@rockcarver/frodo-cli 0.15.0 → 0.15.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +17 -1
- package/esm/app.js +55 -0
- package/esm/app.js.map +1 -0
- package/esm/cli/_template/cmd-delete.js +22 -0
- package/esm/cli/_template/cmd-delete.js.map +1 -0
- package/esm/cli/_template/cmd-describe.js +22 -0
- package/esm/cli/_template/cmd-describe.js.map +1 -0
- package/esm/cli/_template/cmd-export.js +22 -0
- package/esm/cli/_template/cmd-export.js.map +1 -0
- package/esm/cli/_template/cmd-import.js +22 -0
- package/esm/cli/_template/cmd-import.js.map +1 -0
- package/esm/cli/_template/cmd-list.js +22 -0
- package/esm/cli/_template/cmd-list.js.map +1 -0
- package/esm/cli/_template/cmd-sub1-delete.js +22 -0
- package/esm/cli/_template/cmd-sub1-delete.js.map +1 -0
- package/esm/cli/_template/cmd-sub1-describe.js +22 -0
- package/esm/cli/_template/cmd-sub1-describe.js.map +1 -0
- package/esm/cli/_template/cmd-sub1-export.js +22 -0
- package/esm/cli/_template/cmd-sub1-export.js.map +1 -0
- package/esm/cli/_template/cmd-sub1-import.js +22 -0
- package/esm/cli/_template/cmd-sub1-import.js.map +1 -0
- package/esm/cli/_template/cmd-sub1-list.js +22 -0
- package/esm/cli/_template/cmd-sub1-list.js.map +1 -0
- package/esm/cli/_template/cmd-sub1.js +10 -0
- package/esm/cli/_template/cmd-sub1.js.map +1 -0
- package/esm/cli/_template/cmd-sub2-delete.js +22 -0
- package/esm/cli/_template/cmd-sub2-delete.js.map +1 -0
- package/esm/cli/_template/cmd-sub2-describe.js +22 -0
- package/esm/cli/_template/cmd-sub2-describe.js.map +1 -0
- package/esm/cli/_template/cmd-sub2-export.js +22 -0
- package/esm/cli/_template/cmd-sub2-export.js.map +1 -0
- package/esm/cli/_template/cmd-sub2-import.js +22 -0
- package/esm/cli/_template/cmd-sub2-import.js.map +1 -0
- package/esm/cli/_template/cmd-sub2-list.js +22 -0
- package/esm/cli/_template/cmd-sub2-list.js.map +1 -0
- package/esm/cli/_template/cmd-sub2.js +10 -0
- package/esm/cli/_template/cmd-sub2.js.map +1 -0
- package/esm/cli/_template/cmd.js +19 -0
- package/esm/cli/_template/cmd.js.map +1 -0
- package/esm/cli/admin/admin-add-autoid-static-user-mapping.js +28 -0
- package/esm/cli/admin/admin-add-autoid-static-user-mapping.js.map +1 -0
- package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js +85 -0
- package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js.map +1 -0
- package/esm/cli/admin/admin-get-access-token.js +28 -0
- package/esm/cli/admin/admin-get-access-token.js.map +1 -0
- package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js +28 -0
- package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js.map +1 -0
- package/esm/cli/admin/admin-hide-generic-extension-attributes.js +28 -0
- package/esm/cli/admin/admin-hide-generic-extension-attributes.js.map +1 -0
- package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js +31 -0
- package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js.map +1 -0
- package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js +31 -0
- package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js.map +1 -0
- package/esm/cli/admin/admin-list-static-user-mappings.js +31 -0
- package/esm/cli/admin/admin-list-static-user-mappings.js.map +1 -0
- package/esm/cli/admin/admin-remove-static-user-mapping.js +28 -0
- package/esm/cli/admin/admin-remove-static-user-mapping.js.map +1 -0
- package/esm/cli/admin/admin-repair-org-model.js +28 -0
- package/esm/cli/admin/admin-repair-org-model.js.map +1 -0
- package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js +28 -0
- package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js.map +1 -0
- package/esm/cli/admin/admin-show-generic-extension-attributes.js +28 -0
- package/esm/cli/admin/admin-show-generic-extension-attributes.js.map +1 -0
- package/esm/cli/admin/admin.js +24 -0
- package/esm/cli/admin/admin.js.map +1 -0
- package/esm/cli/app/app-delete.js +22 -0
- package/esm/cli/app/app-delete.js.map +1 -0
- package/esm/cli/app/app-describe.js +22 -0
- package/esm/cli/app/app-describe.js.map +1 -0
- package/esm/cli/app/app-export.js +44 -0
- package/esm/cli/app/app-export.js.map +1 -0
- package/esm/cli/app/app-import.js +45 -0
- package/esm/cli/app/app-import.js.map +1 -0
- package/esm/cli/app/app-list.js +27 -0
- package/esm/cli/app/app-list.js.map +1 -0
- package/esm/cli/app/app.js +20 -0
- package/esm/cli/app/app.js.map +1 -0
- package/esm/cli/cmd_common.js +77 -0
- package/esm/cli/cmd_common.js.map +1 -0
- package/esm/cli/conn/conn-add.js +37 -0
- package/esm/cli/conn/conn-add.js.map +1 -0
- package/esm/cli/conn/conn-delete.js +14 -0
- package/esm/cli/conn/conn-delete.js.map +1 -0
- package/esm/cli/conn/conn-describe.js +14 -0
- package/esm/cli/conn/conn-describe.js.map +1 -0
- package/esm/cli/conn/conn-list.js +16 -0
- package/esm/cli/conn/conn-list.js.map +1 -0
- package/esm/cli/conn/conn.js +17 -0
- package/esm/cli/conn/conn.js.map +1 -0
- package/esm/cli/email/email-template-export.js +44 -0
- package/esm/cli/email/email-template-export.js.map +1 -0
- package/esm/cli/email/email-template-import.js +49 -0
- package/esm/cli/email/email-template-import.js.map +1 -0
- package/esm/cli/email/email-template-list.js +27 -0
- package/esm/cli/email/email-template-list.js.map +1 -0
- package/esm/cli/email/email-template.js +8 -0
- package/esm/cli/email/email-template.js.map +1 -0
- package/esm/cli/email/email.js +13 -0
- package/esm/cli/email/email.js.map +1 -0
- package/esm/cli/esv/esv-apply.js +67 -0
- package/esm/cli/esv/esv-apply.js.map +1 -0
- package/esm/cli/esv/esv-secret-create.js +27 -0
- package/esm/cli/esv/esv-secret-create.js.map +1 -0
- package/esm/cli/esv/esv-secret-delete.js +39 -0
- package/esm/cli/esv/esv-secret-delete.js.map +1 -0
- package/esm/cli/esv/esv-secret-describe.js +27 -0
- package/esm/cli/esv/esv-secret-describe.js.map +1 -0
- package/esm/cli/esv/esv-secret-export.js +22 -0
- package/esm/cli/esv/esv-secret-export.js.map +1 -0
- package/esm/cli/esv/esv-secret-import.js +22 -0
- package/esm/cli/esv/esv-secret-import.js.map +1 -0
- package/esm/cli/esv/esv-secret-list.js +27 -0
- package/esm/cli/esv/esv-secret-list.js.map +1 -0
- package/esm/cli/esv/esv-secret-set.js +27 -0
- package/esm/cli/esv/esv-secret-set.js.map +1 -0
- package/esm/cli/esv/esv-secret-version-activate.js +34 -0
- package/esm/cli/esv/esv-secret-version-activate.js.map +1 -0
- package/esm/cli/esv/esv-secret-version-create.js +27 -0
- package/esm/cli/esv/esv-secret-version-create.js.map +1 -0
- package/esm/cli/esv/esv-secret-version-deactivate.js +34 -0
- package/esm/cli/esv/esv-secret-version-deactivate.js.map +1 -0
- package/esm/cli/esv/esv-secret-version-delete.js +39 -0
- package/esm/cli/esv/esv-secret-version-delete.js.map +1 -0
- package/esm/cli/esv/esv-secret-version-list.js +27 -0
- package/esm/cli/esv/esv-secret-version-list.js.map +1 -0
- package/esm/cli/esv/esv-secret-version.js +10 -0
- package/esm/cli/esv/esv-secret-version.js.map +1 -0
- package/esm/cli/esv/esv-secret.js +13 -0
- package/esm/cli/esv/esv-secret.js.map +1 -0
- package/esm/cli/esv/esv-variable-create.js +27 -0
- package/esm/cli/esv/esv-variable-create.js.map +1 -0
- package/esm/cli/esv/esv-variable-delete.js +39 -0
- package/esm/cli/esv/esv-variable-delete.js.map +1 -0
- package/esm/cli/esv/esv-variable-describe.js +27 -0
- package/esm/cli/esv/esv-variable-describe.js.map +1 -0
- package/esm/cli/esv/esv-variable-export.js +22 -0
- package/esm/cli/esv/esv-variable-export.js.map +1 -0
- package/esm/cli/esv/esv-variable-import.js +22 -0
- package/esm/cli/esv/esv-variable-import.js.map +1 -0
- package/esm/cli/esv/esv-variable-list.js +27 -0
- package/esm/cli/esv/esv-variable-list.js.map +1 -0
- package/esm/cli/esv/esv-variable-set.js +37 -0
- package/esm/cli/esv/esv-variable-set.js.map +1 -0
- package/esm/cli/esv/esv-variable.js +12 -0
- package/esm/cli/esv/esv-variable.js.map +1 -0
- package/esm/cli/esv/esv.js +15 -0
- package/esm/cli/esv/esv.js.map +1 -0
- package/esm/cli/idm/idm-count.js +27 -0
- package/esm/cli/idm/idm-count.js.map +1 -0
- package/esm/cli/idm/idm-export.js +44 -0
- package/esm/cli/idm/idm-export.js.map +1 -0
- package/esm/cli/idm/idm-list.js +30 -0
- package/esm/cli/idm/idm-list.js.map +1 -0
- package/esm/cli/idm/idm.js +16 -0
- package/esm/cli/idm/idm.js.map +1 -0
- package/esm/cli/idp/idp-export.js +44 -0
- package/esm/cli/idp/idp-export.js.map +1 -0
- package/esm/cli/idp/idp-import.js +49 -0
- package/esm/cli/idp/idp-import.js.map +1 -0
- package/esm/cli/idp/idp-list.js +30 -0
- package/esm/cli/idp/idp-list.js.map +1 -0
- package/esm/cli/idp/idp.js +15 -0
- package/esm/cli/idp/idp.js.map +1 -0
- package/esm/cli/info/info.js +48 -0
- package/esm/cli/info/info.js.map +1 -0
- package/esm/cli/journey/journey-delete.e2e.test_.js.map +1 -0
- package/esm/cli/journey/journey-delete.js +39 -0
- package/esm/cli/journey/journey-delete.js.map +1 -0
- package/esm/cli/journey/journey-describe.js +100 -0
- package/esm/cli/journey/journey-describe.js.map +1 -0
- package/esm/cli/journey/journey-disable.js +46 -0
- package/esm/cli/journey/journey-disable.js.map +1 -0
- package/esm/cli/journey/journey-enable.js +46 -0
- package/esm/cli/journey/journey-enable.js.map +1 -0
- package/esm/cli/journey/journey-export.js +56 -0
- package/esm/cli/journey/journey-export.js.map +1 -0
- package/esm/cli/journey/journey-import.js +65 -0
- package/esm/cli/journey/journey-import.js.map +1 -0
- package/esm/cli/journey/journey-list.e2e.test_.js.map +1 -0
