@rockcarver/frodo-lib 0.12.2-0 → 0.12.2-3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +13 -1
- package/cjs/api/OAuth2ClientApi.js +3 -1
- package/cjs/api/OAuth2ClientApi.js.map +1 -1
- package/cjs/api/SecretsApi.js +137 -29
- package/cjs/api/SecretsApi.js.map +1 -1
- package/cjs/api/SecretsApi.test.js.map +1 -0
- package/cjs/api/TreeApi.js +5 -3
- package/cjs/api/TreeApi.js.map +1 -1
- package/cjs/api/VariablesApi.js +35 -20
- package/cjs/api/VariablesApi.js.map +1 -1
- package/cjs/index.js +5 -1
- package/cjs/index.js.map +1 -1
- package/cjs/ops/AuthenticateOps.js +1 -1
- package/cjs/ops/AuthenticateOps.js.map +1 -1
- package/cjs/ops/JourneyOps.js +34 -4
- package/cjs/ops/JourneyOps.js.map +1 -1
- package/cjs/ops/OAuth2ClientOps.js +27 -20
- package/cjs/ops/OAuth2ClientOps.js.map +1 -1
- package/cjs/ops/SecretsOps.js +11 -9
- package/cjs/ops/SecretsOps.js.map +1 -1
- package/cjs/ops/StartupOps.js +2 -2
- package/cjs/ops/StartupOps.js.map +1 -1
- package/cjs/ops/VariablesOps.js +3 -3
- package/cjs/ops/VariablesOps.js.map +1 -1
- package/cjs/ops/utils/ExportImportUtils.js +1 -0
- package/cjs/ops/utils/ExportImportUtils.js.map +1 -1
- package/esm/api/OAuth2ClientApi.mjs +4 -2
- package/esm/api/SecretsApi.mjs +134 -29
- package/esm/api/SecretsApi.test.mjs +283 -0
- package/esm/api/TreeApi.mjs +5 -3
- package/esm/api/VariablesApi.mjs +35 -20
- package/esm/index.mjs +2 -1
- package/esm/ops/AuthenticateOps.mjs +1 -1
- package/esm/ops/JourneyOps.mjs +21 -0
- package/esm/ops/OAuth2ClientOps.mjs +9 -4
- package/esm/ops/SecretsOps.mjs +12 -10
- package/esm/ops/StartupOps.mjs +2 -2
- package/esm/ops/VariablesOps.mjs +3 -3
- package/esm/ops/utils/ExportImportUtils.mjs +1 -0
- package/package.json +1 -1
- package/types/api/OAuth2ClientApi.d.ts.map +1 -1
- package/types/api/SecretsApi.d.ts +73 -10
- package/types/api/SecretsApi.d.ts.map +1 -1
- package/types/api/TreeApi.d.ts +1 -1
- package/types/api/TreeApi.d.ts.map +1 -1
- package/types/api/VariablesApi.d.ts +9 -9
- package/types/api/VariablesApi.d.ts.map +1 -1
- package/types/index.d.ts +1 -0
- package/types/index.d.ts.map +1 -1
- package/types/ops/AuthenticateOps.d.ts.map +1 -1
- package/types/ops/JourneyOps.d.ts +7 -1
- package/types/ops/JourneyOps.d.ts.map +1 -1
- package/types/ops/OAuth2ClientOps.d.ts.map +1 -1
- package/types/ops/SecretsOps.d.ts.map +1 -1
- package/types/ops/StartupOps.d.ts.map +1 -1
- package/types/ops/VariablesOps.d.ts.map +1 -1
- package/types/ops/utils/ExportImportUtils.d.ts.map +1 -1
package/CHANGELOG.md
CHANGED
|
@@ -7,6 +7,12 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
7
7
|
|
|
8
8
|
## [Unreleased]
|
|
9
9
|
|
|
10
|
+
## [0.12.2-3] - 2022-09-09
|
|
11
|
+
|
|
12
|
+
## [0.12.2-2] - 2022-09-09
|
|
13
|
+
|
|
14
|
+
## [0.12.2-1] - 2022-09-08
|
|
15
|
+
|
|
10
16
|
## [0.12.2-0] - 2022-09-02
|
|
11
17
|
|
|
12
18
|
## [0.12.1] - 2022-08-27
|
|
@@ -453,7 +459,13 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
453
459
|
- Fixed problem with adding connection profiles
|
|
454
460
|
- Miscellaneous bug fixes
|
|
455
461
|
|
|
456
|
-
[Unreleased]: https://github.com/rockcarver/frodo-lib/compare/v0.12.2-
|
|
462
|
+
[Unreleased]: https://github.com/rockcarver/frodo-lib/compare/v0.12.2-3...HEAD
|
|
463
|
+
|
|
464
|
+
[0.12.2-3]: https://github.com/rockcarver/frodo-lib/compare/v0.12.2-2...v0.12.2-3
|
|
465
|
+
|
|
466
|
+
[0.12.2-2]: https://github.com/rockcarver/frodo-lib/compare/v0.12.2-1...v0.12.2-2
|
|
467
|
+
|
|
468
|
+
[0.12.2-1]: https://github.com/rockcarver/frodo-lib/compare/v0.12.2-0...v0.12.2-1
|
|
457
469
|
|
|
458
470
|
[0.12.2-0]: https://github.com/rockcarver/frodo-lib/compare/v0.12.1...v0.12.2-0
|
|
459
471
|
|
|
@@ -87,7 +87,9 @@ function putOAuth2Client(_x2, _x3) {
|
|
|
87
87
|
|
|
88
88
|
function _putOAuth2Client() {
|
|
89
89
|
_putOAuth2Client = _asyncToGenerator(function* (id, data) {
|
|
90
|
-
|
|
90
|
+
// until we figure out a way to use transport keys in Frodo,
|
|
91
|
+
// we'll have to drop those encrypted attributes.
|
|
92
|
+
var client = (0, _ApiUtils.deleteDeepByKey)(data, '-encrypted');
|
|
91
93
|
delete client._provider;
|
|
92
94
|
delete client._rev;
|
|
93
95
|
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"OAuth2ClientApi.js","names":["oauth2ClientURLTemplate","oauth2ClientListURLTemplate","apiVersion","getApiConfig","configPath","getCurrentRealmPath","path","getOAuth2Clients","urlString","util","format","storage","session","getTenant","generateAmApi","get","withCredentials","getOAuth2Client","id","putOAuth2Client","data","client","_provider","_rev","put"],"sources":["api/OAuth2ClientApi.ts"],"sourcesContent":["import util from 'util';\nimport { generateAmApi } from './BaseApi';\nimport { getCurrentRealmPath } from './utils/ApiUtils';\nimport storage from '../storage/SessionStorage';\n\nconst oauth2ClientURLTemplate = '%s/json%s/realm-config/agents/OAuth2Client/%s';\nconst oauth2ClientListURLTemplate =\n '%s/json%s/realm-config/agents/OAuth2Client?_queryFilter=true';\nconst apiVersion = 'protocol=2.1,resource=1.0';\nconst getApiConfig = () => {\n const configPath = getCurrentRealmPath();\n return {\n path: `${configPath}/realm-config/agents/OAuth2Client`,\n apiVersion,\n };\n};\n\n/**\n * Get OAuth2 Clients\n * @returns {Promise} a promise that resolves to an object containing an array of oauth2client objects\n */\nexport async function getOAuth2Clients() {\n const urlString = util.format(\n oauth2ClientListURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath()\n );\n return generateAmApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n}\n\n/**\n * Get OAuth2 Client\n * @param {String} id client id\n * @returns {Promise} a promise that resolves to an object containing an oauth2client object\n */\nexport async function getOAuth2Client(id) {\n const urlString = util.format(\n oauth2ClientURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath(),\n id\n );\n return generateAmApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n}\n\n/**\n * Put OAuth2 Client\n * @param {String} id client id\n * @param {Object} data oauth2client object\n * @returns {Promise} a promise that resolves to an object containing an oauth2client object\n */\nexport async function putOAuth2Client(id, data) {\n const client = data;\n delete client._provider;\n delete client._rev;\n const urlString = util.format(\n oauth2ClientURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath(),\n id\n );\n return generateAmApi(getApiConfig()).put(urlString, client, {\n withCredentials: true,\n });\n}\n"],"mappings":";;;;;;;;;AAAA;;AACA;;AACA;;AACA;;;;;;;;AAEA,IAAMA,uBAAuB,GAAG,+CAAhC;AACA,IAAMC,2BAA2B,GAC/B,8DADF;AAEA,IAAMC,UAAU,GAAG,2BAAnB;;AACA,IAAMC,YAAY,GAAG,MAAM;EACzB,IAAMC,UAAU,GAAG,IAAAC,6BAAA,GAAnB;EACA,OAAO;IACLC,IAAI,YAAKF,UAAL,sCADC;IAELF;EAFK,CAAP;AAID,CAND;AAQA;AACA;AACA;AACA;;;SACsBK,gB;;;AAWtB;AACA;AACA;AACA;AACA;;;;wCAfO,aAAkC;IACvC,IAAMC,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBT,2BADgB,EAEhBU,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAFgB,EAGhB,IAAAR,6BAAA,GAHgB,CAAlB;;IAKA,OAAO,IAAAS,sBAAA,EAAcX,YAAY,EAA1B,EAA8BY,GAA9B,CAAkCP,SAAlC,EAA6C;MAClDQ,eAAe,EAAE;IADiC,CAA7C,CAAP;EAGD,C;;;;SAOqBC,e;;;AAYtB;AACA;AACA;AACA;AACA;AACA;;;;uCAjBO,WAA+BC,EAA/B,EAAmC;IACxC,IAAMV,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,uBADgB,EAEhBW,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAFgB,EAGhB,IAAAR,6BAAA,GAHgB,EAIhBa,EAJgB,CAAlB;;IAMA,OAAO,IAAAJ,sBAAA,EAAcX,YAAY,EAA1B,EAA8BY,GAA9B,CAAkCP,SAAlC,EAA6C;MAClDQ,eAAe,EAAE;IADiC,CAA7C,CAAP;EAGD,C;;;;SAQqBG,e;;;;;uCAAf,WAA+BD,EAA/B,EAAmCE,IAAnC,EAAyC;IAC9C,IAAMC,MAAM,
|
|
1
|
+
{"version":3,"file":"OAuth2ClientApi.js","names":["oauth2ClientURLTemplate","oauth2ClientListURLTemplate","apiVersion","getApiConfig","configPath","getCurrentRealmPath","path","getOAuth2Clients","urlString","util","format","storage","session","getTenant","generateAmApi","get","withCredentials","getOAuth2Client","id","putOAuth2Client","data","client","deleteDeepByKey","_provider","_rev","put"],"sources":["api/OAuth2ClientApi.ts"],"sourcesContent":["import util from 'util';\nimport { generateAmApi } from './BaseApi';\nimport { deleteDeepByKey, getCurrentRealmPath } from './utils/ApiUtils';\nimport storage from '../storage/SessionStorage';\n\nconst oauth2ClientURLTemplate = '%s/json%s/realm-config/agents/OAuth2Client/%s';\nconst oauth2ClientListURLTemplate =\n '%s/json%s/realm-config/agents/OAuth2Client?_queryFilter=true';\nconst apiVersion = 'protocol=2.1,resource=1.0';\nconst getApiConfig = () => {\n const configPath = getCurrentRealmPath();\n return {\n path: `${configPath}/realm-config/agents/OAuth2Client`,\n apiVersion,\n };\n};\n\n/**\n * Get OAuth2 Clients\n * @returns {Promise} a promise that resolves to an object containing an array of oauth2client objects\n */\nexport async function getOAuth2Clients() {\n const urlString = util.format(\n oauth2ClientListURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath()\n );\n return generateAmApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n}\n\n/**\n * Get OAuth2 Client\n * @param {String} id client id\n * @returns {Promise} a promise that resolves to an object containing an oauth2client object\n */\nexport async function getOAuth2Client(id) {\n const urlString = util.format(\n oauth2ClientURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath(),\n id\n );\n return generateAmApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n}\n\n/**\n * Put OAuth2 Client\n * @param {String} id client id\n * @param {Object} data oauth2client object\n * @returns {Promise} a promise that resolves to an object containing an oauth2client object\n */\nexport async function putOAuth2Client(id, data) {\n // until we figure out a way to use transport keys in Frodo,\n // we'll have to drop those encrypted attributes.