npm package diff
Package: @forge/manifest
Versions: 8.9.0-next.12-experimental-99739ec - 9.0.0-next.13
File: package/out/validators/modules-validator.js
Index: package/out/validators/modules-validator.js
===================================================================
--- package/out/validators/modules-validator.js
+++ package/out/validators/modules-validator.js
@@ -126,10 +126,8 @@
return validationErrors;
}
endpointValidations(modules, yamlContentByLine, remotes, scopes) {
const validationErrors = [];
- const SYSTEM_TOKEN_SCOPE = 'read:app-system-token';
- const USER_TOKEN_SCOPE = 'read:app-user-token';
const _checkRemoteExists = (remoteKey) => {
return remotes?.find((remote) => remote.key === remoteKey) !== undefined;
};
const { endpoint: _endpoint } = modules;
@@ -163,50 +161,50 @@
level: 'error',
...(0, utils_1.findPosition)(endpoint.remote, yamlContentByLine)
});
}
- if (endpoint.auth?.appUserToken?.enabled && !scopes.includes(USER_TOKEN_SCOPE)) {
+ if (endpoint.auth?.appUserToken?.enabled && !scopes.includes(types_1.USER_TOKEN_SCOPE)) {
validationErrors.push({
- message: text_1.errors.permissions.missingEndpointPermissionFromScope(USER_TOKEN_SCOPE, endpoint.key),
+ message: text_1.errors.permissions.missingEndpointPermissionFromScope(types_1.USER_TOKEN_SCOPE, endpoint.key),
reference: text_1.References.MissingScopes,
level: 'error',
metadata: {
- missingPermission: USER_TOKEN_SCOPE
+ missingPermission: types_1.USER_TOKEN_SCOPE
},
...(0, utils_1.findPosition)('scopes', yamlContentByLine)
});
}
- if (endpoint.auth?.appSystemToken?.enabled && !scopes.includes(SYSTEM_TOKEN_SCOPE)) {
+ if (endpoint.auth?.appSystemToken?.enabled && !scopes.includes(types_1.SYSTEM_TOKEN_SCOPE)) {
validationErrors.push({
- message: text_1.errors.permissions.missingEndpointPermissionFromScope(SYSTEM_TOKEN_SCOPE, endpoint.key),
+ message: text_1.errors.permissions.missingEndpointPermissionFromScope(types_1.SYSTEM_TOKEN_SCOPE, endpoint.key),
reference: text_1.References.MissingScopes,
level: 'error',
metadata: {
- missingPermission: SYSTEM_TOKEN_SCOPE
+ missingPermission: types_1.SYSTEM_TOKEN_SCOPE
},
...(0, utils_1.findPosition)('scopes', yamlContentByLine)
});
}
});
remotes?.forEach((remote) => {
- if (remote.auth?.appUserToken?.enabled && !scopes.includes(USER_TOKEN_SCOPE)) {
+ if (remote.auth?.appUserToken?.enabled && !scopes.includes(types_1.USER_TOKEN_SCOPE)) {
validationErrors.push({
- message: text_1.errors.permissions.missingRemotePermissionFromScope(USER_TOKEN_SCOPE, remote.key),
+ message: text_1.errors.permissions.missingRemotePermissionFromScope(types_1.USER_TOKEN_SCOPE, remote.key),
reference: text_1.References.MissingScopes,
level: 'error',
metadata: {
- missingPermission: USER_TOKEN_SCOPE
+ missingPermission: types_1.USER_TOKEN_SCOPE
},
...(0, utils_1.findPosition)('scopes', yamlContentByLine)
});
}
- if (remote.auth?.appSystemToken?.enabled && !scopes.includes(SYSTEM_TOKEN_SCOPE)) {
+ if (remote.auth?.appSystemToken?.enabled && !scopes.includes(types_1.SYSTEM_TOKEN_SCOPE)) {
validationErrors.push({
- message: text_1.errors.permissions.missingRemotePermissionFromScope(SYSTEM_TOKEN_SCOPE, remote.key),
+ message: text_1.errors.permissions.missingRemotePermissionFromScope(types_1.SYSTEM_TOKEN_SCOPE, remote.key),
reference: text_1.References.MissingScopes,
level: 'error',
metadata: {
- missingPermission: SYSTEM_TOKEN_SCOPE
+ missingPermission: types_1.SYSTEM_TOKEN_SCOPE
},
...(0, utils_1.findPosition)('scopes', yamlContentByLine)
});
}