@microsoft/teamsfx 0.4.2-alpha.eb4575da.0 → 0.5.0-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +24 -0
- package/LICENSE +21 -21
- package/NOTICE.txt +9242 -0
- package/README.md +3 -4
- package/dist/index.esm2017.js +107 -82
- package/dist/index.esm2017.js.map +1 -1
- package/dist/index.esm2017.mjs +22 -9
- package/dist/index.esm2017.mjs.map +1 -1
- package/dist/index.esm5.js +334 -392
- package/dist/index.esm5.js.map +1 -1
- package/dist/index.node.cjs.js +442 -546
- package/dist/index.node.cjs.js.map +1 -1
- package/package.json +10 -9
- package/types/teamsfx.d.ts +9 -3
package/dist/index.esm5.js
CHANGED
|
@@ -1,10 +1,11 @@
|
|
|
1
|
-
import { __extends, __awaiter, __generator } from 'tslib';
|
|
2
1
|
import jwt_decode from 'jwt-decode';
|
|
3
|
-
import
|
|
2
|
+
import { __awaiter } from 'tslib';
|
|
3
|
+
import { app, authentication } from '@microsoft/teams-js';
|
|
4
4
|
import { PublicClientApplication } from '@azure/msal-browser';
|
|
5
5
|
import { Client } from '@microsoft/microsoft-graph-client';
|
|
6
6
|
|
|
7
7
|
// Copyright (c) Microsoft Corporation.
|
|
8
|
+
// Licensed under the MIT license.
|
|
8
9
|
/**
|
|
9
10
|
* Error code to trace the error types.
|
|
10
11
|
* @beta
|
|
@@ -55,35 +56,35 @@ var ErrorCode;
|
|
|
55
56
|
* Operation failed.
|
|
56
57
|
*/
|
|
57
58
|
ErrorCode["FailedOperation"] = "FailedOperation";
|
|
59
|
+
/**
|
|
60
|
+
* Invalid response error.
|
|
61
|
+
*/
|
|
62
|
+
ErrorCode["InvalidResponse"] = "InvalidResponse";
|
|
58
63
|
})(ErrorCode || (ErrorCode = {}));
|
|
59
64
|
/**
|
|
60
65
|
* @internal
|
|
61
66
|
*/
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
ErrorMessage.OnlyMSTeamsChannelSupported = "{0} is only supported in MS Teams Channel";
|
|
78
|
-
return ErrorMessage;
|
|
79
|
-
}());
|
|
67
|
+
class ErrorMessage {
|
|
68
|
+
}
|
|
69
|
+
// InvalidConfiguration Error
|
|
70
|
+
ErrorMessage.InvalidConfiguration = "{0} in configuration is invalid: {1}.";
|
|
71
|
+
ErrorMessage.ConfigurationNotExists = "Configuration does not exist. {0}";
|
|
72
|
+
ErrorMessage.ResourceConfigurationNotExists = "{0} resource configuration does not exist.";
|
|
73
|
+
ErrorMessage.MissingResourceConfiguration = "Missing resource configuration with type: {0}, name: {1}.";
|
|
74
|
+
ErrorMessage.AuthenticationConfigurationNotExists = "Authentication configuration does not exist.";
|
|
75
|
+
// RuntimeNotSupported Error
|
|
76
|
+
ErrorMessage.BrowserRuntimeNotSupported = "{0} is not supported in browser.";
|
|
77
|
+
ErrorMessage.NodejsRuntimeNotSupported = "{0} is not supported in Node.";
|
|
78
|
+
// Internal Error
|
|
79
|
+
ErrorMessage.FailToAcquireTokenOnBehalfOfUser = "Failed to acquire access token on behalf of user: {0}";
|
|
80
|
+
// ChannelNotSupported Error
|
|
81
|
+
ErrorMessage.OnlyMSTeamsChannelSupported = "{0} is only supported in MS Teams Channel";
|
|
80
82
|
/**
|
|
81
83
|
* Error class with code and message thrown by the SDK.
|
|
82
84
|
*
|
|
83
85
|
* @beta
|
|
84
86
|
*/
|
|
85
|
-
|
|
86
|
-
__extends(ErrorWithCode, _super);
|
|
87
|
+
class ErrorWithCode extends Error {
|
|
87
88
|
/**
|
|
88
89
|
* Constructor of ErrorWithCode.
|
|
89
90
|
*
|
|
@@ -92,21 +93,17 @@ var ErrorWithCode = /** @class */ (function (_super) {
|
|
|
92
93
|
*
|
|
93
94
|
* @beta
|
|
94
95
|
*/
|
|
95
|
-
|
|
96
|
-
var _newTarget = this.constructor;
|
|
97
|
-
var _this = this;
|
|
96
|
+
constructor(message, code) {
|
|
98
97
|
if (!code) {
|
|
99
|
-
|
|
100
|
-
return
|
|
98
|
+
super(message);
|
|
99
|
+
return this;
|
|
101
100
|
}
|
|
102
|
-
|
|
103
|
-
Object.setPrototypeOf(
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
return _this;
|
|
101
|
+
super(message);
|
|
102
|
+
Object.setPrototypeOf(this, ErrorWithCode.prototype);
|
|
103
|
+
this.name = `${new.target.name}.${code}`;
|
|
104
|
+
this.code = code;
|
|
107
105
|
}
|
|
108
|
-
|
|
109
|
-
}(Error));
|
|
106
|
+
}
|
|
110
107
|
|
|
111
108
|
// Copyright (c) Microsoft Corporation.
|
|
112
109
|
// Licensed under the MIT license.
