Commit iniziale
This commit is contained in:
12476
node_modules/@azure/msal-node/lib/msal-node.cjs
generated
vendored
Normal file
12476
node_modules/@azure/msal-node/lib/msal-node.cjs
generated
vendored
Normal file
File diff suppressed because it is too large
Load Diff
1
node_modules/@azure/msal-node/lib/msal-node.cjs.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/msal-node.cjs.map
generated
vendored
Normal file
File diff suppressed because one or more lines are too long
1
node_modules/@azure/msal-node/lib/package.json
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/package.json
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"type":"commonjs"}
|
||||
16
node_modules/@azure/msal-node/lib/types/cache/ITokenCache.d.ts
generated
vendored
Normal file
16
node_modules/@azure/msal-node/lib/types/cache/ITokenCache.d.ts
generated
vendored
Normal file
@@ -0,0 +1,16 @@
|
||||
import { AccountInfo } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Token cache interface for the client, giving access to cache APIs
|
||||
* @public
|
||||
*/
|
||||
export interface ITokenCache {
|
||||
/** API that retrieves all accounts currently in cache to the user */
|
||||
getAllAccounts(): Promise<AccountInfo[]>;
|
||||
/** Returns the signed in account matching homeAccountId */
|
||||
getAccountByHomeId(homeAccountId: string): Promise<AccountInfo | null>;
|
||||
/** Returns the signed in account matching localAccountId */
|
||||
getAccountByLocalId(localAccountId: string): Promise<AccountInfo | null>;
|
||||
/** API to remove a specific account and the relevant data from cache */
|
||||
removeAccount(account: AccountInfo): Promise<void>;
|
||||
}
|
||||
//# sourceMappingURL=ITokenCache.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/cache/ITokenCache.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/cache/ITokenCache.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ITokenCache.d.ts","sourceRoot":"","sources":["../../../src/cache/ITokenCache.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,WAAW,EAAE,MAAM,yBAAyB,CAAC;AAEtD;;;GAGG;AACH,MAAM,WAAW,WAAW;IACxB,qEAAqE;IACrE,cAAc,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;IAEzC,2DAA2D;IAC3D,kBAAkB,CAAC,aAAa,EAAE,MAAM,GAAG,OAAO,CAAC,WAAW,GAAG,IAAI,CAAC,CAAC;IAEvE,4DAA4D;IAC5D,mBAAmB,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO,CAAC,WAAW,GAAG,IAAI,CAAC,CAAC;IAEzE,wEAAwE;IACxE,aAAa,CAAC,OAAO,EAAE,WAAW,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;CACtD"}
|
||||
194
node_modules/@azure/msal-node/lib/types/cache/NodeStorage.d.ts
generated
vendored
Normal file
194
node_modules/@azure/msal-node/lib/types/cache/NodeStorage.d.ts
generated
vendored
Normal file
@@ -0,0 +1,194 @@
|
||||
import { TokenKeys, AccountEntity, IdTokenEntity, AccessTokenEntity, RefreshTokenEntity, AppMetadataEntity, ServerTelemetryEntity, ThrottlingEntity, CacheManager, Logger, ValidCacheType, ICrypto, AuthorityMetadataEntity, ValidCredentialType, StaticAuthorityOptions } from "@azure/msal-common/node";
|
||||
import { InMemoryCache, JsonCache, CacheKVStore } from "./serializer/SerializerTypes.js";
|
||||
/**
|
||||
* This class implements Storage for node, reading cache from user specified storage location or an extension library
|
||||
* @public
|
||||
*/
|
||||
export declare class NodeStorage extends CacheManager {
|
||||
private logger;
|
||||
private cache;
|
||||
private changeEmitters;
|
||||
constructor(logger: Logger, clientId: string, cryptoImpl: ICrypto, staticAuthorityOptions?: StaticAuthorityOptions);
|
||||
/**
|
||||
* Queue up callbacks
|
||||
* @param func - a callback function for cache change indication
|
||||
*/
|
||||
registerChangeEmitter(func: () => void): void;
|
||||
/**
|
||||
* Invoke the callback when cache changes
|
||||
*/
|
||||
emitChange(): void;
|
||||
/**
|
||||
* Converts cacheKVStore to InMemoryCache
|
||||
* @param cache - key value store
|
||||
*/
|
||||
cacheToInMemoryCache(cache: CacheKVStore): InMemoryCache;
|
||||
/**
|
||||
* converts inMemoryCache to CacheKVStore
|
||||
* @param inMemoryCache - kvstore map for inmemory
|
||||
*/
|
||||
inMemoryCacheToCache(inMemoryCache: InMemoryCache): CacheKVStore;
|
||||
/**
|
||||
* gets the current in memory cache for the client
|
||||
*/
|
||||
getInMemoryCache(): InMemoryCache;
|
||||
/**
|
||||
* sets the current in memory cache for the client
|
||||
* @param inMemoryCache - key value map in memory
|
||||
*/
|
||||
setInMemoryCache(inMemoryCache: InMemoryCache): void;
|
||||
/**
|
||||
* get the current cache key-value store
|
||||
*/
|
||||
getCache(): CacheKVStore;
|
||||
/**
|
||||
* sets the current cache (key value store)
|
||||
* @param cacheMap - key value map
|
||||
*/
|
||||
setCache(cache: CacheKVStore): void;
|
||||
/**
|
||||
* Gets cache item with given key.
|
||||
* @param key - lookup key for the cache entry
|
||||
*/
|
||||
getItem(key: string): ValidCacheType;
|
||||
/**
|
||||
* Gets cache item with given key-value
|
||||
* @param key - lookup key for the cache entry
|
||||
* @param value - value of the cache entry
|
||||
*/
|
||||
setItem(key: string, value: ValidCacheType): void;
|
||||
getAccountKeys(): string[];
|
||||
getTokenKeys(): TokenKeys;
|
||||
/**
|
||||
* fetch the account entity
|
||||
* @param accountKey - lookup key to fetch cache type AccountEntity
|
||||
*/
|
||||
getAccount(accountKey: string): AccountEntity | null;
|
||||
/**
|
||||
* Reads account from cache, builds it into an account entity and returns it.
|
||||
* @param accountKey - lookup key to fetch cache type AccountEntity
|
||||
* @returns
|
||||
*/
|
||||
getCachedAccountEntity(accountKey: string): AccountEntity | null;
|
||||
/**
|
||||
* set account entity
|
||||
* @param account - cache value to be set of type AccountEntity
|
||||
*/
|
||||
setAccount(account: AccountEntity): void;
|
||||
/**
|
||||
* fetch the idToken credential
|
||||
* @param idTokenKey - lookup key to fetch cache type IdTokenEntity
|
||||
*/
|
||||
getIdTokenCredential(idTokenKey: string): IdTokenEntity | null;
|
||||
/**
|
||||
* set idToken credential
|
||||
* @param idToken - cache value to be set of type IdTokenEntity
|
||||
*/
|
||||
setIdTokenCredential(idToken: IdTokenEntity): void;
|
||||
/**
|
||||
* fetch the accessToken credential
|
||||
* @param accessTokenKey - lookup key to fetch cache type AccessTokenEntity
|
||||
*/
|
||||
getAccessTokenCredential(accessTokenKey: string): AccessTokenEntity | null;
|
||||
/**
|
||||
* set accessToken credential
|
||||
* @param accessToken - cache value to be set of type AccessTokenEntity
|
||||
*/
|
||||
setAccessTokenCredential(accessToken: AccessTokenEntity): void;
|
||||
/**
|
||||
* fetch the refreshToken credential
|
||||
* @param refreshTokenKey - lookup key to fetch cache type RefreshTokenEntity
|
||||
*/
|
||||
getRefreshTokenCredential(refreshTokenKey: string): RefreshTokenEntity | null;
|
||||
/**
|
||||
* set refreshToken credential
|
||||
* @param refreshToken - cache value to be set of type RefreshTokenEntity
|
||||
*/
|
||||
setRefreshTokenCredential(refreshToken: RefreshTokenEntity): void;
|
||||
/**
|
||||
* fetch appMetadata entity from the platform cache
|
||||
* @param appMetadataKey - lookup key to fetch cache type AppMetadataEntity
|
||||
*/
|
||||
getAppMetadata(appMetadataKey: string): AppMetadataEntity | null;
|
||||
/**
|
||||
* set appMetadata entity to the platform cache
|
||||
* @param appMetadata - cache value to be set of type AppMetadataEntity
|
||||
*/
|
||||
setAppMetadata(appMetadata: AppMetadataEntity): void;
|
||||
/**
|
||||
* fetch server telemetry entity from the platform cache
|
||||
* @param serverTelemetrykey - lookup key to fetch cache type ServerTelemetryEntity
|
||||
*/
|
||||
getServerTelemetry(serverTelemetrykey: string): ServerTelemetryEntity | null;
|
||||
/**
|
||||
* set server telemetry entity to the platform cache
|
||||
* @param serverTelemetryKey - lookup key to fetch cache type ServerTelemetryEntity
|
||||
* @param serverTelemetry - cache value to be set of type ServerTelemetryEntity
|
||||
*/
|
||||
setServerTelemetry(serverTelemetryKey: string, serverTelemetry: ServerTelemetryEntity): void;
|
||||
/**
|
||||
* fetch authority metadata entity from the platform cache
|
||||
* @param key - lookup key to fetch cache type AuthorityMetadataEntity
|
||||
*/
|
||||
getAuthorityMetadata(key: string): AuthorityMetadataEntity | null;
|
||||
/**
|
||||
* Get all authority metadata keys
|
||||
*/
|
||||
getAuthorityMetadataKeys(): Array<string>;
|
||||
/**
|
||||
* set authority metadata entity to the platform cache
|
||||
* @param key - lookup key to fetch cache type AuthorityMetadataEntity
|
||||
* @param metadata - cache value to be set of type AuthorityMetadataEntity
|
||||
*/
|
||||
setAuthorityMetadata(key: string, metadata: AuthorityMetadataEntity): void;
|
||||
/**
|
||||
* fetch throttling entity from the platform cache
|
||||
* @param throttlingCacheKey - lookup key to fetch cache type ThrottlingEntity
|
||||
*/
|
||||
getThrottlingCache(throttlingCacheKey: string): ThrottlingEntity | null;
|
||||
/**
|
||||
* set throttling entity to the platform cache
|
||||
* @param throttlingCacheKey - lookup key to fetch cache type ThrottlingEntity
|
||||
* @param throttlingCache - cache value to be set of type ThrottlingEntity
|
||||
*/
|
||||
setThrottlingCache(throttlingCacheKey: string, throttlingCache: ThrottlingEntity): void;
|
||||
/**
|
||||
* Removes the cache item from memory with the given key.
|
||||
* @param key - lookup key to remove a cache entity
|
||||
* @param inMemory - key value map of the cache
|
||||
*/
|
||||
removeItem(key: string): boolean;
|
||||
/**
|
||||
* Remove account entity from the platform cache if it's outdated
|
||||
* @param accountKey - lookup key to fetch cache type AccountEntity
|
||||
*/
|
||||
removeOutdatedAccount(accountKey: string): void;
|
||||
/**
|
||||
* Checks whether key is in cache.
|
||||
* @param key - look up key for a cache entity
|
||||
*/
|
||||
containsKey(key: string): boolean;
|
||||
/**
|
||||
* Gets all keys in window.
|
||||
*/
|
||||
getKeys(): string[];
|
||||
/**
|
||||
* Clears all cache entries created by MSAL (except tokens).
|
||||
*/
|
||||
clear(): void;
|
||||
/**
|
||||
* Initialize in memory cache from an exisiting cache vault
|
||||
* @param cache - blob formatted cache (JSON)
|
||||
*/
|
||||
static generateInMemoryCache(cache: string): InMemoryCache;
|
||||
/**
|
||||
* retrieves the final JSON
|
||||
* @param inMemoryCache - itemised cache read from the JSON
|
||||
*/
|
||||
static generateJsonCache(inMemoryCache: InMemoryCache): JsonCache;
|
||||
/**
|
||||
* Updates a credential's cache key if the current cache key is outdated
|
||||
*/
|
||||
updateCredentialCacheKey(currentCacheKey: string, credential: ValidCredentialType): string;
|
||||
}
|
||||
//# sourceMappingURL=NodeStorage.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/cache/NodeStorage.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/cache/NodeStorage.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"NodeStorage.d.ts","sourceRoot":"","sources":["../../../src/cache/NodeStorage.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,SAAS,EACT,aAAa,EACb,aAAa,EACb,iBAAiB,EACjB,kBAAkB,EAClB,iBAAiB,EACjB,qBAAqB,EACrB,gBAAgB,EAChB,YAAY,EACZ,MAAM,EACN,cAAc,EACd,OAAO,EACP,uBAAuB,EACvB,mBAAmB,EACnB,sBAAsB,EAEzB,MAAM,yBAAyB,CAAC;AAIjC,OAAO,EACH,aAAa,EACb,SAAS,EACT,YAAY,EACf,MAAM,iCAAiC,CAAC;AAEzC;;;GAGG;AACH,qBAAa,WAAY,SAAQ,YAAY;IAEzC,OAAO,CAAC,MAAM,CAAS;IACvB,OAAO,CAAC,KAAK,CAAoB;IACjC,OAAO,CAAC,cAAc,CAAuB;gBAGzC,MAAM,EAAE,MAAM,EACd,QAAQ,EAAE,MAAM,EAChB,UAAU,EAAE,OAAO,EACnB,sBAAsB,CAAC,EAAE,sBAAsB;IAMnD;;;OAGG;IACH,qBAAqB,CAAC,IAAI,EAAE,MAAM,IAAI,GAAG,IAAI;IAI7C;;OAEG;IACH,UAAU,IAAI,IAAI;IAIlB;;;OAGG;IACH,oBAAoB,CAAC,KAAK,EAAE,YAAY,GAAG,aAAa;IAgCxD;;;OAGG;IACH,oBAAoB,CAAC,aAAa,EAAE,aAAa,GAAG,YAAY;IAiBhE;;OAEG;IACH,gBAAgB,IAAI,aAAa;IAQjC;;;OAGG;IACH,gBAAgB,CAAC,aAAa,EAAE,aAAa,GAAG,IAAI;IAUpD;;OAEG;IACH,QAAQ,IAAI,YAAY;IAKxB;;;OAGG;IACH,QAAQ,CAAC,KAAK,EAAE,YAAY,GAAG,IAAI;IAQnC;;;OAGG;IACH,OAAO,CAAC,GAAG,EAAE,MAAM,GAAG,cAAc;IAQpC;;;;OAIG;IACH,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,cAAc,GAAG,IAAI;IAWjD,cAAc,IAAI,MAAM,EAAE;IAO1B,YAAY,IAAI,SAAS;IAWzB;;;OAGG;IACH,UAAU,CAAC,UAAU,EAAE,MAAM,GAAG,aAAa,GAAG,IAAI;IAQpD;;;;OAIG;IACH,sBAAsB,CAAC,UAAU,EAAE,MAAM,GAAG,aAAa,GAAG,IAAI;IAOhE;;;OAGG;IACH,UAAU,CAAC,OAAO,EAAE,aAAa,GAAG,IAAI;IAKxC;;;OAGG;IACH,oBAAoB,CAAC,UAAU,EAAE,MAAM,GAAG,aAAa,GAAG,IAAI;IAQ9D;;;OAGG;IACH,oBAAoB,CAAC,OAAO,EAAE,aAAa,GAAG,IAAI;IAKlD;;;OAGG;IACH,wBAAwB,CAAC,cAAc,EAAE,MAAM,GAAG,iBAAiB,GAAG,IAAI;IAQ1E;;;OAGG;IACH,wBAAwB,CAAC,WAAW,EAAE,iBAAiB,GAAG,IAAI;IAK9D;;;OAGG;IACH,yBAAyB,CACrB,eAAe,EAAE,MAAM,GACxB,kBAAkB,GAAG,IAAI;IAU5B;;;OAGG;IACH,yBAAyB,CAAC,YAAY,EAAE,kBAAkB,GAAG,IAAI;IAMjE;;;OAGG;IACH,cAAc,CAAC,cAAc,EAAE,MAAM,GAAG,iBAAiB,GAAG,IAAI;IAUhE;;;OAGG;IACH,cAAc,CAAC,WAAW,EAAE,iBAAiB,GAAG,IAAI;IAKpD;;;OAGG;IACH,kBAAkB,CACd,kBAAkB,EAAE,MAAM,GAC3B,qBAAqB,GAAG,IAAI;IAgB/B;;;;OAIG;IACH,kBAAkB,CACd,kBAAkB,EAAE,MAAM,EAC1B,eAAe,EAAE,qBAAqB,GACvC,IAAI;IAIP;;;OAGG;IACH,oBAAoB,CAAC,GAAG,EAAE,MAAM,GAAG,uBAAuB,GAAG,IAAI;IAajE;;OAEG;IACH,wBAAwB,IAAI,KAAK,CAAC,MAAM,CAAC;IAMzC;;;;OAIG;IACH,oBAAoB,CAAC,GAAG,EAAE,MAAM,EAAE,QAAQ,EAAE,uBAAuB,GAAG,IAAI;IAI1E;;;OAGG;IACH,kBAAkB,CAAC,kBAAkB,EAAE,MAAM,GAAG,gBAAgB,GAAG,IAAI;IAavE;;;;OAIG;IACH,kBAAkB,CACd,kBAAkB,EAAE,MAAM,EAC1B,eAAe,EAAE,gBAAgB,GAClC,IAAI;IAIP;;;;OAIG;IACH,UAAU,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO;IAoBhC;;;OAGG;IACH,qBAAqB,CAAC,UAAU,EAAE,MAAM,GAAG,IAAI;IAI/C;;;OAGG;IACH,WAAW,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO;IAIjC;;OAEG;IACH,OAAO,IAAI,MAAM,EAAE;IAQnB;;OAEG;IACH,KAAK,IAAI,IAAI;IAab;;;OAGG;IACH,MAAM,CAAC,qBAAqB,CAAC,KAAK,EAAE,MAAM,GAAG,aAAa;IAM1D;;;OAGG;IACH,MAAM,CAAC,iBAAiB,CAAC,aAAa,EAAE,aAAa,GAAG,SAAS;IAIjE;;OAEG;IACH,wBAAwB,CACpB,eAAe,EAAE,MAAM,EACvB,UAAU,EAAE,mBAAmB,GAChC,MAAM;CAqBZ"}
|
||||
91
node_modules/@azure/msal-node/lib/types/cache/TokenCache.d.ts
generated
vendored
Normal file
91
node_modules/@azure/msal-node/lib/types/cache/TokenCache.d.ts
generated
vendored
Normal file
@@ -0,0 +1,91 @@
|
||||
import { NodeStorage } from "./NodeStorage.js";
|
||||
import { AccountInfo, Logger, ISerializableTokenCache, ICachePlugin } from "@azure/msal-common/node";
|
||||
import { CacheKVStore } from "./serializer/SerializerTypes.js";
|
||||
import { ITokenCache } from "./ITokenCache.js";
|
||||
/**
|
||||
* In-memory token cache manager
|
||||
* @public
|
||||
*/
|
||||
export declare class TokenCache implements ISerializableTokenCache, ITokenCache {
|
||||
private storage;
|
||||
private cacheHasChanged;
|
||||
private cacheSnapshot;
|
||||
private readonly persistence;
|
||||
private logger;
|
||||
constructor(storage: NodeStorage, logger: Logger, cachePlugin?: ICachePlugin);
|
||||
/**
|
||||
* Set to true if cache state has changed since last time serialize or writeToPersistence was called
|
||||
*/
|
||||
hasChanged(): boolean;
|
||||
/**
|
||||
* Serializes in memory cache to JSON
|
||||
*/
|
||||
serialize(): string;
|
||||
/**
|
||||
* Deserializes JSON to in-memory cache. JSON should be in MSAL cache schema format
|
||||
* @param cache - blob formatted cache
|
||||
*/
|
||||
deserialize(cache: string): void;
|
||||
/**
|
||||
* Fetches the cache key-value map
|
||||
*/
|
||||
getKVStore(): CacheKVStore;
|
||||
/**
|
||||
* API that retrieves all accounts currently in cache to the user
|
||||
*/
|
||||
getAllAccounts(): Promise<AccountInfo[]>;
|
||||
/**
|
||||
* Returns the signed in account matching homeAccountId.
|
||||
* (the account object is created at the time of successful login)
|
||||
* or null when no matching account is found
|
||||
* @param homeAccountId - unique identifier for an account (uid.utid)
|
||||
*/
|
||||
getAccountByHomeId(homeAccountId: string): Promise<AccountInfo | null>;
|
||||
/**
|
||||
* Returns the signed in account matching localAccountId.
|
||||
* (the account object is created at the time of successful login)
|
||||
* or null when no matching account is found
|
||||
* @param localAccountId - unique identifier of an account (sub/obj when homeAccountId cannot be populated)
|
||||
*/
|
||||
getAccountByLocalId(localAccountId: string): Promise<AccountInfo | null>;
|
||||
/**
|
||||
* API to remove a specific account and the relevant data from cache
|
||||
* @param account - AccountInfo passed by the user
|
||||
*/
|
||||
removeAccount(account: AccountInfo): Promise<void>;
|
||||
/**
|
||||
* Called when the cache has changed state.
|
||||
*/
|
||||
private handleChangeEvent;
|
||||
/**
|
||||
* Merge in memory cache with the cache snapshot.
|
||||
* @param oldState - cache before changes
|
||||
* @param currentState - current cache state in the library
|
||||
*/
|
||||
private mergeState;
|
||||
/**
|
||||
* Deep update of oldState based on newState values
|
||||
* @param oldState - cache before changes
|
||||
* @param newState - updated cache
|
||||
*/
|
||||
private mergeUpdates;
|
||||
/**
|
||||
* Removes entities in oldState that the were removed from newState. If there are any unknown values in root of
|
||||
* oldState that are not recognized, they are left untouched.
