Porting from azure/k8s-actions
This commit is contained in:
Родитель
a94f0c48c6
Коммит
31d395ac5c
38
README.md
38
README.md
|
@ -1,3 +1,41 @@
|
|||
# Azure Kubernetes Service set context
|
||||
|
||||
Used for setting the target AKS cluster context which will be used by other actions like [`azure/k8s-actions/k8s-deploy`](https://github.com/Azure/k8s-actions/tree/master/k8s-deploy), [`azure/k8s-actions/k8s-create-secret`](https://github.com/Azure/k8s-actions/tree/master/k8s-create-secret) etc. or run any [kubectl] (https://kubernetes.io/docs/reference/kubectl/overview/) commands.
|
||||
|
||||
```yaml
|
||||
uses: azure/k8s-actions/aks-set-context@master
|
||||
with:
|
||||
creds: '${{ secrets.AZURE_CREDENTIALS }}' # Azure credentials
|
||||
resourceGroupName: '<resource group name>'
|
||||
clusterName: '<cluster name>'
|
||||
id: login
|
||||
```
|
||||
|
||||
Refer to the action metadata file for details about all the inputs https://github.com/Azure/k8s-actions/blob/master/aks-set-context/action.yml
|
||||
|
||||
## Azure credentials
|
||||
Run `az ad sp create-for-rbac --sdk-auth` to generate an Azure Active Directory service principals.
|
||||
For more details refer to: [az ad sp create-for-rbac](https://docs.microsoft.com/en-us/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac)
|
||||
|
||||
```json
|
||||
{
|
||||
"clientId": "<client id>",
|
||||
"clientSecret": "<client secret>",
|
||||
"subscriptionId": "<subscription id>",
|
||||
"tenantId": "<tenant id>",
|
||||
"activeDirectoryEndpointUrl": "https://login.microsoftonline.com",
|
||||
"resourceManagerEndpointUrl": "https://management.azure.com/",
|
||||
"activeDirectoryGraphResourceId": "https://graph.windows.net/",
|
||||
"sqlManagementEndpointUrl": "https://management.core.windows.net:8443/",
|
||||
"galleryEndpointUrl": "https://gallery.azure.com/",
|
||||
"managementEndpointUrl": "https://management.core.windows.net/"
|
||||
}
|
||||
```
|
||||
## Using secret
|
||||
Now add the json output as [a secret](https://developer.github.com/actions/managing-workflows/storing-secrets/) in the GitHub repository. In the above example the secret name is `AZURE_CREDENTIALS` and it can be used in the workflow by using the following syntax:
|
||||
```yaml
|
||||
creds: '${{ secrets.AZURE_CREDENTIALS }}'
|
||||
```
|
||||
|
||||
# Contributing
|
||||
|
||||
|
|
|
@ -0,0 +1,20 @@
|
|||
name: 'AKS set context'
|
||||
description: 'AKS set context. Used for setting the target AKS cluster context which will be used by other actions like azure/k8s-actions/k8s-deploy or azure/k8s-actions/k8s-create-secret '
|
||||
inputs:
|
||||
creds:
|
||||
description: 'Azure credentials i.e. output of `az ad sp create-for-rbac --sdk-auth`'
|
||||
required: true
|
||||
default: ''
|
||||
resource-group:
|
||||
description: 'Resource Group Name'
|
||||
required: false
|
||||
default: ''
|
||||
cluster-name:
|
||||
description: 'AKS Cluster Name'
|
||||
required: false
|
||||
default: ''
|
||||
branding:
|
||||
color: 'green' # optional, decorates the entry in the GitHub Marketplace
|
||||
runs:
|
||||
using: 'node12'
|
||||
main: 'lib/login.js'
|
|
@ -0,0 +1,98 @@
|
|||
"use strict";
|
||||
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
||||
return new (P || (P = Promise))(function (resolve, reject) {
|
||||
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
||||
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
||||
function step(result) { result.done ? resolve(result.value) : new P(function (resolve) { resolve(result.value); }).then(fulfilled, rejected); }
