@rockcarver/frodo-lib 1.0.0 → 2.0.0-2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (415) hide show
  1. package/CHANGELOG.md +6 -6
  2. package/cjs/api/AgentApi.js +91 -37
  3. package/cjs/api/AgentApi.js.map +1 -1
  4. package/cjs/api/AgentApi.test.js.map +1 -1
  5. package/cjs/api/ApiTypes.js.map +1 -1
  6. package/cjs/api/AuthenticateApi.js +18 -11
  7. package/cjs/api/AuthenticateApi.js.map +1 -1
  8. package/cjs/api/AuthenticateApi.test.js.map +1 -1
  9. package/cjs/api/BaseApi.js +50 -26
  10. package/cjs/api/BaseApi.js.map +1 -1
  11. package/cjs/api/CirclesOfTrustApi.js +47 -23
  12. package/cjs/api/CirclesOfTrustApi.js.map +1 -1
  13. package/cjs/api/IdmConfigApi.js +54 -21
  14. package/cjs/api/IdmConfigApi.js.map +1 -1
  15. package/cjs/api/IdmSystemApi.js +9 -6
  16. package/cjs/api/IdmSystemApi.js.map +1 -1
  17. package/cjs/api/ManagedObjectApi.js +49 -27
  18. package/cjs/api/ManagedObjectApi.js.map +1 -1
  19. package/cjs/api/NodeApi.js +71 -32
  20. package/cjs/api/NodeApi.js.map +1 -1
  21. package/cjs/api/NodeApi.test.js.map +1 -1
  22. package/cjs/api/OAuth2ClientApi.js +43 -20
  23. package/cjs/api/OAuth2ClientApi.js.map +1 -1
  24. package/cjs/api/OAuth2OIDCApi.js +74 -27
  25. package/cjs/api/OAuth2OIDCApi.js.map +1 -1
  26. package/cjs/api/OAuth2OIDCApi.test.js.map +1 -1
  27. package/cjs/api/OAuth2ProviderApi.js +10 -9
  28. package/cjs/api/OAuth2ProviderApi.js.map +1 -1
  29. package/cjs/api/PoliciesApi.js +54 -22
  30. package/cjs/api/PoliciesApi.js.map +1 -1
  31. package/cjs/api/PoliciesApi.test.js.map +1 -1
  32. package/cjs/api/PolicySetApi.js +54 -23
  33. package/cjs/api/PolicySetApi.js.map +1 -1
  34. package/cjs/api/PolicySetApi.test.js.map +1 -1
  35. package/cjs/api/RealmApi.js +73 -29
  36. package/cjs/api/RealmApi.js.map +1 -1
  37. package/cjs/api/ResourceTypesApi.js +67 -28
  38. package/cjs/api/ResourceTypesApi.js.map +1 -1
  39. package/cjs/api/ResourceTypesApi.test.js.map +1 -1
  40. package/cjs/api/Saml2Api.js +90 -122
  41. package/cjs/api/Saml2Api.js.map +1 -1
  42. package/cjs/api/ScriptApi.js +54 -23
  43. package/cjs/api/ScriptApi.js.map +1 -1
  44. package/cjs/api/ServerInfoApi.js +23 -10
  45. package/cjs/api/ServerInfoApi.js.map +1 -1
  46. package/cjs/api/ServiceApi.js +91 -42
  47. package/cjs/api/ServiceApi.js.map +1 -1
  48. package/cjs/api/SocialIdentityProvidersApi.js +70 -31
  49. package/cjs/api/SocialIdentityProvidersApi.js.map +1 -1
  50. package/cjs/api/TreeApi.js +43 -20
  51. package/cjs/api/TreeApi.js.map +1 -1
  52. package/cjs/api/TreeApi.test.js.map +1 -1
  53. package/cjs/api/cloud/EnvInfoApi.js +10 -6
  54. package/cjs/api/cloud/EnvInfoApi.js.map +1 -1
  55. package/cjs/api/cloud/FeatureApi.js +9 -6
  56. package/cjs/api/cloud/FeatureApi.js.map +1 -1
  57. package/cjs/api/cloud/LogApi.js +48 -18
  58. package/cjs/api/cloud/LogApi.js.map +1 -1
  59. package/cjs/api/cloud/SecretsApi.js +109 -35
  60. package/cjs/api/cloud/SecretsApi.js.map +1 -1
  61. package/cjs/api/cloud/SecretsApi.test.js.map +1 -1
  62. package/cjs/api/cloud/StartupApi.js +21 -10
  63. package/cjs/api/cloud/StartupApi.js.map +1 -1
  64. package/cjs/api/cloud/StartupApi.test.js.map +1 -1
  65. package/cjs/api/cloud/VariablesApi.js +52 -20
  66. package/cjs/api/cloud/VariablesApi.js.map +1 -1
  67. package/cjs/api/cloud/VariablesApi.test.js.map +1 -1
  68. package/cjs/api/utils/ApiUtils.js +2 -5
  69. package/cjs/api/utils/ApiUtils.js.map +1 -1
  70. package/cjs/api/utils/ApiUtils.test.js.map +1 -1
  71. package/cjs/index.js +13 -112
  72. package/cjs/index.js.map +1 -1
  73. package/cjs/lib/FrodoLib.js +142 -0
  74. package/cjs/lib/FrodoLib.js.map +1 -0
  75. package/cjs/ops/AdminOps.js +578 -90
  76. package/cjs/ops/AdminOps.js.map +1 -1
  77. package/cjs/ops/AgentOps.js +964 -118
  78. package/cjs/ops/AgentOps.js.map +1 -1
  79. package/cjs/ops/AgentOps.test.js.map +1 -1
  80. package/cjs/ops/AuthenticateOps.js +182 -87
  81. package/cjs/ops/AuthenticateOps.js.map +1 -1
  82. package/cjs/ops/AuthenticateOps.test.js.map +1 -1
  83. package/cjs/ops/CirclesOfTrustOps.js +360 -291
  84. package/cjs/ops/CirclesOfTrustOps.js.map +1 -1
  85. package/cjs/ops/ConnectionProfileOps.js +221 -139
  86. package/cjs/ops/ConnectionProfileOps.js.map +1 -1
  87. package/cjs/ops/ConnectionProfileOps.test.js.map +1 -1
  88. package/cjs/ops/EmailTemplateOps.js +84 -10
  89. package/cjs/ops/EmailTemplateOps.js.map +1 -1
  90. package/cjs/ops/EmailTemplateOps.test.js.map +1 -1
  91. package/cjs/ops/IdmOps.js +97 -81
  92. package/cjs/ops/IdmOps.js.map +1 -1
  93. package/cjs/ops/IdmOps.test.js.map +1 -1
  94. package/cjs/ops/IdpOps.js +275 -42
  95. package/cjs/ops/IdpOps.js.map +1 -1
  96. package/cjs/ops/IdpOps.test.js.map +1 -1
  97. package/cjs/ops/InfoOps.js +42 -27
  98. package/cjs/ops/InfoOps.js.map +1 -1
  99. package/cjs/ops/JoseOps.test.js.map +1 -1
  100. package/cjs/ops/JourneyOps.js +721 -126
  101. package/cjs/ops/JourneyOps.js.map +1 -1
  102. package/cjs/ops/JourneyOps.test.js.map +1 -1
  103. package/cjs/ops/ManagedObjectOps.js +79 -12
  104. package/cjs/ops/ManagedObjectOps.js.map +1 -1
  105. package/cjs/ops/NodeOps.js +127 -100
  106. package/cjs/ops/NodeOps.js.map +1 -1
  107. package/cjs/ops/OAuth2ClientOps.js +323 -65
  108. package/cjs/ops/OAuth2ClientOps.js.map +1 -1
  109. package/cjs/ops/OAuth2ClientOps.test.js.map +1 -1
  110. package/cjs/ops/OAuth2OidcOps.js +84 -0
  111. package/cjs/ops/OAuth2OidcOps.js.map +1 -0
  112. package/cjs/ops/OAuth2ProviderOps.js +20 -13
  113. package/cjs/ops/OAuth2ProviderOps.js.map +1 -1
  114. package/cjs/ops/OpsTypes.js.map +1 -1
  115. package/cjs/ops/OrganizationOps.js +67 -12
  116. package/cjs/ops/OrganizationOps.js.map +1 -1
  117. package/cjs/ops/PolicyOps.js +476 -136
  118. package/cjs/ops/PolicyOps.js.map +1 -1
  119. package/cjs/ops/PolicyOps.test.js.map +1 -1
  120. package/cjs/ops/PolicySetOps.js +402 -132
  121. package/cjs/ops/PolicySetOps.js.map +1 -1
  122. package/cjs/ops/PolicySetOps.test.js.map +1 -1
  123. package/cjs/ops/RealmOps.js +119 -84
  124. package/cjs/ops/RealmOps.js.map +1 -1
  125. package/cjs/ops/ResourceTypeOps.js +364 -95
  126. package/cjs/ops/ResourceTypeOps.js.map +1 -1
  127. package/cjs/ops/ResourceTypeOps.test.js.map +1 -1
  128. package/cjs/ops/Saml2Ops.js +407 -145
  129. package/cjs/ops/Saml2Ops.js.map +1 -1
  130. package/cjs/ops/Saml2Ops.test.js.map +1 -1
  131. package/cjs/ops/ScriptOps.js +256 -79