- package/esm/cli/journey/journey-list.js +27 -0
- package/esm/cli/journey/journey-list.js.map +1 -0
- package/esm/cli/journey/journey-prune.js +41 -0
- package/esm/cli/journey/journey-prune.js.map +1 -0
- package/esm/cli/journey/journey.js +20 -0
- package/esm/cli/journey/journey.js.map +1 -0
- package/esm/cli/logging/logs-list.js +66 -0
- package/esm/cli/logging/logs-list.js.map +1 -0
- package/esm/cli/logging/logs-tail.js +60 -0
- package/esm/cli/logging/logs-tail.js.map +1 -0
- package/esm/cli/logging/logs.js +13 -0
- package/esm/cli/logging/logs.js.map +1 -0
- package/esm/cli/realm/realm-add-custom-domain.js +27 -0
- package/esm/cli/realm/realm-add-custom-domain.js.map +1 -0
- package/esm/cli/realm/realm-describe.js +30 -0
- package/esm/cli/realm/realm-describe.js.map +1 -0
- package/esm/cli/realm/realm-list.js +27 -0
- package/esm/cli/realm/realm-list.js.map +1 -0
- package/esm/cli/realm/realm-remove-custom-domain.js +27 -0
- package/esm/cli/realm/realm-remove-custom-domain.js.map +1 -0
- package/esm/cli/realm/realm.js +18 -0
- package/esm/cli/realm/realm.js.map +1 -0
- package/esm/cli/saml/saml-cot-export.js +44 -0
- package/esm/cli/saml/saml-cot-export.js.map +1 -0
- package/esm/cli/saml/saml-cot-import.js +49 -0
- package/esm/cli/saml/saml-cot-import.js.map +1 -0
- package/esm/cli/saml/saml-cot-list.js +27 -0
- package/esm/cli/saml/saml-cot-list.js.map +1 -0
- package/esm/cli/saml/saml-cot.js +8 -0
- package/esm/cli/saml/saml-cot.js.map +1 -0
- package/esm/cli/saml/saml-describe.js +27 -0
- package/esm/cli/saml/saml-describe.js.map +1 -0
- package/esm/cli/saml/saml-export.js +44 -0
- package/esm/cli/saml/saml-export.js.map +1 -0
- package/esm/cli/saml/saml-import.js +49 -0
- package/esm/cli/saml/saml-import.js.map +1 -0
- package/esm/cli/saml/saml-list.js +27 -0
- package/esm/cli/saml/saml-list.js.map +1 -0
- package/esm/cli/saml/saml-metadata-export.js +39 -0
- package/esm/cli/saml/saml-metadata-export.js.map +1 -0
- package/esm/cli/saml/saml-metadata.js +6 -0
- package/esm/cli/saml/saml-metadata.js.map +1 -0
- package/esm/cli/saml/saml.js +18 -0
- package/esm/cli/saml/saml.js.map +1 -0
- package/esm/cli/script/script-delete.js +22 -0
- package/esm/cli/script/script-delete.js.map +1 -0
- package/esm/cli/script/script-describe.js +22 -0
- package/esm/cli/script/script-describe.js.map +1 -0
- package/esm/cli/script/script-export.js +55 -0
- package/esm/cli/script/script-export.js.map +1 -0
- package/esm/cli/script/script-import.js +28 -0
- package/esm/cli/script/script-import.js.map +1 -0
- package/esm/cli/script/script-list.js +27 -0
- package/esm/cli/script/script-list.js.map +1 -0
- package/esm/cli/script/script.js +17 -0
- package/esm/cli/script/script.js.map +1 -0
- package/esm/cli/theme/theme-delete.e2e.test_.js.map +1 -0
- package/esm/cli/theme/theme-delete.js +44 -0
- package/esm/cli/theme/theme-delete.js.map +1 -0
- package/esm/cli/theme/theme-export.js +49 -0
- package/esm/cli/theme/theme-export.js.map +1 -0
- package/esm/cli/theme/theme-import.js +54 -0
- package/esm/cli/theme/theme-import.js.map +1 -0
- package/esm/cli/theme/theme-list.e2e.test_.js.map +1 -0
- package/esm/cli/theme/theme-list.js +27 -0
- package/esm/cli/theme/theme-list.js.map +1 -0
- package/esm/cli/theme/theme.js +16 -0
- package/esm/cli/theme/theme.js.map +1 -0
- package/esm/ops/CirclesOfTrustOps.js +12 -0
- package/esm/ops/CirclesOfTrustOps.js.map +1 -0
- package/esm/ops/EmailTemplateOps.js +10 -0
- package/esm/ops/EmailTemplateOps.js.map +1 -0
- package/esm/ops/IdpOps.js +10 -0
- package/esm/ops/IdpOps.js.map +1 -0
- package/esm/ops/JourneyOps.js +203 -0
- package/esm/ops/JourneyOps.js.map +1 -0
- package/esm/ops/NodeOps.js +36 -0
- package/esm/ops/NodeOps.js.map +1 -0
- package/esm/ops/Saml2Ops.js +23 -0
- package/esm/ops/Saml2Ops.js.map +1 -0
- package/esm/ops/ScriptOps.js +10 -0
- package/esm/ops/ScriptOps.js.map +1 -0
- package/esm/ops/ThemeOps.js +10 -0
- package/esm/ops/ThemeOps.js.map +1 -0
- package/esm/ops/utils/Wordwrap.js +5 -0
- package/esm/ops/utils/Wordwrap.js.map +1 -0
- package/esm/storage/StaticStorage.js +12 -0
- package/esm/storage/StaticStorage.js.map +1 -0
- package/esm/utils/Config.js +54 -0
- package/esm/utils/Config.js.map +1 -0
- package/esm/utils/Console.js +532 -0
- package/esm/utils/Console.js.map +1 -0
- package/package.json +3 -2
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"logs-list.js","names":["Authenticate","ConnectionProfile","Log","state","Command","common","provisionCreds","getLogSources","getConnectionProfile","saveConnectionProfile","getTokens","program","description","helpOption","addArgument","hostArgumentM","userArgument","passwordArgument","addOption","insecureOption","action","host","user","password","options","credsFromParameters","default","session","setTenant","setUsername","setPassword","setAllowInsecureConnection","insecure","console","log","conn","tenant","key","secret","setLogApiKey","setLogApiSecret","username","getUsername","getPassword","creds","api_key_id","api_key_secret","sources","length","forEach","source","parse"],"sources":["cli/logging/logs-list.ts"],"sourcesContent":["import {\n Authenticate,\n ConnectionProfile,\n Log,\n state,\n} from '@rockcarver/frodo-lib';\nimport { Command } from 'commander';\nimport * as common from '../cmd_common.js';\n\nconst { provisionCreds, getLogSources } = Log;\nconst { getConnectionProfile, saveConnectionProfile } = ConnectionProfile;\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo logs list');\nprogram\n .description('List available ID Cloud log sources.')\n .helpOption('-h, --help', 'Help')\n .addArgument(common.hostArgumentM)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.insecureOption)\n .action(async (host, user, password, options) => {\n let credsFromParameters = true;\n state.default.session.setTenant(host);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setAllowInsecureConnection(options.insecure);\n console.log('Listing available ID Cloud log sources...');\n const conn = await getConnectionProfile();\n state.default.session.setTenant(conn.tenant);\n if (conn.key != null && conn.secret != null) {\n credsFromParameters = false;\n state.default.session.setLogApiKey(conn.key);\n state.default.session.setLogApiSecret(conn.secret);\n } else {\n if (conn.username == null && conn.password == null) {\n if (\n !state.default.session.getUsername() &&\n !state.default.session.getPassword()\n ) {\n credsFromParameters = false;\n console.log(\n 'User credentials not specified as parameters and no saved API key and secret found!',\n 'warn'\n );\n return;\n }\n } else {\n state.default.session.setUsername(conn.username);\n state.default.session.setPassword(conn.password);\n }\n if (await getTokens()) {\n const creds = await provisionCreds();\n state.default.session.setLogApiKey(creds.api_key_id);\n state.default.session.setLogApiSecret(creds.api_key_secret);\n }\n }\n\n const sources = await getLogSources();\n if (sources.length === 0) {\n console.log(\n \"Can't get sources, possible cause - wrong API key or secret\",\n 'error'\n );\n } else {\n if (credsFromParameters) await saveConnectionProfile(); // save new values if they were specified on CLI\n console.log('Available log sources:');\n sources.forEach((source) => {\n console.log(`${source}`, 'info');\n });\n console.log('You can use any combination of comma separated sources.');\n console.log('For example:');\n console.log(`$ frodo logs tail -c am-core,idm-core ${host}`, 'info');\n }\n });\n\nprogram.parse();\n"],"mappings":"AAAA,SACEA,YADF,EAEEC,iBAFF,EAGEC,GAHF,EAIEC,KAJF,QAKO,uBALP;AAMA,SAASC,OAAT,QAAwB,WAAxB;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC,cAAF;EAAkBC;AAAlB,IAAoCL,GAA1C;AACA,MAAM;EAAEM,oBAAF;EAAwBC;AAAxB,IAAkDR,iBAAxD;AACA,MAAM;EAAES;AAAF,IAAgBV,YAAtB;AAEA,MAAMW,OAAO,GAAG,IAAIP,OAAJ,CAAY,iBAAZ,CAAhB;AACAO,OAAO,CACJC,WADH,CACe,sCADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,WAHH,CAGeT,MAAM,CAACU,aAHtB,EAIGD,WAJH,CAIeT,MAAM,CAACW,YAJtB,EAKGF,WALH,CAKeT,MAAM,CAACY,gBALtB,EAMGC,SANH,CAMab,MAAM,CAACc,cANpB,EAOGC,MAPH,CAOU,OAAOC,IAAP,EAAaC,IAAb,EAAmBC,QAAnB,EAA6BC,OAA7B,KAAyC;EAC/C,IAAIC,mBAAmB,GAAG,IAA1B;EACAtB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAlB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBE,WAAtB,CAAkCP,IAAlC;EACAnB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,QAAlC;EACApB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBI,0BAAtB,CAAiDP,OAAO,CAACQ,QAAzD;EACAC,OAAO,CAACC,GAAR,CAAY,2CAAZ;EACA,MAAMC,IAAI,GAAG,MAAM3B,oBAAoB,EAAvC;EACAL,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCO,IAAI,CAACC,MAArC;;EACA,IAAID,IAAI,CAACE,GAAL,IAAY,IAAZ,IAAoBF,IAAI,CAACG,MAAL,IAAe,IAAvC,EAA6C;IAC3Cb,mBAAmB,GAAG,KAAtB;IACAtB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBY,YAAtB,CAAmCJ,IAAI,CAACE,GAAxC;IACAlC,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBa,eAAtB,CAAsCL,IAAI,CAACG,MAA3C;EACD,CAJD,MAIO;IACL,IAAIH,IAAI,CAACM,QAAL,IAAiB,IAAjB,IAAyBN,IAAI,CAACZ,QAAL,IAAiB,IAA9C,EAAoD;MAClD,IACE,CAACpB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBe,WAAtB,EAAD,IACA,CAACvC,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBgB,WAAtB,EAFH,EAGE;QACAlB,mBAAmB,GAAG,KAAtB;QACAQ,OAAO,CAACC,GAAR,CACE,qFADF,EAEE,MAFF;QAIA;MACD;IACF,CAZD,MAYO;MACL/B,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBE,WAAtB,CAAkCM,IAAI,CAACM,QAAvC;MACAtC,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCK,IAAI,CAACZ,QAAvC;IACD;;IACD,IAAI,MAAMb,SAAS,EAAnB,EAAuB;MACrB,MAAMkC,KAAK,GAAG,MAAMtC,cAAc,EAAlC;MACAH,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBY,YAAtB,CAAmCK,KAAK,CAACC,UAAzC;MACA1C,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBa,eAAtB,CAAsCI,KAAK,CAACE,cAA5C;IACD;EACF;;EAED,MAAMC,OAAO,GAAG,MAAMxC,aAAa,EAAnC;;EACA,IAAIwC,OAAO,CAACC,MAAR,KAAmB,CAAvB,EAA0B;IACxBf,OAAO,CAACC,GAAR,CACE,6DADF,EAEE,OAFF;EAID,CALD,MAKO;IACL,IAAIT,mBAAJ,EAAyB,MAAMhB,qBAAqB,EAA3B,CADpB,CACmD;;IACxDwB,OAAO,CAACC,GAAR,CAAY,wBAAZ;IACAa,OAAO,CAACE,OAAR,CAAiBC,MAAD,IAAY;MAC1BjB,OAAO,CAACC,GAAR,CAAa,GAAEgB,MAAO,EAAtB,EAAyB,MAAzB;IACD,CAFD;IAGAjB,OAAO,CAACC,GAAR,CAAY,yDAAZ;IACAD,OAAO,CAACC,GAAR,CAAY,cAAZ;IACAD,OAAO,CAACC,GAAR,CAAa,yCAAwCb,IAAK,EAA1D,EAA6D,MAA7D;EACD;AACF,CA5DH;AA8DAV,OAAO,CAACwC,KAAR"}
