sfdx-hardis 6.9.1-alpha202510260151.0 → 6.9.1-alpha202510261251.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -132,13 +132,12 @@
132
132
  "clear:cache:hardis"
133
133
  ]
134
134
  },
135
- "hardis:auth:login": {
135
+ "hardis:config:get": {
136
136
  "aliases": [],
137
137
  "args": {},
138
- "description": "\n## Command Behavior\n\n**Authenticates to a Salesforce org, primarily designed for CI/CD workflows.**\n\nThis command facilitates secure and automated logins to Salesforce organizations within continuous integration and continuous delivery pipelines. It leverages pre-configured authentication details, ensuring that CI/CD processes can interact with Salesforce without manual intervention.\n\nKey aspects:\n\n- **Configuration-Driven:** It relies on authentication variables and files set up by dedicated configuration commands:\n - For CI/CD repositories: [Configure Org CI Authentication](https://sfdx-hardis.cloudity.com/hardis/project/configure/auth/)\n - For Monitoring repositories: [Configure Org Monitoring](https://sfdx-hardis.cloudity.com/hardis/org/configure/monitoring/)\n- **Technical Org Support:** Supports authentication to a 'technical org' (e.g., for calling Agentforce from another org) by utilizing the `SFDX_AUTH_URL_TECHNICAL_ORG` environment variable. If this variable is set, the command authenticates to this org with the alias `TECHNICAL_ORG`.\n\nTo obtain the `SFDX_AUTH_URL_TECHNICAL_ORG` value, you can run `sf org display --verbose --json` and copy the `sfdxAuthUrl` field from the output.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical flow involves:\n\n- **Flag Parsing:** It parses command-line flags such as `instanceurl`, `devhub`, `scratchorg`, and `debug` to determine the authentication context.\n- **Authentication Hook:** It triggers an internal authentication hook (`this.config.runHook('auth', ...`)) which is responsible for executing the actual authentication logic based on the provided flags (e.g., whether it's a Dev Hub or a scratch org).\n- **Environment Variable Check:** It checks for the presence of `SFDX_AUTH_URL_TECHNICAL_ORG` or `TECHNICAL_ORG_ALIAS` environment variables.\n- **`authOrg` Utility:** If a technical org is configured, it calls the `authOrg` utility function to perform the authentication for that specific org, ensuring it's connected and available for subsequent operations.\n- **Salesforce CLI Integration:** It integrates with the Salesforce CLI's authentication mechanisms to establish and manage org connections.\n</details>\n",
138
+ "description": "\n## Command Behavior\n\n**Retrieves and displays the sfdx-hardis configuration for a specified level.**\n\nThis command allows you to inspect the configuration that is currently in effect for your project, which is useful for debugging and understanding how sfdx-hardis will behave.\n\n- **Configuration levels:** It can retrieve configuration from three different levels:\n - **Project:** The configuration defined in the project's `.sfdx-hardis.yml` file.\n - **Branch:** The configuration defined in a branch-specific configuration file (e.g., `.sfdx-hardis.production.yml`).\n - **User:** The global user-level configuration.\n\n## Technical explanations\n\nThe command's logic is straightforward:\n\n- **`getConfig` function:** It calls the `getConfig` utility function, passing the desired configuration level as an argument.\n- **Configuration loading:** The `getConfig` function is responsible for finding the appropriate configuration file, reading its contents, and parsing it as YAML or JSON.\n- **Output:** The retrieved configuration is then displayed to the user as a JSON string.\n",
139
139
  "examples": [
140
- "$ sf hardis:auth:login",
141
- "CI=true CI_COMMIT_REF_NAME=monitoring_myclient sf hardis:auth:login"
140
+ "$ sf hardis:project:deploy:sources:metadata"
142
141
  ],
143
142
  "flags": {
144
143
  "json": {
@@ -156,28 +155,20 @@
156
155
  "multiple": false,
157
156
  "type": "option"
158
157
  },
159
- "instanceurl": {
160
- "char": "r",
161
- "description": "URL of org instance",
162
- "name": "instanceurl",
158
+ "level": {
159
+ "char": "l",
160
+ "description": "project,branch or user",
161
+ "name": "level",
162
+ "default": "project",
163
163
  "hasDynamicHelp": false,
164
164
  "multiple": false,
165
+ "options": [
166
+ "project",
167
+ "branch",
168
+ "user"
169
+ ],
165
170
  "type": "option"
166
171
  },
167
- "devhub": {
168
- "char": "h",
169
- "description": "Also connect associated DevHub",
170
- "name": "devhub",
171
- "allowNo": false,
172
- "type": "boolean"
173
- },
174
- "scratchorg": {
175
- "char": "s",
176
- "description": "Scratch org",
177
- "name": "scratchorg",
178
- "allowNo": false,
179
- "type": "boolean"
180
- },
181
172
  "debug": {
182
173
  "char": "d",
183
174
  "description": "Activate debug mode (more logs)",
@@ -201,38 +192,39 @@
201
192
  },
202
193
  "hasDynamicHelp": false,
203
194
  "hiddenAliases": [],
204
- "id": "hardis:auth:login",
195
+ "id": "hardis:config:get",
205
196
  "pluginAlias": "sfdx-hardis",
206
197
  "pluginName": "sfdx-hardis",
207
198
  "pluginType": "core",
208
199
  "strict": true,
209
200
  "enableJsonFlag": true,
210
- "title": "Login",
201
+ "title": "Deploy metadata sources to org",
211
202
  "requiresProject": false,
212
203
  "isESM": true,
213
204
  "relativePath": [
214
205
  "lib",
215
206
  "commands",
216
207
  "hardis",
217
- "auth",
218
- "login.js"
208
+ "config",
209
+ "get.js"
219
210
  ],
220
211
  "aliasPermutations": [],
221
212
  "permutations": [
222
- "hardis:auth:login",
223
- "auth:hardis:login",
224
- "auth:login:hardis",
225
- "hardis:login:auth",
226
- "login:hardis:auth",
227
- "login:auth:hardis"
213
+ "hardis:config:get",
214
+ "config:hardis:get",
215
+ "config:get:hardis",
216
+ "hardis:get:config",
217
+ "get:hardis:config",
218
+ "get:config:hardis"
228
219
  ]
229
220
  },
230
- "hardis:config:get": {
221
+ "hardis:auth:login": {
231
222
  "aliases": [],
232
223
  "args": {},
233
- "description": "\n## Command Behavior\n\n**Retrieves and displays the sfdx-hardis configuration for a specified level.**\n\nThis command allows you to inspect the configuration that is currently in effect for your project, which is useful for debugging and understanding how sfdx-hardis will behave.\n\n- **Configuration levels:** It can retrieve configuration from three different levels:\n - **Project:** The configuration defined in the project's `.sfdx-hardis.yml` file.\n - **Branch:** The configuration defined in a branch-specific configuration file (e.g., `.sfdx-hardis.production.yml`).\n - **User:** The global user-level configuration.\n\n## Technical explanations\n\nThe command's logic is straightforward:\n\n- **`getConfig` function:** It calls the `getConfig` utility function, passing the desired configuration level as an argument.\n- **Configuration loading:** The `getConfig` function is responsible for finding the appropriate configuration file, reading its contents, and parsing it as YAML or JSON.\n- **Output:** The retrieved configuration is then displayed to the user as a JSON string.\n",
224
+ "description": "\n## Command Behavior\n\n**Authenticates to a Salesforce org, primarily designed for CI/CD workflows.**\n\nThis command facilitates secure and automated logins to Salesforce organizations within continuous integration and continuous delivery pipelines. It leverages pre-configured authentication details, ensuring that CI/CD processes can interact with Salesforce without manual intervention.\n\nKey aspects:\n\n- **Configuration-Driven:** It relies on authentication variables and files set up by dedicated configuration commands:\n - For CI/CD repositories: [Configure Org CI Authentication](https://sfdx-hardis.cloudity.com/hardis/project/configure/auth/)\n - For Monitoring repositories: [Configure Org Monitoring](https://sfdx-hardis.cloudity.com/hardis/org/configure/monitoring/)\n- **Technical Org Support:** Supports authentication to a 'technical org' (e.g., for calling Agentforce from another org) by utilizing the `SFDX_AUTH_URL_TECHNICAL_ORG` environment variable. If this variable is set, the command authenticates to this org with the alias `TECHNICAL_ORG`.\n\nTo obtain the `SFDX_AUTH_URL_TECHNICAL_ORG` value, you can run `sf org display --verbose --json` and copy the `sfdxAuthUrl` field from the output.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical flow involves:\n\n- **Flag Parsing:** It parses command-line flags such as `instanceurl`, `devhub`, `scratchorg`, and `debug` to determine the authentication context.\n- **Authentication Hook:** It triggers an internal authentication hook (`this.config.runHook('auth', ...`)) which is responsible for executing the actual authentication logic based on the provided flags (e.g., whether it's a Dev Hub or a scratch org).\n- **Environment Variable Check:** It checks for the presence of `SFDX_AUTH_URL_TECHNICAL_ORG` or `TECHNICAL_ORG_ALIAS` environment variables.\n- **`authOrg` Utility:** If a technical org is configured, it calls the `authOrg` utility function to perform the authentication for that specific org, ensuring it's connected and available for subsequent operations.\n- **Salesforce CLI Integration:** It integrates with the Salesforce CLI's authentication mechanisms to establish and manage org connections.\n</details>\n",
234
225
  "examples": [
235
- "$ sf hardis:project:deploy:sources:metadata"
226
+ "$ sf hardis:auth:login",
227
+ "CI=true CI_COMMIT_REF_NAME=monitoring_myclient sf hardis:auth:login"
236
228
  ],
237
229
  "flags": {
238
230
  "json": {
@@ -250,20 +242,28 @@
250
242
  "multiple": false,
251
243
  "type": "option"
252
244
  },
253
- "level": {
254
- "char": "l",
255
- "description": "project,branch or user",
256
- "name": "level",
257
- "default": "project",
245
+ "instanceurl": {
246
+ "char": "r",
247
+ "description": "URL of org instance",
248
+ "name": "instanceurl",
258
249
  "hasDynamicHelp": false,
259
250
  "multiple": false,
260
- "options": [
261
- "project",
262
- "branch",
263
- "user"
264
- ],
265
251
  "type": "option"
266
252
  },
253
+ "devhub": {
254
+ "char": "h",
255
+ "description": "Also connect associated DevHub",
256
+ "name": "devhub",
257
+ "allowNo": false,
258
+ "type": "boolean"
259
+ },
260
+ "scratchorg": {
261
+ "char": "s",
262
+ "description": "Scratch org",
263
+ "name": "scratchorg",
264
+ "allowNo": false,
265
+ "type": "boolean"
266
+ },
267
267
  "debug": {
268
268
  "char": "d",
269
269
  "description": "Activate debug mode (more logs)",
@@ -287,30 +287,30 @@
287
287
  },
288
288
  "hasDynamicHelp": false,
289
289
  "hiddenAliases": [],
290
- "id": "hardis:config:get",
290
+ "id": "hardis:auth:login",
291
291
  "pluginAlias": "sfdx-hardis",
292
292
  "pluginName": "sfdx-hardis",
293
293
  "pluginType": "core",
294
294
  "strict": true,
295
295
  "enableJsonFlag": true,
296
- "title": "Deploy metadata sources to org",
296
+ "title": "Login",
297
297
  "requiresProject": false,
298
298
  "isESM": true,
299
299
  "relativePath": [
300
300
  "lib",
301
301
  "commands",
302
302
  "hardis",
303
- "config",
304
- "get.js"
303
+ "auth",
304
+ "login.js"
305
305
  ],
306
306
  "aliasPermutations": [],
307
307
  "permutations": [
308
- "hardis:config:get",
309
- "config:hardis:get",
310
- "config:get:hardis",
311
- "hardis:get:config",
312
- "get:hardis:config",
313
- "get:config:hardis"
308
+ "hardis:auth:login",
309
+ "auth:hardis:login",
310
+ "auth:login:hardis",
311
+ "hardis:login:auth",
312
+ "login:hardis:auth",
313
+ "login:auth:hardis"
314
314
  ]
315
315
  },
316
316
  "hardis:doc:fieldusage": {
@@ -4422,6 +4422,135 @@
4422
4422
  "ws:work:hardis"
4423
4423
  ]
4424
4424
  },
4425
+ "hardis:git:pull-requests:extract": {
4426
+ "aliases": [],
4427
+ "args": {},
4428
+ "description": "\n## Command Behavior\n\n**Extracts pull request information from your Git server based on specified filtering criteria.**\n\nThis command provides a powerful way to query and retrieve details about pull requests (or merge requests, depending on your Git provider) in your repository. It's highly useful for reporting, auditing, and analyzing development workflows.\n\nKey functionalities include:\n\n- **Target Branch Filtering:** You can filter pull requests by their target branch using the `--target-branch` flag. If not specified, the command will prompt you to select one.\n- **Status Filtering:** Filter pull requests by their status: `open`, `merged`, or `abandoned` using the `--status` flag. An interactive prompt is provided if no status is specified.\n- **Minimum Date Filtering:** Use the `--min-date` flag to retrieve pull requests created or updated after a specific date.\n- **CSV Output:** The extracted pull request data is generated into a CSV file, which can be used for further analysis in spreadsheet software.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves interacting with a Git provider's API:\n\n- **Git Provider Abstraction:** It uses the `GitProvider.getInstance(true)` to abstract away the specifics of different Git platforms (e.g., GitHub, GitLab, Azure DevOps). This ensures the command can work across various environments.\n- **API Calls:** The `gitProvider.listPullRequests()` method is called with a `prConstraint` object that encapsulates the filtering criteria (target branch, minimum date, status).\n- **Interactive Prompts:** The `prompts` library is used to interactively gather input from the user for the target branch and pull request status if they are not provided as command-line flags.\n- **Date Handling:** The `moment` library is used to parse and handle date inputs for the `--min-date` flag.\n- **CSV Generation:** The `generateCsvFile` utility is responsible for converting the retrieved pull request data into a CSV format, and `generateReportPath` determines the output file location.\n- **Error Handling:** It includes error handling for cases where a Git provider cannot be identified.\n</details>\n",
4429
+ "examples": [
4430
+ "$ sf hardis:git:pull-requests:extract",
4431
+ "$ sf hardis:git:pull-requests:extract --target-branch main --status merged"
4432
+ ],
4433
+ "flags": {
4434
+ "json": {
4435
