@pnp/cli-microsoft365 9.1.0-beta.94ae9ed → 9.1.0-beta.a781c51

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (84) hide show
  1. package/allCommands.json +1 -1
  2. package/allCommandsFull.json +1 -1
  3. package/dist/Auth.js +6 -4
  4. package/dist/AuthServer.js +7 -7
  5. package/dist/Command.js +4 -1
  6. package/dist/api.js +1 -1
  7. package/dist/config.js +1 -0
  8. package/dist/m365/commands/login.js +1 -1
  9. package/dist/m365/external/commands/item/item-add.js +2 -5
  10. package/dist/m365/file/commands/file-move.js +135 -0
  11. package/dist/m365/file/commands.js +2 -1
  12. package/dist/m365/spfx/commands/project/project-doctor/doctor-1.20.0.js +27 -0
  13. package/dist/m365/spfx/commands/project/project-doctor/rules/FN002021_DEVDEP_rushstack_eslint_config.js +10 -0
  14. package/dist/m365/spfx/commands/project/project-doctor.js +2 -1
  15. package/dist/m365/spfx/commands/project/project-upgrade/upgrade-1.20.0.js +59 -0
  16. package/dist/m365/spfx/commands/project/project-upgrade.js +2 -1
  17. package/dist/m365/spfx/commands/spfx-doctor.js +15 -0
  18. package/dist/m365/spo/commands/page/page-remove.js +37 -16
  19. package/dist/m365/spo/commands/site/site-admin-list.js +8 -9
  20. package/dist/m365/spo/commands/site/site-admin-remove.js +194 -0
  21. package/dist/m365/spo/commands/site/site-sharingpermission-set.js +68 -0
  22. package/dist/m365/spo/commands.js +2 -0
  23. package/dist/m365/teams/MeetingTranscript.js +2 -0
  24. package/dist/m365/teams/commands/meeting/meeting-transcript-get.js +152 -0
  25. package/dist/m365/teams/commands.js +1 -0
  26. package/dist/m365/viva/commands/engage/Community.js +2 -0
  27. package/dist/m365/viva/commands/engage/engage-community-list.js +28 -0
  28. package/dist/m365/viva/commands.js +1 -0
  29. package/dist/request.js +46 -61
  30. package/dist/utils/driveUtil.js +51 -0
  31. package/dist/utils/spo.js +5 -7
  32. package/dist/utils/timersUtil.js +12 -0
  33. package/dist/utils/urlUtil.js +8 -0
  34. package/dist/utils/zod.js +1 -1
  35. package/docs/docs/cmd/entra/m365group/m365group-report-activitystorage.mdx +2 -2
  36. package/docs/docs/cmd/external/item/item-add.mdx +3 -3
  37. package/docs/docs/cmd/file/file-move.mdx +79 -0
  38. package/docs/docs/cmd/spfx/project/project-upgrade.mdx +1 -1
  39. package/docs/docs/cmd/spo/cdn/cdn-get.mdx +1 -1
  40. package/docs/docs/cmd/spo/cdn/cdn-origin-add.mdx +1 -1
  41. package/docs/docs/cmd/spo/cdn/cdn-origin-list.mdx +1 -1
  42. package/docs/docs/cmd/spo/cdn/cdn-origin-remove.mdx +1 -1
  43. package/docs/docs/cmd/spo/cdn/cdn-policy-list.mdx +1 -1
  44. package/docs/docs/cmd/spo/cdn/cdn-policy-set.mdx +1 -1
  45. package/docs/docs/cmd/spo/externaluser/externaluser-list.mdx +1 -1
  46. package/docs/docs/cmd/spo/hidedefaultthemes/hidedefaultthemes-get.mdx +1 -1
  47. package/docs/docs/cmd/spo/hidedefaultthemes/hidedefaultthemes-set.mdx +1 -1
  48. package/docs/docs/cmd/spo/homesite/homesite-remove.mdx +1 -1
  49. package/docs/docs/cmd/spo/knowledgehub/knowledgehub-get.mdx +1 -1
  50. package/docs/docs/cmd/spo/knowledgehub/knowledgehub-remove.mdx +1 -1
  51. package/docs/docs/cmd/spo/knowledgehub/knowledgehub-set.mdx +1 -1
  52. package/docs/docs/cmd/spo/orgassetslibrary/orgassetslibrary-add.mdx +1 -1
  53. package/docs/docs/cmd/spo/orgassetslibrary/orgassetslibrary-list.mdx +1 -1
  54. package/docs/docs/cmd/spo/orgassetslibrary/orgassetslibrary-remove.mdx +1 -1
  55. package/docs/docs/cmd/spo/orgnewssite/orgnewssite-list.mdx +1 -1
  56. package/docs/docs/cmd/spo/orgnewssite/orgnewssite-remove.mdx +1 -1
  57. package/docs/docs/cmd/spo/orgnewssite/orgnewssite-set.mdx +1 -1
  58. package/docs/docs/cmd/spo/page/page-remove.mdx +30 -12
  59. package/docs/docs/cmd/spo/site/site-admin-add.mdx +2 -2
  60. package/docs/docs/cmd/spo/site/site-admin-list.mdx +64 -12
  61. package/docs/docs/cmd/spo/site/site-admin-remove.mdx +67 -0