|
||||
* @param oldState - cache before changes
|
||||
* @param newState - updated cache
|
||||
*/
|
||||
private mergeRemovals;
|
||||
/**
|
||||
* Helper to merge new cache with the old one
|
||||
* @param oldState - cache before changes
|
||||
* @param newState - updated cache
|
||||
*/
|
||||
private mergeRemovalsDict;
|
||||
/**
|
||||
* Helper to overlay as a part of cache merge
|
||||
* @param passedInCache - cache read from the blob
|
||||
*/
|
||||
private overlayDefaults;
|
||||
}
|
||||
//# sourceMappingURL=TokenCache.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/cache/TokenCache.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/cache/TokenCache.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"TokenCache.d.ts","sourceRoot":"","sources":["../../../src/cache/TokenCache.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAC;AAC/C,OAAO,EAEH,WAAW,EACX,MAAM,EACN,uBAAuB,EACvB,YAAY,EAEf,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAQH,YAAY,EACf,MAAM,iCAAiC,CAAC;AAGzC,OAAO,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAC;AAU/C;;;GAGG;AACH,qBAAa,UAAW,YAAW,uBAAuB,EAAE,WAAW;IACnE,OAAO,CAAC,OAAO,CAAc;IAC7B,OAAO,CAAC,eAAe,CAAU;IACjC,OAAO,CAAC,aAAa,CAAS;IAC9B,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAe;IAC3C,OAAO,CAAC,MAAM,CAAS;gBAGnB,OAAO,EAAE,WAAW,EACpB,MAAM,EAAE,MAAM,EACd,WAAW,CAAC,EAAE,YAAY;IAW9B;;OAEG;IACH,UAAU,IAAI,OAAO;IAIrB;;OAEG;IACH,SAAS,IAAI,MAAM;IAqBnB;;;OAGG;IACH,WAAW,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI;IAehC;;OAEG;IACH,UAAU,IAAI,YAAY;IAI1B;;OAEG;IACG,cAAc,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC;IAgB9C;;;;;OAKG;IACG,kBAAkB,CACpB,aAAa,EAAE,MAAM,GACtB,OAAO,CAAC,WAAW,GAAG,IAAI,CAAC;IAa9B;;;;;OAKG;IACG,mBAAmB,CACrB,cAAc,EAAE,MAAM,GACvB,OAAO,CAAC,WAAW,GAAG,IAAI,CAAC;IAa9B;;;OAGG;IACG,aAAa,CAAC,OAAO,EAAE,WAAW,GAAG,OAAO,CAAC,IAAI,CAAC;IAkBxD;;OAEG;IACH,OAAO,CAAC,iBAAiB;IAIzB;;;;OAIG;IACH,OAAO,CAAC,UAAU;IASlB;;;;OAIG;IACH,OAAO,CAAC,YAAY;IAkCpB;;;;;OAKG;IACH,OAAO,CAAC,aAAa;IA2CrB;;;;OAIG;IACH,OAAO,CAAC,iBAAiB;IAazB;;;OAGG;IACH,OAAO,CAAC,eAAe;CAyB1B"}
|
||||
23
node_modules/@azure/msal-node/lib/types/cache/distributed/DistributedCachePlugin.d.ts
generated
vendored
Normal file
23
node_modules/@azure/msal-node/lib/types/cache/distributed/DistributedCachePlugin.d.ts
generated
vendored
Normal file
@@ -0,0 +1,23 @@
|
||||
import { ICachePlugin, TokenCacheContext } from "@azure/msal-common/node";
|
||||
import { IPartitionManager } from "./IPartitionManager.js";
|
||||
import { ICacheClient } from "./ICacheClient.js";
|
||||
/**
|
||||
* Cache plugin that serializes data to the cache and deserializes data from the cache
|
||||
* @public
|
||||
*/
|
||||
export declare class DistributedCachePlugin implements ICachePlugin {
|
||||
private client;
|
||||
private partitionManager;
|
||||
constructor(client: ICacheClient, partitionManager: IPartitionManager);
|
||||
/**
|
||||
* Deserializes the cache before accessing it
|
||||
* @param cacheContext - TokenCacheContext
|
||||
*/
|
||||
beforeCacheAccess(cacheContext: TokenCacheContext): Promise<void>;
|
||||
/**
|
||||
* Serializes the cache after accessing it
|
||||
* @param cacheContext - TokenCacheContext
|
||||
*/
|
||||
afterCacheAccess(cacheContext: TokenCacheContext): Promise<void>;
|
||||
}
|
||||
//# sourceMappingURL=DistributedCachePlugin.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/cache/distributed/DistributedCachePlugin.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/cache/distributed/DistributedCachePlugin.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"DistributedCachePlugin.d.ts","sourceRoot":"","sources":["../../../../src/cache/distributed/DistributedCachePlugin.ts"],"names":[],"mappings":"AAKA,OAAO,EAEH,YAAY,EACZ,iBAAiB,EACpB,MAAM,yBAAyB,CAAC;AAEjC,OAAO,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAC;AAC3D,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAEjD;;;GAGG;AACH,qBAAa,sBAAuB,YAAW,YAAY;IACvD,OAAO,CAAC,MAAM,CAAe;IAC7B,OAAO,CAAC,gBAAgB,CAAoB;gBAEhC,MAAM,EAAE,YAAY,EAAE,gBAAgB,EAAE,iBAAiB;IAKrE;;;OAGG;IACU,iBAAiB,CAC1B,YAAY,EAAE,iBAAiB,GAChC,OAAO,CAAC,IAAI,CAAC;IAMhB;;;OAGG;IACU,gBAAgB,CACzB,YAAY,EAAE,iBAAiB,GAChC,OAAO,CAAC,IAAI,CAAC;CAyBnB"}
|
||||
22
node_modules/@azure/msal-node/lib/types/cache/distributed/ICacheClient.d.ts
generated
vendored
Normal file
22
node_modules/@azure/msal-node/lib/types/cache/distributed/ICacheClient.d.ts
generated
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
/**
|
||||
* Interface for the cache that defines a getter and setter
|
||||
* @public
|
||||
*/
|
||||
export interface ICacheClient {
|
||||
/**
|
||||
* Retrieve the value from the cache
|
||||
*
|
||||
* @param key - key of item in the cache
|
||||
* @returns Promise<string>
|
||||
*/
|
||||
get(key: string): Promise<string>;
|
||||
/**
|
||||
* Save the required value using the provided key to cache
|
||||
*
|
||||
* @param key - key of item in the cache
|
||||
* @param value - value of item to be saved in the cache
|
||||
* @returns Promise<string>
|
||||
*/
|
||||
set(key: string, value: string): Promise<string>;
|
||||
}
|
||||
//# sourceMappingURL=ICacheClient.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/cache/distributed/ICacheClient.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/cache/distributed/ICacheClient.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ICacheClient.d.ts","sourceRoot":"","sources":["../../../../src/cache/distributed/ICacheClient.ts"],"names":[],"mappings":"AAKA;;;GAGG;AACH,MAAM,WAAW,YAAY;IACzB;;;;;OAKG;IACH,GAAG,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;IAElC;;;;;;OAMG;IACH,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;CACpD"}
|
||||
33
node_modules/@azure/msal-node/lib/types/cache/distributed/IPartitionManager.d.ts
generated
vendored
Normal file
33
node_modules/@azure/msal-node/lib/types/cache/distributed/IPartitionManager.d.ts
generated
vendored
Normal file
@@ -0,0 +1,33 @@
|
||||
import { AccountEntity } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Interface that defines getter methods to get keys used to identity data in the cache
|
||||
* @public
|
||||
*/
|
||||
export interface IPartitionManager {
|
||||
/**
|
||||
* This function should return the correct key from which to read
|
||||
* the specific user's information from cache.
|
||||
*
|
||||
* Example: Your application may be partitioning the user's cache
|
||||
* information for each user using the homeAccountId and thus
|
||||
* this function would return the homeAccountId for
|
||||
* the user in question
|
||||
*
|
||||
* @returns Promise<string>
|
||||
*/
|
||||
getKey(): Promise<string>;
|
||||
/**
|
||||
* This function should return the correct key being used to save each
|
||||
* user's cache information to cache - given an AccountEntity
|
||||
*
|
||||
* Example: Your application may be partitioning the user's cache
|
||||
* information for each user using the homeAccountId thus
|
||||
* this function would return the homeAccountId from
|
||||
* the provided AccountEntity
|
||||
*
|
||||
* @param accountEntity - AccountEntity
|
||||
* @returns Promise<string>
|
||||
*/
|
||||
extractKey(accountEntity: AccountEntity): Promise<string>;
|
||||
}
|
||||
//# sourceMappingURL=IPartitionManager.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/cache/distributed/IPartitionManager.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/cache/distributed/IPartitionManager.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"IPartitionManager.d.ts","sourceRoot":"","sources":["../../../../src/cache/distributed/IPartitionManager.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,aAAa,EAAE,MAAM,yBAAyB,CAAC;AAExD;;;GAGG;AACH,MAAM,WAAW,iBAAiB;IAC9B;;;;;;;;;;OAUG;IACH,MAAM,IAAI,OAAO,CAAC,MAAM,CAAC,CAAC;IAE1B;;;;;;;;;;;OAWG;IACH,UAAU,CAAC,aAAa,EAAE,aAAa,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;CAC7D"}
|
||||
44
node_modules/@azure/msal-node/lib/types/cache/serializer/Deserializer.d.ts
generated
vendored
Normal file
44
node_modules/@azure/msal-node/lib/types/cache/serializer/Deserializer.d.ts
generated
vendored
Normal file
@@ -0,0 +1,44 @@
|
||||
import { AccountCache, IdTokenCache, AccessTokenCache, RefreshTokenCache, AppMetadataCache } from "@azure/msal-common/node";
|
||||
import { JsonCache, InMemoryCache, SerializedAccountEntity, SerializedIdTokenEntity, SerializedAccessTokenEntity, SerializedRefreshTokenEntity, SerializedAppMetadataEntity } from "./SerializerTypes.js";
|
||||
/**
|
||||
* This class deserializes cache entities read from the file into in-memory object types defined internally
|
||||
* @internal
|
||||
*/
|
||||
export declare class Deserializer {
|
||||
/**
|
||||
* Parse the JSON blob in memory and deserialize the content
|
||||
* @param cachedJson - JSON blob cache
|
||||
*/
|
||||
static deserializeJSONBlob(jsonFile: string): JsonCache;
|
||||
/**
|
||||
* Deserializes accounts to AccountEntity objects
|
||||
* @param accounts - accounts of type SerializedAccountEntity
|
||||
*/
|
||||
static deserializeAccounts(accounts: Record<string, SerializedAccountEntity>): AccountCache;
|
||||
/**
|
||||
* Deserializes id tokens to IdTokenEntity objects
|
||||
* @param idTokens - credentials of type SerializedIdTokenEntity
|
||||
*/
|
||||
static deserializeIdTokens(idTokens: Record<string, SerializedIdTokenEntity>): IdTokenCache;
|
||||
/**
|
||||
* Deserializes access tokens to AccessTokenEntity objects
|
||||
* @param accessTokens - access tokens of type SerializedAccessTokenEntity
|
||||
*/
|
||||
static deserializeAccessTokens(accessTokens: Record<string, SerializedAccessTokenEntity>): AccessTokenCache;
|
||||
/**
|
||||
* Deserializes refresh tokens to RefreshTokenEntity objects
|
||||
* @param refreshTokens - refresh tokens of type SerializedRefreshTokenEntity
|
||||
*/
|
||||
static deserializeRefreshTokens(refreshTokens: Record<string, SerializedRefreshTokenEntity>): RefreshTokenCache;
|
||||
/**
|
||||
* Deserializes appMetadata to AppMetaData objects
|
||||
* @param appMetadata - app metadata of type SerializedAppMetadataEntity
|
||||
*/
|
||||
static deserializeAppMetadata(appMetadata: Record<string, SerializedAppMetadataEntity>): AppMetadataCache;
|
||||
/**
|
||||
* Deserialize an inMemory Cache
|
||||
* @param jsonCache - JSON blob cache
|
||||
*/
|
||||
static deserializeAllCache(jsonCache: JsonCache): InMemoryCache;
|
||||
}
|
||||
//# sourceMappingURL=Deserializer.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/cache/serializer/Deserializer.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/cache/serializer/Deserializer.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"Deserializer.d.ts","sourceRoot":"","sources":["../../../../src/cache/serializer/Deserializer.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,YAAY,EACZ,YAAY,EACZ,gBAAgB,EAChB,iBAAiB,EACjB,gBAAgB,EAQnB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EACH,SAAS,EACT,aAAa,EACb,uBAAuB,EACvB,uBAAuB,EACvB,2BAA2B,EAC3B,4BAA4B,EAC5B,2BAA2B,EAC9B,MAAM,sBAAsB,CAAC;AAE9B;;;GAGG;AACH,qBAAa,YAAY;IACrB;;;OAGG;IACH,MAAM,CAAC,mBAAmB,CAAC,QAAQ,EAAE,MAAM,GAAG,SAAS;IAKvD;;;OAGG;IACH,MAAM,CAAC,mBAAmB,CACtB,QAAQ,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAAC,GAClD,YAAY;IA+Bf;;;OAGG;IACH,MAAM,CAAC,mBAAmB,CACtB,QAAQ,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAAC,GAClD,YAAY;IAoBf;;;OAGG;IACH,MAAM,CAAC,uBAAuB,CAC1B,YAAY,EAAE,MAAM,CAAC,MAAM,EAAE,2BAA2B,CAAC,GAC1D,gBAAgB;IA+BnB;;;OAGG;IACH,MAAM,CAAC,wBAAwB,CAC3B,aAAa,EAAE,MAAM,CAAC,MAAM,EAAE,4BAA4B,CAAC,GAC5D,iBAAiB;IAuBpB;;;OAGG;IACH,MAAM,CAAC,sBAAsB,CACzB,WAAW,EAAE,MAAM,CAAC,MAAM,EAAE,2BAA2B,CAAC,GACzD,gBAAgB;IAgBnB;;;OAGG;IACH,MAAM,CAAC,mBAAmB,CAAC,SAAS,EAAE,SAAS,GAAG,aAAa;CAmBlE"}
|
||||
44
node_modules/@azure/msal-node/lib/types/cache/serializer/Serializer.d.ts
generated
vendored
Normal file
44
node_modules/@azure/msal-node/lib/types/cache/serializer/Serializer.d.ts
generated
vendored
Normal file
@@ -0,0 +1,44 @@
|
||||
import { AccountCache, IdTokenCache, AccessTokenCache, RefreshTokenCache, AppMetadataCache } from "@azure/msal-common/node";
|
||||
import { InMemoryCache, JsonCache, SerializedAccountEntity, SerializedIdTokenEntity, SerializedAccessTokenEntity, SerializedRefreshTokenEntity, SerializedAppMetadataEntity } from "./SerializerTypes.js";
|
||||
/**
|
||||
* This class serializes cache entities to be saved into in-memory object types defined internally
|
||||
* @internal
|
||||
*/
|
||||
export declare class Serializer {
|
||||
/**
|
||||
* serialize the JSON blob
|
||||
* @param data - JSON blob cache
|
||||
*/
|
||||
static serializeJSONBlob(data: JsonCache): string;
|
||||
/**
|
||||
* Serialize Accounts
|
||||
* @param accCache - cache of accounts
|
||||
*/
|
||||
static serializeAccounts(accCache: AccountCache): Record<string, SerializedAccountEntity>;
|
||||
/**
|
||||
* Serialize IdTokens
|
||||
* @param idTCache - cache of ID tokens
|
||||
*/
|
||||
static serializeIdTokens(idTCache: IdTokenCache): Record<string, SerializedIdTokenEntity>;
|
||||
/**
|
||||
* Serializes AccessTokens
|
||||
* @param atCache - cache of access tokens
|
||||
*/
|
||||
static serializeAccessTokens(atCache: AccessTokenCache): Record<string, SerializedAccessTokenEntity>;
|
||||
/**
|
||||
* Serialize refreshTokens
|
||||
* @param rtCache - cache of refresh tokens
|
||||
*/
|
||||
static serializeRefreshTokens(rtCache: RefreshTokenCache): Record<string, SerializedRefreshTokenEntity>;
|
||||
/**
|
||||
* Serialize amdtCache
|
||||
* @param amdtCache - cache of app metadata
|
||||
*/
|
||||
static serializeAppMetadata(amdtCache: AppMetadataCache): Record<string, SerializedAppMetadataEntity>;
|
||||
/**
|
||||
* Serialize the cache
|
||||
* @param inMemCache - itemised cache read from the JSON
|
||||
*/
|
||||
static serializeAllCache(inMemCache: InMemoryCache): JsonCache;
|
||||
}
|
||||
//# sourceMappingURL=Serializer.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/cache/serializer/Serializer.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/cache/serializer/Serializer.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"Serializer.d.ts","sourceRoot":"","sources":["../../../../src/cache/serializer/Serializer.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,YAAY,EACZ,YAAY,EACZ,gBAAgB,EAChB,iBAAiB,EACjB,gBAAgB,EACnB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EACH,aAAa,EACb,SAAS,EACT,uBAAuB,EACvB,uBAAuB,EACvB,2BAA2B,EAC3B,4BAA4B,EAC5B,2BAA2B,EAC9B,MAAM,sBAAsB,CAAC;AAE9B;;;GAGG;AACH,qBAAa,UAAU;IACnB;;;OAGG;IACH,MAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,SAAS,GAAG,MAAM;IAIjD;;;OAGG;IACH,MAAM,CAAC,iBAAiB,CACpB,QAAQ,EAAE,YAAY,GACvB,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAAC;IA0B1C;;;OAGG;IACH,MAAM,CAAC,iBAAiB,CACpB,QAAQ,EAAE,YAAY,GACvB,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAAC;IAiB1C;;;OAGG;IACH,MAAM,CAAC,qBAAqB,CACxB,OAAO,EAAE,gBAAgB,GAC1B,MAAM,CAAC,MAAM,EAAE,2BAA2B,CAAC;IA2B9C;;;OAGG;IACH,MAAM,CAAC,sBAAsB,CACzB,OAAO,EAAE,iBAAiB,GAC3B,MAAM,CAAC,MAAM,EAAE,4BAA4B,CAAC;IAmB/C;;;OAGG;IACH,MAAM,CAAC,oBAAoB,CACvB,SAAS,EAAE,gBAAgB,GAC5B,MAAM,CAAC,MAAM,EAAE,2BAA2B,CAAC;IAc9C;;;OAGG;IACH,MAAM,CAAC,iBAAiB,CAAC,UAAU,EAAE,aAAa,GAAG,SAAS;CASjE"}
|
||||
103
node_modules/@azure/msal-node/lib/types/cache/serializer/SerializerTypes.d.ts
generated
vendored
Normal file
103
node_modules/@azure/msal-node/lib/types/cache/serializer/SerializerTypes.d.ts
generated
vendored
Normal file
@@ -0,0 +1,103 @@
|
||||
import { AccountCache, IdTokenCache, AccessTokenCache, RefreshTokenCache, AppMetadataCache, ValidCacheType } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Key value store for in-memory cache
|
||||
* @public
|
||||
*/
|
||||
export type CacheKVStore = Record<string, ValidCacheType>;
|
||||
/**
|
||||
* Cache format read from the cache blob provided to the configuration during app instantiation
|
||||
* @public
|
||||
*/
|
||||
export type JsonCache = {
|
||||
Account: Record<string, SerializedAccountEntity>;
|
||||
IdToken: Record<string, SerializedIdTokenEntity>;
|
||||
AccessToken: Record<string, SerializedAccessTokenEntity>;
|
||||
RefreshToken: Record<string, SerializedRefreshTokenEntity>;
|
||||
AppMetadata: Record<string, SerializedAppMetadataEntity>;
|
||||
};
|
||||
/**
|
||||
* Intermittent type to handle in-memory data objects with defined types
|
||||
* @public
|
||||
*/
|
||||
export type InMemoryCache = {
|
||||
accounts: AccountCache;
|
||||
idTokens: IdTokenCache;
|
||||
accessTokens: AccessTokenCache;
|
||||
refreshTokens: RefreshTokenCache;
|
||||
appMetadata: AppMetadataCache;
|
||||
};
|
||||
/**
|
||||
* Account type
|
||||
* @public
|
||||
*/
|
||||
export type SerializedAccountEntity = {
|
||||
home_account_id: string;
|
||||
environment: string;
|
||||
realm: string;
|
||||
local_account_id: string;
|
||||
username: string;
|
||||
authority_type: string;
|
||||
name?: string;
|
||||
client_info?: string;
|
||||
last_modification_time?: string;
|
||||
last_modification_app?: string;
|
||||
tenantProfiles?: string[];
|
||||
};
|
||||
/**
|
||||
* Idtoken credential type
|
||||
* @public
|
||||
*/
|
||||
export type SerializedIdTokenEntity = {
|
||||
home_account_id: string;
|
||||
environment: string;
|
||||
credential_type: string;
|
||||
client_id: string;
|
||||
secret: string;
|
||||
realm: string;
|
||||
};
|
||||
/**
|
||||
* Access token credential type
|
||||
* @public
|
||||
*/
|
||||
export type SerializedAccessTokenEntity = {
|
||||
home_account_id: string;
|
||||
environment: string;
|
||||
credential_type: string;
|
||||
client_id: string;
|
||||
secret: string;
|
||||
realm: string;
|
||||
target: string;
|
||||
cached_at: string;
|
||||
expires_on: string;
|
||||
extended_expires_on?: string;
|
||||
refresh_on?: string;
|
||||
key_id?: string;
|
||||
token_type?: string;
|
||||
requestedClaims?: string;
|
||||
requestedClaimsHash?: string;
|
||||
userAssertionHash?: string;
|
||||
};
|
||||
/**
|
||||
* Refresh token credential type
|
||||
* @public
|
||||
*/
|
||||
export type SerializedRefreshTokenEntity = {
|
||||
home_account_id: string;
|
||||
environment: string;
|
||||
credential_type: string;
|
||||
client_id: string;
|
||||
secret: string;
|
||||
family_id?: string;
|
||||
target?: string;
|
||||
realm?: string;
|
||||
};
|
||||
/**
|
||||
* AppMetadata type
|
||||
* @public
|
||||
*/
|
||||
export type SerializedAppMetadataEntity = {
|
||||
client_id: string;
|
||||
environment: string;
|
||||
family_id?: string;
|
||||
};
|
||||
//# sourceMappingURL=SerializerTypes.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/cache/serializer/SerializerTypes.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/cache/serializer/SerializerTypes.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"SerializerTypes.d.ts","sourceRoot":"","sources":["../../../../src/cache/serializer/SerializerTypes.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,YAAY,EACZ,YAAY,EACZ,gBAAgB,EAChB,iBAAiB,EACjB,gBAAgB,EAChB,cAAc,EACjB,MAAM,yBAAyB,CAAC;AAEjC;;;GAGG;AACH,MAAM,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;AAE1D;;;GAGG;AACH,MAAM,MAAM,SAAS,GAAG;IACpB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAAC,CAAC;IACjD,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAAC,CAAC;IACjD,WAAW,EAAE,MAAM,CAAC,MAAM,EAAE,2BAA2B,CAAC,CAAC;IACzD,YAAY,EAAE,MAAM,CAAC,MAAM,EAAE,4BAA4B,CAAC,CAAC;IAC3D,WAAW,EAAE,MAAM,CAAC,MAAM,EAAE,2BAA2B,CAAC,CAAC;CAC5D,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,aAAa,GAAG;IACxB,QAAQ,EAAE,YAAY,CAAC;IACvB,QAAQ,EAAE,YAAY,CAAC;IACvB,YAAY,EAAE,gBAAgB,CAAC;IAC/B,aAAa,EAAE,iBAAiB,CAAC;IACjC,WAAW,EAAE,gBAAgB,CAAC;CACjC,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,uBAAuB,GAAG;IAClC,eAAe,EAAE,MAAM,CAAC;IACxB,WAAW,EAAE,MAAM,CAAC;IACpB,KAAK,EAAE,MAAM,CAAC;IACd,gBAAgB,EAAE,MAAM,CAAC;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,cAAc,EAAE,MAAM,CAAC;IACvB,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,sBAAsB,CAAC,EAAE,MAAM,CAAC;IAChC,qBAAqB,CAAC,EAAE,MAAM,CAAC;IAC/B,cAAc,CAAC,EAAE,MAAM,EAAE,CAAC;CAC7B,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,uBAAuB,GAAG;IAClC,eAAe,EAAE,MAAM,CAAC;IACxB,WAAW,EAAE,MAAM,CAAC;IACpB,eAAe,EAAE,MAAM,CAAC;IACxB,SAAS,EAAE,MAAM,CAAC;IAClB,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,2BAA2B,GAAG;IACtC,eAAe,EAAE,MAAM,CAAC;IACxB,WAAW,EAAE,MAAM,CAAC;IACpB,eAAe,EAAE,MAAM,CAAC;IACxB,SAAS,EAAE,MAAM,CAAC;IAClB,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,EAAE,MAAM,CAAC;IACd,MAAM,EAAE,MAAM,CAAC;IACf,SAAS,EAAE,MAAM,CAAC;IAClB,UAAU,EAAE,MAAM,CAAC;IACnB,mBAAmB,CAAC,EAAE,MAAM,CAAC;IAC7B,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,eAAe,CAAC,EAAE,MAAM,CAAC;IACzB,mBAAmB,CAAC,EAAE,MAAM,CAAC;IAC7B,iBAAiB,CAAC,EAAE,MAAM,CAAC;CAC9B,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,4BAA4B,GAAG;IACvC,eAAe,EAAE,MAAM,CAAC;IACxB,WAAW,EAAE,MAAM,CAAC;IACpB,eAAe,EAAE,MAAM,CAAC;IACxB,SAAS,EAAE,MAAM,CAAC;IAClB,MAAM,EAAE,MAAM,CAAC;IACf,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,MAAM,CAAC;CAClB,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,2BAA2B,GAAG;IACtC,SAAS,EAAE,MAAM,CAAC;IAClB,WAAW,EAAE,MAAM,CAAC;IACpB,SAAS,CAAC,EAAE,MAAM,CAAC;CACtB,CAAC"}
|
||||
144
node_modules/@azure/msal-node/lib/types/client/ClientApplication.d.ts
generated
vendored
Normal file
144
node_modules/@azure/msal-node/lib/types/client/ClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,144 @@
|
||||
import { ClientConfiguration, AuthenticationResult, BaseAuthRequest, Logger, ServerTelemetryManager, AzureRegionConfiguration, AzureCloudOptions, AuthorizationCodePayload, ClientAssertionCallback } from "@azure/msal-common/node";
|
||||
import { Configuration, NodeConfiguration } from "../config/Configuration.js";
|
||||
import { CryptoProvider } from "../crypto/CryptoProvider.js";
|
||||
import { NodeStorage } from "../cache/NodeStorage.js";
|
||||
import { TokenCache } from "../cache/TokenCache.js";
|
||||
import { ClientAssertion } from "./ClientAssertion.js";
|
||||
import { AuthorizationUrlRequest } from "../request/AuthorizationUrlRequest.js";
|
||||
import { AuthorizationCodeRequest } from "../request/AuthorizationCodeRequest.js";
|
||||
import { RefreshTokenRequest } from "../request/RefreshTokenRequest.js";
|
||||
import { SilentFlowRequest } from "../request/SilentFlowRequest.js";
|
||||
import { UsernamePasswordRequest } from "../request/UsernamePasswordRequest.js";
|
||||
/**
|
||||
* Base abstract class for all ClientApplications - public and confidential
|
||||
* @public
|
||||
*/
|
||||
export declare abstract class ClientApplication {
|
||||
protected readonly cryptoProvider: CryptoProvider;
|
||||
private tokenCache;
|
||||
/**
|
||||
* Platform storage object
|
||||
*/
|
||||
protected storage: NodeStorage;
|
||||
/**
|
||||
* Logger object to log the application flow
|
||||
*/
|
||||
protected logger: Logger;
|
||||
/**
|
||||
* Platform configuration initialized by the application
|
||||
*/
|
||||
protected config: NodeConfiguration;
|
||||
/**
|
||||
* Client assertion passed by the user for confidential client flows
|
||||
*/
|
||||
protected clientAssertion: ClientAssertion;
|
||||
protected developerProvidedClientAssertion: string | ClientAssertionCallback;
|
||||
/**
|
||||
* Client secret passed by the user for confidential client flows
|
||||
*/
|
||||
protected clientSecret: string;
|
||||
/**
|
||||
* Constructor for the ClientApplication
|
||||
*/
|
||||
protected constructor(configuration: Configuration);
|
||||
/**
|
||||
* Creates the URL of the authorization request, letting the user input credentials and consent to the
|
||||
* application. The URL targets the /authorize endpoint of the authority configured in the
|
||||
* application object.