|
|
@@ -174,8 +171,8 @@ function setLogLevel(level) {
|
|
|
174
171
|
function getLogLevel() {
|
|
175
172
|
return internalLogger.level;
|
|
176
173
|
}
|
|
177
|
-
|
|
178
|
-
|
|
174
|
+
class InternalLogger {
|
|
175
|
+
constructor(name, logLevel) {
|
|
179
176
|
this.level = undefined;
|
|
180
177
|
this.defaultLogger = {
|
|
181
178
|
verbose: console.debug,
|
|
@@ -186,31 +183,31 @@ var InternalLogger = /** @class */ (function () {
|
|
|
186
183
|
this.name = name;
|
|
187
184
|
this.level = logLevel;
|
|
188
185
|
}
|
|
189
|
-
|
|
190
|
-
this.log(LogLevel.Error,
|
|
191
|
-
}
|
|
192
|
-
|
|
193
|
-
this.log(LogLevel.Warn,
|
|
194
|
-
}
|
|
195
|
-
|
|
196
|
-
this.log(LogLevel.Info,
|
|
197
|
-
}
|
|
198
|
-
|
|
199
|
-
this.log(LogLevel.Verbose,
|
|
200
|
-
}
|
|
201
|
-
|
|
186
|
+
error(message) {
|
|
187
|
+
this.log(LogLevel.Error, (x) => x.error, message);
|
|
188
|
+
}
|
|
189
|
+
warn(message) {
|
|
190
|
+
this.log(LogLevel.Warn, (x) => x.warn, message);
|
|
191
|
+
}
|
|
192
|
+
info(message) {
|
|
193
|
+
this.log(LogLevel.Info, (x) => x.info, message);
|
|
194
|
+
}
|
|
195
|
+
verbose(message) {
|
|
196
|
+
this.log(LogLevel.Verbose, (x) => x.verbose, message);
|
|
197
|
+
}
|
|
198
|
+
log(logLevel, logFunction, message) {
|
|
202
199
|
if (message.trim() === "") {
|
|
203
200
|
return;
|
|
204
201
|
}
|
|
205
|
-
|
|
206
|
-
|
|
202
|
+
const timestamp = new Date().toUTCString();
|
|
203
|
+
let logHeader;
|
|
207
204
|
if (this.name) {
|
|
208
|
-
logHeader =
|
|
205
|
+
logHeader = `[${timestamp}] : @microsoft/teamsfx - ${this.name} : ${LogLevel[logLevel]} - `;
|
|
209
206
|
}
|
|
210
207
|
else {
|
|
211
|
-
logHeader =
|
|
208
|
+
logHeader = `[${timestamp}] : @microsoft/teamsfx : ${LogLevel[logLevel]} - `;
|
|
212
209
|
}
|
|
213
|
-
|
|
210
|
+
const logMessage = `${logHeader}${message}`;
|
|
214
211
|
if (this.level !== undefined && this.level <= logLevel) {
|
|
215
212
|
if (this.customLogger) {
|
|
216
213
|
logFunction(this.customLogger)(logMessage);
|
|
@@ -222,15 +219,14 @@ var InternalLogger = /** @class */ (function () {
|
|
|
222
219
|
logFunction(this.defaultLogger)(logMessage);
|
|
223
220
|
}
|
|
224
221
|
}
|
|
225
|
-
}
|
|
226
|
-
|
|
227
|
-
}());
|
|
222
|
+
}
|
|
223
|
+
}
|
|
228
224
|
/**
|
|
229
225
|
* Logger instance used internally
|
|
230
226
|
*
|
|
231
227
|
* @internal
|
|
232
228
|
*/
|
|
233
|
-
|
|
229
|
+
const internalLogger = new InternalLogger();
|
|
234
230
|
/**
|
|
235
231
|
* Set custom logger. Use the output functions if it's set. Priority is higher than setLogFunction.
|
|
236
232
|
*
|
|
@@ -283,14 +279,14 @@ function setLogFunction(logFunction) {
|
|
|
283
279
|
*/
|
|
284
280
|
function parseJwt(token) {
|
|
285
281
|
try {
|
|
286
|
-
|
|
282
|
+
const tokenObj = jwt_decode(token);
|
|
287
283
|
if (!tokenObj || !tokenObj.exp) {
|
|
288
284
|
throw new ErrorWithCode("Decoded token is null or exp claim does not exists.", ErrorCode.InternalError);
|
|
289
285
|
}
|
|
290
286
|
return tokenObj;
|
|
291
287
|
}
|
|
292
288
|
catch (err) {
|
|
293
|
-
|
|
289
|
+
const errorMsg = "Parse jwt token failed in node env with error: " + err.message;
|
|
294
290
|
internalLogger.error(errorMsg);
|
|
295
291
|
throw new ErrorWithCode(errorMsg, ErrorCode.InternalError);
|
|
296
292
|
}
|
|
@@ -300,12 +296,12 @@ function parseJwt(token) {
|
|
|
300
296
|
*/
|
|
301
297
|
function getUserInfoFromSsoToken(ssoToken) {
|
|
302
298
|
if (!ssoToken) {
|
|
303
|
-
|
|
299
|
+
const errorMsg = "SSO token is undefined.";
|
|
304
300
|
internalLogger.error(errorMsg);
|
|
305
301
|
throw new ErrorWithCode(errorMsg, ErrorCode.InvalidParameter);
|
|
306
302
|
}
|
|
307
|
-
|
|
308
|
-
|
|
303
|
+
const tokenObject = parseJwt(ssoToken);
|
|
304
|
+
const userInfo = {
|
|
309
305
|
displayName: tokenObject.name,
|
|
310
306
|
objectId: tokenObject.oid,
|
|
311
307
|
preferredUserName: "",
|
|
@@ -323,12 +319,12 @@ function getUserInfoFromSsoToken(ssoToken) {
|
|
|
323
319
|
*/
|
|
324
320
|
function getTenantIdAndLoginHintFromSsoToken(ssoToken) {
|
|
325
321
|
if (!ssoToken) {
|
|
326
|
-
|
|
322
|
+
const errorMsg = "SSO token is undefined.";
|
|
327
323
|
internalLogger.error(errorMsg);
|
|
328
324
|
throw new ErrorWithCode(errorMsg, ErrorCode.InvalidParameter);
|
|
329
325
|
}
|
|
330
|
-
|
|
331
|
-
|
|
326
|
+
const tokenObject = parseJwt(ssoToken);
|
|
327
|
+
const userInfo = {
|
|
332
328
|
tid: tokenObject.tid,
|
|
333
329
|
loginHint: tokenObject.ver === "2.0"
|
|
334
330
|
? tokenObject.preferred_username
|
|
@@ -341,29 +337,29 @@ function getTenantIdAndLoginHintFromSsoToken(ssoToken) {
|
|
|
341
337
|
*/
|
|
342
338
|
function parseAccessTokenFromAuthCodeTokenResponse(tokenResponse) {
|
|
343
339
|
try {
|
|
344
|
-
|
|
340
|
+
const tokenResponseObject = typeof tokenResponse == "string"
|
|
345
341
|
? JSON.parse(tokenResponse)
|
|
346
342
|
: tokenResponse;
|
|
347
343
|
if (!tokenResponseObject || !tokenResponseObject.accessToken) {
|
|
348
|
-
|
|
344
|
+
const errorMsg = "Get empty access token from Auth Code token response.";
|
|
349
345
|
internalLogger.error(errorMsg);
|
|
350
346
|
throw new Error(errorMsg);
|
|
351
347
|
}
|
|
352
|
-
|
|
353
|
-
|
|
348
|
+
const token = tokenResponseObject.accessToken;
|
|
349
|
+
const tokenObject = parseJwt(token);
|
|
354
350
|
if (tokenObject.ver !== "1.0" && tokenObject.ver !== "2.0") {
|
|
355
|
-
|
|
351
|
+
const errorMsg = "SSO token is not valid with an unknown version: " + tokenObject.ver;
|
|
356
352
|
internalLogger.error(errorMsg);
|
|
357
353
|
throw new Error(errorMsg);
|
|
358
354
|
}
|
|
359
|
-
|
|
355
|
+
const accessToken = {
|
|
360
356
|
token: token,
|
|
361
357
|
expiresOnTimestamp: tokenObject.exp * 1000,
|
|
362
358
|
};
|
|
363
359
|
return accessToken;
|
|
364
360
|
}
|
|
365
361
|
catch (error) {
|
|
366
|
-
|
|
362
|
+
const errorMsg = "Parse access token failed from Auth Code token response in node env with error: " +