|
||||
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
||||
});
|
||||
};
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
const util = require("util");
|
||||
const fs = require("fs");
|
||||
const httpClient = require("typed-rest-client/HttpClient");
|
||||
const core = require("@actions/core");
|
||||
var httpCallbackClient = new httpClient.HttpClient('GITHUB_RUNNER', null, {});
|
||||
class WebRequest {
|
||||
}
|
||||
exports.WebRequest = WebRequest;
|
||||
class WebResponse {
|
||||
}
|
||||
exports.WebResponse = WebResponse;
|
||||
class WebRequestOptions {
|
||||
}
|
||||
exports.WebRequestOptions = WebRequestOptions;
|
||||
function sendRequest(request, options) {
|
||||
return __awaiter(this, void 0, void 0, function* () {
|
||||
let i = 0;
|
||||
let retryCount = options && options.retryCount ? options.retryCount : 5;
|
||||
let retryIntervalInSeconds = options && options.retryIntervalInSeconds ? options.retryIntervalInSeconds : 2;
|
||||
let retriableErrorCodes = options && options.retriableErrorCodes ? options.retriableErrorCodes : ["ETIMEDOUT", "ECONNRESET", "ENOTFOUND", "ESOCKETTIMEDOUT", "ECONNREFUSED", "EHOSTUNREACH", "EPIPE", "EA_AGAIN"];
|
||||
let retriableStatusCodes = options && options.retriableStatusCodes ? options.retriableStatusCodes : [408, 409, 500, 502, 503, 504];
|
||||
let timeToWait = retryIntervalInSeconds;
|
||||
while (true) {
|
||||
try {
|
||||
if (request.body && typeof (request.body) !== 'string' && !request.body["readable"]) {
|
||||
request.body = fs.createReadStream(request.body["path"]);
|
||||
}
|
||||
let response = yield sendRequestInternal(request);
|
||||
if (retriableStatusCodes.indexOf(response.statusCode) != -1 && ++i < retryCount) {
|
||||
core.debug(util.format("Encountered a retriable status code: %s. Message: '%s'.", response.statusCode, response.statusMessage));
|
||||
yield sleepFor(timeToWait);
|
||||
timeToWait = timeToWait * retryIntervalInSeconds + retryIntervalInSeconds;
|
||||
continue;
|
||||
}
|
||||
return response;
|
||||
}
|
||||
catch (error) {
|
||||
if (retriableErrorCodes.indexOf(error.code) != -1 && ++i < retryCount) {
|
||||
core.debug(util.format("Encountered a retriable error:%s. Message: %s.", error.code, error.message));
|
||||
yield sleepFor(timeToWait);
|
||||
timeToWait = timeToWait * retryIntervalInSeconds + retryIntervalInSeconds;
|
||||
}
|
||||
else {
|
||||
if (error.code) {
|
||||
core.debug("error code =" + error.code);
|
||||
}
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
}
|
||||
});
|
||||
}
|
||||
exports.sendRequest = sendRequest;
|
||||
function sleepFor(sleepDurationInSeconds) {
|
||||
return new Promise((resolve, reject) => {
|
||||
setTimeout(resolve, sleepDurationInSeconds * 1000);
|
||||
});
|
||||
}
|
||||
exports.sleepFor = sleepFor;
|
||||
function sendRequestInternal(request) {
|
||||
return __awaiter(this, void 0, void 0, function* () {
|
||||
core.debug(util.format("[%s]%s", request.method, request.uri));
|
||||
var response = yield httpCallbackClient.request(request.method, request.uri, request.body, request.headers);
|
||||
return yield toWebResponse(response);
|
||||
});
|
||||
}
|
||||
function toWebResponse(response) {
|
||||
return __awaiter(this, void 0, void 0, function* () {
|
||||
var res = new WebResponse();
|
||||
if (response) {
|
||||
res.statusCode = response.message.statusCode;
|
||||
res.statusMessage = response.message.statusMessage;
|
||||
res.headers = response.message.headers;
|
||||
var body = yield response.readBody();
|
||||
