@webex/webex-core 3.0.0-beta.15 → 3.0.0-beta.150

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (105) hide show
  1. package/dist/config.js +1 -11
  2. package/dist/config.js.map +1 -1
  3. package/dist/credentials-config.js +0 -20
  4. package/dist/credentials-config.js.map +1 -1
  5. package/dist/index.js +0 -76
  6. package/dist/index.js.map +1 -1
  7. package/dist/interceptors/auth.js +22 -55
  8. package/dist/interceptors/auth.js.map +1 -1
  9. package/dist/interceptors/default-options.js +0 -20
  10. package/dist/interceptors/default-options.js.map +1 -1
  11. package/dist/interceptors/embargo.js +0 -21
  12. package/dist/interceptors/embargo.js.map +1 -1
  13. package/dist/interceptors/network-timing.js +2 -21
  14. package/dist/interceptors/network-timing.js.map +1 -1
  15. package/dist/interceptors/payload-transformer.js +2 -22
  16. package/dist/interceptors/payload-transformer.js.map +1 -1
  17. package/dist/interceptors/rate-limit.js +21 -53
  18. package/dist/interceptors/rate-limit.js.map +1 -1
  19. package/dist/interceptors/redirect.js +4 -33
  20. package/dist/interceptors/redirect.js.map +1 -1
  21. package/dist/interceptors/request-event.js +3 -30
  22. package/dist/interceptors/request-event.js.map +1 -1
  23. package/dist/interceptors/request-logger.js +1 -30
  24. package/dist/interceptors/request-logger.js.map +1 -1
  25. package/dist/interceptors/request-timing.js +3 -22
  26. package/dist/interceptors/request-timing.js.map +1 -1
  27. package/dist/interceptors/response-logger.js +2 -31
  28. package/dist/interceptors/response-logger.js.map +1 -1
  29. package/dist/interceptors/user-agent.js +2 -29
  30. package/dist/interceptors/user-agent.js.map +1 -1
  31. package/dist/interceptors/webex-tracking-id.js +5 -28
  32. package/dist/interceptors/webex-tracking-id.js.map +1 -1
  33. package/dist/interceptors/webex-user-agent.js +5 -38
  34. package/dist/interceptors/webex-user-agent.js.map +1 -1
  35. package/dist/lib/batcher.js +3 -51
  36. package/dist/lib/batcher.js.map +1 -1
  37. package/dist/lib/credentials/credentials.js +44 -123
  38. package/dist/lib/credentials/credentials.js.map +1 -1
  39. package/dist/lib/credentials/grant-errors.js +0 -49
  40. package/dist/lib/credentials/grant-errors.js.map +1 -1
  41. package/dist/lib/credentials/index.js +1 -13
  42. package/dist/lib/credentials/index.js.map +1 -1
  43. package/dist/lib/credentials/scope.js +1 -7
  44. package/dist/lib/credentials/scope.js.map +1 -1
  45. package/dist/lib/credentials/token-collection.js +1 -7
  46. package/dist/lib/credentials/token-collection.js.map +1 -1
  47. package/dist/lib/credentials/token.js +29 -122
  48. package/dist/lib/credentials/token.js.map +1 -1
  49. package/dist/lib/page.js +12 -27
  50. package/dist/lib/page.js.map +1 -1
  51. package/dist/lib/services/constants.js +0 -2
  52. package/dist/lib/services/constants.js.map +1 -1
  53. package/dist/lib/services/index.js +1 -28
  54. package/dist/lib/services/index.js.map +1 -1
  55. package/dist/lib/services/interceptors/server-error.js +0 -21
  56. package/dist/lib/services/interceptors/server-error.js.map +1 -1
  57. package/dist/lib/services/interceptors/service.js +11 -33
  58. package/dist/lib/services/interceptors/service.js.map +1 -1
  59. package/dist/lib/services/metrics.js +0 -2
  60. package/dist/lib/services/metrics.js.map +1 -1
  61. package/dist/lib/services/service-catalog.js +10 -90
  62. package/dist/lib/services/service-catalog.js.map +1 -1
  63. package/dist/lib/services/service-fed-ramp.js +0 -2
  64. package/dist/lib/services/service-fed-ramp.js.map +1 -1
  65. package/dist/lib/services/service-host.js +41 -56
  66. package/dist/lib/services/service-host.js.map +1 -1
  67. package/dist/lib/services/service-registry.js +78 -90
  68. package/dist/lib/services/service-registry.js.map +1 -1
  69. package/dist/lib/services/service-state.js +3 -15
  70. package/dist/lib/services/service-state.js.map +1 -1
  71. package/dist/lib/services/service-url.js +4 -25
  72. package/dist/lib/services/service-url.js.map +1 -1
  73. package/dist/lib/services/services.js +116 -234
  74. package/dist/lib/services/services.js.map +1 -1
  75. package/dist/lib/stateless-webex-plugin.js +5 -28
  76. package/dist/lib/stateless-webex-plugin.js.map +1 -1
  77. package/dist/lib/storage/decorators.js +19 -62
  78. package/dist/lib/storage/decorators.js.map +1 -1
  79. package/dist/lib/storage/errors.js +0 -23
  80. package/dist/lib/storage/errors.js.map +1 -1
  81. package/dist/lib/storage/index.js +0 -14
  82. package/dist/lib/storage/index.js.map +1 -1
  83. package/dist/lib/storage/make-webex-plugin-store.js +11 -41
  84. package/dist/lib/storage/make-webex-plugin-store.js.map +1 -1
  85. package/dist/lib/storage/make-webex-store.js +8 -30
  86. package/dist/lib/storage/make-webex-store.js.map +1 -1
  87. package/dist/lib/storage/memory-store-adapter.js +1 -19
  88. package/dist/lib/storage/memory-store-adapter.js.map +1 -1
  89. package/dist/lib/webex-core-plugin-mixin.js +9 -29
  90. package/dist/lib/webex-core-plugin-mixin.js.map +1 -1
  91. package/dist/lib/webex-http-error.js +1 -31
  92. package/dist/lib/webex-http-error.js.map +1 -1
  93. package/dist/lib/webex-internal-core-plugin-mixin.js +9 -29
  94. package/dist/lib/webex-internal-core-plugin-mixin.js.map +1 -1
  95. package/dist/lib/webex-plugin.js +6 -40
  96. package/dist/lib/webex-plugin.js.map +1 -1
  97. package/dist/plugins/logger.js +3 -17
  98. package/dist/plugins/logger.js.map +1 -1
  99. package/dist/webex-core.js +79 -203
  100. package/dist/webex-core.js.map +1 -1
  101. package/dist/webex-internal-core.js +0 -10
  102. package/dist/webex-internal-core.js.map +1 -1
  103. package/package.json +14 -14
  104. package/src/lib/credentials/credentials.js +19 -0
  105. package/test/unit/spec/credentials/credentials.js +28 -0
package/dist/config.js CHANGED
@@ -1,23 +1,16 @@
1
1
  "use strict";
2
2
 
3
3
  var _Object$defineProperty = require("@babel/runtime-corejs2/core-js/object/define-property");
4
-
5
4
  var _interopRequireDefault = require("@babel/runtime-corejs2/helpers/interopRequireDefault");
6
-
7
5
  _Object$defineProperty(exports, "__esModule", {
8
6
  value: true
9
7
  });
10
-
11
8
  exports.default = void 0;
12
-
13
9
  var _storage = require("./lib/storage");
14
-
15
10
  var _credentialsConfig = _interopRequireDefault(require("./credentials-config"));
16
-
17
11
  /*!
18
12
  * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.
19
13
  */
20
-
21
14
  /* eslint camelcase: [0] */
22
15
  var _default = {
23
16
  maxAppLevelRedirects: 10,
@@ -43,7 +36,6 @@ var _default = {
43
36
  * @type {string}
44
37
  */
45
38
  hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',
46
-
47
39
  /**
48
40
  * The u2c discovery url
49
41
  *
@@ -51,19 +43,17 @@ var _default = {
51
43
  */
52
44
  u2c: process.env.U2C_SERVICE_URL || 'https://u2c.wbx2.com/u2c/api/v1'
53
45
  },
54
-
55
46
  /**
56
47
  * When true, considers all urls in `allowedDomains` as safe for auth tokens
57
48
  *
58
49
  * @type {boolean}
59
50
  */
60
51
  validateDomains: true,
61
-
62
52
  /**
63
53
  * services that don't need auth validation
64
54
  */
65
- servicesNotNeedValidation: ['webex-appapi-service'],
66
55
 
56
+ servicesNotNeedValidation: ['webex-appapi-service'],
67
57
  /**
68
58
  * Contains a list of allowed domain host addresses.
