@forge/manifest 11.3.3-next.0 → 11.4.0-next.1-experimental-919607a

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,21 @@
1
1
  # @forge/manifest
2
2
 
3
+ ## 11.4.0-next.1-experimental-919607a
4
+
5
+ ### Minor Changes
6
+
7
+ - e21f32f: Remove remote oauth scopes lint check as scopes are no longer required in manifest
8
+
9
+ ### Patch Changes
10
+
11
+ - 545ecc1: Update manifest definitions
12
+
13
+ ## 11.4.0-next.1
14
+
15
+ ### Minor Changes
16
+
17
+ - e21f32f: Remove remote oauth scopes lint check as scopes are no longer required in manifest
18
+
3
19
  ## 11.3.3-next.0
4
20
 
5
21
  ### Patch Changes
@@ -1,5 +1,3 @@
1
1
  export declare const MANIFEST_FILE = "manifest.yml";
2
- export declare const SYSTEM_TOKEN_SCOPE = "read:app-system-token";
3
- export declare const USER_TOKEN_SCOPE = "read:app-user-token";
4
2
  export declare const REMOTE_AUTH_SCOPES: string[];
5
3
  //# sourceMappingURL=constants.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../../src/types/constants.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,aAAa,iBAAiB,CAAC;AAE5C,eAAO,MAAM,kBAAkB,0BAA0B,CAAC;AAC1D,eAAO,MAAM,gBAAgB,wBAAwB,CAAC;AACtD,eAAO,MAAM,kBAAkB,UAAyC,CAAC"}
1
+ {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../../src/types/constants.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,aAAa,iBAAiB,CAAC;AAE5C,eAAO,MAAM,kBAAkB,UAAmD,CAAC"}
@@ -1,7 +1,5 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.REMOTE_AUTH_SCOPES = exports.USER_TOKEN_SCOPE = exports.SYSTEM_TOKEN_SCOPE = exports.MANIFEST_FILE = void 0;
3
+ exports.REMOTE_AUTH_SCOPES = exports.MANIFEST_FILE = void 0;
4
4
  exports.MANIFEST_FILE = 'manifest.yml';
5
- exports.SYSTEM_TOKEN_SCOPE = 'read:app-system-token';
6
- exports.USER_TOKEN_SCOPE = 'read:app-user-token';
7
- exports.REMOTE_AUTH_SCOPES = [exports.SYSTEM_TOKEN_SCOPE, exports.USER_TOKEN_SCOPE];
5
+ exports.REMOTE_AUTH_SCOPES = ['read:app-system-token', 'read:app-user-token'];
@@ -1 +1 @@
1
- {"version":3,"file":"modules-validator.d.ts","sourceRoot":"","sources":["../../src/validators/modules-validator.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,cAAc,EACd,wBAAwB,EAKzB,MAAM,UAAU,CAAC;AASlB,OAAO,EAEL,cAAc,EAMf,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,kBAAkB,EAAE,MAAM,uBAAuB,CAAC;AAyB3D,qBAAa,gBACX,YAAW,kBAAkB,CAAC,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,EAAE,cAAc,CAAC;IAGzF,OAAO,CAAC,oBAAoB,CAAsE;IAE5F,QAAQ,CACZ,QAAQ,EAAE,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,GACnD,OAAO,CAAC,wBAAwB,CAAC,cAAc,CAAC,CAAC;IA+DpD,OAAO,CAAC,uBAAuB;IAO/B,OAAO,CAAC,iBAAiB;IAkBzB,OAAO,CAAC,4BAA4B;IAapC,OAAO,CAAC,uBAAuB;IAe/B,OAAO,CAAC,uBAAuB;IAiB/B,OAAO,CAAC,4BAA4B;IA0BpC,OAAO,CAAC,mBAAmB;IA+H3B,OAAO,CAAC,4BAA4B;IA2BpC,OAAO,CAAC,yBAAyB;CAkClC"}
1
+ {"version":3,"file":"modules-validator.d.ts","sourceRoot":"","sources":["../../src/validators/modules-validator.ts"],"names":[],"mappings":"AAAA,OAAO,EAAkB,cAAc,EAAE,wBAAwB,EAAsC,MAAM,UAAU,CAAC;AASxH,OAAO,EAEL,cAAc,EAMf,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,kBAAkB,EAAE,MAAM,uBAAuB,CAAC;AAwB3D,qBAAa,gBACX,YAAW,kBAAkB,CAAC,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,EAAE,cAAc,CAAC;IAGzF,OAAO,CAAC,oBAAoB,CAAsE;IAE5F,QAAQ,CACZ,QAAQ,EAAE,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,GACnD,OAAO,CAAC,wBAAwB,CAAC,cAAc,CAAC,CAAC;IA+DpD,OAAO,CAAC,uBAAuB;IAO/B,OAAO,CAAC,iBAAiB;IAkBzB,OAAO,CAAC,4BAA4B;IAapC,OAAO,CAAC,uBAAuB;IAe/B,OAAO,CAAC,uBAAuB;IAiB/B,OAAO,CAAC,4BAA4B;IA0BpC,OAAO,CAAC,mBAAmB;IA2E3B,OAAO,CAAC,4BAA4B;IA2BpC,OAAO,CAAC,yBAAyB;CAkClC"}
@@ -22,7 +22,6 @@ const validate_custom_field_1 = require("./modules-validators/jira/validate-cust
22
22
  const validate_trigger_1 = require("./modules-validators/jira/validate-trigger");
