@rockcarver/frodo-lib 1.0.0 → 2.0.0-2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +6 -6
- package/cjs/api/AgentApi.js +91 -37
- package/cjs/api/AgentApi.js.map +1 -1
- package/cjs/api/AgentApi.test.js.map +1 -1
- package/cjs/api/ApiTypes.js.map +1 -1
- package/cjs/api/AuthenticateApi.js +18 -11
- package/cjs/api/AuthenticateApi.js.map +1 -1
- package/cjs/api/AuthenticateApi.test.js.map +1 -1
- package/cjs/api/BaseApi.js +50 -26
- package/cjs/api/BaseApi.js.map +1 -1
- package/cjs/api/CirclesOfTrustApi.js +47 -23
- package/cjs/api/CirclesOfTrustApi.js.map +1 -1
- package/cjs/api/IdmConfigApi.js +54 -21
- package/cjs/api/IdmConfigApi.js.map +1 -1
- package/cjs/api/IdmSystemApi.js +9 -6
- package/cjs/api/IdmSystemApi.js.map +1 -1
- package/cjs/api/ManagedObjectApi.js +49 -27
- package/cjs/api/ManagedObjectApi.js.map +1 -1
- package/cjs/api/NodeApi.js +71 -32
- package/cjs/api/NodeApi.js.map +1 -1
- package/cjs/api/NodeApi.test.js.map +1 -1
- package/cjs/api/OAuth2ClientApi.js +43 -20
- package/cjs/api/OAuth2ClientApi.js.map +1 -1
- package/cjs/api/OAuth2OIDCApi.js +74 -27
- package/cjs/api/OAuth2OIDCApi.js.map +1 -1
- package/cjs/api/OAuth2OIDCApi.test.js.map +1 -1
- package/cjs/api/OAuth2ProviderApi.js +10 -9
- package/cjs/api/OAuth2ProviderApi.js.map +1 -1
- package/cjs/api/PoliciesApi.js +54 -22
- package/cjs/api/PoliciesApi.js.map +1 -1
- package/cjs/api/PoliciesApi.test.js.map +1 -1
- package/cjs/api/PolicySetApi.js +54 -23
- package/cjs/api/PolicySetApi.js.map +1 -1
- package/cjs/api/PolicySetApi.test.js.map +1 -1
- package/cjs/api/RealmApi.js +73 -29
- package/cjs/api/RealmApi.js.map +1 -1
- package/cjs/api/ResourceTypesApi.js +67 -28
- package/cjs/api/ResourceTypesApi.js.map +1 -1
- package/cjs/api/ResourceTypesApi.test.js.map +1 -1
- package/cjs/api/Saml2Api.js +90 -122
- package/cjs/api/Saml2Api.js.map +1 -1
- package/cjs/api/ScriptApi.js +54 -23
- package/cjs/api/ScriptApi.js.map +1 -1
- package/cjs/api/ServerInfoApi.js +23 -10
- package/cjs/api/ServerInfoApi.js.map +1 -1
- package/cjs/api/ServiceApi.js +91 -42
- package/cjs/api/ServiceApi.js.map +1 -1
- package/cjs/api/SocialIdentityProvidersApi.js +70 -31
- package/cjs/api/SocialIdentityProvidersApi.js.map +1 -1
- package/cjs/api/TreeApi.js +43 -20
- package/cjs/api/TreeApi.js.map +1 -1
- package/cjs/api/TreeApi.test.js.map +1 -1
- package/cjs/api/cloud/EnvInfoApi.js +10 -6
- package/cjs/api/cloud/EnvInfoApi.js.map +1 -1
- package/cjs/api/cloud/FeatureApi.js +9 -6
- package/cjs/api/cloud/FeatureApi.js.map +1 -1
- package/cjs/api/cloud/LogApi.js +48 -18
- package/cjs/api/cloud/LogApi.js.map +1 -1
- package/cjs/api/cloud/SecretsApi.js +109 -35
- package/cjs/api/cloud/SecretsApi.js.map +1 -1
- package/cjs/api/cloud/SecretsApi.test.js.map +1 -1
- package/cjs/api/cloud/StartupApi.js +21 -10
- package/cjs/api/cloud/StartupApi.js.map +1 -1
- package/cjs/api/cloud/StartupApi.test.js.map +1 -1
- package/cjs/api/cloud/VariablesApi.js +52 -20
- package/cjs/api/cloud/VariablesApi.js.map +1 -1
- package/cjs/api/cloud/VariablesApi.test.js.map +1 -1
- package/cjs/api/utils/ApiUtils.js +2 -5
- package/cjs/api/utils/ApiUtils.js.map +1 -1
- package/cjs/api/utils/ApiUtils.test.js.map +1 -1
- package/cjs/index.js +13 -112
- package/cjs/index.js.map +1 -1
- package/cjs/lib/FrodoLib.js +142 -0
- package/cjs/lib/FrodoLib.js.map +1 -0
- package/cjs/ops/AdminOps.js +578 -90
- package/cjs/ops/AdminOps.js.map +1 -1
- package/cjs/ops/AgentOps.js +964 -118
- package/cjs/ops/AgentOps.js.map +1 -1
- package/cjs/ops/AgentOps.test.js.map +1 -1
- package/cjs/ops/AuthenticateOps.js +182 -87
- package/cjs/ops/AuthenticateOps.js.map +1 -1
- package/cjs/ops/AuthenticateOps.test.js.map +1 -1
- package/cjs/ops/CirclesOfTrustOps.js +360 -291
- package/cjs/ops/CirclesOfTrustOps.js.map +1 -1
- package/cjs/ops/ConnectionProfileOps.js +221 -139
- package/cjs/ops/ConnectionProfileOps.js.map +1 -1
- package/cjs/ops/ConnectionProfileOps.test.js.map +1 -1
- package/cjs/ops/EmailTemplateOps.js +84 -10
- package/cjs/ops/EmailTemplateOps.js.map +1 -1
- package/cjs/ops/EmailTemplateOps.test.js.map +1 -1
- package/cjs/ops/IdmOps.js +97 -81
- package/cjs/ops/IdmOps.js.map +1 -1
- package/cjs/ops/IdmOps.test.js.map +1 -1
- package/cjs/ops/IdpOps.js +275 -42
- package/cjs/ops/IdpOps.js.map +1 -1
- package/cjs/ops/IdpOps.test.js.map +1 -1
- package/cjs/ops/InfoOps.js +42 -27
- package/cjs/ops/InfoOps.js.map +1 -1
- package/cjs/ops/JoseOps.test.js.map +1 -1
- package/cjs/ops/JourneyOps.js +721 -126
- package/cjs/ops/JourneyOps.js.map +1 -1
- package/cjs/ops/JourneyOps.test.js.map +1 -1
- package/cjs/ops/ManagedObjectOps.js +79 -12
- package/cjs/ops/ManagedObjectOps.js.map +1 -1
- package/cjs/ops/NodeOps.js +127 -100
- package/cjs/ops/NodeOps.js.map +1 -1
- package/cjs/ops/OAuth2ClientOps.js +323 -65
- package/cjs/ops/OAuth2ClientOps.js.map +1 -1
- package/cjs/ops/OAuth2ClientOps.test.js.map +1 -1
- package/cjs/ops/OAuth2OidcOps.js +84 -0
- package/cjs/ops/OAuth2OidcOps.js.map +1 -0
- package/cjs/ops/OAuth2ProviderOps.js +20 -13
- package/cjs/ops/OAuth2ProviderOps.js.map +1 -1
- package/cjs/ops/OpsTypes.js.map +1 -1
- package/cjs/ops/OrganizationOps.js +67 -12
- package/cjs/ops/OrganizationOps.js.map +1 -1
- package/cjs/ops/PolicyOps.js +476 -136
- package/cjs/ops/PolicyOps.js.map +1 -1
- package/cjs/ops/PolicyOps.test.js.map +1 -1
- package/cjs/ops/PolicySetOps.js +402 -132
- package/cjs/ops/PolicySetOps.js.map +1 -1
- package/cjs/ops/PolicySetOps.test.js.map +1 -1
- package/cjs/ops/RealmOps.js +119 -84
- package/cjs/ops/RealmOps.js.map +1 -1
- package/cjs/ops/ResourceTypeOps.js +364 -95
- package/cjs/ops/ResourceTypeOps.js.map +1 -1
- package/cjs/ops/ResourceTypeOps.test.js.map +1 -1
- package/cjs/ops/Saml2Ops.js +407 -145
- package/cjs/ops/Saml2Ops.js.map +1 -1
- package/cjs/ops/Saml2Ops.test.js.map +1 -1
- package/cjs/ops/ScriptOps.js +256 -79
- package/cjs/ops/ScriptOps.js.map +1 -1
- package/cjs/ops/ScriptOps.test.js.map +1 -1
- package/cjs/ops/ServiceOps.js +331 -55
- package/cjs/ops/ServiceOps.js.map +1 -1
- package/cjs/ops/ThemeOps.js +363 -54
- package/cjs/ops/ThemeOps.js.map +1 -1
- package/cjs/ops/ThemeOps.test.js.map +1 -1
- package/cjs/ops/cloud/FeatureOps.js +57 -12
- package/cjs/ops/cloud/FeatureOps.js.map +1 -1
- package/cjs/ops/cloud/LogOps.js +126 -6
- package/cjs/ops/cloud/LogOps.js.map +1 -1
- package/cjs/ops/cloud/SecretsOps.js +230 -289
- package/cjs/ops/cloud/SecretsOps.js.map +1 -1
- package/cjs/ops/cloud/ServiceAccountOps.js +101 -18
- package/cjs/ops/cloud/ServiceAccountOps.js.map +1 -1
- package/cjs/ops/cloud/ServiceAccountOps.test.js.map +1 -1
- package/cjs/ops/cloud/StartupOps.js +64 -9
- package/cjs/ops/cloud/StartupOps.js.map +1 -1
- package/cjs/ops/cloud/VariablesOps.js +100 -175
- package/cjs/ops/cloud/VariablesOps.js.map +1 -1
- package/cjs/ops/utils/Console.js +9 -10
- package/cjs/ops/utils/Console.js.map +1 -1
- package/cjs/ops/utils/DataProtection.js +2 -2
- package/cjs/ops/utils/DataProtection.js.map +1 -1
- package/cjs/ops/utils/ExportImportUtils.js +144 -13
- package/cjs/ops/utils/ExportImportUtils.js.map +1 -1
- package/cjs/ops/utils/ExportImportUtils.test.js.map +1 -1
- package/cjs/ops/utils/OpsUtils.js +7 -5
- package/cjs/ops/utils/OpsUtils.js.map +1 -1
- package/cjs/ops/utils/OpsUtils.test.js.map +1 -1
- package/cjs/ops/utils/{ValidationUtils.js → ScriptValidationUtils.js} +1 -1