  62. package/docs/docs/cmd/spo/site/site-appcatalog-add.mdx +1 -1
  63. package/docs/docs/cmd/spo/site/site-appcatalog-remove.mdx +1 -1
  64. package/docs/docs/cmd/spo/site/site-commsite-enable.mdx +1 -1
  65. package/docs/docs/cmd/spo/site/site-list.mdx +6 -4
  66. package/docs/docs/cmd/spo/site/site-set.mdx +1 -1
  67. package/docs/docs/cmd/spo/site/site-sharingpermission-set.mdx +58 -0
  68. package/docs/docs/cmd/spo/storageentity/storageentity-remove.mdx +1 -1
  69. package/docs/docs/cmd/spo/storageentity/storageentity-set.mdx +1 -1
  70. package/docs/docs/cmd/spo/tenant/tenant-appcatalog-add.mdx +1 -1
  71. package/docs/docs/cmd/spo/tenant/tenant-appcatalogurl-get.mdx +1 -1
  72. package/docs/docs/cmd/spo/tenant/tenant-recyclebinitem-list.mdx +1 -1
  73. package/docs/docs/cmd/spo/tenant/tenant-recyclebinitem-remove.mdx +1 -1
  74. package/docs/docs/cmd/spo/tenant/tenant-settings-list.mdx +1 -1
  75. package/docs/docs/cmd/spo/theme/theme-apply.mdx +1 -1
  76. package/docs/docs/cmd/spo/theme/theme-get.mdx +1 -1
  77. package/docs/docs/cmd/spo/theme/theme-list.mdx +1 -1
  78. package/docs/docs/cmd/spo/theme/theme-remove.mdx +1 -1
  79. package/docs/docs/cmd/spo/theme/theme-set.mdx +1 -1
  80. package/docs/docs/cmd/spp/contentcenter/contentcenter-list.mdx +3 -5
  81. package/docs/docs/cmd/teams/meeting/meeting-transcript-get.mdx +132 -0
  82. package/docs/docs/cmd/viva/engage/engage-community-list.mdx +81 -0
  83. package/npm-shrinkwrap.json +203 -375
  84. package/package.json +16 -17
@@ -0,0 +1,194 @@
1
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
2
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
3
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
4
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
5
+ };
6
+ var _SpoSiteAdminRemoveCommand_instances, _SpoSiteAdminRemoveCommand_initTelemetry, _SpoSiteAdminRemoveCommand_initOptions, _SpoSiteAdminRemoveCommand_initValidators, _SpoSiteAdminRemoveCommand_initOptionSets, _SpoSiteAdminRemoveCommand_initTypes;
7
+ import { cli } from '../../../../cli/cli.js';
8
+ import request from '../../../../request.js';
9
+ import { entraGroup } from '../../../../utils/entraGroup.js';
10
+ import { entraUser } from '../../../../utils/entraUser.js';
11
+ import { formatting } from '../../../../utils/formatting.js';
12
+ import { spo } from '../../../../utils/spo.js';
13
+ import { validation } from '../../../../utils/validation.js';
14
+ import SpoCommand from '../../../base/SpoCommand.js';
15
+ import commands from '../../commands.js';
16
+ class SpoSiteAdminRemoveCommand extends SpoCommand {
17
+ get name() {
18
+ return commands.SITE_ADMIN_REMOVE;
19
+ }
20
+ get description() {
21
+ return 'Removes a user or group as site collection administrator';
22
+ }
23
+ constructor() {
24
+ super();
25
+ _SpoSiteAdminRemoveCommand_instances.add(this);
26
+ __classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initTelemetry).call(this);
27
+ __classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initOptions).call(this);
28
+ __classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initValidators).call(this);
29
+ __classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initOptionSets).call(this);
30
+ __classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initTypes).call(this);
31
+ }
32
+ async commandAction(logger, args) {
33
+ try {
34
+ if (!args.options.force) {
35
+ const principalToDelete = args.options.groupId || args.options.groupName ? 'group' : 'user';
36
+ const result = await cli.promptForConfirmation({ message: `Are you sure you want to remove specified ${principalToDelete} from the site administrators list ${args.options.siteUrl}?` });
37
+ if (!result) {
38
+ return;
39
+ }
40
+ }
41
+ const loginNameToRemove = await this.getCorrectLoginName(args.options);
42
+ if (args.options.asAdmin) {
43
