@rockcarver/frodo-cli 0.10.4 → 0.11.1-2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +13 -1
- package/README.md +3 -3
- package/package.json +17 -15
- package/src/app.js +7 -6
- package/src/cli/_template/cmd-delete.js +9 -8
- package/src/cli/_template/cmd-describe.js +9 -8
- package/src/cli/_template/cmd-export.js +9 -8
- package/src/cli/_template/cmd-import.js +9 -8
- package/src/cli/_template/cmd-list.js +9 -8
- package/src/cli/_template/cmd-sub1-delete.js +9 -8
- package/src/cli/_template/cmd-sub1-describe.js +9 -8
- package/src/cli/_template/cmd-sub1-export.js +9 -8
- package/src/cli/_template/cmd-sub1-import.js +9 -8
- package/src/cli/_template/cmd-sub1-list.js +9 -8
- package/src/cli/_template/cmd-sub2-delete.js +9 -8
- package/src/cli/_template/cmd-sub2-describe.js +9 -8
- package/src/cli/_template/cmd-sub2-export.js +9 -8
- package/src/cli/_template/cmd-sub2-import.js +9 -8
- package/src/cli/_template/cmd-sub2-list.js +9 -8
- package/src/cli/admin/admin-add-autoid-static-user-mapping.js +12 -12
- package/src/cli/admin/admin-create-oauth2-client-with-admin-privileges.js +15 -18
- package/src/cli/admin/admin-get-access-token.js +12 -12
- package/src/cli/admin/admin-grant-oauth2-client-admin-privileges.js +13 -13
- package/src/cli/admin/admin-hide-generic-extension-attributes.js +13 -13
- package/src/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js +13 -13
- package/src/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js +14 -13
- package/src/cli/admin/admin-list-static-user-mappings.js +12 -12
- package/src/cli/admin/admin-remove-static-user-mapping.js +12 -12
- package/src/cli/admin/admin-repair-org-model.js +13 -13
- package/src/cli/admin/admin-revoke-oauth2-client-admin-privileges.js +13 -13
- package/src/cli/admin/admin-show-generic-extension-attributes.js +13 -13
- package/src/cli/app/app-delete.js +9 -8
- package/src/cli/app/app-describe.js +9 -8
- package/src/cli/app/app-export.js +15 -15
- package/src/cli/app/app-import.js +11 -11
- package/src/cli/app/app-list.js +11 -12
- package/src/cli/conn/conn-add.js +11 -11
- package/src/cli/conn/conn-delete.js +3 -1
- package/src/cli/conn/conn-describe.js +3 -1
- package/src/cli/conn/conn-list.js +3 -4
- package/src/cli/email/email-template-export.js +16 -16
- package/src/cli/email/email-template-import.js +16 -16
- package/src/cli/email/email-template-list.js +11 -11
- package/src/cli/esv/esv-apply.js +12 -12
- package/src/cli/esv/esv-secret-create.js +11 -11
- package/src/cli/esv/esv-secret-delete.js +13 -13
- package/src/cli/esv/esv-secret-describe.js +11 -11
- package/src/cli/esv/esv-secret-export.js +9 -8
- package/src/cli/esv/esv-secret-import.js +9 -8
- package/src/cli/esv/esv-secret-list.js +11 -11
- package/src/cli/esv/esv-secret-set.js +11 -11
- package/src/cli/esv/esv-secret-version-activate.js +12 -12
- package/src/cli/esv/esv-secret-version-create.js +11 -11
- package/src/cli/esv/esv-secret-version-deactivate.js +12 -12
- package/src/cli/esv/esv-secret-version-delete.js +13 -13
- package/src/cli/esv/esv-secret-version-list.js +11 -11
- package/src/cli/esv/esv-variable-create.js +11 -11
- package/src/cli/esv/esv-variable-delete.js +13 -16
- package/src/cli/esv/esv-variable-describe.js +11 -11
- package/src/cli/esv/esv-variable-export.js +9 -8
- package/src/cli/esv/esv-variable-import.js +9 -8
- package/src/cli/esv/esv-variable-list.js +11 -11
- package/src/cli/esv/esv-variable-set.js +13 -16
- package/src/cli/idm/idm-count.js +11 -11
- package/src/cli/idm/idm-export.js +16 -16
- package/src/cli/idm/idm-list.js +11 -11
- package/src/cli/idp/idp-export.js +15 -19
- package/src/cli/idp/idp-import.js +18 -18
- package/src/cli/idp/idp-list.js +12 -12
- package/src/cli/info/info.js +23 -19
- package/src/cli/journey/journey-delete.js +14 -14
- package/src/cli/journey/journey-describe.js +26 -35
- package/src/cli/journey/journey-export.js +18 -21
- package/src/cli/journey/journey-import.js +17 -17
- package/src/cli/journey/journey-list.js +12 -12
- package/src/cli/journey/journey-prune.js +12 -12
- package/src/cli/logging/logs-list.js +33 -28
- package/src/cli/logging/logs-tail.js +26 -22
