@rockcarver/frodo-lib 2.0.0-65 → 2.0.0-67
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build.zip +0 -0
- package/cjs/api/cloud/SecretsApi.js +2 -3
- package/cjs/api/cloud/SecretsApi.js.map +1 -1
- package/cjs/api/cloud/SecretsApi.test.js +36 -13
- package/cjs/api/cloud/SecretsApi.test.js.map +1 -1
- package/cjs/ops/AuthenticateOps.js +5 -1
- package/cjs/ops/AuthenticateOps.js.map +1 -1
- package/cjs/ops/cloud/SecretsOps.js +82 -15
- package/cjs/ops/cloud/SecretsOps.js.map +1 -1
- package/cjs/ops/cloud/SecretsOps.test.js +49 -0
- package/cjs/ops/cloud/SecretsOps.test.js.map +1 -1
- package/esm/api/cloud/SecretsApi.js +2 -3
- package/esm/api/cloud/SecretsApi.js.map +1 -1
- package/esm/api/cloud/SecretsApi.test.js +36 -26
- package/esm/api/cloud/SecretsApi.test.js.map +1 -1
- package/esm/ops/AuthenticateOps.js +6 -2
- package/esm/ops/AuthenticateOps.js.map +1 -1
- package/esm/ops/cloud/SecretsOps.js +67 -4
- package/esm/ops/cloud/SecretsOps.js.map +1 -1
- package/esm/ops/cloud/SecretsOps.test.js +76 -0
- package/esm/ops/cloud/SecretsOps.test.js.map +1 -1
- package/package.json +1 -1
- package/types/api/cloud/SecretsApi.d.ts.map +1 -1
- package/types/ops/AuthenticateOps.d.ts.map +1 -1
- package/types/ops/cloud/SecretsOps.d.ts +15 -2
- package/types/ops/cloud/SecretsOps.d.ts.map +1 -1
package/build.zip
CHANGED
|
Binary file
|
|
@@ -14,7 +14,6 @@ exports.putSecret = putSecret;
|
|
|
14
14
|
exports.setSecretDescription = setSecretDescription;
|
|
15
15
|
exports.setStatusOfVersionOfSecret = setStatusOfVersionOfSecret;
|
|
16
16
|
var _util = _interopRequireDefault(require("util"));
|
|
17
|
-
var _Base64Utils = require("../../utils/Base64Utils.js");
|
|
18
17
|
var _ForgeRockUtils = require("../../utils/ForgeRockUtils.js");
|
|
19
18
|
var _BaseApi = require("../BaseApi.js");
|
|
20
19
|
function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; }
|
|
@@ -133,7 +132,7 @@ function _putSecret() {
|
|
|
133
132
|
state
|
|
134
133
|
} = _ref3;
|
|
135
134
|
var secretData = {
|
|
136
|
-
valueBase64:
|
|
135
|
+
valueBase64: value,
|
|
137
136
|
description,
|
|
138
137
|
encoding,
|
|
139
138
|
useInPlaceholders
|
|
@@ -259,7 +258,7 @@ function _createNewVersionOfSecret() {
|
|
|
259
258
|
resource: getApiConfig(),
|
|
260
259
|
state
|
|
261
260
|
}).post(urlString, {
|
|
262
|
-
valueBase64:
|
|
261
|
+
valueBase64: value
|
|
263
262
|
}, {
|
|
264
263
|
withCredentials: true
|
|
265
264
|
});
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SecretsApi.js","names":["_util","_interopRequireDefault","require","_Base64Utils","_ForgeRockUtils","_BaseApi","obj","__esModule","default","asyncGeneratorStep","gen","resolve","reject","_next","_throw","key","arg","info","value","error","done","Promise","then","_asyncToGenerator","fn","self","args","arguments","apply","err","undefined","secretsListURLTemplate","secretListVersionsURLTemplate","secretCreateNewVersionURLTemplate","concat","secretGetVersionURLTemplate","secretVersionStatusURLTemplate","secretURLTemplate","secretSetDescriptionURLTemplate","apiVersion","getApiConfig","path","getSecrets","_x","_getSecrets","_ref","state","urlString","util","format","getHostBaseUrl","getHost","data","generateEnvApi","resource","get","withCredentials","getSecret","_x2","_getSecret","_ref2","secretId","putSecret","_x3","_putSecret","_ref3","description","encoding","useInPlaceholders","secretData","valueBase64","isBase64Encoded","encode","put","setSecretDescription","_x4","_setSecretDescription","_ref4","post","deleteSecret","_x5","_deleteSecret","_ref5","delete","getSecretVersions","_x6","_getSecretVersions","_ref6","createNewVersionOfSecret","_x7","_createNewVersionOfSecret","_ref7","getVersionOfSecret","_x8","_getVersionOfSecret","_ref8","version","setStatusOfVersionOfSecret","_x9","_setStatusOfVersionOfSecret","_ref9","status","deleteVersionOfSecret","_x10","_deleteVersionOfSecret","_ref10"],"sources":["../../../src/api/cloud/SecretsApi.ts"],"sourcesContent":["import util from 'util';\n\nimport { State } from '../../shared/State';\nimport { encode, isBase64Encoded } from '../../utils/Base64Utils';\nimport { getHostBaseUrl } from '../../utils/ForgeRockUtils';\nimport { IdObjectSkeletonInterface, PagedResult } from '../ApiTypes';\nimport { generateEnvApi } from '../BaseApi';\n\nconst secretsListURLTemplate = '%s/environment/secrets';\nconst secretListVersionsURLTemplate = '%s/environment/secrets/%s/versions';\nconst secretCreateNewVersionURLTemplate = `${secretListVersionsURLTemplate}?_action=create`;\nconst secretGetVersionURLTemplate = `${secretListVersionsURLTemplate}/%s`;\nconst secretVersionStatusURLTemplate = `${secretGetVersionURLTemplate}?_action=changestatus`;\nconst secretURLTemplate = '%s/environment/secrets/%s';\nconst secretSetDescriptionURLTemplate = `${secretURLTemplate}?_action=setDescription`;\n\nconst apiVersion = 'protocol=1.0,resource=1.0';\nconst getApiConfig = () => ({\n path: `/environment/secrets`,\n apiVersion,\n});\n\n/**\n * Secret encoding\n *\n * @summary\n * You can use the encoding parameter to set an encoding format when you create an ESV secret.\n * You can only choose an encoding format using the API. The UI currently creates secrets only\n * with the generic encoding format.\n *\n * @see\n * {@link https://backstage.forgerock.com/docs/idcloud/latest/tenants/esvs.html#encoding_format | ForgeRock Documentation}\n */\nexport type SecretEncodingType = 'generic' | 'pem' | 'base64hmac';\n\n/**\n * Secret object skeleton\n */\nexport type SecretSkeleton = IdObjectSkeletonInterface & {\n description: string;\n encoding: SecretEncodingType;\n lastChangedBy?: string;\n lastChangeDate?: string;\n useInPlaceholders: boolean;\n loaded?: boolean;\n loadedVersion?: string;\n activeVersion?: string;\n};\n\nexport type VersionOfSecretStatus = 'DISABLED' | 'ENABLED' | 'DESTROYED';\n\n/**\n * Secret version skeleton\n */\nexport type VersionOfSecretSkeleton = IdObjectSkeletonInterface & {\n /**\n * Base64-encoded value. Only used when creating a new version of a secret\n */\n valueBase64?: string;\n /**\n * Version string. Returned when reading a version of a secret\n */\n version?: string;\n /**\n * Date string. Returned when reading a version of a secret\n */\n createDate?: string;\n /**\n * True if loaded, false otherwise. Returned when reading a version of a secret\n */\n loaded?: boolean;\n /**\n * Status string. Returned when reading a version of a secret\n */\n status?: VersionOfSecretStatus;\n};\n\n/**\n * Get all secrets\n * @returns {Promise<PagedResult<SecretSkeleton>>} a promise that resolves to an array of secrets\n */\nexport async function getSecrets({\n state,\n}: {\n state: State;\n}): Promise<PagedResult<SecretSkeleton>> {\n const urlString = util.format(\n secretsListURLTemplate,\n getHostBaseUrl(state.getHost())\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Get secret\n * @param secretId secret id/name\n * @returns {Promise<SecretSkeleton>} a promise that resolves to a secret\n */\nexport async function getSecret({\n secretId,\n state,\n}: {\n secretId: string;\n state: State;\n}): Promise<SecretSkeleton> {\n const urlString = util.format(\n secretURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Create secret\n * @param {string} secretId secret id/name\n * @param {string} value secret value\n * @param {string} description secret description\n * @param {string} encoding secret encoding (only `generic` is supported)\n * @param {boolean} useInPlaceholders flag indicating if the secret can be used in placeholders\n * @returns {Promise<SecretSkeleton>} a promise that resolves to a secret\n */\nexport async function putSecret({\n secretId,\n value,\n description,\n encoding = 'generic',\n useInPlaceholders = true,\n state,\n}: {\n secretId: string;\n value: string;\n description: string;\n encoding?: string;\n useInPlaceholders?: boolean;\n state: State;\n}): Promise<SecretSkeleton> {\n const secretData = {\n valueBase64: isBase64Encoded(value) ? value : encode(value),\n description,\n encoding,\n useInPlaceholders,\n };\n const urlString = util.format(\n secretURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).put(urlString, secretData, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Set secret description\n * @param {string} secretId secret id/name\n * @param {string} description secret description\n * @returns {Promise<any>} a promise that resolves to an empty string\n */\nexport async function setSecretDescription({\n secretId,\n description,\n state,\n}: {\n secretId: string;\n description: string;\n state: State;\n}): Promise<any> {\n const urlString = util.format(\n secretSetDescriptionURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).post(urlString, { description }, { withCredentials: true });\n return data;\n}\n\n/**\n * Delete secret\n * @param {string} secretId secret id/name\n * @returns {Promise<unknown>} a promise that resolves to a secret object\n */\nexport async function deleteSecret({\n secretId,\n state,\n}: {\n secretId: string;\n state: State;\n}) {\n const urlString = util.format(\n secretURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).delete(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Get secret versions\n * @param {string} secretId secret id/name\n * @returns {Promise<VersionOfSecretSkeleton[]>} a promise that resolves to an array of secret versions\n */\nexport async function getSecretVersions({\n secretId,\n state,\n}: {\n secretId: string;\n state: State;\n}): Promise<VersionOfSecretSkeleton[]> {\n const urlString = util.format(\n secretListVersionsURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Create new secret version\n * @param {string} secretId secret id/name\n * @param {string} value secret value\n * @returns {Promise<VersionOfSecretSkeleton>} a promise that resolves to a version object\n */\nexport async function createNewVersionOfSecret({\n secretId,\n value,\n state,\n}: {\n secretId: string;\n value: string;\n state: State;\n}): Promise<VersionOfSecretSkeleton> {\n const urlString = util.format(\n secretCreateNewVersionURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).post(urlString, { valueBase64: encode(value) }, { withCredentials: true });\n return data;\n}\n\n/**\n * Get version of secret\n * @param {string} secretId secret id/name\n * @param {string} version secret version\n * @returns {Promise<VersionOfSecretSkeleton>} a promise that resolves to a version object\n */\nexport async function getVersionOfSecret({\n secretId,\n version,\n state,\n}: {\n secretId: string;\n version: string;\n state: State;\n}): Promise<VersionOfSecretSkeleton> {\n const urlString = util.format(\n secretGetVersionURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId,\n