@backstage/plugin-auth-backend-module-atlassian-provider 0.1.11-next.0 → 0.2.0-next.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,26 @@
1
1
  # @backstage/plugin-auth-backend-module-atlassian-provider
2
2
 
3
+ ## 0.2.0-next.2
4
+
5
+ ### Minor Changes
6
+
7
+ - 8efc6cf: **BREAKING**: The `scope` and `scopes` config options have been removed and replaced by the standard `additionalScopes` config. In addition, the `offline_access`, `read:jira-work`, and `read:jira-user` scopes have been set to required and will always be present.
8
+
9
+ ### Patch Changes
10
+
11
+ - d44a20a: Added additional plugin metadata to `package.json`.
12
+ - Updated dependencies
13
+ - @backstage/backend-plugin-api@0.6.19-next.3
14
+ - @backstage/plugin-auth-node@0.4.14-next.3
15
+
16
+ ## 0.1.11-next.1
17
+
18
+ ### Patch Changes
19
+
20
+ - Updated dependencies
21
+ - @backstage/backend-plugin-api@0.6.19-next.2
22
+ - @backstage/plugin-auth-node@0.4.14-next.2
23
+
3
24
  ## 0.1.11-next.0
4
25
 
5
26
  ### Patch Changes
package/config.d.ts CHANGED
@@ -27,7 +27,7 @@ export interface Config {
27
27
  clientSecret: string;
28
28
  audience?: string;
29
29
  callbackUrl?: string;
30
- scope?: string;
30
+ additionalScopes?: string | string[];
31
31
  };
32
32
  };
33
33
  };
package/dist/index.cjs.js CHANGED
@@ -8,11 +8,18 @@ var backendPluginApi = require('@backstage/backend-plugin-api');
8
8
 
9
9
  const atlassianAuthenticator = pluginAuthNode.createOAuthAuthenticator({
10
10
  defaultProfileTransform: pluginAuthNode.PassportOAuthAuthenticatorHelper.defaultProfileTransform,
11
+ scopes: {
12
+ required: ["offline_access", "read:jira-work", "read:jira-user"]
13
+ },
11
14
  initialize({ callbackUrl, config }) {
12
15
  const clientId = config.getString("clientId");
13
16
  const clientSecret = config.getString("clientSecret");
14
- const scope = config.getOptionalString("scope") ?? config.getOptionalString("scopes") ?? "offline_access read:jira-work read:jira-user";
15
17
  const baseUrl = "https://auth.atlassian.com";
18
+ if (config.has("scope") || config.has("scopes")) {
19
+ throw new Error(
20
+ 'The atlassian provider no longer supports the "scope" or "scopes" configuration options. Please use the "additionalScopes" option instead.'
21
+ );
22
+ }
16
23
  return pluginAuthNode.PassportOAuthAuthenticatorHelper.from(
17
24
  new passportAtlassianOauth2.Strategy(
18
25
  {
@@ -22,8 +29,7 @@ const atlassianAuthenticator = pluginAuthNode.createOAuthAuthenticator({
22
29
  baseURL: baseUrl,
23
30
  authorizationURL: `${baseUrl}/authorize`,
24
31