- package/src/cli/realm/realm-add-custom-domain.js +13 -13
- package/src/cli/realm/realm-describe.js +14 -14
- package/src/cli/realm/realm-list.js +11 -11
- package/src/cli/realm/realm-remove-custom-domain.js +16 -13
- package/src/cli/saml/saml-cot-export.js +16 -16
- package/src/cli/saml/saml-cot-import.js +18 -18
- package/src/cli/saml/saml-cot-list.js +12 -12
- package/src/cli/saml/saml-describe.js +12 -12
- package/src/cli/saml/saml-export.js +16 -19
- package/src/cli/saml/saml-import.js +19 -18
- package/src/cli/saml/saml-list.js +12 -12
- package/src/cli/saml/saml-metadata-export.js +15 -19
- package/src/cli/script/script-delete.js +9 -8
- package/src/cli/script/script-describe.js +9 -8
- package/src/cli/script/script-export.js +18 -20
- package/src/cli/script/script-import.js +13 -12
- package/src/cli/script/script-list.js +12 -12
- package/src/cli/theme/theme-delete.js +17 -21
- package/src/cli/theme/theme-export.js +19 -18
- package/src/cli/theme/theme-import.js +21 -20
- package/src/cli/theme/theme-list.js +12 -12
- package/.eslintrc +0 -29
- package/.github/ISSUE_TEMPLATE/bug_report.md +0 -30
- package/.github/ISSUE_TEMPLATE/feature_request.md +0 -20
- package/.github/README.md +0 -273
- package/.github/workflows/pipeline.yml +0 -487
- package/.prettierrc +0 -6
- package/CODE_OF_CONDUCT.md +0 -128
- package/docs/BINARIES.md +0 -22
- package/docs/CONTRIBUTE.md +0 -96
- package/docs/PIPELINE.md +0 -169
- package/docs/images/macos_warn1.png +0 -0
- package/docs/images/macos_warn2.png +0 -0
- package/docs/images/macos_warn3.png +0 -0
- package/docs/images/npm_versioning_guidelines.png +0 -0
- package/docs/images/release_pipeline.png +0 -0
- package/gulpfile.js +0 -49
- package/jsconfig.json +0 -6
- package/resources/sampleEntitiesFile.json +0 -8
- package/resources/sampleEnvFile.env +0 -2
- package/src/api/AuthenticateApi.js +0 -33
- package/src/api/BaseApi.js +0 -242
- package/src/api/CirclesOfTrustApi.js +0 -87
- package/src/api/EmailTemplateApi.js +0 -37
- package/src/api/IdmConfigApi.js +0 -88
- package/src/api/LogApi.js +0 -45
- package/src/api/ManagedObjectApi.js +0 -62
- package/src/api/OAuth2ClientApi.js +0 -69
- package/src/api/OAuth2OIDCApi.js +0 -73
- package/src/api/OAuth2ProviderApi.js +0 -32
- package/src/api/RealmApi.js +0 -99
- package/src/api/Saml2Api.js +0 -176
- package/src/api/ScriptApi.js +0 -84
- package/src/api/SecretsApi.js +0 -151
- package/src/api/ServerInfoApi.js +0 -41
- package/src/api/SocialIdentityProvidersApi.js +0 -114
- package/src/api/StartupApi.js +0 -45
- package/src/api/ThemeApi.js +0 -181
- package/src/api/TreeApi.js +0 -207
- package/src/api/VariablesApi.js +0 -104
- package/src/api/utils/ApiUtils.js +0 -77
- package/src/api/utils/Base64.js +0 -62
- package/src/cli/journey/journey-delete.e2e.test.js +0 -380
- package/src/cli/journey/journey-list.e2e.test.js +0 -141
- package/src/cli/theme/theme-delete.e2e.test.js +0 -178
- package/src/cli/theme/theme-list.e2e.test.js +0 -119
- package/src/ops/AdminOps.js +0 -901
- package/src/ops/AuthenticateOps.js +0 -342
- package/src/ops/CirclesOfTrustOps.js +0 -350
- package/src/ops/ConnectionProfileOps.js +0 -254
- package/src/ops/EmailTemplateOps.js +0 -326
- package/src/ops/IdmOps.js +0 -227
- package/src/ops/IdpOps.js +0 -342
- package/src/ops/JourneyOps.js +0 -2026
- package/src/ops/LogOps.js +0 -357
- package/src/ops/ManagedObjectOps.js +0 -34
- package/src/ops/OAuth2ClientOps.js +0 -151
- package/src/ops/OrganizationOps.js +0 -85
- package/src/ops/RealmOps.js +0 -139
- package/src/ops/SamlOps.js +0 -541
- package/src/ops/ScriptOps.js +0 -211
- package/src/ops/SecretsOps.js +0 -288
- package/src/ops/StartupOps.js +0 -114
- package/src/ops/ThemeOps.js +0 -379
- package/src/ops/VariablesOps.js +0 -185
- package/src/ops/templates/OAuth2ClientTemplate.json +0 -270
- package/src/ops/templates/OrgModelUserAttributesTemplate.json +0 -149
- package/src/ops/templates/cloud/GenericExtensionAttributesTemplate.json +0 -392
- package/src/ops/templates/cloud/managed.json +0 -4119
- package/src/ops/utils/Console.js +0 -434
- package/src/ops/utils/DataProtection.js +0 -92
- package/src/ops/utils/ExportImportUtils.js +0 -146