+ await this.callActionAsAdmin(logger, args, loginNameToRemove);
44
+ return;
45
+ }
46
+ await this.callAction(logger, args, loginNameToRemove);
47
+ }
48
+ catch (err) {
49
+ this.handleRejectedODataJsonPromise(err);
50
+ }
51
+ }
52
+ async callActionAsAdmin(logger, args, loginNameToRemove) {
53
+ if (this.verbose) {
54
+ await logger.logToStderr('Removing site administrator as an administrator...');
55
+ }
56
+ const adminUrl = await spo.getSpoAdminUrl(logger, this.debug);
57
+ const siteId = await this.getSiteId(args.options.siteUrl, logger);
58
+ const primaryAdminLoginName = await spo.getPrimaryAdminLoginNameAsAdmin(adminUrl, siteId, logger, this.verbose);
59
+ if (loginNameToRemove === primaryAdminLoginName) {
60
+ throw 'You cannot remove the primary site collection administrator.';
61
+ }
62
+ const existingAdmins = await this.getSiteAdmins(adminUrl, siteId);
63
+ const adminsToSet = existingAdmins.filter(u => u.loginName.toLowerCase() !== loginNameToRemove.toLowerCase());
64
+ await this.setSiteAdminsAsAdmin(adminUrl, siteId, adminsToSet);
65
+ }
66
+ async getSiteId(siteUrl, logger) {
67
+ const siteGraphId = await spo.getSiteId(siteUrl, logger, this.verbose);
68
+ const match = siteGraphId.match(/,([a-f0-9\-]{36}),/i);
69
+ if (!match) {
70
+ throw `Site with URL ${siteUrl} not found`;
71
+ }
72
+ return match[1];
73
+ }
74
+ async getSiteAdmins(adminUrl, siteId) {
75
+ const requestOptions = {
76
+ url: `${adminUrl}/_api/SPO.Tenant/GetSiteAdministrators?siteId='${siteId}'`,
77
+ headers: {
78
+ accept: 'application/json;odata=nometadata',
79
+ 'content-type': 'application/json;charset=utf-8'
80
+ },
81
+ responseType: 'json'
82
+ };
83
+ const response = await request.post(requestOptions);
84
+ return response.value;
85
+ }
86
+ async getCorrectLoginName(options) {
87
+ if (options.userId || options.userName) {
88
+ const userPrincipalName = options.userName ? options.userName : await entraUser.getUpnByUserId(options.userId);
89
+ if (userPrincipalName) {
90
+ return `i:0#.f|membership|${userPrincipalName}`;
91
+ }
92
+ throw 'User not found.';
93
+ }
94
+ else {
95
+ const group = options.groupId ? await entraGroup.getGroupById(options.groupId) : await entraGroup.getGroupByDisplayName(options.groupName);
96
+ //for entra groups, M365 groups have an associated email and security groups don't
97
+ if (group?.mail) {
98
+ //M365 group is prefixed with c:0o.c|federateddirectoryclaimprovider
99
+ return `c:0o.c|federateddirectoryclaimprovider|${group.id}`;
100
+ }
101
+ else {
102
+ //security group is prefixed with c:0t.c|tenant
103
+ return `c:0t.c|tenant|${group?.id}`;
104
+ }
105
+ }
106
+ }
107
+ async setSiteAdminsAsAdmin(adminUrl, siteId, admins) {
108
+ const requestOptions = {
109
+ url: `${adminUrl}/_api/SPOInternalUseOnly.Tenant/SetSiteSecondaryAdministrators`,
110
+ headers: {
111
+ accept: 'application/json;odata=nometadata',
112
+ 'content-type': 'application/json;charset=utf-8'
113
+ },
114
+ data: {
115
+ secondaryAdministratorsFieldsData: {
116
+ siteId: siteId,
117
+ secondaryAdministratorLoginNames: admins.map(u => u.loginName)
118
+ }
119
+ },
120
+ responseType: 'json'
121
+ };
122
+ await request.post(requestOptions);
123
+ }
124
+ async callAction(logger, args, loginNameToRemove) {
125
+ if (this.verbose) {
126
+ await logger.logToStderr('Removing site administrator...');
127
+ }
128
+ const primaryOwnerLogin = await spo.getPrimaryOwnerLoginFromSite(args.options.siteUrl, logger, this.verbose);
129
+ if (loginNameToRemove === primaryOwnerLogin) {
130
+ throw 'You cannot remove the primary site collection administrator.';
131
+ }
132
+ const requestOptions = {
133
+ url: `${args.options.siteUrl}/_api/web/siteusers('${formatting.encodeQueryParameter(loginNameToRemove)}')`,
134
+ headers: {
135
+ 'accept': 'application/json',
136
+ 'X-Http-Method': 'MERGE',
137
+ 'If-Match': '*'
138
+ },
