modules inc
This commit is contained in:
116
node_modules/@azure/msal-node/dist/client/ClientApplication.d.ts
generated
vendored
Normal file
116
node_modules/@azure/msal-node/dist/client/ClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,116 @@
|
||||
import { ClientConfiguration, AuthenticationResult, BaseAuthRequest, Logger, ServerTelemetryManager } from "@azure/msal-common";
|
||||
import { Configuration } from "../config/Configuration";
|
||||
import { NodeStorage } from "../cache/NodeStorage";
|
||||
import { TokenCache } from "../cache/TokenCache";
|
||||
import { ClientAssertion } from "./ClientAssertion";
|
||||
import { AuthorizationUrlRequest } from "../request/AuthorizationUrlRequest";
|
||||
import { AuthorizationCodeRequest } from "../request/AuthorizationCodeRequest";
|
||||
import { RefreshTokenRequest } from "../request/RefreshTokenRequest";
|
||||
import { SilentFlowRequest } from "../request/SilentFlowRequest";
|
||||
/**
|
||||
* Base abstract class for all ClientApplications - public and confidential
|
||||
* @public
|
||||
*/
|
||||
export declare abstract class ClientApplication {
|
||||
private readonly cryptoProvider;
|
||||
private tokenCache;
|
||||
/**
|
||||
* Platform storage object
|
||||
*/
|
||||
protected storage: NodeStorage;
|
||||
/**
|
||||
* Logger object to log the application flow
|
||||
*/
|
||||
protected logger: Logger;
|
||||
/**
|
||||
* Platform configuration initialized by the application
|
||||
*/
|
||||
protected config: Configuration;
|
||||
/**
|
||||
* Client assertion passed by the user for confidential client flows
|
||||
*/
|
||||
protected clientAssertion: ClientAssertion;
|
||||
/**
|
||||
* Client secret passed by the user for confidential client flows
|
||||
*/
|
||||
protected clientSecret: string;
|
||||
/**
|
||||
* Constructor for the ClientApplication
|
||||
*/
|
||||
protected constructor(configuration: Configuration);
|
||||
/**
|
||||
* Creates the URL of the authorization request, letting the user input credentials and consent to the
|
||||
* application. The URL targets the /authorize endpoint of the authority configured in the
|
||||
* application object.
|
||||
*
|
||||
* Once the user inputs their credentials and consents, the authority will send a response to the redirect URI
|
||||
* sent in the request and should contain an authorization code, which can then be used to acquire tokens via
|
||||
* `acquireTokenByCode(AuthorizationCodeRequest)`.
|
||||
*/
|
||||
getAuthCodeUrl(request: AuthorizationUrlRequest): Promise<string>;
|
||||
/**
|
||||
* Acquires a token by exchanging the Authorization Code received from the first step of OAuth2.0
|
||||
* Authorization Code flow.
|
||||
*
|
||||
* `getAuthCodeUrl(AuthorizationCodeUrlRequest)` can be used to create the URL for the first step of OAuth2.0
|
||||
* Authorization Code flow. Ensure that values for redirectUri and scopes in AuthorizationCodeUrlRequest and
|
||||
* AuthorizationCodeRequest are the same.
|
||||
*/
|
||||
acquireTokenByCode(request: AuthorizationCodeRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Acquires a token by exchanging the refresh token provided for a new set of tokens.
|
||||
*
|
||||
* This API is provided only for scenarios where you would like to migrate from ADAL to MSAL. Otherwise, it is
|
||||
* recommended that you use `acquireTokenSilent()` for silent scenarios. When using `acquireTokenSilent()`, MSAL will
|
||||
* handle the caching and refreshing of tokens automatically.
|
||||
*/
|
||||
acquireTokenByRefreshToken(request: RefreshTokenRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Acquires a token silently when a user specifies the account the token is requested for.
|
||||
*
|
||||
* This API expects the user to provide an account object and looks into the cache to retrieve the token if present.
|
||||
* There is also an optional "forceRefresh" boolean the user can send to bypass the cache for access_token and id_token.
|
||||
* In case the refresh_token is expired or not found, an error is thrown
|
||||
* and the guidance is for the user to call any interactive token acquisition API (eg: `acquireTokenByCode()`).
