@rockcarver/frodo-cli 0.18.2-0 → 0.18.2-10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (372) hide show
  1. package/CHANGELOG.md +49 -1
  2. package/esm/app.js +6 -2
  3. package/esm/app.js.map +1 -1
  4. package/esm/cli/_template/something-delete.js +28 -0
  5. package/esm/cli/_template/something-delete.js.map +1 -0
  6. package/esm/cli/_template/something-describe.js +28 -0
  7. package/esm/cli/_template/something-describe.js.map +1 -0
  8. package/esm/cli/_template/something-else-delete.js +28 -0
  9. package/esm/cli/_template/something-else-delete.js.map +1 -0
  10. package/esm/cli/_template/something-else-describe.js +28 -0
  11. package/esm/cli/_template/something-else-describe.js.map +1 -0
  12. package/esm/cli/_template/something-else-export.js +28 -0
  13. package/esm/cli/_template/something-else-export.js.map +1 -0
  14. package/esm/cli/_template/something-else-import.js +28 -0
  15. package/esm/cli/_template/something-else-import.js.map +1 -0
  16. package/esm/cli/_template/something-else-list.js +28 -0
  17. package/esm/cli/_template/something-else-list.js.map +1 -0
  18. package/esm/cli/_template/something-else.js +10 -0
  19. package/esm/cli/_template/something-else.js.map +1 -0
  20. package/esm/cli/_template/something-export.js +28 -0
  21. package/esm/cli/_template/something-export.js.map +1 -0
  22. package/esm/cli/_template/something-import.js +28 -0
  23. package/esm/cli/_template/something-import.js.map +1 -0
  24. package/esm/cli/_template/something-list.js +28 -0
  25. package/esm/cli/_template/something-list.js.map +1 -0
  26. package/esm/cli/_template/something-other-delete.js +28 -0
  27. package/esm/cli/_template/something-other-delete.js.map +1 -0
  28. package/esm/cli/_template/something-other-describe.js +28 -0
  29. package/esm/cli/_template/something-other-describe.js.map +1 -0
  30. package/esm/cli/_template/something-other-export.js +28 -0
  31. package/esm/cli/_template/something-other-export.js.map +1 -0
  32. package/esm/cli/_template/something-other-import.js +28 -0
  33. package/esm/cli/_template/something-other-import.js.map +1 -0
  34. package/esm/cli/_template/{cmd-export.js → something-other-list.js} +12 -6
  35. package/esm/cli/_template/something-other-list.js.map +1 -0
  36. package/esm/cli/_template/something-other.js +10 -0
  37. package/esm/cli/_template/something-other.js.map +1 -0
  38. package/esm/cli/_template/something.js +17 -0
  39. package/esm/cli/_template/something.js.map +1 -0
  40. package/esm/cli/admin/admin-add-autoid-static-user-mapping.js +8 -3
  41. package/esm/cli/admin/admin-add-autoid-static-user-mapping.js.map +1 -1
  42. package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js +10 -11
  43. package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js.map +1 -1
  44. package/esm/cli/admin/admin-get-access-token.js +8 -3
  45. package/esm/cli/admin/admin-get-access-token.js.map +1 -1
  46. package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js +8 -3
  47. package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js.map +1 -1
  48. package/esm/cli/admin/admin-hide-generic-extension-attributes.js +8 -3
  49. package/esm/cli/admin/admin-hide-generic-extension-attributes.js.map +1 -1
  50. package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js +8 -3
  51. package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js.map +1 -1
  52. package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js +8 -3
  53. package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js.map +1 -1
  54. package/esm/cli/admin/admin-list-static-user-mappings.js +8 -3
  55. package/esm/cli/admin/admin-list-static-user-mappings.js.map +1 -1
  56. package/esm/cli/admin/admin-remove-static-user-mapping.js +8 -3
  57. package/esm/cli/admin/admin-remove-static-user-mapping.js.map +1 -1
  58. package/esm/cli/admin/admin-repair-org-model.js +8 -3
  59. package/esm/cli/admin/admin-repair-org-model.js.map +1 -1
  60. package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js +8 -3
  61. package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js.map +1 -1
  62. package/esm/cli/admin/admin-show-generic-extension-attributes.js +8 -3
  63. package/esm/cli/admin/admin-show-generic-extension-attributes.js.map +1 -1
  64. package/esm/cli/admin/admin.js +0 -2
  65. package/esm/cli/admin/admin.js.map +1 -1
  66. package/esm/cli/agent/agent-delete.js +59 -0
  67. package/esm/cli/agent/agent-delete.js.map +1 -0
  68. package/esm/cli/{_template/cmd-describe.js → agent/agent-describe.js} +11 -5
  69. package/esm/cli/agent/agent-describe.js.map +1 -0
  70. package/esm/cli/agent/agent-export.js +49 -0
  71. package/esm/cli/agent/agent-export.js.map +1 -0
  72. package/esm/cli/agent/agent-gateway-delete.js +59 -0
  73. package/esm/cli/agent/agent-gateway-delete.js.map +1 -0
  74. package/esm/cli/agent/agent-gateway-describe.js +28 -0
  75. package/esm/cli/agent/agent-gateway-describe.js.map +1 -0
  76. package/esm/cli/agent/agent-gateway-export.js +49 -0
  77. package/esm/cli/agent/agent-gateway-export.js.map +1 -0
  78. package/esm/cli/agent/agent-gateway-import.js +54 -0
  79. package/esm/cli/agent/agent-gateway-import.js.map +1 -0
  80. package/esm/cli/agent/agent-gateway-list.js +29 -0
  81. package/esm/cli/agent/agent-gateway-list.js.map +1 -0
  82. package/esm/cli/agent/agent-gateway.js +10 -0
  83. package/esm/cli/agent/agent-gateway.js.map +1 -0
  84. package/esm/cli/agent/agent-import.js +54 -0
  85. package/esm/cli/agent/agent-import.js.map +1 -0
  86. package/esm/cli/agent/agent-java-delete.js +59 -0
  87. package/esm/cli/agent/agent-java-delete.js.map +1 -0
  88. package/esm/cli/agent/agent-java-describe.js +28 -0
  89. package/esm/cli/agent/agent-java-describe.js.map +1 -0
  90. package/esm/cli/agent/agent-java-export.js +49 -0
  91. package/esm/cli/agent/agent-java-export.js.map +1 -0
  92. package/esm/cli/agent/agent-java-import.js +54 -0
  93. package/esm/cli/agent/agent-java-import.js.map +1 -0
  94. package/esm/cli/agent/agent-java-list.js +29 -0
  95. package/esm/cli/agent/agent-java-list.js.map +1 -0
  96. package/esm/cli/agent/agent-java.js +10 -0
  97. package/esm/cli/agent/agent-java.js.map +1 -0
  98. package/esm/cli/{_template/cmd-sub1-export.js → agent/agent-list.js} +13 -6
  99. package/esm/cli/agent/agent-list.js.map +1 -0
  100. package/esm/cli/agent/agent-web-delete.js +59 -0
  101. package/esm/cli/agent/agent-web-delete.js.map +1 -0
  102. package/esm/cli/agent/agent-web-describe.js +28 -0
  103. package/esm/cli/agent/agent-web-describe.js.map +1 -0
  104. package/esm/cli/agent/agent-web-export.js +49 -0
  105. package/esm/cli/agent/agent-web-export.js.map +1 -0
  106. package/esm/cli/agent/agent-web-import.js +54 -0
  107. package/esm/cli/agent/agent-web-import.js.map +1 -0
  108. package/esm/cli/agent/agent-web-list.js +29 -0
  109. package/esm/cli/agent/agent-web-list.js.map +1 -0
  110. package/esm/cli/agent/agent-web.js +10 -0
  111. package/esm/cli/agent/agent-web.js.map +1 -0
  112. package/esm/cli/agent/agent.js +18 -0
  113. package/esm/cli/agent/agent.js.map +1 -0
  114. package/esm/cli/app/app-delete.js +10 -4
  115. package/esm/cli/app/app-delete.js.map +1 -1
  116. package/esm/cli/app/app-describe.js +10 -4
  117. package/esm/cli/app/app-describe.js.map +1 -1
  118. package/esm/cli/app/app-export.js +28 -22
  119. package/esm/cli/app/app-export.js.map +1 -1
  120. package/esm/cli/app/app-import.js +14 -7
  121. package/esm/cli/app/app-import.js.map +1 -1
  122. package/esm/cli/app/app-list.js +10 -5
  123. package/esm/cli/app/app-list.js.map +1 -1
  124. package/esm/cli/app/app.js +8 -5
  125. package/esm/cli/app/app.js.map +1 -1
  126. package/esm/cli/cmd_common.js +9 -6
  127. package/esm/cli/cmd_common.js.map +1 -1
  128. package/esm/cli/conn/conn-add.js +8 -5
  129. package/esm/cli/conn/conn-add.js.map +1 -1
  130. package/esm/cli/conn/conn-delete.js +9 -4
  131. package/esm/cli/conn/conn-delete.js.map +1 -1
  132. package/esm/cli/conn/conn-describe.js +8 -3
  133. package/esm/cli/conn/conn-describe.js.map +1 -1
  134. package/esm/cli/conn/conn-list.js +10 -7
  135. package/esm/cli/conn/conn-list.js.map +1 -1
  136. package/esm/cli/conn/conn.js +2 -3
  137. package/esm/cli/conn/conn.js.map +1 -1
  138. package/esm/cli/email/email-template-export.js +30 -28
  139. package/esm/cli/email/email-template-export.js.map +1 -1
  140. package/esm/cli/email/email-template-import.js +35 -33
  141. package/esm/cli/email/email-template-import.js.map +1 -1
  142. package/esm/cli/email/email-template-list.js +12 -9
  143. package/esm/cli/email/email-template-list.js.map +1 -1
  144. package/esm/cli/email/email-template.js.map +1 -1
  145. package/esm/cli/email/email.js +0 -2
  146. package/esm/cli/email/email.js.map +1 -1
  147. package/esm/cli/esv/esv-apply.js +12 -11
  148. package/esm/cli/esv/esv-apply.js.map +1 -1
  149. package/esm/cli/esv/esv-secret-create.js +10 -5