\n const client = deleteDeepByKey(data, '-encrypted');\n delete client._provider;\n delete client._rev;\n const urlString = util.format(\n oauth2ClientURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath(),\n id\n );\n return generateAmApi(getApiConfig()).put(urlString, client, {\n withCredentials: true,\n });\n}\n"],"mappings":";;;;;;;;;AAAA;;AACA;;AACA;;AACA;;;;;;;;AAEA,IAAMA,uBAAuB,GAAG,+CAAhC;AACA,IAAMC,2BAA2B,GAC/B,8DADF;AAEA,IAAMC,UAAU,GAAG,2BAAnB;;AACA,IAAMC,YAAY,GAAG,MAAM;EACzB,IAAMC,UAAU,GAAG,IAAAC,6BAAA,GAAnB;EACA,OAAO;IACLC,IAAI,YAAKF,UAAL,sCADC;IAELF;EAFK,CAAP;AAID,CAND;AAQA;AACA;AACA;AACA;;;SACsBK,gB;;;AAWtB;AACA;AACA;AACA;AACA;;;;wCAfO,aAAkC;IACvC,IAAMC,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBT,2BADgB,EAEhBU,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAFgB,EAGhB,IAAAR,6BAAA,GAHgB,CAAlB;;IAKA,OAAO,IAAAS,sBAAA,EAAcX,YAAY,EAA1B,EAA8BY,GAA9B,CAAkCP,SAAlC,EAA6C;MAClDQ,eAAe,EAAE;IADiC,CAA7C,CAAP;EAGD,C;;;;SAOqBC,e;;;AAYtB;AACA;AACA;AACA;AACA;AACA;;;;uCAjBO,WAA+BC,EAA/B,EAAmC;IACxC,IAAMV,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,uBADgB,EAEhBW,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAFgB,EAGhB,IAAAR,6BAAA,GAHgB,EAIhBa,EAJgB,CAAlB;;IAMA,OAAO,IAAAJ,sBAAA,EAAcX,YAAY,EAA1B,EAA8BY,GAA9B,CAAkCP,SAAlC,EAA6C;MAClDQ,eAAe,EAAE;IADiC,CAA7C,CAAP;EAGD,C;;;;SAQqBG,e;;;;;uCAAf,WAA+BD,EAA/B,EAAmCE,IAAnC,EAAyC;IAC9C;IACA;IACA,IAAMC,MAAM,GAAG,IAAAC,yBAAA,EAAgBF,IAAhB,EAAsB,YAAtB,CAAf;IACA,OAAOC,MAAM,CAACE,SAAd;IACA,OAAOF,MAAM,CAACG,IAAd;;IACA,IAAMhB,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,uBADgB,EAEhBW,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAFgB,EAGhB,IAAAR,6BAAA,GAHgB,EAIhBa,EAJgB,CAAlB;;IAMA,OAAO,IAAAJ,sBAAA,EAAcX,YAAY,EAA1B,EAA8BsB,GAA9B,CAAkCjB,SAAlC,EAA6Ca,MAA7C,EAAqD;MAC1DL,eAAe,EAAE;IADyC,CAArD,CAAP;EAGD,C"}
|
package/cjs/api/SecretsApi.js
CHANGED
|
@@ -3,6 +3,7 @@
|
|
|
3
3
|
Object.defineProperty(exports, "__esModule", {
|
|
4
4
|
value: true
|
|
5
5
|
});
|
|
6
|
+
exports.VersionOfSecretStatus = void 0;
|
|
6
7
|
exports.createNewVersionOfSecret = createNewVersionOfSecret;
|
|
7
8
|
exports.deleteSecret = deleteSecret;
|
|
8
9
|
exports.deleteVersionOfSecret = deleteVersionOfSecret;
|
|
@@ -43,18 +44,32 @@ var getApiConfig = () => ({
|
|
|
43
44
|
path: "/environment/secrets",
|
|
44
45
|
apiVersion
|
|
45
46
|
});
|
|
47
|
+
/**
|
|
48
|
+
* Get all secrets
|
|
49
|
+
* @returns {Promise<unknown[]>} a promise that resolves to an array of secrets
|
|
50
|
+
*/
|
|
51
|
+
|
|
46
52
|
|
|
47
53
|
function getSecrets() {
|
|
48
54
|
return _getSecrets.apply(this, arguments);
|
|
49
55
|
}
|
|
56
|
+
/**
|
|
57
|
+
* Get secret
|
|
58
|
+
* @param secretId secret id/name
|
|
59
|
+
* @returns {Promise<unknown>} a promise that resolves to a secret
|
|
60
|
+
*/
|
|
61
|
+
|
|
50
62
|
|
|
51
63
|
function _getSecrets() {
|
|
52
64
|
_getSecrets = _asyncToGenerator(function* () {
|
|
53
65
|
var urlString = _util.default.format(secretsListURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()));
|
|
54
66
|
|
|
55
|
-
|
|
67
|
+
var {
|
|
68
|
+
data
|
|
69
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).get(urlString, {
|
|
56
70
|
withCredentials: true
|
|
57
71
|
});
|
|
72
|
+
return data;
|
|
58
73
|
});
|
|
59
74
|
return _getSecrets.apply(this, arguments);
|
|
60
75
|
}
|
|
@@ -62,14 +77,27 @@ function _getSecrets() {
|
|
|
62
77
|
function getSecret(_x) {
|
|
63
78
|
return _getSecret.apply(this, arguments);
|
|
64
79
|
}
|
|
80
|
+
/**
|
|
81
|
+
* Create secret
|
|
82
|
+
* @param {string} secretId secret id/name
|
|
83
|
+
* @param {string} value secret value
|
|
84
|
+
* @param {string} description secret description
|
|
85
|
+
* @param {string} encoding secret encoding (only `generic` is supported)
|
|
86
|
+
* @param {boolean} useInPlaceholders flag indicating if the secret can be used in placeholders
|
|
87
|
+
* @returns {Promise<unknown>} a promise that resolves to a secret
|
|
88
|
+
*/
|
|
89
|
+
|
|
65
90
|
|
|
66
91
|
function _getSecret() {
|
|
67
|
-
_getSecret = _asyncToGenerator(function* (
|
|
68
|
-
var urlString = _util.default.format(secretURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()),
|
|
92
|
+
_getSecret = _asyncToGenerator(function* (secretId) {
|
|
93
|
+
var urlString = _util.default.format(secretURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()), secretId);
|
|
69
94
|
|
|
70
|
-
|
|
95
|
+
var {
|
|
96
|
+
data
|
|
97
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).get(urlString, {
|
|
71
98
|
withCredentials: true
|
|
72
99
|
});
|
|
100
|
+
return data;
|
|
73
101
|
});
|
|
74
102
|
return _getSecret.apply(this, arguments);
|
|
75
103
|
}
|
|
@@ -77,24 +105,34 @@ function _getSecret() {
|
|
|
77
105
|
function putSecret(_x2, _x3, _x4) {
|
|
78
106
|
return _putSecret.apply(this, arguments);
|
|
79
107
|
}
|
|
108
|
+
/**
|
|
109
|
+
* Set secret description
|
|
110
|
+
* @param {string} secretId secret id/name
|
|
111
|
+
* @param {string} description secret description
|
|
112
|
+
* @returns {Promise<unknown>} a promise that resolves to a status object
|
|
113
|
+
*/
|
|
114
|
+
|
|
80
115
|
|
|
81
116
|
function _putSecret() {
|
|
82
|
-
_putSecret = _asyncToGenerator(function* (
|
|
117
|
+
_putSecret = _asyncToGenerator(function* (secretId, value, description) {
|
|
83
118
|
var encoding = arguments.length > 3 && arguments[3] !== undefined ? arguments[3] : 'generic';
|
|
84
119
|
var useInPlaceholders = arguments.length > 4 && arguments[4] !== undefined ? arguments[4] : true;
|
|
85
120
|
if (encoding !== 'generic') throw new Error("Unsupported encoding: ".concat(encoding));
|
|
86
|
-
var
|
|
121
|
+
var secretData = {
|
|
87
122
|
valueBase64: (0, _Base.encode)(value),
|
|
88
123
|
description,
|
|
89
124
|
encoding,
|
|
90
125
|
useInPlaceholders
|
|
91
126
|
};
|
|
92
127
|
|
|
93
|
-
var urlString = _util.default.format(secretURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()),
|
|
128
|
+
var urlString = _util.default.format(secretURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()), secretId);
|
|
94
129
|
|
|
95
|
-
|
|
130
|
+
var {
|
|
131
|
+
data
|
|
132
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).put(urlString, secretData, {
|
|
96
133
|
withCredentials: true
|
|
97
134
|
});
|
|
135
|
+
return data;
|
|
98
136
|
});
|
|
99
137
|
return _putSecret.apply(this, arguments);
|
|
100
138
|
}
|
|
@@ -102,16 +140,25 @@ function _putSecret() {
|
|
|
102
140
|
function setSecretDescription(_x5, _x6) {
|
|
103
141
|
return _setSecretDescription.apply(this, arguments);
|
|
104
142
|
}
|
|
143
|
+
/**
|
|
144
|
+
* Delete secret
|
|
145
|
+
* @param {string} secretId secret id/name
|
|
146
|
+
* @returns {Promise<unknown>} a promise that resolves to a secret object
|
|
147
|
+
*/
|
|
148
|
+
|
|
105
149
|
|
|
106
150
|
function _setSecretDescription() {
|
|
107
|
-
_setSecretDescription = _asyncToGenerator(function* (
|
|
108
|
-
var urlString = _util.default.format(secretSetDescriptionURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()),
|
|
151
|
+
_setSecretDescription = _asyncToGenerator(function* (secretId, description) {
|
|
152
|
+
var urlString = _util.default.format(secretSetDescriptionURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()), secretId);
|
|
109
153
|
|
|
110
|
-
|
|
154
|
+
var {
|
|
155
|
+
data
|
|
156
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).post(urlString, {
|
|
111
157
|
description
|
|
112
158
|
}, {
|
|
113
159
|
withCredentials: true
|
|
114
160
|
});
|
|
161
|
+
return data;
|
|
115
162
|
});
|
|
116
163
|
return _setSecretDescription.apply(this, arguments);
|
|
117
164
|
}
|
|
@@ -119,14 +166,23 @@ function _setSecretDescription() {
|
|
|
119
166
|
function deleteSecret(_x7) {
|
|
120
167
|
return _deleteSecret.apply(this, arguments);
|
|
121
168
|
}
|
|
169
|
+
/**
|
|
170
|
+
* Get secret versions
|
|
171
|
+
* @param {string} secretId secret id/name
|
|
172
|
+
* @returns {Promise<unknown>} a promise that resolves to an array of secret versions
|
|
173
|
+
*/
|
|
174
|
+
|
|
122
175
|
|
|
123
176
|
function _deleteSecret() {
|
|
124
|
-
_deleteSecret = _asyncToGenerator(function* (
|
|
125
|
-
var urlString = _util.default.format(secretURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()),
|
|
177
|
+
_deleteSecret = _asyncToGenerator(function* (secretId) {
|
|
178
|
+
var urlString = _util.default.format(secretURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()), secretId);
|
|
126
179
|
|
|
127
|
-
|
|
180
|
+
var {
|
|
181
|
+
data
|
|
182
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).delete(urlString, {
|
|
128
183
|
withCredentials: true
|
|
129
184
|
});
|
|
185
|
+
return data;
|
|
130
186
|
});
|
|
131
187
|
return _deleteSecret.apply(this, arguments);
|
|
132
188
|
}
|
|
@@ -134,14 +190,24 @@ function _deleteSecret() {
|
|
|
134
190
|
function getSecretVersions(_x8) {
|
|
135
191
|
return _getSecretVersions.apply(this, arguments);
|
|
136
192
|
}
|
|
193
|
+
/**
|
|
194
|
+
* Create new secret version
|
|
195
|
+
* @param {string} secretId secret id/name
|
|
196
|
+
* @param {string} value secret value
|
|
197
|
+
* @returns {Promise<unknown>} a promise that resolves to a version object
