docs/secret/databases/mongodbatlas.mdx
index 238132ee02b1..40e73b34e5dd 100644
--- a/website/pages/api-docs/secret/databases/mongodbatlas.mdx
+++ b/website/pages/api-docs/secret/databases/mongodbatlas.mdx
@@ -42,7 +42,7 @@ has a number of parameters to further configure a connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/mssql.mdx b/website/pages/api-docs/secret/databases/mssql.mdx
index 052cd2767401..9dfd2f8bbfd3 100644
--- a/website/pages/api-docs/secret/databases/mssql.mdx
+++ b/website/pages/api-docs/secret/databases/mssql.mdx
@@ -61,7 +61,7 @@ has a number of parameters to further configure a connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/mysql-maria.mdx b/website/pages/api-docs/secret/databases/mysql-maria.mdx
index 37b6c428c599..051e5f83c150 100644
--- a/website/pages/api-docs/secret/databases/mysql-maria.mdx
+++ b/website/pages/api-docs/secret/databases/mysql-maria.mdx
@@ -39,7 +39,7 @@ has a number of parameters to further configure a connection.
`max_open_connections` it will be reduced to be equal.
- `max_connection_lifetime` `(string: "0s")` - Specifies the maximum amount of
- time a connection may be reused. If <= 0s connections are reused forever.
+ time a connection may be reused. If <= 0s connections are reused forever.
- `username` `(string: "")` - The root credential username used in the connection URL.
@@ -61,7 +61,7 @@ has a number of parameters to further configure a connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/oracle.mdx b/website/pages/api-docs/secret/databases/oracle.mdx
index 4791a6a2bd58..4c5d133413b1 100644
--- a/website/pages/api-docs/secret/databases/oracle.mdx
+++ b/website/pages/api-docs/secret/databases/oracle.mdx
@@ -58,7 +58,7 @@ has a number of parameters to further configure a connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/postgresql.mdx b/website/pages/api-docs/secret/databases/postgresql.mdx
index 1fdb8c62fa02..e42c1e52be85 100644
--- a/website/pages/api-docs/secret/databases/postgresql.mdx
+++ b/website/pages/api-docs/secret/databases/postgresql.mdx
@@ -61,7 +61,7 @@ has a number of parameters to further configure a connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/databases/redshift.mdx b/website/pages/api-docs/secret/databases/redshift.mdx
index ea6404505df5..0ceb20413241 100644
--- a/website/pages/api-docs/secret/databases/redshift.mdx
+++ b/website/pages/api-docs/secret/databases/redshift.mdx
@@ -61,7 +61,7 @@ has a number of parameters to further configure a connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/gcp/index.mdx b/website/pages/api-docs/secret/gcp/index.mdx
index 6a7b4edff8c7..5b1c3f99001e 100644
--- a/website/pages/api-docs/secret/gcp/index.mdx
+++ b/website/pages/api-docs/secret/gcp/index.mdx
@@ -48,7 +48,7 @@ This endpoint configures shared information for the secrets engine.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -75,7 +75,7 @@ account keys.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -92,7 +92,7 @@ Credentials will be omitted from returned data.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -171,7 +171,7 @@ resource "https://selflink/to/my/resource" {
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -192,7 +192,7 @@ old secrets generated by the roleset or fix issues if a roleset's service accoun
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -210,7 +210,7 @@ access tokens. This does not recreate the roleset service account.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -229,7 +229,7 @@ $ curl \
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -264,7 +264,7 @@ $ curl \
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -295,7 +295,7 @@ This endpoint deletes an existing roleset by the given name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -321,7 +321,7 @@ do not apply.
### Sample Request
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -377,14 +377,14 @@ or the system default if config was not defined.
### Sample Request
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
https://127.0.0.1:8200/v1/gcp/key/my-key-roleset
```
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/gcpkms/index.mdx b/website/pages/api-docs/secret/gcpkms/index.mdx
index 73cd85b9a649..ec5f3569f57c 100644
--- a/website/pages/api-docs/secret/gcpkms/index.mdx
+++ b/website/pages/api-docs/secret/gcpkms/index.mdx
@@ -53,7 +53,7 @@ path "gcpkms/config" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -80,7 +80,7 @@ path "gcpkms/config" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -116,7 +116,7 @@ path "gcpkms/config" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -169,7 +169,7 @@ path "gcpkms/decrypt/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -234,7 +234,7 @@ path "gcpkms/encrypt/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -300,7 +300,7 @@ path "gcpkms/reencrypt/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -365,7 +365,7 @@ path "gcpkms/sign/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -433,7 +433,7 @@ path "gcpkms/verify/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -470,7 +470,7 @@ path "gcpkms/keys" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -543,7 +543,7 @@ path "gcpkms/keys/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -571,7 +571,7 @@ path "gcpkms/keys/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -597,7 +597,7 @@ path "gcpkms/keys/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -640,7 +640,7 @@ path "gcpkms/keys/config/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -701,7 +701,7 @@ path "gcpkms/keys/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -728,7 +728,7 @@ path "gcpkms/keys/deregister/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -781,7 +781,7 @@ path "gcpkms/keys/register/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -813,7 +813,7 @@ path "gcpkms/keys/rotate/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -850,7 +850,7 @@ path "gcpkms/keys/trim/my-key" {
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/identity/entity-alias.mdx b/website/pages/api-docs/secret/identity/entity-alias.mdx
index d6ca93300d45..20605278f018 100644
--- a/website/pages/api-docs/secret/identity/entity-alias.mdx
+++ b/website/pages/api-docs/secret/identity/entity-alias.mdx
@@ -42,7 +42,7 @@ This endpoint creates a new alias for an entity.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -75,7 +75,7 @@ This endpoint queries the entity alias by its identifier.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
@@ -136,7 +136,7 @@ This endpoint is used to update an existing entity alias.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -169,7 +169,7 @@ This endpoint deletes an alias from its corresponding entity.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -187,7 +187,7 @@ This endpoint returns a list of available entity aliases by their identifiers.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
diff --git a/website/pages/api-docs/secret/identity/entity.mdx b/website/pages/api-docs/secret/identity/entity.mdx
index 4511ef4003dc..18c86860093a 100644
--- a/website/pages/api-docs/secret/identity/entity.mdx
+++ b/website/pages/api-docs/secret/identity/entity.mdx
@@ -42,7 +42,7 @@ This endpoint creates or updates an Entity.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -75,7 +75,7 @@ This endpoint queries the entity by its identifier.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
@@ -134,7 +134,7 @@ This endpoint is used to update an existing entity.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -167,7 +167,7 @@ This endpoint deletes an entity and all its associated aliases.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -178,8 +178,8 @@ $ curl \
This endpoint deletes all entities provided.
-| Method | Path |
-| :------- | :------------------------ |
+| Method | Path |
+| :----- | :------------------------------ |
| `POST` | `/identity/entity/batch-delete` |
### Parameters
@@ -191,20 +191,20 @@ This endpoint deletes all entities provided.
```json
{
"entity_ids": [
- "02fe5a88-912b-6794-62ed-db873ef86a95",
- "3bf81bc9-44df-8138-57f9-724a9ae36d04",
- "627fba68-98c9-c012-71ba-bfb349585ce1",
- "6c4c805b-b384-3d0e-4d51-44d349887b96",
- "70a72feb-35d1-c775-0813-8efaa8b4b9b5",
- "f1092a67-ce34-48fd-161d-c13a367bc1cd",
- "faedd89a-0d82-c197-c8f9-93a3e6cf0cd0"
- ]
+ "02fe5a88-912b-6794-62ed-db873ef86a95",
+ "3bf81bc9-44df-8138-57f9-724a9ae36d04",
+ "627fba68-98c9-c012-71ba-bfb349585ce1",
+ "6c4c805b-b384-3d0e-4d51-44d349887b96",
+ "70a72feb-35d1-c775-0813-8efaa8b4b9b5",
+ "f1092a67-ce34-48fd-161d-c13a367bc1cd",
+ "faedd89a-0d82-c197-c8f9-93a3e6cf0cd0"
+ ]
}
```
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -223,7 +223,7 @@ This endpoint returns a list of available entities by their identifiers.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -281,7 +281,7 @@ This endpoint is used to create or update an entity by a given name.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -314,7 +314,7 @@ This endpoint queries the entity by its name.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/identity/entity/name/testentityname
@@ -359,7 +359,7 @@ entity name.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -377,7 +377,7 @@ This endpoint returns a list of available entities by their names.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -430,7 +430,7 @@ This endpoint merges many entities into one entity.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/identity/group-alias.mdx b/website/pages/api-docs/secret/identity/group-alias.mdx
index 41c57b6adc80..506a19dc4943 100644
--- a/website/pages/api-docs/secret/identity/group-alias.mdx
+++ b/website/pages/api-docs/secret/identity/group-alias.mdx
@@ -39,7 +39,7 @@ This endpoint creates or updates a group alias.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -89,7 +89,7 @@ This endpoint is used to update an existing group alias.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -122,7 +122,7 @@ This endpoint queries the group alias by its identifier.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
@@ -161,7 +161,7 @@ This endpoint deletes a group alias.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -179,7 +179,7 @@ This endpoint returns a list of available group aliases by their identifiers.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
diff --git a/website/pages/api-docs/secret/identity/group.mdx b/website/pages/api-docs/secret/identity/group.mdx
index 155161e07efa..59d5550ccbb9 100644
--- a/website/pages/api-docs/secret/identity/group.mdx
+++ b/website/pages/api-docs/secret/identity/group.mdx
@@ -47,7 +47,7 @@ This endpoint creates or updates a Group.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -80,7 +80,7 @@ This endpoint queries the group by its identifier.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
@@ -150,7 +150,7 @@ This endpoint is used to update an existing group.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -183,7 +183,7 @@ This endpoint deletes a group.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -201,7 +201,7 @@ This endpoint returns a list of available groups by their identifiers.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -264,7 +264,7 @@ This endpoint is used to create or update a group by its name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -302,7 +302,7 @@ This endpoint queries the group by its name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/identity/group/name/testgroupname
@@ -345,7 +345,7 @@ This endpoint deletes a group, given its name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -363,7 +363,7 @@ This endpoint returns a list of available groups by their names.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
diff --git a/website/pages/api-docs/secret/identity/lookup.mdx b/website/pages/api-docs/secret/identity/lookup.mdx
index 952575b30dab..5d3facb4a326 100644
--- a/website/pages/api-docs/secret/identity/lookup.mdx
+++ b/website/pages/api-docs/secret/identity/lookup.mdx
@@ -41,7 +41,7 @@ be `name`, `id`, `alias_id`, or a combination of `alias_name` and
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -103,7 +103,7 @@ be `name`, `id`, `alias_id`, or a combination of `alias_name` and
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/identity/tokens.mdx b/website/pages/api-docs/secret/identity/tokens.mdx
index b4f1cbfc6898..2b5198c9122d 100644
--- a/website/pages/api-docs/secret/identity/tokens.mdx
+++ b/website/pages/api-docs/secret/identity/tokens.mdx
@@ -29,7 +29,7 @@ This endpoint updates configurations for OIDC-compliant identity tokens issued b
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -58,7 +58,7 @@ This endpoint queries vault identity tokens configurations.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -106,7 +106,7 @@ This endpoint creates or updates a named key which is used by a role to sign tok
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -128,7 +128,7 @@ This endpoint queries a named key and returns its configurations.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -161,7 +161,7 @@ This endpoint deletes a named key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -178,7 +178,7 @@ This endpoint will List all named keys.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -219,7 +219,7 @@ This endpoint rotates a named key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -258,7 +258,7 @@ Create or update a role. ID tokens are generated against a role and signed again
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -280,7 +280,7 @@ This endpoint queries a role and returs its configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -314,7 +314,7 @@ This endpoint deletes a role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -331,7 +331,7 @@ This endpoint will list all signing keys.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -362,7 +362,7 @@ Use this endpoint to generate a signed ID (OIDC) token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -406,7 +406,7 @@ This endpoint can verify the authenticity and active state of a signed ID token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -432,7 +432,7 @@ Query this path to retrieve a set of claims about the identity tokens' configura
### Sample Request
-```
+```shell-session
$ curl \
--request GET \
http://127.0.0.1:8200/v1/identity/oidc/.well-known/openid-configuration
@@ -461,7 +461,7 @@ Query this path to retrieve the public portion of named keys. Clients can use th
### Sample Request
-```
+```shell-session
$ curl \
--request GET \
http://127.0.0.1:8200/v1/identity/oidc/.well-known/keys
diff --git a/website/pages/api-docs/secret/kmip/index.mdx b/website/pages/api-docs/secret/kmip/index.mdx
index 077054864f9a..159a025acc0e 100644
--- a/website/pages/api-docs/secret/kmip/index.mdx
+++ b/website/pages/api-docs/secret/kmip/index.mdx
@@ -77,7 +77,7 @@ server will be restarted using the new settings.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -93,7 +93,7 @@ $ curl \
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -130,7 +130,7 @@ been written.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -161,7 +161,7 @@ Creates a new scope with the given name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -178,7 +178,7 @@ List existing scopes.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -213,7 +213,7 @@ Delete a scope by name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -233,9 +233,9 @@ Creates or updates a role.
- `scope` (`string: `) - Name of scope. This is part of the request URL.
- `role` (`string: `) - Name of role. This is part of the request URL.
- `tls_client_key_type` (`string`): - Client certificate key type,
- `rsa` or `ec`. Overrides engine-wide default managed in `config` endpoint.
+ `rsa` or `ec`. Overrides engine-wide default managed in `config` endpoint.
- `tls_client_key_bits` (`int`): - Client certificate key bits, valid
- values depend on key type. Overrides engine-wide default managed in `config`
+ values depend on key type. Overrides engine-wide default managed in `config`
endpoint.
- `tls_client_ttl` (`int or string`) – Client certificate
TTL in either an integer number of seconds (10) or an integer time unit (10s).
@@ -292,7 +292,7 @@ Creates or updates a role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -315,7 +315,7 @@ Read a role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -357,7 +357,7 @@ List roles with a scope.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -389,7 +389,7 @@ Delete a role by name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -413,7 +413,7 @@ Create a new client certificate tied to the given role and scope.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -455,7 +455,7 @@ at generation time.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -492,7 +492,7 @@ List the serial numbers of all certificates within a role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -536,7 +536,7 @@ Delete a certificate, thereby revoking it.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/kv/kv-v1.mdx b/website/pages/api-docs/secret/kv/kv-v1.mdx
index 0f716e958cb5..9346a6c35025 100644
--- a/website/pages/api-docs/secret/kv/kv-v1.mdx
+++ b/website/pages/api-docs/secret/kv/kv-v1.mdx
@@ -30,7 +30,7 @@ This endpoint retrieves the secret at the specified location.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/secret/my-secret
@@ -76,7 +76,7 @@ this command.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -135,7 +135,7 @@ policy granting the `update` capability.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -158,7 +158,7 @@ This endpoint deletes the secret at the specified location.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/secret/kv/kv-v2.mdx b/website/pages/api-docs/secret/kv/kv-v2.mdx
index 30d1e59cb92c..11ae29edb6d4 100644
--- a/website/pages/api-docs/secret/kv/kv-v2.mdx
+++ b/website/pages/api-docs/secret/kv/kv-v2.mdx
@@ -54,7 +54,7 @@ key-value store.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -73,7 +73,7 @@ given path.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/secret/config
@@ -108,7 +108,7 @@ This endpoint retrieves the secret at the specified location.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/secret/data/my-secret?version=2
@@ -172,7 +172,7 @@ have an ACL policy granting the `update` capability.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -211,7 +211,7 @@ delete can be undone using the `undelete` path.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -247,7 +247,7 @@ but the underlying data will not be removed. A delete can be undone using the
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -282,7 +282,7 @@ This restores the data, allowing it to be returned on get requests.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -317,7 +317,7 @@ numbers from the key-value store.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -344,7 +344,7 @@ this command.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -381,7 +381,7 @@ specified path.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/secret/metadata/my-secret
@@ -459,7 +459,7 @@ have an ACL policy granting the `update` capability.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -483,7 +483,7 @@ specified key. All version history will be removed.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/secret/mongodbatlas/index.mdx b/website/pages/api-docs/secret/mongodbatlas/index.mdx
index 112621a8d443..d17227e7099e 100644
--- a/website/pages/api-docs/secret/mongodbatlas/index.mdx
+++ b/website/pages/api-docs/secret/mongodbatlas/index.mdx
@@ -18,10 +18,9 @@ Private Key is returned to the caller. To learn more about Programmatic API Keys
In addition to the parameters defined by the Secrets Engines Backend, this plugin has a number of parameters to further configure a connection.
-| Method | Path |
-| :--------| :--------------------------- |
-| `POST` | `/mongodbatlas/config` |
-
+| Method | Path |
+| :----- | :--------------------- |
+| `POST` | `/mongodbatlas/config` |
### Parameters
@@ -38,7 +37,8 @@ In addition to the parameters defined by the Secrets Engines Backend, this plugi
```
### Sample Request
-```bash
+
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -47,13 +47,13 @@ $ curl \
```
## Create/Update Programmatic API Key role
+
Programmatic API Key credential types create a Vault role to generate a Programmatic API Key at
either the MongoDB Atlas Organization or Project level with the designated role(s) for programmatic access. If a role with the name does not exist, it will be created. If the role exists, it will be updated with the new attributes.
-| Method | Path |
-| :------- | :----------------- |
-| `POST` | `/roles/:name` |
-
+| Method | Path |
+| :----- | :------------- |
+| `POST` | `/roles/:name` |
### Parameters
@@ -66,6 +66,7 @@ either the MongoDB Atlas Organization or Project level with the designated role(
-> **NOTE:** Include all roles that you want this API Key to have. Any roles not in this array are removed.
- The Organization roles are:
+
- `ORG_OWNER`
- `ORG_MEMBER`
- `ORG_GROUP_CREATOR`
@@ -81,9 +82,8 @@ either the MongoDB Atlas Organization or Project level with the designated role(
- `GROUP_OWNER`
- `GROUP_READ_ONLY`
-
-- `ip_addresses` `(list [string] )` - IP address to be added to the whitelist for the API key. This field is mutually exclusive with the cidrBlock field.
-- `cidr_blocks` `(list [string] )` - Whitelist entry in CIDR notation to be added for the API key. This field is mutually exclusive with the ipAddress field.
+* `ip_addresses` `(list [string] )` - IP address to be added to the whitelist for the API key. This field is mutually exclusive with the cidrBlock field.
+* `cidr_blocks` `(list [string] )` - Whitelist entry in CIDR notation to be added for the API key. This field is mutually exclusive with the ipAddress field.
### Sample Payload
@@ -96,7 +96,7 @@ either the MongoDB Atlas Organization or Project level with the designated role(
}
```
-```bash
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -105,6 +105,7 @@ $ curl \
```
### Sample Response
+
```json
{
"project_id": "5cf5a45a9ccf6400e60981b6",
@@ -119,10 +120,9 @@ $ curl \
## Read Programmatic API Key role
-| Method | Path |
-| :------- | :----------------- |
-| `GET` | `/roles/:name` |
-
+| Method | Path |
+| :----- | :------------- |
+| `GET` | `/roles/:name` |
### Parameters
@@ -130,7 +130,7 @@ $ curl \
### Sample Payload
-```bash
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -139,6 +139,7 @@ $ curl \
```
### Sample Response
+
```json
{
"project_id": "5cf5a45a9ccf6400e60981b6",
@@ -153,14 +154,13 @@ $ curl \
## List Programmatic API Key role
-| Method | Path |
-| :------- | :----------- |
-| `GET` | `/roles` |
-
+| Method | Path |
+| :----- | :------- |
+| `GET` | `/roles` |
### Sample Payload
-```bash
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -169,6 +169,7 @@ $ curl \
```
### Sample Response
+
```json
[
{
@@ -190,15 +191,13 @@ $ curl \
"max_ttl": "1h"
}
]
-
```
## Delete Programmatic API Key role
-| Method | Path |
-| :--------- | :----------------- |
-| `DELETE` | `/roles/:name` |
-
+| Method | Path |
+| :------- | :------------- |
+| `DELETE` | `/roles/:name` |
### Parameters
@@ -206,7 +205,7 @@ $ curl \
### Sample Payload
-```bash
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -216,22 +215,24 @@ $ curl \
## Read Credential
-| Method | Path |
-| :------- | :----------------- |
-| `GET` | `/creds/:name` |
+| Method | Path |
+| :----- | :------------- |
+| `GET` | `/creds/:name` |
### Parameters
+
- `name` `(string )` - Unique identifier name of the credential
### Sample Request
-```bash
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/mongodbatlas/creds/0fLBv1c2YDzPlJB1PwsRRKHR
```
### Sample Response
+
```json
{
"lease_duration": "20s",
diff --git a/website/pages/api-docs/secret/nomad/index.mdx b/website/pages/api-docs/secret/nomad/index.mdx
index eeb32ffa9e27..ed79c579d1a8 100644
--- a/website/pages/api-docs/secret/nomad/index.mdx
+++ b/website/pages/api-docs/secret/nomad/index.mdx
@@ -64,7 +64,7 @@ Nomad tokens.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--header "X-Vault-Token: ..." \
@@ -82,7 +82,7 @@ This endpoint queries for information about the Nomad connection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/nomad/config/access
@@ -125,7 +125,7 @@ This endpoint configures the lease settings for generated tokens.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -143,7 +143,7 @@ This endpoint queries for information about the Lease TTL for the specified moun
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/nomad/config/lease
@@ -168,7 +168,7 @@ This endpoint deletes the lease configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -208,7 +208,7 @@ To create a client token with a custom policy:
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--header "X-Vault-Token: ..." \
@@ -232,7 +232,7 @@ If no role exists with that name, a 404 is returned.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/nomad/role/monitoring
@@ -261,7 +261,7 @@ This endpoint lists all existing roles in the backend.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -294,7 +294,7 @@ not exist, this endpoint will still return a successful response.
### Sample Request
-```
+```shell-session
$ curl \
--request DELETE \
--header "X-Vault-Token: ..." \
@@ -317,7 +317,7 @@ definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/nomad/creds/example
diff --git a/website/pages/api-docs/secret/openldap/index.mdx b/website/pages/api-docs/secret/openldap/index.mdx
index 37de6cb324f8..2130ba7ba252 100644
--- a/website/pages/api-docs/secret/openldap/index.mdx
+++ b/website/pages/api-docs/secret/openldap/index.mdx
@@ -18,14 +18,14 @@ update your API calls accordingly.
## Configuration Management
| Method | Path |
-| :----- | :----------------- |
+| :------- | :----------------- |
| `POST` | `/openldap/config` |
| `GET` | `/openldap/config` |
| `DELETE` | `/openldap/config` |
This endpoint configures the OpenLDAP secret engine to managed user entries.
-Note: the OpenLDAP entry used by `config` should have the necessary privileges
+Note: the OpenLDAP entry used by `config` should have the necessary privileges
to search and change entry passwords in OpenLDAP.
### Parameters
@@ -33,8 +33,8 @@ to search and change entry passwords in OpenLDAP.
- `binddn` `(string: )` - Distinguished name (DN) of object to bind for managing user entries. Example: `cn=vault,ou=Users,dc=hashicorp,dc=com`
- `bindpass` `(string: )` - Password to use along with `binddn` for managing user entries.
- `url` `(string: )` - The LDAP server to connect to. Examples: `ldaps://ldap.myorg.com`, `ldaps://ldap.myorg.com:636`. This can also be a comma-delineated list of URLs, e.g. `ldaps://ldap.myorg.com,ldaps://ldap.myorg.com:636`, in which case the servers will be tried in-order if there are errors during the connection process. Default is `ldap://127.0.0.1`.
-- `length` `(int: 64)` - The length of generated password strings. Note: some schemas may require shorter password lengths (such as `racf`).
-- `schema` `(string: "openldap")` - The OpenLDAP schema to use when storing entry passwords. Valid schemas include: `openldap` and `racf`.
+- `length` `(int: 64)` - The length of generated password strings. Note: some schemas may require shorter password lengths (such as `racf`).
+- `schema` `(string: "openldap")` - The OpenLDAP schema to use when storing entry passwords. Valid schemas include: `openldap` and `racf`.
- `request_timeout` `(integer: 90, string: "90s" )` - Timeout, in seconds, for the connection when making requests against the server before returning back an error.
- `starttls` `(bool: )` - If true, issues a `StartTLS` command after establishing an unencrypted connection.
- `insecure_tls` - `(bool: )` - If true, skips LDAP server SSL certificate verification - insecure, use with caution!
@@ -54,7 +54,7 @@ to search and change entry passwords in OpenLDAP.
### Sample POST Request
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -64,7 +64,7 @@ $ curl \
### Sample GET Request
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -97,13 +97,13 @@ The `static-role` endpoint configures Vault to manage the passwords of individua
### Parameters
- `dn` `(string: )` - Distinguished name (DN) of entry Vault should manage. Example: `cn=bob,ou=Users,dc=hashicorp,dc=com`
-- `rotation_period` `(string: )` - How often Vault should rotate the password of the user entry, in seconds. The minimum rotation period is 5 seconds. Example: "5s", "1h".
-- `username` `(string: )` - The name of the user to be used when logging in. This is useful when `dn` isn't used for login purposes (such as SSH). Example: "bob".
+- `rotation_period` `(string: )` - How often Vault should rotate the password of the user entry, in seconds. The minimum rotation period is 5 seconds. Example: "5s", "1h".
+- `username` `(string: )` - The name of the user to be used when logging in. This is useful when `dn` isn't used for login purposes (such as SSH). Example: "bob".
Distinguished name (DN) of entry Vault should manage. Example: `cn=bob,ou=Users,dc=hashicorp,dc=com`
| Method | Path |
-| :----- | :--------------------------------- |
+| :------- | :--------------------------------- |
| `GET` | `/openldap/static-role` |
| `GET` | `/openldap/static-role/:role_name` |
| `POST` | `/openldap/static-role/:role_name` |
@@ -121,7 +121,7 @@ Distinguished name (DN) of entry Vault should manage. Example: `cn=bob,ou=Users,
### Sample POST Request
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -131,7 +131,7 @@ $ curl \
### Sample GET Request
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -167,7 +167,7 @@ The `static-cred` endpoint offers the credential information for a given static-
### Sample Get Request
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -189,15 +189,15 @@ $ curl \
## Rotate Root Password
-The `rotate-root` endpoint offers password rotation for the `binddn` entry used to manage OpenLDAP. This generated password will only be known to Vault and will not be retrievable once rotated.
+The `rotate-root` endpoint offers password rotation for the `binddn` entry used to manage OpenLDAP. This generated password will only be known to Vault and will not be retrievable once rotated.
| Method | Path |
| :----- | :---------------------- |
-| `POST` | `/openldap/rotate-root` |
+| `POST` | `/openldap/rotate-root` |
### Sample Request
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -208,13 +208,13 @@ $ curl \
The `rotate-role` endpoint offers manual rotation of static roles.
-| Method | Path |
-| :----- | :---------------------- |
-| `POST` | `/openldap/rotate-role/:role_name` |
+| Method | Path |
+| :----- | :--------------------------------- |
+| `POST` | `/openldap/rotate-role/:role_name` |
### Sample Request
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/pki/index.mdx b/website/pages/api-docs/secret/pki/index.mdx
index 826d68523d4f..af3e728f05cb 100644
--- a/website/pages/api-docs/secret/pki/index.mdx
+++ b/website/pages/api-docs/secret/pki/index.mdx
@@ -59,14 +59,14 @@ This is an unauthenticated endpoint.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/pki/ca/pem
```
### Sample Response
-```
+```text
```
@@ -84,14 +84,14 @@ This is an unauthenticated endpoint.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/pki/ca_chain
```
### Sample Response
-```
+```text
```
@@ -118,7 +118,7 @@ This is an unauthenticated endpoint.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/pki/cert/crl
```
@@ -143,7 +143,7 @@ This endpoint returns a list of the current certificates by serial number only.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -193,7 +193,7 @@ certificate and key, they will be overridden._
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -221,7 +221,7 @@ marked valid.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/pki/config/crl
@@ -274,7 +274,7 @@ the CRL.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -292,7 +292,7 @@ This endpoint fetches the URLs to be encoded in generated certificates.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/pki/config/urls
@@ -349,7 +349,7 @@ parameter.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -373,7 +373,7 @@ This is an unauthenticated endpoint.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/pki/crl/pem
```
@@ -397,7 +397,7 @@ certificates being revoked.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/pki/crl/rotate
@@ -517,7 +517,7 @@ can be set in a CSR are supported.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -569,7 +569,7 @@ hints on submitting.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -648,7 +648,7 @@ need to request a new certificate.**
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -703,7 +703,7 @@ successful revocation will rotate the CRL.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -911,7 +911,7 @@ request is denied.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -934,7 +934,7 @@ This endpoint queries the role definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/pki/roles/my-role
@@ -977,7 +977,7 @@ returned, not any values.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -1014,7 +1014,7 @@ revoke certificates previously issued under this role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -1146,7 +1146,7 @@ overwrite the existing cert/key with new values.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1182,7 +1182,7 @@ _This endpoint requires sudo/root privileges._
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -1304,7 +1304,7 @@ verbatim.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1367,7 +1367,7 @@ This endpoint requires `sudo` capability.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1528,7 +1528,7 @@ have access.**
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1592,7 +1592,7 @@ expiration time.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/rabbitmq/index.mdx b/website/pages/api-docs/secret/rabbitmq/index.mdx
index 6c441c66fcb6..d754c666ee1d 100644
--- a/website/pages/api-docs/secret/rabbitmq/index.mdx
+++ b/website/pages/api-docs/secret/rabbitmq/index.mdx
@@ -50,7 +50,7 @@ RabbitMQ.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -83,7 +83,7 @@ This endpoint configures the lease settings for generated credentials.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -124,7 +124,7 @@ This endpoint creates or updates the role definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -147,7 +147,7 @@ This endpoint queries the role definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
@@ -180,7 +180,7 @@ This endpoint deletes the role definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -203,7 +203,7 @@ role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/rabbitmq/creds/my-role
diff --git a/website/pages/api-docs/secret/ssh/index.mdx b/website/pages/api-docs/secret/ssh/index.mdx
index 90499edd7dc6..e241936bb318 100644
--- a/website/pages/api-docs/secret/ssh/index.mdx
+++ b/website/pages/api-docs/secret/ssh/index.mdx
@@ -41,7 +41,7 @@ This endpoint creates or updates a named key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -64,7 +64,7 @@ This endpoint deletes a named key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -136,7 +136,7 @@ This endpoint creates or updates a named role.
credentials for all other usernames in this list. Use with caution. N.B.: if
the type is `ca`, an empty list does not allow any user; instead you must use
`*` to enable this behavior.
-
+
- `allowed_users_template` `(bool: false)` - If set, allowed_users can be specified
using identity template policies. Non-templated users are also permitted.
@@ -221,7 +221,7 @@ This endpoint creates or updates a named role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -244,7 +244,7 @@ This endpoint queries a named role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/ssh/roles/my-role
@@ -305,7 +305,7 @@ returned, not any values.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -349,7 +349,7 @@ This endpoint deletes a named role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -367,7 +367,7 @@ This endpoint returns the list of configured zero-address roles.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/ssh/config/zeroaddress
@@ -412,7 +412,7 @@ This endpoint configures zero-address roles.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -430,7 +430,7 @@ This endpoint deletes the zero-address roles configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -465,7 +465,7 @@ parameters defined in the given role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -541,7 +541,7 @@ This endpoint lists all of the roles with which the given IP is associated.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -593,7 +593,7 @@ endpoint.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -649,7 +649,7 @@ overridden._
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -685,7 +685,7 @@ This endpoint deletes the CA information for the backend via an SSH key pair.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -703,7 +703,7 @@ endpoint.
### Sample Request
-```
+```shell-session
$ curl http://127.0.0.1:8200/v1/ssh/public_key
```
@@ -723,7 +723,7 @@ This endpoint reads the configured/generated public key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/ssh/config/ca
@@ -790,7 +790,7 @@ to the restrictions contained in the role named in the endpoint.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/totp/index.mdx b/website/pages/api-docs/secret/totp/index.mdx
index 1e441200fcf6..26ad9ec2f220 100644
--- a/website/pages/api-docs/secret/totp/index.mdx
+++ b/website/pages/api-docs/secret/totp/index.mdx
@@ -61,7 +61,7 @@ This endpoint creates or updates a key definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -81,7 +81,7 @@ $ curl \
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -120,7 +120,7 @@ This endpoint queries the key definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/totp/keys/my-key
@@ -151,7 +151,7 @@ returned, not any values.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -187,7 +187,7 @@ This endpoint deletes the key definition.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -210,7 +210,7 @@ key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/totp/code/my-key
@@ -251,7 +251,7 @@ key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/transform/index.mdx b/website/pages/api-docs/secret/transform/index.mdx
index 527ac85a336e..2ff734fea684 100644
--- a/website/pages/api-docs/secret/transform/index.mdx
+++ b/website/pages/api-docs/secret/transform/index.mdx
@@ -25,10 +25,9 @@ updated with the new attributes.
| :----- | :---------------------- |
| `POST` | `/transform/role/:name` |
-
### Parameters
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the role to create. This is part of the request URL.
- `transformations` (`list: []`) -
@@ -38,16 +37,13 @@ updated with the new attributes.
```json
{
- "transformations": [
- "creditcard-fpe",
- "creditcard-masking"
- ]
+ "transformations": ["creditcard-fpe", "creditcard-masking"]
}
```
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -59,18 +55,18 @@ $ curl \
This endpoint queries an existing role by the given name.
-| Method | Path |
-| :----- | :----------------------- |
+| Method | Path |
+| :----- | :---------------------- |
| `GET` | `/transform/role/:name` |
### Parameters
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the role to read. This is part of the request URL.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/transform/role/example-role
@@ -81,10 +77,7 @@ $ curl \
```json
{
"data": {
- "transformations": [
- "creditcard-fpe",
- "creditcard-masking"
- ]
+ "transformations": ["creditcard-fpe", "creditcard-masking"]
}
}
```
@@ -93,13 +86,13 @@ $ curl \
This endpoint lists all existing roles in the secrets engine.
-| Method | Path |
-| :----- | :----------------- |
-| `LIST` | `/transform/role` |
+| Method | Path |
+| :----- | :---------------- |
+| `LIST` | `/transform/role` |
### Sample Request
-```shell
+```shell-session
$ curl
--header "X-Vault-Token: ..." \
--request LIST \
@@ -111,9 +104,7 @@ $ curl
```json
{
"data": {
- "keys": [
- "example-role"
- ]
+ "keys": ["example-role"]
}
}
```
@@ -128,12 +119,12 @@ This endpoint deletes an existing role by the given name.
### Parameters
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the role to delete. This is part of the request URL.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -152,7 +143,7 @@ transformation exists, it will be updated with the new attributes.
### Parameters
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the transformation to create or update. This is part of
the request URL.
@@ -186,15 +177,13 @@ transformation exists, it will be updated with the new attributes.
"type": "fpe",
"template": "builtin/creditcardnumber",
"tweak_source": "internal",
- "allowed_roles": [
- "example-role"
- ]
+ "allowed_roles": ["example-role"]
}
```
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -210,12 +199,12 @@ This endpoint queries an existing transformation by the given name.
| :----- | :-------------------------------- |
| `GET` | `/transform/transformation/:name` |
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the role to read. This is part of the request URL.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/transform/transformation/example-transformation
@@ -226,12 +215,8 @@ $ curl \
```json
{
"data": {
- "allowed_roles": [
- "example-role"
- ],
- "templates": [
- "builtin/creditcardnumber"
- ],
+ "allowed_roles": ["example-role"],
+ "templates": ["builtin/creditcardnumber"],
"tweak_source": "internal",
"type": "fpe"
}
@@ -242,13 +227,13 @@ $ curl \
This endpoint lists all existing transformations in the secrets engine.
-| Method | Path |
-| :----- | :--------------------------- |
-| `LIST` | `/transform/transformation` |
+| Method | Path |
+| :----- | :-------------------------- |
+| `LIST` | `/transform/transformation` |
### Sample Request
-```shell
+```shell-session
$ curl
--header "X-Vault-Token: ..." \
--request LIST \
@@ -260,9 +245,7 @@ $ curl
```json
{
"data": {
- "keys": [
- "example-transformation"
- ]
+ "keys": ["example-transformation"]
}
}
```
@@ -277,13 +260,13 @@ This endpoint deletes an existing transformation by the given name.
### Parameters
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the transformation to delete. This is part of the
request URL.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -296,13 +279,13 @@ This endpoint creates or updates a template with the given `name`. If a
template with the name does not exist, it will be created. If the
template exists, it will be updated with the new attributes.
-| Method | Path |
-| :----- | :-------------------------------- |
-| `POST` | `/transform/template/:name` |
+| Method | Path |
+| :----- | :-------------------------- |
+| `POST` | `/transform/template/:name` |
### Parameters
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the template to create. This is part of the
request URL.
@@ -332,7 +315,7 @@ template exists, it will be updated with the new attributes.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -344,16 +327,16 @@ $ curl \
This endpoint queries an existing template by the given name.
-| Method | Path |
-| :----- | :-------------------------------- |
-| `GET` | `/transform/template/:name` |
+| Method | Path |
+| :----- | :-------------------------- |
+| `GET` | `/transform/template/:name` |
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the role to read. This is part of the request URL.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/transform/template/example-template
@@ -375,13 +358,13 @@ $ curl \
This endpoint lists all existing templates in the secrets engine.
-| Method | Path |
-| :----- | :--------------------------- |
-| `LIST` | `/transform/template` |
+| Method | Path |
+| :----- | :-------------------- |
+| `LIST` | `/transform/template` |
### Sample Request
-```shell
+```shell-session
$ curl
--header "X-Vault-Token: ..." \
--request LIST \
@@ -393,9 +376,7 @@ $ curl
```json
{
"data": {
- "keys": [
- "example-template"
- ]
+ "keys": ["example-template"]
}
}
```
@@ -404,19 +385,19 @@ $ curl
This endpoint deletes an existing template by the given name.
-| Method | Path |
-| :------- | :-------------------------------- |
-| `DELETE` | `/transform/template/:name` |
+| Method | Path |
+| :------- | :-------------------------- |
+| `DELETE` | `/transform/template/:name` |
### Parameters
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the template to delete. This is part of the
request URL.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -429,17 +410,17 @@ This endpoint creates or updates an alphabet with the given `name`. If an
alphabet with the name does not exist, it will be created. If the
alphabet exists, it will be updated with the new attributes.
-| Method | Path |
-| :----- | :-------------------------------- |
-| `POST` | `/transform/alphabet/:name` |
+| Method | Path |
+| :----- | :-------------------------- |
+| `POST` | `/transform/alphabet/:name` |
### Parameters
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the transformation to create. This is part of the
request URL.
-- `alphabet` `(string: )` –
+- `alphabet` `(string: )` –
Specifies the set of characters that can exist within the provided value
and the encoded or decoded value for a FPE transformation.
@@ -453,7 +434,7 @@ alphabet exists, it will be updated with the new attributes.
### Sample Request
-```text
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -465,16 +446,16 @@ $ curl \
This endpoint queries an existing alphabet by the given name.
-| Method | Path |
-| :----- | :-------------------------------- |
-| `GET` | `/transform/alphabet/:name` |
+| Method | Path |
+| :----- | :-------------------------- |
+| `GET` | `/transform/alphabet/:name` |
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the role to read. This is part of the request URL.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/transform/alphabet/example-alphabet
@@ -494,13 +475,13 @@ $ curl \
This endpoint lists all existing alphabets in the secrets engine.
-| Method | Path |
-| :----- | :--------------------------- |
-| `LIST` | `/transform/alphabet` |
+| Method | Path |
+| :----- | :-------------------- |
+| `LIST` | `/transform/alphabet` |
### Sample Request
-```shell
+```shell-session
$ curl
--header "X-Vault-Token: ..." \
--request LIST \
@@ -512,9 +493,7 @@ $ curl
```json
{
"data": {
- "keys": [
- "example-alphabet"
- ]
+ "keys": ["example-alphabet"]
}
}
```
@@ -523,18 +502,18 @@ $ curl
This endpoint deletes an existing alphabet by the given name.
-| Method | Path |
-| :------- | :-------------------------------- |
-| `DELETE` | `/transform/alphabet/:name` |
+| Method | Path |
+| :------- | :-------------------------- |
+| `DELETE` | `/transform/alphabet/:name` |
### Parameters
-- `name` `(string: )` –
+- `name` `(string: )` –
Specifies the name of the alphabet to delete. This is part of the request URL.
### Sample Request
-```shell
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -549,7 +528,6 @@ This endpoint encodes the provided value using a named role.
| :----- | :----------------------------- |
| `POST` | `/transform/encode/:role_name` |
-
### Parameters
- `role_name` `(string: )` –
@@ -570,23 +548,23 @@ This endpoint encodes the provided value using a named role.
transformations with `supplied` as the tweak source.
- `batch_input` `(array: nil)` -
- Specifies a list of items to be encoded in a single batch. When this
- parameter is set, the 'value', 'transformation' and 'tweak' parameters are
- ignored. Instead, the aforementioned parameters should be provided within
- each object in the list.
-
- ```json
- [
- {
- "value": "1111-1111-1111-1111",
- "transformation": "ccn-fpe"
- },
- {
- "value": "2222-2222-2222-2222",
- "transformation": "ccn-masking"
- }
- ]
- ```
+ Specifies a list of items to be encoded in a single batch. When this
+ parameter is set, the 'value', 'transformation' and 'tweak' parameters are
+ ignored. Instead, the aforementioned parameters should be provided within
+ each object in the list.
+
+ ```json
+ [
+ {
+ "value": "1111-1111-1111-1111",
+ "transformation": "ccn-fpe"
+ },
+ {
+ "value": "2222-2222-2222-2222",
+ "transformation": "ccn-masking"
+ }
+ ]
+ ```
**NOTE:** The response payload may return a tweak along with the encoded value
if the `tweak_source` for the specified transformation is set to `generated`.
@@ -604,7 +582,7 @@ when decrypting the encoded value.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -630,7 +608,6 @@ This endpoint decodes the provided value using a named role.
| :----- | :----------------------------- |
| `POST` | `/transform/decode/:role_name` |
-
### Parameters
- `role_name` `(string: )` –
@@ -651,19 +628,20 @@ This endpoint decodes the provided value using a named role.
transformations with `supplied` or `generated` as the tweak source.
- `batch_input` `(array: nil)` -
- Specifies a list of items to be decoded in a single batch. When this
- parameter is set, the 'value', 'transformation' and 'tweak' parameters are
- ignored. Instead, the aforementioned parameters should be provided within
- each object in the list.
-
- ```json
- [
- {
- "value": "5682-4613-6822-8064",
- "transformation": "ccn-fpe"
- }
- ]
- ```
+ Specifies a list of items to be decoded in a single batch. When this
+ parameter is set, the 'value', 'transformation' and 'tweak' parameters are
+ ignored. Instead, the aforementioned parameters should be provided within
+ each object in the list.