|
||||
*/
|
||||
acquireTokenSilent(request: SilentFlowRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Gets the token cache for the application.
|
||||
*/
|
||||
getTokenCache(): TokenCache;
|
||||
/**
|
||||
* Returns the logger instance
|
||||
*/
|
||||
getLogger(): Logger;
|
||||
/**
|
||||
* Replaces the default logger set in configurations with new Logger with new configurations
|
||||
* @param logger - Logger instance
|
||||
*/
|
||||
setLogger(logger: Logger): void;
|
||||
/**
|
||||
* Builds the common configuration to be passed to the common component based on the platform configurarion
|
||||
* @param authority - user passed authority in configuration
|
||||
* @param serverTelemetryManager - initializes servertelemetry if passed
|
||||
*/
|
||||
protected buildOauthClientConfiguration(authority: string, serverTelemetryManager?: ServerTelemetryManager): Promise<ClientConfiguration>;
|
||||
private getClientAssertion;
|
||||
/**
|
||||
* Generates a request with the default scopes & generates a correlationId.
|
||||
* @param authRequest - BaseAuthRequest for initialization
|
||||
*/
|
||||
protected initializeBaseRequest(authRequest: Partial<BaseAuthRequest>): BaseAuthRequest;
|
||||
/**
|
||||
* Initializes the server telemetry payload
|
||||
* @param apiId - Id for a specific request
|
||||
* @param correlationId - GUID
|
||||
* @param forceRefresh - boolean to indicate network call
|
||||
*/
|
||||
protected initializeServerTelemetryManager(apiId: number, correlationId: string, forceRefresh?: boolean): ServerTelemetryManager;
|
||||
/**
|
||||
* Create authority instance. If authority not passed in request, default to authority set on the application
|
||||
* object. If no authority set in application object, then default to common authority.
|
||||
* @param authorityString - authority from user configuration
|
||||
*/
|
||||
private createAuthority;
|
||||
}
|
||||
//# sourceMappingURL=ClientApplication.d.ts.map
|
1
node_modules/@azure/msal-node/dist/client/ClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/client/ClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ClientApplication.d.ts","sourceRoot":"","sources":["../src/client/ClientApplication.ts"],"names":[],"mappings":"AAKA,OAAO,EAEH,mBAAmB,EAEnB,oBAAoB,EAGpB,eAAe,EAEf,MAAM,EACN,sBAAsB,EAUzB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,aAAa,EAAyB,MAAM,yBAAyB,CAAC;AAE/E,OAAO,EAAE,WAAW,EAAE,MAAM,sBAAsB,CAAC;AAEnD,OAAO,EAAE,UAAU,EAAE,MAAM,qBAAqB,CAAC;AACjD,OAAO,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACpD,OAAO,EAAE,uBAAuB,EAAE,MAAM,oCAAoC,CAAC;AAC7E,OAAO,EAAE,wBAAwB,EAAE,MAAM,qCAAqC,CAAC;AAC/E,OAAO,EAAE,mBAAmB,EAAE,MAAM,gCAAgC,CAAC;AACrE,OAAO,EAAE,iBAAiB,EAAE,MAAM,8BAA8B,CAAC;AAGjE;;;GAGG;AACH,8BAAsB,iBAAiB;IAEnC,OAAO,CAAC,QAAQ,CAAC,cAAc,CAAiB;IAChD,OAAO,CAAC,UAAU,CAAa;IAE/B;;OAEG;IACH,SAAS,CAAC,OAAO,EAAE,WAAW,CAAC;IAC/B;;OAEG;IACH,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC;IACzB;;OAEG;IACH,SAAS,CAAC,MAAM,EAAE,aAAa,CAAC;IAChC;;OAEG;IACH,SAAS,CAAC,eAAe,EAAE,eAAe,CAAC;IAC3C;;OAEG;IACH,SAAS,CAAC,YAAY,EAAE,MAAM,CAAC;IAE/B;;OAEG;IACH,SAAS,aAAa,aAAa,EAAE,aAAa;IAYlD;;;;;;;;OAQG;IACG,cAAc,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,MAAM,CAAC;IAkBvE;;;;;;;OAOG;IACG,kBAAkB,CAAC,OAAO,EAAE,wBAAwB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAwBjG;;;;;;OAMG;IACG,0BAA0B,CAAC,OAAO,EAAE,mBAAmB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAyBpG;;;;;;;OAOG;IACG,kBAAkB,CAAC,OAAO,EAAE,iBAAiB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAuB1F;;OAEG;IACH,aAAa,IAAI,UAAU;IAK3B;;OAEG;IACH,SAAS,IAAI,MAAM;IAInB;;;OAGG;IACH,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI;IAI/B;;;;OAIG;cACa,6BAA6B,CAAC,SAAS,EAAE,MAAM,EAAE,sBAAsB,CAAC,EAAE,sBAAsB,GAAG,OAAO,CAAC,mBAAmB,CAAC;IAqC/I,OAAO,CAAC,kBAAkB;IAO1B;;;OAGG;IACH,SAAS,CAAC,qBAAqB,CAAC,WAAW,EAAE,OAAO,CAAC,eAAe,CAAC,GAAG,eAAe;IAWvF;;;;;OAKG;IACH,SAAS,CAAC,gCAAgC,CAAC,KAAK,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,EAAE,YAAY,CAAC,EAAE,OAAO,GAAG,sBAAsB;IAWhI;;;;OAIG;YACW,eAAe;CAUhC"}
|
47
node_modules/@azure/msal-node/dist/client/ClientAssertion.d.ts
generated
vendored
Normal file
47
node_modules/@azure/msal-node/dist/client/ClientAssertion.d.ts
generated
vendored
Normal file
@@ -0,0 +1,47 @@
|
||||
import { CryptoProvider } from "../crypto/CryptoProvider";
|
||||
/**
|
||||
* Client assertion of type jwt-bearer used in confidential client flows
|
||||
* @public
|
||||
*/
|
||||
export declare class ClientAssertion {
|
||||
private jwt;
|
||||
private privateKey;
|
||||
private thumbprint;
|
||||
private expirationTime;
|
||||
private issuer;
|
||||
private jwtAudience;
|
||||
private publicCertificate;
|
||||
/**
|
||||
* Initialize the ClientAssertion class from the clientAssertion passed by the user
|
||||
* @param assertion - refer https://tools.ietf.org/html/rfc7521
|
||||
*/
|
||||
static fromAssertion(assertion: string): ClientAssertion;
|
||||
/**
|
||||
* Initialize the ClientAssertion class from the certificate passed by the user
|
||||
* @param thumbprint - identifier of a certificate
|
||||
* @param privateKey - secret key
|
||||
* @param publicCertificate - electronic document provided to prove the ownership of the public key
|
||||
*/
|
||||
static fromCertificate(thumbprint: string, privateKey: string, publicCertificate?: string): ClientAssertion;
|
||||
/**
|
||||
* Update JWT for certificate based clientAssertion, if passed by the user, uses it as is
|
||||
* @param cryptoProvider - library's crypto helper
|
||||
* @param issuer - iss claim
|
||||
* @param jwtAudience - aud claim
|
||||
*/
|
||||
getJwt(cryptoProvider: CryptoProvider, issuer: string, jwtAudience: string): string;
|
||||
/**
|
||||
* JWT format and required claims specified: https://tools.ietf.org/html/rfc7523#section-3
|
||||
*/
|
||||
private createJwt;
|
||||
/**
|
||||
* Utility API to check expiration
|
||||
*/
|
||||
private isExpired;
|
||||
/**
|
||||
* Extracts the raw certs from a given certificate string and returns them in an array.