  150. package/esm/cli/esv/esv-secret-create.js.map +1 -1
  151. package/esm/cli/esv/esv-secret-delete.js +23 -18
  152. package/esm/cli/esv/esv-secret-delete.js.map +1 -1
  153. package/esm/cli/esv/esv-secret-describe.js +10 -5
  154. package/esm/cli/esv/esv-secret-describe.js.map +1 -1
  155. package/esm/cli/esv/esv-secret-export.js +10 -4
  156. package/esm/cli/esv/esv-secret-export.js.map +1 -1
  157. package/esm/cli/esv/esv-secret-import.js +10 -4
  158. package/esm/cli/esv/esv-secret-import.js.map +1 -1
  159. package/esm/cli/esv/esv-secret-list.js +10 -5
  160. package/esm/cli/esv/esv-secret-list.js.map +1 -1
  161. package/esm/cli/esv/esv-secret-set.js +10 -5
  162. package/esm/cli/esv/esv-secret-set.js.map +1 -1
  163. package/esm/cli/esv/esv-secret-version-activate.js +18 -14
  164. package/esm/cli/esv/esv-secret-version-activate.js.map +1 -1
  165. package/esm/cli/esv/esv-secret-version-create.js +10 -5
  166. package/esm/cli/esv/esv-secret-version-create.js.map +1 -1
  167. package/esm/cli/esv/esv-secret-version-deactivate.js +18 -14
  168. package/esm/cli/esv/esv-secret-version-deactivate.js.map +1 -1
  169. package/esm/cli/esv/esv-secret-version-delete.js +23 -19
  170. package/esm/cli/esv/esv-secret-version-delete.js.map +1 -1
  171. package/esm/cli/esv/esv-secret-version-list.js +10 -5
  172. package/esm/cli/esv/esv-secret-version-list.js.map +1 -1
  173. package/esm/cli/esv/esv-secret-version.js.map +1 -1
  174. package/esm/cli/esv/esv-secret.js +4 -1
  175. package/esm/cli/esv/esv-secret.js.map +1 -1
  176. package/esm/cli/esv/esv-variable-create.js +11 -6
  177. package/esm/cli/esv/esv-variable-create.js.map +1 -1
  178. package/esm/cli/esv/esv-variable-delete.js +23 -18
  179. package/esm/cli/esv/esv-variable-delete.js.map +1 -1
  180. package/esm/cli/esv/esv-variable-describe.js +10 -5
  181. package/esm/cli/esv/esv-variable-describe.js.map +1 -1
  182. package/esm/cli/esv/esv-variable-export.js +10 -4
  183. package/esm/cli/esv/esv-variable-export.js.map +1 -1
  184. package/esm/cli/esv/esv-variable-import.js +10 -4
  185. package/esm/cli/esv/esv-variable-import.js.map +1 -1
  186. package/esm/cli/esv/esv-variable-list.js +10 -5
  187. package/esm/cli/esv/esv-variable-list.js.map +1 -1
  188. package/esm/cli/esv/esv-variable-set.js +21 -17
  189. package/esm/cli/esv/esv-variable-set.js.map +1 -1
  190. package/esm/cli/esv/esv-variable.js +4 -1
  191. package/esm/cli/esv/esv-variable.js.map +1 -1
  192. package/esm/cli/esv/esv.js +0 -2
  193. package/esm/cli/esv/esv.js.map +1 -1
  194. package/esm/cli/idm/idm-count.js +10 -5
  195. package/esm/cli/idm/idm-count.js.map +1 -1
  196. package/esm/cli/idm/idm-export.js +29 -23
  197. package/esm/cli/idm/idm-export.js.map +1 -1
  198. package/esm/cli/idm/idm-import.js +51 -0
  199. package/esm/cli/idm/idm-import.js.map +1 -0
  200. package/esm/cli/idm/idm-list.js +12 -6
  201. package/esm/cli/idm/idm-list.js.map +1 -1
  202. package/esm/cli/idm/idm.js +3 -3
  203. package/esm/cli/idm/idm.js.map +1 -1
  204. package/esm/cli/idp/idp-export.js +18 -10
  205. package/esm/cli/idp/idp-export.js.map +1 -1
  206. package/esm/cli/idp/idp-import.js +33 -26
  207. package/esm/cli/idp/idp-import.js.map +1 -1
  208. package/esm/cli/idp/idp-list.js +12 -6
  209. package/esm/cli/idp/idp-list.js.map +1 -1
  210. package/esm/cli/idp/idp.js +0 -2
  211. package/esm/cli/idp/idp.js.map +1 -1
  212. package/esm/cli/info/info.js +6 -8
  213. package/esm/cli/info/info.js.map +1 -1
  214. package/esm/cli/journey/journey-delete.e2e.test_.js.map +1 -1
  215. package/esm/cli/journey/journey-delete.js +23 -18
  216. package/esm/cli/journey/journey-delete.js.map +1 -1
  217. package/esm/cli/journey/journey-describe.js +34 -30
  218. package/esm/cli/journey/journey-describe.js.map +1 -1
  219. package/esm/cli/journey/journey-disable.js +22 -18
  220. package/esm/cli/journey/journey-disable.js.map +1 -1
  221. package/esm/cli/journey/journey-enable.js +22 -18
  222. package/esm/cli/journey/journey-enable.js.map +1 -1
  223. package/esm/cli/journey/journey-export.js +35 -31
  224. package/esm/cli/journey/journey-export.js.map +1 -1
  225. package/esm/cli/journey/journey-import.js +42 -37
  226. package/esm/cli/journey/journey-import.js.map +1 -1
  227. package/esm/cli/journey/journey-list.e2e.test_.js.map +1 -1
  228. package/esm/cli/journey/journey-list.js +10 -5
  229. package/esm/cli/journey/journey-list.js.map +1 -1
  230. package/esm/cli/journey/journey-prune.js +10 -7
  231. package/esm/cli/journey/journey-prune.js.map +1 -1
  232. package/esm/cli/journey/journey.js +0 -2
  233. package/esm/cli/journey/journey.js.map +1 -1
  234. package/esm/cli/logging/logs-fetch.js +23 -10
  235. package/esm/cli/logging/logs-fetch.js.map +1 -1
  236. package/esm/cli/logging/logs-list.js +4 -6
  237. package/esm/cli/logging/logs-list.js.map +1 -1
  238. package/esm/cli/logging/logs-tail.js +4 -5
  239. package/esm/cli/logging/logs-tail.js.map +1 -1
  240. package/esm/cli/logging/logs.js +1 -2
  241. package/esm/cli/logging/logs.js.map +1 -1
  242. package/esm/cli/realm/realm-add-custom-domain.js +10 -5
  243. package/esm/cli/realm/realm-add-custom-domain.js.map +1 -1
  244. package/esm/cli/realm/realm-describe.js +10 -5
  245. package/esm/cli/realm/realm-describe.js.map +1 -1
  246. package/esm/cli/realm/realm-list.js +10 -5
  247. package/esm/cli/realm/realm-list.js.map +1 -1
  248. package/esm/cli/realm/realm-remove-custom-domain.js +10 -5
  249. package/esm/cli/realm/realm-remove-custom-domain.js.map +1 -1
  250. package/esm/cli/realm/realm.js +5 -4
  251. package/esm/cli/realm/realm.js.map +1 -1
  252. package/esm/cli/saml/saml-cot-export.js +28 -22
  253. package/esm/cli/saml/saml-cot-export.js.map +1 -1
  254. package/esm/cli/saml/saml-cot-import.js +33 -26
  255. package/esm/cli/saml/saml-cot-import.js.map +1 -1
  256. package/esm/cli/saml/saml-cot-list.js +10 -5
  257. package/esm/cli/saml/saml-cot-list.js.map +1 -1
  258. package/esm/cli/saml/saml-cot.js.map +1 -1
  259. package/esm/cli/saml/saml-delete.js +45 -0
  260. package/esm/cli/saml/saml-delete.js.map +1 -0
  261. package/esm/cli/saml/saml-describe.js +12 -9
  262. package/esm/cli/saml/saml-describe.js.map +1 -1
  263. package/esm/cli/saml/saml-export.js +44 -27
  264. package/esm/cli/saml/saml-export.js.map +1 -1
  265. package/esm/cli/saml/saml-import.js +48 -28
  266. package/esm/cli/saml/saml-import.js.map +1 -1
  267. package/esm/cli/saml/saml-list.js +18 -10
  268. package/esm/cli/saml/saml-list.js.map +1 -1
  269. package/esm/cli/saml/saml-metadata-export.js +24 -22
  270. package/esm/cli/saml/saml-metadata-export.js.map +1 -1
  271. package/esm/cli/saml/saml-metadata.js.map +1 -1
  272. package/esm/cli/saml/saml.js +1 -2
  273. package/esm/cli/saml/saml.js.map +1 -1
  274. package/esm/cli/script/script-delete.js +10 -4
  275. package/esm/cli/script/script-delete.js.map +1 -1
  276. package/esm/cli/script/script-describe.js +10 -4
  277. package/esm/cli/script/script-describe.js.map +1 -1
  278. package/esm/cli/script/script-export.js +32 -24
  279. package/esm/cli/script/script-export.js.map +1 -1
  280. package/esm/cli/script/script-import.js +12 -6
  281. package/esm/cli/script/script-import.js.map +1 -1
  282. package/esm/cli/script/script-list.js +10 -5
  283. package/esm/cli/script/script-list.js.map +1 -1
  284. package/esm/cli/script/script.js +6 -4
  285. package/esm/cli/script/script.js.map +1 -1
  286. package/esm/cli/service/service-delete.js +28 -0
  287. package/esm/cli/service/service-delete.js.map +1 -0
  288. package/esm/cli/service/service-export.js +45 -0
  289. package/esm/cli/service/service-export.js.map +1 -0
  290. package/esm/cli/service/service-import.js +53 -0
  291. package/esm/cli/service/service-import.js.map +1 -0
  292. package/esm/cli/service/service-list.js +26 -0
  293. package/esm/cli/service/service-list.js.map +1 -0
  294. package/esm/cli/service/service.js +14 -0
  295. package/esm/cli/service/service.js.map +1 -0
  296. package/esm/cli/theme/theme-delete.e2e.test_.js.map +1 -1
  297. package/esm/cli/theme/theme-delete.js +30 -28
  298. package/esm/cli/theme/theme-delete.js.map +1 -1
  299. package/esm/cli/theme/theme-export.js +35 -33
  300. package/esm/cli/theme/theme-export.js.map +1 -1
  301. package/esm/cli/theme/theme-import.js +38 -38
  302. package/esm/cli/theme/theme-import.js.map +1 -1
  303. package/esm/cli/theme/theme-list.e2e.test_.js.map +1 -1
  304. package/esm/cli/theme/theme-list.js +12 -9
  305. package/esm/cli/theme/theme-list.js.map +1 -1
  306. package/esm/cli/theme/theme.js +0 -2
  307. package/esm/cli/theme/theme.js.map +1 -1
  308. package/esm/ops/AgentOps.js +698 -0
  309. package/esm/ops/AgentOps.js.map +1 -0
  310. package/esm/ops/CirclesOfTrustOps.js +2 -2
  311. package/esm/ops/CirclesOfTrustOps.js.map +1 -1
  312. package/esm/ops/EmailTemplateOps.js +270 -6
