@scupit/mcp-ecosystem 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/auth0/index.d.ts +3 -0
- package/dist/auth0/index.d.ts.map +1 -0
- package/dist/auth0/index.js +2 -0
- package/dist/auth0/index.js.map +1 -0
- package/dist/auth0/management-client.d.ts +78 -0
- package/dist/auth0/management-client.d.ts.map +1 -0
- package/dist/auth0/management-client.js +183 -0
- package/dist/auth0/management-client.js.map +1 -0
- package/dist/cli.d.ts +3 -0
- package/dist/cli.d.ts.map +1 -0
- package/dist/cli.js +150 -0
- package/dist/cli.js.map +1 -0
- package/dist/commands/add-scope.d.ts +9 -0
- package/dist/commands/add-scope.d.ts.map +1 -0
- package/dist/commands/add-scope.js +55 -0
- package/dist/commands/add-scope.js.map +1 -0
- package/dist/commands/generate-artifacts.d.ts +10 -0
- package/dist/commands/generate-artifacts.d.ts.map +1 -0
- package/dist/commands/generate-artifacts.js +91 -0
- package/dist/commands/generate-artifacts.js.map +1 -0
- package/dist/commands/grant-client.d.ts +12 -0
- package/dist/commands/grant-client.d.ts.map +1 -0
- package/dist/commands/grant-client.js +111 -0
- package/dist/commands/grant-client.js.map +1 -0
- package/dist/commands/index.d.ts +15 -0
- package/dist/commands/index.d.ts.map +1 -0
- package/dist/commands/index.js +8 -0
- package/dist/commands/index.js.map +1 -0
- package/dist/commands/reconcile-all.d.ts +10 -0
- package/dist/commands/reconcile-all.d.ts.map +1 -0
- package/dist/commands/reconcile-all.js +58 -0
- package/dist/commands/reconcile-all.js.map +1 -0
- package/dist/commands/reconcile-client.d.ts +11 -0
- package/dist/commands/reconcile-client.d.ts.map +1 -0
- package/dist/commands/reconcile-client.js +295 -0
- package/dist/commands/reconcile-client.js.map +1 -0
- package/dist/commands/reconcile-server.d.ts +18 -0
- package/dist/commands/reconcile-server.d.ts.map +1 -0
- package/dist/commands/reconcile-server.js +213 -0
- package/dist/commands/reconcile-server.js.map +1 -0
- package/dist/commands/verify-tenant.d.ts +10 -0
- package/dist/commands/verify-tenant.d.ts.map +1 -0
- package/dist/commands/verify-tenant.js +76 -0
- package/dist/commands/verify-tenant.js.map +1 -0
- package/dist/config/index.d.ts +3 -0
- package/dist/config/index.d.ts.map +1 -0
- package/dist/config/index.js +2 -0
- package/dist/config/index.js.map +1 -0
- package/dist/config/loader.d.ts +21 -0
- package/dist/config/loader.d.ts.map +1 -0
- package/dist/config/loader.js +181 -0
- package/dist/config/loader.js.map +1 -0
- package/dist/index.d.ts +9 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +7 -0
- package/dist/index.js.map +1 -0
- package/dist/mcp-runtime/auth-middleware.d.ts +27 -0
- package/dist/mcp-runtime/auth-middleware.d.ts.map +1 -0
- package/dist/mcp-runtime/auth-middleware.js +88 -0
- package/dist/mcp-runtime/auth-middleware.js.map +1 -0
- package/dist/mcp-runtime/index.d.ts +9 -0
- package/dist/mcp-runtime/index.d.ts.map +1 -0
- package/dist/mcp-runtime/index.js +5 -0
- package/dist/mcp-runtime/index.js.map +1 -0
- package/dist/mcp-runtime/protected-resource-metadata.d.ts +20 -0
- package/dist/mcp-runtime/protected-resource-metadata.d.ts.map +1 -0
- package/dist/mcp-runtime/protected-resource-metadata.js +30 -0
- package/dist/mcp-runtime/protected-resource-metadata.js.map +1 -0
- package/dist/mcp-runtime/token-validator.d.ts +32 -0
- package/dist/mcp-runtime/token-validator.d.ts.map +1 -0
- package/dist/mcp-runtime/token-validator.js +59 -0
- package/dist/mcp-runtime/token-validator.js.map +1 -0
- package/dist/mcp-runtime/www-authenticate.d.ts +19 -0
- package/dist/mcp-runtime/www-authenticate.d.ts.map +1 -0
- package/dist/mcp-runtime/www-authenticate.js +39 -0
- package/dist/mcp-runtime/www-authenticate.js.map +1 -0
- package/dist/mcp-server/create-server.d.ts +44 -0
- package/dist/mcp-server/create-server.d.ts.map +1 -0
- package/dist/mcp-server/create-server.js +73 -0
- package/dist/mcp-server/create-server.js.map +1 -0
- package/dist/mcp-server/index.d.ts +3 -0
- package/dist/mcp-server/index.d.ts.map +1 -0
- package/dist/mcp-server/index.js +2 -0
- package/dist/mcp-server/index.js.map +1 -0
- package/dist/types/auth0-responses.d.ts +46 -0
- package/dist/types/auth0-responses.d.ts.map +1 -0
- package/dist/types/auth0-responses.js +6 -0
- package/dist/types/auth0-responses.js.map +1 -0
- package/dist/types/client-config.d.ts +96 -0
- package/dist/types/client-config.d.ts.map +1 -0
- package/dist/types/client-config.js +32 -0
- package/dist/types/client-config.js.map +1 -0
- package/dist/types/client-descriptor.d.ts +45 -0
- package/dist/types/client-descriptor.d.ts.map +1 -0
- package/dist/types/client-descriptor.js +22 -0
- package/dist/types/client-descriptor.js.map +1 -0
- package/dist/types/ecosystem-config.d.ts +210 -0
- package/dist/types/ecosystem-config.d.ts.map +1 -0
- package/dist/types/ecosystem-config.js +64 -0
- package/dist/types/ecosystem-config.js.map +1 -0
- package/dist/types/index.d.ts +10 -0
- package/dist/types/index.d.ts.map +1 -0
- package/dist/types/index.js +5 -0
- package/dist/types/index.js.map +1 -0
- package/dist/types/server-config.d.ts +73 -0
- package/dist/types/server-config.d.ts.map +1 -0
- package/dist/types/server-config.js +30 -0
- package/dist/types/server-config.js.map +1 -0
- package/dist/utils/context.d.ts +19 -0
- package/dist/utils/context.d.ts.map +1 -0
- package/dist/utils/context.js +29 -0
- package/dist/utils/context.js.map +1 -0
- package/dist/utils/index.d.ts +4 -0
- package/dist/utils/index.d.ts.map +1 -0
- package/dist/utils/index.js +3 -0
- package/dist/utils/index.js.map +1 -0
- package/dist/utils/logger.d.ts +11 -0
- package/dist/utils/logger.d.ts.map +1 -0