|
|
367
363
|
error.message;
|
|
368
364
|
internalLogger.error(errorMsg);
|
|
369
365
|
throw new ErrorWithCode(errorMsg, ErrorCode.InternalError);
|
|
@@ -383,12 +379,8 @@ function parseAccessTokenFromAuthCodeTokenResponse(tokenResponse) {
|
|
|
383
379
|
*
|
|
384
380
|
* @internal
|
|
385
381
|
*/
|
|
386
|
-
function formatString(str) {
|
|
387
|
-
|
|
388
|
-
for (var _i = 1; _i < arguments.length; _i++) {
|
|
389
|
-
replacements[_i - 1] = arguments[_i];
|
|
390
|
-
}
|
|
391
|
-
var args = replacements;
|
|
382
|
+
function formatString(str, ...replacements) {
|
|
383
|
+
const args = replacements;
|
|
392
384
|
return str.replace(/{(\d+)}/g, function (match, number) {
|
|
393
385
|
return typeof args[number] != "undefined" ? args[number] : match;
|
|
394
386
|
});
|
|
@@ -406,17 +398,17 @@ function validateScopesType(value) {
|
|
|
406
398
|
return;
|
|
407
399
|
}
|
|
408
400
|
// string array
|
|
409
|
-
if (Array.isArray(value) && value.length > 0 && value.every(
|
|
401
|
+
if (Array.isArray(value) && value.length > 0 && value.every((item) => typeof item === "string")) {
|
|
410
402
|
return;
|
|
411
403
|
}
|
|
412
|
-
|
|
404
|
+
const errorMsg = "The type of scopes is not valid, it must be string or string array";
|
|
413
405
|
internalLogger.error(errorMsg);
|
|
414
406
|
throw new ErrorWithCode(errorMsg, ErrorCode.InvalidParameter);
|
|
415
407
|
}
|
|
416
408
|
/**
|
|
417
409
|
* @internal
|
|
418
410
|
*/
|
|
419
|
-
|
|
411
|
+
const isNode = typeof process !== "undefined" &&
|
|
420
412
|
!!process.version &&
|
|
421
413
|
!!process.versions &&
|
|
422
414
|
!!process.versions.node;
|
|
@@ -426,7 +418,7 @@ var isNode = typeof process !== "undefined" &&
|
|
|
426
418
|
* Global configuration instance
|
|
427
419
|
*
|
|
428
420
|
*/
|
|
429
|
-
|
|
421
|
+
let config;
|
|
430
422
|
/**
|
|
431
423
|
* Initialize configuration from environment variables or configuration object and set the global instance
|
|
432
424
|
*
|
|
@@ -441,7 +433,7 @@ function loadConfiguration(configuration) {
|
|
|
441
433
|
// browser environment
|
|
442
434
|
if (!isNode) {
|
|
443
435
|
if (!configuration) {
|
|
444
|
-
|
|
436
|
+
const errorMsg = "You are running the code in browser. Configuration must be passed in.";
|
|
445
437
|
internalLogger.error(errorMsg);
|
|
446
438
|
throw new ErrorWithCode(errorMsg, ErrorCode.InvalidParameter);
|
|
447
439
|
}
|
|
@@ -449,9 +441,9 @@ function loadConfiguration(configuration) {
|
|
|
449
441
|
return;
|
|
450
442
|
}
|
|
451
443
|
// node environment
|
|
452
|
-
|
|
453
|
-
|
|
454
|
-
|
|
444
|
+
let newAuthentication;
|
|
445
|
+
let newResources = [];
|
|
446
|
+
const defaultResourceName = "default";
|
|
455
447
|
if (configuration === null || configuration === void 0 ? void 0 : configuration.authentication) {
|
|
456
448
|
newAuthentication = configuration.authentication;
|
|
457
449
|
}
|
|
@@ -509,15 +501,14 @@ function loadConfiguration(configuration) {
|
|
|
509
501
|
*
|
|
510
502
|
* @beta
|
|
511
503
|
*/
|
|
512
|
-
function getResourceConfiguration(resourceType, resourceName) {
|
|
504
|
+
function getResourceConfiguration(resourceType, resourceName = "default") {
|
|
513
505
|
var _a;
|
|
514
|
-
|
|
515
|
-
|
|
516
|
-
var result = (_a = config.resources) === null || _a === void 0 ? void 0 : _a.find(function (item) { return item.type === resourceType && item.name === resourceName; });
|
|
506
|
+
internalLogger.info(`Get resource configuration of ${ResourceType[resourceType]} from ${resourceName}`);
|
|
507
|
+
const result = (_a = config.resources) === null || _a === void 0 ? void 0 : _a.find((item) => item.type === resourceType && item.name === resourceName);
|
|
517
508
|
if (result) {
|
|
518
509
|
return result.properties;
|
|
519
510
|
}
|
|
520
|
-
|
|
511
|
+
const errorMsg = formatString(ErrorMessage.MissingResourceConfiguration, ResourceType[resourceType], resourceName);
|
|
521
512
|
internalLogger.error(errorMsg);
|
|
522
513
|
throw new ErrorWithCode(errorMsg, ErrorCode.InvalidConfiguration);
|
|
523
514
|
}
|
|
@@ -535,7 +526,7 @@ function getAuthenticationConfiguration() {
|
|
|
535
526
|
if (config) {
|
|
536
527
|
return config.authentication;
|
|
537
528
|
}
|
|
538
|
-
|
|
529
|
+
const errorMsg = "Please call loadConfiguration() first before calling getAuthenticationConfiguration().";
|
|
539
530
|
internalLogger.error(errorMsg);
|
|
540
531
|
throw new ErrorWithCode(formatString(ErrorMessage.ConfigurationNotExists, errorMsg), ErrorCode.InvalidConfiguration);
|
|
541
532
|
}
|
|
@@ -549,7 +540,7 @@ function getAuthenticationConfiguration() {
|
|
|
549
540
|
*
|
|
550
541
|
* @beta
|
|
551
542
|
*/
|
|
552
|
-
|
|
543
|
+
class M365TenantCredential {
|
|
553
544
|
/**
|
|
554
545
|
* Constructor of M365TenantCredential.
|
|
555
546
|
*
|
|
@@ -557,7 +548,7 @@ var M365TenantCredential = /** @class */ (function () {
|
|
|
557
548
|
* Only works in in server side.
|
|
558
549
|
* @beta
|
|
559
550
|
*/
|
|
560
|
-
|
|
551
|
+
constructor() {
|
|
561
552
|
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "M365TenantCredential"), ErrorCode.RuntimeNotSupported);
|
|
562
553
|
}
|
|
563
554
|
/**
|
|
@@ -567,15 +558,12 @@ var M365TenantCredential = /** @class */ (function () {
|
|
|
567
558
|
* Only works in in server side.
|
|
568
559
|
* @beta
|
|
569
560
|
*/
|
|
570
|
-
|
|
571
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
572
|
-
|
|
573
|
-
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "M365TenantCredential"), ErrorCode.RuntimeNotSupported);
|
|
574
|
-
});
|
|
561
|
+
getToken(scopes, options) {
|
|
562
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
563
|
+
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "M365TenantCredential"), ErrorCode.RuntimeNotSupported);
|
|
575
564
|
});
|
|
576
|
-
}
|
|
577
|
-
|
|
578
|
-
}());
|
|
565
|
+
}
|
|
566
|
+
}
|
|
579
567
|
|
|
580
568
|
// Copyright (c) Microsoft Corporation.
