@webex/webex-core 3.0.0-beta.15 → 3.0.0-beta.150
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/config.js +1 -11
- package/dist/config.js.map +1 -1
- package/dist/credentials-config.js +0 -20
- package/dist/credentials-config.js.map +1 -1
- package/dist/index.js +0 -76
- package/dist/index.js.map +1 -1
- package/dist/interceptors/auth.js +22 -55
- package/dist/interceptors/auth.js.map +1 -1
- package/dist/interceptors/default-options.js +0 -20
- package/dist/interceptors/default-options.js.map +1 -1
- package/dist/interceptors/embargo.js +0 -21
- package/dist/interceptors/embargo.js.map +1 -1
- package/dist/interceptors/network-timing.js +2 -21
- package/dist/interceptors/network-timing.js.map +1 -1
- package/dist/interceptors/payload-transformer.js +2 -22
- package/dist/interceptors/payload-transformer.js.map +1 -1
- package/dist/interceptors/rate-limit.js +21 -53
- package/dist/interceptors/rate-limit.js.map +1 -1
- package/dist/interceptors/redirect.js +4 -33
- package/dist/interceptors/redirect.js.map +1 -1
- package/dist/interceptors/request-event.js +3 -30
- package/dist/interceptors/request-event.js.map +1 -1
- package/dist/interceptors/request-logger.js +1 -30
- package/dist/interceptors/request-logger.js.map +1 -1
- package/dist/interceptors/request-timing.js +3 -22
- package/dist/interceptors/request-timing.js.map +1 -1
- package/dist/interceptors/response-logger.js +2 -31
- package/dist/interceptors/response-logger.js.map +1 -1
- package/dist/interceptors/user-agent.js +2 -29
- package/dist/interceptors/user-agent.js.map +1 -1
- package/dist/interceptors/webex-tracking-id.js +5 -28
- package/dist/interceptors/webex-tracking-id.js.map +1 -1
- package/dist/interceptors/webex-user-agent.js +5 -38
- package/dist/interceptors/webex-user-agent.js.map +1 -1
- package/dist/lib/batcher.js +3 -51
- package/dist/lib/batcher.js.map +1 -1
- package/dist/lib/credentials/credentials.js +44 -123
- package/dist/lib/credentials/credentials.js.map +1 -1
- package/dist/lib/credentials/grant-errors.js +0 -49
- package/dist/lib/credentials/grant-errors.js.map +1 -1
- package/dist/lib/credentials/index.js +1 -13
- package/dist/lib/credentials/index.js.map +1 -1
- package/dist/lib/credentials/scope.js +1 -7
- package/dist/lib/credentials/scope.js.map +1 -1
- package/dist/lib/credentials/token-collection.js +1 -7
- package/dist/lib/credentials/token-collection.js.map +1 -1
- package/dist/lib/credentials/token.js +29 -122
- package/dist/lib/credentials/token.js.map +1 -1
- package/dist/lib/page.js +12 -27
- package/dist/lib/page.js.map +1 -1
- package/dist/lib/services/constants.js +0 -2
- package/dist/lib/services/constants.js.map +1 -1
- package/dist/lib/services/index.js +1 -28
- package/dist/lib/services/index.js.map +1 -1
- package/dist/lib/services/interceptors/server-error.js +0 -21
- package/dist/lib/services/interceptors/server-error.js.map +1 -1
- package/dist/lib/services/interceptors/service.js +11 -33
- package/dist/lib/services/interceptors/service.js.map +1 -1
- package/dist/lib/services/metrics.js +0 -2
- package/dist/lib/services/metrics.js.map +1 -1
- package/dist/lib/services/service-catalog.js +10 -90
- package/dist/lib/services/service-catalog.js.map +1 -1
- package/dist/lib/services/service-fed-ramp.js +0 -2
- package/dist/lib/services/service-fed-ramp.js.map +1 -1
- package/dist/lib/services/service-host.js +41 -56
- package/dist/lib/services/service-host.js.map +1 -1
- package/dist/lib/services/service-registry.js +78 -90
- package/dist/lib/services/service-registry.js.map +1 -1
- package/dist/lib/services/service-state.js +3 -15
- package/dist/lib/services/service-state.js.map +1 -1
- package/dist/lib/services/service-url.js +4 -25
- package/dist/lib/services/service-url.js.map +1 -1
- package/dist/lib/services/services.js +116 -234
- package/dist/lib/services/services.js.map +1 -1
- package/dist/lib/stateless-webex-plugin.js +5 -28
- package/dist/lib/stateless-webex-plugin.js.map +1 -1
- package/dist/lib/storage/decorators.js +19 -62
- package/dist/lib/storage/decorators.js.map +1 -1
- package/dist/lib/storage/errors.js +0 -23
- package/dist/lib/storage/errors.js.map +1 -1
- package/dist/lib/storage/index.js +0 -14
- package/dist/lib/storage/index.js.map +1 -1
- package/dist/lib/storage/make-webex-plugin-store.js +11 -41
- package/dist/lib/storage/make-webex-plugin-store.js.map +1 -1
- package/dist/lib/storage/make-webex-store.js +8 -30
- package/dist/lib/storage/make-webex-store.js.map +1 -1
- package/dist/lib/storage/memory-store-adapter.js +1 -19
- package/dist/lib/storage/memory-store-adapter.js.map +1 -1
- package/dist/lib/webex-core-plugin-mixin.js +9 -29
- package/dist/lib/webex-core-plugin-mixin.js.map +1 -1
- package/dist/lib/webex-http-error.js +1 -31
- package/dist/lib/webex-http-error.js.map +1 -1
- package/dist/lib/webex-internal-core-plugin-mixin.js +9 -29
- package/dist/lib/webex-internal-core-plugin-mixin.js.map +1 -1
- package/dist/lib/webex-plugin.js +6 -40
- package/dist/lib/webex-plugin.js.map +1 -1
- package/dist/plugins/logger.js +3 -17
- package/dist/plugins/logger.js.map +1 -1
- package/dist/webex-core.js +79 -203
- package/dist/webex-core.js.map +1 -1
- package/dist/webex-internal-core.js +0 -10
- package/dist/webex-internal-core.js.map +1 -1
- package/package.json +14 -14
- package/src/lib/credentials/credentials.js +19 -0
- package/test/unit/spec/credentials/credentials.js +28 -0
package/dist/config.js
CHANGED
|
@@ -1,23 +1,16 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
|
|
3
3
|
var _Object$defineProperty = require("@babel/runtime-corejs2/core-js/object/define-property");
|
|
4
|
-
|
|
5
4
|
var _interopRequireDefault = require("@babel/runtime-corejs2/helpers/interopRequireDefault");
|
|
6
|
-
|
|
7
5
|
_Object$defineProperty(exports, "__esModule", {
|
|
8
6
|
value: true
|
|
9
7
|
});
|
|
10
|
-
|
|
11
8
|
exports.default = void 0;
|
|
12
|
-
|
|
13
9
|
var _storage = require("./lib/storage");
|
|
14
|
-
|
|
15
10
|
var _credentialsConfig = _interopRequireDefault(require("./credentials-config"));
|
|
16
|
-
|
|
17
11
|
/*!
|
|
18
12
|
* Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.
|
|
19
13
|
*/
|
|
20
|
-
|
|
21
14
|
/* eslint camelcase: [0] */
|
|
22
15
|
var _default = {
|
|
23
16
|
maxAppLevelRedirects: 10,
|
|
@@ -43,7 +36,6 @@ var _default = {
|
|
|
43
36
|
* @type {string}
|
|
44
37
|
*/
|
|
45
38
|
hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',
|
|
46
|
-
|
|
47
39
|
/**
|
|
48
40
|
* The u2c discovery url
|
|
49
41
|
*
|
|
@@ -51,19 +43,17 @@ var _default = {
|
|
|
51
43
|
*/
|
|
52
44
|
u2c: process.env.U2C_SERVICE_URL || 'https://u2c.wbx2.com/u2c/api/v1'
|
|
53
45
|
},
|
|
54
|
-
|
|
55
46
|
/**
|
|
56
47
|
* When true, considers all urls in `allowedDomains` as safe for auth tokens
|
|
57
48
|
*
|
|
58
49
|
* @type {boolean}
|
|
59
50
|
*/
|
|
60
51
|
validateDomains: true,
|
|
61
|
-
|
|
62
52
|
/**
|
|
63
53
|
* services that don't need auth validation
|
|
64
54
|
*/
|
|
65
|
-
servicesNotNeedValidation: ['webex-appapi-service'],
|
|
66
55
|
|
|
56
|
+
servicesNotNeedValidation: ['webex-appapi-service'],
|
|
67
57
|
/**
|
|
68
58
|
* Contains a list of allowed domain host addresses.