139
+ data: { IsSiteAdmin: false },
140
+ responseType: 'json'
141
+ };
142
+ await request.post(requestOptions);
143
+ }
144
+ }
145
+ _SpoSiteAdminRemoveCommand_instances = new WeakSet(), _SpoSiteAdminRemoveCommand_initTelemetry = function _SpoSiteAdminRemoveCommand_initTelemetry() {
146
+ this.telemetry.push((args) => {
147
+ Object.assign(this.telemetryProperties, {
148
+ userId: typeof args.options.userId !== 'undefined',
149
+ userName: typeof args.options.userName !== 'undefined',
150
+ groupId: typeof args.options.groupId !== 'undefined',
151
+ groupName: typeof args.options.groupName !== 'undefined',
152
+ force: !!args.options.force,
153
+ asAdmin: !!args.options.asAdmin
154
+ });
155
+ });
156
+ }, _SpoSiteAdminRemoveCommand_initOptions = function _SpoSiteAdminRemoveCommand_initOptions() {
157
+ this.options.unshift({
158
+ option: '-u, --siteUrl <siteUrl>'
159
+ }, {
160
+ option: '--userId [userId]'
161
+ }, {
162
+ option: '--userName [userName]'
163
+ }, {
164
+ option: '--groupId [groupId]'
165
+ }, {
166
+ option: '--groupName [groupName]'
167
+ }, {
168
+ option: '--asAdmin'
169
+ }, {
170
+ option: '-f, --force'
171
+ });
172
+ }, _SpoSiteAdminRemoveCommand_initValidators = function _SpoSiteAdminRemoveCommand_initValidators() {
173
+ this.validators.push(async (args) => {
174
+ if (args.options.userId &&
175
+ !validation.isValidGuid(args.options.userId)) {
176
+ return `${args.options.userId} is not a valid GUID`;
177
+ }
178
+ if (args.options.userName && !validation.isValidUserPrincipalName(args.options.userName)) {
179
+ return `${args.options.userName} is not a valid userName`;
180
+ }
181
+ if (args.options.groupId &&
182
+ !validation.isValidGuid(args.options.groupId)) {
183
+ return `${args.options.groupId} is not a valid GUID`;
184
+ }
185
+ return validation.isValidSharePointUrl(args.options.siteUrl);
186
+ });
187
+ }, _SpoSiteAdminRemoveCommand_initOptionSets = function _SpoSiteAdminRemoveCommand_initOptionSets() {
188
+ this.optionSets.push({ options: ['userId', 'userName', 'groupId', 'groupName'] });
189
+ }, _SpoSiteAdminRemoveCommand_initTypes = function _SpoSiteAdminRemoveCommand_initTypes() {
190
+ this.types.string.push('siteUrl', 'userId', 'userName', 'groupId', 'groupName');
191
+ this.types.boolean.push('force', 'asAdmin');
192
+ };
193
+ export default new SpoSiteAdminRemoveCommand();
194
+ //# sourceMappingURL=site-admin-remove.js.map
@@ -0,0 +1,68 @@
1
+ import SpoCommand from '../../../base/SpoCommand.js';
2
+ import { globalOptionsZod } from '../../../../Command.js';
3
+ import { z } from 'zod';
4
+ import { zod } from '../../../../utils/zod.js';
5
+ import commands from '../../commands.js';
6
+ import { validation } from '../../../../utils/validation.js';
7
+ import request from '../../../../request.js';
8
+ const options = globalOptionsZod
9
+ .extend({
10
+ siteUrl: zod.alias('u', z.string()
11
+ .refine(url => validation.isValidSharePointUrl(url) === true, url => ({
12
+ message: `'${url}' is not a valid SharePoint Online site URL.`
13
+ }))),
14
+ capability: z.enum(['full', 'limited', 'ownersOnly'])
15
+ })
16
+ .strict();
17
+ class SpoSiteSharingPermissionSetCommand extends SpoCommand {
18
+ get name() {
19
+ return commands.SITE_SHARINGPERMISSION_SET;
20
+ }
21
+ get description() {
22
+ return 'Controls how a site and its components can be shared';
23
+ }
24
+ get schema() {
25
+ return options;
26
+ }
27
+ async commandAction(logger, args) {
28
+ try {
29
+ if (this.verbose) {
30
+ await logger.logToStderr(`Updating sharing permissions for site '${args.options.siteUrl}'...`);
31
+ }
32
+ const { capability } = args.options;
33
+ if (this.verbose) {
34
+ await logger.logToStderr(`Updating site sharing permissions...`);
35
+ }
36
+ const requestOptionsWeb = {
37
+ url: `${args.options.siteUrl}/_api/Web`,
38
+ headers: {
39
+ accept: 'application/json;odata=nometadata'
