solorice/config/zsh/completions/_deno.zsh

2344 lines
168 KiB
Bash

#compdef deno
autoload -U is-at-least
_deno() {
typeset -A opt_args
typeset -a _arguments_options
local ret=1
if is-at-least 5.2; then
_arguments_options=(-s -S -C)
else
_arguments_options=(-s -C)
fi
local context curcontext="$curcontext" state line
_arguments "${_arguments_options[@]}" : \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'*-R+[Allow file system read access. Optionally specify allowed paths]' \
'*--allow-read=[Allow file system read access. Optionally specify allowed paths]' \
'*--deny-read=[Deny file system read access. Optionally specify denied paths]' \
'*-W+[Allow file system write access. Optionally specify allowed paths]' \
'*--allow-write=[Allow file system write access. Optionally specify allowed paths]' \
'*--deny-write=[Deny file system write access. Optionally specify denied paths]' \
'-N+[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--allow-net=[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--deny-net=[Deny network access. Optionally specify denied IP addresses and host names, with ports as necessary]' \
'-E+[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--allow-env=[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--deny-env=[Deny access to system environment information. Optionally specify accessible environment variables]' \
'-S+[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--allow-sys=[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--deny-sys=[Deny access to OS information. Optionally deny specific APIs by function name]' \
'--allow-run=[Allow running subprocesses. Optionally specify allowed runnable program names]' \
'--deny-run=[Deny running subprocesses. Optionally specify denied runnable program names]' \
'*--allow-ffi=[(Unstable) Allow loading dynamic libraries. Optionally specify allowed directories or files]' \
'*--deny-ffi=[(Unstable) Deny loading dynamic libraries. Optionally specify denied directories or files]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--inspect=[Activate inspector on host\:port \[default\: 127.0.0.1\:9229\]]' \
'--inspect-brk=[Activate inspector on host\:port, wait for debugger to connect and break at the start of user script]' \
'--inspect-wait=[Activate inspector on host\:port and wait for debugger to connect before running user code]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'(--no-check)--check=[Enable type-checking. This subcommand does not type-check by default If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'*--watch=[Watch for file changes and restart process automatically. Local files from entry point module graph are watched by default. Additional paths might be watched by passing them as arguments to this flag.]' \
'(--watch)*--watch-hmr=[Watch for file changes and restart process automatically. Local files from entry point module graph are watched by default. Additional paths might be watched by passing them as arguments to this flag.]' \
'*--watch-exclude=[Exclude provided files/patterns from watch mode]' \
'--ext=[Set content type of the supplied file]: :(ts tsx js jsx)' \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)-A[Allow all permissions]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)--allow-all[Allow all permissions]' \
'--allow-hrtime[REMOVED in Deno 2.0]' \
'--deny-hrtime[REMOVED in Deno 2.0]' \
'--no-prompt[Always throw if required permission wasn'\''t passed]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'--no-clear-screen[Do not clear terminal screen when under watch mode]' \
'--no-code-cache[Disable V8 code cache feature]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-V[Print version]' \
'--version[Print version]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'::script_arg -- Script arg:_files' \
":: :_deno_commands" \
"*::: :->deno" \
&& ret=0
case $state in
(deno)
words=($line[2] "${words[@]}")
(( CURRENT += 1 ))
curcontext="${curcontext%:*:*}:deno-command-$line[2]:"
case $line[2] in
(run)
_arguments "${_arguments_options[@]}" : \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'*-R+[Allow file system read access. Optionally specify allowed paths]' \
'*--allow-read=[Allow file system read access. Optionally specify allowed paths]' \
'*--deny-read=[Deny file system read access. Optionally specify denied paths]' \
'*-W+[Allow file system write access. Optionally specify allowed paths]' \
'*--allow-write=[Allow file system write access. Optionally specify allowed paths]' \
'*--deny-write=[Deny file system write access. Optionally specify denied paths]' \
'-N+[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--allow-net=[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--deny-net=[Deny network access. Optionally specify denied IP addresses and host names, with ports as necessary]' \
'-E+[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--allow-env=[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--deny-env=[Deny access to system environment information. Optionally specify accessible environment variables]' \
'-S+[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--allow-sys=[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--deny-sys=[Deny access to OS information. Optionally deny specific APIs by function name]' \
'--allow-run=[Allow running subprocesses. Optionally specify allowed runnable program names]' \
'--deny-run=[Deny running subprocesses. Optionally specify denied runnable program names]' \
'*--allow-ffi=[(Unstable) Allow loading dynamic libraries. Optionally specify allowed directories or files]' \
'*--deny-ffi=[(Unstable) Deny loading dynamic libraries. Optionally specify denied directories or files]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--inspect=[Activate inspector on host\:port \[default\: 127.0.0.1\:9229\]]' \
'--inspect-brk=[Activate inspector on host\:port, wait for debugger to connect and break at the start of user script]' \
'--inspect-wait=[Activate inspector on host\:port and wait for debugger to connect before running user code]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'(--no-check)--check=[Enable type-checking. This subcommand does not type-check by default If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'*--watch=[Watch for file changes and restart process automatically. Local files from entry point module graph are watched by default. Additional paths might be watched by passing them as arguments to this flag.]' \
'(--watch)*--watch-hmr=[Watch for file changes and restart process automatically. Local files from entry point module graph are watched by default. Additional paths might be watched by passing them as arguments to this flag.]' \
'*--watch-exclude=[Exclude provided files/patterns from watch mode]' \
'--ext=[Set content type of the supplied file]: :(ts tsx js jsx)' \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)-A[Allow all permissions]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)--allow-all[Allow all permissions]' \
'--allow-hrtime[REMOVED in Deno 2.0]' \
'--deny-hrtime[REMOVED in Deno 2.0]' \
'--no-prompt[Always throw if required permission wasn'\''t passed]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'--no-clear-screen[Do not clear terminal screen when under watch mode]' \
'--no-code-cache[Disable V8 code cache feature]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'*::script_arg -- Script arg:_files' \
&& ret=0
;;
(serve)
_arguments "${_arguments_options[@]}" : \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'*-R+[Allow file system read access. Optionally specify allowed paths]' \
'*--allow-read=[Allow file system read access. Optionally specify allowed paths]' \
'*--deny-read=[Deny file system read access. Optionally specify denied paths]' \
'*-W+[Allow file system write access. Optionally specify allowed paths]' \
'*--allow-write=[Allow file system write access. Optionally specify allowed paths]' \
'*--deny-write=[Deny file system write access. Optionally specify denied paths]' \
'-N+[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--allow-net=[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--deny-net=[Deny network access. Optionally specify denied IP addresses and host names, with ports as necessary]' \
'-E+[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--allow-env=[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--deny-env=[Deny access to system environment information. Optionally specify accessible environment variables]' \
'-S+[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--allow-sys=[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--deny-sys=[Deny access to OS information. Optionally deny specific APIs by function name]' \
'--allow-run=[Allow running subprocesses. Optionally specify allowed runnable program names]' \
