@factiii/stack 0.1.91 → 0.1.94
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli/fix.d.ts.map +1 -1
- package/dist/cli/fix.js +83 -52
- package/dist/cli/fix.js.map +1 -1
- package/dist/generators/generate-stack-yml.d.ts.map +1 -1
- package/dist/generators/generate-stack-yml.js +35 -2
- package/dist/generators/generate-stack-yml.js.map +1 -1
- package/dist/plugins/addons/auth/index.d.ts +56 -0
- package/dist/plugins/addons/auth/index.d.ts.map +1 -0
- package/dist/plugins/addons/auth/index.js +178 -0
- package/dist/plugins/addons/auth/index.js.map +1 -0
- package/dist/plugins/addons/auth/scanfix/secrets.d.ts +10 -0
- package/dist/plugins/addons/auth/scanfix/secrets.d.ts.map +1 -0
- package/dist/plugins/addons/auth/scanfix/secrets.js +205 -0
- package/dist/plugins/addons/auth/scanfix/secrets.js.map +1 -0
- package/dist/plugins/addons/auth/scanfix/setup.d.ts +12 -0
- package/dist/plugins/addons/auth/scanfix/setup.d.ts.map +1 -0
- package/dist/plugins/addons/auth/scanfix/setup.js +235 -0
- package/dist/plugins/addons/auth/scanfix/setup.js.map +1 -0
- package/dist/plugins/addons/auth/scanfix/validate.d.ts +9 -0
- package/dist/plugins/addons/auth/scanfix/validate.d.ts.map +1 -0
- package/dist/plugins/addons/auth/scanfix/validate.js +153 -0
- package/dist/plugins/addons/auth/scanfix/validate.js.map +1 -0
- package/dist/plugins/index.d.ts.map +1 -1
- package/dist/plugins/index.js +9 -0
- package/dist/plugins/index.js.map +1 -1
- package/dist/plugins/pipelines/factiii/scanfix/bootstrap.d.ts.map +1 -1
- package/dist/plugins/pipelines/factiii/scanfix/bootstrap.js +5 -1
- package/dist/plugins/pipelines/factiii/scanfix/bootstrap.js.map +1 -1
- package/dist/plugins/pipelines/factiii/scanfix/secrets.d.ts.map +1 -1
- package/dist/plugins/pipelines/factiii/scanfix/secrets.js +37 -27
- package/dist/plugins/pipelines/factiii/scanfix/secrets.js.map +1 -1
- package/package.json +1 -1
|
@@ -0,0 +1,205 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Auth Secrets Scanfixes
|
|
4
|
+
*
|
|
5
|
+
* Manages authentication secrets in Ansible Vault:
|
|
6
|
+
* - JWT_SECRET: auto-generated 256-bit random key
|
|
7
|
+
* - OAuth keys: prompted from user (Google, Apple)
|
|
8
|
+
*/
|
|
9
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
12
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
13
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
14
|
+
}
|
|
15
|
+
Object.defineProperty(o, k2, desc);
|
|
16
|
+
}) : (function(o, m, k, k2) {
|
|
17
|
+
if (k2 === undefined) k2 = k;
|
|
18
|
+
o[k2] = m[k];
|
|
19
|
+
}));
|
|
20
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
21
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
22
|
+
}) : function(o, v) {
|
|
23
|
+
o["default"] = v;
|
|
24
|
+
});
|
|
25
|
+
var __importStar = (this && this.__importStar) || (function () {
|
|
26
|
+
var ownKeys = function(o) {
|
|
27
|
+
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
28
|
+
var ar = [];
|
|
29
|
+
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
30
|
+
return ar;
|
|
31
|
+
};
|
|
32
|
+
return ownKeys(o);
|
|
33
|
+
};
|
|
34
|
+
return function (mod) {
|
|
35
|
+
if (mod && mod.__esModule) return mod;
|
|
36
|
+
var result = {};
|
|
37
|
+
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
38
|
+
__setModuleDefault(result, mod);
|
|
39
|
+
return result;
|
|
40
|
+
};
|
|
41
|
+
})();
|
|
42
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
43
|
+
exports.secretsFixes = void 0;
|
|
44
|
+
const crypto = __importStar(require("crypto"));
|
|
45
|
+
const config_helpers_js_1 = require("../../../../utils/config-helpers.js");
|
|
46
|
+
/**
|
|
47
|
+
* Get auth config from FactiiiConfig (handles undefined/null)
|
|
48
|
+
*/
|
|
49
|
+
function getAuthConfig(config) {
|
|
50
|
+
const auth = config.auth;
|
|
51
|
+
if (!auth || typeof auth !== 'object')
|
|
52
|
+
return null;
|
|
53
|
+
return auth;
|
|
54
|
+
}
|
|
55
|
+
/**
|
|
56
|
+
* Check if OAuth is enabled for a specific provider
|
|
57
|
+
*/
|
|
58
|
+
function isOAuthEnabled(config, provider) {
|
|
59
|
+
const auth = getAuthConfig(config);
|
|
60
|
+
if (!auth)
|
|
61
|
+
return false;
|
|
62
|
+
// Check auth.features.oauth
|
|
63
|
+
const features = auth.features;
|
|
64
|
+
if (features?.oauth)
|
|
65
|
+
return true;
|
|
66
|
+
// Check auth.oauth_provider
|
|
67
|
+
if (auth.oauth_provider === provider)
|
|
68
|
+
return true;
|
|
69
|
+
return false;
|
|
70
|
+
}
|
|
71
|
+
/**
|
|
72
|
+
* Get Ansible Vault store
|
|
73
|
+
*/
|
|
74
|
+
async function getVault(config, rootDir) {
|
|
75
|
+
const { AnsibleVaultSecrets } = await Promise.resolve().then(() => __importStar(require('../../../../utils/ansible-vault-secrets.js')));
|
|
76
|
+
return new AnsibleVaultSecrets({
|
|
77
|
+
vault_path: config.ansible?.vault_path ?? (0, config_helpers_js_1.getDefaultVaultPath)(config),
|
|
78
|
+
vault_password_file: config.ansible?.vault_password_file,
|
|
79
|
+
rootDir,
|
|
80
|
+
});
|
|
81
|
+
}
|
|
82
|
+
exports.secretsFixes = [
|
|
83
|
+
{
|
|
84
|
+
id: 'auth-jwt-secret-missing',
|
|
85
|
+
stage: 'secrets',
|
|
86
|
+
severity: 'critical',
|
|
87
|
+
description: 'JWT_SECRET not found in Ansible Vault (required for auth)',
|
|
88
|
+
scan: async (config, rootDir) => {
|
|
89
|
+
try {
|
|
90
|
+
const vault = await getVault(config, rootDir);
|
|
91
|
+
const secret = await vault.getSecret('JWT_SECRET');