|
||||
* @param publicCertificate - electronic document provided to prove the ownership of the public key
|
||||
*/
|
||||
static parseCertificate(publicCertificate: string): Array<string>;
|
||||
}
|
||||
//# sourceMappingURL=ClientAssertion.d.ts.map
|
1
node_modules/@azure/msal-node/dist/client/ClientAssertion.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/client/ClientAssertion.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ClientAssertion.d.ts","sourceRoot":"","sources":["../src/client/ClientAssertion.ts"],"names":[],"mappings":"AAOA,OAAO,EAAE,cAAc,EAAE,MAAM,0BAA0B,CAAC;AAI1D;;;GAGG;AACH,qBAAa,eAAe;IAExB,OAAO,CAAC,GAAG,CAAS;IACpB,OAAO,CAAC,UAAU,CAAS;IAC3B,OAAO,CAAC,UAAU,CAAS;IAC3B,OAAO,CAAC,cAAc,CAAS;IAC/B,OAAO,CAAC,MAAM,CAAS;IACvB,OAAO,CAAC,WAAW,CAAS;IAC5B,OAAO,CAAC,iBAAiB,CAAgB;IAEzC;;;OAGG;WACW,aAAa,CAAC,SAAS,EAAE,MAAM,GAAG,eAAe;IAM/D;;;;;OAKG;WACW,eAAe,CAAC,UAAU,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,EAAE,iBAAiB,CAAC,EAAE,MAAM,GAAG,eAAe;IAUlH;;;;;OAKG;IACI,MAAM,CAAC,cAAc,EAAE,cAAc,EAAE,MAAM,EAAE,MAAM,EAAE,WAAW,EAAE,MAAM;IAsBjF;;OAEG;IACH,OAAO,CAAC,SAAS;IA+BjB;;OAEG;IACH,OAAO,CAAC,SAAS;IAIjB;;;OAGG;WACW,gBAAgB,CAAC,iBAAiB,EAAE,MAAM,GAAG,KAAK,CAAC,MAAM,CAAC;CAmB3E"}
|
51
node_modules/@azure/msal-node/dist/client/ConfidentialClientApplication.d.ts
generated
vendored
Normal file
51
node_modules/@azure/msal-node/dist/client/ConfidentialClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,51 @@
|
||||
import { ClientApplication } from "./ClientApplication";
|
||||
import { Configuration } from "../config/Configuration";
|
||||
import { AuthenticationResult } from "@azure/msal-common";
|
||||
import { IConfidentialClientApplication } from "./IConfidentialClientApplication";
|
||||
import { OnBehalfOfRequest } from "../request/OnBehalfOfRequest";
|
||||
import { ClientCredentialRequest } from "../request/ClientCredentialRequest";
|
||||
/**
|
||||
* This class is to be used to acquire tokens for confidential client applications (webApp, webAPI). Confidential client applications
|
||||
* will configure application secrets, client certificates/assertions as applicable
|
||||
* @public
|
||||
*/
|
||||
export declare class ConfidentialClientApplication extends ClientApplication implements IConfidentialClientApplication {
|
||||
/**
|
||||
* Constructor for the ConfidentialClientApplication
|
||||
*
|
||||
* Required attributes in the Configuration object are:
|
||||
* - clientID: the application ID of your application. You can obtain one by registering your application with our application registration portal
|
||||
* - authority: the authority URL for your application.
|
||||
* - client credential: Must set either client secret, certificate, or assertion for confidential clients. You can obtain a client secret from the application registration portal.
|
||||
*
|
||||
* In Azure AD, authority is a URL indicating of the form https://login.microsoftonline.com/\{Enter_the_Tenant_Info_Here\}.
|
||||
* If your application supports Accounts in one organizational directory, replace "Enter_the_Tenant_Info_Here" value with the Tenant Id or Tenant name (for example, contoso.microsoft.com).
|
||||
* If your application supports Accounts in any organizational directory, replace "Enter_the_Tenant_Info_Here" value with organizations.
|
||||
* If your application supports Accounts in any organizational directory and personal Microsoft accounts, replace "Enter_the_Tenant_Info_Here" value with common.
|
||||
* To restrict support to Personal Microsoft accounts only, replace "Enter_the_Tenant_Info_Here" value with consumers.
|
||||
*
|
||||
* In Azure B2C, authority is of the form https://\{instance\}/tfp/\{tenant\}/\{policyName\}/
|
||||
* Full B2C functionality will be available in this library in future versions.
