@rockcarver/frodo-cli 0.18.0 → 0.18.2-0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (163) hide show
  1. package/CHANGELOG.md +13 -1
  2. package/esm/cli/admin/admin-add-autoid-static-user-mapping.js +3 -2
  3. package/esm/cli/admin/admin-add-autoid-static-user-mapping.js.map +1 -1
  4. package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js +5 -4
  5. package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js.map +1 -1
  6. package/esm/cli/admin/admin-get-access-token.js +3 -2
  7. package/esm/cli/admin/admin-get-access-token.js.map +1 -1
  8. package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js +3 -2
  9. package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js.map +1 -1
  10. package/esm/cli/admin/admin-hide-generic-extension-attributes.js +3 -2
  11. package/esm/cli/admin/admin-hide-generic-extension-attributes.js.map +1 -1
  12. package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js +3 -2
  13. package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js.map +1 -1
  14. package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js +3 -2
  15. package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js.map +1 -1
  16. package/esm/cli/admin/admin-list-static-user-mappings.js +3 -2
  17. package/esm/cli/admin/admin-list-static-user-mappings.js.map +1 -1
  18. package/esm/cli/admin/admin-remove-static-user-mapping.js +3 -2
  19. package/esm/cli/admin/admin-remove-static-user-mapping.js.map +1 -1
  20. package/esm/cli/admin/admin-repair-org-model.js +3 -2
  21. package/esm/cli/admin/admin-repair-org-model.js.map +1 -1
  22. package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js +3 -2
  23. package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js.map +1 -1
  24. package/esm/cli/admin/admin-show-generic-extension-attributes.js +3 -2
  25. package/esm/cli/admin/admin-show-generic-extension-attributes.js.map +1 -1
  26. package/esm/cli/app/app-export.js +5 -4
  27. package/esm/cli/app/app-export.js.map +1 -1
  28. package/esm/cli/app/app-import.js +2 -1
  29. package/esm/cli/app/app-import.js.map +1 -1
  30. package/esm/cli/app/app-list.js +2 -1
  31. package/esm/cli/app/app-list.js.map +1 -1
  32. package/esm/cli/cmd_common.js +4 -4
  33. package/esm/cli/cmd_common.js.map +1 -1
  34. package/esm/cli/email/email-template-export.js +5 -4
  35. package/esm/cli/email/email-template-export.js.map +1 -1
  36. package/esm/cli/email/email-template-import.js +6 -5
  37. package/esm/cli/email/email-template-import.js.map +1 -1
  38. package/esm/cli/email/email-template-list.js +2 -1
  39. package/esm/cli/email/email-template-list.js.map +1 -1
  40. package/esm/cli/esv/esv-secret-create.js +2 -1
  41. package/esm/cli/esv/esv-secret-create.js.map +1 -1
  42. package/esm/cli/esv/esv-secret-delete.js +4 -3
  43. package/esm/cli/esv/esv-secret-delete.js.map +1 -1
  44. package/esm/cli/esv/esv-secret-describe.js +2 -1
  45. package/esm/cli/esv/esv-secret-describe.js.map +1 -1
  46. package/esm/cli/esv/esv-secret-list.js +2 -1
  47. package/esm/cli/esv/esv-secret-list.js.map +1 -1
  48. package/esm/cli/esv/esv-secret-set.js +2 -1
  49. package/esm/cli/esv/esv-secret-set.js.map +1 -1
  50. package/esm/cli/esv/esv-secret-version-activate.js +3 -2
  51. package/esm/cli/esv/esv-secret-version-activate.js.map +1 -1
  52. package/esm/cli/esv/esv-secret-version-create.js +2 -1
  53. package/esm/cli/esv/esv-secret-version-create.js.map +1 -1
  54. package/esm/cli/esv/esv-secret-version-deactivate.js +3 -2
  55. package/esm/cli/esv/esv-secret-version-deactivate.js.map +1 -1
  56. package/esm/cli/esv/esv-secret-version-delete.js +4 -3
  57. package/esm/cli/esv/esv-secret-version-delete.js.map +1 -1
  58. package/esm/cli/esv/esv-secret-version-list.js +2 -1
  59. package/esm/cli/esv/esv-secret-version-list.js.map +1 -1
  60. package/esm/cli/esv/esv-variable-create.js +2 -1
  61. package/esm/cli/esv/esv-variable-create.js.map +1 -1
  62. package/esm/cli/esv/esv-variable-delete.js +4 -3
  63. package/esm/cli/esv/esv-variable-delete.js.map +1 -1
  64. package/esm/cli/esv/esv-variable-describe.js +2 -1
  65. package/esm/cli/esv/esv-variable-describe.js.map +1 -1
  66. package/esm/cli/esv/esv-variable-list.js +2 -1
  67. package/esm/cli/esv/esv-variable-list.js.map +1 -1
  68. package/esm/cli/esv/esv-variable-set.js +4 -3
  69. package/esm/cli/esv/esv-variable-set.js.map +1 -1
  70. package/esm/cli/idm/idm-count.js +2 -1
  71. package/esm/cli/idm/idm-count.js.map +1 -1
  72. package/esm/cli/idm/idm-export.js +5 -4
  73. package/esm/cli/idm/idm-export.js.map +1 -1
  74. package/esm/cli/idm/idm-list.js +3 -2
  75. package/esm/cli/idm/idm-list.js.map +1 -1
  76. package/esm/cli/idp/idp-export.js +6 -5
  77. package/esm/cli/idp/idp-export.js.map +1 -1
  78. package/esm/cli/idp/idp-import.js +7 -6
  79. package/esm/cli/idp/idp-import.js.map +1 -1
  80. package/esm/cli/idp/idp-list.js +3 -2
  81. package/esm/cli/idp/idp-list.js.map +1 -1
  82. package/esm/cli/info/info.js +7 -6
  83. package/esm/cli/info/info.js.map +1 -1
  84. package/esm/cli/journey/journey-delete.e2e.test_.js.map +1 -1
  85. package/esm/cli/journey/journey-delete.js +5 -4
  86. package/esm/cli/journey/journey-delete.js.map +1 -1
  87. package/esm/cli/journey/journey-describe.js.map +1 -1
  88. package/esm/cli/journey/journey-disable.js +3 -3
  89. package/esm/cli/journey/journey-disable.js.map +1 -1
  90. package/esm/cli/journey/journey-enable.js +3 -3
  91. package/esm/cli/journey/journey-enable.js.map +1 -1
  92. package/esm/cli/journey/journey-export.js +15 -18
  93. package/esm/cli/journey/journey-export.js.map +1 -1
  94. package/esm/cli/journey/journey-import.js +16 -22
  95. package/esm/cli/journey/journey-import.js.map +1 -1
  96. package/esm/cli/journey/journey-list.e2e.test_.js.map +1 -1
  97. package/esm/cli/journey/journey-list.js +5 -6
  98. package/esm/cli/journey/journey-list.js.map +1 -1
  99. package/esm/cli/journey/journey-prune.js +4 -3
  100. package/esm/cli/journey/journey-prune.js.map +1 -1
  101. package/esm/cli/journey/journey.js.map +1 -1
  102. package/esm/cli/logging/logs-fetch.js +5 -5
  103. package/esm/cli/logging/logs-fetch.js.map +1 -1
  104. package/esm/cli/logging/logs-list.js +10 -9
  105. package/esm/cli/logging/logs-list.js.map +1 -1
  106. package/esm/cli/logging/logs-tail.js +5 -4
  107. package/esm/cli/logging/logs-tail.js.map +1 -1
  108. package/esm/cli/logging/logs.js.map +1 -1
  109. package/esm/cli/realm/realm-add-custom-domain.js +3 -2
  110. package/esm/cli/realm/realm-add-custom-domain.js.map +1 -1
  111. package/esm/cli/realm/realm-describe.js +3 -2
  112. package/esm/cli/realm/realm-describe.js.map +1 -1
  113. package/esm/cli/realm/realm-list.js +3 -2
  114. package/esm/cli/realm/realm-list.js.map +1 -1
  115. package/esm/cli/realm/realm-remove-custom-domain.js +3 -2
  116. package/esm/cli/realm/realm-remove-custom-domain.js.map +1 -1
  117. package/esm/cli/saml/saml-cot-export.js +6 -5
  118. package/esm/cli/saml/saml-cot-export.js.map +1 -1
  119. package/esm/cli/saml/saml-cot-import.js +7 -6
  120. package/esm/cli/saml/saml-cot-import.js.map +1 -1
  121. package/esm/cli/saml/saml-cot-list.js +3 -2
  122. package/esm/cli/saml/saml-cot-list.js.map +1 -1
  123. package/esm/cli/saml/saml-describe.js +3 -2
  124. package/esm/cli/saml/saml-describe.js.map +1 -1
  125. package/esm/cli/saml/saml-export.js +6 -5
  126. package/esm/cli/saml/saml-export.js.map +1 -1
  127. package/esm/cli/saml/saml-import.js +7 -6
  128. package/esm/cli/saml/saml-import.js.map +1 -1
  129. package/esm/cli/saml/saml-list.js +3 -2
  130. package/esm/cli/saml/saml-list.js.map +1 -1
  131. package/esm/cli/saml/saml-metadata-export.js +5 -4
  132. package/esm/cli/saml/saml-metadata-export.js.map +1 -1
  133. package/esm/cli/script/script-delete.js +1 -1
  134. package/esm/cli/script/script-delete.js.map +1 -1
  135. package/esm/cli/script/script-describe.js +1 -1
  136. package/esm/cli/script/script-describe.js.map +1 -1
  137. package/esm/cli/script/script-export.js +6 -5
  138. package/esm/cli/script/script-export.js.map +1 -1
  139. package/esm/cli/script/script-import.js +3 -2
  140. package/esm/cli/script/script-import.js.map +1 -1
  141. package/esm/cli/script/script-list.js +3 -2
  142. package/esm/cli/script/script-list.js.map +1 -1
  143. package/esm/cli/theme/theme-delete.e2e.test_.js.map +1 -1
  144. package/esm/cli/theme/theme-delete.js +6 -5
  145. package/esm/cli/theme/theme-delete.js.map +1 -1
  146. package/esm/cli/theme/theme-export.js +7 -6
  147. package/esm/cli/theme/theme-export.js.map +1 -1
  148. package/esm/cli/theme/theme-import.js +8 -7
  149. package/esm/cli/theme/theme-import.js.map +1 -1
  150. package/esm/cli/theme/theme-list.e2e.test_.js.map +1 -1
  151. package/esm/cli/theme/theme-list.js +3 -2
  152. package/esm/cli/theme/theme-list.js.map +1 -1
  153. package/esm/ops/JourneyOps.js +325 -2
  154. package/esm/ops/JourneyOps.js.map +1 -1
  155. package/esm/ops/NodeOps.js.map +1 -1
  156. package/esm/ops/Saml2Ops.js.map +1 -1
  157. package/esm/ops/ScriptOps.js.map +1 -1
  158. package/esm/utils/Config.js.map +1 -1
  159. package/esm/utils/Console.js +1 -0
  160. package/esm/utils/Console.js.map +1 -1
  161. package/esm/utils/Version.js +1 -1
  162. package/esm/utils/Version.js.map +1 -1
  163. package/package.json +9 -3
@@ -1 +1 @@
1