version\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Update the status of a version of a secret\n * @param {string} secretId secret id/name\n * @param {string} version secret version\n * @param {VersionOfSecretStatus} status status\n * @returns {Promise<VersionOfSecretSkeleton>} a promise that resolves to a status object\n */\nexport async function setStatusOfVersionOfSecret({\n secretId,\n version,\n status,\n state,\n}: {\n secretId: string;\n version: string;\n status: VersionOfSecretStatus;\n state: State;\n}): Promise<VersionOfSecretSkeleton> {\n const urlString = util.format(\n secretVersionStatusURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId,\n version\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).post(urlString, { status }, { withCredentials: true });\n return data;\n}\n\n/**\n * Delete version of secret\n * @param {string} secretId secret id/name\n * @param {string} version secret version\n * @returns {Promise<VersionOfSecretSkeleton>} a promise that resolves to a version object\n */\nexport async function deleteVersionOfSecret({\n secretId,\n version,\n state,\n}: {\n secretId: string;\n version: string;\n state: State;\n}): Promise<VersionOfSecretSkeleton> {\n const urlString = util.format(\n secretGetVersionURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId,\n version\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).delete(urlString, {\n withCredentials: true,\n });\n return data;\n}\n"],"mappings":";;;;;;;;;;;;;;;AAAA,IAAAA,KAAA,GAAAC,sBAAA,CAAAC,OAAA;AAAwB,IAAAC,YAAA,GAAAD,OAAA;AAAA,IAAAE,eAAA,GAAAF,OAAA;AAAA,IAAAG,QAAA,GAAAH,OAAA;AAAA,SAAAD,uBAAAK,GAAA,WAAAA,GAAA,IAAAA,GAAA,CAAAC,UAAA,GAAAD,GAAA,KAAAE,OAAA,EAAAF,GAAA;AAAA,SAAAG,mBAAAC,GAAA,EAAAC,OAAA,EAAAC,MAAA,EAAAC,KAAA,EAAAC,MAAA,EAAAC,GAAA,EAAAC,GAAA,cAAAC,IAAA,GAAAP,GAAA,CAAAK,GAAA,EAAAC,GAAA,OAAAE,KAAA,GAAAD,IAAA,CAAAC,KAAA,WAAAC,KAAA,IAAAP,MAAA,CAAAO,KAAA,iBAAAF,IAAA,CAAAG,IAAA,IAAAT,OAAA,CAAAO,KAAA,YAAAG,OAAA,CAAAV,OAAA,CAAAO,KAAA,EAAAI,IAAA,CAAAT,KAAA,EAAAC,MAAA;AAAA,SAAAS,kBAAAC,EAAA,6BAAAC,IAAA,SAAAC,IAAA,GAAAC,SAAA,aAAAN,OAAA,WAAAV,OAAA,EAAAC,MAAA,QAAAF,GAAA,GAAAc,EAAA,CAAAI,KAAA,CAAAH,IAAA,EAAAC,IAAA,YAAAb,MAAAK,KAAA,IAAAT,kBAAA,CAAAC,GAAA,EAAAC,OAAA,EAAAC,MAAA,EAAAC,KAAA,EAAAC,MAAA,UAAAI,KAAA,cAAAJ,OAAAe,GAAA,IAAApB,kBAAA,CAAAC,GAAA,EAAAC,OAAA,EAAAC,MAAA,EAAAC,KAAA,EAAAC,MAAA,WAAAe,GAAA,KAAAhB,KAAA,CAAAiB,SAAA;AAQxB,IAAMC,sBAAsB,GAAG,wBAAwB;AACvD,IAAMC,6BAA6B,GAAG,oCAAoC;AAC1E,IAAMC,iCAAiC,MAAAC,MAAA,CAAMF,6BAA6B,oBAAiB;AAC3F,IAAMG,2BAA2B,MAAAD,MAAA,CAAMF,6BAA6B,QAAK;AACzE,IAAMI,8BAA8B,MAAAF,MAAA,CAAMC,2BAA2B,0BAAuB;AAC5F,IAAME,iBAAiB,GAAG,2BAA2B;AACrD,IAAMC,+BAA+B,MAAAJ,MAAA,CAAMG,iBAAiB,4BAAyB;AAErF,IAAME,UAAU,GAAG,2BAA2B;AAC9C,IAAMC,YAAY,GAAGA,CAAA,MAAO;EAC1BC,IAAI,wBAAwB;EAC5BF;AACF,CAAC,CAAC;;AAEF;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAGA;AACA;AACA;;AAcA;AACA;AACA;AAwBA;AACA;AACA;AACA;AAHA,SAIsBG,UAAUA,CAAAC,EAAA;EAAA,OAAAC,WAAA,CAAAhB,KAAA,OAAAD,SAAA;AAAA;AAkBhC;AACA;AACA;AACA;AACA;AAJA,SAAAiB,YAAA;EAAAA,WAAA,GAAArB,iBAAA,CAlBO,WAAAsB,IAAA,EAIkC;IAAA,IAJR;MAC/BC;IAGF,CAAC,GAAAD,IAAA;IACC,IAAME,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BlB,sBAAsB,EACtB,IAAAmB,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAChC,CAAC;IACD,IAAM;MAAEC;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACS,GAAG,CAACR,SAAS,EAAE;MAChBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAR,WAAA,CAAAhB,KAAA,OAAAD,SAAA;AAAA;AAAA,SAOqB8B,SAASA,CAAAC,GAAA;EAAA,OAAAC,UAAA,CAAA/B,KAAA,OAAAD,SAAA;AAAA;AAqB/B;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AARA,SAAAgC,WAAA;EAAAA,UAAA,GAAApC,iBAAA,CArBO,WAAAqC,KAAA,EAMqB;IAAA,IANI;MAC9BC,QAAQ;MACRf;IAIF,CAAC,GAAAc,KAAA;IACC,IAAMb,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BZ,iBAAiB,EACjB,IAAAa,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACS,GAAG,CAACR,SAAS,EAAE;MAChBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAO,UAAA,CAAA/B,KAAA,OAAAD,SAAA;AAAA;AAAA,SAWqBmC,SAASA,CAAAC,GAAA;EAAA,OAAAC,UAAA,CAAApC,KAAA,OAAAD,SAAA;AAAA;AAmC/B;AACA;AACA;AACA;AACA;AACA;AALA,SAAAqC,WAAA;EAAAA,UAAA,GAAAzC,iBAAA,CAnCO,WAAA0C,KAAA,EAcqB;IAAA,IAdI;MAC9BJ,QAAQ;MACR3C,KAAK;MACLgD,WAAW;MACXC,QAAQ,GAAG,SAAS;MACpBC,iBAAiB,GAAG,IAAI;MACxBtB;IAQF,CAAC,GAAAmB,KAAA;IACC,IAAMI,UAAU,GAAG;MACjBC,WAAW,EAAE,IAAAC,4BAAe,EAACrD,KAAK,CAAC,GAAGA,KAAK,GAAG,IAAAsD,mBAAM,EAACtD,KAAK,CAAC;MAC3DgD,WAAW;MACXC,QAAQ;MACRC;IACF,CAAC;IACD,IAAMrB,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BZ,iBAAiB,EACjB,IAAAa,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAAC2B,GAAG,CAAC1B,SAAS,EAAEsB,UAAU,EAAE;MAC5Bb,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAY,UAAA,CAAApC,KAAA,OAAAD,SAAA;AAAA;AAAA,SAQqB+C,oBAAoBA,CAAAC,GAAA;EAAA,OAAAC,qBAAA,CAAAhD,KAAA,OAAAD,SAAA;AAAA;AAqB1C;AACA;AACA;AACA;AACA;AAJA,SAAAiD,sBAAA;EAAAA,qBAAA,GAAArD,iBAAA,CArBO,WAAAsD,KAAA,EAQU;IAAA,IAR0B;MACzChB,QAAQ;MACRK,WAAW;MACXpB;IAKF,CAAC,GAAA+B,KAAA;IACC,IAAM9B,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BX,+BAA+B,EAC/B,IAAAY,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACgC,IAAI,CAAC/B,SAAS,EAAE;MAAEmB;IAAY,CAAC,EAAE;MAAEV,eAAe,EAAE;IAAK,CAAC,CAAC;IAC9D,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAwB,qBAAA,CAAAhD,KAAA,OAAAD,SAAA;AAAA;AAAA,SAOqBoD,YAAYA,CAAAC,GAAA;EAAA,OAAAC,aAAA,CAAArD,KAAA,OAAAD,SAAA;AAAA;AAqBlC;AACA;AACA;AACA;AACA;AAJA,SAAAsD,cAAA;EAAAA,aAAA,GAAA1D,iBAAA,CArBO,WAAA2D,KAAA,EAMJ;IAAA,IANgC;MACjCrB,QAAQ;MACRf;IAIF,CAAC,GAAAoC,KAAA;IACC,IAAMnC,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BZ,iBAAiB,EACjB,IAAAa,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACqC,MAAM,CAACpC,SAAS,EAAE;MACnBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAA6B,aAAA,CAAArD,KAAA,OAAAD,SAAA;AAAA;AAAA,SAOqByD,iBAAiBA,CAAAC,GAAA;EAAA,OAAAC,kBAAA,CAAA1D,KAAA,OAAAD,SAAA;AAAA;AAqBvC;AACA;AACA;AACA;AACA;AACA;AALA,SAAA2D,mBAAA;EAAAA,kBAAA,GAAA/D,iBAAA,CArBO,WAAAgE,KAAA,EAMgC;IAAA,IANC;MACtC1B,QAAQ;MACRf;IAIF,CAAC,GAAAyC,KAAA;IACC,IAAMxC,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BjB,6BAA6B,EAC7B,IAAAkB,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACS,GAAG,CAACR,SAAS,EAAE;MAChBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAkC,kBAAA,CAAA1D,KAAA,OAAAD,SAAA;AAAA;AAAA,SAQqB6D,wBAAwBA,CAAAC,GAAA;EAAA,OAAAC,yBAAA,CAAA9D,KAAA,OAAAD,SAAA;AAAA;AAqB9C;AACA;AACA;AACA;AACA;AACA;AALA,SAAA+D,0BAAA;EAAAA,yBAAA,GAAAnE,iBAAA,CArBO,WAAAoE,KAAA,EAQ8B;IAAA,IARU;MAC7C9B,QAAQ;MACR3C,KAAK;MACL4B;IAKF,CAAC,GAAA6C,KAAA;IACC,IAAM5C,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BhB,iCAAiC,EACjC,IAAAiB,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACgC,IAAI,CAAC/B,SAAS,EAAE;MAAEuB,WAAW,EAAE,IAAAE,mBAAM,EAACtD,KAAK;IAAE,CAAC,EAAE;MAAEsC,eAAe,EAAE;IAAK,CAAC,CAAC;IAC7E,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAsC,yBAAA,CAAA9D,KAAA,OAAAD,SAAA;AAAA;AAAA,SAQqBiE,kBAAkBA,CAAAC,GAAA;EAAA,OAAAC,mBAAA,CAAAlE,KAAA,OAAAD,SAAA;AAAA;AAwBxC;AACA;AACA;AACA;AACA;AACA;AACA;AANA,SAAAmE,oBAAA;EAAAA,mBAAA,GAAAvE,iBAAA,CAxBO,WAAAwE,KAAA,EAQ8B;IAAA,IARI;MACvClC,QAAQ;MACRmC,OAAO;MACPlD;IAKF,CAAC,GAAAiD,KAAA;IACC,IAAMhD,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3Bd,2BAA2B,EAC3B,IAAAe,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QAAQ,EACRmC,OACF,CAAC;IACD,IAAM;MAAE5C;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACS,GAAG,CAACR,SAAS,EAAE;MAChBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAA0C,mBAAA,CAAAlE,KAAA,OAAAD,SAAA;AAAA;AAAA,SASqBsE,0BAA0BA,CAAAC,GAAA;EAAA,OAAAC,2BAAA,CAAAvE,KAAA,OAAAD,SAAA;AAAA;AAwBhD;AACA;AACA;AACA;AACA;AACA;AALA,SAAAwE,4BAAA;EAAAA,2BAAA,GAAA5E,iBAAA,CAxBO,WAAA6E,KAAA,EAU8B;IAAA,IAVY;MAC/CvC,QAAQ;MACRmC,OAAO;MACPK,MAAM;MACNvD;IAMF,CAAC,GAAAsD,KAAA;IACC,IAAMrD,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3Bb,8BAA8B,EAC9B,IAAAc,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QAAQ,EACRmC,OACF,CAAC;IACD,IAAM;MAAE5C;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACgC,IAAI,CAAC/B,SAAS,EAAE;MAAEsD;IAAO,CAAC,EAAE;MAAE7C,eAAe,EAAE;IAAK,CAAC,CAAC;IACzD,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAA+C,2BAAA,CAAAvE,KAAA,OAAAD,SAAA;AAAA;AAAA,SAQqB2E,qBAAqBA,CAAAC,IAAA;EAAA,OAAAC,sBAAA,CAAA5E,KAAA,OAAAD,SAAA;AAAA;AAAA,SAAA6E,uBAAA;EAAAA,sBAAA,GAAAjF,iBAAA,CAApC,WAAAkF,MAAA,EAQ8B;IAAA,IARO;MAC1C5C,QAAQ;MACRmC,OAAO;MACPlD;IAKF,CAAC,GAAA2D,MAAA;IACC,IAAM1D,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3Bd,2BAA2B,EAC3B,IAAAe,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QAAQ,EACRmC,OACF,CAAC;IACD,IAAM;MAAE5C;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACqC,MAAM,CAACpC,SAAS,EAAE;MACnBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAoD,sBAAA,CAAA5E,KAAA,OAAAD,SAAA;AAAA"}
|
|
1
|
+
{"version":3,"file":"SecretsApi.js","names":["_util","_interopRequireDefault","require","_ForgeRockUtils","_BaseApi","obj","__esModule","default","asyncGeneratorStep","gen","resolve","reject","_next","_throw","key","arg","info","value","error","done","Promise","then","_asyncToGenerator","fn","self","args","arguments","apply","err","undefined","secretsListURLTemplate","secretListVersionsURLTemplate","secretCreateNewVersionURLTemplate","concat","secretGetVersionURLTemplate","secretVersionStatusURLTemplate","secretURLTemplate","secretSetDescriptionURLTemplate","apiVersion","getApiConfig","path","getSecrets","_x","_getSecrets","_ref","state","urlString","util","format","getHostBaseUrl","getHost","data","generateEnvApi","resource","get","withCredentials","getSecret","_x2","_getSecret","_ref2","secretId","putSecret","_x3","_putSecret","_ref3","description","encoding","useInPlaceholders","secretData","valueBase64","put","setSecretDescription","_x4","_setSecretDescription","_ref4","post","deleteSecret","_x5","_deleteSecret","_ref5","delete","getSecretVersions","_x6","_getSecretVersions","_ref6","createNewVersionOfSecret","_x7","_createNewVersionOfSecret","_ref7","getVersionOfSecret","_x8","_getVersionOfSecret","_ref8","version","setStatusOfVersionOfSecret","_x9","_setStatusOfVersionOfSecret","_ref9","status","deleteVersionOfSecret","_x10","_deleteVersionOfSecret","_ref10"],"sources":["../../../src/api/cloud/SecretsApi.ts"],"sourcesContent":["import util from 'util';\n\nimport { State } from '../../shared/State';\nimport { getHostBaseUrl } from '../../utils/ForgeRockUtils';\nimport { IdObjectSkeletonInterface, PagedResult } from '../ApiTypes';\nimport { generateEnvApi } from '../BaseApi';\n\nconst secretsListURLTemplate = '%s/environment/secrets';\nconst secretListVersionsURLTemplate = '%s/environment/secrets/%s/versions';\nconst secretCreateNewVersionURLTemplate = `${secretListVersionsURLTemplate}?_action=create`;\nconst secretGetVersionURLTemplate = `${secretListVersionsURLTemplate}/%s`;\nconst secretVersionStatusURLTemplate = `${secretGetVersionURLTemplate}?