|
||||
*
|
||||
* @param Configuration - configuration object for the MSAL ConfidentialClientApplication instance
|
||||
*/
|
||||
constructor(configuration: Configuration);
|
||||
/**
|
||||
* Acquires tokens from the authority for the application (not for an end user).
|
||||
*/
|
||||
acquireTokenByClientCredential(request: ClientCredentialRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Acquires tokens from the authority for the application.
|
||||
*
|
||||
* Used in scenarios where the current app is a middle-tier service which was called with a token
|
||||
* representing an end user. The current app can use the token (oboAssertion) to request another
|
||||
* token to access downstream web API, on behalf of that user.
|
||||
*
|
||||
* The current middle-tier app has no user interaction to obtain consent.
|
||||
* See how to gain consent upfront for your middle-tier app from this article.
|
||||
* https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow#gaining-consent-for-the-middle-tier-application
|
||||
*/
|
||||
acquireTokenOnBehalfOf(request: OnBehalfOfRequest): Promise<AuthenticationResult | null>;
|
||||
private setClientCredential;
|
||||
}
|
||||
//# sourceMappingURL=ConfidentialClientApplication.d.ts.map
|
1
node_modules/@azure/msal-node/dist/client/ConfidentialClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/client/ConfidentialClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ConfidentialClientApplication.d.ts","sourceRoot":"","sources":["../src/client/ConfidentialClientApplication.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,iBAAiB,EAAE,MAAM,qBAAqB,CAAC;AACxD,OAAO,EAAE,aAAa,EAAE,MAAM,yBAAyB,CAAC;AAGxD,OAAO,EAKH,oBAAoB,EAEH,MAAM,oBAAoB,CAAC;AAChD,OAAO,EAAE,8BAA8B,EAAE,MAAM,kCAAkC,CAAC;AAClF,OAAO,EAAE,iBAAiB,EAAE,MAAM,8BAA8B,CAAC;AACjE,OAAO,EAAE,uBAAuB,EAAE,MAAM,oCAAoC,CAAC;AAE7E;;;;GAIG;AACH,qBAAa,6BAA8B,SAAQ,iBAAkB,YAAW,8BAA8B;IAE1G;;;;;;;;;;;;;;;;;;OAkBG;gBACS,aAAa,EAAE,aAAa;IAKxC;;OAEG;IACU,8BAA8B,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAqBnH;;;;;;;;;;OAUG;IACU,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAcrG,OAAO,CAAC,mBAAmB;CA+B9B"}
|
33
node_modules/@azure/msal-node/dist/client/IConfidentialClientApplication.d.ts
generated
vendored
Normal file
33
node_modules/@azure/msal-node/dist/client/IConfidentialClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,33 @@
|
||||
import { AuthenticationResult, Logger } from "@azure/msal-common";
|
||||
import { AuthorizationCodeRequest } from "../request/AuthorizationCodeRequest";
|
||||
import { AuthorizationUrlRequest } from "../request/AuthorizationUrlRequest";
|
||||
import { ClientCredentialRequest } from "../request/ClientCredentialRequest";
|
||||
import { OnBehalfOfRequest } from "../request/OnBehalfOfRequest";
|
||||
import { RefreshTokenRequest } from "../request/RefreshTokenRequest";
|
||||
import { SilentFlowRequest } from "../request/SilentFlowRequest";
|
||||
import { TokenCache } from "../cache/TokenCache";
|
||||
/**
|
||||
* Interface for the ConfidentialClientApplication class defining the public API signatures
|
||||
* @public
|
||||
*/
|
||||
export interface IConfidentialClientApplication {
|
||||
/** Creates the URL of the authorization request */
|
||||
getAuthCodeUrl(request: AuthorizationUrlRequest): Promise<string>;
|
||||
/** Acquires a token by exchanging the authorization code received from the first step of OAuth 2.0 Authorization Code Flow */
|
||||
acquireTokenByCode(request: AuthorizationCodeRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires a token silently when a user specifies the account the token is requested for */
|
||||
acquireTokenSilent(request: SilentFlowRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires a token by exchanging the refresh token provided for a new set of tokens */
