@rockcarver/frodo-cli 2.0.0-57 → 2.0.0-59

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (398) hide show
  1. package/CHANGELOG.md +13 -1
  2. package/esm/cli/FrodoCommand.js +9 -1
  3. package/esm/cli/FrodoCommand.js.map +1 -1
  4. package/esm/cli/_template/something-delete.js +14 -12
  5. package/esm/cli/_template/something-delete.js.map +1 -1
  6. package/esm/cli/_template/something-describe.js +14 -12
  7. package/esm/cli/_template/something-describe.js.map +1 -1
  8. package/esm/cli/_template/something-else-delete.js +14 -12
  9. package/esm/cli/_template/something-else-delete.js.map +1 -1
  10. package/esm/cli/_template/something-else-describe.js +14 -12
  11. package/esm/cli/_template/something-else-describe.js.map +1 -1
  12. package/esm/cli/_template/something-else-export.js +14 -12
  13. package/esm/cli/_template/something-else-export.js.map +1 -1
  14. package/esm/cli/_template/something-else-import.js +14 -12
  15. package/esm/cli/_template/something-else-import.js.map +1 -1
  16. package/esm/cli/_template/something-else-list.js +14 -12
  17. package/esm/cli/_template/something-else-list.js.map +1 -1
  18. package/esm/cli/_template/something-else.js +15 -8
  19. package/esm/cli/_template/something-else.js.map +1 -1
  20. package/esm/cli/_template/something-export.js +14 -12
  21. package/esm/cli/_template/something-export.js.map +1 -1
  22. package/esm/cli/_template/something-import.js +14 -12
  23. package/esm/cli/_template/something-import.js.map +1 -1
  24. package/esm/cli/_template/something-list.js +14 -12
  25. package/esm/cli/_template/something-list.js.map +1 -1
  26. package/esm/cli/_template/something-other-delete.js +14 -12
  27. package/esm/cli/_template/something-other-delete.js.map +1 -1
  28. package/esm/cli/_template/something-other-describe.js +14 -12
  29. package/esm/cli/_template/something-other-describe.js.map +1 -1
  30. package/esm/cli/_template/something-other-export.js +14 -12
  31. package/esm/cli/_template/something-other-export.js.map +1 -1
  32. package/esm/cli/_template/something-other-import.js +14 -12
  33. package/esm/cli/_template/something-other-import.js.map +1 -1
  34. package/esm/cli/_template/something-other-list.js +14 -12
  35. package/esm/cli/_template/something-other-list.js.map +1 -1
  36. package/esm/cli/_template/something-other.js +15 -8
  37. package/esm/cli/_template/something-other.js.map +1 -1
  38. package/esm/cli/_template/something.js +15 -11
  39. package/esm/cli/_template/something.js.map +1 -1
  40. package/esm/cli/admin/admin-add-autoid-static-user-mapping.js +16 -14
  41. package/esm/cli/admin/admin-add-autoid-static-user-mapping.js.map +1 -1
  42. package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js +62 -60
  43. package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js.map +1 -1
  44. package/esm/cli/admin/admin-execute-rfc7523-authz-grant-flow.js +27 -25
  45. package/esm/cli/admin/admin-execute-rfc7523-authz-grant-flow.js.map +1 -1
  46. package/esm/cli/admin/admin-federation-export.js +34 -32
  47. package/esm/cli/admin/admin-federation-export.js.map +1 -1
  48. package/esm/cli/admin/admin-federation-import.js +39 -37
  49. package/esm/cli/admin/admin-federation-import.js.map +1 -1
  50. package/esm/cli/admin/admin-federation-list.js +20 -18
  51. package/esm/cli/admin/admin-federation-list.js.map +1 -1
  52. package/esm/cli/admin/admin-federation.js +16 -8
  53. package/esm/cli/admin/admin-federation.js.map +1 -1
  54. package/esm/cli/admin/admin-generate-rfc7523-authz-grant-artefacts.js +29 -27
  55. package/esm/cli/admin/admin-generate-rfc7523-authz-grant-artefacts.js.map +1 -1
  56. package/esm/cli/admin/admin-get-access-token.js +16 -14
  57. package/esm/cli/admin/admin-get-access-token.js.map +1 -1
  58. package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js +16 -14
  59. package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js.map +1 -1
  60. package/esm/cli/admin/admin-hide-generic-extension-attributes.js +16 -14
  61. package/esm/cli/admin/admin-hide-generic-extension-attributes.js.map +1 -1
  62. package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js +16 -14
  63. package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js.map +1 -1
  64. package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js +16 -14
  65. package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js.map +1 -1
  66. package/esm/cli/admin/admin-list-static-user-mappings.js +16 -14
  67. package/esm/cli/admin/admin-list-static-user-mappings.js.map +1 -1
  68. package/esm/cli/admin/admin-remove-static-user-mapping.js +16 -14
  69. package/esm/cli/admin/admin-remove-static-user-mapping.js.map +1 -1
  70. package/esm/cli/admin/admin-repair-org-model.js +16 -14
  71. package/esm/cli/admin/admin-repair-org-model.js.map +1 -1
  72. package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js +16 -14
  73. package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js.map +1 -1
  74. package/esm/cli/admin/admin-show-generic-extension-attributes.js +16 -14
  75. package/esm/cli/admin/admin-show-generic-extension-attributes.js.map +1 -1
  76. package/esm/cli/admin/admin-train-auto-access-model.js +19 -17
  77. package/esm/cli/admin/admin-train-auto-access-model.js.map +1 -1
  78. package/esm/cli/admin/admin.js +34 -20
  79. package/esm/cli/admin/admin.js.map +1 -1
  80. package/esm/cli/agent/agent-delete.js +28 -26
  81. package/esm/cli/agent/agent-delete.js.map +1 -1
  82. package/esm/cli/agent/agent-describe.js +14 -12
  83. package/esm/cli/agent/agent-describe.js.map +1 -1
  84. package/esm/cli/agent/agent-export.js +34 -32
  85. package/esm/cli/agent/agent-export.js.map +1 -1
  86. package/esm/cli/agent/agent-gateway-delete.js +28 -26
  87. package/esm/cli/agent/agent-gateway-delete.js.map +1 -1
  88. package/esm/cli/agent/agent-gateway-describe.js +14 -12
  89. package/esm/cli/agent/agent-gateway-describe.js.map +1 -1
  90. package/esm/cli/agent/agent-gateway-export.js +34 -32
  91. package/esm/cli/agent/agent-gateway-export.js.map +1 -1
  92. package/esm/cli/agent/agent-gateway-import.js +40 -38
  93. package/esm/cli/agent/agent-gateway-import.js.map +1 -1
  94. package/esm/cli/agent/agent-gateway-list.js +15 -13
  95. package/esm/cli/agent/agent-gateway-list.js.map +1 -1
  96. package/esm/cli/agent/agent-gateway.js +15 -8
  97. package/esm/cli/agent/agent-gateway.js.map +1 -1
  98. package/esm/cli/agent/agent-import.js +40 -38
  99. package/esm/cli/agent/agent-import.js.map +1 -1
  100. package/esm/cli/agent/agent-java-delete.js +28 -26
  101. package/esm/cli/agent/agent-java-delete.js.map +1 -1
  102. package/esm/cli/agent/agent-java-describe.js +14 -12
  103. package/esm/cli/agent/agent-java-describe.js.map +1 -1
  104. package/esm/cli/agent/agent-java-export.js +34 -32
  105. package/esm/cli/agent/agent-java-export.js.map +1 -1
  106. package/esm/cli/agent/agent-java-import.js +40 -38
  107. package/esm/cli/agent/agent-java-import.js.map +1 -1
  108. package/esm/cli/agent/agent-java-list.js +15 -13
  109. package/esm/cli/agent/agent-java-list.js.map +1 -1
  110. package/esm/cli/agent/agent-java.js +15 -8
  111. package/esm/cli/agent/agent-java.js.map +1 -1
  112. package/esm/cli/agent/agent-list.js +15 -13
  113. package/esm/cli/agent/agent-list.js.map +1 -1
  114. package/esm/cli/agent/agent-web-delete.js +28 -26
  115. package/esm/cli/agent/agent-web-delete.js.map +1 -1
  116. package/esm/cli/agent/agent-web-describe.js +14 -12
  117. package/esm/cli/agent/agent-web-describe.js.map +1 -1
  118. package/esm/cli/agent/agent-web-export.js +34 -32
  119. package/esm/cli/agent/agent-web-export.js.map +1 -1
  120. package/esm/cli/agent/agent-web-import.js +40 -38
  121. package/esm/cli/agent/agent-web-import.js.map +1 -1
  122. package/esm/cli/agent/agent-web-list.js +15 -13
  123. package/esm/cli/agent/agent-web-list.js.map +1 -1
  124. package/esm/cli/agent/agent-web.js +15 -8
  125. package/esm/cli/agent/agent-web.js.map +1 -1
  126. package/esm/cli/agent/agent.js +17 -12
  127. package/esm/cli/agent/agent.js.map +1 -1
  128. package/esm/cli/app/app-delete.js +27 -25
  129. package/esm/cli/app/app-delete.js.map +1 -1
  130. package/esm/cli/app/app-describe.js +14 -12
  131. package/esm/cli/app/app-describe.js.map +1 -1
  132. package/esm/cli/app/app-export.js +42 -40
  133. package/esm/cli/app/app-export.js.map +1 -1
  134. package/esm/cli/app/app-import.js +47 -45
  135. package/esm/cli/app/app-import.js.map +1 -1
  136. package/esm/cli/app/app-list.js +16 -14
  137. package/esm/cli/app/app-list.js.map +1 -1
  138. package/esm/cli/app/app.js +11 -10
  139. package/esm/cli/app/app.js.map +1 -1
  140. package/esm/cli/authn/authn-describe.js +20 -18
  141. package/esm/cli/authn/authn-describe.js.map +1 -1
  142. package/esm/cli/authn/authn-export.js +16 -14
  143. package/esm/cli/authn/authn-export.js.map +1 -1
  144. package/esm/cli/authn/authn-import.js +16 -14
  145. package/esm/cli/authn/authn-import.js.map +1 -1
  146. package/esm/cli/authn/authn.js +7 -7
  147. package/esm/cli/authn/authn.js.map +1 -1
  148. package/esm/cli/authz/authz-policy-delete.js +33 -31
  149. package/esm/cli/authz/authz-policy-delete.js.map +1 -1
  150. package/esm/cli/authz/authz-policy-describe.js +20 -18
  151. package/esm/cli/authz/authz-policy-describe.js.map +1 -1
  152. package/esm/cli/authz/authz-policy-export.js +65 -63
  153. package/esm/cli/authz/authz-policy-export.js.map +1 -1
  154. package/esm/cli/authz/authz-policy-import.js +55 -53
  155. package/esm/cli/authz/authz-policy-import.js.map +1 -1
  156. package/esm/cli/authz/authz-policy-list.js +27 -25
  157. package/esm/cli/authz/authz-policy-list.js.map +1 -1
  158. package/esm/cli/authz/authz-policy.js +15 -8
  159. package/esm/cli/authz/authz-policy.js.map +1 -1
  160. package/esm/cli/authz/authz-set-delete.js +27 -25
  161. package/esm/cli/authz/authz-set-delete.js.map +1 -1
  162. package/esm/cli/authz/authz-set-describe.js +20 -18
  163. package/esm/cli/authz/authz-set-describe.js.map +1 -1
  164. package/esm/cli/authz/authz-set-export.js +45 -43
  165. package/esm/cli/authz/authz-set-export.js.map +1 -1
  166. package/esm/cli/authz/authz-set-import.js +51 -49
  167. package/esm/cli/authz/authz-set-import.js.map +1 -1
  168. package/esm/cli/authz/authz-set-list.js +16 -14
  169. package/esm/cli/authz/authz-set-list.js.map +1 -1
  170. package/esm/cli/authz/authz-set.js +15 -8
  171. package/esm/cli/authz/authz-set.js.map +1 -1
  172. package/esm/cli/authz/authz-type-delete.js +33 -31
  173. package/esm/cli/authz/authz-type-delete.js.map +1 -1
  174. package/esm/cli/authz/authz-type-describe.js +24 -22
  175. package/esm/cli/authz/authz-type-describe.js.map +1 -1
  176. package/esm/cli/authz/authz-type-export.js +39 -37
  177. package/esm/cli/authz/authz-type-export.js.map +1 -1
  178. package/esm/cli/authz/authz-type-import.js +45 -43
  179. package/esm/cli/authz/authz-type-import.js.map +1 -1
  180. package/esm/cli/authz/authz-type-list.js +16 -14
  181. package/esm/cli/authz/authz-type-list.js.map +1 -1
  182. package/esm/cli/authz/authz-type.js +15 -8
  183. package/esm/cli/authz/authz-type.js.map +1 -1
  184. package/esm/cli/authz/authz.js +7 -7
  185. package/esm/cli/authz/authz.js.map +1 -1
  186. package/esm/cli/config/config-delete.js +14 -12
  187. package/esm/cli/config/config-delete.js.map +1 -1
  188. package/esm/cli/config/config-describe.js +14 -12
  189. package/esm/cli/config/config-describe.js.map +1 -1
  190. package/esm/cli/config/config-export.js +43 -41
  191. package/esm/cli/config/config-export.js.map +1 -1
  192. package/esm/cli/config/config-import.js +53 -51
  193. package/esm/cli/config/config-import.js.map +1 -1
  194. package/esm/cli/config/config-list.js +14 -12
  195. package/esm/cli/config/config-list.js.map +1 -1
  196. package/esm/cli/config/config.js +12 -9
  197. package/esm/cli/config/config.js.map +1 -1
  198. package/esm/cli/conn/conn-delete.js +15 -13
  199. package/esm/cli/conn/conn-delete.js.map +1 -1
  200. package/esm/cli/conn/conn-describe.js +11 -9
  201. package/esm/cli/conn/conn-describe.js.map +1 -1
  202. package/esm/cli/conn/conn-list.js +11 -9
  203. package/esm/cli/conn/conn-list.js.map +1 -1
  204. package/esm/cli/conn/conn-save.js +77 -75
  205. package/esm/cli/conn/conn-save.js.map +1 -1
  206. package/esm/cli/conn/conn.js +9 -8
  207. package/esm/cli/conn/conn.js.map +1 -1
  208. package/esm/cli/email/email-template-export.js +33 -31
  209. package/esm/cli/email/email-template-export.js.map +1 -1
  210. package/esm/cli/email/email-template-import.js +39 -37
  211. package/esm/cli/email/email-template-import.js.map +1 -1
  212. package/esm/cli/email/email-template-list.js +16 -14
  213. package/esm/cli/email/email-template-list.js.map +1 -1
  214. package/esm/cli/email/email-template.js +11 -6
  215. package/esm/cli/email/email-template.js.map +1 -1
  216. package/esm/cli/email/email.js +3 -5
  217. package/esm/cli/email/email.js.map +1 -1
  218. package/esm/cli/esv/esv-apply.js +39 -37
  219. package/esm/cli/esv/esv-apply.js.map +1 -1
  220. package/esm/cli/esv/esv-secret-create.js +19 -17
  221. package/esm/cli/esv/esv-secret-create.js.map +1 -1
  222. package/esm/cli/esv/esv-secret-delete.js +26 -24
  223. package/esm/cli/esv/esv-secret-delete.js.map +1 -1
  224. package/esm/cli/esv/esv-secret-describe.js +16 -14
  225. package/esm/cli/esv/esv-secret-describe.js.map +1 -1
  226. package/esm/cli/esv/esv-secret-export.js +25 -23
  227. package/esm/cli/esv/esv-secret-export.js.map +1 -1
  228. package/esm/cli/esv/esv-secret-import.js +14 -12
  229. package/esm/cli/esv/esv-secret-import.js.map +1 -1
  230. package/esm/cli/esv/esv-secret-list.js +16 -14
  231. package/esm/cli/esv/esv-secret-list.js.map +1 -1
  232. package/esm/cli/esv/esv-secret-set.js +16 -14
  233. package/esm/cli/esv/esv-secret-set.js.map +1 -1
  234. package/esm/cli/esv/esv-secret-version-activate.js +20 -18
  235. package/esm/cli/esv/esv-secret-version-activate.js.map +1 -1
  236. package/esm/cli/esv/esv-secret-version-create.js +19 -17
  237. package/esm/cli/esv/esv-secret-version-create.js.map +1 -1
  238. package/esm/cli/esv/esv-secret-version-deactivate.js +20 -18
  239. package/esm/cli/esv/esv-secret-version-deactivate.js.map +1 -1
  240. package/esm/cli/esv/esv-secret-version-delete.js +26 -24
  241. package/esm/cli/esv/esv-secret-version-delete.js.map +1 -1
  242. package/esm/cli/esv/esv-secret-version-list.js +16 -14
  243. package/esm/cli/esv/esv-secret-version-list.js.map +1 -1
  244. package/esm/cli/esv/esv-secret-version.js +15 -8
  245. package/esm/cli/esv/esv-secret-version.js.map +1 -1
  246. package/esm/cli/esv/esv-secret.js +21 -11
  247. package/esm/cli/esv/esv-secret.js.map +1 -1
  248. package/esm/cli/esv/esv-variable-create.js +16 -14
  249. package/esm/cli/esv/esv-variable-create.js.map +1 -1
  250. package/esm/cli/esv/esv-variable-delete.js +27 -25
  251. package/esm/cli/esv/esv-variable-delete.js.map +1 -1
  252. package/esm/cli/esv/esv-variable-describe.js +16 -14
  253. package/esm/cli/esv/esv-variable-describe.js.map +1 -1
  254. package/esm/cli/esv/esv-variable-export.js +26 -24
  255. package/esm/cli/esv/esv-variable-export.js.map +1 -1
  256. package/esm/cli/esv/esv-variable-import.js +14 -12
  257. package/esm/cli/esv/esv-variable-import.js.map +1 -1
  258. package/esm/cli/esv/esv-variable-list.js +16 -14
  259. package/esm/cli/esv/esv-variable-list.js.map +1 -1
  260. package/esm/cli/esv/esv-variable-set.js +24 -22
  261. package/esm/cli/esv/esv-variable-set.js.map +1 -1
  262. package/esm/cli/esv/esv-variable.js +19 -10
  263. package/esm/cli/esv/esv-variable.js.map +1 -1
  264. package/esm/cli/esv/esv.js +7 -7
  265. package/esm/cli/esv/esv.js.map +1 -1
  266. package/esm/cli/idm/idm-count.js +16 -14
  267. package/esm/cli/idm/idm-count.js.map +1 -1
  268. package/esm/cli/idm/idm-export.js +41 -39
  269. package/esm/cli/idm/idm-export.js.map +1 -1
  270. package/esm/cli/idm/idm-import.js +45 -43
  271. package/esm/cli/idm/idm-import.js.map +1 -1
  272. package/esm/cli/idm/idm-list.js +21 -19
  273. package/esm/cli/idm/idm-list.js.map +1 -1
  274. package/esm/cli/idm/idm.js +9 -8
  275. package/esm/cli/idm/idm.js.map +1 -1
  276. package/esm/cli/idp/idp-export.js +34 -32
  277. package/esm/cli/idp/idp-export.js.map +1 -1
  278. package/esm/cli/idp/idp-import.js +47 -45
  279. package/esm/cli/idp/idp-import.js.map +1 -1
  280. package/esm/cli/idp/idp-list.js +20 -18
  281. package/esm/cli/idp/idp-list.js.map +1 -1
  282. package/esm/cli/idp/idp.js +7 -7
  283. package/esm/cli/idp/idp.js.map +1 -1
  284. package/esm/cli/journey/journey-delete.js +27 -25
  285. package/esm/cli/journey/journey-delete.js.map +1 -1
  286. package/esm/cli/journey/journey-describe.js +92 -90
  287. package/esm/cli/journey/journey-describe.js.map +1 -1
  288. package/esm/cli/journey/journey-disable.js +27 -25
  289. package/esm/cli/journey/journey-disable.js.map +1 -1
  290. package/esm/cli/journey/journey-enable.js +27 -25
  291. package/esm/cli/journey/journey-enable.js.map +1 -1
  292. package/esm/cli/journey/journey-export.js +55 -53
  293. package/esm/cli/journey/journey-export.js.map +1 -1
  294. package/esm/cli/journey/journey-import.js +51 -49
  295. package/esm/cli/journey/journey-import.js.map +1 -1
  296. package/esm/cli/journey/journey-list.js +16 -14
  297. package/esm/cli/journey/journey-list.js.map +1 -1
  298. package/esm/cli/journey/journey-prune.js +26 -24
  299. package/esm/cli/journey/journey-prune.js.map +1 -1
  300. package/esm/cli/journey/journey.js +17 -12
  301. package/esm/cli/journey/journey.js.map +1 -1
  302. package/esm/cli/log/log-fetch.js +98 -96
  303. package/esm/cli/log/log-fetch.js.map +1 -1
  304. package/esm/cli/log/log-key-delete.js +25 -23
  305. package/esm/cli/log/log-key-delete.js.map +1 -1
  306. package/esm/cli/log/log-key-describe.js +14 -12
  307. package/esm/cli/log/log-key-describe.js.map +1 -1
  308. package/esm/cli/log/log-key-list.js +16 -14
  309. package/esm/cli/log/log-key-list.js.map +1 -1
  310. package/esm/cli/log/log-key.js +11 -6
  311. package/esm/cli/log/log-key.js.map +1 -1
  312. package/esm/cli/log/log-list.js +70 -68
  313. package/esm/cli/log/log-list.js.map +1 -1
  314. package/esm/cli/log/log-tail.js +60 -58
  315. package/esm/cli/log/log-tail.js.map +1 -1
  316. package/esm/cli/log/log.js +9 -8
  317. package/esm/cli/log/log.js.map +1 -1
  318. package/esm/cli/oauth/oauth-client-delete.js +14 -12
  319. package/esm/cli/oauth/oauth-client-delete.js.map +1 -1
  320. package/esm/cli/oauth/oauth-client-describe.js +14 -12
  321. package/esm/cli/oauth/oauth-client-describe.js.map +1 -1
  322. package/esm/cli/oauth/oauth-client-export.js +42 -40
  323. package/esm/cli/oauth/oauth-client-export.js.map +1 -1
  324. package/esm/cli/oauth/oauth-client-import.js +47 -45
  325. package/esm/cli/oauth/oauth-client-import.js.map +1 -1
  326. package/esm/cli/oauth/oauth-client-list.js +16 -14
  327. package/esm/cli/oauth/oauth-client-list.js.map +1 -1
  328. package/esm/cli/oauth/oauth-client.js +16 -8
  329. package/esm/cli/oauth/oauth-client.js.map +1 -1
  330. package/esm/cli/oauth/oauth.js +4 -6
  331. package/esm/cli/oauth/oauth.js.map +1 -1
  332. package/esm/cli/realm/realm-add-custom-domain.js +15 -13
  333. package/esm/cli/realm/realm-add-custom-domain.js.map +1 -1
  334. package/esm/cli/realm/realm-describe.js +15 -13
  335. package/esm/cli/realm/realm-describe.js.map +1 -1
  336. package/esm/cli/realm/realm-list.js +15 -13
  337. package/esm/cli/realm/realm-list.js.map +1 -1
  338. package/esm/cli/realm/realm-remove-custom-domain.js +15 -13
  339. package/esm/cli/realm/realm-remove-custom-domain.js.map +1 -1
  340. package/esm/cli/realm/realm.js +13 -10
  341. package/esm/cli/realm/realm.js.map +1 -1
  342. package/esm/cli/saml/saml-cot-export.js +33 -31
  343. package/esm/cli/saml/saml-cot-export.js.map +1 -1
  344. package/esm/cli/saml/saml-cot-import.js +39 -37
  345. package/esm/cli/saml/saml-cot-import.js.map +1 -1
  346. package/esm/cli/saml/saml-cot-list.js +16 -14
  347. package/esm/cli/saml/saml-cot-list.js.map +1 -1
  348. package/esm/cli/saml/saml-cot.js +11 -6
  349. package/esm/cli/saml/saml-cot.js.map +1 -1
  350. package/esm/cli/saml/saml-delete.js +25 -23
  351. package/esm/cli/saml/saml-delete.js.map +1 -1
  352. package/esm/cli/saml/saml-describe.js +16 -14
  353. package/esm/cli/saml/saml-describe.js.map +1 -1
  354. package/esm/cli/saml/saml-export.js +39 -37
  355. package/esm/cli/saml/saml-export.js.map +1 -1
  356. package/esm/cli/saml/saml-import.js +47 -45
  357. package/esm/cli/saml/saml-import.js.map +1 -1
  358. package/esm/cli/saml/saml-list.js +16 -14
  359. package/esm/cli/saml/saml-list.js.map +1 -1
  360. package/esm/cli/saml/saml-metadata-export.js +33 -31
  361. package/esm/cli/saml/saml-metadata-export.js.map +1 -1
  362. package/esm/cli/saml/saml-metadata.js +7 -4
  363. package/esm/cli/saml/saml-metadata.js.map +1 -1
  364. package/esm/cli/saml/saml.js +15 -11
  365. package/esm/cli/saml/saml.js.map +1 -1
  366. package/esm/cli/script/script-delete.js +28 -27
  367. package/esm/cli/script/script-delete.js.map +1 -1
  368. package/esm/cli/script/script-describe.js +14 -12
  369. package/esm/cli/script/script-describe.js.map +1 -1
  370. package/esm/cli/script/script-export.js +43 -41
  371. package/esm/cli/script/script-export.js.map +1 -1
  372. package/esm/cli/script/script-import.js +32 -30
  373. package/esm/cli/script/script-import.js.map +1 -1
  374. package/esm/cli/script/script-list.js +16 -14
  375. package/esm/cli/script/script-list.js.map +1 -1
  376. package/esm/cli/script/script.js +11 -9
  377. package/esm/cli/script/script.js.map +1 -1
  378. package/esm/cli/service/service-delete.js +18 -16
  379. package/esm/cli/service/service-delete.js.map +1 -1
  380. package/esm/cli/service/service-export.js +32 -30
  381. package/esm/cli/service/service-export.js.map +1 -1
  382. package/esm/cli/service/service-import.js +56 -54
  383. package/esm/cli/service/service-import.js.map +1 -1
  384. package/esm/cli/service/service-list.js +14 -12
  385. package/esm/cli/service/service-list.js.map +1 -1
  386. package/esm/cli/service/service.js +9 -8
  387. package/esm/cli/service/service.js.map +1 -1
  388. package/esm/cli/theme/theme-delete.js +33 -31
  389. package/esm/cli/theme/theme-delete.js.map +1 -1
  390. package/esm/cli/theme/theme-export.js +39 -37
  391. package/esm/cli/theme/theme-export.js.map +1 -1
  392. package/esm/cli/theme/theme-import.js +45 -43
  393. package/esm/cli/theme/theme-import.js.map +1 -1
  394. package/esm/cli/theme/theme-list.js +16 -14
  395. package/esm/cli/theme/theme-list.js.map +1 -1
  396. package/esm/cli/theme/theme.js +9 -8
  397. package/esm/cli/theme/theme.js.map +1 -1
  398. package/package.json +2 -2
@@ -2,24 +2,26 @@ import { getTokens } from '../../ops/AuthenticateOps';
2
2
  import { listAdminFederationProviders } from '../../ops/cloud/AdminFederationOps';
3
3
  import { verboseMessage } from '../../utils/Console';
4
4
  import { FrodoCommand } from '../FrodoCommand';
5
- const program = new FrodoCommand('frodo admin federation list', ['realm']);
6
- program.description('List admin federation providers.')