|
|
69
59
|
*
|
package/dist/config.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["maxAppLevelRedirects","maxLocusRedirects","maxAuthenticationReplays","maxReconnectAttempts","onBeforeLogout","trackingIdPrefix","trackingIdSuffix","AlternateLogger","undefined","credentials","CredentialsConfig","fedramp","process","env","ENABLE_FEDRAMP","services","discovery","hydra","HYDRA_SERVICE_URL","u2c","U2C_SERVICE_URL","validateDomains","servicesNotNeedValidation","allowedDomains","device","preDiscoveryServices","hydraServiceUrl","metrics","type","payloadTransformer","predicates","transforms","storage","boundedAdapter","MemoryStoreAdapter","unboundedAdapter"],"sources":["config.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\n/* eslint camelcase: [0] */\n\nimport {MemoryStoreAdapter} from './lib/storage';\nimport CredentialsConfig from './credentials-config';\n\nexport default {\n maxAppLevelRedirects: 10,\n maxLocusRedirects: 5,\n maxAuthenticationReplays: 1,\n maxReconnectAttempts: 1,\n onBeforeLogout: [],\n trackingIdPrefix: 'webex-js-sdk',\n trackingIdSuffix: '',\n AlternateLogger: undefined,\n credentials: new CredentialsConfig(),\n fedramp: process.env.ENABLE_FEDRAMP || false,\n services: {\n /**\n * A list of services that are available prior to catalog collection.\n *\n * @type {Object}\n */\n discovery: {\n /**\n * The hydra discovery url.\n *\n * @type {string}\n */\n hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n\n /**\n * The u2c discovery url\n *\n * @type {string}\n */\n u2c: process.env.U2C_SERVICE_URL || 'https://u2c.wbx2.com/u2c/api/v1',\n },\n\n /**\n * When true, considers all urls in `allowedDomains` as safe for auth tokens\n *\n * @type {boolean}\n */\n validateDomains: true,\n\n /**\n * services that don't need auth validation\n */\n\n servicesNotNeedValidation: ['webex-appapi-service'],\n\n /**\n * Contains a list of allowed domain host addresses.\n *\n * @type {Array<string>}\n */\n allowedDomains: [\n 'wbx2.com',\n 'ciscospark.com',\n 'webex.com',\n 'webexapis.com',\n 'broadcloudpbx.com',\n 'broadcloud.eu',\n 'broadcloud.com.au',\n 'broadcloudpbx.net',\n ],\n },\n device: {\n preDiscoveryServices: {\n hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n hydraServiceUrl: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n },\n validateDomains: true,\n },\n metrics: {\n type: ['behavioral', 'operational'],\n },\n payloadTransformer: {\n predicates: [],\n transforms: [],\n },\n storage: {\n boundedAdapter: MemoryStoreAdapter,\n unboundedAdapter: MemoryStoreAdapter,\n },\n};\n"],"mappings":"
|
|
1
|
+
{"version":3,"names":["maxAppLevelRedirects","maxLocusRedirects","maxAuthenticationReplays","maxReconnectAttempts","onBeforeLogout","trackingIdPrefix","trackingIdSuffix","AlternateLogger","undefined","credentials","CredentialsConfig","fedramp","process","env","ENABLE_FEDRAMP","services","discovery","hydra","HYDRA_SERVICE_URL","u2c","U2C_SERVICE_URL","validateDomains","servicesNotNeedValidation","allowedDomains","device","preDiscoveryServices","hydraServiceUrl","metrics","type","payloadTransformer","predicates","transforms","storage","boundedAdapter","MemoryStoreAdapter","unboundedAdapter"],"sources":["config.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\n/* eslint camelcase: [0] */\n\nimport {MemoryStoreAdapter} from './lib/storage';\nimport CredentialsConfig from './credentials-config';\n\nexport default {\n maxAppLevelRedirects: 10,\n maxLocusRedirects: 5,\n maxAuthenticationReplays: 1,\n maxReconnectAttempts: 1,\n onBeforeLogout: [],\n trackingIdPrefix: 'webex-js-sdk',\n trackingIdSuffix: '',\n AlternateLogger: undefined,\n credentials: new CredentialsConfig(),\n fedramp: process.env.ENABLE_FEDRAMP || false,\n services: {\n /**\n * A list of services that are available prior to catalog collection.\n *\n * @type {Object}\n */\n discovery: {\n /**\n * The hydra discovery url.\n *\n * @type {string}\n */\n hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n\n /**\n * The u2c discovery url\n *\n * @type {string}\n */\n u2c: process.env.U2C_SERVICE_URL || 'https://u2c.wbx2.com/u2c/api/v1',\n },\n\n /**\n * When true, considers all urls in `allowedDomains` as safe for auth tokens\n *\n * @type {boolean}\n */\n validateDomains: true,\n\n /**\n * services that don't need auth validation\n */\n\n servicesNotNeedValidation: ['webex-appapi-service'],\n\n /**\n * Contains a list of allowed domain host addresses.\n *\n * @type {Array<string>}\n */\n allowedDomains: [\n 'wbx2.com',\n 'ciscospark.com',\n 'webex.com',\n 'webexapis.com',\n 'broadcloudpbx.com',\n 'broadcloud.eu',\n 'broadcloud.com.au',\n 'broadcloudpbx.net',\n ],\n },\n device: {\n preDiscoveryServices: {\n hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n hydraServiceUrl: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n },\n validateDomains: true,\n },\n metrics: {\n type: ['behavioral', 'operational'],\n },\n payloadTransformer: {\n predicates: [],\n transforms: [],\n },\n storage: {\n boundedAdapter: MemoryStoreAdapter,\n unboundedAdapter: MemoryStoreAdapter,\n },\n};\n"],"mappings":";;;;;;;;AAMA;AACA;AAPA;AACA;AACA;AAEA;AAAA,eAKe;EACbA,oBAAoB,EAAE,EAAE;EACxBC,iBAAiB,EAAE,CAAC;EACpBC,wBAAwB,EAAE,CAAC;EAC3BC,oBAAoB,EAAE,CAAC;EACvBC,cAAc,EAAE,EAAE;EAClBC,gBAAgB,EAAE,cAAc;EAChCC,gBAAgB,EAAE,EAAE;EACpBC,eAAe,EAAEC,SAAS;EAC1BC,WAAW,EAAE,IAAIC,0BAAiB,EAAE;EACpCC,OAAO,EAAEC,OAAO,CAACC,GAAG,CAACC,cAAc,IAAI,KAAK;EAC5CC,QAAQ,EAAE;IACR;AACJ;AACA;AACA;AACA;IACIC,SAAS,EAAE;MACT;AACN;AACA;AACA;AACA;MACMC,KAAK,EAAEL,OAAO,CAACC,GAAG,CAACK,iBAAiB,IAAI,+BAA+B;MAEvE;AACN;AACA;AACA;AACA;MACMC,GAAG,EAAEP,OAAO,CAACC,GAAG,CAACO,eAAe,IAAI;IACtC,CAAC;IAED;AACJ;AACA;AACA;AACA;IACIC,eAAe,EAAE,IAAI;IAErB;AACJ;AACA;;IAEIC,yBAAyB,EAAE,CAAC,sBAAsB,CAAC;IAEnD;AACJ;AACA;AACA;AACA;IACIC,cAAc,EAAE,CACd,UAAU,EACV,gBAAgB,EAChB,WAAW,EACX,eAAe,EACf,mBAAmB,EACnB,eAAe,EACf,mBAAmB,EACnB,mBAAmB;EAEvB,CAAC;EACDC,MAAM,EAAE;IACNC,oBAAoB,EAAE;MACpBR,KAAK,EAAEL,OAAO,CAACC,GAAG,CAACK,iBAAiB,IAAI,+BAA+B;MACvEQ,eAAe,EAAEd,OAAO,CAACC,GAAG,CAACK,iBAAiB,IAAI;IACpD,CAAC;IACDG,eAAe,EAAE;EACnB,CAAC;EACDM,OAAO,EAAE;IACPC,IAAI,EAAE,CAAC,YAAY,EAAE,aAAa;EACpC,CAAC;EACDC,kBAAkB,EAAE;IAClBC,UAAU,EAAE,EAAE;IACdC,UAAU,EAAE;EACd,CAAC;EACDC,OAAO,EAAE;IACPC,cAAc,EAAEC,2BAAkB;IAClCC,gBAAgB,EAAED;EACpB;AACF,CAAC;AAAA"}
|
|
@@ -1,17 +1,12 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
|
|
3
3
|
var _Object$defineProperty = require("@babel/runtime-corejs2/core-js/object/define-property");
|
|
4
|
-
|
|
5
4
|
var _interopRequireDefault = require("@babel/runtime-corejs2/helpers/interopRequireDefault");
|
|
6
|
-
|
|
7
5
|
_Object$defineProperty(exports, "__esModule", {
|
|
8
6
|
value: true
|
|
9
7
|
});
|
|
10
|
-
|
|
11
8
|
exports.default = void 0;
|
|
12
|
-
|
|
13
9
|
var _ampersandState = _interopRequireDefault(require("ampersand-state"));
|
|
14
|
-
|
|
15
10
|
// The credentials config which includes the CI server info and derived
|
|
16
11
|
// URL properties from them for the various CI services. The URL's
|
|
17
12
|
// will be updated when the CI changes.