  313. package/esm/ops/EmailTemplateOps.js.map +1 -1
  314. package/esm/ops/IdpOps.js +2 -2
  315. package/esm/ops/IdpOps.js.map +1 -1
  316. package/esm/ops/JourneyOps.js +96 -152
  317. package/esm/ops/JourneyOps.js.map +1 -1
  318. package/esm/ops/NodeOps.js +6 -12
  319. package/esm/ops/NodeOps.js.map +1 -1
  320. package/esm/ops/Saml2Ops.js +456 -9
  321. package/esm/ops/Saml2Ops.js.map +1 -1
  322. package/esm/ops/Saml2Ops.test_.js.map +1 -0
  323. package/esm/ops/ScriptOps.js +3 -3
  324. package/esm/ops/ScriptOps.js.map +1 -1
  325. package/esm/ops/ServiceOps.js +213 -0
  326. package/esm/ops/ServiceOps.js.map +1 -0
  327. package/esm/ops/ThemeOps.js +331 -2
  328. package/esm/ops/ThemeOps.js.map +1 -1
  329. package/esm/ops/utils/Wordwrap.js.map +1 -1
  330. package/esm/storage/StaticStorage.js.map +1 -1
  331. package/esm/utils/Config.js +0 -9
  332. package/esm/utils/Config.js.map +1 -1
  333. package/esm/utils/Console.js +58 -67
  334. package/esm/utils/Console.js.map +1 -1
  335. package/esm/utils/ExportImportUtils.js +46 -0
  336. package/esm/utils/ExportImportUtils.js.map +1 -0
  337. package/esm/utils/Version.js +6 -24
  338. package/esm/utils/Version.js.map +1 -1
  339. package/package.json +19 -17
  340. package/esm/cli/_template/cmd-delete.js +0 -22
  341. package/esm/cli/_template/cmd-delete.js.map +0 -1
  342. package/esm/cli/_template/cmd-describe.js.map +0 -1
  343. package/esm/cli/_template/cmd-export.js.map +0 -1
  344. package/esm/cli/_template/cmd-import.js +0 -22
  345. package/esm/cli/_template/cmd-import.js.map +0 -1
  346. package/esm/cli/_template/cmd-list.js +0 -22
  347. package/esm/cli/_template/cmd-list.js.map +0 -1
  348. package/esm/cli/_template/cmd-sub1-delete.js +0 -22
  349. package/esm/cli/_template/cmd-sub1-delete.js.map +0 -1
  350. package/esm/cli/_template/cmd-sub1-describe.js +0 -22
  351. package/esm/cli/_template/cmd-sub1-describe.js.map +0 -1
  352. package/esm/cli/_template/cmd-sub1-export.js.map +0 -1
  353. package/esm/cli/_template/cmd-sub1-import.js +0 -22
  354. package/esm/cli/_template/cmd-sub1-import.js.map +0 -1
  355. package/esm/cli/_template/cmd-sub1-list.js +0 -22
  356. package/esm/cli/_template/cmd-sub1-list.js.map +0 -1
  357. package/esm/cli/_template/cmd-sub1.js +0 -10
  358. package/esm/cli/_template/cmd-sub1.js.map +0 -1
  359. package/esm/cli/_template/cmd-sub2-delete.js +0 -22
  360. package/esm/cli/_template/cmd-sub2-delete.js.map +0 -1
  361. package/esm/cli/_template/cmd-sub2-describe.js +0 -22
  362. package/esm/cli/_template/cmd-sub2-describe.js.map +0 -1
  363. package/esm/cli/_template/cmd-sub2-export.js +0 -22
  364. package/esm/cli/_template/cmd-sub2-export.js.map +0 -1
  365. package/esm/cli/_template/cmd-sub2-import.js +0 -22
  366. package/esm/cli/_template/cmd-sub2-import.js.map +0 -1
  367. package/esm/cli/_template/cmd-sub2-list.js +0 -22
  368. package/esm/cli/_template/cmd-sub2-list.js.map +0 -1
  369. package/esm/cli/_template/cmd-sub2.js +0 -10
  370. package/esm/cli/_template/cmd-sub2.js.map +0 -1
  371. package/esm/cli/_template/cmd.js +0 -19
  372. package/esm/cli/_template/cmd.js.map +0 -1
@@ -1 +1 @@
1
- {"version":3,"file":"esv-secret-export.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","parse"],"sources":["cli/esv/esv-secret-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo esv secret export');\n\nprogram\n .description('Export secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --secret-id <secret-id>',\n 'Secret id. If specified, -a and -A are ignored.'\n )\n )\n .addOption(new Option('-f, --file <file>', 'Name of the export file.'))\n .addOption(\n new Option(\n '-a, --all',\n 'Export all secrets to a single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all sub1s to separate files (*.secret.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,QAAoC,uBAApC;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBH,YAAtB;AAEA,MAAMI,OAAO,GAAG,IAAIN,OAAJ,CAAY,yBAAZ,CAAhB;AAEAM,OAAO,CACJC,WADH,CACe,iBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeN,MAAM,CAACO,aAJtB,EAKGD,WALH,CAKeN,MAAM,CAACQ,aALtB,EAMGF,WANH,CAMeN,MAAM,CAACS,YANtB,EAOGH,WAPH,CAOeN,MAAM,CAACU,gBAPtB,EAQGC,SARH,CAQaX,MAAM,CAACY,gBARpB,EASGD,SATH,CASaX,MAAM,CAACa,cATpB,EAUGF,SAVH,CAWI,IAAId,MAAJ,CACE,6BADF,EAEE,iDAFF,CAXJ,EAgBGc,SAhBH,CAgBa,IAAId,MAAJ,CAAW,mBAAX,EAAgC,0BAAhC,CAhBb,EAiBGc,SAjBH,CAkBI,IAAId,MAAJ,CACE,WADF,EAEE,uDAFF,CAlBJ,EAuBGc,SAvBH,CAwBI,IAAId,MAAJ,CACE,oBADF,EAEE,qGAFF,CAxBJ,EA6BGiB,MA7BH,EA8BI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CpB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAhB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAjB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAlB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAnB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA5B,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM5B,SAAS,EAAnB,EAAuB,CACrB;EACD;AACF,CAzCL,CA0CI;AA1CJ;AA6CAC,OAAO,CAAC4B,KAAR"}
1
+ {"version":3,"file":"esv-secret-export.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","verboseOption","debugOption","curlirizeOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","setVerbose","verbose","setDebug","debug","setCurlirize","curlirize","parse"],"sources":["cli/esv/esv-secret-export.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo esv secret export');\n\nprogram\n .description('Export secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(common.verboseOption)\n .addOption(common.debugOption)\n .addOption(common.curlirizeOption)\n .addOption(\n new Option(\n '-i, --secret-id <secret-id>',\n 'Secret id. If specified, -a and -A are ignored.'\n )\n )\n .addOption(new Option('-f, --file <file>', 'Name of the export file.'))\n .addOption(\n new Option(\n '-a, --all',\n 'Export all secrets to a single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Export all sub1s to separate files (*.secret.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n state.default.session.setVerbose(options.verbose);\n state.default.session.setDebug(options.debug);\n state.default.session.setCurlirize(options.curlirize);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,KAAK,QAAQ,uBAAuB;AAC3D,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAE1C,MAAM;EAAEC;AAAU,CAAC,GAAGH,YAAY;AAElC,MAAMI,OAAO,GAAG,IAAIN,OAAO,CAAC,yBAAyB,CAAC;AAEtDM,OAAO,CACJC,WAAW,CAAC,iBAAiB,CAAC,CAC9BC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACN,MAAM,CAACO,aAAa,CAAC,CACjCD,WAAW,CAACN,MAAM,CAACQ,aAAa,CAAC,CACjCF,WAAW,CAACN,MAAM,CAACS,YAAY,CAAC,CAChCH,WAAW,CAACN,MAAM,CAACU,gBAAgB,CAAC,CACpCC,SAAS,CAACX,MAAM,CAACY,gBAAgB,CAAC,CAClCD,SAAS,CAACX,MAAM,CAACa,cAAc,CAAC,CAChCF,SAAS,CAACX,MAAM,CAACc,aAAa,CAAC,CAC/BH,SAAS,CAACX,MAAM,CAACe,WAAW,CAAC,CAC7BJ,SAAS,CAACX,MAAM,CAACgB,eAAe,CAAC,CACjCL,SAAS,CACR,IAAId,MAAM,CACR,6BAA6B,EAC7B,iDAAiD,CAClD,CACF,CACAc,SAAS,CAAC,IAAId,MAAM,CAAC,mBAAmB,EAAE,0BAA0B,CAAC,CAAC,CACtEc,SAAS,CACR,IAAId,MAAM,CACR,WAAW,EACX,uDAAuD,CACxD,CACF,CACAc,SAAS,CACR,IAAId,MAAM,CACR,oBAAoB,EACpB,qGAAqG,CACtG,CACF,CACAoB,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CvB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACC,SAAS,CAACP,IAAI,CAAC;EACrCnB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACE,QAAQ,CAACP,KAAK,CAAC;EACrCpB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACG,WAAW,CAACP,IAAI,CAAC;EACvCrB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACI,WAAW,CAACP,QAAQ,CAAC;EAC3CtB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACK,iBAAiB,CAACP,OAAO,CAACQ,IAAI,CAAC;EACrD/B,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACO,0BAA0B,CAACT,OAAO,CAACU,QAAQ,CAAC;EAClEjC,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACS,UAAU,CAACX,OAAO,CAACY,OAAO,CAAC;EACjDnC,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACW,QAAQ,CAACb,OAAO,CAACc,KAAK,CAAC;EAC7CrC,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACa,YAAY,CAACf,OAAO,CAACgB,SAAS,CAAC;EACrD,IAAI,MAAMrC,SAAS,EAAE,EAAE;IACrB;EAAA;AAEJ;AACA;AAAA,CACD;;AAEHC,OAAO,CAACqC,KAAK,EAAE"}
@@ -5,7 +5,8 @@ const {
5
5
  getTokens
6
6
  } = Authenticate;
7
7
  const program = new Command('frodo esv secret import');
8
- program.description('Import secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id. If specified, only one secret is imported and the options -a and -A are ignored.')).addOption(new Option('-f, --file <file>', 'Name of the file to import.')).addOption(new Option('-a, --all', 'Import all secrets from single file. Ignored with -i.')).addOption(new Option('-A, --all-separate', 'Import all secrets from separate files (*.secret.json) in the current directory. Ignored with -i or -a.')).action( // implement command logic inside action handler
8
