@pnp/cli-microsoft365 9.1.0-beta.9a7d76f → 9.1.0-beta.d9b8f73
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/allCommands.json +1 -1
- package/allCommandsFull.json +1 -1
- package/dist/Auth.js +6 -4
- package/dist/AuthServer.js +7 -7
- package/dist/api.js +1 -1
- package/dist/config.js +1 -0
- package/dist/m365/external/commands/item/item-add.js +2 -5
- package/dist/m365/file/commands/file-move.js +135 -0
- package/dist/m365/file/commands.js +2 -1
- package/dist/m365/spfx/commands/project/project-doctor/doctor-1.20.0-rc.1.js +25 -0
- package/dist/m365/spfx/commands/project/project-doctor.js +2 -1
- package/dist/m365/spfx/commands/project/project-upgrade/upgrade-1.20.0-rc.1.js +57 -0
- package/dist/m365/spfx/commands/project/project-upgrade.js +16 -13
- package/dist/m365/spfx/commands/spfx-doctor.js +15 -0
- package/dist/m365/spo/commands/site/site-admin-list.js +8 -9
- package/dist/m365/spo/commands/site/site-admin-remove.js +194 -0
- package/dist/m365/spo/commands.js +1 -0
- package/dist/m365/teams/MeetingTranscript.js +2 -0
- package/dist/m365/teams/commands/meeting/meeting-transcript-get.js +152 -0
- package/dist/m365/teams/commands.js +1 -0
- package/dist/m365/viva/commands/engage/Community.js +2 -0
- package/dist/m365/viva/commands/engage/engage-community-list.js +28 -0
- package/dist/m365/viva/commands.js +1 -0
- package/dist/request.js +46 -61
- package/dist/utils/driveUtil.js +51 -0
- package/dist/utils/spo.js +5 -7
- package/dist/utils/timersUtil.js +12 -0
- package/docs/docs/cmd/entra/m365group/m365group-report-activitystorage.mdx +2 -2
- package/docs/docs/cmd/external/item/item-add.mdx +3 -3
- package/docs/docs/cmd/file/file-move.mdx +79 -0
- package/docs/docs/cmd/spo/cdn/cdn-get.mdx +1 -1
- package/docs/docs/cmd/spo/cdn/cdn-origin-add.mdx +1 -1
- package/docs/docs/cmd/spo/cdn/cdn-origin-list.mdx +1 -1
- package/docs/docs/cmd/spo/cdn/cdn-origin-remove.mdx +1 -1
- package/docs/docs/cmd/spo/cdn/cdn-policy-list.mdx +1 -1
- package/docs/docs/cmd/spo/cdn/cdn-policy-set.mdx +1 -1
- package/docs/docs/cmd/spo/externaluser/externaluser-list.mdx +1 -1
- package/docs/docs/cmd/spo/hidedefaultthemes/hidedefaultthemes-get.mdx +1 -1
- package/docs/docs/cmd/spo/hidedefaultthemes/hidedefaultthemes-set.mdx +1 -1
- package/docs/docs/cmd/spo/homesite/homesite-remove.mdx +1 -1
- package/docs/docs/cmd/spo/knowledgehub/knowledgehub-get.mdx +1 -1
- package/docs/docs/cmd/spo/knowledgehub/knowledgehub-remove.mdx +1 -1
- package/docs/docs/cmd/spo/knowledgehub/knowledgehub-set.mdx +1 -1
- package/docs/docs/cmd/spo/orgassetslibrary/orgassetslibrary-add.mdx +1 -1
- package/docs/docs/cmd/spo/orgassetslibrary/orgassetslibrary-list.mdx +1 -1
- package/docs/docs/cmd/spo/orgassetslibrary/orgassetslibrary-remove.mdx +1 -1
- package/docs/docs/cmd/spo/orgnewssite/orgnewssite-list.mdx +1 -1
- package/docs/docs/cmd/spo/orgnewssite/orgnewssite-remove.mdx +1 -1
- package/docs/docs/cmd/spo/orgnewssite/orgnewssite-set.mdx +1 -1
- package/docs/docs/cmd/spo/site/site-admin-add.mdx +2 -2
- package/docs/docs/cmd/spo/site/site-admin-list.mdx +64 -12
- package/docs/docs/cmd/spo/site/site-admin-remove.mdx +67 -0
- package/docs/docs/cmd/spo/site/site-appcatalog-add.mdx +1 -1
- package/docs/docs/cmd/spo/site/site-appcatalog-remove.mdx +1 -1
- package/docs/docs/cmd/spo/site/site-commsite-enable.mdx +1 -1
- package/docs/docs/cmd/spo/site/site-list.mdx +6 -4
- package/docs/docs/cmd/spo/site/site-set.mdx +1 -1
- package/docs/docs/cmd/spo/storageentity/storageentity-remove.mdx +1 -1
- package/docs/docs/cmd/spo/storageentity/storageentity-set.mdx +1 -1
- package/docs/docs/cmd/spo/tenant/tenant-appcatalog-add.mdx +1 -1
- package/docs/docs/cmd/spo/tenant/tenant-appcatalogurl-get.mdx +1 -1
- package/docs/docs/cmd/spo/tenant/tenant-recyclebinitem-list.mdx +1 -1
- package/docs/docs/cmd/spo/tenant/tenant-recyclebinitem-remove.mdx +1 -1
- package/docs/docs/cmd/spo/tenant/tenant-settings-list.mdx +1 -1
- package/docs/docs/cmd/spo/theme/theme-apply.mdx +1 -1
- package/docs/docs/cmd/spo/theme/theme-get.mdx +1 -1
- package/docs/docs/cmd/spo/theme/theme-list.mdx +1 -1
- package/docs/docs/cmd/spo/theme/theme-remove.mdx +1 -1
- package/docs/docs/cmd/spo/theme/theme-set.mdx +1 -1
- package/docs/docs/cmd/spp/contentcenter/contentcenter-list.mdx +3 -5
