From dd9c88e2d8090d420d7e71b8129e6fb0737a028d Mon Sep 17 00:00:00 2001 From: Paul McKeown Date: Tue, 10 Dec 2024 15:13:47 +1300 Subject: [PATCH 1/5] Added new CLI option to support better control over the managed object naming used in imports and exports --- package-lock.json | 84 ++++++++++++++++++++++++++++++++++------- package.json | 7 +++- src/cli/FrodoCommand.ts | 11 ++++++ 3 files changed, 87 insertions(+), 15 deletions(-) diff --git a/package-lock.json b/package-lock.json index 68ca4fdd1..45d77a098 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,18 +1,21 @@ { "name": "@rockcarver/frodo-cli", - "version": "2.1.0", + "version": "2.1.1-alpha", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "@rockcarver/frodo-cli", - "version": "2.1.0", + "version": "2.1.1-alpha", "license": "MIT", + "dependencies": { + "iconv-lite": "^0.4.24" + }, "bin": { "frodo": "dist/launch.cjs" }, "devDependencies": { - "@rockcarver/frodo-lib": "2.2.0", + "@rockcarver/frodo-lib": "file:../frodo-lib", "@types/colors": "^1.2.1", "@types/fs-extra": "^11.0.1", "@types/jest": "^29.2.3", @@ -61,6 +64,69 @@ "node": ">=18.17.0" } }, + "../frodo-lib": { + "name": "@rockcarver/frodo-lib", + "version": "2.3.1-alpha", + "dev": true, + "license": "MIT", + "devDependencies": { + "@jest/globals": "^29.0.1", + "@pollyjs/adapter-node-http": "^6.0.5", + "@pollyjs/core": "^6.0.5", + "@pollyjs/persister-fs": "^6.0.5", + "@types/esprima": "^4.0.3", + "@types/fs-extra": "^11.0.1", + "@types/jest": "^29.5.12", + "@types/lodash": "^4.14.189", + "@types/mock-fs": "^4.13.1", + "@types/node": "^20.5.8", + "@types/node-forge": "^1.3.11", + "@types/properties-reader": "^2.1.1", + "@types/uuid": "^9.0.0", + "@typescript-eslint/eslint-plugin": "^7.12.0", + "@typescript-eslint/parser": "^7.12.0", + "agentkeepalive": "^4.2.1", + "axios": "^1.7.4", + "axios-mock-adapter": "^1.21.2", + "axios-retry": "^4.4.0", + "colors": "^1.4.0", + "copyfiles": "^2.4.1", + "del": "^7.1.0", + "eslint": "^8.57.0", + "eslint-config-prettier": "^9.0.0", + "eslint-plugin-deprecation": "^3.0.0", + "eslint-plugin-import": "^2.28.0", + "eslint-plugin-jest": "^28.5.0", + "eslint-plugin-prettier": "^5.0.0", + "eslint-plugin-simple-import-sort": "^12.1.0", + "esprima": "^4.0.1", + "fs-extra": "^11.1.1", + "https-proxy-agent": "^7.0.4", + "jest": "^29.3.1", + "jest-jasmine2": "^29.7.0", + "loglevel": "^1.9.1", + "map-stream": "^0.0.7", + "mock-fs": "^5.2.0", + "node-forge": "^1.3.1", + "node-jose": "^2.2.0", + "prettier": "^3.2.5", + "properties-reader": "^2.2.0", + "qs": "^6.10.3", + "replaceall": "^0.1.6", + "rimraf": "^5.0.1", + "setup-polly-jest": "^0.11.0", + "slugify": "^1.6.5", + "ts-jest": "^29.1.2", + "tsup": "^8.0.2", + "typedoc": "^0.25.0", + "typedoc-plugin-missing-exports": "^2.0.0", + "typescript": "^5.2.2", + "uuid": "^10.0.0" + }, + "engines": { + "node": ">=18.17.0" + } + }, "node_modules/@ampproject/remapping": { "version": "2.3.0", "resolved": "https://registry.npmjs.org/@ampproject/remapping/-/remapping-2.3.0.tgz", @@ -2108,14 +2174,8 @@ } }, "node_modules/@rockcarver/frodo-lib": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/@rockcarver/frodo-lib/-/frodo-lib-2.2.0.tgz", - "integrity": "sha512-zgKVYi3cFkk+cTQHnZXFzlHWfDeq4SaWCFCZVdj/kYwkdM6wAii4uS3D8QA3feeM0JU1xfb9J/YrHI4FUL9p7A==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=18.17.0" - } + "resolved": "../frodo-lib", + "link": true }, "node_modules/@rollup/rollup-android-arm-eabi": { "version": "4.24.0", @@ -5930,7 +5990,6 @@ "version": "0.4.24", "resolved": "https://registry.npmjs.org/iconv-lite/-/iconv-lite-0.4.24.tgz", "integrity": "sha512-v3MXnZAcvnywkTUEZomIActle7RXXeedOR31wwl7VlyoXO4Qi9arvSenNQWne1TcRwhCL1HwLI21bEqdpj8/rA==", - "dev": true, "license": "MIT", "dependencies": { "safer-buffer": ">= 2.1.2 < 3" @@ -9142,7 +9201,6 @@ "version": "2.1.2", "resolved": "https://registry.npmjs.org/safer-buffer/-/safer-buffer-2.1.2.tgz", "integrity": "sha512-YZo3K82SD7Riyi0E1EQPojLz7kpepnSQI9IyPbHHg1XXXevb5dJI7tpyN2ADxGcQbHG7vcyRHk0cbwqcQriUtg==", - "dev": true, "license": "MIT" }, "node_modules/semver": { diff --git a/package.json b/package.json index c702ab687..dcee781c1 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "@rockcarver/frodo-cli", - "version": "2.1.0", + "version": "2.2.0", "type": "module", "description": "A command line interface to manage ForgeRock Identity Cloud tenants, ForgeOps deployments, and classic deployments.", "keywords": [ @@ -114,7 +114,7 @@ ] }, "devDependencies": { - "@rockcarver/frodo-lib": "2.2.0", + "@rockcarver/frodo-lib": "2.4.0", "@types/colors": "^1.2.1", "@types/fs-extra": "^11.0.1", "@types/jest": "^29.2.3", @@ -158,5 +158,8 @@ "typescript": "^5.2.2", "uuid": "^9.0.0", "yesno": "^0.4.0" + }, + "dependencies": { + "iconv-lite": "^0.4.24" } } diff --git a/src/cli/FrodoCommand.ts b/src/cli/FrodoCommand.ts index 2cd54ec5d..4635a7628 100644 --- a/src/cli/FrodoCommand.ts +++ b/src/cli/FrodoCommand.ts @@ -103,6 +103,14 @@ const noCacheOption = new Option( 'Disable token cache for this operation.' ); +const useRealmPrefixOnManagedObjects = new Option( + '--use-realm-prefix-on-managed-objects', + 'Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user,\ + managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user \ + etc. is retained. \ + This option is ignored when the deployment type is "cloud".' +); + const flushCacheOption = new Option('--flush-cache', 'Flush token cache.'); const defaultArgs = [ @@ -126,6 +134,7 @@ const defaultOpts = [ curlirizeOption, noCacheOption, flushCacheOption, + useRealmPrefixOnManagedObjects, ]; const stateMap = { @@ -166,6 +175,8 @@ const stateMap = { state.setCurlirize(curlirize), [noCacheOption.attributeName()]: (cache: boolean) => state.setUseTokenCache(cache), + [useRealmPrefixOnManagedObjects.attributeName()]: () => + state.setUseRealmPrefixOnManagedObjects(true), [flushCacheOption.attributeName()]: (flush: boolean) => { if (flush) frodo.cache.flush(); }, From 33bf72ca36dc480220ec16fca7b2f806872a641d Mon Sep 17 00:00:00 2001 From: Paul McKeown Date: Tue, 10 Dec 2024 15:16:29 +1300 Subject: [PATCH 2/5] Updated version --- package-lock.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/package-lock.json b/package-lock.json index 45d77a098..650dc92a4 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,12 +1,12 @@ { "name": "@rockcarver/frodo-cli", - "version": "2.1.1-alpha", + "version": "2.2.0", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "@rockcarver/frodo-cli", - "version": "2.1.1-alpha", + "version": "2.2.0", "license": "MIT", "dependencies": { "iconv-lite": "^0.4.24" @@ -15,7 +15,7 @@ "frodo": "dist/launch.cjs" }, "devDependencies": { - "@rockcarver/frodo-lib": "file:../frodo-lib", + "@rockcarver/frodo-lib": "2.4.0", "@types/colors": "^1.2.1", "@types/fs-extra": "^11.0.1", "@types/jest": "^29.2.3", @@ -66,7 +66,7 @@ }, "../frodo-lib": { "name": "@rockcarver/frodo-lib", - "version": "2.3.1-alpha", + "version": "2.4.0", "dev": true, "license": "MIT", "devDependencies": { From f235392a7df72c1d4bd80e7912ba321f4437e577 Mon Sep 17 00:00:00 2001 From: Volker Scheuber Date: Tue, 17 Jun 2025 18:38:47 -0600 Subject: [PATCH 3/5] update from main --- package-lock.json | 4471 ++++++++++++++++++++------------------------- package.json | 35 +- 2 files changed, 2033 insertions(+), 2473 deletions(-) diff --git a/package-lock.json b/package-lock.json index 650dc92a4..fead36eec 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,48 +1,46 @@ { "name": "@rockcarver/frodo-cli", - "version": "2.2.0", + "version": "3.0.5", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "@rockcarver/frodo-cli", - "version": "2.2.0", + "version": "3.0.5", "license": "MIT", "dependencies": { - "iconv-lite": "^0.4.24" + "deep-diff": "^1.0.2", + "tmp": "^0.2.3" }, "bin": { "frodo": "dist/launch.cjs" }, "devDependencies": { - "@rockcarver/frodo-lib": "2.4.0", + "@rockcarver/frodo-lib": "3.3.0", "@types/colors": "^1.2.1", "@types/fs-extra": "^11.0.1", "@types/jest": "^29.2.3", - "@types/node": "^20.5.8", - "@typescript-eslint/eslint-plugin": "^6.5.0", - "@typescript-eslint/parser": "^6.5.0", + "@types/node": "^22.13.10", + "@typescript-eslint/eslint-plugin": "^7.18.0", + "@typescript-eslint/parser": "^7.18.0", "@yao-pkg/pkg": "^5.11.0", - "chokidar": "^3.5.3", + "chokidar": "^4.0.3", "cli-progress": "^3.11.2", "cli-table3": "^0.6.3", "colors": "^1.4.0", "commander": "^11.0.0", "compare-versions": "^6.1.0", "copyfiles": "^2.4.1", - "del": "^6.0.0", + "del": "^8.0.0", "eslint": "^8.28.0", - "eslint-config-prettier": "^9.0.0", - "eslint-plugin-deprecation": "^2.0.0", + "eslint-config-prettier": "^10.1.1", + "eslint-plugin-deprecation": "^3.0.0", "eslint-plugin-import": "^2.28.0", - "eslint-plugin-jest": "^27.1.5", + "eslint-plugin-jest": "^28.11.0", "eslint-plugin-jsx-a11y": "^6.6.1", "eslint-plugin-prettier": "^5.0.0", - "eslint-plugin-simple-import-sort": "^10.0.0", + "eslint-plugin-simple-import-sort": "^12.1.1", "fs-extra": "^11.1.1", - "fuzzy": "^0.1.3", - "inquirer": "^8.2.5", - "inquirer-autocomplete-prompt": "^2.0.0", "jest": "^29.3.1", "loglevel": "^1.9.1", "map-stream": "^0.0.7", @@ -52,81 +50,18 @@ "readline-sync": "^1.4.10", "replaceall": "^0.1.6", "resolve": "^1.22.1", - "rimraf": "^5.0.1", + "rimraf": "^6.0.1", "slugify": "^1.6.5", "ts-jest": "^29.1.4", "tsup": "^8.1.0", "typescript": "^5.2.2", - "uuid": "^9.0.0", + "uuid": "^11.1.0", "yesno": "^0.4.0" }, "engines": { "node": ">=18.17.0" } }, - "../frodo-lib": { - "name": "@rockcarver/frodo-lib", - "version": "2.4.0", - "dev": true, - "license": "MIT", - "devDependencies": { - "@jest/globals": "^29.0.1", - "@pollyjs/adapter-node-http": "^6.0.5", - "@pollyjs/core": "^6.0.5", - "@pollyjs/persister-fs": "^6.0.5", - "@types/esprima": "^4.0.3", - "@types/fs-extra": "^11.0.1", - "@types/jest": "^29.5.12", - "@types/lodash": "^4.14.189", - "@types/mock-fs": "^4.13.1", - "@types/node": "^20.5.8", - "@types/node-forge": "^1.3.11", - "@types/properties-reader": "^2.1.1", - "@types/uuid": "^9.0.0", - "@typescript-eslint/eslint-plugin": "^7.12.0", - "@typescript-eslint/parser": "^7.12.0", - "agentkeepalive": "^4.2.1", - "axios": "^1.7.4", - "axios-mock-adapter": "^1.21.2", - "axios-retry": "^4.4.0", - "colors": "^1.4.0", - "copyfiles": "^2.4.1", - "del": "^7.1.0", - "eslint": "^8.57.0", - "eslint-config-prettier": "^9.0.0", - "eslint-plugin-deprecation": "^3.0.0", - "eslint-plugin-import": "^2.28.0", - "eslint-plugin-jest": "^28.5.0", - "eslint-plugin-prettier": "^5.0.0", - "eslint-plugin-simple-import-sort": "^12.1.0", - "esprima": "^4.0.1", - "fs-extra": "^11.1.1", - "https-proxy-agent": "^7.0.4", - "jest": "^29.3.1", - "jest-jasmine2": "^29.7.0", - "loglevel": "^1.9.1", - "map-stream": "^0.0.7", - "mock-fs": "^5.2.0", - "node-forge": "^1.3.1", - "node-jose": "^2.2.0", - "prettier": "^3.2.5", - "properties-reader": "^2.2.0", - "qs": "^6.10.3", - "replaceall": "^0.1.6", - "rimraf": "^5.0.1", - "setup-polly-jest": "^0.11.0", - "slugify": "^1.6.5", - "ts-jest": "^29.1.2", - "tsup": "^8.0.2", - "typedoc": "^0.25.0", - "typedoc-plugin-missing-exports": "^2.0.0", - "typescript": "^5.2.2", - "uuid": "^10.0.0" - }, - "engines": { - "node": ">=18.17.0" - } - }, "node_modules/@ampproject/remapping": { "version": "2.3.0", "resolved": "https://registry.npmjs.org/@ampproject/remapping/-/remapping-2.3.0.tgz", @@ -142,13 +77,14 @@ } }, "node_modules/@babel/code-frame": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.24.7.tgz", - "integrity": "sha512-BcYH1CVJBO9tvyIZ2jVeXgSIMvGZ2FDRvDdOIVQyuklNKSsx+eppDEBq/g47Ayw+RqNFE+URvOShmf+f/qwAlA==", + "version": "7.26.2", + "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.26.2.tgz", + "integrity": "sha512-RJlIHRueQgwWitWgF8OdFYGZX328Ax5BCemNGlqHfplnRT9ESi8JkFlvaVYbS+UubVY6dpv87Fs2u5M29iNFVQ==", "dev": true, "license": "MIT", "dependencies": { - "@babel/highlight": "^7.24.7", + "@babel/helper-validator-identifier": "^7.25.9", + "js-tokens": "^4.0.0", "picocolors": "^1.0.0" }, "engines": { @@ -156,9 +92,9 @@ } }, "node_modules/@babel/compat-data": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/compat-data/-/compat-data-7.24.7.tgz", - "integrity": "sha512-qJzAIcv03PyaWqxRgO4mSU3lihncDT296vnyuE2O8uA4w3UHWI4S3hgeZd1L8W1Bft40w9JxJ2b412iDUFFRhw==", + "version": "7.26.8", + "resolved": "https://registry.npmjs.org/@babel/compat-data/-/compat-data-7.26.8.tgz", + "integrity": "sha512-oH5UPLMWR3L2wEFLnFJ1TZXqHufiTKAiLfqw5zkhS4dKXLJ10yVztfil/twG8EDTA4F/tvVNw9nOl4ZMslB8rQ==", "dev": true, "license": "MIT", "engines": { @@ -166,22 +102,22 @@ } }, "node_modules/@babel/core": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.24.7.tgz", - "integrity": "sha512-nykK+LEK86ahTkX/3TgauT0ikKoNCfKHEaZYTUVupJdTLzGNvrblu4u6fa7DhZONAltdf8e662t/abY8idrd/g==", + "version": "7.26.9", + "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.26.9.tgz", + "integrity": "sha512-lWBYIrF7qK5+GjY5Uy+/hEgp8OJWOD/rpy74GplYRhEauvbHDeFB8t5hPOZxCZ0Oxf4Cc36tK51/l3ymJysrKw==", "dev": true, "license": "MIT", "dependencies": { "@ampproject/remapping": "^2.2.0", - "@babel/code-frame": "^7.24.7", - "@babel/generator": "^7.24.7", - "@babel/helper-compilation-targets": "^7.24.7", - "@babel/helper-module-transforms": "^7.24.7", - "@babel/helpers": "^7.24.7", - "@babel/parser": "^7.24.7", - "@babel/template": "^7.24.7", - "@babel/traverse": "^7.24.7", - "@babel/types": "^7.24.7", + "@babel/code-frame": "^7.26.2", + "@babel/generator": "^7.26.9", + "@babel/helper-compilation-targets": "^7.26.5", + "@babel/helper-module-transforms": "^7.26.0", + "@babel/helpers": "^7.26.9", + "@babel/parser": "^7.26.9", + "@babel/template": "^7.26.9", + "@babel/traverse": "^7.26.9", + "@babel/types": "^7.26.9", "convert-source-map": "^2.0.0", "debug": "^4.1.0", "gensync": "^1.0.0-beta.2", @@ -196,50 +132,6 @@ "url": "https://opencollective.com/babel" } }, - "node_modules/@babel/core/node_modules/@babel/generator": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.24.7.tgz", - "integrity": "sha512-oipXieGC3i45Y1A41t4tAqpnEZWgB/lC6Ehh6+rOviR5XWpTtMmLN+fGjz9vOiNRt0p6RtO6DtD0pdU3vpqdSA==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/types": "^7.24.7", - "@jridgewell/gen-mapping": "^0.3.5", - "@jridgewell/trace-mapping": "^0.3.25", - "jsesc": "^2.5.1" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/core/node_modules/@babel/parser": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.24.7.tgz", - "integrity": "sha512-9uUYRm6OqQrCqQdG1iCBwBPZgN8ciDBro2nIOFaiRz1/BCxaI7CNvQbDHvsArAC7Tw9Hda/B3U+6ui9u4HWXPw==", - "dev": true, - "license": "MIT", - "bin": { - "parser": "bin/babel-parser.js" - }, - "engines": { - "node": ">=6.0.0" - } - }, - "node_modules/@babel/core/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" - }, - "engines": { - "node": ">=6.9.0" - } - }, "node_modules/@babel/core/node_modules/semver": { "version": "6.3.1", "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.1.tgz", @@ -251,31 +143,32 @@ } }, "node_modules/@babel/generator": { - "version": "7.23.0", - "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.23.0.tgz", - "integrity": "sha512-lN85QRR+5IbYrMWM6Y4pE/noaQtg4pNiqeNGX60eqOfo6gtEj6uw/JagelB8vVztSd7R6M5n1+PQkDbHbBRU4g==", + "version": "7.26.9", + "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.26.9.tgz", + "integrity": "sha512-kEWdzjOAUMW4hAyrzJ0ZaTOu9OmpyDIQicIh0zg0EEcEkYXZb2TjtBhnHi2ViX7PKwZqF4xwqfAm299/QMP3lg==", "dev": true, "license": "MIT", "dependencies": { - "@babel/types": "^7.23.0", - "@jridgewell/gen-mapping": "^0.3.2", - "@jridgewell/trace-mapping": "^0.3.17", - "jsesc": "^2.5.1" + "@babel/parser": "^7.26.9", + "@babel/types": "^7.26.9", + "@jridgewell/gen-mapping": "^0.3.5", + "@jridgewell/trace-mapping": "^0.3.25", + "jsesc": "^3.0.2" }, "engines": { "node": ">=6.9.0" } }, "node_modules/@babel/helper-compilation-targets": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-compilation-targets/-/helper-compilation-targets-7.24.7.tgz", - "integrity": "sha512-ctSdRHBi20qWOfy27RUb4Fhp07KSJ3sXcuSvTrXrc4aG8NSYDo1ici3Vhg9bg69y5bj0Mr1lh0aeEgTvc12rMg==", + "version": "7.26.5", + "resolved": "https://registry.npmjs.org/@babel/helper-compilation-targets/-/helper-compilation-targets-7.26.5.tgz", + "integrity": "sha512-IXuyn5EkouFJscIDuFF5EsiSolseme1s0CZB+QxVugqJLYmKdxI1VfIBOst0SUu4rnk2Z7kqTwmoO1lp3HIfnA==", "dev": true, "license": "MIT", "dependencies": { - "@babel/compat-data": "^7.24.7", - "@babel/helper-validator-option": "^7.24.7", - "browserslist": "^4.22.2", + "@babel/compat-data": "^7.26.5", + "@babel/helper-validator-option": "^7.25.9", + "browserslist": "^4.24.0", "lru-cache": "^5.1.1", "semver": "^6.3.1" }, @@ -293,132 +186,30 @@ "semver": "bin/semver.js" } }, - "node_modules/@babel/helper-environment-visitor": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-environment-visitor/-/helper-environment-visitor-7.24.7.tgz", - "integrity": "sha512-DoiN84+4Gnd0ncbBOM9AZENV4a5ZiL39HYMyZJGZ/AZEykHYdJw0wW3kdcsh9/Kn+BRXHLkkklZ51ecPKmI1CQ==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/types": "^7.24.7" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-environment-visitor/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-function-name": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-function-name/-/helper-function-name-7.24.7.tgz", - "integrity": "sha512-FyoJTsj/PEUWu1/TYRiXTIHc8lbw+TDYkZuoE43opPS5TrI7MyONBE1oNvfguEXAD9yhQRrVBnXdXzSLQl9XnA==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/template": "^7.24.7", - "@babel/types": "^7.24.7" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-function-name/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-hoist-variables": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-hoist-variables/-/helper-hoist-variables-7.24.7.tgz", - "integrity": "sha512-MJJwhkoGy5c4ehfoRyrJ/owKeMl19U54h27YYftT0o2teQ3FJ3nQUf/I3LlJsX4l3qlw7WRXUmiyajvHXoTubQ==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/types": "^7.24.7" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-hoist-variables/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" - }, - "engines": { - "node": ">=6.9.0" - } - }, "node_modules/@babel/helper-module-imports": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.24.7.tgz", - "integrity": "sha512-8AyH3C+74cgCVVXow/myrynrAGv+nTVg5vKu2nZph9x7RcRwzmh0VFallJuFTZ9mx6u4eSdXZfcOzSqTUm0HCA==", + "version": "7.25.9", + "resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.25.9.tgz", + "integrity": "sha512-tnUA4RsrmflIM6W6RFTLFSXITtl0wKjgpnLgXyowocVPrbYrLUXSBXDgTs8BlbmIzIdlBySRQjINYs2BAkiLtw==", "dev": true, "license": "MIT", "dependencies": { - "@babel/traverse": "^7.24.7", - "@babel/types": "^7.24.7" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-module-imports/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" + "@babel/traverse": "^7.25.9", + "@babel/types": "^7.25.9" }, "engines": { "node": ">=6.9.0" } }, "node_modules/@babel/helper-module-transforms": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.24.7.tgz", - "integrity": "sha512-1fuJEwIrp+97rM4RWdO+qrRsZlAeL1lQJoPqtCYWv0NL115XM93hIH4CSRln2w52SqvmY5hqdtauB6QFCDiZNQ==", + "version": "7.26.0", + "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.26.0.tgz", + "integrity": "sha512-xO+xu6B5K2czEnQye6BHA7DolFFmS3LB7stHZFaOLb1pAwO1HWLS8fXA+eh0A2yIvltPVmx3eNNDBJA2SLHXFw==", "dev": true, "license": "MIT", "dependencies": { - "@babel/helper-environment-visitor": "^7.24.7", - "@babel/helper-module-imports": "^7.24.7", - "@babel/helper-simple-access": "^7.24.7", - "@babel/helper-split-export-declaration": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7" + "@babel/helper-module-imports": "^7.25.9", + "@babel/helper-validator-identifier": "^7.25.9", + "@babel/traverse": "^7.25.9" }, "engines": { "node": ">=6.9.0" @@ -428,76 +219,19 @@ } }, "node_modules/@babel/helper-plugin-utils": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.24.7.tgz", - "integrity": "sha512-Rq76wjt7yz9AAc1KnlRKNAi/dMSVWgDRx43FHoJEbcYU6xOWaE2dVPwcdTukJrjxS65GITyfbvEYHvkirZ6uEg==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-simple-access": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-simple-access/-/helper-simple-access-7.24.7.tgz", - "integrity": "sha512-zBAIvbCMh5Ts+b86r/CjU+4XGYIs+R1j951gxI3KmmxBMhCg4oQMsv6ZXQ64XOm/cvzfU1FmoCyt6+owc5QMYg==", + "version": "7.26.5", + "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.26.5.tgz", + "integrity": "sha512-RS+jZcRdZdRFzMyr+wcsaqOmld1/EqTghfaBGQQd/WnRdzdlvSZ//kF7U8VQTxf1ynZ4cjUcYgjVGx13ewNPMg==", "dev": true, "license": "MIT", - "dependencies": { - "@babel/traverse": "^7.24.7", - "@babel/types": "^7.24.7" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-simple-access/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-split-export-declaration": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.24.7.tgz", - "integrity": "sha512-oy5V7pD+UvfkEATUKvIjvIAH/xCzfsFVw7ygW2SI6NClZzquT+mwdTfgfdbUiceh6iQO0CHtCPsyze/MZ2YbAA==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/types": "^7.24.7" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helper-split-export-declaration/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" - }, "engines": { "node": ">=6.9.0" } }, "node_modules/@babel/helper-string-parser": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-string-parser/-/helper-string-parser-7.24.7.tgz", - "integrity": "sha512-7MbVt6xrwFQbunH2DNQsAP5sTGxfqQtErvBIvIMi6EQnbgUOuVYanvREcmFrOPhoXBrTtjhhP+lW+o5UfK+tDg==", + "version": "7.25.9", + "resolved": "https://registry.npmjs.org/@babel/helper-string-parser/-/helper-string-parser-7.25.9.tgz", + "integrity": "sha512-4A/SCr/2KLd5jrtOMFzaKjVtAei3+2r/NChoBNoZ3EyP/+GlhoaEGoWOZUmFmoITP7zOJyHIMm+DYRd8o3PvHA==", "dev": true, "license": "MIT", "engines": { @@ -505,9 +239,9 @@ } }, "node_modules/@babel/helper-validator-identifier": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-validator-identifier/-/helper-validator-identifier-7.24.7.tgz", - "integrity": "sha512-rR+PBcQ1SMQDDyF6X0wxtG8QyLCgUB0eRAGguqRLfkCA87l7yAP7ehq8SNj96OOGTO8OBV70KhuFYcIkHXOg0w==", + "version": "7.25.9", + "resolved": "https://registry.npmjs.org/@babel/helper-validator-identifier/-/helper-validator-identifier-7.25.9.tgz", + "integrity": "sha512-Ed61U6XJc3CVRfkERJWDz4dJwKe7iLmmJsbOGu9wSloNSFttHV0I8g6UAgb7qnK5ly5bGLPd4oXZlxCdANBOWQ==", "dev": true, "license": "MIT", "engines": { @@ -515,9 +249,9 @@ } }, "node_modules/@babel/helper-validator-option": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helper-validator-option/-/helper-validator-option-7.24.7.tgz", - "integrity": "sha512-yy1/KvjhV/ZCL+SM7hBrvnZJ3ZuT9OuZgIJAGpPEToANvc3iM6iDvBnRjtElWibHU6n8/LPR/EjX9EtIEYO3pw==", + "version": "7.25.9", + "resolved": "https://registry.npmjs.org/@babel/helper-validator-option/-/helper-validator-option-7.25.9.tgz", + "integrity": "sha512-e/zv1co8pp55dNdEcCynfj9X7nyUKUXoUEwfXqaZt0omVOmDe9oOTdKStH4GmAw6zxMFs50ZayuMfHDKlO7Tfw==", "dev": true, "license": "MIT", "engines": { @@ -525,134 +259,28 @@ } }, "node_modules/@babel/helpers": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/helpers/-/helpers-7.24.7.tgz", - "integrity": "sha512-NlmJJtvcw72yRJRcnCmGvSi+3jDEg8qFu3z0AFoymmzLx5ERVWyzd9kVXr7Th9/8yIJi2Zc6av4Tqz3wFs8QWg==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/template": "^7.24.7", - "@babel/types": "^7.24.7" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/helpers/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/highlight": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.24.7.tgz", - "integrity": "sha512-EStJpq4OuY8xYfhGVXngigBJRWxftKX9ksiGDnmlY3o7B/V7KIAc9X4oiK87uPJSc/vs5L869bem5fhZa8caZw==", + "version": "7.27.0", + "resolved": "https://registry.npmjs.org/@babel/helpers/-/helpers-7.27.0.tgz", + "integrity": "sha512-U5eyP/CTFPuNE3qk+WZMxFkp/4zUzdceQlfzf7DdGdhp+Fezd7HD+i8Y24ZuTMKX3wQBld449jijbGq6OdGNQg==", "dev": true, "license": "MIT", "dependencies": { - "@babel/helper-validator-identifier": "^7.24.7", - "chalk": "^2.4.2", - "js-tokens": "^4.0.0", - "picocolors": "^1.0.0" + "@babel/template": "^7.27.0", + "@babel/types": "^7.27.0" }, "engines": { "node": ">=6.9.0" } }, - "node_modules/@babel/highlight/node_modules/ansi-styles": { - "version": "3.2.1", - "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-3.2.1.tgz", - "integrity": "sha512-VT0ZI6kZRdTh8YyJw3SMbYm/u+NqfsAxEpWO0Pf9sq8/e94WxxOpPKx9FR1FlyCtOVDNOQ+8ntlqFxiRc+r5qA==", - "dev": true, - "license": "MIT", - "dependencies": { - "color-convert": "^1.9.0" - }, - "engines": { - "node": ">=4" - } - }, - "node_modules/@babel/highlight/node_modules/chalk": { - "version": "2.4.2", - "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", - "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", - "dev": true, - "license": "MIT", - "dependencies": { - "ansi-styles": "^3.2.1", - "escape-string-regexp": "^1.0.5", - "supports-color": "^5.3.0" - }, - "engines": { - "node": ">=4" - } - }, - "node_modules/@babel/highlight/node_modules/color-convert": { - "version": "1.9.3", - "resolved": "https://registry.npmjs.org/color-convert/-/color-convert-1.9.3.tgz", - "integrity": "sha512-QfAUtd+vFdAtFQcC8CCyYt1fYWxSqAiK2cSD6zDB8N3cpsEBAvRxp9zOGg6G/SHHJYAT88/az/IuDGALsNVbGg==", - "dev": true, - "license": "MIT", - "dependencies": { - "color-name": "1.1.3" - } - }, - "node_modules/@babel/highlight/node_modules/color-name": { - "version": "1.1.3", - "resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.3.tgz", - "integrity": "sha512-72fSenhMw2HZMTVHeCA9KCmpEIbzWiQsjN+BHcBbS9vr1mtt+vJjPdksIBNUmKAW8TFUDPJK5SUU3QhE9NEXDw==", - "dev": true, - "license": "MIT" - }, - "node_modules/@babel/highlight/node_modules/escape-string-regexp": { - "version": "1.0.5", - "resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-1.0.5.tgz", - "integrity": "sha512-vbRorB5FUQWvla16U8R/qgaFIya2qGzwDrNmCZuYKrbdSUMG6I1ZCGQRefkRVhuOkIGVne7BQ35DSfo1qvJqFg==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=0.8.0" - } - }, - "node_modules/@babel/highlight/node_modules/has-flag": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-3.0.0.tgz", - "integrity": "sha512-sKJf1+ceQBr4SMkvQnBDNDtf4TXpVhVGateu0t918bl30FnbE2m4vNLX+VWe/dpjlb+HugGYzW7uQXH98HPEYw==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=4" - } - }, - "node_modules/@babel/highlight/node_modules/supports-color": { - "version": "5.5.0", - "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz", - "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==", + "node_modules/@babel/parser": { + "version": "7.27.0", + "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.27.0.tgz", + "integrity": "sha512-iaepho73/2Pz7w2eMS0Q5f83+0RKI7i4xmiYeBmDzfRVbQtTOG7Ts0S4HzJVsTMGI9keU8rNfuZr8DKfSt7Yyg==", "dev": true, "license": "MIT", "dependencies": { - "has-flag": "^3.0.0" + "@babel/types": "^7.27.0" }, - "engines": { - "node": ">=4" - } - }, - "node_modules/@babel/parser": { - "version": "7.23.0", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.23.0.tgz", - "integrity": "sha512-vvPKKdMemU85V9WE/l5wZEmImpCtLqbnTvqDS2U1fJ96KrxoW7KrXhNsNCblQlg8Ck4b85yxdTyelsMUgFUXiw==", - "dev": true, - "license": "MIT", "bin": { "parser": "bin/babel-parser.js" }, @@ -699,6 +327,38 @@ "@babel/core": "^7.0.0-0" } }, + "node_modules/@babel/plugin-syntax-class-static-block": { + "version": "7.14.5", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-class-static-block/-/plugin-syntax-class-static-block-7.14.5.tgz", + "integrity": "sha512-b+YyPmr6ldyNnM6sqYeMWE+bgJcJpO6yS4QD7ymxgH34GBPNDM/THBh8iunyvKIZztiwLH4CJZ0RxTk9emgpjw==", + "dev": true, + "license": "MIT", + "dependencies": { + "@babel/helper-plugin-utils": "^7.14.5" + }, + "engines": { + "node": ">=6.9.0" + }, + "peerDependencies": { + "@babel/core": "^7.0.0-0" + } + }, + "node_modules/@babel/plugin-syntax-import-attributes": { + "version": "7.26.0", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-import-attributes/-/plugin-syntax-import-attributes-7.26.0.tgz", + "integrity": "sha512-e2dttdsJ1ZTpi3B9UYGLw41hifAubg19AtCu/2I/F1QNVclOBr1dYpTdmdyZ84Xiz43BS/tCUkMAZNLv12Pi+A==", + "dev": true, + "license": "MIT", + "dependencies": { + "@babel/helper-plugin-utils": "^7.25.9" + }, + "engines": { + "node": ">=6.9.0" + }, + "peerDependencies": { + "@babel/core": "^7.0.0-0" + } + }, "node_modules/@babel/plugin-syntax-import-meta": { "version": "7.10.4", "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-import-meta/-/plugin-syntax-import-meta-7.10.4.tgz", @@ -726,13 +386,13 @@ } }, "node_modules/@babel/plugin-syntax-jsx": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-jsx/-/plugin-syntax-jsx-7.24.7.tgz", - "integrity": "sha512-6ddciUPe/mpMnOKv/U+RSd2vvVy+Yw/JfBB0ZHYjEZt9NLHmCUylNYlsbqCCS1Bffjlb0fCwC9Vqz+sBz6PsiQ==", + "version": "7.25.9", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-jsx/-/plugin-syntax-jsx-7.25.9.tgz", + "integrity": "sha512-ld6oezHQMZsZfp6pWtbjaNDF2tiiCYYDqQszHt5VV437lewP9aSi2Of99CK0D0XB21k7FLgnLcmQKyKzynfeAA==", "dev": true, "license": "MIT", "dependencies": { - "@babel/helper-plugin-utils": "^7.24.7" + "@babel/helper-plugin-utils": "^7.25.9" }, "engines": { "node": ">=6.9.0" @@ -819,10 +479,10 @@ "@babel/core": "^7.0.0-0" } }, - "node_modules/@babel/plugin-syntax-top-level-await": { + "node_modules/@babel/plugin-syntax-private-property-in-object": { "version": "7.14.5", - "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-top-level-await/-/plugin-syntax-top-level-await-7.14.5.tgz", - "integrity": "sha512-hx++upLv5U1rgYfwe1xBQUhRmU41NEvpUvrp8jkrSCdvGSnM5/qdRMtylJ6PG5OFkBaHkbTAKTnd3/YyESRHFw==", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-private-property-in-object/-/plugin-syntax-private-property-in-object-7.14.5.tgz", + "integrity": "sha512-0wVnp9dxJ72ZUJDV27ZfbSj6iHLoytYZmh3rFcxNnvsJF3ktkzLDZPy/mA17HGsaQT3/DQsWYX1f1QGWkCoVUg==", "dev": true, "license": "MIT", "dependencies": { @@ -832,142 +492,70 @@ "node": ">=6.9.0" }, "peerDependencies": { - "@babel/core": "^7.0.0-0" - } - }, - "node_modules/@babel/plugin-syntax-typescript": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-typescript/-/plugin-syntax-typescript-7.24.7.tgz", - "integrity": "sha512-c/+fVeJBB0FeKsFvwytYiUD+LBvhHjGSI0g446PRGdSVGZLRNArBUno2PETbAly3tpiNAQR5XaZ+JslxkotsbA==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-plugin-utils": "^7.24.7" - }, - "engines": { - "node": ">=6.9.0" - }, - "peerDependencies": { - "@babel/core": "^7.0.0-0" - } - }, - "node_modules/@babel/runtime": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.24.7.tgz", - "integrity": "sha512-UwgBRMjJP+xv857DCngvqXI3Iq6J4v0wXmwc6sapg+zyhbwmQX67LUEFrkK5tbyJ30jGuG3ZvWpBiB9LCy1kWw==", - "dev": true, - "license": "MIT", - "dependencies": { - "regenerator-runtime": "^0.14.0" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/template": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.24.7.tgz", - "integrity": "sha512-jYqfPrU9JTF0PmPy1tLYHW4Mp4KlgxJD9l2nP9fD6yT/ICi554DmrWBAEYpIelzjHf1msDP3PxJIRt/nFNfBig==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/code-frame": "^7.24.7", - "@babel/parser": "^7.24.7", - "@babel/types": "^7.24.7" - }, - "engines": { - "node": ">=6.9.0" - } - }, - "node_modules/@babel/template/node_modules/@babel/parser": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.24.7.tgz", - "integrity": "sha512-9uUYRm6OqQrCqQdG1iCBwBPZgN8ciDBro2nIOFaiRz1/BCxaI7CNvQbDHvsArAC7Tw9Hda/B3U+6ui9u4HWXPw==", - "dev": true, - "license": "MIT", - "bin": { - "parser": "bin/babel-parser.js" - }, - "engines": { - "node": ">=6.0.0" - } - }, - "node_modules/@babel/template/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" - }, - "engines": { - "node": ">=6.9.0" + "@babel/core": "^7.0.0-0" } }, - "node_modules/@babel/traverse": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.24.7.tgz", - "integrity": "sha512-yb65Ed5S/QAcewNPh0nZczy9JdYXkkAbIsEo+P7BE7yO3txAY30Y/oPa3QkQ5It3xVG2kpKMg9MsdxZaO31uKA==", + "node_modules/@babel/plugin-syntax-top-level-await": { + "version": "7.14.5", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-top-level-await/-/plugin-syntax-top-level-await-7.14.5.tgz", + "integrity": "sha512-hx++upLv5U1rgYfwe1xBQUhRmU41NEvpUvrp8jkrSCdvGSnM5/qdRMtylJ6PG5OFkBaHkbTAKTnd3/YyESRHFw==", "dev": true, "license": "MIT", "dependencies": { - "@babel/code-frame": "^7.24.7", - "@babel/generator": "^7.24.7", - "@babel/helper-environment-visitor": "^7.24.7", - "@babel/helper-function-name": "^7.24.7", - "@babel/helper-hoist-variables": "^7.24.7", - "@babel/helper-split-export-declaration": "^7.24.7", - "@babel/parser": "^7.24.7", - "@babel/types": "^7.24.7", - "debug": "^4.3.1", - "globals": "^11.1.0" + "@babel/helper-plugin-utils": "^7.14.5" }, "engines": { "node": ">=6.9.0" + }, + "peerDependencies": { + "@babel/core": "^7.0.0-0" } }, - "node_modules/@babel/traverse/node_modules/@babel/generator": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.24.7.tgz", - "integrity": "sha512-oipXieGC3i45Y1A41t4tAqpnEZWgB/lC6Ehh6+rOviR5XWpTtMmLN+fGjz9vOiNRt0p6RtO6DtD0pdU3vpqdSA==", + "node_modules/@babel/plugin-syntax-typescript": { + "version": "7.25.9", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-typescript/-/plugin-syntax-typescript-7.25.9.tgz", + "integrity": "sha512-hjMgRy5hb8uJJjUcdWunWVcoi9bGpJp8p5Ol1229PoN6aytsLwNMgmdftO23wnCLMfVmTwZDWMPNq/D1SY60JQ==", "dev": true, "license": "MIT", "dependencies": { - "@babel/types": "^7.24.7", - "@jridgewell/gen-mapping": "^0.3.5", - "@jridgewell/trace-mapping": "^0.3.25", - "jsesc": "^2.5.1" + "@babel/helper-plugin-utils": "^7.25.9" }, "engines": { "node": ">=6.9.0" + }, + "peerDependencies": { + "@babel/core": "^7.0.0-0" } }, - "node_modules/@babel/traverse/node_modules/@babel/parser": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.24.7.tgz", - "integrity": "sha512-9uUYRm6OqQrCqQdG1iCBwBPZgN8ciDBro2nIOFaiRz1/BCxaI7CNvQbDHvsArAC7Tw9Hda/B3U+6ui9u4HWXPw==", + "node_modules/@babel/template": { + "version": "7.27.0", + "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.27.0.tgz", + "integrity": "sha512-2ncevenBqXI6qRMukPlXwHKHchC7RyMuu4xv5JBXRfOGVcTy1mXCD12qrp7Jsoxll1EV3+9sE4GugBVRjT2jFA==", "dev": true, "license": "MIT", - "bin": { - "parser": "bin/babel-parser.js" + "dependencies": { + "@babel/code-frame": "^7.26.2", + "@babel/parser": "^7.27.0", + "@babel/types": "^7.27.0" }, "engines": { - "node": ">=6.0.0" + "node": ">=6.9.0" } }, - "node_modules/@babel/traverse/node_modules/@babel/types": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.24.7.tgz", - "integrity": "sha512-XEFXSlxiG5td2EJRe8vOmRbaXVgfcBlszKujvVmWIK/UpywWljQCfzAv3RQCGujWQ1RD4YYWEAqDXfuJiy8f5Q==", + "node_modules/@babel/traverse": { + "version": "7.26.9", + "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.26.9.tgz", + "integrity": "sha512-ZYW7L+pL8ahU5fXmNbPF+iZFHCv5scFak7MZ9bwaRPLUhHh7QQEMjZUg0HevihoqCM5iSYHN61EyCoZvqC+bxg==", "dev": true, "license": "MIT", "dependencies": { - "@babel/helper-string-parser": "^7.24.7", - "@babel/helper-validator-identifier": "^7.24.7", - "to-fast-properties": "^2.0.0" + "@babel/code-frame": "^7.26.2", + "@babel/generator": "^7.26.9", + "@babel/parser": "^7.26.9", + "@babel/template": "^7.26.9", + "@babel/types": "^7.26.9", + "debug": "^4.3.1", + "globals": "^11.1.0" }, "engines": { "node": ">=6.9.0" @@ -984,15 +572,14 @@ } }, "node_modules/@babel/types": { - "version": "7.23.0", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.23.0.tgz", - "integrity": "sha512-0oIyUfKoI3mSqMvsxBdclDwxXKXAUA8v/apZbc+iSyARYou1o8ZGDxbUYyLFoW2arqS2jDGqJuZvv1d/io1axg==", + "version": "7.27.0", + "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.27.0.tgz", + "integrity": "sha512-H45s8fVLYjbhFH62dIJ3WtmJ6RSPt/3DRO0ZcT2SUiYiQyz3BLVb9ADEnLl91m74aQPS3AzzeajZHYOalWe3bg==", "dev": true, "license": "MIT", "dependencies": { - "@babel/helper-string-parser": "^7.22.5", - "@babel/helper-validator-identifier": "^7.22.20", - "to-fast-properties": "^2.0.0" + "@babel/helper-string-parser": "^7.25.9", + "@babel/helper-validator-identifier": "^7.25.9" }, "engines": { "node": ">=6.9.0" @@ -1017,9 +604,9 @@ } }, "node_modules/@esbuild/aix-ppc64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/aix-ppc64/-/aix-ppc64-0.21.5.tgz", - "integrity": "sha512-1SDgH6ZSPTlggy1yI6+Dbkiz8xzpHJEVAlF/AM1tHPLsf5STom9rwtjE4hKAF20FfXXNTFqEYXyJNWh1GiZedQ==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/aix-ppc64/-/aix-ppc64-0.25.1.tgz", + "integrity": "sha512-kfYGy8IdzTGy+z0vFGvExZtxkFlA4zAxgKEahG9KE1ScBjpQnFsNOX8KTU5ojNru5ed5CVoJYXFtoxaq5nFbjQ==", "cpu": [ "ppc64" ], @@ -1030,13 +617,13 @@ "aix" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/android-arm": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/android-arm/-/android-arm-0.21.5.tgz", - "integrity": "sha512-vCPvzSjpPHEi1siZdlvAlsPxXl7WbOVUBBAowWug4rJHb68Ox8KualB+1ocNvT5fjv6wpkX6o/iEpbDrf68zcg==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/android-arm/-/android-arm-0.25.1.tgz", + "integrity": "sha512-dp+MshLYux6j/JjdqVLnMglQlFu+MuVeNrmT5nk6q07wNhCdSnB7QZj+7G8VMUGh1q+vj2Bq8kRsuyA00I/k+Q==", "cpu": [ "arm" ], @@ -1047,13 +634,13 @@ "android" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/android-arm64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/android-arm64/-/android-arm64-0.21.5.tgz", - "integrity": "sha512-c0uX9VAUBQ7dTDCjq+wdyGLowMdtR/GoC2U5IYk/7D1H1JYC0qseD7+11iMP2mRLN9RcCMRcjC4YMclCzGwS/A==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/android-arm64/-/android-arm64-0.25.1.tgz", + "integrity": "sha512-50tM0zCJW5kGqgG7fQ7IHvQOcAn9TKiVRuQ/lN0xR+T2lzEFvAi1ZcS8DiksFcEpf1t/GYOeOfCAgDHFpkiSmA==", "cpu": [ "arm64" ], @@ -1064,13 +651,13 @@ "android" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/android-x64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/android-x64/-/android-x64-0.21.5.tgz", - "integrity": "sha512-D7aPRUUNHRBwHxzxRvp856rjUHRFW1SdQATKXH2hqA0kAZb1hKmi02OpYRacl0TxIGz/ZmXWlbZgjwWYaCakTA==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/android-x64/-/android-x64-0.25.1.tgz", + "integrity": "sha512-GCj6WfUtNldqUzYkN/ITtlhwQqGWu9S45vUXs7EIYf+7rCiiqH9bCloatO9VhxsL0Pji+PF4Lz2XXCES+Q8hDw==", "cpu": [ "x64" ], @@ -1081,13 +668,13 @@ "android" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/darwin-arm64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/darwin-arm64/-/darwin-arm64-0.21.5.tgz", - "integrity": "sha512-DwqXqZyuk5AiWWf3UfLiRDJ5EDd49zg6O9wclZ7kUMv2WRFr4HKjXp/5t8JZ11QbQfUS6/cRCKGwYhtNAY88kQ==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/darwin-arm64/-/darwin-arm64-0.25.1.tgz", + "integrity": "sha512-5hEZKPf+nQjYoSr/elb62U19/l1mZDdqidGfmFutVUjjUZrOazAtwK+Kr+3y0C/oeJfLlxo9fXb1w7L+P7E4FQ==", "cpu": [ "arm64" ], @@ -1098,13 +685,13 @@ "darwin" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/darwin-x64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/darwin-x64/-/darwin-x64-0.21.5.tgz", - "integrity": "sha512-se/JjF8NlmKVG4kNIuyWMV/22ZaerB+qaSi5MdrXtd6R08kvs2qCN4C09miupktDitvh8jRFflwGFBQcxZRjbw==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/darwin-x64/-/darwin-x64-0.25.1.tgz", + "integrity": "sha512-hxVnwL2Dqs3fM1IWq8Iezh0cX7ZGdVhbTfnOy5uURtao5OIVCEyj9xIzemDi7sRvKsuSdtCAhMKarxqtlyVyfA==", "cpu": [ "x64" ], @@ -1115,13 +702,13 @@ "darwin" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/freebsd-arm64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/freebsd-arm64/-/freebsd-arm64-0.21.5.tgz", - "integrity": "sha512-5JcRxxRDUJLX8JXp/wcBCy3pENnCgBR9bN6JsY4OmhfUtIHe3ZW0mawA7+RDAcMLrMIZaf03NlQiX9DGyB8h4g==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/freebsd-arm64/-/freebsd-arm64-0.25.1.tgz", + "integrity": "sha512-1MrCZs0fZa2g8E+FUo2ipw6jw5qqQiH+tERoS5fAfKnRx6NXH31tXBKI3VpmLijLH6yriMZsxJtaXUyFt/8Y4A==", "cpu": [ "arm64" ], @@ -1132,13 +719,13 @@ "freebsd" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/freebsd-x64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/freebsd-x64/-/freebsd-x64-0.21.5.tgz", - "integrity": "sha512-J95kNBj1zkbMXtHVH29bBriQygMXqoVQOQYA+ISs0/2l3T9/kj42ow2mpqerRBxDJnmkUDCaQT/dfNXWX/ZZCQ==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/freebsd-x64/-/freebsd-x64-0.25.1.tgz", + "integrity": "sha512-0IZWLiTyz7nm0xuIs0q1Y3QWJC52R8aSXxe40VUxm6BB1RNmkODtW6LHvWRrGiICulcX7ZvyH6h5fqdLu4gkww==", "cpu": [ "x64" ], @@ -1149,13 +736,13 @@ "freebsd" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/linux-arm": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/linux-arm/-/linux-arm-0.21.5.tgz", - "integrity": "sha512-bPb5AHZtbeNGjCKVZ9UGqGwo8EUu4cLq68E95A53KlxAPRmUyYv2D6F0uUI65XisGOL1hBP5mTronbgo+0bFcA==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/linux-arm/-/linux-arm-0.25.1.tgz", + "integrity": "sha512-NdKOhS4u7JhDKw9G3cY6sWqFcnLITn6SqivVArbzIaf3cemShqfLGHYMx8Xlm/lBit3/5d7kXvriTUGa5YViuQ==", "cpu": [ "arm" ], @@ -1166,13 +753,13 @@ "linux" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/linux-arm64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/linux-arm64/-/linux-arm64-0.21.5.tgz", - "integrity": "sha512-ibKvmyYzKsBeX8d8I7MH/TMfWDXBF3db4qM6sy+7re0YXya+K1cem3on9XgdT2EQGMu4hQyZhan7TeQ8XkGp4Q==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/linux-arm64/-/linux-arm64-0.25.1.tgz", + "integrity": "sha512-jaN3dHi0/DDPelk0nLcXRm1q7DNJpjXy7yWaWvbfkPvI+7XNSc/lDOnCLN7gzsyzgu6qSAmgSvP9oXAhP973uQ==", "cpu": [ "arm64" ], @@ -1183,13 +770,13 @@ "linux" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/linux-ia32": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/linux-ia32/-/linux-ia32-0.21.5.tgz", - "integrity": "sha512-YvjXDqLRqPDl2dvRODYmmhz4rPeVKYvppfGYKSNGdyZkA01046pLWyRKKI3ax8fbJoK5QbxblURkwK/MWY18Tg==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/linux-ia32/-/linux-ia32-0.25.1.tgz", + "integrity": "sha512-OJykPaF4v8JidKNGz8c/q1lBO44sQNUQtq1KktJXdBLn1hPod5rE/Hko5ugKKZd+D2+o1a9MFGUEIUwO2YfgkQ==", "cpu": [ "ia32" ], @@ -1200,13 +787,13 @@ "linux" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/linux-loong64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/linux-loong64/-/linux-loong64-0.21.5.tgz", - "integrity": "sha512-uHf1BmMG8qEvzdrzAqg2SIG/02+4/DHB6a9Kbya0XDvwDEKCoC8ZRWI5JJvNdUjtciBGFQ5PuBlpEOXQj+JQSg==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/linux-loong64/-/linux-loong64-0.25.1.tgz", + "integrity": "sha512-nGfornQj4dzcq5Vp835oM/o21UMlXzn79KobKlcs3Wz9smwiifknLy4xDCLUU0BWp7b/houtdrgUz7nOGnfIYg==", "cpu": [ "loong64" ], @@ -1217,13 +804,13 @@ "linux" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/linux-mips64el": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/linux-mips64el/-/linux-mips64el-0.21.5.tgz", - "integrity": "sha512-IajOmO+KJK23bj52dFSNCMsz1QP1DqM6cwLUv3W1QwyxkyIWecfafnI555fvSGqEKwjMXVLokcV5ygHW5b3Jbg==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/linux-mips64el/-/linux-mips64el-0.25.1.tgz", + "integrity": "sha512-1osBbPEFYwIE5IVB/0g2X6i1qInZa1aIoj1TdL4AaAb55xIIgbg8Doq6a5BzYWgr+tEcDzYH67XVnTmUzL+nXg==", "cpu": [ "mips64el" ], @@ -1234,13 +821,13 @@ "linux" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/linux-ppc64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/linux-ppc64/-/linux-ppc64-0.21.5.tgz", - "integrity": "sha512-1hHV/Z4OEfMwpLO8rp7CvlhBDnjsC3CttJXIhBi+5Aj5r+MBvy4egg7wCbe//hSsT+RvDAG7s81tAvpL2XAE4w==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/linux-ppc64/-/linux-ppc64-0.25.1.tgz", + "integrity": "sha512-/6VBJOwUf3TdTvJZ82qF3tbLuWsscd7/1w+D9LH0W/SqUgM5/JJD0lrJ1fVIfZsqB6RFmLCe0Xz3fmZc3WtyVg==", "cpu": [ "ppc64" ], @@ -1251,13 +838,13 @@ "linux" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/linux-riscv64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/linux-riscv64/-/linux-riscv64-0.21.5.tgz", - "integrity": "sha512-2HdXDMd9GMgTGrPWnJzP2ALSokE/0O5HhTUvWIbD3YdjME8JwvSCnNGBnTThKGEB91OZhzrJ4qIIxk/SBmyDDA==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/linux-riscv64/-/linux-riscv64-0.25.1.tgz", + "integrity": "sha512-nSut/Mx5gnilhcq2yIMLMe3Wl4FK5wx/o0QuuCLMtmJn+WeWYoEGDN1ipcN72g1WHsnIbxGXd4i/MF0gTcuAjQ==", "cpu": [ "riscv64" ], @@ -1268,13 +855,13 @@ "linux" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/linux-s390x": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/linux-s390x/-/linux-s390x-0.21.5.tgz", - "integrity": "sha512-zus5sxzqBJD3eXxwvjN1yQkRepANgxE9lgOW2qLnmr8ikMTphkjgXu1HR01K4FJg8h1kEEDAqDcZQtbrRnB41A==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/linux-s390x/-/linux-s390x-0.25.1.tgz", + "integrity": "sha512-cEECeLlJNfT8kZHqLarDBQso9a27o2Zd2AQ8USAEoGtejOrCYHNtKP8XQhMDJMtthdF4GBmjR2au3x1udADQQQ==", "cpu": [ "s390x" ], @@ -1285,13 +872,13 @@ "linux" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/linux-x64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/linux-x64/-/linux-x64-0.21.5.tgz", - "integrity": "sha512-1rYdTpyv03iycF1+BhzrzQJCdOuAOtaqHTWJZCWvijKD2N5Xu0TtVC8/+1faWqcP9iBCWOmjmhoH94dH82BxPQ==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/linux-x64/-/linux-x64-0.25.1.tgz", + "integrity": "sha512-xbfUhu/gnvSEg+EGovRc+kjBAkrvtk38RlerAzQxvMzlB4fXpCFCeUAYzJvrnhFtdeyVCDANSjJvOvGYoeKzFA==", "cpu": [ "x64" ], @@ -1302,13 +889,30 @@ "linux" ], "engines": { - "node": ">=12" + "node": ">=18" + } + }, + "node_modules/@esbuild/netbsd-arm64": { + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/netbsd-arm64/-/netbsd-arm64-0.25.1.tgz", + "integrity": "sha512-O96poM2XGhLtpTh+s4+nP7YCCAfb4tJNRVZHfIE7dgmax+yMP2WgMd2OecBuaATHKTHsLWHQeuaxMRnCsH8+5g==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "netbsd" + ], + "engines": { + "node": ">=18" } }, "node_modules/@esbuild/netbsd-x64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/netbsd-x64/-/netbsd-x64-0.21.5.tgz", - "integrity": "sha512-Woi2MXzXjMULccIwMnLciyZH4nCIMpWQAs049KEeMvOcNADVxo0UBIQPfSmxB3CWKedngg7sWZdLvLczpe0tLg==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/netbsd-x64/-/netbsd-x64-0.25.1.tgz", + "integrity": "sha512-X53z6uXip6KFXBQ+Krbx25XHV/NCbzryM6ehOAeAil7X7oa4XIq+394PWGnwaSQ2WRA0KI6PUO6hTO5zeF5ijA==", "cpu": [ "x64" ], @@ -1319,13 +923,30 @@ "netbsd" ], "engines": { - "node": ">=12" + "node": ">=18" + } + }, + "node_modules/@esbuild/openbsd-arm64": { + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/openbsd-arm64/-/openbsd-arm64-0.25.1.tgz", + "integrity": "sha512-Na9T3szbXezdzM/Kfs3GcRQNjHzM6GzFBeU1/6IV/npKP5ORtp9zbQjvkDJ47s6BCgaAZnnnu/cY1x342+MvZg==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "openbsd" + ], + "engines": { + "node": ">=18" } }, "node_modules/@esbuild/openbsd-x64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/openbsd-x64/-/openbsd-x64-0.21.5.tgz", - "integrity": "sha512-HLNNw99xsvx12lFBUwoT8EVCsSvRNDVxNpjZ7bPn947b8gJPzeHWyNVhFsaerc0n3TsbOINvRP2byTZ5LKezow==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/openbsd-x64/-/openbsd-x64-0.25.1.tgz", + "integrity": "sha512-T3H78X2h1tszfRSf+txbt5aOp/e7TAz3ptVKu9Oyir3IAOFPGV6O9c2naym5TOriy1l0nNf6a4X5UXRZSGX/dw==", "cpu": [ "x64" ], @@ -1336,13 +957,13 @@ "openbsd" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/sunos-x64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/sunos-x64/-/sunos-x64-0.21.5.tgz", - "integrity": "sha512-6+gjmFpfy0BHU5Tpptkuh8+uw3mnrvgs+dSPQXQOv3ekbordwnzTVEb4qnIvQcYXq6gzkyTnoZ9dZG+D4garKg==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/sunos-x64/-/sunos-x64-0.25.1.tgz", + "integrity": "sha512-2H3RUvcmULO7dIE5EWJH8eubZAI4xw54H1ilJnRNZdeo8dTADEZ21w6J22XBkXqGJbe0+wnNJtw3UXRoLJnFEg==", "cpu": [ "x64" ], @@ -1353,13 +974,13 @@ "sunos" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/win32-arm64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/win32-arm64/-/win32-arm64-0.21.5.tgz", - "integrity": "sha512-Z0gOTd75VvXqyq7nsl93zwahcTROgqvuAcYDUr+vOv8uHhNSKROyU961kgtCD1e95IqPKSQKH7tBTslnS3tA8A==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/win32-arm64/-/win32-arm64-0.25.1.tgz", + "integrity": "sha512-GE7XvrdOzrb+yVKB9KsRMq+7a2U/K5Cf/8grVFRAGJmfADr/e/ODQ134RK2/eeHqYV5eQRFxb1hY7Nr15fv1NQ==", "cpu": [ "arm64" ], @@ -1370,13 +991,13 @@ "win32" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/win32-ia32": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/win32-ia32/-/win32-ia32-0.21.5.tgz", - "integrity": "sha512-SWXFF1CL2RVNMaVs+BBClwtfZSvDgtL//G/smwAc5oVK/UPu2Gu9tIaRgFmYFFKrmg3SyAjSrElf0TiJ1v8fYA==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/win32-ia32/-/win32-ia32-0.25.1.tgz", + "integrity": "sha512-uOxSJCIcavSiT6UnBhBzE8wy3n0hOkJsBOzy7HDAuTDE++1DJMRRVCPGisULScHL+a/ZwdXPpXD3IyFKjA7K8A==", "cpu": [ "ia32" ], @@ -1387,13 +1008,13 @@ "win32" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@esbuild/win32-x64": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/@esbuild/win32-x64/-/win32-x64-0.21.5.tgz", - "integrity": "sha512-tQd/1efJuzPC6rCFwEvLtci/xNFcTZknmXs98FYDfGE4wP9ClFV98nyKrzJKVPMhdDnjzLhdUyMX4PsQAPjwIw==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/@esbuild/win32-x64/-/win32-x64-0.25.1.tgz", + "integrity": "sha512-Y1EQdcfwMSeQN/ujR5VayLOJ1BHaK+ssyk0AEzPjC+t1lITgsnccPqFjb6V+LsTp/9Iov4ysfjxLaGJ9RPtkVg==", "cpu": [ "x64" ], @@ -1404,29 +1025,32 @@ "win32" ], "engines": { - "node": ">=12" + "node": ">=18" } }, "node_modules/@eslint-community/eslint-utils": { - "version": "4.4.0", - "resolved": "https://registry.npmjs.org/@eslint-community/eslint-utils/-/eslint-utils-4.4.0.tgz", - "integrity": "sha512-1/sA4dwrzBAyeUoQ6oxahHKmrZvsnLCg4RfxW3ZFGGmQkSNQPFNLV9CUEFQP1x9EYXHTo5p6xdhZM1Ne9p/AfA==", + "version": "4.4.1", + "resolved": "https://registry.npmjs.org/@eslint-community/eslint-utils/-/eslint-utils-4.4.1.tgz", + "integrity": "sha512-s3O3waFUrMV8P/XaF/+ZTp1X9XBZW1a4B97ZnjQF2KYWaFD2A8KyFBsrsfSjEmjn3RGWAIuvlneuZm3CUK3jbA==", "dev": true, "license": "MIT", "dependencies": { - "eslint-visitor-keys": "^3.3.0" + "eslint-visitor-keys": "^3.4.3" }, "engines": { "node": "^12.22.0 || ^14.17.0 || >=16.0.0" }, + "funding": { + "url": "https://opencollective.com/eslint" + }, "peerDependencies": { "eslint": "^6.0.0 || ^7.0.0 || >=8.0.0" } }, "node_modules/@eslint-community/regexpp": { - "version": "4.10.1", - "resolved": "https://registry.npmjs.org/@eslint-community/regexpp/-/regexpp-4.10.1.tgz", - "integrity": "sha512-Zm2NGpWELsQAD1xsJzGQpYfvICSsFkEpU0jxBjfdC6uNEWXcHnfs9hScFWtXVDVl+rBQJGrl4g1vcKIejpH9dA==", + "version": "4.12.1", + "resolved": "https://registry.npmjs.org/@eslint-community/regexpp/-/regexpp-4.12.1.tgz", + "integrity": "sha512-CCZCDJuduB9OUkFkY2IgppNZMi2lBQgD2qzwXkEia16cge2pijY/aXi96CJMquDMn3nJdlPV1A5KrJEXwfLNzQ==", "dev": true, "license": "MIT", "engines": { @@ -1458,9 +1082,9 @@ } }, "node_modules/@eslint/eslintrc/node_modules/brace-expansion": { - "version": "1.1.11", - "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz", - "integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==", + "version": "1.1.12", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.12.tgz", + "integrity": "sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==", "dev": true, "license": "MIT", "dependencies": { @@ -1482,9 +1106,9 @@ } }, "node_modules/@eslint/js": { - "version": "8.57.0", - "resolved": "https://registry.npmjs.org/@eslint/js/-/js-8.57.0.tgz", - "integrity": "sha512-Ys+3g2TaW7gADOJzPt83SJtCDhMjndcDMFVQ/Tj9iA1BfJzFKD9mAUXT3OenpuPHbI6P/myECxRJrofUsDx/5g==", + "version": "8.57.1", + "resolved": "https://registry.npmjs.org/@eslint/js/-/js-8.57.1.tgz", + "integrity": "sha512-d9zaMRSTIKDLhctzH12MtXvJKSSUhaHcjV+2Z+GK+EEY7XKpP5yR4x+N3TAcHTcu963nIr+TMcCb4DBCYX1z6Q==", "dev": true, "license": "MIT", "engines": { @@ -1492,14 +1116,14 @@ } }, "node_modules/@humanwhocodes/config-array": { - "version": "0.11.14", - "resolved": "https://registry.npmjs.org/@humanwhocodes/config-array/-/config-array-0.11.14.tgz", - "integrity": "sha512-3T8LkOmg45BV5FICb15QQMsyUSWrQ8AygVfC7ZG32zOalnqrilm018ZVCw0eapXux8FtA33q8PSRSstjee3jSg==", + "version": "0.13.0", + "resolved": "https://registry.npmjs.org/@humanwhocodes/config-array/-/config-array-0.13.0.tgz", + "integrity": "sha512-DZLEEqFWQFiyK6h5YIeynKx7JlvCYWL0cImfSRXZ9l4Sg2efkFGTuFf6vzXjK1cq6IYkU+Eg/JizXw+TD2vRNw==", "deprecated": "Use @eslint/config-array instead", "dev": true, "license": "Apache-2.0", "dependencies": { - "@humanwhocodes/object-schema": "^2.0.2", + "@humanwhocodes/object-schema": "^2.0.3", "debug": "^4.3.1", "minimatch": "^3.0.5" }, @@ -1508,9 +1132,9 @@ } }, "node_modules/@humanwhocodes/config-array/node_modules/brace-expansion": { - "version": "1.1.11", - "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz", - "integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==", + "version": "1.1.12", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.12.tgz", + "integrity": "sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==", "dev": true, "license": "MIT", "dependencies": { @@ -1572,9 +1196,9 @@ } }, "node_modules/@isaacs/cliui/node_modules/ansi-regex": { - "version": "6.0.1", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-6.0.1.tgz", - "integrity": "sha512-n5M855fKb2SsfMIiFFoVrABHJC8QtHwVx+mHWP3QcEqBHYienj5dHSgjbxtC0WEZXYt4wcD6zrQElDPhFuZgfA==", + "version": "6.1.0", + "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-6.1.0.tgz", + "integrity": "sha512-7HSX4QQb4CspciLpVFwyRe79O3xsIZDDLER21kERQ71oaPodF8jL725AgJMFAYbooIqolJoRLuM81SpeUkpkvA==", "dev": true, "license": "MIT", "engines": { @@ -1784,6 +1408,16 @@ "node": "^14.15.0 || ^16.10.0 || >=18.0.0" } }, + "node_modules/@jest/console/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/@jest/core": { "version": "29.7.0", "resolved": "https://registry.npmjs.org/@jest/core/-/core-29.7.0.tgz", @@ -1832,6 +1466,16 @@ } } }, + "node_modules/@jest/core/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/@jest/environment": { "version": "29.7.0", "resolved": "https://registry.npmjs.org/@jest/environment/-/environment-29.7.0.tgz", @@ -1953,6 +1597,16 @@ } } }, + "node_modules/@jest/reporters/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/@jest/schemas": { "version": "29.6.3", "resolved": "https://registry.npmjs.org/@jest/schemas/-/schemas-29.6.3.tgz", @@ -2013,6 +1667,16 @@ "node": "^14.15.0 || ^16.10.0 || >=18.0.0" } }, + "node_modules/@jest/test-sequencer/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/@jest/transform": { "version": "29.7.0", "resolved": "https://registry.npmjs.org/@jest/transform/-/transform-29.7.0.tgz", @@ -2040,6 +1704,16 @@ "node": "^14.15.0 || ^16.10.0 || >=18.0.0" } }, + "node_modules/@jest/transform/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/@jest/types": { "version": "29.6.3", "resolved": "https://registry.npmjs.org/@jest/types/-/types-29.6.3.tgz", @@ -2059,9 +1733,9 @@ } }, "node_modules/@jridgewell/gen-mapping": { - "version": "0.3.5", - "resolved": "https://registry.npmjs.org/@jridgewell/gen-mapping/-/gen-mapping-0.3.5.tgz", - "integrity": "sha512-IzL8ZoEDIBRWEzlCcRhOaCupYyN5gdIK+Q6fbFdPDg6HqX6jpkItn7DFIpW9LQzXG6Df9sA7+OKnq0qlz/GaQg==", + "version": "0.3.8", + "resolved": "https://registry.npmjs.org/@jridgewell/gen-mapping/-/gen-mapping-0.3.8.tgz", + "integrity": "sha512-imAbBGkb+ebQyxKgzv5Hu2nmROxoDOXHh80evxdoXNOrvAnVx7zimzc1Oo5h9RlfV4vPXaE2iM5pOFbvOCClWA==", "dev": true, "license": "MIT", "dependencies": { @@ -2094,9 +1768,9 @@ } }, "node_modules/@jridgewell/sourcemap-codec": { - "version": "1.4.15", - "resolved": "https://registry.npmjs.org/@jridgewell/sourcemap-codec/-/sourcemap-codec-1.4.15.tgz", - "integrity": "sha512-eF2rxCRulEKXHTRiDrDy6erMYWqNw4LPdQ8UQA4huuxaQsVeRPFl2oM8oDGxMFhJUWZf9McpLtJasDDZb/Bpeg==", + "version": "1.5.0", + "resolved": "https://registry.npmjs.org/@jridgewell/sourcemap-codec/-/sourcemap-codec-1.5.0.tgz", + "integrity": "sha512-gv3ZRaISU3fjPAgNsriBRqGWQL6quFx04YMPW/zD8XMLsU32mhCCbfbO6KZFLjvYpCZ8zyDEgqsgf+PwPaM7GQ==", "dev": true, "license": "MIT" }, @@ -2174,13 +1848,19 @@ } }, "node_modules/@rockcarver/frodo-lib": { - "resolved": "../frodo-lib", - "link": true + "version": "3.3.0", + "resolved": "https://registry.npmjs.org/@rockcarver/frodo-lib/-/frodo-lib-3.3.0.tgz", + "integrity": "sha512-isPkll4aUeAbpYJMkUMKJiDzjsZ+LItdZYQrbTvdOa/g5xt6dKaI1fcMxNDyq/AnOVoNThcj7VxLWJwBChrZRw==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=18.17.0" + } }, "node_modules/@rollup/rollup-android-arm-eabi": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-android-arm-eabi/-/rollup-android-arm-eabi-4.24.0.tgz", - "integrity": "sha512-Q6HJd7Y6xdB48x8ZNVDOqsbh2uByBhgK8PiQgPhwkIw/HC/YX5Ghq2mQY5sRMZWHb3VsFkWooUVOZHKr7DmDIA==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-android-arm-eabi/-/rollup-android-arm-eabi-4.35.0.tgz", + "integrity": "sha512-uYQ2WfPaqz5QtVgMxfN6NpLD+no0MYHDBywl7itPYd3K5TjjSghNKmX8ic9S8NU8w81NVhJv/XojcHptRly7qQ==", "cpu": [ "arm" ], @@ -2192,9 +1872,9 @@ ] }, "node_modules/@rollup/rollup-android-arm64": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-android-arm64/-/rollup-android-arm64-4.24.0.tgz", - "integrity": "sha512-ijLnS1qFId8xhKjT81uBHuuJp2lU4x2yxa4ctFPtG+MqEE6+C5f/+X/bStmxapgmwLwiL3ih122xv8kVARNAZA==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-android-arm64/-/rollup-android-arm64-4.35.0.tgz", + "integrity": "sha512-FtKddj9XZudurLhdJnBl9fl6BwCJ3ky8riCXjEw3/UIbjmIY58ppWwPEvU3fNu+W7FUsAsB1CdH+7EQE6CXAPA==", "cpu": [ "arm64" ], @@ -2206,9 +1886,9 @@ ] }, "node_modules/@rollup/rollup-darwin-arm64": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-darwin-arm64/-/rollup-darwin-arm64-4.24.0.tgz", - "integrity": "sha512-bIv+X9xeSs1XCk6DVvkO+S/z8/2AMt/2lMqdQbMrmVpgFvXlmde9mLcbQpztXm1tajC3raFDqegsH18HQPMYtA==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-darwin-arm64/-/rollup-darwin-arm64-4.35.0.tgz", + "integrity": "sha512-Uk+GjOJR6CY844/q6r5DR/6lkPFOw0hjfOIzVx22THJXMxktXG6CbejseJFznU8vHcEBLpiXKY3/6xc+cBm65Q==", "cpu": [ "arm64" ], @@ -2220,9 +1900,9 @@ ] }, "node_modules/@rollup/rollup-darwin-x64": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-darwin-x64/-/rollup-darwin-x64-4.24.0.tgz", - "integrity": "sha512-X6/nOwoFN7RT2svEQWUsW/5C/fYMBe4fnLK9DQk4SX4mgVBiTA9h64kjUYPvGQ0F/9xwJ5U5UfTbl6BEjaQdBQ==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-darwin-x64/-/rollup-darwin-x64-4.35.0.tgz", + "integrity": "sha512-3IrHjfAS6Vkp+5bISNQnPogRAW5GAV1n+bNCrDwXmfMHbPl5EhTmWtfmwlJxFRUCBZ+tZ/OxDyU08aF6NI/N5Q==", "cpu": [ "x64" ], @@ -2233,10 +1913,38 @@ "darwin" ] }, + "node_modules/@rollup/rollup-freebsd-arm64": { + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-freebsd-arm64/-/rollup-freebsd-arm64-4.35.0.tgz", + "integrity": "sha512-sxjoD/6F9cDLSELuLNnY0fOrM9WA0KrM0vWm57XhrIMf5FGiN8D0l7fn+bpUeBSU7dCgPV2oX4zHAsAXyHFGcQ==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "freebsd" + ] + }, + "node_modules/@rollup/rollup-freebsd-x64": { + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-freebsd-x64/-/rollup-freebsd-x64-4.35.0.tgz", + "integrity": "sha512-2mpHCeRuD1u/2kruUiHSsnjWtHjqVbzhBkNVQ1aVD63CcexKVcQGwJ2g5VphOd84GvxfSvnnlEyBtQCE5hxVVw==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "freebsd" + ] + }, "node_modules/@rollup/rollup-linux-arm-gnueabihf": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm-gnueabihf/-/rollup-linux-arm-gnueabihf-4.24.0.tgz", - "integrity": "sha512-0KXvIJQMOImLCVCz9uvvdPgfyWo93aHHp8ui3FrtOP57svqrF/roSSR5pjqL2hcMp0ljeGlU4q9o/rQaAQ3AYA==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm-gnueabihf/-/rollup-linux-arm-gnueabihf-4.35.0.tgz", + "integrity": "sha512-mrA0v3QMy6ZSvEuLs0dMxcO2LnaCONs1Z73GUDBHWbY8tFFocM6yl7YyMu7rz4zS81NDSqhrUuolyZXGi8TEqg==", "cpu": [ "arm" ], @@ -2248,9 +1956,9 @@ ] }, "node_modules/@rollup/rollup-linux-arm-musleabihf": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm-musleabihf/-/rollup-linux-arm-musleabihf-4.24.0.tgz", - "integrity": "sha512-it2BW6kKFVh8xk/BnHfakEeoLPv8STIISekpoF+nBgWM4d55CZKc7T4Dx1pEbTnYm/xEKMgy1MNtYuoA8RFIWw==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm-musleabihf/-/rollup-linux-arm-musleabihf-4.35.0.tgz", + "integrity": "sha512-DnYhhzcvTAKNexIql8pFajr0PiDGrIsBYPRvCKlA5ixSS3uwo/CWNZxB09jhIapEIg945KOzcYEAGGSmTSpk7A==", "cpu": [ "arm" ], @@ -2262,9 +1970,9 @@ ] }, "node_modules/@rollup/rollup-linux-arm64-gnu": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm64-gnu/-/rollup-linux-arm64-gnu-4.24.0.tgz", - "integrity": "sha512-i0xTLXjqap2eRfulFVlSnM5dEbTVque/3Pi4g2y7cxrs7+a9De42z4XxKLYJ7+OhE3IgxvfQM7vQc43bwTgPwA==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm64-gnu/-/rollup-linux-arm64-gnu-4.35.0.tgz", + "integrity": "sha512-uagpnH2M2g2b5iLsCTZ35CL1FgyuzzJQ8L9VtlJ+FckBXroTwNOaD0z0/UF+k5K3aNQjbm8LIVpxykUOQt1m/A==", "cpu": [ "arm64" ], @@ -2276,9 +1984,9 @@ ] }, "node_modules/@rollup/rollup-linux-arm64-musl": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm64-musl/-/rollup-linux-arm64-musl-4.24.0.tgz", - "integrity": "sha512-9E6MKUJhDuDh604Qco5yP/3qn3y7SLXYuiC0Rpr89aMScS2UAmK1wHP2b7KAa1nSjWJc/f/Lc0Wl1L47qjiyQw==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm64-musl/-/rollup-linux-arm64-musl-4.35.0.tgz", + "integrity": "sha512-XQxVOCd6VJeHQA/7YcqyV0/88N6ysSVzRjJ9I9UA/xXpEsjvAgDTgH3wQYz5bmr7SPtVK2TsP2fQ2N9L4ukoUg==", "cpu": [ "arm64" ], @@ -2289,10 +1997,24 @@ "linux" ] }, + "node_modules/@rollup/rollup-linux-loongarch64-gnu": { + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-loongarch64-gnu/-/rollup-linux-loongarch64-gnu-4.35.0.tgz", + "integrity": "sha512-5pMT5PzfgwcXEwOaSrqVsz/LvjDZt+vQ8RT/70yhPU06PTuq8WaHhfT1LW+cdD7mW6i/J5/XIkX/1tCAkh1W6g==", + "cpu": [ + "loong64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ] + }, "node_modules/@rollup/rollup-linux-powerpc64le-gnu": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-powerpc64le-gnu/-/rollup-linux-powerpc64le-gnu-4.24.0.tgz", - "integrity": "sha512-2XFFPJ2XMEiF5Zi2EBf4h73oR1V/lycirxZxHZNc93SqDN/IWhYYSYj8I9381ikUFXZrz2v7r2tOVk2NBwxrWw==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-powerpc64le-gnu/-/rollup-linux-powerpc64le-gnu-4.35.0.tgz", + "integrity": "sha512-c+zkcvbhbXF98f4CtEIP1EBA/lCic5xB0lToneZYvMeKu5Kamq3O8gqrxiYYLzlZH6E3Aq+TSW86E4ay8iD8EA==", "cpu": [ "ppc64" ], @@ -2304,9 +2026,9 @@ ] }, "node_modules/@rollup/rollup-linux-riscv64-gnu": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-riscv64-gnu/-/rollup-linux-riscv64-gnu-4.24.0.tgz", - "integrity": "sha512-M3Dg4hlwuntUCdzU7KjYqbbd+BLq3JMAOhCKdBE3TcMGMZbKkDdJ5ivNdehOssMCIokNHFOsv7DO4rlEOfyKpg==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-riscv64-gnu/-/rollup-linux-riscv64-gnu-4.35.0.tgz", + "integrity": "sha512-s91fuAHdOwH/Tad2tzTtPX7UZyytHIRR6V4+2IGlV0Cej5rkG0R61SX4l4y9sh0JBibMiploZx3oHKPnQBKe4g==", "cpu": [ "riscv64" ], @@ -2318,9 +2040,9 @@ ] }, "node_modules/@rollup/rollup-linux-s390x-gnu": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-s390x-gnu/-/rollup-linux-s390x-gnu-4.24.0.tgz", - "integrity": "sha512-mjBaoo4ocxJppTorZVKWFpy1bfFj9FeCMJqzlMQGjpNPY9JwQi7OuS1axzNIk0nMX6jSgy6ZURDZ2w0QW6D56g==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-s390x-gnu/-/rollup-linux-s390x-gnu-4.35.0.tgz", + "integrity": "sha512-hQRkPQPLYJZYGP+Hj4fR9dDBMIM7zrzJDWFEMPdTnTy95Ljnv0/4w/ixFw3pTBMEuuEuoqtBINYND4M7ujcuQw==", "cpu": [ "s390x" ], @@ -2332,9 +2054,9 @@ ] }, "node_modules/@rollup/rollup-linux-x64-gnu": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-x64-gnu/-/rollup-linux-x64-gnu-4.24.0.tgz", - "integrity": "sha512-ZXFk7M72R0YYFN5q13niV0B7G8/5dcQ9JDp8keJSfr3GoZeXEoMHP/HlvqROA3OMbMdfr19IjCeNAnPUG93b6A==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-x64-gnu/-/rollup-linux-x64-gnu-4.35.0.tgz", + "integrity": "sha512-Pim1T8rXOri+0HmV4CdKSGrqcBWX0d1HoPnQ0uw0bdp1aP5SdQVNBy8LjYncvnLgu3fnnCt17xjWGd4cqh8/hA==", "cpu": [ "x64" ], @@ -2346,9 +2068,9 @@ ] }, "node_modules/@rollup/rollup-linux-x64-musl": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-x64-musl/-/rollup-linux-x64-musl-4.24.0.tgz", - "integrity": "sha512-w1i+L7kAXZNdYl+vFvzSZy8Y1arS7vMgIy8wusXJzRrPyof5LAb02KGr1PD2EkRcl73kHulIID0M501lN+vobQ==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-x64-musl/-/rollup-linux-x64-musl-4.35.0.tgz", + "integrity": "sha512-QysqXzYiDvQWfUiTm8XmJNO2zm9yC9P/2Gkrwg2dH9cxotQzunBHYr6jk4SujCTqnfGxduOmQcI7c2ryuW8XVg==", "cpu": [ "x64" ], @@ -2360,9 +2082,9 @@ ] }, "node_modules/@rollup/rollup-win32-arm64-msvc": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-win32-arm64-msvc/-/rollup-win32-arm64-msvc-4.24.0.tgz", - "integrity": "sha512-VXBrnPWgBpVDCVY6XF3LEW0pOU51KbaHhccHw6AS6vBWIC60eqsH19DAeeObl+g8nKAz04QFdl/Cefta0xQtUQ==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-win32-arm64-msvc/-/rollup-win32-arm64-msvc-4.35.0.tgz", + "integrity": "sha512-OUOlGqPkVJCdJETKOCEf1mw848ZyJ5w50/rZ/3IBQVdLfR5jk/6Sr5m3iO2tdPgwo0x7VcncYuOvMhBWZq8ayg==", "cpu": [ "arm64" ], @@ -2374,9 +2096,9 @@ ] }, "node_modules/@rollup/rollup-win32-ia32-msvc": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-win32-ia32-msvc/-/rollup-win32-ia32-msvc-4.24.0.tgz", - "integrity": "sha512-xrNcGDU0OxVcPTH/8n/ShH4UevZxKIO6HJFK0e15XItZP2UcaiLFd5kiX7hJnqCbSztUF8Qot+JWBC/QXRPYWQ==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-win32-ia32-msvc/-/rollup-win32-ia32-msvc-4.35.0.tgz", + "integrity": "sha512-2/lsgejMrtwQe44glq7AFFHLfJBPafpsTa6JvP2NGef/ifOa4KBoglVf7AKN7EV9o32evBPRqfg96fEHzWo5kw==", "cpu": [ "ia32" ], @@ -2388,9 +2110,9 @@ ] }, "node_modules/@rollup/rollup-win32-x64-msvc": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/@rollup/rollup-win32-x64-msvc/-/rollup-win32-x64-msvc-4.24.0.tgz", - "integrity": "sha512-fbMkAF7fufku0N2dE5TBXcNlg0pt0cJue4xBRE2Qc5Vqikxr4VCgKj/ht6SMdFcOacVA9rqF70APJ8RN/4vMJw==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/@rollup/rollup-win32-x64-msvc/-/rollup-win32-x64-msvc-4.35.0.tgz", + "integrity": "sha512-PIQeY5XDkrOysbQblSW7v3l1MDZzkTEzAfTPkj5VAu3FW8fS4ynyLg2sINp0fp3SjZ8xkRYpLqoKcYqAkhU1dw==", "cpu": [ "x64" ], @@ -2401,6 +2123,13 @@ "win32" ] }, + "node_modules/@rtsao/scc": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/@rtsao/scc/-/scc-1.1.0.tgz", + "integrity": "sha512-zt6OdqaDoOnJ1ZYsCYGt9YmWzDXl4vQdKTyJev62gFhRGKdx7mcT54V9KIjg+d2wi9EXsPvAPKe7i7WjfVWB8g==", + "dev": true, + "license": "MIT" + }, "node_modules/@sinclair/typebox": { "version": "0.27.8", "resolved": "https://registry.npmjs.org/@sinclair/typebox/-/typebox-0.27.8.tgz", @@ -2408,6 +2137,19 @@ "dev": true, "license": "MIT" }, + "node_modules/@sindresorhus/merge-streams": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/@sindresorhus/merge-streams/-/merge-streams-2.3.0.tgz", + "integrity": "sha512-LtoMMhxAlorcGhmFYI+LhPgbPZCkgP6ra1YL604EeF6U98pLlQ3iWIGMdWSC+vWmPBWBNgmDBAhnAobLROJmwg==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=18" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, "node_modules/@sinonjs/commons": { "version": "3.0.1", "resolved": "https://registry.npmjs.org/@sinonjs/commons/-/commons-3.0.1.tgz", @@ -2474,10 +2216,10 @@ } }, "node_modules/@types/colors": { - "version": "1.2.1", - "resolved": "https://registry.npmjs.org/@types/colors/-/colors-1.2.1.tgz", - "integrity": "sha512-7jNkpfN2lVO07nJ1RWzyMnNhH/I5N9iWuMPx9pedptxJ4MODf8rRV0lbJi6RakQ4sKQk231Fw4e2W9n3D7gZ3w==", - "deprecated": "This is a stub types definition. colors provides its own type definitions, so you don't need this installed.", + "version": "1.2.4", + "resolved": "https://registry.npmjs.org/@types/colors/-/colors-1.2.4.tgz", + "integrity": "sha512-oSQxEVIDcYisAzWLa+wr50GSIPu8ml4PsKNJzgrDX3SmEHVBBqbaUurqsUceFauNlCRxNtENKkQm3yOe3m3nfg==", + "deprecated": "This is a stub types definition. colors provides its own type definitions, so you do not need this installed.", "dev": true, "license": "MIT", "dependencies": { @@ -2540,9 +2282,9 @@ } }, "node_modules/@types/jest": { - "version": "29.5.12", - "resolved": "https://registry.npmjs.org/@types/jest/-/jest-29.5.12.tgz", - "integrity": "sha512-eDC8bTvT/QhYdxJAulQikueigY5AsdBRH2yDKW3yveW7svY3+DzN84/2NUgkw10RTiJbWqZrTtoGVdYlvFJdLw==", + "version": "29.5.14", + "resolved": "https://registry.npmjs.org/@types/jest/-/jest-29.5.14.tgz", + "integrity": "sha512-ZN+4sdnLUbo8EVvVc2ao0GFW6oVrQRPn4K2lglySj7APvSrgzxHiNNK99us4WDMi57xxA2yggblIAMNhXOotLQ==", "dev": true, "license": "MIT", "dependencies": { @@ -2550,13 +2292,6 @@ "pretty-format": "^29.0.0" } }, - "node_modules/@types/json-schema": { - "version": "7.0.15", - "resolved": "https://registry.npmjs.org/@types/json-schema/-/json-schema-7.0.15.tgz", - "integrity": "sha512-5+fP8P8MFNC+AyZCDxrB2pkZFPGzqQWUzpSeuuVLvm8VMcorNYavBqoFcxK8bQz4Qsbn4oUEEem4wDLfcysGHA==", - "dev": true, - "license": "MIT" - }, "node_modules/@types/json5": { "version": "0.0.29", "resolved": "https://registry.npmjs.org/@types/json5/-/json5-0.0.29.tgz", @@ -2575,22 +2310,15 @@ } }, "node_modules/@types/node": { - "version": "20.14.2", - "resolved": "https://registry.npmjs.org/@types/node/-/node-20.14.2.tgz", - "integrity": "sha512-xyu6WAMVwv6AKFLB+e/7ySZVr/0zLCzOa7rSpq6jNwpqOrUbcACDWC+53d4n2QHOnDou0fbIsg8wZu/sxrnI4Q==", + "version": "22.13.10", + "resolved": "https://registry.npmjs.org/@types/node/-/node-22.13.10.tgz", + "integrity": "sha512-I6LPUvlRH+O6VRUqYOcMudhaIdUVWfsjnZavnsraHvpBwaEyMN29ry+0UVJhImYL16xsscu0aske3yA+uPOWfw==", "dev": true, "license": "MIT", "dependencies": { - "undici-types": "~5.26.4" + "undici-types": "~6.20.0" } }, - "node_modules/@types/semver": { - "version": "7.5.8", - "resolved": "https://registry.npmjs.org/@types/semver/-/semver-7.5.8.tgz", - "integrity": "sha512-I8EUhyrgfLrcTkzV3TSsGyl1tSuPrEDzr0yd5m90UgNxQkyDXULk3b6MlQqTCpZpNtWe1K0hzclnZkTcLBe2UQ==", - "dev": true, - "license": "MIT" - }, "node_modules/@types/stack-utils": { "version": "2.0.3", "resolved": "https://registry.npmjs.org/@types/stack-utils/-/stack-utils-2.0.3.tgz", @@ -2599,9 +2327,9 @@ "license": "MIT" }, "node_modules/@types/yargs": { - "version": "17.0.32", - "resolved": "https://registry.npmjs.org/@types/yargs/-/yargs-17.0.32.tgz", - "integrity": "sha512-xQ67Yc/laOG5uMfX/093MRlGGCIBzZMarVa+gfNKJxWAIgykYpVGkBdbqEzGDDfCrVUj6Hiff4mTZ5BA6TmAog==", + "version": "17.0.33", + "resolved": "https://registry.npmjs.org/@types/yargs/-/yargs-17.0.33.tgz", + "integrity": "sha512-WpxBCKWPLr4xSsHgz511rFJAM+wS28w2zEO1QDNY5zM/S8ok70NNfztH0xwhqKyaK0OHCbN98LDAZuy1ctxDkA==", "dev": true, "license": "MIT", "dependencies": { @@ -2616,34 +2344,32 @@ "license": "MIT" }, "node_modules/@typescript-eslint/eslint-plugin": { - "version": "6.21.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/eslint-plugin/-/eslint-plugin-6.21.0.tgz", - "integrity": "sha512-oy9+hTPCUFpngkEZUSzbf9MxI65wbKFoQYsgPdILTfbUldp5ovUuphZVe4i30emU9M/kP+T64Di0mxl7dSw3MA==", + "version": "7.18.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/eslint-plugin/-/eslint-plugin-7.18.0.tgz", + "integrity": "sha512-94EQTWZ40mzBc42ATNIBimBEDltSJ9RQHCC8vc/PDbxi4k8dVwUAv4o98dk50M1zB+JGFxp43FP7f8+FP8R6Sw==", "dev": true, "license": "MIT", "dependencies": { - "@eslint-community/regexpp": "^4.5.1", - "@typescript-eslint/scope-manager": "6.21.0", - "@typescript-eslint/type-utils": "6.21.0", - "@typescript-eslint/utils": "6.21.0", - "@typescript-eslint/visitor-keys": "6.21.0", - "debug": "^4.3.4", + "@eslint-community/regexpp": "^4.10.0", + "@typescript-eslint/scope-manager": "7.18.0", + "@typescript-eslint/type-utils": "7.18.0", + "@typescript-eslint/utils": "7.18.0", + "@typescript-eslint/visitor-keys": "7.18.0", "graphemer": "^1.4.0", - "ignore": "^5.2.4", + "ignore": "^5.3.1", "natural-compare": "^1.4.0", - "semver": "^7.5.4", - "ts-api-utils": "^1.0.1" + "ts-api-utils": "^1.3.0" }, "engines": { - "node": "^16.0.0 || >=18.0.0" + "node": "^18.18.0 || >=20.0.0" }, "funding": { "type": "opencollective", "url": "https://opencollective.com/typescript-eslint" }, "peerDependencies": { - "@typescript-eslint/parser": "^6.0.0 || ^6.0.0-alpha", - "eslint": "^7.0.0 || ^8.0.0" + "@typescript-eslint/parser": "^7.0.0", + "eslint": "^8.56.0" }, "peerDependenciesMeta": { "typescript": { @@ -2652,27 +2378,27 @@ } }, "node_modules/@typescript-eslint/parser": { - "version": "6.21.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/parser/-/parser-6.21.0.tgz", - "integrity": "sha512-tbsV1jPne5CkFQCgPBcDOt30ItF7aJoZL997JSF7MhGQqOeT3svWRYxiqlfA5RUdlHN6Fi+EI9bxqbdyAUZjYQ==", + "version": "7.18.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/parser/-/parser-7.18.0.tgz", + "integrity": "sha512-4Z+L8I2OqhZV8qA132M4wNL30ypZGYOQVBfMgxDH/K5UX0PNqTu1c6za9ST5r9+tavvHiTWmBnKzpCJ/GlVFtg==", "dev": true, "license": "BSD-2-Clause", "dependencies": { - "@typescript-eslint/scope-manager": "6.21.0", - "@typescript-eslint/types": "6.21.0", - "@typescript-eslint/typescript-estree": "6.21.0", - "@typescript-eslint/visitor-keys": "6.21.0", + "@typescript-eslint/scope-manager": "7.18.0", + "@typescript-eslint/types": "7.18.0", + "@typescript-eslint/typescript-estree": "7.18.0", + "@typescript-eslint/visitor-keys": "7.18.0", "debug": "^4.3.4" }, "engines": { - "node": "^16.0.0 || >=18.0.0" + "node": "^18.18.0 || >=20.0.0" }, "funding": { "type": "opencollective", "url": "https://opencollective.com/typescript-eslint" }, "peerDependencies": { - "eslint": "^7.0.0 || ^8.0.0" + "eslint": "^8.56.0" }, "peerDependenciesMeta": { "typescript": { @@ -2681,17 +2407,17 @@ } }, "node_modules/@typescript-eslint/scope-manager": { - "version": "6.21.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/scope-manager/-/scope-manager-6.21.0.tgz", - "integrity": "sha512-OwLUIWZJry80O99zvqXVEioyniJMa+d2GrqpUTqi5/v5D5rOrppJVBPa0yKCblcigC0/aYAzxxqQ1B+DS2RYsg==", + "version": "7.18.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/scope-manager/-/scope-manager-7.18.0.tgz", + "integrity": "sha512-jjhdIE/FPF2B7Z1uzc6i3oWKbGcHb87Qw7AWj6jmEqNOfDFbJWtjt/XfwCpvNkpGWlcJaog5vTR+VV8+w9JflA==", "dev": true, "license": "MIT", "dependencies": { - "@typescript-eslint/types": "6.21.0", - "@typescript-eslint/visitor-keys": "6.21.0" + "@typescript-eslint/types": "7.18.0", + "@typescript-eslint/visitor-keys": "7.18.0" }, "engines": { - "node": "^16.0.0 || >=18.0.0" + "node": "^18.18.0 || >=20.0.0" }, "funding": { "type": "opencollective", @@ -2699,26 +2425,26 @@ } }, "node_modules/@typescript-eslint/type-utils": { - "version": "6.21.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/type-utils/-/type-utils-6.21.0.tgz", - "integrity": "sha512-rZQI7wHfao8qMX3Rd3xqeYSMCL3SoiSQLBATSiVKARdFGCYSRvmViieZjqc58jKgs8Y8i9YvVVhRbHSTA4VBag==", + "version": "7.18.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/type-utils/-/type-utils-7.18.0.tgz", + "integrity": "sha512-XL0FJXuCLaDuX2sYqZUUSOJ2sG5/i1AAze+axqmLnSkNEVMVYLF+cbwlB2w8D1tinFuSikHmFta+P+HOofrLeA==", "dev": true, "license": "MIT", "dependencies": { - "@typescript-eslint/typescript-estree": "6.21.0", - "@typescript-eslint/utils": "6.21.0", + "@typescript-eslint/typescript-estree": "7.18.0", + "@typescript-eslint/utils": "7.18.0", "debug": "^4.3.4", - "ts-api-utils": "^1.0.1" + "ts-api-utils": "^1.3.0" }, "engines": { - "node": "^16.0.0 || >=18.0.0" + "node": "^18.18.0 || >=20.0.0" }, "funding": { "type": "opencollective", "url": "https://opencollective.com/typescript-eslint" }, "peerDependencies": { - "eslint": "^7.0.0 || ^8.0.0" + "eslint": "^8.56.0" }, "peerDependenciesMeta": { "typescript": { @@ -2727,13 +2453,13 @@ } }, "node_modules/@typescript-eslint/types": { - "version": "6.21.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/types/-/types-6.21.0.tgz", - "integrity": "sha512-1kFmZ1rOm5epu9NZEZm1kckCDGj5UJEf7P1kliH4LKu/RkwpsfqqGmY2OOcUs18lSlQBKLDYBOGxRVtrMN5lpg==", + "version": "7.18.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/types/-/types-7.18.0.tgz", + "integrity": "sha512-iZqi+Ds1y4EDYUtlOOC+aUmxnE9xS/yCigkjA7XpTKV6nCBd3Hp/PRGGmdwnfkV2ThMyYldP1wRpm/id99spTQ==", "dev": true, "license": "MIT", "engines": { - "node": "^16.0.0 || >=18.0.0" + "node": "^18.18.0 || >=20.0.0" }, "funding": { "type": "opencollective", @@ -2741,23 +2467,23 @@ } }, "node_modules/@typescript-eslint/typescript-estree": { - "version": "6.21.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/typescript-estree/-/typescript-estree-6.21.0.tgz", - "integrity": "sha512-6npJTkZcO+y2/kr+z0hc4HwNfrrP4kNYh57ek7yCNlrBjWQ1Y0OS7jiZTkgumrvkX5HkEKXFZkkdFNkaW2wmUQ==", + "version": "7.18.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/typescript-estree/-/typescript-estree-7.18.0.tgz", + "integrity": "sha512-aP1v/BSPnnyhMHts8cf1qQ6Q1IFwwRvAQGRvBFkWlo3/lH29OXA3Pts+c10nxRxIBrDnoMqzhgdwVe5f2D6OzA==", "dev": true, "license": "BSD-2-Clause", "dependencies": { - "@typescript-eslint/types": "6.21.0", - "@typescript-eslint/visitor-keys": "6.21.0", + "@typescript-eslint/types": "7.18.0", + "@typescript-eslint/visitor-keys": "7.18.0", "debug": "^4.3.4", "globby": "^11.1.0", "is-glob": "^4.0.3", - "minimatch": "9.0.3", - "semver": "^7.5.4", - "ts-api-utils": "^1.0.1" + "minimatch": "^9.0.4", + "semver": "^7.6.0", + "ts-api-utils": "^1.3.0" }, "engines": { - "node": "^16.0.0 || >=18.0.0" + "node": "^18.18.0 || >=20.0.0" }, "funding": { "type": "opencollective", @@ -2770,43 +2496,40 @@ } }, "node_modules/@typescript-eslint/utils": { - "version": "6.21.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/utils/-/utils-6.21.0.tgz", - "integrity": "sha512-NfWVaC8HP9T8cbKQxHcsJBY5YE1O33+jpMwN45qzWWaPDZgLIbo12toGMWnmhvCpd3sIxkpDw3Wv1B3dYrbDQQ==", + "version": "7.18.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/utils/-/utils-7.18.0.tgz", + "integrity": "sha512-kK0/rNa2j74XuHVcoCZxdFBMF+aq/vH83CXAOHieC+2Gis4mF8jJXT5eAfyD3K0sAxtPuwxaIOIOvhwzVDt/kw==", "dev": true, "license": "MIT", "dependencies": { "@eslint-community/eslint-utils": "^4.4.0", - "@types/json-schema": "^7.0.12", - "@types/semver": "^7.5.0", - "@typescript-eslint/scope-manager": "6.21.0", - "@typescript-eslint/types": "6.21.0", - "@typescript-eslint/typescript-estree": "6.21.0", - "semver": "^7.5.4" + "@typescript-eslint/scope-manager": "7.18.0", + "@typescript-eslint/types": "7.18.0", + "@typescript-eslint/typescript-estree": "7.18.0" }, "engines": { - "node": "^16.0.0 || >=18.0.0" + "node": "^18.18.0 || >=20.0.0" }, "funding": { "type": "opencollective", "url": "https://opencollective.com/typescript-eslint" }, "peerDependencies": { - "eslint": "^7.0.0 || ^8.0.0" + "eslint": "^8.56.0" } }, "node_modules/@typescript-eslint/visitor-keys": { - "version": "6.21.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/visitor-keys/-/visitor-keys-6.21.0.tgz", - "integrity": "sha512-JJtkDduxLi9bivAB+cYOVMtbkqdPOhZ+ZI5LC47MIRrDV4Yn2o+ZnW10Nkmr28xRpSpdJ6Sm42Hjf2+REYXm0A==", + "version": "7.18.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/visitor-keys/-/visitor-keys-7.18.0.tgz", + "integrity": "sha512-cDF0/Gf81QpY3xYyJKDV14Zwdmid5+uuENhjH2EqFaF0ni+yAyq/LzMaIJdhNJXZI7uLzwIlA+V7oWoyn6Curg==", "dev": true, "license": "MIT", "dependencies": { - "@typescript-eslint/types": "6.21.0", - "eslint-visitor-keys": "^3.4.1" + "@typescript-eslint/types": "7.18.0", + "eslint-visitor-keys": "^3.4.3" }, "engines": { - "node": "^16.0.0 || >=18.0.0" + "node": "^18.18.0 || >=20.0.0" }, "funding": { "type": "opencollective", @@ -2814,111 +2537,60 @@ } }, "node_modules/@ungap/structured-clone": { - "version": "1.2.0", - "resolved": "https://registry.npmjs.org/@ungap/structured-clone/-/structured-clone-1.2.0.tgz", - "integrity": "sha512-zuVdFrMJiuCDQUMCzQaD6KL28MjnqqN8XnAqiEq9PNm/hCPTSGfrXCOfwj1ow4LFb/tNymJPwsNbVePc1xFqrQ==", + "version": "1.3.0", + "resolved": "https://registry.npmjs.org/@ungap/structured-clone/-/structured-clone-1.3.0.tgz", + "integrity": "sha512-WmoN8qaIAo7WTYWbAZuG8PYEhn5fkz7dZrqTBZ7dtt//lL2Gwms1IcnQ5yHqjDfX8Ft5j4YzDM23f87zBfDe9g==", "dev": true, "license": "ISC" }, "node_modules/@yao-pkg/pkg": { - "version": "5.12.0", - "resolved": "https://registry.npmjs.org/@yao-pkg/pkg/-/pkg-5.12.0.tgz", - "integrity": "sha512-KZVpiDKRi2gtrVtKwhz/ZUKBOicVNggxaYQzPBjULuOLJ/UypTmAz5a2g+utLMn+WogbLE3vLfmC+TWp8v3+aQ==", + "version": "5.16.1", + "resolved": "https://registry.npmjs.org/@yao-pkg/pkg/-/pkg-5.16.1.tgz", + "integrity": "sha512-crUlnNFSReFNFuXDc4f3X2ignkFlc9kmEG7Bp/mJMA1jYyqR0lqjZGLgrSDYTYiNsYud8AzgA3RY1DrMdcUZWg==", "dev": true, "license": "MIT", "dependencies": { - "@babel/generator": "7.23.0", - "@babel/parser": "7.23.0", - "@babel/types": "7.23.0", - "@yao-pkg/pkg-fetch": "3.5.9", - "chalk": "^4.1.2", - "fs-extra": "^9.1.0", - "globby": "^11.1.0", + "@babel/generator": "^7.23.0", + "@babel/parser": "^7.23.0", + "@babel/types": "^7.23.0", + "@yao-pkg/pkg-fetch": "3.5.16", "into-stream": "^6.0.0", - "is-core-module": "2.9.0", - "minimatch": "9.0.4", "minimist": "^1.2.6", "multistream": "^4.1.0", - "prebuild-install": "7.1.1", + "picocolors": "^1.1.0", + "picomatch": "^4.0.2", + "prebuild-install": "^7.1.1", "resolve": "^1.22.0", - "stream-meter": "^1.0.4" - }, - "bin": { - "pkg": "lib-es5/bin.js" - } - }, - "node_modules/@yao-pkg/pkg-fetch": { - "version": "3.5.9", - "resolved": "https://registry.npmjs.org/@yao-pkg/pkg-fetch/-/pkg-fetch-3.5.9.tgz", - "integrity": "sha512-usMwwqFCd2B7k+V87u6kiTesyDSlw+3LpiuYBWe+UgryvSOk/NXjx3XVCub8hQoi0bCREbdQ6NDBqminyHJJrg==", - "dev": true, - "license": "MIT", - "dependencies": { - "chalk": "^4.1.2", - "fs-extra": "^9.1.0", - "https-proxy-agent": "^5.0.0", - "node-fetch": "^2.6.6", - "progress": "^2.0.3", - "semver": "^7.3.5", - "tar-fs": "^2.1.1", - "yargs": "^16.2.0" - }, - "bin": { - "pkg-fetch": "lib-es5/bin.js" - } - }, - "node_modules/@yao-pkg/pkg-fetch/node_modules/fs-extra": { - "version": "9.1.0", - "resolved": "https://registry.npmjs.org/fs-extra/-/fs-extra-9.1.0.tgz", - "integrity": "sha512-hcg3ZmepS30/7BSFqRvoo3DOMQu7IjqxO5nCDt+zM9XWjb33Wg7ziNT+Qvqbuc3+gWpzO02JubVyk2G4Zvo1OQ==", - "dev": true, - "license": "MIT", - "dependencies": { - "at-least-node": "^1.0.0", - "graceful-fs": "^4.2.0", - "jsonfile": "^6.0.1", - "universalify": "^2.0.0" - }, - "engines": { - "node": ">=10" - } - }, - "node_modules/@yao-pkg/pkg/node_modules/fs-extra": { - "version": "9.1.0", - "resolved": "https://registry.npmjs.org/fs-extra/-/fs-extra-9.1.0.tgz", - "integrity": "sha512-hcg3ZmepS30/7BSFqRvoo3DOMQu7IjqxO5nCDt+zM9XWjb33Wg7ziNT+Qvqbuc3+gWpzO02JubVyk2G4Zvo1OQ==", - "dev": true, - "license": "MIT", - "dependencies": { - "at-least-node": "^1.0.0", - "graceful-fs": "^4.2.0", - "jsonfile": "^6.0.1", - "universalify": "^2.0.0" + "stream-meter": "^1.0.4", + "tinyglobby": "^0.2.9" }, - "engines": { - "node": ">=10" + "bin": { + "pkg": "lib-es5/bin.js" } }, - "node_modules/@yao-pkg/pkg/node_modules/minimatch": { - "version": "9.0.4", - "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-9.0.4.tgz", - "integrity": "sha512-KqWh+VchfxcMNRAJjj2tnsSJdNbHsVgnkBhTNrW7AjVo6OvLtxw8zfT9oLw1JSohlFzJ8jCoTgaoXvJ+kHt6fw==", + "node_modules/@yao-pkg/pkg-fetch": { + "version": "3.5.16", + "resolved": "https://registry.npmjs.org/@yao-pkg/pkg-fetch/-/pkg-fetch-3.5.16.tgz", + "integrity": "sha512-mCnZvZz0/Ylpk4TGyt34pqWJyBGYJM8c3dPoMRV8Knodv2QhcYS4iXb5kB/JNWkrRtCKukGZIKkMLXZ3TQlzPg==", "dev": true, - "license": "ISC", + "license": "MIT", "dependencies": { - "brace-expansion": "^2.0.1" - }, - "engines": { - "node": ">=16 || 14 >=14.17" + "https-proxy-agent": "^5.0.0", + "node-fetch": "^2.6.6", + "picocolors": "^1.1.0", + "progress": "^2.0.3", + "semver": "^7.3.5", + "tar-fs": "^2.1.1", + "yargs": "^16.2.0" }, - "funding": { - "url": "https://github.com/sponsors/isaacs" + "bin": { + "pkg-fetch": "lib-es5/bin.js" } }, "node_modules/acorn": { - "version": "8.11.3", - "resolved": "https://registry.npmjs.org/acorn/-/acorn-8.11.3.tgz", - "integrity": "sha512-Y9rRfJG5jcKOE0CLisYbojUjIrIEE7AGMzA/Sm4BslANhbS+cDMpgBdcPT91oJ7OuJ9hYJBx59RjbhxVnrF8Xg==", + "version": "8.14.1", + "resolved": "https://registry.npmjs.org/acorn/-/acorn-8.14.1.tgz", + "integrity": "sha512-OvQ/2pUDKmgfCg++xsTX1wGxfTaszcHVcTctW4UJB4hibJx2HXxxO5UmVgyjMa+ZDsiaf5wWLXYpRWMmBI0QHg==", "dev": true, "license": "MIT", "bin": { @@ -2951,20 +2623,6 @@ "node": ">= 6.0.0" } }, - "node_modules/aggregate-error": { - "version": "3.1.0", - "resolved": "https://registry.npmjs.org/aggregate-error/-/aggregate-error-3.1.0.tgz", - "integrity": "sha512-4I7Td01quW/RpocfNayFdFVk1qSuoh0E7JrbRJ16nH01HhKFQ88INq9Sd+nd72zqRySlr9BmDA8xlEJ6vJMrYA==", - "dev": true, - "license": "MIT", - "dependencies": { - "clean-stack": "^2.0.0", - "indent-string": "^4.0.0" - }, - "engines": { - "node": ">=8" - } - }, "node_modules/ajv": { "version": "6.12.6", "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.12.6.tgz", @@ -3058,6 +2716,19 @@ "node": ">= 8" } }, + "node_modules/anymatch/node_modules/picomatch": { + "version": "2.3.1", + "resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.3.1.tgz", + "integrity": "sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8.6" + }, + "funding": { + "url": "https://github.com/sponsors/jonschlinkert" + } + }, "node_modules/argparse": { "version": "2.0.1", "resolved": "https://registry.npmjs.org/argparse/-/argparse-2.0.1.tgz", @@ -3066,24 +2737,24 @@ "license": "Python-2.0" }, "node_modules/aria-query": { - "version": "5.3.0", - "resolved": "https://registry.npmjs.org/aria-query/-/aria-query-5.3.0.tgz", - "integrity": "sha512-b0P0sZPKtyu8HkeRAfCq0IfURZK+SuwMjY1UXGBU27wpAiTwQAIlq56IbIO+ytk/JjS1fMR14ee5WBBfKi5J6A==", + "version": "5.3.2", + "resolved": "https://registry.npmjs.org/aria-query/-/aria-query-5.3.2.tgz", + "integrity": "sha512-COROpnaoap1E2F000S62r6A60uHZnmlvomhfyT2DlTcrY1OrBKn2UhH7qn5wTC9zMvD0AY7csdPSNwKP+7WiQw==", "dev": true, "license": "Apache-2.0", - "dependencies": { - "dequal": "^2.0.3" + "engines": { + "node": ">= 0.4" } }, "node_modules/array-buffer-byte-length": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/array-buffer-byte-length/-/array-buffer-byte-length-1.0.1.tgz", - "integrity": "sha512-ahC5W1xgou+KTXix4sAO8Ki12Q+jf4i0+tmk3sC+zgcynshkHxzpXdImBehiUYKKKDwvfFiJl1tZt6ewscS1Mg==", + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/array-buffer-byte-length/-/array-buffer-byte-length-1.0.2.tgz", + "integrity": "sha512-LHE+8BuR7RYGDKvnrmcuSq3tDcKv9OFEXQt/HpbZhY7V6h0zlUXutnAD82GiFx9rdieCMjkvtcsPqBwgUl1Iiw==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.5", - "is-array-buffer": "^3.0.4" + "call-bound": "^1.0.3", + "is-array-buffer": "^3.0.5" }, "engines": { "node": ">= 0.4" @@ -3145,16 +2816,16 @@ } }, "node_modules/array.prototype.flat": { - "version": "1.3.2", - "resolved": "https://registry.npmjs.org/array.prototype.flat/-/array.prototype.flat-1.3.2.tgz", - "integrity": "sha512-djYB+Zx2vLewY8RWlNCUdHjDXs2XOgm602S9E7P/UpHgfeHL00cRiIF+IN/G/aUJ7kGPb6yO/ErDI5V2s8iycA==", + "version": "1.3.3", + "resolved": "https://registry.npmjs.org/array.prototype.flat/-/array.prototype.flat-1.3.3.tgz", + "integrity": "sha512-rwG/ja1neyLqCuGZ5YYrznA62D4mZXg0i1cIskIUKSiqF3Cje9/wXAls9B9s1Wa2fomMsIv8czB8jZcPmxCXFg==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.2", - "define-properties": "^1.2.0", - "es-abstract": "^1.22.1", - "es-shim-unscopables": "^1.0.0" + "call-bind": "^1.0.8", + "define-properties": "^1.2.1", + "es-abstract": "^1.23.5", + "es-shim-unscopables": "^1.0.2" }, "engines": { "node": ">= 0.4" @@ -3164,16 +2835,16 @@ } }, "node_modules/array.prototype.flatmap": { - "version": "1.3.2", - "resolved": "https://registry.npmjs.org/array.prototype.flatmap/-/array.prototype.flatmap-1.3.2.tgz", - "integrity": "sha512-Ewyx0c9PmpcsByhSW4r+9zDU7sGjFc86qf/kKtuSCRdhfbk0SNLLkaT5qvcHnRGgc5NP/ly/y+qkXkqONX54CQ==", + "version": "1.3.3", + "resolved": "https://registry.npmjs.org/array.prototype.flatmap/-/array.prototype.flatmap-1.3.3.tgz", + "integrity": "sha512-Y7Wt51eKJSyi80hFrJCePGGNo5ktJCslFuboqJsbf57CCPcm5zztluPlc4/aD8sWsKvlwatezpV4U1efk8kpjg==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.2", - "define-properties": "^1.2.0", - "es-abstract": "^1.22.1", - "es-shim-unscopables": "^1.0.0" + "call-bind": "^1.0.8", + "define-properties": "^1.2.1", + "es-abstract": "^1.23.5", + "es-shim-unscopables": "^1.0.2" }, "engines": { "node": ">= 0.4" @@ -3183,20 +2854,19 @@ } }, "node_modules/arraybuffer.prototype.slice": { - "version": "1.0.3", - "resolved": "https://registry.npmjs.org/arraybuffer.prototype.slice/-/arraybuffer.prototype.slice-1.0.3.tgz", - "integrity": "sha512-bMxMKAjg13EBSVscxTaYA4mRc5t1UAXa2kXiGTNfZ079HIWXEkKmkgFrh/nJqamaLSrXO5H4WFFkPEaLJWbs3A==", + "version": "1.0.4", + "resolved": "https://registry.npmjs.org/arraybuffer.prototype.slice/-/arraybuffer.prototype.slice-1.0.4.tgz", + "integrity": "sha512-BNoCY6SXXPQ7gF2opIP4GBE+Xw7U+pHMYKuzjgCN3GwiaIR09UUeKfheyIry77QtrCBlC0KK0q5/TER/tYh3PQ==", "dev": true, "license": "MIT", "dependencies": { "array-buffer-byte-length": "^1.0.1", - "call-bind": "^1.0.5", + "call-bind": "^1.0.8", "define-properties": "^1.2.1", - "es-abstract": "^1.22.3", - "es-errors": "^1.2.1", - "get-intrinsic": "^1.2.3", - "is-array-buffer": "^3.0.4", - "is-shared-array-buffer": "^1.0.2" + "es-abstract": "^1.23.5", + "es-errors": "^1.3.0", + "get-intrinsic": "^1.2.6", + "is-array-buffer": "^3.0.4" }, "engines": { "node": ">= 0.4" @@ -3212,14 +2882,21 @@ "dev": true, "license": "MIT" }, - "node_modules/at-least-node": { + "node_modules/async": { + "version": "3.2.6", + "resolved": "https://registry.npmjs.org/async/-/async-3.2.6.tgz", + "integrity": "sha512-htCUDlxyyCLMgaM3xXg0C0LW2xqfuQ6p05pCEIsXuyQ+a1koYKTuBMzRNwmybfLgvJDMd0r1LTn4+E0Ti6C2AA==", + "dev": true, + "license": "MIT" + }, + "node_modules/async-function": { "version": "1.0.0", - "resolved": "https://registry.npmjs.org/at-least-node/-/at-least-node-1.0.0.tgz", - "integrity": "sha512-+q/t7Ekv1EDY2l6Gda6LLiX14rU9TV20Wa3ofeQmwPFZbOMo9DXrLbOjFaaclkXKWidIaopwAObQDqwWtGUjqg==", + "resolved": "https://registry.npmjs.org/async-function/-/async-function-1.0.0.tgz", + "integrity": "sha512-hsU18Ae8CDTR6Kgu9DYf0EbCr/a5iGL0rytQDobUcdpYOKokk8LEjVphnXkDkgpi0wYVsqrXuP0bZxJaTqdgoA==", "dev": true, - "license": "ISC", + "license": "MIT", "engines": { - "node": ">= 4.0.0" + "node": ">= 0.4" } }, "node_modules/available-typed-arrays": { @@ -3239,9 +2916,9 @@ } }, "node_modules/axe-core": { - "version": "4.7.0", - "resolved": "https://registry.npmjs.org/axe-core/-/axe-core-4.7.0.tgz", - "integrity": "sha512-M0JtH+hlOL5pLQwHOLNYZaXuhqmvS8oExsqB1SBYgA4Dk7u/xx+YdGHXaK5pyUfed5mYXdlYiphWq3G8cRi5JQ==", + "version": "4.10.3", + "resolved": "https://registry.npmjs.org/axe-core/-/axe-core-4.10.3.tgz", + "integrity": "sha512-Xm7bpRXnDSX2YE2YFfBk2FnF0ep6tmG7xPh8iHee8MIcrgq762Nkce856dYtJYLkuIoYZvGfTs/PbZhideTcEg==", "dev": true, "license": "MPL-2.0", "engines": { @@ -3249,13 +2926,13 @@ } }, "node_modules/axobject-query": { - "version": "3.2.1", - "resolved": "https://registry.npmjs.org/axobject-query/-/axobject-query-3.2.1.tgz", - "integrity": "sha512-jsyHu61e6N4Vbz/v18DHwWYKK0bSWLqn47eeDSKPB7m8tqMHF9YJ+mhIk2lVteyZrY8tnSj/jHOv4YiTCuCJgg==", + "version": "4.1.0", + "resolved": "https://registry.npmjs.org/axobject-query/-/axobject-query-4.1.0.tgz", + "integrity": "sha512-qIj0G9wZbMGNLjLmg1PT6v2mE9AH2zlnADJD/2tC6E00hgmhUOfEB6greHPAfLRSufHqROIUTkw6E+M3lH0PTQ==", "dev": true, "license": "Apache-2.0", - "dependencies": { - "dequal": "^2.0.3" + "engines": { + "node": ">= 0.4" } }, "node_modules/babel-jest": { @@ -3280,6 +2957,16 @@ "@babel/core": "^7.8.0" } }, + "node_modules/babel-jest/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/babel-plugin-istanbul": { "version": "6.1.1", "resolved": "https://registry.npmjs.org/babel-plugin-istanbul/-/babel-plugin-istanbul-6.1.1.tgz", @@ -3341,24 +3028,27 @@ } }, "node_modules/babel-preset-current-node-syntax": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/babel-preset-current-node-syntax/-/babel-preset-current-node-syntax-1.0.1.tgz", - "integrity": "sha512-M7LQ0bxarkxQoN+vz5aJPsLBn77n8QgTFmo8WK0/44auK2xlCXrYcUxHFxgU7qW5Yzw/CjmLRK2uJzaCd7LvqQ==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/babel-preset-current-node-syntax/-/babel-preset-current-node-syntax-1.1.0.tgz", + "integrity": "sha512-ldYss8SbBlWva1bs28q78Ju5Zq1F+8BrqBZZ0VFhLBvhh6lCpC2o3gDJi/5DRLs9FgYZCnmPYIVFU4lRXCkyUw==", "dev": true, "license": "MIT", "dependencies": { "@babel/plugin-syntax-async-generators": "^7.8.4", "@babel/plugin-syntax-bigint": "^7.8.3", - "@babel/plugin-syntax-class-properties": "^7.8.3", - "@babel/plugin-syntax-import-meta": "^7.8.3", + "@babel/plugin-syntax-class-properties": "^7.12.13", + "@babel/plugin-syntax-class-static-block": "^7.14.5", + "@babel/plugin-syntax-import-attributes": "^7.24.7", + "@babel/plugin-syntax-import-meta": "^7.10.4", "@babel/plugin-syntax-json-strings": "^7.8.3", - "@babel/plugin-syntax-logical-assignment-operators": "^7.8.3", + "@babel/plugin-syntax-logical-assignment-operators": "^7.10.4", "@babel/plugin-syntax-nullish-coalescing-operator": "^7.8.3", - "@babel/plugin-syntax-numeric-separator": "^7.8.3", + "@babel/plugin-syntax-numeric-separator": "^7.10.4", "@babel/plugin-syntax-object-rest-spread": "^7.8.3", "@babel/plugin-syntax-optional-catch-binding": "^7.8.3", "@babel/plugin-syntax-optional-chaining": "^7.8.3", - "@babel/plugin-syntax-top-level-await": "^7.8.3" + "@babel/plugin-syntax-private-property-in-object": "^7.14.5", + "@babel/plugin-syntax-top-level-await": "^7.14.5" }, "peerDependencies": { "@babel/core": "^7.0.0" @@ -3409,19 +3099,6 @@ ], "license": "MIT" }, - "node_modules/binary-extensions": { - "version": "2.3.0", - "resolved": "https://registry.npmjs.org/binary-extensions/-/binary-extensions-2.3.0.tgz", - "integrity": "sha512-Ceh+7ox5qe7LJuLHoY0feh3pHuUDHAcRUeyL2VYghZwfpkNIy/+8Ocg0a3UuSoYzavmylwuLWQOf3hl0jjMMIw==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=8" - }, - "funding": { - "url": "https://github.com/sponsors/sindresorhus" - } - }, "node_modules/bl": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/bl/-/bl-4.1.0.tgz", @@ -3450,9 +3127,9 @@ } }, "node_modules/brace-expansion": { - "version": "2.0.1", - "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-2.0.1.tgz", - "integrity": "sha512-XnAIvQ8eM+kC6aULx6wuQiwVsnzsi9d3WxzV3FpWTGA19F621kwdbsAcFKXgKUHZWsy+mY6iL1sHTxWEFCytDA==", + "version": "2.0.2", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-2.0.2.tgz", + "integrity": "sha512-Jt0vHyM+jmUBqojB7E1NIYadt0vI0Qxjxd2TErW94wDz+E2LAm5vKMXXwg6ZZBTHPuUlDgQHKXvjGBdfcF1ZDQ==", "dev": true, "license": "MIT", "dependencies": { @@ -3473,9 +3150,9 @@ } }, "node_modules/browserslist": { - "version": "4.23.1", - "resolved": "https://registry.npmjs.org/browserslist/-/browserslist-4.23.1.tgz", - "integrity": "sha512-TUfofFo/KsK/bWZ9TWQ5O26tsWW4Uhmt8IYklbnUa70udB6P2wA7w7o4PY4muaEPBQaAX+CEnmmIA41NVHtPVw==", + "version": "4.24.4", + "resolved": "https://registry.npmjs.org/browserslist/-/browserslist-4.24.4.tgz", + "integrity": "sha512-KDi1Ny1gSePi1vm0q4oxSF8b4DR44GF4BbmS2YdhPLOEqd8pDviZOGH/GsmRwoWJ2+5Lr085X7naowMwKHDG1A==", "dev": true, "funding": [ { @@ -3493,10 +3170,10 @@ ], "license": "MIT", "dependencies": { - "caniuse-lite": "^1.0.30001629", - "electron-to-chromium": "^1.4.796", - "node-releases": "^2.0.14", - "update-browserslist-db": "^1.0.16" + "caniuse-lite": "^1.0.30001688", + "electron-to-chromium": "^1.5.73", + "node-releases": "^2.0.19", + "update-browserslist-db": "^1.1.1" }, "bin": { "browserslist": "cli.js" @@ -3561,9 +3238,9 @@ "license": "MIT" }, "node_modules/bundle-require": { - "version": "4.2.1", - "resolved": "https://registry.npmjs.org/bundle-require/-/bundle-require-4.2.1.tgz", - "integrity": "sha512-7Q/6vkyYAwOmQNRw75x+4yRtZCZJXUDmHHlFdkiV0wgv/reNjtJwpu1jPJ0w2kbEpIM0uoKI3S4/f39dU7AjSA==", + "version": "5.1.0", + "resolved": "https://registry.npmjs.org/bundle-require/-/bundle-require-5.1.0.tgz", + "integrity": "sha512-3WrrOuZiyaaZPWiEt4G3+IffISVC9HYlWueJEBWED4ZH4aIAC2PnkdnuRrR94M+w6yGWn4AglWtJtBI8YqvgoA==", "dev": true, "license": "MIT", "dependencies": { @@ -3573,7 +3250,7 @@ "node": "^12.20.0 || ^14.13.1 || >=16.0.0" }, "peerDependencies": { - "esbuild": ">=0.17" + "esbuild": ">=0.18" } }, "node_modules/cac": { @@ -3587,17 +3264,47 @@ } }, "node_modules/call-bind": { - "version": "1.0.7", - "resolved": "https://registry.npmjs.org/call-bind/-/call-bind-1.0.7.tgz", - "integrity": "sha512-GHTSNSYICQ7scH7sZ+M2rFopRoLh8t2bLSW6BbgrtLsahOIB5iyAVJf9GjWK3cYTDaMj4XdBpM1cA6pIS0Kv2w==", + "version": "1.0.8", + "resolved": "https://registry.npmjs.org/call-bind/-/call-bind-1.0.8.tgz", + "integrity": "sha512-oKlSFMcMwpUg2ednkhQ454wfWiU/ul3CkJe/PEHcTKuiX6RpbehUiFMXu13HalGZxfUwCQzZG747YXBn1im9ww==", "dev": true, "license": "MIT", "dependencies": { + "call-bind-apply-helpers": "^1.0.0", "es-define-property": "^1.0.0", - "es-errors": "^1.3.0", - "function-bind": "^1.1.2", "get-intrinsic": "^1.2.4", - "set-function-length": "^1.2.1" + "set-function-length": "^1.2.2" + }, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/call-bind-apply-helpers": { + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/call-bind-apply-helpers/-/call-bind-apply-helpers-1.0.2.tgz", + "integrity": "sha512-Sp1ablJ0ivDkSzjcaJdxEunN5/XvksFJ2sMBFfq6x0ryhQV/2b/KwFe21cMpmHtPOSij8K99/wSfoEuTObmuMQ==", + "dev": true, + "license": "MIT", + "dependencies": { + "es-errors": "^1.3.0", + "function-bind": "^1.1.2" + }, + "engines": { + "node": ">= 0.4" + } + }, + "node_modules/call-bound": { + "version": "1.0.4", + "resolved": "https://registry.npmjs.org/call-bound/-/call-bound-1.0.4.tgz", + "integrity": "sha512-+ys997U96po4Kx/ABpBCqhA9EuxJaQWDQg7295H4hBphv3IZg0boBKuwYpt4YXp6MZ5AmZQnU/tyMTlRpaSejg==", + "dev": true, + "license": "MIT", + "dependencies": { + "call-bind-apply-helpers": "^1.0.2", + "get-intrinsic": "^1.3.0" }, "engines": { "node": ">= 0.4" @@ -3627,9 +3334,9 @@ } }, "node_modules/caniuse-lite": { - "version": "1.0.30001632", - "resolved": "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001632.tgz", - "integrity": "sha512-udx3o7yHJfUxMLkGohMlVHCvFvWmirKh9JAH/d7WOLPetlH+LTL5cocMZ0t7oZx/mdlOWXti97xLZWc8uURRHg==", + "version": "1.0.30001703", + "resolved": "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001703.tgz", + "integrity": "sha512-kRlAGTRWgPsOj7oARC9m1okJEXdL/8fekFVcxA8Hl7GH4r/sN4OJn/i6Flde373T50KS7Y37oFbMwlE8+F42kQ==", "dev": true, "funding": [ { @@ -3674,36 +3381,20 @@ "node": ">=10" } }, - "node_modules/chardet": { - "version": "0.7.0", - "resolved": "https://registry.npmjs.org/chardet/-/chardet-0.7.0.tgz", - "integrity": "sha512-mT8iDcrh03qDGRRmoA2hmBJnxpllMR+0/0qlzjqZES6NdiWDcZkCNAk4rPFZ9Q85r27unkiNNg8ZOiwZXBHwcA==", - "dev": true, - "license": "MIT" - }, "node_modules/chokidar": { - "version": "3.6.0", - "resolved": "https://registry.npmjs.org/chokidar/-/chokidar-3.6.0.tgz", - "integrity": "sha512-7VT13fmjotKpGipCW9JEQAusEPE+Ei8nl6/g4FBAmIm0GOOLMua9NDDo/DWp0ZAxCr3cPq5ZpBqmPAQgDda2Pw==", + "version": "4.0.3", + "resolved": "https://registry.npmjs.org/chokidar/-/chokidar-4.0.3.tgz", + "integrity": "sha512-Qgzu8kfBvo+cA4962jnP1KkS6Dop5NS6g7R5LFYJr4b8Ub94PPQXUksCw9PvXoeXPRRddRNC5C1JQUR2SMGtnA==", "dev": true, "license": "MIT", "dependencies": { - "anymatch": "~3.1.2", - "braces": "~3.0.2", - "glob-parent": "~5.1.2", - "is-binary-path": "~2.1.0", - "is-glob": "~4.0.1", - "normalize-path": "~3.0.0", - "readdirp": "~3.6.0" + "readdirp": "^4.0.1" }, "engines": { - "node": ">= 8.10.0" + "node": ">= 14.16.0" }, "funding": { "url": "https://paulmillr.com/funding/" - }, - "optionalDependencies": { - "fsevents": "~2.3.2" } }, "node_modules/chownr": { @@ -3730,35 +3421,12 @@ } }, "node_modules/cjs-module-lexer": { - "version": "1.3.1", - "resolved": "https://registry.npmjs.org/cjs-module-lexer/-/cjs-module-lexer-1.3.1.tgz", - "integrity": "sha512-a3KdPAANPbNE4ZUv9h6LckSl9zLsYOP4MBmhIPkRaeyybt+r4UghLvq+xw/YwUcC1gqylCkL4rdVs3Lwupjm4Q==", + "version": "1.4.3", + "resolved": "https://registry.npmjs.org/cjs-module-lexer/-/cjs-module-lexer-1.4.3.tgz", + "integrity": "sha512-9z8TZaGM1pfswYeXrUpzPrkx8UnWYdhJclsiYMm6x/w5+nN+8Tf/LnAgfLGQCm59qAOxU8WwHEq2vNwF6i4j+Q==", "dev": true, "license": "MIT" }, - "node_modules/clean-stack": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/clean-stack/-/clean-stack-2.2.0.tgz", - "integrity": "sha512-4diC9HaTE+KRAMWhDhrGOECgWZxoevMc5TlkObMqNSsVU62PYzXZ/SMTjzyGAFF1YusgxGcSWTEXBhp0CPwQ1A==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=6" - } - }, - "node_modules/cli-cursor": { - "version": "3.1.0", - "resolved": "https://registry.npmjs.org/cli-cursor/-/cli-cursor-3.1.0.tgz", - "integrity": "sha512-I/zHAwsKf9FqGoXM4WWRACob9+SNukZTd94DWF57E4toouRulbCxcUh6RKUEOQlYTHJnzkPMySvPNaaSLNfLZw==", - "dev": true, - "license": "MIT", - "dependencies": { - "restore-cursor": "^3.1.0" - }, - "engines": { - "node": ">=8" - } - }, "node_modules/cli-progress": { "version": "3.12.0", "resolved": "https://registry.npmjs.org/cli-progress/-/cli-progress-3.12.0.tgz", @@ -3772,19 +3440,6 @@ "node": ">=4" } }, - "node_modules/cli-spinners": { - "version": "2.9.2", - "resolved": "https://registry.npmjs.org/cli-spinners/-/cli-spinners-2.9.2.tgz", - "integrity": "sha512-ywqV+5MmyL4E7ybXgKys4DugZbX0FC6LnwrhjuykIjnK9k8OQacQ7axGKnjDXWNhns0xot3bZI5h55H8yo9cJg==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=6" - }, - "funding": { - "url": "https://github.com/sponsors/sindresorhus" - } - }, "node_modules/cli-table3": { "version": "0.6.5", "resolved": "https://registry.npmjs.org/cli-table3/-/cli-table3-0.6.5.tgz", @@ -3801,16 +3456,6 @@ "@colors/colors": "1.5.0" } }, - "node_modules/cli-width": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/cli-width/-/cli-width-3.0.0.tgz", - "integrity": "sha512-FxqpkPPwu1HjuN93Omfm4h8uIanXofW0RxVEW3k5RKx+mJJYSthzNhp32Kzxxy3YAEZ/Dc/EWN1vZRY0+kOhbw==", - "dev": true, - "license": "ISC", - "engines": { - "node": ">= 10" - } - }, "node_modules/cliui": { "version": "7.0.4", "resolved": "https://registry.npmjs.org/cliui/-/cliui-7.0.4.tgz", @@ -3823,34 +3468,6 @@ "wrap-ansi": "^7.0.0" } }, - "node_modules/cliui/node_modules/wrap-ansi": { - "version": "7.0.0", - "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-7.0.0.tgz", - "integrity": "sha512-YVGIj2kamLSTxw6NsZjoBxfSwsn0ycdesmc4p+Q21c5zPuZ1pl+NfxVdxPtdHvmNVOQ6XSYG4AUtyt/Fi7D16Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "ansi-styles": "^4.0.0", - "string-width": "^4.1.0", - "strip-ansi": "^6.0.0" - }, - "engines": { - "node": ">=10" - }, - "funding": { - "url": "https://github.com/chalk/wrap-ansi?sponsor=1" - } - }, - "node_modules/clone": { - "version": "1.0.4", - "resolved": "https://registry.npmjs.org/clone/-/clone-1.0.4.tgz", - "integrity": "sha512-JQHZ2QMW6l3aH/j6xCqQThY/9OH4D/9ls34cgkUBiEeocRTU04tHfKPBsUK1PqZCUQM7GiA0IIXJSuXHI64Kbg==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=0.8" - } - }, "node_modules/co": { "version": "4.6.0", "resolved": "https://registry.npmjs.org/co/-/co-4.6.0.tgz", @@ -3910,9 +3527,9 @@ } }, "node_modules/compare-versions": { - "version": "6.1.0", - "resolved": "https://registry.npmjs.org/compare-versions/-/compare-versions-6.1.0.tgz", - "integrity": "sha512-LNZQXhqUvqUTotpZ00qLSaify3b4VFD588aRr8MKFw4CMUr98ytzCW5wDH5qx/DEY5kCDXcbcRuCqL0szEf2tg==", + "version": "6.1.1", + "resolved": "https://registry.npmjs.org/compare-versions/-/compare-versions-6.1.1.tgz", + "integrity": "sha512-4hm4VPpIecmlg59CHXnRDnqGplJFrbLG4aFEl5vl6cK1u76ws3LLvX7ikFnTDl5vo39sjWD6AaDPYodJp/NNHg==", "dev": true, "license": "MIT" }, @@ -3923,6 +3540,16 @@ "dev": true, "license": "MIT" }, + "node_modules/consola": { + "version": "3.4.0", + "resolved": "https://registry.npmjs.org/consola/-/consola-3.4.0.tgz", + "integrity": "sha512-EiPU8G6dQG0GFHNR8ljnZFki/8a+cQwEQ+7wpxdChl02Q8HXlwEZWD5lqAF8vC2sEC3Tehr8hy7vErz88LHyUA==", + "dev": true, + "license": "MIT", + "engines": { + "node": "^14.18.0 || >=16.10.0" + } + }, "node_modules/convert-source-map": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/convert-source-map/-/convert-source-map-2.0.0.tgz", @@ -3951,9 +3578,9 @@ } }, "node_modules/copyfiles/node_modules/brace-expansion": { - "version": "1.1.11", - "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz", - "integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==", + "version": "1.1.12", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.12.tgz", + "integrity": "sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==", "dev": true, "license": "MIT", "dependencies": { @@ -4004,9 +3631,9 @@ } }, "node_modules/cross-spawn": { - "version": "7.0.3", - "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.3.tgz", - "integrity": "sha512-iRDPJKUPVEND7dHPO8rkbOnPpyDygcDFtWjpeWNCgy8WP2rXcxXL8TskReQl6OrB2G7+UJrags1q15Fudc7G6w==", + "version": "7.0.6", + "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.6.tgz", + "integrity": "sha512-uV2QOWP2nWzsy2aMp8aRibhi9dlzF5Hgh5SHaB9OiTGEyDTiJJyx0uy51QXdyWbtAHNua4XJzUKca3OzKUd3vA==", "dev": true, "license": "MIT", "dependencies": { @@ -4026,15 +3653,15 @@ "license": "BSD-2-Clause" }, "node_modules/data-view-buffer": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/data-view-buffer/-/data-view-buffer-1.0.1.tgz", - "integrity": "sha512-0lht7OugA5x3iJLOWFhWK/5ehONdprk0ISXqVFn/NFrDu+cuc8iADFrGQz5BnRK7LLU3JmkbXSxaqX+/mXYtUA==", + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/data-view-buffer/-/data-view-buffer-1.0.2.tgz", + "integrity": "sha512-EmKO5V3OLXh1rtK2wgXRansaK1/mtVdTUEiEI0W8RkvgT05kfxaH29PliLnpLP73yYO6142Q72QNa8Wx/A5CqQ==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.6", + "call-bound": "^1.0.3", "es-errors": "^1.3.0", - "is-data-view": "^1.0.1" + "is-data-view": "^1.0.2" }, "engines": { "node": ">= 0.4" @@ -4044,31 +3671,31 @@ } }, "node_modules/data-view-byte-length": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/data-view-byte-length/-/data-view-byte-length-1.0.1.tgz", - "integrity": "sha512-4J7wRJD3ABAzr8wP+OcIcqq2dlUKp4DVflx++hs5h5ZKydWMI6/D/fAot+yh6g2tHh8fLFTvNOaVN357NvSrOQ==", + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/data-view-byte-length/-/data-view-byte-length-1.0.2.tgz", + "integrity": "sha512-tuhGbE6CfTM9+5ANGf+oQb72Ky/0+s3xKUpHvShfiz2RxMFgFPjsXuRLBVMtvMs15awe45SRb83D6wH4ew6wlQ==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7", + "call-bound": "^1.0.3", "es-errors": "^1.3.0", - "is-data-view": "^1.0.1" + "is-data-view": "^1.0.2" }, "engines": { "node": ">= 0.4" }, "funding": { - "url": "https://github.com/sponsors/ljharb" + "url": "https://github.com/sponsors/inspect-js" } }, "node_modules/data-view-byte-offset": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/data-view-byte-offset/-/data-view-byte-offset-1.0.0.tgz", - "integrity": "sha512-t/Ygsytq+R995EJ5PZlD4Cu56sWa8InXySaViRzw9apusqsOO2bQP+SbYzAhR0pFKoB+43lYy8rWban9JSuXnA==", + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/data-view-byte-offset/-/data-view-byte-offset-1.0.1.tgz", + "integrity": "sha512-BS8PfmtDGnrgYdOonGZQdLZslWIeCGFP9tpan0hi1Co2Zr2NKADsvGYA8XxuG/4UWgJ6Cjtv+YJnB6MM69QGlQ==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.6", + "call-bound": "^1.0.2", "es-errors": "^1.3.0", "is-data-view": "^1.0.1" }, @@ -4080,13 +3707,13 @@ } }, "node_modules/debug": { - "version": "4.3.5", - "resolved": "https://registry.npmjs.org/debug/-/debug-4.3.5.tgz", - "integrity": "sha512-pt0bNEmneDIvdL1Xsd9oDQ/wrQRkXDT4AUWlNZNPKvW5x/jyO9VFXkJUP07vQ2upmw5PlaITaPKc31jK13V+jg==", + "version": "4.4.0", + "resolved": "https://registry.npmjs.org/debug/-/debug-4.4.0.tgz", + "integrity": "sha512-6WTZ/IxCY/T6BALoZHaE4ctp9xm+Z5kY/pzYaCHRFeyVhojxlrm+46y68HA6hr0TcwEssoxNiDEUJQjfPZ/RYA==", "dev": true, "license": "MIT", "dependencies": { - "ms": "2.1.2" + "ms": "^2.1.3" }, "engines": { "node": ">=6.0" @@ -4128,6 +3755,12 @@ } } }, + "node_modules/deep-diff": { + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/deep-diff/-/deep-diff-1.0.2.tgz", + "integrity": "sha512-aWS3UIVH+NPGCD1kki+DCU9Dua032iSsO43LqQpcs4R3+dVv7tX0qBGjiVHJHjplsoUM2XRO/KB92glqc68awg==", + "license": "MIT" + }, "node_modules/deep-extend": { "version": "0.6.0", "resolved": "https://registry.npmjs.org/deep-extend/-/deep-extend-0.6.0.tgz", @@ -4155,19 +3788,6 @@ "node": ">=0.10.0" } }, - "node_modules/defaults": { - "version": "1.0.4", - "resolved": "https://registry.npmjs.org/defaults/-/defaults-1.0.4.tgz", - "integrity": "sha512-eFuaLoy/Rxalv2kr+lqMlUnrDWV+3j4pljOIJgLIhI058IQfWJ7vXhyEIHu+HtC738klGALYxOKDO0bQP3tg8A==", - "dev": true, - "license": "MIT", - "dependencies": { - "clone": "^1.0.2" - }, - "funding": { - "url": "https://github.com/sponsors/sindresorhus" - } - }, "node_modules/define-data-property": { "version": "1.1.4", "resolved": "https://registry.npmjs.org/define-data-property/-/define-data-property-1.1.4.tgz", @@ -4205,53 +3825,68 @@ } }, "node_modules/del": { - "version": "6.1.1", - "resolved": "https://registry.npmjs.org/del/-/del-6.1.1.tgz", - "integrity": "sha512-ua8BhapfP0JUJKC/zV9yHHDW/rDoDxP4Zhn3AkA6/xT6gY7jYXJiaeyBZznYVujhZZET+UgcbZiQ7sN3WqcImg==", + "version": "8.0.0", + "resolved": "https://registry.npmjs.org/del/-/del-8.0.0.tgz", + "integrity": "sha512-R6ep6JJ+eOBZsBr9esiNN1gxFbZE4Q2cULkUSFumGYecAiS6qodDvcPx/sFuWHMNul7DWmrtoEOpYSm7o6tbSA==", "dev": true, "license": "MIT", "dependencies": { - "globby": "^11.0.1", - "graceful-fs": "^4.2.4", - "is-glob": "^4.0.1", - "is-path-cwd": "^2.2.0", - "is-path-inside": "^3.0.2", - "p-map": "^4.0.0", - "rimraf": "^3.0.2", - "slash": "^3.0.0" + "globby": "^14.0.2", + "is-glob": "^4.0.3", + "is-path-cwd": "^3.0.0", + "is-path-inside": "^4.0.0", + "p-map": "^7.0.2", + "slash": "^5.1.0" }, "engines": { - "node": ">=10" + "node": ">=18" }, "funding": { "url": "https://github.com/sponsors/sindresorhus" } }, - "node_modules/del/node_modules/rimraf": { - "version": "3.0.2", - "resolved": "https://registry.npmjs.org/rimraf/-/rimraf-3.0.2.tgz", - "integrity": "sha512-JZkJMZkAGFFPP2YqXZXPbMlMBgsxzE8ILs4lMIX/2o0L9UBw9O/Y3o6wFw/i9YLapcUJWwqbi3kdxIPdC62TIA==", - "deprecated": "Rimraf versions prior to v4 are no longer supported", + "node_modules/del/node_modules/globby": { + "version": "14.1.0", + "resolved": "https://registry.npmjs.org/globby/-/globby-14.1.0.tgz", + "integrity": "sha512-0Ia46fDOaT7k4og1PDW4YbodWWr3scS2vAr2lTbsplOt2WkKp0vQbkI9wKis/T5LV/dqPjO3bpS/z6GTJB82LA==", "dev": true, - "license": "ISC", + "license": "MIT", "dependencies": { - "glob": "^7.1.3" + "@sindresorhus/merge-streams": "^2.1.0", + "fast-glob": "^3.3.3", + "ignore": "^7.0.3", + "path-type": "^6.0.0", + "slash": "^5.1.0", + "unicorn-magic": "^0.3.0" }, - "bin": { - "rimraf": "bin.js" + "engines": { + "node": ">=18" }, "funding": { - "url": "https://github.com/sponsors/isaacs" + "url": "https://github.com/sponsors/sindresorhus" } }, - "node_modules/dequal": { - "version": "2.0.3", - "resolved": "https://registry.npmjs.org/dequal/-/dequal-2.0.3.tgz", - "integrity": "sha512-0je+qPKHEMohvfRTCEo3CrPG6cAzAYgmzKyxRiYSSDkS6eGJdyVJm7WaYA5ECaAD9wLB2T4EEeymA5aFVcYXCA==", + "node_modules/del/node_modules/ignore": { + "version": "7.0.3", + "resolved": "https://registry.npmjs.org/ignore/-/ignore-7.0.3.tgz", + "integrity": "sha512-bAH5jbK/F3T3Jls4I0SO1hmPR0dKU0a7+SY6n1yzRtG54FLO8d6w/nxLFX2Nb7dBu6cCWXPaAME6cYqFUMmuCA==", "dev": true, "license": "MIT", "engines": { - "node": ">=6" + "node": ">= 4" + } + }, + "node_modules/del/node_modules/path-type": { + "version": "6.0.0", + "resolved": "https://registry.npmjs.org/path-type/-/path-type-6.0.0.tgz", + "integrity": "sha512-Vj7sf++t5pBD637NSfkxpHSMfWaeig5+DKWLhcqIYx6mWQz5hdJTGDVMQiJcw1ZYkhs7AazKDGpRVji1LJCZUQ==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=18" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" } }, "node_modules/detect-libc": { @@ -4302,12 +3937,27 @@ "resolved": "https://registry.npmjs.org/doctrine/-/doctrine-3.0.0.tgz", "integrity": "sha512-yS+Q5i3hBf7GBkd4KG8a7eBNNWNGLTaEwwYWUijIYM7zrlYDM0BFXHjjPWlWZ1Rg7UaddZeIDmi9jF3HmqiQ2w==", "dev": true, - "license": "Apache-2.0", + "license": "Apache-2.0", + "dependencies": { + "esutils": "^2.0.2" + }, + "engines": { + "node": ">=6.0.0" + } + }, + "node_modules/dunder-proto": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/dunder-proto/-/dunder-proto-1.0.1.tgz", + "integrity": "sha512-KIN/nDJBQRcXw0MLVhZE9iQHmG68qAVIBg9CqmUYjmQIhgij9U5MFvrqkUL5FbtyyzZuOeOt0zdeRe4UY7ct+A==", + "dev": true, + "license": "MIT", "dependencies": { - "esutils": "^2.0.2" + "call-bind-apply-helpers": "^1.0.1", + "es-errors": "^1.3.0", + "gopd": "^1.2.0" }, "engines": { - "node": ">=6.0.0" + "node": ">= 0.4" } }, "node_modules/eastasianwidth": { @@ -4317,10 +3967,26 @@ "dev": true, "license": "MIT" }, + "node_modules/ejs": { + "version": "3.1.10", + "resolved": "https://registry.npmjs.org/ejs/-/ejs-3.1.10.tgz", + "integrity": "sha512-UeJmFfOrAQS8OJWPZ4qtgHyWExa088/MtK5UEyoJGFH67cDEXkZSviOiKRCZ4Xij0zxI3JECgYs3oKx+AizQBA==", + "dev": true, + "license": "Apache-2.0", + "dependencies": { + "jake": "^10.8.5" + }, + "bin": { + "ejs": "bin/cli.js" + }, + "engines": { + "node": ">=0.10.0" + } + }, "node_modules/electron-to-chromium": { - "version": "1.4.798", - "resolved": "https://registry.npmjs.org/electron-to-chromium/-/electron-to-chromium-1.4.798.tgz", - "integrity": "sha512-by9J2CiM9KPGj9qfp5U4FcPSbXJG7FNzqnYaY4WLzX+v2PHieVGmnsA4dxfpGE3QEC7JofpPZmn7Vn1B9NR2+Q==", + "version": "1.5.114", + "resolved": "https://registry.npmjs.org/electron-to-chromium/-/electron-to-chromium-1.5.114.tgz", + "integrity": "sha512-DFptFef3iktoKlFQK/afbo274/XNWD00Am0xa7M8FZUepHlHT8PEuiNBoRfFHbH1okqN58AlhbJ4QTkcnXorjA==", "dev": true, "license": "ISC" }, @@ -4365,58 +4031,63 @@ } }, "node_modules/es-abstract": { - "version": "1.23.3", - "resolved": "https://registry.npmjs.org/es-abstract/-/es-abstract-1.23.3.tgz", - "integrity": "sha512-e+HfNH61Bj1X9/jLc5v1owaLYuHdeHHSQlkhCBiTK8rBvKaULl/beGMxwrMXjpYrv4pz22BlY570vVePA2ho4A==", + "version": "1.23.9", + "resolved": "https://registry.npmjs.org/es-abstract/-/es-abstract-1.23.9.tgz", + "integrity": "sha512-py07lI0wjxAC/DcfK1S6G7iANonniZwTISvdPzk9hzeH0IZIshbuuFxLIU96OyF89Yb9hiqWn8M/bY83KY5vzA==", "dev": true, "license": "MIT", "dependencies": { - "array-buffer-byte-length": "^1.0.1", - "arraybuffer.prototype.slice": "^1.0.3", + "array-buffer-byte-length": "^1.0.2", + "arraybuffer.prototype.slice": "^1.0.4", "available-typed-arrays": "^1.0.7", - "call-bind": "^1.0.7", - "data-view-buffer": "^1.0.1", - "data-view-byte-length": "^1.0.1", - "data-view-byte-offset": "^1.0.0", - "es-define-property": "^1.0.0", + "call-bind": "^1.0.8", + "call-bound": "^1.0.3", + "data-view-buffer": "^1.0.2", + "data-view-byte-length": "^1.0.2", + "data-view-byte-offset": "^1.0.1", + "es-define-property": "^1.0.1", "es-errors": "^1.3.0", "es-object-atoms": "^1.0.0", - "es-set-tostringtag": "^2.0.3", - "es-to-primitive": "^1.2.1", - "function.prototype.name": "^1.1.6", - "get-intrinsic": "^1.2.4", - "get-symbol-description": "^1.0.2", - "globalthis": "^1.0.3", - "gopd": "^1.0.1", + "es-set-tostringtag": "^2.1.0", + "es-to-primitive": "^1.3.0", + "function.prototype.name": "^1.1.8", + "get-intrinsic": "^1.2.7", + "get-proto": "^1.0.0", + "get-symbol-description": "^1.1.0", + "globalthis": "^1.0.4", + "gopd": "^1.2.0", "has-property-descriptors": "^1.0.2", - "has-proto": "^1.0.3", - "has-symbols": "^1.0.3", + "has-proto": "^1.2.0", + "has-symbols": "^1.1.0", "hasown": "^2.0.2", - "internal-slot": "^1.0.7", - "is-array-buffer": "^3.0.4", + "internal-slot": "^1.1.0", + "is-array-buffer": "^3.0.5", "is-callable": "^1.2.7", - "is-data-view": "^1.0.1", - "is-negative-zero": "^2.0.3", - "is-regex": "^1.1.4", - "is-shared-array-buffer": "^1.0.3", - "is-string": "^1.0.7", - "is-typed-array": "^1.1.13", - "is-weakref": "^1.0.2", - "object-inspect": "^1.13.1", + "is-data-view": "^1.0.2", + "is-regex": "^1.2.1", + "is-shared-array-buffer": "^1.0.4", + "is-string": "^1.1.1", + "is-typed-array": "^1.1.15", + "is-weakref": "^1.1.0", + "math-intrinsics": "^1.1.0", + "object-inspect": "^1.13.3", "object-keys": "^1.1.1", - "object.assign": "^4.1.5", - "regexp.prototype.flags": "^1.5.2", - "safe-array-concat": "^1.1.2", - "safe-regex-test": "^1.0.3", - "string.prototype.trim": "^1.2.9", - "string.prototype.trimend": "^1.0.8", + "object.assign": "^4.1.7", + "own-keys": "^1.0.1", + "regexp.prototype.flags": "^1.5.3", + "safe-array-concat": "^1.1.3", + "safe-push-apply": "^1.0.0", + "safe-regex-test": "^1.1.0", + "set-proto": "^1.0.0", + "string.prototype.trim": "^1.2.10", + "string.prototype.trimend": "^1.0.9", "string.prototype.trimstart": "^1.0.8", - "typed-array-buffer": "^1.0.2", - "typed-array-byte-length": "^1.0.1", - "typed-array-byte-offset": "^1.0.2", - "typed-array-length": "^1.0.6", - "unbox-primitive": "^1.0.2", - "which-typed-array": "^1.1.15" + "typed-array-buffer": "^1.0.3", + "typed-array-byte-length": "^1.0.3", + "typed-array-byte-offset": "^1.0.4", + "typed-array-length": "^1.0.7", + "unbox-primitive": "^1.1.0", + "which-typed-array": "^1.1.18" }, "engines": { "node": ">= 0.4" @@ -4426,14 +4097,11 @@ } }, "node_modules/es-define-property": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/es-define-property/-/es-define-property-1.0.0.tgz", - "integrity": "sha512-jxayLKShrEqqzJ0eumQbVhTYQM27CfT1T35+gCgDFoL82JLsXqTJ76zv6A0YLOgEnLUMvLzsDsGIrl8NFpT2gQ==", + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/es-define-property/-/es-define-property-1.0.1.tgz", + "integrity": "sha512-e3nRfgfUZ4rNGL232gUgX06QNyyez04KdjFrF+LTRoOXmrOgFKDg4BCdsjW8EnT69eqdYGmRpJwiPVYNrCaW3g==", "dev": true, "license": "MIT", - "dependencies": { - "get-intrinsic": "^1.2.4" - }, "engines": { "node": ">= 0.4" } @@ -4448,36 +4116,10 @@ "node": ">= 0.4" } }, - "node_modules/es-iterator-helpers": { - "version": "1.0.19", - "resolved": "https://registry.npmjs.org/es-iterator-helpers/-/es-iterator-helpers-1.0.19.tgz", - "integrity": "sha512-zoMwbCcH5hwUkKJkT8kDIBZSz9I6mVG//+lDCinLCGov4+r7NIy0ld8o03M0cJxl2spVf6ESYVS6/gpIfq1FFw==", - "dev": true, - "license": "MIT", - "dependencies": { - "call-bind": "^1.0.7", - "define-properties": "^1.2.1", - "es-abstract": "^1.23.3", - "es-errors": "^1.3.0", - "es-set-tostringtag": "^2.0.3", - "function-bind": "^1.1.2", - "get-intrinsic": "^1.2.4", - "globalthis": "^1.0.3", - "has-property-descriptors": "^1.0.2", - "has-proto": "^1.0.3", - "has-symbols": "^1.0.3", - "internal-slot": "^1.0.7", - "iterator.prototype": "^1.1.2", - "safe-array-concat": "^1.1.2" - }, - "engines": { - "node": ">= 0.4" - } - }, "node_modules/es-object-atoms": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/es-object-atoms/-/es-object-atoms-1.0.0.tgz", - "integrity": "sha512-MZ4iQ6JwHOBQjahnjwaC1ZtIBH+2ohjamzAO3oaHcXYup7qxjF2fixyH+Q71voWHeOkI2q/TnJao/KfXYIZWbw==", + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/es-object-atoms/-/es-object-atoms-1.1.1.tgz", + "integrity": "sha512-FGgH2h8zKNim9ljj7dankFPcICIK9Cp5bm+c2gQSYePhpaG5+esrLODihIorn+Pe6FGJzWhXQotPv73jTaldXA==", "dev": true, "license": "MIT", "dependencies": { @@ -4488,40 +4130,44 @@ } }, "node_modules/es-set-tostringtag": { - "version": "2.0.3", - "resolved": "https://registry.npmjs.org/es-set-tostringtag/-/es-set-tostringtag-2.0.3.tgz", - "integrity": "sha512-3T8uNMC3OQTHkFUsFq8r/BwAXLHvU/9O9mE0fBc/MY5iq/8H7ncvO947LmYA6ldWw9Uh8Yhf25zu6n7nML5QWQ==", + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/es-set-tostringtag/-/es-set-tostringtag-2.1.0.tgz", + "integrity": "sha512-j6vWzfrGVfyXxge+O0x5sh6cvxAog0a/4Rdd2K36zCMV5eJ+/+tOAngRO8cODMNWbVRdVlmGZQL2YS3yR8bIUA==", "dev": true, "license": "MIT", "dependencies": { - "get-intrinsic": "^1.2.4", + "es-errors": "^1.3.0", + "get-intrinsic": "^1.2.6", "has-tostringtag": "^1.0.2", - "hasown": "^2.0.1" + "hasown": "^2.0.2" }, "engines": { "node": ">= 0.4" } }, "node_modules/es-shim-unscopables": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/es-shim-unscopables/-/es-shim-unscopables-1.0.2.tgz", - "integrity": "sha512-J3yBRXCzDu4ULnQwxyToo/OjdMx6akgVC7K6few0a7F/0wLtmKKN7I73AH5T2836UuXRqN7Qg+IIUw/+YJksRw==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/es-shim-unscopables/-/es-shim-unscopables-1.1.0.tgz", + "integrity": "sha512-d9T8ucsEhh8Bi1woXCf+TIKDIROLG5WCkxg8geBCbvk22kzwC5G2OnXVMO6FUsvQlgUUXQ2itephWDLqDzbeCw==", "dev": true, "license": "MIT", "dependencies": { - "hasown": "^2.0.0" + "hasown": "^2.0.2" + }, + "engines": { + "node": ">= 0.4" } }, "node_modules/es-to-primitive": { - "version": "1.2.1", - "resolved": "https://registry.npmjs.org/es-to-primitive/-/es-to-primitive-1.2.1.tgz", - "integrity": "sha512-QCOllgZJtaUo9miYBcLChTUaHNjJF3PYs1VidD7AwiEj1kYxKeQTctLAezAOH5ZKRH0g2IgPn6KwB4IT8iRpvA==", + "version": "1.3.0", + "resolved": "https://registry.npmjs.org/es-to-primitive/-/es-to-primitive-1.3.0.tgz", + "integrity": "sha512-w+5mJ3GuFL+NjVtJlvydShqE1eN3h3PbI7/5LAsYJP/2qtuMXjfL2LpHSRqo4b4eSF5K/DH1JXKUAHSB2UW50g==", "dev": true, "license": "MIT", "dependencies": { - "is-callable": "^1.1.4", - "is-date-object": "^1.0.1", - "is-symbol": "^1.0.2" + "is-callable": "^1.2.7", + "is-date-object": "^1.0.5", + "is-symbol": "^1.0.4" }, "engines": { "node": ">= 0.4" @@ -4531,9 +4177,9 @@ } }, "node_modules/esbuild": { - "version": "0.21.5", - "resolved": "https://registry.npmjs.org/esbuild/-/esbuild-0.21.5.tgz", - "integrity": "sha512-mg3OPMV4hXywwpoDxu3Qda5xCKQi+vCTZq8S9J/EpkhB2HzKXq4SNFZE3+NK93JYxc8VMSep+lOUSC/RVKaBqw==", + "version": "0.25.1", + "resolved": "https://registry.npmjs.org/esbuild/-/esbuild-0.25.1.tgz", + "integrity": "sha512-BGO5LtrGC7vxnqucAe/rmvKdJllfGaYWdyABvyMoXQlfYMb2bbRuReWR5tEGE//4LcNJj9XrkovTqNYRFZHAMQ==", "dev": true, "hasInstallScript": true, "license": "MIT", @@ -4541,38 +4187,40 @@ "esbuild": "bin/esbuild" }, "engines": { - "node": ">=12" + "node": ">=18" }, "optionalDependencies": { - "@esbuild/aix-ppc64": "0.21.5", - "@esbuild/android-arm": "0.21.5", - "@esbuild/android-arm64": "0.21.5", - "@esbuild/android-x64": "0.21.5", - "@esbuild/darwin-arm64": "0.21.5", - "@esbuild/darwin-x64": "0.21.5", - "@esbuild/freebsd-arm64": "0.21.5", - "@esbuild/freebsd-x64": "0.21.5", - "@esbuild/linux-arm": "0.21.5", - "@esbuild/linux-arm64": "0.21.5", - "@esbuild/linux-ia32": "0.21.5", - "@esbuild/linux-loong64": "0.21.5", - "@esbuild/linux-mips64el": "0.21.5", - "@esbuild/linux-ppc64": "0.21.5", - "@esbuild/linux-riscv64": "0.21.5", - "@esbuild/linux-s390x": "0.21.5", - "@esbuild/linux-x64": "0.21.5", - "@esbuild/netbsd-x64": "0.21.5", - "@esbuild/openbsd-x64": "0.21.5", - "@esbuild/sunos-x64": "0.21.5", - "@esbuild/win32-arm64": "0.21.5", - "@esbuild/win32-ia32": "0.21.5", - "@esbuild/win32-x64": "0.21.5" + "@esbuild/aix-ppc64": "0.25.1", + "@esbuild/android-arm": "0.25.1", + "@esbuild/android-arm64": "0.25.1", + "@esbuild/android-x64": "0.25.1", + "@esbuild/darwin-arm64": "0.25.1", + "@esbuild/darwin-x64": "0.25.1", + "@esbuild/freebsd-arm64": "0.25.1", + "@esbuild/freebsd-x64": "0.25.1", + "@esbuild/linux-arm": "0.25.1", + "@esbuild/linux-arm64": "0.25.1", + "@esbuild/linux-ia32": "0.25.1", + "@esbuild/linux-loong64": "0.25.1", + "@esbuild/linux-mips64el": "0.25.1", + "@esbuild/linux-ppc64": "0.25.1", + "@esbuild/linux-riscv64": "0.25.1", + "@esbuild/linux-s390x": "0.25.1", + "@esbuild/linux-x64": "0.25.1", + "@esbuild/netbsd-arm64": "0.25.1", + "@esbuild/netbsd-x64": "0.25.1", + "@esbuild/openbsd-arm64": "0.25.1", + "@esbuild/openbsd-x64": "0.25.1", + "@esbuild/sunos-x64": "0.25.1", + "@esbuild/win32-arm64": "0.25.1", + "@esbuild/win32-ia32": "0.25.1", + "@esbuild/win32-x64": "0.25.1" } }, "node_modules/escalade": { - "version": "3.1.2", - "resolved": "https://registry.npmjs.org/escalade/-/escalade-3.1.2.tgz", - "integrity": "sha512-ErCHMCae19vR8vQGe50xIsVomy19rg6gFu3+r3jkEO46suLMWBksvVyoGgQV+jOfl84ZSOSlmv6Gxa89PmTGmA==", + "version": "3.2.0", + "resolved": "https://registry.npmjs.org/escalade/-/escalade-3.2.0.tgz", + "integrity": "sha512-WUj2qlxaQtO4g6Pq5c29GTcWGDyd8itL8zTlipgECz3JesAiiOKotd8JU6otB3PACgG6xkJUyVhboMS+bje/jA==", "dev": true, "license": "MIT", "engines": { @@ -4593,17 +4241,18 @@ } }, "node_modules/eslint": { - "version": "8.57.0", - "resolved": "https://registry.npmjs.org/eslint/-/eslint-8.57.0.tgz", - "integrity": "sha512-dZ6+mexnaTIbSBZWgou51U6OmzIhYM2VcNdtiTtI7qPNZm35Akpr0f6vtw3w1Kmn5PYo+tZVfh13WrhpS6oLqQ==", + "version": "8.57.1", + "resolved": "https://registry.npmjs.org/eslint/-/eslint-8.57.1.tgz", + "integrity": "sha512-ypowyDxpVSYpkXr9WPv2PAZCtNip1Mv5KTW0SCurXv/9iOpcrH9PaqUElksqEB6pChqHGDRCFTyrZlGhnLNGiA==", + "deprecated": "This version is no longer supported. Please see https://eslint.org/version-support for other options.", "dev": true, "license": "MIT", "dependencies": { "@eslint-community/eslint-utils": "^4.2.0", "@eslint-community/regexpp": "^4.6.1", "@eslint/eslintrc": "^2.1.4", - "@eslint/js": "8.57.0", - "@humanwhocodes/config-array": "^0.11.14", + "@eslint/js": "8.57.1", + "@humanwhocodes/config-array": "^0.13.0", "@humanwhocodes/module-importer": "^1.0.1", "@nodelib/fs.walk": "^1.2.8", "@ungap/structured-clone": "^1.2.0", @@ -4649,9 +4298,9 @@ } }, "node_modules/eslint-config-prettier": { - "version": "9.1.0", - "resolved": "https://registry.npmjs.org/eslint-config-prettier/-/eslint-config-prettier-9.1.0.tgz", - "integrity": "sha512-NSWl5BFQWEPi1j4TjVNItzYV7dZXZ+wP6I6ZhrBGpChQhZRUaElihE9uRRkcbRnNb76UMKDF3r+WTmNcGPKsqw==", + "version": "10.1.1", + "resolved": "https://registry.npmjs.org/eslint-config-prettier/-/eslint-config-prettier-10.1.1.tgz", + "integrity": "sha512-4EQQr6wXwS+ZJSzaR5ZCrYgLxqvUjdXctaEtBqHcbkW944B1NQyO4qpdHQbXBONfwxXdkAY81HH4+LUfrg+zPw==", "dev": true, "license": "MIT", "bin": { @@ -4683,23 +4332,10 @@ "ms": "^2.1.1" } }, - "node_modules/eslint-import-resolver-node/node_modules/is-core-module": { - "version": "2.13.1", - "resolved": "https://registry.npmjs.org/is-core-module/-/is-core-module-2.13.1.tgz", - "integrity": "sha512-hHrIjvZsftOsvKSn2TRYl63zvxsgE0K+0mYMoH6gD4omR5IWB2KynivBQczo3+wF1cCkjzvptnI9Q0sPU66ilw==", - "dev": true, - "license": "MIT", - "dependencies": { - "hasown": "^2.0.0" - }, - "funding": { - "url": "https://github.com/sponsors/ljharb" - } - }, "node_modules/eslint-module-utils": { - "version": "2.8.1", - "resolved": "https://registry.npmjs.org/eslint-module-utils/-/eslint-module-utils-2.8.1.tgz", - "integrity": "sha512-rXDXR3h7cs7dy9RNpUlQf80nX31XWJEyGq1tRMo+6GsO5VmTe4UTwtmonAD4ZkAsrfMVDA2wlGJ3790Ys+D49Q==", + "version": "2.12.0", + "resolved": "https://registry.npmjs.org/eslint-module-utils/-/eslint-module-utils-2.12.0.tgz", + "integrity": "sha512-wALZ0HFoytlyh/1+4wuZ9FJCD/leWHQzzrxJ8+rebyReSLk7LApMyd3WJaLVoN+D5+WIdJyDK1c6JnE65V4Zyg==", "dev": true, "license": "MIT", "dependencies": { @@ -4725,57 +4361,59 @@ } }, "node_modules/eslint-plugin-deprecation": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/eslint-plugin-deprecation/-/eslint-plugin-deprecation-2.0.0.tgz", - "integrity": "sha512-OAm9Ohzbj11/ZFyICyR5N6LbOIvQMp7ZU2zI7Ej0jIc8kiGUERXPNMfw2QqqHD1ZHtjMub3yPZILovYEYucgoQ==", + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/eslint-plugin-deprecation/-/eslint-plugin-deprecation-3.0.0.tgz", + "integrity": "sha512-JuVLdNg/uf0Adjg2tpTyYoYaMbwQNn/c78P1HcccokvhtRphgnRjZDKmhlxbxYptppex03zO76f97DD/yQHv7A==", "dev": true, "license": "LGPL-3.0-or-later", "dependencies": { - "@typescript-eslint/utils": "^6.0.0", - "tslib": "^2.3.1", - "tsutils": "^3.21.0" + "@typescript-eslint/utils": "^7.0.0", + "ts-api-utils": "^1.3.0", + "tslib": "^2.3.1" }, "peerDependencies": { - "eslint": "^7.0.0 || ^8.0.0", + "eslint": "^8.0.0", "typescript": "^4.2.4 || ^5.0.0" } }, "node_modules/eslint-plugin-import": { - "version": "2.29.1", - "resolved": "https://registry.npmjs.org/eslint-plugin-import/-/eslint-plugin-import-2.29.1.tgz", - "integrity": "sha512-BbPC0cuExzhiMo4Ff1BTVwHpjjv28C5R+btTOGaCRC7UEz801up0JadwkeSk5Ued6TG34uaczuVuH6qyy5YUxw==", + "version": "2.31.0", + "resolved": "https://registry.npmjs.org/eslint-plugin-import/-/eslint-plugin-import-2.31.0.tgz", + "integrity": "sha512-ixmkI62Rbc2/w8Vfxyh1jQRTdRTF52VxwRVHl/ykPAmqG+Nb7/kNn+byLP0LxPgI7zWA16Jt82SybJInmMia3A==", "dev": true, "license": "MIT", "dependencies": { - "array-includes": "^3.1.7", - "array.prototype.findlastindex": "^1.2.3", + "@rtsao/scc": "^1.1.0", + "array-includes": "^3.1.8", + "array.prototype.findlastindex": "^1.2.5", "array.prototype.flat": "^1.3.2", "array.prototype.flatmap": "^1.3.2", "debug": "^3.2.7", "doctrine": "^2.1.0", "eslint-import-resolver-node": "^0.3.9", - "eslint-module-utils": "^2.8.0", - "hasown": "^2.0.0", - "is-core-module": "^2.13.1", + "eslint-module-utils": "^2.12.0", + "hasown": "^2.0.2", + "is-core-module": "^2.15.1", "is-glob": "^4.0.3", "minimatch": "^3.1.2", - "object.fromentries": "^2.0.7", - "object.groupby": "^1.0.1", - "object.values": "^1.1.7", + "object.fromentries": "^2.0.8", + "object.groupby": "^1.0.3", + "object.values": "^1.2.0", "semver": "^6.3.1", + "string.prototype.trimend": "^1.0.8", "tsconfig-paths": "^3.15.0" }, "engines": { "node": ">=4" }, "peerDependencies": { - "eslint": "^2 || ^3 || ^4 || ^5 || ^6 || ^7.2.0 || ^8" + "eslint": "^2 || ^3 || ^4 || ^5 || ^6 || ^7.2.0 || ^8 || ^9" } }, "node_modules/eslint-plugin-import/node_modules/brace-expansion": { - "version": "1.1.11", - "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz", - "integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==", + "version": "1.1.12", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.12.tgz", + "integrity": "sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==", "dev": true, "license": "MIT", "dependencies": { @@ -4806,19 +4444,6 @@ "node": ">=0.10.0" } }, - "node_modules/eslint-plugin-import/node_modules/is-core-module": { - "version": "2.13.1", - "resolved": "https://registry.npmjs.org/is-core-module/-/is-core-module-2.13.1.tgz", - "integrity": "sha512-hHrIjvZsftOsvKSn2TRYl63zvxsgE0K+0mYMoH6gD4omR5IWB2KynivBQczo3+wF1cCkjzvptnI9Q0sPU66ilw==", - "dev": true, - "license": "MIT", - "dependencies": { - "hasown": "^2.0.0" - }, - "funding": { - "url": "https://github.com/sponsors/ljharb" - } - }, "node_modules/eslint-plugin-import/node_modules/minimatch": { "version": "3.1.2", "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-3.1.2.tgz", @@ -4843,20 +4468,20 @@ } }, "node_modules/eslint-plugin-jest": { - "version": "27.9.0", - "resolved": "https://registry.npmjs.org/eslint-plugin-jest/-/eslint-plugin-jest-27.9.0.tgz", - "integrity": "sha512-QIT7FH7fNmd9n4se7FFKHbsLKGQiw885Ds6Y/sxKgCZ6natwCsXdgPOADnYVxN2QrRweF0FZWbJ6S7Rsn7llug==", + "version": "28.11.0", + "resolved": "https://registry.npmjs.org/eslint-plugin-jest/-/eslint-plugin-jest-28.11.0.tgz", + "integrity": "sha512-QAfipLcNCWLVocVbZW8GimKn5p5iiMcgGbRzz8z/P5q7xw+cNEpYqyzFMtIF/ZgF2HLOyy+dYBut+DoYolvqig==", "dev": true, "license": "MIT", "dependencies": { - "@typescript-eslint/utils": "^5.10.0" + "@typescript-eslint/utils": "^6.0.0 || ^7.0.0 || ^8.0.0" }, "engines": { - "node": "^14.15.0 || ^16.10.0 || >=18.0.0" + "node": "^16.10.0 || ^18.12.0 || >=20.0.0" }, "peerDependencies": { - "@typescript-eslint/eslint-plugin": "^5.0.0 || ^6.0.0 || ^7.0.0", - "eslint": "^7.0.0 || ^8.0.0", + "@typescript-eslint/eslint-plugin": "^6.0.0 || ^7.0.0 || ^8.0.0", + "eslint": "^7.0.0 || ^8.0.0 || ^9.0.0", "jest": "*" }, "peerDependenciesMeta": { @@ -4868,170 +4493,40 @@ } } }, - "node_modules/eslint-plugin-jest/node_modules/@typescript-eslint/scope-manager": { - "version": "5.62.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/scope-manager/-/scope-manager-5.62.0.tgz", - "integrity": "sha512-VXuvVvZeQCQb5Zgf4HAxc04q5j+WrNAtNh9OwCsCgpKqESMTu3tF/jhZ3xG6T4NZwWl65Bg8KuS2uEvhSfLl0w==", - "dev": true, - "license": "MIT", - "dependencies": { - "@typescript-eslint/types": "5.62.0", - "@typescript-eslint/visitor-keys": "5.62.0" - }, - "engines": { - "node": "^12.22.0 || ^14.17.0 || >=16.0.0" - }, - "funding": { - "type": "opencollective", - "url": "https://opencollective.com/typescript-eslint" - } - }, - "node_modules/eslint-plugin-jest/node_modules/@typescript-eslint/types": { - "version": "5.62.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/types/-/types-5.62.0.tgz", - "integrity": "sha512-87NVngcbVXUahrRTqIK27gD2t5Cu1yuCXxbLcFtCzZGlfyVWWh8mLHkoxzjsB6DDNnvdL+fW8MiwPEJyGJQDgQ==", - "dev": true, - "license": "MIT", - "engines": { - "node": "^12.22.0 || ^14.17.0 || >=16.0.0" - }, - "funding": { - "type": "opencollective", - "url": "https://opencollective.com/typescript-eslint" - } - }, - "node_modules/eslint-plugin-jest/node_modules/@typescript-eslint/typescript-estree": { - "version": "5.62.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/typescript-estree/-/typescript-estree-5.62.0.tgz", - "integrity": "sha512-CmcQ6uY7b9y694lKdRB8FEel7JbU/40iSAPomu++SjLMntB+2Leay2LO6i8VnJk58MtE9/nQSFIH6jpyRWyYzA==", - "dev": true, - "license": "BSD-2-Clause", - "dependencies": { - "@typescript-eslint/types": "5.62.0", - "@typescript-eslint/visitor-keys": "5.62.0", - "debug": "^4.3.4", - "globby": "^11.1.0", - "is-glob": "^4.0.3", - "semver": "^7.3.7", - "tsutils": "^3.21.0" - }, - "engines": { - "node": "^12.22.0 || ^14.17.0 || >=16.0.0" - }, - "funding": { - "type": "opencollective", - "url": "https://opencollective.com/typescript-eslint" - }, - "peerDependenciesMeta": { - "typescript": { - "optional": true - } - } - }, - "node_modules/eslint-plugin-jest/node_modules/@typescript-eslint/utils": { - "version": "5.62.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/utils/-/utils-5.62.0.tgz", - "integrity": "sha512-n8oxjeb5aIbPFEtmQxQYOLI0i9n5ySBEY/ZEHHZqKQSFnxio1rv6dthascc9dLuwrL0RC5mPCxB7vnAVGAYWAQ==", - "dev": true, - "license": "MIT", - "dependencies": { - "@eslint-community/eslint-utils": "^4.2.0", - "@types/json-schema": "^7.0.9", - "@types/semver": "^7.3.12", - "@typescript-eslint/scope-manager": "5.62.0", - "@typescript-eslint/types": "5.62.0", - "@typescript-eslint/typescript-estree": "5.62.0", - "eslint-scope": "^5.1.1", - "semver": "^7.3.7" - }, - "engines": { - "node": "^12.22.0 || ^14.17.0 || >=16.0.0" - }, - "funding": { - "type": "opencollective", - "url": "https://opencollective.com/typescript-eslint" - }, - "peerDependencies": { - "eslint": "^6.0.0 || ^7.0.0 || ^8.0.0" - } - }, - "node_modules/eslint-plugin-jest/node_modules/@typescript-eslint/visitor-keys": { - "version": "5.62.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/visitor-keys/-/visitor-keys-5.62.0.tgz", - "integrity": "sha512-07ny+LHRzQXepkGg6w0mFY41fVUNBrL2Roj/++7V1txKugfjm/Ci/qSND03r2RhlJhJYMcTn9AhhSSqQp0Ysyw==", - "dev": true, - "license": "MIT", - "dependencies": { - "@typescript-eslint/types": "5.62.0", - "eslint-visitor-keys": "^3.3.0" - }, - "engines": { - "node": "^12.22.0 || ^14.17.0 || >=16.0.0" - }, - "funding": { - "type": "opencollective", - "url": "https://opencollective.com/typescript-eslint" - } - }, - "node_modules/eslint-plugin-jest/node_modules/eslint-scope": { - "version": "5.1.1", - "resolved": "https://registry.npmjs.org/eslint-scope/-/eslint-scope-5.1.1.tgz", - "integrity": "sha512-2NxwbF/hZ0KpepYN0cNbo+FN6XoK7GaHlQhgx/hIZl6Va0bF45RQOOwhLIy8lQDbuCiadSLCBnH2CFYquit5bw==", - "dev": true, - "license": "BSD-2-Clause", - "dependencies": { - "esrecurse": "^4.3.0", - "estraverse": "^4.1.1" - }, - "engines": { - "node": ">=8.0.0" - } - }, - "node_modules/eslint-plugin-jest/node_modules/estraverse": { - "version": "4.3.0", - "resolved": "https://registry.npmjs.org/estraverse/-/estraverse-4.3.0.tgz", - "integrity": "sha512-39nnKffWz8xN1BU/2c79n9nB9HDzo0niYUqx6xyqUnyoAnQyyWpOTdZEeiCch8BBu515t4wp9ZmgVfVhn9EBpw==", - "dev": true, - "license": "BSD-2-Clause", - "engines": { - "node": ">=4.0" - } - }, "node_modules/eslint-plugin-jsx-a11y": { - "version": "6.8.0", - "resolved": "https://registry.npmjs.org/eslint-plugin-jsx-a11y/-/eslint-plugin-jsx-a11y-6.8.0.tgz", - "integrity": "sha512-Hdh937BS3KdwwbBaKd5+PLCOmYY6U4f2h9Z2ktwtNKvIdIEu137rjYbcb9ApSbVJfWxANNuiKTD/9tOKjK9qOA==", + "version": "6.10.2", + "resolved": "https://registry.npmjs.org/eslint-plugin-jsx-a11y/-/eslint-plugin-jsx-a11y-6.10.2.tgz", + "integrity": "sha512-scB3nz4WmG75pV8+3eRUQOHZlNSUhFNq37xnpgRkCCELU3XMvXAxLk1eqWWyE22Ki4Q01Fnsw9BA3cJHDPgn2Q==", "dev": true, "license": "MIT", "dependencies": { - "@babel/runtime": "^7.23.2", - "aria-query": "^5.3.0", - "array-includes": "^3.1.7", + "aria-query": "^5.3.2", + "array-includes": "^3.1.8", "array.prototype.flatmap": "^1.3.2", "ast-types-flow": "^0.0.8", - "axe-core": "=4.7.0", - "axobject-query": "^3.2.1", + "axe-core": "^4.10.0", + "axobject-query": "^4.1.0", "damerau-levenshtein": "^1.0.8", "emoji-regex": "^9.2.2", - "es-iterator-helpers": "^1.0.15", - "hasown": "^2.0.0", + "hasown": "^2.0.2", "jsx-ast-utils": "^3.3.5", "language-tags": "^1.0.9", "minimatch": "^3.1.2", - "object.entries": "^1.1.7", - "object.fromentries": "^2.0.7" + "object.fromentries": "^2.0.8", + "safe-regex-test": "^1.0.3", + "string.prototype.includes": "^2.0.1" }, "engines": { "node": ">=4.0" }, "peerDependencies": { - "eslint": "^3 || ^4 || ^5 || ^6 || ^7 || ^8" + "eslint": "^3 || ^4 || ^5 || ^6 || ^7 || ^8 || ^9" } }, "node_modules/eslint-plugin-jsx-a11y/node_modules/brace-expansion": { - "version": "1.1.11", - "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz", - "integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==", + "version": "1.1.12", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.12.tgz", + "integrity": "sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==", "dev": true, "license": "MIT", "dependencies": { @@ -5053,14 +4548,14 @@ } }, "node_modules/eslint-plugin-prettier": { - "version": "5.1.3", - "resolved": "https://registry.npmjs.org/eslint-plugin-prettier/-/eslint-plugin-prettier-5.1.3.tgz", - "integrity": "sha512-C9GCVAs4Eq7ZC/XFQHITLiHJxQngdtraXaM+LoUFoFp/lHNl2Zn8f3WQbe9HvTBBQ9YnKFB0/2Ajdqwo5D1EAw==", + "version": "5.2.3", + "resolved": "https://registry.npmjs.org/eslint-plugin-prettier/-/eslint-plugin-prettier-5.2.3.tgz", + "integrity": "sha512-qJ+y0FfCp/mQYQ/vWQ3s7eUlFEL4PyKfAJxsnYTJ4YT73nsJBWqmEpFryxV9OeUiqmsTsYJ5Y+KDNaeP31wrRw==", "dev": true, "license": "MIT", "dependencies": { "prettier-linter-helpers": "^1.0.0", - "synckit": "^0.8.6" + "synckit": "^0.9.1" }, "engines": { "node": "^14.18.0 || >=16.0.0" @@ -5084,9 +4579,9 @@ } }, "node_modules/eslint-plugin-simple-import-sort": { - "version": "10.0.0", - "resolved": "https://registry.npmjs.org/eslint-plugin-simple-import-sort/-/eslint-plugin-simple-import-sort-10.0.0.tgz", - "integrity": "sha512-AeTvO9UCMSNzIHRkg8S6c3RPy5YEwKWSQPx3DYghLedo2ZQxowPFLGDN1AZ2evfg6r6mjBSZSLxLFsWSu3acsw==", + "version": "12.1.1", + "resolved": "https://registry.npmjs.org/eslint-plugin-simple-import-sort/-/eslint-plugin-simple-import-sort-12.1.1.tgz", + "integrity": "sha512-6nuzu4xwQtE3332Uz0to+TxDQYRLTKRESSc2hefVT48Zc8JthmN23Gx9lnYhu0FtkRSL1oxny3kJ2aveVhmOVA==", "dev": true, "license": "MIT", "peerDependencies": { @@ -5124,9 +4619,9 @@ } }, "node_modules/eslint/node_modules/brace-expansion": { - "version": "1.1.11", - "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz", - "integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==", + "version": "1.1.12", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.12.tgz", + "integrity": "sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==", "dev": true, "license": "MIT", "dependencies": { @@ -5134,17 +4629,14 @@ "concat-map": "0.0.1" } }, - "node_modules/eslint/node_modules/glob-parent": { - "version": "6.0.2", - "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-6.0.2.tgz", - "integrity": "sha512-XxwI8EOhVQgWp6iDL+3b0r86f4d6AX6zSU55HfB4ydCEuXLXc5FcYeOu+nnGftS4TEju/11rt4KJPTMgbfmv4A==", + "node_modules/eslint/node_modules/is-path-inside": { + "version": "3.0.3", + "resolved": "https://registry.npmjs.org/is-path-inside/-/is-path-inside-3.0.3.tgz", + "integrity": "sha512-Fd4gABb+ycGAmKou8eMftCupSir5lRxqf4aD/vd0cD2qc4HL07OjCeuHMr8Ro4CoMaeCKDB0/ECBOVWjTwUvPQ==", "dev": true, - "license": "ISC", - "dependencies": { - "is-glob": "^4.0.3" - }, + "license": "MIT", "engines": { - "node": ">=10.13.0" + "node": ">=8" } }, "node_modules/eslint/node_modules/minimatch": { @@ -5193,9 +4685,9 @@ } }, "node_modules/esquery": { - "version": "1.5.0", - "resolved": "https://registry.npmjs.org/esquery/-/esquery-1.5.0.tgz", - "integrity": "sha512-YQLXUplAwJgCydQ78IMJywZCceoqk1oH01OERdSAJc/7U2AylwjhSCLDEtqwg811idIS/9fIU5GjG73IgjKMVg==", + "version": "1.6.0", + "resolved": "https://registry.npmjs.org/esquery/-/esquery-1.6.0.tgz", + "integrity": "sha512-ca9pw9fomFcKPvFLXhBKUK90ZvGibiGOvRJNbjljY7s7uq/5YO4BOzcYtJqExdx99rF6aAcnRxHmcUHcz6sQsg==", "dev": true, "license": "BSD-3-Clause", "dependencies": { @@ -5298,21 +4790,6 @@ "node": "^14.15.0 || ^16.10.0 || >=18.0.0" } }, - "node_modules/external-editor": { - "version": "3.1.0", - "resolved": "https://registry.npmjs.org/external-editor/-/external-editor-3.1.0.tgz", - "integrity": "sha512-hMQ4CX1p1izmuLYyZqLMO/qGNw10wSv9QDCPfzXfyFrOaCSSoRfqE1Kf1s5an66J5JZC62NewG+mK49jOCtQew==", - "dev": true, - "license": "MIT", - "dependencies": { - "chardet": "^0.7.0", - "iconv-lite": "^0.4.24", - "tmp": "^0.0.33" - }, - "engines": { - "node": ">=4" - } - }, "node_modules/fast-deep-equal": { "version": "3.1.3", "resolved": "https://registry.npmjs.org/fast-deep-equal/-/fast-deep-equal-3.1.3.tgz", @@ -5328,9 +4805,9 @@ "license": "Apache-2.0" }, "node_modules/fast-glob": { - "version": "3.3.2", - "resolved": "https://registry.npmjs.org/fast-glob/-/fast-glob-3.3.2.tgz", - "integrity": "sha512-oX2ruAFQwf/Orj8m737Y5adxDQO0LAB7/S5MnxCdTNDd4p6BsyIVsv9JQsATbTSq8KHRpLwIHbVlUNatxd+1Ow==", + "version": "3.3.3", + "resolved": "https://registry.npmjs.org/fast-glob/-/fast-glob-3.3.3.tgz", + "integrity": "sha512-7MptL8U0cqcFdzIzwOTHoilX9x5BrNqye7Z/LuC7kCMRio1EMSyqRK3BEAUD7sXRq4iT4AzTVuZdhgQ2TCvYLg==", "dev": true, "license": "MIT", "dependencies": { @@ -5338,12 +4815,25 @@ "@nodelib/fs.walk": "^1.2.3", "glob-parent": "^5.1.2", "merge2": "^1.3.0", - "micromatch": "^4.0.4" + "micromatch": "^4.0.8" }, "engines": { "node": ">=8.6.0" } }, + "node_modules/fast-glob/node_modules/glob-parent": { + "version": "5.1.2", + "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz", + "integrity": "sha512-AOIgSQCepiJYwP3ARnGx+5VnTu2HBYdzbGP45eLw1vr3zB3vZLeyed1sC9hnbcOc9/SrMyM5RPQrkGz4aS9Zow==", + "dev": true, + "license": "ISC", + "dependencies": { + "is-glob": "^4.0.1" + }, + "engines": { + "node": ">= 6" + } + }, "node_modules/fast-json-stable-stringify": { "version": "2.1.0", "resolved": "https://registry.npmjs.org/fast-json-stable-stringify/-/fast-json-stable-stringify-2.1.0.tgz", @@ -5359,9 +4849,9 @@ "license": "MIT" }, "node_modules/fastq": { - "version": "1.17.1", - "resolved": "https://registry.npmjs.org/fastq/-/fastq-1.17.1.tgz", - "integrity": "sha512-sRVD3lWVIXWg6By68ZN7vho9a1pQcN/WBFaAAsDDFzlJjvoGx0P8z7V1t72grFJfJhu3YPZBuu25f7Kaw2jN1w==", + "version": "1.19.1", + "resolved": "https://registry.npmjs.org/fastq/-/fastq-1.19.1.tgz", + "integrity": "sha512-GwLTyxkCXjXbxqIhTsMI2Nui8huMPtnxg7krajPJAjnEG/iiOS7i+zCtWGZR9G0NBKbXKh6X9m9UIsYX/N6vvQ==", "dev": true, "license": "ISC", "dependencies": { @@ -5378,30 +4868,19 @@ "bser": "2.1.1" } }, - "node_modules/figures": { - "version": "3.2.0", - "resolved": "https://registry.npmjs.org/figures/-/figures-3.2.0.tgz", - "integrity": "sha512-yaduQFRKLXYOGgEn6AZau90j3ggSOyiqXU0F9JZfeXYhNa+Jk4X+s45A2zg5jns87GAFa34BBm2kXw4XpNcbdg==", + "node_modules/fdir": { + "version": "6.4.3", + "resolved": "https://registry.npmjs.org/fdir/-/fdir-6.4.3.tgz", + "integrity": "sha512-PMXmW2y1hDDfTSRc9gaXIuCCRpuoz3Kaz8cUelp3smouvfT632ozg2vrT6lJsHKKOF59YLbOGfAWGUcKEfRMQw==", "dev": true, "license": "MIT", - "dependencies": { - "escape-string-regexp": "^1.0.5" - }, - "engines": { - "node": ">=8" + "peerDependencies": { + "picomatch": "^3 || ^4" }, - "funding": { - "url": "https://github.com/sponsors/sindresorhus" - } - }, - "node_modules/figures/node_modules/escape-string-regexp": { - "version": "1.0.5", - "resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-1.0.5.tgz", - "integrity": "sha512-vbRorB5FUQWvla16U8R/qgaFIya2qGzwDrNmCZuYKrbdSUMG6I1ZCGQRefkRVhuOkIGVne7BQ35DSfo1qvJqFg==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=0.8.0" + "peerDependenciesMeta": { + "picomatch": { + "optional": true + } } }, "node_modules/file-entry-cache": { @@ -5417,6 +4896,29 @@ "node": "^10.12.0 || >=12.0.0" } }, + "node_modules/filelist": { + "version": "1.0.4", + "resolved": "https://registry.npmjs.org/filelist/-/filelist-1.0.4.tgz", + "integrity": "sha512-w1cEuf3S+DrLCQL7ET6kz+gmlJdbq9J7yXCSjK/OZCPA+qEN1WyF4ZAf0YYJa4/shHJra2t/d/r8SV4Ji+x+8Q==", + "dev": true, + "license": "Apache-2.0", + "dependencies": { + "minimatch": "^5.0.1" + } + }, + "node_modules/filelist/node_modules/minimatch": { + "version": "5.1.6", + "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-5.1.6.tgz", + "integrity": "sha512-lKwV/1brpG6mBUFHtb7NUmtABCb2WZZmm2wNiOA5hAb8VdCS4B3dtMWyvcoViccwAW/COERjXLt0zP1zXUN26g==", + "dev": true, + "license": "ISC", + "dependencies": { + "brace-expansion": "^2.0.1" + }, + "engines": { + "node": ">=10" + } + }, "node_modules/fill-range": { "version": "7.1.1", "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.1.1.tgz", @@ -5480,30 +4982,36 @@ } }, "node_modules/flatted": { - "version": "3.3.1", - "resolved": "https://registry.npmjs.org/flatted/-/flatted-3.3.1.tgz", - "integrity": "sha512-X8cqMLLie7KsNUDSdzeN8FYK9rEt4Dt67OsG/DNGnYTSDBG4uFAJFBnUeiV+zCVAvwFy56IjM9sH51jVaEhNxw==", + "version": "3.3.3", + "resolved": "https://registry.npmjs.org/flatted/-/flatted-3.3.3.tgz", + "integrity": "sha512-GX+ysw4PBCz0PzosHDepZGANEuFCMLrnRTiEy9McGjmkCQYwRq4A/X786G/fjM/+OjsWSU1ZrY5qyARZmO/uwg==", "dev": true, "license": "ISC" }, "node_modules/for-each": { - "version": "0.3.3", - "resolved": "https://registry.npmjs.org/for-each/-/for-each-0.3.3.tgz", - "integrity": "sha512-jqYfLp7mo9vIyQf8ykW2v7A+2N4QjeCeI5+Dz9XraiO1ign81wjiH7Fb9vSOWvQfNtmSa4H2RoQTrrXivdUZmw==", + "version": "0.3.5", + "resolved": "https://registry.npmjs.org/for-each/-/for-each-0.3.5.tgz", + "integrity": "sha512-dKx12eRCVIzqCxFGplyFKJMPvLEWgmNtUrpTiJIR5u97zEhRG8ySrtboPHZXx7daLxQVrl643cTzbab2tkQjxg==", "dev": true, "license": "MIT", "dependencies": { - "is-callable": "^1.1.3" + "is-callable": "^1.2.7" + }, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" } }, "node_modules/foreground-child": { - "version": "3.1.1", - "resolved": "https://registry.npmjs.org/foreground-child/-/foreground-child-3.1.1.tgz", - "integrity": "sha512-TMKDUnIte6bfb5nWv7V/caI169OHgvwjb7V4WkeUvbQQdjr5rWKqHFiKWb/fcOwB+CzBT+qbWjvj+DVwRskpIg==", + "version": "3.3.1", + "resolved": "https://registry.npmjs.org/foreground-child/-/foreground-child-3.3.1.tgz", + "integrity": "sha512-gIXjKqtFuWEgzFRJA9WCQeSJLZDjgJUOMCMzxtvFq/37KojM1BFGufqsCy0r4qSQmYLsZYMeyRqzIWOMup03sw==", "dev": true, "license": "ISC", "dependencies": { - "cross-spawn": "^7.0.0", + "cross-spawn": "^7.0.6", "signal-exit": "^4.0.1" }, "engines": { @@ -5545,9 +5053,9 @@ "license": "MIT" }, "node_modules/fs-extra": { - "version": "11.2.0", - "resolved": "https://registry.npmjs.org/fs-extra/-/fs-extra-11.2.0.tgz", - "integrity": "sha512-PmDi3uwK5nFuXh7XDTlVnS17xJS7vW36is2+w3xcv8SVxiB4NyATf4ctkVY5bkSjX0Y4nbvZCq1/EjtEyr9ktw==", + "version": "11.3.0", + "resolved": "https://registry.npmjs.org/fs-extra/-/fs-extra-11.3.0.tgz", + "integrity": "sha512-Z4XaCL6dUDHfP/jT25jJKMmtxvuwbkrD1vNSMFlo9lNLY2c5FHYSQgHPRZUjAB26TpDEoW9HCOgplrdbaPV/ew==", "dev": true, "license": "MIT", "dependencies": { @@ -5592,16 +5100,18 @@ } }, "node_modules/function.prototype.name": { - "version": "1.1.6", - "resolved": "https://registry.npmjs.org/function.prototype.name/-/function.prototype.name-1.1.6.tgz", - "integrity": "sha512-Z5kx79swU5P27WEayXM1tBi5Ze/lbIyiNgU3qyXUOf9b2rgXYyF9Dy9Cx+IQv/Lc8WCG6L82zwUPpSS9hGehIg==", + "version": "1.1.8", + "resolved": "https://registry.npmjs.org/function.prototype.name/-/function.prototype.name-1.1.8.tgz", + "integrity": "sha512-e5iwyodOHhbMr/yNrc7fDYG4qlbIvI5gajyzPnb5TCwyhjApznQh1BMFou9b30SevY43gCJKXycoCBjMbsuW0Q==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.2", - "define-properties": "^1.2.0", - "es-abstract": "^1.22.1", - "functions-have-names": "^1.2.3" + "call-bind": "^1.0.8", + "call-bound": "^1.0.3", + "define-properties": "^1.2.1", + "functions-have-names": "^1.2.3", + "hasown": "^2.0.2", + "is-callable": "^1.2.7" }, "engines": { "node": ">= 0.4" @@ -5620,15 +5130,6 @@ "url": "https://github.com/sponsors/ljharb" } }, - "node_modules/fuzzy": { - "version": "0.1.3", - "resolved": "https://registry.npmjs.org/fuzzy/-/fuzzy-0.1.3.tgz", - "integrity": "sha512-/gZffu4ykarLrCiP3Ygsa86UAo1E5vEVlvTrpkKywXSbP9Xhln3oSp9QSV57gEq3JFFpGJ4GZ+5zdEp3FcUh4w==", - "dev": true, - "engines": { - "node": ">= 0.6.0" - } - }, "node_modules/gensync": { "version": "1.0.0-beta.2", "resolved": "https://registry.npmjs.org/gensync/-/gensync-1.0.0-beta.2.tgz", @@ -5650,17 +5151,22 @@ } }, "node_modules/get-intrinsic": { - "version": "1.2.4", - "resolved": "https://registry.npmjs.org/get-intrinsic/-/get-intrinsic-1.2.4.tgz", - "integrity": "sha512-5uYhsJH8VJBTv7oslg4BznJYhDoRI6waYCxMmCdnTrcCrHA/fCFKoTFz2JKKE0HdDFUF7/oQuhzumXJK7paBRQ==", + "version": "1.3.0", + "resolved": "https://registry.npmjs.org/get-intrinsic/-/get-intrinsic-1.3.0.tgz", + "integrity": "sha512-9fSjSaos/fRIVIp+xSJlE6lfwhES7LNtKaCBIamHsjr2na1BiABJPo0mOjjz8GJDURarmCPGqaiVg5mfjb98CQ==", "dev": true, "license": "MIT", "dependencies": { + "call-bind-apply-helpers": "^1.0.2", + "es-define-property": "^1.0.1", "es-errors": "^1.3.0", + "es-object-atoms": "^1.1.1", "function-bind": "^1.1.2", - "has-proto": "^1.0.1", - "has-symbols": "^1.0.3", - "hasown": "^2.0.0" + "get-proto": "^1.0.1", + "gopd": "^1.2.0", + "has-symbols": "^1.1.0", + "hasown": "^2.0.2", + "math-intrinsics": "^1.1.0" }, "engines": { "node": ">= 0.4" @@ -5679,6 +5185,20 @@ "node": ">=8.0.0" } }, + "node_modules/get-proto": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/get-proto/-/get-proto-1.0.1.tgz", + "integrity": "sha512-sTSfBjoXBp89JvIKIefqw7U2CCebsc74kiY6awiGogKtoSGbgjYE/G/+l9sF3MWFPNc9IcoOC4ODfKHfxFmp0g==", + "dev": true, + "license": "MIT", + "dependencies": { + "dunder-proto": "^1.0.1", + "es-object-atoms": "^1.0.0" + }, + "engines": { + "node": ">= 0.4" + } + }, "node_modules/get-stream": { "version": "6.0.1", "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-6.0.1.tgz", @@ -5693,15 +5213,15 @@ } }, "node_modules/get-symbol-description": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/get-symbol-description/-/get-symbol-description-1.0.2.tgz", - "integrity": "sha512-g0QYk1dZBxGwk+Ngc+ltRH2IBp2f7zBkBMBJZCDerh6EhlhSR6+9irMCuT/09zD6qkarHUSn529sK/yL4S27mg==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/get-symbol-description/-/get-symbol-description-1.1.0.tgz", + "integrity": "sha512-w9UMqWwJxHNOvoNzSJ2oPF5wvYcvP7jUvYzhp67yEhTi17ZDBBC1z9pTdGuzjD+EFIqLSYRweZjqfiPzQ06Ebg==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.5", + "call-bound": "^1.0.3", "es-errors": "^1.3.0", - "get-intrinsic": "^1.2.4" + "get-intrinsic": "^1.2.6" }, "engines": { "node": ">= 0.4" @@ -5740,22 +5260,22 @@ } }, "node_modules/glob-parent": { - "version": "5.1.2", - "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz", - "integrity": "sha512-AOIgSQCepiJYwP3ARnGx+5VnTu2HBYdzbGP45eLw1vr3zB3vZLeyed1sC9hnbcOc9/SrMyM5RPQrkGz4aS9Zow==", + "version": "6.0.2", + "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-6.0.2.tgz", + "integrity": "sha512-XxwI8EOhVQgWp6iDL+3b0r86f4d6AX6zSU55HfB4ydCEuXLXc5FcYeOu+nnGftS4TEju/11rt4KJPTMgbfmv4A==", "dev": true, "license": "ISC", "dependencies": { - "is-glob": "^4.0.1" + "is-glob": "^4.0.3" }, "engines": { - "node": ">= 6" + "node": ">=10.13.0" } }, "node_modules/glob/node_modules/brace-expansion": { - "version": "1.1.11", - "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz", - "integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==", + "version": "1.1.12", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.12.tgz", + "integrity": "sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==", "dev": true, "license": "MIT", "dependencies": { @@ -5830,14 +5350,24 @@ "url": "https://github.com/sponsors/sindresorhus" } }, + "node_modules/globby/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/gopd": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/gopd/-/gopd-1.0.1.tgz", - "integrity": "sha512-d65bNlIadxvpb/A2abVdlqKqV563juRnZ1Wtk6s1sIR8uNsXR70xqIzVqxVf1eTqDunwT2MkczEeaezCKTZhwA==", + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/gopd/-/gopd-1.2.0.tgz", + "integrity": "sha512-ZUKRh6/kUFoAiTAtTYPZJ3hw9wNxx+BIBOijnlG9PnrJsCcSjs1wyyD6vJpaYtgnzDrKYRSqf3OO6Rfa93xsRg==", "dev": true, "license": "MIT", - "dependencies": { - "get-intrinsic": "^1.1.3" + "engines": { + "node": ">= 0.4" }, "funding": { "url": "https://github.com/sponsors/ljharb" @@ -5857,22 +5387,15 @@ "dev": true, "license": "MIT" }, - "node_modules/has": { - "version": "1.0.4", - "resolved": "https://registry.npmjs.org/has/-/has-1.0.4.tgz", - "integrity": "sha512-qdSAmqLF6209RFj4VVItywPMbm3vWylknmB3nvNiUIs72xAimcM8nVYxYr7ncvZq5qzk9MKIZR8ijqD/1QuYjQ==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">= 0.4.0" - } - }, "node_modules/has-bigints": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/has-bigints/-/has-bigints-1.0.2.tgz", - "integrity": "sha512-tSvCKtBr9lkF0Ex0aQiP9N+OpV4zi2r/Nee5VkRDbaqv35RLYMzbwQfFSZZH0kR+Rd6302UJZ2p/bJCEoR3VoQ==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/has-bigints/-/has-bigints-1.1.0.tgz", + "integrity": "sha512-R3pbpkcIqv2Pm3dUwgjclDRVmWpTJW2DcMzcIhEXEx1oh/CEMObMm3KLmRJOdvhM7o4uQBnwr8pzRK2sJWIqfg==", "dev": true, "license": "MIT", + "engines": { + "node": ">= 0.4" + }, "funding": { "url": "https://github.com/sponsors/ljharb" } @@ -5901,11 +5424,14 @@ } }, "node_modules/has-proto": { - "version": "1.0.3", - "resolved": "https://registry.npmjs.org/has-proto/-/has-proto-1.0.3.tgz", - "integrity": "sha512-SJ1amZAJUiZS+PhsVLf5tGydlaVB8EdFpaSO4gmiUKUOxk8qzn5AIy4ZeJUmh22znIdk/uMAUT2pl3FxzVUH+Q==", + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/has-proto/-/has-proto-1.2.0.tgz", + "integrity": "sha512-KIL7eQPfHQRC8+XluaIw7BHUwwqL19bQn4hzNgdr+1wXoU0KKj6rufu47lhY7KbJR2C6T6+PfyN0Ea7wkSS+qQ==", "dev": true, "license": "MIT", + "dependencies": { + "dunder-proto": "^1.0.0" + }, "engines": { "node": ">= 0.4" }, @@ -5914,9 +5440,9 @@ } }, "node_modules/has-symbols": { - "version": "1.0.3", - "resolved": "https://registry.npmjs.org/has-symbols/-/has-symbols-1.0.3.tgz", - "integrity": "sha512-l3LCuF6MgDNwTDKkdYGEihYjt5pRPbEg46rtlmnSPlUbgmB8LOIrKJbYYFBSbnPaJexMKtiPO8hmeRjRz2Td+A==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/has-symbols/-/has-symbols-1.1.0.tgz", + "integrity": "sha512-1cDNdwJ2Jaohmb3sg4OmKaMBwuC48sYni5HUw2DvsC8LjGTLK9h+eb1X6RyuOHe4hT0ULCW68iomhjUoKUqlPQ==", "dev": true, "license": "MIT", "engines": { @@ -5986,18 +5512,6 @@ "node": ">=10.17.0" } }, - "node_modules/iconv-lite": { - "version": "0.4.24", - "resolved": "https://registry.npmjs.org/iconv-lite/-/iconv-lite-0.4.24.tgz", - "integrity": "sha512-v3MXnZAcvnywkTUEZomIActle7RXXeedOR31wwl7VlyoXO4Qi9arvSenNQWne1TcRwhCL1HwLI21bEqdpj8/rA==", - "license": "MIT", - "dependencies": { - "safer-buffer": ">= 2.1.2 < 3" - }, - "engines": { - "node": ">=0.10.0" - } - }, "node_modules/ieee754": { "version": "1.2.1", "resolved": "https://registry.npmjs.org/ieee754/-/ieee754-1.2.1.tgz", @@ -6020,9 +5534,9 @@ "license": "BSD-3-Clause" }, "node_modules/ignore": { - "version": "5.3.1", - "resolved": "https://registry.npmjs.org/ignore/-/ignore-5.3.1.tgz", - "integrity": "sha512-5Fytz/IraMjqpwfd34ke28PTVMjZjJG2MPn5t7OE4eUCUNf8BAa7b5WUS9/Qvr6mwOQS7Mk6vdsMno5he+T8Xw==", + "version": "5.3.2", + "resolved": "https://registry.npmjs.org/ignore/-/ignore-5.3.2.tgz", + "integrity": "sha512-hsBTNUqQTDwkWtcdYI2i06Y/nUBEsNEDJKjWdigLvegy8kDuJAS8uRlpkkcQpyEXL0Z/pjDy5HBmMjRCJ2gq+g==", "dev": true, "license": "MIT", "engines": { @@ -6030,9 +5544,9 @@ } }, "node_modules/import-fresh": { - "version": "3.3.0", - "resolved": "https://registry.npmjs.org/import-fresh/-/import-fresh-3.3.0.tgz", - "integrity": "sha512-veYYhQa+D1QBKznvhUHxb8faxlrwUnxseDAbAp457E0wLNio2bOSKnjYDhMj+YiAq61xrMGhQk9iXVk5FzgQMw==", + "version": "3.3.1", + "resolved": "https://registry.npmjs.org/import-fresh/-/import-fresh-3.3.1.tgz", + "integrity": "sha512-TR3KfrTZTYLPB6jUjfx6MF9WcWrHL9su5TObK4ZkYgBdWKPOFoSoQIdEuTuR82pmtxH2spWG9h6etwfr1pLBqQ==", "dev": true, "license": "MIT", "dependencies": { @@ -6047,9 +5561,9 @@ } }, "node_modules/import-local": { - "version": "3.1.0", - "resolved": "https://registry.npmjs.org/import-local/-/import-local-3.1.0.tgz", - "integrity": "sha512-ASB07uLtnDs1o6EHjKpX34BKYDSqnFerfTOJL2HvMqF70LnxpjkzDB8J44oT9pu4AMPkQwf8jl6szgvNd2tRIg==", + "version": "3.2.0", + "resolved": "https://registry.npmjs.org/import-local/-/import-local-3.2.0.tgz", + "integrity": "sha512-2SPlun1JUPWoM6t3F0dw0FkCF/jWY8kttcY4f599GLTSjh2OCuuhdTkJQsEcZzBqbXZGKMK2OqW1oZsjtf/gQA==", "dev": true, "license": "MIT", "dependencies": { @@ -6076,16 +5590,6 @@ "node": ">=0.8.19" } }, - "node_modules/indent-string": { - "version": "4.0.0", - "resolved": "https://registry.npmjs.org/indent-string/-/indent-string-4.0.0.tgz", - "integrity": "sha512-EdDDZu4A2OyIK7Lr/2zG+w5jmbuk1DVBnEwREQvBzspBJkCEbRa8GxU1lghYcaGJCnRWibjDXlq779X1/y5xwg==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=8" - } - }, "node_modules/inflight": { "version": "1.0.6", "resolved": "https://registry.npmjs.org/inflight/-/inflight-1.0.6.tgz", @@ -6112,63 +5616,16 @@ "dev": true, "license": "ISC" }, - "node_modules/inquirer": { - "version": "8.2.6", - "resolved": "https://registry.npmjs.org/inquirer/-/inquirer-8.2.6.tgz", - "integrity": "sha512-M1WuAmb7pn9zdFRtQYk26ZBoY043Sse0wVDdk4Bppr+JOXyQYybdtvK+l9wUibhtjdjvtoiNy8tk+EgsYIUqKg==", - "dev": true, - "license": "MIT", - "dependencies": { - "ansi-escapes": "^4.2.1", - "chalk": "^4.1.1", - "cli-cursor": "^3.1.0", - "cli-width": "^3.0.0", - "external-editor": "^3.0.3", - "figures": "^3.0.0", - "lodash": "^4.17.21", - "mute-stream": "0.0.8", - "ora": "^5.4.1", - "run-async": "^2.4.0", - "rxjs": "^7.5.5", - "string-width": "^4.1.0", - "strip-ansi": "^6.0.0", - "through": "^2.3.6", - "wrap-ansi": "^6.0.1" - }, - "engines": { - "node": ">=12.0.0" - } - }, - "node_modules/inquirer-autocomplete-prompt": { - "version": "2.0.1", - "resolved": "https://registry.npmjs.org/inquirer-autocomplete-prompt/-/inquirer-autocomplete-prompt-2.0.1.tgz", - "integrity": "sha512-jUHrH0btO7j5r8DTQgANf2CBkTZChoVySD8zF/wp5fZCOLIuUbleXhf4ZY5jNBOc1owA3gdfWtfZuppfYBhcUg==", - "dev": true, - "license": "ISC", - "dependencies": { - "ansi-escapes": "^4.3.2", - "figures": "^3.2.0", - "picocolors": "^1.0.0", - "run-async": "^2.4.1", - "rxjs": "^7.5.4" - }, - "engines": { - "node": ">=12" - }, - "peerDependencies": { - "inquirer": "^8.0.0" - } - }, "node_modules/internal-slot": { - "version": "1.0.7", - "resolved": "https://registry.npmjs.org/internal-slot/-/internal-slot-1.0.7.tgz", - "integrity": "sha512-NGnrKwXzSms2qUUih/ILZ5JBqNTSa1+ZmP6flaIp6KmSElgE9qdndzS3cqjrDovwFdmwsGsLdeFgB6suw+1e9g==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/internal-slot/-/internal-slot-1.1.0.tgz", + "integrity": "sha512-4gd7VpWNQNB4UKKCFFVcp1AVv+FMOgs9NKzjHKusc8jTMhd5eL1NqQqOpE0KzMds804/yHlglp3uxgluOqAPLw==", "dev": true, "license": "MIT", "dependencies": { "es-errors": "^1.3.0", - "hasown": "^2.0.0", - "side-channel": "^1.0.4" + "hasown": "^2.0.2", + "side-channel": "^1.1.0" }, "engines": { "node": ">= 0.4" @@ -6192,14 +5649,15 @@ } }, "node_modules/is-array-buffer": { - "version": "3.0.4", - "resolved": "https://registry.npmjs.org/is-array-buffer/-/is-array-buffer-3.0.4.tgz", - "integrity": "sha512-wcjaerHw0ydZwfhiKbXJWLDY8A7yV7KhjQOpb83hGgGfId/aQa4TOvwyzn2PuswW2gPCYEL/nEAiSVpdOj1lXw==", + "version": "3.0.5", + "resolved": "https://registry.npmjs.org/is-array-buffer/-/is-array-buffer-3.0.5.tgz", + "integrity": "sha512-DDfANUiiG2wC1qawP66qlTugJeL5HyzMpfr8lLK+jMQirGzNod0B12cFB/9q838Ru27sBwfw78/rdoU7RERz6A==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.2", - "get-intrinsic": "^1.2.1" + "call-bind": "^1.0.8", + "call-bound": "^1.0.3", + "get-intrinsic": "^1.2.6" }, "engines": { "node": ">= 0.4" @@ -6216,13 +5674,17 @@ "license": "MIT" }, "node_modules/is-async-function": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/is-async-function/-/is-async-function-2.0.0.tgz", - "integrity": "sha512-Y1JXKrfykRJGdlDwdKlLpLyMIiWqWvuSd17TvZk68PLAOGOoF4Xyav1z0Xhoi+gCYjZVeC5SI+hYFOfvXmGRCA==", + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/is-async-function/-/is-async-function-2.1.1.tgz", + "integrity": "sha512-9dgM/cZBnNvjzaMYHVoxxfPj2QXt22Ev7SuuPrs+xav0ukGB0S6d4ydZdEiM48kLx5kDV+QBPrpVnFyefL8kkQ==", "dev": true, "license": "MIT", "dependencies": { - "has-tostringtag": "^1.0.0" + "async-function": "^1.0.0", + "call-bound": "^1.0.3", + "get-proto": "^1.0.1", + "has-tostringtag": "^1.0.2", + "safe-regex-test": "^1.1.0" }, "engines": { "node": ">= 0.4" @@ -6232,40 +5694,30 @@ } }, "node_modules/is-bigint": { - "version": "1.0.4", - "resolved": "https://registry.npmjs.org/is-bigint/-/is-bigint-1.0.4.tgz", - "integrity": "sha512-zB9CruMamjym81i2JZ3UMn54PKGsQzsJeo6xvN3HJJ4CAsQNB6iRutp2To77OfCNuoxspsIhzaPoO1zyCEhFOg==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/is-bigint/-/is-bigint-1.1.0.tgz", + "integrity": "sha512-n4ZT37wG78iz03xPRKJrHTdZbe3IicyucEtdRsV5yglwc3GyUfbAfpSeD0FJ41NbUNSt5wbhqfp1fS+BgnvDFQ==", "dev": true, "license": "MIT", "dependencies": { - "has-bigints": "^1.0.1" + "has-bigints": "^1.0.2" + }, + "engines": { + "node": ">= 0.4" }, "funding": { "url": "https://github.com/sponsors/ljharb" } }, - "node_modules/is-binary-path": { - "version": "2.1.0", - "resolved": "https://registry.npmjs.org/is-binary-path/-/is-binary-path-2.1.0.tgz", - "integrity": "sha512-ZMERYes6pDydyuGidse7OsHxtbI7WVeUEozgR/g7rd0xUimYNlvZRE/K2MgZTjWy725IfelLeVcEM97mmtRGXw==", - "dev": true, - "license": "MIT", - "dependencies": { - "binary-extensions": "^2.0.0" - }, - "engines": { - "node": ">=8" - } - }, "node_modules/is-boolean-object": { - "version": "1.1.2", - "resolved": "https://registry.npmjs.org/is-boolean-object/-/is-boolean-object-1.1.2.tgz", - "integrity": "sha512-gDYaKHJmnj4aWxyj6YHyXVpdQawtVLHU5cb+eztPGczf6cjuTdwve5ZIEfgXqH4e57An1D1AKf8CZ3kYrQRqYA==", + "version": "1.2.2", + "resolved": "https://registry.npmjs.org/is-boolean-object/-/is-boolean-object-1.2.2.tgz", + "integrity": "sha512-wa56o2/ElJMYqjCjGkXri7it5FbebW5usLw/nPmCMs5DeZ7eziSYZhSmPRn0txqeW4LnAmQQU7FgqLpsEFKM4A==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.2", - "has-tostringtag": "^1.0.0" + "call-bound": "^1.0.3", + "has-tostringtag": "^1.0.2" }, "engines": { "node": ">= 0.4" @@ -6288,25 +5740,30 @@ } }, "node_modules/is-core-module": { - "version": "2.9.0", - "resolved": "https://registry.npmjs.org/is-core-module/-/is-core-module-2.9.0.tgz", - "integrity": "sha512-+5FPy5PnwmO3lvfMb0AsoPaBG+5KHUI0wYFXOtYPnVVVspTFUuMZNfNaNVRt3FZadstu2c8x23vykRW/NBoU6A==", + "version": "2.16.1", + "resolved": "https://registry.npmjs.org/is-core-module/-/is-core-module-2.16.1.tgz", + "integrity": "sha512-UfoeMA6fIJ8wTYFEUjelnaGI67v6+N7qXJEvQuIGa99l4xsCruSYOVSQ0uPANn4dAzm8lkYPaKLrrijLq7x23w==", "dev": true, "license": "MIT", "dependencies": { - "has": "^1.0.3" + "hasown": "^2.0.2" + }, + "engines": { + "node": ">= 0.4" }, "funding": { "url": "https://github.com/sponsors/ljharb" } }, "node_modules/is-data-view": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/is-data-view/-/is-data-view-1.0.1.tgz", - "integrity": "sha512-AHkaJrsUVW6wq6JS8y3JnM/GJF/9cf+k20+iDzlSaJrinEo5+7vRiteOSwBhHRiAyQATN1AmY4hwzxJKPmYf+w==", + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/is-data-view/-/is-data-view-1.0.2.tgz", + "integrity": "sha512-RKtWF8pGmS87i2D6gqQu/l7EYRlVdfzemCJN/P3UOs//x1QE7mfhvzHIApBTRf7axvT6DMGwSwBXYCT0nfB9xw==", "dev": true, "license": "MIT", "dependencies": { + "call-bound": "^1.0.2", + "get-intrinsic": "^1.2.6", "is-typed-array": "^1.1.13" }, "engines": { @@ -6317,13 +5774,14 @@ } }, "node_modules/is-date-object": { - "version": "1.0.5", - "resolved": "https://registry.npmjs.org/is-date-object/-/is-date-object-1.0.5.tgz", - "integrity": "sha512-9YQaSxsAiSwcvS33MBk3wTCVnWK+HhF8VZR2jRxehM16QcVOdHqPn4VPHmRK4lSr38n9JriurInLcP90xsYNfQ==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/is-date-object/-/is-date-object-1.1.0.tgz", + "integrity": "sha512-PwwhEakHVKTdRNVOw+/Gyh0+MzlCl4R6qKvkhuvLtPMggI1WAHt9sOwZxQLSGpUaDnrdyDsomoRgNnCfKNSXXg==", "dev": true, "license": "MIT", "dependencies": { - "has-tostringtag": "^1.0.0" + "call-bound": "^1.0.2", + "has-tostringtag": "^1.0.2" }, "engines": { "node": ">= 0.4" @@ -6343,13 +5801,16 @@ } }, "node_modules/is-finalizationregistry": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/is-finalizationregistry/-/is-finalizationregistry-1.0.2.tgz", - "integrity": "sha512-0by5vtUJs8iFQb5TYUHHPudOR+qXYIMKtiUzvLIZITZUjknFmziyBJuLhVRc+Ds0dREFlskDNJKYIdIzu/9pfw==", + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/is-finalizationregistry/-/is-finalizationregistry-1.1.1.tgz", + "integrity": "sha512-1pC6N8qWJbWoPtEjgcL2xyhQOP491EQjeUo3qTKcmV8YSDDJrOepfG8pcC7h/QgnQHYSv0mJ3Z/ZWxmatVrysg==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.2" + "call-bound": "^1.0.3" + }, + "engines": { + "node": ">= 0.4" }, "funding": { "url": "https://github.com/sponsors/ljharb" @@ -6376,13 +5837,16 @@ } }, "node_modules/is-generator-function": { - "version": "1.0.10", - "resolved": "https://registry.npmjs.org/is-generator-function/-/is-generator-function-1.0.10.tgz", - "integrity": "sha512-jsEjy9l3yiXEQ+PsXdmBwEPcOxaXWLspKdplFUVI9vq1iZgIekeC0L167qeu86czQaxed3q/Uzuw0swL0irL8A==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/is-generator-function/-/is-generator-function-1.1.0.tgz", + "integrity": "sha512-nPUB5km40q9e8UfN/Zc24eLlzdSf9OfKByBw9CIdw4H1giPMeA0OIJvbchsCu4npfI2QcMVBsGEBHKZ7wLTWmQ==", "dev": true, "license": "MIT", "dependencies": { - "has-tostringtag": "^1.0.0" + "call-bound": "^1.0.3", + "get-proto": "^1.0.0", + "has-tostringtag": "^1.0.2", + "safe-regex-test": "^1.1.0" }, "engines": { "node": ">= 0.4" @@ -6404,16 +5868,6 @@ "node": ">=0.10.0" } }, - "node_modules/is-interactive": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/is-interactive/-/is-interactive-1.0.0.tgz", - "integrity": "sha512-2HvIEKRoqS62guEC+qBjpvRubdX910WCMuJTZ+I9yvqKU2/12eSL549HMwtabb4oupdj2sMP50k+XJfB/8JE6w==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=8" - } - }, "node_modules/is-map": { "version": "2.0.3", "resolved": "https://registry.npmjs.org/is-map/-/is-map-2.0.3.tgz", @@ -6427,19 +5881,6 @@ "url": "https://github.com/sponsors/ljharb" } }, - "node_modules/is-negative-zero": { - "version": "2.0.3", - "resolved": "https://registry.npmjs.org/is-negative-zero/-/is-negative-zero-2.0.3.tgz", - "integrity": "sha512-5KoIu2Ngpyek75jXodFvnafB6DJgr3u8uuK0LEZJjrU19DrMD3EVERaR8sjz8CCGgpZvxPl9SuE1GMVPFHx1mw==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">= 0.4" - }, - "funding": { - "url": "https://github.com/sponsors/ljharb" - } - }, "node_modules/is-number": { "version": "7.0.0", "resolved": "https://registry.npmjs.org/is-number/-/is-number-7.0.0.tgz", @@ -6451,13 +5892,14 @@ } }, "node_modules/is-number-object": { - "version": "1.0.7", - "resolved": "https://registry.npmjs.org/is-number-object/-/is-number-object-1.0.7.tgz", - "integrity": "sha512-k1U0IRzLMo7ZlYIfzRu23Oh6MiIFasgpb9X76eqfFZAqwH44UI4KTBvBYIZ1dSL9ZzChTB9ShHfLkR4pdW5krQ==", + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/is-number-object/-/is-number-object-1.1.1.tgz", + "integrity": "sha512-lZhclumE1G6VYD8VHe35wFaIif+CTy5SJIi5+3y4psDgWu4wPDoBhF8NxUOinEc7pHgiTsT6MaBb92rKhhD+Xw==", "dev": true, "license": "MIT", "dependencies": { - "has-tostringtag": "^1.0.0" + "call-bound": "^1.0.3", + "has-tostringtag": "^1.0.2" }, "engines": { "node": ">= 0.4" @@ -6467,34 +5909,42 @@ } }, "node_modules/is-path-cwd": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/is-path-cwd/-/is-path-cwd-2.2.0.tgz", - "integrity": "sha512-w942bTcih8fdJPJmQHFzkS76NEP8Kzzvmw92cXsazb8intwLqPibPPdXf4ANdKV3rYMuuQYGIWtvz9JilB3NFQ==", + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/is-path-cwd/-/is-path-cwd-3.0.0.tgz", + "integrity": "sha512-kyiNFFLU0Ampr6SDZitD/DwUo4Zs1nSdnygUBqsu3LooL00Qvb5j+UnvApUn/TTj1J3OuE6BTdQ5rudKmU2ZaA==", "dev": true, "license": "MIT", "engines": { - "node": ">=6" + "node": "^12.20.0 || ^14.13.1 || >=16.0.0" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" } }, "node_modules/is-path-inside": { - "version": "3.0.3", - "resolved": "https://registry.npmjs.org/is-path-inside/-/is-path-inside-3.0.3.tgz", - "integrity": "sha512-Fd4gABb+ycGAmKou8eMftCupSir5lRxqf4aD/vd0cD2qc4HL07OjCeuHMr8Ro4CoMaeCKDB0/ECBOVWjTwUvPQ==", + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/is-path-inside/-/is-path-inside-4.0.0.tgz", + "integrity": "sha512-lJJV/5dYS+RcL8uQdBDW9c9uWFLLBNRyFhnAKXw5tVqLlKZ4RMGZKv+YQ/IA3OhD+RpbJa1LLFM1FQPGyIXvOA==", "dev": true, "license": "MIT", "engines": { - "node": ">=8" + "node": ">=12" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" } }, "node_modules/is-regex": { - "version": "1.1.4", - "resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.1.4.tgz", - "integrity": "sha512-kvRdxDsxZjhzUX07ZnLydzS1TU/TJlTUHHY4YLL87e37oUA49DfkLqgy+VjFocowy29cKvcSiu+kIv728jTTVg==", + "version": "1.2.1", + "resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.2.1.tgz", + "integrity": "sha512-MjYsKHO5O7mCsmRGxWcLWheFqN9DJ/2TmngvjKXihe6efViPqc274+Fx/4fYj/r03+ESvBdTXK0V6tA3rgez1g==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.2", - "has-tostringtag": "^1.0.0" + "call-bound": "^1.0.2", + "gopd": "^1.2.0", + "has-tostringtag": "^1.0.2", + "hasown": "^2.0.2" }, "engines": { "node": ">= 0.4" @@ -6517,13 +5967,13 @@ } }, "node_modules/is-shared-array-buffer": { - "version": "1.0.3", - "resolved": "https://registry.npmjs.org/is-shared-array-buffer/-/is-shared-array-buffer-1.0.3.tgz", - "integrity": "sha512-nA2hv5XIhLR3uVzDDfCIknerhx8XUKnstuOERPNNIinXG7v9u+ohXF67vxm4TPTEPU6lm61ZkwP3c9PCB97rhg==", + "version": "1.0.4", + "resolved": "https://registry.npmjs.org/is-shared-array-buffer/-/is-shared-array-buffer-1.0.4.tgz", + "integrity": "sha512-ISWac8drv4ZGfwKl5slpHG9OwPNty4jOWPRIhBpxOoD+hqITiwuipOQ2bNthAzwA3B4fIjO4Nln74N0S9byq8A==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7" + "call-bound": "^1.0.3" }, "engines": { "node": ">= 0.4" @@ -6546,13 +5996,14 @@ } }, "node_modules/is-string": { - "version": "1.0.7", - "resolved": "https://registry.npmjs.org/is-string/-/is-string-1.0.7.tgz", - "integrity": "sha512-tE2UXzivje6ofPW7l23cjDOMa09gb7xlAqG6jG5ej6uPV32TlWP3NKPigtaGeHNu9fohccRYvIiZMfOOnOYUtg==", + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/is-string/-/is-string-1.1.1.tgz", + "integrity": "sha512-BtEeSsoaQjlSPBemMQIrY1MY0uM6vnS1g5fmufYOtnxLGUZM2178PKbhsk7Ffv58IX+ZtcvoGwccYsh0PglkAA==", "dev": true, "license": "MIT", "dependencies": { - "has-tostringtag": "^1.0.0" + "call-bound": "^1.0.3", + "has-tostringtag": "^1.0.2" }, "engines": { "node": ">= 0.4" @@ -6562,13 +6013,15 @@ } }, "node_modules/is-symbol": { - "version": "1.0.4", - "resolved": "https://registry.npmjs.org/is-symbol/-/is-symbol-1.0.4.tgz", - "integrity": "sha512-C/CPBqKWnvdcxqIARxyOh4v1UUEOCHpgDa0WYgpKDFMszcrPcffg5uhwSgPCLD2WWxmq6isisz87tzT01tuGhg==", + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/is-symbol/-/is-symbol-1.1.1.tgz", + "integrity": "sha512-9gGx6GTtCQM73BgmHQXfDmLtfjjTUDSyoxTCbp5WtoixAhfgsDirWIcVQ/IHpvI5Vgd5i/J5F7B9cN/WlVbC/w==", "dev": true, "license": "MIT", "dependencies": { - "has-symbols": "^1.0.2" + "call-bound": "^1.0.2", + "has-symbols": "^1.1.0", + "safe-regex-test": "^1.1.0" }, "engines": { "node": ">= 0.4" @@ -6578,13 +6031,13 @@ } }, "node_modules/is-typed-array": { - "version": "1.1.13", - "resolved": "https://registry.npmjs.org/is-typed-array/-/is-typed-array-1.1.13.tgz", - "integrity": "sha512-uZ25/bUAlUY5fR4OKT4rZQEBrzQWYV9ZJYGGsUmEJ6thodVJ1HX64ePQ6Z0qPWP+m+Uq6e9UugrE38jeYsDSMw==", + "version": "1.1.15", + "resolved": "https://registry.npmjs.org/is-typed-array/-/is-typed-array-1.1.15.tgz", + "integrity": "sha512-p3EcsicXjit7SaskXHs1hA91QxgTw46Fv6EFKKGS5DRFLD8yKnohjF3hxoju94b/OcMZoQukzpPpBE9uLVKzgQ==", "dev": true, "license": "MIT", "dependencies": { - "which-typed-array": "^1.1.14" + "which-typed-array": "^1.1.16" }, "engines": { "node": ">= 0.4" @@ -6593,19 +6046,6 @@ "url": "https://github.com/sponsors/ljharb" } }, - "node_modules/is-unicode-supported": { - "version": "0.1.0", - "resolved": "https://registry.npmjs.org/is-unicode-supported/-/is-unicode-supported-0.1.0.tgz", - "integrity": "sha512-knxG2q4UC3u8stRGyAVJCOdxFmv5DZiRcdlIaAQXAbSfJya+OhopNotLQrstBhququ4ZpuKbDc/8S6mgXgPFPw==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=10" - }, - "funding": { - "url": "https://github.com/sponsors/sindresorhus" - } - }, "node_modules/is-weakmap": { "version": "2.0.2", "resolved": "https://registry.npmjs.org/is-weakmap/-/is-weakmap-2.0.2.tgz", @@ -6620,27 +6060,30 @@ } }, "node_modules/is-weakref": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/is-weakref/-/is-weakref-1.0.2.tgz", - "integrity": "sha512-qctsuLZmIQ0+vSSMfoVvyFe2+GSEvnmZ2ezTup1SBse9+twCCeial6EEi3Nc2KFcf6+qz2FBPnjXsk8xhKSaPQ==", + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/is-weakref/-/is-weakref-1.1.1.tgz", + "integrity": "sha512-6i9mGWSlqzNMEqpCp93KwRS1uUOodk2OJ6b+sq7ZPDSy2WuI5NFIxp/254TytR8ftefexkWn5xNiHUNpPOfSew==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.2" + "call-bound": "^1.0.3" + }, + "engines": { + "node": ">= 0.4" }, "funding": { "url": "https://github.com/sponsors/ljharb" } }, "node_modules/is-weakset": { - "version": "2.0.3", - "resolved": "https://registry.npmjs.org/is-weakset/-/is-weakset-2.0.3.tgz", - "integrity": "sha512-LvIm3/KWzS9oRFHugab7d+M/GcBXuXX5xZkzPmN+NxihdQlZUQ4dWuSV1xR/sq6upL1TJEDrfBgRepHFdBtSNQ==", + "version": "2.0.4", + "resolved": "https://registry.npmjs.org/is-weakset/-/is-weakset-2.0.4.tgz", + "integrity": "sha512-mfcwb6IzQyOKTs84CQMrOwW4gQcaTOAWJ0zzJCl2WSPDrWk/OzDaImWFH3djXhb24g4eudZfLRozAvPGw4d9hQ==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7", - "get-intrinsic": "^1.2.4" + "call-bound": "^1.0.3", + "get-intrinsic": "^1.2.6" }, "engines": { "node": ">= 0.4" @@ -6674,9 +6117,9 @@ } }, "node_modules/istanbul-lib-instrument": { - "version": "6.0.2", - "resolved": "https://registry.npmjs.org/istanbul-lib-instrument/-/istanbul-lib-instrument-6.0.2.tgz", - "integrity": "sha512-1WUsZ9R1lA0HtBSohTkm39WTPlNKSJ5iFk7UwqXkBLoHQT+hfqPsfsTDVuZdKGaBwn7din9bS7SsnoAr943hvw==", + "version": "6.0.3", + "resolved": "https://registry.npmjs.org/istanbul-lib-instrument/-/istanbul-lib-instrument-6.0.3.tgz", + "integrity": "sha512-Vtgk7L/R2JHyyGW07spoFlB8/lpjiOLTjMdms6AFMraYt3BaJauod/NGrfnVG/y4Ix1JEuMRPDPEj2ua+zz1/Q==", "dev": true, "license": "BSD-3-Clause", "dependencies": { @@ -6690,19 +6133,6 @@ "node": ">=10" } }, - "node_modules/istanbul-lib-instrument/node_modules/@babel/parser": { - "version": "7.24.7", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.24.7.tgz", - "integrity": "sha512-9uUYRm6OqQrCqQdG1iCBwBPZgN8ciDBro2nIOFaiRz1/BCxaI7CNvQbDHvsArAC7Tw9Hda/B3U+6ui9u4HWXPw==", - "dev": true, - "license": "MIT", - "bin": { - "parser": "bin/babel-parser.js" - }, - "engines": { - "node": ">=6.0.0" - } - }, "node_modules/istanbul-lib-report": { "version": "3.0.1", "resolved": "https://registry.npmjs.org/istanbul-lib-report/-/istanbul-lib-report-3.0.1.tgz", @@ -6747,37 +6177,63 @@ "node": ">=8" } }, - "node_modules/iterator.prototype": { - "version": "1.1.2", - "resolved": "https://registry.npmjs.org/iterator.prototype/-/iterator.prototype-1.1.2.tgz", - "integrity": "sha512-DR33HMMr8EzwuRL8Y9D3u2BMj8+RqSE850jfGu59kS7tbmPLzGkZmVSfyCFSDxuZiEY6Rzt3T2NA/qU+NwVj1w==", + "node_modules/jackspeak": { + "version": "4.1.0", + "resolved": "https://registry.npmjs.org/jackspeak/-/jackspeak-4.1.0.tgz", + "integrity": "sha512-9DDdhb5j6cpeitCbvLO7n7J4IxnbM6hoF6O1g4HQ5TfhvvKN8ywDM7668ZhMHRqVmxqhps/F6syWK2KcPxYlkw==", + "dev": true, + "license": "BlueOak-1.0.0", + "dependencies": { + "@isaacs/cliui": "^8.0.2" + }, + "engines": { + "node": "20 || >=22" + }, + "funding": { + "url": "https://github.com/sponsors/isaacs" + } + }, + "node_modules/jake": { + "version": "10.9.2", + "resolved": "https://registry.npmjs.org/jake/-/jake-10.9.2.tgz", + "integrity": "sha512-2P4SQ0HrLQ+fw6llpLnOaGAvN2Zu6778SJMrCUwns4fOoG9ayrTiZk3VV8sCPkVZF8ab0zksVpS8FDY5pRCNBA==", + "dev": true, + "license": "Apache-2.0", + "dependencies": { + "async": "^3.2.3", + "chalk": "^4.0.2", + "filelist": "^1.0.4", + "minimatch": "^3.1.2" + }, + "bin": { + "jake": "bin/cli.js" + }, + "engines": { + "node": ">=10" + } + }, + "node_modules/jake/node_modules/brace-expansion": { + "version": "1.1.12", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.12.tgz", + "integrity": "sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==", "dev": true, "license": "MIT", "dependencies": { - "define-properties": "^1.2.1", - "get-intrinsic": "^1.2.1", - "has-symbols": "^1.0.3", - "reflect.getprototypeof": "^1.0.4", - "set-function-name": "^2.0.1" + "balanced-match": "^1.0.0", + "concat-map": "0.0.1" } }, - "node_modules/jackspeak": { - "version": "3.4.0", - "resolved": "https://registry.npmjs.org/jackspeak/-/jackspeak-3.4.0.tgz", - "integrity": "sha512-JVYhQnN59LVPFCEcVa2C3CrEKYacvjRfqIQl+h8oi91aLYQVWRYbxjPcv1bUiUy/kLmQaANrYfNMCO3kuEDHfw==", + "node_modules/jake/node_modules/minimatch": { + "version": "3.1.2", + "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-3.1.2.tgz", + "integrity": "sha512-J7p63hRiAjw1NDEww1W7i37+ByIrOWO5XQQAzZ3VOcL0PNybwpfmV/N05zFAzwQ9USyEcX6t3UO+K5aqBQOIHw==", "dev": true, - "license": "BlueOak-1.0.0", + "license": "ISC", "dependencies": { - "@isaacs/cliui": "^8.0.2" + "brace-expansion": "^1.1.7" }, "engines": { - "node": ">=14" - }, - "funding": { - "url": "https://github.com/sponsors/isaacs" - }, - "optionalDependencies": { - "@pkgjs/parseargs": "^0.11.0" + "node": "*" } }, "node_modules/jest": { @@ -6854,6 +6310,16 @@ "node": "^14.15.0 || ^16.10.0 || >=18.0.0" } }, + "node_modules/jest-circus/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/jest-cli": { "version": "29.7.0", "resolved": "https://registry.npmjs.org/jest-cli/-/jest-cli-29.7.0.tgz", @@ -6903,24 +6369,6 @@ "node": ">=12" } }, - "node_modules/jest-cli/node_modules/wrap-ansi": { - "version": "7.0.0", - "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-7.0.0.tgz", - "integrity": "sha512-YVGIj2kamLSTxw6NsZjoBxfSwsn0ycdesmc4p+Q21c5zPuZ1pl+NfxVdxPtdHvmNVOQ6XSYG4AUtyt/Fi7D16Q==", - "dev": true, - "license": "MIT", - "dependencies": { - "ansi-styles": "^4.0.0", - "string-width": "^4.1.0", - "strip-ansi": "^6.0.0" - }, - "engines": { - "node": ">=10" - }, - "funding": { - "url": "https://github.com/chalk/wrap-ansi?sponsor=1" - } - }, "node_modules/jest-cli/node_modules/yargs": { "version": "17.7.2", "resolved": "https://registry.npmjs.org/yargs/-/yargs-17.7.2.tgz", @@ -6986,6 +6434,16 @@ } } }, + "node_modules/jest-config/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/jest-diff": { "version": "29.7.0", "resolved": "https://registry.npmjs.org/jest-diff/-/jest-diff-29.7.0.tgz", @@ -7137,6 +6595,16 @@ "node": "^14.15.0 || ^16.10.0 || >=18.0.0" } }, + "node_modules/jest-message-util/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/jest-mock": { "version": "29.7.0", "resolved": "https://registry.npmjs.org/jest-mock/-/jest-mock-29.7.0.tgz", @@ -7215,6 +6683,16 @@ "node": "^14.15.0 || ^16.10.0 || >=18.0.0" } }, + "node_modules/jest-resolve/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/jest-runner": { "version": "29.7.0", "resolved": "https://registry.npmjs.org/jest-runner/-/jest-runner-29.7.0.tgz", @@ -7282,6 +6760,16 @@ "node": "^14.15.0 || ^16.10.0 || >=18.0.0" } }, + "node_modules/jest-runtime/node_modules/slash": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", + "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, "node_modules/jest-snapshot": { "version": "29.7.0", "resolved": "https://registry.npmjs.org/jest-snapshot/-/jest-snapshot-29.7.0.tgz", @@ -7332,6 +6820,19 @@ "node": "^14.15.0 || ^16.10.0 || >=18.0.0" } }, + "node_modules/jest-util/node_modules/picomatch": { + "version": "2.3.1", + "resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.3.1.tgz", + "integrity": "sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8.6" + }, + "funding": { + "url": "https://github.com/sponsors/jonschlinkert" + } + }, "node_modules/jest-validate": { "version": "29.7.0", "resolved": "https://registry.npmjs.org/jest-validate/-/jest-validate-29.7.0.tgz", @@ -7446,16 +6947,16 @@ } }, "node_modules/jsesc": { - "version": "2.5.2", - "resolved": "https://registry.npmjs.org/jsesc/-/jsesc-2.5.2.tgz", - "integrity": "sha512-OYu7XEzjkCQ3C5Ps3QIZsQfNpqoJyZZA99wd9aWd05NCtC5pWOkShK2mkL6HXQR6/Cy2lbNdPlZBpuQHXE63gA==", + "version": "3.1.0", + "resolved": "https://registry.npmjs.org/jsesc/-/jsesc-3.1.0.tgz", + "integrity": "sha512-/sM3dO2FOzXjKQhJuo0Q173wf2KOo8t4I8vHy6lF9poUp7bKT0/NHE8fPX23PwfhnykfqnC2xRxOnVw5XuGIaA==", "dev": true, "license": "MIT", "bin": { "jsesc": "bin/jsesc" }, "engines": { - "node": ">=4" + "node": ">=6" } }, "node_modules/json-buffer": { @@ -7593,9 +7094,9 @@ } }, "node_modules/lilconfig": { - "version": "3.1.2", - "resolved": "https://registry.npmjs.org/lilconfig/-/lilconfig-3.1.2.tgz", - "integrity": "sha512-eop+wDAvpItUys0FWkHIKeC9ybYrTGbU41U5K7+bttZZeohvnY7M9dZ5kB21GNWiFT2q1OoPTvncPCgSOVO5ow==", + "version": "3.1.3", + "resolved": "https://registry.npmjs.org/lilconfig/-/lilconfig-3.1.3.tgz", + "integrity": "sha512-/vlFKAoH5Cgt3Ie+JLhRbwOsCQePABiU3tJ1egGvyQ+33R/vcwM2Zl2QR/LzjsBeItPt3oSVXapn+m4nQDvpzw==", "dev": true, "license": "MIT", "engines": { @@ -7638,13 +7139,6 @@ "url": "https://github.com/sponsors/sindresorhus" } }, - "node_modules/lodash": { - "version": "4.17.21", - "resolved": "https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz", - "integrity": "sha512-v2kDEe57lecTulaDIuNTPy3Ry4gLGJ6Z1O3vE1krgXZNrsQ+LFTGHVxVjcXPs17LhbZVGedAJv8XZ1tvj5FvSg==", - "dev": true, - "license": "MIT" - }, "node_modules/lodash.memoize": { "version": "4.1.2", "resolved": "https://registry.npmjs.org/lodash.memoize/-/lodash.memoize-4.1.2.tgz", @@ -7666,27 +7160,10 @@ "dev": true, "license": "MIT" }, - "node_modules/log-symbols": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/log-symbols/-/log-symbols-4.1.0.tgz", - "integrity": "sha512-8XPvpAA8uyhfteu8pIvQxpJZ7SYYdpUivZpGy6sFsBuKRY/7rQGavedeB8aK+Zkyq6upMFVL/9AW6vOYzfRyLg==", - "dev": true, - "license": "MIT", - "dependencies": { - "chalk": "^4.1.0", - "is-unicode-supported": "^0.1.0" - }, - "engines": { - "node": ">=10" - }, - "funding": { - "url": "https://github.com/sponsors/sindresorhus" - } - }, "node_modules/loglevel": { - "version": "1.9.1", - "resolved": "https://registry.npmjs.org/loglevel/-/loglevel-1.9.1.tgz", - "integrity": "sha512-hP3I3kCrDIMuRwAwHltphhDM1r8i55H33GgqjXbrisuJhF4kRhW1dNuxsRklp4bXl8DSdLaNLuiL4A/LWRfxvg==", + "version": "1.9.2", + "resolved": "https://registry.npmjs.org/loglevel/-/loglevel-1.9.2.tgz", + "integrity": "sha512-HgMmCqIJSAKqo68l0rS2AanEWfkxaZ5wNiEFb5ggm08lDs9Xl2KxBlX3PTcaD2chBM1gXAYf491/M2Rv8Jwayg==", "dev": true, "license": "MIT", "engines": { @@ -7747,6 +7224,16 @@ "dev": true, "license": "MIT" }, + "node_modules/math-intrinsics": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/math-intrinsics/-/math-intrinsics-1.1.0.tgz", + "integrity": "sha512-/IXtbwEk5HTPyEwyKX6hGkYXxM9nbj64B+ilVJnC/R6B0pH5G4V3b0pVbL7DBj4tkhBAppbQUlf6F6Xl9LHu1g==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">= 0.4" + } + }, "node_modules/merge-stream": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/merge-stream/-/merge-stream-2.0.0.tgz", @@ -7778,6 +7265,19 @@ "node": ">=8.6" } }, + "node_modules/micromatch/node_modules/picomatch": { + "version": "2.3.1", + "resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.3.1.tgz", + "integrity": "sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8.6" + }, + "funding": { + "url": "https://github.com/sponsors/jonschlinkert" + } + }, "node_modules/mimic-fn": { "version": "2.1.0", "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-2.1.0.tgz", @@ -7802,9 +7302,9 @@ } }, "node_modules/minimatch": { - "version": "9.0.3", - "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-9.0.3.tgz", - "integrity": "sha512-RHiac9mvaRw0x3AYRgDC1CxAP7HTcNrrECeA8YYJeWnpo+2Q5CegtZjaotWTWxDG3UeGA1coE05iH1mPjT/2mg==", + "version": "9.0.5", + "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-9.0.5.tgz", + "integrity": "sha512-G6T0ZX48xgozx7587koeX9Ys2NYy6Gmv//P89sEte9V9whIapMNF4idKxnW2QtCcLiTWlb/wfCabAtAFWhhBow==", "dev": true, "license": "ISC", "dependencies": { @@ -7858,9 +7358,9 @@ "license": "MIT" }, "node_modules/ms": { - "version": "2.1.2", - "resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz", - "integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w==", + "version": "2.1.3", + "resolved": "https://registry.npmjs.org/ms/-/ms-2.1.3.tgz", + "integrity": "sha512-6FlzubTLZG3J2a/NVCAleEhjzq5oxgHyaCU9yYXvcLsvoVaHJq/s5xXI6/XXP6tz7R9xAOtHnSO/tXtF3WRTlA==", "dev": true, "license": "MIT" }, @@ -7904,13 +7404,6 @@ "node": ">= 6" } }, - "node_modules/mute-stream": { - "version": "0.0.8", - "resolved": "https://registry.npmjs.org/mute-stream/-/mute-stream-0.0.8.tgz", - "integrity": "sha512-nnbWWOkoWyUsTjKrhgD0dcz22mdkSnpYqbEjIm2nhwhuxlSkpywJmBo8h0ZqJdkp73mb90SssHkN4rsRaBAfAA==", - "dev": true, - "license": "ISC" - }, "node_modules/mz": { "version": "2.7.0", "resolved": "https://registry.npmjs.org/mz/-/mz-2.7.0.tgz", @@ -7924,19 +7417,19 @@ } }, "node_modules/nanospinner": { - "version": "1.1.0", - "resolved": "https://registry.npmjs.org/nanospinner/-/nanospinner-1.1.0.tgz", - "integrity": "sha512-yFvNYMig4AthKYfHFl1sLj7B2nkHL4lzdig4osvl9/LdGbXwrdFRoqBS98gsEsOakr0yH+r5NZ/1Y9gdVB8trA==", + "version": "1.2.2", + "resolved": "https://registry.npmjs.org/nanospinner/-/nanospinner-1.2.2.tgz", + "integrity": "sha512-Zt/AmG6qRU3e+WnzGGLuMCEAO/dAu45stNbHY223tUxldaDAeE+FxSPsd9Q+j+paejmm0ZbrNVs5Sraqy3dRxA==", "dev": true, - "license": "ISC", + "license": "MIT", "dependencies": { - "picocolors": "^1.0.0" + "picocolors": "^1.1.1" } }, "node_modules/napi-build-utils": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/napi-build-utils/-/napi-build-utils-1.0.2.tgz", - "integrity": "sha512-ONmRUqK7zj7DWX0D9ADe03wbwOBZxNAfF20PlGfCWQcD3+/MakShIHrMqx9YwPTfxDdF1zLeL+RGZiR9kGMLdg==", + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/napi-build-utils/-/napi-build-utils-2.0.0.tgz", + "integrity": "sha512-GEbrYkbfF7MoNaoh2iGG84Mnf/WZfB0GdGEsM8wz7Expx/LlWf5U8t9nvJKXSp3qr5IsEbK04cBGhol/KwOsWA==", "dev": true, "license": "MIT" }, @@ -7948,9 +7441,9 @@ "license": "MIT" }, "node_modules/node-abi": { - "version": "3.64.0", - "resolved": "https://registry.npmjs.org/node-abi/-/node-abi-3.64.0.tgz", - "integrity": "sha512-lxowHVCx3o1zfKJthjWh6WI8Eyi4gdTaK9bUc3oTjYv9j8sp5gSiufkOvoYZ1LgmZKngWUkS5a8G1RSuLWtPgg==", + "version": "3.74.0", + "resolved": "https://registry.npmjs.org/node-abi/-/node-abi-3.74.0.tgz", + "integrity": "sha512-c5XK0MjkGBrQPGYG24GBADZud0NCbznxNx0ZkS+ebUTrmV1qTDxPxSL8zEAPURXSbLRWVexxmP4986BziahL5w==", "dev": true, "license": "MIT", "dependencies": { @@ -7989,9 +7482,9 @@ "license": "MIT" }, "node_modules/node-releases": { - "version": "2.0.14", - "resolved": "https://registry.npmjs.org/node-releases/-/node-releases-2.0.14.tgz", - "integrity": "sha512-y10wOWt8yZpqXmOgRo77WaHEmhYQYGNA6y421PKsKYWEK8aW+cqAphborZDhqfyKrbZEN92CN1X2KbafY2s7Yw==", + "version": "2.0.19", + "resolved": "https://registry.npmjs.org/node-releases/-/node-releases-2.0.19.tgz", + "integrity": "sha512-xxOWJsBKtzAq7DY0J+DTzuz58K8e7sJbdgwkbMWQe8UYB6ekmsQ45q0M/tJDsGaZmbC+l7n57UV8Hl5tHxO9uw==", "dev": true, "license": "MIT" }, @@ -8067,11 +7560,14 @@ } }, "node_modules/object-inspect": { - "version": "1.13.1", - "resolved": "https://registry.npmjs.org/object-inspect/-/object-inspect-1.13.1.tgz", - "integrity": "sha512-5qoj1RUiKOMsCCNLV1CBiPYE10sziTsnmNxkAI/rZhiD63CF7IqdFGC/XzjWjpSgLf0LxXX3bDFIh0E18f6UhQ==", + "version": "1.13.4", + "resolved": "https://registry.npmjs.org/object-inspect/-/object-inspect-1.13.4.tgz", + "integrity": "sha512-W67iLl4J2EXEGTbfeHCffrjDfitvLANg0UlX3wFUUSTx92KXRFegMHUVgSqE+wvhAbi4WqjGg9czysTV2Epbew==", "dev": true, "license": "MIT", + "engines": { + "node": ">= 0.4" + }, "funding": { "url": "https://github.com/sponsors/ljharb" } @@ -8087,15 +7583,17 @@ } }, "node_modules/object.assign": { - "version": "4.1.5", - "resolved": "https://registry.npmjs.org/object.assign/-/object.assign-4.1.5.tgz", - "integrity": "sha512-byy+U7gp+FVwmyzKPYhW2h5l3crpmGsxl7X2s8y43IgxvG4g3QZ6CffDtsNQy1WsmZpQbO+ybo0AlW7TY6DcBQ==", + "version": "4.1.7", + "resolved": "https://registry.npmjs.org/object.assign/-/object.assign-4.1.7.tgz", + "integrity": "sha512-nK28WOo+QIjBkDduTINE4JkF/UJJKyf2EJxvJKfblDpyg0Q+pkOHNTL0Qwy6NP6FhE/EnzV73BxxqcJaXY9anw==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.5", + "call-bind": "^1.0.8", + "call-bound": "^1.0.3", "define-properties": "^1.2.1", - "has-symbols": "^1.0.3", + "es-object-atoms": "^1.0.0", + "has-symbols": "^1.1.0", "object-keys": "^1.1.1" }, "engines": { @@ -8105,21 +7603,6 @@ "url": "https://github.com/sponsors/ljharb" } }, - "node_modules/object.entries": { - "version": "1.1.8", - "resolved": "https://registry.npmjs.org/object.entries/-/object.entries-1.1.8.tgz", - "integrity": "sha512-cmopxi8VwRIAw/fkijJohSfpef5PdN0pMQJN6VC/ZKvn0LIknWD8KtgY6KlQdEc4tIjcQ3HxSMmnvtzIscdaYQ==", - "dev": true, - "license": "MIT", - "dependencies": { - "call-bind": "^1.0.7", - "define-properties": "^1.2.1", - "es-object-atoms": "^1.0.0" - }, - "engines": { - "node": ">= 0.4" - } - }, "node_modules/object.fromentries": { "version": "2.0.8", "resolved": "https://registry.npmjs.org/object.fromentries/-/object.fromentries-2.0.8.tgz", @@ -8155,13 +7638,14 @@ } }, "node_modules/object.values": { - "version": "1.2.0", - "resolved": "https://registry.npmjs.org/object.values/-/object.values-1.2.0.tgz", - "integrity": "sha512-yBYjY9QX2hnRmZHAjG/f13MzmBzxzYgQhFrke06TTyKY5zSTEqkOeukBzIdVA3j3ulu8Qa3MbVFShV7T2RmGtQ==", + "version": "1.2.1", + "resolved": "https://registry.npmjs.org/object.values/-/object.values-1.2.1.tgz", + "integrity": "sha512-gXah6aZrcUxjWg2zR2MwouP2eHlCBzdV4pygudehaKXSGW4v2AsRQUK+lwwXhii6KFZcunEnmSUoYp5CXibxtA==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7", + "call-bind": "^1.0.8", + "call-bound": "^1.0.3", "define-properties": "^1.2.1", "es-object-atoms": "^1.0.0" }, @@ -8216,38 +7700,22 @@ "node": ">= 0.8.0" } }, - "node_modules/ora": { - "version": "5.4.1", - "resolved": "https://registry.npmjs.org/ora/-/ora-5.4.1.tgz", - "integrity": "sha512-5b6Y85tPxZZ7QytO+BQzysW31HJku27cRIlkbAXaNx+BdcVi+LlRFmVXzeF6a7JCwJpyw5c4b+YSVImQIrBpuQ==", + "node_modules/own-keys": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/own-keys/-/own-keys-1.0.1.tgz", + "integrity": "sha512-qFOyK5PjiWZd+QQIh+1jhdb9LpxTF0qs7Pm8o5QHYZ0M3vKqSqzsZaEB6oWlxZ+q2sJBMI/Ktgd2N5ZwQoRHfg==", "dev": true, "license": "MIT", "dependencies": { - "bl": "^4.1.0", - "chalk": "^4.1.0", - "cli-cursor": "^3.1.0", - "cli-spinners": "^2.5.0", - "is-interactive": "^1.0.0", - "is-unicode-supported": "^0.1.0", - "log-symbols": "^4.1.0", - "strip-ansi": "^6.0.0", - "wcwidth": "^1.0.1" + "get-intrinsic": "^1.2.6", + "object-keys": "^1.1.1", + "safe-push-apply": "^1.0.0" }, "engines": { - "node": ">=10" + "node": ">= 0.4" }, "funding": { - "url": "https://github.com/sponsors/sindresorhus" - } - }, - "node_modules/os-tmpdir": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/os-tmpdir/-/os-tmpdir-1.0.2.tgz", - "integrity": "sha512-D2FR03Vir7FIu45XBY20mTb+/ZSWB00sjU9jdQXt83gDrI4Ztz5Fs7/yy74g2N5SVQY4xY1qDr4rNddwYRVX0g==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=0.10.0" + "url": "https://github.com/sponsors/ljharb" } }, "node_modules/p-is-promise": { @@ -8293,16 +7761,13 @@ } }, "node_modules/p-map": { - "version": "4.0.0", - "resolved": "https://registry.npmjs.org/p-map/-/p-map-4.0.0.tgz", - "integrity": "sha512-/bjOqmgETBYB5BoEeGVea8dmvHb2m9GLy1E9W43yeyfP6QQCZGFNa+XRceJEuDB6zqr+gKpIAmlLebMpykw/MQ==", + "version": "7.0.3", + "resolved": "https://registry.npmjs.org/p-map/-/p-map-7.0.3.tgz", + "integrity": "sha512-VkndIv2fIB99swvQoA65bm+fsmt6UNdGeIB0oxBs+WhAhdh08QA04JXpI7rbB9r08/nkbysKoya9rtDERYOYMA==", "dev": true, "license": "MIT", - "dependencies": { - "aggregate-error": "^3.0.0" - }, "engines": { - "node": ">=10" + "node": ">=18" }, "funding": { "url": "https://github.com/sponsors/sindresorhus" @@ -8318,6 +7783,13 @@ "node": ">=6" } }, + "node_modules/package-json-from-dist": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/package-json-from-dist/-/package-json-from-dist-1.0.1.tgz", + "integrity": "sha512-UEZIS3/by4OC8vL3P2dTXRETpebLI2NiI5vIrjaD/5UtrkFX/tNbwjTSRAGC/+7CAo2pIcBaRgWmcBBHcsaCIw==", + "dev": true, + "license": "BlueOak-1.0.0" + }, "node_modules/parent-module": { "version": "1.0.1", "resolved": "https://registry.npmjs.org/parent-module/-/parent-module-1.0.1.tgz", @@ -8388,30 +7860,30 @@ "license": "MIT" }, "node_modules/path-scurry": { - "version": "1.11.1", - "resolved": "https://registry.npmjs.org/path-scurry/-/path-scurry-1.11.1.tgz", - "integrity": "sha512-Xa4Nw17FS9ApQFJ9umLiJS4orGjm7ZzwUrwamcGQuHSzDyth9boKDaycYdDcZDuqYATXw4HFXgaqWTctW/v1HA==", + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/path-scurry/-/path-scurry-2.0.0.tgz", + "integrity": "sha512-ypGJsmGtdXUOeM5u93TyeIEfEhM6s+ljAhrk5vAvSx8uyY/02OvrZnA0YNGUrPXfpJMgI1ODd3nwz8Npx4O4cg==", "dev": true, "license": "BlueOak-1.0.0", "dependencies": { - "lru-cache": "^10.2.0", - "minipass": "^5.0.0 || ^6.0.2 || ^7.0.0" + "lru-cache": "^11.0.0", + "minipass": "^7.1.2" }, "engines": { - "node": ">=16 || 14 >=14.18" + "node": "20 || >=22" }, "funding": { "url": "https://github.com/sponsors/isaacs" } }, "node_modules/path-scurry/node_modules/lru-cache": { - "version": "10.2.2", - "resolved": "https://registry.npmjs.org/lru-cache/-/lru-cache-10.2.2.tgz", - "integrity": "sha512-9hp3Vp2/hFQUiIwKo8XCeFVnrg8Pk3TYNPIR7tJADKi5YfcF7vEaK7avFHTlSy3kOKYaJQaalfEo6YuXdceBOQ==", + "version": "11.0.2", + "resolved": "https://registry.npmjs.org/lru-cache/-/lru-cache-11.0.2.tgz", + "integrity": "sha512-123qHRfJBmo2jXDbo/a5YOQrJoHF/GNQTLzQ5+IdK5pWpceK17yRc6ozlWd25FxvGKQbIUs91fDFkXmDHTKcyA==", "dev": true, "license": "ISC", "engines": { - "node": "14 || >=16.14" + "node": "20 || >=22" } }, "node_modules/path-type": { @@ -8425,20 +7897,20 @@ } }, "node_modules/picocolors": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/picocolors/-/picocolors-1.0.1.tgz", - "integrity": "sha512-anP1Z8qwhkbmu7MFP5iTt+wQKXgwzf7zTyGlcdzabySa9vd0Xt392U0rVmz9poOaBj0uHJKyyo9/upk0HrEQew==", + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/picocolors/-/picocolors-1.1.1.tgz", + "integrity": "sha512-xceH2snhtb5M9liqDsmEw56le376mTZkEX/jEb/RxNFyegNul7eNslCXP9FDj/Lcu0X8KEyMceP2ntpaHrDEVA==", "dev": true, "license": "ISC" }, "node_modules/picomatch": { - "version": "2.3.1", - "resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.3.1.tgz", - "integrity": "sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==", + "version": "4.0.2", + "resolved": "https://registry.npmjs.org/picomatch/-/picomatch-4.0.2.tgz", + "integrity": "sha512-M7BAV6Rlcy5u+m6oPhAPFgJTzAioX/6B0DxyvDlo9l8+T3nLKbrczg2WLUyzd45L8RqfUMyGPzekbMvX2Ldkwg==", "dev": true, "license": "MIT", "engines": { - "node": ">=8.6" + "node": ">=12" }, "funding": { "url": "https://github.com/sponsors/jonschlinkert" @@ -8524,9 +7996,9 @@ } }, "node_modules/possible-typed-array-names": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/possible-typed-array-names/-/possible-typed-array-names-1.0.0.tgz", - "integrity": "sha512-d7Uw+eZoloe0EHDIYoe+bQ5WXnGMOpmiZFTuMWCwpjzzkL2nTjcKiAk4hh8TjnGye2TwWOk3UXucZ+3rbmBa8Q==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/possible-typed-array-names/-/possible-typed-array-names-1.1.0.tgz", + "integrity": "sha512-/+5VFTchJDoVj3bhoqi6UeymcD00DAwb1nJwamzPvHEszJ4FpF6SNNbUbOS8yI56qHzdV8eK0qEfOSiodkTdxg==", "dev": true, "license": "MIT", "engines": { @@ -8534,9 +8006,9 @@ } }, "node_modules/postcss-load-config": { - "version": "4.0.2", - "resolved": "https://registry.npmjs.org/postcss-load-config/-/postcss-load-config-4.0.2.tgz", - "integrity": "sha512-bSVhyJGL00wMVoPUzAVAnbEoWyqRxkjv64tUl427SKnPrENtq6hJwUojroMz2VB+Q1edmi4IfrAPpami5VVgMQ==", + "version": "6.0.1", + "resolved": "https://registry.npmjs.org/postcss-load-config/-/postcss-load-config-6.0.1.tgz", + "integrity": "sha512-oPtTM4oerL+UXmx+93ytZVN82RrlY/wPUV8IeDxFrzIjXOLF1pN+EmKPLbubvKHT2HC20xXsCAH2Z+CKV6Oz/g==", "dev": true, "funding": [ { @@ -8550,29 +8022,36 @@ ], "license": "MIT", "dependencies": { - "lilconfig": "^3.0.0", - "yaml": "^2.3.4" + "lilconfig": "^3.1.1" }, "engines": { - "node": ">= 14" + "node": ">= 18" }, "peerDependencies": { + "jiti": ">=1.21.0", "postcss": ">=8.0.9", - "ts-node": ">=9.0.0" + "tsx": "^4.8.1", + "yaml": "^2.4.2" }, "peerDependenciesMeta": { + "jiti": { + "optional": true + }, "postcss": { "optional": true }, - "ts-node": { + "tsx": { + "optional": true + }, + "yaml": { "optional": true } } }, "node_modules/prebuild-install": { - "version": "7.1.1", - "resolved": "https://registry.npmjs.org/prebuild-install/-/prebuild-install-7.1.1.tgz", - "integrity": "sha512-jAXscXWMcCK8GgCoHOfIr0ODh5ai8mj63L2nWrjuAgXE6tDyYGnx4/8o/rCgU+B4JSyZBKbeZqzhtwtC3ovxjw==", + "version": "7.1.3", + "resolved": "https://registry.npmjs.org/prebuild-install/-/prebuild-install-7.1.3.tgz", + "integrity": "sha512-8Mf2cbV7x1cXPUILADGI3wuhfqWvtiLA1iclTDbFRZkgRQS0NqsPZphna9V+HyTEadheuPmjaJMsbzKQFOzLug==", "dev": true, "license": "MIT", "dependencies": { @@ -8581,7 +8060,7 @@ "github-from-package": "0.0.0", "minimist": "^1.2.3", "mkdirp-classic": "^0.5.3", - "napi-build-utils": "^1.0.1", + "napi-build-utils": "^2.0.0", "node-abi": "^3.3.0", "pump": "^3.0.0", "rc": "^1.2.7", @@ -8607,9 +8086,9 @@ } }, "node_modules/prettier": { - "version": "3.3.1", - "resolved": "https://registry.npmjs.org/prettier/-/prettier-3.3.1.tgz", - "integrity": "sha512-7CAwy5dRsxs8PHXT3twixW9/OEll8MLE0VRPCJyl7CkS6VHGPSlsVaWTiASPTyGyYRyApxlaWTzwUxVNrhcwDg==", + "version": "3.5.3", + "resolved": "https://registry.npmjs.org/prettier/-/prettier-3.5.3.tgz", + "integrity": "sha512-QQtaxnoDJeAkDvDKWCLiwIXkTgRhwYDEQCghU9Z6q03iyek/rxRh/2lC3HB7P8sWT2xC/y5JDctPLBIGzHKbhw==", "dev": true, "license": "MIT", "bin": { @@ -8712,9 +8191,9 @@ } }, "node_modules/pump": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/pump/-/pump-3.0.0.tgz", - "integrity": "sha512-LwZy+p3SFs1Pytd/jYct4wpv49HiYCqd9Rlc5ZVdk0V+8Yzv6jR5Blk3TRmPL1ft69TxP0IMZGJ+WPFU2BFhww==", + "version": "3.0.2", + "resolved": "https://registry.npmjs.org/pump/-/pump-3.0.2.tgz", + "integrity": "sha512-tUPXtzlGM8FE3P0ZL6DVs/3P58k9nk8/jZeQCurTJylQA8qFYzHFfhBJkuqyE0FifOsQ0uKWekiZ5g8wtr28cw==", "dev": true, "license": "MIT", "dependencies": { @@ -8820,16 +8299,17 @@ } }, "node_modules/readdirp": { - "version": "3.6.0", - "resolved": "https://registry.npmjs.org/readdirp/-/readdirp-3.6.0.tgz", - "integrity": "sha512-hOS089on8RduqdbhvQ5Z37A0ESjsqz6qnRcffsMU3495FuTdqSm+7bhJ29JvIOsBDEEnan5DPu9t3To9VRlMzA==", + "version": "4.1.2", + "resolved": "https://registry.npmjs.org/readdirp/-/readdirp-4.1.2.tgz", + "integrity": "sha512-GDhwkLfywWL2s6vEjyhri+eXmfH6j1L7JE27WhqLeYzoh/A3DBaYGEj2H/HFZCn/kMfim73FXxEJTw06WtxQwg==", "dev": true, "license": "MIT", - "dependencies": { - "picomatch": "^2.2.1" - }, "engines": { - "node": ">=8.10.0" + "node": ">= 14.18.0" + }, + "funding": { + "type": "individual", + "url": "https://paulmillr.com/funding/" } }, "node_modules/readline-sync": { @@ -8843,19 +8323,20 @@ } }, "node_modules/reflect.getprototypeof": { - "version": "1.0.6", - "resolved": "https://registry.npmjs.org/reflect.getprototypeof/-/reflect.getprototypeof-1.0.6.tgz", - "integrity": "sha512-fmfw4XgoDke3kdI6h4xcUz1dG8uaiv5q9gcEwLS4Pnth2kxT+GZ7YehS1JTMGBQmtV7Y4GFGbs2re2NqhdozUg==", + "version": "1.0.10", + "resolved": "https://registry.npmjs.org/reflect.getprototypeof/-/reflect.getprototypeof-1.0.10.tgz", + "integrity": "sha512-00o4I+DVrefhv+nX0ulyi3biSHCPDe+yLv5o/p6d/UVlirijB8E16FtfwSAi4g3tcqrQ4lRAqQSoFEZJehYEcw==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7", + "call-bind": "^1.0.8", "define-properties": "^1.2.1", - "es-abstract": "^1.23.1", + "es-abstract": "^1.23.9", "es-errors": "^1.3.0", - "get-intrinsic": "^1.2.4", - "globalthis": "^1.0.3", - "which-builtin-type": "^1.1.3" + "es-object-atoms": "^1.0.0", + "get-intrinsic": "^1.2.7", + "get-proto": "^1.0.1", + "which-builtin-type": "^1.2.1" }, "engines": { "node": ">= 0.4" @@ -8864,24 +8345,19 @@ "url": "https://github.com/sponsors/ljharb" } }, - "node_modules/regenerator-runtime": { - "version": "0.14.1", - "resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.14.1.tgz", - "integrity": "sha512-dYnhHh0nJoMfnkZs6GmmhFknAGRrLznOu5nc9ML+EJxGvrx6H7teuevqVqCuPcPK//3eDrrjQhehXVx9cnkGdw==", - "dev": true, - "license": "MIT" - }, "node_modules/regexp.prototype.flags": { - "version": "1.5.2", - "resolved": "https://registry.npmjs.org/regexp.prototype.flags/-/regexp.prototype.flags-1.5.2.tgz", - "integrity": "sha512-NcDiDkTLuPR+++OCKB0nWafEmhg/Da8aUPLPMQbK+bxKKCm1/S5he+AqYa4PlMCVBalb4/yxIRub6qkEx5yJbw==", + "version": "1.5.4", + "resolved": "https://registry.npmjs.org/regexp.prototype.flags/-/regexp.prototype.flags-1.5.4.tgz", + "integrity": "sha512-dYqgNSZbDwkaJ2ceRd9ojCGjBq+mOm9LmtXnAnEGyHhN/5R7iDW2TRw3h+o/jCFxus3P2LfWIIiwowAjANm7IA==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.6", + "call-bind": "^1.0.8", "define-properties": "^1.2.1", "es-errors": "^1.3.0", - "set-function-name": "^2.0.1" + "get-proto": "^1.0.1", + "gopd": "^1.2.0", + "set-function-name": "^2.0.2" }, "engines": { "node": ">= 0.4" @@ -8910,19 +8386,22 @@ } }, "node_modules/resolve": { - "version": "1.22.8", - "resolved": "https://registry.npmjs.org/resolve/-/resolve-1.22.8.tgz", - "integrity": "sha512-oKWePCxqpd6FlLvGV1VU0x7bkPmmCNolxzjMf4NczoDnQcIWrAF+cPtZn5i6n+RfD2d9i0tzpKnG6Yk168yIyw==", + "version": "1.22.10", + "resolved": "https://registry.npmjs.org/resolve/-/resolve-1.22.10.tgz", + "integrity": "sha512-NPRy+/ncIMeDlTAsuqwKIiferiawhefFJtkNSW0qZJEqMEb+qBt/77B/jGeeek+F0uOeN05CDa6HXbbIgtVX4w==", "dev": true, "license": "MIT", "dependencies": { - "is-core-module": "^2.13.0", + "is-core-module": "^2.16.0", "path-parse": "^1.0.7", "supports-preserve-symlinks-flag": "^1.0.0" }, "bin": { "resolve": "bin/resolve" }, + "engines": { + "node": ">= 0.4" + }, "funding": { "url": "https://github.com/sponsors/ljharb" } @@ -8961,46 +8440,19 @@ } }, "node_modules/resolve.exports": { - "version": "2.0.2", - "resolved": "https://registry.npmjs.org/resolve.exports/-/resolve.exports-2.0.2.tgz", - "integrity": "sha512-X2UW6Nw3n/aMgDVy+0rSqgHlv39WZAlZrXCdnbyEiKm17DSqHX4MmQMaST3FbeWR5FTuRcUwYAziZajji0Y7mg==", + "version": "2.0.3", + "resolved": "https://registry.npmjs.org/resolve.exports/-/resolve.exports-2.0.3.tgz", + "integrity": "sha512-OcXjMsGdhL4XnbShKpAcSqPMzQoYkYyhbEaeSko47MjRP9NfEQMhZkXL1DoFlt9LWQn4YttrdnV6X2OiyzBi+A==", "dev": true, "license": "MIT", "engines": { "node": ">=10" } }, - "node_modules/resolve/node_modules/is-core-module": { - "version": "2.13.1", - "resolved": "https://registry.npmjs.org/is-core-module/-/is-core-module-2.13.1.tgz", - "integrity": "sha512-hHrIjvZsftOsvKSn2TRYl63zvxsgE0K+0mYMoH6gD4omR5IWB2KynivBQczo3+wF1cCkjzvptnI9Q0sPU66ilw==", - "dev": true, - "license": "MIT", - "dependencies": { - "hasown": "^2.0.0" - }, - "funding": { - "url": "https://github.com/sponsors/ljharb" - } - }, - "node_modules/restore-cursor": { - "version": "3.1.0", - "resolved": "https://registry.npmjs.org/restore-cursor/-/restore-cursor-3.1.0.tgz", - "integrity": "sha512-l+sSefzHpj5qimhFSE5a8nufZYAM3sBSVMAPtYkmC+4EH2anSGaEMXSD0izRQbu9nfyQ9y5JrVmp7E8oZrUjvA==", - "dev": true, - "license": "MIT", - "dependencies": { - "onetime": "^5.1.0", - "signal-exit": "^3.0.2" - }, - "engines": { - "node": ">=8" - } - }, "node_modules/reusify": { - "version": "1.0.4", - "resolved": "https://registry.npmjs.org/reusify/-/reusify-1.0.4.tgz", - "integrity": "sha512-U9nH88a3fc/ekCF1l0/UP1IosiuIjyTh7hBvXVMHYgVcfGvt897Xguj2UOLDeI5BG2m7/uwyaLVT6fbtCwTyzw==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/reusify/-/reusify-1.1.0.tgz", + "integrity": "sha512-g6QUff04oZpHs0eG5p83rFLhHeV00ug/Yf9nZM6fLeUrPguBTkTQOdpAWWspMh55TZfVQDPaN3NQJfbVRAxdIw==", "dev": true, "license": "MIT", "engines": { @@ -9009,67 +8461,69 @@ } }, "node_modules/rimraf": { - "version": "5.0.7", - "resolved": "https://registry.npmjs.org/rimraf/-/rimraf-5.0.7.tgz", - "integrity": "sha512-nV6YcJo5wbLW77m+8KjH8aB/7/rxQy9SZ0HY5shnwULfS+9nmTtVXAJET5NdZmCzA4fPI/Hm1wo/Po/4mopOdg==", + "version": "6.0.1", + "resolved": "https://registry.npmjs.org/rimraf/-/rimraf-6.0.1.tgz", + "integrity": "sha512-9dkvaxAsk/xNXSJzMgFqqMCuFgt2+KsOFek3TMLfo8NCPfWpBmqwyNn5Y+NX56QUYfCtsyhF3ayiboEoUmJk/A==", "dev": true, "license": "ISC", "dependencies": { - "glob": "^10.3.7" + "glob": "^11.0.0", + "package-json-from-dist": "^1.0.0" }, "bin": { "rimraf": "dist/esm/bin.mjs" }, "engines": { - "node": ">=14.18" + "node": "20 || >=22" }, "funding": { "url": "https://github.com/sponsors/isaacs" } }, "node_modules/rimraf/node_modules/glob": { - "version": "10.4.1", - "resolved": "https://registry.npmjs.org/glob/-/glob-10.4.1.tgz", - "integrity": "sha512-2jelhlq3E4ho74ZyVLN03oKdAZVUa6UDZzFLVH1H7dnoax+y9qyaq8zBkfDIggjniU19z0wU18y16jMB2eyVIw==", + "version": "11.0.1", + "resolved": "https://registry.npmjs.org/glob/-/glob-11.0.1.tgz", + "integrity": "sha512-zrQDm8XPnYEKawJScsnM0QzobJxlT/kHOOlRTio8IH/GrmxRE5fjllkzdaHclIuNjUQTJYH2xHNIGfdpJkDJUw==", "dev": true, "license": "ISC", "dependencies": { "foreground-child": "^3.1.0", - "jackspeak": "^3.1.2", - "minimatch": "^9.0.4", + "jackspeak": "^4.0.1", + "minimatch": "^10.0.0", "minipass": "^7.1.2", - "path-scurry": "^1.11.1" + "package-json-from-dist": "^1.0.0", + "path-scurry": "^2.0.0" }, "bin": { "glob": "dist/esm/bin.mjs" }, "engines": { - "node": ">=16 || 14 >=14.18" + "node": "20 || >=22" }, "funding": { "url": "https://github.com/sponsors/isaacs" } }, "node_modules/rimraf/node_modules/minimatch": { - "version": "9.0.4", - "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-9.0.4.tgz", - "integrity": "sha512-KqWh+VchfxcMNRAJjj2tnsSJdNbHsVgnkBhTNrW7AjVo6OvLtxw8zfT9oLw1JSohlFzJ8jCoTgaoXvJ+kHt6fw==", + "version": "10.0.1", + "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-10.0.1.tgz", + "integrity": "sha512-ethXTt3SGGR+95gudmqJ1eNhRO7eGEGIgYA9vnPatK4/etz2MEVDno5GMCibdMTuBMyElzIlgxMna3K94XDIDQ==", "dev": true, "license": "ISC", "dependencies": { "brace-expansion": "^2.0.1" }, "engines": { - "node": ">=16 || 14 >=14.17" + "node": "20 || >=22" }, "funding": { "url": "https://github.com/sponsors/isaacs" } }, "node_modules/rollup": { - "version": "4.24.0", - "resolved": "https://registry.npmjs.org/rollup/-/rollup-4.24.0.tgz", - "integrity": "sha512-DOmrlGSXNk1DM0ljiQA+i+o0rSLhtii1je5wgk60j49d1jHT5YYttBv1iWOnYSTG+fZZESUOSNiAl89SIet+Cg==", + "version": "4.35.0", + "resolved": "https://registry.npmjs.org/rollup/-/rollup-4.35.0.tgz", + "integrity": "sha512-kg6oI4g+vc41vePJyO6dHt/yl0Rz3Thv0kJeVQ3D1kS3E5XSuKbPc29G4IpT/Kv1KQwgHVcN+HtyS+HYLNSvQg==", "dev": true, "license": "MIT", "dependencies": { @@ -9083,33 +8537,26 @@ "npm": ">=8.0.0" }, "optionalDependencies": { - "@rollup/rollup-android-arm-eabi": "4.24.0", - "@rollup/rollup-android-arm64": "4.24.0", - "@rollup/rollup-darwin-arm64": "4.24.0", - "@rollup/rollup-darwin-x64": "4.24.0", - "@rollup/rollup-linux-arm-gnueabihf": "4.24.0", - "@rollup/rollup-linux-arm-musleabihf": "4.24.0", - "@rollup/rollup-linux-arm64-gnu": "4.24.0", - "@rollup/rollup-linux-arm64-musl": "4.24.0", - "@rollup/rollup-linux-powerpc64le-gnu": "4.24.0", - "@rollup/rollup-linux-riscv64-gnu": "4.24.0", - "@rollup/rollup-linux-s390x-gnu": "4.24.0", - "@rollup/rollup-linux-x64-gnu": "4.24.0", - "@rollup/rollup-linux-x64-musl": "4.24.0", - "@rollup/rollup-win32-arm64-msvc": "4.24.0", - "@rollup/rollup-win32-ia32-msvc": "4.24.0", - "@rollup/rollup-win32-x64-msvc": "4.24.0", - "fsevents": "~2.3.2" - } - }, - "node_modules/run-async": { - "version": "2.4.1", - "resolved": "https://registry.npmjs.org/run-async/-/run-async-2.4.1.tgz", - "integrity": "sha512-tvVnVv01b8c1RrA6Ep7JkStj85Guv/YrMcwqYQnwjsAS2cTmmPGBBjAjpCW7RrSodNSoE2/qg9O4bceNvUuDgQ==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=0.12.0" + "@rollup/rollup-android-arm-eabi": "4.35.0", + "@rollup/rollup-android-arm64": "4.35.0", + "@rollup/rollup-darwin-arm64": "4.35.0", + "@rollup/rollup-darwin-x64": "4.35.0", + "@rollup/rollup-freebsd-arm64": "4.35.0", + "@rollup/rollup-freebsd-x64": "4.35.0", + "@rollup/rollup-linux-arm-gnueabihf": "4.35.0", + "@rollup/rollup-linux-arm-musleabihf": "4.35.0", + "@rollup/rollup-linux-arm64-gnu": "4.35.0", + "@rollup/rollup-linux-arm64-musl": "4.35.0", + "@rollup/rollup-linux-loongarch64-gnu": "4.35.0", + "@rollup/rollup-linux-powerpc64le-gnu": "4.35.0", + "@rollup/rollup-linux-riscv64-gnu": "4.35.0", + "@rollup/rollup-linux-s390x-gnu": "4.35.0", + "@rollup/rollup-linux-x64-gnu": "4.35.0", + "@rollup/rollup-linux-x64-musl": "4.35.0", + "@rollup/rollup-win32-arm64-msvc": "4.35.0", + "@rollup/rollup-win32-ia32-msvc": "4.35.0", + "@rollup/rollup-win32-x64-msvc": "4.35.0", + "fsevents": "~2.3.2" } }, "node_modules/run-parallel": { @@ -9136,26 +8583,17 @@ "queue-microtask": "^1.2.2" } }, - "node_modules/rxjs": { - "version": "7.8.1", - "resolved": "https://registry.npmjs.org/rxjs/-/rxjs-7.8.1.tgz", - "integrity": "sha512-AA3TVj+0A2iuIoQkWEK/tqFjBq2j+6PO6Y0zJcvzLAFhEFIO3HL0vls9hWLncZbAAbK0mar7oZ4V079I/qPMxg==", - "dev": true, - "license": "Apache-2.0", - "dependencies": { - "tslib": "^2.1.0" - } - }, "node_modules/safe-array-concat": { - "version": "1.1.2", - "resolved": "https://registry.npmjs.org/safe-array-concat/-/safe-array-concat-1.1.2.tgz", - "integrity": "sha512-vj6RsCsWBCf19jIeHEfkRMw8DPiBb+DMXklQ/1SGDHOMlHdPUkZXFQ2YdplS23zESTijAcurb1aSgJA3AgMu1Q==", + "version": "1.1.3", + "resolved": "https://registry.npmjs.org/safe-array-concat/-/safe-array-concat-1.1.3.tgz", + "integrity": "sha512-AURm5f0jYEOydBj7VQlVvDrjeFgthDdEF5H1dP+6mNpoXOMo1quQqJ4wvJDyRZ9+pO3kGWoOdmV08cSv2aJV6Q==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7", - "get-intrinsic": "^1.2.4", - "has-symbols": "^1.0.3", + "call-bind": "^1.0.8", + "call-bound": "^1.0.2", + "get-intrinsic": "^1.2.6", + "has-symbols": "^1.1.0", "isarray": "^2.0.5" }, "engines": { @@ -9179,16 +8617,15 @@ "dev": true, "license": "MIT" }, - "node_modules/safe-regex-test": { - "version": "1.0.3", - "resolved": "https://registry.npmjs.org/safe-regex-test/-/safe-regex-test-1.0.3.tgz", - "integrity": "sha512-CdASjNJPvRa7roO6Ra/gLYBTzYzzPyyBXxIMdGW3USQLyjWEls2RgW5UBTXaQVp+OrpeCK3bLem8smtmheoRuw==", + "node_modules/safe-push-apply": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/safe-push-apply/-/safe-push-apply-1.0.0.tgz", + "integrity": "sha512-iKE9w/Z7xCzUMIZqdBsp6pEQvwuEebH4vdpjcDWnyzaI6yl6O9FHvVpmGelvEHNsoY6wGblkxR6Zty/h00WiSA==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.6", "es-errors": "^1.3.0", - "is-regex": "^1.1.4" + "isarray": "^2.0.5" }, "engines": { "node": ">= 0.4" @@ -9197,16 +8634,35 @@ "url": "https://github.com/sponsors/ljharb" } }, - "node_modules/safer-buffer": { - "version": "2.1.2", - "resolved": "https://registry.npmjs.org/safer-buffer/-/safer-buffer-2.1.2.tgz", - "integrity": "sha512-YZo3K82SD7Riyi0E1EQPojLz7kpepnSQI9IyPbHHg1XXXevb5dJI7tpyN2ADxGcQbHG7vcyRHk0cbwqcQriUtg==", + "node_modules/safe-push-apply/node_modules/isarray": { + "version": "2.0.5", + "resolved": "https://registry.npmjs.org/isarray/-/isarray-2.0.5.tgz", + "integrity": "sha512-xHjhDr3cNBK0BzdUJSPXZntQUx/mwMS5Rw4A7lPJ90XGAO6ISP/ePDNuo0vhqOZU+UD5JoodwCAAoZQd3FeAKw==", + "dev": true, "license": "MIT" }, + "node_modules/safe-regex-test": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/safe-regex-test/-/safe-regex-test-1.1.0.tgz", + "integrity": "sha512-x/+Cz4YrimQxQccJf5mKEbIa1NzeCRNI5Ecl/ekmlYaampdNLPalVyIcCZNNH3MvmqBugV5TMYZXv0ljslUlaw==", + "dev": true, + "license": "MIT", + "dependencies": { + "call-bound": "^1.0.2", + "es-errors": "^1.3.0", + "is-regex": "^1.2.1" + }, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, "node_modules/semver": { - "version": "7.6.2", - "resolved": "https://registry.npmjs.org/semver/-/semver-7.6.2.tgz", - "integrity": "sha512-FNAIBWCx9qcRhoHcgcJ0gvU7SN1lYU2ZXuSfl04bSC5OpvDHFyJCjdNHomPXxjQlCBU67YW64PzY7/VIEH7F2w==", + "version": "7.7.1", + "resolved": "https://registry.npmjs.org/semver/-/semver-7.7.1.tgz", + "integrity": "sha512-hlq8tAfn0m/61p4BVRcPzIGr6LKiMwo4VM6dGi6pt4qcRkmNzTcWq6eCEjEh+qXjkMDvPlOFFSGwQjoEa6gyMA==", "dev": true, "license": "ISC", "bin": { @@ -9250,6 +8706,21 @@ "node": ">= 0.4" } }, + "node_modules/set-proto": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/set-proto/-/set-proto-1.0.0.tgz", + "integrity": "sha512-RJRdvCo6IAnPdsvP/7m6bsQqNnn1FCBX5ZNtFL98MmFF/4xAIJTIg1YbHW5DC2W5SKZanrC6i4HsJqlajw/dZw==", + "dev": true, + "license": "MIT", + "dependencies": { + "dunder-proto": "^1.0.1", + "es-errors": "^1.3.0", + "es-object-atoms": "^1.0.0" + }, + "engines": { + "node": ">= 0.4" + } + }, "node_modules/shebang-command": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/shebang-command/-/shebang-command-2.0.0.tgz", @@ -9274,16 +8745,73 @@ } }, "node_modules/side-channel": { - "version": "1.0.6", - "resolved": "https://registry.npmjs.org/side-channel/-/side-channel-1.0.6.tgz", - "integrity": "sha512-fDW/EZ6Q9RiO8eFG8Hj+7u/oW+XrPTIChwCOM2+th2A6OblDtYYIpve9m+KvI9Z4C9qSEXlaGR6bTEYHReuglA==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/side-channel/-/side-channel-1.1.0.tgz", + "integrity": "sha512-ZX99e6tRweoUXqR+VBrslhda51Nh5MTQwou5tnUDgbtyM0dBgmhEDtWGP/xbKn6hqfPRHujUNwz5fy/wbbhnpw==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7", "es-errors": "^1.3.0", - "get-intrinsic": "^1.2.4", - "object-inspect": "^1.13.1" + "object-inspect": "^1.13.3", + "side-channel-list": "^1.0.0", + "side-channel-map": "^1.0.1", + "side-channel-weakmap": "^1.0.2" + }, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/side-channel-list": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/side-channel-list/-/side-channel-list-1.0.0.tgz", + "integrity": "sha512-FCLHtRD/gnpCiCHEiJLOwdmFP+wzCmDEkc9y7NsYxeF4u7Btsn1ZuwgwJGxImImHicJArLP4R0yX4c2KCrMrTA==", + "dev": true, + "license": "MIT", + "dependencies": { + "es-errors": "^1.3.0", + "object-inspect": "^1.13.3" + }, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/side-channel-map": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/side-channel-map/-/side-channel-map-1.0.1.tgz", + "integrity": "sha512-VCjCNfgMsby3tTdo02nbjtM/ewra6jPHmpThenkTYh8pG9ucZ/1P8So4u4FGBek/BjpOVsDCMoLA/iuBKIFXRA==", + "dev": true, + "license": "MIT", + "dependencies": { + "call-bound": "^1.0.2", + "es-errors": "^1.3.0", + "get-intrinsic": "^1.2.5", + "object-inspect": "^1.13.3" + }, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/side-channel-weakmap": { + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/side-channel-weakmap/-/side-channel-weakmap-1.0.2.tgz", + "integrity": "sha512-WPS/HvHQTYnHisLo9McqBHOJk2FkHO/tlpvldyrnem4aeQp4hai3gythswg6p01oSoTl58rcpiFAjF2br2Ak2A==", + "dev": true, + "license": "MIT", + "dependencies": { + "call-bound": "^1.0.2", + "es-errors": "^1.3.0", + "get-intrinsic": "^1.2.5", + "object-inspect": "^1.13.3", + "side-channel-map": "^1.0.1" }, "engines": { "node": ">= 0.4" @@ -9354,13 +8882,16 @@ "license": "MIT" }, "node_modules/slash": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/slash/-/slash-3.0.0.tgz", - "integrity": "sha512-g9Q1haeby36OSStwb4ntCGGGaKsaVSjQ68fBxoQcutl5fS1vuY18H3wSt3jFyFtrkx+Kz0V1G85A4MyAdDMi2Q==", + "version": "5.1.0", + "resolved": "https://registry.npmjs.org/slash/-/slash-5.1.0.tgz", + "integrity": "sha512-ZA6oR3T/pEyuqwMgAKT0/hAv8oAXckzbkmR0UkUosQ+Mc4RxGoJkRmwHgHufaenlyAgE1Mxgpdcrf75y6XcnDg==", "dev": true, "license": "MIT", "engines": { - "node": ">=8" + "node": ">=14.16" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" } }, "node_modules/slugify": { @@ -9503,17 +9034,35 @@ "dev": true, "license": "MIT" }, - "node_modules/string.prototype.trim": { - "version": "1.2.9", - "resolved": "https://registry.npmjs.org/string.prototype.trim/-/string.prototype.trim-1.2.9.tgz", - "integrity": "sha512-klHuCNxiMZ8MlsOihJhJEBJAiMVqU3Z2nEXWfWnIqjN0gEFS9J9+IxKozWWtQGcgoa1WUZzLjKPTr4ZHNFTFxw==", + "node_modules/string.prototype.includes": { + "version": "2.0.1", + "resolved": "https://registry.npmjs.org/string.prototype.includes/-/string.prototype.includes-2.0.1.tgz", + "integrity": "sha512-o7+c9bW6zpAdJHTtujeePODAhkuicdAryFsfVKwA+wGw89wJ4GTY484WTucM9hLtDEOpOvI+aHnzqnC5lHp4Rg==", "dev": true, "license": "MIT", "dependencies": { "call-bind": "^1.0.7", "define-properties": "^1.2.1", - "es-abstract": "^1.23.0", - "es-object-atoms": "^1.0.0" + "es-abstract": "^1.23.3" + }, + "engines": { + "node": ">= 0.4" + } + }, + "node_modules/string.prototype.trim": { + "version": "1.2.10", + "resolved": "https://registry.npmjs.org/string.prototype.trim/-/string.prototype.trim-1.2.10.tgz", + "integrity": "sha512-Rs66F0P/1kedk5lyYyH9uBzuiI/kNRmwJAR9quK6VOtIpZ2G+hMZd+HQbbv25MgCA6gEffoMZYxlTod4WcdrKA==", + "dev": true, + "license": "MIT", + "dependencies": { + "call-bind": "^1.0.8", + "call-bound": "^1.0.2", + "define-data-property": "^1.1.4", + "define-properties": "^1.2.1", + "es-abstract": "^1.23.5", + "es-object-atoms": "^1.0.0", + "has-property-descriptors": "^1.0.2" }, "engines": { "node": ">= 0.4" @@ -9523,16 +9072,20 @@ } }, "node_modules/string.prototype.trimend": { - "version": "1.0.8", - "resolved": "https://registry.npmjs.org/string.prototype.trimend/-/string.prototype.trimend-1.0.8.tgz", - "integrity": "sha512-p73uL5VCHCO2BZZ6krwwQE3kCzM7NKmis8S//xEC6fQonchbum4eP6kR4DLEjQFO3Wnj3Fuo8NM0kOSjVdHjZQ==", + "version": "1.0.9", + "resolved": "https://registry.npmjs.org/string.prototype.trimend/-/string.prototype.trimend-1.0.9.tgz", + "integrity": "sha512-G7Ok5C6E/j4SGfyLCloXTrngQIQU3PWtXGst3yM7Bea9FRURf1S42ZHlZZtsNque2FN2PoUhfZXYLNWwEr4dLQ==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7", + "call-bind": "^1.0.8", + "call-bound": "^1.0.2", "define-properties": "^1.2.1", "es-object-atoms": "^1.0.0" }, + "engines": { + "node": ">= 0.4" + }, "funding": { "url": "https://github.com/sponsors/ljharb" } @@ -9649,9 +9202,9 @@ } }, "node_modules/sucrase/node_modules/glob": { - "version": "10.4.1", - "resolved": "https://registry.npmjs.org/glob/-/glob-10.4.1.tgz", - "integrity": "sha512-2jelhlq3E4ho74ZyVLN03oKdAZVUa6UDZzFLVH1H7dnoax+y9qyaq8zBkfDIggjniU19z0wU18y16jMB2eyVIw==", + "version": "10.4.5", + "resolved": "https://registry.npmjs.org/glob/-/glob-10.4.5.tgz", + "integrity": "sha512-7Bv8RF0k6xjo7d4A/PxYLbUCfb6c+Vpd2/mB2yRDlew7Jb5hEXiCD9ibfO7wpk8i4sevK6DFny9h7EYbM3/sHg==", "dev": true, "license": "ISC", "dependencies": { @@ -9659,29 +9212,51 @@ "jackspeak": "^3.1.2", "minimatch": "^9.0.4", "minipass": "^7.1.2", + "package-json-from-dist": "^1.0.0", "path-scurry": "^1.11.1" }, "bin": { "glob": "dist/esm/bin.mjs" }, - "engines": { - "node": ">=16 || 14 >=14.18" + "funding": { + "url": "https://github.com/sponsors/isaacs" + } + }, + "node_modules/sucrase/node_modules/jackspeak": { + "version": "3.4.3", + "resolved": "https://registry.npmjs.org/jackspeak/-/jackspeak-3.4.3.tgz", + "integrity": "sha512-OGlZQpz2yfahA/Rd1Y8Cd9SIEsqvXkLVoSw/cgwhnhFMDbsQFeZYoJJ7bIZBS9BcamUW96asq/npPWugM+RQBw==", + "dev": true, + "license": "BlueOak-1.0.0", + "dependencies": { + "@isaacs/cliui": "^8.0.2" }, "funding": { "url": "https://github.com/sponsors/isaacs" + }, + "optionalDependencies": { + "@pkgjs/parseargs": "^0.11.0" } }, - "node_modules/sucrase/node_modules/minimatch": { - "version": "9.0.4", - "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-9.0.4.tgz", - "integrity": "sha512-KqWh+VchfxcMNRAJjj2tnsSJdNbHsVgnkBhTNrW7AjVo6OvLtxw8zfT9oLw1JSohlFzJ8jCoTgaoXvJ+kHt6fw==", + "node_modules/sucrase/node_modules/lru-cache": { + "version": "10.4.3", + "resolved": "https://registry.npmjs.org/lru-cache/-/lru-cache-10.4.3.tgz", + "integrity": "sha512-JNAzZcXrCt42VGLuYz0zfAzDfAvJWW6AfYlDBQyDV5DClI2m5sAmK+OIO7s59XfsRsWHp02jAJrRadPRGTt6SQ==", "dev": true, - "license": "ISC", + "license": "ISC" + }, + "node_modules/sucrase/node_modules/path-scurry": { + "version": "1.11.1", + "resolved": "https://registry.npmjs.org/path-scurry/-/path-scurry-1.11.1.tgz", + "integrity": "sha512-Xa4Nw17FS9ApQFJ9umLiJS4orGjm7ZzwUrwamcGQuHSzDyth9boKDaycYdDcZDuqYATXw4HFXgaqWTctW/v1HA==", + "dev": true, + "license": "BlueOak-1.0.0", "dependencies": { - "brace-expansion": "^2.0.1" + "lru-cache": "^10.2.0", + "minipass": "^5.0.0 || ^6.0.2 || ^7.0.0" }, "engines": { - "node": ">=16 || 14 >=14.17" + "node": ">=16 || 14 >=14.18" }, "funding": { "url": "https://github.com/sponsors/isaacs" @@ -9714,9 +9289,9 @@ } }, "node_modules/synckit": { - "version": "0.8.8", - "resolved": "https://registry.npmjs.org/synckit/-/synckit-0.8.8.tgz", - "integrity": "sha512-HwOKAP7Wc5aRGYdKH+dw0PRRpbO841v2DENBtjnR5HFWoiNByAl7vrx3p0G/rCyYXQsrxqtX48TImFtPcIHSpQ==", + "version": "0.9.2", + "resolved": "https://registry.npmjs.org/synckit/-/synckit-0.9.2.tgz", + "integrity": "sha512-vrozgXDQwYO72vHjUb/HnFbQx1exDjoKzqx23aXEg2a9VIg2TSFZ8FmeZpTjUCFMYw7mpX4BE2SFu8wI7asYsw==", "dev": true, "license": "MIT", "dependencies": { @@ -9731,9 +9306,9 @@ } }, "node_modules/tar-fs": { - "version": "2.1.1", - "resolved": "https://registry.npmjs.org/tar-fs/-/tar-fs-2.1.1.tgz", - "integrity": "sha512-V0r2Y9scmbDRLCNex/+hYzvp/zyYjvFbHPNgVTKfQvVrb6guiE/fxP+XblDNR011utopbkex2nM4dHNV6GDsng==", + "version": "2.1.3", + "resolved": "https://registry.npmjs.org/tar-fs/-/tar-fs-2.1.3.tgz", + "integrity": "sha512-090nwYJDmlhwFwEW3QQl+vaNnxsO2yVsd45eTKRBzSzu+hlb1w2K9inVq5b0ngXuLVqQ4ApvsUHHnu/zQNkWAg==", "dev": true, "license": "MIT", "dependencies": { @@ -9791,9 +9366,9 @@ } }, "node_modules/test-exclude/node_modules/brace-expansion": { - "version": "1.1.11", - "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz", - "integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==", + "version": "1.1.12", + "resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.12.tgz", + "integrity": "sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==", "dev": true, "license": "MIT", "dependencies": { @@ -9844,13 +9419,6 @@ "node": ">=0.8" } }, - "node_modules/through": { - "version": "2.3.8", - "resolved": "https://registry.npmjs.org/through/-/through-2.3.8.tgz", - "integrity": "sha512-w89qg7PI8wAdvX60bMDP+bFoD5Dvhm9oLheFp5O4a2QF0cSBGsBX4qZmadPMvVqlLJBBci+WqGGOAPvcDeNSVg==", - "dev": true, - "license": "MIT" - }, "node_modules/through2": { "version": "2.0.5", "resolved": "https://registry.npmjs.org/through2/-/through2-2.0.5.tgz", @@ -9862,17 +9430,37 @@ "xtend": "~4.0.1" } }, - "node_modules/tmp": { - "version": "0.0.33", - "resolved": "https://registry.npmjs.org/tmp/-/tmp-0.0.33.tgz", - "integrity": "sha512-jRCJlojKnZ3addtTOjdIqoRuPEKBvNXcGYqzO6zWZX8KfKEpnGY5jfggJQ3EjKuu8D4bJRr0y+cYJFmYbImXGw==", + "node_modules/tinyexec": { + "version": "0.3.2", + "resolved": "https://registry.npmjs.org/tinyexec/-/tinyexec-0.3.2.tgz", + "integrity": "sha512-KQQR9yN7R5+OSwaK0XQoj22pwHoTlgYqmUscPYoknOoWCWfj/5/ABTMRi69FrKU5ffPVh5QcFikpWJI/P1ocHA==", + "dev": true, + "license": "MIT" + }, + "node_modules/tinyglobby": { + "version": "0.2.12", + "resolved": "https://registry.npmjs.org/tinyglobby/-/tinyglobby-0.2.12.tgz", + "integrity": "sha512-qkf4trmKSIiMTs/E63cxH+ojC2unam7rJ0WrauAzpT3ECNTxGRMlaXxVbfxMUC/w0LaYk6jQ4y/nGR9uBO3tww==", "dev": true, "license": "MIT", "dependencies": { - "os-tmpdir": "~1.0.2" + "fdir": "^6.4.3", + "picomatch": "^4.0.2" + }, + "engines": { + "node": ">=12.0.0" }, + "funding": { + "url": "https://github.com/sponsors/SuperchupuDev" + } + }, + "node_modules/tmp": { + "version": "0.2.3", + "resolved": "https://registry.npmjs.org/tmp/-/tmp-0.2.3.tgz", + "integrity": "sha512-nZD7m9iCPC5g0pYmcaxogYKggSfLsdxl8of3Q/oIbqCqLLIO9IAF0GWjX1z9NZRHPiXv8Wex4yDCaZsgEw0Y8w==", + "license": "MIT", "engines": { - "node": ">=0.6.0" + "node": ">=14.14" } }, "node_modules/tmpl": { @@ -9882,16 +9470,6 @@ "dev": true, "license": "BSD-3-Clause" }, - "node_modules/to-fast-properties": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/to-fast-properties/-/to-fast-properties-2.0.0.tgz", - "integrity": "sha512-/OaKK0xYrs3DmxRYqL/yDc+FxFUVYhDlXMhRmv3z915w2HF1tnN1omB354j8VUGO/hbRzyD6Y3sA7v7GS/ceog==", - "dev": true, - "license": "MIT", - "engines": { - "node": ">=4" - } - }, "node_modules/to-regex-range": { "version": "5.0.1", "resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-5.0.1.tgz", @@ -9923,9 +9501,9 @@ } }, "node_modules/ts-api-utils": { - "version": "1.3.0", - "resolved": "https://registry.npmjs.org/ts-api-utils/-/ts-api-utils-1.3.0.tgz", - "integrity": "sha512-UQMIo7pb8WRomKR1/+MFVLTroIvDVtMX3K6OUir8ynLyzB8Jeriont2bTAtmNPa1ekAgN7YPDyf6V+ygrdU+eQ==", + "version": "1.4.3", + "resolved": "https://registry.npmjs.org/ts-api-utils/-/ts-api-utils-1.4.3.tgz", + "integrity": "sha512-i3eMG77UTMD0hZhgRS562pv83RC6ukSAC2GMNWc+9dieh/+jDM5u5YG+NHX6VNDRHQcHwmsTHctP9LhbC3WxVw==", "dev": true, "license": "MIT", "engines": { @@ -9943,20 +9521,21 @@ "license": "Apache-2.0" }, "node_modules/ts-jest": { - "version": "29.1.4", - "resolved": "https://registry.npmjs.org/ts-jest/-/ts-jest-29.1.4.tgz", - "integrity": "sha512-YiHwDhSvCiItoAgsKtoLFCuakDzDsJ1DLDnSouTaTmdOcOwIkSzbLXduaQ6M5DRVhuZC/NYaaZ/mtHbWMv/S6Q==", + "version": "29.2.6", + "resolved": "https://registry.npmjs.org/ts-jest/-/ts-jest-29.2.6.tgz", + "integrity": "sha512-yTNZVZqc8lSixm+QGVFcPe6+yj7+TWZwIesuOWvfcn4B9bz5x4NDzVCQQjOs7Hfouu36aEqfEbo9Qpo+gq8dDg==", "dev": true, "license": "MIT", "dependencies": { - "bs-logger": "0.x", - "fast-json-stable-stringify": "2.x", + "bs-logger": "^0.2.6", + "ejs": "^3.1.10", + "fast-json-stable-stringify": "^2.1.0", "jest-util": "^29.0.0", "json5": "^2.2.3", - "lodash.memoize": "4.x", - "make-error": "1.x", - "semver": "^7.5.3", - "yargs-parser": "^21.0.1" + "lodash.memoize": "^4.1.2", + "make-error": "^1.3.6", + "semver": "^7.7.1", + "yargs-parser": "^21.1.1" }, "bin": { "ts-jest": "cli.js" @@ -10027,32 +9606,34 @@ } }, "node_modules/tslib": { - "version": "2.6.3", - "resolved": "https://registry.npmjs.org/tslib/-/tslib-2.6.3.tgz", - "integrity": "sha512-xNvxJEOUiWPGhUuUdQgAJPKOOJfGnIyKySOc09XkKsgdUV/3E2zvwZYdejjmRgPCgcym1juLH3226yA7sEFJKQ==", + "version": "2.8.1", + "resolved": "https://registry.npmjs.org/tslib/-/tslib-2.8.1.tgz", + "integrity": "sha512-oJFu94HQb+KVduSUQL7wnpmqnfmLsOA/nAh6b6EH0wCEoK0/mPeXU6c3wKDV83MkOuHPRHtSXKKU99IBazS/2w==", "dev": true, "license": "0BSD" }, "node_modules/tsup": { - "version": "8.1.0", - "resolved": "https://registry.npmjs.org/tsup/-/tsup-8.1.0.tgz", - "integrity": "sha512-UFdfCAXukax+U6KzeTNO2kAARHcWxmKsnvSPXUcfA1D+kU05XDccCrkffCQpFaWDsZfV0jMyTsxU39VfCp6EOg==", + "version": "8.4.0", + "resolved": "https://registry.npmjs.org/tsup/-/tsup-8.4.0.tgz", + "integrity": "sha512-b+eZbPCjz10fRryaAA7C8xlIHnf8VnsaRqydheLIqwG/Mcpfk8Z5zp3HayX7GaTygkigHl5cBUs+IhcySiIexQ==", "dev": true, "license": "MIT", "dependencies": { - "bundle-require": "^4.0.0", - "cac": "^6.7.12", - "chokidar": "^3.5.1", - "debug": "^4.3.1", - "esbuild": "^0.21.4", - "execa": "^5.0.0", - "globby": "^11.0.3", - "joycon": "^3.0.1", - "postcss-load-config": "^4.0.1", + "bundle-require": "^5.1.0", + "cac": "^6.7.14", + "chokidar": "^4.0.3", + "consola": "^3.4.0", + "debug": "^4.4.0", + "esbuild": "^0.25.0", + "joycon": "^3.1.1", + "picocolors": "^1.1.1", + "postcss-load-config": "^6.0.1", "resolve-from": "^5.0.0", - "rollup": "^4.0.2", + "rollup": "^4.34.8", "source-map": "0.8.0-beta.0", - "sucrase": "^3.20.3", + "sucrase": "^3.35.0", + "tinyexec": "^0.3.2", + "tinyglobby": "^0.2.11", "tree-kill": "^1.2.2" }, "bin": { @@ -10135,29 +9716,6 @@ "webidl-conversions": "^4.0.2" } }, - "node_modules/tsutils": { - "version": "3.21.0", - "resolved": "https://registry.npmjs.org/tsutils/-/tsutils-3.21.0.tgz", - "integrity": "sha512-mHKK3iUXL+3UF6xL5k0PEhKRUBKPBCv/+RkEOpjRWxxx27KKRBmmA60A9pgOUvMi8GKhRMPEmjBRPzs2W7O1OA==", - "dev": true, - "license": "MIT", - "dependencies": { - "tslib": "^1.8.1" - }, - "engines": { - "node": ">= 6" - }, - "peerDependencies": { - "typescript": ">=2.8.0 || >= 3.2.0-dev || >= 3.3.0-dev || >= 3.4.0-dev || >= 3.5.0-dev || >= 3.6.0-dev || >= 3.6.0-beta || >= 3.7.0-dev || >= 3.7.0-beta" - } - }, - "node_modules/tsutils/node_modules/tslib": { - "version": "1.14.1", - "resolved": "https://registry.npmjs.org/tslib/-/tslib-1.14.1.tgz", - "integrity": "sha512-Xni35NKzjgMrwevysHTCArtLDpPvye8zV/0E4EyYn43P7/7qvQwPh9BGkHewbMulVntbigmcT7rdX3BNo9wRJg==", - "dev": true, - "license": "0BSD" - }, "node_modules/tunnel-agent": { "version": "0.6.0", "resolved": "https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.6.0.tgz", @@ -10208,32 +9766,32 @@ } }, "node_modules/typed-array-buffer": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/typed-array-buffer/-/typed-array-buffer-1.0.2.tgz", - "integrity": "sha512-gEymJYKZtKXzzBzM4jqa9w6Q1Jjm7x2d+sh19AdsD4wqnMPDYyvwpsIc2Q/835kHuo3BEQ7CjelGhfTsoBb2MQ==", + "version": "1.0.3", + "resolved": "https://registry.npmjs.org/typed-array-buffer/-/typed-array-buffer-1.0.3.tgz", + "integrity": "sha512-nAYYwfY3qnzX30IkA6AQZjVbtK6duGontcQm1WSG1MD94YLqK0515GNApXkoxKOWMusVssAHWLh9SeaoefYFGw==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7", + "call-bound": "^1.0.3", "es-errors": "^1.3.0", - "is-typed-array": "^1.1.13" + "is-typed-array": "^1.1.14" }, "engines": { "node": ">= 0.4" } }, "node_modules/typed-array-byte-length": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/typed-array-byte-length/-/typed-array-byte-length-1.0.1.tgz", - "integrity": "sha512-3iMJ9q0ao7WE9tWcaYKIptkNBuOIcZCCT0d4MRvuuH88fEoEH62IuQe0OtraD3ebQEoTRk8XCBoknUNc1Y67pw==", + "version": "1.0.3", + "resolved": "https://registry.npmjs.org/typed-array-byte-length/-/typed-array-byte-length-1.0.3.tgz", + "integrity": "sha512-BaXgOuIxz8n8pIq3e7Atg/7s+DpiYrxn4vdot3w9KbnBhcRQq6o3xemQdIfynqSeXeDrF32x+WvfzmOjPiY9lg==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.7", + "call-bind": "^1.0.8", "for-each": "^0.3.3", - "gopd": "^1.0.1", - "has-proto": "^1.0.3", - "is-typed-array": "^1.1.13" + "gopd": "^1.2.0", + "has-proto": "^1.2.0", + "is-typed-array": "^1.1.14" }, "engines": { "node": ">= 0.4" @@ -10243,18 +9801,19 @@ } }, "node_modules/typed-array-byte-offset": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/typed-array-byte-offset/-/typed-array-byte-offset-1.0.2.tgz", - "integrity": "sha512-Ous0vodHa56FviZucS2E63zkgtgrACj7omjwd/8lTEMEPFFyjfixMZ1ZXenpgCFBBt4EC1J2XsyVS2gkG0eTFA==", + "version": "1.0.4", + "resolved": "https://registry.npmjs.org/typed-array-byte-offset/-/typed-array-byte-offset-1.0.4.tgz", + "integrity": "sha512-bTlAFB/FBYMcuX81gbL4OcpH5PmlFHqlCCpAl8AlEzMz5k53oNDvN8p1PNOWLEmI2x4orp3raOFB51tv9X+MFQ==", "dev": true, "license": "MIT", "dependencies": { "available-typed-arrays": "^1.0.7", - "call-bind": "^1.0.7", + "call-bind": "^1.0.8", "for-each": "^0.3.3", - "gopd": "^1.0.1", - "has-proto": "^1.0.3", - "is-typed-array": "^1.1.13" + "gopd": "^1.2.0", + "has-proto": "^1.2.0", + "is-typed-array": "^1.1.15", + "reflect.getprototypeof": "^1.0.9" }, "engines": { "node": ">= 0.4" @@ -10264,18 +9823,18 @@ } }, "node_modules/typed-array-length": { - "version": "1.0.6", - "resolved": "https://registry.npmjs.org/typed-array-length/-/typed-array-length-1.0.6.tgz", - "integrity": "sha512-/OxDN6OtAk5KBpGb28T+HZc2M+ADtvRxXrKKbUwtsLgdoxgX13hyy7ek6bFRl5+aBs2yZzB0c4CnQfAtVypW/g==", + "version": "1.0.7", + "resolved": "https://registry.npmjs.org/typed-array-length/-/typed-array-length-1.0.7.tgz", + "integrity": "sha512-3KS2b+kL7fsuk/eJZ7EQdnEmQoaho/r6KUef7hxvltNA5DR8NAUM+8wJMbJyZ4G9/7i3v5zPBIMN5aybAh2/Jg==", "dev": true, "license": "MIT", "dependencies": { "call-bind": "^1.0.7", "for-each": "^0.3.3", "gopd": "^1.0.1", - "has-proto": "^1.0.3", "is-typed-array": "^1.1.13", - "possible-typed-array-names": "^1.0.0" + "possible-typed-array-names": "^1.0.0", + "reflect.getprototypeof": "^1.0.6" }, "engines": { "node": ">= 0.4" @@ -10285,9 +9844,9 @@ } }, "node_modules/typescript": { - "version": "5.4.5", - "resolved": "https://registry.npmjs.org/typescript/-/typescript-5.4.5.tgz", - "integrity": "sha512-vcI4UpRgg81oIRUFwR0WSIHKt11nJ7SAVlYNIu+QpqeyXP+gpQJy/Z4+F0aGxSE4MqwjyXvW/TzgkLAx2AGHwQ==", + "version": "5.8.2", + "resolved": "https://registry.npmjs.org/typescript/-/typescript-5.8.2.tgz", + "integrity": "sha512-aJn6wq13/afZp/jT9QZmwEjDqqvSGp1VT5GVg+f/t6/oVyrgXM6BY1h9BRh/O5p3PlUPAe+WuiEZOmb/49RqoQ==", "dev": true, "license": "Apache-2.0", "bin": { @@ -10299,28 +9858,44 @@ } }, "node_modules/unbox-primitive": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/unbox-primitive/-/unbox-primitive-1.0.2.tgz", - "integrity": "sha512-61pPlCD9h51VoreyJ0BReideM3MDKMKnh6+V9L08331ipq6Q8OFXZYiqP6n/tbHx4s5I9uRhcye6BrbkizkBDw==", + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/unbox-primitive/-/unbox-primitive-1.1.0.tgz", + "integrity": "sha512-nWJ91DjeOkej/TA8pXQ3myruKpKEYgqvpw9lz4OPHj/NWFNluYrjbz9j01CJ8yKQd2g4jFoOkINCTW2I5LEEyw==", "dev": true, "license": "MIT", "dependencies": { - "call-bind": "^1.0.2", + "call-bound": "^1.0.3", "has-bigints": "^1.0.2", - "has-symbols": "^1.0.3", - "which-boxed-primitive": "^1.0.2" + "has-symbols": "^1.1.0", + "which-boxed-primitive": "^1.1.1" + }, + "engines": { + "node": ">= 0.4" }, "funding": { "url": "https://github.com/sponsors/ljharb" } }, "node_modules/undici-types": { - "version": "5.26.5", - "resolved": "https://registry.npmjs.org/undici-types/-/undici-types-5.26.5.tgz", - "integrity": "sha512-JlCMO+ehdEIKqlFxk6IfVoAUVmgz7cU7zD/h9XZ0qzeosSHmUJVOzSQvvYSYWXkFXC+IfLKSIffhv0sVZup6pA==", + "version": "6.20.0", + "resolved": "https://registry.npmjs.org/undici-types/-/undici-types-6.20.0.tgz", + "integrity": "sha512-Ny6QZ2Nju20vw1SRHe3d9jVu6gJ+4e3+MMpqu7pqE5HT6WsTSlce++GQmK5UXS8mzV8DSYHrQH+Xrf2jVcuKNg==", "dev": true, "license": "MIT" }, + "node_modules/unicorn-magic": { + "version": "0.3.0", + "resolved": "https://registry.npmjs.org/unicorn-magic/-/unicorn-magic-0.3.0.tgz", + "integrity": "sha512-+QBBXBCvifc56fsbuxZQ6Sic3wqqc3WWaqxs58gvJrcOuN83HGTCwz3oS5phzU9LthRNE9VrJCFCLUgHeeFnfA==", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=18" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, "node_modules/universalify": { "version": "2.0.1", "resolved": "https://registry.npmjs.org/universalify/-/universalify-2.0.1.tgz", @@ -10342,9 +9917,9 @@ } }, "node_modules/update-browserslist-db": { - "version": "1.0.16", - "resolved": "https://registry.npmjs.org/update-browserslist-db/-/update-browserslist-db-1.0.16.tgz", - "integrity": "sha512-KVbTxlBYlckhF5wgfyZXTWnMn7MMZjMu9XG8bPlliUOP9ThaF4QnhP8qrjrH7DRzHfSk0oQv1wToW+iA5GajEQ==", + "version": "1.1.3", + "resolved": "https://registry.npmjs.org/update-browserslist-db/-/update-browserslist-db-1.1.3.tgz", + "integrity": "sha512-UxhIZQ+QInVdunkDAaiazvvT/+fXL5Osr0JZlJulepYu6Jd7qJtDZjlur0emRlT71EN3ScPoE7gvsuIKKNavKw==", "dev": true, "funding": [ { @@ -10362,8 +9937,8 @@ ], "license": "MIT", "dependencies": { - "escalade": "^3.1.2", - "picocolors": "^1.0.1" + "escalade": "^3.2.0", + "picocolors": "^1.1.1" }, "bin": { "update-browserslist-db": "cli.js" @@ -10390,9 +9965,9 @@ "license": "MIT" }, "node_modules/uuid": { - "version": "9.0.1", - "resolved": "https://registry.npmjs.org/uuid/-/uuid-9.0.1.tgz", - "integrity": "sha512-b+1eJOlsR9K8HJpow9Ok3fiWOWSIcIzXodvv0rQjVoOVNpWMpxf1wZNpt4y9h10odCNrqnYp1OBzRktckBe3sA==", + "version": "11.1.0", + "resolved": "https://registry.npmjs.org/uuid/-/uuid-11.1.0.tgz", + "integrity": "sha512-0/A9rDy9P7cJ+8w1c9WD9V//9Wj15Ce2MPz8Ri6032usz+NfePxx5AcN3bN+r6ZL6jEo066/yNYB3tn4pQEx+A==", "dev": true, "funding": [ "https://github.com/sponsors/broofa", @@ -10400,13 +9975,13 @@ ], "license": "MIT", "bin": { - "uuid": "dist/bin/uuid" + "uuid": "dist/esm/bin/uuid" } }, "node_modules/v8-to-istanbul": { - "version": "9.2.0", - "resolved": "https://registry.npmjs.org/v8-to-istanbul/-/v8-to-istanbul-9.2.0.tgz", - "integrity": "sha512-/EH/sDgxU2eGxajKdwLCDmQ4FWq+kpi3uCmBGpw1xJtnAxEjlD8j8PEiGWpCIMIs3ciNAgH0d3TTJiUkYzyZjA==", + "version": "9.3.0", + "resolved": "https://registry.npmjs.org/v8-to-istanbul/-/v8-to-istanbul-9.3.0.tgz", + "integrity": "sha512-kiGUalWN+rgBJ/1OHZsBtU4rXZOfj/7rKQxULKlIzwzQSvMJUUNgPwJEEh7gU6xEVxC0ahoOBvN2YI8GH6FNgA==", "dev": true, "license": "ISC", "dependencies": { @@ -10428,16 +10003,6 @@ "makeerror": "1.0.12" } }, - "node_modules/wcwidth": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/wcwidth/-/wcwidth-1.0.1.tgz", - "integrity": "sha512-XHPEwS0q6TaxcvG85+8EYkbiCux2XtWG2mkc47Ng2A77BQu9+DqIOJldST4HgPkuea7dvKSj5VgX3P1d4rW8Tg==", - "dev": true, - "license": "MIT", - "dependencies": { - "defaults": "^1.0.3" - } - }, "node_modules/webidl-conversions": { "version": "3.0.1", "resolved": "https://registry.npmjs.org/webidl-conversions/-/webidl-conversions-3.0.1.tgz", @@ -10473,41 +10038,45 @@ } }, "node_modules/which-boxed-primitive": { - "version": "1.0.2", - "resolved": "https://registry.npmjs.org/which-boxed-primitive/-/which-boxed-primitive-1.0.2.tgz", - "integrity": "sha512-bwZdv0AKLpplFY2KZRX6TvyuN7ojjr7lwkg6ml0roIy9YeuSr7JS372qlNW18UQYzgYK9ziGcerWqZOmEn9VNg==", + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/which-boxed-primitive/-/which-boxed-primitive-1.1.1.tgz", + "integrity": "sha512-TbX3mj8n0odCBFVlY8AxkqcHASw3L60jIuF8jFP78az3C2YhmGvqbHBpAjTRH2/xqYunrJ9g1jSyjCjpoWzIAA==", "dev": true, "license": "MIT", "dependencies": { - "is-bigint": "^1.0.1", - "is-boolean-object": "^1.1.0", - "is-number-object": "^1.0.4", - "is-string": "^1.0.5", - "is-symbol": "^1.0.3" + "is-bigint": "^1.1.0", + "is-boolean-object": "^1.2.1", + "is-number-object": "^1.1.1", + "is-string": "^1.1.1", + "is-symbol": "^1.1.1" + }, + "engines": { + "node": ">= 0.4" }, "funding": { "url": "https://github.com/sponsors/ljharb" } }, "node_modules/which-builtin-type": { - "version": "1.1.3", - "resolved": "https://registry.npmjs.org/which-builtin-type/-/which-builtin-type-1.1.3.tgz", - "integrity": "sha512-YmjsSMDBYsM1CaFiayOVT06+KJeXf0o5M/CAd4o1lTadFAtacTUM49zoYxr/oroopFDfhvN6iEcBxUyc3gvKmw==", + "version": "1.2.1", + "resolved": "https://registry.npmjs.org/which-builtin-type/-/which-builtin-type-1.2.1.tgz", + "integrity": "sha512-6iBczoX+kDQ7a3+YJBnh3T+KZRxM/iYNPXicqk66/Qfm1b93iu+yOImkg0zHbj5LNOcNv1TEADiZ0xa34B4q6Q==", "dev": true, "license": "MIT", "dependencies": { - "function.prototype.name": "^1.1.5", - "has-tostringtag": "^1.0.0", + "call-bound": "^1.0.2", + "function.prototype.name": "^1.1.6", + "has-tostringtag": "^1.0.2", "is-async-function": "^2.0.0", - "is-date-object": "^1.0.5", - "is-finalizationregistry": "^1.0.2", + "is-date-object": "^1.1.0", + "is-finalizationregistry": "^1.1.0", "is-generator-function": "^1.0.10", - "is-regex": "^1.1.4", + "is-regex": "^1.2.1", "is-weakref": "^1.0.2", "isarray": "^2.0.5", - "which-boxed-primitive": "^1.0.2", - "which-collection": "^1.0.1", - "which-typed-array": "^1.1.9" + "which-boxed-primitive": "^1.1.0", + "which-collection": "^1.0.2", + "which-typed-array": "^1.1.16" }, "engines": { "node": ">= 0.4" @@ -10543,16 +10112,18 @@ } }, "node_modules/which-typed-array": { - "version": "1.1.15", - "resolved": "https://registry.npmjs.org/which-typed-array/-/which-typed-array-1.1.15.tgz", - "integrity": "sha512-oV0jmFtUky6CXfkqehVvBP/LSWJ2sy4vWMioiENyJLePrBO/yKyV9OyJySfAKosh+RYkIl5zJCNZ8/4JncrpdA==", + "version": "1.1.19", + "resolved": "https://registry.npmjs.org/which-typed-array/-/which-typed-array-1.1.19.tgz", + "integrity": "sha512-rEvr90Bck4WZt9HHFC4DJMsjvu7x+r6bImz0/BrbWb7A2djJ8hnZMrWnHo9F8ssv0OMErasDhftrfROTyqSDrw==", "dev": true, "license": "MIT", "dependencies": { "available-typed-arrays": "^1.0.7", - "call-bind": "^1.0.7", - "for-each": "^0.3.3", - "gopd": "^1.0.1", + "call-bind": "^1.0.8", + "call-bound": "^1.0.4", + "for-each": "^0.3.5", + "get-proto": "^1.0.1", + "gopd": "^1.2.0", "has-tostringtag": "^1.0.2" }, "engines": { @@ -10573,9 +10144,9 @@ } }, "node_modules/wrap-ansi": { - "version": "6.2.0", - "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-6.2.0.tgz", - "integrity": "sha512-r6lPcBGxZXlIcymEu7InxDMhdW0KDxpLgoFLcguasxCaJ/SOIZwINatK9KY/tf+ZrlywOKU0UDj3ATXUBfxJXA==", + "version": "7.0.0", + "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-7.0.0.tgz", + "integrity": "sha512-YVGIj2kamLSTxw6NsZjoBxfSwsn0ycdesmc4p+Q21c5zPuZ1pl+NfxVdxPtdHvmNVOQ6XSYG4AUtyt/Fi7D16Q==", "dev": true, "license": "MIT", "dependencies": { @@ -10584,7 +10155,10 @@ "strip-ansi": "^6.0.0" }, "engines": { - "node": ">=8" + "node": ">=10" + }, + "funding": { + "url": "https://github.com/chalk/wrap-ansi?sponsor=1" } }, "node_modules/wrap-ansi-cjs": { @@ -10654,19 +10228,6 @@ "dev": true, "license": "ISC" }, - "node_modules/yaml": { - "version": "2.4.5", - "resolved": "https://registry.npmjs.org/yaml/-/yaml-2.4.5.tgz", - "integrity": "sha512-aBx2bnqDzVOyNKfsysjA2ms5ZlnjSAW2eG3/L5G/CSujfjLJTJsEw1bGw8kCf04KodQWk1pxlGnZ56CRxiawmg==", - "dev": true, - "license": "ISC", - "bin": { - "yaml": "bin.mjs" - }, - "engines": { - "node": ">= 14" - } - }, "node_modules/yargs": { "version": "16.2.0", "resolved": "https://registry.npmjs.org/yargs/-/yargs-16.2.0.tgz", diff --git a/package.json b/package.json index dcee781c1..d71aaaa2e 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "@rockcarver/frodo-cli", - "version": "2.2.0", + "version": "3.0.5", "type": "module", "description": "A command line interface to manage ForgeRock Identity Cloud tenants, ForgeOps deployments, and classic deployments.", "keywords": [ @@ -34,6 +34,7 @@ "scripts": { "test": "npm run test:only", "test:only": "NODE_OPTIONS='--no-warnings --experimental-vm-modules' npx jest --silent", + "test:serial": "NODE_OPTIONS='--no-warnings --experimental-vm-modules' npx jest --silent --runInBand", "test:debug": "NODE_OPTIONS='--no-warnings --experimental-vm-modules' npx jest --silent=false --json --outputFile=./testResults.json", "test:update": "NODE_OPTIONS='--no-warnings --experimental-vm-modules' npx jest --silent=false --updateSnapshot", "lint": "eslint --ext .ts --ignore-path .gitignore .", @@ -46,7 +47,7 @@ "dev": "npx tsup --watch src" }, "jest": { - "testTimeout": 30000, + "testTimeout": 120000, "testMatch": [ "**/?(*.)(test).js" ], @@ -114,34 +115,31 @@ ] }, "devDependencies": { - "@rockcarver/frodo-lib": "2.4.0", + "@rockcarver/frodo-lib": "3.3.0", "@types/colors": "^1.2.1", "@types/fs-extra": "^11.0.1", "@types/jest": "^29.2.3", - "@types/node": "^20.5.8", - "@typescript-eslint/eslint-plugin": "^6.5.0", - "@typescript-eslint/parser": "^6.5.0", + "@types/node": "^22.13.10", + "@typescript-eslint/eslint-plugin": "^7.18.0", + "@typescript-eslint/parser": "^7.18.0", "@yao-pkg/pkg": "^5.11.0", - "chokidar": "^3.5.3", + "chokidar": "^4.0.3", "cli-progress": "^3.11.2", "cli-table3": "^0.6.3", "colors": "^1.4.0", "commander": "^11.0.0", "compare-versions": "^6.1.0", "copyfiles": "^2.4.1", - "del": "^6.0.0", + "del": "^8.0.0", "eslint": "^8.28.0", - "eslint-config-prettier": "^9.0.0", - "eslint-plugin-deprecation": "^2.0.0", + "eslint-config-prettier": "^10.1.1", + "eslint-plugin-deprecation": "^3.0.0", "eslint-plugin-import": "^2.28.0", - "eslint-plugin-jest": "^27.1.5", + "eslint-plugin-jest": "^28.11.0", "eslint-plugin-jsx-a11y": "^6.6.1", "eslint-plugin-prettier": "^5.0.0", - "eslint-plugin-simple-import-sort": "^10.0.0", + "eslint-plugin-simple-import-sort": "^12.1.1", "fs-extra": "^11.1.1", - "fuzzy": "^0.1.3", - "inquirer": "^8.2.5", - "inquirer-autocomplete-prompt": "^2.0.0", "jest": "^29.3.1", "loglevel": "^1.9.1", "map-stream": "^0.0.7", @@ -151,15 +149,16 @@ "readline-sync": "^1.4.10", "replaceall": "^0.1.6", "resolve": "^1.22.1", - "rimraf": "^5.0.1", + "rimraf": "^6.0.1", "slugify": "^1.6.5", "ts-jest": "^29.1.4", "tsup": "^8.1.0", "typescript": "^5.2.2", - "uuid": "^9.0.0", + "uuid": "^11.1.0", "yesno": "^0.4.0" }, "dependencies": { - "iconv-lite": "^0.4.24" + "deep-diff": "^1.0.2", + "tmp": "^0.2.3" } } From b9412bd39c798de5392ea2ccd3bb231189d0d0af Mon Sep 17 00:00:00 2001 From: Volker Scheuber Date: Tue, 17 Jun 2025 18:42:37 -0600 Subject: [PATCH 4/5] update from main --- package-lock.json | 4 ++-- package.json | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/package-lock.json b/package-lock.json index fead36eec..6447981c0 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,12 +1,12 @@ { "name": "@rockcarver/frodo-cli", - "version": "3.0.5", + "version": "3.0.6", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "@rockcarver/frodo-cli", - "version": "3.0.5", + "version": "3.0.6", "license": "MIT", "dependencies": { "deep-diff": "^1.0.2", diff --git a/package.json b/package.json index d71aaaa2e..6f0626e61 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "@rockcarver/frodo-cli", - "version": "3.0.5", + "version": "3.0.6", "type": "module", "description": "A command line interface to manage ForgeRock Identity Cloud tenants, ForgeOps deployments, and classic deployments.", "keywords": [ From 68f18d04b5a72bcba5052b8391b78ab07979b6ba Mon Sep 17 00:00:00 2001 From: Paul McKeown Date: Mon, 17 Nov 2025 23:00:59 +1300 Subject: [PATCH 5/5] Re-ran tests to regenerate snap files with new CLI argument --- ...dd-autoid-static-user-mapping.test.js.snap | 90 ++---- ...-client-with-admin-privileges.test.js.snap | 125 ++------- .../admin-get-access-token.test.js.snap | 102 ++----- ...auth2-client-admin-privileges.test.js.snap | 97 ++----- ...-generic-extension-attributes.test.js.snap | 99 ++----- ...clients-with-admin-privileges.test.js.snap | 95 ++----- ...lients-with-custom-privileges.test.js.snap | 95 ++----- ...min-list-static-user-mappings.test.js.snap | 98 ++----- ...in-remove-static-user-mapping.test.js.snap | 97 ++----- .../admin-repair-org-model.test.js.snap | 103 ++----- ...auth2-client-admin-privileges.test.js.snap | 97 ++----- ...-generic-extension-attributes.test.js.snap | 101 ++----- .../__snapshots__/agent-delete.test.js.snap | 99 ++----- .../__snapshots__/agent-describe.test.js.snap | 99 ++----- .../__snapshots__/agent-export.test.js.snap | 112 ++------ .../agent-gateway-delete.test.js.snap | 100 ++----- .../agent-gateway-describe.test.js.snap | 97 ++----- .../agent-gateway-export.test.js.snap | 111 ++------ .../agent-gateway-import.test.js.snap | 109 ++------ .../agent-gateway-list.test.js.snap | 97 ++----- .../__snapshots__/agent-import.test.js.snap | 110 ++------ .../agent-java-delete.test.js.snap | 99 ++----- .../agent-java-describe.test.js.snap | 97 ++----- .../agent-java-export.test.js.snap | 110 ++------ .../agent-java-import.test.js.snap | 108 ++------ .../agent-java-list.test.js.snap | 97 ++----- .../en/__snapshots__/agent-list.test.js.snap | 99 ++----- .../agent-web-delete.test.js.snap | 100 ++----- .../agent-web-describe.test.js.snap | 97 ++----- .../agent-web-export.test.js.snap | 110 ++------ .../agent-web-import.test.js.snap | 108 ++------ .../__snapshots__/agent-web-list.test.js.snap | 97 ++----- .../en/__snapshots__/app-delete.test.js.snap | 104 ++----- .../en/__snapshots__/app-export.test.js.snap | 114 ++------ .../en/__snapshots__/app-import.test.js.snap | 111 ++------ .../en/__snapshots__/app-list.test.js.snap | 97 ++----- .../__snapshots__/authn-describe.test.js.snap | 99 ++----- .../__snapshots__/authn-export.test.js.snap | 102 ++----- .../__snapshots__/authn-import.test.js.snap | 99 ++----- .../authz-policy-delete.test.js.snap | 103 ++----- .../authz-policy-describe.test.js.snap | 99 ++----- .../authz-policy-export.test.js.snap | 118 +++----- .../authz-policy-import.test.js.snap | 118 ++------ .../authz-policy-list.test.js.snap | 99 ++----- .../authz-set-delete.test.js.snap | 100 ++----- .../authz-set-describe.test.js.snap | 99 ++----- .../authz-set-export.test.js.snap | 116 ++------ .../authz-set-import.test.js.snap | 114 ++------ .../authz-type-delete.test.js.snap | 104 ++----- .../authz-type-describe.test.js.snap | 101 ++----- .../authz-type-export.test.js.snap | 114 ++------ .../authz-type-import.test.js.snap | 111 ++------ .../authz-type-list.test.js.snap | 97 ++----- .../__snapshots__/config-export.test.js.snap | 159 +++-------- .../__snapshots__/config-import.test.js.snap | 140 +++------- .../en/__snapshots__/conn-delete.test.js.snap | 51 +--- .../__snapshots__/conn-describe.test.js.snap | 53 +--- .../en/__snapshots__/conn-list.test.js.snap | 48 +--- .../en/__snapshots__/conn-save.test.js.snap | 4 + .../email-template-export.test.js.snap | 112 ++------ .../email-template-import.test.js.snap | 117 ++------ .../email-template-list.test.js.snap | 97 ++----- .../en/__snapshots__/esv-apply.test.js.snap | 107 ++------ .../esv-secret-create.test.js.snap | 105 ++----- .../esv-secret-delete.test.js.snap | 95 ++----- .../esv-secret-describe.test.js.snap | 110 ++------ .../esv-secret-export.test.js.snap | 121 ++------ .../esv-secret-import.test.js.snap | 119 ++------ .../esv-secret-list.test.js.snap | 109 ++------ .../__snapshots__/esv-secret-set.test.js.snap | 94 ++----- .../esv-secret-version-activate.test.js.snap | 94 ++----- .../esv-secret-version-create.test.js.snap | 98 ++----- ...esv-secret-version-deactivate.test.js.snap | 94 ++----- .../esv-secret-version-delete.test.js.snap | 97 ++----- .../esv-secret-version-list.test.js.snap | 94 ++----- .../esv-variable-create.test.js.snap | 100 ++----- .../esv-variable-delete.test.js.snap | 99 ++----- .../esv-variable-describe.test.js.snap | 110 ++------ .../esv-variable-export.test.js.snap | 108 ++------ .../esv-variable-import.test.js.snap | 103 ++----- .../esv-variable-list.test.js.snap | 109 ++------ .../esv-variable-set.test.js.snap | 96 ++----- .../en/__snapshots__/idm-count.test.js.snap | 99 ++----- .../en/__snapshots__/idm-delete.test.js.snap | 97 ++----- .../en/__snapshots__/idm-export.test.js.snap | 127 +++------ .../en/__snapshots__/idm-import.test.js.snap | 115 ++------ .../en/__snapshots__/idm-list.test.js.snap | 95 ++----- .../idm-schema-object-export.test.js.snap | 102 ++----- .../idm-schema-object-import.test.js.snap | 102 ++----- .../en/__snapshots__/idp-delete.test.js.snap | 97 ++----- .../en/__snapshots__/idp-export.test.js.snap | 111 ++------ .../en/__snapshots__/idp-import.test.js.snap | 111 ++------ .../en/__snapshots__/idp-list.test.js.snap | 95 ++----- .../en/__snapshots__/info.test.js.snap | 92 ++----- .../__snapshots__/journey-delete.test.js.snap | 108 ++------ .../journey-describe.test.js.snap | 115 ++------ .../journey-disable.test.js.snap | 97 ++----- .../__snapshots__/journey-enable.test.js.snap | 97 ++----- .../__snapshots__/journey-export.test.js.snap | 123 +++------ .../__snapshots__/journey-import.test.js.snap | 116 ++------ .../__snapshots__/journey-list.test.js.snap | 99 ++----- .../__snapshots__/journey-prune.test.js.snap | 95 ++----- .../en/__snapshots__/log-fetch.test.js.snap | 258 +++++------------- .../en/__snapshots__/log-list.test.js.snap | 180 +++--------- .../en/__snapshots__/log-tail.test.js.snap | 230 +++++----------- .../__snapshots__/mapping-delete.test.js.snap | 1 + .../__snapshots__/mapping-export.test.js.snap | 1 + .../__snapshots__/mapping-import.test.js.snap | 111 ++------ .../__snapshots__/mapping-list.test.js.snap | 97 ++----- .../__snapshots__/mapping-rename.test.js.snap | 110 ++------ .../oauth-client-delete.test.js.snap | 104 ++----- .../oauth-client-export.test.js.snap | 113 ++------ .../oauth-client-import.test.js.snap | 111 ++------ .../oauth-client-list.test.js.snap | 97 ++----- .../en/__snapshots__/promote.test.js.snap | 130 +++------ .../realm-add-custom-domain.test.js.snap | 97 ++----- .../__snapshots__/realm-describe.test.js.snap | 95 ++----- .../__snapshots__/realm-export.test.js.snap | 113 ++------ .../__snapshots__/realm-import.test.js.snap | 112 ++------ .../en/__snapshots__/realm-list.test.js.snap | 97 ++----- .../realm-remove-custom-domain.test.js.snap | 97 ++----- .../en/__snapshots__/role-export.test.js.snap | 116 ++------ .../en/__snapshots__/role-import.test.js.snap | 113 ++------ .../en/__snapshots__/role-list.test.js.snap | 97 ++----- .../saml-cot-export.test.js.snap | 112 ++------ .../saml-cot-import.test.js.snap | 110 ++------ .../__snapshots__/saml-cot-list.test.js.snap | 97 ++----- .../en/__snapshots__/saml-delete.test.js.snap | 100 ++----- .../__snapshots__/saml-describe.test.js.snap | 97 ++----- .../en/__snapshots__/saml-export.test.js.snap | 117 ++------ .../en/__snapshots__/saml-import.test.js.snap | 113 ++------ .../en/__snapshots__/saml-list.test.js.snap | 97 ++----- .../saml-metadata-export.test.js.snap | 103 ++----- .../__snapshots__/script-delete.test.js.snap | 104 ++----- .../script-describe.test.js.snap | 117 ++------ .../__snapshots__/script-export.test.js.snap | 127 +++------ .../__snapshots__/script-import.test.js.snap | 130 +++------ .../en/__snapshots__/script-list.test.js.snap | 114 ++------ .../__snapshots__/server-export.test.js.snap | 124 +++------ .../__snapshots__/server-import.test.js.snap | 117 ++------ .../en/__snapshots__/server-list.test.js.snap | 97 ++----- .../__snapshots__/service-delete.test.js.snap | 101 ++----- .../__snapshots__/service-export.test.js.snap | 111 ++------ .../__snapshots__/service-import.test.js.snap | 117 ++------ .../__snapshots__/service-list.test.js.snap | 99 ++----- .../en/__snapshots__/shell.test.js.snap | 98 ++----- .../__snapshots__/theme-delete.test.js.snap | 104 ++----- .../__snapshots__/theme-export.test.js.snap | 114 ++------ .../__snapshots__/theme-import.test.js.snap | 111 ++------ .../en/__snapshots__/theme-list.test.js.snap | 97 ++----- .../esv-secret-create.e2e.test.js.snap | 105 ++----- .../idm-schema-object-export.e2e.test.js.snap | 7 + .../__snapshots__/idp-delete.e2e.test.js.snap | 97 ++----- 153 files changed, 3996 insertions(+), 11931 deletions(-) diff --git a/test/client_cli/en/__snapshots__/admin-add-autoid-static-user-mapping.test.js.snap b/test/client_cli/en/__snapshots__/admin-add-autoid-static-user-mapping.test.js.snap index b55c8d804..3b00afa80 100644 --- a/test/client_cli/en/__snapshots__/admin-add-autoid-static-user-mapping.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-add-autoid-static-user-mapping.test.js.snap @@ -7,76 +7,30 @@ Add AutoId static user mapping to enable dashboards and other AutoId-based functionality. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-create-oauth2-client-with-admin-privileges.test.js.snap b/test/client_cli/en/__snapshots__/admin-create-oauth2-client-with-admin-privileges.test.js.snap index 255e07e34..40057a03a 100644 --- a/test/client_cli/en/__snapshots__/admin-create-oauth2-client-with-admin-privileges.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-create-oauth2-client-with-admin-privileges.test.js.snap @@ -6,103 +6,38 @@ exports[`CLI help interface for 'admin create-oauth2-client-with-admin-privilege Create an oauth2 client with admin privileges. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --client-id [id] Client id. - --client-secret [secret] Client secret. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --llt Create a long-lived token and store it - in a secret. The default secret name is - esv-admin-token and the default token - lifetime is 315,360,000 seconds (10 - years). Both can be overwritten with the - --llt-esv and --llt-ttl options. - --llt-esv [esv] Name of the secret to store the token - in. This option only applies if used - with the --llt option. (default: - esv-admin-token) - --llt-scope [scope] Request the following scope(s). This - option only applies if used with the - --llt option. (default: fr:idm:*) - --llt-ttl [ttl] Token lifetime (seconds). This option - only applies if used with the --llt - option. (default: 315,360,000 seconds - (10 years)) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-llt-esv Don't store the token in a secret and - output to console instead. This option - only applies if used with the --llt - option. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --client-id [id] Client id. + --client-secret [secret] Client secret. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --llt Create a long-lived token and store it in a secret. The default secret name is esv-admin-token and the default token lifetime is 315,360,000 seconds (10 years). Both can be overwritten with the --llt-esv and --llt-ttl options. + --llt-esv [esv] Name of the secret to store the token in. This option only applies if used with the --llt option. (default: esv-admin-token) + --llt-scope [scope] Request the following scope(s). This option only applies if used with the --llt option. (default: fr:idm:*) + --llt-ttl [ttl] Token lifetime (seconds). This option only applies if used with the --llt option. (default: 315,360,000 seconds (10 years)) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-llt-esv Don't store the token in a secret and output to console instead. This option only applies if used with the --llt option. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-get-access-token.test.js.snap b/test/client_cli/en/__snapshots__/admin-get-access-token.test.js.snap index 3c97ee932..114fc3131 100644 --- a/test/client_cli/en/__snapshots__/admin-get-access-token.