|
|
581
569
|
/**
|
|
@@ -586,7 +574,7 @@ var M365TenantCredential = /** @class */ (function () {
|
|
|
586
574
|
*
|
|
587
575
|
* @beta
|
|
588
576
|
*/
|
|
589
|
-
|
|
577
|
+
class OnBehalfOfUserCredential {
|
|
590
578
|
/**
|
|
591
579
|
* Constructor of OnBehalfOfUserCredential
|
|
592
580
|
*
|
|
@@ -594,7 +582,7 @@ var OnBehalfOfUserCredential = /** @class */ (function () {
|
|
|
594
582
|
* Can Only works in in server side.
|
|
595
583
|
* @beta
|
|
596
584
|
*/
|
|
597
|
-
|
|
585
|
+
constructor(ssoToken) {
|
|
598
586
|
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "OnBehalfOfUserCredential"), ErrorCode.RuntimeNotSupported);
|
|
599
587
|
}
|
|
600
588
|
/**
|
|
@@ -603,30 +591,26 @@ var OnBehalfOfUserCredential = /** @class */ (function () {
|
|
|
603
591
|
* Can only be used in server side.
|
|
604
592
|
* @beta
|
|
605
593
|
*/
|
|
606
|
-
|
|
607
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
608
|
-
|
|
609
|
-
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "OnBehalfOfUserCredential"), ErrorCode.RuntimeNotSupported);
|
|
610
|
-
});
|
|
594
|
+
getToken(scopes, options) {
|
|
595
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
596
|
+
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "OnBehalfOfUserCredential"), ErrorCode.RuntimeNotSupported);
|
|
611
597
|
});
|
|
612
|
-
}
|
|
598
|
+
}
|
|
613
599
|
/**
|
|
614
600
|
* Get basic user info from SSO token.
|
|
615
601
|
* @remarks
|
|
616
602
|
* Can only be used in server side.
|
|
617
603
|
* @beta
|
|
618
604
|
*/
|
|
619
|
-
|
|
605
|
+
getUserInfo() {
|
|
620
606
|
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "OnBehalfOfUserCredential"), ErrorCode.RuntimeNotSupported);
|
|
621
|
-
}
|
|
622
|
-
|
|
623
|
-
}());
|
|
607
|
+
}
|
|
608
|
+
}
|
|
624
609
|
|
|
625
610
|
// Copyright (c) Microsoft Corporation.
|
|
626
|
-
|
|
627
|
-
|
|
628
|
-
|
|
629
|
-
var loginPageHeight = 535;
|
|
611
|
+
const tokenRefreshTimeSpanInMillisecond = 5 * 60 * 1000;
|
|
612
|
+
const loginPageWidth = 600;
|
|
613
|
+
const loginPageHeight = 535;
|
|
630
614
|
/**
|
|
631
615
|
* Represent Teams current user's identity, and it is used within Teams tab application.
|
|
632
616
|
*
|
|
@@ -635,7 +619,7 @@ var loginPageHeight = 535;
|
|
|
635
619
|
*
|
|
636
620
|
* @beta
|
|
637
621
|
*/
|
|
638
|
-
|
|
622
|
+
class TeamsUserCredential {
|
|
639
623
|
/**
|
|
640
624
|
* Constructor of TeamsUserCredential.
|
|
641
625
|
* Developer need to call loadConfiguration(config) before using this class.
|
|
@@ -657,7 +641,7 @@ var TeamsUserCredential = /** @class */ (function () {
|
|
|
657
641
|
*
|
|
658
642
|
* @beta
|
|
659
643
|
*/
|
|
660
|
-
|
|
644
|
+
constructor() {
|
|
661
645
|
internalLogger.info("Create teams user credential");
|
|
662
646
|
this.config = this.loadAndValidateConfig();
|
|
663
647
|
this.ssoToken = null;
|
|
@@ -685,58 +669,58 @@ var TeamsUserCredential = /** @class */ (function () {
|
|
|
685
669
|
*
|
|
686
670
|
* @beta
|
|
687
671
|
*/
|
|
688
|
-
|
|
689
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
690
|
-
|
|
691
|
-
|
|
692
|
-
|
|
693
|
-
|
|
694
|
-
|
|
695
|
-
|
|
696
|
-
|
|
697
|
-
|
|
698
|
-
|
|
699
|
-
|
|
700
|
-
|
|
701
|
-
|
|
702
|
-
|
|
703
|
-
|
|
704
|
-
|
|
705
|
-
|
|
706
|
-
|
|
707
|
-
|
|
708
|
-
|
|
709
|
-
successCallback: function (result) { return __awaiter(_this, void 0, void 0, function () {
|
|
710
|
-
var errorMsg, accessToken;
|
|
711
|
-
return __generator(this, function (_a) {
|
|
712
|
-
if (!result) {
|
|
713
|
-
errorMsg = "Get empty authentication result from MSAL";
|
|
714
|
-
internalLogger.error(errorMsg);
|
|
715
|
-
reject(new ErrorWithCode(errorMsg, ErrorCode.InternalError));
|
|
716
|
-
return [2 /*return*/];
|
|
717
|
-
}
|
|
718
|
-
try {
|
|
719
|
-
accessToken = parseAccessTokenFromAuthCodeTokenResponse(result);
|
|
720
|
-
resolve(accessToken);
|
|
721
|
-
}
|
|
722
|
-
catch (error) {
|
|
723
|
-
reject(error);
|
|
724
|
-
}
|
|
725
|
-
return [2 /*return*/];
|
|
726
|
-
});
|
|
727
|
-
}); },
|
|
728
|
-
failureCallback: function (reason) {
|
|
729
|
-
var errorMsg = "Consent failed for the scope " + scopesStr + " with error: " + reason;
|
|
730
|
-
internalLogger.error(errorMsg);
|
|
731
|
-
reject(new ErrorWithCode(errorMsg, ErrorCode.ConsentFailed));
|
|
732
|
-
},
|
|
733
|
-
});
|
|
734
|
-
});
|
|
735
|
-
})];
|
|
672
|
+
login(scopes) {
|
|
673
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
674
|
+
validateScopesType(scopes);
|
|
675
|
+
const scopesStr = typeof scopes === "string" ? scopes : scopes.join(" ");
|
|
676
|
+
internalLogger.info(`Popup login page to get user's access token with scopes: ${scopesStr}`);
|
|
677
|
+
if (!this.initialized) {
|
|
678
|
+
yield this.init();
|
|
679
|
+
}
|
|
680
|
+
yield app.initialize();
|
|
681
|
+
let result;
|
|
682
|
+
try {
|
|
683
|
+
const params = {
|
|
684
|
+
url: `${this.config.initiateLoginEndpoint}?clientId=${this.config.clientId}&scope=${encodeURI(scopesStr)}&loginHint=${this.loginHint}`,
|
|
685
|
+
width: loginPageWidth,
|
|
686
|
+
height: loginPageHeight,
|
|
687
|
+
};
|
|
688
|
+
result = yield authentication.authenticate(params);
|
|
689
|
+
if (!result) {
|
|
690
|
+
const errorMsg = "Get empty authentication result from MSAL";
|
|
691
|
+
internalLogger.error(errorMsg);
|
|
692
|
+
throw new ErrorWithCode(errorMsg, ErrorCode.InternalError);
|
|
736
693
|
}
|
|
737
|
-
}
|
|
694
|
+
}
|
|
695
|
+
catch (err) {
|
|
696
|
+
const errorMsg = `Consent failed for the scope ${scopesStr} with error: ${err.message}`;
|
|
697
|
+
internalLogger.error(errorMsg);
|
|
698
|
+
throw new ErrorWithCode(errorMsg, ErrorCode.ConsentFailed);
|
|
699
|
+
}
|
|
700
|
+
let resultJson = {};
|
|
701
|
+
try {
|
|
702
|
+
resultJson = JSON.parse(result);
|
|
703
|
+
}
|
|
704
|
+
catch (error) {
|
|
705
|
+
// If can not parse result as Json, will throw error.
