@rockcarver/frodo-cli 0.12.4 → 0.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -7,6 +7,60 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
 
8
8
  ## [Unreleased]
9
9
 
10
+ ## [0.13.0] - 2022-09-17
11
+
12
+ ### Added
13
+
14
+ - Frodo now allows two new parameters when adding a connection profile:
15
+
16
+ \--authentication-service [service] Name of the authentication service/tree to use.
17
+
18
+ \--authentication-header-overrides [headers] Map of headers: {"host":"am.example.com:8081"}.
19
+
20
+ These parameters are currently only supported in the `frodo conn add` command and the configuration elements will be automatically applied to commands issued using that connection profile.
21
+
22
+ % frodo conn add https://platform.example.com:9443/am username password --authentication-service ldapService --authentication-header-overrides '{"host":"am.example.com:8081"}' -k
23
+ ForgeOps deployment detected.
24
+ Connected to ForgeRock Access Management 7.2.0 Build 64ef7ebc01ed3df1a1264d7b0400351bc101361f (2022-June-27 08:15)
25
+ Saving creds in /Users/vscheuber/.frodo/.frodorc...
26
+ Updating connection profile https://platform.example.com:9443/am
27
+ Advanced setting: Authentication Service: ldapService
28
+ Advanced setting: Authentication Header Overrides:
29
+ { host: 'am.example.com:8081' }
30
+ %
31
+
32
+ After the connection profile is created with the additional parameters, the environment can be accessed as usual. In this case it requires the `-k` parameter for every command, as the environment uses a self-signed certificate.
33
+
34
+ % frodo journey list platform alpha -k
35
+ ForgeOps deployment detected.
36
+ Connected to ForgeRock Access Management 7.2.0 Build 64ef7ebc01ed3df1a1264d7b0400351bc101361f (2022-June-27 08:15)
37
+ Listing journeys in realm "alpha"...
38
+ Agent
39
+ Example
40
+ Facebook-ProvisionIDMAccount
41
+ Google-AnonymousUser
42
+ Google-DynamicAccountCreation
43
+ HmacOneTimePassword
44
+ PersistentCookie
45
+ PlatformForgottenUsername
46
+ PlatformLogin
47
+ PlatformProgressiveProfile
48
+ PlatformRegistration
49
+ PlatformResetPassword
50
+ PlatformUpdatePassword
51
+ RetryLimit
52
+ %
53
+
54
+ ### Fixed
55
+
56
+ - rockcarver/frodo-lib#94: Frodo can now connect to improperly configured platform instances
57
+
58
+ ## [0.12.5] - 2022-09-16
59
+
60
+ ### Fixed
61
+
62
+ - \#92: `frodo email template list <host>` now runs properly
63
+
10
64
  ## [0.12.4] - 2022-09-15
11
65
 
12
66
  ### Changed
@@ -481,7 +535,11 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
481
535
  - Fixed problem with adding connection profiles
482
536
  - Miscellaneous bug fixes
483
537
 
484
- [Unreleased]: https://github.com/rockcarver/frodo-cli/compare/v0.12.4...HEAD
538
+ [Unreleased]: https://github.com/rockcarver/frodo-cli/compare/v0.13.0...HEAD
539
+
540
+ [0.13.0]: https://github.com/rockcarver/frodo-cli/compare/v0.12.5...v0.13.0
541
+
542
+ [0.12.5]: https://github.com/rockcarver/frodo-cli/compare/v0.12.4...v0.12.5
485
543
 
486
544
  [0.12.4]: https://github.com/rockcarver/frodo-cli/compare/v0.12.4-6...v0.12.4
487
545
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@rockcarver/frodo-cli",
3
- "version": "0.12.4",
3
+ "version": "0.13.0",
4
4
  "type": "module",
5
5
  "description": "A command line interface to manage ForgeRock Identity Cloud tenants, ForgeOps deployments, and classic deployments.",
6
6
  "keywords": [
@@ -85,7 +85,7 @@
85
85
  },
86
86
  "dependencies": {
87
87
  "@colors/colors": "^1.5.0",
88
- "@rockcarver/frodo-lib": "0.12.2",
88
+ "@rockcarver/frodo-lib": "0.12.4",
89
89
  "cli-progress": "^3.11.2",
90
90
  "cli-table3": "^0.6.2",
91
91
  "commander": "^9.4.0",
@@ -21,6 +21,18 @@ program
21
21
  .addOption(common.deploymentOption)
22
22
  .addOption(common.insecureOption)
23
23
  .addOption(new Option('--no-validate', 'Do not validate connection.'))
24
+ .addOption(
25
+ new Option(
26
+ '--authentication-service [service]',
27
+ 'Name of the authentication service/tree to use.'
28
+ )
29
+ )
30
+ .addOption(
31
+ new Option(
32
+ '--authentication-header-overrides [headers]',
33
+ 'Map of headers: {"host":"am.example.com:8081"}.'
34
+ )
35
+ )
24
36
  .action(
25
37
  // implement command logic inside action handler
26
38
  async (host, user, password, key, secret, options) => {
@@ -31,6 +43,16 @@ program
31
43
  state.default.session.setLogApiSecret(secret);
32
44
  state.default.session.setDeploymentType(options.type);
33
45
  state.default.session.setAllowInsecureConnection(options.insecure);
46
+ if (options.authenticationService) {
47
+ state.default.session.setAuthenticationService(
48
+ options.authenticationService
49
+ );
50
+ }
51
+ if (options.authenticationHeaderOverrides) {
52
+ state.default.session.setAuthenticationHeaderOverrides(
53
+ JSON.parse(options.authenticationHeaderOverrides)
54
+ );
55
+ }
34
56
  if ((options.validate && (await getTokens())) || !options.validate) {
35
57
  saveConnectionProfile();
36
58
  } else {