@oauth2-cli/qui-cli 1.0.3 → 1.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +14 -0
- package/dist/Client.d.ts +1 -1
- package/dist/Client.js +15 -18
- package/extendable/Client.d.ts +1 -1
- package/extendable/Client.js +15 -18
- package/package.json +1 -1
package/CHANGELOG.md
CHANGED
|
@@ -2,6 +2,20 @@
|
|
|
2
2
|
|
|
3
3
|
All notable changes to this project will be documented in this file. See [commit-and-tag-version](https://github.com/absolute-version/commit-and-tag-version) for commit guidelines.
|
|
4
4
|
|
|
5
|
+
## [1.1.1](https://github.com/battis/oauth2-cli/compare/qui-cli-plugin/1.1.0...qui-cli-plugin/1.1.1) (2026-03-04)
|
|
6
|
+
|
|
7
|
+
|
|
8
|
+
### Bug Fixes
|
|
9
|
+
|
|
10
|
+
* extend Client without breaking Client ([1115a71](https://github.com/battis/oauth2-cli/commit/1115a714228294b7fd2057706504645a48f94cb8))
|
|
11
|
+
|
|
12
|
+
## [1.1.0](https://github.com/battis/oauth2-cli/compare/qui-cli-plugin/1.0.3...qui-cli-plugin/1.1.0) (2026-03-04)
|
|
13
|
+
|
|
14
|
+
|
|
15
|
+
### Features
|
|
16
|
+
|
|
17
|
+
* improve logging of request information ([f138d2e](https://github.com/battis/oauth2-cli/commit/f138d2ed048c87480ffb9d272024ce90943beca2))
|
|
18
|
+
|
|
5
19
|
## [1.0.3](https://github.com/battis/oauth2-cli/compare/qui-cli-plugin/1.0.2...qui-cli-plugin/1.0.3) (2026-03-03)
|
|
6
20
|
|
|
7
21
|
### Bug Fixes
|
package/dist/Client.d.ts
CHANGED
|
@@ -17,7 +17,7 @@ export declare class Client<C extends OAuth2CLI.Credentials = OAuth2CLI.Credenti
|
|
|
17
17
|
getConfiguration(): Promise<OpenIDClient.Configuration>;
|
|
18
18
|
authorize(): Promise<OAuth2CLI.Token.Response>;
|
|
19
19
|
handleAuthorizationCodeRedirect(request: Request, session: OAuth2CLI.Localhost.Server): Promise<OAuth2CLI.Token.Response>;
|
|
20
|
-
protected refreshTokenGrant(
|
|
20
|
+
protected refreshTokenGrant({ refresh_token, inject }?: Parameters<OAuth2CLI.Client['refreshTokenGrant']>[0]): Promise<OAuth2CLI.Token.Response | undefined>;
|
|
21
21
|
protected save(response: OAuth2CLI.Token.Response): Promise<OAuth2CLI.Token.Response>;
|
|
22
22
|
request(url: requestish.URL.ish, method?: string, body?: OpenIDClient.FetchBody, headers?: requestish.Headers.ish, dPoPOptions?: OpenIDClient.DPoPOptions): Promise<Response>;
|
|
23
23
|
requestJSON<J extends JSONValue = JSONValue>(url: requestish.URL.ish, method?: string, body?: OpenIDClient.FetchBody, headers?: requestish.Headers.ish, dPoPOptions?: OpenIDClient.DPoPOptions): Promise<J>;
|
package/dist/Client.js
CHANGED
|
@@ -28,31 +28,28 @@ export class Client extends OAuth2CLI.Client {
|
|
|
28
28
|
async authorize() {
|
|
29
29
|
Log.debug(`Authorizing ${this.name} new access token`);
|
|
30
30
|
const response = await super.authorize();
|
|
31
|
-
Log.debug(`Authorized ${this.name} new access token
|
|
31
|
+
Log.debug(`Authorized ${this.name} new access token:\n${Log.syntaxColor(response)}`);
|
|
32
32
|
return response;
|
|
33
33
|
}
|
|
34
34
|
async handleAuthorizationCodeRedirect(request, session) {
|
|
35
|
-
Log.debug(`Handling ${this.name} authorization code redirect
|
|
35
|
+
Log.debug(`Handling ${this.name} authorization code redirect:\n${Log.syntaxColor(request)}`);
