@rockcarver/frodo-lib 2.0.0-53 → 2.0.0-54

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/build.zip CHANGED
Binary file
@@ -17,6 +17,7 @@ var _SecretsOps = _interopRequireDefault(require("../ops/cloud/SecretsOps.js"));
17
17
  var _ServiceAccountOps = _interopRequireDefault(require("../ops/cloud/ServiceAccountOps.js"));
18
18
  var _StartupOps = _interopRequireDefault(require("../ops/cloud/StartupOps.js"));
19
19
  var _VariablesOps = _interopRequireDefault(require("../ops/cloud/VariablesOps.js"));
20
+ var _ConfigOps = _interopRequireDefault(require("../ops/ConfigOps.js"));
20
21
  var _ConnectionProfileOps = _interopRequireDefault(require("../ops/ConnectionProfileOps.js"));
21
22
  var _ConnectorOps = _interopRequireDefault(require("../ops/ConnectorOps.js"));
22
23
  var _EmailTemplateOps = _interopRequireDefault(require("../ops/EmailTemplateOps.js"));
@@ -95,6 +96,7 @@ var FrodoLib = exports.FrodoLib = function FrodoLib() {
95
96
  startup: (0, _StartupOps.default)(state),
96
97
  variable: (0, _VariablesOps.default)(state)
97
98
  },
99
+ config: (0, _ConfigOps.default)(state),
98
100
  conn: (0, _ConnectionProfileOps.default)(state),
99
101
  cache: (0, _TokenCacheOps.default)(state),
100
102
  email: {
@@ -1 +1 @@
1
- {"version":3,"file":"FrodoLib.js","names":["FrodoLib","exports","config","arguments","length","undefined","state","StateImpl","admin","AdminOps","agent","AgentOps","app","ApplicationOps","authn","journey","JourneyOps","node","NodeOps","settings","AuthenticationSettingsOps","authz","policy","PolicyOps","policySet","PolicySetOps","resourceType","ResourceTypeOps","cloud","adminFed","AdminFederationOps","feature","FeatureOps","log","LogOps","secret","SecretsOps","serviceAccount","ServiceAccountOps","startup","StartupOps","variable","VariablesOps","conn","ConnectionProfileOps","cache","TokenCacheOps","email","template","EmailTemplateOps","idm","IdmConfigOps","connector","ConnectorOps","managed","ManagedObjectOps","mapping","MappingOps","organization","OrganizationOps","recon","ReconOps","system","IdmSystemOps","info","InfoOps","login","AuthenticateOps","oauth2oidc","client","OAuth2ClientOps","endpoint","OAuth2OidcOps","external","IdpOps","provider","OAuth2ProviderOps","issuer","OAuth2TrustedJwtIssuerOps","realm","RealmOps","saml2","circlesOfTrust","CirclesOfTrustOps","entityProvider","Saml2Ops","script","ScriptOps","service","ServiceOps","theme","ThemeOps","utils","_objectSpread","ForgeRockUtils","ScriptValidationUtils","ExportImportUtils","Base64Utils","constants","ConstantsImpl","jose","JoseOps","json","JsonUtils","version","VersionUtils","createInstance","createInstanceWithAdminAccount","createInstanceWithServiceAccount","frodo","host","serviceAccountId","serviceAccountJwkStr","deploymentType","allowInsecureConnection","debug","curlirize","serviceAccountJwk","JSON","parse","username","password","_default","default"],"sources":["../../src/lib/FrodoLib.ts"],"sourcesContent":["// instantiable modules\nimport AdminOps, { Admin } from '../ops/AdminOps';\nimport AgentOps, { Agent } from '../ops/AgentOps';\nimport ApplicationOps, { Application } from '../ops/ApplicationOps';\nimport AuthenticateOps, { Authenticate } from '../ops/AuthenticateOps';\nimport AuthenticationSettingsOps, {\n AuthenticationSettings,\n} from '../ops/AuthenticationSettingsOps';\nimport CirclesOfTrustOps, { CirclesOfTrust } from '../ops/CirclesOfTrustOps';\nimport AdminFederationOps, {\n AdminFederation,\n} from '../ops/cloud/AdminFederationOps';\nimport FeatureOps, { Feature } from '../ops/cloud/FeatureOps';\nimport LogOps, { Log } from '../ops/cloud/LogOps';\nimport SecretsOps, { Secret } from '../ops/cloud/SecretsOps';\nimport ServiceAccountOps, {\n ServiceAccount,\n} from '../ops/cloud/ServiceAccountOps';\nimport StartupOps, { Startup } from '../ops/cloud/StartupOps';\nimport VariablesOps, { Variable } from '../ops/cloud/VariablesOps';\nimport ConnectionProfileOps, {\n ConnectionProfile,\n} from '../ops/ConnectionProfileOps';\nimport ConnectorOps, { Connector } from '../ops/ConnectorOps';\nimport EmailTemplateOps, { EmailTemplate } from '../ops/EmailTemplateOps';\nimport IdmConfigOps, { IdmConfig } from '../ops/IdmConfigOps';\nimport IdmSystemOps, { IdmSystem } from '../ops/IdmSystemOps';\nimport IdpOps, { Idp } from '../ops/IdpOps';\nimport InfoOps, { Info } from '../ops/InfoOps';\nimport JoseOps, { Jose } from '../ops/JoseOps';\nimport JourneyOps, { Journey } from '../ops/JourneyOps';\nimport ManagedObjectOps, { ManagedObject } from '../ops/ManagedObjectOps';\nimport MappingOps, { Mapping } from '../ops/MappingOps';\nimport NodeOps, { Node } from '../ops/NodeOps';\nimport OAuth2ClientOps, { OAuth2Client } from '../ops/OAuth2ClientOps';\nimport OAuth2OidcOps, { OAuth2Oidc } from '../ops/OAuth2OidcOps';\nimport OAuth2ProviderOps, { OAuth2Provider } from '../ops/OAuth2ProviderOps';\nimport OAuth2TrustedJwtIssuerOps, {\n OAuth2TrustedJwtIssuer,\n} from '../ops/OAuth2TrustedJwtIssuerOps';\nimport OrganizationOps, { Organization } from '../ops/OrganizationOps';\nimport PolicyOps, { Policy } from '../ops/PolicyOps';\nimport PolicySetOps, { PolicySet } from '../ops/PolicySetOps';\nimport RealmOps, { Realm } from '../ops/RealmOps';\nimport ReconOps, { Recon } from '../ops/ReconOps';\nimport ResourceTypeOps, { ResourceType } from '../ops/ResourceTypeOps';\nimport Saml2Ops, { Saml2 } from '../ops/Saml2Ops';\nimport ScriptOps, { Script } from '../ops/ScriptOps';\nimport ServiceOps, { Service } from '../ops/ServiceOps';\nimport ThemeOps, { Theme } from '../ops/ThemeOps';\nimport TokenCacheOps, { TokenCache } from '../ops/TokenCacheOps';\nimport VersionUtils, { Version } from '../ops/VersionUtils';\n// non-instantiable modules\nimport ConstantsImpl, { Constants } from '../shared/Constants';\nimport StateImpl, { State, StateInterface } from '../shared/State';\nimport Base64Utils, { Base64 } from '../utils/Base64Utils';\nimport ExportImportUtils, { ExportImport } from '../utils/ExportImportUtils';\nimport ForgeRockUtils, { FRUtils } from '../utils/ForgeRockUtils';\nimport JsonUtils, { Json } from '../utils/JsonUtils';\nimport ScriptValidationUtils, {\n ScriptValidation,\n} from '../utils/ScriptValidationUtils';\n\n/**\n * Frodo Library\n */\nexport type Frodo = {\n state: State;\n admin: Admin;\n agent: Agent;\n app: Application;\n\n authn: {\n journey: Journey;\n node: Node;\n settings: AuthenticationSettings;\n };\n\n authz: {\n policy: Policy;\n policySet: PolicySet;\n resourceType: ResourceType;\n };\n\n cloud: {\n adminFed: AdminFederation;\n feature: Feature;\n log: Log;\n secret: Secret;\n serviceAccount: ServiceAccount;\n startup: Startup;\n variable: Variable;\n };\n\n conn: ConnectionProfile;\n cache: TokenCache;\n\n email: {\n template: EmailTemplate;\n };\n\n idm: {\n config: IdmConfig;\n connector: Connector;\n managed: ManagedObject;\n mapping: Mapping;\n organization: Organization;\n recon: Recon;\n system: IdmSystem;\n };\n\n info: Info;\n login: Authenticate;\n\n oauth2oidc: {\n client: OAuth2Client;\n endpoint: OAuth2Oidc;\n external: Idp;\n provider: OAuth2Provider;\n issuer: OAuth2TrustedJwtIssuer;\n };\n\n realm: Realm;\n\n saml2: {\n circlesOfTrust: CirclesOfTrust;\n entityProvider: Saml2;\n };\n\n script: Script;\n service: Service;\n\n theme: Theme;\n\n utils: FRUtils &\n ScriptValidation &\n ExportImport &\n Base64 & {\n constants: Constants;\n jose: Jose;\n json: Json;\n version: Version;\n };\n\n /**\n * Create a new frodo instance\n * @param {StateInterface} config Initial state configuration to use with the new instance\n * @returns {Frodo} frodo instance\n */\n createInstance(config: StateInterface): Frodo;\n\n /**\n * Factory helper to create a frodo instance ready for logging in with an admin user account\n * @param {string} host host base URL, e.g. 'https://openam-my-tenant.forgeblocks.com/am'\n * @param {string} username admin account username\n * @param {string} password admin account password\n * @param {string} realm (optional) override default realm\n * @param {string} deploymentType (optional) override deployment type ('cloud', 'forgeops', or 'classic')\n * @param {boolean} allowInsecureConnection (optional) allow insecure connection\n * @param {boolean} debug (optional) enable debug output\n * @param {boolean} curlirize (optional) enable output of all library REST calls as curl commands\n * @returns {Frodo} frodo instance\n */\n createInstanceWithAdminAccount(\n host: string,\n serviceAccountId: string,\n serviceAccountJwkStr: string,\n realm?: string,\n deploymentType?: string,\n allowInsecureConnection?: boolean,\n debug?: boolean,\n curlirize?: boolean\n ): Frodo;\n\n /**\n * Factory helper to create a frodo instance ready for logging in with a service account\n * @param {string} host host base URL, e.g. 'https://openam-my-tenant.forgeblocks.com/am'\n * @param {string} serviceAccountId service account uuid\n * @param {string} serviceAccountJwkStr service account JWK as stringified JSON\n * @param {string} realm (optional) override default realm\n * @param {string} deploymentType (optional) override deployment type ('cloud', 'forgeops', or 'classic')\n * @param {boolean} allowInsecureConnection (optional) allow insecure connection\n * @param {boolean} debug (optional) enable debug output\n * @param {boolean} curlirize (optional) enable output of all library REST calls as curl commands\n * @returns {Frodo} frodo instance\n */\n createInstanceWithServiceAccount(\n host: string,\n serviceAccountId: string,\n serviceAccountJwkStr: string,\n realm?: string,\n deploymentType?: string,\n allowInsecureConnection?: boolean,\n debug?: boolean,\n curlirize?: boolean\n ): Frodo;\n};\n\n/**\n * Create a new frodo instance\n * @param {StateInterface} config Initial state configuration to use with the new instance\n * @returns {Frodo} frodo instance\n */\nconst FrodoLib = (config: StateInterface = {}): Frodo => {\n const state = StateImpl(config);\n return {\n state: state,\n admin: AdminOps(state),\n agent: AgentOps(state),\n app: ApplicationOps(state),\n\n authn: {\n journey: JourneyOps(state),\n node: NodeOps(state),\n settings: AuthenticationSettingsOps(state),\n },\n\n authz: {\n policy: PolicyOps(state),\n policySet: PolicySetOps(state),\n resourceType: ResourceTypeOps(state),\n },\n\n cloud: {\n adminFed: AdminFederationOps(state),\n feature: FeatureOps(state),\n log: LogOps(state),\n secret: SecretsOps(state),\n serviceAccount: ServiceAccountOps(state),\n startup: StartupOps(state),\n variable: VariablesOps(state),\n },\n\n conn: ConnectionProfileOps(state),\n cache: TokenCacheOps(state),\n\n email: {\n template: EmailTemplateOps(state),\n },\n\n idm: {\n config: IdmConfigOps(state),\n connector: ConnectorOps(state),\n managed: ManagedObjectOps(state),\n mapping: MappingOps(state),\n organization: OrganizationOps(state),\n recon: ReconOps(state),\n system: IdmSystemOps(state),\n },\n\n info: InfoOps(state),\n login: AuthenticateOps(state),\n\n oauth2oidc: {\n client: OAuth2ClientOps(state),\n endpoint: OAuth2OidcOps(state),\n external: IdpOps(state),\n provider: OAuth2ProviderOps(state),\n issuer: OAuth2TrustedJwtIssuerOps(state),\n },\n\n realm: RealmOps(state),\n\n saml2: {\n circlesOfTrust: CirclesOfTrustOps(state),\n entityProvider: Saml2Ops(state),\n },\n\n script: ScriptOps(state),\n service: ServiceOps(state),\n\n theme: ThemeOps(state),\n\n utils: {\n ...ForgeRockUtils(state),\n ...ScriptValidationUtils(state),\n ...ExportImportUtils(state),\n ...Base64Utils(),\n constants: ConstantsImpl,\n jose: JoseOps(state),\n json: JsonUtils(),\n version: VersionUtils(state),\n },\n\n createInstance,\n createInstanceWithAdminAccount,\n createInstanceWithServiceAccount,\n };\n};\n\nfunction createInstance(config: StateInterface): Frodo {\n const frodo = FrodoLib(config);\n return frodo;\n}\n\nfunction createInstanceWithServiceAccount(\n host: string,\n serviceAccountId: string,\n serviceAccountJwkStr: string,\n realm: string = undefined,\n deploymentType: string = undefined,\n allowInsecureConnection = false,\n debug = false,\n curlirize = false\n): Frodo {\n const config: StateInterface = {\n host,\n serviceAccountId,\n serviceAccountJwk: JSON.parse(serviceAccountJwkStr),\n realm,\n deploymentType,\n allowInsecureConnection,\n debug,\n curlirize,\n };\n const frodo = FrodoLib(config);\n return frodo;\n}\n\nfunction createInstanceWithAdminAccount(\n host: string,\n username: string,\n password: string,\n realm: string = undefined,\n deploymentType: string = undefined,\n allowInsecureConnection = false,\n debug = false,\n curlirize = false\n): Frodo {\n const config: StateInterface = {\n host,\n username,\n password,\n realm,\n deploymentType,\n allowInsecureConnection,\n debug,\n curlirize,\n };\n const frodo = FrodoLib(config);\n return frodo;\n}\n\n/**\n * Default frodo instance\n *\n * @remarks\n *\n * If your application requires a single connection to a ForgeRock Identity Platform\n * instance at a time, then this default instance is all you need:\n *\n * In order to use the default {@link Frodo | frodo} instance, you must populate its {@link State | state} with the\n * minimum required information to login to your ForgeRock Identity Platform instance:\n *\n * ```javascript\n * // configure the state before invoking any library functions that require credentials\n * state.setHost('https://instance0/am');\n * state.setUsername('admin');\n * state.setPassword('p@ssw0rd!');\n *\n * // now the library can login\n * frodo.login.getTokens();\n *\n * // and perform operations\n * frodo.authn.journey.exportJourney('Login');\n * ```\n *\n * If your application needs to connect to multiple ForgeRock Identity Platform instances\n * simultaneously, then you will want to create additional frodo instances using any of\n * the available factory methods accessible from the default instance:\n *\n * {@link frodo.createInstance}\n * ```javascript\n * // use factory method to create a new Frodo instance\n * const instance1 = frodo.createInstance({\n * host: 'https://instance1/am',\n * username: 'admin',\n * password: 'p@ssw0rd!',\n * });\n *\n * // now the instance can login\n * instance1.login.getTokens();\n *\n * // and perform operations\n * instance1.authn.journey.exportJourney('Login');\n * ```\n *\n * {@link frodo.createInstanceWithAdminAccount}\n * ```javascript\n * // use factory method to create a new Frodo instance ready to login with an admin user account\n * const instance2 = frodo.createInstanceWithAdminAccount(\n * 'https://instance2/am',\n * 'admin',\n * 'p@ssw0rd!'\n * );\n *\n * // now the instance can login\n * instance2.login.getTokens();\n *\n * // and perform operations\n * instance2.authn.journey.exportJourney('Login');\n * ```\n *\n * {@link frodo.createInstanceWithServiceAccount}\n * ```javascript\n * // use factory method to create a new Frodo instance ready to login with a service account\n * const instance3 = frodo.createInstanceWithServiceAccount(\n * 'https://instance3/am',\n * 'serviceAccount',\n * '{\"k\":\"jwk\"}'\n * );\n *\n * // now the instance can login\n * instance3.login.getTokens();\n *\n * // and perform operations\n * instance3.authn.journey.exportJourney('Login');\n * ```\n */\nconst frodo = FrodoLib();\n\n/**\n * Default state instance\n *\n * @remarks\n *\n * {@link Frodo} maintains a {@link State | state} for each instance. The state is where Frodo gets configuration\n * information from like host to connecto to, username and password to use, whether to\n * allow insecure connections or not, etc. As the library operates, it updates its state.\n *\n * The default frodo instance contains an empty state instance by default. In order to\n * use the default frodo instance, you must populate its state with the minimum required\n * information to login to your ForgeRock Identity Platform instance:\n *\n * ```javascript\n * // configure the state before invoking any library functions that require credentials\n * state.setHost('https://instance0/am');\n * state.setUsername('admin');\n * state.setPassword('p@ssw0rd!');\n *\n * // now the library can login\n * frodo.login.getTokens();\n *\n * // and perform operations\n * frodo.authn.journey.exportJourney('Login');\n * ```\n */\nconst state = frodo.state;\n\nexport { frodo, FrodoLib, state };\n\nexport default FrodoLib;\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;0XAAA;AAoDA;AAWA;AACA;AACA;;AAqIA;AACA;AACA;AACA;AACA;AACA,IAAMA,QAAQ,GAAAC,OAAA,CAAAD,QAAA,GAAG,SAAXA,QAAQA,CAAA,EAA2C;EAAA,IAAvCE,MAAsB,GAAAC,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,CAAC,CAAC;EAC3C,IAAMG,KAAK,GAAG,IAAAC,cAAS,EAACL,MAAM,CAAC;EAC/B,OAAO;IACLI,KAAK,EAAEA,KAAK;IACZE,KAAK,EAAE,IAAAC,iBAAQ,EAACH,KAAK,CAAC;IACtBI,KAAK,EAAE,IAAAC,iBAAQ,EAACL,KAAK,CAAC;IACtBM,GAAG,EAAE,IAAAC,uBAAc,EAACP,KAAK,CAAC;IAE1BQ,KAAK,EAAE;MACLC,OAAO,EAAE,IAAAC,mBAAU,EAACV,KAAK,CAAC;MAC1BW,IAAI,EAAE,IAAAC,gBAAO,EAACZ,KAAK,CAAC;MACpBa,QAAQ,EAAE,IAAAC,kCAAyB,EAACd,KAAK;IAC3C,CAAC;IAEDe,KAAK,EAAE;MACLC,MAAM,EAAE,IAAAC,kBAAS,EAACjB,KAAK,CAAC;MACxBkB,SAAS,EAAE,IAAAC,qBAAY,EAACnB,KAAK,CAAC;MAC9BoB,YAAY,EAAE,IAAAC,wBAAe,EAACrB,KAAK;IACrC,CAAC;IAEDsB,KAAK,EAAE;MACLC,QAAQ,EAAE,IAAAC,2BAAkB,EAACxB,KAAK,CAAC;MACnCyB,OAAO,EAAE,IAAAC,mBAAU,EAAC1B,KAAK,CAAC;MAC1B2B,GAAG,EAAE,IAAAC,eAAM,EAAC5B,KAAK,CAAC;MAClB6B,MAAM,EAAE,IAAAC,mBAAU,EAAC9B,KAAK,CAAC;MACzB+B,cAAc,EAAE,IAAAC,0BAAiB,EAAChC,KAAK,CAAC;MACxCiC,OAAO,EAAE,IAAAC,mBAAU,EAAClC,KAAK,CAAC;MAC1BmC,QAAQ,EAAE,IAAAC,qBAAY,EAACpC,KAAK;IAC9B,CAAC;IAEDqC,IAAI,EAAE,IAAAC,6BAAoB,EAACtC,KAAK,CAAC;IACjCuC,KAAK,EAAE,IAAAC,sBAAa,EAACxC,KAAK,CAAC;IAE3ByC,KAAK,EAAE;MACLC,QAAQ,EAAE,IAAAC,yBAAgB,EAAC3C,KAAK;IAClC,CAAC;IAED4C,GAAG,EAAE;MACHhD,MAAM,EAAE,IAAAiD,qBAAY,EAAC7C,KAAK,CAAC;MAC3B8C,SAAS,EAAE,IAAAC,qBAAY,EAAC/C,KAAK,CAAC;MAC9BgD,OAAO,EAAE,IAAAC,yBAAgB,EAACjD,KAAK,CAAC;MAChCkD,OAAO,EAAE,IAAAC,mBAAU,EAACnD,KAAK,CAAC;MAC1BoD,YAAY,EAAE,IAAAC,wBAAe,EAACrD,KAAK,CAAC;MACpCsD,KAAK,EAAE,IAAAC,iBAAQ,EAACvD,KAAK,CAAC;MACtBwD,MAAM,EAAE,IAAAC,qBAAY,EAACzD,KAAK;IAC5B,CAAC;IAED0D,IAAI,EAAE,IAAAC,gBAAO,EAAC3D,KAAK,CAAC;IACpB4D,KAAK,EAAE,IAAAC,wBAAe,EAAC7D,KAAK,CAAC;IAE7B8D,UAAU,EAAE;MACVC,MAAM,EAAE,IAAAC,wBAAe,EAAChE,KAAK,CAAC;MAC9BiE,QAAQ,EAAE,IAAAC,sBAAa,EAAClE,KAAK,CAAC;MAC9BmE,QAAQ,EAAE,IAAAC,eAAM,EAACpE,KAAK,CAAC;MACvBqE,QAAQ,EAAE,IAAAC,0BAAiB,EAACtE,KAAK,CAAC;MAClCuE,MAAM,EAAE,IAAAC,kCAAyB,EAACxE,KAAK;IACzC,CAAC;IAEDyE,KAAK,EAAE,IAAAC,iBAAQ,EAAC1E,KAAK,CAAC;IAEtB2E,KAAK,EAAE;MACLC,cAAc,EAAE,IAAAC,0BAAiB,EAAC7E,KAAK,CAAC;MACxC8E,cAAc,EAAE,IAAAC,iBAAQ,EAAC/E,KAAK;IAChC,CAAC;IAEDgF,MAAM,EAAE,IAAAC,kBAAS,EAACjF,KAAK,CAAC;IACxBkF,OAAO,EAAE,IAAAC,mBAAU,EAACnF,KAAK,CAAC;IAE1BoF,KAAK,EAAE,IAAAC,iBAAQ,EAACrF,KAAK,CAAC;IAEtBsF,KAAK,EAAAC,aAAA,CAAAA,aAAA,CAAAA,aAAA,CAAAA,aAAA,CAAAA,aAAA,KACA,IAAAC,uBAAc,EAACxF,KAAK,CAAC,GACrB,IAAAyF,8BAAqB,EAACzF,KAAK,CAAC,GAC5B,IAAA0F,0BAAiB,EAAC1F,KAAK,CAAC,GACxB,IAAA2F,oBAAW,EAAC,CAAC;MAChBC,SAAS,EAAEC,kBAAa;MACxBC,IAAI,EAAE,IAAAC,gBAAO,EAAC/F,KAAK,CAAC;MACpBgG,IAAI,EAAE,IAAAC,kBAAS,EAAC,CAAC;MACjBC,OAAO,EAAE,IAAAC,qBAAY,EAACnG,KAAK;IAAC,EAC7B;IAEDoG,cAAc;IACdC,8BAA8B;IAC9BC;EACF,CAAC;AACH,CAAC;AAED,SAASF,cAAcA,CAACxG,MAAsB,EAAS;EACrD,IAAM2G,KAAK,GAAG7G,QAAQ,CAACE,MAAM,CAAC;EAC9B,OAAO2G,KAAK;AACd;AAEA,SAASD,gCAAgCA,CACvCE,IAAY,EACZC,gBAAwB,EACxBC,oBAA4B,EAMrB;EAAA,IALPjC,KAAa,GAAA5E,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAGE,SAAS;EAAA,IACzB4G,cAAsB,GAAA9G,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAGE,SAAS;EAAA,IAClC6G,uBAAuB,GAAA/G,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAAA,IAC/BgH,KAAK,GAAAhH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAAA,IACbiH,SAAS,GAAAjH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAEjB,IAAMD,MAAsB,GAAG;IAC7B4G,IAAI;IACJC,gBAAgB;IAChBM,iBAAiB,EAAEC,IAAI,CAACC,KAAK,CAACP,oBAAoB,CAAC;IACnDjC,KAAK;IACLkC,cAAc;IACdC,uBAAuB;IACvBC,KAAK;IACLC;EACF,CAAC;EACD,IAAMP,KAAK,GAAG7G,QAAQ,CAACE,MAAM,CAAC;EAC9B,OAAO2G,KAAK;AACd;AAEA,SAASF,8BAA8BA,CACrCG,IAAY,EACZU,QAAgB,EAChBC,QAAgB,EAMT;EAAA,IALP1C,KAAa,GAAA5E,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAGE,SAAS;EAAA,IACzB4G,cAAsB,GAAA9G,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAGE,SAAS;EAAA,IAClC6G,uBAAuB,GAAA/G,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAAA,IAC/BgH,KAAK,GAAAhH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAAA,IACbiH,SAAS,GAAAjH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAEjB,IAAMD,MAAsB,GAAG;IAC7B4G,IAAI;IACJU,QAAQ;IACRC,QAAQ;IACR1C,KAAK;IACLkC,cAAc;IACdC,uBAAuB;IACvBC,KAAK;IACLC;EACF,CAAC;EACD,IAAMP,KAAK,GAAG7G,QAAQ,CAACE,MAAM,CAAC;EAC9B,OAAO2G,KAAK;AACd;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,IAAMA,KAAK,GAAA5G,OAAA,CAAA4G,KAAA,GAAG7G,QAAQ,CAAC,CAAC;;AAExB;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,IAAMM,KAAK,GAAAL,OAAA,CAAAK,KAAA,GAAGuG,KAAK,CAACvG,KAAK;AAAC,IAAAoH,QAAA,GAAAzH,OAAA,CAAA0H,OAAA,GAIX3H,QAAQ"}