'--deny-run=[Deny running subprocesses. Optionally specify denied runnable program names]' \
'*--allow-ffi=[(Unstable) Allow loading dynamic libraries. Optionally specify allowed directories or files]' \
'*--deny-ffi=[(Unstable) Deny loading dynamic libraries. Optionally specify denied directories or files]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--inspect=[Activate inspector on host\:port \[default\: 127.0.0.1\:9229\]]' \
'--inspect-brk=[Activate inspector on host\:port, wait for debugger to connect and break at the start of user script]' \
'--inspect-wait=[Activate inspector on host\:port and wait for debugger to connect before running user code]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'--port=[The TCP port to serve on. Pass 0 to pick a random free port \[default\: 8000\]]: : ' \
'--host=[The TCP address to serve on, defaulting to 0.0.0.0 (all interfaces)]: : ' \
'(--no-check)--check=[Enable type-checking. This subcommand does not type-check by default If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'*--watch=[Watch for file changes and restart process automatically. Local files from entry point module graph are watched by default. Additional paths might be watched by passing them as arguments to this flag.]' \
'(--watch)*--watch-hmr=[Watch for file changes and restart process automatically. Local files from entry point module graph are watched by default. Additional paths might be watched by passing them as arguments to this flag.]' \
'*--watch-exclude=[Exclude provided files/patterns from watch mode]' \
'--ext=[Set content type of the supplied file]: :(ts tsx js jsx)' \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)-A[Allow all permissions]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)--allow-all[Allow all permissions]' \
'--allow-hrtime[REMOVED in Deno 2.0]' \
'--deny-hrtime[REMOVED in Deno 2.0]' \
'--no-prompt[Always throw if required permission wasn'\''t passed]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'--parallel[Run multiple server workers in parallel. Parallelism defaults to the number of available CPUs or the value of the DENO_JOBS environment variable]' \
'--no-clear-screen[Do not clear terminal screen when under watch mode]' \
'--no-code-cache[Disable V8 code cache feature]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'*::script_arg -- Script arg:_files' \
&& ret=0
;;
(add)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'-D[Add as a dev dependency]' \
'--dev[Add as a dev dependency]' \
'*::packages -- List of packages to add:' \
&& ret=0
;;
(remove)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'*::packages -- List of packages to remove:' \
&& ret=0
;;
(bench)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'*-R+[Allow file system read access. Optionally specify allowed paths]' \
'*--allow-read=[Allow file system read access. Optionally specify allowed paths]' \
'*--deny-read=[Deny file system read access. Optionally specify denied paths]' \
'*-W+[Allow file system write access. Optionally specify allowed paths]' \
'*--allow-write=[Allow file system write access. Optionally specify allowed paths]' \
'*--deny-write=[Deny file system write access. Optionally specify denied paths]' \
'-N+[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--allow-net=[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--deny-net=[Deny network access. Optionally specify denied IP addresses and host names, with ports as necessary]' \
'-E+[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--allow-env=[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--deny-env=[Deny access to system environment information. Optionally specify accessible environment variables]' \
'-S+[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--allow-sys=[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--deny-sys=[Deny access to OS information. Optionally deny specific APIs by function name]' \
'--allow-run=[Allow running subprocesses. Optionally specify allowed runnable program names]' \
'--deny-run=[Deny running subprocesses. Optionally specify denied runnable program names]' \
'*--allow-ffi=[(Unstable) Allow loading dynamic libraries. Optionally specify allowed directories or files]' \
'*--deny-ffi=[(Unstable) Deny loading dynamic libraries. Optionally specify denied directories or files]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'(--no-check)--check=[Set type-checking behavior. This subcommand type-checks local modules by default, so adding --check is redundant If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'*--ignore=[Ignore files]: : ' \
'--filter=[Run benchmarks with this string or regexp pattern in the bench name]: : ' \
'*--watch-exclude=[Exclude provided files/patterns from watch mode]' \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'--ext=[Set content type of the supplied file]: :(ts tsx js jsx)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)-A[Allow all permissions]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)--allow-all[Allow all permissions]' \
'--allow-hrtime[REMOVED in Deno 2.0]' \
'--deny-hrtime[REMOVED in Deno 2.0]' \
'--no-prompt[Always throw if required permission wasn'\''t passed]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'--json[UNSTABLE\: Output benchmark result in JSON format]' \
'--no-run[Cache bench modules, but don'\''t run benchmarks]' \
'--watch[Watch for file changes and restart process automatically. Only local files from entry point module graph are watched.]' \
'--no-clear-screen[Do not clear terminal screen when under watch mode]' \
'*::files -- List of file names to run:' \
&& ret=0
;;
(bundle)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(cache)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'(--no-check)--check=[Enable type-checking. This subcommand does not type-check by default If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'--frozen=[Error out if lockfile is out of date]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'*::file:_files' \
&& ret=0
;;
(check)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'--frozen=[Error out if lockfile is out of date]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'(--no-remote)--all[Type-check all code, including remote modules and npm packages]' \
'(--no-remote)--remote[Type-check all modules, including remote ones]' \
'--doc[Type-check code blocks in JSDoc as well as actual code]' \
'(--doc)--doc-only[Type-check code blocks in JSDoc and Markdown only]' \
'*::file:_files' \
&& ret=0
;;
(clean)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(compile)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'*-R+[Allow file system read access. Optionally specify allowed paths]' \
'*--allow-read=[Allow file system read access. Optionally specify allowed paths]' \
'*--deny-read=[Deny file system read access. Optionally specify denied paths]' \
'*-W+[Allow file system write access. Optionally specify allowed paths]' \
'*--allow-write=[Allow file system write access. Optionally specify allowed paths]' \
'*--deny-write=[Deny file system write access. Optionally specify denied paths]' \
'-N+[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--allow-net=[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--deny-net=[Deny network access. Optionally specify denied IP addresses and host names, with ports as necessary]' \
'-E+[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--allow-env=[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--deny-env=[Deny access to system environment information. Optionally specify accessible environment variables]' \
'-S+[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--allow-sys=[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--deny-sys=[Deny access to OS information. Optionally deny specific APIs by function name]' \
'--allow-run=[Allow running subprocesses. Optionally specify allowed runnable program names]' \
'--deny-run=[Deny running subprocesses. Optionally specify denied runnable program names]' \
'*--allow-ffi=[(Unstable) Allow loading dynamic libraries. Optionally specify allowed directories or files]' \
'*--deny-ffi=[(Unstable) Deny loading dynamic libraries. Optionally specify denied directories or files]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'(--no-check)--check=[Set type-checking behavior. This subcommand type-checks local modules by default, so adding --check is redundant If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'*--include=[Includes an additional module in the compiled executable'\''s module graph. Use this flag if a dynamically imported module or a web worker main module fails to load in the executable. This flag can be passed multiple times, to include multiple additional modules.]: :_files' \
'-o+[Output file (defaults to \$PWD/<inferred-name>)]: :_files' \
'--output=[Output file (defaults to \$PWD/<inferred-name>)]: :_files' \
