@forge/manifest 11.3.3-next.0 → 11.4.0-next.1-experimental-919607a
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md
CHANGED
|
@@ -1,5 +1,21 @@
|
|
|
1
1
|
# @forge/manifest
|
|
2
2
|
|
|
3
|
+
## 11.4.0-next.1-experimental-919607a
|
|
4
|
+
|
|
5
|
+
### Minor Changes
|
|
6
|
+
|
|
7
|
+
- e21f32f: Remove remote oauth scopes lint check as scopes are no longer required in manifest
|
|
8
|
+
|
|
9
|
+
### Patch Changes
|
|
10
|
+
|
|
11
|
+
- 545ecc1: Update manifest definitions
|
|
12
|
+
|
|
13
|
+
## 11.4.0-next.1
|
|
14
|
+
|
|
15
|
+
### Minor Changes
|
|
16
|
+
|
|
17
|
+
- e21f32f: Remove remote oauth scopes lint check as scopes are no longer required in manifest
|
|
18
|
+
|
|
3
19
|
## 11.3.3-next.0
|
|
4
20
|
|
|
5
21
|
### Patch Changes
|
package/out/types/constants.d.ts
CHANGED
|
@@ -1,5 +1,3 @@
|
|
|
1
1
|
export declare const MANIFEST_FILE = "manifest.yml";
|
|
2
|
-
export declare const SYSTEM_TOKEN_SCOPE = "read:app-system-token";
|
|
3
|
-
export declare const USER_TOKEN_SCOPE = "read:app-user-token";
|
|
4
2
|
export declare const REMOTE_AUTH_SCOPES: string[];
|
|
5
3
|
//# sourceMappingURL=constants.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../../src/types/constants.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,aAAa,iBAAiB,CAAC;AAE5C,eAAO,MAAM,kBAAkB,
|
|
1
|
+
{"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../../src/types/constants.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,aAAa,iBAAiB,CAAC;AAE5C,eAAO,MAAM,kBAAkB,UAAmD,CAAC"}
|
package/out/types/constants.js
CHANGED
|
@@ -1,7 +1,5 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.REMOTE_AUTH_SCOPES = exports.
|
|
3
|
+
exports.REMOTE_AUTH_SCOPES = exports.MANIFEST_FILE = void 0;
|
|
4
4
|
exports.MANIFEST_FILE = 'manifest.yml';
|
|
5
|
-
exports.
|
|
6
|
-
exports.USER_TOKEN_SCOPE = 'read:app-user-token';
|
|
7
|
-
exports.REMOTE_AUTH_SCOPES = [exports.SYSTEM_TOKEN_SCOPE, exports.USER_TOKEN_SCOPE];
|
|
5
|
+
exports.REMOTE_AUTH_SCOPES = ['read:app-system-token', 'read:app-user-token'];
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"modules-validator.d.ts","sourceRoot":"","sources":["../../src/validators/modules-validator.ts"],"names":[],"mappings":"AAAA,OAAO,
|
|
1
|
+
{"version":3,"file":"modules-validator.d.ts","sourceRoot":"","sources":["../../src/validators/modules-validator.ts"],"names":[],"mappings":"AAAA,OAAO,EAAkB,cAAc,EAAE,wBAAwB,EAAsC,MAAM,UAAU,CAAC;AASxH,OAAO,EAEL,cAAc,EAMf,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,kBAAkB,EAAE,MAAM,uBAAuB,CAAC;AAwB3D,qBAAa,gBACX,YAAW,kBAAkB,CAAC,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,EAAE,cAAc,CAAC;IAGzF,OAAO,CAAC,oBAAoB,CAAsE;IAE5F,QAAQ,CACZ,QAAQ,EAAE,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,GACnD,OAAO,CAAC,wBAAwB,CAAC,cAAc,CAAC,CAAC;IA+DpD,OAAO,CAAC,uBAAuB;IAO/B,OAAO,CAAC,iBAAiB;IAkBzB,OAAO,CAAC,4BAA4B;IAapC,OAAO,CAAC,uBAAuB;IAe/B,OAAO,CAAC,uBAAuB;IAiB/B,OAAO,CAAC,4BAA4B;IA0BpC,OAAO,CAAC,mBAAmB;IA2E3B,OAAO,CAAC,4BAA4B;IA2BpC,OAAO,CAAC,yBAAyB;CAkClC"}
|
|
@@ -22,7 +22,6 @@ const validate_custom_field_1 = require("./modules-validators/jira/validate-cust
|
|
|
22
22
|
const validate_trigger_1 = require("./modules-validators/jira/validate-trigger");
|
|
23
23
|
const validate_command_1 = require("./modules-validators/jira/validate-command");
|
|
24
24
|
const validate_action_validator_1 = require("./modules-validators/jira/validate-action-validator");
|
|
25
|
-
const scopes_1 = require("../utils/scopes");
|
|
26
25
|