1
+ {"version":3,"file":"FrodoLib.js","names":["FrodoLib","exports","config","arguments","length","undefined","state","StateImpl","admin","AdminOps","agent","AgentOps","app","ApplicationOps","authn","journey","JourneyOps","node","NodeOps","settings","AuthenticationSettingsOps","authz","policy","PolicyOps","policySet","PolicySetOps","resourceType","ResourceTypeOps","cloud","adminFed","AdminFederationOps","feature","FeatureOps","log","LogOps","secret","SecretsOps","serviceAccount","ServiceAccountOps","startup","StartupOps","variable","VariablesOps","ConfigOps","conn","ConnectionProfileOps","cache","TokenCacheOps","email","template","EmailTemplateOps","idm","IdmConfigOps","connector","ConnectorOps","managed","ManagedObjectOps","mapping","MappingOps","organization","OrganizationOps","recon","ReconOps","system","IdmSystemOps","info","InfoOps","login","AuthenticateOps","oauth2oidc","client","OAuth2ClientOps","endpoint","OAuth2OidcOps","external","IdpOps","provider","OAuth2ProviderOps","issuer","OAuth2TrustedJwtIssuerOps","realm","RealmOps","saml2","circlesOfTrust","CirclesOfTrustOps","entityProvider","Saml2Ops","script","ScriptOps","service","ServiceOps","theme","ThemeOps","utils","_objectSpread","ForgeRockUtils","ScriptValidationUtils","ExportImportUtils","Base64Utils","constants","ConstantsImpl","jose","JoseOps","json","JsonUtils","version","VersionUtils","createInstance","createInstanceWithAdminAccount","createInstanceWithServiceAccount","frodo","host","serviceAccountId","serviceAccountJwkStr","deploymentType","allowInsecureConnection","debug","curlirize","serviceAccountJwk","JSON","parse","username","password","_default","default"],"sources":["../../src/lib/FrodoLib.ts"],"sourcesContent":["// instantiable modules\nimport AdminOps, { Admin } from '../ops/AdminOps';\nimport AgentOps, { Agent } from '../ops/AgentOps';\nimport ApplicationOps, { Application } from '../ops/ApplicationOps';\nimport AuthenticateOps, { Authenticate } from '../ops/AuthenticateOps';\nimport AuthenticationSettingsOps, {\n AuthenticationSettings,\n} from '../ops/AuthenticationSettingsOps';\nimport CirclesOfTrustOps, { CirclesOfTrust } from '../ops/CirclesOfTrustOps';\nimport AdminFederationOps, {\n AdminFederation,\n} from '../ops/cloud/AdminFederationOps';\nimport FeatureOps, { Feature } from '../ops/cloud/FeatureOps';\nimport LogOps, { Log } from '../ops/cloud/LogOps';\nimport SecretsOps, { Secret } from '../ops/cloud/SecretsOps';\nimport ServiceAccountOps, {\n ServiceAccount,\n} from '../ops/cloud/ServiceAccountOps';\nimport StartupOps, { Startup } from '../ops/cloud/StartupOps';\nimport VariablesOps, { Variable } from '../ops/cloud/VariablesOps';\nimport ConfigOps, { Config } from '../ops/ConfigOps';\nimport ConnectionProfileOps, {\n ConnectionProfile,\n} from '../ops/ConnectionProfileOps';\nimport ConnectorOps, { Connector } from '../ops/ConnectorOps';\nimport EmailTemplateOps, { EmailTemplate } from '../ops/EmailTemplateOps';\nimport IdmConfigOps, { IdmConfig } from '../ops/IdmConfigOps';\nimport IdmSystemOps, { IdmSystem } from '../ops/IdmSystemOps';\nimport IdpOps, { Idp } from '../ops/IdpOps';\nimport InfoOps, { Info } from '../ops/InfoOps';\nimport JoseOps, { Jose } from '../ops/JoseOps';\nimport JourneyOps, { Journey } from '../ops/JourneyOps';\nimport ManagedObjectOps, { ManagedObject } from '../ops/ManagedObjectOps';\nimport MappingOps, { Mapping } from '../ops/MappingOps';\nimport NodeOps, { Node } from '../ops/NodeOps';\nimport OAuth2ClientOps, { OAuth2Client } from '../ops/OAuth2ClientOps';\nimport OAuth2OidcOps, { OAuth2Oidc } from '../ops/OAuth2OidcOps';\nimport OAuth2ProviderOps, { OAuth2Provider } from '../ops/OAuth2ProviderOps';\nimport OAuth2TrustedJwtIssuerOps, {\n OAuth2TrustedJwtIssuer,\n} from '../ops/OAuth2TrustedJwtIssuerOps';\nimport OrganizationOps, { Organization } from '../ops/OrganizationOps';\nimport PolicyOps, { Policy } from '../ops/PolicyOps';\nimport PolicySetOps, { PolicySet } from '../ops/PolicySetOps';\nimport RealmOps, { Realm } from '../ops/RealmOps';\nimport ReconOps, { Recon } from '../ops/ReconOps';\nimport ResourceTypeOps, { ResourceType } from '../ops/ResourceTypeOps';\nimport Saml2Ops, { Saml2 } from '../ops/Saml2Ops';\nimport ScriptOps, { Script } from '../ops/ScriptOps';\nimport ServiceOps, { Service } from '../ops/ServiceOps';\nimport ThemeOps, { Theme } from '../ops/ThemeOps';\nimport TokenCacheOps, { TokenCache } from '../ops/TokenCacheOps';\nimport VersionUtils, { Version } from '../ops/VersionUtils';\n// non-instantiable modules\nimport ConstantsImpl, { Constants } from '../shared/Constants';\nimport StateImpl, { State, StateInterface } from '../shared/State';\nimport Base64Utils, { Base64 } from '../utils/Base64Utils';\nimport ExportImportUtils, { ExportImport } from '../utils/ExportImportUtils';\nimport ForgeRockUtils, { FRUtils } from '../utils/ForgeRockUtils';\nimport JsonUtils, { Json } from '../utils/JsonUtils';\nimport ScriptValidationUtils, {\n ScriptValidation,\n} from '../utils/ScriptValidationUtils';\n\n/**\n * Frodo Library\n */\nexport type Frodo = {\n state: State;\n admin: Admin;\n agent: Agent;\n app: Application;\n\n authn: {\n journey: Journey;\n node: Node;\n settings: AuthenticationSettings;\n };\n\n authz: {\n policy: Policy;\n policySet: PolicySet;\n resourceType: ResourceType;\n };\n\n cloud: {\n adminFed: AdminFederation;\n feature: Feature;\n log: Log;\n secret: Secret;\n serviceAccount: ServiceAccount;\n startup: Startup;\n variable: Variable;\n };\n\n config: Config;\n conn: ConnectionProfile;\n cache: TokenCache;\n\n email: {\n template: EmailTemplate;\n };\n\n idm: {\n config: IdmConfig;\n connector: Connector;\n managed: ManagedObject;\n mapping: Mapping;\n organization: Organization;\n recon: Recon;\n system: IdmSystem;\n };\n\n info: Info;\n login: Authenticate;\n\n oauth2oidc: {\n client: OAuth2Client;\n endpoint: OAuth2Oidc;\n external: Idp;\n provider: OAuth2Provider;\n issuer: OAuth2TrustedJwtIssuer;\n };\n\n realm: Realm;\n\n saml2: {\n circlesOfTrust: CirclesOfTrust;\n entityProvider: Saml2;\n };\n\n script: Script;\n service: Service;\n\n theme: Theme;\n\n utils: FRUtils &\n ScriptValidation &\n ExportImport &\n Base64 & {\n constants: Constants;\n jose: Jose;\n json: Json;\n version: Version;\n };\n\n /**\n * Create a new frodo instance\n * @param {StateInterface} config Initial state configuration to use with the new instance\n * @returns {Frodo} frodo instance\n */\n createInstance(config: StateInterface): Frodo;\n\n /**\n * Factory helper to create a frodo instance ready for logging in with an admin user account\n * @param {string} host host base URL, e.g. 