_action=changestatus`;\nconst secretURLTemplate = '%s/environment/secrets/%s';\nconst secretSetDescriptionURLTemplate = `${secretURLTemplate}?_action=setDescription`;\n\nconst apiVersion = 'protocol=1.0,resource=1.0';\nconst getApiConfig = () => ({\n path: `/environment/secrets`,\n apiVersion,\n});\n\n/**\n * Secret encoding\n *\n * @summary\n * You can use the encoding parameter to set an encoding format when you create an ESV secret.\n * You can only choose an encoding format using the API. The UI currently creates secrets only\n * with the generic encoding format.\n *\n * @see\n * {@link https://backstage.forgerock.com/docs/idcloud/latest/tenants/esvs.html#encoding_format | ForgeRock Documentation}\n */\nexport type SecretEncodingType = 'generic' | 'pem' | 'base64hmac';\n\n/**\n * Secret object skeleton\n */\nexport type SecretSkeleton = IdObjectSkeletonInterface & {\n description: string;\n encoding: SecretEncodingType;\n lastChangedBy?: string;\n lastChangeDate?: string;\n useInPlaceholders: boolean;\n loaded?: boolean;\n loadedVersion?: string;\n activeVersion?: string;\n};\n\nexport type VersionOfSecretStatus = 'DISABLED' | 'ENABLED' | 'DESTROYED';\n\n/**\n * Secret version skeleton\n */\nexport type VersionOfSecretSkeleton = IdObjectSkeletonInterface & {\n /**\n * Base64-encoded value. Only used when creating a new version of a secret\n */\n valueBase64?: string;\n /**\n * Version string. Returned when reading a version of a secret\n */\n version?: string;\n /**\n * Date string. Returned when reading a version of a secret\n */\n createDate?: string;\n /**\n * True if loaded, false otherwise. Returned when reading a version of a secret\n */\n loaded?: boolean;\n /**\n * Status string. Returned when reading a version of a secret\n */\n status?: VersionOfSecretStatus;\n};\n\n/**\n * Get all secrets\n * @returns {Promise<PagedResult<SecretSkeleton>>} a promise that resolves to an array of secrets\n */\nexport async function getSecrets({\n state,\n}: {\n state: State;\n}): Promise<PagedResult<SecretSkeleton>> {\n const urlString = util.format(\n secretsListURLTemplate,\n getHostBaseUrl(state.getHost())\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Get secret\n * @param secretId secret id/name\n * @returns {Promise<SecretSkeleton>} a promise that resolves to a secret\n */\nexport async function getSecret({\n secretId,\n state,\n}: {\n secretId: string;\n state: State;\n}): Promise<SecretSkeleton> {\n const urlString = util.format(\n secretURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Create secret\n * @param {string} secretId secret id/name\n * @param {string} value secret value\n * @param {string} description secret description\n * @param {string} encoding secret encoding (only `generic` is supported)\n * @param {boolean} useInPlaceholders flag indicating if the secret can be used in placeholders\n * @returns {Promise<SecretSkeleton>} a promise that resolves to a secret\n */\nexport async function putSecret({\n secretId,\n value,\n description,\n encoding = 'generic',\n useInPlaceholders = true,\n state,\n}: {\n secretId: string;\n value: string;\n description: string;\n encoding?: string;\n useInPlaceholders?: boolean;\n state: State;\n}): Promise<SecretSkeleton> {\n const secretData = {\n valueBase64: value,\n description,\n encoding,\n useInPlaceholders,\n };\n const urlString = util.format(\n secretURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).put(urlString, secretData, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Set secret description\n * @param {string} secretId secret id/name\n * @param {string} description secret description\n * @returns {Promise<any>} a promise that resolves to an empty string\n */\nexport async function setSecretDescription({\n secretId,\n description,\n state,\n}: {\n secretId: string;\n description: string;\n state: State;\n}): Promise<any> {\n const urlString = util.format(\n secretSetDescriptionURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).post(urlString, { description }, { withCredentials: true });\n return data;\n}\n\n/**\n * Delete secret\n * @param {string} secretId secret id/name\n * @returns {Promise<unknown>} a promise that resolves to a secret object\n */\nexport async function deleteSecret({\n secretId,\n state,\n}: {\n secretId: string;\n state: State;\n}) {\n const urlString = util.format(\n secretURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).delete(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Get secret versions\n * @param {string} secretId secret id/name\n * @returns {Promise<VersionOfSecretSkeleton[]>} a promise that resolves to an array of secret versions\n */\nexport async function getSecretVersions({\n secretId,\n state,\n}: {\n secretId: string;\n state: State;\n}): Promise<VersionOfSecretSkeleton[]> {\n const urlString = util.format(\n secretListVersionsURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Create new secret version\n * @param {string} secretId secret id/name\n * @param {string} value secret value\n * @returns {Promise<VersionOfSecretSkeleton>} a promise that resolves to a version object\n */\nexport async function createNewVersionOfSecret({\n secretId,\n value,\n state,\n}: {\n secretId: string;\n value: string;\n state: State;\n}): Promise<VersionOfSecretSkeleton> {\n const urlString = util.format(\n secretCreateNewVersionURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).post(urlString, { valueBase64: value }, { withCredentials: true });\n return data;\n}\n\n/**\n * Get version of secret\n * @param {string} secretId secret id/name\n * @param {string} version secret version\n * @returns {Promise<VersionOfSecretSkeleton>} a promise that resolves to a version object\n */\nexport async function getVersionOfSecret({\n secretId,\n version,\n state,\n}: {\n secretId: string;\n version: string;\n state: State;\n}): Promise<VersionOfSecretSkeleton> {\n const urlString = util.format(\n secretGetVersionURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId,\n version\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).get(urlString, {\n withCredentials: true,\n });\n return data;\n}\n\n/**\n * Update the status of a version of a secret\n * @param {string} secretId secret id/name\n * @param {string} version secret version\n * @param {VersionOfSecretStatus} status status\n * @returns {Promise<VersionOfSecretSkeleton>} a promise that resolves to a status object\n */\nexport async function setStatusOfVersionOfSecret({\n secretId,\n version,\n status,\n state,\n}: {\n secretId: string;\n version: string;\n status: VersionOfSecretStatus;\n state: State;\n}): Promise<VersionOfSecretSkeleton> {\n const urlString = util.format(\n secretVersionStatusURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId,\n version\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).post(urlString, { status }, { withCredentials: true });\n return data;\n}\n\n/**\n * Delete version of secret\n * @param {string} secretId secret id/name\n * @param {string} version secret version\n * @returns {Promise<VersionOfSecretSkeleton>} a promise that resolves to a version object\n */\nexport async function deleteVersionOfSecret({\n secretId,\n version,\n state,\n}: {\n secretId: string;\n version: string;\n state: State;\n}): Promise<VersionOfSecretSkeleton> {\n const urlString = util.format(\n secretGetVersionURLTemplate,\n getHostBaseUrl(state.getHost()),\n secretId,\n version\n );\n const { data } = await generateEnvApi({\n resource: getApiConfig(),\n state,\n }).delete(urlString, {\n withCredentials: true,\n });\n return data;\n}\n"],"mappings":";;;;;;;;;;;;;;;AAAA,IAAAA,KAAA,GAAAC,sBAAA,CAAAC,OAAA;AAAwB,IAAAC,eAAA,GAAAD,OAAA;AAAA,IAAAE,QAAA,GAAAF,OAAA;AAAA,SAAAD,uBAAAI,GAAA,WAAAA,GAAA,IAAAA,GAAA,CAAAC,UAAA,GAAAD,GAAA,KAAAE,OAAA,EAAAF,GAAA;AAAA,SAAAG,mBAAAC,GAAA,EAAAC,OAAA,EAAAC,MAAA,EAAAC,KAAA,EAAAC,MAAA,EAAAC,GAAA,EAAAC,GAAA,cAAAC,IAAA,GAAAP,GAAA,CAAAK,GAAA,EAAAC,GAAA,OAAAE,KAAA,GAAAD,IAAA,CAAAC,KAAA,WAAAC,KAAA,IAAAP,MAAA,CAAAO,KAAA,iBAAAF,IAAA,CAAAG,IAAA,IAAAT,OAAA,CAAAO,KAAA,YAAAG,OAAA,CAAAV,OAAA,CAAAO,KAAA,EAAAI,IAAA,CAAAT,KAAA,EAAAC,MAAA;AAAA,SAAAS,kBAAAC,EAAA,6BAAAC,IAAA,SAAAC,IAAA,GAAAC,SAAA,aAAAN,OAAA,WAAAV,OAAA,EAAAC,MAAA,QAAAF,GAAA,GAAAc,EAAA,CAAAI,KAAA,CAAAH,IAAA,EAAAC,IAAA,YAAAb,MAAAK,KAAA,IAAAT,kBAAA,CAAAC,GAAA,EAAAC,OAAA,EAAAC,MAAA,EAAAC,KAAA,EAAAC,MAAA,UAAAI,KAAA,cAAAJ,OAAAe,GAAA,IAAApB,kBAAA,CAAAC,GAAA,EAAAC,OAAA,EAAAC,MAAA,EAAAC,KAAA,EAAAC,MAAA,WAAAe,GAAA,KAAAhB,KAAA,CAAAiB,SAAA;AAOxB,IAAMC,sBAAsB,GAAG,wBAAwB;AACvD,IAAMC,6BAA6B,GAAG,oCAAoC;AAC1E,IAAMC,iCAAiC,MAAAC,MAAA,CAAMF,6BAA6B,oBAAiB;AAC3F,IAAMG,2BAA2B,MAAAD,MAAA,CAAMF,6BAA6B,QAAK;AACzE,IAAMI,8BAA8B,MAAAF,MAAA,CAAMC,2BAA2B,0BAAuB;AAC5F,IAAME,iBAAiB,GAAG,2BAA2B;AACrD,IAAMC,+BAA+B,MAAAJ,MAAA,CAAMG,iBAAiB,4BAAyB;AAErF,IAAME,UAAU,GAAG,2BAA2B;AAC9C,IAAMC,YAAY,GAAGA,CAAA,MAAO;EAC1BC,IAAI,wBAAwB;EAC5BF;AACF,CAAC,CAAC;;AAEF;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAGA;AACA;AACA;;AAcA;AACA;AACA;AAwBA;AACA;AACA;AACA;AAHA,SAIsBG,UAAUA,CAAAC,EAAA;EAAA,OAAAC,WAAA,CAAAhB,KAAA,OAAAD,SAAA;AAAA;AAkBhC;AACA;AACA;AACA;AACA;AAJA,SAAAiB,YAAA;EAAAA,WAAA,GAAArB,iBAAA,CAlBO,WAAAsB,IAAA,EAIkC;IAAA,IAJR;MAC/BC;IAGF,CAAC,GAAAD,IAAA;IACC,IAAME,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BlB,sBAAsB,EACtB,IAAAmB,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAChC,CAAC;IACD,IAAM;MAAEC;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACS,GAAG,CAACR,SAAS,EAAE;MAChBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAR,WAAA,CAAAhB,KAAA,OAAAD,SAAA;AAAA;AAAA,SAOqB8B,SAASA,CAAAC,GAAA;EAAA,OAAAC,UAAA,CAAA/B,KAAA,OAAAD,SAAA;AAAA;AAqB/B;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AARA,SAAAgC,WAAA;EAAAA,UAAA,GAAApC,iBAAA,CArBO,WAAAqC,KAAA,EAMqB;IAAA,IANI;MAC9BC,QAAQ;MACRf;IAIF,CAAC,GAAAc,KAAA;IACC,IAAMb,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BZ,iBAAiB,EACjB,IAAAa,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACS,GAAG,CAACR,SAAS,EAAE;MAChBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAO,UAAA,CAAA/B,KAAA,OAAAD,SAAA;AAAA;AAAA,SAWqBmC,SAASA,CAAAC,GAAA;EAAA,OAAAC,UAAA,CAAApC,KAAA,OAAAD,SAAA;AAAA;AAmC/B;AACA;AACA;AACA;AACA;AACA;AALA,SAAAqC,WAAA;EAAAA,UAAA,GAAAzC,iBAAA,CAnCO,WAAA0C,KAAA,EAcqB;IAAA,IAdI;MAC9BJ,QAAQ;MACR3C,KAAK;MACLgD,WAAW;MACXC,QAAQ,GAAG,SAAS;MACpBC,iBAAiB,GAAG,IAAI;MACxBtB;IAQF,CAAC,GAAAmB,KAAA;IACC,IAAMI,UAAU,GAAG;MACjBC,WAAW,EAAEpD,KAAK;MAClBgD,WAAW;MACXC,QAAQ;MACRC;IACF,CAAC;IACD,IAAMrB,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BZ,iBAAiB,EACjB,IAAAa,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACyB,GAAG,CAACxB,SAAS,EAAEsB,UAAU,EAAE;MAC5Bb,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAY,UAAA,CAAApC,KAAA,OAAAD,SAAA;AAAA;AAAA,SAQqB6C,oBAAoBA,CAAAC,GAAA;EAAA,OAAAC,qBAAA,CAAA9C,KAAA,OAAAD,SAAA;AAAA;AAqB1C;AACA;AACA;AACA;AACA;AAJA,SAAA+C,sBAAA;EAAAA,qBAAA,GAAAnD,iBAAA,CArBO,WAAAoD,KAAA,EAQU;IAAA,IAR0B;MACzCd,QAAQ;MACRK,WAAW;MACXpB;IAKF,CAAC,GAAA6B,KAAA;IACC,IAAM5B,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BX,+BAA+B,EAC/B,IAAAY,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAAC8B,IAAI,CAAC7B,SAAS,EAAE;MAAEmB;IAAY,CAAC,EAAE;MAAEV,eAAe,EAAE;IAAK,CAAC,CAAC;IAC9D,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAsB,qBAAA,CAAA9C,KAAA,OAAAD,SAAA;AAAA;AAAA,SAOqBkD,YAAYA,CAAAC,GAAA;EAAA,OAAAC,aAAA,CAAAnD,KAAA,OAAAD,SAAA;AAAA;AAqBlC;AACA;AACA;AACA;AACA;AAJA,SAAAoD,cAAA;EAAAA,aAAA,GAAAxD,iBAAA,CArBO,WAAAyD,KAAA,EAMJ;IAAA,IANgC;MACjCnB,QAAQ;MACRf;IAIF,CAAC,GAAAkC,KAAA;IACC,IAAMjC,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BZ,iBAAiB,EACjB,IAAAa,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACmC,MAAM,CAAClC,SAAS,EAAE;MACnBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAA2B,aAAA,CAAAnD,KAAA,OAAAD,SAAA;AAAA;AAAA,SAOqBuD,iBAAiBA,CAAAC,GAAA;EAAA,OAAAC,kBAAA,CAAAxD,KAAA,OAAAD,SAAA;AAAA;AAqBvC;AACA;AACA;AACA;AACA;AACA;AALA,SAAAyD,mBAAA;EAAAA,kBAAA,GAAA7D,iBAAA,CArBO,WAAA8D,KAAA,EAMgC;IAAA,IANC;MACtCxB,QAAQ;MACRf;IAIF,CAAC,GAAAuC,KAAA;IACC,IAAMtC,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BjB,6BAA6B,EAC7B,IAAAkB,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACS,GAAG,CAACR,SAAS,EAAE;MAChBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAgC,kBAAA,CAAAxD,KAAA,OAAAD,SAAA;AAAA;AAAA,SAQqB2D,wBAAwBA,CAAAC,GAAA;EAAA,OAAAC,yBAAA,CAAA5D,KAAA,OAAAD,SAAA;AAAA;AAqB9C;AACA;AACA;AACA;AACA;AACA;AALA,SAAA6D,0BAAA;EAAAA,yBAAA,GAAAjE,iBAAA,CArBO,WAAAkE,KAAA,EAQ8B;IAAA,IARU;MAC7C5B,QAAQ;MACR3C,KAAK;MACL4B;IAKF,CAAC,GAAA2C,KAAA;IACC,IAAM1C,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3BhB,iCAAiC,EACjC,IAAAiB,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QACF,CAAC;IACD,IAAM;MAAET;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAAC8B,IAAI,CAAC7B,SAAS,EAAE;MAAEuB,WAAW,EAAEpD;IAAM,CAAC,EAAE;MAAEsC,eAAe,EAAE;IAAK,CAAC,CAAC;IACrE,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAoC,yBAAA,CAAA5D,KAAA,OAAAD,SAAA;AAAA;AAAA,SAQqB+D,kBAAkBA,CAAAC,GAAA;EAAA,OAAAC,mBAAA,CAAAhE,KAAA,OAAAD,SAAA;AAAA;AAwBxC;AACA;AACA;AACA;AACA;AACA;AACA;AANA,SAAAiE,oBAAA;EAAAA,mBAAA,GAAArE,iBAAA,CAxBO,WAAAsE,KAAA,EAQ8B;IAAA,IARI;MACvChC,QAAQ;MACRiC,OAAO;MACPhD;IAKF,CAAC,GAAA+C,KAAA;IACC,IAAM9C,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3Bd,2BAA2B,EAC3B,IAAAe,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QAAQ,EACRiC,OACF,CAAC;IACD,IAAM;MAAE1C;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACS,GAAG,CAACR,SAAS,EAAE;MAChBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAwC,mBAAA,CAAAhE,KAAA,OAAAD,SAAA;AAAA;AAAA,SASqBoE,0BAA0BA,CAAAC,GAAA;EAAA,OAAAC,2BAAA,CAAArE,KAAA,OAAAD,SAAA;AAAA;AAwBhD;AACA;AACA;AACA;AACA;AACA;AALA,SAAAsE,4BAAA;EAAAA,2BAAA,GAAA1E,iBAAA,CAxBO,WAAA2E,KAAA,EAU8B;IAAA,IAVY;MAC/CrC,QAAQ;MACRiC,OAAO;MACPK,MAAM;MACNrD;IAMF,CAAC,GAAAoD,KAAA;IACC,IAAMnD,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3Bb,8BAA8B,EAC9B,IAAAc,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QAAQ,EACRiC,OACF,CAAC;IACD,IAAM;MAAE1C;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAAC8B,IAAI,CAAC7B,SAAS,EAAE;MAAEoD;IAAO,CAAC,EAAE;MAAE3C,eAAe,EAAE;IAAK,CAAC,CAAC;IACzD,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAA6C,2BAAA,CAAArE,KAAA,OAAAD,SAAA;AAAA;AAAA,SAQqByE,qBAAqBA,CAAAC,IAAA;EAAA,OAAAC,sBAAA,CAAA1E,KAAA,OAAAD,SAAA;AAAA;AAAA,SAAA2E,uBAAA;EAAAA,sBAAA,GAAA/E,iBAAA,CAApC,WAAAgF,MAAA,EAQ8B;IAAA,IARO;MAC1C1C,QAAQ;MACRiC,OAAO;MACPhD;IAKF,CAAC,GAAAyD,MAAA;IACC,IAAMxD,SAAS,GAAGC,aAAI,CAACC,MAAM,CAC3Bd,2BAA2B,EAC3B,IAAAe,8BAAc,EAACJ,KAAK,CAACK,OAAO,CAAC,CAAC,CAAC,EAC/BU,QAAQ,EACRiC,OACF,CAAC;IACD,IAAM;MAAE1C;IAAK,CAAC,SAAS,IAAAC,uBAAc,EAAC;MACpCC,QAAQ,EAAEd,YAAY,CAAC,CAAC;MACxBM;IACF,CAAC,CAAC,CAACmC,MAAM,CAAClC,SAAS,EAAE;MACnBS,eAAe,EAAE;IACnB,CAAC,CAAC;IACF,OAAOJ,IAAI;EACb,CAAC;EAAA,OAAAkD,sBAAA,CAAA1E,KAAA,OAAAD,SAAA;AAAA"}
|
|
@@ -3,7 +3,6 @@
|
|
|
3
3
|
var SecretsApi = _interopRequireWildcard(require("./SecretsApi.js"));
|
|
4
4
|
var _AutoSetupPolly = require("../../utils/AutoSetupPolly.js");
|
|
5
5
|
var _index = require("../../index.js");
|
|
6
|
-
var _Base64Utils = require("../../utils/Base64Utils.js");
|
|
7
6
|
function _getRequireWildcardCache(e) { if ("function" != typeof WeakMap) return null; var r = new WeakMap(), t = new WeakMap(); return (_getRequireWildcardCache = function _getRequireWildcardCache(e) { return e ? t : r; })(e); }
|
|
8
7
|
function _interopRequireWildcard(e, r) { if (!r && e && e.__esModule) return e; if (null === e || "object" != typeof e && "function" != typeof e) return { default: e }; var t = _getRequireWildcardCache(r); if (t && t.has(e)) return t.get(e); var n = { __proto__: null }, a = Object.defineProperty && Object.getOwnPropertyDescriptor; for (var u in e) if ("default" !== u && Object.prototype.hasOwnProperty.call(e, u)) { var i = a ? Object.getOwnPropertyDescriptor(e, u) : null; i && (i.get || i.set) ? Object.defineProperty(n, u, i) : n[u] = e[u]; } return n.default = e, t && t.set(e, n), n; }
|
|
9
8
|
function asyncGeneratorStep(gen, resolve, reject, _next, _throw, key, arg) { try { var info = gen[key](arg); var value = info.value; } catch (error) { reject(error); return; } if (info.done) { resolve(value); } else { Promise.resolve(value).then(_next, _throw); } }
|
|
@@ -42,29 +41,44 @@ var ctx = (0, _AutoSetupPolly.autoSetupPolly)();
|
|
|
42
41
|
describe('SecretsApi', () => {
|
|
43
42
|
var secret1 = {
|
|
44
43
|
name: 'esv-frodo-test-secret1',
|
|
45
|
-
value: '
|
|
44
|
+
value: 'RnJvZG8gVGVzdCBTZWNyZXQgT25lIFZhbHVl',
|
|
45
|
+
// base64 encoded 'Frodo Test Secret One Value'
|
|
46
|
+
valueV2: 'RnJvZG8gVGVzdCBTZWNyZXQgT25lIFZhbHVlIFZlcnNpb24gMg==',
|
|
47
|
+
// base64 'Frodo Test Secret One Value Version 2'
|
|
48
|
+
valueV3: 'RnJvZG8gVGVzdCBTZWNyZXQgT25lIFZhbHVlIFZlcnNpb24gMw==',
|
|
49
|
+
// base64 'Frodo Test Secret One Value Version 3'
|
|
46
50
|
description: 'Frodo Test Secret One Description'
|
|
47
51
|
};
|
|
48
52
|
var secret2 = {
|
|
49
53
|
name: 'esv-frodo-test-secret2',
|
|
50
|
-
value: '
|
|
54
|
+
value: 'RnJvZG8gVGVzdCBTZWNyZXQgVHdvIFZhbHVl',
|
|
55
|
+
// base64 encoded 'Frodo Test Secret Two Value'
|
|
56
|
+
valueV2: 'RnJvZG8gVGVzdCBTZWNyZXQgVHdvIFZhbHVlIFZlcnNpb24gMg==',
|
|
57
|
+
// base64 'Frodo Test Secret Two Value Version 2'
|
|
58
|
+
valueV3: 'RnJvZG8gVGVzdCBTZWNyZXQgVHdvIFZhbHVlIFZlcnNpb24gMw==',
|
|
59
|
+
// base64 'Frodo Test Secret Two Value Version 3'
|
|
60
|
+
valueV4: 'RnJvZG8gVGVzdCBTZWNyZXQgVHdvIFZhbHVlIFZlcnNpb24gNA==',
|
|
61
|
+
// base64 encoded 'Frodo Test Secret Two Value Version 4'
|
|
51
62
|
description: 'Frodo Test Secret Two Description'
|
|
52
63
|
};
|
|
53
64
|
var secret3 = {
|
|
54
65
|
name: 'esv-frodo-test-secret3',
|
|
55
|
-
value: '
|
|
66
|
+
value: 'RnJvZG8gVGVzdCBTZWNyZXQgVGhyZWUgVmFsdWU=',
|
|
67
|
+
// base64 encoded 'Frodo Test Secret Three Value'
|
|
56
68
|
description: 'Frodo Test Secret Three Description'
|
|
57
69
|
};
|
|
58
70
|
var secret4 = {
|
|
59
71
|
name: 'esv-frodo-test-secret4',
|
|
60
|
-
value: '
|
|
72
|
+
value: 'RnJvZG8gVGVzdCBTZWNyZXQgRm91ciBWYWx1ZQ==',
|
|
73
|
+
// base64 encoded 'Frodo Test Secret Four Value'
|
|
61
74
|
description: 'Frodo Test Secret Four Description',
|
|
62
75
|
encoding: 'generic',
|
|
63
76
|
placeholders: true
|
|
64
77
|
};
|
|
65
78
|
var secret5 = {
|
|
66
79
|
name: 'esv-frodo-test-secret5',
|
|
67
|
-
value: "
|
|
80
|
+
value: "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNFakNDQVhzQ0FnMzZNQTBHQ1NxR1NJYjNEUUVCQlFVQU1JR2JNUXN3Q1FZRFZRUUdFd0pLVURFT01Bd0cKQTFVRUNCTUZWRzlyZVc4eEVEQU9CZ05WQkFjVEIwTm9kVzh0YTNVeEVUQVBCZ05WQkFvVENFWnlZVzVyTkVSRQpNUmd3RmdZRFZRUUxFdzlYWldKRFpYSjBJRk4xY0hCdmNuUXhHREFXQmdOVkJBTVREMFp5WVc1ck5FUkVJRmRsCllpQkRRVEVqTUNFR0NTcUdTSWIzRFFFSkFSWVVjM1Z3Y0c5eWRFQm1jbUZ1YXpSa1pDNWpiMjB3SGhjTk1USXcKT0RJeU1EVXlOalUwV2hjTk1UY3dPREl4TURVeU5qVTBXakJLTVFzd0NRWURWUVFHRXdKS1VERU9NQXdHQTFVRQpDQXdGVkc5cmVXOHhFVEFQQmdOVkJBb01DRVp5WVc1ck5FUkVNUmd3RmdZRFZRUUREQTkzZDNjdVpYaGhiWEJzClpTNWpiMjB3WERBTkJna3Foa2lHOXcwQkFRRUZBQU5MQURCSUFrRUFtL3hta0htRVFydXJFLzByZS9qZUZSTGwKOFpQakJvcDd1TEhobmlhN2xRRy81ekR0WklVQzNSVnBxRFN3QnV3L05Ud2VHeXVQK284QUc5OEh4cXhUQndJRApBUUFCTUEwR0NTcUdTSWIzRFFFQkJRVUFBNEdCQUJTMlRMdUJlVFBtY2FUYVVXL0xDQjJOWU95OEdNZHpSMW14CjhpQkl1Mkg2L0UydGlZM1JJZXZWMk9XNjFxWTIvWFJRZzdZUHh4M2ZmZVV1Z1g5RjRKL2lQbm51MXpBeHh5QnkKMlZndUt2NFNXalJGb1JrSWZJbEhYMHFWdmlNaFNsTnkyaW9GTHk3SmNQWmIrdjNmdERHeXdVcWNCaVZEb2VhMApIbitHbXhaQQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t",
|
|
81
|
+
newValue: "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",
|
|
68
82
|
description: 'Frodo Test PEM encoded Secret Five Description',
|
|
69
83
|
encoding: 'pem',
|
|
70
84
|
placeholders: true
|
|
@@ -93,12 +107,12 @@ describe('SecretsApi', () => {
|
|
|
93
107
|
});
|
|
94
108
|
yield SecretsApi.createNewVersionOfSecret({
|
|
95
109
|
secretId: secret1.name,
|
|
96
|
-
value: secret1.
|
|
110
|
+
value: secret1.valueV2,
|
|
97
111
|
state: _index.state
|
|
98
112
|
});
|
|
99
113
|
yield SecretsApi.createNewVersionOfSecret({
|
|
100
114
|
secretId: secret1.name,
|
|
101
|
-
value: secret1.
|
|
115
|
+
value: secret1.valueV3,
|
|
102
116
|
state: _index.state
|
|
103
117
|
});
|
|
104
118
|
yield SecretsApi.setStatusOfVersionOfSecret({
|
|
@@ -129,12 +143,12 @@ describe('SecretsApi', () => {
|
|
|
129
143
|
});
|
|
130
144
|
yield SecretsApi.createNewVersionOfSecret({
|
|
131
145
|
secretId: secret2.name,
|
|
132
|
-
value: secret2.
|
|
146
|
+
value: secret2.valueV2,
|
|
133
147
|
state: _index.state
|
|
134
148
|
});
|
|
135
149
|
yield SecretsApi.createNewVersionOfSecret({
|
|
136
150
|
secretId: secret2.name,
|
|
137
|
-
value: secret2.
|
|
151
|
+
value: secret2.valueV3,
|
|
138
152
|
state: _index.state
|
|
139
153
|
});
|
|
140
154
|
}
|
|
@@ -310,7 +324,7 @@ describe('SecretsApi', () => {
|
|
|
310
324
|
test("2: Create pem encoded secret: ".concat(secret5.name, " - success"), /*#__PURE__*/_asyncToGenerator(function* () {
|
|
311
325
|
var response = yield SecretsApi.putSecret({
|
|
312
326
|
secretId: secret5.name,
|
|
313
|
-
value:
|
|
327
|
+
value: secret5.value,
|
|
314
328
|
description: secret5.description,
|
|
315
329
|
encoding: secret5.encoding,
|
|
316
330
|
useInPlaceholders: secret5.placeholders,
|
|
@@ -399,7 +413,7 @@ describe('SecretsApi', () => {
|
|
|
399
413
|
test("1: Create new version of existing secret: ".concat(secret2.name, " - success"), /*#__PURE__*/_asyncToGenerator(function* () {
|
|
400
414
|
var response = yield SecretsApi.createNewVersionOfSecret({
|
|
401
415
|
secretId: secret2.name,
|
|
402
|
-
value: secret2.
