@rockcarver/frodo-cli 4.0.0-16 → 4.0.0-18

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -7,6 +7,10 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
 
8
8
  ## [Unreleased]
9
9
 
10
+ ## [4.0.0-17] - 2026-03-07
11
+
12
+ ## [4.0.0-16] - 2026-03-05
13
+
10
14
  ## [4.0.0-15] - 2026-03-05
11
15
 
12
16
  ## [4.0.0-14] - 2026-03-03
@@ -2193,7 +2197,9 @@ Frodo CLI 2.x automatically refreshes session and access tokens before they expi
2193
2197
  - Fixed problem with adding connection profiles
2194
2198
  - Miscellaneous bug fixes
2195
2199
 
2196
- [unreleased]: https://github.com/rockcarver/frodo-cli/compare/v4.0.0-15...HEAD
2200
+ [unreleased]: https://github.com/rockcarver/frodo-cli/compare/v4.0.0-17...HEAD
2201
+ [4.0.0-17]: https://github.com/rockcarver/frodo-cli/compare/v4.0.0-16...v4.0.0-17
2202
+ [4.0.0-16]: https://github.com/rockcarver/frodo-cli/compare/v4.0.0-15...v4.0.0-16
2197
2203
  [4.0.0-15]: https://github.com/rockcarver/frodo-cli/compare/v4.0.0-14...v4.0.0-15
2198
2204
  [4.0.0-14]: https://github.com/rockcarver/frodo-cli/compare/v4.0.0-13...v4.0.0-14
2199
2205
  [4.0.0-13]: https://github.com/rockcarver/frodo-cli/compare/v4.0.0-12...v4.0.0-13
package/dist/app.cjs CHANGED
@@ -141710,10 +141710,10 @@ var AVAILABLE_SCOPES = {
141710
141710
  // All Auto Access APIs
141711
141711
  AnalyticsFullScope: "fr:idc:analytics:*",
141712
141712
  // All Analytics APIs
141713
- CCCFullScope: "fr:idc:ccc:*",
141714
- // All CCC APIs
141715
- CCCReadScope: "fr:idc:ccc:read",
141716
- // Read CCC state
141713
+ DirectConfigurationSessionFullScope: "fr:idc:direct-configuration:session:*",
141714
+ // All Direct Configuration Session APIs
141715
+ DirectConfigurationSessionReadScope: "fr:idc:direct-configuration:session:read",
141716
+ // Read Direct Configuration Session state
141717
141717
  CertificateFullScope: "fr:idc:certificate:*",
141718
141718
  // All TLS certificate APIs
141719
141719
  CertificateReadScope: "fr:idc:certificate:read",
@@ -142047,7 +142047,7 @@ function stringify(obj) {
142047
142047
  }
142048
142048
  var package_default = {
142049
142049
  name: "@rockcarver/frodo-lib",
142050
- version: "4.0.0-23",
142050
+ version: "4.0.0-25",
142051
142051
  type: "commonjs",
142052
142052
  main: "./dist/index.js",
142053
142053
  module: "./dist/index.mjs",
@@ -142303,7 +142303,10 @@ var State_default = (initialState) => {
142303
142303
  state2.authenticationHeaderOverrides = overrides;
142304
142304
  },
142305
142305
  getAuthenticationHeaderOverrides() {
142306
- return state2.authenticationHeaderOverrides;
142306
+ return mergeDeep(
142307
+ state2.authenticationHeaderOverrides,
142308
+ process.env.FRODO_AUTHENTICATION_HEADER_OVERRIDES ? JSON.parse(process.env.FRODO_AUTHENTICATION_HEADER_OVERRIDES) : {}
142309
+ );
142307
142310
  },
142308
142311
  setAuthenticationService(service) {
142309
142312
  state2.authenticationService = service;
@@ -142315,7 +142318,10 @@ var State_default = (initialState) => {
142315
142318
  state2.configurationHeaderOverrides = overrides;
142316
142319
  },
142317
142320
  getConfigurationHeaderOverrides() {
142318
- return state2.configurationHeaderOverrides;
142321
+ return mergeDeep(
142322
+ state2.configurationHeaderOverrides,
142323
+ process.env.FRODO_CONFIGURATION_HEADER_OVERRIDES ? JSON.parse(process.env.FRODO_CONFIGURATION_HEADER_OVERRIDES) : {}
