mirror of
https://github.com/awfixers-stuff/src.git
synced 2026-03-26 12:36:00 +00:00
Compare commits
2 Commits
dependabot
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
a59403ecae | ||
|
|
171ee0e211 |
21
LICENSE
21
LICENSE
@@ -1,21 +0,0 @@
|
||||
MIT License
|
||||
|
||||
Copyright (c) 2026 AWFixer's Lounge
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
of this software and associated documentation files (the "Software"), to deal
|
||||
in the Software without restriction, including without limitation the rights
|
||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
copies of the Software, and to permit persons to whom the Software is
|
||||
furnished to do so, subject to the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be included in all
|
||||
copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
SOFTWARE.
|
||||
141
LICENSE.md
Normal file
141
LICENSE.md
Normal file
@@ -0,0 +1,141 @@
|
||||
# AWFixer Source Available License v0.1
|
||||
|
||||
### 1. Definitions
|
||||
|
||||
- **“Licensor”** means the copyright holder(s) offering the Software under this License.
|
||||
- **“You” / “Licensee”** means any individual or legal entity exercising permissions granted by this License.
|
||||
- **“Software”** means the source code, object code, documentation, specifications, build scripts, configuration, and any other materials made available by Licensor under this License.
|
||||
- **“Source Available”** means the Software’s source is viewable and usable only under the conditions of this License.
|
||||
- **“Use”** means to access, view, run, execute, install, compile, reproduce, modify, adapt, translate, create derivative works of, distribute, convey, make available, host, provide as a service, benchmark, test, or otherwise exploit the Software, in whole or in part.
|
||||
- **“Derivative Work”** has the meaning under applicable copyright law, and includes any work based on or incorporating any portion of the Software.
|
||||
- **“Confidential Information”** means any non-public information included in or derivable from the Software, including architecture, roadmaps, designs, comments, test data, build pipelines, and non-public APIs, to the extent not publicly disclosed by Licensor.
|
||||
- **“Competitive Offering”** means any product or service (including SaaS, hosted service, on-prem software, embedded software, library, SDK, model, agent, or API) that provides materially the same primary functionality as the Software (or any material portion of it), as reasonably understood by a person skilled in the art, including where it:
|
||||
- is the same as, substantially similar to, or functionally competitive with the Software or any material portion of it, or
|
||||
- can reasonably substitute for the Software in the marketplace, or
|
||||
- is intended to be used for the same or substantially similar primary purpose as the Software.
|
||||
|
||||
**Competitive Offering includes** a “functionally equivalent” or “clean-room” implementation if it is developed using (i) any exposure to the Software, (ii) any knowledge derived from the Software, or (iii) any outputs of Prohibited AI Use (defined below).
|
||||
|
||||
- **“Functionally Equivalent”** means implementing materially the same features, behaviors, workflows, interfaces, data models, protocols, endpoints, schemas, command sets, or operational semantics, whether or not the code is textually similar.
|
||||
- **“Clean-Room Implementation”** means an implementation created with processes intended to avoid copying of source code, including via specification-writing teams, “black box” analysis, or similar methodologies.
|
||||
- **“Artificial Intelligence System” / “AI System”** means any machine learning system, neural network, language model, multimodal model, embedding model, code assistant, agentic system, classifier, or similar system, whether provided by You or a third party.
|
||||
- **“Training”** means training, pre-training, fine-tuning, continued training, reinforcement learning, distillation, supervised learning, unsupervised learning, self-supervised learning, retrieval-augmentation indexing, embedding generation, dataset construction, or any process that uses the Software (or any portion of it) as input to improve, parameterize, evaluate, or influence an AI System.
|
||||
- **“AI Consumption”** means any ingestion, parsing, indexing, embedding, vectorization, annotation, labeling, tokenization, transformation, or processing of the Software by or for an AI System, including for Training.
|
||||
- **“Prohibited AI Use”** means any AI Consumption of the Software except as expressly permitted under Section 4.
|
||||
- **“Change Date”** means the date, if any, specified by Licensor in a notice accompanying the Software after which certain restrictions may change as described in Section 7.