- {"version":3,"file":"saml-cot-import.js","names":["Command","Option","Authenticate","CirclesOfTrust","state","common","getTokens","importCircleOfTrust","importCirclesOfTrustFromFile","importCirclesOfTrustFromFiles","importFirstCircleOfTrust","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","file","cotId","console","log","getRealm","all","allSeparate","help","parse"],"sources":["cli/saml/saml-cot-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst {\n importCircleOfTrust,\n importCirclesOfTrustFromFile,\n importCirclesOfTrustFromFiles,\n importFirstCircleOfTrust,\n} = CirclesOfTrust;\n\nconst program = new Command('frodo saml cot import');\n\nprogram\n .description('Import SAML circles of trust.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --cot-id <cot-id>',\n 'Circle of trust id. If specified, only one circle of trust is imported and the options -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file <file>',\n 'Name of the file to import the circle(s) of trust from.'\n )\n )\n .addOption(\n new Option(\n '-a, --all',\n 'Import all circles of trust from single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Import all circles of trust from separate files (*.cot.saml.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement program logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // import by id\n if (options.file && options.cotId) {\n console.log(\n `Importing circle of trust \"${\n options.cotId\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importCircleOfTrust(options.cotId, options.file);\n }\n // --all -a\n else if (options.all && options.file) {\n console.log(\n `Importing all circles of trust from a single file (${options.file})...`\n );\n importCirclesOfTrustFromFile(options.file);\n }\n // --all-separate -A\n else if (options.allSeparate && !options.file) {\n console.log(\n 'Importing all circles of trust from separate files (*.saml.json) in current directory...'\n );\n importCirclesOfTrustFromFiles();\n }\n // import first provider from file\n else if (options.file) {\n console.log(\n `Importing first circle of trust from file \"${\n options.file\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importFirstCircleOfTrust(options.file);\n }\n // unrecognized combination of options or no options\n else {\n console.log('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end program logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,cAAvB,EAAuCC,KAAvC,QAAoD,uBAApD;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EACJK,mBADI;EAEJC,4BAFI;EAGJC,6BAHI;EAIJC;AAJI,IAKFP,cALJ;AAOA,MAAMQ,OAAO,GAAG,IAAIX,OAAJ,CAAY,uBAAZ,CAAhB;AAEAW,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeV,MAAM,CAACW,aAJtB,EAKGD,WALH,CAKeV,MAAM,CAACY,aALtB,EAMGF,WANH,CAMeV,MAAM,CAACa,YANtB,EAOGH,WAPH,CAOeV,MAAM,CAACc,gBAPtB,EAQGC,SARH,CAQaf,MAAM,CAACgB,gBARpB,EASGD,SATH,CASaf,MAAM,CAACiB,cATpB,EAUGF,SAVH,CAWI,IAAInB,MAAJ,CACE,uBADF,EAEE,+GAFF,CAXJ,EAgBGmB,SAhBH,CAiBI,IAAInB,MAAJ,CACE,mBADF,EAEE,yDAFF,CAjBJ,EAsBGmB,SAtBH,CAuBI,IAAInB,MAAJ,CACE,WADF,EAEE,gEAFF,CAvBJ,EA4BGmB,SA5BH,CA6BI,IAAInB,MAAJ,CACE,oBADF,EAEE,oHAFF,CA7BJ,EAkCGsB,MAlCH,EAmCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CxB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACApB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACArB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAtB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAvB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACAhC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAMhC,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIsB,OAAO,CAACW,IAAR,IAAgBX,OAAO,CAACY,KAA5B,EAAmC;MACjCC,OAAO,CAACC,GAAR,CACG,8BACCd,OAAO,CAACY,KACT,iBAAgBpC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBa,QAAtB,EAAiC,MAHpD;MAKApC,mBAAmB,CAACqB,OAAO,CAACY,KAAT,EAAgBZ,OAAO,CAACW,IAAxB,CAAnB;IACD,CAPD,CAQA;IARA,KASK,IAAIX,OAAO,CAACgB,GAAR,IAAehB,OAAO,CAACW,IAA3B,EAAiC;MACpCE,OAAO,CAACC,GAAR,CACG,sDAAqDd,OAAO,CAACW,IAAK,MADrE;MAGA/B,4BAA4B,CAACoB,OAAO,CAACW,IAAT,CAA5B;IACD,CALI,CAML;IANK,KAOA,IAAIX,OAAO,CAACiB,WAAR,IAAuB,CAACjB,OAAO,CAACW,IAApC,EAA0C;MAC7CE,OAAO,CAACC,GAAR,CACE,0FADF;MAGAjC,6BAA6B;IAC9B,CALI,CAML;IANK,KAOA,IAAImB,OAAO,CAACW,IAAZ,EAAkB;MACrBE,OAAO,CAACC,GAAR,CACG,8CACCd,OAAO,CAACW,IACT,iBAAgBnC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBa,QAAtB,EAAiC,MAHpD;MAKAjC,wBAAwB,CAACkB,OAAO,CAACW,IAAT,CAAxB;IACD,CAPI,CAQL;IARK,KASA;MACHE,OAAO,CAACC,GAAR,CAAY,sDAAZ;MACA/B,OAAO,CAACmC,IAAR;IACD;EACF;AACF,CAlFL,CAmFI;AAnFJ;AAsFAnC,OAAO,CAACoC,KAAR"}
1
+ {"version":3,"file":"saml-cot-import.js","names":["Command","Option","Authenticate","CirclesOfTrust","state","common","printMessage","getTokens","importCircleOfTrust","importCirclesOfTrustFromFile","importCirclesOfTrustFromFiles","importFirstCircleOfTrust","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","file","cotId","getRealm","all","allSeparate","help","parse"],"sources":["cli/saml/saml-cot-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\nimport { printMessage } from '../../utils/Console';\n\nconst { getTokens } = Authenticate;\nconst {\n importCircleOfTrust,\n importCirclesOfTrustFromFile,\n importCirclesOfTrustFromFiles,\n importFirstCircleOfTrust,\n} = CirclesOfTrust;\n\nconst program = new Command('frodo saml cot import');\n\nprogram\n .description('Import SAML circles of trust.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --cot-id <cot-id>',\n 'Circle of trust id. If specified, only one circle of trust is imported and the options -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file <file>',\n 'Name of the file to import the circle(s) of trust from.'\n )\n )\n .addOption(\n new Option(\n '-a, --all',\n 'Import all circles of trust from single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Import all circles of trust from separate files (*.cot.saml.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement program logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // import by id\n if (options.file && options.cotId) {\n printMessage(\n `Importing circle of trust \"${\n options.cotId\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importCircleOfTrust(options.cotId, options.file);\n }\n // --all -a\n else if (options.all && options.file) {\n printMessage(\n `Importing all circles of trust from a single file (${options.file})...`\n );\n importCirclesOfTrustFromFile(options.file);\n }\n // --all-separate -A\n else if (options.allSeparate && !options.file) {\n printMessage(\n 'Importing all circles of trust from separate files (*.saml.json) in current directory...'\n );\n importCirclesOfTrustFromFiles();\n }\n // import first provider from file\n else if (options.file) {\n printMessage(\n `Importing first circle of trust from file \"${\n options.file\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importFirstCircleOfTrust(options.file);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end program logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,cAAvB,EAAuCC,KAAvC,QAAoD,uBAApD;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AACA,SAASC,YAAT,QAA6B,qBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EACJM,mBADI;EAEJC,4BAFI;EAGJC,6BAHI;EAIJC;AAJI,IAKFR,cALJ;AAOA,MAAMS,OAAO,GAAG,IAAIZ,OAAJ,CAAY,uBAAZ,CAAhB;AAEAY,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeX,MAAM,CAACY,aAJtB,EAKGD,WALH,CAKeX,MAAM,CAACa,aALtB,EAMGF,WANH,CAMeX,MAAM,CAACc,YANtB,EAOGH,WAPH,CAOeX,MAAM,CAACe,gBAPtB,EAQGC,SARH,CAQahB,MAAM,CAACiB,gBARpB,EASGD,SATH,CASahB,MAAM,CAACkB,cATpB,EAUGF,SAVH,CAWI,IAAIpB,MAAJ,CACE,uBADF,EAEE,+GAFF,CAXJ,EAgBGoB,SAhBH,CAiBI,IAAIpB,MAAJ,CACE,mBADF,EAEE,yDAFF,CAjBJ,EAsBGoB,SAtBH,CAuBI,IAAIpB,MAAJ,CACE,WADF,EAEE,gEAFF,CAvBJ,EA4BGoB,SA5BH,CA6BI,IAAIpB,MAAJ,CACE,oBADF,EAEE,oHAFF,CA7BJ,EAkCGuB,MAlCH,EAmCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CzB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACArB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAtB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAvB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAxB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACAjC,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAMhC,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIsB,OAAO,CAACW,IAAR,IAAgBX,OAAO,CAACY,KAA5B,EAAmC;MACjCnC,YAAY,CACT,8BACCuB,OAAO,CAACY,KACT,iBAAgBrC,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBW,QAAtB,EAAiC,MAHxC,CAAZ;MAKAlC,mBAAmB,CAACqB,OAAO,CAACY,KAAT,EAAgBZ,OAAO,CAACW,IAAxB,CAAnB;IACD,CAPD,CAQA;IARA,KASK,IAAIX,OAAO,CAACc,GAAR,IAAed,OAAO,CAACW,IAA3B,EAAiC;MACpClC,YAAY,CACT,sDAAqDuB,OAAO,CAACW,IAAK,MADzD,CAAZ;MAGA/B,4BAA4B,CAACoB,OAAO,CAACW,IAAT,CAA5B;IACD,CALI,CAML;IANK,KAOA,IAAIX,OAAO,CAACe,WAAR,IAAuB,CAACf,OAAO,CAACW,IAApC,EAA0C;MAC7ClC,YAAY,CACV,0FADU,CAAZ;MAGAI,6BAA6B;IAC9B,CALI,CAML;IANK,KAOA,IAAImB,OAAO,CAACW,IAAZ,EAAkB;MACrBlC,YAAY,CACT,8CACCuB,OAAO,CAACW,IACT,iBAAgBpC,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBW,QAAtB,EAAiC,MAHxC,CAAZ;MAKA/B,wBAAwB,CAACkB,OAAO,CAACW,IAAT,CAAxB;IACD,CAPI,CAQL;IARK,KASA;MACHlC,YAAY,CAAC,sDAAD,CAAZ;MACAM,OAAO,CAACiC,IAAR;IACD;EACF;AACF,CAlFL,CAmFI;AAnFJ;AAsFAjC,OAAO,CAACkC,KAAR"}
@@ -1,6 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
+ import { printMessage } from '../../utils/Console';
4
5
  const {
5
6
  getTokens
6
7
  } = Authenticate;
@@ -18,7 +19,7 @@ async (host, realm, user, password, options) => {
18
19
  state.default.session.setAllowInsecureConnection(options.insecure);
19
20
 
20
21
  if (await getTokens()) {
21
- console.log(`Listing SAML circles of trust in realm "${state.default.session.getRealm()}"...`);
22
+ printMessage(`Listing SAML circles of trust in realm "${state.default.session.getRealm()}"...`);
22
23
  listCirclesOfTrust(options.long);
23
24
  }
24
25
  } // end command logic inside action handler
@@ -1 +1 @@
1
- {"version":3,"file":"saml-cot-list.js","names":["Command","Option","Authenticate","CirclesOfTrust","state","common","getTokens","listCirclesOfTrust","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","getRealm","long","parse"],"sources":["cli/saml/saml-cot-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst { listCirclesOfTrust } = CirclesOfTrust;\n\nconst program = new Command('frodo saml cot list');\n\nprogram\n .description('List SAML circles of trust.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log(\n `Listing SAML circles of trust in realm \"${state.default.session.getRealm()}\"...`\n );\n listCirclesOfTrust(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,cAAvB,EAAuCC,KAAvC,QAAoD,uBAApD;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EAAEK;AAAF,IAAyBJ,cAA/B;AAEA,MAAMK,OAAO,GAAG,IAAIR,OAAJ,CAAY,qBAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,6BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAWI,IAAIhB,MAAJ,CAAW,YAAX,EAAyB,uBAAzB,EAAkDmB,OAAlD,CAA0D,KAA1D,EAAiE,OAAjE,CAXJ,EAaGC,MAbH,EAcI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAlB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACAnB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACApB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACArB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA7B,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB8B,OAAO,CAACC,GAAR,CACG,2CAA0CjC,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBW,QAAtB,EAAiC,MAD9E;IAGA/B,kBAAkB,CAACmB,OAAO,CAACa,IAAT,CAAlB;EACD;AACF,CA5BL,CA6BI;AA7BJ;AAgCA/B,OAAO,CAACgC,KAAR"}
