@rockcarver/frodo-cli 0.10.4 → 0.11.1-2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (247) hide show
  1. package/CHANGELOG.md +13 -1
  2. package/README.md +3 -3
  3. package/package.json +17 -15
  4. package/src/app.js +7 -6
  5. package/src/cli/_template/cmd-delete.js +9 -8
  6. package/src/cli/_template/cmd-describe.js +9 -8
  7. package/src/cli/_template/cmd-export.js +9 -8
  8. package/src/cli/_template/cmd-import.js +9 -8
  9. package/src/cli/_template/cmd-list.js +9 -8
  10. package/src/cli/_template/cmd-sub1-delete.js +9 -8
  11. package/src/cli/_template/cmd-sub1-describe.js +9 -8
  12. package/src/cli/_template/cmd-sub1-export.js +9 -8
  13. package/src/cli/_template/cmd-sub1-import.js +9 -8
  14. package/src/cli/_template/cmd-sub1-list.js +9 -8
  15. package/src/cli/_template/cmd-sub2-delete.js +9 -8
  16. package/src/cli/_template/cmd-sub2-describe.js +9 -8
  17. package/src/cli/_template/cmd-sub2-export.js +9 -8
  18. package/src/cli/_template/cmd-sub2-import.js +9 -8
  19. package/src/cli/_template/cmd-sub2-list.js +9 -8
  20. package/src/cli/admin/admin-add-autoid-static-user-mapping.js +12 -12
  21. package/src/cli/admin/admin-create-oauth2-client-with-admin-privileges.js +15 -18
  22. package/src/cli/admin/admin-get-access-token.js +12 -12
  23. package/src/cli/admin/admin-grant-oauth2-client-admin-privileges.js +13 -13
  24. package/src/cli/admin/admin-hide-generic-extension-attributes.js +13 -13
  25. package/src/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js +13 -13
  26. package/src/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js +14 -13
  27. package/src/cli/admin/admin-list-static-user-mappings.js +12 -12
  28. package/src/cli/admin/admin-remove-static-user-mapping.js +12 -12
  29. package/src/cli/admin/admin-repair-org-model.js +13 -13
  30. package/src/cli/admin/admin-revoke-oauth2-client-admin-privileges.js +13 -13
  31. package/src/cli/admin/admin-show-generic-extension-attributes.js +13 -13
  32. package/src/cli/app/app-delete.js +9 -8
  33. package/src/cli/app/app-describe.js +9 -8
  34. package/src/cli/app/app-export.js +15 -15
  35. package/src/cli/app/app-import.js +11 -11
  36. package/src/cli/app/app-list.js +11 -12
  37. package/src/cli/conn/conn-add.js +11 -11
  38. package/src/cli/conn/conn-delete.js +3 -1
  39. package/src/cli/conn/conn-describe.js +3 -1
  40. package/src/cli/conn/conn-list.js +3 -4
  41. package/src/cli/email/email-template-export.js +16 -16
  42. package/src/cli/email/email-template-import.js +16 -16
  43. package/src/cli/email/email-template-list.js +11 -11
  44. package/src/cli/esv/esv-apply.js +12 -12
  45. package/src/cli/esv/esv-secret-create.js +11 -11
  46. package/src/cli/esv/esv-secret-delete.js +13 -13
  47. package/src/cli/esv/esv-secret-describe.js +11 -11
  48. package/src/cli/esv/esv-secret-export.js +9 -8
  49. package/src/cli/esv/esv-secret-import.js +9 -8
  50. package/src/cli/esv/esv-secret-list.js +11 -11
  51. package/src/cli/esv/esv-secret-set.js +11 -11
  52. package/src/cli/esv/esv-secret-version-activate.js +12 -12
  53. package/src/cli/esv/esv-secret-version-create.js +11 -11
  54. package/src/cli/esv/esv-secret-version-deactivate.js +12 -12
  55. package/src/cli/esv/esv-secret-version-delete.js +13 -13
  56. package/src/cli/esv/esv-secret-version-list.js +11 -11
  57. package/src/cli/esv/esv-variable-create.js +11 -11
  58. package/src/cli/esv/esv-variable-delete.js +13 -16
  59. package/src/cli/esv/esv-variable-describe.js +11 -11
  60. package/src/cli/esv/esv-variable-export.js +9 -8
  61. package/src/cli/esv/esv-variable-import.js +9 -8
  62. package/src/cli/esv/esv-variable-list.js +11 -11
  63. package/src/cli/esv/esv-variable-set.js +13 -16
  64. package/src/cli/idm/idm-count.js +11 -11
  65. package/src/cli/idm/idm-export.js +16 -16
  66. package/src/cli/idm/idm-list.js +11 -11
  67. package/src/cli/idp/idp-export.js +15 -19
  68. package/src/cli/idp/idp-import.js +18 -18
  69. package/src/cli/idp/idp-list.js +12 -12
  70. package/src/cli/info/info.js +23 -19
  71. package/src/cli/journey/journey-delete.js +14 -14
  72. package/src/cli/journey/journey-describe.js +26 -35
  73. package/src/cli/journey/journey-export.js +18 -21
  74. package/src/cli/journey/journey-import.js +17 -17
  75. package/src/cli/journey/journey-list.js +12 -12
  76. package/src/cli/journey/journey-prune.js +12 -12
  77. package/src/cli/logging/logs-list.js +33 -28
  78. package/src/cli/logging/logs-tail.js +26 -22
  79. package/src/cli/realm/realm-add-custom-domain.js +13 -13
  80. package/src/cli/realm/realm-describe.js +14 -14
  81. package/src/cli/realm/realm-list.js +11 -11
  82. package/src/cli/realm/realm-remove-custom-domain.js +16 -13
  83. package/src/cli/saml/saml-cot-export.js +16 -16
  84. package/src/cli/saml/saml-cot-import.js +18 -18
  85. package/src/cli/saml/saml-cot-list.js +12 -12
  86. package/src/cli/saml/saml-describe.js +12 -12
  87. package/src/cli/saml/saml-export.js +16 -19
  88. package/src/cli/saml/saml-import.js +19 -18
  89. package/src/cli/saml/saml-list.js +12 -12
  90. package/src/cli/saml/saml-metadata-export.js +15 -19
  91. package/src/cli/script/script-delete.js +9 -8
  92. package/src/cli/script/script-describe.js +9 -8
  93. package/src/cli/script/script-export.js +18 -20
  94. package/src/cli/script/script-import.js +13 -12
  95. package/src/cli/script/script-list.js +12 -12
  96. package/src/cli/theme/theme-delete.js +17 -21
  97. package/src/cli/theme/theme-export.js +19 -18
  98. package/src/cli/theme/theme-import.js +21 -20
  99. package/src/cli/theme/theme-list.js +12 -12
  100. package/.eslintrc +0 -29
  101. package/.github/ISSUE_TEMPLATE/bug_report.md +0 -30
  102. package/.github/ISSUE_TEMPLATE/feature_request.md +0 -20
  103. package/.github/README.md +0 -273
  104. package/.github/workflows/pipeline.yml +0 -487
  105. package/.prettierrc +0 -6
  106. package/CODE_OF_CONDUCT.md +0 -128
  107. package/docs/BINARIES.md +0 -22
  108. package/docs/CONTRIBUTE.md +0 -96
  109. package/docs/PIPELINE.md +0 -169
  110. package/docs/images/macos_warn1.png +0 -0
  111. package/docs/images/macos_warn2.png +0 -0
  112. package/docs/images/macos_warn3.png +0 -0
  113. package/docs/images/npm_versioning_guidelines.png +0 -0
  114. package/docs/images/release_pipeline.png +0 -0
  115. package/gulpfile.js +0 -49
  116. package/jsconfig.json +0 -6
  117. package/resources/sampleEntitiesFile.json +0 -8
  118. package/resources/sampleEnvFile.env +0 -2
  119. package/src/api/AuthenticateApi.js +0 -33
  120. package/src/api/BaseApi.js +0 -242
  121. package/src/api/CirclesOfTrustApi.js +0 -87
  122. package/src/api/EmailTemplateApi.js +0 -37
  123. package/src/api/IdmConfigApi.js +0 -88
  124. package/src/api/LogApi.js +0 -45
  125. package/src/api/ManagedObjectApi.js +0 -62
  126. package/src/api/OAuth2ClientApi.js +0 -69
  127. package/src/api/OAuth2OIDCApi.js +0 -73
  128. package/src/api/OAuth2ProviderApi.js +0 -32
  129. package/src/api/RealmApi.js +0 -99
  130. package/src/api/Saml2Api.js +0 -176
  131. package/src/api/ScriptApi.js +0 -84
  132. package/src/api/SecretsApi.js +0 -151
  133. package/src/api/ServerInfoApi.js +0 -41
