@base44-preview/cli 0.0.50-pr.484.9f89524 → 0.0.50-pr.484.cb7ade7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli/index.js +2 -12
- package/dist/cli/index.js.map +3 -3
- package/package.json +1 -1
package/dist/cli/index.js
CHANGED
|
@@ -251286,16 +251286,6 @@ function validateProvider(provider) {
|
|
|
251286
251286
|
]
|
|
251287
251287
|
});
|
|
251288
251288
|
}
|
|
251289
|
-
if (!(provider in KNOWN_SSO_PROVIDERS)) {
|
|
251290
|
-
throw new InvalidInputError(`Unknown provider "${provider}". Valid providers: ${providerNames.join(", ")}`, {
|
|
251291
|
-
hints: [
|
|
251292
|
-
{
|
|
251293
|
-
message: `Example: base44 auth sso enable --provider ${providerNames[0]} --client-id <id> --client-secret <secret>`,
|
|
251294
|
-
command: `base44 auth sso enable --provider <provider> --client-id <id> --client-secret <secret>`
|
|
251295
|
-
}
|
|
251296
|
-
]
|
|
251297
|
-
});
|
|
251298
|
-
}
|
|
251299
251289
|
return provider;
|
|
251300
251290
|
}
|
|
251301
251291
|
async function ssoEnableAction({ isNonInteractive, runTask: runTask2 }, options) {
|
|
@@ -251406,7 +251396,7 @@ function getSSOCommand() {
|
|
|
251406
251396
|
return new Base44Command("sso").description("Configure SSO identity provider (google, microsoft, github, okta, custom)").addArgument(new Argument("<action>", "enable or disable SSO").choices([
|
|
251407
251397
|
"enable",
|
|
251408
251398
|
"disable"
|
|
251409
|
-
])).
|
|
251399
|
+
])).addOption(new Option("--provider <provider>", "SSO provider").choices(Object.values(KNOWN_SSO_PROVIDERS))).option("--client-id <id>", "OAuth client ID").option("--client-secret <secret>", "OAuth client secret").option("--client-secret-stdin", "Read client secret from stdin").option("--env-file <path>", "Read client secret from a .env file (key: sso_client_secret)").option("--file <path>", "JSON config file with all SSO settings").option("--scope <scope>", "OAuth scope (defaults per provider)").option("--discovery-url <url>", "OIDC discovery URL").option("--tenant-id <id>", "Microsoft tenant ID (required for microsoft)").option("--okta-domain <domain>", "Okta domain (required for okta)").option("--auth-endpoint <url>", "Authorization endpoint (required for custom)").option("--token-endpoint <url>", "Token endpoint (required for custom)").option("--userinfo-endpoint <url>", "Userinfo endpoint (required for custom)").option("--jwks-uri <url>", "JWKS URI (required for custom)").option("--sso-name <name>", "Provider display name (required for custom)").action(ssoAction);
|
|
251410
251400
|
}
|
|
251411
251401
|
|
|
251412
251402
|
// src/cli/commands/auth/index.ts
|
|
@@ -261041,4 +261031,4 @@ export {
|
|
|
261041
261031
|
CLIExitError
|
|
261042
261032
|
};
|
|
261043
261033
|
|
|
261044
|
-
//# debugId=
|
|
261034
|
+
//# debugId=CDE136D996499A7364756E2164756E21
|