1
+ {"version":3,"file":"saml-cot-list.js","names":["Command","Option","Authenticate","CirclesOfTrust","state","common","printMessage","getTokens","listCirclesOfTrust","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","getRealm","long","parse"],"sources":["cli/saml/saml-cot-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, CirclesOfTrust, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\nimport { printMessage } from '../../utils/Console';\n\nconst { getTokens } = Authenticate;\nconst { listCirclesOfTrust } = CirclesOfTrust;\n\nconst program = new Command('frodo saml cot list');\n\nprogram\n .description('List SAML circles of trust.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage(\n `Listing SAML circles of trust in realm \"${state.default.session.getRealm()}\"...`\n );\n listCirclesOfTrust(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,cAAvB,EAAuCC,KAAvC,QAAoD,uBAApD;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AACA,SAASC,YAAT,QAA6B,qBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EAAEM;AAAF,IAAyBL,cAA/B;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,qBAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,6BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAWI,IAAIjB,MAAJ,CAAW,YAAX,EAAyB,uBAAzB,EAAkDoB,OAAlD,CAA0D,KAA1D,EAAiE,OAAjE,CAXJ,EAaGC,MAbH,EAcI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAnB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACApB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACArB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACAtB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA9B,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrBD,YAAY,CACT,2CAA0CF,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBS,QAAtB,EAAiC,MADlE,CAAZ;IAGA7B,kBAAkB,CAACmB,OAAO,CAACW,IAAT,CAAlB;EACD;AACF,CA5BL,CA6BI;AA7BJ;AAgCA7B,OAAO,CAAC8B,KAAR"}
@@ -1,6 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
+ import { printMessage } from '../../utils/Console';
4
5
  const {
5
6
  getTokens
6
7
  } = Authenticate;
@@ -18,7 +19,7 @@ async (host, realm, user, password, options) => {
18
19
  state.default.session.setAllowInsecureConnection(options.insecure);
19
20
 
20
21
  if (await getTokens()) {
21
- console.log(`Describing SAML entity provider ${options.entityId} in realm "${state.default.session.getRealm()}"...`);
22
+ printMessage(`Describing SAML entity provider ${options.entityId} in realm "${state.default.session.getRealm()}"...`);
22
23
  describeSaml2Provider(options.entityId);
23
24
  }
24
25
  } // end command logic inside action handler
@@ -1 +1 @@
1
- {"version":3,"file":"saml-describe.js","names":["Command","Option","Authenticate","Saml2","state","common","getTokens","describeSaml2Provider","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","entityId","getRealm","parse"],"sources":["cli/saml/saml-describe.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst { describeSaml2Provider } = Saml2;\n\nconst program = new Command('frodo saml describe');\n\nprogram\n .description('Describe the configuration of an entity provider.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --entity-id <entity-id>', 'Entity id.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log(\n `Describing SAML entity provider ${\n options.entityId\n } in realm \"${state.default.session.getRealm()}\"...`\n );\n describeSaml2Provider(options.entityId);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EAAEK;AAAF,IAA4BJ,KAAlC;AAEA,MAAMK,OAAO,GAAG,IAAIR,OAAJ,CAAY,qBAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,mDADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAUa,IAAIhB,MAAJ,CAAW,6BAAX,EAA0C,YAA1C,CAVb,EAWGmB,MAXH,EAYI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CrB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAjB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAlB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAnB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACApB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA7B,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB8B,OAAO,CAACC,GAAR,CACG,mCACCZ,OAAO,CAACa,QACT,cAAalC,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EAAiC,MAHjD;IAKAhC,qBAAqB,CAACkB,OAAO,CAACa,QAAT,CAArB;EACD;AACF,CA5BL,CA6BI;AA7BJ;AAgCA9B,OAAO,CAACgC,KAAR"}
1
+ {"version":3,"file":"saml-describe.js","names":["Command","Option","Authenticate","Saml2","state","common","printMessage","getTokens","describeSaml2Provider","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","entityId","getRealm","parse"],"sources":["cli/saml/saml-describe.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\nimport { printMessage } from '../../utils/Console';\n\nconst { getTokens } = Authenticate;\nconst { describeSaml2Provider } = Saml2;\n\nconst program = new Command('frodo saml describe');\n\nprogram\n .description('Describe the configuration of an entity provider.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --entity-id <entity-id>', 'Entity id.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage(\n `Describing SAML entity provider ${\n options.entityId\n } in realm \"${state.default.session.getRealm()}\"...`\n );\n describeSaml2Provider(options.entityId);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AACA,SAASC,YAAT,QAA6B,qBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EAAEM;AAAF,IAA4BL,KAAlC;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,qBAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,mDADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAUa,IAAIjB,MAAJ,CAAW,6BAAX,EAA0C,YAA1C,CAVb,EAWGoB,MAXH,EAYI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAlB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAnB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACApB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACArB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA9B,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrBD,YAAY,CACT,mCACCoB,OAAO,CAACW,QACT,cAAajC,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBU,QAAtB,EAAiC,MAHrC,CAAZ;IAKA9B,qBAAqB,CAACkB,OAAO,CAACW,QAAT,CAArB;EACD;AACF,CA5BL,CA6BI;AA7BJ;AAgCA5B,OAAO,CAAC8B,KAAR"}
@@ -1,6 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
+ import { printMessage } from '../../utils/Console';
4
5
  const {
5
6
  getTokens
6
7
  } = Authenticate;
@@ -22,19 +23,19 @@ async (host, realm, user, password, options) => {
22
23
  if (await getTokens()) {
23
24
  // export by id/name
24
25
  if (options.entityId) {
25
- console.log(`Exporting provider "${options.entityId}" from realm "${state.default.session.getRealm()}"...`);
26
+ printMessage(`Exporting provider "${options.entityId}" from realm "${state.default.session.getRealm()}"...`);
26
27
  exportSaml2ProviderToFile(options.entityId, options.file);
27
28
  } // --all -a
28
29
  else if (options.all) {
29
- console.log('Exporting all providers to a single file...');
30
+ printMessage('Exporting all providers to a single file...');
30
31
  exportSaml2ProvidersToFile(options.file);
31
32
  } // --all-separate -A
32
33
  else if (options.allSeparate) {
33
- console.log('Exporting all providers to separate files...');
34
+ printMessage('Exporting all providers to separate files...');
34
35
  exportSaml2ProvidersToFiles();
35
36
  } // unrecognized combination of options or no options
36
37
  else {
37
- console.log('Unrecognized combination of options or no options...', 'error');
38
+ printMessage('Unrecognized combination of options or no options...', 'error');
38
39
  program.help();
39
40
  }
40
41
  }
@@ -1 +1 @@
1
- {"version":3,"file":"saml-export.js","names":["Command","Option","Authenticate","Saml2","state","common","getTokens","exportSaml2ProviderToFile","exportSaml2ProvidersToFile","exportSaml2ProvidersToFiles","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","entityId","console","log","getRealm","file","all","allSeparate","help","parse"],"sources":["cli/saml/saml-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst {\n exportSaml2ProviderToFile,\n exportSaml2ProvidersToFile,\n exportSaml2ProvidersToFiles,\n} = Saml2;\n\nconst program = new Command('frodo saml export');\n\nprogram\n .description('Export SAML entity providers.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --entity-id <entity-id>',\n 'Entity id. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file [file]',\n 'Name of the file to write the exported provider(s) to. Ignored with -A. If not specified, the export file is named <id>.saml.json.'\n )\n )\n .addOption(\n new Option(\n '-a, --all',\n 'Export all the providers in a realm to a single file. Ignored with -t and -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all the providers in a realm as separate files <provider name>.saml.json. Ignored with -t, -i, and -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // export by id/name\n if (options.entityId) {\n console.log(\n `Exporting provider \"${\n options.entityId\n }\" from realm \"${state.default.session.getRealm()}\"...