- package/dist/utils/logger.js +29 -0
- package/dist/utils/logger.js.map +1 -0
- package/package.json +67 -0
|
@@ -0,0 +1,96 @@
|
|
|
1
|
+
import { z } from "zod";
|
|
2
|
+
export declare const ClientConfigSchema: z.ZodObject<{
|
|
3
|
+
client_key: z.ZodString;
|
|
4
|
+
display_name: z.ZodString;
|
|
5
|
+
descriptor: z.ZodOptional<z.ZodString>;
|
|
6
|
+
profile: z.ZodEnum<["native_interactive", "spa_interactive", "regular_web_interactive", "service_m2m"]>;
|
|
7
|
+
auth0: z.ZodObject<{
|
|
8
|
+
create_if_missing: z.ZodDefault<z.ZodBoolean>;
|
|
9
|
+
existing_client_id: z.ZodDefault<z.ZodNullable<z.ZodString>>;
|
|
10
|
+
}, "strip", z.ZodTypeAny, {
|
|
11
|
+
create_if_missing: boolean;
|
|
12
|
+
existing_client_id: string | null;
|
|
13
|
+
}, {
|
|
14
|
+
create_if_missing?: boolean | undefined;
|
|
15
|
+
existing_client_id?: string | null | undefined;
|
|
16
|
+
}>;
|
|
17
|
+
application_settings: z.ZodOptional<z.ZodObject<{
|
|
18
|
+
callback_urls: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
|
|
19
|
+
logout_urls: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
|
|
20
|
+
web_origins: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
|
|
21
|
+
token_endpoint_auth_method: z.ZodOptional<z.ZodEnum<["none", "client_secret_post", "client_secret_basic", "private_key_jwt"]>>;
|
|
22
|
+
}, "strip", z.ZodTypeAny, {
|
|
23
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
24
|
+
callback_urls?: string[] | undefined;
|
|
25
|
+
logout_urls?: string[] | undefined;
|
|
26
|
+
web_origins?: string[] | undefined;
|
|
27
|
+
}, {
|
|
28
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
29
|
+
callback_urls?: string[] | undefined;
|
|
30
|
+
logout_urls?: string[] | undefined;
|
|
31
|
+
web_origins?: string[] | undefined;
|
|
32
|
+
}>>;
|
|
33
|
+
credentials: z.ZodOptional<z.ZodObject<{
|
|
34
|
+
client_secret_env: z.ZodOptional<z.ZodString>;
|
|
35
|
+
}, "strip", z.ZodTypeAny, {
|
|
36
|
+
client_secret_env?: string | undefined;
|
|
37
|
+
}, {
|
|
38
|
+
client_secret_env?: string | undefined;
|
|
39
|
+
}>>;
|
|
40
|
+
token_settings: z.ZodOptional<z.ZodObject<{
|
|
41
|
+
use_refresh_tokens: z.ZodOptional<z.ZodBoolean>;
|
|
42
|
+
refresh_token_rotation: z.ZodOptional<z.ZodBoolean>;
|
|
43
|
+
}, "strip", z.ZodTypeAny, {
|
|
44
|
+
use_refresh_tokens?: boolean | undefined;
|
|
45
|
+
refresh_token_rotation?: boolean | undefined;
|
|
46
|
+
}, {
|
|
47
|
+
use_refresh_tokens?: boolean | undefined;
|
|
48
|
+
refresh_token_rotation?: boolean | undefined;
|
|
49
|
+
}>>;
|
|
50
|
+
}, "strip", z.ZodTypeAny, {
|
|
51
|
+
auth0: {
|
|
52
|
+
create_if_missing: boolean;
|
|
53
|
+
existing_client_id: string | null;
|
|
54
|
+
};
|
|
55
|
+
display_name: string;
|
|
56
|
+
profile: "native_interactive" | "spa_interactive" | "regular_web_interactive" | "service_m2m";
|
|
57
|
+
client_key: string;
|
|
58
|
+
descriptor?: string | undefined;
|
|
59
|
+
application_settings?: {
|
|
60
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
61
|
+
callback_urls?: string[] | undefined;
|
|
62
|
+
logout_urls?: string[] | undefined;
|
|
63
|
+
web_origins?: string[] | undefined;
|
|
64
|
+
} | undefined;
|
|
65
|
+
credentials?: {
|
|
66
|
+
client_secret_env?: string | undefined;
|
|
67
|
+
} | undefined;
|
|
68
|
+
token_settings?: {
|
|
69
|
+
use_refresh_tokens?: boolean | undefined;
|
|
70
|
+
refresh_token_rotation?: boolean | undefined;
|
|
71
|
+
} | undefined;
|
|
72
|
+
}, {
|
|
73
|
+
auth0: {
|
|
74
|
+
create_if_missing?: boolean | undefined;
|
|
75
|
+
existing_client_id?: string | null | undefined;
|
|
76
|
+
};
|
|
77
|
+
display_name: string;
|
|
78
|
+
profile: "native_interactive" | "spa_interactive" | "regular_web_interactive" | "service_m2m";
|
|
79
|
+
client_key: string;
|
|
80
|
+
descriptor?: string | undefined;
|
|
81
|
+
application_settings?: {
|
|
82
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
83
|
+
callback_urls?: string[] | undefined;
|
|
84
|
+
logout_urls?: string[] | undefined;
|
|
85
|
+
web_origins?: string[] | undefined;
|
|
86
|
+
} | undefined;
|
|
87
|
+
credentials?: {
|
|
88
|
+
client_secret_env?: string | undefined;
|
|
89
|
+
} | undefined;
|
|
90
|
+
token_settings?: {
|
|
91
|
+
use_refresh_tokens?: boolean | undefined;
|
|
92
|
+
refresh_token_rotation?: boolean | undefined;
|
|
93
|
+
} | undefined;
|
|
94
|
+
}>;
|
|
95
|
+
export type ClientConfig = z.infer<typeof ClientConfigSchema>;
|
|
96
|
+
//# sourceMappingURL=client-config.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"client-config.d.ts","sourceRoot":"","sources":["../../src/types/client-config.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAMxB,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EA4B7B,CAAC;AAEH,MAAM,MAAM,YAAY,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC"}
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
import { z } from "zod";
|
|
2
|
+
import { ClientProfileSchema, TokenEndpointAuthMethodSchema, } from "./ecosystem-config.js";
|
|
3
|
+
export const ClientConfigSchema = z.object({
|
|
4
|
+
client_key: z.string().min(1),
|
|
5
|
+
display_name: z.string().min(1),
|
|
6
|
+
descriptor: z.string().optional(),
|
|
7
|
+
profile: ClientProfileSchema,
|
|
8
|
+
auth0: z.object({
|
|
9
|
+
create_if_missing: z.boolean().default(true),
|
|
10
|
+
existing_client_id: z.string().nullable().default(null),
|
|
11
|
+
}),
|
|
12
|
+
application_settings: z
|
|
13
|
+
.object({
|
|
14
|
+
callback_urls: z.array(z.string()).optional(),
|
|
15
|
+
logout_urls: z.array(z.string()).optional(),
|
|
16
|
+
web_origins: z.array(z.string()).optional(),
|
|
17
|
+
token_endpoint_auth_method: TokenEndpointAuthMethodSchema.optional(),