|
|
@@ -0,0 +1,60 @@
|
|
|
1
|
+
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, ConnectionProfile, Log, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
import * as config from '../../utils/Config.js';
|
|
5
|
+
const {
|
|
6
|
+
provisionCreds,
|
|
7
|
+
tailLogs,
|
|
8
|
+
resolveLevel
|
|
9
|
+
} = Log;
|
|
10
|
+
const {
|
|
11
|
+
getConnectionProfile,
|
|
12
|
+
saveConnectionProfile
|
|
13
|
+
} = ConnectionProfile;
|
|
14
|
+
const {
|
|
15
|
+
getTokens
|
|
16
|
+
} = Authenticate;
|
|
17
|
+
const program = new Command('frodo logs tail');
|
|
18
|
+
program.description('Tail Identity Cloud logs.').helpOption('-h, --help', 'Help').addArgument(common.hostArgumentM).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.insecureOption).addOption(common.sourcesOptionM).addOption(new Option('-l, --level <level>', 'Set log level filter. You can specify the level as a number or a string. \
|
|
19
|
+
Following values are possible (values on the same line are equivalent): \
|
|
20
|
+
\n0, SEVERE, FATAL, or ERROR\n1, WARNING, WARN or CONFIG\
|
|
21
|
+
\n2, INFO or INFORMATION\n3, DEBUG, FINE, FINER or FINEST\
|
|
22
|
+
\n4 or ALL').default('ERROR', `${resolveLevel('ERROR')}`)).addOption(new Option('-t, --transaction-id <txid>', 'Filter by transactionId')).addOption(new Option('-d, --defaults', 'Use default logging noise filters').default(false, `Use custom logging noise filters defined in ${config.getConfigPath()}/${config.FRODO_LOG_NOISEFILTER_FILENAME}`)).action(async (host, user, password, options, command) => {
|
|
23
|
+
let credsFromParameters = true;
|
|
24
|
+
state.default.session.setTenant(host);
|
|
25
|
+
state.default.session.setUsername(user);
|
|
26
|
+
state.default.session.setPassword(password);
|
|
27
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
28
|
+
const conn = await getConnectionProfile();
|
|
29
|
+
state.default.session.setTenant(conn.tenant);
|
|
30
|
+
|
|
31
|
+
if (conn.key != null && conn.secret != null) {
|
|
32
|
+
credsFromParameters = false;
|
|
33
|
+
state.default.session.setLogApiKey(conn.key);
|
|
34
|
+
state.default.session.setLogApiSecret(conn.secret);
|
|
35
|
+
} else {
|
|
36
|
+
if (conn.username == null && conn.password == null) {
|
|
37
|
+
if (!state.default.session.getUsername() && !state.default.session.getPassword()) {
|
|
38
|
+
credsFromParameters = false;
|
|
39
|
+
console.log('User credentials not specified as parameters and no saved API key and secret found!', 'warn');
|
|
40
|
+
return;
|
|
41
|
+
}
|
|
42
|
+
} else {
|
|
43
|
+
state.default.session.setUsername(conn.username);
|
|
44
|
+
state.default.session.setPassword(conn.password);
|
|
45
|
+
}
|
|
46
|
+
|
|
47
|
+
if (await getTokens()) {
|
|
48
|
+
const creds = await provisionCreds();
|
|
49
|
+
state.default.session.setLogApiKey(creds.api_key_id);
|
|
50
|
+
state.default.session.setLogApiSecret(creds.api_key_secret);
|
|
51
|
+
}
|
|
52
|
+
}
|
|
53
|
+
|
|
54
|
+
console.log(`Tailing ID Cloud logs from the following sources: ${command.opts().sources} and levels [${resolveLevel(command.opts().level)}]...`);
|
|
55
|
+
if (credsFromParameters) await saveConnectionProfile(); // save new values if they were specified on CLI
|
|
56
|
+
|
|
57
|
+
await tailLogs(command.opts().sources, resolveLevel(command.opts().level), command.opts().transactionId, null, config.getNoiseFilters(options.defaults));
|
|
58
|
+
});
|
|
59
|
+
program.parse();
|
|
60
|
+
//# sourceMappingURL=logs-tail.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"logs-tail.js","names":["Command","Option","Authenticate","ConnectionProfile","Log","state","common","config","provisionCreds","tailLogs","resolveLevel","getConnectionProfile","saveConnectionProfile","getTokens","program","description","helpOption","addArgument","hostArgumentM","userArgument","passwordArgument","addOption","insecureOption","sourcesOptionM","default","getConfigPath","FRODO_LOG_NOISEFILTER_FILENAME","action","host","user","password","options","command","credsFromParameters","session","setTenant","setUsername","setPassword","setAllowInsecureConnection","insecure","conn","tenant","key","secret","setLogApiKey","setLogApiSecret","username","getUsername","getPassword","console","log","creds","api_key_id","api_key_secret","opts","sources","level","transactionId","getNoiseFilters","defaults","parse"],"sources":["cli/logging/logs-tail.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport {\n Authenticate,\n ConnectionProfile,\n Log,\n state,\n} from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport * as config from '../../utils/Config.js';\n\nconst { provisionCreds, tailLogs, resolveLevel } = Log;\nconst { getConnectionProfile, saveConnectionProfile } = ConnectionProfile;\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo logs tail');\nprogram\n .description('Tail Identity Cloud logs.')\n .helpOption('-h, --help', 'Help')\n .addArgument(common.hostArgumentM)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.insecureOption)\n .addOption(common.sourcesOptionM)\n .addOption(\n new Option(\n '-l, --level <level>',\n 'Set log level filter. You can specify the level as a number or a string. \\\nFollowing values are possible (values on the same line are equivalent): \\\n\\n0, SEVERE, FATAL, or ERROR\\n1, WARNING, WARN or CONFIG\\\n\\n2, INFO or INFORMATION\\n3, DEBUG, FINE, FINER or FINEST\\\n\\n4 or ALL'\n ).default('ERROR', `${resolveLevel('ERROR')}`)\n )\n .addOption(\n new Option('-t, --transaction-id <txid>', 'Filter by transactionId')\n )\n .addOption(\n new Option('-d, --defaults', 'Use default logging noise filters').default(\n false,\n `Use custom logging noise filters defined in ${config.getConfigPath()}/${config.FRODO_LOG_NOISEFILTER_FILENAME}`\n )\n )\n .action(async (host, user, password, options, command) => {\n let credsFromParameters = true;\n state.default.session.setTenant(host);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setAllowInsecureConnection(options.insecure);\n const conn = await getConnectionProfile();\n state.default.session.setTenant(conn.tenant);\n if (conn.key != null && conn.secret != null) {\n credsFromParameters = false;\n state.default.session.setLogApiKey(conn.key);\n state.default.session.setLogApiSecret(conn.secret);\n } else {\n if (conn.username == null && conn.password == null) {\n if (\n !state.default.session.getUsername() &&\n !state.default.session.getPassword()\n ) {\n credsFromParameters = false;\n console.log(\n 'User credentials not specified as parameters and no saved API key and secret found!',\n 'warn'\n );\n return;\n }\n } else {\n state.default.session.setUsername(conn.username);\n state.default.session.setPassword(conn.password);\n }\n if (await getTokens()) {\n const creds = await provisionCreds();\n state.default.session.setLogApiKey(creds.api_key_id);\n state.default.session.setLogApiSecret(creds.api_key_secret);\n }\n }\n console.log(\n `Tailing ID Cloud logs from the following sources: ${\n command.opts().sources\n } and levels [${resolveLevel(command.opts().level)}]...`\n );\n if (credsFromParameters) await saveConnectionProfile(); // save new values if they were specified on CLI\n await tailLogs(\n command.opts().sources,\n resolveLevel(command.opts().level),\n command.opts().transactionId,\n null,\n config.getNoiseFilters(options.defaults)\n );\n });\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SACEC,YADF,EAEEC,iBAFF,EAGEC,GAHF,EAIEC,KAJF,QAKO,uBALP;AAMA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AACA,OAAO,KAAKC,MAAZ,MAAwB,uBAAxB;AAEA,MAAM;EAAEC,cAAF;EAAkBC,QAAlB;EAA4BC;AAA5B,IAA6CN,GAAnD;AACA,MAAM;EAAEO,oBAAF;EAAwBC;AAAxB,IAAkDT,iBAAxD;AACA,MAAM;EAAEU;AAAF,IAAgBX,YAAtB;AAEA,MAAMY,OAAO,GAAG,IAAId,OAAJ,CAAY,iBAAZ,CAAhB;AACAc,OAAO,CACJC,WADH,CACe,2BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,WAHH,CAGeX,MAAM,CAACY,aAHtB,EAIGD,WAJH,CAIeX,MAAM,CAACa,YAJtB,EAKGF,WALH,CAKeX,MAAM,CAACc,gBALtB,EAMGC,SANH,CAMaf,MAAM,CAACgB,cANpB,EAOGD,SAPH,CAOaf,MAAM,CAACiB,cAPpB,EAQGF,SARH,CASI,IAAIpB,MAAJ,CACE,qBADF,EAEE;AACN;AACA;AACA;AACA,WANI,EAOEuB,OAPF,CAOU,OAPV,EAOoB,GAAEd,YAAY,CAAC,OAAD,CAAU,EAP5C,CATJ,EAkBGW,SAlBH,CAmBI,IAAIpB,MAAJ,CAAW,6BAAX,EAA0C,yBAA1C,CAnBJ,EAqBGoB,SArBH,CAsBI,IAAIpB,MAAJ,CAAW,gBAAX,EAA6B,mCAA7B,EAAkEuB,OAAlE,CACE,KADF,EAEG,+CAA8CjB,MAAM,CAACkB,aAAP,EAAuB,IAAGlB,MAAM,CAACmB,8BAA+B,EAFjH,CAtBJ,EA2BGC,MA3BH,CA2BU,OAAOC,IAAP,EAAaC,IAAb,EAAmBC,QAAnB,EAA6BC,OAA7B,EAAsCC,OAAtC,KAAkD;EACxD,IAAIC,mBAAmB,GAAG,IAA1B;EACA5B,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAvB,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBE,WAAtB,CAAkCP,IAAlC;EACAxB,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBG,WAAtB,CAAkCP,QAAlC;EACAzB,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBI,0BAAtB,CAAiDP,OAAO,CAACQ,QAAzD;EACA,MAAMC,IAAI,GAAG,MAAM7B,oBAAoB,EAAvC;EACAN,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBC,SAAtB,CAAgCK,IAAI,CAACC,MAArC;;EACA,IAAID,IAAI,CAACE,GAAL,IAAY,IAAZ,IAAoBF,IAAI,CAACG,MAAL,IAAe,IAAvC,EAA6C;IAC3CV,mBAAmB,GAAG,KAAtB;IACA5B,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBU,YAAtB,CAAmCJ,IAAI,CAACE,GAAxC;IACArC,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBW,eAAtB,CAAsCL,IAAI,CAACG,MAA3C;EACD,CAJD,MAIO;IACL,IAAIH,IAAI,CAACM,QAAL,IAAiB,IAAjB,IAAyBN,IAAI,CAACV,QAAL,IAAiB,IAA9C,EAAoD;MAClD,IACE,CAACzB,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBa,WAAtB,EAAD,IACA,CAAC1C,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBc,WAAtB,EAFH,EAGE;QACAf,mBAAmB,GAAG,KAAtB;QACAgB,OAAO,CAACC,GAAR,CACE,qFADF,EAEE,MAFF;QAIA;MACD;IACF,CAZD,MAYO;MACL7C,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBE,WAAtB,CAAkCI,IAAI,CAACM,QAAvC;MACAzC,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBG,WAAtB,CAAkCG,IAAI,CAACV,QAAvC;IACD;;IACD,IAAI,MAAMjB,SAAS,EAAnB,EAAuB;MACrB,MAAMsC,KAAK,GAAG,MAAM3C,cAAc,EAAlC;MACAH,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBU,YAAtB,CAAmCO,KAAK,CAACC,UAAzC;MACA/C,KAAK,CAACmB,OAAN,CAAcU,OAAd,CAAsBW,eAAtB,CAAsCM,KAAK,CAACE,cAA5C;IACD;EACF;;EACDJ,OAAO,CAACC,GAAR,CACG,qDACClB,OAAO,CAACsB,IAAR,GAAeC,OAChB,gBAAe7C,YAAY,CAACsB,OAAO,CAACsB,IAAR,GAAeE,KAAhB,CAAuB,MAHrD;EAKA,IAAIvB,mBAAJ,EAAyB,MAAMrB,qBAAqB,EAA3B,CAxC+B,CAwCA;;EACxD,MAAMH,QAAQ,CACZuB,OAAO,CAACsB,IAAR,GAAeC,OADH,EAEZ7C,YAAY,CAACsB,OAAO,CAACsB,IAAR,GAAeE,KAAhB,CAFA,EAGZxB,OAAO,CAACsB,IAAR,GAAeG,aAHH,EAIZ,IAJY,EAKZlD,MAAM,CAACmD,eAAP,CAAuB3B,OAAO,CAAC4B,QAA/B,CALY,CAAd;AAOD,CA3EH;AA6EA7C,OAAO,CAAC8C,KAAR"}
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
import { Command } from 'commander';
|
|
2
|
+
import path from 'path';
|
|
3
|
+
import { fileURLToPath } from 'url';
|
|
4
|
+
|
|
5
|
+
const __dirname = path.dirname(fileURLToPath(import.meta.url));
|
|
6
|
+
|
|
7
|
+
export default function setup() {
|
|
8
|
+
const program = new Command('logs').summary('List/View Identity Cloud logs').description(`View Identity Cloud logs. If valid tenant admin credentials are specified, a log API key and secret are automatically created for that admin user.`).helpOption('-h, --help', 'Help').executableDir(__dirname);
|
|
9
|
+
program.command('list', 'List available ID Cloud log sources.').showHelpAfterError();
|
|
10
|
+
program.command('tail', 'Tail Identity Cloud logs.').showHelpAfterError();
|
|
11
|
+
return program;
|
|
12
|
+
}
|
|
13
|
+
//# sourceMappingURL=logs.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"logs.js","names":["Command","path","fileURLToPath","__dirname","dirname","import","meta","url","setup","program","summary","description","helpOption","executableDir","command","showHelpAfterError"],"sources":["cli/logging/logs.ts"],"sourcesContent":["import { Command } from 'commander';\nimport path from 'path';\nimport { fileURLToPath } from 'url';\n\nconst __dirname = path.dirname(fileURLToPath(import.meta.url));\n\nexport default function setup() {\n const program = new Command('logs')\n .summary('List/View Identity Cloud logs')\n .description(\n `View Identity Cloud logs. If valid tenant admin credentials are specified, a log API key and secret are automatically created for that admin user.`\n )\n .helpOption('-h, --help', 'Help')\n .executableDir(__dirname);\n\n program\n .command('list', 'List available ID Cloud log sources.')\n .showHelpAfterError();\n program.command('tail', 'Tail Identity Cloud logs.').showHelpAfterError();\n return program;\n}\n"],"mappings":"AAAA,SAASA,OAAT,QAAwB,WAAxB;AACA,OAAOC,IAAP,MAAiB,MAAjB;AACA,SAASC,aAAT,QAA8B,KAA9B;;AAEA,MAAMC,SAAS,GAAGF,IAAI,CAACG,OAAL,CAAaF,aAAa,CAACG,MAAM,CAACC,IAAP,CAAYC,GAAb,CAA1B,CAAlB;;AAEA,eAAe,SAASC,KAAT,GAAiB;EAC9B,MAAMC,OAAO,GAAG,IAAIT,OAAJ,CAAY,MAAZ,EACbU,OADa,CACL,+BADK,EAEbC,WAFa,CAGX,oJAHW,EAKbC,UALa,CAKF,YALE,EAKY,MALZ,EAMbC,aANa,CAMCV,SAND,CAAhB;EAQAM,OAAO,CACJK,OADH,CACW,MADX,EACmB,sCADnB,EAEGC,kBAFH;EAGAN,OAAO,CAACK,OAAR,CAAgB,MAAhB,EAAwB,2BAAxB,EAAqDC,kBAArD;EACA,OAAON,OAAP;AACD"}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Realm, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
const {
|
|
5
|
+
getTokens
|
|
6
|
+
} = Authenticate;
|
|
7
|
+
const {
|
|
8
|
+
addCustomDomain
|
|
9
|
+
} = Realm;
|
|
10
|
+
const program = new Command('frodo realm add-custom-domain');
|
|
11
|
+
program.description('Add custom domain (realm DNS alias).').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-d, --domain <name>', 'Custom DNS domain name.').makeOptionMandatory()).action( // implement command logic inside action handler
|
|
12
|
+
async (host, realm, user, password, options) => {
|
|
13
|
+
state.default.session.setTenant(host);
|
|
14
|
+
state.default.session.setRealm(realm);
|
|
15
|
+
state.default.session.setUsername(user);
|
|
16
|
+
state.default.session.setPassword(password);
|
|
17
|
+
state.default.session.setDeploymentType(options.type);
|
|
18
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
19
|
+
|
|
20
|
+
if (await getTokens()) {
|
|
21
|
+
console.log(`Adding custom DNS domain ${options.domain} to realm ${state.default.session.getRealm()}...`);
|
|
22
|
+
await addCustomDomain(state.default.session.getRealm(), options.domain);
|
|
23
|
+
}
|
|
24
|
+
} // end command logic inside action handler
|
|
25
|
+
);
|
|
26
|
+
program.parse();
|
|
27
|
+
//# sourceMappingURL=realm-add-custom-domain.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"realm-add-custom-domain.js","names":["Command","Option","Authenticate","Realm","state","common","getTokens","addCustomDomain","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","makeOptionMandatory","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","domain","getRealm","parse"],"sources":["cli/realm/realm-add-custom-domain.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Realm, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst { addCustomDomain } = Realm;\n\nconst program = new Command('frodo realm add-custom-domain');\n\nprogram\n .description('Add custom domain (realm DNS alias).')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-d, --domain <name>',\n 'Custom DNS domain name.'\n ).makeOptionMandatory()\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log(\n `Adding custom DNS domain ${\n options.domain\n } to realm ${state.default.session.getRealm()}...`\n );\n await addCustomDomain(state.default.session.getRealm(), options.domain);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EAAEK;AAAF,IAAsBJ,KAA5B;AAEA,MAAMK,OAAO,GAAG,IAAIR,OAAJ,CAAY,+BAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,sCADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAWI,IAAIhB,MAAJ,CACE,qBADF,EAEE,yBAFF,EAGEmB,mBAHF,EAXJ,EAgBGC,MAhBH,EAiBI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAlB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAnB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACApB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACArB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA9B,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM9B,SAAS,EAAnB,EAAuB;IACrB+B,OAAO,CAACC,GAAR,CACG,4BACCZ,OAAO,CAACa,MACT,aAAYnC,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EAAiC,KAHhD;IAKA,MAAMjC,eAAe,CAACH,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EAAD,EAAmCd,OAAO,CAACa,MAA3C,CAArB;EACD;AACF,CAjCL,CAkCI;AAlCJ;AAqCA/B,OAAO,CAACiC,KAAR"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
import { Command } from 'commander';
|
|
2
|
+
import { Authenticate, Realm, Utils, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
const {
|
|
5
|
+
getRealmName
|
|
6
|
+
} = Utils;
|
|
7
|
+
const {
|
|
8
|
+
getTokens
|
|
9
|
+
} = Authenticate;
|
|
10
|
+
const {
|
|
11
|
+
describe
|
|
12
|
+
} = Realm;
|
|
13
|
+
const program = new Command('frodo realm describe');
|
|
14
|
+
program.description('Describe realms.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).action( // implement command logic inside action handler
|
|
15
|
+
async (host, realm, user, password, options) => {
|
|
16
|
+
state.default.session.setTenant(host);
|
|
17
|
+
state.default.session.setRealm(realm);
|
|
18
|
+
state.default.session.setUsername(user);
|
|
19
|
+
state.default.session.setPassword(password);
|
|
20
|
+
state.default.session.setDeploymentType(options.type);
|
|
21
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
22
|
+
|
|
23
|
+
if (await getTokens()) {
|
|
24
|
+
console.log(`Retrieving details of realm ${state.default.session.getRealm()}...`);
|
|
25
|
+
describe(getRealmName(state.default.session.getRealm()));
|
|
26
|
+
}
|
|
27
|
+
} // end command logic inside action handler
|
|
28
|
+
);
|
|
29
|
+
program.parse();
|
|
30
|
+