+ "description": "Format output as json.",
4436
+ "helpGroup": "GLOBAL",
4437
+ "name": "json",
4438
+ "allowNo": false,
4439
+ "type": "boolean"
4440
+ },
4441
+ "flags-dir": {
4442
+ "helpGroup": "GLOBAL",
4443
+ "name": "flags-dir",
4444
+ "summary": "Import flag values from a directory.",
4445
+ "hasDynamicHelp": false,
4446
+ "multiple": false,
4447
+ "type": "option"
4448
+ },
4449
+ "target-branch": {
4450
+ "char": "t",
4451
+ "description": "Target branch of PRs",
4452
+ "name": "target-branch",
4453
+ "hasDynamicHelp": false,
4454
+ "multiple": false,
4455
+ "type": "option"
4456
+ },
4457
+ "status": {
4458
+ "char": "x",
4459
+ "description": "Status of the PR",
4460
+ "name": "status",
4461
+ "hasDynamicHelp": false,
4462
+ "multiple": false,
4463
+ "options": [
4464
+ "open",
4465
+ "merged",
4466
+ "abandoned"
4467
+ ],
4468
+ "type": "option"
4469
+ },
4470
+ "min-date": {
4471
+ "char": "m",
4472
+ "description": "Minimum date for PR",
4473
+ "name": "min-date",
4474
+ "hasDynamicHelp": false,
4475
+ "multiple": false,
4476
+ "type": "option"
4477
+ },
4478
+ "outputfile": {
4479
+ "char": "f",
4480
+ "description": "Force the path and name of output report file. Must end with .csv",
4481
+ "name": "outputfile",
4482
+ "hasDynamicHelp": false,
4483
+ "multiple": false,
4484
+ "type": "option"
4485
+ },
4486
+ "debug": {
4487
+ "char": "d",
4488
+ "description": "Activate debug mode (more logs)",
4489
+ "name": "debug",
4490
+ "allowNo": false,
4491
+ "type": "boolean"
4492
+ },
4493
+ "websocket": {
4494
+ "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
4495
+ "name": "websocket",
4496
+ "hasDynamicHelp": false,
4497
+ "multiple": false,
4498
+ "type": "option"
4499
+ },
4500
+ "skipauth": {
4501
+ "description": "Skip authentication check when a default username is required",
4502
+ "name": "skipauth",
4503
+ "allowNo": false,
4504
+ "type": "boolean"
4505
+ }
4506
+ },
4507
+ "hasDynamicHelp": false,
4508
+ "hiddenAliases": [],
4509
+ "id": "hardis:git:pull-requests:extract",
4510
+ "pluginAlias": "sfdx-hardis",
4511
+ "pluginName": "sfdx-hardis",
4512
+ "pluginType": "core",
4513
+ "strict": true,
4514
+ "enableJsonFlag": true,
4515
+ "title": "Extract pull requests",
4516
+ "requiresProject": true,
4517
+ "isESM": true,
4518
+ "relativePath": [
4519
+ "lib",
4520
+ "commands",
4521
+ "hardis",
4522
+ "git",
4523
+ "pull-requests",
4524
+ "extract.js"
4525
+ ],
4526
+ "aliasPermutations": [],
4527
+ "permutations": [
4528
+ "hardis:git:pull-requests:extract",
4529
+ "git:hardis:pull-requests:extract",
4530
+ "git:pull-requests:hardis:extract",
4531
+ "git:pull-requests:extract:hardis",
4532
+ "hardis:pull-requests:git:extract",
4533
+ "pull-requests:hardis:git:extract",
4534
+ "pull-requests:git:hardis:extract",
4535
+ "pull-requests:git:extract:hardis",
4536
+ "hardis:pull-requests:extract:git",
4537
+ "pull-requests:hardis:extract:git",
4538
+ "pull-requests:extract:hardis:git",
4539
+ "pull-requests:extract:git:hardis",
4540
+ "hardis:git:extract:pull-requests",
4541
+ "git:hardis:extract:pull-requests",
4542
+ "git:extract:hardis:pull-requests",
4543
+ "git:extract:pull-requests:hardis",
4544
+ "hardis:extract:git:pull-requests",
4545
+ "extract:hardis:git:pull-requests",
4546
+ "extract:git:hardis:pull-requests",
4547
+ "extract:git:pull-requests:hardis",
4548
+ "hardis:extract:pull-requests:git",
4549
+ "extract:hardis:pull-requests:git",
4550
+ "extract:pull-requests:hardis:git",
4551
+ "extract:pull-requests:git:hardis"
4552
+ ]
4553
+ },
4425
4554
  "hardis:doc:extract:permsetgroups": {
4426
4555
  "aliases": [],
4427
4556
  "args": {},
@@ -4612,13 +4741,13 @@
4612
4741
  "generate:plugin:doc:hardis"
4613
4742
  ]
4614
4743
  },
4615
- "hardis:git:pull-requests:extract": {
4744
+ "hardis:org:community:update": {
4616
4745
  "aliases": [],
4617
4746
  "args": {},
4618
- "description": "\n## Command Behavior\n\n**Extracts pull request information from your Git server based on specified filtering criteria.**\n\nThis command provides a powerful way to query and retrieve details about pull requests (or merge requests, depending on your Git provider) in your repository. It's highly useful for reporting, auditing, and analyzing development workflows.\n\nKey functionalities include:\n\n- **Target Branch Filtering:** You can filter pull requests by their target branch using the `--target-branch` flag. If not specified, the command will prompt you to select one.\n- **Status Filtering:** Filter pull requests by their status: `open`, `merged`, or `abandoned` using the `--status` flag. An interactive prompt is provided if no status is specified.\n- **Minimum Date Filtering:** Use the `--min-date` flag to retrieve pull requests created or updated after a specific date.\n- **CSV Output:** The extracted pull request data is generated into a CSV file, which can be used for further analysis in spreadsheet software.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves interacting with a Git provider's API:\n\n- **Git Provider Abstraction:** It uses the `GitProvider.getInstance(true)` to abstract away the specifics of different Git platforms (e.g., GitHub, GitLab, Azure DevOps). This ensures the command can work across various environments.\n- **API Calls:** The `gitProvider.listPullRequests()` method is called with a `prConstraint` object that encapsulates the filtering criteria (target branch, minimum date, status).\n- **Interactive Prompts:** The `prompts` library is used to interactively gather input from the user for the target branch and pull request status if they are not provided as command-line flags.\n- **Date Handling:** The `moment` library is used to parse and handle date inputs for the `--min-date` flag.\n- **CSV Generation:** The `generateCsvFile` utility is responsible for converting the retrieved pull request data into a CSV format, and `generateReportPath` determines the output file location.\n- **Error Handling:** It includes error handling for cases where a Git provider cannot be identified.\n</details>\n",
4747
+ "description": "\n## Command Behavior\n\n**Updates the status of one or more Salesforce Experience Cloud (Community) networks.**\n\nThis command provides a way to programmatically change the status of your Salesforce Communities, allowing you to manage their availability. This is particularly useful for:\n\n- **Maintenance:** Taking communities offline for planned maintenance (`DownForMaintenance`).\n- **Activation/Deactivation:** Bringing communities online or offline (`Live`, `DownForMaintenance`).\n- **Automation:** Integrating community status changes into CI/CD pipelines or scheduled jobs.\n\nKey functionalities:\n\n- **Network Selection:** You can specify one or more community network names (separated by commas) using the `--name` flag.\n- **Status Update:** You can set the new status for the selected communities using the `--status` flag. Supported values are `Live` and `DownForMaintenance`.\n- **Confirmation Prompt:** In non-CI environments, it provides a confirmation prompt before executing the update, ensuring intentional changes.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **Salesforce SOQL Query:** It first queries the Salesforce `Network` object using SOQL to retrieve the `Id`, `Name`, and `Status` of the specified communities. This ensures that only existing communities are targeted.\n- **SObject Update:** It then constructs an array of `Network` sObjects with their `Id` and the new `Status` and performs a DML update operation using `conn.sobject(\"Network\").update()`. The `allOrNone: false` option is used to allow partial success in case some updates fail.\n- **Error Handling and Reporting:** It iterates through the update results, logging success or failure for each community. It also provides a summary of successful and erroneous updates.\n- **User Interaction:** Uses `prompts` to confirm the update action with the user when not running in a CI environment.\n- **Salesforce Connection:** Establishes a connection to the target Salesforce org using the `target-org` flag.\n</details>\n",
4619
4748
  "examples": [
4620
- "$ sf hardis:git:pull-requests:extract",
4621
- "$ sf hardis:git:pull-requests:extract --target-branch main --status merged"
4749
+ "$ sf hardis:org:community:update --name 'MyNetworkName' --status DownForMaintenance",
4750
+ "$ sf hardis:org:community:update --name 'MyNetworkName,MySecondNetworkName' --status Live"
4622
4751
  ],
4623
4752
  "flags": {
4624
4753
  "json": {
@@ -4636,140 +4765,11 @@
4636
4765
  "multiple": false,
4637
4766
  "type": "option"
4638
4767
  },
4639
- "target-branch": {
4640
- "char": "t",
4641
- "description": "Target branch of PRs",
4642
- "name": "target-branch",
4643
- "hasDynamicHelp": false,
4644
- "multiple": false,
4645
- "type": "option"
4646
- },
4647
- "status": {
4648
- "char": "x",
4649
- "description": "Status of the PR",
4650
- "name": "status",
4651
- "hasDynamicHelp": false,
4652
- "multiple": false,
4653
- "options": [
4654
- "open",
4655
- "merged",
4656
- "abandoned"
4657
- ],
4658
- "type": "option"
4659
- },
4660
- "min-date": {
4661
- "char": "m",
4662
- "description": "Minimum date for PR",
4663
- "name": "min-date",
4664
- "hasDynamicHelp": false,
4665
- "multiple": false,
4666
- "type": "option"
4667
- },
4668
- "outputfile": {
4669
- "char": "f",
4670
- "description": "Force the path and name of output report file. Must end with .csv",
4671
- "name": "outputfile",
4672
- "hasDynamicHelp": false,
4673
- "multiple": false,
4674
- "type": "option"
4675
- },
4676
- "debug": {
4677
- "char": "d",
4678
- "description": "Activate debug mode (more logs)",
4679
- "name": "debug",
4680
- "allowNo": false,
4681
- "type": "boolean"
4682
- },
4683
- "websocket": {
4684
- "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
4685
- "name": "websocket",
4686
- "hasDynamicHelp": false,
4687
- "multiple": false,
4688
- "type": "option"
4689
- },
4690
- "skipauth": {
4691
- "description": "Skip authentication check when a default username is required",
4692
- "name": "skipauth",
4693
- "allowNo": false,
4694
- "type": "boolean"
4695
- }
4696
- },
4697
- "hasDynamicHelp": false,
4698
- "hiddenAliases": [],
4699
- "id": "hardis:git:pull-requests:extract",
4700
- "pluginAlias": "sfdx-hardis",
4701
- "pluginName": "sfdx-hardis",
4702
- "pluginType": "core",
4703
- "strict": true,
4704
- "enableJsonFlag": true,
4705
- "title": "Extract pull requests",
4706
- "requiresProject": true,
4707
- "isESM": true,
4708
- "relativePath": [
4709
- "lib",
4710
- "commands",
4711
- "hardis",
4712
- "git",
4713
- "pull-requests",
4714
- "extract.js"
4715
- ],
4716
- "aliasPermutations": [],
4717
- "permutations": [
4718
- "hardis:git:pull-requests:extract",
4719
- "git:hardis:pull-requests:extract",
4720
- "git:pull-requests:hardis:extract",
4721
- "git:pull-requests:extract:hardis",
4722
- "hardis:pull-requests:git:extract",
4723
- "pull-requests:hardis:git:extract",
4724
- "pull-requests:git:hardis:extract",
4725
- "pull-requests:git:extract:hardis",
4726
- "hardis:pull-requests:extract:git",
4727
- "pull-requests:hardis:extract:git",
4728
- "pull-requests:extract:hardis:git",
4729
- "pull-requests:extract:git:hardis",
4730
- "hardis:git:extract:pull-requests",
4731
- "git:hardis:extract:pull-requests",
4732
- "git:extract:hardis:pull-requests",
4733
- "git:extract:pull-requests:hardis",
4734
- "hardis:extract:git:pull-requests",
4735
- "extract:hardis:git:pull-requests",
4736
- "extract:git:hardis:pull-requests",
4737
- "extract:git:pull-requests:hardis",
4738
- "hardis:extract:pull-requests:git",
4739
- "extract:hardis:pull-requests:git",
4740
- "extract:pull-requests:hardis:git",
4741
- "extract:pull-requests:git:hardis"
4742
- ]
4743
- },
4744
- "hardis:org:community:update": {
4745
- "aliases": [],
4746
- "args": {},
4747
- "description": "\n## Command Behavior\n\n**Updates the status of one or more Salesforce Experience Cloud (Community) networks.**\n\nThis command provides a way to programmatically change the status of your Salesforce Communities, allowing you to manage their availability. This is particularly useful for:\n\n- **Maintenance:** Taking communities offline for planned maintenance (`DownForMaintenance`).\n- **Activation/Deactivation:** Bringing communities online or offline (`Live`, `DownForMaintenance`).\n- **Automation:** Integrating community status changes into CI/CD pipelines or scheduled jobs.\n\nKey functionalities:\n\n- **Network Selection:** You can specify one or more community network names (separated by commas) using the `--name` flag.\n- **Status Update:** You can set the new status for the selected communities using the `--status` flag. Supported values are `Live` and `DownForMaintenance`.\n- **Confirmation Prompt:** In non-CI environments, it provides a confirmation prompt before executing the update, ensuring intentional changes.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **Salesforce SOQL Query:** It first queries the Salesforce `Network` object using SOQL to retrieve the `Id`, `Name`, and `Status` of the specified communities. This ensures that only existing communities are targeted.\n- **SObject Update:** It then constructs an array of `Network` sObjects with their `Id` and the new `Status` and performs a DML update operation using `conn.sobject(\"Network\").update()`. The `allOrNone: false` option is used to allow partial success in case some updates fail.\n- **Error Handling and Reporting:** It iterates through the update results, logging success or failure for each community. It also provides a summary of successful and erroneous updates.\n- **User Interaction:** Uses `prompts` to confirm the update action with the user when not running in a CI environment.\n- **Salesforce Connection:** Establishes a connection to the target Salesforce org using the `target-org` flag.\n</details>\n",
4748
- "examples": [
4749
- "$ sf hardis:org:community:update --name 'MyNetworkName' --status DownForMaintenance",
4750
- "$ sf hardis:org:community:update --name 'MyNetworkName,MySecondNetworkName' --status Live"
4751
- ],
4752
- "flags": {
4753
- "json": {
4754
- "description": "Format output as json.",
4755