- package/src/ops/utils/OpsUtils.js +0 -76
- package/src/ops/utils/Wordwrap.js +0 -11
- package/src/storage/SessionStorage.js +0 -45
- package/test/client_cli/en/connections.test.js +0 -62
- package/test/client_cli/en/connections_add.test.js +0 -34
- package/test/client_cli/en/connections_delete.test.js +0 -34
- package/test/client_cli/en/connections_list.test.js +0 -34
- package/test/client_cli/en/email_templates.test.js +0 -77
- package/test/client_cli/en/email_templates_export.test.js +0 -196
- package/test/client_cli/en/email_templates_import.test.js +0 -145
- package/test/client_cli/en/email_templates_list.test.js +0 -130
- package/test/client_cli/en/idm.test.js +0 -111
- package/test/client_cli/en/idm_count.test.js +0 -121
- package/test/client_cli/en/idm_export.test.js +0 -136
- package/test/client_cli/en/idm_exportAll.test.js +0 -156
- package/test/client_cli/en/idm_exportAllRaw.test.js +0 -120
- package/test/client_cli/en/idm_import.test_.js +0 -103
- package/test/client_cli/en/idm_importAll.test_.js +0 -103
- package/test/client_cli/en/idm_list.test.js +0 -103
- package/test/client_cli/en/info.test.js +0 -125
- package/test/client_cli/en/journey.test.js +0 -127
- package/test/client_cli/en/journey_describe.test.js +0 -196
- package/test/client_cli/en/journey_export.test.js +0 -213
- package/test/client_cli/en/journey_import.test.js +0 -195
- package/test/client_cli/en/journey_importAll.test.js +0 -180
- package/test/client_cli/en/journey_list.test.js +0 -162
- package/test/client_cli/en/journey_prune.test.js +0 -148
- package/test/client_cli/en/logs.test.js +0 -79
- package/test/client_cli/en/logs_list.test.js +0 -83
- package/test/client_cli/en/logs_tail.test.js +0 -118
- package/test/client_cli/en/root.test.js +0 -91
- package/test/client_cli/en/script.test.js +0 -77
- package/test/client_cli/en/script_export.test.js +0 -213
- package/test/client_cli/en/script_import.test.js +0 -163
- package/test/client_cli/en/script_list.test.js +0 -148
- package/test/client_cli/utils/utils.js +0 -32
- package/test/e2e/journey/baseline/ForgottenUsername.journey.json +0 -216
- package/test/e2e/journey/baseline/Login.journey.json +0 -205
- package/test/e2e/journey/baseline/PasswordGrant.journey.json +0 -139
- package/test/e2e/journey/baseline/ProgressiveProfile.journey.json +0 -198
- package/test/e2e/journey/baseline/Registration.journey.json +0 -249
- package/test/e2e/journey/baseline/ResetPassword.journey.json +0 -268
- package/test/e2e/journey/baseline/UpdatePassword.journey.json +0 -323
- package/test/e2e/journey/baseline/allAlphaJourneys.journeys.json +0 -1520
- package/test/e2e/journey/delete/ForgottenUsername.journey.json +0 -216
- package/test/e2e/journey/delete/Login.journey.json +0 -205
- package/test/e2e/journey/delete/PasswordGrant.journey.json +0 -139
- package/test/e2e/journey/delete/ProgressiveProfile.journey.json +0 -198
- package/test/e2e/journey/delete/Registration.journey.json +0 -249
- package/test/e2e/journey/delete/ResetPassword.journey.json +0 -268
- package/test/e2e/journey/delete/UpdatePassword.journey.json +0 -323
- package/test/e2e/journey/delete/deleteMe.journey.json +0 -230
- package/test/e2e/journey/list/Disabled.journey.json +0 -43
- package/test/e2e/journey/list/ForgottenUsername.journey.json +0 -216
- package/test/e2e/journey/list/Login.journey.json +0 -205
- package/test/e2e/journey/list/PasswordGrant.journey.json +0 -139
- package/test/e2e/journey/list/ProgressiveProfile.journey.json +0 -198
- package/test/e2e/journey/list/Registration.journey.json +0 -249
- package/test/e2e/journey/list/ResetPassword.journey.json +0 -268
- package/test/e2e/journey/list/UpdatePassword.journey.json +0 -323
- package/test/e2e/setup.js +0 -98
- package/test/e2e/theme/baseline/Contrast.theme.json +0 -95
- package/test/e2e/theme/baseline/Highlander.theme.json +0 -95
- package/test/e2e/theme/baseline/Robroy.theme.json +0 -95
- package/test/e2e/theme/baseline/Starter-Theme.theme.json +0 -94
- package/test/e2e/theme/baseline/Zardoz.theme.json +0 -95
- package/test/e2e/theme/import/Contrast.theme.json +0 -95
- package/test/e2e/theme/import/Highlander.theme.json +0 -95