'--target=[Target OS architecture]: :(x86_64-unknown-linux-gnu aarch64-unknown-linux-gnu x86_64-pc-windows-msvc x86_64-apple-darwin aarch64-apple-darwin)' \
'--icon=[Set the icon of the executable on Windows (.ico)]: : ' \
'--ext=[Set content type of the supplied file]: :(ts tsx js jsx)' \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)-A[Allow all permissions]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)--allow-all[Allow all permissions]' \
'--allow-hrtime[REMOVED in Deno 2.0]' \
'--deny-hrtime[REMOVED in Deno 2.0]' \
'--no-prompt[Always throw if required permission wasn'\''t passed]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'--no-terminal[Hide terminal on Windows]' \
'*::script_arg -- Script arg:_files' \
&& ret=0
;;
(completions)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'::shell:(bash fish powershell zsh fig)' \
&& ret=0
;;
(coverage)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'*--ignore=[Ignore coverage files]: :_files' \
'*--include=[Include source files in the report]:regex: ' \
'*--exclude=[Exclude source files from the report]:regex: ' \
'--output=[Exports the coverage report in lcov format to the given file. If no --output arg is specified then the report is written to stdout.]: :_files' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--lcov[Output coverage report in lcov format]' \
'--html[Output coverage report in HTML format in the given directory]' \
'--detailed[Output coverage report in detailed format in the terminal]' \
'*::files:_files' \
&& ret=0
;;
(doc)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--name=[The name that will be used in the docs (ie for breadcrumbs)]: : ' \
'--category-docs=[Path to a JSON file keyed by category and an optional value of a markdown doc]: : ' \
'--symbol-redirect-map=[Path to a JSON file keyed by file, with an inner map of symbol to an external link]: : ' \
'--default-symbol-map=[Uses the provided mapping of default name to wanted name for usage blocks]: : ' \
'--output=[Directory for HTML documentation output]: :_files -/' \
'(--json --lint --html)--filter=[Dot separated path to symbol]: : ' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'--no-npm[Do not resolve npm modules]' \
'--no-remote[Do not resolve remote modules]' \
'--json[Output documentation in JSON format]' \
'(--json)--html[Output documentation in HTML format]' \
'--strip-trailing-html[Remove trailing .html from various links. Will still generate files with a .html extension]' \
'--private[Output private documentation]' \
'--lint[Output documentation diagnostics.]' \
'*::source_file:_files' \
&& ret=0
;;
(eval)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'--inspect=[Activate inspector on host\:port \[default\: 127.0.0.1\:9229\]]' \
'--inspect-brk=[Activate inspector on host\:port, wait for debugger to connect and break at the start of user script]' \
'--inspect-wait=[Activate inspector on host\:port and wait for debugger to connect before running user code]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'(--no-check)--check=[Enable type-checking. This subcommand does not type-check by default If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'--ext=[Set content type of the supplied file]: :(ts tsx js jsx)' \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'-p[print result to stdout]' \
'--print[print result to stdout]' \
'*::code_arg -- Code to evaluate:' \
&& ret=0
;;
(fmt)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--ext=[Set content type of the supplied file]: :(ts tsx js jsx md json jsonc css scss sass less html svelte vue astro yml yaml ipynb)' \
'*--ignore=[Ignore formatting particular source files]: :_files' \
'*--watch-exclude=[Exclude provided files/patterns from watch mode]' \
'--use-tabs=[Use tabs instead of spaces for indentation \[default\: false\]]' \
'--line-width=[Define maximum line width \[default\: 80\]]: : ' \
'--indent-width=[Define indentation width \[default\: 2\]]: : ' \
'--single-quote=[Use single quotes \[default\: false\]]' \
'--prose-wrap=[Define how prose should be wrapped \[default\: always\]]: :(always never preserve)' \
'--no-semicolons=[Don'\''t use semicolons except where necessary \[default\: false\]]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'--check[Check if the source files are formatted]' \
'--watch[Watch for file changes and restart process automatically. Only local files from entry point module graph are watched.]' \
'--no-clear-screen[Do not clear terminal screen when under watch mode]' \
'--unstable-css[Enable formatting CSS, SCSS, Sass and Less files]' \
'--unstable-html[Enable formatting HTML files]' \
'--unstable-component[Enable formatting Svelte, Vue, Astro and Angular files]' \
'--unstable-yaml[Enable formatting YAML files]' \
'*::files:_files' \
&& ret=0
;;
(init)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--lib[Generate an example library project]' \
'(--lib)--serve[Generate an example project for \`deno serve\`]' \
'::dir:_files -/' \
&& ret=0
;;
(info)
_arguments "${_arguments_options[@]}" : \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'()--location=[Show files used for origin bound APIs like the Web Storage API when running a script with --location=<HREF>]:HREF:_urls' \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'--json[UNSTABLE\: Outputs the information in JSON format]' \
'::file:_files' \
&& ret=0
;;
(install)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'--inspect=[Activate inspector on host\:port \[default\: 127.0.0.1\:9229\]]' \
'--inspect-brk=[Activate inspector on host\:port, wait for debugger to connect and break at the start of user script]' \
'--inspect-wait=[Activate inspector on host\:port and wait for debugger to connect before running user code]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'*-R+[Allow file system read access. Optionally specify allowed paths]' \
'*--allow-read=[Allow file system read access. Optionally specify allowed paths]' \
'*--deny-read=[Deny file system read access. Optionally specify denied paths]' \
'*-W+[Allow file system write access. Optionally specify allowed paths]' \
'*--allow-write=[Allow file system write access. Optionally specify allowed paths]' \
'*--deny-write=[Deny file system write access. Optionally specify denied paths]' \
'-N+[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--allow-net=[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--deny-net=[Deny network access. Optionally specify denied IP addresses and host names, with ports as necessary]' \
'-E+[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--allow-env=[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--deny-env=[Deny access to system environment information. Optionally specify accessible environment variables]' \
'-S+[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--allow-sys=[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--deny-sys=[Deny access to OS information. Optionally deny specific APIs by function name]' \
'--allow-run=[Allow running subprocesses. Optionally specify allowed runnable program names]' \
'--deny-run=[Deny running subprocesses. Optionally specify denied runnable program names]' \
'*--allow-ffi=[(Unstable) Allow loading dynamic libraries. Optionally specify allowed directories or files]' \
'*--deny-ffi=[(Unstable) Deny loading dynamic libraries. Optionally specify denied directories or files]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'(--no-check)--check=[Set type-checking behavior. This subcommand type-checks local modules by default, so adding --check is redundant If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'-n+[Executable file name]: : ' \
'--name=[Executable file name]: : ' \
'--root=[Installation root]: :_files -/' \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)-A[Allow all permissions]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)--allow-all[Allow all permissions]' \
'--allow-hrtime[REMOVED in Deno 2.0]' \
'--deny-hrtime[REMOVED in Deno 2.0]' \
'--no-prompt[Always throw if required permission wasn'\''t passed]' \
'-f[Forcefully overwrite existing installation]' \
'--force[Forcefully overwrite existing installation]' \
'-g[Install a package or script as a globally available executable]' \
'--global[Install a package or script as a globally available executable]' \
'(-g --global)-e[Install dependents of the specified entrypoint(s)]' \
'(-g --global)--entrypoint[Install dependents of the specified entrypoint(s)]' \
'(-e --entrypoint -g --global)-D[Add as a dev dependency]' \
'(-e --entrypoint -g --global)--dev[Add as a dev dependency]' \
'*::cmd:_files' \
&& ret=0
;;
(i)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'--inspect=[Activate inspector on host\:port \[default\: 127.0.0.1\:9229\]]' \
'--inspect-brk=[Activate inspector on host\:port, wait for debugger to connect and break at the start of user script]' \
