@rockcarver/frodo-cli 0.18.2-7 → 0.18.2-9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +12 -1
- package/esm/app.js +2 -2
- package/esm/app.js.map +1 -1
- package/esm/cli/_template/something-delete.js +7 -4
- package/esm/cli/_template/something-delete.js.map +1 -1
- package/esm/cli/_template/something-describe.js +7 -4
- package/esm/cli/_template/something-describe.js.map +1 -1
- package/esm/cli/_template/something-else-delete.js +7 -4
- package/esm/cli/_template/something-else-delete.js.map +1 -1
- package/esm/cli/_template/something-else-describe.js +7 -4
- package/esm/cli/_template/something-else-describe.js.map +1 -1
- package/esm/cli/_template/something-else-export.js +7 -4
- package/esm/cli/_template/something-else-export.js.map +1 -1
- package/esm/cli/_template/something-else-import.js +7 -4
- package/esm/cli/_template/something-else-import.js.map +1 -1
- package/esm/cli/_template/something-else-list.js +7 -4
- package/esm/cli/_template/something-else-list.js.map +1 -1
- package/esm/cli/_template/something-else.js.map +1 -1
- package/esm/cli/_template/something-export.js +7 -4
- package/esm/cli/_template/something-export.js.map +1 -1
- package/esm/cli/_template/something-import.js +7 -4
- package/esm/cli/_template/something-import.js.map +1 -1
- package/esm/cli/_template/something-list.js +7 -4
- package/esm/cli/_template/something-list.js.map +1 -1
- package/esm/cli/_template/something-other-delete.js +7 -4
- package/esm/cli/_template/something-other-delete.js.map +1 -1
- package/esm/cli/_template/something-other-describe.js +7 -4
- package/esm/cli/_template/something-other-describe.js.map +1 -1
- package/esm/cli/_template/something-other-export.js +7 -4
- package/esm/cli/_template/something-other-export.js.map +1 -1
- package/esm/cli/_template/something-other-import.js +7 -4
- package/esm/cli/_template/something-other-import.js.map +1 -1
- package/esm/cli/_template/something-other-list.js +7 -4
- package/esm/cli/_template/something-other-list.js.map +1 -1
- package/esm/cli/_template/something-other.js.map +1 -1
- package/esm/cli/_template/something.js +0 -2
- package/esm/cli/_template/something.js.map +1 -1
- package/esm/cli/admin/admin-add-autoid-static-user-mapping.js +5 -3
- package/esm/cli/admin/admin-add-autoid-static-user-mapping.js.map +1 -1
- package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js +7 -11
- package/esm/cli/admin/admin-create-oauth2-client-with-admin-privileges.js.map +1 -1
- package/esm/cli/admin/admin-get-access-token.js +5 -3
- package/esm/cli/admin/admin-get-access-token.js.map +1 -1
- package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js +5 -3
- package/esm/cli/admin/admin-grant-oauth2-client-admin-privileges.js.map +1 -1
- package/esm/cli/admin/admin-hide-generic-extension-attributes.js +5 -3
- package/esm/cli/admin/admin-hide-generic-extension-attributes.js.map +1 -1
- package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js +5 -3
- package/esm/cli/admin/admin-list-oauth2-clients-with-admin-privileges.js.map +1 -1
- package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js +5 -3
- package/esm/cli/admin/admin-list-oauth2-clients-with-custom-privileges.js.map +1 -1
- package/esm/cli/admin/admin-list-static-user-mappings.js +5 -3
- package/esm/cli/admin/admin-list-static-user-mappings.js.map +1 -1
- package/esm/cli/admin/admin-remove-static-user-mapping.js +5 -3
- package/esm/cli/admin/admin-remove-static-user-mapping.js.map +1 -1
- package/esm/cli/admin/admin-repair-org-model.js +5 -3
- package/esm/cli/admin/admin-repair-org-model.js.map +1 -1
- package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js +5 -3
- package/esm/cli/admin/admin-revoke-oauth2-client-admin-privileges.js.map +1 -1
- package/esm/cli/admin/admin-show-generic-extension-attributes.js +5 -3
- package/esm/cli/admin/admin-show-generic-extension-attributes.js.map +1 -1
- package/esm/cli/admin/admin.js +0 -2
- package/esm/cli/admin/admin.js.map +1 -1
- package/esm/cli/agent/agent-delete.js +9 -7
- package/esm/cli/agent/agent-delete.js.map +1 -1
- package/esm/cli/agent/agent-describe.js +7 -4
- package/esm/cli/agent/agent-describe.js.map +1 -1
- package/esm/cli/agent/agent-export.js +11 -6
- package/esm/cli/agent/agent-export.js.map +1 -1
- package/esm/cli/agent/agent-gateway-delete.js +9 -7
- package/esm/cli/agent/agent-gateway-delete.js.map +1 -1
- package/esm/cli/agent/agent-gateway-describe.js +7 -4
- package/esm/cli/agent/agent-gateway-describe.js.map +1 -1
- package/esm/cli/agent/agent-gateway-export.js +11 -6
- package/esm/cli/agent/agent-gateway-export.js.map +1 -1
- package/esm/cli/agent/agent-gateway-import.js +13 -7
- package/esm/cli/agent/agent-gateway-import.js.map +1 -1
- package/esm/cli/agent/agent-gateway-list.js +5 -3
- package/esm/cli/agent/agent-gateway-list.js.map +1 -1
- package/esm/cli/agent/agent-gateway.js.map +1 -1
- package/esm/cli/agent/agent-import.js +13 -7
- package/esm/cli/agent/agent-import.js.map +1 -1
- package/esm/cli/agent/agent-java-delete.js +9 -7
- package/esm/cli/agent/agent-java-delete.js.map +1 -1
- package/esm/cli/agent/agent-java-describe.js +7 -4
- package/esm/cli/agent/agent-java-describe.js.map +1 -1
- package/esm/cli/agent/agent-java-export.js +11 -6
- package/esm/cli/agent/agent-java-export.js.map +1 -1
- package/esm/cli/agent/agent-java-import.js +13 -7
- package/esm/cli/agent/agent-java-import.js.map +1 -1
- package/esm/cli/agent/agent-java-list.js +5 -3
- package/esm/cli/agent/agent-java-list.js.map +1 -1
- package/esm/cli/agent/agent-java.js.map +1 -1
- package/esm/cli/agent/agent-list.js +5 -3
- package/esm/cli/agent/agent-list.js.map +1 -1
- package/esm/cli/agent/agent-web-delete.js +9 -7
- package/esm/cli/agent/agent-web-delete.js.map +1 -1
- package/esm/cli/agent/agent-web-describe.js +7 -4
- package/esm/cli/agent/agent-web-describe.js.map +1 -1
- package/esm/cli/agent/agent-web-export.js +11 -6
- package/esm/cli/agent/agent-web-export.js.map +1 -1
- package/esm/cli/agent/agent-web-import.js +13 -7
- package/esm/cli/agent/agent-web-import.js.map +1 -1
- package/esm/cli/agent/agent-web-list.js +5 -3
- package/esm/cli/agent/agent-web-list.js.map +1 -1
- package/esm/cli/agent/agent-web.js.map +1 -1
- package/esm/cli/agent/agent.js +0 -2
- package/esm/cli/agent/agent.js.map +1 -1
- package/esm/cli/app/app-delete.js +7 -4
- package/esm/cli/app/app-delete.js.map +1 -1
- package/esm/cli/app/app-describe.js +7 -4
- package/esm/cli/app/app-describe.js.map +1 -1
- package/esm/cli/app/app-export.js +11 -6
- package/esm/cli/app/app-export.js.map +1 -1
- package/esm/cli/app/app-import.js +9 -5
- package/esm/cli/app/app-import.js.map +1 -1
- package/esm/cli/app/app-list.js +5 -3
- package/esm/cli/app/app-list.js.map +1 -1
- package/esm/cli/app/app.js +8 -5
- package/esm/cli/app/app.js.map +1 -1
- package/esm/cli/cmd_common.js +2 -1
- package/esm/cli/cmd_common.js.map +1 -1
- package/esm/cli/conn/conn-add.js +5 -5
- package/esm/cli/conn/conn-add.js.map +1 -1
- package/esm/cli/conn/conn-delete.js +5 -2
- package/esm/cli/conn/conn-delete.js.map +1 -1
- package/esm/cli/conn/conn-describe.js +5 -2
- package/esm/cli/conn/conn-describe.js.map +1 -1
- package/esm/cli/conn/conn-list.js +7 -3
- package/esm/cli/conn/conn-list.js.map +1 -1
- package/esm/cli/conn/conn.js +2 -3
- package/esm/cli/conn/conn.js.map +1 -1
- package/esm/cli/email/email-template-export.js +13 -12
- package/esm/cli/email/email-template-export.js.map +1 -1
- package/esm/cli/email/email-template-import.js +15 -14
- package/esm/cli/email/email-template-import.js.map +1 -1
- package/esm/cli/email/email-template-list.js +7 -7
- package/esm/cli/email/email-template-list.js.map +1 -1
- package/esm/cli/email/email-template.js.map +1 -1
- package/esm/cli/email/email.js +0 -2
- package/esm/cli/email/email.js.map +1 -1
- package/esm/cli/esv/esv-apply.js +9 -11
- package/esm/cli/esv/esv-apply.js.map +1 -1
- package/esm/cli/esv/esv-secret-create.js +5 -3