- package/cjs/ops/utils/ScriptValidationUtils.js.map +1 -0
- package/cjs/ops/utils/ScriptValidationUtils.test.js.map +1 -0
- package/cjs/ops/utils/Version.js +36 -6
- package/cjs/ops/utils/Version.js.map +1 -1
- package/cjs/ops/utils/Version.test.js.map +1 -1
- package/cjs/shared/State.js +453 -210
- package/cjs/shared/State.js.map +1 -1
- package/cjs/shared/State.test.js.map +1 -1
- package/cjs/utils/AutoSetupPolly.js +4 -1
- package/cjs/utils/AutoSetupPolly.js.map +1 -1
- package/esm/api/AgentApi.mjs +75 -27
- package/esm/api/AgentApi.test.mjs +319 -71
- package/esm/api/AuthenticateApi.mjs +15 -4
- package/esm/api/AuthenticateApi.test.mjs +27 -8
- package/esm/api/BaseApi.mjs +43 -19
- package/esm/api/CirclesOfTrustApi.mjs +39 -17
- package/esm/api/IdmConfigApi.mjs +44 -13
- package/esm/api/IdmSystemApi.mjs +7 -3
- package/esm/api/ManagedObjectApi.mjs +44 -20
- package/esm/api/NodeApi.mjs +59 -24
- package/esm/api/NodeApi.test.mjs +158 -40
- package/esm/api/OAuth2ClientApi.mjs +36 -15
- package/esm/api/OAuth2OIDCApi.mjs +69 -20
- package/esm/api/OAuth2OIDCApi.test.mjs +21 -3
- package/esm/api/OAuth2ProviderApi.mjs +8 -6
- package/esm/api/PoliciesApi.mjs +45 -16
- package/esm/api/PoliciesApi.test.mjs +63 -15
- package/esm/api/PolicySetApi.mjs +44 -16
- package/esm/api/PolicySetApi.test.mjs +48 -12
- package/esm/api/RealmApi.mjs +65 -24
- package/esm/api/ResourceTypesApi.mjs +56 -21
- package/esm/api/ResourceTypesApi.test.mjs +58 -14
- package/esm/api/Saml2Api.mjs +75 -89
- package/esm/api/ScriptApi.mjs +45 -17
- package/esm/api/ServerInfoApi.mjs +19 -6
- package/esm/api/ServiceApi.mjs +77 -26
- package/esm/api/SocialIdentityProvidersApi.mjs +58 -23
- package/esm/api/TreeApi.mjs +36 -15
- package/esm/api/TreeApi.test.mjs +129 -34
- package/esm/api/cloud/EnvInfoApi.mjs +8 -3
- package/esm/api/cloud/FeatureApi.mjs +7 -3
- package/esm/api/cloud/LogApi.mjs +38 -11
- package/esm/api/cloud/SecretsApi.mjs +89 -21
- package/esm/api/cloud/SecretsApi.test.mjs +193 -50
- package/esm/api/cloud/StartupApi.mjs +17 -6
- package/esm/api/cloud/StartupApi.test.mjs +28 -11
- package/esm/api/cloud/VariablesApi.mjs +43 -14
- package/esm/api/cloud/VariablesApi.test.mjs +124 -33
- package/esm/api/utils/ApiUtils.mjs +2 -4
- package/esm/api/utils/ApiUtils.test.mjs +14 -6
- package/esm/index.mjs +1 -60
- package/esm/lib/FrodoLib.mjs +128 -0
- package/esm/ops/AdminOps.mjs +500 -71
- package/esm/ops/AgentOps.mjs +781 -81
- package/esm/ops/AgentOps.test.mjs +296 -113
- package/esm/ops/AuthenticateOps.mjs +156 -64
- package/esm/ops/AuthenticateOps.test.mjs +7 -4
- package/esm/ops/CirclesOfTrustOps.mjs +294 -229
- package/esm/ops/ConnectionProfileOps.mjs +190 -123
- package/esm/ops/ConnectionProfileOps.test.mjs +25 -5
- package/esm/ops/EmailTemplateOps.mjs +66 -6
- package/esm/ops/EmailTemplateOps.test.mjs +32 -11
- package/esm/ops/IdmOps.mjs +60 -47
- package/esm/ops/IdmOps.test.mjs +54 -18
- package/esm/ops/IdpOps.mjs +227 -31
- package/esm/ops/IdpOps.test.mjs +57 -20
- package/esm/ops/InfoOps.mjs +36 -23
- package/esm/ops/JoseOps.test.mjs +8 -0
- package/esm/ops/JourneyOps.mjs +634 -96
- package/esm/ops/JourneyOps.test.mjs +73 -31
- package/esm/ops/ManagedObjectOps.mjs +66 -10
- package/esm/ops/NodeOps.mjs +108 -85
- package/esm/ops/OAuth2ClientOps.mjs +258 -42
- package/esm/ops/OAuth2ClientOps.test.mjs +80 -29
- package/esm/ops/OAuth2OidcOps.mjs +40 -0
- package/esm/ops/OAuth2ProviderOps.mjs +11 -8
- package/esm/ops/OrganizationOps.mjs +56 -8
- package/esm/ops/PolicyOps.mjs +379 -93
- package/esm/ops/PolicyOps.test.mjs +180 -65
- package/esm/ops/PolicySetOps.mjs +311 -88
- package/esm/ops/PolicySetOps.test.mjs +108 -39
- package/esm/ops/RealmOps.mjs +85 -65
- package/esm/ops/ResourceTypeOps.mjs +278 -61
- package/esm/ops/ResourceTypeOps.test.mjs +113 -27
- package/esm/ops/Saml2Ops.mjs +346 -106
- package/esm/ops/Saml2Ops.test.mjs +117 -81
- package/esm/ops/ScriptOps.mjs +202 -56
- package/esm/ops/ScriptOps.test.mjs +64 -23
- package/esm/ops/ServiceOps.mjs +261 -27
- package/esm/ops/ThemeOps.mjs +300 -33
- package/esm/ops/ThemeOps.test.mjs +197 -47
- package/esm/ops/cloud/FeatureOps.mjs +45 -10
- package/esm/ops/cloud/LogOps.mjs +107 -4
- package/esm/ops/cloud/SecretsOps.mjs +123 -204
- package/esm/ops/cloud/ServiceAccountOps.mjs +85 -15
- package/esm/ops/cloud/ServiceAccountOps.test.mjs +16 -6
- package/esm/ops/cloud/StartupOps.mjs +49 -6
- package/esm/ops/cloud/VariablesOps.mjs +58 -120
- package/esm/ops/utils/Console.mjs +2 -1
- package/esm/ops/utils/DataProtection.mjs +2 -3
- package/esm/ops/utils/ExportImportUtils.mjs +129 -8
- package/esm/ops/utils/ExportImportUtils.test.mjs +15 -2
- package/esm/ops/utils/OpsUtils.mjs +4 -3
- package/esm/ops/utils/OpsUtils.test.mjs +21 -5
- package/esm/ops/utils/{ValidationUtils.mjs → ScriptValidationUtils.mjs} +1 -1
- package/esm/ops/utils/{ValidationUtils.test.mjs → ScriptValidationUtils.test.mjs} +2 -2
- package/esm/ops/utils/Version.mjs +29 -6
- package/esm/ops/utils/Version.test.mjs +4 -1
- package/esm/shared/State.mjs +457 -145
- package/esm/shared/State.test.mjs +8 -0
- package/esm/utils/AutoSetupPolly.mjs +4 -1
- package/package.json +1 -1
- package/types/api/AgentApi.d.ts +37 -8
- package/types/api/AgentApi.d.ts.map +1 -1
- package/types/api/ApiTypes.d.ts +20 -8
- package/types/api/ApiTypes.d.ts.map +1 -1
- package/types/api/AuthenticateApi.d.ts +13 -3
- package/types/api/AuthenticateApi.d.ts.map +1 -1
- package/types/api/BaseApi.d.ts +36 -7
- package/types/api/BaseApi.d.ts.map +1 -1
- package/types/api/CirclesOfTrustApi.d.ts +21 -7
- package/types/api/CirclesOfTrustApi.d.ts.map +1 -1
- package/types/api/IdmConfigApi.d.ts +28 -13
- package/types/api/IdmConfigApi.d.ts.map +1 -1
- package/types/api/IdmSystemApi.d.ts +4 -1
- package/types/api/IdmSystemApi.d.ts.map +1 -1
- package/types/api/ManagedObjectApi.d.ts +25 -10
- package/types/api/ManagedObjectApi.d.ts.map +1 -1
- package/types/api/NodeApi.d.ts +31 -9
- package/types/api/NodeApi.d.ts.map +1 -1
- package/types/api/OAuth2ClientApi.d.ts +18 -5
- package/types/api/OAuth2ClientApi.d.ts.map +1 -1
- package/types/api/OAuth2OIDCApi.d.ts +45 -11
- package/types/api/OAuth2OIDCApi.d.ts.map +1 -1
- package/types/api/OAuth2ProviderApi.d.ts +4 -1
- package/types/api/OAuth2ProviderApi.d.ts.map +1 -1
- package/types/api/PoliciesApi.d.ts +21 -5
- package/types/api/PoliciesApi.d.ts.map +1 -1
- package/types/api/PolicySetApi.d.ts +20 -5
- package/types/api/PolicySetApi.d.ts.map +1 -1
- package/types/api/RealmApi.d.ts +26 -10
- package/types/api/RealmApi.d.ts.map +1 -1
- package/types/api/ResourceTypesApi.d.ts +27 -8
- package/types/api/ResourceTypesApi.d.ts.map +1 -1
- package/types/api/Saml2Api.d.ts +39 -32
- package/types/api/Saml2Api.d.ts.map +1 -1
- package/types/api/ScriptApi.d.ts +21 -5
- package/types/api/ScriptApi.d.ts.map +1 -1
- package/types/api/ServerInfoApi.d.ts +9 -2
- package/types/api/ServerInfoApi.d.ts.map +1 -1
- package/types/api/ServiceApi.d.ts +41 -7
- package/types/api/ServiceApi.d.ts.map +1 -1
- package/types/api/SocialIdentityProvidersApi.d.ts +30 -8
- package/types/api/SocialIdentityProvidersApi.d.ts.map +1 -1
- package/types/api/TreeApi.d.ts +18 -4
- package/types/api/TreeApi.d.ts.map +1 -1
- package/types/api/cloud/EnvInfoApi.d.ts +4 -1
- package/types/api/cloud/EnvInfoApi.d.ts.map +1 -1
- package/types/api/cloud/FeatureApi.d.ts +4 -1
- package/types/api/cloud/FeatureApi.d.ts.map +1 -1