'--inspect-wait=[Activate inspector on host\:port and wait for debugger to connect before running user code]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'*-R+[Allow file system read access. Optionally specify allowed paths]' \
'*--allow-read=[Allow file system read access. Optionally specify allowed paths]' \
'*--deny-read=[Deny file system read access. Optionally specify denied paths]' \
'*-W+[Allow file system write access. Optionally specify allowed paths]' \
'*--allow-write=[Allow file system write access. Optionally specify allowed paths]' \
'*--deny-write=[Deny file system write access. Optionally specify denied paths]' \
'-N+[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--allow-net=[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--deny-net=[Deny network access. Optionally specify denied IP addresses and host names, with ports as necessary]' \
'-E+[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--allow-env=[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--deny-env=[Deny access to system environment information. Optionally specify accessible environment variables]' \
'-S+[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--allow-sys=[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--deny-sys=[Deny access to OS information. Optionally deny specific APIs by function name]' \
'--allow-run=[Allow running subprocesses. Optionally specify allowed runnable program names]' \
'--deny-run=[Deny running subprocesses. Optionally specify denied runnable program names]' \
'*--allow-ffi=[(Unstable) Allow loading dynamic libraries. Optionally specify allowed directories or files]' \
'*--deny-ffi=[(Unstable) Deny loading dynamic libraries. Optionally specify denied directories or files]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'(--no-check)--check=[Set type-checking behavior. This subcommand type-checks local modules by default, so adding --check is redundant If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'-n+[Executable file name]: : ' \
'--name=[Executable file name]: : ' \
'--root=[Installation root]: :_files -/' \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)-A[Allow all permissions]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)--allow-all[Allow all permissions]' \
'--allow-hrtime[REMOVED in Deno 2.0]' \
'--deny-hrtime[REMOVED in Deno 2.0]' \
'--no-prompt[Always throw if required permission wasn'\''t passed]' \
'-f[Forcefully overwrite existing installation]' \
'--force[Forcefully overwrite existing installation]' \
'-g[Install a package or script as a globally available executable]' \
'--global[Install a package or script as a globally available executable]' \
'(-g --global)-e[Install dependents of the specified entrypoint(s)]' \
'(-g --global)--entrypoint[Install dependents of the specified entrypoint(s)]' \
'(-e --entrypoint -g --global)-D[Add as a dev dependency]' \
'(-e --entrypoint -g --global)--dev[Add as a dev dependency]' \
'*::cmd:_files' \
&& ret=0
;;
(json_reference)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(jupyter)
_arguments "${_arguments_options[@]}" : \
'(--install)--conn=[Path to JSON file describing connection parameters, provided by Jupyter]: :_files' \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'(--kernel)--install[Installs kernelspec, requires '\''jupyter'\'' command to be available.]' \
'(--install)--kernel[Start the kernel]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(uninstall)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--root=[Installation root]: :_files -/' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'-g[Remove globally installed package or module]' \
'--global[Remove globally installed package or module]' \
'::name-or-package:' \
'*::additional-packages -- List of additional packages to remove:' \
&& ret=0
;;
(lsp)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(lint)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--ext=[Specify the file extension to lint when reading from stdin.For example, use \`jsx\` to lint JSX files or \`tsx\` for TSX files.This argument is necessary because stdin input does not automatically infer the file type.Example usage\: \`cat file.jsx | deno lint - --ext=jsx\`.]:EXT: ' \
'*--rules-tags=[Use set of rules with a tag]: : ' \
'(--rules)--rules-include=[Include lint rules]: : ' \
'(--rules)--rules-exclude=[Exclude lint rules]: : ' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*--ignore=[Ignore linting particular source files]: :_files' \
'*--watch-exclude=[Exclude provided files/patterns from watch mode]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--fix[Fix any linting errors for rules that support it]' \
'--rules[List available rules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'--json[Output lint result in JSON format]' \
'(--json)--compact[Output lint result in compact format]' \
'--watch[Watch for file changes and restart process automatically. Only local files from entry point module graph are watched.]' \
'--no-clear-screen[Do not clear terminal screen when under watch mode]' \
'*::files:_files' \
&& ret=0
;;
(publish)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--token=[The API token to use when publishing. If unset, interactive authentication is be used]: : ' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'(--no-check)--check=[Set type-checking behavior. This subcommand type-checks local modules by default, so adding --check is redundant If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'--dry-run[Prepare the package for publishing performing all checks and validations without uploading]' \
'--allow-slow-types[Allow publishing with slow types]' \
'--allow-dirty[Allow publishing if the repository has uncommitted changed]' \
'--no-provenance[Disable provenance attestation. Enabled by default on Github actions, publicly links the package to where it was built and published from.]' \
&& ret=0
;;
(repl)
_arguments "${_arguments_options[@]}" : \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'--inspect=[Activate inspector on host\:port \[default\: 127.0.0.1\:9229\]]' \
'--inspect-brk=[Activate inspector on host\:port, wait for debugger to connect and break at the start of user script]' \
'--inspect-wait=[Activate inspector on host\:port and wait for debugger to connect before running user code]' \
'*-R+[Allow file system read access. Optionally specify allowed paths]' \
'*--allow-read=[Allow file system read access. Optionally specify allowed paths]' \
'*--deny-read=[Deny file system read access. Optionally specify denied paths]' \
'*-W+[Allow file system write access. Optionally specify allowed paths]' \
'*--allow-write=[Allow file system write access. Optionally specify allowed paths]' \
'*--deny-write=[Deny file system write access. Optionally specify denied paths]' \
'-N+[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--allow-net=[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--deny-net=[Deny network access. Optionally specify denied IP addresses and host names, with ports as necessary]' \
'-E+[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--allow-env=[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--deny-env=[Deny access to system environment information. Optionally specify accessible environment variables]' \
'-S+[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--allow-sys=[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--deny-sys=[Deny access to OS information. Optionally deny specific APIs by function name]' \
'--allow-run=[Allow running subprocesses. Optionally specify allowed runnable program names]' \
'--deny-run=[Deny running subprocesses. Optionally specify denied runnable program names]' \
'*--allow-ffi=[(Unstable) Allow loading dynamic libraries. Optionally specify allowed directories or files]' \
'*--deny-ffi=[(Unstable) Deny loading dynamic libraries. Optionally specify denied directories or files]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'*--eval-file=[Evaluates the provided file(s) as scripts when the REPL starts. Accepts file paths and URLs]: :_files' \
'--eval=[Evaluates the provided code when the REPL starts]:code: ' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)-A[Allow all permissions]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)--allow-all[Allow all permissions]' \
'--allow-hrtime[REMOVED in Deno 2.0]' \
'--deny-hrtime[REMOVED in Deno 2.0]' \
'--no-prompt[Always throw if required permission wasn'\''t passed]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'*::args:' \
&& ret=0
;;
(task)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--cwd=[Specify the directory to run the task in]:DIR:_files -/' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(test)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--no-check=[Skip type-checking. If the value of "remote" is supplied, diagnostic errors from remote modules will be ignored]' \
