UNPKG

node-nlp

Version:

Library for NLU (Natural Language Understanding) done in Node.js

110 lines (96 loc) 4.34 kB
/** * @module botbuilder */ /** * Copyright (c) Microsoft Corporation. All rights reserved. * Licensed under the MIT License. */ export module Constants { /** * TO CHANNEL FROM BOT: Login URL */ export const ToChannelFromBotLoginUrl: string = 'https://login.microsoftonline.com/botframework.com/oauth2/v2.0/token'; /** * TO CHANNEL FROM BOT: OAuth scope to request */ export const ToChannelFromBotOAuthScope: string = 'https://api.botframework.com/.default'; /** * TO BOT FROM CHANNEL: Token issuer */ export const ToBotFromChannelTokenIssuer : string = 'https://api.botframework.com'; /** * TO BOT FROM CHANNEL: OpenID metadata document for tokens coming from MSA */ export const ToBotFromChannelOpenIdMetadataUrl: string = 'https://login.botframework.com/v1/.well-known/openidconfiguration'; /** * TO BOT FROM ENTERPRISE CHANNEL: OpenID metadata document for tokens coming from MSA */ export const ToBotFromEnterpriseChannelOpenIdMetadataUrlFormat: string = 'https://{channelService}.enterprisechannel.botframework.com/v1/.well-known/openidconfiguration'; /** * TO BOT FROM EMULATOR: OpenID metadata document for tokens coming from MSA */ export const ToBotFromEmulatorOpenIdMetadataUrl: string = 'https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration'; /** * Allowed token signing algorithms. Tokens come from channels to the bot. The code * that uses this also supports tokens coming from the emulator. */ export const AllowedSigningAlgorithms: string[] = [ 'RS256', 'RS384', 'RS512' ]; /** * "azp" Claim. * Authorized party - the party to which the ID Token was issued. * This claim follows the general format set forth in the OpenID Spec. * http://openid.net/specs/openid-connect-core-1_0.html#IDToken */ export const AuthorizedParty: string = 'azp'; /** * Audience Claim. From RFC 7519. * https://tools.ietf.org/html/rfc7519#section-4.1.3 * The "aud" (audience) claim identifies the recipients that the JWT is * intended for. Each principal intended to process the JWT MUST * identify itself with a value in the audience claim.If the principal * processing the claim does not identify itself with a value in the * "aud" claim when this claim is present, then the JWT MUST be * rejected.In the general case, the "aud" value is an array of case- * sensitive strings, each containing a StringOrURI value.In the * special case when the JWT has one audience, the "aud" value MAY be a * single case-sensitive string containing a StringOrURI value.The * interpretation of audience values is generally application specific. * Use of this claim is OPTIONAL. */ export const AudienceClaim: string = 'aud'; /** * Issuer Claim. From RFC 7519. * https://tools.ietf.org/html/rfc7519#section-4.1.1 * The "iss" (issuer) claim identifies the principal that issued the * JWT. The processing of this claim is generally application specific. * The "iss" value is a case-sensitive string containing a StringOrURI * value. Use of this claim is OPTIONAL. */ export const IssuerClaim: string = 'iss'; /** * From RFC 7515 * https://tools.ietf.org/html/rfc7515#section-4.1.4 * The "kid" (key ID) Header Parameter is a hint indicating which key * was used to secure the JWS. This parameter allows originators to * explicitly signal a change of key to recipients. The structure of * the "kid" value is unspecified. Its value MUST be a case-sensitive * string. Use of this Header Parameter is OPTIONAL. * When used with a JWK, the "kid" value is used to match a JWK "kid" * parameter value. */ export const KeyIdHeader: string = 'kid'; /** * Token version claim name. As used in Microsoft AAD tokens. */ export const VersionClaim : string = 'ver'; /** * App ID claim name. As used in Microsoft AAD 1.0 tokens. */ export const AppIdClaim : string = 'appid'; /** * Service URL claim name. As used in Microsoft Bot Framework v3.1 auth. */ export const ServiceUrlClaim : string = 'serviceurl'; }