  tokenURL: `${baseUrl}/oauth/token`,
25
- profileURL: `${baseUrl}/api/v4/user`,
26
- scope
32
+ profileURL: `${baseUrl}/api/v4/user`
27
33
  },
28
34
  (accessToken, refreshToken, params, fullProfile, done) => {
29
35
  done(
@@ -1 +1 @@
1
- {"version":3,"file":"index.cjs.js","sources":["../src/authenticator.ts","../src/resolvers.ts","../src/module.ts"],"sourcesContent":["/*\n * Copyright 2023 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport {\n createOAuthAuthenticator,\n PassportOAuthAuthenticatorHelper,\n PassportOAuthDoneCallback,\n PassportProfile,\n} from '@backstage/plugin-auth-node';\nimport { Strategy as AtlassianStrategy } from 'passport-atlassian-oauth2';\n\n/** @public */\nexport const atlassianAuthenticator = createOAuthAuthenticator({\n defaultProfileTransform:\n PassportOAuthAuthenticatorHelper.defaultProfileTransform,\n initialize({ callbackUrl, config }) {\n const clientId = config.getString('clientId');\n const clientSecret = config.getString('clientSecret');\n const scope =\n config.getOptionalString('scope') ??\n config.getOptionalString('scopes') ??\n 'offline_access read:jira-work read:jira-user';\n const baseUrl = 'https://auth.atlassian.com';\n\n return PassportOAuthAuthenticatorHelper.from(\n new AtlassianStrategy(\n {\n clientID: clientId,\n clientSecret: clientSecret,\n callbackURL: callbackUrl,\n baseURL: baseUrl,\n authorizationURL: `${baseUrl}/authorize`,\n tokenURL: `${baseUrl}/oauth/token`,\n profileURL: `${baseUrl}/api/v4/user`,\n scope,\n },\n (\n accessToken: string,\n refreshToken: string,\n params: any,\n fullProfile: PassportProfile,\n done: PassportOAuthDoneCallback,\n ) => {\n done(\n undefined,\n { fullProfile, params, accessToken },\n { refreshToken },\n );\n },\n ),\n );\n },\n\n async start(input, helper) {\n return helper.start(input, {\n accessType: 'offline',\n prompt: 'consent',\n });\n },\n\n async authenticate(input, helper) {\n return helper.authenticate(input);\n },\n\n async refresh(input, helper) {\n return helper.refresh(input);\n },\n});\n","/*\n * Copyright 2023 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport {\n createSignInResolverFactory,\n OAuthAuthenticatorResult,\n PassportProfile,\n SignInInfo,\n} from '@backstage/plugin-auth-node';\n\n/**\n * Available sign-in resolvers for the Atlassian auth provider.\n *\n * @public\n */\nexport namespace atlassianSignInResolvers {\n /**\n * Looks up the user by matching their Atlassian username to the entity name.