7
- // .addOption(
8
- // new Option('-l, --long', 'Long with all fields.').default(false, 'false')
9
- // )
10
- .action(
11
- // implement command logic inside action handler
12
- async (host, user, password, options, command) => {
13
- command.handleDefaultArgsAndOpts(host, user, password, options, command);
14
- if (await getTokens(true)) {
15
- verboseMessage(`Listing admin federation providers...`);
16
- const outcome = await listAdminFederationProviders();
17
- if (!outcome) process.exitCode = 1;
18
- } else {
19
- process.exitCode = 1;
5
+ export default function setup() {
6
+ const program = new FrodoCommand('frodo admin federation list', ['realm']);
7
+ program.description('List admin federation providers.')
8
+ // .addOption(
9
+ // new Option('-l, --long', 'Long with all fields.').default(false, 'false')
10
+ // )
11
+ .action(
12
+ // implement command logic inside action handler
13
+ async (host, user, password, options, command) => {
14
+ command.handleDefaultArgsAndOpts(host, user, password, options, command);
15
+ if (await getTokens(true)) {
16
+ verboseMessage(`Listing admin federation providers...`);
17
+ const outcome = await listAdminFederationProviders();
18
+ if (!outcome) process.exitCode = 1;
19
+ } else {
20
+ process.exitCode = 1;
21
+ }
20
22
  }
23
+ // end command logic inside action handler
24
+ );
25
+ return program;
21
26
  }
22
- // end command logic inside action handler
23
- );
24
- program.parse();
25
27
  //# sourceMappingURL=admin-federation-list.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"admin-federation-list.js","names":["getTokens","listAdminFederationProviders","verboseMessage","FrodoCommand","program","description","action","host","user","password","options","command","handleDefaultArgsAndOpts","outcome","process","exitCode","parse"],"sources":["../../../src/cli/admin/admin-federation-list.ts"],"sourcesContent":["import { getTokens } from '../../ops/AuthenticateOps';\nimport { listAdminFederationProviders } from '../../ops/cloud/AdminFederationOps';\nimport { verboseMessage } from '../../utils/Console';\nimport { FrodoCommand } from '../FrodoCommand';\n\nconst program = new FrodoCommand('frodo admin federation list', ['realm']);\n\nprogram\n .description('List admin federation providers.')\n // .addOption(\n // new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n // )\n .action(\n // implement command logic inside action handler\n async (host, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(host, user, password, options, command);\n if (await getTokens(true)) {\n verboseMessage(`Listing admin federation providers...`);\n const outcome = await listAdminFederationProviders();\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,SAAS,QAAQ,2BAA2B;AACrD,SAASC,4BAA4B,QAAQ,oCAAoC;AACjF,SAASC,cAAc,QAAQ,qBAAqB;AACpD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,MAAMC,OAAO,GAAG,IAAID,YAAY,CAAC,6BAA6B,EAAE,CAAC,OAAO,CAAC,CAAC;AAE1EC,OAAO,CACJC,WAAW,CAAC,kCAAkC;AAC/C;AACA;AACA;AAAA,CACCC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;EAChDA,OAAO,CAACC,wBAAwB,CAACL,IAAI,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,CAAC;EACxE,IAAI,MAAMX,SAAS,CAAC,IAAI,CAAC,EAAE;IACzBE,cAAc,CAAE,uCAAsC,CAAC;IACvD,MAAMW,OAAO,GAAG,MAAMZ,4BAA4B,CAAC,CAAC;IACpD,IAAI,CAACY,OAAO,EAAEC,OAAO,CAACC,QAAQ,GAAG,CAAC;EACpC,CAAC,MAAM;IACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;EACtB;AACF;AACA;AACF,CAAC;AAEHX,OAAO,CAACY,KAAK,CAAC,CAAC"}
1
+ {"version":3,"file":"admin-federation-list.js","names":["getTokens","listAdminFederationProviders","verboseMessage","FrodoCommand","setup","program","description","action","host","user","password","options","command","handleDefaultArgsAndOpts","outcome","process","exitCode"],"sources":["../../../src/cli/admin/admin-federation-list.ts"],"sourcesContent":["import { getTokens } from '../../ops/AuthenticateOps';\nimport { listAdminFederationProviders } from '../../ops/cloud/AdminFederationOps';\nimport { verboseMessage } from '../../utils/Console';\nimport { FrodoCommand } from '../FrodoCommand';\n\nexport default function setup() {\n const program = new FrodoCommand('frodo admin federation list', ['realm']);\n\n program\n .description('List admin federation providers.')\n // .addOption(\n // new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n // )\n .action(\n // implement command logic inside action handler\n async (host, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n user,\n password,\n options,\n command\n );\n if (await getTokens(true)) {\n verboseMessage(`Listing admin federation providers...`);\n const outcome = await listAdminFederationProviders();\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\n return program;\n}\n"],"mappings":"AAAA,SAASA,SAAS,QAAQ,2BAA2B;AACrD,SAASC,4BAA4B,QAAQ,oCAAoC;AACjF,SAASC,cAAc,QAAQ,qBAAqB;AACpD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,eAAe,SAASC,KAAKA,CAAA,EAAG;EAC9B,MAAMC,OAAO,GAAG,IAAIF,YAAY,CAAC,6BAA6B,EAAE,CAAC,OAAO,CAAC,CAAC;EAE1EE,OAAO,CACJC,WAAW,CAAC,kCAAkC;EAC/C;EACA;EACA;EAAA,CACCC,MAAM;EACL;EACA,OAAOC,IAAI,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;IAChDA,OAAO,CAACC,wBAAwB,CAC9BL,IAAI,EACJC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;IACD,IAAI,MAAMZ,SAAS,CAAC,IAAI,CAAC,EAAE;MACzBE,cAAc,CAAE,uCAAsC,CAAC;MACvD,MAAMY,OAAO,GAAG,MAAMb,4BAA4B,CAAC,CAAC;MACpD,IAAI,CAACa,OAAO,EAAEC,OAAO,CAACC,QAAQ,GAAG,CAAC;IACpC,CAAC,MAAM;MACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;IACtB;EACF;EACA;EACF,CAAC;EAEH,OAAOX,OAAO;AAChB"}
@@ -1,13 +1,21 @@
1
1
  import { FrodoStubCommand } from '../FrodoCommand';
2
- const program = new FrodoStubCommand('frodo admin federation');
3
- program.description('Manages admin federation configuration.');
2
+ import ExportCmd from './admin-federation-export.js';
3
+ import ImportCmd from './admin-federation-import.js';
4
+ import ListCmd from './admin-federation-list.js';
5
+ // import DeleteCmd from './admin-federation-delete.js';
6
+ // import DescribeCmd from './admin-federation-describe.js';
4
7
 
5
- // program.command('delete', 'Delete admin federation provider.');
8
+ export default function setup() {
9
+ const program = new FrodoStubCommand('frodo admin federation');
10
+ program.description('Manages admin federation configuration.');
6
11
 
7
- // program.command('describe', 'Describe admin federation provider.');
12
+ // program.addCommand(DeleteCmd().name('delete'));
8
13
 
9
- program.command('export', 'Export admin federation providers.');
10
- program.command('import', 'Import admin federation providers.');
11
- program.command('list', 'List admin federation providers.');
12
- program.parse();
14
+ // program.addCommand(DescribeCmd().name('describe'));
15
+
16
+ program.addCommand(ExportCmd().name('export'));
17
+ program.addCommand(ImportCmd().name('import'));
18
+ program.addCommand(ListCmd().name('list'));
19
+ return program;
20
+ }
13
21
  //# sourceMappingURL=admin-federation.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"admin-federation.js","names":["FrodoStubCommand","program","description","command","parse"],"sources":["../../../src/cli/admin/admin-federation.ts"],"sourcesContent":["import { FrodoStubCommand } from '../FrodoCommand';\n\nconst program = new FrodoStubCommand('frodo admin federation');\n\nprogram.description('Manages admin federation configuration.');\n\n// program.command('delete', 'Delete admin federation provider.');\n\n// program.command('describe', 'Describe admin federation provider.');\n\nprogram.command('export', 'Export admin federation providers.');\n\nprogram.command('import', 'Import admin federation providers.');\n\nprogram.command('list', 'List admin federation providers.');\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,gBAAgB,QAAQ,iBAAiB;AAElD,MAAMC,OAAO,GAAG,IAAID,gBAAgB,CAAC,wBAAwB,CAAC;AAE9DC,OAAO,CAACC,WAAW,CAAC,yCAAyC,CAAC;;AAE9D;;AAEA;;AAEAD,OAAO,CAACE,OAAO,CAAC,QAAQ,EAAE,oCAAoC,CAAC;AAE/DF,OAAO,CAACE,OAAO,CAAC,QAAQ,EAAE,oCAAoC,CAAC;AAE/DF,OAAO,CAACE,OAAO,CAAC,MAAM,EAAE,kCAAkC,CAAC;AAE3DF,OAAO,CAACG,KAAK,CAAC,CAAC"}
1
+ {"version":3,"file":"admin-federation.js","names":["FrodoStubCommand","ExportCmd","ImportCmd","ListCmd","setup","program","description","addCommand","name"],"sources":["../../../src/cli/admin/admin-federation.ts"],"sourcesContent":["import { FrodoStubCommand } from '../FrodoCommand';\nimport ExportCmd from './admin-federation-export.js';\nimport ImportCmd from './admin-federation-import.js';\nimport ListCmd from './admin-federation-list.js';\n// import DeleteCmd from './admin-federation-delete.js';\n// import DescribeCmd from './admin-federation-describe.js';\n\nexport default function setup() {\n const program = new FrodoStubCommand('frodo admin federation');\n\n program.description('Manages admin federation configuration.');\n\n // program.addCommand(DeleteCmd().name('delete'));\n\n // program.addCommand(DescribeCmd().name('describe'));\n\n program.addCommand(ExportCmd().name('export'));\n\n program.addCommand(ImportCmd().name('import'));\n\n program.addCommand(ListCmd().name('list'));\n\n return program;\n}\n"],"mappings":"AAAA,SAASA,gBAAgB,QAAQ,iBAAiB;AAClD,OAAOC,SAAS,MAAM,8BAA8B;AACpD,OAAOC,SAAS,MAAM,8BAA8B;AACpD,OAAOC,OAAO,MAAM,4BAA4B;AAChD;AACA;;AAEA,eAAe,SAASC,KAAKA,CAAA,EAAG;EAC9B,MAAMC,OAAO,GAAG,IAAIL,gBAAgB,CAAC,wBAAwB,CAAC;EAE9DK,OAAO,CAACC,WAAW,CAAC,yCAAyC,CAAC;;EAE9D;;EAEA;;EAEAD,OAAO,CAACE,UAAU,CAACN,SAAS,CAAC,CAAC,CAACO,IAAI,CAAC,QAAQ,CAAC,CAAC;EAE9CH,OAAO,CAACE,UAAU,CAACL,SAAS,CAAC,CAAC,CAACM,IAAI,CAAC,QAAQ,CAAC,CAAC;EAE9CH,OAAO,CAACE,UAAU,CAACJ,OAAO,CAAC,CAAC,CAACK,IAAI,CAAC,MAAM,CAAC,CAAC;EAE1C,OAAOH,OAAO;AAChB"}
@@ -7,35 +7,37 @@ import { generateRfc7523AuthZGrantArtefacts } from '../../ops/AdminOps.js';
7
7
  import { getTokens } from '../../ops/AuthenticateOps';
8
8
  import { printMessage } from '../../utils/Console.js';
9
9
  import { FrodoCommand } from '../FrodoCommand.js';
10
- const program = new FrodoCommand('frodo admin generate-rfc7523-authz-grant-artefacts');
11