'--import-map=[Load import map file from local file or remote URL Docs\: https\://docs.deno.com/runtime/manual/basics/import_maps]:FILE:_files' \
'--node-modules-dir=[Sets the node modules management mode for npm packages]' \
'--vendor=[Toggles local vendor folder usage for remote modules and a node_modules folder for npm packages]' \
'-c+[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'--config=[Configure different aspects of deno including TypeScript, linting, and code formatting Typically the configuration file will be called \`deno.json\` or \`deno.jsonc\` and automatically detected; in that case this flag is not necessary. Docs\: https\://docs.deno.com/go/config]:FILE:_files' \
'*-r+[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'*--reload=[Reload source code cache (recompile TypeScript) no value Reload everything jsr\:@std/http/file-server,jsr\:@std/assert/assert-equals Reloads specific modules npm\: Reload all npm modules npm\:chalk Reload specific npm module]' \
'--lock=[Check the specified lock file. (If value is not provided, defaults to "./deno.lock")]' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'*-R+[Allow file system read access. Optionally specify allowed paths]' \
'*--allow-read=[Allow file system read access. Optionally specify allowed paths]' \
'*--deny-read=[Deny file system read access. Optionally specify denied paths]' \
'*-W+[Allow file system write access. Optionally specify allowed paths]' \
'*--allow-write=[Allow file system write access. Optionally specify allowed paths]' \
'*--deny-write=[Deny file system write access. Optionally specify denied paths]' \
'-N+[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--allow-net=[Allow network access. Optionally specify allowed IP addresses and host names, with ports as necessary]' \
'--deny-net=[Deny network access. Optionally specify denied IP addresses and host names, with ports as necessary]' \
'-E+[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--allow-env=[Allow access to system environment information. Optionally specify accessible environment variables]' \
'--deny-env=[Deny access to system environment information. Optionally specify accessible environment variables]' \
'-S+[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--allow-sys=[Allow access to OS information. Optionally allow specific APIs by function name]' \
'--deny-sys=[Deny access to OS information. Optionally deny specific APIs by function name]' \
'--allow-run=[Allow running subprocesses. Optionally specify allowed runnable program names]' \
'--deny-run=[Deny running subprocesses. Optionally specify denied runnable program names]' \
'*--allow-ffi=[(Unstable) Allow loading dynamic libraries. Optionally specify allowed directories or files]' \
'*--deny-ffi=[(Unstable) Deny loading dynamic libraries. Optionally specify denied directories or files]' \
'-I+[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--allow-import=[Allow importing from remote hosts. Optionally specify allowed IP addresses and host names, with ports as necessary. Default value\: deno.land\:443,jsr.io\:443,esm.sh\:443,cdn.jsdelivr.net\:443,raw.githubusercontent.com\:443,user.githubusercontent.com\:443]' \
'--inspect=[Activate inspector on host\:port \[default\: 127.0.0.1\:9229\]]' \
'--inspect-brk=[Activate inspector on host\:port, wait for debugger to connect and break at the start of user script]' \
'--inspect-wait=[Activate inspector on host\:port and wait for debugger to connect before running user code]' \
'*--allow-scripts=[Allow running npm lifecycle scripts for the given packages Note\: Scripts will only be executed when using a node_modules directory (\`--node-modules-dir\`)]' \
'--frozen=[Error out if lockfile is out of date]' \
'--location=[Value of globalThis.location used by some web APIs]:HREF:_urls' \
'--v8-flags=[To see a list of all available flags use --v8-flags=--help Flags can also be set via the DENO_V8_FLAGS environment variable. Any flags set with this flag are appended after the DENO_V8_FLAGS environment variable]' \
'--seed=[Set the random number generator seed]:NUMBER: ' \
'--strace-ops=[Trace low-level op calls]' \
'(--no-check)--check=[Set type-checking behavior. This subcommand type-checks local modules by default, so adding --check is redundant If the value of "all" is supplied, remote modules will be included. Alternatively, the '\''deno check'\'' subcommand can be used]' \
'*--ignore=[Ignore files]: :_files' \
'--fail-fast=[Stop after N errors. Defaults to stopping after first failure]' \
'--filter=[Run tests with this string or regexp pattern in the test name]: : ' \
'--shuffle=[Shuffle the order in which the tests are run]' \
'(--inspect --inspect-wait --inspect-brk)--coverage=[Collect coverage profile data into DIR. If DIR is not specified, it uses '\''coverage/'\'']' \
'(--no-run --coverage)*--watch=[Watch for file changes and restart process automatically. Local files from entry point module graph are watched by default. Additional paths might be watched by passing them as arguments to this flag.]' \
'*--watch-exclude=[Exclude provided files/patterns from watch mode]' \
'--junit-path=[Write a JUnit XML test report to PATH. Use '\''-'\'' to write to stdout which is the default when PATH is not provided]:PATH:_files' \
'--reporter=[Select reporter to use. Default to '\''pretty'\'']: :(pretty dot junit tap)' \
'--env-file=[Load environment variables from local file Only the first environment variable with a given key is used. Existing process environment variables are not overwritten.]' \
'--ext=[Set content type of the supplied file]: :(ts tsx js jsx)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--no-remote[Do not resolve remote modules]' \
'--no-npm[Do not resolve npm modules]' \
'(-c --config)--no-config[Disable automatic loading of the configuration file]' \
'(--lock)--no-lock[Disable auto discovery of the lock file]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)-A[Allow all permissions]' \
'(-R --allow-read -W --allow-write -N --allow-net -E --allow-env --allow-run -S --allow-sys --allow-ffi -I --allow-import)--allow-all[Allow all permissions]' \
'--allow-hrtime[REMOVED in Deno 2.0]' \
'--deny-hrtime[REMOVED in Deno 2.0]' \
'--no-prompt[Always throw if required permission wasn'\''t passed]' \
'--cached-only[Require that remote dependencies are already cached]' \
'--enable-testing-features-do-not-use[INTERNAL\: Enable internal features used during integration testing]' \
'--no-run[Cache test modules, but don'\''t run tests]' \
'--trace-leaks[Enable tracing of leaks. Useful when debugging leaking ops in test, but impacts test execution time]' \
'--doc[Evaluate code blocks in JSDoc and Markdown]' \
'--permit-no-files[Don'\''t return an error code if no test files were found]' \
'--clean[Empty the temporary coverage profile data directory before running tests. Note\: running multiple \`deno test --clean\` calls in series or parallel for the same coverage directory may cause race conditions.]' \
'--parallel[Run test modules in parallel. Parallelism defaults to the number of available CPUs or the value of the DENO_JOBS environment variable]' \
'--no-clear-screen[Do not clear terminal screen when under watch mode]' \
'--hide-stacktraces[Hide stack traces for errors in failure test results.]' \
'*::files -- List of file names to run:_files' \
&& ret=0
;;
(types)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(upgrade)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--version=[The version to upgrade to]: : ' \
'--output=[The path to output the updated version to]: :_files' \
'--cert=[Load certificate authority from PEM encoded file]:FILE:_files' \
'--unsafely-ignore-certificate-errors=[DANGER\: Disables verification of TLS certificates]' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
'--dry-run[Perform all checks without replacing old exe]' \
'-f[Replace current exe even if not out-of-date]' \
'--force[Replace current exe even if not out-of-date]' \
'--canary[Upgrade to canary builds]' \
'(--canary --version)--rc[Upgrade to a release candidate]' \
'::version-or-hash-or-channel -- Version (v1.46.0), channel (rc, canary) or commit hash (9bc2dd29ad6ba334fd57a20114e367d3c04763d4):' \
&& ret=0
;;
(vendor)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(help)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'--unstable[Enable all unstable features and APIs. Instead of using this flag, consider enabling individual unstable features To view the list of individual unstable feature flags, run this command again with --help=unstable]' \
'--unstable-bare-node-builtins[Enable unstable bare node builtins feature]' \
'--unstable-detect-cjs[Reads the package.json type field in a project to treat .js files as .cjs]' \