//# sourceMappingURL=realm-describe.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"realm-describe.js","names":["Command","Authenticate","Realm","Utils","state","common","getRealmName","getTokens","describe","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","getRealm","parse"],"sources":["cli/realm/realm-describe.ts"],"sourcesContent":["import { Command } from 'commander';\nimport { Authenticate, Realm, Utils, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getRealmName } = Utils;\nconst { getTokens } = Authenticate;\nconst { describe } = Realm;\n\nconst program = new Command('frodo realm describe');\n\nprogram\n .description('Describe realms.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log(\n `Retrieving details of realm ${state.default.session.getRealm()}...`\n );\n describe(getRealmName(state.default.session.getRealm()));\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,QAAwB,WAAxB;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,EAAqCC,KAArC,QAAkD,uBAAlD;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAmBH,KAAzB;AACA,MAAM;EAAEI;AAAF,IAAgBN,YAAtB;AACA,MAAM;EAAEO;AAAF,IAAeN,KAArB;AAEA,MAAMO,OAAO,GAAG,IAAIT,OAAJ,CAAY,sBAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,kBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGC,MAVH,EAWI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAlB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAnB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACApB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACArB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA9B,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB8B,OAAO,CAACC,GAAR,CACG,+BAA8BlC,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBW,QAAtB,EAAiC,KADlE;IAGA/B,QAAQ,CAACF,YAAY,CAACF,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBW,QAAtB,EAAD,CAAb,CAAR;EACD;AACF,CAzBL,CA0BI;AA1BJ;AA6BA9B,OAAO,CAAC+B,KAAR"}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Realm, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
const {
|
|
5
|
+
listRealms
|
|
6
|
+
} = Realm;
|
|
7
|
+
const {
|
|
8
|
+
getTokens
|
|
9
|
+
} = Authenticate;
|
|
10
|
+
const program = new Command('frodo realm list');
|
|
11
|
+
program.description('List realms.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-l, --long', 'Long with all fields.').default(false, 'false')).action( // implement command logic inside action handler
|
|
12
|
+
async (host, realm, user, password, options) => {
|
|
13
|
+
state.default.session.setTenant(host);
|
|
14
|
+
state.default.session.setRealm(realm);
|
|
15
|
+
state.default.session.setUsername(user);
|
|
16
|
+
state.default.session.setPassword(password);
|
|
17
|
+
state.default.session.setDeploymentType(options.type);
|
|
18
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
19
|
+
|
|
20
|
+
if (await getTokens()) {
|
|
21
|
+
console.log('Listing all realms...');
|
|
22
|
+
await listRealms(options.long);
|
|
23
|
+
}
|
|
24
|
+
} // end command logic inside action handler
|
|
25
|
+
);
|
|
26
|
+
program.parse();
|
|
27
|
+
//# sourceMappingURL=realm-list.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"realm-list.js","names":["Command","Option","Authenticate","Realm","state","common","listRealms","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","long","parse"],"sources":["cli/realm/realm-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Realm, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { listRealms } = Realm;\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo realm list');\n\nprogram\n .description('List realms.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log('Listing all realms...');\n await listRealms(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAiBH,KAAvB;AACA,MAAM;EAAEI;AAAF,IAAgBL,YAAtB;AAEA,MAAMM,OAAO,GAAG,IAAIR,OAAJ,CAAY,kBAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,cADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAWI,IAAIhB,MAAJ,CAAW,YAAX,EAAyB,uBAAzB,EAAkDmB,OAAlD,CAA0D,KAA1D,EAAiE,OAAjE,CAXJ,EAaGC,MAbH,EAcI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAlB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACAnB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACApB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACArB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA7B,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM5B,SAAS,EAAnB,EAAuB;IACrB6B,OAAO,CAACC,GAAR,CAAY,uBAAZ;IACA,MAAM/B,UAAU,CAACoB,OAAO,CAACY,IAAT,CAAhB;EACD;AACF,CA1BL,CA2BI;AA3BJ;AA8BA9B,OAAO,CAAC+B,KAAR"}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Realm, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
const {
|
|
5
|
+
getTokens
|
|
6
|
+
} = Authenticate;
|
|
7
|
+
const {
|
|
8
|
+
removeCustomDomain
|
|
9
|
+
} = Realm;
|
|
10
|
+
const program = new Command('frodo realm remove-custom-domain');
|
|
11
|
+
program.description('Remove custom domain (realm DNS alias).').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-d, --domain <name>', 'Custom DNS domain name.').makeOptionMandatory()).action( // implement command logic inside action handler
|
|
12
|
+
async (host, realm, user, password, options) => {
|
|
13
|
+
state.default.session.setTenant(host);
|
|
14
|
+
state.default.session.setRealm(realm);
|
|
15
|
+
state.default.session.setUsername(user);
|
|
16
|
+
state.default.session.setPassword(password);
|
|
17
|
+
state.default.session.setDeploymentType(options.type);
|
|
18
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
19
|
+
|
|
20
|
+
if (await getTokens()) {
|
|
21
|
+
console.log(`Removing custom DNS domain ${options.domain} from realm ${state.default.session.getRealm()}...`);
|
|
22
|
+
await removeCustomDomain(state.default.session.getRealm(), options.domain);
|
|
23
|
+
}
|
|
24
|
+
} // end command logic inside action handler
|
|
25
|
+
);
|
|
26
|
+
program.parse();
|
|
27
|
+
//# sourceMappingURL=realm-remove-custom-domain.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"realm-remove-custom-domain.js","names":["Command","Option","Authenticate","Realm","state","common","getTokens","removeCustomDomain","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","makeOptionMandatory","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","domain","getRealm","parse"],"sources":["cli/realm/realm-remove-custom-domain.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Realm, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst { removeCustomDomain } = Realm;\n\nconst program = new Command('frodo realm remove-custom-domain');\n\nprogram\n .description('Remove custom domain (realm DNS alias).')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-d, --domain <name>',\n 'Custom DNS domain name.'\n ).makeOptionMandatory()\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log(\n `Removing custom DNS domain ${\n options.domain\n } from realm ${state.default.session.getRealm()}...`\n );\n await removeCustomDomain(\n state.default.session.getRealm(),\n options.domain\n );\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EAAEK;AAAF,IAAyBJ,KAA/B;AAEA,MAAMK,OAAO,GAAG,IAAIR,OAAJ,CAAY,kCAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,yCADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAWI,IAAIhB,MAAJ,CACE,qBADF,EAEE,yBAFF,EAGEmB,mBAHF,EAXJ,EAgBGC,MAhBH,EAiBI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAlB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAnB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACApB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACArB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA9B,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM9B,SAAS,EAAnB,EAAuB;IACrB+B,OAAO,CAACC,GAAR,CACG,8BACCZ,OAAO,CAACa,MACT,eAAcnC,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EAAiC,KAHlD;IAKA,MAAMjC,kBAAkB,CACtBH,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EADsB,EAEtBd,OAAO,CAACa,MAFc,CAAxB;EAID;AACF,CApCL,CAqCI;AArCJ;AAwCA/B,OAAO,CAACiC,KAAR"}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { Command } from 'commander';
|
|
2
|
+
import path from 'path';
|
|
3
|
+
import { fileURLToPath } from 'url';
|
|
4
|
+
|
|
5
|
+
const __dirname = path.dirname(fileURLToPath(import.meta.url));
|
|
6
|
+
|
|
7
|
+
export default function setup() {
|
|
8
|
+
const program = new Command('realm').helpOption('-h, --help', 'Help').description('Manage realms.').executableDir(__dirname);
|
|
9
|
+
program.command('list', 'List realms.').showHelpAfterError();
|
|
10
|
+
program.command('describe', 'Describe realms.') // for backwards compatibility
|
|
11
|
+
.alias('details').showHelpAfterError();
|
|
12
|
+
program.command('add-custom-domain', 'Add custom domain (realm DNS alias).').showHelpAfterError();
|
|
13
|
+
program.command('remove-custom-domain', 'Remove custom domain (realm DNS alias).').showHelpAfterError(); // program.command('delete', 'Delete realms.').showHelpAfterError();
|
|
14
|
+
|
|
15
|
+
program.showHelpAfterError();
|
|
16
|
+
return program;
|
|
17
|
+
}
|
|
18
|
+
//# sourceMappingURL=realm.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"realm.js","names":["Command","path","fileURLToPath","__dirname","dirname","import","meta","url","setup","program","helpOption","description","executableDir","command","showHelpAfterError","alias"],"sources":["cli/realm/realm.ts"],"sourcesContent":["import { Command } from 'commander';\nimport path from 'path';\nimport { fileURLToPath } from 'url';\n\nconst __dirname = path.dirname(fileURLToPath(import.meta.url));\n\nexport default function setup() {\n const program = new Command('realm')\n .helpOption('-h, --help', 'Help')\n .description('Manage realms.')\n .executableDir(__dirname);\n\n program.command('list', 'List realms.').showHelpAfterError();\n\n program\n .command('describe', 'Describe realms.')\n // for backwards compatibility\n .alias('details')\n .showHelpAfterError();\n\n program\n .command('add-custom-domain', 'Add custom domain (realm DNS alias).')\n .showHelpAfterError();\n\n program\n .command('remove-custom-domain', 'Remove custom domain (realm DNS alias).')\n .showHelpAfterError();\n\n // program.command('delete', 'Delete realms.').showHelpAfterError();\n\n program.showHelpAfterError();\n return program;\n}\n"],"mappings":"AAAA,SAASA,OAAT,QAAwB,WAAxB;AACA,OAAOC,IAAP,MAAiB,MAAjB;AACA,SAASC,aAAT,QAA8B,KAA9B;;AAEA,MAAMC,SAAS,GAAGF,IAAI,CAACG,OAAL,CAAaF,aAAa,CAACG,MAAM,CAACC,IAAP,CAAYC,GAAb,CAA1B,CAAlB;;AAEA,eAAe,SAASC,KAAT,GAAiB;EAC9B,MAAMC,OAAO,GAAG,IAAIT,OAAJ,CAAY,OAAZ,EACbU,UADa,CACF,YADE,EACY,MADZ,EAEbC,WAFa,CAED,gBAFC,EAGbC,aAHa,CAGCT,SAHD,CAAhB;EAKAM,OAAO,CAACI,OAAR,CAAgB,MAAhB,EAAwB,cAAxB,EAAwCC,kBAAxC;EAEAL,OAAO,CACJI,OADH,CACW,UADX,EACuB,kBADvB,EAEE;EAFF,CAGGE,KAHH,CAGS,SAHT,EAIGD,kBAJH;EAMAL,OAAO,CACJI,OADH,CACW,mBADX,EACgC,sCADhC,EAEGC,kBAFH;EAIAL,OAAO,CACJI,OADH,CACW,sBADX,EACmC,yCADnC,EAEGC,kBAFH,GAlB8B,CAsB9B;;EAEAL,OAAO,CAACK,kBAAR;EACA,OAAOL,OAAP;AACD"}