- package/test/e2e/theme/import/Robroy.theme.json +0 -95
- package/test/e2e/theme/import/Starter-Theme.theme.json +0 -94
- package/test/e2e/theme/import/Zardoz.default.theme.json +0 -95
- package/test/fs_tmp/.gitkeep +0 -2
- package/test/global/setup.js +0 -65
- package/test/lib_api/unit_tests/ApiUtils.test.js +0 -186
- package/test/lib_api/unit_tests/Base64URL.test.js +0 -22
- package/test/lib_api/unit_tests/DataProtection.test.js +0 -25
- package/test/lib_api/unit_tests/ExportImportUtils.test.js +0 -121
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command } from 'commander';
|
|
2
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { addAutoIdStaticUserMapping } from '../../ops/AdminOps.js';
|
|
4
|
+
|
|
5
|
+
const { getTokens } = Authenticate;
|
|
6
|
+
const { addAutoIdStaticUserMapping } = Admin;
|
|
7
7
|
|
|
8
8
|
const program = new Command('frodo admin add-autoid-static-user-mapping');
|
|
9
9
|
|
|
@@ -22,16 +22,16 @@ program
|
|
|
22
22
|
.action(
|
|
23
23
|
// implement command logic inside action handler
|
|
24
24
|
async (host, realm, user, password, options) => {
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
25
|
+
state.default.session.setTenant(host);
|
|
26
|
+
state.default.session.setRealm(realm);
|
|
27
|
+
state.default.session.setUsername(user);
|
|
28
|
+
state.default.session.setPassword(password);
|
|
29
|
+
state.default.session.setDeploymentType(options.type);
|
|
30
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
31
31
|
if (await getTokens()) {
|
|
32
|
-
|
|
32
|
+
console.log(`Adding AutoId static user mapping...`);
|
|
33
33
|
await addAutoIdStaticUserMapping();
|
|
34
|
-
|
|
34
|
+
console.log('Done.');
|
|
35
35
|
}
|
|
36
36
|
}
|
|
37
37
|
// end command logic inside action handler
|
|
@@ -1,14 +1,11 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
2
|
import { v4 as uuidv4 } from 'uuid';
|
|
3
3
|
import Table from 'cli-table3';
|
|
4
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
4
5
|
import * as common from '../cmd_common.js';
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
import {
|
|
9
|
-
createLongLivedToken,
|
|
10
|
-
createOAuth2ClientWithAdminPrivileges,
|
|
11
|
-
} from '../../ops/AdminOps.js';
|
|
6
|
+
|
|
7
|
+
const { getTokens } = Authenticate;
|
|
8
|
+
const { createLongLivedToken, createOAuth2ClientWithAdminPrivileges } = Admin;
|
|
12
9
|
|
|
13
10
|
const program = new Command(
|
|
14
11
|
'frodo admin create-oauth2-client-with-admin-privileges'
|
|
@@ -53,15 +50,15 @@ program
|
|
|
53
50
|
.action(
|
|
54
51
|
// implement command logic inside action handler
|
|
55
52
|
async (host, realm, user, password, options) => {
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
53
|
+
state.default.session.setTenant(host);
|
|
54
|
+
state.default.session.setRealm(realm);
|
|
55
|
+
state.default.session.setUsername(user);
|
|
56
|
+
state.default.session.setPassword(password);
|
|
57
|
+
state.default.session.setDeploymentType(options.type);
|
|
58
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
62
59
|
if (await getTokens()) {
|
|
63
|
-
|
|
64
|
-
`Creating oauth2 client with admin privileges in realm "${
|
|
60
|
+
console.log(
|
|
61
|
+
`Creating oauth2 client with admin privileges in realm "${state.default.session.getRealm()}"...`
|
|
65
62
|
);
|
|
66
63
|
let clientId = uuidv4();
|
|
67
64
|
let clientSecret = uuidv4();
|
|
@@ -74,7 +71,7 @@ program
|
|
|
74
71
|
try {
|
|
75
72
|
await createOAuth2ClientWithAdminPrivileges(clientId, clientSecret);
|
|
76
73
|
} catch (error) {
|
|
77
|
-
|
|
74
|
+
console.log(error, 'error');
|
|
78
75
|
}
|
|
79
76
|
const table = new Table({
|
|
80
77
|
chars: {
|
|
@@ -110,12 +107,12 @@ program
|
|
|
110
107
|
// table.push(['Token Lifetime'.brightCyan, response.expires_in]);
|
|
111
108
|
table.push(['Expires'.brightCyan, response.expires_on]);
|
|
112
109
|
} catch (error) {
|
|
113
|
-
|
|
110
|
+
console.log(error, 'error');
|
|
114
111
|
}
|
|
115
112
|
}
|
|
116
113
|
table.push(['Client ID'.brightCyan, clientId]);
|
|
117
114
|
table.push(['Client Secret'.brightCyan, clientSecret]);
|
|
118
|
-
|
|
