@base44-preview/cli 0.0.50-pr.484.9f89524 → 0.0.50-pr.484.cb7ade7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/cli/index.js CHANGED
@@ -251286,16 +251286,6 @@ function validateProvider(provider) {
251286
251286
  ]
251287
251287
  });
251288
251288
  }
251289
- if (!(provider in KNOWN_SSO_PROVIDERS)) {
251290
- throw new InvalidInputError(`Unknown provider "${provider}". Valid providers: ${providerNames.join(", ")}`, {
251291
- hints: [
251292
- {
251293
- message: `Example: base44 auth sso enable --provider ${providerNames[0]} --client-id <id> --client-secret <secret>`,
251294
- command: `base44 auth sso enable --provider <provider> --client-id <id> --client-secret <secret>`
251295
- }
251296
- ]
251297
- });
251298
- }
251299
251289
  return provider;
251300
251290
  }
251301
251291
  async function ssoEnableAction({ isNonInteractive, runTask: runTask2 }, options) {
@@ -251406,7 +251396,7 @@ function getSSOCommand() {
251406
251396
  return new Base44Command("sso").description("Configure SSO identity provider (google, microsoft, github, okta, custom)").addArgument(new Argument("<action>", "enable or disable SSO").choices([
251407
251397
  "enable",
251408
251398
  "disable"
251409
- ])).option("--provider <provider>", "SSO provider: google, microsoft, github, okta, custom").option("--client-id <id>", "OAuth client ID").option("--client-secret <secret>", "OAuth client secret").option("--client-secret-stdin", "Read client secret from stdin").option("--env-file <path>", "Read client secret from a .env file (key: sso_client_secret)").option("--file <path>", "JSON config file with all SSO settings").option("--scope <scope>", "OAuth scope (defaults per provider)").option("--discovery-url <url>", "OIDC discovery URL").option("--tenant-id <id>", "Microsoft tenant ID (required for microsoft)").option("--okta-domain <domain>", "Okta domain (required for okta)").option("--auth-endpoint <url>", "Authorization endpoint (required for custom)").option("--token-endpoint <url>", "Token endpoint (required for custom)").option("--userinfo-endpoint <url>", "Userinfo endpoint (required for custom)").option("--jwks-uri <url>", "JWKS URI (required for custom)").option("--sso-name <name>", "Provider display name (required for custom)").action(ssoAction);
251399
+ ])).addOption(new Option("--provider <provider>", "SSO provider").choices(Object.values(KNOWN_SSO_PROVIDERS))).option("--client-id <id>", "OAuth client ID").option("--client-secret <secret>", "OAuth client secret").option("--client-secret-stdin", "Read client secret from stdin").option("--env-file <path>", "Read client secret from a .env file (key: sso_client_secret)").option("--file <path>", "JSON config file with all SSO settings").option("--scope <scope>", "OAuth scope (defaults per provider)").option("--discovery-url <url>", "OIDC discovery URL").option("--tenant-id <id>", "Microsoft tenant ID (required for microsoft)").option("--okta-domain <domain>", "Okta domain (required for okta)").option("--auth-endpoint <url>", "Authorization endpoint (required for custom)").option("--token-endpoint <url>", "Token endpoint (required for custom)").option("--userinfo-endpoint <url>", "Userinfo endpoint (required for custom)").option("--jwks-uri <url>", "JWKS URI (required for custom)").option("--sso-name <name>", "Provider display name (required for custom)").action(ssoAction);
251410
251400
  }
251411
251401
 
251412
251402
  // src/cli/commands/auth/index.ts
@@ -261041,4 +261031,4 @@ export {
261041
261031
  CLIExitError
261042
261032
  };
261043
261033
 
261044
- //# debugId=0725E6C9FE4ACAAC64756E2164756E21
261034
+ //# debugId=CDE136D996499A7364756E2164756E21