@credal/actions 0.2.4 → 0.2.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/actions/actionMapper.d.ts +1 -1
- package/dist/actions/actionMapper.js +162 -94
- package/dist/actions/autogen/templates.d.ts +12 -1
- package/dist/actions/autogen/templates.js +888 -0
- package/dist/actions/autogen/types.d.ts +997 -0
- package/dist/actions/autogen/types.js +290 -0
- package/dist/actions/groups.d.ts +1 -1
- package/dist/actions/groups.js +17 -1
- package/dist/actions/invoke.js +1 -1
- package/dist/actions/parse.js +1 -1
- package/dist/actions/providers/asana/createAsanaTask.js +1 -1
- package/dist/actions/providers/asana/updateAsanaTask.js +1 -1
- package/dist/actions/providers/bing/getTopNSearchResultUrls.d.ts +1 -1
- package/dist/actions/providers/bing/getTopNSearchResultUrls.js +2 -2
- package/dist/actions/providers/confluence/fetchPageContent.d.ts +1 -1
- package/dist/actions/providers/confluence/fetchPageContent.js +3 -3
- package/dist/actions/providers/confluence/overwritePage.d.ts +1 -1
- package/dist/actions/providers/confluence/overwritePage.js +3 -3
- package/dist/actions/providers/finnhub/getBasicFinancials.d.ts +1 -1
- package/dist/actions/providers/finnhub/getBasicFinancials.js +2 -2
- package/dist/actions/providers/finnhub/symbolLookup.d.ts +1 -1
- package/dist/actions/providers/finnhub/symbolLookup.js +2 -2
- package/dist/actions/providers/firecrawl/deepResearch.d.ts +1 -1
- package/dist/actions/providers/firecrawl/deepResearch.js +1 -1
- package/dist/actions/providers/firecrawl/scrapeTweetDataWithNitter.d.ts +1 -1
- package/dist/actions/providers/firecrawl/scrapeTweetDataWithNitter.js +1 -1
- package/dist/actions/providers/firecrawl/scrapeUrl.d.ts +1 -1
- package/dist/actions/providers/firecrawl/scrapeUrl.js +1 -1
- package/dist/actions/providers/github/createBranch.d.ts +1 -1
- package/dist/actions/providers/github/createBranch.js +1 -1
- package/dist/actions/providers/github/createOrUpdateFile.d.ts +1 -1
- package/dist/actions/providers/github/createOrUpdateFile.js +1 -1
- package/dist/actions/providers/github/createPullRequest.d.ts +1 -1
- package/dist/actions/providers/github/createPullRequest.js +1 -1
- package/dist/actions/providers/github/listPullRequests.d.ts +1 -1
- package/dist/actions/providers/github/listPullRequests.js +2 -2
- package/dist/actions/providers/gong/getGongTranscripts.d.ts +1 -1
- package/dist/actions/providers/gong/getGongTranscripts.js +1 -1
- package/dist/actions/providers/googlemail/listGmailThreads.js +1 -1
- package/dist/actions/providers/googlemail/searchGmailMessages.js +1 -1
- package/dist/actions/providers/jira/assignJiraTicket.js +1 -1
- package/dist/actions/providers/jira/createJiraTicket.js +1 -1
- package/dist/actions/providers/math/add.d.ts +1 -1
- package/dist/actions/providers/microsoft/createDocument.js +1 -1
- package/dist/actions/providers/microsoft/getDocument.js +1 -1
- package/dist/actions/providers/microsoft/messageTeamsChannel.js +1 -1
- package/dist/actions/providers/microsoft/messageTeamsChat.js +1 -1
- package/dist/actions/providers/microsoft/updateDocument.js +1 -1
- package/dist/actions/providers/microsoft/updateSpreadsheet.js +1 -1
- package/dist/actions/providers/okta/addUserToGroup.d.ts +3 -0
- package/dist/actions/providers/okta/addUserToGroup.js +56 -0
- package/dist/actions/providers/okta/getOktaGroup.d.ts +3 -0
- package/dist/actions/providers/okta/getOktaGroup.js +73 -0
- package/dist/actions/providers/okta/getOktaUser.d.ts +3 -0
- package/dist/actions/providers/okta/getOktaUser.js +40 -0
- package/dist/actions/providers/okta/listMFA.d.ts +3 -0
- package/dist/actions/providers/okta/listMFA.js +52 -0
- package/dist/actions/providers/okta/listOktaGroupMembers.d.ts +3 -0