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-get-access-token.test.js.snap @@ -6,84 +6,34 @@ exports[`CLI help interface for 'admin get-access-token' should be expected engl Get an access token using client credentials grant type. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --client-id [id] Client id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - -s, --client-secret [secret] Client secret. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --scope [scope] Request the following scope(s). - (default: fr:idm:*) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --client-id [id] Client id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + -s, --client-secret [secret] Client secret. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --scope [scope] Request the following scope(s). (default: fr:idm:*) + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-grant-oauth2-client-admin-privileges.test.js.snap b/test/client_cli/en/__snapshots__/admin-grant-oauth2-client-admin-privileges.test.js.snap index 0d949b256..32c7aa47b 100644 --- a/test/client_cli/en/__snapshots__/admin-grant-oauth2-client-admin-privileges.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-grant-oauth2-client-admin-privileges.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'admin grant-oauth2-client-admin-privileges' sho Grant an oauth2 client admin privileges. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --client-id OAuth2 client id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --client-id OAuth2 client id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-hide-generic-extension-attributes.test.js.snap b/test/client_cli/en/__snapshots__/admin-hide-generic-extension-attributes.test.js.snap index 96e5fe6fd..6541abbbb 100644 --- a/test/client_cli/en/__snapshots__/admin-hide-generic-extension-attributes.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-hide-generic-extension-attributes.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'admin hide-generic-extension-attributes' should Hide generic extension attributes. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --dry-run Dry-run only, do not perform changes. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --include-customized Include customized attributes. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --dry-run Dry-run only, do not perform changes. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --include-customized Include customized attributes. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-list-oauth2-clients-with-admin-privileges.test.js.snap b/test/client_cli/en/__snapshots__/admin-list-oauth2-clients-with-admin-privileges.test.js.snap index 998383de8..b5658512e 100644 --- a/test/client_cli/en/__snapshots__/admin-list-oauth2-clients-with-admin-privileges.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-list-oauth2-clients-with-admin-privileges.test.js.snap @@ -6,80 +6,31 @@ exports[`CLI help interface for 'admin list-oauth2-clients-with-admin-privileges List oauth2 clients with admin privileges. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-list-oauth2-clients-with-custom-privileges.test.js.snap b/test/client_cli/en/__snapshots__/admin-list-oauth2-clients-with-custom-privileges.test.js.snap index 922e02437..9c466cb74 100644 --- a/test/client_cli/en/__snapshots__/admin-list-oauth2-clients-with-custom-privileges.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-list-oauth2-clients-with-custom-privileges.test.js.snap @@ -6,80 +6,31 @@ exports[`CLI help interface for 'admin list-oauth2-clients-with-custom-privilege List oauth2 clients with custom privileges. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-list-static-user-mappings.test.js.snap b/test/client_cli/en/__snapshots__/admin-list-static-user-mappings.test.js.snap index 6235f9b95..80a62b009 100644 --- a/test/client_cli/en/__snapshots__/admin-list-static-user-mappings.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-list-static-user-mappings.test.js.snap @@ -6,82 +6,32 @@ exports[`CLI help interface for 'admin list-static-user-mappings' should be expe List all subjects of static user mappings that are not oauth2 clients. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --show-protected Show protected (system) subjects. - (default: false) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --show-protected Show protected (system) subjects. (default: false) + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-remove-static-user-mapping.test.js.snap b/test/client_cli/en/__snapshots__/admin-remove-static-user-mapping.test.js.snap index 550ca843e..c6646497a 100644 --- a/test/client_cli/en/__snapshots__/admin-remove-static-user-mapping.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-remove-static-user-mapping.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'admin remove-static-user-mapping' should be exp Remove a subject's static user mapping. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --sub-id Subject identifier. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --sub-id Subject identifier. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-repair-org-model.test.js.snap b/test/client_cli/en/__snapshots__/admin-repair-org-model.test.js.snap index a1b861397..9049fcbcb 100644 --- a/test/client_cli/en/__snapshots__/admin-repair-org-model.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-repair-org-model.test.js.snap @@ -6,85 +6,34 @@ exports[`CLI help interface for 'admin repair-org-model' should be expected engl Repair org model. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --dry-run Dry-run only, do not perform changes. - --exclude-customized Exclude customized properties from - repair. - --extend-permissions Extend permissions to include custom - attributes. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --dry-run Dry-run only, do not perform changes. + --exclude-customized Exclude customized properties from repair. + --extend-permissions Extend permissions to include custom attributes. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-revoke-oauth2-client-admin-privileges.test.js.snap b/test/client_cli/en/__snapshots__/admin-revoke-oauth2-client-admin-privileges.test.js.snap index ec5b8fef1..388bea3d1 100644 --- a/test/client_cli/en/__snapshots__/admin-revoke-oauth2-client-admin-privileges.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-revoke-oauth2-client-admin-privileges.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'admin revoke-oauth2-client-admin-privileges' sh Revoke admin privileges from an oauth2 client. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --client-id OAuth2 client id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --client-id OAuth2 client id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/admin-show-generic-extension-attributes.test.js.snap b/test/client_cli/en/__snapshots__/admin-show-generic-extension-attributes.test.js.snap index df5163fc9..6f290a622 100644 --- a/test/client_cli/en/__snapshots__/admin-show-generic-extension-attributes.test.js.snap +++ b/test/client_cli/en/__snapshots__/admin-show-generic-extension-attributes.test.js.snap @@ -6,84 +6,33 @@ exports[`CLI help interface for 'admin show-generic-extension-attributes' should Show generic extension attributes. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --dry-run Dry-run only, do not perform changes. - (default: false) - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --include-customized Include customized attributes. (default: - false) - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --dry-run Dry-run only, do not perform changes. (default: false) + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --include-customized Include customized attributes. (default: false) + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-delete.test.js.snap b/test/client_cli/en/__snapshots__/agent-delete.test.js.snap index 8723663b1..9b1f284f3 100644 --- a/test/client_cli/en/__snapshots__/agent-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-delete.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'agent delete' should be expected english 1`] = Delete agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all agents. Ignored with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, -a is ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all agents. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-describe.test.js.snap b/test/client_cli/en/__snapshots__/agent-describe.test.js.snap index c51ae5e4e..c45aab2b0 100644 --- a/test/client_cli/en/__snapshots__/agent-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-describe.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'agent describe' should be expected english 1`] Describe agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -g, --global Describe global agent. - -h, --help Help - -i, --agent-id Agent id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -g, --global Describe global agent. + -h, --help Help + -i, --agent-id Agent id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-export.test.js.snap b/test/client_cli/en/__snapshots__/agent-export.test.js.snap index 140f21f16..6acc2a5d4 100644 --- a/test/client_cli/en/__snapshots__/agent-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-export.test.js.snap @@ -6,91 +6,37 @@ exports[`CLI help interface for 'agent export' should be expected english 1`] = Export agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all agents to a single file. - Ignored with -i. - -A, --all-separate Export all agents to separate files - (*..agent.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -g, --global Export global agents. - -h, --help Help - -i, --agent-id Agent id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all agents to a single file. Ignored with -i. + -A, --all-separate Export all agents to separate files (*..agent.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -g, --global Export global agents. + -h, --help Help + -i, --agent-id Agent id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-gateway-delete.test.js.snap b/test/client_cli/en/__snapshots__/agent-gateway-delete.test.js.snap index bc58fdf8f..128c48be5 100644 --- a/test/client_cli/en/__snapshots__/agent-gateway-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-gateway-delete.test.js.snap @@ -6,83 +6,33 @@ exports[`CLI help interface for 'agent gateway delete' should be expected englis Delete identity gateway agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all identity gateway agents. - Ignored with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, -a is ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all identity gateway agents. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-gateway-describe.test.js.snap b/test/client_cli/en/__snapshots__/agent-gateway-describe.test.js.snap index 79f939fb4..36c573f95 100644 --- a/test/client_cli/en/__snapshots__/agent-gateway-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-gateway-describe.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'agent gateway describe' should be expected engl Describe gateway agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-gateway-export.test.js.snap b/test/client_cli/en/__snapshots__/agent-gateway-export.test.js.snap index ce89b195a..e7e7f9f42 100644 --- a/test/client_cli/en/__snapshots__/agent-gateway-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-gateway-export.test.js.snap @@ -6,91 +6,36 @@ exports[`CLI help interface for 'agent gateway export' should be expected englis Export gateway agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all gateway agents to a single - file. Ignored with -i. - -A, --all-separate Export all gateway agents to separate - files (*.identitygatewayagent.json) in - the current directory. Ignored with -i - or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all gateway agents to a single file. Ignored with -i. + -A, --all-separate Export all gateway agents to separate files (*.identitygatewayagent.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-gateway-import.test.js.snap b/test/client_cli/en/__snapshots__/agent-gateway-import.test.js.snap index d67b2c9f2..a98ab476d 100644 --- a/test/client_cli/en/__snapshots__/agent-gateway-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-gateway-import.test.js.snap @@ -6,90 +6,35 @@ exports[`CLI help interface for 'agent gateway import' should be expected englis Import gateway agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all agents from single file. - Ignored with -i. - -A, --all-separate Import all agents from separate files - (*.identitygatewayagent.json) in the - current directory. Ignored with -i or - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, only one agent - is imported and the options -a and -A - are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all agents from single file. Ignored with -i. + -A, --all-separate Import all agents from separate files (*.identitygatewayagent.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, only one agent is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-gateway-list.test.js.snap b/test/client_cli/en/__snapshots__/agent-gateway-list.test.js.snap index d9fbf7810..6e17efecd 100644 --- a/test/client_cli/en/__snapshots__/agent-gateway-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-gateway-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'agent gateway list' should be expected english List gateway agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-import.test.js.snap b/test/client_cli/en/__snapshots__/agent-import.test.js.snap index 3d8bb5213..b0ee896f9 100644 --- a/test/client_cli/en/__snapshots__/agent-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-import.test.js.snap @@ -6,90 +6,36 @@ exports[`CLI help interface for 'agent import' should be expected english 1`] = Import agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all agents from single file. - Ignored with -i. - -A, --all-separate Import all agents from separate files - (*.agent.json) in the current directory. - Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -g, --global Import global agents. - -h, --help Help - -i, --agent-id Agent id. If specified, only one agent - is imported and the options -a and -A - are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all agents from single file. Ignored with -i. + -A, --all-separate Import all agents from separate files (*.agent.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -g, --global Import global agents. + -h, --help Help + -i, --agent-id Agent id. If specified, only one agent is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-java-delete.test.js.snap b/test/client_cli/en/__snapshots__/agent-java-delete.test.js.snap index c2624a67d..ed223b069 100644 --- a/test/client_cli/en/__snapshots__/agent-java-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-java-delete.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'agent java delete' should be expected english 1 Delete java agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all java agents. Ignored with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, -a is ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all java agents. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-java-describe.test.js.snap b/test/client_cli/en/__snapshots__/agent-java-describe.test.js.snap index 2cfbf6770..4e9895c07 100644 --- a/test/client_cli/en/__snapshots__/agent-java-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-java-describe.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'agent java describe' should be expected english Describe java agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-java-export.test.js.snap b/test/client_cli/en/__snapshots__/agent-java-export.test.js.snap index 940f712c9..5abce2547 100644 --- a/test/client_cli/en/__snapshots__/agent-java-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-java-export.test.js.snap @@ -6,90 +6,36 @@ exports[`CLI help interface for 'agent java export' should be expected english 1 Export java agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all java agents to a single file. - Ignored with -i. - -A, --all-separate Export all java agents to separate files - (*.javaagent.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all java agents to a single file. Ignored with -i. + -A, --all-separate Export all java agents to separate files (*.javaagent.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-java-import.test.js.snap b/test/client_cli/en/__snapshots__/agent-java-import.test.js.snap index 53afa6b74..7e2f54756 100644 --- a/test/client_cli/en/__snapshots__/agent-java-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-java-import.test.js.snap @@ -6,89 +6,35 @@ exports[`CLI help interface for 'agent java import' should be expected english 1 Import java agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all agents from single file. - Ignored with -i. - -A, --all-separate Import all agents from separate files - (*.javaagent.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, only one agent - is imported and the options -a and -A - are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all agents from single file. Ignored with -i. + -A, --all-separate Import all agents from separate files (*.javaagent.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, only one agent is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-java-list.test.js.snap b/test/client_cli/en/__snapshots__/agent-java-list.test.js.snap index 45b53f8c9..56a7a9418 100644 --- a/test/client_cli/en/__snapshots__/agent-java-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-java-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'agent java list' should be expected english 1`] List java agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-list.test.js.snap b/test/client_cli/en/__snapshots__/agent-list.test.js.snap index 6700357b3..1366e2332 100644 --- a/test/client_cli/en/__snapshots__/agent-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-list.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'agent list' should be expected english 1`] = ` List agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -g, --global List global agents. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -g, --global List global agents. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-web-delete.test.js.snap b/test/client_cli/en/__snapshots__/agent-web-delete.test.js.snap index a311eab31..ee98b5af5 100644 --- a/test/client_cli/en/__snapshots__/agent-web-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-web-delete.test.js.snap @@ -6,83 +6,33 @@ exports[`CLI help interface for 'agent web delete' should be expected english 1` Delete web agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all web agents. Ignored with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all web agents. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-web-describe.test.js.snap b/test/client_cli/en/__snapshots__/agent-web-describe.test.js.snap index b82e5ab1a..0ba7852e1 100644 --- a/test/client_cli/en/__snapshots__/agent-web-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-web-describe.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'agent web describe' should be expected english Describe web agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-web-export.test.js.snap b/test/client_cli/en/__snapshots__/agent-web-export.test.js.snap index 2a817336e..816ecfd30 100644 --- a/test/client_cli/en/__snapshots__/agent-web-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-web-export.test.js.snap @@ -6,90 +6,36 @@ exports[`CLI help interface for 'agent web export' should be expected english 1` Export web agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all web agents to a single file. - Ignored with -i. - -A, --all-separate Export all web agents to separate files - (*.webagent.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all web agents to a single file. Ignored with -i. + -A, --all-separate Export all web agents to separate files (*.webagent.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-web-import.test.js.snap b/test/client_cli/en/__snapshots__/agent-web-import.test.js.snap index 4649f8318..b1229f986 100644 --- a/test/client_cli/en/__snapshots__/agent-web-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-web-import.test.js.snap @@ -6,89 +6,35 @@ exports[`CLI help interface for 'agent web import' should be expected english 1` Import web agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all agents from single file. - Ignored with -i. - -A, --all-separate Import all agents from separate files - (*.webagent.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --agent-id Agent id. If specified, only one agent - is imported and the options -a and -A - are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all agents from single file. Ignored with -i. + -A, --all-separate Import all agents from separate files (*.webagent.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --agent-id Agent id. If specified, only one agent is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/agent-web-list.test.js.snap b/test/client_cli/en/__snapshots__/agent-web-list.test.js.snap index 5f1331447..dd37cc3e2 100644 --- a/test/client_cli/en/__snapshots__/agent-web-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/agent-web-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'agent web list' should be expected english 1`] List web agents. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/app-delete.test.js.snap b/test/client_cli/en/__snapshots__/app-delete.test.js.snap index 592f2d02d..819e6dfcd 100644 --- a/test/client_cli/en/__snapshots__/app-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/app-delete.test.js.snap @@ -6,86 +6,34 @@ exports[`CLI help interface for 'app delete' should be expected english 1`] = ` Delete applications. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all applications. Ignored with - -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --app-id Application name. If specified, -a and - -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deep No deep delete. This leaves orphaned - configuration artifacts behind. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all applications. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --app-id Application name. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deep No deep delete. This leaves orphaned configuration artifacts behind. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/app-export.test.js.snap b/test/client_cli/en/__snapshots__/app-export.test.js.snap index 1de27341d..cb45a2582 100644 --- a/test/client_cli/en/__snapshots__/app-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/app-export.test.js.snap @@ -6,93 +6,37 @@ exports[`CLI help interface for 'app export' should be expected english 1`] = ` Export applications. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all applications to a single - file. Ignored with -i. - -A, --all-separate Export all applications to separate - files (*.application.json) in the - current directory. Ignored with -i or - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --app-id Application name. If specified, -a and - -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (scripts). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all applications to a single file. Ignored with -i. + -A, --all-separate Export all applications to separate files (*.application.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --app-id Application name. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (scripts). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/app-import.test.js.snap b/test/client_cli/en/__snapshots__/app-import.test.js.snap index 0f4513e73..d67d8c697 100644 --- a/test/client_cli/en/__snapshots__/app-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/app-import.test.js.snap @@ -6,91 +6,36 @@ exports[`CLI help interface for 'app import' should be expected english 1`] = ` Import applications. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all applications from single - file. Ignored with -i. - -A, --all-separate Import all applications from separate - files (*.app.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --app-id Application name. If specified, only one - application is imported and the options - -a and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (scripts). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all applications from single file. Ignored with -i. + -A, --all-separate Import all applications from separate files (*.app.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --app-id Application name. If specified, only one application is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (scripts). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/app-list.test.js.snap b/test/client_cli/en/__snapshots__/app-list.test.js.snap index 5766b42f9..b96d77f71 100644 --- a/test/client_cli/en/__snapshots__/app-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/app-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'app list' should be expected english 1`] = ` List applications. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authn-describe.test.js.snap b/test/client_cli/en/__snapshots__/authn-describe.test.js.snap index 9529aeaca..91292d4e6 100644 --- a/test/client_cli/en/__snapshots__/authn-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/authn-describe.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'authn describe' should be expected english 1`] Describe authentication settings. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -g, --global Describe global authentication settings. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --json Output in JSON format. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -g, --global Describe global authentication settings. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --json Output in JSON format. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authn-export.test.js.snap b/test/client_cli/en/__snapshots__/authn-export.test.js.snap index a205c3e38..84113e3df 100644 --- a/test/client_cli/en/__snapshots__/authn-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/authn-export.test.js.snap @@ -6,84 +6,34 @@ exports[`CLI help interface for 'authn export' should be expected english 1`] = Export authentication settings. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -g, --global Export global authentication settings. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -g, --global Export global authentication settings. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authn-import.test.js.snap b/test/client_cli/en/__snapshots__/authn-import.test.js.snap index e1bdc4073..3f46484d4 100644 --- a/test/client_cli/en/__snapshots__/authn-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/authn-import.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'authn import' should be expected english 1`] = Import authentication settings. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -g, --global Export global authentication settings. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -g, --global Export global authentication settings. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-policy-delete.test.js.snap b/test/client_cli/en/__snapshots__/authz-policy-delete.test.js.snap index 744499154..b172a2c31 100644 --- a/test/client_cli/en/__snapshots__/authz-policy-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-policy-delete.test.js.snap @@ -6,85 +6,34 @@ exports[`CLI help interface for 'authz policy delete' should be expected english Delete authorization policies. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all policies in a realm. Ignored - with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --policy-id Policy id/name. If specified, -a is - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --set-id Policy set id/name. Ignored with -i. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all policies in a realm. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --policy-id Policy id/name. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --set-id Policy set id/name. Ignored with -i. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-policy-describe.test.js.snap b/test/client_cli/en/__snapshots__/authz-policy-describe.test.js.snap index a57f9a3f6..522c410c0 100644 --- a/test/client_cli/en/__snapshots__/authz-policy-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-policy-describe.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'authz policy describe' should be expected engli Describe authorization policies. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --policy-id Policy id/name. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --json Output in JSON format. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --policy-id Policy id/name. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --json Output in JSON format. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-policy-export.test.js.snap b/test/client_cli/en/__snapshots__/authz-policy-export.test.js.snap index f574540ab..ef142257f 100644 --- a/test/client_cli/en/__snapshots__/authz-policy-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-policy-export.test.js.snap @@ -6,95 +6,39 @@ exports[`CLI help interface for 'authz policy export' should be expected english Export authorization policies. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export policies to a single file. - Ignored with -i. - -A, --all-separate Export policies to separate files - (*.policy.authz.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --policy-id Policy id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --no-deps Do not include dependencies (scripts). - --prereqs Include prerequisites (policy sets, - resource types). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --set-id Export policies in policy set only. - Ignored with -i. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export policies to a single file. Ignored with -i. + -A, --all-separate Export policies to separate files (*.policy.authz.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --policy-id Policy id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --no-deps Do not include dependencies (scripts). + --prereqs Include prerequisites (policy sets, resource types). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --set-id Export policies in policy set only. Ignored with -i. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-policy-import.test.js.snap b/test/client_cli/en/__snapshots__/authz-policy-import.test.js.snap index 18ce5583e..b5c23d5ff 100644 --- a/test/client_cli/en/__snapshots__/authz-policy-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-policy-import.test.js.snap @@ -6,96 +6,38 @@ exports[`CLI help interface for 'authz policy import' should be expected english Import authorization policies. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all policies from single file. - Ignored with -i. - -A, --all-separate Import all policies from separate files - (*.policy.authz.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --policy-id Policy id. If specified, only one policy - is imported and the options -a and -A - are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deps Do not import dependencies (scripts) - even if they are available in the import - file. - --prereqs Import prerequisites (policy sets, - resource types) if they are available in - the import file. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --set-id Import policies into this policy set. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all policies from single file. Ignored with -i. + -A, --all-separate Import all policies from separate files (*.policy.authz.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --policy-id Policy id. If specified, only one policy is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deps Do not import dependencies (scripts) even if they are available in the import file. + --prereqs Import prerequisites (policy sets, resource types) if they are available in the import file. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --set-id Import policies into this policy set. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-policy-list.test.js.snap b/test/client_cli/en/__snapshots__/authz-policy-list.test.js.snap index bf357cc9a..47e7fc46d 100644 --- a/test/client_cli/en/__snapshots__/authz-policy-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-policy-list.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'authz policy list' should be expected english 1 List authorization policies. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --set-id Policy set id/name. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --set-id Policy set id/name. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-set-delete.test.js.snap b/test/client_cli/en/__snapshots__/authz-set-delete.test.js.snap index 390602502..bf5005d3a 100644 --- a/test/client_cli/en/__snapshots__/authz-set-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-set-delete.test.js.snap @@ -6,83 +6,33 @@ exports[`CLI help interface for 'authz set delete' should be expected english 1` Delete authorization policy sets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all policy sets in a realm. - Ignored with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --set-id Policy set id/name. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all policy sets in a realm. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --set-id Policy set id/name. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-set-describe.test.js.snap b/test/client_cli/en/__snapshots__/authz-set-describe.test.js.snap index 7eb683e1e..67b03911e 100644 --- a/test/client_cli/en/__snapshots__/authz-set-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-set-describe.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'authz set describe' should be expected english Describe authorization policy sets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --set-id Policy set id/name. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --json Output in JSON format. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --set-id Policy set id/name. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --json Output in JSON format. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-set-export.test.js.snap b/test/client_cli/en/__snapshots__/authz-set-export.test.js.snap index 073ee7c73..24eac2f4e 100644 --- a/test/client_cli/en/__snapshots__/authz-set-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-set-export.test.js.snap @@ -6,94 +6,38 @@ exports[`CLI help interface for 'authz set export' should be expected english 1` Export authorization policy sets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all applications/policy sets to a - single file. Ignored with -i. - -A, --all-separate Export all applications/policy sets to - separate files (*.authz.json) in the - current directory. Ignored with -i or - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --set-id Policy set id/name. If specified, -a and - -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (policies, scripts). - --prereqs Include prerequisites (resource types). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all applications/policy sets to a single file. Ignored with -i. + -A, --all-separate Export all applications/policy sets to separate files (*.authz.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --set-id Policy set id/name. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (policies, scripts). + --prereqs Include prerequisites (resource types). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-set-import.test.js.snap b/test/client_cli/en/__snapshots__/authz-set-import.test.js.snap index ac611010f..4c3f67023 100644 --- a/test/client_cli/en/__snapshots__/authz-set-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-set-import.test.js.snap @@ -6,93 +6,37 @@ exports[`CLI help interface for 'authz set import' should be expected english 1` Import authorization policy sets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all policy sets from single file. - Ignored with -i. - -A, --all-separate Import all policy sets from separate - files (*.policyset.authz.json) in the - current directory. Ignored with -i or - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --set-id Policy set id/name. If specified, only - one policy set is imported and the - options -a and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (policies, scripts). - --prereqs Include prerequisites (resource types). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all policy sets from single file. Ignored with -i. + -A, --all-separate Import all policy sets from separate files (*.policyset.authz.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --set-id Policy set id/name. If specified, only one policy set is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (policies, scripts). + --prereqs Include prerequisites (resource types). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-type-delete.test.js.snap b/test/client_cli/en/__snapshots__/authz-type-delete.test.js.snap index 9197713ce..c1eee302f 100644 --- a/test/client_cli/en/__snapshots__/authz-type-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-type-delete.test.js.snap @@ -6,86 +6,34 @@ exports[`CLI help interface for 'authz type delete' should be expected english 1 Delete authorization resource types. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all resource types in a realm. - Ignored with -i and -n. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --type-id Variable id. If specified, -a is - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --type-name Resource type name. If specified, -a is - ignored. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all resource types in a realm. Ignored with -i and -n. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --type-id Variable id. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --type-name Resource type name. If specified, -a is ignored. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-type-describe.test.js.snap b/test/client_cli/en/__snapshots__/authz-type-describe.test.js.snap index a372d1b2f..867f2836a 100644 --- a/test/client_cli/en/__snapshots__/authz-type-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-type-describe.test.js.snap @@ -6,83 +6,34 @@ exports[`CLI help interface for 'authz type describe' should be expected english Describe authorization resource types. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --type-id Resource type uuid. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --json Output in JSON format. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --type-name Resource type name. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --type-id Resource type uuid. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --json Output in JSON format. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --type-name Resource type name. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-type-export.test.js.snap b/test/client_cli/en/__snapshots__/authz-type-export.test.js.snap index f1937ef7c..580b69f90 100644 --- a/test/client_cli/en/__snapshots__/authz-type-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-type-export.test.js.snap @@ -6,93 +6,37 @@ exports[`CLI help interface for 'authz type export' should be expected english 1 Export authorization resource types. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all resource types to a single - file. Ignored with -i. - -A, --all-separate Export all resource types to separate - files (*.resourcetype.authz.json) in the - current directory. Ignored with -i, -n, - or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --type-id Resource type uuid. If specified, -a and - -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --type-name Resource type name. If specified, -a and - -A are ignored. - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all resource types to a single file. Ignored with -i. + -A, --all-separate Export all resource types to separate files (*.resourcetype.authz.json) in the current directory. Ignored with -i, -n, or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --type-id Resource type uuid. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --type-name Resource type name. If specified, -a and -A are ignored. + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-type-import.test.js.snap b/test/client_cli/en/__snapshots__/authz-type-import.test.js.snap index b72e1a2ec..b647dac35 100644 --- a/test/client_cli/en/__snapshots__/authz-type-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-type-import.test.js.snap @@ -6,91 +6,36 @@ exports[`CLI help interface for 'authz type import' should be expected english 1 Import authorization resource types. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all resource types from single - file. Ignored with -i. - -A, --all-separate Import all resource types from separate - files (*.resourcetype.authz.json) in the - current directory. Ignored with -i, -n, - or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --type-id Resource type uuid. If specified, -a and - -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --type-name Resource type name. If specified, -a and - -A are ignored. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all resource types from single file. Ignored with -i. + -A, --all-separate Import all resource types from separate files (*.resourcetype.authz.json) in the current directory. Ignored with -i, -n, or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --type-id Resource type uuid. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --type-name Resource type name. If specified, -a and -A are ignored. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/authz-type-list.test.js.snap b/test/client_cli/en/__snapshots__/authz-type-list.test.js.snap index d517950ce..b701220ce 100644 --- a/test/client_cli/en/__snapshots__/authz-type-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/authz-type-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'authz type list' should be expected english 1`] List authorization resource types. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with more fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with more fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/config-export.test.js.snap b/test/client_cli/en/__snapshots__/config-export.test.js.snap index 4b7ffd871..b492fed1c 100644 --- a/test/client_cli/en/__snapshots__/config-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/config-export.test.js.snap @@ -14,128 +14,47 @@ flag to export only global config, and many other flags to customize the export. Use the -h or --help to see them all and to also see usage examples. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export everything to a single file. - -A, --all-separate Export everything to separate files in - the -D directory. Ignored with -a. - --curlirize Output all network calls in curl format. - -d, --default Export all scripts including the default - scripts. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -g, --global-only Export only the global config. If -r, - --realm-only is also active, then the - corresponding active realm config will - also be exported. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --include-active-values Include the currently active (and - loaded) secret value in the export. By - default, secret values are encrypted - server-side in the environment they are - exported from. Use --target - to have another environment perform the - encryption. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --no-coords Do not include the x and y coordinate - positions of the journey/tree nodes. - --no-decode Do not include decoded variable value in - variable export - -o, --separate-objects Export managed.idm.json objects - separately in their own directory. - Ignored with -a. - -r, --realm-only Export only the config for the active - realm. If -g, --global-only is also - active, then the global config will also - be exported. - -R, --read-only Export read-only config (with the - exception of default scripts) in - addition to the importable config. - -s, --separate-mappings Export sync.idm.json mappings separately - in their own directory. Ignored with -a. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --target Host URL of the environment to perform - secret value encryption. The URL must - resolve to an existing connection - profile. Use this option to generate an - export that can be imported into the - target environment without requiring - admin access to the source environment. - --use-string-arrays Where applicable, use string arrays to - store multi-line text (e.g. scripts). - (default: off) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. - -x, --extract Extract scripts and server properties - from the exported file, and save it to a - separate file. Ignored with -a. + -a, --all Export everything to a single file. + -A, --all-separate Export everything to separate files in the -D directory. Ignored with -a. + --curlirize Output all network calls in curl format. + -d, --default Export all scripts including the default scripts. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -g, --global-only Export only the global config. If -r, --realm-only is also active, then the corresponding active realm config will also be exported. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --include-active-values Include the currently active (and loaded) secret value in the export. By default, secret values are encrypted server-side in the environment they are exported from. Use --target to have another environment perform the encryption. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --no-coords Do not include the x and y coordinate positions of the journey/tree nodes. + --no-decode Do not include decoded variable value in variable export + -o, --separate-objects Export managed.idm.json objects separately in their own directory. Ignored with -a. + -r, --realm-only Export only the config for the active realm. If -g, --global-only is also active, then the global config will also be exported. + -R, --read-only Export read-only config (with the exception of default scripts) in addition to the importable config. + -s, --separate-mappings Export sync.idm.json mappings separately in their own directory. Ignored with -a. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --target Host URL of the environment to perform secret value encryption. The URL must resolve to an existing connection profile. Use this option to generate an export that can be imported into the target environment without requiring admin access to the source environment. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --use-string-arrays Where applicable, use string arrays to store multi-line text (e.g. scripts). (default: off) + --verbose Verbose output during command execution. If specified, may or may not produce additional output. + -x, --extract Extract scripts and server properties from the exported file, and save it to a separate file. Ignored with -a. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/config-import.test.js.snap b/test/client_cli/en/__snapshots__/config-import.test.js.snap index f1b55e7e6..661e41c31 100644 --- a/test/client_cli/en/__snapshots__/config-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/config-import.test.js.snap @@ -6,115 +6,41 @@ exports[`CLI help interface for 'config import' should be expected english 1`] = Import full cloud configuration. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all configuration from the single - file -f. Ignored with -i. - -A, --all-separate Import all configuration from separate - (.json) files in the (working) directory - -D. Ignored with -i or -a. - -C, --clean Remove existing service(s) before - importing. - --curlirize Output all network calls in curl format. - -d, --default Import all scripts including the default - scripts. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. Ignored with - -A. If included without -a, it will - import the single entity within the - file. - --flush-cache Flush token cache. - -g, --global Import global entity. Ignored with -a - and -A. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --include-active-values Import any secret values contained in - the import file. By default, secret - values are encrypted server-side in the - environment they are exported from. Use - --source to import a file - exported from another environment than - the one you are importing to. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --re-uuid-journeys Generate new UUIDs for all journey nodes - during import. (default: off) - --re-uuid-scripts Create new UUIDs for the scripts upon - import. Use this to duplicate scripts or - create a new versions of the same - scripts. (default: off) - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --source Host URL of the environment which - performed secret value encryption. The - URL must resolve to an existing - connection profile. Use this option to - import a file that was exported from a - different source environment than the - one you are importing to. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all configuration from the single file -f. Ignored with -i. + -A, --all-separate Import all configuration from separate (.json) files in the (working) directory -D. Ignored with -i or -a. + -C, --clean Remove existing service(s) before importing. + --curlirize Output all network calls in curl format. + -d, --default Import all scripts including the default scripts. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. Ignored with -A. If included without -a, it will import the single entity within the file. + --flush-cache Flush token cache. + -g, --global Import global entity. Ignored with -a and -A. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --include-active-values Import any secret values contained in the import file. By default, secret values are encrypted server-side in the environment they are exported from. Use --source to import a file exported from another environment than the one you are importing to. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --re-uuid-journeys Generate new UUIDs for all journey nodes during import. (default: off) + --re-uuid-scripts Create new UUIDs for the scripts upon import. Use this to duplicate scripts or create a new versions of the same scripts. (default: off) + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --source Host URL of the environment which performed secret value encryption. The URL must resolve to an existing connection profile. Use this option to import a file that was exported from a different source environment than the one you are importing to. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/conn-delete.test.js.snap b/test/client_cli/en/__snapshots__/conn-delete.test.js.snap index 49e267b19..2e86ac25c 100644 --- a/test/client_cli/en/__snapshots__/conn-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/conn-delete.test.js.snap @@ -6,46 +6,21 @@ exports[`CLI help interface for 'conn delete' should be expected english 1`] = ` Delete connection profiles. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. Options: - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/conn-describe.test.js.snap b/test/client_cli/en/__snapshots__/conn-describe.test.js.snap index af0d851d9..729b05b35 100644 --- a/test/client_cli/en/__snapshots__/conn-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/conn-describe.test.js.snap @@ -6,47 +6,22 @@ exports[`CLI help interface for 'conn describe' should be expected english 1`] = Describe connection profile. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. Options: - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --show-secrets Show passwords and secrets. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --show-secrets Show passwords and secrets. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/conn-list.test.js.snap b/test/client_cli/en/__snapshots__/conn-list.test.js.snap index 4a9fd16c6..e94eb616d 100644 --- a/test/client_cli/en/__snapshots__/conn-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/conn-list.test.js.snap @@ -6,41 +6,19 @@ exports[`CLI help interface for 'conn list' should be expected english 1`] = ` List connection profiles. Options: - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/conn-save.test.js.snap b/test/client_cli/en/__snapshots__/conn-save.test.js.snap index 6bc294566..55e6b0499 100644 --- a/test/client_cli/en/__snapshots__/conn-save.test.js.snap +++ b/test/client_cli/en/__snapshots__/conn-save.test.js.snap @@ -35,6 +35,7 @@ Options: --no-validate Do not validate connection. --sa-id Service account id. --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: @@ -103,6 +104,7 @@ Options: --no-validate Do not validate connection. --sa-id Service account id. --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: @@ -171,6 +173,7 @@ Options: --no-validate Do not validate connection. --sa-id Service account id. --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: @@ -239,6 +242,7 @@ Options: --no-validate Do not validate connection. --sa-id Service account id. --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: diff --git a/test/client_cli/en/__snapshots__/email-template-export.test.js.snap b/test/client_cli/en/__snapshots__/email-template-export.test.js.snap index 3053f1191..b2198250f 100644 --- a/test/client_cli/en/__snapshots__/email-template-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/email-template-export.test.js.snap @@ -6,92 +6,36 @@ exports[`CLI help interface for 'email templates export' should be expected engl Export email templates. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all email templates to a single - file. Ignored with -i. - -A, --all-separate Export all email templates as separate - files .template.email.json. - Ignored with -i, and -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Name of the export file. Ignored with - -A. Defaults to - .template.email.json. - --flush-cache Flush token cache. - -h, --help Help - -i, --template-id Email template id/name. If specified, -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all email templates to a single file. Ignored with -i. + -A, --all-separate Export all email templates as separate files .template.email.json. Ignored with -i, and -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Name of the export file. Ignored with -A. Defaults to .template.email.json. + --flush-cache Flush token cache. + -h, --help Help + -i, --template-id Email template id/name. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/email-template-import.test.js.snap b/test/client_cli/en/__snapshots__/email-template-import.test.js.snap index 3ec645b61..825ba301c 100644 --- a/test/client_cli/en/__snapshots__/email-template-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/email-template-import.test.js.snap @@ -6,97 +6,36 @@ exports[`CLI help interface for 'email templates import' should be expected engl Import email templates. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all email templates from single - file. Ignored with -i. - -A, --all-separate Import all email templates from separate - files (*.template.email.json) in the - current directory. Ignored with -i or - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the import file. - --flush-cache Flush token cache. - -h, --help Help - -i, --template-id Email template id/name. If specified, -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --raw Import raw email template files. Raw - templates do not contain the id/name, - therefore when using -A or -f without - -i, the email template id/name is parsed - from the file name; Make sure your - template files are named - 'emailTemplate-.json' or use -f - with -i. Ignored with -a. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all email templates from single file. Ignored with -i. + -A, --all-separate Import all email templates from separate files (*.template.email.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the import file. + --flush-cache Flush token cache. + -h, --help Help + -i, --template-id Email template id/name. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --raw Import raw email template files. Raw templates do not contain the id/name, therefore when using -A or -f without -i, the email template id/name is parsed from the file name; Make sure your template files are named 'emailTemplate-.json' or use -f with -i. Ignored with -a. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/email-template-list.test.js.snap b/test/client_cli/en/__snapshots__/email-template-list.test.js.snap index 190cab019..eff16a744 100644 --- a/test/client_cli/en/__snapshots__/email-template-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/email-template-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'email templates list' should be expected englis List email templates. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-apply.test.js.snap b/test/client_cli/en/__snapshots__/esv-apply.test.js.snap index 65ed568a1..bc8deae1d 100644 --- a/test/client_cli/en/__snapshots__/esv-apply.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-apply.test.js.snap @@ -8,88 +8,35 @@ requires a restart of the AM and IDM pods and can take up to 10 minutes to complete. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --check-only Check if updated need to be apply but - don't apply them. (default: false) - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - --force Force restart of services if no updates - are found. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-wait Don't wait for the updates to finish - applying. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --timeout Specify a timeout in seconds how long - the tool should wait for the apply - command to finish. Only effective - without --no-wait. (default: 600 secs - (10 mins)) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. - -y, --yes Answer y/yes to all prompts. + --check-only Check if updated need to be apply but don't apply them. (default: false) + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + --force Force restart of services if no updates are found. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-wait Don't wait for the updates to finish applying. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --timeout Specify a timeout in seconds how long the tool should wait for the apply command to finish. Only effective without --no-wait. (default: 600 secs (10 mins)) + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. + -y, --yes Answer y/yes to all prompts. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-create.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-create.test.js.snap index 9c4f96b97..535dd68d2 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-create.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-create.test.js.snap @@ -6,85 +6,36 @@ exports[`CLI help interface for 'esv secret create' should be expected english 1 Create secrets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --description [description] Secret description. - --encoding [encoding] Secret encoding (choices: "generic", - "pem", "base64hmac", default: generic) - -f, --file [file] Name of the file to read pem or - base64hmac encoded secret from. Ignored - if --value is specified - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-use-in-placeholders Secret cannot be used in placeholders. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --value Secret value. Overrides "--file" - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --description [description] Secret description. + --encoding [encoding] Secret encoding (choices: "generic", "pem", "base64hmac", default: generic) + -f, --file [file] Name of the file to read pem or base64hmac encoded secret from. Ignored if --value is specified + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-use-in-placeholders Secret cannot be used in placeholders. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --value Secret value. Overrides "--file" + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-delete.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-delete.test.js.snap index 9720ca71d..49bb09da3 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-delete.test.js.snap @@ -6,79 +6,32 @@ exports[`CLI help interface for 'esv secret delete' should be expected english 1 Delete secrets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all secrets in a realm. Ignored - with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. If specified, -a is ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all secrets in a realm. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-describe.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-describe.test.js.snap index 5629e72e7..4561c2991 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-describe.test.js.snap @@ -6,92 +6,34 @@ exports[`CLI help interface for 'esv secret describe' should be expected english Describe secrets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Optional export file to use to determine - usage. Overrides -D, --directory. Only - used if -u or --usage is provided as - well. - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --json Output in JSON format. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -u, --usage List all uses of the secret. If a file - is provided with -f or --file, it will - search for usage in the file. If a - directory is provided with -D or - --directory, it will search for usage in - all .json files in the directory and - sub-directories. If no file or directory - is provided, it will perform a full - export automatically to determine usage. - (default: false) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Optional export file to use to determine usage. Overrides -D, --directory. Only used if -u or --usage is provided as well. + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --json Output in JSON format. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + -u, --usage List all uses of the secret. If a file is provided with -f or --file, it will search for usage in the file. If a directory is provided with -D or --directory, it will search for usage in all .json files in the directory and sub-directories. If no file or directory is provided, it will perform a full export automatically to determine usage. (default: false) + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-export.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-export.test.js.snap index 6f5f6cce3..f21c532d9 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-export.test.js.snap @@ -6,100 +6,37 @@ exports[`CLI help interface for 'esv secret export' should be expected english 1 Export secrets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all secrets to a single file. - Ignored with -i. - -A, --all-separate Export all sub1s to separate files - (*.secret.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --include-active-values Include the currently active (and - loaded) secret value in the export. By - default, secret values are encrypted - server-side in the environment they are - exported from. Use --target - to have another environment perform the - encryption. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --target Host URL of the environment to perform - secret value encryption. The URL must - resolve to an existing connection - profile. Use this option to generate an - export that can be imported into the - target environment without requiring - admin access to the source environment. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all secrets to a single file. Ignored with -i. + -A, --all-separate Export all sub1s to separate files (*.secret.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --include-active-values Include the currently active (and loaded) secret value in the export. By default, secret values are encrypted server-side in the environment they are exported from. Use --target to have another environment perform the encryption. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --target Host URL of the environment to perform secret value encryption. The URL must resolve to an existing connection profile. Use this option to generate an export that can be imported into the target environment without requiring admin access to the source environment. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-import.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-import.test.js.snap index 6a790b0dc..811cbb2da 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-import.test.js.snap @@ -6,99 +6,36 @@ exports[`CLI help interface for 'esv secret import' should be expected english 1 Import secrets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all secrets from single file. - Ignored with -i. - -A, --all-separate Import all secrets from separate files - (*.secret.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. If specified, only one secret - is imported and the options -a and -A - are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --include-active-values Import any secret values contained in - the import file. By default, secret - values are encrypted server-side in the - environment they are exported from. Use - --source to import a file - exported from another environment than - the one you are importing to. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --source Host URL of the environment which - performed secret value encryption. The - URL must resolve to an existing - connection profile. Use this option to - import a file that was exported from a - different source environment than the - one you are importing to. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all secrets from single file. Ignored with -i. + -A, --all-separate Import all secrets from separate files (*.secret.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. If specified, only one secret is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --include-active-values Import any secret values contained in the import file. By default, secret values are encrypted server-side in the environment they are exported from. Use --source to import a file exported from another environment than the one you are importing to. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --source Host URL of the environment which performed secret value encryption. The URL must resolve to an existing connection profile. Use this option to import a file that was exported from a different source environment than the one you are importing to. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-list.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-list.test.js.snap index 20dc280b3..696b10741 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-list.test.js.snap @@ -6,92 +6,33 @@ exports[`CLI help interface for 'esv secret list' should be expected english 1`] List secrets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Optional export file to use to determine - usage. Overrides -D, --directory. Only - used if -u or --usage is provided as - well. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields besides usage. - (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -u, --usage Display usage field. If a file is - provided with -f or --file, it will - search for usage in the file. If a - directory is provided with -D or - --directory, it will search for usage in - all .json files in the directory and - sub-directories. If no file or directory - is provided, it will perform a full - export automatically to determine usage. - (default: false) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Optional export file to use to determine usage. Overrides -D, --directory. Only used if -u or --usage is provided as well. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields besides usage. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + -u, --usage Display usage field. If a file is provided with -f or --file, it will search for usage in the file. If a directory is provided with -D or --directory, it will search for usage in all .json files in the directory and sub-directories. If no file or directory is provided, it will perform a full export automatically to determine usage. (default: false) + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-set.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-set.test.js.snap index 441356f70..47053ad4a 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-set.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-set.test.js.snap @@ -6,78 +6,32 @@ exports[`CLI help interface for 'esv secret set' should be expected english 1`] Set secret description. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --description Secret description. - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --description Secret description. + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-version-activate.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-version-activate.test.js.snap index f14c2bbff..c027e84a0 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-version-activate.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-version-activate.test.js.snap @@ -6,78 +6,32 @@ exports[`CLI help interface for 'esv secret version activate' should be expected Activate versions of secrets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -v, --version Version of secret. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + -v, --version Version of secret. + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-version-create.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-version-create.test.js.snap index 53f96e356..5132f0547 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-version-create.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-version-create.test.js.snap @@ -6,81 +6,33 @@ exports[`CLI help interface for 'esv secret version create' should be expected e Create new version of secret. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Name of the file to read pem or - base64hmac encoded secret from. Ignored - if --value is specified - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --value Secret value. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Name of the file to read pem or base64hmac encoded secret from. Ignored if --value is specified + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --value Secret value. + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-version-deactivate.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-version-deactivate.test.js.snap index 51a18724f..2d105bf63 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-version-deactivate.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-version-deactivate.test.js.snap @@ -6,78 +6,32 @@ exports[`CLI help interface for 'esv secret version deactivate' should be expect Deactivate versions of secrets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -v, --version Version of secret. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + -v, --version Version of secret. + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-version-delete.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-version-delete.test.js.snap index b1fbc393e..9e6a904b2 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-version-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-version-delete.test.js.snap @@ -6,80 +6,33 @@ exports[`CLI help interface for 'esv secret version delete' should be expected e Delete versions of secrets. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all secrets in a realm. Ignored - with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. If specified, -a is ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -v, --version Version of secret. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all secrets in a realm. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + -v, --version Version of secret. + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-secret-version-list.test.js.snap b/test/client_cli/en/__snapshots__/esv-secret-version-list.test.js.snap index 839962660..789aaefde 100644 --- a/test/client_cli/en/__snapshots__/esv-secret-version-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-secret-version-list.test.js.snap @@ -6,78 +6,32 @@ exports[`CLI help interface for 'esv secret version list' should be expected eng List versions of secret. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --secret-id Secret id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --secret-id Secret id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-variable-create.test.js.snap b/test/client_cli/en/__snapshots__/esv-variable-create.test.js.snap index 57774a259..76fde3f53 100644 --- a/test/client_cli/en/__snapshots__/esv-variable-create.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-variable-create.test.js.snap @@ -6,82 +6,34 @@ exports[`CLI help interface for 'esv variable create' should be expected english Create variables. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --description [description] Variable description. - --flush-cache Flush token cache. - -h, --help Help - -i, --variable-id Variable id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --value Variable value. - --variable-type [variable-type] Variable type. Must be one of "string", - "list", "array", "object", "bool", - "int", or "number". (default: "string") - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --description [description] Variable description. + --flush-cache Flush token cache. + -h, --help Help + -i, --variable-id Variable id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --value Variable value. + --variable-type [variable-type] Variable type. Must be one of "string", "list", "array", "object", "bool", "int", or "number". (default: "string") + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-variable-delete.test.js.snap b/test/client_cli/en/__snapshots__/esv-variable-delete.test.js.snap index bcf382eb6..0c1e2d94a 100644 --- a/test/client_cli/en/__snapshots__/esv-variable-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-variable-delete.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'esv variable delete' should be expected english Delete variables. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all variable in a realm. Ignored - with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --variable-id Variable id. If specified, -a is - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deep No deep delete. This leaves orphaned - configuration artifacts behind. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all variable in a realm. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --variable-id Variable id. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deep No deep delete. This leaves orphaned configuration artifacts behind. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-variable-describe.test.js.snap b/test/client_cli/en/__snapshots__/esv-variable-describe.test.js.snap index e3bfa6d47..dee47d344 100644 --- a/test/client_cli/en/__snapshots__/esv-variable-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-variable-describe.test.js.snap @@ -6,92 +6,34 @@ exports[`CLI help interface for 'esv variable describe' should be expected engli Describe variables. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Optional export file to use to determine - usage. Overrides -D, --directory. Only - used if -u or --usage is provided as - well. - --flush-cache Flush token cache. - -h, --help Help - -i, --variable-id Variable id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --json Output in JSON format. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -u, --usage List all uses of the variable. If a file - is provided with -f or --file, it will - search for usage in the file. If a - directory is provided with -D or - --directory, it will search for usage in - all .json files in the directory and - sub-directories. If no file or directory - is provided, it will perform a full - export automatically to determine usage. - (default: false) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Optional export file to use to determine usage. Overrides -D, --directory. Only used if -u or --usage is provided as well. + --flush-cache Flush token cache. + -h, --help Help + -i, --variable-id Variable id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --json Output in JSON format. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + -u, --usage List all uses of the variable. If a file is provided with -f or --file, it will search for usage in the file. If a directory is provided with -D or --directory, it will search for usage in all .json files in the directory and sub-directories. If no file or directory is provided, it will perform a full export automatically to determine usage. (default: false) + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-variable-export.test.js.snap b/test/client_cli/en/__snapshots__/esv-variable-export.test.js.snap index 2e01d8792..d6db666e2 100644 --- a/test/client_cli/en/__snapshots__/esv-variable-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-variable-export.test.js.snap @@ -6,88 +6,36 @@ exports[`CLI help interface for 'esv variable export' should be expected english Export variables. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all variables to a single file. - Ignored with -i. - -A, --all-separate Export all variables to separate files - (*.variable.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --variable-id Variable id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --no-decode Do not include decoded variable value in - export - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all variables to a single file. Ignored with -i. + -A, --all-separate Export all variables to separate files (*.variable.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --variable-id Variable id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --no-decode Do not include decoded variable value in export + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-variable-import.test.js.snap b/test/client_cli/en/__snapshots__/esv-variable-import.test.js.snap index 4727ab958..48ec93da1 100644 --- a/test/client_cli/en/__snapshots__/esv-variable-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-variable-import.test.js.snap @@ -6,85 +6,34 @@ exports[`CLI help interface for 'esv variable import' should be expected english Import variables. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all variables from single file. - Ignored with -i. - -A, --all-separate Import all variables from separate files - (*.variable.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --variable-id Variable id. If specified, only one - variable is imported and the options -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all variables from single file. Ignored with -i. + -A, --all-separate Import all variables from separate files (*.variable.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --variable-id Variable id. If specified, only one variable is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-variable-list.test.js.snap b/test/client_cli/en/__snapshots__/esv-variable-list.test.js.snap index f40191719..b9ddff7fd 100644 --- a/test/client_cli/en/__snapshots__/esv-variable-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-variable-list.test.js.snap @@ -6,92 +6,33 @@ exports[`CLI help interface for 'esv variable list' should be expected english 1 List variables. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Optional export file to use to determine - usage. Overrides -D, --directory. Only - used if -u or --usage is provided as - well. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields besides usage. - (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -u, --usage Display usage field. If a file is - provided with -f or --file, it will - search for usage in the file. If a - directory is provided with -D or - --directory, it will search for usage in - all .json files in the directory and - sub-directories. If no file or directory - is provided, it will perform a full - export automatically to determine usage. - (default: false) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Optional export file to use to determine usage. Overrides -D, --directory. Only used if -u or --usage is provided as well. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields besides usage. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + -u, --usage Display usage field. If a file is provided with -f or --file, it will search for usage in the file. If a directory is provided with -D or --directory, it will search for usage in all .json files in the directory and sub-directories. If no file or directory is provided, it will perform a full export automatically to determine usage. (default: false) + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/esv-variable-set.test.js.snap b/test/client_cli/en/__snapshots__/esv-variable-set.test.js.snap index 8237a6b6f..b44acf633 100644 --- a/test/client_cli/en/__snapshots__/esv-variable-set.test.js.snap +++ b/test/client_cli/en/__snapshots__/esv-variable-set.test.js.snap @@ -6,79 +6,33 @@ exports[`CLI help interface for 'esv variable set' should be expected english 1` Set variable description. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --description [description] Variable description. - --flush-cache Flush token cache. - -h, --help Help - -i, --variable-id Variable id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --value [value] Variable value. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --description [description] Variable description. + --flush-cache Flush token cache. + -h, --help Help + -i, --variable-id Variable id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --value [value] Variable value. + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idm-count.test.js.snap b/test/client_cli/en/__snapshots__/idm-count.test.js.snap index 1ceeb4636..00bbfa378 100644 --- a/test/client_cli/en/__snapshots__/idm-count.test.js.snap +++ b/test/client_cli/en/__snapshots__/idm-count.test.js.snap @@ -6,83 +6,32 @@ exports[`CLI help interface for 'idm count' should be expected english 1`] = ` Count managed objects. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - -o, --managed-object Type of managed object to count. E.g. - "alpha_user", "alpha_role", "user", - "role". - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + -o, --managed-object Type of managed object to count. E.g. "alpha_user", "alpha_role", "user", "role". + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idm-delete.test.js.snap b/test/client_cli/en/__snapshots__/idm-delete.test.js.snap index aaecb77aa..804b98d41 100644 --- a/test/client_cli/en/__snapshots__/idm-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/idm-delete.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'idm delete' should be expected english 1`] = ` Delete AM services. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --id Id of Service to be deleted. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --id Id of Service to be deleted. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idm-export.test.js.snap b/test/client_cli/en/__snapshots__/idm-export.test.js.snap index da40cbe0c..c1a440c54 100644 --- a/test/client_cli/en/__snapshots__/idm-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/idm-export.test.js.snap @@ -6,103 +6,40 @@ exports[`CLI help interface for 'idm export' should be expected english 1`] = ` Export IDM configuration objects. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all IDM configuration objects - into a single file in directory -D. - Ignored with -i. - -A, --all-separate Export all IDM configuration objects - into separate JSON files in directory - -D. Ignored with -i, and -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -e, --env-file [envfile] Name of the env file. - -E, --entities-file [entities-file] Name of the entity file. Ignored with - -i. - -f, --file [file] Export file (or directory name if - exporting mappings separately). Ignored - with -A. - --flush-cache Flush token cache. - -h, --help Help - -i, --entity-id Config entity id/name. E.g. "managed", - "sync", "provisioner-", - etc. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - -o, --separate-objects Export managed.idm.json objects - separately in their own directory. - Ignored with -a. - -s, --separate-mappings Export sync.idm.json mappings separately - in their own directory. Ignored with -a. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all IDM configuration objects into a single file in directory -D. Ignored with -i. + -A, --all-separate Export all IDM configuration objects into separate JSON files in directory -D. Ignored with -i, and -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -e, --env-file [envfile] Name of the env file. + -E, --entities-file [entities-file] Name of the entity file. Ignored with -i. + -f, --file [file] Export file (or directory name if exporting mappings separately). Ignored with -A. + --flush-cache Flush token cache. + -h, --help Help + -i, --entity-id Config entity id/name. E.g. "managed", "sync", "provisioner-", etc. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + -o, --separate-objects Export managed.idm.json objects separately in their own directory. Ignored with -a. + -s, --separate-mappings Export sync.idm.json mappings separately in their own directory. Ignored with -a. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idm-import.test.js.snap b/test/client_cli/en/__snapshots__/idm-import.test.js.snap index 2365775c9..76ce0e9f0 100644 --- a/test/client_cli/en/__snapshots__/idm-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/idm-import.test.js.snap @@ -6,94 +6,37 @@ exports[`CLI help interface for 'idm import' should be expected english 1`] = ` Import IDM configuration objects. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all IDM configuration objects - from a single file in directory -D. - Ignored with -i. - -A, --all-separate Import all IDM configuration objects - from separate files in directory -D. - Ignored with -i, and -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -e, --env-file [envfile] Name of the env file. - -E, --entities-file [entities-file] Name of the entity file. Ignored with - -i. - -f, --file [file] Import file. Ignored with -A. - --flush-cache Flush token cache. - -h, --help Help - -i, --entity-id Config entity id/name. E.g. "managed", - "sync", "provisioner-", - etc. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all IDM configuration objects from a single file in directory -D. Ignored with -i. + -A, --all-separate Import all IDM configuration objects from separate files in directory -D. Ignored with -i, and -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -e, --env-file [envfile] Name of the env file. + -E, --entities-file [entities-file] Name of the entity file. Ignored with -i. + -f, --file [file] Import file. Ignored with -A. + --flush-cache Flush token cache. + -h, --help Help + -i, --entity-id Config entity id/name. E.g. "managed", "sync", "provisioner-", etc. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idm-list.test.js.snap b/test/client_cli/en/__snapshots__/idm-list.test.js.snap index 91a77306a..f06fac39d 100644 --- a/test/client_cli/en/__snapshots__/idm-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/idm-list.test.js.snap @@ -6,80 +6,31 @@ exports[`CLI help interface for 'idm list' should be expected english 1`] = ` List IDM configuration objects. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idm-schema-object-export.test.js.snap b/test/client_cli/en/__snapshots__/idm-schema-object-export.test.js.snap index 4ec904db0..97d66a91f 100644 --- a/test/client_cli/en/__snapshots__/idm-schema-object-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/idm-schema-object-export.test.js.snap @@ -6,84 +6,34 @@ exports[`CLI help interface for 'idm' should be expected english 1`] = ` Import IDM configuration managed objects. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -e, --env-file [envfile] Name of the env file. - -f, --file [file] Import file. - --flush-cache Flush token cache. - -h, --help Help - -i, --individual-object Import an individual object. Requires - the use of the -f to specify the file. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -e, --env-file [envfile] Name of the env file. + -f, --file [file] Import file. + --flush-cache Flush token cache. + -h, --help Help + -i, --individual-object Import an individual object. Requires the use of the -f to specify the file. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idm-schema-object-import.test.js.snap b/test/client_cli/en/__snapshots__/idm-schema-object-import.test.js.snap index 4ec904db0..97d66a91f 100644 --- a/test/client_cli/en/__snapshots__/idm-schema-object-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/idm-schema-object-import.test.js.snap @@ -6,84 +6,34 @@ exports[`CLI help interface for 'idm' should be expected english 1`] = ` Import IDM configuration managed objects. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -e, --env-file [envfile] Name of the env file. - -f, --file [file] Import file. - --flush-cache Flush token cache. - -h, --help Help - -i, --individual-object Import an individual object. Requires - the use of the -f to specify the file. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -e, --env-file [envfile] Name of the env file. + -f, --file [file] Import file. + --flush-cache Flush token cache. + -h, --help Help + -i, --individual-object Import an individual object. Requires the use of the -f to specify the file. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idp-delete.test.js.snap b/test/client_cli/en/__snapshots__/idp-delete.test.js.snap index 99b7a467a..8ff468670 100644 --- a/test/client_cli/en/__snapshots__/idp-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/idp-delete.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'idp delete' should be expected english 1`] = ` Delete (social) identity providers. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --idp-id Id/name of a provider. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --idp-id Id/name of a provider. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idp-export.test.js.snap b/test/client_cli/en/__snapshots__/idp-export.test.js.snap index bb57f882f..cd5a2b03c 100644 --- a/test/client_cli/en/__snapshots__/idp-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/idp-export.test.js.snap @@ -6,91 +6,36 @@ exports[`CLI help interface for 'idp export' should be expected english 1`] = ` Export (social) identity providers. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all the providers in a realm to a - single file. Ignored with -t and -i. - -A, --all-separate Export all the providers in a realm as - separate files .idp.json. - Ignored with -t, -i, and -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Name of the file to write the exported - provider(s) to. Ignored with -A. - --flush-cache Flush token cache. - -h, --help Help - -i, --idp-id Id/name of a provider. If specified, -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all the providers in a realm to a single file. Ignored with -t and -i. + -A, --all-separate Export all the providers in a realm as separate files .idp.json. Ignored with -t, -i, and -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Name of the file to write the exported provider(s) to. Ignored with -A. + --flush-cache Flush token cache. + -h, --help Help + -i, --idp-id Id/name of a provider. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idp-import.test.js.snap b/test/client_cli/en/__snapshots__/idp-import.test.js.snap index 6c4130b49..d78f10b1a 100644 --- a/test/client_cli/en/__snapshots__/idp-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/idp-import.test.js.snap @@ -6,91 +6,36 @@ exports[`CLI help interface for 'idp import' should be expected english 1`] = ` Import (social) identity providers. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all the providers from single - file. Ignored with -t or -i. - -A, --all-separate Import all the providers from separate - files (*.json) in the current directory. - Ignored with -t or -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import the - provider(s) from. - --flush-cache Flush token cache. - -h, --help Help - -i, --idp-id Provider id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (scripts). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all the providers from single file. Ignored with -t or -i. + -A, --all-separate Import all the providers from separate files (*.json) in the current directory. Ignored with -t or -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import the provider(s) from. + --flush-cache Flush token cache. + -h, --help Help + -i, --idp-id Provider id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (scripts). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/idp-list.test.js.snap b/test/client_cli/en/__snapshots__/idp-list.test.js.snap index 72135d594..5dd301bfe 100644 --- a/test/client_cli/en/__snapshots__/idp-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/idp-list.test.js.snap @@ -6,80 +6,31 @@ exports[`CLI help interface for 'idp list' should be expected english 1`] = ` List (social) identity providers. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/info.test.js.snap b/test/client_cli/en/__snapshots__/info.test.js.snap index 7b378eb21..02109b98d 100644 --- a/test/client_cli/en/__snapshots__/info.test.js.snap +++ b/test/client_cli/en/__snapshots__/info.test.js.snap @@ -6,77 +6,31 @@ exports[`CLI help interface for 'info' should be expected english 1`] = ` Print versions and tokens. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --json Output in JSON format. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --json Output in JSON format. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/journey-delete.test.js.snap b/test/client_cli/en/__snapshots__/journey-delete.test.js.snap index 8645489e1..267b2895b 100644 --- a/test/client_cli/en/__snapshots__/journey-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/journey-delete.test.js.snap @@ -6,89 +6,35 @@ exports[`CLI help interface for 'journey delete' should be expected english 1`] Delete journeys/trees. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all the journeys/trees in a - realm. Ignored with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --journey-id Name of a journey/tree. If specified, -a - is ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deep No deep delete. This leaves orphaned - configuration artifacts behind. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. (default: off) + -a, --all Delete all the journeys/trees in a realm. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --journey-id Name of a journey/tree. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deep No deep delete. This leaves orphaned configuration artifacts behind. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. + --verbose Verbose output during command execution. If specified, may or may not produce additional output. (default: off) Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/journey-describe.test.js.snap b/test/client_cli/en/__snapshots__/journey-describe.test.js.snap index 2be83270d..061f123b7 100644 --- a/test/client_cli/en/__snapshots__/journey-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/journey-describe.test.js.snap @@ -8,95 +8,36 @@ journeys/trees in the realm if no -i is supplied, otherwise describe the journey/tree export file indicated by -f. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the journey export file to - describe. Ignored with -A. - -F, --output-file Name of the file to write the output to. - --flush-cache Flush token cache. - -h, --help Help - -i, --journey-id Name of a journey/tree. If specified, -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --markdown Output in markdown. - --no-cache Disable token cache for this operation. - -o, --override-version Override version. Notation: - '..' e.g. '7.2.0'. - Override detected version with any - version. This is helpful in order to - check if journeys in one environment - would be compatible running in another - environment (e.g. in preparation of - migrating from on-prem to ForgeRock - Identity Cloud. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the journey export file to describe. Ignored with -A. + -F, --output-file Name of the file to write the output to. + --flush-cache Flush token cache. + -h, --help Help + -i, --journey-id Name of a journey/tree. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --markdown Output in markdown. + --no-cache Disable token cache for this operation. + -o, --override-version Override version. Notation: '..' e.g. '7.2.0'. Override detected version with any version. This is helpful in order to check if journeys in one environment would be compatible running in another environment (e.g. in preparation of migrating from on-prem to ForgeRock Identity Cloud. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/journey-disable.test.js.snap b/test/client_cli/en/__snapshots__/journey-disable.test.js.snap index 90bbd60d2..f6e8ad37b 100644 --- a/test/client_cli/en/__snapshots__/journey-disable.test.js.snap +++ b/test/client_cli/en/__snapshots__/journey-disable.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'journey disable' should be expected english 1`] Disable journeys/trees. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --journey-id Name of a journey/tree. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --journey-id Name of a journey/tree. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/journey-enable.test.js.snap b/test/client_cli/en/__snapshots__/journey-enable.test.js.snap index c0dd964b2..f81631338 100644 --- a/test/client_cli/en/__snapshots__/journey-enable.test.js.snap +++ b/test/client_cli/en/__snapshots__/journey-enable.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'journey enable' should be expected english 1`] Enable journeys/trees. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --journey-id Name of a journey/tree. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --journey-id Name of a journey/tree. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/journey-export.test.js.snap b/test/client_cli/en/__snapshots__/journey-export.test.js.snap index c17a8d94e..74a031e15 100644 --- a/test/client_cli/en/__snapshots__/journey-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/journey-export.test.js.snap @@ -6,100 +6,39 @@ exports[`CLI help interface for 'journey export' should be expected english 1`] Export journeys/trees. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all the journeys/trees in a - realm. Ignored with -i. - -A, --all-separate Export all the journeys/trees in a realm - as separate files .json. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to write the exported - journey(s) to. Ignored with -A. - --flush-cache Flush token cache. - -h, --help Help - -i, --journey-id Name of a journey/tree. If specified, -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --no-coords Do not include the x and y coordinate - positions of the journey/tree nodes. - --no-deps Do not include any dependencies - (scripts, email templates, SAML entity - providers and circles of trust, social - identity providers, themes). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --use-string-arrays Where applicable, use string arrays to - store multi-line text (e.g. scripts). - (default: off) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all the journeys/trees in a realm. Ignored with -i. + -A, --all-separate Export all the journeys/trees in a realm as separate files .json. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to write the exported journey(s) to. Ignored with -A. + --flush-cache Flush token cache. + -h, --help Help + -i, --journey-id Name of a journey/tree. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --no-coords Do not include the x and y coordinate positions of the journey/tree nodes. + --no-deps Do not include any dependencies (scripts, email templates, SAML entity providers and circles of trust, social identity providers, themes). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --use-string-arrays Where applicable, use string arrays to store multi-line text (e.g. scripts). (default: off) + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/journey-import.test.js.snap b/test/client_cli/en/__snapshots__/journey-import.test.js.snap index 4047dc74b..e836c4468 100644 --- a/test/client_cli/en/__snapshots__/journey-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/journey-import.test.js.snap @@ -6,95 +6,37 @@ exports[`CLI help interface for 'journey import' should be expected english 1`] Import journey/tree. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all the journeys/trees from - single file. Ignored with -i. - -A, --all-separate Import all the journeys/trees from - separate files (*.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import the - journey(s) from. Ignored with -A. - --flush-cache Flush token cache. - -h, --help Help - -i, --journey-id Name of a journey/tree. If specified, -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (scripts, email templates, SAML entity - providers and circles of trust, social - identity providers, themes). - --re-uuid Generate new UUIDs for all nodes during - import. (default: off) - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all the journeys/trees from single file. Ignored with -i. + -A, --all-separate Import all the journeys/trees from separate files (*.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import the journey(s) from. Ignored with -A. + --flush-cache Flush token cache. + -h, --help Help + -i, --journey-id Name of a journey/tree. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (scripts, email templates, SAML entity providers and circles of trust, social identity providers, themes). + --re-uuid Generate new UUIDs for all nodes during import. (default: off) + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/journey-list.test.js.snap b/test/client_cli/en/__snapshots__/journey-list.test.js.snap index e9579d4e2..66d1339c1 100644 --- a/test/client_cli/en/__snapshots__/journey-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/journey-list.test.js.snap @@ -6,82 +6,33 @@ exports[`CLI help interface for 'journey list' should be expected english 1`] = List journeys/trees. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --analyze Analyze journeys for custom nodes. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --analyze Analyze journeys for custom nodes. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/journey-prune.test.js.snap b/test/client_cli/en/__snapshots__/journey-prune.test.js.snap index 7e657abbc..3b24af1bb 100644 --- a/test/client_cli/en/__snapshots__/journey-prune.test.js.snap +++ b/test/client_cli/en/__snapshots__/journey-prune.test.js.snap @@ -8,80 +8,31 @@ authentication trees. You will be prompted before any destructive operations are performed. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/log-fetch.test.js.snap b/test/client_cli/en/__snapshots__/log-fetch.test.js.snap index 378545575..1681d2457 100644 --- a/test/client_cli/en/__snapshots__/log-fetch.test.js.snap +++ b/test/client_cli/en/__snapshots__/log-fetch.test.js.snap @@ -8,102 +8,43 @@ WARNING: depending on filters and time period specified, this could take substantial time to complete. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -b, --begin-timestamp Begin timestamp for period (in ISO8601, - example: "2022-10-13T19:06:28Z", or - "2022-09.30". Cannot be more than 30 - days in the past. If not specified, logs - from one hour ago are fetched (-e is - ignored) - -c, --sources Comma separated list of log sources - (default: Log everything) - --curlirize Output all network calls in curl format. - -d, --defaults Use default logging noise filters - (default: Use custom logging noise - filters defined in - $HOME/LoggingNoiseFilter.json) - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -e, --end-timestamp End timestamp for period. Default: "now" - -f, --query-filter Filter using a query expression - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --level Set log level filter. You can specify - the level as a number or a string. - Following values are possible (values on - the same line are equivalent): - 0, SEVERE, FATAL, or ERROR - 1, WARNING, WARN or CONFIG - 2, INFO or INFORMATION - 3, DEBUG, FINE, FINER or FINEST - 4 or ALL (default: ALL) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - -s, --search-string Filter by a specific string (ANDed with - transactionID filter) - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -t, --transaction-id Filter by transactionId - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -b, --begin-timestamp Begin timestamp for period (in ISO8601, example: "2022-10-13T19:06:28Z", or "2022-09.30". Cannot be more than 30 days in the past. If not specified, logs from one hour ago are fetched (-e is ignored) + -c, --sources Comma separated list of log sources (default: Log everything) + --curlirize Output all network calls in curl format. + -d, --defaults Use default logging noise filters (default: Use custom logging noise filters defined in $HOME/LoggingNoiseFilter.json) + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -e, --end-timestamp End timestamp for period. Default: "now" + -f, --query-filter Filter using a query expression + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --level Set log level filter. You can specify the level as a number or a string. Following values are possible (values on the same line are equivalent): + 0, SEVERE, FATAL, or ERROR + 1, WARNING, WARN or CONFIG + 2, INFO or INFORMATION + 3, DEBUG, FINE, FINER or FINEST + 4 or ALL (default: ALL) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + -s, --search-string Filter by a specific string (ANDed with transactionID filter) + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + -t, --transaction-id Filter by transactionId + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. @@ -136,102 +77,43 @@ WARNING: depending on filters and time period specified, this could take substantial time to complete. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -b, --begin-timestamp Begin timestamp for period (in ISO8601, - example: "2022-10-13T19:06:28Z", or - "2022-09.30". Cannot be more than 30 - days in the past. If not specified, logs - from one hour ago are fetched (-e is - ignored) - -c, --sources Comma separated list of log sources - (default: Log everything) - --curlirize Output all network calls in curl format. - -d, --defaults Use default logging noise filters - (default: Use custom logging noise - filters defined in - $HOME/LoggingNoiseFilter.json) - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -e, --end-timestamp End timestamp for period. Default: "now" - -f, --query-filter Filter using a query expression - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --level Set log level filter. You can specify - the level as a number or a string. - Following values are possible (values on - the same line are equivalent): - 0, SEVERE, FATAL, or ERROR - 1, WARNING, WARN or CONFIG - 2, INFO or INFORMATION - 3, DEBUG, FINE, FINER or FINEST - 4 or ALL (default: ALL) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - -s, --search-string Filter by a specific string (ANDed with - transactionID filter) - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -t, --transaction-id Filter by transactionId - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -b, --begin-timestamp Begin timestamp for period (in ISO8601, example: "2022-10-13T19:06:28Z", or "2022-09.30". Cannot be more than 30 days in the past. If not specified, logs from one hour ago are fetched (-e is ignored) + -c, --sources Comma separated list of log sources (default: Log everything) + --curlirize Output all network calls in curl format. + -d, --defaults Use default logging noise filters (default: Use custom logging noise filters defined in $HOME/LoggingNoiseFilter.json) + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -e, --end-timestamp End timestamp for period. Default: "now" + -f, --query-filter Filter using a query expression + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --level Set log level filter. You can specify the level as a number or a string. Following values are possible (values on the same line are equivalent): + 0, SEVERE, FATAL, or ERROR + 1, WARNING, WARN or CONFIG + 2, INFO or INFORMATION + 3, DEBUG, FINE, FINER or FINEST + 4 or ALL (default: ALL) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + -s, --search-string Filter by a specific string (ANDed with transactionID filter) + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + -t, --transaction-id Filter by transactionId + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/log-list.test.js.snap b/test/client_cli/en/__snapshots__/log-list.test.js.snap index b869cc629..1e039ff0b 100644 --- a/test/client_cli/en/__snapshots__/log-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/log-list.test.js.snap @@ -6,76 +6,30 @@ exports[`CLI help interface for 'log list' should be expected english 1`] = ` List available ID Cloud log sources. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. @@ -106,76 +60,30 @@ exports[`CLI help interface for 'logs list' should be expected english 1`] = ` List available ID Cloud log sources. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/log-tail.test.js.snap b/test/client_cli/en/__snapshots__/log-tail.test.js.snap index 1385dd60e..c29628176 100644 --- a/test/client_cli/en/__snapshots__/log-tail.test.js.snap +++ b/test/client_cli/en/__snapshots__/log-tail.test.js.snap @@ -6,92 +6,39 @@ exports[`CLI help interface for 'log tail' should be expected english 1`] = ` Tail Identity Cloud logs. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -c, --sources Comma separated list of log sources - (default: Log everything) - --curlirize Output all network calls in curl format. - -d, --defaults Use default logging noise filters - (default: Use custom logging noise - filters defined in - $HOME/LoggingNoiseFilter.json) - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --level Set log level filter. You can specify - the level as a number or a string. - Following values are possible (values on - the same line are equivalent): - 0, SEVERE, FATAL, or ERROR - 1, WARNING, WARN or CONFIG - 2, INFO or INFORMATION - 3, DEBUG, FINE, FINER or FINEST - 4 or ALL (default: ALL) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -t, --transaction-id Filter by transactionId - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -c, --sources Comma separated list of log sources (default: Log everything) + --curlirize Output all network calls in curl format. + -d, --defaults Use default logging noise filters (default: Use custom logging noise filters defined in $HOME/LoggingNoiseFilter.json) + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --level Set log level filter. You can specify the level as a number or a string. Following values are possible (values on the same line are equivalent): + 0, SEVERE, FATAL, or ERROR + 1, WARNING, WARN or CONFIG + 2, INFO or INFORMATION + 3, DEBUG, FINE, FINER or FINEST + 4 or ALL (default: ALL) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + -t, --transaction-id Filter by transactionId + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. @@ -122,92 +69,39 @@ exports[`CLI help interface for 'logs tail' should be expected english 1`] = ` Tail Identity Cloud logs. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -c, --sources Comma separated list of log sources - (default: Log everything) - --curlirize Output all network calls in curl format. - -d, --defaults Use default logging noise filters - (default: Use custom logging noise - filters defined in - $HOME/LoggingNoiseFilter.json) - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --level Set log level filter. You can specify - the level as a number or a string. - Following values are possible (values on - the same line are equivalent): - 0, SEVERE, FATAL, or ERROR - 1, WARNING, WARN or CONFIG - 2, INFO or INFORMATION - 3, DEBUG, FINE, FINER or FINEST - 4 or ALL (default: ALL) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -t, --transaction-id Filter by transactionId - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -c, --sources Comma separated list of log sources (default: Log everything) + --curlirize Output all network calls in curl format. + -d, --defaults Use default logging noise filters (default: Use custom logging noise filters defined in $HOME/LoggingNoiseFilter.json) + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --level Set log level filter. You can specify the level as a number or a string. Following values are possible (values on the same line are equivalent): + 0, SEVERE, FATAL, or ERROR + 1, WARNING, WARN or CONFIG + 2, INFO or INFORMATION + 3, DEBUG, FINE, FINER or FINEST + 4 or ALL (default: ALL) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + -t, --transaction-id Filter by transactionId + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/mapping-delete.test.js.snap b/test/client_cli/en/__snapshots__/mapping-delete.test.js.snap index 0711bcf73..043e036e3 100644 --- a/test/client_cli/en/__snapshots__/mapping-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/mapping-delete.test.js.snap @@ -33,6 +33,7 @@ Options: --sa-id Service account id. --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. -t, --managed-object-type Managed object type. If specified, limits mappings to that particular managed object type. Ignored with -i. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: diff --git a/test/client_cli/en/__snapshots__/mapping-export.test.js.snap b/test/client_cli/en/__snapshots__/mapping-export.test.js.snap index 065a57e9d..cc4d6bd65 100644 --- a/test/client_cli/en/__snapshots__/mapping-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/mapping-export.test.js.snap @@ -37,6 +37,7 @@ Options: --sa-id Service account id. --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. -t, --managed-object-type Managed object type. If specified, limits mappings to that particular managed object type. Ignored with -i. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". --use-string-arrays Where applicable, use string arrays to store multi-line text (e.g. scripts). (default: off) --verbose Verbose output during command execution. If specified, may or may not produce additional output. diff --git a/test/client_cli/en/__snapshots__/mapping-import.test.js.snap b/test/client_cli/en/__snapshots__/mapping-import.test.js.snap index c83159977..991078497 100644 --- a/test/client_cli/en/__snapshots__/mapping-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/mapping-import.test.js.snap @@ -6,91 +6,36 @@ exports[`CLI help interface for 'mapping import' should be expected english 1`] Import IDM mappings. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all mappings from single file. - Ignored with -i. - -A, --all-separate Import all mappings from separate files - (*.sync.json or *.mapping.json) in the - current directory. Ignored with -i and - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import - --flush-cache Flush token cache. - -h, --help Help - -i, --mapping-id Mapping id. If specified, only one - mapping is imported and the options -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all mappings from single file. Ignored with -i. + -A, --all-separate Import all mappings from separate files (*.sync.json or *.mapping.json) in the current directory. Ignored with -i and -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import + --flush-cache Flush token cache. + -h, --help Help + -i, --mapping-id Mapping id. If specified, only one mapping is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/mapping-list.test.js.snap b/test/client_cli/en/__snapshots__/mapping-list.test.js.snap index fa6581dab..21385865a 100644 --- a/test/client_cli/en/__snapshots__/mapping-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/mapping-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'mapping list' should be expected english 1`] = List IDM mappings. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/mapping-rename.test.js.snap b/test/client_cli/en/__snapshots__/mapping-rename.test.js.snap index 8450139b9..a1efea446 100644 --- a/test/client_cli/en/__snapshots__/mapping-rename.test.js.snap +++ b/test/client_cli/en/__snapshots__/mapping-rename.test.js.snap @@ -8,92 +8,34 @@ to the separate/new naming scheme (mapping/). To rename mappings from new back to legacy, use the -l, --legacy flag. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Rename all mappings. Ignored with -i. - Ordering is preserved through this - renaming process, according to the order - of the mappings before renaming. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --mapping-id Mapping id/name. If specified, -a is - ignored. The mapping's order is lost - through renaming, and relies on the - default ordering of wherever it ends up - (usually that means it ends up last in - sync order) - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --legacy Rename all mappings from the new naming - scheme back to the legacy naming scheme. - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Rename all mappings. Ignored with -i. Ordering is preserved through this renaming process, according to the order of the mappings before renaming. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --mapping-id Mapping id/name. If specified, -a is ignored. The mapping's order is lost through renaming, and relies on the default ordering of wherever it ends up (usually that means it ends up last in sync order) + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --legacy Rename all mappings from the new naming scheme back to the legacy naming scheme. + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/oauth-client-delete.test.js.snap b/test/client_cli/en/__snapshots__/oauth-client-delete.test.js.snap index f4643f35a..6eeb923d7 100644 --- a/test/client_cli/en/__snapshots__/oauth-client-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/oauth-client-delete.test.js.snap @@ -6,86 +6,34 @@ exports[`CLI help interface for 'oauth client delete' should be expected english Delete OAuth2 clients. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all cmds in a realm. Ignored with - -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --app-id OAuth2 client id/name. If specified, -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deep No deep delete. This leaves orphaned - configuration artifacts behind. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all cmds in a realm. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --app-id OAuth2 client id/name. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deep No deep delete. This leaves orphaned configuration artifacts behind. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/oauth-client-export.test.js.snap b/test/client_cli/en/__snapshots__/oauth-client-export.test.js.snap index 10e8aa7f7..d63c7bf92 100644 --- a/test/client_cli/en/__snapshots__/oauth-client-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/oauth-client-export.test.js.snap @@ -6,92 +6,37 @@ exports[`CLI help interface for 'oauth client export' should be expected english Export OAuth2 clients. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all OAuth2 apps to a single file. - Ignored with -i. - -A, --all-separate Export all OAuth2 apps to separate files - (*.oauth2.app.json) in the current - directory. Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --app-id App id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (scripts). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all OAuth2 apps to a single file. Ignored with -i. + -A, --all-separate Export all OAuth2 apps to separate files (*.oauth2.app.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --app-id App id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (scripts). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/oauth-client-import.test.js.snap b/test/client_cli/en/__snapshots__/oauth-client-import.test.js.snap index 0439dc5a6..620ba30e9 100644 --- a/test/client_cli/en/__snapshots__/oauth-client-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/oauth-client-import.test.js.snap @@ -6,91 +6,36 @@ exports[`CLI help interface for 'oauth client import' should be expected english Import OAuth2 clients. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all clients from single file. - Ignored with -i. - -A, --all-separate Import all clients from separate files - (*.app.json) in the current directory. - Ignored with -i or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --app-id Client id. If specified, only one client - is imported and the options -a and -A - are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (scripts). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all clients from single file. Ignored with -i. + -A, --all-separate Import all clients from separate files (*.app.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --app-id Client id. If specified, only one client is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (scripts). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/oauth-client-list.test.js.snap b/test/client_cli/en/__snapshots__/oauth-client-list.test.js.snap index de5402261..fbbe52cbd 100644 --- a/test/client_cli/en/__snapshots__/oauth-client-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/oauth-client-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'oauth client list' should be expected english 1 List OAuth2 clients. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/promote.test.js.snap b/test/client_cli/en/__snapshots__/promote.test.js.snap index 2f5865035..74fedd8b6 100644 --- a/test/client_cli/en/__snapshots__/promote.test.js.snap +++ b/test/client_cli/en/__snapshots__/promote.test.js.snap @@ -6,106 +6,40 @@ exports[`CLI help interface for 'app' should be expected english 1`] = ` Prepares a tenant to be promoted Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -E, --frodo-export-dir The directory where the frodo export is - located. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -M, --master-dir The directory where the master - configurations is located. - --no-cache Disable token cache for this operation. - --no-prune Will stop prune from running - -P --print-diff Outputs the diff to a file in the - directory where the command was run. - (default: false) - --propmt-prune Will prompt for Frodo Journey Prune on - all realms (default: false) - -S --effect-secrets Will effect the secrets, otherwise we - will not change the secrets but will - compare them (default: false) - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --target Host URL of the environment to perform - secret value encryption. The URL must - resolve to an existing connection - profile. Use this option to generate an - export that can be imported into the - target environment without requiring - admin access to the source environment. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. - -W --wait-secrets When secrets are effected we need to run - a refresh on the enviornment. This will - cause the command to wait until the - refresh is finished. (default: false) - --what-if Runs a what if of the comparison, so it - wont do any changes (default: false) + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -E, --frodo-export-dir The directory where the frodo export is located. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -M, --master-dir The directory where the master configurations is located. + --no-cache Disable token cache for this operation. + --no-prune Will stop prune from running + -P --print-diff Outputs the diff to a file in the directory where the command was run. (default: false) + --propmt-prune Will prompt for Frodo Journey Prune on all realms (default: false) + -S --effect-secrets Will effect the secrets, otherwise we will not change the secrets but will compare them (default: false) + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --target Host URL of the environment to perform secret value encryption. The URL must resolve to an existing connection profile. Use this option to generate an export that can be imported into the target environment without requiring admin access to the source environment. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. + -W --wait-secrets When secrets are effected we need to run a refresh on the enviornment. This will cause the command to wait until the refresh is finished. (default: false) + --what-if Runs a what if of the comparison, so it wont do any changes (default: false) Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/realm-add-custom-domain.test.js.snap b/test/client_cli/en/__snapshots__/realm-add-custom-domain.test.js.snap index 0fda55a2e..035d6c23a 100644 --- a/test/client_cli/en/__snapshots__/realm-add-custom-domain.test.js.snap +++ b/test/client_cli/en/__snapshots__/realm-add-custom-domain.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'realm add-custom-domain' should be expected eng Add custom domain (realm DNS alias). Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -d, --domain Custom DNS domain name. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -d, --domain Custom DNS domain name. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/realm-describe.test.js.snap b/test/client_cli/en/__snapshots__/realm-describe.test.js.snap index 05ef9d0d8..f960d8a7c 100644 --- a/test/client_cli/en/__snapshots__/realm-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/realm-describe.test.js.snap @@ -6,80 +6,31 @@ exports[`CLI help interface for 'realm describe' should be expected english 1`] Describe realms. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/realm-export.test.js.snap b/test/client_cli/en/__snapshots__/realm-export.test.js.snap index b59a2ef07..b85a59bd1 100644 --- a/test/client_cli/en/__snapshots__/realm-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/realm-export.test.js.snap @@ -6,92 +6,37 @@ exports[`CLI help interface for 'realm export' should be expected english 1`] = Export realms. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all realms to a single file. - Ignored with -i or -n. - -A, --all-separate Export all realms to separate files - (*.realm.json) in the current directory. - Ignored with -i, -n, or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --realm-id Realm id. If specified, -n, -a, and -A - are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --realm-name Realm name. If specified, -a and -A are - ignored. - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all realms to a single file. Ignored with -i or -n. + -A, --all-separate Export all realms to separate files (*.realm.json) in the current directory. Ignored with -i, -n, or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --realm-id Realm id. If specified, -n, -a, and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --realm-name Realm name. If specified, -a and -A are ignored. + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/realm-import.test.js.snap b/test/client_cli/en/__snapshots__/realm-import.test.js.snap index 686b58f2b..dc9ac46fc 100644 --- a/test/client_cli/en/__snapshots__/realm-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/realm-import.test.js.snap @@ -6,92 +6,36 @@ exports[`CLI help interface for 'realm import' should be expected english 1`] = Import realms. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all realms from single file. - Ignored with -i or -n. - -A, --all-separate Import all realms from separate files - (*.realm.json) in the current directory. - Ignored with -i, -n, or -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --realm-id Realm id. If specified, only one realm - is imported and the options -n, -a, and - -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --realm-name Realm name. If specified, only one realm - is imported and the options -a and -A - are ignored. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all realms from single file. Ignored with -i or -n. + -A, --all-separate Import all realms from separate files (*.realm.json) in the current directory. Ignored with -i, -n, or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --realm-id Realm id. If specified, only one realm is imported and the options -n, -a, and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --realm-name Realm name. If specified, only one realm is imported and the options -a and -A are ignored. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/realm-list.test.js.snap b/test/client_cli/en/__snapshots__/realm-list.test.js.snap index a1effb3ea..0431dc6ac 100644 --- a/test/client_cli/en/__snapshots__/realm-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/realm-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'realm list' should be expected english 1`] = ` List realms. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/realm-remove-custom-domain.test.js.snap b/test/client_cli/en/__snapshots__/realm-remove-custom-domain.test.js.snap index e3af3148b..2bfe231ac 100644 --- a/test/client_cli/en/__snapshots__/realm-remove-custom-domain.test.js.snap +++ b/test/client_cli/en/__snapshots__/realm-remove-custom-domain.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'realm remove-custom-domain' should be expected Remove custom domain (realm DNS alias). Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -d, --domain Custom DNS domain name. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -d, --domain Custom DNS domain name. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/role-export.test.js.snap b/test/client_cli/en/__snapshots__/role-export.test.js.snap index 6a59049ee..f71442353 100644 --- a/test/client_cli/en/__snapshots__/role-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/role-export.test.js.snap @@ -6,95 +6,37 @@ exports[`CLI help interface for 'role export' should be expected english 1`] = ` Export internal roles. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all internal roles to a single - file. Ignored with -i. - -A, --all-separate Export all internal roles to separate - files (*.internalRole.json) in the - current directory. Ignored with -i or - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --role-id Internal role id. If specified, only one - internal role is exported and the - options -n, -a and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --role-name Internal role name. If specified, only - one internal role is exported and the - options -a and -A are ignored. - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all internal roles to a single file. Ignored with -i. + -A, --all-separate Export all internal roles to separate files (*.internalRole.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the export file. + --flush-cache Flush token cache. + -h, --help Help + -i, --role-id Internal role id. If specified, only one internal role is exported and the options -n, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --role-name Internal role name. If specified, only one internal role is exported and the options -a and -A are ignored. + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/role-import.test.js.snap b/test/client_cli/en/__snapshots__/role-import.test.js.snap index 67196159f..9307d9025 100644 --- a/test/client_cli/en/__snapshots__/role-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/role-import.test.js.snap @@ -6,93 +6,36 @@ exports[`CLI help interface for 'role import' should be expected english 1`] = ` Import internal roles. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all internal roles from single - file. Ignored with -i. - -A, --all-separate Import all internal roles from separate - files (*.internalRole.json) in the - current directory. Ignored with -i or - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import. - --flush-cache Flush token cache. - -h, --help Help - -i, --role-id Internal role id. If specified, only one - internal role is imported and the - options -n, -a and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --role-name Internal role name. If specified, only - one internal role is imported and the - options -a and -A are ignored. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all internal roles from single file. Ignored with -i. + -A, --all-separate Import all internal roles from separate files (*.internalRole.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import. + --flush-cache Flush token cache. + -h, --help Help + -i, --role-id Internal role id. If specified, only one internal role is imported and the options -n, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --role-name Internal role name. If specified, only one internal role is imported and the options -a and -A are ignored. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/role-list.test.js.snap b/test/client_cli/en/__snapshots__/role-list.test.js.snap index e97092410..9d02eb9af 100644 --- a/test/client_cli/en/__snapshots__/role-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/role-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'role list' should be expected english 1`] = ` List roles. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/saml-cot-export.test.js.snap b/test/client_cli/en/__snapshots__/saml-cot-export.test.js.snap index 0d46a2a79..9b776c778 100644 --- a/test/client_cli/en/__snapshots__/saml-cot-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/saml-cot-export.test.js.snap @@ -6,92 +6,36 @@ exports[`CLI help interface for 'saml cot export' should be expected english 1`] Export SAML circles of trust. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all the circles of trust in a - realm to a single file. Ignored with -i. - -A, --all-separate Export all the circles of trust in a - realm as separate files - .cot.saml.json. Ignored with -i, - and -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Name of the export file. Ignored with - -A. Defaults to .cot.saml.json. - --flush-cache Flush token cache. - -h, --help Help - -i, --cot-id Circle of trust id/name. If specified, - -a and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all the circles of trust in a realm to a single file. Ignored with -i. + -A, --all-separate Export all the circles of trust in a realm as separate files .cot.saml.json. Ignored with -i, and -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Name of the export file. Ignored with -A. Defaults to .cot.saml.json. + --flush-cache Flush token cache. + -h, --help Help + -i, --cot-id Circle of trust id/name. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/saml-cot-import.test.js.snap b/test/client_cli/en/__snapshots__/saml-cot-import.test.js.snap index dc88c059e..606e619de 100644 --- a/test/client_cli/en/__snapshots__/saml-cot-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/saml-cot-import.test.js.snap @@ -6,91 +6,35 @@ exports[`CLI help interface for 'saml cot import' should be expected english 1`] Import SAML circles of trust. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all circles of trust from single - file. Ignored with -i. - -A, --all-separate Import all circles of trust from - separate files (*.cot.saml.json) in the - current directory. Ignored with -i or - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import the circle(s) - of trust from. - --flush-cache Flush token cache. - -h, --help Help - -i, --cot-id Circle of trust id. If specified, only - one circle of trust is imported and the - options -a and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all circles of trust from single file. Ignored with -i. + -A, --all-separate Import all circles of trust from separate files (*.cot.saml.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import the circle(s) of trust from. + --flush-cache Flush token cache. + -h, --help Help + -i, --cot-id Circle of trust id. If specified, only one circle of trust is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/saml-cot-list.test.js.snap b/test/client_cli/en/__snapshots__/saml-cot-list.test.js.snap index 86559f430..20e49f863 100644 --- a/test/client_cli/en/__snapshots__/saml-cot-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/saml-cot-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'saml cot list' should be expected english 1`] = List SAML circles of trust. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/saml-delete.test.js.snap b/test/client_cli/en/__snapshots__/saml-delete.test.js.snap index 0b4754f19..750693310 100644 --- a/test/client_cli/en/__snapshots__/saml-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/saml-delete.test.js.snap @@ -6,83 +6,33 @@ exports[`CLI help interface for 'saml delete' should be expected english 1`] = ` Delete SAML entity providers. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all entity providers. Ignored - with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --entity-id Entity id. If specified, -a is ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all entity providers. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --entity-id Entity id. If specified, -a is ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/saml-describe.test.js.snap b/test/client_cli/en/__snapshots__/saml-describe.test.js.snap index 5623e1014..71ef63c84 100644 --- a/test/client_cli/en/__snapshots__/saml-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/saml-describe.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'saml describe' should be expected english 1`] = Describe the configuration of an entity provider. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --entity-id Entity id. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --entity-id Entity id. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/saml-export.test.js.snap b/test/client_cli/en/__snapshots__/saml-export.test.js.snap index 5056f3887..2dc1a0bc3 100644 --- a/test/client_cli/en/__snapshots__/saml-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/saml-export.test.js.snap @@ -6,96 +6,37 @@ exports[`CLI help interface for 'saml export' should be expected english 1`] = ` Export SAML entity providers. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all the providers in a realm to a - single file. Ignored with -t and -i. - -A, --all-separate Export all the providers in a realm as - separate files .saml.json. Ignored with -t, -i, - and -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Name of the file to write the exported - provider(s) to. Ignored with -A. If not - specified, the export file is named - .saml.json. - --flush-cache Flush token cache. - -h, --help Help - -i, --entity-id Entity id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (scripts). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Export all the providers in a realm to a single file. Ignored with -t and -i. + -A, --all-separate Export all the providers in a realm as separate files .saml.json. Ignored with -t, -i, and -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Name of the file to write the exported provider(s) to. Ignored with -A. If not specified, the export file is named .saml.json. + --flush-cache Flush token cache. + -h, --help Help + -i, --entity-id Entity id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -N, --no-metadata Does not include metadata in the export file. + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (scripts). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/saml-import.test.js.snap b/test/client_cli/en/__snapshots__/saml-import.test.js.snap index b1192f2ef..00de69dbd 100644 --- a/test/client_cli/en/__snapshots__/saml-import.test.js.snap +++ b/test/client_cli/en/__snapshots__/saml-import.test.js.snap @@ -6,93 +6,36 @@ exports[`CLI help interface for 'saml import' should be expected english 1`] = ` Import SAML entity providers. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Import all entity providers from single - file. Ignored with -i. - -A, --all-separate Import all entity providers from - separate files (*.saml.json) in the - current directory. Ignored with -i or - -a. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the file to import the entity - provider(s) from. - --flush-cache Flush token cache. - -h, --help Help - -i, --entity-id Entity id. If specified, only one - provider is imported and the options -a - and -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --no-deps Do not include any dependencies - (scripts). - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Import all entity providers from single file. Ignored with -i. + -A, --all-separate Import all entity providers from separate files (*.saml.json) in the current directory. Ignored with -i or -a. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file Name of the file to import the entity provider(s) from. + --flush-cache Flush token cache. + -h, --help Help + -i, --entity-id Entity id. If specified, only one provider is imported and the options -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --no-deps Do not include any dependencies (scripts). + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/saml-list.test.js.snap b/test/client_cli/en/__snapshots__/saml-list.test.js.snap index 5b944cc3f..8989638f8 100644 --- a/test/client_cli/en/__snapshots__/saml-list.test.js.snap +++ b/test/client_cli/en/__snapshots__/saml-list.test.js.snap @@ -6,81 +6,32 @@ exports[`CLI help interface for 'saml list' should be expected english 1`] = ` List SAML entity providers. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - -l, --long Long with all fields. (default: false) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + -l, --long Long with all fields. (default: false) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/saml-metadata-export.test.js.snap b/test/client_cli/en/__snapshots__/saml-metadata-export.test.js.snap index c19a1d519..a7dcd61d4 100644 --- a/test/client_cli/en/__snapshots__/saml-metadata-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/saml-metadata-export.test.js.snap @@ -6,86 +6,33 @@ exports[`CLI help interface for 'saml metadata export' should be expected englis Export metadata. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Name of the file to write the exported - metadata to. Ignored with -A. If not - specified, the export file is named - .metadata.xml. - --flush-cache Flush token cache. - -h, --help Help - -i, --entity-id Entity id. If specified, -a and -A are - ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Name of the file to write the exported metadata to. Ignored with -A. If not specified, the export file is named .metadata.xml. + --flush-cache Flush token cache. + -h, --help Help + -i, --entity-id Entity id. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/script-delete.test.js.snap b/test/client_cli/en/__snapshots__/script-delete.test.js.snap index 182e76faf..88f0811ef 100644 --- a/test/client_cli/en/__snapshots__/script-delete.test.js.snap +++ b/test/client_cli/en/__snapshots__/script-delete.test.js.snap @@ -6,86 +6,34 @@ exports[`CLI help interface for 'script delete' should be expected english 1`] = Delete scripts. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Delete all non-default scripts in a - realm. Ignored with -i. - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - --flush-cache Flush token cache. - -h, --help Help - -i, --script-id Uuid of the script. If specified, -a and - -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --script-name Name of the script. If specified, -a and - -A are ignored. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + -a, --all Delete all non-default scripts in a realm. Ignored with -i. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + --flush-cache Flush token cache. + -h, --help Help + -i, --script-id Uuid of the script. If specified, -a and -A are ignored. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --script-name Name of the script. If specified, -a and -A are ignored. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/script-describe.test.js.snap b/test/client_cli/en/__snapshots__/script-describe.test.js.snap index a7a5432a4..ebe704bcd 100644 --- a/test/client_cli/en/__snapshots__/script-describe.test.js.snap +++ b/test/client_cli/en/__snapshots__/script-describe.test.js.snap @@ -6,97 +6,36 @@ exports[`CLI help interface for 'script describe' should be expected english 1`] Describe script. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - --curlirize Output all network calls in curl format. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file [file] Optional export file to use to determine - usage. Overrides -D, --directory. Only - used if -u or --usage is provided as - well. - --flush-cache Flush token cache. - -h, --help Help - -i, --script-id Uuid of the script. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - --json Output in JSON format. - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --script-name Name of the script. - --no-cache Disable token cache for this operation. - --sa-id Service account id. - --sa-jwk-file File containing the JSON Web Key (JWK) - associated with the the service account. - -u, --usage List all uses of the script. If a file - is provided with -f or --file, it will - search for usage in the file. If a - directory is provided with -D or - --directory, it will search for usage in - all .json files in the directory and - sub-directories. If no file or directory - is provided, it will perform a full - export automatically to determine usage. - (default: false) - --verbose Verbose output during command execution. - If specified, may or may not produce - additional output. + --curlirize Output all network calls in curl format. + -D, --directory Set the working directory. + --debug Debug output during command execution. If specified, may or may not produce additional output helpful for troubleshooting. + -f, --file [file] Optional export file to use to determine usage. Overrides -D, --directory. Only used if -u or --usage is provided as well. + --flush-cache Flush token cache. + -h, --help Help + -i, --script-id Uuid of the script. + --idm-host IDM base URL, e.g.: https://cdk.idm.example.com/myidm. Use only if your IDM installation resides in a different domain and/or if the base path differs from the default "/openidm". + --json Output in JSON format. + -k, --insecure Allow insecure connections when using SSL/TLS. Has no effect when using a network proxy for https (HTTPS_PROXY=http://:), in that case the proxy must provide this capability. (default: Don't allow insecure connections) + --login-client-id Specify a custom OAuth2 client id to use a your own oauth2 client for IDM API calls in deployments of type "cloud" or "forgeops". Your custom client must be configured as a public client and allow the authorization code grant using the "openid fr:idm:*" scope. Use the "--redirect-uri" parameter if you have configured a custom redirect uri (default: "/platform/appAuthHelperRedirect.html"). + --login-redirect-uri Specify a custom redirect URI to use with your custom OAuth2 client (efault: "/platform/appAuthHelperRedirect.html"). + -m, --type Override auto-detected deployment type. Valid values for type: + classic: A classic Access Management-only deployment with custom layout and configuration. + cloud: A ForgeRock Identity Cloud environment. + forgeops: A ForgeOps CDK or CDM deployment. + The detected or provided deployment type controls certain behavior like obtaining an Identity Management admin token or not and whether to export/import referenced email templates or how to walk through the tenant admin login flow of Identity Cloud and handle MFA (choices: "classic", "cloud", "forgeops") + -n, --script-name Name of the script. + --no-cache Disable token cache for this operation. + --sa-id Service account id. + --sa-jwk-file File containing the JSON Web Key (JWK) associated with the the service account. + -u, --usage List all uses of the script. If a file is provided with -f or --file, it will search for usage in the file. If a directory is provided with -D or --directory, it will search for usage in all .json files in the directory and sub-directories. If no file or directory is provided, it will perform a full export automatically to determine usage. (default: false) + --use-realm-prefix-on-managed-objects Set to true if you want to use the realm name as a prefix on managed object configuration, e.g. managed/alpha_user, managed/alpha_application or managed/bravo_organization. When false, the default behaviour of using managed/user etc. is retained. This option is ignored when the deployment type is "cloud". + --verbose Verbose output during command execution. If specified, may or may not produce additional output. Environment Variables: FRODO_HOST: AM base URL. Overridden by 'host' argument. diff --git a/test/client_cli/en/__snapshots__/script-export.test.js.snap b/test/client_cli/en/__snapshots__/script-export.test.js.snap index fd16724a3..f73b4a8db 100644 --- a/test/client_cli/en/__snapshots__/script-export.test.js.snap +++ b/test/client_cli/en/__snapshots__/script-export.test.js.snap @@ -6,102 +6,41 @@ exports[`CLI help interface for 'script export' should be expected english 1`] = Export scripts. Arguments: - host AM base URL, e.g.: - https://cdk.iam.example.com/am. To use a - connection profile, just specify a - unique substring. - realm Realm. Specify realm as '/' for the root - realm or 'realm' or '/parent/child' - otherwise. (default: "alpha" for - Identity Cloud tenants, "/" otherwise.) - username Username to login with. Must be an admin - user with appropriate rights to manage - authentication journeys/trees. - password Password. + host AM base URL, e.g.: https://cdk.iam.example.com/am. To use a connection profile, just specify a unique substring. + realm Realm. Specify realm as '/' for the root realm or 'realm' or '/parent/child' otherwise. (default: "alpha" for Identity Cloud tenants, "/" otherwise.) + username Username to login with. Must be an admin user with appropriate rights to manage authentication journeys/trees. + password Password. Options: - -a, --all Export all scripts to a single file. - Ignored with -n. - -A, --all-separate Export all scripts to separate files - (*.script.json) in the current - directory. Ignored with -n or -a. - --curlirize Output all network calls in curl format. - -d, --default Export all scripts including the default - scripts. Ignored with -n. - -D, --directory Set the working directory. - --debug Debug output during command execution. - If specified, may or may not produce - additional output helpful for - troubleshooting. - -f, --file Name of the export file. - --flush-cache Flush token cache. - -h, --help Help - -i, --script-id Uuid of the script. If specified, -a and - -A are ignored. - --idm-host IDM base URL, e.g.: - https://cdk.idm.example.com/myidm. Use - only if your IDM installation resides in - a different domain and/or if the base - path differs from the default - "/openidm". - -k, --insecure Allow insecure connections when using - SSL/TLS. Has no effect when using a - network proxy for https - (HTTPS_PROXY=http://:), in - that case the proxy must provide this - capability. (default: Don't allow - insecure connections) - --login-client-id Specify a custom OAuth2 client id to use - a your own oauth2 client for IDM API - calls in deployments of type "cloud" or - "forgeops". Your custom client must be - configured as a public client and allow - the authorization code grant using the - "openid fr:idm:*" scope. Use the - "--redirect-uri" parameter if you have - configured a custom redirect uri - (default: - "/platform/appAuthHelperRedirect.html"). - --login-redirect-uri Specify a custom redirect URI to use - with your custom OAuth2 client (efault: - "/platform/appAuthHelperRedirect.html"). - -m, --type Override auto-detected deployment type. - Valid values for type: - classic: A classic Access - Management-only deployment with custom - layout and configuration. - cloud: A ForgeRock Identity Cloud - environment. - forgeops: A ForgeOps CDK or CDM - deployment. - The detected or provided deployment type - controls certain behavior like obtaining - an Identity Management admin token or - not and whether to export/import - referenced email templates or how to - walk through the tenant admin login flow - of Identity Cloud and handle MFA - (choices: "classic", "cloud", - "forgeops") - -n, --script-name Name of the script. If specified, -a and - -A are ignored. - -N, --no-metadata Does not include metadata in the export - file. - --no-cache Disable token cache for this operation. - --no-deps Do not include script dependencies (i.e. - library scripts). Ignored with -a and - -A. - -s, --script