|
||||
*
|
||||
* Once the user inputs their credentials and consents, the authority will send a response to the redirect URI
|
||||
* sent in the request and should contain an authorization code, which can then be used to acquire tokens via
|
||||
* `acquireTokenByCode(AuthorizationCodeRequest)`.
|
||||
*/
|
||||
getAuthCodeUrl(request: AuthorizationUrlRequest): Promise<string>;
|
||||
/**
|
||||
* Acquires a token by exchanging the Authorization Code received from the first step of OAuth2.0
|
||||
* Authorization Code flow.
|
||||
*
|
||||
* `getAuthCodeUrl(AuthorizationCodeUrlRequest)` can be used to create the URL for the first step of OAuth2.0
|
||||
* Authorization Code flow. Ensure that values for redirectUri and scopes in AuthorizationCodeUrlRequest and
|
||||
* AuthorizationCodeRequest are the same.
|
||||
*/
|
||||
acquireTokenByCode(request: AuthorizationCodeRequest, authCodePayLoad?: AuthorizationCodePayload): Promise<AuthenticationResult>;
|
||||
/**
|
||||
* Acquires a token by exchanging the refresh token provided for a new set of tokens.
|
||||
*
|
||||
* This API is provided only for scenarios where you would like to migrate from ADAL to MSAL. Otherwise, it is
|
||||
* recommended that you use `acquireTokenSilent()` for silent scenarios. When using `acquireTokenSilent()`, MSAL will
|
||||
* handle the caching and refreshing of tokens automatically.
|
||||
*/
|
||||
acquireTokenByRefreshToken(request: RefreshTokenRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Acquires a token silently when a user specifies the account the token is requested for.
|
||||
*
|
||||
* This API expects the user to provide an account object and looks into the cache to retrieve the token if present.
|
||||
* There is also an optional "forceRefresh" boolean the user can send to bypass the cache for access_token and id_token.
|
||||
* In case the refresh_token is expired or not found, an error is thrown
|
||||
* and the guidance is for the user to call any interactive token acquisition API (eg: `acquireTokenByCode()`).
|
||||
*/
|
||||
acquireTokenSilent(request: SilentFlowRequest): Promise<AuthenticationResult>;
|
||||
/**
|
||||
* Acquires tokens with password grant by exchanging client applications username and password for credentials
|
||||
*
|
||||
* The latest OAuth 2.0 Security Best Current Practice disallows the password grant entirely.
|
||||
* More details on this recommendation at https://tools.ietf.org/html/draft-ietf-oauth-security-topics-13#section-3.4
|
||||
* Microsoft's documentation and recommendations are at:
|
||||
* https://docs.microsoft.com/en-us/azure/active-directory/develop/msal-authentication-flows#usernamepassword
|
||||
*
|
||||
* @param request - UsenamePasswordRequest
|
||||
*/
|
||||
acquireTokenByUsernamePassword(request: UsernamePasswordRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Gets the token cache for the application.
|
||||
*/
|
||||
getTokenCache(): TokenCache;
|
||||
/**
|
||||
* Validates OIDC state by comparing the user cached state with the state received from the server.
|
||||
*
|
||||
* This API is provided for scenarios where you would use OAuth2.0 state parameter to mitigate against
|
||||
* CSRF attacks.
|
||||
* For more information about state, visit https://datatracker.ietf.org/doc/html/rfc6819#section-3.6.
|
||||
* @param state - Unique GUID generated by the user that is cached by the user and sent to the server during the first leg of the flow
|
||||
* @param cachedState - This string is sent back by the server with the authorization code
|
||||
*/
|
||||
protected validateState(state: string, cachedState: string): void;
|
||||
/**
|
||||
* Returns the logger instance
|
||||
*/
|
||||
getLogger(): Logger;
|
||||
/**
|
||||
* Replaces the default logger set in configurations with new Logger with new configurations
|
||||
* @param logger - Logger instance
|
||||
*/
|
||||
setLogger(logger: Logger): void;
|
||||
/**
|
||||
* Builds the common configuration to be passed to the common component based on the platform configurarion
|
||||
* @param authority - user passed authority in configuration
|
||||
* @param serverTelemetryManager - initializes servertelemetry if passed
|
||||
*/
|
||||
protected buildOauthClientConfiguration(authority: string, requestCorrelationId: string, redirectUri: string, serverTelemetryManager?: ServerTelemetryManager, azureRegionConfiguration?: AzureRegionConfiguration, azureCloudOptions?: AzureCloudOptions): Promise<ClientConfiguration>;
|
||||
private getClientAssertion;
|
||||
/**
|
||||
* Generates a request with the default scopes & generates a correlationId.
|
||||
* @param authRequest - BaseAuthRequest for initialization
|
||||
*/
|
||||
protected initializeBaseRequest(authRequest: Partial<BaseAuthRequest>): Promise<BaseAuthRequest>;
|
||||
/**
|
||||
* Initializes the server telemetry payload
|
||||
* @param apiId - Id for a specific request
|
||||
* @param correlationId - GUID
|
||||
* @param forceRefresh - boolean to indicate network call
|
||||
*/
|
||||
protected initializeServerTelemetryManager(apiId: number, correlationId: string, forceRefresh?: boolean): ServerTelemetryManager;
|
||||
/**
|
||||
* Create authority instance. If authority not passed in request, default to authority set on the application
|
||||
* object. If no authority set in application object, then default to common authority.
|
||||
* @param authorityString - authority from user configuration
|
||||
*/
|
||||
private createAuthority;
|
||||
/**
|
||||
* Clear the cache
|
||||
*/
|
||||
clearCache(): void;
|
||||
}
|
||||
//# sourceMappingURL=ClientApplication.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ClientApplication.d.ts","sourceRoot":"","sources":["../../../src/client/ClientApplication.ts"],"names":[],"mappings":"AAKA,OAAO,EAEH,mBAAmB,EAEnB,oBAAoB,EAGpB,eAAe,EAEf,MAAM,EACN,sBAAsB,EAWtB,wBAAwB,EAExB,iBAAiB,EACjB,wBAAwB,EAQxB,uBAAuB,EAC1B,MAAM,yBAAyB,CAAC;AACjC,OAAO,EACH,aAAa,EAEb,iBAAiB,EACpB,MAAM,4BAA4B,CAAC;AACpC,OAAO,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAC7D,OAAO,EAAE,WAAW,EAAE,MAAM,yBAAyB,CAAC;AAEtD,OAAO,EAAE,UAAU,EAAE,MAAM,wBAAwB,CAAC;AACpD,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAChF,OAAO,EAAE,wBAAwB,EAAE,MAAM,wCAAwC,CAAC;AAClF,OAAO,EAAE,mBAAmB,EAAE,MAAM,mCAAmC,CAAC;AACxE,OAAO,EAAE,iBAAiB,EAAE,MAAM,iCAAiC,CAAC;AAEpE,OAAO,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAIhF;;;GAGG;AACH,8BAAsB,iBAAiB;IACnC,SAAS,CAAC,QAAQ,CAAC,cAAc,EAAE,cAAc,CAAC;IAClD,OAAO,CAAC,UAAU,CAAa;IAE/B;;OAEG;IACH,SAAS,CAAC,OAAO,EAAE,WAAW,CAAC;IAC/B;;OAEG;IACH,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC;IACzB;;OAEG;IACH,SAAS,CAAC,MAAM,EAAE,iBAAiB,CAAC;IACpC;;OAEG;IACH,SAAS,CAAC,eAAe,EAAE,eAAe,CAAC;IAC3C,SAAS,CAAC,gCAAgC,EACpC,MAAM,GACN,uBAAuB,CAAC;IAC9B;;OAEG;IACH,SAAS,CAAC,YAAY,EAAE,MAAM,CAAC;IAE/B;;OAEG;IACH,SAAS,aAAa,aAAa,EAAE,aAAa;IAqBlD;;;;;;;;OAQG;IACG,cAAc,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,MAAM,CAAC;IA2BvE;;;;;;;OAOG;IACG,kBAAkB,CACpB,OAAO,EAAE,wBAAwB,EACjC,eAAe,CAAC,EAAE,wBAAwB,GAC3C,OAAO,CAAC,oBAAoB,CAAC;IA+ChC;;;;;;OAMG;IACG,0BAA0B,CAC5B,OAAO,EAAE,mBAAmB,GAC7B,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IA0CvC;;;;;;;OAOG;IACG,kBAAkB,CACpB,OAAO,EAAE,iBAAiB,GAC3B,OAAO,CAAC,oBAAoB,CAAC;IAuChC;;;;;;;;;OASG;IACG,8BAA8B,CAChC,OAAO,EAAE,uBAAuB,GACjC,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAwCvC;;OAEG;IACH,aAAa,IAAI,UAAU;IAK3B;;;;;;;;OAQG;IACH,SAAS,CAAC,aAAa,CAAC,KAAK,EAAE,MAAM,EAAE,WAAW,EAAE,MAAM,GAAG,IAAI;IAUjE;;OAEG;IACH,SAAS,IAAI,MAAM;IAInB;;;OAGG;IACH,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI;IAI/B;;;;OAIG;cACa,6BAA6B,CACzC,SAAS,EAAE,MAAM,EACjB,oBAAoB,EAAE,MAAM,EAC5B,WAAW,EAAE,MAAM,EACnB,sBAAsB,CAAC,EAAE,sBAAsB,EAC/C,wBAAwB,CAAC,EAAE,wBAAwB,EACnD,iBAAiB,CAAC,EAAE,iBAAiB,GACtC,OAAO,CAAC,mBAAmB,CAAC;YAsEjB,kBAAkB;IAyBhC;;;OAGG;cACa,qBAAqB,CACjC,WAAW,EAAE,OAAO,CAAC,eAAe,CAAC,GACtC,OAAO,CAAC,eAAe,CAAC;IA0C3B;;;;;OAKG;IACH,SAAS,CAAC,gCAAgC,CACtC,KAAK,EAAE,MAAM,EACb,aAAa,EAAE,MAAM,EACrB,YAAY,CAAC,EAAE,OAAO,GACvB,sBAAsB;IAWzB;;;;OAIG;YACW,eAAe;IAkC7B;;OAEG;IACH,UAAU,IAAI,IAAI;CAGrB"}
|
||||
56
node_modules/@azure/msal-node/lib/types/client/ClientAssertion.d.ts
generated
vendored
Normal file
56
node_modules/@azure/msal-node/lib/types/client/ClientAssertion.d.ts
generated
vendored
Normal file
@@ -0,0 +1,56 @@
|
||||
import { CryptoProvider } from "../crypto/CryptoProvider.js";
|
||||
/**
|
||||
* Client assertion of type jwt-bearer used in confidential client flows
|
||||
* @public
|
||||
*/
|
||||
export declare class ClientAssertion {
|
||||
private jwt;
|
||||
private privateKey;
|
||||
private thumbprint;
|
||||
private useSha256;
|
||||
private expirationTime;
|
||||
private issuer;
|
||||
private jwtAudience;
|
||||
private publicCertificate;
|
||||
/**
|
||||
* Initialize the ClientAssertion class from the clientAssertion passed by the user
|
||||
* @param assertion - refer https://tools.ietf.org/html/rfc7521
|
||||
*/
|
||||
static fromAssertion(assertion: string): ClientAssertion;
|
||||
/**
|
||||
* @deprecated Use fromCertificateWithSha256Thumbprint instead, with a SHA-256 thumprint
|
||||
* Initialize the ClientAssertion class from the certificate passed by the user
|
||||
* @param thumbprint - identifier of a certificate
|
||||
* @param privateKey - secret key
|
||||
* @param publicCertificate - electronic document provided to prove the ownership of the public key
|
||||
*/
|
||||
static fromCertificate(thumbprint: string, privateKey: string, publicCertificate?: string): ClientAssertion;
|
||||
/**
|
||||
* Initialize the ClientAssertion class from the certificate passed by the user
|
||||
* @param thumbprint - identifier of a certificate
|
||||
* @param privateKey - secret key
|
||||
* @param publicCertificate - electronic document provided to prove the ownership of the public key
|
||||
*/
|
||||
static fromCertificateWithSha256Thumbprint(thumbprint: string, privateKey: string, publicCertificate?: string): ClientAssertion;
|
||||
/**
|
||||
* Update JWT for certificate based clientAssertion, if passed by the user, uses it as is
|
||||
* @param cryptoProvider - library's crypto helper
|
||||
* @param issuer - iss claim
|
||||
* @param jwtAudience - aud claim
|
||||
*/
|
||||
getJwt(cryptoProvider: CryptoProvider, issuer: string, jwtAudience: string): string;
|
||||
/**
|
||||
* JWT format and required claims specified: https://tools.ietf.org/html/rfc7523#section-3
|
||||
*/
|
||||
private createJwt;
|
||||
/**
|
||||
* Utility API to check expiration
|
||||
*/
|
||||
private isExpired;
|
||||
/**
|
||||
* Extracts the raw certs from a given certificate string and returns them in an array.
|
||||
* @param publicCertificate - electronic document provided to prove the ownership of the public key
|
||||
*/
|
||||
static parseCertificate(publicCertificate: string): Array<string>;
|
||||
}
|
||||
//# sourceMappingURL=ClientAssertion.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ClientAssertion.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ClientAssertion.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ClientAssertion.d.ts","sourceRoot":"","sources":["../../../src/client/ClientAssertion.ts"],"names":[],"mappings":"AAYA,OAAO,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAI7D;;;GAGG;AACH,qBAAa,eAAe;IACxB,OAAO,CAAC,GAAG,CAAS;IACpB,OAAO,CAAC,UAAU,CAAS;IAC3B,OAAO,CAAC,UAAU,CAAS;IAC3B,OAAO,CAAC,SAAS,CAAU;IAC3B,OAAO,CAAC,cAAc,CAAS;IAC/B,OAAO,CAAC,MAAM,CAAS;IACvB,OAAO,CAAC,WAAW,CAAS;IAC5B,OAAO,CAAC,iBAAiB,CAAgB;IAEzC;;;OAGG;WACW,aAAa,CAAC,SAAS,EAAE,MAAM,GAAG,eAAe;IAM/D;;;;;;OAMG;WACW,eAAe,CACzB,UAAU,EAAE,MAAM,EAClB,UAAU,EAAE,MAAM,EAClB,iBAAiB,CAAC,EAAE,MAAM,GAC3B,eAAe;IAYlB;;;;;OAKG;WACW,mCAAmC,CAC7C,UAAU,EAAE,MAAM,EAClB,UAAU,EAAE,MAAM,EAClB,iBAAiB,CAAC,EAAE,MAAM,GAC3B,eAAe;IAYlB;;;;;OAKG;IACI,MAAM,CACT,cAAc,EAAE,cAAc,EAC9B,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,MAAM,GACpB,MAAM;IA0BT;;OAEG;IACH,OAAO,CAAC,SAAS;IA8CjB;;OAEG;IACH,OAAO,CAAC,SAAS;IAIjB;;;OAGG;WACW,gBAAgB,CAAC,iBAAiB,EAAE,MAAM,GAAG,KAAK,CAAC,MAAM,CAAC;CAoB3E"}
|
||||
35
node_modules/@azure/msal-node/lib/types/client/ClientCredentialClient.d.ts
generated
vendored
Normal file
35
node_modules/@azure/msal-node/lib/types/client/ClientCredentialClient.d.ts
generated
vendored
Normal file
@@ -0,0 +1,35 @@
|
||||
import { AuthenticationResult, Authority, BaseClient, CacheManager, CacheOutcome, ClientConfiguration, CommonClientCredentialRequest, IAppTokenProvider, ICrypto, ServerTelemetryManager } from "@azure/msal-common/node";
|
||||
import { ManagedIdentityConfiguration } from "../config/Configuration.js";
|
||||
/**
|
||||
* OAuth2.0 client credential grant
|
||||
* @public
|
||||
*/
|
||||
export declare class ClientCredentialClient extends BaseClient {
|
||||
private readonly appTokenProvider?;
|
||||
constructor(configuration: ClientConfiguration, appTokenProvider?: IAppTokenProvider);
|
||||
/**
|
||||
* Public API to acquire a token with ClientCredential Flow for Confidential clients
|
||||
* @param request - CommonClientCredentialRequest provided by the developer
|
||||
*/
|
||||
acquireToken(request: CommonClientCredentialRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* looks up cache if the tokens are cached already
|
||||
*/
|
||||
getCachedAuthenticationResult(request: CommonClientCredentialRequest, config: ClientConfiguration | ManagedIdentityConfiguration, cryptoUtils: ICrypto, authority: Authority, cacheManager: CacheManager, serverTelemetryManager?: ServerTelemetryManager | null): Promise<[AuthenticationResult | null, CacheOutcome]>;
|
||||
/**
|
||||
* Reads access token from the cache
|
||||
*/
|
||||
private readAccessTokenFromCache;
|
||||
/**
|
||||
* Makes a network call to request the token from the service
|
||||
* @param request - CommonClientCredentialRequest provided by the developer
|
||||
* @param authority - authority object
|
||||
*/
|
||||
private executeTokenRequest;
|
||||
/**
|
||||
* generate the request to the server in the acceptable format
|
||||
* @param request - CommonClientCredentialRequest provided by the developer
|
||||
*/
|
||||
private createTokenRequestBody;
|
||||
}
|
||||
//# sourceMappingURL=ClientCredentialClient.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ClientCredentialClient.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ClientCredentialClient.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ClientCredentialClient.d.ts","sourceRoot":"","sources":["../../../src/client/ClientCredentialClient.ts"],"names":[],"mappings":"AAKA,OAAO,EAEH,oBAAoB,EAEpB,SAAS,EACT,UAAU,EACV,YAAY,EACZ,YAAY,EAEZ,mBAAmB,EACnB,6BAA6B,EAM7B,iBAAiB,EACjB,OAAO,EAMP,sBAAsB,EAQzB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EACH,4BAA4B,EAE/B,MAAM,4BAA4B,CAAC;AAEpC;;;GAGG;AACH,qBAAa,sBAAuB,SAAQ,UAAU;IAClD,OAAO,CAAC,QAAQ,CAAC,gBAAgB,CAAC,CAAoB;gBAGlD,aAAa,EAAE,mBAAmB,EAClC,gBAAgB,CAAC,EAAE,iBAAiB;IAMxC;;;OAGG;IACU,YAAY,CACrB,OAAO,EAAE,6BAA6B,GACvC,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAsCvC;;OAEG;IACU,6BAA6B,CACtC,OAAO,EAAE,6BAA6B,EACtC,MAAM,EAAE,mBAAmB,GAAG,4BAA4B,EAC1D,WAAW,EAAE,OAAO,EACpB,SAAS,EAAE,SAAS,EACpB,YAAY,EAAE,YAAY,EAC1B,sBAAsB,CAAC,EAAE,sBAAsB,GAAG,IAAI,GACvD,OAAO,CAAC,CAAC,oBAAoB,GAAG,IAAI,EAAE,YAAY,CAAC,CAAC;IA2FvD;;OAEG;IACH,OAAO,CAAC,wBAAwB;IA4BhC;;;;OAIG;YACW,mBAAmB;IA6FjC;;;OAGG;YACW,sBAAsB;CAgEvC"}
|
||||
59
node_modules/@azure/msal-node/lib/types/client/ConfidentialClientApplication.d.ts
generated
vendored
Normal file
59
node_modules/@azure/msal-node/lib/types/client/ConfidentialClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,59 @@
|
||||
import { ClientApplication } from "./ClientApplication.js";
|
||||
import { Configuration } from "../config/Configuration.js";
|
||||
import { AuthenticationResult, IAppTokenProvider } from "@azure/msal-common/node";
|
||||
import { IConfidentialClientApplication } from "./IConfidentialClientApplication.js";
|
||||
import { OnBehalfOfRequest } from "../request/OnBehalfOfRequest.js";
|
||||
import { ClientCredentialRequest } from "../request/ClientCredentialRequest.js";
|
||||
/**
|
||||
* This class is to be used to acquire tokens for confidential client applications (webApp, webAPI). Confidential client applications
|
||||
* will configure application secrets, client certificates/assertions as applicable
|
||||
* @public
|
||||
*/
|
||||
export declare class ConfidentialClientApplication extends ClientApplication implements IConfidentialClientApplication {
|
||||
private appTokenProvider?;
|
||||
/**
|
||||
* Constructor for the ConfidentialClientApplication
|
||||
*
|
||||
* Required attributes in the Configuration object are:
|
||||
* - clientID: the application ID of your application. You can obtain one by registering your application with our application registration portal
|
||||
* - authority: the authority URL for your application.
|
||||
* - client credential: Must set either client secret, certificate, or assertion for confidential clients. You can obtain a client secret from the application registration portal.
|
||||
*
|
||||
* In Azure AD, authority is a URL indicating of the form https://login.microsoftonline.com/\{Enter_the_Tenant_Info_Here\}.
|
||||
* If your application supports Accounts in one organizational directory, replace "Enter_the_Tenant_Info_Here" value with the Tenant Id or Tenant name (for example, contoso.microsoft.com).
|
||||
* If your application supports Accounts in any organizational directory, replace "Enter_the_Tenant_Info_Here" value with organizations.
|
||||
* If your application supports Accounts in any organizational directory and personal Microsoft accounts, replace "Enter_the_Tenant_Info_Here" value with common.
|
||||
* To restrict support to Personal Microsoft accounts only, replace "Enter_the_Tenant_Info_Here" value with consumers.
|
||||
*
|
||||
* In Azure B2C, authority is of the form https://\{instance\}/tfp/\{tenant\}/\{policyName\}/
|
||||
* Full B2C functionality will be available in this library in future versions.
|
||||
*
|
||||
* @param Configuration - configuration object for the MSAL ConfidentialClientApplication instance
|
||||
*/
|
||||
constructor(configuration: Configuration);
|
||||
/**
|
||||
* This extensibility point only works for the client_credential flow, i.e. acquireTokenByClientCredential and
|
||||
* is meant for Azure SDK to enhance Managed Identity support.
|
||||
*
|
||||
* @param IAppTokenProvider - Extensibility interface, which allows the app developer to return a token from a custom source.
|
||||
*/
|
||||
SetAppTokenProvider(provider: IAppTokenProvider): void;
|
||||
/**
|
||||
* Acquires tokens from the authority for the application (not for an end user).
|
||||
*/
|
||||
acquireTokenByClientCredential(request: ClientCredentialRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Acquires tokens from the authority for the application.
|
||||
*
|
||||
* Used in scenarios where the current app is a middle-tier service which was called with a token
|
||||
* representing an end user. The current app can use the token (oboAssertion) to request another
|
||||
* token to access downstream web API, on behalf of that user.
|
||||
*
|
||||
* The current middle-tier app has no user interaction to obtain consent.
|
||||
* See how to gain consent upfront for your middle-tier app from this article.