`\n );\n exportSaml2ProviderToFile(options.entityId, options.file);\n }\n // --all -a\n else if (options.all) {\n console.log('Exporting all providers to a single file...');\n exportSaml2ProvidersToFile(options.file);\n }\n // --all-separate -A\n else if (options.allSeparate) {\n console.log('Exporting all providers to separate files...');\n exportSaml2ProvidersToFiles();\n }\n // unrecognized combination of options or no options\n else {\n console.log(\n 'Unrecognized combination of options or no options...',\n 'error'\n );\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AAEA,MAAM;EACJK,yBADI;EAEJC,0BAFI;EAGJC;AAHI,IAIFN,KAJJ;AAMA,MAAMO,OAAO,GAAG,IAAIV,OAAJ,CAAY,mBAAZ,CAAhB;AAEAU,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeT,MAAM,CAACU,aAJtB,EAKGD,WALH,CAKeT,MAAM,CAACW,aALtB,EAMGF,WANH,CAMeT,MAAM,CAACY,YANtB,EAOGH,WAPH,CAOeT,MAAM,CAACa,gBAPtB,EAQGC,SARH,CAQad,MAAM,CAACe,gBARpB,EASGD,SATH,CASad,MAAM,CAACgB,cATpB,EAUGF,SAVH,CAWI,IAAIlB,MAAJ,CACE,6BADF,EAEE,iDAFF,CAXJ,EAgBGkB,SAhBH,CAiBI,IAAIlB,MAAJ,CACE,mBADF,EAEE,oIAFF,CAjBJ,EAsBGkB,SAtBH,CAuBI,IAAIlB,MAAJ,CACE,WADF,EAEE,+EAFF,CAvBJ,EA4BGkB,SA5BH,CA6BI,IAAIlB,MAAJ,CACE,oBADF,EAEE,+GAFF,CA7BJ,EAkCGqB,MAlCH,EAmCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAnB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACApB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACArB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAtB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA/B,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM/B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIqB,OAAO,CAACW,QAAZ,EAAsB;MACpBC,OAAO,CAACC,GAAR,CACG,uBACCb,OAAO,CAACW,QACT,iBAAgBlC,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EAAiC,MAHpD;MAKAlC,yBAAyB,CAACoB,OAAO,CAACW,QAAT,EAAmBX,OAAO,CAACe,IAA3B,CAAzB;IACD,CAPD,CAQA;IARA,KASK,IAAIf,OAAO,CAACgB,GAAZ,EAAiB;MACpBJ,OAAO,CAACC,GAAR,CAAY,6CAAZ;MACAhC,0BAA0B,CAACmB,OAAO,CAACe,IAAT,CAA1B;IACD,CAHI,CAIL;IAJK,KAKA,IAAIf,OAAO,CAACiB,WAAZ,EAAyB;MAC5BL,OAAO,CAACC,GAAR,CAAY,8CAAZ;MACA/B,2BAA2B;IAC5B,CAHI,CAIL;IAJK,KAKA;MACH8B,OAAO,CAACC,GAAR,CACE,sDADF,EAEE,OAFF;MAIA9B,OAAO,CAACmC,IAAR;IACD;EACF;AACF,CAxEL,CAyEI;AAzEJ;AA4EAnC,OAAO,CAACoC,KAAR"}
1
+ {"version":3,"file":"saml-export.js","names":["Command","Option","Authenticate","Saml2","state","common","printMessage","getTokens","exportSaml2ProviderToFile","exportSaml2ProvidersToFile","exportSaml2ProvidersToFiles","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","entityId","getRealm","file","all","allSeparate","help","parse"],"sources":["cli/saml/saml-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\nimport { printMessage } from '../../utils/Console';\n\nconst { getTokens } = Authenticate;\n\nconst {\n exportSaml2ProviderToFile,\n exportSaml2ProvidersToFile,\n exportSaml2ProvidersToFiles,\n} = Saml2;\n\nconst program = new Command('frodo saml export');\n\nprogram\n .description('Export SAML entity providers.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --entity-id <entity-id>',\n 'Entity id. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file [file]',\n 'Name of the file to write the exported provider(s) to. Ignored with -A. If not specified, the export file is named <id>.saml.json.'\n )\n )\n .addOption(\n new Option(\n '-a, --all',\n 'Export all the providers in a realm to a single file. Ignored with -t and -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all the providers in a realm as separate files <provider name>.saml.json. Ignored with -t, -i, and -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // export by id/name\n if (options.entityId) {\n printMessage(\n `Exporting provider \"${\n options.entityId\n }\" from realm \"${state.default.session.getRealm()}\"...`\n );\n exportSaml2ProviderToFile(options.entityId, options.file);\n }\n // --all -a\n else if (options.all) {\n printMessage('Exporting all providers to a single file...');\n exportSaml2ProvidersToFile(options.file);\n }\n // --all-separate -A\n else if (options.allSeparate) {\n printMessage('Exporting all providers to separate files...');\n exportSaml2ProvidersToFiles();\n }\n // unrecognized combination of options or no options\n else {\n printMessage(\n 'Unrecognized combination of options or no options...',\n 'error'\n );\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AACA,SAASC,YAAT,QAA6B,qBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AAEA,MAAM;EACJM,yBADI;EAEJC,0BAFI;EAGJC;AAHI,IAIFP,KAJJ;AAMA,MAAMQ,OAAO,GAAG,IAAIX,OAAJ,CAAY,mBAAZ,CAAhB;AAEAW,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeV,MAAM,CAACW,aAJtB,EAKGD,WALH,CAKeV,MAAM,CAACY,aALtB,EAMGF,WANH,CAMeV,MAAM,CAACa,YANtB,EAOGH,WAPH,CAOeV,MAAM,CAACc,gBAPtB,EAQGC,SARH,CAQaf,MAAM,CAACgB,gBARpB,EASGD,SATH,CASaf,MAAM,CAACiB,cATpB,EAUGF,SAVH,CAWI,IAAInB,MAAJ,CACE,6BADF,EAEE,iDAFF,CAXJ,EAgBGmB,SAhBH,CAiBI,IAAInB,MAAJ,CACE,mBADF,EAEE,oIAFF,CAjBJ,EAsBGmB,SAtBH,CAuBI,IAAInB,MAAJ,CACE,WADF,EAEE,+EAFF,CAvBJ,EA4BGmB,SA5BH,CA6BI,IAAInB,MAAJ,CACE,oBADF,EAEE,+GAFF,CA7BJ,EAkCGsB,MAlCH,EAmCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CxB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACApB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACArB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAtB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAvB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACAhC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM/B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIqB,OAAO,CAACW,QAAZ,EAAsB;MACpBjC,YAAY,CACT,uBACCsB,OAAO,CAACW,QACT,iBAAgBnC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBU,QAAtB,EAAiC,MAHxC,CAAZ;MAKAhC,yBAAyB,CAACoB,OAAO,CAACW,QAAT,EAAmBX,OAAO,CAACa,IAA3B,CAAzB;IACD,CAPD,CAQA;IARA,KASK,IAAIb,OAAO,CAACc,GAAZ,EAAiB;MACpBpC,YAAY,CAAC,6CAAD,CAAZ;MACAG,0BAA0B,CAACmB,OAAO,CAACa,IAAT,CAA1B;IACD,CAHI,CAIL;IAJK,KAKA,IAAIb,OAAO,CAACe,WAAZ,EAAyB;MAC5BrC,YAAY,CAAC,8CAAD,CAAZ;MACAI,2BAA2B;IAC5B,CAHI,CAIL;IAJK,KAKA;MACHJ,YAAY,CACV,sDADU,EAEV,OAFU,CAAZ;MAIAK,OAAO,CAACiC,IAAR;IACD;EACF;AACF,CAxEL,CAyEI;AAzEJ;AA4EAjC,OAAO,CAACkC,KAAR"}
@@ -1,6 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
+ import { printMessage } from '../../utils/Console';
4
5
  const {
5
6
  getTokens
6
7
  } = Authenticate;
@@ -23,23 +24,23 @@ async (host, realm, user, password, options) => {
23
24
  if (await getTokens()) {
24
25
  // import by id
25
26
  if (options.file && options.entityId) {
26
- console.log(`Importing provider "${options.entityId}" into realm "${state.default.session.getRealm()}"...`);
27
+ printMessage(`Importing provider "${options.entityId}" into realm "${state.default.session.getRealm()}"...`);
27
28
  importSaml2ProviderFromFile(options.entityId, options.file);
28
29
  } // --all -a
29
30
  else if (options.all && options.file) {
30
- console.log(`Importing all providers from a single file (${options.file})...`);
31
+ printMessage(`Importing all providers from a single file (${options.file})...`);
31
32
  importSaml2ProvidersFromFile(options.file);
32
33
  } // --all-separate -A
33
34
  else if (options.allSeparate && !options.file) {
34
- console.log('Importing all providers from separate files (*.saml.json) in current directory...');
35
+ printMessage('Importing all providers from separate files (*.saml.json) in current directory...');
35
36
  importSaml2ProvidersFromFiles();
36
37
  } // import first provider from file
37
38
  else if (options.file) {
38
- console.log(`Importing first provider from file "${options.file}" into realm "${state.default.session.getRealm()}"...`);
39
+ printMessage(`Importing first provider from file "${options.file}" into realm "${state.default.session.getRealm()}"...`);
39
40
  importFirstSaml2ProviderFromFile(options.file);
40
41
  } // unrecognized combination of options or no options
41
42
  else {
42
- console.log('Unrecognized combination of options or no options...');
43
+ printMessage('Unrecognized combination of options or no options...');
43
44
  program.help();
44
45
  }
45
46
  }
@@ -1 +1 @@
1
- {"version":3,"file":"saml-import.js","names":["Command","Option","Authenticate","Saml2","state","common","getTokens","importSaml2ProviderFromFile","importSaml2ProvidersFromFile","importSaml2ProvidersFromFiles","importFirstSaml2ProviderFromFile","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","file","entityId","console","log","getRealm","all","allSeparate","help","parse"],"sources":["cli/saml/saml-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst {\n importSaml2ProviderFromFile,\n importSaml2ProvidersFromFile,\n importSaml2ProvidersFromFiles,\n importFirstSaml2ProviderFromFile,\n} = Saml2;\n\nconst program = new Command('frodo saml import');\n\nprogram\n .description('Import SAML entity providers.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --entity-id <entity-id>',\n 'Entity id. If specified, only one provider is imported and the options -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file <file>',\n 'Name of the file to import the entity provider(s) from.'\n )\n )\n .addOption(\n new Option(\n '-a, --all',\n 'Import all entity providers from single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Import all entity providers from separate files (*.saml.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement program logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // import by id\n if (options.file && options.entityId) {\n console.log(\n `Importing provider \"${\n options.entityId\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importSaml2ProviderFromFile(options.entityId, options.file);\n }\n // --all -a\n else if (options.all && options.file) {\n console.log(\n `Importing all providers from a single file (${options.file})...`\n );\n importSaml2ProvidersFromFile(options.file);\n }\n // --all-separate -A\n else if (options.allSeparate && !options.file) {\n console.log(\n 'Importing all providers from separate files (*.saml.json) in current directory...'