|
|
@@ -28,7 +23,6 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
28
23
|
url: process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com'
|
|
29
24
|
};
|
|
30
25
|
}],
|
|
31
|
-
|
|
32
26
|
/**
|
|
33
27
|
* The identity base host name
|
|
34
28
|
* @returns {object}
|
|
@@ -38,14 +32,12 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
38
32
|
url: process.env.IDENTITY_BASE_URL || 'https://identity.webex.com'
|
|
39
33
|
};
|
|
40
34
|
}],
|
|
41
|
-
|
|
42
35
|
/**
|
|
43
36
|
* This is the authorization url displayed on the
|
|
44
37
|
* {@link developer portal|https://developer.webex.com}
|
|
45
38
|
* @type {string}
|
|
46
39
|
*/
|
|
47
40
|
authorizationString: ['string', false, process.env.WEBEX_AUTHORIZATION_STRING || process.env.AUTHORIZATION_STRING],
|
|
48
|
-
|
|
49
41
|
/**
|
|
50
42
|
* Authorization URL which prompts for user's password. Inferred from
|
|
51
43
|
* {@link config.credentials.authorizationString}. This config value will
|
|
@@ -54,31 +46,26 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
54
46
|
* @type {string}
|
|
55
47
|
*/
|
|
56
48
|
authorizeUrl: ['string', false, process.env.WEBEX_AUTHORIZE_URL || "".concat(process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com', "/idb/oauth2/v1/authorize")],
|
|
57
|
-
|
|
58
49
|
/**
|
|
59
50
|
* {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}
|
|
60
51
|
* @type {string}
|
|
61
52
|
*/
|
|
62
53
|
client_id: ['string', false, process.env.WEBEX_CLIENT_ID || process.env.COMMON_IDENTITY_CLIENT_ID || process.env.CLIENT_ID],
|
|
63
|
-
|
|
64
54
|
/**
|
|
65
55
|
* {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}
|
|
66
56
|
* @type {string}
|
|
67
57
|
*/
|
|
68
58
|
client_secret: ['string', false, process.env.WEBEX_CLIENT_SECRET || process.env.COMMON_IDENTITY_CLIENT_SECRET || process.env.CLIENT_SECRET],
|
|
69
|
-
|
|
70
59
|
/**
|
|
71
60
|
* {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}
|
|
72
61
|
* @type {string}
|
|
73
62
|
*/
|
|
74
63
|
redirect_uri: ['string', false, process.env.WEBEX_REDIRECT_URI || process.env.COMMON_IDENTITY_REDIRECT_URI || process.env.REDIRECT_URI],
|
|
75
|
-
|
|
76
64
|
/**
|
|
77
65
|
* {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}
|
|
78
66
|
* @type {string}
|
|
79
67
|
*/
|
|
80
68
|
scope: ['string', false, process.env.WEBEX_SCOPE || process.env.WEBEX_SCOPES || process.env.COMMON_IDENTITY_SCOPE || process.env.SCOPE],
|
|
81
|
-
|
|
82
69
|
/**
|
|
83
70
|
* Controls the UI of the CI login page.
|
|
84
71
|
* @private
|
|
@@ -99,7 +86,6 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
99
86
|
},
|
|
100
87
|
cache: false
|
|
101
88
|
},
|
|
102
|
-
|
|
103
89
|
/**
|
|
104
90
|
* Generate OTP URL
|
|
105
91
|
* {@link config.credentials.generateOtpUrl}
|
|
@@ -112,7 +98,6 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
112
98
|
},
|
|
113
99
|
cache: false
|
|
114
100
|
},
|
|
115
|
-
|
|
116
101
|
/**
|
|
117
102
|
* Validate OTP URL
|
|
118
103
|
* {@link config.credentials.validateOtpUrl}
|
|
@@ -126,7 +111,6 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
126
111
|
cache: false
|
|
127
112
|
},
|
|
128
113
|
// TODO does hydra also have an access_token endpoint?