142324
+ );
142319
142325
  },
142320
142326
  setServiceAccountId(uuid) {
142321
142327
  state2.serviceAccountId = uuid;
@@ -178810,7 +178816,7 @@ var s2 = Constants_default.AVAILABLE_SCOPES;
178810
178816
  var SERVICE_ACCOUNT_ALLOWED_SCOPES = [
178811
178817
  s2.AmFullScope,
178812
178818
  s2.AnalyticsFullScope,
178813
- s2.CCCFullScope,
178819
+ s2.DirectConfigurationSessionFullScope,
178814
178820
  s2.AutoAccessFullScope,
178815
178821
  s2.CertificateFullScope,
178816
178822
  s2.CertificateReadScope,
@@ -178835,7 +178841,7 @@ var SERVICE_ACCOUNT_ALLOWED_SCOPES = [
178835
178841
  var SERVICE_ACCOUNT_DEFAULT_SCOPES = [
178836
178842
  s2.AmFullScope,
178837
178843
  s2.AnalyticsFullScope,
178838
- s2.CCCFullScope,
178844
+ s2.DirectConfigurationSessionFullScope,
178839
178845
  s2.AutoAccessFullScope,
178840
178846
  s2.CertificateFullScope,
178841
178847
  s2.ContentSecurityPolicyFullScope,
@@ -180394,7 +180400,7 @@ var redirectUrlTemplate = "/platform/appAuthHelperRedirect.html";
180394
180400
  var s3 = Constants_default.AVAILABLE_SCOPES;
180395
180401
  var CLOUD_ADMIN_MINIMAL_SCOPES = [
180396
180402
  s3.AnalyticsFullScope,
180397
- s3.CCCFullScope,
180403
+ s3.DirectConfigurationSessionFullScope,
180398
180404
  s3.CertificateFullScope,
180399
180405
  s3.ContentSecurityPolicyFullScope,
180400
180406
  s3.CookieDomainsFullScope,
@@ -180409,7 +180415,7 @@ var CLOUD_ADMIN_MINIMAL_SCOPES = [
180409
180415
  ];
180410
180416
  var CLOUD_ADMIN_DEFAULT_SCOPES = [
180411
180417
  s3.AnalyticsFullScope,
180412
- s3.CCCFullScope,
180418
+ s3.DirectConfigurationSessionFullScope,
180413
180419
  s3.AutoAccessFullScope,
180414
180420
  s3.CertificateFullScope,
180415
180421
  s3.ContentSecurityPolicyFullScope,
@@ -183964,10 +183970,10 @@ async function updateCustomDomains({
183964
183970
  throw new FrodoError(`Error updating custom domains`, error2);
183965
183971
  }
183966
183972
  }
183967
- var directConfigurationSessionInitURLTemplate = "%s/environment/ccc/init";
183968
- var directConfigurationSessionApplyURLTemplate = "%s/environment/ccc/apply";
183969
- var directConfigurationSessionAbortURLTemplate = "%s/environment/ccc/abort";
183970
- var directConfigurationSessionStateURLTemplate = "%s/environment/ccc/state";
183973
+ var directConfigurationSessionInitURLTemplate = "%s/environment/direct-configuration/session/init";
183974
+ var directConfigurationSessionApplyURLTemplate = "%s/environment/direct-configuration/session/apply";
183975
+ var directConfigurationSessionAbortURLTemplate = "%s/environment/direct-configuration/session/abort";
183976
+ var directConfigurationSessionStateURLTemplate = "%s/environment/direct-configuration/session/state";
183971
183977
  var apiVersion25 = "protocol=1.0,resource=1.0";
183972
183978
  var getApiConfig27 = () => {
183973
183979
  return {
@@ -200465,6 +200471,8 @@ Environment Variables:
200465
200471
  FRODO_LOG_SECRET: Log API secret. Overridden by 'password' argument.
200466
200472
  ` : ``) + ` FRODO_CONNECTION_PROFILES_PATH: Use this connection profiles file instead of '~/.frodo/Connections.json'.
200467
200473
  FRODO_AUTHENTICATION_SERVICE: Name of a login journey to use. When using an Amster private key, specifies which journey to use for Amster authentication as opposed to the default 'amsterService' journey.
