Commit iniziale
This commit is contained in:
22
node_modules/@azure/msal-node/dist/request/AuthorizationCodeRequest.d.ts
generated
vendored
Normal file
22
node_modules/@azure/msal-node/dist/request/AuthorizationCodeRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
import { CommonAuthorizationCodeRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Request object passed by user to acquire a token from the server exchanging a valid authorization code (second leg of OAuth2.0 Authorization Code flow)
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - authority: - URL of the authority, the security token service (STS) from which MSAL will acquire tokens. If authority is set on client application object, this will override that value. Overriding the value will cause for authority validation to happen each time. If the same authority will be used for all request, set on the application object instead of the requests.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - redirectUri - The redirect URI of your app, where the authority will redirect to after the user inputs credentials and consents. It must exactly match one of the redirect URIs you registered in the portal.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - code - The authorization_code that the user acquired in the first leg of the flow.
|
||||
* - codeVerifier - The same code_verifier that was used to obtain the authorization_code. Required if PKCE was used in the authorization code grant request.For more information, see the PKCE RFC: https://tools.ietf.org/html/rfc7636
|
||||
* - state - Unique GUID generated by the user that is cached by the user and sent to the server during the first leg of the flow. This string is sent back by the server with the authorization code. The user cached state is then compared with the state received from the server to mitigate the risk of CSRF attacks. See https://datatracker.ietf.org/doc/html/rfc6819#section-3.6.
|
||||
* @public
|
||||
*/
|
||||
export type AuthorizationCodeRequest = Partial<Omit<CommonAuthorizationCodeRequest, "scopes" | "redirectUri" | "code" | "authenticationScheme" | "resourceRequestMethod" | "resourceRequestUri" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
scopes: Array<string>;
|
||||
redirectUri: string;
|
||||
code: string;
|
||||
state?: string;
|
||||
};
|
||||
//# sourceMappingURL=AuthorizationCodeRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/AuthorizationCodeRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/AuthorizationCodeRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AuthorizationCodeRequest.d.ts","sourceRoot":"","sources":["../../src/request/AuthorizationCodeRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,8BAA8B,EAAE,MAAM,yBAAyB,CAAC;AAEzE;;;;;;;;;;;;;GAaG;AACH,MAAM,MAAM,wBAAwB,GAAG,OAAO,CAC1C,IAAI,CACA,8BAA8B,EAC5B,QAAQ,GACR,aAAa,GACb,MAAM,GACN,sBAAsB,GACtB,uBAAuB,GACvB,oBAAoB,GACpB,qBAAqB,GACrB,cAAc,CACnB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,WAAW,EAAE,MAAM,CAAC;IACpB,IAAI,EAAE,MAAM,CAAC;IACb,KAAK,CAAC,EAAE,MAAM,CAAC;CAClB,CAAC"}
|
||||
34
node_modules/@azure/msal-node/dist/request/AuthorizationUrlRequest.d.ts
generated
vendored
Normal file
34
node_modules/@azure/msal-node/dist/request/AuthorizationUrlRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,34 @@
|
||||
import { CommonAuthorizationUrlRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Request object passed by user to retrieve a Code from the server (first leg of authorization code grant flow)
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - redirectUri - The redirect URI where authentication responses can be received by your application. It must exactly match one of the redirect URIs registered in the Azure portal.
|
||||
* - extraScopesToConsent - Scopes for a different resource when the user needs consent upfront.
|
||||
* - responseMode - Specifies the method that should be used to send the authentication result to your app. Can be query, form_post, or fragment. If no value is passed in, it defaults to query.
|
||||
* - codeChallenge - Used to secure authorization code grant via Proof of Key for Code Exchange (PKCE). For more information, see the PKCE RCF:https://tools.ietf.org/html/rfc7636
|
||||
* - codeChallengeMethod - The method used to encode the code verifier for the code challenge parameter. Can be "plain" or "S256". If excluded, code challenge is assumed to be plaintext. For more information, see the PKCE RCF: https://tools.ietf.org/html/rfc7636
|
||||
* - state - A value included in the request that is also returned in the token response. A randomly generated unique value is typically used for preventing cross site request forgery attacks. The state is also used to encode information about the user's state in the app before the authentication request occurred.