|
|
129
|
-
|
|
130
114
|
/**
|
|
131
115
|
* Token URL used for token refresh and auth code exchange
|
|
132
116
|
* @type {string}
|
|
@@ -138,7 +122,6 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
138
122
|
},
|
|
139
123
|
cache: false
|
|
140
124
|
},
|
|
141
|
-
|
|
142
125
|
/**
|
|
143
126
|
* URL to revoke token
|
|
144
127
|
* @type {string}
|
|
@@ -150,7 +133,6 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
150
133
|
},
|
|
151
134
|
cache: false
|
|
152
135
|
},
|
|
153
|
-
|
|
154
136
|
/**
|
|
155
137
|
* URL to load when the app logs out
|
|
156
138
|
* @type {string}
|
|
@@ -162,7 +144,6 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
162
144
|
},
|
|
163
145
|
cache: false
|
|
164
146
|
},
|
|
165
|
-
|
|
166
147
|
/**
|
|
167
148
|
* Set password URL
|
|
168
149
|
* @type {string}
|
|
@@ -176,7 +157,6 @@ var CredentialsConfig = _ampersandState.default.extend({
|
|
|
176
157
|
}
|
|
177
158
|
}
|
|
178
159
|
});
|
|
179
|
-
|
|
180
160
|
var _default = CredentialsConfig;
|
|
181
161
|
exports.default = _default;
|
|
182
162
|
//# sourceMappingURL=credentials-config.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":["CredentialsConfig","AmpState","extend","extraProperties","props","idbroker","url","process","env","IDBROKER_BASE_URL","identity","IDENTITY_BASE_URL","authorizationString","WEBEX_AUTHORIZATION_STRING","AUTHORIZATION_STRING","authorizeUrl","WEBEX_AUTHORIZE_URL","client_id","WEBEX_CLIENT_ID","COMMON_IDENTITY_CLIENT_ID","CLIENT_ID","client_secret","WEBEX_CLIENT_SECRET","COMMON_IDENTITY_CLIENT_SECRET","CLIENT_SECRET","redirect_uri","WEBEX_REDIRECT_URI","COMMON_IDENTITY_REDIRECT_URI","REDIRECT_URI","scope","WEBEX_SCOPE","WEBEX_SCOPES","COMMON_IDENTITY_SCOPE","SCOPE","cisService","derived","activationUrl","deps","fn","cache","generateOtpUrl","validateOtpUrl","tokenUrl","TOKEN_URL","revokeUrl","REVOKE_URL","logoutUrl","setPasswordUrl"],"sources":["credentials-config.js"],"sourcesContent":["import AmpState from 'ampersand-state';\n\n// The credentials config which includes the CI server info and derived\n// URL properties from them for the various CI services. The URL's\n// will be updated when the CI changes.\nconst CredentialsConfig = AmpState.extend({\n // we need to allow extra props for dynamic props like jwtRefreshCallback\n extraProperties: 'allow',\n\n props: {\n /**\n * The idbroker base host name\n * @returns {object}\n */\n idbroker: [\n 'object',\n false,\n () => ({\n url: process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com',\n }),\n ],\n\n /**\n * The identity base host name\n * @returns {object}\n */\n identity: [\n 'object',\n false,\n () => ({\n url: process.env.IDENTITY_BASE_URL || 'https://identity.webex.com',\n }),\n ],\n\n /**\n * This is the authorization url displayed on the\n * {@link developer portal|https://developer.webex.com}\n * @type {string}\n */\n authorizationString: [\n 'string',\n false,\n process.env.WEBEX_AUTHORIZATION_STRING || process.env.AUTHORIZATION_STRING,\n ],\n\n /**\n * Authorization URL which prompts for user's password. Inferred from\n * {@link config.credentials.authorizationString}. This config value will\n * be automatically set if `authorizationString` config value is specified.\n *\n * @type {string}\n */\n authorizeUrl: [\n 'string',\n false,\n process.env.WEBEX_AUTHORIZE_URL ||\n `${process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com'}/idb/oauth2/v1/authorize`,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n client_id: [\n 'string',\n false,\n process.env.WEBEX_CLIENT_ID || process.env.COMMON_IDENTITY_CLIENT_ID || process.env.CLIENT_ID,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n client_secret: [\n 'string',\n false,\n process.env.WEBEX_CLIENT_SECRET ||\n process.env.COMMON_IDENTITY_CLIENT_SECRET ||\n process.env.CLIENT_SECRET,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n redirect_uri: [\n 'string',\n false,\n process.env.WEBEX_REDIRECT_URI ||\n process.env.COMMON_IDENTITY_REDIRECT_URI ||\n process.env.REDIRECT_URI,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n scope: [\n 'string',\n false,\n process.env.WEBEX_SCOPE ||\n process.env.WEBEX_SCOPES ||\n process.env.COMMON_IDENTITY_SCOPE ||\n process.env.SCOPE,\n ],\n\n /**\n * Controls the UI of the CI login page.\n * @private\n * @type {string}\n */\n cisService: ['string', false, 'webex'],\n },\n\n derived: {\n /**\n * User activation URL\n * {@link config.credentials.activationUrl}\n * @type {string}\n */\n activationUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserActivation/invoke`;\n },\n cache: false,\n },\n\n /**\n * Generate OTP URL\n * {@link config.credentials.generateOtpUrl}\n * @type {string}\n */\n generateOtpUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserOTP/Generate/invoke`;\n },\n cache: false,\n },\n\n /**\n * Validate OTP URL\n * {@link config.credentials.validateOtpUrl}\n * @type {string}\n */\n validateOtpUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserOTP/Validate/invoke`;\n },\n cache: false,\n },\n\n // TODO does hydra also have an access_token endpoint?\n /**\n * Token URL used for token refresh and auth code exchange\n * @type {string}\n */\n tokenUrl: {\n deps: ['idbroker.url'],\n fn() {\n return process.env.TOKEN_URL || `${this.idbroker.url}/idb/oauth2/v1/access_token`;\n },\n cache: false,\n },\n\n /**\n * URL to revoke token\n * @type {string}\n */\n revokeUrl: {\n deps: ['idbroker.url'],\n fn() {\n return process.env.REVOKE_URL || `${this.idbroker.url}/idb/oauth2/v1/revoke`;\n },\n cache: false,\n },\n\n /**\n * URL to load when the app logs out\n * @type {string}\n */\n logoutUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${this.idbroker.url}/idb/oauth2/v1/logout`;\n },\n cache: false,\n },\n\n /**\n * Set password URL\n * @type {string}\n */\n setPasswordUrl: {\n deps: ['identity.url'],\n fn() {\n return `${this.identity.url || 'https://identity.webex.com'}/identity/scim/v1/Users`;\n },\n cache: false,\n },\n },\n});\n\nexport default CredentialsConfig;\n"],"mappings":"
|
|
1
|
+
