231 lines
6.7 KiB
JavaScript
231 lines
6.7 KiB
JavaScript
|
const Table = require('cli-table3')
|
||
|
const chalk = require('chalk')
|
||
|
const { v4: isCidrV4, v6: isCidrV6 } = require('is-cidr')
|
||
|
const log = require('../utils/log-shim.js')
|
||
|
const profile = require('npm-profile')
|
||
|
|
||
|
const otplease = require('../utils/otplease.js')
|
||
|
const pulseTillDone = require('../utils/pulse-till-done.js')
|
||
|
const readUserInfo = require('../utils/read-user-info.js')
|
||
|
|
||
|
const BaseCommand = require('../base-command.js')
|
||
|
class Token extends BaseCommand {
|
||
|
static description = 'Manage your authentication tokens'
|
||
|
static name = 'token'
|
||
|
static usage = ['list', 'revoke <id|token>', 'create [--read-only] [--cidr=list]']
|
||
|
static params = ['read-only', 'cidr', 'registry', 'otp']
|
||
|
|
||
|
async completion (opts) {
|
||
|
const argv = opts.conf.argv.remain
|
||
|
const subcommands = ['list', 'revoke', 'create']
|
||
|
if (argv.length === 2) {
|
||
|
return subcommands
|
||
|
}
|
||
|
|
||
|
if (subcommands.includes(argv[2])) {
|
||
|
return []
|
||
|
}
|
||
|
|
||
|
throw new Error(argv[2] + ' not recognized')
|
||
|
}
|
||
|
|
||
|
async exec (args) {
|
||
|
log.gauge.show('token')
|
||
|
if (args.length === 0) {
|
||
|
return this.list()
|
||
|
}
|
||
|
switch (args[0]) {
|
||
|
case 'list':
|
||
|
case 'ls':
|
||
|
return this.list()
|
||
|
case 'delete':
|
||
|
case 'revoke':
|
||
|
case 'remove':
|
||
|
case 'rm':
|
||
|
return this.rm(args.slice(1))
|
||
|
case 'create':
|
||
|
return this.create(args.slice(1))
|
||
|
default:
|
||
|
throw this.usageError(`${args[0]} is not a recognized subcommand.`)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
async list () {
|
||
|
const conf = this.config()
|
||
|
log.info('token', 'getting list')
|
||
|
const tokens = await pulseTillDone.withPromise(profile.listTokens(conf))
|
||
|
if (conf.json) {
|
||
|
this.npm.output(JSON.stringify(tokens, null, 2))
|
||
|
return
|
||
|
} else if (conf.parseable) {
|
||
|
this.npm.output(['key', 'token', 'created', 'readonly', 'CIDR whitelist'].join('\t'))
|
||
|
tokens.forEach(token => {
|
||
|
this.npm.output(
|
||
|
[
|
||
|
token.key,
|
||
|
token.token,
|
||
|
token.created,
|
||
|
token.readonly ? 'true' : 'false',
|
||
|
token.cidr_whitelist ? token.cidr_whitelist.join(',') : '',
|
||
|
].join('\t')
|
||
|
)
|
||
|
})
|
||
|
return
|
||
|
}
|
||
|
this.generateTokenIds(tokens, 6)
|
||
|
const idWidth = tokens.reduce((acc, token) => Math.max(acc, token.id.length), 0)
|
||
|
const table = new Table({
|
||
|
head: ['id', 'token', 'created', 'readonly', 'CIDR whitelist'],
|
||
|
colWidths: [Math.max(idWidth, 2) + 2, 9, 12, 10],
|
||
|
})
|
||
|
tokens.forEach(token => {
|
||
|
table.push([
|
||
|
token.id,
|
||
|
token.token + '…',
|
||
|
String(token.created).slice(0, 10),
|
||
|
token.readonly ? 'yes' : 'no',
|
||
|
token.cidr_whitelist ? token.cidr_whitelist.join(', ') : '',
|
||
|
])
|
||
|
})
|
||
|
this.npm.output(table.toString())
|
||
|
}
|
||
|
|
||
|
async rm (args) {
|
||
|
if (args.length === 0) {
|
||
|
throw this.usageError('`<tokenKey>` argument is required.')