- package/docs/docs/cmd/teams/meeting/meeting-transcript-get.mdx +132 -0
- package/docs/docs/cmd/viva/engage/engage-community-list.mdx +81 -0
- package/package.json +1 -1
|
@@ -0,0 +1,194 @@
|
|
|
1
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
2
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
3
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
4
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
5
|
+
};
|
|
6
|
+
var _SpoSiteAdminRemoveCommand_instances, _SpoSiteAdminRemoveCommand_initTelemetry, _SpoSiteAdminRemoveCommand_initOptions, _SpoSiteAdminRemoveCommand_initValidators, _SpoSiteAdminRemoveCommand_initOptionSets, _SpoSiteAdminRemoveCommand_initTypes;
|
|
7
|
+
import { cli } from '../../../../cli/cli.js';
|
|
8
|
+
import request from '../../../../request.js';
|
|
9
|
+
import { entraGroup } from '../../../../utils/entraGroup.js';
|
|
10
|
+
import { entraUser } from '../../../../utils/entraUser.js';
|
|
11
|
+
import { formatting } from '../../../../utils/formatting.js';
|
|
12
|
+
import { spo } from '../../../../utils/spo.js';
|
|
13
|
+
import { validation } from '../../../../utils/validation.js';
|
|
14
|
+
import SpoCommand from '../../../base/SpoCommand.js';
|
|
15
|
+
import commands from '../../commands.js';
|
|
16
|
+
class SpoSiteAdminRemoveCommand extends SpoCommand {
|
|
17
|
+
get name() {
|
|
18
|
+
return commands.SITE_ADMIN_REMOVE;
|
|
19
|
+
}
|
|
20
|
+
get description() {
|
|
21
|
+
return 'Removes a user or group as site collection administrator';
|
|
22
|
+
}
|
|
23
|
+
constructor() {
|
|
24
|
+
super();
|
|
25
|
+
_SpoSiteAdminRemoveCommand_instances.add(this);
|
|
26
|
+
__classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initTelemetry).call(this);
|
|
27
|
+
__classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initOptions).call(this);
|
|
28
|
+
__classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initValidators).call(this);
|
|
29
|
+
__classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initOptionSets).call(this);
|
|
30
|
+
__classPrivateFieldGet(this, _SpoSiteAdminRemoveCommand_instances, "m", _SpoSiteAdminRemoveCommand_initTypes).call(this);
|
|
31
|
+
}
|
|
32
|
+
async commandAction(logger, args) {
|
|
33
|
+
try {
|
|
34
|
+
if (!args.options.force) {
|
|
35
|
+
const principalToDelete = args.options.groupId || args.options.groupName ? 'group' : 'user';
|
|
36
|
+
const result = await cli.promptForConfirmation({ message: `Are you sure you want to remove specified ${principalToDelete} from the site administrators list ${args.options.siteUrl}?` });
|
|
37
|
+
if (!result) {
|
|
38
|
+
return;
|
|
39
|
+
}
|
|
40
|
+
}
|
|
41
|
+
const loginNameToRemove = await this.getCorrectLoginName(args.options);
|
|
42
|
+
if (args.options.asAdmin) {
|
|
43
|
+
await this.callActionAsAdmin(logger, args, loginNameToRemove);
|
|
44
|
+
return;
|
|
45
|
+
}
|
|
46
|
+
await this.callAction(logger, args, loginNameToRemove);
|
|
47
|
+
}
|
|
48
|
+
catch (err) {
|
|
49
|
+
this.handleRejectedODataJsonPromise(err);
|
|
50
|
+
}
|
|
51
|
+
}
|
|
52
|
+
async callActionAsAdmin(logger, args, loginNameToRemove) {
|
|
53
|
+
if (this.verbose) {
|
|
54
|
+
await logger.logToStderr('Removing site administrator as an administrator...');
|
|
55
|
+
}
|
|
56
|
+
const adminUrl = await spo.getSpoAdminUrl(logger, this.debug);
|
|
57
|
+
const siteId = await this.getSiteId(args.options.siteUrl, logger);
|
|
58
|
+
const primaryAdminLoginName = await spo.getPrimaryAdminLoginNameAsAdmin(adminUrl, siteId, logger, this.verbose);
|
|
59
|
+
if (loginNameToRemove === primaryAdminLoginName) {
|
|
60
|
+
throw 'You cannot remove the primary site collection administrator.';
|
|
61
|
+
}
|
|
62
|
+
const existingAdmins = await this.getSiteAdmins(adminUrl, siteId);
|
|
63
|
+
const adminsToSet = existingAdmins.filter(u => u.loginName.toLowerCase() !== loginNameToRemove.toLowerCase());
|
|
64
|
+
await this.setSiteAdminsAsAdmin(adminUrl, siteId, adminsToSet);
|
|
65
|
+
}
|
|
66
|
+
async getSiteId(siteUrl, logger) {
|
|
67
|
+
const siteGraphId = await spo.getSiteId(siteUrl, logger, this.verbose);
|
|
68
|
+
const match = siteGraphId.match(/,([a-f0-9\-]{36}),/i);
|
|
69
|
+
if (!match) {
|
|
70
|
+