|
|
416
|
+
value: secret2.valueV4,
|
|
403
417
|
state: _index.state
|
|
404
418
|
});
|
|
405
419
|
expect(response).toMatchSnapshot();
|
|
@@ -409,13 +423,22 @@ describe('SecretsApi', () => {
|
|
|
409
423
|
try {
|
|
410
424
|
yield SecretsApi.createNewVersionOfSecret({
|
|
411
425
|
secretId: 'esv-does-not-exist',
|
|
412
|
-
value: '
|
|
426
|
+
value: 'RnJvZG8gTm9uLUV4aXN0aW5nIFRlc3QgU2VjcmV0IFZhbHVlIFZlcnNpb24gMg==',
|
|
427
|
+
// base64 encoded 'Frodo Non-Existing Test Secret Value Version 2',
|
|
413
428
|
state: _index.state
|
|
414
429
|
});
|
|
415
430
|
} catch (error) {
|
|
416
431
|
expect(error).toMatchSnapshot();
|
|
417
432
|
}
|
|
418
433
|
}));
|
|
434
|
+
test("3: Create new version of existing secret with pem encoding: ".concat(secret5.name, " - success"), /*#__PURE__*/_asyncToGenerator(function* () {
|
|
435
|
+
var response = yield SecretsApi.createNewVersionOfSecret({
|
|
436
|
+
secretId: secret5.name,
|
|
437
|
+
value: secret5.newValue,
|
|
438
|
+
state: _index.state
|
|
439
|
+
});
|
|
440
|
+
expect(response).toMatchSnapshot();
|
|
441
|
+
}));
|
|
419
442
|
});
|
|
420
443
|
describe('setStatusOfVersionOfSecret()', () => {
|
|
421
444
|
test('0: Method is implemented', /*#__PURE__*/_asyncToGenerator(function* () {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SecretsApi.test.js","names":["ctx","autoSetupPolly","describe","secret1","name","value","description","secret2","secret3","secret4","encoding","placeholders","secret5","beforeAll","_asyncToGenerator","process","env","FRODO_POLLY_MODE","SecretsApi","getSecret","secretId","state","deleteSecret","error","putSecret","createNewVersionOfSecret","setStatusOfVersionOfSecret","version","status","afterAll","beforeEach","polly","server","any","on","_req","recording","filterRecording","test","expect","getSecrets","toBeDefined","response","toMatchSnapshot","concat","assertions","useInPlaceholders","encode","setSecretDescription","getSecretVersions","getVersionOfSecret","deleteVersionOfSecret"],"sources":["../../../src/api/cloud/SecretsApi.test.ts"],"sourcesContent":["/**\n * To record and update snapshots, you must perform 3 steps in order:\n *\n * 1. Record API responses & update ESM snapshots\n *\n * To record and update ESM snapshots, you must call the test:record\n * script and override all the connection state variables required\n * to connect to the env to record from:\n *\n * FRODO_DEBUG=1 FRODO_HOST=frodo-dev npm run test:record SecretsApi\n *\n * The above command assumes that you have a connection profile for\n * 'volker-dev' on your development machine.\n *\n * 2. Update CJS snapshots\n *\n * After recording, the ESM snapshots will already be updated as that happens\n * in one go, but you musty manually update the CJS snapshots by running:\n *\n * FRODO_DEBUG=1 npm run test:update SecretsApi\n *\n * 3. Test your changes\n *\n * If 1 and 2 didn't produce any errors, you are ready to run the tests in\n * replay mode and make sure they all succeed as well:\n *\n * npm run test:only SecretsApi\n *\n * Note: FRODO_DEBUG=1 is optional and enables debug logging for some output\n * in case things don't function as expected\n */\nimport * as SecretsApi from './SecretsApi';\nimport { autoSetupPolly, filterRecording } from '../../utils/AutoSetupPolly';\nimport { state } from '../../index';\nimport { encode } from '../../utils/Base64Utils';\n\nconst ctx = autoSetupPolly();\n\ndescribe('SecretsApi', () => {\n const secret1 = {\n name: 'esv-frodo-test-secret1',\n value: 'Frodo Test Secret One Value',\n description: 'Frodo Test Secret One Description',\n };\n const secret2 = {\n name: 'esv-frodo-test-secret2',\n value: 'Frodo Test Secret Two Value',\n description: 'Frodo Test Secret Two Description',\n };\n const secret3 = {\n name: 'esv-frodo-test-secret3',\n value: 'Frodo Test Secret Three Value',\n description: 'Frodo Test Secret Three Description',\n };\n const secret4 = {\n name: 'esv-frodo-test-secret4',\n value: 'Frodo Test Secret Four Value',\n description: 'Frodo Test Secret Four Description',\n encoding: 'generic',\n placeholders: true,\n };\n const secret5 = {\n name: 'esv-frodo-test-secret5',\n value: `-----BEGIN CERTIFICATE-----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\nHn+GmxZA\n-----END CERTIFICATE-----`,\n description: 'Frodo Test PEM encoded Secret Five Description',\n encoding: 'pem',\n placeholders: true,\n };\n // in recording mode, setup test data before recording\n beforeAll(async () => {\n if (process.env.FRODO_POLLY_MODE === 'record') {\n // setup secret1 - delete if exists, then create\n try {\n await SecretsApi.getSecret({ secretId: secret1.name, state });\n await SecretsApi.deleteSecret({ secretId: secret1.name, state });\n } catch (error) {\n // ignore\n } finally {\n await SecretsApi.putSecret({\n secretId: secret1.name,\n value: secret1.value,\n description: secret1.description,\n state,\n });\n await SecretsApi.createNewVersionOfSecret({\n secretId: secret1.name,\n value: secret1.value + ' Version 2',\n state,\n });\n await SecretsApi.createNewVersionOfSecret({\n secretId: secret1.name,\n value: secret1.value + ' Version 3',\n state,\n });\n await SecretsApi.setStatusOfVersionOfSecret({\n secretId: secret1.name,\n version: '2',\n status: 'DISABLED',\n state,\n });\n }\n // setup secret2 - delete if exists, then create\n try {\n await SecretsApi.getSecret({ secretId: secret2.name, state });\n await SecretsApi.deleteSecret({ secretId: secret2.name, state });\n } catch (error) {\n // ignore\n } finally {\n await SecretsApi.putSecret({\n secretId: secret2.name,\n value: secret2.value,\n description: secret2.description,\n state,\n });\n await SecretsApi.createNewVersionOfSecret({\n secretId: secret2.name,\n value: secret2.value + ' Version 2',\n state,\n });\n await SecretsApi.createNewVersionOfSecret({\n secretId: secret2.name,\n value: secret2.value + ' Version 3',\n state,\n });\n }\n // setup secret3 - delete if exists, then create\n try {\n await SecretsApi.getSecret({ secretId: secret3.name, state });\n await SecretsApi.deleteSecret({ secretId: secret3.name, state });\n } catch (error) {\n // ignore\n } finally {\n await SecretsApi.putSecret({\n secretId: secret3.name,\n value: secret3.value,\n description: secret3.description,\n state,\n });\n }\n // setup secret4 - delete if exists\n try {\n await SecretsApi.getSecret({ secretId: secret4.name, state });\n await SecretsApi.deleteSecret({ secretId: secret4.name, state });\n } catch (error) {\n // ignore\n }\n // setup secret5 - delete if exists\n try {\n await SecretsApi.getSecret({ secretId: secret5.name, state });\n await SecretsApi.deleteSecret({ secretId: secret5.name, state });\n } catch (error) {\n // ignore\n }\n }\n });\n // in recording mode, remove test data after recording\n afterAll(async () => {\n if (process.env.FRODO_POLLY_MODE === 'record') {\n try {\n await SecretsApi.getSecret({ secretId: secret1.name, state });\n await SecretsApi.deleteSecret({ secretId: secret1.name, state });\n } catch (error) {\n // ignore\n }\n try {\n await SecretsApi.getSecret({ secretId: secret2.name, state });\n await SecretsApi.deleteSecret({ secretId: secret2.name, state });\n } catch (error) {\n // ignore\n }\n try {\n await SecretsApi.getSecret({ secretId: secret3.name, state });\n await SecretsApi.deleteSecret({ secretId: secret3.name, state });\n } catch (error) {\n // ignore\n }\n try {\n await SecretsApi.getSecret({ secretId: secret4.name, state });\n await SecretsApi.deleteSecret({ secretId: secret4.name, state });\n } catch (error) {\n // ignore\n }\n try {\n await SecretsApi.getSecret({ secretId: secret5.name, state });\n await SecretsApi.deleteSecret({ secretId: secret5.name, state });\n } catch (error) {\n // ignore\n }\n }\n });\n beforeEach(async () => {\n if (process.env.FRODO_POLLY_MODE === 'record') {\n ctx.polly.server.any().on('beforePersist', (_req, recording) => {\n filterRecording(recording);\n });\n }\n });\n\n describe('getSecrets()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.getSecrets).toBeDefined();\n });\n\n test('1: Get all secrets - success', async () => {\n const response = await SecretsApi.getSecrets({ state });\n expect(response).toMatchSnapshot();\n });\n });\n\n describe('getSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.getSecret).toBeDefined();\n });\n\n test(`1: Get existing secret: ${secret1.name}`, async () => {\n const response = await SecretsApi.getSecret({\n secretId: secret1.name,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Get non-existing secret: esv-does-not-exist', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.getSecret({\n secretId: 'esv-does-not-exist',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n });\n\n describe('putSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.putSecret).toBeDefined();\n });\n\n test(`1: Create secret: ${secret4.name} - success`, async () => {\n const response = await SecretsApi.putSecret({\n secretId: secret4.name,\n value: secret4.value,\n description: secret4.description,\n encoding: secret4.encoding,\n useInPlaceholders: secret4.placeholders,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test(`2: Create pem encoded secret: ${secret5.name} - success`, async () => {\n const response = await SecretsApi.putSecret({\n secretId: secret5.name,\n value: encode(secret5.value),\n description: secret5.description,\n encoding: secret5.encoding,\n useInPlaceholders: secret5.placeholders,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n });\n\n describe('setSecretDescription()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.setSecretDescription).toBeDefined();\n });\n\n test(`1: Set existing secret's description: ${secret2.name} - success`, async () => {\n const response = await SecretsApi.setSecretDescription({\n secretId: secret2.name,\n description: 'Updated Frodo Test Secret Two Description',\n state,\n });\n expect(response).toMatchSnapshot();\n });\n });\n\n describe('deleteSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.deleteSecret).toBeDefined();\n });\n\n test(`1: Delete existing secret: ${secret3.name} - success`, async () => {\n const response = await SecretsApi.deleteSecret({\n secretId: secret3.name,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n });\n\n describe('getSecretVersions()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.getSecretVersions).toBeDefined();\n });\n\n test(`1: Get versions of existing secret: ${secret1.name}`, async () => {\n const response = await SecretsApi.getSecretVersions({\n secretId: secret1.name,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Get versions of non-existing secret: esv-does-not-exist', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.getSecretVersions({\n secretId: 'esv-does-not-exist',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n });\n\n describe('getVersionOfSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.getVersionOfSecret).toBeDefined();\n });\n\n test(`1: Get version 2 of existing secret: ${secret1.name}`, async () => {\n const response = await SecretsApi.getVersionOfSecret({\n secretId: secret1.name,\n version: '2',\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Get version 2 of non-existing secret: esv-does-not-exist', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.getVersionOfSecret({\n secretId: 'esv-does-not-exist',\n version: '2',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n });\n\n describe('createNewVersionOfSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.createNewVersionOfSecret).toBeDefined();\n });\n\n test(`1: Create new version of existing secret: ${secret2.name} - success`, async () => {\n const response = await SecretsApi.createNewVersionOfSecret({\n secretId: secret2.name,\n value: secret2.value + ' Version 4',\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Create new version of non-existing secret: esv-does-not-exist - error', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.createNewVersionOfSecret({\n secretId: 'esv-does-not-exist',\n