- package/esm/cli/esv/esv-secret-create.js.map +1 -1
- package/esm/cli/esv/esv-secret-delete.js +9 -5
- package/esm/cli/esv/esv-secret-delete.js.map +1 -1
- package/esm/cli/esv/esv-secret-describe.js +5 -3
- package/esm/cli/esv/esv-secret-describe.js.map +1 -1
- package/esm/cli/esv/esv-secret-export.js +7 -4
- package/esm/cli/esv/esv-secret-export.js.map +1 -1
- package/esm/cli/esv/esv-secret-import.js +7 -4
- package/esm/cli/esv/esv-secret-import.js.map +1 -1
- package/esm/cli/esv/esv-secret-list.js +5 -3
- package/esm/cli/esv/esv-secret-list.js.map +1 -1
- package/esm/cli/esv/esv-secret-set.js +5 -3
- package/esm/cli/esv/esv-secret-set.js.map +1 -1
- package/esm/cli/esv/esv-secret-version-activate.js +7 -4
- package/esm/cli/esv/esv-secret-version-activate.js.map +1 -1
- package/esm/cli/esv/esv-secret-version-create.js +5 -3
- package/esm/cli/esv/esv-secret-version-create.js.map +1 -1
- package/esm/cli/esv/esv-secret-version-deactivate.js +7 -4
- package/esm/cli/esv/esv-secret-version-deactivate.js.map +1 -1
- package/esm/cli/esv/esv-secret-version-delete.js +7 -4
- package/esm/cli/esv/esv-secret-version-delete.js.map +1 -1
- package/esm/cli/esv/esv-secret-version-list.js +5 -3
- package/esm/cli/esv/esv-secret-version-list.js.map +1 -1
- package/esm/cli/esv/esv-secret-version.js.map +1 -1
- package/esm/cli/esv/esv-secret.js +4 -1
- package/esm/cli/esv/esv-secret.js.map +1 -1
- package/esm/cli/esv/esv-variable-create.js +5 -3
- package/esm/cli/esv/esv-variable-create.js.map +1 -1
- package/esm/cli/esv/esv-variable-delete.js +9 -5
- package/esm/cli/esv/esv-variable-delete.js.map +1 -1
- package/esm/cli/esv/esv-variable-describe.js +5 -3
- package/esm/cli/esv/esv-variable-describe.js.map +1 -1
- package/esm/cli/esv/esv-variable-export.js +7 -4
- package/esm/cli/esv/esv-variable-export.js.map +1 -1
- package/esm/cli/esv/esv-variable-import.js +7 -4
- package/esm/cli/esv/esv-variable-import.js.map +1 -1
- package/esm/cli/esv/esv-variable-list.js +5 -3
- package/esm/cli/esv/esv-variable-list.js.map +1 -1
- package/esm/cli/esv/esv-variable-set.js +7 -4
- package/esm/cli/esv/esv-variable-set.js.map +1 -1
- package/esm/cli/esv/esv-variable.js +4 -1
- package/esm/cli/esv/esv-variable.js.map +1 -1
- package/esm/cli/esv/esv.js +0 -2
- package/esm/cli/esv/esv.js.map +1 -1
- package/esm/cli/idm/idm-count.js +5 -3
- package/esm/cli/idm/idm-count.js.map +1 -1
- package/esm/cli/idm/idm-export.js +11 -6
- package/esm/cli/idm/idm-export.js.map +1 -1
- package/esm/cli/idm/idm-import.js +11 -6
- package/esm/cli/idm/idm-import.js.map +1 -1
- package/esm/cli/idm/idm-list.js +7 -4
- package/esm/cli/idm/idm-list.js.map +1 -1
- package/esm/cli/idm/idm.js +2 -3
- package/esm/cli/idm/idm.js.map +1 -1
- package/esm/cli/idp/idp-export.js +11 -6
- package/esm/cli/idp/idp-export.js.map +1 -1
- package/esm/cli/idp/idp-import.js +13 -7
- package/esm/cli/idp/idp-import.js.map +1 -1
- package/esm/cli/idp/idp-list.js +7 -4
- package/esm/cli/idp/idp-list.js.map +1 -1
- package/esm/cli/idp/idp.js +0 -2
- package/esm/cli/idp/idp.js.map +1 -1
- package/esm/cli/info/info.js +0 -5
- package/esm/cli/info/info.js.map +1 -1
- package/esm/cli/journey/journey-delete.e2e.test_.js.map +1 -1
- package/esm/cli/journey/journey-delete.js +9 -5
- package/esm/cli/journey/journey-delete.js.map +1 -1
- package/esm/cli/journey/journey-describe.js +31 -28
- package/esm/cli/journey/journey-describe.js.map +1 -1
- package/esm/cli/journey/journey-disable.js +9 -6
- package/esm/cli/journey/journey-disable.js.map +1 -1
- package/esm/cli/journey/journey-enable.js +9 -6
- package/esm/cli/journey/journey-enable.js.map +1 -1
- package/esm/cli/journey/journey-export.js +11 -6
- package/esm/cli/journey/journey-export.js.map +1 -1
- package/esm/cli/journey/journey-import.js +13 -7
- package/esm/cli/journey/journey-import.js.map +1 -1
- package/esm/cli/journey/journey-list.e2e.test_.js.map +1 -1
- package/esm/cli/journey/journey-list.js +5 -3
- package/esm/cli/journey/journey-list.js.map +1 -1
- package/esm/cli/journey/journey-prune.js +5 -5
- package/esm/cli/journey/journey-prune.js.map +1 -1
- package/esm/cli/journey/journey.js +0 -2
- package/esm/cli/journey/journey.js.map +1 -1
- package/esm/cli/logging/logs-fetch.js +2 -11
- package/esm/cli/logging/logs-fetch.js.map +1 -1
- package/esm/cli/logging/logs-list.js +0 -5
- package/esm/cli/logging/logs-list.js.map +1 -1
- package/esm/cli/logging/logs-tail.js +0 -4
- package/esm/cli/logging/logs-tail.js.map +1 -1
- package/esm/cli/logging/logs.js +2 -4
- package/esm/cli/logging/logs.js.map +1 -1
- package/esm/cli/realm/realm-add-custom-domain.js +5 -3
- package/esm/cli/realm/realm-add-custom-domain.js.map +1 -1
- package/esm/cli/realm/realm-describe.js +5 -3
- package/esm/cli/realm/realm-describe.js.map +1 -1
- package/esm/cli/realm/realm-list.js +5 -3
- package/esm/cli/realm/realm-list.js.map +1 -1
- package/esm/cli/realm/realm-remove-custom-domain.js +5 -3
- package/esm/cli/realm/realm-remove-custom-domain.js.map +1 -1
- package/esm/cli/realm/realm.js +5 -4
- package/esm/cli/realm/realm.js.map +1 -1
- package/esm/cli/saml/saml-cot-export.js +11 -6
- package/esm/cli/saml/saml-cot-export.js.map +1 -1
- package/esm/cli/saml/saml-cot-import.js +13 -7
- package/esm/cli/saml/saml-cot-import.js.map +1 -1
- package/esm/cli/saml/saml-cot-list.js +5 -3
- package/esm/cli/saml/saml-cot-list.js.map +1 -1
- package/esm/cli/saml/saml-cot.js.map +1 -1
- package/esm/cli/saml/saml-delete.js +11 -6
- package/esm/cli/saml/saml-delete.js.map +1 -1
- package/esm/cli/saml/saml-describe.js +5 -3
- package/esm/cli/saml/saml-describe.js.map +1 -1
- package/esm/cli/saml/saml-export.js +13 -7
- package/esm/cli/saml/saml-export.js.map +1 -1
- package/esm/cli/saml/saml-import.js +13 -7
- package/esm/cli/saml/saml-import.js.map +1 -1
- package/esm/cli/saml/saml-list.js +5 -3
- package/esm/cli/saml/saml-list.js.map +1 -1
- package/esm/cli/saml/saml-metadata-export.js +7 -4
- package/esm/cli/saml/saml-metadata-export.js.map +1 -1
- package/esm/cli/saml/saml-metadata.js.map +1 -1
- package/esm/cli/saml/saml.js +0 -2
- package/esm/cli/saml/saml.js.map +1 -1
- package/esm/cli/script/script-delete.js +7 -4
- package/esm/cli/script/script-delete.js.map +1 -1
- package/esm/cli/script/script-describe.js +7 -4
- package/esm/cli/script/script-describe.js.map +1 -1
- package/esm/cli/script/script-export.js +15 -8
- package/esm/cli/script/script-export.js.map +1 -1
- package/esm/cli/script/script-import.js +7 -4
- package/esm/cli/script/script-import.js.map +1 -1
- package/esm/cli/script/script-list.js +5 -3
- package/esm/cli/script/script-list.js.map +1 -1
- package/esm/cli/script/script.js +6 -4
- package/esm/cli/script/script.js.map +1 -1
- package/esm/cli/service/service-delete.js +0 -1
- package/esm/cli/service/service-delete.js.map +1 -1
- package/esm/cli/service/service-export.js +11 -6
- package/esm/cli/service/service-export.js.map +1 -1
- package/esm/cli/service/service-import.js +13 -6
- package/esm/cli/service/service-import.js.map +1 -1
- package/esm/cli/service/service-list.js +0 -1
- package/esm/cli/service/service-list.js.map +1 -1
- package/esm/cli/service/service.js +0 -2
- package/esm/cli/service/service.js.map +1 -1
- package/esm/cli/theme/theme-delete.e2e.test_.js.map +1 -1
- package/esm/cli/theme/theme-delete.js +16 -14
- package/esm/cli/theme/theme-delete.js.map +1 -1
- package/esm/cli/theme/theme-export.js +17 -15
- package/esm/cli/theme/theme-export.js.map +1 -1
- package/esm/cli/theme/theme-import.js +19 -17
- package/esm/cli/theme/theme-import.js.map +1 -1
- package/esm/cli/theme/theme-list.e2e.test_.js.map +1 -1
- package/esm/cli/theme/theme-list.js +7 -7
- package/esm/cli/theme/theme-list.js.map +1 -1
- package/esm/cli/theme/theme.js +0 -2
- package/esm/cli/theme/theme.js.map +1 -1
- package/esm/ops/AgentOps.js +48 -126
- package/esm/ops/AgentOps.js.map +1 -1
- package/esm/ops/CirclesOfTrustOps.js +2 -2