- program.description('Generate RFC7523 authorization grant artefacts.').addOption(new Option('--client-id [id]', 'Client id.')).addOption(new Option('--jwk-file [file]', 'Path to JSON Web Key (JWK) file containing private key.')).addOption(new Option('--sub [subject]', 'Subject identifier, typically a UUID. Must resolve to a valid user in the realm. Restricts the trusted issuer to only this subject by adding the identifier to the list of allowed subjects. Omitting this option allows the trusted issuer to request tokens for any realm user without restrictions.')).addOption(new Option('--iss [issuer]', 'Trusted issuer, typically a URL.')).addOption(new Option('--scope [scope]', 'Space-delimited list of scopes.').default('openid fr:am:* fr:idm:*')).addOption(new Option('--no-save', 'Do not save artefacts in AM and to file By default this command creates a fully configured oauth2 client and trusted issuer in AM and saves the generated JWK (private key) and JWKS (public key set) to files.')).addOption(new Option('--json', 'Output in JSON format.')).addHelpText('after', `Usage Examples:\n` + ` Generate, output to console, and save all the artefacts for an RFC7523 authorization grant flow configuration limited to one particular subject:\n` + ` - Fully configured OAuth2 client - named '<clientId>'\n` + ` - Fully configured OAuth2 trusted issuer - named '<clientId>-issuer'\n` + ` - Private Key as Json Web Key (JWK) - named '<clientId>_private.jwk.json'\n` + ` - Public Key as Json Web Key Set (JWKS) - named '<clientId>_public.jwks.json'\n` + ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d ${s.amBaseUrl}\n`['brightCyan'] + ` Same as above but use an existing JWK file instead of creating one.\n` + ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --jwk-file rfc7523-client1_private.jwk.json ${s.amBaseUrl}\n`['brightCyan'] + ` Generate and output to console all the artefacts for an RFC7523 authorization grant flow configuration but do not create any configuration or files.\n` + ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --no-save ${s.amBaseUrl}\n`['brightCyan'] + ` Generate and output in json format all the artefacts for an RFC7523 authorization grant flow configuration.\n` + ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --json ${s.amBaseUrl}\n`['brightCyan'] + `\nRelated Commands:\n` + ` Run ${'frodo admin execute-rfc7523-authz-grant-flow --help'['brightCyan']} to see how to test your configuration created with ${'frodo admin generate-rfc7523-authz-grant-artefacts'['brightCyan']}:\n`).action(
12
- // implement command logic inside action handler
13
- async (host, realm, user, password, options, command) => {
14
- command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
15
- if (await getTokens()) {
16
- printMessage(`Generating RFC7523 authorization grant artefacts in realm "${state.getRealm()}"...`);
17
- let clientId = uuidv4();
18
- if (options.clientId) {
19
- clientId = options.clientId;
20
- }
21
- let jwk = undefined;
22
- if (options.jwkFile) {
23
- try {
24
- const data = fs.readFileSync(options.jwkFile);
25
- jwk = JSON.parse(data.toString());
26
- } catch (error) {
27
- printMessage(`Error parsing JWK from file ${options.jwkFile}: ${error.message}`, 'error');
10
+ export default function setup() {
11
+ const program = new FrodoCommand('frodo admin generate-rfc7523-authz-grant-artefacts');
12
+ program.description('Generate RFC7523 authorization grant artefacts.').addOption(new Option('--client-id [id]', 'Client id.')).addOption(new Option('--jwk-file [file]', 'Path to JSON Web Key (JWK) file containing private key.')).addOption(new Option('--sub [subject]', 'Subject identifier, typically a UUID. Must resolve to a valid user in the realm. Restricts the trusted issuer to only this subject by adding the identifier to the list of allowed subjects. Omitting this option allows the trusted issuer to request tokens for any realm user without restrictions.')).addOption(new Option('--iss [issuer]', 'Trusted issuer, typically a URL.')).addOption(new Option('--scope [scope]', 'Space-delimited list of scopes.').default('openid fr:am:* fr:idm:*')).addOption(new Option('--no-save', 'Do not save artefacts in AM and to file By default this command creates a fully configured oauth2 client and trusted issuer in AM and saves the generated JWK (private key) and JWKS (public key set) to files.')).addOption(new Option('--json', 'Output in JSON format.')).addHelpText('after', `Usage Examples:\n` + ` Generate, output to console, and save all the artefacts for an RFC7523 authorization grant flow configuration limited to one particular subject:\n` + ` - Fully configured OAuth2 client - named '<clientId>'\n` + ` - Fully configured OAuth2 trusted issuer - named '<clientId>-issuer'\n` + ` - Private Key as Json Web Key (JWK) - named '<clientId>_private.jwk.json'\n` + ` - Public Key as Json Web Key Set (JWKS) - named '<clientId>_public.jwks.json'\n` + ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d ${s.amBaseUrl}\n`['brightCyan'] + ` Same as above but use an existing JWK file instead of creating one.\n` + ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --jwk-file rfc7523-client1_private.jwk.json ${s.amBaseUrl}\n`['brightCyan'] + ` Generate and output to console all the artefacts for an RFC7523 authorization grant flow configuration but do not create any configuration or files.\n` + ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --no-save ${s.amBaseUrl}\n`['brightCyan'] + ` Generate and output in json format all the artefacts for an RFC7523 authorization grant flow configuration.\n` + ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --json ${s.amBaseUrl}\n`['brightCyan'] + `\nRelated Commands:\n` + ` Run ${'frodo admin execute-rfc7523-authz-grant-flow --help'['brightCyan']} to see how to test your configuration created with ${'frodo admin generate-rfc7523-authz-grant-artefacts'['brightCyan']}:\n`).action(
13
+ // implement command logic inside action handler
14
+ async (host, realm, user, password, options, command) => {
15
+ command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
16
+ if (await getTokens()) {
17
+ printMessage(`Generating RFC7523 authorization grant artefacts in realm "${state.getRealm()}"...`);
18
+ let clientId = uuidv4();
19
+ if (options.clientId) {
20
+ clientId = options.clientId;
21
+ }
22
+ let jwk = undefined;
23
+ if (options.jwkFile) {
24
+ try {
25
+ const data = fs.readFileSync(options.jwkFile);
26
+ jwk = JSON.parse(data.toString());
27
+ } catch (error) {
28
+ printMessage(`Error parsing JWK from file ${options.jwkFile}: ${error.message}`, 'error');
29
+ }
28
30
  }
31
+ const outcome = await generateRfc7523AuthZGrantArtefacts(clientId, options.iss, jwk, options.sub, options.scope.split(' '), {
32
+ save: options.save
33
+ }, options.json);
34
+ if (!outcome) process.exitCode = 1;
35
+ } else {
36
+ process.exitCode = 1;
29
37
  }
30
- const outcome = await generateRfc7523AuthZGrantArtefacts(clientId, options.iss, jwk, options.sub, options.scope.split(' '), {
31
- save: options.save
32
- }, options.json);
33
- if (!outcome) process.exitCode = 1;
34
- } else {
35
- process.exitCode = 1;
36
38
  }
39
+ // end command logic inside action handler
40
+ );
41
+ return program;
37
42
  }
38
- // end command logic inside action handler
39
- );
40
- program.parse();
41
43
  //# sourceMappingURL=admin-generate-rfc7523-authz-grant-artefacts.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"admin-generate-rfc7523-authz-grant-artefacts.js","names":["state","Option","fs","v4","uuidv4","s","generateRfc7523AuthZGrantArtefacts","getTokens","printMessage","FrodoCommand","program","description","addOption","default","addHelpText","amBaseUrl","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","getRealm","clientId","jwk","undefined","jwkFile","data","readFileSync","JSON","parse","toString","error","message","outcome","iss","sub","scope","split","save","json","process","exitCode"],"sources":["../../../src/cli/admin/admin-generate-rfc7523-authz-grant-artefacts.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\nimport { JwkRsa } from '@rockcarver/frodo-lib/types/ops/JoseOps.js';\nimport { Option } from 'commander';\nimport fs from 'fs';\nimport { v4 as uuidv4 } from 'uuid';\n\nimport * as s from '../../help/SampleData';\nimport { generateRfc7523AuthZGrantArtefacts } from '../../ops/AdminOps.js';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand.js';\n\nconst program = new FrodoCommand(\n 'frodo admin generate-rfc7523-authz-grant-artefacts'\n);\n\nprogram\n .description('Generate RFC7523 authorization grant artefacts.')\n .addOption(new Option('--client-id [id]', 'Client id.'))\n .addOption(\n new Option(\n '--jwk-file [file]',\n 'Path to JSON Web Key (JWK) file containing private key.'\n )\n )\n .addOption(\n new Option(\n '--sub [subject]',\n 'Subject identifier, typically a UUID. Must resolve to a valid user in the realm. Restricts the trusted issuer to only this subject by adding the identifier to the list of allowed subjects. Omitting this option allows the trusted issuer to request tokens for any realm user without restrictions.'\n )\n )\n .addOption(new Option('--iss [issuer]', 'Trusted issuer, typically a URL.'))\n .addOption(\n new Option('--scope [scope]', 'Space-delimited list of scopes.').default(\n 'openid fr:am:* fr:idm:*'\n )\n )\n .addOption(\n new Option(\n '--no-save',\n 'Do not save artefacts in AM and to file By default this command creates a fully configured oauth2 client and trusted issuer in AM and saves the generated JWK (private key) and JWKS (public key set) to files.'\n )\n )\n .addOption(new Option('--json', 'Output in JSON format.'))\n .addHelpText(\n 'after',\n `Usage Examples:\\n` +\n ` Generate, output to console, and save all the artefacts for an RFC7523 authorization grant flow configuration limited to one particular subject:\\n` +\n ` - Fully configured OAuth2 client - named '<clientId>'\\n` +\n ` - Fully configured OAuth2 trusted issuer - named '<clientId>-issuer'\\n` +\n ` - Private Key as Json Web Key (JWK) - named '<clientId>_private.jwk.json'\\n` +\n ` - Public Key as Json Web Key Set (JWKS) - named '<clientId>_public.jwks.json'\\n` +\n ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d ${s.amBaseUrl}\\n`[\n 'brightCyan'\n ] +\n ` Same as above but use an existing JWK file instead of creating one.\\n` +\n ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --jwk-file rfc7523-client1_private.jwk.json ${s.amBaseUrl}\\n`[\n 'brightCyan'\n ] +\n ` Generate and output to console all the artefacts for an RFC7523 authorization grant flow configuration but do not create any configuration or files.\\n` +\n ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --no-save ${s.amBaseUrl}\\n`[\n 'brightCyan'\n ] +\n ` Generate and output in json format all the artefacts for an RFC7523 authorization grant flow configuration.\\n` +\n ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --json ${s.amBaseUrl}\\n`[\n 'brightCyan'\n ] +\n `\\nRelated Commands:\\n` +\n ` Run ${'frodo admin execute-rfc7523-authz-grant-flow --help'['brightCyan']} to see how to test your configuration created with ${'frodo admin generate-rfc7523-authz-grant-artefacts'['brightCyan']}:\\n`\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Generating RFC7523 authorization grant artefacts in realm \"${state.getRealm()}\"...