  134. package/src/api/SocialIdentityProvidersApi.js +0 -114
  135. package/src/api/StartupApi.js +0 -45
  136. package/src/api/ThemeApi.js +0 -181
  137. package/src/api/TreeApi.js +0 -207
  138. package/src/api/VariablesApi.js +0 -104
  139. package/src/api/utils/ApiUtils.js +0 -77
  140. package/src/api/utils/Base64.js +0 -62
  141. package/src/cli/journey/journey-delete.e2e.test.js +0 -380
  142. package/src/cli/journey/journey-list.e2e.test.js +0 -141
  143. package/src/cli/theme/theme-delete.e2e.test.js +0 -178
  144. package/src/cli/theme/theme-list.e2e.test.js +0 -119
  145. package/src/ops/AdminOps.js +0 -901
  146. package/src/ops/AuthenticateOps.js +0 -342
  147. package/src/ops/CirclesOfTrustOps.js +0 -350
  148. package/src/ops/ConnectionProfileOps.js +0 -254
  149. package/src/ops/EmailTemplateOps.js +0 -326
  150. package/src/ops/IdmOps.js +0 -227
  151. package/src/ops/IdpOps.js +0 -342
  152. package/src/ops/JourneyOps.js +0 -2026
  153. package/src/ops/LogOps.js +0 -357
  154. package/src/ops/ManagedObjectOps.js +0 -34
  155. package/src/ops/OAuth2ClientOps.js +0 -151
  156. package/src/ops/OrganizationOps.js +0 -85
  157. package/src/ops/RealmOps.js +0 -139
  158. package/src/ops/SamlOps.js +0 -541
  159. package/src/ops/ScriptOps.js +0 -211
  160. package/src/ops/SecretsOps.js +0 -288
  161. package/src/ops/StartupOps.js +0 -114
  162. package/src/ops/ThemeOps.js +0 -379
  163. package/src/ops/VariablesOps.js +0 -185
  164. package/src/ops/templates/OAuth2ClientTemplate.json +0 -270
  165. package/src/ops/templates/OrgModelUserAttributesTemplate.json +0 -149
  166. package/src/ops/templates/cloud/GenericExtensionAttributesTemplate.json +0 -392
  167. package/src/ops/templates/cloud/managed.json +0 -4119
  168. package/src/ops/utils/Console.js +0 -434
  169. package/src/ops/utils/DataProtection.js +0 -92
  170. package/src/ops/utils/ExportImportUtils.js +0 -146
  171. package/src/ops/utils/OpsUtils.js +0 -76
  172. package/src/ops/utils/Wordwrap.js +0 -11
  173. package/src/storage/SessionStorage.js +0 -45
  174. package/test/client_cli/en/connections.test.js +0 -62
  175. package/test/client_cli/en/connections_add.test.js +0 -34
  176. package/test/client_cli/en/connections_delete.test.js +0 -34
  177. package/test/client_cli/en/connections_list.test.js +0 -34
  178. package/test/client_cli/en/email_templates.test.js +0 -77
  179. package/test/client_cli/en/email_templates_export.test.js +0 -196
  180. package/test/client_cli/en/email_templates_import.test.js +0 -145
  181. package/test/client_cli/en/email_templates_list.test.js +0 -130
  182. package/test/client_cli/en/idm.test.js +0 -111
  183. package/test/client_cli/en/idm_count.test.js +0 -121
  184. package/test/client_cli/en/idm_export.test.js +0 -136
  185. package/test/client_cli/en/idm_exportAll.test.js +0 -156
  186. package/test/client_cli/en/idm_exportAllRaw.test.js +0 -120
  187. package/test/client_cli/en/idm_import.test_.js +0 -103
  188. package/test/client_cli/en/idm_importAll.test_.js +0 -103
  189. package/test/client_cli/en/idm_list.test.js +0 -103
  190. package/test/client_cli/en/info.test.js +0 -125
  191. package/test/client_cli/en/journey.test.js +0 -127
  192. package/test/client_cli/en/journey_describe.test.js +0 -196
  193. package/test/client_cli/en/journey_export.test.js +0 -213
  194. package/test/client_cli/en/journey_import.test.js +0 -195
  195. package/test/client_cli/en/journey_importAll.test.js +0 -180
  196. package/test/client_cli/en/journey_list.test.js +0 -162
  197. package/test/client_cli/en/journey_prune.test.js +0 -148
  198. package/test/client_cli/en/logs.test.js +0 -79
  199. package/test/client_cli/en/logs_list.test.js +0 -83
  200. package/test/client_cli/en/logs_tail.test.js +0 -118
  201. package/test/client_cli/en/root.test.js +0 -91
  202. package/test/client_cli/en/script.test.js +0 -77
  203. package/test/client_cli/en/script_export.test.js +0 -213
  204. package/test/client_cli/en/script_import.test.js +0 -163
  205. package/test/client_cli/en/script_list.test.js +0 -148
  206. package/test/client_cli/utils/utils.js +0 -32
  207. package/test/e2e/journey/baseline/ForgottenUsername.journey.json +0 -216
  208. package/test/e2e/journey/baseline/Login.journey.json +0 -205
  209. package/test/e2e/journey/baseline/PasswordGrant.journey.json +0 -139
  210. package/test/e2e/journey/baseline/ProgressiveProfile.journey.json +0 -198
  211. package/test/e2e/journey/baseline/Registration.journey.json +0 -249
  212. package/test/e2e/journey/baseline/ResetPassword.journey.json +0 -268
  213. package/test/e2e/journey/baseline/UpdatePassword.journey.json +0 -323
  214. package/test/e2e/journey/baseline/allAlphaJourneys.journeys.json +0 -1520
  215. package/test/e2e/journey/delete/ForgottenUsername.journey.json +0 -216
  216. package/test/e2e/journey/delete/Login.journey.json +0 -205
  217. package/test/e2e/journey/delete/PasswordGrant.journey.json +0 -139
  218. package/test/e2e/journey/delete/ProgressiveProfile.journey.json +0 -198
  219. package/test/e2e/journey/delete/Registration.journey.json +0 -249
  220. package/test/e2e/journey/delete/ResetPassword.journey.json +0 -268
  221. package/test/e2e/journey/delete/UpdatePassword.journey.json +0 -323
  222. package/test/e2e/journey/delete/deleteMe.journey.json +0 -230
  223. package/test/e2e/journey/list/Disabled.journey.json +0 -43
  224. package/test/e2e/journey/list/ForgottenUsername.journey.json +0 -216
  225. package/test/e2e/journey/list/Login.journey.json +0 -205
  226. package/test/e2e/journey/list/PasswordGrant.journey.json +0 -139
  227. package/test/e2e/journey/list/ProgressiveProfile.journey.json +0 -198
  228. package/test/e2e/journey/list/Registration.journey.json +0 -249
  229. package/test/e2e/journey/list/ResetPassword.journey.json +0 -268
  230. package/test/e2e/journey/list/UpdatePassword.journey.json +0 -323
  231. package/test/e2e/setup.js +0 -98
  232. package/test/e2e/theme/baseline/Contrast.theme.json +0 -95
  233. package/test/e2e/theme/baseline/Highlander.theme.json +0 -95
  234. package/test/e2e/theme/baseline/Robroy.theme.json +0 -95
  235. package/test/e2e/theme/baseline/Starter-Theme.theme.json +0 -94
  236. package/test/e2e/theme/baseline/Zardoz.theme.json +0 -95
  237. package/test/e2e/theme/import/Contrast.theme.json +0 -95
  238. package/test/e2e/theme/import/Highlander.theme.json +0 -95
  239. package/test/e2e/theme/import/Robroy.theme.json +0 -95
  240. package/test/e2e/theme/import/Starter-Theme.theme.json +0 -94
  241. package/test/e2e/theme/import/Zardoz.default.theme.json +0 -95
  242. package/test/fs_tmp/.gitkeep +0 -2
  243. package/test/global/setup.js +0 -65
  244. package/test/lib_api/unit_tests/ApiUtils.test.js +0 -186
  245. package/test/lib_api/unit_tests/Base64URL.test.js +0 -22
  246. package/test/lib_api/unit_tests/DataProtection.test.js +0 -25
  247. package/test/lib_api/unit_tests/ExportImportUtils.test.js +0 -121
@@ -1,9 +1,9 @@
1
1
  import { Command } from 'commander';
2
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { addAutoIdStaticUserMapping } from '../../ops/AdminOps.js';
4
+
5
+ const { getTokens } = Authenticate;
6
+ const { addAutoIdStaticUserMapping } = Admin;
7
7
 