- package/esm/ops/CirclesOfTrustOps.js.map +1 -1
- package/esm/ops/EmailTemplateOps.js +270 -6
- package/esm/ops/EmailTemplateOps.js.map +1 -1
- package/esm/ops/IdpOps.js +2 -2
- package/esm/ops/IdpOps.js.map +1 -1
- package/esm/ops/JourneyOps.js +96 -152
- package/esm/ops/JourneyOps.js.map +1 -1
- package/esm/ops/NodeOps.js +6 -12
- package/esm/ops/NodeOps.js.map +1 -1
- package/esm/ops/Saml2Ops.js +25 -78
- package/esm/ops/Saml2Ops.js.map +1 -1
- package/esm/ops/Saml2Ops.test_.js.map +1 -1
- package/esm/ops/ScriptOps.js +3 -3
- package/esm/ops/ScriptOps.js.map +1 -1
- package/esm/ops/ServiceOps.js +10 -31
- package/esm/ops/ServiceOps.js.map +1 -1
- package/esm/ops/ThemeOps.js +331 -2
- package/esm/ops/ThemeOps.js.map +1 -1
- package/esm/ops/utils/Wordwrap.js.map +1 -1
- package/esm/storage/StaticStorage.js.map +1 -1
- package/esm/utils/Config.js +0 -9
- package/esm/utils/Config.js.map +1 -1
- package/esm/utils/Console.js +32 -79
- package/esm/utils/Console.js.map +1 -1
- package/esm/utils/ExportImportUtils.js +46 -0
- package/esm/utils/ExportImportUtils.js.map +1 -0
- package/esm/utils/Version.js +6 -24
- package/esm/utils/Version.js.map +1 -1
- package/package.json +18 -17
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret-import.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","parse"],"sources":["cli/esv/esv-secret-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo esv secret import');\n\nprogram\n .description('Import secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --secret-id <secret-id>',\n 'Secret id. If specified, only one secret is imported and the options -a and -A are ignored.'\n )\n )\n .addOption(new Option('-f, --file <file>', 'Name of the file to import.'))\n .addOption(\n new Option(\n '-a, --all',\n 'Import all secrets from single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Import all secrets from separate files (*.secret.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret-import.js","names":["Command","Option","Authenticate","state","common","getTokens","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","action","host","realm","user","password","options","default","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","parse"],"sources":["cli/esv/esv-secret-import.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\n\nconst { getTokens } = Authenticate;\n\nconst program = new Command('frodo esv secret import');\n\nprogram\n .description('Import secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --secret-id <secret-id>',\n 'Secret id. If specified, only one secret is imported and the options -a and -A are ignored.'\n )\n )\n .addOption(new Option('-f, --file <file>', 'Name of the file to import.'))\n .addOption(\n new Option(\n '-a, --all',\n 'Import all secrets from single file. Ignored with -i.'\n )\n )\n .addOption(\n new Option(\n '-A, --all-separate',\n 'Import all secrets from separate files (*.secret.json) in the current directory. Ignored with -i or -a.'\n )\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // code goes here\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,KAAK,QAAQ,uBAAuB;AAC3D,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAE1C,MAAM;EAAEC;AAAU,CAAC,GAAGH,YAAY;AAElC,MAAMI,OAAO,GAAG,IAAIN,OAAO,CAAC,yBAAyB,CAAC;AAEtDM,OAAO,CACJC,WAAW,CAAC,iBAAiB,CAAC,CAC9BC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACN,MAAM,CAACO,aAAa,CAAC,CACjCD,WAAW,CAACN,MAAM,CAACQ,aAAa,CAAC,CACjCF,WAAW,CAACN,MAAM,CAACS,YAAY,CAAC,CAChCH,WAAW,CAACN,MAAM,CAACU,gBAAgB,CAAC,CACpCC,SAAS,CAACX,MAAM,CAACY,gBAAgB,CAAC,CAClCD,SAAS,CAACX,MAAM,CAACa,cAAc,CAAC,CAChCF,SAAS,CACR,IAAId,MAAM,CACR,6BAA6B,EAC7B,6FAA6F,CAC9F,CACF,CACAc,SAAS,CAAC,IAAId,MAAM,CAAC,mBAAmB,EAAE,6BAA6B,CAAC,CAAC,CACzEc,SAAS,CACR,IAAId,MAAM,CACR,WAAW,EACX,uDAAuD,CACxD,CACF,CACAc,SAAS,CACR,IAAId,MAAM,CACR,oBAAoB,EACpB,yGAAyG,CAC1G,CACF,CACAiB,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CpB,KAAK,CAACqB,OAAO,CAACC,OAAO,CAACC,SAAS,CAACP,IAAI,CAAC;EACrChB,KAAK,CAACqB,OAAO,CAACC,OAAO,CAACE,QAAQ,CAACP,KAAK,CAAC;EACrCjB,KAAK,CAACqB,OAAO,CAACC,OAAO,CAACG,WAAW,CAACP,IAAI,CAAC;EACvClB,KAAK,CAACqB,OAAO,CAACC,OAAO,CAACI,WAAW,CAACP,QAAQ,CAAC;EAC3CnB,KAAK,CAACqB,OAAO,CAACC,OAAO,CAACK,iBAAiB,CAACP,OAAO,CAACQ,IAAI,CAAC;EACrD5B,KAAK,CAACqB,OAAO,CAACC,OAAO,CAACO,0BAA0B,CAACT,OAAO,CAACU,QAAQ,CAAC;EAClE,IAAI,MAAM5B,SAAS,EAAE,EAAE;IACrB;EAAA;AAEJ;AACA;AAAA,CACD;;AAEHC,OAAO,CAAC4B,KAAK,EAAE"}
|
|
@@ -9,7 +9,8 @@ const {
|
|
|
9
9
|
listSecrets
|
|
10
10
|
} = Secrets;
|
|
11
11
|
const program = new Command('frodo esv secret list');
|
|
12
|
-
program.description('List secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-l, --long', 'Long with all fields.').default(false, 'false')).action(
|
|
12
|
+
program.description('List secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-l, --long', 'Long with all fields.').default(false, 'false')).action(
|
|
13
|
+
// implement command logic inside action handler
|
|
13
14
|
async (host, realm, user, password, options) => {
|
|
14
15
|
state.default.session.setTenant(host);
|
|
15
16
|
state.default.session.setRealm(realm);
|
|
@@ -17,12 +18,13 @@ async (host, realm, user, password, options) => {
|
|
|
17
18
|
state.default.session.setPassword(password);
|
|
18
19
|
state.default.session.setDeploymentType(options.type);
|
|
19
20
|
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
20
|
-
|
|
21
21
|
if (await getTokens()) {
|
|
22
22
|
printMessage('Listing secrets...');
|
|
23
23
|
listSecrets(options.long);
|
|
24
24
|
}
|
|
25
|
-
}
|
|
25
|
+
}
|
|
26
|
+
// end command logic inside action handler
|
|
26
27
|
);
|
|
28
|
+
|
|
27
29
|
program.parse();
|
|
28
30
|
//# sourceMappingURL=esv-secret-list.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret-list.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","listSecrets","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","long","parse"],"sources":["cli/esv/esv-secret-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { listSecrets } = Secrets;\n\nconst program = new Command('frodo esv secret list');\n\nprogram\n .description('List secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Listing secrets...');\n listSecrets(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret-list.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","listSecrets","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","long","parse"],"sources":["cli/esv/esv-secret-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { listSecrets } = Secrets;\n\nconst program = new Command('frodo esv secret list');\n\nprogram\n .description('List secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Listing secrets...');\n listSecrets(options.long);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,QAAQ,wBAAwB;AAErD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAAY,CAAC,GAAGL,OAAO;AAE/B,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,uBAAuB,CAAC;AAEpDS,OAAO,CACJC,WAAW,CAAC,eAAe,CAAC,CAC5BC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CACR,IAAIjB,MAAM,CAAC,YAAY,EAAE,uBAAuB,CAAC,CAACoB,OAAO,CAAC,KAAK,EAAE,OAAO,CAAC,CAC1E,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CvB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACC,SAAS,CAACN,IAAI,CAAC;EACrCnB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACE,QAAQ,CAACN,KAAK,CAAC;EACrCpB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACG,WAAW,CAACN,IAAI,CAAC;EACvCrB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACI,WAAW,CAACN,QAAQ,CAAC;EAC3CtB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACK,iBAAiB,CAACN,OAAO,CAACO,IAAI,CAAC;EACrD9B,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACO,0BAA0B,CAACR,OAAO,CAACS,QAAQ,CAAC;EAClE,IAAI,MAAM7B,SAAS,EAAE,EAAE;IACrBD,YAAY,CAAC,oBAAoB,CAAC;IAClCE,WAAW,CAACmB,OAAO,CAACU,IAAI,CAAC;EAC3B;AACF;AACA;AAAA,CACD;;AAEH5B,OAAO,CAAC6B,KAAK,EAAE"}
|
|
@@ -9,7 +9,8 @@ const {
|
|
|
9
9
|
setDescriptionOfSecret
|
|
10
10
|