- "helpGroup": "GLOBAL",
4756
- "name": "json",
4757
- "allowNo": false,
4758
- "type": "boolean"
4759
- },
4760
- "flags-dir": {
4761
- "helpGroup": "GLOBAL",
4762
- "name": "flags-dir",
4763
- "summary": "Import flag values from a directory.",
4764
- "hasDynamicHelp": false,
4765
- "multiple": false,
4766
- "type": "option"
4767
- },
4768
- "name": {
4769
- "char": "n",
4770
- "description": "List of Networks Names that you want to update, separated by comma",
4771
- "name": "name",
4772
- "required": true,
4768
+ "name": {
4769
+ "char": "n",
4770
+ "description": "List of Networks Names that you want to update, separated by comma",
4771
+ "name": "name",
4772
+ "required": true,
4773
4773
  "hasDynamicHelp": false,
4774
4774
  "multiple": false,
4775
4775
  "type": "option"
@@ -5539,6 +5539,121 @@
5539
5539
  "import:data:org:hardis"
5540
5540
  ]
5541
5541
  },
5542
+ "hardis:org:fix:listviewmine": {
5543
+ "aliases": [],
5544
+ "args": {},
5545
+ "description": "Fix listviews whose scope Mine has been replaced by Everything\n\n[![Invalid scope:Mine, not allowed ? Deploy your ListViews anyway !](https://github.com/hardisgroupcom/sfdx-hardis/raw/main/docs/assets/images/article-invalid-scope-mine.jpg)](https://nicolas.vuillamy.fr/invalid-scope-mine-not-allowed-deploy-your-listviews-anyway-443aceca8ac7)\n\nList of ListViews can be:\n\n- read from .sfdx-hardis.yml file in property **listViewsToSetToMine**\n- sent in argument listviews\n\nNote: property **listViewsToSetToMine** can be auto-generated by command hardis:work:save if .sfdx-hardis.yml contains the following configuration\n\n```yaml\nautoCleanTypes:\n - listViewsMine\n```\n\n- Example of sfdx-hardis.yml property `listViewsToSetToMine`:\n\n```yaml\nlistViewsToSetToMine:\n - \"force-app/main/default/objects/Operation__c/listViews/MyCurrentOperations.listView-meta.xml\"\n - \"force-app/main/default/objects/Operation__c/listViews/MyFinalizedOperations.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/Default_Opportunity_Pipeline.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/MyCurrentSubscriptions.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/MySubscriptions.listView-meta.xml\"\n - \"force-app/main/default/objects/Account/listViews/MyActivePartners.listView-meta.xml\"\n```\n\n- If manually written, this could also be:\n\n```yaml\nlistViewsToSetToMine:\n - \"Operation__c:MyCurrentOperations\"\n - \"Operation__c:MyFinalizedOperations\"\n - \"Opportunity:Default_Opportunity_Pipeline\"\n - \"Opportunity:MyCurrentSubscriptions\"\n - \"Opportunity:MySubscriptions\"\n - \"Account:MyActivePartners\"\n```\n\nTroubleshooting: if you need to run this command from an alpine-linux based docker image, use this workaround in your dockerfile:\n\n```dockerfile\n# Do not use puppeteer embedded chromium\nRUN apk add --update --no-cache chromium\nENV PUPPETEER_SKIP_CHROMIUM_DOWNLOAD=\"true\"\nENV CHROMIUM_PATH=\"/usr/bin/chromium-browser\"\nENV PUPPETEER_EXECUTABLE_PATH=\"$\\{CHROMIUM_PATH}\" // remove \\ before {\n```\n",
5546
+ "examples": [
5547
+ "$ sf hardis:org:fix:listviewmine",
5548
+ "$ sf hardis:org:fix:listviewmine --listviews Opportunity:MySubscriptions,Account:MyActivePartners"
5549
+ ],
5550
+ "flags": {
5551
+ "json": {
5552
+ "description": "Format output as json.",
5553
+ "helpGroup": "GLOBAL",
5554
+ "name": "json",
5555
+ "allowNo": false,
5556
+ "type": "boolean"
5557
+ },
5558
+ "flags-dir": {
5559
+ "helpGroup": "GLOBAL",
5560
+ "name": "flags-dir",
5561
+ "summary": "Import flag values from a directory.",
5562
+ "hasDynamicHelp": false,
5563
+ "multiple": false,
5564
+ "type": "option"
5565
+ },
5566
+ "listviews": {
5567
+ "char": "l",
5568
+ "description": "Comma-separated list of listviews following format Object:ListViewName\nExample: Contact:MyContacts,Contact:MyActiveContacts,Opportunity:MYClosedOpportunities",
5569
+ "name": "listviews",
5570
+ "hasDynamicHelp": false,
5571
+ "multiple": false,
5572
+ "type": "option"
5573
+ },
5574
+ "debug": {
5575
+ "char": "d",
5576
+ "description": "Activate debug mode (more logs)",
5577
+ "name": "debug",
5578
+ "allowNo": false,
5579
+ "type": "boolean"
5580
+ },
5581
+ "websocket": {
5582
+ "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
5583
+ "name": "websocket",
5584
+ "hasDynamicHelp": false,
5585
+ "multiple": false,
5586
+ "type": "option"
5587
+ },
5588
+ "skipauth": {
5589
+ "description": "Skip authentication check when a default username is required",
5590
+ "name": "skipauth",
5591
+ "allowNo": false,
5592
+ "type": "boolean"
5593
+ },
5594
+ "target-org": {
5595
+ "aliases": [
5596
+ "targetusername",
5597
+ "u"
5598
+ ],
5599
+ "char": "o",
5600
+ "deprecateAliases": true,
5601
+ "name": "target-org",
5602
+ "noCacheDefault": true,
5603
+ "required": true,
5604
+ "summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
5605
+ "hasDynamicHelp": true,
5606
+ "multiple": false,
5607
+ "type": "option"
5608
+ }
5609
+ },
5610
+ "hasDynamicHelp": true,
5611
+ "hiddenAliases": [],
5612
+ "id": "hardis:org:fix:listviewmine",
5613
+ "pluginAlias": "sfdx-hardis",
5614
+ "pluginName": "sfdx-hardis",
5615
+ "pluginType": "core",
5616
+ "strict": true,
5617
+ "enableJsonFlag": true,
5618
+ "title": "Fix listviews with ",
5619
+ "requiresProject": true,
5620
+ "isESM": true,
5621
+ "relativePath": [
5622
+ "lib",
5623
+ "commands",
5624
+ "hardis",
5625
+ "org",
5626
+ "fix",
5627
+ "listviewmine.js"
5628
+ ],
5629
+ "aliasPermutations": [],
5630
+ "permutations": [
5631
+ "hardis:org:fix:listviewmine",
5632
+ "org:hardis:fix:listviewmine",
5633
+ "org:fix:hardis:listviewmine",
5634
+ "org:fix:listviewmine:hardis",
5635
+ "hardis:fix:org:listviewmine",
5636
+ "fix:hardis:org:listviewmine",
5637
+ "fix:org:hardis:listviewmine",
5638
+ "fix:org:listviewmine:hardis",
5639
+ "hardis:fix:listviewmine:org",
5640
+ "fix:hardis:listviewmine:org",
5641
+ "fix:listviewmine:hardis:org",
5642
+ "fix:listviewmine:org:hardis",
5643
+ "hardis:org:listviewmine:fix",
5644
+ "org:hardis:listviewmine:fix",
5645
+ "org:listviewmine:hardis:fix",
5646
+ "org:listviewmine:fix:hardis",
5647
+ "hardis:listviewmine:org:fix",
5648
+ "listviewmine:hardis:org:fix",
5649
+ "listviewmine:org:hardis:fix",
5650
+ "listviewmine:org:fix:hardis",
5651
+ "hardis:listviewmine:fix:org",
5652
+ "listviewmine:hardis:fix:org",
5653
+ "listviewmine:fix:hardis:org",
5654
+ "listviewmine:fix:org:hardis"
5655
+ ]
5656
+ },
5542
5657
  "hardis:org:files:export": {
5543
5658
  "aliases": [],
5544
5659
  "args": {},
@@ -5808,15 +5923,137 @@
5808
5923
  "import:files:org:hardis"
5809
5924
  ]
5810
5925
  },
5811
- "hardis:org:diagnose:audittrail": {
5926
+ "hardis:org:generate:packagexmlfull": {
5812
5927
  "aliases": [],
5813
5928
  "args": {},
5814
- "description": "Export Audit trail into a CSV file with selected criteria, and highlight suspect actions\n\nAlso detects updates of Custom Settings values (disable by defining `SKIP_AUDIT_TRAIL_CUSTOM_SETTINGS=true`)\n\nRegular setup actions performed in major orgs are filtered.\n\n- \"\"\n - createScratchOrg\n - changedsenderemail\n - deleteScratchOrg\n - loginasgrantedtopartnerbt\n- Certificate and Key Management\n - insertCertificate\n- Custom App Licenses\n - addeduserpackagelicense\n - granteduserpackagelicense\n - revokeduserpackagelicense\n- Customer Portal\n - createdcustomersuccessuser\n - CSPUserDisabled\n- Currency\n - updateddatedexchrate\n- Data Management\n - queueMembership\n- Email Administration\n - dkimRotationPreparationSuccessful\n - dkimRotationSuccessful\n- External Objects\n - xdsEncryptedFieldChange\n- Groups\n - groupMembership\n- Holidays\n - holiday_insert\n- Inbox mobile and legacy desktop apps\n - enableSIQUserNonEAC\n - siqUserAcceptedTOS\n- Manage Users\n - activateduser\n - createduser\n - changedcommunitynickname\n - changedemail\n - changedfederationid\n - changedpassword\n - changedinteractionuseroffon\n - changedinteractionuseronoff\n - changedmarketinguseroffon\n - changedmarketinguseronoff\n - changedofflineuseroffon\n - changedprofileforuserstdtostd\n - changedprofileforuser\n - changedprofileforusercusttostd\n - changedprofileforuserstdtocust\n - changedroleforusertonone\n - changedroleforuser\n - changedroleforuserfromnone\n - changedUserAdminVerifiedStatusVerified\n - changedUserEmailVerifiedStatusUnverified\n - changedUserEmailVerifiedStatusVerified\n - changedknowledgeuseroffon\n - changedsfcontentuseroffon\n - changedsupportuseroffon\n - changedusername\n - changedUserPhoneNumber\n - changedUserPhoneVerifiedStatusUnverified\n - changedUserPhoneVerifiedStatusVerified\n - deactivateduser\n - deleteAuthenticatorPairing\n - deleteTwoFactorInfo2\n - deleteTwoFactorTempCode\n - frozeuser\n - insertAuthenticatorPairing\n - insertTwoFactorInfo2\n - insertTwoFactorTempCode\n - lightningloginenroll\n - PermSetAssign\n - PermSetGroupAssign\n - PermSetGroupUnassign\n - PermSetLicenseAssign\n - PermSetUnassign\n - PermSetLicenseUnassign\n - registeredUserPhoneNumber\n - resetpassword\n - suNetworkAdminLogin\n - suNetworkAdminLogout\n - suOrgAdminLogin\n - suOrgAdminLogout\n - unfrozeuser\n - useremailchangesent\n- Mobile Administration\n - assigneduserstomobileconfig\n- Reporting Snapshots\n - createdReportJob\n - deletedReportJob\n- Sandboxes\n - DeleteSandbox\n\nBy default, deployment user defined in .sfdx-hardis.yml targetUsername property will be excluded.\n\nYou can define additional users to exclude in .sfdx-hardis.yml **monitoringExcludeUsernames** property.\n\nYou can also add more sections / actions considered as not suspect using property **monitoringAllowedSectionsActions**\n\nExample:\n\n```yaml\nmonitoringExcludeUsernames:\n - deploymentuser@cloudity.com\n - marketingcloud@cloudity.com\n - integration-user@cloudity.com\n\nmonitoringAllowedSectionsActions:\n \"Some section\": [] // Will ignore all actions from such section\n \"Some other section\": [\"actionType1\",\"actionType2\",\"actionType3\"] // Will ignore only those 3 actions from section \"Some other section\". Other actions in the same section will be considered as suspect.\n```\n\n## Excel output example\n\n![](https://github.com/hardisgroupcom/sfdx-hardis/raw/main/docs/assets/images/screenshot-monitoring-audittrail-excel.jpg)\n\n## Local output example\n\n![](https://github.com/hardisgroupcom/sfdx-hardis/raw/main/docs/assets/images/screenshot-monitoring-audittrail-local.jpg)\n\nThis command is part of [sfdx-hardis Monitoring](https://sfdx-hardis.cloudity.com/salesforce-monitoring-suspect-audit-trail/) and can output Grafana, Slack and MsTeams Notifications.\n",
5929
+ "description": "\n## Command Behavior\n\n**Generates a comprehensive `package.xml` file for a Salesforce org, including all metadata components, even managed ones.**\n\nThis command is essential for various Salesforce development and administration tasks, especially when you need a complete snapshot of an org's metadata. It goes beyond typical source tracking by including managed package components, which is crucial for understanding the full metadata footprint of an org.\n\nKey functionalities:\n\n- **Full Org Metadata Retrieval:** Connects to a specified Salesforce org (or prompts for one if not provided) and retrieves a complete list of all metadata types and their members.\n- **Managed Package Inclusion:** Unlike standard source retrieval, this command explicitly includes metadata from managed packages, providing a truly comprehensive `package.xml`.\n- **Customizable Output:** Allows you to specify the output file path for the generated `package.xml`.\n- **Interactive Org Selection:** If no target org is specified, it interactively prompts the user to choose an org. (or use --no-prompt to skip this step)\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **Salesforce Metadata API Interaction:** It leverages the Salesforce Metadata API to list all available metadata types and then retrieve all components for each type.\n- **`buildOrgManifest` Utility:** The core logic for querying the org's metadata and constructing the `package.xml` is encapsulated within the `buildOrgManifest` utility function.\n- **XML Generation:** It dynamically builds the XML structure of the `package.xml` file, including the `types` and `members` elements for all retrieved metadata.\n- **File System Operations:** It writes the generated `package.xml` file to the specified output path.\n- **Interactive Prompts:** Uses `promptOrgUsernameDefault` to guide the user in selecting the target Salesforce org.\n</details>\n",
5815
5930
  "examples": [
5816
- "$ sf hardis:org:diagnose:audittrail",
5817
- "$ sf hardis:org:diagnose:audittrail --excludeusers baptiste@titi.com",
5818
- "$ sf hardis:org:diagnose:audittrail --excludeusers baptiste@titi.com,bertrand@titi.com",
5819
- "$ sf hardis:org:diagnose:audittrail --lastndays 5"
5931
+ "$ sf hardis:org:generate:packagexmlfull",
5932
+ "$ sf hardis:org:generate:packagexmlfull --outputfile /tmp/packagexmlfull.xml",
5933
+ "$ sf hardis:org:generate:packagexmlfull --target-org nico@example.com"
5934
+ ],
5935
+ "flags": {
5936
+ "json": {
5937
+ "description": "Format output as json.",
5938
+ "helpGroup": "GLOBAL",
5939
+ "name": "json",
5940
+ "allowNo": false,
5941
+ "type": "boolean"
5942
+ },
5943
+ "flags-dir": {
5944
+ "helpGroup": "GLOBAL",
5945
+ "name": "flags-dir",
5946
+ "summary": "Import flag values from a directory.",
5947
+ "hasDynamicHelp": false,
5948
+ "multiple": false,
5949
+ "type": "option"
5950
+ },
5951
+ "outputfile": {
5952
+ "description": "Output package.xml file",
5953
+ "name": "outputfile",
5954
+ "hasDynamicHelp": false,
5955
+ "multiple": false,
5956
+ "type": "option"
5957
+ },
5958
+ "debug": {
5959
+ "char": "d",
5960
+ "description": "Activate debug mode (more logs)",
5961
+ "name": "debug",
5962
+ "allowNo": false,
5963
+ "type": "boolean"
5964
+ },
5965
+ "no-prompt": {
5966
+ "char": "n",
5967
+ "description": "Do not prompt for org username, use the default one",
5968
+ "name": "no-prompt",
5969
+ "allowNo": false,
5970
+ "type": "boolean"
5971
+ },
5972
+ "websocket": {
5973
+ "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
5974
+ "name": "websocket",
5975
+ "hasDynamicHelp": false,