\n );\n importSaml2ProvidersFromFiles();\n }\n // import first provider from file\n else if (options.file) {\n console.log(\n `Importing first provider from file \"${\n options.file\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importFirstSaml2ProviderFromFile(options.file);\n }\n // unrecognized combination of options or no options\n else {\n console.log('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end program logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AAEA,MAAM;EACJK,2BADI;EAEJC,4BAFI;EAGJC,6BAHI;EAIJC;AAJI,IAKFP,KALJ;AAOA,MAAMQ,OAAO,GAAG,IAAIX,OAAJ,CAAY,mBAAZ,CAAhB;AAEAW,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeV,MAAM,CAACW,aAJtB,EAKGD,WALH,CAKeV,MAAM,CAACY,aALtB,EAMGF,WANH,CAMeV,MAAM,CAACa,YANtB,EAOGH,WAPH,CAOeV,MAAM,CAACc,gBAPtB,EAQGC,SARH,CAQaf,MAAM,CAACgB,gBARpB,EASGD,SATH,CASaf,MAAM,CAACiB,cATpB,EAUGF,SAVH,CAWI,IAAInB,MAAJ,CACE,6BADF,EAEE,+FAFF,CAXJ,EAgBGmB,SAhBH,CAiBI,IAAInB,MAAJ,CACE,mBADF,EAEE,yDAFF,CAjBJ,EAsBGmB,SAtBH,CAuBI,IAAInB,MAAJ,CACE,WADF,EAEE,gEAFF,CAvBJ,EA4BGmB,SA5BH,CA6BI,IAAInB,MAAJ,CACE,oBADF,EAEE,gHAFF,CA7BJ,EAkCGsB,MAlCH,EAmCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CxB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACApB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACArB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAtB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAvB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACAhC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAMhC,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIsB,OAAO,CAACW,IAAR,IAAgBX,OAAO,CAACY,QAA5B,EAAsC;MACpCC,OAAO,CAACC,GAAR,CACG,uBACCd,OAAO,CAACY,QACT,iBAAgBpC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBa,QAAtB,EAAiC,MAHpD;MAKApC,2BAA2B,CAACqB,OAAO,CAACY,QAAT,EAAmBZ,OAAO,CAACW,IAA3B,CAA3B;IACD,CAPD,CAQA;IARA,KASK,IAAIX,OAAO,CAACgB,GAAR,IAAehB,OAAO,CAACW,IAA3B,EAAiC;MACpCE,OAAO,CAACC,GAAR,CACG,+CAA8Cd,OAAO,CAACW,IAAK,MAD9D;MAGA/B,4BAA4B,CAACoB,OAAO,CAACW,IAAT,CAA5B;IACD,CALI,CAML;IANK,KAOA,IAAIX,OAAO,CAACiB,WAAR,IAAuB,CAACjB,OAAO,CAACW,IAApC,EAA0C;MAC7CE,OAAO,CAACC,GAAR,CACE,mFADF;MAGAjC,6BAA6B;IAC9B,CALI,CAML;IANK,KAOA,IAAImB,OAAO,CAACW,IAAZ,EAAkB;MACrBE,OAAO,CAACC,GAAR,CACG,uCACCd,OAAO,CAACW,IACT,iBAAgBnC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBa,QAAtB,EAAiC,MAHpD;MAKAjC,gCAAgC,CAACkB,OAAO,CAACW,IAAT,CAAhC;IACD,CAPI,CAQL;IARK,KASA;MACHE,OAAO,CAACC,GAAR,CAAY,sDAAZ;MACA/B,OAAO,CAACmC,IAAR;IACD;EACF;AACF,CAlFL,CAmFI;AAnFJ;AAsFAnC,OAAO,CAACoC,KAAR"}
1
+ {"version":3,"file":"saml-import.js","names":["Command","Option","Authenticate","Saml2","state","common","printMessage","getTokens","importSaml2ProviderFromFile","importSaml2ProvidersFromFile","importSaml2ProvidersFromFiles","importFirstSaml2ProviderFromFile","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","file","entityId","getRealm","all","allSeparate","help","parse"],"sources":["cli/saml/saml-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\nimport { printMessage } from '../../utils/Console';\n\nconst { getTokens } = Authenticate;\n\nconst {\n importSaml2ProviderFromFile,\n importSaml2ProvidersFromFile,\n importSaml2ProvidersFromFiles,\n importFirstSaml2ProviderFromFile,\n} = Saml2;\n\nconst program = new Command('frodo saml import');\n\nprogram\n .description('Import SAML entity providers.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --entity-id <entity-id>',\n 'Entity id. If specified, only one provider is imported and the options -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file <file>',\n 'Name of the file to import the entity provider(s) from.'\n )\n )\n .addOption(\n new Option(\n '-a, --all',\n 'Import all entity providers from single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Import all entity providers from separate files (*.saml.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement program logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // import by id\n if (options.file && options.entityId) {\n printMessage(\n `Importing provider \"${\n options.entityId\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importSaml2ProviderFromFile(options.entityId, options.file);\n }\n // --all -a\n else if (options.all && options.file) {\n printMessage(\n `Importing all providers from a single file (${options.file})...`\n );\n importSaml2ProvidersFromFile(options.file);\n }\n // --all-separate -A\n else if (options.allSeparate && !options.file) {\n printMessage(\n 'Importing all providers from separate files (*.saml.json) in current directory...'\n );\n importSaml2ProvidersFromFiles();\n }\n // import first provider from file\n else if (options.file) {\n printMessage(\n `Importing first provider from file \"${\n options.file\n }\" into realm \"${state.default.session.getRealm()}\"...`\n );\n importFirstSaml2ProviderFromFile(options.file);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end program logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AACA,SAASC,YAAT,QAA6B,qBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AAEA,MAAM;EACJM,2BADI;EAEJC,4BAFI;EAGJC,6BAHI;EAIJC;AAJI,IAKFR,KALJ;AAOA,MAAMS,OAAO,GAAG,IAAIZ,OAAJ,CAAY,mBAAZ,CAAhB;AAEAY,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeX,MAAM,CAACY,aAJtB,EAKGD,WALH,CAKeX,MAAM,CAACa,aALtB,EAMGF,WANH,CAMeX,MAAM,CAACc,YANtB,EAOGH,WAPH,CAOeX,MAAM,CAACe,gBAPtB,EAQGC,SARH,CAQahB,MAAM,CAACiB,gBARpB,EASGD,SATH,CASahB,MAAM,CAACkB,cATpB,EAUGF,SAVH,CAWI,IAAIpB,MAAJ,CACE,6BADF,EAEE,+FAFF,CAXJ,EAgBGoB,SAhBH,CAiBI,IAAIpB,MAAJ,CACE,mBADF,EAEE,yDAFF,CAjBJ,EAsBGoB,SAtBH,CAuBI,IAAIpB,MAAJ,CACE,WADF,EAEE,gEAFF,CAvBJ,EA4BGoB,SA5BH,CA6BI,IAAIpB,MAAJ,CACE,oBADF,EAEE,gHAFF,CA7BJ,EAkCGuB,MAlCH,EAmCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CzB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACArB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAtB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAvB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAxB,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACAjC,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAMhC,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIsB,OAAO,CAACW,IAAR,IAAgBX,OAAO,CAACY,QAA5B,EAAsC;MACpCnC,YAAY,CACT,uBACCuB,OAAO,CAACY,QACT,iBAAgBrC,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBW,QAAtB,EAAiC,MAHxC,CAAZ;MAKAlC,2BAA2B,CAACqB,OAAO,CAACY,QAAT,EAAmBZ,OAAO,CAACW,IAA3B,CAA3B;IACD,CAPD,CAQA;IARA,KASK,IAAIX,OAAO,CAACc,GAAR,IAAed,OAAO,CAACW,IAA3B,EAAiC;MACpClC,YAAY,CACT,+CAA8CuB,OAAO,CAACW,IAAK,MADlD,CAAZ;MAGA/B,4BAA4B,CAACoB,OAAO,CAACW,IAAT,CAA5B;IACD,CALI,CAML;IANK,KAOA,IAAIX,OAAO,CAACe,WAAR,IAAuB,CAACf,OAAO,CAACW,IAApC,EAA0C;MAC7ClC,YAAY,CACV,mFADU,CAAZ;MAGAI,6BAA6B;IAC9B,CALI,CAML;IANK,KAOA,IAAImB,OAAO,CAACW,IAAZ,EAAkB;MACrBlC,YAAY,CACT,uCACCuB,OAAO,CAACW,IACT,iBAAgBpC,KAAK,CAAC0B,OAAN,CAAcC,OAAd,CAAsBW,QAAtB,EAAiC,MAHxC,CAAZ;MAKA/B,gCAAgC,CAACkB,OAAO,CAACW,IAAT,CAAhC;IACD,CAPI,CAQL;IARK,KASA;MACHlC,YAAY,CAAC,sDAAD,CAAZ;MACAM,OAAO,CAACiC,IAAR;IACD;EACF;AACF,CAlFL,CAmFI;AAnFJ;AAsFAjC,OAAO,CAACkC,KAAR"}
@@ -1,6 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
+ import { printMessage } from '../../utils/Console';
4
5
  const {
5
6
  getTokens
6
7
  } = Authenticate;
@@ -18,7 +19,7 @@ async (host, realm, user, password, options) => {
18
19
  state.default.session.setAllowInsecureConnection(options.insecure);
19
20
 
20
21
  if (await getTokens()) {
21
- console.log(`Listing SAML entity providers in realm "${state.default.session.getRealm()}"...`);
22
+ printMessage(`Listing SAML entity providers in realm "${state.default.session.getRealm()}"...`);
22
23
  listSaml2Providers(options.long);
23
24
  }
24
25
  } // end command logic inside action handler
@@ -1 +1 @@
1
- {"version":3,"file":"saml-list.js","names":["Command","Option","Authenticate","Saml2","state","common","getTokens","listSaml2Providers","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","getRealm","long","parse"],"sources":["cli/saml/saml-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst { listSaml2Providers } = Saml2;\n\nconst program = new Command('frodo saml list');\n\nprogram\n .description('List SAML entity providers.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log(\n `Listing SAML entity providers in realm \"${state.default.session.getRealm()}\"...`\n );\n listSaml2Providers(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EAAEK;AAAF,IAAyBJ,KAA/B;AAEA,MAAMK,OAAO,GAAG,IAAIR,OAAJ,CAAY,iBAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,6BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAWI,IAAIhB,MAAJ,CAAW,YAAX,EAAyB,uBAAzB,EAAkDmB,OAAlD,CAA0D,KAA1D,EAAiE,OAAjE,CAXJ,EAaGC,MAbH,EAcI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAlB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACAnB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACApB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACArB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA7B,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB8B,OAAO,CAACC,GAAR,CACG,2CAA0CjC,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBW,QAAtB,EAAiC,MAD9E;IAGA/B,kBAAkB,CAACmB,OAAO,CAACa,IAAT,CAAlB;EACD;AACF,CA5BL,CA6BI;AA7BJ;AAgCA/B,OAAO,CAACgC,KAAR"}
1
+ {"version":3,"file":"saml-list.js","names":["Command","Option","Authenticate","Saml2","state","common","printMessage","getTokens","listSaml2Providers","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","getRealm","long","parse"],"sources":["cli/saml/saml-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\nimport { printMessage } from '../../utils/Console';\n\nconst { getTokens } = Authenticate;\nconst { listSaml2Providers } = Saml2;\n\nconst program = new Command('frodo saml list');\n\nprogram\n .description('List SAML entity providers.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage(\n `Listing SAML entity providers in realm \"${state.default.session.getRealm()}\"...`\n );\n listSaml2Providers(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AACA,SAASC,YAAT,QAA6B,qBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EAAEM;AAAF,IAAyBL,KAA/B;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,iBAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,6BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAWI,IAAIjB,MAAJ,CAAW,YAAX,EAAyB,uBAAzB,EAAkDoB,OAAlD,CAA0D,KAA1D,EAAiE,OAAjE,CAXJ,EAaGC,MAbH,EAcI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAnB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACApB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACArB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACAtB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA9B,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrBD,YAAY,CACT,2CAA0CF,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBS,QAAtB,EAAiC,MADlE,CAAZ;IAGA7B,kBAAkB,CAACmB,OAAO,CAACW,IAAT,CAAlB;EACD;AACF,CA5BL,CA6BI;AA7BJ;AAgCA7B,OAAO,CAAC8B,KAAR"}
@@ -1,6 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
+ import { printMessage } from '../../utils/Console';