|
||||
* - prompt - Indicates the type of user interaction that is required.
|
||||
* login: will force the user to enter their credentials on that request, negating single-sign on
|
||||
* none: will ensure that the user isn't presented with any interactive prompt. if request can't be completed via single-sign on, the endpoint will return an interaction_required error
|
||||
* consent: will the trigger the OAuth consent dialog after the user signs in, asking the user to grant permissions to the app
|
||||
* select_account: will interrupt single sign-=on providing account selection experience listing all the accounts in session or any remembered accounts or an option to choose to use a different account
|
||||
* create: will direct the user to the account creation experience instead of the log in experience
|
||||
* - account - AccountInfo obtained from a getAccount API. Will be used in certain scenarios to generate login_hint if both loginHint and sid params are not provided.
|
||||
* - loginHint - Can be used to pre-fill the username/email address field of the sign-in page for the user, if you know the username/email address ahead of time. Often apps use this parameter during re-authentication, having already extracted the username from a previous sign-in using the preferred_username claim.
|
||||
* - sid - Session ID, unique identifier for the session. Available as an optional claim on ID tokens.
|
||||
* - domainHint - Provides a hint about the tenant or domain that the user should use to sign in. The value of the domain hint is a registered domain for the tenant.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the /authorize call
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - nonce - A value included in the request that is returned in the id token. A randomly generated unique value is typically used to mitigate replay attacks.
|
||||
* @public
|
||||
*/
|
||||
export type AuthorizationUrlRequest = Partial<Omit<CommonAuthorizationUrlRequest, "scopes" | "redirectUri" | "resourceRequestMethod" | "resourceRequestUri" | "authenticationScheme" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
scopes: Array<string>;
|
||||
redirectUri: string;
|
||||
};
|
||||
//# sourceMappingURL=AuthorizationUrlRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/AuthorizationUrlRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/AuthorizationUrlRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AuthorizationUrlRequest.d.ts","sourceRoot":"","sources":["../../src/request/AuthorizationUrlRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,6BAA6B,EAAE,MAAM,yBAAyB,CAAC;AAExE;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAM,MAAM,uBAAuB,GAAG,OAAO,CACzC,IAAI,CACA,6BAA6B,EAC3B,QAAQ,GACR,aAAa,GACb,uBAAuB,GACvB,oBAAoB,GACpB,sBAAsB,GACtB,qBAAqB,GACrB,cAAc,CACnB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,WAAW,EAAE,MAAM,CAAC;CACvB,CAAC"}
|
||||
15
node_modules/@azure/msal-node/dist/request/ClientCredentialRequest.d.ts
generated
vendored
Normal file
15
node_modules/@azure/msal-node/dist/request/ClientCredentialRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,15 @@
|
||||
import { ClientAssertionCallback, CommonClientCredentialRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* CommonClientCredentialRequest
|
||||
* - scopes - Array of scopes the application is requesting access to. Typically contains only the .default scope for a single resource. See: https://learn.microsoft.com/azure/active-directory/develop/scopes-oidc#the-default-scope
|
||||
* - authority - URL of the authority, the security token service (STS) from which MSAL will acquire tokens.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - skipCache - Skip token cache lookup and force request to authority to get a a new token. Defaults to false.