8
8
  const program = new Command('frodo admin add-autoid-static-user-mapping');
9
9
 
@@ -22,16 +22,16 @@ program
22
22
  .action(
23
23
  // implement command logic inside action handler
24
24
  async (host, realm, user, password, options) => {
25
- storage.session.setTenant(host);
26
- storage.session.setRealm(realm);
27
- storage.session.setUsername(user);
28
- storage.session.setPassword(password);
29
- storage.session.setDeploymentType(options.type);
30
- storage.session.setAllowInsecureConnection(options.insecure);
25
+ state.default.session.setTenant(host);
26
+ state.default.session.setRealm(realm);
27
+ state.default.session.setUsername(user);
28
+ state.default.session.setPassword(password);
29
+ state.default.session.setDeploymentType(options.type);
30
+ state.default.session.setAllowInsecureConnection(options.insecure);
31
31
  if (await getTokens()) {
32
- printMessage(`Adding AutoId static user mapping...`);
32
+ console.log(`Adding AutoId static user mapping...`);
33
33
  await addAutoIdStaticUserMapping();
34
- printMessage('Done.');
34
+ console.log('Done.');
35
35
  }
36
36
  }
37
37
  // end command logic inside action handler
@@ -1,14 +1,11 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { v4 as uuidv4 } from 'uuid';
3
3
  import Table from 'cli-table3';
4
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
4
5
  import * as common from '../cmd_common.js';
5
- import { getTokens } from '../../ops/AuthenticateOps.js';
6
- import storage from '../../storage/SessionStorage.js';
7
- import { printMessage } from '../../ops/utils/Console.js';
8
- import {
9
- createLongLivedToken,
10
- createOAuth2ClientWithAdminPrivileges,
11
- } from '../../ops/AdminOps.js';
6
+
7
+ const { getTokens } = Authenticate;
8
+ const { createLongLivedToken, createOAuth2ClientWithAdminPrivileges } = Admin;
12
9
 