|
||||
* https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow#gaining-consent-for-the-middle-tier-application
|
||||
*/
|
||||
acquireTokenOnBehalfOf(request: OnBehalfOfRequest): Promise<AuthenticationResult | null>;
|
||||
private setClientCredential;
|
||||
}
|
||||
//# sourceMappingURL=ConfidentialClientApplication.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ConfidentialClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ConfidentialClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ConfidentialClientApplication.d.ts","sourceRoot":"","sources":["../../../src/client/ConfidentialClientApplication.ts"],"names":[],"mappings":"AAOA,OAAO,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAC;AAC3D,OAAO,EAAE,aAAa,EAAE,MAAM,4BAA4B,CAAC;AAQ3D,OAAO,EAGH,oBAAoB,EAGpB,iBAAiB,EASpB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,8BAA8B,EAAE,MAAM,qCAAqC,CAAC;AACrF,OAAO,EAAE,iBAAiB,EAAE,MAAM,iCAAiC,CAAC;AACpE,OAAO,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAIhF;;;;GAIG;AACH,qBAAa,6BACT,SAAQ,iBACR,YAAW,8BAA8B;IAEzC,OAAO,CAAC,gBAAgB,CAAC,CAAoB;IAE7C;;;;;;;;;;;;;;;;;;OAkBG;gBACS,aAAa,EAAE,aAAa;IAMxC;;;;;OAKG;IACH,mBAAmB,CAAC,QAAQ,EAAE,iBAAiB,GAAG,IAAI;IAItD;;OAEG;IACU,8BAA8B,CACvC,OAAO,EAAE,uBAAuB,GACjC,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAyGvC;;;;;;;;;;OAUG;IACU,sBAAsB,CAC/B,OAAO,EAAE,iBAAiB,GAC3B,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAgCvC,OAAO,CAAC,mBAAmB;CA0D9B"}
|
||||
58
node_modules/@azure/msal-node/lib/types/client/DeviceCodeClient.d.ts
generated
vendored
Normal file
58
node_modules/@azure/msal-node/lib/types/client/DeviceCodeClient.d.ts
generated
vendored
Normal file
@@ -0,0 +1,58 @@
|
||||
import { AuthenticationResult, BaseClient, ClientConfiguration, CommonDeviceCodeRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* OAuth2.0 Device code client
|
||||
* @public
|
||||
*/
|
||||
export declare class DeviceCodeClient extends BaseClient {
|
||||
constructor(configuration: ClientConfiguration);
|
||||
/**
|
||||
* Gets device code from device code endpoint, calls back to with device code response, and
|
||||
* polls token endpoint to exchange device code for tokens
|
||||
* @param request - developer provided CommonDeviceCodeRequest
|
||||
*/
|
||||
acquireToken(request: CommonDeviceCodeRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Creates device code request and executes http GET
|
||||
* @param request - developer provided CommonDeviceCodeRequest
|
||||
*/
|
||||
private getDeviceCode;
|
||||
/**
|
||||
* Creates query string for the device code request
|
||||
* @param request - developer provided CommonDeviceCodeRequest
|
||||
*/
|
||||
createExtraQueryParameters(request: CommonDeviceCodeRequest): string;
|
||||
/**
|
||||
* Executes POST request to device code endpoint
|
||||
* @param deviceCodeEndpoint - token endpoint
|
||||
* @param queryString - string to be used in the body of the request
|
||||
* @param headers - headers for the request
|
||||
* @param thumbprint - unique request thumbprint
|
||||
* @param correlationId - correlation id to be used in the request
|
||||
*/
|
||||
private executePostRequestToDeviceCodeEndpoint;
|
||||
/**
|
||||
* Create device code endpoint query parameters and returns string
|
||||
* @param request - developer provided CommonDeviceCodeRequest
|
||||
*/
|
||||
private createQueryString;
|
||||
/**
|
||||
* Breaks the polling with specific conditions
|
||||
* @param deviceCodeExpirationTime - expiration time for the device code request
|
||||
* @param userSpecifiedTimeout - developer provided timeout, to be compared against deviceCodeExpirationTime
|
||||
* @param userSpecifiedCancelFlag - boolean indicating the developer would like to cancel the request
|
||||
*/
|
||||
private continuePolling;
|
||||
/**
|
||||
* Creates token request with device code response and polls token endpoint at interval set by the device code response
|
||||
* @param request - developer provided CommonDeviceCodeRequest
|
||||
* @param deviceCodeResponse - DeviceCodeResponse returned by the security token service device code endpoint
|
||||
*/
|
||||
private acquireTokenWithDeviceCode;
|
||||
/**
|
||||
* Creates query parameters and converts to string.
|
||||
* @param request - developer provided CommonDeviceCodeRequest
|
||||
* @param deviceCodeResponse - DeviceCodeResponse returned by the security token service device code endpoint
|
||||
*/
|
||||
private createTokenRequestBody;
|
||||
}
|
||||
//# sourceMappingURL=DeviceCodeClient.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/DeviceCodeClient.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/DeviceCodeClient.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"DeviceCodeClient.d.ts","sourceRoot":"","sources":["../../../src/client/DeviceCodeClient.ts"],"names":[],"mappings":"AAKA,OAAO,EAEH,oBAAoB,EACpB,UAAU,EAEV,mBAAmB,EACnB,uBAAuB,EAc1B,MAAM,yBAAyB,CAAC;AAEjC;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,UAAU;gBAChC,aAAa,EAAE,mBAAmB;IAI9C;;;;OAIG;IACU,YAAY,CACrB,OAAO,EAAE,uBAAuB,GACjC,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IA4BvC;;;OAGG;YACW,aAAa;IA+B3B;;;OAGG;IACI,0BAA0B,CAC7B,OAAO,EAAE,uBAAuB,GACjC,MAAM;IAYT;;;;;;;OAOG;YACW,sCAAsC;IAoCpD;;;OAGG;IACH,OAAO,CAAC,iBAAiB;IA2BzB;;;;;OAKG;IACH,OAAO,CAAC,eAAe;IAqCvB;;;;OAIG;YACW,0BAA0B;IAwFxC;;;;OAIG;IACH,OAAO,CAAC,sBAAsB;CAqCjC"}
|
||||
40
node_modules/@azure/msal-node/lib/types/client/IConfidentialClientApplication.d.ts
generated
vendored
Normal file
40
node_modules/@azure/msal-node/lib/types/client/IConfidentialClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,40 @@
|
||||
import { AuthenticationResult, IAppTokenProvider, Logger } from "@azure/msal-common/node";
|
||||
import { AuthorizationCodeRequest } from "../request/AuthorizationCodeRequest.js";
|
||||
import { AuthorizationUrlRequest } from "../request/AuthorizationUrlRequest.js";
|
||||
import { ClientCredentialRequest } from "../request/ClientCredentialRequest.js";
|
||||
import { OnBehalfOfRequest } from "../request/OnBehalfOfRequest.js";
|
||||
import { RefreshTokenRequest } from "../request/RefreshTokenRequest.js";
|
||||
import { SilentFlowRequest } from "../request/SilentFlowRequest.js";
|
||||
import { UsernamePasswordRequest } from "../request/UsernamePasswordRequest.js";
|
||||
import { TokenCache } from "../cache/TokenCache.js";
|
||||
/**
|
||||
* Interface for the ConfidentialClientApplication class defining the public API signatures
|
||||
* @public
|
||||
*/
|
||||
export interface IConfidentialClientApplication {
|
||||
/** Creates the URL of the authorization request */
|
||||
getAuthCodeUrl(request: AuthorizationUrlRequest): Promise<string>;
|
||||
/** Acquires a token by exchanging the authorization code received from the first step of OAuth 2.0 Authorization Code Flow */
|
||||
acquireTokenByCode(request: AuthorizationCodeRequest): Promise<AuthenticationResult>;
|
||||
/** Acquires a token silently when a user specifies the account the token is requested for */
|
||||
acquireTokenSilent(request: SilentFlowRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires a token by exchanging the refresh token provided for a new set of tokens */
|
||||
acquireTokenByRefreshToken(request: RefreshTokenRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires tokens from the authority for the application (not for an end user) */
|
||||
acquireTokenByClientCredential(request: ClientCredentialRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires tokens from the authority for the application */
|
||||
acquireTokenOnBehalfOf(request: OnBehalfOfRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires tokens with password grant by exchanging client applications username and password for credentials */
|
||||
acquireTokenByUsernamePassword(request: UsernamePasswordRequest): Promise<AuthenticationResult | null>;
|
||||
/** Gets the token cache for the application */
|
||||
getTokenCache(): TokenCache;
|
||||
/** Returns the logger instance */
|
||||
getLogger(): Logger;
|
||||
/** Replaces the default logger set in configurations with new Logger with new configurations */
|
||||
setLogger(logger: Logger): void;
|
||||
/** Clear the cache */
|
||||
clearCache(): void;
|
||||
/** This extensibility point is meant for Azure SDK to enhance Managed Identity support */
|
||||
SetAppTokenProvider(provider: IAppTokenProvider): void;
|
||||
}
|
||||
//# sourceMappingURL=IConfidentialClientApplication.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/IConfidentialClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/IConfidentialClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"IConfidentialClientApplication.d.ts","sourceRoot":"","sources":["../../../src/client/IConfidentialClientApplication.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,oBAAoB,EACpB,iBAAiB,EACjB,MAAM,EACT,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,wBAAwB,EAAE,MAAM,wCAAwC,CAAC;AAClF,OAAO,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAChF,OAAO,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAChF,OAAO,EAAE,iBAAiB,EAAE,MAAM,iCAAiC,CAAC;AACpE,OAAO,EAAE,mBAAmB,EAAE,MAAM,mCAAmC,CAAC;AACxE,OAAO,EAAE,iBAAiB,EAAE,MAAM,iCAAiC,CAAC;AACpE,OAAO,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAChF,OAAO,EAAE,UAAU,EAAE,MAAM,wBAAwB,CAAC;AAEpD;;;GAGG;AACH,MAAM,WAAW,8BAA8B;IAC3C,mDAAmD;IACnD,cAAc,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;IAElE,+HAA+H;IAC/H,kBAAkB,CACd,OAAO,EAAE,wBAAwB,GAClC,OAAO,CAAC,oBAAoB,CAAC,CAAC;IAEjC,8FAA8F;IAC9F,kBAAkB,CACd,OAAO,EAAE,iBAAiB,GAC3B,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAExC,wFAAwF;IACxF,0BAA0B,CACtB,OAAO,EAAE,mBAAmB,GAC7B,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAExC,mFAAmF;IACnF,8BAA8B,CAC1B,OAAO,EAAE,uBAAuB,GACjC,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAExC,6DAA6D;IAC7D,sBAAsB,CAClB,OAAO,EAAE,iBAAiB,GAC3B,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAExC,kHAAkH;IAClH,8BAA8B,CAC1B,OAAO,EAAE,uBAAuB,GACjC,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAExC,+CAA+C;IAC/C,aAAa,IAAI,UAAU,CAAC;IAE5B,kCAAkC;IAClC,SAAS,IAAI,MAAM,CAAC;IAEpB,gGAAgG;IAChG,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC;IAEhC,sBAAsB;IACtB,UAAU,IAAI,IAAI,CAAC;IAEnB,0FAA0F;IAC1F,mBAAmB,CAAC,QAAQ,EAAE,iBAAiB,GAAG,IAAI,CAAC;CAC1D"}
|
||||
43
node_modules/@azure/msal-node/lib/types/client/IPublicClientApplication.d.ts
generated
vendored
Normal file
43
node_modules/@azure/msal-node/lib/types/client/IPublicClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,43 @@
|
||||
import { AccountInfo, AuthenticationResult, Logger } from "@azure/msal-common/node";
|
||||
import { AuthorizationCodeRequest } from "../request/AuthorizationCodeRequest.js";
|
||||
import { AuthorizationUrlRequest } from "../request/AuthorizationUrlRequest.js";
|
||||
import { DeviceCodeRequest } from "../request/DeviceCodeRequest.js";
|
||||
import { RefreshTokenRequest } from "../request/RefreshTokenRequest.js";
|
||||
import { SilentFlowRequest } from "../request/SilentFlowRequest.js";
|
||||
import { UsernamePasswordRequest } from "../request/UsernamePasswordRequest.js";
|
||||
import { TokenCache } from "../cache/TokenCache.js";
|
||||
import { InteractiveRequest } from "../request/InteractiveRequest.js";
|
||||
import { SignOutRequest } from "../request/SignOutRequest.js";
|
||||
/**
|
||||
* Interface for the PublicClientApplication class defining the public API signatures
|
||||
* @public
|
||||
*/
|
||||
export interface IPublicClientApplication {
|
||||
/** Creates the URL of the authorization request */
|
||||
getAuthCodeUrl(request: AuthorizationUrlRequest): Promise<string>;
|
||||
/** Acquires a token by exchanging the authorization code received from the first step of OAuth 2.0 Authorization Code Flow */
|
||||
acquireTokenByCode(request: AuthorizationCodeRequest): Promise<AuthenticationResult>;
|
||||
/** Acquires a token interactively */
|
||||
acquireTokenInteractive(request: InteractiveRequest): Promise<AuthenticationResult>;
|
||||
/** Acquires a token silently when a user specifies the account the token is requested for */
|
||||
acquireTokenSilent(request: SilentFlowRequest): Promise<AuthenticationResult>;
|
||||
/** Acquires a token by exchanging the refresh token provided for a new set of tokens */
|
||||
acquireTokenByRefreshToken(request: RefreshTokenRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires a token from the authority using OAuth2.0 device code flow */
|
||||
acquireTokenByDeviceCode(request: DeviceCodeRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires tokens with password grant by exchanging client applications username and password for credentials */
|
||||
acquireTokenByUsernamePassword(request: UsernamePasswordRequest): Promise<AuthenticationResult | null>;
|
||||
/** Gets the token cache for the application */
|
||||
getTokenCache(): TokenCache;
|
||||
/** Returns the logger instance */
|
||||
getLogger(): Logger;
|
||||
/** Replaces the default logger set in configurations with new Logger with new configurations */
|
||||
setLogger(logger: Logger): void;
|
||||
/** Clear the cache */
|
||||
clearCache(): void;
|
||||
/** Gets all cached accounts */
|
||||
getAllAccounts(): Promise<AccountInfo[]>;
|
||||
/** Removes cache artifacts associated with the given account */
|
||||
signOut(request: SignOutRequest): Promise<void>;
|
||||
}
|
||||
//# sourceMappingURL=IPublicClientApplication.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/IPublicClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/IPublicClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"IPublicClientApplication.d.ts","sourceRoot":"","sources":["../../../src/client/IPublicClientApplication.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,WAAW,EACX,oBAAoB,EACpB,MAAM,EACT,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,wBAAwB,EAAE,MAAM,wCAAwC,CAAC;AAClF,OAAO,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAChF,OAAO,EAAE,iBAAiB,EAAE,MAAM,iCAAiC,CAAC;AACpE,OAAO,EAAE,mBAAmB,EAAE,MAAM,mCAAmC,CAAC;AACxE,OAAO,EAAE,iBAAiB,EAAE,MAAM,iCAAiC,CAAC;AACpE,OAAO,EAAE,uBAAuB,EAAE,MAAM,uCAAuC,CAAC;AAChF,OAAO,EAAE,UAAU,EAAE,MAAM,wBAAwB,CAAC;AACpD,OAAO,EAAE,kBAAkB,EAAE,MAAM,kCAAkC,CAAC;AACtE,OAAO,EAAE,cAAc,EAAE,MAAM,8BAA8B,CAAC;AAE9D;;;GAGG;AACH,MAAM,WAAW,wBAAwB;IACrC,mDAAmD;IACnD,cAAc,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;IAElE,8HAA8H;IAC9H,kBAAkB,CACd,OAAO,EAAE,wBAAwB,GAClC,OAAO,CAAC,oBAAoB,CAAC,CAAC;IAEjC,qCAAqC;IACrC,uBAAuB,CACnB,OAAO,EAAE,kBAAkB,GAC5B,OAAO,CAAC,oBAAoB,CAAC,CAAC;IAEjC,6FAA6F;IAC7F,kBAAkB,CACd,OAAO,EAAE,iBAAiB,GAC3B,OAAO,CAAC,oBAAoB,CAAC,CAAC;IAEjC,wFAAwF;IACxF,0BAA0B,CACtB,OAAO,EAAE,mBAAmB,GAC7B,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAExC,0EAA0E;IAC1E,wBAAwB,CACpB,OAAO,EAAE,iBAAiB,GAC3B,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAExC,kHAAkH;IAClH,8BAA8B,CAC1B,OAAO,EAAE,uBAAuB,GACjC,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAExC,+CAA+C;IAC/C,aAAa,IAAI,UAAU,CAAC;IAE5B,kCAAkC;IAClC,SAAS,IAAI,MAAM,CAAC;IAEpB,gGAAgG;IAChG,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC;IAEhC,sBAAsB;IACtB,UAAU,IAAI,IAAI,CAAC;IAEnB,+BAA+B;IAC/B,cAAc,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;IAEzC,gEAAgE;IAChE,OAAO,CAAC,OAAO,EAAE,cAAc,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;CACnD"}
|
||||
31
node_modules/@azure/msal-node/lib/types/client/ManagedIdentityApplication.d.ts
generated
vendored
Normal file
31
node_modules/@azure/msal-node/lib/types/client/ManagedIdentityApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,31 @@
|
||||
import { AuthenticationResult } from "@azure/msal-common/node";
|
||||
import { ManagedIdentityConfiguration } from "../config/Configuration.js";
|
||||
import { ManagedIdentityRequestParams } from "../request/ManagedIdentityRequestParams.js";
|
||||
import { ManagedIdentitySourceNames } from "../utils/Constants.js";
|
||||
/**
|
||||
* Class to initialize a managed identity and identify the service
|
||||
* @public
|
||||
*/
|
||||
export declare class ManagedIdentityApplication {
|
||||
private config;
|
||||
private logger;
|
||||
private static nodeStorage?;
|
||||
private networkClient;
|
||||
private cryptoProvider;
|
||||
private fakeAuthority;
|
||||
private fakeClientCredentialClient;
|
||||
private managedIdentityClient;
|
||||
constructor(configuration?: ManagedIdentityConfiguration);
|
||||
/**
|
||||
* Acquire an access token from the cache or the managed identity
|
||||
* @param managedIdentityRequest - the ManagedIdentityRequestParams object passed in by the developer
|
||||
* @returns the access token
|
||||
*/
|
||||
acquireToken(managedIdentityRequestParams: ManagedIdentityRequestParams): Promise<AuthenticationResult>;
|
||||
/**
|
||||
* Determine the Managed Identity Source based on available environment variables. This API is consumed by Azure Identity SDK.
|
||||
* @returns ManagedIdentitySourceNames - The Managed Identity source's name
|
||||
*/
|
||||
getManagedIdentitySource(): ManagedIdentitySourceNames;
|
||||
}
|
||||
//# sourceMappingURL=ManagedIdentityApplication.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentityApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentityApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ManagedIdentityApplication.d.ts","sourceRoot":"","sources":["../../../src/client/ManagedIdentityApplication.ts"],"names":[],"mappings":"AAKA,OAAO,EAYH,oBAAoB,EAGvB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EACH,4BAA4B,EAG/B,MAAM,4BAA4B,CAAC;AAMpC,OAAO,EAAE,4BAA4B,EAAE,MAAM,4CAA4C,CAAC;AAE1F,OAAO,EAEH,0BAA0B,EAC7B,MAAM,uBAAuB,CAAC;AAE/B;;;GAGG;AACH,qBAAa,0BAA0B;IACnC,OAAO,CAAC,MAAM,CAAmC;IAEjD,OAAO,CAAC,MAAM,CAAS;IACvB,OAAO,CAAC,MAAM,CAAC,WAAW,CAAC,CAAc;IACzC,OAAO,CAAC,aAAa,CAAiB;IACtC,OAAO,CAAC,cAAc,CAAiB;IAGvC,OAAO,CAAC,aAAa,CAAY;IAGjC,OAAO,CAAC,0BAA0B,CAAyB;IAE3D,OAAO,CAAC,qBAAqB,CAAwB;gBAEzC,aAAa,CAAC,EAAE,4BAA4B;IA2DxD;;;;OAIG;IACU,YAAY,CACrB,4BAA4B,EAAE,4BAA4B,GAC3D,OAAO,CAAC,oBAAoB,CAAC;IAqEhC;;;OAGG;IACI,wBAAwB,IAAI,0BAA0B;CAMhE"}
|
||||
28
node_modules/@azure/msal-node/lib/types/client/ManagedIdentityClient.d.ts
generated
vendored
Normal file
28
node_modules/@azure/msal-node/lib/types/client/ManagedIdentityClient.d.ts
generated
vendored
Normal file
@@ -0,0 +1,28 @@
|
||||
import { Authority, INetworkModule, Logger, AuthenticationResult } from "@azure/msal-common/node";
|
||||
import { CryptoProvider } from "../crypto/CryptoProvider.js";
|
||||
import { ManagedIdentityRequest } from "../request/ManagedIdentityRequest.js";
|
||||
import { ManagedIdentityId } from "../config/ManagedIdentityId.js";
|
||||
import { NodeStorage } from "../cache/NodeStorage.js";
|
||||
import { ManagedIdentitySourceNames } from "../utils/Constants.js";
|
||||
export declare class ManagedIdentityClient {
|
||||
private logger;
|
||||
private nodeStorage;
|
||||
private networkClient;
|
||||
private cryptoProvider;
|
||||
private static identitySource?;
|
||||
static sourceName?: ManagedIdentitySourceNames;
|
||||
constructor(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider);
|
||||
sendManagedIdentityTokenRequest(managedIdentityRequest: ManagedIdentityRequest, managedIdentityId: ManagedIdentityId, fakeAuthority: Authority, refreshAccessToken?: boolean): Promise<AuthenticationResult>;
|
||||
private allEnvironmentVariablesAreDefined;
|
||||
/**
|
||||
* Determine the Managed Identity Source based on available environment variables. This API is consumed by ManagedIdentityApplication's getManagedIdentitySource.