'https://openam-my-tenant.forgeblocks.com/am'\n * @param {string} username admin account username\n * @param {string} password admin account password\n * @param {string} realm (optional) override default realm\n * @param {string} deploymentType (optional) override deployment type ('cloud', 'forgeops', or 'classic')\n * @param {boolean} allowInsecureConnection (optional) allow insecure connection\n * @param {boolean} debug (optional) enable debug output\n * @param {boolean} curlirize (optional) enable output of all library REST calls as curl commands\n * @returns {Frodo} frodo instance\n */\n createInstanceWithAdminAccount(\n host: string,\n serviceAccountId: string,\n serviceAccountJwkStr: string,\n realm?: string,\n deploymentType?: string,\n allowInsecureConnection?: boolean,\n debug?: boolean,\n curlirize?: boolean\n ): Frodo;\n\n /**\n * Factory helper to create a frodo instance ready for logging in with a service account\n * @param {string} host host base URL, e.g. 'https://openam-my-tenant.forgeblocks.com/am'\n * @param {string} serviceAccountId service account uuid\n * @param {string} serviceAccountJwkStr service account JWK as stringified JSON\n * @param {string} realm (optional) override default realm\n * @param {string} deploymentType (optional) override deployment type ('cloud', 'forgeops', or 'classic')\n * @param {boolean} allowInsecureConnection (optional) allow insecure connection\n * @param {boolean} debug (optional) enable debug output\n * @param {boolean} curlirize (optional) enable output of all library REST calls as curl commands\n * @returns {Frodo} frodo instance\n */\n createInstanceWithServiceAccount(\n host: string,\n serviceAccountId: string,\n serviceAccountJwkStr: string,\n realm?: string,\n deploymentType?: string,\n allowInsecureConnection?: boolean,\n debug?: boolean,\n curlirize?: boolean\n ): Frodo;\n};\n\n/**\n * Create a new frodo instance\n * @param {StateInterface} config Initial state configuration to use with the new instance\n * @returns {Frodo} frodo instance\n */\nconst FrodoLib = (config: StateInterface = {}): Frodo => {\n const state = StateImpl(config);\n return {\n state: state,\n admin: AdminOps(state),\n agent: AgentOps(state),\n app: ApplicationOps(state),\n\n authn: {\n journey: JourneyOps(state),\n node: NodeOps(state),\n settings: AuthenticationSettingsOps(state),\n },\n\n authz: {\n policy: PolicyOps(state),\n policySet: PolicySetOps(state),\n resourceType: ResourceTypeOps(state),\n },\n\n cloud: {\n adminFed: AdminFederationOps(state),\n feature: FeatureOps(state),\n log: LogOps(state),\n secret: SecretsOps(state),\n serviceAccount: ServiceAccountOps(state),\n startup: StartupOps(state),\n variable: VariablesOps(state),\n },\n\n config: ConfigOps(state),\n conn: ConnectionProfileOps(state),\n cache: TokenCacheOps(state),\n\n email: {\n template: EmailTemplateOps(state),\n },\n\n idm: {\n config: IdmConfigOps(state),\n connector: ConnectorOps(state),\n managed: ManagedObjectOps(state),\n mapping: MappingOps(state),\n organization: OrganizationOps(state),\n recon: ReconOps(state),\n system: IdmSystemOps(state),\n },\n\n info: InfoOps(state),\n login: AuthenticateOps(state),\n\n oauth2oidc: {\n client: OAuth2ClientOps(state),\n endpoint: OAuth2OidcOps(state),\n external: IdpOps(state),\n provider: OAuth2ProviderOps(state),\n issuer: OAuth2TrustedJwtIssuerOps(state),\n },\n\n realm: RealmOps(state),\n\n saml2: {\n circlesOfTrust: CirclesOfTrustOps(state),\n entityProvider: Saml2Ops(state),\n },\n\n script: ScriptOps(state),\n service: ServiceOps(state),\n\n theme: ThemeOps(state),\n\n utils: {\n ...ForgeRockUtils(state),\n ...ScriptValidationUtils(state),\n ...ExportImportUtils(state),\n ...Base64Utils(),\n constants: ConstantsImpl,\n jose: JoseOps(state),\n json: JsonUtils(),\n version: VersionUtils(state),\n },\n\n createInstance,\n createInstanceWithAdminAccount,\n createInstanceWithServiceAccount,\n };\n};\n\nfunction createInstance(config: StateInterface): Frodo {\n const frodo = FrodoLib(config);\n return frodo;\n}\n\nfunction createInstanceWithServiceAccount(\n host: string,\n serviceAccountId: string,\n serviceAccountJwkStr: string,\n realm: string = undefined,\n deploymentType: string = undefined,\n allowInsecureConnection = false,\n debug = false,\n curlirize = false\n): Frodo {\n const config: StateInterface = {\n host,\n serviceAccountId,\n serviceAccountJwk: JSON.parse(serviceAccountJwkStr),\n realm,\n deploymentType,\n allowInsecureConnection,\n debug,\n curlirize,\n };\n const frodo = FrodoLib(config);\n return frodo;\n}\n\nfunction createInstanceWithAdminAccount(\n host: string,\n username: string,\n password: string,\n realm: string = undefined,\n deploymentType: string = undefined,\n allowInsecureConnection = false,\n debug = false,\n curlirize = false\n): Frodo {\n const config: StateInterface = {\n host,\n username,\n password,\n realm,\n deploymentType,\n allowInsecureConnection,\n debug,\n curlirize,\n };\n const frodo = FrodoLib(config);\n return frodo;\n}\n\n/**\n * Default frodo instance\n *\n * @remarks\n *\n * If your application requires a single connection to a ForgeRock Identity Platform\n * instance at a time, then this default instance is all you need:\n *\n * In order to use the default {@link Frodo | frodo} instance, you must populate its {@link State | state} with the\n * minimum required information to login to your ForgeRock Identity Platform instance:\n *\n * ```javascript\n * // configure the state before invoking any library functions that require credentials\n * state.setHost('https://instance0/am');\n * state.setUsername('admin');\n * state.setPassword('p@ssw0rd!');\n *\n * // now the library can login\n * frodo.login.getTokens();\n *\n * // and perform operations\n * frodo.authn.journey.exportJourney('Login');\n * ```\n *\n * If your application needs to connect to multiple ForgeRock Identity Platform instances\n * simultaneously, then you will want to create additional frodo instances using any of\n * the available factory methods accessible from the default instance:\n *\n * {@link frodo.createInstance}\n * ```javascript\n * // use factory method to create a new Frodo instance\n * const instance1 = frodo.createInstance({\n * host: 'https://instance1/am',\n * username: 'admin',\n * password: 'p@ssw0rd!',\n * });\n *\n * // now the instance can login\n * instance1.login.getTokens();\n *\n * // and perform operations\n * instance1.authn.journey.exportJourney('Login');\n * ```\n *\n * {@link frodo.createInstanceWithAdminAccount}\n * ```javascript\n * // use factory method to create a new Frodo instance ready to login with an admin user account\n * const instance2 = frodo.createInstanceWithAdminAccount(\n * 'https://instance2/am',\n * 'admin',\n * 'p@ssw0rd!'\n * );\n *\n * // now the instance can login\n * instance2.login.getTokens();\n *\n * // and perform operations\n * instance2.authn.journey.exportJourney('Login');\n * ```\n *\n * {@link frodo.createInstanceWithServiceAccount}\n * ```javascript\n * // use factory method to create a new Frodo instance ready to login with a service account\n * const instance3 = frodo.createInstanceWithServiceAccount(\n * 'https://instance3/am',\n * 'serviceAccount',\n * '{\"k\":\"jwk\"}'\n * );\n *\n * // now the instance can login\n * instance3.login.getTokens();\n *\n * // and perform operations\n * instance3.authn.journey.exportJourney('Login');\n * ```\n */\nconst frodo = FrodoLib();\n\n/**\n * Default state instance\n *\n * @remarks\n *\n * {@link Frodo} maintains a {@link State | state} for each instance. The state is where Frodo gets configuration\n * information from like host to connecto to, username and password to use, whether to\n * allow insecure connections or not, etc. As the library operates, it updates its state.\n *\n * The default frodo instance contains an empty state instance by default. In order to\n * use the default frodo instance, you must populate its state with the minimum required\n * information to login to your ForgeRock Identity Platform instance:\n *\n * ```javascript\n * // configure the state before invoking any library functions that require credentials\n * state.setHost('https://instance0/am');\n * state.setUsername('admin');\n * state.setPassword('p@ssw0rd!');\n *\n * // now the library can login\n * frodo.login.getTokens();\n *\n * // and perform operations\n * frodo.authn.journey.exportJourney('Login');\n * ```\n */\nconst state = frodo.state;\n\nexport { frodo, FrodoLib, state };\n\nexport default FrodoLib;\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;0XAAA;AAqDA;AAWA;AACA;AACA;;AAsIA;AACA;AACA;AACA;AACA;AACA,IAAMA,QAAQ,GAAAC,OAAA,CAAAD,QAAA,GAAG,SAAXA,QAAQA,CAAA,EAA2C;EAAA,IAAvCE,MAAsB,GAAAC,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,CAAC,CAAC;EAC3C,IAAMG,KAAK,GAAG,IAAAC,cAAS,EAACL,MAAM,CAAC;EAC/B,OAAO;IACLI,KAAK,EAAEA,KAAK;IACZE,KAAK,EAAE,IAAAC,iBAAQ,EAACH,KAAK,CAAC;IACtBI,KAAK,EAAE,IAAAC,iBAAQ,EAACL,KAAK,CAAC;IACtBM,GAAG,EAAE,IAAAC,uBAAc,EAACP,KAAK,CAAC;IAE1BQ,KAAK,EAAE;MACLC,OAAO,EAAE,IAAAC,mBAAU,EAACV,KAAK,CAAC;MAC1BW,IAAI,EAAE,IAAAC,gBAAO,EAACZ,KAAK,CAAC;MACpBa,QAAQ,EAAE,IAAAC,kCAAyB,EAACd,KAAK;IAC3C,CAAC;IAEDe,KAAK,EAAE;MACLC,MAAM,EAAE,IAAAC,kBAAS,EAACjB,KAAK,CAAC;MACxBkB,SAAS,EAAE,IAAAC,qBAAY,EAACnB,KAAK,CAAC;MAC9BoB,YAAY,EAAE,IAAAC,wBAAe,EAACrB,KAAK;IACrC,CAAC;IAEDsB,KAAK,EAAE;MACLC,QAAQ,EAAE,IAAAC,2BAAkB,EAACxB,KAAK,CAAC;MACnCyB,OAAO,EAAE,IAAAC,mBAAU,EAAC1B,KAAK,CAAC;MAC1B2B,GAAG,EAAE,IAAAC,eAAM,EAAC5B,KAAK,CAAC;MAClB6B,MAAM,EAAE,IAAAC,mBAAU,EAAC9B,KAAK,CAAC;MACzB+B,cAAc,EAAE,IAAAC,0BAAiB,EAAChC,KAAK,CAAC;MACxCiC,OAAO,EAAE,IAAAC,mBAAU,EAAClC,KAAK,CAAC;MAC1BmC,QAAQ,EAAE,IAAAC,qBAAY,EAACpC,KAAK;IAC9B,CAAC;IAEDJ,MAAM,EAAE,IAAAyC,kBAAS,EAACrC,KAAK,CAAC;IACxBsC,IAAI,EAAE,IAAAC,6BAAoB,EAACvC,KAAK,CAAC;IACjCwC,KAAK,EAAE,IAAAC,sBAAa,EAACzC,KAAK,CAAC;IAE3B0C,KAAK,EAAE;MACLC,QAAQ,EAAE,IAAAC,yBAAgB,EAAC5C,KAAK;IAClC,CAAC;IAED6C,GAAG,EAAE;MACHjD,MAAM,EAAE,IAAAkD,qBAAY,EAAC9C,KAAK,CAAC;MAC3B+C,SAAS,EAAE,IAAAC,qBAAY,EAAChD,KAAK,CAAC;MAC9BiD,OAAO,EAAE,IAAAC,yBAAgB,EAAClD,KAAK,CAAC;MAChCmD,OAAO,EAAE,IAAAC,mBAAU,EAACpD,KAAK,CAAC;MAC1BqD,YAAY,EAAE,IAAAC,wBAAe,EAACtD,KAAK,CAAC;MACpCuD,KAAK,EAAE,IAAAC,iBAAQ,EAACxD,KAAK,CAAC;MACtByD,MAAM,EAAE,IAAAC,qBAAY,EAAC1D,KAAK;IAC5B,CAAC;IAED2D,IAAI,EAAE,IAAAC,gBAAO,EAAC5D,KAAK,CAAC;IACpB6D,KAAK,EAAE,IAAAC,wBAAe,EAAC9D,KAAK,CAAC;IAE7B+D,UAAU,EAAE;MACVC,MAAM,EAAE,IAAAC,wBAAe,EAACjE,KAAK,CAAC;MAC9BkE,QAAQ,EAAE,IAAAC,sBAAa,EAACnE,KAAK,CAAC;MAC9BoE,QAAQ,EAAE,IAAAC,eAAM,EAACrE,KAAK,CAAC;MACvBsE,QAAQ,EAAE,IAAAC,0BAAiB,EAACvE,KAAK,CAAC;MAClCwE,MAAM,EAAE,IAAAC,kCAAyB,EAACzE,KAAK;IACzC,CAAC;IAED0E,KAAK,EAAE,IAAAC,iBAAQ,EAAC3E,KAAK,CAAC;IAEtB4E,KAAK,EAAE;MACLC,cAAc,EAAE,IAAAC,0BAAiB,EAAC9E,KAAK,CAAC;MACxC+E,cAAc,EAAE,IAAAC,iBAAQ,EAAChF,KAAK;IAChC,CAAC;IAEDiF,MAAM,EAAE,IAAAC,kBAAS,EAAClF,KAAK,CAAC;IACxBmF,OAAO,EAAE,IAAAC,mBAAU,EAACpF,KAAK,CAAC;IAE1BqF,KAAK,EAAE,IAAAC,iBAAQ,EAACtF,KAAK,CAAC;IAEtBuF,KAAK,EAAAC,aAAA,CAAAA,aAAA,CAAAA,aAAA,CAAAA,aAAA,CAAAA,aAAA,KACA,IAAAC,uBAAc,EAACzF,KAAK,CAAC,GACrB,IAAA0F,8BAAqB,EAAC1F,KAAK,CAAC,GAC5B,IAAA2F,0BAAiB,EAAC3F,KAAK,CAAC,GACxB,IAAA4F,oBAAW,EAAC,CAAC;MAChBC,SAAS,EAAEC,kBAAa;MACxBC,IAAI,EAAE,IAAAC,gBAAO,EAAChG,KAAK,CAAC;MACpBiG,IAAI,EAAE,IAAAC,kBAAS,EAAC,CAAC;MACjBC,OAAO,EAAE,IAAAC,qBAAY,EAACpG,KAAK;IAAC,EAC7B;IAEDqG,cAAc;IACdC,8BAA8B;IAC9BC;EACF,CAAC;AACH,CAAC;AAED,SAASF,cAAcA,CAACzG,MAAsB,EAAS;EACrD,IAAM4G,KAAK,GAAG9G,QAAQ,CAACE,MAAM,CAAC;EAC9B,OAAO4G,KAAK;AACd;AAEA,SAASD,gCAAgCA,CACvCE,IAAY,EACZC,gBAAwB,EACxBC,oBAA4B,EAMrB;EAAA,IALPjC,KAAa,GAAA7E,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAGE,SAAS;EAAA,IACzB6G,cAAsB,GAAA/G,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAGE,SAAS;EAAA,IAClC8G,uBAAuB,GAAAhH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAAA,IAC/BiH,KAAK,GAAAjH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAAA,IACbkH,SAAS,GAAAlH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAEjB,IAAMD,MAAsB,GAAG;IAC7B6G,IAAI;IACJC,gBAAgB;IAChBM,iBAAiB,EAAEC,IAAI,CAACC,KAAK,CAACP,oBAAoB,CAAC;IACnDjC,KAAK;IACLkC,cAAc;IACdC,uBAAuB;IACvBC,KAAK;IACLC;EACF,CAAC;EACD,IAAMP,KAAK,GAAG9G,QAAQ,CAACE,MAAM,CAAC;EAC9B,OAAO4G,KAAK;AACd;AAEA,SAASF,8BAA8BA,CACrCG,IAAY,EACZU,QAAgB,EAChBC,QAAgB,EAMT;EAAA,IALP1C,KAAa,GAAA7E,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAGE,SAAS;EAAA,IACzB6G,cAAsB,GAAA/G,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAGE,SAAS;EAAA,IAClC8G,uBAAuB,GAAAhH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAAA,IAC/BiH,KAAK,GAAAjH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAAA,IACbkH,SAAS,GAAAlH,SAAA,CAAAC,MAAA,QAAAD,SAAA,QAAAE,SAAA,GAAAF,SAAA,MAAG,KAAK;EAEjB,IAAMD,MAAsB,GAAG;IAC7B6G,IAAI;IACJU,QAAQ;IACRC,QAAQ;IACR1C,KAAK;IACLkC,cAAc;IACdC,uBAAuB;IACvBC,KAAK;IACLC;EACF,CAAC;EACD,IAAMP,KAAK,GAAG9G,QAAQ,CAACE,MAAM,CAAC;EAC9B,OAAO4G,KAAK;AACd;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,IAAMA,KAAK,GAAA7G,OAAA,CAAA6G,KAAA,GAAG9G,QAAQ,CAAC,CAAC;;AAExB;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,IAAMM,KAAK,GAAAL,OAAA,CAAAK,KAAA,GAAGwG,KAAK,CAACxG,KAAK;AAAC,IAAAqH,QAAA,GAAA1H,OAAA,CAAA2H,OAAA,GAIX5H,QAAQ"}
