@base44-preview/cli 0.0.50-pr.484.804e4de → 0.0.50-pr.484.9f89524

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/cli/index.js CHANGED
@@ -251262,6 +251262,19 @@ function mergeFileWithFlags(fileConfig, options) {
251262
251262
  };
251263
251263
  }
251264
251264
  var providerNames = Object.keys(KNOWN_SSO_PROVIDERS);
251265
+ function secretKeyToFlag(key) {
251266
+ return `--${key.replace(/^sso_/, "").replace(/_/g, "-")}`;
251267
+ }
251268
+ function exampleCommand(provider) {
251269
+ let cmd = `base44 auth sso enable --provider ${provider} --client-id <id> --client-secret <secret>`;
251270
+ if (provider === KNOWN_SSO_PROVIDERS.microsoft)
251271
+ cmd += " --tenant-id <id>";
251272
+ if (provider === KNOWN_SSO_PROVIDERS.okta)
251273
+ cmd += " --okta-domain <domain>";
251274
+ if (provider === KNOWN_SSO_PROVIDERS.custom)
251275
+ cmd += " --sso-name <name> --auth-endpoint <url> --token-endpoint <url> --userinfo-endpoint <url> --jwks-uri <url>";
251276
+ return cmd;
251277
+ }
251265
251278
  function validateProvider(provider) {
251266
251279
  if (!provider) {
251267
251280
  throw new InvalidInputError("Missing --provider.", {
@@ -251274,7 +251287,14 @@ function validateProvider(provider) {
251274
251287
  });
251275
251288
  }
251276
251289
  if (!(provider in KNOWN_SSO_PROVIDERS)) {
251277
- throw new InvalidInputError(`Unknown provider "${provider}". Valid providers: ${providerNames.join(", ")}`);
251290
+ throw new InvalidInputError(`Unknown provider "${provider}". Valid providers: ${providerNames.join(", ")}`, {
251291
+ hints: [
251292
+ {
251293
+ message: `Example: base44 auth sso enable --provider ${providerNames[0]} --client-id <id> --client-secret <secret>`,
251294
+ command: `base44 auth sso enable --provider <provider> --client-id <id> --client-secret <secret>`
251295
+ }
251296
+ ]
251297
+ });
251278
251298
  }
251279
251299
  return provider;
251280
251300
  }
@@ -251338,7 +251358,23 @@ async function ssoEnableAction({ isNonInteractive, runTask: runTask2 }, options)
251338
251358
  jwksUri: merged.jwksUri,
251339
251359
  ssoName: merged.ssoName
251340
251360
  };
251341
- const secrets = buildSSOSecrets(provider, secretOptions);
251361
+ let secrets;
251362
+ try {
251363
+ secrets = buildSSOSecrets(provider, secretOptions);
251364
+ } catch (error48) {
251365
+ if (error48 instanceof InvalidInputError) {
251366
+ const flagMessage = error48.message.replace(/sso_[a-z_]+/g, (key) => secretKeyToFlag(key));
251367
+ throw new InvalidInputError(flagMessage, {
251368
+ hints: [
251369
+ {
251370
+ message: `Example: ${exampleCommand(provider)}`,
251371
+ command: exampleCommand(provider)
251372
+ }
251373
+ ]
251374
+ });
251375
+ }
251376
+ throw error48;
251377
+ }
251342
251378
  const { project: project2 } = await readProjectConfig();
251343
251379
  const configDir = dirname11(project2.configPath);
251344
251380
  const authDir = join16(configDir, project2.authDir);
@@ -261005,4 +261041,4 @@ export {
261005
261041
  CLIExitError
261006
261042
  };
261007
261043
 
261008
- //# debugId=3D7486B2A6408CC364756E2164756E21
261044
+ //# debugId=0725E6C9FE4ACAAC64756E2164756E21