69
59
  *
@@ -1 +1 @@
1
- {"version":3,"names":["maxAppLevelRedirects","maxLocusRedirects","maxAuthenticationReplays","maxReconnectAttempts","onBeforeLogout","trackingIdPrefix","trackingIdSuffix","AlternateLogger","undefined","credentials","CredentialsConfig","fedramp","process","env","ENABLE_FEDRAMP","services","discovery","hydra","HYDRA_SERVICE_URL","u2c","U2C_SERVICE_URL","validateDomains","servicesNotNeedValidation","allowedDomains","device","preDiscoveryServices","hydraServiceUrl","metrics","type","payloadTransformer","predicates","transforms","storage","boundedAdapter","MemoryStoreAdapter","unboundedAdapter"],"sources":["config.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\n/* eslint camelcase: [0] */\n\nimport {MemoryStoreAdapter} from './lib/storage';\nimport CredentialsConfig from './credentials-config';\n\nexport default {\n maxAppLevelRedirects: 10,\n maxLocusRedirects: 5,\n maxAuthenticationReplays: 1,\n maxReconnectAttempts: 1,\n onBeforeLogout: [],\n trackingIdPrefix: 'webex-js-sdk',\n trackingIdSuffix: '',\n AlternateLogger: undefined,\n credentials: new CredentialsConfig(),\n fedramp: process.env.ENABLE_FEDRAMP || false,\n services: {\n /**\n * A list of services that are available prior to catalog collection.\n *\n * @type {Object}\n */\n discovery: {\n /**\n * The hydra discovery url.\n *\n * @type {string}\n */\n hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n\n /**\n * The u2c discovery url\n *\n * @type {string}\n */\n u2c: process.env.U2C_SERVICE_URL || 'https://u2c.wbx2.com/u2c/api/v1',\n },\n\n /**\n * When true, considers all urls in `allowedDomains` as safe for auth tokens\n *\n * @type {boolean}\n */\n validateDomains: true,\n\n /**\n * services that don't need auth validation\n */\n\n servicesNotNeedValidation: ['webex-appapi-service'],\n\n /**\n * Contains a list of allowed domain host addresses.\n *\n * @type {Array<string>}\n */\n allowedDomains: [\n 'wbx2.com',\n 'ciscospark.com',\n 'webex.com',\n 'webexapis.com',\n 'broadcloudpbx.com',\n 'broadcloud.eu',\n 'broadcloud.com.au',\n 'broadcloudpbx.net',\n ],\n },\n device: {\n preDiscoveryServices: {\n hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n hydraServiceUrl: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n },\n validateDomains: true,\n },\n metrics: {\n type: ['behavioral', 'operational'],\n },\n payloadTransformer: {\n predicates: [],\n transforms: [],\n },\n storage: {\n boundedAdapter: MemoryStoreAdapter,\n unboundedAdapter: MemoryStoreAdapter,\n },\n};\n"],"mappings":";;;;;;;;;;;;AAMA;;AACA;;AAPA;AACA;AACA;;AAEA;eAKe;EACbA,oBAAoB,EAAE,EADT;EAEbC,iBAAiB,EAAE,CAFN;EAGbC,wBAAwB,EAAE,CAHb;EAIbC,oBAAoB,EAAE,CAJT;EAKbC,cAAc,EAAE,EALH;EAMbC,gBAAgB,EAAE,cANL;EAObC,gBAAgB,EAAE,EAPL;EAQbC,eAAe,EAAEC,SARJ;EASbC,WAAW,EAAE,IAAIC,0BAAJ,EATA;EAUbC,OAAO,EAAEC,OAAO,CAACC,GAAR,CAAYC,cAAZ,IAA8B,KAV1B;EAWbC,QAAQ,EAAE;IACR;AACJ;AACA;AACA;AACA;IACIC,SAAS,EAAE;MACT;AACN;AACA;AACA;AACA;MACMC,KAAK,EAAEL,OAAO,CAACC,GAAR,CAAYK,iBAAZ,IAAiC,+BAN/B;;MAQT;AACN;AACA;AACA;AACA;MACMC,GAAG,EAAEP,OAAO,CAACC,GAAR,CAAYO,eAAZ,IAA+B;IAb3B,CANH;;IAsBR;AACJ;AACA;AACA;AACA;IACIC,eAAe,EAAE,IA3BT;;IA6BR;AACJ;AACA;IAEIC,yBAAyB,EAAE,CAAC,sBAAD,CAjCnB;;IAmCR;AACJ;AACA;AACA;AACA;IACIC,cAAc,EAAE,CACd,UADc,EAEd,gBAFc,EAGd,WAHc,EAId,eAJc,EAKd,mBALc,EAMd,eANc,EAOd,mBAPc,EAQd,mBARc;EAxCR,CAXG;EA8DbC,MAAM,EAAE;IACNC,oBAAoB,EAAE;MACpBR,KAAK,EAAEL,OAAO,CAACC,GAAR,CAAYK,iBAAZ,IAAiC,+BADpB;MAEpBQ,eAAe,EAAEd,OAAO,CAACC,GAAR,CAAYK,iBAAZ,IAAiC;IAF9B,CADhB;IAKNG,eAAe,EAAE;EALX,CA9DK;EAqEbM,OAAO,EAAE;IACPC,IAAI,EAAE,CAAC,YAAD,EAAe,aAAf;EADC,CArEI;EAwEbC,kBAAkB,EAAE;IAClBC,UAAU,EAAE,EADM;IAElBC,UAAU,EAAE;EAFM,CAxEP;EA4EbC,OAAO,EAAE;IACPC,cAAc,EAAEC,2BADT;IAEPC,gBAAgB,EAAED;EAFX;AA5EI,C"}
1
+ {"version":3,"names":["maxAppLevelRedirects","maxLocusRedirects","maxAuthenticationReplays","maxReconnectAttempts","onBeforeLogout","trackingIdPrefix","trackingIdSuffix","AlternateLogger","undefined","credentials","CredentialsConfig","fedramp","process","env","ENABLE_FEDRAMP","services","discovery","hydra","HYDRA_SERVICE_URL","u2c","U2C_SERVICE_URL","validateDomains","servicesNotNeedValidation","allowedDomains","device","preDiscoveryServices","hydraServiceUrl","metrics","type","payloadTransformer","predicates","transforms","storage","boundedAdapter","MemoryStoreAdapter","unboundedAdapter"],"sources":["config.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n */\n\n/* eslint camelcase: [0] */\n\nimport {MemoryStoreAdapter} from './lib/storage';\nimport CredentialsConfig from './credentials-config';\n\nexport default {\n maxAppLevelRedirects: 10,\n maxLocusRedirects: 5,\n maxAuthenticationReplays: 1,\n maxReconnectAttempts: 1,\n onBeforeLogout: [],\n trackingIdPrefix: 'webex-js-sdk',\n trackingIdSuffix: '',\n AlternateLogger: undefined,\n credentials: new CredentialsConfig(),\n fedramp: process.env.ENABLE_FEDRAMP || false,\n services: {\n /**\n * A list of services that are available prior to catalog collection.\n *\n * @type {Object}\n */\n discovery: {\n /**\n * The hydra discovery url.\n *\n * @type {string}\n */\n hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n\n /**\n * The u2c discovery url\n *\n * @type {string}\n */\n u2c: process.env.U2C_SERVICE_URL || 'https://u2c.wbx2.com/u2c/api/v1',\n },\n\n /**\n * When true, considers all urls in `allowedDomains` as safe for auth tokens\n *\n * @type {boolean}\n */\n validateDomains: true,\n\n /**\n * services that don't need auth validation\n */\n\n servicesNotNeedValidation: ['webex-appapi-service'],\n\n /**\n * Contains a list of allowed domain host addresses.