|
||||
* @returns ManagedIdentitySourceNames - The Managed Identity source's name
|
||||
*/
|
||||
getManagedIdentitySource(): ManagedIdentitySourceNames;
|
||||
/**
|
||||
* Tries to create a managed identity source for all sources
|
||||
* @returns the managed identity Source
|
||||
*/
|
||||
private selectManagedIdentitySource;
|
||||
}
|
||||
//# sourceMappingURL=ManagedIdentityClient.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentityClient.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentityClient.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ManagedIdentityClient.d.ts","sourceRoot":"","sources":["../../../src/client/ManagedIdentityClient.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,SAAS,EACT,cAAc,EACd,MAAM,EACN,oBAAoB,EACvB,MAAM,yBAAyB,CAAC;AAMjC,OAAO,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAK7D,OAAO,EAAE,sBAAsB,EAAE,MAAM,sCAAsC,CAAC;AAC9E,OAAO,EAAE,iBAAiB,EAAE,MAAM,gCAAgC,CAAC;AACnE,OAAO,EAAE,WAAW,EAAE,MAAM,yBAAyB,CAAC;AAEtD,OAAO,EAAE,0BAA0B,EAAE,MAAM,uBAAuB,CAAC;AAMnE,qBAAa,qBAAqB;IAC9B,OAAO,CAAC,MAAM,CAAS;IACvB,OAAO,CAAC,WAAW,CAAc;IACjC,OAAO,CAAC,aAAa,CAAiB;IACtC,OAAO,CAAC,cAAc,CAAiB;IAEvC,OAAO,CAAC,MAAM,CAAC,cAAc,CAAC,CAA4B;IAC1D,OAAc,UAAU,CAAC,EAAE,0BAA0B,CAAC;gBAGlD,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc;IAQrB,+BAA+B,CACxC,sBAAsB,EAAE,sBAAsB,EAC9C,iBAAiB,EAAE,iBAAiB,EACpC,aAAa,EAAE,SAAS,EACxB,kBAAkB,CAAC,EAAE,OAAO,GAC7B,OAAO,CAAC,oBAAoB,CAAC;IAoBhC,OAAO,CAAC,iCAAiC;IAUzC;;;OAGG;IACI,wBAAwB,IAAI,0BAA0B;IAuB7D;;;OAGG;IACH,OAAO,CAAC,2BAA2B;CA2CtC"}
|
||||
18
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/AppService.d.ts
generated
vendored
Normal file
18
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/AppService.d.ts
generated
vendored
Normal file
@@ -0,0 +1,18 @@
|
||||
import { INetworkModule, Logger } from "@azure/msal-common/node";
|
||||
import { BaseManagedIdentitySource } from "./BaseManagedIdentitySource.js";
|
||||
import { CryptoProvider } from "../../crypto/CryptoProvider.js";
|
||||
import { ManagedIdentityRequestParameters } from "../../config/ManagedIdentityRequestParameters.js";
|
||||
import { ManagedIdentityId } from "../../config/ManagedIdentityId.js";
|
||||
import { NodeStorage } from "../../cache/NodeStorage.js";
|
||||
/**
|
||||
* Original source of code: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/identity/Azure.Identity/src/AppServiceManagedIdentitySource.cs
|
||||
*/
|
||||
export declare class AppService extends BaseManagedIdentitySource {
|
||||
private identityEndpoint;
|
||||
private identityHeader;
|
||||
constructor(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider, identityEndpoint: string, identityHeader: string);
|
||||
static getEnvironmentVariables(): Array<string | undefined>;
|
||||
static tryCreate(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider): AppService | null;
|
||||
createRequest(resource: string, managedIdentityId: ManagedIdentityId): ManagedIdentityRequestParameters;
|
||||
}
|
||||
//# sourceMappingURL=AppService.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/AppService.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/AppService.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AppService.d.ts","sourceRoot":"","sources":["../../../../src/client/ManagedIdentitySources/AppService.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,cAAc,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAC;AACjE,OAAO,EAAE,yBAAyB,EAAE,MAAM,gCAAgC,CAAC;AAU3E,OAAO,EAAE,cAAc,EAAE,MAAM,gCAAgC,CAAC;AAChE,OAAO,EAAE,gCAAgC,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AACtE,OAAO,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AAKzD;;GAEG;AACH,qBAAa,UAAW,SAAQ,yBAAyB;IACrD,OAAO,CAAC,gBAAgB,CAAS;IACjC,OAAO,CAAC,cAAc,CAAS;gBAG3B,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,EAC9B,gBAAgB,EAAE,MAAM,EACxB,cAAc,EAAE,MAAM;WAQZ,uBAAuB,IAAI,KAAK,CAAC,MAAM,GAAG,SAAS,CAAC;WAapD,SAAS,CACnB,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,GAC/B,UAAU,GAAG,IAAI;IAkCb,aAAa,CAChB,QAAQ,EAAE,MAAM,EAChB,iBAAiB,EAAE,iBAAiB,GACrC,gCAAgC;CA4BtC"}
|
||||
28
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/AzureArc.d.ts
generated
vendored
Normal file
28
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/AzureArc.d.ts
generated
vendored
Normal file
@@ -0,0 +1,28 @@
|
||||
import { INetworkModule, NetworkResponse, NetworkRequestOptions, Logger, ServerAuthorizationTokenResponse } from "@azure/msal-common/node";
|
||||
import { ManagedIdentityRequestParameters } from "../../config/ManagedIdentityRequestParameters.js";
|
||||
import { BaseManagedIdentitySource } from "./BaseManagedIdentitySource.js";
|
||||
import { CryptoProvider } from "../../crypto/CryptoProvider.js";
|
||||
import { NodeStorage } from "../../cache/NodeStorage.js";
|
||||
import { ManagedIdentityTokenResponse } from "../../response/ManagedIdentityTokenResponse.js";
|
||||
import { ManagedIdentityId } from "../../config/ManagedIdentityId.js";
|
||||
export declare const ARC_API_VERSION: string;
|
||||
export declare const DEFAULT_AZURE_ARC_IDENTITY_ENDPOINT: string;
|
||||
type FilePathMap = {
|
||||
win32: string;
|
||||
linux: string;
|
||||
};
|
||||
export declare const SUPPORTED_AZURE_ARC_PLATFORMS: FilePathMap;
|
||||
export declare const AZURE_ARC_FILE_DETECTION: FilePathMap;
|
||||
/**
|
||||
* Original source of code: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/identity/Azure.Identity/src/AzureArcManagedIdentitySource.cs
|
||||
*/
|
||||
export declare class AzureArc extends BaseManagedIdentitySource {
|
||||
private identityEndpoint;
|
||||
constructor(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider, identityEndpoint: string);
|
||||
static getEnvironmentVariables(): Array<string | undefined>;
|
||||
static tryCreate(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider, managedIdentityId: ManagedIdentityId): AzureArc | null;
|
||||
createRequest(resource: string): ManagedIdentityRequestParameters;
|
||||
getServerTokenResponseAsync(originalResponse: NetworkResponse<ManagedIdentityTokenResponse>, networkClient: INetworkModule, networkRequest: ManagedIdentityRequestParameters, networkRequestOptions: NetworkRequestOptions): Promise<ServerAuthorizationTokenResponse>;
|
||||
}
|
||||
export {};
|
||||
//# sourceMappingURL=AzureArc.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/AzureArc.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/AzureArc.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AzureArc.d.ts","sourceRoot":"","sources":["../../../../src/client/ManagedIdentitySources/AzureArc.ts"],"names":[],"mappings":"AAKA,OAAO,EAKH,cAAc,EACd,eAAe,EACf,qBAAqB,EACrB,MAAM,EACN,gCAAgC,EACnC,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,gCAAgC,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,yBAAyB,EAAE,MAAM,gCAAgC,CAAC;AAC3E,OAAO,EAAE,cAAc,EAAE,MAAM,gCAAgC,CAAC;AAgBhE,OAAO,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AAOzD,OAAO,EAAE,4BAA4B,EAAE,MAAM,gDAAgD,CAAC;AAC9F,OAAO,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AAGtE,eAAO,MAAM,eAAe,EAAE,MAAqB,CAAC;AACpD,eAAO,MAAM,mCAAmC,EAAE,MACS,CAAC;AAG5D,KAAK,WAAW,GAAG;IACf,KAAK,EAAE,MAAM,CAAC;IACd,KAAK,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF,eAAO,MAAM,6BAA6B,EAAE,WAG3C,CAAC;AAEF,eAAO,MAAM,wBAAwB,EAAE,WAGtC,CAAC;AAEF;;GAEG;AACH,qBAAa,QAAS,SAAQ,yBAAyB;IACnD,OAAO,CAAC,gBAAgB,CAAS;gBAG7B,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,EAC9B,gBAAgB,EAAE,MAAM;WAOd,uBAAuB,IAAI,KAAK,CAAC,MAAM,GAAG,SAAS,CAAC;WAoCpD,SAAS,CACnB,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,EAC9B,iBAAiB,EAAE,iBAAiB,GACrC,QAAQ,GAAG,IAAI;IA8DX,aAAa,CAAC,QAAQ,EAAE,MAAM,GAAG,gCAAgC;IAmB3D,2BAA2B,CACpC,gBAAgB,EAAE,eAAe,CAAC,4BAA4B,CAAC,EAC/D,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,gCAAgC,EAChD,qBAAqB,EAAE,qBAAqB,GAC7C,OAAO,CAAC,gCAAgC,CAAC;CA0G/C"}
|
||||
31
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/BaseManagedIdentitySource.d.ts
generated
vendored
Normal file
31
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/BaseManagedIdentitySource.d.ts
generated
vendored
Normal file
@@ -0,0 +1,31 @@
|
||||
import { Authority, INetworkModule, Logger, NetworkRequestOptions, NetworkResponse, ServerAuthorizationTokenResponse, AuthenticationResult } from "@azure/msal-common/node";
|
||||
import { ManagedIdentityId } from "../../config/ManagedIdentityId.js";
|
||||
import { ManagedIdentityRequestParameters } from "../../config/ManagedIdentityRequestParameters.js";
|
||||
import { CryptoProvider } from "../../crypto/CryptoProvider.js";
|
||||
import { ManagedIdentityRequest } from "../../request/ManagedIdentityRequest.js";
|
||||
import { ManagedIdentityIdType } from "../../utils/Constants.js";
|
||||
import { ManagedIdentityTokenResponse } from "../../response/ManagedIdentityTokenResponse.js";
|
||||
import { NodeStorage } from "../../cache/NodeStorage.js";
|
||||
/**
|
||||
* Managed Identity User Assigned Id Query Parameter Names
|
||||
*/
|
||||
export declare const ManagedIdentityUserAssignedIdQueryParameterNames: {
|
||||
readonly MANAGED_IDENTITY_CLIENT_ID: "client_id";
|
||||
readonly MANAGED_IDENTITY_OBJECT_ID: "object_id";
|
||||
readonly MANAGED_IDENTITY_RESOURCE_ID: "mi_res_id";
|
||||
};
|
||||
export type ManagedIdentityUserAssignedIdQueryParameterNames = (typeof ManagedIdentityUserAssignedIdQueryParameterNames)[keyof typeof ManagedIdentityUserAssignedIdQueryParameterNames];
|
||||
export declare abstract class BaseManagedIdentitySource {
|
||||
protected logger: Logger;
|
||||
private nodeStorage;
|
||||
private networkClient;
|
||||
private cryptoProvider;
|
||||
constructor(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider);
|
||||
abstract createRequest(request: string, managedIdentityId: ManagedIdentityId): ManagedIdentityRequestParameters;
|
||||
getServerTokenResponseAsync(response: NetworkResponse<ManagedIdentityTokenResponse>, _networkClient: INetworkModule, _networkRequest: ManagedIdentityRequestParameters, _networkRequestOptions: NetworkRequestOptions): Promise<ServerAuthorizationTokenResponse>;
|
||||
getServerTokenResponse(response: NetworkResponse<ManagedIdentityTokenResponse>): ServerAuthorizationTokenResponse;
|
||||
acquireTokenWithManagedIdentity(managedIdentityRequest: ManagedIdentityRequest, managedIdentityId: ManagedIdentityId, fakeAuthority: Authority, refreshAccessToken?: boolean): Promise<AuthenticationResult>;
|
||||
getManagedIdentityUserAssignedIdQueryParameterKey(managedIdentityIdType: ManagedIdentityIdType): string;
|
||||
static getValidatedEnvVariableUrlString: (envVariableStringName: string, envVariable: string, sourceName: string, logger: Logger) => string;
|
||||
}
|
||||
//# sourceMappingURL=BaseManagedIdentitySource.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/BaseManagedIdentitySource.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/BaseManagedIdentitySource.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"BaseManagedIdentitySource.d.ts","sourceRoot":"","sources":["../../../../src/client/ManagedIdentitySources/BaseManagedIdentitySource.ts"],"names":[],"mappings":"AAKA,OAAO,EAEH,SAAS,EAIT,cAAc,EACd,MAAM,EACN,qBAAqB,EACrB,eAAe,EAEf,gCAAgC,EAGhC,oBAAoB,EAEvB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AACtE,OAAO,EAAE,gCAAgC,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,cAAc,EAAE,MAAM,gCAAgC,CAAC;AAChE,OAAO,EAAE,sBAAsB,EAAE,MAAM,yCAAyC,CAAC;AACjF,OAAO,EAAc,qBAAqB,EAAE,MAAM,0BAA0B,CAAC;AAC7E,OAAO,EAAE,4BAA4B,EAAE,MAAM,gDAAgD,CAAC;AAC9F,OAAO,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AAMzD;;GAEG;AACH,eAAO,MAAM,gDAAgD;;;;CAInD,CAAC;AACX,MAAM,MAAM,gDAAgD,GACxD,CAAC,OAAO,gDAAgD,CAAC,CAAC,MAAM,OAAO,gDAAgD,CAAC,CAAC;AAE7H,8BAAsB,yBAAyB;IAC3C,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC;IACzB,OAAO,CAAC,WAAW,CAAc;IACjC,OAAO,CAAC,aAAa,CAAiB;IACtC,OAAO,CAAC,cAAc,CAAiB;gBAGnC,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc;IAQlC,QAAQ,CAAC,aAAa,CAClB,OAAO,EAAE,MAAM,EACf,iBAAiB,EAAE,iBAAiB,GACrC,gCAAgC;IAEtB,2BAA2B,CACpC,QAAQ,EAAE,eAAe,CAAC,4BAA4B,CAAC,EAEvD,cAAc,EAAE,cAAc,EAE9B,eAAe,EAAE,gCAAgC,EAEjD,sBAAsB,EAAE,qBAAqB,GAC9C,OAAO,CAAC,gCAAgC,CAAC;IAIrC,sBAAsB,CACzB,QAAQ,EAAE,eAAe,CAAC,4BAA4B,CAAC,GACxD,gCAAgC;IAyCtB,+BAA+B,CACxC,sBAAsB,EAAE,sBAAsB,EAC9C,iBAAiB,EAAE,iBAAiB,EACpC,aAAa,EAAE,SAAS,EACxB,kBAAkB,CAAC,EAAE,OAAO,GAC7B,OAAO,CAAC,oBAAoB,CAAC;IA0EzB,iDAAiD,CACpD,qBAAqB,EAAE,qBAAqB,GAC7C,MAAM;IA0BT,OAAc,gCAAgC,0BACnB,MAAM,eAChB,MAAM,cACP,MAAM,UACV,MAAM,KACf,MAAM,CAeP;CACL"}
|
||||
17
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/CloudShell.d.ts
generated
vendored
Normal file
17
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/CloudShell.d.ts
generated
vendored
Normal file
@@ -0,0 +1,17 @@
|
||||
import { INetworkModule, Logger } from "@azure/msal-common/node";
|
||||
import { ManagedIdentityRequestParameters } from "../../config/ManagedIdentityRequestParameters.js";
|
||||
import { BaseManagedIdentitySource } from "./BaseManagedIdentitySource.js";
|
||||
import { NodeStorage } from "../../cache/NodeStorage.js";
|
||||
import { CryptoProvider } from "../../crypto/CryptoProvider.js";
|
||||
import { ManagedIdentityId } from "../../config/ManagedIdentityId.js";
|
||||
/**
|
||||
* Original source of code: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/identity/Azure.Identity/src/CloudShellManagedIdentitySource.cs
|
||||
*/
|
||||
export declare class CloudShell extends BaseManagedIdentitySource {
|
||||
private msiEndpoint;
|
||||
constructor(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider, msiEndpoint: string);
|
||||
static getEnvironmentVariables(): Array<string | undefined>;
|
||||
static tryCreate(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider, managedIdentityId: ManagedIdentityId): CloudShell | null;
|
||||
createRequest(resource: string): ManagedIdentityRequestParameters;
|
||||
}
|
||||
//# sourceMappingURL=CloudShell.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/CloudShell.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/CloudShell.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CloudShell.d.ts","sourceRoot":"","sources":["../../../../src/client/ManagedIdentitySources/CloudShell.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,cAAc,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAC;AACjE,OAAO,EAAE,gCAAgC,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,yBAAyB,EAAE,MAAM,gCAAgC,CAAC;AAC3E,OAAO,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AACzD,OAAO,EAAE,cAAc,EAAE,MAAM,gCAAgC,CAAC;AAahE,OAAO,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AAEtE;;GAEG;AACH,qBAAa,UAAW,SAAQ,yBAAyB;IACrD,OAAO,CAAC,WAAW,CAAS;gBAGxB,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,EAC9B,WAAW,EAAE,MAAM;WAOT,uBAAuB,IAAI,KAAK,CAAC,MAAM,GAAG,SAAS,CAAC;WAOpD,SAAS,CACnB,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,EAC9B,iBAAiB,EAAE,iBAAiB,GACrC,UAAU,GAAG,IAAI;IAwCb,aAAa,CAAC,QAAQ,EAAE,MAAM,GAAG,gCAAgC;CAc3E"}
|
||||
13
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/Imds.d.ts
generated
vendored
Normal file
13
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/Imds.d.ts
generated
vendored
Normal file
@@ -0,0 +1,13 @@
|
||||
import { INetworkModule, Logger } from "@azure/msal-common/node";
|
||||
import { ManagedIdentityId } from "../../config/ManagedIdentityId.js";
|
||||
import { ManagedIdentityRequestParameters } from "../../config/ManagedIdentityRequestParameters.js";
|
||||
import { BaseManagedIdentitySource } from "./BaseManagedIdentitySource.js";
|
||||
import { CryptoProvider } from "../../crypto/CryptoProvider.js";
|
||||
import { NodeStorage } from "../../cache/NodeStorage.js";
|
||||
export declare class Imds extends BaseManagedIdentitySource {
|
||||
private identityEndpoint;
|
||||
constructor(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider, identityEndpoint: string);
|
||||
static tryCreate(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider): Imds;
|
||||
createRequest(resource: string, managedIdentityId: ManagedIdentityId): ManagedIdentityRequestParameters;
|
||||
}
|
||||
//# sourceMappingURL=Imds.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/Imds.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/Imds.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"Imds.d.ts","sourceRoot":"","sources":["../../../../src/client/ManagedIdentitySources/Imds.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,cAAc,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAC;AACjE,OAAO,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AACtE,OAAO,EAAE,gCAAgC,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,yBAAyB,EAAE,MAAM,gCAAgC,CAAC;AAC3E,OAAO,EAAE,cAAc,EAAE,MAAM,gCAAgC,CAAC;AAUhE,OAAO,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AASzD,qBAAa,IAAK,SAAQ,yBAAyB;IAC/C,OAAO,CAAC,gBAAgB,CAAS;gBAG7B,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,EAC9B,gBAAgB,EAAE,MAAM;WAOd,SAAS,CACnB,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,GAC/B,IAAI;IA8CA,aAAa,CAChB,QAAQ,EAAE,MAAM,EAChB,iBAAiB,EAAE,iBAAiB,GACrC,gCAAgC;CA4BtC"}
|
||||
18
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/ServiceFabric.d.ts
generated
vendored
Normal file
18
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/ServiceFabric.d.ts
generated
vendored
Normal file
@@ -0,0 +1,18 @@
|
||||
import { INetworkModule, Logger } from "@azure/msal-common/node";
|
||||
import { ManagedIdentityId } from "../../config/ManagedIdentityId.js";
|
||||
import { ManagedIdentityRequestParameters } from "../../config/ManagedIdentityRequestParameters.js";
|
||||
import { BaseManagedIdentitySource } from "./BaseManagedIdentitySource.js";
|
||||
import { NodeStorage } from "../../cache/NodeStorage.js";
|
||||
import { CryptoProvider } from "../../crypto/CryptoProvider.js";
|
||||
/**
|
||||
* Original source of code: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/identity/Azure.Identity/src/ServiceFabricManagedIdentitySource.cs
|
||||
*/
|
||||
export declare class ServiceFabric extends BaseManagedIdentitySource {
|
||||
private identityEndpoint;
|
||||
private identityHeader;
|
||||
constructor(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider, identityEndpoint: string, identityHeader: string);
|
||||
static getEnvironmentVariables(): Array<string | undefined>;
|
||||
static tryCreate(logger: Logger, nodeStorage: NodeStorage, networkClient: INetworkModule, cryptoProvider: CryptoProvider, managedIdentityId: ManagedIdentityId): ServiceFabric | null;
|
||||
createRequest(resource: string, managedIdentityId: ManagedIdentityId): ManagedIdentityRequestParameters;
|
||||
}
|
||||
//# sourceMappingURL=ServiceFabric.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/ServiceFabric.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/ManagedIdentitySources/ServiceFabric.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ServiceFabric.d.ts","sourceRoot":"","sources":["../../../../src/client/ManagedIdentitySources/ServiceFabric.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,cAAc,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAC;AACjE,OAAO,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AACtE,OAAO,EAAE,gCAAgC,EAAE,MAAM,kDAAkD,CAAC;AACpG,OAAO,EAAE,yBAAyB,EAAE,MAAM,gCAAgC,CAAC;AAC3E,OAAO,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AACzD,OAAO,EAAE,cAAc,EAAE,MAAM,gCAAgC,CAAC;AAchE;;GAEG;AACH,qBAAa,aAAc,SAAQ,yBAAyB;IACxD,OAAO,CAAC,gBAAgB,CAAS;IACjC,OAAO,CAAC,cAAc,CAAS;gBAG3B,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,EAC9B,gBAAgB,EAAE,MAAM,EACxB,cAAc,EAAE,MAAM;WAQZ,uBAAuB,IAAI,KAAK,CAAC,MAAM,GAAG,SAAS,CAAC;WAkBpD,SAAS,CACnB,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,WAAW,EACxB,aAAa,EAAE,cAAc,EAC7B,cAAc,EAAE,cAAc,EAC9B,iBAAiB,EAAE,iBAAiB,GACrC,aAAa,GAAG,IAAI;IA6ChB,aAAa,CAChB,QAAQ,EAAE,MAAM,EAChB,iBAAiB,EAAE,iBAAiB,GACrC,gCAAgC;CA6BtC"}
|
||||
48
node_modules/@azure/msal-node/lib/types/client/OnBehalfOfClient.d.ts
generated
vendored
Normal file
48
node_modules/@azure/msal-node/lib/types/client/OnBehalfOfClient.d.ts
generated
vendored
Normal file
@@ -0,0 +1,48 @@
|
||||
import { AuthenticationResult, BaseClient, ClientConfiguration, CommonOnBehalfOfRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* On-Behalf-Of client
|
||||
* @public
|
||||
*/
|
||||
export declare class OnBehalfOfClient extends BaseClient {
|
||||
private scopeSet;
|
||||
private userAssertionHash;
|
||||
constructor(configuration: ClientConfiguration);
|
||||
/**
|
||||
* Public API to acquire tokens with on behalf of flow
|
||||
* @param request - developer provided CommonOnBehalfOfRequest
|
||||
*/
|
||||
acquireToken(request: CommonOnBehalfOfRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* look up cache for tokens
|
||||
* Find idtoken in the cache
|
||||
* Find accessToken based on user assertion and account info in the cache
|
||||
* Please note we are not yet supported OBO tokens refreshed with long lived RT. User will have to send a new assertion if the current access token expires
|
||||
* This is to prevent security issues when the assertion changes over time, however, longlived RT helps retaining the session
|
||||
* @param request - developer provided CommonOnBehalfOfRequest
|
||||
*/
|
||||
private getCachedAuthenticationResult;
|
||||
/**
|
||||
* read idtoken from cache, this is a specific implementation for OBO as the requirements differ from a generic lookup in the cacheManager
|
||||
* Certain use cases of OBO flow do not expect an idToken in the cache/or from the service
|
||||
* @param atHomeAccountId - account id
|
||||
*/
|
||||
private readIdTokenFromCacheForOBO;
|
||||
/**
|
||||
* Fetches the cached access token based on incoming assertion
|
||||
* @param clientId - client id
|
||||
* @param request - developer provided CommonOnBehalfOfRequest
|
||||
*/
|
||||
private readAccessTokenFromCacheForOBO;
|
||||
/**
|
||||
* Make a network call to the server requesting credentials
|
||||
* @param request - developer provided CommonOnBehalfOfRequest
|
||||
* @param authority - authority object
|
||||
*/
|
||||
private executeTokenRequest;
|
||||
/**
|
||||
* generate a server request in accepable format
|
||||
* @param request - developer provided CommonOnBehalfOfRequest
|
||||
*/
|
||||
private createTokenRequestBody;
|
||||
}
|
||||
//# sourceMappingURL=OnBehalfOfClient.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/OnBehalfOfClient.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/OnBehalfOfClient.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"OnBehalfOfClient.d.ts","sourceRoot":"","sources":["../../../src/client/OnBehalfOfClient.ts"],"names":[],"mappings":"AAKA,OAAO,EAKH,oBAAoB,EAIpB,UAAU,EAGV,mBAAmB,EACnB,uBAAuB,EAgB1B,MAAM,yBAAyB,CAAC;AAGjC;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,UAAU;IAC5C,OAAO,CAAC,QAAQ,CAAW;IAC3B,OAAO,CAAC,iBAAiB,CAAS;gBAEtB,aAAa,EAAE,mBAAmB;IAI9C;;;OAGG;IACU,YAAY,CACrB,OAAO,EAAE,uBAAuB,GACjC,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IA4BvC;;;;;;;OAOG;YACW,6BAA6B;IAiF3C;;;;OAIG;IACH,OAAO,CAAC,0BAA0B;IAsBlC;;;;OAIG;IACH,OAAO,CAAC,8BAA8B;IA0CtC;;;;OAIG;YACW,mBAAmB;IAwDjC;;;OAGG;YACW,sBAAsB;CAmEvC"}
|
||||
73
node_modules/@azure/msal-node/lib/types/client/PublicClientApplication.d.ts
generated
vendored
Normal file
73
node_modules/@azure/msal-node/lib/types/client/PublicClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,73 @@
|
||||
import { AuthenticationResult, AccountInfo } from "@azure/msal-common/node";
|
||||
import { Configuration } from "../config/Configuration.js";
|
||||
import { ClientApplication } from "./ClientApplication.js";
|
||||
import { IPublicClientApplication } from "./IPublicClientApplication.js";
|
||||
import { DeviceCodeRequest } from "../request/DeviceCodeRequest.js";
|
||||
import { InteractiveRequest } from "../request/InteractiveRequest.js";
|
||||
import { SilentFlowRequest } from "../request/SilentFlowRequest.js";
|
||||
import { SignOutRequest } from "../request/SignOutRequest.js";
|
||||
/**
|
||||
* This class is to be used to acquire tokens for public client applications (desktop, mobile). Public client applications
|
||||
* are not trusted to safely store application secrets, and therefore can only request tokens in the name of an user.
|
||||
* @public
|
||||
*/
|
||||
export declare class PublicClientApplication extends ClientApplication implements IPublicClientApplication {
|
||||
private nativeBrokerPlugin?;
|
||||
private readonly skus;
|
||||
/**
|
||||
* Important attributes in the Configuration object for auth are:
|
||||
* - clientID: the application ID of your application. You can obtain one by registering your application with our Application registration portal.
|
||||
* - authority: the authority URL for your application.
|
||||
*
|
||||
* AAD authorities are of the form https://login.microsoftonline.com/\{Enter_the_Tenant_Info_Here\}.
|
||||
* - If your application supports Accounts in one organizational directory, replace "Enter_the_Tenant_Info_Here" value with the Tenant Id or Tenant name (for example, contoso.microsoft.com).
|
||||
* - If your application supports Accounts in any organizational directory, replace "Enter_the_Tenant_Info_Here" value with organizations.
|
||||
* - If your application supports Accounts in any organizational directory and personal Microsoft accounts, replace "Enter_the_Tenant_Info_Here" value with common.
|
||||
* - To restrict support to Personal Microsoft accounts only, replace "Enter_the_Tenant_Info_Here" value with consumers.
|
||||
*
|
||||
* Azure B2C authorities are of the form https://\{instance\}/\{tenant\}/\{policy\}. Each policy is considered
|
||||
* its own authority. You will have to set the all of the knownAuthorities at the time of the client application
|
||||
* construction.
|
||||
*
|
||||
* ADFS authorities are of the form https://\{instance\}/adfs.
|
||||
*/
|
||||
constructor(configuration: Configuration);
|
||||
/**
|
||||
* Acquires a token from the authority using OAuth2.0 device code flow.
|
||||
* This flow is designed for devices that do not have access to a browser or have input constraints.
|
||||
* The authorization server issues a DeviceCode object with a verification code, an end-user code,
|
||||
* and the end-user verification URI. The DeviceCode object is provided through a callback, and the end-user should be
|
||||
* instructed to use another device to navigate to the verification URI to input credentials.
|
||||
* Since the client cannot receive incoming requests, it polls the authorization server repeatedly
|
||||
* until the end-user completes input of credentials.