`\n );\n let clientId = uuidv4();\n if (options.clientId) {\n clientId = options.clientId;\n }\n let jwk: JwkRsa = undefined;\n if (options.jwkFile) {\n try {\n const data = fs.readFileSync(options.jwkFile);\n jwk = JSON.parse(data.toString());\n } catch (error) {\n printMessage(\n `Error parsing JWK from file ${options.jwkFile}: ${error.message}`,\n 'error'\n );\n }\n }\n const outcome = await generateRfc7523AuthZGrantArtefacts(\n clientId,\n options.iss,\n jwk,\n options.sub,\n options.scope.split(' '),\n { save: options.save },\n options.json\n );\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAE7C,SAASC,MAAM,QAAQ,WAAW;AAClC,OAAOC,EAAE,MAAM,IAAI;AACnB,SAASC,EAAE,IAAIC,MAAM,QAAQ,MAAM;AAEnC,OAAO,KAAKC,CAAC,MAAM,uBAAuB;AAC1C,SAASC,kCAAkC,QAAQ,uBAAuB;AAC1E,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,oBAAoB;AAEjD,MAAMC,OAAO,GAAG,IAAID,YAAY,CAC9B,oDACF,CAAC;AAEDC,OAAO,CACJC,WAAW,CAAC,iDAAiD,CAAC,CAC9DC,SAAS,CAAC,IAAIX,MAAM,CAAC,kBAAkB,EAAE,YAAY,CAAC,CAAC,CACvDW,SAAS,CACR,IAAIX,MAAM,CACR,mBAAmB,EACnB,yDACF,CACF,CAAC,CACAW,SAAS,CACR,IAAIX,MAAM,CACR,iBAAiB,EACjB,wSACF,CACF,CAAC,CACAW,SAAS,CAAC,IAAIX,MAAM,CAAC,gBAAgB,EAAE,kCAAkC,CAAC,CAAC,CAC3EW,SAAS,CACR,IAAIX,MAAM,CAAC,iBAAiB,EAAE,iCAAiC,CAAC,CAACY,OAAO,CACtE,yBACF,CACF,CAAC,CACAD,SAAS,CACR,IAAIX,MAAM,CACR,WAAW,EACX,iNACF,CACF,CAAC,CACAW,SAAS,CAAC,IAAIX,MAAM,CAAC,QAAQ,EAAE,wBAAwB,CAAC,CAAC,CACzDa,WAAW,CACV,OAAO,EACN,mBAAkB,GAChB,sJAAqJ,GACrJ,2DAA0D,GAC1D,0EAAyE,GACzE,+EAA8E,GAC9E,mFAAkF,GAClF,oKAAmKT,CAAC,CAACU,SAAU,IAAG,CACjL,YAAY,CACb,GACA,yEAAwE,GACxE,gNAA+MV,CAAC,CAACU,SAAU,IAAG,CAC7N,YAAY,CACb,GACA,0JAAyJ,GACzJ,8KAA6KV,CAAC,CAACU,SAAU,IAAG,CAC3L,YAAY,CACb,GACA,iHAAgH,GAChH,2KAA0KV,CAAC,CAACU,SAAU,IAAG,CACxL,YAAY,CACb,GACA,uBAAsB,GACtB,SAAQ,qDAAqD,CAAC,YAAY,CAAE,uDAAsD,oDAAoD,CAAC,YAAY,CAAE,KAC1M,CAAC,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;EACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;EACD,IAAI,MAAMf,SAAS,CAAC,CAAC,EAAE;IACrBC,YAAY,CACT,8DAA6DR,KAAK,CAACwB,QAAQ,CAAC,CAAE,MACjF,CAAC;IACD,IAAIC,QAAQ,GAAGrB,MAAM,CAAC,CAAC;IACvB,IAAIiB,OAAO,CAACI,QAAQ,EAAE;MACpBA,QAAQ,GAAGJ,OAAO,CAACI,QAAQ;IAC7B;IACA,IAAIC,GAAW,GAAGC,SAAS;IAC3B,IAAIN,OAAO,CAACO,OAAO,EAAE;MACnB,IAAI;QACF,MAAMC,IAAI,GAAG3B,EAAE,CAAC4B,YAAY,CAACT,OAAO,CAACO,OAAO,CAAC;QAC7CF,GAAG,GAAGK,IAAI,CAACC,KAAK,CAACH,IAAI,CAACI,QAAQ,CAAC,CAAC,CAAC;MACnC,CAAC,CAAC,OAAOC,KAAK,EAAE;QACd1B,YAAY,CACT,+BAA8Ba,OAAO,CAACO,OAAQ,KAAIM,KAAK,CAACC,OAAQ,EAAC,EAClE,OACF,CAAC;MACH;IACF;IACA,MAAMC,OAAO,GAAG,MAAM9B,kCAAkC,CACtDmB,QAAQ,EACRJ,OAAO,CAACgB,GAAG,EACXX,GAAG,EACHL,OAAO,CAACiB,GAAG,EACXjB,OAAO,CAACkB,KAAK,CAACC,KAAK,CAAC,GAAG,CAAC,EACxB;MAAEC,IAAI,EAAEpB,OAAO,CAACoB;IAAK,CAAC,EACtBpB,OAAO,CAACqB,IACV,CAAC;IACD,IAAI,CAACN,OAAO,EAAEO,OAAO,CAACC,QAAQ,GAAG,CAAC;EACpC,CAAC,MAAM;IACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;EACtB;AACF;AACA;AACF,CAAC;AAEHlC,OAAO,CAACsB,KAAK,CAAC,CAAC"}
1
+ {"version":3,"file":"admin-generate-rfc7523-authz-grant-artefacts.js","names":["state","Option","fs","v4","uuidv4","s","generateRfc7523AuthZGrantArtefacts","getTokens","printMessage","FrodoCommand","setup","program","description","addOption","default","addHelpText","amBaseUrl","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","getRealm","clientId","jwk","undefined","jwkFile","data","readFileSync","JSON","parse","toString","error","message","outcome","iss","sub","scope","split","save","json","process","exitCode"],"sources":["../../../src/cli/admin/admin-generate-rfc7523-authz-grant-artefacts.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\nimport { JwkRsa } from '@rockcarver/frodo-lib/types/ops/JoseOps.js';\nimport { Option } from 'commander';\nimport fs from 'fs';\nimport { v4 as uuidv4 } from 'uuid';\n\nimport * as s from '../../help/SampleData';\nimport { generateRfc7523AuthZGrantArtefacts } from '../../ops/AdminOps.js';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand.js';\n\nexport default function setup() {\n const program = new FrodoCommand(\n 'frodo admin generate-rfc7523-authz-grant-artefacts'\n );\n\n program\n .description('Generate RFC7523 authorization grant artefacts.')\n .addOption(new Option('--client-id [id]', 'Client id.'))\n .addOption(\n new Option(\n '--jwk-file [file]',\n 'Path to JSON Web Key (JWK) file containing private key.'\n )\n )\n .addOption(\n new Option(\n '--sub [subject]',\n 'Subject identifier, typically a UUID. Must resolve to a valid user in the realm. Restricts the trusted issuer to only this subject by adding the identifier to the list of allowed subjects. Omitting this option allows the trusted issuer to request tokens for any realm user without restrictions.'\n )\n )\n .addOption(new Option('--iss [issuer]', 'Trusted issuer, typically a URL.'))\n .addOption(\n new Option('--scope [scope]', 'Space-delimited list of scopes.').default(\n 'openid fr:am:* fr:idm:*'\n )\n )\n .addOption(\n new Option(\n '--no-save',\n 'Do not save artefacts in AM and to file By default this command creates a fully configured oauth2 client and trusted issuer in AM and saves the generated JWK (private key) and JWKS (public key set) to files.'\n )\n )\n .addOption(new Option('--json', 'Output in JSON format.'))\n .addHelpText(\n 'after',\n `Usage Examples:\\n` +\n ` Generate, output to console, and save all the artefacts for an RFC7523 authorization grant flow configuration limited to one particular subject:\\n` +\n ` - Fully configured OAuth2 client - named '<clientId>'\\n` +\n ` - Fully configured OAuth2 trusted issuer - named '<clientId>-issuer'\\n` +\n ` - Private Key as Json Web Key (JWK) - named '<clientId>_private.jwk.json'\\n` +\n ` - Public Key as Json Web Key Set (JWKS) - named '<clientId>_public.jwks.json'\\n` +\n ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d ${s.amBaseUrl}\\n`[\n 'brightCyan'\n ] +\n ` Same as above but use an existing JWK file instead of creating one.\\n` +\n ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --jwk-file rfc7523-client1_private.jwk.json ${s.amBaseUrl}\\n`[\n 'brightCyan'\n ] +\n ` Generate and output to console all the artefacts for an RFC7523 authorization grant flow configuration but do not create any configuration or files.\\n` +\n ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --no-save ${s.amBaseUrl}\\n`[\n 'brightCyan'\n ] +\n ` Generate and output in json format all the artefacts for an RFC7523 authorization grant flow configuration.\\n` +\n ` $ frodo admin generate-rfc7523-authz-grant-artefacts --client-id rfc7523-client1 --iss https://my-issuer.com/issuer --sub 146c2230-9448-4442-b86d-eb4a81a0121d --json ${s.amBaseUrl}\\n`[\n 'brightCyan'\n ] +\n `\\nRelated Commands:\\n` +\n ` Run ${'frodo admin execute-rfc7523-authz-grant-flow --help'['brightCyan']} to see how to test your configuration created with ${'frodo admin generate-rfc7523-authz-grant-artefacts'['brightCyan']}:\\n`\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Generating RFC7523 authorization grant artefacts in realm \"${state.getRealm()}\"...`\n );\n let clientId = uuidv4();\n if (options.clientId) {\n clientId = options.clientId;\n }\n let jwk: JwkRsa = undefined;\n if (options.jwkFile) {\n try {\n const data = fs.readFileSync(options.jwkFile);\n jwk = JSON.parse(data.toString());\n } catch (error) {\n printMessage(\n `Error parsing JWK from file ${options.jwkFile}: ${error.message}`,\n 'error'\n );\n }\n }\n const outcome = await generateRfc7523AuthZGrantArtefacts(\n clientId,\n options.iss,\n jwk,\n options.sub,\n options.scope.split(' '),\n { save: options.save },\n options.json\n );\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\n return program;\n}\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAE7C,SAASC,MAAM,QAAQ,WAAW;AAClC,OAAOC,EAAE,MAAM,IAAI;AACnB,SAASC,EAAE,IAAIC,MAAM,QAAQ,MAAM;AAEnC,OAAO,KAAKC,CAAC,MAAM,uBAAuB;AAC1C,SAASC,kCAAkC,QAAQ,uBAAuB;AAC1E,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,oBAAoB;AAEjD,eAAe,SAASC,KAAKA,CAAA,EAAG;EAC9B,MAAMC,OAAO,GAAG,IAAIF,YAAY,CAC9B,oDACF,CAAC;EAEDE,OAAO,CACJC,WAAW,CAAC,iDAAiD,CAAC,CAC9DC,SAAS,CAAC,IAAIZ,MAAM,CAAC,kBAAkB,EAAE,YAAY,CAAC,CAAC,CACvDY,SAAS,CACR,IAAIZ,MAAM,CACR,mBAAmB,EACnB,yDACF,CACF,CAAC,CACAY,SAAS,CACR,IAAIZ,MAAM,CACR,iBAAiB,EACjB,wSACF,CACF,CAAC,CACAY,SAAS,CAAC,IAAIZ,MAAM,CAAC,gBAAgB,EAAE,kCAAkC,CAAC,CAAC,CAC3EY,SAAS,CACR,IAAIZ,MAAM,CAAC,iBAAiB,EAAE,iCAAiC,CAAC,CAACa,OAAO,CACtE,yBACF,CACF,CAAC,CACAD,SAAS,CACR,IAAIZ,MAAM,CACR,WAAW,EACX,iNACF,CACF,CAAC,CACAY,SAAS,CAAC,IAAIZ,MAAM,CAAC,QAAQ,EAAE,wBAAwB,CAAC,CAAC,CACzDc,WAAW,CACV,OAAO,EACN,mBAAkB,GAChB,sJAAqJ,GACrJ,2DAA0D,GAC1D,0EAAyE,GACzE,+EAA8E,GAC9E,mFAAkF,GAClF,oKAAmKV,CAAC,CAACW,SAAU,IAAG,CACjL,YAAY,CACb,GACA,yEAAwE,GACxE,gNAA+MX,CAAC,CAACW,SAAU,IAAG,CAC7N,YAAY,CACb,GACA,0JAAyJ,GACzJ,8KAA6KX,CAAC,CAACW,SAAU,IAAG,CAC3L,YAAY,CACb,GACA,iHAAgH,GAChH,2KAA0KX,CAAC,CAACW,SAAU,IAAG,CACxL,YAAY,CACb,GACA,uBAAsB,GACtB,SAAQ,qDAAqD,CAAC,YAAY,CAAE,uDAAsD,oDAAoD,CAAC,YAAY,CAAE,KAC1M,CAAC,CACAC,MAAM;EACL;EACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;IACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;IACD,IAAI,MAAMhB,SAAS,CAAC,CAAC,EAAE;MACrBC,YAAY,CACT,8DAA6DR,KAAK,CAACyB,QAAQ,CAAC,CAAE,MACjF,CAAC;MACD,IAAIC,QAAQ,GAAGtB,MAAM,CAAC,CAAC;MACvB,IAAIkB,OAAO,CAACI,QAAQ,EAAE;QACpBA,QAAQ,GAAGJ,OAAO,CAACI,QAAQ;MAC7B;MACA,IAAIC,GAAW,GAAGC,SAAS;MAC3B,IAAIN,OAAO,CAACO,OAAO,EAAE;QACnB,IAAI;UACF,MAAMC,IAAI,GAAG5B,EAAE,CAAC6B,YAAY,CAACT,OAAO,CAACO,OAAO,CAAC;UAC7CF,GAAG,GAAGK,IAAI,CAACC,KAAK,CAACH,IAAI,CAACI,QAAQ,CAAC,CAAC,CAAC;QACnC,CAAC,CAAC,OAAOC,KAAK,EAAE;UACd3B,YAAY,CACT,+BAA8Bc,OAAO,CAACO,OAAQ,KAAIM,KAAK,CAACC,OAAQ,EAAC,EAClE,OACF,CAAC;QACH;MACF;MACA,MAAMC,OAAO,GAAG,MAAM/B,kCAAkC,CACtDoB,QAAQ,EACRJ,OAAO,CAACgB,GAAG,EACXX,GAAG,EACHL,OAAO,CAACiB,GAAG,EACXjB,OAAO,CAACkB,KAAK,CAACC,KAAK,CAAC,GAAG,CAAC,EACxB;QAAEC,IAAI,EAAEpB,OAAO,CAACoB;MAAK,CAAC,EACtBpB,OAAO,CAACqB,IACV,CAAC;MACD,IAAI,CAACN,OAAO,EAAEO,OAAO,CAACC,QAAQ,GAAG,CAAC;IACpC,CAAC,MAAM;MACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;IACtB;EACF;EACA;EACF,CAAC;EAEH,OAAOlC,OAAO;AAChB"}
@@ -6,20 +6,22 @@ import { FrodoCommand } from '../FrodoCommand';
6
6
  const {
7
7
  clientCredentialsGrant
8
8
  } = frodo.oauth2oidc.endpoint;
9
- const program = new FrodoCommand('frodo admin get-access-token');
10
- program.description('Get an access token using client credentials grant type.').addOption(new Option('-i, --client-id [id]', 'Client id.').makeOptionMandatory()).addOption(new Option('-s, --client-secret [secret]', 'Client secret.').makeOptionMandatory()).addOption(new Option('--scope [scope]', 'Request the following scope(s).').default('fr:idm:*', 'fr:idm:*')).action(
11
- // implement command logic inside action handler
12
- async (host, realm, user, password, options, command) => {
13
- command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
14
- if (await getTokens()) {
15
- printMessage(`Getting an access token using client "${options.clientId}"...`);
16
- const response = await clientCredentialsGrant(state.getHost(), options.clientId, options.clientSecret, options.scope);
17
- printMessage(`Token: ${response.access_token}`);
18
- } else {
19
- process.exitCode = 1;
9
+ export default function setup() {
10
+ const program = new FrodoCommand('frodo admin get-access-token');
11