if (body) {
|
||||
try {
|
||||
res.body = JSON.parse(body);
|
||||
}
|
||||
catch (error) {
|
||||
core.debug("Could not parse response: " + JSON.stringify(error));
|
||||
core.debug("Response: " + JSON.stringify(res.body));
|
||||
res.body = body;
|
||||
}
|
||||
}
|
||||
}
|
||||
return res;
|
||||
});
|
||||
}
|
|
@ -0,0 +1,102 @@
|
|||
"use strict";
|
||||
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
||||
return new (P || (P = Promise))(function (resolve, reject) {
|
||||
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
||||
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
||||
function step(result) { result.done ? resolve(result.value) : new P(function (resolve) { resolve(result.value); }).then(fulfilled, rejected); }
|
||||
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
||||
});
|
||||
};
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
const core = require("@actions/core");
|
||||
const command_1 = require("@actions/core/lib/command");
|
||||
const path = require("path");
|
||||
const fs = require("fs");
|
||||
const client_1 = require("./client");
|
||||
const querystring = require("querystring");
|
||||
function getAzureAccessToken(servicePrincipalId, servicePrincipalKey, tenantId, authorityUrl) {
|
||||
if (!servicePrincipalId || !servicePrincipalKey || !tenantId || !authorityUrl) {
|
||||
throw new Error("Not all values are present in the creds object. Ensure appId, password and tenant are supplied");
|
||||
}
|
||||
return new Promise((resolve, reject) => {
|
||||
let webRequest = new client_1.WebRequest();
|
||||
webRequest.method = "POST";
|
||||
webRequest.uri = `${authorityUrl}/${tenantId}/oauth2/token/`;
|
||||
webRequest.body = querystring.stringify({
|
||||
resource: 'https://management.azure.com',
|
||||
client_id: servicePrincipalId,
|
||||
grant_type: "client_credentials",
|
||||
client_secret: servicePrincipalKey
|
||||
});
|
||||
webRequest.headers = {
|
||||
"Content-Type": "application/x-www-form-urlencoded; charset=utf-8"
|
||||
};
|
||||
let webRequestOptions = {
|
||||
retriableStatusCodes: [400, 408, 409, 500, 502, 503, 504],
|
||||
};
|
||||
client_1.sendRequest(webRequest, webRequestOptions).then((response) => {
|
||||
if (response.statusCode == 200) {
|
||||
resolve(response.body.access_token);
|
||||
}
|
||||
else if ([400, 401, 403].indexOf(response.statusCode) != -1) {
|
||||
reject('ExpiredServicePrincipal');
|
||||
}
|
||||
else {
|
||||
reject('CouldNotFetchAccessTokenforAzureStatusCode');
|
||||
}
|
||||
}, (error) => {
|
||||
reject(error);
|
||||
});
|
||||
});
|
||||
}
|
||||
function getAKSKubeconfig(azureSessionToken, subscriptionId, managementEndpointUrl) {
|
||||
let resourceGroupName = core.getInput('resource-group', { required: true });
|
||||
let clusterName = core.getInput('cluster-name', { required: true });
|
||||
return new Promise((resolve, reject) => {
|
||||
var webRequest = new client_1.WebRequest();
|
||||
webRequest.method = 'GET';
|
||||
webRequest.uri = `${managementEndpointUrl}/subscriptions/${subscriptionId}/resourceGroups/${resourceGroupName}/providers/Microsoft.ContainerService/managedClusters/${clusterName}/accessProfiles/clusterAdmin?api-version=2017-08-31`;
|
||||
webRequest.headers = {
|
||||
'Authorization': 'Bearer ' + azureSessionToken,
|
||||
'Content-Type': 'application/json; charset=utf-8'
|
||||
};
|
||||
client_1.sendRequest(webRequest).then((response) => {
|
||||
let accessProfile = response.body;
|
||||
var kubeconfig = Buffer.from(accessProfile.properties.kubeConfig, 'base64');