|
|
198
|
+
*/
|
|
199
|
+
|
|
137
200
|
|
|
138
201
|
function _getSecretVersions() {
|
|
139
|
-
_getSecretVersions = _asyncToGenerator(function* (
|
|
140
|
-
var urlString = _util.default.format(secretListVersionsURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()),
|
|
202
|
+
_getSecretVersions = _asyncToGenerator(function* (secretId) {
|
|
203
|
+
var urlString = _util.default.format(secretListVersionsURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()), secretId);
|
|
141
204
|
|
|
142
|
-
|
|
205
|
+
var {
|
|
206
|
+
data
|
|
207
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).get(urlString, {
|
|
143
208
|
withCredentials: true
|
|
144
209
|
});
|
|
210
|
+
return data;
|
|
145
211
|
});
|
|
146
212
|
return _getSecretVersions.apply(this, arguments);
|
|
147
213
|
}
|
|
@@ -149,16 +215,26 @@ function _getSecretVersions() {
|
|
|
149
215
|
function createNewVersionOfSecret(_x9, _x10) {
|
|
150
216
|
return _createNewVersionOfSecret.apply(this, arguments);
|
|
151
217
|
}
|
|
218
|
+
/**
|
|
219
|
+
* Get version of secret
|
|
220
|
+
* @param {string} secretId secret id/name
|
|
221
|
+
* @param {string} version secret version
|
|
222
|
+
* @returns {Promise<unknown>} a promise that resolves to a version object
|
|
223
|
+
*/
|
|
224
|
+
|
|
152
225
|
|
|
153
226
|
function _createNewVersionOfSecret() {
|
|
154
|
-
_createNewVersionOfSecret = _asyncToGenerator(function* (
|
|
155
|
-
var urlString = _util.default.format(secretCreateNewVersionURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()),
|
|
227
|
+
_createNewVersionOfSecret = _asyncToGenerator(function* (secretId, value) {
|
|
228
|
+
var urlString = _util.default.format(secretCreateNewVersionURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()), secretId);
|
|
156
229
|
|
|
157
|
-
|
|
230
|
+
var {
|
|
231
|
+
data
|
|
232
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).post(urlString, {
|
|
158
233
|
valueBase64: (0, _Base.encode)(value)
|
|
159
234
|
}, {
|
|
160
235
|
withCredentials: true
|
|
161
236
|
});
|
|
237
|
+
return data;
|
|
162
238
|
});
|
|
163
239
|
return _createNewVersionOfSecret.apply(this, arguments);
|
|
164
240
|
}
|
|
@@ -168,29 +244,58 @@ function getVersionOfSecret(_x11, _x12) {
|
|
|
168
244
|
}
|
|
169
245
|
|
|
170
246
|
function _getVersionOfSecret() {
|
|
171
|
-
_getVersionOfSecret = _asyncToGenerator(function* (
|
|
172
|
-
var urlString = _util.default.format(secretGetVersionURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()),
|
|
247
|
+
_getVersionOfSecret = _asyncToGenerator(function* (secretId, version) {
|
|
248
|
+
var urlString = _util.default.format(secretGetVersionURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()), secretId, version);
|
|
173
249
|
|
|
174
|
-
|
|
250
|
+
var {
|
|
251
|
+
data
|
|
252
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).get(urlString, {
|
|
175
253
|
withCredentials: true
|
|
176
254
|
});
|
|
255
|
+
return data;
|
|
177
256
|
});
|
|
178
257
|
return _getVersionOfSecret.apply(this, arguments);
|
|
179
258
|
}
|
|
180
259
|
|
|
260
|
+
var VersionOfSecretStatus;
|
|
261
|
+
/**
|
|
262
|
+
* Update the status of a version of a secret
|
|
263
|
+
* @param {string} secretId secret id/name
|
|
264
|
+
* @param {string} version secret version
|
|
265
|
+
* @param {VersionOfSecretStatus} status status
|
|
266
|
+
* @returns {Promise<unknown>} a promise that resolves to a status object
|
|
267
|
+
*/
|
|
268
|
+
|
|
269
|
+
exports.VersionOfSecretStatus = VersionOfSecretStatus;
|
|
270
|
+
|
|
271
|
+
(function (VersionOfSecretStatus) {
|
|
272
|
+
VersionOfSecretStatus["DISABLED"] = "DISABLED";
|
|
273
|
+
VersionOfSecretStatus["ENABLED"] = "ENABLED";
|
|
274
|
+
})(VersionOfSecretStatus || (exports.VersionOfSecretStatus = VersionOfSecretStatus = {}));
|
|
275
|
+
|
|
181
276
|
function setStatusOfVersionOfSecret(_x13, _x14, _x15) {
|
|
182
277
|
return _setStatusOfVersionOfSecret.apply(this, arguments);
|
|
183
278
|
}
|
|
279
|
+
/**
|
|
280
|
+
* Delete version of secret
|
|
281
|
+
* @param {string} secretId secret id/name
|
|
282
|
+
* @param {string} version secret version
|
|
283
|
+
* @returns {Promise<unknown>} a promise that resolves to a version object
|
|
284
|
+
*/
|
|
285
|
+
|
|
184
286
|
|
|
185
287
|
function _setStatusOfVersionOfSecret() {
|
|
186
|
-
_setStatusOfVersionOfSecret = _asyncToGenerator(function* (
|
|
187
|
-
var urlString = _util.default.format(secretVersionStatusURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()),
|
|
288
|
+
_setStatusOfVersionOfSecret = _asyncToGenerator(function* (secretId, version, status) {
|
|
289
|
+
var urlString = _util.default.format(secretVersionStatusURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()), secretId, version);
|
|
188
290
|
|
|
189
|
-
|
|
291
|
+
var {
|
|
292
|
+
data
|
|
293
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).post(urlString, {
|
|
190
294
|
status
|
|
191
295
|
}, {
|
|
192
296
|
withCredentials: true
|
|
193
297
|
});
|
|
298
|
+
return data;
|
|
194
299
|
});
|
|
195
300
|
return _setStatusOfVersionOfSecret.apply(this, arguments);
|
|
196
301
|
}
|
|
@@ -200,12 +305,15 @@ function deleteVersionOfSecret(_x16, _x17) {
|
|
|
200
305
|
}
|
|
201
306
|
|
|
202
307
|
function _deleteVersionOfSecret() {
|
|
203
|
-
_deleteVersionOfSecret = _asyncToGenerator(function* (
|
|
204
|
-
var urlString = _util.default.format(secretGetVersionURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()),
|
|
308
|
+
_deleteVersionOfSecret = _asyncToGenerator(function* (secretId, version) {
|
|
309
|
+
var urlString = _util.default.format(secretGetVersionURLTemplate, (0, _ApiUtils.getTenantURL)(_SessionStorage.default.session.getTenant()), secretId, version);
|
|
205
310
|
|
|
206
|
-
|
|
311
|
+
var {
|
|
312
|
+
data
|
|
313
|
+
} = yield (0, _BaseApi.generateESVApi)(getApiConfig()).delete(urlString, {
|
|
207
314
|
withCredentials: true
|
|
208
315
|
});
|
|
316
|
+
return data;
|
|
209
317
|
});
|
|
210
318
|
return _deleteVersionOfSecret.apply(this, arguments);
|
|
211
319
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SecretsApi.js","names":["secretsListURLTemplate","secretListVersionsURLTemplate","secretCreateNewVersionURLTemplate","secretGetVersionURLTemplate","secretVersionStatusURLTemplate","secretURLTemplate","secretSetDescriptionURLTemplate","apiVersion","getApiConfig","path","getSecrets","urlString","util","format","getTenantURL","storage","session","getTenant","generateESVApi","get","withCredentials","getSecret","id","putSecret","value","description","encoding","useInPlaceholders","Error","data","valueBase64","encode","put","setSecretDescription","post","deleteSecret","delete","getSecretVersions","createNewVersionOfSecret","getVersionOfSecret","version","setStatusOfVersionOfSecret","status","deleteVersionOfSecret"],"sources":["api/SecretsApi.ts"],"sourcesContent":["import util from 'util';\nimport { encode } from './utils/Base64';\nimport { getTenantURL } from './utils/ApiUtils';\nimport { generateESVApi } from './BaseApi';\nimport storage from '../storage/SessionStorage';\n\nconst secretsListURLTemplate = '%s/environment/secrets';\nconst secretListVersionsURLTemplate = '%s/environment/secrets/%s/versions';\nconst secretCreateNewVersionURLTemplate = `${secretListVersionsURLTemplate}?_action=create`;\nconst secretGetVersionURLTemplate = `${secretListVersionsURLTemplate}/%s`;\nconst secretVersionStatusURLTemplate = `${secretGetVersionURLTemplate}?_action=changestatus`;\nconst secretURLTemplate = '%s/environment/secrets/%s';\nconst secretSetDescriptionURLTemplate = `${secretURLTemplate}?_action=setDescription`;\n\nconst apiVersion = 'protocol=1.0,resource=1.0';\nconst getApiConfig = () => ({\n path: `/environment/secrets`,\n apiVersion,\n});\n\nexport async function getSecrets() {\n const urlString = util.format(\n secretsListURLTemplate,\n getTenantURL(storage.session.getTenant())\n );\n return generateESVApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n}\n\nexport async function getSecret(id) {\n const urlString = util.format(\n secretURLTemplate,\n getTenantURL(storage.session.getTenant()),\n id\n );\n return generateESVApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n}\n\nexport async function putSecret(\n id,\n value,\n description,\n encoding = 'generic',\n useInPlaceholders = true\n) {\n if (encoding !