+ program.description('Get an access token using client credentials grant type.').addOption(new Option('-i, --client-id [id]', 'Client id.').makeOptionMandatory()).addOption(new Option('-s, --client-secret [secret]', 'Client secret.').makeOptionMandatory()).addOption(new Option('--scope [scope]', 'Request the following scope(s).').default('fr:idm:*', 'fr:idm:*')).action(
12
+ // implement command logic inside action handler
13
+ async (host, realm, user, password, options, command) => {
14
+ command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
15
+ if (await getTokens()) {
16
+ printMessage(`Getting an access token using client "${options.clientId}"...`);
17
+ const response = await clientCredentialsGrant(state.getHost(), options.clientId, options.clientSecret, options.scope);
18
+ printMessage(`Token: ${response.access_token}`);
19
+ } else {
20
+ process.exitCode = 1;
21
+ }
20
22
  }
23
+ // end command logic inside action handler
24
+ );
25
+ return program;
21
26
  }
22
- // end command logic inside action handler
23
- );
24
- program.parse();
25
27
  //# sourceMappingURL=admin-get-access-token.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"admin-get-access-token.js","names":["frodo","state","Option","getTokens","printMessage","FrodoCommand","clientCredentialsGrant","oauth2oidc","endpoint","program","description","addOption","makeOptionMandatory","default","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","clientId","response","getHost","clientSecret","scope","access_token","process","exitCode","parse"],"sources":["../../../src/cli/admin/admin-get-access-token.ts"],"sourcesContent":["import { frodo, state } from '@rockcarver/frodo-lib';\nimport { Option } from 'commander';\n\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nconst { clientCredentialsGrant } = frodo.oauth2oidc.endpoint;\n\nconst program = new FrodoCommand('frodo admin get-access-token');\n\nprogram\n .description('Get an access token using client credentials grant type.')\n .addOption(\n new Option('-i, --client-id [id]', 'Client id.').makeOptionMandatory()\n )\n .addOption(\n new Option(\n '-s, --client-secret [secret]',\n 'Client secret.'\n ).makeOptionMandatory()\n )\n .addOption(\n new Option('--scope [scope]', 'Request the following scope(s).').default(\n 'fr:idm:*',\n 'fr:idm:*'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Getting an access token using client \"${options.clientId}\"...`\n );\n const response = await clientCredentialsGrant(\n state.getHost(),\n options.clientId,\n options.clientSecret,\n options.scope\n );\n printMessage(`Token: ${response.access_token}`);\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,KAAK,EAAEC,KAAK,QAAQ,uBAAuB;AACpD,SAASC,MAAM,QAAQ,WAAW;AAElC,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,MAAM;EAAEC;AAAuB,CAAC,GAAGN,KAAK,CAACO,UAAU,CAACC,QAAQ;AAE5D,MAAMC,OAAO,GAAG,IAAIJ,YAAY,CAAC,8BAA8B,CAAC;AAEhEI,OAAO,CACJC,WAAW,CAAC,0DAA0D,CAAC,CACvEC,SAAS,CACR,IAAIT,MAAM,CAAC,sBAAsB,EAAE,YAAY,CAAC,CAACU,mBAAmB,CAAC,CACvE,CAAC,CACAD,SAAS,CACR,IAAIT,MAAM,CACR,8BAA8B,EAC9B,gBACF,CAAC,CAACU,mBAAmB,CAAC,CACxB,CAAC,CACAD,SAAS,CACR,IAAIT,MAAM,CAAC,iBAAiB,EAAE,iCAAiC,CAAC,CAACW,OAAO,CACtE,UAAU,EACV,UACF,CACF,CAAC,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;EACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;EACD,IAAI,MAAMjB,SAAS,CAAC,CAAC,EAAE;IACrBC,YAAY,CACT,yCAAwCe,OAAO,CAACG,QAAS,MAC5D,CAAC;IACD,MAAMC,QAAQ,GAAG,MAAMjB,sBAAsB,CAC3CL,KAAK,CAACuB,OAAO,CAAC,CAAC,EACfL,OAAO,CAACG,QAAQ,EAChBH,OAAO,CAACM,YAAY,EACpBN,OAAO,CAACO,KACV,CAAC;IACDtB,YAAY,CAAE,UAASmB,QAAQ,CAACI,YAAa,EAAC,CAAC;EACjD,CAAC,MAAM;IACLC,OAAO,CAACC,QAAQ,GAAG,CAAC;EACtB;AACF;AACA;AACF,CAAC;AAEHpB,OAAO,CAACqB,KAAK,CAAC,CAAC"}
1
+ {"version":3,"file":"admin-get-access-token.js","names":["frodo","state","Option","getTokens","printMessage","FrodoCommand","clientCredentialsGrant","oauth2oidc","endpoint","setup","program","description","addOption","makeOptionMandatory","default","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","clientId","response","getHost","clientSecret","scope","access_token","process","exitCode"],"sources":["../../../src/cli/admin/admin-get-access-token.ts"],"sourcesContent":["import { frodo, state } from '@rockcarver/frodo-lib';\nimport { Option } from 'commander';\n\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nconst { clientCredentialsGrant } = frodo.oauth2oidc.endpoint;\nexport default function setup() {\n const program = new FrodoCommand('frodo admin get-access-token');\n\n program\n .description('Get an access token using client credentials grant type.')\n .addOption(\n new Option('-i, --client-id [id]', 'Client id.').makeOptionMandatory()\n )\n .addOption(\n new Option(\n '-s, --client-secret [secret]',\n 'Client secret.'\n ).makeOptionMandatory()\n )\n .addOption(\n new Option('--scope [scope]', 'Request the following scope(s).').default(\n 'fr:idm:*',\n 'fr:idm:*'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Getting an access token using client \"${options.clientId}\"...`\n );\n const response = await clientCredentialsGrant(\n state.getHost(),\n options.clientId,\n options.clientSecret,\n options.scope\n );\n printMessage(`Token: ${response.access_token}`);\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\n return program;\n}\n"],"mappings":"AAAA,SAASA,KAAK,EAAEC,KAAK,QAAQ,uBAAuB;AACpD,SAASC,MAAM,QAAQ,WAAW;AAElC,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,MAAM;EAAEC;AAAuB,CAAC,GAAGN,KAAK,CAACO,UAAU,CAACC,QAAQ;AAC5D,eAAe,SAASC,KAAKA,CAAA,EAAG;EAC9B,MAAMC,OAAO,GAAG,IAAIL,YAAY,CAAC,8BAA8B,CAAC;EAEhEK,OAAO,CACJC,WAAW,CAAC,0DAA0D,CAAC,CACvEC,SAAS,CACR,IAAIV,MAAM,CAAC,sBAAsB,EAAE,YAAY,CAAC,CAACW,mBAAmB,CAAC,CACvE,CAAC,CACAD,SAAS,CACR,IAAIV,MAAM,CACR,8BAA8B,EAC9B,gBACF,CAAC,CAACW,mBAAmB,CAAC,CACxB,CAAC,CACAD,SAAS,CACR,IAAIV,MAAM,CAAC,iBAAiB,EAAE,iCAAiC,CAAC,CAACY,OAAO,CACtE,UAAU,EACV,UACF,CACF,CAAC,CACAC,MAAM;EACL;EACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;IACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;IACD,IAAI,MAAMlB,SAAS,CAAC,CAAC,EAAE;MACrBC,YAAY,CACT,yCAAwCgB,OAAO,CAACG,QAAS,MAC5D,CAAC;MACD,MAAMC,QAAQ,GAAG,MAAMlB,sBAAsB,CAC3CL,KAAK,CAACwB,OAAO,CAAC,CAAC,EACfL,OAAO,CAACG,QAAQ,EAChBH,OAAO,CAACM,YAAY,EACpBN,OAAO,CAACO,KACV,CAAC;MACDvB,YAAY,CAAE,UAASoB,QAAQ,CAACI,YAAa,EAAC,CAAC;IACjD,CAAC,MAAM;MACLC,OAAO,CAACC,QAAQ,GAAG,CAAC;IACtB;EACF;EACA;EACF,CAAC;EAEH,OAAOpB,OAAO;AAChB"}
@@ -4,20 +4,22 @@ import { grantOAuth2ClientAdminPrivileges } from '../../ops/AdminOps';
4
4
  import { getTokens } from '../../ops/AuthenticateOps';
5
5
  import { printMessage } from '../../utils/Console.js';
6
6
  import { FrodoCommand } from '../FrodoCommand';
7
- const program = new FrodoCommand('frodo admin grant-oauth2-client-admin-privileges');
8
- program.description('Grant an oauth2 client admin privileges.').addOption(new Option('-i, --client-id <id>', 'OAuth2 client id.')).addOption(new Option('-t, --target <target name or id>', 'Name of the oauth2 client.').hideHelp()).action(
9
- // implement command logic inside action handler
10
- async (host, realm, user, password, options, command) => {
11
- command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
12
- if (await getTokens()) {
13
- printMessage(`Granting oauth2 client "${options.clientId || options.target}" in realm "${state.getRealm()}" admin privileges...`);
14
- const outcome = await grantOAuth2ClientAdminPrivileges(options.clientId || options.target);
15
- if (!outcome) process.exitCode = 1;
16
- } else {
17
- process.exitCode = 1;
7
+ export default function setup() {
8
+ const program = new FrodoCommand('frodo admin grant-oauth2-client-admin-privileges');
9
+ program.description('Grant an oauth2 client admin privileges.').addOption(new Option('-i, --client-id <id>', 'OAuth2 client id.')).addOption(new Option('-t, --target <target name or id>', 'Name of the oauth2 client.').hideHelp()).action(
10
+ // implement command logic inside action handler
11
+ async (host, realm, user, password, options, command) => {
12
+ command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
13
+ if (await getTokens()) {
14
+ printMessage(`Granting oauth2 client "${options.clientId || options.target}" in realm "${state.getRealm()}" admin privileges...`);
15
+ const outcome = await grantOAuth2ClientAdminPrivileges(options.clientId || options.target);
16
+ if (!outcome) process.exitCode = 1;
17
+ } else {
18
+ process.exitCode = 1;
19
+ }
18
20
  }
21
+ // end command logic inside action handler
22
+ );
23
+ return program;
19
24
  }
20
- // end command logic inside action handler
21
- );
22
- program.parse();
23
25
  //# sourceMappingURL=admin-grant-oauth2-client-admin-privileges.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"admin-grant-oauth2-client-admin-privileges.js","names":["state","Option","grantOAuth2ClientAdminPrivileges","getTokens","printMessage","FrodoCommand","program","description","addOption","hideHelp","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","clientId","target","getRealm","outcome","process","exitCode","parse"],"sources":["../../../src/cli/admin/admin-grant-oauth2-client-admin-privileges.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\nimport { Option } from 'commander';\n\nimport { grantOAuth2ClientAdminPrivileges } from '../../ops/AdminOps';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nconst program = new FrodoCommand(\n 'frodo admin grant-oauth2-client-admin-privileges'\n);\n\nprogram\n .description('Grant an oauth2 client admin privileges.')\n .addOption(new Option('-i, --client-id <id>', 'OAuth2 client id.'))\n .addOption(\n new Option(\n '-t, --target <target name or id>',\n 'Name of the oauth2 client.'\n ).hideHelp()\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Granting oauth2 client \"${\n options.clientId || options.target\n }\" in realm \"${state.getRealm()}\" admin privileges...`\n );\n const outcome = await grantOAuth2ClientAdminPrivileges(\n options.clientId || options.target\n );\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAC7C,SAASC,MAAM,QAAQ,WAAW;AAElC,SAASC,gCAAgC,QAAQ,oBAAoB;AACrE,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,MAAMC,OAAO,GAAG,IAAID,YAAY,CAC9B,kDACF,CAAC;AAEDC,OAAO,CACJC,WAAW,CAAC,0CAA0C,CAAC,CACvDC,SAAS,CAAC,IAAIP,MAAM,CAAC,sBAAsB,EAAE,mBAAmB,CAAC,CAAC,CAClEO,SAAS,CACR,IAAIP,MAAM,CACR,kCAAkC,EAClC,4BACF,CAAC,CAACQ,QAAQ,CAAC,CACb,CAAC,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;EACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;EACD,IAAI,MAAMb,SAAS,CAAC,CAAC,EAAE;IACrBC,YAAY,CACT,2BACCW,OAAO,CAACG,QAAQ,IAAIH,OAAO,CAACI,MAC7B,eAAcnB,KAAK,CAACoB,QAAQ,CAAC,CAAE,uBAClC,CAAC;IACD,MAAMC,OAAO,GAAG,MAAMnB,gCAAgC,CACpDa,OAAO,CAACG,QAAQ,IAAIH,OAAO,CAACI,MAC9B,CAAC;IACD,IAAI,CAACE,OAAO,EAAEC,OAAO,CAACC,QAAQ,GAAG,CAAC;EACpC,CAAC,MAAM;IACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;EACtB;AACF;AACA;AACF,CAAC;AAEHjB,OAAO,CAACkB,KAAK,CAAC,CAAC"}
1