|
||||
resolve(kubeconfig.toString());
|
||||
}).catch(reject);
|
||||
});
|
||||
}
|
||||
function getKubeconfig() {
|
||||
return __awaiter(this, void 0, void 0, function* () {
|
||||
let creds = core.getInput('creds', { required: true });
|
||||
let credsObject;
|
||||
try {
|
||||
credsObject = JSON.parse(creds);
|
||||
}
|
||||
catch (ex) {
|
||||
throw new Error('Credentials object is not a valid JSON');
|
||||
}
|
||||
let servicePrincipalId = credsObject["clientId"];
|
||||
let servicePrincipalKey = credsObject["clientSecret"];
|
||||
let tenantId = credsObject["tenantId"];
|
||||
let authorityUrl = credsObject["activeDirectoryEndpointUrl"];
|
||||
let managementEndpointUrl = credsObject["resourceManagerEndpointUrl"];
|
||||
let subscriptionId = credsObject["subscriptionId"];
|
||||
let azureSessionToken = yield getAzureAccessToken(servicePrincipalId, servicePrincipalKey, tenantId, authorityUrl);
|
||||
let kubeconfig = yield getAKSKubeconfig(azureSessionToken, subscriptionId, managementEndpointUrl);
|
||||
return kubeconfig;
|
||||
});
|
||||
}
|
||||
function run() {
|
||||
return __awaiter(this, void 0, void 0, function* () {
|
||||
let kubeconfig = yield getKubeconfig();
|
||||
const runnerTempDirectory = process.env['RUNNER_TEMP']; // Using process.env until the core libs are updated
|
||||
const kubeconfigPath = path.join(runnerTempDirectory, `kubeconfig_${Date.now()}`);
|
||||
core.debug(`Writing kubeconfig contents to ${kubeconfigPath}`);
|
||||
fs.writeFileSync(kubeconfigPath, kubeconfig);
|
||||
command_1.issueCommand('set-env', { name: 'KUBECONFIG' }, kubeconfigPath);
|
||||
console.log('KUBECONFIG environment variable is set');
|
||||
});
|
||||
}
|
||||
run().catch(core.setFailed);
|
|
@ -0,0 +1,103 @@
|
|||
import util = require("util");
|
||||
import fs = require('fs');
|
||||
import httpClient = require("typed-rest-client/HttpClient");
|
||||
import * as core from '@actions/core';
|
||||
|
||||
var httpCallbackClient = new httpClient.HttpClient('GITHUB_RUNNER', null, {});
|
||||
|
||||
export class WebRequest {
|
||||
public method: string;
|
||||
public uri: string;
|
||||
// body can be string or ReadableStream
|
||||
public body: string | NodeJS.ReadableStream;
|
||||
public headers: any;
|
||||
}
|
||||
|
||||
export class WebResponse {
|
||||
public statusCode: number;
|
||||
public statusMessage: string;
|
||||
public headers: any;
|
||||
public body: any;
|
||||
}
|
||||
|
||||
export class WebRequestOptions {
|
||||
public retriableErrorCodes?: string[];
|
||||
public retryCount?: number;
|
||||
public retryIntervalInSeconds?: number;
|
||||
public retriableStatusCodes?: number[];
|
||||
public retryRequestTimedout?: boolean;
|
||||
}
|
||||
|
||||
export async function sendRequest(request: WebRequest, options?: WebRequestOptions): Promise<WebResponse> {
|
||||
let i = 0;
|
||||
let retryCount = options && options.retryCount ? options.retryCount : 5;
|
||||
let retryIntervalInSeconds = options && options.retryIntervalInSeconds ? options.retryIntervalInSeconds : 2;
|
||||
let retriableErrorCodes = options && options.retriableErrorCodes ? options.retriableErrorCodes : ["ETIMEDOUT", "ECONNRESET", "ENOTFOUND", "ESOCKETTIMEDOUT", "ECONNREFUSED", "EHOSTUNREACH", "EPIPE", "EA_AGAIN"];
|
||||
let retriableStatusCodes = options && options.retriableStatusCodes ? options.retriableStatusCodes : [408, 409, 500, 502, 503, 504];
|
||||
let timeToWait: number = retryIntervalInSeconds;
|
||||
while (true) {
|
||||
try {
|
||||
if (request.body && typeof(request.body) !== 'string' && !request.body["readable"]) {