|
|
18
|
+
})
|
|
19
|
+
.optional(),
|
|
20
|
+
credentials: z
|
|
21
|
+
.object({
|
|
22
|
+
client_secret_env: z.string().optional(),
|
|
23
|
+
})
|
|
24
|
+
.optional(),
|
|
25
|
+
token_settings: z
|
|
26
|
+
.object({
|
|
27
|
+
use_refresh_tokens: z.boolean().optional(),
|
|
28
|
+
refresh_token_rotation: z.boolean().optional(),
|
|
29
|
+
})
|
|
30
|
+
.optional(),
|
|
31
|
+
});
|
|
32
|
+
//# sourceMappingURL=client-config.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"client-config.js","sourceRoot":"","sources":["../../src/types/client-config.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AACxB,OAAO,EACL,mBAAmB,EACnB,6BAA6B,GAC9B,MAAM,uBAAuB,CAAC;AAE/B,MAAM,CAAC,MAAM,kBAAkB,GAAG,CAAC,CAAC,MAAM,CAAC;IACzC,UAAU,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IAC7B,YAAY,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IAC/B,UAAU,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,EAAE;IACjC,OAAO,EAAE,mBAAmB;IAC5B,KAAK,EAAE,CAAC,CAAC,MAAM,CAAC;QACd,iBAAiB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QAC5C,kBAAkB,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KACxD,CAAC;IACF,oBAAoB,EAAE,CAAC;SACpB,MAAM,CAAC;QACN,aAAa,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC7C,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC3C,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC3C,0BAA0B,EAAE,6BAA6B,CAAC,QAAQ,EAAE;KACrE,CAAC;SACD,QAAQ,EAAE;IACb,WAAW,EAAE,CAAC;SACX,MAAM,CAAC;QACN,iBAAiB,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,EAAE;KACzC,CAAC;SACD,QAAQ,EAAE;IACb,cAAc,EAAE,CAAC;SACd,MAAM,CAAC;QACN,kBAAkB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;QAC1C,sBAAsB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;KAC/C,CAAC;SACD,QAAQ,EAAE;CACd,CAAC,CAAC"}
|
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
import { z } from "zod";
|
|
2
|
+
export declare const ReusePolicySchema: z.ZodEnum<["share_if_exact_match", "patch_if_safe", "never_share"]>;
|
|
3
|
+
export type ReusePolicy = z.infer<typeof ReusePolicySchema>;
|
|
4
|
+
export declare const ClientDescriptorSchema: z.ZodObject<{
|
|
5
|
+
descriptor_key: z.ZodString;
|
|
6
|
+
display_name: z.ZodString;
|
|
7
|
+
profile: z.ZodEnum<["native_interactive", "spa_interactive", "regular_web_interactive", "service_m2m"]>;
|
|
8
|
+
access_mode: z.ZodEnum<["user", "machine"]>;
|
|
9
|
+
supports_pkce: z.ZodOptional<z.ZodBoolean>;
|
|
10
|
+
supports_device_flow: z.ZodOptional<z.ZodBoolean>;
|
|
11
|
+
requires_refresh_tokens: z.ZodOptional<z.ZodBoolean>;
|
|
12
|
+
requires_refresh_token_rotation: z.ZodOptional<z.ZodBoolean>;
|
|
13
|
+
callback_urls: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
|
|
14
|
+
logout_urls: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
|
|
15
|
+
web_origins: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
|
|
16
|
+
reuse_policy: z.ZodDefault<z.ZodEnum<["share_if_exact_match", "patch_if_safe", "never_share"]>>;
|
|
17
|
+
}, "strip", z.ZodTypeAny, {
|
|
18
|
+
access_mode: "user" | "machine";
|
|
19
|
+
descriptor_key: string;
|
|
20
|
+
display_name: string;
|
|
21
|
+
profile: "native_interactive" | "spa_interactive" | "regular_web_interactive" | "service_m2m";
|
|
22
|
+
reuse_policy: "share_if_exact_match" | "patch_if_safe" | "never_share";
|
|
23
|
+
supports_pkce?: boolean | undefined;
|
|
24
|
+
supports_device_flow?: boolean | undefined;
|
|
25
|
+
requires_refresh_tokens?: boolean | undefined;
|
|
26
|
+
requires_refresh_token_rotation?: boolean | undefined;
|
|
27
|
+
callback_urls?: string[] | undefined;
|
|
28
|
+
logout_urls?: string[] | undefined;
|
|
29
|
+
web_origins?: string[] | undefined;
|
|
30
|
+
}, {
|
|
31
|
+
access_mode: "user" | "machine";
|
|
32
|
+
descriptor_key: string;
|
|
33
|
+
display_name: string;
|
|
34
|
+
profile: "native_interactive" | "spa_interactive" | "regular_web_interactive" | "service_m2m";
|
|
35
|
+
supports_pkce?: boolean | undefined;
|
|
36
|
+
supports_device_flow?: boolean | undefined;
|
|
37
|
+
requires_refresh_tokens?: boolean | undefined;
|
|
38
|
+
requires_refresh_token_rotation?: boolean | undefined;
|
|
39
|
+
callback_urls?: string[] | undefined;
|
|
40
|
+
logout_urls?: string[] | undefined;
|
|
41
|
+
web_origins?: string[] | undefined;
|
|
42
|
+
reuse_policy?: "share_if_exact_match" | "patch_if_safe" | "never_share" | undefined;
|
|
43
|
+
}>;
|
|
44
|
+
export type ClientDescriptor = z.infer<typeof ClientDescriptorSchema>;
|
|
45
|
+
//# sourceMappingURL=client-descriptor.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"client-descriptor.d.ts","sourceRoot":"","sources":["../../src/types/client-descriptor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAGxB,eAAO,MAAM,iBAAiB,qEAI5B,CAAC;AACH,MAAM,MAAM,WAAW,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,iBAAiB,CAAC,CAAC;AAE5D,eAAO,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAajC,CAAC;AAEH,MAAM,MAAM,gBAAgB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC"}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
import { z } from "zod";
|
|
2
|
+
import { AccessModeSchema, ClientProfileSchema } from "./ecosystem-config.js";
|
|
3
|
+
export const ReusePolicySchema = z.enum([
|
|
4
|
+
"share_if_exact_match",
|
|
5
|
+
"patch_if_safe",
|
|
6
|
+
"never_share",
|
|
7
|
+
]);
|
|
8
|
+
export const ClientDescriptorSchema = z.object({
|
|
9
|
+
descriptor_key: z.string().min(1),
|
|
10
|
+
display_name: z.string().min(1),
|
|
11
|
+
profile: ClientProfileSchema,
|
|
12
|
+
access_mode: AccessModeSchema,
|
|
13
|
+
supports_pkce: z.boolean().optional(),
|
|
14
|
+
supports_device_flow: z.boolean().optional(),
|
|
15
|
+
requires_refresh_tokens: z.boolean().optional(),