|
||||
|
||||
### 2. Grant of rights (limited)
|
||||
|
||||
Subject to Your continuous compliance with this License, Licensor grants You a limited, non-exclusive, non-transferable, non-sublicensable license to:
|
||||
|
||||
- view and internally evaluate the Software;
|
||||
- run the Software for internal purposes; and
|
||||
- modify the Software for internal purposes,
|
||||
|
||||
**provided** that academic or security research Use that is non-commercial and not for a Competitive Offering is permitted, so long as You do not publish or distribute any Software, Derivative Works, benchmarks, or other materials that enable a Competitive Offering or Functionally Equivalent software, and You comply with Sections 3–6.
|
||||
|
||||
**in each case** only as permitted by this License and only if such Use does not fall within Restricted Uses in Section 3 or Prohibited AI Use in Section 4.
|
||||
|
||||
### 3. Restricted uses (competition, functional equivalents, clean-room)
|
||||
|
||||
Unless Licensor grants You a separate written commercial license, You must **not**, and must not permit any third party to:
|
||||
|
||||
1. **Develop or enable a Competitive Offering.** Use the Software to develop, improve, train, operate, or provide any Competitive Offering.
|
||||
2. **Create Functionally Equivalent software.** Use the Software (including exposure to its source, architecture, interfaces, or behavior) to build, design, implement, or validate Functionally Equivalent software.
|
||||
3. **Clean-room is not a safe harbor under this License.** Even if You attempt a Clean-Room Implementation, You may not use the Software, any knowledge derived from it, or any AI outputs derived from it, to produce a Competitive Offering or Functionally Equivalent software.
|
||||
4. **Specification laundering.** You may not convert the Software into requirements, specifications, test suites, acceptance criteria, prompts, tickets, documentation, architecture diagrams, pseudocode, or other intermediate representations if the intent or effect is to enable a Competitive Offering or Functionally Equivalent software.
|
||||
5. **Benchmarking and competitive analysis publication.** You may not publish benchmarks, comparisons, evaluations, or performance results of the Software without Licensor’s prior written consent.
|
||||
|
||||
**Examples (non-exhaustive):**
|
||||
|
||||
- Reading the codebase, then implementing a “new” library/API that matches the same endpoints, schemas, or behaviors.
|
||||
- Having a team write a spec by studying the Software, then having a separate team implement the spec.
|
||||
- Using the Software as reference to recreate identical workflows, UI flows, or system behavior, even with different naming.
|
||||
- Generating tests from the Software, then writing a new implementation until it passes those tests.
|
||||
- Reimplementing microkernel primitives (for example, task switching, memory management, interrupt handling) or Special Purpose Operating System components that match the Software’s behaviors or ABIs.
|
||||
- Using the Software to generate, index, or distill interfaces for competing code-generation agents, RAG systems, autonomous tooling, or similar AI Systems.
|
||||
- Extracting or replicating scheduling policies, capability or permission models, secure-boot flows, IPC mechanisms, driver interfaces, or system-call semantics into any Competitive Offering or Functionally Equivalent software.
|
||||
|
||||
### 4. AI / ML restrictions
|
||||
|
||||
Unless Licensor grants You a separate written commercial license, You must **not** perform Prohibited AI Use.
|
||||
|
||||
#### 4.1 Prohibited AI Use includes (non-exhaustive)
|
||||
|
||||
- Training any AI System on the Software.
|
||||
- Fine-tuning or continued training using the Software.
|
||||
- Creating embeddings, vector databases, or retrieval indexes from the Software.
|
||||
- Using the Software (or substantial portions) as prompt input to a code-generation system in a way that retains, stores, logs, reuses, or learns from the input beyond ephemeral processing.
|
||||
- Using the Software to create synthetic training data, labels, annotations, or instruction-tuning datasets.
|
||||
- Using the Software to evaluate or benchmark an AI System where the output is retained and used to improve the system.
|
||||
- Distilling, extracting, or learning behaviors, patterns, interfaces, or implementation details from the Software into an AI System.
|
||||
- Using the Software (or outputs derived from it) to construct datasets, prompts, or synthetic traces that train, fine-tune, distill, or evaluate AI Systems whose primary purpose overlaps with the Software or any Competitive Offering.