+
+ ```json
+ [
+ {
+ "value": "5682-4613-6822-8064",
+ "transformation": "ccn-fpe"
+ }
+ ]
+ ```
+
### Sample Payload
```json
@@ -675,7 +653,7 @@ This endpoint decodes the provided value using a named role.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/secret/transit/index.mdx b/website/pages/api-docs/secret/transit/index.mdx
index b76f1cc14809..148fd498b6e9 100644
--- a/website/pages/api-docs/secret/transit/index.mdx
+++ b/website/pages/api-docs/secret/transit/index.mdx
@@ -76,7 +76,7 @@ values set here cannot be changed after key creation.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -103,7 +103,7 @@ type.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/transit/keys/my-key
@@ -144,7 +144,7 @@ actual keys themselves).
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -182,7 +182,7 @@ catastrophic operation, the `deletion_allowed` tunable must be set in the key's
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -232,7 +232,7 @@ are returned during a read operation on the named key.)
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -254,7 +254,7 @@ decryption operations.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -292,7 +292,7 @@ be valid.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/transit/export/encryption-key/my-key/1
@@ -389,7 +389,7 @@ mechanism for this data as part of a JSON payload is to base64-encode it.
Fist, encode the plaintext with base64:
-```sh
+```shell-session
$ base64 <<< "the quick brown fox"
dGhlIHF1aWNrIGJyb3duIGZveAo=
```
@@ -406,7 +406,7 @@ Use the base64-encoded plaintext in the payload:
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -475,7 +475,7 @@ This endpoint decrypts the provided ciphertext using the named key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -550,7 +550,7 @@ functionality to untrusted users or scripts.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -614,7 +614,7 @@ then made available to trusted users.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -659,7 +659,7 @@ This endpoint returns high-quality random bytes of the specified length.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -711,7 +711,7 @@ algorithm.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -783,7 +783,7 @@ be used.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -882,14 +882,15 @@ supports signing.
- `sha2-512`
~> ** Warning:** `sha1` should be considered a compromised algorithm and used
- only for legacy applications. Signing using SHA-1 can be blocked by operators by
+ only for legacy applications. Signing using SHA-1 can be blocked by operators by
assigning the following policy corresponding to a named key:
```
- path "/transit/sign/:name/sha1" {
- capabilities = ["deny"]
- }
+ {
+ ]
+ }
```
+
- `input` `(string: "")` – Specifies the **base64 encoded** input data. One of
`input` or `batch_input` must be supplied.
@@ -942,7 +943,7 @@ supports signing.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1035,14 +1036,14 @@ data.
- `sha2-512`
~> ** Warning:** `sha1` should be considered a compromised algorithm. Signatures
- verified using the algorithm could be forgeries. Verification using SHA-1 can
- be blocked by operators by assigning the following policy corresponding to a
+ verified using the algorithm could be forgeries. Verification using SHA-1 can
+ be blocked by operators by assigning the following policy corresponding to a
named key:
```
- path "/transit/verify/:name/sha1" {
- capabilities = ["deny"]
- }
+ {
+ ]
+ }
```
- `input` `(string: "")` – Specifies the **base64 encoded** input data. One of
@@ -1105,7 +1106,7 @@ data.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1193,7 +1194,7 @@ restore the key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/transit/backup/aes
@@ -1243,7 +1244,7 @@ name first to verify that the operation successfully completes.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1279,7 +1280,7 @@ keyring. Once trimmed, previous versions of the key cannot be recovered.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -1313,7 +1314,7 @@ using the [`/sys/plugins/reload/backend`][sys-plugin-reload-backend] endpoint.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..."
--request POST \
@@ -1331,7 +1332,7 @@ This endpoint retrieves configurations for the transit engine's cache.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..."
--request GET \
diff --git a/website/pages/api-docs/system/audit-hash.mdx b/website/pages/api-docs/system/audit-hash.mdx
index fb907c4b01db..97149fc784fc 100644
--- a/website/pages/api-docs/system/audit-hash.mdx
+++ b/website/pages/api-docs/system/audit-hash.mdx
@@ -46,7 +46,7 @@ should also be base64-encoded to supply into the `input` parameter.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/audit.mdx b/website/pages/api-docs/system/audit.mdx
index c4e4e0535ad2..e0fbdc65669d 100644
--- a/website/pages/api-docs/system/audit.mdx
+++ b/website/pages/api-docs/system/audit.mdx
@@ -25,7 +25,7 @@ available audit devices).
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/audit
@@ -89,7 +89,7 @@ relevant functionality is only supported in Vault Enterprise:
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -115,7 +115,7 @@ This endpoint disables the audit device at the given path.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/auth.mdx b/website/pages/api-docs/system/auth.mdx
index ffe0afcfb63c..8815c014678d 100644
--- a/website/pages/api-docs/system/auth.mdx
+++ b/website/pages/api-docs/system/auth.mdx
@@ -21,7 +21,7 @@ This endpoint lists all enabled auth methods.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/auth
@@ -125,7 +125,7 @@ relevant functionality is only supported in Vault Enterprise:
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -151,7 +151,7 @@ This endpoint disables the auth method at the given auth path.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -177,7 +177,7 @@ without `sudo` via `sys/mounts/auth/[auth-path]/tune`._
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/auth/my-auth/tune
@@ -256,7 +256,7 @@ can be achieved without `sudo` via `sys/mounts/auth/[auth-path]/tune`._
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/capabilities-accessor.mdx b/website/pages/api-docs/system/capabilities-accessor.mdx
index 66730ff398f8..d0702def9d89 100644
--- a/website/pages/api-docs/system/capabilities-accessor.mdx
+++ b/website/pages/api-docs/system/capabilities-accessor.mdx
@@ -45,7 +45,7 @@ returned. For backwards compatibility, if a single path is supplied, a
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/capabilities-self.mdx b/website/pages/api-docs/system/capabilities-self.mdx
index f83333d19a67..473f2f94c808 100644
--- a/website/pages/api-docs/system/capabilities-self.mdx
+++ b/website/pages/api-docs/system/capabilities-self.mdx
@@ -41,7 +41,7 @@ returned. For backwards compatibility, if a single path is supplied, a
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/capabilities.mdx b/website/pages/api-docs/system/capabilities.mdx
index ee672a659e05..6f96961715a8 100644
--- a/website/pages/api-docs/system/capabilities.mdx
+++ b/website/pages/api-docs/system/capabilities.mdx
@@ -43,7 +43,7 @@ supplied, a `capabilities` field will also be returned.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/config-auditing.mdx b/website/pages/api-docs/system/config-auditing.mdx
index dd32ed548b30..d1f5d63e6dee 100644
--- a/website/pages/api-docs/system/config-auditing.mdx
+++ b/website/pages/api-docs/system/config-auditing.mdx
@@ -22,7 +22,7 @@ This endpoint lists the request headers that are configured to be audited.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers
@@ -58,7 +58,7 @@ This endpoint lists the information for the given request header.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
@@ -100,7 +100,7 @@ This endpoint enables auditing of a header.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -121,7 +121,7 @@ This endpoint disables auditing of the given request header.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/config-control-group.mdx b/website/pages/api-docs/system/config-control-group.mdx
index eae75d2881f1..675b6f5c2141 100644
--- a/website/pages/api-docs/system/config-control-group.mdx
+++ b/website/pages/api-docs/system/config-control-group.mdx
@@ -22,7 +22,7 @@ This endpoint returns the current Control Group configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/config/control-group
@@ -58,7 +58,7 @@ This endpoint allows configuring control groups.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -76,7 +76,7 @@ This endpoint removes any control group configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/config-cors.mdx b/website/pages/api-docs/system/config-cors.mdx
index 61b223744b97..58abe810aa58 100644
--- a/website/pages/api-docs/system/config-cors.mdx
+++ b/website/pages/api-docs/system/config-cors.mdx
@@ -24,7 +24,7 @@ This endpoint returns the current CORS configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/config/cors
@@ -75,7 +75,7 @@ cross-origin requests, as well as headers that are allowed on cross-origin reque
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -93,7 +93,7 @@ This endpoint removes any CORS configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/config-state.mdx b/website/pages/api-docs/system/config-state.mdx
index 6b739276cbe2..1e42ca33528c 100644
--- a/website/pages/api-docs/system/config-state.mdx
+++ b/website/pages/api-docs/system/config-state.mdx
@@ -24,7 +24,7 @@ that can potentially contain sensitive information, which includes values from
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
'http://127.0.0.1:8200/v1/sys/config/state/sanitized'
diff --git a/website/pages/api-docs/system/config-ui.mdx b/website/pages/api-docs/system/config-ui.mdx
index 24612507b73c..7fc93563730e 100644
--- a/website/pages/api-docs/system/config-ui.mdx
+++ b/website/pages/api-docs/system/config-ui.mdx
@@ -26,7 +26,7 @@ This endpoint returns the given UI header configuration.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/config/ui/headers/X-Custom-Header
@@ -64,7 +64,7 @@ This endpoint allows configuring the values to be returned for the UI header.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -82,7 +82,7 @@ This endpoint removes a UI header.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -99,7 +99,7 @@ This endpoint returns a list of configured UI headers.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
diff --git a/website/pages/api-docs/system/control-group.mdx b/website/pages/api-docs/system/control-group.mdx
index aa6816c68275..12f7e58771d8 100644
--- a/website/pages/api-docs/system/control-group.mdx
+++ b/website/pages/api-docs/system/control-group.mdx
@@ -29,7 +29,7 @@ This endpoint authorizes a control group request.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -69,7 +69,7 @@ This endpoint checks the status of a control group request.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/generate-recovery-token.mdx b/website/pages/api-docs/system/generate-recovery-token.mdx
index c6790e46e125..7c1f2e2b55a4 100644
--- a/website/pages/api-docs/system/generate-recovery-token.mdx
+++ b/website/pages/api-docs/system/generate-recovery-token.mdx
@@ -23,7 +23,7 @@ attempt.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/generate-recovery-token/attempt
```
@@ -76,7 +76,7 @@ recovery token generation attempt can take place at a time.
### Sample Request
-```
+```shell-session
$ curl \
--request PUT \
http://127.0.0.1:8200/v1/sys/generate-recovery-token/attempt
@@ -109,7 +109,7 @@ used.
### Sample Request
-```
+```shell-session
$ curl \
--request DELETE \
http://127.0.0.1:8200/v1/sys/generate-recovery-token/attempt
@@ -147,7 +147,7 @@ only in memory and thus will only be valid until the next restart.
### Sample Request
-```
+```shell-session
$ curl \
--request PUT \
--data @payload.json \
diff --git a/website/pages/api-docs/system/generate-root.mdx b/website/pages/api-docs/system/generate-root.mdx
index 97670739c2ba..19386c149864 100644
--- a/website/pages/api-docs/system/generate-root.mdx
+++ b/website/pages/api-docs/system/generate-root.mdx
@@ -22,7 +22,7 @@ attempt.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/generate-root/attempt
```
@@ -75,7 +75,7 @@ generation attempt can take place at a time.
### Sample Request
-```
+```shell-session
$ curl \
--request PUT \
http://127.0.0.1:8200/v1/sys/generate-root/attempt
@@ -107,7 +107,7 @@ progress made. This must be called to change the OTP or PGP key being used.
### Sample Request
-```
+```shell-session
$ curl \
--request DELETE \
http://127.0.0.1:8200/v1/sys/generate-root/attempt
@@ -142,7 +142,7 @@ nonce must be provided with each call.
### Sample Request
-```
+```shell-session
$ curl \
--request PUT \
--data @payload.json \
diff --git a/website/pages/api-docs/system/health.mdx b/website/pages/api-docs/system/health.mdx
index 5b6f5663fb41..7e8b37ae5e61 100644
--- a/website/pages/api-docs/system/health.mdx
+++ b/website/pages/api-docs/system/health.mdx
@@ -61,7 +61,7 @@ The default status codes are:
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/health
```
diff --git a/website/pages/api-docs/system/host-info.mdx b/website/pages/api-docs/system/host-info.mdx
index d86c2ed72dd9..e76aaf15a562 100644
--- a/website/pages/api-docs/system/host-info.mdx
+++ b/website/pages/api-docs/system/host-info.mdx
@@ -22,7 +22,7 @@ times, disk usage, host info, and memory statistics.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/host-info
diff --git a/website/pages/api-docs/system/init.mdx b/website/pages/api-docs/system/init.mdx
index f912b47d902d..f2bda742cecd 100644
--- a/website/pages/api-docs/system/init.mdx
+++ b/website/pages/api-docs/system/init.mdx
@@ -19,7 +19,7 @@ This endpoint returns the initialization status of Vault.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/init
```
@@ -90,7 +90,7 @@ Additionally, the following options are only supported on Vault Pro/Enterprise:
### Sample Request
-```
+```shell-session
$ curl \
--request PUT \
--data @payload.json \
diff --git a/website/pages/api-docs/system/internal-counters.mdx b/website/pages/api-docs/system/internal-counters.mdx
index 7fcc2033fcb6..39cec7523780 100644
--- a/website/pages/api-docs/system/internal-counters.mdx
+++ b/website/pages/api-docs/system/internal-counters.mdx
@@ -10,19 +10,19 @@ description: >-
The `/sys/internal/counters` endpoints are used to return data about the number of Http Requests, Tokens, and Entities in Vault.
-~> **NOTE**: This endpoint is only available in Vault version 1.3+. Backwards compatibility is not guaranteed. These endpoints are subject to change or may disappear without notice.
+~> **NOTE**: This endpoint is only available in Vault version 1.3+. Backwards compatibility is not guaranteed. These endpoints are subject to change or may disappear without notice.
## Http Requests
This endpoint lists the number of Http Requests made per month.
-| Method | Path |
-| :----- | :------------------ |
-| `GET` | `/sys/internal/counters/requests` |
+| Method | Path |
+| :----- | :-------------------------------- |
+| `GET` | `/sys/internal/counters/requests` |
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -59,13 +59,13 @@ $ curl \
This endpoint returns the total number of Entities.
-| Method | Path |
-| :----- | :------------------ |
-| `GET` | `/sys/internal/counters/entities` |
+| Method | Path |
+| :----- | :-------------------------------- |
+| `GET` | `/sys/internal/counters/entities` |
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -97,13 +97,13 @@ $ curl \
This endpoint returns the total number of Tokens.
-| Method | Path |
-| :----- | :------------------ |
-| `GET` | `/sys/internal/counters/tokens` |
+| Method | Path |
+| :----- | :------------------------------ |
+| `GET` | `/sys/internal/counters/tokens` |
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
diff --git a/website/pages/api-docs/system/internal-specs-openapi.mdx b/website/pages/api-docs/system/internal-specs-openapi.mdx
index 102bc2ee0502..a303951b73e3 100644
--- a/website/pages/api-docs/system/internal-specs-openapi.mdx
+++ b/website/pages/api-docs/system/internal-specs-openapi.mdx
@@ -34,7 +34,7 @@ This endpoint returns a single OpenAPI document describing all paths visible to
### Sample Request
-```
+```shell-session
$ curl http://127.0.0.1:8200/v1/sys/internal/specs/openapi
```
diff --git a/website/pages/api-docs/system/internal-ui-mounts.mdx b/website/pages/api-docs/system/internal-ui-mounts.mdx
index 743fbc869d33..b497fc65f3a1 100644
--- a/website/pages/api-docs/system/internal-ui-mounts.mdx
+++ b/website/pages/api-docs/system/internal-ui-mounts.mdx
@@ -28,7 +28,7 @@ This endpoint lists all enabled auth methods.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/internal/ui/mounts
```
diff --git a/website/pages/api-docs/system/key-status.mdx b/website/pages/api-docs/system/key-status.mdx
index 00bde50bac72..918ced62bced 100644
--- a/website/pages/api-docs/system/key-status.mdx
+++ b/website/pages/api-docs/system/key-status.mdx
@@ -23,7 +23,7 @@ Vault.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
diff --git a/website/pages/api-docs/system/leader.mdx b/website/pages/api-docs/system/leader.mdx
index 50a4e55a6e9d..0d985e683bca 100644
--- a/website/pages/api-docs/system/leader.mdx
+++ b/website/pages/api-docs/system/leader.mdx
@@ -23,7 +23,7 @@ of Vault.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/leader
```
diff --git a/website/pages/api-docs/system/leases.mdx b/website/pages/api-docs/system/leases.mdx
index da8f861242d3..fde389d7522b 100644
--- a/website/pages/api-docs/system/leases.mdx
+++ b/website/pages/api-docs/system/leases.mdx
@@ -31,7 +31,7 @@ This endpoint retrieve lease metadata.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -64,7 +64,7 @@ This endpoint returns a list of lease ids.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -109,7 +109,7 @@ cannot be renewed using this endpoint, use instead the auth/token/renew endpoint
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -149,7 +149,7 @@ This endpoint revokes a lease immediately.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -182,7 +182,7 @@ this endpoint should be tightly controlled.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -209,7 +209,7 @@ used to revoke very large numbers of secrets/tokens at once.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -228,7 +228,7 @@ This may perform a lot of I/O to the storage method so should be used sparingly.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/license.mdx b/website/pages/api-docs/system/license.mdx
index fe71b3eef3e9..403734f34cb5 100644
--- a/website/pages/api-docs/system/license.mdx
+++ b/website/pages/api-docs/system/license.mdx
@@ -24,7 +24,7 @@ This endpoint returns information about the currently installed license.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/license
@@ -70,7 +70,7 @@ _DR Secondary Specific Parameters_
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
diff --git a/website/pages/api-docs/system/metrics.mdx b/website/pages/api-docs/system/metrics.mdx
index 3c67ed83941a..99a46b057b65 100644
--- a/website/pages/api-docs/system/metrics.mdx
+++ b/website/pages/api-docs/system/metrics.mdx
@@ -27,7 +27,7 @@ model for metrics collection.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
'http://127.0.0.1:8200/v1/sys/metrics?format=prometheus'
diff --git a/website/pages/api-docs/system/mfa/duo.mdx b/website/pages/api-docs/system/mfa/duo.mdx
index fe3e226941b8..9ff1b8ec6347 100644
--- a/website/pages/api-docs/system/mfa/duo.mdx
+++ b/website/pages/api-docs/system/mfa/duo.mdx
@@ -49,7 +49,7 @@ This endpoint defines a MFA method of type Duo.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -72,7 +72,7 @@ name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -112,7 +112,7 @@ This endpoint deletes a Duo MFA method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/mfa/okta.mdx b/website/pages/api-docs/system/mfa/okta.mdx
index fd7ca76d0d0e..51b407dc6668 100644
--- a/website/pages/api-docs/system/mfa/okta.mdx
+++ b/website/pages/api-docs/system/mfa/okta.mdx
@@ -48,7 +48,7 @@ This endpoint defines a MFA method of type Okta.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -71,7 +71,7 @@ name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -110,7 +110,7 @@ This endpoint deletes a Okta MFA method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/mfa/pingid.mdx b/website/pages/api-docs/system/mfa/pingid.mdx
index 6d7b6c1f899c..b5cab746cb64 100644
--- a/website/pages/api-docs/system/mfa/pingid.mdx
+++ b/website/pages/api-docs/system/mfa/pingid.mdx
@@ -41,7 +41,7 @@ This endpoint defines a MFA method of type PingID.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -64,7 +64,7 @@ name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -104,7 +104,7 @@ This endpoint deletes a PingID MFA method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/mfa/totp.mdx b/website/pages/api-docs/system/mfa/totp.mdx
index c91ee67c1085..b4a3644536e7 100644
--- a/website/pages/api-docs/system/mfa/totp.mdx
+++ b/website/pages/api-docs/system/mfa/totp.mdx
@@ -43,7 +43,7 @@ This endpoint defines a MFA method of type TOTP.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -66,7 +66,7 @@ name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -107,7 +107,7 @@ This endpoint deletes a TOTP MFA method.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -131,7 +131,7 @@ method name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -176,7 +176,7 @@ the `admin-generate` API stores the generated secret on the given entity ID.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -225,7 +225,7 @@ secret.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/mounts.mdx b/website/pages/api-docs/system/mounts.mdx
index e1c7fd21e131..f644f31696c2 100644
--- a/website/pages/api-docs/system/mounts.mdx
+++ b/website/pages/api-docs/system/mounts.mdx
@@ -19,7 +19,7 @@ This endpoints lists all the mounted secrets engines.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/mounts
@@ -87,9 +87,7 @@ $ curl \
"default_lease_ttl": 0,
"force_no_cache": false,
"max_lease_ttl": 0,
- "passthrough_request_headers": [
- "Accept"
- ]
+ "passthrough_request_headers": ["Accept"]
},
"description": "system endpoints used for control, policy and debugging",
"external_entropy_access": false,
@@ -190,7 +188,7 @@ relevant functionality is only supported in Vault Enterprise:
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -208,7 +206,7 @@ This endpoint disables the mount point specified in the URL.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -227,7 +225,7 @@ be the system default or a mount-specific value.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/mounts/my-mount/tune
@@ -293,7 +291,7 @@ This endpoint tunes configuration parameters for a given mount point.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/namespaces.mdx b/website/pages/api-docs/system/namespaces.mdx
index 1c4ddca3c663..43bdef161be6 100644
--- a/website/pages/api-docs/system/namespaces.mdx
+++ b/website/pages/api-docs/system/namespaces.mdx
@@ -19,7 +19,7 @@ This endpoints lists all the namespaces.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
-X LIST \
@@ -47,7 +47,7 @@ This endpoint creates a namespace at the givent path.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -64,7 +64,7 @@ This endpoint deletes a namespace at the specified path.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -81,7 +81,7 @@ This endpoint get the metadata for the given namespace path.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/namespaces/ns1
diff --git a/website/pages/api-docs/system/plugins-catalog.mdx b/website/pages/api-docs/system/plugins-catalog.mdx
index b4d735ce6482..8adbdc87a19c 100644
--- a/website/pages/api-docs/system/plugins-catalog.mdx
+++ b/website/pages/api-docs/system/plugins-catalog.mdx
@@ -21,7 +21,7 @@ This endpoint lists the plugins in the catalog by type.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/plugins/catalog
@@ -68,7 +68,7 @@ This endpoint lists the plugins in the catalog by type.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST
@@ -138,7 +138,7 @@ supplied name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -167,7 +167,7 @@ This endpoint returns the configuration data for the plugin with the given name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -209,7 +209,7 @@ This endpoint removes the plugin with the given name.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/plugins-reload-backend.mdx b/website/pages/api-docs/system/plugins-reload-backend.mdx
index e413d4314c66..0ecda98f3bc7 100644
--- a/website/pages/api-docs/system/plugins-reload-backend.mdx
+++ b/website/pages/api-docs/system/plugins-reload-backend.mdx
@@ -38,7 +38,7 @@ This endpoint reloads mounted plugin backends.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
diff --git a/website/pages/api-docs/system/policies.mdx b/website/pages/api-docs/system/policies.mdx
index 3813b8974f86..cbff0d4e92e8 100644
--- a/website/pages/api-docs/system/policies.mdx
+++ b/website/pages/api-docs/system/policies.mdx
@@ -23,7 +23,7 @@ This endpoint lists all configured ACL policies.
### Sample Request
-```
+```shell-session
$ curl \
-X LIST --header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/policies/acl
@@ -52,7 +52,7 @@ This endpoint retrieves information about the named ACL policy.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
@@ -94,7 +94,7 @@ updated, it takes effect immediately to all associated users.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -119,7 +119,7 @@ acts as an empty policy.)
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -136,7 +136,7 @@ This endpoint lists all configured RGP policies.
### Sample Request
-```
+```shell-session
$ curl \
-X LIST --header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/policies/rgp
@@ -165,7 +165,7 @@ This endpoint retrieves information about the named RGP policy.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
@@ -213,7 +213,7 @@ updated, it takes effect immediately to all associated users.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -238,7 +238,7 @@ acts as an empty policy.)
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -261,7 +261,7 @@ path, this endpoint returns two identifiers:
### Sample Request
-```
+```shell-session
$ curl \
-X LIST --header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/policies/egp
@@ -290,7 +290,7 @@ This endpoint retrieves information about the named EGP policy.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
@@ -345,7 +345,7 @@ updated, it takes effect immediately to all associated users.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -368,7 +368,7 @@ This endpoint deletes the EGP policy with the given name from all paths on which
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/policy.mdx b/website/pages/api-docs/system/policy.mdx
index 6d4610a3da85..d465be9e8501 100644
--- a/website/pages/api-docs/system/policy.mdx
+++ b/website/pages/api-docs/system/policy.mdx
@@ -19,7 +19,7 @@ This endpoint lists all configured policies.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/policy
@@ -48,7 +48,7 @@ This endpoint retrieve the policy body for the named policy.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/policy/my-policy
@@ -89,7 +89,7 @@ updated, it takes effect immediately to all associated users.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -113,7 +113,7 @@ affect all users associated with this policy.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/pprof.mdx b/website/pages/api-docs/system/pprof.mdx
index 5c7642681bf1..de7c874132f4 100644
--- a/website/pages/api-docs/system/pprof.mdx
+++ b/website/pages/api-docs/system/pprof.mdx
@@ -21,7 +21,7 @@ This endpoint returns an HTML page listing the available profiles.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/pprof/
@@ -38,7 +38,7 @@ separated by NUL bytes.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/pprof/cmdline
@@ -54,7 +54,7 @@ This endpoint returns stack traces of all current goroutines.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/pprof/goroutine
@@ -70,7 +70,7 @@ This endpoint returns a sampling of memory allocations of live object.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/pprof/heap
@@ -93,7 +93,7 @@ if not specified.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/pprof/profile
@@ -109,7 +109,7 @@ This endpoint returns the program counters listed in the request.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/pprof/symbol
@@ -132,7 +132,7 @@ specified.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/pprof/trace
diff --git a/website/pages/api-docs/system/raw.mdx b/website/pages/api-docs/system/raw.mdx
index 738fbc33cc9e..10281e0324ce 100644
--- a/website/pages/api-docs/system/raw.mdx
+++ b/website/pages/api-docs/system/raw.mdx
@@ -30,7 +30,7 @@ system.
### Sample Request
-```
+```shell-session
$ curl \
---header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/raw/secret/foo
@@ -71,7 +71,7 @@ mount system.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -92,7 +92,7 @@ This endpoint returns a list keys for a given path prefix.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
@@ -125,7 +125,7 @@ storage backend and not the logical path that is exposed via the mount system.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
diff --git a/website/pages/api-docs/system/rekey-recovery-key.mdx b/website/pages/api-docs/system/rekey-recovery-key.mdx
index 6ca1d7ed6bea..5d25abb1cacb 100644
--- a/website/pages/api-docs/system/rekey-recovery-key.mdx
+++ b/website/pages/api-docs/system/rekey-recovery-key.mdx
@@ -23,7 +23,7 @@ This endpoint reads the configuration and progress of the current rekey attempt.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
@@ -106,7 +106,7 @@ nonce.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -127,7 +127,7 @@ during the verification flow, the current unseal keys remain valid.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -146,7 +146,7 @@ fingerprint to hex-encoded PGP-encrypted key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/rekey/recovery-key-backup
@@ -173,7 +173,7 @@ This endpoint deletes the backup copy of PGP-encrypted recovery key shares.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token" \
--request DELETE \
@@ -217,7 +217,7 @@ for the verification operation.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token" \
--request PUT \
@@ -255,7 +255,7 @@ verification attempt.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/verify
@@ -291,7 +291,7 @@ along with the new nonce.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token" \
--request DELETE \
@@ -344,7 +344,7 @@ below; otherwise the response will be the same as the `GET` method against
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token" \
--request PUT \
diff --git a/website/pages/api-docs/system/rekey.mdx b/website/pages/api-docs/system/rekey.mdx
index b23d7626b38c..c2a8f33ea949 100644
--- a/website/pages/api-docs/system/rekey.mdx
+++ b/website/pages/api-docs/system/rekey.mdx
@@ -24,7 +24,7 @@ This endpoint reads the configuration and progress of the current rekey attempt.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/rekey/init
@@ -106,7 +106,7 @@ and starting a new rekey, which will also provide a new nonce.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
@@ -127,7 +127,7 @@ during the verification flow, the current unseal keys remain valid.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -146,7 +146,7 @@ hex-encoded PGP-encrypted key.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/rekey/backup
@@ -173,7 +173,7 @@ This endpoint deletes the backup copy of PGP-encrypted unseal keys.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token" \
--request DELETE \
@@ -217,7 +217,7 @@ for the verification operation.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token" \
--request PUT \
@@ -255,7 +255,7 @@ verification attempt.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/rekey/verify
@@ -291,7 +291,7 @@ nonce.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token" \
--request DELETE \
@@ -344,7 +344,7 @@ below; otherwise the response will be the same as the `GET` method against
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token" \
--request PUT \
diff --git a/website/pages/api-docs/system/remount.mdx b/website/pages/api-docs/system/remount.mdx
index 96ad2ea91c53..ce1670878805 100644
--- a/website/pages/api-docs/system/remount.mdx
+++ b/website/pages/api-docs/system/remount.mdx
@@ -36,7 +36,7 @@ This endpoint moves an already-mounted backend to a new mount point.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/replication/index.mdx b/website/pages/api-docs/system/replication/index.mdx
index 84d3ed96c7f4..13f7fa3a57c3 100644
--- a/website/pages/api-docs/system/replication/index.mdx
+++ b/website/pages/api-docs/system/replication/index.mdx
@@ -22,7 +22,7 @@ example: an error has caused replication to stop syncing.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -71,7 +71,7 @@ depending on the number and size of objects in the data store.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -99,7 +99,7 @@ This is an authenticated endpoint.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/replication/status
```
diff --git a/website/pages/api-docs/system/replication/replication-dr.mdx b/website/pages/api-docs/system/replication/replication-dr.mdx
index 53890b53f81d..1c568dd5308c 100644
--- a/website/pages/api-docs/system/replication/replication-dr.mdx
+++ b/website/pages/api-docs/system/replication/replication-dr.mdx
@@ -24,7 +24,7 @@ This is an authenticated endpoint.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/replication/dr/status
```
@@ -91,7 +91,7 @@ must be promoted).
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -112,7 +112,7 @@ DR replication set without wiping local storage.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -134,7 +134,7 @@ will require a wipe of the underlying storage.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -174,7 +174,7 @@ identifier can later be used to revoke a DR secondary's access.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -225,7 +225,7 @@ connect again unless given a new activation token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -247,7 +247,7 @@ needing to make an API call to the primary during activation.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -294,7 +294,7 @@ token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -349,7 +349,7 @@ result in data loss!
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -390,13 +390,13 @@ to a primary, and in the primary case, secondaries connecting back to the
cluster (even if they have connected before) will require a wipe of the
underlying storage.
-| Method | Path |
-| :----- | :----------------------------------------------- |
+| Method | Path |
+| :----- | :-------------------------------------- |
| `POST` | `/sys/replication/dr/secondary/disable` |
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -449,7 +449,7 @@ docs](#generate-disaster-recovery-operation-token) for more information.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -475,7 +475,7 @@ attempt.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
```
@@ -518,7 +518,7 @@ generation attempt can take place at a time.
### Sample Request
-```
+```shell-session
$ curl \
--request PUT \
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
@@ -550,7 +550,7 @@ progress made. This must be called to change the OTP or PGP key being used.
### Sample Request
-```
+```shell-session
$ curl \
--request DELETE \
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
@@ -585,7 +585,7 @@ nonce must be provided with each call.
### Sample Request
-```
+```shell-session
$ curl \
--request PUT \
--data @payload.json \
@@ -632,7 +632,7 @@ and therefore should be deleted when it is no longer needed.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/replication/replication-performance.mdx b/website/pages/api-docs/system/replication/replication-performance.mdx
index 56abaa61cdc1..be839b5d61ae 100644
--- a/website/pages/api-docs/system/replication/replication-performance.mdx
+++ b/website/pages/api-docs/system/replication/replication-performance.mdx
@@ -24,7 +24,7 @@ This is an authenticated endpoint.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/replication/performance/status
```
@@ -95,7 +95,7 @@ result in data loss!
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -116,7 +116,7 @@ replication set without wiping local storage.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -138,7 +138,7 @@ they have connected before) will require a wipe of the underlying storage.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -178,7 +178,7 @@ identifier can later be used to revoke a secondary's access.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -229,7 +229,7 @@ will not be allowed to connect again unless given a new activation token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -268,7 +268,7 @@ selected secondary. In deny mode, the mount and namespace paths are excluded.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -291,7 +291,7 @@ for a secondary.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/replication/performance/primary/paths-filter/mySecondaryID
@@ -320,7 +320,7 @@ This endpoint is used to delete the mount and namespace filters for a secondary.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -342,7 +342,7 @@ filtered for a secondary on the primary.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/replication/performance/primary/dynamic-filter/mySecondaryID
@@ -372,7 +372,7 @@ filtered for a secondary on the secondary.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/replication/performance/secondary/dynamic-filter/mySecondaryID
@@ -421,7 +421,7 @@ selected secondary. In blacklist mode, the mount paths are excluded.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -447,7 +447,7 @@ for a secondary.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
@@ -479,7 +479,7 @@ This endpoint is used to delete the mount filters for a secondary.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
@@ -500,7 +500,7 @@ needing to make an API call to the primary during activation.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -547,7 +547,7 @@ token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -584,7 +584,7 @@ primary at a time.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -609,7 +609,7 @@ underlying storage.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -655,7 +655,7 @@ secondary activation token. This does not wipe all data in the cluster.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/rotate.mdx b/website/pages/api-docs/system/rotate.mdx
index 39da180e7bfd..152c0c876b3f 100644
--- a/website/pages/api-docs/system/rotate.mdx
+++ b/website/pages/api-docs/system/rotate.mdx
@@ -24,7 +24,7 @@ This path requires `sudo` capability in addition to `update`.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
diff --git a/website/pages/api-docs/system/seal-status.mdx b/website/pages/api-docs/system/seal-status.mdx
index c932e4124fcb..0d41b7339208 100644
--- a/website/pages/api-docs/system/seal-status.mdx
+++ b/website/pages/api-docs/system/seal-status.mdx
@@ -20,7 +20,7 @@ endpoint.
### Sample Request
-```
+```shell-session
$ curl \
http://127.0.0.1:8200/v1/sys/seal-status
```
diff --git a/website/pages/api-docs/system/seal.mdx b/website/pages/api-docs/system/seal.mdx
index aee7a8f3d6f4..516ad2628fde 100644
--- a/website/pages/api-docs/system/seal.mdx
+++ b/website/pages/api-docs/system/seal.mdx
@@ -21,7 +21,7 @@ Standby nodes should be restarted to get the same effect. Requires a token with
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
diff --git a/website/pages/api-docs/system/sealwrap-rewrap.mdx b/website/pages/api-docs/system/sealwrap-rewrap.mdx
index 7769948c255a..cea6a763e5b1 100644
--- a/website/pages/api-docs/system/sealwrap-rewrap.mdx
+++ b/website/pages/api-docs/system/sealwrap-rewrap.mdx
@@ -25,7 +25,7 @@ This endpoint reports whether a seal rewrap process is currently running.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/sealwrap/rewrap
@@ -63,7 +63,7 @@ The default status codes are:
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/step-down.mdx b/website/pages/api-docs/system/step-down.mdx
index 529c30654b2f..59457780b1a3 100644
--- a/website/pages/api-docs/system/step-down.mdx
+++ b/website/pages/api-docs/system/step-down.mdx
@@ -24,7 +24,7 @@ the path.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
diff --git a/website/pages/api-docs/system/storage/raft.mdx b/website/pages/api-docs/system/storage/raft.mdx
index efcfade0e85e..52b06fa7f196 100644
--- a/website/pages/api-docs/system/storage/raft.mdx
+++ b/website/pages/api-docs/system/storage/raft.mdx
@@ -52,7 +52,7 @@ leader node.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -72,7 +72,7 @@ This endpoint returns the details of all the nodes in the raft cluster.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/storage/raft/configuration
@@ -129,7 +129,7 @@ This endpoint removes a node from the raft cluster.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -148,7 +148,7 @@ snapshot is returned as binary data and should be redirected to a file.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
@@ -165,7 +165,7 @@ Installs the provided snapshot, returning the cluster to the state defined in it
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -186,7 +186,7 @@ snapshot data.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/tools.mdx b/website/pages/api-docs/system/tools.mdx
index 25f2ca55ecb2..9d98ef91d382 100644
--- a/website/pages/api-docs/system/tools.mdx
+++ b/website/pages/api-docs/system/tools.mdx
@@ -35,7 +35,7 @@ This endpoint returns high-quality random bytes of the specified length.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
@@ -87,7 +87,7 @@ algorithm.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/unseal.mdx b/website/pages/api-docs/system/unseal.mdx
index c3db580a4dbf..56108ee4c16b 100644
--- a/website/pages/api-docs/system/unseal.mdx
+++ b/website/pages/api-docs/system/unseal.mdx
@@ -45,7 +45,7 @@ Either the `key` or `reset` parameter must be provided; if both are provided,
### Sample Request
-```
+```shell-session
$ curl \
--request PUT \
--data @payload.json \
diff --git a/website/pages/api-docs/system/wrapping-lookup.mdx b/website/pages/api-docs/system/wrapping-lookup.mdx
index 1ea84897b51f..1d4672795139 100644
--- a/website/pages/api-docs/system/wrapping-lookup.mdx
+++ b/website/pages/api-docs/system/wrapping-lookup.mdx
@@ -31,7 +31,7 @@ This endpoint looks up wrapping properties for the given token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/wrapping-rewrap.mdx b/website/pages/api-docs/system/wrapping-rewrap.mdx
index bdca2add9069..b828e2311d3e 100644
--- a/website/pages/api-docs/system/wrapping-rewrap.mdx
+++ b/website/pages/api-docs/system/wrapping-rewrap.mdx
@@ -37,7 +37,7 @@ response-wrapped token when rotation is a requirement.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/wrapping-unwrap.mdx b/website/pages/api-docs/system/wrapping-unwrap.mdx
index 059dd36b3738..4abd95dbb78f 100644
--- a/website/pages/api-docs/system/wrapping-unwrap.mdx
+++ b/website/pages/api-docs/system/wrapping-unwrap.mdx
@@ -44,7 +44,7 @@ unable to be looked up, as it will basically be a double-use of the token!
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
diff --git a/website/pages/api-docs/system/wrapping-wrap.mdx b/website/pages/api-docs/system/wrapping-wrap.mdx
index 0d745e3709d7..f9003dfd5333 100644
--- a/website/pages/api-docs/system/wrapping-wrap.mdx
+++ b/website/pages/api-docs/system/wrapping-wrap.mdx
@@ -38,7 +38,7 @@ token.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--header "X-Vault-Wrap-TTL: 60" \
diff --git a/website/pages/docs/agent/caching/index.mdx b/website/pages/docs/agent/caching/index.mdx
index d108016f0d3c..8cfdeac37684 100644
--- a/website/pages/docs/agent/caching/index.mdx
+++ b/website/pages/docs/agent/caching/index.mdx
@@ -55,7 +55,7 @@ Vault Agent can be configured to force the use of the auto-auth token by using
the value `force` for the `use_auto_auth_token` option. This configuration
overrides the default behavior described above in [Using Auth-Auth
Token](/docs/agent/caching#using-auto-auth-token), and instead ignores any
-existing Vault token in the request and instead uses the auto-auth token.
+existing Vault token in the request and instead uses the auto-auth token.
## Cache Evictions
@@ -157,7 +157,7 @@ evicted.
### Sample Request
-```
+```shell-session
$ curl \
--request POST \
--data @payload.json \
@@ -173,7 +173,7 @@ The top level `cache` block has the following configuration entries:
auto-auth token attached. If the requests already bear a token, this
configuration will be overridden and the token in the request will be used to
forward the request to the Vault server. If set to `"force"` Agent will use the
- auto-auth token, overwriting the attached Vault token if set.
+ auto-auth token, overwriting the attached Vault token if set.
## Configuration (`listener`)
diff --git a/website/pages/docs/agent/index.mdx b/website/pages/docs/agent/index.mdx
index 04353935fbfb..ea4758d80b68 100644
--- a/website/pages/docs/agent/index.mdx
+++ b/website/pages/docs/agent/index.mdx
@@ -16,7 +16,7 @@ Vault Agent is a client daemon that provides the following features:
- [Templating][template] - Allows rendering of user supplied templates by Vault Agent, using the token generated by the Auto-Auth step.
To get help, run:
-```text
+```shell-session
$ vault agent -h
```
diff --git a/website/pages/docs/audit/file.mdx b/website/pages/docs/audit/file.mdx
index e3e38ecd0f65..73528b2b7ad2 100644
--- a/website/pages/docs/audit/file.mdx
+++ b/website/pages/docs/audit/file.mdx
@@ -21,20 +21,20 @@ and re-open their underlying file, which can assist with log rotation needs.
Enable at the default path:
-```text
+```shell-session
$ vault audit enable file file_path=/var/log/vault_audit.log
```
Enable at a different path. It is possible to enable multiple copies of an audit
device:
-```text
+```shell-session
$ vault audit enable -path="vault_audit_1" file file_path=/home/user/vault_audit.log
```
Enable logs on stdout. This is useful when running in a container:
-```text
+```shell-session
$ vault audit enable file file_path=stdout
```
diff --git a/website/pages/docs/audit/index.mdx b/website/pages/docs/audit/index.mdx
index a33dbc561804..97843d7e82b7 100644
--- a/website/pages/docs/audit/index.mdx
+++ b/website/pages/docs/audit/index.mdx
@@ -49,7 +49,7 @@ devices must be enabled by a root user using `vault audit enable`.
When enabling an audit device, options can be passed to it to configure it.
For example, the command below enables the file audit device:
-```text
+```shell-session
$ vault audit enable file file_path=/var/log/vault_audit.log
```
diff --git a/website/pages/docs/audit/socket.mdx b/website/pages/docs/audit/socket.mdx
index 8777fdca11f4..d7195291ef5f 100644
--- a/website/pages/docs/audit/socket.mdx
+++ b/website/pages/docs/audit/socket.mdx
@@ -20,13 +20,13 @@ needed for audit logs.
Enable at the default path:
-```text
+```shell-session
$ vault audit enable socket
```
Supply configuration parameters via K=V pairs:
-```text
+```shell-session
$ vault audit enable socket address=127.0.0.1:9090 socket_type=tcp
```
diff --git a/website/pages/docs/audit/syslog.mdx b/website/pages/docs/audit/syslog.mdx
index 7755a4f290d7..cda2d126beaf 100644
--- a/website/pages/docs/audit/syslog.mdx
+++ b/website/pages/docs/audit/syslog.mdx
@@ -25,13 +25,13 @@ directly to `syslog` will not result in Vault being blocked.
Audit `syslog` device can be enabled by the following command:
-```text
+```shell-session
$ vault audit enable syslog
```
Supply configuration parameters via K=V pairs:
-```text
+```shell-session
$ vault audit enable syslog tag="vault" facility="AUTH"
```
diff --git a/website/pages/docs/auth/alicloud.mdx b/website/pages/docs/auth/alicloud.mdx
index 275c3aacd7de..8c001fbfd4da 100644
--- a/website/pages/docs/auth/alicloud.mdx
+++ b/website/pages/docs/auth/alicloud.mdx
@@ -66,19 +66,19 @@ token accordingly.