throw `Site with URL ${siteUrl} not found`;
|
|
71
|
+
}
|
|
72
|
+
return match[1];
|
|
73
|
+
}
|
|
74
|
+
async getSiteAdmins(adminUrl, siteId) {
|
|
75
|
+
const requestOptions = {
|
|
76
|
+
url: `${adminUrl}/_api/SPO.Tenant/GetSiteAdministrators?siteId='${siteId}'`,
|
|
77
|
+
headers: {
|
|
78
|
+
accept: 'application/json;odata=nometadata',
|
|
79
|
+
'content-type': 'application/json;charset=utf-8'
|
|
80
|
+
},
|
|
81
|
+
responseType: 'json'
|
|
82
|
+
};
|
|
83
|
+
const response = await request.post(requestOptions);
|
|
84
|
+
return response.value;
|
|
85
|
+
}
|
|
86
|
+
async getCorrectLoginName(options) {
|
|
87
|
+
if (options.userId || options.userName) {
|
|
88
|
+
const userPrincipalName = options.userName ? options.userName : await entraUser.getUpnByUserId(options.userId);
|
|
89
|
+
if (userPrincipalName) {
|
|
90
|
+
return `i:0#.f|membership|${userPrincipalName}`;
|
|
91
|
+
}
|
|
92
|
+
throw 'User not found.';
|
|
93
|
+
}
|
|
94
|
+
else {
|
|
95
|
+
const group = options.groupId ? await entraGroup.getGroupById(options.groupId) : await entraGroup.getGroupByDisplayName(options.groupName);
|
|
96
|
+
//for entra groups, M365 groups have an associated email and security groups don't
|
|
97
|
+
if (group?.mail) {
|
|
98
|
+
//M365 group is prefixed with c:0o.c|federateddirectoryclaimprovider
|
|
99
|
+
return `c:0o.c|federateddirectoryclaimprovider|${group.id}`;
|
|
100
|
+
}
|
|
101
|
+
else {
|
|
102
|
+
//security group is prefixed with c:0t.c|tenant
|
|
103
|
+
return `c:0t.c|tenant|${group?.id}`;
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
async setSiteAdminsAsAdmin(adminUrl, siteId, admins) {
|
|
108
|
+
const requestOptions = {
|
|
109
|
+
url: `${adminUrl}/_api/SPOInternalUseOnly.Tenant/SetSiteSecondaryAdministrators`,
|
|
110
|
+
headers: {
|
|
111
|
+
accept: 'application/json;odata=nometadata',
|
|
112
|
+
'content-type': 'application/json;charset=utf-8'
|
|
113
|
+
},
|
|
114
|
+
data: {
|
|
115
|
+
secondaryAdministratorsFieldsData: {
|
|
116
|
+
siteId: siteId,
|
|
117
|
+
secondaryAdministratorLoginNames: admins.map(u => u.loginName)
|
|
118
|
+
}
|
|
119
|
+
},
|
|
120
|
+
responseType: 'json'
|
|
121
|
+
};
|
|
122
|
+
await request.post(requestOptions);
|
|
123
|
+
}
|
|
124
|
+
async callAction(logger, args, loginNameToRemove) {
|
|
125
|
+
if (this.verbose) {
|
|
126
|
+
await logger.logToStderr('Removing site administrator...');
|
|
127
|
+
}
|
|
128
|
+
const primaryOwnerLogin = await spo.getPrimaryOwnerLoginFromSite(args.options.siteUrl, logger, this.verbose);
|
|
129
|
+
if (loginNameToRemove === primaryOwnerLogin) {
|
|
130
|
+
throw 'You cannot remove the primary site collection administrator.';
|
|
131
|
+
}
|
|
132
|
+
const requestOptions = {
|
|
133
|
+
url: `${args.options.siteUrl}/_api/web/siteusers('${formatting.encodeQueryParameter(loginNameToRemove)}')`,
|
|
134
|
+
headers: {
|
|
135
|
+
'accept': 'application/json',
|
|
136
|
+
'X-Http-Method': 'MERGE',
|
|
137
|
+
'If-Match': '*'
|
|
138
|
+
},
|
|
139
|
+
data: { IsSiteAdmin: false },
|
|
140
|
+
responseType: 'json'
|
|
141
|
+
};
|
|
142
|
+
await request.post(requestOptions);
|
|
143
|
+
}
|
|
144
|
+
}
|
|
145
|
+
_SpoSiteAdminRemoveCommand_instances = new WeakSet(), _SpoSiteAdminRemoveCommand_initTelemetry = function _SpoSiteAdminRemoveCommand_initTelemetry() {
|
|
146
|
+
this.telemetry.push((args) => {
|
|
147
|
+
Object.assign(this.telemetryProperties, {
|
|
148
|
+
userId: typeof args.options.userId !== 'undefined',
|
|
149
|
+
userName: typeof args.options.userName !== 'undefined',
|
|
150
|
+
groupId: typeof args.options.groupId !== 'undefined',
|
|
151
|
+
groupName: typeof args.options.groupName !== 'undefined',
|
|
152
|
+
force: !!args.options.force,
|
|
153
|
+
asAdmin: !!args.options.asAdmin
|
|
154
|
+
});
|
|
155
|
+
});
|
|
156
|
+
}, _SpoSiteAdminRemoveCommand_initOptions = function _SpoSiteAdminRemoveCommand_initOptions() {
|
|
157
|
+
this.options.unshift({
|
|
158
|
+
option: '-u, --siteUrl <siteUrl>'
|
|
159
|
+
}, {
|
|
160
|
+
option: '--userId [userId]'
|
|
161
|
+
}, {
|
|
162
|
+
option: '--userName [userName]'
|
|
163
|
+
}, {
|
|
164
|
+
option: '--groupId [groupId]'
|
|
165
|
+
}, {
|
|
166
|
+
option: '--groupName [groupName]'
|
|
167
|
+
}, {
|