|
||||
acquireTokenByRefreshToken(request: RefreshTokenRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires tokens from the authority for the application (not for an end user) */
|
||||
acquireTokenByClientCredential(request: ClientCredentialRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires tokens from the authority for the application */
|
||||
acquireTokenOnBehalfOf(request: OnBehalfOfRequest): Promise<AuthenticationResult | null>;
|
||||
/** Gets the token cache for the application */
|
||||
getTokenCache(): TokenCache;
|
||||
/** Returns the logger instance */
|
||||
getLogger(): Logger;
|
||||
/** Replaces the default logger set in configurations with new Logger with new configurations */
|
||||
setLogger(logger: Logger): void;
|
||||
}
|
||||
//# sourceMappingURL=IConfidentialClientApplication.d.ts.map
|
1
node_modules/@azure/msal-node/dist/client/IConfidentialClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/client/IConfidentialClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"IConfidentialClientApplication.d.ts","sourceRoot":"","sources":["../src/client/IConfidentialClientApplication.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,oBAAoB,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAClE,OAAO,EAAE,wBAAwB,EAAE,MAAM,qCAAqC,CAAC;AAC/E,OAAO,EAAE,uBAAuB,EAAE,MAAM,oCAAoC,CAAC;AAC7E,OAAO,EAAE,uBAAuB,EAAE,MAAM,oCAAoC,CAAC;AAC7E,OAAO,EAAE,iBAAiB,EAAE,MAAM,8BAA8B,CAAC;AACjE,OAAO,EAAE,mBAAmB,EAAE,MAAM,gCAAgC,CAAC;AACrE,OAAO,EAAE,iBAAiB,EAAE,MAAM,8BAA8B,CAAC;AACjE,OAAO,EAAE,UAAU,EAAE,MAAM,qBAAqB,CAAC;AAEjD;;;GAGG;AACH,MAAM,WAAW,8BAA8B;IAE3C,mDAAmD;IACnD,cAAc,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;IAElE,+HAA+H;IAC/H,kBAAkB,CAAC,OAAO,EAAE,wBAAwB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAE5F,8FAA8F;IAC9F,kBAAkB,CAAC,OAAO,EAAE,iBAAiB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAErF,wFAAwF;IACxF,0BAA0B,CAAC,OAAO,EAAE,mBAAmB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAE/F,mFAAmF;IACnF,8BAA8B,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAEvG,6DAA6D;IAC7D,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAEzF,+CAA+C;IAC/C,aAAa,IAAI,UAAU,CAAC;IAE5B,kCAAkC;IAClC,SAAS,IAAI,MAAM,CAAC;IAEpB,gGAAgG;IAChG,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC;CACnC"}
|
33
node_modules/@azure/msal-node/dist/client/IPublicClientApplication.d.ts
generated
vendored
Normal file
33
node_modules/@azure/msal-node/dist/client/IPublicClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,33 @@
|
||||
import { AuthenticationResult, Logger } from "@azure/msal-common";
|
||||
import { AuthorizationCodeRequest } from "../request/AuthorizationCodeRequest";
|
||||
import { AuthorizationUrlRequest } from "../request/AuthorizationUrlRequest";
|
||||
import { DeviceCodeRequest } from "../request/DeviceCodeRequest";
|
||||
import { RefreshTokenRequest } from "../request/RefreshTokenRequest";
|
||||
import { SilentFlowRequest } from "../request/SilentFlowRequest";
|
||||
import { UsernamePasswordRequest } from "../request/UsernamePasswordRequest";
|
||||
import { TokenCache } from "../cache/TokenCache";
|
||||
/**
|
||||
* Interface for the PublicClientApplication class defining the public API signatures
|
||||
* @public
|
||||
*/
|
||||
export interface IPublicClientApplication {
|
||||
/** Creates the URL of the authorization request */
|
||||
getAuthCodeUrl(request: AuthorizationUrlRequest): Promise<string>;
|
||||
/** Acquires a token by exchanging the authorization code received from the first step of OAuth 2.0 Authorization Code Flow */
|
||||
acquireTokenByCode(request: AuthorizationCodeRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires a token silently when a user specifies the account the token is requested for */
|
||||