- package/types/api/cloud/LogApi.d.ts +24 -6
- package/types/api/cloud/LogApi.d.ts.map +1 -1
- package/types/api/cloud/SecretsApi.d.ts +50 -10
- package/types/api/cloud/SecretsApi.d.ts.map +1 -1
- package/types/api/cloud/StartupApi.d.ts +7 -2
- package/types/api/cloud/StartupApi.d.ts.map +1 -1
- package/types/api/cloud/VariablesApi.d.ts +23 -5
- package/types/api/cloud/VariablesApi.d.ts.map +1 -1
- package/types/api/utils/ApiUtils.d.ts +3 -2
- package/types/api/utils/ApiUtils.d.ts.map +1 -1
- package/types/index.d.ts +1 -48
- package/types/index.d.ts.map +1 -1
- package/types/lib/FrodoLib.d.ts +99 -0
- package/types/lib/FrodoLib.d.ts.map +1 -0
- package/types/ops/AdminOps.d.ts +71 -12
- package/types/ops/AdminOps.d.ts.map +1 -1
- package/types/ops/AgentOps.d.ts +350 -36
- package/types/ops/AgentOps.d.ts.map +1 -1
- package/types/ops/AuthenticateOps.d.ts +27 -4
- package/types/ops/AuthenticateOps.d.ts.map +1 -1
- package/types/ops/CirclesOfTrustOps.d.ts +88 -24
- package/types/ops/CirclesOfTrustOps.d.ts.map +1 -1
- package/types/ops/ConnectionProfileOps.d.ts +78 -18
- package/types/ops/ConnectionProfileOps.d.ts.map +1 -1
- package/types/ops/EmailTemplateOps.d.ts +36 -3
- package/types/ops/EmailTemplateOps.d.ts.map +1 -1
- package/types/ops/IdmOps.d.ts +28 -40
- package/types/ops/IdmOps.d.ts.map +1 -1
- package/types/ops/IdpOps.d.ts +88 -10
- package/types/ops/IdpOps.d.ts.map +1 -1
- package/types/ops/InfoOps.d.ts +12 -1
- package/types/ops/InfoOps.d.ts.map +1 -1
- package/types/ops/JourneyOps.d.ts +237 -34
- package/types/ops/JourneyOps.d.ts.map +1 -1
- package/types/ops/ManagedObjectOps.d.ts +37 -8
- package/types/ops/ManagedObjectOps.d.ts.map +1 -1
- package/types/ops/NodeOps.d.ts +61 -6
- package/types/ops/NodeOps.d.ts.map +1 -1
- package/types/ops/OAuth2ClientOps.d.ts +104 -10
- package/types/ops/OAuth2ClientOps.d.ts.map +1 -1
- package/types/ops/OAuth2OidcOps.d.ts +11 -0
- package/types/ops/OAuth2OidcOps.d.ts.map +1 -0
- package/types/ops/OAuth2ProviderOps.d.ts +8 -5
- package/types/ops/OAuth2ProviderOps.d.ts.map +1 -1
- package/types/ops/OpsTypes.d.ts +12 -1
- package/types/ops/OpsTypes.d.ts.map +1 -1
- package/types/ops/OrganizationOps.d.ts +24 -3
- package/types/ops/OrganizationOps.d.ts.map +1 -1
- package/types/ops/PolicyOps.d.ts +103 -28
- package/types/ops/PolicyOps.d.ts.map +1 -1
- package/types/ops/PolicySetOps.d.ts +76 -30
- package/types/ops/PolicySetOps.d.ts.map +1 -1
- package/types/ops/RealmOps.d.ts +34 -14
- package/types/ops/RealmOps.d.ts.map +1 -1
- package/types/ops/ResourceTypeOps.d.ts +116 -29
- package/types/ops/ResourceTypeOps.d.ts.map +1 -1
- package/types/ops/Saml2Ops.d.ts +124 -41
- package/types/ops/Saml2Ops.d.ts.map +1 -1
- package/types/ops/ScriptOps.d.ts +88 -23
- package/types/ops/ScriptOps.d.ts.map +1 -1
- package/types/ops/ServiceOps.d.ts +95 -8
- package/types/ops/ServiceOps.d.ts.map +1 -1
- package/types/ops/ThemeOps.d.ts +113 -9
- package/types/ops/ThemeOps.d.ts.map +1 -1
- package/types/ops/cloud/FeatureOps.d.ts +23 -2
- package/types/ops/cloud/FeatureOps.d.ts.map +1 -1
- package/types/ops/cloud/LogOps.d.ts +61 -3
- package/types/ops/cloud/LogOps.d.ts.map +1 -1
- package/types/ops/cloud/SecretsOps.d.ts +77 -63
- package/types/ops/cloud/SecretsOps.d.ts.map +1 -1
- package/types/ops/cloud/ServiceAccountOps.d.ts +48 -3
- package/types/ops/cloud/ServiceAccountOps.d.ts.map +1 -1
- package/types/ops/cloud/StartupOps.d.ts +25 -2
- package/types/ops/cloud/StartupOps.d.ts.map +1 -1
- package/types/ops/cloud/VariablesOps.d.ts +39 -39
- package/types/ops/cloud/VariablesOps.d.ts.map +1 -1
- package/types/ops/utils/Console.d.ts.map +1 -1
- package/types/ops/utils/DataProtection.d.ts +1 -1
- package/types/ops/utils/DataProtection.d.ts.map +1 -1
- package/types/ops/utils/ExportImportUtils.d.ts +72 -11
- package/types/ops/utils/ExportImportUtils.d.ts.map +1 -1
- package/types/ops/utils/OpsUtils.d.ts +4 -1
- package/types/ops/utils/OpsUtils.d.ts.map +1 -1
- package/types/ops/utils/ScriptValidationUtils.d.ts.map +1 -0
- package/types/ops/utils/Version.d.ts +20 -2
- package/types/ops/utils/Version.d.ts.map +1 -1
- package/types/shared/State.d.ts +80 -177
- package/types/shared/State.d.ts.map +1 -1
- package/types/utils/AutoSetupPolly.d.ts.map +1 -1
- package/cjs/ops/utils/ValidationUtils.js.map +0 -1
- package/cjs/ops/utils/ValidationUtils.test.js.map +0 -1
- package/types/ops/utils/ValidationUtils.d.ts.map +0 -1
- /package/types/ops/utils/{ValidationUtils.d.ts → ScriptValidationUtils.d.ts} +0 -0
package/cjs/ops/AdminOps.js
CHANGED
|
@@ -6,6 +6,7 @@ Object.defineProperty(exports, "__esModule", {
|
|
|
6
6
|
exports.addAutoIdStaticUserMapping = addAutoIdStaticUserMapping;
|
|
7
7
|
exports.createLongLivedToken = createLongLivedToken;
|
|
8
8
|
exports.createOAuth2ClientWithAdminPrivileges = createOAuth2ClientWithAdminPrivileges;
|
|
9
|
+
exports.default = void 0;
|
|
9
10
|
exports.grantOAuth2ClientAdminPrivileges = grantOAuth2ClientAdminPrivileges;
|
|
10
11
|
exports.hideGenericExtensionAttributes = hideGenericExtensionAttributes;
|
|
11
12
|
exports.listNonOAuth2AdminStaticUserMappings = listNonOAuth2AdminStaticUserMappings;
|
|
@@ -30,6 +31,239 @@ var _url = require("url");
|
|
|
30
31
|
function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; }
|
|
31
32
|
function asyncGeneratorStep(gen, resolve, reject, _next, _throw, key, arg) { try { var info = gen[key](arg); var value = info.value; } catch (error) { reject(error); return; } if (info.done) { resolve(value); } else { Promise.resolve(value).then(_next, _throw); } }
|
|
32
33
|
function _asyncToGenerator(fn) { return function () { var self = this, args = arguments; return new Promise(function (resolve, reject) { var gen = fn.apply(self, args); function _next(value) { asyncGeneratorStep(gen, resolve, reject, _next, _throw, "next", value); } function _throw(err) { asyncGeneratorStep(gen, resolve, reject, _next, _throw, "throw", err); } _next(undefined); }); }; }
|
|
34
|
+
class AdminOps {
|
|
35
|
+
constructor(state) {
|
|
36
|
+
this.state = state;
|
|
37
|
+
}
|
|
38
|
+
|
|
39
|
+
/*
|
|
40
|
+
* List all oauth2 clients, which have a corresponding staticUserMapping
|
|
41
|
+
* in the IDM authentication.json:
|
|
42
|
+
{
|
|
43
|
+
"_id": "authentication",
|
|
44
|
+
"rsFilter": {
|
|
45
|
+
...
|
|
46
|
+
"staticUserMapping": [
|
|
47
|
+
{
|
|
48
|
+
"subject": "someOauth2ClientID",
|
|
49
|
+
"localUser": "internal/user/openidm-admin",
|
|
50
|
+
"userRoles": "authzRoles/*",
|
|
51
|
+
"roles": [
|
|
52
|
+
"internal/role/openidm-authorized",
|
|
53
|
+
"internal/role/openidm-admin"
|
|
54
|
+
]
|
|
55
|
+
},
|
|
56
|
+
{
|
|
57
|
+
"subject": "RCSClient",
|
|
58
|
+
"localUser": "internal/user/idm-provisioning"
|
|
59
|
+
}
|
|
60
|
+
]
|
|
61
|
+
}
|
|
62
|
+
}
|
|
63
|
+
*/
|
|
64
|
+
listOAuth2CustomClients() {
|
|
65
|
+
var _this = this;
|
|
66
|
+
return _asyncToGenerator(function* () {
|
|
67
|
+
return listOAuth2CustomClients({
|
|
68
|
+
state: _this.state
|
|
69
|
+
});
|
|
70
|
+
})();
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
/*
|
|
74
|
+
* List all oauth2 clients, which have the fr:idm:* scope and a
|
|
75
|
+
* corresponding staticUserMapping in the IDM authentication.json
|
|
76
|
+
* and are assigned admin privileges:
|
|
77
|
+
{
|
|
78
|
+
"_id": "authentication",
|
|
79
|
+
"rsFilter": {
|
|
80
|
+
...