|
||
|
}
|
||
|
|
||
|
const conf = this.config()
|
||
|
const toRemove = []
|
||
|
const progress = log.newItem('removing tokens', toRemove.length)
|
||
|
progress.info('token', 'getting existing list')
|
||
|
const tokens = await pulseTillDone.withPromise(profile.listTokens(conf))
|
||
|
args.forEach(id => {
|
||
|
const matches = tokens.filter(token => token.key.indexOf(id) === 0)
|
||
|
if (matches.length === 1) {
|
||
|
toRemove.push(matches[0].key)
|
||
|
} else if (matches.length > 1) {
|
||
|
throw new Error(
|
||
|
/* eslint-disable-next-line max-len */
|
||
|
`Token ID "${id}" was ambiguous, a new token may have been created since you last ran \`npm token list\`.`
|
||
|
)
|
||
|
} else {
|
||
|
const tokenMatches = tokens.some(t => id.indexOf(t.token) === 0)
|
||
|
if (!tokenMatches) {
|
||
|
throw new Error(`Unknown token id or value "${id}".`)
|
||
|
}
|
||
|
|
||
|
toRemove.push(id)
|
||
|
}
|
||
|
})
|
||
|
await Promise.all(
|
||
|
toRemove.map(key => {
|
||
|
return otplease(this.npm, conf, c => profile.removeToken(key, c))
|
||
|
})
|
||
|
)
|
||
|
if (conf.json) {
|
||
|
this.npm.output(JSON.stringify(toRemove))
|
||
|
} else if (conf.parseable) {
|
||
|
this.npm.output(toRemove.join('\t'))
|
||
|
} else {
|
||
|
this.npm.output('Removed ' + toRemove.length + ' token' + (toRemove.length !== 1 ? 's' : ''))
|
||
|
}
|
||
|
}
|
||
|
|
||
|
async create (args) {
|
||
|
const conf = this.config()
|
||
|
const cidr = conf.cidr
|
||
|
const readonly = conf.readOnly
|
||
|
|
||
|
const password = await readUserInfo.password()
|
||
|
const validCIDR = this.validateCIDRList(cidr)
|
||
|
log.info('token', 'creating')
|
||
|
const result = await pulseTillDone.withPromise(
|
||
|
otplease(this.npm, conf, c => profile.createToken(password, readonly, validCIDR, c))
|
||
|
)
|
||
|
delete result.key
|
||
|
delete result.updated
|
||
|
if (conf.json) {
|
||
|
this.npm.output(JSON.stringify(result))
|
||
|
} else if (conf.parseable) {
|
||
|
Object.keys(result).forEach(k => this.npm.output(k + '\t' + result[k]))
|
||
|
} else {
|
||
|
const table = new Table()
|
||
|
for (const k of Object.keys(result)) {
|
||
|
table.push({ [chalk.bold(k)]: String(result[k]) })
|
||
|
}
|
||
|
this.npm.output(table.toString())
|
||
|
}
|
||
|
}
|
||
|
|
||
|
config () {
|
||
|
const conf = { ...this.npm.flatOptions }
|
||
|
const creds = this.npm.config.getCredentialsByURI(conf.registry)
|
||
|
if (creds.token) {
|
||
|
conf.auth = { token: creds.token }
|
||
|
} else if (creds.username) {
|
||
|
conf.auth = {
|
||
|
basic: {
|
||
|
username: creds.username,
|
||
|
password: creds.password,
|
||
|
},
|
||
|
}
|
||
|
} else if (creds.auth) {
|
||
|
const auth = Buffer.from(creds.auth, 'base64').toString().split(':', 2)
|
||
|
conf.auth = {
|
||
|
basic: {
|
||
|
username: auth[0],
|
||
|
password: auth[1],
|
||
|
},
|
||
|
}
|
||
|
} else {
|
||
|
conf.auth = {}
|
||
|
}
|
||
|
|
||
|
if (conf.otp) {
|
||
|
conf.auth.otp = conf.otp
|
||
|
}
|
||
|
return conf
|
||
|
}
|
||
|
|
||
|
invalidCIDRError (msg) {
|
||
|
return Object.assign(new Error(msg), { code: 'EINVALIDCIDR' })
|
||
|
}
|
||
|
|
||
|
generateTokenIds (tokens, minLength) {
|
||
|
const byId = {}
|
||
|
for (const token of tokens) {
|
||
|
token.id = token.key
|
||
|
for (let ii = minLength; ii < token.key.length; ++ii) {
|
||
|
const match = tokens.some(
|
||
|
ot => ot !== token && ot.key.slice(0, ii) === token.key.slice(0, ii)
|
||
|
)
|
||
|
if (!match) {
|
||
|
token.id = token.key.slice(0, ii)
|
||
|
break
|
||
|
}
|
||
|
}
|
||
|
byId[token.id] = token
|
||
|
}
|
||
|
return byId
|
||
|
}
|
||
|
|
||
|
validateCIDRList (cidrs) {
|
||
|
const maybeList = [].concat(cidrs).filter(Boolean)
|
||
|
const list = maybeList.length === 1 ? maybeList[0].split(/,\s*/) : maybeList
|
||
|
for (const cidr of list) {
|
||
|
if (isCidrV6(cidr)) {
|
||
|
throw this.invalidCIDRError(
|
||
|
'CIDR whitelist can only contain IPv4 addresses, ' + cidr + ' is IPv6'
|
||
|
)
|
||
|
}
|
||
|
|
||
|
if (!isCidrV4(cidr)) {
|
||
|
throw this.invalidCIDRError('CIDR whitelist contains invalid CIDR entry: ' + cidr)
|
||
|
}
|
||
|
}
|
||
|
return list
|
||
|
}
|
||
|
}
|
||
|
module.exports = Token
|