== 'generic')\n throw new Error(`Unsupported encoding: ${encoding}`);\n const data = {\n valueBase64: encode(value),\n description,\n encoding,\n useInPlaceholders,\n };\n const urlString = util.format(\n secretURLTemplate,\n getTenantURL(storage.session.getTenant()),\n id\n );\n return generateESVApi(getApiConfig()).put(urlString, data, {\n withCredentials: true,\n });\n}\n\nexport async function setSecretDescription(id, description) {\n const urlString = util.format(\n secretSetDescriptionURLTemplate,\n getTenantURL(storage.session.getTenant()),\n id\n );\n return generateESVApi(getApiConfig()).post(\n urlString,\n { description },\n { withCredentials: true }\n );\n}\n\nexport async function deleteSecret(id) {\n const urlString = util.format(\n secretURLTemplate,\n getTenantURL(storage.session.getTenant()),\n id\n );\n return generateESVApi(getApiConfig()).delete(urlString, {\n withCredentials: true,\n });\n}\n\nexport async function getSecretVersions(id) {\n const urlString = util.format(\n secretListVersionsURLTemplate,\n getTenantURL(storage.session.getTenant()),\n id\n );\n return generateESVApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n}\n\nexport async function createNewVersionOfSecret(id, value) {\n const urlString = util.format(\n secretCreateNewVersionURLTemplate,\n getTenantURL(storage.session.getTenant()),\n id\n );\n return generateESVApi(getApiConfig()).post(\n urlString,\n { valueBase64: encode(value) },\n { withCredentials: true }\n );\n}\n\nexport async function getVersionOfSecret(id, version) {\n const urlString = util.format(\n secretGetVersionURLTemplate,\n getTenantURL(storage.session.getTenant()),\n id,\n version\n );\n return generateESVApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n}\n\nexport async function setStatusOfVersionOfSecret(id, version, status) {\n const urlString = util.format(\n secretVersionStatusURLTemplate,\n getTenantURL(storage.session.getTenant()),\n id,\n version\n );\n return generateESVApi(getApiConfig()).post(\n urlString,\n { status },\n { withCredentials: true }\n );\n}\n\nexport async function deleteVersionOfSecret(id, version) {\n const urlString = util.format(\n secretGetVersionURLTemplate,\n getTenantURL(storage.session.getTenant()),\n id,\n version\n );\n return generateESVApi(getApiConfig()).delete(urlString, {\n withCredentials: true,\n });\n}\n"],"mappings":";;;;;;;;;;;;;;;;AAAA;;AACA;;AACA;;AACA;;AACA;;;;;;;;AAEA,IAAMA,sBAAsB,GAAG,wBAA/B;AACA,IAAMC,6BAA6B,GAAG,oCAAtC;AACA,IAAMC,iCAAiC,aAAMD,6BAAN,oBAAvC;AACA,IAAME,2BAA2B,aAAMF,6BAAN,QAAjC;AACA,IAAMG,8BAA8B,aAAMD,2BAAN,0BAApC;AACA,IAAME,iBAAiB,GAAG,2BAA1B;AACA,IAAMC,+BAA+B,aAAMD,iBAAN,4BAArC;AAEA,IAAME,UAAU,GAAG,2BAAnB;;AACA,IAAMC,YAAY,GAAG,OAAO;EAC1BC,IAAI,wBADsB;EAE1BF;AAF0B,CAAP,CAArB;;SAKsBG,U;;;;;kCAAf,aAA4B;IACjC,IAAMC,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBb,sBADgB,EAEhB,IAAAc,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,CAAlB;;IAIA,OAAO,IAAAC,uBAAA,EAAeV,YAAY,EAA3B,EAA+BW,GAA/B,CAAmCR,SAAnC,EAA8C;MACnDS,eAAe,EAAE;IADkC,CAA9C,CAAP;EAGD,C;;;;SAEqBC,S;;;;;iCAAf,WAAyBC,EAAzB,EAA6B;IAClC,IAAMX,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBR,iBADgB,EAEhB,IAAAS,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBK,EAHgB,CAAlB;;IAKA,OAAO,IAAAJ,uBAAA,EAAeV,YAAY,EAA3B,EAA+BW,GAA/B,CAAmCR,SAAnC,EAA8C;MACnDS,eAAe,EAAE;IADkC,CAA9C,CAAP;EAGD,C;;;;SAEqBG,S;;;;;iCAAf,WACLD,EADK,EAELE,KAFK,EAGLC,WAHK,EAML;IAAA,IAFAC,QAEA,uEAFW,SAEX;IAAA,IADAC,iBACA,uEADoB,IACpB;IACA,IAAID,QAAQ,KAAK,SAAjB,EACE,MAAM,IAAIE,KAAJ,iCAAmCF,QAAnC,EAAN;IACF,IAAMG,IAAI,GAAG;MACXC,WAAW,EAAE,IAAAC,YAAA,EAAOP,KAAP,CADF;MAEXC,WAFW;MAGXC,QAHW;MAIXC;IAJW,CAAb;;IAMA,IAAMhB,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBR,iBADgB,EAEhB,IAAAS,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBK,EAHgB,CAAlB;;IAKA,OAAO,IAAAJ,uBAAA,EAAeV,YAAY,EAA3B,EAA+BwB,GAA/B,CAAmCrB,SAAnC,EAA8CkB,IAA9C,EAAoD;MACzDT,eAAe,EAAE;IADwC,CAApD,CAAP;EAGD,C;;;;SAEqBa,oB;;;;;4CAAf,WAAoCX,EAApC,EAAwCG,WAAxC,EAAqD;IAC1D,IAAMd,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBP,+BADgB,EAEhB,IAAAQ,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBK,EAHgB,CAAlB;;IAKA,OAAO,IAAAJ,uBAAA,EAAeV,YAAY,EAA3B,EAA+B0B,IAA/B,CACLvB,SADK,EAEL;MAAEc;IAAF,CAFK,EAGL;MAAEL,eAAe,EAAE;IAAnB,CAHK,CAAP;EAKD,C;;;;SAEqBe,Y;;;;;oCAAf,WAA4Bb,EAA5B,EAAgC;IACrC,IAAMX,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBR,iBADgB,EAEhB,IAAAS,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBK,EAHgB,CAAlB;;IAKA,OAAO,IAAAJ,uBAAA,EAAeV,YAAY,EAA3B,EAA+B4B,MAA/B,CAAsCzB,SAAtC,EAAiD;MACtDS,eAAe,EAAE;IADqC,CAAjD,CAAP;EAGD,C;;;;SAEqBiB,iB;;;;;yCAAf,WAAiCf,EAAjC,EAAqC;IAC1C,IAAMX,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBZ,6BADgB,EAEhB,IAAAa,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBK,EAHgB,CAAlB;;IAKA,OAAO,IAAAJ,uBAAA,EAAeV,YAAY,EAA3B,EAA+BW,GAA/B,CAAmCR,SAAnC,EAA8C;MACnDS,eAAe,EAAE;IADkC,CAA9C,CAAP;EAGD,C;;;;SAEqBkB,wB;;;;;gDAAf,WAAwChB,EAAxC,EAA4CE,KAA5C,EAAmD;IACxD,IAAMb,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBX,iCADgB,EAEhB,IAAAY,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBK,EAHgB,CAAlB;;IAKA,OAAO,IAAAJ,uBAAA,EAAeV,YAAY,EAA3B,EAA+B0B,IAA/B,CACLvB,SADK,EAEL;MAAEmB,WAAW,EAAE,IAAAC,YAAA,EAAOP,KAAP;IAAf,CAFK,EAGL;MAAEJ,eAAe,EAAE;IAAnB,CAHK,CAAP;EAKD,C;;;;SAEqBmB,kB;;;;;0CAAf,WAAkCjB,EAAlC,EAAsCkB,OAAtC,EAA+C;IACpD,IAAM7B,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,2BADgB,EAEhB,IAAAW,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBK,EAHgB,EAIhBkB,OAJgB,CAAlB;;IAMA,OAAO,IAAAtB,uBAAA,EAAeV,YAAY,EAA3B,EAA+BW,GAA/B,CAAmCR,SAAnC,EAA8C;MACnDS,eAAe,EAAE;IADkC,CAA9C,CAAP;EAGD,C;;;;SAEqBqB,0B;;;;;kDAAf,WAA0CnB,EAA1C,EAA8CkB,OAA9C,EAAuDE,MAAvD,EAA+D;IACpE,IAAM/B,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBT,8BADgB,EAEhB,IAAAU,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBK,EAHgB,EAIhBkB,OAJgB,CAAlB;;IAMA,OAAO,IAAAtB,uBAAA,EAAeV,YAAY,EAA3B,EAA+B0B,IAA/B,CACLvB,SADK,EAEL;MAAE+B;IAAF,CAFK,EAGL;MAAEtB,eAAe,EAAE;IAAnB,CAHK,CAAP;EAKD,C;;;;SAEqBuB,qB;;;;;6CAAf,WAAqCrB,EAArC,EAAyCkB,OAAzC,EAAkD;IACvD,IAAM7B,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,2BADgB,EAEhB,IAAAW,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBK,EAHgB,EAIhBkB,OAJgB,CAAlB;;IAMA,OAAO,IAAAtB,uBAAA,EAAeV,YAAY,EAA3B,EAA+B4B,MAA/B,CAAsCzB,SAAtC,EAAiD;MACtDS,eAAe,EAAE;IADqC,CAAjD,CAAP;EAGD,C"}
|
|
1
|
+
{"version":3,"file":"SecretsApi.js","names":["secretsListURLTemplate","secretListVersionsURLTemplate","secretCreateNewVersionURLTemplate","secretGetVersionURLTemplate","secretVersionStatusURLTemplate","secretURLTemplate","secretSetDescriptionURLTemplate","apiVersion","getApiConfig","path","getSecrets","urlString","util","format","getTenantURL","storage","session","getTenant","data","generateESVApi","get","withCredentials","getSecret","secretId","putSecret","value","description","encoding","useInPlaceholders","Error","secretData","valueBase64","encode","put","setSecretDescription","post","deleteSecret","delete","getSecretVersions","createNewVersionOfSecret","getVersionOfSecret","version","VersionOfSecretStatus","setStatusOfVersionOfSecret","status","deleteVersionOfSecret"],"sources":["api/SecretsApi.ts"],"sourcesContent":["import util from 'util';\nimport { encode } from './utils/Base64';\nimport { getTenantURL } from './utils/ApiUtils';\nimport { generateESVApi } from './BaseApi';\nimport storage from '../storage/SessionStorage';\n\nconst secretsListURLTemplate = '%s/environment/secrets';\nconst secretListVersionsURLTemplate = '%s/environment/secrets/%s/versions';\nconst secretCreateNewVersionURLTemplate = `${secretListVersionsURLTemplate}?_action=create`;\nconst secretGetVersionURLTemplate = `${secretListVersionsURLTemplate}/%s`;\nconst secretVersionStatusURLTemplate = `${secretGetVersionURLTemplate}?_action=changestatus`;\nconst secretURLTemplate = '%s/environment/secrets/%s';\nconst secretSetDescriptionURLTemplate = `${secretURLTemplate}?_action=setDescription`;\n\nconst apiVersion = 'protocol=1.0,resource=1.0';\nconst getApiConfig = () => ({\n path: `/environment/secrets`,\n apiVersion,\n});\n\n/**\n * Get all secrets\n * @returns {Promise<unknown[]>} a promise that resolves to an array of secrets\n */\nexport async function getSecrets() {\n const urlString = util.format(\n secretsListURLTemplate,\n getTenantURL(storage.session.getTenant())\n );\n const { data } = await generateESVApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Get secret\n * @param secretId secret id/name\n * @returns {Promise<unknown>} a promise that resolves to a secret\n */\nexport async function getSecret(secretId) {\n const urlString = util.format(\n secretURLTemplate,\n getTenantURL(storage.session.getTenant()),\n secretId\n );\n const { data } = await generateESVApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Create secret\n * @param {string} secretId secret id/name\n * @param {string} value secret value\n * @param {string} description secret description\n * @param {string} encoding secret encoding (only `generic` is supported)\n * @param {boolean} useInPlaceholders flag indicating if the secret can be used in placeholders\n * @returns {Promise<unknown>} a promise that resolves to a secret\n */\nexport async function putSecret(\n secretId,\n value,\n description,\n encoding = 'generic',\n useInPlaceholders = true\n) {\n if (encoding !