acquireTokenSilent(request: SilentFlowRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires a token by exchanging the refresh token provided for a new set of tokens */
|
||||
acquireTokenByRefreshToken(request: RefreshTokenRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires a token from the authority using OAuth2.0 device code flow */
|
||||
acquireTokenByDeviceCode(request: DeviceCodeRequest): Promise<AuthenticationResult | null>;
|
||||
/** Acquires tokens with password grant by exchanging client applications username and password for credentials */
|
||||
acquireTokenByUsernamePassword(request: UsernamePasswordRequest): Promise<AuthenticationResult | null>;
|
||||
/** Gets the token cache for the application */
|
||||
getTokenCache(): TokenCache;
|
||||
/** Returns the logger instance */
|
||||
getLogger(): Logger;
|
||||
/** Replaces the default logger set in configurations with new Logger with new configurations */
|
||||
setLogger(logger: Logger): void;
|
||||
}
|
||||
//# sourceMappingURL=IPublicClientApplication.d.ts.map
|
1
node_modules/@azure/msal-node/dist/client/IPublicClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/client/IPublicClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"IPublicClientApplication.d.ts","sourceRoot":"","sources":["../src/client/IPublicClientApplication.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,oBAAoB,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAClE,OAAO,EAAE,wBAAwB,EAAE,MAAM,qCAAqC,CAAC;AAC/E,OAAO,EAAE,uBAAuB,EAAE,MAAM,oCAAoC,CAAC;AAC7E,OAAO,EAAE,iBAAiB,EAAE,MAAM,8BAA8B,CAAC;AACjE,OAAO,EAAE,mBAAmB,EAAE,MAAM,gCAAgC,CAAC;AACrE,OAAO,EAAE,iBAAiB,EAAE,MAAM,8BAA8B,CAAC;AACjE,OAAO,EAAE,uBAAuB,EAAE,MAAM,oCAAoC,CAAC;AAC7E,OAAO,EAAE,UAAU,EAAE,MAAM,qBAAqB,CAAC;AAEjD;;;GAGG;AACH,MAAM,WAAW,wBAAwB;IAErC,mDAAmD;IACnD,cAAc,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;IAElE,8HAA8H;IAC9H,kBAAkB,CAAC,OAAO,EAAE,wBAAwB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAE5F,6FAA6F;IAC7F,kBAAkB,CAAC,OAAO,EAAE,iBAAiB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAErF,wFAAwF;IACxF,0BAA0B,CAAC,OAAO,EAAE,mBAAmB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAE/F,0EAA0E;IAC1E,wBAAwB,CAAC,OAAO,EAAE,iBAAiB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAE3F,kHAAkH;IAClH,8BAA8B,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC,CAAC;IAEvG,+CAA+C;IAC/C,aAAa,IAAI,UAAU,CAAC;IAE5B,kCAAkC;IAClC,SAAS,IAAI,MAAM,CAAC;IAEpB,gGAAgG;IAChG,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC;CACnC"}
|
53
node_modules/@azure/msal-node/dist/client/PublicClientApplication.d.ts
generated
vendored
Normal file
53
node_modules/@azure/msal-node/dist/client/PublicClientApplication.d.ts
generated
vendored
Normal file
@@ -0,0 +1,53 @@
|
||||
import { AuthenticationResult } from "@azure/msal-common";
|
||||
import { Configuration } from "../config/Configuration";
|
||||
import { ClientApplication } from "./ClientApplication";
|
||||
import { IPublicClientApplication } from "./IPublicClientApplication";
|
||||
import { DeviceCodeRequest } from "../request/DeviceCodeRequest";
|
||||
import { UsernamePasswordRequest } from "../request/UsernamePasswordRequest";
|
||||
/**
|
||||
* This class is to be used to acquire tokens for public client applications (desktop, mobile). Public client applications
|
||||
* are not trusted to safely store application secrets, and therefore can only request tokens in the name of an user.
|
||||
* @public
|
||||
*/
|
||||
export declare class PublicClientApplication extends ClientApplication implements IPublicClientApplication {
|
||||
/**
|
||||
* Important attributes in the Configuration object for auth are:
|
||||
* - clientID: the application ID of your application. You can obtain one by registering your application with our Application registration portal.