|
||||
* - clientAssertion - An assertion string or a callback function that returns an assertion string (both are Base64Url-encoded signed JWTs) used in the Client Credential flow
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* @public
|
||||
*/
|
||||
export type ClientCredentialRequest = Partial<Omit<CommonClientCredentialRequest, "resourceRequestMethod" | "resourceRequestUri" | "requestedClaimsHash" | "clientAssertion" | "storeInCache">> & {
|
||||
clientAssertion?: string | ClientAssertionCallback;
|
||||
};
|
||||
//# sourceMappingURL=ClientCredentialRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/ClientCredentialRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/ClientCredentialRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ClientCredentialRequest.d.ts","sourceRoot":"","sources":["../../src/request/ClientCredentialRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,uBAAuB,EACvB,6BAA6B,EAChC,MAAM,yBAAyB,CAAC;AAEjC;;;;;;;;;GASG;AACH,MAAM,MAAM,uBAAuB,GAAG,OAAO,CACzC,IAAI,CACA,6BAA6B,EAC3B,uBAAuB,GACvB,oBAAoB,GACpB,qBAAqB,GACrB,iBAAiB,GACjB,cAAc,CACnB,CACJ,GAAG;IACA,eAAe,CAAC,EAAE,MAAM,GAAG,uBAAuB,CAAC;CACtD,CAAC"}
|
||||
16
node_modules/@azure/msal-node/dist/request/DeviceCodeRequest.d.ts
generated
vendored
Normal file
16
node_modules/@azure/msal-node/dist/request/DeviceCodeRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,16 @@
|
||||
import { CommonDeviceCodeRequest, DeviceCodeResponse } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Parameters for Oauth2 device code flow.
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authority: - URL of the authority, the security token service (STS) from which MSAL will acquire tokens. If authority is set on client application object, this will override that value. Overriding the value will cause for authority validation to happen each time. If the same authority will be used for all request, set on the application object instead of the requests.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - deviceCodeCallback - Callback containing device code response. Message should be shown to end user. End user can then navigate to the verification_uri, input the user_code, and input credentials.
|
||||
* - cancel - Boolean to cancel polling of device code endpoint. While the user authenticates on a separate device, MSAL polls the the token endpoint of security token service for the interval specified in the device code response (usually 15 minutes). To stop polling and cancel the request, set cancel=true.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the query string
|
||||
* @public
|
||||
*/
|
||||
export type DeviceCodeRequest = Partial<Omit<CommonDeviceCodeRequest, "scopes" | "deviceCodeCallback" | "resourceRequestMethod" | "resourceRequestUri" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
scopes: Array<string>;
|
||||
deviceCodeCallback: (response: DeviceCodeResponse) => void;
|
||||
};
|
||||
//# sourceMappingURL=DeviceCodeRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/DeviceCodeRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/DeviceCodeRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"DeviceCodeRequest.d.ts","sourceRoot":"","sources":["../../src/request/DeviceCodeRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,uBAAuB,EACvB,kBAAkB,EACrB,MAAM,yBAAyB,CAAC;AAEjC;;;;;;;;;GASG;AACH,MAAM,MAAM,iBAAiB,GAAG,OAAO,CACnC,IAAI,CACA,uBAAuB,EACrB,QAAQ,GACR,oBAAoB,GACpB,uBAAuB,GACvB,oBAAoB,GACpB,qBAAqB,GACrB,cAAc,CACnB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,kBAAkB,EAAE,CAAC,QAAQ,EAAE,kBAAkB,KAAK,IAAI,CAAC;CAC9D,CAAC"}
|
||||
23
node_modules/@azure/msal-node/dist/request/InteractiveRequest.d.ts
generated
vendored
Normal file
23
node_modules/@azure/msal-node/dist/request/InteractiveRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,23 @@
|
||||
/// <reference types="node" resolution-mode="require"/>
|
||||
import { CommonAuthorizationUrlRequest } from "@azure/msal-common/node";
|
||||
import { ILoopbackClient } from "../network/ILoopbackClient.js";
|
||||
/**
|
||||
* Request object passed by user to configure acquireTokenInteractive API
|
||||
*
|
||||
* - openBrowser - Function to open a browser instance on user's system.