|
|
81
|
+
"staticUserMapping": [
|
|
82
|
+
{
|
|
83
|
+
"subject": "someOauth2ClientID",
|
|
84
|
+
"localUser": "internal/user/openidm-admin",
|
|
85
|
+
"userRoles": "authzRoles/*",
|
|
86
|
+
"roles": [
|
|
87
|
+
"internal/role/openidm-authorized",
|
|
88
|
+
"internal/role/openidm-admin"
|
|
89
|
+
]
|
|
90
|
+
}
|
|
91
|
+
]
|
|
92
|
+
}
|
|
93
|
+
}
|
|
94
|
+
*/
|
|
95
|
+
listOAuth2AdminClients() {
|
|
96
|
+
var _this2 = this;
|
|
97
|
+
return _asyncToGenerator(function* () {
|
|
98
|
+
return listOAuth2AdminClients({
|
|
99
|
+
state: _this2.state
|
|
100
|
+
});
|
|
101
|
+
})();
|
|
102
|
+
}
|
|
103
|
+
|
|
104
|
+
/*
|
|
105
|
+
* List all static user mappings that are not oauth2 clients in authentication.json
|
|
106
|
+
* and are assigned admin privileges:
|
|
107
|
+
{
|
|
108
|
+
"_id": "authentication",
|
|
109
|
+
"rsFilter": {
|
|
110
|
+
...
|
|
111
|
+
"staticUserMapping": [
|
|
112
|
+
{
|
|
113
|
+
"subject": "amadmin",
|
|
114
|
+
"localUser": "internal/user/openidm-admin",
|
|
115
|
+
"userRoles": "authzRoles/*",
|
|
116
|
+
"roles": [
|
|
117
|
+
"internal/role/openidm-authorized",
|
|
118
|
+
"internal/role/openidm-admin"
|
|
119
|
+
]
|
|
120
|
+
},
|
|
121
|
+
{
|
|
122
|
+
"subject": "idm-provisioning",
|
|
123
|
+
"localUser": "internal/user/idm-provisioning",
|
|
124
|
+
"roles": [
|
|
125
|
+
"internal/role/platform-provisioning"
|
|
126
|
+
]
|
|
127
|
+
},
|
|
128
|
+
{
|
|
129
|
+
"subject": "RCSClient",
|
|
130
|
+
"localUser": "internal/user/idm-provisioning"
|
|
131
|
+
},
|
|
132
|
+
{
|
|
133
|
+
"subject": "autoid-resource-server",
|
|
134
|
+
"localUser": "internal/user/idm-provisioning",
|
|
135
|
+
"roles": [
|
|
136
|
+
"internal/role/platform-provisioning",
|
|
137
|
+
"internal/role/openidm-authorized",
|
|
138
|
+
"internal/role/openidm-admin"
|
|
139
|
+
]
|
|
140
|
+
}
|
|
141
|
+
]
|
|
142
|
+
}
|
|
143
|
+
}
|
|
144
|
+
*/
|
|
145
|
+
listNonOAuth2AdminStaticUserMappings(showProtected) {
|
|
146
|
+
var _this3 = this;
|
|
147
|
+
return _asyncToGenerator(function* () {
|
|
148
|
+
return listNonOAuth2AdminStaticUserMappings({
|
|
149
|
+
showProtected,
|
|
150
|
+
state: _this3.state
|
|
151
|
+
});
|
|
152
|
+
})();
|
|
153
|
+
}
|
|
154
|
+
|
|
155
|
+
/*
|
|
156
|
+
* Add AutoId static user mapping to authentication.json to enable dashboards and other AutoId-based functionality.
|
|
157
|
+
{
|
|
158
|
+
"_id": "authentication",
|
|
159
|
+
"rsFilter": {
|
|
160
|
+
...
|
|
161
|
+
"staticUserMapping": [
|
|
162
|
+
...
|
|
163
|
+
{
|
|
164
|
+
"subject": "autoid-resource-server",
|
|
165
|
+
"localUser": "internal/user/idm-provisioning",
|
|
166
|
+
"roles": [
|
|
167
|
+
"internal/role/platform-provisioning",
|
|
168
|
+
"internal/role/openidm-authorized",
|
|
169
|
+
"internal/role/openidm-admin"
|
|
170
|
+
]
|
|
171
|
+
}
|
|
172
|
+
]
|
|
173
|
+
}
|
|
174
|
+
}
|
|
175
|
+
*/
|
|
176
|
+
addAutoIdStaticUserMapping() {
|
|
177
|
+
var _this4 = this;
|
|
178
|
+
return _asyncToGenerator(function* () {
|
|
179
|
+
return addAutoIdStaticUserMapping({
|
|
180
|
+
state: _this4.state
|
|
181
|
+
});
|
|
182
|
+
})();
|
|
183
|
+
}
|
|
184
|
+
grantOAuth2ClientAdminPrivileges(clientId) {
|
|
185
|
+
var _this5 = this;
|
|
186
|
+
return _asyncToGenerator(function* () {
|
|
187
|
+
return grantOAuth2ClientAdminPrivileges({
|
|
188
|
+
clientId,
|
|
189
|
+
state: _this5.state
|
|
190
|
+
});
|
|
191
|
+
})();
|
|
192
|
+
}
|
|
193
|
+
revokeOAuth2ClientAdminPrivileges(clientId) {
|
|
194
|
+
var _this6 = this;
|
|
195
|
+
return _asyncToGenerator(function* () {
|
|
196
|
+
return revokeOAuth2ClientAdminPrivileges({
|
|
197
|
+
clientId,
|
|
198
|
+
state: _this6.state
|
|
199
|
+
});
|
|
200
|
+
})();
|
|
201
|
+
}
|
|
202
|
+
createOAuth2ClientWithAdminPrivileges(clientId, clientSecret) {
|
|
203
|
+
var _this7 = this;
|
|
204
|
+
return _asyncToGenerator(function* () {
|
|
205
|
+
return createOAuth2ClientWithAdminPrivileges({
|
|
206
|
+
clientId,
|
|
207
|
+
clientSecret,
|
|
208
|
+
state: _this7.state
|
|
209
|
+
});
|
|
210
|
+
})();
|
|
211
|
+
}
|
|
212
|
+
createLongLivedToken(clientId, clientSecret, scope, secret, lifetime) {
|
|
213
|
+
var _this8 = this;
|
|
214
|
+
return _asyncToGenerator(function* () {
|
|
215
|
+
return createLongLivedToken({
|
|
216
|
+
clientId,
|
|
217
|
+
clientSecret,
|
|
218
|
+
scope,
|
|
219
|
+
secret,
|
|
220
|
+
lifetime,
|
|
221
|
+
state: _this8.state
|
|
222
|
+
});
|
|
223
|
+
})();
|
|
224
|
+
}
|
|
225
|
+
removeStaticUserMapping(subject) {
|
|
226
|
+
var _this9 = this;
|
|
227
|
+
return _asyncToGenerator(function* () {
|
|
228
|
+
return removeStaticUserMapping({
|
|
229
|
+
subject,
|
|
230
|
+
state: _this9.state
|
|
231
|
+
});
|
|
232
|
+
})();
|
|
233
|
+
}
|
|
234
|
+
hideGenericExtensionAttributes(includeCustomized, dryRun) {
|
|
235
|
+
var _this10 = this;
|
|
236
|
+
return _asyncToGenerator(function* () {
|
|
237
|
+
return hideGenericExtensionAttributes({
|
|
238
|
+
includeCustomized,
|
|
239
|
+
dryRun,
|
|
240
|
+
state: _this10.state
|
|
241
|
+
});
|
|
242
|
+
})();
|
|
243
|
+
}
|
|
244
|
+
showGenericExtensionAttributes(includeCustomized, dryRun) {
|
|
245
|
+
var _this11 = this;
|
|
246
|
+
return _asyncToGenerator(function* () {
|
|
247
|
+
return showGenericExtensionAttributes({
|
|
248
|
+
includeCustomized,
|
|
249
|
+
dryRun,
|
|
250
|
+
state: _this11.state
|
|
251
|
+
});
|
|
252
|
+
})();
|
|
253
|
+
}
|
|
254
|
+
repairOrgModel(excludeCustomized, extendPermissions, dryRun) {
|
|
255
|
+
var _this12 = this;
|
|
256
|
+
return _asyncToGenerator(function* () {
|
|
257
|
+
return repairOrgModel({
|
|
258
|
+
excludeCustomized,
|
|
259
|
+
extendPermissions,
|
|
260
|
+
dryRun,
|
|
261
|
+
state: _this12.state
|
|
262
|
+
});
|
|
263
|
+
})();
|
|
264
|
+
}
|
|
265
|
+
}
|
|
266
|
+
exports.default = AdminOps;
|
|
33
267
|
var _dirname = _path.default.dirname((0, _url.fileURLToPath)(require('url').pathToFileURL(__filename).toString()));
|
|
34
268
|
var OAUTH2_CLIENT = JSON.parse(_fs.default.readFileSync(_path.default.resolve(_dirname, './templates/OAuth2ClientTemplate.json'), 'utf8'));
|
|
35
269
|
var GENERIC_EXTENSION_ATTRIBUTES = JSON.parse(_fs.default.readFileSync(_path.default.resolve(_dirname, './templates/cloud/GenericExtensionAttributesTemplate.json'), 'utf8'));
|
|
@@ -68,7 +302,7 @@ var autoIdRoles = ['internal/role/platform-provisioning', 'internal/role/openidm
|
|
|
68
302
|
}
|
|
69
303
|
}
|
|
70
304
|
*/
|
|
71
|
-
function listOAuth2CustomClients() {
|
|
305
|
+
function listOAuth2CustomClients(_x) {
|
|
72
306
|
return _listOAuth2CustomClients.apply(this, arguments);
|
|
73
307
|
}
|
|
74
308
|
/*
|
|
@@ -94,17 +328,25 @@ function listOAuth2CustomClients() {
|
|
|
94
328
|
}
|
|
95
329
|
*/
|
|
96
330
|
function _listOAuth2CustomClients() {
|
|
97
|
-
_listOAuth2CustomClients = _asyncToGenerator(function* () {
|
|
98
|
-
var
|
|
331
|
+
_listOAuth2CustomClients = _asyncToGenerator(function* (_ref) {
|
|
332
|
+
var {
|
|
333
|
+
state
|
|
334
|
+
} = _ref;
|
|
335
|
+
var clients = yield (0, _OAuth2ClientOps.getOAuth2Clients)({
|
|
336
|
+
state
|
|
337
|
+
});
|
|
99
338
|
clients = clients.map(client => client._id).filter(client => !protectedClients.includes(client));
|
|
100
|
-
var authentication = yield (0, _IdmConfigApi.getConfigEntity)(
|
|
339
|
+
var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
340
|
+
entityId: 'authentication',
|
|
341
|
+
state
|
|
342
|
+
});
|
|
101
343
|
var subjects = authentication.rsFilter.staticUserMapping.map(mapping => mapping.subject).filter(subject => !protectedSubjects.includes(subject));
|
|
102
344
|
var adminClients = subjects.filter(subject => clients.includes(subject));
|
|
103
345
|
return adminClients;
|
|
104
346
|
});
|
|
105
347
|
return _listOAuth2CustomClients.apply(this, arguments);
|
|
106
348
|
}
|
|
107
|
-
function listOAuth2AdminClients() {