|
|
92
|
+
return !secret;
|
|
93
|
+
}
|
|
94
|
+
catch {
|
|
95
|
+
return false; // Vault not available, skip
|
|
96
|
+
}
|
|
97
|
+
},
|
|
98
|
+
fix: async (config, rootDir) => {
|
|
99
|
+
try {
|
|
100
|
+
const vault = await getVault(config, rootDir);
|
|
101
|
+
// Auto-generate a cryptographically secure 256-bit secret
|
|
102
|
+
const jwtSecret = crypto.randomBytes(32).toString('hex');
|
|
103
|
+
const result = await vault.setSecret('JWT_SECRET', jwtSecret);
|
|
104
|
+
if (result.success) {
|
|
105
|
+
console.log(' [OK] Generated and stored JWT_SECRET in Ansible Vault');
|
|
106
|
+
console.log(' (256-bit random key, no manual input needed)');
|
|
107
|
+
return true;
|
|
108
|
+
}
|
|
109
|
+
console.log(' Failed to store JWT_SECRET in vault');
|
|
110
|
+
return false;
|
|
111
|
+
}
|
|
112
|
+
catch (e) {
|
|
113
|
+
console.log(' Error: ' + (e instanceof Error ? e.message : String(e)));
|
|
114
|
+
return false;
|
|
115
|
+
}
|
|
116
|
+
},
|
|
117
|
+
manualFix: 'Generate and store JWT secret: npx stack deploy --secrets set JWT_SECRET',
|
|
118
|
+
},
|
|
119
|
+
{
|
|
120
|
+
id: 'auth-oauth-google-missing',
|
|
121
|
+
stage: 'secrets',
|
|
122
|
+
severity: 'warning',
|
|
123
|
+
description: 'Google OAuth credentials not in vault (GOOGLE_CLIENT_ID)',
|
|
124
|
+
scan: async (config, rootDir) => {
|
|
125
|
+
if (!isOAuthEnabled(config, 'google'))
|
|
126
|
+
return false;
|
|
127
|
+
try {
|
|
128
|
+
const vault = await getVault(config, rootDir);
|
|
129
|
+
const clientId = await vault.getSecret('GOOGLE_CLIENT_ID');
|
|
130
|
+
return !clientId;
|
|
131
|
+
}
|
|
132
|
+
catch {
|
|
133
|
+
return false;
|
|
134
|
+
}
|
|
135
|
+
},
|
|
136
|
+
fix: async (config, rootDir) => {
|
|
137
|
+
try {
|
|
138
|
+
const { promptForSecret } = await Promise.resolve().then(() => __importStar(require('../../../../utils/secret-prompts.js')));
|
|
139
|
+
const vault = await getVault(config, rootDir);
|
|
140
|
+
console.log('');
|
|
141
|
+
console.log(' Google OAuth Setup');
|
|
142
|
+
console.log(' Get credentials from: https://console.cloud.google.com/apis/credentials');
|
|
143
|
+
console.log('');
|
|
144
|
+
const clientId = await promptForSecret('GOOGLE_CLIENT_ID', config);
|
|
145
|
+
const r1 = await vault.setSecret('GOOGLE_CLIENT_ID', clientId);
|
|
146
|
+
if (!r1.success)
|
|
147
|
+
return false;
|
|
148
|
+
const clientSecret = await promptForSecret('GOOGLE_CLIENT_SECRET', config);
|
|
149
|
+
const r2 = await vault.setSecret('GOOGLE_CLIENT_SECRET', clientSecret);
|
|
150
|
+
if (!r2.success)
|
|
151
|
+
return false;
|
|
152
|
+
console.log(' [OK] Stored Google OAuth credentials in vault');
|
|
153
|
+
return true;
|
|
154
|
+
}
|
|
155
|
+
catch {
|
|
156
|
+
return false;
|
|
157
|
+
}
|
|
158
|
+
},
|
|
159
|
+
manualFix: 'Store Google OAuth credentials:\n' +
|
|
160
|
+
' npx stack deploy --secrets set GOOGLE_CLIENT_ID\n' +
|
|
161
|
+
' npx stack deploy --secrets set GOOGLE_CLIENT_SECRET\n' +
|
|
162
|
+
' Get from: https://console.cloud.google.com/apis/credentials',
|
|
163
|
+
},
|
|
164
|
+
{
|
|
165
|
+
id: 'auth-oauth-apple-missing',
|
|
166
|
+
stage: 'secrets',
|
|
167
|
+
severity: 'warning',
|
|
168
|
+
description: 'Apple OAuth credentials not in vault (APPLE_CLIENT_ID)',
|
|
169
|
+
scan: async (config, rootDir) => {
|
|
170
|
+
if (!isOAuthEnabled(config, 'apple'))
|
|
171
|
+
return false;
|
|
172
|
+
try {
|
|
173
|
+
const vault = await getVault(config, rootDir);
|
|
174
|
+
const clientId = await vault.getSecret('APPLE_CLIENT_ID');
|
|
175
|
+
return !clientId;
|
|
176
|
+
}
|
|
177
|
+
catch {
|
|
178
|
+
return false;
|
|
179
|
+
}
|
|
180
|
+
},
|
|
181
|
+
fix: async (config, rootDir) => {
|
|
182
|
+
try {
|
|
183
|
+
const { promptForSecret } = await Promise.resolve().then(() => __importStar(require('../../../../utils/secret-prompts.js')));
|
|
184
|
+
const vault = await getVault(config, rootDir);
|
|
185
|
+
console.log('');
|
|
186
|
+
console.log(' Apple OAuth Setup');
|
|
187
|
+
console.log(' Get credentials from: https://developer.apple.com/account/resources/identifiers');
|
|
188
|
+
console.log('');
|
|
189
|
+
const clientId = await promptForSecret('APPLE_CLIENT_ID', config);
|
|
190
|
+
const r1 = await vault.setSecret('APPLE_CLIENT_ID', clientId);
|
|
191
|
+
if (!r1.success)
|
|
192
|
+
return false;
|
|
193
|
+
console.log(' [OK] Stored Apple OAuth credentials in vault');
|
|
194
|
+
return true;
|
|
195
|
+
}
|
|
196
|
+
catch {
|
|
197
|
+
return false;
|
|
198
|
+
}
|
|
199
|
+
},
|
|
200
|
+
manualFix: 'Store Apple OAuth credentials:\n' +
|
|
201
|
+
' npx stack deploy --secrets set APPLE_CLIENT_ID\n' +
|
|
202
|
+
' Get from: https://developer.apple.com/account/resources/identifiers',
|
|
203
|
+
},
|
|
204
|
+
];
|
|
205
|
+