\n *\n * @type {Array<string>}\n */\n allowedDomains: [\n 'wbx2.com',\n 'ciscospark.com',\n 'webex.com',\n 'webexapis.com',\n 'broadcloudpbx.com',\n 'broadcloud.eu',\n 'broadcloud.com.au',\n 'broadcloudpbx.net',\n ],\n },\n device: {\n preDiscoveryServices: {\n hydra: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n hydraServiceUrl: process.env.HYDRA_SERVICE_URL || 'https://api.ciscospark.com/v1',\n },\n validateDomains: true,\n },\n metrics: {\n type: ['behavioral', 'operational'],\n },\n payloadTransformer: {\n predicates: [],\n transforms: [],\n },\n storage: {\n boundedAdapter: MemoryStoreAdapter,\n unboundedAdapter: MemoryStoreAdapter,\n },\n};\n"],"mappings":";;;;;;;;AAMA;AACA;AAPA;AACA;AACA;AAEA;AAAA,eAKe;EACbA,oBAAoB,EAAE,EAAE;EACxBC,iBAAiB,EAAE,CAAC;EACpBC,wBAAwB,EAAE,CAAC;EAC3BC,oBAAoB,EAAE,CAAC;EACvBC,cAAc,EAAE,EAAE;EAClBC,gBAAgB,EAAE,cAAc;EAChCC,gBAAgB,EAAE,EAAE;EACpBC,eAAe,EAAEC,SAAS;EAC1BC,WAAW,EAAE,IAAIC,0BAAiB,EAAE;EACpCC,OAAO,EAAEC,OAAO,CAACC,GAAG,CAACC,cAAc,IAAI,KAAK;EAC5CC,QAAQ,EAAE;IACR;AACJ;AACA;AACA;AACA;IACIC,SAAS,EAAE;MACT;AACN;AACA;AACA;AACA;MACMC,KAAK,EAAEL,OAAO,CAACC,GAAG,CAACK,iBAAiB,IAAI,+BAA+B;MAEvE;AACN;AACA;AACA;AACA;MACMC,GAAG,EAAEP,OAAO,CAACC,GAAG,CAACO,eAAe,IAAI;IACtC,CAAC;IAED;AACJ;AACA;AACA;AACA;IACIC,eAAe,EAAE,IAAI;IAErB;AACJ;AACA;;IAEIC,yBAAyB,EAAE,CAAC,sBAAsB,CAAC;IAEnD;AACJ;AACA;AACA;AACA;IACIC,cAAc,EAAE,CACd,UAAU,EACV,gBAAgB,EAChB,WAAW,EACX,eAAe,EACf,mBAAmB,EACnB,eAAe,EACf,mBAAmB,EACnB,mBAAmB;EAEvB,CAAC;EACDC,MAAM,EAAE;IACNC,oBAAoB,EAAE;MACpBR,KAAK,EAAEL,OAAO,CAACC,GAAG,CAACK,iBAAiB,IAAI,+BAA+B;MACvEQ,eAAe,EAAEd,OAAO,CAACC,GAAG,CAACK,iBAAiB,IAAI;IACpD,CAAC;IACDG,eAAe,EAAE;EACnB,CAAC;EACDM,OAAO,EAAE;IACPC,IAAI,EAAE,CAAC,YAAY,EAAE,aAAa;EACpC,CAAC;EACDC,kBAAkB,EAAE;IAClBC,UAAU,EAAE,EAAE;IACdC,UAAU,EAAE;EACd,CAAC;EACDC,OAAO,EAAE;IACPC,cAAc,EAAEC,2BAAkB;IAClCC,gBAAgB,EAAED;EACpB;AACF,CAAC;AAAA"}
@@ -1,17 +1,12 @@
1
1
  "use strict";
2
2
 
3
3
  var _Object$defineProperty = require("@babel/runtime-corejs2/core-js/object/define-property");
4
-
5
4
  var _interopRequireDefault = require("@babel/runtime-corejs2/helpers/interopRequireDefault");
6
-
7
5
  _Object$defineProperty(exports, "__esModule", {
8
6
  value: true
9
7
  });
10
-
11
8
  exports.default = void 0;
12
-
13
9
  var _ampersandState = _interopRequireDefault(require("ampersand-state"));
14
-
15
10
  // The credentials config which includes the CI server info and derived
16
11
  // URL properties from them for the various CI services. The URL's
17
12
  // will be updated when the CI changes.
@@ -28,7 +23,6 @@ var CredentialsConfig = _ampersandState.default.extend({
28
23
  url: process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com'
29
24
  };
30
25
  }],
31
-
32
26
  /**
33
27
  * The identity base host name
34
28
  * @returns {object}
@@ -38,14 +32,12 @@ var CredentialsConfig = _ampersandState.default.extend({
38
32
  url: process.env.IDENTITY_BASE_URL || 'https://identity.webex.com'
39
33
  };
40
34
  }],
41
-
42
35
  /**
43
36
  * This is the authorization url displayed on the
44
37
  * {@link developer portal|https://developer.webex.com}
45
38
  * @type {string}
46
39
  */
47
40
  authorizationString: ['string', false, process.env.WEBEX_AUTHORIZATION_STRING || process.env.AUTHORIZATION_STRING],
48
-
49
41
  /**
50
42
  * Authorization URL which prompts for user's password. Inferred from
51
43
  * {@link config.credentials.authorizationString}. This config value will
@@ -54,31 +46,26 @@ var CredentialsConfig = _ampersandState.default.extend({
54
46
  * @type {string}
55
47
  */
56
48
  authorizeUrl: ['string', false, process.env.WEBEX_AUTHORIZE_URL || "".concat(process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com', "/idb/oauth2/v1/authorize")],
57
-
58
49
  /**
59
50
  * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}
60
51
  * @type {string}
61
52
  */
62
53
  client_id: ['string', false, process.env.WEBEX_CLIENT_ID || process.env.COMMON_IDENTITY_CLIENT_ID || process.env.CLIENT_ID],
63
-
64
54
  /**
65
55
  * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}
66
56
  * @type {string}
67
57
  */
68
58
  client_secret: ['string', false, process.env.WEBEX_CLIENT_SECRET || process.env.COMMON_IDENTITY_CLIENT_SECRET || process.env.CLIENT_SECRET],
69
-
70
59
  /**
71
60
  * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}
72
61
  * @type {string}
73
62
  */
74
63
  redirect_uri: ['string', false, process.env.WEBEX_REDIRECT_URI || process.env.COMMON_IDENTITY_REDIRECT_URI || process.env.REDIRECT_URI],
75
-
76
64
  /**
77
65
  * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}
78
66
  * @type {string}
79
67
  */
80
68
  scope: ['string', false, process.env.WEBEX_SCOPE || process.env.WEBEX_SCOPES || process.env.COMMON_IDENTITY_SCOPE || process.env.SCOPE],
81
-
82
69
  /**
83
70
  * Controls the UI of the CI login page.
84
71
  * @private
@@ -99,7 +86,6 @@ var CredentialsConfig = _ampersandState.default.extend({
99
86
  },
100
87
  cache: false
101
88
  },
102
-
103
89
  /**
104
90
  * Generate OTP URL
105
91
  * {@link config.credentials.generateOtpUrl}
@@ -112,7 +98,6 @@ var CredentialsConfig = _ampersandState.default.extend({
112
98
  },
113
99
  cache: false
114
100
  },
115
-
116
101
  /**
117
102
  * Validate OTP URL
118
103
  * {@link config.credentials.validateOtpUrl}
@@ -126,7 +111,6 @@ var CredentialsConfig = _ampersandState.default.extend({
126
111
  cache: false
127
112
  },
128
113
  // TODO does hydra also have an access_token endpoint?