+ program.description('Import secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(common.verboseOption).addOption(common.debugOption).addOption(common.curlirizeOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id. If specified, only one secret is imported and the options -a and -A are ignored.')).addOption(new Option('-f, --file <file>', 'Name of the file to import.')).addOption(new Option('-a, --all', 'Import all secrets from single file. Ignored with -i.')).addOption(new Option('-A, --all-separate', 'Import all secrets from separate files (*.secret.json) in the current directory. Ignored with -i or -a.')).action(
9
+ // implement command logic inside action handler
9
10
  async (host, realm, user, password, options) => {
10
11
  state.default.session.setTenant(host);
11
12
  state.default.session.setRealm(realm);
@@ -13,10 +14,15 @@ async (host, realm, user, password, options) => {
13
14
  state.default.session.setPassword(password);
14
15
  state.default.session.setDeploymentType(options.type);
15
16
  state.default.session.setAllowInsecureConnection(options.insecure);
16
-
17
- if (await getTokens()) {// code goes here
17
+ state.default.session.setVerbose(options.verbose);
18
+ state.default.session.setDebug(options.debug);
19
+ state.default.session.setCurlirize(options.curlirize);
20
+ if (await getTokens()) {
21
+ // code goes here
18
22
  }
19
- } // end command logic inside action handler
23
+ }
24
+ // end command logic inside action handler
20
25
  );
26
+
21
27
  program.parse();
22
28
  //# sourceMappingURL=esv-secret-import.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"esv-secret-import.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","parse"],"sources":["cli/esv/esv-secret-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo esv secret import');\n\nprogram\n .description('Import secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --secret-id <secret-id>',\n 'Secret id. If specified, only one secret is imported and the options -a and -A are ignored.'\n )\n )\n .addOption(new Option('-f, --file <file>', 'Name of the file to import.'))\n .addOption(\n new Option(\n '-a, --all',\n 'Import all secrets from single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Import all secrets from separate files (*.secret.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,KAAvB,QAAoC,uBAApC;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AAEA,MAAM;EAAEC;AAAF,IAAgBH,YAAtB;AAEA,MAAMI,OAAO,GAAG,IAAIN,OAAJ,CAAY,yBAAZ,CAAhB;AAEAM,OAAO,CACJC,WADH,CACe,iBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeN,MAAM,CAACO,aAJtB,EAKGD,WALH,CAKeN,MAAM,CAACQ,aALtB,EAMGF,WANH,CAMeN,MAAM,CAACS,YANtB,EAOGH,WAPH,CAOeN,MAAM,CAACU,gBAPtB,EAQGC,SARH,CAQaX,MAAM,CAACY,gBARpB,EASGD,SATH,CASaX,MAAM,CAACa,cATpB,EAUGF,SAVH,CAWI,IAAId,MAAJ,CACE,6BADF,EAEE,6FAFF,CAXJ,EAgBGc,SAhBH,CAgBa,IAAId,MAAJ,CAAW,mBAAX,EAAgC,6BAAhC,CAhBb,EAiBGc,SAjBH,CAkBI,IAAId,MAAJ,CACE,WADF,EAEE,uDAFF,CAlBJ,EAuBGc,SAvBH,CAwBI,IAAId,MAAJ,CACE,oBADF,EAEE,yGAFF,CAxBJ,EA6BGiB,MA7BH,EA8BI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CpB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBC,SAAtB,CAAgCP,IAAhC;EACAhB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBE,QAAtB,CAA+BP,KAA/B;EACAjB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBG,WAAtB,CAAkCP,IAAlC;EACAlB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBI,WAAtB,CAAkCP,QAAlC;EACAnB,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBK,iBAAtB,CAAwCP,OAAO,CAACQ,IAAhD;EACA5B,KAAK,CAACqB,OAAN,CAAcC,OAAd,CAAsBO,0BAAtB,CAAiDT,OAAO,CAACU,QAAzD;;EACA,IAAI,MAAM5B,SAAS,EAAnB,EAAuB,CACrB;EACD;AACF,CAzCL,CA0CI;AA1CJ;AA6CAC,OAAO,CAAC4B,KAAR"}
1
+ {"version":3,"file":"esv-secret-import.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","verboseOption","debugOption","curlirizeOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","setVerbose","verbose","setDebug","debug","setCurlirize","curlirize","parse"],"sources":["cli/esv/esv-secret-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo esv secret import');\n\nprogram\n .description('Import secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(common.verboseOption)\n .addOption(common.debugOption)\n .addOption(common.curlirizeOption)\n .addOption(\n new Option(\n '-i, --secret-id <secret-id>',\n 'Secret id. If specified, only one secret is imported and the options -a and -A are ignored.'\n )\n )\n .addOption(new Option('-f, --file <file>', 'Name of the file to import.'))\n .addOption(\n new Option(\n '-a, --all',\n 'Import all secrets from single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Import all secrets from separate files (*.secret.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n state.default.session.setVerbose(options.verbose);\n state.default.session.setDebug(options.debug);\n state.default.session.setCurlirize(options.curlirize);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,KAAK,QAAQ,uBAAuB;AAC3D,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAE1C,MAAM;EAAEC;AAAU,CAAC,GAAGH,YAAY;AAElC,MAAMI,OAAO,GAAG,IAAIN,OAAO,CAAC,yBAAyB,CAAC;AAEtDM,OAAO,CACJC,WAAW,CAAC,iBAAiB,CAAC,CAC9BC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACN,MAAM,CAACO,aAAa,CAAC,CACjCD,WAAW,CAACN,MAAM,CAACQ,aAAa,CAAC,CACjCF,WAAW,CAACN,MAAM,CAACS,YAAY,CAAC,CAChCH,WAAW,CAACN,MAAM,CAACU,gBAAgB,CAAC,CACpCC,SAAS,CAACX,MAAM,CAACY,gBAAgB,CAAC,CAClCD,SAAS,CAACX,MAAM,CAACa,cAAc,CAAC,CAChCF,SAAS,CAACX,MAAM,CAACc,aAAa,CAAC,CAC/BH,SAAS,CAACX,MAAM,CAACe,WAAW,CAAC,CAC7BJ,SAAS,CAACX,MAAM,CAACgB,eAAe,CAAC,CACjCL,SAAS,CACR,IAAId,MAAM,CACR,6BAA6B,EAC7B,6FAA6F,CAC9F,CACF,CACAc,SAAS,CAAC,IAAId,MAAM,CAAC,mBAAmB,EAAE,6BAA6B,CAAC,CAAC,CACzEc,SAAS,CACR,IAAId,MAAM,CACR,WAAW,EACX,uDAAuD,CACxD,CACF,CACAc,SAAS,CACR,IAAId,MAAM,CACR,oBAAoB,EACpB,yGAAyG,CAC1G,CACF,CACAoB,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CvB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACC,SAAS,CAACP,IAAI,CAAC;EACrCnB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACE,QAAQ,CAACP,KAAK,CAAC;EACrCpB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACG,WAAW,CAACP,IAAI,CAAC;EACvCrB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACI,WAAW,CAACP,QAAQ,CAAC;EAC3CtB,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACK,iBAAiB,CAACP,OAAO,CAACQ,IAAI,CAAC;EACrD/B,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACO,0BAA0B,CAACT,OAAO,CAACU,QAAQ,CAAC;EAClEjC,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACS,UAAU,CAACX,OAAO,CAACY,OAAO,CAAC;EACjDnC,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACW,QAAQ,CAACb,OAAO,CAACc,KAAK,CAAC;EAC7CrC,KAAK,CAACwB,OAAO,CAACC,OAAO,CAACa,YAAY,CAACf,OAAO,CAACgB,SAAS,CAAC;EACrD,IAAI,MAAMrC,SAAS,EAAE,EAAE;IACrB;EAAA;AAEJ;AACA;AAAA,CACD;;AAEHC,OAAO,CAACqC,KAAK,EAAE"}
@@ -1,7 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';
3
3
  import * as common from '../cmd_common.js';
4
- import { printMessage } from '../../utils/Console.js';
4
+ import { verboseMessage } from '../../utils/Console.js';
5
5
  const {
6
6
  getTokens
7
7
  } = Authenticate;
@@ -9,7 +9,8 @@ const {
9
9
  listSecrets
10
10
  } = Secrets;
11
11
  const program = new Command('frodo esv secret list');
12
- program.description('List secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-l, --long', 'Long with all fields.').default(false, 'false')).action( // implement command logic inside action handler
12
+ program.description('List secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(common.verboseOption).addOption(common.debugOption).addOption(common.curlirizeOption).addOption(new Option('-l, --long', 'Long with all fields.').default(false, 'false')).action(
13
+ // implement command logic inside action handler
13
14
  async (host, realm, user, password, options) => {
14
15
  state.default.session.setTenant(host);
15
16
  state.default.session.setRealm(realm);
@@ -17,12 +18,16 @@ async (host, realm, user, password, options) => {
17
18
  state.default.session.setPassword(password);
18
19
  state.default.session.setDeploymentType(options.type);
19
20
  state.default.session.setAllowInsecureConnection(options.insecure);
20
-
21
+ state.default.session.setVerbose(options.verbose);
22
+ state.default.session.setDebug(options.debug);
23
+ state.default.session.setCurlirize(options.curlirize);
21
24
  if (await getTokens()) {
22
- printMessage('Listing secrets...');
25
+ verboseMessage('Listing secrets...');
23
26
  listSecrets(options.long);
24
27
  }
25
- } // end command logic inside action handler
28
+ }
29
+ // end command logic inside action handler
26
30
  );
31
+
27
32
  program.parse();
28
33