115
|
+
console.log(table.toString());
|
|
119
116
|
}
|
|
120
117
|
}
|
|
121
118
|
// end command logic inside action handler
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, OAuth2OIDCApi, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { clientCredentialsGrant } from '../../api/OAuth2OIDCApi.js';
|
|
4
|
+
|
|
5
|
+
const { clientCredentialsGrant } = OAuth2OIDCApi;
|
|
6
|
+
const { getTokens } = Authenticate;
|
|
7
7
|
|
|
8
8
|
const program = new Command('frodo admin get-access-token');
|
|
9
9
|
|
|
@@ -33,14 +33,14 @@ program
|
|
|
33
33
|
.action(
|
|
34
34
|
// implement command logic inside action handler
|
|
35
35
|
async (host, realm, user, password, options) => {
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
36
|
+
state.default.session.setTenant(host);
|
|
37
|
+
state.default.session.setRealm(realm);
|
|
38
|
+
state.default.session.setUsername(user);
|
|
39
|
+
state.default.session.setPassword(password);
|
|
40
|
+
state.default.session.setDeploymentType(options.type);
|
|
41
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
42
42
|
if (await getTokens()) {
|
|
43
|
-
|
|
43
|
+
console.log(
|
|
44
44
|
`Getting an access token using client "${options.clientId}"...`
|
|
45
45
|
);
|
|
46
46
|
const response = (
|
|
@@ -50,7 +50,7 @@ program
|
|
|
50
50
|
options.scope
|
|
51
51
|
)
|
|
52
52
|
).data;
|
|
53
|
-
|
|
53
|
+
console.log(`Token: ${response.access_token}`);
|
|
54
54
|
}
|
|
55
55
|
}
|
|
56
56
|
// end command logic inside action handler
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { grantOAuth2ClientAdminPrivileges } from '../../ops/AdminOps.js';
|
|
4
|
+
|
|
5
|
+
const { getTokens } = Authenticate;
|
|
6
|
+
const { grantOAuth2ClientAdminPrivileges } = Admin;
|
|
7
7
|
|
|
8
8
|
const program = new Command('frodo admin grant-oauth2-client-admin-privileges');
|
|
9
9
|
|
|
@@ -23,20 +23,20 @@ program
|
|
|
23
23
|
.action(
|
|
24
24
|
// implement command logic inside action handler
|
|
25
25
|
async (host, realm, user, password, options) => {
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
26
|
+
state.default.session.setTenant(host);
|
|
27
|
+
state.default.session.setRealm(realm);
|
|
28
|
+
state.default.session.setUsername(user);
|
|
29
|
+
state.default.session.setPassword(password);
|
|
30
|
+
state.default.session.setDeploymentType(options.type);
|
|
31
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
32
32
|
if (await getTokens()) {
|
|
33
|
-
|
|
33
|
+
console.log(
|
|
34
34
|
`Granting oauth2 client "${
|
|
35
35
|
options.target
|
|
36
|
-
}" in realm "${
|
|
36
|
+
}" in realm "${state.default.session.getRealm()}" admin privileges...`
|
|
37
37
|
);
|
|
38
38
|
await grantOAuth2ClientAdminPrivileges(options.target);
|
|
39
|
-
|
|
39
|
+
console.log('Done.');
|
|
40
40
|
}
|
|
41
41
|
}
|
|
42
42
|
// end command logic inside action handler
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { hideGenericExtensionAttributes } from '../../ops/AdminOps.js';
|
|
4
|
+
|
|
5
|
+
const { getTokens } = Authenticate;
|
|
6
|
+
const { hideGenericExtensionAttributes } = Admin;
|
|
7
7
|
|
|
8
8
|
const program = new Command('frodo admin hide-generic-extension-attributes');
|
|
9
9
|
|
|
@@ -24,21 +24,21 @@ program
|
|
|
24
24
|
.action(
|
|
25
25
|
// implement command logic inside action handler
|
|
26
26
|
async (host, realm, user, password, options) => {
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
27
|
+
state.default.session.setTenant(host);
|
|
28
|
+
state.default.session.setRealm(realm);
|
|
29
|
+
state.default.session.setUsername(user);
|
|
30
|
+
state.default.session.setPassword(password);
|
|
31
|
+
state.default.session.setDeploymentType(options.type);
|
|
32
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
33
33
|
if (await getTokens()) {
|
|
34
|
-
|
|
35
|
-
`Hiding generic extension attributes in realm "${
|
|
34
|
+
console.log(
|
|
35
|
+
`Hiding generic extension attributes in realm "${state.default.session.getRealm()}"...`
|
|
36
36
|
);
|
|
37
37
|
await hideGenericExtensionAttributes(
|
|
38
38
|
options.includeCustomized,
|
|
39
39
|
options.dryRun
|
|