@@ -8,7 +8,6 @@ exports.createLongLivedToken = createLongLivedToken;
8
8
  exports.createOAuth2ClientWithAdminPrivileges = createOAuth2ClientWithAdminPrivileges;
9
9
  exports.default = void 0;
10
10
  exports.executeRfc7523AuthZGrantFlow = executeRfc7523AuthZGrantFlow;
11
- exports.exportFullConfiguration = exportFullConfiguration;
12
11
  exports.generateRfc7523AuthZGrantArtefacts = generateRfc7523AuthZGrantArtefacts;
13
12
  exports.generateRfc7523ClientAuthNArtefacts = generateRfc7523ClientAuthNArtefacts;
14
13
  exports.getUniqueValues = getUniqueValues;
@@ -38,39 +37,16 @@ var _AuthenticateApi = require("../api/AuthenticateApi.js");
38
37
  var _SecretsApi = require("../api/cloud/SecretsApi.js");
39
38
  var _IdmConfigApi = require("../api/IdmConfigApi.js");
40
39
  var _OAuth2OIDCApi = require("../api/OAuth2OIDCApi.js");
41
- var _EmailTemplateOps = require("../ops/EmailTemplateOps.js");
42
- var _JourneyOps = require("../ops/JourneyOps.js");
43
40
  var _OAuth2ClientOps = require("../ops/OAuth2ClientOps.js");
44
41
  var _OAuth2ProviderOps = require("../ops/OAuth2ProviderOps.js");
45
- var _ThemeOps = require("../ops/ThemeOps.js");
46
42
  var _Console = require("../utils/Console.js");
47
- var _ExportImportUtils = require("../utils/ExportImportUtils.js");
48
43
  var _ForgeRockUtils = require("../utils/ForgeRockUtils.js");
49
44
  var _JsonUtils = require("../utils/JsonUtils.js");
50
- var _AgentOps = require("./AgentOps.js");
51
- var _ApplicationOps = require("./ApplicationOps.js");
52
- var _AuthenticationSettingsOps = require("./AuthenticationSettingsOps.js");
53
- var _CirclesOfTrustOps = require("./CirclesOfTrustOps.js");
54
- var _SecretsOps = require("./cloud/SecretsOps.js");
55
- var _VariablesOps = require("./cloud/VariablesOps.js");
56
- var _IdmConfigOps = require("./IdmConfigOps.js");
57
- var _IdpOps = require("./IdpOps.js");
58
45
  var _JoseOps = require("./JoseOps.js");
59
46
  var _OAuth2OidcOps = require("./OAuth2OidcOps.js");
60
47
  var _OAuth2TrustedJwtIssuerOps = require("./OAuth2TrustedJwtIssuerOps.js");
61
48
  var _OrganizationOps = require("./OrganizationOps.js");
62
- var _PolicyOps = require("./PolicyOps.js");
63
- var _PolicySetOps = require("./PolicySetOps.js");
64
- var _ResourceTypeOps = require("./ResourceTypeOps.js");
65
- var _Saml2Ops = require("./Saml2Ops.js");
66
- var _ScriptOps = require("./ScriptOps.js");
67
- var _ServiceOps = require("./ServiceOps.js");
68
49
  function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; }
69
- function ownKeys(e, r) { var t = Object.keys(e); if (Object.getOwnPropertySymbols) { var o = Object.getOwnPropertySymbols(e); r && (o = o.filter(function (r) { return Object.getOwnPropertyDescriptor(e, r).enumerable; })), t.push.apply(t, o); } return t; }
70
- function _objectSpread(e) { for (var r = 1; r < arguments.length; r++) { var t = null != arguments[r] ? arguments[r] : {}; r % 2 ? ownKeys(Object(t), !0).forEach(function (r) { _defineProperty(e, r, t[r]); }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function (r) { Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r)); }); } return e; }
71
- function _defineProperty(obj, key, value) { key = _toPropertyKey(key); if (key in obj) { Object.defineProperty(obj, key, { value: value, enumerable: true, configurable: true, writable: true }); } else { obj[key] = value; } return obj; }
72
- function _toPropertyKey(arg) { var key = _toPrimitive(arg, "string"); return typeof key === "symbol" ? key : String(key); }
73
- function _toPrimitive(input, hint) { if (typeof input !== "object" || input === null) return input; var prim = input[Symbol.toPrimitive]; if (prim !== undefined) { var res = prim.call(input, hint || "default"); if (typeof res !== "object") return res; throw new TypeError("@@toPrimitive must return a primitive value."); } return (hint === "string" ? String : Number)(input); }
74
50
  function asyncGeneratorStep(gen, resolve, reject, _next, _throw, key, arg) { try { var info = gen[key](arg); var value = info.value; } catch (error) { reject(error); return; } if (info.done) { resolve(value); } else { Promise.resolve(value).then(_next, _throw); } }
75
51
  function _asyncToGenerator(fn) { return function () { var self = this, args = arguments; return new Promise(function (resolve, reject) { var gen = fn.apply(self, args); function _next(value) { asyncGeneratorStep(gen, resolve, reject, _next, _throw, "next", value); } function _throw(err) { asyncGeneratorStep(gen, resolve, reject, _next, _throw, "throw", err); } _next(undefined); }); }; }
76
52
  var _default = state => {
@@ -230,25 +206,9 @@ var _default = state => {
230
206
  state
231
207
  });
232
208
  })();
233
- },
234
- exportFullConfiguration() {
235
- var _arguments2 = arguments;
236
- return _asyncToGenerator(function* () {
237
- var options = _arguments2.length > 0 && _arguments2[0] !== undefined ? _arguments2[0] : {
238
- useStringArrays: true,
239
- noDecode: false
240
- };
241
- return exportFullConfiguration({
242
- options,
243
- state
244
- });
245
- })();
246
209
  }
247
210
  };
248
211
  };
249
- /**
250
- * Full export options
251
- */
252
212
  exports.default = _default;
253
213
  var _dirname = _path.default.dirname((0, _url.fileURLToPath)(require('url').pathToFileURL(__filename).toString()));
254
214
  var OAUTH2_CLIENT = JSON.parse(_fs.default.readFileSync(_path.default.resolve(_dirname, './templates/OAuth2ClientTemplate.json'), 'utf8'));
@@ -1773,11 +1733,11 @@ function _executeRfc7523AuthZGrantFlow() {
1773
1733
  }
1774
1734
  function generateRfc7523ClientAuthNArtefacts(_x23) {
1775
1735
  return _generateRfc7523ClientAuthNArtefacts.apply(this, arguments);
1776
- }
1777
- /**
1778
- * Export full configuration
1779
- * @param {FullExportOptions} options export options
1780
- */
1736
+ } // suggested by John K.