+ {"version":3,"file":"admin-grant-oauth2-client-admin-privileges.js","names":["state","Option","grantOAuth2ClientAdminPrivileges","getTokens","printMessage","FrodoCommand","setup","program","description","addOption","hideHelp","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","clientId","target","getRealm","outcome","process","exitCode"],"sources":["../../../src/cli/admin/admin-grant-oauth2-client-admin-privileges.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\nimport { Option } from 'commander';\n\nimport { grantOAuth2ClientAdminPrivileges } from '../../ops/AdminOps';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nexport default function setup() {\n const program = new FrodoCommand(\n 'frodo admin grant-oauth2-client-admin-privileges'\n );\n\n program\n .description('Grant an oauth2 client admin privileges.')\n .addOption(new Option('-i, --client-id <id>', 'OAuth2 client id.'))\n .addOption(\n new Option(\n '-t, --target <target name or id>',\n 'Name of the oauth2 client.'\n ).hideHelp()\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Granting oauth2 client \"${\n options.clientId || options.target\n }\" in realm \"${state.getRealm()}\" admin privileges...`\n );\n const outcome = await grantOAuth2ClientAdminPrivileges(\n options.clientId || options.target\n );\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\n return program;\n}\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAC7C,SAASC,MAAM,QAAQ,WAAW;AAElC,SAASC,gCAAgC,QAAQ,oBAAoB;AACrE,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,eAAe,SAASC,KAAKA,CAAA,EAAG;EAC9B,MAAMC,OAAO,GAAG,IAAIF,YAAY,CAC9B,kDACF,CAAC;EAEDE,OAAO,CACJC,WAAW,CAAC,0CAA0C,CAAC,CACvDC,SAAS,CAAC,IAAIR,MAAM,CAAC,sBAAsB,EAAE,mBAAmB,CAAC,CAAC,CAClEQ,SAAS,CACR,IAAIR,MAAM,CACR,kCAAkC,EAClC,4BACF,CAAC,CAACS,QAAQ,CAAC,CACb,CAAC,CACAC,MAAM;EACL;EACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;IACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;IACD,IAAI,MAAMd,SAAS,CAAC,CAAC,EAAE;MACrBC,YAAY,CACT,2BACCY,OAAO,CAACG,QAAQ,IAAIH,OAAO,CAACI,MAC7B,eAAcpB,KAAK,CAACqB,QAAQ,CAAC,CAAE,uBAClC,CAAC;MACD,MAAMC,OAAO,GAAG,MAAMpB,gCAAgC,CACpDc,OAAO,CAACG,QAAQ,IAAIH,OAAO,CAACI,MAC9B,CAAC;MACD,IAAI,CAACE,OAAO,EAAEC,OAAO,CAACC,QAAQ,GAAG,CAAC;IACpC,CAAC,MAAM;MACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;IACtB;EACF;EACA;EACF,CAAC;EAEH,OAAOjB,OAAO;AAChB"}
@@ -4,20 +4,22 @@ import { hideGenericExtensionAttributes } from '../../ops/AdminOps';
4
4
  import { getTokens } from '../../ops/AuthenticateOps';
5
5
  import { printMessage } from '../../utils/Console.js';
6
6
  import { FrodoCommand } from '../FrodoCommand';
7
- const program = new FrodoCommand('frodo admin hide-generic-extension-attributes');
8
- program.description('Hide generic extension attributes.').addOption(new Option('--include-customized', 'Include customized attributes.')).addOption(new Option('--dry-run', 'Dry-run only, do not perform changes.')).action(
9
- // implement command logic inside action handler
10
- async (host, realm, user, password, options, command) => {
11
- command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
12
- if (await getTokens()) {
13
- printMessage(`Hiding generic extension attributes in realm "${state.getRealm()}"...`);
14
- const outcome = await hideGenericExtensionAttributes(options.includeCustomized, options.dryRun);
15
- if (!outcome) process.exitCode = 1;
16
- } else {
17
- process.exitCode = 1;
7
+ export default function setup() {
8
+ const program = new FrodoCommand('frodo admin hide-generic-extension-attributes');
9
+ program.description('Hide generic extension attributes.').addOption(new Option('--include-customized', 'Include customized attributes.')).addOption(new Option('--dry-run', 'Dry-run only, do not perform changes.')).action(
10
+ // implement command logic inside action handler
11
+ async (host, realm, user, password, options, command) => {
12
+ command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
13
+ if (await getTokens()) {
14
+ printMessage(`Hiding generic extension attributes in realm "${state.getRealm()}"...`);
15
+ const outcome = await hideGenericExtensionAttributes(options.includeCustomized, options.dryRun);
16
+ if (!outcome) process.exitCode = 1;
17
+ } else {
18
+ process.exitCode = 1;
19
+ }
18
20
  }
21
+ // end command logic inside action handler
22
+ );
23
+ return program;
19
24
  }
20
- // end command logic inside action handler
21
- );
22
- program.parse();
23
25
  //# sourceMappingURL=admin-hide-generic-extension-attributes.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"admin-hide-generic-extension-attributes.js","names":["state","Option","hideGenericExtensionAttributes","getTokens","printMessage","FrodoCommand","program","description","addOption","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","getRealm","outcome","includeCustomized","dryRun","process","exitCode","parse"],"sources":["../../../src/cli/admin/admin-hide-generic-extension-attributes.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\nimport { Option } from 'commander';\n\nimport { hideGenericExtensionAttributes } from '../../ops/AdminOps';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nconst program = new FrodoCommand(\n 'frodo admin hide-generic-extension-attributes'\n);\n\nprogram\n .description('Hide generic extension attributes.')\n .addOption(\n new Option('--include-customized', 'Include customized attributes.')\n )\n .addOption(new Option('--dry-run', 'Dry-run only, do not perform changes.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Hiding generic extension attributes in realm \"${state.getRealm()}\"...`\n );\n const outcome = await hideGenericExtensionAttributes(\n options.includeCustomized,\n options.dryRun\n );\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAC7C,SAASC,MAAM,QAAQ,WAAW;AAElC,SAASC,8BAA8B,QAAQ,oBAAoB;AACnE,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,MAAMC,OAAO,GAAG,IAAID,YAAY,CAC9B,+CACF,CAAC;AAEDC,OAAO,CACJC,WAAW,CAAC,oCAAoC,CAAC,CACjDC,SAAS,CACR,IAAIP,MAAM,CAAC,sBAAsB,EAAE,gCAAgC,CACrE,CAAC,CACAO,SAAS,CAAC,IAAIP,MAAM,CAAC,WAAW,EAAE,uCAAuC,CAAC,CAAC,CAC3EQ,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;EACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;EACD,IAAI,MAAMZ,SAAS,CAAC,CAAC,EAAE;IACrBC,YAAY,CACT,iDAAgDJ,KAAK,CAACiB,QAAQ,CAAC,CAAE,MACpE,CAAC;IACD,MAAMC,OAAO,GAAG,MAAMhB,8BAA8B,CAClDY,OAAO,CAACK,iBAAiB,EACzBL,OAAO,CAACM,MACV,CAAC;IACD,IAAI,CAACF,OAAO,EAAEG,OAAO,CAACC,QAAQ,GAAG,CAAC;EACpC,CAAC,MAAM;IACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;EACtB;AACF;AACA;AACF,CAAC;AAEHhB,OAAO,CAACiB,KAAK,CAAC,CAAC"}
1
+ {"version":3,"file":"admin-hide-generic-extension-attributes.js","names":["state","Option","hideGenericExtensionAttributes","getTokens","printMessage","FrodoCommand","setup","program","description","addOption","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","getRealm","outcome","includeCustomized","dryRun","process","exitCode"],"sources":["../../../src/cli/admin/admin-hide-generic-extension-attributes.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\nimport { Option } from 'commander';\n\nimport { hideGenericExtensionAttributes } from '../../ops/AdminOps';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nexport default function setup() {\n const program = new FrodoCommand(\n 'frodo admin hide-generic-extension-attributes'\n );\n\n program\n .description('Hide generic extension attributes.')\n .addOption(\n new Option('--include-customized', 'Include customized attributes.')\n )\n .addOption(new Option('--dry-run', 'Dry-run only, do not perform changes.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Hiding generic extension attributes in realm \"${state.getRealm()}\"...`\n );\n const outcome = await hideGenericExtensionAttributes(\n options.includeCustomized,\n options.dryRun\n );\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\n return program;\n}\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAC7C,SAASC,MAAM,QAAQ,WAAW;AAElC,SAASC,8BAA8B,QAAQ,oBAAoB;AACnE,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,eAAe,SAASC,KAAKA,CAAA,EAAG;EAC9B,MAAMC,OAAO,GAAG,IAAIF,YAAY,CAC9B,+CACF,CAAC;EAEDE,OAAO,CACJC,WAAW,CAAC,oCAAoC,CAAC,CACjDC,SAAS,CACR,IAAIR,MAAM,CAAC,sBAAsB,EAAE,gCAAgC,CACrE,CAAC,CACAQ,SAAS,CAAC,IAAIR,MAAM,CAAC,WAAW,EAAE,uCAAuC,CAAC,CAAC,CAC3ES,MAAM;EACL;EACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;IACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;IACD,IAAI,MAAMb,SAAS,CAAC,CAAC,EAAE;MACrBC,YAAY,CACT,iDAAgDJ,KAAK,CAACkB,QAAQ,CAAC,CAAE,MACpE,CAAC;MACD,MAAMC,OAAO,GAAG,MAAMjB,8BAA8B,CAClDa,OAAO,CAACK,iBAAiB,EACzBL,OAAO,CAACM,MACV,CAAC;MACD,IAAI,CAACF,OAAO,EAAEG,OAAO,CAACC,QAAQ,GAAG,CAAC;IACpC,CAAC,MAAM;MACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;IACtB;EACF;EACA;EACF,CAAC;EAEH,OAAOhB,OAAO;AAChB"}
@@ -3,20 +3,22 @@ import { listOAuth2AdminClients } from '../../ops/AdminOps';
3
3
  import { getTokens } from '../../ops/AuthenticateOps';
4
4
  import { printMessage } from '../../utils/Console.js';
5
5
  import { FrodoCommand } from '../FrodoCommand';
6
- const program = new FrodoCommand('frodo admin list-oauth2-clients-with-admin-privileges');
7
- program.description('List oauth2 clients with admin privileges.').action(
8
- // implement command logic inside action handler
9
- async (host, realm, user, password, options, command) => {
10
- command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
11
- if (await getTokens()) {
12
- printMessage(`Listing oauth2 clients with admin privileges in realm "${state.getRealm()}"...`);
13
- const outcome = await listOAuth2AdminClients();
14
- if (!outcome) process.exitCode = 1;
15
- } else {
16
- process.exitCode = 1;
6
+ export default function setup() {
7
+ const program = new FrodoCommand('frodo admin list-oauth2-clients-with-admin-privileges');
8
+ program.description('List oauth2 clients with admin privileges.').action(
9
+ // implement command logic inside action handler
10
+ async (host, realm, user, password, options, command) => {
11
+ command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
12
+ if (await getTokens()) {
13
+ printMessage(`Listing oauth2 clients with admin privileges in realm "${state.getRealm()}"...`);
14
+ const outcome = await listOAuth2AdminClients();
15
+ if (!outcome) process.exitCode = 1;
16
+ } else {
17
+ process.exitCode = 1;
18
+ }
17
19
  }
20
+ // end command logic inside action handler
21
+ );
22
+ return program;
18
23
  }
19
- // end command logic inside action handler
20
- );
21
- program.parse();
22
24