4
5
  const {
5
6
  getTokens
6
7
  } = Authenticate;
@@ -20,16 +21,16 @@ async (host, realm, user, password, options) => {
20
21
  if (await getTokens()) {
21
22
  // export by id/name
22
23
  if (options.entityId) {
23
- console.log(`Exporting metadata for provider "${options.entityId}" from realm "${state.default.session.getRealm()}"...`);
24
+ printMessage(`Exporting metadata for provider "${options.entityId}" from realm "${state.default.session.getRealm()}"...`);
24
25
  exportSaml2Metadata(options.entityId, options.file);
25
26
  } // // --all-separate -A
26
27
  // else if (options.allSeparate) {
27
- // console.log('Exporting all providers to separate files...');
28
+ // printMessage('Exporting all providers to separate files...');
28
29
  // exportProvidersToFiles();
29
30
  // }
30
31
  // unrecognized combination of options or no options
31
32
  else {
32
- console.log('Unrecognized combination of options or no options...', 'error');
33
+ printMessage('Unrecognized combination of options or no options...', 'error');
33
34
  program.help();
34
35
  }
35
36
  }
@@ -1 +1 @@
1
- {"version":3,"file":"saml-metadata-export.js","names":["Command","Option","Authenticate","Saml2","state","common","getTokens","exportSaml2Metadata","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","entityId","console","log","getRealm","file","help","parse"],"sources":["cli/saml/saml-metadata-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst { exportSaml2Metadata } = Saml2;\n\nconst program = new Command('frodo saml metadata export');\n\nprogram\n .description('Export SAML metadata.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --entity-id <entity-id>',\n 'Entity id. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file [file]',\n 'Name of the file to write the exported metadata to. Ignored with -A. If not specified, the export file is named <entity-id>.metadata.xml.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all the providers in a realm as separate files <provider name>.saml.json. Ignored with -t, -i, and -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // export by id/name\n if (options.entityId) {\n console.log(\n `Exporting metadata for provider \"${\n options.entityId\n }\" from realm \"${state.default.session.getRealm()}\"...`\n );\n exportSaml2Metadata(options.entityId, options.file);\n }\n // // --all-separate -A\n // else if (options.allSeparate) {\n // console.log('Exporting all providers to separate files...');\n // exportProvidersToFiles();\n // }\n // unrecognized combination of options or no options\n else {\n console.log(\n 'Unrecognized combination of options or no options...',\n 'error'\n );\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AAEA,MAAM;EAAEK;AAAF,IAA0BJ,KAAhC;AAEA,MAAMK,OAAO,GAAG,IAAIR,OAAJ,CAAY,4BAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,uBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAWI,IAAIhB,MAAJ,CACE,6BADF,EAEE,iDAFF,CAXJ,EAgBGgB,SAhBH,CAiBI,IAAIhB,MAAJ,CACE,mBADF,EAEE,2IAFF,CAjBJ,EAsBGgB,SAtBH,CAuBI,IAAIhB,MAAJ,CACE,oBADF,EAEE,+GAFF,CAvBJ,EA4BGmB,MA5BH,EA6BI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CrB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAjB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAlB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAnB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACApB,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA7B,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAImB,OAAO,CAACW,QAAZ,EAAsB;MACpBC,OAAO,CAACC,GAAR,CACG,oCACCb,OAAO,CAACW,QACT,iBAAgBhC,KAAK,CAACsB,OAAN,CAAcC,OAAd,CAAsBY,QAAtB,EAAiC,MAHpD;MAKAhC,mBAAmB,CAACkB,OAAO,CAACW,QAAT,EAAmBX,OAAO,CAACe,IAA3B,CAAnB;IACD,CAPD,CAQA;IACA;IACA;IACA;IACA;IACA;IAbA,KAcK;MACHH,OAAO,CAACC,GAAR,CACE,sDADF,EAEE,OAFF;MAIA9B,OAAO,CAACiC,IAAR;IACD;EACF;AACF,CA7DL,CA8DI;AA9DJ;AAiEAjC,OAAO,CAACkC,KAAR"}
1
+ {"version":3,"file":"saml-metadata-export.js","names":["Command","Option","Authenticate","Saml2","state","common","printMessage","getTokens","exportSaml2Metadata","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","entityId","getRealm","file","help","parse"],"sources":["cli/saml/saml-metadata-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Saml2, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\nimport { printMessage } from '../../utils/Console';\n\nconst { getTokens } = Authenticate;\n\nconst { exportSaml2Metadata } = Saml2;\n\nconst program = new Command('frodo saml metadata export');\n\nprogram\n .description('Export SAML metadata.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --entity-id <entity-id>',\n 'Entity id. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '-f, --file [file]',\n 'Name of the file to write the exported metadata to. Ignored with -A. If not specified, the export file is named <entity-id>.metadata.xml.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all the providers in a realm as separate files <provider name>.saml.json. Ignored with -t, -i, and -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // export by id/name\n if (options.entityId) {\n printMessage(\n `Exporting metadata for provider \"${\n options.entityId\n }\" from realm \"${state.default.session.getRealm()}\"...`\n );\n exportSaml2Metadata(options.entityId, options.file);\n }\n // // --all-separate -A\n // else if (options.allSeparate) {\n // printMessage('Exporting all providers to separate files...');\n // exportProvidersToFiles();\n // }\n // unrecognized combination of options or no options\n else {\n printMessage(\n 'Unrecognized combination of options or no options...',\n 'error'\n );\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,EAA8BC,KAA9B,QAA2C,uBAA3C;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AACA,SAASC,YAAT,QAA6B,qBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AAEA,MAAM;EAAEM;AAAF,IAA0BL,KAAhC;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,4BAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,uBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAWI,IAAIjB,MAAJ,CACE,6BADF,EAEE,iDAFF,CAXJ,EAgBGiB,SAhBH,CAiBI,IAAIjB,MAAJ,CACE,mBADF,EAEE,2IAFF,CAjBJ,EAsBGiB,SAtBH,CAuBI,IAAIjB,MAAJ,CACE,oBADF,EAEE,+GAFF,CAvBJ,EA4BGoB,MA5BH,EA6BI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAlB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAnB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACApB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACArB,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA9B,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAImB,OAAO,CAACW,QAAZ,EAAsB;MACpB/B,YAAY,CACT,oCACCoB,OAAO,CAACW,QACT,iBAAgBjC,KAAK,CAACuB,OAAN,CAAcC,OAAd,CAAsBU,QAAtB,EAAiC,MAHxC,CAAZ;MAKA9B,mBAAmB,CAACkB,OAAO,CAACW,QAAT,EAAmBX,OAAO,CAACa,IAA3B,CAAnB;IACD,CAPD,CAQA;IACA;IACA;IACA;IACA;IACA;IAbA,KAcK;MACHjC,YAAY,CACV,sDADU,EAEV,OAFU,CAAZ;MAIAG,OAAO,CAAC+B,IAAR;IACD;EACF;AACF,CA7DL,CA8DI;AA9DJ;AAiEA/B,OAAO,CAACgC,KAAR"}
@@ -1,6 +1,6 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
4
  const {
5
5
  getTokens
6
6
  } = Authenticate;
@@ -1 +1 @@
1
- {"version":3,"file":"script-delete.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","parse"],"sources":["cli/script/script-delete.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo cmd delete');\n\nprogram\n .description('Cmd delete.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --cmd-id <cmd-id>',\n 'Cmd id. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option('-a, --all', 'Delete all cmds in a realm. Ignored with -i.')\n )\n .addOption(\n new Option(\n '--no-deep',\n 'No deep delete. This leaves orphaned configuration artifacts behind.'\n )\n )\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,QAAoC,uBAApC;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBH,YAAtB;AAEA,MAAMI,OAAO,GAAG,IAAIN,OAAJ,CAAY,kBAAZ,CAAhB;AAEAM,OAAO,CACJC,WADH,CACe,aADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeN,MAAM,CAACO,aAJtB,EAKGD,WALH,CAKeN,MAAM,CAACQ,aALtB,EAMGF,WANH,CAMeN,MAAM,CAACS,YANtB,EAOGH,WAPH,CAOeN,MAAM,CAACU,gBAPtB,EAQGC,SARH,CAQaX,MAAM,CAACY,gBARpB,EASGD,SATH,CASaX,MAAM,CAACa,cATpB,EAUGF,SAVH,CAWI,IAAId,MAAJ,CACE,uBADF,EAEE,8CAFF,CAXJ,EAgBGc,SAhBH,CAiBI,IAAId,MAAJ,CAAW,WAAX,EAAwB,8CAAxB,CAjBJ,EAmBGc,SAnBH,CAoBI,IAAId,MAAJ,CACE,WADF,EAEE,sEAFF,CApBJ,EAyBGc,SAzBH,CA0BI,IAAId,MAAJ,CACE,WADF,EAEE,kGAFF,EAGEiB,OAHF,CAGU,KAHV,EAGiB,KAHjB,CA1BJ,EA+BGC,MA/BH,EAgCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CrB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAjB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACAlB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACAnB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACApB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA5B,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM5B,SAAS,EAAnB,EAAuB,CACrB;EACD;AACF,CA3CL,CA4CI;AA5CJ;AA+CAC,OAAO,CAAC4B,KAAR"}
1
+ {"version":3,"file":"script-delete.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","parse"],"sources":["cli/script/script-delete.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo cmd delete');\n\nprogram\n .description('Cmd delete.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --cmd-id <cmd-id>',\n 'Cmd id. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option('-a, --all', 'Delete all cmds in a realm. Ignored with -i.')\n )\n .addOption(\n new Option(\n '--no-deep',\n 'No deep delete. This leaves orphaned configuration artifacts behind.'\n )\n )\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,QAAoC,uBAApC;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBH,YAAtB;AAEA,MAAMI,OAAO,GAAG,IAAIN,OAAJ,CAAY,kBAAZ,CAAhB;AAEAM,OAAO,CACJC,WADH,CACe,aADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeN,MAAM,CAACO,aAJtB,EAKGD,WALH,CAKeN,MAAM,CAACQ,aALtB,EAMGF,WANH,CAMeN,MAAM,CAACS,YANtB,EAOGH,WAPH,CAOeN,MAAM,CAACU,gBAPtB,EAQGC,SARH,CAQaX,MAAM,CAACY,gBARpB,EASGD,SATH,CASaX,MAAM,CAACa,cATpB,EAUGF,SAVH,CAWI,IAAId,MAAJ,CACE,uBADF,EAEE,8CAFF,CAXJ,EAgBGc,SAhBH,CAiBI,IAAId,MAAJ,CAAW,WAAX,EAAwB,8CAAxB,CAjBJ,EAmBGc,SAnBH,CAoBI,IAAId,MAAJ,CACE,WADF,EAEE,sEAFF,CApBJ,EAyBGc,SAzBH,CA0BI,IAAId,MAAJ,CACE,WADF,EAEE,kGAFF,EAGEiB,OAHF,CAGU,KAHV,EAGiB,KAHjB,CA1BJ,EA+BGC,MA/BH,EAgCI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CrB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAjB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACAlB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACAnB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACApB,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA5B,KAAK,CAACe,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM5B,SAAS,EAAnB,EAAuB,CACrB;EACD;AACF,CA3CL,CA4CI;AA5CJ;AA+CAC,OAAO,CAAC4B,KAAR"}