1737
+ // export async function removeRealmNameFromManagedObjectLabels() {}
1738
+ // export async function addRealmNameToManagedObjectLabels() {}
1739
+ // export async function cleanUpPostmanArtifacts() {}
1740
+ // export async function createSampleThemes() {}
1781
1741
  function _generateRfc7523ClientAuthNArtefacts() {
1782
1742
  _generateRfc7523ClientAuthNArtefacts = _asyncToGenerator(function* (_ref25) {
1783
1743
  var {
@@ -1852,101 +1812,4 @@ function _generateRfc7523ClientAuthNArtefacts() {
1852
1812
  });
1853
1813
  return _generateRfc7523ClientAuthNArtefacts.apply(this, arguments);
1854
1814
  }
1855
- function exportFullConfiguration(_x24) {
1856
- return _exportFullConfiguration.apply(this, arguments);
1857
- } // suggested by John K.
1858
- // export async function removeRealmNameFromManagedObjectLabels() {}
1859
- // export async function addRealmNameToManagedObjectLabels() {}
1860
- // export async function cleanUpPostmanArtifacts() {}
1861
- // export async function createSampleThemes() {}
1862
- function _exportFullConfiguration() {
1863
- _exportFullConfiguration = _asyncToGenerator(function* (_ref26) {
1864
- var _yield$exportWithErro, _yield$exportWithErro2, _yield$exportWithErro3, _yield$exportWithErro4, _yield$exportWithErro5, _yield$exportWithErro6, _yield$exportWithErro7, _yield$exportWithErro8, _yield$exportWithErro9, _yield$exportWithErro10, _yield$exportWithErro11, _yield$exportWithErro12, _yield$exportWithErro13, _yield$exportWithErro14, _yield$exportWithErro15, _yield$exportWithErro16, _yield$exportWithErro17, _yield$exportWithErro18;
1865
- var {
1866
- options = {
1867
- useStringArrays: true,
1868
- noDecode: false
1869
- },
1870
- state
1871
- } = _ref26;
1872
- var {
1873
- useStringArrays,
1874
- noDecode
1875
- } = options;
1876
- var stateObj = {
1877
- state
1878
- };
1879
- //Export saml2 providers and circle of trusts
1880
- var saml = (_yield$exportWithErro = yield (0, _ExportImportUtils.exportWithErrorHandling)(_Saml2Ops.exportSaml2Providers, stateObj)) === null || _yield$exportWithErro === void 0 ? void 0 : _yield$exportWithErro.saml;
1881
- var cotExport = yield (0, _ExportImportUtils.exportWithErrorHandling)(_CirclesOfTrustOps.exportCirclesOfTrust, stateObj);
1882
- if (saml) {
1883
- saml.cot = cotExport === null || cotExport === void 0 ? void 0 : cotExport.saml.cot;
1884
- } else {
1885
- saml = cotExport === null || cotExport === void 0 ? void 0 : cotExport.saml;
1886
- }
1887
- //Create full export
1888
- return {
1889
- meta: (0, _ExportImportUtils.getMetadata)(stateObj),
1890
- agents: (_yield$exportWithErro2 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_AgentOps.exportAgents, stateObj)) === null || _yield$exportWithErro2 === void 0 ? void 0 : _yield$exportWithErro2.agents,
1891
- application: (_yield$exportWithErro3 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_OAuth2ClientOps.exportOAuth2Clients, {
1892
- options: {
1893
- deps: false,
1894
- useStringArrays
1895
- },
1896
- state
1897
- })) === null || _yield$exportWithErro3 === void 0 ? void 0 : _yield$exportWithErro3.application,
1898
- authentication: (_yield$exportWithErro4 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_AuthenticationSettingsOps.exportAuthenticationSettings, stateObj)) === null || _yield$exportWithErro4 === void 0 ? void 0 : _yield$exportWithErro4.authentication,
1899
- config: (_yield$exportWithErro5 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_IdmConfigOps.exportConfigEntities, stateObj)) === null || _yield$exportWithErro5 === void 0 ? void 0 : _yield$exportWithErro5.config,
1900
- emailTemplate: (_yield$exportWithErro6 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_EmailTemplateOps.exportEmailTemplates, stateObj)) === null || _yield$exportWithErro6 === void 0 ? void 0 : _yield$exportWithErro6.emailTemplate,
1901
- idp: (_yield$exportWithErro7 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_IdpOps.exportSocialProviders, stateObj)) === null || _yield$exportWithErro7 === void 0 ? void 0 : _yield$exportWithErro7.idp,
1902
- managedApplication: (_yield$exportWithErro8 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_ApplicationOps.exportApplications, {
1903
- options: {
1904
- deps: false,
1905
- useStringArrays
1906
- },
1907
- state
1908
- })) === null || _yield$exportWithErro8 === void 0 ? void 0 : _yield$exportWithErro8.managedApplication,
1909
- policy: (_yield$exportWithErro9 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_PolicyOps.exportPolicies, {
1910
- options: {
1911
- deps: false,
1912
- prereqs: false,
1913
- useStringArrays
1914
- },
1915
- state
1916
- })) === null || _yield$exportWithErro9 === void 0 ? void 0 : _yield$exportWithErro9.policy,
1917
- policyset: (_yield$exportWithErro10 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_PolicySetOps.exportPolicySets, {
1918
- options: {
1919
- deps: false,
1920
- prereqs: false,
1921
- useStringArrays
1922
- },
1923
- state
1924
- })) === null || _yield$exportWithErro10 === void 0 ? void 0 : _yield$exportWithErro10.policyset,
1925
- resourcetype: (_yield$exportWithErro11 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_ResourceTypeOps.exportResourceTypes, stateObj)) === null || _yield$exportWithErro11 === void 0 ? void 0 : _yield$exportWithErro11.resourcetype,
1926
- saml,
1927
- script: (_yield$exportWithErro12 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_ScriptOps.exportScripts, stateObj)) === null || _yield$exportWithErro12 === void 0 ? void 0 : _yield$exportWithErro12.script,
1928
- secrets: (_yield$exportWithErro13 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_SecretsOps.exportSecrets, stateObj)) === null || _yield$exportWithErro13 === void 0 ? void 0 : _yield$exportWithErro13.secrets,
1929
- service: _objectSpread(_objectSpread({}, (_yield$exportWithErro14 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_ServiceOps.exportServices, {
1930
- globalConfig: true,
1931
- state
1932
- })) === null || _yield$exportWithErro14 === void 0 ? void 0 : _yield$exportWithErro14.service), (_yield$exportWithErro15 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_ServiceOps.exportServices, {
1933
- globalConfig: false,
1934
- state
1935
- })) === null || _yield$exportWithErro15 === void 0 ? void 0 : _yield$exportWithErro15.service),
1936
- theme: (_yield$exportWithErro16 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_ThemeOps.exportThemes, stateObj)) === null || _yield$exportWithErro16 === void 0 ? void 0 : _yield$exportWithErro16.theme,
1937
- trees: (_yield$exportWithErro17 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_JourneyOps.exportJourneys, {
1938
- options: {
1939
- deps: false,
1940
- useStringArrays
1941
- },
1942
- state
1943
- })) === null || _yield$exportWithErro17 === void 0 ? void 0 : _yield$exportWithErro17.trees,
1944
- variables: (_yield$exportWithErro18 = yield (0, _ExportImportUtils.exportWithErrorHandling)(_VariablesOps.exportVariables, {
1945
- noDecode,
1946
- state
1947
- })) === null || _yield$exportWithErro18 === void 0 ? void 0 : _yield$exportWithErro18.variables
1948
- };
1949
- });
1950
- return _exportFullConfiguration.apply(this, arguments);
1951
- }
1952
1815
  //# sourceMappingURL=AdminOps.js.map