|
|
16
|
+
requires_refresh_token_rotation: z.boolean().optional(),
|
|
17
|
+
callback_urls: z.array(z.string()).optional(),
|
|
18
|
+
logout_urls: z.array(z.string()).optional(),
|
|
19
|
+
web_origins: z.array(z.string()).optional(),
|
|
20
|
+
reuse_policy: ReusePolicySchema.default("share_if_exact_match"),
|
|
21
|
+
});
|
|
22
|
+
//# sourceMappingURL=client-descriptor.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"client-descriptor.js","sourceRoot":"","sources":["../../src/types/client-descriptor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AACxB,OAAO,EAAE,gBAAgB,EAAE,mBAAmB,EAAE,MAAM,uBAAuB,CAAC;AAE9E,MAAM,CAAC,MAAM,iBAAiB,GAAG,CAAC,CAAC,IAAI,CAAC;IACtC,sBAAsB;IACtB,eAAe;IACf,aAAa;CACd,CAAC,CAAC;AAGH,MAAM,CAAC,MAAM,sBAAsB,GAAG,CAAC,CAAC,MAAM,CAAC;IAC7C,cAAc,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IACjC,YAAY,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IAC/B,OAAO,EAAE,mBAAmB;IAC5B,WAAW,EAAE,gBAAgB;IAC7B,aAAa,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;IACrC,oBAAoB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;IAC5C,uBAAuB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;IAC/C,+BAA+B,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;IACvD,aAAa,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;IAC7C,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;IAC3C,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;IAC3C,YAAY,EAAE,iBAAiB,CAAC,OAAO,CAAC,sBAAsB,CAAC;CAChE,CAAC,CAAC"}
|
|
@@ -0,0 +1,210 @@
|
|
|
1
|
+
import { z } from "zod";
|
|
2
|
+
export declare const ClientProfileSchema: z.ZodEnum<["native_interactive", "spa_interactive", "regular_web_interactive", "service_m2m"]>;
|
|
3
|
+
export type ClientProfile = z.infer<typeof ClientProfileSchema>;
|
|
4
|
+
export declare const AccessModeSchema: z.ZodEnum<["user", "machine"]>;
|
|
5
|
+
export type AccessMode = z.infer<typeof AccessModeSchema>;
|
|
6
|
+
export declare const GrantStrategySchema: z.ZodEnum<["authorization_code_pkce", "authorization_code", "client_credentials"]>;
|
|
7
|
+
export type GrantStrategy = z.infer<typeof GrantStrategySchema>;
|
|
8
|
+
export declare const TokenEndpointAuthMethodSchema: z.ZodEnum<["none", "client_secret_post", "client_secret_basic", "private_key_jwt"]>;
|
|
9
|
+
export type TokenEndpointAuthMethod = z.infer<typeof TokenEndpointAuthMethodSchema>;
|
|
10
|
+
export declare const UserAccessPolicySchema: z.ZodEnum<["require_client_grant", "allow_all"]>;
|
|
11
|
+
export type UserAccessPolicy = z.infer<typeof UserAccessPolicySchema>;
|
|
12
|
+
export declare const ClientAccessPolicySchema: z.ZodEnum<["deny_all", "require_client_grant"]>;
|
|
13
|
+
export type ClientAccessPolicy = z.infer<typeof ClientAccessPolicySchema>;
|
|
14
|
+
declare const ClientProfileDefinitionSchema: z.ZodObject<{
|
|
15
|
+
application_type: z.ZodEnum<["native", "spa", "regular_web", "m2m"]>;
|
|
16
|
+
access_mode: z.ZodEnum<["user", "machine"]>;
|
|
17
|
+
grant_strategy: z.ZodEnum<["authorization_code_pkce", "authorization_code", "client_credentials"]>;
|
|
18
|
+
token_endpoint_auth_method: z.ZodOptional<z.ZodEnum<["none", "client_secret_post", "client_secret_basic", "private_key_jwt"]>>;
|
|
19
|
+
use_refresh_tokens: z.ZodOptional<z.ZodBoolean>;
|
|
20
|
+
refresh_token_rotation: z.ZodOptional<z.ZodBoolean>;
|
|
21
|
+
}, "strip", z.ZodTypeAny, {
|
|
22
|
+
application_type: "native" | "spa" | "regular_web" | "m2m";
|
|
23
|
+
access_mode: "user" | "machine";
|
|
24
|
+
grant_strategy: "authorization_code_pkce" | "authorization_code" | "client_credentials";
|
|
25
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
26
|
+
use_refresh_tokens?: boolean | undefined;
|
|
27
|
+
refresh_token_rotation?: boolean | undefined;
|
|
28
|
+
}, {
|
|
29
|
+
application_type: "native" | "spa" | "regular_web" | "m2m";
|
|
30
|
+
access_mode: "user" | "machine";
|
|
31
|
+
grant_strategy: "authorization_code_pkce" | "authorization_code" | "client_credentials";
|
|
32
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
33
|
+
use_refresh_tokens?: boolean | undefined;
|
|
34
|
+
refresh_token_rotation?: boolean | undefined;
|
|
35
|
+
}>;
|
|
36
|
+
export type ClientProfileDefinition = z.infer<typeof ClientProfileDefinitionSchema>;
|
|
37
|
+
export declare const EcosystemConfigSchema: z.ZodObject<{
|
|
38
|
+
schema_version: z.ZodLiteral<1>;
|
|
39
|
+
ecosystem_name: z.ZodString;
|
|
40
|
+
domain: z.ZodObject<{
|
|
41
|
+
base_domain: z.ZodString;
|
|
42
|
+
server_host_pattern: z.ZodString;
|
|
43
|
+
}, "strip", z.ZodTypeAny, {
|
|
44
|
+
base_domain: string;
|
|
45
|
+
server_host_pattern: string;
|
|
46
|
+
}, {
|
|
47
|
+
base_domain: string;
|
|
48
|
+
server_host_pattern: string;
|
|
49
|
+
}>;
|
|
50
|
+
auth0: z.ZodObject<{
|
|
51
|
+
tenant_domain: z.ZodString;
|
|
52
|
+
management_audience: z.ZodString;
|
|
53
|
+
management_client_id_env: z.ZodString;
|
|
54
|
+
management_client_secret_env: z.ZodString;
|
|
55
|
+
verify_tenant_prerequisites: z.ZodDefault<z.ZodBoolean>;
|
|
56
|
+
}, "strip", z.ZodTypeAny, {
|
|
57
|
+
tenant_domain: string;
|
|
58
|
+
management_audience: string;
|
|
59
|
+
management_client_id_env: string;
|
|
60
|
+
management_client_secret_env: string;
|
|
61
|
+
verify_tenant_prerequisites: boolean;
|
|
62
|
+
}, {
|
|
63
|
+
tenant_domain: string;
|
|
64
|
+
management_audience: string;
|
|
65
|
+
management_client_id_env: string;
|
|
66
|
+
management_client_secret_env: string;
|
|
67
|
+
verify_tenant_prerequisites?: boolean | undefined;
|
|
68
|
+
}>;
|
|
69
|
+
defaults: z.ZodObject<{
|
|
70
|
+
api: z.ZodObject<{
|
|
71
|
+
signing_alg: z.ZodDefault<z.ZodString>;
|
|
72
|
+