129
-
130
114
  /**
131
115
  * Token URL used for token refresh and auth code exchange
132
116
  * @type {string}
@@ -138,7 +122,6 @@ var CredentialsConfig = _ampersandState.default.extend({
138
122
  },
139
123
  cache: false
140
124
  },
141
-
142
125
  /**
143
126
  * URL to revoke token
144
127
  * @type {string}
@@ -150,7 +133,6 @@ var CredentialsConfig = _ampersandState.default.extend({
150
133
  },
151
134
  cache: false
152
135
  },
153
-
154
136
  /**
155
137
  * URL to load when the app logs out
156
138
  * @type {string}
@@ -162,7 +144,6 @@ var CredentialsConfig = _ampersandState.default.extend({
162
144
  },
163
145
  cache: false
164
146
  },
165
-
166
147
  /**
167
148
  * Set password URL
168
149
  * @type {string}
@@ -176,7 +157,6 @@ var CredentialsConfig = _ampersandState.default.extend({
176
157
  }
177
158
  }
178
159
  });
179
-
180
160
  var _default = CredentialsConfig;
181
161
  exports.default = _default;
182
162
  //# sourceMappingURL=credentials-config.js.map
@@ -1 +1 @@
1
- {"version":3,"names":["CredentialsConfig","AmpState","extend","extraProperties","props","idbroker","url","process","env","IDBROKER_BASE_URL","identity","IDENTITY_BASE_URL","authorizationString","WEBEX_AUTHORIZATION_STRING","AUTHORIZATION_STRING","authorizeUrl","WEBEX_AUTHORIZE_URL","client_id","WEBEX_CLIENT_ID","COMMON_IDENTITY_CLIENT_ID","CLIENT_ID","client_secret","WEBEX_CLIENT_SECRET","COMMON_IDENTITY_CLIENT_SECRET","CLIENT_SECRET","redirect_uri","WEBEX_REDIRECT_URI","COMMON_IDENTITY_REDIRECT_URI","REDIRECT_URI","scope","WEBEX_SCOPE","WEBEX_SCOPES","COMMON_IDENTITY_SCOPE","SCOPE","cisService","derived","activationUrl","deps","fn","cache","generateOtpUrl","validateOtpUrl","tokenUrl","TOKEN_URL","revokeUrl","REVOKE_URL","logoutUrl","setPasswordUrl"],"sources":["credentials-config.js"],"sourcesContent":["import AmpState from 'ampersand-state';\n\n// The credentials config which includes the CI server info and derived\n// URL properties from them for the various CI services. The URL's\n// will be updated when the CI changes.\nconst CredentialsConfig = AmpState.extend({\n // we need to allow extra props for dynamic props like jwtRefreshCallback\n extraProperties: 'allow',\n\n props: {\n /**\n * The idbroker base host name\n * @returns {object}\n */\n idbroker: [\n 'object',\n false,\n () => ({\n url: process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com',\n }),\n ],\n\n /**\n * The identity base host name\n * @returns {object}\n */\n identity: [\n 'object',\n false,\n () => ({\n url: process.env.IDENTITY_BASE_URL || 'https://identity.webex.com',\n }),\n ],\n\n /**\n * This is the authorization url displayed on the\n * {@link developer portal|https://developer.webex.com}\n * @type {string}\n */\n authorizationString: [\n 'string',\n false,\n process.env.WEBEX_AUTHORIZATION_STRING || process.env.AUTHORIZATION_STRING,\n ],\n\n /**\n * Authorization URL which prompts for user's password. Inferred from\n * {@link config.credentials.authorizationString}. This config value will\n * be automatically set if `authorizationString` config value is specified.\n *\n * @type {string}\n */\n authorizeUrl: [\n 'string',\n false,\n process.env.WEBEX_AUTHORIZE_URL ||\n `${process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com'}/idb/oauth2/v1/authorize`,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n client_id: [\n 'string',\n false,\n process.env.WEBEX_CLIENT_ID || process.env.COMMON_IDENTITY_CLIENT_ID || process.env.CLIENT_ID,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n client_secret: [\n 'string',\n false,\n process.env.WEBEX_CLIENT_SECRET ||\n process.env.COMMON_IDENTITY_CLIENT_SECRET ||\n process.env.CLIENT_SECRET,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n redirect_uri: [\n 'string',\n false,\n process.env.WEBEX_REDIRECT_URI ||\n process.env.COMMON_IDENTITY_REDIRECT_URI ||\n process.env.REDIRECT_URI,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n scope: [\n 'string',\n false,\n process.env.WEBEX_SCOPE ||\n process.env.WEBEX_SCOPES ||\n process.env.COMMON_IDENTITY_SCOPE ||\n process.env.SCOPE,\n ],\n\n /**\n * Controls the UI of the CI login page.\n * @private\n * @type {string}\n */\n cisService: ['string', false, 'webex'],\n },\n\n derived: {\n /**\n * User activation URL\n * {@link config.credentials.activationUrl}\n * @type {string}\n */\n activationUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserActivation/invoke`;\n },\n cache: false,\n },\n\n /**\n * Generate OTP URL\n * {@link config.credentials.generateOtpUrl}\n * @type {string}\n */\n generateOtpUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserOTP/Generate/invoke`;\n },\n cache: false,\n },\n\n /**\n * Validate OTP URL\n * {@link config.credentials.validateOtpUrl}\n * @type {string}\n */\n validateOtpUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserOTP/Validate/invoke`;\n },\n cache: false,\n },\n\n // TODO does hydra also have an access_token endpoint?\n /**\n * Token URL used for token refresh and auth code exchange\n * @type {string}\n */\n tokenUrl: {\n deps: ['idbroker.url'],\n fn() {\n return process.env.TOKEN_URL || `${this.idbroker.url}/idb/oauth2/v1/access_token`;\n },\n cache: false,\n },\n\n /**\n * URL to revoke token\n * @type {string}\n */\n revokeUrl: {\n deps: ['idbroker.url'],\n fn() {\n return process.env.REVOKE_URL || `${this.idbroker.url}/idb/oauth2/v1/revoke`;\n },\n cache: false,\n },\n\n /**\n * URL to load when the app logs out\n * @type {string}\n */\n logoutUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${this.idbroker.url}/idb/oauth2/v1/logout`;\n },\n cache: false,\n },\n\n /**\n * Set password URL\n * @type {string}\n */\n setPasswordUrl: {\n deps: ['identity.url'],\n fn() {\n return `${this.identity.url || 'https://identity.webex.com'}/identity/scim/v1/Users`;\n },\n cache: false,\n },\n },\n});\n\nexport default CredentialsConfig;\n"],"mappings":";;;;;;;;;;;;AAAA;;AAEA;AACA;AACA;AACA,IAAMA,iBAAiB,GAAGC,uBAAA,CAASC,MAAT,CAAgB;EACxC;EACAC,eAAe,EAAE,OAFuB;EAIxCC,KAAK,EAAE;IACL;AACJ;AACA;AACA;IACIC,QAAQ,EAAE,CACR,QADQ,EAER,KAFQ,EAGR;MAAA,OAAO;QACLC,GAAG,EAAEC,OAAO,CAACC,GAAR,CAAYC,iBAAZ,IAAiC;MADjC,CAAP;IAAA,CAHQ,CALL;;IAaL;AACJ;AACA;AACA;IACIC,QAAQ,EAAE,CACR,QADQ,EAER,KAFQ,EAGR;MAAA,OAAO;QACLJ,GAAG,EAAEC,OAAO,CAACC,GAAR,CAAYG,iBAAZ,IAAiC;MADjC,CAAP;IAAA,CAHQ,CAjBL;;IAyBL;AACJ;AACA;AACA;AACA;IACIC,mBAAmB,EAAE,CACnB,QADmB,EAEnB,KAFmB,EAGnBL,OAAO,CAACC,GAAR,CAAYK,0BAAZ,IAA0CN,OAAO,CAACC,GAAR,CAAYM,oBAHnC,CA9BhB;;IAoCL;AACJ;AACA;AACA;AACA;AACA;AACA;IACIC,YAAY,EAAE,CACZ,QADY,EAEZ,KAFY,EAGZR,OAAO,CAACC,GAAR,CAAYQ,mBAAZ,cACKT,OAAO,CAACC,GAAR,CAAYC,iBAAZ,IAAiC,4BADtC,6BAHY,CA3CT;;IAkDL;AACJ;AACA;AACA;IACIQ,SAAS,EAAE,CACT,QADS,EAET,KAFS,EAGTV,OAAO,CAACC,GAAR,CAAYU,eAAZ,IAA+BX,OAAO,CAACC,GAAR,CAAYW,yBAA3C,IAAwEZ,OAAO,CAACC,GAAR,CAAYY,SAH3E,CAtDN;;IA4DL;AACJ;AACA;AACA;IACIC,aAAa,EAAE,CACb,QADa,EAEb,KAFa,EAGbd,OAAO,CAACC,GAAR,CAAYc,mBAAZ,IACEf,OAAO,CAACC,GAAR,CAAYe,6BADd,IAEEhB,OAAO,CAACC,GAAR,CAAYgB,aALD,CAhEV;;IAwEL;AACJ;AACA;AACA;IACIC,YAAY,EAAE,CACZ,QADY,EAEZ,KAFY,EAGZlB,OAAO,CAACC,GAAR,CAAYkB,kBAAZ,IACEnB,OAAO,CAACC,GAAR,CAAYmB,4BADd,IAEEpB,OAAO,CAACC,GAAR,CAAYoB,YALF,CA5ET;;IAoFL;AACJ;AACA;AACA;IACIC,KAAK,EAAE,CACL,QADK,EAEL,KAFK,EAGLtB,OAAO,CAACC,GAAR,CAAYsB,WAAZ,IACEvB,OAAO,CAACC,GAAR,CAAYuB,YADd,IAEExB,OAAO,CAACC,GAAR,CAAYwB,qBAFd,IAGEzB,OAAO,CAACC,GAAR,CAAYyB,KANT,CAxFF;;IAiGL;AACJ;AACA;AACA;AACA;IACIC,UAAU,EAAE,CAAC,QAAD,EAAW,KAAX,EAAkB,OAAlB;EAtGP,CAJiC;EA6GxCC,OAAO,EAAE;IACP;AACJ;AACA;AACA;AACA;IACIC,aAAa,EAAE;MACbC,IAAI,EAAE,CAAC,cAAD,CADO;MAEbC,EAFa,gBAER;QACH,iBACE,KAAKjC,QAAL,CAAcC,GAAd,IAAqB,4BADvB;MAGD,CANY;MAObiC,KAAK,EAAE;IAPM,CANR;;IAgBP;AACJ;AACA;AACA;AACA;IACIC,cAAc,EAAE;MACdH,IAAI,EAAE,CAAC,cAAD,CADQ;MAEdC,EAFc,gBAET;QACH,iBACE,KAAKjC,QAAL,CAAcC,GAAd,IAAqB,4BADvB;MAGD,CANa;MAOdiC,KAAK,EAAE;IAPO,CArBT;;IA+BP;AACJ;AACA;AACA;AACA;IACIE,cAAc,EAAE;MACdJ,IAAI,EAAE,CAAC,cAAD,CADQ;MAEdC,EAFc,gBAET;QACH,iBACE,KAAKjC,QAAL,CAAcC,GAAd,IAAqB,4BADvB;MAGD,CANa;MAOdiC,KAAK,EAAE;IAPO,CApCT;IA8CP;;IACA;AACJ;AACA;AACA;IACIG,QAAQ,EAAE;MACRL,IAAI,EAAE,CAAC,cAAD,CADE;MAERC,EAFQ,gBAEH;QACH,OAAO/B,OAAO,CAACC,GAAR,CAAYmC,SAAZ,cAA4B,KAAKtC,QAAL,CAAcC,GAA1C,gCAAP;MACD,CAJO;MAKRiC,KAAK,EAAE;IALC,CAnDH;;IA2DP;AACJ;AACA;AACA;IACIK,SAAS,EAAE;MACTP,IAAI,EAAE,CAAC,cAAD,CADG;MAETC,EAFS,gBAEJ;QACH,OAAO/B,OAAO,CAACC,GAAR,CAAYqC,UAAZ,cAA6B,KAAKxC,QAAL,CAAcC,GAA3C,0BAAP;MACD,CAJQ;MAKTiC,KAAK,EAAE;IALE,CA/DJ;;IAuEP;AACJ;AACA;AACA;IACIO,SAAS,EAAE;MACTT,IAAI,EAAE,CAAC,cAAD,CADG;MAETC,EAFS,gBAEJ;QACH,iBAAU,KAAKjC,QAAL,CAAcC,GAAxB;MACD,CAJQ;MAKTiC,KAAK,EAAE;IALE,CA3EJ;;IAmFP;AACJ;AACA;AACA;IACIQ,cAAc,EAAE;MACdV,IAAI,EAAE,CAAC,cAAD,CADQ;MAEdC,EAFc,gBAET;QACH,iBAAU,KAAK5B,QAAL,CAAcJ,GAAd,IAAqB,4BAA/B;MACD,CAJa;MAKdiC,KAAK,EAAE;IALO;EAvFT;AA7G+B,CAAhB,CAA1B;;eA8MevC,iB"}
1
+ {"version":3,"names":["CredentialsConfig","AmpState","extend","extraProperties","props","idbroker","url","process","env","IDBROKER_BASE_URL","identity","IDENTITY_BASE_URL","authorizationString","WEBEX_AUTHORIZATION_STRING","AUTHORIZATION_STRING","authorizeUrl","WEBEX_AUTHORIZE_URL","client_id","WEBEX_CLIENT_ID","COMMON_IDENTITY_CLIENT_ID","CLIENT_ID","client_secret","WEBEX_CLIENT_SECRET","COMMON_IDENTITY_CLIENT_SECRET","CLIENT_SECRET","redirect_uri","WEBEX_REDIRECT_URI","COMMON_IDENTITY_REDIRECT_URI","REDIRECT_URI","scope","WEBEX_SCOPE","WEBEX_SCOPES","COMMON_IDENTITY_SCOPE","SCOPE","cisService","derived","activationUrl","deps","fn","cache","generateOtpUrl","validateOtpUrl","tokenUrl","TOKEN_URL","revokeUrl","REVOKE_URL","logoutUrl","setPasswordUrl"],"sources":["credentials-config.js"],"sourcesContent":["import AmpState from 'ampersand-state';\n\n// The credentials config which includes the CI server info and derived\n// URL properties from them for the various CI services. The URL's\n// will be updated when the CI changes.\nconst CredentialsConfig = AmpState.extend({\n // we need to allow extra props for dynamic props like jwtRefreshCallback\n extraProperties: 'allow',\n\n props: {\n /**\n * The idbroker base host name\n * @returns {object}\n */\n idbroker: [\n 'object',\n false,\n () => ({\n url: process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com',\n }),\n ],\n\n /**\n * The identity base host name\n * @returns {object}\n */\n identity: [\n 'object',\n false,\n () => ({\n url: process.env.IDENTITY_BASE_URL || 'https://identity.webex.com',\n }),\n ],\n\n /**\n * This is the authorization url displayed on the\n * {@link developer portal|https://developer.webex.com}\n * @type {string}\n */\n authorizationString: [\n 'string',\n false,\n process.env.WEBEX_AUTHORIZATION_STRING || process.env.AUTHORIZATION_STRING,\n ],\n\n /**\n * Authorization URL which prompts for user's password. Inferred from\n * {@link config.credentials.authorizationString}. This config value will\n * be automatically set if `authorizationString` config value is specified.\n *\n * @type {string}\n */\n authorizeUrl: [\n 'string',\n false,\n process.env.WEBEX_AUTHORIZE_URL ||\n `${process.env.IDBROKER_BASE_URL || 'https://idbroker.webex.com'}/idb/oauth2/v1/authorize`,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n client_id: [\n 'string',\n false,\n process.env.WEBEX_CLIENT_ID || process.env.COMMON_IDENTITY_CLIENT_ID || process.env.CLIENT_ID,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n client_secret: [\n 'string',\n false,\n process.env.WEBEX_CLIENT_SECRET ||\n process.env.COMMON_IDENTITY_CLIENT_SECRET ||\n process.env.CLIENT_SECRET,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n redirect_uri: [\n 'string',\n false,\n process.env.WEBEX_REDIRECT_URI ||\n process.env.COMMON_IDENTITY_REDIRECT_URI ||\n process.env.REDIRECT_URI,\n ],\n\n /**\n * {@see https://tools.ietf.org/html/rfc6749#section-4.1.4}\n * @type {string}\n */\n scope: [\n 'string',\n false,\n process.env.WEBEX_SCOPE ||\n process.env.WEBEX_SCOPES ||\n process.env.COMMON_IDENTITY_SCOPE ||\n process.env.SCOPE,\n ],\n\n /**\n * Controls the UI of the CI login page.\n * @private\n * @type {string}\n */\n cisService: ['string', false, 'webex'],\n },\n\n derived: {\n /**\n * User activation URL\n * {@link config.credentials.activationUrl}\n * @type {string}\n */\n activationUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserActivation/invoke`;\n },\n cache: false,\n },\n\n /**\n * Generate OTP URL\n * {@link config.credentials.generateOtpUrl}\n * @type {string}\n */\n generateOtpUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserOTP/Generate/invoke`;\n },\n cache: false,\n },\n\n /**\n * Validate OTP URL\n * {@link config.credentials.validateOtpUrl}\n * @type {string}\n */\n validateOtpUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${\n this.idbroker.url || 'https://idbroker.webex.com'\n }/idb/token/v1/actions/UserOTP/Validate/invoke`;\n },\n cache: false,\n },\n\n // TODO does hydra also have an access_token endpoint?\n /**\n * Token URL used for token refresh and auth code exchange\n * @type {string}\n */\n tokenUrl: {\n deps: ['idbroker.url'],\n fn() {\n return process.env.TOKEN_URL || `${this.idbroker.url}/idb/oauth2/v1/access_token`;\n },\n cache: false,\n },\n\n /**\n * URL to revoke token\n * @type {string}\n */\n revokeUrl: {\n deps: ['idbroker.url'],\n fn() {\n return process.env.REVOKE_URL || `${this.idbroker.url}/idb/oauth2/v1/revoke`;\n },\n cache: false,\n },\n\n /**\n * URL to load when the app logs out\n * @type {string}\n */\n logoutUrl: {\n deps: ['idbroker.url'],\n fn() {\n return `${this.idbroker.url}/idb/oauth2/v1/logout`;\n },\n cache: false,\n },\n\n /**\n * Set password URL\n * @type {string}\n */\n setPasswordUrl: {\n deps: ['identity.url'],\n fn() {\n return `${this.identity.url || 'https://identity.webex.com'}/identity/scim/v1/Users`;\n },\n cache: false,\n },\n },\n});\n\nexport default