|
|
706
|
+
const failedToParseResult = "Failed to parse response to Json.";
|
|
707
|
+
internalLogger.error(failedToParseResult);
|
|
708
|
+
throw new ErrorWithCode(failedToParseResult, ErrorCode.InvalidResponse);
|
|
709
|
+
}
|
|
710
|
+
// If code exists in result, user may using previous auth-start and auth-end page.
|
|
711
|
+
if (resultJson.code) {
|
|
712
|
+
const helpLink = "https://aka.ms/teamsfx-auth-code-flow";
|
|
713
|
+
const usingPreviousAuthPage = "Found auth code in response. Auth code is not support for current version of SDK. " +
|
|
714
|
+
`Please refer to the help link for how to fix the issue: ${helpLink}.`;
|
|
715
|
+
internalLogger.error(usingPreviousAuthPage);
|
|
716
|
+
throw new ErrorWithCode(usingPreviousAuthPage, ErrorCode.InvalidResponse);
|
|
717
|
+
}
|
|
718
|
+
// If sessionStorage exists in result, set the values in current session storage.
|
|
719
|
+
if (resultJson.sessionStorage) {
|
|
720
|
+
this.setSessionStorage(resultJson.sessionStorage);
|
|
721
|
+
}
|
|
738
722
|
});
|
|
739
|
-
}
|
|
723
|
+
}
|
|
740
724
|
/**
|
|
741
725
|
* Get access token from credential.
|
|
742
726
|
*
|
|
@@ -771,80 +755,62 @@ var TeamsUserCredential = /** @class */ (function () {
|
|
|
771
755
|
*
|
|
772
756
|
* @beta
|
|
773
757
|
*/
|
|
774
|
-
|
|
775
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
776
|
-
|
|
777
|
-
|
|
778
|
-
|
|
779
|
-
|
|
780
|
-
|
|
781
|
-
|
|
782
|
-
|
|
783
|
-
|
|
784
|
-
|
|
785
|
-
|
|
786
|
-
|
|
787
|
-
|
|
788
|
-
|
|
789
|
-
|
|
790
|
-
|
|
791
|
-
|
|
792
|
-
|
|
793
|
-
|
|
794
|
-
|
|
795
|
-
|
|
796
|
-
|
|
797
|
-
|
|
798
|
-
|
|
799
|
-
|
|
800
|
-
|
|
801
|
-
|
|
802
|
-
|
|
803
|
-
|
|
804
|
-
|
|
805
|
-
|
|
806
|
-
|
|
807
|
-
|
|
808
|
-
|
|
809
|
-
case 6:
|
|
810
|
-
tokenResponse = _a.sent();
|
|
811
|
-
return [3 /*break*/, 8];
|
|
812
|
-
case 7:
|
|
813
|
-
error_1 = _a.sent();
|
|
814
|
-
acquireTokenSilentFailedMessage = "Failed to call acquireTokenSilent. Reason: " + (error_1 === null || error_1 === void 0 ? void 0 : error_1.message) + ". ";
|
|
815
|
-
internalLogger.verbose(acquireTokenSilentFailedMessage);
|
|
816
|
-
return [3 /*break*/, 8];
|
|
817
|
-
case 8:
|
|
818
|
-
if (!!tokenResponse) return [3 /*break*/, 12];
|
|
819
|
-
_a.label = 9;
|
|
820
|
-
case 9:
|
|
821
|
-
_a.trys.push([9, 11, , 12]);
|
|
822
|
-
scopesRequestForSsoSilent = {
|
|
758
|
+
getToken(scopes, options) {
|
|
759
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
760
|
+
validateScopesType(scopes);
|
|
761
|
+
const ssoToken = yield this.getSSOToken();
|
|
762
|
+
const scopeStr = typeof scopes === "string" ? scopes : scopes.join(" ");
|
|
763
|
+
if (scopeStr === "") {
|
|
764
|
+
internalLogger.info("Get SSO token");
|
|
765
|
+
return ssoToken;
|
|
766
|
+
}
|
|
767
|
+
else {
|
|
768
|
+
internalLogger.info("Get access token with scopes: " + scopeStr);
|
|
769
|
+
if (!this.initialized) {
|
|
770
|
+
yield this.init();
|
|
771
|
+
}
|
|
772
|
+
let tokenResponse;
|
|
773
|
+
const scopesArray = typeof scopes === "string" ? scopes.split(" ") : scopes;
|
|
774
|
+
const domain = window.location.origin;
|
|
775
|
+
// First try to get Access Token from cache.
|
|
776
|
+
try {
|
|
777
|
+
const account = this.msalInstance.getAccountByUsername(this.loginHint);
|
|
778
|
+
const scopesRequestForAcquireTokenSilent = {
|
|
779
|
+
scopes: scopesArray,
|
|
780
|
+
account: account !== null && account !== void 0 ? account : undefined,
|
|
781
|
+
redirectUri: `${domain}/blank-auth-end.html`,
|
|
782
|
+
};
|
|
783
|
+
tokenResponse = yield this.msalInstance.acquireTokenSilent(scopesRequestForAcquireTokenSilent);
|
|
784
|
+
}
|
|
785
|
+
catch (error) {
|
|
786
|
+
const acquireTokenSilentFailedMessage = `Failed to call acquireTokenSilent. Reason: ${error === null || error === void 0 ? void 0 : error.message}. `;
|
|
787
|
+
internalLogger.verbose(acquireTokenSilentFailedMessage);
|
|
788
|
+
}
|
|
789
|
+
if (!tokenResponse) {
|
|
790
|
+
// If fail to get Access Token from cache, try to get Access token by silent login.