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - successTemplate: - Template to be displayed on the opened browser instance upon successful token acquisition.
|
||||
* - errorTemplate - Template to be displayed on the opened browser instance upon token acquisition failure.
|
||||
* - windowHandle - Used in native broker flows to properly parent the native broker window
|
||||
* - loopbackClient - Custom implementation for a loopback server to listen for authorization code response.
|
||||
* @public
|
||||
*/
|
||||
export type InteractiveRequest = Partial<Omit<CommonAuthorizationUrlRequest, "scopes" | "redirectUri" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
openBrowser: (url: string) => Promise<void>;
|
||||
scopes?: Array<string>;
|
||||
successTemplate?: string;
|
||||
errorTemplate?: string;
|
||||
windowHandle?: Buffer;
|
||||
loopbackClient?: ILoopbackClient;
|
||||
};
|
||||
//# sourceMappingURL=InteractiveRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/InteractiveRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/InteractiveRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"InteractiveRequest.d.ts","sourceRoot":"","sources":["../../src/request/InteractiveRequest.ts"],"names":[],"mappings":";AAKA,OAAO,EAAE,6BAA6B,EAAE,MAAM,yBAAyB,CAAC;AACxE,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAEhE;;;;;;;;;;GAUG;AACH,MAAM,MAAM,kBAAkB,GAAG,OAAO,CACpC,IAAI,CACA,6BAA6B,EAC7B,QAAQ,GAAG,aAAa,GAAG,qBAAqB,GAAG,cAAc,CACpE,CACJ,GAAG;IACA,WAAW,EAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IAC5C,MAAM,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACvB,eAAe,CAAC,EAAE,MAAM,CAAC;IACzB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,cAAc,CAAC,EAAE,eAAe,CAAC;CACpC,CAAC"}
|
||||
9
node_modules/@azure/msal-node/dist/request/ManagedIdentityRequest.d.ts
generated
vendored
Normal file
9
node_modules/@azure/msal-node/dist/request/ManagedIdentityRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
import { CommonClientCredentialRequest } from "@azure/msal-common/node";
|
||||
import { ManagedIdentityRequestParams } from "./ManagedIdentityRequestParams.js";
|
||||
/**
|
||||
* ManagedIdentityRequest
|
||||
* - forceRefresh - forces managed identity requests to skip the cache and make network calls if true
|
||||
* - resource - resource requested to access the protected API. It should be of the form "{ResourceIdUri}" or {ResourceIdUri/.default}. For instance https://management.azure.net or, for Microsoft Graph, https://graph.microsoft.com/.default
|
||||
*/
|
||||
export type ManagedIdentityRequest = ManagedIdentityRequestParams & CommonClientCredentialRequest;
|
||||
//# sourceMappingURL=ManagedIdentityRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/ManagedIdentityRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/ManagedIdentityRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ManagedIdentityRequest.d.ts","sourceRoot":"","sources":["../../src/request/ManagedIdentityRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,6BAA6B,EAAE,MAAM,yBAAyB,CAAC;AACxE,OAAO,EAAE,4BAA4B,EAAE,MAAM,mCAAmC,CAAC;AAEjF;;;;GAIG;AACH,MAAM,MAAM,sBAAsB,GAAG,4BAA4B,GAC7D,6BAA6B,CAAC"}
|
||||
13
node_modules/@azure/msal-node/dist/request/ManagedIdentityRequestParams.d.ts
generated
vendored
Normal file
13
node_modules/@azure/msal-node/dist/request/ManagedIdentityRequestParams.d.ts
generated
vendored
Normal file
@@ -0,0 +1,13 @@
|
||||
/**
|
||||
* ManagedIdentityRequest
|
||||
* - claims - a stringified claims request which will be used to determine whether or not the cache should be skipped
|
||||
* - forceRefresh - forces managed identity requests to skip the cache and make network calls if true
|
||||
* - resource - resource requested to access the protected API. It should be of the form "ResourceIdUri" or "ResourceIdUri/.default". For instance https://management.azure.net or, for Microsoft Graph, https://graph.microsoft.com/.default
|
||||
* @public
|
||||
*/
|
||||
export type ManagedIdentityRequestParams = {
|
||||
claims?: string;
|
||||
forceRefresh?: boolean;
|
||||
resource: string;
|
||||
};
|
||||
//# sourceMappingURL=ManagedIdentityRequestParams.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/ManagedIdentityRequestParams.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/ManagedIdentityRequestParams.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ManagedIdentityRequestParams.d.ts","sourceRoot":"","sources":["../../src/request/ManagedIdentityRequestParams.ts"],"names":[],"mappings":"AAKA;;;;;;GAMG;AACH,MAAM,MAAM,4BAA4B,GAAG;IACvC,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,QAAQ,EAAE,MAAM,CAAC;CACpB,CAAC"}
|
||||
15
node_modules/@azure/msal-node/dist/request/OnBehalfOfRequest.d.ts
generated
vendored
Normal file
15
node_modules/@azure/msal-node/dist/request/OnBehalfOfRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,15 @@
|
||||
import { CommonOnBehalfOfRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authority - URL of the authority, the security token service (STS) from which MSAL will acquire tokens.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - oboAssertion - The access token that was sent to the middle-tier API. This token must have an audience of the app making this OBO request.