@@ -1,6 +1,6 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
4
  const {
5
5
  getTokens
6
6
  } = Authenticate;
@@ -1 +1 @@
1
- {"version":3,"file":"script-describe.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","parse"],"sources":["cli/script/script-describe.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo cmd describe');\n\nprogram\n .description('Cmd describe.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --cmd-id <cmd-id>', 'Cmd id.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,QAAoC,uBAApC;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBH,YAAtB;AAEA,MAAMI,OAAO,GAAG,IAAIN,OAAJ,CAAY,oBAAZ,CAAhB;AAEAM,OAAO,CACJC,WADH,CACe,eADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeN,MAAM,CAACO,aAJtB,EAKGD,WALH,CAKeN,MAAM,CAACQ,aALtB,EAMGF,WANH,CAMeN,MAAM,CAACS,YANtB,EAOGH,WAPH,CAOeN,MAAM,CAACU,gBAPtB,EAQGC,SARH,CAQaX,MAAM,CAACY,gBARpB,EASGD,SATH,CASaX,MAAM,CAACa,cATpB,EAUGF,SAVH,CAUa,IAAId,MAAJ,CAAW,uBAAX,EAAoC,SAApC,CAVb,EAWGiB,MAXH,EAYI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CpB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAhB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAjB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAlB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAnB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA5B,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM5B,SAAS,EAAnB,EAAuB,CACrB;EACD;AACF,CAvBL,CAwBI;AAxBJ;AA2BAC,OAAO,CAAC4B,KAAR"}
1
+ {"version":3,"file":"script-describe.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","parse"],"sources":["cli/script/script-describe.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo cmd describe');\n\nprogram\n .description('Cmd describe.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --cmd-id <cmd-id>', 'Cmd id.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,QAAoC,uBAApC;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBH,YAAtB;AAEA,MAAMI,OAAO,GAAG,IAAIN,OAAJ,CAAY,oBAAZ,CAAhB;AAEAM,OAAO,CACJC,WADH,CACe,eADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeN,MAAM,CAACO,aAJtB,EAKGD,WALH,CAKeN,MAAM,CAACQ,aALtB,EAMGF,WANH,CAMeN,MAAM,CAACS,YANtB,EAOGH,WAPH,CAOeN,MAAM,CAACU,gBAPtB,EAQGC,SARH,CAQaX,MAAM,CAACY,gBARpB,EASGD,SATH,CASaX,MAAM,CAACa,cATpB,EAUGF,SAVH,CAUa,IAAId,MAAJ,CAAW,uBAAX,EAAoC,SAApC,CAVb,EAWGiB,MAXH,EAYI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CpB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAhB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAjB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAlB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAnB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA5B,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM5B,SAAS,EAAnB,EAAuB,CACrB;EACD;AACF,CAvBL,CAwBI;AAxBJ;AA2BAC,OAAO,CAAC4B,KAAR"}
@@ -1,6 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Script, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
+ import { printMessage } from '../../utils/Console';
4
5
  const {
5
6
  getTokens
6
7
  } = Authenticate;
@@ -33,19 +34,19 @@ async (host, realm, user, password, options) => {
33
34
  if (await getTokens()) {
34
35
  // export by name
35
36
  if (options.scriptName || options.script) {
36
- console.log('Exporting script...');
37
+ printMessage('Exporting script...');
37
38
  exportScriptByName(options.scriptName || options.script, options.file);
38
39
  } // -a / --all
39
40
  else if (options.all) {
40
- console.log('Exporting all scripts to a single file...');
41
+ printMessage('Exporting all scripts to a single file...');
41
42
  exportScriptsToFile(options.file);
42
43
  } // -A / --all-separate
43
44
  else if (options.allSeparate) {
44
- console.log('Exporting all scripts to separate files...');
45
+ printMessage('Exporting all scripts to separate files...');
45
46
  exportScriptsToFiles();
46
47
  } // unrecognized combination of options or no options
47
48
  else {
48
- console.log('Unrecognized combination of options or no options...', 'error');
49
+ printMessage('Unrecognized combination of options or no options...', 'error');
49
50
  program.help();
50
51
  }
51
52
  }
@@ -1 +1 @@
1
- {"version":3,"file":"script-export.js","names":["Command","Option","Authenticate","Script","state","common","getTokens","exportScriptByName","exportScriptsToFile","exportScriptsToFiles","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","scriptName","script","console","log","file","all","allSeparate","help","parse"],"sources":["cli/script/script-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Script, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\nconst { exportScriptByName } = Script;\nconst { exportScriptsToFile } = Script;\nconst { exportScriptsToFiles } = Script;\n\nconst program = new Command('frodo script export');\n\nprogram\n .description('Export scripts.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-n, --script-name <name>',\n 'Name of the script. If specified, -a and -A are ignored.'\n )\n )\n // .addOption(\n // new Option(\n // '-i, --script-id <uuid>',\n // 'Uuid of the script. If specified, -a and -A are ignored.'\n // )\n // )\n .addOption(new Option('-f, --file <file>', 'Name of the export file.'))\n .addOption(\n new Option(\n '-a, --all',\n 'Export all scripts to a single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all scripts to separate files (*.script.json) in the current directory. Ignored with -i or -a.'\n )\n )\n // deprecated option\n .addOption(\n new Option(\n '-s, --script <script>',\n 'DEPRECATED! Use -n/--script-name instead. Name of the script.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // export by name\n if (options.scriptName || options.script) {\n console.log('Exporting script...');\n exportScriptByName(\n options.scriptName || options.script,\n options.file\n );\n }\n // -a / --all\n else if (options.all) {\n console.log('Exporting all scripts to a single file...');\n exportScriptsToFile(options.file);\n }\n // -A / --all-separate\n else if (options.allSeparate) {\n console.log('Exporting all scripts to separate files...');\n exportScriptsToFiles();\n }\n // unrecognized combination of options or no options\n else {\n console.log(\n 'Unrecognized combination of options or no options...',\n 'error'\n );\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,MAAvB,EAA+BC,KAA/B,QAA4C,uBAA5C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AACA,MAAM;EAAEK;AAAF,IAAyBJ,MAA/B;AACA,MAAM;EAAEK;AAAF,IAA0BL,MAAhC;AACA,MAAM;EAAEM;AAAF,IAA2BN,MAAjC;AAEA,MAAMO,OAAO,GAAG,IAAIV,OAAJ,CAAY,qBAAZ,CAAhB;AAEAU,OAAO,CACJC,WADH,CACe,iBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeT,MAAM,CAACU,aAJtB,EAKGD,WALH,CAKeT,MAAM,CAACW,aALtB,EAMGF,WANH,CAMeT,MAAM,CAACY,YANtB,EAOGH,WAPH,CAOeT,MAAM,CAACa,gBAPtB,EAQGC,SARH,CAQad,MAAM,CAACe,gBARpB,EASGD,SATH,CASad,MAAM,CAACgB,cATpB,EAUGF,SAVH,CAWI,IAAIlB,MAAJ,CACE,0BADF,EAEE,0DAFF,CAXJ,EAgBE;AACA;AACA;AACA;AACA;AACA;AArBF,CAsBGkB,SAtBH,CAsBa,IAAIlB,MAAJ,CAAW,mBAAX,EAAgC,0BAAhC,CAtBb,EAuBGkB,SAvBH,CAwBI,IAAIlB,MAAJ,CACE,WADF,EAEE,uDAFF,CAxBJ,EA6BGkB,SA7BH,CA8BI,IAAIlB,MAAJ,CACE,oBADF,EAEE,uGAFF,CA9BJ,EAmCE;AAnCF,CAoCGkB,SApCH,CAqCI,IAAIlB,MAAJ,CACE,uBADF,EAEE,+DAFF,CArCJ,EA0CGqB,MA1CH,EA2CI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAnB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACApB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACArB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAtB,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA/B,KAAK,CAACwB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM/B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIqB,OAAO,CAACW,UAAR,IAAsBX,OAAO,CAACY,MAAlC,EAA0C;MACxCC,OAAO,CAACC,GAAR,CAAY,qBAAZ;MACAlC,kBAAkB,CAChBoB,OAAO,CAACW,UAAR,IAAsBX,OAAO,CAACY,MADd,EAEhBZ,OAAO,CAACe,IAFQ,CAAlB;IAID,CAND,CAOA;IAPA,KAQK,IAAIf,OAAO,CAACgB,GAAZ,EAAiB;MACpBH,OAAO,CAACC,GAAR,CAAY,2CAAZ;MACAjC,mBAAmB,CAACmB,OAAO,CAACe,IAAT,CAAnB;IACD,CAHI,CAIL;IAJK,KAKA,IAAIf,OAAO,CAACiB,WAAZ,EAAyB;MAC5BJ,OAAO,CAACC,GAAR,CAAY,4CAAZ;MACAhC,oBAAoB;IACrB,CAHI,CAIL;IAJK,KAKA;MACH+B,OAAO,CAACC,GAAR,CACE,sDADF,EAEE,OAFF;MAIA/B,OAAO,CAACmC,IAAR;IACD;EACF;AACF,CA/EL,CAgFI;AAhFJ;AAmFAnC,OAAO,CAACoC,KAAR"}
1