- package/dist/actions/providers/okta/listOktaGroupMembers.js +99 -0
- package/dist/actions/providers/okta/listOktaGroups.d.ts +3 -0
- package/dist/actions/providers/okta/listOktaGroups.js +92 -0
- package/dist/actions/providers/okta/listOktaUserGroups.d.ts +3 -0
- package/dist/actions/providers/okta/listOktaUserGroups.js +83 -0
- package/dist/actions/providers/okta/listOktaUsers.d.ts +3 -0
- package/dist/actions/providers/okta/listOktaUsers.js +100 -0
- package/dist/actions/providers/okta/removeUserFromGroup.d.ts +3 -0
- package/dist/actions/providers/okta/removeUserFromGroup.js +56 -0
- package/dist/actions/providers/okta/resetMFA.d.ts +3 -0
- package/dist/actions/providers/okta/resetMFA.js +62 -0
- package/dist/actions/providers/okta/resetPassword.d.ts +3 -0
- package/dist/actions/providers/okta/resetPassword.js +57 -0
- package/dist/actions/providers/slack/getChannelMessages.js +1 -1
- package/dist/actions/providers/slack/sendMessage.js +1 -1
- package/dist/actions/providers/snowflake/getRowByFieldValue.js +1 -1
- package/dist/actions/providers/snowflake/runSnowflakeQuery.js +1 -1
- package/dist/app.d.ts +2 -2
- package/dist/app.js +2 -2
- package/dist/index.d.ts +4 -4
- package/dist/index.js +3 -3
- package/package.json +1 -1
@@ -0,0 +1,100 @@
|
|
1
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
2
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
3
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
4
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
5
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
6
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
7
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
8
|
+
});
|
9
|
+
};
|
10
|
+
import { AxiosError } from "axios";
|
11
|
+
import { axiosClient } from "../../util/axiosClient";
|
12
|
+
// page limit default in Okta documentation
|
13
|
+
// https://developer.okta.com/docs/api/openapi/okta-management/management/tag/User/#tag/User/operation/listUsers
|
14
|
+
const DEFAULT_LIMIT = 200;
|
15
|
+
const listOktaUsers = (_a) => __awaiter(void 0, [_a], void 0, function* ({ authParams, params, }) {
|
16
|
+
var _b, _c, _d, _e;
|
17
|
+
const { authToken, baseUrl } = authParams;
|
18
|
+
if (!authToken || !baseUrl) {
|
19
|
+
return {
|
20
|
+
success: false,
|
21
|
+
error: "Missing Okta OAuth token (authToken) or base URL (baseUrl) in authParams.",
|
22
|
+
};
|
23
|
+
}
|
24
|
+
try {
|
25
|
+
const requestConfig = {
|
26
|
+
headers: {
|
27
|
+
Authorization: `Bearer ${authToken}`,
|
28
|
+
Accept: "application/json",
|
29
|
+
"Content-Type": "application/json",
|
30
|
+
},
|
31
|
+
};
|
32
|
+
const endpointUrl = new URL("/api/v1/users", baseUrl);
|
33
|
+
if (params.searchQuery) {
|
34
|
+
endpointUrl.searchParams.set("search", params.searchQuery);
|
35
|
+
}
|
36
|
+
if (params.maxResults) {
|
37
|
+
endpointUrl.searchParams.set("limit", Math.min(DEFAULT_LIMIT, params.maxResults).toString());
|
38
|
+
}
|
39
|
+
else {
|
40
|
+
endpointUrl.searchParams.set("limit", DEFAULT_LIMIT.toString());
|
41
|
+
}
|
42
|
+
let nextUrl = endpointUrl.toString();
|
43
|
+
let users = [];
|
44
|
+
let totalFetched = 0;
|
45
|
+
while (nextUrl) {
|
46
|
+
const remainingResults = params.maxResults ? params.maxResults - totalFetched : DEFAULT_LIMIT;
|
47
|
+
const adjustedUrl = new URL(nextUrl);
|
48
|
+
if (params.maxResults && remainingResults < DEFAULT_LIMIT) {
|
49
|
+
adjustedUrl.searchParams.set("limit", Math.min(DEFAULT_LIMIT, remainingResults).toString());
|
50
|
+
}
|
51
|
+
const response = yield axiosClient.get(adjustedUrl.toString(), requestConfig);
|
52
|
+
if (response.status === 200 && Array.isArray(response.data)) {
|
53
|
+
users = users.concat(response.data.map(user => ({