40
+ },
41
+ responseType: 'json',
42
+ data: {
43
+ MembersCanShare: capability === 'full' || capability === 'limited'
44
+ }
45
+ };
46
+ await request.patch(requestOptionsWeb);
47
+ if (this.verbose) {
48
+ await logger.logToStderr(`Updating associated member group sharing permissions...`);
49
+ }
50
+ const requestOptionsMemberGroup = {
51
+ url: `${args.options.siteUrl}/_api/Web/AssociatedMemberGroup`,
52
+ headers: {
53
+ accept: 'application/json;odata=nometadata'
54
+ },
55
+ responseType: 'json',
56
+ data: {
57
+ AllowMembersEditMembership: capability === 'full'
58
+ }
59
+ };
60
+ await request.patch(requestOptionsMemberGroup);
61
+ }
62
+ catch (err) {
63
+ this.handleRejectedODataJsonPromise(err);
64
+ }
65
+ }
66
+ }
67
+ export default new SpoSiteSharingPermissionSetCommand();
68
+ //# sourceMappingURL=site-sharingpermission-set.js.map
@@ -247,6 +247,7 @@ export default {
247
247
  SITE_ADD: `${prefix} site add`,
248
248
  SITE_ADMIN_ADD: `${prefix} site admin add`,
249
249
  SITE_ADMIN_LIST: `${prefix} site admin list`,
250
+ SITE_ADMIN_REMOVE: `${prefix} site admin remove`,
250
251
  SITE_APPCATALOG_ADD: `${prefix} site appcatalog add`,
251
252
  SITE_APPCATALOG_LIST: `${prefix} site appcatalog list`,
252
253
  SITE_APPCATALOG_REMOVE: `${prefix} site appcatalog remove`,
@@ -272,6 +273,7 @@ export default {
272
273
  SITE_REMOVE: `${prefix} site remove`,
273
274
  SITE_RENAME: `${prefix} site rename`,
274
275
  SITE_SET: `${prefix} site set`,
276
+ SITE_SHARINGPERMISSION_SET: `${prefix} site sharingpermission set`,
275
277
  SITE_CHROME_SET: `${prefix} site chrome set`,
276
278
  SITEDESIGN_ADD: `${prefix} sitedesign add`,
277
279
  SITEDESIGN_APPLY: `${prefix} sitedesign apply`,
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=MeetingTranscript.js.map
@@ -0,0 +1,152 @@
1
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
2
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
3
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
4
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
5
+ };
6
+ var _TeamsMeetingTranscriptGetCommand_instances, _TeamsMeetingTranscriptGetCommand_initTelemetry, _TeamsMeetingTranscriptGetCommand_initOptions, _TeamsMeetingTranscriptGetCommand_initValidators, _TeamsMeetingTranscriptGetCommand_initOptionSets;
7
+ import auth from '../../../../Auth.js';
8
+ import request from '../../../../request.js';
9
+ import { entraUser } from '../../../../utils/entraUser.js';
10
+ import { accessToken } from '../../../../utils/accessToken.js';
11
+ import { validation } from '../../../../utils/validation.js';
12
+ import GraphCommand from '../../../base/GraphCommand.js';
13
+ import commands from '../../commands.js';
14
+ import fs from 'fs';
15
+ import path from 'path';
16
+ class TeamsMeetingTranscriptGetCommand extends GraphCommand {
17
+ get name() {
18
+ return commands.MEETING_TRANSCRIPT_GET;
19
+ }
20
+ get description() {
21
+ return 'Downloads a transcript for a given meeting';
22
+ }
23
+ constructor() {
24
+ super();
25
+ _TeamsMeetingTranscriptGetCommand_instances.add(this);
26
+ __classPrivateFieldGet(this, _TeamsMeetingTranscriptGetCommand_instances, "m", _TeamsMeetingTranscriptGetCommand_initTelemetry).call(this);
27
+ __classPrivateFieldGet(this, _TeamsMeetingTranscriptGetCommand_instances, "m", _TeamsMeetingTranscriptGetCommand_initOptions).call(this);
28
+ __classPrivateFieldGet(this, _TeamsMeetingTranscriptGetCommand_instances, "m", _TeamsMeetingTranscriptGetCommand_initValidators).call(this);
29
+ __classPrivateFieldGet(this, _TeamsMeetingTranscriptGetCommand_instances, "m", _TeamsMeetingTranscriptGetCommand_initOptionSets).call(this);
30
+ }
31
+ async commandAction(logger, args) {
32
+ try {
33
+ const isAppOnlyAccessToken = accessToken.isAppOnlyAccessToken(auth.connection.accessTokens[this.resource].accessToken);
34
+ if (this.verbose) {