  132. package/cjs/ops/ScriptOps.js.map +1 -1
  133. package/cjs/ops/ScriptOps.test.js.map +1 -1
  134. package/cjs/ops/ServiceOps.js +331 -55
  135. package/cjs/ops/ServiceOps.js.map +1 -1
  136. package/cjs/ops/ThemeOps.js +363 -54
  137. package/cjs/ops/ThemeOps.js.map +1 -1
  138. package/cjs/ops/ThemeOps.test.js.map +1 -1
  139. package/cjs/ops/cloud/FeatureOps.js +57 -12
  140. package/cjs/ops/cloud/FeatureOps.js.map +1 -1
  141. package/cjs/ops/cloud/LogOps.js +126 -6
  142. package/cjs/ops/cloud/LogOps.js.map +1 -1
  143. package/cjs/ops/cloud/SecretsOps.js +230 -289
  144. package/cjs/ops/cloud/SecretsOps.js.map +1 -1
  145. package/cjs/ops/cloud/ServiceAccountOps.js +101 -18
  146. package/cjs/ops/cloud/ServiceAccountOps.js.map +1 -1
  147. package/cjs/ops/cloud/ServiceAccountOps.test.js.map +1 -1
  148. package/cjs/ops/cloud/StartupOps.js +64 -9
  149. package/cjs/ops/cloud/StartupOps.js.map +1 -1
  150. package/cjs/ops/cloud/VariablesOps.js +100 -175
  151. package/cjs/ops/cloud/VariablesOps.js.map +1 -1
  152. package/cjs/ops/utils/Console.js +9 -10
  153. package/cjs/ops/utils/Console.js.map +1 -1
  154. package/cjs/ops/utils/DataProtection.js +2 -2
  155. package/cjs/ops/utils/DataProtection.js.map +1 -1
  156. package/cjs/ops/utils/ExportImportUtils.js +144 -13
  157. package/cjs/ops/utils/ExportImportUtils.js.map +1 -1
  158. package/cjs/ops/utils/ExportImportUtils.test.js.map +1 -1
  159. package/cjs/ops/utils/OpsUtils.js +7 -5
  160. package/cjs/ops/utils/OpsUtils.js.map +1 -1
  161. package/cjs/ops/utils/OpsUtils.test.js.map +1 -1
  162. package/cjs/ops/utils/{ValidationUtils.js → ScriptValidationUtils.js} +1 -1
  163. package/cjs/ops/utils/ScriptValidationUtils.js.map +1 -0
  164. package/cjs/ops/utils/ScriptValidationUtils.test.js.map +1 -0
  165. package/cjs/ops/utils/Version.js +36 -6
  166. package/cjs/ops/utils/Version.js.map +1 -1
  167. package/cjs/ops/utils/Version.test.js.map +1 -1
  168. package/cjs/shared/State.js +453 -210
  169. package/cjs/shared/State.js.map +1 -1
  170. package/cjs/shared/State.test.js.map +1 -1
  171. package/cjs/utils/AutoSetupPolly.js +4 -1
  172. package/cjs/utils/AutoSetupPolly.js.map +1 -1
  173. package/esm/api/AgentApi.mjs +75 -27
  174. package/esm/api/AgentApi.test.mjs +319 -71
  175. package/esm/api/AuthenticateApi.mjs +15 -4
  176. package/esm/api/AuthenticateApi.test.mjs +27 -8
  177. package/esm/api/BaseApi.mjs +43 -19
  178. package/esm/api/CirclesOfTrustApi.mjs +39 -17
  179. package/esm/api/IdmConfigApi.mjs +44 -13
  180. package/esm/api/IdmSystemApi.mjs +7 -3
  181. package/esm/api/ManagedObjectApi.mjs +44 -20
  182. package/esm/api/NodeApi.mjs +59 -24
  183. package/esm/api/NodeApi.test.mjs +158 -40
  184. package/esm/api/OAuth2ClientApi.mjs +36 -15
  185. package/esm/api/OAuth2OIDCApi.mjs +69 -20
  186. package/esm/api/OAuth2OIDCApi.test.mjs +21 -3
  187. package/esm/api/OAuth2ProviderApi.mjs +8 -6
  188. package/esm/api/PoliciesApi.mjs +45 -16
  189. package/esm/api/PoliciesApi.test.mjs +63 -15
  190. package/esm/api/PolicySetApi.mjs +44 -16
  191. package/esm/api/PolicySetApi.test.mjs +48 -12
  192. package/esm/api/RealmApi.mjs +65 -24
  193. package/esm/api/ResourceTypesApi.mjs +56 -21
  194. package/esm/api/ResourceTypesApi.test.mjs +58 -14
  195. package/esm/api/Saml2Api.mjs +75 -89
  196. package/esm/api/ScriptApi.mjs +45 -17
  197. package/esm/api/ServerInfoApi.mjs +19 -6
  198. package/esm/api/ServiceApi.mjs +77 -26
  199. package/esm/api/SocialIdentityProvidersApi.mjs +58 -23
  200. package/esm/api/TreeApi.mjs +36 -15
  201. package/esm/api/TreeApi.test.mjs +129 -34
  202. package/esm/api/cloud/EnvInfoApi.mjs +8 -3
  203. package/esm/api/cloud/FeatureApi.mjs +7 -3
  204. package/esm/api/cloud/LogApi.mjs +38 -11
  205. package/esm/api/cloud/SecretsApi.mjs +89 -21
  206. package/esm/api/cloud/SecretsApi.test.mjs +193 -50
  207. package/esm/api/cloud/StartupApi.mjs +17 -6
  208. package/esm/api/cloud/StartupApi.test.mjs +28 -11
  209. package/esm/api/cloud/VariablesApi.mjs +43 -14
  210. package/esm/api/cloud/VariablesApi.test.mjs +124 -33
  211. package/esm/api/utils/ApiUtils.mjs +2 -4
  212. package/esm/api/utils/ApiUtils.test.mjs +14 -6
  213. package/esm/index.mjs +1 -60
  214. package/esm/lib/FrodoLib.mjs +128 -0
  215. package/esm/ops/AdminOps.mjs +500 -71
  216. package/esm/ops/AgentOps.mjs +781 -81
  217. package/esm/ops/AgentOps.test.mjs +296 -113
  218. package/esm/ops/AuthenticateOps.mjs +156 -64
  219. package/esm/ops/AuthenticateOps.test.mjs +7 -4
  220. package/esm/ops/CirclesOfTrustOps.mjs +294 -229
  221. package/esm/ops/ConnectionProfileOps.mjs +190 -123
  222. package/esm/ops/ConnectionProfileOps.test.mjs +25 -5
  223. package/esm/ops/EmailTemplateOps.mjs +66 -6
  224. package/esm/ops/EmailTemplateOps.test.mjs +32 -11
  225. package/esm/ops/IdmOps.mjs +60 -47
  226. package/esm/ops/IdmOps.test.mjs +54 -18
  227. package/esm/ops/IdpOps.mjs +227 -31
  228. package/esm/ops/IdpOps.test.mjs +57 -20
  229. package/esm/ops/InfoOps.mjs +36 -23
  230. package/esm/ops/JoseOps.test.mjs +8 -0
  231. package/esm/ops/JourneyOps.mjs +634 -96
  232. package/esm/ops/JourneyOps.test.mjs +73 -31
  233. package/esm/ops/ManagedObjectOps.mjs +66 -10
  234. package/esm/ops/NodeOps.mjs +108 -85
  235. package/esm/ops/OAuth2ClientOps.mjs +258 -42
  236. package/esm/ops/OAuth2ClientOps.test.mjs +80 -29
  237. package/esm/ops/OAuth2OidcOps.mjs +40 -0
  238. package/esm/ops/OAuth2ProviderOps.mjs +11 -8
  239. package/esm/ops/OrganizationOps.mjs +56 -8
  240. package/esm/ops/PolicyOps.mjs +379 -93
  241. package/esm/ops/PolicyOps.test.mjs +180 -65
  242. package/esm/ops/PolicySetOps.mjs +311 -88
  243. package/esm/ops/PolicySetOps.test.mjs +108 -39
  244. package/esm/ops/RealmOps.mjs +85 -65
  245. package/esm/ops/ResourceTypeOps.mjs +278 -61
  246. package/esm/ops/ResourceTypeOps.test.mjs +113 -27
  247. package/esm/ops/Saml2Ops.mjs +346 -106
  248. package/esm/ops/Saml2Ops.test.mjs +117 -81
  249. package/esm/ops/ScriptOps.mjs +202 -56
  250. package/esm/ops/ScriptOps.test.mjs +64 -23
  251. package/esm/ops/ServiceOps.mjs +261 -27
  252. package/esm/ops/ThemeOps.mjs +300 -33
  253. package/esm/ops/ThemeOps.test.mjs +197 -47
  254. package/esm/ops/cloud/FeatureOps.mjs +45 -10
  255. package/esm/ops/cloud/LogOps.mjs +107 -4
  256. package/esm/ops/cloud/SecretsOps.mjs +123 -204
  257. package/esm/ops/cloud/ServiceAccountOps.mjs +85 -15