|
||||
|
||||
#### 4.2 Limited permitted AI assistance (narrow)
|
||||
|
||||
You may use an AI System **only** for ephemeral assistance (for example, autocomplete on code You authored) **if**:
|
||||
|
||||
- no portion of the Software is provided to the AI System beyond snippets strictly necessary for the immediate task;
|
||||
- the AI provider is contractually prohibited from Training on, retaining, or using those inputs; and
|
||||
- You maintain records sufficient to demonstrate compliance.
|
||||
|
||||
If You cannot satisfy all conditions above, the AI use is Prohibited AI Use.
|
||||
|
||||
### 5. Compliance, controls, and audit support
|
||||
|
||||
To provide enforceable compliance hooks, You agree to:
|
||||
|
||||
- **Records.** Maintain complete and accurate records reasonably sufficient to demonstrate compliance with Sections 3 and 4, including (as applicable) AI tool/vendor names, settings, retention/training toggles, dates of use, and an inventory of any code or documentation provided to AI Systems.
|
||||
- **Certification.** Upon Licensor’s written request, provide a written certification of compliance signed by an authorized representative. For enterprise or commercial entities, Licensor may request such certifications up to quarterly.
|
||||
- **Incident notice.** Promptly notify Licensor upon discovery of any actual or suspected breach relating to Competitive Offerings, Functionally Equivalent software, or AI Consumption.
|
||||
- **Sworn declaration (AI).** Upon Licensor’s written request, provide a sworn declaration identifying each instance of AI Consumption within the preceding twenty-four (24) months, including (as applicable) the AI System used, model/version identifiers, and the specific portions of the Software provided.
|
||||
- **Audit (limited).** If Licensor has a reasonable basis to suspect material non-compliance, You will cooperate with a limited compliance review by an independent auditor under NDA, limited to verifying compliance with Sections 3–5, including review of AI System logs, prompt histories, retention stores, embedding/vector stores, and related records reasonably suspected of containing Software-derived material.
|
||||
|
||||
### 6. Distribution and external use
|
||||
|
||||
Unless Licensor grants You a separate written commercial license, You must not distribute, convey, sublicense, sell, or make the Software available to any third party, including by:
|
||||
|
||||
- hosting the Software in a public repository;
|
||||
- providing the Software as a service;
|
||||
- offering access to the Software via an API; or
|
||||
- distributing binaries built from the Software.
|
||||
- incorporating any portion of the Software into any model, dataset, corpus, weights, embedding store, or similar artifact that is distributed or made available under terms more permissive than this License.
|
||||
|
||||
### 7. BSL-style change terms (optional)
|
||||
|
||||
If Licensor designates a **Change Date** for a given version of the Software, then:
|
||||
|
||||
- prior to the Change Date, the Software is licensed under this License; and
|
||||
- on or after the Change Date, Licensor may relicense that version under a separate license identified in the notice (for example, a permissive license), **but only if** Licensor explicitly states so in writing.
|
||||
|
||||
If no Change Date is provided, no automatic relicensing occurs.
|
||||
|
||||
### 8. Intellectual property; no implied rights
|
||||
|
||||
- **No trademark rights.** This License does not grant rights to use Licensor’s trademarks, logos, or branding.
|
||||
- **No patent grant unless stated.** No patent rights are granted unless Licensor expressly provides a patent license in writing.
|
||||
- **Reservation of rights.** All rights not expressly granted are reserved.
|
||||
|
||||
### 9. Termination and remedies
|
||||
|
||||
- **Automatic termination.** Any breach of Sections 3, 4, 5, or 6 immediately terminates Your rights under this License.
|
||||
- **Cure.** Licensor may, at its sole discretion, provide a cure period in writing; otherwise no cure is implied.
|
||||
- **Injunctive relief.** You agree that breaches involving Competitive Offerings, Functionally Equivalent software, or Prohibited AI Use may cause irreparable harm and that Licensor may seek injunctive and equitable relief.
|
||||
|
||||
### 10. Disclaimer of warranty
|
||||
|
||||
THE SOFTWARE IS PROVIDED “AS IS” AND “AS AVAILABLE”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON-INFRINGEMENT.