#### Enable AliCloud authentication in Vault.
-```
+```shell-session
$ vault auth enable alicloud
```
#### Configure the policies on the role.
-```
+```shell-session
$ vault write auth/alicloud/role/dev-role arn='acs:ram::5138828231865461:role/dev-role'
```
#### Perform the login operation
-```
+```shell-session
$ vault write auth/alicloud/login \
role=dev-role \
identity_request_url=$IDENTITY_REQUEST_URL_BASE_64 \
@@ -88,7 +88,7 @@ $ vault write auth/alicloud/login \
For the RAM auth method, generating the signed request is a non-standard
operation. The Vault CLI supports generating this for you:
-```
+```shell-session
$ vault login -method=alicloud access_key=... secret_key=... security_token=... region=...
```
diff --git a/website/pages/docs/auth/app-id.mdx b/website/pages/docs/auth/app-id.mdx
index 924329e557ea..539a54c955c5 100644
--- a/website/pages/docs/auth/app-id.mdx
+++ b/website/pages/docs/auth/app-id.mdx
@@ -63,13 +63,13 @@ More details on this process follow:
Via the CLI:
-```text
+```shell-session
$ vault write auth/app-id/login/:app-id user_id=:user_id
```
Via the API:
-```text
+```shell-session
$ curl \
--method POST \
--data '{"user_id": ":user_id"}' \
diff --git a/website/pages/docs/auth/approle.mdx b/website/pages/docs/auth/approle.mdx
index fc40bc69840a..0b7d3b02a5dd 100644
--- a/website/pages/docs/auth/approle.mdx
+++ b/website/pages/docs/auth/approle.mdx
@@ -29,7 +29,7 @@ the AppRole associated with the credentials.
The default path is `/approle`. If this auth method was enabled at a different
path, specify `auth/my-path/login` instead.
-```text
+```shell-session
$ vault write auth/approle/login \
role_id=db02de05-fa39-4855-059b-67221c5c2f63 \
secret_id=6a174c20-f6de-a53c-74d2-6018fcceff64
@@ -48,7 +48,7 @@ token_policies [default]
The default endpoint is `auth/approle/login`. If this auth method was enabled
at a different path, use that value instead of `approle`.
-```sh
+```shell-session
$ curl \
--request POST \
--data '{"role_id":"988a9df-...","secret_id":"37b74931..."}' \
diff --git a/website/pages/docs/auth/aws.mdx b/website/pages/docs/auth/aws.mdx
index c718ac0fc739..302a7d7c8583 100644
--- a/website/pages/docs/auth/aws.mdx
+++ b/website/pages/docs/auth/aws.mdx
@@ -566,7 +566,7 @@ for the IAM Role to be assumed.
#### Enable AWS EC2 authentication in Vault.
-```
+```shell-session
$ vault auth enable aws
```
@@ -580,13 +580,13 @@ The IAM account or role to which the credentials map must allow the
`ec2:DescribeInstances` action. In addition, if IAM Role binding is used (see
`bound_iam_role_arn` below), `iam:GetInstanceProfile` must also be allowed.
-```
+```shell-session
$ vault write auth/aws/config/client secret_key=vCtSM8ZUEQ3mOFVlYPBQkf2sO6F/W7a5TVzrl3Oj access_key=VKIAJBRHKH6EVTTNXDHA
```
#### Configure the policies on the role.
-```
+```shell-session
$ vault write auth/aws/role/dev-role auth_type=ec2 bound_ami_id=ami-fce3c696 policies=prod,dev max_ttl=500h
$ vault write auth/aws/role/dev-role-iam auth_type=iam \
@@ -595,13 +595,13 @@ $ vault write auth/aws/role/dev-role-iam auth_type=iam \
#### Configure a required X-Vault-AWS-IAM-Server-ID Header (recommended)
-```
+```shell-session
$ vault write auth/aws/config/client iam_server_id_header_value=vault.example.com
```
#### Perform the login operation
-```
+```shell-session
$ vault write auth/aws/login role=dev-role \
pkcs7=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 nonce=5defbf9e-a8f9-3063-bdfc-54b7a42a1f95
```
@@ -609,7 +609,7 @@ pkcs7=MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAaCAJIAEggGmew
For the iam auth method, generating the signed request is a non-standard
operation. The Vault cli supports generating this for you:
-```
+```shell-session
$ vault login -method=aws header_value=vault.example.com role=dev-role-iam
```
@@ -620,7 +620,7 @@ credentials available at any of these locations, you can explicitly pass them
in on the command line (though this is not recommended), omitting
`aws_security_token` if not applicable.
-```
+```shell-session
$ vault login -method=aws header_value=vault.example.com role=dev-role-iam \
aws_access_key_id= \
aws_secret_access_key= \
@@ -629,7 +629,7 @@ $ vault login -method=aws header_value=vault.example.com role=dev-role-iam \
The region used defaults to `us-east-1`, but you can specify a custom region like so:
-```
+```shell-session
$ vault login -method=aws region=us-west-2 role=dev-role-iam
```
@@ -642,7 +642,7 @@ source code](https://github.com/hashicorp/vault/blob/master/builtin/credential/a
Using an approach such as this, the request parameters can be generated and
passed to the `login` method:
-```
+```shell-session
$ vault write auth/aws/login role=dev-role-iam \
iam_http_request_method=POST \
iam_request_url=aHR0cHM6Ly9zdHMuYW1hem9uYXdzLmNvbS8= \
diff --git a/website/pages/docs/auth/azure.mdx b/website/pages/docs/auth/azure.mdx
index b089dd49f6c4..c72f1ddab852 100644
--- a/website/pages/docs/auth/azure.mdx
+++ b/website/pages/docs/auth/azure.mdx
@@ -45,7 +45,7 @@ have already reviewed these sections, here are some quick links to:
The default path is `/auth/azure`. If this auth method was enabled at a different
path, specify `auth/my-path/login` instead.
-```text
+```shell-session
$ vault write auth/azure/login \
role="dev-role" \
jwt="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..." \
@@ -58,7 +58,7 @@ The `role` and `jwt` parameters are required. When using bound*service_principal
For example:
-```text
+```shell-session
$ vault write auth/azure/login role="dev-role" \
jwt="$(curl -s 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https%3A%2F%2Fvault.hashicorp.com%2F' -H Metadata:true | jq -r '.access_token')" \
subscription_id=$(curl -s -H Metadata:true "http://169.254.169.254/metadata/instance?api-version=2017-08-01" | jq -r '.compute | .subscriptionId') \
@@ -71,7 +71,7 @@ $ vault write auth/azure/login role="dev-role" \
The default endpoint is `auth/azure/login`. If this auth method was enabled
at a different path, use that value instead of `azure`.
-```sh
+```shell-session
$ curl \
--request POST \
--data '{"role": "dev-role", "jwt": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."}' \
diff --git a/website/pages/docs/auth/cert.mdx b/website/pages/docs/auth/cert.mdx
index 8d340751d2ce..caf755504ebd 100644
--- a/website/pages/docs/auth/cert.mdx
+++ b/website/pages/docs/auth/cert.mdx
@@ -71,7 +71,7 @@ below writing to a path of `auth/cert/certs/web`. If a certificate role name
is not specified, the auth method will try to authenticate against all trusted
certificates.
-```
+```shell-session
$ vault login \
-method=cert \
-ca-cert=ca.pem \
@@ -87,7 +87,7 @@ TLS certificate and when the login endpoint is hit, the auth method will
determine if there is a matching trusted certificate to authenticate the client.
Optionally, you may specify a single certificate role to authenticate against.
-```sh
+```shell-session
$ curl \
--request POST \
--cacert ca.pem \
diff --git a/website/pages/docs/auth/cf.mdx b/website/pages/docs/auth/cf.mdx
index 63e39f9e35ca..b021fbb120d3 100644
--- a/website/pages/docs/auth/cf.mdx
+++ b/website/pages/docs/auth/cf.mdx
@@ -42,7 +42,7 @@ and you'll need to configure it to access the CF API.
To gain your instance identity CA certificate, in the [cf dev](https://github.com/cloudfoundry-incubator/cfdev)
environment it can be found using:
-```
+```shell-session
$ bosh int --path /diego_instance_identity_ca ~/.cfdev/state/bosh/creds.yml
```
@@ -53,13 +53,13 @@ ease of drilling into the particular part of the response you'll need.
Once those steps are complete, get the credentials you'll use for CredHub:
-```
+```shell-session
$ pcf settings | jq '.products[0].director_credhub_client_credentials'
```
SSH into your Ops Manager VM:
-```
+```shell-session
$ ssh -i ops_mgr.pem ubuntu@$OPS_MGR_URL
```
@@ -67,13 +67,13 @@ Please note that the above OPS_MGR_URL shouldn't be prepended with `https://`.
Log into CredHub with the credentials you obtained earlier:
-```
+```shell-session
$ credhub login --client-name=director_to_credhub --client-secret=some-secret
```
And view the root certificate CF uses to issue instance identity certificates:
-```
+```shell-session
$ credhub get -n /cf/diego-instance-identity-root-ca
```
@@ -81,7 +81,7 @@ The output to that call will include two certificates and one RSA key. You will
under `ca: |` and place it into a file on your local machine that's properly formatted. Here's an example of
a properly formatted CA certificate:
-```
+```shell-session
$ cat ca.crt
-----BEGIN CERTIFICATE-----
MIIDNDCCAhygAwIBAgITPqTy1qvfHNEVuxsl9l1glY85OTANBgkqhkiG9w0BAQsF
@@ -107,7 +107,7 @@ jK0RcmCyaXw=
An easy way to verify that your CA certificate is properly formatted is using OpenSSL like so:
-```
+```shell-session
$ openssl x509 -in ca.crt -text -noout
Certificate:
Data:
@@ -179,7 +179,7 @@ run `$ cf api` to view the API endpoint that Vault will use.
Next, configure a user for Vault to use. This plugin was tested with Org Manager level
permissions, but lower level permissions _may_ be usable.
-```
+```shell-session
$ cf create-user vault pa55w0rd
$ cf orgs
$ cf org-users my-example-org
@@ -204,13 +204,13 @@ x509: certificate signed by unknown authority
If you encounter this error, you will need to first gain a copy of the certificate that CF
is using for the API via:
-```
+```shell-session
$ openssl s_client -showcerts -servername domain.com -connect domain.com:443
```
Here is an example of a real call:
-```
+```shell-session
$ openssl s_client -showcerts -servername api.sys.somewhere.cf-app.com -connect api.sys.somewhere.cf-app.com:443
```
@@ -224,7 +224,7 @@ you name this file `cfapi.crt`.
After obtaining the information described above, a Vault operator will configure the CF auth method
like so:
-```
+```shell-session
$ vault auth enable cf
$ vault write auth/cf/config \
@@ -244,7 +244,7 @@ $ vault write auth/cf/roles/my-role \
Once configured, from a CF instance containing real values for the `CF_INSTANCE_CERT` and
`CF_INSTANCE_KEY`, login can be performed using:
-```
+```shell-session
$ vault login -method=cf role=test-role
```
@@ -258,7 +258,7 @@ CF docs indicate they expire every 4 years. However long they last, at some poin
to add another CA certificate - one that's soon to expire, and one that is currently or soon-to-be
valid.
-```
+```shell-session
$ CURRENT=$(cat /path/to/current-ca.crt)
$ FUTURE=$(cat /path/to/future-ca.crt)
$ vault write auth/vault-plugin-auth-cf/config identity_ca_certificates="$CURRENT,$FUTURE"
@@ -280,13 +280,13 @@ files, each being a distinct certificate. The first certificate tends to be the
`identity.crt`, and the second one tends to be the `intermediate.crt`. Verify each are
properly named and formatted using a command like:
-```
+```shell-session
$ openssl x509 -in ca.crt -text -noout
```
Then, verify that the certificates are properly chained to the `ca.crt` you've configured:
-```
+```shell-session
$ openssl verify -CAfile ca.crt -untrusted intermediate.crt identity.crt
```
diff --git a/website/pages/docs/auth/gcp.mdx b/website/pages/docs/auth/gcp.mdx
index 9e998a39fed7..3343c4fdfb59 100644
--- a/website/pages/docs/auth/gcp.mdx
+++ b/website/pages/docs/auth/gcp.mdx
@@ -34,7 +34,7 @@ repository.
Vault includes a CLI helper that obtains a signed JWT locally and sends the
request to Vault. This helper is only available for IAM-type roles.
-```text
+```shell-session
$ vault login -method=gcp \
role="my-role" \
service_account="authenticating-account@my-project.iam.gserviceaccount.com" \
@@ -47,7 +47,7 @@ For more usage information, run `vault auth help gcp`.
### Via the CLI
-```text
+```shell-session
$ vault write -field=token auth/gcp/login \
role="my-role" \
jwt="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."
@@ -57,7 +57,7 @@ See [Generating JWTs](#generating-jwts) for ways to obtain the JWT token.
### Via the API
-```text
+```shell-session
$ curl \
--request POST \
--data '{"role":"my-role", "jwt":"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."}' \
@@ -311,7 +311,7 @@ curl \
You can also do this through the (currently beta) gcloud command.
-```text
+```shell-session
$ gcloud beta iam service-accounts sign-jwt $INPUT_JWT_CLAIMS $OUTPUT_JWT_FILE \
--iam-account=service-account@my-project.iam.gserviceaccount.com \
--project=my-project
diff --git a/website/pages/docs/auth/github.mdx b/website/pages/docs/auth/github.mdx
index 6e276ca6f821..f819946378fd 100644
--- a/website/pages/docs/auth/github.mdx
+++ b/website/pages/docs/auth/github.mdx
@@ -28,7 +28,7 @@ unacceptable to you, you should use a different method.
The default path is `/github`. If this auth method was enabled at a different
path, specify `-path=/my-path` in the CLI.
-```text
+```shell-session
$ vault login -method=github token="MY_TOKEN"
```
@@ -37,7 +37,7 @@ $ vault login -method=github token="MY_TOKEN"
The default endpoint is `auth/github/login`. If this auth method was enabled
at a different path, use that value instead of `github`.
-```shell
+```shell-session
$ curl \
--request POST \
--data '{"token": "MY_TOKEN"}' \
diff --git a/website/pages/docs/auth/index.mdx b/website/pages/docs/auth/index.mdx
index f14f96fff7c3..25ef5a122988 100644
--- a/website/pages/docs/auth/index.mdx
+++ b/website/pages/docs/auth/index.mdx
@@ -24,7 +24,7 @@ To learn more about authentication, see the
Auth methods can be enabled/disabled using the CLI or the API.
-```text
+```shell-session
$ vault auth enable userpass
```
@@ -37,7 +37,7 @@ enable "github", then you can interact with it at `auth/github`. However, this
path is customizable, allowing users with advanced use cases to mount a single
auth method multiple times.
-```text
+```shell-session
$ vault auth enable -path=my-login userpass
```
diff --git a/website/pages/docs/auth/jwt.mdx b/website/pages/docs/auth/jwt.mdx
index 6b85f5198607..3c0dc7505d6e 100644
--- a/website/pages/docs/auth/jwt.mdx
+++ b/website/pages/docs/auth/jwt.mdx
@@ -161,7 +161,7 @@ they must be added as query parameters, for example:
The CLI login defaults to path of `/oidc`. If this auth method was enabled at a
different path, specify `-path=/my-path` in the CLI.
-```text
+```shell-session
$ vault login -method=oidc port=8400 role=test
Complete the login via your OIDC provider. Launching browser to:
@@ -211,6 +211,7 @@ vault write auth/oidc/role/demo -< vault.keytab.base64
```
@@ -87,7 +87,7 @@ $ base64 vault.keytab > vault.keytab.base64
entry name that will be used to verify inbound login
requests:
-```text
+```shell-session
$ vault write auth/kerberos/config \
keytab=@vault.keytab.base64 \
service_account="vault_svc"
@@ -99,7 +99,7 @@ $ vault write auth/kerberos/config \
first tested your configuration from the Vault server using
a tool like `ldapsearch`.
-```text
+```shell-session
$ vault write auth/kerberos/config/ldap \
binddn=vault_svc@MATRIX.LAN \
bindpass=$VAULT_SVC_PASSWORD \
@@ -123,7 +123,7 @@ for further discussion of available parameters.
and [LDAP Group -> Policy Mapping](/docs/auth/ldap#ldap-group-policy-mapping)
for further discussion.
-```text
+```shell-session
$ vault write auth/kerberos/groups/engineering-team \
policies=engineers
```
@@ -137,7 +137,7 @@ group.
From a client machine with a valid `krb5.conf` and `keytab`, perform a command
like the following:
-```text
+```shell-session
$ vault login -method=kerberos \
username=grace \
service=HTTP/my-service \
@@ -185,7 +185,7 @@ If possible, make it easy for someone else to reproduce the problem who
is outside of your company. For instance, if you expect that you should
be able to login using a command like:
-```text
+```shell-session
$ vault login -method=kerberos \
username=my-name \
service=HTTP/my-service \
@@ -214,7 +214,7 @@ can be referenced as an example of a full Kerberos and LDAP environment.
It runs through Docker and can be started through either one of the following
commands:
-```text
+```shell-session
$ make integration
$ make dev-env
```
diff --git a/website/pages/docs/auth/kubernetes.mdx b/website/pages/docs/auth/kubernetes.mdx
index 4b1962bcb2ec..51d8803167df 100644
--- a/website/pages/docs/auth/kubernetes.mdx
+++ b/website/pages/docs/auth/kubernetes.mdx
@@ -20,7 +20,7 @@ introduce a Vault token into a Kubernetes Pod.
The default path is `/kubernetes`. If this auth method was enabled at a
different path, specify `-path=/my-path` in the CLI.
-```text
+```shell-session
$ vault write auth/kubernetes/login role=demo jwt=...
```
@@ -29,7 +29,7 @@ $ vault write auth/kubernetes/login role=demo jwt=...
The default endpoint is `auth/kubernetes/login`. If this auth method was enabled
at a different path, use that value instead of `kubernetes`.
-```shell
+```shell-session
$ curl \
--request POST \
--data '{"jwt": "your_service_account_jwt", "role": "demo"}' \
diff --git a/website/pages/docs/auth/ldap.mdx b/website/pages/docs/auth/ldap.mdx
index 3c295aa6f26a..e63a557b0f9c 100644
--- a/website/pages/docs/auth/ldap.mdx
+++ b/website/pages/docs/auth/ldap.mdx
@@ -42,7 +42,7 @@ Directory](http://social.technet.microsoft.com/wiki/contents/articles/5312.activ
### Via the CLI
-```text
+```shell-session
$ vault login -method=ldap username=mitchellh
Password (will be hidden):
Successfully authenticated! The policies that are associated
@@ -53,7 +53,7 @@ admins
### Via the API
-```shell
+```shell-session
$ curl \
--request POST \
--data '{"password": "foo"}' \
@@ -154,7 +154,7 @@ Use `vault path-help` for more details.
- Group search will start under `ou=Groups,dc=example,dc=com`. For all group objects under that path, the `member` attribute will be checked for a match against the authenticated user.
- Group names are identified using their `cn` attribute.
-```
+```shell-session
$ vault write auth/ldap/config \
url="ldap://ldap.example.com" \
userdn="ou=Users,dc=example,dc=com" \
@@ -179,7 +179,7 @@ $ vault write auth/ldap/config \
- Username passed to vault when authenticating maps to the `sAMAccountName` attribute.
- Group membership will be resolved via the `memberOf` attribute of _user_ objects. That search will begin under `ou=Users,dc=example,dc=com`.
-```
+```shell-session
$ vault write auth/ldap/config \
url="ldap://ldap.example.com" \
userattr=sAMAccountName \
@@ -205,7 +205,7 @@ $ vault write auth/ldap/config \
- Group membership will be resolved via any one of `memberUid`, `member`, or `uniqueMember` attributes. That search will begin under `ou=Groups,dc=example,dc=com`.
- Group names are identified using the `cn` attribute.
-```
+```shell-session
$ vault write auth/ldap/config \
url="ldaps://ldap.example.com" \
userattr="uid" \
@@ -222,7 +222,7 @@ $ vault write auth/ldap/config \
Next we want to create a mapping from an LDAP group to a Vault policy:
-```
+```shell-session
$ vault write auth/ldap/groups/scientists policies=foo,bar
```
@@ -230,7 +230,7 @@ This maps the LDAP group "scientists" to the "foo" and "bar" Vault policies.
We can also add specific LDAP users to additional (potentially non-LDAP)
groups. Note that policies can also be specified on LDAP users as well.
-```
+```shell-session
$ vault write auth/ldap/groups/engineers policies=foobar
$ vault write auth/ldap/users/tesla groups=engineers policies=zoobar
```
@@ -241,7 +241,7 @@ policy.
Finally, we can test this by authenticating:
-```
+```shell-session
$ vault login -method=ldap username=tesla
Password (will be hidden):
Successfully authenticated! The policies that are associated
diff --git a/website/pages/docs/auth/mfa.mdx b/website/pages/docs/auth/mfa.mdx
index 5e70cb59f535..bd446809f75e 100644
--- a/website/pages/docs/auth/mfa.mdx
+++ b/website/pages/docs/auth/mfa.mdx
@@ -36,7 +36,7 @@ $ vault login -method=userpass \
passcode=111111
```
-```text
+```shell-session
$ vault login -method=userpass \
username=my-username \
password=test \
@@ -48,7 +48,7 @@ $ vault login -method=userpass \
The endpoint for the login is the same as for the original method. Additional
MFA information should be sent in the POST body encoded as JSON.
-```shell
+```shell-session
$ curl \
--request POST \
--data '{"password": "test", "passcode": "111111"}' \
@@ -62,7 +62,7 @@ The response is the same as for the original method.
To enable MFA for a supported method, the MFA type must be set in `mfa_config`.
For example:
-```text
+```shell-session
$ vault write auth/userpass/mfa_config type=duo
```
@@ -76,7 +76,7 @@ The Duo MFA type is configured through two paths: `duo/config` and `duo/access`.
`duo/access` contains connection information for the Duo Auth API. To configure:
-```text
+```shell-session
$ vault write auth/[mount]/duo/access \
host=[host] \
ikey=[integration key] \
@@ -86,7 +86,7 @@ $ vault write auth/[mount]/duo/access \
`duo/config` is an optional path that contains general configuration information
for Duo authentication. To configure:
-```text
+```shell-session
$ vault write auth/[mount]/duo/config \
user_agent="" \
username_format="%s"
diff --git a/website/pages/docs/auth/oci.mdx b/website/pages/docs/auth/oci.mdx
index 801bc6627a8f..424179f7e1e1 100644
--- a/website/pages/docs/auth/oci.mdx
+++ b/website/pages/docs/auth/oci.mdx
@@ -149,13 +149,13 @@ When authenticating, users can use Vault cli.
With Compute Instance credentials:
-```sh
+```shell-session
$ vault login -method=oci auth_type=instance role=devrole
```
With User credentials: [SDK Config](https://docs.cloud.oracle.com/iaas/Content/API/Concepts/sdkconfig.htm)
-```sh
+```shell-session
$ vault login -method=oci auth_type=apikey role=devrole
```
diff --git a/website/pages/docs/auth/okta.mdx b/website/pages/docs/auth/okta.mdx
index 23b5c616a699..8a10fe440f68 100644
--- a/website/pages/docs/auth/okta.mdx
+++ b/website/pages/docs/auth/okta.mdx
@@ -22,7 +22,7 @@ The mapping of groups in Okta to Vault policies is managed by using the
The default path is `/okta`. If this auth method was enabled at a different
path, specify `-path=/my-path` in the CLI.
-```text
+```shell-session
$ vault login -method=okta username=my-username
```
@@ -31,7 +31,7 @@ $ vault login -method=okta username=my-username
The default endpoint is `auth/okta/login`. If this auth method was enabled
at a different path, use that value instead of `okta`.
-```shell
+```shell-session
$ curl \
--request POST \
--data '{"password": "MY_PASSWORD"}' \
@@ -62,55 +62,55 @@ management tool.
1. Enable the Okta auth method:
-```
+```shell-session
$ vault auth enable okta
```
1. Configure Vault to communicate with your Okta account:
-```
+```shell-session
$ vault write auth/okta/config \
base_url="okta.com" \
org_name="dev-123456" \
api_token="00KzlTNCqDf0enpQKYSAYUt88KHqXax6dT11xEZz_g"
```
- **If no token is supplied, Vault will function, but only locally configured
- group membership will be available. Without a token, groups will not be
- queried.
+\*\*If no token is supplied, Vault will function, but only locally configured
+group membership will be available. Without a token, groups will not be
+queried.
- Support for okta auth with no API token is deprecated in Vault 1.4.**
+Support for okta auth with no API token is deprecated in Vault 1.4.\*\*
- For the complete list of configuration options, please see the API
- documentation.
+For the complete list of configuration options, please see the API
+documentation.
1. Map an Okta group to a Vault policy:
-```
+```shell-session
$ vault write auth/okta/groups/scientists policies=nuclear-reactor
```
- In this example, anyone who successfully authenticates via Okta who is a
- member of the "scientists" group will receive a Vault token with the
- "nuclear-reactor" policy attached.
+In this example, anyone who successfully authenticates via Okta who is a
+member of the "scientists" group will receive a Vault token with the
+"nuclear-reactor" policy attached.
- ***
+---
- It is also possible to add users directly:
+It is also possible to add users directly:
-```
+```shell-session
$ vault write auth/okta/groups/engineers policies=autopilot
$ vault write auth/okta/users/tesla groups=engineers
```
- This adds the Okta user "tesla" to the "engineers" group, which maps to
- the "autopilot" Vault policy.
+This adds the Okta user "tesla" to the "engineers" group, which maps to
+the "autopilot" Vault policy.
- **The user-policy mapping via group membership happens at token _creation
- time_. Any changes in group membership in Okta will not affect existing
- tokens that have already been provisioned. To see these changes, users
- will need to re-authenticate. You can force this by revoking the
- existing tokens.**
+**The user-policy mapping via group membership happens at token _creation
+time_. Any changes in group membership in Okta will not affect existing
+tokens that have already been provisioned. To see these changes, users
+will need to re-authenticate. You can force this by revoking the
+existing tokens.**
## API
diff --git a/website/pages/docs/auth/radius.mdx b/website/pages/docs/auth/radius.mdx
index eecb6835376c..a4c00d112408 100644
--- a/website/pages/docs/auth/radius.mdx
+++ b/website/pages/docs/auth/radius.mdx
@@ -19,7 +19,7 @@ path, specify `-path=/my-path` in the CLI.
### Via the CLI
-```text
+```shell-session
$ vault login -path=radius username=sethvargo
```
@@ -28,7 +28,7 @@ $ vault login -path=radius username=sethvargo
The default endpoint is `auth/radius/login`. If this auth method was enabled
at a different path, use that value instead of `radius`.
-```shell
+```shell-session
$ curl \
--request POST \
--data '{"password": "..."}' \
diff --git a/website/pages/docs/auth/token.mdx b/website/pages/docs/auth/token.mdx
index 43f588fadef2..2e6dbdb98fba 100644
--- a/website/pages/docs/auth/token.mdx
+++ b/website/pages/docs/auth/token.mdx
@@ -25,7 +25,7 @@ to tokens.
### Via the CLI
-```text
+```shell-session
$ vault login token=
```
diff --git a/website/pages/docs/auth/userpass.mdx b/website/pages/docs/auth/userpass.mdx
index c1f6401dad95..5533e5009ad1 100644
--- a/website/pages/docs/auth/userpass.mdx
+++ b/website/pages/docs/auth/userpass.mdx
@@ -23,7 +23,7 @@ same entry.
### Via the CLI
-```text
+```shell-session
$ vault login -method=userpass \
username=mitchellh \
password=foo
@@ -31,7 +31,7 @@ $ vault login -method=userpass \
### Via the API
-```shell
+```shell-session
$ curl \
--request POST \
--data '{"password": "foo"}' \
diff --git a/website/pages/docs/commands/audit/disable.mdx b/website/pages/docs/commands/audit/disable.mdx
index 74d04d9a4ee8..c36bfb67a38d 100644
--- a/website/pages/docs/commands/audit/disable.mdx
+++ b/website/pages/docs/commands/audit/disable.mdx
@@ -23,7 +23,7 @@ and have stored contents.
Disable the audit device enabled at "file/":
-```text
+```shell-session
$ vault audit disable file/
Success! Disabled audit device (if it was enabled) at: file/
```
diff --git a/website/pages/docs/commands/audit/enable.mdx b/website/pages/docs/commands/audit/enable.mdx
index 0c7aec7d142f..fef03420ba4c 100644
--- a/website/pages/docs/commands/audit/enable.mdx
+++ b/website/pages/docs/commands/audit/enable.mdx
@@ -19,7 +19,7 @@ logged to the device.
Enable the audit device "file" enabled at "file/":
-```text
+```shell-session
$ vault audit enable file file_path=/tmp/my-file.txt
Success! Enabled the file audit device at: file/
```
diff --git a/website/pages/docs/commands/audit/index.mdx b/website/pages/docs/commands/audit/index.mdx
index ca6135bc063e..799c34874563 100644
--- a/website/pages/docs/commands/audit/index.mdx
+++ b/website/pages/docs/commands/audit/index.mdx
@@ -19,14 +19,14 @@ documentation](/docs/audit)
Enable an audit device:
-```text
+```shell-session
$ vault audit enable file file_path=/tmp/my-file.txt
Success! Enabled the file audit device at: file/
```
List all audit devices:
-```text
+```shell-session
$ vault audit list
Path Type Description
---- ---- -----------
@@ -35,7 +35,7 @@ file/ file n/a
Disable an audit device:
-```text
+```shell-session
$ vault audit disable file/
Success! Disabled audit device (if it was enabled) at: file/
```
diff --git a/website/pages/docs/commands/audit/list.mdx b/website/pages/docs/commands/audit/list.mdx
index 8ee5ff5a25fa..5f458db9ba46 100644
--- a/website/pages/docs/commands/audit/list.mdx
+++ b/website/pages/docs/commands/audit/list.mdx
@@ -16,7 +16,7 @@ enabled audit devices and options for those devices.
List all audit devices:
-```text
+```shell-session
$ vault audit list
Path Type Description
---- ---- -----------
@@ -25,7 +25,7 @@ file/ file n/a
List detailed audit device information:
-```text
+```shell-session
$ vault audit list -detailed
Path Type Description Replication Options
---- ---- ----------- ----------- -------
diff --git a/website/pages/docs/commands/auth/disable.mdx b/website/pages/docs/commands/auth/disable.mdx
index b99b080a8d9f..03fda1a1f32c 100644
--- a/website/pages/docs/commands/auth/disable.mdx
+++ b/website/pages/docs/commands/auth/disable.mdx
@@ -22,7 +22,7 @@ revoked.** This command will block until all tokens are revoked.
Disable the auth method enabled at "userpass/":
-```text
+```shell-session
$ vault auth disable userpass/
Success! Disabled the auth method (if it existed) at: userpass/
```
diff --git a/website/pages/docs/commands/auth/enable.mdx b/website/pages/docs/commands/auth/enable.mdx
index c0cbb5dcc312..c6519055270e 100644
--- a/website/pages/docs/commands/auth/enable.mdx
+++ b/website/pages/docs/commands/auth/enable.mdx
@@ -24,14 +24,14 @@ concepts](/docs/concepts/policies) page for more information.
Enable the auth method "userpass" enabled at "userpass/":
-```text
+```shell-session
$ vault auth enable userpass
Success! Enabled the userpass auth method at: userpass/
```
Create a user:
-```text
+```shell-session
$ vault write auth/userpass/users/sethvargo password=secret
Success! Data written to: auth/userpass/users/sethvargo
```
@@ -44,7 +44,7 @@ the [auth method](/docs/auth) documentation.
The following flags are available in addition to the [standard set of
flags](/docs/commands) included on all commands.
-- `-audit-non-hmac-request-keys` `(string: "")` - Comma-separated
+- `-audit-non-hmac-request-keys` `(string: "")` - Comma-separated
string or list of keys that will not be HMAC'd by audit devices in the
request data object.
diff --git a/website/pages/docs/commands/auth/help.mdx b/website/pages/docs/commands/auth/help.mdx
index 44fffe1b7a65..261d278ec25a 100644
--- a/website/pages/docs/commands/auth/help.mdx
+++ b/website/pages/docs/commands/auth/help.mdx
@@ -21,7 +21,7 @@ Each auth method produces its own help output.
Get usage instructions for the userpass auth method:
-```text
+```shell-session
$ vault auth help userpass
Usage: vault login -method=userpass [CONFIG K=V...]
@@ -33,7 +33,7 @@ Usage: vault login -method=userpass [CONFIG K=V...]
Print usage for the auth method enabled at my-method/
-```text
+```shell-session
$ vault auth help my-method/
# ...
```
diff --git a/website/pages/docs/commands/auth/index.mdx b/website/pages/docs/commands/auth/index.mdx
index 25019d40910e..ea87733f6d06 100644
--- a/website/pages/docs/commands/auth/index.mdx
+++ b/website/pages/docs/commands/auth/index.mdx
@@ -24,14 +24,14 @@ interacting with the auth methods themselves, not authenticating to Vault.
Enable an auth method:
-```text
+```shell-session
$ vault auth enable userpass
Success! Enabled userpass auth method at: userpass/
```
List all auth methods:
-```text
+```shell-session
$ vault auth list
Path Type Description
---- ---- -----------
@@ -41,7 +41,7 @@ userpass/ userpass n/a
Get help about how to authenticate to a particular auth method:
-```text
+```shell-session
$ vault auth help userpass/
Usage: vault login -method=userpass [CONFIG K=V...]
# ...
@@ -49,14 +49,14 @@ Usage: vault login -method=userpass [CONFIG K=V...]
Disable an auth method:
-```text
+```shell-session
$ vault auth disable userpass/
Success! Disabled the auth method (if it existed) at: userpass/
```
Tune an auth method:
-```text
+```shell-session
$ vault auth tune -max-lease-ttl=30m userpass/
Success! Tuned the auth method at: userpass/
```
diff --git a/website/pages/docs/commands/auth/list.mdx b/website/pages/docs/commands/auth/list.mdx
index 4475d58926b3..3a8f93566e5a 100644
--- a/website/pages/docs/commands/auth/list.mdx
+++ b/website/pages/docs/commands/auth/list.mdx
@@ -16,7 +16,7 @@ enabled auth methods and options for those methods.
List all auth methods:
-```text
+```shell-session
$ vault auth list
Path Type Description
---- ---- -----------
@@ -26,7 +26,7 @@ userpass/ userpass n/a
List detailed auth method information:
-```text
+```shell-session
$ vault auth list -detailed
Path Type Accessor Plugin Default TTL Max TTL Replication Description
---- ---- -------- ------ ----------- ------- ----------- -----------
diff --git a/website/pages/docs/commands/auth/tune.mdx b/website/pages/docs/commands/auth/tune.mdx
index ae1d849bb22a..ff308d3f0615 100644
--- a/website/pages/docs/commands/auth/tune.mdx
+++ b/website/pages/docs/commands/auth/tune.mdx
@@ -17,7 +17,7 @@ enabled, not the TYPE!**
Tune the default lease for the auth method enabled at "github/":
-```text
+```shell-session
$ vault auth tune -default-lease-ttl=72h github/
Success! Tuned the auth method at: github/
```
@@ -27,7 +27,7 @@ Success! Tuned the auth method at: github/
The following flags are available in addition to the [standard set of
flags](/docs/commands) included on all commands.
-- `-audit-non-hmac-request-keys` `(string: "")` - Comma-separated
+- `-audit-non-hmac-request-keys` `(string: "")` - Comma-separated
string or list of keys that will not be HMAC'd by audit devices in the
request data object.
diff --git a/website/pages/docs/commands/debug.mdx b/website/pages/docs/commands/debug.mdx
index a55b03f15d1f..655c0f94c7f2 100644
--- a/website/pages/docs/commands/debug.mdx
+++ b/website/pages/docs/commands/debug.mdx
@@ -65,7 +65,7 @@ single directory. Each target, with the exception of profiling data, is captured
in a single file. For each of those targets collection is represented as a JSON
array object, with each entry captured at each interval as a JSON object.
-```text
+```shell-session
$ tree vault-debug-2019-10-15T21-44-49Z/
vault-debug-2019-10-15T21-44-49Z/
├── 2019-10-15T21-44-49Z
@@ -103,20 +103,20 @@ vault-debug-2019-10-15T21-44-49Z/
Start debug using sane defaults:
-```text
+```shell-session
$ vault debug
```
Start debug with different duration, intervals, and metrics interval values, and
skip compression:
-```text
+```shell-session
$ vault debug -duration=1m -interval=10s -metrics-interval=5s -compress=false
```
Start debug with specific targets:
-```text
+```shell-session
$ vault debug -target=host -target=metrics
```
diff --git a/website/pages/docs/commands/delete.mdx b/website/pages/docs/commands/delete.mdx
index c4371fb4adca..b6cf76c3caf9 100644
--- a/website/pages/docs/commands/delete.mdx
+++ b/website/pages/docs/commands/delete.mdx
@@ -18,19 +18,19 @@ given path.
Remove data in the static secrets engine:
-```text
+```shell-session
$ vault delete secret/my-secret
```
Uninstall an encryption key in the transit backend:
-```text
+```shell-session
$ vault delete transit/keys/my-key
```
Delete an IAM role:
-```text
+```shell-session
$ vault delete aws/roles/ops
```
diff --git a/website/pages/docs/commands/help.mdx b/website/pages/docs/commands/help.mdx
index 08c671491275..89bc5adc4d01 100644
--- a/website/pages/docs/commands/help.mdx
+++ b/website/pages/docs/commands/help.mdx
@@ -43,7 +43,7 @@ You can try it right away with any Vault with `vault path-help secret`, since
below and contains both a description of what that backend is for, along with
the paths it supports.
-```
+```shell-session
$ vault path-help secret
## DESCRIPTION
@@ -82,7 +82,7 @@ For example, below we get the help for a single secret in the `secret/`
mount point. The help shows the operations that that path supports, the
parameters it takes (for write), and a description of that specific path.
-```
+```shell-session
$ vault path-help secret/password
Request: password
Matching Route: ^.*$
diff --git a/website/pages/docs/commands/index.mdx b/website/pages/docs/commands/index.mdx
index 0b72ad15ccde..cf1d622b7dfc 100644
--- a/website/pages/docs/commands/index.mdx
+++ b/website/pages/docs/commands/index.mdx
@@ -28,13 +28,13 @@ output which corresponds to your version.
To get help, run:
-```text
+```shell-session
$ vault -h
```
To get help for a subcommand, run:
-```text
+```shell-session
$ vault -h
```
@@ -63,7 +63,7 @@ precedes the path (`auth/userpass/users/bob`) and its
[argument](/api/auth/userpass#create-update-user)
(`password="long-password"`) at last.
-```text
+```shell-session
$ vault write -address="http://127.0.0.1:8200" auth/userpass/users/bob password="long-password"
```
@@ -71,7 +71,7 @@ If multiple options (`-address` and `-namespace`) and
[arguments](/api/auth/userpass#create-update-user) (`password` and
`policies`) are specified, the command would look like:
-```text
+```shell-session
$ vault write -address="http://127.0.0.1:8200" -namespace="my-organization" \
auth/userpass/users/bob password="long-password" policies="admin"
```
@@ -100,7 +100,7 @@ arguments (where supported).
Enable autocompletion by running:
-```text
+```shell-session
$ vault -autocomplete-install
```
@@ -133,7 +133,7 @@ the `kv get` and `kv put` commands.
To write data to Vault, use the `vault kv put` command:
-```text
+```shell-session
$ vault kv put secret/password value=itsasecret
```
@@ -146,14 +146,14 @@ restrictions where appropriate.
Some commands in Vault can read data from stdin using `-` as the value. If `-`
is the entire argument, Vault expects to read a JSON object from stdin:
-```text
+```shell-session
$ echo -n '{"value":"itsasecret"}' | vault kv put secret/password -
```
In addition to reading full JSON objects, Vault can read just a value from
stdin:
-```text
+```shell-session
$ echo -n "itsasecret" | vault kv put secret/password value=-
```
@@ -163,13 +163,13 @@ Some commands can also read data from a file on disk. The usage is similar to
stdin as documented above. If an argument starts with `@`, Vault will read it as
a file:
-```text
+```shell-session
$ vault kv put secret/password @data.json
```
Or specify the contents of a file as a value:
-```text
+```shell-session
$ vault kv put secret/password value=@data.txt
```
@@ -177,7 +177,7 @@ $ vault kv put secret/password value=@data.txt
After data is persisted, read it back using `vault kv get`:
-```
+```shell-session
$ vault kv get secret/password
Key Value
--- -----
@@ -312,6 +312,6 @@ flags, such as those used for setting HTTP and output options, are available
globally, while others are specific to a particular subcommand. For a completely
list of available flags, run:
-```text
+```shell-session
$ vault -h
```
diff --git a/website/pages/docs/commands/kv/delete.mdx b/website/pages/docs/commands/kv/delete.mdx
index 7d8d1b9fde18..8babc82fbee0 100644
--- a/website/pages/docs/commands/kv/delete.mdx
+++ b/website/pages/docs/commands/kv/delete.mdx
@@ -19,14 +19,14 @@ normal get requests.
Delete the latest version of the key "creds":
-```text
+```shell-session
$ vault kv delete secret/creds
Success! Data deleted (if it existed) at: secret/creds
```
**[K/V Version 2]** Delete version 11 of key "creds":
-```text
+```shell-session
$ vault kv delete -versions=11 secret/creds
Success! Data deleted (if it existed) at: secret/creds
```
diff --git a/website/pages/docs/commands/kv/destroy.mdx b/website/pages/docs/commands/kv/destroy.mdx
index e9b7684ea748..a0bc65fc9f56 100644
--- a/website/pages/docs/commands/kv/destroy.mdx
+++ b/website/pages/docs/commands/kv/destroy.mdx
@@ -20,7 +20,7 @@ taken.
Destroy version 11 of the key "creds":
-```text
+```shell-session
$ vault kv destroy -versions=11 secret/creds
Success! Data written to: secret/destroy/creds
```
diff --git a/website/pages/docs/commands/kv/enable-versioning.mdx b/website/pages/docs/commands/kv/enable-versioning.mdx
index 5e0ce82259bb..c855dfe2fb7e 100644
--- a/website/pages/docs/commands/kv/enable-versioning.mdx
+++ b/website/pages/docs/commands/kv/enable-versioning.mdx
@@ -17,7 +17,7 @@ non-versioned key/value secrets engine (K/V Version 1) at its path.
This command turns on versioning for the K/V Version 1 secrets engine enabled at
"secret".
-```text
+```shell-session
$ vault kv enable-versioning secret
Success! Tuned the secrets engine at: secret/
```
diff --git a/website/pages/docs/commands/kv/get.mdx b/website/pages/docs/commands/kv/get.mdx
index c229e1f5bc3e..d19766b5964b 100644
--- a/website/pages/docs/commands/kv/get.mdx
+++ b/website/pages/docs/commands/kv/get.mdx
@@ -18,7 +18,7 @@ with the name but has no data, nothing is returned.