  258. package/esm/ops/cloud/ServiceAccountOps.test.mjs +16 -6
  259. package/esm/ops/cloud/StartupOps.mjs +49 -6
  260. package/esm/ops/cloud/VariablesOps.mjs +58 -120
  261. package/esm/ops/utils/Console.mjs +2 -1
  262. package/esm/ops/utils/DataProtection.mjs +2 -3
  263. package/esm/ops/utils/ExportImportUtils.mjs +129 -8
  264. package/esm/ops/utils/ExportImportUtils.test.mjs +15 -2
  265. package/esm/ops/utils/OpsUtils.mjs +4 -3
  266. package/esm/ops/utils/OpsUtils.test.mjs +21 -5
  267. package/esm/ops/utils/{ValidationUtils.mjs → ScriptValidationUtils.mjs} +1 -1
  268. package/esm/ops/utils/{ValidationUtils.test.mjs → ScriptValidationUtils.test.mjs} +2 -2
  269. package/esm/ops/utils/Version.mjs +29 -6
  270. package/esm/ops/utils/Version.test.mjs +4 -1
  271. package/esm/shared/State.mjs +457 -145
  272. package/esm/shared/State.test.mjs +8 -0
  273. package/esm/utils/AutoSetupPolly.mjs +4 -1
  274. package/package.json +1 -1
  275. package/types/api/AgentApi.d.ts +37 -8
  276. package/types/api/AgentApi.d.ts.map +1 -1
  277. package/types/api/ApiTypes.d.ts +20 -8
  278. package/types/api/ApiTypes.d.ts.map +1 -1
  279. package/types/api/AuthenticateApi.d.ts +13 -3
  280. package/types/api/AuthenticateApi.d.ts.map +1 -1
  281. package/types/api/BaseApi.d.ts +36 -7
  282. package/types/api/BaseApi.d.ts.map +1 -1
  283. package/types/api/CirclesOfTrustApi.d.ts +21 -7
  284. package/types/api/CirclesOfTrustApi.d.ts.map +1 -1
  285. package/types/api/IdmConfigApi.d.ts +28 -13
  286. package/types/api/IdmConfigApi.d.ts.map +1 -1
  287. package/types/api/IdmSystemApi.d.ts +4 -1
  288. package/types/api/IdmSystemApi.d.ts.map +1 -1
  289. package/types/api/ManagedObjectApi.d.ts +25 -10
  290. package/types/api/ManagedObjectApi.d.ts.map +1 -1
  291. package/types/api/NodeApi.d.ts +31 -9
  292. package/types/api/NodeApi.d.ts.map +1 -1
  293. package/types/api/OAuth2ClientApi.d.ts +18 -5
  294. package/types/api/OAuth2ClientApi.d.ts.map +1 -1
  295. package/types/api/OAuth2OIDCApi.d.ts +45 -11
  296. package/types/api/OAuth2OIDCApi.d.ts.map +1 -1
  297. package/types/api/OAuth2ProviderApi.d.ts +4 -1
  298. package/types/api/OAuth2ProviderApi.d.ts.map +1 -1
  299. package/types/api/PoliciesApi.d.ts +21 -5
  300. package/types/api/PoliciesApi.d.ts.map +1 -1
  301. package/types/api/PolicySetApi.d.ts +20 -5
  302. package/types/api/PolicySetApi.d.ts.map +1 -1
  303. package/types/api/RealmApi.d.ts +26 -10
  304. package/types/api/RealmApi.d.ts.map +1 -1
  305. package/types/api/ResourceTypesApi.d.ts +27 -8
  306. package/types/api/ResourceTypesApi.d.ts.map +1 -1
  307. package/types/api/Saml2Api.d.ts +39 -32
  308. package/types/api/Saml2Api.d.ts.map +1 -1
  309. package/types/api/ScriptApi.d.ts +21 -5
  310. package/types/api/ScriptApi.d.ts.map +1 -1
  311. package/types/api/ServerInfoApi.d.ts +9 -2
  312. package/types/api/ServerInfoApi.d.ts.map +1 -1
  313. package/types/api/ServiceApi.d.ts +41 -7
  314. package/types/api/ServiceApi.d.ts.map +1 -1
  315. package/types/api/SocialIdentityProvidersApi.d.ts +30 -8
  316. package/types/api/SocialIdentityProvidersApi.d.ts.map +1 -1
  317. package/types/api/TreeApi.d.ts +18 -4
  318. package/types/api/TreeApi.d.ts.map +1 -1
  319. package/types/api/cloud/EnvInfoApi.d.ts +4 -1
  320. package/types/api/cloud/EnvInfoApi.d.ts.map +1 -1
  321. package/types/api/cloud/FeatureApi.d.ts +4 -1
  322. package/types/api/cloud/FeatureApi.d.ts.map +1 -1
  323. package/types/api/cloud/LogApi.d.ts +24 -6
  324. package/types/api/cloud/LogApi.d.ts.map +1 -1
  325. package/types/api/cloud/SecretsApi.d.ts +50 -10
  326. package/types/api/cloud/SecretsApi.d.ts.map +1 -1
  327. package/types/api/cloud/StartupApi.d.ts +7 -2
  328. package/types/api/cloud/StartupApi.d.ts.map +1 -1
  329. package/types/api/cloud/VariablesApi.d.ts +23 -5
  330. package/types/api/cloud/VariablesApi.d.ts.map +1 -1
  331. package/types/api/utils/ApiUtils.d.ts +3 -2
  332. package/types/api/utils/ApiUtils.d.ts.map +1 -1
  333. package/types/index.d.ts +1 -48
  334. package/types/index.d.ts.map +1 -1
  335. package/types/lib/FrodoLib.d.ts +99 -0
  336. package/types/lib/FrodoLib.d.ts.map +1 -0
  337. package/types/ops/AdminOps.d.ts +71 -12
  338. package/types/ops/AdminOps.d.ts.map +1 -1
  339. package/types/ops/AgentOps.d.ts +350 -36
  340. package/types/ops/AgentOps.d.ts.map +1 -1
  341. package/types/ops/AuthenticateOps.d.ts +27 -4
  342. package/types/ops/AuthenticateOps.d.ts.map +1 -1
  343. package/types/ops/CirclesOfTrustOps.d.ts +88 -24
  344. package/types/ops/CirclesOfTrustOps.d.ts.map +1 -1
  345. package/types/ops/ConnectionProfileOps.d.ts +78 -18
  346. package/types/ops/ConnectionProfileOps.d.ts.map +1 -1
  347. package/types/ops/EmailTemplateOps.d.ts +36 -3
  348. package/types/ops/EmailTemplateOps.d.ts.map +1 -1
  349. package/types/ops/IdmOps.d.ts +28 -40
  350. package/types/ops/IdmOps.d.ts.map +1 -1
  351. package/types/ops/IdpOps.d.ts +88 -10
  352. package/types/ops/IdpOps.d.ts.map +1 -1
  353. package/types/ops/InfoOps.d.ts +12 -1
  354. package/types/ops/InfoOps.d.ts.map +1 -1
  355. package/types/ops/JourneyOps.d.ts +237 -34
  356. package/types/ops/JourneyOps.d.ts.map +1 -1
  357. package/types/ops/ManagedObjectOps.d.ts +37 -8
  358. package/types/ops/ManagedObjectOps.d.ts.map +1 -1
  359. package/types/ops/NodeOps.d.ts +61 -6
  360. package/types/ops/NodeOps.d.ts.map +1 -1
  361. package/types/ops/OAuth2ClientOps.d.ts +104 -10
  362. package/types/ops/OAuth2ClientOps.d.ts.map +1 -1
  363. package/types/ops/OAuth2OidcOps.d.ts +11 -0
  364. package/types/ops/OAuth2OidcOps.d.ts.map +1 -0
  365. package/types/ops/OAuth2ProviderOps.d.ts +8 -5
  366. package/types/ops/OAuth2ProviderOps.d.ts.map +1 -1
  367. package/types/ops/OpsTypes.d.ts +12 -1
  368. package/types/ops/OpsTypes.d.ts.map +1 -1
  369. package/types/ops/OrganizationOps.d.ts +24 -3
  370. package/types/ops/OrganizationOps.d.ts.map +1 -1
  371. package/types/ops/PolicyOps.d.ts +103 -28
  372. package/types/ops/PolicyOps.d.ts.map +1 -1
  373. package/types/ops/PolicySetOps.d.ts +76 -30
  374. package/types/ops/PolicySetOps.d.ts.map +1 -1
  375. package/types/ops/RealmOps.d.ts +34 -14
  376. package/types/ops/RealmOps.d.ts.map +1 -1
  377. package/types/ops/ResourceTypeOps.d.ts +116 -29
  378. package/types/ops/ResourceTypeOps.d.ts.map +1 -1
  379. package/types/ops/Saml2Ops.d.ts +124 -41
  380. package/types/ops/Saml2Ops.d.ts.map +1 -1
  381. package/types/ops/ScriptOps.d.ts +88 -23