|
168
|
+
option: '--asAdmin'
|
|
169
|
+
}, {
|
|
170
|
+
option: '-f, --force'
|
|
171
|
+
});
|
|
172
|
+
}, _SpoSiteAdminRemoveCommand_initValidators = function _SpoSiteAdminRemoveCommand_initValidators() {
|
|
173
|
+
this.validators.push(async (args) => {
|
|
174
|
+
if (args.options.userId &&
|
|
175
|
+
!validation.isValidGuid(args.options.userId)) {
|
|
176
|
+
return `${args.options.userId} is not a valid GUID`;
|
|
177
|
+
}
|
|
178
|
+
if (args.options.userName && !validation.isValidUserPrincipalName(args.options.userName)) {
|
|
179
|
+
return `${args.options.userName} is not a valid userName`;
|
|
180
|
+
}
|
|
181
|
+
if (args.options.groupId &&
|
|
182
|
+
!validation.isValidGuid(args.options.groupId)) {
|
|
183
|
+
return `${args.options.groupId} is not a valid GUID`;
|
|
184
|
+
}
|
|
185
|
+
return validation.isValidSharePointUrl(args.options.siteUrl);
|
|
186
|
+
});
|
|
187
|
+
}, _SpoSiteAdminRemoveCommand_initOptionSets = function _SpoSiteAdminRemoveCommand_initOptionSets() {
|
|
188
|
+
this.optionSets.push({ options: ['userId', 'userName', 'groupId', 'groupName'] });
|
|
189
|
+
}, _SpoSiteAdminRemoveCommand_initTypes = function _SpoSiteAdminRemoveCommand_initTypes() {
|
|
190
|
+
this.types.string.push('siteUrl', 'userId', 'userName', 'groupId', 'groupName');
|
|
191
|
+
this.types.boolean.push('force', 'asAdmin');
|
|
192
|
+
};
|
|
193
|
+
export default new SpoSiteAdminRemoveCommand();
|
|
194
|
+
//# sourceMappingURL=site-admin-remove.js.map
|
|
@@ -247,6 +247,7 @@ export default {
|
|
|
247
247
|
SITE_ADD: `${prefix} site add`,
|
|
248
248
|
SITE_ADMIN_ADD: `${prefix} site admin add`,
|
|
249
249
|
SITE_ADMIN_LIST: `${prefix} site admin list`,
|
|
250
|
+
SITE_ADMIN_REMOVE: `${prefix} site admin remove`,
|
|
250
251
|
SITE_APPCATALOG_ADD: `${prefix} site appcatalog add`,
|
|
251
252
|
SITE_APPCATALOG_LIST: `${prefix} site appcatalog list`,
|
|
252
253
|
SITE_APPCATALOG_REMOVE: `${prefix} site appcatalog remove`,
|
|
@@ -0,0 +1,152 @@
|
|
|
1
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
2
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
3
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
4
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
5
|
+
};
|
|
6
|
+
var _TeamsMeetingTranscriptGetCommand_instances, _TeamsMeetingTranscriptGetCommand_initTelemetry, _TeamsMeetingTranscriptGetCommand_initOptions, _TeamsMeetingTranscriptGetCommand_initValidators, _TeamsMeetingTranscriptGetCommand_initOptionSets;
|
|
7
|
+
import auth from '../../../../Auth.js';
|
|
8
|
+
import request from '../../../../request.js';
|
|
9
|
+
import { entraUser } from '../../../../utils/entraUser.js';
|
|
10
|
+
import { accessToken } from '../../../../utils/accessToken.js';
|
|
11
|
+
import { validation } from '../../../../utils/validation.js';
|
|
12
|
+
import GraphCommand from '../../../base/GraphCommand.js';
|
|
13
|
+
import commands from '../../commands.js';
|
|
14
|
+
import fs from 'fs';
|
|
15
|
+
import path from 'path';
|
|
16
|
+
class TeamsMeetingTranscriptGetCommand extends GraphCommand {
|
|
17
|
+
get name() {
|
|
18
|
+
return commands.MEETING_TRANSCRIPT_GET;
|
|
19
|
+
}
|
|
20
|
+
get description() {
|
|
21
|
+
return 'Downloads a transcript for a given meeting';
|
|
22
|
+
}
|
|
23
|
+
constructor() {
|
|
24
|
+
super();
|
|
25
|
+
_TeamsMeetingTranscriptGetCommand_instances.add(this);
|
|
26
|
+
__classPrivateFieldGet(this, _TeamsMeetingTranscriptGetCommand_instances, "m", _TeamsMeetingTranscriptGetCommand_initTelemetry).call(this);
|
|
27
|
+
__classPrivateFieldGet(this, _TeamsMeetingTranscriptGetCommand_instances, "m", _TeamsMeetingTranscriptGetCommand_initOptions).call(this);
|
|
28
|
+
__classPrivateFieldGet(this, _TeamsMeetingTranscriptGetCommand_instances, "m", _TeamsMeetingTranscriptGetCommand_initValidators).call(this);
|
|
29
|
+
__classPrivateFieldGet(this, _TeamsMeetingTranscriptGetCommand_instances, "m", _TeamsMeetingTranscriptGetCommand_initOptionSets).call(this);
|
|
30
|
+
}
|
|
31
|
+
async commandAction(logger, args) {
|
|
32
|
+
try {
|
|
33
|
+
const isAppOnlyAccessToken = accessToken.isAppOnlyAccessToken(auth.connection.accessTokens[this.resource].accessToken);
|
|
34
|
+
if (this.verbose) {
|
|
35
|
+