CredentialsConfig;\n"],"mappings":";;;;;;;;AAAA;AAEA;AACA;AACA;AACA,IAAMA,iBAAiB,GAAGC,uBAAQ,CAACC,MAAM,CAAC;EACxC;EACAC,eAAe,EAAE,OAAO;EAExBC,KAAK,EAAE;IACL;AACJ;AACA;AACA;IACIC,QAAQ,EAAE,CACR,QAAQ,EACR,KAAK,EACL;MAAA,OAAO;QACLC,GAAG,EAAEC,OAAO,CAACC,GAAG,CAACC,iBAAiB,IAAI;MACxC,CAAC;IAAA,CAAC,CACH;IAED;AACJ;AACA;AACA;IACIC,QAAQ,EAAE,CACR,QAAQ,EACR,KAAK,EACL;MAAA,OAAO;QACLJ,GAAG,EAAEC,OAAO,CAACC,GAAG,CAACG,iBAAiB,IAAI;MACxC,CAAC;IAAA,CAAC,CACH;IAED;AACJ;AACA;AACA;AACA;IACIC,mBAAmB,EAAE,CACnB,QAAQ,EACR,KAAK,EACLL,OAAO,CAACC,GAAG,CAACK,0BAA0B,IAAIN,OAAO,CAACC,GAAG,CAACM,oBAAoB,CAC3E;IAED;AACJ;AACA;AACA;AACA;AACA;AACA;IACIC,YAAY,EAAE,CACZ,QAAQ,EACR,KAAK,EACLR,OAAO,CAACC,GAAG,CAACQ,mBAAmB,cAC1BT,OAAO,CAACC,GAAG,CAACC,iBAAiB,IAAI,4BAA4B,6BAA0B,CAC7F;IAED;AACJ;AACA;AACA;IACIQ,SAAS,EAAE,CACT,QAAQ,EACR,KAAK,EACLV,OAAO,CAACC,GAAG,CAACU,eAAe,IAAIX,OAAO,CAACC,GAAG,CAACW,yBAAyB,IAAIZ,OAAO,CAACC,GAAG,CAACY,SAAS,CAC9F;IAED;AACJ;AACA;AACA;IACIC,aAAa,EAAE,CACb,QAAQ,EACR,KAAK,EACLd,OAAO,CAACC,GAAG,CAACc,mBAAmB,IAC7Bf,OAAO,CAACC,GAAG,CAACe,6BAA6B,IACzChB,OAAO,CAACC,GAAG,CAACgB,aAAa,CAC5B;IAED;AACJ;AACA;AACA;IACIC,YAAY,EAAE,CACZ,QAAQ,EACR,KAAK,EACLlB,OAAO,CAACC,GAAG,CAACkB,kBAAkB,IAC5BnB,OAAO,CAACC,GAAG,CAACmB,4BAA4B,IACxCpB,OAAO,CAACC,GAAG,CAACoB,YAAY,CAC3B;IAED;AACJ;AACA;AACA;IACIC,KAAK,EAAE,CACL,QAAQ,EACR,KAAK,EACLtB,OAAO,CAACC,GAAG,CAACsB,WAAW,IACrBvB,OAAO,CAACC,GAAG,CAACuB,YAAY,IACxBxB,OAAO,CAACC,GAAG,CAACwB,qBAAqB,IACjCzB,OAAO,CAACC,GAAG,CAACyB,KAAK,CACpB;IAED;AACJ;AACA;AACA;AACA;IACIC,UAAU,EAAE,CAAC,QAAQ,EAAE,KAAK,EAAE,OAAO;EACvC,CAAC;EAEDC,OAAO,EAAE;IACP;AACJ;AACA;AACA;AACA;IACIC,aAAa,EAAE;MACbC,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBACE,IAAI,CAACjC,QAAQ,CAACC,GAAG,IAAI,4BAA4B;MAErD,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;AACA;IACIC,cAAc,EAAE;MACdH,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBACE,IAAI,CAACjC,QAAQ,CAACC,GAAG,IAAI,4BAA4B;MAErD,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;AACA;IACIE,cAAc,EAAE;MACdJ,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBACE,IAAI,CAACjC,QAAQ,CAACC,GAAG,IAAI,4BAA4B;MAErD,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;IACA;AACJ;AACA;AACA;IACIG,QAAQ,EAAE;MACRL,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,OAAO/B,OAAO,CAACC,GAAG,CAACmC,SAAS,cAAO,IAAI,CAACtC,QAAQ,CAACC,GAAG,gCAA6B;MACnF,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;IACIK,SAAS,EAAE;MACTP,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,OAAO/B,OAAO,CAACC,GAAG,CAACqC,UAAU,cAAO,IAAI,CAACxC,QAAQ,CAACC,GAAG,0BAAuB;MAC9E,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;IACIO,SAAS,EAAE;MACTT,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBAAU,IAAI,CAACjC,QAAQ,CAACC,GAAG;MAC7B,CAAC;MACDiC,KAAK,EAAE;IACT,CAAC;IAED;AACJ;AACA;AACA;IACIQ,cAAc,EAAE;MACdV,IAAI,EAAE,CAAC,cAAc,CAAC;MACtBC,EAAE,gBAAG;QACH,iBAAU,IAAI,CAAC5B,QAAQ,CAACJ,GAAG,IAAI,4BAA4B;MAC7D,CAAC;MACDiC,KAAK,EAAE;IACT;EACF;AACF,CAAC,CAAC;AAAC,eAEYvC,iBAAiB;AAAA"}
package/dist/index.js CHANGED
@@ -1,378 +1,302 @@
1
1
  "use strict";
2
2
 
3
3
  var _typeof = require("@babel/runtime-corejs2/helpers/typeof");
4
-
5
4
  var _WeakMap = require("@babel/runtime-corejs2/core-js/weak-map");
6
-
7
5
  var _Object$defineProperty = require("@babel/runtime-corejs2/core-js/object/define-property");
8
-
9
6
  var _Object$getOwnPropertyDescriptor = require("@babel/runtime-corejs2/core-js/object/get-own-property-descriptor");
10
-
11
7
  var _interopRequireDefault = require("@babel/runtime-corejs2/helpers/interopRequireDefault");
12
-
13
8
  _Object$defineProperty(exports, "__esModule", {
14
9
  value: true
15
10
  });
16
-
17
11
  _Object$defineProperty(exports, "AuthInterceptor", {
18
12
  enumerable: true,
19
13
  get: function get() {
20
14
  return _auth.default;
21
15
  }
22
16
  });
23
-
24
17
  _Object$defineProperty(exports, "Batcher", {
25
18
  enumerable: true,
26
19
  get: function get() {
27
20
  return _batcher.default;
28
21
  }
29
22
  });
30
-
31
23
  _Object$defineProperty(exports, "Credentials", {
32
24
  enumerable: true,
33
25
  get: function get() {
34
26
  return _credentials.Credentials;
35
27
  }
36
28
  });
37
-
38
29
  _Object$defineProperty(exports, "DefaultOptionsInterceptor", {
39
30
  enumerable: true,
40
31
  get: function get() {
41
32
  return _defaultOptions.default;
42
33
  }
43
34
  });
44
-
45
35
  _Object$defineProperty(exports, "EmbargoInterceptor", {
46
36
  enumerable: true,
47
37
  get: function get() {
48
38
  return _embargo.default;
49
39
  }
50
40
  });
51
-
52
41
  _Object$defineProperty(exports, "MemoryStoreAdapter", {
53
42
  enumerable: true,
54
43
  get: function get() {
55
44
  return _storage.MemoryStoreAdapter;
56
45
  }
57
46
  });
58
-
59
47
  _Object$defineProperty(exports, "NetworkTimingInterceptor", {
60
48
  enumerable: true,
61
49
  get: function get() {
62
50
  return _networkTiming.default;
63
51
  }
64
52
  });
65
-
66
53
  _Object$defineProperty(exports, "NotFoundError", {
67
54
  enumerable: true,
68
55
  get: function get() {
69
56
  return _storage.NotFoundError;
70
57
  }
71
58
  });
72
-
73
59
  _Object$defineProperty(exports, "Page", {
74
60
  enumerable: true,
75
61
  get: function get() {
76
62
  return _page.default;
77
63
  }
78
64
  });
79
-
80
65
  _Object$defineProperty(exports, "PayloadTransformerInterceptor", {
81
66
  enumerable: true,
82
67
  get: function get() {
83
68
  return _payloadTransformer.default;
84
69
  }
85
70
  });
86
-
87
71
  _Object$defineProperty(exports, "RateLimitInterceptor", {
88
72
  enumerable: true,
89
73
  get: function get() {
90
74
  return _rateLimit.default;
91
75
  }
92
76
  });
93
-
94
77
  _Object$defineProperty(exports, "RedirectInterceptor", {
95
78
  enumerable: true,
96
79
  get: function get() {
97
80
  return _redirect.default;
98
81
  }
99
82
  });
100
-
101
83
  _Object$defineProperty(exports, "RequestEventInterceptor", {
102
84
  enumerable: true,
103
85
  get: function get() {
104
86
  return _requestEvent.default;
105
87
  }
106
88
  });
107
-
108
89
  _Object$defineProperty(exports, "RequestLoggerInterceptor", {
109
90
  enumerable: true,
110
91
  get: function get() {
111
92
  return _requestLogger.default;
112
93
  }
113
94
  });
114
-
115
95
  _Object$defineProperty(exports, "RequestTimingInterceptor", {
116
96
  enumerable: true,
117
97
  get: function get() {
118
98
  return _requestTiming.default;
119
99
  }
120
100
  });
121
-
122
101
  _Object$defineProperty(exports, "ResponseLoggerInterceptor", {
123
102
  enumerable: true,
124
103
  get: function get() {
125
104
  return _responseLogger.default;
126
105
  }
127
106
  });
128
-
129
107
  _Object$defineProperty(exports, "ServerErrorInterceptor", {
130
108
  enumerable: true,
131
109
  get: function get() {
132
110
  return _services.ServerErrorInterceptor;
133
111
  }
134
112
  });
135
-
136
113
  _Object$defineProperty(exports, "ServiceCatalog", {
137
114
  enumerable: true,
138
115
  get: function get() {
139
116
  return _services.ServiceCatalog;
140
117
  }
141
118
  });
142
-
143
119
  _Object$defineProperty(exports, "ServiceHost", {
144
120
  enumerable: true,
145
121
  get: function get() {
146
122
  return _services.ServiceHost;
147
123
  }
148
124
  });
149
-
150
125