5976
+ "multiple": false,
5977
+ "type": "option"
5978
+ },
5979
+ "skipauth": {
5980
+ "description": "Skip authentication check when a default username is required",
5981
+ "name": "skipauth",
5982
+ "allowNo": false,
5983
+ "type": "boolean"
5984
+ },
5985
+ "target-org": {
5986
+ "aliases": [
5987
+ "targetusername",
5988
+ "u"
5989
+ ],
5990
+ "char": "o",
5991
+ "deprecateAliases": true,
5992
+ "name": "target-org",
5993
+ "noCacheDefault": true,
5994
+ "required": true,
5995
+ "summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
5996
+ "hasDynamicHelp": true,
5997
+ "multiple": false,
5998
+ "type": "option"
5999
+ }
6000
+ },
6001
+ "hasDynamicHelp": true,
6002
+ "hiddenAliases": [],
6003
+ "id": "hardis:org:generate:packagexmlfull",
6004
+ "pluginAlias": "sfdx-hardis",
6005
+ "pluginName": "sfdx-hardis",
6006
+ "pluginType": "core",
6007
+ "strict": true,
6008
+ "enableJsonFlag": true,
6009
+ "title": "Generate Full Org package.xml",
6010
+ "requiresProject": false,
6011
+ "isESM": true,
6012
+ "relativePath": [
6013
+ "lib",
6014
+ "commands",
6015
+ "hardis",
6016
+ "org",
6017
+ "generate",
6018
+ "packagexmlfull.js"
6019
+ ],
6020
+ "aliasPermutations": [],
6021
+ "permutations": [
6022
+ "hardis:org:generate:packagexmlfull",
6023
+ "org:hardis:generate:packagexmlfull",
6024
+ "org:generate:hardis:packagexmlfull",
6025
+ "org:generate:packagexmlfull:hardis",
6026
+ "hardis:generate:org:packagexmlfull",
6027
+ "generate:hardis:org:packagexmlfull",
6028
+ "generate:org:hardis:packagexmlfull",
6029
+ "generate:org:packagexmlfull:hardis",
6030
+ "hardis:generate:packagexmlfull:org",
6031
+ "generate:hardis:packagexmlfull:org",
6032
+ "generate:packagexmlfull:hardis:org",
6033
+ "generate:packagexmlfull:org:hardis",
6034
+ "hardis:org:packagexmlfull:generate",
6035
+ "org:hardis:packagexmlfull:generate",
6036
+ "org:packagexmlfull:hardis:generate",
6037
+ "org:packagexmlfull:generate:hardis",
6038
+ "hardis:packagexmlfull:org:generate",
6039
+ "packagexmlfull:hardis:org:generate",
6040
+ "packagexmlfull:org:hardis:generate",
6041
+ "packagexmlfull:org:generate:hardis",
6042
+ "hardis:packagexmlfull:generate:org",
6043
+ "packagexmlfull:hardis:generate:org",
6044
+ "packagexmlfull:generate:hardis:org",
6045
+ "packagexmlfull:generate:org:hardis"
6046
+ ]
6047
+ },
6048
+ "hardis:org:diagnose:audittrail": {
6049
+ "aliases": [],
6050
+ "args": {},
6051
+ "description": "Export Audit trail into a CSV file with selected criteria, and highlight suspect actions\n\nAlso detects updates of Custom Settings values (disable by defining `SKIP_AUDIT_TRAIL_CUSTOM_SETTINGS=true`)\n\nRegular setup actions performed in major orgs are filtered.\n\n- \"\"\n - createScratchOrg\n - changedsenderemail\n - deleteScratchOrg\n - loginasgrantedtopartnerbt\n- Certificate and Key Management\n - insertCertificate\n- Custom App Licenses\n - addeduserpackagelicense\n - granteduserpackagelicense\n - revokeduserpackagelicense\n- Customer Portal\n - createdcustomersuccessuser\n - CSPUserDisabled\n- Currency\n - updateddatedexchrate\n- Data Management\n - queueMembership\n- Email Administration\n - dkimRotationPreparationSuccessful\n - dkimRotationSuccessful\n- External Objects\n - xdsEncryptedFieldChange\n- Groups\n - groupMembership\n- Holidays\n - holiday_insert\n- Inbox mobile and legacy desktop apps\n - enableSIQUserNonEAC\n - siqUserAcceptedTOS\n- Manage Users\n - activateduser\n - createduser\n - changedcommunitynickname\n - changedemail\n - changedfederationid\n - changedpassword\n - changedinteractionuseroffon\n - changedinteractionuseronoff\n - changedmarketinguseroffon\n - changedmarketinguseronoff\n - changedofflineuseroffon\n - changedprofileforuserstdtostd\n - changedprofileforuser\n - changedprofileforusercusttostd\n - changedprofileforuserstdtocust\n - changedroleforusertonone\n - changedroleforuser\n - changedroleforuserfromnone\n - changedUserAdminVerifiedStatusVerified\n - changedUserEmailVerifiedStatusUnverified\n - changedUserEmailVerifiedStatusVerified\n - changedknowledgeuseroffon\n - changedsfcontentuseroffon\n - changedsupportuseroffon\n - changedusername\n - changedUserPhoneNumber\n - changedUserPhoneVerifiedStatusUnverified\n - changedUserPhoneVerifiedStatusVerified\n - deactivateduser\n - deleteAuthenticatorPairing\n - deleteTwoFactorInfo2\n - deleteTwoFactorTempCode\n - frozeuser\n - insertAuthenticatorPairing\n - insertTwoFactorInfo2\n - insertTwoFactorTempCode\n - lightningloginenroll\n - PermSetAssign\n - PermSetGroupAssign\n - PermSetGroupUnassign\n - PermSetLicenseAssign\n - PermSetUnassign\n - PermSetLicenseUnassign\n - registeredUserPhoneNumber\n - resetpassword\n - suNetworkAdminLogin\n - suNetworkAdminLogout\n - suOrgAdminLogin\n - suOrgAdminLogout\n - unfrozeuser\n - useremailchangesent\n- Mobile Administration\n - assigneduserstomobileconfig\n- Reporting Snapshots\n - createdReportJob\n - deletedReportJob\n- Sandboxes\n - DeleteSandbox\n\nBy default, deployment user defined in .sfdx-hardis.yml targetUsername property will be excluded.\n\nYou can define additional users to exclude in .sfdx-hardis.yml **monitoringExcludeUsernames** property.\n\nYou can also add more sections / actions considered as not suspect using property **monitoringAllowedSectionsActions**\n\nExample:\n\n```yaml\nmonitoringExcludeUsernames:\n - deploymentuser@cloudity.com\n - marketingcloud@cloudity.com\n - integration-user@cloudity.com\n\nmonitoringAllowedSectionsActions:\n \"Some section\": [] // Will ignore all actions from such section\n \"Some other section\": [\"actionType1\",\"actionType2\",\"actionType3\"] // Will ignore only those 3 actions from section \"Some other section\". Other actions in the same section will be considered as suspect.\n```\n\n## Excel output example\n\n![](https://github.com/hardisgroupcom/sfdx-hardis/raw/main/docs/assets/images/screenshot-monitoring-audittrail-excel.jpg)\n\n## Local output example\n\n![](https://github.com/hardisgroupcom/sfdx-hardis/raw/main/docs/assets/images/screenshot-monitoring-audittrail-local.jpg)\n\nThis command is part of [sfdx-hardis Monitoring](https://sfdx-hardis.cloudity.com/salesforce-monitoring-suspect-audit-trail/) and can output Grafana, Slack and MsTeams Notifications.\n",
6052
+ "examples": [
6053
+ "$ sf hardis:org:diagnose:audittrail",
6054
+ "$ sf hardis:org:diagnose:audittrail --excludeusers baptiste@titi.com",
6055
+ "$ sf hardis:org:diagnose:audittrail --excludeusers baptiste@titi.com,bertrand@titi.com",
6056
+ "$ sf hardis:org:diagnose:audittrail --lastndays 5"
5820
6057
  ],
5821
6058
  "flags": {
5822
6059
  "json": {
@@ -7071,14 +7308,12 @@
7071
7308
  "unusedusers:diagnose:org:hardis"
7072
7309
  ]
7073
7310
  },
7074
- "hardis:org:generate:packagexmlfull": {
7311
+ "hardis:org:monitor:all": {
7075
7312
  "aliases": [],
7076
7313
  "args": {},
7077
- "description": "\n## Command Behavior\n\n**Generates a comprehensive `package.xml` file for a Salesforce org, including all metadata components, even managed ones.**\n\nThis command is essential for various Salesforce development and administration tasks, especially when you need a complete snapshot of an org's metadata. It goes beyond typical source tracking by including managed package components, which is crucial for understanding the full metadata footprint of an org.\n\nKey functionalities:\n\n- **Full Org Metadata Retrieval:** Connects to a specified Salesforce org (or prompts for one if not provided) and retrieves a complete list of all metadata types and their members.\n- **Managed Package Inclusion:** Unlike standard source retrieval, this command explicitly includes metadata from managed packages, providing a truly comprehensive `package.xml`.\n- **Customizable Output:** Allows you to specify the output file path for the generated `package.xml`.\n- **Interactive Org Selection:** If no target org is specified, it interactively prompts the user to choose an org. (or use --no-prompt to skip this step)\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **Salesforce Metadata API Interaction:** It leverages the Salesforce Metadata API to list all available metadata types and then retrieve all components for each type.\n- **`buildOrgManifest` Utility:** The core logic for querying the org's metadata and constructing the `package.xml` is encapsulated within the `buildOrgManifest` utility function.\n- **XML Generation:** It dynamically builds the XML structure of the `package.xml` file, including the `types` and `members` elements for all retrieved metadata.\n- **File System Operations:** It writes the generated `package.xml` file to the specified output path.\n- **Interactive Prompts:** Uses `promptOrgUsernameDefault` to guide the user in selecting the target Salesforce org.\n</details>\n",
7314
+ "description": "Monitor org, generate reports and sends notifications\n\nYou can disable some commands defining either a **monitoringDisable** property in `.sfdx-hardis.yml`, or a comma separated list in env variable **MONITORING_DISABLE**\n\nExample in .sfdx-hardis.yml:\n \n```yaml\nmonitoringDisable:\n - METADATA_STATUS\n - MISSING_ATTRIBUTES\n - UNUSED_METADATAS\n```\n \nExample in env var:\n\n```sh\nMONITORING_DISABLE=METADATA_STATUS,MISSING_ATTRIBUTES,UNUSED_METADATAS\n```\n\nA [default list of monitoring commands](https://sfdx-hardis.cloudity.com/salesforce-monitoring-home/#monitoring-commands) is used, if you want to override it you can define property **monitoringCommands** in your .sfdx-hardis.yml file\n\nExample:\n\n```yaml\nmonitoringCommands:\n - title: My Custom command\n command: sf my:custom:command\n - title: My Custom command 2\n command: sf my:other:custom:command\n```\n\nYou can force the daily run of all commands by defining env var `MONITORING_IGNORE_FREQUENCY=true`\n\nThe default list of commands is the following:\n\n| Key | Description | Command | Frequency |\n| :---: | :---- | :---- | :-----: |\n| [AUDIT_TRAIL](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/audittrail) | Detect suspect setup actions in major org | [sf hardis:org:diagnose:audittrail](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/audittrail) | daily |\n| [LEGACY_API](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/legacyapi) | Detect calls to deprecated API versions | [sf hardis:org:diagnose:legacyapi](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/legacyapi) | daily |\n| [ORG_LIMITS](https://sfdx-hardis.cloudity.com/hardis/org/monitor/limits) | Detect if org limits are close to be reached | [sf hardis:org:monitor:limits](https://sfdx-hardis.cloudity.com/hardis/org/monitor/limits) | daily |\n| [UNSECURED_CONNECTED_APPS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unsecure-connected-apps) | Detect unsecured Connected Apps in an org | [sf hardis:org:diagnose:unsecure-connected-apps](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unsecure-connected-apps) | daily |\n| [LICENSES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/licenses) | Extract licenses information | [sf hardis:org:diagnose:licenses](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/licenses) | weekly |\n| [LINT_ACCESS](https://sfdx-hardis.cloudity.com/hardis/lint/access) | Detect custom elements with no access rights defined in permission sets | [sf hardis:lint:access](https://sfdx-hardis.cloudity.com/hardis/lint/access) | weekly |\n| [UNUSED_LICENSES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedlicenses) | Detect permission set licenses that are assigned to users that do not need them | [sf hardis:org:diagnose:unusedlicenses](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedlicenses) | weekly |\n| [UNUSED_USERS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | Detect active users without recent logins | [sf hardis:org:diagnose:unusedusers](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | weekly |\n| [ACTIVE_USERS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | Detect active users with recent logins | [sf hardis:org:diagnose:unusedusers --returnactiveusers](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | weekly |\n| [ORG_INFO](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/instanceupgrade) | Get org info + SF instance info + next major upgrade date | [sf hardis:org:diagnose:instanceupgrade](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/instanceupgrade) | weekly |\n| [RELEASE_UPDATES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/releaseupdates) | Gather warnings about incoming and overdue Release Updates | [sf hardis:org:diagnose:releaseupdates](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/releaseupdates) | weekly |\n| [UNUSED_METADATAS](https://sfdx-hardis.cloudity.com/hardis/lint/unusedmetadatas) | Detect custom labels and custom permissions that are not in use | [sf hardis:lint:unusedmetadatas](https://sfdx-hardis.cloudity.com/hardis/lint/unusedmetadatas) | weekly |\n| [UNUSED_APEX_CLASSES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-apex-classes) | Detect unused Apex classes in an org | [sf hardis:org:diagnose:unused-apex-classes](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-apex-classes) | weekly |\n| [CONNECTED_APPS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-connected-apps) | Detect unused Connected Apps in an org | [sf hardis:org:diagnose:unused-connected-apps](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-connected-apps) | weekly |\n| [METADATA_STATUS](https://sfdx-hardis.cloudity.com/hardis/lint/metadatastatus) | Detect inactive metadata | [sf hardis:lint:metadatastatus](https://sfdx-hardis.cloudity.com/hardis/lint/metadatastatus) | weekly |\n| [MISSING_ATTRIBUTES](https://sfdx-hardis.cloudity.com/hardis/lint/missingattributes) | Detect missing description on custom field | [sf hardis:lint:missingattributes](https://sfdx-hardis.cloudity.com/hardis/lint/missingattributes) | weekly |\n\n",
7078
7315
  "examples": [
7079
- "$ sf hardis:org:generate:packagexmlfull",
7080
- "$ sf hardis:org:generate:packagexmlfull --outputfile /tmp/packagexmlfull.xml",
7081
- "$ sf hardis:org:generate:packagexmlfull --target-org nico@example.com"
7316
+ "$ sf hardis:org:monitor:all"
7082
7317
  ],
7083
7318
  "flags": {
7084
7319