await logger.logToStderr(`Retrieving transcript for the given meeting...`);
|
|
36
|
+
}
|
|
37
|
+
let requestUrl = `${this.resource}/beta/`;
|
|
38
|
+
if (isAppOnlyAccessToken) {
|
|
39
|
+
if (!args.options.userId && !args.options.userName && !args.options.email) {
|
|
40
|
+
throw `The option 'userId', 'userName' or 'email' is required when retrieving meeting transcript using app only permissions`;
|
|
41
|
+
}
|
|
42
|
+
requestUrl += 'users/';
|
|
43
|
+
if (args.options.userId) {
|
|
44
|
+
requestUrl += args.options.userId;
|
|
45
|
+
}
|
|
46
|
+
else if (args.options.userName) {
|
|
47
|
+
requestUrl += args.options.userName;
|
|
48
|
+
}
|
|
49
|
+
else if (args.options.email) {
|
|
50
|
+
if (this.verbose) {
|
|
51
|
+
await logger.logToStderr(`Getting user ID for user with email '${args.options.email}'.`);
|
|
52
|
+
}
|
|
53
|
+
const userId = await entraUser.getUserIdByEmail(args.options.email);
|
|
54
|
+
requestUrl += userId;
|
|
55
|
+
}
|
|
56
|
+
}
|
|
57
|
+
else {
|
|
58
|
+
if (args.options.userId || args.options.userName || args.options.email) {
|
|
59
|
+
throw `The options 'userId', 'userName', and 'email' cannot be used while retrieving meeting transcript using delegated permissions`;
|
|
60
|
+
}
|
|
61
|
+
requestUrl += `me`;
|
|
62
|
+
}
|
|
63
|
+
requestUrl += `/onlineMeetings/${args.options.meetingId}/transcripts/${args.options.id}`;
|
|
64
|
+
if (args.options.outputFile) {
|
|
65
|
+
requestUrl += '/content?$format=text/vtt';
|
|
66
|
+
}
|
|
67
|
+
const requestOptions = {
|
|
68
|
+
url: requestUrl,
|
|
69
|
+
headers: {
|
|
70
|
+
accept: 'application/json;odata.metadata=none'
|
|
71
|
+
},
|
|
72
|
+
responseType: args.options.outputFile ? 'stream' : 'json'
|
|
73
|
+
};
|
|
74
|
+
const meetingTranscript = await request.get(requestOptions);
|
|
75
|
+
if (meetingTranscript) {
|
|
76
|
+
if (args.options.outputFile) {
|
|
77
|
+
// Not possible to use async/await for this promise
|
|
78
|
+
await new Promise((resolve, reject) => {
|
|
79
|
+
const writer = fs.createWriteStream(args.options.outputFile);
|
|
80
|
+
meetingTranscript.data.pipe(writer);
|
|
81
|
+
writer.on('error', err => {
|
|
82
|
+
reject(err);
|
|
83
|
+
});
|
|
84
|
+
writer.on('close', async () => {
|
|
85
|
+
const filePath = args.options.outputFile;
|
|
86
|
+
if (this.verbose) {
|
|
87
|
+
await logger.logToStderr(`File saved to path ${filePath}`);
|
|
88
|
+
}
|
|
89
|
+
return resolve();
|
|
90
|
+
});
|
|
91
|
+
});
|
|
92
|
+
}
|
|
93
|
+
else {
|
|
94
|
+
await logger.log(meetingTranscript);
|
|
95
|
+
}
|
|
96
|
+
}
|
|
97
|
+
else {
|
|
98
|
+
throw `The specified meeting transcript was not found`;
|
|
99
|
+
}
|
|
100
|
+
}
|
|
101
|
+
catch (err) {
|
|
102
|
+
this.handleRejectedODataJsonPromise(err);
|
|
103
|
+
}
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
_TeamsMeetingTranscriptGetCommand_instances = new WeakSet(), _TeamsMeetingTranscriptGetCommand_initTelemetry = function _TeamsMeetingTranscriptGetCommand_initTelemetry() {
|
|
107
|
+
this.telemetry.push((args) => {
|
|
108
|
+
Object.assign(this.telemetryProperties, {
|
|
109
|
+
userId: typeof args.options.userId !== 'undefined',
|
|
110
|
+
userName: typeof args.options.userName !== 'undefined',
|
|
111
|
+
email: typeof args.options.email !== 'undefined',
|
|
112
|
+
outputFile: typeof args.options.outputFile !== 'undefined'
|
|
113
|
+
});
|
|
114
|
+
});
|
|
115
|
+
}, _TeamsMeetingTranscriptGetCommand_initOptions = function _TeamsMeetingTranscriptGetCommand_initOptions() {
|
|
116
|
+
this.options.unshift({
|
|
117
|
+
option: '-u, --userId [userId]'
|
|
118
|
+
}, {
|
|
119
|
+
option: '-n, --userName [userName]'
|
|
120
|
+
}, {
|
|
121
|
+
option: '--email [email]'
|
|
122
|
+
}, {
|
|
123
|
+
option: '-m, --meetingId <meetingId>'
|
|
124
|
+
}, {
|
|
125
|
+
option: '-i, --id <id>'
|
|
126
|
+
}, {
|
|
127
|
+
option: '-f, --outputFile [outputFile]'
|
|
128
|
+
});
|
|
129
|
+
}, _TeamsMeetingTranscriptGetCommand_initValidators = function _TeamsMeetingTranscriptGetCommand_initValidators() {
|
|
130
|
+
this.validators.push(async (args) => {
|
|
131
|
+
if (args.options.userId && !validation.isValidGuid(args.options.userId)) {
|
|
132
|
+
return `${args.options.userId} is not a valid Guid`;
|
|
133
|