Retrieve the data of the key "creds":
-```text
+```shell-session
$ vault kv get secret/creds
====== Metadata ======
Key Value
@@ -37,7 +37,7 @@ passcode my-long-passcode
If K/V Version 1 secrets engine is enabled at "secret", the output has no
metadata since there is no versioning information associated with the data:
-```text
+```shell-session
$ vault kv get secret/creds
====== Data ======
Key Value
@@ -47,7 +47,7 @@ passcode my-long-passcode
Return only the "creds" "passcode" key:
-```text
+```shell-session
$ vault kv get -field=passcode secret/creds
my-long-passcode
```
diff --git a/website/pages/docs/commands/kv/index.mdx b/website/pages/docs/commands/kv/index.mdx
index 1d6692be935c..67772901cf26 100644
--- a/website/pages/docs/commands/kv/index.mdx
+++ b/website/pages/docs/commands/kv/index.mdx
@@ -18,7 +18,7 @@ Version 2](/docs/secrets/kv/kv-v2).
Create or update the key named "creds" in the K/V Version 2 enabled at "secret"
with the value "passcode=my-long-passcode":
-```text
+```shell-session
$ vault kv put secret/creds passcode=my-long-passcode
Key Value
--- -----
@@ -30,7 +30,7 @@ version 1
Read this value back:
-```text
+```shell-session
$ vault kv get secret/creds
====== Metadata ======
Key Value
@@ -48,7 +48,7 @@ passcode my-long-passcode
Get metadata for the key named "creds":
-```text
+```shell-session
$ vault kv metadata get secret/creds
========== Metadata ==========
Key Value
@@ -71,7 +71,7 @@ destroyed false
Get a specific version of the key named "creds":
-```text
+```shell-session
$ vault kv get -version=1 secret/creds
====== Metadata ======
Key Value
diff --git a/website/pages/docs/commands/kv/list.mdx b/website/pages/docs/commands/kv/list.mdx
index 7db7861a7887..b0dc7de9b3e5 100644
--- a/website/pages/docs/commands/kv/list.mdx
+++ b/website/pages/docs/commands/kv/list.mdx
@@ -21,7 +21,7 @@ Use this command to list all existing key names at a specific path.
List values under the key "my-app":
-```text
+```shell-session
$ vault kv list secret/my-app/
Keys
----
diff --git a/website/pages/docs/commands/kv/metadata.mdx b/website/pages/docs/commands/kv/metadata.mdx
index 4b19a094c065..adb3967827f8 100644
--- a/website/pages/docs/commands/kv/metadata.mdx
+++ b/website/pages/docs/commands/kv/metadata.mdx
@@ -38,7 +38,7 @@ provided key.
Deletes all versions and metadata of the key "creds":
-```text
+```shell-session
$ vault kv metadata delete secret/creds
Success! Data deleted (if it existed) at: secret/metadata/creds
```
@@ -52,7 +52,7 @@ the given key name. If no key exists with that name, an error is returned.
Retrieves the metadata of the key name, "creds":
-```text
+```shell-session
$ vault kv metadata get secret/creds
========== Metadata ==========
Key Value
@@ -91,14 +91,14 @@ secrets engine or to update key configuration for a specified key.
Create a key in the K/V v2 with no data at the key "creds":
-```text
+```shell-session
$ vault kv metadata put secret/creds
Success! Data written to: secret/metadata/creds
```
Set the maximum number of versions to keep for the key "creds":
-```text
+```shell-session
$ vault kv metadata put -max-versions=5 secret/creds
Success! Data written to: secret/metadata/creds
```
@@ -109,7 +109,7 @@ permanently deleted.
Require Check-and-Set for the key "creds":
-```text
+```shell-session
$ vault kv metadata put -cas-required secret/creds
```
@@ -119,7 +119,7 @@ configuration will be used.
Set the length of time before a version is deleted for the key "creds":
-```text
+```shell-session
$ vault kv metadata put -delete-version-after="3h25m19s" secret/creds
```
diff --git a/website/pages/docs/commands/kv/patch.mdx b/website/pages/docs/commands/kv/patch.mdx
index 86d38cc06561..6276c932bb7e 100644
--- a/website/pages/docs/commands/kv/patch.mdx
+++ b/website/pages/docs/commands/kv/patch.mdx
@@ -23,7 +23,7 @@ data.
If you wish to add an additional key-value (`ttl=48h`) to the existing data at
the key "creds":
-```text
+```shell-session
$ vault kv patch secret/creds ttl=48h
Key Value
--- -----
@@ -36,20 +36,20 @@ version 6
**NOTE:** The `kv put` command requires both the existing data and
the data you wish to add in order to accomplish the same result.
-```text
+```shell-session
$ vault kv put secret/creds ttl=48h passcode=my-long-passcode
```
The data can also be consumed from a file on disk by prefixing with the "@"
symbol. For example:
-```text
+```shell-session
$ vault kv patch secret/creds @data.json
```
Or it can be read from stdin using the "-" symbol:
-```text
+```shell-session
$ echo "abcd1234" | vault kv patch secret/foo bar=-
```
diff --git a/website/pages/docs/commands/kv/put.mdx b/website/pages/docs/commands/kv/put.mdx
index 53fef9fa4448..862aff865cc4 100644
--- a/website/pages/docs/commands/kv/put.mdx
+++ b/website/pages/docs/commands/kv/put.mdx
@@ -25,20 +25,20 @@ policy granting the "update" capability.
Writes the data to the key "creds":
-```text
+```shell-session
$ vault kv put secret/creds passcode=my-long-passcode
```
The data can also be consumed from a file on disk by prefixing with the "@"
symbol. For example:
-```text
+```shell-session
$ vault kv put secret/foo @data.json
```
Or it can be read from stdin using the "-" symbol:
-```text
+```shell-session
$ echo "abcd1234" | vault kv put secret/foo bar=-
```
diff --git a/website/pages/docs/commands/kv/rollback.mdx b/website/pages/docs/commands/kv/rollback.mdx
index 4e41432b1c24..ee766bbf6ac1 100644
--- a/website/pages/docs/commands/kv/rollback.mdx
+++ b/website/pages/docs/commands/kv/rollback.mdx
@@ -22,7 +22,7 @@ overwritten data.
Restores the version 2 of the data at key "creds":
-```text
+```shell-session
$ vault kv rollback -version=2 secret/creds
Key Value
--- -----
diff --git a/website/pages/docs/commands/kv/undelete.mdx b/website/pages/docs/commands/kv/undelete.mdx
index 5514ad95e30f..2e532b8401b8 100644
--- a/website/pages/docs/commands/kv/undelete.mdx
+++ b/website/pages/docs/commands/kv/undelete.mdx
@@ -21,7 +21,7 @@ returned on get requests.
Undelete version 3 of the key "creds":
-```text
+```shell-session
$ vault kv undelete -versions=3 secret/creds
Success! Data written to: secret/undelete/creds
```
diff --git a/website/pages/docs/commands/lease.mdx b/website/pages/docs/commands/lease.mdx
index bd119b5c1bd9..a67671daafe2 100644
--- a/website/pages/docs/commands/lease.mdx
+++ b/website/pages/docs/commands/lease.mdx
@@ -16,7 +16,7 @@ secrets. For leases attached to tokens, use the [`vault token`](/docs/commands/t
Renew a lease:
-```text
+```shell-session
$ vault lease renew database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
Key Value
--- -----
@@ -27,7 +27,7 @@ lease_renewable true
Revoke a lease:
-```text
+```shell-session
$ vault lease revoke database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
Success! Revoked lease: database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
```
diff --git a/website/pages/docs/commands/lease/index.mdx b/website/pages/docs/commands/lease/index.mdx
index bd119b5c1bd9..a67671daafe2 100644
--- a/website/pages/docs/commands/lease/index.mdx
+++ b/website/pages/docs/commands/lease/index.mdx
@@ -16,7 +16,7 @@ secrets. For leases attached to tokens, use the [`vault token`](/docs/commands/t
Renew a lease:
-```text
+```shell-session
$ vault lease renew database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
Key Value
--- -----
@@ -27,7 +27,7 @@ lease_renewable true
Revoke a lease:
-```text
+```shell-session
$ vault lease revoke database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
Success! Revoked lease: database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
```
diff --git a/website/pages/docs/commands/lease/renew.mdx b/website/pages/docs/commands/lease/renew.mdx
index 8136291afbd6..964adbf3a741 100644
--- a/website/pages/docs/commands/lease/renew.mdx
+++ b/website/pages/docs/commands/lease/renew.mdx
@@ -20,7 +20,7 @@ lease does not change the contents of the secret.
Renew a lease:
-```text
+```shell-session
$ vault lease renew database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
Success! Revoked lease: database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
```
diff --git a/website/pages/docs/commands/lease/revoke.mdx b/website/pages/docs/commands/lease/revoke.mdx
index 37bf9603f611..011004e2c163 100644
--- a/website/pages/docs/commands/lease/revoke.mdx
+++ b/website/pages/docs/commands/lease/revoke.mdx
@@ -16,14 +16,14 @@ underlying secret.
Revoke a lease:
-```text
+```shell-session
$ vault lease revoke database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
Success! Revoked lease: database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786bdc83
```
Revoke a lease which starts with a prefix:
-```text
+```shell-session
$ vault lease revoke -prefix database/creds
Success! Revoked any leases with prefix: database/creds
```
diff --git a/website/pages/docs/commands/list.mdx b/website/pages/docs/commands/list.mdx
index 5d0424768ced..f85cf1616bbe 100644
--- a/website/pages/docs/commands/list.mdx
+++ b/website/pages/docs/commands/list.mdx
@@ -16,7 +16,7 @@ list keys in a given secrets engine.
List values under the "my-app" folder of the KV secrets engine:
-```text
+```shell-session
$ vault list secret/my-app/
```
diff --git a/website/pages/docs/commands/login.mdx b/website/pages/docs/commands/login.mdx
index f0cebee90423..f47f32900b45 100644
--- a/website/pages/docs/commands/login.mdx
+++ b/website/pages/docs/commands/login.mdx
@@ -38,7 +38,7 @@ the returned token is automatically unwrapped unless:
By default, login uses a "token" method:
-```text
+```shell-session
$ vault login s.3jnbMAKl1i4YS3QoKdbHzGXq
Success! You are now authenticated. The token information displayed below
is already stored in the token helper. You do NOT need to run "vault login"
@@ -57,7 +57,7 @@ policies ["admin" "default"]
To login with a different method, use `-method`:
-```text
+```shell-session
$ vault login -method=userpass username=my-username
Password (will be hidden):
Success! You are now authenticated. The token information below is already
@@ -81,7 +81,7 @@ argument (`username=my-username`).
If a github auth method was enabled at the path "github-prod":
-```text
+```shell-session
$ vault login -method=github -path=github-prod
Success! You are now authenticated. The token information below is already
stored in the token helper. You do NOT need to run "vault login" again. Future
diff --git a/website/pages/docs/commands/namespace.mdx b/website/pages/docs/commands/namespace.mdx
index 28f32986a77b..5c25db41905e 100644
--- a/website/pages/docs/commands/namespace.mdx
+++ b/website/pages/docs/commands/namespace.mdx
@@ -13,25 +13,25 @@ The `namespace` command groups subcommands for interacting with namespaces.
List all namespaces:
-```text
+```shell-session
$ vault namespace list
```
Create a namespace at the path `ns1/`:
-```text
+```shell-session
$ vault namespace create ns1/
```
Delete the namespace at path `ns1/`:
-```text
+```shell-session
$ vault namespace delete ns1/
```
Lookup the namespace information at path `ns1/`:
-```text
+```shell-session
$ vault namespace lookup ns1/
```
diff --git a/website/pages/docs/commands/operator/generate-root.mdx b/website/pages/docs/commands/operator/generate-root.mdx
index a27f6c37c881..155efdeb9e06 100644
--- a/website/pages/docs/commands/operator/generate-root.mdx
+++ b/website/pages/docs/commands/operator/generate-root.mdx
@@ -35,19 +35,19 @@ step-by-step instructions.
Generate an OTP code for the final token:
-```text
+```shell-session
$ vault operator generate-root -generate-otp
```
Start a root token generation:
-```text
+```shell-session
$ vault operator generate-root -init -otp="..."
```
Enter an unseal key to progress root token generation:
-```text
+```shell-session
$ vault operator generate-root -otp="..."
```
diff --git a/website/pages/docs/commands/operator/index.mdx b/website/pages/docs/commands/operator/index.mdx
index 5524c9671a0e..1f165e51d0dd 100644
--- a/website/pages/docs/commands/operator/index.mdx
+++ b/website/pages/docs/commands/operator/index.mdx
@@ -16,7 +16,7 @@ Most users will not need to interact with these commands.
Initialize a new Vault cluster:
-```text
+```shell-session
$ vault operator init
Unseal Key 1: sP/4C/fwIDjJmHEC2bi/1Pa43uKhsUQMmiB31GRzFc0R
Unseal Key 2: kHkw2xTBelbDFIMEgEC8NVX7NDSAZ+rdgBJ/HuJwxOX+
@@ -31,14 +31,14 @@ Initial Root Token: 6662bb4a-afd0-4b6b-faad-e237fb564568
Force a Vault to resign leadership in a cluster:
-```text
+```shell-session
$ vault operator step-down
Success! Stepped down: https://127.0.0.1:8200
```
Rotate Vault's underlying encryption key:
-```text
+```shell-session
$ vault operator rotate
Success! Rotated key
diff --git a/website/pages/docs/commands/operator/init.mdx b/website/pages/docs/commands/operator/init.mdx
index 141de3977a7f..0d48963b32b9 100644
--- a/website/pages/docs/commands/operator/init.mdx
+++ b/website/pages/docs/commands/operator/init.mdx
@@ -30,13 +30,13 @@ For more information on sealing and unsealing, please the [seal concepts page](/
Start initialization with the default options:
-```text
+```shell-session
$ vault operator init
```
Initialize, but encrypt the unseal keys with pgp keys:
-```text
+```shell-session
$ vault operator init \
-key-shares=3 \
-key-threshold=2 \
@@ -45,7 +45,7 @@ $ vault operator init \
Initialize Auto Unseal, but encrypt the recovery keys with pgp keys:
-```text
+```shell-session
$ vault operator init \
-recovery-shares=1 \
-recovery-threshold=1 \
@@ -54,7 +54,7 @@ $ vault operator init \
Encrypt the initial root token using a pgp key:
-```text
+```shell-session
$ vault operator init -root-token-pgp-key="keybase:hashicorp"
```
diff --git a/website/pages/docs/commands/operator/key-status.mdx b/website/pages/docs/commands/operator/key-status.mdx
index 9bea1aee7d83..bb9baf4b72fd 100644
--- a/website/pages/docs/commands/operator/key-status.mdx
+++ b/website/pages/docs/commands/operator/key-status.mdx
@@ -16,7 +16,7 @@ Specifically, the current key term and the key installation time.
Get the key status:
-```text
+```shell-session
$ vault operator key-status
Key Term 2
Install Time 01 Jan 17 12:30 UTC
diff --git a/website/pages/docs/commands/operator/migrate.mdx b/website/pages/docs/commands/operator/migrate.mdx
index 34d4146383c8..30a34b996994 100644
--- a/website/pages/docs/commands/operator/migrate.mdx
+++ b/website/pages/docs/commands/operator/migrate.mdx
@@ -27,7 +27,7 @@ will not allow starting the server if a migration is in progress.
Migrate all keys:
-```text
+```shell-session
$ vault operator migrate -config migrate.hcl
2018-09-20T14:23:23.656-0700 [INFO ] copied key: data/core/seal-config
@@ -41,7 +41,7 @@ Migration is done in a consistent, sorted order. If the migration is halted or
exits before completion (e.g. due to a connection error with a storage backend),
it may be resumed from an arbitrary key prefix:
-```text
+```shell-session
$ vault operator migrate -config migrate.hcl -start "data/logical/fd"
```
@@ -94,7 +94,7 @@ cluster_addr = "http://127.0.0.1:8201"
Vault will need to be offline during the migration process. First, stop Vault.
Then, run the migration on the server you wish to become a the new Vault node.
-```text
+```shell-session
$ vault operator migrate -config migrate.hcl
2018-09-20T14:23:23.656-0700 [INFO ] copied key: data/core/seal-config
diff --git a/website/pages/docs/commands/operator/rekey.mdx b/website/pages/docs/commands/operator/rekey.mdx
index e8c01b10767d..9616bff15c17 100644
--- a/website/pages/docs/commands/operator/rekey.mdx
+++ b/website/pages/docs/commands/operator/rekey.mdx
@@ -29,7 +29,7 @@ step-by-step instructions.
Initialize a rekey:
-```text
+```shell-session
$ vault operator rekey \
-init \
-key-shares=15 \
@@ -38,7 +38,7 @@ $ vault operator rekey \
Initialize a rekey and activate the verification process:
-```text
+```shell-session
$ vault operator rekey \
-init \
-key-shares=15 \
@@ -48,7 +48,7 @@ $ vault operator rekey \
Rekey and encrypt the resulting unseal keys with PGP:
-```text
+```shell-session
$ vault operator rekey \
-init \
-key-shares=3 \
@@ -58,7 +58,7 @@ $ vault operator rekey \
Rekey an Auto Unseal vault and encrypt the resulting recovery keys with PGP:
-```text
+```shell-session
$ vault operator rekey \
-target=recovery \
-init \
@@ -69,7 +69,7 @@ $ vault operator rekey \
Store encrypted PGP keys in Vault's core:
-```text
+```shell-session
$ vault operator rekey \
-init \
-pgp-keys="..." \
@@ -78,19 +78,19 @@ $ vault operator rekey \
Retrieve backed-up unseal keys:
-```text
+```shell-session
$ vault operator rekey -backup-retrieve
```
Delete backed-up unseal keys:
-```text
+```shell-session
$ vault operator rekey -backup-delete
```
Perform the verification of the rekey using the verification nonce:
-```text
+```shell-session
$ vault operator rekey -verify -nonce="..."
```
diff --git a/website/pages/docs/commands/operator/rotate.mdx b/website/pages/docs/commands/operator/rotate.mdx
index f224b6fdc67a..714e239933aa 100644
--- a/website/pages/docs/commands/operator/rotate.mdx
+++ b/website/pages/docs/commands/operator/rotate.mdx
@@ -24,7 +24,7 @@ storage backend.
Rotate Vault's encryption key:
-```text
+```shell-session
$ vault operator rotate
Key Term 3
Install Time 01 May 17 10:30 UTC
diff --git a/website/pages/docs/commands/operator/seal.mdx b/website/pages/docs/commands/operator/seal.mdx
index 24d21c6b4d31..b6617ea8dad6 100644
--- a/website/pages/docs/commands/operator/seal.mdx
+++ b/website/pages/docs/commands/operator/seal.mdx
@@ -32,7 +32,7 @@ page](/docs/concepts/seal).
Seal a Vault server:
-```text
+```shell-session
$ vault operator seal
Success! Vault is sealed.
```
diff --git a/website/pages/docs/commands/operator/step-down.mdx b/website/pages/docs/commands/operator/step-down.mdx
index a013f5dac657..14462c8dc3f2 100644
--- a/website/pages/docs/commands/operator/step-down.mdx
+++ b/website/pages/docs/commands/operator/step-down.mdx
@@ -19,7 +19,7 @@ become active again.
Force a Vault server to step down as the leader:
-```text
+```shell-session
$ vault operator step-down
Success! Stepped down: http://127.0.0.1:8200
```
diff --git a/website/pages/docs/commands/operator/unseal.mdx b/website/pages/docs/commands/operator/unseal.mdx
index b950411ea0f8..85dff04d68b6 100644
--- a/website/pages/docs/commands/operator/unseal.mdx
+++ b/website/pages/docs/commands/operator/unseal.mdx
@@ -17,13 +17,13 @@ key (an "unseal key").
The unseal key can be supplied as an argument to the command, but this is
not recommended as the unseal key will be available in your history:
-```text
+```shell-session
$ vault operator unseal IXyR0OJnSFobekZMMCKCoVEpT7wI6l+USMzE3IcyDyo=
```
Instead, run the command with no arguments and it will prompt for the key:
-```text
+```shell-session
$ vault operator unseal
Key (will be hidden): IXyR0OJnSFobekZMMCKCoVEpT7wI6l+USMzE3IcyDyo=
```
@@ -35,7 +35,7 @@ page](/docs/concepts/seal).
Provide an unseal key:
-```text
+```shell-session
$ vault operator unseal
Key (will be hidden):
Sealed: false
diff --git a/website/pages/docs/commands/path-help.mdx b/website/pages/docs/commands/path-help.mdx
index 7bffceec7e66..2fe40addbf37 100644
--- a/website/pages/docs/commands/path-help.mdx
+++ b/website/pages/docs/commands/path-help.mdx
@@ -33,7 +33,7 @@ exact.
Get help output for the KV secrets engine:
-```text
+```shell-session
$ vault path-help secret
## DESCRIPTION
@@ -61,7 +61,7 @@ you may or may not be able to access certain paths.
Once you've found a path you like, you can learn more about it by using `vault path-help ` where "path" is a path that matches one of the regular
expressions from the backend help.
-```text
+```shell-session
$ vault path-help secret/password
Request: password
Matching Route: ^.*$
diff --git a/website/pages/docs/commands/plugin/deregister.mdx b/website/pages/docs/commands/plugin/deregister.mdx
index 99637fa9fb51..c29017dc28c2 100644
--- a/website/pages/docs/commands/plugin/deregister.mdx
+++ b/website/pages/docs/commands/plugin/deregister.mdx
@@ -17,7 +17,7 @@ type of "auth", "database", or "secret" must be included.
Deregister a plugin:
-```text
+```shell-session
$ vault plugin deregister auth my-custom-plugin
Success! Deregistered plugin (if it was registered): my-custom-plugin
```
diff --git a/website/pages/docs/commands/plugin/index.mdx b/website/pages/docs/commands/plugin/index.mdx
index d50c97d56c15..dd900384280d 100644
--- a/website/pages/docs/commands/plugin/index.mdx
+++ b/website/pages/docs/commands/plugin/index.mdx
@@ -16,7 +16,7 @@ the plugin catalog
List all available plugins in the catalog:
-```text
+```shell-session
$ vault plugin list
Plugins
@@ -27,7 +27,7 @@ my-custom-plugin
Register a new plugin to the catalog:
-```text
+```shell-session
$ vault plugin register \
-sha256=d3f0a8be02f6c074cf38c9c99d4d04c9c6466249 \
my-custom-plugin
@@ -36,7 +36,7 @@ Success! Registered plugin: my-custom-plugin
Get information about a plugin in the catalog:
-```text
+```shell-session
$ vault plugin info my-custom-plugin
Key Value
--- -----
diff --git a/website/pages/docs/commands/plugin/info.mdx b/website/pages/docs/commands/plugin/info.mdx
index 81e06d3df4f4..8f11fa1fb349 100644
--- a/website/pages/docs/commands/plugin/info.mdx
+++ b/website/pages/docs/commands/plugin/info.mdx
@@ -14,7 +14,7 @@ The plugin's type of "auth", "database", or "secret" must be included.
Display information about a plugin
-```text
+```shell-session
$ vault plugin info auth my-custom-plugin
Key Value
diff --git a/website/pages/docs/commands/plugin/list.mdx b/website/pages/docs/commands/plugin/list.mdx
index c111c4b440cd..3cd0e804db47 100644
--- a/website/pages/docs/commands/plugin/list.mdx
+++ b/website/pages/docs/commands/plugin/list.mdx
@@ -14,7 +14,7 @@ It can be used alone or with a type such as "auth", "database", or "secret".
List all available plugins in the catalog.
-```text
+```shell-session
$ vault plugin list
Plugins
diff --git a/website/pages/docs/commands/plugin/register.mdx b/website/pages/docs/commands/plugin/register.mdx
index b8c9eaea398b..d833ce82cfc1 100644
--- a/website/pages/docs/commands/plugin/register.mdx
+++ b/website/pages/docs/commands/plugin/register.mdx
@@ -16,7 +16,7 @@ The plugin's type of "auth", "database", or "secret" must be included.
Register a plugin:
-```text
+```shell-session
$ vault plugin register \
-sha256=d3f0a8be02f6c074cf38c9c99d4d04c9c6466249 \
auth my-custom-plugin
@@ -25,7 +25,7 @@ Success! Registered plugin: my-custom-plugin
Register a plugin with custom args:
-```text
+```shell-session
$ vault plugin register \
-sha256=d3f0a8be02f6c074cf38c9c99d4d04c9c6466249 \
-args=--with-glibc,--with-curl-bindings \
diff --git a/website/pages/docs/commands/plugin/reload.mdx b/website/pages/docs/commands/plugin/reload.mdx
index d1a484d1b37c..050553f3f4f5 100644
--- a/website/pages/docs/commands/plugin/reload.mdx
+++ b/website/pages/docs/commands/plugin/reload.mdx
@@ -9,14 +9,14 @@ description: |-
# plugin reload
The `plugin reload` command is used to reload mounted plugin backends. Either
-the plugin name (`plugin`) or the desired plugin backend mounts (`mounts`)
+the plugin name (`plugin`) or the desired plugin backend mounts (`mounts`)
must be provided, but not both.
## Examples
Reload a plugin:
-```text
+```shell-session
$ vault plugin reload -plugin my-custom-plugin
Success! Reloaded plugin: my-custom-plugin
```
diff --git a/website/pages/docs/commands/policy/delete.mdx b/website/pages/docs/commands/policy/delete.mdx
index 44c5a418a5cf..3b0d1e28f387 100644
--- a/website/pages/docs/commands/policy/delete.mdx
+++ b/website/pages/docs/commands/policy/delete.mdx
@@ -21,7 +21,7 @@ are built-in policies.
Delete the policy named "my-policy":
-```text
+```shell-session
$ vault policy delete my-policy
```
diff --git a/website/pages/docs/commands/policy/fmt.mdx b/website/pages/docs/commands/policy/fmt.mdx
index 6be72bf60be1..e7cce2301ba1 100644
--- a/website/pages/docs/commands/policy/fmt.mdx
+++ b/website/pages/docs/commands/policy/fmt.mdx
@@ -18,7 +18,7 @@ policy file contents.
Format the local file "my-policy.hcl":
-```text
+```shell-session
$ vault policy fmt my-policy.hcl
```
diff --git a/website/pages/docs/commands/policy/index.mdx b/website/pages/docs/commands/policy/index.mdx
index 7dc14b5458f2..996295459335 100644
--- a/website/pages/docs/commands/policy/index.mdx
+++ b/website/pages/docs/commands/policy/index.mdx
@@ -19,19 +19,19 @@ documentation](/docs/concepts/policies).
List all enabled policies:
-```text
+```shell-session
$ vault policy list
```
Create a policy named "my-policy" from contents on local disk:
-```text
+```shell-session
$ vault policy write my-policy ./my-policy.hcl
```
Delete the policy named my-policy:
-```text
+```shell-session
$ vault policy delete my-policy
```
diff --git a/website/pages/docs/commands/policy/list.mdx b/website/pages/docs/commands/policy/list.mdx
index 2088e926d2b5..cbf00ea0b5b9 100644
--- a/website/pages/docs/commands/policy/list.mdx
+++ b/website/pages/docs/commands/policy/list.mdx
@@ -16,7 +16,7 @@ the Vault server.
List the available policies:
-```text
+```shell-session
$ vault policy list
default
root
diff --git a/website/pages/docs/commands/policy/read.mdx b/website/pages/docs/commands/policy/read.mdx
index 19afd3e67f9b..ca99defd3c83 100644
--- a/website/pages/docs/commands/policy/read.mdx
+++ b/website/pages/docs/commands/policy/read.mdx
@@ -16,7 +16,7 @@ named NAME. If the policy does not exist, an error is returned.
Read the policy named "my-policy":
-```text
+```shell-session
$ vault policy read my-policy
```
diff --git a/website/pages/docs/commands/policy/write.mdx b/website/pages/docs/commands/policy/write.mdx
index 4963dc3d5b73..0dc6e25cedc8 100644
--- a/website/pages/docs/commands/policy/write.mdx
+++ b/website/pages/docs/commands/policy/write.mdx
@@ -21,13 +21,13 @@ documentation](/docs/concepts/policies).
Upload a policy named "my-policy" from "/tmp/policy.hcl" on the local disk:
-```text
+```shell-session
$ vault policy write my-policy /tmp/policy.hcl
```
Upload a policy from stdin:
-```text
+```shell-session
$ cat my-policy.hcl | vault policy write my-policy -
```
diff --git a/website/pages/docs/commands/read.mdx b/website/pages/docs/commands/read.mdx
index 0d6afe30f45e..d68aa0b4cbef 100644
--- a/website/pages/docs/commands/read.mdx
+++ b/website/pages/docs/commands/read.mdx
@@ -20,7 +20,7 @@ corresponds to the secrets engine in use.
Read a secret from the static secrets engine:
-```text
+```shell-session
$ vault read secret/my-secret
Key Value
--- -----
diff --git a/website/pages/docs/commands/secrets/disable.mdx b/website/pages/docs/commands/secrets/disable.mdx
index bbeb7844f924..663c347bacdf 100644
--- a/website/pages/docs/commands/secrets/disable.mdx
+++ b/website/pages/docs/commands/secrets/disable.mdx
@@ -21,7 +21,7 @@ engine are immediately revoked.**
Disable the secrets engine enabled at aws/:
-```text
+```shell-session
$ vault secrets disable aws/
```
diff --git a/website/pages/docs/commands/secrets/enable.mdx b/website/pages/docs/commands/secrets/enable.mdx
index 79114471dfbb..9e3fb1f956f3 100644
--- a/website/pages/docs/commands/secrets/enable.mdx
+++ b/website/pages/docs/commands/secrets/enable.mdx
@@ -29,26 +29,26 @@ documentation](/docs/secrets).
Enable the AWS secrets engine at "aws/":
-```text
+```shell-session
$ vault secrets enable aws
Success! Enabled the aws secrets engine at: aws/
```
Enable the SSH secrets engine at ssh-prod/:
-```text
+```shell-session
$ vault secrets enable -path=ssh-prod ssh
```
Enable the database secrets engine with an explicit maximum TTL of 30m:
-```text
+```shell-session
$ vault secrets enable -max-lease-ttl=30m database
```
Enable a custom plugin (after it is registered in the plugin registry):
-```text
+```shell-session
$ vault secrets enable -path=my-secrets my-plugin
```
@@ -60,7 +60,7 @@ the [secrets engine](/docs/secrets) documentation.
The following flags are available in addition to the [standard set of
flags](/docs/commands) included on all commands.
-- `-audit-non-hmac-request-keys` `(string: "")` - Comma-separated
+- `-audit-non-hmac-request-keys` `(string: "")` - Comma-separated
string or list of keys that will not be HMAC'd by audit devices in the
request data object.
diff --git a/website/pages/docs/commands/secrets/index.mdx b/website/pages/docs/commands/secrets/index.mdx
index 04b9b3b1284e..fff9c031e4a8 100644
--- a/website/pages/docs/commands/secrets/index.mdx
+++ b/website/pages/docs/commands/secrets/index.mdx
@@ -23,14 +23,14 @@ documentation](/docs/secrets).
Enable a secrets engine:
-```text
+```shell-session
$ vault secrets enable database
Success! Enabled the database secrets engine at: database/
```
List all secrets engines:
-```text
+```shell-session
$ vault secrets list
Path Type Description
---- ---- -----------
@@ -42,21 +42,21 @@ sys/ system system endpoints used for control, policy and debuggi
Move a secrets engine to a new path:
-```text
+```shell-session
$ vault secrets move database/ db-prod/
Success! Moved secrets engine database/ to: db-prod/
```
Tune a secrets engine:
-```text
+```shell-session
$ vault secrets tune -max-lease-ttl=30m db-prod/
Success! Tuned the secrets engine at: db-prod/
```
Disable a secrets engine:
-```text
+```shell-session
$ vault secrets disable db-prod/
Success! Disabled the secrets engine (if it existed) at: db-prod/
```
diff --git a/website/pages/docs/commands/secrets/list.mdx b/website/pages/docs/commands/secrets/list.mdx
index 66175184ee72..382eeef13cb4 100644
--- a/website/pages/docs/commands/secrets/list.mdx
+++ b/website/pages/docs/commands/secrets/list.mdx
@@ -20,7 +20,7 @@ that the system default is in use.
List all enabled secrets engines:
-```text
+```shell-session
$ vault secrets list
Path Type Description
---- ---- -----------
@@ -31,7 +31,7 @@ sys/ system system endpoints used for control, policy and debuggi
List all enabled secrets engines with detailed output:
-```text
+```shell-session
$ vault secrets list -detailed
Path Type Accessor Plugin Default TTL Max TTL Force No Cache Replication Description
---- ---- -------- ------ ----------- ------- -------------- ----------- -----------
diff --git a/website/pages/docs/commands/secrets/move.mdx b/website/pages/docs/commands/secrets/move.mdx
index 3c79de7464aa..eee89852eddb 100644
--- a/website/pages/docs/commands/secrets/move.mdx
+++ b/website/pages/docs/commands/secrets/move.mdx
@@ -21,7 +21,7 @@ engine.**
Move the existing secrets engine at secret/ to kv/:
-```text
+```shell-session
$ vault secrets move secret/ kv/
```
diff --git a/website/pages/docs/commands/secrets/tune.mdx b/website/pages/docs/commands/secrets/tune.mdx
index ac1034665557..ed35542fa6ba 100644
--- a/website/pages/docs/commands/secrets/tune.mdx
+++ b/website/pages/docs/commands/secrets/tune.mdx
@@ -18,7 +18,7 @@ engine is enabled, not the TYPE!
Tune the default lease for the PKI secrets engine:
-```text
+```shell-session
$ vault secrets tune -default-lease-ttl=72h pki/
```
@@ -27,7 +27,7 @@ $ vault secrets tune -default-lease-ttl=72h pki/
The following flags are available in addition to the [standard set of
flags](/docs/commands) included on all commands.
-- `-audit-non-hmac-request-keys` `(string: "")` - Comma-separated
+- `-audit-non-hmac-request-keys` `(string: "")` - Comma-separated
string or list of keys that will not be HMAC'd by audit devices in the
request data object.
diff --git a/website/pages/docs/commands/server.mdx b/website/pages/docs/commands/server.mdx
index 977610486491..f05ded605189 100644
--- a/website/pages/docs/commands/server.mdx
+++ b/website/pages/docs/commands/server.mdx
@@ -31,13 +31,13 @@ For more information, please see:
Start a server with a configuration file:
-```text
+```shell-session
$ vault server -config=/etc/vault/config.hcl
```
Run in "dev" mode with a custom initial root token:
-```text
+```shell-session
$ vault server -dev -dev-root-token-id="root"
```
diff --git a/website/pages/docs/commands/ssh.mdx b/website/pages/docs/commands/ssh.mdx
index 859d78ab15ed..cfcc82c4136f 100644
--- a/website/pages/docs/commands/ssh.mdx
+++ b/website/pages/docs/commands/ssh.mdx
@@ -23,19 +23,19 @@ with the proper commands to provide an "SSH-like" consistent experience.
SSH using the OTP mode (requires [sshpass](https://linux.die.net/man/1/sshpass)
for full automation):
-```text
+```shell-session
$ vault ssh -mode=otp -role=my-role user@1.2.3.4
```
SSH using the CA mode:
-```text
+```shell-session
$ vault ssh -mode=ca -role=my-role user@1.2.3.4
```
SSH using CA mode with host key verification:
-```text
+```shell-session
$ vault ssh \
-mode=ca \
-role=my-role \
diff --git a/website/pages/docs/commands/status.mdx b/website/pages/docs/commands/status.mdx
index 167d38b74a2e..d2c824879f02 100644
--- a/website/pages/docs/commands/status.mdx
+++ b/website/pages/docs/commands/status.mdx
@@ -24,7 +24,7 @@ The exit code reflects the seal status:
Check the status:
-```text
+```shell-session
$ vault status
Sealed: false
Key Shares: 5
diff --git a/website/pages/docs/commands/token/capabilities.mdx b/website/pages/docs/commands/token/capabilities.mdx
index 2240fabd47f4..87864132d8ec 100644
--- a/website/pages/docs/commands/token/capabilities.mdx
+++ b/website/pages/docs/commands/token/capabilities.mdx
@@ -21,14 +21,14 @@ token.
List capabilities for the local token on the "secret/foo" path:
-```text
+```shell-session
$ vault token capabilities secret/foo
read
```
List capabilities for a token on the "cubbyhole/foo" path:
-```text
+```shell-session
$ vault token capabilities 96ddf4bc-d217-f3ba-f9bd-017055595017 database/creds/readonly
deny
```
diff --git a/website/pages/docs/commands/token/create.mdx b/website/pages/docs/commands/token/create.mdx
index fcfd00568783..5878f4aeb55f 100644
--- a/website/pages/docs/commands/token/create.mdx
+++ b/website/pages/docs/commands/token/create.mdx
@@ -31,7 +31,7 @@ If a role is specified, the role may override parameters specified here.
Create a token attached to specific policies:
-```text
+```shell-session
$ vault token create -policy=my-policy -policy=other-policy
Key Value
--- -----
@@ -44,7 +44,7 @@ token_policies [default my-policy other-policy]
Create a periodic token:
-```text
+```shell-session
$ vault token create -period=30m
Key Value
--- -----
diff --git a/website/pages/docs/commands/token/index.mdx b/website/pages/docs/commands/token/index.mdx
index 428f5223f0a9..daefc23d27a7 100644
--- a/website/pages/docs/commands/token/index.mdx
+++ b/website/pages/docs/commands/token/index.mdx
@@ -19,19 +19,19 @@ page](/docs/concepts/tokens).
Create a new token:
-```text
+```shell-session
$ vault token create
```
Revoke a token:
-```text
+```shell-session
$ vault token revoke 96ddf4bc-d217-f3ba-f9bd-017055595017
```
Renew a token:
-```text
+```shell-session
$ vault token renew 96ddf4bc-d217-f3ba-f9bd-017055595017
```
diff --git a/website/pages/docs/commands/token/lookup.mdx b/website/pages/docs/commands/token/lookup.mdx
index 9c753e71a367..4337b0cb16ff 100644
--- a/website/pages/docs/commands/token/lookup.mdx
+++ b/website/pages/docs/commands/token/lookup.mdx
@@ -17,20 +17,20 @@ not provided, the locally authenticated token is used.
Get information about the locally authenticated token (this uses the
`/auth/token/lookup-self` endpoint and permission):
-```text
+```shell-session
$ vault token lookup
```
Get information about a particular token (this uses the `/auth/token/lookup`
endpoint and permission):
-```text
+```shell-session
$ vault token lookup 96ddf4bc-d217-f3ba-f9bd-017055595017
```
Get information about a token via its accessor:
-```text
+```shell-session
$ vault token lookup -accessor 9793c9b3-e04a-46f3-e7b8-748d7da248da
```
diff --git a/website/pages/docs/commands/token/renew.mdx b/website/pages/docs/commands/token/renew.mdx
index 9cac1e95c9f7..ca2cf2d212c3 100644
--- a/website/pages/docs/commands/token/renew.mdx
+++ b/website/pages/docs/commands/token/renew.mdx
@@ -20,20 +20,20 @@ revoked, or if the token has already reached its maximum TTL.
Renew a token (this uses the `/auth/token/renew` endpoint and permission):
-```text
+```shell-session
$ vault token renew 96ddf4bc-d217-f3ba-f9bd-017055595017
```
Renew the currently authenticated token (this uses the `/auth/token/renew-self`
endpoint and permission):
-```text
+```shell-session
$ vault token renew
```
Renew a token requesting a specific increment value:
-```text
+```shell-session
$ vault token renew -increment=30m 96ddf4bc-d217-f3ba-f9bd-017055595017
```
diff --git a/website/pages/docs/commands/token/revoke.mdx b/website/pages/docs/commands/token/revoke.mdx
index c3e6b84e0d1e..d55e0f401200 100644
--- a/website/pages/docs/commands/token/revoke.mdx
+++ b/website/pages/docs/commands/token/revoke.mdx
@@ -17,21 +17,21 @@ be used to control the behavior of the revocation.
Revoke a token and all the token's children:
-```text
+```shell-session
$ vault token revoke 96ddf4bc-d217-f3ba-f9bd-017055595017
Success! Revoked token (if it existed)
```
Revoke a token leaving the token's children:
-```text
+```shell-session
$ vault token revoke -mode=orphan 96ddf4bc-d217-f3ba-f9bd-017055595017
Success! Revoked token (if it existed)
```
Revoke a token by accessor:
-```text
+```shell-session
$ vault token revoke -accessor 9793c9b3-e04a-46f3-e7b8-748d7da248da
Success! Revoked token (if it existed)
```
diff --git a/website/pages/docs/commands/unwrap.mdx b/website/pages/docs/commands/unwrap.mdx
index 5e1f777ca41a..f0ff00e54cfa 100644
--- a/website/pages/docs/commands/unwrap.mdx
+++ b/website/pages/docs/commands/unwrap.mdx
@@ -19,13 +19,13 @@ no token is given, the data in the currently authenticated token is unwrapped.
Unwrap the data in the cubbyhole secrets engine for a token:
-```text
+```shell-session
$ vault unwrap 3de9ece1-b347-e143-29b0-dc2dc31caafd
```
Unwrap the data in the active token:
-```text
+```shell-session
$ vault login 848f9ccf-7176-098c-5e2b-75a0689d41cd
$ vault unwrap # unwraps 848f9ccf...
```
diff --git a/website/pages/docs/commands/version.mdx b/website/pages/docs/commands/version.mdx
index dee9abcd57fb..9cc0af76caf5 100644
--- a/website/pages/docs/commands/version.mdx
+++ b/website/pages/docs/commands/version.mdx
@@ -9,14 +9,14 @@ description: The "version" command prints the version of Vault.
The `version` command prints the Vault version:
-```
+```shell-session
$ vault version
Vault v1.2.3
```
It can also be printed by adding the flags `--version` or `-v` to the `vault` command:
-```
+```shell-session
$ vault -v
Vault v1.2.3
```
diff --git a/website/pages/docs/commands/write.mdx b/website/pages/docs/commands/write.mdx
index fb6f97ac37dd..79b414ad0464 100644
--- a/website/pages/docs/commands/write.mdx
+++ b/website/pages/docs/commands/write.mdx
@@ -25,25 +25,25 @@ corresponds to the secrets engines in use.
Persist data in the KV secrets engine:
-```text
+```shell-session
$ vault write secret/my-secret foo=bar
```
Create a new encryption key in the transit secrets engine:
-```text
+```shell-session
$ vault write -f transit/keys/my-key
```
Upload an AWS IAM policy from a file on disk:
-```text
+```shell-session
$ vault write aws/roles/ops policy=@policy.json
```
Configure access to Consul by providing an access token:
-```text
+```shell-session
$ echo $MY_TOKEN | vault write consul/config/access token=-
```
diff --git a/website/pages/docs/concepts/auth.mdx b/website/pages/docs/concepts/auth.mdx
index f2956b3bdba1..ae7c1e47ef01 100644
--- a/website/pages/docs/concepts/auth.mdx
+++ b/website/pages/docs/concepts/auth.mdx
@@ -26,7 +26,7 @@ Vault supports a number of auth methods. Some backends are targeted
toward users while others are targeted toward machines. Most authentication
backends must be enabled before use. To enable an auth method:
-```sh
+```shell-session
$ vault write sys/auth/my-auth type=userpass
```
@@ -36,7 +36,7 @@ authentications at the same path as their name, but this is not a requirement.