  382. package/types/ops/ScriptOps.d.ts.map +1 -1
  383. package/types/ops/ServiceOps.d.ts +95 -8
  384. package/types/ops/ServiceOps.d.ts.map +1 -1
  385. package/types/ops/ThemeOps.d.ts +113 -9
  386. package/types/ops/ThemeOps.d.ts.map +1 -1
  387. package/types/ops/cloud/FeatureOps.d.ts +23 -2
  388. package/types/ops/cloud/FeatureOps.d.ts.map +1 -1
  389. package/types/ops/cloud/LogOps.d.ts +61 -3
  390. package/types/ops/cloud/LogOps.d.ts.map +1 -1
  391. package/types/ops/cloud/SecretsOps.d.ts +77 -63
  392. package/types/ops/cloud/SecretsOps.d.ts.map +1 -1
  393. package/types/ops/cloud/ServiceAccountOps.d.ts +48 -3
  394. package/types/ops/cloud/ServiceAccountOps.d.ts.map +1 -1
  395. package/types/ops/cloud/StartupOps.d.ts +25 -2
  396. package/types/ops/cloud/StartupOps.d.ts.map +1 -1
  397. package/types/ops/cloud/VariablesOps.d.ts +39 -39
  398. package/types/ops/cloud/VariablesOps.d.ts.map +1 -1
  399. package/types/ops/utils/Console.d.ts.map +1 -1
  400. package/types/ops/utils/DataProtection.d.ts +1 -1
  401. package/types/ops/utils/DataProtection.d.ts.map +1 -1
  402. package/types/ops/utils/ExportImportUtils.d.ts +72 -11
  403. package/types/ops/utils/ExportImportUtils.d.ts.map +1 -1
  404. package/types/ops/utils/OpsUtils.d.ts +4 -1
  405. package/types/ops/utils/OpsUtils.d.ts.map +1 -1
  406. package/types/ops/utils/ScriptValidationUtils.d.ts.map +1 -0
  407. package/types/ops/utils/Version.d.ts +20 -2
  408. package/types/ops/utils/Version.d.ts.map +1 -1
  409. package/types/shared/State.d.ts +80 -177
  410. package/types/shared/State.d.ts.map +1 -1
  411. package/types/utils/AutoSetupPolly.d.ts.map +1 -1
  412. package/cjs/ops/utils/ValidationUtils.js.map +0 -1
  413. package/cjs/ops/utils/ValidationUtils.test.js.map +0 -1
  414. package/types/ops/utils/ValidationUtils.d.ts.map +0 -1
  415. /package/types/ops/utils/{ValidationUtils.d.ts → ScriptValidationUtils.d.ts} +0 -0
@@ -6,6 +6,7 @@ Object.defineProperty(exports, "__esModule", {
6
6
  exports.addAutoIdStaticUserMapping = addAutoIdStaticUserMapping;
7
7
  exports.createLongLivedToken = createLongLivedToken;
8
8
  exports.createOAuth2ClientWithAdminPrivileges = createOAuth2ClientWithAdminPrivileges;
9
+ exports.default = void 0;
9
10
  exports.grantOAuth2ClientAdminPrivileges = grantOAuth2ClientAdminPrivileges;
10
11
  exports.hideGenericExtensionAttributes = hideGenericExtensionAttributes;
11
12
  exports.listNonOAuth2AdminStaticUserMappings = listNonOAuth2AdminStaticUserMappings;
@@ -30,6 +31,239 @@ var _url = require("url");
30
31
  function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; }
31
32
  function asyncGeneratorStep(gen, resolve, reject, _next, _throw, key, arg) { try { var info = gen[key](arg); var value = info.value; } catch (error) { reject(error); return; } if (info.done) { resolve(value); } else { Promise.resolve(value).then(_next, _throw); } }
32
33
  function _asyncToGenerator(fn) { return function () { var self = this, args = arguments; return new Promise(function (resolve, reject) { var gen = fn.apply(self, args); function _next(value) { asyncGeneratorStep(gen, resolve, reject, _next, _throw, "next", value); } function _throw(err) { asyncGeneratorStep(gen, resolve, reject, _next, _throw, "throw", err); } _next(undefined); }); }; }
34
+ class AdminOps {
35
+ constructor(state) {
36
+ this.state = state;
37
+ }
38
+
39
+ /*
40
+ * List all oauth2 clients, which have a corresponding staticUserMapping
41
+ * in the IDM authentication.json:
42
+ {
43
+ "_id": "authentication",
44
+ "rsFilter": {
45
+ ...
46
+ "staticUserMapping": [
47
+ {
48
+ "subject": "someOauth2ClientID",
49
+ "localUser": "internal/user/openidm-admin",
50
+ "userRoles": "authzRoles/*",
51
+ "roles": [
52
+ "internal/role/openidm-authorized",
53
+ "internal/role/openidm-admin"
54
+ ]
55
+ },
56
+ {
57
+ "subject": "RCSClient",
58
+ "localUser": "internal/user/idm-provisioning"
59
+ }
60
+ ]
61
+ }
62
+ }
63
+ */
64
+ listOAuth2CustomClients() {
65
+ var _this = this;
66
+ return _asyncToGenerator(function* () {
67
+ return listOAuth2CustomClients({
68
+ state: _this.state
69
+ });
70
+ })();
71
+ }
72
+
73
+ /*
74
+ * List all oauth2 clients, which have the fr:idm:* scope and a
75
+ * corresponding staticUserMapping in the IDM authentication.json
76
+ * and are assigned admin privileges:
77
+ {
78
+ "_id": "authentication",
79
+ "rsFilter": {
80
+ ...
81
+ "staticUserMapping": [
82
+ {
83
+ "subject": "someOauth2ClientID",
84
+ "localUser": "internal/user/openidm-admin",
85
+ "userRoles": "authzRoles/*",
86
+ "roles": [
87
+ "internal/role/openidm-authorized",
88
+ "internal/role/openidm-admin"
89
+ ]
90
+ }
91
+ ]
92
+ }
93
+ }
94
+ */
95
+ listOAuth2AdminClients() {
96
+ var _this2 = this;
97
+ return _asyncToGenerator(function* () {
98
+ return listOAuth2AdminClients({
99
+ state: _this2.state
100
+ });
101
+ })();
102
+ }
103
+
104
+ /*
105
+ * List all static user mappings that are not oauth2 clients in authentication.json
106
+ * and are assigned admin privileges:
107
+ {
108
+ "_id": "authentication",
109
+ "rsFilter": {
110
+ ...
111
+ "staticUserMapping": [
112
+ {
113
+ "subject": "amadmin",
114
+ "localUser": "internal/user/openidm-admin",
115
+ "userRoles": "authzRoles/*",
116
+ "roles": [
117
+ "internal/role/openidm-authorized",
118
+ "internal/role/openidm-admin"
119
+ ]
120
+ },
121
+ {
122
+ "subject": "idm-provisioning",
123
+ "localUser": "internal/user/idm-provisioning",
124
+ "roles": [
125
+ "internal/role/platform-provisioning"
126
+ ]
127
+ },
128
+ {
129
+ "subject": "RCSClient",
130
+ "localUser": "internal/user/idm-provisioning"
131
+ },
132
+ {
133
+ "subject": "autoid-resource-server",
134
+ "localUser": "internal/user/idm-provisioning",
135
+ "roles": [
136
+ "internal/role/platform-provisioning",
137
+ "internal/role/openidm-authorized",
138
+ "internal/role/openidm-admin"
139
+ ]
140
+ }
141
+ ]
142
+ }
143
+ }
144
+ */
145
+ listNonOAuth2AdminStaticUserMappings(showProtected) {
146
+ var _this3 = this;
147
+ return _asyncToGenerator(function* () {
148
+ return listNonOAuth2AdminStaticUserMappings({
149
+ showProtected,
150
+ state: _this3.state
151
+ });
152
+ })();
153
+ }
154
+
155
+ /*
156
+ * Add AutoId static user mapping to authentication.json to enable dashboards and other AutoId-based functionality.
157
+ {
158
+ "_id": "authentication",
159
+ "rsFilter": {
160
+ ...
161
+ "staticUserMapping": [
162
+ ...