== 'generic')\n throw new Error(`Unsupported encoding: ${encoding}`);\n const secretData = {\n valueBase64: encode(value),\n description,\n encoding,\n useInPlaceholders,\n };\n const urlString = util.format(\n secretURLTemplate,\n getTenantURL(storage.session.getTenant()),\n secretId\n );\n const { data } = await generateESVApi(getApiConfig()).put(\n urlString,\n secretData,\n {\n withCredentials: true,\n }\n );\n return data;\n}\n\n/**\n * Set secret description\n * @param {string} secretId secret id/name\n * @param {string} description secret description\n * @returns {Promise<unknown>} a promise that resolves to a status object\n */\nexport async function setSecretDescription(secretId, description) {\n const urlString = util.format(\n secretSetDescriptionURLTemplate,\n getTenantURL(storage.session.getTenant()),\n secretId\n );\n const { data } = await generateESVApi(getApiConfig()).post(\n urlString,\n { description },\n { withCredentials: true }\n );\n return data;\n}\n\n/**\n * Delete secret\n * @param {string} secretId secret id/name\n * @returns {Promise<unknown>} a promise that resolves to a secret object\n */\nexport async function deleteSecret(secretId) {\n const urlString = util.format(\n secretURLTemplate,\n getTenantURL(storage.session.getTenant()),\n secretId\n );\n const { data } = await generateESVApi(getApiConfig()).delete(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Get secret versions\n * @param {string} secretId secret id/name\n * @returns {Promise<unknown>} a promise that resolves to an array of secret versions\n */\nexport async function getSecretVersions(secretId) {\n const urlString = util.format(\n secretListVersionsURLTemplate,\n getTenantURL(storage.session.getTenant()),\n secretId\n );\n const { data } = await generateESVApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Create new secret version\n * @param {string} secretId secret id/name\n * @param {string} value secret value\n * @returns {Promise<unknown>} a promise that resolves to a version object\n */\nexport async function createNewVersionOfSecret(secretId, value) {\n const urlString = util.format(\n secretCreateNewVersionURLTemplate,\n getTenantURL(storage.session.getTenant()),\n secretId\n );\n const { data } = await generateESVApi(getApiConfig()).post(\n urlString,\n { valueBase64: encode(value) },\n { withCredentials: true }\n );\n return data;\n}\n\n/**\n * Get version of secret\n * @param {string} secretId secret id/name\n * @param {string} version secret version\n * @returns {Promise<unknown>} a promise that resolves to a version object\n */\nexport async function getVersionOfSecret(secretId, version) {\n const urlString = util.format(\n secretGetVersionURLTemplate,\n getTenantURL(storage.session.getTenant()),\n secretId,\n version\n );\n const { data } = await generateESVApi(getApiConfig()).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\nexport enum VersionOfSecretStatus {\n DISABLED = 'DISABLED',\n ENABLED = 'ENABLED',\n}\n\n/**\n * Update the status of a version of a secret\n * @param {string} secretId secret id/name\n * @param {string} version secret version\n * @param {VersionOfSecretStatus} status status\n * @returns {Promise<unknown>} a promise that resolves to a status object\n */\nexport async function setStatusOfVersionOfSecret(\n secretId: string,\n version: string,\n status: VersionOfSecretStatus\n) {\n const urlString = util.format(\n secretVersionStatusURLTemplate,\n getTenantURL(storage.session.getTenant()),\n secretId,\n version\n );\n const { data } = await generateESVApi(getApiConfig()).post(\n urlString,\n { status },\n { withCredentials: true }\n );\n return data;\n}\n\n/**\n * Delete version of secret\n * @param {string} secretId secret id/name\n * @param {string} version secret version\n * @returns {Promise<unknown>} a promise that resolves to a version object\n */\nexport async function deleteVersionOfSecret(secretId, version) {\n const urlString = util.format(\n secretGetVersionURLTemplate,\n getTenantURL(storage.session.getTenant()),\n secretId,\n version\n );\n const { data } = await generateESVApi(getApiConfig()).delete(urlString, {\n withCredentials: true,\n });\n return data;\n}\n"],"mappings":";;;;;;;;;;;;;;;;;AAAA;;AACA;;AACA;;AACA;;AACA;;;;;;;;AAEA,IAAMA,sBAAsB,GAAG,wBAA/B;AACA,IAAMC,6BAA6B,GAAG,oCAAtC;AACA,IAAMC,iCAAiC,aAAMD,6BAAN,oBAAvC;AACA,IAAME,2BAA2B,aAAMF,6BAAN,QAAjC;AACA,IAAMG,8BAA8B,aAAMD,2BAAN,0BAApC;AACA,IAAME,iBAAiB,GAAG,2BAA1B;AACA,IAAMC,+BAA+B,aAAMD,iBAAN,4BAArC;AAEA,IAAME,UAAU,GAAG,2BAAnB;;AACA,IAAMC,YAAY,GAAG,OAAO;EAC1BC,IAAI,wBADsB;EAE1BF;AAF0B,CAAP,CAArB;AAKA;AACA;AACA;AACA;;;SACsBG,U;;;AAWtB;AACA;AACA;AACA;AACA;;;;kCAfO,aAA4B;IACjC,IAAMC,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBb,sBADgB,EAEhB,IAAAc,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,CAAlB;;IAIA,IAAM;MAAEC;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+BY,GAA/B,CAAmCT,SAAnC,EAA8C;MACnEU,eAAe,EAAE;IADkD,CAA9C,CAAvB;IAGA,OAAOH,IAAP;EACD,C;;;;SAOqBI,S;;;AAYtB;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;;;iCApBO,WAAyBC,QAAzB,EAAmC;IACxC,IAAMZ,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBR,iBADgB,EAEhB,IAAAS,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBM,QAHgB,CAAlB;;IAKA,IAAM;MAAEL;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+BY,GAA/B,CAAmCT,SAAnC,EAA8C;MACnEU,eAAe,EAAE;IADkD,CAA9C,CAAvB;IAGA,OAAOH,IAAP;EACD,C;;;;SAWqBM,S;;;AA8BtB;AACA;AACA;AACA;AACA;AACA;;;;iCAnCO,WACLD,QADK,EAELE,KAFK,EAGLC,WAHK,EAML;IAAA,IAFAC,QAEA,uEAFW,SAEX;IAAA,IADAC,iBACA,uEADoB,IACpB;IACA,IAAID,QAAQ,KAAK,SAAjB,EACE,MAAM,IAAIE,KAAJ,iCAAmCF,QAAnC,EAAN;IACF,IAAMG,UAAU,GAAG;MACjBC,WAAW,EAAE,IAAAC,YAAA,EAAOP,KAAP,CADI;MAEjBC,WAFiB;MAGjBC,QAHiB;MAIjBC;IAJiB,CAAnB;;IAMA,IAAMjB,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBR,iBADgB,EAEhB,IAAAS,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBM,QAHgB,CAAlB;;IAKA,IAAM;MAAEL;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+ByB,GAA/B,CACrBtB,SADqB,EAErBmB,UAFqB,EAGrB;MACET,eAAe,EAAE;IADnB,CAHqB,CAAvB;IAOA,OAAOH,IAAP;EACD,C;;;;SAQqBgB,oB;;;AActB;AACA;AACA;AACA;AACA;;;;4CAlBO,WAAoCX,QAApC,EAA8CG,WAA9C,EAA2D;IAChE,IAAMf,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBP,+BADgB,EAEhB,IAAAQ,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBM,QAHgB,CAAlB;;IAKA,IAAM;MAAEL;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+B2B,IAA/B,CACrBxB,SADqB,EAErB;MAAEe;IAAF,CAFqB,EAGrB;MAAEL,eAAe,EAAE;IAAnB,CAHqB,CAAvB;IAKA,OAAOH,IAAP;EACD,C;;;;SAOqBkB,Y;;;AAYtB;AACA;AACA;AACA;AACA;;;;oCAhBO,WAA4Bb,QAA5B,EAAsC;IAC3C,IAAMZ,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBR,iBADgB,EAEhB,IAAAS,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBM,QAHgB,CAAlB;;IAKA,IAAM;MAAEL;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+B6B,MAA/B,CAAsC1B,SAAtC,EAAiD;MACtEU,eAAe,EAAE;IADqD,CAAjD,CAAvB;IAGA,OAAOH,IAAP;EACD,C;;;;SAOqBoB,iB;;;AAYtB;AACA;AACA;AACA;AACA;AACA;;;;yCAjBO,WAAiCf,QAAjC,EAA2C;IAChD,IAAMZ,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBZ,6BADgB,EAEhB,IAAAa,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBM,QAHgB,CAAlB;;IAKA,IAAM;MAAEL;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+BY,GAA/B,CAAmCT,SAAnC,EAA8C;MACnEU,eAAe,EAAE;IADkD,CAA9C,CAAvB;IAGA,OAAOH,IAAP;EACD,C;;;;SAQqBqB,wB;;;AActB;AACA;AACA;AACA;AACA;AACA;;;;gDAnBO,WAAwChB,QAAxC,EAAkDE,KAAlD,EAAyD;IAC9D,IAAMd,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBX,iCADgB,EAEhB,IAAAY,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBM,QAHgB,CAAlB;;IAKA,IAAM;MAAEL;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+B2B,IAA/B,CACrBxB,SADqB,EAErB;MAAEoB,WAAW,EAAE,IAAAC,YAAA,EAAOP,KAAP;IAAf,CAFqB,EAGrB;MAAEJ,eAAe,EAAE;IAAnB,CAHqB,CAAvB;IAKA,OAAOH,IAAP;EACD,C;;;;SAQqBsB,kB;;;;;0CAAf,WAAkCjB,QAAlC,EAA4CkB,OAA5C,EAAqD;IAC1D,IAAM9B,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,2BADgB,EAEhB,IAAAW,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBM,QAHgB,EAIhBkB,OAJgB,CAAlB;;IAMA,IAAM;MAAEvB;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+BY,GAA/B,CAAmCT,SAAnC,EAA8C;MACnEU,eAAe,EAAE;IADkD,CAA9C,CAAvB;IAGA,OAAOH,IAAP;EACD,C;;;;IAEWwB,qB;AAKZ;AACA;AACA;AACA;AACA;AACA;AACA;;;;WAXYA,qB;EAAAA,qB;EAAAA,qB;GAAAA,qB,qCAAAA,qB;;SAYUC,0B;;;AAmBtB;AACA;AACA;AACA;AACA;AACA;;;;kDAxBO,WACLpB,QADK,EAELkB,OAFK,EAGLG,MAHK,EAIL;IACA,IAAMjC,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBT,8BADgB,EAEhB,IAAAU,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBM,QAHgB,EAIhBkB,OAJgB,CAAlB;;IAMA,IAAM;MAAEvB;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+B2B,IAA/B,CACrBxB,SADqB,EAErB;MAAEiC;IAAF,CAFqB,EAGrB;MAAEvB,eAAe,EAAE;IAAnB,CAHqB,CAAvB;IAKA,OAAOH,IAAP;EACD,C;;;;SAQqB2B,qB;;;;;6CAAf,WAAqCtB,QAArC,EAA+CkB,OAA/C,EAAwD;IAC7D,IAAM9B,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,2BADgB,EAEhB,IAAAW,sBAAA,EAAaC,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAAb,CAFgB,EAGhBM,QAHgB,EAIhBkB,OAJgB,CAAlB;;IAMA,IAAM;MAAEvB;IAAF,UAAiB,IAAAC,uBAAA,EAAeX,YAAY,EAA3B,EAA+B6B,MAA/B,CAAsC1B,SAAtC,EAAiD;MACtEU,eAAe,EAAE;IADqD,CAAjD,CAAvB;IAGA,OAAOH,IAAP;EACD,C"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SecretsApi.test.js","names":["__dirname","path","dirname","fileURLToPath","mock","MockAdapter","axios","state","default","session","setTenant","setRealm","setCookieName","setCookieValue","describe","test","mockResponse","JSON","parse","fs","readFileSync","resolve","onGet","reply","response","SecretsRaw","getSecrets","expect","toBeTruthy","toMatchObject","assertions","error","status","toBe","data","code","message","getSecret","onPut","putSecret","onPost","setSecretDescription","onDelete","deleteSecret","getSecretVersions","createNewVersionOfSecret","getVersionOfSecret","setStatusOfVersionOfSecret","VersionOfSecretStatus","DISABLED","deleteVersionOfSecret"],"sources":["api/SecretsApi.test.ts"],"sourcesContent":["import axios from 'axios';\nimport MockAdapter from 'axios-mock-adapter';\nimport { SecretsRaw, state } from '../index';\nimport fs from 'fs';\nimport path from 'path';\nimport { fileURLToPath } from 'url';\n\nconst __dirname = path.dirname(fileURLToPath(import.meta.url));\n\nconst mock = new MockAdapter(axios);\n\nstate.default.session.setTenant('https://openam-frodo-dev.forgeblocks.com/am');\nstate.default.session.setRealm('alpha');\nstate.default.session.setCookieName('cookieName');\nstate.default.session.setCookieValue('cookieValue');\n\ndescribe('SecretsApi - getSecrets()', () => {\n test('getSecrets() 1: Get all secrets - success', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/getSecrets/secrets.json'\n ),\n 'utf8'\n )\n );\n mock\n .onGet('https://openam-frodo-dev.forgeblocks.com/environment/secrets')\n .reply(200, mockResponse);\n const response = await SecretsRaw.getSecrets();\n expect(response).toBeTruthy();\n expect(response).toMatchObject(mockResponse);\n });\n\n