token_dialect: z.ZodDefault<z.ZodString>;
|
|
73
|
+
user_access_policy: z.ZodDefault<z.ZodEnum<["require_client_grant", "allow_all"]>>;
|
|
74
|
+
client_access_policy: z.ZodDefault<z.ZodEnum<["deny_all", "require_client_grant"]>>;
|
|
75
|
+
}, "strip", z.ZodTypeAny, {
|
|
76
|
+
signing_alg: string;
|
|
77
|
+
token_dialect: string;
|
|
78
|
+
user_access_policy: "require_client_grant" | "allow_all";
|
|
79
|
+
client_access_policy: "require_client_grant" | "deny_all";
|
|
80
|
+
}, {
|
|
81
|
+
signing_alg?: string | undefined;
|
|
82
|
+
token_dialect?: string | undefined;
|
|
83
|
+
user_access_policy?: "require_client_grant" | "allow_all" | undefined;
|
|
84
|
+
client_access_policy?: "require_client_grant" | "deny_all" | undefined;
|
|
85
|
+
}>;
|
|
86
|
+
scope_profiles: z.ZodRecord<z.ZodString, z.ZodArray<z.ZodString, "many">>;
|
|
87
|
+
client_profiles: z.ZodOptional<z.ZodRecord<z.ZodEnum<["native_interactive", "spa_interactive", "regular_web_interactive", "service_m2m"]>, z.ZodObject<{
|
|
88
|
+
application_type: z.ZodEnum<["native", "spa", "regular_web", "m2m"]>;
|
|
89
|
+
access_mode: z.ZodEnum<["user", "machine"]>;
|
|
90
|
+
grant_strategy: z.ZodEnum<["authorization_code_pkce", "authorization_code", "client_credentials"]>;
|
|
91
|
+
token_endpoint_auth_method: z.ZodOptional<z.ZodEnum<["none", "client_secret_post", "client_secret_basic", "private_key_jwt"]>>;
|
|
92
|
+
use_refresh_tokens: z.ZodOptional<z.ZodBoolean>;
|
|
93
|
+
refresh_token_rotation: z.ZodOptional<z.ZodBoolean>;
|
|
94
|
+
}, "strip", z.ZodTypeAny, {
|
|
95
|
+
application_type: "native" | "spa" | "regular_web" | "m2m";
|
|
96
|
+
access_mode: "user" | "machine";
|
|
97
|
+
grant_strategy: "authorization_code_pkce" | "authorization_code" | "client_credentials";
|
|
98
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
99
|
+
use_refresh_tokens?: boolean | undefined;
|
|
100
|
+
refresh_token_rotation?: boolean | undefined;
|
|
101
|
+
}, {
|
|
102
|
+
application_type: "native" | "spa" | "regular_web" | "m2m";
|
|
103
|
+
access_mode: "user" | "machine";
|
|
104
|
+
grant_strategy: "authorization_code_pkce" | "authorization_code" | "client_credentials";
|
|
105
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
106
|
+
use_refresh_tokens?: boolean | undefined;
|
|
107
|
+
refresh_token_rotation?: boolean | undefined;
|
|
108
|
+
}>>>;
|
|
109
|
+
}, "strip", z.ZodTypeAny, {
|
|
110
|
+
api: {
|
|
111
|
+
signing_alg: string;
|
|
112
|
+
token_dialect: string;
|
|
113
|
+
user_access_policy: "require_client_grant" | "allow_all";
|
|
114
|
+
client_access_policy: "require_client_grant" | "deny_all";
|
|
115
|
+
};
|
|
116
|
+
scope_profiles: Record<string, string[]>;
|
|
117
|
+
client_profiles?: Partial<Record<"native_interactive" | "spa_interactive" | "regular_web_interactive" | "service_m2m", {
|
|
118
|
+
application_type: "native" | "spa" | "regular_web" | "m2m";
|
|
119
|
+
access_mode: "user" | "machine";
|
|
120
|
+
grant_strategy: "authorization_code_pkce" | "authorization_code" | "client_credentials";
|
|
121
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
122
|
+
use_refresh_tokens?: boolean | undefined;
|
|
123
|
+
refresh_token_rotation?: boolean | undefined;
|
|
124
|
+
}>> | undefined;
|
|
125
|
+
}, {
|
|
126
|
+
api: {
|
|
127
|
+
signing_alg?: string | undefined;
|
|
128
|
+
token_dialect?: string | undefined;
|
|
129
|
+
user_access_policy?: "require_client_grant" | "allow_all" | undefined;
|
|
130
|
+
client_access_policy?: "require_client_grant" | "deny_all" | undefined;
|
|
131
|
+
};
|
|
132
|
+
scope_profiles: Record<string, string[]>;
|
|
133
|
+
client_profiles?: Partial<Record<"native_interactive" | "spa_interactive" | "regular_web_interactive" | "service_m2m", {
|
|
134
|
+
application_type: "native" | "spa" | "regular_web" | "m2m";
|
|
135
|
+
access_mode: "user" | "machine";
|
|
136
|
+
grant_strategy: "authorization_code_pkce" | "authorization_code" | "client_credentials";
|
|
137
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
138
|
+
use_refresh_tokens?: boolean | undefined;
|
|
139
|
+
refresh_token_rotation?: boolean | undefined;
|
|
140
|
+
}>> | undefined;
|
|
141
|
+
}>;
|
|
142
|
+
client_groups: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodArray<z.ZodString, "many">>>;
|
|
143
|
+
}, "strip", z.ZodTypeAny, {
|
|
144
|
+
schema_version: 1;
|
|
145
|
+
ecosystem_name: string;
|
|
146
|
+
domain: {
|
|
147
|
+
base_domain: string;
|
|
148
|
+
server_host_pattern: string;
|
|
149
|
+
};
|
|
150
|
+
auth0: {
|
|
151
|
+
tenant_domain: string;
|
|
152
|
+
management_audience: string;
|
|
153
|
+
management_client_id_env: string;
|
|
154
|
+
management_client_secret_env: string;
|
|
155
|
+
verify_tenant_prerequisites: boolean;
|
|
156
|
+
};
|
|
157
|
+
defaults: {
|
|
158
|
+
api: {
|
|
159
|
+
signing_alg: string;
|
|
160
|
+
token_dialect: string;
|
|
161
|
+
user_access_policy: "require_client_grant" | "allow_all";
|
|
162
|
+
client_access_policy: "require_client_grant" | "deny_all";
|
|
163
|
+
};
|
|
164
|
+
scope_profiles: Record<string, string[]>;
|
|
165
|
+
client_profiles?: Partial<Record<"native_interactive" | "spa_interactive" | "regular_web_interactive" | "service_m2m", {
|
|
166
|
+
application_type: "native" | "spa" | "regular_web" | "m2m";
|
|
167
|
+
access_mode: "user" | "machine";
|
|
168
|
+
grant_strategy: "authorization_code_pkce" | "authorization_code" | "client_credentials";
|
|
169
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
170
|
+
use_refresh_tokens?: boolean | undefined;
|
|
171
|
+
refresh_token_rotation?: boolean | undefined;
|
|
172
|
+
}>> | undefined;
|
|
173
|
+
};
|
|
174
|
+