163
+ {
164
+ "subject": "autoid-resource-server",
165
+ "localUser": "internal/user/idm-provisioning",
166
+ "roles": [
167
+ "internal/role/platform-provisioning",
168
+ "internal/role/openidm-authorized",
169
+ "internal/role/openidm-admin"
170
+ ]
171
+ }
172
+ ]
173
+ }
174
+ }
175
+ */
176
+ addAutoIdStaticUserMapping() {
177
+ var _this4 = this;
178
+ return _asyncToGenerator(function* () {
179
+ return addAutoIdStaticUserMapping({
180
+ state: _this4.state
181
+ });
182
+ })();
183
+ }
184
+ grantOAuth2ClientAdminPrivileges(clientId) {
185
+ var _this5 = this;
186
+ return _asyncToGenerator(function* () {
187
+ return grantOAuth2ClientAdminPrivileges({
188
+ clientId,
189
+ state: _this5.state
190
+ });
191
+ })();
192
+ }
193
+ revokeOAuth2ClientAdminPrivileges(clientId) {
194
+ var _this6 = this;
195
+ return _asyncToGenerator(function* () {
196
+ return revokeOAuth2ClientAdminPrivileges({
197
+ clientId,
198
+ state: _this6.state
199
+ });
200
+ })();
201
+ }
202
+ createOAuth2ClientWithAdminPrivileges(clientId, clientSecret) {
203
+ var _this7 = this;
204
+ return _asyncToGenerator(function* () {
205
+ return createOAuth2ClientWithAdminPrivileges({
206
+ clientId,
207
+ clientSecret,
208
+ state: _this7.state
209
+ });
210
+ })();
211
+ }
212
+ createLongLivedToken(clientId, clientSecret, scope, secret, lifetime) {
213
+ var _this8 = this;
214
+ return _asyncToGenerator(function* () {
215
+ return createLongLivedToken({
216
+ clientId,
217
+ clientSecret,
218
+ scope,
219
+ secret,
220
+ lifetime,
221
+ state: _this8.state
222
+ });
223
+ })();
224
+ }
225
+ removeStaticUserMapping(subject) {
226
+ var _this9 = this;
227
+ return _asyncToGenerator(function* () {
228
+ return removeStaticUserMapping({
229
+ subject,
230
+ state: _this9.state
231
+ });
232
+ })();
233
+ }
234
+ hideGenericExtensionAttributes(includeCustomized, dryRun) {
235
+ var _this10 = this;
236
+ return _asyncToGenerator(function* () {
237
+ return hideGenericExtensionAttributes({
238
+ includeCustomized,
239
+ dryRun,
240
+ state: _this10.state
241
+ });
242
+ })();
243
+ }
244
+ showGenericExtensionAttributes(includeCustomized, dryRun) {
245
+ var _this11 = this;
246
+ return _asyncToGenerator(function* () {
247
+ return showGenericExtensionAttributes({
248
+ includeCustomized,
249
+ dryRun,
250
+ state: _this11.state
251
+ });
252
+ })();
253
+ }
254
+ repairOrgModel(excludeCustomized, extendPermissions, dryRun) {
255
+ var _this12 = this;
256
+ return _asyncToGenerator(function* () {
257
+ return repairOrgModel({
258
+ excludeCustomized,
259
+ extendPermissions,
260
+ dryRun,
261
+ state: _this12.state
262
+ });
263
+ })();
264
+ }
265
+ }
266
+ exports.default = AdminOps;
33
267
  var _dirname = _path.default.dirname((0, _url.fileURLToPath)(require('url').pathToFileURL(__filename).toString()));
34
268
  var OAUTH2_CLIENT = JSON.parse(_fs.default.readFileSync(_path.default.resolve(_dirname, './templates/OAuth2ClientTemplate.json'), 'utf8'));
35
269
  var GENERIC_EXTENSION_ATTRIBUTES = JSON.parse(_fs.default.readFileSync(_path.default.resolve(_dirname, './templates/cloud/GenericExtensionAttributesTemplate.json'), 'utf8'));
@@ -68,7 +302,7 @@ var autoIdRoles = ['internal/role/platform-provisioning', 'internal/role/openidm
68
302
  }
69
303
  }
70
304
  */
71
- function listOAuth2CustomClients() {
305
+ function listOAuth2CustomClients(_x) {
72
306
  return _listOAuth2CustomClients.apply(this, arguments);
73
307
  }
74
308
  /*
@@ -94,17 +328,25 @@ function listOAuth2CustomClients() {
94
328
  }
95
329
  */
96
330
  function _listOAuth2CustomClients() {
97
- _listOAuth2CustomClients = _asyncToGenerator(function* () {
98
- var clients = yield (0, _OAuth2ClientOps.getOAuth2Clients)();
331
+ _listOAuth2CustomClients = _asyncToGenerator(function* (_ref) {
332
+ var {
333
+ state
334
+ } = _ref;
335
+ var clients = yield (0, _OAuth2ClientOps.getOAuth2Clients)({
336
+ state
337
+ });
99
338
  clients = clients.map(client => client._id).filter(client => !protectedClients.includes(client));
100
- var authentication = yield (0, _IdmConfigApi.getConfigEntity)('authentication');
339
+ var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
340
+ entityId: 'authentication',
341
+ state
342
+ });
101
343
  var subjects = authentication.rsFilter.staticUserMapping.map(mapping => mapping.subject).filter(subject => !protectedSubjects.includes(subject));
102
344
  var adminClients = subjects.filter(subject => clients.includes(subject));
103
345
  return adminClients;
104
346
  });
105
347
  return _listOAuth2CustomClients.apply(this, arguments);
106
348
  }
107
- function listOAuth2AdminClients() {
349
+ function listOAuth2AdminClients(_x2) {
108
350
  return _listOAuth2AdminClients.apply(this, arguments);
109
351
  }
110
352
  /*
@@ -149,8 +391,13 @@ function listOAuth2AdminClients() {
149
391
  }
150
392
  */
151
393
  function _listOAuth2AdminClients() {
152
- _listOAuth2AdminClients = _asyncToGenerator(function* () {
153
- var clients = yield (0, _OAuth2ClientOps.getOAuth2Clients)();
394
+ _listOAuth2AdminClients = _asyncToGenerator(function* (_ref2) {
395
+ var {
396
+ state
397
+ } = _ref2;
398
+ var clients = yield (0, _OAuth2ClientOps.getOAuth2Clients)({
399
+ state
400
+ });
154
401
  clients = clients.filter(client => {
155
402
  var isPrivileged = false;
156
403
  if (client.coreOAuth2ClientConfig.scopes) {
@@ -162,7 +409,10 @@ function _listOAuth2AdminClients() {
162
409
  }
163
410
  return isPrivileged;
164
411
  }).map(client => client._id).filter(client => !protectedClients.includes(client));
165
- var authentication = yield (0, _IdmConfigApi.getConfigEntity)('authentication');
412
+ var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
413
+ entityId: 'authentication',
414
+ state
415
+ });
166
416
  var subjects = authentication.rsFilter.staticUserMapping.filter(mapping => {
167
417
  var isPrivileged = false;
168
418
  if (mapping.roles) {
@@ -179,14 +429,23 @@ function _listOAuth2AdminClients() {
179
429
  });
180
430
  return _listOAuth2AdminClients.apply(this, arguments);
181
431
  }
182
- function listNonOAuth2AdminStaticUserMappings(_x) {
432
+ function listNonOAuth2AdminStaticUserMappings(_x3) {
183
433
  return _listNonOAuth2AdminStaticUserMappings.apply(this, arguments);
184
434
  }
185
435
  function _listNonOAuth2AdminStaticUserMappings() {
186
- _listNonOAuth2AdminStaticUserMappings = _asyncToGenerator(function* (showProtected) {
187
- var clients = yield (0, _OAuth2ClientOps.getOAuth2Clients)();
436
+ _listNonOAuth2AdminStaticUserMappings = _asyncToGenerator(function* (_ref3) {
437
+ var {
438
+ showProtected,
439
+ state
440
+ } = _ref3;
441
+ var clients = yield (0, _OAuth2ClientOps.getOAuth2Clients)({
442
+ state
443
+ });
188
444
  clients = clients.map(client => client._id).filter(client => !protectedClients.includes(client));
189
- var authentication = yield (0, _IdmConfigApi.getConfigEntity)('authentication');
445
+ var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
446
+ entityId: 'authentication',
447
+ state
448
+ });
190
449
  var subjects = authentication.rsFilter.staticUserMapping.filter(mapping => {
191
450
  var isPrivileged = false;
192
451
  if (mapping.roles) {
@@ -206,23 +465,35 @@ function _listNonOAuth2AdminStaticUserMappings() {
206
465
  });
207
466
  return _listNonOAuth2AdminStaticUserMappings.apply(this, arguments);
208
467
  }
209
- function getDynamicClientRegistrationScope() {
468
+ function getDynamicClientRegistrationScope(_x4) {
210
469
  return _getDynamicClientRegistrationScope.apply(this, arguments);
211
470
  }
212
471
  function _getDynamicClientRegistrationScope() {
213
- _getDynamicClientRegistrationScope = _asyncToGenerator(function* () {
214
- var provider = yield (0, _OAuth2ProviderOps.getOAuth2Provider)();
472
+ _getDynamicClientRegistrationScope = _asyncToGenerator(function* (_ref4) {
473
+ var {
474
+ state
475
+ } = _ref4;
476
+ var provider = yield (0, _OAuth2ProviderOps.getOAuth2Provider)({
477
+ state
478
+ });
215
479
  return provider.clientDynamicRegistrationConfig.dynamicClientRegistrationScope;
216
480
  });
217
481
  return _getDynamicClientRegistrationScope.apply(this, arguments);
218
482
  }
219
- function addAdminScopes(_x2, _x3) {
483
+ function addAdminScopes(_x5) {
220
484
  return _addAdminScopes.apply(this, arguments);
221
485
  }
222
486
  function _addAdminScopes() {
223
- _addAdminScopes = _asyncToGenerator(function* (clientId, client) {
487
+ _addAdminScopes = _asyncToGenerator(function* (_ref5) {
488
+ var {
489
+ clientId,
490
+ client,
491
+ state
492
+ } = _ref5;
224
493
  var modClient = client;
225
- var allAdminScopes = adminScopes.concat([yield getDynamicClientRegistrationScope()]);