+
}
|
|
134
|
+
if (args.options.userName && !validation.isValidUserPrincipalName(args.options.userName)) {
|
|
135
|
+
return `${args.options.userName} is not a valid user principal name (UPN)`;
|
|
136
|
+
}
|
|
137
|
+
if (args.options.email && !validation.isValidUserPrincipalName(args.options.email)) {
|
|
138
|
+
return `${args.options.email} is not a valid email`;
|
|
139
|
+
}
|
|
140
|
+
if (args.options.outputFile && !fs.existsSync(path.dirname(args.options.outputFile))) {
|
|
141
|
+
return 'Specified path where to save the file does not exits';
|
|
142
|
+
}
|
|
143
|
+
return true;
|
|
144
|
+
});
|
|
145
|
+
}, _TeamsMeetingTranscriptGetCommand_initOptionSets = function _TeamsMeetingTranscriptGetCommand_initOptionSets() {
|
|
146
|
+
this.optionSets.push({
|
|
147
|
+
options: ['userId', 'userName', 'email'],
|
|
148
|
+
runsWhen: (args) => args.options.userId || args.options.userName || args.options.email
|
|
149
|
+
});
|
|
150
|
+
};
|
|
151
|
+
export default new TeamsMeetingTranscriptGetCommand();
|
|
152
|
+
//# sourceMappingURL=meeting-transcript-get.js.map
|
|
@@ -32,6 +32,7 @@ export default {
|
|
|
32
32
|
MEETING_LIST: `${prefix} meeting list`,
|
|
33
33
|
MEETING_ATTENDANCEREPORT_GET: `${prefix} meeting attendancereport get`,
|
|
34
34
|
MEETING_ATTENDANCEREPORT_LIST: `${prefix} meeting attendancereport list`,
|
|
35
|
+
MEETING_TRANSCRIPT_GET: `${prefix} meeting transcript get`,
|
|
35
36
|
MEETING_TRANSCRIPT_LIST: `${prefix} meeting transcript list`,
|
|
36
37
|
MEMBERSETTINGS_LIST: `${prefix} membersettings list`,
|
|
37
38
|
MEMBERSETTINGS_SET: `${prefix} membersettings set`,
|
|
@@ -0,0 +1,28 @@
|
|
|
1
|
+
import { odata } from '../../../../utils/odata.js';
|
|
2
|
+
import GraphCommand from '../../../base/GraphCommand.js';
|
|
3
|
+
import commands from '../../commands.js';
|
|
4
|
+
class VivaEngageCommunityListCommand extends GraphCommand {
|
|
5
|
+
get name() {
|
|
6
|
+
return commands.ENGAGE_COMMUNITY_LIST;
|
|
7
|
+
}
|
|
8
|
+
get description() {
|
|
9
|
+
return 'Lists all Viva Engage communities';
|
|
10
|
+
}
|
|
11
|
+
defaultProperties() {
|
|
12
|
+
return ['id', 'displayName', 'privacy'];
|
|
13
|
+
}
|
|
14
|
+
async commandAction(logger) {
|
|
15
|
+
if (this.verbose) {
|
|
16
|
+
await logger.logToStderr('Getting all Viva Engage communities...');
|
|
17
|
+
}
|
|
18
|
+
try {
|
|
19
|
+
const results = await odata.getAllItems(`${this.resource}/v1.0/employeeExperience/communities`);
|
|
20
|
+
await logger.log(results);
|
|
21
|
+
}
|
|
22
|
+
catch (err) {
|
|
23
|
+
this.handleRejectedODataJsonPromise(err);
|
|
24
|
+
}
|
|
25
|
+
}
|
|
26
|
+
}
|
|
27
|
+
export default new VivaEngageCommunityListCommand();
|
|
28
|
+
//# sourceMappingURL=engage-community-list.js.map
|
|
@@ -3,6 +3,7 @@ export default {
|
|
|
3
3
|
CONNECTIONS_APP_CREATE: `${prefix} connections app create`,
|
|
4
4
|
ENGAGE_COMMUNITY_ADD: `${prefix} engage community add`,
|
|
5
5
|
ENGAGE_COMMUNITY_GET: `${prefix} engage community get`,
|
|
6
|
+
ENGAGE_COMMUNITY_LIST: `${prefix} engage community list`,
|
|
6
7
|
ENGAGE_GROUP_LIST: `${prefix} engage group list`,
|
|
7
8
|
ENGAGE_GROUP_USER_ADD: `${prefix} engage group user add`,
|
|
8
9
|
ENGAGE_GROUP_USER_REMOVE: `${prefix} engage group user remove`,
|
package/dist/request.js
CHANGED
|
@@ -4,6 +4,7 @@ import auth, { Auth } from './Auth.js';
|
|
|
4
4
|
import { app } from './utils/app.js';
|
|
5
5
|
import { formatting } from './utils/formatting.js';
|
|
6
6
|
import { timings } from './cli/timings.js';
|
|
7
|
+
import { timersUtil } from './utils/timersUtil.js';
|
|
7
8
|
class Request {
|
|
8
9
|
set debug(debug) {
|
|
9
10
|
// if the value to set is the same as current value return early to avoid
|
|
@@ -125,76 +126,60 @@ class Request {
|
|
|
125
126
|
options.method = 'HEAD';
|
|
126
127
|
return this.execute(options);
|
|
127
128
|
}
|
|
128
|
-
execute(options
|
|
129
|
+
async execute(options) {
|
|
129
130
|
const start = process.hrtime.bigint();
|
|
130
131
|
if (!this._logger) {
|
|
131
|
-
|
|
132
|
+
throw 'Logger not set on the request object';
|
|
132
133
|
}
|
|
133
134
|
this.updateRequestForCloudType(options, auth.connection.cloudType);
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
.