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
const {
|
|
5
|
+
getTokens
|
|
6
|
+
} = Authenticate;
|
|
7
|
+
const {
|
|
8
|
+
exportCircleOfTrust,
|
|
9
|
+
exportCirclesOfTrustToFile,
|
|
10
|
+
exportCirclesOfTrustToFiles
|
|
11
|
+
} = CirclesOfTrust;
|
|
12
|
+
const program = new Command('frodo saml cot export');
|
|
13
|
+
program.description('Export SAML circles of trust.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --cot-id <cot-id>', 'Circle of trust id/name. If specified, -a and -A are ignored.')).addOption(new Option('-f, --file [file]', 'Name of the export file. Ignored with -A. Defaults to <cot-id>.cot.saml.json.')).addOption(new Option('-a, --all', 'Export all the circles of trust in a realm to a single file. Ignored with -i.')).addOption(new Option('-A, --all-separate', 'Export all the circles of trust in a realm as separate files <cot-id>.cot.saml.json. Ignored with -i, and -a.')).action( // implement command logic inside action handler
|
|
14
|
+
async (host, realm, user, password, options) => {
|
|
15
|
+
state.default.session.setTenant(host);
|
|
16
|
+
state.default.session.setRealm(realm);
|
|
17
|
+
state.default.session.setUsername(user);
|
|
18
|
+
state.default.session.setPassword(password);
|
|
19
|
+
state.default.session.setDeploymentType(options.type);
|
|
20
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
21
|
+
|
|
22
|
+
if (await getTokens()) {
|
|
23
|
+
// export by id/name
|
|
24
|
+
if (options.cotId) {
|
|
25
|
+
console.log(`Exporting circle of trust "${options.cotId}" from realm "${state.default.session.getRealm()}"...`);
|
|
26
|
+
exportCircleOfTrust(options.cotId, options.file);
|
|
27
|
+
} // --all -a
|
|
28
|
+
else if (options.all) {
|
|
29
|
+
console.log('Exporting all circles of trust to a single file...');
|
|
30
|
+
exportCirclesOfTrustToFile(options.file);
|
|
31
|
+
} // --all-separate -A
|
|
32
|
+
else if (options.allSeparate) {
|
|
33
|
+
console.log('Exporting all circles of trust to separate files...');
|
|
34
|
+
exportCirclesOfTrustToFiles();
|
|
35
|
+
} // unrecognized combination of options or no options
|
|
36
|
+
else {
|
|
37
|
+
console.log('Unrecognized combination of options or no options...', 'error');
|
|
38
|
+
program.help();
|
|
39
|
+
}
|
|
40
|
+
}
|
|
41
|
+
} // end command logic inside action handler
|
|
42
|
+
);
|
|
43
|
+
program.parse();
|
|
44
|
+
//# sourceMappingURL=saml-cot-export.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"saml-cot-export.js","names":["Command","Option","Authenticate","CirclesOfTrust","state","common","getTokens","exportCircleOfTrust","exportCirclesOfTrustToFile","exportCirclesOfTrustToFiles","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","cotId","console","log","getRealm","file","all","allSeparate","help","parse"],"sources":["cli/saml/saml-cot-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst {\n exportCircleOfTrust,\n exportCirclesOfTrustToFile,\n exportCirclesOfTrustToFiles,\n} = CirclesOfTrust;\n\nconst program = new Command('frodo saml cot export');\n\nprogram\n .description('Export SAML circles of trust.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --cot-id <cot-id>',\n 'Circle of trust id/name. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file [file]',\n 'Name of the export file. Ignored with -A. Defaults to <cot-id>.cot.saml.json.'\n )\n )\n .addOption(\n new Option(\n '-a, --all',\n 'Export all the circles of trust in a realm to a single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all the circles of trust in a realm as separate files <cot-id>.cot.saml.json. Ignored with -i, and -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // export by id/name\n if (options.cotId) {\n console.log(\n `Exporting circle of trust \"${\n options.cotId\n }\" from realm \"${state.default.session.getRealm()}\"...`\n );\n exportCircleOfTrust(options.cotId, options.file);\n }\n // --all -a\n else if (options.all) {\n console.log('Exporting all circles of trust to a single file...');\n exportCirclesOfTrustToFile(options.file);\n }\n // --all-separate -A\n else if (options.allSeparate) {\n console.log('Exporting all circles of trust to separate files...');\n exportCirclesOfTrustToFiles();\n }\n // unrecognized combination of options or no options\n else {\n console.log(\n 'Unrecognized combination of options or no options...',\n 'error'\n );\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,cAAvB,EAAuCC,KAAvC,QAAoD,uBAApD;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EACJK,mBADI;EAEJC,0BAFI;EAGJC;AAHI,IAIFN,cAJJ;AAMA,MAAMO,OAAO,GAAG,IAAIV,OAAJ,CAAY,uBAAZ,CAAhB;AAEAU,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeT,MAAM,CAACU,aAJtB,EAKGD,WALH,CAKeT,MAAM,CAACW,aALtB,EAMGF,WANH,CAMeT,MAAM,CAACY,YANtB,EAOGH,WAPH,CAOeT,MAAM,CAACa,gBAPtB,EAQGC,SARH,CAQad,MAAM,CAACe,gBARpB,EASGD,SATH,CASad,MAAM,CAACgB,cATpB,EAUGF,SAVH,CAWI,IAAIlB,MAAJ,CACE,uBADF,EAEE,+DAFF,CAXJ,EAgBGkB,SAhBH,CAiBI,IAAIlB,MAAJ,CACE,mBADF,EAEE,+EAFF,CAjBJ,EAsBGkB,SAtBH,CAuBI,IAAIlB,MAAJ,CACE,WADF,EAEE,+EAFF,CAvBJ,EA4BGkB,SA5BH,CA6BI,IAAIlB,MAAJ,CACE,oBADF,EAEE,+GAFF,CA7BJ,EAkCGqB,MAlCH,EAmCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAnB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACApB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACArB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAtB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA/B,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM/B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIqB,OAAO,CAACW,KAAZ,EAAmB;MACjBC,OAAO,CAACC,GAAR,CACG,8BACCb,OAAO,CAACW,KACT,iBAAgBlC,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EAAiC,MAHpD;MAKAlC,mBAAmB,CAACoB,OAAO,CAACW,KAAT,EAAgBX,OAAO,CAACe,IAAxB,CAAnB;IACD,CAPD,CAQA;IARA,KASK,IAAIf,OAAO,CAACgB,GAAZ,EAAiB;MACpBJ,OAAO,CAACC,GAAR,CAAY,oDAAZ;MACAhC,0BAA0B,CAACmB,OAAO,CAACe,IAAT,CAA1B;IACD,CAHI,CAIL;IAJK,KAKA,IAAIf,OAAO,CAACiB,WAAZ,EAAyB;MAC5BL,OAAO,CAACC,GAAR,CAAY,qDAAZ;MACA/B,2BAA2B;IAC5B,CAHI,CAIL;IAJK,KAKA;MACH8B,OAAO,CAACC,GAAR,CACE,sDADF,EAEE,OAFF;MAIA9B,OAAO,CAACmC,IAAR;IACD;EACF;AACF,CAxEL,CAyEI;AAzEJ;AA4EAnC,OAAO,CAACoC,KAAR"}
|
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
const {
|
|
5
|
+
getTokens
|
|
6
|
+
} = Authenticate;
|
|
7
|
+
const {
|
|
8
|
+
importCircleOfTrust,
|
|
9
|
+
importCirclesOfTrustFromFile,
|
|
10
|
+
importCirclesOfTrustFromFiles,
|
|
11
|
+
importFirstCircleOfTrust
|
|
12
|
+
} = CirclesOfTrust;
|
|
13
|
+
const program = new Command('frodo saml cot import');
|
|
14
|
+
program.description('Import SAML circles of trust.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --cot-id <cot-id>', 'Circle of trust id. If specified, only one circle of trust is imported and the options -a and -A are ignored.')).addOption(new Option('-f, --file <file>', 'Name of the file to import the circle(s) of trust from.')).addOption(new Option('-a, --all', 'Import all circles of trust from single file. Ignored with -i.')).addOption(new Option('-A, --all-separate', 'Import all circles of trust from separate files (*.cot.saml.json) in the current directory. Ignored with -i or -a.')).action( // implement program logic inside action handler
|
|
15
|
+
async (host, realm, user, password, options) => {
|
|
16
|
+
state.default.session.setTenant(host);
|
|
17
|
+
state.default.session.setRealm(realm);
|
|
18
|
+
state.default.session.setUsername(user);
|
|
19
|
+
state.default.session.setPassword(password);
|
|
20
|
+
state.default.session.setDeploymentType(options.type);
|
|
21
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
22
|
+
|
|
23
|
+
if (await getTokens()) {
|
|
24
|
+
// import by id
|
|
25
|
+
if (options.file && options.cotId) {
|
|
26
|
+
console.log(`Importing circle of trust "${options.cotId}" into realm "${state.default.session.getRealm()}"...`);
|
|
27
|
+
importCircleOfTrust(options.cotId, options.file);
|
|
28
|
+
} // --all -a
|
|
29
|
+
else if (options.all && options.file) {
|
|
30
|
+
console.log(`Importing all circles of trust from a single file (${options.file})...`);
|
|
31
|
+
importCirclesOfTrustFromFile(options.file);
|
|
32
|
+
} // --all-separate -A
|
|
33
|
+
else if (options.allSeparate && !options.file) {
|
|
34
|
+
console.log('Importing all circles of trust from separate files (*.saml.json) in current directory...');
|
|
35
|
+
importCirclesOfTrustFromFiles();
|
|
36
|
+
} // import first provider from file
|
|
37
|
+
else if (options.file) {
|
|
38
|
+