40
40
|
);
|
|
41
|
-
|
|
41
|
+
console.log('Done.');
|
|
42
42
|
}
|
|
43
43
|
}
|
|
44
44
|
// end command logic inside action handler
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command } from 'commander';
|
|
2
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { listOAuth2AdminClients } from '../../ops/AdminOps.js';
|
|
4
|
+
|
|
5
|
+
const { listOAuth2AdminClients } = Admin;
|
|
6
|
+
const { getTokens } = Authenticate;
|
|
7
7
|
|
|
8
8
|
const program = new Command(
|
|
9
9
|
'frodo admin list-oauth2-clients-with-admin-privileges'
|
|
@@ -22,20 +22,20 @@ program
|
|
|
22
22
|
.action(
|
|
23
23
|
// implement command logic inside action handler
|
|
24
24
|
async (host, realm, user, password, options) => {
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
25
|
+
state.default.session.setTenant(host);
|
|
26
|
+
state.default.session.setRealm(realm);
|
|
27
|
+
state.default.session.setUsername(user);
|
|
28
|
+
state.default.session.setPassword(password);
|
|
29
|
+
state.default.session.setDeploymentType(options.type);
|
|
30
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
31
31
|
if (await getTokens()) {
|
|
32
|
-
|
|
33
|
-
`Listing oauth2 clients with admin privileges in realm "${
|
|
32
|
+
console.log(
|
|
33
|
+
`Listing oauth2 clients with admin privileges in realm "${state.default.session.getRealm()}"...`
|
|
34
34
|
);
|
|
35
35
|
const adminClients = await listOAuth2AdminClients();
|
|
36
36
|
adminClients.sort((a, b) => a.localeCompare(b));
|
|
37
37
|
adminClients.forEach((item) => {
|
|
38
|
-
|
|
38
|
+
console.log(`${item}`);
|
|
39
39
|
});
|
|
40
40
|
}
|
|
41
41
|
}
|
|
@@ -1,9 +1,10 @@
|
|
|
1
1
|
import { Command } from 'commander';
|
|
2
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
4
|
+
|
|
5
|
+
const { listOAuth2CustomClients } = Admin;
|
|
6
|
+
|
|
7
|
+
const { getTokens } = Authenticate;
|
|
7
8
|
|
|
8
9
|
const program = new Command(
|
|
9
10
|
'frodo admin list-oauth2-clients-with-custom-privileges'
|
|
@@ -22,20 +23,20 @@ program
|
|
|
22
23
|
.action(
|
|
23
24
|
// implement command logic inside action handler
|
|
24
25
|
async (host, realm, user, password, options) => {
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
26
|
+
state.default.session.setTenant(host);
|
|
27
|
+
state.default.session.setRealm(realm);
|
|
28
|
+
state.default.session.setUsername(user);
|
|
29
|
+
state.default.session.setPassword(password);
|
|
30
|
+
state.default.session.setDeploymentType(options.type);
|
|
31
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
31
32
|
if (await getTokens()) {
|
|
32
|
-
|
|
33
|
-
`Listing oauth2 clients with custom privileges in realm "${
|
|
33
|
+
console.log(
|
|
34
|
+
`Listing oauth2 clients with custom privileges in realm "${state.default.session.getRealm()}"...`
|
|
34
35
|
);
|
|
35
36
|
const adminClients = await listOAuth2CustomClients();
|
|
36
37
|
adminClients.sort((a, b) => a.localeCompare(b));
|
|
37
38
|
adminClients.forEach((item) => {
|
|
38
|
-
|
|
39
|
+
console.log(`${item}`);
|
|
39
40
|
});
|
|
40
41
|
}
|
|
41
42
|
}
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { listNonOAuth2AdminStaticUserMappings } from '../../ops/AdminOps.js';
|
|
4
|
+
|
|
5
|
+
const { getTokens } = Authenticate;
|
|
6
|
+
const { listNonOAuth2AdminStaticUserMappings } = Admin;
|
|
7
7
|
|
|
8
8
|
const program = new Command('frodo admin list-static-user-mappings');
|
|
9
9
|
|
|
@@ -28,14 +28,14 @@ program
|
|
|
28
28
|
.action(
|
|
29
29
|
// implement command logic inside action handler
|
|
30
30
|
async (host, realm, user, password, options) => {
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
31
|
+
state.default.session.setTenant(host);
|
|
32
|
+
state.default.session.setRealm(realm);
|
|
33
|
+
state.default.session.setUsername(user);
|
|
34
|
+
state.default.session.setPassword(password);
|
|
35
|
+
state.default.session.setDeploymentType(options.type);
|
|
36
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
37
37
|
if (await getTokens()) {
|
|
38
|
-
|
|
38
|
+
console.log(
|
|
39
39
|
'Listing all non-oauth2 client subjects of static user mappings...'