|
54
|
+
id: user.id,
|
55
|
+
status: user.status,
|
56
|
+
created: user.created,
|
57
|
+
activated: user.activated,
|
58
|
+
statusChanged: user.statusChanged,
|
59
|
+
lastLogin: user.lastLogin,
|
60
|
+
lastUpdated: user.lastUpdated,
|
61
|
+
passwordChanged: user.passwordChanged,
|
62
|
+
type: user.type,
|
63
|
+
profile: user.profile,
|
64
|
+
realmId: user.realmId,
|
65
|
+
})));
|
66
|
+
totalFetched += response.data.length;
|
67
|
+
if (params.maxResults && totalFetched >= params.maxResults) {
|
68
|
+
users = users.slice(0, params.maxResults);
|
69
|
+
break;
|
70
|
+
}
|
71
|
+
nextUrl = ((_c = (_b = response.headers.link) === null || _b === void 0 ? void 0 : _b.match(/<([^>]+)>;\s*rel="next"/)) === null || _c === void 0 ? void 0 : _c[1]) || null;
|
72
|
+
if (nextUrl) {
|
73
|
+
console.debug("Next page URL:", nextUrl);
|
74
|
+
}
|
75
|
+
}
|
76
|
+
else {
|
77
|
+
const errorDetail = ((_d = response.data) === null || _d === void 0 ? void 0 : _d.errorSummary) || ((_e = response.data) === null || _e === void 0 ? void 0 : _e.message) || `Okta API responded with status ${response.status}`;
|
78
|
+
return { success: false, error: `Failed to list Okta users: ${errorDetail}` };
|
79
|
+
}
|
80
|
+
}
|
81
|
+
return { success: true, users };
|
82
|
+
}
|
83
|
+
catch (error) {
|
84
|
+
console.error("Error listing Okta users:", error);
|
85
|
+
let errorMessage = "Unknown error while listing Okta users";
|
86
|
+
if (error instanceof AxiosError && error.response) {
|
87
|
+
const oktaError = error.response.data;
|
88
|
+
errorMessage =
|
89
|
+
(oktaError === null || oktaError === void 0 ? void 0 : oktaError.errorSummary) || (oktaError === null || oktaError === void 0 ? void 0 : oktaError.message) || `Okta API request failed with status ${error.response.status}`;
|
90
|
+
}
|
91
|
+
else if (error instanceof Error) {
|
92
|
+
errorMessage = error.message;
|
93
|
+
}
|
94
|
+
return {
|
95
|
+
success: false,
|
96
|
+
error: errorMessage,
|
97
|
+
};
|
98
|
+
}
|
99
|
+
});
|
100
|
+
export default listOktaUsers;
|
@@ -0,0 +1,56 @@
|
|
1
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
2
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
3
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
4
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
5
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
6
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
7
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
8
|
+
});
|
9
|
+
};
|
10
|
+
import { AxiosError } from "axios";
|
11
|
+
import { axiosClient } from "../../util/axiosClient";
|
12
|
+
const removeUserFromGroup = (_a) => __awaiter(void 0, [_a], void 0, function* ({ authParams, params, }) {
|
13
|
+
var _b, _c;
|
14
|
+
const { authToken, baseUrl } = authParams;
|
15
|
+
if (!authToken || !baseUrl) {
|
16
|
+
return {
|
17
|
+
success: false,
|
18
|
+
error: "Missing Okta OAuth token (authToken) or base URL (baseUrl) in authParams.",
|
19
|
+
};
|
20
|
+
}
|
21
|
+
try {
|
22
|
+
const requestConfig = {
|
23
|
+
headers: {
|
24
|
+
Authorization: `Bearer ${authToken}`,
|
25
|
+
Accept: "application/json",
|
26
|
+
"Content-Type": "application/json",
|
27
|
+
},
|
28
|
+
};
|
29
|
+
const endpointUrl = new URL(`/api/v1/groups/${params.groupId}/users/${params.userId}`, baseUrl).toString();
|
30
|
+
const response = yield axiosClient.delete(endpointUrl, requestConfig);
|
31
|
+
if (response.status === 204) {
|
32
|
+
return { success: true };
|
33
|
+
}
|
34
|
+
else {
|
35
|
+
const errorDetail = ((_b = response.data) === null || _b === void 0 ? void 0 : _b.errorSummary) || ((_c = response.data) === null || _c === void 0 ? void 0 : _c.message) || `Okta API responded with status ${response.status}`;