494
+ var allAdminScopes = adminScopes.concat([yield getDynamicClientRegistrationScope({
495
+ state
496
+ })]);
226
497
  var addScopes = [];
227
498
  if (modClient.coreOAuth2ClientConfig.scopes && modClient.coreOAuth2ClientConfig.scopes.value) {
228
499
  addScopes = allAdminScopes.filter(scope => {
@@ -254,7 +525,11 @@ function _addAdminScopes() {
254
525
  });
255
526
  return _addAdminScopes.apply(this, arguments);
256
527
  }
257
- function addClientCredentialsGrantType(clientId, client) {
528
+ function addClientCredentialsGrantType(_ref6) {
529
+ var {
530
+ clientId,
531
+ client
532
+ } = _ref6;
258
533
  var modClient = client;
259
534
  var modified = false;
260
535
  if (modClient.advancedOAuth2ClientConfig.grantTypes && modClient.advancedOAuth2ClientConfig.grantTypes.value) {
@@ -273,7 +548,7 @@ function addClientCredentialsGrantType(clientId, client) {
273
548
  }
274
549
  return modClient;
275
550
  }
276
- function addAdminStaticUserMapping(_x4) {
551
+ function addAdminStaticUserMapping(_x6) {
277
552
  return _addAdminStaticUserMapping.apply(this, arguments);
278
553
  }
279
554
  /*
@@ -298,10 +573,17 @@ function addAdminStaticUserMapping(_x4) {
298
573
  }
299
574
  */
300
575
  function _addAdminStaticUserMapping() {
301
- _addAdminStaticUserMapping = _asyncToGenerator(function* (name) {
576
+ _addAdminStaticUserMapping = _asyncToGenerator(function* (_ref7) {
577
+ var {
578
+ name,
579
+ state
580
+ } = _ref7;
302
581
  var authentication = {};
303
582
  try {
304
- authentication = yield (0, _IdmConfigApi.getConfigEntity)('authentication');
583
+ authentication = yield (0, _IdmConfigApi.getConfigEntity)({
584
+ entityId: 'authentication',
585
+ state
586
+ });
305
587
  } catch (error) {
306
588
  (0, _Console.printMessage)("Error reading IDM authentication configuration: ".concat(error.message), 'error');
307
589
  }
@@ -337,7 +619,11 @@ function _addAdminStaticUserMapping() {
337
619
  if (addRoles.length > 0 || needsAdminMapping) {
338
620
  (0, _Console.printMessage)("Adding admin roles to static user mapping for client \"".concat(name, "\"..."));
339
621
  try {
340
- yield (0, _IdmConfigApi.putConfigEntity)('authentication', authentication);
622
+ yield (0, _IdmConfigApi.putConfigEntity)({
623
+ entityId: 'authentication',
624
+ entityData: authentication,
625
+ state
626
+ });
341
627
  } catch (putConfigEntityError) {
342
628
  (0, _Console.printMessage)(putConfigEntityError, 'error');
343
629
  (0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
@@ -348,13 +634,19 @@ function _addAdminStaticUserMapping() {
348
634
  });
349
635
  return _addAdminStaticUserMapping.apply(this, arguments);
350
636
  }
351
- function addAutoIdStaticUserMapping() {
637
+ function addAutoIdStaticUserMapping(_x7) {
352
638
  return _addAutoIdStaticUserMapping.apply(this, arguments);
353
639
  }
354
640
  function _addAutoIdStaticUserMapping() {
355
- _addAutoIdStaticUserMapping = _asyncToGenerator(function* () {
641
+ _addAutoIdStaticUserMapping = _asyncToGenerator(function* (_ref8) {
642
+ var {
643
+ state
644
+ } = _ref8;
356
645
  var name = 'autoid-resource-server';
357
- var authentication = yield (0, _IdmConfigApi.getConfigEntity)('authentication');
646
+ var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
647
+ entityId: 'authentication',
648
+ state
649
+ });
358
650
  var needsAdminMapping = true;
359
651
  var addRoles = [];
360
652
  var mappings = authentication.rsFilter.staticUserMapping.map(mapping => {
@@ -387,7 +679,11 @@ function _addAutoIdStaticUserMapping() {
387
679
  if (addRoles.length > 0 || needsAdminMapping) {
388
680
  (0, _Console.printMessage)("Adding required roles to static user mapping for AutoId client \"".concat(name, "\"..."));
389
681
  try {
390
- yield (0, _IdmConfigApi.putConfigEntity)('authentication', authentication);
682
+ yield (0, _IdmConfigApi.putConfigEntity)({
683
+ entityId: 'authentication',
684
+ entityData: authentication,
685
+ state
686
+ });
391
687
  } catch (putConfigEntityError) {
392
688
  (0, _Console.printMessage)(putConfigEntityError, 'error');
393
689
  (0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
@@ -398,32 +694,60 @@ function _addAutoIdStaticUserMapping() {
398
694
  });
399
695
  return _addAutoIdStaticUserMapping.apply(this, arguments);
400
696
  }
401
- function grantOAuth2ClientAdminPrivileges(_x5) {
697
+ function grantOAuth2ClientAdminPrivileges(_x8) {
402
698
  return _grantOAuth2ClientAdminPrivileges.apply(this, arguments);
403
699
  }
404
700
  function _grantOAuth2ClientAdminPrivileges() {
405
- _grantOAuth2ClientAdminPrivileges = _asyncToGenerator(function* (clientId) {
406
- var client = yield (0, _OAuth2ClientOps.getOAuth2Client)(clientId);
701
+ _grantOAuth2ClientAdminPrivileges = _asyncToGenerator(function* (_ref9) {
702
+ var {
703
+ clientId,
704
+ state
705
+ } = _ref9;
706
+ var client = yield (0, _OAuth2ClientOps.getOAuth2Client)({
707
+ clientId,
708
+ state
709
+ });
407
710
  if (client.coreOAuth2ClientConfig.clientName.value.length === 0) {
408
711
  client.coreOAuth2ClientConfig.clientName.value = [clientId];
409
712
  }
410
713
  if (client.advancedOAuth2ClientConfig.descriptions.value.length === 0 || client.advancedOAuth2ClientConfig.descriptions.value[0].startsWith('Modified by Frodo') || client.advancedOAuth2ClientConfig.descriptions.value[0].startsWith('Created by Frodo')) {
411
714
  client.advancedOAuth2ClientConfig.descriptions.value = ["Modified by Frodo on ".concat(new Date().toLocaleString())];
412
715
  }
413
- client = yield addAdminScopes(clientId, client);
414
- client = addClientCredentialsGrantType(clientId, client);
415
- yield (0, _OAuth2ClientOps.putOAuth2Client)(clientId, client);
416
- yield addAdminStaticUserMapping(clientId);
716
+ client = yield addAdminScopes({
717
+ clientId,
718
+ client,
719
+ state
720
+ });
721
+ client = addClientCredentialsGrantType({
722
+ clientId,
723
+ client
724
+ });
725
+ yield (0, _OAuth2ClientOps.putOAuth2Client)({
726
+ clientId,
727
+ clientData: client,
728
+ state
729
+ });
730
+ yield addAdminStaticUserMapping({
731
+ name: clientId,
732
+ state
733
+ });
417
734
  });
418
735
  return _grantOAuth2ClientAdminPrivileges.apply(this, arguments);
419
736
  }
420
- function removeAdminScopes(_x6, _x7) {
737
+ function removeAdminScopes(_x9) {
421
738
  return _removeAdminScopes.apply(this, arguments);
422
739
  }
423
740
  function _removeAdminScopes() {
424
- _removeAdminScopes = _asyncToGenerator(function* (name, client) {
741
+ _removeAdminScopes = _asyncToGenerator(function* (_ref10) {
742
+ var {
743
+ name,
744
+ client,
745
+ state
746
+ } = _ref10;
425
747
  var modClient = client;
426
- var allAdminScopes = adminScopes.concat([yield getDynamicClientRegistrationScope()]);
748
+ var allAdminScopes = adminScopes.concat([yield getDynamicClientRegistrationScope({
749
+ state
750
+ })]);
427
751
  var finalScopes = [];
428
752
  if (modClient.coreOAuth2ClientConfig.scopes && modClient.coreOAuth2ClientConfig.scopes.value) {
429
753
  finalScopes = modClient.coreOAuth2ClientConfig.scopes.value.filter(scope => !allAdminScopes.includes(scope));
@@ -448,7 +772,11 @@ function _removeAdminScopes() {
448
772
  });
449
773
  return _removeAdminScopes.apply(this, arguments);
450
774
  }
451
- function removeClientCredentialsGrantType(clientId, client) {
775
+ function removeClientCredentialsGrantType(_ref11) {
776
+ var {
777
+ clientId,
778
+ client
779
+ } = _ref11;
452
780
  var modClient = client;
453
781
  var modified = false;
454
782
  var finalGrantTypes = [];
@@ -464,12 +792,19 @@ function removeClientCredentialsGrantType(clientId, client) {
464
792
  }
465
793
  return modClient;
466
794
  }
467
- function removeAdminStaticUserMapping(_x8) {
795
+ function removeAdminStaticUserMapping(_x10) {
468
796
  return _removeAdminStaticUserMapping.apply(this, arguments);
469
797
  }
470
798
  function _removeAdminStaticUserMapping() {
471
- _removeAdminStaticUserMapping = _asyncToGenerator(function* (name) {
472
- var authentication = yield (0, _IdmConfigApi.getConfigEntity)('authentication');
799
+ _removeAdminStaticUserMapping = _asyncToGenerator(function* (_ref12) {
800
+ var {
801
+ name,
802
+ state
803
+ } = _ref12;
804
+ var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
805
+ entityId: 'authentication',
806
+ state
807
+ });
473
808
  var finalRoles = [];
474
809
  var removeMapping = false;
475
810
  var modified = false;
@@ -493,7 +828,11 @@ function _removeAdminStaticUserMapping() {
493
828
  (0, _Console.printMessage)("Removing admin roles from static user mapping for client \"".concat(name, "\"..."));