|
||||
|
||||
### 11. Limitation of liability
|
||||
|
||||
TO THE MAXIMUM EXTENT PERMITTED BY LAW, IN NO EVENT WILL LICENSOR BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES, OR ANY LOSS OF PROFITS, REVENUE, DATA, OR GOODWILL, ARISING OUT OF OR RELATED TO THIS LICENSE OR THE SOFTWARE.
|
||||
|
||||
### 12. Governing law; venue
|
||||
|
||||
This License and any dispute arising out of or related to it (including any non-contractual disputes or claims) will be governed by the laws of the State of Delaware, U.S.A., without regard to its conflict of law principles.
|
||||
|
||||
**Exclusive venue.** Subject to the Chancery carve-out below, the parties agree that any action, suit, or proceeding arising out of or related to this License or the Software will be brought exclusively in the United States District Court for the District of Delaware, and each party irrevocably submits to the personal jurisdiction and venue of such court.
|
||||
|
||||
**Court of Chancery carve-out.** To the extent a claim is within the subject matter jurisdiction of the Delaware Court of Chancery (including claims seeking equitable relief), Licensor may, at its option, bring such claim exclusively in the Delaware Court of Chancery (or, if that court lacks jurisdiction, in the Delaware Superior Court), and You irrevocably submit to the personal jurisdiction and venue of such court.
|
||||
|
||||
You waive any objection to such courts based on forum non conveniens or any similar doctrine.
|
||||
46
srcapp-mobile/pnpm-lock.yaml
generated
46
srcapp-mobile/pnpm-lock.yaml
generated
@@ -1384,41 +1384,49 @@ packages:
|
||||
resolution: {integrity: sha512-34gw7PjDGB9JgePJEmhEqBhWvCiiWCuXsL9hYphDF7crW7UgI05gyBAi6MF58uGcMOiOqSJ2ybEeCvHcq0BCmQ==}
|
||||
cpu: [arm64]
|
||||
os: [linux]
|
||||
libc: [glibc]
|
||||
|
||||
'@unrs/resolver-binding-linux-arm64-musl@1.11.1':
|
||||
resolution: {integrity: sha512-RyMIx6Uf53hhOtJDIamSbTskA99sPHS96wxVE/bJtePJJtpdKGXO1wY90oRdXuYOGOTuqjT8ACccMc4K6QmT3w==}
|
||||
cpu: [arm64]
|
||||
os: [linux]
|
||||
libc: [musl]
|
||||
|
||||
'@unrs/resolver-binding-linux-ppc64-gnu@1.11.1':
|
||||
resolution: {integrity: sha512-D8Vae74A4/a+mZH0FbOkFJL9DSK2R6TFPC9M+jCWYia/q2einCubX10pecpDiTmkJVUH+y8K3BZClycD8nCShA==}
|
||||
cpu: [ppc64]
|
||||
os: [linux]
|
||||
libc: [glibc]
|
||||
|
||||
'@unrs/resolver-binding-linux-riscv64-gnu@1.11.1':
|
||||
resolution: {integrity: sha512-frxL4OrzOWVVsOc96+V3aqTIQl1O2TjgExV4EKgRY09AJ9leZpEg8Ak9phadbuX0BA4k8U5qtvMSQQGGmaJqcQ==}
|
||||
cpu: [riscv64]
|
||||
os: [linux]
|
||||
libc: [glibc]
|
||||
|
||||
'@unrs/resolver-binding-linux-riscv64-musl@1.11.1':