200474
+ FRODO_AUTHENTICATION_HEADER_OVERRIDES: Map of headers: '{"host":"am.example.com:8081"}'. These headers are sent with all requests and can be used to override default behavior, for example to set a custom host header for Proxy Connect-protected PingOne Advanced Identity Cloud environments.
200475
+ FRODO_CONFIGURATION_HEADER_OVERRIDES: Map of headers: '{"X-Configuration-Type":"mutable"}'. These headers are sent with all configuration requests and can be used to override default behavior, for example to set a custom configuration header for mutable PingOne Advanced Identity Cloud environments.
200468
200476
  FRODO_DEBUG: Set to any value to enable debug output. Same as '--debug'.
200469
200477
  FRODO_IGA: Set to "true" to enable IGA (Identity Governance) endpoints for cloud deployments, or "false" to disable them, overriding auto-detected value.
200470
200478
  FRODO_MASTER_KEY_PATH: Use this master key file instead of '~/.frodo/masterkey.key' file.
@@ -218656,12 +218664,12 @@ function setup125() {
218656
218664
  ).addOption(
218657
218665
  new Option(
218658
218666
  "--authentication-header-overrides [headers]",
218659
- 'Map of headers: {"host":"am.example.com:8081"}. These headers are sent with all requests and can be used to override default behavior, for example to set a custom host header for Proxy Connect-protected PingOne Advanced Identity Cloud environments.'
218667
+ `Map of headers: '{"host":"am.example.com:8081"}'. These headers are sent with all requests and can be used to override default behavior, for example to set a custom host header for Proxy Connect-protected PingOne Advanced Identity Cloud environments.`
218660
218668
  )
218661
218669
  ).addOption(
218662
218670
  new Option(
218663
218671
  "--configuration-header-overrides [headers]",
218664
- 'Map of headers: {"X-Custom-Configuration":"critical"}. These headers are sent with all configuration requests and can be used to override default behavior, for example to set a custom configuration header for mutable PingOne Advanced Identity Cloud environments.'
218672
+ `Map of headers: '{"X-Configuration-Type":"mutable"}'. These headers are sent with all configuration requests and can be used to override default behavior, for example to set a custom configuration header for mutable PingOne Advanced Identity Cloud environments.`
218665
218673
  )
218666
218674
  ).addOption(
218667
218675
  new Option("--alias [name]", "Alias name for this connection profile.")
@@ -233223,7 +233231,7 @@ var compareVersions = (v12, v2) => {
233223
233231
  // package.json
233224
233232
  var package_default2 = {
233225
233233
  name: "@rockcarver/frodo-cli",
233226
- version: "4.0.0-16",
233234
+ version: "4.0.0-18",
233227
233235
  type: "module",
233228
233236
  description: "A command line interface to manage ForgeRock Identity Cloud tenants, ForgeOps deployments, and classic deployments.",
233229
233237
  keywords: [
@@ -233318,7 +233326,7 @@ var package_default2 = {
233318
233326
  ]
233319
233327
  },
233320
233328
  devDependencies: {
233321
- "@rockcarver/frodo-lib": "4.0.0-23",
233329
+ "@rockcarver/frodo-lib": "4.0.0-25",
233322
233330
  "@types/colors": "^1.2.1",
233323
233331
  "@types/fs-extra": "^11.0.1",
233324
233332
  "@types/jest": "^29.2.3",