@sw-tsdk/plugin-turbine 2.10.0 → 2.11.2-alpha.39
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +29 -24
- package/lib/commands/turbine/config/list.d.ts +1 -1
- package/lib/commands/turbine/config/list.js +4 -1
- package/lib/commands/turbine/config/list.js.map +1 -1
- package/lib/commands/turbine/config/remove.d.ts +3 -5
- package/lib/commands/turbine/config/remove.js +8 -3
- package/lib/commands/turbine/config/remove.js.map +1 -1
- package/lib/commands/turbine/config/set.d.ts +6 -7
- package/lib/commands/turbine/config/set.js +16 -5
- package/lib/commands/turbine/config/set.js.map +1 -1
- package/lib/commands/turbine/config/use.d.ts +3 -5
- package/lib/commands/turbine/config/use.js +9 -4
- package/lib/commands/turbine/config/use.js.map +1 -1
- package/lib/commands/turbine/connector/keys/generate.d.ts +8 -9
- package/lib/commands/turbine/connector/keys/generate.js +27 -16
- package/lib/commands/turbine/connector/keys/generate.js.map +1 -1
- package/lib/commands/turbine/connector/keys/list/local.d.ts +1 -1
- package/lib/commands/turbine/connector/keys/list/local.js +4 -2
- package/lib/commands/turbine/connector/keys/list/local.js.map +1 -1
- package/lib/commands/turbine/connector/keys/list/remote.d.ts +6 -7
- package/lib/commands/turbine/connector/keys/list/remote.js +16 -8
- package/lib/commands/turbine/connector/keys/list/remote.js.map +1 -1
- package/lib/commands/turbine/connector/keys/push.d.ts +7 -8
- package/lib/commands/turbine/connector/keys/push.js +24 -15
- package/lib/commands/turbine/connector/keys/push.js.map +1 -1
- package/lib/commands/turbine/connector/push.d.ts +9 -7
- package/lib/commands/turbine/connector/push.js +21 -11
- package/lib/commands/turbine/connector/push.js.map +1 -1
- package/oclif.manifest.json +487 -1
- package/package.json +9 -9
|
@@ -2,16 +2,15 @@ import { Base } from '@sw-tsdk/core';
|
|
|
2
2
|
export declare class Remote extends Base {
|
|
3
3
|
static description: string;
|
|
4
4
|
static flags: {
|
|
5
|
-
username: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined>;
|
|
6
|
-
password: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined>;
|
|
5
|
+
username: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
6
|
+
password: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
7
|
+
'otp-code': import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
7
8
|
'bypass-certificate-check': import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
|
|
8
9
|
help: import("@oclif/core/lib/interfaces").BooleanFlag<void>;
|
|
9
|
-
'log-level': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined>;
|
|
10
|
+
'log-level': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
10
11
|
};
|
|
11
12
|
static args: {
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
required: boolean;
|
|
15
|
-
}[];
|
|
13
|
+
url: import("@oclif/core/lib/interfaces/parser").Arg<string, Record<string, unknown>>;
|
|
14
|
+
};
|
|
16
15
|
run(): Promise<void>;
|
|
17
16
|
}
|
|
@@ -8,7 +8,6 @@ const turbine_1 = require("@sw-tsdk/turbine");
|
|
|
8
8
|
// noinspection JSUnusedGlobalSymbols
|
|
9
9
|
class Remote extends core_2.Base {
|
|
10
10
|
async run() {
|
|
11
|
-
var _a;
|
|
12
11
|
const { flags, args } = await this.parse(Remote);
|
|
13
12
|
const { username, password, 'bypass-certificate-check': bypassCertificateCheck, } = flags;
|
|
14
13
|
let { url, } = args;
|
|
@@ -17,7 +16,7 @@ class Remote extends core_2.Base {
|
|
|
17
16
|
}
|
|
18
17
|
const turbineConfig = await this.getConfig(url);
|
|
19
18
|
if (turbineConfig) {
|
|
20
|
-
core_1.