\n */\n export const usernameMatchingUserEntityName = createSignInResolverFactory({\n create() {\n return async (\n info: SignInInfo<OAuthAuthenticatorResult<PassportProfile>>,\n ctx,\n ) => {\n const { result } = info;\n\n const id = result.fullProfile.username;\n if (!id) {\n throw new Error(`Atlassian user profile does not contain a username`);\n }\n\n return ctx.signInWithCatalogUser({ entityRef: { name: id } });\n };\n },\n });\n}\n","/*\n * Copyright 2023 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { createBackendModule } from '@backstage/backend-plugin-api';\nimport {\n authProvidersExtensionPoint,\n commonSignInResolvers,\n createOAuthProviderFactory,\n} from '@backstage/plugin-auth-node';\nimport { atlassianAuthenticator } from './authenticator';\nimport { atlassianSignInResolvers } from './resolvers';\n\n/** @public */\nexport const authModuleAtlassianProvider = createBackendModule({\n pluginId: 'auth',\n moduleId: 'atlassian-provider',\n register(reg) {\n reg.registerInit({\n deps: {\n providers: authProvidersExtensionPoint,\n },\n async init({ providers }) {\n providers.registerProvider({\n providerId: 'atlassian',\n factory: createOAuthProviderFactory({\n authenticator: atlassianAuthenticator,\n signInResolverFactories: {\n ...atlassianSignInResolvers,\n ...commonSignInResolvers,\n },\n }),\n });\n },\n });\n },\n});\n"],"names":["createOAuthAuthenticator","PassportOAuthAuthenticatorHelper","AtlassianStrategy","atlassianSignInResolvers","createSignInResolverFactory","createBackendModule","authProvidersExtensionPoint","createOAuthProviderFactory","commonSignInResolvers"],"mappings":";;;;;;;;AAyBO,MAAM,yBAAyBA,uCAAyB,CAAA;AAAA,EAC7D,yBACEC,+CAAiC,CAAA,uBAAA;AAAA,EACnC,UAAW,CAAA,EAAE,WAAa,EAAA,MAAA,EAAU,EAAA;AAClC,IAAM,MAAA,QAAA,GAAW,MAAO,CAAA,SAAA,CAAU,UAAU,CAAA,CAAA;AAC5C,IAAM,MAAA,YAAA,GAAe,MAAO,CAAA,SAAA,CAAU,cAAc,CAAA,CAAA;AACpD,IAAM,MAAA,KAAA,GACJ,OAAO,iBAAkB,CAAA,OAAO,KAChC,MAAO,CAAA,iBAAA,CAAkB,QAAQ,CACjC,IAAA,8CAAA,CAAA;AACF,IAAA,MAAM,OAAU,GAAA,4BAAA,CAAA;AAEhB,IAAA,OAAOA,+CAAiC,CAAA,IAAA;AAAA,MACtC,IAAIC,gCAAA;AAAA,QACF;AAAA,UACE,QAAU,EAAA,QAAA;AAAA,UACV,YAAA;AAAA,UACA,WAAa,EAAA,WAAA;AAAA,UACb,OAAS,EAAA,OAAA;AAAA,UACT,gBAAA,EAAkB,GAAG,OAAO,CAAA,UAAA,CAAA;AAAA,UAC5B,QAAA,EAAU,GAAG,OAAO,CAAA,YAAA,CAAA;AAAA,UACpB,UAAA,EAAY,GAAG,OAAO,CAAA,YAAA,CAAA;AAAA,UACtB,KAAA;AAAA,SACF;AAAA,QACA,CACE,WAAA,EACA,YACA,EAAA,MAAA,EACA,aACA,IACG,KAAA;AACH,UAAA,IAAA;AAAA,YACE,KAAA,CAAA;AAAA,YACA,EAAE,WAAa,EAAA,MAAA,EAAQ,WAAY,EAAA;AAAA,YACnC,EAAE,YAAa,EAAA;AAAA,WACjB,CAAA;AAAA,SACF;AAAA,OACF;AAAA,KACF,CAAA;AAAA,GACF;AAAA,EAEA,MAAM,KAAM,CAAA,KAAA,EAAO,MAAQ,EAAA;AACzB,IAAO,OAAA,MAAA,CAAO,MAAM,KAAO,EAAA;AAAA,MACzB,UAAY,EAAA,SAAA;AAAA,MACZ,MAAQ,EAAA,SAAA;AAAA,KACT,CAAA,CAAA;AAAA,GACH;AAAA,EAEA,MAAM,YAAa,CAAA,KAAA,EAAO,MAAQ,EAAA;AAChC,IAAO,OAAA,MAAA,CAAO,aAAa,KAAK,CAAA,CAAA;AAAA,GAClC;AAAA,EAEA,MAAM,OAAQ,CAAA,KAAA,EAAO,MAAQ,EAAA;AAC3B,IAAO,OAAA,MAAA,CAAO,QAAQ,KAAK,CAAA,CAAA;AAAA,GAC7B;AACF,CAAC;;ACpDgBC,0CAAA;AAAA,CAAV,CAAUA,yBAAV,KAAA;AAIE,EAAMA,yBAAAA,CAAA,iCAAiCC,0CAA4B,CAAA;AAAA,IACxE,MAAS,GAAA;AACP,MAAO,OAAA,OACL,MACA,GACG,KAAA;AACH,QAAM,MAAA,EAAE,QAAW,GAAA,IAAA,CAAA;AAEnB,QAAM,MAAA,EAAA,GAAK,OAAO,WAAY,CAAA,QAAA,CAAA;AAC9B,QAAA,IAAI,CAAC,EAAI,EAAA;AACP,UAAM,MAAA,IAAI,MAAM,CAAoD,kDAAA,CAAA,CAAA,CAAA;AAAA,SACtE;AAEA,QAAO,OAAA,GAAA,CAAI,sBAAsB,EAAE,SAAA,EAAW,EAAE,IAAM,EAAA,EAAA,IAAM,CAAA,CAAA;AAAA,OAC9D,CAAA;AAAA,KACF;AAAA,GACD,CAAA,CAAA;AAAA,CApBc,EAAAD,gCAAA,KAAAA,gCAAA,GAAA,EAAA,CAAA,CAAA;;ACHV,MAAM,8BAA8BE,oCAAoB,CAAA;AAAA,EAC7D,QAAU,EAAA,MAAA;AAAA,EACV,QAAU,EAAA,oBAAA;AAAA,EACV,SAAS,GAAK,EAAA;AACZ,IAAA,GAAA,CAAI,YAAa,CAAA;AAAA,MACf,IAAM,EAAA;AAAA,QACJ,SAAW,EAAAC,0CAAA;AAAA,OACb;AAAA,MACA,MAAM,IAAA,CAAK,EAAE,SAAA,EAAa,EAAA;AACxB,QAAA,SAAA,CAAU,gBAAiB,CAAA;AAAA,UACzB,UAAY,EAAA,WAAA;AAAA,UACZ,SAASC,yCAA2B,CAAA;AAAA,YAClC,aAAe,EAAA,sBAAA;AAAA,YACf,uBAAyB,EAAA;AAAA,cACvB,GAAGJ,gCAAA;AAAA,cACH,GAAGK,oCAAA;AAAA,aACL;AAAA,WACD,CAAA;AAAA,SACF,CAAA,CAAA;AAAA,OACH;AAAA,KACD,CAAA,CAAA;AAAA,GACH;AACF,CAAC;;;;;"}
1
+ {"version":3,"file":"index.cjs.js","sources":["../src/authenticator.ts","../src/resolvers.ts","../src/module.ts"],"sourcesContent":["/*\n * Copyright 2023 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport {\n createOAuthAuthenticator,\n PassportOAuthAuthenticatorHelper,\n PassportOAuthDoneCallback,\n PassportProfile,\n} from '@backstage/plugin-auth-node';\nimport { Strategy as AtlassianStrategy } from 'passport-atlassian-oauth2';\n\n/** @public */\nexport const atlassianAuthenticator = createOAuthAuthenticator({\n defaultProfileTransform:\n PassportOAuthAuthenticatorHelper.defaultProfileTransform,\n scopes: {\n required: ['offline_access', 'read:jira-work', 'read:jira-user'],\n },\n initialize({ callbackUrl, config }) {\n const clientId = config.getString('clientId');\n const clientSecret = config.getString('clientSecret');\n const baseUrl = 'https://auth.atlassian.com';\n\n if (config.has('scope') || config.has('scopes')) {\n throw new Error(\n 'The atlassian provider no longer supports the \"scope\" or \"scopes\" configuration options. Please use the \"additionalScopes\" option instead.',\n );\n }\n\n return PassportOAuthAuthenticatorHelper.from(\n new AtlassianStrategy(\n {\n clientID: clientId,\n clientSecret: clientSecret,\n callbackURL: callbackUrl,\n baseURL: baseUrl,\n authorizationURL: `${baseUrl}/authorize`,\n tokenURL: `${baseUrl}/oauth/token`,\n profileURL: `${baseUrl}/api/v4/user`,\n },\n (\n accessToken: string,\n refreshToken: string,\n params: any,\n fullProfile: PassportProfile,\n done: PassportOAuthDoneCallback,\n ) => {\n done(\n undefined,\n { fullProfile, params, accessToken },\n { refreshToken },\n );\n },\n ),\n );\n },\n\n async start(input, helper) {\n return helper.start(input, {\n accessType: 'offline',\n prompt: 'consent',\n });\n },\n\n async authenticate(input, helper) {\n return helper.authenticate(input);\n },\n\n async refresh(input, helper) {\n return helper.refresh(input);\n },\n});\n","/*\n * Copyright 2023 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport {\n createSignInResolverFactory,\n OAuthAuthenticatorResult,\n PassportProfile,\n SignInInfo,\n} from '@backstage/plugin-auth-node';\n\n/**\n * Available sign-in resolvers for the Atlassian auth provider.\n *\n * @public\n */\nexport namespace atlassianSignInResolvers {\n /**\n * Looks up the user by matching their Atlassian username to the entity name.\n */\n export const usernameMatchingUserEntityName = createSignInResolverFactory({\n create() {\n return async (\n info: SignInInfo<OAuthAuthenticatorResult<PassportProfile>>,\n ctx,\n ) => {\n const { result } = info;\n\n const id = result.fullProfile.username;\n if (!id) {\n throw new Error(`Atlassian user profile does not contain a username`);\n }\n\n return ctx.signInWithCatalogUser({ entityRef: { name: id } });\n };\n },\n });\n}\n","/*\n * Copyright 2023 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { createBackendModule } from '@backstage/backend-plugin-api';\nimport {\n authProvidersExtensionPoint,\n commonSignInResolvers,\n createOAuthProviderFactory,\n} from '@backstage/plugin-auth-node';\nimport { atlassianAuthenticator } from './authenticator';\nimport { atlassianSignInResolvers } from './resolvers';\n\n/** @public */\nexport const authModuleAtlassianProvider = createBackendModule({\n pluginId: 'auth',\n moduleId: 'atlassian-provider',\n register(reg) {\n reg.registerInit({\n deps: {\n providers: authProvidersExtensionPoint,\n },\n async init({ providers }) {\n providers.registerProvider({\n providerId: 'atlassian',\n factory: createOAuthProviderFactory({\n authenticator: atlassianAuthenticator,\n signInResolverFactories: {\n ...atlassianSignInResolvers,\n ...commonSignInResolvers,\n },\n }),\n });\n },\n });\n },\n});\n"],"names":["createOAuthAuthenticator","PassportOAuthAuthenticatorHelper","AtlassianStrategy","atlassianSignInResolvers","createSignInResolverFactory","createBackendModule","authProvidersExtensionPoint","createOAuthProviderFactory","commonSignInResolvers"],"mappings":";;;;;;;;AAyBO,MAAM,yBAAyBA,uCAAyB,CAAA;AAAA,EAC7D,yBACEC,+CAAiC,CAAA,uBAAA;AAAA,EACnC,MAAQ,EAAA;AAAA,IACN,QAAU,EAAA,CAAC,gBAAkB,EAAA,gBAAA,EAAkB,gBAAgB,CAAA;AAAA,GACjE;AAAA,EACA,UAAW,CAAA,EAAE,WAAa,EAAA,MAAA,EAAU,EAAA;AAClC,IAAM,MAAA,QAAA,GAAW,MAAO,CAAA,SAAA,CAAU,UAAU,CAAA,CAAA;AAC5C,IAAM,MAAA,YAAA,GAAe,MAAO,CAAA,SAAA,CAAU,cAAc,CAAA,CAAA;AACpD,IAAA,MAAM,OAAU,GAAA,4BAAA,CAAA;AAEhB,IAAA,IAAI,OAAO,GAAI,CAAA,OAAO,KAAK,MAAO,CAAA,GAAA,CAAI,QAAQ,CAAG,EAAA;AAC/C,MAAA,MAAM,IAAI,KAAA;AAAA,QACR,4IAAA;AAAA,OACF,CAAA;AAAA,KACF;AAEA,IAAA,OAAOA,+CAAiC,CAAA,IAAA;AAAA,MACtC,IAAIC,gCAAA;AAAA,QACF;AAAA,UACE,QAAU,EAAA,QAAA;AAAA,UACV,YAAA;AAAA,UACA,WAAa,EAAA,WAAA;AAAA,UACb,OAAS,EAAA,OAAA;AAAA,UACT,gBAAA,EAAkB,GAAG,OAAO,CAAA,UAAA,CAAA;AAAA,UAC5B,QAAA,EAAU,GAAG,OAAO,CAAA,YAAA,CAAA;AAAA,UACpB,UAAA,EAAY,GAAG,OAAO,CAAA,YAAA,CAAA;AAAA,SACxB;AAAA,QACA,CACE,WAAA,EACA,YACA,EAAA,MAAA,EACA,aACA,IACG,KAAA;AACH,UAAA,IAAA;AAAA,YACE,KAAA,CAAA;AAAA,YACA,EAAE,WAAa,EAAA,MAAA,EAAQ,WAAY,EAAA;AAAA,YACnC,EAAE,YAAa,EAAA;AAAA,WACjB,CAAA;AAAA,SACF;AAAA,OACF;AAAA,KACF,CAAA;AAAA,GACF;AAAA,EAEA,MAAM,KAAM,CAAA,KAAA,EAAO,MAAQ,EAAA;AACzB,IAAO,OAAA,MAAA,CAAO,MAAM,KAAO,EAAA;AAAA,MACzB,UAAY,EAAA,SAAA;AAAA,MACZ,MAAQ,EAAA,SAAA;AAAA,KACT,CAAA,CAAA;AAAA,GACH;AAAA,EAEA,MAAM,YAAa,CAAA,KAAA,EAAO,MAAQ,EAAA;AAChC,IAAO,OAAA,MAAA,CAAO,aAAa,KAAK,CAAA,CAAA;AAAA,GAClC;AAAA,EAEA,MAAM,OAAQ,CAAA,KAAA,EAAO,MAAQ,EAAA;AAC3B,IAAO,OAAA,MAAA,CAAO,QAAQ,KAAK,CAAA,CAAA;AAAA,GAC7B;AACF,CAAC;;ACxDgBC,0CAAA;AAAA,CAAV,CAAUA,yBAAV,KAAA;AAIE,EAAMA,yBAAAA,CAAA,iCAAiCC,0CAA4B,CAAA;AAAA,IACxE,MAAS,GAAA;AACP,MAAO,OAAA,OACL,MACA,GACG,KAAA;AACH,QAAM,MAAA,EAAE,QAAW,GAAA,IAAA,CAAA;AAEnB,QAAM,MAAA,EAAA,GAAK,OAAO,WAAY,CAAA,QAAA,CAAA;AAC9B,QAAA,IAAI,CAAC,EAAI,EAAA;AACP,UAAM,MAAA,IAAI,MAAM,CAAoD,kDAAA,CAAA,CAAA,CAAA;AAAA,SACtE;AAEA,QAAO,OAAA,GAAA,CAAI,sBAAsB,EAAE,SAAA,EAAW,EAAE,IAAM,EAAA,EAAA,IAAM,CAAA,CAAA;AAAA,OAC9D,CAAA;AAAA,KACF;AAAA,GACD,CAAA,CAAA;AAAA,CApBc,EAAAD,gCAAA,KAAAA,gCAAA,GAAA,EAAA,CAAA,CAAA;;ACHV,MAAM,8BAA8BE,oCAAoB,CAAA;AAAA,EAC7D,QAAU,EAAA,MAAA;AAAA,EACV,QAAU,EAAA,oBAAA;AAAA,EACV,SAAS,GAAK,EAAA;AACZ,IAAA,GAAA,CAAI,YAAa,CAAA;AAAA,MACf,IAAM,EAAA;AAAA,QACJ,SAAW,EAAAC,0CAAA;AAAA,OACb;AAAA,MACA,MAAM,IAAA,CAAK,EAAE,SAAA,EAAa,EAAA;AACxB,QAAA,SAAA,CAAU,gBAAiB,CAAA;AAAA,UACzB,UAAY,EAAA,WAAA;AAAA,UACZ,SAASC,yCAA2B,CAAA;AAAA,YAClC,aAAe,EAAA,sBAAA;AAAA,YACf,uBAAyB,EAAA;AAAA,cACvB,GAAGJ,gCAAA;AAAA,cACH,GAAGK,oCAAA;AAAA,aACL;AAAA,WACD,CAAA;AAAA,SACF,CAAA,CAAA;AAAA,OACH;AAAA,KACD,CAAA,CAAA;AAAA,GACH;AACF,CAAC;;;;;"}