//# sourceMappingURL=secrets.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"secrets.js","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/secrets.ts"],"names":[],"mappings":";AAAA;;;;;;GAMG;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAEH,+CAAiC;AAEjC,2EAA0E;AAE1E;;GAEG;AACH,SAAS,aAAa,CAAC,MAAqB;IAC1C,MAAM,IAAI,GAAI,MAAkC,CAAC,IAAI,CAAC;IACtD,IAAI,CAAC,IAAI,IAAI,OAAO,IAAI,KAAK,QAAQ;QAAE,OAAO,IAAI,CAAC;IACnD,OAAO,IAA+B,CAAC;AACzC,CAAC;AAED;;GAEG;AACH,SAAS,cAAc,CAAC,MAAqB,EAAE,QAA4B;IACzE,MAAM,IAAI,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;IACnC,IAAI,CAAC,IAAI;QAAE,OAAO,KAAK,CAAC;IAExB,4BAA4B;IAC5B,MAAM,QAAQ,GAAG,IAAI,CAAC,QAA+C,CAAC;IACtE,IAAI,QAAQ,EAAE,KAAK;QAAE,OAAO,IAAI,CAAC;IAEjC,4BAA4B;IAC5B,IAAI,IAAI,CAAC,cAAc,KAAK,QAAQ;QAAE,OAAO,IAAI,CAAC;IAElD,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;GAEG;AACH,KAAK,UAAU,QAAQ,CAAC,MAAqB,EAAE,OAAe;IAC5D,MAAM,EAAE,mBAAmB,EAAE,GAAG,wDAAa,4CAA4C,GAAC,CAAC;IAC3F,OAAO,IAAI,mBAAmB,CAAC;QAC7B,UAAU,EAAE,MAAM,CAAC,OAAO,EAAE,UAAU,IAAI,IAAA,uCAAmB,EAAC,MAAM,CAAC;QACrE,mBAAmB,EAAE,MAAM,CAAC,OAAO,EAAE,mBAAmB;QACxD,OAAO;KACR,CAAC,CAAC;AACL,CAAC;AAEY,QAAA,YAAY,GAAU;IACjC;QACE,EAAE,EAAE,yBAAyB;QAC7B,KAAK,EAAE,SAAS;QAChB,QAAQ,EAAE,UAAU;QACpB,WAAW,EAAE,2DAA2D;QACxE,IAAI,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC;gBACH,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAC9C,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;gBACnD,OAAO,CAAC,MAAM,CAAC;YACjB,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC,CAAC,4BAA4B;YAC5C,CAAC;QACH,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAE9C,0DAA0D;gBAC1D,MAAM,SAAS,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;gBACzD,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;gBAE9D,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;oBACnB,OAAO,CAAC,GAAG,CAAC,0DAA0D,CAAC,CAAC;oBACxE,OAAO,CAAC,GAAG,CAAC,iDAAiD,CAAC,CAAC;oBAC/D,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,OAAO,CAAC,GAAG,CAAC,wCAAwC,CAAC,CAAC;gBACtD,OAAO,KAAK,CAAC;YACf,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,YAAY,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBACzE,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,0EAA0E;KACtF;IAED;QACE,EAAE,EAAE,2BAA2B;QAC/B,KAAK,EAAE,SAAS;QAChB,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,0DAA0D;QACvE,IAAI,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,QAAQ,CAAC;gBAAE,OAAO,KAAK,CAAC;YAEpD,IAAI,CAAC;gBACH,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAC9C,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,kBAAkB,CAAC,CAAC;gBAC3D,OAAO,CAAC,QAAQ,CAAC;YACnB,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,EAAE,eAAe,EAAE,GAAG,wDAAa,qCAAqC,GAAC,CAAC;gBAChF,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAE9C,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAChB,OAAO,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;gBACrC,OAAO,CAAC,GAAG,CAAC,4EAA4E,CAAC,CAAC;gBAC1F,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAEhB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,kBAAkB,EAAE,MAAM,CAAC,CAAC;gBACnE,MAAM,EAAE,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;gBAC/D,IAAI,CAAC,EAAE,CAAC,OAAO;oBAAE,OAAO,KAAK,CAAC;gBAE9B,MAAM,YAAY,GAAG,MAAM,eAAe,CAAC,sBAAsB,EAAE,MAAM,CAAC,CAAC;gBAC3E,MAAM,EAAE,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,sBAAsB,EAAE,YAAY,CAAC,CAAC;gBACvE,IAAI,CAAC,EAAE,CAAC,OAAO;oBAAE,OAAO,KAAK,CAAC;gBAE9B,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;gBAChE,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EACP,mCAAmC;YACnC,yDAAyD;YACzD,6DAA6D;YAC7D,mEAAmE;KACtE;IAED;QACE,EAAE,EAAE,0BAA0B;QAC9B,KAAK,EAAE,SAAS;QAChB,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,wDAAwD;QACrE,IAAI,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,OAAO,CAAC;gBAAE,OAAO,KAAK,CAAC;YAEnD,IAAI,CAAC;gBACH,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAC9C,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;gBAC1D,OAAO,CAAC,QAAQ,CAAC;YACnB,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,EAAE,eAAe,EAAE,GAAG,wDAAa,qCAAqC,GAAC,CAAC;gBAChF,MAAM,KAAK,GAAG,MAAM,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;gBAE9C,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAChB,OAAO,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;gBACpC,OAAO,CAAC,GAAG,CAAC,oFAAoF,CAAC,CAAC;gBAClG,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAEhB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,iBAAiB,EAAE,MAAM,CAAC,CAAC;gBAClE,MAAM,EAAE,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,iBAAiB,EAAE,QAAQ,CAAC,CAAC;gBAC9D,IAAI,CAAC,EAAE,CAAC,OAAO;oBAAE,OAAO,KAAK,CAAC;gBAE9B,OAAO,CAAC,GAAG,CAAC,iDAAiD,CAAC,CAAC;gBAC/D,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EACP,kCAAkC;YAClC,wDAAwD;YACxD,2EAA2E;KAC9E;CACF,CAAC"}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Auth Setup Scanfixes (Dev Stage)
|
|
3
|
+
*
|
|
4
|
+
* Detects @factiii/auth in dependencies and ensures:
|
|
5
|
+
* - Auth config exists in stack.yml
|
|
6
|
+
* - Auth Prisma schema is initialized (npx @factiii/auth init)
|
|
7
|
+
* - Auth doctor passes (validates setup)
|
|
8
|
+
* - Prisma migrations are applied for auth tables
|
|
9
|
+
*/
|
|
10
|
+
import type { Fix } from '../../../../types/index.js';
|
|
11
|
+
export declare const setupFixes: Fix[];
|
|
12
|
+
//# sourceMappingURL=setup.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"setup.d.ts","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/setup.ts"],"names":[],"mappings":"AAAA;;;;;;;;GAQG;AAMH,OAAO,KAAK,EAAiB,GAAG,EAAE,MAAM,4BAA4B,CAAC;AA+BrE,eAAO,MAAM,UAAU,EAAE,GAAG,EAmK3B,CAAC"}
|
|
@@ -0,0 +1,235 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Auth Setup Scanfixes (Dev Stage)
|
|
4
|
+
*
|
|
5
|
+
* Detects @factiii/auth in dependencies and ensures:
|
|
6
|
+
* - Auth config exists in stack.yml
|
|
7
|
+
* - Auth Prisma schema is initialized (npx @factiii/auth init)
|
|
8
|
+
* - Auth doctor passes (validates setup)
|
|
9
|
+