test('getSecrets() 2: Get all secrets - error', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/getSecrets/error.json'\n ),\n 'utf8'\n )\n );\n mock\n .onGet('https://openam-frodo-dev.forgeblocks.com/environment/secrets')\n .reply(500, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.getSecrets();\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(500);\n expect(error.response.data.code).toBe(500);\n expect(error.response.data.message).toBe('Server Error');\n }\n });\n});\n\ndescribe('SecretsApi - getSecret()', () => {\n test('getSecret() 1: Get existing secret: esv-volkerstestsecret1', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/getSecret/esv-volkerstestsecret1.json'\n ),\n 'utf8'\n )\n );\n mock\n .onGet(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1'\n )\n .reply(200, mockResponse);\n const response = await SecretsRaw.getSecret('esv-volkerstestsecret1');\n expect(response).toBeTruthy();\n expect(response).toMatchObject(mockResponse);\n });\n\n test('getSecret() 2: Get non-existing secret: esv-does-not-exist', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/getSecret/esv-does-not-exist.json'\n ),\n 'utf8'\n )\n );\n mock\n .onGet(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-does-not-exist'\n )\n .reply(404, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.getSecret('esv-does-not-exist');\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(404);\n expect(error.response.data.code).toBe(404);\n expect(error.response.data.message).toBe(\n 'The secret does not exist or does not have a version'\n );\n }\n });\n});\n\ndescribe('SecretsApi - putSecret()', () => {\n test('putSecret() 1: Create secret: esv-volkerstestsecret1 - success', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/putSecret/esv-volkerstestsecret1.json'\n ),\n 'utf8'\n )\n );\n mock\n .onPut(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1'\n )\n .reply(200, mockResponse);\n const response = await SecretsRaw.putSecret(\n 'esv-volkerstestsecret1',\n \"Volker's Test Secret Value\",\n \"Volker's Test Secret Description\",\n 'generic',\n true\n );\n expect(response).toBeTruthy();\n expect(response).toMatchObject(mockResponse);\n });\n\n test('putSecret() 2: Create secret: esv-volkerstestsecret1 - error', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/putSecret/error.json'\n ),\n 'utf8'\n )\n );\n mock\n .onPut(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1'\n )\n .reply(500, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.putSecret(\n 'esv-volkerstestsecret1',\n \"Volker's Test Secret Value\",\n \"Volker's Test Secret Description\",\n 'generic',\n true\n );\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(500);\n expect(error.response.data.code).toBe(500);\n expect(error.response.data.message).toBe('Server Error');\n }\n });\n});\n\ndescribe('SecretsApi - setSecretDescription()', () => {\n test('setSecretDescription() 1: Set secret description: esv-volkerstestsecret1 - success', async () => {\n const mockResponse = '';\n mock\n .onPost(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1?_action=setDescription'\n )\n .reply(200, mockResponse);\n const response = await SecretsRaw.setSecretDescription(\n 'esv-volkerstestsecret1',\n \"Volker's Updated Test Secret Description\"\n );\n expect(response).toBe('');\n });\n\n test('setSecretDescription() 2: Set secret description: esv-volkerstestsecret1 - error', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/setSecretDescription/error.json'\n ),\n 'utf8'\n )\n );\n mock\n .onPost(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1?_action=setDescription'\n )\n .reply(500, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.setSecretDescription(\n 'esv-volkerstestsecret1',\n \"Volker's Updated Test Secret Description\"\n );\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(500);\n expect(error.response.data.code).toBe(500);\n expect(error.response.data.message).toBe('Server Error');\n }\n });\n});\n\ndescribe('SecretsApi - deleteSecret()', () => {\n test('deleteSecret() 1: Delete secret: esv-volkerstestsecret1 - success', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/deleteSecret/esv-volkerstestsecret1.json'\n ),\n 'utf8'\n )\n );\n mock\n .onDelete(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1'\n )\n .reply(200, mockResponse);\n const response = await SecretsRaw.deleteSecret('esv-volkerstestsecret1');\n expect(response).toBeTruthy();\n expect(response).toMatchObject(mockResponse);\n });\n\n test('deleteSecret() 2: Delete secret: esv-volkerstestsecret1 - error', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/deleteSecret/error.json'\n ),\n 'utf8'\n )\n );\n mock\n .onDelete(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1'\n )\n .reply(500, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.deleteSecret('esv-volkerstestsecret1');\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(500);\n expect(error.response.data.code).toBe(500);\n expect(error.response.data.message).toBe('Server Error');\n }\n });\n});\n\ndescribe('SecretsApi - getSecretVersions()', () => {\n test('getSecretVersions() 1: Get versions of existing secret: esv-volkerstestsecret1', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/getSecretVersions/esv-volkerstestsecret1.json'\n ),\n 'utf8'\n )\n );\n mock\n .onGet(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1/versions'\n )\n .reply(200, mockResponse);\n const response = await SecretsRaw.getSecretVersions(\n 'esv-volkerstestsecret1'\n );\n expect(response).toBeTruthy();\n expect(response).toMatchObject(mockResponse);\n });\n\n test('getSecretVersions() 2: Get versions of non-existing secret: esv-does-not-exist', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/getSecretVersions/esv-does-not-exist.json'\n ),\n 'utf8'\n )\n );\n mock\n .onGet(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-does-not-exist/versions'\n )\n .reply(404, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.getSecretVersions('esv-does-not-exist');\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(404);\n expect(error.response.data.code).toBe(404);\n expect(error.response.data.message).toBe(\n 'The secret does not exist or does not have a version'\n );\n }\n });\n});\n\ndescribe('SecretsApi - createNewVersionOfSecret()', () => {\n test('createNewVersionOfSecret() 1: Create new version of existing secret: esv-volkerstestsecret1 - success', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/createNewVersionOfSecret/esv-volkerstestsecret1.json'\n ),\n 'utf8'\n )\n );\n mock\n .onPost(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1/versions?_action=create'\n )\n .reply(200, mockResponse);\n const response = await SecretsRaw.createNewVersionOfSecret(\n 'esv-volkerstestsecret1',\n \"Volker's Test Secret Value\"\n );\n expect(response).toBeTruthy();\n expect(response).toMatchObject(mockResponse);\n });\n\n test('createNewVersionOfSecret() 2: Create new version of existing secret: esv-volkerstestsecret1 - error', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/createNewVersionOfSecret/error.json'\n ),\n 'utf8'\n )\n );\n mock\n .onPost(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1/versions?_action=create'\n )\n .reply(500, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.createNewVersionOfSecret(\n 'esv-volkerstestsecret1',\n \"Volker's Test Secret Value\"\n );\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(500);\n expect(error.response.data.code).toBe(500);\n expect(error.response.data.message).toBe('Server Error');\n }\n });\n\n test('createNewVersionOfSecret() 3: Create new version of non-existing secret: esv-does-not-exist - error', async () => {\n const mockResponse = fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/createNewVersionOfSecret/esv-does-not-exist.txt'\n ),\n 'utf8'\n );\n mock\n .onPost(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1/versions?_action=create'\n )\n .reply(500, mockResponse);\n expect.assertions(3);\n try {\n await SecretsRaw.createNewVersionOfSecret(\n 'esv-volkerstestsecret1',\n \"Volker's Test Secret Value\"\n );\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(500);\n expect(error.response.data).toBe(mockResponse);\n }\n });\n});\n\ndescribe('SecretsApi - getVersionOfSecret()', () => {\n test('getVersionOfSecret() 1: Get version 2 of existing secret: esv-volkerstestsecret1', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/getVersionOfSecret/esv-volkerstestsecret1_v2.json'\n ),\n 'utf8'\n )\n );\n mock\n .onGet(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1/versions/2'\n )\n .reply(200, mockResponse);\n const response = await SecretsRaw.getVersionOfSecret(\n 'esv-volkerstestsecret1',\n '2'\n );\n expect(response).toBeTruthy();\n expect(response).toMatchObject(mockResponse);\n });\n\n test('getVersionOfSecret() 2: Get version 2 of non-existing secret: esv-does-not-exist', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/getVersionOfSecret/esv-does-not-exist_v2.json'\n ),\n 'utf8'\n )\n );\n mock\n .onGet(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-does-not-exist/versions/2'\n )\n .reply(500, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.getVersionOfSecret('esv-does-not-exist', '2');\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(500);\n expect(error.response.data.code).toBe(500);\n expect(error.response.data.message).toBe(\n 'Failed to update secret version'\n );\n }\n });\n});\n\ndescribe('SecretsApi - setStatusOfVersionOfSecret()', () => {\n test('setStatusOfVersionOfSecret() 1: Disable version 2 of existing secret: esv-volkerstestsecret1 - success', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/setStatusOfVersionOfSecret/esv-volkerstestsecret1_v2_DISABLED.json'\n ),\n 'utf8'\n )\n );\n mock\n .onPost(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1/versions/2?