} = Secrets;
|
|
11
11
|
const program = new Command('frodo esv secret set');
|
|
12
|
-
program.description('Create secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('--description <description>', 'Secret description.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
12
|
+
program.description('Create secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('--description <description>', 'Secret description.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
13
|
+
// implement command logic inside action handler
|
|
13
14
|
async (host, realm, user, password, options) => {
|
|
14
15
|
state.default.session.setTenant(host);
|
|
15
16
|
state.default.session.setRealm(realm);
|
|
@@ -17,12 +18,13 @@ async (host, realm, user, password, options) => {
|
|
|
17
18
|
state.default.session.setPassword(password);
|
|
18
19
|
state.default.session.setDeploymentType(options.type);
|
|
19
20
|
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
20
|
-
|
|
21
21
|
if (await getTokens()) {
|
|
22
22
|
printMessage('Setting secret description...');
|
|
23
23
|
setDescriptionOfSecret(options.secretId, options.description);
|
|
24
24
|
}
|
|
25
|
-
}
|
|
25
|
+
}
|
|
26
|
+
// end command logic inside action handler
|
|
26
27
|
);
|
|
28
|
+
|
|
27
29
|
program.parse();
|
|
28
30
|
//# sourceMappingURL=esv-secret-set.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret-set.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","setDescriptionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","parse"],"sources":["cli/esv/esv-secret-set.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { setDescriptionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret set');\n\nprogram\n .description('Create secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('--description <description>', 'Secret description.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Setting secret description...');\n setDescriptionOfSecret(options.secretId, options.description);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret-set.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","setDescriptionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","parse"],"sources":["cli/esv/esv-secret-set.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { setDescriptionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret set');\n\nprogram\n .description('Create secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('--description <description>', 'Secret description.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Setting secret description...');\n setDescriptionOfSecret(options.secretId, options.description);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,QAAQ,wBAAwB;AAErD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAAuB,CAAC,GAAGL,OAAO;AAE1C,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,sBAAsB,CAAC;AAEnDS,OAAO,CACJC,WAAW,CAAC,iBAAiB,CAAC,CAC9BC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CAAC,IAAIjB,MAAM,CAAC,6BAA6B,EAAE,YAAY,CAAC,CAAC,CAClEiB,SAAS,CAAC,IAAIjB,MAAM,CAAC,6BAA6B,EAAE,qBAAqB,CAAC,CAAC,CAC3EiB,SAAS,CACR,IAAIjB,MAAM,CACR,WAAW,EACX,kGAAkG,CACnG,CAACoB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CACxB,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CvB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACC,SAAS,CAACN,IAAI,CAAC;EACrCnB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACE,QAAQ,CAACN,KAAK,CAAC;EACrCpB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACG,WAAW,CAACN,IAAI,CAAC;EACvCrB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACI,WAAW,CAACN,QAAQ,CAAC;EAC3CtB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACK,iBAAiB,CAACN,OAAO,CAACO,IAAI,CAAC;EACrD9B,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACO,0BAA0B,CAACR,OAAO,CAACS,QAAQ,CAAC;EAClE,IAAI,MAAM7B,SAAS,EAAE,EAAE;IACrBD,YAAY,CAAC,+BAA+B,CAAC;IAC7CE,sBAAsB,CAACmB,OAAO,CAACU,QAAQ,EAAEV,OAAO,CAACjB,WAAW,CAAC;EAC/D;AACF;AACA;AAAA,CACD;;AAEHD,OAAO,CAAC6B,KAAK,EAAE"}
|
|
@@ -9,7 +9,8 @@ const {
|
|
|
9
9
|
activateVersionOfSecret
|
|
10
10
|
} = Secrets;
|
|
11
11
|
const program = new Command('frodo esv secret version activate');
|
|
12
|
-
program.description('Activate versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
12
|
+
program.description('Activate versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
13
|
+
// implement command logic inside action handler
|
|
13
14
|
async (host, realm, user, password, options) => {
|
|
14
15
|
state.default.session.setTenant(host);
|
|
15
16
|
state.default.session.setRealm(realm);
|
|
@@ -17,19 +18,21 @@ async (host, realm, user, password, options) => {
|
|
|
17
18
|
state.default.session.setPassword(password);
|
|
18
19
|
state.default.session.setDeploymentType(options.type);
|
|
19
20
|
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
20
|
-
|
|
21
21
|
if (await getTokens()) {
|
|
22
22
|
// activate by id
|
|
23
23
|
if (options.secretId && options.version) {
|
|
24
24
|
printMessage(`Activating version of secret...`);
|
|
25
25
|
activateVersionOfSecret(options.secretId, options.version);
|
|
26
|
-
}
|
|
26
|
+
}
|
|
27
|
+
// unrecognized combination of options or no options
|
|
27
28
|
else {
|
|
28
29
|
printMessage('Unrecognized combination of options or no options...');
|
|
29
30
|
program.help();
|
|
30
31
|
}
|
|
31
32
|
}
|
|
32
|
-
}
|
|
33
|
+
}
|
|
34
|
+
// end command logic inside action handler
|
|
33
35
|
);
|
|
36
|
+
|
|
34
37
|
program.parse();
|
|
35
38
|
//# sourceMappingURL=esv-secret-version-activate.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret-version-activate.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","activateVersionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-activate.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { activateVersionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret version activate');\n\nprogram\n .description('Activate versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // activate by id\n if (options.secretId && options.version) {\n printMessage(`Activating version of secret...`);\n activateVersionOfSecret(options.secretId, options.version);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret-version-activate.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","activateVersionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-activate.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { activateVersionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret version activate');\n\nprogram\n .description('Activate versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // activate by id\n if (options.secretId && options.version) {\n printMessage(`Activating version of secret...`);\n activateVersionOfSecret(options.secretId, options.version);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,QAAQ,wBAAwB;AAErD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAAwB,CAAC,GAAGL,OAAO;AAE3C,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,mCAAmC,CAAC;AAEhES,OAAO,CACJC,WAAW,CAAC,+BAA+B,CAAC,CAC5CC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CAAC,IAAIjB,MAAM,CAAC,6BAA6B,EAAE,YAAY,CAAC,CAAC,CAClEiB,SAAS,CAAC,IAAIjB,MAAM,CAAC,yBAAyB,EAAE,oBAAoB,CAAC,CAAC,CACtEiB,SAAS,CACR,IAAIjB,MAAM,CACR,WAAW,EACX,kGAAkG,CACnG,CAACoB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CACxB,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CvB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACC,SAAS,CAACN,IAAI,CAAC;EACrCnB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACE,QAAQ,CAACN,KAAK,CAAC;EACrCpB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACG,WAAW,CAACN,IAAI,CAAC;EACvCrB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACI,WAAW,CAACN,QAAQ,CAAC;EAC3CtB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACK,iBAAiB,CAACN,OAAO,CAACO,IAAI,CAAC;EACrD9B,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACO,0BAA0B,CAACR,OAAO,CAACS,QAAQ,CAAC;EAClE,IAAI,MAAM7B,SAAS,EAAE,EAAE;IACrB;IACA,IAAIoB,OAAO,CAACU,QAAQ,IAAIV,OAAO,CAACW,OAAO,EAAE;MACvChC,YAAY,CAAE,iCAAgC,CAAC;MAC/CE,uBAAuB,CAACmB,OAAO,CAACU,QAAQ,EAAEV,OAAO,CAACW,OAAO,CAAC;IAC5D;IACA;IAAA,KACK;MACHhC,YAAY,CAAC,sDAAsD,CAAC;MACpEG,OAAO,CAAC8B,IAAI,EAAE;IAChB;EACF;AACF;AACA;AAAA,CACD;;AAEH9B,OAAO,CAAC+B,KAAK,EAAE"}