|
36
|
+
return { success: false, error: `Failed to remove user from group: ${errorDetail}` };
|
37
|
+
}
|
38
|
+
}
|
39
|
+
catch (error) {
|
40
|
+
console.error("Error removing user from group:", error);
|
41
|
+
let errorMessage = "Unknown error while removing user from group";
|
42
|
+
if (error instanceof AxiosError && error.response) {
|
43
|
+
const oktaError = error.response.data;
|
44
|
+
errorMessage =
|
45
|
+
(oktaError === null || oktaError === void 0 ? void 0 : oktaError.errorSummary) || (oktaError === null || oktaError === void 0 ? void 0 : oktaError.message) || `Okta API request failed with status ${error.response.status}`;
|
46
|
+
}
|
47
|
+
else if (error instanceof Error) {
|
48
|
+
errorMessage = error.message;
|
49
|
+
}
|
50
|
+
return {
|
51
|
+
success: false,
|
52
|
+
error: errorMessage,
|
53
|
+
};
|
54
|
+
}
|
55
|
+
});
|
56
|
+
export default removeUserFromGroup;
|
@@ -0,0 +1,62 @@
|
|
1
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
2
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
3
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
4
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
5
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
6
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
7
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
8
|
+
});
|
9
|
+
};
|
10
|
+
import { AxiosError } from "axios";
|
11
|
+
import { axiosClient } from "../../util/axiosClient";
|
12
|
+
const resetMFA = (_a) => __awaiter(void 0, [_a], void 0, function* ({ authParams, params, }) {
|
13
|
+
var _b, _c;
|
14
|
+
const { authToken, baseUrl } = authParams;
|
15
|
+
if (!authToken || !baseUrl) {
|
16
|
+
return {
|
17
|
+
success: false,
|
18
|
+
error: "Missing Okta OAuth token (authToken) or base URL (baseUrl) in authParams.",
|
19
|
+
};
|
20
|
+
}
|
21
|
+
try {
|
22
|
+
let endpointUrl;
|
23
|
+
let method;
|
24
|
+
if (params.factorId) {
|
25
|
+
endpointUrl = new URL(`/api/v1/users/${params.userId}/factors/${params.factorId}`, baseUrl).toString();
|
26
|
+
method = "DELETE";
|
27
|
+
}
|
28
|
+
else {
|
29
|
+
endpointUrl = new URL(`/api/v1/users/${params.userId}/lifecycle/reset_factors`, baseUrl).toString();
|
30
|
+
method = "POST";
|
31
|
+
}
|
32
|
+
const requestConfig = {
|
33
|
+
headers: {
|
34
|
+
Authorization: `Bearer ${authToken}`,
|
35
|
+
Accept: "application/json",
|
36
|
+
"Content-Type": "application/json",
|
37
|
+
},
|
38
|
+
};
|
39
|
+
const response = yield axiosClient.request(Object.assign({ url: endpointUrl, method, data: method === "POST" ? {} : undefined }, requestConfig));
|
40
|
+
if (response.status === 200 || (method === "DELETE" && response.status === 204)) {
|
41
|
+
return { success: true };
|
42
|
+
}
|
43
|
+
else {
|
44
|
+
const errorDetail = ((_b = response.data) === null || _b === void 0 ? void 0 : _b.errorSummary) || ((_c = response.data) === null || _c === void 0 ? void 0 : _c.message) || `Okta API responded with status ${response.status}`;
|
45
|
+
return { success: false, error: `Failed to reset MFA factor(s): ${errorDetail}` };
|
46
|
+
}
|
47
|
+
}
|
48
|
+
catch (error) {
|
49
|
+
console.error("Error resetting MFA:", error);
|
50
|
+
let errorMessage = "Unknown error while resetting MFA";
|
51
|
+
if (error instanceof AxiosError && error.response) {
|
52
|
+
const oktaError = error.response.data;
|
53
|
+
errorMessage =
|
54
|
+
(oktaError === null || oktaError === void 0 ? void 0 : oktaError.errorSummary) || (oktaError === null || oktaError === void 0 ? void 0 : oktaError.message) || `Okta API request failed with status ${error.response.status}`;
|
55
|
+
}
|
56
|
+
else if (error instanceof Error) {
|
57
|
+