{"version":3,"names":["CredentialsConfig","AmpState","extend","extraProperties","props","idbroker","url","process","env","IDBROKER_BASE_URL","identity","IDENTITY_BASE_URL","authorizationString","WEBEX_AUTHORIZATION_STRING","AUTHORIZATION_STRING","authorizeUrl","WEBEX_AUTHORIZE_URL","client_id","WEBEX_CLIENT_ID","COMMON_IDENTITY_CLIENT_ID","CLIENT_ID","client_secret","WEBEX_CLIENT_SECRET","COMMON_IDENTITY_CLIENT_SECRET","CLIENT_SECRET","redirect_uri","WEBEX_REDIRECT_URI","COMMON_IDENTITY_REDIRECT_URI","REDIRECT_URI","scope","WEBEX_SCOPE","WEBEX_SCOPES","COMMON_IDENTITY_SCOPE","SCOPE","cisService","derived","activationUrl","deps","fn","cache","generateOtpUrl","validateOtpUrl","tokenUrl","TOKEN_URL","revokeUrl","REVOKE_URL","logoutUrl","setPasswordUrl"],"sources":["credentials-config.js"],"sourcesContent":["import AmpState from 'ampersand-state';\n\n// The credentials config which includes the CI server info and derived\n// URL properties from them for the various CI services. The URL's\n// will be updated when the CI changes.\nconst CredentialsConfig = AmpState.extend({\n // we need to allow extra props for dynamic props like jwtRefreshCallback\n extraProperties: 'allow',\n\n props: {\n /**\n * The idbroker base host name\n * @returns {object}\n */\n idbroker: [\n 'object',\n false,\n () => ({\n url: process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com',\n }),\n ],\n\n /**\n * The identity base host name\n * @returns {object}\n */\n identity: [\n 'object',\n false,\n () => ({\n url: process.env.IDENTITY_BASE_URL || 'https://identity.webex.com',\n }),\n ],\n\n /**\n * This is the authorization url displayed on the\n * {@link developer portal|https://developer.webex.com}\n * @type {string}\n */\n authorizationString: [\n 'string',\n false,\n process.env.WEBEX_AUTHORIZATION_STRING || process.env.AUTHORIZATION_STRING,\n ],\n\n /**\n * Authorization URL which prompts for user's password. Inferred from\n * {@link config.credentials.authorizationString}. This config value will\n * be automatically set if `authorizationString` config value is specified.\n *\n * @type {string}\n */\n authorizeUrl: [\n 'string',\n false,\n process.env.WEBEX_AUTHORIZE_URL ||\n `${process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com'}/idb/oauth2/v1/authorize`,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n client_id: [\n 'string',\n false,\n process.env.WEBEX_CLIENT_ID || process.env.COMMON_IDENTITY_CLIENT_ID || process.env.CLIENT_ID,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n client_secret: [\n 'string',\n false,\n process.env.WEBEX_CLIENT_SECRET ||\n process.env.COMMON_IDENTITY_CLIENT_SECRET ||\n process.env.CLIENT_SECRET,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n redirect_uri: [\n 'string',\n false,\n process.env.WEBEX_REDIRECT_URI ||\n process.env.COMMON_IDENTITY_REDIRECT_URI ||\n process.env.REDIRECT_URI,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n scope: [\n 'string',\n false,\n process.env.WEBEX_SCOPE ||\n process.env.WEBEX_SCOPES ||\n process.env.COMMON_IDENTITY_SCOPE ||\n process.env.SCOPE,\n ],\n\n /**\n * Controls the UI of the CI login page.\n * @private\n * @type {string}\n */\n cisService: ['string', false, 'webex'],\n },\n\n derived: {\n /**\n * User activation URL\n * {@link config.credentials.activationUrl}\n * @type {string}\n */\n activationUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserActivation/invoke`;\n },\n cache: false,\n },\n\n /**\n * Generate OTP URL\n * {@link config.credentials.generateOtpUrl}\n * @type {string}\n */\n generateOtpUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserOTP/Generate/invoke`;\n },\n cache: false,\n },\n\n /**\n * Validate OTP URL\n * {@link config.credentials.validateOtpUrl}\n * @type {string}\n */\n validateOtpUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserOTP/Validate/invoke`;\n },\n cache: false,\n },\n\n // TODO does hydra also have an access_token endpoint?\n /**\n * Token URL used for token refresh and auth code exchange\n * @type {string}\n */\n tokenUrl: {\n deps: ['idbroker.url'],\n fn() {\n return process.env.TOKEN_URL || `${this.idbroker.url}/idb/oauth2/v1/access_token`;\n },\n cache: false,\n },\n\n /**\n * URL to revoke token\n * @type {string}\n */\n revokeUrl: {\n deps: ['idbroker.url'],\n fn() {\n return process.env.REVOKE_URL || `${this.idbroker.url}/idb/oauth2/v1/revoke`;\n },\n cache: false,\n },\n\n /**\n * URL to load when the app logs out\n * @type {string}\n */\n logoutUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${this.idbroker.url}/idb/oauth2/v1/logout`;\n },\n cache: false,\n },\n\n /**\n * Set password URL\n * @type {string}\n */\n setPasswordUrl: {\n deps: ['identity.url'],\n fn() {\n return `${this.identity.url || 'https://identity.webex.com'}/identity/scim/v1/Users`;\n },\n cache: false,\n },\n },\n});\n\nexport default CredentialsConfig;\n"],"mappings":";;;;;;;;AAAA;AAEA;AACA;AACA;AACA,IAAMA,iBAAiB,GAAGC,uBAAQ,CAACC,MAAM,CAAC;EACxC;EACAC,eAAe,EAAE,OAAO;EAExBC,KAAK,EAAE;IACL;AACJ;AACA;AACA;IACIC,QAAQ,EAAE,CACR,QAAQ,EACR,KAAK,EACL;MAAA,OAAO;QACLC,GAAG,EAAEC,OAAO,CAACC,GAAG,CAACC,iBAAiB,IAAI;MACxC,CAAC;IAAA,CAAC,CACH;IAED;AACJ;AACA;AACA;IACIC,QAAQ,EAAE,CACR,QAAQ,EACR,KAAK,EACL;MAAA,OAAO;QACLJ,GAAG,EAAEC,OAAO,CAACC,GAAG,CAACG,iBAAiB,IAAI;MACxC,CAAC;IAAA,CAAC,CACH;IAED;AACJ;AACA;AACA;AACA;IACIC,mBAAmB,EAAE,CACnB,QAAQ,EACR,KAAK,EACLL,OAAO,CAACC,GAAG,CAACK,0BAA0B,IAAIN,OAAO,CAACC,GAAG,CAACM,oBAAoB,CAC3E;IAED;AACJ;AACA;AACA;AACA;AACA;AACA;IACIC,YAAY,EAAE,CACZ,QAAQ,EACR,KAAK,EACLR,OAAO,CAACC,GAAG,CAACQ,mBAAmB,cAC1BT,OAAO,CAACC,GAAG,CAACC,iBAAiB,IAAI,4BAA4B,6BAA0B,CAC7F;IAED;AACJ;AACA;AACA;IACIQ,SAAS,EAAE,CACT,QAAQ,EACR,KAAK,EACLV,OAAO,CAACC,GAAG,CAACU,eAAe,IAAIX,OAAO,CAACC,GAAG,CAACW,yBAAyB,IAAIZ,OAAO,CAACC,GAAG,CAACY,SAAS,CAC9F;IAED;AACJ;AACA;AACA;IACIC,aAAa,EAAE,CACb,QAAQ,EACR,KAAK,EACLd,OAAO,CAACC,GAAG,CAACc,mBAAmB,IAC7Bf,OAAO,CAACC,GAAG,CAACe,6BAA6B,IACzChB,OAAO,CAACC,GAAG,CAACgB,aAAa,CAC5B;IAED;AACJ;AACA;AACA;IACIC,YAAY,EAAE,CACZ,QAAQ,EACR,KAAK,EACLlB,OAAO,CAACC,GAAG,CAACkB,kBAAkB,IAC5BnB,OAAO,CAACC,GAAG,CAACmB,4BAA4B,IACxCpB,OAAO,CAACC,GAAG,CAACoB,YAAY,CAC3B;IAED;AACJ;AACA;AACA;IACIC,KAAK,EAAE,CACL,QAAQ,EACR,KAAK,EACLtB,OAAO,CAACC,GAAG,CAACsB,WAAW,IACrBvB,OAAO,CAACC,GAAG,CAACuB,YAAY,IACxBxB,OAAO,CAACC,GAAG,CAACwB,qBAAqB,IACjCzB,OAAO,CAACC,GAAG,CAACyB,KAAK,CACpB;IAED;AACJ;AACA;AACA;AACA;IACIC,UAAU,EAAE,CAAC,QAAQ,EAAE,KAAK,EAAE,OAAO;EACvC,CAAC;EAEDC,OAAO,EAAE;IACP;AACJ;AACA;AACA;AACA;IACIC,aAAa,EAAE;MACbC,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBACE,IAAI,CAACjC,QAAQ,CAACC,GAAG,IAAI,4BAA4B;MAErD,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;AACA;IACIC,cAAc,EAAE;MACdH,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBACE,IAAI,CAACjC,QAAQ,CAACC,GAAG,IAAI,4BAA4B;MAErD,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;AACA;IACIE,cAAc,EAAE;MACdJ,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBACE,IAAI,CAACjC,QAAQ,CAACC,GAAG,IAAI,4BAA4B;MAErD,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;IACA;AACJ;AACA;AACA;IACIG,QAAQ,EAAE;MACRL,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,OAAO/B,OAAO,CAACC,GAAG,CAACmC,SAAS,cAAO,IAAI,CAACtC,QAAQ,CAACC,GAAG,gCAA6B;MACnF,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;IACIK,SAAS,EAAE;MACTP,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,OAAO/B,OAAO,CAACC,GAAG,CAACqC,UAAU,cAAO,IAAI,CAACxC,QAAQ,CAACC,GAAG,0BAAuB;MAC9E,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;IACIO,SAAS,EAAE;MACTT,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBAAU,IAAI,CAACjC,QAAQ,CAACC,GAAG;MAC7B,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;IACIQ,cAAc,EAAE;MACdV,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBAAU,IAAI,CAAC5B,QAAQ,CAACJ,GAAG,IAAI,4BAA4B;MAC7D,CAAC;MACDiC,KAAK,EAAE;IACT;EACF;AACF,CAAC,CAAC;AAAC,eAEYvC,iBAAiB;AAAA"}