|
|
349
|
+
function listOAuth2AdminClients(_x2) {
|
|
108
350
|
return _listOAuth2AdminClients.apply(this, arguments);
|
|
109
351
|
}
|
|
110
352
|
/*
|
|
@@ -149,8 +391,13 @@ function listOAuth2AdminClients() {
|
|
|
149
391
|
}
|
|
150
392
|
*/
|
|
151
393
|
function _listOAuth2AdminClients() {
|
|
152
|
-
_listOAuth2AdminClients = _asyncToGenerator(function* () {
|
|
153
|
-
var
|
|
394
|
+
_listOAuth2AdminClients = _asyncToGenerator(function* (_ref2) {
|
|
395
|
+
var {
|
|
396
|
+
state
|
|
397
|
+
} = _ref2;
|
|
398
|
+
var clients = yield (0, _OAuth2ClientOps.getOAuth2Clients)({
|
|
399
|
+
state
|
|
400
|
+
});
|
|
154
401
|
clients = clients.filter(client => {
|
|
155
402
|
var isPrivileged = false;
|
|
156
403
|
if (client.coreOAuth2ClientConfig.scopes) {
|
|
@@ -162,7 +409,10 @@ function _listOAuth2AdminClients() {
|
|
|
162
409
|
}
|
|
163
410
|
return isPrivileged;
|
|
164
411
|
}).map(client => client._id).filter(client => !protectedClients.includes(client));
|
|
165
|
-
var authentication = yield (0, _IdmConfigApi.getConfigEntity)(
|
|
412
|
+
var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
413
|
+
entityId: 'authentication',
|
|
414
|
+
state
|
|
415
|
+
});
|
|
166
416
|
var subjects = authentication.rsFilter.staticUserMapping.filter(mapping => {
|
|
167
417
|
var isPrivileged = false;
|
|
168
418
|
if (mapping.roles) {
|
|
@@ -179,14 +429,23 @@ function _listOAuth2AdminClients() {
|
|
|
179
429
|
});
|
|
180
430
|
return _listOAuth2AdminClients.apply(this, arguments);
|
|
181
431
|
}
|
|
182
|
-
function listNonOAuth2AdminStaticUserMappings(
|
|
432
|
+
function listNonOAuth2AdminStaticUserMappings(_x3) {
|
|
183
433
|
return _listNonOAuth2AdminStaticUserMappings.apply(this, arguments);
|
|
184
434
|
}
|
|
185
435
|
function _listNonOAuth2AdminStaticUserMappings() {
|
|
186
|
-
_listNonOAuth2AdminStaticUserMappings = _asyncToGenerator(function* (
|
|
187
|
-
var
|
|
436
|
+
_listNonOAuth2AdminStaticUserMappings = _asyncToGenerator(function* (_ref3) {
|
|
437
|
+
var {
|
|
438
|
+
showProtected,
|
|
439
|
+
state
|
|
440
|
+
} = _ref3;
|
|
441
|
+
var clients = yield (0, _OAuth2ClientOps.getOAuth2Clients)({
|
|
442
|
+
state
|
|
443
|
+
});
|
|
188
444
|
clients = clients.map(client => client._id).filter(client => !protectedClients.includes(client));
|
|
189
|
-
var authentication = yield (0, _IdmConfigApi.getConfigEntity)(
|
|
445
|
+
var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
446
|
+
entityId: 'authentication',
|
|
447
|
+
state
|
|
448
|
+
});
|
|
190
449
|
var subjects = authentication.rsFilter.staticUserMapping.filter(mapping => {
|
|
191
450
|
var isPrivileged = false;
|
|
192
451
|
if (mapping.roles) {
|
|
@@ -206,23 +465,35 @@ function _listNonOAuth2AdminStaticUserMappings() {
|
|
|
206
465
|
});
|
|
207
466
|
return _listNonOAuth2AdminStaticUserMappings.apply(this, arguments);
|
|
208
467
|
}
|
|
209
|
-
function getDynamicClientRegistrationScope() {
|
|
468
|
+
function getDynamicClientRegistrationScope(_x4) {
|
|
210
469
|
return _getDynamicClientRegistrationScope.apply(this, arguments);
|
|
211
470
|
}
|
|
212
471
|
function _getDynamicClientRegistrationScope() {
|
|
213
|
-
_getDynamicClientRegistrationScope = _asyncToGenerator(function* () {
|
|
214
|
-
var
|
|
472
|
+
_getDynamicClientRegistrationScope = _asyncToGenerator(function* (_ref4) {
|
|
473
|
+
var {
|
|
474
|
+
state
|
|
475
|
+
} = _ref4;
|
|
476
|
+
var provider = yield (0, _OAuth2ProviderOps.getOAuth2Provider)({
|
|
477
|
+
state
|
|
478
|
+
});
|
|
215
479
|
return provider.clientDynamicRegistrationConfig.dynamicClientRegistrationScope;
|
|
216
480
|
});
|
|
217
481
|
return _getDynamicClientRegistrationScope.apply(this, arguments);
|
|
218
482
|
}
|
|
219
|
-
function addAdminScopes(
|
|
483
|
+
function addAdminScopes(_x5) {
|
|
220
484
|
return _addAdminScopes.apply(this, arguments);
|
|
221
485
|
}
|
|
222
486
|
function _addAdminScopes() {
|
|
223
|
-
_addAdminScopes = _asyncToGenerator(function* (
|
|
487
|
+
_addAdminScopes = _asyncToGenerator(function* (_ref5) {
|
|
488
|
+
var {
|
|
489
|
+
clientId,
|
|
490
|
+
client,
|
|
491
|
+
state
|
|
492
|
+
} = _ref5;
|
|
224
493
|
var modClient = client;
|
|
225
|
-
var allAdminScopes = adminScopes.concat([yield getDynamicClientRegistrationScope(
|
|
494
|
+
var allAdminScopes = adminScopes.concat([yield getDynamicClientRegistrationScope({
|
|
495
|
+
state
|
|
496
|
+
})]);
|
|
226
497
|
var addScopes = [];
|
|
227
498
|
if (modClient.coreOAuth2ClientConfig.scopes && modClient.coreOAuth2ClientConfig.scopes.value) {
|
|
228
499
|
addScopes = allAdminScopes.filter(scope => {
|
|
@@ -254,7 +525,11 @@ function _addAdminScopes() {
|
|
|
254
525
|
});
|
|
255
526
|
return _addAdminScopes.apply(this, arguments);
|
|
256
527
|
}
|
|
257
|
-
function addClientCredentialsGrantType(
|
|
528
|
+
function addClientCredentialsGrantType(_ref6) {
|
|
529
|
+
var {
|
|
530
|
+
clientId,
|
|
531
|
+
client
|
|
532
|
+
} = _ref6;
|
|
258
533
|
var modClient = client;
|
|
259
534
|
var modified = false;
|
|
260
535
|
if (modClient.advancedOAuth2ClientConfig.grantTypes && modClient.advancedOAuth2ClientConfig.grantTypes.value) {
|
|
@@ -273,7 +548,7 @@ function addClientCredentialsGrantType(clientId, client) {
|
|
|
273
548
|
}
|
|
274
549
|
return modClient;
|
|
275
550
|
}
|
|
276
|
-
function addAdminStaticUserMapping(
|
|
551
|
+
function addAdminStaticUserMapping(_x6) {
|
|
277
552
|
return _addAdminStaticUserMapping.apply(this, arguments);
|
|
278
553
|
}
|
|
279
554
|
/*
|
|
@@ -298,10 +573,17 @@ function addAdminStaticUserMapping(_x4) {
|
|
|
298
573
|
}
|
|
299
574
|
*/
|
|
300
575
|
function _addAdminStaticUserMapping() {
|
|
301
|
-
_addAdminStaticUserMapping = _asyncToGenerator(function* (
|
|
576
|
+
_addAdminStaticUserMapping = _asyncToGenerator(function* (_ref7) {
|
|
577
|
+
var {
|
|
578
|
+
name,
|
|
579
|
+
state
|
|
580
|
+
} = _ref7;
|
|
302
581
|
var authentication = {};
|
|
303
582
|
try {
|
|
304
|
-
authentication = yield (0, _IdmConfigApi.getConfigEntity)(
|
|
583
|
+
authentication = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
584
|
+
entityId: 'authentication',
|
|
585
|
+
state
|
|
586
|
+
});
|
|
305
587
|
} catch (error) {
|
|
306
588
|
(0, _Console.printMessage)("Error reading IDM authentication configuration: ".concat(error.message), 'error');
|
|
307
589
|
}
|
|
@@ -337,7 +619,11 @@ function _addAdminStaticUserMapping() {
|
|
|
337
619
|
if (addRoles.length > 0 || needsAdminMapping) {
|
|
338
620
|
(0, _Console.printMessage)("Adding admin roles to static user mapping for client \"".concat(name, "\"..."));
|
|
339
621
|
try {
|
|
340
|
-
yield (0, _IdmConfigApi.putConfigEntity)(
|
|
622
|
+
yield (0, _IdmConfigApi.putConfigEntity)({
|
|
623
|
+
entityId: 'authentication',
|
|
624
|
+
entityData: authentication,
|
|
625
|
+
state
|
|
626
|
+
});
|
|
341
627
|
} catch (putConfigEntityError) {
|
|
342
628
|
(0, _Console.printMessage)(putConfigEntityError, 'error');
|
|
343
629
|
(0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
|
|
@@ -348,13 +634,19 @@ function _addAdminStaticUserMapping() {
|
|
|
348
634
|
});
|
|
349
635
|
return _addAdminStaticUserMapping.apply(this, arguments);
|
|
350
636
|
}
|
|
351
|
-
function addAutoIdStaticUserMapping() {
|
|
637
|
+
function addAutoIdStaticUserMapping(_x7) {
|
|
352
638
|
return _addAutoIdStaticUserMapping.apply(this, arguments);
|
|
353
639
|
}
|
|
354
640
|
function _addAutoIdStaticUserMapping() {
|
|
355
|
-
_addAutoIdStaticUserMapping = _asyncToGenerator(function* () {
|
|
641
|
+
_addAutoIdStaticUserMapping = _asyncToGenerator(function* (_ref8) {
|
|
642
|
+
var {
|
|
643
|
+
state
|
|
644
|
+
} = _ref8;
|
|
356
645
|
var name = 'autoid-resource-server';
|
|
357
|
-
var authentication = yield (0, _IdmConfigApi.getConfigEntity)(
|
|
646
|
+
var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
