@factiii/stack 0.1.91 → 0.1.94

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. package/dist/cli/fix.d.ts.map +1 -1
  2. package/dist/cli/fix.js +83 -52
  3. package/dist/cli/fix.js.map +1 -1
  4. package/dist/generators/generate-stack-yml.d.ts.map +1 -1
  5. package/dist/generators/generate-stack-yml.js +35 -2
  6. package/dist/generators/generate-stack-yml.js.map +1 -1
  7. package/dist/plugins/addons/auth/index.d.ts +56 -0
  8. package/dist/plugins/addons/auth/index.d.ts.map +1 -0
  9. package/dist/plugins/addons/auth/index.js +178 -0
  10. package/dist/plugins/addons/auth/index.js.map +1 -0
  11. package/dist/plugins/addons/auth/scanfix/secrets.d.ts +10 -0
  12. package/dist/plugins/addons/auth/scanfix/secrets.d.ts.map +1 -0
  13. package/dist/plugins/addons/auth/scanfix/secrets.js +205 -0
  14. package/dist/plugins/addons/auth/scanfix/secrets.js.map +1 -0
  15. package/dist/plugins/addons/auth/scanfix/setup.d.ts +12 -0
  16. package/dist/plugins/addons/auth/scanfix/setup.d.ts.map +1 -0
  17. package/dist/plugins/addons/auth/scanfix/setup.js +235 -0
  18. package/dist/plugins/addons/auth/scanfix/setup.js.map +1 -0
  19. package/dist/plugins/addons/auth/scanfix/validate.d.ts +9 -0
  20. package/dist/plugins/addons/auth/scanfix/validate.d.ts.map +1 -0
  21. package/dist/plugins/addons/auth/scanfix/validate.js +153 -0
  22. package/dist/plugins/addons/auth/scanfix/validate.js.map +1 -0
  23. package/dist/plugins/index.d.ts.map +1 -1
  24. package/dist/plugins/index.js +9 -0
  25. package/dist/plugins/index.js.map +1 -1
  26. package/dist/plugins/pipelines/factiii/scanfix/bootstrap.d.ts.map +1 -1
  27. package/dist/plugins/pipelines/factiii/scanfix/bootstrap.js +5 -1
  28. package/dist/plugins/pipelines/factiii/scanfix/bootstrap.js.map +1 -1
  29. package/dist/plugins/pipelines/factiii/scanfix/secrets.d.ts.map +1 -1
  30. package/dist/plugins/pipelines/factiii/scanfix/secrets.js +37 -27
  31. package/dist/plugins/pipelines/factiii/scanfix/secrets.js.map +1 -1
  32. package/package.json +1 -1
@@ -0,0 +1,205 @@
1
+ "use strict";
2
+ /**
3
+ * Auth Secrets Scanfixes
4
+ *
5
+ * Manages authentication secrets in Ansible Vault:
6
+ * - JWT_SECRET: auto-generated 256-bit random key
7
+ * - OAuth keys: prompted from user (Google, Apple)
8
+ */
9
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ var desc = Object.getOwnPropertyDescriptor(m, k);
12
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
13
+ desc = { enumerable: true, get: function() { return m[k]; } };
14
+ }
15
+ Object.defineProperty(o, k2, desc);
16
+ }) : (function(o, m, k, k2) {
17
+ if (k2 === undefined) k2 = k;
18
+ o[k2] = m[k];
19
+ }));
20
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
21
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
22
+ }) : function(o, v) {
23
+ o["default"] = v;
24
+ });
25
+ var __importStar = (this && this.__importStar) || (function () {
26
+ var ownKeys = function(o) {
27
+ ownKeys = Object.getOwnPropertyNames || function (o) {
28
+ var ar = [];
29
+ for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
30
+ return ar;
31
+ };
32
+ return ownKeys(o);
33
+ };
34
+ return function (mod) {
35
+ if (mod && mod.__esModule) return mod;
36
+ var result = {};
37
+ if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
38
+ __setModuleDefault(result, mod);
39
+ return result;
40
+ };
41
+ })();
42
+ Object.defineProperty(exports, "__esModule", { value: true });
43
+ exports.secretsFixes = void 0;
44
+ const crypto = __importStar(require("crypto"));
45
+ const config_helpers_js_1 = require("../../../../utils/config-helpers.js");
46
+ /**
47
+ * Get auth config from FactiiiConfig (handles undefined/null)
48
+ */
49
+ function getAuthConfig(config) {
50
+ const auth = config.auth;
51
+ if (!auth || typeof auth !== 'object')
52
+ return null;
53
+ return auth;
54
+ }
55
+ /**
56
+ * Check if OAuth is enabled for a specific provider
57
+ */
58
+ function isOAuthEnabled(config, provider) {
59
+ const auth = getAuthConfig(config);
60
+ if (!auth)
61
+ return false;
62
+ // Check auth.features.oauth
63
+ const features = auth.features;
64
+ if (features?.oauth)
65
+ return true;
66
+ // Check auth.oauth_provider
67
+ if (auth.oauth_provider === provider)
68
+ return true;
69
+ return false;
70
+ }
71
+ /**
72
+ * Get Ansible Vault store
73
+ */
74
+ async function getVault(config, rootDir) {
75
+ const { AnsibleVaultSecrets } = await Promise.resolve().then(() => __importStar(require('../../../../utils/ansible-vault-secrets.js')));
76
+ return new AnsibleVaultSecrets({
77
+ vault_path: config.ansible?.vault_path ?? (0, config_helpers_js_1.getDefaultVaultPath)(config),
78
+ vault_password_file: config.ansible?.vault_password_file,
79
+ rootDir,
80
+ });
81
+ }
82
+ exports.secretsFixes = [
83
+ {
84
+ id: 'auth-jwt-secret-missing',
85
+ stage: 'secrets',
86