|
package/dist/index.js
CHANGED
|
@@ -1,378 +1,302 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
|
|
3
3
|
var _typeof = require("@babel/runtime-corejs2/helpers/typeof");
|
|
4
|
-
|
|
5
4
|
var _WeakMap = require("@babel/runtime-corejs2/core-js/weak-map");
|
|
6
|
-
|
|
7
5
|
var _Object$defineProperty = require("@babel/runtime-corejs2/core-js/object/define-property");
|
|
8
|
-
|
|
9
6
|
var _Object$getOwnPropertyDescriptor = require("@babel/runtime-corejs2/core-js/object/get-own-property-descriptor");
|
|
10
|
-
|
|
11
7
|
var _interopRequireDefault = require("@babel/runtime-corejs2/helpers/interopRequireDefault");
|
|
12
|
-
|
|
13
8
|
_Object$defineProperty(exports, "__esModule", {
|
|
14
9
|
value: true
|
|
15
10
|
});
|
|
16
|
-
|
|
17
11
|
_Object$defineProperty(exports, "AuthInterceptor", {
|
|
18
12
|
enumerable: true,
|
|
19
13
|
get: function get() {
|
|
20
14
|
return _auth.default;
|
|
21
15
|
}
|
|
22
16
|
});
|
|
23
|
-
|
|
24
17
|
_Object$defineProperty(exports, "Batcher", {
|
|
25
18
|
enumerable: true,
|
|
26
19
|
get: function get() {
|
|
27
20
|
return _batcher.default;
|
|
28
21
|
}
|
|
29
22
|
});
|
|
30
|
-
|
|
31
23
|
_Object$defineProperty(exports, "Credentials", {
|
|
32
24
|
enumerable: true,
|
|
33
25
|
get: function get() {
|
|
34
26
|
return _credentials.Credentials;
|
|
35
27
|
}
|
|
36
28
|
});
|
|
37
|
-
|
|
38
29
|
_Object$defineProperty(exports, "DefaultOptionsInterceptor", {
|
|
39
30
|
enumerable: true,
|
|
40
31
|
get: function get() {
|
|
41
32
|
return _defaultOptions.default;
|
|
42
33
|
}
|
|
43
34
|
});
|
|
44
|
-
|
|
45
35
|
_Object$defineProperty(exports, "EmbargoInterceptor", {
|
|
46
36
|
enumerable: true,
|
|
47
37
|
get: function get() {
|
|
48
38
|
return _embargo.default;
|
|
49
39
|
}
|
|
50
40
|
});
|
|
51
|
-
|
|
52
41
|
_Object$defineProperty(exports, "MemoryStoreAdapter", {
|
|
53
42
|
enumerable: true,
|
|
54
43
|
get: function get() {
|
|
55
44
|
return _storage.MemoryStoreAdapter;
|
|
56
45
|
}
|
|
57
46
|
});
|
|
58
|
-
|
|
59
47
|
_Object$defineProperty(exports, "NetworkTimingInterceptor", {
|
|
60
48
|
enumerable: true,
|
|
61
49
|
get: function get() {
|
|
62
50
|
return _networkTiming.default;
|
|
63
51
|
}
|
|
64
52
|
});
|
|
65
|
-
|
|
66
53
|
_Object$defineProperty(exports, "NotFoundError", {
|
|
67
54
|
enumerable: true,
|
|
68
55
|
get: function get() {
|
|
69
56
|
return _storage.NotFoundError;
|
|
70
57
|
}
|
|
71
58
|
});
|
|
72
|
-
|
|
73
59
|
_Object$defineProperty(exports, "Page", {
|
|
74
60
|
enumerable: true,
|
|
75
61
|
get: function get() {
|
|
76
62
|
return _page.default;
|
|
77
63
|
}
|
|
78
64
|
});
|
|
79
|
-
|
|
80
65
|
_Object$defineProperty(exports, "PayloadTransformerInterceptor", {
|
|
81
66
|
enumerable: true,
|
|
82
67
|
get: function get() {
|
|
83
68
|
return _payloadTransformer.default;
|
|
84
69
|
}
|
|
85
70
|
});
|
|
86
|
-
|
|
87
71
|
_Object$defineProperty(exports, "RateLimitInterceptor", {
|
|
88
72
|
enumerable: true,
|
|
89
73
|
get: function get() {
|
|
90
74
|
return _rateLimit.default;
|
|
91
75
|
}
|
|
92
76
|
});
|
|
93
|
-
|
|
94
77
|
_Object$defineProperty(exports, "RedirectInterceptor", {
|
|
95
78
|
enumerable: true,
|
|
96
79
|
get: function get() {
|
|
97
80
|
return _redirect.default;
|
|
98
81
|
}
|
|
99
82
|
});
|
|
100
|
-
|
|
101
83
|
_Object$defineProperty(exports, "RequestEventInterceptor", {
|
|
102
84
|
enumerable: true,
|
|
103
85
|
get: function get() {
|
|
104
86
|
return _requestEvent.default;
|
|
105
87
|
}
|
|
106
88
|
});
|
|
107
|
-
|
|
108
89
|
_Object$defineProperty(exports, "RequestLoggerInterceptor", {
|
|
109
90
|
enumerable: true,
|
|
110
91
|
get: function get() {
|
|
111
92
|
return _requestLogger.default;
|
|
112
93
|
}
|
|
113
94
|
});
|
|
114
|
-
|
|
115
95
|
_Object$defineProperty(exports, "RequestTimingInterceptor", {
|
|
116
96
|
enumerable: true,
|
|
117
97
|
get: function get() {
|
|
118
98
|
return _requestTiming.default;
|
|
119
99
|
}
|
|
120
100
|
});
|
|
121
|
-
|
|
122
101
|
_Object$defineProperty(exports, "ResponseLoggerInterceptor", {
|
|
123
102
|
enumerable: true,
|
|
124
103
|
get: function get() {
|
|
125
104
|
return _responseLogger.default;
|
|
126
105
|
}
|
|
127
106
|
});
|
|
128
|
-
|
|
129
107
|
_Object$defineProperty(exports, "ServerErrorInterceptor", {
|
|
130
108
|
enumerable: true,
|
|
131
109
|
get: function get() {
|
|
132
110
|
return _services.ServerErrorInterceptor;
|
|
133
111
|
}
|
|
134
112
|
});
|
|
135
|
-
|
|
136
113
|
_Object$defineProperty(exports, "ServiceCatalog", {
|
|
137
114
|
enumerable: true,
|
|
138
115
|
get: function get() {
|
|
139
116
|
return _services.ServiceCatalog;
|
|
140
117
|
}
|
|
141
118
|
});
|
|
142
|
-
|
|
143
119
|
_Object$defineProperty(exports, "ServiceHost", {
|
|
144
120
|
enumerable: true,
|
|
145
121
|
get: function get() {
|
|
146
122
|
return _services.ServiceHost;
|
|
147
123
|
}
|
|
148
124
|
});
|
|
149
|
-
|
|
150
125
|
_Object$defineProperty(exports, "ServiceInterceptor", {
|
|
151
126
|
enumerable: true,
|
|
152
127
|
get: function get() {
|
|
153
128
|
return _services.ServiceInterceptor;
|
|
154
129
|
}
|
|
155
130
|
});
|
|
156
|
-
|
|
157
131
|
_Object$defineProperty(exports, "ServiceRegistry", {
|
|
158
132
|
enumerable: true,
|
|
159
133
|
get: function get() {
|
|
160
134
|
return _services.ServiceRegistry;
|
|
161
135
|
}
|
|
162
136
|
});
|
|
163
|
-
|
|
164
137
|
_Object$defineProperty(exports, "ServiceState", {
|
|
165
138
|
enumerable: true,
|
|
166
139
|
get: function get() {
|
|
167
140
|
return _services.ServiceState;
|
|
168
141
|
}
|
|
169
142
|
});
|
|
170
|
-
|
|
171
143
|
_Object$defineProperty(exports, "ServiceUrl", {
|
|
172
144
|
enumerable: true,
|
|
173
145
|
get: function get() {
|
|
174
146
|
return _services.ServiceUrl;
|
|
175
147
|
}
|
|
176
148
|
});
|
|
177
|
-
|
|
178
149
|
_Object$defineProperty(exports, "Services", {
|
|
179
150
|
enumerable: true,
|
|
180
151
|
get: function get() {
|
|
181
152
|
return _services.Services;
|
|
182
153
|
}
|
|
183
154
|
});
|
|
184
|
-
|
|
185
155
|
_Object$defineProperty(exports, "StatelessWebexPlugin", {
|
|
186
156
|
enumerable: true,
|
|
187
157
|
get: function get() {
|
|
188
158
|
return _statelessWebexPlugin.default;
|
|
189
159
|
}
|
|
190
160
|
});
|
|
191
|
-
|
|
192
161
|
_Object$defineProperty(exports, "StorageError", {