|
|
146
|
-
|
|
147
|
-
if (options.headers['x-anonymous']) {
|
|
148
|
-
delete options.headers['x-anonymous'];
|
|
149
|
-
}
|
|
150
|
-
if (options.headers['x-resource']) {
|
|
151
|
-
delete options.headers['x-resource'];
|
|
152
|
-
}
|
|
153
|
-
if (accessToken !== '') {
|
|
154
|
-
options.headers.authorization = `Bearer ${accessToken}`;
|
|
155
|
-
}
|
|
156
|
-
}
|
|
157
|
-
const proxyUrl = process.env.HTTP_PROXY || process.env.HTTPS_PROXY;
|
|
158
|
-
if (proxyUrl) {
|
|
159
|
-
options.proxy = this.createProxyConfigFromUrl(proxyUrl);
|
|
135
|
+
try {
|
|
136
|
+
let accessToken = '';
|
|
137
|
+
if (options.headers && options.headers['x-anonymous']) {
|
|
138
|
+
accessToken = '';
|
|
139
|
+
}
|
|
140
|
+
else {
|
|
141
|
+
const url = options.headers && options.headers['x-resource'] ? options.headers['x-resource'] : options.url;
|
|
142
|
+
const resource = Auth.getResourceFromUrl(url);
|
|
143
|
+
accessToken = await auth.ensureAccessToken(resource, this._logger, this._debug);
|
|
144
|
+
}
|
|
145
|
+
if (options.headers) {
|
|
146
|
+
if (options.headers['x-anonymous']) {
|
|
147
|
+
delete options.headers['x-anonymous'];
|
|
160
148
|
}
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
.then((res) => {
|
|
164
|
-
if (resolve) {
|
|
165
|
-
resolve((options.responseType === 'stream' || options.fullResponse) ? res : res.data);
|
|
149
|
+
if (options.headers['x-resource']) {
|
|
150
|
+
delete options.headers['x-resource'];
|
|
166
151
|
}
|
|
167
|
-
|
|
168
|
-
|
|
169
|
-
timings.api.push(Number(end - start));
|
|
170
|
-
_resolve((options.responseType === 'stream' || options.fullResponse) ? res : res.data);
|
|
152
|
+
if (accessToken !== '') {
|
|
153
|
+
options.headers.authorization = `Bearer ${accessToken}`;
|
|
171
154
|
}
|
|
172
|
-
}
|
|
173
|
-
|
|
174
|
-
|
|
175
|
-
|
|
176
|
-
|
|
177
|
-
|
|
178
|
-
|
|
179
|
-
|
|
180
|
-
|
|
181
|
-
|
|
182
|
-
|
|
183
|
-
|
|
184
|
-
|
|
155
|
+
}
|
|
156
|
+
const proxyUrl = process.env.HTTP_PROXY || process.env.HTTPS_PROXY;
|
|
157
|
+
if (proxyUrl) {
|
|
158
|
+
options.proxy = this.createProxyConfigFromUrl(proxyUrl);
|
|
159
|
+
}
|
|
160
|
+
const res = await this.req(options);
|
|
161
|
+
const end = process.hrtime.bigint();
|
|
162
|
+
timings.api.push(Number(end - start));
|
|
163
|
+
return options.responseType === 'stream' || options.fullResponse ?
|
|
164
|
+
res :
|
|
165
|
+
res.data;
|
|
166
|
+
}
|
|
167
|
+
catch (error) {
|
|
168
|
+
const end = process.hrtime.bigint();
|
|
169
|
+
timings.api.push(Number(end - start));
|
|
170
|
+
if (error && error.response && (error.response.status === 429 || error.response.status === 503)) {
|
|
171
|
+
let retryAfter = parseInt(error.response.headers['retry-after'] || '10');
|
|
172
|
+
if (isNaN(retryAfter)) {
|
|
173
|
+
retryAfter = 10;
|
|
185
174
|
}
|
|
186
|
-
|
|
187
|
-
|
|
188
|
-
reject(error);
|
|
189
|
-
}
|
|
190
|
-
else {
|
|
191
|
-
const end = process.hrtime.bigint();
|
|
192
|
-
timings.api.push(Number(end - start));
|
|
193
|
-
_reject(error);
|
|
194
|
-
}
|
|
175
|
+
if (this._debug) {
|
|
176
|
+
await this._logger.log(`Request throttled. Waiting ${retryAfter} sec before retrying...`);
|
|
195
177
|
}
|
|
196
|
-
|
|
197
|
-
|
|
178
|
+
await timersUtil.setTimeout(retryAfter * 1000);
|
|
179
|
+
return this.execute(options);
|
|
180
|
+
}
|
|
181
|
+
throw error;
|
|
182
|
+
}
|
|
198
183
|
}
|
|
199
184
|
updateRequestForCloudType(options, cloudType) {
|
|
200
185
|
const url = new URL(options.url);
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
import request from "../request.js";
|
|
2
|
+
export const driveUtil = {
|
|
3
|
+
/**
|
|
4
|
+
* Retrieves the Drive associated with the specified site and URL.
|
|
5
|
+
* @param siteId Site ID
|
|
6
|
+
* @param url Drive URL
|
|
7
|
+
* @returns The Drive associated with the drive URL.