  //# sourceMappingURL=esv-secret-list.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"esv-secret-list.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","listSecrets","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","long","parse"],"sources":["cli/esv/esv-secret-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { listSecrets } = Secrets;\n\nconst program = new Command('frodo esv secret list');\n\nprogram\n .description('List secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Listing secrets...');\n listSecrets(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,OAAvB,EAAgCC,KAAhC,QAA6C,uBAA7C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AACA,SAASC,YAAT,QAA6B,wBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EAAEM;AAAF,IAAkBL,OAAxB;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,uBAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,eADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAWI,IAAIjB,MAAJ,CAAW,YAAX,EAAyB,uBAAzB,EAAkDoB,OAAlD,CAA0D,KAA1D,EAAiE,OAAjE,CAXJ,EAaGC,MAbH,EAcI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAnB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACApB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACArB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACAtB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA9B,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrBD,YAAY,CAAC,oBAAD,CAAZ;IACAE,WAAW,CAACmB,OAAO,CAACU,IAAT,CAAX;EACD;AACF,CA1BL,CA2BI;AA3BJ;AA8BA5B,OAAO,CAAC6B,KAAR"}
1
+ {"version":3,"file":"esv-secret-list.js","names":["Command","Option","Authenticate","Secrets","state","common","verboseMessage","getTokens","listSecrets","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","verboseOption","debugOption","curlirizeOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","setVerbose","verbose","setDebug","debug","setCurlirize","curlirize","long","parse"],"sources":["cli/esv/esv-secret-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { verboseMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { listSecrets } = Secrets;\n\nconst program = new Command('frodo esv secret list');\n\nprogram\n .description('List secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(common.verboseOption)\n .addOption(common.debugOption)\n .addOption(common.curlirizeOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n state.default.session.setVerbose(options.verbose);\n state.default.session.setDebug(options.debug);\n state.default.session.setCurlirize(options.curlirize);\n if (await getTokens()) {\n verboseMessage('Listing secrets...');\n listSecrets(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,cAAc,QAAQ,wBAAwB;AAEvD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAAY,CAAC,GAAGL,OAAO;AAE/B,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,uBAAuB,CAAC;AAEpDS,OAAO,CACJC,WAAW,CAAC,eAAe,CAAC,CAC5BC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CAACb,MAAM,CAACgB,aAAa,CAAC,CAC/BH,SAAS,CAACb,MAAM,CAACiB,WAAW,CAAC,CAC7BJ,SAAS,CAACb,MAAM,CAACkB,eAAe,CAAC,CACjCL,SAAS,CACR,IAAIjB,MAAM,CAAC,YAAY,EAAE,uBAAuB,CAAC,CAACuB,OAAO,CAAC,KAAK,EAAE,OAAO,CAAC,CAC1E,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9C1B,KAAK,CAACoB,OAAO,CAACO,OAAO,CAACC,SAAS,CAACN,IAAI,CAAC;EACrCtB,KAAK,CAACoB,OAAO,CAACO,OAAO,CAACE,QAAQ,CAACN,KAAK,CAAC;EACrCvB,KAAK,CAACoB,OAAO,CAACO,OAAO,CAACG,WAAW,CAACN,IAAI,CAAC;EACvCxB,KAAK,CAACoB,OAAO,CAACO,OAAO,CAACI,WAAW,CAACN,QAAQ,CAAC;EAC3CzB,KAAK,CAACoB,OAAO,CAACO,OAAO,CAACK,iBAAiB,CAACN,OAAO,CAACO,IAAI,CAAC;EACrDjC,KAAK,CAACoB,OAAO,CAACO,OAAO,CAACO,0BAA0B,CAACR,OAAO,CAACS,QAAQ,CAAC;EAClEnC,KAAK,CAACoB,OAAO,CAACO,OAAO,CAACS,UAAU,CAACV,OAAO,CAACW,OAAO,CAAC;EACjDrC,KAAK,CAACoB,OAAO,CAACO,OAAO,CAACW,QAAQ,CAACZ,OAAO,CAACa,KAAK,CAAC;EAC7CvC,KAAK,CAACoB,OAAO,CAACO,OAAO,CAACa,YAAY,CAACd,OAAO,CAACe,SAAS,CAAC;EACrD,IAAI,MAAMtC,SAAS,EAAE,EAAE;IACrBD,cAAc,CAAC,oBAAoB,CAAC;IACpCE,WAAW,CAACsB,OAAO,CAACgB,IAAI,CAAC;EAC3B;AACF;AACA;AAAA,CACD;;AAEHrC,OAAO,CAACsC,KAAK,EAAE"}
@@ -1,7 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';
3
3
  import * as common from '../cmd_common.js';
4
- import { printMessage } from '../../utils/Console.js';
4
+ import { verboseMessage } from '../../utils/Console.js';
5
5
  const {
6
6
  getTokens
7
7
  } = Authenticate;
@@ -9,7 +9,8 @@ const {
9
9
  setDescriptionOfSecret
10
10
  } = Secrets;
11
11
  const program = new Command('frodo esv secret set');
12
- program.description('Create secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('--description <description>', 'Secret description.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action( // implement command logic inside action handler
12
+ program.description('Create secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(common.verboseOption).addOption(common.debugOption).addOption(common.curlirizeOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('--description <description>', 'Secret description.')).action(
13
+ // implement command logic inside action handler
13
14
  async (host, realm, user, password, options) => {
14
15
  state.default.session.setTenant(host);
15
16
  state.default.session.setRealm(realm);
@@ -17,12 +18,16 @@ async (host, realm, user, password, options) => {
17
18
  state.default.session.setPassword(password);
18
19
  state.default.session.setDeploymentType(options.type);
19
20
  state.default.session.setAllowInsecureConnection(options.insecure);
20
-
21
+ state.default.session.setVerbose(options.verbose);
22
+ state.default.session.setDebug(options.debug);
23
+ state.default.session.setCurlirize(options.curlirize);
21
24
  if (await getTokens()) {
22
- printMessage('Setting secret description...');
25
+ verboseMessage('Setting secret description...');
23
26
  setDescriptionOfSecret(options.secretId, options.description);
24
27
  }
25
- } // end command logic inside action handler
28
+ }
29
+ // end command logic inside action handler
26
30
  );
31
+
27
32
  program.parse();
28
33
  //# sourceMappingURL=esv-secret-set.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"esv-secret-set.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","setDescriptionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","parse"],"sources":["cli/esv/esv-secret-set.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { setDescriptionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret set');\n\nprogram\n .description('Create secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('--description <description>', 'Secret description.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Setting secret description...');\n setDescriptionOfSecret(options.secretId, options.description);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,OAAvB,EAAgCC,KAAhC,QAA6C,uBAA7C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AACA,SAASC,YAAT,QAA6B,wBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EAAEM;AAAF,IAA6BL,OAAnC;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,sBAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,iBADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAUa,IAAIjB,MAAJ,CAAW,6BAAX,EAA0C,YAA1C,CAVb,EAWGiB,SAXH,CAWa,IAAIjB,MAAJ,CAAW,6BAAX,EAA0C,qBAA1C,CAXb,EAYGiB,SAZH,CAaI,IAAIjB,MAAJ,CACE,WADF,EAEE,kGAFF,EAGEoB,OAHF,CAGU,KAHV,EAGiB,KAHjB,CAbJ,EAkBGC,MAlBH,EAmBI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAnB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACApB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACArB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACAtB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA9B,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrBD,YAAY,CAAC,+BAAD,CAAZ;IACAE,sBAAsB,CAACmB,OAAO,CAACU,QAAT,EAAmBV,OAAO,CAACjB,WAA3B,CAAtB;EACD;AACF,CA/BL,CAgCI;AAhCJ;AAmCAD,OAAO,CAAC6B,KAAR"}
1
+ {"version":3,"file":"esv-secret-set.js","names":["Command","Option","Authenticate","Secrets","state","common","verboseMessage","getTokens","setDescriptionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","verboseOption","debugOption","curlirizeOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","setVerbose","verbose","setDebug","debug","setCurlirize","curlirize","secretId","parse"],"sources":["cli/esv/esv-secret-set.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { verboseMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { setDescriptionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret set');\n\nprogram\n .description('Create secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(common.verboseOption)\n .addOption(common.debugOption)\n .addOption(common.curlirizeOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('--description <description>', 'Secret description.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n state.default.session.setVerbose(options.verbose);\n state.default.session.setDebug(options.debug);\n state.default.session.setCurlirize(options.curlirize);\n if (await getTokens()) {\n verboseMessage('Setting secret description...');\n setDescriptionOfSecret(options.secretId, options.description);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,cAAc,QAAQ,wBAAwB;AAEvD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAAuB,CAAC,GAAGL,OAAO;AAE1C,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,sBAAsB,CAAC;AAEnDS,OAAO,CACJC,WAAW,CAAC,iBAAiB,CAAC,CAC9BC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CAACb,MAAM,CAACgB,aAAa,CAAC,CAC/BH,SAAS,CAACb,MAAM,CAACiB,WAAW,CAAC,CAC7BJ,SAAS,CAACb,MAAM,CAACkB,eAAe,CAAC,CACjCL,SAAS,CAAC,IAAIjB,MAAM,CAAC,6BAA6B,EAAE,YAAY,CAAC,CAAC,CAClEiB,SAAS,CAAC,IAAIjB,MAAM,CAAC,6BAA6B,EAAE,qBAAqB,CAAC,CAAC,CAC3EuB,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CzB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACC,SAAS,CAACP,IAAI,CAAC;EACrCrB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACE,QAAQ,CAACP,KAAK,CAAC;EACrCtB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACG,WAAW,CAACP,IAAI,CAAC;EACvCvB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACI,WAAW,CAACP,QAAQ,CAAC;EAC3CxB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACK,iBAAiB,CAACP,OAAO,CAACQ,IAAI,CAAC;EACrDjC,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACO,0BAA0B,CAACT,OAAO,CAACU,QAAQ,CAAC;EAClEnC,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACS,UAAU,CAACX,OAAO,CAACY,OAAO,CAAC;EACjDrC,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACW,QAAQ,CAACb,OAAO,CAACc,KAAK,CAAC;EAC7CvC,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACa,YAAY,CAACf,OAAO,CAACgB,SAAS,CAAC;EACrD,IAAI,MAAMtC,SAAS,EAAE,EAAE;IACrBD,cAAc,CAAC,+BAA+B,CAAC;IAC/CE,sBAAsB,CAACqB,OAAO,CAACiB,QAAQ,EAAEjB,OAAO,CAACnB,WAAW,CAAC;EAC/D;AACF;AACA;AAAA,CACD;;AAEHD,OAAO,CAACsC,KAAK,EAAE"}