|
|
193
162
|
enumerable: true,
|
|
194
163
|
get: function get() {
|
|
195
164
|
return _storage.StorageError;
|
|
196
165
|
}
|
|
197
166
|
});
|
|
198
|
-
|
|
199
167
|
_Object$defineProperty(exports, "Token", {
|
|
200
168
|
enumerable: true,
|
|
201
169
|
get: function get() {
|
|
202
170
|
return _credentials.Token;
|
|
203
171
|
}
|
|
204
172
|
});
|
|
205
|
-
|
|
206
173
|
_Object$defineProperty(exports, "UserAgentInterceptor", {
|
|
207
174
|
enumerable: true,
|
|
208
175
|
get: function get() {
|
|
209
176
|
return _userAgent.default;
|
|
210
177
|
}
|
|
211
178
|
});
|
|
212
|
-
|
|
213
179
|
_Object$defineProperty(exports, "WebexHttpError", {
|
|
214
180
|
enumerable: true,
|
|
215
181
|
get: function get() {
|
|
216
182
|
return _webexHttpError.default;
|
|
217
183
|
}
|
|
218
184
|
});
|
|
219
|
-
|
|
220
185
|
_Object$defineProperty(exports, "WebexPlugin", {
|
|
221
186
|
enumerable: true,
|
|
222
187
|
get: function get() {
|
|
223
188
|
return _webexPlugin.default;
|
|
224
189
|
}
|
|
225
190
|
});
|
|
226
|
-
|
|
227
191
|
_Object$defineProperty(exports, "WebexTrackingIdInterceptor", {
|
|
228
192
|
enumerable: true,
|
|
229
193
|
get: function get() {
|
|
230
194
|
return _webexTrackingId.default;
|
|
231
195
|
}
|
|
232
196
|
});
|
|
233
|
-
|
|
234
197
|
_Object$defineProperty(exports, "WebexUserAgentInterceptor", {
|
|
235
198
|
enumerable: true,
|
|
236
199
|
get: function get() {
|
|
237
200
|
return _webexUserAgent.default;
|
|
238
201
|
}
|
|
239
202
|
});
|
|
240
|
-
|
|
241
203
|
_Object$defineProperty(exports, "config", {
|
|
242
204
|
enumerable: true,
|
|
243
205
|
get: function get() {
|
|
244
206
|
return _config.default;
|
|
245
207
|
}
|
|
246
208
|
});
|
|
247
|
-
|
|
248
209
|
_Object$defineProperty(exports, "default", {
|
|
249
210
|
enumerable: true,
|
|
250
211
|
get: function get() {
|
|
251
212
|
return _webexCore.default;
|
|
252
213
|
}
|
|
253
214
|
});
|
|
254
|
-
|
|
255
215
|
_Object$defineProperty(exports, "filterScope", {
|
|
256
216
|
enumerable: true,
|
|
257
217
|
get: function get() {
|
|
258
218
|
return _credentials.filterScope;
|
|
259
219
|
}
|
|
260
220
|
});
|
|
261
|
-
|
|
262
221
|
_Object$defineProperty(exports, "grantErrors", {
|
|
263
222
|
enumerable: true,
|
|
264
223
|
get: function get() {
|
|
265
224
|
return _credentials.grantErrors;
|
|
266
225
|
}
|
|
267
226
|
});
|
|
268
|
-
|
|
269
227
|
_Object$defineProperty(exports, "makeWebexPluginStore", {
|
|
270
228
|
enumerable: true,
|
|
271
229
|
get: function get() {
|
|
272
230
|
return _storage.makeWebexPluginStore;
|
|
273
231
|
}
|
|
274
232
|
});
|
|
275
|
-
|
|
276
233
|
_Object$defineProperty(exports, "makeWebexStore", {
|
|
277
234
|
enumerable: true,
|
|
278
235
|
get: function get() {
|
|
279
236
|
return _storage.makeWebexStore;
|
|
280
237
|
}
|
|
281
238
|
});
|
|
282
|
-
|
|
283
239
|
_Object$defineProperty(exports, "persist", {
|
|
284
240
|
enumerable: true,
|
|
285
241
|
get: function get() {
|
|
286
242
|
return _storage.persist;
|
|
287
243
|
}
|
|
288
244
|
});
|
|
289
|
-
|
|
290
245
|
_Object$defineProperty(exports, "registerInternalPlugin", {
|
|
291
246
|
enumerable: true,
|
|
292
247
|
get: function get() {
|
|
293
248
|
return _webexCore.registerInternalPlugin;
|
|
294
249
|
}
|
|
295
250
|
});
|
|
296
|
-
|
|
297
251
|
_Object$defineProperty(exports, "registerPlugin", {
|
|
298
252
|
enumerable: true,
|
|
299
253
|
get: function get() {
|
|
300
254
|
return _webexCore.registerPlugin;
|
|
301
255
|
}
|
|
302
256
|
});
|
|
303
|
-
|
|
304
257
|
_Object$defineProperty(exports, "serviceConstants", {
|
|
305
258
|
enumerable: true,
|
|
306
259
|
get: function get() {
|
|
307
260
|
return _services.constants;
|
|
308
261
|
}
|
|
309
262
|
});
|
|
310
|
-
|
|
311
263
|
_Object$defineProperty(exports, "sortScope", {
|
|
312
264
|
enumerable: true,
|
|
313
265
|
get: function get() {
|
|
314
266
|
return _credentials.sortScope;
|
|
315
267
|
}
|
|
316
268
|
});
|
|
317
|
-
|
|
318
269
|
_Object$defineProperty(exports, "waitForValue", {
|
|
319
270
|
enumerable: true,
|
|
320
271
|
get: function get() {
|
|
321
272
|
return _storage.waitForValue;
|
|
322
273
|
}
|
|
323
274
|
});
|
|
324
|
-
|
|
325
275
|
require("./plugins/logger");
|
|
326
|
-
|
|
327
276
|
var _credentials = require("./lib/credentials");
|
|
328
|
-
|
|
329
277
|
var _services = require("./lib/services");
|
|
330
|
-
|
|
331
278
|
var _storage = require("./lib/storage");
|
|
332
|
-
|
|
333
279
|
var _webexCore = _interopRequireWildcard(require("./webex-core"));
|
|
334
|
-
|
|
335
280
|
var _webexHttpError = _interopRequireDefault(require("./lib/webex-http-error"));
|
|
336
|
-
|
|
337
281
|
var _statelessWebexPlugin = _interopRequireDefault(require("./lib/stateless-webex-plugin"));
|
|
338
|
-
|
|
339
282
|
var _webexPlugin = _interopRequireDefault(require("./lib/webex-plugin"));
|
|
340
|
-
|
|
341
283
|
var _auth = _interopRequireDefault(require("./interceptors/auth"));
|
|
342
|
-
|
|
343
284
|
var _networkTiming = _interopRequireDefault(require("./interceptors/network-timing"));
|
|
344
|
-
|
|
345
285
|
var _payloadTransformer = _interopRequireDefault(require("./interceptors/payload-transformer"));
|
|
346
|
-
|
|
347
286
|
var _redirect = _interopRequireDefault(require("./interceptors/redirect"));
|
|
348
|
-
|
|
349
287
|
var _responseLogger = _interopRequireDefault(require("./interceptors/response-logger"));
|
|
350
|
-
|
|
351
288
|
var _requestEvent = _interopRequireDefault(require("./interceptors/request-event"));
|
|
352
|
-
|
|
353
289
|
var _requestLogger = _interopRequireDefault(require("./interceptors/request-logger"));
|
|
354
|
-
|
|
355
290
|
var _requestTiming = _interopRequireDefault(require("./interceptors/request-timing"));
|
|
356
|
-
|
|
357
291
|
var _userAgent = _interopRequireDefault(require("./interceptors/user-agent"));
|
|
358
|
-
|
|
359
292
|
var _webexTrackingId = _interopRequireDefault(require("./interceptors/webex-tracking-id"));
|
|
360
|
-
|
|
361
293
|
var _webexUserAgent = _interopRequireDefault(require("./interceptors/webex-user-agent"));
|
|
362
|
-
|
|
363
294
|
var _rateLimit = _interopRequireDefault(require("./interceptors/rate-limit"));
|
|
364
|
-
|
|
365
295
|
var _embargo = _interopRequireDefault(require("./interceptors/embargo"));
|
|
366
|
-
|
|
367
296
|
var _defaultOptions = _interopRequireDefault(require("./interceptors/default-options"));
|
|
368
|
-
|
|
369
297
|
var _batcher = _interopRequireDefault(require("./lib/batcher"));
|
|
370
|
-
|
|
371
298
|
var _page = _interopRequireDefault(require("./lib/page"));
|
|
372
|
-
|
|
373
299
|
var _config = _interopRequireDefault(require("./config"));
|
|
374
|
-
|
|
375
300
|