|
||||
* - skipCache - Skip token cache lookup and force request to authority to get a a new token. Defaults to false.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* @public
|
||||
*/
|
||||
export type OnBehalfOfRequest = Partial<Omit<CommonOnBehalfOfRequest, "oboAssertion" | "scopes" | "resourceRequestMethod" | "resourceRequestUri" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
oboAssertion: string;
|
||||
scopes: Array<string>;
|
||||
};
|
||||
//# sourceMappingURL=OnBehalfOfRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/OnBehalfOfRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/OnBehalfOfRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"OnBehalfOfRequest.d.ts","sourceRoot":"","sources":["../../src/request/OnBehalfOfRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,uBAAuB,EAAE,MAAM,yBAAyB,CAAC;AAElE;;;;;;;;GAQG;AACH,MAAM,MAAM,iBAAiB,GAAG,OAAO,CACnC,IAAI,CACA,uBAAuB,EACrB,cAAc,GACd,QAAQ,GACR,uBAAuB,GACvB,oBAAoB,GACpB,qBAAqB,GACrB,cAAc,CACnB,CACJ,GAAG;IACA,YAAY,EAAE,MAAM,CAAC;IACrB,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;CACzB,CAAC"}
|
||||
18
node_modules/@azure/msal-node/dist/request/RefreshTokenRequest.d.ts
generated
vendored
Normal file
18
node_modules/@azure/msal-node/dist/request/RefreshTokenRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,18 @@
|
||||
import { CommonRefreshTokenRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* CommonRefreshTokenRequest
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - authority - URL of the authority, the security token service (STS) from which MSAL will acquire tokens.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - refreshToken - A refresh token returned from a previous request to the Identity provider.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - forceCache - Force MSAL to cache a refresh token flow response when there is no account in the cache. Used for migration scenarios.
|
||||
* @public
|
||||
*/
|
||||
export type RefreshTokenRequest = Partial<Omit<CommonRefreshTokenRequest, "scopes" | "refreshToken" | "authenticationScheme" | "resourceRequestMethod" | "resourceRequestUri" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
scopes: Array<string>;
|
||||
refreshToken: string;
|
||||
forceCache?: boolean;
|
||||
};
|
||||
//# sourceMappingURL=RefreshTokenRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/RefreshTokenRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/RefreshTokenRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"RefreshTokenRequest.d.ts","sourceRoot":"","sources":["../../src/request/RefreshTokenRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,yBAAyB,EAAE,MAAM,yBAAyB,CAAC;AAEpE;;;;;;;;;;GAUG;AACH,MAAM,MAAM,mBAAmB,GAAG,OAAO,CACrC,IAAI,CACA,yBAAyB,EACvB,QAAQ,GACR,cAAc,GACd,sBAAsB,GACtB,uBAAuB,GACvB,oBAAoB,GACpB,qBAAqB,GACrB,cAAc,CACnB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,YAAY,EAAE,MAAM,CAAC;IACrB,UAAU,CAAC,EAAE,OAAO,CAAC;CACxB,CAAC"}
|
||||
7
node_modules/@azure/msal-node/dist/request/SignOutRequest.d.ts
generated
vendored
Normal file
7
node_modules/@azure/msal-node/dist/request/SignOutRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,7 @@
|
||||
import { AccountInfo } from "@azure/msal-common/node";
|
||||
/** @public */
|
||||
export type SignOutRequest = {
|
||||
account: AccountInfo;
|
||||
correlationId?: string;
|
||||
};
|
||||
//# sourceMappingURL=SignOutRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/SignOutRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/SignOutRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"SignOutRequest.d.ts","sourceRoot":"","sources":["../../src/request/SignOutRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,WAAW,EAAE,MAAM,yBAAyB,CAAC;AAEtD,cAAc;AACd,MAAM,MAAM,cAAc,GAAG;IACzB,OAAO,EAAE,WAAW,CAAC;IACrB,aAAa,CAAC,EAAE,MAAM,CAAC;CAC1B,CAAC"}
|
||||
17
node_modules/@azure/msal-node/dist/request/SilentFlowRequest.d.ts
generated
vendored
Normal file
17
node_modules/@azure/msal-node/dist/request/SilentFlowRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,17 @@
|
||||
import { AccountInfo, CommonSilentFlowRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* SilentFlow parameters passed by the user to retrieve credentials silently
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls. When included on a silent request, cache lookup will be skipped and token will be refreshed.