647
|
+
entityId: 'authentication',
|
|
648
|
+
state
|
|
649
|
+
});
|
|
358
650
|
var needsAdminMapping = true;
|
|
359
651
|
var addRoles = [];
|
|
360
652
|
var mappings = authentication.rsFilter.staticUserMapping.map(mapping => {
|
|
@@ -387,7 +679,11 @@ function _addAutoIdStaticUserMapping() {
|
|
|
387
679
|
if (addRoles.length > 0 || needsAdminMapping) {
|
|
388
680
|
(0, _Console.printMessage)("Adding required roles to static user mapping for AutoId client \"".concat(name, "\"..."));
|
|
389
681
|
try {
|
|
390
|
-
yield (0, _IdmConfigApi.putConfigEntity)(
|
|
682
|
+
yield (0, _IdmConfigApi.putConfigEntity)({
|
|
683
|
+
entityId: 'authentication',
|
|
684
|
+
entityData: authentication,
|
|
685
|
+
state
|
|
686
|
+
});
|
|
391
687
|
} catch (putConfigEntityError) {
|
|
392
688
|
(0, _Console.printMessage)(putConfigEntityError, 'error');
|
|
393
689
|
(0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
|
|
@@ -398,32 +694,60 @@ function _addAutoIdStaticUserMapping() {
|
|
|
398
694
|
});
|
|
399
695
|
return _addAutoIdStaticUserMapping.apply(this, arguments);
|
|
400
696
|
}
|
|
401
|
-
function grantOAuth2ClientAdminPrivileges(
|
|
697
|
+
function grantOAuth2ClientAdminPrivileges(_x8) {
|
|
402
698
|
return _grantOAuth2ClientAdminPrivileges.apply(this, arguments);
|
|
403
699
|
}
|
|
404
700
|
function _grantOAuth2ClientAdminPrivileges() {
|
|
405
|
-
_grantOAuth2ClientAdminPrivileges = _asyncToGenerator(function* (
|
|
406
|
-
var
|
|
701
|
+
_grantOAuth2ClientAdminPrivileges = _asyncToGenerator(function* (_ref9) {
|
|
702
|
+
var {
|
|
703
|
+
clientId,
|
|
704
|
+
state
|
|
705
|
+
} = _ref9;
|
|
706
|
+
var client = yield (0, _OAuth2ClientOps.getOAuth2Client)({
|
|
707
|
+
clientId,
|
|
708
|
+
state
|
|
709
|
+
});
|
|
407
710
|
if (client.coreOAuth2ClientConfig.clientName.value.length === 0) {
|
|
408
711
|
client.coreOAuth2ClientConfig.clientName.value = [clientId];
|
|
409
712
|
}
|
|
410
713
|
if (client.advancedOAuth2ClientConfig.descriptions.value.length === 0 || client.advancedOAuth2ClientConfig.descriptions.value[0].startsWith('Modified by Frodo') || client.advancedOAuth2ClientConfig.descriptions.value[0].startsWith('Created by Frodo')) {
|
|
411
714
|
client.advancedOAuth2ClientConfig.descriptions.value = ["Modified by Frodo on ".concat(new Date().toLocaleString())];
|
|
412
715
|
}
|
|
413
|
-
client = yield addAdminScopes(
|
|
414
|
-
|
|
415
|
-
|
|
416
|
-
|
|
716
|
+
client = yield addAdminScopes({
|
|
717
|
+
clientId,
|
|
718
|
+
client,
|
|
719
|
+
state
|
|
720
|
+
});
|
|
721
|
+
client = addClientCredentialsGrantType({
|
|
722
|
+
clientId,
|
|
723
|
+
client
|
|
724
|
+
});
|
|
725
|
+
yield (0, _OAuth2ClientOps.putOAuth2Client)({
|
|
726
|
+
clientId,
|
|
727
|
+
clientData: client,
|
|
728
|
+
state
|
|
729
|
+
});
|
|
730
|
+
yield addAdminStaticUserMapping({
|
|
731
|
+
name: clientId,
|
|
732
|
+
state
|
|
733
|
+
});
|
|
417
734
|
});
|
|
418
735
|
return _grantOAuth2ClientAdminPrivileges.apply(this, arguments);
|
|
419
736
|
}
|
|
420
|
-
function removeAdminScopes(
|
|
737
|
+
function removeAdminScopes(_x9) {
|
|
421
738
|
return _removeAdminScopes.apply(this, arguments);
|
|
422
739
|
}
|
|
423
740
|
function _removeAdminScopes() {
|
|
424
|
-
_removeAdminScopes = _asyncToGenerator(function* (
|
|
741
|
+
_removeAdminScopes = _asyncToGenerator(function* (_ref10) {
|
|
742
|
+
var {
|
|
743
|
+
name,
|
|
744
|
+
client,
|
|
745
|
+
state
|
|
746
|
+
} = _ref10;
|
|
425
747
|
var modClient = client;
|
|
426
|
-
var allAdminScopes = adminScopes.concat([yield getDynamicClientRegistrationScope(
|
|
748
|
+
var allAdminScopes = adminScopes.concat([yield getDynamicClientRegistrationScope({
|
|
749
|
+
state
|
|
750
|
+
})]);
|
|
427
751
|
var finalScopes = [];
|
|
428
752
|
if (modClient.coreOAuth2ClientConfig.scopes && modClient.coreOAuth2ClientConfig.scopes.value) {
|
|
429
753
|
finalScopes = modClient.coreOAuth2ClientConfig.scopes.value.filter(scope => !allAdminScopes.includes(scope));
|
|
@@ -448,7 +772,11 @@ function _removeAdminScopes() {
|
|
|
448
772
|
});
|
|
449
773
|
return _removeAdminScopes.apply(this, arguments);
|
|
450
774
|
}
|
|
451
|
-
function removeClientCredentialsGrantType(
|
|
775
|
+
function removeClientCredentialsGrantType(_ref11) {
|
|
776
|
+
var {
|
|
777
|
+
clientId,
|
|
778
|
+
client
|
|
779
|
+
} = _ref11;
|
|
452
780
|
var modClient = client;
|
|
453
781
|
var modified = false;
|
|
454
782
|
var finalGrantTypes = [];
|
|
@@ -464,12 +792,19 @@ function removeClientCredentialsGrantType(clientId, client) {
|
|
|
464
792
|
}
|
|
465
793
|
return modClient;
|
|
466
794
|
}
|
|
467
|
-
function removeAdminStaticUserMapping(
|
|
795
|
+
function removeAdminStaticUserMapping(_x10) {
|
|
468
796
|
return _removeAdminStaticUserMapping.apply(this, arguments);
|
|
469
797
|
}
|
|
470
798
|
function _removeAdminStaticUserMapping() {
|
|
471
|
-
_removeAdminStaticUserMapping = _asyncToGenerator(function* (
|
|
472
|
-
var
|
|
799
|
+
_removeAdminStaticUserMapping = _asyncToGenerator(function* (_ref12) {
|
|
800
|
+
var {
|
|
801
|
+
name,
|
|
802
|
+
state
|
|
803
|
+
} = _ref12;
|
|
804
|
+
var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
805
|
+
entityId: 'authentication',
|
|
806
|
+
state
|
|
807
|
+
});
|
|
473
808
|
var finalRoles = [];
|
|
474
809
|
var removeMapping = false;
|
|
475
810
|
var modified = false;
|
|
@@ -493,7 +828,11 @@ function _removeAdminStaticUserMapping() {
|
|
|
493
828
|
(0, _Console.printMessage)("Removing admin roles from static user mapping for client \"".concat(name, "\"..."));
|
|
494
829
|
}
|
|
495
830
|
try {
|
|
496
|
-
yield (0, _IdmConfigApi.putConfigEntity)(
|
|
831
|
+
yield (0, _IdmConfigApi.putConfigEntity)({
|
|
832
|
+
entityId: 'authentication',
|
|
833
|
+
entityData: authentication,
|
|
834
|
+
state
|
|
835
|
+
});
|
|
497
836
|
} catch (putConfigEntityError) {
|
|
498
837
|
(0, _Console.printMessage)(putConfigEntityError, 'error');
|
|
499
838
|
(0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
|
|
@@ -504,74 +843,146 @@ function _removeAdminStaticUserMapping() {
|
|
|
504
843
|
});
|
|
505
844
|
return _removeAdminStaticUserMapping.apply(this, arguments);
|
|
506
845
|
}
|
|
507
|
-
function revokeOAuth2ClientAdminPrivileges(
|
|
846
|
+
function revokeOAuth2ClientAdminPrivileges(_x11) {
|
|
508
847
|
return _revokeOAuth2ClientAdminPrivileges.apply(this, arguments);
|
|
509
848
|
}
|
|
510
849
|
function _revokeOAuth2ClientAdminPrivileges() {
|
|
511
|
-
_revokeOAuth2ClientAdminPrivileges = _asyncToGenerator(function* (
|
|
512
|
-
var
|
|
850
|
+
_revokeOAuth2ClientAdminPrivileges = _asyncToGenerator(function* (_ref13) {
|
|
851
|
+
var {
|
|
852
|
+
clientId,
|
|
853
|
+
state
|
|
854
|
+
} = _ref13;
|
|
855
|
+
var client = yield (0, _OAuth2ClientOps.getOAuth2Client)({
|
|
856
|
+
clientId,
|
|
857
|
+
state
|
|
858
|
+
});
|
|
513
859
|
if (client.coreOAuth2ClientConfig.clientName.value.length === 0) {
|
|
514
860
|
client.coreOAuth2ClientConfig.clientName.value = [clientId];
|
|
515
861
|
}
|
|
516
862
|
if (client.advancedOAuth2ClientConfig.descriptions.value.length === 0 || client.advancedOAuth2ClientConfig.descriptions.value[0].startsWith('Modified by Frodo') || client.advancedOAuth2ClientConfig.descriptions.value[0].startsWith('Created by Frodo')) {
|
|
517
863
|
client.advancedOAuth2ClientConfig.descriptions.value = ["Modified by Frodo on ".concat(new Date().toLocaleString())];
|
|
518
864
|
}
|
|
519
|
-
client = yield removeAdminScopes(
|
|
520
|
-
|
|
521
|
-
|
|
522
|
-
|
|
865
|
+
client = yield removeAdminScopes({
|
|
866
|
+
name: clientId,
|
|
867
|
+
client,
|
|
868
|
+
state
|
|
869
|
+
});
|
|
870
|
+
client = removeClientCredentialsGrantType({
|
|
871
|
+
clientId,
|
|
872
|
+
client
|
|
873
|
+
});
|
|
874
|
+
yield (0, _OAuth2ClientOps.putOAuth2Client)({
|
|
875
|
+
clientId,
|
|
876