To learn more about this authentication, use the built-in `path-help` command:
-```sh
+```shell-session
$ vault path-help auth/my-auth
# ...
```
@@ -70,7 +70,7 @@ revoking tokens, and renewing tokens. This is all covered on the
To authenticate with the CLI, `vault login` is used. This supports many
of the built-in auth methods. For example, with GitHub:
-```
+```shell-session
$ vault login -method=github token=
...
```
diff --git a/website/pages/docs/concepts/integrated-storage.mdx b/website/pages/docs/concepts/integrated-storage.mdx
index bfd6c8c198a4..dff66916815c 100644
--- a/website/pages/docs/concepts/integrated-storage.mdx
+++ b/website/pages/docs/concepts/integrated-storage.mdx
@@ -82,7 +82,7 @@ Alternatively you can use the [join CLI
command](/docs/commands/operator/raft/#join) or the API to join a node. The
active node's API address will need to be specified:
-```shell
+```shell-session
$ vault operator raft join https://node1.vault.local:8200
```
@@ -94,7 +94,7 @@ quorum count. This can be used in conjunction with [Performance
Standby](/docs/enterprise/performance-standby/) nodes to add read scalability to
a cluster in cases where a high volume of reads to servers are needed.
-```shell
+```shell-session
$ vault operator raft join -non-voter https://node1.vault.local:8200
```
@@ -110,7 +110,7 @@ To remove the peer you can issue a
[remove-peer](/docs/commands/operator/raft#remove-peer) command and provide the
node ID you wish to remove:
-```shell
+```shell-session
$ vault operator raft remove-peer node1
Peer removed successfully!
```
@@ -122,7 +122,7 @@ To see the current peer set for the cluster you can issue a
nodes that are listed here contribute to the quorum and a majority must be alive
for integrated storage to continue to operate.
-```shell
+```shell-session
$ vault operator raft list-peers
Node Address State Voter
---- ------- ----- -----
diff --git a/website/pages/docs/concepts/pgp-gpg-keybase.mdx b/website/pages/docs/concepts/pgp-gpg-keybase.mdx
index fb03dd391bd3..bed62342ff05 100644
--- a/website/pages/docs/concepts/pgp-gpg-keybase.mdx
+++ b/website/pages/docs/concepts/pgp-gpg-keybase.mdx
@@ -52,7 +52,7 @@ Keybase will be discussed first as it is simpler.
To generate unseal keys for Keybase users, Vault accepts the `keybase:` prefix
to the `-pgp-keys` argument:
-```
+```shell-session
$ vault operator init -key-shares=3 -key-threshold=2 \
-pgp-keys="keybase:jefferai,keybase:vishalnayak,keybase:sethvargo"
```
@@ -85,7 +85,7 @@ the Keybase CLI, you are now tasked with entering your unseal key. To get the
plain-text unseal key, you must decrypt the value given to you by the
initializer. To get the plain-text value, run the following command:
-```
+```shell-session
$ echo "wcBMA37..." | base64 --decode | keybase pgp decrypt
```
@@ -101,7 +101,7 @@ plain-text unseal key.
This is your unseal key in plain-text and should be guarded the same way you
guard a password. Now you can enter your key to the `unseal` command:
-```
+```shell-session
$ vault operator unseal
Key (will be hidden): ...
```
@@ -116,20 +116,20 @@ manual](https://gnupg.org/gph/en/manual.html).
To create a new PGP key, run, following the prompts:
-```
+```shell-session
$ gpg --gen-key
```
To import an existing key, download the public key onto disk and run:
-```
+```shell-session
$ gpg --import key.asc
```
Once you have imported the users' public keys, you need to save their values
to disk as either base64 or binary key files. For example:
-```
+```shell-session
$ gpg --export 348FFC4C | base64 > seth.asc
```
@@ -137,7 +137,7 @@ These key files must exist on disk in base64 (the "standard" base64 character se
without ASCII armoring) or binary. Once saved to disk, the path to these files
can be specified as an argument to the `-pgp-keys` flag.
-```
+```shell-session
$ vault operator init -key-shares=3 -key-threshold=2 \
-pgp-keys="jeff.asc,vishal.asc,seth.asc"
```
@@ -166,7 +166,7 @@ PGP key, you are now tasked with entering your unseal key. To get the
plain-text unseal key, you must decrypt the value given to you by the
initializer. To get the plain-text value, run the following command:
-```
+```shell-session
$ echo "wcBMA37..." | base64 --decode | gpg -dq
```
@@ -183,7 +183,7 @@ key:
This is your unseal key in plain-text and should be guarded the same way you
guard a password. Now you can enter your key to the `unseal` command:
-```
+```shell-session
$ vault operator unseal
Key (will be hidden): ...
```
diff --git a/website/pages/docs/concepts/policies.mdx b/website/pages/docs/concepts/policies.mdx
index 6c25aa17adbd..f7ccb14d981b 100644
--- a/website/pages/docs/concepts/policies.mdx
+++ b/website/pages/docs/concepts/policies.mdx
@@ -249,18 +249,18 @@ injected, and currently the `path` keys in policies allow injection.
### Parameters
-| Name | Description |
-| :--------------------------------------------------------------------- | :---------------------------------------------------------------------- |
-| `identity.entity.id` | The entity's ID |
-| `identity.entity.name` | The entity's name |
-| `identity.entity.metadata.<>` | Metadata associated with the entity for the given key |
-| `identity.entity.aliases.<>.id` | Entity alias ID for the given mount |
-| `identity.entity.aliases.<>.name` | Entity alias name for the given mount |
-| `identity.entity.aliases.<>.metadata.<>` | Metadata associated with the alias for the given mount and metadata key |
-| `identity.groups.ids.<>.name` | The group name for the given group ID |
-| `identity.groups.names.<>.id` | The group ID for the given group name |
-| `identity.groups.ids.<>.metadata.<>` | Metadata associated with the group for the given key |
-| `identity.groups.names.<>.metadata.<>` | Metadata associated with the group for the given key |
+| Name | Description |
+| :----------------------------------------------------------------- | :---------------------------------------------------------------------- |
+| `identity.entity.id` | The entity's ID |
+| `identity.entity.name` | The entity's name |
+| `identity.entity.metadata.` | Metadata associated with the entity for the given key |
+| `identity.entity.aliases..id` | Entity alias ID for the given mount |
+| `identity.entity.aliases..name` | Entity alias name for the given mount |
+| `identity.entity.aliases..metadata.` | Metadata associated with the alias for the given mount and metadata key |
+| `identity.groups.ids..name` | The group name for the given group ID |
+| `identity.groups.names..id` | The group ID for the given group name |
+| `identity.groups.ids..metadata.` | Metadata associated with the group for the given key |
+| `identity.groups.names..metadata.` | Metadata associated with the group for the given key |
### Examples
@@ -490,19 +490,19 @@ your Vault's `default` policy.
To view all permissions granted by the default policy on your Vault
installation, run:
-```sh
+```shell-session
$ vault read sys/policy/default
```
To disable attachment of the default policy:
-```sh
+```shell-session
$ vault token create -no-default-policy
```
or via the API:
-```sh
+```shell-session
$ curl \
--request POST \
--header "X-Vault-Token: ..." \
@@ -524,13 +524,13 @@ controlled users and authentication should be used.
To revoke a root token, run:
-```sh
+```shell-session
$ vault token revoke ""
```
or via the API:
-```sh
+```shell-session
$ curl \
--request POST \
--header "X-Vault-Token: ..." \
@@ -553,13 +553,13 @@ policies must be uploaded to Vault before they can be used.
To list all registered policies in Vault:
-```sh
+```shell-session
$ vault read sys/policy
```
or via the API:
-```sh
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
https://vault.hashicorp.rocks/v1/sys/policy
@@ -574,13 +574,13 @@ functionality but formats the output in a special manner.
Policies may be created (uploaded) via the CLI or via the API. To create a new
policy in Vault:
-```sh
+```shell-session
$ vault policy write policy-name policy-file.hcl
```
or via the API:
-```sh
+```shell-session
$ curl \
--request POST \
--header "X-Vault-Token: ..." \
@@ -598,13 +598,13 @@ Existing policies may be updated to change permissions via the CLI or via the
API. To update an existing policy in Vault, follow the same steps as creating a
policy, but use an existing policy name:
-```sh
+```shell-session
$ vault write sys/policy/my-existing-policy policy=@updated-policy.json
```
or via the API:
-```sh
+```shell-session
$ curl \
--request POST \
--header "X-Vault-Token: ..." \
@@ -616,13 +616,13 @@ $ curl \
Existing policies may be deleted via the CLI or API. To delete a policy:
-```sh
+```shell-session
$ vault delete sys/policy/policy-name
```
or via the API:
-```sh
+```shell-session
$ curl \
--request DELETE \
--header "X-Vault-Token: ..." \
@@ -642,7 +642,7 @@ auth method.
A Vault administrator or someone from the security team would create the user in
Vault with a list of associated policies:
-```sh
+```shell-session
$ vault write auth/userpass/users/sethvargo \
password="s3cr3t!" \
policies="dev-readonly,logs"
@@ -654,7 +654,7 @@ of policies attached.
The user wishing to authenticate would run
-```sh
+```shell-session
$ vault login -method="userpass" username="sethvargo"
Password (will be hidden): ...
```
@@ -667,7 +667,7 @@ authenticated user.
Tokens are associated with their policies at creation time. For example:
-```sh
+```shell-session
$ vault token create -policy=dev-readonly -policy=logs
```
diff --git a/website/pages/docs/concepts/seal.mdx b/website/pages/docs/concepts/seal.mdx
index de5d0bc30e9d..a89bc14aead9 100644
--- a/website/pages/docs/concepts/seal.mdx
+++ b/website/pages/docs/concepts/seal.mdx
@@ -126,43 +126,44 @@ These steps are common for seal migrations between any supported kinds and for
any storage backend.
1. Take a standby node down and update the [seal
-configuration](/docs/configuration/seal). If the migration is from Shamir seal
-to KMS seal, add the desired new KMS seal block to the config. If the migration
-is from KMS seal to Shamir seal, add `disabled = "true"` to the old seal block.
-If the migration is from KMS seal to another KMS seal, add `disabled = "true"`
-to the old seal block and add the desired new KMS seal block. Now, bring the
-standby node back up and run the unseal command on each by supplying the
-`-migrate` flag. Supply Shamir unseal keys if old seal was Shamir, which will be
-migrated as the recovery keys for the KMS seal. Supply recovery keys if the old
-seal is one of KMS seals, which will be migrated as the recovery keys of the new
-KMS seal or as Shamir unseal keys if the new seal is Shamir.
+ configuration](/docs/configuration/seal). If the migration is from Shamir seal
+ to KMS seal, add the desired new KMS seal block to the config. If the migration
+ is from KMS seal to Shamir seal, add `disabled = "true"` to the old seal block.
+ If the migration is from KMS seal to another KMS seal, add `disabled = "true"`
+ to the old seal block and add the desired new KMS seal block. Now, bring the
+ standby node back up and run the unseal command on each by supplying the
+ `-migrate` flag. Supply Shamir unseal keys if old seal was Shamir, which will be
+ migrated as the recovery keys for the KMS seal. Supply recovery keys if the old
+ seal is one of KMS seals, which will be migrated as the recovery keys of the new
+ KMS seal or as Shamir unseal keys if the new seal is Shamir.
2. Perform step 1 for all the standby nodes, one at a time. It is necessary to
-bring back the downed standby node before moving on to the other standby nodes,
-specifically when integrated storage is in use for it helps to retain the
-quorum.
+ bring back the downed standby node before moving on to the other standby nodes,
+ specifically when integrated storage is in use for it helps to retain the
+ quorum.
3. Stop the active node. One of the standby nodes will become the active node
-and perform the migration. When using Integrated Storage, ensure that quorum is
-reached and a leader is elected. Monitor the server log in the active node to
-witness the completion of the seal migration process. Wait for a little while
-for the migration information to replicate to all the nodes in case of
-Integrated Storage. In enterprise Vault, switching a KMS seal implies that the
-seal wrapped storage entries get re-wrapped. Monitor the log and wait until this
-process is complete (look for `seal re-wrap completed`).
+ and perform the migration. When using Integrated Storage, ensure that quorum is
+ reached and a leader is elected. Monitor the server log in the active node to
+ witness the completion of the seal migration process. Wait for a little while
+ for the migration information to replicate to all the nodes in case of
+ Integrated Storage. In enterprise Vault, switching a KMS seal implies that the
+ seal wrapped storage entries get re-wrapped. Monitor the log and wait until this
+ process is complete (look for `seal re-wrap completed`).
4. Seal migration is now completed. Update the config of the old active node
-(that is still down) to use the new seal blocks (completely unaware of the old
-seal type) and bring it up. It will be auto-unsealed if the new seal is one of the
-KMS seals or will require unseal keys if the new seal is Shamir.
+ (that is still down) to use the new seal blocks (completely unaware of the old
+ seal type) and bring it up. It will be auto-unsealed if the new seal is one of the
+ KMS seals or will require unseal keys if the new seal is Shamir.
5. At this point, config files of all the nodes can be updated to only have the
-new seal information. Standby nodes can be restarted right away and the active
-node can be restarted upon a leadership change.
+ new seal information. Standby nodes can be restarted right away and the active
+ node can be restarted upon a leadership change.
### Migration pre 1.4
#### Migration From Shamir to Auto Unseal
+
To migrate from Shamir keys to Auto Unseal, take your server cluster offline and
update the [seal configuration](/docs/configuration/seal) with the appropriate
seal configuration. Bring your server back up and leave the rest of the nodes
@@ -173,13 +174,12 @@ All unseal commands must specify the `-migrate` flag. Once the required
threshold of unseal keys are entered, unseal keys will be migrated to recovery
keys.
-``` $ vault operator unseal -migrate ```
+`$ vault operator unseal -migrate`
#### Migration From Auto Unseal to Shamir
To migrate from Auto Unseal to Shamir keys, take your server cluster offline and
-update the [seal configuration](/docs/configuration/seal) and add `disabled =
-"true"` to the seal block. This allows the migration to use this information to
+update the [seal configuration](/docs/configuration/seal) and add `disabled = "true"` to the seal block. This allows the migration to use this information to
decrypt the key but will not unseal Vault. When you bring your server back up,
run the unseal process with the `-migrate` flag and use the Recovery Keys to
perform the migration. All unseal commands must specify the `-migrate` flag.
@@ -194,7 +194,7 @@ supported. We plan to support this officially in a future release.
To migrate from Auto Unseal to a different Auto Unseal configuration, take your
server cluster offline and update the existing [seal
configuration](/docs/configuration/seal) and add `disabled = "true"` to the seal
-block. Then add another seal block to describe the new seal.
+block. Then add another seal block to describe the new seal.
When you bring your server back up, run the unseal process with the `-migrate`
flag and use the Recovery Keys to perform the migration. All unseal commands
diff --git a/website/pages/docs/configuration/index.mdx b/website/pages/docs/configuration/index.mdx
index 58efb8fa6b01..05b7a4cd9cf2 100644
--- a/website/pages/docs/configuration/index.mdx
+++ b/website/pages/docs/configuration/index.mdx
@@ -33,7 +33,7 @@ to specify where the configuration is.
## Parameters
-- `storage` ([StorageBackend][storage-backend]: \) –
+- `storage` `([StorageBackend][storage-backend]: )` –
Configures the storage backend where Vault data is stored. Please see the
[storage backends documentation][storage-backend] for the full list of
available storage backends. Running Vault in HA mode would require
@@ -43,17 +43,17 @@ to specify where the configuration is.
configured with a backend that supports HA, along with corresponding HA
options.
-- `ha_storage` ([StorageBackend][storage-backend]: nil) – Configures
+- `ha_storage` `([StorageBackend][storage-backend]: nil)` – Configures
the storage backend where Vault HA coordination will take place. This must be
an HA-supporting backend. If not set, HA will be attempted on the backend
given in the `storage` parameter. This parameter is not required if the
storage backend supports HA coordination and if HA specific options are
already specified with `storage` parameter.
-- `listener` ([Listener][listener]: \) – Configures how
+- `listener` `([Listener][listener]: )` – Configures how
Vault is listening for API requests.
-- `seal` ([Seal][seal]: nil) – Configures the seal type to use for
+- `seal` `([Seal][seal]: nil)` – Configures the seal type to use for
auto-unsealing, as well as for
[seal wrapping][sealwrap] as an additional layer of data protection.
@@ -101,7 +101,7 @@ to specify where the configuration is.
allowed to be loaded. Vault must have permission to read files in this
directory to successfully load plugins, and the value cannot be a symbolic link.
-- `telemetry` ([Telemetry][telemetry]: <none>) – Specifies the telemetry
+- `telemetry` `([Telemetry][telemetry]: )` – Specifies the telemetry
reporting system.
- `log_level` `(string: "")` – Specifies the log level to use; overridden by
diff --git a/website/pages/docs/configuration/service-registration/kubernetes.mdx b/website/pages/docs/configuration/service-registration/kubernetes.mdx
index f7d54a55a002..a60f8ab321b4 100644
--- a/website/pages/docs/configuration/service-registration/kubernetes.mdx
+++ b/website/pages/docs/configuration/service-registration/kubernetes.mdx
@@ -144,10 +144,10 @@ spec:
Also, by setting `publishNotReadyAddresses: false` above, pods that have failed will be removed from the service pool.
-With this active service in place, we now have a dedicated endpoint that will always reach the active node. When
+With this active service in place, we now have a dedicated endpoint that will always reach the active node. When
setting up Vault replication, it can be used as the primary address:
-```
+```shell-session
$ vault write -f sys/replication/performance/primary/enable \
primary_cluster_addr='https://vault-active-us-east:8201'
```
@@ -156,7 +156,7 @@ $ vault write -f sys/replication/performance/primary/enable \
In conjunction with the pod labels and the `OnDelete` upgrade strategy, upgrades are much easier to orchestrate:
-```
+```shell-session
$ helm upgrade vault --set='server.image.tag=1.4.0'
$ kubectl delete pod --selector=vault-active=false \
diff --git a/website/pages/docs/configuration/storage/foundationdb.mdx b/website/pages/docs/configuration/storage/foundationdb.mdx
index 60caec063469..fb17b5b93b43 100644
--- a/website/pages/docs/configuration/storage/foundationdb.mdx
+++ b/website/pages/docs/configuration/storage/foundationdb.mdx
@@ -104,7 +104,7 @@ feature.
If you do not use mlock, you can use `LD_LIBRARY_PATH` to point the linker at
the location of the primary client library.
-```
+```shell-session
$ export LD_LIBRARY_PATH=/dest/dir/for/primary:$LD_LIBRARY_PATH
$ export FDB_NETWORK_OPTION_EXTERNAL_CLIENT_DIRECTORY=/dest/dir/for/secondary
$ /path/to/bin/vault ...
@@ -130,7 +130,7 @@ to replace the use of `LD_LIBRARY_PATH`.
When building Vault, pass the `-r /dest/dir/for/primary` option to the Go
linker, for instance:
-```
+```shell-session
$ make dev FDB_ENABLED=1 LD_FLAGS="-r /dest/dir/for/primary "
```
@@ -138,14 +138,14 @@ $ make dev FDB_ENABLED=1 LD_FLAGS="-r /dest/dir/for/primary "
You can verify `RPATH` is set on the Vault binary using `readelf`:
-```
+```shell-session
$ readelf -d /path/to/bin/vault | grep RPATH
0x000000000000000f (RPATH) Library rpath: [/dest/dir/for/primary]
```
With the client libraries installed:
-```
+```shell-session
$ ldd /path/to/bin/vault
...
libfdb_c.so => /dest/dir/for/primary/libfdb_c.so (0x00007f270ad05000)
@@ -154,7 +154,7 @@ $ ldd /path/to/bin/vault
Now run Vault:
-```
+```shell-session
$ export FDB_NETWORK_OPTION_EXTERNAL_CLIENT_DIRECTORY=/dest/dir/for/secondary
$ /path/to/bin/vault ...
```
diff --git a/website/pages/docs/configuration/storage/google-cloud-storage.mdx b/website/pages/docs/configuration/storage/google-cloud-storage.mdx
index a96ad9bf32a3..a62e2cadf647 100644
--- a/website/pages/docs/configuration/storage/google-cloud-storage.mdx
+++ b/website/pages/docs/configuration/storage/google-cloud-storage.mdx
@@ -41,7 +41,7 @@ Cloud Platform account. Either using the API or web interface, create a bucket
using the [`gsutil`][cloud-sdk] command. Bucket names must be globally unique
across all of Google Cloud, so choose a unique name:
-```sh
+```shell-session
$ gsutil mb gs://mycompany-vault-data
```
diff --git a/website/pages/docs/enterprise/mfa/index.mdx b/website/pages/docs/enterprise/mfa/index.mdx
index c0774777d103..b6c474417dac 100644
--- a/website/pages/docs/enterprise/mfa/index.mdx
+++ b/website/pages/docs/enterprise/mfa/index.mdx
@@ -105,7 +105,7 @@ optional.
### Sample Request
-```
+```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--header "X-Vault-MFA:my_totp:695452" \
diff --git a/website/pages/docs/enterprise/performance-standby/index.mdx b/website/pages/docs/enterprise/performance-standby/index.mdx
index 06ce74367305..bc849553e4a3 100644
--- a/website/pages/docs/enterprise/performance-standby/index.mdx
+++ b/website/pages/docs/enterprise/performance-standby/index.mdx
@@ -72,7 +72,7 @@ This setting should be synced across all nodes in the cluster.
To verify your node is a performance standby the `vault status` command can be
used:
-```
+```shell-session
$ vault status
Key Value
--- -----
diff --git a/website/pages/docs/install/index.mdx b/website/pages/docs/install/index.mdx
index 27af44ee51ec..6eaeb8f4df38 100644
--- a/website/pages/docs/install/index.mdx
+++ b/website/pages/docs/install/index.mdx
@@ -71,6 +71,6 @@ To verify Vault is properly installed, run `vault -h` on your system. You should
see help output. If you are executing it from the command line, make sure it is
on your PATH or you may get an error about Vault not being found.
-```shell
+```shell-session
$ vault -h
```
diff --git a/website/pages/docs/internals/plugins.mdx b/website/pages/docs/internals/plugins.mdx
index 730a729253b6..48c764a43b0f 100644
--- a/website/pages/docs/internals/plugins.mdx
+++ b/website/pages/docs/internals/plugins.mdx
@@ -90,7 +90,7 @@ docs](/api/system/plugins-catalog).
An example plugin submission looks like:
-```
+```shell-session
$ vault write sys/plugins/catalog/database/myplugin-database-plugin \
sha256= \
command="myplugin"
diff --git a/website/pages/docs/platform/aws-mp/run.mdx b/website/pages/docs/platform/aws-mp/run.mdx
index f079ba0cc32a..08b9fe62c5e8 100644
--- a/website/pages/docs/platform/aws-mp/run.mdx
+++ b/website/pages/docs/platform/aws-mp/run.mdx
@@ -37,10 +37,10 @@ For additional guidance on best practices for running Vault in production, pleas
## Open Source
-For the Open Source Vault AMI, support can be obtained through the community channels:
+For the Open Source Vault AMI, support can be obtained through the [community channels](https://www.vaultproject.io/community)
-See the Vault Project on Github.com:
+[See the Vault Project on Github.com](https://github.com/hashicorp/vault)
## Enterprise
-For customers that purchase the Enterprise Vault AMI through the AWS Marketplace, Enterprise Support is also available from HashiCorp. To learn more:
+For customers that purchase the Enterprise Vault AMI through the AWS Marketplace, Enterprise Support is also available from HashiCorp. To learn more, [see our support website](https://support.hashicorp.com/hc/en-us)
diff --git a/website/pages/docs/platform/k8s/helm/examples/enterprise-best-practice.mdx b/website/pages/docs/platform/k8s/helm/examples/enterprise-best-practice.mdx
index 0d826572f150..b2183d864e21 100644
--- a/website/pages/docs/platform/k8s/helm/examples/enterprise-best-practice.mdx
+++ b/website/pages/docs/platform/k8s/helm/examples/enterprise-best-practice.mdx
@@ -69,7 +69,7 @@ TLS certificate generation is covered [here](/docs/platform/k8s/helm/examples/st
The below `values-custom.yaml` can be used to set up a three server Vault cluster using
Consul as a highly available storage backend, with AWS KMS for Auto Unseal.
-```
+```yaml
# Create a values-custom.yaml to override default values
cat << EOF > values-custom.yaml
server:
diff --git a/website/pages/docs/platform/k8s/helm/examples/standalone-audit.mdx b/website/pages/docs/platform/k8s/helm/examples/standalone-audit.mdx
index 1a48f7fa1973..384eea1564e5 100644
--- a/website/pages/docs/platform/k8s/helm/examples/standalone-audit.mdx
+++ b/website/pages/docs/platform/k8s/helm/examples/standalone-audit.mdx
@@ -1,8 +1,8 @@
---
-layout: "docs"
-page_title: "Standalone Server with Audit Storage"
-sidebar_current: "docs-platform-k8s-examples-standalone-audit"
-sidebar_title: "Standalone with Audit Storage"
+layout: 'docs'
+page_title: 'Standalone Server with Audit Storage'
+sidebar_current: 'docs-platform-k8s-examples-standalone-audit'
+sidebar_title: 'Standalone with Audit Storage'
description: |-
Describes how to set up a standalone Vault with audit storage
---
@@ -48,6 +48,6 @@ server:
After Vault has been deployed, initialized and unsealed, auditing can be enabled
by running the following command against the Vault pod:
-```bash
+```shell-session
$ kubectl exec -ti -- vault audit enable file file_path=/vault/audit/vault_audit.log
```
diff --git a/website/pages/docs/platform/k8s/helm/index.mdx b/website/pages/docs/platform/k8s/helm/index.mdx
index 2b69149e5649..c8ef2ad2531c 100644
--- a/website/pages/docs/platform/k8s/helm/index.mdx
+++ b/website/pages/docs/platform/k8s/helm/index.mdx
@@ -30,12 +30,12 @@ Helm](https://learn.hashicorp.com/vault/getting-started-k8s/minikube) guide.
To use the Helm chart, add the Hashicorp helm repository and check that you have
access to the chart:
-```shell
+```shell-session
$ helm repo add hashicorp https://helm.releases.hashicorp.com
"hashicorp" has been added to your repositories
$ helm search repo hashicorp/vault
-NAME CHART VERSION APP VERSION DESCRIPTION
+NAME CHART VERSION APP VERSION DESCRIPTION
hashicorp/vault 0.5.0 Install and configure Vault on Kubernetes.
```
@@ -48,7 +48,7 @@ Example chart usage:
Installing the latest release of the Vault Helm chart with pods prefixed with
the name `vault`.
-```sh
+```shell-session
$ helm install vault hashicorp/vault
```
@@ -57,7 +57,7 @@ Installing a specific version of the chart.
```sh
# List the available releases
$ helm search repo hashicorp/vault -l
-NAME CHART VERSION APP VERSION DESCRIPTION
+NAME CHART VERSION APP VERSION DESCRIPTION
hashicorp/vault 0.5.0 Install and configure Vault on Kubernetes.
hashicorp/vault 0.4.0 Install and configure Vault on Kubernetes.
diff --git a/website/pages/docs/platform/k8s/helm/run.mdx b/website/pages/docs/platform/k8s/helm/run.mdx
index 1d6363701da8..b008be237c26 100644
--- a/website/pages/docs/platform/k8s/helm/run.mdx
+++ b/website/pages/docs/platform/k8s/helm/run.mdx
@@ -48,12 +48,12 @@ Helm](https://learn.hashicorp.com/vault/getting-started-k8s/minikube) guide.
To use the Helm chart, add the Hashicorp helm repository and check that you have
access to the chart:
-```shell
+```shell-session
$ helm repo add hashicorp https://helm.releases.hashicorp.com
"hashicorp" has been added to your repositories
$ helm search repo hashicorp/vault
-NAME CHART VERSION APP VERSION DESCRIPTION
+NAME CHART VERSION APP VERSION DESCRIPTION
hashicorp/vault 0.5.0 Install and configure Vault on Kubernetes.
```
@@ -63,7 +63,7 @@ changes.
Use `helm install` to install the latest release of the Vault Helm chart.
-```sh
+```shell-session
$ helm install vault hashicorp/vault
```
@@ -72,7 +72,7 @@ Or install a specific version of the chart.
```sh
# List the available releases
$ helm search repo hashicorp/vault -l
-NAME CHART VERSION APP VERSION DESCRIPTION
+NAME CHART VERSION APP VERSION DESCRIPTION
hashicorp/vault 0.5.0 Install and configure Vault on Kubernetes.
hashicorp/vault 0.4.0 Install and configure Vault on Kubernetes.
@@ -85,14 +85,14 @@ values inline or defined in a file.
Override the `server.dev.enabled` configuration value:
-```sh
+```shell-session
$ helm install vault hashicorp/vault \
--set "server.dev.enabled=true"
```
Override all the configuration found in a file:
-```sh
+```shell-session
$ cat override-values.yml
server:
ha:
@@ -113,7 +113,7 @@ NOT recommended for a production environment.
Install the latest Vault Helm chart in development mode.
-```sh
+```shell-session
$ helm install vault hashicorp/vault \
--set "server.dev.enabled=true"
```
@@ -125,7 +125,7 @@ Vault server with a file storage backend.
Install the latest Vault Helm chart in standalone mode.
-```sh
+```shell-session
$ helm install vault hashicorp/vault
```
@@ -138,7 +138,7 @@ chart](https://github.com/hashicorp/consul-helm).
Install the latest Vault Helm chart in HA mode.
-```sh
+```shell-session
$ helm install vault hashicorp/vault \
--set "server.ha.enabled=true"
```
@@ -154,7 +154,7 @@ relies on a network addressable Vault server to exist.
Install the latest Vault Helm chart in external mode.
-```sh
+```shell-session
$ helm install vault hashicorp/vault \
--set "injector.externalVaultAddr=http://external-vault:8200"
```
@@ -172,7 +172,7 @@ configuration value](/docs/platform/k8s/helm/configuration/#ui).
Expose the Vault UI with port-forwarding:
-```sh
+```shell-session
$ kubectl port-forward vault-0 8200:8200
Forwarding from 127.0.0.1:8200 -> 8200
Forwarding from [::1]:8200 -> 8200
@@ -192,7 +192,7 @@ servers.
View all the Vault pods in the current namespace:
-```sh
+```shell-session
$ kubectl get pods -l app.kubernetes.io/name=vault
NAME READY STATUS RESTARTS AGE
vault-0 0/1 Running 0 1m49s
@@ -203,7 +203,7 @@ vault-2 0/1 Running 0 1m49s
Initialize one Vault server with the default number of key shares and default
key threshold:
-```sh
+```shell-session
$ kubectl exec -ti vault-0 -- vault operator init
Unseal Key 1: MBFSDepD9E6whREc6Dj+k3pMaKJ6cCnCUWcySJQymObb
Unseal Key 2: zQj4v22k9ixegS+94HJwmIaWLBL3nZHe1i+b/wHz25fr
@@ -229,7 +229,7 @@ $ kubectl exec -ti vault-0 -- vault operator unseal # ... Unseal Key 3
Repeat the unseal process for all Vault server pods. When all Vault server pods
are unsealed they report READY `1/1`.
-```sh
+```shell-session
$ kubectl get pods -l app.kubernetes.io/name=vault
NAME READY STATUS RESTARTS AGE
vault-0 1/1 Running 0 1m49s
@@ -317,7 +317,7 @@ are defined in each Vault server pod.
First, create a secret with your EKS access key/secret:
-```sh
+```shell-session
$ kubectl create secret generic eks-creds \
--from-literal=AWS_ACCESS_KEY_ID="${AWS_ACCESS_KEY_ID?}" \
--from-literal=AWS_SECRET_ACCESS_KEY="${AWS_SECRET_ACCESS_KEY?}"
@@ -388,7 +388,7 @@ well.
#### Upgrading Vault Servers
-!> **IMPORTANT NOTE:** Helm will install the latest chart found in a repo by default.
+!> **IMPORTANT NOTE:** Helm will install the latest chart found in a repo by default.
It's recommended to specify the chart version when upgrading.
To initiate the upgrade, set the `server.image` values to the desired Vault
@@ -413,7 +413,7 @@ hashicorp/vault 0.5.0 Install and configure Vault on Kuberne
Next, test the upgrade with `--dry-run` first to verify the changes sent to the
Kubernetes cluster.
-```bash
+```shell-session
$ helm upgrade vault hashicorp/vault --version=0.5.0 \
--set='server.image.repository=vault' \
--set='server.image.tag=123.456' \
@@ -430,7 +430,7 @@ deleted to upgrade. Deleting the pods does not delete any persisted data.
If Vault is not deployed using `ha` mode, the single Vault server may be deleted by
running:
-```bash
+```shell-session
$ kubectl delete pod
```
@@ -438,33 +438,33 @@ If Vault is deployed using `ha` mode, the standby pods must be upgraded first.
To identify which pod is currently the active primary, run the following command
on each Vault pod:
-```bash
+```shell-session
$ kubectl exec -ti -- vault status | grep "HA Mode"
```
Next, delete every pod that is not the active primary:
-```bash
+```shell-session
$ kubectl delete pod
```
If auto-unseal is not being used, the newly scheduled Vault standby pods needs
to be unsealed:
-```bash
+```shell-session
$ kubectl exec -ti -- vault operator unseal
```
Finally, once the standby nodes have been updated and unsealed, delete the active
primary:
-```bash
+```shell-session
$ kubectl delete pod
```
Similar to the standby nodes, the former primary also needs to be unsealed:
-```bash
+```shell-session
$ kubectl exec -ti -- vault operator unseal
```
@@ -485,7 +485,7 @@ secrets.
First, create a partial Vault configuration with the sensitive settings Vault
loads during startup:
-```sh
+```shell-session
$ cat <>config.hcl
storage "mysql" {
username = "user1234"
@@ -497,7 +497,7 @@ EOF
Next, create a Kubernetes secret containing this partial configuration:
-```bash
+```shell-session
$ kubectl create secret generic vault-storage-config \
--from-file=config.hcl
```
@@ -505,7 +505,7 @@ $ kubectl create secret generic vault-storage-config \
Finally, mount this secret as an extra volume and add an additional `-config` flag
to the Vault startup command:
-```bash
+```shell-session
$ helm install vault hashicorp/vault \
--set='server.extraVolumes[0].type=secret' \
--set='server.extraVolumes[0].name=vault-storage-config' \
diff --git a/website/pages/docs/platform/k8s/injector/index.mdx b/website/pages/docs/platform/k8s/injector/index.mdx
index c7c28bcecc41..d8a8901d5744 100644
--- a/website/pages/docs/platform/k8s/injector/index.mdx
+++ b/website/pages/docs/platform/k8s/injector/index.mdx
@@ -116,7 +116,7 @@ the secret. The annotation must have the following format:
```yaml
vault.hashicorp.com/agent-inject-template-: |
- <
+ <
TEMPLATE
HERE
>
@@ -135,7 +135,7 @@ vault.hashicorp.com/role: 'app'
The rendered secret would look like this within the container:
-```bash
+```shell-session
$ cat /vault/secrets/foo
postgres://v-kubernet-pg-app-q0Z7WPfVN:A1a-BUEuQR52oAqPrP1J@postgres:5432/mydb?sslmode=disable
```
@@ -162,13 +162,13 @@ vault.hashicorp.com/role: 'app'
The rendered secret would look like this within the container:
-```bash
+```shell-session
$ cat /vault/secrets/foo
password: A1a-BUEuQR52oAqPrP1J
username: v-kubernet-pg-app-q0Z7WPfVNqqTJuoDqCTY-1576529094
```
-~> Some secrets such as KV are stored in maps. Their data can be accessed using `.Data.data.`
+~> Some secrets such as KV are stored in maps. Their data can be accessed using `.Data.data.`
#### Vault Agent Configuration Map
diff --git a/website/pages/docs/platform/k8s/injector/installation.mdx b/website/pages/docs/platform/k8s/injector/installation.mdx
index 88a27eba3ee0..3f5d82ea30f0 100644
--- a/website/pages/docs/platform/k8s/injector/installation.mdx
+++ b/website/pages/docs/platform/k8s/injector/installation.mdx
@@ -15,7 +15,7 @@ install and configure the Agent Injector in Kubernetes.
To install a new instance of Vault and the Vault Agent Injector, first add the
Hashicorp helm repository and ensure you have access to the chart:
-```shell
+```shell-session
$ helm repo add hashicorp https://helm.releases.hashicorp.com
"hashicorp" has been added to your repositories
@@ -35,11 +35,10 @@ Upgrades may be performed with `helm upgrade` on an existing install. Please
always run Helm with `--dry-run` before any install or upgrade to verify
changes.
-You can see all the available values settings by running `helm inspect values
-hashicorp/vault` or by reading the [Vault Helm Configuration
+You can see all the available values settings by running `helm inspect values hashicorp/vault` or by reading the [Vault Helm Configuration
Docs](/docs/platform/k8s/helm/configuration). Commonly used values in the Helm
chart include limiting the namespaces the injector runs in, TLS options and
-more.
+more.
## TLS Options
diff --git a/website/pages/docs/plugin/index.mdx b/website/pages/docs/plugin/index.mdx
index 8045dc3ae533..f1d635c39e77 100644
--- a/website/pages/docs/plugin/index.mdx
+++ b/website/pages/docs/plugin/index.mdx
@@ -26,7 +26,7 @@ Before a plugin backend can be mounted, it needs to be registered via the
[plugin catalog](/docs/internals/plugins#plugin-catalog). After
the plugin is registered, it can be mounted by specifying the registered plugin name:
-```text
+```shell-session
$ vault secrets enable -path=my-secrets passthrough-plugin
Success! Enabled the passthrough-plugin secrets engine at: my-secrets/
```
@@ -34,7 +34,7 @@ Success! Enabled the passthrough-plugin secrets engine at: my-secrets/
Listing secrets engines will display secrets engines that are mounted as
plugins:
-```text
+```shell-session
$ vault secrets list
Path Type Accessor Plugin Default TTL Max TTL Force No Cache Replication Behavior Description
my-secrets/ plugin plugin_deb84140 passthrough-plugin system system false replicated
@@ -42,7 +42,7 @@ my-secrets/ plugin plugin_deb84140 passthrough-plugin system sys
Disabling a plugin backend is the identical to disabling internal secrets engines:
-```text
+```shell-session
$ vault secrets disable my-secrets
```
diff --git a/website/pages/docs/secrets/ad/index.mdx b/website/pages/docs/secrets/ad/index.mdx
index 61c3d9d4a299..c5cc41c3d75f 100644
--- a/website/pages/docs/secrets/ad/index.mdx
+++ b/website/pages/docs/secrets/ad/index.mdx
@@ -156,7 +156,7 @@ through how to use it, with explanation at each step.
First we'll need to enable the AD secrets engine and tell it how to talk to our AD
server just as we did above.
-```text
+```shell-session
$ vault secrets enable ad
Success! Enabled the ad secrets engine at: ad/
@@ -169,7 +169,7 @@ $ vault write ad/config \
Our next step is to designate a set of service accounts for check-out.
-```text
+```shell-session
$ vault write ad/library/accounting-team \
service_account_names=fizz@example.com,buzz@example.com \
ttl=10h \
@@ -188,7 +188,7 @@ problems, set `disable_check_in_enforcement=true`.
When a library of service accounts has been created, view their status at any time to see if they're
available or checked out.
-```text
+```shell-session
$ vault read ad/library/accounting-team/status
Key Value
--- -----
@@ -198,7 +198,7 @@ fizz@example.com map[available:true]
To check out any service account that's available, simply execute:
-```text
+```shell-session
$ vault write -f ad/library/accounting-team/check-out
Key Value
--- -----
@@ -212,7 +212,7 @@ service_account_name fizz@example.com
If the default `ttl` for the check-out is higher than needed, set the check-out to last
for a shorter time by using:
-```text
+```shell-session
$ vault write ad/library/accounting-team/check-out ttl=30m
Key Value
--- -----
@@ -229,7 +229,7 @@ check it back in."
If no service accounts are available for check-out, Vault will return a 400 Bad Request.
-```text
+```shell-session
$ vault write -f ad/library/accounting-team/check-out
Error writing data to ad/library/accounting-team/check-out: Error making API request.
@@ -241,7 +241,7 @@ Code: 400. Errors:
To extend a check-out, renew its lease.
-```text
+```shell-session
$ vault lease renew ad/library/accounting-team/check-out/0C2wmeaDmsToVFc0zDiX9cMq
Key Value
--- -----
@@ -256,7 +256,7 @@ ends.
To check a service account back in for others to use, call:
-```text
+```shell-session
$ vault write -f ad/library/accounting-team/check-in
Key Value
--- -----
@@ -266,7 +266,7 @@ check_ins [fizz@example.com]
Most of the time this will just work, but if multiple service accounts checked out by the same
caller, Vault will need to know which one(s) to check in.
-```text
+```shell-session
$ vault write ad/library/accounting-team/check-in service_account_names=fizz@example.com
Key Value
--- -----
@@ -281,7 +281,7 @@ If a caller is unable to check in a service account, or simply doesn't try,
Vault will check it back in automatically when the `ttl` expires. However, if that is too long,
service accounts can be forcibly checked in by a highly privileged user through:
-```text
+```shell-session
$ vault write -f ad/library/manage/accounting-team/check-in
Key Value
--- -----
@@ -290,7 +290,7 @@ check_ins [fizz@example.com]
Or, alternatively, revoking the secret's lease has the same effect.
-```text
+```shell-session
$ vault lease revoke ad/library/accounting-team/check-out/PvBVG0m7pEg2940Cb3Jw3KpJ
All revocation operations queued successfully!
```
@@ -319,7 +319,7 @@ Once it's known _which_ library needs more service accounts for checkout, fix th
by merely creating a new service account for it to use in Active Directory, then adding it to
Vault like so:
-```text
+```shell-session
$ vault write ad/library/accounting-team \
service_account_names=fizz@example.com,buzz@example.com,new@example.com
```
diff --git a/website/pages/docs/secrets/aws/index.mdx b/website/pages/docs/secrets/aws/index.mdx
index 455f5aec4e36..566a94ad4573 100644
--- a/website/pages/docs/secrets/aws/index.mdx
+++ b/website/pages/docs/secrets/aws/index.mdx
@@ -280,7 +280,7 @@ permissions (or any subset of `ec2:*` permissions):
An `ec2_admin` role would then assign an inline policy with the same `ec2:*`
permissions.
-```text
+```shell-session
$ vault write aws/roles/ec2_admin \
credential_type=federation_token \
policy_document=@policy.json
@@ -305,7 +305,7 @@ that overrides the allow.)