  "json": {
@@ -7096,13 +7331,6 @@
7096
7331
  "multiple": false,
7097
7332
  "type": "option"
7098
7333
  },
7099
- "outputfile": {
7100
- "description": "Output package.xml file",
7101
- "name": "outputfile",
7102
- "hasDynamicHelp": false,
7103
- "multiple": false,
7104
- "type": "option"
7105
- },
7106
7334
  "debug": {
7107
7335
  "char": "d",
7108
7336
  "description": "Activate debug mode (more logs)",
@@ -7110,13 +7338,6 @@
7110
7338
  "allowNo": false,
7111
7339
  "type": "boolean"
7112
7340
  },
7113
- "no-prompt": {
7114
- "char": "n",
7115
- "description": "Do not prompt for org username, use the default one",
7116
- "name": "no-prompt",
7117
- "allowNo": false,
7118
- "type": "boolean"
7119
- },
7120
7341
  "websocket": {
7121
7342
  "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
7122
7343
  "name": "websocket",
@@ -7148,342 +7369,121 @@
7148
7369
  },
7149
7370
  "hasDynamicHelp": true,
7150
7371
  "hiddenAliases": [],
7151
- "id": "hardis:org:generate:packagexmlfull",
7372
+ "id": "hardis:org:monitor:all",
7152
7373
  "pluginAlias": "sfdx-hardis",
7153
7374
  "pluginName": "sfdx-hardis",
7154
7375
  "pluginType": "core",
7155
7376
  "strict": true,
7156
7377
  "enableJsonFlag": true,
7157
- "title": "Generate Full Org package.xml",
7158
- "requiresProject": false,
7378
+ "title": "Monitor org",
7379
+ "monitoringCommandsDefault": [
7380
+ {
7381
+ "key": "AUDIT_TRAIL",
7382
+ "title": "Detect suspect setup actions in major org",
7383
+ "command": "sf hardis:org:diagnose:audittrail",
7384
+ "frequency": "daily"
7385
+ },
7386
+ {
7387
+ "key": "LEGACY_API",
7388
+ "title": "Detect calls to deprecated API versions",
7389
+ "command": "sf hardis:org:diagnose:legacyapi",
7390
+ "frequency": "daily"
7391
+ },
7392
+ {
7393
+ "key": "ORG_LIMITS",
7394
+ "title": "Detect if org limits are close to be reached",
7395
+ "command": "sf hardis:org:monitor:limits",
7396
+ "frequency": "daily"
7397
+ },
7398
+ {
7399
+ "key": "UNSECURED_CONNECTED_APPS",
7400
+ "title": "Detect unsecured Connected Apps in an org",
7401
+ "command": "sf hardis:org:diagnose:unsecure-connected-apps",
7402
+ "frequency": "daily"
7403
+ },
7404
+ {
7405
+ "key": "LICENSES",
7406
+ "title": "Extract licenses information",
7407
+ "command": "sf hardis:org:diagnose:licenses",
7408
+ "frequency": "weekly"
7409
+ },
7410
+ {
7411
+ "key": "LINT_ACCESS",
7412
+ "title": "Detect custom elements with no access rights defined in permission sets",
7413
+ "command": "sf hardis:lint:access",
7414
+ "frequency": "weekly"
7415
+ },
7416
+ {
7417
+ "key": "UNUSED_LICENSES",
7418
+ "title": "Detect permission set licenses that are assigned to users that do not need them",
7419
+ "command": "sf hardis:org:diagnose:unusedlicenses",
7420
+ "frequency": "weekly"
7421
+ },
7422
+ {
7423
+ "key": "UNUSED_USERS",
7424
+ "title": "Detect active users without recent logins",
7425
+ "command": "sf hardis:org:diagnose:unusedusers",
7426
+ "frequency": "weekly"
7427
+ },
7428
+ {
7429
+ "key": "ACTIVE_USERS",
7430
+ "title": "Detect active users with recent logins",
7431
+ "command": "sf hardis:org:diagnose:unusedusers --returnactiveusers",
7432
+ "frequency": "weekly"
7433
+ },
7434
+ {
7435
+ "key": "ORG_INFO",
7436
+ "title": "Get org info + SF instance info + next major upgrade date",
7437
+ "command": "sf hardis:org:diagnose:instanceupgrade",
7438
+ "frequency": "weekly"
7439
+ },
7440
+ {
7441
+ "key": "RELEASE_UPDATES",
7442
+ "title": "Gather warnings about incoming and overdue Release Updates",
7443
+ "command": "sf hardis:org:diagnose:releaseupdates",
7444
+ "frequency": "weekly"
7445
+ },
7446
+ {
7447
+ "key": "UNUSED_METADATAS",
7448
+ "title": "Detect custom labels and custom permissions that are not in use",
7449
+ "command": "sf hardis:lint:unusedmetadatas",
7450
+ "frequency": "weekly"
7451
+ },
7452
+ {
7453
+ "key": "UNUSED_APEX_CLASSES",
7454
+ "title": "Detect unused Apex classes in an org",
7455
+ "command": "sf hardis:org:diagnose:unused-apex-classes",
7456
+ "frequency": "weekly"
7457
+ },
7458
+ {
7459
+ "key": "CONNECTED_APPS",
7460
+ "title": "Detect unused Connected Apps in an org",
7461
+ "command": "sf hardis:org:diagnose:unused-connected-apps",
7462
+ "frequency": "weekly"
7463
+ },
7464
+ {
7465
+ "key": "METADATA_STATUS",
7466
+ "title": "Detect inactive metadata",
7467
+ "command": "sf hardis:lint:metadatastatus",
7468
+ "frequency": "weekly"
7469
+ },
7470
+ {
7471
+ "key": "MISSING_ATTRIBUTES",
7472
+ "title": "Detect missing description on custom field",
7473
+ "command": "sf hardis:lint:missingattributes",
7474
+ "frequency": "weekly"
7475
+ }
7476
+ ],
7477
+ "requiresProject": true,
7478
+ "triggerNotification": true,
7159
7479
  "isESM": true,
7160
7480
  "relativePath": [
7161
7481
  "lib",
7162
7482
  "commands",
7163
7483
  "hardis",
7164
7484
  "org",
7165
- "generate",
7166
- "packagexmlfull.js"
7167
- ],
7168
- "aliasPermutations": [],
7169
- "permutations": [
7170
- "hardis:org:generate:packagexmlfull",
7171
- "org:hardis:generate:packagexmlfull",
7172
- "org:generate:hardis:packagexmlfull",
7173
- "org:generate:packagexmlfull:hardis",
7174
- "hardis:generate:org:packagexmlfull",
7175
- "generate:hardis:org:packagexmlfull",
7176
- "generate:org:hardis:packagexmlfull",
7177
- "generate:org:packagexmlfull:hardis",
7178
- "hardis:generate:packagexmlfull:org",
7179
- "generate:hardis:packagexmlfull:org",
7180
- "generate:packagexmlfull:hardis:org",
7181
- "generate:packagexmlfull:org:hardis",
7182
- "hardis:org:packagexmlfull:generate",
7183
- "org:hardis:packagexmlfull:generate",
7184
- "org:packagexmlfull:hardis:generate",
7185
- "org:packagexmlfull:generate:hardis",
7186
- "hardis:packagexmlfull:org:generate",
7187
- "packagexmlfull:hardis:org:generate",
7188
- "packagexmlfull:org:hardis:generate",
7189
- "packagexmlfull:org:generate:hardis",
7190
- "hardis:packagexmlfull:generate:org",
7191
- "packagexmlfull:hardis:generate:org",
7192
- "packagexmlfull:generate:hardis:org",
7193
- "packagexmlfull:generate:org:hardis"
7194
- ]
7195
- },
7196
- "hardis:org:fix:listviewmine": {
7197
- "aliases": [],
7198
- "args": {},
7199
- "description": "Fix listviews whose scope Mine has been replaced by Everything\n\n[![Invalid scope:Mine, not allowed ? Deploy your ListViews anyway !](https://github.com/hardisgroupcom/sfdx-hardis/raw/main/docs/assets/images/article-invalid-scope-mine.jpg)](https://nicolas.vuillamy.fr/invalid-scope-mine-not-allowed-deploy-your-listviews-anyway-443aceca8ac7)\n\nList of ListViews can be:\n\n- read from .sfdx-hardis.yml file in property **listViewsToSetToMine**\n- sent in argument listviews\n\nNote: property **listViewsToSetToMine** can be auto-generated by command hardis:work:save if .sfdx-hardis.yml contains the following configuration\n\n```yaml\nautoCleanTypes:\n - listViewsMine\n```\n\n- Example of sfdx-hardis.yml property `listViewsToSetToMine`:\n\n```yaml\nlistViewsToSetToMine:\n - \"force-app/main/default/objects/Operation__c/listViews/MyCurrentOperations.listView-meta.xml\"\n - \"force-app/main/default/objects/Operation__c/listViews/MyFinalizedOperations.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/Default_Opportunity_Pipeline.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/MyCurrentSubscriptions.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/MySubscriptions.listView-meta.xml\"\n - \"force-app/main/default/objects/Account/listViews/MyActivePartners.listView-meta.xml\"\n```\n\n- If manually written, this could also be:\n\n```yaml\nlistViewsToSetToMine:\n - \"Operation__c:MyCurrentOperations\"\n - \"Operation__c:MyFinalizedOperations\"\n - \"Opportunity:Default_Opportunity_Pipeline\"\n - \"Opportunity:MyCurrentSubscriptions\"\n - \"Opportunity:MySubscriptions\"\n - \"Account:MyActivePartners\"\n```\n\nTroubleshooting: if you need to run this command from an alpine-linux based docker image, use this workaround in your dockerfile:\n\n```dockerfile\n# Do not use puppeteer embedded chromium\nRUN apk add --update --no-cache chromium\nENV PUPPETEER_SKIP_CHROMIUM_DOWNLOAD=\"true\"\nENV CHROMIUM_PATH=\"/usr/bin/chromium-browser\"\nENV PUPPETEER_EXECUTABLE_PATH=\"$\\{CHROMIUM_PATH}\" // remove \\ before {\n```\n",
7200
- "examples": [
7201
- "$ sf hardis:org:fix:listviewmine",
7202
- "$ sf hardis:org:fix:listviewmine --listviews Opportunity:MySubscriptions,Account:MyActivePartners"
7203
- ],
7204
- "flags": {
7205
- "json": {
7206
- "description": "Format output as json.",
7207
- "helpGroup": "GLOBAL",
7208
- "name": "json",
7209
- "allowNo": false,
7210
- "type": "boolean"
7211
- },
7212
- "flags-dir": {
7213
- "helpGroup": "GLOBAL",
7214
- "name": "flags-dir",
7215
- "summary": "Import flag values from a directory.",
7216
- "hasDynamicHelp": false,
7217
- "multiple": false,
7218
- "type": "option"
7219
- },
7220
- "listviews": {
7221
- "char": "l",
7222
- "description": "Comma-separated list of listviews following format Object:ListViewName\nExample: Contact:MyContacts,Contact:MyActiveContacts,Opportunity:MYClosedOpportunities",
7223
- "name": "listviews",
7224
- "hasDynamicHelp": false,
7225
- "multiple": false,
7226
- "type": "option"
7227
- },
7228
- "debug": {
7229
- "char": "d",
7230
- "description": "Activate debug mode (more logs)",
7231
- "name": "debug",
7232
- "allowNo": false,
7233
- "type": "boolean"
7234
- },
7235
- "websocket": {
7236
- "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
7237
- "name": "websocket",
7238
- "hasDynamicHelp": false,
7239
- "multiple": false,
7240
- "type": "option"
7241
- },
7242
- "skipauth": {
7243
- "description": "Skip authentication check when a default username is required",
7244
- "name": "skipauth",
7245
- "allowNo": false,
7246
- "type": "boolean"
7247
- },
7248
- "target-org": {
7249
- "aliases": [
7250
- "targetusername",
7251
- "u"
7252
- ],
7253
- "char": "o",
7254
- "deprecateAliases": true,
7255
- "name": "target-org",
7256
- "noCacheDefault": true,
7257
- "required": true,
7258
- "summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
7259
- "hasDynamicHelp": true,
7260
- "multiple": false,
7261
- "type": "option"
7262
- }
7263
- },
7264
- "hasDynamicHelp": true,
7265
- "hiddenAliases": [],
7266
- "id": "hardis:org:fix:listviewmine",
7267
- "pluginAlias": "sfdx-hardis",
7268
- "pluginName": "sfdx-hardis",
7269
- "pluginType": "core",
7270
- "strict": true,
7271
- "enableJsonFlag": true,
7272
- "title": "Fix listviews with ",
7273
- "requiresProject": true,
7274
- "isESM": true,
7275
- "relativePath": [
7276
- "lib",
7277
- "commands",
7278
- "hardis",
7279
- "org",
7280
- "fix",
7281
- "listviewmine.js"
7282
- ],
7283
- "aliasPermutations": [],
7284
- "permutations": [
7285
- "hardis:org:fix:listviewmine",
7286
- "org:hardis:fix:listviewmine",
7287
- "org:fix:hardis:listviewmine",
7288
- "org:fix:listviewmine:hardis",
7289
- "hardis:fix:org:listviewmine",
7290
- "fix:hardis:org:listviewmine",
7291
- "fix:org:hardis:listviewmine",
7292
- "fix:org:listviewmine:hardis",
7293
- "hardis:fix:listviewmine:org",
7294
- "fix:hardis:listviewmine:org",
7295
- "fix:listviewmine:hardis:org",
7296
- "fix:listviewmine:org:hardis",
7297
- "hardis:org:listviewmine:fix",
7298
- "org:hardis:listviewmine:fix",
7299
- "org:listviewmine:hardis:fix",
7300
- "org:listviewmine:fix:hardis",
7301
- "hardis:listviewmine:org:fix",
7302
- "listviewmine:hardis:org:fix",
7303
- "listviewmine:org:hardis:fix",
7304
- "listviewmine:org:fix:hardis",
7305
- "hardis:listviewmine:fix:org",
7306
- "listviewmine:hardis:fix:org",
7307
- "listviewmine:fix:hardis:org",
7308
- "listviewmine:fix:org:hardis"
7309
- ]
7310
- },
7311
- "hardis:org:monitor:all": {
7312
- "aliases": [],
7313
- "args": {},
7314
- "description": "Monitor org, generate reports and sends notifications\n\nYou can disable some commands defining either a **monitoringDisable** property in `.sfdx-hardis.yml`, or a comma separated list in env variable **MONITORING_DISABLE**\n\nExample in .sfdx-hardis.yml:\n \n```yaml\nmonitoringDisable:\n - METADATA_STATUS\n - MISSING_ATTRIBUTES\n - UNUSED_METADATAS\n```\n \nExample in env var:\n\n```sh\nMONITORING_DISABLE=METADATA_STATUS,MISSING_ATTRIBUTES,UNUSED_METADATAS\n```\n\nA [default list of monitoring commands](https://sfdx-hardis.cloudity.com/salesforce-monitoring-home/#monitoring-commands) is used, if you want to override it you can define property **monitoringCommands** in your .sfdx-hardis.yml file\n\nExample:\n\n```yaml\nmonitoringCommands:\n - title: My Custom command\n command: sf my:custom:command\n - title: My Custom command 2\n command: sf my:other:custom:command\n```\n\nYou can force the daily run of all commands by defining env var `MONITORING_IGNORE_FREQUENCY=true`\n\nThe default list of commands is the following:\n\n| Key | Description | Command | Frequency |\n| :---: | :---- | :---- | :-----: |\n| [AUDIT_TRAIL](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/audittrail) | Detect suspect setup actions in major org | [sf hardis:org:diagnose:audittrail](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/audittrail) | daily |\n| [LEGACY_API](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/legacyapi) | Detect calls to deprecated API versions | [sf hardis:org:diagnose:legacyapi](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/legacyapi) | daily |\n| [ORG_LIMITS](https://sfdx-hardis.cloudity.com/hardis/org/monitor/limits) | Detect if org limits are close to be reached | [sf hardis:org:monitor:limits](https://sfdx-hardis.cloudity.com/hardis/org/monitor/limits) | daily |\n| [UNSECURED_CONNECTED_APPS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unsecure-connected-apps) | Detect unsecured Connected Apps in an org | [sf hardis:org:diagnose:unsecure-connected-apps](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unsecure-connected-apps) | daily |\n| [LICENSES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/licenses) | Extract licenses information | [sf hardis:org:diagnose:licenses](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/licenses) | weekly |\n| [LINT_ACCESS](https://sfdx-hardis.cloudity.com/hardis/lint/access) | Detect custom elements with no access rights defined in permission sets | [sf