  _Object$defineProperty(exports, "ServiceInterceptor", {
151
126
  enumerable: true,
152
127
  get: function get() {
153
128
  return _services.ServiceInterceptor;
154
129
  }
155
130
  });
156
-
157
131
  _Object$defineProperty(exports, "ServiceRegistry", {
158
132
  enumerable: true,
159
133
  get: function get() {
160
134
  return _services.ServiceRegistry;
161
135
  }
162
136
  });
163
-
164
137
  _Object$defineProperty(exports, "ServiceState", {
165
138
  enumerable: true,
166
139
  get: function get() {
167
140
  return _services.ServiceState;
168
141
  }
169
142
  });
170
-
171
143
  _Object$defineProperty(exports, "ServiceUrl", {
172
144
  enumerable: true,
173
145
  get: function get() {
174
146
  return _services.ServiceUrl;
175
147
  }
176
148
  });
177
-
178
149
  _Object$defineProperty(exports, "Services", {
179
150
  enumerable: true,
180
151
  get: function get() {
181
152
  return _services.Services;
182
153
  }
183
154
  });
184
-
185
155
  _Object$defineProperty(exports, "StatelessWebexPlugin", {
186
156
  enumerable: true,
187
157
  get: function get() {
188
158
  return _statelessWebexPlugin.default;
189
159
  }
190
160
  });
191
-
192
161
  _Object$defineProperty(exports, "StorageError", {
193
162
  enumerable: true,
194
163
  get: function get() {
195
164
  return _storage.StorageError;
196
165
  }
197
166
  });
198
-
199
167
  _Object$defineProperty(exports, "Token", {
200
168
  enumerable: true,
201
169
  get: function get() {
202
170
  return _credentials.Token;
203
171
  }
204
172
  });
205
-
206
173
  _Object$defineProperty(exports, "UserAgentInterceptor", {
207
174
  enumerable: true,
208
175
  get: function get() {
209
176
  return _userAgent.default;
210
177
  }
211
178
  });
212
-
213
179
  _Object$defineProperty(exports, "WebexHttpError", {
214
180
  enumerable: true,
215
181
  get: function get() {
216
182
  return _webexHttpError.default;
217
183
  }
218
184
  });
219
-
220
185
  _Object$defineProperty(exports, "WebexPlugin", {
221
186
  enumerable: true,
222
187
  get: function get() {
223
188
  return _webexPlugin.default;
224
189
  }
225
190
  });
226
-
227
191
  _Object$defineProperty(exports, "WebexTrackingIdInterceptor", {
228
192
  enumerable: true,
229
193
  get: function get() {
230
194
  return _webexTrackingId.default;
231
195
  }
232
196
  });
233
-
234
197
  _Object$defineProperty(exports, "WebexUserAgentInterceptor", {
235
198
  enumerable: true,
236
199
  get: function get() {
237
200
  return _webexUserAgent.default;
238
201
  }
239
202
  });
240
-
241
203
  _Object$defineProperty(exports, "config", {
242
204
  enumerable: true,
243
205
  get: function get() {
244
206
  return _config.default;
245
207
  }
246
208
  });
247
-
248
209
  _Object$defineProperty(exports, "default", {
249
210
  enumerable: true,
250
211
  get: function get() {
251
212
  return _webexCore.default;
252
213
  }
253
214
  });
254
-
255
215
  _Object$defineProperty(exports, "filterScope", {
256
216
  enumerable: true,
257
217
  get: function get() {
258
218
  return _credentials.filterScope;
259
219
  }
260
220
  });
261
-
262
221
  _Object$defineProperty(exports, "grantErrors", {
263
222
  enumerable: true,
264
223
  get: function get() {
265
224
  return _credentials.grantErrors;
266
225
  }
267
226
  });
268
-
269
227
  _Object$defineProperty(exports, "makeWebexPluginStore", {
270
228
  enumerable: true,
271
229
  get: function get() {
272
230
  return _storage.makeWebexPluginStore;
273
231
  }
274
232
  });
275
-
276
233
  _Object$defineProperty(exports, "makeWebexStore", {
277
234
  enumerable: true,
278
235
  get: function get() {
279
236
  return _storage.makeWebexStore;
280
237
  }
281
238
  });
282
-
283
239
  _Object$defineProperty(exports, "persist", {
284
240
  enumerable: true,
285
241
  get: function get() {
286
242
  return _storage.persist;
287
243
  }
288
244
  });
289
-
290
245
  _Object$defineProperty(exports, "registerInternalPlugin", {
291
246
  enumerable: true,
292
247
  get: function get() {
293
248
  return _webexCore.registerInternalPlugin;
294
249
  }
295
250
  });
296
-
297
251
  _Object$defineProperty(exports, "registerPlugin", {
298
252
  enumerable: true,
299
253
  get: function get() {
300
254
  return _webexCore.registerPlugin;
301
255
  }
302
256
  });
303
-
304
257
  _Object$defineProperty(exports, "serviceConstants", {
305
258
  enumerable: true,
306
259
  get: function get() {
307
260
  return _services.constants;
308
261
  }
309
262
  });
310
-
311
263
  _Object$defineProperty(exports, "sortScope", {
312
264
  enumerable: true,
313
265
  get: function get() {
314
266
  return _credentials.sortScope;
315
267
  }
316
268
  });
317
-
318
269
  _Object$defineProperty(exports, "waitForValue", {
319
270
  enumerable: true,
320
271
  get: function get() {
321
272
  return _storage.waitForValue;
322
273
  }
323
274
  });
324
-
325
275
  require("./plugins/logger");
326
-
327
276
  var _credentials = require("./lib/credentials");
328
-
329
277
  var _services = require("./lib/services");
330
-
331
278
  var _storage = require("./lib/storage");
332
-
333
279
  var _webexCore = _interopRequireWildcard(require("./webex-core"));
334
-
335
280
  var _webexHttpError = _interopRequireDefault(require("./lib/webex-http-error"));
336
-
337
281
  var _statelessWebexPlugin = _interopRequireDefault(require("./lib/stateless-webex-plugin"));
338
-
339
282
  var _webexPlugin = _interopRequireDefault(require("./lib/webex-plugin"));
340
-
341
283
  var _auth = _interopRequireDefault(require("./interceptors/auth"));
342
-
343
284
  var _networkTiming = _interopRequireDefault(require("./interceptors/network-timing"));
344
-
345
285
  var _payloadTransformer = _interopRequireDefault(require("./interceptors/payload-transformer"));
346
-
347
286
  var _redirect = _interopRequireDefault(require("./interceptors/redirect"));
348
-
349
287
  var _responseLogger = _interopRequireDefault(require("./interceptors/response-logger"));
350
-
351
288
  var _requestEvent = _interopRequireDefault(require("./interceptors/request-event"));
352
-
353
289
  var _requestLogger = _interopRequireDefault(require("./interceptors/request-logger"));
354
-
355
290
  var _requestTiming = _interopRequireDefault(require("./interceptors/request-timing"));
356
-
357
291
  var _userAgent = _interopRequireDefault(require("./interceptors/user-agent"));
358
-
359
292
  var _webexTrackingId = _interopRequireDefault(require("./interceptors/webex-tracking-id"));
360
-
361
293
  var _webexUserAgent = _interopRequireDefault(require("./interceptors/webex-user-agent"));
362
-
363
294
  var _rateLimit = _interopRequireDefault(require("./interceptors/rate-limit"));
364
-
365
295
  var _embargo = _interopRequireDefault(require("./interceptors/embargo"));
366
-
367
296
  var _defaultOptions = _interopRequireDefault(require("./interceptors/default-options"));
368
-
369
297
  var _batcher = _interopRequireDefault(require("./lib/batcher"));
370
-
371
298
  var _page = _interopRequireDefault(require("./lib/page"));