value: 'Frodo Non-Existing Test Secret Value Version 2',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n });\n\n describe('setStatusOfVersionOfSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.setStatusOfVersionOfSecret).toBeDefined();\n });\n\n test(`1: Disable version 2 of existing secret: ${secret2.name} - success`, async () => {\n expect.assertions(1);\n const response = await SecretsApi.setStatusOfVersionOfSecret({\n secretId: secret2.name,\n version: '2',\n status: 'DISABLED',\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Disable version 2 of non-existing secret: esv-does-not-exist - error', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.setStatusOfVersionOfSecret({\n secretId: 'esv-does-not-exist',\n version: '2',\n status: 'DISABLED',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n });\n\n describe('deleteVersionOfSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.deleteVersionOfSecret).toBeDefined();\n });\n\n test(`1: Delete version 1 of secret: ${secret2.name} - success`, async () => {\n const response = await SecretsApi.deleteVersionOfSecret({\n secretId: secret2.name,\n version: '1',\n state,\n });\n expect(response).toMatchSnapshot();\n });\n });\n});\n"],"mappings":";;;;;;;;;sYAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AAMA,IAAMA,GAAG,GAAG,IAAAC,8BAAc,EAAC,CAAC;AAE5BC,QAAQ,CAAC,YAAY,EAAE,MAAM;EAC3B,IAAMC,OAAO,GAAG;IACdC,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,EAAE,6BAA6B;IACpCC,WAAW,EAAE;EACf,CAAC;EACD,IAAMC,OAAO,GAAG;IACdH,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,EAAE,6BAA6B;IACpCC,WAAW,EAAE;EACf,CAAC;EACD,IAAME,OAAO,GAAG;IACdJ,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,EAAE,+BAA+B;IACtCC,WAAW,EAAE;EACf,CAAC;EACD,IAAMG,OAAO,GAAG;IACdL,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,EAAE,8BAA8B;IACrCC,WAAW,EAAE,oCAAoC;IACjDI,QAAQ,EAAE,SAAS;IACnBC,YAAY,EAAE;EAChB,CAAC;EACD,IAAMC,OAAO,GAAG;IACdR,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,0xBAaiB;IACtBC,WAAW,EAAE,gDAAgD;IAC7DI,QAAQ,EAAE,KAAK;IACfC,YAAY,EAAE;EAChB,CAAC;EACD;EACAE,SAAS,eAAAC,iBAAA,CAAC,aAAY;IACpB,IAAIC,OAAO,CAACC,GAAG,CAACC,gBAAgB,KAAK,QAAQ,EAAE;MAC7C;MACA,IAAI;QACF,MAAMC,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEjB,OAAO,CAACC,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEjB,OAAO,CAACC,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA,CACD,SAAS;QACR,MAAML,UAAU,CAACM,SAAS,CAAC;UACzBJ,QAAQ,EAAEjB,OAAO,CAACC,IAAI;UACtBC,KAAK,EAAEF,OAAO,CAACE,KAAK;UACpBC,WAAW,EAAEH,OAAO,CAACG,WAAW;UAChCe,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAEjB,OAAO,CAACC,IAAI;UACtBC,KAAK,EAAEF,OAAO,CAACE,KAAK,GAAG,YAAY;UACnCgB,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAEjB,OAAO,CAACC,IAAI;UACtBC,KAAK,EAAEF,OAAO,CAACE,KAAK,GAAG,YAAY;UACnCgB,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACQ,0BAA0B,CAAC;UAC1CN,QAAQ,EAAEjB,OAAO,CAACC,IAAI;UACtBuB,OAAO,EAAE,GAAG;UACZC,MAAM,EAAE,UAAU;UAClBP,KAAK,EAALA;QACF,CAAC,CAAC;MACJ;MACA;MACA,IAAI;QACF,MAAMH,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEb,OAAO,CAACH,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEb,OAAO,CAACH,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA,CACD,SAAS;QACR,MAAML,UAAU,CAACM,SAAS,CAAC;UACzBJ,QAAQ,EAAEb,OAAO,CAACH,IAAI;UACtBC,KAAK,EAAEE,OAAO,CAACF,KAAK;UACpBC,WAAW,EAAEC,OAAO,CAACD,WAAW;UAChCe,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAEb,OAAO,CAACH,IAAI;UACtBC,KAAK,EAAEE,OAAO,CAACF,KAAK,GAAG,YAAY;UACnCgB,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAEb,OAAO,CAACH,IAAI;UACtBC,KAAK,EAAEE,OAAO,CAACF,KAAK,GAAG,YAAY;UACnCgB,KAAK,EAALA;QACF,CAAC,CAAC;MACJ;MACA;MACA,IAAI;QACF,MAAMH,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEZ,OAAO,CAACJ,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEZ,OAAO,CAACJ,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA,CACD,SAAS;QACR,MAAML,UAAU,CAACM,SAAS,CAAC;UACzBJ,QAAQ,EAAEZ,OAAO,CAACJ,IAAI;UACtBC,KAAK,EAAEG,OAAO,CAACH,KAAK;UACpBC,WAAW,EAAEE,OAAO,CAACF,WAAW;UAChCe,KAAK,EAALA;QACF,CAAC,CAAC;MACJ;MACA;MACA,IAAI;QACF,MAAMH,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEX,OAAO,CAACL,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEX,OAAO,CAACL,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF;MACA,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAER,OAAO,CAACR,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAER,OAAO,CAACR,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;IAEJ;EACF,CAAC,EAAC;EACF;EACAM,QAAQ,eAAAf,iBAAA,CAAC,aAAY;IACnB,IAAIC,OAAO,CAACC,GAAG,CAACC,gBAAgB,KAAK,QAAQ,EAAE;MAC7C,IAAI;QACF,MAAMC,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEjB,OAAO,CAACC,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEjB,OAAO,CAACC,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEb,OAAO,CAACH,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEb,OAAO,CAACH,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEZ,OAAO,CAACJ,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEZ,OAAO,CAACJ,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEX,OAAO,CAACL,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEX,OAAO,CAACL,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAER,OAAO,CAACR,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAER,OAAO,CAACR,IAAI;UAAEiB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;IAEJ;EACF,CAAC,EAAC;EACFO,UAAU,eAAAhB,iBAAA,CAAC,aAAY;IACrB,IAAIC,OAAO,CAACC,GAAG,CAACC,gBAAgB,KAAK,QAAQ,EAAE;MAC7CjB,GAAG,CAAC+B,KAAK,CAACC,MAAM,CAACC,GAAG,CAAC,CAAC,CAACC,EAAE,CAAC,eAAe,EAAE,CAACC,IAAI,EAAEC,SAAS,KAAK;QAC9D,IAAAC,+BAAe,EAACD,SAAS,CAAC;MAC5B,CAAC,CAAC;IACJ;EACF,CAAC,EAAC;EAEFlC,QAAQ,CAAC,cAAc,EAAE,MAAM;IAC7BoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACsB,UAAU,CAAC,CAACC,WAAW,CAAC,CAAC;IAC7C,CAAC,EAAC;IAEFH,IAAI,CAAC,8BAA8B,eAAAxB,iBAAA,CAAE,aAAY;MAC/C,IAAM4B,QAAQ,SAASxB,UAAU,CAACsB,UAAU,CAAC;QAAEnB,KAAK,EAALA;MAAM,CAAC,CAAC;MACvDkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;EAEFzC,QAAQ,CAAC,aAAa,EAAE,MAAM;IAC5BoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACC,SAAS,CAAC,CAACsB,WAAW,CAAC,CAAC;IAC5C,CAAC,EAAC;IAEFH,IAAI,4BAAAM,MAAA,CAA4BzC,OAAO,CAACC,IAAI,gBAAAU,iBAAA,CAAI,aAAY;MAC1D,IAAM4B,QAAQ,SAASxB,UAAU,CAACC,SAAS,CAAC;QAC1CC,QAAQ,EAAEjB,OAAO,CAACC,IAAI;QACtBiB,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,gDAAgD,eAAAxB,iBAAA,CAAE,aAAY;MACjEyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAACC,SAAS,CAAC;UACzBC,QAAQ,EAAE,oBAAoB;UAC9BC,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;EACJ,CAAC,CAAC;EAEFzC,QAAQ,CAAC,aAAa,EAAE,MAAM;IAC5BoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACM,SAAS,CAAC,CAACiB,WAAW,CAAC,CAAC;IAC5C,CAAC,EAAC;IAEFH,IAAI,sBAAAM,MAAA,CAAsBnC,OAAO,CAACL,IAAI,8BAAAU,iBAAA,CAAc,aAAY;MAC9D,IAAM4B,QAAQ,SAASxB,UAAU,CAACM,SAAS,CAAC;QAC1CJ,QAAQ,EAAEX,OAAO,CAACL,IAAI;QACtBC,KAAK,EAAEI,OAAO,CAACJ,KAAK;QACpBC,WAAW,EAAEG,OAAO,CAACH,WAAW;QAChCI,QAAQ,EAAED,OAAO,CAACC,QAAQ;QAC1BoC,iBAAiB,EAAErC,OAAO,CAACE,YAAY;QACvCU,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,kCAAAM,MAAA,CAAkChC,OAAO,CAACR,IAAI,8BAAAU,iBAAA,CAAc,aAAY;MAC1E,IAAM4B,QAAQ,SAASxB,UAAU,CAACM,SAAS,CAAC;QAC1CJ,QAAQ,EAAER,OAAO,CAACR,IAAI;QACtBC,KAAK,EAAE,IAAA0C,mBAAM,EAACnC,OAAO,CAACP,KAAK,CAAC;QAC5BC,WAAW,EAAEM,OAAO,CAACN,WAAW;QAChCI,QAAQ,EAAEE,OAAO,CAACF,QAAQ;QAC1BoC,iBAAiB,EAAElC,OAAO,CAACD,YAAY;QACvCU,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;EAEFzC,QAAQ,CAAC,wBAAwB,EAAE,MAAM;IACvCoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAAC8B,oBAAoB,CAAC,CAACP,WAAW,CAAC,CAAC;IACvD,CAAC,EAAC;IAEFH,IAAI,0CAAAM,MAAA,CAA0CrC,OAAO,CAACH,IAAI,8BAAAU,iBAAA,CAAc,aAAY;MAClF,IAAM4B,QAAQ,SAASxB,UAAU,CAAC8B,oBAAoB,CAAC;QACrD5B,QAAQ,EAAEb,OAAO,CAACH,IAAI;QACtBE,WAAW,EAAE,2CAA2C;QACxDe,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;EAEFzC,QAAQ,CAAC,gBAAgB,EAAE,MAAM;IAC/BoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACI,YAAY,CAAC,CAACmB,WAAW,CAAC,CAAC;IAC/C,CAAC,EAAC;IAEFH,IAAI,+BAAAM,MAAA,CAA+BpC,OAAO,CAACJ,IAAI,8BAAAU,iBAAA,CAAc,aAAY;MACvE,IAAM4B,QAAQ,SAASxB,UAAU,CAACI,YAAY,CAAC;QAC7CF,QAAQ,EAAEZ,OAAO,CAACJ,IAAI;QACtBiB,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;EAEFzC,QAAQ,CAAC,qBAAqB,EAAE,MAAM;IACpCoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAAC+B,iBAAiB,CAAC,CAACR,WAAW,CAAC,CAAC;IACpD,CAAC,EAAC;IAEFH,IAAI,wCAAAM,MAAA,CAAwCzC,OAAO,CAACC,IAAI,gBAAAU,iBAAA,CAAI,aAAY;MACtE,IAAM4B,QAAQ,SAASxB,UAAU,CAAC+B,iBAAiB,CAAC;QAClD7B,QAAQ,EAAEjB,OAAO,CAACC,IAAI;QACtBiB,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,4DAA4D,eAAAxB,iBAAA,CAAE,aAAY;MAC7EyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAAC+B,iBAAiB,CAAC;UACjC7B,QAAQ,EAAE,oBAAoB;UAC9BC,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;EACJ,CAAC,CAAC;EAEFzC,QAAQ,CAAC,sBAAsB,EAAE,MAAM;IACrCoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACgC,kBAAkB,CAAC,CAACT,WAAW,CAAC,CAAC;IACrD,CAAC,EAAC;IAEFH,IAAI,yCAAAM,MAAA,CAAyCzC,OAAO,CAACC,IAAI,gBAAAU,iBAAA,CAAI,aAAY;MACvE,IAAM4B,QAAQ,SAASxB,UAAU,CAACgC,kBAAkB,CAAC;QACnD9B,QAAQ,EAAEjB,OAAO,CAACC,IAAI;QACtBuB,OAAO,EAAE,GAAG;QACZN,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,6DAA6D,eAAAxB,iBAAA,CAAE,aAAY;MAC9EyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAACgC,kBAAkB,CAAC;UAClC9B,QAAQ,EAAE,oBAAoB;UAC9BO,OAAO,EAAE,GAAG;UACZN,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;EACJ,CAAC,CAAC;EAEFzC,QAAQ,CAAC,4BAA4B,EAAE,MAAM;IAC3CoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACO,wBAAwB,CAAC,CAACgB,WAAW,CAAC,CAAC;IAC3D,CAAC,EAAC;IAEFH,IAAI,8CAAAM,MAAA,CAA8CrC,OAAO,CAACH,IAAI,8BAAAU,iBAAA,CAAc,aAAY;MACtF,IAAM4B,QAAQ,SAASxB,UAAU,CAACO,wBAAwB,CAAC;QACzDL,QAAQ,EAAEb,OAAO,CAACH,IAAI;QACtBC,KAAK,EAAEE,OAAO,CAACF,KAAK,GAAG,YAAY;QACnCgB,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,0EAA0E,eAAAxB,iBAAA,CAAE,aAAY;MAC3FyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAE,oBAAoB;UAC9Bf,KAAK,EAAE,gDAAgD;UACvDgB,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;EACJ,CAAC,CAAC;EAEFzC,QAAQ,CAAC,8BAA8B,EAAE,MAAM;IAC7CoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACQ,0BAA0B,CAAC,CAACe,WAAW,CAAC,CAAC;IAC7D,CAAC,EAAC;IAEFH,IAAI,6CAAAM,MAAA,CAA6CrC,OAAO,CAACH,IAAI,8BAAAU,iBAAA,CAAc,aAAY;MACrFyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAMH,QAAQ,SAASxB,UAAU,CAACQ,0BAA0B,CAAC;QAC3DN,QAAQ,EAAEb,OAAO,CAACH,IAAI;QACtBuB,OAAO,EAAE,GAAG;QACZC,MAAM,EAAE,UAAU;QAClBP,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,yEAAyE,eAAAxB,iBAAA,CAAE,aAAY;MAC1FyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAACQ,0BAA0B,CAAC;UAC1CN,QAAQ,EAAE,oBAAoB;UAC9BO,OAAO,EAAE,GAAG;UACZC,MAAM,EAAE,UAAU;UAClBP,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;EACJ,CAAC,CAAC;EAEFzC,QAAQ,CAAC,yBAAyB,EAAE,MAAM;IACxCoC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACiC,qBAAqB,CAAC,CAACV,WAAW,CAAC,CAAC;IACxD,CAAC,EAAC;IAEFH,IAAI,mCAAAM,MAAA,CAAmCrC,OAAO,CAACH,IAAI,8BAAAU,iBAAA,CAAc,aAAY;MAC3E,IAAM4B,QAAQ,SAASxB,UAAU,CAACiC,qBAAqB,CAAC;QACtD/B,QAAQ,EAAEb,OAAO,CAACH,IAAI;QACtBuB,OAAO,EAAE,GAAG;QACZN,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;AACJ,CAAC,CAAC"}
|
|
1
|
+