hardis:lint:access](https://sfdx-hardis.cloudity.com/hardis/lint/access) | weekly |\n| [UNUSED_LICENSES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedlicenses) | Detect permission set licenses that are assigned to users that do not need them | [sf hardis:org:diagnose:unusedlicenses](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedlicenses) | weekly |\n| [UNUSED_USERS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | Detect active users without recent logins | [sf hardis:org:diagnose:unusedusers](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | weekly |\n| [ACTIVE_USERS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | Detect active users with recent logins | [sf hardis:org:diagnose:unusedusers --returnactiveusers](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | weekly |\n| [ORG_INFO](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/instanceupgrade) | Get org info + SF instance info + next major upgrade date | [sf hardis:org:diagnose:instanceupgrade](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/instanceupgrade) | weekly |\n| [RELEASE_UPDATES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/releaseupdates) | Gather warnings about incoming and overdue Release Updates | [sf hardis:org:diagnose:releaseupdates](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/releaseupdates) | weekly |\n| [UNUSED_METADATAS](https://sfdx-hardis.cloudity.com/hardis/lint/unusedmetadatas) | Detect custom labels and custom permissions that are not in use | [sf hardis:lint:unusedmetadatas](https://sfdx-hardis.cloudity.com/hardis/lint/unusedmetadatas) | weekly |\n| [UNUSED_APEX_CLASSES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-apex-classes) | Detect unused Apex classes in an org | [sf hardis:org:diagnose:unused-apex-classes](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-apex-classes) | weekly |\n| [CONNECTED_APPS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-connected-apps) | Detect unused Connected Apps in an org | [sf hardis:org:diagnose:unused-connected-apps](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-connected-apps) | weekly |\n| [METADATA_STATUS](https://sfdx-hardis.cloudity.com/hardis/lint/metadatastatus) | Detect inactive metadata | [sf hardis:lint:metadatastatus](https://sfdx-hardis.cloudity.com/hardis/lint/metadatastatus) | weekly |\n| [MISSING_ATTRIBUTES](https://sfdx-hardis.cloudity.com/hardis/lint/missingattributes) | Detect missing description on custom field | [sf hardis:lint:missingattributes](https://sfdx-hardis.cloudity.com/hardis/lint/missingattributes) | weekly |\n\n",
7315
- "examples": [
7316
- "$ sf hardis:org:monitor:all"
7317
- ],
7318
- "flags": {
7319
- "json": {
7320
- "description": "Format output as json.",
7321
- "helpGroup": "GLOBAL",
7322
- "name": "json",
7323
- "allowNo": false,
7324
- "type": "boolean"
7325
- },
7326
- "flags-dir": {
7327
- "helpGroup": "GLOBAL",
7328
- "name": "flags-dir",
7329
- "summary": "Import flag values from a directory.",
7330
- "hasDynamicHelp": false,
7331
- "multiple": false,
7332
- "type": "option"
7333
- },
7334
- "debug": {
7335
- "char": "d",
7336
- "description": "Activate debug mode (more logs)",
7337
- "name": "debug",
7338
- "allowNo": false,
7339
- "type": "boolean"
7340
- },
7341
- "websocket": {
7342
- "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
7343
- "name": "websocket",
7344
- "hasDynamicHelp": false,
7345
- "multiple": false,
7346
- "type": "option"
7347
- },
7348
- "skipauth": {
7349
- "description": "Skip authentication check when a default username is required",
7350
- "name": "skipauth",
7351
- "allowNo": false,
7352
- "type": "boolean"
7353
- },
7354
- "target-org": {
7355
- "aliases": [
7356
- "targetusername",
7357
- "u"
7358
- ],
7359
- "char": "o",
7360
- "deprecateAliases": true,
7361
- "name": "target-org",
7362
- "noCacheDefault": true,
7363
- "required": true,
7364
- "summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
7365
- "hasDynamicHelp": true,
7366
- "multiple": false,
7367
- "type": "option"
7368
- }
7369
- },
7370
- "hasDynamicHelp": true,
7371
- "hiddenAliases": [],
7372
- "id": "hardis:org:monitor:all",
7373
- "pluginAlias": "sfdx-hardis",
7374
- "pluginName": "sfdx-hardis",
7375
- "pluginType": "core",
7376
- "strict": true,
7377
- "enableJsonFlag": true,
7378
- "title": "Monitor org",
7379
- "monitoringCommandsDefault": [
7380
- {
7381
- "key": "AUDIT_TRAIL",
7382
- "title": "Detect suspect setup actions in major org",
7383
- "command": "sf hardis:org:diagnose:audittrail",
7384
- "frequency": "daily"
7385
- },
7386
- {
7387
- "key": "LEGACY_API",
7388
- "title": "Detect calls to deprecated API versions",
7389
- "command": "sf hardis:org:diagnose:legacyapi",
7390
- "frequency": "daily"
7391
- },
7392
- {
7393
- "key": "ORG_LIMITS",
7394
- "title": "Detect if org limits are close to be reached",
7395
- "command": "sf hardis:org:monitor:limits",
7396
- "frequency": "daily"
7397
- },
7398
- {
7399
- "key": "UNSECURED_CONNECTED_APPS",
7400
- "title": "Detect unsecured Connected Apps in an org",
7401
- "command": "sf hardis:org:diagnose:unsecure-connected-apps",
7402
- "frequency": "daily"
7403
- },
7404
- {
7405
- "key": "LICENSES",
7406
- "title": "Extract licenses information",
7407
- "command": "sf hardis:org:diagnose:licenses",
7408
- "frequency": "weekly"
7409
- },
7410
- {
7411
- "key": "LINT_ACCESS",
7412
- "title": "Detect custom elements with no access rights defined in permission sets",
7413
- "command": "sf hardis:lint:access",
7414
- "frequency": "weekly"
7415
- },
7416
- {
7417
- "key": "UNUSED_LICENSES",
7418
- "title": "Detect permission set licenses that are assigned to users that do not need them",
7419
- "command": "sf hardis:org:diagnose:unusedlicenses",
7420
- "frequency": "weekly"
7421
- },
7422
- {
7423
- "key": "UNUSED_USERS",
7424
- "title": "Detect active users without recent logins",
7425
- "command": "sf hardis:org:diagnose:unusedusers",
7426
- "frequency": "weekly"
7427
- },
7428
- {
7429
- "key": "ACTIVE_USERS",
7430
- "title": "Detect active users with recent logins",
7431
- "command": "sf hardis:org:diagnose:unusedusers --returnactiveusers",
7432
- "frequency": "weekly"
7433
- },
7434
- {
7435
- "key": "ORG_INFO",
7436
- "title": "Get org info + SF instance info + next major upgrade date",
7437
- "command": "sf hardis:org:diagnose:instanceupgrade",
7438
- "frequency": "weekly"
7439
- },
7440
- {
7441
- "key": "RELEASE_UPDATES",
7442
- "title": "Gather warnings about incoming and overdue Release Updates",
7443
- "command": "sf hardis:org:diagnose:releaseupdates",
7444
- "frequency": "weekly"
7445
- },
7446
- {
7447
- "key": "UNUSED_METADATAS",
7448
- "title": "Detect custom labels and custom permissions that are not in use",
7449
- "command": "sf hardis:lint:unusedmetadatas",
7450
- "frequency": "weekly"
7451
- },
7452
- {
7453
- "key": "UNUSED_APEX_CLASSES",
7454
- "title": "Detect unused Apex classes in an org",
7455
- "command": "sf hardis:org:diagnose:unused-apex-classes",
7456
- "frequency": "weekly"
7457
- },
7458
- {
7459
- "key": "CONNECTED_APPS",
7460
- "title": "Detect unused Connected Apps in an org",
7461
- "command": "sf hardis:org:diagnose:unused-connected-apps",
7462
- "frequency": "weekly"
7463
- },
7464
- {
7465
- "key": "METADATA_STATUS",
7466
- "title": "Detect inactive metadata",
7467
- "command": "sf hardis:lint:metadatastatus",
7468
- "frequency": "weekly"
7469
- },
7470
- {
7471
- "key": "MISSING_ATTRIBUTES",
7472
- "title": "Detect missing description on custom field",
7473
- "command": "sf hardis:lint:missingattributes",
7474
- "frequency": "weekly"
7475
- }
7476
- ],
7477
- "requiresProject": true,
7478
- "triggerNotification": true,
7479
- "isESM": true,
7480
- "relativePath": [
7481
- "lib",
7482
- "commands",
7483
- "hardis",
7484
- "org",
7485
- "monitor",
7486
- "all.js"
7485
+ "monitor",
7486
+ "all.js"
7487
7487
  ],
7488
7488
  "aliasPermutations": [],
7489
7489
  "permutations": [
@@ -8057,113 +8057,6 @@
8057
8057
  "flow:purge:org:hardis"
8058
8058
  ]
8059
8059
  },
8060
- "hardis:org:retrieve:packageconfig": {
8061
- "aliases": [],
8062
- "args": {},
8063
- "description": "\n**Retrieves the installed package configuration from a Salesforce org and optionally updates the local project configuration.**\n\nThis command is useful for maintaining an accurate record of installed packages within your Salesforce project, which is crucial for managing dependencies and ensuring consistent deployments across environments.\n\nKey functionalities:\n\n- **Package Listing:** Connects to a specified Salesforce org (or prompts for one if not provided) and retrieves a list of all installed packages.\n- **Configuration Update:** Offers the option to update your local project's configuration with the retrieved list of installed packages. This can be beneficial for automating package installations during environment setup or CI/CD processes.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **Org Connection:** It establishes a connection to the target Salesforce org using the provided or prompted username.\n- **Metadata Retrieval:** It utilizes `MetadataUtils.listInstalledPackages` to query the Salesforce org and obtain details about the installed packages.\n- **Interactive Prompt:** It uses the `prompts` library to ask the user whether they want to update their local project configuration with the retrieved package list.\n- **Configuration Management:** If the user confirms, it calls `managePackageConfig` to update the project's configuration file (likely `.sfdx-hardis.yml`) with the new package information.\n- **User Feedback:** Provides clear messages to the user about the success of the package retrieval and configuration update.\n</details>\n",
8064
- "examples": [
8065
- "$ sf hardis:org:retrieve:packageconfig",
8066
- "sf hardis:org:retrieve:packageconfig -u myOrg"
8067
- ],
8068
- "flags": {
8069
- "json": {
8070
- "description": "Format output as json.",
8071
- "helpGroup": "GLOBAL",
8072
- "name": "json",
8073
- "allowNo": false,
8074
- "type": "boolean"
8075
- },
8076
- "flags-dir": {
8077
- "helpGroup": "GLOBAL",
8078
- "name": "flags-dir",
8079
- "summary": "Import flag values from a directory.",
8080
- "hasDynamicHelp": false,
8081
- "multiple": false,
8082
- "type": "option"
8083
- },
8084
- "debug": {
8085
- "char": "d",
8086
- "description": "Activate debug mode (more logs)",
8087
- "name": "debug",
8088
- "allowNo": false,
8089
- "type": "boolean"
8090
- },
8091
- "websocket": {
8092
- "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
8093
- "name": "websocket",
8094
- "hasDynamicHelp": false,
8095
- "multiple": false,
8096
- "type": "option"
8097
- },
8098
- "skipauth": {
8099
- "description": "Skip authentication check when a default username is required",
8100
- "name": "skipauth",
8101
- "allowNo": false,
8102
- "type": "boolean"
8103
- },
8104
- "target-org": {
8105
- "aliases": [
8106
- "targetusername",
8107
- "u"
8108
- ],
8109
- "char": "o",
8110
- "deprecateAliases": true,
8111
- "name": "target-org",
8112
- "noCacheDefault": true,
8113
- "required": true,
8114
- "summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
8115
- "hasDynamicHelp": true,
8116
- "multiple": false,
8117
- "type": "option"
8118
- }
8119
- },
8120
- "hasDynamicHelp": true,
8121
- "hiddenAliases": [],
8122
- "id": "hardis:org:retrieve:packageconfig",
8123
- "pluginAlias": "sfdx-hardis",
8124
- "pluginName": "sfdx-hardis",
8125
- "pluginType": "core",
8126
- "strict": true,
8127
- "enableJsonFlag": true,
8128
- "title": "Retrieve package configuration from an org",
8129
- "requiresProject": false,
8130
- "isESM": true,
8131
- "relativePath": [
8132
- "lib",
8133
- "commands",
8134
- "hardis",
8135
- "org",
8136
- "retrieve",
8137
- "packageconfig.js"
8138
- ],
8139
- "aliasPermutations": [],
8140
- "permutations": [
8141
- "hardis:org:retrieve:packageconfig",
8142
- "org:hardis:retrieve:packageconfig",
8143
- "org:retrieve:hardis:packageconfig",
8144
- "org:retrieve:packageconfig:hardis",
8145
- "hardis:retrieve:org:packageconfig",
8146
- "retrieve:hardis:org:packageconfig",
8147
- "retrieve:org:hardis:packageconfig",
8148
- "retrieve:org:packageconfig:hardis",
8149
- "hardis:retrieve:packageconfig:org",
8150
- "retrieve:hardis:packageconfig:org",
8151
- "retrieve:packageconfig:hardis:org",
8152
- "retrieve:packageconfig:org:hardis",
8153
- "hardis:org:packageconfig:retrieve",
8154
- "org:hardis:packageconfig:retrieve",
8155
- "org:packageconfig:hardis:retrieve",
8156
- "org:packageconfig:retrieve:hardis",
8157
- "hardis:packageconfig:org:retrieve",
8158
- "packageconfig:hardis:org:retrieve",
8159
- "packageconfig:org:hardis:retrieve",
8160
- "packageconfig:org:retrieve:hardis",
8161
- "hardis:packageconfig:retrieve:org",
8162
- "packageconfig:hardis:retrieve:org",
8163
- "packageconfig:retrieve:hardis:org",
8164
- "packageconfig:retrieve:org:hardis"
8165
- ]
8166
- },
8167
8060
  "hardis:org:refresh:after-refresh": {
8168
8061
  "aliases": [],
8169
8062
  "args": {},
@@ -8403,6 +8296,113 @@
8403
8296
  "before-refresh:refresh:org:hardis"
8404
8297
  ]
8405
8298
  },
8299
+ "hardis:org:retrieve:packageconfig": {
8300
+ "aliases": [],
8301
+ "args": {},
8302
+ "description": "\n**Retrieves the installed package configuration from a Salesforce org and optionally updates the local project configuration.**\n\nThis command is useful for maintaining an accurate record of installed packages within your Salesforce project, which is crucial for managing dependencies and ensuring consistent deployments across environments.\n\nKey functionalities:\n\n- **Package Listing:** Connects to a specified Salesforce org (or prompts for one if not provided) and retrieves a list of all installed packages.\n- **Configuration Update:** Offers the option to update your local project's configuration with the retrieved list of installed packages. This can be beneficial for automating package installations during environment setup or CI/CD processes.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **Org Connection:** It establishes a connection to the target Salesforce org using the provided or prompted username.\n- **Metadata Retrieval:** It utilizes `MetadataUtils.listInstalledPackages` to query the Salesforce org and obtain details about the installed packages.\n- **Interactive Prompt:** It uses the `prompts` library to ask the user whether they want to update their local project configuration with the retrieved package list.\n- **Configuration Management:** If the user confirms, it calls `managePackageConfig` to update the project's configuration file (likely `.sfdx-hardis.yml`) with the new package information.\n- **User Feedback:** Provides clear messages to the user about the success of the package retrieval and configuration update.\n</details>\n",