|
|
36
36
|
const response = await super.handleAuthorizationCodeRedirect(request, session);
|
|
37
|
-
Log.debug(`Received ${this.name} authorization code response
|
|
38
|
-
response
|
|
39
|
-
});
|
|
37
|
+
Log.debug(`Received ${this.name} authorization code response:\n${Log.syntaxColor(response)}`);
|
|
40
38
|
return response;
|
|
41
39
|
}
|
|
42
|
-
async refreshTokenGrant(
|
|
43
|
-
Log.debug(`
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
40
|
+
async refreshTokenGrant({ refresh_token, inject } = {}) {
|
|
41
|
+
Log.debug(`Attempting to refresh ${this.name} access token:\n${Log.syntaxColor({ refresh_token, inject })}`);
|
|
42
|
+
const refreshed = await super.refreshTokenGrant({ refresh_token, inject });
|
|
43
|
+
if (refreshed) {
|
|
44
|
+
Log.debug(`Received refreshed ${this.name} access token:\n${Log.syntaxColor(refreshed)}`);
|
|
45
|
+
}
|
|
46
|
+
else {
|
|
47
|
+
Log.debug(`${this.name} token refresh failed`);
|
|
48
|
+
}
|
|
50
49
|
return refreshed;
|
|
51
50
|
}
|
|
52
51
|
async save(response) {
|
|
53
|
-
Log.debug(`Persisting ${this.name} refresh token
|
|
54
|
-
response
|
|
55
|
-
});
|
|
52
|
+
Log.debug(`Persisting ${this.name} refresh token (if present and storage configured):\n${Log.syntaxColor(response)}`);
|
|
56
53
|
return await super.save(response);
|
|
57
54
|
}
|
|
58
55
|
async request(url, method, body, headers, dPoPOptions) {
|
|
@@ -60,12 +57,12 @@ export class Client extends OAuth2CLI.Client {
|
|
|
60
57
|
request: { method, url, headers, body, dPoPOptions }
|
|
61
58
|
});
|
|
62
59
|
const response = await super.request(url, method, body, headers, dPoPOptions);
|
|
63
|
-
Log.debug(`Received response from ${this.name}
|
|
60
|
+
Log.debug(`Received response from ${this.name}:\n${Log.syntaxColor(response)}`);
|
|
64
61
|
return response;
|
|
65
62
|
}
|
|
66
63
|
async requestJSON(url, method, body, headers, dPoPOptions) {
|
|
67
64
|
const json = await super.requestJSON(url, method, body, headers, dPoPOptions);
|
|
68
|
-
Log.debug(`Parsed JSON from ${this.name} response
|
|
65
|
+
Log.debug(`Parsed JSON from ${this.name} response:\n${Log.syntaxColor({ json })}`);
|
|
69
66
|
return json;
|
|
70
67
|
}
|
|
71
68
|
}
|
package/extendable/Client.d.ts
CHANGED
|
@@ -17,7 +17,7 @@ export declare class Client<C extends OAuth2CLI.Credentials = OAuth2CLI.Credenti
|
|
|
17
17
|
getConfiguration(): Promise<OpenIDClient.Configuration>;
|
|
18
18
|
authorize(): Promise<OAuth2CLI.Token.Response>;
|
|
19
19
|
handleAuthorizationCodeRedirect(request: Request, session: OAuth2CLI.Localhost.Server): Promise<OAuth2CLI.Token.Response>;
|
|
20
|
-
protected refreshTokenGrant(
|
|
20
|
+
protected refreshTokenGrant({ refresh_token, inject }?: Parameters<OAuth2CLI.Client['refreshTokenGrant']>[0]): Promise<OAuth2CLI.Token.Response | undefined>;
|
|
21
21
|
protected save(response: OAuth2CLI.Token.Response): Promise<OAuth2CLI.Token.Response>;
|
|
22
22
|
request(url: requestish.URL.ish, method?: string, body?: OpenIDClient.FetchBody, headers?: requestish.Headers.ish, dPoPOptions?: OpenIDClient.DPoPOptions): Promise<Response>;
|
|
23
23
|