client_groups?: Record<string, string[]> | undefined;
|
|
175
|
+
}, {
|
|
176
|
+
schema_version: 1;
|
|
177
|
+
ecosystem_name: string;
|
|
178
|
+
domain: {
|
|
179
|
+
base_domain: string;
|
|
180
|
+
server_host_pattern: string;
|
|
181
|
+
};
|
|
182
|
+
auth0: {
|
|
183
|
+
tenant_domain: string;
|
|
184
|
+
management_audience: string;
|
|
185
|
+
management_client_id_env: string;
|
|
186
|
+
management_client_secret_env: string;
|
|
187
|
+
verify_tenant_prerequisites?: boolean | undefined;
|
|
188
|
+
};
|
|
189
|
+
defaults: {
|
|
190
|
+
api: {
|
|
191
|
+
signing_alg?: string | undefined;
|
|
192
|
+
token_dialect?: string | undefined;
|
|
193
|
+
user_access_policy?: "require_client_grant" | "allow_all" | undefined;
|
|
194
|
+
client_access_policy?: "require_client_grant" | "deny_all" | undefined;
|
|
195
|
+
};
|
|
196
|
+
scope_profiles: Record<string, string[]>;
|
|
197
|
+
client_profiles?: Partial<Record<"native_interactive" | "spa_interactive" | "regular_web_interactive" | "service_m2m", {
|
|
198
|
+
application_type: "native" | "spa" | "regular_web" | "m2m";
|
|
199
|
+
access_mode: "user" | "machine";
|
|
200
|
+
grant_strategy: "authorization_code_pkce" | "authorization_code" | "client_credentials";
|
|
201
|
+
token_endpoint_auth_method?: "none" | "client_secret_post" | "client_secret_basic" | "private_key_jwt" | undefined;
|
|
202
|
+
use_refresh_tokens?: boolean | undefined;
|
|
203
|
+
refresh_token_rotation?: boolean | undefined;
|
|
204
|
+
}>> | undefined;
|
|
205
|
+
};
|
|
206
|
+
client_groups?: Record<string, string[]> | undefined;
|
|
207
|
+
}>;
|
|
208
|
+
export type EcosystemConfig = z.infer<typeof EcosystemConfigSchema>;
|
|
209
|
+
export {};
|
|
210
|
+
//# sourceMappingURL=ecosystem-config.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ecosystem-config.d.ts","sourceRoot":"","sources":["../../src/types/ecosystem-config.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAExB,eAAO,MAAM,mBAAmB,gGAK9B,CAAC;AAEH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,mBAAmB,CAAC,CAAC;AAEhE,eAAO,MAAM,gBAAgB,gCAA8B,CAAC;AAC5D,MAAM,MAAM,UAAU,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,gBAAgB,CAAC,CAAC;AAE1D,eAAO,MAAM,mBAAmB,oFAI9B,CAAC;AACH,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,mBAAmB,CAAC,CAAC;AAEhE,eAAO,MAAM,6BAA6B,qFAKxC,CAAC;AACH,MAAM,MAAM,uBAAuB,GAAG,CAAC,CAAC,KAAK,CAC3C,OAAO,6BAA6B,CACrC,CAAC;AAEF,eAAO,MAAM,sBAAsB,kDAGjC,CAAC;AACH,MAAM,MAAM,gBAAgB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC;AAEtE,eAAO,MAAM,wBAAwB,iDAGnC,CAAC;AACH,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,wBAAwB,CAAC,CAAC;AAE1E,QAAA,MAAM,6BAA6B;;;;;;;;;;;;;;;;;;;;;EAOjC,CAAC;AAEH,MAAM,MAAM,uBAAuB,GAAG,CAAC,CAAC,KAAK,CAC3C,OAAO,6BAA6B,CACrC,CAAC;AAEF,eAAO,MAAM,qBAAqB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EA6BhC,CAAC;AAEH,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC"}
|
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
import { z } from "zod";
|
|
2
|
+
export const ClientProfileSchema = z.enum([
|
|
3
|
+
"native_interactive",
|
|
4
|
+
"spa_interactive",
|
|
5
|
+
"regular_web_interactive",
|
|
6
|
+
"service_m2m",
|
|
7
|
+
]);
|
|
8
|
+
export const AccessModeSchema = z.enum(["user", "machine"]);
|
|
9
|
+
export const GrantStrategySchema = z.enum([
|
|
10
|
+
"authorization_code_pkce",
|
|
11
|
+
"authorization_code",
|
|
12
|
+
"client_credentials",
|
|
13
|
+
]);
|
|
14
|
+
export const TokenEndpointAuthMethodSchema = z.enum([
|
|
15
|
+
"none",
|
|
16
|
+
"client_secret_post",
|
|
17
|
+
"client_secret_basic",
|
|
18
|
+
"private_key_jwt",
|
|
19
|
+
]);
|
|
20
|
+
export const UserAccessPolicySchema = z.enum([
|
|
21
|
+
"require_client_grant",
|
|
22
|
+
"allow_all",
|
|
23
|
+
]);
|
|
24
|
+
export const ClientAccessPolicySchema = z.enum([
|
|
25
|
+
"deny_all",
|
|
26
|
+
"require_client_grant",
|
|
27
|
+
]);
|
|
28
|
+
const ClientProfileDefinitionSchema = z.object({
|
|
29
|
+
application_type: z.enum(["native", "spa", "regular_web", "m2m"]),
|
|
30
|
+
access_mode: AccessModeSchema,
|
|
31
|
+
grant_strategy: GrantStrategySchema,
|
|
32
|
+
token_endpoint_auth_method: TokenEndpointAuthMethodSchema.optional(),
|
|
33
|
+
use_refresh_tokens: z.boolean().optional(),
|
|
34
|
+
refresh_token_rotation: z.boolean().optional(),
|
|
35
|
+
});
|
|
36
|
+
export const EcosystemConfigSchema = z.object({
|
|
37
|
+
schema_version: z.literal(1),
|
|
38
|
+
ecosystem_name: z.string().min(1),
|
|
39
|
+
domain: z.object({
|
|
40
|
+
base_domain: z.string().min(1),
|
|
41
|
+
server_host_pattern: z.string().min(1),
|
|
42
|
+
}),
|
|
43
|
+
auth0: z.object({
|
|
44
|
+
tenant_domain: z.string().min(1),
|
|
45
|
+
management_audience: z.string().url(),
|
|
46
|
+
management_client_id_env: z.string().min(1),
|
|
47
|
+
management_client_secret_env: z.string().min(1),
|
|
48
|
+
verify_tenant_prerequisites: z.boolean().default(true),
|
|
49
|
+
}),
|
|
50
|
+
defaults: z.object({
|
|
51
|
+
api: z.object({
|
|
52
|
+
signing_alg: z.string().default("RS256"),
|
|
53
|
+
token_dialect: z.string().default("rfc9068_profile_authz"),
|
|
54
|
+
user_access_policy: UserAccessPolicySchema.default("require_client_grant"),
|
|
55
|
+
client_access_policy: ClientAccessPolicySchema.default("deny_all"),
|
|
56
|
+
}),
|
|
57
|
+
scope_profiles: z.record(z.string(), z.array(z.string())),
|
|
58
|
+
client_profiles: z
|
|
59
|
+
.record(ClientProfileSchema, ClientProfileDefinitionSchema)
|
|
60
|
+
.optional(),
|
|
61
|
+
}),
|
|
62
|
+
client_groups: z.record(z.string(), z.array(z.string())).optional(),
|
|
63
|
+
});
|
|
64
|
+