13
10
  const program = new Command(
14
11
  'frodo admin create-oauth2-client-with-admin-privileges'
@@ -53,15 +50,15 @@ program
53
50
  .action(
54
51
  // implement command logic inside action handler
55
52
  async (host, realm, user, password, options) => {
56
- storage.session.setTenant(host);
57
- storage.session.setRealm(realm);
58
- storage.session.setUsername(user);
59
- storage.session.setPassword(password);
60
- storage.session.setDeploymentType(options.type);
61
- storage.session.setAllowInsecureConnection(options.insecure);
53
+ state.default.session.setTenant(host);
54
+ state.default.session.setRealm(realm);
55
+ state.default.session.setUsername(user);
56
+ state.default.session.setPassword(password);
57
+ state.default.session.setDeploymentType(options.type);
58
+ state.default.session.setAllowInsecureConnection(options.insecure);
62
59
  if (await getTokens()) {
63
- printMessage(
64
- `Creating oauth2 client with admin privileges in realm "${storage.session.getRealm()}"...`
60
+ console.log(
61
+ `Creating oauth2 client with admin privileges in realm "${state.default.session.getRealm()}"...`
65
62
  );
66
63
  let clientId = uuidv4();
67
64
  let clientSecret = uuidv4();
@@ -74,7 +71,7 @@ program
74
71
  try {
75
72
  await createOAuth2ClientWithAdminPrivileges(clientId, clientSecret);
76
73
  } catch (error) {
77
- printMessage(error, 'error');
74
+ console.log(error, 'error');
78
75
  }
79
76
  const table = new Table({
80
77
  chars: {
@@ -110,12 +107,12 @@ program
110
107
  // table.push(['Token Lifetime'.brightCyan, response.expires_in]);
111
108
  table.push(['Expires'.brightCyan, response.expires_on]);
112
109
  } catch (error) {
113
- printMessage(error, 'error');
110
+ console.log(error, 'error');
114
111
  }
115
112
  }
116
113
  table.push(['Client ID'.brightCyan, clientId]);
117
114
  table.push(['Client Secret'.brightCyan, clientSecret]);
118
- printMessage(table.toString());
115
+ console.log(table.toString());
119
116
  }
120
117
  }
121
118
  // end command logic inside action handler
@@ -1,9 +1,9 @@
1
1
  import { Command, Option } from 'commander';
2
+ import { Authenticate, OAuth2OIDCApi, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { clientCredentialsGrant } from '../../api/OAuth2OIDCApi.js';
4
+
5
+ const { clientCredentialsGrant } = OAuth2OIDCApi;
6
+ const { getTokens } = Authenticate;
7
7
 