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - account - Account entity to lookup the credentials.
|
||||
* - forceRefresh - Forces silent requests to make network calls if true.
|
||||
* @public
|
||||
*/
|
||||
export type SilentFlowRequest = Partial<Omit<CommonSilentFlowRequest, "account" | "scopes" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
account: AccountInfo;
|
||||
scopes: Array<string>;
|
||||
};
|
||||
//# sourceMappingURL=SilentFlowRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/SilentFlowRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/SilentFlowRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"SilentFlowRequest.d.ts","sourceRoot":"","sources":["../../src/request/SilentFlowRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,WAAW,EAAE,uBAAuB,EAAE,MAAM,yBAAyB,CAAC;AAE/E;;;;;;;;;;GAUG;AACH,MAAM,MAAM,iBAAiB,GAAG,OAAO,CACnC,IAAI,CACA,uBAAuB,EACvB,SAAS,GAAG,QAAQ,GAAG,qBAAqB,GAAG,cAAc,CAChE,CACJ,GAAG;IACA,OAAO,EAAE,WAAW,CAAC;IACrB,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;CACzB,CAAC"}
|
||||
20
node_modules/@azure/msal-node/dist/request/UsernamePasswordRequest.d.ts
generated
vendored
Normal file
20
node_modules/@azure/msal-node/dist/request/UsernamePasswordRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,20 @@
|
||||
import { CommonUsernamePasswordRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* UsernamePassword parameters passed by the user to retrieve credentials
|
||||
* Note: The latest OAuth 2.0 Security Best Current Practice disallows the password grant entirely. This flow is added for internal testing.
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls. When included on a silent request, cache lookup will be skipped and token will be refreshed.
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - username - username of the client
|
||||
* - password - credentials
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* @public
|
||||
*/
|
||||
export type UsernamePasswordRequest = Partial<Omit<CommonUsernamePasswordRequest, "scopes" | "resourceRequestMethod" | "resourceRequestUri" | "username" | "password" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
scopes: Array<string>;
|
||||
username: string;
|
||||
password: string;
|
||||
};
|
||||
//# sourceMappingURL=UsernamePasswordRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/dist/request/UsernamePasswordRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/request/UsernamePasswordRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"UsernamePasswordRequest.d.ts","sourceRoot":"","sources":["../../src/request/UsernamePasswordRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,6BAA6B,EAAE,MAAM,yBAAyB,CAAC;AAExE;;;;;;;;;;;;GAYG;AACH,MAAM,MAAM,uBAAuB,GAAG,OAAO,CACzC,IAAI,CACA,6BAA6B,EAC3B,QAAQ,GACR,uBAAuB,GACvB,oBAAoB,GACpB,UAAU,GACV,UAAU,GACV,qBAAqB,GACrB,cAAc,CACnB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;CACpB,CAAC"}
|
||||
Reference in New Issue
Block a user