|
|
@@ -9,7 +9,8 @@ const {
|
|
|
9
9
|
createNewVersionOfSecretCmd
|
|
10
10
|
} = Secrets;
|
|
11
11
|
const program = new Command('frodo esv secret version create');
|
|
12
|
-
program.description('Create new version of secret.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('--value <value>', 'Secret value.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
12
|
+
program.description('Create new version of secret.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('--value <value>', 'Secret value.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
13
|
+
// implement command logic inside action handler
|
|
13
14
|
async (host, realm, user, password, options) => {
|
|
14
15
|
state.default.session.setTenant(host);
|
|
15
16
|
state.default.session.setRealm(realm);
|
|
@@ -17,12 +18,13 @@ async (host, realm, user, password, options) => {
|
|
|
17
18
|
state.default.session.setPassword(password);
|
|
18
19
|
state.default.session.setDeploymentType(options.type);
|
|
19
20
|
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
20
|
-
|
|
21
21
|
if (await getTokens()) {
|
|
22
22
|
printMessage('Creating new version of secret...');
|
|
23
23
|
createNewVersionOfSecretCmd(options.secretId, options.value);
|
|
24
24
|
}
|
|
25
|
-
}
|
|
25
|
+
}
|
|
26
|
+
// end command logic inside action handler
|
|
26
27
|
);
|
|
28
|
+
|
|
27
29
|
program.parse();
|
|
28
30
|
//# sourceMappingURL=esv-secret-version-create.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret-version-create.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","createNewVersionOfSecretCmd","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","value","parse"],"sources":["cli/esv/esv-secret-version-create.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { createNewVersionOfSecretCmd } = Secrets;\n\nconst program = new Command('frodo esv secret version create');\n\nprogram\n .description('Create new version of secret.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('--value <value>', 'Secret value.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Creating new version of secret...');\n createNewVersionOfSecretCmd(options.secretId, options.value);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret-version-create.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","createNewVersionOfSecretCmd","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","value","parse"],"sources":["cli/esv/esv-secret-version-create.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { createNewVersionOfSecretCmd } = Secrets;\n\nconst program = new Command('frodo esv secret version create');\n\nprogram\n .description('Create new version of secret.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('--value <value>', 'Secret value.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Creating new version of secret...');\n createNewVersionOfSecretCmd(options.secretId, options.value);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,QAAQ,wBAAwB;AAErD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAA4B,CAAC,GAAGL,OAAO;AAE/C,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,iCAAiC,CAAC;AAE9DS,OAAO,CACJC,WAAW,CAAC,+BAA+B,CAAC,CAC5CC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CAAC,IAAIjB,MAAM,CAAC,6BAA6B,EAAE,YAAY,CAAC,CAAC,CAClEiB,SAAS,CAAC,IAAIjB,MAAM,CAAC,iBAAiB,EAAE,eAAe,CAAC,CAAC,CACzDiB,SAAS,CACR,IAAIjB,MAAM,CACR,WAAW,EACX,kGAAkG,CACnG,CAACoB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CACxB,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CvB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACC,SAAS,CAACN,IAAI,CAAC;EACrCnB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACE,QAAQ,CAACN,KAAK,CAAC;EACrCpB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACG,WAAW,CAACN,IAAI,CAAC;EACvCrB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACI,WAAW,CAACN,QAAQ,CAAC;EAC3CtB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACK,iBAAiB,CAACN,OAAO,CAACO,IAAI,CAAC;EACrD9B,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACO,0BAA0B,CAACR,OAAO,CAACS,QAAQ,CAAC;EAClE,IAAI,MAAM7B,SAAS,EAAE,EAAE;IACrBD,YAAY,CAAC,mCAAmC,CAAC;IACjDE,2BAA2B,CAACmB,OAAO,CAACU,QAAQ,EAAEV,OAAO,CAACW,KAAK,CAAC;EAC9D;AACF;AACA;AAAA,CACD;;AAEH7B,OAAO,CAAC8B,KAAK,EAAE"}
|
|
@@ -9,7 +9,8 @@ const {
|
|
|
9
9
|
deactivateVersionOfSecret
|
|
10
10
|
} = Secrets;
|
|
11
11
|
const program = new Command('frodo esv secret version deactivate');
|
|
12
|
-
program.description('Deactivate versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
12
|
+
program.description('Deactivate versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
13
|
+
// implement command logic inside action handler
|
|
13
14
|
async (host, realm, user, password, options) => {
|
|
14
15
|
state.default.session.setTenant(host);
|
|
15
16
|
state.default.session.setRealm(realm);
|
|
@@ -17,19 +18,21 @@ async (host, realm, user, password, options) => {
|
|
|
17
18
|
state.default.session.setPassword(password);
|
|
18
19
|
state.default.session.setDeploymentType(options.type);
|
|
19
20
|
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
20
|
-
|
|
21
21
|
if (await getTokens()) {
|
|
22
22
|
// activate by id
|
|
23
23
|
if (options.secretId && options.version) {
|
|
24
24
|
printMessage(`Deactivating version of secret...`);
|
|
25
25
|
deactivateVersionOfSecret(options.secretId, options.version);
|
|
26
|
-
}
|
|
26
|
+
}
|
|
27
|
+
// unrecognized combination of options or no options
|
|
27
28
|
else {
|
|
28
29
|
printMessage('Unrecognized combination of options or no options...');
|
|
29
30
|
program.help();
|
|
30
31
|
}
|
|
31
32
|
}
|
|
32
|
-
}
|
|
33
|
+
}
|
|
34
|
+
// end command logic inside action handler
|
|
33
35
|
);
|
|
36
|
+
|
|
34
37
|
program.parse();
|
|
35
38
|
//# sourceMappingURL=esv-secret-version-deactivate.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret-version-deactivate.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","deactivateVersionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-deactivate.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { deactivateVersionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret version deactivate');\n\nprogram\n .description('Deactivate versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // activate by id\n if (options.secretId && options.version) {\n printMessage(`Deactivating version of secret...`);\n deactivateVersionOfSecret(options.secretId, options.version);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret-version-deactivate.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","deactivateVersionOfSecret","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-deactivate.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { deactivateVersionOfSecret } = Secrets;\n\nconst program = new Command('frodo esv secret version deactivate');\n\nprogram\n .description('Deactivate versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // activate by id\n if (options.secretId && options.version) {\n printMessage(`Deactivating version of secret...`);\n deactivateVersionOfSecret(options.secretId, options.version);\n }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,QAAQ,wBAAwB;AAErD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAA0B,CAAC,GAAGL,OAAO;AAE7C,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,qCAAqC,CAAC;AAElES,OAAO,CACJC,WAAW,CAAC,iCAAiC,CAAC,CAC9CC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CAAC,IAAIjB,MAAM,CAAC,6BAA6B,EAAE,YAAY,CAAC,CAAC,CAClEiB,SAAS,CAAC,IAAIjB,MAAM,CAAC,yBAAyB,EAAE,oBAAoB,CAAC,CAAC,CACtEiB,SAAS,CACR,IAAIjB,MAAM,CACR,WAAW,EACX,kGAAkG,CACnG,CAACoB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CACxB,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CvB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACC,SAAS,CAACN,IAAI,CAAC;EACrCnB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACE,QAAQ,CAACN,KAAK,CAAC;EACrCpB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACG,WAAW,CAACN,IAAI,CAAC;EACvCrB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACI,WAAW,CAACN,QAAQ,CAAC;EAC3CtB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACK,iBAAiB,CAACN,OAAO,CAACO,IAAI,CAAC;EACrD9B,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACO,0BAA0B,CAACR,OAAO,CAACS,QAAQ,CAAC;EAClE,IAAI,MAAM7B,SAAS,EAAE,EAAE;IACrB;IACA,IAAIoB,OAAO,CAACU,QAAQ,IAAIV,OAAO,CAACW,OAAO,EAAE;MACvChC,YAAY,CAAE,mCAAkC,CAAC;MACjDE,yBAAyB,CAACmB,OAAO,CAACU,QAAQ,EAAEV,OAAO,CAACW,OAAO,CAAC;IAC9D;IACA;IAAA,KACK;MACHhC,YAAY,CAAC,sDAAsD,CAAC;MACpEG,OAAO,CAAC8B,IAAI,EAAE;IAChB;EACF;AACF;AACA;AAAA,CACD;;AAEH9B,OAAO,CAAC+B,KAAK,EAAE"}