* - Prisma migrations are applied for auth tables
|
|
10
|
+
*/
|
|
11
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
12
|
+
if (k2 === undefined) k2 = k;
|
|
13
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
14
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
15
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
16
|
+
}
|
|
17
|
+
Object.defineProperty(o, k2, desc);
|
|
18
|
+
}) : (function(o, m, k, k2) {
|
|
19
|
+
if (k2 === undefined) k2 = k;
|
|
20
|
+
o[k2] = m[k];
|
|
21
|
+
}));
|
|
22
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
23
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
24
|
+
}) : function(o, v) {
|
|
25
|
+
o["default"] = v;
|
|
26
|
+
});
|
|
27
|
+
var __importStar = (this && this.__importStar) || (function () {
|
|
28
|
+
var ownKeys = function(o) {
|
|
29
|
+
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
30
|
+
var ar = [];
|
|
31
|
+
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
32
|
+
return ar;
|
|
33
|
+
};
|
|
34
|
+
return ownKeys(o);
|
|
35
|
+
};
|
|
36
|
+
return function (mod) {
|
|
37
|
+
if (mod && mod.__esModule) return mod;
|
|
38
|
+
var result = {};
|
|
39
|
+
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
40
|
+
__setModuleDefault(result, mod);
|
|
41
|
+
return result;
|
|
42
|
+
};
|
|
43
|
+
})();
|
|
44
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
45
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
46
|
+
};
|
|
47
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
48
|
+
exports.setupFixes = void 0;
|
|
49
|
+
const fs = __importStar(require("fs"));
|
|
50
|
+
const path = __importStar(require("path"));
|
|
51
|
+
const child_process_1 = require("child_process");
|
|
52
|
+
const js_yaml_1 = __importDefault(require("js-yaml"));
|
|
53
|
+
const config_files_js_1 = require("../../../../constants/config-files.js");
|
|
54
|
+
/**
|
|
55
|
+
* Check if Prisma schema contains auth models (User, Session)
|
|
56
|
+
*/
|
|
57
|
+
function hasAuthModels(rootDir) {
|
|
58
|
+
const schemaPath = path.join(rootDir, 'prisma', 'schema.prisma');
|
|
59
|
+
if (!fs.existsSync(schemaPath))
|
|
60
|
+
return false;
|
|
61
|
+
const content = fs.readFileSync(schemaPath, 'utf8');
|
|
62
|
+
return content.includes('model User') && content.includes('model Session');
|
|
63
|
+
}
|
|
64
|
+
/**
|
|
65
|
+
* Run a command silently and return success/failure
|
|
66
|
+
*/
|
|
67
|
+
function runSilent(cmd, rootDir) {
|
|
68
|
+
try {
|
|
69
|
+
const output = (0, child_process_1.execSync)(cmd, {
|
|
70
|
+
cwd: rootDir,
|
|
71
|
+
encoding: 'utf8',
|
|
72
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
73
|
+
});
|
|
74
|
+
return { success: true, output };
|
|
75
|
+
}
|
|
76
|
+
catch (e) {
|
|
77
|
+
const output = e instanceof Error ? e.message : String(e);
|
|
78
|
+
return { success: false, output };
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
exports.setupFixes = [
|
|
82
|
+
{
|
|
83
|
+
id: 'auth-missing-stack-yml-config',
|
|
84
|
+
stage: 'dev',
|
|
85
|
+
severity: 'warning',
|
|
86
|
+
description: 'Auth config missing from stack.yml (@factiii/auth detected but no auth: section)',
|
|
87
|
+
scan: async (_config, rootDir) => {
|
|
88
|
+
const stackPath = path.join(rootDir, config_files_js_1.STACK_CONFIG_FILENAME);
|
|
89
|
+
if (!fs.existsSync(stackPath))
|
|
90
|
+
return false; // No stack.yml yet, bootstrap handles it
|
|
91
|
+
const content = fs.readFileSync(stackPath, 'utf8');
|
|
92
|
+
// Check if there's an uncommented auth: key at the top level
|
|
93
|
+
return !content.match(/^auth:/m);
|
|
94
|
+
},
|
|
95
|
+
fix: async (_config, rootDir) => {
|
|
96
|
+
try {
|
|
97
|
+
const stackPath = path.join(rootDir, config_files_js_1.STACK_CONFIG_FILENAME);
|
|
98
|
+
const content = fs.readFileSync(stackPath, 'utf8');
|
|
99
|
+
// Build auth section
|
|
100
|
+
const authSection = '\n# ============================================================\n' +
|
|
101
|
+
'# AUTH (@factiii/auth)\n' +
|
|
102
|
+
'# ============================================================\n' +
|
|
103
|
+
'# Detected @factiii/auth in dependencies.\n' +
|
|
104
|
+
'# JWT_SECRET is auto-generated and stored in Ansible Vault.\n' +
|
|
105
|
+
'# Customize features below as needed.\n' +
|
|
106
|
+
'auth:\n' +
|
|
107
|
+
' features:\n' +
|
|
108
|
+
' oauth: false\n' +
|
|
109
|
+
' twoFa: false\n' +
|
|
110
|
+
' emailVerification: false\n' +
|
|
111
|
+
' oauth_provider: EXAMPLE_google\n';
|
|
112
|
+
// Remove any commented-out auth section if present
|
|
113
|
+
let updated = content.replace(/\n?# =+\n# AUTH[^\n]*\n# =+\n(?:#[^\n]*\n)*/g, '');
|
|
114
|
+
// Append auth section before NEXT STEPS or at end
|
|
115
|
+
if (updated.includes('# NEXT STEPS')) {
|
|
116
|
+
updated = updated.replace(/(\n# =+\n# NEXT STEPS)/, authSection + '\n$1');
|
|
117
|
+
}
|
|
118
|
+
else {
|
|
119
|
+
updated = updated.trimEnd() + '\n' + authSection;
|
|
120
|
+
}
|
|
121
|
+
fs.writeFileSync(stackPath, updated, 'utf8');
|
|
122
|
+
console.log(' [OK] Added auth: section to ' + config_files_js_1.STACK_CONFIG_FILENAME);
|
|
123
|
+
// Verify by re-reading
|
|
124
|
+
const verify = fs.readFileSync(stackPath, 'utf8');
|
|
125
|
+
const parsed = js_yaml_1.default.load(verify);
|
|
126
|
+
return !!parsed.auth;
|
|
127
|
+
}
|
|
128
|
+
catch (e) {
|
|
129
|
+
console.log(' Failed: ' + (e instanceof Error ? e.message : String(e)));