{"version":3,"file":"SecretsApi.test.js","names":["ctx","autoSetupPolly","describe","secret1","name","value","valueV2","valueV3","description","secret2","valueV4","secret3","secret4","encoding","placeholders","secret5","newValue","beforeAll","_asyncToGenerator","process","env","FRODO_POLLY_MODE","SecretsApi","getSecret","secretId","state","deleteSecret","error","putSecret","createNewVersionOfSecret","setStatusOfVersionOfSecret","version","status","afterAll","beforeEach","polly","server","any","on","_req","recording","filterRecording","test","expect","getSecrets","toBeDefined","response","toMatchSnapshot","concat","assertions","useInPlaceholders","setSecretDescription","getSecretVersions","getVersionOfSecret","deleteVersionOfSecret"],"sources":["../../../src/api/cloud/SecretsApi.test.ts"],"sourcesContent":["/**\n * To record and update snapshots, you must perform 3 steps in order:\n *\n * 1. Record API responses & update ESM snapshots\n *\n * To record and update ESM snapshots, you must call the test:record\n * script and override all the connection state variables required\n * to connect to the env to record from:\n *\n * FRODO_DEBUG=1 FRODO_HOST=frodo-dev npm run test:record SecretsApi\n *\n * The above command assumes that you have a connection profile for\n * 'volker-dev' on your development machine.\n *\n * 2. Update CJS snapshots\n *\n * After recording, the ESM snapshots will already be updated as that happens\n * in one go, but you musty manually update the CJS snapshots by running:\n *\n * FRODO_DEBUG=1 npm run test:update SecretsApi\n *\n * 3. Test your changes\n *\n * If 1 and 2 didn't produce any errors, you are ready to run the tests in\n * replay mode and make sure they all succeed as well:\n *\n * npm run test:only SecretsApi\n *\n * Note: FRODO_DEBUG=1 is optional and enables debug logging for some output\n * in case things don't function as expected\n */\nimport * as SecretsApi from './SecretsApi';\nimport { autoSetupPolly, filterRecording } from '../../utils/AutoSetupPolly';\nimport { state } from '../../index';\n\nconst ctx = autoSetupPolly();\n\ndescribe('SecretsApi', () => {\n const secret1 = {\n name: 'esv-frodo-test-secret1',\n value: 'RnJvZG8gVGVzdCBTZWNyZXQgT25lIFZhbHVl', // base64 encoded 'Frodo Test Secret One Value'\n valueV2: 'RnJvZG8gVGVzdCBTZWNyZXQgT25lIFZhbHVlIFZlcnNpb24gMg==', // base64 'Frodo Test Secret One Value Version 2'\n valueV3: 'RnJvZG8gVGVzdCBTZWNyZXQgT25lIFZhbHVlIFZlcnNpb24gMw==', // base64 'Frodo Test Secret One Value Version 3'\n description: 'Frodo Test Secret One Description',\n };\n const secret2 = {\n name: 'esv-frodo-test-secret2',\n value: 'RnJvZG8gVGVzdCBTZWNyZXQgVHdvIFZhbHVl', // base64 encoded 'Frodo Test Secret Two Value'\n valueV2: 'RnJvZG8gVGVzdCBTZWNyZXQgVHdvIFZhbHVlIFZlcnNpb24gMg==', // base64 'Frodo Test Secret Two Value Version 2'\n valueV3: 'RnJvZG8gVGVzdCBTZWNyZXQgVHdvIFZhbHVlIFZlcnNpb24gMw==', // base64 'Frodo Test Secret Two Value Version 3'\n valueV4: 'RnJvZG8gVGVzdCBTZWNyZXQgVHdvIFZhbHVlIFZlcnNpb24gNA==', // base64 encoded 'Frodo Test Secret Two Value Version 4'\n description: 'Frodo Test Secret Two Description',\n };\n const secret3 = {\n name: 'esv-frodo-test-secret3',\n value: 'RnJvZG8gVGVzdCBTZWNyZXQgVGhyZWUgVmFsdWU=', // base64 encoded 'Frodo Test Secret Three Value'\n description: 'Frodo Test Secret Three Description',\n };\n const secret4 = {\n name: 'esv-frodo-test-secret4',\n value: 'RnJvZG8gVGVzdCBTZWNyZXQgRm91ciBWYWx1ZQ==', // base64 encoded 'Frodo Test Secret Four Value'\n description: 'Frodo Test Secret Four Description',\n encoding: 'generic',\n placeholders: true,\n };\n const secret5 = {\n name: 'esv-frodo-test-secret5',\n value: `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`,\n newValue: `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`,\n description: 'Frodo Test PEM encoded Secret Five Description',\n encoding: 'pem',\n placeholders: true,\n };\n // in recording mode, setup test data before recording\n beforeAll(async () => {\n if (process.env.FRODO_POLLY_MODE === 'record') {\n // setup secret1 - delete if exists, then create\n try {\n await SecretsApi.getSecret({ secretId: secret1.name, state });\n await SecretsApi.deleteSecret({ secretId: secret1.name, state });\n } catch (error) {\n // ignore\n } finally {\n await SecretsApi.putSecret({\n secretId: secret1.name,\n value: secret1.value,\n description: secret1.description,\n state,\n });\n await SecretsApi.createNewVersionOfSecret({\n secretId: secret1.name,\n value: secret1.valueV2,\n state,\n });\n await SecretsApi.createNewVersionOfSecret({\n secretId: secret1.name,\n value: secret1.valueV3,\n state,\n });\n await SecretsApi.setStatusOfVersionOfSecret({\n secretId: secret1.name,\n version: '2',\n status: 'DISABLED',\n state,\n });\n }\n // setup secret2 - delete if exists, then create\n try {\n await SecretsApi.getSecret({ secretId: secret2.name, state });\n await SecretsApi.deleteSecret({ secretId: secret2.name, state });\n } catch (error) {\n // ignore\n } finally {\n await SecretsApi.putSecret({\n secretId: secret2.name,\n value: secret2.value,\n description: secret2.description,\n state,\n });\n await SecretsApi.createNewVersionOfSecret({\n secretId: secret2.name,\n value: secret2.valueV2,\n state,\n });\n await SecretsApi.createNewVersionOfSecret({\n secretId: secret2.name,\n value: secret2.valueV3,\n state,\n });\n }\n // setup secret3 - delete if exists, then create\n try {\n await SecretsApi.getSecret({ secretId: secret3.name, state });\n await SecretsApi.deleteSecret({ secretId: secret3.name, state });\n } catch (error) {\n // ignore\n } finally {\n await SecretsApi.putSecret({\n secretId: secret3.name,\n value: secret3.value,\n description: secret3.description,\n state,\n });\n }\n // setup secret4 - delete if exists\n try {\n await SecretsApi.getSecret({ secretId: secret4.name, state });\n await SecretsApi.deleteSecret({ secretId: secret4.name, state });\n } catch (error) {\n // ignore\n }\n // setup secret5 - delete if exists\n try {\n await SecretsApi.getSecret({ secretId: secret5.name, state });\n await SecretsApi.deleteSecret({ secretId: secret5.name, state });\n } catch (error) {\n // ignore\n }\n }\n });\n // in recording mode, remove test data after recording\n afterAll(async () => {\n if (process.env.FRODO_POLLY_MODE === 'record') {\n try {\n await SecretsApi.getSecret({ secretId: secret1.name, state });\n await SecretsApi.deleteSecret({ secretId: secret1.name, state });\n } catch (error) {\n // ignore\n }\n try {\n await SecretsApi.getSecret({ secretId: secret2.name, state });\n await SecretsApi.deleteSecret({ secretId: secret2.name, state });\n } catch (error) {\n // ignore\n }\n try {\n await SecretsApi.getSecret({ secretId: secret3.name, state });\n await SecretsApi.deleteSecret({ secretId: secret3.name, state });\n } catch (error) {\n // ignore\n }\n try {\n await SecretsApi.getSecret({ secretId: secret4.name, state });\n await SecretsApi.deleteSecret({ secretId: secret4.name, state });\n } catch (error) {\n // ignore\n }\n try {\n await SecretsApi.getSecret({ secretId: secret5.name, state });\n await SecretsApi.deleteSecret({ secretId: secret5.name, state });\n } catch (error) {\n // ignore\n }\n }\n });\n beforeEach(async () => {\n if (process.env.FRODO_POLLY_MODE === 'record') {\n ctx.polly.server.any().on('beforePersist', (_req, recording) => {\n filterRecording(recording);\n });\n }\n });\n\n describe('getSecrets()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.getSecrets).toBeDefined();\n });\n\n test('1: Get all secrets - success', async () => {\n const response = await SecretsApi.getSecrets({ state });\n expect(response).toMatchSnapshot();\n });\n });\n\n describe('getSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.getSecret).toBeDefined();\n });\n\n test(`1: Get existing secret: ${secret1.name}`, async () => {\n const response = await SecretsApi.getSecret({\n secretId: secret1.name,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Get non-existing secret: esv-does-not-exist', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.getSecret({\n secretId: 'esv-does-not-exist',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n });\n\n describe('putSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.putSecret).toBeDefined();\n });\n\n test(`1: Create secret: ${secret4.name} - success`, async () => {\n const response = await SecretsApi.putSecret({\n secretId: secret4.name,\n value: secret4.value,\n description: secret4.description,\n encoding: secret4.encoding,\n useInPlaceholders: secret4.placeholders,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test(`2: Create pem encoded secret: ${secret5.name} - success`, async () => {\n const response = await SecretsApi.putSecret({\n secretId: secret5.name,\n value: secret5.value,\n description: secret5.description,\n encoding: secret5.encoding,\n useInPlaceholders: secret5.placeholders,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n });\n\n describe('setSecretDescription()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.setSecretDescription).toBeDefined();\n });\n\n test(`1: Set existing secret's description: ${secret2.name} - success`, async () => {\n const response = await SecretsApi.setSecretDescription({\n secretId: secret2.name,\n description: 'Updated Frodo Test Secret Two Description',\n state,\n });\n expect(response).toMatchSnapshot();\n });\n });\n\n describe('deleteSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.deleteSecret).toBeDefined();\n });\n\n test(`1: Delete existing secret: ${secret3.name} - success`, async () => {\n const response = await SecretsApi.deleteSecret({\n secretId: secret3.name,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n });\n\n describe('getSecretVersions()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.getSecretVersions).toBeDefined();\n });\n\n test(`1: Get versions of existing secret: ${secret1.name}`, async () => {\n const response = await SecretsApi.getSecretVersions({\n secretId: secret1.name,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Get versions of non-existing secret: esv-does-not-exist', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.getSecretVersions({\n secretId: 'esv-does-not-exist',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n });\n\n describe('getVersionOfSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.getVersionOfSecret).toBeDefined();\n });\n\n test(`1: Get version 2 of existing secret: ${secret1.name}`, async () => {\n const response = await SecretsApi.getVersionOfSecret({\n secretId: secret1.name,\n version: '2',\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Get version 2 of non-existing secret: esv-does-not-exist', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.getVersionOfSecret({\n secretId: 'esv-does-not-exist',\n version: '2',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n });\n\n describe('createNewVersionOfSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.createNewVersionOfSecret).toBeDefined();\n });\n\n test(`1: Create new version of existing secret: ${secret2.name} - success`, async () => {\n const response = await SecretsApi.createNewVersionOfSecret({\n secretId: secret2.name,\n value: secret2.valueV4,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Create new version of non-existing secret: esv-does-not-exist - error', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.createNewVersionOfSecret({\n secretId: 'esv-does-not-exist',\n value: 'RnJvZG8gTm9uLUV4aXN0aW5nIFRlc3QgU2VjcmV0IFZhbHVlIFZlcnNpb24gMg==', // base64 encoded 'Frodo Non-Existing Test Secret Value Version 2',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n\n test(`3: Create new version of existing secret with pem encoding: ${secret5.name} - success`, async () => {\n const response = await SecretsApi.createNewVersionOfSecret({\n secretId: secret5.name,\n value: secret5.newValue,\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n });\n\n describe('setStatusOfVersionOfSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.setStatusOfVersionOfSecret).toBeDefined();\n });\n\n test(`1: Disable version 2 of existing secret: ${secret2.name} - success`, async () => {\n expect.assertions(1);\n const response = await SecretsApi.setStatusOfVersionOfSecret({\n secretId: secret2.name,\n version: '2',\n status: 'DISABLED',\n state,\n });\n expect(response).toMatchSnapshot();\n });\n\n test('2: Disable version 2 of non-existing secret: esv-does-not-exist - error', async () => {\n expect.assertions(1);\n try {\n await SecretsApi.setStatusOfVersionOfSecret({\n secretId: 'esv-does-not-exist',\n version: '2',\n status: 'DISABLED',\n state,\n });\n } catch (error) {\n expect(error).toMatchSnapshot();\n }\n });\n });\n\n describe('deleteVersionOfSecret()', () => {\n test('0: Method is implemented', async () => {\n expect(SecretsApi.deleteVersionOfSecret).toBeDefined();\n });\n\n test(`1: Delete version 1 of secret: ${secret2.name} - success`, async () => {\n const response = await SecretsApi.deleteVersionOfSecret({\n secretId: secret2.name,\n