|
|
40
40
|
);
|
|
41
41
|
const subjects = await listNonOAuth2AdminStaticUserMappings(
|
|
@@ -43,7 +43,7 @@ program
|
|
|
43
43
|
);
|
|
44
44
|
subjects.sort((a, b) => a.localeCompare(b));
|
|
45
45
|
subjects.forEach((item) => {
|
|
46
|
-
|
|
46
|
+
console.log(`${item}`);
|
|
47
47
|
});
|
|
48
48
|
}
|
|
49
49
|
}
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command } from 'commander';
|
|
2
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { removeStaticUserMapping } from '../../ops/AdminOps.js';
|
|
4
|
+
|
|
5
|
+
const { getTokens } = Authenticate;
|
|
6
|
+
const { removeStaticUserMapping } = Admin;
|
|
7
7
|
|
|
8
8
|
const program = new Command('frodo admin remove-static-user-mapping');
|
|
9
9
|
|
|
@@ -20,16 +20,16 @@ program
|
|
|
20
20
|
.action(
|
|
21
21
|
// implement command logic inside action handler
|
|
22
22
|
async (host, realm, user, password, options) => {
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
23
|
+
state.default.session.setTenant(host);
|
|
24
|
+
state.default.session.setRealm(realm);
|
|
25
|
+
state.default.session.setUsername(user);
|
|
26
|
+
state.default.session.setPassword(password);
|
|
27
|
+
state.default.session.setDeploymentType(options.type);
|
|
28
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
29
29
|
if (await getTokens()) {
|
|
30
|
-
|
|
30
|
+
console.log("Removing a subject's static user mapping...");
|
|
31
31
|
await removeStaticUserMapping(options.subject);
|
|
32
|
-
|
|
32
|
+
console.log('Done.');
|
|
33
33
|
}
|
|
34
34
|
}
|
|
35
35
|
// end command logic inside action handler
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { repairOrgModel } from '../../ops/AdminOps.js';
|
|
4
|
+
|
|
5
|
+
const { getTokens } = Authenticate;
|
|
6
|
+
const { repairOrgModel } = Admin;
|
|
7
7
|
|
|
8
8
|
const program = new Command('frodo admin repair-org-model');
|
|
9
9
|
|
|
@@ -27,18 +27,18 @@ program
|
|
|
27
27
|
.action(
|
|
28
28
|
// implement command logic inside action handler
|
|
29
29
|
async (host, realm, user, password, options) => {
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
30
|
+
state.default.session.setTenant(host);
|
|
31
|
+
state.default.session.setRealm(realm);
|
|
32
|
+
state.default.session.setUsername(user);
|
|
33
|
+
state.default.session.setPassword(password);
|
|
34
|
+
state.default.session.setDeploymentType(options.type);
|
|
35
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
36
36
|
if (await getTokens()) {
|
|
37
|
-
|
|
38
|
-
`Repairing org model in realm "${
|
|
37
|
+
console.log(
|
|
38
|
+
`Repairing org model in realm "${state.default.session.getRealm()}"...`
|
|
39
39
|
);
|
|
40
40
|
await repairOrgModel(options.extendPermissions, options.dryRun);
|
|
41
|
-
|
|
41
|
+
console.log('Done.');
|
|
42
42
|
}
|
|
43
43
|
}
|
|
44
44
|
// end command logic inside action handler
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
|
+
import { Admin, Authenticate, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { revokeOAuth2ClientAdminPrivileges } from '../../ops/AdminOps.js';
|
|
4
|
+
|
|
5
|
+
const { getTokens } = Authenticate;
|
|
6
|
+
const { revokeOAuth2ClientAdminPrivileges } = Admin;
|
|
7
7
|
|
|
8
8
|
const program = new Command(
|
|
9
9
|
'frodo admin revoke-oauth2-client-admin-privileges'
|
|
@@ -25,20 +25,20 @@ program
|
|
|
25
25
|
.action(
|
|
26
26
|
// implement command logic inside action handler
|
|
27
27
|
async (host, realm, user, password, options) => {
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
28
|
+
state.default.session.setTenant(host);
|
|
29
|
+
state.default.session.setRealm(realm);
|
|
30
|
+
state.default.session.setUsername(user);
|
|
31
|
+
state.default.session.setPassword(password);
|
|
32
|
+
state.default.session.setDeploymentType(options.type);
|
|