8303
+ "examples": [
8304
+ "$ sf hardis:org:retrieve:packageconfig",
8305
+ "sf hardis:org:retrieve:packageconfig -u myOrg"
8306
+ ],
8307
+ "flags": {
8308
+ "json": {
8309
+ "description": "Format output as json.",
8310
+ "helpGroup": "GLOBAL",
8311
+ "name": "json",
8312
+ "allowNo": false,
8313
+ "type": "boolean"
8314
+ },
8315
+ "flags-dir": {
8316
+ "helpGroup": "GLOBAL",
8317
+ "name": "flags-dir",
8318
+ "summary": "Import flag values from a directory.",
8319
+ "hasDynamicHelp": false,
8320
+ "multiple": false,
8321
+ "type": "option"
8322
+ },
8323
+ "debug": {
8324
+ "char": "d",
8325
+ "description": "Activate debug mode (more logs)",
8326
+ "name": "debug",
8327
+ "allowNo": false,
8328
+ "type": "boolean"
8329
+ },
8330
+ "websocket": {
8331
+ "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
8332
+ "name": "websocket",
8333
+ "hasDynamicHelp": false,
8334
+ "multiple": false,
8335
+ "type": "option"
8336
+ },
8337
+ "skipauth": {
8338
+ "description": "Skip authentication check when a default username is required",
8339
+ "name": "skipauth",
8340
+ "allowNo": false,
8341
+ "type": "boolean"
8342
+ },
8343
+ "target-org": {
8344
+ "aliases": [
8345
+ "targetusername",
8346
+ "u"
8347
+ ],
8348
+ "char": "o",
8349
+ "deprecateAliases": true,
8350
+ "name": "target-org",
8351
+ "noCacheDefault": true,
8352
+ "required": true,
8353
+ "summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
8354
+ "hasDynamicHelp": true,
8355
+ "multiple": false,
8356
+ "type": "option"
8357
+ }
8358
+ },
8359
+ "hasDynamicHelp": true,
8360
+ "hiddenAliases": [],
8361
+ "id": "hardis:org:retrieve:packageconfig",
8362
+ "pluginAlias": "sfdx-hardis",
8363
+ "pluginName": "sfdx-hardis",
8364
+ "pluginType": "core",
8365
+ "strict": true,
8366
+ "enableJsonFlag": true,
8367
+ "title": "Retrieve package configuration from an org",
8368
+ "requiresProject": false,
8369
+ "isESM": true,
8370
+ "relativePath": [
8371
+ "lib",
8372
+ "commands",
8373
+ "hardis",
8374
+ "org",
8375
+ "retrieve",
8376
+ "packageconfig.js"
8377
+ ],
8378
+ "aliasPermutations": [],
8379
+ "permutations": [
8380
+ "hardis:org:retrieve:packageconfig",
8381
+ "org:hardis:retrieve:packageconfig",
8382
+ "org:retrieve:hardis:packageconfig",
8383
+ "org:retrieve:packageconfig:hardis",
8384
+ "hardis:retrieve:org:packageconfig",
8385
+ "retrieve:hardis:org:packageconfig",
8386
+ "retrieve:org:hardis:packageconfig",
8387
+ "retrieve:org:packageconfig:hardis",
8388
+ "hardis:retrieve:packageconfig:org",
8389
+ "retrieve:hardis:packageconfig:org",
8390
+ "retrieve:packageconfig:hardis:org",
8391
+ "retrieve:packageconfig:org:hardis",
8392
+ "hardis:org:packageconfig:retrieve",
8393
+ "org:hardis:packageconfig:retrieve",
8394
+ "org:packageconfig:hardis:retrieve",
8395
+ "org:packageconfig:retrieve:hardis",
8396
+ "hardis:packageconfig:org:retrieve",
8397
+ "packageconfig:hardis:org:retrieve",
8398
+ "packageconfig:org:hardis:retrieve",
8399
+ "packageconfig:org:retrieve:hardis",
8400
+ "hardis:packageconfig:retrieve:org",
8401
+ "packageconfig:hardis:retrieve:org",
8402
+ "packageconfig:retrieve:hardis:org",
8403
+ "packageconfig:retrieve:org:hardis"
8404
+ ]
8405
+ },
8406
8406
  "hardis:org:test:apex": {
8407
8407
  "aliases": [],
8408
8408
  "args": {},
@@ -9664,262 +9664,30 @@
9664
9664
  ],
9665
9665
  "aliasPermutations": [],
9666
9666
  "permutations": [
9667
- "hardis:project:audit:remotesites",
9668
- "project:hardis:audit:remotesites",
9669
- "project:audit:hardis:remotesites",
9670
- "project:audit:remotesites:hardis",
9671
- "hardis:audit:project:remotesites",
9672
- "audit:hardis:project:remotesites",
9673
- "audit:project:hardis:remotesites",
9674
- "audit:project:remotesites:hardis",
9675
- "hardis:audit:remotesites:project",
9676
- "audit:hardis:remotesites:project",
9677
- "audit:remotesites:hardis:project",
9678
- "audit:remotesites:project:hardis",
9679
- "hardis:project:remotesites:audit",
9680
- "project:hardis:remotesites:audit",
9681
- "project:remotesites:hardis:audit",
9682
- "project:remotesites:audit:hardis",
9683
- "hardis:remotesites:project:audit",
9684
- "remotesites:hardis:project:audit",
9685
- "remotesites:project:hardis:audit",
9686
- "remotesites:project:audit:hardis",
9687
- "hardis:remotesites:audit:project",
9688
- "remotesites:hardis:audit:project",
9689
- "remotesites:audit:hardis:project",
9690
- "remotesites:audit:project:hardis"
9691
- ]
9692
- },
9693
- "hardis:project:configure:auth": {
9694
- "aliases": [],
9695
- "args": {},
9696
- "description": "\n## Command Behavior\n\n**Configures authentication between a Git branch and a target Salesforce org for CI/CD deployments.**\n\nThis command facilitates the setup of automated CI/CD pipelines, enabling seamless deployments from specific Git branches to designated Salesforce orgs. It supports both standard Salesforce orgs and Dev Hub configurations, catering to various enterprise deployment workflows.\n\nKey functionalities include:\n\n- **Org Selection/Login:** Guides the user to select an existing Salesforce org or log in to a new one.\n- **Git Branch Association:** Allows associating a specific Git branch with the chosen Salesforce org.\n- **Merge Target Definition:** Enables defining target Git branches into which the configured branch can merge, ensuring controlled deployment flows.\n- **Salesforce Username Configuration:** Prompts for the Salesforce username to be used by the CI server for deployments.\n- **SSL Certificate Generation:** Automatically generates an SSL certificate for secure authentication.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's implementation involves several key technical aspects:\n\n- **SF CLI Integration:** Utilizes \n@salesforce/sf-plugins-core\n for command structure and flag parsing.\n- **Interactive Prompts:** Employs the \nprompts\n library for interactive user input, guiding the configuration process.\n- **Git Integration:** Interacts with Git to retrieve branch information using \n`git().branch([\"--list\", \"-r\"])`\n.\n- **Configuration Management:** Leverages internal utilities (`checkConfig`, `getConfig`, `setConfig`, `setInConfigFile`) to read from and write to project-specific configuration files (e.g., `.sfdx-hardis.<branchName>.yml`).\n- **Salesforce CLI Execution:** Executes Salesforce CLI commands programmatically via `execSfdxJson` for org interactions.\n- **SSL Certificate Generation:** Calls `generateSSLCertificate` to create necessary SSL certificates for JWT-based authentication.\n- **WebSocket Communication:** Uses `WebSocketClient` for potential communication with external tools or processes, such as restarting the command in VS Code.\n- **Dependency Check:** Ensures the presence of `openssl` on the system, which is required for SSL certificate generation.\n",
9697
- "examples": [
9698
- "$ sf hardis:project:configure:auth"
9699
- ],
9700
- "flags": {
9701
- "json": {
9702
- "description": "Format output as json.",
9703
- "helpGroup": "GLOBAL",
9704
- "name": "json",
9705
- "allowNo": false,
9706
- "type": "boolean"
9707
- },
9708
- "flags-dir": {
9709
- "helpGroup": "GLOBAL",
9710
- "name": "flags-dir",
9711
- "summary": "Import flag values from a directory.",
9712
- "hasDynamicHelp": false,
9713
- "multiple": false,
9714
- "type": "option"
9715
- },
9716
- "devhub": {
9717
- "char": "b",
9718
- "description": "Configure project DevHub",
9719
- "name": "devhub",
9720
- "allowNo": false,
9721
- "type": "boolean"
9722
- },
9723
- "debug": {
9724
- "char": "d",
9725
- "description": "Activate debug mode (more logs)",
9726
- "name": "debug",
9727
- "allowNo": false,
9728
- "type": "boolean"
9729
- },
9730
- "websocket": {
9731
- "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
9732
- "name": "websocket",
9733
- "hasDynamicHelp": false,
9734
- "multiple": false,
9735
- "type": "option"
9736
- },
9737
- "skipauth": {
9738
- "description": "Skip authentication check when a default username is required",
9739
- "name": "skipauth",
9740
- "allowNo": false,
9741
- "type": "boolean"
9742
- },
9743
- "target-org": {
9744
- "aliases": [
9745
- "targetusername",
9746
- "u"
9747
- ],
9748
- "char": "o",
9749
- "deprecateAliases": true,
9750
- "name": "target-org",
9751
- "noCacheDefault": true,
9752
- "summary": "Username or alias of the target org.",
9753
- "hasDynamicHelp": true,
9754
- "multiple": false,
9755
- "type": "option"
9756
- },
9757
- "target-dev-hub": {
9758
- "aliases": [
9759
- "targetdevhubusername"
9760
- ],
9761
- "char": "v",
9762
- "deprecateAliases": true,
9763
- "name": "target-dev-hub",
9764
- "noCacheDefault": true,
9765
- "required": false,
9766
- "summary": "Username or alias of the Dev Hub org.",
9767
- "hasDynamicHelp": true,
9768
- "multiple": false,
9769
- "type": "option"
9770
- }
9771
- },
9772
- "hasDynamicHelp": true,
9773
- "hiddenAliases": [],
9774
- "id": "hardis:project:configure:auth",
9775
- "pluginAlias": "sfdx-hardis",
9776
- "pluginName": "sfdx-hardis",
9777
- "pluginType": "core",
9778
- "strict": true,
9779
- "enableJsonFlag": true,
9780
- "title": "Configure authentication",
9781
- "requiresProject": false,
9782
- "requiresDependencies": [
9783
- "openssl"
9784
- ],
9785
- "isESM": true,
9786
- "relativePath": [
9787
- "lib",
9788
- "commands",
9789
- "hardis",
9790
- "project",
9791
- "configure",
9792
- "auth.js"
9793
- ],
9794
- "aliasPermutations": [],
9795
- "permutations": [
9796
- "hardis:project:configure:auth",
9797
- "project:hardis:configure:auth",
9798
- "project:configure:hardis:auth",
9799
- "project:configure:auth:hardis",
9800
- "hardis:configure:project:auth",
9801
- "configure:hardis:project:auth",
9802
- "configure:project:hardis:auth",
9803
- "configure:project:auth:hardis",
9804
- "hardis:configure:auth:project",
9805
- "configure:hardis:auth:project",
9806
- "configure:auth:hardis:project",
9807
- "configure:auth:project:hardis",
9808
- "hardis:project:auth:configure",
9809
- "project:hardis:auth:configure",
9810
- "project:auth:hardis:configure",
9811
- "project:auth:configure:hardis",
9812
- "hardis:auth:project:configure",
9813
- "auth:hardis:project:configure",
9814
- "auth:project:hardis:configure",
9815
- "auth:project:configure:hardis",
9816
- "hardis:auth:configure:project",
9817
- "auth:hardis:configure:project",
9818
- "auth:configure:hardis:project",
9819
- "auth:configure:project:hardis"
9820
- ]
9821
- },
9822
- "hardis:project:convert:profilestopermsets": {
9823
- "aliases": [],
9824
- "args": {},
9825
- "description": "\n## Command Behavior\n\n**Converts existing Salesforce Profiles into Permission Sets, facilitating a more granular and recommended security model.**\n\nThis command helps in migrating permissions from Profiles to Permission Sets, which is a best practice for managing user access in Salesforce. It creates a new Permission Set for each specified Profile, adopting a naming convention of `PS_PROFILENAME`.\n\nKey functionalities:\n\n- **Profile to Permission Set Conversion:** Automatically extracts permissions from a Profile and creates a corresponding Permission Set.\n- **Naming Convention:** New Permission Sets are named with a `PS_` prefix followed by the Profile name (e.g., `PS_Standard_User`).\n- **Exclusion Filter:** Allows you to exclude specific Profiles from the conversion process using the `--except` flag.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **External Plugin Integration:** It relies on the `shane-sfdx-plugins` (specifically the `sf shane:profile:convert` command) to perform the actual conversion.\n- **File System Scan:** It reads the contents of the `force-app/main/default/profiles` directory to identify all available Profile metadata files.\n- **Command Execution:** For each identified Profile (that is not excluded), it constructs and executes the `sf shane:profile:convert` command with the appropriate Profile name and desired Permission Set name.\n- **Error Handling:** Includes basic error handling for the external command execution.\n</details>\n",
9826
- "examples": [
9827
- "$ sf hardis:project:convert:profilestopermsets"
9828
- ],
9829
- "flags": {
9830
- "json": {
9831
- "description": "Format output as json.",
9832
- "helpGroup": "GLOBAL",
9833
- "name": "json",
9834
- "allowNo": false,
9835
- "type": "boolean"
9836
- },
9837
- "flags-dir": {
9838
- "helpGroup": "GLOBAL",
9839
- "name": "flags-dir",
9840
- "summary": "Import flag values from a directory.",
9841
- "hasDynamicHelp": false,
9842
- "multiple": false,
9843
- "type": "option"
9844
- },
9845
- "except": {
9846
- "char": "e",
9847
- "description": "List of filters",
9848
- "name": "except",
9849
- "default": [],
9850
- "hasDynamicHelp": false,
9851
- "multiple": true,
9852
- "type": "option"
9853
- },
9854
- "debug": {
9855
- "char": "d",
9856
- "description": "Activate debug mode (more logs)",
9857
- "name": "debug",
9858
- "allowNo": false,
9859
- "type": "boolean"
9860
- },
9861
- "websocket": {
9862
- "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
9863
- "name": "websocket",
9864
- "hasDynamicHelp": false,
9865
- "multiple": false,
9866
- "type": "option"
9867
- },
9868
- "skipauth": {
9869
- "description": "Skip authentication check when a default username is required",
9870
- "name": "skipauth",
9871
- "allowNo": false,
9872
- "type": "boolean"
9873
- }
9874
- },
9875
- "hasDynamicHelp": false,
9876
- "hiddenAliases": [],
9877
- "id": "hardis:project:convert:profilestopermsets",
9878
- "pluginAlias": "sfdx-hardis",
9879
- "pluginName": "sfdx-hardis",
9880
- "pluginType": "core",
9881
- "strict": true,
9882
- "enableJsonFlag": true,