|
||||
* - authority: the authority URL for your application.
|
||||
*
|
||||
* AAD authorities are of the form https://login.microsoftonline.com/\{Enter_the_Tenant_Info_Here\}.
|
||||
* - If your application supports Accounts in one organizational directory, replace "Enter_the_Tenant_Info_Here" value with the Tenant Id or Tenant name (for example, contoso.microsoft.com).
|
||||
* - If your application supports Accounts in any organizational directory, replace "Enter_the_Tenant_Info_Here" value with organizations.
|
||||
* - If your application supports Accounts in any organizational directory and personal Microsoft accounts, replace "Enter_the_Tenant_Info_Here" value with common.
|
||||
* - To restrict support to Personal Microsoft accounts only, replace "Enter_the_Tenant_Info_Here" value with consumers.
|
||||
*
|
||||
* Azure B2C authorities are of the form https://\{instance\}/\{tenant\}/\{policy\}. Each policy is considered
|
||||
* its own authority. You will have to set the all of the knownAuthorities at the time of the client application
|
||||
* construction.
|
||||
*
|
||||
* ADFS authorities are of the form https://\{instance\}/adfs.
|
||||
*/
|
||||
constructor(configuration: Configuration);
|
||||
/**
|
||||
* Acquires a token from the authority using OAuth2.0 device code flow.
|
||||
* This flow is designed for devices that do not have access to a browser or have input constraints.
|
||||
* The authorization server issues a DeviceCode object with a verification code, an end-user code,
|
||||
* and the end-user verification URI. The DeviceCode object is provided through a callback, and the end-user should be
|
||||
* instructed to use another device to navigate to the verification URI to input credentials.
|
||||
* Since the client cannot receive incoming requests, it polls the authorization server repeatedly
|
||||
* until the end-user completes input of credentials.
|
||||
*/
|
||||
acquireTokenByDeviceCode(request: DeviceCodeRequest): Promise<AuthenticationResult | null>;
|
||||
/**
|
||||
* Acquires tokens with password grant by exchanging client applications username and password for credentials
|
||||
*
|
||||
* The latest OAuth 2.0 Security Best Current Practice disallows the password grant entirely.
|
||||
* More details on this recommendation at https://tools.ietf.org/html/draft-ietf-oauth-security-topics-13#section-3.4
|
||||
* Microsoft's documentation and recommendations are at:
|
||||
* https://docs.microsoft.com/en-us/azure/active-directory/develop/msal-authentication-flows#usernamepassword
|
||||
*
|
||||
* @param request - UsenamePasswordRequest
|
||||
*/
|
||||
acquireTokenByUsernamePassword(request: UsernamePasswordRequest): Promise<AuthenticationResult | null>;
|
||||
}
|
||||
//# sourceMappingURL=PublicClientApplication.d.ts.map
|
1
node_modules/@azure/msal-node/dist/client/PublicClientApplication.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-node/dist/client/PublicClientApplication.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"PublicClientApplication.d.ts","sourceRoot":"","sources":["../src/client/PublicClientApplication.ts"],"names":[],"mappings":"AAMA,OAAO,EAEH,oBAAoB,EAIvB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,aAAa,EAAE,MAAM,yBAAyB,CAAC;AACxD,OAAO,EAAE,iBAAiB,EAAE,MAAM,qBAAqB,CAAC;AACxD,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,iBAAiB,EAAE,MAAM,8BAA8B,CAAC;AACjE,OAAO,EAAE,uBAAuB,EAAE,MAAM,oCAAoC,CAAC;AAE7E;;;;GAIG;AACH,qBAAa,uBAAwB,SAAQ,iBAAkB,YAAW,wBAAwB;IAC9F;;;;;;;;;;;;;;;;OAgBG;gBACS,aAAa,EAAE,aAAa;IAIxC;;;;;;;;OAQG;IACU,wBAAwB,CAAC,OAAO,EAAE,iBAAiB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;IAqBvG;;;;;;;;;OASG;IACG,8BAA8B,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,oBAAoB,GAAG,IAAI,CAAC;CAoB/G"}
|
Reference in New Issue
Block a user