version: '1',\n state,\n });\n expect(response).toMatchSnapshot();\n });\n });\n});\n"],"mappings":";;;;;;;;sYAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AAKA,IAAMA,GAAG,GAAG,IAAAC,8BAAc,EAAC,CAAC;AAE5BC,QAAQ,CAAC,YAAY,EAAE,MAAM;EAC3B,IAAMC,OAAO,GAAG;IACdC,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,EAAE,sCAAsC;IAAE;IAC/CC,OAAO,EAAE,sDAAsD;IAAE;IACjEC,OAAO,EAAE,sDAAsD;IAAE;IACjEC,WAAW,EAAE;EACf,CAAC;EACD,IAAMC,OAAO,GAAG;IACdL,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,EAAE,sCAAsC;IAAE;IAC/CC,OAAO,EAAE,sDAAsD;IAAE;IACjEC,OAAO,EAAE,sDAAsD;IAAE;IACjEG,OAAO,EAAE,sDAAsD;IAAE;IACjEF,WAAW,EAAE;EACf,CAAC;EACD,IAAMG,OAAO,GAAG;IACdP,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,EAAE,0CAA0C;IAAE;IACnDG,WAAW,EAAE;EACf,CAAC;EACD,IAAMI,OAAO,GAAG;IACdR,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,EAAE,0CAA0C;IAAE;IACnDG,WAAW,EAAE,oCAAoC;IACjDK,QAAQ,EAAE,SAAS;IACnBC,YAAY,EAAE;EAChB,CAAC;EACD,IAAMC,OAAO,GAAG;IACdX,IAAI,EAAE,wBAAwB;IAC9BC,KAAK,ghCAAghC;IACrhCW,QAAQ,4pCAA4pC;IACpqCR,WAAW,EAAE,gDAAgD;IAC7DK,QAAQ,EAAE,KAAK;IACfC,YAAY,EAAE;EAChB,CAAC;EACD;EACAG,SAAS,eAAAC,iBAAA,CAAC,aAAY;IACpB,IAAIC,OAAO,CAACC,GAAG,CAACC,gBAAgB,KAAK,QAAQ,EAAE;MAC7C;MACA,IAAI;QACF,MAAMC,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAErB,OAAO,CAACC,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAErB,OAAO,CAACC,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA,CACD,SAAS;QACR,MAAML,UAAU,CAACM,SAAS,CAAC;UACzBJ,QAAQ,EAAErB,OAAO,CAACC,IAAI;UACtBC,KAAK,EAAEF,OAAO,CAACE,KAAK;UACpBG,WAAW,EAAEL,OAAO,CAACK,WAAW;UAChCiB,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAErB,OAAO,CAACC,IAAI;UACtBC,KAAK,EAAEF,OAAO,CAACG,OAAO;UACtBmB,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAErB,OAAO,CAACC,IAAI;UACtBC,KAAK,EAAEF,OAAO,CAACI,OAAO;UACtBkB,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACQ,0BAA0B,CAAC;UAC1CN,QAAQ,EAAErB,OAAO,CAACC,IAAI;UACtB2B,OAAO,EAAE,GAAG;UACZC,MAAM,EAAE,UAAU;UAClBP,KAAK,EAALA;QACF,CAAC,CAAC;MACJ;MACA;MACA,IAAI;QACF,MAAMH,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEf,OAAO,CAACL,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEf,OAAO,CAACL,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA,CACD,SAAS;QACR,MAAML,UAAU,CAACM,SAAS,CAAC;UACzBJ,QAAQ,EAAEf,OAAO,CAACL,IAAI;UACtBC,KAAK,EAAEI,OAAO,CAACJ,KAAK;UACpBG,WAAW,EAAEC,OAAO,CAACD,WAAW;UAChCiB,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAEf,OAAO,CAACL,IAAI;UACtBC,KAAK,EAAEI,OAAO,CAACH,OAAO;UACtBmB,KAAK,EAALA;QACF,CAAC,CAAC;QACF,MAAMH,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAEf,OAAO,CAACL,IAAI;UACtBC,KAAK,EAAEI,OAAO,CAACF,OAAO;UACtBkB,KAAK,EAALA;QACF,CAAC,CAAC;MACJ;MACA;MACA,IAAI;QACF,MAAMH,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEb,OAAO,CAACP,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEb,OAAO,CAACP,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA,CACD,SAAS;QACR,MAAML,UAAU,CAACM,SAAS,CAAC;UACzBJ,QAAQ,EAAEb,OAAO,CAACP,IAAI;UACtBC,KAAK,EAAEM,OAAO,CAACN,KAAK;UACpBG,WAAW,EAAEG,OAAO,CAACH,WAAW;UAChCiB,KAAK,EAALA;QACF,CAAC,CAAC;MACJ;MACA;MACA,IAAI;QACF,MAAMH,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEZ,OAAO,CAACR,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEZ,OAAO,CAACR,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF;MACA,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAET,OAAO,CAACX,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAET,OAAO,CAACX,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;IAEJ;EACF,CAAC,EAAC;EACF;EACAM,QAAQ,eAAAf,iBAAA,CAAC,aAAY;IACnB,IAAIC,OAAO,CAACC,GAAG,CAACC,gBAAgB,KAAK,QAAQ,EAAE;MAC7C,IAAI;QACF,MAAMC,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAErB,OAAO,CAACC,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAErB,OAAO,CAACC,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEf,OAAO,CAACL,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEf,OAAO,CAACL,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEb,OAAO,CAACP,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEb,OAAO,CAACP,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAEZ,OAAO,CAACR,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAEZ,OAAO,CAACR,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;MAEF,IAAI;QACF,MAAML,UAAU,CAACC,SAAS,CAAC;UAAEC,QAAQ,EAAET,OAAO,CAACX,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;QAC7D,MAAMH,UAAU,CAACI,YAAY,CAAC;UAAEF,QAAQ,EAAET,OAAO,CAACX,IAAI;UAAEqB,KAAK,EAALA;QAAM,CAAC,CAAC;MAClE,CAAC,CAAC,OAAOE,KAAK,EAAE;QACd;MAAA;IAEJ;EACF,CAAC,EAAC;EACFO,UAAU,eAAAhB,iBAAA,CAAC,aAAY;IACrB,IAAIC,OAAO,CAACC,GAAG,CAACC,gBAAgB,KAAK,QAAQ,EAAE;MAC7CrB,GAAG,CAACmC,KAAK,CAACC,MAAM,CAACC,GAAG,CAAC,CAAC,CAACC,EAAE,CAAC,eAAe,EAAE,CAACC,IAAI,EAAEC,SAAS,KAAK;QAC9D,IAAAC,+BAAe,EAACD,SAAS,CAAC;MAC5B,CAAC,CAAC;IACJ;EACF,CAAC,EAAC;EAEFtC,QAAQ,CAAC,cAAc,EAAE,MAAM;IAC7BwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACsB,UAAU,CAAC,CAACC,WAAW,CAAC,CAAC;IAC7C,CAAC,EAAC;IAEFH,IAAI,CAAC,8BAA8B,eAAAxB,iBAAA,CAAE,aAAY;MAC/C,IAAM4B,QAAQ,SAASxB,UAAU,CAACsB,UAAU,CAAC;QAAEnB,KAAK,EAALA;MAAM,CAAC,CAAC;MACvDkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;EAEF7C,QAAQ,CAAC,aAAa,EAAE,MAAM;IAC5BwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACC,SAAS,CAAC,CAACsB,WAAW,CAAC,CAAC;IAC5C,CAAC,EAAC;IAEFH,IAAI,4BAAAM,MAAA,CAA4B7C,OAAO,CAACC,IAAI,gBAAAc,iBAAA,CAAI,aAAY;MAC1D,IAAM4B,QAAQ,SAASxB,UAAU,CAACC,SAAS,CAAC;QAC1CC,QAAQ,EAAErB,OAAO,CAACC,IAAI;QACtBqB,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,gDAAgD,eAAAxB,iBAAA,CAAE,aAAY;MACjEyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAACC,SAAS,CAAC;UACzBC,QAAQ,EAAE,oBAAoB;UAC9BC,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;EACJ,CAAC,CAAC;EAEF7C,QAAQ,CAAC,aAAa,EAAE,MAAM;IAC5BwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACM,SAAS,CAAC,CAACiB,WAAW,CAAC,CAAC;IAC5C,CAAC,EAAC;IAEFH,IAAI,sBAAAM,MAAA,CAAsBpC,OAAO,CAACR,IAAI,8BAAAc,iBAAA,CAAc,aAAY;MAC9D,IAAM4B,QAAQ,SAASxB,UAAU,CAACM,SAAS,CAAC;QAC1CJ,QAAQ,EAAEZ,OAAO,CAACR,IAAI;QACtBC,KAAK,EAAEO,OAAO,CAACP,KAAK;QACpBG,WAAW,EAAEI,OAAO,CAACJ,WAAW;QAChCK,QAAQ,EAAED,OAAO,CAACC,QAAQ;QAC1BqC,iBAAiB,EAAEtC,OAAO,CAACE,YAAY;QACvCW,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,kCAAAM,MAAA,CAAkCjC,OAAO,CAACX,IAAI,8BAAAc,iBAAA,CAAc,aAAY;MAC1E,IAAM4B,QAAQ,SAASxB,UAAU,CAACM,SAAS,CAAC;QAC1CJ,QAAQ,EAAET,OAAO,CAACX,IAAI;QACtBC,KAAK,EAAEU,OAAO,CAACV,KAAK;QACpBG,WAAW,EAAEO,OAAO,CAACP,WAAW;QAChCK,QAAQ,EAAEE,OAAO,CAACF,QAAQ;QAC1BqC,iBAAiB,EAAEnC,OAAO,CAACD,YAAY;QACvCW,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;EAEF7C,QAAQ,CAAC,wBAAwB,EAAE,MAAM;IACvCwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAAC6B,oBAAoB,CAAC,CAACN,WAAW,CAAC,CAAC;IACvD,CAAC,EAAC;IAEFH,IAAI,0CAAAM,MAAA,CAA0CvC,OAAO,CAACL,IAAI,8BAAAc,iBAAA,CAAc,aAAY;MAClF,IAAM4B,QAAQ,SAASxB,UAAU,CAAC6B,oBAAoB,CAAC;QACrD3B,QAAQ,EAAEf,OAAO,CAACL,IAAI;QACtBI,WAAW,EAAE,2CAA2C;QACxDiB,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;EAEF7C,QAAQ,CAAC,gBAAgB,EAAE,MAAM;IAC/BwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACI,YAAY,CAAC,CAACmB,WAAW,CAAC,CAAC;IAC/C,CAAC,EAAC;IAEFH,IAAI,+BAAAM,MAAA,CAA+BrC,OAAO,CAACP,IAAI,8BAAAc,iBAAA,CAAc,aAAY;MACvE,IAAM4B,QAAQ,SAASxB,UAAU,CAACI,YAAY,CAAC;QAC7CF,QAAQ,EAAEb,OAAO,CAACP,IAAI;QACtBqB,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;EAEF7C,QAAQ,CAAC,qBAAqB,EAAE,MAAM;IACpCwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAAC8B,iBAAiB,CAAC,CAACP,WAAW,CAAC,CAAC;IACpD,CAAC,EAAC;IAEFH,IAAI,wCAAAM,MAAA,CAAwC7C,OAAO,CAACC,IAAI,gBAAAc,iBAAA,CAAI,aAAY;MACtE,IAAM4B,QAAQ,SAASxB,UAAU,CAAC8B,iBAAiB,CAAC;QAClD5B,QAAQ,EAAErB,OAAO,CAACC,IAAI;QACtBqB,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,4DAA4D,eAAAxB,iBAAA,CAAE,aAAY;MAC7EyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAAC8B,iBAAiB,CAAC;UACjC5B,QAAQ,EAAE,oBAAoB;UAC9BC,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;EACJ,CAAC,CAAC;EAEF7C,QAAQ,CAAC,sBAAsB,EAAE,MAAM;IACrCwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAAC+B,kBAAkB,CAAC,CAACR,WAAW,CAAC,CAAC;IACrD,CAAC,EAAC;IAEFH,IAAI,yCAAAM,MAAA,CAAyC7C,OAAO,CAACC,IAAI,gBAAAc,iBAAA,CAAI,aAAY;MACvE,IAAM4B,QAAQ,SAASxB,UAAU,CAAC+B,kBAAkB,CAAC;QACnD7B,QAAQ,EAAErB,OAAO,CAACC,IAAI;QACtB2B,OAAO,EAAE,GAAG;QACZN,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,6DAA6D,eAAAxB,iBAAA,CAAE,aAAY;MAC9EyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAAC+B,kBAAkB,CAAC;UAClC7B,QAAQ,EAAE,oBAAoB;UAC9BO,OAAO,EAAE,GAAG;UACZN,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;EACJ,CAAC,CAAC;EAEF7C,QAAQ,CAAC,4BAA4B,EAAE,MAAM;IAC3CwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACO,wBAAwB,CAAC,CAACgB,WAAW,CAAC,CAAC;IAC3D,CAAC,EAAC;IAEFH,IAAI,8CAAAM,MAAA,CAA8CvC,OAAO,CAACL,IAAI,8BAAAc,iBAAA,CAAc,aAAY;MACtF,IAAM4B,QAAQ,SAASxB,UAAU,CAACO,wBAAwB,CAAC;QACzDL,QAAQ,EAAEf,OAAO,CAACL,IAAI;QACtBC,KAAK,EAAEI,OAAO,CAACC,OAAO;QACtBe,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,0EAA0E,eAAAxB,iBAAA,CAAE,aAAY;MAC3FyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAACO,wBAAwB,CAAC;UACxCL,QAAQ,EAAE,oBAAoB;UAC9BnB,KAAK,EAAE,kEAAkE;UAAE;UAC3EoB,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;IAEFL,IAAI,gEAAAM,MAAA,CAAgEjC,OAAO,CAACX,IAAI,8BAAAc,iBAAA,CAAc,aAAY;MACxG,IAAM4B,QAAQ,SAASxB,UAAU,CAACO,wBAAwB,CAAC;QACzDL,QAAQ,EAAET,OAAO,CAACX,IAAI;QACtBC,KAAK,EAAEU,OAAO,CAACC,QAAQ;QACvBS,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EAEJ,CAAC,CAAC;EAEF7C,QAAQ,CAAC,8BAA8B,EAAE,MAAM;IAC7CwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACQ,0BAA0B,CAAC,CAACe,WAAW,CAAC,CAAC;IAC7D,CAAC,EAAC;IAEFH,IAAI,6CAAAM,MAAA,CAA6CvC,OAAO,CAACL,IAAI,8BAAAc,iBAAA,CAAc,aAAY;MACrFyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAMH,QAAQ,SAASxB,UAAU,CAACQ,0BAA0B,CAAC;QAC3DN,QAAQ,EAAEf,OAAO,CAACL,IAAI;QACtB2B,OAAO,EAAE,GAAG;QACZC,MAAM,EAAE,UAAU;QAClBP,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;IAEFL,IAAI,CAAC,yEAAyE,eAAAxB,iBAAA,CAAE,aAAY;MAC1FyB,MAAM,CAACM,UAAU,CAAC,CAAC,CAAC;MACpB,IAAI;QACF,MAAM3B,UAAU,CAACQ,0BAA0B,CAAC;UAC1CN,QAAQ,EAAE,oBAAoB;UAC9BO,OAAO,EAAE,GAAG;UACZC,MAAM,EAAE,UAAU;UAClBP,KAAK,EAALA;QACF,CAAC,CAAC;MACJ,CAAC,CAAC,OAAOE,KAAK,EAAE;QACdgB,MAAM,CAAChB,KAAK,CAAC,CAACoB,eAAe,CAAC,CAAC;MACjC;IACF,CAAC,EAAC;EACJ,CAAC,CAAC;EAEF7C,QAAQ,CAAC,yBAAyB,EAAE,MAAM;IACxCwC,IAAI,CAAC,0BAA0B,eAAAxB,iBAAA,CAAE,aAAY;MAC3CyB,MAAM,CAACrB,UAAU,CAACgC,qBAAqB,CAAC,CAACT,WAAW,CAAC,CAAC;IACxD,CAAC,EAAC;IAEFH,IAAI,mCAAAM,MAAA,CAAmCvC,OAAO,CAACL,IAAI,8BAAAc,iBAAA,CAAc,aAAY;MAC3E,IAAM4B,QAAQ,SAASxB,UAAU,CAACgC,qBAAqB,CAAC;QACtD9B,QAAQ,EAAEf,OAAO,CAACL,IAAI;QACtB2B,OAAO,EAAE,GAAG;QACZN,KAAK,EAALA;MACF,CAAC,CAAC;MACFkB,MAAM,CAACG,QAAQ,CAAC,CAACC,eAAe,CAAC,CAAC;IACpC,CAAC,EAAC;EACJ,CAAC,CAAC;AACJ,CAAC,CAAC"}
|
|
@@ -892,7 +892,11 @@ function scheduleAutoRefresh(forceLoginAsUser, autoRefresh, state) {
|
|
|
892
892
|
var expires = state.getDeploymentType() === _Constants.default.CLASSIC_DEPLOYMENT_TYPE_KEY ? (_state$getUserSession = state.getUserSessionTokenMeta()) === null || _state$getUserSession === void 0 ? void 0 : _state$getUserSession.expires : state.getUseBearerTokenForAmApis() ? (_state$getBearerToken = state.getBearerTokenMeta()) === null || _state$getBearerToken === void 0 ? void 0 : _state$getBearerToken.expires : Math.min((_state$getBearerToken2 = state.getBearerTokenMeta()) === null || _state$getBearerToken2 === void 0 ? void 0 : _state$getBearerToken2.expires, (_state$getUserSession2 = state.getUserSessionTokenMeta()) === null || _state$getUserSession2 === void 0 ? void 0 : _state$getUserSession2.expires);
|
|
893
893
|
var timeout = expires - Date.now() - 1000 * 25;
|
|
894
894
|
if (timeout < 1000 * 30) {
|
|
895
|
-
|
|
895
|
+
(0, _Console.debugMessage)({
|
|
896
|
+
message: "Timeout below threshold of 30 seconds (".concat(Math.ceil(timeout / 1000), "), resetting timeout to 10ms."),
|
|
897
|
+
state
|
|
898
|
+
});
|
|
899
|
+
if (timeout < 10) timeout = 10;
|
|
896
900
|
}
|
|
897
901
|
(0, _Console.debugMessage)({
|
|
898
902
|
message: "AuthenticateOps.scheduleAutoRefresh: set new timer [".concat(Math.floor(timeout / 1000), "s (").concat(new Date(timeout).getMinutes(), "m ").concat(new Date(timeout).getSeconds(), "s)]"),
|