'--unstable-byonm[]' \
'--unstable-sloppy-imports[Enable unstable resolving of specifiers by extension probing, .js to .ts, and directory probing]' \
'--unstable-broadcast-channel[Enable unstable \`BroadcastChannel\` API]' \
'--unstable-cron[Enable unstable Deno.cron API]' \
'--unstable-ffi[Enable unstable FFI APIs]' \
'--unstable-fs[Enable unstable file system APIs]' \
'--unstable-http[Enable unstable HTTP APIs]' \
'--unstable-kv[Enable unstable Key-Value store APIs]' \
'--unstable-net[Enable unstable net APIs]' \
'--unstable-process[Enable unstable process APIs]' \
'--unstable-temporal[Enable unstable Temporal API]' \
'--unstable-unsafe-proto[Enable unsafe __proto__ support. This is a security risk.]' \
'--unstable-webgpu[Enable unstable \`WebGPU\` APIs]' \
'--unstable-worker-options[Enable unstable Web Worker APIs]' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
":: :_deno__help_commands" \
"*::: :->help" \
&& ret=0
case $state in
(help)
words=($line[1] "${words[@]}")
(( CURRENT += 1 ))
curcontext="${curcontext%:*:*}:deno-help-command-$line[1]:"
case $line[1] in
(run)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(serve)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(add)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(remove)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(bench)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(bundle)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(cache)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(check)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(clean)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(compile)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(completions)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(coverage)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(doc)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(eval)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(fmt)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(init)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(info)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(install)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(json_reference)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(jupyter)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(uninstall)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(lsp)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(lint)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(publish)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(repl)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(task)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(test)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(types)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(upgrade)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
(vendor)
_arguments "${_arguments_options[@]}" : \
'*-h+[]' \
'*--help=[]' \
'-L+[Set log level]: :(trace debug info)' \
'--log-level=[Set log level]: :(trace debug info)' \
'-q[Suppress diagnostic output]' \
'--quiet[Suppress diagnostic output]' \
&& ret=0
;;
esac
;;
esac
;;
esac
;;
esac
}
(( $+functions[_deno_commands] )) ||
_deno_commands() {
local commands; commands=(
'run:Run a JavaScript or TypeScript program, or a task or script. By default all programs are run in sandbox without access to disk, network or ability to spawn subprocesses. deno run https\://examples.deno.land/hello-world.ts Grant permission to read from disk and listen to network\: deno run --allow-read --allow-net jsr\:@std/http/file-server Grant permission to read allow-listed files from disk\: deno run --allow-read=/etc jsr\:@std/http/file-server Grant all permissions\: deno run -A jsr\:@std/http/file-server Specifying the filename '\''-'\'' to read the file from stdin. curl https\://examples.deno.land/hello-world.ts | deno run - Read more\: https\://docs.deno.com/go/run' \
'serve:Run a server defined in a main module The serve command uses the default exports of the main module to determine which servers to start. Start a server defined in server.ts\: deno serve server.ts Start a server defined in server.ts, watching for changes and running on port 5050\: deno serve --watch --port 5050 server.ts Read more\: https\://docs.deno.com/go/serve' \
'add:Add dependencies to your configuration file. deno add jsr\:@std/path You can add multiple dependencies at once\: deno add jsr\:@std/path jsr\:@std/assert' \
'remove:Remove dependencies from the configuration file. deno remove @std/path You can remove multiple dependencies at once\: deno remove @std/path @std/assert ' \
'bench:Run benchmarks using Deno'\''s built-in bench tool. Evaluate the given files, run all benches declared with '\''Deno.bench()'\'' and report results to standard output\: deno bench src/fetch_bench.ts src/signal_bench.ts If you specify a directory instead of a file, the path is expanded to all contained files matching the glob {*_,*.,}bench.{js,mjs,ts,mts,jsx,tsx}\: deno bench src/ Read more\: https\://docs.deno.com/go/bench' \
'bundle:⚠️ \`deno bundle\` was removed in Deno 2. See the Deno 1.x to 2.x Migration Guide for migration instructions\: https\://docs.deno.com/runtime/manual/advanced/migrate_deprecations' \
'cache:Cache and compile remote dependencies. Download and compile a module with all of its static dependencies and save them in the local cache, without running any code\: deno cache jsr\:@std/http/file-server Future runs of this module will trigger no downloads or compilation unless --reload is specified Read more\: https\://docs.deno.com/go/cache' \
'check:Download and type-check without execution. deno check jsr\:@std/http/file-server Unless --reload is specified, this command will not re-download already cached dependencies Read more\: https\://docs.deno.com/go/check' \
'clean:Remove the cache directory (\$DENO_DIR)' \
'compile:Compiles the given script into a self contained executable. deno compile --allow-read --allow-net jsr\:@std/http/file-server deno compile --output file_server jsr\:@std/http/file-server Any flags specified which affect runtime behavior will be applied to the resulting binary. This allows distribution of a Deno application to systems that do not have Deno installed. Under the hood, it bundles a slimmed down version of the Deno runtime along with your JavaScript or TypeScript code. Cross-compiling to different target architectures is supported using the --target flag. On the first invocation with deno will download the proper binary and cache it in \$DENO_DIR. Read more\: https\://docs.deno.com/go/compile ' \
'completions:Output shell completion script to standard output. deno completions bash > /usr/local/etc/bash_completion.d/deno.bash source /usr/local/etc/bash_completion.d/deno.bash' \
'coverage:Print coverage reports from coverage profiles. Collect a coverage profile with deno test\: deno test --coverage=cov_profile Print a report to stdout\: deno coverage cov_profile Include urls that start with the file schema and exclude files ending with test.ts and test.js, for an url to match it must match the include pattern and not match the exclude pattern\: deno coverage --include="^file\:" --exclude="test\\.(ts|js)" cov_profile Write a report using the lcov format\: deno coverage --lcov --output=cov.lcov cov_profile/ Generate html reports from lcov\: genhtml -o html_cov cov.lcov Read more\: https\://docs.deno.com/go/coverage' \
'doc:Show documentation for a module. Output documentation to standard output\: deno doc ./path/to/module.ts Output documentation in HTML format\: deno doc --html --name="My library" ./path/to/module.ts Lint a module for documentation diagnostics\: deno doc --lint ./path/to/module.ts Target a specific symbol\: deno doc ./path/to/module.ts MyClass.someField Show documentation for runtime built-ins\: deno doc deno doc --filter Deno.Listener Read more\: https\://docs.deno.com/go/doc' \
'eval:Evaluate JavaScript from the command line. deno eval "console.log('\''hello world'\'')" To evaluate as TypeScript\: deno eval --ext=ts "const v\: string = '\''hello'\''; console.log(v)" This command has implicit access to all permissions. Read more\: https\://docs.deno.com/go/eval' \
'fmt:Auto-format various file types. deno fmt myfile1.ts myfile2.ts Supported file types are\: JavaScript, TypeScript, Markdown, JSON(C) and Jupyter Notebooks Supported file types which are behind corresponding unstable flags (see formatting options)\: HTML, CSS, SCSS, SASS, LESS, YAML, Svelte, Vue, Astro and Angular Format stdin and write to stdout\: cat file.ts | deno fmt - Check if the files are formatted\: deno fmt --check Ignore formatting code by preceding it with an ignore comment\: // deno-fmt-ignore Ignore formatting a file by adding an ignore comment at the top of the file\: // deno-fmt-ignore-file Read more\: https\://docs.deno.com/go/fmt' \