+ severity: 'critical',
87
+ description: 'JWT_SECRET not found in Ansible Vault (required for auth)',
88
+ scan: async (config, rootDir) => {
89
+ try {
90
+ const vault = await getVault(config, rootDir);
91
+ const secret = await vault.getSecret('JWT_SECRET');
92
+ return !secret;
93
+ }
94
+ catch {
95
+ return false; // Vault not available, skip
96
+ }
97
+ },
98
+ fix: async (config, rootDir) => {
99
+ try {
100
+ const vault = await getVault(config, rootDir);
101
+ // Auto-generate a cryptographically secure 256-bit secret
102
+ const jwtSecret = crypto.randomBytes(32).toString('hex');
103
+ const result = await vault.setSecret('JWT_SECRET', jwtSecret);
104
+ if (result.success) {
105
+ console.log(' [OK] Generated and stored JWT_SECRET in Ansible Vault');
106
+ console.log(' (256-bit random key, no manual input needed)');
107
+ return true;
108
+ }
109
+ console.log(' Failed to store JWT_SECRET in vault');
110
+ return false;
111
+ }
112
+ catch (e) {
113
+ console.log(' Error: ' + (e instanceof Error ? e.message : String(e)));
114
+ return false;
115
+ }
116
+ },
117
+ manualFix: 'Generate and store JWT secret: npx stack deploy --secrets set JWT_SECRET',
118
+ },
119
+ {
120
+ id: 'auth-oauth-google-missing',
121
+ stage: 'secrets',
122
+ severity: 'warning',
123
+ description: 'Google OAuth credentials not in vault (GOOGLE_CLIENT_ID)',
124
+ scan: async (config, rootDir) => {
125
+ if (!isOAuthEnabled(config, 'google'))
126
+ return false;
127
+ try {
128
+ const vault = await getVault(config, rootDir);
129
+ const clientId = await vault.getSecret('GOOGLE_CLIENT_ID');
130
+ return !clientId;
131
+ }
132
+ catch {
133
+ return false;
134
+ }
135
+ },
136
+ fix: async (config, rootDir) => {
137
+ try {
138
+ const { promptForSecret } = await Promise.resolve().then(() => __importStar(require('../../../../utils/secret-prompts.js')));
139
+ const vault = await getVault(config, rootDir);
140
+ console.log('');
141
+ console.log(' Google OAuth Setup');
142
+ console.log(' Get credentials from: https://console.cloud.google.com/apis/credentials');
143
+ console.log('');
144
+ const clientId = await promptForSecret('GOOGLE_CLIENT_ID', config);
145
+ const r1 = await vault.setSecret('GOOGLE_CLIENT_ID', clientId);
146
+ if (!r1.success)
147
+ return false;
148
+ const clientSecret = await promptForSecret('GOOGLE_CLIENT_SECRET', config);
149
+ const r2 = await vault.setSecret('GOOGLE_CLIENT_SECRET', clientSecret);
150
+ if (!r2.success)
151
+ return false;
152
+ console.log(' [OK] Stored Google OAuth credentials in vault');
153
+ return true;
154
+ }
155
+ catch {
156
+ return false;
157
+ }
158
+ },
159
+ manualFix: 'Store Google OAuth credentials:\n' +
160
+ ' npx stack deploy --secrets set GOOGLE_CLIENT_ID\n' +
161
+ ' npx stack deploy --secrets set GOOGLE_CLIENT_SECRET\n' +
162
+ ' Get from: https://console.cloud.google.com/apis/credentials',
163
+ },
164
+ {
165
+ id: 'auth-oauth-apple-missing',
166
+ stage: 'secrets',
167
+ severity: 'warning',
168
+ description: 'Apple OAuth credentials not in vault (APPLE_CLIENT_ID)',
169
+ scan: async (config, rootDir) => {
170
+ if (!isOAuthEnabled(config, 'apple'))
171
+ return false;
172
+ try {
173
+ const vault = await getVault(config, rootDir);
174
+ const clientId = await vault.getSecret('APPLE_CLIENT_ID');
175
+ return !clientId;
176
+ }
177
+ catch {
178
+ return false;
179
+ }
180
+ },
181
+ fix: async (config, rootDir) => {
182
+ try {
183
+ const { promptForSecret } = await Promise.resolve().then(() => __importStar(require('../../../../utils/secret-prompts.js')));
184
+ const vault = await getVault(config, rootDir);
185
+ console.log('');
186
+ console.log(' Apple OAuth Setup');
187
+ console.log(' Get credentials from: https://developer.apple.com/account/resources/identifiers');
188
+ console.log('');
189
+ const clientId = await promptForSecret('APPLE_CLIENT_ID', config);
190
+ const r1 = await vault.setSecret('APPLE_CLIENT_ID', clientId);
191
+ if (!r1.success)
192
+ return false;
193
+ console.log(' [OK] Stored Apple OAuth credentials in vault');
194
+ return true;
195
+ }
196
+ catch {
197
+ return false;
198
+ }
199
+ },
200
+ manualFix: 'Store Apple OAuth credentials:\n' +
201
+ ' npx stack deploy --secrets set APPLE_CLIENT_ID\n' +
202
+ ' Get from: https://developer.apple.com/account/resources/identifiers',
203
+ },
204
+ ];
205