@@ -1,7 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';
3
3
  import * as common from '../cmd_common.js';
4
- import { printMessage } from '../../utils/Console.js';
4
+ import { printMessage, verboseMessage } from '../../utils/Console.js';
5
5
  const {
6
6
  getTokens
7
7
  } = Authenticate;
@@ -9,7 +9,8 @@ const {
9
9
  activateVersionOfSecret
10
10
  } = Secrets;
11
11
  const program = new Command('frodo esv secret version activate');
12
- program.description('Activate versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action( // implement command logic inside action handler
12
+ program.description('Activate versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(common.verboseOption).addOption(common.debugOption).addOption(common.curlirizeOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).action(
13
+ // implement command logic inside action handler
13
14
  async (host, realm, user, password, options) => {
14
15
  state.default.session.setTenant(host);
15
16
  state.default.session.setRealm(realm);
@@ -17,19 +18,22 @@ async (host, realm, user, password, options) => {
17
18
  state.default.session.setPassword(password);
18
19
  state.default.session.setDeploymentType(options.type);
19
20
  state.default.session.setAllowInsecureConnection(options.insecure);
20
-
21
- if (await getTokens()) {
22
- // activate by id
23
- if (options.secretId && options.version) {
24
- printMessage(`Activating version of secret...`);
25
- activateVersionOfSecret(options.secretId, options.version);
26
- } // unrecognized combination of options or no options
27
- else {
28
- printMessage('Unrecognized combination of options or no options...');
29
- program.help();
30
- }
21
+ state.default.session.setVerbose(options.verbose);
22
+ state.default.session.setDebug(options.debug);
23
+ state.default.session.setCurlirize(options.curlirize);
24
+ // activate by id
25
+ if (options.secretId && options.version && (await getTokens())) {
26
+ verboseMessage(`Activating version of secret...`);
27
+ activateVersionOfSecret(options.secretId, options.version);
28
+ }
29
+ // unrecognized combination of options or no options
30
+ else {
31
+ printMessage('Unrecognized combination of options or no options...');
32
+ program.help();
31
33
  }
32
- } // end command logic inside action handler
34
+ }
35
+ // end command logic inside action handler
33
36
  );
37
+
34
38
  program.parse();
35
39
  //# sourceMappingURL=esv-secret-version-activate.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"esv-secret-version-activate.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","activateVersionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-activate.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { activateVersionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret version activate');\n\nprogram\n .description('Activate versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // activate by id\n if (options.secretId && options.version) {\n printMessage(`Activating version of secret...`);\n activateVersionOfSecret(options.secretId, options.version);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,OAAvB,EAAgCC,KAAhC,QAA6C,uBAA7C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AACA,SAASC,YAAT,QAA6B,wBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EAAEM;AAAF,IAA8BL,OAApC;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,mCAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAUa,IAAIjB,MAAJ,CAAW,6BAAX,EAA0C,YAA1C,CAVb,EAWGiB,SAXH,CAWa,IAAIjB,MAAJ,CAAW,yBAAX,EAAsC,oBAAtC,CAXb,EAYGiB,SAZH,CAaI,IAAIjB,MAAJ,CACE,WADF,EAEE,kGAFF,EAGEoB,OAHF,CAGU,KAHV,EAGiB,KAHjB,CAbJ,EAkBGC,MAlBH,EAmBI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAnB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACApB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACArB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACAtB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA9B,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIoB,OAAO,CAACU,QAAR,IAAoBV,OAAO,CAACW,OAAhC,EAAyC;MACvChC,YAAY,CAAE,iCAAF,CAAZ;MACAE,uBAAuB,CAACmB,OAAO,CAACU,QAAT,EAAmBV,OAAO,CAACW,OAA3B,CAAvB;IACD,CAHD,CAIA;IAJA,KAKK;MACHhC,YAAY,CAAC,sDAAD,CAAZ;MACAG,OAAO,CAAC8B,IAAR;IACD;EACF;AACF,CAvCL,CAwCI;AAxCJ;AA2CA9B,OAAO,CAAC+B,KAAR"}
1
+ {"version":3,"file":"esv-secret-version-activate.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","verboseMessage","getTokens","activateVersionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","verboseOption","debugOption","curlirizeOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","setVerbose","verbose","setDebug","debug","setCurlirize","curlirize","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-activate.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage, verboseMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { activateVersionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret version activate');\n\nprogram\n .description('Activate versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(common.verboseOption)\n .addOption(common.debugOption)\n .addOption(common.curlirizeOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n state.default.session.setVerbose(options.verbose);\n state.default.session.setDebug(options.debug);\n state.default.session.setCurlirize(options.curlirize);\n // activate by id\n if (options.secretId && options.version && (await getTokens())) {\n verboseMessage(`Activating version of secret...`);\n activateVersionOfSecret(options.secretId, options.version);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,EAAEC,cAAc,QAAQ,wBAAwB;AAErE,MAAM;EAAEC;AAAU,CAAC,GAAGN,YAAY;AAClC,MAAM;EAAEO;AAAwB,CAAC,GAAGN,OAAO;AAE3C,MAAMO,OAAO,GAAG,IAAIV,OAAO,CAAC,mCAAmC,CAAC;AAEhEU,OAAO,CACJC,WAAW,CAAC,+BAA+B,CAAC,CAC5CC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACT,MAAM,CAACU,aAAa,CAAC,CACjCD,WAAW,CAACT,MAAM,CAACW,aAAa,CAAC,CACjCF,WAAW,CAACT,MAAM,CAACY,YAAY,CAAC,CAChCH,WAAW,CAACT,MAAM,CAACa,gBAAgB,CAAC,CACpCC,SAAS,CAACd,MAAM,CAACe,gBAAgB,CAAC,CAClCD,SAAS,CAACd,MAAM,CAACgB,cAAc,CAAC,CAChCF,SAAS,CAACd,MAAM,CAACiB,aAAa,CAAC,CAC/BH,SAAS,CAACd,MAAM,CAACkB,WAAW,CAAC,CAC7BJ,SAAS,CAACd,MAAM,CAACmB,eAAe,CAAC,CACjCL,SAAS,CAAC,IAAIlB,MAAM,CAAC,6BAA6B,EAAE,YAAY,CAAC,CAAC,CAClEkB,SAAS,CAAC,IAAIlB,MAAM,CAAC,yBAAyB,EAAE,oBAAoB,CAAC,CAAC,CACtEwB,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9C1B,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACC,SAAS,CAACP,IAAI,CAAC;EACrCtB,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACE,QAAQ,CAACP,KAAK,CAAC;EACrCvB,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACG,WAAW,CAACP,IAAI,CAAC;EACvCxB,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACI,WAAW,CAACP,QAAQ,CAAC;EAC3CzB,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACK,iBAAiB,CAACP,OAAO,CAACQ,IAAI,CAAC;EACrDlC,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACO,0BAA0B,CAACT,OAAO,CAACU,QAAQ,CAAC;EAClEpC,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACS,UAAU,CAACX,OAAO,CAACY,OAAO,CAAC;EACjDtC,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACW,QAAQ,CAACb,OAAO,CAACc,KAAK,CAAC;EAC7CxC,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACa,YAAY,CAACf,OAAO,CAACgB,SAAS,CAAC;EACrD;EACA,IAAIhB,OAAO,CAACiB,QAAQ,IAAIjB,OAAO,CAACkB,OAAO,KAAK,MAAMxC,SAAS,EAAE,CAAC,EAAE;IAC9DD,cAAc,CAAE,iCAAgC,CAAC;IACjDE,uBAAuB,CAACqB,OAAO,CAACiB,QAAQ,EAAEjB,OAAO,CAACkB,OAAO,CAAC;EAC5D;EACA;EAAA,KACK;IACH1C,YAAY,CAAC,sDAAsD,CAAC;IACpEI,OAAO,CAACuC,IAAI,EAAE;EAChB;AACF;AACA;AAAA,CACD;;AAEHvC,OAAO,CAACwC,KAAK,EAAE"}
@@ -1,7 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';
3
3
  import * as common from '../cmd_common.js';
4
- import { printMessage } from '../../utils/Console.js';
4
+ import { verboseMessage } from '../../utils/Console.js';
5
5
  const {
6
6
  getTokens
7
7
  } = Authenticate;