|
|
19
|
+
core_1.ux.log(`Config: ${url} | ${turbineConfig.username}`);
|
|
21
20
|
}
|
|
22
21
|
const answers = await (0, inquirer_1.prompt)([{
|
|
23
22
|
type: 'input',
|
|
@@ -38,18 +37,27 @@ class Remote extends core_2.Base {
|
|
|
38
37
|
const newConfig = Object.assign(flags, { url }, answers);
|
|
39
38
|
const turbine = await turbine_1.Turbine.get(newConfig.url, bypassCertificateCheck);
|
|
40
39
|
if (newConfig.username && newConfig.password) {
|
|
41
|
-
await
|
|
40
|
+
await turbine?.login(newConfig.username, newConfig.password, newConfig['otp-code']);
|
|
42
41
|
}
|
|
43
|
-
const keys =
|
|
42
|
+
const keys = await turbine?.getPublicKeys() ?? [];
|
|
44
43
|
console.log(keys.join('\n'));
|
|
45
44
|
}
|
|
46
45
|
}
|
|
47
46
|
exports.Remote = Remote;
|
|
48
47
|
Remote.description = 'Use to list remote keys';
|
|
49
|
-
Remote.flags =
|
|
50
|
-
|
|
48
|
+
Remote.flags = {
|
|
49
|
+
...core_2.Base.BaseFlags,
|
|
50
|
+
username: core_1.Flags.string({ char: 'u', description: 'Turbine username' }),
|
|
51
|
+
password: core_1.Flags.string({ char: 'p', description: 'Turbine password (ENV: TURBINE_PASSWORD)', env: 'TURBINE_PASSWORD' }),
|
|
52
|
+
'otp-code': core_1.Flags.string({ char: 'c', description: 'Turbine 2FA code', default: '' }),
|
|
53
|
+
'bypass-certificate-check': core_1.Flags.boolean({ char: 'b', description: 'disable certificate validation for Turbine instance (ENV: TURBINE_BYPASS_CERTIFICATE_CHECK)', env: 'TURBINE_BYPASS_CERTIFICATE_CHECK' }),
|
|
54
|
+
help: core_1.Flags.help({ char: 'h' }),
|
|
55
|
+
};
|
|
56
|
+
Remote.args = {
|
|
57
|
+
url: core_1.Args.string({
|
|
51
58
|
name: 'url',
|
|
52
59
|
description: 'the url of the turbine instance [https://turbine.acme.com]',
|
|
53
|
-
required:
|
|
54
|
-
}
|
|
60
|
+
required: true,
|
|
61
|
+
}),
|
|
62
|
+
};
|
|
55
63
|
//# sourceMappingURL=remote.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"remote.js","sourceRoot":"","sources":["../../../../../../src/commands/turbine/connector/keys/list/remote.ts"],"names":[],"mappings":";;;AAAA,
|
|
1
|
+
{"version":3,"file":"remote.js","sourceRoot":"","sources":["../../../../../../src/commands/turbine/connector/keys/list/remote.ts"],"names":[],"mappings":";;;AAAA,sCAA2C;AAC3C,wCAAkC;AAClC,uCAA+B;AAC/B,8CAAwC;AAExC,qCAAqC;AACrC,MAAa,MAAO,SAAQ,WAAI;IAoB9B,KAAK,CAAC,GAAG;QACP,MAAM,EAAC,KAAK,EAAE,IAAI,EAAC,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAA;QAE9C,MAAM,EACJ,QAAQ,EACR,QAAQ,EACR,0BAA0B,EAAE,sBAAsB,GACnD,GAAG,KAAK,CAAA;QAET,IAAI,EACF,GAAG,GACJ,GAAG,IAAI,CAAA;QAER,IAAI,CAAC,GAAG,EAAE;YACR,GAAG,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,CAAA;SACtC;QAED,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,SAAS,CAA0B,GAAG,CAAC,CAAA;QAExE,IAAI,aAAa,EAAE;YACjB,SAAE,CAAC,GAAG,CAAC,WAAW,GAAG,MAAM,aAAa,CAAC,QAAQ,EAAE,CAAC,CAAA;SACrD;QAED,MAAM,OAAO,GAAG,MAAM,IAAA,iBAAM,EAAC,CAAC;gBAC5B,IAAI,EAAE,OAAO;gBACb,IAAI,EAAE,KAAK;gBACX,OAAO,EAAE,kEAAkE;gBAC3E,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,GAAG,IAAI,GAAG,CAAC,MAAM,KAAK,CAAC;aACrC,EAAE;gBACD,IAAI,EAAE,OAAO;gBACb,IAAI,EAAE,UAAU;gBAChB,OAAO,EAAE,kBAAkB;gBAC3B,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,aAAa,IAAI,CAAC,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,CAAC;aACnE,EAAE;gBACD,IAAI,EAAE,UAAU;gBAChB,IAAI,EAAE,UAAU;gBAChB,OAAO,EAAE,kBAAkB;gBAC3B,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,aAAa,IAAI,CAAC,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,CAAC;aACnE,CAAC,CAAC,CAAA;QAEH,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,EAAE,EAAC,GAAG,EAAC,EAAE,OAAO,CAAC,CAAA;QAEtD,MAAM,OAAO,GAAG,MAAM,iBAAO,CAAC,