function _getRequireWildcardCache(nodeInterop) { if (typeof _WeakMap !== "function") return null; var cacheBabelInterop = new _WeakMap(); var cacheNodeInterop = new _WeakMap(); return (_getRequireWildcardCache = function _getRequireWildcardCache(nodeInterop) { return nodeInterop ? cacheNodeInterop : cacheBabelInterop; })(nodeInterop); }
|
|
376
|
-
|
|
377
301
|
function _interopRequireWildcard(obj, nodeInterop) { if (!nodeInterop && obj && obj.__esModule) { return obj; } if (obj === null || _typeof(obj) !== "object" && typeof obj !== "function") { return { default: obj }; } var cache = _getRequireWildcardCache(nodeInterop); if (cache && cache.has(obj)) { return cache.get(obj); } var newObj = {}; var hasPropertyDescriptor = _Object$defineProperty && _Object$getOwnPropertyDescriptor; for (var key in obj) { if (key !== "default" && Object.prototype.hasOwnProperty.call(obj, key)) { var desc = hasPropertyDescriptor ? _Object$getOwnPropertyDescriptor(obj, key) : null; if (desc && (desc.get || desc.set)) { _Object$defineProperty(newObj, key, desc); } else { newObj[key] = obj[key]; } } } newObj.default = obj; if (cache) { cache.set(obj, newObj); } return newObj; }
|
|
378
302
|
//# sourceMappingURL=index.js.map
|
package/dist/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"names":[],"sources":["index.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n *\n * Services is currently a part of webex-core due to how the contents of\n * the original internal-plugin-services needed to be accessed when webex-core\n * is initialized. As a plugin outside of webex-core, it would initialize after\n * credentials, causing all requests prior to its initialization to fail\n * federation requirements, and instead send requests to the environmentally-\n * assigned urls.\n */\n\nimport './plugins/logger';\nimport './lib/credentials';\nimport './lib/services';\n\nexport {Credentials, filterScope, grantErrors, sortScope, Token} from './lib/credentials';\n\nexport {\n constants as serviceConstants,\n ServiceCatalog,\n ServiceRegistry,\n ServiceState,\n ServiceInterceptor,\n ServerErrorInterceptor,\n Services,\n ServiceHost,\n ServiceUrl,\n} from './lib/services';\n\nexport {\n makeWebexStore,\n makeWebexPluginStore,\n MemoryStoreAdapter,\n NotFoundError,\n persist,\n StorageError,\n waitForValue,\n} from './lib/storage';\n\nexport {default, registerPlugin, registerInternalPlugin} from './webex-core';\n\nexport {default as WebexHttpError} from './lib/webex-http-error';\nexport {default as StatelessWebexPlugin} from './lib/stateless-webex-plugin';\nexport {default as WebexPlugin} from './lib/webex-plugin';\nexport {default as AuthInterceptor} from './interceptors/auth';\nexport {default as NetworkTimingInterceptor} from './interceptors/network-timing';\nexport {default as PayloadTransformerInterceptor} from './interceptors/payload-transformer';\nexport {default as RedirectInterceptor} from './interceptors/redirect';\nexport {default as ResponseLoggerInterceptor} from './interceptors/response-logger';\nexport {default as RequestEventInterceptor} from './interceptors/request-event';\nexport {default as RequestLoggerInterceptor} from './interceptors/request-logger';\nexport {default as RequestTimingInterceptor} from './interceptors/request-timing';\nexport {default as UserAgentInterceptor} from './interceptors/user-agent';\nexport {default as WebexTrackingIdInterceptor} from './interceptors/webex-tracking-id';\nexport {default as WebexUserAgentInterceptor} from './interceptors/webex-user-agent';\nexport {default as RateLimitInterceptor} from './interceptors/rate-limit';\nexport {default as EmbargoInterceptor} from './interceptors/embargo';\nexport {default as DefaultOptionsInterceptor} from './interceptors/default-options';\n\nexport {default as Batcher} from './lib/batcher';\nexport {default as Page} from './lib/page';\nexport {default as config} from './config';\n"],"mappings":"
|
|
1
|
+
{"version":3,"names":[],"sources":["index.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n *\n * Services is currently a part of webex-core due to how the contents of\n * the original internal-plugin-services needed to be accessed when webex-core\n * is initialized. As a plugin outside of webex-core, it would initialize after\n * credentials, causing all requests prior to its initialization to fail\n * federation requirements, and instead send requests to the environmentally-\n * assigned urls.\n */\n\nimport './plugins/logger';\nimport './lib/credentials';\nimport './lib/services';\n\nexport {Credentials, filterScope, grantErrors, sortScope, Token} from './lib/credentials';\n\nexport {\n constants as serviceConstants,\n ServiceCatalog,\n ServiceRegistry,\n ServiceState,\n ServiceInterceptor,\n ServerErrorInterceptor,\n Services,\n ServiceHost,\n ServiceUrl,\n} from './lib/services';\n\nexport {\n makeWebexStore,\n makeWebexPluginStore,\n MemoryStoreAdapter,\n NotFoundError,\n persist,\n StorageError,\n waitForValue,\n} from './lib/storage';\n\nexport {default, registerPlugin, registerInternalPlugin} from './webex-core';\n\nexport {default as WebexHttpError} from './lib/webex-http-error';\nexport {default as StatelessWebexPlugin} from './lib/stateless-webex-plugin';\nexport {default as WebexPlugin} from './lib/webex-plugin';\nexport {default as AuthInterceptor} from './interceptors/auth';\nexport {default as NetworkTimingInterceptor} from './interceptors/network-timing';\nexport {default as PayloadTransformerInterceptor} from './interceptors/payload-transformer';\nexport {default as RedirectInterceptor} from './interceptors/redirect';\nexport {default as ResponseLoggerInterceptor} from './interceptors/response-logger';\nexport {default as RequestEventInterceptor} from './interceptors/request-event';\nexport {default as RequestLoggerInterceptor} from './interceptors/request-logger';\nexport {default as RequestTimingInterceptor} from './interceptors/request-timing';\nexport {default as UserAgentInterceptor} from './interceptors/user-agent';\nexport {default as WebexTrackingIdInterceptor} from './interceptors/webex-tracking-id';\nexport {default as WebexUserAgentInterceptor} from './interceptors/webex-user-agent';\nexport {default as RateLimitInterceptor} from './interceptors/rate-limit';\nexport {default as EmbargoInterceptor} from './interceptors/embargo';\nexport {default as DefaultOptionsInterceptor} from './interceptors/default-options';\n\nexport {default as Batcher} from './lib/batcher';\nexport {default as Page} from './lib/page';\nexport {default as config} from './config';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAWA;AACA;AACA;AAgBA;AAUA;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AAEA;AACA;AACA;AAA2C;AAAA"}
|