|
+
clientData: client,
|
|
877
|
+
state
|
|
878
|
+
});
|
|
879
|
+
yield removeAdminStaticUserMapping({
|
|
880
|
+
name: clientId,
|
|
881
|
+
state
|
|
882
|
+
});
|
|
523
883
|
});
|
|
524
884
|
return _revokeOAuth2ClientAdminPrivileges.apply(this, arguments);
|
|
525
885
|
}
|
|
526
|
-
function createOAuth2ClientWithAdminPrivileges(
|
|
886
|
+
function createOAuth2ClientWithAdminPrivileges(_x12) {
|
|
527
887
|
return _createOAuth2ClientWithAdminPrivileges.apply(this, arguments);
|
|
528
888
|
}
|
|
529
889
|
function _createOAuth2ClientWithAdminPrivileges() {
|
|
530
|
-
_createOAuth2ClientWithAdminPrivileges = _asyncToGenerator(function* (
|
|
890
|
+
_createOAuth2ClientWithAdminPrivileges = _asyncToGenerator(function* (_ref14) {
|
|
891
|
+
var {
|
|
892
|
+
clientId,
|
|
893
|
+
clientSecret,
|
|
894
|
+
state
|
|
895
|
+
} = _ref14;
|
|
531
896
|
var client = OAUTH2_CLIENT;
|
|
532
897
|
client.coreOAuth2ClientConfig.userpassword = clientSecret;
|
|
533
898
|
client.coreOAuth2ClientConfig.clientName.value = [clientId];
|
|
534
899
|
client.advancedOAuth2ClientConfig.descriptions.value = ["Created by Frodo on ".concat(new Date().toLocaleString())];
|
|
535
900
|
try {
|
|
536
|
-
client = yield addAdminScopes(
|
|
537
|
-
|
|
538
|
-
|
|
901
|
+
client = yield addAdminScopes({
|
|
902
|
+
clientId,
|
|
903
|
+
client,
|
|
904
|
+
state
|
|
905
|
+
});
|
|
906
|
+
yield (0, _OAuth2ClientOps.putOAuth2Client)({
|
|
907
|
+
clientId,
|
|
908
|
+
clientData: client,
|
|
909
|
+
state
|
|
910
|
+
});
|
|
911
|
+
yield addAdminStaticUserMapping({
|
|
912
|
+
name: clientId,
|
|
913
|
+
state
|
|
914
|
+
});
|
|
539
915
|
} catch (error) {
|
|
540
916
|
(0, _Console.printMessage)("Error creating oauth2 client: ".concat(error.message), 'error');
|
|
541
917
|
}
|
|
542
918
|
});
|
|
543
919
|
return _createOAuth2ClientWithAdminPrivileges.apply(this, arguments);
|
|
544
920
|
}
|
|
545
|
-
function createLongLivedToken(
|
|
921
|
+
function createLongLivedToken(_x13) {
|
|
546
922
|
return _createLongLivedToken.apply(this, arguments);
|
|
547
923
|
}
|
|
548
924
|
function _createLongLivedToken() {
|
|
549
|
-
_createLongLivedToken = _asyncToGenerator(function* (
|
|
925
|
+
_createLongLivedToken = _asyncToGenerator(function* (_ref15) {
|
|
926
|
+
var {
|
|
927
|
+
clientId,
|
|
928
|
+
clientSecret,
|
|
929
|
+
scope,
|
|
930
|
+
secret,
|
|
931
|
+
lifetime,
|
|
932
|
+
state
|
|
933
|
+
} = _ref15;
|
|
550
934
|
// get oauth2 client
|
|
551
|
-
var client = yield (0, _OAuth2ClientOps.getOAuth2Client)(
|
|
935
|
+
var client = yield (0, _OAuth2ClientOps.getOAuth2Client)({
|
|
936
|
+
clientId,
|
|
937
|
+
state
|
|
938
|
+
});
|
|
552
939
|
client.userpassword = clientSecret;
|
|
553
940
|
// remember current lifetime
|
|
554
941
|
var rememberedLifetime = client.coreOAuth2ClientConfig.accessTokenLifetime.value || 3600;
|
|
555
942
|
// set long token lifetime
|
|
556
943
|
client.coreOAuth2ClientConfig.accessTokenLifetime.value = lifetime;
|
|
557
|
-
yield (0, _OAuth2ClientOps.putOAuth2Client)(
|
|
558
|
-
|
|
944
|
+
yield (0, _OAuth2ClientOps.putOAuth2Client)({
|
|
945
|
+
clientId,
|
|
946
|
+
clientData: client,
|
|
947
|
+
state
|
|
948
|
+
});
|
|
949
|
+
var response = yield (0, _OAuth2OIDCApi.clientCredentialsGrant)({
|
|
950
|
+
amBaseUrl: state.getHost(),
|
|
951
|
+
clientId,
|
|
952
|
+
clientSecret,
|
|
953
|
+
scope,
|
|
954
|
+
state
|
|
955
|
+
});
|
|
559
956
|
var expires = new Date().getTime() + 1000 * response.expires_in;
|
|
560
957
|
response.expires_on = new Date(expires).toLocaleString();
|
|
561
958
|
// reset token lifetime
|
|
562
959
|
client.coreOAuth2ClientConfig.accessTokenLifetime.value = rememberedLifetime;
|
|
563
|
-
yield (0, _OAuth2ClientOps.putOAuth2Client)(
|
|
960
|
+
yield (0, _OAuth2ClientOps.putOAuth2Client)({
|
|
961
|
+
clientId,
|
|
962
|
+
clientData: client,
|
|
963
|
+
state
|
|
964
|
+
});
|
|
564
965
|
// create secret with token as value
|
|
565
966
|
if (secret) {
|
|
566
967
|
var description = 'Long-lived admin token';
|
|
567
968
|
try {
|
|
568
|
-
yield (0, _SecretsApi.putSecret)(
|
|
969
|
+
yield (0, _SecretsApi.putSecret)({
|
|
970
|
+
secretId: secret,
|
|
971
|
+
value: response.access_token,
|
|
972
|
+
description,
|
|
973
|
+
state
|
|
974
|
+
});
|
|
569
975
|
response.secret = secret;
|
|
570
976
|
} catch (error) {
|
|
571
977
|
if (_lodash.default.get(error, 'response.data.code') === 400 && _lodash.default.get(error, 'response.data.message') === 'Failed to create secret, the secret already exists') {
|
|
572
978
|
var newSecret = "".concat(secret, "-").concat(expires);
|
|
573
979
|
(0, _Console.printMessage)("esv '".concat(secret, "' already exists, using ").concat(newSecret), 'warn');
|
|
574
|
-
yield (0, _SecretsApi.putSecret)(
|
|
980
|
+
yield (0, _SecretsApi.putSecret)({
|
|
981
|
+
secretId: newSecret,
|
|
982
|
+
value: response.access_token,
|
|
983
|
+
description,
|
|
984
|
+
state
|
|
985
|
+
});
|
|
575
986
|
response.secret = newSecret;
|
|
576
987
|
}
|
|
577
988
|
}
|
|
@@ -581,12 +992,19 @@ function _createLongLivedToken() {
|
|
|
581
992
|
});
|
|
582
993
|
return _createLongLivedToken.apply(this, arguments);
|
|
583
994
|
}
|
|
584
|
-
function removeStaticUserMapping(
|
|
995
|
+
function removeStaticUserMapping(_x14) {
|
|
585
996
|
return _removeStaticUserMapping.apply(this, arguments);
|
|
586
997
|
}
|
|
587
998
|
function _removeStaticUserMapping() {
|
|
588
|
-
_removeStaticUserMapping = _asyncToGenerator(function* (
|
|
589
|
-
var
|
|
999
|
+
_removeStaticUserMapping = _asyncToGenerator(function* (_ref16) {
|
|
1000
|
+
var {
|
|
1001
|
+
subject,
|
|
1002
|
+
state
|
|
1003
|
+
} = _ref16;
|
|
1004
|
+
var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
1005
|
+
entityId: 'authentication',
|
|
1006
|
+
state
|
|
1007
|
+
});
|
|
590
1008
|
var removeMapping = false;
|
|
591
1009
|
var mappings = authentication.rsFilter.staticUserMapping.filter(mapping => {
|
|
592
1010
|
// find the subject and flag it
|
|
@@ -600,7 +1018,11 @@ function _removeStaticUserMapping() {
|
|
|
600
1018
|
if (removeMapping) {
|
|
601
1019
|
(0, _Console.printMessage)("Removing static user mapping for subject \"".concat(subject, "\"..."));
|
|
602
1020
|
try {
|
|
603
|
-
yield (0, _IdmConfigApi.putConfigEntity)(
|
|
1021
|
+
yield (0, _IdmConfigApi.putConfigEntity)({
|
|
1022
|
+
entityId: 'authentication',
|
|
1023
|
+
entityData: authentication,
|
|
1024
|
+
state
|
|
1025
|
+
});
|
|
604
1026
|
} catch (putConfigEntityError) {
|
|
605
1027
|
(0, _Console.printMessage)(putConfigEntityError, 'error');
|
|
606
1028
|
(0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
|
|
@@ -611,16 +1033,26 @@ function _removeStaticUserMapping() {
|
|
|
611
1033
|
});
|
|
612
1034
|
return _removeStaticUserMapping.apply(this, arguments);
|
|
613
1035
|
}
|
|
614
|
-
function hideGenericExtensionAttributes(
|
|
1036
|
+
function hideGenericExtensionAttributes(_x15) {
|
|
615
1037
|
return _hideGenericExtensionAttributes.apply(this, arguments);
|
|
616
1038
|
}
|
|
617
1039
|
function _hideGenericExtensionAttributes() {
|
|
618
|
-
_hideGenericExtensionAttributes = _asyncToGenerator(function* (
|
|
619
|
-
var
|
|
1040
|
+
_hideGenericExtensionAttributes = _asyncToGenerator(function* (_ref17) {
|
|
1041
|
+
var {
|
|
1042
|
+
includeCustomized,
|
|
1043
|
+
dryRun,
|
|
1044
|
+
state
|
|
1045
|
+
} = _ref17;
|
|
1046
|
+
var managed = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
1047
|
+
entityId: 'managed',
|
|
1048
|
+
state
|
|
1049
|
+
});
|
|
620
1050
|
var propertyNames = Object.keys(GENERIC_EXTENSION_ATTRIBUTES);
|
|
621
1051
|
var updatedObjects = managed.objects.map(object => {
|
|
622
1052
|
// ignore all other objects
|
|
623
|
-
if (object.name !== (0, _OpsUtils.getRealmManagedUser)(
|
|
1053
|
+
if (object.name !== (0, _OpsUtils.getRealmManagedUser)({