|
||||
request.body = fs.createReadStream(request.body["path"]);
|
||||
}
|
||||
|
||||
let response: WebResponse = await sendRequestInternal(request);
|
||||
if (retriableStatusCodes.indexOf(response.statusCode) != -1 && ++i < retryCount) {
|
||||
core.debug(util.format("Encountered a retriable status code: %s. Message: '%s'.", response.statusCode, response.statusMessage));
|
||||
await sleepFor(timeToWait);
|
||||
timeToWait = timeToWait * retryIntervalInSeconds + retryIntervalInSeconds;
|
||||
continue;
|
||||
}
|
||||
|
||||
return response;
|
||||
}
|
||||
catch (error) {
|
||||
if (retriableErrorCodes.indexOf(error.code) != -1 && ++i < retryCount) {
|
||||
core.debug(util.format("Encountered a retriable error:%s. Message: %s.", error.code, error.message));
|
||||
await sleepFor(timeToWait);
|
||||
timeToWait = timeToWait * retryIntervalInSeconds + retryIntervalInSeconds;
|
||||
}
|
||||
else {
|
||||
if (error.code) {
|
||||
core.debug("error code =" + error.code);
|
||||
}
|
||||
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
export function sleepFor(sleepDurationInSeconds: number): Promise<any> {
|
||||
return new Promise((resolve, reject) => {
|
||||
setTimeout(resolve, sleepDurationInSeconds * 1000);
|
||||
});
|
||||
}
|
||||
|
||||
async function sendRequestInternal(request: WebRequest): Promise<WebResponse> {
|
||||
core.debug(util.format("[%s]%s", request.method, request.uri));
|
||||
var response: httpClient.HttpClientResponse = await httpCallbackClient.request(request.method, request.uri, request.body, request.headers);
|
||||
return await toWebResponse(response);
|
||||
}
|
||||
|
||||
async function toWebResponse(response: httpClient.HttpClientResponse): Promise<WebResponse> {
|
||||
var res = new WebResponse();
|
||||
if (response) {
|
||||
res.statusCode = response.message.statusCode;
|
||||
res.statusMessage = response.message.statusMessage;
|
||||
res.headers = response.message.headers;
|
||||
var body = await response.readBody();
|
||||
if (body) {
|
||||
try {
|
||||
res.body = JSON.parse(body);
|
||||
}
|
||||
catch (error) {
|
||||
core.debug("Could not parse response: " + JSON.stringify(error));
|
||||
core.debug("Response: " + JSON.stringify(res.body));
|
||||
res.body = body;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return res;
|
||||
}
|
|
@ -0,0 +1,99 @@
|
|||
import * as core from '@actions/core';
|
||||
import { issueCommand } from '@actions/core/lib/command';
|
||||
import * as path from 'path';
|
||||
import * as fs from 'fs';
|
||||
import { WebRequest, WebRequestOptions, WebResponse, sendRequest } from "./client";
|
||||
import * as querystring from 'querystring';
|
||||
|
||||
function getAzureAccessToken(servicePrincipalId, servicePrincipalKey, tenantId, authorityUrl): Promise<string> {
|
||||
|
||||
if (!servicePrincipalId || !servicePrincipalKey || !tenantId || !authorityUrl) {
|
||||
throw new Error("Not all values are present in the creds object. Ensure appId, password and tenant are supplied");
|
||||
}
|
||||
return new Promise<string>((resolve, reject) => {
|
||||
let webRequest = new WebRequest();
|
||||
webRequest.method = "POST";
|
||||
webRequest.uri = `${authorityUrl}/${tenantId}/oauth2/token/`;
|
||||
webRequest.body = querystring.stringify({
|
||||
resource: 'https://management.azure.com',
|
||||
client_id: servicePrincipalId,
|
||||
grant_type: "client_credentials",
|
||||
client_secret: servicePrincipalKey
|
||||
});
|
||||
webRequest.headers = {
|
||||