//# sourceMappingURL=ecosystem-config.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ecosystem-config.js","sourceRoot":"","sources":["../../src/types/ecosystem-config.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAExB,MAAM,CAAC,MAAM,mBAAmB,GAAG,CAAC,CAAC,IAAI,CAAC;IACxC,oBAAoB;IACpB,iBAAiB;IACjB,yBAAyB;IACzB,aAAa;CACd,CAAC,CAAC;AAIH,MAAM,CAAC,MAAM,gBAAgB,GAAG,CAAC,CAAC,IAAI,CAAC,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC,CAAC;AAG5D,MAAM,CAAC,MAAM,mBAAmB,GAAG,CAAC,CAAC,IAAI,CAAC;IACxC,yBAAyB;IACzB,oBAAoB;IACpB,oBAAoB;CACrB,CAAC,CAAC;AAGH,MAAM,CAAC,MAAM,6BAA6B,GAAG,CAAC,CAAC,IAAI,CAAC;IAClD,MAAM;IACN,oBAAoB;IACpB,qBAAqB;IACrB,iBAAiB;CAClB,CAAC,CAAC;AAKH,MAAM,CAAC,MAAM,sBAAsB,GAAG,CAAC,CAAC,IAAI,CAAC;IAC3C,sBAAsB;IACtB,WAAW;CACZ,CAAC,CAAC;AAGH,MAAM,CAAC,MAAM,wBAAwB,GAAG,CAAC,CAAC,IAAI,CAAC;IAC7C,UAAU;IACV,sBAAsB;CACvB,CAAC,CAAC;AAGH,MAAM,6BAA6B,GAAG,CAAC,CAAC,MAAM,CAAC;IAC7C,gBAAgB,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,KAAK,EAAE,aAAa,EAAE,KAAK,CAAC,CAAC;IACjE,WAAW,EAAE,gBAAgB;IAC7B,cAAc,EAAE,mBAAmB;IACnC,0BAA0B,EAAE,6BAA6B,CAAC,QAAQ,EAAE;IACpE,kBAAkB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;IAC1C,sBAAsB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;CAC/C,CAAC,CAAC;AAMH,MAAM,CAAC,MAAM,qBAAqB,GAAG,CAAC,CAAC,MAAM,CAAC;IAC5C,cAAc,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC;IAC5B,cAAc,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IACjC,MAAM,EAAE,CAAC,CAAC,MAAM,CAAC;QACf,WAAW,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;QAC9B,mBAAmB,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;KACvC,CAAC;IACF,KAAK,EAAE,CAAC,CAAC,MAAM,CAAC;QACd,aAAa,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;QAChC,mBAAmB,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,EAAE;QACrC,wBAAwB,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;QAC3C,4BAA4B,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;QAC/C,2BAA2B,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KACvD,CAAC;IACF,QAAQ,EAAE,CAAC,CAAC,MAAM,CAAC;QACjB,GAAG,EAAE,CAAC,CAAC,MAAM,CAAC;YACZ,WAAW,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,OAAO,CAAC;YACxC,aAAa,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC;YAC1D,kBAAkB,EAAE,sBAAsB,CAAC,OAAO,CAChD,sBAAsB,CACvB;YACD,oBAAoB,EAAE,wBAAwB,CAAC,OAAO,CAAC,UAAU,CAAC;SACnE,CAAC;QACF,cAAc,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC;QACzD,eAAe,EAAE,CAAC;aACf,MAAM,CAAC,mBAAmB,EAAE,6BAA6B,CAAC;aAC1D,QAAQ,EAAE;KACd,CAAC;IACF,aAAa,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE;CACpE,CAAC,CAAC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
export { EcosystemConfigSchema, ClientProfileSchema, AccessModeSchema, GrantStrategySchema, TokenEndpointAuthMethodSchema, UserAccessPolicySchema, ClientAccessPolicySchema, } from "./ecosystem-config.js";
|
|
2
|
+
export type { EcosystemConfig, ClientProfile, AccessMode, GrantStrategy, TokenEndpointAuthMethod, UserAccessPolicy, ClientAccessPolicy, ClientProfileDefinition, } from "./ecosystem-config.js";
|
|
3
|
+
export { ClientDescriptorSchema, ReusePolicySchema } from "./client-descriptor.js";
|
|
4
|
+
export type { ClientDescriptor, ReusePolicy } from "./client-descriptor.js";
|
|
5
|
+
export { ClientConfigSchema } from "./client-config.js";
|
|
6
|
+
export type { ClientConfig } from "./client-config.js";
|
|
7
|
+
export { ServerConfigSchema } from "./server-config.js";
|
|
8
|
+
export type { ServerConfig } from "./server-config.js";
|
|
9
|
+
export type { Auth0Application, Auth0Api, Auth0ApiScope, Auth0ClientGrant, Auth0TenantSettings, } from "./auth0-responses.js";
|
|
10
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/types/index.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,qBAAqB,EACrB,mBAAmB,EACnB,gBAAgB,EAChB,mBAAmB,EACnB,6BAA6B,EAC7B,sBAAsB,EACtB,wBAAwB,GACzB,MAAM,uBAAuB,CAAC;AAC/B,YAAY,EACV,eAAe,EACf,aAAa,EACb,UAAU,EACV,aAAa,EACb,uBAAuB,EACvB,gBAAgB,EAChB,kBAAkB,EAClB,uBAAuB,GACxB,MAAM,uBAAuB,CAAC;AAE/B,OAAO,EAAE,sBAAsB,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAC;AACnF,YAAY,EAAE,gBAAgB,EAAE,WAAW,EAAE,MAAM,wBAAwB,CAAC;AAE5E,OAAO,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AACxD,YAAY,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAC;AAEvD,OAAO,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AACxD,YAAY,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAC;AAEvD,YAAY,EACV,gBAAgB,EAChB,QAAQ,EACR,aAAa,EACb,gBAAgB,EAChB,mBAAmB,GACpB,MAAM,sBAAsB,CAAC"}
|
|
@@ -0,0 +1,5 @@
|
|
|
1
|
+
export { EcosystemConfigSchema, ClientProfileSchema, AccessModeSchema, GrantStrategySchema, TokenEndpointAuthMethodSchema, UserAccessPolicySchema, ClientAccessPolicySchema, } from "./ecosystem-config.js";
|
|
2
|
+
export { ClientDescriptorSchema, ReusePolicySchema } from "./client-descriptor.js";
|
|
3
|
+
export { ClientConfigSchema } from "./client-config.js";
|
|
4
|
+
export { ServerConfigSchema } from "./server-config.js";
|
|
5
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/types/index.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,qBAAqB,EACrB,mBAAmB,EACnB,gBAAgB,EAChB,mBAAmB,EACnB,6BAA6B,EAC7B,sBAAsB,EACtB,wBAAwB,GACzB,MAAM,uBAAuB,CAAC;AAY/B,OAAO,EAAE,sBAAsB,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAC;AAGnF,OAAO,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAGxD,OAAO,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC"}
|
|
@@ -0,0 +1,73 @@
|
|
|
1
|
+
import { z } from "zod";
|
|
2
|
+
export declare const ServerConfigSchema: z.ZodObject<{
|
|
3
|
+
name: z.ZodString;
|
|
4
|
+
slug: z.ZodString;
|
|
5
|
+
scope_profile: z.ZodOptional<z.ZodString>;
|
|
6
|
+
extra_scopes: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
|
|
7
|
+
auth0: z.ZodOptional<z.ZodObject<{
|
|
8
|
+
create_api_if_missing: z.ZodDefault<z.ZodBoolean>;