  //# sourceMappingURL=admin-list-oauth2-clients-with-admin-privileges.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"admin-list-oauth2-clients-with-admin-privileges.js","names":["state","listOAuth2AdminClients","getTokens","printMessage","FrodoCommand","program","description","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","getRealm","outcome","process","exitCode","parse"],"sources":["../../../src/cli/admin/admin-list-oauth2-clients-with-admin-privileges.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\n\nimport { listOAuth2AdminClients } from '../../ops/AdminOps';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nconst program = new FrodoCommand(\n 'frodo admin list-oauth2-clients-with-admin-privileges'\n);\n\nprogram.description('List oauth2 clients with admin privileges.').action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Listing oauth2 clients with admin privileges in realm \"${state.getRealm()}\"...`\n );\n const outcome = await listOAuth2AdminClients();\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n);\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAE7C,SAASC,sBAAsB,QAAQ,oBAAoB;AAC3D,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,MAAMC,OAAO,GAAG,IAAID,YAAY,CAC9B,uDACF,CAAC;AAEDC,OAAO,CAACC,WAAW,CAAC,4CAA4C,CAAC,CAACC,MAAM;AACtE;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;EACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;EACD,IAAI,MAAMX,SAAS,CAAC,CAAC,EAAE;IACrBC,YAAY,CACT,0DAAyDH,KAAK,CAACe,QAAQ,CAAC,CAAE,MAC7E,CAAC;IACD,MAAMC,OAAO,GAAG,MAAMf,sBAAsB,CAAC,CAAC;IAC9C,IAAI,CAACe,OAAO,EAAEC,OAAO,CAACC,QAAQ,GAAG,CAAC;EACpC,CAAC,MAAM;IACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;EACtB;AACF;AACA;AACF,CAAC;AAEDb,OAAO,CAACc,KAAK,CAAC,CAAC"}
1
+ {"version":3,"file":"admin-list-oauth2-clients-with-admin-privileges.js","names":["state","listOAuth2AdminClients","getTokens","printMessage","FrodoCommand","setup","program","description","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","getRealm","outcome","process","exitCode"],"sources":["../../../src/cli/admin/admin-list-oauth2-clients-with-admin-privileges.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\n\nimport { listOAuth2AdminClients } from '../../ops/AdminOps';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nexport default function setup() {\n const program = new FrodoCommand(\n 'frodo admin list-oauth2-clients-with-admin-privileges'\n );\n\n program.description('List oauth2 clients with admin privileges.').action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Listing oauth2 clients with admin privileges in realm \"${state.getRealm()}\"...`\n );\n const outcome = await listOAuth2AdminClients();\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\n return program;\n}\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAE7C,SAASC,sBAAsB,QAAQ,oBAAoB;AAC3D,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,eAAe,SAASC,KAAKA,CAAA,EAAG;EAC9B,MAAMC,OAAO,GAAG,IAAIF,YAAY,CAC9B,uDACF,CAAC;EAEDE,OAAO,CAACC,WAAW,CAAC,4CAA4C,CAAC,CAACC,MAAM;EACtE;EACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;IACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;IACD,IAAI,MAAMZ,SAAS,CAAC,CAAC,EAAE;MACrBC,YAAY,CACT,0DAAyDH,KAAK,CAACgB,QAAQ,CAAC,CAAE,MAC7E,CAAC;MACD,MAAMC,OAAO,GAAG,MAAMhB,sBAAsB,CAAC,CAAC;MAC9C,IAAI,CAACgB,OAAO,EAAEC,OAAO,CAACC,QAAQ,GAAG,CAAC;IACpC,CAAC,MAAM;MACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;IACtB;EACF;EACA;EACF,CAAC;EAED,OAAOb,OAAO;AAChB"}
@@ -3,20 +3,22 @@ import { listOAuth2CustomClients } from '../../ops/AdminOps';
3
3
  import { getTokens } from '../../ops/AuthenticateOps';
4
4
  import { printMessage } from '../../utils/Console.js';
5
5
  import { FrodoCommand } from '../FrodoCommand';
6
- const program = new FrodoCommand('frodo admin list-oauth2-clients-with-custom-privileges');
7
- program.description('List oauth2 clients with custom privileges.').action(
8
- // implement command logic inside action handler
9
- async (host, realm, user, password, options, command) => {
10
- command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
11
- if (await getTokens()) {
12
- printMessage(`Listing oauth2 clients with custom privileges in realm "${state.getRealm()}"...`);
13
- const outcome = await listOAuth2CustomClients();
14
- if (!outcome) process.exitCode = 1;
15
- } else {
16
- process.exitCode = 1;
6
+ export default function setup() {
7
+ const program = new FrodoCommand('frodo admin list-oauth2-clients-with-custom-privileges');
8
+ program.description('List oauth2 clients with custom privileges.').action(
9
+ // implement command logic inside action handler
10
+ async (host, realm, user, password, options, command) => {
11
+ command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
12
+ if (await getTokens()) {
13
+ printMessage(`Listing oauth2 clients with custom privileges in realm "${state.getRealm()}"...`);
14
+ const outcome = await listOAuth2CustomClients();
15
+ if (!outcome) process.exitCode = 1;
16
+ } else {
17
+ process.exitCode = 1;
18
+ }
17
19
  }
20
+ // end command logic inside action handler
21
+ );
22
+ return program;
18
23
  }
19
- // end command logic inside action handler
20
- );
21
- program.parse();
22
24
  //# sourceMappingURL=admin-list-oauth2-clients-with-custom-privileges.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"admin-list-oauth2-clients-with-custom-privileges.js","names":["state","listOAuth2CustomClients","getTokens","printMessage","FrodoCommand","program","description","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","getRealm","outcome","process","exitCode","parse"],"sources":["../../../src/cli/admin/admin-list-oauth2-clients-with-custom-privileges.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\n\nimport { listOAuth2CustomClients } from '../../ops/AdminOps';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nconst program = new FrodoCommand(\n 'frodo admin list-oauth2-clients-with-custom-privileges'\n);\n\nprogram.description('List oauth2 clients with custom privileges.').action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Listing oauth2 clients with custom privileges in realm \"${state.getRealm()}\"...`\n );\n const outcome = await listOAuth2CustomClients();\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n);\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAE7C,SAASC,uBAAuB,QAAQ,oBAAoB;AAC5D,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,MAAMC,OAAO,GAAG,IAAID,YAAY,CAC9B,wDACF,CAAC;AAEDC,OAAO,CAACC,WAAW,CAAC,6CAA6C,CAAC,CAACC,MAAM;AACvE;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;EACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;EACD,IAAI,MAAMX,SAAS,CAAC,CAAC,EAAE;IACrBC,YAAY,CACT,2DAA0DH,KAAK,CAACe,QAAQ,CAAC,CAAE,MAC9E,CAAC;IACD,MAAMC,OAAO,GAAG,MAAMf,uBAAuB,CAAC,CAAC;IAC/C,IAAI,CAACe,OAAO,EAAEC,OAAO,CAACC,QAAQ,GAAG,CAAC;EACpC,CAAC,MAAM;IACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;EACtB;AACF;AACA;AACF,CAAC;AAEDb,OAAO,CAACc,KAAK,CAAC,CAAC"}
1
+ {"version":3,"file":"admin-list-oauth2-clients-with-custom-privileges.js","names":["state","listOAuth2CustomClients","getTokens","printMessage","FrodoCommand","setup","program","description","action","host","realm","user","password","options","command","handleDefaultArgsAndOpts","getRealm","outcome","process","exitCode"],"sources":["../../../src/cli/admin/admin-list-oauth2-clients-with-custom-privileges.ts"],"sourcesContent":["import { state } from '@rockcarver/frodo-lib';\n\nimport { listOAuth2CustomClients } from '../../ops/AdminOps';\nimport { getTokens } from '../../ops/AuthenticateOps';\nimport { printMessage } from '../../utils/Console.js';\nimport { FrodoCommand } from '../FrodoCommand';\n\nexport default function setup() {\n const program = new FrodoCommand(\n 'frodo admin list-oauth2-clients-with-custom-privileges'\n );\n\n program.description('List oauth2 clients with custom privileges.').action(\n // implement command logic inside action handler\n async (host, realm, user, password, options, command) => {\n command.handleDefaultArgsAndOpts(\n host,\n realm,\n user,\n password,\n options,\n command\n );\n if (await getTokens()) {\n printMessage(\n `Listing oauth2 clients with custom privileges in realm \"${state.getRealm()}\"...`\n );\n const outcome = await listOAuth2CustomClients();\n if (!outcome) process.exitCode = 1;\n } else {\n process.exitCode = 1;\n }\n }\n // end command logic inside action handler\n );\n\n return program;\n}\n"],"mappings":"AAAA,SAASA,KAAK,QAAQ,uBAAuB;AAE7C,SAASC,uBAAuB,QAAQ,oBAAoB;AAC5D,SAASC,SAAS,QAAQ,2BAA2B;AACrD,SAASC,YAAY,QAAQ,wBAAwB;AACrD,SAASC,YAAY,QAAQ,iBAAiB;AAE9C,eAAe,SAASC,KAAKA,CAAA,EAAG;EAC9B,MAAMC,OAAO,GAAG,IAAIF,YAAY,CAC9B,wDACF,CAAC;EAEDE,OAAO,CAACC,WAAW,CAAC,6CAA6C,CAAC,CAACC,MAAM;EACvE;EACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,EAAEC,OAAO,KAAK;IACvDA,OAAO,CAACC,wBAAwB,CAC9BN,IAAI,EACJC,KAAK,EACLC,IAAI,EACJC,QAAQ,EACRC,OAAO,EACPC,OACF,CAAC;IACD,IAAI,MAAMZ,SAAS,CAAC,CAAC,EAAE;MACrBC,YAAY,CACT,2DAA0DH,KAAK,CAACgB,QAAQ,CAAC,CAAE,MAC9E,CAAC;MACD,MAAMC,OAAO,GAAG,MAAMhB,uBAAuB,CAAC,CAAC;MAC/C,IAAI,CAACgB,OAAO,EAAEC,OAAO,CAACC,QAAQ,GAAG,CAAC;IACpC,CAAC,MAAM;MACLD,OAAO,CAACC,QAAQ,GAAG,CAAC;IACtB;EACF;EACA;EACF,CAAC;EAED,OAAOb,OAAO;AAChB"}
@@ -3,20 +3,22 @@ import { listNonOAuth2AdminStaticUserMappings } from '../../ops/AdminOps';
3
3
  import { getTokens } from '../../ops/AuthenticateOps';
4
4
  import { printMessage } from '../../utils/Console.js';
5
5
  import { FrodoCommand } from '../FrodoCommand';
6
- const program = new FrodoCommand('frodo admin list-static-user-mappings');
7
- program.description('List all subjects of static user mappings that are not oauth2 clients.').addOption(new Option('--show-protected', 'Show protected (system) subjects.').default(false, 'false')).action(
8
- // implement command logic inside action handler
9
- async (host, realm, user, password, options, command) => {
10
- command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
11
- if (await getTokens()) {
12
- printMessage('Listing all non-oauth2 client subjects of static user mappings...');
13
- const outcome = await listNonOAuth2AdminStaticUserMappings(options.showProtected);
14
- if (!outcome) process.exitCode = 1;
15
- } else {
16
- process.exitCode = 1;
6
+ export default function setup() {
7
+ const program = new FrodoCommand('frodo admin list-static-user-mappings');
8
+ program.description('List all subjects of static user mappings that are not oauth2 clients.').addOption(new Option('--show-protected', 'Show protected (system) subjects.').default(false, 'false')).action(
9
+ // implement command logic inside action handler
10
+ async (host, realm, user, password, options, command) => {
11
+ command.handleDefaultArgsAndOpts(host, realm, user, password, options, command);
12
+ if (await getTokens()) {
13
+ printMessage('Listing all non-oauth2 client subjects of static user mappings...');
14
+ const outcome = await listNonOAuth2AdminStaticUserMappings(options.showProtected);
15
+ if (!outcome) process.exitCode = 1;
16
+ } else {
17
+ process.exitCode = 1;
18
+ }
17
19
  }
20
+ // end command logic inside action handler
21
+ );
22
+ return program;
18
23
  }
19
- // end command logic inside action handler
20
- );
21
- program.parse();
22
24
  //# sourceMappingURL=admin-list-static-user-mappings.js.map