errorMessage = error.message;
|
58
|
+
}
|
59
|
+
return { success: false, error: errorMessage };
|
60
|
+
}
|
61
|
+
});
|
62
|
+
export default resetMFA;
|
@@ -0,0 +1,57 @@
|
|
1
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
2
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
3
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
4
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
5
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
6
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
7
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
8
|
+
});
|
9
|
+
};
|
10
|
+
import { AxiosError } from "axios";
|
11
|
+
import { axiosClient } from "../../util/axiosClient";
|
12
|
+
const resetPassword = (_a) => __awaiter(void 0, [_a], void 0, function* ({ authParams, params, }) {
|
13
|
+
var _b, _c;
|
14
|
+
const { authToken, baseUrl } = authParams;
|
15
|
+
if (!authToken || !baseUrl) {
|
16
|
+
return {
|
17
|
+
success: false,
|
18
|
+
error: "Missing Okta OAuth token (authToken) or base URL (baseUrl) in authParams.",
|
19
|
+
};
|
20
|
+
}
|
21
|
+
try {
|
22
|
+
const endpointUrl = new URL(`/api/v1/users/${params.userId}/lifecycle/reset_password`, baseUrl);
|
23
|
+
endpointUrl.searchParams.append("sendEmail", params.sendEmail.toString());
|
24
|
+
if (params.revokeSessions !== undefined) {
|
25
|
+
endpointUrl.searchParams.append("revokeSessions", params.revokeSessions.toString());
|
26
|
+
}
|
27
|
+
const requestConfig = {
|
28
|
+
headers: {
|
29
|
+
Authorization: `Bearer ${authToken}`,
|
30
|
+
Accept: "application/json",
|
31
|
+
"Content-Type": "application/json",
|
32
|
+
},
|
33
|
+
};
|
34
|
+
const response = yield axiosClient.post(endpointUrl.toString(), {}, requestConfig);
|
35
|
+
if (response.status === 200) {
|
36
|
+
return { success: true, resetPasswordUrl: response.data.resetPasswordUrl };
|
37
|
+
}
|
38
|
+
else {
|
39
|
+
const errorDetail = ((_b = response.data) === null || _b === void 0 ? void 0 : _b.errorSummary) || ((_c = response.data) === null || _c === void 0 ? void 0 : _c.message) || `Okta API responded with status ${response.status}`;
|
40
|
+
return { success: false, error: `Failed to reset password: ${errorDetail}` };
|
41
|
+
}
|
42
|
+
}
|
43
|
+
catch (error) {
|
44
|
+
console.error("Error resetting password:", error);
|
45
|
+
let errorMessage = "Unknown error while resetting password";
|
46
|
+
if (error instanceof AxiosError && error.response) {
|
47
|
+
const oktaError = error.response.data;
|
48
|
+
errorMessage =
|
49
|
+
(oktaError === null || oktaError === void 0 ? void 0 : oktaError.errorSummary) || (oktaError === null || oktaError === void 0 ? void 0 : oktaError.message) || `Okta API request failed with status ${error.response.status}`;
|
50
|
+
}
|
51
|
+
else if (error instanceof Error) {
|
52
|
+
errorMessage = error.message;
|
53
|
+
}
|
54
|
+
return { success: false, error: errorMessage };
|
55
|
+
}
|
56
|
+
});
|
57
|
+
export default resetPassword;
|
@@ -8,7 +8,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
8
8
|
});
|
9
9
|
};
|
10
10
|
import { WebClient } from "@slack/web-api";
|
11
|
-
import { getSlackChannels } from "./helpers";
|
11
|
+
import { getSlackChannels } from "./helpers.js";
|
12
12
|
import { MISSING_AUTH_TOKEN } from "../../util/missingAuthConstants";
|
13
13
|
const getChannelMessages = (_a) => __awaiter(void 0, [_a], void 0, function* ({ params, authParams, }) {
|
14
14
|
if (!authParams.authToken) {
|
@@ -9,7 +9,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
9
9
|
};
|
10
10
|
import { WebClient } from "@slack/web-api";
|
11
11
|
import { slackSendMessageOutputSchema, } from "../../autogen/types";
|
12
|
-
import { getSlackChannels } from "./helpers";