|
|
791
|
+
try {
|
|
792
|
+
const scopesRequestForSsoSilent = {
|
|
823
793
|
scopes: scopesArray,
|
|
824
794
|
loginHint: this.loginHint,
|
|
825
|
-
redirectUri: domain
|
|
795
|
+
redirectUri: `${domain}/blank-auth-end.html`,
|
|
826
796
|
};
|
|
827
|
-
|
|
828
|
-
|
|
829
|
-
|
|
830
|
-
|
|
831
|
-
case 11:
|
|
832
|
-
error_2 = _a.sent();
|
|
833
|
-
ssoSilentFailedMessage = "Failed to call ssoSilent. Reason: " + (error_2 === null || error_2 === void 0 ? void 0 : error_2.message) + ". ";
|
|
797
|
+
tokenResponse = yield this.msalInstance.ssoSilent(scopesRequestForSsoSilent);
|
|
798
|
+
}
|
|
799
|
+
catch (error) {
|
|
800
|
+
const ssoSilentFailedMessage = `Failed to call ssoSilent. Reason: ${error === null || error === void 0 ? void 0 : error.message}. `;
|
|
834
801
|
internalLogger.verbose(ssoSilentFailedMessage);
|
|
835
|
-
|
|
836
|
-
case 12:
|
|
837
|
-
if (!tokenResponse) {
|
|
838
|
-
errorMsg = "Failed to get access token cache silently, please login first: you need login first before get access token.";
|
|
839
|
-
internalLogger.error(errorMsg);
|
|
840
|
-
throw new ErrorWithCode(errorMsg, ErrorCode.UiRequiredError);
|
|
841
|
-
}
|
|
842
|
-
accessToken = parseAccessTokenFromAuthCodeTokenResponse(tokenResponse);
|
|
843
|
-
return [2 /*return*/, accessToken];
|
|
802
|
+
}
|
|
844
803
|
}
|
|
845
|
-
|
|
804
|
+
if (!tokenResponse) {
|
|
805
|
+
const errorMsg = `Failed to get access token cache silently, please login first: you need login first before get access token.`;
|
|
806
|
+
internalLogger.error(errorMsg);
|
|
807
|
+
throw new ErrorWithCode(errorMsg, ErrorCode.UiRequiredError);
|
|
808
|
+
}
|
|
809
|
+
const accessToken = parseAccessTokenFromAuthCodeTokenResponse(tokenResponse);
|
|
810
|
+
return accessToken;
|
|
811
|
+
}
|
|
846
812
|
});
|
|
847
|
-
}
|
|
813
|
+
}
|
|
848
814
|
/**
|
|
849
815
|
* Get basic user info from SSO token
|
|
850
816
|
*
|
|
@@ -861,113 +827,82 @@ var TeamsUserCredential = /** @class */ (function () {
|
|
|
861
827
|
*
|
|
862
828
|
* @beta
|
|
863
829
|
*/
|
|
864
|
-
|
|
865
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
866
|
-
|
|
867
|
-
|
|
868
|
-
|
|
869
|
-
case 0:
|
|
870
|
-
internalLogger.info("Get basic user info from SSO token");
|
|
871
|
-
return [4 /*yield*/, this.getSSOToken()];
|
|
872
|
-
case 1:
|
|
873
|
-
ssoToken = _a.sent();
|
|
874
|
-
return [2 /*return*/, getUserInfoFromSsoToken(ssoToken.token)];
|
|
875
|
-
}
|
|
876
|
-
});
|
|
830
|
+
getUserInfo() {
|
|
831
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
832
|
+
internalLogger.info("Get basic user info from SSO token");
|
|
833
|
+
const ssoToken = yield this.getSSOToken();
|
|
834
|
+
return getUserInfoFromSsoToken(ssoToken.token);
|
|
877
835
|
});
|
|
878
|
-
}
|
|
879
|
-
|
|
880
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
881
|
-
|
|
882
|
-
|
|
883
|
-
|
|
884
|
-
|
|
885
|
-
|
|
886
|
-
|
|
887
|
-
|
|
888
|
-
|
|
889
|
-
|
|
890
|
-
|
|
891
|
-
|
|
892
|
-
|
|
893
|
-
|
|
894
|
-
|
|
895
|
-
|
|
896
|
-
cacheLocation: "sessionStorage",
|
|
897
|
-
},
|
|
898
|
-
};
|
|
899
|
-
this.msalInstance = new PublicClientApplication(msalConfig);
|
|
900
|
-
this.initialized = true;
|
|
901
|
-
return [2 /*return*/];
|
|
902
|
-
}
|
|
903
|
-
});
|
|
836
|
+
}
|
|
837
|
+
init() {
|
|
838
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
839
|
+
const ssoToken = yield this.getSSOToken();
|
|
840
|
+
const info = getTenantIdAndLoginHintFromSsoToken(ssoToken.token);
|
|
841
|
+
this.loginHint = info.loginHint;
|
|
842
|
+
this.tid = info.tid;
|
|
843
|
+
const msalConfig = {
|
|
844
|
+
auth: {
|
|
845
|
+
clientId: this.config.clientId,
|
|
846
|
+
authority: `https://login.microsoftonline.com/${this.tid}`,
|
|
847
|
+
},
|
|
848
|
+
cache: {
|
|
849
|
+
cacheLocation: "sessionStorage",
|
|
850
|
+
},
|
|
851
|
+
};
|
|
852
|
+
this.msalInstance = new PublicClientApplication(msalConfig);
|
|
853
|
+
this.initialized = true;
|
|
904
854
|
});
|
|
905
|
-
}
|
|
855
|
+
}
|
|
906
856
|
/**
|
|
907
857
|
* Get SSO token using teams SDK
|
|
908
858
|
* It will try to get SSO token from memory first, if SSO token doesn't exist or about to expired, then it will using teams SDK to get SSO token
|
|
909
859
|
* @returns SSO token
|
|
910
860
|
*/
|
|
911
|
-
|
|
912
|
-
|
|
913
|
-
|
|
914
|
-
|
|
915
|
-
if (_this.ssoToken.expiresOnTimestamp - Date.now() > tokenRefreshTimeSpanInMillisecond) {
|
|
861
|
+
getSSOToken() {
|
|
862
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
863
|
+
if (this.ssoToken) {
|
|
864
|
+
if (this.ssoToken.expiresOnTimestamp - Date.now() > tokenRefreshTimeSpanInMillisecond) {
|
|
916
865
|
internalLogger.verbose("Get SSO token from memory cache");
|
|
917
|
-
|
|
918
|
-
return;
|
|
866
|
+
return this.ssoToken;
|
|
919
867
|
}
|
|
920
868
|
}
|
|
921
|
-
|
|
922
|
-
|
|
923
|
-
|
|
924
|
-
|
|
925
|
-
|
|
926
|
-
|
|
927
|
-
|
|
928
|
-
|
|
929
|
-
|
|
930
|
-
|
|
931
|
-
|
|
932
|
-
|
|
933
|
-
|
|
934
|
-
|
|
935
|
-
|
|
936
|
-
|
|
937
|
-
|
|
938
|
-
|
|
939
|
-
|
|
940
|
-
|
|
941
|
-
|
|
942
|
-
|
|
943
|
-
|
|
944
|
-
|
|
945
|
-
|
|
946
|
-
|
|
947
|
-
|
|
948
|
-
|
|
949
|
-
reject(new ErrorWithCode(errorMsg, ErrorCode.InternalError));
|
|
950
|
-
},
|
|
951
|
-
resources: [],
|
|
952
|
-
});
|
|
953
|
-
});
|
|
954
|
-
// If the code not running in Teams, the initialize callback function would never trigger
|
|
955
|
-
setTimeout(function () {
|
|
956
|
-
if (!initialized) {
|
|
957