const automation_1 = require("./modules-validators/automation");
|
|
27
26
|
class ModulesValidator {
|
|
28
27
|
functionHandlerRegex = /^([\p{Alpha}\d_-]+(?:\/[\p{Alpha}\d_-]+)*)\.([\p{Alpha}\d_-]+)$/u;
|
|
@@ -136,7 +135,6 @@ class ModulesValidator {
|
|
|
136
135
|
};
|
|
137
136
|
const { endpoint: _endpoint } = modules;
|
|
138
137
|
const eventModulesWithEndpoint = modules?.trigger?.filter((trigger) => trigger.endpoint != null) || [];
|
|
139
|
-
const scopeKeys = (0, scopes_1.getAllScopeKeys)(scopes);
|
|
140
138
|
eventModulesWithEndpoint.forEach((event) => {
|
|
141
139
|
const endpointModule = _endpoint?.find((remoteEndpoint) => remoteEndpoint.key === event.endpoint);
|
|
142
140
|
if (endpointModule) {
|
|
@@ -174,28 +172,6 @@ class ModulesValidator {
|
|
|
174
172
|
...(0, utils_1.findPosition)(endpoint.remote, yamlContentByLine)
|
|
175
173
|
});
|
|
176
174
|
}
|
|
177
|
-
if (endpoint.auth?.appUserToken?.enabled && !scopeKeys.includes(types_1.USER_TOKEN_SCOPE)) {
|
|
178
|
-
validationErrors.push({
|
|
179
|
-
message: text_1.errors.permissions.missingEndpointPermissionFromScope(types_1.USER_TOKEN_SCOPE, endpoint.key),
|
|
180
|
-
reference: text_1.References.MissingScopes,
|
|
181
|
-
level: 'error',
|
|
182
|
-
metadata: {
|
|
183
|
-
missingPermission: types_1.USER_TOKEN_SCOPE
|
|
184
|
-
},
|
|
185
|
-
...(0, utils_1.findPosition)('scopes', yamlContentByLine)
|
|
186
|
-
});
|
|
187
|
-
}
|
|
188
|
-
if (endpoint.auth?.appSystemToken?.enabled && !scopeKeys.includes(types_1.SYSTEM_TOKEN_SCOPE)) {
|
|
189
|
-
validationErrors.push({
|
|
190
|
-
message: text_1.errors.permissions.missingEndpointPermissionFromScope(types_1.SYSTEM_TOKEN_SCOPE, endpoint.key),
|
|
191
|
-
reference: text_1.References.MissingScopes,
|
|
192
|
-
level: 'error',
|
|
193
|
-
metadata: {
|
|
194
|
-
missingPermission: types_1.SYSTEM_TOKEN_SCOPE
|
|
195
|
-
},
|
|
196
|
-
...(0, utils_1.findPosition)('scopes', yamlContentByLine)
|
|
197
|
-
});
|
|
198
|
-
}
|
|
199
175
|
}
|
|
200
176
|
else if (isServiceType(endpoint)) {
|
|
201
177
|
(0, utils_1.findInvalidServiceReferences)(endpoint, services).forEach((service) => {
|
|
@@ -208,30 +184,6 @@ class ModulesValidator {
|
|
|
208
184
|
});
|
|
209
185
|
}
|
|
210
186
|
});
|
|
211
|
-
remotes?.forEach((remote) => {
|
|
212
|
-
if (remote.auth?.appUserToken?.enabled && !scopeKeys.includes(types_1.USER_TOKEN_SCOPE)) {
|
|
213
|
-
validationErrors.push({
|
|
214
|
-
message: text_1.errors.permissions.missingRemotePermissionFromScope(types_1.USER_TOKEN_SCOPE, remote.key),
|
|
215
|
-
reference: text_1.References.MissingScopes,
|
|
216
|
-
level: 'error',
|
|
217
|
-
metadata: {
|
|
218
|
-
missingPermission: types_1.USER_TOKEN_SCOPE
|
|
219
|
-
},
|
|
220
|
-
...(0, utils_1.findPosition)('scopes', yamlContentByLine)
|
|
221
|
-
});
|
|
222
|
-
}
|
|
223
|
-
if (remote.auth?.appSystemToken?.enabled && !scopeKeys.includes(types_1.SYSTEM_TOKEN_SCOPE)) {
|
|
224
|
-
validationErrors.push({
|
|
225
|
-
message: text_1.errors.permissions.missingRemotePermissionFromScope(types_1.SYSTEM_TOKEN_SCOPE, remote.key),
|
|
226
|
-
reference: text_1.References.MissingScopes,
|
|
227
|
-
level: 'error',
|
|
228
|
-
metadata: {
|
|
229
|
-
missingPermission: types_1.SYSTEM_TOKEN_SCOPE
|
|
230
|
-
},
|
|
231
|
-
...(0, utils_1.findPosition)('scopes', yamlContentByLine)
|
|
232
|
-
});
|
|
233
|
-
}
|
|
234
|
-
});
|
|
235
187
|
return validationErrors;
|
|
236
188
|
}
|
|
237
189
|
duplicateModuleKeyValidation(modules, connectModules, yamlContentByLine) {
|