|
12
|
+
import { getSlackChannels } from "./helpers.js";
|
13
13
|
import { MISSING_AUTH_TOKEN } from "../../util/missingAuthConstants";
|
14
14
|
const sendMessage = (_a) => __awaiter(void 0, [_a], void 0, function* ({ params, authParams, }) {
|
15
15
|
if (!authParams.authToken) {
|
@@ -7,7 +7,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
7
7
|
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
8
8
|
});
|
9
9
|
};
|
10
|
-
import { getSnowflakeConnection } from "./auth/getSnowflakeConnection";
|
10
|
+
import { getSnowflakeConnection } from "./auth/getSnowflakeConnection.js";
|
11
11
|
const getRowByFieldValue = (_a) => __awaiter(void 0, [_a], void 0, function* ({ params, authParams, }) {
|
12
12
|
const { databaseName, tableName, fieldName, warehouse, fieldValue, accountName } = params;
|
13
13
|
if (!accountName || !databaseName || !warehouse) {
|
@@ -8,7 +8,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
8
8
|
});
|
9
9
|
};
|
10
10
|
import snowflake from "snowflake-sdk";
|
11
|
-
import { connectToSnowflakeAndWarehouse, getSnowflakeConnection } from "./auth/getSnowflakeConnection";
|
11
|
+
import { connectToSnowflakeAndWarehouse, getSnowflakeConnection } from "./auth/getSnowflakeConnection.js";
|
12
12
|
import { formatDataForCodeInterpreter } from "../../util/formatDataForCodeInterpreter";
|
13
13
|
snowflake.configure({ logLevel: "ERROR" });
|
14
14
|
const runSnowflakeQuery = (_a) => __awaiter(void 0, [_a], void 0, function* ({ params, authParams, }) {
|
package/dist/app.d.ts
CHANGED
@@ -1,5 +1,5 @@
|
|
1
|
-
import type { ActionTemplate } from "./actions/parse";
|
2
|
-
import type { AuthParamsType } from "./actions/autogen/types";
|
1
|
+
import type { ActionTemplate } from "./actions/parse.js";
|
2
|
+
import type { AuthParamsType } from "./actions/autogen/types.js";
|
3
3
|
export declare function runAction(name: string, provider: string, authentication: AuthParamsType, parameters: Record<string, any>): Promise<any>;
|
4
4
|
/**
|
5
5
|
* HELPER FUNCTIONS
|
package/dist/app.js
CHANGED
@@ -7,8 +7,8 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
7
7
|
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
8
8
|
});
|
9
9
|
};
|
10
|
-
import * as templates from "./actions/autogen/templates";
|
11
|
-
import { invokeAction } from "./actions/invoke";
|
10
|
+
import * as templates from "./actions/autogen/templates.js";
|
11
|
+
import { invokeAction } from "./actions/invoke.js";
|
12
12
|
export function runAction(name, provider, authentication,
|
13
13
|
// eslint-disable-next-line
|
14
14
|
parameters) {
|
package/dist/index.d.ts
CHANGED
@@ -1,5 +1,5 @@
|
|
1
1
|
export { runAction, getActions } from "./app.js";
|
2
|
-
export { ActionMapper } from "./actions/actionMapper";
|
3
|
-
export { ActionTemplate } from "./actions/parse";
|
4
|
-
export * from "./actions/autogen/templates";
|
5
|
-
export * from "./actions/autogen/types";
|
2
|
+
export { ActionMapper } from "./actions/actionMapper.js";
|
3
|
+
export { ActionTemplate } from "./actions/parse.js";
|
4
|
+
export * from "./actions/autogen/templates.js";
|
5
|
+
export * from "./actions/autogen/types.js";
|
package/dist/index.js
CHANGED
@@ -1,5 +1,5 @@
|
|
1
1
|
// Do not use "@/" in this file because it won't generate declaration files properly
|
2
2
|
export { runAction, getActions } from "./app.js";
|
3
|
-
export { ActionMapper } from "./actions/actionMapper";
|
4
|
-
export * from "./actions/autogen/templates";
|
5
|
-
export * from "./actions/autogen/types";
|
3
|
+
export { ActionMapper } from "./actions/actionMapper.js";
|
4
|
+
export * from "./actions/autogen/templates.js";
|
5
|
+
export * from "./actions/autogen/types.js";
|