|
|
130
|
+
return false;
|
|
131
|
+
}
|
|
132
|
+
},
|
|
133
|
+
manualFix: 'Add to ' + config_files_js_1.STACK_CONFIG_FILENAME + ':\n' +
|
|
134
|
+
' auth:\n' +
|
|
135
|
+
' features:\n' +
|
|
136
|
+
' oauth: false\n' +
|
|
137
|
+
' twoFa: false\n' +
|
|
138
|
+
' emailVerification: false\n' +
|
|
139
|
+
' oauth_provider: EXAMPLE_google',
|
|
140
|
+
},
|
|
141
|
+
{
|
|
142
|
+
id: 'auth-not-initialized',
|
|
143
|
+
stage: 'dev',
|
|
144
|
+
severity: 'critical',
|
|
145
|
+
description: 'Auth schema not initialized (missing User/Session models in Prisma)',
|
|
146
|
+
scan: async (_config, rootDir) => {
|
|
147
|
+
// Only flag if @factiii/auth is installed but schema not initialized
|
|
148
|
+
const schemaPath = path.join(rootDir, 'prisma', 'schema.prisma');
|
|
149
|
+
if (!fs.existsSync(schemaPath))
|
|
150
|
+
return true; // No schema at all
|
|
151
|
+
return !hasAuthModels(rootDir);
|
|
152
|
+
},
|
|
153
|
+
fix: async (_config, rootDir) => {
|
|
154
|
+
try {
|
|
155
|
+
console.log(' Running: npx @factiii/auth init');
|
|
156
|
+
(0, child_process_1.execSync)('npx @factiii/auth init', {
|
|
157
|
+
cwd: rootDir,
|
|
158
|
+
stdio: 'inherit',
|
|
159
|
+
});
|
|
160
|
+
// Regenerate Prisma client
|
|
161
|
+
console.log(' Running: npx prisma generate');
|
|
162
|
+
(0, child_process_1.execSync)('npx prisma generate', {
|
|
163
|
+
cwd: rootDir,
|
|
164
|
+
stdio: 'inherit',
|
|
165
|
+
});
|
|
166
|
+
return hasAuthModels(rootDir);
|
|
167
|
+
}
|
|
168
|
+
catch (e) {
|
|
169
|
+
console.log(' Failed: ' + (e instanceof Error ? e.message : String(e)));
|
|
170
|
+
return false;
|
|
171
|
+
}
|
|
172
|
+
},
|
|
173
|
+
manualFix: 'Run: npx @factiii/auth init && npx prisma generate',
|
|
174
|
+
},
|
|
175
|
+
{
|
|
176
|
+
id: 'auth-doctor-fail',
|
|
177
|
+
stage: 'dev',
|
|
178
|
+
severity: 'warning',
|
|
179
|
+
description: 'Auth doctor check failed (run npx @factiii/auth doctor for details)',
|
|
180
|
+
scan: async (_config, rootDir) => {
|
|
181
|
+
// Skip if auth models not yet initialized
|
|
182
|
+
if (!hasAuthModels(rootDir))
|
|
183
|
+
return false;
|
|
184
|
+
const result = runSilent('npx @factiii/auth doctor', rootDir);
|
|
185
|
+
return !result.success;
|
|
186
|
+
},
|
|
187
|
+
fix: async (_config, rootDir) => {
|
|
188
|
+
// Run doctor with output visible so user can see what's wrong
|
|
189
|
+
try {
|
|
190
|
+
(0, child_process_1.execSync)('npx @factiii/auth doctor', {
|
|
191
|
+
cwd: rootDir,
|
|
192
|
+
stdio: 'inherit',
|
|
193
|
+
});
|
|
194
|
+
return true;
|
|
195
|
+
}
|
|
196
|
+
catch {
|
|
197
|
+
console.log(' Doctor found issues — review output above');
|
|
198
|
+
return false;
|
|
199
|
+
}
|
|
200
|
+
},
|
|
201
|
+
manualFix: 'Run: npx @factiii/auth doctor',
|
|
202
|
+
},
|
|
203
|
+
{
|
|
204
|
+
id: 'auth-prisma-not-migrated',
|
|
205
|
+
stage: 'dev',
|
|
206
|
+
severity: 'warning',
|
|
207
|
+
description: 'Auth database tables not migrated (pending Prisma migrations)',
|
|
208
|
+
scan: async (_config, rootDir) => {
|
|
209
|
+
// Skip if auth models not initialized
|
|
210
|
+
if (!hasAuthModels(rootDir))
|
|
211
|
+
return false;
|
|
212
|
+
// Check for pending migrations
|
|
213
|
+
const result = runSilent('npx prisma migrate status', rootDir);
|
|
214
|
+
if (!result.success)
|
|
215
|
+
return true; // Can't check = assume pending
|
|
216
|
+
return result.output.includes('Following migration') || result.output.includes('not yet been applied');
|
|
217
|
+
},
|
|
218
|
+
fix: async (_config, rootDir) => {
|
|
219
|
+
try {
|
|
220
|
+
console.log(' Running: npx prisma migrate dev');
|
|
221
|
+
(0, child_process_1.execSync)('npx prisma migrate dev', {
|
|
222
|
+
cwd: rootDir,
|
|
223
|
+
stdio: 'inherit',
|
|
224
|
+
});
|
|
225
|
+
return true;
|
|
226
|
+
}
|
|
227
|
+
catch (e) {
|
|
228
|
+
console.log(' Migration failed: ' + (e instanceof Error ? e.message : String(e)));
|
|
229
|
+
return false;
|
|
230
|
+
}
|
|
231
|
+
},
|
|
232
|
+
manualFix: 'Run: npx prisma migrate dev',
|
|
233
|
+
},
|
|
234
|
+
];
|
|
235
|
+
//# sourceMappingURL=setup.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"setup.js","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/setup.ts"],"names":[],"mappings":";AAAA;;;;;;;;GAQG;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAEH,uCAAyB;AACzB,2CAA6B;AAC7B,iDAAyC;AACzC,sDAA2B;AAE3B,2EAA8E;AAE9E;;GAEG;AACH,SAAS,aAAa,CAAC,OAAe;IACpC,MAAM,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,QAAQ,EAAE,eAAe,CAAC,CAAC;IACjE,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC;QAAE,OAAO,KAAK,CAAC;IAE7C,MAAM,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;IACpD,OAAO,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;AAC7E,CAAC;AAED;;GAEG;AACH,SAAS,SAAS,CAAC,GAAW,EAAE,OAAe;IAC7C,IAAI,CAAC;QACH,MAAM,MAAM,GAAG,IAAA,wBAAQ,EAAC,GAAG,EAAE;YAC3B,GAAG,EAAE,OAAO;YACZ,QAAQ,EAAE,MAAM;YAChB,KAAK,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC;SAChC,CAAC,CAAC;QACH,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;IACnC,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,MAAM,MAAM,GAAG,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;QAC1D,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;IACpC,CAAC;AACH,CAAC;AAEY,QAAA,UAAU,GAAU;IAC/B;QACE,EAAE,EAAE,+BAA+B;QACnC,KAAK,EAAE,KAAK;QACZ,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