23
23
  const validate_command_1 = require("./modules-validators/jira/validate-command");
24
24
  const validate_action_validator_1 = require("./modules-validators/jira/validate-action-validator");
25
- const scopes_1 = require("../utils/scopes");
26
25
  const automation_1 = require("./modules-validators/automation");
27
26
  class ModulesValidator {
28
27
  functionHandlerRegex = /^([\p{Alpha}\d_-]+(?:\/[\p{Alpha}\d_-]+)*)\.([\p{Alpha}\d_-]+)$/u;
@@ -136,7 +135,6 @@ class ModulesValidator {
136
135
  };
137
136
  const { endpoint: _endpoint } = modules;
138
137
  const eventModulesWithEndpoint = modules?.trigger?.filter((trigger) => trigger.endpoint != null) || [];
139
- const scopeKeys = (0, scopes_1.getAllScopeKeys)(scopes);
140
138
  eventModulesWithEndpoint.forEach((event) => {
141
139
  const endpointModule = _endpoint?.find((remoteEndpoint) => remoteEndpoint.key === event.endpoint);
142
140
  if (endpointModule) {
@@ -174,28 +172,6 @@ class ModulesValidator {
174
172
  ...(0, utils_1.findPosition)(endpoint.remote, yamlContentByLine)
175
173
  });
176
174
  }
177
- if (endpoint.auth?.appUserToken?.enabled && !scopeKeys.includes(types_1.USER_TOKEN_SCOPE)) {
178
- validationErrors.push({
179
- message: text_1.errors.permissions.missingEndpointPermissionFromScope(types_1.USER_TOKEN_SCOPE, endpoint.key),
180
- reference: text_1.References.MissingScopes,
181
- level: 'error',
182
- metadata: {
183
- missingPermission: types_1.USER_TOKEN_SCOPE
184
- },
185
- ...(0, utils_1.findPosition)('scopes', yamlContentByLine)
186
- });
187
- }
188
- if (endpoint.auth?.appSystemToken?.enabled && !scopeKeys.includes(types_1.SYSTEM_TOKEN_SCOPE)) {
189
- validationErrors.push({
190
- message: text_1.errors.permissions.missingEndpointPermissionFromScope(types_1.SYSTEM_TOKEN_SCOPE, endpoint.key),
191
- reference: text_1.References.MissingScopes,
192
- level: 'error',
193
- metadata: {
194
- missingPermission: types_1.SYSTEM_TOKEN_SCOPE
195
- },
196
- ...(0, utils_1.findPosition)('scopes', yamlContentByLine)
197
- });
198
- }
199
175
  }
200
176
  else if (isServiceType(endpoint)) {
201
177
  (0, utils_1.findInvalidServiceReferences)(endpoint, services).forEach((service) => {
@@ -208,30 +184,6 @@ class ModulesValidator {
208
184
  });
209
185
  }
210
186
  });
211
- remotes?.forEach((remote) => {
212
- if (remote.auth?.appUserToken?.enabled && !scopeKeys.includes(types_1.USER_TOKEN_SCOPE)) {
213
- validationErrors.push({
214
- message: text_1.errors.permissions.missingRemotePermissionFromScope(types_1.USER_TOKEN_SCOPE, remote.key),
215
- reference: text_1.References.MissingScopes,
216
- level: 'error',
217
- metadata: {
218
- missingPermission: types_1.USER_TOKEN_SCOPE
219
- },
220
- ...(0, utils_1.findPosition)('scopes', yamlContentByLine)
221
- });
222
- }
223
- if (remote.auth?.appSystemToken?.enabled && !scopeKeys.includes(types_1.SYSTEM_TOKEN_SCOPE)) {
224
- validationErrors.push({
225
- message: text_1.errors.permissions.missingRemotePermissionFromScope(types_1.SYSTEM_TOKEN_SCOPE, remote.key),
226
- reference: text_1.References.MissingScopes,
227
- level: 'error',
228
- metadata: {
229
- missingPermission: types_1.SYSTEM_TOKEN_SCOPE
230
- },
231
- ...(0, utils_1.findPosition)('scopes', yamlContentByLine)
232
- });
233
- }
234
- });
235
187
  return validationErrors;
236
188
  }
237
189
  duplicateModuleKeyValidation(modules, connectModules, yamlContentByLine) {
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@forge/manifest",
3
- "version": "11.3.3-next.0",
3
+ "version": "11.4.0-next.1-experimental-919607a",
4
4
  "description": "Definitions and validations of the Forge manifest",
5
5
  "main": "out/index.js",
6
6
  "scripts": {