|
-
var errorMsg = "Initialize teams sdk timeout, maybe the code is not running inside Teams";
|
|
958
|
-
internalLogger.error(errorMsg);
|
|
959
|
-
reject(new ErrorWithCode(errorMsg, ErrorCode.InternalError));
|
|
960
|
-
}
|
|
961
|
-
}, initializeTeamsSdkTimeoutInMillisecond);
|
|
869
|
+
const params = {};
|
|
870
|
+
let token;
|
|
871
|
+
try {
|
|
872
|
+
yield app.initialize();
|
|
873
|
+
token = yield authentication.getAuthToken(params);
|
|
874
|
+
}
|
|
875
|
+
catch (err) {
|
|
876
|
+
const errorMsg = "Get SSO token failed with error: " + err.message;
|
|
877
|
+
internalLogger.error(errorMsg);
|
|
878
|
+
throw new ErrorWithCode(errorMsg, ErrorCode.InternalError);
|
|
879
|
+
}
|
|
880
|
+
if (!token) {
|
|
881
|
+
const errorMsg = "Get empty SSO token from Teams";
|
|
882
|
+
internalLogger.error(errorMsg);
|
|
883
|
+
throw new ErrorWithCode(errorMsg, ErrorCode.InternalError);
|
|
884
|
+
}
|
|
885
|
+
const tokenObject = parseJwt(token);
|
|
886
|
+
if (tokenObject.ver !== "1.0" && tokenObject.ver !== "2.0") {
|
|
887
|
+
const errorMsg = "SSO token is not valid with an unknown version: " + tokenObject.ver;
|
|
888
|
+
internalLogger.error(errorMsg);
|
|
889
|
+
throw new ErrorWithCode(errorMsg, ErrorCode.InternalError);
|
|
890
|
+
}
|
|
891
|
+
const ssoToken = {
|
|
892
|
+
token,
|
|
893
|
+
expiresOnTimestamp: tokenObject.exp * 1000,
|
|
894
|
+
};
|
|
895
|
+
this.ssoToken = ssoToken;
|
|
896
|
+
return ssoToken;
|
|
962
897
|
});
|
|
963
|
-
}
|
|
898
|
+
}
|
|
964
899
|
/**
|
|
965
900
|
* Load and validate authentication configuration
|
|
966
901
|
* @returns Authentication configuration
|
|
967
902
|
*/
|
|
968
|
-
|
|
903
|
+
loadAndValidateConfig() {
|
|
969
904
|
internalLogger.verbose("Validate authentication configuration");
|
|
970
|
-
|
|
905
|
+
const config = getAuthenticationConfiguration();
|
|
971
906
|
if (!config) {
|
|
972
907
|
internalLogger.error(ErrorMessage.AuthenticationConfigurationNotExists);
|
|
973
908
|
throw new ErrorWithCode(ErrorMessage.AuthenticationConfigurationNotExists, ErrorCode.InvalidConfiguration);
|
|
@@ -975,28 +910,52 @@ var TeamsUserCredential = /** @class */ (function () {
|
|
|
975
910
|
if (config.initiateLoginEndpoint && config.clientId) {
|
|
976
911
|
return config;
|
|
977
912
|
}
|
|
978
|
-
|
|
913
|
+
const missingValues = [];
|
|
979
914
|
if (!config.initiateLoginEndpoint) {
|
|
980
915
|
missingValues.push("initiateLoginEndpoint");
|
|
981
916
|
}
|
|
982
917
|
if (!config.clientId) {
|
|
983
918
|
missingValues.push("clientId");
|
|
984
919
|
}
|
|
985
|
-
|
|
920
|
+
const errorMsg = formatString(ErrorMessage.InvalidConfiguration, missingValues.join(", "), "undefined");
|
|
986
921
|
internalLogger.error(errorMsg);
|
|
987
922
|
throw new ErrorWithCode(errorMsg, ErrorCode.InvalidConfiguration);
|
|
988
|
-
}
|
|
989
|
-
|
|
990
|
-
|
|
923
|
+
}
|
|
924
|
+
setSessionStorage(sessionStorageValues) {
|
|
925
|
+
try {
|
|
926
|
+
const sessionStorageKeys = Object.keys(sessionStorageValues);
|
|
927
|
+
sessionStorageKeys.forEach((key) => {
|
|
928
|
+
sessionStorage.setItem(key, sessionStorageValues[key]);
|
|
929
|
+
});
|
|
930
|
+
}
|
|
931
|
+
catch (error) {
|
|
932
|
+
// Values in result.sessionStorage can not be set into session storage.
|
|
933
|
+
// Throw error since this may block user.
|
|
934
|
+
const errorMessage = `Failed to set values in session storage. Error: ${error.message}`;
|
|
935
|
+
internalLogger.error(errorMessage);
|
|
936
|
+
throw new ErrorWithCode(errorMessage, ErrorCode.InternalError);
|
|
937
|
+
}
|
|
938
|
+
}
|
|
939
|
+
// Come from here: https://github.com/wictorwilen/msteams-react-base-component/blob/master/src/useTeams.ts
|
|
940
|
+
checkInTeams() {
|
|
941
|
+
if ((window.parent === window.self && window.nativeInterface) ||
|
|
942
|
+
window.navigator.userAgent.includes("Teams/") ||
|
|
943
|
+
window.name === "embedded-page-container" ||
|
|
944
|
+
window.name === "extension-tab-frame") {
|
|
945
|
+
return true;
|
|
946
|
+
}
|
|
947
|
+
return false;
|
|
948
|
+
}
|
|
949
|
+
}
|
|
991
950
|
|
|
992
951
|
// Copyright (c) Microsoft Corporation.
|
|
993
|
-
|
|
952
|
+
const defaultScope = "https://graph.microsoft.com/.default";
|
|
994
953
|
/**
|
|
995
954
|
* Microsoft Graph auth provider for Teams Framework
|
|
996
955
|
*
|
|
997
956
|
* @beta
|
|
998
957
|
*/
|
|
999
|
-
|
|
958
|
+
class MsGraphAuthProvider {
|
|
1000
959
|
/**
|
|
1001
960
|
* Constructor of MsGraphAuthProvider.
|
|
1002
961
|
*
|
|
@@ -1009,9 +968,9 @@ var MsGraphAuthProvider = /** @class */ (function () {
|
|
|
1009
968
|
*
|
|
1010
969
|
* @beta
|
|
1011
970
|
*/
|
|
1012
|
-
|
|
971
|
+
constructor(credential, scopes) {
|
|
1013
972
|
this.credential = credential;
|
|
1014
|
-
|
|
973
|
+
let scopesStr = defaultScope;
|
|
1015
974
|
if (scopes) {
|
|
1016
975
|
validateScopesType(scopes);
|
|
1017
976
|
scopesStr = typeof scopes === "string" ? scopes : scopes.join(" ");
|
|
@@ -1019,7 +978,7 @@ var MsGraphAuthProvider = /** @class */ (function () {
|
|
|
1019
978
|
scopesStr = defaultScope;
|
|
1020
979
|
}
|
|
1021
980
|
}
|
|
1022
|
-
internalLogger.info(
|
|
981
|
+
internalLogger.info(`Create Microsoft Graph Authentication Provider with scopes: '${scopesStr}'`);
|
|
1023
982
|
this.scopes = scopesStr;
|
|
1024
983
|
}
|
|
1025
984
|
/**
|
|
@@ -1034,32 +993,23 @@ var MsGraphAuthProvider = /** @class */ (function () {
|
|
|
1034
993
|
* @returns Access token from the credential.