,kFAAkF;QAC/F,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,MAAM,SAAS,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,uCAAqB,CAAC,CAAC;YAC5D,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC;gBAAE,OAAO,KAAK,CAAC,CAAC,yCAAyC;YAEtF,MAAM,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;YACnD,6DAA6D;YAC7D,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;QACnC,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC;gBACH,MAAM,SAAS,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,uCAAqB,CAAC,CAAC;gBAC5D,MAAM,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;gBAEnD,qBAAqB;gBACrB,MAAM,WAAW,GACf,oEAAoE;oBACpE,0BAA0B;oBAC1B,kEAAkE;oBAClE,6CAA6C;oBAC7C,+DAA+D;oBAC/D,yCAAyC;oBACzC,SAAS;oBACT,eAAe;oBACf,oBAAoB;oBACpB,oBAAoB;oBACpB,gCAAgC;oBAChC,oCAAoC,CAAC;gBAEvC,mDAAmD;gBACnD,IAAI,OAAO,GAAG,OAAO,CAAC,OAAO,CAC3B,8CAA8C,EAC9C,EAAE,CACH,CAAC;gBAEF,kDAAkD;gBAClD,IAAI,OAAO,CAAC,QAAQ,CAAC,cAAc,CAAC,EAAE,CAAC;oBACrC,OAAO,GAAG,OAAO,CAAC,OAAO,CACvB,wBAAwB,EACxB,WAAW,GAAG,MAAM,CACrB,CAAC;gBACJ,CAAC;qBAAM,CAAC;oBACN,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,GAAG,IAAI,GAAG,WAAW,CAAC;gBACnD,CAAC;gBAED,EAAE,CAAC,aAAa,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC7C,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,uCAAqB,CAAC,CAAC;gBAEvE,uBAAuB;gBACvB,MAAM,MAAM,GAAG,EAAE,CAAC,YAAY,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;gBAClD,MAAM,MAAM,GAAG,iBAAI,CAAC,IAAI,CAAC,MAAM,CAA4B,CAAC;gBAC5D,OAAO,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC;YACvB,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,aAAa,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBAC1E,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,SAAS,GAAG,uCAAqB,GAAG,KAAK;YAClD,eAAe;YACf,qBAAqB;YACrB,0BAA0B;YAC1B,0BAA0B;YAC1B,sCAAsC;YACtC,wCAAwC;KAC3C;IAED;QACE,EAAE,EAAE,sBAAsB;QAC1B,KAAK,EAAE,KAAK;QACZ,QAAQ,EAAE,UAAU;QACpB,WAAW,EAAE,qEAAqE;QAClF,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,qEAAqE;YACrE,MAAM,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,QAAQ,EAAE,eAAe,CAAC,CAAC;YACjE,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC;gBAAE,OAAO,IAAI,CAAC,CAAC,mBAAmB;YAChE,OAAO,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC;QACjC,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;gBAClD,IAAA,wBAAQ,EAAC,wBAAwB,EAAE;oBACjC,GAAG,EAAE,OAAO;oBACZ,KAAK,EAAE,SAAS;iBACjB,CAAC,CAAC;gBAEH,2BAA2B;gBAC3B,OAAO,CAAC,GAAG,CAAC,iCAAiC,CAAC,CAAC;gBAC/C,IAAA,wBAAQ,EAAC,qBAAqB,EAAE;oBAC9B,GAAG,EAAE,OAAO;oBACZ,KAAK,EAAE,SAAS;iBACjB,CAAC,CAAC;gBAEH,OAAO,aAAa,CAAC,OAAO,CAAC,CAAC;YAChC,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,aAAa,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBAC1E,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,oDAAoD;KAChE;IAED;QACE,EAAE,EAAE,kBAAkB;QACtB,KAAK,EAAE,KAAK;QACZ,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,qEAAqE;QAClF,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,0CAA0C;YAC1C,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC;gBAAE,OAAO,KAAK,CAAC;YAE1C,MAAM,MAAM,GAAG,SAAS,CAAC,0BAA0B,EAAE,OAAO,CAAC,CAAC;YAC9D,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC;QACzB,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACvE,8DAA8D;YAC9D,IAAI,CAAC;gBACH,IAAA,wBAAQ,EAAC,0BAA0B,EAAE;oBACnC,GAAG,EAAE,OAAO;oBACZ,KAAK,EAAE,SAAS;iBACjB,CAAC,CAAC;gBACH,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,MAAM,CAAC;gBACP,OAAO,CAAC,GAAG,CAAC,8CAA8C,CAAC,CAAC;gBAC5D,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,+BAA+B;KAC3C;IAED;QACE,EAAE,EAAE,0BAA0B;QAC9B,KAAK,EAAE,KAAK;QACZ,QAAQ,EAAE,SAAS;QACnB,WAAW,EAAE,+DAA+D;QAC5E,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,sCAAsC;YACtC,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC;gBAAE,OAAO,KAAK,CAAC;YAE1C,+BAA+B;YAC/B,MAAM,MAAM,GAAG,SAAS,CAAC,2BAA2B,EAAE,OAAO,CAAC,CAAC;YAC/D,IAAI,CAAC,MAAM,CAAC,OAAO;gBAAE,OAAO,IAAI,CAAC,CAAC,+BAA+B;YACjE,OAAO,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,qBAAqB,CAAC,IAAI,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,sBAAsB,CAAC,CAAC;QACzG,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACvE,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;gBAClD,IAAA,wBAAQ,EAAC,wBAAwB,EAAE;oBACjC,GAAG,EAAE,OAAO;oBACZ,KAAK,EAAE,SAAS;iBACjB,CAAC,CAAC;gBACH,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,uBAAuB,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBACpF,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,6BAA6B;KACzC;CACF,CAAC"}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Auth Validation Scanfixes (Staging/Prod)
|
|
3
|
+
*
|
|
4
|
+
* Validates that auth environment variables are properly
|
|
5
|
+
* configured on staging and production servers.
|
|
6
|
+
*/
|
|
7
|
+
import type { Fix } from '../../../../types/index.js';
|
|
8
|
+
export declare const validateFixes: Fix[];
|
|
9
|
+
//# sourceMappingURL=validate.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"validate.d.ts","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/validate.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAIH,OAAO,KAAK,EAAiB,GAAG,EAAE,MAAM,4BAA4B,CAAC;AAkBrE,eAAO,MAAM,aAAa,EAAE,GAAG,EAiG9B,CAAC"}
|
|
@@ -0,0 +1,153 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Auth Validation Scanfixes (Staging/Prod)
|
|
4
|
+
*
|
|
5
|
+
* Validates that auth environment variables are properly
|
|
6
|
+
* configured on staging and production servers.