+ //# sourceMappingURL=secrets.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secrets.js","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/secrets.ts"],"names":[],"mappings":";AAAA;;;;;;GAMG;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAEH,+CAAiC;AAEjC,2EAA0E;AAE1E;;GAEG;AACH,SAAS,aAAa,CAAC,MAAqB;IAC1C,MAAM,IAAI,GAAI,MAAkC,CAAC,IAAI,CAAC;IACtD,IAAI,CAAC,IAAI,IAAI,OAAO,IAAI,KAAK,QAAQ;QAAE,OAAO,IAAI,CAAC;IACnD,OAAO,IAA+B,CAAC;AACzC,CAAC;AAED;;GAEG;AACH,SAAS,cAAc,CAAC,MAAqB,EAAE,QAA4B;IACzE,MAAM,IAAI,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;IACnC,IAAI,CAAC,IAAI;QAAE,OAAO,KAAK,CAAC;IAExB,4BAA4B;IAC5B,MAAM,QAAQ,GAAG,IAAI,CAAC,QAA+C,CAAC;IACtE,IAAI,QAAQ,EAAE,KAAK;QAAE,OAAO,IAAI,CAAC;IAEjC,4BAA4B;IAC5B,IAAI,IAAI,CAAC,cAAc,KAAK,QAAQ;QAAE,OAAO,IAAI,CAAC;IAElD,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;GAEG;AACH,KAAK,UAAU,QAAQ,CAAC,MAAqB,EAAE,OAAe;IAC5D,MAAM,EAAE,mBAAmB,EAAE,GAAG,wDAAa,4CAA4C,GAAC,CAAC;IAC3F,OAAO,IAAI,mBAAmB,CAAC;QAC7B,UAAU,EAAE,MAAM,CAAC,OAAO,EAAE,UAAU,IAAI,IAAA,uCAAmB,EAAC,MAAM,CAAC;QACrE,mBAAmB,EAAE,MAAM,CAAC,OAAO,EAAE,mBAAmB;QACxD,OAAO;KACR,CAAC,CAAC;AACL,CAAC;AAEY,QAAA,YAAY,GAAU;IACjC;QACE,EAAE,EAAE,yBAAyB;QAC7B,KAAK,EAAE,SAAS;QAChB,QAAQ,EAAE,UAAU;QACpB,WAAW,EAAE,2DAA2D;QACxE,IAAI,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC;gBACH,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAC9C,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;gBACnD,OAAO,CAAC,MAAM,CAAC;YACjB,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC,CAAC,4BAA4B;YAC5C,CAAC;QACH,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAE9C,0DAA0D;gBAC1D,MAAM,SAAS,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;gBACzD,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;gBAE9D,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;oBACnB,OAAO,CAAC,GAAG,CAAC,0DAA0D,CAAC,CAAC;oBACxE,OAAO,CAAC,GAAG,CAAC,iDAAiD,CAAC,CAAC;oBAC/D,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,OAAO,CAAC,GAAG,CAAC,wCAAwC,CAAC,CAAC;gBACtD,OAAO,KAAK,CAAC;YACf,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,YAAY,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBACzE,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,0EAA0E;KACtF;IAED;QACE,EAAE,EAAE,2BAA2B;QAC/B,KAAK,EAAE,SAAS;QAChB,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,0DAA0D;QACvE,IAAI,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,QAAQ,CAAC;gBAAE,OAAO,KAAK,CAAC;YAEpD,IAAI,CAAC;gBACH,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAC9C,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,kBAAkB,CAAC,CAAC;gBAC3D,OAAO,CAAC,QAAQ,CAAC;YACnB,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,EAAE,eAAe,EAAE,GAAG,wDAAa,qCAAqC,GAAC,CAAC;gBAChF,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAE9C,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAChB,OAAO,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;gBACrC,OAAO,CAAC,GAAG,CAAC,4EAA4E,CAAC,CAAC;gBAC1F,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAEhB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,kBAAkB,EAAE,MAAM,CAAC,CAAC;gBACnE,MAAM,EAAE,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;gBAC/D,IAAI,CAAC,EAAE,CAAC,OAAO;oBAAE,OAAO,KAAK,CAAC;gBAE9B,MAAM,YAAY,GAAG,MAAM,eAAe,CAAC,sBAAsB,EAAE,MAAM,CAAC,CAAC;gBAC3E,MAAM,EAAE,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,sBAAsB,EAAE,YAAY,CAAC,CAAC;gBACvE,IAAI,CAAC,EAAE,CAAC,OAAO;oBAAE,OAAO,KAAK,CAAC;gBAE9B,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;gBAChE,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EACP,mCAAmC;YACnC,yDAAyD;YACzD,6DAA6D;YAC7D,mEAAmE;KACtE;IAED;QACE,EAAE,EAAE,0BAA0B;QAC9B,KAAK,EAAE,SAAS;QAChB,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,wDAAwD;QACrE,IAAI,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,OAAO,CAAC;gBAAE,OAAO,KAAK,CAAC;YAEnD,IAAI,CAAC;gBACH,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAC9C,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;gBAC1D,OAAO,CAAC,QAAQ,CAAC;YACnB,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,EAAE,eAAe,EAAE,GAAG,wDAAa,qCAAqC,GAAC,CAAC;gBAChF,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAE9C,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAChB,OAAO,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;gBACpC,OAAO,CAAC,GAAG,CAAC,oFAAoF,CAAC,CAAC;gBAClG,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAEhB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,iBAAiB,EAAE,MAAM,CAAC,CAAC;gBAClE,MAAM,EAAE,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,iBAAiB,EAAE,QAAQ,CAAC,CAAC;gBAC9D,IAAI,CAAC,EAAE,CAAC,OAAO;oBAAE,OAAO,KAAK,CAAC;gBAE9B,OAAO,CAAC,GAAG,CAAC,iDAAiD,CAAC,CAAC;gBAC/D,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EACP,kCAAkC;YAClC,wDAAwD;YACxD,2EAA2E;KAC9E;CACF,CAAC"}
@@ -0,0 +1,12 @@
1
+ /**
2
+ * Auth Setup Scanfixes (Dev Stage)
3
+ *
4
+ * Detects @factiii/auth in dependencies and ensures:
5
+ * - Auth config exists in stack.yml
6
+ * - Auth Prisma schema is initialized (npx @factiii/auth init)
7
+ * - Auth doctor passes (validates setup)
8
+ * - Prisma migrations are applied for auth tables
9
+ */
10
+ import type { Fix } from '../../../../types/index.js';
11
+ export declare const setupFixes: Fix[];
12
+ //# sourceMappingURL=setup.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"setup.d.ts","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/setup.ts"],"names":[],"mappings":"AAAA;;;;;;;;GAQG;AAMH,OAAO,KAAK,EAAiB,GAAG,EAAE,MAAM,4BAA4B,CAAC;AA+BrE,eAAO,MAAM,UAAU,EAAE,GAAG,EAmK3B,CAAC"}