To generate a new set of STS federation token credentials, we simply write to
the role using the aws/sts endpoint:
-```text
+```shell-session
$ vault write aws/sts/ec2_admin ttl=60m
Key Value
lease_id aws/sts/ec2_admin/31d771a6-fb39-f46b-fdc5-945109106422
@@ -390,7 +390,7 @@ apply to ALL role credentials retrieved from AWS.
Let's create a "deploy" policy using the arn of our role to assume:
-```text
+```shell-session
$ vault write aws/roles/deploy \
role_arns=arn:aws:iam::ACCOUNT-ID-WITHOUT-HYPHENS:role/RoleNameToAssume \
credential_type=assumed_role
@@ -399,7 +399,7 @@ $ vault write aws/roles/deploy \
To generate a new set of STS assumed role credentials, we again write to
the role using the aws/sts endpoint:
-```text
+```shell-session
$ vault write aws/sts/deploy ttl=60m
Key Value
lease_id aws/sts/deploy/31d771a6-fb39-f46b-fdc5-945109106422
@@ -416,7 +416,7 @@ security_token AQoDYXdzEEwasAKwQyZUtZaCjVNDiXXXXXXXXgUgBBVUUbSyujLjsw6jYzboOQ89
If you get an error message similar to either of the following, the root credentials that you wrote to `aws/config/root` have insufficient privilege:
-```text
+```shell-session
$ vault read aws/creds/deploy
* Error creating IAM user: User: arn:aws:iam::000000000000:user/hashicorp is not authorized to perform: iam:CreateUser on resource: arn:aws:iam::000000000000:user/vault-root-1432735386-4059
diff --git a/website/pages/docs/secrets/azure/index.mdx b/website/pages/docs/secrets/azure/index.mdx
index f61cef39d0de..ba5e639a9174 100644
--- a/website/pages/docs/secrets/azure/index.mdx
+++ b/website/pages/docs/secrets/azure/index.mdx
@@ -58,13 +58,13 @@ management tool.
To configure a role called "my-role" with an existing service principal:
-```text
+```shell-session
$ vault write azure/roles/my-role application_object_id= ttl=1h
```
Alternatively, to configure the role to create a new service principal with Azure roles:
-```text
+```shell-session
$ vault write azure/roles/my-role ttl=1h azure_roles=-< **Note:** It is highly recommended to *not* use your MongoDB Atlas root account credentials.
+~> **Note:** It is highly recommended to _not_ use your MongoDB Atlas root account credentials.
Generate a dedicated Programmatic API key with appropriate roles instead.
-
## Programmatic API Keys
Programmatic API Key credential types use a Vault role to generate a Programmatic API Key at
either the MongoDB Atlas Organization or Project level with the designated role(s) for programmatic access.
- Programmatic API Keys:
- - Have two parts, a public key and a private key
- - Cannot be used to log into Atlas through the user interface
- - Must be granted appropriate roles to complete required tasks
- - Must belong to one organization, but may be granted access to any number of
- projects in that organization.
- - May have an IP whitelist configured and some capabilities may require a
- whitelist to be configured (these are noted in the MongoDB Atlas API
- documentation).
+Programmatic API Keys:
+
+- Have two parts, a public key and a private key
+- Cannot be used to log into Atlas through the user interface
+- Must be granted appropriate roles to complete required tasks
+- Must belong to one organization, but may be granted access to any number of
+ projects in that organization.
+- May have an IP whitelist configured and some capabilities may require a
+ whitelist to be configured (these are noted in the MongoDB Atlas API
+ documentation).
Create a Vault role for a MongoDB Atlas Programmatic API Key by mapping appropriate arguments to the
- organization or project designated:
+organization or project designated:
- - Organization API Key: Set `organization_id` argument with the appropriate
- [Organization Level Roles](https://docs.atlas.mongodb.com/reference/user-roles/#organization-roles).
- - Project API Key: Set `project_id` with the appropriate [Project Level Roles](https://docs.atlas.mongodb.com/reference/user-roles/#project-roles).
+- Organization API Key: Set `organization_id` argument with the appropriate
+ [Organization Level Roles](https://docs.atlas.mongodb.com/reference/user-roles/#organization-roles).
+- Project API Key: Set `project_id` with the appropriate [Project Level Roles](https://docs.atlas.mongodb.com/reference/user-roles/#project-roles).
~> **Note:** Programmatic API keys can belong to only one Organization but can belong to one or more Projects.
-
Examples:
-```bash
+```shell-session
$ vault write mongodbatlas/roles/test \
organization_id=5b23ff2f96e82130d0aaec13 \
roles=ORG_MEMBER
```
-```bash
+
+```shell-session
$ vault write mongodbatlas/roles/test \
project_id=5cf5a45a9ccf6400e60981b6 \
roles=GROUP_DATA_ACCESS_READ_ONLY
@@ -116,20 +116,20 @@ block and IP address are added to the IP whitelist for Keys generated with this
Verify the created Programmatic API Key Vault role has the added CIDR block and IP address by running:
- ```bash
- $ vault read atlas/roles/test
-
- Key Value
- --- -----
- cidr_blocks [192.168.1.3/32]
- ip_addresses [192.168.1.3]
- max_ttl 1h
- organization_id n/a
- roles [GROUP_CLUSTER_MANAGER]
- project_id 5cf5a45a9ccf6400e60981b6
- roles n/a
- ttl 30m
- ```
+```bash
+ $ vault read atlas/roles/test
+
+ Key Value
+ --- -----
+ cidr_blocks [192.168.1.3/32]
+ ip_addresses [192.168.1.3]
+ max_ttl 1h
+ organization_id n/a
+ roles [GROUP_CLUSTER_MANAGER]
+ project_id 5cf5a45a9ccf6400e60981b6
+ roles n/a
+ ttl 30m
+```
## TTL and Max TTL
@@ -140,7 +140,7 @@ or by tuning the secrets engine's configuration.
The following creates a Vault role "test" for a Project level Programmatic API key with a 2 hour time-to-live and a
max time-to-live of 5 hours.
-```bash
+```shell-session
$ vault write mongodbatlas/roles/test \
project_id=5cf5a45a9ccf6400e60981b6 \
roles=GROUP_DATA_ACCESS_READ_ONLY \
@@ -150,7 +150,7 @@ $ vault write mongodbatlas/roles/test \
You can verify the role that you have created with:
-```bash
+```shell-session
$ vault read mongodbatlas/roles/test
Key Value
@@ -163,13 +163,12 @@ $ vault read mongodbatlas/roles/test
max_ttl 5h0m0s
```
-
## Generating Credentials
After a user has authenticated to Vault has has sufficient permissions, a read request to the
`creds` endpoint for the role will generate and return new Programmatic API Keys:
-```bash
+```shell-session
$ vault read mongodbatlas/creds/test
Key Value
diff --git a/website/pages/docs/secrets/nomad/index.mdx b/website/pages/docs/secrets/nomad/index.mdx
index b2c894b69183..671dafa61b08 100644
--- a/website/pages/docs/secrets/nomad/index.mdx
+++ b/website/pages/docs/secrets/nomad/index.mdx
@@ -23,7 +23,7 @@ on every path, use `vault path-help` after mounting the backend.
The first step to using the vault backend is to mount it.
Unlike the `generic` backend, the `nomad` backend is not mounted by default.
-```
+```shell-session
$ vault secrets enable nomad
Successfully mounted 'nomad' at 'nomad'!
```
@@ -31,7 +31,7 @@ Successfully mounted 'nomad' at 'nomad'!
Optionally, we can configure the lease settings for credentials generated
by Vault. This is done by writing to the `config/lease` key:
-```
+```shell-session
$ vault write nomad/config/lease ttl=3600 max_ttl=86400
Success! Data written to: nomad/config/lease
```
@@ -40,7 +40,7 @@ For a quick start, you can use the SecretID token provided by the [Nomad ACL boo
process](https://www.nomadproject.io/guides/acl.html#generate-the-initial-token), although this
is discouraged for production deployments.
-```
+```shell-session
$ nomad acl bootstrap
Accessor ID = 95a0ee55-eaa6-2c0a-a900-ed94c156754e
Secret ID = c25b6ca0-ea4e-000f-807a-fd03fcab6e3c
@@ -59,7 +59,7 @@ The suggested pattern is to generate a token specifically for Vault, following t
Next, we must configure Vault to know how to contact Nomad.
This is done by writing the access information:
-```
+```shell-session
$ vault write nomad/config/access \
address=http://127.0.0.1:4646 \
token=adf4238a-882b-9ddc-4a9d-5b6758e4159e
@@ -75,7 +75,7 @@ The next step is to configure a role. A role is a logical name that maps
to a set of policy names used to generate those credentials. For example, let's create
a "monitoring" role that maps to a "readonly" policy:
-```
+```shell-session
$ vault write nomad/role/monitoring policies=readonly
Success! Data written to: nomad/role/monitoring
```
@@ -84,7 +84,7 @@ The backend expects either a single or a comma separated list of policy names.
To generate a new Nomad ACL token, we simply read from that role:
-```
+```shell-session
$ vault read nomad/creds/monitoring
Key Value
--- -----
@@ -98,7 +98,7 @@ secret_id b31fb56c-0936-5428-8c5f-ed010431aba9
Here we can see that Vault has generated a new Nomad ACL token for us.
We can test this token out, by reading it in Nomad (by it's accessor):
-```
+```shell-session
$ nomad acl token info a715994d-f5fd-1194-73df-ae9dad616307
Accessor ID = a715994d-f5fd-1194-73df-ae9dad616307
Secret ID = b31fb56c-0936-5428-8c5f-ed010431aba9
diff --git a/website/pages/docs/secrets/pki/index.mdx b/website/pages/docs/secrets/pki/index.mdx
index 085688c3fd70..a78e2fae4a86 100644
--- a/website/pages/docs/secrets/pki/index.mdx
+++ b/website/pages/docs/secrets/pki/index.mdx
@@ -219,7 +219,7 @@ endpoint.
The first step to using the PKI backend is to mount it. Unlike the `kv`
backend, the `pki` backend is not mounted by default.
-```text
+```shell-session
$ vault secrets enable pki
Successfully mounted 'pki' at 'pki'!
```
@@ -238,7 +238,7 @@ issue certificates directly from the root. As it's a root, we'll want to set a
long maximum life time for the certificate; since it honors the maximum mount
TTL, first we adjust that:
-```text
+```shell-session
$ vault secrets tune -max-lease-ttl=87600h pki
Successfully tuned mount 'pki'!
```
@@ -248,7 +248,7 @@ that roles can further restrict the maximum TTL.)
Now, we generate our root certificate:
-```text
+```shell-session
$ vault write pki/root/generate/internal common_name=myvault.com ttl=87600h
Key Value
--- -----
@@ -304,7 +304,7 @@ safely stored in the backend mount.
Generated certificates can have the CRL location and the location of the
issuing certificate encoded. These values must be set manually and typically to FQDN associated to the Vault server, but can be changed at any time.
-```text
+```shell-session
$ vault write pki/config/urls issuing_certificates="http://vault.example.com:8200/v1/pki/ca" crl_distribution_points="http://vault.example.com:8200/v1/pki/crl"
Success! Data written to: pki/ca/urls
```
@@ -315,7 +315,7 @@ The next step is to configure a role. A role is a logical name that maps to a
policy used to generate those credentials. For example, let's create an
"example-dot-com" role:
-```text
+```shell-session
$ vault write pki/roles/example-dot-com \
allowed_domains=example.com \
allow_subdomains=true max_ttl=72h
@@ -329,7 +329,7 @@ By writing to the `roles/example-dot-com` path we are defining the
to the `issue` endpoint with that role name: Vault is now configured to create
and manage certificates!
-```text
+```shell-session
$ vault write pki/issue/example-dot-com \
common_name=blah.example.com
Key Value
@@ -432,14 +432,14 @@ intermediate's certificate.
To add another certificate authority to our Vault instance, we have to mount it
at a different path.
-```text
+```shell-session
$ vault secrets enable -path=pki_int pki
Successfully mounted 'pki' at 'pki_int'!
```
#### Configure an Intermediate CA
-```text
+```shell-session
$ vault secrets tune -max-lease-ttl=43800h pki_int
Successfully tuned mount 'pki_int'!
```
@@ -449,7 +449,7 @@ value should be less than or equal to the root certificate authority.
Now, we generate our intermediate certificate signing request:
-```text
+```shell-session
$ vault write pki_int/intermediate/generate/internal common_name="myvault.com Intermediate Authority" ttl=43800h
Key Value
csr -----BEGIN CERTIFICATE REQUEST-----
@@ -475,7 +475,7 @@ Take the signing request from the intermediate authority and sign it using
another certificate authority, in this case the root certificate authority
generated in the first example.
-```text
+```shell-session
$ vault write pki/root/sign-intermediate csr=@pki_int.csr format=pem_bundle ttl=43800h
Key Value
certificate -----BEGIN CERTIFICATE-----
@@ -526,7 +526,7 @@ serial_number 10:dc:50:0f:b2:88:26:2d:73:13:f8:c4:89:8a:80:1b:55:42:e0:dc
Now set the intermediate certificate authorities signing certificate to the
root-signed certificate.
-```text
+```shell-session
$ vault write pki_int/intermediate/set-signed certificate=@signed_certificate.pem
Success! Data written to: pki_int/intermediate/set-signed
```
@@ -540,7 +540,7 @@ Generated certificates can have the CRL location and the location of the
issuing certificate encoded. These values must be set manually, but can be
changed at any time.
-```text
+```shell-session
$ vault write pki_int/config/urls issuing_certificates="http://127.0.0.1:8200/v1/pki_int/ca" crl_distribution_points="http://127.0.0.1:8200/v1/pki_int/crl"
Success! Data written to: pki_int/ca/urls
```
@@ -551,7 +551,7 @@ The next step is to configure a role. A role is a logical name that maps to a
policy used to generate those credentials. For example, let's create an
"example-dot-com" role:
-```text
+```shell-session
$ vault write pki_int/roles/example-dot-com \
allowed_domains=example.com \
allow_subdomains=true max_ttl=72h
@@ -565,7 +565,7 @@ By writing to the `roles/example-dot-com` path we are defining the
to the `issue` endpoint with that role name: Vault is now configured to create
and manage certificates!
-```text
+```shell-session
$ vault write pki_int/issue/example-dot-com \
common_name=blah.example.com
Key Value
diff --git a/website/pages/docs/secrets/ssh/dynamic-ssh-keys.mdx b/website/pages/docs/secrets/ssh/dynamic-ssh-keys.mdx
index 5f7e36d63f56..3c7c4419f068 100644
--- a/website/pages/docs/secrets/ssh/dynamic-ssh-keys.mdx
+++ b/website/pages/docs/secrets/ssh/dynamic-ssh-keys.mdx
@@ -77,7 +77,7 @@ First, however, the shared secret key must be specified.
### Mount the secrets engine
-```text
+```shell-session
$ vault secrets enable ssh
Successfully mounted 'ssh' at 'ssh'!
```
@@ -87,7 +87,7 @@ Successfully mounted 'ssh' at 'ssh'!
Register a key with a name; this key must have administrative capabilities on
the remote hosts.
-```text
+```shell-session
$ vault write ssh/keys/dev_key \
key=@dev_shared_key.pem
```
@@ -97,7 +97,7 @@ $ vault write ssh/keys/dev_key \
Next, create a role. All of the machines contained within this CIDR block list
should be accessible using the registered shared secret key.
-```text
+```shell-session
$ vault write ssh/roles/dynamic_key_role \
key_type=dynamic \
key=dev_key \
@@ -128,7 +128,7 @@ To see the default, see
Create a dynamic key for an IP of the remote host that is covered by
`dynamic_key_role`'s CIDR list.
-```text
+```shell-session
$ vault write ssh/creds/dynamic_key_role ip=x.x.x.x
Key Value
lease_id ssh/creds/dynamic_key_role/8c4d2042-23bc-d6a8-42c2-6ff01cb83cf8
@@ -172,7 +172,7 @@ username username
Save the key to a file (e.g. `dyn_key.pem`) and then use it to establish an SSH
session.
-```text
+```shell-session
$ ssh -i dyn_key.pem username@
username@:~$
```
@@ -182,7 +182,7 @@ username@:~$
Creation of new key, saving to a file, and using it to establish an SSH session
can all be done with a single Vault CLI command.
-```text
+```shell-session
$ vault ssh -role dynamic_key_role username@
username@:~$
```
diff --git a/website/pages/docs/secrets/ssh/one-time-ssh-passwords.mdx b/website/pages/docs/secrets/ssh/one-time-ssh-passwords.mdx
index 1fd82906aae6..202ea7cd517c 100644
--- a/website/pages/docs/secrets/ssh/one-time-ssh-passwords.mdx
+++ b/website/pages/docs/secrets/ssh/one-time-ssh-passwords.mdx
@@ -41,7 +41,7 @@ this secrets engine may allow for extra security on top of what TLS provides.
### Mount the secrets engine
-```text
+```shell-session
$ vault secrets enable ssh
Successfully mounted 'ssh' at 'ssh'!
```
@@ -52,7 +52,7 @@ Create a role with the `key_type` parameter set to `otp`. All of the machines
represented by the role's CIDR list should have helper properly installed and
configured.
-```text
+```shell-session
$ vault write ssh/roles/otp_key_role \
key_type=otp \
default_user=username \
@@ -65,7 +65,7 @@ Success! Data written to: ssh/roles/otp_key_role
Create an OTP credential for an IP of the remote host that belongs to
`otp_key_role`.
-```text
+```shell-session
$ vault write ssh/creds/otp_key_role ip=x.x.x.x
Key Value
lease_id ssh/creds/otp_key_role/73bbf513-9606-4bec-816c-5a2f009765a5
@@ -80,7 +80,7 @@ key_type otp
### Establish an SSH session
-```text
+```shell-session
$ ssh username@x.x.x.x
Password:
username@x.x.x.x:~$
@@ -91,7 +91,7 @@ username@x.x.x.x:~$
A single CLI command can be used to create a new OTP and invoke SSH with the
correct parameters to connect to the host.
-```text
+```shell-session
$ vault ssh -role otp_key_role -mode otp username@x.x.x.x
OTP for the session is `b4d47e1b-4879-5f4e-ce5c-7988d7986f37`
[Note: Install `sshpass` to automate typing in OTP]
@@ -100,7 +100,7 @@ Password:
The OTP will be entered automatically using `sshpass` if it is installed.
-```text
+```shell-session
$ vault ssh -role otp_key_role -mode otp -strict-host-key-checking=no username@x.x.x.x
username@:~$
```
diff --git a/website/pages/docs/secrets/ssh/signed-ssh-certificates.mdx b/website/pages/docs/secrets/ssh/signed-ssh-certificates.mdx
index 22aa0f40085b..7db5018fd8b6 100644
--- a/website/pages/docs/secrets/ssh/signed-ssh-certificates.mdx
+++ b/website/pages/docs/secrets/ssh/signed-ssh-certificates.mdx
@@ -331,7 +331,7 @@ Restart SSH after making these changes.
By default, SSH logs to `/var/log/auth.log`, but so do many other things. To
extract just the SSH logs, use the following:
-```sh
+```shell-session
$ tail -f /var/log/auth.log | grep --line-buffered "sshd"
```
diff --git a/website/pages/guides/encryption/spring-demo.mdx b/website/pages/guides/encryption/spring-demo.mdx
index 1b1e8bb674e6..4fc85ade59dd 100644
--- a/website/pages/guides/encryption/spring-demo.mdx
+++ b/website/pages/guides/encryption/spring-demo.mdx
@@ -84,8 +84,6 @@ you should find the following folders:
| `src/main` | Sample app source code |
| `vagrant-local` | Vagrant file to deploy the demo locally |
-
-
In this guide, you will perform the following:
1. [Review the demo application implementation](#step1)
@@ -95,7 +93,7 @@ In this guide, you will perform the following:
![Encryption as a Service](/img/vault-java-demo-10.png)
-### Step 1: Review the demo application implementation
+### Step 1: Review the demo application implementation ((#step1))
The source code can be found under the `src/main` directory.
@@ -174,7 +172,7 @@ public class VaultDemoOrderServiceApplication {
The `OrderAPIController` class defines the API endpoint (`api/orders`).
-### Step 2: Deploy and review the demo environment
+### Step 2: Deploy and review the demo environment ((#step2))
Now let's run the demo app and examine how it behaves.
@@ -410,7 +408,7 @@ Secrets](/guides/secret-mgmt/dynamic-secrets) guide.
Enter `\q` to exit out of the `psql` session, or you can open another terminal
and SSH into the demo virtual machine.
-### Step 3: Run the demo application
+### Step 3: Run the demo application ((#step3))
If everything looked fine in [Step 2](#step2), you are ready to write some data.
@@ -517,7 +515,7 @@ Finally, click **Decode from base64** to reveal the customer name.
![Web UI](/img/vault-java-demo-8.png)
-### Step 4: Reloading the Static Secrets
+### Step 4: Reloading the Static Secrets ((#step4))
Now, let's test another API endpoint, **`api/secret`** provided by the demo app.
A plain old Java object, `Secret` defines a get method for `key` and `value`.
@@ -551,8 +549,6 @@ path "secret/spring-vault-demo" {
...
```
-
-
The demo app retrieved the secret from `secret/spring-vault-demo` and has a
local copy. If someone (or perhaps another app) updates the secret, it makes the
secret held by the demo app to be obsolete.
@@ -570,7 +566,7 @@ The initial key-value was set by Vagrant during the provisioning. (See the
Let's invoke the demo app's secret API (**`api/secret`**):
-```plaintext
+```shell-session
$ curl -s http://localhost:8080/api/secret | jq
{
"key": "secret",
@@ -610,7 +606,7 @@ $ curl --header "X-Vault-Token: root" \
Run the demo app's secret API again:
-```plaintext
+```shell-session
$ curl -s http://localhost:8080/api/secret | jq
{
"key": "secret",
@@ -638,7 +634,7 @@ added to the project.
Let's refresh the secret using the actuator:
-```plaintext
+```shell-session
$ curl -s --request POST http://localhost:8080/actuator/refresh | jq
[
"secret"
@@ -647,7 +643,7 @@ $ curl -s --request POST http://localhost:8080/actuator/refresh | jq
Read back the secret from the demo app again:
-```plaintext
+```shell-session
$ curl -s http://localhost:8080/api/secret | jq
{
"key": "secret",
@@ -662,7 +658,7 @@ It should display the correct value.
When you are done exploring the demo implementation, you can destroy the virtual
machine:
-```plaintext
+```shell-session
$ vagrant destroy
demo: Are you sure you want to destroy the 'demo' VM? [y/N] y
==> demo: Forcing shutdown of VM...
diff --git a/website/pages/guides/encryption/transit-rewrap.mdx b/website/pages/guides/encryption/transit-rewrap.mdx
index b4c0cfdd0be4..c25d7ce6201e 100644
--- a/website/pages/guides/encryption/transit-rewrap.mdx
+++ b/website/pages/guides/encryption/transit-rewrap.mdx
@@ -180,7 +180,7 @@ You are going to perform the following steps:
1. [Rotate the encryption keys](#step5)
1. [Re-wrapping data programmatically](#step6)
-### Step 1: Test database setup (Docker)
+### Step 1: Test database setup (Docker) ((#step1))
You need a database to test with. You can create one to test with easily using
Docker:
@@ -205,7 +205,7 @@ docker run --name mysql-rewrap \
-d mysql/mysql-server:5.7
```
-### Step 2: Enable the transit secret engine
+### Step 2: Enable the transit secret engine ((#step2))
(**Persona:** security engineer)
@@ -213,13 +213,13 @@ docker run --name mysql-rewrap \
Enable the `transit` secret engine by executing the following command:
-```bash
+```shell-session
$ vault secrets enable transit
```
Create an encryption key to use for transit named, "my_app_key".
-```bash
+```shell-session
$ vault write -f transit/keys/my_app_key
```
@@ -227,7 +227,7 @@ $ vault write -f transit/keys/my_app_key
Enable the `transit` secret engine via API, use the `/sys/mounts` endpoint:
-```bash
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
--data \
@@ -239,7 +239,7 @@ parameters](/api/system/mounts#enable-secrets-engine) of the secret engine.
To crate a new encryption key, use the `transit/keys/` endpoint:
-```bash
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
--data \
@@ -251,7 +251,7 @@ parameters](/api/secret/transit#create-key) to specify the key type.
**Example:**
-```shell
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"type": "transit"}' \
@@ -263,13 +263,13 @@ at the `sys/mounts/transit` endpoint.
Next, create an encryption key to use for transit named, "my_app_key".
-```bash
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
https://localhost:8200/v1/transit/keys/my_app_key
```
-### Step 3: Generate a new token for sample app
+### Step 3: Generate a new token for sample app ((#step3))
(**Persona:** security engineer)
@@ -298,19 +298,19 @@ path "transit/encrypt/my_app_key" {
Create `rewrap_example` policy:
-```shell
+```shell-session
$ vault policy write rewrap_example ./rewrap_example.hcl
```
Finally, create a token to use the `rewrap_example` policy:
-```shell
+```shell-session
$ vault token create -policy=rewrap_example
```
**Example:**
-```shell
+```shell-session
$ vault token create -policy=rewrap_example
Key Value
--- -----
@@ -327,7 +327,7 @@ The generated token is what the sample application uses to connect to Vault.
To create a policy via API, use the `/sys/policy` endpoint:
-```plaintext
+```shell-session
$ curl --request PUT --header "X-Vault-Token: ..." \
--data @payload.json \
https://localhost:8200/v1/sys/policy/rewrap_example
@@ -340,7 +340,7 @@ $ cat payload.json
Finally, create a token to use the `rewrap_example` policy:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." --request POST \
--data '{ "policies": ["rewrap_example"] }' \
https://localhost:8200/v1/auth/token/create | jq
@@ -369,7 +369,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \
The generated token is what the sample application uses to connect to Vault.
-### Step 4: Run the sample application
+### Step 4: Run the sample application ((#step4))
(**Persona:** app)
@@ -392,7 +392,7 @@ The sample app retrieves the user token, Vault address, and the name of the
transit key through environment variables. Be sure to supply the token created
in [Step 3](#step3):
-```bash
+```shell-session
$ VAULT_TOKEN= \
VAULT_ADDR= \
VAULT_TRANSIT_KEY=my_app_key \
@@ -405,7 +405,7 @@ $ VAULT_TOKEN= \
**Example:**
-```bash
+```shell-session
$ VAULT_TOKEN=$TOKEN VAULT_ADDR=http://localhost:8200 VAULT_TRANSIT_KEY=my_app_key SHOULD_SEED_USERS=true dotnet run
Connecting to Vault server...
@@ -419,7 +419,7 @@ Found 0 records to rewrap.
You can inspect the contents of the database with:
-```bash
+```shell-session
$ docker exec -it mysql-rewrap mysql -uroot -proot
...
mysql> DESC user_data;
@@ -427,7 +427,7 @@ mysql> SELECT * FROM user_data WHERE dob LIKE "vault:v1%" limit 10;
...data...
```
-### Step 5: Rotate the encryption keys
+### Step 5: Rotate the encryption keys ((#step5))
(**Persona:** security engineer)
@@ -437,7 +437,7 @@ The encryption key (`my_app_key`) can be rotated easily.
To rotate the key, you write to the `transit/keys//rotate` path.
-```bash
+```shell-session
$ vault write -f transit/keys/my_app_key/rotate
Success! Data written to: transit/keys/my_app_key/rotate
```
@@ -447,7 +447,7 @@ for testing.
To view the key information:
-```bash
+```shell-session
$ vault read transit/keys/my_app_key
Key Value
--- -----
@@ -502,7 +502,7 @@ type aes256-gcm96
To rotate the encryption key via API, use the `transit/keys//rotate` endpoint:
-```bash
+```shell-session
$ curl --request POST --header "X-Vault-Token: ..." \
https://localhost:8200/v1/transit/keys/my_app_key/rotate
```
@@ -549,7 +549,7 @@ versions can decrypt the data (`min_decryption_version`).
Let's enforce the use of the encryption key at version five or later to decrypt the
data.
-```shell
+```shell-session
$ curl --request POST --header "X-Vault-Token: ..." \
--data '{ "min_decryption_version": 5 }'
https://localhost:8200/v1/transit/keys/my_app_key/config
@@ -574,7 +574,7 @@ $ curl --request GET --header "X-Vault-Token: ..." \
}
```
-### Step 6: Programmatically re-wrap the data
+### Step 6: Programmatically re-wrap the data ((#step6))
(**Persona:** app)
@@ -584,7 +584,7 @@ appropriate. Remember you can inspect records using the MySQL shell (see above).
**Example:**
-```shell
+```shell-session
$ VAULT_TOKEN=2616214b-6868-3589-b443-0330d7915882 VAULT_ADDR=http://localhost:8200 \
VAULT_TRANSIT_KEY=my_app_key SHOULD_SEED_USERS=true dotnet run
Connecting to Vault server...
@@ -605,7 +605,7 @@ The application has now re-wrapped all records with the latest key. You can
verify this by running the application again, or by inspecting the records using the
MySQL client.
-```bash
+```shell-session
$ docker exec -it mysql-rewrap mysql -uroot -proot
...
mysql> DESC user_data;
diff --git a/website/pages/guides/encryption/transit.mdx b/website/pages/guides/encryption/transit.mdx
index 2e09f36e7e02..4e5df90db7e9 100644
--- a/website/pages/guides/encryption/transit.mdx
+++ b/website/pages/guides/encryption/transit.mdx
@@ -111,7 +111,7 @@ You will perform the following:
1. [Rotate the Encryption Key](#step4)
1. [Update Key Configuration](#step5)
-### Step 1: Configure Transit Secret Engine
+### Step 1: Configure Transit Secret Engine ((#step1))
(**Persona:** operator)
@@ -123,7 +123,7 @@ management tool.
Enable the `transit` secret engine by executing the following command:
-```plaintext
+```shell-session
$ vault secrets enable transit
```
@@ -135,7 +135,7 @@ $ vault secrets enable transit
Now, create an encryption key ring named, `orders` by executing the following
command:
-```plaintext
+```shell-session
$ vault write -f transit/keys/orders
```
@@ -143,7 +143,7 @@ $ vault write -f transit/keys/orders
Enable `transit` secret engine using `/sys/mounts` endpoint:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
--data \
@@ -158,7 +158,7 @@ parameters](/api/system/mounts#enable-secrets-engine) of the secret engine.
The following example enables transit secret engine at `sys/mounts/transit`
path, and passed the secret engine type (`transit`) in the request payload.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"type":"transit"}' \
@@ -168,7 +168,7 @@ $ curl --header "X-Vault-Token: ..." \
Now, create an encryption key ring named, `orders` using the `transit/keys`
endpoint:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
https://127.0.0.1:8200/v1/transit/keys/orders
@@ -189,12 +189,10 @@ Open a web browser and launch the Vault UI (e.g. http://127.0.0.1:8200/ui) and t
1. Click **Create encryption key** to complete.
-
-
~> **NOTE:** Typically, you want to create an encryption key ring for each
application.
-### Step 2: Encrypt Secrets
+### Step 2: Encrypt Secrets ((#step2))
(**Persona:** operator)
@@ -210,13 +208,13 @@ When you encrypt a plaintext, it must be base64-encoded.
To encrypt your secret, use the `transit/encrypt` endpoint:
-```plaintext
+```shell-session
$ vault write transit/encrypt/
```
Execute the following command to encrypt a plaintext:
-```plaintext
+```shell-session
$ vault write transit/encrypt/orders plaintext=$(base64 <<< "credit-card-number")
Key Value
@@ -280,7 +278,7 @@ database) or pass it to another application.
at the desired location (e.g. MySQL database) or pass it to another application.
![Encrypt plaintext](/img/vault-transit-4.png)
-### Step 3: Decrypt a cipher-text
+### Step 3: Decrypt a cipher-text ((#step3))
(**Persona:** operator)
@@ -293,7 +291,7 @@ endpoint.
Execute the following command to decrypt the ciphertext resulted in [Step
2](#step2):
-```plaintext
+```shell-session
$ vault write transit/decrypt/orders \
ciphertext="vault:v1:cZNHVx+sxdMErXRSuDa1q/pz49fXTn1PScKfhf+PIZPvy8xKfkytpwKcbC0fF2U=" \
@@ -305,7 +303,7 @@ plaintext Y3JlZGl0LWNhcmQtbnVtYmVyCg==
The resulting data is base64-encoded. To reveal the original plaintext, run the
following command:
-```plaintext
+```shell-session
$ base64 --decode <<< "Y3JlZGl0LWNhcmQtbnVtYmVyCg=="
credit-card-number
```
@@ -354,7 +352,7 @@ credit-card-number
1. The resulting data is base64-encoded. Click **Decode from base64** to reveal
the plaintext.
-### Step 4: Rotate the Encryption Key
+### Step 4: Rotate the Encryption Key ((#step4))
(**Persona:** operator)
@@ -373,13 +371,13 @@ encrypt it.
To rotate the encryption key, invoke the `transit/keys//rotate`
endpoint.
-```plaintext
+```shell-session
$ vault write -f transit/keys/orders/rotate
```
Let's encrypt another data:
-```plaintext
+```shell-session
$ vault write transit/encrypt/orders plaintext=$(base64 <<< "visa-card-number")
Key Value
--- -----
@@ -400,7 +398,7 @@ rotation.
Execute the following command to rewrap your ciphertext from [Step 2](#step2)
with the latest version of the encryption key:
-```plaintext
+```shell-session
$ vault write transit/rewrap/orders \
ciphertext="vault:v1:cZNHVx+sxdMErXRSuDa1q/pz49fXTn1PScKfhf+PIZPvy8xKfkytpwKcbC0fF2U="
Key Value
@@ -419,7 +417,7 @@ plaintext with the newest key in the keyring.
To rotate the encryption key, invoke the `transit/keys//rotate`
endpoint.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST
https://127.0.0.1:8200/v1/transit/keys/orders/rotate
@@ -460,7 +458,7 @@ rotation.
Execute the `transit/rewrap` endpoint to rewrap your ciphertext from [Step 2](#step2)
with the latest version of the encryption key:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"ciphertext": "vault:v1:/9hdQutaWpZR72s3+VSCLK1JNhV1wKM49hYVjh7RjmuxIy/OvshtgV4L4uVB+aQ="}' \
@@ -479,7 +477,7 @@ This operation does not reveal the plaintext data. But Vault will decrypt the
value using the appropriate key in the keyring and then encrypted the resulting
plaintext with the newest key in the keyring.
-## Step 5: Update Key Configuration
+## Step 5: Update Key Configuration ((#step5))
(**Persona:** operator)
@@ -496,13 +494,13 @@ This helps further tightening the data encryption rule.
Execute the key rotation command a few times to generate multiple versions of
the key:
-```plaintext
+```shell-session
$ vault write -f transit/keys/orders/rotate
```
Now, read the `orders` key information:
-```plaintext
+```shell-session
$ vault read transit/keys/orders
Key Value
@@ -522,13 +520,13 @@ versions can decrypt the data (`min_decryption_version`).
Run the following command to enforce the use of the encryption key at version
**5** or later to decrypt the data.
-```plaintext
+```shell-session
$ vault write transit/keys/orders/config min_decryption_version=5
```
Now, verify the `orders` key configuration:
-```plaintext
+```shell-session
$ vault read transit/keys/orders
Key Value
@@ -549,7 +547,7 @@ min_encryption_version 0
Execute the `transit/keys//rotate` endpoint a few times key
rotation command a few times to generate multiple versions of the key:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST
https://127.0.0.1:8200/v1/transit/keys/orders/rotate
@@ -558,7 +556,7 @@ $ curl --header "X-Vault-Token: ..." \
Read the `transit/keys/orders` endpoint to review the `orders` key
detail:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/transit/keys/orders | jq
{
@@ -584,7 +582,7 @@ versions can decrypt the data (`min_decryption_version`).
Run the following command to enforce the use of the encryption key at version
**5** or later to decrypt the data.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST
--data '{"min_decryption_version": 5}'
@@ -593,7 +591,7 @@ $ curl --header "X-Vault-Token: ..." \
Now, verify the `orders` key configuration:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
https://127.0.0.1:8200/v1/transit/keys/orders | jq
{
@@ -608,8 +606,6 @@ $ curl --header "X-Vault-Token: ..." \
...
```
-
-
-> **NOTE:** Notice that the output only displays two valid encryption key
versions (`5` and `6`).
diff --git a/website/pages/guides/identity/approle-trusted-entities.mdx b/website/pages/guides/identity/approle-trusted-entities.mdx
index e83eec44966a..5fc94f9c8e43 100644
--- a/website/pages/guides/identity/approle-trusted-entities.mdx
+++ b/website/pages/guides/identity/approle-trusted-entities.mdx
@@ -132,7 +132,7 @@ Provisioning for this demo happens in 2 phases:
- [Step 6: Write Secrets](#step-6-write-secrets)
- [Phase 2 - Provision our Chef Node to Show AppRole Login](#phase2)
-## Phase 1: Provision our Vault & Chef Server
+## Phase 1: Provision our Vault & Chef Server ((#phase1))
### Step 1: Provision the Vault and Chef Server
@@ -188,7 +188,7 @@ created. If all looks good, then perform a `terraform apply` to provision the
resources. The Terraform output will display the public IP address to SSH into
your server.
-```plaintext
+```shell-session
$ terraform init
Initializing provider plugins...
...
@@ -213,7 +213,7 @@ your server.
For example:
-```plaintext
+```shell-session
$ ssh -i "/path/to/EC2/private_key.pem" ubuntu@192.0.2.0
```
@@ -221,7 +221,7 @@ $ ssh -i "/path/to/EC2/private_key.pem" ubuntu@192.0.2.0
SSH into your mgmt server, run `tail -f /var/log/tf-user-data.log` to see when
the initial configuration is complete.
-```plaintext
+```shell-session
$ tail -f /var/log/tf-user-data.log
```
@@ -246,7 +246,7 @@ your home directory:
Before moving on, set your working environment variables in your mgmt server:
-```plaintext
+```shell-session
$ export VAULT_ADDR=http://127.0.0.1:8200
$ export VAULT_SKIP_VERIFY=true
```
@@ -359,7 +359,7 @@ $ curl --silent \
**CLI command**
-```plaintext
+```shell-session
$ vault auth enable -description="Demo AppRole auth method" approle
```
@@ -476,7 +476,7 @@ The token and associated metadata will be written out to the file
`roleid-token.json`. The `client_token` value is what you'll give to Terraform.
The file should look similar to the following:
-```plaintext
+```shell-session
$ cat roleid-token.json | jq
{
"request_id": "2e1d05eb-988d-4cf7-7b6a-d2668de31536",
@@ -538,7 +538,7 @@ The token and associated metadata will be written out to the file
`roleid-token.txt`. The `token` value is what you'll give to Terraform.
The file should look similar to the following:
-```plaintext
+```shell-session
$ cat roleid-token.txt
Key Value
--- -----
@@ -596,7 +596,7 @@ $ curl --silent \
The resulting file should look like this:
-```plaintext
+```shell-session
$ cat secretid-token.json | jq
{
"request_id": "6f6ad8a1-fedb-b838-60ce-87999f01aff6",
@@ -643,7 +643,7 @@ $ vault token create -policy="app-1-approle-secretid-create" \
The resulting file should look like this:
-```plaintext
+```shell-session
$ cat secretid-token.txt
Key Value
--- -----
@@ -667,7 +667,7 @@ corresponding `RoleID`.
Now, create a Chef Data Bag and put the `SecretID` token (`secretid-token.json`)
along with the rest of its metadata.
-```bash
+```shell-session
$ cd /home/ubuntu/vault-chef-approle-demo/chef/
# Use the path for where you created this file in the previous step
@@ -687,7 +687,7 @@ $ knife data bag show secretid-token approle-secretid-token
The last step should show the following output:
-```plaintext
+```shell-session
$ knife data bag show secretid-token approle-secretid-token
WARNING: Unencrypted data bag detected, ignoring any provided secret options.
auth:
@@ -773,7 +773,7 @@ username app-1-user
steps will only need to be performed upon initial creation of an AppRole, and
would typically be done by a Vault administrator.
-## Phase 2: Provision our Chef Node to Show AppRole Login
+## Phase 2: Provision our Chef Node to Show AppRole Login ((#phase2))
To complete the demo, run the **`chef-node`** Terraform configuration to see how
everything talks to each other.
@@ -784,7 +784,7 @@ Open another terminal on your host machine (**not** the `mgmt-node`)
and `cd` into the `identity/vault-chef-approle/terraform-aws/chef-node`
directory:
-```plaintext
+```shell-session
$ cd identity/vault-chef-approle/terraform-aws/chef-node
```
@@ -803,7 +803,7 @@ Note the following:
`client_token` in the `/home/ubuntu/vault-chef-approle-demo/roleid-token.json`
file:
-```plaintext
+```shell-session
$ cat ~/vault-chef-approle-demo/roleid-token.json | jq ".auth.client_token"
```
diff --git a/website/pages/guides/identity/authentication.mdx b/website/pages/guides/identity/authentication.mdx
index 309ed0e4c3c7..7ab5f511e53c 100644
--- a/website/pages/guides/identity/authentication.mdx
+++ b/website/pages/guides/identity/authentication.mdx
@@ -146,7 +146,7 @@ In this guide, you are going to perform the following steps:
Step 1 through 3 need to be performed by an `admin` user. Step 4 and 5 describe
the commands that an `app` runs to get a token and read secrets from Vault.
-### Step 1: Enable AppRole auth method
+### Step 1: Enable AppRole auth method ((#step1))
(**Persona:** admin)
@@ -156,7 +156,7 @@ Like many other auth methods, AppRole must be enabled before it can be used.
Enable `approle` auth method by executing the following command:
-```shell
+```shell-session
$ vault auth enable approle
```
@@ -164,7 +164,7 @@ $ vault auth enable approle
Enable `approle` auth method by mounting its endpoint at `/sys/auth/approle`:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
--data \
@@ -176,7 +176,7 @@ parameters](/api/system/auth#enable-auth-method) of the method.
**Example:**
-```shell
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"type": "approle"}' \
@@ -186,7 +186,7 @@ $ curl --header "X-Vault-Token: ..." \
The above example passes the **type** (`approle`) in the request payload
at the `sys/auth/approle` endpoint.
-### Step 2: Create a role with policy attached
+### Step 2: Create a role with policy attached ((#step2))
(**Persona:** admin)
@@ -215,13 +215,13 @@ path "secret/mysql/*" {
Before creating a role, create a `jenkins` policy:
-```shell
+```shell-session
$ vault policy write jenkins jenkins-pol.hcl
```
The command to create a new AppRole:
-```shell
+```shell-session
$ vault write auth/approle/role/ [parameters]
```
@@ -240,7 +240,7 @@ The following example creates a role named `jenkins` with `jenkins` policy
attached. (NOTE: This example creates a role operates in [**pull**
mode](/docs/auth/approle).)
-```shell
+```shell-session
$ vault write auth/approle/role/jenkins policies="jenkins"
# Read the jenkins role
@@ -262,7 +262,7 @@ $ vault read auth/approle/role/jenkins
**NOTE:** To attach multiple policies, pass the policy names as a comma
separated string.