|
|
@@ -9,7 +9,8 @@ const {
|
|
|
9
9
|
deleteVersionOfSecretCmd
|
|
10
10
|
} = Secrets;
|
|
11
11
|
const program = new Command('frodo esv secret version delete');
|
|
12
|
-
program.description('Delete versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id. If specified, -a is ignored.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('-a, --all', 'Delete all secrets in a realm. Ignored with -i.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
12
|
+
program.description('Delete versions of secrets.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id. If specified, -a is ignored.')).addOption(new Option('-v, --version <version>', 'Version of secret.')).addOption(new Option('-a, --all', 'Delete all secrets in a realm. Ignored with -i.')).addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
13
|
+
// implement command logic inside action handler
|
|
13
14
|
async (host, realm, user, password, options) => {
|
|
14
15
|
state.default.session.setTenant(host);
|
|
15
16
|
state.default.session.setRealm(realm);
|
|
@@ -17,13 +18,13 @@ async (host, realm, user, password, options) => {
|
|
|
17
18
|
state.default.session.setPassword(password);
|
|
18
19
|
state.default.session.setDeploymentType(options.type);
|
|
19
20
|
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
20
|
-
|
|
21
21
|
if (await getTokens()) {
|
|
22
22
|
// delete by id
|
|
23
23
|
if (options.secretId && options.version) {
|
|
24
24
|
printMessage(`Deleting version of secret...`);
|
|
25
25
|
deleteVersionOfSecretCmd(options.secretId, options.version);
|
|
26
|
-
}
|
|
26
|
+
}
|
|
27
|
+
// --all -a
|
|
27
28
|
// else if (options.all) {
|
|
28
29
|
// printMessage('Deleting all versions...');
|
|
29
30
|
// deleteJourneys(options);
|
|
@@ -34,7 +35,9 @@ async (host, realm, user, password, options) => {
|
|
|
34
35
|
program.help();
|
|
35
36
|
}
|
|
36
37
|
}
|
|
37
|
-
}
|
|
38
|
+
}
|
|
39
|
+
// end command logic inside action handler
|
|
38
40
|
);
|
|
41
|
+
|
|
39
42
|
program.parse();
|
|
40
43
|
//# sourceMappingURL=esv-secret-version-delete.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret-version-delete.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","deleteVersionOfSecretCmd","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-delete.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { deleteVersionOfSecretCmd } = Secrets;\n\nconst program = new Command('frodo esv secret version delete');\n\nprogram\n .description('Delete versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --secret-id <secret-id>',\n 'Secret id. If specified, -a is ignored.'\n )\n )\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .addOption(\n new Option('-a, --all', 'Delete all secrets in a realm. Ignored with -i.')\n )\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // delete by id\n if (options.secretId && options.version) {\n printMessage(`Deleting version of secret...`);\n deleteVersionOfSecretCmd(options.secretId, options.version);\n }\n // --all -a\n // else if (options.all) {\n // printMessage('Deleting all versions...');\n // deleteJourneys(options);\n // }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret-version-delete.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","deleteVersionOfSecretCmd","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","version","help","parse"],"sources":["cli/esv/esv-secret-version-delete.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { deleteVersionOfSecretCmd } = Secrets;\n\nconst program = new Command('frodo esv secret version delete');\n\nprogram\n .description('Delete versions of secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(\n new Option(\n '-i, --secret-id <secret-id>',\n 'Secret id. If specified, -a is ignored.'\n )\n )\n .addOption(new Option('-v, --version <version>', 'Version of secret.'))\n .addOption(\n new Option('-a, --all', 'Delete all secrets in a realm. Ignored with -i.')\n )\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n // delete by id\n if (options.secretId && options.version) {\n printMessage(`Deleting version of secret...`);\n deleteVersionOfSecretCmd(options.secretId, options.version);\n }\n // --all -a\n // else if (options.all) {\n // printMessage('Deleting all versions...');\n // deleteJourneys(options);\n // }\n // unrecognized combination of options or no options\n else {\n printMessage('Unrecognized combination of options or no options...');\n program.help();\n }\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,QAAQ,wBAAwB;AAErD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAAyB,CAAC,GAAGL,OAAO;AAE5C,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,iCAAiC,CAAC;AAE9DS,OAAO,CACJC,WAAW,CAAC,6BAA6B,CAAC,CAC1CC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CACR,IAAIjB,MAAM,CACR,6BAA6B,EAC7B,yCAAyC,CAC1C,CACF,CACAiB,SAAS,CAAC,IAAIjB,MAAM,CAAC,yBAAyB,EAAE,oBAAoB,CAAC,CAAC,CACtEiB,SAAS,CACR,IAAIjB,MAAM,CAAC,WAAW,EAAE,iDAAiD,CAAC,CAC3E,CACAiB,SAAS,CACR,IAAIjB,MAAM,CACR,WAAW,EACX,kGAAkG,CACnG,CAACoB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CACxB,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CvB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACC,SAAS,CAACN,IAAI,CAAC;EACrCnB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACE,QAAQ,CAACN,KAAK,CAAC;EACrCpB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACG,WAAW,CAACN,IAAI,CAAC;EACvCrB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACI,WAAW,CAACN,QAAQ,CAAC;EAC3CtB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACK,iBAAiB,CAACN,OAAO,CAACO,IAAI,CAAC;EACrD9B,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACO,0BAA0B,CAACR,OAAO,CAACS,QAAQ,CAAC;EAClE,IAAI,MAAM7B,SAAS,EAAE,EAAE;IACrB;IACA,IAAIoB,OAAO,CAACU,QAAQ,IAAIV,OAAO,CAACW,OAAO,EAAE;MACvChC,YAAY,CAAE,+BAA8B,CAAC;MAC7CE,wBAAwB,CAACmB,OAAO,CAACU,QAAQ,EAAEV,OAAO,CAACW,OAAO,CAAC;IAC7D;IACA;IACA;IACA;IACA;IACA;IACA;IAAA,KACK;MACHhC,YAAY,CAAC,sDAAsD,CAAC;MACpEG,OAAO,CAAC8B,IAAI,EAAE;IAChB;EACF;AACF;AACA;AAAA,CACD;;AAEH9B,OAAO,CAAC+B,KAAK,EAAE"}
|
|
@@ -9,7 +9,8 @@ const {
|
|
|
9
9
|
listSecretVersionsCmd
|
|
10
10
|
} = Secrets;
|
|
11
11
|
const program = new Command('frodo esv secret version list');
|
|
12
|
-
program.description('List versions of secret.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-l, --long', 'Long with all fields.').default(false, 'false')).action(
|
|
12
|
+
program.description('List versions of secret.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.')).addOption(new Option('-l, --long', 'Long with all fields.').default(false, 'false')).action(
|
|
13
|
+
// implement command logic inside action handler
|
|
13
14
|
async (host, realm, user, password, options) => {
|
|
14
15
|
state.default.session.setTenant(host);
|
|
15
16
|
state.default.session.setRealm(realm);
|
|
@@ -17,12 +18,13 @@ async (host, realm, user, password, options) => {
|
|
|
17
18
|
state.default.session.setPassword(password);
|
|
18
19
|
state.default.session.setDeploymentType(options.type);