35
+ await logger.logToStderr(`Retrieving transcript for the given meeting...`);
36
+ }
37
+ let requestUrl = `${this.resource}/beta/`;
38
+ if (isAppOnlyAccessToken) {
39
+ if (!args.options.userId && !args.options.userName && !args.options.email) {
40
+ throw `The option 'userId', 'userName' or 'email' is required when retrieving meeting transcript using app only permissions`;
41
+ }
42
+ requestUrl += 'users/';
43
+ if (args.options.userId) {
44
+ requestUrl += args.options.userId;
45
+ }
46
+ else if (args.options.userName) {
47
+ requestUrl += args.options.userName;
48
+ }
49
+ else if (args.options.email) {
50
+ if (this.verbose) {
51
+ await logger.logToStderr(`Getting user ID for user with email '${args.options.email}'.`);
52
+ }
53
+ const userId = await entraUser.getUserIdByEmail(args.options.email);
54
+ requestUrl += userId;
55
+ }
56
+ }
57
+ else {
58
+ if (args.options.userId || args.options.userName || args.options.email) {
59
+ throw `The options 'userId', 'userName', and 'email' cannot be used while retrieving meeting transcript using delegated permissions`;
60
+ }
61
+ requestUrl += `me`;
62
+ }
63
+ requestUrl += `/onlineMeetings/${args.options.meetingId}/transcripts/${args.options.id}`;
64
+ if (args.options.outputFile) {
65
+ requestUrl += '/content?$format=text/vtt';
66
+ }
67
+ const requestOptions = {
68
+ url: requestUrl,
69
+ headers: {
70
+ accept: 'application/json;odata.metadata=none'
71
+ },
72
+ responseType: args.options.outputFile ? 'stream' : 'json'
73
+ };
74
+ const meetingTranscript = await request.get(requestOptions);
75
+ if (meetingTranscript) {
76
+ if (args.options.outputFile) {
77
+ // Not possible to use async/await for this promise
78
+ await new Promise((resolve, reject) => {
79
+ const writer = fs.createWriteStream(args.options.outputFile);
80
+ meetingTranscript.data.pipe(writer);
81
+ writer.on('error', err => {
82
+ reject(err);
83
+ });
84
+ writer.on('close', async () => {
85
+ const filePath = args.options.outputFile;
86
+ if (this.verbose) {
87
+ await logger.logToStderr(`File saved to path ${filePath}`);
88
+ }
89
+ return resolve();
90
+ });
91
+ });
92
+ }
93
+ else {
94
+ await logger.log(meetingTranscript);
95
+ }
96
+ }
97
+ else {
98
+ throw `The specified meeting transcript was not found`;
99
+ }
100
+ }
101
+ catch (err) {
102
+ this.handleRejectedODataJsonPromise(err);
103
+ }
104
+ }
105
+ }
106
+ _TeamsMeetingTranscriptGetCommand_instances = new WeakSet(), _TeamsMeetingTranscriptGetCommand_initTelemetry = function _TeamsMeetingTranscriptGetCommand_initTelemetry() {
107
+ this.telemetry.push((args) => {
108
+ Object.assign(this.telemetryProperties, {
109
+ userId: typeof args.options.userId !== 'undefined',
110
+ userName: typeof args.options.userName !== 'undefined',
111
+ email: typeof args.options.email !== 'undefined',
112
+ outputFile: typeof args.options.outputFile !== 'undefined'
113
+ });
114
+ });
115
+ }, _TeamsMeetingTranscriptGetCommand_initOptions = function _TeamsMeetingTranscriptGetCommand_initOptions() {
116
+ this.options.unshift({
117
+ option: '-u, --userId [userId]'
118
+ }, {
119
+ option: '-n, --userName [userName]'
120
+ }, {
121
+ option: '--email [email]'
122
+ }, {
123
+ option: '-m, --meetingId <meetingId>'
124
+ }, {
125
+ option: '-i, --id <id>'
126
+ }, {
127
+ option: '-f, --outputFile [outputFile]'
128
+ });
129
+ }, _TeamsMeetingTranscriptGetCommand_initValidators = function _TeamsMeetingTranscriptGetCommand_initValidators() {
130
+ this.validators.push(async (args) => {
131
+ if (args.options.userId && !validation.isValidGuid(args.options.userId)) {
132
+ return `${args.options.userId} is not a valid Guid`;
133
+ }
134
+ if (args.options.userName && !validation.isValidUserPrincipalName(args.options.userName)) {
135
+ return `${args.options.userName} is not a valid user principal name (UPN)`;
136
+ }
137