console.log(`Importing first circle of trust from file "${options.file}" into realm "${state.default.session.getRealm()}"...`);
|
|
39
|
+
importFirstCircleOfTrust(options.file);
|
|
40
|
+
} // unrecognized combination of options or no options
|
|
41
|
+
else {
|
|
42
|
+
console.log('Unrecognized combination of options or no options...');
|
|
43
|
+
program.help();
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
} // end program logic inside action handler
|
|
47
|
+
);
|
|
48
|
+
program.parse();
|
|
49
|
+
//# sourceMappingURL=saml-cot-import.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"saml-cot-import.js","names":["Command","Option","Authenticate","CirclesOfTrust","state","common","getTokens","importCircleOfTrust","importCirclesOfTrustFromFile","importCirclesOfTrustFromFiles","importFirstCircleOfTrust","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","file","cotId","console","log","getRealm","all","allSeparate","help","parse"],"sources":["cli/saml/saml-cot-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst {\n importCircleOfTrust,\n importCirclesOfTrustFromFile,\n importCirclesOfTrustFromFiles,\n importFirstCircleOfTrust,\n} = CirclesOfTrust;\n\nconst program = new Command('frodo saml cot import');\n\nprogram\n .description('Import SAML circles of trust.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --cot-id <cot-id>',\n 'Circle of trust id. If specified, only one circle of trust is imported and the options -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file <file>',\n 'Name of the file to import the circle(s) of trust from.'\n )\n )\n .addOption(\n new Option(\n '-a, --all',\n 'Import all circles of trust from single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Import all circles of trust from separate files (*.cot.saml.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement program logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // import by id\n if (options.file && options.cotId) {\n console.log(\n `Importing circle of trust \"${\n options.cotId\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importCircleOfTrust(options.cotId, options.file);\n }\n // --all -a\n else if (options.all && options.file) {\n console.log(\n `Importing all circles of trust from a single file (${options.file})...`\n );\n importCirclesOfTrustFromFile(options.file);\n }\n // --all-separate -A\n else if (options.allSeparate && !options.file) {\n console.log(\n 'Importing all circles of trust from separate files (*.saml.json) in current directory...'\n );\n importCirclesOfTrustFromFiles();\n }\n // import first provider from file\n else if (options.file) {\n console.log(\n `Importing first circle of trust from file \"${\n options.file\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importFirstCircleOfTrust(options.file);\n }\n // unrecognized combination of options or no options\n else {\n console.log('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end program logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,cAAvB,EAAuCC,KAAvC,QAAoD,uBAApD;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EACJK,mBADI;EAEJC,4BAFI;EAGJC,6BAHI;EAIJC;AAJI,IAKFP,cALJ;AAOA,MAAMQ,OAAO,GAAG,IAAIX,OAAJ,CAAY,uBAAZ,CAAhB;AAEAW,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeV,MAAM,CAACW,aAJtB,EAKGD,WALH,CAKeV,MAAM,CAACY,aALtB,EAMGF,WANH,CAMeV,MAAM,CAACa,YANtB,EAOGH,WAPH,CAOeV,MAAM,CAACc,gBAPtB,EAQGC,SARH,CAQaf,MAAM,CAACgB,gBARpB,EASGD,SATH,CASaf,MAAM,CAACiB,cATpB,EAUGF,SAVH,CAWI,IAAInB,MAAJ,CACE,uBADF,EAEE,+GAFF,CAXJ,EAgBGmB,SAhBH,CAiBI,IAAInB,MAAJ,CACE,mBADF,EAEE,yDAFF,CAjBJ,EAsBGmB,SAtBH,CAuBI,IAAInB,MAAJ,CACE,WADF,EAEE,gEAFF,CAvBJ,EA4BGmB,SA5BH,CA6BI,IAAInB,MAAJ,CACE,oBADF,EAEE,oHAFF,CA7BJ,EAkCGsB,MAlCH,EAmCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CxB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACApB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACArB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAtB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAvB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACAhC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAMhC,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIsB,OAAO,CAACW,IAAR,IAAgBX,OAAO,CAACY,KAA5B,EAAmC;MACjCC,OAAO,CAACC,GAAR,CACG,8BACCd,OAAO,CAACY,KACT,iBAAgBpC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBa,QAAtB,EAAiC,MAHpD;MAKApC,mBAAmB,CAACqB,OAAO,CAACY,KAAT,EAAgBZ,OAAO,CAACW,IAAxB,CAAnB;IACD,CAPD,CAQA;IARA,KASK,IAAIX,OAAO,CAACgB,GAAR,IAAehB,OAAO,CAACW,IAA3B,EAAiC;MACpCE,OAAO,CAACC,GAAR,CACG,sDAAqDd,OAAO,CAACW,IAAK,MADrE;MAGA/B,4BAA4B,CAACoB,OAAO,CAACW,IAAT,CAA5B;IACD,CALI,CAML;IANK,KAOA,IAAIX,OAAO,CAACiB,WAAR,IAAuB,CAACjB,OAAO,CAACW,IAApC,EAA0C;MAC7CE,OAAO,CAACC,GAAR,CACE,0FADF;MAGAjC,6BAA6B;IAC9B,CALI,CAML;IANK,KAOA,IAAImB,OAAO,CAACW,IAAZ,EAAkB;MACrBE,OAAO,CAACC,GAAR,CACG,8CACCd,OAAO,CAACW,IACT,iBAAgBnC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBa,QAAtB,EAAiC,MAHpD;MAKAjC,wBAAwB,CAACkB,OAAO,CAACW,IAAT,CAAxB;IACD,CAPI,CAQL;IARK,KASA;MACHE,OAAO,CAACC,GAAR,CAAY,sDAAZ;MACA/B,OAAO,CAACmC,IAAR;IACD;EACF;AACF,CAlFL,CAmFI;AAnFJ;AAsFAnC,OAAO,CAACoC,KAAR"}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
const {
|
|
5
|
+
getTokens
|
|
6
|
+
} = Authenticate;
|
|
7
|
+
const {
|
|
8
|
+
listCirclesOfTrust
|
|
9
|
+
} = CirclesOfTrust;
|
|
10
|
+
const program = new Command('frodo saml cot list');
|
|
11
|
+
program.description('List SAML circles of trust.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-l, --long', 'Long with all fields.').default(false, 'false')).action( // implement command logic inside action handler
|
|
12
|
+
async (host, realm, user, password, options) => {
|
|
13
|
+
state.default.session.setTenant(host);
|
|
14
|
+
state.default.session.setRealm(realm);
|
|
15
|
+
state.default.session.setUsername(user);
|
|
16
|
+
state.default.session.setPassword(password);
|
|
17
|
+
state.default.session.setDeploymentType(options.type);
|
|
18
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
19
|
+
|
|
20
|
+
if (await getTokens()) {
|
|
21
|
+
console.log(`Listing SAML circles of trust in realm "${state.default.session.getRealm()}"...`);
|
|
22
|
+
listCirclesOfTrust(options.long);
|
|
23
|
+
}
|
|
24
|
+
} // end command logic inside action handler
|
|
25
|
+
);
|
|
26
|
+
program.parse();
|
|
27
|
+
//# sourceMappingURL=saml-cot-list.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"saml-cot-list.js","names":["Command","Option","Authenticate","CirclesOfTrust","state","common","getTokens","listCirclesOfTrust","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","getRealm","long","parse"],"sources":["cli/saml/saml-cot-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst { listCirclesOfTrust } = CirclesOfTrust;\n\nconst program = new Command('frodo saml cot list');\n\nprogram\n .description('List SAML circles of trust.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log(\n `Listing SAML circles of trust in realm \"${state.default.session.getRealm()}\"...`\n );\n listCirclesOfTrust(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,cAAvB,EAAuCC,KAAvC,QAAoD,uBAApD;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EAAEK;AAAF,IAAyBJ,cAA/B;AAEA,MAAMK,OAAO,GAAG,IAAIR,OAAJ,CAAY,qBAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,6BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAWI,IAAIhB,MAAJ,CAAW,YAAX,EAAyB,uBAAzB,EAAkDmB,OAAlD,CAA0D,KAA1D,EAAiE,OAAjE,CAXJ,EAaGC,MAbH,EAcI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAlB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACAnB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACApB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACArB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA7B,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB8B,OAAO,CAACC,GAAR,CACG,2CAA0CjC,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBW,QAAtB,EAAiC,MAD9E;IAGA/B,kBAAkB,CAACmB,OAAO,CAACa,IAAT,CAAlB;EACD;AACF,CA5BL,CA6BI;AA7BJ;AAgCA/B,OAAO,CAACgC,KAAR"}
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
import { Command } from 'commander';
|
|
2
|
+
const program = new Command('frodo saml cot');
|
|
3
|
+
program.description('Manage circles of trust.').helpOption('-h, --help', 'Help').showHelpAfterError();
|
|
4
|
+
program.command('list', 'List circles of trust.').showHelpAfterError();
|
|
5
|
+
program.command('export', 'Export circles of trust.').showHelpAfterError();
|
|
6
|
+
program.command('import', 'Import circles of trust.').showHelpAfterError();
|
|
7
|
+
program.parse();
|
|
8
|
+
//# sourceMappingURL=saml-cot.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"saml-cot.js","names":["Command","program","description","helpOption","showHelpAfterError","command","parse"],"sources":["cli/saml/saml-cot.ts"],"sourcesContent":["import { Command } from 'commander';\n\nconst program = new Command('frodo saml cot');\n\nprogram\n .description('Manage circles of trust.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError();\n\nprogram.command('list', 'List circles of trust.').showHelpAfterError();\n\nprogram.command('export', 'Export circles of trust.').showHelpAfterError();\n\nprogram.command('import', 'Import circles of trust.').showHelpAfterError();\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,QAAwB,WAAxB;AAEA,MAAMC,OAAO,GAAG,IAAID,OAAJ,CAAY,gBAAZ,CAAhB;AAEAC,OAAO,CACJC,WADH,CACe,0BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH;AAKAH,OAAO,CAACI,OAAR,CAAgB,MAAhB,EAAwB,wBAAxB,EAAkDD,kBAAlD;AAEAH,OAAO,CAACI,OAAR,CAAgB,QAAhB,EAA0B,0BAA1B,EAAsDD,kBAAtD;AAEAH,OAAO,CAACI,OAAR,CAAgB,QAAhB,EAA0B,0BAA1B,EAAsDD,kBAAtD;AAEAH,OAAO,CAACK,KAAR"}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