@@ -9,7 +9,8 @@ const {
9
9
  createNewVersionOfSecretCmd
10
10
  } = Secrets;
11
11
  const program = new Command('frodo esv secret version create');
12
- program.description('Create new version of secret.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('--value <value>', 'Secret value.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action( // implement command logic inside action handler
12
+ program.description('Create new version of secret.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(common.verboseOption).addOption(common.debugOption).addOption(common.curlirizeOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('--value <value>', 'Secret value.')).action(
13
+ // implement command logic inside action handler
13
14
  async (host, realm, user, password, options) => {
14
15
  state.default.session.setTenant(host);
15
16
  state.default.session.setRealm(realm);
@@ -17,12 +18,16 @@ async (host, realm, user, password, options) => {
17
18
  state.default.session.setPassword(password);
18
19
  state.default.session.setDeploymentType(options.type);
19
20
  state.default.session.setAllowInsecureConnection(options.insecure);
20
-
21
+ state.default.session.setVerbose(options.verbose);
22
+ state.default.session.setDebug(options.debug);
23
+ state.default.session.setCurlirize(options.curlirize);
21
24
  if (await getTokens()) {
22
- printMessage('Creating new version of secret...');
25
+ verboseMessage('Creating new version of secret...');
23
26
  createNewVersionOfSecretCmd(options.secretId, options.value);
24
27
  }
25
- } // end command logic inside action handler
28
+ }
29
+ // end command logic inside action handler
26
30
  );
31
+
27
32
  program.parse();
28
33
  //# sourceMappingURL=esv-secret-version-create.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"esv-secret-version-create.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","createNewVersionOfSecretCmd","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","value","parse"],"sources":["cli/esv/esv-secret-version-create.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { createNewVersionOfSecretCmd } = Secrets;\n\nconst program = new Command('frodo esv secret version create');\n\nprogram\n .description('Create new version of secret.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('--value <value>', 'Secret value.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Creating new version of secret...');\n createNewVersionOfSecretCmd(options.secretId, options.value);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,OAAvB,EAAgCC,KAAhC,QAA6C,uBAA7C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AACA,SAASC,YAAT,QAA6B,wBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EAAEM;AAAF,IAAkCL,OAAxC;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,iCAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,+BADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAUa,IAAIjB,MAAJ,CAAW,6BAAX,EAA0C,YAA1C,CAVb,EAWGiB,SAXH,CAWa,IAAIjB,MAAJ,CAAW,iBAAX,EAA8B,eAA9B,CAXb,EAYGiB,SAZH,CAaI,IAAIjB,MAAJ,CACE,WADF,EAEE,kGAFF,EAGEoB,OAHF,CAGU,KAHV,EAGiB,KAHjB,CAbJ,EAkBGC,MAlBH,EAmBI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAnB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACApB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACArB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACAtB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA9B,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrBD,YAAY,CAAC,mCAAD,CAAZ;IACAE,2BAA2B,CAACmB,OAAO,CAACU,QAAT,EAAmBV,OAAO,CAACW,KAA3B,CAA3B;EACD;AACF,CA/BL,CAgCI;AAhCJ;AAmCA7B,OAAO,CAAC8B,KAAR"}
1
+ {"version":3,"file":"esv-secret-version-create.js","names":["Command","Option","Authenticate","Secrets","state","common","verboseMessage","getTokens","createNewVersionOfSecretCmd","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","verboseOption","debugOption","curlirizeOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","setVerbose","verbose","setDebug","debug","setCurlirize","curlirize","secretId","value","parse"],"sources":["cli/esv/esv-secret-version-create.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { verboseMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { createNewVersionOfSecretCmd } = Secrets;\n\nconst program = new Command('frodo esv secret version create');\n\nprogram\n .description('Create new version of secret.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(common.verboseOption)\n .addOption(common.debugOption)\n .addOption(common.curlirizeOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('--value <value>', 'Secret value.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n state.default.session.setVerbose(options.verbose);\n state.default.session.setDebug(options.debug);\n state.default.session.setCurlirize(options.curlirize);\n if (await getTokens()) {\n verboseMessage('Creating new version of secret...');\n createNewVersionOfSecretCmd(options.secretId, options.value);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,cAAc,QAAQ,wBAAwB;AAEvD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAA4B,CAAC,GAAGL,OAAO;AAE/C,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,iCAAiC,CAAC;AAE9DS,OAAO,CACJC,WAAW,CAAC,+BAA+B,CAAC,CAC5CC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CAACb,MAAM,CAACgB,aAAa,CAAC,CAC/BH,SAAS,CAACb,MAAM,CAACiB,WAAW,CAAC,CAC7BJ,SAAS,CAACb,MAAM,CAACkB,eAAe,CAAC,CACjCL,SAAS,CAAC,IAAIjB,MAAM,CAAC,6BAA6B,EAAE,YAAY,CAAC,CAAC,CAClEiB,SAAS,CAAC,IAAIjB,MAAM,CAAC,iBAAiB,EAAE,eAAe,CAAC,CAAC,CACzDuB,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CzB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACC,SAAS,CAACP,IAAI,CAAC;EACrCrB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACE,QAAQ,CAACP,KAAK,CAAC;EACrCtB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACG,WAAW,CAACP,IAAI,CAAC;EACvCvB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACI,WAAW,CAACP,QAAQ,CAAC;EAC3CxB,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACK,iBAAiB,CAACP,OAAO,CAACQ,IAAI,CAAC;EACrDjC,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACO,0BAA0B,CAACT,OAAO,CAACU,QAAQ,CAAC;EAClEnC,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACS,UAAU,CAACX,OAAO,CAACY,OAAO,CAAC;EACjDrC,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACW,QAAQ,CAACb,OAAO,CAACc,KAAK,CAAC;EAC7CvC,KAAK,CAAC0B,OAAO,CAACC,OAAO,CAACa,YAAY,CAACf,OAAO,CAACgB,SAAS,CAAC;EACrD,IAAI,MAAMtC,SAAS,EAAE,EAAE;IACrBD,cAAc,CAAC,mCAAmC,CAAC;IACnDE,2BAA2B,CAACqB,OAAO,CAACiB,QAAQ,EAAEjB,OAAO,CAACkB,KAAK,CAAC;EAC9D;AACF;AACA;AAAA,CACD;;AAEHtC,OAAO,CAACuC,KAAK,EAAE"}
@@ -1,7 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';
3
3
  import * as common from '../cmd_common.js';
4
- import { printMessage } from '../../utils/Console.js';
4
+ import { printMessage, verboseMessage } from '../../utils/Console.js';
5
5
  const {
6
6
  getTokens
7
7
  } = Authenticate;
@@ -9,7 +9,8 @@ const {
9
9
  deactivateVersionOfSecret
10
10
  } = Secrets;
11
11
  const program = new Command('frodo esv secret version deactivate');
12
- program.description('Deactivate versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action( // implement command logic inside action handler
12
+ program.description('Deactivate versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(common.verboseOption).addOption(common.debugOption).addOption(common.curlirizeOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).action(
13
+ // implement command logic inside action handler
13
14
  async (host, realm, user, password, options) => {
14
15
  state.default.session.setTenant(host);
15
16
  state.default.session.setRealm(realm);
@@ -17,19 +18,22 @@ async (host, realm, user, password, options) => {
17
18
  state.default.session.setPassword(password);
18
19
  state.default.session.setDeploymentType(options.type);
19
20
  state.default.session.setAllowInsecureConnection(options.insecure);
20
-
21
- if (await getTokens()) {
22
- // activate by id
23
- if (options.secretId && options.version) {
24
- printMessage(`Deactivating version of secret...`);
25
- deactivateVersionOfSecret(options.secretId, options.version);
26
- } // unrecognized combination of options or no options
27
- else {
28
- printMessage('Unrecognized combination of options or no options...');
29
- program.help();
30
- }
21
+ state.default.session.setVerbose(options.verbose);
22
+ state.default.session.setDebug(options.debug);
23
+ state.default.session.setCurlirize(options.curlirize);
24
+ // activate by id
25
+ if (options.secretId && options.version && (await getTokens())) {
26
+ verboseMessage(`Deactivating version of secret...`);
27
+ deactivateVersionOfSecret(options.secretId, options.version);
28
+ }
29
+ // unrecognized combination of options or no options
30
+ else {
31
+ printMessage('Unrecognized combination of options or no options...');
32
+ program.help();
31
33
  }
32
- } // end command logic inside action handler
34
+ }
35