33
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
34
34
|
if (await getTokens()) {
|
|
35
|
-
|
|
35
|
+
console.log(
|
|
36
36
|
`Revoking admin privileges from oauth2 client "${
|
|
37
37
|
options.target
|
|
38
|
-
}" in realm "${
|
|
38
|
+
}" in realm "${state.default.session.getRealm()}"...`
|
|
39
39
|
);
|
|
40
40
|
await revokeOAuth2ClientAdminPrivileges(options.target);
|
|
41
|
-
|
|
41
|
+
console.log('Done.');
|
|
42
42
|
}
|
|
43
43
|
}
|
|
44
44
|
// end command logic inside action handler
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Admin, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
import { showGenericExtensionAttributes } from '../../ops/AdminOps.js';
|
|
4
|
+
|
|
5
|
+
const { showGenericExtensionAttributes } = Admin;
|
|
6
|
+
const { getTokens } = Authenticate;
|
|
7
7
|
|
|
8
8
|
const program = new Command('frodo admin show-generic-extension-attributes');
|
|
9
9
|
|
|
@@ -32,21 +32,21 @@ program
|
|
|
32
32
|
.action(
|
|
33
33
|
// implement command logic inside action handler
|
|
34
34
|
async (host, realm, user, password, options) => {
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
35
|
+
state.default.session.setTenant(host);
|
|
36
|
+
state.default.session.setRealm(realm);
|
|
37
|
+
state.default.session.setUsername(user);
|
|
38
|
+
state.default.session.setPassword(password);
|
|
39
|
+
state.default.session.setDeploymentType(options.type);
|
|
40
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
41
41
|
if (await getTokens()) {
|
|
42
|
-
|
|
43
|
-
`Showing generic extension attributes in realm "${
|
|
42
|
+
console.log(
|
|
43
|
+
`Showing generic extension attributes in realm "${state.default.session.getRealm()}"...`
|
|
44
44
|
);
|
|
45
45
|
await showGenericExtensionAttributes(
|
|
46
46
|
options.includeCustomized,
|
|
47
47
|
options.dryRun
|
|
48
48
|
);
|
|
49
|
-
|
|
49
|
+
console.log('Done.');
|
|
50
50
|
}
|
|
51
51
|
}
|
|
52
52
|
// end command logic inside action handler
|
|
@@ -1,7 +1,8 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
4
|
+
|
|
5
|
+
const { getTokens } = Authenticate;
|
|
5
6
|
|
|
6
7
|
const program = new Command('frodo cmd delete');
|
|
7
8
|
|
|
@@ -39,12 +40,12 @@ program
|
|
|
39
40
|
.action(
|
|
40
41
|
// implement command logic inside action handler
|
|
41
42
|
async (host, realm, user, password, options) => {
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
43
|
+
state.default.session.setTenant(host);
|
|
44
|
+
state.default.session.setRealm(realm);
|
|
45
|
+
state.default.session.setUsername(user);
|
|
46
|
+
state.default.session.setPassword(password);
|
|
47
|
+
state.default.session.setDeploymentType(options.type);
|
|
48
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
48
49
|
if (await getTokens()) {
|
|
49
50
|
// code goes here
|
|
50
51
|
}
|
|
@@ -1,7 +1,8 @@
|
|
|
1
1
|
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, state } from '@rockcarver/frodo-lib';
|
|
2
3
|
import * as common from '../cmd_common.js';
|
|
3
|
-
|
|
4
|
-
|
|
4
|
+
|
|
5
|
+
const { getTokens } = Authenticate;
|
|
5
6
|
|
|
6
7
|
const program = new Command('frodo app describe');
|
|
7
8
|
|
|
@@ -19,12 +20,12 @@ program
|
|
|
19
20
|
.action(
|
|
20
21
|
// implement command logic inside action handler
|
|
21
22
|
async (host, realm, user, password, options) => {
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
23
|
+
state.default.session.setTenant(host);
|
|
24
|
+
state.default.session.setRealm(realm);
|
|
25
|
+
state.default.session.setUsername(user);
|
|
26
|
+
state.default.session.setPassword(password);
|
|
27
|
+
state.default.session.setDeploymentType(options.type);
|
|
28
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
28
29
|
if (await getTokens()) {
|
|
29
30
|
// code goes here
|
|
30
31
|
}
|