const {
|
|
5
|
+
getTokens
|
|
6
|
+
} = Authenticate;
|
|
7
|
+
const {
|
|
8
|
+
describeSaml2Provider
|
|
9
|
+
} = Saml2;
|
|
10
|
+
const program = new Command('frodo saml describe');
|
|
11
|
+
program.description('Describe the configuration of an entity provider.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --entity-id <entity-id>', 'Entity id.')).action( // implement command logic inside action handler
|
|
12
|
+
async (host, realm, user, password, options) => {
|
|
13
|
+
state.default.session.setTenant(host);
|
|
14
|
+
state.default.session.setRealm(realm);
|
|
15
|
+
state.default.session.setUsername(user);
|
|
16
|
+
state.default.session.setPassword(password);
|
|
17
|
+
state.default.session.setDeploymentType(options.type);
|
|
18
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
19
|
+
|
|
20
|
+
if (await getTokens()) {
|
|
21
|
+
console.log(`Describing SAML entity provider ${options.entityId} in realm "${state.default.session.getRealm()}"...`);
|
|
22
|
+
describeSaml2Provider(options.entityId);
|
|
23
|
+
}
|
|
24
|
+
} // end command logic inside action handler
|
|
25
|
+
);
|
|
26
|
+
program.parse();
|
|
27
|
+
//# sourceMappingURL=saml-describe.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"saml-describe.js","names":["Command","Option","Authenticate","Saml2","state","common","getTokens","describeSaml2Provider","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","entityId","getRealm","parse"],"sources":["cli/saml/saml-describe.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst { describeSaml2Provider } = Saml2;\n\nconst program = new Command('frodo saml describe');\n\nprogram\n .description('Describe the configuration of an entity provider.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --entity-id <entity-id>', 'Entity id.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log(\n `Describing SAML entity provider ${\n options.entityId\n } in realm \"${state.default.session.getRealm()}\"...`\n );\n describeSaml2Provider(options.entityId);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EAAEK;AAAF,IAA4BJ,KAAlC;AAEA,MAAMK,OAAO,GAAG,IAAIR,OAAJ,CAAY,qBAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,mDADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAUa,IAAIhB,MAAJ,CAAW,6BAAX,EAA0C,YAA1C,CAVb,EAWGmB,MAXH,EAYI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CrB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAjB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAlB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAnB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACApB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA7B,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB8B,OAAO,CAACC,GAAR,CACG,mCACCZ,OAAO,CAACa,QACT,cAAalC,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EAAiC,MAHjD;IAKAhC,qBAAqB,CAACkB,OAAO,CAACa,QAAT,CAArB;EACD;AACF,CA5BL,CA6BI;AA7BJ;AAgCA9B,OAAO,CAACgC,KAAR"}
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
import { Command, Option } from 'commander';
|
|
2
|
+
import { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';
|
|
3
|
+
import * as common from '../cmd_common.js';
|
|
4
|
+
const {
|
|
5
|
+
getTokens
|
|
6
|
+
} = Authenticate;
|
|
7
|
+
const {
|
|
8
|
+
exportSaml2ProviderToFile,
|
|
9
|
+
exportSaml2ProvidersToFile,
|
|
10
|
+
exportSaml2ProvidersToFiles
|
|
11
|
+
} = Saml2;
|
|
12
|
+
const program = new Command('frodo saml export');
|
|
13
|
+
program.description('Export SAML entity providers.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --entity-id <entity-id>', 'Entity id. If specified, -a and -A are ignored.')).addOption(new Option('-f, --file [file]', 'Name of the file to write the exported provider(s) to. Ignored with -A. If not specified, the export file is named <id>.saml.json.')).addOption(new Option('-a, --all', 'Export all the providers in a realm to a single file. Ignored with -t and -i.')).addOption(new Option('-A, --all-separate', 'Export all the providers in a realm as separate files <provider name>.saml.json. Ignored with -t, -i, and -a.')).action( // implement command logic inside action handler
|
|
14
|
+
async (host, realm, user, password, options) => {
|
|
15
|
+
state.default.session.setTenant(host);
|
|
16
|
+
state.default.session.setRealm(realm);
|
|
17
|
+
state.default.session.setUsername(user);
|
|
18
|
+
state.default.session.setPassword(password);
|
|
19
|
+
state.default.session.setDeploymentType(options.type);
|
|
20
|
+
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
21
|
+
|
|
22
|
+
if (await getTokens()) {
|
|
23
|
+
// export by id/name
|
|
24
|
+
if (options.entityId) {
|
|
25
|
+
console.log(`Exporting provider "${options.entityId}" from realm "${state.default.session.getRealm()}"...`);
|
|
26
|
+
exportSaml2ProviderToFile(options.entityId, options.file);
|
|
27
|
+
} // --all -a
|
|
28
|
+
else if (options.all) {
|
|
29
|
+
console.log('Exporting all providers to a single file...');
|
|
30
|
+
exportSaml2ProvidersToFile(options.file);
|
|
31
|
+
} // --all-separate -A
|
|
32
|
+
else if (options.allSeparate) {
|
|
33
|
+
console.log('Exporting all providers to separate files...');
|
|
34
|
+
exportSaml2ProvidersToFiles();
|
|
35
|
+
} // unrecognized combination of options or no options
|
|
36
|
+
else {
|
|
37
|
+
console.log('Unrecognized combination of options or no options...', 'error');
|
|
38
|
+
program.help();
|
|
39
|
+
}
|
|
40
|
+
}
|
|
41
|
+
} // end command logic inside action handler
|
|
42
|
+
);
|
|
43
|
+
program.parse();
|
|
44
|
+
//# sourceMappingURL=saml-export.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"saml-export.js","names":["Command","Option","Authenticate","Saml2","state","common","getTokens","exportSaml2ProviderToFile","exportSaml2ProvidersToFile","exportSaml2ProvidersToFiles","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","entityId","console","log","getRealm","file","all","allSeparate","help","parse"],"sources":["cli/saml/saml-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst {\n exportSaml2ProviderToFile,\n exportSaml2ProvidersToFile,\n exportSaml2ProvidersToFiles,\n} = Saml2;\n\nconst program = new Command('frodo saml export');\n\nprogram\n .description('Export SAML entity providers.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --entity-id <entity-id>',\n 'Entity id. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file [file]',\n 'Name of the file to write the exported provider(s) to. Ignored with -A. If not specified, the export file is named <id>.saml.json.'\n )\n )\n .addOption(\n new Option(\n '-a, --all',\n 'Export all the providers in a realm to a single file. Ignored with -t and -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all the providers in a realm as separate files <provider name>.saml.json. Ignored with -t, -i, and -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // export by id/name\n if (options.entityId) {\n console.log(\n `Exporting provider \"${\n options.entityId\n }\" from realm \"${state.default.session.getRealm()}\"...`\n );\n exportSaml2ProviderToFile(options.entityId, options.file);\n }\n // --all -a\n else if (options.all) {\n console.log('Exporting all providers to a single file...');\n exportSaml2ProvidersToFile(options.file);\n }\n // --all-separate -A\n else if (options.allSeparate) {\n console.log('Exporting all providers to separate files...');\n exportSaml2ProvidersToFiles();\n }\n // unrecognized combination of options or no options\n else {\n console.log(\n 'Unrecognized combination of options or no options...',\n 'error'\n );\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AAEA,MAAM;EACJK,yBADI;EAEJC,0BAFI;EAGJC;AAHI,IAIFN,KAJJ;AAMA,MAAMO,OAAO,GAAG,IAAIV,OAAJ,CAAY,mBAAZ,CAAhB;AAEAU,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeT,MAAM,CAACU,aAJtB,EAKGD,WALH,CAKeT,MAAM,CAACW,aALtB,EAMGF,WANH,CAMeT,MAAM,CAACY,YANtB,EAOGH,WAPH,CAOeT,MAAM,CAACa,gBAPtB,EAQGC,SARH,CAQad,MAAM,CAACe,gBARpB,EASGD,SATH,CASad,MAAM,CAACgB,cATpB,EAUGF,SAVH,CAWI,IAAIlB,MAAJ,CACE,6BADF,EAEE,iDAFF,CAXJ,EAgBGkB,SAhBH,CAiBI,IAAIlB,MAAJ,CACE,mBADF,EAEE,oIAFF,CAjBJ,EAsBGkB,SAtBH,CAuBI,IAAIlB,MAAJ,CACE,WADF,EAEE,+EAFF,CAvBJ,EA4BGkB,SA5BH,CA6BI,IAAIlB,MAAJ,CACE,oBADF,EAEE,+GAFF,CA7BJ,EAkCGqB,MAlCH,EAmCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAnB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACApB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACArB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAtB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA/B,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM/B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIqB,OAAO,CAACW,QAAZ,EAAsB;MACpBC,OAAO,CAACC,GAAR,CACG,uBACCb,OAAO,CAACW,QACT,iBAAgBlC,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EAAiC,MAHpD;MAKAlC,yBAAyB,CAACoB,OAAO,CAACW,QAAT,EAAmBX,OAAO,CAACe,IAA3B,CAAzB;IACD,CAPD,CAQA;IARA,KASK,IAAIf,OAAO,CAACgB,GAAZ,EAAiB;MACpBJ,OAAO,CAACC,GAAR,CAAY,6CAAZ;MACAhC,0BAA0B,CAACmB,OAAO,CAACe,IAAT,CAA1B;IACD,CAHI,CAIL;IAJK,KAKA,IAAIf,OAAO,CAACiB,WAAZ,EAAyB;MAC5BL,OAAO,CAACC,GAAR,CAAY,8CAAZ;MACA/B,2BAA2B;IAC5B,CAHI,CAIL;IAJK,KAKA;MACH8B,OAAO,CAACC,GAAR,CACE,sDADF,EAEE,OAFF;MAIA9B,OAAO,CAACmC,IAAR;IACD;EACF;AACF,CAxEL,CAyEI;AAzEJ;AA4EAnC,OAAO,CAACoC,KAAR"}
|