-```shell
+```shell-session
$ vault write auth/approle/role/jenkins policies="jenkins,anotherpolicy"
```
@@ -270,7 +270,7 @@ $ vault write auth/approle/role/jenkins policies="jenkins,anotherpolicy"
Before creating a role, create `jenkins` policy:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \
http://127.0.0.1:8200/v1/sys/policy/jenkins
@@ -288,7 +288,7 @@ The following example creates a role named `jenkins` with a `jenkins` policy
attached. (NOTE: This example creates a role which operates in [**pull**
mode](/docs/auth/approle).)
-```shell
+```shell-session
$ curl --header "X-Vault-Token: ..." --request POST \
--data '{"policies":"jenkins"}' \
http://127.0.0.1:8200/v1/auth/approle/role/jenkins
@@ -306,7 +306,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \
**NOTE:** To attach multiple policies, pass the policy names as a comma
separated string.
-```shell
+```shell-session
$ curl --header "X-Vault-Token:..."
--request POST \
--data '{"policies":"jenkins,anotherpolicy"}' \
@@ -315,7 +315,7 @@ $ curl --header "X-Vault-Token:..."
To read the jenkins role you just created:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: ..." --request GET \
http://127.0.0.1:8200/v1/auth/approle/role/jenkins | jq
{
@@ -342,7 +342,7 @@ $ curl --header "X-Vault-Token: ..." --request GET \
}
```
-### Step 3: Get Role ID and Secret ID
+### Step 3: Get Role ID and Secret ID ((#step3))
(**Persona:** admin)
@@ -359,13 +359,13 @@ Now, you need to fetch the Role ID and Secret ID of a role.
To read the Role ID:
-```shell
+```shell-session
$ vault read auth/approle/role//role-id
```
To generate a new Secret ID:
-```shell
+```shell-session
$ vault write -f auth/approle/role//secret-id
```
@@ -376,7 +376,7 @@ values specified. Alternatively, you can set
**Example:**
-```shell
+```shell-session
$ vault read auth/approle/role/jenkins/role-id
Key Value
--- -----
@@ -396,7 +396,7 @@ the role in [Step 2](#step2), the generated secret ID carries out the conditions
To read the Role ID:
-```shell
+```shell-session
$ curl --header "X-Vault-Token:..." \
--request GET \
/v1/auth/approle/role//role-id
@@ -404,7 +404,7 @@ $ curl --header "X-Vault-Token:..." \
To generate a new Secret ID:
-```shell
+```shell-session
$ curl --header "X-Vault-Token:..." \
--request POST \
--data
@@ -417,7 +417,7 @@ payload, or invoke the API with an empty payload.
**Example:**
-```shell
+```shell-session
$ curl --header "X-Vault-Token:..." --request GET \
http://127.0.0.1:8200/v1/auth/approle/role/jenkins/role-id | jq
@@ -428,7 +428,7 @@ $ curl --header "X-Vault-Token:..." --request POST \
If you specified `secret_id_ttl`, `secret_id_num_uses`, or `bound_cidr_list` on
the role in [Step 2](#step2), the generated secret ID carries out the conditions.
-### Step 4: Login with Role ID & Secret ID
+### Step 4: Login with Role ID & Secret ID ((#step4))
(**Persona:** app)
@@ -446,7 +446,7 @@ To login, use the `auth/approle/login` endpoint by passing the role ID and secre
**Example:**
-```shell
+```shell-session
$ vault write auth/approle/login role_id="675a50e7-cfe0-be76-e35f-49ec009731ea" \
secret_id="ed0a642f-2acf-c2da-232f-1b21300d5f29"
@@ -469,7 +469,7 @@ in the request payload.
**Example:**
-```plaintext
+```shell-session
$ cat payload.json
{
"role_id": "675a50e7-cfe0-be76-e35f-49ec009731ea",
@@ -504,7 +504,7 @@ $ curl --request POST --data @payload.json http://127.0.0.1:8200/v1/auth/approle
Now you have a **client token** with `default` and `jenkins` policies attached.
-### Step 5: Read secrets using the AppRole token
+### Step 5: Read secrets using the AppRole token ((#step5))
(**Persona:** app)
@@ -518,14 +518,14 @@ this token.
You can pass the `client_token` returned in [Step 4](#step4) as a part of the
CLI command.
-```shell
+```shell-session
$ VAULT_TOKEN=3e7dd0ac-8b3e-8f88-bb37-a2890455ca6e vault kv get secret/mysql/webapp
No value found at secret/mysql/webapp
```
Alternatively, you can first authenticate with Vault using the `client_token`.
-```shell
+```shell-session
$ vault login eeaf890e-4b0f-a687-4190-c75b1d6d70bc
Successfully authenticated! You are now logged in.
token: eeaf890e-4b0f-a687-4190-c75b1d6d70bc
@@ -542,7 +542,7 @@ found" message.
**Optional:** Using the `admin` user's token, you can store some secrets in the
`secret/mysql/webapp` path.
-```shell
+```shell-session
$ vault kv put secret/mysql/webapp @mysqldb.txt
$ cat mysqldb.txt
@@ -564,7 +564,7 @@ You can now pass the `client_token` returned in [Step 4](#step4) in the
**Example:**
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: eeaf890e-4b0f-a687-4190-c75b1d6d70bc" \
--request GET \
http://127.0.0.1:8200/v1/secret/data/mysql/webapp | jq
@@ -578,7 +578,7 @@ Since there is no value at `secret/mysql/webapp`, it returns an empty array.
**Optional:** Using the **`admin`** user's token, create some secrets in the
`secret/mysql/webapp` path.
-```shell
+```shell-session
$ curl --header "X-Vault-Token: ..." --request POST --data @mysqldb.txt \
$ cat mysqldb.text
@@ -616,13 +616,13 @@ to the secret ID rather than the actual value.
In [Step 3](#step3), you executed the following command to retrieve the Secret
ID:
-```shell
+```shell-session
$ vault write -f auth/approle/role/jenkins/secret-id
```
Instead, use response wrapping by passing the **`-wrap-ttl`** parameter:
-```shell
+```shell-session
$ vault write -wrap-ttl=60s -f auth/approle/role/jenkins/secret-id
Key Value
@@ -637,7 +637,7 @@ wrapping_token_creation_path: auth/approle/role/jenkins/secret-id
Send this `wrapping_token` to the client so that the response can be unwrapped and
obtain the Secret ID.
-```shell
+```shell-session
$ VAULT_TOKEN=9bbe23b7-5f8c-2aec-83dc-e97e94a2e632 vault unwrap
Key Value
@@ -648,7 +648,7 @@ secret_id_accessor 7d8a40b7-a6fd-a634-579b-b7d673ff86fb
NOTE: To retrieve the Secret ID alone, you can use `jq` as follows:
-```shell
+```shell-session
$ VAULT_TOKEN=2577044d-cf86-a065-e28f-e2a14ea6eaf7 vault unwrap -format=json | jq -r ".data.secret_id"
b07d7a47-1d0d-741d-20b4-ae0de7c6d964
diff --git a/website/pages/guides/identity/control-groups.mdx b/website/pages/guides/identity/control-groups.mdx
index 93b2750d5608..4c8df6cc7c09 100644
--- a/website/pages/guides/identity/control-groups.mdx
+++ b/website/pages/guides/identity/control-groups.mdx
@@ -146,7 +146,7 @@ You are going to perform the following:
operators who have the privileges to create policies and configure entities and
groups.
-### Step 1: Implement a control group
+### Step 1: Implement a control group ((#step1))
(**Persona:** admin)
@@ -212,7 +212,7 @@ groups.
$ vault kv put EU_GDPR_data/orders/acct1 order_number="12345678" product_id="987654321"
```
-### Step 2: Deploy the policies
+### Step 2: Deploy the policies ((#step2))
(**Persona:** admin)
@@ -275,7 +275,7 @@ then login.
1. Repeat the steps to create a policy for **`acct_manager`**.
-### Step 3: Setup entities and a group
+### Step 3: Setup entities and a group ((#step3))
(**Persona:** admin)
@@ -393,7 +393,7 @@ $ vault write identity/group name="acct_manager" \
1. Enter the `Ellen Wright` entity ID in the **Member Entity IDs** field, and
then click **Create**.
-### Step 4: Verification
+### Step 4: Verification ((#step4))
(**Persona:** bob and ellen)
@@ -607,7 +607,7 @@ Groups](/img/vault-ctrl-grp-6.png)
> Bob needs to request data access via CLI or API. Once the access request was
> approved, use the CLI or API to unwrap the secrets.
-### Step 5: ACL Policy vs. Sentinel Policy
+### Step 5: ACL Policy vs. Sentinel Policy ((#step5))
Although the [**`read-gdpr-order.hcl`**](#step1) was written as ACL policy, you
can implement Control Groups in either ACL or Sentinel policies.
diff --git a/website/pages/guides/identity/identity.mdx b/website/pages/guides/identity/identity.mdx
index e94d112c46a4..1e5d06078779 100644
--- a/website/pages/guides/identity/identity.mdx
+++ b/website/pages/guides/identity/identity.mdx
@@ -143,7 +143,7 @@ creating an external group by mapping a GitHub group to an identity group.
3. [Create an Internal Group](#step3)
4. [Create an External Group](#step4)
-### Step 1: Create an Entity with Alias
+### Step 1: Create an Entity with Alias ((#step1))
You are going to create a new entity with base policy assigned. The entity
defines two entity aliases with each has a different policy assigned.
@@ -473,7 +473,7 @@ attached.
**Example:**
-```plaintext
+```shell-session
$ tee payload-bob.json <Step 2: Test the Entity
+### Step 2: Test the Entity ((#step2))
To better understand how a token inherits the capabilities from the entity's
policy, you are going to test it by logging in as `bob`.
@@ -615,7 +615,7 @@ policy, you are going to test it by logging in as `bob`.
First, login as `bob`.
-```plaintext
+```shell-session
$ vault login -method=userpass username=bob password=training
Key Value
@@ -637,7 +637,7 @@ token_meta_username bob
The `test` policy grants CRUD operations on the `secret/test` path.
Test to make sure that you can write secrets in the path.
-```plaintext
+```shell-session
$ vault kv put secret/test owner="bob"
Success! Data written to: secret/test
```
@@ -648,7 +648,7 @@ of the `bob-smith` entity, and the entity has base policy attached.
Check to see that the bob's token inherited the capabilities.
-```plaintext
+```shell-session
$ vault token capabilities secret/training_test
create, read
```
@@ -659,7 +659,7 @@ create, read
What about the `secret/team-qa` path?
-```plaintext
+```shell-session
$ vault token capabilities secret/team-qa
deny
```
@@ -676,7 +676,7 @@ The user can access the `secret/team-qa` path only if he logs in with
First, login as `bob`.
-```plaintext
+```shell-session
$ curl --request POST \
--data '{"password": "training"}' \
http://127.0.0.1:8200/v1/auth/userpass/login/bob
@@ -707,7 +707,7 @@ $ curl --request POST \
The `test` policy grants CRUD operations on the `secret/test` path. Test
to make sure that you can write secrets in the path.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"owner": "bob"}' \
@@ -720,7 +720,7 @@ of the `bob-smith` entity, and the entity has base policy attached.
Check to see that the bob's token inherited the capabilities.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"paths": ["secret/training_test"]}'
@@ -739,7 +739,7 @@ $ curl --header "X-Vault-Token: ..." \
What about the `secret/team-qa` path?
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"paths": ["secret/team-qa"]}'
@@ -759,7 +759,7 @@ The user can access the `secret/team-qa` path only if he logs in with
!> **NOTE:** Log back in with the token you used to configure the entity before proceed to
[Step 3](#step3).
-### Step 3: Create an Internal Group
+### Step 3: Create an Internal Group ((#step3))
Now, you are going to create an internal group named, **`engineers`**. Its
member is `bob-smith` entity that you created in [Step 1](#step1).
@@ -904,7 +904,7 @@ in [Step 3](#step3) to verify that.
> create **external** groups. For internal groups, you specify `member_entity_ids`
> and/or `member_group_ids`.
-### Step 4: Create an External Group
+### Step 4: Create an External Group ((#step4))
It is common for organizations to enable auth methods such as LDAP, Okta and
perhaps GitHub to handle the Vault user authentication, and individual user's
diff --git a/website/pages/guides/identity/lease.mdx b/website/pages/guides/identity/lease.mdx
index 81fb0f348c93..7e993eddb72d 100644
--- a/website/pages/guides/identity/lease.mdx
+++ b/website/pages/guides/identity/lease.mdx
@@ -153,12 +153,12 @@ This guide demonstrates the lifecycle of tokens.
1. [Orphan tokens](#step5)
1. [Revoke tokens](#step6)
-### Step 1: Read token auth method configuration
+### Step 1: Read token auth method configuration ((#step1))
When you create leases with no specific TTL values, the default value applies
to the lease.
-```shell
+```shell-session
$ vault auth list
Path Type Accessor Default TTL Max TTL Replication Behavior Description
@@ -183,7 +183,7 @@ the system configuration.
Read the default TTL settings for **token** auth method:
-```shell
+```shell-session
$ vault read sys/auth/token/tune
Key Value
@@ -198,7 +198,7 @@ max_lease_ttl 2764800
Use `/sys/auth/token/tune` endpoint to read the default TTL settings for **token** auth
method:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: " \
--request GET \
/v1/sys/auth/token/tune
@@ -209,7 +209,7 @@ Where `` is your valid token with read permission on the
**Example:**
-```shell
+```shell-session
$ curl --header "X-Vault-Token: ..." --request GET \
http://127.0.0.1:8200/v1/sys/auth/token/tune | jq
{
@@ -233,7 +233,7 @@ $ curl --header "X-Vault-Token: ..." --request GET \
-> **NOTE:** The returned TTL value is in seconds (2764800 seconds = 32 days).
-### Step 2: Create short-lived tokens
+### Step 2: Create short-lived tokens ((#step2))
Create a new token with TTL of 30 seconds which means that the token gets
automatically revoked after 30 seconds.
@@ -242,7 +242,7 @@ automatically revoked after 30 seconds.
To view optional parameters to create tokens:
-```shell
+```shell-session
$ vault token create -help
```
@@ -293,19 +293,19 @@ token usage.
You can **renew** the token's TTL as long as the token has not expired.
-```shell
+```shell-session
$ vault token renew
```
If you want to renew and extend the token's TTL, pass the desired extension:
-```shell
+```shell-session
$ vault token renew
```
Or with revamped cli:
-```shell
+```shell-session
$ vault token renew -increment=
```
@@ -366,7 +366,7 @@ token usage.
#### Renew the token:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: ..." --request POST \
http://127.0.0.1:8200/v1/auth/token/renew/ | jq
@@ -382,7 +382,7 @@ renew the token up to 24 hours from its creation time. Once 24 hours has passed
the token's creation time, the token is revoked by Vault. For long running
processes, this may introduce complexity. In such case, use [periodic tokens](#step4).
-### Step 3: Create tokens with use limit
+### Step 3: Create tokens with use limit ((#step3))
In addition to TTL and max TTL, tokens may be limited to a number of uses. Use
limit tokens expire at the end of their last use regardless of their remaining
@@ -398,7 +398,7 @@ Create a token with the `-use-limit` property argument.
**Example:**
-```shell
+```shell-session
$ vault token create -policy=default -use-limit=2
Key Value
@@ -414,7 +414,7 @@ This creates a token with the _default_ policy and a use limit of 2.
#### Verification
-```shell
+```shell-session
$ VAULT_TOKEN=bd39178e-176e-cc91-3930-94f7b0194de5 vault token lookup
Key Value
@@ -459,7 +459,7 @@ the attempt to read the secret from the cubbyhole failed.
Set the `num_uses` property in the request payload.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." --request POST \
--data '{ "policies": ["default"], "num_uses":2 }' \
http://127.0.0.1:8200/v1/auth/token/create | jq
@@ -488,7 +488,7 @@ This creates a token with the _default_ policy and a use limit of 2.
#### Verification
-```text
+```shell-session
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
--request GET \
http://127.0.0.1:8200/v1/auth/token/lookup-self | jq
@@ -531,7 +531,7 @@ The first command read the token's properties and then wrote a value to the cubb
secret engine. This exhausted the use limit of 2 for this token. Therefore,
the attempt to read the secret from the cubbyhole failed.
-### Step 4: Periodic tokens
+### Step 4: Periodic tokens ((#step4))
**Root** or **sudo** users have the ability to generate **periodic tokens**.
Periodic tokens have a TTL, but no max TTL; therefore, they may live for an
@@ -546,19 +546,19 @@ the token renewal period. This value can be an integer value in seconds (e.g.
2764800. or a string duration (e.g. 72h).
-```shell
+```shell-session
$ vault write auth/token/roles/ allowed_policies="" period=
```
**Example:**
-```shell
+```shell-session
$ vault write auth/token/roles/zabbix allowed_policies="default" period="24h"
```
Now, generate a token:
-```shell
+```shell-session
$ vault token create -role=zabbix
Key Value
@@ -602,7 +602,7 @@ Its renewal period is set to 24 hours.
Now, generate a token:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." --request POST \
http://127.0.0.1:8200/v1/auth/token/create/zabbix | jq
{
@@ -638,7 +638,7 @@ To create AppRole periodic tokens, create your AppRole role with
**Example:**
-```plaintext
+```shell-session
$ vault write auth/approle/role/jenkins policies="jenkins" period="72h"
```
@@ -661,7 +661,7 @@ $ curl --header "X-Vault-Token:..." --request POST \
http://127.0.0.1:8200/v1/auth/approle/role/jenkins
```
-### Step 5: Orphan tokens
+### Step 5: Orphan tokens ((#step5))
Orphan tokens are **not** children of their parent; therefore, orphan tokens do
not expire when their parent does.
@@ -673,7 +673,7 @@ not expire when their parent does.
The following CLI command requires **root** token or **sudo** capability on the
`auth/token/create` path.
-```shell
+```shell-session
$ vault token create -orphan
```
@@ -681,7 +681,7 @@ $ vault token create -orphan
To create an orphan token, use the **`auth/token/create-orphan`** endpoint:
-```shell
+```shell-session
$ curl --header "X-Vault-Token:..." --request POST \
http://127.0.0.1:8200/v1/auth/token/create-orphan | jq
```
@@ -689,7 +689,7 @@ $ curl --header "X-Vault-Token:..." --request POST \
Also, you can create an orphan token using the **`auth/token/create`** endpoint with
`no-parent` parameter set to true.
-```shell
+```shell-session
$ curl --header "X-Vault-Token:..." --request POST \
--data '{ "no_parent": true }' \
http://127.0.0.1:8200/v1/auth/token/create | jq
@@ -699,7 +699,7 @@ $ curl --header "X-Vault-Token:..." --request POST \
**sudo** capability to create an orphan token while
**`auth/token/create-orphan`** endpoint does not.
-### Step 6: Revoke tokens and leases
+### Step 6: Revoke tokens and leases ((#step6))
Revoking a token and all its children.
@@ -707,13 +707,13 @@ Revoking a token and all its children.
To revoke a specific token:
-```shell
+```shell-session
$ vault token revoke
```
To revoke all leases under a specific path:
-```shell
+```shell-session
$ vault lease revoke -prefix
```
@@ -766,7 +766,7 @@ secret leases expire earlier than you expected.
#### 1. Determine the TTLs specific to the mount
-```shell
+```shell-session
$ vault secrets list
Path Type Accessor Plugin Default TTL Max TTL Force No Cache Replication Behavior Seal Wrap Description
@@ -791,13 +791,13 @@ Override the global defaults by specifying `default_lease_ttl` and
The following example assumes that you have a database secret engine configured.
-```shell
+```shell-session
$ vault write sys/mounts/database/tune default_lease_ttl="8640"
```
Or
-```shell
+```shell-session
$ curl --header "X-Vault-Token:..." --request POST \
--data '{ "max_lease_ttl": 129600}' \
http://127.0.0.1:8200/v1/sys/mounts/database/tune
@@ -808,7 +808,7 @@ $ curl --header "X-Vault-Token:..." --request POST \
Depending on the auth method, there may be more specific TTLs configured (e.g.
roles, groups, users) as you have done so in [Step 4](#step4).
-```shell
+```shell-session
$ vault read auth/token/roles/zabbix
Key Value
diff --git a/website/pages/guides/identity/policies.mdx b/website/pages/guides/identity/policies.mdx
index ac4d0c9944b4..9b4ed5611399 100644
--- a/website/pages/guides/identity/policies.mdx
+++ b/website/pages/guides/identity/policies.mdx
@@ -178,7 +178,7 @@ This guide demonstrates basic policy authoring and management tasks.
1. [View existing policies](#step3)
1. [Check capabilities of a token](#step4)
-### Step 1: Write ACL policies in HCL format
+### Step 1: Write ACL policies in HCL format ((#step1))
Remember, an empty policy grants **no permission** in the system. Therefore, ACL
policies are defined for each path.
@@ -348,7 +348,7 @@ path "secret/*"
}
```
-### Step 2: Create policies
+### Step 2: Create policies ((#step2))
Now, create `admin` and `provisioner` policies in Vault.
@@ -356,7 +356,7 @@ Now, create `admin` and `provisioner` policies in Vault.
To create policies:
-```shell
+```shell-session
$ vault policy write
```
@@ -379,7 +379,7 @@ To create a policy, use the
[`sys/policies/acl`](/api/system/policies#create-update-acl-policy)
endpoint:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: " \
--request PUT \
--data \
@@ -425,7 +425,7 @@ $ curl --header "X-Vault-Token: ..." \
**NOTE:** To update an existing policy, simply re-run the same command by
passing your modified policy in the request payload (`*.json`).
-### Step 3: View existing policies
+### Step 3: View existing policies ((#step3))
Make sure that you see the policies you created in [Step 2](#step2).
@@ -433,13 +433,13 @@ Make sure that you see the policies you created in [Step 2](#step2).
The following command lists existing policies:
-```shell
+```shell-session
$ vault policy list
```
To view a specific policy:
-```shell
+```shell-session
$ vault policy read
```
@@ -472,7 +472,7 @@ path "sys/policy/*"
To list existing ACL policies, use the `sys/policies/acl` endpoint.
-```shell
+```shell-session
$ curl --request LIST --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policies/acl | jq
```
@@ -502,7 +502,7 @@ $ curl --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policies/acl/a
}
```
-### Step 4: Check capabilities of a token
+### Step 4: Check capabilities of a token ((#step4))
This step shows how to print out the permitted capabilities of a token on a
path. This can help verifying what operations are granted based on the policies
@@ -512,7 +512,7 @@ attached to the token.
The command is:
-```shell
+```shell-session
$ vault token capabilities
```
@@ -520,7 +520,7 @@ $ vault token capabilities
First, create a token attached to `admin` policy.
-```shell
+```shell-session
$ vault token create -policy="admin"
Key Value
--- -----
@@ -535,7 +535,7 @@ policies ["admin" "default"]
Now, fetch the capabilities of this token on the `sys/auth/approle` path.
-```plaintext
+```shell-session
$ vault token capabilities 2sHGlAHNj36LpqQ2Zevl2Owi sys/auth/approle
create, delete, read, sudo, update
```
@@ -547,7 +547,7 @@ capabilities on paths.
In the absence of a token, it returns the capabilities of the current token
invoking this command.
-```shell
+```shell-session
$ vault token capabilities sys/auth/approle
root
```
@@ -560,7 +560,7 @@ Use the `sys/capabilities` endpoint.
First, create a token attached to the `admin` policy:
-```shell
+```shell-session
$ curl --request POST --header "X-Vault-Token: ..." --data '{ "policies":"admin" }' \
http://127.0.0.1:8200/v1/auth/token/create
{
@@ -630,7 +630,7 @@ capabilities on paths.
To check the current token's capabilities permitted on a path, use
the `sys/capabilities-self` endpoint.
-```plaintext
+```shell-session
$ curl --request POST --header "X-Vault-Token: ..." \
--data '{"path":"sys/auth/approle"}' \
http://127.0.0.1:8200/v1/sys/capabilities-self
diff --git a/website/pages/guides/identity/policy-templating.mdx b/website/pages/guides/identity/policy-templating.mdx
index 0d7bd6ed4005..9ddf082762dc 100644
--- a/website/pages/guides/identity/policy-templating.mdx
+++ b/website/pages/guides/identity/policy-templating.mdx
@@ -106,25 +106,25 @@ In this guide, you are going to perform the following steps:
1. [Setup an entity and a group](#step3)
1. [Test the ACL templating](#step4)
-### Step 1: Write templated ACL policies
+### Step 1: Write templated ACL policies ((#step1))
Policy authors can pass in a policy path containing double curly braces as
templating delimiters: `{{}}`.
#### Available Templating Parameters
-| Name | Description |
-| :--------------------------------------------------------------------- | :---------------------------------------------------------------------- |
-| `identity.entity.id` | The entity's ID |
-| `identity.entity.name` | The entity's name |
-| `identity.entity.metadata.<>` | Metadata associated with the entity for the given key |
-| `identity.entity.aliases.<>.id` | Entity alias ID for the given mount |
-| `identity.entity.aliases.<>.name` | Entity alias name for the given mount |
-| `identity.entity.aliases.<>.metadata.<>` | Metadata associated with the alias for the given mount and metadata key |
-| `identity.groups.ids.<>.name` | The group name for the given group ID |
-| `identity.groups.names.<>.id` | The group ID for the given group name |
-| `identity.groups.ids.<>.metadata.<>` | Metadata associated with the group for the given key |
-| `identity.groups.names.<>.metadata.<>` | Metadata associated with the group for the given key |
+| Name | Description |
+| :----------------------------------------------------------------- | :---------------------------------------------------------------------- |
+| `identity.entity.id` | The entity's ID |
+| `identity.entity.name` | The entity's name |
+| `identity.entity.metadata.` | Metadata associated with the entity for the given key |
+| `identity.entity.aliases..id` | Entity alias ID for the given mount |
+| `identity.entity.aliases..name` | Entity alias name for the given mount |
+| `identity.entity.aliases..metadata.` | Metadata associated with the alias for the given mount and metadata key |
+| `identity.groups.ids..name` | The group name for the given group ID |
+| `identity.groups.names..id` | The group ID for the given group name |
+| `identity.groups.ids..metadata.` | Metadata associated with the group for the given key |
+| `identity.groups.names..metadata.` | Metadata associated with the group for the given key |
-> **NOTE:** Identity groups are not directly attached to a token and an entity
can be associated with multiple groups. Therefore, in order to reference a
@@ -186,13 +186,13 @@ path "identity/group/id" {
}
```
-### Step 2: Deploy your policy
+### Step 2: Deploy your policy ((#step2))
- [CLI command](#step2-cli)
- [API call using cURL](#step2-api)
- [Web UI](#step2-ui)
-#### CLI command
+#### CLI command ((#step2-cli))
```shell
# Create the user-tmpl policy
@@ -202,11 +202,11 @@ $ vault policy write user-tmpl user-tmpl.hcl
$ vault policy write group-tmpl group-tmpl.hcl
```
-#### API call using cURL
+#### API call using cURL ((#step2-api))
To create a policy, use the `/sys/policies/acl` endpoint:
-```sh
+```shell-session
$ curl --header "X-Vault-Token: " \
--request PUT \
--data \
@@ -246,7 +246,7 @@ $ curl --header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/policies/acl/group-tmpl
```
-#### Web UI
+#### Web UI ((#step2-ui))
Open a web browser and launch the Vault UI (e.g. http://127.0.0.1:8200/ui) and
then login.
@@ -264,7 +264,7 @@ then login.
1. Repeat the steps to create the `group-tmpl` policy.
-### Step 3: Setup an entity and a group
+### Step 3: Setup an entity and a group ((#step3))
Let's create an entity, **`bob_smith`** with a user **`bob`** as its entity
alias. Also, create a group, **`education`** and add the **`bob_smith`** entity
@@ -279,7 +279,7 @@ Groups](/guides/identity/identity) guide if you need the full details.
- [CLI command](#step3-cli)
- [Web UI](#step3-ui)
-#### CLI command
+#### CLI command ((#step3-cli))
The following command uses [`jq`](https://stedolan.github.io/jq/download/) tool
to parse JSON output.
@@ -312,7 +312,7 @@ $ vault write -format=json identity/group name="education" \
| jq -r ".data.id" > group_id.txt
```
-#### Web UI
+#### Web UI ((#step3-ui))
1. Click the **Access** tab, and select **Enable new method**.
@@ -354,13 +354,13 @@ $ vault write -format=json identity/group name="education" \
1. Click **Create**.
-### Step 4: Test the ACL templating
+### Step 4: Test the ACL templating ((#step4))
- [CLI command](#step4-cli)
- [API call using cURL](#step4-api)
- [Web UI](#step4-ui)
-#### CLI Command
+#### CLI Command ((#step4-cli))
1. Enable key/value v2 secrets engine at `user-kv` and `group-kv` paths.
@@ -450,7 +450,7 @@ $ vault write -format=json identity/group name="education" \
type internal
```
-#### API call using cURL
+#### API call using cURL ((#step4-api))
1. Enable key/value v2 secrets engine at `user-kv` and `group-kv` paths.
@@ -542,7 +542,7 @@ $ vault write -format=json identity/group name="education" \
http://127.0.0.1:8200/v1/identity/group/id/
```
-#### Web UI
+#### Web UI ((#step4-ui))
1. In **Secrets** tab, select **Enable new engine**.
diff --git a/website/pages/guides/identity/sentinel.mdx b/website/pages/guides/identity/sentinel.mdx
index a6c691b8c6e2..8d4a8a683ff1 100644
--- a/website/pages/guides/identity/sentinel.mdx
+++ b/website/pages/guides/identity/sentinel.mdx
@@ -97,7 +97,7 @@ This guide demonstrates basic Sentinel policy authoring and management tasks.
1. [Deploy your EGP policies](#step3)
1. [Delete Sentinel Policies](#step4)
-### Step 1: Write Sentinel Policies
+### Step 1: Write Sentinel Policies ((#step1))
#### Anatomy of Sentinel Policies
@@ -195,7 +195,7 @@ main = rule when precond {
documentation for available properties which Vault injects to Sentinel to allow
fine-grained controls.
-### Step 2: Test the Sentinel Policies
+### Step 2: Test the Sentinel Policies ((#step2))
You can test the Sentinel policies prior to deployment in orders to validate
syntax and to document expected behavior.
@@ -328,7 +328,7 @@ syntax and to document expected behavior.
> **NOTE:** If you want to see the tracing and log output for those tests,
> run the command with `-verbose` flag.
-### Step 3: Deploy your EGP policies
+### Step 3: Deploy your EGP policies ((#step3))
Sentinel policies has three **enforcement levels**:
@@ -338,8 +338,6 @@ Sentinel policies has three **enforcement levels**:
| soft-mandatory | The policy must pass unless an override is specified. |
| hard-mandatory | The policy must pass no matter what! |
-
-
Since both policies are tied to specific paths, the policy type that you are
going to create is Endpoint Governing Policies (EGPs).
@@ -388,7 +386,7 @@ going to create is Endpoint Governing Policies (EGPs).
To create EGP policies, use the `/sys/policies/egp` endpoint:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: " \
--request PUT \
--data \
@@ -490,8 +488,6 @@ then login.
1. Click **Create Policy**.
-
-
~> **NOTE:** Unlike ACL policies, EGPs are a _prefix walk_ which allows policies
to be applied at various points at Vault API. If you have EGPs tied to
"**`secret/orders`**", "**`secret/*`**" and "**`*`**", all EGPs will be
@@ -502,7 +498,7 @@ evaluated for a request on "**`secret/orders`**".
Once the policies were deployed, `create`, `update` and `delete` operations
coming from an IP address other than `122.22.3.4` will be denied.
-```plaintext
+```shell-session
$ vault kv put secret/accounting/test acct_no="293472309423"
Error writing data to secret/accounting/test: Error making API request.
@@ -539,7 +535,7 @@ hours defined by the `business-hrs` policy.
!> **NOTE:** Like with ACL policies, **`root`** tokens are **_NOT_** subject to
Sentinel policy checks.
-### Step 4: Delete Sentinel Policies
+### Step 4: Delete Sentinel Policies ((#step4))
#### CLI Command
diff --git a/website/pages/guides/index.mdx b/website/pages/guides/index.mdx
index 7a2095018d56..427bb0f5b2ad 100644
--- a/website/pages/guides/index.mdx
+++ b/website/pages/guides/index.mdx
@@ -15,8 +15,6 @@ guides. The guides provide examples for common Vault workflows and actions for
both users and operators of Vault. Due to the nature of Vault, some of these
procedures can be complex, so our goal is to provide guidance to do them safely.
-
-
-> Please visit [_Katacoda_](https://www.katacoda.com/hashicorp) where a series
of interactive tutorials are waiting for you to get started on learning Vault.
diff --git a/website/pages/guides/operations/autounseal-aws-kms.mdx b/website/pages/guides/operations/autounseal-aws-kms.mdx
index bb5e5d7664af..0772196fdc52 100644
--- a/website/pages/guides/operations/autounseal-aws-kms.mdx
+++ b/website/pages/guides/operations/autounseal-aws-kms.mdx
@@ -112,7 +112,7 @@ The working directory should contain the provided Terraform files:
**Task 2:** Set your AWS credentials as environment variables:
-```plaintext
+```shell-session
$ export AWS_ACCESS_KEY_ID = ""
$ export AWS_SECRET_ACCESS_KEY = ""
@@ -132,7 +132,7 @@ resources. Then **`terraform plan`** to verify your changes and the resources th
will be created. If all looks good, then perform a **`terraform apply`** to
provision the resources.
-```plaintext
+```shell-session
$ terraform init
Initializing provider plugins...
...
@@ -161,7 +161,7 @@ your server as well as the Vault Enterprise web interface address.
SSH into the provisioned EC2 instance.
-```plaintext
+```shell-session
$ ssh ubuntu@192.0.2.1 -i private.key
...
Are you sure you want to continue connecting (yes/no)? yes
@@ -172,7 +172,7 @@ When you are prompted, enter "yes" to continue.
To verify that Vault has been installed, run `vault status` command which should
return "_server is not yet initialized_" message.
-```plaintext
+```shell-session
$ export VAULT_ADDR=http://127.0.0.1:8200
$ vault status
@@ -187,7 +187,7 @@ Code: 400. Errors:
Run the **`vault operator init`** command to initialize the Vault server by
setting its key share to be **`1`** as follow:
-```plaintext
+```shell-session
$ vault operator init -stored-shares=1 -recovery-shares=1 -recovery-threshold=1 -key-shares=1 -key-threshold=1
Recovery Key 1: oOxAQfxcZitjqZfF3984De8rUckPeahQDUvmJ1A4JrQ=
Initial Root Token: 54c4dbe3-d45b-79d9-18d0-602831a6a991
@@ -200,7 +200,7 @@ securely distribute the above keys.
Stop and start the Vault server:
-```plaintext
+```shell-session
$ sudo systemctl stop vault
$ vault status
@@ -211,7 +211,7 @@ $ sudo systemctl start vault
Check the Vault status to verify that it has been started and unsealed.
-```plaintext
+```shell-session
$ vault status
Type: shamir
Sealed: false
@@ -228,7 +228,7 @@ High-Availability Enabled: false
Log into Vault using the generated initial root token:
-```plaintext
+```shell-session
$ vault login 54c4dbe3-d45b-79d9-18d0-602831a6a991
Successfully authenticated! You are now logged in.
token: 54c4dbe3-d45b-79d9-18d0-602831a6a991
@@ -238,7 +238,7 @@ token_policies: [root]
Review the Vault configuration file (`/etc/vault.d/vault.hcl`).
-```plaintext
+```shell-session
$ cat /etc/vault.d/vault.hcl
storage "file" {
path = "/opt/vault"
@@ -267,7 +267,7 @@ and log in with your initial root token.
Once completed, execute the following commands to clean up:
-```plaintext
+```shell-session
$ terraform destroy -force
$ rm -rf .terraform terraform.tfstate* private.key
diff --git a/website/pages/guides/operations/disaster-recovery.mdx b/website/pages/guides/operations/disaster-recovery.mdx
index 394f6f77bfd2..77667467533b 100644
--- a/website/pages/guides/operations/disaster-recovery.mdx
+++ b/website/pages/guides/operations/disaster-recovery.mdx
@@ -63,7 +63,7 @@ This guide walk through the following operations:
1. [Demote DR Primary to Secondary](#step4)
1. [Disable DR Primary](#step5)
-### Step 1: Enable DR Primary Replication
+### Step 1: Enable DR Primary Replication ((#step1))
#### CLI command
@@ -173,7 +173,7 @@ https://cluster-A.example.com:8200/ui) and then login.
1. Click **Copy** to copy the token which you will need to enable the DR secondary cluster.
![DR Replication - primary](/img/vault-dr-4.png)
-### Step 2: Enable DR Secondary Replication
+### Step 2: Enable DR Secondary Replication ((#step2))
The following operations must be performed on the DR secondary cluster.
@@ -247,7 +247,7 @@ The following operations must be performed on the DR secondary cluster.
!> **NOTE:** This will immediately clear all data in the secondary cluster.
-### Step 3: Promote DR Secondary to Primary
+### Step 3: Promote DR Secondary to Primary ((#step3))
This step walks you through the promotion of the secondary cluster to become the
new primary when a catastrophic failure causes the primary cluster to be
@@ -434,7 +434,7 @@ secondary cluster. The process, outlined below using API calls, is the similar t
> authentication method. If desired, generate a [new root
> token](/guides/operations/generate-root).
-### Step 4: Demote DR Primary to Secondary
+### Step 4: Demote DR Primary to Secondary ((#step4))
If the _original_ DR primary cluster becomes operational again, you may want to
utilize the cluster by making it a DR secondary cluster. This step explains how
@@ -448,7 +448,7 @@ in DR replication.
Execute the following command to demote the original DR primary cluster to a
secondary.
-```plaintext
+```shell-session
$ vault write -f sys/replication/dr/primary/demote
WARNING! The following warnings were returned from Vault:
@@ -466,7 +466,7 @@ reconnected to the same DR replication set without wiping local storage.
Invoke the **`sys/replication/dr/secondary/enable`** endpoint to demote the
original DR primary cluster to a secondary.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
https://cluster-A.example.com:8200/v1/sys/replication/dr/primary/demote | jq
@@ -499,7 +499,7 @@ When you prompted, "_Are you sure you want to demote this cluster?_", click
![DR Replication - demotion](/img/vault-dr-12.png)
-### Step 5: Disable DR Primary
+### Step 5: Disable DR Primary ((#step5))
Once the DR secondary cluster was promoted to be the **new primary**, you may
want to disable the DR replication on the _original_ primary when it becomes
@@ -512,7 +512,7 @@ in DR replication.
Execute the following command to disable DR replication.
-```plaintext
+```shell-session
$ vault write -f sys/replication/dr/primary/disable
WARNING! The following warnings were returned from Vault:
@@ -528,7 +528,7 @@ Any secondaries will no longer be able to connect.
Invoke the **`sys/replication/dr/primary/disable`** endpoint to disable DR
replication.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
https://cluster-A.example.com:8200/v1/sys/replication/dr/primary/disable | jq
@@ -567,7 +567,7 @@ the underlying storage even if they have connected before. If re-enabling DR
replication as a secondary, its underlying storage will be wiped when connected
to a primary.
-## Important Note about Automated DR Failover
+## Important Note about Automated DR Failover ((#important))
Vault does not support an automatic failover/promotion of a DR secondary
cluster, and this is a deliberate choice due to the difficulty in accurately
diff --git a/website/pages/guides/operations/mount-filter.mdx b/website/pages/guides/operations/mount-filter.mdx
index 5eabe6939ef4..d336cae0b53f 100644
--- a/website/pages/guides/operations/mount-filter.mdx
+++ b/website/pages/guides/operations/mount-filter.mdx
@@ -85,7 +85,7 @@ GDPR, from being replicated across the regions.
~> **NOTE:** Ensure that GDPR data is segmented by secret mount and blacklist
the movement of those secret mounts to non-GDPR territories.
-### Step 1: Segment GDPR and non-GDPR secret engines
+### Step 1: Segment GDPR and non-GDPR secret engines ((#step1))
In the EU cluster (primary cluster), enable key/value secret engines:
@@ -131,7 +131,7 @@ Select **Enable new engine** and enter corresponding parameter values:
Click **Enable Engine** to complete.
-### Step 2: Enable performance replication with mount filter
+### Step 2: Enable performance replication with mount filter ((#step2))
#### CLI command
@@ -289,7 +289,7 @@ the _source of truth_ and passes token requests to the primary.
Restart the secondary vault server (e.g. `https://us-central.compute.com:8201`)
and unseal it with the primary cluster's unseal key.
-```plaintext
+```shell-session
$ vault operator unseal
Unseal Key (will be hidden):
```
@@ -316,11 +316,11 @@ tokens are only used for just enough initial setup or in emergencies.
Log into the **secondary** cluster using the enabled auth method.
-```plaintext
+```shell-session
$ vault login -method=userpass username=james password="passw0rd"
```
-### Step 3: Verify the replication mount filter
+### Step 3: Verify the replication mount filter ((#step3))
Once the replication completes, verify that the secrets stored in the
`EU_GDPR_data` never get replicated to the US cluster.
@@ -452,7 +452,7 @@ the `apikey` under `US_NON_GDPR_data/secret`.
The **EU_GDPR_data** data is not replicated, so you won't be able to see the
secrets.
-### Step 4: Enable a local secret engine
+### Step 4: Enable a local secret engine ((#step4))
When replication is enabled, you can mark the secrets engine local only. Local
secret engines are not replicated or removed by replication.
@@ -464,7 +464,7 @@ Login to the **secondary** cluster and enable key/value secret engine at
Pass the `-local` flag:
-```plaintext
+```shell-session
$ vault secrets enable -local -path=US_ONLY_data kv-v2
```
@@ -472,7 +472,7 @@ $ vault secrets enable -local -path=US_ONLY_data kv-v2
Pass the `local` parameter in the API request:
-```plaintext
+```shell-session
$ tee payload.json <Step 1: Create namespaces
+### Step 1: Create namespaces ((#step1))
(**Persona:** operations)
@@ -126,7 +126,7 @@ To create a new namespace, run: **`vault namespace create `**
To create a new namespace, invoke **`sys/namespaces`** endpoint:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
/v1/sys/namespaces/
@@ -219,7 +219,7 @@ name.
1. Select **Create a namespace** again, and then enter **`certification`** in
the **Path** field, and click **Save**.
-### Step 2: Write Policies
+### Step 2: Write Policies ((#step2))
(**Persona:** operations)
@@ -423,7 +423,7 @@ $ curl --header "X-Vault-Token: ..." \
1. Click **Create Policy**.
-### Step 3: Setup entities and groups
+### Step 3: Setup entities and groups ((#step3))
(**Persona:** operations)
@@ -562,7 +562,7 @@ $ vault write -namespace=education identity/entity-alias name="bsmith" \
canonical_id= mount_accessor=
```
-### Step 4: Test the organization admin user
+### Step 4: Test the organization admin user ((#step4))
(**Persona:** org-admin)
@@ -570,7 +570,7 @@ $ vault write -namespace=education identity/entity-alias name="bsmith" \
Log in as **`bob`** into the `education` namespace:
-```plaintext
+```shell-session
$ vault login -namespace=education -method=userpass username="bob" password="password"
Key Value
@@ -608,7 +608,7 @@ Optionally, you can create new policies to test that `bob` can perform the
operations as expected. When you are done testing, unset the VAULT_NAMESPACE
environment variable.