|
||||
*/
|
||||
acquireTokenByDeviceCode(request: DeviceCodeRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Acquires a token interactively via the browser by requesting an authorization code then exchanging it for a token.
|
||||
*/
|
||||
acquireTokenInteractive(request: InteractiveRequest): Promise<AuthenticationResult>;
|
||||
/**
|
||||
* Returns a token retrieved either from the cache or by exchanging the refresh token for a fresh access token. If brokering is enabled the token request will be serviced by the broker.
|
||||
* @param request - developer provided SilentFlowRequest
|
||||
* @returns
|
||||
*/
|
||||
acquireTokenSilent(request: SilentFlowRequest): Promise<AuthenticationResult>;
|
||||
/**
|
||||
* Removes cache artifacts associated with the given account
|
||||
* @param request - developer provided SignOutRequest
|
||||
* @returns
|
||||
*/
|
||||
signOut(request: SignOutRequest): Promise<void>;
|
||||
/**
|
||||
* Returns all cached accounts for this application. If brokering is enabled this request will be serviced by the broker.
|
||||
* @returns
|
||||
*/
|
||||
getAllAccounts(): Promise<AccountInfo[]>;
|
||||
/**
|
||||
* Attempts to retrieve the redirectUri from the loopback server. If the loopback server does not start listening for requests within the timeout this will throw.
|
||||
* @param loopbackClient - developer provided custom loopback server implementation
|
||||
* @returns
|
||||
*/
|
||||
private waitForRedirectUri;
|
||||
}
|
||||
//# sourceMappingURL=PublicClientApplication.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/PublicClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/PublicClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"PublicClientApplication.d.ts","sourceRoot":"","sources":["../../../src/client/PublicClientApplication.ts"],"names":[],"mappings":"AAUA,OAAO,EACH,oBAAoB,EAUpB,WAAW,EAKd,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,aAAa,EAAE,MAAM,4BAA4B,CAAC;AAC3D,OAAO,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAC;AAC3D,OAAO,EAAE,wBAAwB,EAAE,MAAM,+BAA+B,CAAC;AACzE,OAAO,EAAE,iBAAiB,EAAE,MAAM,iCAAiC,CAAC;AAGpE,OAAO,EAAE,kBAAkB,EAAE,MAAM,kCAAkC,CAAC;AAGtE,OAAO,EAAE,iBAAiB,EAAE,MAAM,iCAAiC,CAAC;AACpE,OAAO,EAAE,cAAc,EAAE,MAAM,8BAA8B,CAAC;AAK9D;;;;GAIG;AACH,qBAAa,uBACT,SAAQ,iBACR,YAAW,wBAAwB;IAEnC,OAAO,CAAC,kBAAkB,CAAC,CAAsB;IACjD,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAS;IAC9B;;;;;;;;;;;;;;;;OAgBG;gBACS,aAAa,EAAE,aAAa;IAoBxC;;;;;;;;OAQG;IACU,wBAAwB,CACjC,OAAO,EAAE,iBAAiB,GAC3B,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAqCvC;;OAEG;IACG,uBAAuB,CACzB,OAAO,EAAE,kBAAkB,GAC5B,OAAO,CAAC,oBAAoB,CAAC;IAgGhC;;;;OAIG;IACG,kBAAkB,CACpB,OAAO,EAAE,iBAAiB,GAC3B,OAAO,CAAC,oBAAoB,CAAC;IA0BhC;;;;OAIG;IACG,OAAO,CAAC,OAAO,EAAE,cAAc,GAAG,OAAO,CAAC,IAAI,CAAC;IAerD;;;OAGG;IACG,cAAc,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC;IAY9C;;;;OAIG;YACW,kBAAkB;CAsCnC"}
|
||||
27
node_modules/@azure/msal-node/lib/types/client/UsernamePasswordClient.d.ts
generated
vendored
Normal file
27
node_modules/@azure/msal-node/lib/types/client/UsernamePasswordClient.d.ts
generated
vendored
Normal file
@@ -0,0 +1,27 @@
|
||||
import { AuthenticationResult, BaseClient, ClientConfiguration, CommonUsernamePasswordRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Oauth2.0 Password grant client
|
||||
* Note: We are only supporting public clients for password grant and for purely testing purposes
|
||||
* @public
|
||||
*/
|
||||
export declare class UsernamePasswordClient extends BaseClient {
|
||||
constructor(configuration: ClientConfiguration);
|
||||
/**
|
||||
* API to acquire a token by passing the username and password to the service in exchage of credentials
|
||||
* password_grant
|
||||
* @param request - CommonUsernamePasswordRequest
|
||||
*/
|
||||
acquireToken(request: CommonUsernamePasswordRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Executes POST request to token endpoint
|
||||
* @param authority - authority object
|
||||
* @param request - CommonUsernamePasswordRequest provided by the developer
|
||||
*/
|
||||
private executeTokenRequest;
|
||||
/**
|
||||
* Generates a map for all the params to be sent to the service
|
||||
* @param request - CommonUsernamePasswordRequest provided by the developer
|
||||
*/
|
||||
private createTokenRequestBody;
|
||||
}
|
||||
//# sourceMappingURL=UsernamePasswordClient.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/client/UsernamePasswordClient.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/client/UsernamePasswordClient.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"UsernamePasswordClient.d.ts","sourceRoot":"","sources":["../../../src/client/UsernamePasswordClient.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,oBAAoB,EAEpB,UAAU,EAGV,mBAAmB,EACnB,6BAA6B,EAWhC,MAAM,yBAAyB,CAAC;AAEjC;;;;GAIG;AACH,qBAAa,sBAAuB,SAAQ,UAAU;gBACtC,aAAa,EAAE,mBAAmB;IAI9C;;;;OAIG;IACG,YAAY,CACd,OAAO,EAAE,6BAA6B,GACvC,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IA8BvC;;;;OAIG;YACW,mBAAmB;IAmCjC;;;OAGG;YACW,sBAAsB;CAyEvC"}
|
||||
136
node_modules/@azure/msal-node/lib/types/config/Configuration.d.ts
generated
vendored
Normal file
136
node_modules/@azure/msal-node/lib/types/config/Configuration.d.ts
generated
vendored
Normal file
@@ -0,0 +1,136 @@
|
||||
/// <reference types="node" resolution-mode="require"/>
|
||||
/// <reference types="node" resolution-mode="require"/>
|
||||
import { LoggerOptions, INetworkModule, ProtocolMode, ICachePlugin, AzureCloudOptions, ApplicationTelemetry, INativeBrokerPlugin, ClientAssertionCallback } from "@azure/msal-common/node";
|
||||
import http from "http";
|
||||
import https from "https";
|
||||
import { ManagedIdentityId } from "./ManagedIdentityId.js";
|
||||
/**
|
||||
* - clientId - Client id of the application.
|
||||
* - authority - Url of the authority. If no value is set, defaults to https://login.microsoftonline.com/common.
|
||||
* - knownAuthorities - Needed for Azure B2C and ADFS. All authorities that will be used in the client application. Only the host of the authority should be passed in.
|
||||
* - clientSecret - Secret string that the application uses when requesting a token. Only used in confidential client applications. Can be created in the Azure app registration portal.
|
||||
* - clientAssertion - A ClientAssertion object containing an assertion string or a callback function that returns an assertion string that the application uses when requesting a token, as well as the assertion's type (urn:ietf:params:oauth:client-assertion-type:jwt-bearer). Only used in confidential client applications.
|
||||
* - clientCertificate - Certificate that the application uses when requesting a token. Only used in confidential client applications. Requires hex encoded X.509 SHA-1 or SHA-256 thumbprint of the certificate, and the PEM encoded private key (string should contain -----BEGIN PRIVATE KEY----- ... -----END PRIVATE KEY----- )
|
||||
* - protocolMode - Enum that represents the protocol that msal follows. Used for configuring proper endpoints.
|
||||
* - skipAuthorityMetadataCache - A flag to choose whether to use or not use the local metadata cache during authority initialization. Defaults to false.
|
||||
* @public
|
||||
*/
|
||||
export type NodeAuthOptions = {
|
||||
clientId: string;
|
||||
authority?: string;
|
||||
clientSecret?: string;
|
||||
clientAssertion?: string | ClientAssertionCallback;
|
||||
clientCertificate?: {
|
||||
/**
|
||||
* @deprecated Use thumbprintSha2 property instead. Thumbprint needs to be computed with SHA-256 algorithm.
|
||||
* SHA-1 is only needed for backwards compatibility with older versions of ADFS.
|
||||
*/
|
||||
thumbprint?: string;
|
||||
thumbprintSha256?: string;
|
||||
privateKey: string;
|
||||
x5c?: string;
|
||||
};
|
||||
knownAuthorities?: Array<string>;
|
||||
cloudDiscoveryMetadata?: string;
|
||||
authorityMetadata?: string;
|
||||
clientCapabilities?: Array<string>;
|
||||
protocolMode?: ProtocolMode;
|
||||
azureCloudOptions?: AzureCloudOptions;
|
||||
skipAuthorityMetadataCache?: boolean;
|
||||
};
|
||||
/**
|
||||
* Use this to configure the below cache configuration options:
|
||||
*
|
||||
* - cachePlugin - Plugin for reading and writing token cache to disk.
|
||||
* @public
|
||||
*/
|
||||
export type CacheOptions = {
|
||||
cachePlugin?: ICachePlugin;
|
||||
/**
|
||||
* @deprecated claims-based-caching functionality will be removed in the next version of MSALJS
|
||||
*/
|
||||
claimsBasedCachingEnabled?: boolean;
|
||||
};
|
||||
/**
|
||||
* Use this to configure the below broker options:
|
||||
* - nativeBrokerPlugin - Native broker implementation (should be imported from msal-node-extensions)
|
||||
*
|
||||
* Note: These options are only available for PublicClientApplications using the Authorization Code Flow
|
||||
* @public
|
||||
*/
|
||||
export type BrokerOptions = {
|
||||
nativeBrokerPlugin?: INativeBrokerPlugin;
|
||||
};
|
||||
/**
|
||||
* Type for configuring logger and http client options
|
||||
*
|
||||
* - logger - Used to initialize the Logger object; TODO: Expand on logger details or link to the documentation on logger
|
||||
* - networkClient - Http client used for all http get and post calls. Defaults to using MSAL's default http client.
|
||||
* @public
|
||||
*/
|
||||
export type NodeSystemOptions = {
|
||||
loggerOptions?: LoggerOptions;
|
||||
networkClient?: INetworkModule;
|
||||
proxyUrl?: string;
|
||||
customAgentOptions?: http.AgentOptions | https.AgentOptions;
|
||||
disableInternalRetries?: boolean;
|
||||
};
|
||||
/** @public */
|
||||
export type NodeTelemetryOptions = {
|
||||
application?: ApplicationTelemetry;
|
||||
};
|
||||
/**
|
||||
* Use the configuration object to configure MSAL and initialize the client application object
|
||||
*
|
||||
* - auth: this is where you configure auth elements like clientID, authority used for authenticating against the Microsoft Identity Platform
|
||||
* - broker: this is where you configure broker options
|
||||
* - cache: this is where you configure cache location
|
||||
* - system: this is where you can configure the network client, logger
|
||||
* - telemetry: this is where you can configure telemetry options
|
||||
* @public
|
||||
*/
|
||||
export type Configuration = {
|
||||
auth: NodeAuthOptions;
|
||||
broker?: BrokerOptions;
|
||||
cache?: CacheOptions;
|
||||
system?: NodeSystemOptions;
|
||||
telemetry?: NodeTelemetryOptions;
|
||||
};
|
||||
/** @public */
|
||||
export type ManagedIdentityIdParams = {
|
||||
userAssignedClientId?: string;
|
||||
userAssignedResourceId?: string;
|
||||
userAssignedObjectId?: string;
|
||||
};
|
||||
/** @public */
|
||||
export type ManagedIdentityConfiguration = {
|
||||
managedIdentityIdParams?: ManagedIdentityIdParams;
|
||||
system?: NodeSystemOptions;
|
||||
};
|
||||
/** @internal */
|
||||
export type NodeConfiguration = {
|
||||
auth: Required<NodeAuthOptions>;
|
||||
broker: BrokerOptions;
|
||||
cache: CacheOptions;
|
||||
system: Required<NodeSystemOptions>;
|
||||
telemetry: Required<NodeTelemetryOptions>;
|
||||
};
|
||||
/**
|
||||
* Sets the default options when not explicitly configured from app developer
|
||||
*
|
||||
* @param auth - Authentication options
|
||||
* @param cache - Cache options
|
||||
* @param system - System options
|
||||
* @param telemetry - Telemetry options
|
||||
*
|
||||
* @returns Configuration
|
||||
* @internal
|
||||
*/
|
||||
export declare function buildAppConfiguration({ auth, broker, cache, system, telemetry, }: Configuration): NodeConfiguration;
|
||||
/** @internal */
|
||||
export type ManagedIdentityNodeConfiguration = {
|
||||
managedIdentityId: ManagedIdentityId;
|
||||
system: Required<Pick<NodeSystemOptions, "loggerOptions" | "networkClient">>;
|
||||
};
|
||||
export declare function buildManagedIdentityConfiguration({ managedIdentityIdParams, system, }: ManagedIdentityConfiguration): ManagedIdentityNodeConfiguration;
|
||||
//# sourceMappingURL=Configuration.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/config/Configuration.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/config/Configuration.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"Configuration.d.ts","sourceRoot":"","sources":["../../../src/config/Configuration.ts"],"names":[],"mappings":";;AAKA,OAAO,EACH,aAAa,EACb,cAAc,EAEd,YAAY,EACZ,YAAY,EAGZ,iBAAiB,EACjB,oBAAoB,EACpB,mBAAmB,EACnB,uBAAuB,EAC1B,MAAM,yBAAyB,CAAC;AAEjC,OAAO,IAAI,MAAM,MAAM,CAAC;AACxB,OAAO,KAAK,MAAM,OAAO,CAAC;AAC1B,OAAO,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAC;AAU3D;;;;;;;;;;GAUG;AACH,MAAM,MAAM,eAAe,GAAG;IAC1B,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,eAAe,CAAC,EAAE,MAAM,GAAG,uBAAuB,CAAC;IACnD,iBAAiB,CAAC,EAAE;QAChB;;;WAGG;QACH,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,UAAU,EAAE,MAAM,CAAC;QACnB,GAAG,CAAC,EAAE,MAAM,CAAC;KAChB,CAAC;IACF,gBAAgB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACjC,sBAAsB,CAAC,EAAE,MAAM,CAAC;IAChC,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B,kBAAkB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACnC,YAAY,CAAC,EAAE,YAAY,CAAC;IAC5B,iBAAiB,CAAC,EAAE,iBAAiB,CAAC;IACtC,0BAA0B,CAAC,EAAE,OAAO,CAAC;CACxC,CAAC;AAEF;;;;;GAKG;AACH,MAAM,MAAM,YAAY,GAAG;IACvB,WAAW,CAAC,EAAE,YAAY,CAAC;IAC3B;;OAEG;IACH,yBAAyB,CAAC,EAAE,OAAO,CAAC;CACvC,CAAC;AAEF;;;;;;GAMG;AACH,MAAM,MAAM,aAAa,GAAG;IACxB,kBAAkB,CAAC,EAAE,mBAAmB,CAAC;CAC5C,CAAC;AAEF;;;;;;GAMG;AACH,MAAM,MAAM,iBAAiB,GAAG;IAC5B,aAAa,CAAC,EAAE,aAAa,CAAC;IAC9B,aAAa,CAAC,EAAE,cAAc,CAAC;IAC/B,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,kBAAkB,CAAC,EAAE,IAAI,CAAC,YAAY,GAAG,KAAK,CAAC,YAAY,CAAC;IAC5D,sBAAsB,CAAC,EAAE,OAAO,CAAC;CACpC,CAAC;AAEF,cAAc;AACd,MAAM,MAAM,oBAAoB,GAAG;IAC/B,WAAW,CAAC,EAAE,oBAAoB,CAAC;CACtC,CAAC;AAEF;;;;;;;;;GASG;AACH,MAAM,MAAM,aAAa,GAAG;IACxB,IAAI,EAAE,eAAe,CAAC;IACtB,MAAM,CAAC,EAAE,aAAa,CAAC;IACvB,KAAK,CAAC,EAAE,YAAY,CAAC;IACrB,MAAM,CAAC,EAAE,iBAAiB,CAAC;IAC3B,SAAS,CAAC,EAAE,oBAAoB,CAAC;CACpC,CAAC;AAEF,cAAc;AACd,MAAM,MAAM,uBAAuB,GAAG;IAClC,oBAAoB,CAAC,EAAE,MAAM,CAAC;IAC9B,sBAAsB,CAAC,EAAE,MAAM,CAAC;IAChC,oBAAoB,CAAC,EAAE,MAAM,CAAC;CACjC,CAAC;AAEF,cAAc;AACd,MAAM,MAAM,4BAA4B,GAAG;IACvC,uBAAuB,CAAC,EAAE,uBAAuB,CAAC;IAClD,MAAM,CAAC,EAAE,iBAAiB,CAAC;CAC9B,CAAC;AAoDF,gBAAgB;AAChB,MAAM,MAAM,iBAAiB,GAAG;IAC5B,IAAI,EAAE,QAAQ,CAAC,eAAe,CAAC,CAAC;IAChC,MAAM,EAAE,aAAa,CAAC;IACtB,KAAK,EAAE,YAAY,CAAC;IACpB,MAAM,EAAE,QAAQ,CAAC,iBAAiB,CAAC,CAAC;IACpC,SAAS,EAAE,QAAQ,CAAC,oBAAoB,CAAC,CAAC;CAC7C,CAAC;AAEF;;;;;;;;;;GAUG;AACH,wBAAgB,qBAAqB,CAAC,EAClC,IAAI,EACJ,MAAM,EACN,KAAK,EACL,MAAM,EACN,SAAS,GACZ,EAAE,aAAa,GAAG,iBAAiB,CA2BnC;AAED,gBAAgB;AAChB,MAAM,MAAM,gCAAgC,GAAG;IAC3C,iBAAiB,EAAE,iBAAiB,CAAC;IACrC,MAAM,EAAE,QAAQ,CACZ,IAAI,CAAC,iBAAiB,EAAE,eAAe,GAAG,eAAe,CAAC,CAC7D,CAAC;CACL,CAAC;AAEF,wBAAgB,iCAAiC,CAAC,EAC9C,uBAAuB,EACvB,MAAM,GACT,EAAE,4BAA4B,GAAG,gCAAgC,CAwCjE"}
|
||||
12
node_modules/@azure/msal-node/lib/types/config/ManagedIdentityId.d.ts
generated
vendored
Normal file
12
node_modules/@azure/msal-node/lib/types/config/ManagedIdentityId.d.ts
generated
vendored
Normal file
@@ -0,0 +1,12 @@
|
||||
import { ManagedIdentityIdType } from "../utils/Constants.js";
|
||||
import { ManagedIdentityIdParams } from "./Configuration.js";
|
||||
export declare class ManagedIdentityId {
|
||||
private _id;
|
||||
get id(): string;
|
||||
private set id(value);
|
||||
private _idType;
|
||||
get idType(): ManagedIdentityIdType;
|
||||
private set idType(value);
|
||||
constructor(managedIdentityIdParams?: ManagedIdentityIdParams);
|
||||
}
|
||||
//# sourceMappingURL=ManagedIdentityId.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/config/ManagedIdentityId.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/config/ManagedIdentityId.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ManagedIdentityId.d.ts","sourceRoot":"","sources":["../../../src/config/ManagedIdentityId.ts"],"names":[],"mappings":"AASA,OAAO,EAEH,qBAAqB,EACxB,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EAAE,uBAAuB,EAAE,MAAM,oBAAoB,CAAC;AAE7D,qBAAa,iBAAiB;IAC1B,OAAO,CAAC,GAAG,CAAS;IACpB,IAAW,EAAE,IAAI,MAAM,CAEtB;IACD,OAAO,KAAK,EAAE,QAEb;IAED,OAAO,CAAC,OAAO,CAAwB;IACvC,IAAW,MAAM,IAAI,qBAAqB,CAEzC;IACD,OAAO,KAAK,MAAM,QAEjB;gBAEW,uBAAuB,CAAC,EAAE,uBAAuB;CAwChE"}
|
||||
12
node_modules/@azure/msal-node/lib/types/config/ManagedIdentityRequestParameters.d.ts
generated
vendored
Normal file
12
node_modules/@azure/msal-node/lib/types/config/ManagedIdentityRequestParameters.d.ts
generated
vendored
Normal file
@@ -0,0 +1,12 @@
|
||||
import { HttpMethod } from "../utils/Constants.js";
|
||||
export declare class ManagedIdentityRequestParameters {
|
||||
private _baseEndpoint;
|
||||
httpMethod: HttpMethod;
|
||||
headers: Record<string, string>;
|
||||
bodyParameters: Record<string, string>;
|
||||
queryParameters: Record<string, string>;
|
||||
constructor(httpMethod: HttpMethod, endpoint: string);
|
||||
computeUri(): string;
|
||||
computeParametersBodyString(): string;
|
||||
}
|
||||
//# sourceMappingURL=ManagedIdentityRequestParameters.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/config/ManagedIdentityRequestParameters.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/config/ManagedIdentityRequestParameters.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ManagedIdentityRequestParameters.d.ts","sourceRoot":"","sources":["../../../src/config/ManagedIdentityRequestParameters.ts"],"names":[],"mappings":"AAMA,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AAEnD,qBAAa,gCAAgC;IACzC,OAAO,CAAC,aAAa,CAAS;IACvB,UAAU,EAAE,UAAU,CAAC;IACvB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IAChC,cAAc,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IACvC,eAAe,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;gBAEnC,UAAU,EAAE,UAAU,EAAE,QAAQ,EAAE,MAAM;IAQ7C,UAAU,IAAI,MAAM;IAepB,2BAA2B,IAAI,MAAM;CAS/C"}
|
||||
63
node_modules/@azure/msal-node/lib/types/crypto/CryptoProvider.d.ts
generated
vendored
Normal file
63
node_modules/@azure/msal-node/lib/types/crypto/CryptoProvider.d.ts
generated
vendored
Normal file
@@ -0,0 +1,63 @@
|
||||
import { ICrypto, PkceCodes } from "@azure/msal-common/node";
|
||||
/**
|
||||
* This class implements MSAL node's crypto interface, which allows it to perform base64 encoding and decoding, generating cryptographically random GUIDs and
|
||||
* implementing Proof Key for Code Exchange specs for the OAuth Authorization Code Flow using PKCE (rfc here: https://tools.ietf.org/html/rfc7636).
|
||||
* @public
|
||||
*/
|
||||
export declare class CryptoProvider implements ICrypto {
|
||||
private pkceGenerator;
|
||||
private guidGenerator;
|
||||
private hashUtils;
|
||||
constructor();
|
||||
/**
|
||||
* base64 URL safe encoded string
|
||||
*/
|
||||
base64UrlEncode(): string;
|
||||
/**
|
||||
* Stringifies and base64Url encodes input public key
|
||||
* @param inputKid - public key id
|
||||
* @returns Base64Url encoded public key
|
||||
*/
|
||||
encodeKid(): string;
|
||||
/**
|
||||
* Creates a new random GUID - used to populate state and nonce.
|
||||
* @returns string (GUID)
|
||||
*/
|
||||
createNewGuid(): string;
|
||||
/**
|
||||
* Encodes input string to base64.
|
||||
* @param input - string to be encoded
|
||||
*/
|
||||
base64Encode(input: string): string;
|
||||
/**
|
||||
* Decodes input string from base64.
|
||||
* @param input - string to be decoded
|
||||
*/
|
||||
base64Decode(input: string): string;
|
||||
/**
|
||||
* Generates PKCE codes used in Authorization Code Flow.