+ // end command logic inside action handler
33
36
  );
37
+
34
38
  program.parse();
35
39
  //# sourceMappingURL=esv-secret-version-deactivate.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"esv-secret-version-deactivate.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","deactivateVersionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-deactivate.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { deactivateVersionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret version deactivate');\n\nprogram\n .description('Deactivate versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // activate by id\n if (options.secretId && options.version) {\n printMessage(`Deactivating version of secret...`);\n deactivateVersionOfSecret(options.secretId, options.version);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAT,EAAkBC,MAAlB,QAAgC,WAAhC;AACA,SAASC,YAAT,EAAuBC,OAAvB,EAAgCC,KAAhC,QAA6C,uBAA7C;AACA,OAAO,KAAKC,MAAZ,MAAwB,kBAAxB;AACA,SAASC,YAAT,QAA6B,wBAA7B;AAEA,MAAM;EAAEC;AAAF,IAAgBL,YAAtB;AACA,MAAM;EAAEM;AAAF,IAAgCL,OAAtC;AAEA,MAAMM,OAAO,GAAG,IAAIT,OAAJ,CAAY,qCAAZ,CAAhB;AAEAS,OAAO,CACJC,WADH,CACe,iCADf,EAEGC,UAFH,CAEc,YAFd,EAE4B,MAF5B,EAGGC,kBAHH,GAIGC,WAJH,CAIeR,MAAM,CAACS,aAJtB,EAKGD,WALH,CAKeR,MAAM,CAACU,aALtB,EAMGF,WANH,CAMeR,MAAM,CAACW,YANtB,EAOGH,WAPH,CAOeR,MAAM,CAACY,gBAPtB,EAQGC,SARH,CAQab,MAAM,CAACc,gBARpB,EASGD,SATH,CASab,MAAM,CAACe,cATpB,EAUGF,SAVH,CAUa,IAAIjB,MAAJ,CAAW,6BAAX,EAA0C,YAA1C,CAVb,EAWGiB,SAXH,CAWa,IAAIjB,MAAJ,CAAW,yBAAX,EAAsC,oBAAtC,CAXb,EAYGiB,SAZH,CAaI,IAAIjB,MAAJ,CACE,WADF,EAEE,kGAFF,EAGEoB,OAHF,CAGU,KAHV,EAGiB,KAHjB,CAbJ,EAkBGC,MAlBH,EAmBI;AACA,OAAOC,IAAP,EAAaC,KAAb,EAAoBC,IAApB,EAA0BC,QAA1B,EAAoCC,OAApC,KAAgD;EAC9CvB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBC,SAAtB,CAAgCN,IAAhC;EACAnB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBE,QAAtB,CAA+BN,KAA/B;EACApB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBG,WAAtB,CAAkCN,IAAlC;EACArB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBI,WAAtB,CAAkCN,QAAlC;EACAtB,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBK,iBAAtB,CAAwCN,OAAO,CAACO,IAAhD;EACA9B,KAAK,CAACiB,OAAN,CAAcO,OAAd,CAAsBO,0BAAtB,CAAiDR,OAAO,CAACS,QAAzD;;EACA,IAAI,MAAM7B,SAAS,EAAnB,EAAuB;IACrB;IACA,IAAIoB,OAAO,CAACU,QAAR,IAAoBV,OAAO,CAACW,OAAhC,EAAyC;MACvChC,YAAY,CAAE,mCAAF,CAAZ;MACAE,yBAAyB,CAACmB,OAAO,CAACU,QAAT,EAAmBV,OAAO,CAACW,OAA3B,CAAzB;IACD,CAHD,CAIA;IAJA,KAKK;MACHhC,YAAY,CAAC,sDAAD,CAAZ;MACAG,OAAO,CAAC8B,IAAR;IACD;EACF;AACF,CAvCL,CAwCI;AAxCJ;AA2CA9B,OAAO,CAAC+B,KAAR"}
1
+ {"version":3,"file":"esv-secret-version-deactivate.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","verboseMessage","getTokens","deactivateVersionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","verboseOption","debugOption","curlirizeOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","setVerbose","verbose","setDebug","debug","setCurlirize","curlirize","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-deactivate.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage, verboseMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { deactivateVersionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret version deactivate');\n\nprogram\n .description('Deactivate versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(common.verboseOption)\n .addOption(common.debugOption)\n .addOption(common.curlirizeOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n state.default.session.setVerbose(options.verbose);\n state.default.session.setDebug(options.debug);\n state.default.session.setCurlirize(options.curlirize);\n // activate by id\n if (options.secretId && options.version && (await getTokens())) {\n verboseMessage(`Deactivating version of secret...`);\n deactivateVersionOfSecret(options.secretId, options.version);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,EAAEC,cAAc,QAAQ,wBAAwB;AAErE,MAAM;EAAEC;AAAU,CAAC,GAAGN,YAAY;AAClC,MAAM;EAAEO;AAA0B,CAAC,GAAGN,OAAO;AAE7C,MAAMO,OAAO,GAAG,IAAIV,OAAO,CAAC,qCAAqC,CAAC;AAElEU,OAAO,CACJC,WAAW,CAAC,iCAAiC,CAAC,CAC9CC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACT,MAAM,CAACU,aAAa,CAAC,CACjCD,WAAW,CAACT,MAAM,CAACW,aAAa,CAAC,CACjCF,WAAW,CAACT,MAAM,CAACY,YAAY,CAAC,CAChCH,WAAW,CAACT,MAAM,CAACa,gBAAgB,CAAC,CACpCC,SAAS,CAACd,MAAM,CAACe,gBAAgB,CAAC,CAClCD,SAAS,CAACd,MAAM,CAACgB,cAAc,CAAC,CAChCF,SAAS,CAACd,MAAM,CAACiB,aAAa,CAAC,CAC/BH,SAAS,CAACd,MAAM,CAACkB,WAAW,CAAC,CAC7BJ,SAAS,CAACd,MAAM,CAACmB,eAAe,CAAC,CACjCL,SAAS,CAAC,IAAIlB,MAAM,CAAC,6BAA6B,EAAE,YAAY,CAAC,CAAC,CAClEkB,SAAS,CAAC,IAAIlB,MAAM,CAAC,yBAAyB,EAAE,oBAAoB,CAAC,CAAC,CACtEwB,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9C1B,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACC,SAAS,CAACP,IAAI,CAAC;EACrCtB,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACE,QAAQ,CAACP,KAAK,CAAC;EACrCvB,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACG,WAAW,CAACP,IAAI,CAAC;EACvCxB,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACI,WAAW,CAACP,QAAQ,CAAC;EAC3CzB,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACK,iBAAiB,CAACP,OAAO,CAACQ,IAAI,CAAC;EACrDlC,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACO,0BAA0B,CAACT,OAAO,CAACU,QAAQ,CAAC;EAClEpC,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACS,UAAU,CAACX,OAAO,CAACY,OAAO,CAAC;EACjDtC,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACW,QAAQ,CAACb,OAAO,CAACc,KAAK,CAAC;EAC7CxC,KAAK,CAAC2B,OAAO,CAACC,OAAO,CAACa,YAAY,CAACf,OAAO,CAACgB,SAAS,CAAC;EACrD;EACA,IAAIhB,OAAO,CAACiB,QAAQ,IAAIjB,OAAO,CAACkB,OAAO,KAAK,MAAMxC,SAAS,EAAE,CAAC,EAAE;IAC9DD,cAAc,CAAE,mCAAkC,CAAC;IACnDE,yBAAyB,CAACqB,OAAO,CAACiB,QAAQ,EAAEjB,OAAO,CAACkB,OAAO,CAAC;EAC9D;EACA;EAAA,KACK;IACH1C,YAAY,CAAC,sDAAsD,CAAC;IACpEI,OAAO,CAACuC,IAAI,EAAE;EAChB;AACF;AACA;AAAA,CACD;;AAEHvC,OAAO,CAACwC,KAAK,EAAE"}
@@ -1,7 +1,7 @@
1
1
  import { Command, Option } from 'commander';
2
2
  import { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';
3
3
  import * as common from '../cmd_common.js';
4
- import { printMessage } from '../../utils/Console.js';
4
+ import { printMessage, verboseMessage } from '../../utils/Console.js';
5
5
  const {
6
6
  getTokens
7
7
  } = Authenticate;
@@ -9,7 +9,8 @@ const {
9
9
  deleteVersionOfSecretCmd
10
10
  } = Secrets;
11
11
  const program = new Command('frodo esv secret version delete');
12
- program.description('Delete versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id. If specified, -a is ignored.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('-a, --all', 'Delete all secrets in a realm. Ignored with -i.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action( // implement command logic inside action handler
12
+ program.description('Delete versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(common.verboseOption).addOption(common.debugOption).addOption(common.curlirizeOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id. If specified, -a is ignored.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('-a, --all', 'Delete all secrets in a realm. Ignored with -i.')).action(
13
+ // implement command logic inside action handler
13
14
  async (host, realm, user, password, options) => {
14
15
  state.default.session.setTenant(host);
15
16
  state.default.session.setRealm(realm);
@@ -17,24 +18,27 @@ async (host, realm, user, password, options) => {
17
18
  state.default.session.setPassword(password);
18
19
  state.default.session.setDeploymentType(options.type);
19
20
  state.default.session.setAllowInsecureConnection(options.insecure);
20
-
21
- if (await getTokens()) {
22
- // delete by id
23
- if (options.secretId && options.version) {
24
- printMessage(`Deleting version of secret...`);
25
- deleteVersionOfSecretCmd(options.secretId, options.version);
26
- } // --all -a
27
- // else if (options.all) {
28
- // printMessage('Deleting all versions...');
29
- // deleteJourneys(options);
30
- // }
31
- // unrecognized combination of options or no options
32
- else {
33
- printMessage('Unrecognized combination of options or no options...');
34
- program.help();
35
- }
21
+ state.default.session.setVerbose(options.verbose);
22
+ state.default.session.setDebug(options.debug);
23
+ state.default.session.setCurlirize(options.curlirize);
24
+ // delete by id
25
+ if (options.secretId && options.version && (await getTokens())) {
26
+ verboseMessage(`Deleting version of secret...`);
27
+ deleteVersionOfSecretCmd(options.secretId, options.version);
28
+ }
29
+ // --all -a
30
+ // else if (options.all && (await getTokens())) {
31
+ // printMessage('Deleting all versions...');
32
+ // deleteJourneys(options);
33
+ // }
34
+ // unrecognized combination of options or no options
35
+ else {
36
+ printMessage('Unrecognized combination of options or no options...');
37
+ program.help();
36
38
  }
37
- } // end command logic inside action handler
39
+ }
40
+ // end command logic inside action handler
38
41
  );
42
+
39
43
  program.parse();
40
44
  //# sourceMappingURL=esv-secret-version-delete.js.map