|
||||
resolution: {integrity: sha512-mJ5vuDaIZ+l/acv01sHoXfpnyrNKOk/3aDoEdLO/Xtn9HuZlDD6jKxHlkN8ZhWyLJsRBxfv9GYM2utQ1SChKew==}
|
||||
cpu: [riscv64]
|
||||
os: [linux]
|
||||
libc: [musl]
|
||||
|
||||
'@unrs/resolver-binding-linux-s390x-gnu@1.11.1':
|
||||
resolution: {integrity: sha512-kELo8ebBVtb9sA7rMe1Cph4QHreByhaZ2QEADd9NzIQsYNQpt9UkM9iqr2lhGr5afh885d/cB5QeTXSbZHTYPg==}
|
||||
cpu: [s390x]
|
||||
os: [linux]
|
||||
libc: [glibc]
|
||||
|
||||
'@unrs/resolver-binding-linux-x64-gnu@1.11.1':
|
||||
resolution: {integrity: sha512-C3ZAHugKgovV5YvAMsxhq0gtXuwESUKc5MhEtjBpLoHPLYM+iuwSj3lflFwK3DPm68660rZ7G8BMcwSro7hD5w==}
|
||||
cpu: [x64]
|
||||
os: [linux]
|
||||
libc: [glibc]
|
||||
|
||||
'@unrs/resolver-binding-linux-x64-musl@1.11.1':
|
||||
resolution: {integrity: sha512-rV0YSoyhK2nZ4vEswT/QwqzqQXw5I6CjoaYMOX0TqBlWhojUf8P94mvI7nuJTeaCkkds3QE4+zS8Ko+GdXuZtA==}
|
||||
cpu: [x64]
|
||||
os: [linux]
|
||||
libc: [musl]
|
||||
|
||||
'@unrs/resolver-binding-wasm32-wasi@1.11.1':
|
||||
resolution: {integrity: sha512-5u4RkfxJm+Ng7IWgkzi3qrFOvLvQYnPBmjmZQ8+szTK/b31fQCnleNl1GgEt7nIsZRIf5PLhPwT0WM+q45x/UQ==}
|
||||
@@ -2863,24 +2871,28 @@ packages:
|
||||
engines: {node: '>= 12.0.0'}
|
||||
cpu: [arm64]
|
||||
os: [linux]
|
||||
libc: [glibc]
|
||||
|
||||
lightningcss-linux-arm64-musl@1.32.0:
|
||||
resolution: {integrity: sha512-UpQkoenr4UJEzgVIYpI80lDFvRmPVg6oqboNHfoH4CQIfNA+HOrZ7Mo7KZP02dC6LjghPQJeBsvXhJod/wnIBg==}
|
||||
engines: {node: '>= 12.0.0'}
|
||||
cpu: [arm64]
|
||||
os: [linux]
|
||||
libc: [musl]
|
||||
|
||||
lightningcss-linux-x64-gnu@1.32.0:
|
||||
resolution: {integrity: sha512-V7Qr52IhZmdKPVr+Vtw8o+WLsQJYCTd8loIfpDaMRWGUZfBOYEJeyJIkqGIDMZPwPx24pUMfwSxxI8phr/MbOA==}
|
||||
engines: {node: '>= 12.0.0'}
|
||||
cpu: [x64]
|
||||
os: [linux]
|
||||
libc: [glibc]
|
||||
|
||||
lightningcss-linux-x64-musl@1.32.0:
|
||||
resolution: {integrity: sha512-bYcLp+Vb0awsiXg/80uCRezCYHNg1/l3mt0gzHnWV9XP1W5sKa5/TCdGWaR/zBM2PeF/HbsQv/j2URNOiVuxWg==}
|
||||
engines: {node: '>= 12.0.0'}
|
||||
cpu: [x64]
|
||||
os: [linux]
|
||||
libc: [musl]
|
||||
|
||||
lightningcss-win32-arm64-msvc@1.32.0:
|
||||
resolution: {integrity: sha512-8SbC8BR40pS6baCM8sbtYDSwEVQd4JlFTOlaD3gWGHfThTcABnNDBda6eTZeqbofalIJhFx0qKzgHJmcPTnGdw==}
|
||||
@@ -3331,16 +3343,16 @@ packages:
|
||||
picocolors@1.1.1:
|
||||
resolution: {integrity: sha512-xceH2snhtb5M9liqDsmEw56le376mTZkEX/jEb/RxNFyegNul7eNslCXP9FDj/Lcu0X8KEyMceP2ntpaHrDEVA==}
|
||||
|
||||
picomatch@2.3.2:
|
||||
resolution: {integrity: sha512-V7+vQEJ06Z+c5tSye8S+nHUfI51xoXIXjHQ99cQtKUkQqqO1kO/KCJUfZXuB47h/YBlDhah2H3hdUGXn8ie0oA==}