|
|
8
|
+
*/
|
|
9
|
+
async getDriveByUrl(siteId, url) {
|
|
10
|
+
const requestOptions = {
|
|
11
|
+
url: `https://graph.microsoft.com/v1.0/sites/${siteId}/drives?$select=webUrl,id`,
|
|
12
|
+
headers: {
|
|
13
|
+
accept: 'application/json;odata.metadata=none'
|
|
14
|
+
},
|
|
15
|
+
responseType: 'json'
|
|
16
|
+
};
|
|
17
|
+
const drives = await request.get(requestOptions);
|
|
18
|
+
const lowerCaseFolderUrl = url.href.toLowerCase();
|
|
19
|
+
const drive = drives.value
|
|
20
|
+
.sort((a, b) => b.webUrl.localeCompare(a.webUrl))
|
|
21
|
+
.find((d) => {
|
|
22
|
+
const driveUrl = d.webUrl.toLowerCase();
|
|
23
|
+
return lowerCaseFolderUrl.startsWith(driveUrl) &&
|
|
24
|
+
(driveUrl.length === lowerCaseFolderUrl.length ||
|
|
25
|
+
lowerCaseFolderUrl[driveUrl.length] === '/');
|
|
26
|
+
});
|
|
27
|
+
if (!drive) {
|
|
28
|
+
throw `Drive '${url.href}' not found`;
|
|
29
|
+
}
|
|
30
|
+
return drive;
|
|
31
|
+
},
|
|
32
|
+
/**
|
|
33
|
+
* Retrieves the ID of a drive item (file, folder, etc.) associated with the given drive and item URL.
|
|
34
|
+
* @param drive The Drive object containing the item
|
|
35
|
+
* @param itemUrl Item URL
|
|
36
|
+
* @returns Drive item ID
|
|
37
|
+
*/
|
|
38
|
+
async getDriveItemId(drive, itemUrl) {
|
|
39
|
+
const relativeItemUrl = itemUrl.href.replace(new RegExp(`${drive.webUrl}`, 'i'), '').replace(/\/+$/, '');
|
|
40
|
+
const requestOptions = {
|
|
41
|
+
url: `https://graph.microsoft.com/v1.0/drives/${drive.id}/root${relativeItemUrl ? `:${relativeItemUrl}` : ''}?$select=id`,
|
|
42
|
+
headers: {
|
|
43
|
+
accept: 'application/json;odata.metadata=none'
|
|
44
|
+
},
|
|
45
|
+
responseType: 'json'
|
|
46
|
+
};
|
|
47
|
+
const driveItem = await request.get(requestOptions);
|
|
48
|
+
return driveItem?.id;
|
|
49
|
+
}
|
|
50
|
+
};
|
|
51
|
+
//# sourceMappingURL=driveUtil.js.map
|
package/dist/utils/spo.js
CHANGED
|
@@ -1541,7 +1541,7 @@ export const spo = {
|
|
|
1541
1541
|
return file;
|
|
1542
1542
|
},
|
|
1543
1543
|
/**
|
|
1544
|
-
* Gets the
|
|
1544
|
+
* Gets the primary owner login from a site as admin.
|
|
1545
1545
|
* @param adminUrl The SharePoint admin URL
|
|
1546
1546
|
* @param siteId The site ID
|
|
1547
1547
|
* @param logger The logger object
|
|
@@ -1555,13 +1555,12 @@ export const spo = {
|
|
|
1555
1555
|
const requestOptions = {
|
|
1556
1556
|
url: `${adminUrl}/_api/SPO.Tenant/sites('${siteId}')?$select=OwnerLoginName`,
|
|
1557
1557
|
headers: {
|
|
1558
|
-
accept: 'application/json;odata=nometadata'
|
|
1559
|
-
|
|
1560
|
-
|
|
1558
|
+
accept: 'application/json;odata=nometadata'
|
|
1559
|
+
},
|
|
1560
|
+
responseType: 'json'
|
|
1561
1561
|
};
|
|
1562
1562
|
const response = await request.get(requestOptions);
|
|
1563
|
-
|
|
1564
|
-
return responseContent.OwnerLoginName;
|
|
1563
|
+
return response.OwnerLoginName;
|
|
1565
1564
|
},
|
|
1566
1565
|
/**
|
|
1567
1566
|
* Gets the primary owner login from a site.
|
|
@@ -1576,7 +1575,6 @@ export const spo = {
|
|
|
1576
1575
|
}
|
|
1577
1576
|
const requestOptions = {
|
|
1578
1577
|
url: `${siteUrl}/_api/site/owner`,
|
|
1579
|
-
method: 'GET',
|
|
1580
1578
|
headers: {
|
|
1581
1579
|
'accept': 'application/json;odata=nometadata'
|
|
1582
1580
|
},
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import { setTimeout } from "timers/promises";
|
|
2
|
+
export const timersUtil = {
|
|
3
|
+
/**
|
|
4
|
+
* Timeout for a specific duration.
|
|
5
|
+
* @param duration Duration in milliseconds.
|
|
6
|
+
*/
|
|
7
|
+
/* c8 ignore next 3 */
|
|
8
|
+
async setTimeout(duration) {
|
|
9
|
+
return setTimeout(duration);
|
|
10
|
+
}
|
|
11
|
+
};
|
|
12
|
+
//# sourceMappingURL=timersUtil.js.map
|
|
@@ -9,13 +9,13 @@ Get the total storage used across all group mailboxes and group sites
|
|
|
9
9
|
## Usage
|
|
10
10
|
|
|
11
11
|
```sh
|
|
12
|
-
m365 entra m365group report activitystorage
|
|
12
|
+
m365 entra m365group report activitystorage [options]
|
|
13
13
|
```
|
|
14
14
|
|
|
15
15
|
## Alias
|
|
16
16
|
|
|
17
17
|
```sh
|
|
18
|
-
m365 aad m365group report activitystorage
|
|
18
|
+
m365 aad m365group report activitystorage [options]
|
|
19
19
|
```
|
|
20
20
|
|
|
21
21
|
## Options
|