9883
- "title": "Convert Profiles into Permission Sets",
9884
- "requiresProject": true,
9885
- "requiresSfdxPlugins": [
9886
- "shane-sfdx-plugins"
9887
- ],
9888
- "isESM": true,
9889
- "relativePath": [
9890
- "lib",
9891
- "commands",
9892
- "hardis",
9893
- "project",
9894
- "convert",
9895
- "profilestopermsets.js"
9896
- ],
9897
- "aliasPermutations": [],
9898
- "permutations": [
9899
- "hardis:project:convert:profilestopermsets",
9900
- "project:hardis:convert:profilestopermsets",
9901
- "project:convert:hardis:profilestopermsets",
9902
- "project:convert:profilestopermsets:hardis",
9903
- "hardis:convert:project:profilestopermsets",
9904
- "convert:hardis:project:profilestopermsets",
9905
- "convert:project:hardis:profilestopermsets",
9906
- "convert:project:profilestopermsets:hardis",
9907
- "hardis:convert:profilestopermsets:project",
9908
- "convert:hardis:profilestopermsets:project",
9909
- "convert:profilestopermsets:hardis:project",
9910
- "convert:profilestopermsets:project:hardis",
9911
- "hardis:project:profilestopermsets:convert",
9912
- "project:hardis:profilestopermsets:convert",
9913
- "project:profilestopermsets:hardis:convert",
9914
- "project:profilestopermsets:convert:hardis",
9915
- "hardis:profilestopermsets:project:convert",
9916
- "profilestopermsets:hardis:project:convert",
9917
- "profilestopermsets:project:hardis:convert",
9918
- "profilestopermsets:project:convert:hardis",
9919
- "hardis:profilestopermsets:convert:project",
9920
- "profilestopermsets:hardis:convert:project",
9921
- "profilestopermsets:convert:hardis:project",
9922
- "profilestopermsets:convert:project:hardis"
9667
+ "hardis:project:audit:remotesites",
9668
+ "project:hardis:audit:remotesites",
9669
+ "project:audit:hardis:remotesites",
9670
+ "project:audit:remotesites:hardis",
9671
+ "hardis:audit:project:remotesites",
9672
+ "audit:hardis:project:remotesites",
9673
+ "audit:project:hardis:remotesites",
9674
+ "audit:project:remotesites:hardis",
9675
+ "hardis:audit:remotesites:project",
9676
+ "audit:hardis:remotesites:project",
9677
+ "audit:remotesites:hardis:project",
9678
+ "audit:remotesites:project:hardis",
9679
+ "hardis:project:remotesites:audit",
9680
+ "project:hardis:remotesites:audit",
9681
+ "project:remotesites:hardis:audit",
9682
+ "project:remotesites:audit:hardis",
9683
+ "hardis:remotesites:project:audit",
9684
+ "remotesites:hardis:project:audit",
9685
+ "remotesites:project:hardis:audit",
9686
+ "remotesites:project:audit:hardis",
9687
+ "hardis:remotesites:audit:project",
9688
+ "remotesites:hardis:audit:project",
9689
+ "remotesites:audit:hardis:project",
9690
+ "remotesites:audit:project:hardis"
9923
9691
  ]
9924
9692
  },
9925
9693
  "hardis:project:clean:emptyitems": {
@@ -11407,6 +11175,238 @@
11407
11175
  "xml:clean:project:hardis"
11408
11176
  ]
11409
11177
  },
11178
+ "hardis:project:configure:auth": {
11179
+ "aliases": [],
11180
+ "args": {},
11181
+ "description": "\n## Command Behavior\n\n**Configures authentication between a Git branch and a target Salesforce org for CI/CD deployments.**\n\nThis command facilitates the setup of automated CI/CD pipelines, enabling seamless deployments from specific Git branches to designated Salesforce orgs. It supports both standard Salesforce orgs and Dev Hub configurations, catering to various enterprise deployment workflows.\n\nKey functionalities include:\n\n- **Org Selection/Login:** Guides the user to select an existing Salesforce org or log in to a new one.\n- **Git Branch Association:** Allows associating a specific Git branch with the chosen Salesforce org.\n- **Merge Target Definition:** Enables defining target Git branches into which the configured branch can merge, ensuring controlled deployment flows.\n- **Salesforce Username Configuration:** Prompts for the Salesforce username to be used by the CI server for deployments.\n- **SSL Certificate Generation:** Automatically generates an SSL certificate for secure authentication.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's implementation involves several key technical aspects:\n\n- **SF CLI Integration:** Utilizes \n@salesforce/sf-plugins-core\n for command structure and flag parsing.\n- **Interactive Prompts:** Employs the \nprompts\n library for interactive user input, guiding the configuration process.\n- **Git Integration:** Interacts with Git to retrieve branch information using \n`git().branch([\"--list\", \"-r\"])`\n.\n- **Configuration Management:** Leverages internal utilities (`checkConfig`, `getConfig`, `setConfig`, `setInConfigFile`) to read from and write to project-specific configuration files (e.g., `.sfdx-hardis.<branchName>.yml`).\n- **Salesforce CLI Execution:** Executes Salesforce CLI commands programmatically via `execSfdxJson` for org interactions.\n- **SSL Certificate Generation:** Calls `generateSSLCertificate` to create necessary SSL certificates for JWT-based authentication.\n- **WebSocket Communication:** Uses `WebSocketClient` for potential communication with external tools or processes, such as restarting the command in VS Code.\n- **Dependency Check:** Ensures the presence of `openssl` on the system, which is required for SSL certificate generation.\n",
11182
+ "examples": [
11183
+ "$ sf hardis:project:configure:auth"
11184
+ ],
11185
+ "flags": {
11186
+ "json": {
11187
+ "description": "Format output as json.",
11188
+ "helpGroup": "GLOBAL",
11189
+ "name": "json",
11190
+ "allowNo": false,
11191
+ "type": "boolean"
11192
+ },
11193
+ "flags-dir": {
11194
+ "helpGroup": "GLOBAL",
11195
+ "name": "flags-dir",
11196
+ "summary": "Import flag values from a directory.",
11197
+ "hasDynamicHelp": false,
11198
+ "multiple": false,
11199
+ "type": "option"
11200
+ },
11201
+ "devhub": {
11202
+ "char": "b",
11203
+ "description": "Configure project DevHub",
11204
+ "name": "devhub",
11205
+ "allowNo": false,
11206
+ "type": "boolean"
11207
+ },
11208
+ "debug": {
11209
+ "char": "d",
11210
+ "description": "Activate debug mode (more logs)",
11211
+ "name": "debug",
11212
+ "allowNo": false,
11213
+ "type": "boolean"
11214
+ },
11215
+ "websocket": {
11216
+ "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
11217
+ "name": "websocket",
11218
+ "hasDynamicHelp": false,
11219
+ "multiple": false,
11220
+ "type": "option"
11221
+ },
11222
+ "skipauth": {
11223
+ "description": "Skip authentication check when a default username is required",
11224
+ "name": "skipauth",
11225
+ "allowNo": false,
11226
+ "type": "boolean"
11227
+ },
11228
+ "target-org": {
11229
+ "aliases": [
11230
+ "targetusername",
11231
+ "u"
11232
+ ],
11233
+ "char": "o",
11234
+ "deprecateAliases": true,
11235
+ "name": "target-org",
11236
+ "noCacheDefault": true,
11237
+ "summary": "Username or alias of the target org.",
11238
+ "hasDynamicHelp": true,
11239
+ "multiple": false,
11240
+ "type": "option"
11241
+ },
11242
+ "target-dev-hub": {
11243
+ "aliases": [
11244
+ "targetdevhubusername"
11245
+ ],
11246
+ "char": "v",
11247
+ "deprecateAliases": true,
11248
+ "name": "target-dev-hub",
11249
+ "noCacheDefault": true,
11250
+ "required": false,
11251
+ "summary": "Username or alias of the Dev Hub org.",
11252
+ "hasDynamicHelp": true,
11253
+ "multiple": false,
11254
+ "type": "option"
11255
+ }
11256
+ },
11257
+ "hasDynamicHelp": true,
11258
+ "hiddenAliases": [],
11259
+ "id": "hardis:project:configure:auth",
11260
+ "pluginAlias": "sfdx-hardis",
11261
+ "pluginName": "sfdx-hardis",
11262
+ "pluginType": "core",
11263
+ "strict": true,
11264
+ "enableJsonFlag": true,
11265
+ "title": "Configure authentication",
11266
+ "requiresProject": false,
11267
+ "requiresDependencies": [
11268
+ "openssl"
11269
+ ],
11270
+ "isESM": true,
11271
+ "relativePath": [
11272
+ "lib",
11273
+ "commands",
11274
+ "hardis",
11275
+ "project",
11276
+ "configure",
11277
+ "auth.js"
11278
+ ],
11279
+ "aliasPermutations": [],
11280
+ "permutations": [
11281
+ "hardis:project:configure:auth",
11282
+ "project:hardis:configure:auth",
11283
+ "project:configure:hardis:auth",
11284
+ "project:configure:auth:hardis",
11285
+ "hardis:configure:project:auth",
11286
+ "configure:hardis:project:auth",
11287
+ "configure:project:hardis:auth",
11288
+ "configure:project:auth:hardis",
11289
+ "hardis:configure:auth:project",
11290
+ "configure:hardis:auth:project",
11291
+ "configure:auth:hardis:project",
11292
+ "configure:auth:project:hardis",
11293
+ "hardis:project:auth:configure",
11294
+ "project:hardis:auth:configure",
11295
+ "project:auth:hardis:configure",
11296
+ "project:auth:configure:hardis",
11297
+ "hardis:auth:project:configure",
11298
+ "auth:hardis:project:configure",
11299
+ "auth:project:hardis:configure",
11300
+ "auth:project:configure:hardis",
11301
+ "hardis:auth:configure:project",
11302
+ "auth:hardis:configure:project",
11303
+ "auth:configure:hardis:project",
11304
+ "auth:configure:project:hardis"
11305
+ ]
11306
+ },
11307
+ "hardis:project:convert:profilestopermsets": {
11308
+ "aliases": [],
11309
+ "args": {},
11310
+ "description": "\n## Command Behavior\n\n**Converts existing Salesforce Profiles into Permission Sets, facilitating a more granular and recommended security model.**\n\nThis command helps in migrating permissions from Profiles to Permission Sets, which is a best practice for managing user access in Salesforce. It creates a new Permission Set for each specified Profile, adopting a naming convention of `PS_PROFILENAME`.\n\nKey functionalities:\n\n- **Profile to Permission Set Conversion:** Automatically extracts permissions from a Profile and creates a corresponding Permission Set.\n- **Naming Convention:** New Permission Sets are named with a `PS_` prefix followed by the Profile name (e.g., `PS_Standard_User`).\n- **Exclusion Filter:** Allows you to exclude specific Profiles from the conversion process using the `--except` flag.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **External Plugin Integration:** It relies on the `shane-sfdx-plugins` (specifically the `sf shane:profile:convert` command) to perform the actual conversion.\n- **File System Scan:** It reads the contents of the `force-app/main/default/profiles` directory to identify all available Profile metadata files.\n- **Command Execution:** For each identified Profile (that is not excluded), it constructs and executes the `sf shane:profile:convert` command with the appropriate Profile name and desired Permission Set name.\n- **Error Handling:** Includes basic error handling for the external command execution.\n</details>\n",
11311
+ "examples": [
11312
+ "$ sf hardis:project:convert:profilestopermsets"
11313
+ ],
11314
+ "flags": {
11315
+ "json": {
11316
+ "description": "Format output as json.",
11317
+ "helpGroup": "GLOBAL",
11318
+ "name": "json",
11319
+ "allowNo": false,
11320
+ "type": "boolean"
11321
+ },
11322
+ "flags-dir": {
11323
+ "helpGroup": "GLOBAL",
11324
+ "name": "flags-dir",
11325
+ "summary": "Import flag values from a directory.",
11326
+ "hasDynamicHelp": false,
11327
+ "multiple": false,
11328
+ "type": "option"
11329
+ },
11330
+ "except": {
11331
+ "char": "e",
11332
+ "description": "List of filters",
11333
+ "name": "except",
11334
+ "default": [],
11335
+ "hasDynamicHelp": false,
11336
+ "multiple": true,
11337
+ "type": "option"
11338
+ },
11339
+ "debug": {
11340
+ "char": "d",
11341
+ "description": "Activate debug mode (more logs)",
11342
+ "name": "debug",
11343
+ "allowNo": false,
11344
+ "type": "boolean"
11345
+ },
11346
+ "websocket": {
11347
+ "description": "Websocket host:port for VsCode SFDX Hardis UI integration",
11348
+ "name": "websocket",
11349
+ "hasDynamicHelp": false,
11350
+ "multiple": false,
11351
+ "type": "option"
11352
+ },
11353
+ "skipauth": {
11354
+ "description": "Skip authentication check when a default username is required",
11355
+ "name": "skipauth",
11356
+ "allowNo": false,
11357
+ "type": "boolean"
11358
+ }
11359
+ },
11360
+ "hasDynamicHelp": false,
11361
+ "hiddenAliases": [],
11362
+ "id": "hardis:project:convert:profilestopermsets",
11363
+ "pluginAlias": "sfdx-hardis",
11364
+ "pluginName": "sfdx-hardis",
11365
+ "pluginType": "core",
11366
+ "strict": true,
11367
+ "enableJsonFlag": true,
11368
+ "title": "Convert Profiles into Permission Sets",
11369
+ "requiresProject": true,
11370
+ "requiresSfdxPlugins": [
11371
+ "shane-sfdx-plugins"
11372
+ ],
11373
+ "isESM": true,
11374
+ "relativePath": [
11375
+ "lib",
11376
+ "commands",
11377
+ "hardis",
11378
+ "project",
11379
+ "convert",
11380
+ "profilestopermsets.js"
11381
+ ],
11382
+ "aliasPermutations": [],
11383
+ "permutations": [
11384
+ "hardis:project:convert:profilestopermsets",
11385
+ "project:hardis:convert:profilestopermsets",
11386
+ "project:convert:hardis:profilestopermsets",
11387
+ "project:convert:profilestopermsets:hardis",
11388
+ "hardis:convert:project:profilestopermsets",
11389
+ "convert:hardis:project:profilestopermsets",
11390
+ "convert:project:hardis:profilestopermsets",
11391
+ "convert:project:profilestopermsets:hardis",
11392
+ "hardis:convert:profilestopermsets:project",
11393
+ "convert:hardis:profilestopermsets:project",
11394
+ "convert:profilestopermsets:hardis:project",
11395
+ "convert:profilestopermsets:project:hardis",
11396
+ "hardis:project:profilestopermsets:convert",
11397
+ "project:hardis:profilestopermsets:convert",
11398
+ "project:profilestopermsets:hardis:convert",
11399
+ "project:profilestopermsets:convert:hardis",
11400
+ "hardis:profilestopermsets:project:convert",
11401
+ "profilestopermsets:hardis:project:convert",
11402
+ "profilestopermsets:project:hardis:convert",
11403
+ "profilestopermsets:project:convert:hardis",
11404
+ "hardis:profilestopermsets:convert:project",
11405
+ "profilestopermsets:hardis:convert:project",
11406
+ "profilestopermsets:convert:hardis:project",
11407
+ "profilestopermsets:convert:project:hardis"
11408
+ ]
11409
+ },
11410
11410
  "hardis:project:deploy:notify": {
11411
11411
  "aliases": [],
11412
11412
  "args": {},
@@ -15370,5 +15370,5 @@
15370
15370
  ]
15371
15371
  }
15372
15372
  },
15373
- "version": "6.9.1-alpha202510260151.0"
15373
+ "version": "6.9.1-alpha202510261251.0"
15374
15374
  }