|
||||
picomatch@2.3.1:
|
||||
resolution: {integrity: sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==}
|
||||
engines: {node: '>=8.6'}
|
||||
|
||||
picomatch@3.0.2:
|
||||
resolution: {integrity: sha512-cfDHL6LStTEKlNilboNtobT/kEa30PtAf2Q1OgszfrG/rpVl1xaFWT9ktfkS306GmHgmnad1Sw4wabhlvFtsTw==}
|
||||
picomatch@3.0.1:
|
||||
resolution: {integrity: sha512-I3EurrIQMlRc9IaAZnqRR044Phh2DXY+55o7uJ0V+hYZAcQYSuFWsc9q5PvyDHUSCe1Qxn/iBz+78s86zWnGag==}
|
||||
engines: {node: '>=10'}
|
||||
|
||||
picomatch@4.0.4:
|
||||
resolution: {integrity: sha512-QP88BAKvMam/3NxH6vj2o21R6MjxZUAd6nlwAS/pnGvN9IVLocLHxGYIzFhg6fUQ+5th6P4dv4eW9jX3DSIj7A==}
|
||||
picomatch@4.0.3:
|
||||
resolution: {integrity: sha512-5gTmgEY/sqK6gFXLIsQNH19lWb4ebPDLA4SdLP7dsWkIXHWlG66oPuVvXSGFPppYZz8ZDZq0dYYrbHfBCVUb1Q==}
|
||||
engines: {node: '>=12'}
|
||||
|
||||
pirates@4.0.7:
|
||||
@@ -4951,7 +4963,7 @@ snapshots:
|
||||
node-forge: 1.3.3
|
||||
npm-package-arg: 11.0.3
|
||||
ora: 3.4.0
|
||||
picomatch: 3.0.2
|
||||
picomatch: 3.0.1
|
||||
pretty-bytes: 5.6.0
|
||||
pretty-format: 29.7.0
|
||||
progress: 2.0.3
|
||||
@@ -6028,7 +6040,7 @@ snapshots:
|
||||
anymatch@3.1.3:
|
||||
dependencies:
|
||||
normalize-path: 3.0.0
|
||||
picomatch: 2.3.2
|
||||
picomatch: 2.3.1
|
||||
|
||||
arg@5.0.2: {}
|
||||
|
||||
@@ -7084,9 +7096,9 @@ snapshots:
|
||||
transitivePeerDependencies:
|
||||
- encoding
|
||||
|
||||
fdir@6.5.0(picomatch@4.0.4):
|
||||
fdir@6.5.0(picomatch@4.0.3):
|
||||
optionalDependencies:
|
||||
picomatch: 4.0.4
|
||||
picomatch: 4.0.3
|
||||
|
||||
file-entry-cache@8.0.0:
|
||||
dependencies:
|
||||
@@ -7539,7 +7551,7 @@ snapshots:
|
||||
chalk: 4.1.2
|
||||
ci-info: 3.9.0
|
||||
graceful-fs: 4.2.11
|
||||
picomatch: 2.3.2
|
||||
picomatch: 2.3.1
|
||||
|
||||
jest-validate@29.7.0:
|
||||
dependencies:
|
||||
@@ -8062,7 +8074,7 @@ snapshots:
|
||||
micromatch@4.0.8:
|
||||
dependencies:
|
||||
braces: 3.0.3
|
||||
picomatch: 2.3.2
|
||||
picomatch: 2.3.1
|
||||
|
||||
mime-db@1.52.0: {}
|
||||
|
||||
@@ -8300,11 +8312,11 @@ snapshots:
|
||||
|
||||
picocolors@1.1.1: {}
|
||||
|
||||
picomatch@2.3.2: {}
|
||||
picomatch@2.3.1: {}
|
||||
|
||||
picomatch@3.0.2: {}
|
||||
picomatch@3.0.1: {}
|
||||
|
||||
picomatch@4.0.4: {}
|
||||
picomatch@4.0.3: {}
|
||||
|
||||
pirates@4.0.7: {}
|
||||
|
||||
@@ -8971,8 +8983,8 @@ snapshots:
|
||||
|
||||
tinyglobby@0.2.15:
|
||||
dependencies:
|
||||
fdir: 6.5.0(picomatch@4.0.4)
|
||||
picomatch: 4.0.4
|
||||
fdir: 6.5.0(picomatch@4.0.3)
|
||||
picomatch: 4.0.3
|
||||
|
||||
tmpl@1.0.5: {}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user