+ if (args.options.email && !validation.isValidUserPrincipalName(args.options.email)) {
138
+ return `${args.options.email} is not a valid email`;
139
+ }
140
+ if (args.options.outputFile && !fs.existsSync(path.dirname(args.options.outputFile))) {
141
+ return 'Specified path where to save the file does not exits';
142
+ }
143
+ return true;
144
+ });
145
+ }, _TeamsMeetingTranscriptGetCommand_initOptionSets = function _TeamsMeetingTranscriptGetCommand_initOptionSets() {
146
+ this.optionSets.push({
147
+ options: ['userId', 'userName', 'email'],
148
+ runsWhen: (args) => args.options.userId || args.options.userName || args.options.email
149
+ });
150
+ };
151
+ export default new TeamsMeetingTranscriptGetCommand();
152
+ //# sourceMappingURL=meeting-transcript-get.js.map
@@ -32,6 +32,7 @@ export default {
32
32
  MEETING_LIST: `${prefix} meeting list`,
33
33
  MEETING_ATTENDANCEREPORT_GET: `${prefix} meeting attendancereport get`,
34
34
  MEETING_ATTENDANCEREPORT_LIST: `${prefix} meeting attendancereport list`,
35
+ MEETING_TRANSCRIPT_GET: `${prefix} meeting transcript get`,
35
36
  MEETING_TRANSCRIPT_LIST: `${prefix} meeting transcript list`,
36
37
  MEMBERSETTINGS_LIST: `${prefix} membersettings list`,
37
38
  MEMBERSETTINGS_SET: `${prefix} membersettings set`,
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=Community.js.map
@@ -0,0 +1,28 @@
1
+ import { odata } from '../../../../utils/odata.js';
2
+ import GraphCommand from '../../../base/GraphCommand.js';
3
+ import commands from '../../commands.js';
4
+ class VivaEngageCommunityListCommand extends GraphCommand {
5
+ get name() {
6
+ return commands.ENGAGE_COMMUNITY_LIST;
7
+ }
8
+ get description() {
9
+ return 'Lists all Viva Engage communities';
10
+ }
11
+ defaultProperties() {
12
+ return ['id', 'displayName', 'privacy'];
13
+ }
14
+ async commandAction(logger) {
15
+ if (this.verbose) {
16
+ await logger.logToStderr('Getting all Viva Engage communities...');
17
+ }
18
+ try {
19
+ const results = await odata.getAllItems(`${this.resource}/v1.0/employeeExperience/communities`);
20
+ await logger.log(results);
21
+ }
22
+ catch (err) {
23
+ this.handleRejectedODataJsonPromise(err);
24
+ }
25
+ }
26
+ }
27
+ export default new VivaEngageCommunityListCommand();
28
+ //# sourceMappingURL=engage-community-list.js.map
@@ -3,6 +3,7 @@ export default {
3
3
  CONNECTIONS_APP_CREATE: `${prefix} connections app create`,
4
4
  ENGAGE_COMMUNITY_ADD: `${prefix} engage community add`,
5
5
  ENGAGE_COMMUNITY_GET: `${prefix} engage community get`,
6
+ ENGAGE_COMMUNITY_LIST: `${prefix} engage community list`,
6
7
  ENGAGE_GROUP_LIST: `${prefix} engage group list`,
7
8
  ENGAGE_GROUP_USER_ADD: `${prefix} engage group user add`,
8
9
  ENGAGE_GROUP_USER_REMOVE: `${prefix} engage group user remove`,
package/dist/request.js CHANGED
@@ -4,6 +4,7 @@ import auth, { Auth } from './Auth.js';
4
4
  import { app } from './utils/app.js';
5
5
  import { formatting } from './utils/formatting.js';
6
6
  import { timings } from './cli/timings.js';
7
+ import { timersUtil } from './utils/timersUtil.js';
7
8
  class Request {
8
9
  set debug(debug) {
9
10
  // if the value to set is the same as current value return early to avoid
@@ -125,76 +126,60 @@ class Request {
125
126
  options.method = 'HEAD';
126
127
  return this.execute(options);
127
128
  }
128
- execute(options, resolve, reject) {
129
+ async execute(options) {
129
130
  const start = process.hrtime.bigint();
130
131
  if (!this._logger) {
131
- return Promise.reject('Logger not set on the request object');
132
+ throw 'Logger not set on the request object';
132
133
  }
133
134
  this.updateRequestForCloudType(options, auth.connection.cloudType);
134
- return new Promise((_resolve, _reject) => {
135
- (() => {
136
- if (options.headers && options.headers['x-anonymous']) {
137
- return Promise.resolve('');
138
- }
139