@@ -0,0 +1,235 @@
1
+ "use strict";
2
+ /**
3
+ * Auth Setup Scanfixes (Dev Stage)
4
+ *
5
+ * Detects @factiii/auth in dependencies and ensures:
6
+ * - Auth config exists in stack.yml
7
+ * - Auth Prisma schema is initialized (npx @factiii/auth init)
8
+ * - Auth doctor passes (validates setup)
9
+ * - Prisma migrations are applied for auth tables
10
+ */
11
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
12
+ if (k2 === undefined) k2 = k;
13
+ var desc = Object.getOwnPropertyDescriptor(m, k);
14
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
15
+ desc = { enumerable: true, get: function() { return m[k]; } };
16
+ }
17
+ Object.defineProperty(o, k2, desc);
18
+ }) : (function(o, m, k, k2) {
19
+ if (k2 === undefined) k2 = k;
20
+ o[k2] = m[k];
21
+ }));
22
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
23
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
24
+ }) : function(o, v) {
25
+ o["default"] = v;
26
+ });
27
+ var __importStar = (this && this.__importStar) || (function () {
28
+ var ownKeys = function(o) {
29
+ ownKeys = Object.getOwnPropertyNames || function (o) {
30
+ var ar = [];
31
+ for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
32
+ return ar;
33
+ };
34
+ return ownKeys(o);
35
+ };
36
+ return function (mod) {
37
+ if (mod && mod.__esModule) return mod;
38
+ var result = {};
39
+ if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
40
+ __setModuleDefault(result, mod);
41
+ return result;
42
+ };
43
+ })();
44
+ var __importDefault = (this && this.__importDefault) || function (mod) {
45
+ return (mod && mod.__esModule) ? mod : { "default": mod };
46
+ };
47
+ Object.defineProperty(exports, "__esModule", { value: true });
48
+ exports.setupFixes = void 0;
49
+ const fs = __importStar(require("fs"));
50
+ const path = __importStar(require("path"));
51
+ const child_process_1 = require("child_process");
52
+ const js_yaml_1 = __importDefault(require("js-yaml"));
53
+ const config_files_js_1 = require("../../../../constants/config-files.js");
54
+ /**
55
+ * Check if Prisma schema contains auth models (User, Session)
56
+ */
57
+ function hasAuthModels(rootDir) {
58
+ const schemaPath = path.join(rootDir, 'prisma', 'schema.prisma');
59
+ if (!fs.existsSync(schemaPath))
60
+ return false;
61
+ const content = fs.readFileSync(schemaPath, 'utf8');
62
+ return content.includes('model User') && content.includes('model Session');
63
+ }
64
+ /**
65
+ * Run a command silently and return success/failure
66
+ */
67
+ function runSilent(cmd, rootDir) {
68
+ try {
69
+ const output = (0, child_process_1.execSync)(cmd, {
70
+ cwd: rootDir,
71
+ encoding: 'utf8',
72
+ stdio: ['pipe', 'pipe', 'pipe'],
73
+ });
74
+ return { success: true, output };
75
+ }
76
+ catch (e) {
77
+ const output = e instanceof Error ? e.message : String(e);
78
+ return { success: false, output };
79
+ }
80
+ }
81
+ exports.setupFixes = [
82
+ {
83
+ id: 'auth-missing-stack-yml-config',
84
+ stage: 'dev',
85
+ severity: 'warning',
86
+ description: 'Auth config missing from stack.yml (@factiii/auth detected but no auth: section)',
87
+ scan: async (_config, rootDir) => {
88
+ const stackPath = path.join(rootDir, config_files_js_1.STACK_CONFIG_FILENAME);
89
+ if (!fs.existsSync(stackPath))
90
+ return false; // No stack.yml yet, bootstrap handles it
91
+ const content = fs.readFileSync(stackPath, 'utf8');
92
+ // Check if there's an uncommented auth: key at the top level
93
+ return !content.match(/^auth:/m);
94
+ },
95
+ fix: async (_config, rootDir) => {
96
+ try {
97
+ const stackPath = path.join(rootDir, config_files_js_1.STACK_CONFIG_FILENAME);
98
+ const content = fs.readFileSync(stackPath, 'utf8');
99
+ // Build auth section
100
+ const authSection = '\n# ============================================================\n' +
101
+ '# AUTH (@factiii/auth)\n' +
102
+ '# ============================================================\n' +
103
+ '# Detected @factiii/auth in dependencies.\n' +
104
+ '# JWT_SECRET is auto-generated and stored in Ansible Vault.\n' +
105
+ '# Customize features below as needed.\n' +
106
+ 'auth:\n' +
107
+ ' features:\n' +
108
+ ' oauth: false\n' +
109
+ ' twoFa: false\n' +
110
+ ' emailVerification: false\n' +
111
+ ' oauth_provider: EXAMPLE_google\n';
112
+ // Remove any commented-out auth section if present
113
+ let updated = content.replace(/\n?# =+\n# AUTH[^\n]*\n# =+\n(?:#[^\n]*\n)*/g, '');
114
+ // Append auth section before NEXT STEPS or at end
115
+ if (updated.includes('# NEXT STEPS')) {
116
+ updated = updated.replace(/(\n# =+\n# NEXT STEPS)/, authSection + '\n$1');
117
+ }
118
+ else {
119
+ updated = updated.trimEnd() + '\n' + authSection;
120
+ }
121