8
8
  const program = new Command('frodo admin get-access-token');
9
9
 
@@ -33,14 +33,14 @@ program
33
33
  .action(
34
34
  // implement command logic inside action handler
35
35
  async (host, realm, user, password, options) => {
36
- storage.session.setTenant(host);
37
- storage.session.setRealm(realm);
38
- storage.session.setUsername(user);
39
- storage.session.setPassword(password);
40
- storage.session.setDeploymentType(options.type);
41
- storage.session.setAllowInsecureConnection(options.insecure);
36
+ state.default.session.setTenant(host);
37
+ state.default.session.setRealm(realm);
38
+ state.default.session.setUsername(user);
39
+ state.default.session.setPassword(password);
40
+ state.default.session.setDeploymentType(options.type);
41
+ state.default.session.setAllowInsecureConnection(options.insecure);
42
42
  if (await getTokens()) {
43
- printMessage(
43
+ console.log(
44
44
  `Getting an access token using client "${options.clientId}"...`
45
45
  );
46
46
  const response = (
@@ -50,7 +50,7 @@ program
50
50
  options.scope
51
51
  )
52
52
  ).data;
53
- printMessage(`Token: ${response.access_token}`);
53
+ console.log(`Token: ${response.access_token}`);
54
54
  }
55
55
  }
56
56
  // end command logic inside action handler
@@ -1,9 +1,9 @@
1
1
  import { Command, Option } from 'commander';
2
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { grantOAuth2ClientAdminPrivileges } from '../../ops/AdminOps.js';
4
+
5
+ const { getTokens } = Authenticate;
6
+ const { grantOAuth2ClientAdminPrivileges } = Admin;
7
7
 
8
8
  const program = new Command('frodo admin grant-oauth2-client-admin-privileges');
9
9
 
@@ -23,20 +23,20 @@ program
23
23
  .action(
24
24
  // implement command logic inside action handler
25
25
  async (host, realm, user, password, options) => {
26
- storage.session.setTenant(host);
27
- storage.session.setRealm(realm);
28
- storage.session.setUsername(user);
29
- storage.session.setPassword(password);
30
- storage.session.setDeploymentType(options.type);
31
- storage.session.setAllowInsecureConnection(options.insecure);
26
+ state.default.session.setTenant(host);
27
+ state.default.session.setRealm(realm);
28
+ state.default.session.setUsername(user);
29
+ state.default.session.setPassword(password);
30
+ state.default.session.setDeploymentType(options.type);
31
+ state.default.session.setAllowInsecureConnection(options.insecure);
32
32
  if (await getTokens()) {
33
- printMessage(
33
+ console.log(
34
34
  `Granting oauth2 client "${
35
35
  options.target
36
- }" in realm "${storage.session.getRealm()}" admin privileges...`
36
+ }" in realm "${state.default.session.getRealm()}" admin privileges...`
37
37
  );
38
38
  await grantOAuth2ClientAdminPrivileges(options.target);
39
- printMessage('Done.');
39
+ console.log('Done.');
40
40
  }
41
41
  }
42
42
  // end command logic inside action handler
@@ -1,9 +1,9 @@
1
1
  import { Command, Option } from 'commander';
2
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { hideGenericExtensionAttributes } from '../../ops/AdminOps.js';
4
+
5
+ const { getTokens } = Authenticate;
6
+ const { hideGenericExtensionAttributes } = Admin;
7
7
 
8
8
  const program = new Command('frodo admin hide-generic-extension-attributes');
9
9
 