_action=changestatus'\n )\n .reply(200, mockResponse);\n const response = await SecretsRaw.setStatusOfVersionOfSecret(\n 'esv-volkerstestsecret1',\n '2',\n SecretsRaw.VersionOfSecretStatus.DISABLED\n );\n expect(response).toBeTruthy();\n expect(response).toMatchObject(mockResponse);\n });\n\n test('setStatusOfVersionOfSecret() 2: Disable version 2 of existing secret: esv-volkerstestsecret1 - error', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/setStatusOfVersionOfSecret/error.json'\n ),\n 'utf8'\n )\n );\n mock\n .onPost(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1/versions/2?_action=changestatus'\n )\n .reply(500, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.setStatusOfVersionOfSecret(\n 'esv-volkerstestsecret1',\n '2',\n SecretsRaw.VersionOfSecretStatus.DISABLED\n );\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(500);\n expect(error.response.data.code).toBe(500);\n expect(error.response.data.message).toBe('Server Error');\n }\n });\n\n test('setStatusOfVersionOfSecret() 3: Disable version 2 of non-existing secret: esv-does-not-exist - error', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/setStatusOfVersionOfSecret/esv-does-not-exist_v2_DISABLED.json'\n ),\n 'utf8'\n )\n );\n mock\n .onPost(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-does-not-exist/versions/2?_action=changestatus'\n )\n .reply(404, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.setStatusOfVersionOfSecret(\n 'esv-does-not-exist',\n '2',\n SecretsRaw.VersionOfSecretStatus.DISABLED\n );\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(404);\n expect(error.response.data.code).toBe(404);\n expect(error.response.data.message).toBe(\n 'The secret does not exist or does not have a version'\n );\n }\n });\n});\n\ndescribe('SecretsApi - deleteVersionOfSecret()', () => {\n test('deleteVersionOfSecret() 1: Delete version 2 of secret: esv-volkerstestsecret1 - success', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/deleteVersionOfSecret/esv-volkerstestsecret1_v2.json'\n ),\n 'utf8'\n )\n );\n mock\n .onDelete(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1/versions/2'\n )\n .reply(200, mockResponse);\n const response = await SecretsRaw.deleteVersionOfSecret(\n 'esv-volkerstestsecret1',\n '2'\n );\n expect(response).toBeTruthy();\n expect(response).toMatchObject(mockResponse);\n });\n\n test('deleteVersionOfSecret() 2: Delete version 2 of secret: esv-volkerstestsecret1 - error', async () => {\n const mockResponse = JSON.parse(\n fs.readFileSync(\n path.resolve(\n __dirname,\n '../../test/mocks/SecretsApi/deleteVersionOfSecret/error.json'\n ),\n 'utf8'\n )\n );\n mock\n .onDelete(\n 'https://openam-frodo-dev.forgeblocks.com/environment/secrets/esv-volkerstestsecret1/versions/2'\n )\n .reply(500, mockResponse);\n expect.assertions(4);\n try {\n await SecretsRaw.deleteVersionOfSecret('esv-volkerstestsecret1', '2');\n } catch (error) {\n // console.dir(error);\n expect(error).toBeTruthy();\n expect(error.response.status).toBe(500);\n expect(error.response.data.code).toBe(500);\n expect(error.response.data.message).toBe('Server Error');\n }\n });\n});\n"],"mappings":";;AAAA;;AACA;;AACA;;AACA;;AACA;;AACA;;;;;;;;AAEA,IAAMA,QAAS,GAAGC,aAAA,CAAKC,OAAL,CAAa,IAAAC,kBAAA,sDAAb,CAAlB;;AAEA,IAAMC,IAAI,GAAG,IAAIC,yBAAJ,CAAgBC,cAAhB,CAAb;;AAEAC,YAAA,CAAMC,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgC,6CAAhC;;AACAH,YAAA,CAAMC,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+B,OAA/B;;AACAJ,YAAA,CAAMC,OAAN,CAAcC,OAAd,CAAsBG,aAAtB,CAAoC,YAApC;;AACAL,YAAA,CAAMC,OAAN,CAAcC,OAAd,CAAsBI,cAAtB,CAAqC,aAArC;;AAEAC,QAAQ,CAAC,2BAAD,EAA8B,MAAM;EAC1CC,IAAI,CAAC,2CAAD,iCAA8C,aAAY;IAC5D,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,qDAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkB,KADH,CACS,8DADT,EAEGC,KAFH,CAES,GAFT,EAEcP,YAFd;IAGA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWC,UAAX,EAAvB;IACAC,MAAM,CAACH,QAAD,CAAN,CAAiBI,UAAjB;IACAD,MAAM,CAACH,QAAD,CAAN,CAAiBK,aAAjB,CAA+Bb,YAA/B;EACD,CAhBG,EAAJ;EAkBAD,IAAI,CAAC,yCAAD,iCAA4C,aAAY;IAC1D,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,mDAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkB,KADH,CACS,8DADT,EAEGC,KAFH,CAES,GAFT,EAEcP,YAFd;IAGAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWC,UAAX,EAAN;IACD,CAFD,CAEE,OAAOK,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CAAyC,cAAzC;IACD;EACF,CAvBG,EAAJ;AAwBD,CA3CO,CAAR;AA6CAnB,QAAQ,CAAC,0BAAD,EAA6B,MAAM;EACzCC,IAAI,CAAC,4DAAD,iCAA+D,aAAY;IAC7E,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,mEAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkB,KADH,CAEI,qFAFJ,EAIGC,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWY,SAAX,CAAqB,wBAArB,CAAvB;IACAV,MAAM,CAACH,QAAD,CAAN,CAAiBI,UAAjB;IACAD,MAAM,CAACH,QAAD,CAAN,CAAiBK,aAAjB,CAA+Bb,YAA/B;EACD,CAlBG,EAAJ;EAoBAD,IAAI,CAAC,4DAAD,iCAA+D,aAAY;IAC7E,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,+DAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkB,KADH,CAEI,iFAFJ,EAIGC,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWY,SAAX,CAAqB,oBAArB,CAAN;IACD,CAFD,CAEE,OAAON,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CACE,sDADF;IAGD;EACF,CA3BG,EAAJ;AA4BD,CAjDO,CAAR;AAmDAnB,QAAQ,CAAC,0BAAD,EAA6B,MAAM;EACzCC,IAAI,CAAC,gEAAD,iCAAmE,aAAY;IACjF,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,mEAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkC,KADH,CAEI,qFAFJ,EAIGf,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWc,SAAX,CACrB,wBADqB,EAErB,4BAFqB,EAGrB,kCAHqB,EAIrB,SAJqB,EAKrB,IALqB,CAAvB;IAOAZ,MAAM,CAACH,QAAD,CAAN,CAAiBI,UAAjB;IACAD,MAAM,CAACH,QAAD,CAAN,CAAiBK,aAAjB,CAA+Bb,YAA/B;EACD,CAxBG,EAAJ;EA0BAD,IAAI,CAAC,8DAAD,iCAAiE,aAAY;IAC/E,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,kDAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkC,KADH,CAEI,qFAFJ,EAIGf,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWc,SAAX,CACJ,wBADI,EAEJ,4BAFI,EAGJ,kCAHI,EAIJ,SAJI,EAKJ,IALI,CAAN;IAOD,CARD,CAQE,OAAOR,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CAAyC,cAAzC;IACD;EACF,CA/BG,EAAJ;AAgCD,CA3DO,CAAR;AA6DAnB,QAAQ,CAAC,qCAAD,EAAwC,MAAM;EACpDC,IAAI,CAAC,oFAAD,iCAAuF,aAAY;IACrG,IAAMC,YAAY,GAAG,EAArB;IACAZ,IAAI,CACDoC,MADH,CAEI,4GAFJ,EAIGjB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWgB,oBAAX,CACrB,wBADqB,EAErB,0CAFqB,CAAvB;IAIAd,MAAM,CAACH,QAAD,CAAN,CAAiBS,IAAjB,CAAsB,EAAtB;EACD,CAZG,EAAJ;EAcAlB,IAAI,CAAC,kFAAD,iCAAqF,aAAY;IACnG,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,6DAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDoC,MADH,CAEI,4GAFJ,EAIGjB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWgB,oBAAX,CACJ,wBADI,EAEJ,0CAFI,CAAN;IAID,CALD,CAKE,OAAOV,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CAAyC,cAAzC;IACD;EACF,CA5BG,EAAJ;AA6BD,CA5CO,CAAR;AA8CAnB,QAAQ,CAAC,6BAAD,EAAgC,MAAM;EAC5CC,IAAI,CAAC,mEAAD,iCAAsE,aAAY;IACpF,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,sEAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDsC,QADH,CAEI,qFAFJ,EAIGnB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWkB,YAAX,CAAwB,wBAAxB,CAAvB;IACAhB,MAAM,CAACH,QAAD,CAAN,CAAiBI,UAAjB;IACAD,MAAM,CAACH,QAAD,CAAN,CAAiBK,aAAjB,CAA+Bb,YAA/B;EACD,CAlBG,EAAJ;EAoBAD,IAAI,CAAC,iEAAD,iCAAoE,aAAY;IAClF,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,qDAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDsC,QADH,CAEI,qFAFJ,EAIGnB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWkB,YAAX,CAAwB,wBAAxB,CAAN;IACD,CAFD,CAEE,OAAOZ,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CAAyC,cAAzC;IACD;EACF,CAzBG,EAAJ;AA0BD,CA/CO,CAAR;AAiDAnB,QAAQ,CAAC,kCAAD,EAAqC,MAAM;EACjDC,IAAI,CAAC,gFAAD,iCAAmF,aAAY;IACjG,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,2EAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkB,KADH,CAEI,8FAFJ,EAIGC,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWmB,iBAAX,CACrB,wBADqB,CAAvB;IAGAjB,MAAM,CAACH,QAAD,CAAN,CAAiBI,UAAjB;IACAD,MAAM,CAACH,QAAD,CAAN,CAAiBK,aAAjB,CAA+Bb,YAA/B;EACD,CApBG,EAAJ;EAsBAD,IAAI,CAAC,gFAAD,iCAAmF,aAAY;IACjG,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,uEAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkB,KADH,CAEI,0FAFJ,EAIGC,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWmB,iBAAX,CAA6B,oBAA7B,CAAN;IACD,CAFD,CAEE,OAAOb,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CACE,sDADF;IAGD;EACF,CA3BG,EAAJ;AA4BD,CAnDO,CAAR;AAqDAnB,QAAQ,CAAC,yCAAD,EAA4C,MAAM;EACxDC,IAAI,CAAC,uGAAD,iCAA0G,aAAY;IACxH,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,kFAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDoC,MADH,CAEI,6GAFJ,EAIGjB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWoB,wBAAX,CACrB,wBADqB,EAErB,4BAFqB,CAAvB;IAIAlB,MAAM,CAACH,QAAD,CAAN,CAAiBI,UAAjB;IACAD,MAAM,CAACH,QAAD,CAAN,CAAiBK,aAAjB,CAA+Bb,YAA/B;EACD,CArBG,EAAJ;EAuBAD,IAAI,CAAC,qGAAD,iCAAwG,aAAY;IACtH,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,iEAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDoC,MADH,CAEI,6GAFJ,EAIGjB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWoB,wBAAX,CACJ,wBADI,EAEJ,4BAFI,CAAN;IAID,CALD,CAKE,OAAOd,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CAAyC,cAAzC;IACD;EACF,CA5BG,EAAJ;EA8BAlB,IAAI,CAAC,qGAAD,iCAAwG,aAAY;IACtH,IAAMC,YAAY,GAAGG,WAAA,CAAGC,YAAH,CACnBnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,6EAFF,CADmB,EAKnB,MALmB,CAArB;;IAOAI,IAAI,CACDoC,MADH,CAEI,6GAFJ,EAIGjB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWoB,wBAAX,CACJ,wBADI,EAEJ,4BAFI,CAAN;IAID,CALD,CAKE,OAAOd,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAhB,CAAN,CAA4BD,IAA5B,CAAiCjB,YAAjC;IACD;EACF,CAzBG,EAAJ;AA0BD,CAhFO,CAAR;AAkFAF,QAAQ,CAAC,mCAAD,EAAsC,MAAM;EAClDC,IAAI,CAAC,kFAAD,iCAAqF,aAAY;IACnG,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,+EAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkB,KADH,CAEI,gGAFJ,EAIGC,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWqB,kBAAX,CACrB,wBADqB,EAErB,GAFqB,CAAvB;IAIAnB,MAAM,CAACH,QAAD,CAAN,CAAiBI,UAAjB;IACAD,MAAM,CAACH,QAAD,CAAN,CAAiBK,aAAjB,CAA+Bb,YAA/B;EACD,CArBG,EAAJ;EAuBAD,IAAI,CAAC,kFAAD,iCAAqF,aAAY;IACnG,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,2EAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDkB,KADH,CAEI,4FAFJ,EAIGC,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWqB,kBAAX,CAA8B,oBAA9B,EAAoD,GAApD,CAAN;IACD,CAFD,CAEE,OAAOf,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CACE,iCADF;IAGD;EACF,CA3BG,EAAJ;AA4BD,CApDO,CAAR;AAsDAnB,QAAQ,CAAC,2CAAD,EAA8C,MAAM;EAC1DC,IAAI,CAAC,wGAAD,iCAA2G,aAAY;IACzH,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,gGAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDoC,MADH,CAEI,qHAFJ,EAIGjB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWsB,0BAAX,CACrB,wBADqB,EAErB,GAFqB,EAGrBtB,iBAAA,CAAWuB,qBAAX,CAAiCC,QAHZ,CAAvB;IAKAtB,MAAM,CAACH,QAAD,CAAN,CAAiBI,UAAjB;IACAD,MAAM,CAACH,QAAD,CAAN,CAAiBK,aAAjB,CAA+Bb,YAA/B;EACD,CAtBG,EAAJ;EAwBAD,IAAI,CAAC,sGAAD,iCAAyG,aAAY;IACvH,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,mEAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDoC,MADH,CAEI,qHAFJ,EAIGjB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWsB,0BAAX,CACJ,wBADI,EAEJ,GAFI,EAGJtB,iBAAA,CAAWuB,qBAAX,CAAiCC,QAH7B,CAAN;IAKD,CAND,CAME,OAAOlB,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CAAyC,cAAzC;IACD;EACF,CA7BG,EAAJ;EA+BAlB,IAAI,CAAC,sGAAD,iCAAyG,aAAY;IACvH,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,4FAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDoC,MADH,CAEI,iHAFJ,EAIGjB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWsB,0BAAX,CACJ,oBADI,EAEJ,GAFI,EAGJtB,iBAAA,CAAWuB,qBAAX,CAAiCC,QAH7B,CAAN;IAKD,CAND,CAME,OAAOlB,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CACE,sDADF;IAGD;EACF,CA/BG,EAAJ;AAgCD,CAxFO,CAAR;AA0FAnB,QAAQ,CAAC,sCAAD,EAAyC,MAAM;EACrDC,IAAI,CAAC,yFAAD,iCAA4F,aAAY;IAC1G,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,kFAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDsC,QADH,CAEI,gGAFJ,EAIGnB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKA,IAAMQ,QAAQ,SAASC,iBAAA,CAAWyB,qBAAX,CACrB,wBADqB,EAErB,GAFqB,CAAvB;IAIAvB,MAAM,CAACH,QAAD,CAAN,CAAiBI,UAAjB;IACAD,MAAM,CAACH,QAAD,CAAN,CAAiBK,aAAjB,CAA+Bb,YAA/B;EACD,CArBG,EAAJ;EAuBAD,IAAI,CAAC,uFAAD,iCAA0F,aAAY;IACxG,IAAMC,YAAY,GAAGC,IAAI,CAACC,KAAL,CACnBC,WAAA,CAAGC,YAAH,CACEnB,aAAA,CAAKoB,OAAL,CACErB,QADF,EAEE,8DAFF,CADF,EAKE,MALF,CADmB,CAArB;IASAI,IAAI,CACDsC,QADH,CAEI,gGAFJ,EAIGnB,KAJH,CAIS,GAJT,EAIcP,YAJd;IAKAW,MAAM,CAACG,UAAP,CAAkB,CAAlB;;IACA,IAAI;MACF,MAAML,iBAAA,CAAWyB,qBAAX,CAAiC,wBAAjC,EAA2D,GAA3D,CAAN;IACD,CAFD,CAEE,OAAOnB,KAAP,EAAc;MACd;MACAJ,MAAM,CAACI,KAAD,CAAN,CAAcH,UAAd;MACAD,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeQ,MAAhB,CAAN,CAA8BC,IAA9B,CAAmC,GAAnC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBC,IAArB,CAAN,CAAiCF,IAAjC,CAAsC,GAAtC;MACAN,MAAM,CAACI,KAAK,CAACP,QAAN,CAAeU,IAAf,CAAoBE,OAArB,CAAN,CAAoCH,IAApC,CAAyC,cAAzC;IACD;EACF,CAzBG,EAAJ;AA0BD,CAlDO,CAAR"}
|
package/cjs/api/TreeApi.js
CHANGED
|
@@ -35,7 +35,7 @@ var getTreeApiConfig = () => {
|
|
|
35
35
|
};
|
|
36
36
|
/**
|
|
37
37
|
* Get all trees
|
|
38
|
-
* @returns {Promise} a promise that resolves to an array of tree objects
|
|
38
|
+
* @returns {Promise<unknown[]>} a promise that resolves to an array of tree objects
|
|
39
39
|
*/
|
|
40
40
|
|
|
41
41
|
|
|
@@ -53,10 +53,12 @@ function _getTrees() {
|
|
|
53
53
|
_getTrees = _asyncToGenerator(function* () {
|
|
54
54
|
var urlString = _util.default.format(queryAllTreesURLTemplate, _SessionStorage.default.session.getTenant(), (0, _ApiUtils.getCurrentRealmPath)());
|
|
55
55
|
|
|
56
|
-
var
|
|
56
|
+
var {
|
|
57
|
+
data
|
|
58
|
+
} = yield (0, _BaseApi.generateAmApi)(getTreeApiConfig()).get(urlString, {
|
|
57
59
|
withCredentials: true
|
|
58
60
|
});
|
|
59
|
-
return
|
|
61
|
+
return data.result;
|
|
60
62
|
});
|
|
61
63
|
return _getTrees.apply(this, arguments);
|
|
62
64
|
}
|
package/cjs/api/TreeApi.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"TreeApi.js","names":["treeByIdURLTemplate","queryAllTreesURLTemplate","apiVersion","getTreeApiConfig","configPath","getCurrentRealmPath","path","getTrees","urlString","util","format","storage","session","getTenant","
|
|
1
|
+
{"version":3,"file":"TreeApi.js","names":["treeByIdURLTemplate","queryAllTreesURLTemplate","apiVersion","getTreeApiConfig","configPath","getCurrentRealmPath","path","getTrees","urlString","util","format","storage","session","getTenant","data","generateAmApi","get","withCredentials","result","getTree","id","putTree","treeId","treeData","put","deleteTree","delete"],"sources":["api/TreeApi.ts"],"sourcesContent":["import util from 'util';\nimport { getCurrentRealmPath } from './utils/ApiUtils';\nimport { generateAmApi } from './BaseApi';\nimport storage from '../storage/SessionStorage';\n\nconst treeByIdURLTemplate =\n '%s/json%s/realm-config/authentication/authenticationtrees/trees/%s';\nconst queryAllTreesURLTemplate =\n '%s/json%s/realm-config/authentication/authenticationtrees/trees?_queryFilter=true';\n\nconst apiVersion = 'protocol=2.1,resource=1.0';\nconst getTreeApiConfig = () => {\n const configPath = getCurrentRealmPath();\n return {\n path: `${configPath}/authentication/authenticationtrees`,\n apiVersion,\n };\n};\n\n/**\n * Get all trees\n * @returns {Promise<unknown[]>} a promise that resolves to an array of tree objects\n */\nexport async function getTrees() {\n const urlString = util.format(\n queryAllTreesURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath()\n );\n const { data } = await generateAmApi(getTreeApiConfig()).get(urlString, {\n withCredentials: true,\n });\n return data.result;\n}\n\n/**\n * Get tree by id/name\n * @param {String} id tree id/name\n * @returns {Promise} a promise that resolves to a tree object\n */\nexport async function getTree(id) {\n const urlString = util.format(\n treeByIdURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath(),\n id\n );\n const { data } = await generateAmApi(getTreeApiConfig()).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Put tree by id/name\n * @param {String} treeId tree id/name\n * @param {Object} treeData tree object\n * @returns {Promise} a promise that resolves to a tree object\n */\nexport async function putTree(treeId: string, treeData) {\n const urlString = util.format(\n treeByIdURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath(),\n treeId\n );\n const { data } = await generateAmApi(getTreeApiConfig()).put(\n urlString,\n treeData,\n {\n withCredentials: true,\n }\n );\n return data;\n}\n\n/**\n * Delete tree by id/name\n * @param {String} treeId tree id/name\n * @returns {Promise} a promise that resolves to a tree object\n */\nexport async function deleteTree(treeId) {\n const urlString = util.format(\n treeByIdURLTemplate,\n storage.session.getTenant(),\n getCurrentRealmPath(),\n treeId\n );\n const { data } = await generateAmApi(getTreeApiConfig()).delete(urlString, {\n withCredentials: true,\n });\n return data;\n}\n"],"mappings":";;;;;;;;;;AAAA;;AACA;;AACA;;AACA;;;;;;;;AAEA,IAAMA,mBAAmB,GACvB,oEADF;AAEA,IAAMC,wBAAwB,GAC5B,mFADF;AAGA,IAAMC,UAAU,GAAG,2BAAnB;;AACA,IAAMC,gBAAgB,GAAG,MAAM;EAC7B,IAAMC,UAAU,GAAG,IAAAC,6BAAA,GAAnB;EACA,OAAO;IACLC,IAAI,YAAKF,UAAL,wCADC;IAELF;EAFK,CAAP;AAID,CAND;AAQA;AACA;AACA;AACA;;;SACsBK,Q;;;AAYtB;AACA;AACA;AACA;AACA;;;;gCAhBO,aAA0B;IAC/B,IAAMC,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBT,wBADgB,EAEhBU,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAFgB,EAGhB,IAAAR,6BAAA,GAHgB,CAAlB;;IAKA,IAAM;MAAES;IAAF,UAAiB,IAAAC,sBAAA,EAAcZ,gBAAgB,EAA9B,EAAkCa,GAAlC,CAAsCR,SAAtC,EAAiD;MACtES,eAAe,EAAE;IADqD,CAAjD,CAAvB;IAGA,OAAOH,IAAI,CAACI,MAAZ;EACD,C;;;;SAOqBC,O;;;AAatB;AACA;AACA;AACA;AACA;AACA;;;;+BAlBO,WAAuBC,EAAvB,EAA2B;IAChC,IAAMZ,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,mBADgB,EAEhBW,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAFgB,EAGhB,IAAAR,6BAAA,GAHgB,EAIhBe,EAJgB,CAAlB;;IAMA,IAAM;MAAEN;IAAF,UAAiB,IAAAC,sBAAA,EAAcZ,gBAAgB,EAA9B,EAAkCa,GAAlC,CAAsCR,SAAtC,EAAiD;MACtES,eAAe,EAAE;IADqD,CAAjD,CAAvB;IAGA,OAAOH,IAAP;EACD,C;;;;SAQqBO,O;;;AAiBtB;AACA;AACA;AACA;AACA;;;;+BArBO,WAAuBC,MAAvB,EAAuCC,QAAvC,EAAiD;IACtD,IAAMf,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,mBADgB,EAEhBW,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAFgB,EAGhB,IAAAR,6BAAA,GAHgB,EAIhBiB,MAJgB,CAAlB;;IAMA,IAAM;MAAER;IAAF,UAAiB,IAAAC,sBAAA,EAAcZ,gBAAgB,EAA9B,EAAkCqB,GAAlC,CACrBhB,SADqB,EAErBe,QAFqB,EAGrB;MACEN,eAAe,EAAE;IADnB,CAHqB,CAAvB;IAOA,OAAOH,IAAP;EACD,C;;;;SAOqBW,U;;;;;kCAAf,WAA0BH,MAA1B,EAAkC;IACvC,IAAMd,SAAS,GAAGC,aAAA,CAAKC,MAAL,CAChBV,mBADgB,EAEhBW,uBAAA,CAAQC,OAAR,CAAgBC,SAAhB,EAFgB,EAGhB,IAAAR,6BAAA,GAHgB,EAIhBiB,MAJgB,CAAlB;;IAMA,IAAM;MAAER;IAAF,UAAiB,IAAAC,sBAAA,EAAcZ,gBAAgB,EAA9B,EAAkCuB,MAAlC,CAAyClB,SAAzC,EAAoD;MACzES,eAAe,EAAE;IADwD,CAApD,CAAvB;IAGA,OAAOH,IAAP;EACD,C"}
|