'init:scaffolds a basic Deno project with a script, test, and configuration file' \
'info:Show information about a module or the cache directories. Get information about a module\: deno info jsr\:@std/http/file-server The following information is shown\: local\: Local path of the file type\: JavaScript, TypeScript, or JSON emit\: Local path of compiled source code (TypeScript only) dependencies\: Dependency tree of the source file Read more\: https\://docs.deno.com/go/info' \
'install:Installs dependencies either in the local project or globally to a bin directory. Local installation Add dependencies to the local project'\''s configuration (deno.json / package.json) and installs them in the package cache. If no dependency is specified, installs all dependencies listed in the config file. If the --entrypoint flag is passed, installs the dependencies of the specified entrypoint(s). deno install deno install jsr\:@std/bytes deno install npm\:chalk deno install --entrypoint entry1.ts entry2.ts Global installation If the --global flag is set, installs a script as an executable in the installation root'\''s bin directory. deno install --global --allow-net --allow-read jsr\:@std/http/file-server deno install -g https\://examples.deno.land/color-logging.ts To change the executable name, use -n/--name\: deno install -g --allow-net --allow-read -n serve jsr\:@std/http/file-server The executable name is inferred by default\: - Attempt to take the file stem of the URL path. The above example would become file_server. - If the file stem is something generic like main, mod, index or cli, and the path has no parent, take the file name of the parent path. Otherwise settle with the generic name. - If the resulting name has an @... suffix, strip it. To change the installation root, use --root\: deno install -g --allow-net --allow-read --root /usr/local jsr\:@std/http/file-server The installation root is determined, in order of precedence\: - --root option - DENO_INSTALL_ROOT environment variable - \$HOME/.deno These must be added to the path manually if required.' \
'i:Installs dependencies either in the local project or globally to a bin directory. Local installation Add dependencies to the local project'\''s configuration (deno.json / package.json) and installs them in the package cache. If no dependency is specified, installs all dependencies listed in the config file. If the --entrypoint flag is passed, installs the dependencies of the specified entrypoint(s). deno install deno install jsr\:@std/bytes deno install npm\:chalk deno install --entrypoint entry1.ts entry2.ts Global installation If the --global flag is set, installs a script as an executable in the installation root'\''s bin directory. deno install --global --allow-net --allow-read jsr\:@std/http/file-server deno install -g https\://examples.deno.land/color-logging.ts To change the executable name, use -n/--name\: deno install -g --allow-net --allow-read -n serve jsr\:@std/http/file-server The executable name is inferred by default\: - Attempt to take the file stem of the URL path. The above example would become file_server. - If the file stem is something generic like main, mod, index or cli, and the path has no parent, take the file name of the parent path. Otherwise settle with the generic name. - If the resulting name has an @... suffix, strip it. To change the installation root, use --root\: deno install -g --allow-net --allow-read --root /usr/local jsr\:@std/http/file-server The installation root is determined, in order of precedence\: - --root option - DENO_INSTALL_ROOT environment variable - \$HOME/.deno These must be added to the path manually if required.' \
'json_reference:' \
'jupyter:Deno kernel for Jupyter notebooks' \
'uninstall:Uninstalls a dependency or an executable script in the installation root'\''s bin directory. deno uninstall @std/dotenv chalk deno uninstall --global file_server To change the installation root, use --root flag\: deno uninstall --global --root /usr/local serve The installation root is determined, in order of precedence\: - --root option - DENO_INSTALL_ROOT environment variable - \$HOME/.deno' \
'lsp:The '\''deno lsp'\'' subcommand provides a way for code editors and IDEs to interact with Deno using the Language Server Protocol. Usually humans do not use this subcommand directly. For example, '\''deno lsp'\'' can provide IDEs with go-to-definition support and automatic code formatting. How to connect various editors and IDEs to '\''deno lsp'\''\: https\://docs.deno.com/go/lsp' \
'lint:Lint JavaScript/TypeScript source code. deno lint deno lint myfile1.ts myfile2.js Print result as JSON\: deno lint --json Read from stdin\: cat file.ts | deno lint - cat file.ts | deno lint --json - List available rules\: deno lint --rules To ignore specific diagnostics, you can write an ignore comment on the preceding line with a rule name (or multiple)\: // deno-lint-ignore no-explicit-any // deno-lint-ignore require-await no-empty To ignore linting on an entire file, you can add an ignore comment at the top of the file\: // deno-lint-ignore-file Read more\: https\://docs.deno.com/go/lint ' \
'publish:Publish the current working directory'\''s package or workspace to JSR' \
'repl:Starts a read-eval-print-loop, which lets you interactively build up program state in the global context. It is especially useful for quick prototyping and checking snippets of code. TypeScript is supported, however it is not type-checked, only transpiled.' \
'task:Run a task defined in the configuration file. deno task build List all available tasks\: deno task' \
'test:Run tests using Deno'\''s built-in test runner. Evaluate the given modules, run all tests declared with Deno.test() and report results to standard output\: deno test src/fetch_test.ts src/signal_test.ts Directory arguments are expanded to all contained files matching the glob {*_,*.,}test.{js,mjs,ts,mts,jsx,tsx} or **/__tests__/**\: deno test src/ Read more\: https\://docs.deno.com/go/test' \
'types:Print runtime TypeScript declarations. deno types > lib.deno.d.ts The declaration file could be saved and used for typing information.' \
'upgrade:Upgrade deno executable to the given version. Latest deno upgrade Specific version deno upgrade 1.45.0 deno upgrade 1.46.0-rc.1 deno upgrade 9bc2dd29ad6ba334fd57a20114e367d3c04763d4 Channel deno upgrade stable deno upgrade rc deno upgrade canary The version is downloaded from https\://dl.deno.land and is used to replace the current executable. If you want to not replace the current Deno executable but instead download an update to a different location, use the --output flag\: deno upgrade --output \$HOME/my_deno Read more\: https\://docs.deno.com/go/upgrade' \
'vendor:⚠️ \`deno vendor\` was removed in Deno 2. See the Deno 1.x to 2.x Migration Guide for migration instructions\: https\://docs.deno.com/runtime/manual/advanced/migrate_deprecations' \
'help:' \
)
_describe -t commands 'deno commands' commands "$@"
}
(( $+functions[_deno__add_commands] )) ||
_deno__add_commands() {
local commands; commands=()
_describe -t commands 'deno add commands' commands "$@"
}
(( $+functions[_deno__bench_commands] )) ||
_deno__bench_commands() {
local commands; commands=()
_describe -t commands 'deno bench commands' commands "$@"
}
(( $+functions[_deno__bundle_commands] )) ||
_deno__bundle_commands() {
local commands; commands=()
_describe -t commands 'deno bundle commands' commands "$@"
}
(( $+functions[_deno__cache_commands] )) ||
_deno__cache_commands() {
local commands; commands=()
_describe -t commands 'deno cache commands' commands "$@"
}
(( $+functions[_deno__check_commands] )) ||
_deno__check_commands() {
local commands; commands=()
_describe -t commands 'deno check commands' commands "$@"
}
(( $+functions[_deno__clean_commands] )) ||
_deno__clean_commands() {
local commands; commands=()
_describe -t commands 'deno clean commands' commands "$@"
}
(( $+functions[_deno__compile_commands] )) ||
_deno__compile_commands() {
local commands; commands=()
_describe -t commands 'deno compile commands' commands "$@"
}
(( $+functions[_deno__completions_commands] )) ||
_deno__completions_commands() {
local commands; commands=()
_describe -t commands 'deno completions commands' commands "$@"
}
(( $+functions[_deno__coverage_commands] )) ||
_deno__coverage_commands() {
local commands; commands=()
_describe -t commands 'deno coverage commands' commands "$@"
}
(( $+functions[_deno__doc_commands] )) ||
_deno__doc_commands() {
local commands; commands=()
_describe -t commands 'deno doc commands' commands "$@"
}
(( $+functions[_deno__eval_commands] )) ||
_deno__eval_commands() {
local commands; commands=()
_describe -t commands 'deno eval commands' commands "$@"
}
(( $+functions[_deno__fmt_commands] )) ||
_deno__fmt_commands() {