- else {
140
- const url = options.headers && options.headers['x-resource'] ? options.headers['x-resource'] : options.url;
141
- const resource = Auth.getResourceFromUrl(url);
142
- return auth.ensureAccessToken(resource, this._logger, this._debug);
143
- }
144
- })()
145
- .then((accessToken) => {
146
- if (options.headers) {
147
- if (options.headers['x-anonymous']) {
148
- delete options.headers['x-anonymous'];
149
- }
150
- if (options.headers['x-resource']) {
151
- delete options.headers['x-resource'];
152
- }
153
- if (accessToken !== '') {
154
- options.headers.authorization = `Bearer ${accessToken}`;
155
- }
156
- }
157
- const proxyUrl = process.env.HTTP_PROXY || process.env.HTTPS_PROXY;
158
- if (proxyUrl) {
159
- options.proxy = this.createProxyConfigFromUrl(proxyUrl);
135
+ try {
136
+ let accessToken = '';
137
+ if (options.headers && options.headers['x-anonymous']) {
138
+ accessToken = '';
139
+ }
140
+ else {
141
+ const url = options.headers && options.headers['x-resource'] ? options.headers['x-resource'] : options.url;
142
+ const resource = Auth.getResourceFromUrl(url);
143
+ accessToken = await auth.ensureAccessToken(resource, this._logger, this._debug);
144
+ }
145
+ if (options.headers) {
146
+ if (options.headers['x-anonymous']) {
147
+ delete options.headers['x-anonymous'];
160
148
  }
161
- return this.req(options);
162
- })
163
- .then((res) => {
164
- if (resolve) {
165
- resolve((options.responseType === 'stream' || options.fullResponse) ? res : res.data);
149
+ if (options.headers['x-resource']) {
150
+ delete options.headers['x-resource'];
166
151
  }
167
- else {
168
- const end = process.hrtime.bigint();
169
- timings.api.push(Number(end - start));
170
- _resolve((options.responseType === 'stream' || options.fullResponse) ? res : res.data);
152
+ if (accessToken !== '') {
153
+ options.headers.authorization = `Bearer ${accessToken}`;
171
154
  }
172
- }, async (error) => {
173
- if (error && error.response &&
174
- (error.response.status === 429 ||
175
- error.response.status === 503)) {
176
- let retryAfter = parseInt(error.response.headers['retry-after'] || '10');
177
- if (isNaN(retryAfter)) {
178
- retryAfter = 10;
179
- }
180
- if (this._debug) {
181
- await this._logger.log(`Request throttled. Waiting ${retryAfter}sec before retrying...`);
182
- }
183
- // eslint-disable-next-line @typescript-eslint/no-floating-promises
184
- setTimeout(async () => { this.execute(options, resolve || _resolve, reject || _reject); }, retryAfter * 1000);
155
+ }
156
+ const proxyUrl = process.env.HTTP_PROXY || process.env.HTTPS_PROXY;
157
+ if (proxyUrl) {
158
+ options.proxy = this.createProxyConfigFromUrl(proxyUrl);
159
+ }
160
+ const res = await this.req(options);
161
+ const end = process.hrtime.bigint();
162
+ timings.api.push(Number(end - start));
163
+ return options.responseType === 'stream' || options.fullResponse ?
164
+ res :
165
+ res.data;
166
+ }
167
+ catch (error) {
168
+ const end = process.hrtime.bigint();
169
+ timings.api.push(Number(end - start));
170
+ if (error && error.response && (error.response.status === 429 || error.response.status === 503)) {
171
+ let retryAfter = parseInt(error.response.headers['retry-after'] || '10');
172
+ if (isNaN(retryAfter)) {
173
+ retryAfter = 10;
185
174
  }
186
- else {
187
- if (reject) {
188
- reject(error);
189
- }
190
- else {
191
- const end = process.hrtime.bigint();
192
- timings.api.push(Number(end - start));
193
- _reject(error);
194
- }
175
+ if (this._debug) {
176
+ await this._logger.log(`Request throttled. Waiting ${retryAfter} sec before retrying...`);
195
177
  }
196
- });
197
- });
178
+ await timersUtil.setTimeout(retryAfter * 1000);
179
+ return this.execute(options);
180
+ }
181
+ throw error;
182
+ }
198
183
  }
199
184
  updateRequestForCloudType(options, cloudType) {
200
185
  const url = new URL(options.url);