372
-
373
299
  var _config = _interopRequireDefault(require("./config"));
374
-
375
300
  function _getRequireWildcardCache(nodeInterop) { if (typeof _WeakMap !== "function") return null; var cacheBabelInterop = new _WeakMap(); var cacheNodeInterop = new _WeakMap(); return (_getRequireWildcardCache = function _getRequireWildcardCache(nodeInterop) { return nodeInterop ? cacheNodeInterop : cacheBabelInterop; })(nodeInterop); }
376
-
377
301
  function _interopRequireWildcard(obj, nodeInterop) { if (!nodeInterop && obj && obj.__esModule) { return obj; } if (obj === null || _typeof(obj) !== "object" && typeof obj !== "function") { return { default: obj }; } var cache = _getRequireWildcardCache(nodeInterop); if (cache && cache.has(obj)) { return cache.get(obj); } var newObj = {}; var hasPropertyDescriptor = _Object$defineProperty && _Object$getOwnPropertyDescriptor; for (var key in obj) { if (key !== "default" && Object.prototype.hasOwnProperty.call(obj, key)) { var desc = hasPropertyDescriptor ? _Object$getOwnPropertyDescriptor(obj, key) : null; if (desc && (desc.get || desc.set)) { _Object$defineProperty(newObj, key, desc); } else { newObj[key] = obj[key]; } } } newObj.default = obj; if (cache) { cache.set(obj, newObj); } return newObj; }
378
302
  //# sourceMappingURL=index.js.map
package/dist/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"names":[],"sources":["index.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n *\n * Services is currently a part of webex-core due to how the contents of\n * the original internal-plugin-services needed to be accessed when webex-core\n * is initialized. As a plugin outside of webex-core, it would initialize after\n * credentials, causing all requests prior to its initialization to fail\n * federation requirements, and instead send requests to the environmentally-\n * assigned urls.\n */\n\nimport './plugins/logger';\nimport './lib/credentials';\nimport './lib/services';\n\nexport {Credentials, filterScope, grantErrors, sortScope, Token} from './lib/credentials';\n\nexport {\n constants as serviceConstants,\n ServiceCatalog,\n ServiceRegistry,\n ServiceState,\n ServiceInterceptor,\n ServerErrorInterceptor,\n Services,\n ServiceHost,\n ServiceUrl,\n} from './lib/services';\n\nexport {\n makeWebexStore,\n makeWebexPluginStore,\n MemoryStoreAdapter,\n NotFoundError,\n persist,\n StorageError,\n waitForValue,\n} from './lib/storage';\n\nexport {default, registerPlugin, registerInternalPlugin} from './webex-core';\n\nexport {default as WebexHttpError} from './lib/webex-http-error';\nexport {default as StatelessWebexPlugin} from './lib/stateless-webex-plugin';\nexport {default as WebexPlugin} from './lib/webex-plugin';\nexport {default as AuthInterceptor} from './interceptors/auth';\nexport {default as NetworkTimingInterceptor} from './interceptors/network-timing';\nexport {default as PayloadTransformerInterceptor} from './interceptors/payload-transformer';\nexport {default as RedirectInterceptor} from './interceptors/redirect';\nexport {default as ResponseLoggerInterceptor} from './interceptors/response-logger';\nexport {default as RequestEventInterceptor} from './interceptors/request-event';\nexport {default as RequestLoggerInterceptor} from './interceptors/request-logger';\nexport {default as RequestTimingInterceptor} from './interceptors/request-timing';\nexport {default as UserAgentInterceptor} from './interceptors/user-agent';\nexport {default as WebexTrackingIdInterceptor} from './interceptors/webex-tracking-id';\nexport {default as WebexUserAgentInterceptor} from './interceptors/webex-user-agent';\nexport {default as RateLimitInterceptor} from './interceptors/rate-limit';\nexport {default as EmbargoInterceptor} from './interceptors/embargo';\nexport {default as DefaultOptionsInterceptor} from './interceptors/default-options';\n\nexport {default as Batcher} from './lib/batcher';\nexport {default as Page} from './lib/page';\nexport {default as config} from './config';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAWA;;AACA;;AACA;;AAgBA;;AAUA;;AAEA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AACA;;AAEA;;AACA;;AACA"}
1
+ {"version":3,"names":[],"sources":["index.js"],"sourcesContent":["/*!\n * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.\n *\n * Services is currently a part of webex-core due to how the contents of\n * the original internal-plugin-services needed to be accessed when webex-core\n * is initialized. As a plugin outside of webex-core, it would initialize after\n * credentials, causing all requests prior to its initialization to fail\n * federation requirements, and instead send requests to the environmentally-\n * assigned urls.\n */\n\nimport './plugins/logger';\nimport './lib/credentials';\nimport './lib/services';\n\nexport {Credentials, filterScope, grantErrors, sortScope, Token} from './lib/credentials';\n\nexport {\n constants as serviceConstants,\n ServiceCatalog,\n ServiceRegistry,\n ServiceState,\n ServiceInterceptor,\n ServerErrorInterceptor,\n Services,\n ServiceHost,\n ServiceUrl,\n} from './lib/services';\n\nexport {\n makeWebexStore,\n makeWebexPluginStore,\n MemoryStoreAdapter,\n NotFoundError,\n persist,\n StorageError,\n waitForValue,\n} from './lib/storage';\n\nexport {default, registerPlugin, registerInternalPlugin} from './webex-core';\n\nexport {default as WebexHttpError} from './lib/webex-http-error';\nexport {default as StatelessWebexPlugin} from './lib/stateless-webex-plugin';\nexport {default as WebexPlugin} from './lib/webex-plugin';\nexport {default as AuthInterceptor} from './interceptors/auth';\nexport {default as NetworkTimingInterceptor} from './interceptors/network-timing';\nexport {default as PayloadTransformerInterceptor} from './interceptors/payload-transformer';\nexport {default as RedirectInterceptor} from './interceptors/redirect';\nexport {default as ResponseLoggerInterceptor} from './interceptors/response-logger';\nexport {default as RequestEventInterceptor} from './interceptors/request-event';\nexport {default as RequestLoggerInterceptor} from './interceptors/request-logger';\nexport {default as RequestTimingInterceptor} from './interceptors/request-timing';\nexport {default as UserAgentInterceptor} from './interceptors/user-agent';\nexport {default as WebexTrackingIdInterceptor} from './interceptors/webex-tracking-id';\nexport {default as WebexUserAgentInterceptor} from './interceptors/webex-user-agent';\nexport {default as RateLimitInterceptor} from './interceptors/rate-limit';\nexport {default as EmbargoInterceptor} from './interceptors/embargo';\nexport {default as DefaultOptionsInterceptor} from './interceptors/default-options';\n\nexport {default as Batcher} from './lib/batcher';\nexport {default as Page} from './lib/page';\nexport {default as config} from './config';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAWA;AACA;AACA;AAgBA;AAUA;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AAEA;AACA;AACA;AAA2C;AAAA"}