package/package.json CHANGED
@@ -1,10 +1,12 @@
1
1
  {
2
2
  "name": "@backstage/plugin-auth-backend-module-atlassian-provider",
3
+ "version": "0.2.0-next.2",
3
4
  "description": "The atlassian-provider backend module for the auth plugin.",
4
- "version": "0.1.11-next.0",
5
- "main": "dist/index.cjs.js",
6
- "types": "dist/index.d.ts",
7
- "license": "Apache-2.0",
5
+ "backstage": {
6
+ "role": "backend-plugin-module",
7
+ "pluginId": "auth",
8
+ "pluginPackage": "@backstage/plugin-auth-backend"
9
+ },
8
10
  "publishConfig": {
9
11
  "access": "public",
10
12
  "main": "dist/index.cjs.js",
@@ -15,35 +17,35 @@
15
17
  "url": "https://github.com/backstage/backstage",
16
18
  "directory": "plugins/auth-backend-module-atlassian-provider"
17
19
  },
18
- "backstage": {
19
- "role": "backend-plugin-module"
20
- },
20
+ "license": "Apache-2.0",
21
+ "main": "dist/index.cjs.js",
22
+ "types": "dist/index.d.ts",
23
+ "files": [
24
+ "dist",
25
+ "config.d.ts"
26
+ ],
21
27
  "scripts": {
22
- "start": "backstage-cli package start",
23
28
  "build": "backstage-cli package build",
24
- "lint": "backstage-cli package lint",
25
- "test": "backstage-cli package test",
26
29
  "clean": "backstage-cli package clean",
30
+ "lint": "backstage-cli package lint",
27
31
  "prepack": "backstage-cli package prepack",
28
- "postpack": "backstage-cli package postpack"
32
+ "postpack": "backstage-cli package postpack",
33
+ "start": "backstage-cli package start",
34
+ "test": "backstage-cli package test"
29
35
  },
30
36
  "dependencies": {
31
- "@backstage/backend-plugin-api": "^0.6.19-next.0",
32
- "@backstage/plugin-auth-node": "^0.4.14-next.0",
37
+ "@backstage/backend-plugin-api": "^0.6.19-next.3",
38
+ "@backstage/plugin-auth-node": "^0.4.14-next.3",
33
39
  "express": "^4.18.2",
34
40
  "passport": "^0.7.0",
35
41
  "passport-atlassian-oauth2": "^2.1.0"
36
42
  },
37
43
  "devDependencies": {
38
- "@backstage/backend-defaults": "^0.2.19-next.0",
39
- "@backstage/backend-test-utils": "^0.3.9-next.0",
40
- "@backstage/cli": "^0.26.6-next.0",
41
- "@backstage/plugin-auth-backend": "^0.22.6-next.0",
44
+ "@backstage/backend-defaults": "^0.3.0-next.3",
45
+ "@backstage/backend-test-utils": "^0.4.0-next.3",
46
+ "@backstage/cli": "^0.26.7-next.3",
47
+ "@backstage/plugin-auth-backend": "^0.22.6-next.3",
42
48
  "supertest": "^6.3.3"
43
49
  },
44
- "configSchema": "config.d.ts",
45
- "files": [
46
- "dist",
47
- "config.d.ts"
48
- ]
50
+ "configSchema": "config.d.ts"
49
51
  }