|
|
1054
|
+
state
|
|
1055
|
+
})) {
|
|
624
1056
|
return object;
|
|
625
1057
|
}
|
|
626
1058
|
propertyNames.forEach(name => {
|
|
@@ -643,7 +1075,11 @@ function _hideGenericExtensionAttributes() {
|
|
|
643
1075
|
(0, _Console.printMessage)('Dry-run only. Changes are not saved.');
|
|
644
1076
|
} else {
|
|
645
1077
|
try {
|
|
646
|
-
yield (0, _IdmConfigApi.putConfigEntity)(
|
|
1078
|
+
yield (0, _IdmConfigApi.putConfigEntity)({
|
|
1079
|
+
entityId: 'managed',
|
|
1080
|
+
entityData: managed,
|
|
1081
|
+
state
|
|
1082
|
+
});
|
|
647
1083
|
} catch (putConfigEntityError) {
|
|
648
1084
|
(0, _Console.printMessage)(putConfigEntityError, 'error');
|
|
649
1085
|
(0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
|
|
@@ -652,16 +1088,26 @@ function _hideGenericExtensionAttributes() {
|
|
|
652
1088
|
});
|
|
653
1089
|
return _hideGenericExtensionAttributes.apply(this, arguments);
|
|
654
1090
|
}
|
|
655
|
-
function showGenericExtensionAttributes(
|
|
1091
|
+
function showGenericExtensionAttributes(_x16) {
|
|
656
1092
|
return _showGenericExtensionAttributes.apply(this, arguments);
|
|
657
1093
|
}
|
|
658
1094
|
function _showGenericExtensionAttributes() {
|
|
659
|
-
_showGenericExtensionAttributes = _asyncToGenerator(function* (
|
|
660
|
-
var
|
|
1095
|
+
_showGenericExtensionAttributes = _asyncToGenerator(function* (_ref18) {
|
|
1096
|
+
var {
|
|
1097
|
+
includeCustomized,
|
|
1098
|
+
dryRun,
|
|
1099
|
+
state
|
|
1100
|
+
} = _ref18;
|
|
1101
|
+
var managed = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
1102
|
+
entityId: 'managed',
|
|
1103
|
+
state
|
|
1104
|
+
});
|
|
661
1105
|
var propertyNames = Object.keys(GENERIC_EXTENSION_ATTRIBUTES);
|
|
662
1106
|
var updatedObjects = managed.objects.map(object => {
|
|
663
1107
|
// ignore all other objects
|
|
664
|
-
if (object.name !== (0, _OpsUtils.getRealmManagedUser)(
|
|
1108
|
+
if (object.name !== (0, _OpsUtils.getRealmManagedUser)({
|
|
1109
|
+
state
|
|
1110
|
+
})) {
|
|
665
1111
|
return object;
|
|
666
1112
|
}
|
|
667
1113
|
propertyNames.forEach(name => {
|
|
@@ -684,7 +1130,11 @@ function _showGenericExtensionAttributes() {
|
|
|
684
1130
|
(0, _Console.printMessage)('Dry-run only. Changes are not saved.');
|
|
685
1131
|
} else {
|
|
686
1132
|
try {
|
|
687
|
-
yield (0, _IdmConfigApi.putConfigEntity)(
|
|
1133
|
+
yield (0, _IdmConfigApi.putConfigEntity)({
|
|
1134
|
+
entityId: 'managed',
|
|
1135
|
+
entityData: managed,
|
|
1136
|
+
state
|
|
1137
|
+
});
|
|
688
1138
|
} catch (putConfigEntityError) {
|
|
689
1139
|
(0, _Console.printMessage)(putConfigEntityError, 'error');
|
|
690
1140
|
(0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
|
|
@@ -693,17 +1143,26 @@ function _showGenericExtensionAttributes() {
|
|
|
693
1143
|
});
|
|
694
1144
|
return _showGenericExtensionAttributes.apply(this, arguments);
|
|
695
1145
|
}
|
|
696
|
-
function repairOrgModelUser(
|
|
1146
|
+
function repairOrgModelUser(_x17) {
|
|
697
1147
|
return _repairOrgModelUser.apply(this, arguments);
|
|
698
1148
|
}
|
|
699
1149
|
function _repairOrgModelUser() {
|
|
700
|
-
_repairOrgModelUser = _asyncToGenerator(function* (
|
|
701
|
-
var
|
|
1150
|
+
_repairOrgModelUser = _asyncToGenerator(function* (_ref19) {
|
|
1151
|
+
var {
|
|
1152
|
+
dryRun,
|
|
1153
|
+
state
|
|
1154
|
+
} = _ref19;
|
|
1155
|
+
var managed = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
1156
|
+
entityId: 'managed',
|
|
1157
|
+
state
|
|
1158
|
+
});
|
|
702
1159
|
var RDVPs = ['memberOfOrgIDs'];
|
|
703
1160
|
var repairData = false;
|
|
704
1161
|
var updatedObjects = managed.objects.map(object => {
|
|
705
1162
|
// ignore all other objects
|
|
706
|
-
if (object.name !== (0, _OpsUtils.getRealmManagedUser)(
|
|
1163
|
+
if (object.name !== (0, _OpsUtils.getRealmManagedUser)({
|
|
1164
|
+
state
|
|
1165
|
+
})) {
|
|
707
1166
|
return object;
|
|
708
1167
|
}
|
|
709
1168
|
(0, _Console.printMessage)("".concat(object.name, ": checking..."));
|
|
@@ -722,7 +1181,11 @@ function _repairOrgModelUser() {
|
|
|
722
1181
|
managed.objects = updatedObjects;
|
|
723
1182
|
if (!dryRun) {
|
|
724
1183
|
try {
|
|
725
|
-
yield (0, _IdmConfigApi.putConfigEntity)(
|
|
1184
|
+
yield (0, _IdmConfigApi.putConfigEntity)({
|
|
1185
|
+
entityId: 'managed',
|
|
1186
|
+
entityData: managed,
|
|
1187
|
+
state
|
|
1188
|
+
});
|
|
726
1189
|
} catch (putConfigEntityError) {
|
|
727
1190
|
(0, _Console.printMessage)(putConfigEntityError, 'error');
|
|
728
1191
|
(0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
|
|
@@ -732,17 +1195,26 @@ function _repairOrgModelUser() {
|
|
|
732
1195
|
});
|
|
733
1196
|
return _repairOrgModelUser.apply(this, arguments);
|
|
734
1197
|
}
|
|
735
|
-
function repairOrgModelOrg(
|
|
1198
|
+
function repairOrgModelOrg(_x18) {
|
|
736
1199
|
return _repairOrgModelOrg.apply(this, arguments);
|
|
737
1200
|
}
|
|
738
1201
|
function _repairOrgModelOrg() {
|
|
739
|
-
_repairOrgModelOrg = _asyncToGenerator(function* (
|
|
740
|
-
var
|
|
1202
|
+
_repairOrgModelOrg = _asyncToGenerator(function* (_ref20) {
|
|
1203
|
+
var {
|
|
1204
|
+
dryRun,
|
|
1205
|
+
state
|
|
1206
|
+
} = _ref20;
|
|
1207
|
+
var managed = yield (0, _IdmConfigApi.getConfigEntity)({
|
|
1208
|
+
entityId: 'managed',
|
|
1209
|
+
state
|
|
1210
|
+
});
|
|
741
1211
|
var RDVPs = ['adminIDs', 'ownerIDs', 'parentAdminIDs', 'parentOwnerIDs', 'parentIDs'];
|
|
742
1212
|
var repairData = false;
|
|
743
1213
|
var updatedObjects = managed.objects.map(object => {
|
|
744
1214
|
// ignore all other objects
|
|
745
|
-
if (object.name !== (0, _OrganizationOps.getRealmManagedOrganization)(
|
|
1215
|
+
if (object.name !== (0, _OrganizationOps.getRealmManagedOrganization)({
|
|
1216
|
+
state
|
|
1217
|
+
})) {
|
|
746
1218
|
return object;
|
|
747
1219
|
}
|
|
748
1220
|
(0, _Console.printMessage)("".concat(object.name, ": checking..."));
|
|
@@ -761,7 +1233,11 @@ function _repairOrgModelOrg() {
|
|
|
761
1233
|
managed.objects = updatedObjects;
|
|
762
1234
|
if (!dryRun) {
|
|
763
1235
|
try {
|
|
764
|
-
yield (0, _IdmConfigApi.putConfigEntity)(
|
|
1236
|
+
yield (0, _IdmConfigApi.putConfigEntity)({
|
|
1237
|
+
entityId: 'managed',
|
|
1238
|
+
entityData: managed,
|
|
1239
|
+
state
|
|
1240
|
+
});
|
|
765
1241
|
} catch (putConfigEntityError) {
|
|
766
1242
|
(0, _Console.printMessage)(putConfigEntityError, 'error');
|
|
767
1243
|
(0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
|
|
@@ -795,7 +1271,7 @@ function _extendOrgModelPermissins() {
|
|
|
795
1271
|
});
|
|
796
1272
|
return _extendOrgModelPermissins.apply(this, arguments);
|
|
797
1273
|
}
|
|
798
|
-
function repairOrgModel(
|
|
1274
|
+
function repairOrgModel(_x19) {
|
|
799
1275
|
return _repairOrgModel.apply(this, arguments);
|
|
800
1276
|
} // suggested by John K.
|
|
801
1277
|
// export async function removeRealmNameFromManagedObjectLabels() {}
|
|
@@ -803,10 +1279,22 @@ function repairOrgModel(_x24, _x25, _x26) {
|
|
|
803
1279
|
// export async function cleanUpPostmanArtifacts() {}
|
|
804
1280
|
// export async function createSampleThemes() {}
|
|
805
1281
|
function _repairOrgModel() {
|
|
806
|
-
_repairOrgModel = _asyncToGenerator(function* (
|
|
1282
|
+
_repairOrgModel = _asyncToGenerator(function* (_ref21) {
|
|
1283
|
+
var {
|
|
1284
|
+
excludeCustomized,
|
|
1285
|
+
extendPermissions,
|
|
1286
|
+
dryRun,
|
|
1287
|
+
state
|
|
1288
|
+
} = _ref21;
|
|
807
1289
|
var repairData = false;
|
|
808
|
-
repairData = repairData || (yield repairOrgModelUser(
|
|
809
|
-
|
|
1290
|
+
repairData = repairData || (yield repairOrgModelUser({
|
|
1291
|
+
dryRun,
|
|
1292
|
+
state
|
|
1293
|
+
}));
|
|
1294
|
+
repairData = repairData || (yield repairOrgModelOrg({
|
|
1295
|
+
dryRun,
|
|
1296
|
+
state
|
|
1297
|
+
}));
|
|
810
1298
|
if (excludeCustomized) {
|
|
811
1299
|
//
|
|
812
1300
|
}
|