+ fs.writeFileSync(stackPath, updated, 'utf8');
122
+ console.log(' [OK] Added auth: section to ' + config_files_js_1.STACK_CONFIG_FILENAME);
123
+ // Verify by re-reading
124
+ const verify = fs.readFileSync(stackPath, 'utf8');
125
+ const parsed = js_yaml_1.default.load(verify);
126
+ return !!parsed.auth;
127
+ }
128
+ catch (e) {
129
+ console.log(' Failed: ' + (e instanceof Error ? e.message : String(e)));
130
+ return false;
131
+ }
132
+ },
133
+ manualFix: 'Add to ' + config_files_js_1.STACK_CONFIG_FILENAME + ':\n' +
134
+ ' auth:\n' +
135
+ ' features:\n' +
136
+ ' oauth: false\n' +
137
+ ' twoFa: false\n' +
138
+ ' emailVerification: false\n' +
139
+ ' oauth_provider: EXAMPLE_google',
140
+ },
141
+ {
142
+ id: 'auth-not-initialized',
143
+ stage: 'dev',
144
+ severity: 'critical',
145
+ description: 'Auth schema not initialized (missing User/Session models in Prisma)',
146
+ scan: async (_config, rootDir) => {
147
+ // Only flag if @factiii/auth is installed but schema not initialized
148
+ const schemaPath = path.join(rootDir, 'prisma', 'schema.prisma');
149
+ if (!fs.existsSync(schemaPath))
150
+ return true; // No schema at all
151
+ return !hasAuthModels(rootDir);
152
+ },
153
+ fix: async (_config, rootDir) => {
154
+ try {
155
+ console.log(' Running: npx @factiii/auth init');
156
+ (0, child_process_1.execSync)('npx @factiii/auth init', {
157
+ cwd: rootDir,
158
+ stdio: 'inherit',
159
+ });
160
+ // Regenerate Prisma client
161
+ console.log(' Running: npx prisma generate');
162
+ (0, child_process_1.execSync)('npx prisma generate', {
163
+ cwd: rootDir,
164
+ stdio: 'inherit',
165
+ });
166
+ return hasAuthModels(rootDir);
167
+ }
168
+ catch (e) {
169
+ console.log(' Failed: ' + (e instanceof Error ? e.message : String(e)));
170
+ return false;
171
+ }
172
+ },
173
+ manualFix: 'Run: npx @factiii/auth init && npx prisma generate',
174
+ },
175
+ {
176
+ id: 'auth-doctor-fail',
177
+ stage: 'dev',
178
+ severity: 'warning',
179
+ description: 'Auth doctor check failed (run npx @factiii/auth doctor for details)',
180
+ scan: async (_config, rootDir) => {
181
+ // Skip if auth models not yet initialized
182
+ if (!hasAuthModels(rootDir))
183
+ return false;
184
+ const result = runSilent('npx @factiii/auth doctor', rootDir);
185
+ return !result.success;
186
+ },
187
+ fix: async (_config, rootDir) => {
188
+ // Run doctor with output visible so user can see what's wrong
189
+ try {
190
+ (0, child_process_1.execSync)('npx @factiii/auth doctor', {
191
+ cwd: rootDir,
192
+ stdio: 'inherit',
193
+ });
194
+ return true;
195
+ }
196
+ catch {
197
+ console.log(' Doctor found issues — review output above');
198
+ return false;
199
+ }
200
+ },
201
+ manualFix: 'Run: npx @factiii/auth doctor',
202
+ },
203
+ {
204
+ id: 'auth-prisma-not-migrated',
205
+ stage: 'dev',
206
+ severity: 'warning',
207
+ description: 'Auth database tables not migrated (pending Prisma migrations)',
208
+ scan: async (_config, rootDir) => {
209
+ // Skip if auth models not initialized
210
+ if (!hasAuthModels(rootDir))
211
+ return false;
212
+ // Check for pending migrations
213
+ const result = runSilent('npx prisma migrate status', rootDir);
214
+ if (!result.success)
215
+ return true; // Can't check = assume pending
216
+ return result.output.includes('Following migration') || result.output.includes('not yet been applied');
217
+ },
218
+ fix: async (_config, rootDir) => {
219
+ try {
220
+ console.log(' Running: npx prisma migrate dev');
221
+ (0, child_process_1.execSync)('npx prisma migrate dev', {
222
+ cwd: rootDir,
223
+ stdio: 'inherit',
224
+ });
225
+ return true;
226
+ }
227
+ catch (e) {
228
+ console.log(' Migration failed: ' + (e instanceof Error ? e.message : String(e)));
229
+ return false;
230
+ }
231
+ },
232
+ manualFix: 'Run: npx prisma migrate dev',
233
+ },
234
+ ];
235
+ //# sourceMappingURL=setup.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"setup.js","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/setup.ts"],"names":[],"mappings":";AAAA;;;;;;;;GAQG;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAEH,uCAAyB;AACzB,2CAA6B;AAC7B,iDAAyC;AACzC,sDAA2B;AAE3B,2EAA8E;AAE9E;;GAEG;AACH,SAAS,aAAa,CAAC,OAAe;IACpC,MAAM,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,QAAQ,EAAE,eAAe,CAAC,CAAC;IACjE,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC;QAAE,OAAO,KAAK,CAAC;IAE7C,MAAM,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;IACpD,OAAO,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;AAC7E,CAAC;AAED;;GAEG;AACH,SAAS,SAAS,CAAC,GAAW,EAAE,OAAe;IAC7C,IAAI,CAAC;QACH,MAAM,MAAM,GAAG,IAAA,wBAAQ,EAAC,GAAG,EAAE;YAC3B,GAAG,EAAE,OAAO;YACZ,QAAQ,EAAE,MAAM;YAChB,KAAK,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC;SAChC,CAAC,CAAC;QACH,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;IACnC,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,MAAM,MAAM,GAAG,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;QAC1D,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;IACpC,CAAC;AACH,CAAC;AAEY,QAAA,UAAU,GAAU;IAC/B;QACE,EAAE,EAAE,+BAA+B;QACnC,KAAK,EAAE,KAAK;QACZ,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,kFAAkF;QAC/F,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,MAAM,SAAS,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,uCAAqB,CAAC,CAAC;YAC5D,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC;gBAAE,OAAO,KAAK,CAAC,CAAC,yCAAyC;YAEtF,MAAM,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;YACnD,6DAA6D;YAC7D,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;QACnC,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC;gBACH,MAAM,SAAS,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,uCAAqB,CAAC,CAAC;gBAC5D,MAAM,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;gBAEnD,qBAAqB;gBACrB,MAAM,WAAW,GACf,oEAAoE;oBACpE,0BAA0B;oBAC1B,kEAAkE;oBAClE,6CAA6C;oBAC7C,+DAA+D;oBAC/D,yCAAyC;oBACzC,SAAS;oBACT,eAAe;oBACf,oBAAoB;oBACpB,oBAAoB;oBACpB,gCAAgC;oBAChC,oCAAoC,CAAC;gBAEvC,mDAAmD;gBACnD,IAAI,OAAO,GAAG,OAAO,CAAC,OAAO,CAC3B,8CAA8C,EAC9C,EAAE,CACH,CAAC;gBAEF,kDAAkD;gBAClD,IAAI,OAAO,CAAC,QAAQ,CAAC,cAAc,CAAC,EAAE,CAAC;oBACrC,OAAO,GAAG,OAAO,CAAC,OAAO,CACvB,wBAAwB,EACxB,WAAW,GAAG,MAAM,CACrB,CAAC;gBACJ,CAAC;qBAAM,CAAC;oBACN,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,GAAG,IAAI,GAAG,WAAW,CAAC;gBACnD,CAAC;gBAED,EAAE,CAAC,aAAa,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC7C,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,uCAAqB,CAAC,CAAC;gBAEvE,uBAAuB;gBACvB,MAAM,MAAM,GAAG,EAAE,CAAC,YAAY,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;gBAClD,MAAM,MAAM,GAAG,iBAAI,CAAC,IAAI,CAAC,MAAM,CAA4B,CAAC;gBAC5D,OAAO,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC;YACvB,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,aAAa,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBAC1E,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,SAAS,GAAG,uCAAqB,GAAG,KAAK;YAClD,eAAe;YACf,qBAAqB;YACrB,0BAA0B;YAC1B,0BAA0B;YAC1B,sCAAsC;YACtC,wCAAwC;KAC3C;IAED;QACE,EAAE,EAAE,sBAAsB;QAC1B,KAAK,EAAE,KAAK;QACZ,QAAQ,EAAE,UAAU;QACpB,WAAW,EAAE,qEAAqE;QAClF,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,qEAAqE;YACrE,MAAM,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,QAAQ,EAAE,eAAe,CAAC,CAAC;YACjE,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC;gBAAE,OAAO,IAAI,CAAC,CAAC,mBAAmB;YAChE,OAAO,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC;QACjC,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;gBAClD,IAAA,wBAAQ,EAAC,wBAAwB,EAAE;oBACjC,GAAG,EAAE,OAAO;oBACZ,KAAK,EAAE,SAAS;iBACjB,CAAC,CAAC;gBAEH,2BAA2B;gBAC3B,OAAO,CAAC,GAAG,CAAC,iCAAiC,CAAC,CAAC;gBAC/C,IAAA,wBAAQ,EAAC,qBAAqB,EAAE;oBAC9B,GAAG,EAAE,OAAO;oBACZ,KAAK,EAAE,SAAS;iBACjB,CAAC,CAAC;gBAEH,OAAO,aAAa,CAAC,OAAO,CAAC,CAAC;YAChC,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,aAAa,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBAC1E,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,oDAAoD;KAChE;IAED;QACE,EAAE,EAAE,kBAAkB;QACtB,KAAK,EAAE,KAAK;QACZ,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,qEAAqE;QAClF,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,0CAA0C;YAC1C,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC;gBAAE,OAAO,KAAK,CAAC;YAE1C,MAAM,MAAM,GAAG,SAAS,CAAC,0BAA0B,EAAE,OAAO,CAAC,CAAC;YAC9D,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC;QACzB,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACvE,8DAA8D;YAC9D,IAAI,CAAC;gBACH,IAAA,wBAAQ,EAAC,0BAA0B,EAAE;oBACnC,GAAG,EAAE,OAAO;oBACZ,KAAK,EAAE,SAAS;iBACjB,CAAC,CAAC;gBACH,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,CAAC,GAAG,CAAC,8CAA8C,CAAC,CAAC;gBAC5D,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,+BAA+B;KAC3C;IAED;QACE,EAAE,EAAE,0BAA0B;QAC9B,KAAK,EAAE,KAAK;QACZ,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,+DAA+D;QAC5E,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,sCAAsC;YACtC,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC;gBAAE,OAAO,KAAK,CAAC;YAE1C,+BAA+B;YAC/B,MAAM,MAAM,GAAG,SAAS,CAAC,2BAA2B,EAAE,OAAO,CAAC,CAAC;YAC/D,IAAI,CAAC,MAAM,CAAC,OAAO;gBAAE,OAAO,IAAI,CAAC,CAAC,+BAA+B;YACjE,OAAO,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,qBAAqB,CAAC,IAAI,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,sBAAsB,CAAC,CAAC;QACzG,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;gBAClD,IAAA,wBAAQ,EAAC,wBAAwB,EAAE;oBACjC,GAAG,EAAE,OAAO;oBACZ,KAAK,EAAE,SAAS;iBACjB,CAAC,CAAC;gBACH,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,uBAAuB,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBACpF,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,6BAA6B;KACzC;CACF,CAAC"}
@@ -0,0 +1,9 @@
1
+ /**
2
+ * Auth Validation Scanfixes (Staging/Prod)
3
+ *
4
+ * Validates that auth environment variables are properly
5
+ * configured on staging and production servers.