-```plaintext
+```shell-session
$ unset VAULT_NAMESPACE
```
@@ -616,7 +616,7 @@ $ unset VAULT_NAMESPACE
Log in as **`bob`** into the `education` namespace:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Namespace: education" \
--request POST \
--data '{"password": "password"}' \
@@ -698,7 +698,7 @@ $ curl --header "X-Vault-Token: 5ai0qpQeCdRHALzEY4Q8sW.28dk2" \
1. Click **Enable Engine** to finish.
-### Step 5: Test the team admin user
+### Step 5: Test the team admin user ((#step5))
(**Persona:** team-admin)
@@ -706,7 +706,7 @@ $ curl --header "X-Vault-Token: 5ai0qpQeCdRHALzEY4Q8sW.28dk2" \
Log in as **`bsmith`** into the **`education/training`** namespace:
-```plaintext
+```shell-session
$ vault login -namespace=education/training -method=userpass username="bsmith" password="password"
Key Value
@@ -743,7 +743,7 @@ Success! Enabled the kv secrets engine at: team-secret/
When you are done testing, unset the VAULT_NAMESPACE environment variable.
-```plaintext
+```shell-session
$ unset VAULT_NAMESPACE
```
@@ -751,7 +751,7 @@ $ unset VAULT_NAMESPACE
Log in as **`bsmith`** into the `education` namespace:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Namespace: education/training" \
--request POST \
--data '{"password": "password"}' \
@@ -832,7 +832,7 @@ $ curl --header "X-Vault-Token: 5YNNjDDl6D8iW3eGQIlU0q.9dKXw" \
1. Click **Enable Engine** to finish.
-### Step 6: Audit ambient credentials
+### Step 6: Audit ambient credentials ((#step6))
(**Persona:** operator)
diff --git a/website/pages/guides/operations/plugin-backends.mdx b/website/pages/guides/operations/plugin-backends.mdx
index 0de35c33fcc4..c5cad791abd0 100644
--- a/website/pages/guides/operations/plugin-backends.mdx
+++ b/website/pages/guides/operations/plugin-backends.mdx
@@ -41,7 +41,7 @@ configured above. This guide uses `mock-plugin` that comes from Vault's
Download the source (you would probably use your own plugin):
-```sh
+```shell-session
$ go get -f -u -d github.com/hashicorp/vault
# ...
$ cd $GOPATH/src/github.com/hashicorp/vault/sdk/plugin/mock/mock-plugin
@@ -49,19 +49,19 @@ $ cd $GOPATH/src/github.com/hashicorp/vault/sdk/plugin/mock/mock-plugin
Compile the plugin:
-```sh
+```shell-session
$ go build -o my-mock-plugin
```
Put the plugin in the directory:
-```sh
+```shell-session
$ mv my-mock-plugin /etc/vault/vault_plugins
```
Alternatively, if you wanted a custom version of a plugin built into Vault, such as AppRole:
-```sh
+```shell-session
$ cd $GOPATH/src/github.com/hashicorp/vault/builtin/credential/approle/cmd/approle
$ go build
$ mv approle /etc/vault/vault_plugins
@@ -72,7 +72,7 @@ $ mv approle /etc/vault/vault_plugins
Calculate the SHA256 sum of the compiled plugin binary, and use that to register
the plugin into Vault's plugin catalog:
-```sh
+```shell-session
$ shasum -a 256 /etc/vault/vault_plugins/my-mock-plugin
2c071aafa1b30897e60b79643e77592cb9d1e8f803025d44a7f9bbfa4779d615 /etc/vault/vault_plugins/my-mock-plugin
@@ -86,7 +86,7 @@ Success! Data written to: sys/plugins/catalog/secret/my-mock-plugin
Enabling the plugin varies depending on if it's a secrets engine or auth method:
-```sh
+```shell-session
$ vault secrets enable -path=my-secrets-plugin my-mock-plugin
Success! Enabled the my-mock-plugin plugin at: my-secrets-plugin/
```
@@ -94,7 +94,7 @@ Success! Enabled the my-mock-plugin plugin at: my-secrets-plugin/
If you try to mount this particular plugin as an auth method instead of a
secrets engine, you will get an error:
-```sh
+```shell-session
$ vault auth enable -path=my-auth-plugin my-mock-plugin
# ...
* cannot mount 'my-mock-plugin' of type 'secret' as an auth method
@@ -104,7 +104,7 @@ $ vault auth enable -path=my-auth-plugin my-mock-plugin
Each plugin responds to read, write, list, and delete as its own behavior.
-```text
+```shell-session
$ vault write my-secrets-plugin/kv/foo value=bar
Key Value
--- -----
@@ -115,7 +115,7 @@ value bar
When you are done using the plugin, disable it.
-```text
+```shell-session
$ vault secrets disable my-secrets-plugin
Success! Disabled the secrets engine (if it existed) at: my-secrets-plugin/
```
diff --git a/website/pages/guides/operations/reference-architecture.mdx b/website/pages/guides/operations/reference-architecture.mdx
index 685e1d9a8007..6f374b64f4cd 100644
--- a/website/pages/guides/operations/reference-architecture.mdx
+++ b/website/pages/guides/operations/reference-architecture.mdx
@@ -30,7 +30,7 @@ The following topics are addressed in this guide:
backend](/docs/internals/architecture) since that is the recommended
storage backend for production deployments.
-## Deployment Topology within One Datacenter
+## Deployment Topology within One Datacenter ((#one-dc))
This section explains how to deploy a Vault open source cluster in one datacenter.
Support for [multiple datacenters](#multi-dc) is included in Vault Enterprise through
@@ -149,7 +149,7 @@ Vault.
## Load Balancing
-### Load Balancing Using Consul Interface
+### Load Balancing Using Consul Interface ((#consul-lb))
Consul can provide load balancing capabilities, but it requires that any Vault
clients are Consul aware. This means that a client can either utilize Consul DNS
@@ -161,7 +161,7 @@ the request could be forwarded to Consul for the actual IP address response.
The operation can be completely transparent to legacy applications and would
operate just as a typical DNS resolution operation.
-### Load Balancing Using External Load Balancer
+### Load Balancing Using External Load Balancer ((#external-lb))
![Vault Behind a Load Balancer](/img/vault-ref-arch-9.png)
@@ -218,7 +218,7 @@ with Consul_](/guides/operations/vault-ha-consul) guide.
> Nodes](/guides/operations/performance-nodes) and data-locality across
> datacenters requires Vault Enterprise.
-## Deployment Topology for Multiple Datacenters
+## Deployment Topology for Multiple Datacenters ((#multi-dc))
diff --git a/website/pages/guides/operations/rekeying-and-rotating.mdx b/website/pages/guides/operations/rekeying-and-rotating.mdx
index a0f0ffe27958..425f50a32f1a 100644
--- a/website/pages/guides/operations/rekeying-and-rotating.mdx
+++ b/website/pages/guides/operations/rekeying-and-rotating.mdx
@@ -70,7 +70,7 @@ rekeying to match the threshold configured when the keys were issued.
First, initialize a rekeying operation. The flags represent the **newly
desired** number of keys and threshold:
-```text
+```shell-session
$ vault operator rekey -init -key-shares=3 -key-threshold=2
```
@@ -91,7 +91,7 @@ New Threshold 2
Each unseal key holder runs the following command and enters their unseal key:
-```text
+```shell-session
$ vault operator rekey -nonce=
Rekey operation nonce: dc1aec3b-ae67-5780-b4b5-2a10ca05b17c
Key (will be hidden):
@@ -127,7 +127,7 @@ the encryption key rotation.
To trigger a key rotation, execute the command:
-```text
+```shell-session
$ vault operator rotate
```
diff --git a/website/pages/guides/operations/seal-wrap.mdx b/website/pages/guides/operations/seal-wrap.mdx
index b975a1c657e0..2947d4a94f91 100644
--- a/website/pages/guides/operations/seal-wrap.mdx
+++ b/website/pages/guides/operations/seal-wrap.mdx
@@ -96,7 +96,7 @@ This guide walks you through the following steps:
1. [Enable Seal Wrap](#step2)
1. [Test the Seal Wrap Feature](#step3)
-### Step 1: Configure HSM Auto-unseal
+### Step 1: Configure HSM Auto-unseal ((#step1))
When a Vault server is started, it normally starts in a sealed state where a
quorum of existing unseal keys is required to unseal it. By integrating Vault
@@ -164,7 +164,7 @@ Start the Vault server with your Vault configuration file. For example, if your
configuration file is located at `/home/ec2-user/config-hsm.hcl`, the command
would look like:
-```plaintext
+```shell-session
$ vault server -config=/home/ec2-user/config-hsm.hcl
SDK Version: 2.03
@@ -186,8 +186,6 @@ $ vault server -config=/home/ec2-user/config-hsm.hcl
==> Vault server started! Log data will stream in below:
```
-
-
In another terminal, set the `VAULT_ADDR` environment variable, and [initialize](/intro/getting-started/deploy#initializing-the-vault) your Vault server.
**Example:**
@@ -222,7 +220,7 @@ as generation of a root token require these recovery keys.
Login to the Vault using the generated root token to verify.
-```plaintext
+```shell-session
$ vault login 8d726c6b-98ba-893f-23d5-be3d2fec480e
```
@@ -230,7 +228,7 @@ $ vault login 8d726c6b-98ba-893f-23d5-be3d2fec480e
Stop and restart the Vault server and then verify its status:
-```plaintext
+```shell-session
$ vault status
Key Value
@@ -248,7 +246,7 @@ HA Enabled false
The `Sealed` status is **`false`** which means that the Vault was automatically
unsealed upon its start. You can proceed with Vault operations.
-### Step 2: Enable Seal Wrap
+### Step 2: Enable Seal Wrap ((#step2))
-> **NOTE:** For FIPS 140-2 compliance, seal wrap requires FIPS
140-2 Certified HSM which is supported by _Vault Enterprise Premium_.
@@ -261,7 +259,7 @@ key/value secret engine, you can enable seal wrap to wrap all data.
Check the enabled secret engines.
-```plaintext
+```shell-session
$ vault secrets list -format=json
{
...
@@ -296,7 +294,7 @@ $ vault secrets enable -path=secret2/ -version=1 -seal-wrap kv
The above command enabled [key/value version 1](/docs/secrets/kv/kv-v1) with
seal wrap feature enabled.
-```plaintext
+```shell-session
$ vault secrets list -format=json
{
...
@@ -324,7 +322,7 @@ Notice that the `seal_wrap` parameter is set to **`true`** at `secret2/`.
Check the enabled secret engines.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/mounts | jq
...
@@ -373,7 +371,7 @@ $ curl --header "X-Vault-Token: ..." \
The above command enabled [key/value version 1](/docs/secrets/kv/kv-v1) with
seal wrap feature enabled.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/mounts | jq
{
@@ -419,7 +417,7 @@ Select **Enable new engine**.
Click **Enable Engine**.
-### Step 3: Test the Seal Wrap Feature
+### Step 3: Test the Seal Wrap Feature ((#step3))
In this step, you are going to:
@@ -569,7 +567,7 @@ storage "file" {
SSH into the machine where the Vault server is running, and check the stored
values in the `/tmp/vault` directory.
-```plaintext
+```shell-session
$ cd /tmp/vault/sdk/logical
```
diff --git a/website/pages/guides/operations/vault-ha-consul.mdx b/website/pages/guides/operations/vault-ha-consul.mdx
index 73dc856d7080..87765d68e1a7 100644
--- a/website/pages/guides/operations/vault-ha-consul.mdx
+++ b/website/pages/guides/operations/vault-ha-consul.mdx
@@ -79,7 +79,7 @@ You perform the following:
-> For the purpose of this guide, we will use the open source software editions of
Vault and Consul; however, the setup is the same for Enterprise editions.
-### Step 1: Setup a Consul Server Cluster
+### Step 1: Setup a Consul Server Cluster ((#step1))
Our Consul servers in this guide will be defined by IP address only, but also
referenced by a label:
@@ -246,7 +246,7 @@ Once the unit file is defined and saved (e.g.
`/etc/systemd/system/consul.service`), be sure to perform a `systemctl daemon-reload`
and then you can start your Consul service on each server.
-### Step 2: Start and Verify the Consul Cluster State
+### Step 2: Start and Verify the Consul Cluster State ((#step2))
Be sure that the ownership and permissions are correct on the directory you
specified for the value of `data_dir`, and then start the Consul service on each
@@ -284,7 +284,7 @@ leader before proceeding:
The above output shows that **`consul_s3`** is the current cluster leader in
this example. Now, you are good to move on to the Vault server configuration.
-### Step 3: Setup Consul Client Agents on Vault Nodes
+### Step 3: Setup Consul Client Agents on Vault Nodes ((#step3))
The Vault server nodes require **both** the Consul and Vault binaries on each node. Consul will be configured as a **client** agent and Vault will be configured as a server.
@@ -446,7 +446,7 @@ After starting all Consul client agents, check the Consul cluster status:
The above output shows 3 Consul server agents and 2 Consul client agents in the
cluster. Now, you are ready to configure the Vault servers.
-### Step 4: Configure the Vault Servers
+### Step 4: Configure the Vault Servers ((#step4))
Now that we have a Consul cluster consisting of 3 servers and 2 client agents
for our Vault servers, let’s get the configuration for Vault and a startup
@@ -585,7 +585,7 @@ Once the unit file is defined and saved as e.g.
`/etc/systemd/system/vault.service`, be sure to perform a `systemctl daemon-reload`
and then you can start your Vault service on each server.
-### Step 5: Start Vault and Verify the State
+### Step 5: Start Vault and Verify the State ((#step5))
Start the Vault service on each system and verify the status:
diff --git a/website/pages/guides/secret-mgmt/app-integration.mdx b/website/pages/guides/secret-mgmt/app-integration.mdx
index d3d6a7fef9b9..88172d975f68 100644
--- a/website/pages/guides/secret-mgmt/app-integration.mdx
+++ b/website/pages/guides/secret-mgmt/app-integration.mdx
@@ -130,7 +130,7 @@ same information from Vault.
1. [Use Consul Template to Populate DB Credentials](#step3)
1. [Use Envconsul to Retrieve DB Credentials](#step4)
-### Step 1: Setup Database Secrets Engine
+### Step 1: Setup Database Secrets Engine ((#step1))
In this step, you are going to enable and configure the `database` secrets
engine using `postgresql-database-plugin` where the database connection URL is
@@ -211,7 +211,7 @@ $ curl --header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/database/roles/readonly
```
-### Step 2: Generate Client Token
+### Step 2: Generate Client Token ((#step2))
Consul Template tool itself is a Vault client. Therefore, it must have a valid
token with policies permitting it to retrieve secrets from `database` secret
@@ -300,7 +300,7 @@ $ curl --header "X-Vault-Token: ..." \
**NOTE:** This is the token that Consul Template uses to talk to Vault.
Copy the **`client_token`** value and proceed to [Step 3](#step3).
-### Step 3: Use Consul Template to Populate DB Credentials
+### Step 3: Use Consul Template to Populate DB Credentials ((#step3))
Assume that your application requires PostgreSQL database credentials to read
data. Its configuration file, **`config.yml`** looks like:
@@ -364,7 +364,7 @@ language](https://github.com/hashicorp/consul-template#templating-language).
> so in comparison to writing an application which invokes Vault API to accomplish
> the same.
-### Step 4: Use Envconsul to Retrieve DB Credentials
+### Step 4: Use Envconsul to Retrieve DB Credentials ((#step4))
Create a file named, **`app.sh`** containing the following:
@@ -389,7 +389,7 @@ with key name.
Run the Envconsul tool using the Vault token you generated at [Step 2](#step2).
-```plaintext
+```shell-session
$ VAULT_TOKEN= envconsul -upcase -secret database/creds/readonly ./app.sh
My connection info is:
diff --git a/website/pages/guides/secret-mgmt/cubbyhole.mdx b/website/pages/guides/secret-mgmt/cubbyhole.mdx
index e923dba82430..33679e501a5a 100644
--- a/website/pages/guides/secret-mgmt/cubbyhole.mdx
+++ b/website/pages/guides/secret-mgmt/cubbyhole.mdx
@@ -71,7 +71,7 @@ Started](/intro/getting-started/install) guide to install Vault. Make sure
that your Vault server has been [initialized and
unsealed](/intro/getting-started/deploy).
-### Policy requirements
+### Policy requirements ((#policy))
-> **NOTE:** For the purpose of this guide, you can use **`root`** token to work
with Vault. However, it is recommended that root tokens are only used for just
@@ -121,7 +121,7 @@ uses cubbyhole response wrapping. In this guide, you perform the following:
about reading and writing secrets in Vault, refer to the [Static
Secret](/guides/secret-mgmt/static-secrets) guide.
-### Step 1: Create and wrap a token
+### Step 1: Create and wrap a token ((#step1))
(**Persona:** admin)
@@ -152,14 +152,14 @@ path "secret/dev" {
First create an `apps` policy:
-```shell
+```shell-session
$ vault policy write apps apps-policy.hcl
Policy 'apps' written.
```
To create a token using response wrapping:
-```shell
+```shell-session
$ vault token create -policy= -wrap-ttl=
```
@@ -171,7 +171,7 @@ duration of seconds (15s), minutes (20m), or hours (25h).
Generate a token for `apps` persona using response wrapping with TTL of 120
seconds.
-```shell
+```shell-session
$ vault token create -policy=apps -wrap-ttl=120
Key Value
@@ -190,7 +190,7 @@ the generated token from the `token create` command.
First create an `apps` policy using `sys/policy` endpoint:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: " \
--request PUT \
--data \
@@ -219,7 +219,7 @@ desired TTL for a response-wrapping token for that request. This is set using
the **`X-Vault-Wrap-TTL`** header in the request and can be either an integer
number of seconds or a string duration.
-```shell
+```shell-session
$ curl --header "X-Vault-Wrap-TTL: " \
--header "X-Vault-Token: " \
--request \
@@ -234,7 +234,7 @@ seconds (15s), minutes (20m), or hours (25h).
To wrap the response of token create request:
-```shell
+```shell-session
$ curl --header "X-Vault-Wrap-TTL: 120" \
--header "X-Vault-Token: ..." \
--request POST \
@@ -261,7 +261,7 @@ $ curl --header "X-Vault-Wrap-TTL: 120" \
This API call generates a token for `apps` persona using response wrapping with
TTL of 60 seconds. The admin user does not even see the generated token.
-### Step 2: Unwrap the secret
+### Step 2: Unwrap the secret ((#step2))
(**Persona:** apps)
@@ -315,19 +315,19 @@ Code: 403. Errors:
The command to unwrap the wrapped secret is:
-```shell
+```shell-session
$ vault unwrap
```
Or
-```shell
+```shell-session
$ VAULT_TOKEN= vault unwrap
```
**Example:**
-```shell
+```shell-session
$ VAULT_TOKEN=9ac59985-094f-a2de-aed8-bf688e436fbc vault unwrap
Key Value
@@ -344,7 +344,7 @@ Verify that this token has `apps` policy attached.
Once the client acquired the token, future requests can be made using this
token.
-```shell
+```shell-session
$ vault login 7bb915b2-8a44-48b0-a71d-72b590252016
$ vault read secret/dev
@@ -385,7 +385,7 @@ $ curl --header "X-Vault-Token: 5fe14760-b0fd-22dc-403c-14a05003b67f" \
Now, unwrap the secret using `/sys/wrapping/unwrap` endpoint:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
/v1/sys/wrapping/unwrap
@@ -393,7 +393,7 @@ $ curl --header "X-Vault-Token: " \
**Example:**
-```shell
+```shell-session
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" \
--request POST \
http://127.0.0.1:8200/v1/sys/wrapping/unwrap | jq
@@ -422,7 +422,7 @@ $ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" \
Once the client acquired the token, future requests can be made using this
token.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: af5f7682-aa55-fa37-5039-ee116df56600" \
--request GET \
http://127.0.0.1:8200/v1/secret/dev | jq
@@ -488,7 +488,7 @@ token 123456789abcdefg87654321
Now, try to access the secret using the `root` token. It should NOT return the
secret.
-```shell
+```shell-session
$ VAULT_TOKEN= vault read cubbyhole/private/access-token
No value found at cubbyhole/private/access-token
@@ -498,7 +498,7 @@ No value found at cubbyhole/private/access-token
The API to work with the `cubbyhole` secret engine is very similar to `secret` secret engine:
-```shell
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
--data \
@@ -535,7 +535,7 @@ $ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request
Now, try to access the secret using the `root` token. It should NOT return the
secret.
-```shell
+```shell-session
$ curl --header "X-Vault-Token: root" --request GET \
http://127.0.0.1:8200/v1/cubbyhole/private/access-token | jq
{
diff --git a/website/pages/guides/secret-mgmt/db-root-rotation.mdx b/website/pages/guides/secret-mgmt/db-root-rotation.mdx
index b29dda230909..899c3ab3278b 100644
--- a/website/pages/guides/secret-mgmt/db-root-rotation.mdx
+++ b/website/pages/guides/secret-mgmt/db-root-rotation.mdx
@@ -113,13 +113,13 @@ You are going to perform the following:
1. [Verify the configuration (**_Optional_**)](#step3)
1. [Rotate the root credentials](#step4)
-### Step 1: Enable the database secret engine
+### Step 1: Enable the database secret engine ((#step1))
#### CLI command
Enable a database secret engine:
-```plaintext
+```shell-session
$ vault secrets enable database
```
@@ -130,7 +130,7 @@ path in Vault.
To enable a database secret engine, use the **`/sys/mounts`** endpoint.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"type":"database"}' \
@@ -140,14 +140,14 @@ $ curl --header "X-Vault-Token: ..." \
**NOTE:** This example mounts database secret engine at **`/database`**,
and passes the secret engine type ("`database`") in the request payload.
-### Step 2: Configure PostgreSQL secret engine
+### Step 2: Configure PostgreSQL secret engine ((#step2))
In the [Secret as a Service: Dynamic
Secrets](/guides/secret-mgmt/dynamic-secrets#step2) guide, the PostgreSQL
plugin was configured with its root credentials embedded in the `connection_url`
(`root` and `rootpassword`) as below:
-```plaintext
+```shell-session
$ vault write database/config/postgresql \
plugin_name=postgresql-database-plugin \
allowed_roles="*" \
@@ -162,7 +162,7 @@ use the templated credentials: **`{{username}}`** and **`{{password}}`**.
#### CLI command
-```plaintext
+```shell-session
$ vault write database/config/postgresql \
plugin_name=postgresql-database-plugin \
connection_url="postgresql://{{username}}:{{password}}@postgres.host.address:5432/postgres" \
@@ -191,7 +191,7 @@ $ vault write database/roles/readonly db_name=postgresql \
#### API call using cURL
-```plaintext
+```shell-session
$ tee payload.json <Step 3: Verify the configuration (**_Optional_**)
+### Step 3: Verify the configuration (**_Optional_**) ((#step3))
Before rotate the root credentials, make sure that the secret engine was
configured correctly.
@@ -299,27 +299,25 @@ v-root-readonly-x7v65y1xuprzxv9vpt80-1525378873 | Password valid until 2018-05-0
postgres=> \q
```
-
-
This confirms that the Vault successfully connected to your PostgreSQL server
and created a new user based on the privilege defined by `readonly.sql`.
> The user credentials generated by the Vault has a limited TTL based on your
> configuration (`default_ttl`). In addition, you can revoke them if necessary.
-### Step 4: Rotate the root credentials
+### Step 4: Rotate the root credentials ((#step4))
Vault provides an API endpoint to easily rotate the root database credentials.
#### CLI command
-```plaintext
+```shell-session
$ vault write -force database/rotate-root/postgresql
```
#### API call using cURL
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
http://127.0.0.1:8200/v1/database/rotate-root/postgresql
@@ -329,14 +327,12 @@ This is all you need to do.
---
-
-
Repeat [Step 3](#step3) to verify that Vault continues to generate database
credentials after the root credential rotation.
To verify that the root credential was rotated:
-```plaintext
+```shell-session
$ psql -h postgres.host.address -p 5432 -U root postgres
Password for user root:
```
diff --git a/website/pages/guides/secret-mgmt/dynamic-secrets.mdx b/website/pages/guides/secret-mgmt/dynamic-secrets.mdx
index c012dd458222..cd9aff49aa04 100644
--- a/website/pages/guides/secret-mgmt/dynamic-secrets.mdx
+++ b/website/pages/guides/secret-mgmt/dynamic-secrets.mdx
@@ -123,7 +123,7 @@ have read permission.
Step 1 through 3 need to be performed by an `admin` user. Step 4 describes
the commands that an `app` runs to get a database credentials from Vault.
-### Step 1: Mount the database secret engine
+### Step 1: Mount the database secret engine ((#step1))
(**Persona:** admin)
@@ -134,13 +134,13 @@ must be mounted.
To mount a database secret engine:
-```plaintext
+```shell-session
$ vault secrets enable
```
**Example:**
-```plaintext
+```shell-session
$ vault secrets enable database
```
@@ -151,7 +151,7 @@ Vault. However, it is possible to mount your secret engines at any location.
Mount `database` secret engine using `/sys/mounts` endpoint:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
--data \
@@ -166,7 +166,7 @@ parameters](/api/system/mounts#enable-secrets-engine) of the secret engine.
The following example mounts database secret engine at `sys/mounts/database`
path, and passed the secret engine type ("database") in the request payload.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"type":"database"}' \
@@ -175,7 +175,7 @@ $ curl --header "X-Vault-Token: ..." \
**NOTE:** It is possible to mount your database secret engines at any location.
-### Step 2: Configure PostgreSQL secret engine
+### Step 2: Configure PostgreSQL secret engine ((#step2))
(**Persona:** admin)
@@ -197,7 +197,7 @@ command with correct URL to match your environment.
**Example:**
-```plaintext
+```shell-session
$ vault write database/config/postgresql \
plugin_name=postgresql-database-plugin \
allowed_roles=readonly \
@@ -208,7 +208,7 @@ $ vault write database/config/postgresql \
**Example:**
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \
http://127.0.0.1:8200/v1/database/config/postgresql
@@ -220,13 +220,11 @@ $ cat payload.json
}
```
-
-
~> **NOTE:** Read the [Database Root Credential Rotation](/guides/secret-mgmt/db-root-rotation)
guide to learn about rotating the root credential immediately after the initial
configuration of each database.
-### Step 3: Create a role
+### Step 3: Create a role ((#step3))
(**Persona:** admin)
@@ -252,7 +250,7 @@ if Vault is offline or unable to communicate with it.
**Example:**
-```plaintext
+```shell-session
$ vault write database/roles/readonly db_name=postgresql creation_statements=@readonly.sql \
default_ttl=1h max_ttl=24h
```
@@ -265,7 +263,7 @@ statement is passed as the role creation statement.
**Example:**
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \
http://127.0.0.1:8200/v1/database/roles/readonly
@@ -282,7 +280,7 @@ $ cat payload.json
The `db_name`, `creation_statements`, `default_ttl`, and `max_ttl` are set in
the `role-payload.json`.
-### Step 4: Request PostgreSQL credentials
+### Step 4: Request PostgreSQL credentials ((#step4))
(**Persona:** apps)
@@ -401,7 +399,7 @@ Be sure to use the returned token to perform the remaining.
**NOTE:** [AppRole Pull Authentication](/guides/identity/authentication) guide
demonstrates more sophisticated way of generating a token for your apps.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \
--request GET \
http://127.0.0.1:8200/v1/database/creds/readonly | jq
@@ -424,7 +422,7 @@ $ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \
(1) Generate a new set of credentials.
-```plaintext
+```shell-session
$ vault read database/creds/readonly
Key Value
@@ -440,7 +438,7 @@ The generated username is `v-token-readonly-48rt0t36sxp4wy81x8x1-1515627434`.
(2) Connect to the postgres as an admin user, and run the following psql commands.
-```plaintext
+```shell-session
$ psql -U postgres
postgres > \du
@@ -457,7 +455,7 @@ The `\du` command lists all users. You should be able to verify that the usernam
(3) Renew the lease for this credential by passing its **`lease_id`**.
-```plaintext
+```shell-session
$ vault renew database/creds/readonly/3e8174da-6ca0-143b-aa8c-4c238aa02809
Key Value
@@ -469,7 +467,7 @@ lease_renewable true
(4) Revoke the generated credentials.
-```plaintext
+```shell-session
$ vault lease revoke database/creds/readonly/3e8174da-6ca0-143b-aa8c-4c238aa02809
```
diff --git a/website/pages/guides/secret-mgmt/pki-engine.mdx b/website/pages/guides/secret-mgmt/pki-engine.mdx
index 277733a34db1..83fc80518ca2 100644
--- a/website/pages/guides/secret-mgmt/pki-engine.mdx
+++ b/website/pages/guides/secret-mgmt/pki-engine.mdx
@@ -73,7 +73,7 @@ Alternatively, you can use the [Vault
Playground](https://www.katacoda.com/hashicorp/scenarios/vault-playground)
environment.
-### Policy requirements
+### Policy requirements ((#policy))
-> **NOTE:** For the purpose of this guide, you can use **`root`** token to work
with Vault. However, it is recommended that root tokens are only used for just
@@ -121,7 +121,7 @@ In this guide, you perform the following:
1. [Revoke Certificates](#step5)
1. [Remove Expired Certificates](#step6)
-### Step 1: Generate Root CA
+### Step 1: Generate Root CA ((#step1))
In this step, you are going to generate a self-signed root certificate using
PKI secrets engine.
@@ -260,8 +260,6 @@ then login.
![Configure URL](/img/vault-pki-1.png)
1. Click **Save**.
-
-
-> **NOTE:** To examine the generated root certificate, you can use
[OpenSSL](https://www.openssl.org/source/).
@@ -273,7 +271,7 @@ $ openssl x509 -in CA_cert.crt -text
$ openssl x509 -in CA_cert.crt -noout -dates
```
-### Step 2: Generate Intermediate CA
+### Step 2: Generate Intermediate CA ((#step2))
Now, you are going to create an intermediate CA using the root CA you regenerate
in the previous step.
@@ -430,7 +428,7 @@ in the previous step.
1. Paste in the certificate in the **Signed Intermediate Certificate** field and
then click **Save**.
-### Step 3: Create a Role
+### Step 3: Create a Role ((#step3))
A role is a logical name that maps to a policy used to generate those
credentials. It allows [configuration
@@ -456,7 +454,7 @@ In this step, you are going to create a role named, **`example-dot-com`**.
Create a role named **`example-dot-com`** which allows subdomains.
-```plaintext
+```shell-session
$ vault write pki_int/roles/example-dot-com \
allowed_domains="example.com" \
allow_subdomains=true \
@@ -467,7 +465,7 @@ $ vault write pki_int/roles/example-dot-com \
Create a role named **`example-dot-com`** which allows subdomains.
-```plaintext
+```shell-session
$ tee payload-role.json <Step 4: Request Certificates
+### Step 4: Request Certificates ((#step4))
Keep certificate lifetimes to be short to align with Vault's philosophy of
short-lived secrets.
@@ -504,7 +502,7 @@ short-lived secrets.
Execute the following command to request a new certificate for `test.example.com`
domain based on the `example-dot-com` role:
-```plaintext
+```shell-session
$ vault write pki_int/issue/example-dot-com common_name="test.example.com" ttl="24h"
Key Value
@@ -542,7 +540,7 @@ Invoke the **`/pki_int/issue/`** endpoint to request a new certificat
Request a certificate for `test.example.com` domain based on the
`example-dot-com` role:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"common_name": "test.example.com", "ttl": "24h"}' \
@@ -583,12 +581,10 @@ serial number.
1. Click **Copy credentials** and save it in a file.
-
-
-> **NOTE:** A certificate can be rotated at any time by simply issuing a new
certificate with the same CN.
-### Step 5: Revoke Certificates
+### Step 5: Revoke Certificates ((#step5))
If a certificate must be revoked, you can easily perform the revocation action
which will cause the CRL to be regenerated. When the CRL is regenerated, any
@@ -600,13 +596,13 @@ In a certain circumstances, you may wish to revoke an issued certificate.
To revoke:
-```plaintext
+```shell-session
$ vault write pki_int/revoke serial_number=
```
**Example:**
-```plaintext
+```shell-session
$ vault write pki_int/revoke serial_number="48:97:82:dd:f0:d3:d9:7e:53:25:ba:fd:f6:77:3e:89:e5:65:cc:e7"
Key Value
--- -----
@@ -621,7 +617,7 @@ serial number.
**Example:**
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"serial_number": "48:97:82:dd:f0:d3:d9:7e:53:25:ba:fd:f6:77:3e:89:e5:65:cc:e7"}' \
@@ -636,7 +632,7 @@ $ curl --header "X-Vault-Token: ..." \
1. Select the serial number for the certificate you wish to revoke.
1. Click **Revoke**. At the confirmation, click **Revoke** again.
-### Step 6: Remove Expired Certificates
+### Step 6: Remove Expired Certificates ((#step6))
Keep the storage backend and CRL by periodically removing certificates that have
expired and are past a certain buffer period beyond their expiration time.
@@ -645,7 +641,7 @@ expired and are past a certain buffer period beyond their expiration time.
To remove revoked certificate and clean the CRL.
-```plaintext
+```shell-session
$ vault write pki_int/tidy tidy_cert_store=true tidy_revoked_certs=true
```
@@ -656,7 +652,7 @@ the CRL.
**Example:**
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"tidy_cert_store": true, "tidy_revoked_certs": true}' \
diff --git a/website/pages/guides/secret-mgmt/ssh-otp.mdx b/website/pages/guides/secret-mgmt/ssh-otp.mdx
index 8109d4a57566..c303861b409b 100644
--- a/website/pages/guides/secret-mgmt/ssh-otp.mdx
+++ b/website/pages/guides/secret-mgmt/ssh-otp.mdx
@@ -108,7 +108,7 @@ You will perform the following:
1. [Request an OTP](#step3)
1. [Establish an SSH session](#step4)
-### Step 1: Install vault-ssh-helper
+### Step 1: Install vault-ssh-helper ((#step1))
(**Persona:** operations)
@@ -202,7 +202,7 @@ onto every **_target host_**.
~> This step must be performed on **all** target hosts that you wish to connect
using the Vault's one-time SSH password.
-### Step 2: Setup the SSH Secrets Engine
+### Step 2: Setup the SSH Secrets Engine ((#step2))
(**Persona:** operations)
@@ -214,13 +214,13 @@ perform the operation. Then you are going to create a role named,
First, enable the SSH secrets engine.
-```plaintext
+```shell-session
$ vault secrets enable ssh
```
Next, create a role.
-```plaintext
+```shell-session
$ vault write ssh/roles/otp_key_role key_type=otp \
default_user=ubuntu \
cidr_list=0.0.0.0/0
@@ -233,7 +233,7 @@ credential will be generated.
Enable `ssh` secret engine using `/sys/mounts` endpoint:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
--data \
@@ -248,7 +248,7 @@ parameters](/api/system/mounts#enable-secrets-engine) of the secret engine.
The following example enables SSH secret engine at `sys/mounts/ssh`
path, and passed the secret engine type (`ssh`) in the request payload.
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"type":"ssh"}' \
@@ -257,7 +257,7 @@ $ curl --header "X-Vault-Token: ..." \
Now, create a role using the `ssh/roles/otp_key_role` endpoint.
-```plaintext
+```shell-session
$ tee payload.json <
-
~> **NOTE:** Its recommended to create individual roles for each username to
ensure absolute isolation between usernames. This is required for Dynamic Key
type and OTP type. For the purpose of this guide, the **`cidr_list`** will be
set to `0.0.0.0/0`. For production, be sure to set this parameter to be as
granular as you can since there is no need to keep this role open to the world.
-### Step 3: Request an OTP
+### Step 3: Request an OTP ((#step3))
(**Persona:** client)
@@ -324,13 +322,13 @@ path "ssh/creds/otp_key_role" {
To generate an OTP credential for an IP of the remote host belongs to the
`otp_key_role`:
-```plaintext
+```shell-session
$ vault write ssh/creds/otp_key_role ip=
```
**Example:**
-```plaintext
+```shell-session
$ vault write ssh/creds/otp_key_role ip=192.0.2.10
Key Value
--- -----
@@ -351,7 +349,7 @@ The **`key`** value is the OTP to use during SSH authentication.
To generate an OTP credential for an IP of the remote host belongs to the
`otp_key_role`:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"ip": ""}'
@@ -360,7 +358,7 @@ $ curl --header "X-Vault-Token: ..." \
**Example:**
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"ip": "192.0.2.10"}'
@@ -398,11 +396,11 @@ To generate an OTP credential for an IP of the remote host belongs to the
1. Click **Copy credentials**. This copies the OTP (`key` value).
-### Step 4: Establish an SSH session
+### Step 4: Establish an SSH session ((#step4))
Simply, use the OTP generated at [Step 3](#step3) to authenticate:
-```plaintext
+```shell-session
$ ssh ubuntu@192.0.2.10
Password:
```
@@ -411,7 +409,7 @@ Password:
you can create a new OTP and SSH into the target host with single line of CLI
command:
-```plaintext
+```shell-session
$ vault ssh -role otp_key_role -mode otp -strict-host-key-checking=no ubuntu@192.0.2.10
```
diff --git a/website/pages/guides/secret-mgmt/static-secrets.mdx b/website/pages/guides/secret-mgmt/static-secrets.mdx
index 9af7589a8a51..13b6475220b7 100644
--- a/website/pages/guides/secret-mgmt/static-secrets.mdx
+++ b/website/pages/guides/secret-mgmt/static-secrets.mdx
@@ -126,7 +126,7 @@ You will perform the following:
Step 1 through 4 are performed by `devops` persona. Step 5 describes the
commands that `apps` persona runs to read secrets from Vault.
-### Step 1: Enable KV Secret Engine v2
+### Step 1: Enable KV Secret Engine v2 ((#step1))
(**Persona:** devops)
@@ -145,19 +145,19 @@ Otherwise, you must perform one of the following:
Option 1: To upgrade from **v1** to **v2**:
-```plaintext
+```shell-session
$ vault kv enable-versioning secret/
```
Option 2: To enable the KV secret engine v2 at **`secret_v2/`**:
-```plaintext
+```shell-session
$ vault secrets enable -path=secret_v2/ kv-v2
```
Or
-```plaintext
+```shell-session
$ vault secrets enable -path=secret_v2/ -version=2 kv
```
@@ -165,7 +165,7 @@ $ vault secrets enable -path=secret_v2/ -version=2 kv
Option 1: To upgrade from **v1** to **v2**:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
--data @payload.json \
@@ -177,7 +177,7 @@ server is running. The `payload.json` includes the version information.
**Example:**
-```plaintext
+```shell-session
$ cat payload.json
{
"options": {
@@ -193,7 +193,7 @@ $ curl --header "X-Vault-Token: ..." \
Option 2: To enable the KV secret engine v2 at **`secret_v2/`**:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"type":"kv-v2"}' \
@@ -203,7 +203,7 @@ $ curl --header "X-Vault-Token: ..." \
~> **NOTE:** This guide assumes that you are working with KV secret engine
**v2** which is mounted at **`secret/`**.
-### Step 2: Store the Google API key
+### Step 2: Store the Google API key ((#step2))
(**Persona:** devops)
@@ -222,7 +222,7 @@ have an API key for New Relic owned by the DevOps team, the path would look like
To create key/value secrets:
-```plaintext
+```shell-session
$ vault kv put secret/ =VALUE>
```
@@ -231,7 +231,7 @@ decide on the naming convention that makes most sense.
**Example:**
-```plaintext
+```shell-session
$ vault kv put secret/eng/apikey/Google key=AAaaBBccDDeeOTXzSMT1234BB_Z8JzG7JkSVxI
Success! Data written to: secret/eng/apikey/Google
```
@@ -243,7 +243,7 @@ this example.
Use `/secret/data/` endpoint to create secrets:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: " \
--request POST \
--data @payload.json \
@@ -256,7 +256,7 @@ contains the parameters to invoke the endpoint.
**Example:**
-```plaintext
+```shell-session
$ tee payload.json <Step 3: Store the root certificate for MySQL
+### Step 3: Store the root certificate for MySQL ((#step3))
(**Persona:** devops)
For the purpose of this guide, generate a new self-sign certificate using
[OpenSSL](https://www.openssl.org/source/).
-```plaintext
+```shell-session
$ openssl req --request509 -sha256 -nodes -newkey rsa:2048 -keyout selfsigned.key -out cert.pem
```
@@ -321,7 +321,7 @@ store the root certificate for production MySQL, the path becomes
**Example:**
-```plaintext
+```shell-session
$ vault kv put secret/prod/cert/mysql cert=@cert.pem
```
@@ -336,7 +336,7 @@ To perform the same task using the Vault API, pass the token in the request head
**Example:**
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data @cert.pem \
@@ -345,7 +345,7 @@ $ curl --header "X-Vault-Token: ..." \
> **NOTE:** Any value begins with "@" is loaded from a file.
-### Step 4: Generate a token for apps
+### Step 4: Generate a token for apps ((#step4))
(**Persona:** devops)
@@ -447,7 +447,7 @@ access.
![Personas Introduction](/img/vault-static-secrets2.png)
-### Step 5: Retrieve the secrets
+### Step 5: Retrieve the secrets ((#step5))
(**Persona:** apps)
@@ -458,7 +458,7 @@ MySQL.
The command to read secret is:
-```plaintext
+```shell-session
$ vault kv get secret/
```
@@ -482,7 +482,7 @@ key AAaaBBccDDeeOTXzSMT1234BB_Z8JzG7JkSVxI
To return the key value alone, pass `-field=key` as an argument.
-```plaintext
+```shell-session
$ vault kv get -field=key secret/eng/apikey/Google
AAaaBBccDDeeOTXzSMT1234BB_Z8JzG7JkSVxI
```
@@ -491,7 +491,7 @@ AAaaBBccDDeeOTXzSMT1234BB_Z8JzG7JkSVxI
The command is basically the same:
-```plaintext
+```shell-session
$ vault kv get -field=cert secret/prod/cert/mysql
-----BEGIN RSA PRIVATE KEY-----
MIIEowIBAAKCAQEA6E2Uq0XqreZISgVMUu9pnoMsq+OoK1PI54rsA9vtDE6wiRk0GWhf5vD4DGf1
@@ -502,7 +502,7 @@ MIIEowIBAAKCAQEA6E2Uq0XqreZISgVMUu9pnoMsq+OoK1PI54rsA9vtDE6wiRk0GWhf5vD4DGf1
Use `secret/` endpoint to retrieve secrets from key/value secret engine:
-```plaintext
+```shell-session
$ curl --header "X-Vault-Token: " \
--request Get \
/v1/secret/data/