494
829
  }
495
830
  try {
496
- yield (0, _IdmConfigApi.putConfigEntity)('authentication', authentication);
831
+ yield (0, _IdmConfigApi.putConfigEntity)({
832
+ entityId: 'authentication',
833
+ entityData: authentication,
834
+ state
835
+ });
497
836
  } catch (putConfigEntityError) {
498
837
  (0, _Console.printMessage)(putConfigEntityError, 'error');
499
838
  (0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
@@ -504,74 +843,146 @@ function _removeAdminStaticUserMapping() {
504
843
  });
505
844
  return _removeAdminStaticUserMapping.apply(this, arguments);
506
845
  }
507
- function revokeOAuth2ClientAdminPrivileges(_x9) {
846
+ function revokeOAuth2ClientAdminPrivileges(_x11) {
508
847
  return _revokeOAuth2ClientAdminPrivileges.apply(this, arguments);
509
848
  }
510
849
  function _revokeOAuth2ClientAdminPrivileges() {
511
- _revokeOAuth2ClientAdminPrivileges = _asyncToGenerator(function* (clientId) {
512
- var client = yield (0, _OAuth2ClientOps.getOAuth2Client)(clientId);
850
+ _revokeOAuth2ClientAdminPrivileges = _asyncToGenerator(function* (_ref13) {
851
+ var {
852
+ clientId,
853
+ state
854
+ } = _ref13;
855
+ var client = yield (0, _OAuth2ClientOps.getOAuth2Client)({
856
+ clientId,
857
+ state
858
+ });
513
859
  if (client.coreOAuth2ClientConfig.clientName.value.length === 0) {
514
860
  client.coreOAuth2ClientConfig.clientName.value = [clientId];
515
861
  }
516
862
  if (client.advancedOAuth2ClientConfig.descriptions.value.length === 0 || client.advancedOAuth2ClientConfig.descriptions.value[0].startsWith('Modified by Frodo') || client.advancedOAuth2ClientConfig.descriptions.value[0].startsWith('Created by Frodo')) {
517
863
  client.advancedOAuth2ClientConfig.descriptions.value = ["Modified by Frodo on ".concat(new Date().toLocaleString())];
518
864
  }
519
- client = yield removeAdminScopes(clientId, client);
520
- client = removeClientCredentialsGrantType(clientId, client);
521
- yield (0, _OAuth2ClientOps.putOAuth2Client)(clientId, client);
522
- yield removeAdminStaticUserMapping(clientId);
865
+ client = yield removeAdminScopes({
866
+ name: clientId,
867
+ client,
868
+ state
869
+ });
870
+ client = removeClientCredentialsGrantType({
871
+ clientId,
872
+ client
873
+ });
874
+ yield (0, _OAuth2ClientOps.putOAuth2Client)({
875
+ clientId,
876
+ clientData: client,
877
+ state
878
+ });
879
+ yield removeAdminStaticUserMapping({
880
+ name: clientId,
881
+ state
882
+ });
523
883
  });
524
884
  return _revokeOAuth2ClientAdminPrivileges.apply(this, arguments);
525
885
  }
526
- function createOAuth2ClientWithAdminPrivileges(_x10, _x11) {
886
+ function createOAuth2ClientWithAdminPrivileges(_x12) {
527
887
  return _createOAuth2ClientWithAdminPrivileges.apply(this, arguments);
528
888
  }
529
889
  function _createOAuth2ClientWithAdminPrivileges() {
530
- _createOAuth2ClientWithAdminPrivileges = _asyncToGenerator(function* (clientId, clientSecret) {
890
+ _createOAuth2ClientWithAdminPrivileges = _asyncToGenerator(function* (_ref14) {
891
+ var {
892
+ clientId,
893
+ clientSecret,
894
+ state
895
+ } = _ref14;
531
896
  var client = OAUTH2_CLIENT;
532
897
  client.coreOAuth2ClientConfig.userpassword = clientSecret;
533
898
  client.coreOAuth2ClientConfig.clientName.value = [clientId];
534
899
  client.advancedOAuth2ClientConfig.descriptions.value = ["Created by Frodo on ".concat(new Date().toLocaleString())];
535
900
  try {
536
- client = yield addAdminScopes(clientId, client);
537
- yield (0, _OAuth2ClientOps.putOAuth2Client)(clientId, client);
538
- yield addAdminStaticUserMapping(clientId);
901
+ client = yield addAdminScopes({
902
+ clientId,
903
+ client,
904
+ state
905
+ });
906
+ yield (0, _OAuth2ClientOps.putOAuth2Client)({
907
+ clientId,
908
+ clientData: client,
909
+ state
910
+ });
911
+ yield addAdminStaticUserMapping({
912
+ name: clientId,
913
+ state
914
+ });
539
915
  } catch (error) {
540
916
  (0, _Console.printMessage)("Error creating oauth2 client: ".concat(error.message), 'error');
541
917
  }
542
918
  });
543
919
  return _createOAuth2ClientWithAdminPrivileges.apply(this, arguments);
544
920
  }
545
- function createLongLivedToken(_x12, _x13, _x14, _x15, _x16) {
921
+ function createLongLivedToken(_x13) {
546
922
  return _createLongLivedToken.apply(this, arguments);
547
923
  }
548
924
  function _createLongLivedToken() {
549
- _createLongLivedToken = _asyncToGenerator(function* (clientId, clientSecret, scope, secret, lifetime) {
925
+ _createLongLivedToken = _asyncToGenerator(function* (_ref15) {
926
+ var {
927
+ clientId,
928
+ clientSecret,
929
+ scope,
930
+ secret,
931
+ lifetime,
932
+ state
933
+ } = _ref15;
550
934
  // get oauth2 client
551
- var client = yield (0, _OAuth2ClientOps.getOAuth2Client)(clientId);
935
+ var client = yield (0, _OAuth2ClientOps.getOAuth2Client)({
936
+ clientId,
937
+ state
938
+ });
552
939
  client.userpassword = clientSecret;
553
940
  // remember current lifetime
554
941
  var rememberedLifetime = client.coreOAuth2ClientConfig.accessTokenLifetime.value || 3600;
555
942
  // set long token lifetime
556
943
  client.coreOAuth2ClientConfig.accessTokenLifetime.value = lifetime;
557
- yield (0, _OAuth2ClientOps.putOAuth2Client)(clientId, client);
558
- var response = yield (0, _OAuth2OIDCApi.clientCredentialsGrant)(clientId, clientSecret, scope);
944
+ yield (0, _OAuth2ClientOps.putOAuth2Client)({
945
+ clientId,
946
+ clientData: client,
947
+ state
948
+ });
949
+ var response = yield (0, _OAuth2OIDCApi.clientCredentialsGrant)({
950
+ amBaseUrl: state.getHost(),
951
+ clientId,
952
+ clientSecret,
953
+ scope,
954
+ state
955
+ });
559
956
  var expires = new Date().getTime() + 1000 * response.expires_in;
560
957
  response.expires_on = new Date(expires).toLocaleString();
561
958
  // reset token lifetime
562
959
  client.coreOAuth2ClientConfig.accessTokenLifetime.value = rememberedLifetime;
563
- yield (0, _OAuth2ClientOps.putOAuth2Client)(clientId, client);
960
+ yield (0, _OAuth2ClientOps.putOAuth2Client)({
961
+ clientId,
962
+ clientData: client,
963
+ state
964
+ });
564
965
  // create secret with token as value
565
966
  if (secret) {
566
967
  var description = 'Long-lived admin token';
567
968
  try {
568
- yield (0, _SecretsApi.putSecret)(secret, response.access_token, description);
969
+ yield (0, _SecretsApi.putSecret)({
970
+ secretId: secret,
971
+ value: response.access_token,
972
+ description,
973
+ state
974
+ });
569
975
  response.secret = secret;
570
976
  } catch (error) {
571
977
  if (_lodash.default.get(error, 'response.data.code') === 400 && _lodash.default.get(error, 'response.data.message') === 'Failed to create secret, the secret already exists') {
572
978
  var newSecret = "".concat(secret, "-").concat(expires);
573
979
  (0, _Console.printMessage)("esv '".concat(secret, "' already exists, using ").concat(newSecret), 'warn');
574
- yield (0, _SecretsApi.putSecret)(newSecret, response.access_token, description);
980
+ yield (0, _SecretsApi.putSecret)({
981
+ secretId: newSecret,
982
+ value: response.access_token,
983
+ description,
984
+ state
985
+ });
575
986
  response.secret = newSecret;
576
987
  }
577
988
  }
@@ -581,12 +992,19 @@ function _createLongLivedToken() {
581
992
  });
582
993
  return _createLongLivedToken.apply(this, arguments);
583
994
  }
584
- function removeStaticUserMapping(_x17) {
995
+ function removeStaticUserMapping(_x14) {
585
996
  return _removeStaticUserMapping.apply(this, arguments);
586
997
  }
587
998
  function _removeStaticUserMapping() {
588
- _removeStaticUserMapping = _asyncToGenerator(function* (subject) {
589
- var authentication = yield (0, _IdmConfigApi.getConfigEntity)('authentication');
999
+ _removeStaticUserMapping = _asyncToGenerator(function* (_ref16) {
1000
+ var {
1001
+ subject,
1002
+ state
1003
+ } = _ref16;
1004
+ var authentication = yield (0, _IdmConfigApi.getConfigEntity)({
1005
+ entityId: 'authentication',
1006
+ state
1007
+ });
590
1008
  var removeMapping = false;
591
1009
  var mappings = authentication.rsFilter.staticUserMapping.filter(mapping => {
592
1010
  // find the subject and flag it
@@ -600,7 +1018,11 @@ function _removeStaticUserMapping() {
600
1018
  if (removeMapping) {
601
1019
  (0, _Console.printMessage)("Removing static user mapping for subject \"".concat(subject, "\"..."));
602
1020
  try {
603
- yield (0, _IdmConfigApi.putConfigEntity)('authentication', authentication);
1021
+ yield (0, _IdmConfigApi.putConfigEntity)({
1022
+ entityId: 'authentication',
1023
+ entityData: authentication,
1024
+ state
1025
+ });
604
1026
  } catch (putConfigEntityError) {
605
1027
  (0, _Console.printMessage)(putConfigEntityError, 'error');