|
|
9
|
+
existing_api_id: z.ZodDefault<z.ZodNullable<z.ZodString>>;
|
|
10
|
+
}, "strip", z.ZodTypeAny, {
|
|
11
|
+
create_api_if_missing: boolean;
|
|
12
|
+
existing_api_id: string | null;
|
|
13
|
+
}, {
|
|
14
|
+
create_api_if_missing?: boolean | undefined;
|
|
15
|
+
existing_api_id?: string | null | undefined;
|
|
16
|
+
}>>;
|
|
17
|
+
grants: z.ZodOptional<z.ZodObject<{
|
|
18
|
+
client_groups: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
|
|
19
|
+
client_overrides: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodArray<z.ZodString, "many">>>;
|
|
20
|
+
}, "strip", z.ZodTypeAny, {
|
|
21
|
+
client_groups?: string[] | undefined;
|
|
22
|
+
client_overrides?: Record<string, string[]> | undefined;
|
|
23
|
+
}, {
|
|
24
|
+
client_groups?: string[] | undefined;
|
|
25
|
+
client_overrides?: Record<string, string[]> | undefined;
|
|
26
|
+
}>>;
|
|
27
|
+
access_policy: z.ZodOptional<z.ZodObject<{
|
|
28
|
+
user: z.ZodOptional<z.ZodEnum<["require_client_grant", "allow_all"]>>;
|
|
29
|
+
client: z.ZodOptional<z.ZodEnum<["deny_all", "require_client_grant"]>>;
|
|
30
|
+
}, "strip", z.ZodTypeAny, {
|
|
31
|
+
user?: "require_client_grant" | "allow_all" | undefined;
|
|
32
|
+
client?: "require_client_grant" | "deny_all" | undefined;
|
|
33
|
+
}, {
|
|
34
|
+
user?: "require_client_grant" | "allow_all" | undefined;
|
|
35
|
+
client?: "require_client_grant" | "deny_all" | undefined;
|
|
36
|
+
}>>;
|
|
37
|
+
}, "strip", z.ZodTypeAny, {
|
|
38
|
+
name: string;
|
|
39
|
+
slug: string;
|
|
40
|
+
auth0?: {
|
|
41
|
+
create_api_if_missing: boolean;
|
|
42
|
+
existing_api_id: string | null;
|
|
43
|
+
} | undefined;
|
|
44
|
+
scope_profile?: string | undefined;
|
|
45
|
+
extra_scopes?: string[] | undefined;
|
|
46
|
+
grants?: {
|
|
47
|
+
client_groups?: string[] | undefined;
|
|
48
|
+
client_overrides?: Record<string, string[]> | undefined;
|
|
49
|
+
} | undefined;
|
|
50
|
+
access_policy?: {
|
|
51
|
+
user?: "require_client_grant" | "allow_all" | undefined;
|
|
52
|
+
client?: "require_client_grant" | "deny_all" | undefined;
|
|
53
|
+
} | undefined;
|
|
54
|
+
}, {
|
|
55
|
+
name: string;
|
|
56
|
+
slug: string;
|
|
57
|
+
auth0?: {
|
|
58
|
+
create_api_if_missing?: boolean | undefined;
|
|
59
|
+
existing_api_id?: string | null | undefined;
|
|
60
|
+
} | undefined;
|
|
61
|
+
scope_profile?: string | undefined;
|
|
62
|
+
extra_scopes?: string[] | undefined;
|
|
63
|
+
grants?: {
|
|
64
|
+
client_groups?: string[] | undefined;
|
|
65
|
+
client_overrides?: Record<string, string[]> | undefined;
|
|
66
|
+
} | undefined;
|
|
67
|
+
access_policy?: {
|
|
68
|
+
user?: "require_client_grant" | "allow_all" | undefined;
|
|
69
|
+
client?: "require_client_grant" | "deny_all" | undefined;
|
|
70
|
+
} | undefined;
|
|
71
|
+
}>;
|
|
72
|
+
export type ServerConfig = z.infer<typeof ServerConfigSchema>;
|
|
73
|
+
//# sourceMappingURL=server-config.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"server-config.d.ts","sourceRoot":"","sources":["../../src/types/server-config.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAQxB,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EA0B7B,CAAC;AAEH,MAAM,MAAM,YAAY,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
import { z } from "zod";
|
|
2
|
+
import { ClientAccessPolicySchema, UserAccessPolicySchema, } from "./ecosystem-config.js";
|
|
3
|
+
const DNS_SAFE_SLUG = /^[a-z][a-z0-9-]*[a-z0-9]$/;
|
|
4
|
+
export const ServerConfigSchema = z.object({
|
|
5
|
+
name: z.string().min(1),
|
|
6
|
+
slug: z.string().min(1).regex(DNS_SAFE_SLUG, {
|
|
7
|
+
message: "Slug must be DNS-safe: lowercase, start with letter, may contain hyphens, end with alphanumeric",
|
|
8
|
+
}),
|
|
9
|
+
scope_profile: z.string().optional(),
|
|
10
|
+
extra_scopes: z.array(z.string()).optional(),
|
|
11
|
+
auth0: z
|
|
12
|
+
.object({
|
|
13
|
+
create_api_if_missing: z.boolean().default(true),
|
|
14
|
+
existing_api_id: z.string().nullable().default(null),
|
|
15
|
+
})
|
|
16
|
+
.optional(),
|
|
17
|
+
grants: z
|
|
18
|
+
.object({
|
|
19
|
+
client_groups: z.array(z.string()).optional(),
|
|
20
|
+
client_overrides: z.record(z.string(), z.array(z.string())).optional(),
|
|
21
|
+
})
|
|
22
|
+
.optional(),
|
|
23
|
+
access_policy: z
|
|
24
|
+
.object({
|
|
25
|
+
user: UserAccessPolicySchema.optional(),
|
|
26
|
+
client: ClientAccessPolicySchema.optional(),
|
|
27
|
+
})
|
|
28
|
+
.optional(),
|
|
29
|
+
});
|
|
30
|
+
//# sourceMappingURL=server-config.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"server-config.js","sourceRoot":"","sources":["../../src/types/server-config.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AACxB,OAAO,EACL,wBAAwB,EACxB,sBAAsB,GACvB,MAAM,uBAAuB,CAAC;AAE/B,MAAM,aAAa,GAAG,2BAA2B,CAAC;AAElD,MAAM,CAAC,MAAM,kBAAkB,GAAG,CAAC,CAAC,MAAM,CAAC;IACzC,IAAI,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IACvB,IAAI,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,EAAE;QAC3C,OAAO,EACL,iGAAiG;KACpG,CAAC;IACF,aAAa,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,EAAE;IACpC,YAAY,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;IAC5C,KAAK,EAAE,CAAC;SACL,MAAM,CAAC;QACN,qBAAqB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QAChD,eAAe,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KACrD,CAAC;SACD,QAAQ,EAAE;IACb,MAAM,EAAE,CAAC;SACN,MAAM,CAAC;QACN,aAAa,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC7C,gBAAgB,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE;KACvE,CAAC;SACD,QAAQ,EAAE;IACb,aAAa,EAAE,CAAC;SACb,MAAM,CAAC;QACN,IAAI,EAAE,sBAAsB,CAAC,QAAQ,EAAE;QACvC,MAAM,EAAE,wBAAwB,CAAC,QAAQ,EAAE;KAC5C,CAAC;SACD,QAAQ,EAAE;CACd,CAAC,CAAC"}
|