|
||||
*/
|
||||
generatePkceCodes(): Promise<PkceCodes>;
|
||||
/**
|
||||
* Generates a keypair, stores it and returns a thumbprint - not yet implemented for node
|
||||
*/
|
||||
getPublicKeyThumbprint(): Promise<string>;
|
||||
/**
|
||||
* Removes cryptographic keypair from key store matching the keyId passed in
|
||||
* @param kid - public key id
|
||||
*/
|
||||
removeTokenBindingKey(): Promise<boolean>;
|
||||
/**
|
||||
* Removes all cryptographic keys from Keystore
|
||||
*/
|
||||
clearKeystore(): Promise<boolean>;
|
||||
/**
|
||||
* Signs the given object as a jwt payload with private key retrieved by given kid - currently not implemented for node
|
||||
*/
|
||||
signJwt(): Promise<string>;
|
||||
/**
|
||||
* Returns the SHA-256 hash of an input string
|
||||
*/
|
||||
hashString(plainText: string): Promise<string>;
|
||||
}
|
||||
//# sourceMappingURL=CryptoProvider.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/crypto/CryptoProvider.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/crypto/CryptoProvider.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CryptoProvider.d.ts","sourceRoot":"","sources":["../../../src/crypto/CryptoProvider.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,OAAO,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAM7D;;;;GAIG;AACH,qBAAa,cAAe,YAAW,OAAO;IAC1C,OAAO,CAAC,aAAa,CAAgB;IACrC,OAAO,CAAC,aAAa,CAAgB;IACrC,OAAO,CAAC,SAAS,CAAY;;IAS7B;;OAEG;IACH,eAAe,IAAI,MAAM;IAGzB;;;;OAIG;IACH,SAAS,IAAI,MAAM;IAInB;;;OAGG;IACH,aAAa,IAAI,MAAM;IAIvB;;;OAGG;IACH,YAAY,CAAC,KAAK,EAAE,MAAM,GAAG,MAAM;IAInC;;;OAGG;IACH,YAAY,CAAC,KAAK,EAAE,MAAM,GAAG,MAAM;IAInC;;OAEG;IACH,iBAAiB,IAAI,OAAO,CAAC,SAAS,CAAC;IAIvC;;OAEG;IACH,sBAAsB,IAAI,OAAO,CAAC,MAAM,CAAC;IAIzC;;;OAGG;IACH,qBAAqB,IAAI,OAAO,CAAC,OAAO,CAAC;IAIzC;;OAEG;IACH,aAAa,IAAI,OAAO,CAAC,OAAO,CAAC;IAIjC;;OAEG;IACH,OAAO,IAAI,OAAO,CAAC,MAAM,CAAC;IAI1B;;OAEG;IACG,UAAU,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;CAMvD"}
|
||||
15
node_modules/@azure/msal-node/lib/types/crypto/GuidGenerator.d.ts
generated
vendored
Normal file
15
node_modules/@azure/msal-node/lib/types/crypto/GuidGenerator.d.ts
generated
vendored
Normal file
@@ -0,0 +1,15 @@
|
||||
import { IGuidGenerator } from "@azure/msal-common/node";
|
||||
export declare class GuidGenerator implements IGuidGenerator {
|
||||
/**
|
||||
*
|
||||
* RFC4122: The version 4 UUID is meant for generating UUIDs from truly-random or pseudo-random numbers.
|
||||
* uuidv4 generates guids from cryprtographically-string random
|
||||
*/
|
||||
generateGuid(): string;
|
||||
/**
|
||||
* verifies if a string is GUID
|
||||
* @param guid
|
||||
*/
|
||||
isGuid(guid: string): boolean;
|
||||
}
|
||||
//# sourceMappingURL=GuidGenerator.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/crypto/GuidGenerator.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/crypto/GuidGenerator.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"GuidGenerator.d.ts","sourceRoot":"","sources":["../../../src/crypto/GuidGenerator.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,cAAc,EAAE,MAAM,yBAAyB,CAAC;AAGzD,qBAAa,aAAc,YAAW,cAAc;IAChD;;;;OAIG;IACH,YAAY,IAAI,MAAM;IAItB;;;OAGG;IACH,MAAM,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO;CAKhC"}
|
||||
9
node_modules/@azure/msal-node/lib/types/crypto/HashUtils.d.ts
generated
vendored
Normal file
9
node_modules/@azure/msal-node/lib/types/crypto/HashUtils.d.ts
generated
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
/// <reference types="node" resolution-mode="require"/>
|
||||
export declare class HashUtils {
|
||||
/**
|
||||
* generate 'SHA256' hash
|
||||
* @param buffer
|
||||
*/
|
||||
sha256(buffer: string): Buffer;
|
||||
}
|
||||
//# sourceMappingURL=HashUtils.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/crypto/HashUtils.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/crypto/HashUtils.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"HashUtils.d.ts","sourceRoot":"","sources":["../../../src/crypto/HashUtils.ts"],"names":[],"mappings":";AAQA,qBAAa,SAAS;IAClB;;;OAGG;IACH,MAAM,CAAC,MAAM,EAAE,MAAM,GAAG,MAAM;CAGjC"}
|
||||
23
node_modules/@azure/msal-node/lib/types/crypto/PkceGenerator.d.ts
generated
vendored
Normal file
23
node_modules/@azure/msal-node/lib/types/crypto/PkceGenerator.d.ts
generated
vendored
Normal file
@@ -0,0 +1,23 @@
|
||||
import { PkceCodes } from "@azure/msal-common/node";
|
||||
/**
|
||||
* https://tools.ietf.org/html/rfc7636#page-8
|
||||
*/
|
||||
export declare class PkceGenerator {
|
||||
private hashUtils;
|
||||
constructor();
|
||||
/**
|
||||
* generates the codeVerfier and the challenge from the codeVerfier
|
||||
* reference: https://tools.ietf.org/html/rfc7636#section-4.1 and https://tools.ietf.org/html/rfc7636#section-4.2
|
||||
*/
|
||||
generatePkceCodes(): Promise<PkceCodes>;
|
||||
/**
|
||||
* generates the codeVerfier; reference: https://tools.ietf.org/html/rfc7636#section-4.1
|
||||
*/
|
||||
private generateCodeVerifier;
|
||||
/**
|
||||
* generate the challenge from the codeVerfier; reference: https://tools.ietf.org/html/rfc7636#section-4.2
|
||||
* @param codeVerifier
|
||||
*/
|
||||
private generateCodeChallengeFromVerifier;
|
||||
}
|
||||
//# sourceMappingURL=PkceGenerator.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/crypto/PkceGenerator.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/crypto/PkceGenerator.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"PkceGenerator.d.ts","sourceRoot":"","sources":["../../../src/crypto/PkceGenerator.ts"],"names":[],"mappings":"AAKA,OAAO,EAAa,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAM/D;;GAEG;AACH,qBAAa,aAAa;IACtB,OAAO,CAAC,SAAS,CAAY;;IAK7B;;;OAGG;IACG,iBAAiB,IAAI,OAAO,CAAC,SAAS,CAAC;IAM7C;;OAEG;IACH,OAAO,CAAC,oBAAoB;IAmB5B;;;OAGG;IACH,OAAO,CAAC,iCAAiC;CAM5C"}
|
||||
31
node_modules/@azure/msal-node/lib/types/error/ManagedIdentityError.d.ts
generated
vendored
Normal file
31
node_modules/@azure/msal-node/lib/types/error/ManagedIdentityError.d.ts
generated
vendored
Normal file
@@ -0,0 +1,31 @@
|
||||
import { AuthError } from "@azure/msal-common/node";
|
||||
import * as ManagedIdentityErrorCodes from "./ManagedIdentityErrorCodes.js";
|
||||
export { ManagedIdentityErrorCodes };
|
||||
/**
|
||||
* ManagedIdentityErrorMessage class containing string constants used by error codes and messages.
|
||||
*/
|
||||
export declare const ManagedIdentityErrorMessages: {
|
||||
invalid_file_extension: string;
|
||||
invalid_file_path: string;
|
||||
invalid_managed_identity_id_type: string;
|
||||
invalid_secret: string;
|
||||
platform_not_supported: string;
|
||||
missing_client_id: string;
|
||||
azure_pod_identity_authority_host_url_malformed: string;
|
||||
identity_endpoint_url_malformed: string;
|
||||
imds_endpoint_url_malformed: string;
|
||||
msi_endpoint_url_malformed: string;
|
||||
network_unavailable: string;
|
||||
unable_to_create_azure_arc: string;
|
||||
unable_to_create_cloud_shell: string;
|
||||
unable_to_create_source: string;
|
||||
unable_to_read_secret_file: string;
|
||||
user_assigned_not_available_at_runtime: string;
|
||||
www_authenticate_header_missing: string;
|
||||
www_authenticate_header_unsupported_format: string;
|
||||
};
|
||||
export declare class ManagedIdentityError extends AuthError {
|
||||
constructor(errorCode: string);
|
||||
}
|
||||
export declare function createManagedIdentityError(errorCode: string): ManagedIdentityError;
|
||||
//# sourceMappingURL=ManagedIdentityError.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/error/ManagedIdentityError.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/error/ManagedIdentityError.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ManagedIdentityError.d.ts","sourceRoot":"","sources":["../../../src/error/ManagedIdentityError.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AACpD,OAAO,KAAK,yBAAyB,MAAM,gCAAgC,CAAC;AAE5E,OAAO,EAAE,yBAAyB,EAAE,CAAC;AAErC;;GAEG;AACH,eAAO,MAAM,4BAA4B;;;;;;;;;;;;;;;;;;;CAqCxC,CAAC;AAEF,qBAAa,oBAAqB,SAAQ,SAAS;gBACnC,SAAS,EAAE,MAAM;CAKhC;AAED,wBAAgB,0BAA0B,CACtC,SAAS,EAAE,MAAM,GAClB,oBAAoB,CAEtB"}
|
||||
23
node_modules/@azure/msal-node/lib/types/error/ManagedIdentityErrorCodes.d.ts
generated
vendored
Normal file
23
node_modules/@azure/msal-node/lib/types/error/ManagedIdentityErrorCodes.d.ts
generated
vendored
Normal file
@@ -0,0 +1,23 @@
|
||||
export declare const invalidFileExtension = "invalid_file_extension";
|
||||
export declare const invalidFilePath = "invalid_file_path";
|
||||
export declare const invalidManagedIdentityIdType = "invalid_managed_identity_id_type";
|
||||
export declare const invalidSecret = "invalid_secret";
|
||||
export declare const missingId = "missing_client_id";
|
||||
export declare const networkUnavailable = "network_unavailable";
|
||||
export declare const platformNotSupported = "platform_not_supported";
|
||||
export declare const unableToCreateAzureArc = "unable_to_create_azure_arc";
|
||||
export declare const unableToCreateCloudShell = "unable_to_create_cloud_shell";
|
||||
export declare const unableToCreateSource = "unable_to_create_source";
|
||||
export declare const unableToReadSecretFile = "unable_to_read_secret_file";
|
||||
export declare const urlParseError = "url_parse_error";
|
||||
export declare const userAssignedNotAvailableAtRuntime = "user_assigned_not_available_at_runtime";
|
||||
export declare const wwwAuthenticateHeaderMissing = "www_authenticate_header_missing";
|
||||
export declare const wwwAuthenticateHeaderUnsupportedFormat = "www_authenticate_header_unsupported_format";
|
||||
export declare const MsiEnvironmentVariableUrlMalformedErrorCodes: {
|
||||
readonly AZURE_POD_IDENTITY_AUTHORITY_HOST: "azure_pod_identity_authority_host_url_malformed";
|
||||
readonly IDENTITY_ENDPOINT: "identity_endpoint_url_malformed";
|
||||
readonly IMDS_ENDPOINT: "imds_endpoint_url_malformed";
|
||||
readonly MSI_ENDPOINT: "msi_endpoint_url_malformed";
|
||||
};
|
||||
export type MsiEnvironmentVariableErrorCodes = (typeof MsiEnvironmentVariableUrlMalformedErrorCodes)[keyof typeof MsiEnvironmentVariableUrlMalformedErrorCodes];
|
||||
//# sourceMappingURL=ManagedIdentityErrorCodes.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/error/ManagedIdentityErrorCodes.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/error/ManagedIdentityErrorCodes.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ManagedIdentityErrorCodes.d.ts","sourceRoot":"","sources":["../../../src/error/ManagedIdentityErrorCodes.ts"],"names":[],"mappings":"AAOA,eAAO,MAAM,oBAAoB,2BAA2B,CAAC;AAC7D,eAAO,MAAM,eAAe,sBAAsB,CAAC;AACnD,eAAO,MAAM,4BAA4B,qCAAqC,CAAC;AAC/E,eAAO,MAAM,aAAa,mBAAmB,CAAC;AAC9C,eAAO,MAAM,SAAS,sBAAsB,CAAC;AAC7C,eAAO,MAAM,kBAAkB,wBAAwB,CAAC;AACxD,eAAO,MAAM,oBAAoB,2BAA2B,CAAC;AAC7D,eAAO,MAAM,sBAAsB,+BAA+B,CAAC;AACnE,eAAO,MAAM,wBAAwB,iCAAiC,CAAC;AACvE,eAAO,MAAM,oBAAoB,4BAA4B,CAAC;AAC9D,eAAO,MAAM,sBAAsB,+BAA+B,CAAC;AACnE,eAAO,MAAM,aAAa,oBAAoB,CAAC;AAC/C,eAAO,MAAM,iCAAiC,2CACF,CAAC;AAC7C,eAAO,MAAM,4BAA4B,oCAAoC,CAAC;AAC9E,eAAO,MAAM,sCAAsC,+CACH,CAAC;AAEjD,eAAO,MAAM,4CAA4C;;;;;CAS/C,CAAC;AACX,MAAM,MAAM,gCAAgC,GACxC,CAAC,OAAO,4CAA4C,CAAC,CAAC,MAAM,OAAO,4CAA4C,CAAC,CAAC"}
|
||||
74
node_modules/@azure/msal-node/lib/types/error/NodeAuthError.d.ts
generated
vendored
Normal file
74
node_modules/@azure/msal-node/lib/types/error/NodeAuthError.d.ts
generated
vendored
Normal file
@@ -0,0 +1,74 @@
|
||||
import { AuthError } from "@azure/msal-common/node";
|
||||
/**
|
||||
* NodeAuthErrorMessage class containing string constants used by error codes and messages.
|
||||
*/
|
||||
export declare const NodeAuthErrorMessage: {
|
||||
invalidLoopbackAddressType: {
|
||||
code: string;
|
||||
desc: string;
|
||||
};
|
||||
unableToLoadRedirectUri: {
|
||||
code: string;
|
||||
desc: string;
|
||||
};
|
||||
noAuthCodeInResponse: {
|
||||
code: string;
|
||||
desc: string;
|
||||
};
|
||||
noLoopbackServerExists: {
|
||||
code: string;
|
||||
desc: string;
|
||||
};
|
||||
loopbackServerAlreadyExists: {
|
||||
code: string;
|
||||
desc: string;
|
||||
};
|
||||
loopbackServerTimeout: {
|
||||
code: string;
|
||||
desc: string;
|
||||
};
|
||||
stateNotFoundError: {
|
||||
code: string;
|
||||
desc: string;
|
||||
};
|
||||
thumbprintMissing: {
|
||||
code: string;
|
||||
desc: string;
|
||||
};
|
||||
};
|
||||
export declare class NodeAuthError extends AuthError {
|
||||
constructor(errorCode: string, errorMessage?: string);
|
||||
/**
|
||||
* Creates an error thrown if loopback server address is of type string.
|
||||
*/
|
||||
static createInvalidLoopbackAddressTypeError(): NodeAuthError;
|
||||
/**
|
||||
* Creates an error thrown if the loopback server is unable to get a url.
|
||||
*/
|
||||
static createUnableToLoadRedirectUrlError(): NodeAuthError;
|
||||
/**
|
||||
* Creates an error thrown if the server response does not contain an auth code.
|
||||
*/
|
||||
static createNoAuthCodeInResponseError(): NodeAuthError;
|
||||
/**
|
||||
* Creates an error thrown if the loopback server has not been spun up yet.
|
||||
*/
|
||||
static createNoLoopbackServerExistsError(): NodeAuthError;
|
||||
/**
|
||||
* Creates an error thrown if a loopback server already exists when attempting to create another one.
|
||||
*/
|
||||
static createLoopbackServerAlreadyExistsError(): NodeAuthError;
|
||||
/**
|
||||
* Creates an error thrown if the loopback server times out registering the auth code listener.
|
||||
*/
|
||||
static createLoopbackServerTimeoutError(): NodeAuthError;
|
||||
/**
|
||||
* Creates an error thrown when the state is not present.
|
||||
*/
|
||||
static createStateNotFoundError(): NodeAuthError;
|
||||
/**
|
||||
* Creates an error thrown when client certificate was provided, but neither the SHA-1 or SHA-256 thumbprints were provided
|
||||
*/
|
||||
static createThumbprintMissingError(): NodeAuthError;
|
||||
}
|
||||
//# sourceMappingURL=NodeAuthError.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/error/NodeAuthError.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/error/NodeAuthError.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"NodeAuthError.d.ts","sourceRoot":"","sources":["../../../src/error/NodeAuthError.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAEpD;;GAEG;AACH,eAAO,MAAM,oBAAoB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAiChC,CAAC;AAEF,qBAAa,aAAc,SAAQ,SAAS;gBAC5B,SAAS,EAAE,MAAM,EAAE,YAAY,CAAC,EAAE,MAAM;IAKpD;;OAEG;IACH,MAAM,CAAC,qCAAqC,IAAI,aAAa;IAO7D;;OAEG;IACH,MAAM,CAAC,kCAAkC,IAAI,aAAa;IAO1D;;OAEG;IACH,MAAM,CAAC,+BAA+B,IAAI,aAAa;IAOvD;;OAEG;IACH,MAAM,CAAC,iCAAiC,IAAI,aAAa;IAOzD;;OAEG;IACH,MAAM,CAAC,sCAAsC,IAAI,aAAa;IAO9D;;OAEG;IACH,MAAM,CAAC,gCAAgC,IAAI,aAAa;IAOxD;;OAEG;IACH,MAAM,CAAC,wBAAwB,IAAI,aAAa;IAOhD;;OAEG;IACH,MAAM,CAAC,4BAA4B,IAAI,aAAa;CAMvD"}
|
||||
46
node_modules/@azure/msal-node/lib/types/index.d.ts
generated
vendored
Normal file
46
node_modules/@azure/msal-node/lib/types/index.d.ts
generated
vendored
Normal file
@@ -0,0 +1,46 @@
|
||||
/**
|
||||
* @packageDocumentation
|
||||
* @module @azure/msal-node
|
||||
*/
|
||||
/**
|
||||
* Warning: This set of exports is purely intended to be used by other MSAL libraries, and should be considered potentially unstable. We strongly discourage using them directly, you do so at your own risk.
|
||||
* Breaking changes to these APIs will be shipped under a minor version, instead of a major version.
|
||||
*/
|
||||
import * as internals from "./internals.js";
|
||||
export { internals };
|
||||
export { IPublicClientApplication } from "./client/IPublicClientApplication.js";
|
||||
export { IConfidentialClientApplication } from "./client/IConfidentialClientApplication.js";
|
||||
export { ITokenCache } from "./cache/ITokenCache.js";
|
||||
export { ICacheClient } from "./cache/distributed/ICacheClient.js";
|
||||
export { IPartitionManager } from "./cache/distributed/IPartitionManager.js";
|
||||
export { ILoopbackClient } from "./network/ILoopbackClient.js";
|
||||
export { PublicClientApplication } from "./client/PublicClientApplication.js";
|
||||
export { ConfidentialClientApplication } from "./client/ConfidentialClientApplication.js";
|
||||
export { ClientApplication } from "./client/ClientApplication.js";
|
||||
export { ClientCredentialClient } from "./client/ClientCredentialClient.js";
|
||||
export { DeviceCodeClient } from "./client/DeviceCodeClient.js";
|
||||
export { OnBehalfOfClient } from "./client/OnBehalfOfClient.js";
|
||||
export { ManagedIdentityApplication } from "./client/ManagedIdentityApplication.js";
|
||||
export { UsernamePasswordClient } from "./client/UsernamePasswordClient.js";
|
||||
export { Configuration, ManagedIdentityConfiguration, ManagedIdentityIdParams, NodeAuthOptions, NodeSystemOptions, BrokerOptions, NodeTelemetryOptions, CacheOptions, } from "./config/Configuration.js";
|
||||
export { ClientAssertion } from "./client/ClientAssertion.js";
|
||||
export { TokenCache } from "./cache/TokenCache.js";
|
||||
export { NodeStorage } from "./cache/NodeStorage.js";
|
||||
export { CacheKVStore, JsonCache, InMemoryCache, SerializedAccountEntity, SerializedIdTokenEntity, SerializedAccessTokenEntity, SerializedAppMetadataEntity, SerializedRefreshTokenEntity, } from "./cache/serializer/SerializerTypes.js";
|
||||
export { DistributedCachePlugin } from "./cache/distributed/DistributedCachePlugin.js";
|
||||
export { ManagedIdentitySourceNames } from "./utils/Constants.js";
|
||||
export { CryptoProvider } from "./crypto/CryptoProvider.js";
|
||||
export type { AuthorizationCodeRequest } from "./request/AuthorizationCodeRequest.js";
|
||||
export type { AuthorizationUrlRequest } from "./request/AuthorizationUrlRequest.js";
|
||||
export type { ClientCredentialRequest } from "./request/ClientCredentialRequest.js";
|
||||
export type { DeviceCodeRequest } from "./request/DeviceCodeRequest.js";
|
||||
export type { OnBehalfOfRequest } from "./request/OnBehalfOfRequest.js";
|
||||
export type { UsernamePasswordRequest } from "./request/UsernamePasswordRequest.js";
|
||||
export type { RefreshTokenRequest } from "./request/RefreshTokenRequest.js";
|
||||
export type { SilentFlowRequest } from "./request/SilentFlowRequest.js";
|
||||
export type { InteractiveRequest } from "./request/InteractiveRequest.js";
|
||||
export type { SignOutRequest } from "./request/SignOutRequest.js";
|
||||
export type { ManagedIdentityRequestParams } from "./request/ManagedIdentityRequestParams.js";
|
||||
export { PromptValue, ResponseMode, AuthorizationCodePayload, AuthenticationResult, ServerAuthorizationCodeResponse, IdTokenClaims, AccountInfo, ValidCacheType, AuthError, AuthErrorMessage, AuthErrorCodes, ClientAuthError, ClientAuthErrorCodes, ClientAuthErrorMessage, ClientConfigurationError, ClientConfigurationErrorCodes, ClientConfigurationErrorMessage, InteractionRequiredAuthError, InteractionRequiredAuthErrorCodes, InteractionRequiredAuthErrorMessage, ServerError, INetworkModule, NetworkRequestOptions, NetworkResponse, Logger, LogLevel, ProtocolMode, ICachePlugin, TokenCacheContext, ISerializableTokenCache, AzureCloudInstance, AzureCloudOptions, IAppTokenProvider, AppTokenProviderParameters, AppTokenProviderResult, INativeBrokerPlugin, ClientAssertionCallback, } from "@azure/msal-common/node";
|
||||
export { version } from "./packageMetadata.js";
|
||||
//# sourceMappingURL=index.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/index.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/index.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAKA;;;GAGG;AAEH;;;GAGG;AAEH,OAAO,KAAK,SAAS,MAAM,gBAAgB,CAAC;AAC5C,OAAO,EAAE,SAAS,EAAE,CAAC;AAGrB,OAAO,EAAE,wBAAwB,EAAE,MAAM,sCAAsC,CAAC;AAChF,OAAO,EAAE,8BAA8B,EAAE,MAAM,4CAA4C,CAAC;AAC5F,OAAO,EAAE,WAAW,EAAE,MAAM,wBAAwB,CAAC;AACrD,OAAO,EAAE,YAAY,EAAE,MAAM,qCAAqC,CAAC;AACnE,OAAO,EAAE,iBAAiB,EAAE,MAAM,0CAA0C,CAAC;AAC7E,OAAO,EAAE,eAAe,EAAE,MAAM,8BAA8B,CAAC;AAG/D,OAAO,EAAE,uBAAuB,EAAE,MAAM,qCAAqC,CAAC;AAC9E,OAAO,EAAE,6BAA6B,EAAE,MAAM,2CAA2C,CAAC;AAC1F,OAAO,EAAE,iBAAiB,EAAE,MAAM,+BAA+B,CAAC;AAClE,OAAO,EAAE,sBAAsB,EAAE,MAAM,oCAAoC,CAAC;AAC5E,OAAO,EAAE,gBAAgB,EAAE,MAAM,8BAA8B,CAAC;AAChE,OAAO,EAAE,gBAAgB,EAAE,MAAM,8BAA8B,CAAC;AAChE,OAAO,EAAE,0BAA0B,EAAE,MAAM,wCAAwC,CAAC;AACpF,OAAO,EAAE,sBAAsB,EAAE,MAAM,oCAAoC,CAAC;AAE5E,OAAO,EACH,aAAa,EACb,4BAA4B,EAC5B,uBAAuB,EACvB,eAAe,EACf,iBAAiB,EACjB,aAAa,EACb,oBAAoB,EACpB,YAAY,GACf,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,eAAe,EAAE,MAAM,6BAA6B,CAAC;AAG9D,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,EAAE,WAAW,EAAE,MAAM,wBAAwB,CAAC;AACrD,OAAO,EACH,YAAY,EACZ,SAAS,EACT,aAAa,EACb,uBAAuB,EACvB,uBAAuB,EACvB,2BAA2B,EAC3B,2BAA2B,EAC3B,4BAA4B,GAC/B,MAAM,uCAAuC,CAAC;AAC/C,OAAO,EAAE,sBAAsB,EAAE,MAAM,+CAA+C,CAAC;AAGvF,OAAO,EAAE,0BAA0B,EAAE,MAAM,sBAAsB,CAAC;AAGlE,OAAO,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAG5D,YAAY,EAAE,wBAAwB,EAAE,MAAM,uCAAuC,CAAC;AACtF,YAAY,EAAE,uBAAuB,EAAE,MAAM,sCAAsC,CAAC;AACpF,YAAY,EAAE,uBAAuB,EAAE,MAAM,sCAAsC,CAAC;AACpF,YAAY,EAAE,iBAAiB,EAAE,MAAM,gCAAgC,CAAC;AACxE,YAAY,EAAE,iBAAiB,EAAE,MAAM,gCAAgC,CAAC;AACxE,YAAY,EAAE,uBAAuB,EAAE,MAAM,sCAAsC,CAAC;AACpF,YAAY,EAAE,mBAAmB,EAAE,MAAM,kCAAkC,CAAC;AAC5E,YAAY,EAAE,iBAAiB,EAAE,MAAM,gCAAgC,CAAC;AACxE,YAAY,EAAE,kBAAkB,EAAE,MAAM,iCAAiC,CAAC;AAC1E,YAAY,EAAE,cAAc,EAAE,MAAM,6BAA6B,CAAC;AAClE,YAAY,EAAE,4BAA4B,EAAE,MAAM,2CAA2C,CAAC;AAG9F,OAAO,EAEH,WAAW,EACX,YAAY,EACZ,wBAAwB,EAExB,oBAAoB,EACpB,+BAA+B,EAC/B,aAAa,EAEb,WAAW,EACX,cAAc,EAEd,SAAS,EACT,gBAAgB,EAChB,cAAc,EACd,eAAe,EACf,oBAAoB,EACpB,sBAAsB,EACtB,wBAAwB,EACxB,6BAA6B,EAC7B,+BAA+B,EAC/B,4BAA4B,EAC5B,iCAAiC,EACjC,mCAAmC,EACnC,WAAW,EAEX,cAAc,EACd,qBAAqB,EACrB,eAAe,EAEf,MAAM,EACN,QAAQ,EAER,YAAY,EACZ,YAAY,EACZ,iBAAiB,EACjB,uBAAuB,EAEvB,kBAAkB,EAClB,iBAAiB,EAEjB,iBAAiB,EACjB,0BAA0B,EAC1B,sBAAsB,EACtB,mBAAmB,EACnB,uBAAuB,GAC1B,MAAM,yBAAyB,CAAC;AAEjC,OAAO,EAAE,OAAO,EAAE,MAAM,sBAAsB,CAAC"}
|
||||
7
node_modules/@azure/msal-node/lib/types/internals.d.ts
generated
vendored
Normal file
7
node_modules/@azure/msal-node/lib/types/internals.d.ts
generated
vendored
Normal file
@@ -0,0 +1,7 @@
|
||||
/**
|
||||
* Warning: This set of exports is purely intended to be used by other MSAL libraries, and should be considered potentially unstable. We strongly discourage using them directly, you do so at your own risk.