|
|
7
|
+
*/
|
|
8
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
9
|
+
if (k2 === undefined) k2 = k;
|
|
10
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
11
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
12
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
13
|
+
}
|
|
14
|
+
Object.defineProperty(o, k2, desc);
|
|
15
|
+
}) : (function(o, m, k, k2) {
|
|
16
|
+
if (k2 === undefined) k2 = k;
|
|
17
|
+
o[k2] = m[k];
|
|
18
|
+
}));
|
|
19
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
20
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
21
|
+
}) : function(o, v) {
|
|
22
|
+
o["default"] = v;
|
|
23
|
+
});
|
|
24
|
+
var __importStar = (this && this.__importStar) || (function () {
|
|
25
|
+
var ownKeys = function(o) {
|
|
26
|
+
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
27
|
+
var ar = [];
|
|
28
|
+
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
29
|
+
return ar;
|
|
30
|
+
};
|
|
31
|
+
return ownKeys(o);
|
|
32
|
+
};
|
|
33
|
+
return function (mod) {
|
|
34
|
+
if (mod && mod.__esModule) return mod;
|
|
35
|
+
var result = {};
|
|
36
|
+
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
37
|
+
__setModuleDefault(result, mod);
|
|
38
|
+
return result;
|
|
39
|
+
};
|
|
40
|
+
})();
|
|
41
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
42
|
+
exports.validateFixes = void 0;
|
|
43
|
+
const fs = __importStar(require("fs"));
|
|
44
|
+
const path = __importStar(require("path"));
|
|
45
|
+
const config_helpers_js_1 = require("../../../../utils/config-helpers.js");
|
|
46
|
+
/**
|
|
47
|
+
* Check if an env file has a variable set (non-empty, non-EXAMPLE)
|
|
48
|
+
*/
|
|
49
|
+
function envFileHasVar(envFilePath, varName) {
|
|
50
|
+
if (!fs.existsSync(envFilePath))
|
|
51
|
+
return false;
|
|
52
|
+
const content = fs.readFileSync(envFilePath, 'utf8');
|
|
53
|
+
const regex = new RegExp('^' + varName + '\\s*=\\s*(.+)$', 'm');
|
|
54
|
+
const match = content.match(regex);
|
|
55
|
+
if (!match || !match[1])
|
|
56
|
+
return false;
|
|
57
|
+
const value = match[1].trim();
|
|
58
|
+
return value.length > 0 && !value.toUpperCase().startsWith('EXAMPLE');
|
|
59
|
+
}
|
|
60
|
+
exports.validateFixes = [
|
|
61
|
+
{
|
|
62
|
+
id: 'auth-env-jwt-staging',
|
|
63
|
+
stage: 'staging',
|
|
64
|
+
severity: 'critical',
|
|
65
|
+
description: 'JWT_SECRET not set in .env.staging (auth will not work)',
|
|
66
|
+
scan: async (_config, rootDir) => {
|
|
67
|
+
const envPath = path.join(rootDir, '.env.staging');
|
|
68
|
+
return !envFileHasVar(envPath, 'JWT_SECRET');
|
|
69
|
+
},
|
|
70
|
+
fix: async (config, rootDir) => {
|
|
71
|
+
try {
|
|
72
|
+
const { AnsibleVaultSecrets } = await Promise.resolve().then(() => __importStar(require('../../../../utils/ansible-vault-secrets.js')));
|
|
73
|
+
const vault = new AnsibleVaultSecrets({
|
|
74
|
+
vault_path: config.ansible?.vault_path ?? (0, config_helpers_js_1.getDefaultVaultPath)(config),
|
|
75
|
+
vault_password_file: config.ansible?.vault_password_file,
|
|
76
|
+
rootDir,
|
|
77
|
+
});
|
|
78
|
+
const jwtSecret = await vault.getSecret('JWT_SECRET');
|
|
79
|
+
if (!jwtSecret) {
|
|
80
|
+
console.log(' JWT_SECRET not in vault — run: npx stack fix --secrets');
|
|
81
|
+
return false;
|
|
82
|
+
}
|
|
83
|
+
// Append to .env.staging
|
|
84
|
+
const envPath = path.join(rootDir, '.env.staging');
|
|
85
|
+
let content = '';
|
|
86
|
+
if (fs.existsSync(envPath)) {
|
|
87
|
+
content = fs.readFileSync(envPath, 'utf8');
|
|
88
|
+
}
|
|
89
|
+
if (content.includes('JWT_SECRET=')) {
|
|
90
|
+
// Replace existing (empty or EXAMPLE) value
|
|
91
|
+
content = content.replace(/^JWT_SECRET\s*=.*$/m, 'JWT_SECRET=' + jwtSecret);
|
|
92
|
+
}
|
|
93
|
+
else {
|
|
94
|
+
content = content.trimEnd() + '\nJWT_SECRET=' + jwtSecret + '\n';
|
|
95
|
+
}
|
|
96
|
+
fs.writeFileSync(envPath, content, 'utf8');
|
|
97
|
+
console.log(' [OK] Set JWT_SECRET in .env.staging from vault');
|
|
98
|
+
return true;
|
|
99
|
+
}
|
|
100
|
+
catch (e) {
|
|
101
|
+
console.log(' Error: ' + (e instanceof Error ? e.message : String(e)));
|
|
102
|
+
return false;
|
|
103
|
+
}
|
|
104
|
+
},
|
|
105
|
+
manualFix: 'Add JWT_SECRET to .env.staging or run: npx stack fix --secrets && npx stack fix --staging',
|
|
106
|
+
},
|
|
107
|
+
{
|
|
108
|
+
id: 'auth-env-jwt-prod',
|
|
109
|
+
stage: 'prod',
|
|
110
|
+
severity: 'critical',
|
|
111
|
+
description: 'JWT_SECRET not set in .env.prod (auth will not work)',
|
|
112
|
+
scan: async (_config, rootDir) => {
|
|
113
|
+
const envPath = path.join(rootDir, '.env.prod');
|
|
114
|
+
return !envFileHasVar(envPath, 'JWT_SECRET');
|
|
115
|
+
},
|
|
116
|
+
fix: async (config, rootDir) => {
|
|
117
|
+
try {
|
|
118
|
+
const { AnsibleVaultSecrets } = await Promise.resolve().then(() => __importStar(require('../../../../utils/ansible-vault-secrets.js')));
|
|
119
|
+
const vault = new AnsibleVaultSecrets({
|
|
120
|
+
vault_path: config.ansible?.vault_path ?? (0, config_helpers_js_1.getDefaultVaultPath)(config),
|
|
121
|
+
vault_password_file: config.ansible?.vault_password_file,
|
|
122
|
+
rootDir,
|
|
123
|
+
});
|
|
124
|
+
const jwtSecret = await vault.getSecret('JWT_SECRET');
|
|
125
|
+
if (!jwtSecret) {
|
|
126
|
+
console.log(' JWT_SECRET not in vault — run: npx stack fix --secrets');