606
1028
  (0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
@@ -611,16 +1033,26 @@ function _removeStaticUserMapping() {
611
1033
  });
612
1034
  return _removeStaticUserMapping.apply(this, arguments);
613
1035
  }
614
- function hideGenericExtensionAttributes(_x18, _x19) {
1036
+ function hideGenericExtensionAttributes(_x15) {
615
1037
  return _hideGenericExtensionAttributes.apply(this, arguments);
616
1038
  }
617
1039
  function _hideGenericExtensionAttributes() {
618
- _hideGenericExtensionAttributes = _asyncToGenerator(function* (includeCustomized, dryRun) {
619
- var managed = yield (0, _IdmConfigApi.getConfigEntity)('managed');
1040
+ _hideGenericExtensionAttributes = _asyncToGenerator(function* (_ref17) {
1041
+ var {
1042
+ includeCustomized,
1043
+ dryRun,
1044
+ state
1045
+ } = _ref17;
1046
+ var managed = yield (0, _IdmConfigApi.getConfigEntity)({
1047
+ entityId: 'managed',
1048
+ state
1049
+ });
620
1050
  var propertyNames = Object.keys(GENERIC_EXTENSION_ATTRIBUTES);
621
1051
  var updatedObjects = managed.objects.map(object => {
622
1052
  // ignore all other objects
623
- if (object.name !== (0, _OpsUtils.getRealmManagedUser)()) {
1053
+ if (object.name !== (0, _OpsUtils.getRealmManagedUser)({
1054
+ state
1055
+ })) {
624
1056
  return object;
625
1057
  }
626
1058
  propertyNames.forEach(name => {
@@ -643,7 +1075,11 @@ function _hideGenericExtensionAttributes() {
643
1075
  (0, _Console.printMessage)('Dry-run only. Changes are not saved.');
644
1076
  } else {
645
1077
  try {
646
- yield (0, _IdmConfigApi.putConfigEntity)('managed', managed);
1078
+ yield (0, _IdmConfigApi.putConfigEntity)({
1079
+ entityId: 'managed',
1080
+ entityData: managed,
1081
+ state
1082
+ });
647
1083
  } catch (putConfigEntityError) {
648
1084
  (0, _Console.printMessage)(putConfigEntityError, 'error');
649
1085
  (0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
@@ -652,16 +1088,26 @@ function _hideGenericExtensionAttributes() {
652
1088
  });
653
1089
  return _hideGenericExtensionAttributes.apply(this, arguments);
654
1090
  }
655
- function showGenericExtensionAttributes(_x20, _x21) {
1091
+ function showGenericExtensionAttributes(_x16) {
656
1092
  return _showGenericExtensionAttributes.apply(this, arguments);
657
1093
  }
658
1094
  function _showGenericExtensionAttributes() {
659
- _showGenericExtensionAttributes = _asyncToGenerator(function* (includeCustomized, dryRun) {
660
- var managed = yield (0, _IdmConfigApi.getConfigEntity)('managed');
1095
+ _showGenericExtensionAttributes = _asyncToGenerator(function* (_ref18) {
1096
+ var {
1097
+ includeCustomized,
1098
+ dryRun,
1099
+ state
1100
+ } = _ref18;
1101
+ var managed = yield (0, _IdmConfigApi.getConfigEntity)({
1102
+ entityId: 'managed',
1103
+ state
1104
+ });
661
1105
  var propertyNames = Object.keys(GENERIC_EXTENSION_ATTRIBUTES);
662
1106
  var updatedObjects = managed.objects.map(object => {
663
1107
  // ignore all other objects
664
- if (object.name !== (0, _OpsUtils.getRealmManagedUser)()) {
1108
+ if (object.name !== (0, _OpsUtils.getRealmManagedUser)({
1109
+ state
1110
+ })) {
665
1111
  return object;
666
1112
  }
667
1113
  propertyNames.forEach(name => {
@@ -684,7 +1130,11 @@ function _showGenericExtensionAttributes() {
684
1130
  (0, _Console.printMessage)('Dry-run only. Changes are not saved.');
685
1131
  } else {
686
1132
  try {
687
- yield (0, _IdmConfigApi.putConfigEntity)('managed', managed);
1133
+ yield (0, _IdmConfigApi.putConfigEntity)({
1134
+ entityId: 'managed',
1135
+ entityData: managed,
1136
+ state
1137
+ });
688
1138
  } catch (putConfigEntityError) {
689
1139
  (0, _Console.printMessage)(putConfigEntityError, 'error');
690
1140
  (0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
@@ -693,17 +1143,26 @@ function _showGenericExtensionAttributes() {
693
1143
  });
694
1144
  return _showGenericExtensionAttributes.apply(this, arguments);
695
1145
  }
696
- function repairOrgModelUser(_x22) {
1146
+ function repairOrgModelUser(_x17) {
697
1147
  return _repairOrgModelUser.apply(this, arguments);
698
1148
  }
699
1149
  function _repairOrgModelUser() {
700
- _repairOrgModelUser = _asyncToGenerator(function* (dryRun) {
701
- var managed = yield (0, _IdmConfigApi.getConfigEntity)('managed');
1150
+ _repairOrgModelUser = _asyncToGenerator(function* (_ref19) {
1151
+ var {
1152
+ dryRun,
1153
+ state
1154
+ } = _ref19;
1155
+ var managed = yield (0, _IdmConfigApi.getConfigEntity)({
1156
+ entityId: 'managed',
1157
+ state
1158
+ });
702
1159
  var RDVPs = ['memberOfOrgIDs'];
703
1160
  var repairData = false;
704
1161
  var updatedObjects = managed.objects.map(object => {
705
1162
  // ignore all other objects
706
- if (object.name !== (0, _OpsUtils.getRealmManagedUser)()) {
1163
+ if (object.name !== (0, _OpsUtils.getRealmManagedUser)({
1164
+ state
1165
+ })) {
707
1166
  return object;
708
1167
  }
709
1168
  (0, _Console.printMessage)("".concat(object.name, ": checking..."));
@@ -722,7 +1181,11 @@ function _repairOrgModelUser() {
722
1181
  managed.objects = updatedObjects;
723
1182
  if (!dryRun) {
724
1183
  try {
725
- yield (0, _IdmConfigApi.putConfigEntity)('managed', managed);
1184
+ yield (0, _IdmConfigApi.putConfigEntity)({
1185
+ entityId: 'managed',
1186
+ entityData: managed,
1187
+ state
1188
+ });
726
1189
  } catch (putConfigEntityError) {
727
1190
  (0, _Console.printMessage)(putConfigEntityError, 'error');
728
1191
  (0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
@@ -732,17 +1195,26 @@ function _repairOrgModelUser() {
732
1195
  });
733
1196
  return _repairOrgModelUser.apply(this, arguments);
734
1197
  }
735
- function repairOrgModelOrg(_x23) {
1198
+ function repairOrgModelOrg(_x18) {
736
1199
  return _repairOrgModelOrg.apply(this, arguments);
737
1200
  }
738
1201
  function _repairOrgModelOrg() {
739
- _repairOrgModelOrg = _asyncToGenerator(function* (dryRun) {
740
- var managed = yield (0, _IdmConfigApi.getConfigEntity)('managed');
1202
+ _repairOrgModelOrg = _asyncToGenerator(function* (_ref20) {
1203
+ var {
1204
+ dryRun,
1205
+ state
1206
+ } = _ref20;
1207
+ var managed = yield (0, _IdmConfigApi.getConfigEntity)({
1208
+ entityId: 'managed',
1209
+ state
1210
+ });
741
1211
  var RDVPs = ['adminIDs', 'ownerIDs', 'parentAdminIDs', 'parentOwnerIDs', 'parentIDs'];
742
1212
  var repairData = false;
743
1213
  var updatedObjects = managed.objects.map(object => {
744
1214
  // ignore all other objects
745
- if (object.name !== (0, _OrganizationOps.getRealmManagedOrganization)()) {
1215
+ if (object.name !== (0, _OrganizationOps.getRealmManagedOrganization)({
1216
+ state
1217
+ })) {
746
1218
  return object;
747
1219
  }
748
1220
  (0, _Console.printMessage)("".concat(object.name, ": checking..."));
@@ -761,7 +1233,11 @@ function _repairOrgModelOrg() {
761
1233
  managed.objects = updatedObjects;
762
1234
  if (!dryRun) {
763
1235
  try {
764
- yield (0, _IdmConfigApi.putConfigEntity)('managed', managed);
1236
+ yield (0, _IdmConfigApi.putConfigEntity)({
1237
+ entityId: 'managed',
1238
+ entityData: managed,
1239
+ state
1240
+ });
765
1241
  } catch (putConfigEntityError) {
766
1242
  (0, _Console.printMessage)(putConfigEntityError, 'error');
767
1243
  (0, _Console.printMessage)("Error: ".concat(putConfigEntityError), 'error');
@@ -795,7 +1271,7 @@ function _extendOrgModelPermissins() {
795
1271
  });
796
1272
  return _extendOrgModelPermissins.apply(this, arguments);
797
1273
  }
798
- function repairOrgModel(_x24, _x25, _x26) {
1274
+ function repairOrgModel(_x19) {
799
1275
  return _repairOrgModel.apply(this, arguments);
800
1276
  } // suggested by John K.
801
1277
  // export async function removeRealmNameFromManagedObjectLabels() {}
@@ -803,10 +1279,22 @@ function repairOrgModel(_x24, _x25, _x26) {
803
1279
  // export async function cleanUpPostmanArtifacts() {}
804
1280
  // export async function createSampleThemes() {}
805
1281
  function _repairOrgModel() {
806
- _repairOrgModel = _asyncToGenerator(function* (excludeCustomized, extendPermissions, dryRun) {
1282
+ _repairOrgModel = _asyncToGenerator(function* (_ref21) {
1283
+ var {
1284
+ excludeCustomized,
1285
+ extendPermissions,
1286
+ dryRun,
1287
+ state
1288
+ } = _ref21;
807
1289
  var repairData = false;
808
- repairData = repairData || (yield repairOrgModelUser(dryRun));
809
- repairData = repairData || (yield repairOrgModelOrg(dryRun));
1290
+ repairData = repairData || (yield repairOrgModelUser({
1291
+ dryRun,
1292
+ state
1293
+ }));
1294
+ repairData = repairData || (yield repairOrgModelOrg({
1295
+ dryRun,
1296
+ state
1297
+ }));
810
1298
  if (excludeCustomized) {
811
1299
  //
812
1300
  }