@@ -24,21 +24,21 @@ program
24
24
  .action(
25
25
  // implement command logic inside action handler
26
26
  async (host, realm, user, password, options) => {
27
- storage.session.setTenant(host);
28
- storage.session.setRealm(realm);
29
- storage.session.setUsername(user);
30
- storage.session.setPassword(password);
31
- storage.session.setDeploymentType(options.type);
32
- storage.session.setAllowInsecureConnection(options.insecure);
27
+ state.default.session.setTenant(host);
28
+ state.default.session.setRealm(realm);
29
+ state.default.session.setUsername(user);
30
+ state.default.session.setPassword(password);
31
+ state.default.session.setDeploymentType(options.type);
32
+ state.default.session.setAllowInsecureConnection(options.insecure);
33
33
  if (await getTokens()) {
34
- printMessage(
35
- `Hiding generic extension attributes in realm "${storage.session.getRealm()}"...`
34
+ console.log(
35
+ `Hiding generic extension attributes in realm "${state.default.session.getRealm()}"...`
36
36
  );
37
37
  await hideGenericExtensionAttributes(
38
38
  options.includeCustomized,
39
39
  options.dryRun
40
40
  );
41
- printMessage('Done.');
41
+ console.log('Done.');
42
42
  }
43
43
  }
44
44
  // end command logic inside action handler
@@ -1,9 +1,9 @@
1
1
  import { Command } from 'commander';
2
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { listOAuth2AdminClients } from '../../ops/AdminOps.js';
4
+
5
+ const { listOAuth2AdminClients } = Admin;
6
+ const { getTokens } = Authenticate;
7
7
 
8
8
  const program = new Command(
9
9
  'frodo admin list-oauth2-clients-with-admin-privileges'
@@ -22,20 +22,20 @@ program
22
22
  .action(
23
23
  // implement command logic inside action handler
24
24
  async (host, realm, user, password, options) => {
25
- storage.session.setTenant(host);
26
- storage.session.setRealm(realm);
27
- storage.session.setUsername(user);
28
- storage.session.setPassword(password);
29
- storage.session.setDeploymentType(options.type);
30
- storage.session.setAllowInsecureConnection(options.insecure);
25
+ state.default.session.setTenant(host);
26
+ state.default.session.setRealm(realm);
27
+ state.default.session.setUsername(user);
28
+ state.default.session.setPassword(password);
29
+ state.default.session.setDeploymentType(options.type);
30
+ state.default.session.setAllowInsecureConnection(options.insecure);
31
31
  if (await getTokens()) {
32
- printMessage(
33
- `Listing oauth2 clients with admin privileges in realm "${storage.session.getRealm()}"...`
32
+ console.log(
33
+ `Listing oauth2 clients with admin privileges in realm "${state.default.session.getRealm()}"...`
34
34
  );
35
35
  const adminClients = await listOAuth2AdminClients();
36
36
  adminClients.sort((a, b) => a.localeCompare(b));
37
37
  adminClients.forEach((item) => {
38
- printMessage(`${item}`);
38
+ console.log(`${item}`);
39
39
  });
40
40
  }
41
41
  }
@@ -1,9 +1,10 @@
1
1
  import { Command } from 'commander';
2
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { listOAuth2CustomClients } from '../../ops/AdminOps.js';
4
+
5
+ const { listOAuth2CustomClients } = Admin;
6
+
7
+ const { getTokens } = Authenticate;
7
8
 
8
9
  const program = new Command(
9
10
  'frodo admin list-oauth2-clients-with-custom-privileges'
@@ -22,20 +23,20 @@ program
22
23
  .action(
23
24
  // implement command logic inside action handler
24
25
  async (host, realm, user, password, options) => {
25
- storage.session.setTenant(host);
26
- storage.session.setRealm(realm);
27
- storage.session.setUsername(user);
28
- storage.session.setPassword(password);
29
- storage.session.setDeploymentType(options.type);
30
- storage.session.setAllowInsecureConnection(options.insecure);
26
+ state.default.session.setTenant(host);
27
+ state.default.session.setRealm(realm);
28
+ state.default.session.setUsername(user);
29
+ state.default.session.setPassword(password);
30
+ state.default.session.setDeploymentType(options.type);
31
+ state.default.session.setAllowInsecureConnection(options.insecure);
31
32
  if (await getTokens()) {
32
- printMessage(
33
- `Listing oauth2 clients with custom privileges in realm "${storage.session.getRealm()}"...`
33
+ console.log(
34
+ `Listing oauth2 clients with custom privileges in realm "${state.default.session.getRealm()}"...`
34
35
  );
35
36
  const adminClients = await listOAuth2CustomClients();
36
37
  adminClients.sort((a, b) => a.localeCompare(b));
37
38
  adminClients.forEach((item) => {
38
- printMessage(`${item}`);
39
+ console.log(`${item}`);
39
40
  });
40
41
  }
41
42
  }
@@ -1,9 +1,9 @@
1
1
  import { Command, Option } from 'commander';
2
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { listNonOAuth2AdminStaticUserMappings } from '../../ops/AdminOps.js';
4
+
5
+ const { getTokens } = Authenticate;
6
+ const { listNonOAuth2AdminStaticUserMappings } = Admin;
7
7
 