6
+ */
7
+ import type { Fix } from '../../../../types/index.js';
8
+ export declare const validateFixes: Fix[];
9
+ //# sourceMappingURL=validate.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"validate.d.ts","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/validate.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAIH,OAAO,KAAK,EAAiB,GAAG,EAAE,MAAM,4BAA4B,CAAC;AAkBrE,eAAO,MAAM,aAAa,EAAE,GAAG,EAiG9B,CAAC"}
@@ -0,0 +1,153 @@
1
+ "use strict";
2
+ /**
3
+ * Auth Validation Scanfixes (Staging/Prod)
4
+ *
5
+ * Validates that auth environment variables are properly
6
+ * configured on staging and production servers.
7
+ */
8
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
9
+ if (k2 === undefined) k2 = k;
10
+ var desc = Object.getOwnPropertyDescriptor(m, k);
11
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
12
+ desc = { enumerable: true, get: function() { return m[k]; } };
13
+ }
14
+ Object.defineProperty(o, k2, desc);
15
+ }) : (function(o, m, k, k2) {
16
+ if (k2 === undefined) k2 = k;
17
+ o[k2] = m[k];
18
+ }));
19
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
20
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
21
+ }) : function(o, v) {
22
+ o["default"] = v;
23
+ });
24
+ var __importStar = (this && this.__importStar) || (function () {
25
+ var ownKeys = function(o) {
26
+ ownKeys = Object.getOwnPropertyNames || function (o) {
27
+ var ar = [];
28
+ for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
29
+ return ar;
30
+ };
31
+ return ownKeys(o);
32
+ };
33
+ return function (mod) {
34
+ if (mod && mod.__esModule) return mod;
35
+ var result = {};
36
+ if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
37
+ __setModuleDefault(result, mod);
38
+ return result;
39
+ };
40
+ })();
41
+ Object.defineProperty(exports, "__esModule", { value: true });
42
+ exports.validateFixes = void 0;
43
+ const fs = __importStar(require("fs"));
44
+ const path = __importStar(require("path"));
45
+ const config_helpers_js_1 = require("../../../../utils/config-helpers.js");
46
+ /**
47
+ * Check if an env file has a variable set (non-empty, non-EXAMPLE)
48
+ */
49
+ function envFileHasVar(envFilePath, varName) {
50
+ if (!fs.existsSync(envFilePath))
51
+ return false;
52
+ const content = fs.readFileSync(envFilePath, 'utf8');
53
+ const regex = new RegExp('^' + varName + '\\s*=\\s*(.+)$', 'm');
54
+ const match = content.match(regex);
55
+ if (!match || !match[1])
56
+ return false;
57
+ const value = match[1].trim();
58
+ return value.length > 0 && !value.toUpperCase().startsWith('EXAMPLE');
59
+ }
60
+ exports.validateFixes = [
61
+ {
62
+ id: 'auth-env-jwt-staging',
63
+ stage: 'staging',
64
+ severity: 'critical',
65
+ description: 'JWT_SECRET not set in .env.staging (auth will not work)',
66
+ scan: async (_config, rootDir) => {
67
+ const envPath = path.join(rootDir, '.env.staging');
68
+ return !envFileHasVar(envPath, 'JWT_SECRET');
69
+ },
70
+ fix: async (config, rootDir) => {
71
+ try {
72
+ const { AnsibleVaultSecrets } = await Promise.resolve().then(() => __importStar(require('../../../../utils/ansible-vault-secrets.js')));
73
+ const vault = new AnsibleVaultSecrets({
74
+ vault_path: config.ansible?.vault_path ?? (0, config_helpers_js_1.getDefaultVaultPath)(config),
75
+ vault_password_file: config.ansible?.vault_password_file,
76
+ rootDir,
77
+ });
78
+ const jwtSecret = await vault.getSecret('JWT_SECRET');
79
+ if (!jwtSecret) {
80
+ console.log(' JWT_SECRET not in vault — run: npx stack fix --secrets');
81
+ return false;
82
+ }
83
+ // Append to .env.staging
84
+ const envPath = path.join(rootDir, '.env.staging');
85
+ let content = '';
86
+ if (fs.existsSync(envPath)) {
87
+ content = fs.readFileSync(envPath, 'utf8');
88
+ }
89
+ if (content.includes('JWT_SECRET=')) {
90
+ // Replace existing (empty or EXAMPLE) value
91
+ content = content.replace(/^JWT_SECRET\s*=.*$/m, 'JWT_SECRET=' + jwtSecret);
92
+ }
93
+ else {
94
+ content = content.trimEnd() + '\nJWT_SECRET=' + jwtSecret + '\n';
95
+ }
96
+ fs.writeFileSync(envPath, content, 'utf8');
97
+ console.log(' [OK] Set JWT_SECRET in .env.staging from vault');
98
+ return true;
99
+ }
100
+ catch (e) {
101
+ console.log(' Error: ' + (e instanceof Error ? e.message : String(e)));
102
+ return false;
103
+ }
104
+ },
105
+ manualFix: 'Add JWT_SECRET to .env.staging or run: npx stack fix --secrets && npx stack fix --staging',
106
+ },
107
+ {
108
+ id: 'auth-env-jwt-prod',
109
+ stage: 'prod',
110
+ severity: 'critical',
111
+ description: 'JWT_SECRET not set in .env.prod (auth will not work)',
112
+ scan: async (_config, rootDir) => {
113
+ const envPath = path.join(rootDir, '.env.prod');
114
+ return !envFileHasVar(envPath, 'JWT_SECRET');
115
+ },
116
+ fix: async (config, rootDir) => {
117
+ try {
118
+ const { AnsibleVaultSecrets } = await Promise.resolve().then(() => __importStar(require('../../../../utils/ansible-vault-secrets.js')));
119
+ const vault = new AnsibleVaultSecrets({
120
+ vault_path: config.ansible?.vault_path ?? (0, config_helpers_js_1.getDefaultVaultPath)(config),
121
+ vault_password_file: config.ansible?.vault_password_file,
122
+ rootDir,
123