local commands; commands=()
_describe -t commands 'deno fmt commands' commands "$@"
}
(( $+functions[_deno__help_commands] )) ||
_deno__help_commands() {
local commands; commands=(
'run:' \
'serve:' \
'add:' \
'remove:' \
'bench:' \
'bundle:' \
'cache:' \
'check:' \
'clean:' \
'compile:' \
'completions:' \
'coverage:' \
'doc:' \
'eval:' \
'fmt:' \
'init:' \
'info:' \
'install:' \
'json_reference:' \
'jupyter:' \
'uninstall:' \
'lsp:' \
'lint:' \
'publish:' \
'repl:' \
'task:' \
'test:' \
'types:' \
'upgrade:' \
'vendor:' \
)
_describe -t commands 'deno help commands' commands "$@"
}
(( $+functions[_deno__help__add_commands] )) ||
_deno__help__add_commands() {
local commands; commands=()
_describe -t commands 'deno help add commands' commands "$@"
}
(( $+functions[_deno__help__bench_commands] )) ||
_deno__help__bench_commands() {
local commands; commands=()
_describe -t commands 'deno help bench commands' commands "$@"
}
(( $+functions[_deno__help__bundle_commands] )) ||
_deno__help__bundle_commands() {
local commands; commands=()
_describe -t commands 'deno help bundle commands' commands "$@"
}
(( $+functions[_deno__help__cache_commands] )) ||
_deno__help__cache_commands() {
local commands; commands=()
_describe -t commands 'deno help cache commands' commands "$@"
}
(( $+functions[_deno__help__check_commands] )) ||
_deno__help__check_commands() {
local commands; commands=()
_describe -t commands 'deno help check commands' commands "$@"
}
(( $+functions[_deno__help__clean_commands] )) ||
_deno__help__clean_commands() {
local commands; commands=()
_describe -t commands 'deno help clean commands' commands "$@"
}
(( $+functions[_deno__help__compile_commands] )) ||
_deno__help__compile_commands() {
local commands; commands=()
_describe -t commands 'deno help compile commands' commands "$@"
}
(( $+functions[_deno__help__completions_commands] )) ||
_deno__help__completions_commands() {
local commands; commands=()
_describe -t commands 'deno help completions commands' commands "$@"
}
(( $+functions[_deno__help__coverage_commands] )) ||
_deno__help__coverage_commands() {
local commands; commands=()
_describe -t commands 'deno help coverage commands' commands "$@"
}
(( $+functions[_deno__help__doc_commands] )) ||
_deno__help__doc_commands() {
local commands; commands=()
_describe -t commands 'deno help doc commands' commands "$@"
}
(( $+functions[_deno__help__eval_commands] )) ||
_deno__help__eval_commands() {
local commands; commands=()
_describe -t commands 'deno help eval commands' commands "$@"
}
(( $+functions[_deno__help__fmt_commands] )) ||
_deno__help__fmt_commands() {
local commands; commands=()
_describe -t commands 'deno help fmt commands' commands "$@"
}
(( $+functions[_deno__help__info_commands] )) ||
_deno__help__info_commands() {
local commands; commands=()
_describe -t commands 'deno help info commands' commands "$@"
}
(( $+functions[_deno__help__init_commands] )) ||
_deno__help__init_commands() {
local commands; commands=()
_describe -t commands 'deno help init commands' commands "$@"
}
(( $+functions[_deno__help__install_commands] )) ||
_deno__help__install_commands() {
local commands; commands=()
_describe -t commands 'deno help install commands' commands "$@"
}
(( $+functions[_deno__help__json_reference_commands] )) ||
_deno__help__json_reference_commands() {
local commands; commands=()
_describe -t commands 'deno help json_reference commands' commands "$@"
}
(( $+functions[_deno__help__jupyter_commands] )) ||
_deno__help__jupyter_commands() {
local commands; commands=()
_describe -t commands 'deno help jupyter commands' commands "$@"
}
(( $+functions[_deno__help__lint_commands] )) ||
_deno__help__lint_commands() {
local commands; commands=()
_describe -t commands 'deno help lint commands' commands "$@"
}
(( $+functions[_deno__help__lsp_commands] )) ||
_deno__help__lsp_commands() {
local commands; commands=()
_describe -t commands 'deno help lsp commands' commands "$@"
}
(( $+functions[_deno__help__publish_commands] )) ||
_deno__help__publish_commands() {
local commands; commands=()
_describe -t commands 'deno help publish commands' commands "$@"
}
(( $+functions[_deno__help__remove_commands] )) ||
_deno__help__remove_commands() {
local commands; commands=()
_describe -t commands 'deno help remove commands' commands "$@"
}
(( $+functions[_deno__help__repl_commands] )) ||
_deno__help__repl_commands() {
local commands; commands=()
_describe -t commands 'deno help repl commands' commands "$@"
}
(( $+functions[_deno__help__run_commands] )) ||
_deno__help__run_commands() {
local commands; commands=()
_describe -t commands 'deno help run commands' commands "$@"
}
(( $+functions[_deno__help__serve_commands] )) ||
_deno__help__serve_commands() {
local commands; commands=()
_describe -t commands 'deno help serve commands' commands "$@"
}
(( $+functions[_deno__help__task_commands] )) ||
_deno__help__task_commands() {
local commands; commands=()
_describe -t commands 'deno help task commands' commands "$@"
}
(( $+functions[_deno__help__test_commands] )) ||
_deno__help__test_commands() {
local commands; commands=()
_describe -t commands 'deno help test commands' commands "$@"
}
(( $+functions[_deno__help__types_commands] )) ||
_deno__help__types_commands() {
local commands; commands=()
_describe -t commands 'deno help types commands' commands "$@"
}
(( $+functions[_deno__help__uninstall_commands] )) ||
_deno__help__uninstall_commands() {
local commands; commands=()
_describe -t commands 'deno help uninstall commands' commands "$@"
}
(( $+functions[_deno__help__upgrade_commands] )) ||
_deno__help__upgrade_commands() {
local commands; commands=()
_describe -t commands 'deno help upgrade commands' commands "$@"
}
(( $+functions[_deno__help__vendor_commands] )) ||
_deno__help__vendor_commands() {
local commands; commands=()
_describe -t commands 'deno help vendor commands' commands "$@"
}
(( $+functions[_deno__info_commands] )) ||
_deno__info_commands() {
local commands; commands=()
_describe -t commands 'deno info commands' commands "$@"
}
(( $+functions[_deno__init_commands] )) ||
_deno__init_commands() {
local commands; commands=()
_describe -t commands 'deno init commands' commands "$@"
}
(( $+functions[_deno__install_commands] )) ||
_deno__install_commands() {
local commands; commands=()
_describe -t commands 'deno install commands' commands "$@"
}
(( $+functions[_deno__json_reference_commands] )) ||
_deno__json_reference_commands() {
local commands; commands=()
_describe -t commands 'deno json_reference commands' commands "$@"
}
(( $+functions[_deno__jupyter_commands] )) ||
_deno__jupyter_commands() {
local commands; commands=()
_describe -t commands 'deno jupyter commands' commands "$@"
}
(( $+functions[_deno__lint_commands] )) ||
_deno__lint_commands() {
local commands; commands=()
_describe -t commands 'deno lint commands' commands "$@"
}
(( $+functions[_deno__lsp_commands] )) ||
_deno__lsp_commands() {
local commands; commands=()
_describe -t commands 'deno lsp commands' commands "$@"
}
(( $+functions[_deno__publish_commands] )) ||
_deno__publish_commands() {
local commands; commands=()
_describe -t commands 'deno publish commands' commands "$@"
}
(( $+functions[_deno__remove_commands] )) ||
_deno__remove_commands() {
local commands; commands=()
_describe -t commands 'deno remove commands' commands "$@"
}
(( $+functions[_deno__repl_commands] )) ||
_deno__repl_commands() {
local commands; commands=()
_describe -t commands 'deno repl commands' commands "$@"
}
(( $+functions[_deno__run_commands] )) ||
_deno__run_commands() {
local commands; commands=()
_describe -t commands 'deno run commands' commands "$@"
}
(( $+functions[_deno__serve_commands] )) ||
_deno__serve_commands() {
local commands; commands=()
_describe -t commands 'deno serve commands' commands "$@"
}
(( $+functions[_deno__task_commands] )) ||
_deno__task_commands() {
local commands; commands=()
_describe -t commands 'deno task commands' commands "$@"
}
(( $+functions[_deno__test_commands] )) ||
_deno__test_commands() {
local commands; commands=()
_describe -t commands 'deno test commands' commands "$@"
}
(( $+functions[_deno__types_commands] )) ||
_deno__types_commands() {
local commands; commands=()
_describe -t commands 'deno types commands' commands "$@"
}
(( $+functions[_deno__uninstall_commands] )) ||
_deno__uninstall_commands() {
local commands; commands=()
_describe -t commands 'deno uninstall commands' commands "$@"
}
(( $+functions[_deno__upgrade_commands] )) ||
_deno__upgrade_commands() {
local commands; commands=()
_describe -t commands 'deno upgrade commands' commands "$@"
}
(( $+functions[_deno__vendor_commands] )) ||
_deno__vendor_commands() {
local commands; commands=()
_describe -t commands 'deno vendor commands' commands "$@"
}
if [ "$funcstack[1]" = "_deno" ]; then
_deno "$@"
else
compdef _deno deno
fi