8
8
  const program = new Command('frodo admin list-static-user-mappings');
9
9
 
@@ -28,14 +28,14 @@ program
28
28
  .action(
29
29
  // implement command logic inside action handler
30
30
  async (host, realm, user, password, options) => {
31
- storage.session.setTenant(host);
32
- storage.session.setRealm(realm);
33
- storage.session.setUsername(user);
34
- storage.session.setPassword(password);
35
- storage.session.setDeploymentType(options.type);
36
- storage.session.setAllowInsecureConnection(options.insecure);
31
+ state.default.session.setTenant(host);
32
+ state.default.session.setRealm(realm);
33
+ state.default.session.setUsername(user);
34
+ state.default.session.setPassword(password);
35
+ state.default.session.setDeploymentType(options.type);
36
+ state.default.session.setAllowInsecureConnection(options.insecure);
37
37
  if (await getTokens()) {
38
- printMessage(
38
+ console.log(
39
39
  'Listing all non-oauth2 client subjects of static user mappings...'
40
40
  );
41
41
  const subjects = await listNonOAuth2AdminStaticUserMappings(
@@ -43,7 +43,7 @@ program
43
43
  );
44
44
  subjects.sort((a, b) => a.localeCompare(b));
45
45
  subjects.forEach((item) => {
46
- printMessage(`${item}`);
46
+ console.log(`${item}`);
47
47
  });
48
48
  }
49
49
  }
@@ -1,9 +1,9 @@
1
1
  import { Command } from 'commander';
2
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { removeStaticUserMapping } from '../../ops/AdminOps.js';
4
+
5
+ const { getTokens } = Authenticate;
6
+ const { removeStaticUserMapping } = Admin;
7
7
 
8
8
  const program = new Command('frodo admin remove-static-user-mapping');
9
9
 
@@ -20,16 +20,16 @@ program
20
20
  .action(
21
21
  // implement command logic inside action handler
22
22
  async (host, realm, user, password, options) => {
23
- storage.session.setTenant(host);
24
- storage.session.setRealm(realm);
25
- storage.session.setUsername(user);
26
- storage.session.setPassword(password);
27
- storage.session.setDeploymentType(options.type);
28
- storage.session.setAllowInsecureConnection(options.insecure);
23
+ state.default.session.setTenant(host);
24
+ state.default.session.setRealm(realm);
25
+ state.default.session.setUsername(user);
26
+ state.default.session.setPassword(password);
27
+ state.default.session.setDeploymentType(options.type);
28
+ state.default.session.setAllowInsecureConnection(options.insecure);
29
29
  if (await getTokens()) {
30
- printMessage("Removing a subject's static user mapping...");
30
+ console.log("Removing a subject's static user mapping...");
31
31
  await removeStaticUserMapping(options.subject);
32
- printMessage('Done.');
32
+ console.log('Done.');
33
33
  }
34
34
  }
35
35
  // end command logic inside action handler
@@ -1,9 +1,9 @@
1
1
  import { Command, Option } from 'commander';
2
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { repairOrgModel } from '../../ops/AdminOps.js';
4
+
5
+ const { getTokens } = Authenticate;
6
+ const { repairOrgModel } = Admin;
7
7
 
8
8
  const program = new Command('frodo admin repair-org-model');
9
9
 
@@ -27,18 +27,18 @@ program
27
27
  .action(
28
28
  // implement command logic inside action handler
29
29
  async (host, realm, user, password, options) => {
30
- storage.session.setTenant(host);
31
- storage.session.setRealm(realm);
32
- storage.session.setUsername(user);
33
- storage.session.setPassword(password);
34
- storage.session.setDeploymentType(options.type);
35
- storage.session.setAllowInsecureConnection(options.insecure);
30
+ state.default.session.setTenant(host);
31
+ state.default.session.setRealm(realm);
32
+ state.default.session.setUsername(user);
33
+ state.default.session.setPassword(password);
34
+ state.default.session.setDeploymentType(options.type);
35
+ state.default.session.setAllowInsecureConnection(options.insecure);
36
36
  if (await getTokens()) {
37
- printMessage(
38
- `Repairing org model in realm "${storage.session.getRealm()}"...`
37
+ console.log(
38
+ `Repairing org model in realm "${state.default.session.getRealm()}"...`
39
39
  );
40
40
  await repairOrgModel(options.extendPermissions, options.dryRun);
41
- printMessage('Done.');
41
+ console.log('Done.');
42
42
  }
43
43
  }
44
44
  // end command logic inside action handler
@@ -1,9 +1,9 @@
1
1
  import { Command, Option } from 'commander';
2
+ import { Admin, Authenticate, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { revokeOAuth2ClientAdminPrivileges } from '../../ops/AdminOps.js';
4
+
5
+ const { getTokens } = Authenticate;
6
+ const { revokeOAuth2ClientAdminPrivileges } = Admin;
7
7
 