|
|
19
20
|
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
20
|
-
|
|
21
21
|
if (await getTokens()) {
|
|
22
22
|
printMessage('Listing versions...');
|
|
23
23
|
listSecretVersionsCmd(options.secretId);
|
|
24
24
|
}
|
|
25
|
-
}
|
|
25
|
+
}
|
|
26
|
+
// end command logic inside action handler
|
|
26
27
|
);
|
|
28
|
+
|
|
27
29
|
program.parse();
|
|
28
30
|
//# sourceMappingURL=esv-secret-version-list.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret-version-list.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","listSecretVersionsCmd","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","parse"],"sources":["cli/esv/esv-secret-version-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { listSecretVersionsCmd } = Secrets;\n\nconst program = new Command('frodo esv secret version list');\n\nprogram\n .description('List versions of secret.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Listing versions...');\n listSecretVersionsCmd(options.secretId);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret-version-list.js","names":["Command","Option","Authenticate","Secrets","state","common","printMessage","getTokens","listSecretVersionsCmd","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","secretId","parse"],"sources":["cli/esv/esv-secret-version-list.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Secrets, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { listSecretVersionsCmd } = Secrets;\n\nconst program = new Command('frodo esv secret version list');\n\nprogram\n .description('List versions of secret.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .addOption(new Option('-i, --secret-id <secret-id>', 'Secret id.'))\n .addOption(\n new Option('-l, --long', 'Long with all fields.').default(false, 'false')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Listing versions...');\n listSecretVersionsCmd(options.secretId);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,OAAO,EAAEC,KAAK,QAAQ,uBAAuB;AACpE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,QAAQ,wBAAwB;AAErD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAAsB,CAAC,GAAGL,OAAO;AAEzC,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,+BAA+B,CAAC;AAE5DS,OAAO,CACJC,WAAW,CAAC,0BAA0B,CAAC,CACvCC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCF,SAAS,CAAC,IAAIjB,MAAM,CAAC,6BAA6B,EAAE,YAAY,CAAC,CAAC,CAClEiB,SAAS,CACR,IAAIjB,MAAM,CAAC,YAAY,EAAE,uBAAuB,CAAC,CAACoB,OAAO,CAAC,KAAK,EAAE,OAAO,CAAC,CAC1E,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CvB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACC,SAAS,CAACN,IAAI,CAAC;EACrCnB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACE,QAAQ,CAACN,KAAK,CAAC;EACrCpB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACG,WAAW,CAACN,IAAI,CAAC;EACvCrB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACI,WAAW,CAACN,QAAQ,CAAC;EAC3CtB,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACK,iBAAiB,CAACN,OAAO,CAACO,IAAI,CAAC;EACrD9B,KAAK,CAACiB,OAAO,CAACO,OAAO,CAACO,0BAA0B,CAACR,OAAO,CAACS,QAAQ,CAAC;EAClE,IAAI,MAAM7B,SAAS,EAAE,EAAE;IACrBD,YAAY,CAAC,qBAAqB,CAAC;IACnCE,qBAAqB,CAACmB,OAAO,CAACU,QAAQ,CAAC;EACzC;AACF;AACA;AAAA,CACD;;AAEH5B,OAAO,CAAC6B,KAAK,EAAE"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret-version.js","names":["Command","program","description","helpOption","showHelpAfterError","command","parse"],"sources":["cli/esv/esv-secret-version.ts"],"sourcesContent":["import { Command } from 'commander';\n\nconst program = new Command('frodo esv secret version');\n\nprogram\n .description('Manage secret versions.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError();\n\nprogram.command('activate', 'Activate version.').showHelpAfterError();\n\nprogram.command('create', 'Create new version.').showHelpAfterError();\n\nprogram.command('deactivate', 'Deactivate version.').showHelpAfterError();\n\nprogram.command('delete', 'Delete version.').showHelpAfterError();\n\nprogram.command('list', 'List versions.').showHelpAfterError();\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret-version.js","names":["Command","program","description","helpOption","showHelpAfterError","command","parse"],"sources":["cli/esv/esv-secret-version.ts"],"sourcesContent":["import { Command } from 'commander';\n\nconst program = new Command('frodo esv secret version');\n\nprogram\n .description('Manage secret versions.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError();\n\nprogram.command('activate', 'Activate version.').showHelpAfterError();\n\nprogram.command('create', 'Create new version.').showHelpAfterError();\n\nprogram.command('deactivate', 'Deactivate version.').showHelpAfterError();\n\nprogram.command('delete', 'Delete version.').showHelpAfterError();\n\nprogram.command('list', 'List versions.').showHelpAfterError();\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,QAAQ,WAAW;AAEnC,MAAMC,OAAO,GAAG,IAAID,OAAO,CAAC,0BAA0B,CAAC;AAEvDC,OAAO,CACJC,WAAW,CAAC,yBAAyB,CAAC,CACtCC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE;AAEvBH,OAAO,CAACI,OAAO,CAAC,UAAU,EAAE,mBAAmB,CAAC,CAACD,kBAAkB,EAAE;AAErEH,OAAO,CAACI,OAAO,CAAC,QAAQ,EAAE,qBAAqB,CAAC,CAACD,kBAAkB,EAAE;AAErEH,OAAO,CAACI,OAAO,CAAC,YAAY,EAAE,qBAAqB,CAAC,CAACD,kBAAkB,EAAE;AAEzEH,OAAO,CAACI,OAAO,CAAC,QAAQ,EAAE,iBAAiB,CAAC,CAACD,kBAAkB,EAAE;AAEjEH,OAAO,CAACI,OAAO,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAACD,kBAAkB,EAAE;AAE9DH,OAAO,CAACK,KAAK,EAAE"}
|
|
@@ -3,7 +3,10 @@ const program = new Command('frodo esv secret');
|
|
|
3
3
|
program.description('Manages secrets.').helpOption('-h, --help', 'Help').showHelpAfterError();
|
|
4
4
|
program.command('create', 'Create secrets.').showHelpAfterError();
|
|
5
5
|
program.command('delete', 'Delete secrets.').showHelpAfterError();
|
|
6
|
-
program.command('describe', 'Describe secret.').showHelpAfterError();
|
|
6
|
+
program.command('describe', 'Describe secret.').showHelpAfterError();
|
|
7
|
+
|
|
8
|
+
// program.command('export', 'Export secrets.').showHelpAfterError();
|
|
9
|
+
|
|
7
10
|
// program.command('import', 'Import secrets.').showHelpAfterError();
|
|
8
11
|
|
|
9
12
|
program.command('list', 'List secrets.').showHelpAfterError();
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-secret.js","names":["Command","program","description","helpOption","showHelpAfterError","command","parse"],"sources":["cli/esv/esv-secret.ts"],"sourcesContent":["import { Command } from 'commander';\n\nconst program = new Command('frodo esv secret');\n\nprogram\n .description('Manages secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError();\n\nprogram.command('create', 'Create secrets.').showHelpAfterError();\n\nprogram.command('delete', 'Delete secrets.').showHelpAfterError();\n\nprogram.command('describe', 'Describe secret.').showHelpAfterError();\n\n// program.command('export', 'Export secrets.').showHelpAfterError();\n\n// program.command('import', 'Import secrets.').showHelpAfterError();\n\nprogram.command('list', 'List secrets.').showHelpAfterError();\n\nprogram.command('set', 'Set secret descriptions.').showHelpAfterError();\n\nprogram.command('version', 'Manage secret versions.').showHelpAfterError();\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-secret.js","names":["Command","program","description","helpOption","showHelpAfterError","command","parse"],"sources":["cli/esv/esv-secret.ts"],"sourcesContent":["import { Command } from 'commander';\n\nconst program = new Command('frodo esv secret');\n\nprogram\n .description('Manages secrets.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError();\n\nprogram.command('create', 'Create secrets.').showHelpAfterError();\n\nprogram.command('delete', 'Delete secrets.').showHelpAfterError();\n\nprogram.command('describe', 'Describe secret.').showHelpAfterError();\n\n// program.command('export', 'Export secrets.').showHelpAfterError();\n\n// program.command('import', 'Import secrets.').showHelpAfterError();\n\nprogram.command('list', 'List secrets.').showHelpAfterError();\n\nprogram.command('set', 'Set secret descriptions.').showHelpAfterError();\n\nprogram.command('version', 'Manage secret versions.').showHelpAfterError();\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,QAAQ,WAAW;AAEnC,MAAMC,OAAO,GAAG,IAAID,OAAO,CAAC,kBAAkB,CAAC;AAE/CC,OAAO,CACJC,WAAW,CAAC,kBAAkB,CAAC,CAC/BC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE;AAEvBH,OAAO,CAACI,OAAO,CAAC,QAAQ,EAAE,iBAAiB,CAAC,CAACD,kBAAkB,EAAE;AAEjEH,OAAO,CAACI,OAAO,CAAC,QAAQ,EAAE,iBAAiB,CAAC,CAACD,kBAAkB,EAAE;AAEjEH,OAAO,CAACI,OAAO,CAAC,UAAU,EAAE,kBAAkB,CAAC,CAACD,kBAAkB,EAAE;;AAEpE;;AAEA;;AAEAH,OAAO,CAACI,OAAO,CAAC,MAAM,EAAE,eAAe,CAAC,CAACD,kBAAkB,EAAE;AAE7DH,OAAO,CAACI,OAAO,CAAC,KAAK,EAAE,0BAA0B,CAAC,CAACD,kBAAkB,EAAE;AAEvEH,OAAO,CAACI,OAAO,CAAC,SAAS,EAAE,yBAAyB,CAAC,CAACD,kBAAkB,EAAE;AAE1EH,OAAO,CAACK,KAAK,EAAE"}
