@base44-preview/cli 0.0.34-pr.321.93d060a → 0.0.34-pr.321.da947cb
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -0
- package/dist/cli/index.js +7 -4
- package/dist/cli/index.js.map +4 -4
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -57,6 +57,9 @@ The CLI will guide you through project setup. For step-by-step tutorials, see th
|
|
|
57
57
|
| [`connectors push`](https://docs.base44.com/developers/references/cli/commands/connectors-push) | Push local connectors to Base44 |
|
|
58
58
|
| [`entities push`](https://docs.base44.com/developers/references/cli/commands/entities-push) | Push local entities to Base44 |
|
|
59
59
|
| [`functions deploy`](https://docs.base44.com/developers/references/cli/commands/functions-deploy) | Deploy local functions to Base44 |
|
|
60
|
+
| [`secrets delete`](https://docs.base44.com/developers/references/cli/commands/secrets-delete) | Delete one or more secrets |
|
|
61
|
+
| [`secrets list`](https://docs.base44.com/developers/references/cli/commands/secrets-list) | List secret names (values are masked) |
|
|
62
|
+
| [`secrets set`](https://docs.base44.com/developers/references/cli/commands/secrets-set) | Set one or more secrets |
|
|
60
63
|
| [`site deploy`](https://docs.base44.com/developers/references/cli/commands/site-deploy) | Deploy built site files to Base44 hosting |
|
|
61
64
|
| [`site open`](https://docs.base44.com/developers/references/cli/commands/site-open) | Open the published site in your browser |
|
|
62
65
|
| [`types generate`](https://docs.base44.com/developers/references/cli/commands/types-generate) | Generate TypeScript types from project resources |
|
package/dist/cli/index.js
CHANGED
|
@@ -195733,6 +195733,9 @@ function getLogsCommand(context) {
|
|
|
195733
195733
|
|
|
195734
195734
|
// src/cli/commands/secrets/delete.ts
|
|
195735
195735
|
async function deleteSecretsAction(keys) {
|
|
195736
|
+
if (keys.length === 0) {
|
|
195737
|
+
throw new InvalidInputError("Provide one or more secret names to delete. Example: base44 secrets delete KEY1 KEY2");
|
|
195738
|
+
}
|
|
195736
195739
|
for (const key of keys) {
|
|
195737
195740
|
await runTask(`Deleting secret "${key}"`, async () => {
|
|
195738
195741
|
return await deleteSecret(key);
|
|
@@ -195747,7 +195750,7 @@ async function deleteSecretsAction(keys) {
|
|
|
195747
195750
|
};
|
|
195748
195751
|
}
|
|
195749
195752
|
function getSecretsDeleteCommand(context) {
|
|
195750
|
-
return new Command("delete").description("Delete one or more secrets").argument("
|
|
195753
|
+
return new Command("delete").description("Delete one or more secrets").argument("[keys...]", "Secret name(s) to delete").action(async (keys) => {
|
|
195751
195754
|
await runCommand(() => deleteSecretsAction(keys), { requireAuth: true }, context);
|
|
195752
195755
|
});
|
|
195753
195756
|
}
|
|
@@ -195800,7 +195803,7 @@ async function setSecretsAction(entries, options) {
|
|
|
195800
195803
|
const hasEntries = entries.length > 0;
|
|
195801
195804
|
const hasEnvFile = Boolean(options.envFile);
|
|
195802
195805
|
if (!hasEntries && !hasEnvFile) {
|
|
195803
|
-
throw new InvalidInputError("Provide KEY=VALUE pairs or --env-file
|
|
195806
|
+
throw new InvalidInputError("Provide KEY=VALUE pairs or use --env-file.");
|
|
195804
195807
|
}
|
|
195805
195808
|
if (hasEntries && hasEnvFile) {
|
|
195806
195809
|
throw new InvalidInputError("Provide KEY=VALUE pairs or --env-file, but not both.");
|
|
@@ -195827,7 +195830,7 @@ async function setSecretsAction(entries, options) {
|
|
|
195827
195830
|
};
|
|
195828
195831
|
}
|
|
195829
195832
|
function getSecretsSetCommand(context) {
|
|
195830
|
-
return new Command("set").description("Set one or more secrets (KEY=VALUE format)").argument("[entries...]", "KEY=VALUE pairs (e.g.
|
|
195833
|
+
return new Command("set").description("Set one or more secrets (KEY=VALUE format)").argument("[entries...]", "KEY=VALUE pairs (e.g. KEY1=VALUE1 KEY2=VALUE2)").option("--env-file <path>", "Path to .env file").action(async (entries, options) => {
|
|
195831
195834
|
await runCommand(() => setSecretsAction(entries, options), { requireAuth: true }, context);
|
|
195832
195835
|
});
|
|
195833
195836
|
}
|
|
@@ -200824,4 +200827,4 @@ export {
|
|
|
200824
200827
|
CLIExitError
|
|
200825
200828
|
};
|
|
200826
200829
|
|
|
200827
|
-
//# debugId=
|
|
200830
|
+
//# debugId=2BA1071BB17DBCCA64756E2164756E21
|