+ {"version":3,"file":"script-export.js","names":["Command","Option","Authenticate","Script","state","common","printMessage","getTokens","exportScriptByName","exportScriptsToFile","exportScriptsToFiles","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","scriptName","script","file","all","allSeparate","help","parse"],"sources":["cli/script/script-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Script, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\nimport { printMessage } from '../../utils/Console';\n\nconst { getTokens } = Authenticate;\nconst { exportScriptByName } = Script;\nconst { exportScriptsToFile } = Script;\nconst { exportScriptsToFiles } = Script;\n\nconst program = new Command('frodo script export');\n\nprogram\n .description('Export scripts.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-n, --script-name <name>',\n 'Name of the script. If specified, -a and -A are ignored.'\n )\n )\n // .addOption(\n // new Option(\n // '-i, --script-id <uuid>',\n // 'Uuid of the script. If specified, -a and -A are ignored.'\n // )\n // )\n .addOption(new Option('-f, --file <file>', 'Name of the export file.'))\n .addOption(\n new Option(\n '-a, --all',\n 'Export all scripts to a single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all scripts to separate files (*.script.json) in the current directory. Ignored with -i or -a.'\n )\n )\n // deprecated option\n .addOption(\n new Option(\n '-s, --script <script>',\n 'DEPRECATED! Use -n/--script-name instead. Name of the script.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // export by name\n if (options.scriptName || options.script) {\n printMessage('Exporting script...');\n exportScriptByName(\n options.scriptName || options.script,\n options.file\n );\n }\n // -a / --all\n else if (options.all) {\n printMessage('Exporting all scripts to a single file...');\n exportScriptsToFile(options.file);\n }\n // -A / --all-separate\n else if (options.allSeparate) {\n printMessage('Exporting all scripts to separate files...');\n exportScriptsToFiles();\n }\n // unrecognized combination of options or no options\n else {\n printMessage(\n 'Unrecognized combination of options or no options...',\n 'error'\n );\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,MAAvB,EAA+BC,KAA/B,QAA4C,uBAA5C;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AACA,SAASC,YAAT,QAA6B,qBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EAAEM;AAAF,IAAyBL,MAA/B;AACA,MAAM;EAAEM;AAAF,IAA0BN,MAAhC;AACA,MAAM;EAAEO;AAAF,IAA2BP,MAAjC;AAEA,MAAMQ,OAAO,GAAG,IAAIX,OAAJ,CAAY,qBAAZ,CAAhB;AAEAW,OAAO,CACJC,WADH,CACe,iBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeV,MAAM,CAACW,aAJtB,EAKGD,WALH,CAKeV,MAAM,CAACY,aALtB,EAMGF,WANH,CAMeV,MAAM,CAACa,YANtB,EAOGH,WAPH,CAOeV,MAAM,CAACc,gBAPtB,EAQGC,SARH,CAQaf,MAAM,CAACgB,gBARpB,EASGD,SATH,CASaf,MAAM,CAACiB,cATpB,EAUGF,SAVH,CAWI,IAAInB,MAAJ,CACE,0BADF,EAEE,0DAFF,CAXJ,EAgBE;AACA;AACA;AACA;AACA;AACA;AArBF,CAsBGmB,SAtBH,CAsBa,IAAInB,MAAJ,CAAW,mBAAX,EAAgC,0BAAhC,CAtBb,EAuBGmB,SAvBH,CAwBI,IAAInB,MAAJ,CACE,WADF,EAEE,uDAFF,CAxBJ,EA6BGmB,SA7BH,CA8BI,IAAInB,MAAJ,CACE,oBADF,EAEE,uGAFF,CA9BJ,EAmCE;AAnCF,CAoCGmB,SApCH,CAqCI,IAAInB,MAAJ,CACE,uBADF,EAEE,+DAFF,CArCJ,EA0CGsB,MA1CH,EA2CI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CxB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACApB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACArB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAtB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAvB,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACAhC,KAAK,CAACyB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM/B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIqB,OAAO,CAACW,UAAR,IAAsBX,OAAO,CAACY,MAAlC,EAA0C;MACxClC,YAAY,CAAC,qBAAD,CAAZ;MACAE,kBAAkB,CAChBoB,OAAO,CAACW,UAAR,IAAsBX,OAAO,CAACY,MADd,EAEhBZ,OAAO,CAACa,IAFQ,CAAlB;IAID,CAND,CAOA;IAPA,KAQK,IAAIb,OAAO,CAACc,GAAZ,EAAiB;MACpBpC,YAAY,CAAC,2CAAD,CAAZ;MACAG,mBAAmB,CAACmB,OAAO,CAACa,IAAT,CAAnB;IACD,CAHI,CAIL;IAJK,KAKA,IAAIb,OAAO,CAACe,WAAZ,EAAyB;MAC5BrC,YAAY,CAAC,4CAAD,CAAZ;MACAI,oBAAoB;IACrB,CAHI,CAIL;IAJK,KAKA;MACHJ,YAAY,CACV,sDADU,EAEV,OAFU,CAAZ;MAIAK,OAAO,CAACiC,IAAR;IACD;EACF;AACF,CA/EL,CAgFI;AAhFJ;AAmFAjC,OAAO,CAACkC,KAAR"}
@@ -1,6 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Script, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
+ import { printMessage } from '../../utils/Console';
4
5
  const {
5
6
  getTokens
6
7
  } = Authenticate;
@@ -19,7 +20,7 @@ async (host, realm, user, password, options) => {
19
20
  state.default.session.setAllowInsecureConnection(options.insecure);
20
21
 
21
22
  if (await getTokens()) {
22
- console.log(`Importing script(s) into realm "${state.default.session.getRealm()}"...`);
23
+ printMessage(`Importing script(s) into realm "${state.default.session.getRealm()}"...`);
23
24
  importScriptsFromFile(options.scriptName || options.script, options.file, options.reUuid);
24
25
  }
25
26
  } // end command logic inside action handler
@@ -1 +1 @@
1
- {"version":3,"file":"script-import.js","names":["Command","Option","Authenticate","Script","state","common","getTokens","importScriptsFromFile","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","console","log","getRealm","scriptName","script","file","reUuid","parse"],"sources":["cli/script/script-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Script, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst { importScriptsFromFile } = Script;\n\nconst program = new Command('frodo script import');\n\nprogram\n .description('Import scripts.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-f, --file <file>', 'Name of the file to import.'))\n .addOption(\n new Option(\n '-n, --script-name <name>',\n 'Name of the script. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '--re-uuid',\n 'Re-UUID. Create a new UUID for the script upon import. Use this to duplicate a script or create a new version of the same script. Note that you must also choose a new name using -n/--script-name to avoid import errors.'\n ).default(false, 'false')\n )\n // deprecated option\n .addOption(\n new Option(\n '-s, --script <script>',\n 'DEPRECATED! Use -n/--script-name instead. Name of the script.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n console.log(\n `Importing script(s) into realm \"${state.default.session.getRealm()}\"...`\n );\n importScriptsFromFile(\n options.scriptName || options.script,\n options.file,\n options.reUuid\n );\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,MAAvB,EAA+BC,KAA/B,QAA4C,uBAA5C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBJ,YAAtB;AAEA,MAAM;EAAEK;AAAF,IAA4BJ,MAAlC;AAEA,MAAMK,OAAO,GAAG,IAAIR,OAAJ,CAAY,qBAAZ,CAAhB;AAEAQ,OAAO,CACJC,WADH,CACe,iBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeP,MAAM,CAACQ,aAJtB,EAKGD,WALH,CAKeP,MAAM,CAACS,aALtB,EAMGF,WANH,CAMeP,MAAM,CAACU,YANtB,EAOGH,WAPH,CAOeP,MAAM,CAACW,gBAPtB,EAQGC,SARH,CAQaZ,MAAM,CAACa,gBARpB,EASGD,SATH,CASaZ,MAAM,CAACc,cATpB,EAUGF,SAVH,CAUa,IAAIhB,MAAJ,CAAW,mBAAX,EAAgC,6BAAhC,CAVb,EAWGgB,SAXH,CAYI,IAAIhB,MAAJ,CACE,0BADF,EAEE,0DAFF,CAZJ,EAiBGgB,SAjBH,CAkBI,IAAIhB,MAAJ,CACE,WADF,EAEE,4NAFF,EAGEmB,OAHF,CAGU,KAHV,EAGiB,OAHjB,CAlBJ,EAuBE;AAvBF,CAwBGH,SAxBH,CAyBI,IAAIhB,MAAJ,CACE,uBADF,EAEE,+DAFF,CAzBJ,EA8BGoB,MA9BH,EA+BI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CtB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAlB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACAnB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACApB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACArB,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA7B,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB8B,OAAO,CAACC,GAAR,CACG,mCAAkCjC,KAAK,CAACgB,OAAN,CAAcO,OAAd,CAAsBW,QAAtB,EAAiC,MADtE;IAGA/B,qBAAqB,CACnBmB,OAAO,CAACa,UAAR,IAAsBb,OAAO,CAACc,MADX,EAEnBd,OAAO,CAACe,IAFW,EAGnBf,OAAO,CAACgB,MAHW,CAArB;EAKD;AACF,CAjDL,CAkDI;AAlDJ;AAqDAlC,OAAO,CAACmC,KAAR"}
1
+ {"version":3,"file":"script-import.js","names":["Command","Option","Authenticate","Script","state","common","printMessage","getTokens","importScriptsFromFile","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","getRealm","scriptName","script","file","reUuid","parse"],"sources":["cli/script/script-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Script, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common';\nimport { printMessage } from '../../utils/Console';\n\nconst { getTokens } = Authenticate;\n\nconst { importScriptsFromFile } = Script;\n\nconst program = new Command('frodo script import');\n\nprogram\n .description('Import scripts.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-f, --file <file>', 'Name of the file to import.'))\n .addOption(\n new Option(\n '-n, --script-name <name>',\n 'Name of the script. If specified, -a and -A are ignored.'\n )\n )\n .addOption(\n new Option(\n '--re-uuid',\n 'Re-UUID. Create a new UUID for the script upon import. Use this to duplicate a script or create a new version of the same script. Note that you must also choose a new name using -n/--script-name to avoid import errors.'\n ).default(false, 'false')\n )\n // deprecated option\n .addOption(\n new Option(\n '-s, --script <script>',\n 'DEPRECATED! Use -n/--script-name instead. Name of the script.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage(\n `Importing script(s) into realm \"${state.default.session.getRealm()}\"...`\n );\n importScriptsFromFile(\n options.scriptName || options.script,\n options.file,\n options.reUuid\n );\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,MAAvB,EAA+BC,KAA/B,QAA4C,uBAA5C;AACA,OAAO,KAAKC,MAAZ,MAAwB,eAAxB;AACA,SAASC,YAAT,QAA6B,qBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AAEA,MAAM;EAAEM;AAAF,IAA4BL,MAAlC;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,qBAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,iBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAUa,IAAIjB,MAAJ,CAAW,mBAAX,EAAgC,6BAAhC,CAVb,EAWGiB,SAXH,CAYI,IAAIjB,MAAJ,CACE,0BADF,EAEE,0DAFF,CAZJ,EAiBGiB,SAjBH,CAkBI,IAAIjB,MAAJ,CACE,WADF,EAEE,4NAFF,EAGEoB,OAHF,CAGU,KAHV,EAGiB,OAHjB,CAlBJ,EAuBE;AAvBF,CAwBGH,SAxBH,CAyBI,IAAIjB,MAAJ,CACE,uBADF,EAEE,+DAFF,CAzBJ,EA8BGqB,MA9BH,EA+BI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAnB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACApB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACArB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACAtB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA9B,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrBD,YAAY,CACT,mCAAkCF,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBS,QAAtB,EAAiC,MAD1D,CAAZ;IAGA7B,qBAAqB,CACnBmB,OAAO,CAACW,UAAR,IAAsBX,OAAO,CAACY,MADX,EAEnBZ,OAAO,CAACa,IAFW,EAGnBb,OAAO,CAACc,MAHW,CAArB;EAKD;AACF,CAjDL,CAkDI;AAlDJ;AAqDAhC,OAAO,CAACiC,KAAR"}
@@ -1,6 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Script, state } from '@rockcarver/frodo-lib';
3
- import * as common from '../cmd_common.js';
3
+ import * as common from '../cmd_common';
4
+ import { printMessage } from '../../utils/Console';
4
5
  const {
5
6
  getTokens
6
7
  } = Authenticate;
@@ -18,7 +19,7 @@ async (host, realm, user, password, options) => {
18
19
  state.default.session.setAllowInsecureConnection(options.insecure);
19
20
 
20
21
  if (await getTokens()) {
21
- console.log(`Listing scripts in realm "${state.default.session.getRealm()}"...`);
22
+ printMessage(`Listing scripts in realm "${state.default.session.getRealm()}"...`);
22
23
  await listScripts(options.long);
23
24
  }
24
25
  } // end command logic inside action handler