"Content-Type": "application/x-www-form-urlencoded; charset=utf-8"
|
||||
};
|
||||
|
||||
let webRequestOptions: WebRequestOptions = {
|
||||
retriableStatusCodes: [400, 408, 409, 500, 502, 503, 504],
|
||||
};
|
||||
|
||||
sendRequest(webRequest, webRequestOptions).then(
|
||||
(response: WebResponse) => {
|
||||
if (response.statusCode == 200) {
|
||||
resolve(response.body.access_token);
|
||||
}
|
||||
else if ([400, 401, 403].indexOf(response.statusCode) != -1) {
|
||||
reject('ExpiredServicePrincipal');
|
||||
}
|
||||
else {
|
||||
reject('CouldNotFetchAccessTokenforAzureStatusCode');
|
||||
}
|
||||
},
|
||||
(error) => {
|
||||
reject(error)
|
||||
}
|
||||
);
|
||||
});
|
||||
}
|
||||
|
||||
function getAKSKubeconfig(azureSessionToken: string, subscriptionId: string, managementEndpointUrl: string): Promise<string> {
|
||||
let resourceGroupName = core.getInput('resource-group', { required: true });
|
||||
let clusterName = core.getInput('cluster-name', { required: true });
|
||||
return new Promise<string>((resolve, reject) => {
|
||||
var webRequest = new WebRequest();
|
||||
webRequest.method = 'GET';
|
||||
webRequest.uri = `${managementEndpointUrl}/subscriptions/${subscriptionId}/resourceGroups/${resourceGroupName}/providers/Microsoft.ContainerService/managedClusters/${clusterName}/accessProfiles/clusterAdmin?api-version=2017-08-31`;
|
||||
webRequest.headers = {
|
||||
'Authorization': 'Bearer ' + azureSessionToken,
|
||||
'Content-Type': 'application/json; charset=utf-8'
|
||||
}
|
||||
sendRequest(webRequest).then((response: WebResponse) => {
|
||||
let accessProfile = response.body;
|
||||
var kubeconfig = Buffer.from(accessProfile.properties.kubeConfig, 'base64');
|
||||
resolve(kubeconfig.toString());
|
||||
}).catch(reject);
|
||||
});
|
||||
}
|
||||
|
||||
async function getKubeconfig(): Promise<string> {
|
||||
let creds = core.getInput('creds', { required: true });
|
||||
let credsObject: { [key: string]: string; };
|
||||
try {
|
||||
credsObject = JSON.parse(creds);
|
||||
} catch (ex) {
|
||||
throw new Error('Credentials object is not a valid JSON');
|
||||
}
|
||||
|
||||
let servicePrincipalId = credsObject["clientId"];
|
||||
let servicePrincipalKey = credsObject["clientSecret"];
|
||||
let tenantId = credsObject["tenantId"];
|
||||
let authorityUrl = credsObject["activeDirectoryEndpointUrl"];
|
||||
let managementEndpointUrl = credsObject["resourceManagerEndpointUrl"];
|
||||
let subscriptionId = credsObject["subscriptionId"];
|
||||
let azureSessionToken = await getAzureAccessToken(servicePrincipalId, servicePrincipalKey, tenantId, authorityUrl);
|
||||
let kubeconfig = await getAKSKubeconfig(azureSessionToken, subscriptionId, managementEndpointUrl);
|
||||
return kubeconfig;
|
||||
}
|
||||
|
||||
async function run() {
|
||||
let kubeconfig = await getKubeconfig();
|
||||
const runnerTempDirectory = process.env['RUNNER_TEMP']; // Using process.env until the core libs are updated
|
||||
const kubeconfigPath = path.join(runnerTempDirectory, `kubeconfig_${Date.now()}`);
|
||||
core.debug(`Writing kubeconfig contents to ${kubeconfigPath}`);
|
||||
fs.writeFileSync(kubeconfigPath, kubeconfig);
|
||||
issueCommand('set-env', { name: 'KUBECONFIG' }, kubeconfigPath);
|
||||
console.log('KUBECONFIG environment variable is set');
|
||||
}
|
||||
|
||||
run().catch(core.setFailed);
|
|
@ -0,0 +1,9 @@
|
|||
{
|
||||
"compilerOptions": {
|
||||
"target": "ES6",
|
||||
"module": "commonjs"
|
||||
},
|
||||
"exclude": [
|
||||
"node_modules"
|
||||
]
|
||||
}
|
Загрузка…
Ссылка в новой задаче