8
8
  const program = new Command(
9
9
  'frodo admin revoke-oauth2-client-admin-privileges'
@@ -25,20 +25,20 @@ program
25
25
  .action(
26
26
  // implement command logic inside action handler
27
27
  async (host, realm, user, password, options) => {
28
- storage.session.setTenant(host);
29
- storage.session.setRealm(realm);
30
- storage.session.setUsername(user);
31
- storage.session.setPassword(password);
32
- storage.session.setDeploymentType(options.type);
33
- storage.session.setAllowInsecureConnection(options.insecure);
28
+ state.default.session.setTenant(host);
29
+ state.default.session.setRealm(realm);
30
+ state.default.session.setUsername(user);
31
+ state.default.session.setPassword(password);
32
+ state.default.session.setDeploymentType(options.type);
33
+ state.default.session.setAllowInsecureConnection(options.insecure);
34
34
  if (await getTokens()) {
35
- printMessage(
35
+ console.log(
36
36
  `Revoking admin privileges from oauth2 client "${
37
37
  options.target
38
- }" in realm "${storage.session.getRealm()}"...`
38
+ }" in realm "${state.default.session.getRealm()}"...`
39
39
  );
40
40
  await revokeOAuth2ClientAdminPrivileges(options.target);
41
- printMessage('Done.');
41
+ console.log('Done.');
42
42
  }
43
43
  }
44
44
  // end command logic inside action handler
@@ -1,9 +1,9 @@
1
1
  import { Command, Option } from 'commander';
2
+ import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
5
- import { printMessage } from '../../ops/utils/Console.js';
6
- import { showGenericExtensionAttributes } from '../../ops/AdminOps.js';
4
+
5
+ const { showGenericExtensionAttributes } = Admin;
6
+ const { getTokens } = Authenticate;
7
7
 
8
8
  const program = new Command('frodo admin show-generic-extension-attributes');
9
9
 
@@ -32,21 +32,21 @@ program
32
32
  .action(
33
33
  // implement command logic inside action handler
34
34
  async (host, realm, user, password, options) => {
35
- storage.session.setTenant(host);
36
- storage.session.setRealm(realm);
37
- storage.session.setUsername(user);
38
- storage.session.setPassword(password);
39
- storage.session.setDeploymentType(options.type);
40
- storage.session.setAllowInsecureConnection(options.insecure);
35
+ state.default.session.setTenant(host);
36
+ state.default.session.setRealm(realm);
37
+ state.default.session.setUsername(user);
38
+ state.default.session.setPassword(password);
39
+ state.default.session.setDeploymentType(options.type);
40
+ state.default.session.setAllowInsecureConnection(options.insecure);
41
41
  if (await getTokens()) {
42
- printMessage(
43
- `Showing generic extension attributes in realm "${storage.session.getRealm()}"...`
42
+ console.log(
43
+ `Showing generic extension attributes in realm "${state.default.session.getRealm()}"...`
44
44
  );
45
45
  await showGenericExtensionAttributes(
46
46
  options.includeCustomized,
47
47
  options.dryRun
48
48
  );
49
- printMessage('Done.');
49
+ console.log('Done.');
50
50
  }
51
51
  }
52
52
  // end command logic inside action handler
@@ -1,7 +1,8 @@
1
1
  import { Command, Option } from 'commander';
2
+ import { Authenticate, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
4
+
5
+ const { getTokens } = Authenticate;
5
6
 
6
7
  const program = new Command('frodo cmd delete');
7
8
 
@@ -39,12 +40,12 @@ program
39
40
  .action(
40
41
  // implement command logic inside action handler
41
42
  async (host, realm, user, password, options) => {
42
- storage.session.setTenant(host);
43
- storage.session.setRealm(realm);
44
- storage.session.setUsername(user);
45
- storage.session.setPassword(password);
46
- storage.session.setDeploymentType(options.type);
47
- storage.session.setAllowInsecureConnection(options.insecure);
43
+ state.default.session.setTenant(host);
44
+ state.default.session.setRealm(realm);
45
+ state.default.session.setUsername(user);
46
+ state.default.session.setPassword(password);
47
+ state.default.session.setDeploymentType(options.type);
48
+ state.default.session.setAllowInsecureConnection(options.insecure);
48
49
  if (await getTokens()) {
49
50
  // code goes here
50
51
  }
@@ -1,7 +1,8 @@
1
1
  import { Command, Option } from 'commander';
2
+ import { Authenticate, state } from '@rockcarver/frodo-lib';
2
3
  import * as common from '../cmd_common.js';
3
- import { getTokens } from '../../ops/AuthenticateOps.js';
4
- import storage from '../../storage/SessionStorage.js';
4
+
5
+ const { getTokens } = Authenticate;
5
6
 
6
7
  const program = new Command('frodo app describe');
7
8
 
@@ -19,12 +20,12 @@ program
19
20
  .action(
20
21
  // implement command logic inside action handler
21
22
  async (host, realm, user, password, options) => {
22
- storage.session.setTenant(host);
23
- storage.session.setRealm(realm);
24
- storage.session.setUsername(user);
25
- storage.session.setPassword(password);
26
- storage.session.setDeploymentType(options.type);
27
- storage.session.setAllowInsecureConnection(options.insecure);
23
+ state.default.session.setTenant(host);
24
+ state.default.session.setRealm(realm);
25
+ state.default.session.setUsername(user);
26
+ state.default.session.setPassword(password);
27
+ state.default.session.setDeploymentType(options.type);
28
+ state.default.session.setAllowInsecureConnection(options.insecure);
28
29
  if (await getTokens()) {
29
30
  // code goes here
30
31
  }