requestJSON<J extends JSONValue = JSONValue>(url: requestish.URL.ish, method?: string, body?: OpenIDClient.FetchBody, headers?: requestish.Headers.ish, dPoPOptions?: OpenIDClient.DPoPOptions): Promise<J>;
|
package/extendable/Client.js
CHANGED
|
@@ -28,31 +28,28 @@ export class Client extends OAuth2CLI.Client {
|
|
|
28
28
|
async authorize() {
|
|
29
29
|
Log.debug(`Authorizing ${this.name} new access token`);
|
|
30
30
|
const response = await super.authorize();
|
|
31
|
-
Log.debug(`Authorized ${this.name} new access token
|
|
31
|
+
Log.debug(`Authorized ${this.name} new access token:\n${Log.syntaxColor(response)}`);
|
|
32
32
|
return response;
|
|
33
33
|
}
|
|
34
34
|
async handleAuthorizationCodeRedirect(request, session) {
|
|
35
|
-
Log.debug(`Handling ${this.name} authorization code redirect
|
|
35
|
+
Log.debug(`Handling ${this.name} authorization code redirect:\n${Log.syntaxColor(request)}`);
|
|
36
36
|
const response = await super.handleAuthorizationCodeRedirect(request, session);
|
|
37
|
-
Log.debug(`Received ${this.name} authorization code response
|
|
38
|
-
response
|
|
39
|
-
});
|
|
37
|
+
Log.debug(`Received ${this.name} authorization code response:\n${Log.syntaxColor(response)}`);
|
|
40
38
|
return response;
|
|
41
39
|
}
|
|
42
|
-
async refreshTokenGrant(
|
|
43
|
-
Log.debug(`
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
40
|
+
async refreshTokenGrant({ refresh_token, inject } = {}) {
|
|
41
|
+
Log.debug(`Attempting to refresh ${this.name} access token:\n${Log.syntaxColor({ refresh_token, inject })}`);
|
|
42
|
+
const refreshed = await super.refreshTokenGrant({ refresh_token, inject });
|
|
43
|
+
if (refreshed) {
|
|
44
|
+
Log.debug(`Received refreshed ${this.name} access token:\n${Log.syntaxColor(refreshed)}`);
|
|
45
|
+
}
|
|
46
|
+
else {
|
|
47
|
+
Log.debug(`${this.name} token refresh failed`);
|
|
48
|
+
}
|
|
50
49
|
return refreshed;
|
|
51
50
|
}
|
|
52
51
|
async save(response) {
|
|
53
|
-
Log.debug(`Persisting ${this.name} refresh token
|
|
54
|
-
response
|
|
55
|
-
});
|
|
52
|
+
Log.debug(`Persisting ${this.name} refresh token (if present and storage configured):\n${Log.syntaxColor(response)}`);
|
|
56
53
|
return await super.save(response);
|
|
57
54
|
}
|
|
58
55
|
async request(url, method, body, headers, dPoPOptions) {
|
|
@@ -60,12 +57,12 @@ export class Client extends OAuth2CLI.Client {
|
|
|
60
57
|
request: { method, url, headers, body, dPoPOptions }
|
|
61
58
|
});
|
|
62
59
|
const response = await super.request(url, method, body, headers, dPoPOptions);
|
|
63
|
-
Log.debug(`Received response from ${this.name}
|
|
60
|
+
Log.debug(`Received response from ${this.name}:\n${Log.syntaxColor(response)}`);
|
|
64
61
|
return response;
|
|
65
62
|
}
|
|
66
63
|
async requestJSON(url, method, body, headers, dPoPOptions) {
|
|
67
64
|
const json = await super.requestJSON(url, method, body, headers, dPoPOptions);
|
|
68
|
-
Log.debug(`Parsed JSON from ${this.name} response
|
|
65
|
+
Log.debug(`Parsed JSON from ${this.name} response:\n${Log.syntaxColor({ json })}`);
|
|
69
66
|
return json;
|
|
70
67
|
}
|
|
71
68
|
}
|
package/package.json
CHANGED