|
|
1035
994
|
*
|
|
1036
995
|
*/
|
|
1037
|
-
|
|
1038
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
1039
|
-
|
|
1040
|
-
|
|
1041
|
-
|
|
1042
|
-
|
|
1043
|
-
|
|
1044
|
-
|
|
1045
|
-
|
|
1046
|
-
|
|
1047
|
-
|
|
1048
|
-
|
|
1049
|
-
resolve(accessToken.token);
|
|
1050
|
-
}
|
|
1051
|
-
else {
|
|
1052
|
-
var errorMsg = "Graph access token is undefined or empty";
|
|
1053
|
-
internalLogger.error(errorMsg);
|
|
1054
|
-
reject(new ErrorWithCode(errorMsg, ErrorCode.InternalError));
|
|
1055
|
-
}
|
|
1056
|
-
})];
|
|
996
|
+
getAccessToken() {
|
|
997
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
998
|
+
internalLogger.info(`Get Graph Access token with scopes: '${this.scopes}'`);
|
|
999
|
+
const accessToken = yield this.credential.getToken(this.scopes);
|
|
1000
|
+
return new Promise((resolve, reject) => {
|
|
1001
|
+
if (accessToken) {
|
|
1002
|
+
resolve(accessToken.token);
|
|
1003
|
+
}
|
|
1004
|
+
else {
|
|
1005
|
+
const errorMsg = "Graph access token is undefined or empty";
|
|
1006
|
+
internalLogger.error(errorMsg);
|
|
1007
|
+
reject(new ErrorWithCode(errorMsg, ErrorCode.InternalError));
|
|
1057
1008
|
}
|
|
1058
1009
|
});
|
|
1059
1010
|
});
|
|
1060
|
-
}
|
|
1061
|
-
|
|
1062
|
-
}());
|
|
1011
|
+
}
|
|
1012
|
+
}
|
|
1063
1013
|
|
|
1064
1014
|
// Copyright (c) Microsoft Corporation.
|
|
1065
1015
|
/**
|
|
@@ -1115,9 +1065,9 @@ var MsGraphAuthProvider = /** @class */ (function () {
|
|
|
1115
1065
|
*/
|
|
1116
1066
|
function createMicrosoftGraphClient(credential, scopes) {
|
|
1117
1067
|
internalLogger.info("Create Microsoft Graph Client");
|
|
1118
|
-
|
|
1119
|
-
|
|
1120
|
-
authProvider
|
|
1068
|
+
const authProvider = new MsGraphAuthProvider(credential, scopes);
|
|
1069
|
+
const graphClient = Client.initWithMiddleware({
|
|
1070
|
+
authProvider,
|
|
1121
1071
|
});
|
|
1122
1072
|
return graphClient;
|
|
1123
1073
|
}
|
|
@@ -1128,8 +1078,8 @@ function createMicrosoftGraphClient(credential, scopes) {
|
|
|
1128
1078
|
* Only works in in server side.
|
|
1129
1079
|
* @beta
|
|
1130
1080
|
*/
|
|
1131
|
-
|
|
1132
|
-
|
|
1081
|
+
class DefaultTediousConnectionConfiguration {
|
|
1082
|
+
constructor() {
|
|
1133
1083
|
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "DefaultTediousConnectionConfiguration"), ErrorCode.RuntimeNotSupported);
|
|
1134
1084
|
}
|
|
1135
1085
|
/**
|
|
@@ -1138,15 +1088,12 @@ var DefaultTediousConnectionConfiguration = /** @class */ (function () {
|
|
|
1138
1088
|
* Only works in in server side.
|
|
1139
1089
|
* @beta
|
|
1140
1090
|
*/
|
|
1141
|
-
|
|
1142
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
1143
|
-
|
|
1144
|
-
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "DefaultTediousConnectionConfiguration"), ErrorCode.RuntimeNotSupported);
|
|
1145
|
-
});
|
|
1091
|
+
getConfig(databaseName) {
|
|
1092
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
1093
|
+
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "DefaultTediousConnectionConfiguration"), ErrorCode.RuntimeNotSupported);
|
|
1146
1094
|
});
|
|
1147
|
-
}
|
|
1148
|
-
|
|
1149
|
-
}());
|
|
1095
|
+
}
|
|
1096
|
+
}
|
|
1150
1097
|
|
|
1151
1098
|
// Copyright (c) Microsoft Corporation.
|
|
1152
1099
|
/**
|
|
@@ -1200,7 +1147,7 @@ var DefaultTediousConnectionConfiguration = /** @class */ (function () {
|
|
|
1200
1147
|
*
|
|
1201
1148
|
* @beta
|
|
1202
1149
|
*/
|
|
1203
|
-
|
|
1150
|
+
class TeamsBotSsoPrompt {
|
|
1204
1151
|
/**
|
|
1205
1152
|
* Constructor of TeamsBotSsoPrompt.
|
|
1206
1153
|
*
|
|
@@ -1212,7 +1159,7 @@ var TeamsBotSsoPrompt = /** @class */ (function () {
|
|
|
1212
1159
|
*
|
|
1213
1160
|
* @beta
|
|
1214
1161
|
*/
|
|
1215
|
-
|
|
1162
|
+
constructor(dialogId, settings) {
|
|
1216
1163
|
this.settings = settings;
|
|
1217
1164
|
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "TeamsBotSsoPrompt"), ErrorCode.RuntimeNotSupported);
|
|
1218
1165
|
}
|
|
@@ -1232,13 +1179,11 @@ var TeamsBotSsoPrompt = /** @class */ (function () {
|
|
|
1232
1179
|
*
|
|
1233
1180
|
* @beta
|
|
1234
1181
|
*/
|
|
1235
|
-
|
|
1236
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
1237
|
-
|
|
1238
|
-
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "TeamsBotSsoPrompt"), ErrorCode.RuntimeNotSupported);
|
|
1239
|
-
});
|
|
1182
|
+
beginDialog(dc) {
|
|
1183
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
1184
|
+
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "TeamsBotSsoPrompt"), ErrorCode.RuntimeNotSupported);
|
|
1240
1185
|
});
|
|
1241
|
-
}
|
|
1186
|
+
}
|
|
1242
1187
|
/**
|
|
1243
1188
|
* Called when a prompt dialog is the active dialog and the user replied with a new activity.
|
|
1244
1189
|
*
|
|
@@ -1257,15 +1202,12 @@ var TeamsBotSsoPrompt = /** @class */ (function () {
|
|
|
1257
1202
|
*
|
|
1258
1203
|
* @beta
|
|
1259
1204
|
*/
|
|
1260
|
-
|
|
1261
|
-
return __awaiter(this, void 0, void 0, function () {
|
|
1262
|
-
|
|
1263
|
-
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "TeamsBotSsoPrompt"), ErrorCode.RuntimeNotSupported);
|
|
1264
|
-
});
|
|
1205
|
+
continueDialog(dc) {
|
|
1206
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
1207
|
+
throw new ErrorWithCode(formatString(ErrorMessage.BrowserRuntimeNotSupported, "TeamsBotSsoPrompt"), ErrorCode.RuntimeNotSupported);
|
|
1265
1208
|
});
|
|
1266
|
-
}
|
|
1267
|
-
|
|
1268
|
-
}());
|
|
1209
|
+
}
|
|
1210
|
+
}
|
|
1269
1211
|
|
|
1270
1212
|
export { DefaultTediousConnectionConfiguration, ErrorCode, ErrorWithCode, LogLevel, M365TenantCredential, MsGraphAuthProvider, OnBehalfOfUserCredential, ResourceType, TeamsBotSsoPrompt, TeamsUserCredential, createMicrosoftGraphClient, getAuthenticationConfiguration, getLogLevel, getResourceConfiguration, loadConfiguration, setLogFunction, setLogLevel, setLogger };
|
|
1271
1213
|
//# sourceMappingURL=index.esm5.js.map
|