|
|
127
|
+
return false;
|
|
128
|
+
}
|
|
129
|
+
// Append to .env.prod
|
|
130
|
+
const envPath = path.join(rootDir, '.env.prod');
|
|
131
|
+
let content = '';
|
|
132
|
+
if (fs.existsSync(envPath)) {
|
|
133
|
+
content = fs.readFileSync(envPath, 'utf8');
|
|
134
|
+
}
|
|
135
|
+
if (content.includes('JWT_SECRET=')) {
|
|
136
|
+
content = content.replace(/^JWT_SECRET\s*=.*$/m, 'JWT_SECRET=' + jwtSecret);
|
|
137
|
+
}
|
|
138
|
+
else {
|
|
139
|
+
content = content.trimEnd() + '\nJWT_SECRET=' + jwtSecret + '\n';
|
|
140
|
+
}
|
|
141
|
+
fs.writeFileSync(envPath, content, 'utf8');
|
|
142
|
+
console.log(' [OK] Set JWT_SECRET in .env.prod from vault');
|
|
143
|
+
return true;
|
|
144
|
+
}
|
|
145
|
+
catch (e) {
|
|
146
|
+
console.log(' Error: ' + (e instanceof Error ? e.message : String(e)));
|
|
147
|
+
return false;
|
|
148
|
+
}
|
|
149
|
+
},
|
|
150
|
+
manualFix: 'Add JWT_SECRET to .env.prod or run: npx stack fix --secrets && npx stack fix --prod',
|
|
151
|
+
},
|
|
152
|
+
];
|
|
153
|
+
//# sourceMappingURL=validate.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"validate.js","sourceRoot":"","sources":["../../../../../src/plugins/addons/auth/scanfix/validate.ts"],"names":[],"mappings":";AAAA;;;;;GAKG;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAEH,uCAAyB;AACzB,2CAA6B;AAE7B,2EAA+F;AAE/F;;GAEG;AACH,SAAS,aAAa,CAAC,WAAmB,EAAE,OAAe;IACzD,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC;QAAE,OAAO,KAAK,CAAC;IAE9C,MAAM,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;IACrD,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,GAAG,GAAG,OAAO,GAAG,gBAAgB,EAAE,GAAG,CAAC,CAAC;IAChE,MAAM,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;IACnC,IAAI,CAAC,KAAK,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;QAAE,OAAO,KAAK,CAAC;IAEtC,MAAM,KAAK,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC;IAC9B,OAAO,KAAK,CAAC,MAAM,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;AACxE,CAAC;AAEY,QAAA,aAAa,GAAU;IAClC;QACE,EAAE,EAAE,sBAAsB;QAC1B,KAAK,EAAE,SAAS;QAChB,QAAQ,EAAE,UAAU;QACpB,WAAW,EAAE,yDAAyD;QACtE,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;YACnD,OAAO,CAAC,aAAa,CAAC,OAAO,EAAE,YAAY,CAAC,CAAC;QAC/C,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,EAAE,mBAAmB,EAAE,GAAG,wDAAa,4CAA4C,GAAC,CAAC;gBAC3F,MAAM,KAAK,GAAG,IAAI,mBAAmB,CAAC;oBACpC,UAAU,EAAE,MAAM,CAAC,OAAO,EAAE,UAAU,IAAI,IAAA,uCAAmB,EAAC,MAAM,CAAC;oBACrE,mBAAmB,EAAE,MAAM,CAAC,OAAO,EAAE,mBAAmB;oBACxD,OAAO;iBACR,CAAC,CAAC;gBAEH,MAAM,SAAS,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;gBACtD,IAAI,CAAC,SAAS,EAAE,CAAC;oBACf,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;oBACzE,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,yBAAyB;gBACzB,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;gBACnD,IAAI,OAAO,GAAG,EAAE,CAAC;gBACjB,IAAI,EAAE,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC;oBAC3B,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC7C,CAAC;gBAED,IAAI,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;oBACpC,4CAA4C;oBAC5C,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,qBAAqB,EAAE,aAAa,GAAG,SAAS,CAAC,CAAC;gBAC9E,CAAC;qBAAM,CAAC;oBACN,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,GAAG,eAAe,GAAG,SAAS,GAAG,IAAI,CAAC;gBACnE,CAAC;gBAED,EAAE,CAAC,aAAa,CAAC,OAAO,EAAE,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC3C,OAAO,CAAC,GAAG,CAAC,mDAAmD,CAAC,CAAC;gBACjE,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,YAAY,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBACzE,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,2FAA2F;KACvG;IAED;QACE,EAAE,EAAE,mBAAmB;QACvB,KAAK,EAAE,MAAM;QACb,QAAQ,EAAE,UAAU;QACpB,WAAW,EAAE,sDAAsD;QACnE,IAAI,EAAE,KAAK,EAAE,OAAsB,EAAE,OAAe,EAAoB,EAAE;YACxE,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;YAChD,OAAO,CAAC,aAAa,CAAC,OAAO,EAAE,YAAY,CAAC,CAAC;QAC/C,CAAC;QACD,GAAG,EAAE,KAAK,EAAE,MAAqB,EAAE,OAAe,EAAoB,EAAE;YACtE,IAAI,CAAC;gBACH,MAAM,EAAE,mBAAmB,EAAE,GAAG,wDAAa,4CAA4C,GAAC,CAAC;gBAC3F,MAAM,KAAK,GAAG,IAAI,mBAAmB,CAAC;oBACpC,UAAU,EAAE,MAAM,CAAC,OAAO,EAAE,UAAU,IAAI,IAAA,uCAAmB,EAAC,MAAM,CAAC;oBACrE,mBAAmB,EAAE,MAAM,CAAC,OAAO,EAAE,mBAAmB;oBACxD,OAAO;iBACR,CAAC,CAAC;gBAEH,MAAM,SAAS,GAAG,MAAM,KAAK,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;gBACtD,IAAI,CAAC,SAAS,EAAE,CAAC;oBACf,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;oBACzE,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,sBAAsB;gBACtB,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;gBAChD,IAAI,OAAO,GAAG,EAAE,CAAC;gBACjB,IAAI,EAAE,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC;oBAC3B,OAAO,GAAG,EAAE,CAAC,YAAY,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC7C,CAAC;gBAED,IAAI,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;oBACpC,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,qBAAqB,EAAE,aAAa,GAAG,SAAS,CAAC,CAAC;gBAC9E,CAAC;qBAAM,CAAC;oBACN,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,GAAG,eAAe,GAAG,SAAS,GAAG,IAAI,CAAC;gBACnE,CAAC;gBAED,EAAE,CAAC,aAAa,CAAC,OAAO,EAAE,OAAO,EAAE,MAAM,CAAC,CAAC;gBAC3C,OAAO,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAC;gBAC9D,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,YAAY,GAAG,CAAC,CAAC,YAAY,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBACzE,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,SAAS,EAAE,qFAAqF;KACjG;CACF,CAAC"}
|