|
||||
* Breaking changes to these APIs will be shipped under a minor version, instead of a major version.
|
||||
*/
|
||||
export { Serializer } from "./cache/serializer/Serializer.js";
|
||||
export { Deserializer } from "./cache/serializer/Deserializer.js";
|
||||
//# sourceMappingURL=internals.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/internals.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/internals.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"internals.d.ts","sourceRoot":"","sources":["../../src/internals.ts"],"names":[],"mappings":"AAKA;;;GAGG;AAEH,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAC9D,OAAO,EAAE,YAAY,EAAE,MAAM,oCAAoC,CAAC"}
|
||||
26
node_modules/@azure/msal-node/lib/types/network/HttpClient.d.ts
generated
vendored
Normal file
26
node_modules/@azure/msal-node/lib/types/network/HttpClient.d.ts
generated
vendored
Normal file
@@ -0,0 +1,26 @@
|
||||
/// <reference types="node" resolution-mode="require"/>
|
||||
/// <reference types="node" resolution-mode="require"/>
|
||||
import { INetworkModule, NetworkRequestOptions, NetworkResponse } from "@azure/msal-common/node";
|
||||
import http from "http";
|
||||
import https from "https";
|
||||
/**
|
||||
* This class implements the API for network requests.
|
||||
*/
|
||||
export declare class HttpClient implements INetworkModule {
|
||||
private proxyUrl;
|
||||
private customAgentOptions;
|
||||
constructor(proxyUrl?: string, customAgentOptions?: http.AgentOptions | https.AgentOptions);
|
||||
/**
|
||||
* Http Get request
|
||||
* @param url
|
||||
* @param options
|
||||
*/
|
||||
sendGetRequestAsync<T>(url: string, options?: NetworkRequestOptions, timeout?: number): Promise<NetworkResponse<T>>;
|
||||
/**
|
||||
* Http Post request
|
||||
* @param url
|
||||
* @param options
|
||||
*/
|
||||
sendPostRequestAsync<T>(url: string, options?: NetworkRequestOptions): Promise<NetworkResponse<T>>;
|
||||
}
|
||||
//# sourceMappingURL=HttpClient.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/network/HttpClient.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/network/HttpClient.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"HttpClient.d.ts","sourceRoot":"","sources":["../../../src/network/HttpClient.ts"],"names":[],"mappings":";;AAKA,OAAO,EACH,cAAc,EACd,qBAAqB,EACrB,eAAe,EAElB,MAAM,yBAAyB,CAAC;AAGjC,OAAO,IAAI,MAAM,MAAM,CAAC;AACxB,OAAO,KAAK,MAAM,OAAO,CAAC;AAE1B;;GAEG;AACH,qBAAa,UAAW,YAAW,cAAc;IAC7C,OAAO,CAAC,QAAQ,CAAS;IACzB,OAAO,CAAC,kBAAkB,CAAyC;gBAG/D,QAAQ,CAAC,EAAE,MAAM,EACjB,kBAAkB,CAAC,EAAE,IAAI,CAAC,YAAY,GAAG,KAAK,CAAC,YAAY;IAM/D;;;;OAIG;IACG,mBAAmB,CAAC,CAAC,EACvB,GAAG,EAAE,MAAM,EACX,OAAO,CAAC,EAAE,qBAAqB,EAC/B,OAAO,CAAC,EAAE,MAAM,GACjB,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAqB9B;;;;OAIG;IACG,oBAAoB,CAAC,CAAC,EACxB,GAAG,EAAE,MAAM,EACX,OAAO,CAAC,EAAE,qBAAqB,GAChC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;CAkBjC"}
|
||||
12
node_modules/@azure/msal-node/lib/types/network/HttpClientWithRetries.d.ts
generated
vendored
Normal file
12
node_modules/@azure/msal-node/lib/types/network/HttpClientWithRetries.d.ts
generated
vendored
Normal file
@@ -0,0 +1,12 @@
|
||||
import { INetworkModule, NetworkRequestOptions, NetworkResponse } from "@azure/msal-common/node";
|
||||
import { IHttpRetryPolicy } from "../retry/IHttpRetryPolicy.js";
|
||||
export declare class HttpClientWithRetries implements INetworkModule {
|
||||
private httpClientNoRetries;
|
||||
private retryPolicy;
|
||||
constructor(httpClientNoRetries: INetworkModule, retryPolicy: IHttpRetryPolicy);
|
||||
private sendNetworkRequestAsyncHelper;
|
||||
private sendNetworkRequestAsync;
|
||||
sendGetRequestAsync<T>(url: string, options?: NetworkRequestOptions): Promise<NetworkResponse<T>>;
|
||||
sendPostRequestAsync<T>(url: string, options?: NetworkRequestOptions): Promise<NetworkResponse<T>>;
|
||||
}
|
||||
//# sourceMappingURL=HttpClientWithRetries.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/network/HttpClientWithRetries.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/network/HttpClientWithRetries.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"HttpClientWithRetries.d.ts","sourceRoot":"","sources":["../../../src/network/HttpClientWithRetries.ts"],"names":[],"mappings":"AAKA,OAAO,EAEH,cAAc,EACd,qBAAqB,EACrB,eAAe,EAClB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,gBAAgB,EAAE,MAAM,8BAA8B,CAAC;AAGhE,qBAAa,qBAAsB,YAAW,cAAc;IACxD,OAAO,CAAC,mBAAmB,CAAiB;IAC5C,OAAO,CAAC,WAAW,CAAmB;gBAGlC,mBAAmB,EAAE,cAAc,EACnC,WAAW,EAAE,gBAAgB;YAMnB,6BAA6B;YAY7B,uBAAuB;IA4BxB,mBAAmB,CAAC,CAAC,EAC9B,GAAG,EAAE,MAAM,EACX,OAAO,CAAC,EAAE,qBAAqB,GAChC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAIjB,oBAAoB,CAAC,CAAC,EAC/B,GAAG,EAAE,MAAM,EACX,OAAO,CAAC,EAAE,qBAAqB,GAChC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;CAGjC"}
|
||||
11
node_modules/@azure/msal-node/lib/types/network/ILoopbackClient.d.ts
generated
vendored
Normal file
11
node_modules/@azure/msal-node/lib/types/network/ILoopbackClient.d.ts
generated
vendored
Normal file
@@ -0,0 +1,11 @@
|
||||
import { ServerAuthorizationCodeResponse } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Interface for LoopbackClient allowing to replace the default loopback server with a custom implementation.
|
||||
* @public
|
||||
*/
|
||||
export interface ILoopbackClient {
|
||||
listenForAuthCode(successTemplate?: string, errorTemplate?: string): Promise<ServerAuthorizationCodeResponse>;
|
||||
getRedirectUri(): string;
|
||||
closeServer(): void;
|
||||
}
|
||||
//# sourceMappingURL=ILoopbackClient.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/network/ILoopbackClient.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/network/ILoopbackClient.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ILoopbackClient.d.ts","sourceRoot":"","sources":["../../../src/network/ILoopbackClient.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,+BAA+B,EAAE,MAAM,yBAAyB,CAAC;AAE1E;;;GAGG;AACH,MAAM,WAAW,eAAe;IAC5B,iBAAiB,CACb,eAAe,CAAC,EAAE,MAAM,EACxB,aAAa,CAAC,EAAE,MAAM,GACvB,OAAO,CAAC,+BAA+B,CAAC,CAAC;IAC5C,cAAc,IAAI,MAAM,CAAC;IACzB,WAAW,IAAI,IAAI,CAAC;CACvB"}
|
||||
22
node_modules/@azure/msal-node/lib/types/network/LoopbackClient.d.ts
generated
vendored
Normal file
22
node_modules/@azure/msal-node/lib/types/network/LoopbackClient.d.ts
generated
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
import { ServerAuthorizationCodeResponse } from "@azure/msal-common/node";
|
||||
import { ILoopbackClient } from "./ILoopbackClient.js";
|
||||
export declare class LoopbackClient implements ILoopbackClient {
|
||||
private server;
|
||||
/**
|
||||
* Spins up a loopback server which returns the server response when the localhost redirectUri is hit
|
||||
* @param successTemplate
|
||||
* @param errorTemplate
|
||||
* @returns
|
||||
*/
|
||||
listenForAuthCode(successTemplate?: string, errorTemplate?: string): Promise<ServerAuthorizationCodeResponse>;
|
||||
/**
|
||||
* Get the port that the loopback server is running on
|
||||
* @returns
|
||||
*/
|
||||
getRedirectUri(): string;
|
||||
/**
|
||||
* Close the loopback server
|
||||
*/
|
||||
closeServer(): void;
|
||||
}
|
||||
//# sourceMappingURL=LoopbackClient.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/network/LoopbackClient.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/network/LoopbackClient.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"LoopbackClient.d.ts","sourceRoot":"","sources":["../../../src/network/LoopbackClient.ts"],"names":[],"mappings":"AAKA,OAAO,EAEH,+BAA+B,EAGlC,MAAM,yBAAyB,CAAC;AAIjC,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAEvD,qBAAa,cAAe,YAAW,eAAe;IAClD,OAAO,CAAC,MAAM,CAA0B;IAExC;;;;;OAKG;IACG,iBAAiB,CACnB,eAAe,CAAC,EAAE,MAAM,EACxB,aAAa,CAAC,EAAE,MAAM,GACvB,OAAO,CAAC,+BAA+B,CAAC;IAqD3C;;;OAGG;IACH,cAAc,IAAI,MAAM;IAgBxB;;OAEG;IACH,WAAW,IAAI,IAAI;CAetB"}
|
||||
3
node_modules/@azure/msal-node/lib/types/packageMetadata.d.ts
generated
vendored
Normal file
3
node_modules/@azure/msal-node/lib/types/packageMetadata.d.ts
generated
vendored
Normal file
@@ -0,0 +1,3 @@
|
||||
export declare const name = "@azure/msal-node";
|
||||
export declare const version = "2.16.2";
|
||||
//# sourceMappingURL=packageMetadata.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/packageMetadata.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/packageMetadata.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"packageMetadata.d.ts","sourceRoot":"","sources":["../../src/packageMetadata.ts"],"names":[],"mappings":"AACA,eAAO,MAAM,IAAI,qBAAqB,CAAC;AACvC,eAAO,MAAM,OAAO,WAAW,CAAC"}
|
||||
22
node_modules/@azure/msal-node/lib/types/request/AuthorizationCodeRequest.d.ts
generated
vendored
Normal file
22
node_modules/@azure/msal-node/lib/types/request/AuthorizationCodeRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
import { CommonAuthorizationCodeRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Request object passed by user to acquire a token from the server exchanging a valid authorization code (second leg of OAuth2.0 Authorization Code flow)
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - authority: - URL of the authority, the security token service (STS) from which MSAL will acquire tokens. If authority is set on client application object, this will override that value. Overriding the value will cause for authority validation to happen each time. If the same authority will be used for all request, set on the application object instead of the requests.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - redirectUri - The redirect URI of your app, where the authority will redirect to after the user inputs credentials and consents. It must exactly match one of the redirect URIs you registered in the portal.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - code - The authorization_code that the user acquired in the first leg of the flow.
|
||||
* - codeVerifier - The same code_verifier that was used to obtain the authorization_code. Required if PKCE was used in the authorization code grant request.For more information, see the PKCE RFC: https://tools.ietf.org/html/rfc7636
|
||||
* - state - Unique GUID generated by the user that is cached by the user and sent to the server during the first leg of the flow. This string is sent back by the server with the authorization code. The user cached state is then compared with the state received from the server to mitigate the risk of CSRF attacks. See https://datatracker.ietf.org/doc/html/rfc6819#section-3.6.
|
||||
* @public
|
||||
*/
|
||||
export type AuthorizationCodeRequest = Partial<Omit<CommonAuthorizationCodeRequest, "scopes" | "redirectUri" | "code" | "authenticationScheme" | "resourceRequestMethod" | "resourceRequestUri" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
scopes: Array<string>;
|
||||
redirectUri: string;
|
||||
code: string;
|
||||
state?: string;
|
||||
};
|
||||
//# sourceMappingURL=AuthorizationCodeRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/request/AuthorizationCodeRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/request/AuthorizationCodeRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AuthorizationCodeRequest.d.ts","sourceRoot":"","sources":["../../../src/request/AuthorizationCodeRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,8BAA8B,EAAE,MAAM,yBAAyB,CAAC;AAEzE;;;;;;;;;;;;;GAaG;AACH,MAAM,MAAM,wBAAwB,GAAG,OAAO,CAC1C,IAAI,CACA,8BAA8B,EAC5B,QAAQ,GACR,aAAa,GACb,MAAM,GACN,sBAAsB,GACtB,uBAAuB,GACvB,oBAAoB,GACpB,qBAAqB,GACrB,cAAc,CACnB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,WAAW,EAAE,MAAM,CAAC;IACpB,IAAI,EAAE,MAAM,CAAC;IACb,KAAK,CAAC,EAAE,MAAM,CAAC;CAClB,CAAC"}
|
||||
34
node_modules/@azure/msal-node/lib/types/request/AuthorizationUrlRequest.d.ts
generated
vendored
Normal file
34
node_modules/@azure/msal-node/lib/types/request/AuthorizationUrlRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,34 @@
|
||||
import { CommonAuthorizationUrlRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Request object passed by user to retrieve a Code from the server (first leg of authorization code grant flow)
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - redirectUri - The redirect URI where authentication responses can be received by your application. It must exactly match one of the redirect URIs registered in the Azure portal.
|
||||
* - extraScopesToConsent - Scopes for a different resource when the user needs consent upfront.
|
||||
* - responseMode - Specifies the method that should be used to send the authentication result to your app. Can be query, form_post, or fragment. If no value is passed in, it defaults to query.
|
||||
* - codeChallenge - Used to secure authorization code grant via Proof of Key for Code Exchange (PKCE). For more information, see the PKCE RCF:https://tools.ietf.org/html/rfc7636
|
||||
* - codeChallengeMethod - The method used to encode the code verifier for the code challenge parameter. Can be "plain" or "S256". If excluded, code challenge is assumed to be plaintext. For more information, see the PKCE RCF: https://tools.ietf.org/html/rfc7636
|
||||
* - state - A value included in the request that is also returned in the token response. A randomly generated unique value is typically used for preventing cross site request forgery attacks. The state is also used to encode information about the user's state in the app before the authentication request occurred.
|
||||
* - prompt - Indicates the type of user interaction that is required.
|
||||
* login: will force the user to enter their credentials on that request, negating single-sign on
|
||||
* none: will ensure that the user isn't presented with any interactive prompt. if request can't be completed via single-sign on, the endpoint will return an interaction_required error
|
||||
* consent: will the trigger the OAuth consent dialog after the user signs in, asking the user to grant permissions to the app
|
||||
* select_account: will interrupt single sign-=on providing account selection experience listing all the accounts in session or any remembered accounts or an option to choose to use a different account
|
||||
* create: will direct the user to the account creation experience instead of the log in experience
|
||||
* - account - AccountInfo obtained from a getAccount API. Will be used in certain scenarios to generate login_hint if both loginHint and sid params are not provided.
|
||||
* - loginHint - Can be used to pre-fill the username/email address field of the sign-in page for the user, if you know the username/email address ahead of time. Often apps use this parameter during re-authentication, having already extracted the username from a previous sign-in using the preferred_username claim.
|
||||
* - sid - Session ID, unique identifier for the session. Available as an optional claim on ID tokens.
|
||||
* - domainHint - Provides a hint about the tenant or domain that the user should use to sign in. The value of the domain hint is a registered domain for the tenant.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the /authorize call
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - nonce - A value included in the request that is returned in the id token. A randomly generated unique value is typically used to mitigate replay attacks.
|
||||
* @public
|
||||
*/
|
||||
export type AuthorizationUrlRequest = Partial<Omit<CommonAuthorizationUrlRequest, "scopes" | "redirectUri" | "resourceRequestMethod" | "resourceRequestUri" | "authenticationScheme" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
scopes: Array<string>;
|
||||
redirectUri: string;
|
||||
};
|
||||
//# sourceMappingURL=AuthorizationUrlRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/request/AuthorizationUrlRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/request/AuthorizationUrlRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AuthorizationUrlRequest.d.ts","sourceRoot":"","sources":["../../../src/request/AuthorizationUrlRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,6BAA6B,EAAE,MAAM,yBAAyB,CAAC;AAExE;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAM,MAAM,uBAAuB,GAAG,OAAO,CACzC,IAAI,CACA,6BAA6B,EAC3B,QAAQ,GACR,aAAa,GACb,uBAAuB,GACvB,oBAAoB,GACpB,sBAAsB,GACtB,qBAAqB,GACrB,cAAc,CACnB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,WAAW,EAAE,MAAM,CAAC;CACvB,CAAC"}
|
||||
15
node_modules/@azure/msal-node/lib/types/request/ClientCredentialRequest.d.ts
generated
vendored
Normal file
15
node_modules/@azure/msal-node/lib/types/request/ClientCredentialRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,15 @@
|
||||
import { ClientAssertionCallback, CommonClientCredentialRequest } from "@azure/msal-common/node";
|
||||
/**
|
||||
* CommonClientCredentialRequest
|
||||
* - scopes - Array of scopes the application is requesting access to. Typically contains only the .default scope for a single resource. See: https://learn.microsoft.com/azure/active-directory/develop/scopes-oidc#the-default-scope
|
||||
* - authority - URL of the authority, the security token service (STS) from which MSAL will acquire tokens.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - skipCache - Skip token cache lookup and force request to authority to get a a new token. Defaults to false.
|
||||
* - clientAssertion - An assertion string or a callback function that returns an assertion string (both are Base64Url-encoded signed JWTs) used in the Client Credential flow
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* @public
|
||||
*/
|
||||
export type ClientCredentialRequest = Partial<Omit<CommonClientCredentialRequest, "resourceRequestMethod" | "resourceRequestUri" | "requestedClaimsHash" | "clientAssertion" | "storeInCache">> & {
|
||||
clientAssertion?: string | ClientAssertionCallback;
|
||||
};
|
||||
//# sourceMappingURL=ClientCredentialRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/request/ClientCredentialRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/request/ClientCredentialRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ClientCredentialRequest.d.ts","sourceRoot":"","sources":["../../../src/request/ClientCredentialRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,uBAAuB,EACvB,6BAA6B,EAChC,MAAM,yBAAyB,CAAC;AAEjC;;;;;;;;;GASG;AACH,MAAM,MAAM,uBAAuB,GAAG,OAAO,CACzC,IAAI,CACA,6BAA6B,EAC3B,uBAAuB,GACvB,oBAAoB,GACpB,qBAAqB,GACrB,iBAAiB,GACjB,cAAc,CACnB,CACJ,GAAG;IACA,eAAe,CAAC,EAAE,MAAM,GAAG,uBAAuB,CAAC;CACtD,CAAC"}
|
||||
16
node_modules/@azure/msal-node/lib/types/request/DeviceCodeRequest.d.ts
generated
vendored
Normal file
16
node_modules/@azure/msal-node/lib/types/request/DeviceCodeRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,16 @@
|
||||
import { CommonDeviceCodeRequest, DeviceCodeResponse } from "@azure/msal-common/node";
|
||||
/**
|
||||
* Parameters for Oauth2 device code flow.
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authority: - URL of the authority, the security token service (STS) from which MSAL will acquire tokens. If authority is set on client application object, this will override that value. Overriding the value will cause for authority validation to happen each time. If the same authority will be used for all request, set on the application object instead of the requests.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - deviceCodeCallback - Callback containing device code response. Message should be shown to end user. End user can then navigate to the verification_uri, input the user_code, and input credentials.
|
||||
* - cancel - Boolean to cancel polling of device code endpoint. While the user authenticates on a separate device, MSAL polls the the token endpoint of security token service for the interval specified in the device code response (usually 15 minutes). To stop polling and cancel the request, set cancel=true.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the query string
|
||||
* @public
|
||||
*/
|
||||
export type DeviceCodeRequest = Partial<Omit<CommonDeviceCodeRequest, "scopes" | "deviceCodeCallback" | "resourceRequestMethod" | "resourceRequestUri" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
scopes: Array<string>;
|
||||
deviceCodeCallback: (response: DeviceCodeResponse) => void;
|
||||
};
|
||||
//# sourceMappingURL=DeviceCodeRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-node/lib/types/request/DeviceCodeRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/lib/types/request/DeviceCodeRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"DeviceCodeRequest.d.ts","sourceRoot":"","sources":["../../../src/request/DeviceCodeRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,uBAAuB,EACvB,kBAAkB,EACrB,MAAM,yBAAyB,CAAC;AAEjC;;;;;;;;;GASG;AACH,MAAM,MAAM,iBAAiB,GAAG,OAAO,CACnC,IAAI,CACA,uBAAuB,EACrB,QAAQ,GACR,oBAAoB,GACpB,uBAAuB,GACvB,oBAAoB,GACpB,qBAAqB,GACrB,cAAc,CACnB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,kBAAkB,EAAE,CAAC,QAAQ,EAAE,kBAAkB,KAAK,IAAI,CAAC;CAC9D,CAAC"}
|
||||
23
node_modules/@azure/msal-node/lib/types/request/InteractiveRequest.d.ts
generated
vendored
Normal file
23
node_modules/@azure/msal-node/lib/types/request/InteractiveRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,23 @@
|
||||
/// <reference types="node" resolution-mode="require"/>
|
||||
import { CommonAuthorizationUrlRequest } from "@azure/msal-common/node";
|
||||
import { ILoopbackClient } from "../network/ILoopbackClient.js";
|
||||
/**
|
||||
* Request object passed by user to configure acquireTokenInteractive API
|
||||
*
|
||||
* - openBrowser - Function to open a browser instance on user's system.
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - successTemplate: - Template to be displayed on the opened browser instance upon successful token acquisition.
|
||||
* - errorTemplate - Template to be displayed on the opened browser instance upon token acquisition failure.
|
||||
* - windowHandle - Used in native broker flows to properly parent the native broker window
|
||||
* - loopbackClient - Custom implementation for a loopback server to listen for authorization code response.
|
||||
* @public
|
||||
*/
|
||||
export type InteractiveRequest = Partial<Omit<CommonAuthorizationUrlRequest, "scopes" | "redirectUri" | "requestedClaimsHash" | "storeInCache">> & {
|
||||
openBrowser: (url: string) => Promise<void>;
|
||||
scopes?: Array<string>;
|
||||
successTemplate?: string;
|
||||
errorTemplate?: string;
|
||||
windowHandle?: Buffer;
|
||||
loopbackClient?: ILoopbackClient;
|
||||
};
|
||||
//# sourceMappingURL=InteractiveRequest.d.ts.map
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user