|
|
@@ -9,7 +9,8 @@ const {
|
|
|
9
9
|
createVariable
|
|
10
10
|
} = Variables;
|
|
11
11
|
const program = new Command('frodo esv variable create');
|
|
12
|
-
program.description('Create variables.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).requiredOption('-i, --variable-id <variable-id>', 'Variable id.').requiredOption('--value <value>', 'Secret value.').option('--description [description]', 'Secret description.').addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
12
|
+
program.description('Create variables.').helpOption('-h, --help', 'Help').showHelpAfterError().addArgument(common.hostArgumentM).addArgument(common.realmArgument).addArgument(common.userArgument).addArgument(common.passwordArgument).addOption(common.deploymentOption).addOption(common.insecureOption).requiredOption('-i, --variable-id <variable-id>', 'Variable id.').requiredOption('--value <value>', 'Secret value.').option('--description [description]', 'Secret description.').addOption(new Option('--verbose', 'Verbose output during command execution. If specified, may or may not produce additional output.').default(false, 'off')).action(
|
|
13
|
+
// implement command logic inside action handler
|
|
13
14
|
async (host, realm, user, password, options) => {
|
|
14
15
|
state.default.session.setTenant(host);
|
|
15
16
|
state.default.session.setRealm(realm);
|
|
@@ -17,12 +18,13 @@ async (host, realm, user, password, options) => {
|
|
|
17
18
|
state.default.session.setPassword(password);
|
|
18
19
|
state.default.session.setDeploymentType(options.type);
|
|
19
20
|
state.default.session.setAllowInsecureConnection(options.insecure);
|
|
20
|
-
|
|
21
21
|
if (await getTokens()) {
|
|
22
22
|
printMessage('Creating variable...');
|
|
23
23
|
createVariable(options.variableId, options.value, options.description);
|
|
24
24
|
}
|
|
25
|
-
}
|
|
25
|
+
}
|
|
26
|
+
// end command logic inside action handler
|
|
26
27
|
);
|
|
28
|
+
|
|
27
29
|
program.parse();
|
|
28
30
|
//# sourceMappingURL=esv-variable-create.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"esv-variable-create.js","names":["Command","Option","Authenticate","Variables","state","common","printMessage","getTokens","createVariable","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","requiredOption","option","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","variableId","value","parse"],"sources":["cli/esv/esv-variable-create.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Variables, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { createVariable } = Variables;\n\nconst program = new Command('frodo esv variable create');\n\nprogram\n .description('Create variables.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .requiredOption('-i, --variable-id <variable-id>', 'Variable id.')\n .requiredOption('--value <value>', 'Secret value.')\n .option('--description [description]', 'Secret description.')\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Creating variable...');\n createVariable(options.variableId, options.value, options.description);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,
|
|
1
|
+
{"version":3,"file":"esv-variable-create.js","names":["Command","Option","Authenticate","Variables","state","common","printMessage","getTokens","createVariable","program","description","helpOption","showHelpAfterError","addArgument","hostArgumentM","realmArgument","userArgument","passwordArgument","addOption","deploymentOption","insecureOption","requiredOption","option","default","action","host","realm","user","password","options","session","setTenant","setRealm","setUsername","setPassword","setDeploymentType","type","setAllowInsecureConnection","insecure","variableId","value","parse"],"sources":["cli/esv/esv-variable-create.ts"],"sourcesContent":["import { Command, Option } from 'commander';\nimport { Authenticate, Variables, state } from '@rockcarver/frodo-lib';\nimport * as common from '../cmd_common.js';\nimport { printMessage } from '../../utils/Console.js';\n\nconst { getTokens } = Authenticate;\nconst { createVariable } = Variables;\n\nconst program = new Command('frodo esv variable create');\n\nprogram\n .description('Create variables.')\n .helpOption('-h, --help', 'Help')\n .showHelpAfterError()\n .addArgument(common.hostArgumentM)\n .addArgument(common.realmArgument)\n .addArgument(common.userArgument)\n .addArgument(common.passwordArgument)\n .addOption(common.deploymentOption)\n .addOption(common.insecureOption)\n .requiredOption('-i, --variable-id <variable-id>', 'Variable id.')\n .requiredOption('--value <value>', 'Secret value.')\n .option('--description [description]', 'Secret description.')\n .addOption(\n new Option(\n '--verbose',\n 'Verbose output during command execution. If specified, may or may not produce additional output.'\n ).default(false, 'off')\n )\n .action(\n // implement command logic inside action handler\n async (host, realm, user, password, options) => {\n state.default.session.setTenant(host);\n state.default.session.setRealm(realm);\n state.default.session.setUsername(user);\n state.default.session.setPassword(password);\n state.default.session.setDeploymentType(options.type);\n state.default.session.setAllowInsecureConnection(options.insecure);\n if (await getTokens()) {\n printMessage('Creating variable...');\n createVariable(options.variableId, options.value, options.description);\n }\n }\n // end command logic inside action handler\n );\n\nprogram.parse();\n"],"mappings":"AAAA,SAASA,OAAO,EAAEC,MAAM,QAAQ,WAAW;AAC3C,SAASC,YAAY,EAAEC,SAAS,EAAEC,KAAK,QAAQ,uBAAuB;AACtE,OAAO,KAAKC,MAAM,MAAM,kBAAkB;AAC1C,SAASC,YAAY,QAAQ,wBAAwB;AAErD,MAAM;EAAEC;AAAU,CAAC,GAAGL,YAAY;AAClC,MAAM;EAAEM;AAAe,CAAC,GAAGL,SAAS;AAEpC,MAAMM,OAAO,GAAG,IAAIT,OAAO,CAAC,2BAA2B,CAAC;AAExDS,OAAO,CACJC,WAAW,CAAC,mBAAmB,CAAC,CAChCC,UAAU,CAAC,YAAY,EAAE,MAAM,CAAC,CAChCC,kBAAkB,EAAE,CACpBC,WAAW,CAACR,MAAM,CAACS,aAAa,CAAC,CACjCD,WAAW,CAACR,MAAM,CAACU,aAAa,CAAC,CACjCF,WAAW,CAACR,MAAM,CAACW,YAAY,CAAC,CAChCH,WAAW,CAACR,MAAM,CAACY,gBAAgB,CAAC,CACpCC,SAAS,CAACb,MAAM,CAACc,gBAAgB,CAAC,CAClCD,SAAS,CAACb,MAAM,CAACe,cAAc,CAAC,CAChCC,cAAc,CAAC,iCAAiC,EAAE,cAAc,CAAC,CACjEA,cAAc,CAAC,iBAAiB,EAAE,eAAe,CAAC,CAClDC,MAAM,CAAC,6BAA6B,EAAE,qBAAqB,CAAC,CAC5DJ,SAAS,CACR,IAAIjB,MAAM,CACR,WAAW,EACX,kGAAkG,CACnG,CAACsB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CACxB,CACAC,MAAM;AACL;AACA,OAAOC,IAAI,EAAEC,KAAK,EAAEC,IAAI,EAAEC,QAAQ,EAAEC,OAAO,KAAK;EAC9CzB,KAAK,CAACmB,OAAO,CAACO,OAAO,CAACC,SAAS,CAACN,IAAI,CAAC;EACrCrB,KAAK,CAACmB,OAAO,CAACO,OAAO,CAACE,QAAQ,CAACN,KAAK,CAAC;EACrCtB,KAAK,CAACmB,OAAO,CAACO,OAAO,CAACG,WAAW,CAACN,IAAI,CAAC;EACvCvB,KAAK,CAACmB,OAAO,CAACO,OAAO,CAACI,WAAW,CAACN,QAAQ,CAAC;EAC3CxB,KAAK,CAACmB,OAAO,CAACO,OAAO,CAACK,iBAAiB,CAACN,OAAO,CAACO,IAAI,CAAC;EACrDhC,KAAK,CAACmB,OAAO,CAACO,OAAO,CAACO,0BAA0B,CAACR,OAAO,CAACS,QAAQ,CAAC;EAClE,IAAI,MAAM/B,SAAS,EAAE,EAAE;IACrBD,YAAY,CAAC,sBAAsB,CAAC;IACpCE,cAAc,CAACqB,OAAO,CAACU,UAAU,EAAEV,OAAO,CAACW,KAAK,EAAEX,OAAO,CAACnB,WAAW,CAAC;EACxE;AACF;AACA;AAAA,CACD;;AAEHD,OAAO,CAACgC,KAAK,EAAE"}
|