+ });
124
+ const jwtSecret = await vault.getSecret('JWT_SECRET');
125
+ if (!jwtSecret) {
126
+ console.log(' JWT_SECRET not in vault — run: npx stack fix --secrets');
127
+ return false;
128
+ }
129
+ // Append to .env.prod
130
+ const envPath = path.join(rootDir, '.env.prod');
131
+ let content = '';
132
+ if (fs.existsSync(envPath)) {
133
+ content = fs.readFileSync(envPath, 'utf8');
134
+ }
135
+ if (content.includes('JWT_SECRET=')) {
136
+ content = content.replace(/^JWT_SECRET\s*=.*$/m, 'JWT_SECRET=' + jwtSecret);
137
+ }
138
+ else {
139
+ content = content.trimEnd() + '\nJWT_SECRET=' + jwtSecret + '\n';
140
+ }
141
+ fs.writeFileSync(envPath, content, 'utf8');
142
+ console.log(' [OK] Set JWT_SECRET in .env.prod from vault');
143
+ return true;
144
+ }
145
+ catch (e) {
146
+ console.log(' Error: ' + (e instanceof Error ? e.message : String(e)));
147
+ return false;
148
+ }
149
+ },
150
+ manualFix: 'Add JWT_SECRET to .env.prod or run: npx stack fix --secrets && npx stack fix --prod',
151
+ },
152
+ ];
153
+ //# sourceMappingURL=validate.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"validate.js","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/validate.ts"],"names":[],"mappings":";AAAA;;;;;GAKG;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAEH,uCAAyB;AACzB,2CAA6B;AAE7B,2EAA+F;AAE/F;;GAEG;AACH,SAAS,aAAa,CAAC,WAAmB,EAAE,OAAe;IACzD,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC;QAAE,OAAO,KAAK,CAAC;IAE9C,MAAM,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IACrD,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,GAAG,GAAG,OAAO,GAAG,gBAAgB,EAAE,GAAG,CAAC,CAAC;IAChE,MAAM,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;IACnC,IAAI,CAAC,KAAK,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;QAAE,OAAO,KAAK,CAAC;IAEtC,MAAM,KAAK,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC;IAC9B,OAAO,KAAK,CAAC,MAAM,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;AACxE,CAAC;AAEY,QAAA,aAAa,GAAU;IAClC;QACE,EAAE,EAAE,sBAAsB;QAC1B,KAAK,EAAE,SAAS;QAChB,QAAQ,EAAE,UAAU;QACpB,WAAW,EAAE,yDAAyD;QACtE,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;YACnD,OAAO,CAAC,aAAa,CAAC,OAAO,EAAE,YAAY,CAAC,CAAC;QAC/C,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,EAAE,mBAAmB,EAAE,GAAG,wDAAa,4CAA4C,GAAC,CAAC;gBAC3F,MAAM,KAAK,GAAG,IAAI,mBAAmB,CAAC;oBACpC,UAAU,EAAE,MAAM,CAAC,OAAO,EAAE,UAAU,IAAI,IAAA,uCAAmB,EAAC,MAAM,CAAC;oBACrE,mBAAmB,EAAE,MAAM,CAAC,OAAO,EAAE,mBAAmB;oBACxD,OAAO;iBACR,CAAC,CAAC;gBAEH,MAAM,SAAS,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;gBACtD,IAAI,CAAC,SAAS,EAAE,CAAC;oBACf,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;oBACzE,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,yBAAyB;gBACzB,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;gBACnD,IAAI,OAAO,GAAG,EAAE,CAAC;gBACjB,IAAI,EAAE,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC;oBAC3B,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC7C,CAAC;gBAED,IAAI,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;oBACpC,4CAA4C;oBAC5C,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,qBAAqB,EAAE,aAAa,GAAG,SAAS,CAAC,CAAC;gBAC9E,CAAC;qBAAM,CAAC;oBACN,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,GAAG,eAAe,GAAG,SAAS,GAAG,IAAI,CAAC;gBACnE,CAAC;gBAED,EAAE,CAAC,aAAa,CAAC,OAAO,EAAE,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC3C,OAAO,CAAC,GAAG,CAAC,mDAAmD,CAAC,CAAC;gBACjE,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,YAAY,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBACzE,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,2FAA2F;KACvG;IAED;QACE,EAAE,EAAE,mBAAmB;QACvB,KAAK,EAAE,MAAM;QACb,QAAQ,EAAE,UAAU;QACpB,WAAW,EAAE,sDAAsD;QACnE,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;YAChD,OAAO,CAAC,aAAa,CAAC,OAAO,EAAE,YAAY,CAAC,CAAC;QAC/C,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,EAAE,mBAAmB,EAAE,GAAG,wDAAa,4CAA4C,GAAC,CAAC;gBAC3F,MAAM,KAAK,GAAG,IAAI,mBAAmB,CAAC;oBACpC,UAAU,EAAE,MAAM,CAAC,OAAO,EAAE,UAAU,IAAI,IAAA,uCAAmB,EAAC,MAAM,CAAC;oBACrE,mBAAmB,EAAE,MAAM,CAAC,OAAO,EAAE,mBAAmB;oBACxD,OAAO;iBACR,CAAC,CAAC;gBAEH,MAAM,SAAS,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;gBACtD,IAAI,CAAC,SAAS,EAAE,CAAC;oBACf,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;oBACzE,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,sBAAsB;gBACtB,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;gBAChD,IAAI,OAAO,GAAG,EAAE,CAAC;gBACjB,IAAI,EAAE,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC;oBAC3B,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC7C,CAAC;gBAED,IAAI,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;oBACpC,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,qBAAqB,EAAE,aAAa,GAAG,SAAS,CAAC,CAAC;gBAC9E,CAAC;qBAAM,CAAC;oBACN,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,GAAG,eAAe,GAAG,SAAS,GAAG,IAAI,CAAC;gBACnE,CAAC;gBAED,EAAE,CAAC,aAAa,CAAC,OAAO,EAAE,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC3C,OAAO,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAC;gBAC9D,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,YAAY,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBACzE,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,qFAAqF;KACjG;CACF,CAAC"}