@launchframe/cli 1.0.0-beta.12 → 1.0.0-beta.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@launchframe/cli",
3
- "version": "1.0.0-beta.12",
3
+ "version": "1.0.0-beta.14",
4
4
  "description": "Production-ready B2B SaaS boilerplate with subscriptions, credits, and multi-tenancy",
5
5
  "main": "src/index.js",
6
6
  "bin": {
@@ -71,7 +71,7 @@ async function deploySetEnv() {
71
71
  // Generate secure defaults
72
72
  const dbPassword = generateSecret(24);
73
73
  const redisPassword = generateSecret(24);
74
- const jwtSecret = generateSecret(32);
74
+ const betterAuthSecret = generateSecret(32);
75
75
  const bullAdminToken = generateSecret(32);
76
76
 
77
77
  const answers = await inquirer.prompt([
@@ -91,9 +91,9 @@ async function deploySetEnv() {
91
91
  },
92
92
  {
93
93
  type: 'password',
94
- name: 'jwtSecret',
95
- message: 'JWT secret:',
96
- default: jwtSecret,
94
+ name: 'betterAuthSecret',
95
+ message: 'Better Auth secret (min 32 chars):',
96
+ default: betterAuthSecret,
97
97
  mask: '*'
98
98
  },
99
99
  {
@@ -143,7 +143,7 @@ async function deploySetEnv() {
143
143
 
144
144
  replacements['DB_PASSWORD'] = answers.dbPassword;
145
145
  replacements['REDIS_PASSWORD'] = answers.redisPassword;
146
- replacements['JWT_SECRET'] = answers.jwtSecret;
146
+ replacements['BETTER_AUTH_SECRET'] = answers.betterAuthSecret;
147
147
  replacements['BULL_ADMIN_TOKEN'] = answers.bullAdminToken;
148
148
  replacements['RESEND_API_KEY'] = answers.resendApiKey || 're_your_resend_api_key';
149
149
  replacements['POLAR_ACCESS_TOKEN'] = answers.polarAccessToken || 'polar_oat_your_token';
@@ -105,7 +105,7 @@ async function deployUp() {
105
105
  const verifySpinner = ora('Checking service status...').start();
106
106
 
107
107
  try {
108
- const { stdout: psOutput} = await execAsync(
108
+ const { stdout: psOutput } = await execAsync(
109
109
  `ssh ${vpsUser}@${vpsHost} "cd ${vpsAppFolder}/infrastructure && docker-compose -f docker-compose.yml ps"`,
110
110
  { timeout: 30000 }
111
111
  );
@@ -114,6 +114,7 @@ async function deployUp() {
114
114
 
115
115
  console.log(chalk.gray('\n' + psOutput));
116
116
  } catch (error) {
117
+ console.error(chalk.red(`\n❌ Error: ${error.message}\n`));
117
118
  verifySpinner.warn('Could not verify services');
118
119
  }
119
120
 
@@ -205,6 +205,7 @@ async function waitlistDeploy() {
205
205
  verifySpinner.succeed('Services verified');
206
206
  console.log(chalk.gray('\n' + psOutput));
207
207
  } catch (error) {
208
+ console.error(chalk.yellow(`\n⚠️ Error: ${error.message}\n`));
208
209
  verifySpinner.warn('Could not verify services');
209
210
  }
210
211
 
@@ -25,7 +25,7 @@ async function generateEnvFile(projectRoot, answers) {
25
25
 
26
26
  // Generate secure secrets
27
27
  const secrets = {
28
- JWT_SECRET: generateSecret(32),
28
+ BETTER_AUTH_SECRET: generateSecret(32),
29
29
  DB_PASSWORD: generateSecret(24),
30
30
  BULL_ADMIN_TOKEN: generateSecret(24)
31
31
  };
@@ -39,7 +39,7 @@ async function generateEnvFile(projectRoot, answers) {
39
39
 
40
40
  // Replace placeholder passwords with generated secrets
41
41
  'your_secure_postgres_password': secrets.DB_PASSWORD,
42
- 'your_jwt_secret_key_change_this_in_production': secrets.JWT_SECRET,
42
+ 'your_better_auth_secret_minimum_32_chars': secrets.BETTER_AUTH_SECRET,
43
43
  'your_bull_admin_token': secrets.BULL_ADMIN_TOKEN
44
44
  };
45
45