@base44-preview/cli 0.0.51-pr.484.222fc2f → 0.0.51-pr.484.a220663
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli/index.js +5 -2
- package/dist/cli/index.js.map +3 -3
- package/package.json +1 -1
package/dist/cli/index.js
CHANGED
|
@@ -251297,6 +251297,9 @@ function validateProvider(provider) {
|
|
|
251297
251297
|
return provider;
|
|
251298
251298
|
}
|
|
251299
251299
|
async function ssoEnableAction({ isNonInteractive, runTask: runTask2 }, options) {
|
|
251300
|
+
if (options.file && options.envFile) {
|
|
251301
|
+
throw new InvalidInputError("--file and --env-file cannot be used together. Provide the client secret either inside --file or via --env-file.");
|
|
251302
|
+
}
|
|
251300
251303
|
let merged = options;
|
|
251301
251304
|
if (options.file) {
|
|
251302
251305
|
const fileConfig = await loadSSOConfigFile(options.file);
|
|
@@ -251411,7 +251414,7 @@ function getSSOCommand() {
|
|
|
251411
251414
|
return new Base44Command("sso").description("Configure SSO identity provider (google, microsoft, github, okta, custom). SSO and social login are mutually exclusive — enabling one disables the other in the local auth config.").addArgument(new Argument("<action>", "enable or disable SSO").choices([
|
|
251412
251415
|
"enable",
|
|
251413
251416
|
"disable"
|
|
251414
|
-
])).addOption(new Option("--provider <provider>", "SSO provider").choices(Object.values(KNOWN_SSO_PROVIDERS))).option("--client-id <id>", "OAuth client ID").option("--client-secret <secret>", "OAuth client secret").option("--client-secret-stdin", "Read client secret from stdin").option("--env-file <path>", "Read client secret from a .env file (key: sso_client_secret)
|
|
251417
|
+
])).addOption(new Option("--provider <provider>", "SSO provider").choices(Object.values(KNOWN_SSO_PROVIDERS))).option("--client-id <id>", "OAuth client ID").option("--client-secret <secret>", "OAuth client secret").option("--client-secret-stdin", "Read client secret from stdin").option("--env-file <path>", "Read client secret from a .env file (key: sso_client_secret)").option("--file <path>", "JSON config file with all SSO settings").option("--scope <scope>", "OAuth scope (defaults per provider)").option("--discovery-url <url>", "OIDC discovery URL").option("--tenant-id <id>", "Microsoft tenant ID (required for microsoft)").option("--okta-domain <domain>", "Okta domain (required for okta)").option("--auth-endpoint <url>", "Authorization endpoint (required for custom)").option("--token-endpoint <url>", "Token endpoint (required for custom)").option("--userinfo-endpoint <url>", "Userinfo endpoint (required for custom)").option("--jwks-uri <url>", "JWKS URI (required for custom)").option("--sso-name <name>", "Provider display name (required for custom)").action(ssoAction);
|
|
251415
251418
|
}
|
|
251416
251419
|
|
|
251417
251420
|
// src/cli/commands/auth/index.ts
|
|
@@ -261262,4 +261265,4 @@ export {
|
|
|
261262
261265
|
CLIExitError
|
|
261263
261266
|
};
|
|
261264
261267
|
|
|
261265
|
-
//# debugId=
|
|
261268
|
+
//# debugId=3A692D5B92B6C98C64756E2164756E21
|