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,sBAAsB,CAAC,CAAA;QAExE,IAAI,SAAS,CAAC,QAAQ,IAAI,SAAS,CAAC,QAAQ,EAAE;YAC5C,MAAM,OAAO,EAAE,KAAK,CAAC,SAAS,CAAC,QAAQ,EAAE,SAAS,CAAC,QAAQ,EAAE,SAAS,CAAC,UAAU,CAAC,CAAC,CAAA;SACpF;QAED,MAAM,IAAI,GAAG,MAAM,OAAO,EAAE,aAAa,EAAE,IAAI,EAAE,CAAA;QAEjD,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAA;IAC9B,CAAC;;AAvEH,wBAwEC;AAvEQ,kBAAW,GAAG,yBAAyB,CAAA;AAEvC,YAAK,GAAG;IACb,GAAG,WAAI,CAAC,SAAS;IACjB,QAAQ,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,kBAAkB,EAAC,CAAC;IACpE,QAAQ,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,0CAA0C,EAAE,GAAG,EAAE,kBAAkB,EAAC,CAAC;IACrH,UAAU,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,kBAAkB,EAAE,OAAO,EAAE,EAAE,EAAC,CAAC;IACnF,0BAA0B,EAAE,YAAK,CAAC,OAAO,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,6FAA6F,EAAE,GAAG,EAAE,kCAAkC,EAAC,CAAC;IAC3M,IAAI,EAAE,YAAK,CAAC,IAAI,CAAC,EAAC,IAAI,EAAE,GAAG,EAAC,CAAC;CAC9B,CAAA;AAEM,WAAI,GAAG;IACZ,GAAG,EAAE,WAAI,CAAC,MAAM,CAAC;QACf,IAAI,EAAE,KAAK;QACX,WAAW,EAAE,4DAA4D;QACzE,QAAQ,EAAE,IAAI;KACf,CAAC;CACH,CAAA"}
|
|
@@ -2,17 +2,16 @@ import { Base } from '@sw-tsdk/core';
|
|
|
2
2
|
export declare class Generate extends Base {
|
|
3
3
|
static description: string;
|
|
4
4
|
static flags: {
|
|
5
|
-
username: import("@oclif/core/lib/interfaces").OptionFlag<string>;
|
|
6
|
-
password: import("@oclif/core/lib/interfaces").OptionFlag<string>;
|
|
7
|
-
keyName: import("@oclif/core/lib/interfaces").OptionFlag<string>;
|
|
5
|
+
username: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
6
|
+
password: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
7
|
+
keyName: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
8
|
+
'otp-code': import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
8
9
|
'bypass-certificate-check': import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
|
|
9
10
|
help: import("@oclif/core/lib/interfaces").BooleanFlag<void>;
|
|
10
|
-
'log-level': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined>;
|
|
11
|
+
'log-level': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
11
12
|
};
|
|
12
13
|
static args: {
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
required: boolean;
|
|
16
|
-
}[];
|
|
14
|
+
url: import("@oclif/core/lib/interfaces/parser").Arg<string, Record<string, unknown>>;
|
|
15
|
+
};
|
|
17
16
|
run(): Promise<void>;
|
|
18
17
|
}
|
|
@@ -13,7 +13,6 @@ const node_fs_1 = require("node:fs");
|
|
|
13
13
|
// noinspection JSUnusedGlobalSymbols
|
|
14
14
|
class Generate extends core_2.Base {
|
|
15
15
|
async run() {
|
|
16
|
-
var _a;
|
|
17
16
|
const { flags, args } = await this.parse(Generate);
|
|
18
17
|
const { username, password, 'bypass-certificate-check': bypassCertificateCheck, } = flags;
|
|
19
18
|
let { url, } = args;
|
|
@@ -23,7 +22,7 @@ class Generate extends core_2.Base {
|
|
|
23
22
|
}
|
|
24
23
|
const turbineConfig = await this.getConfig(url);
|
|
25
24
|
if (turbineConfig) {
|
|
26
|
-
core_1.
|
|
25
|
+
core_1.ux.log(`Config: ${url} | ${turbineConfig.username}`);
|
|
27
26
|
}
|
|
28
27
|
const allKeys = [];
|
|
29
28
|
if (!keyName) {
|
|
@@ -60,44 +59,54 @@ class Generate extends core_2.Base {
|
|
|
60
59
|
await (0, fs_extra_1.ensureDir)(storagePath);
|
|
61
60
|
const privateKeyPath = (0, node_path_1.join)(storagePath, 'cosign.key');
|
|
62
61
|
if (!await (0, core_2.fileExists)(privateKeyPath)) {
|
|
63
|
-
core_1.
|
|
62
|
+
core_1.ux.error(`Could not find key: ${keyName}.`);
|
|
64
63
|
}
|
|
65
64
|
const turbine = await turbine_1.Turbine.get(newConfig.url, bypassCertificateCheck);
|
|
66
65
|
if (newConfig.username && newConfig.password) {
|
|
67
|
-
await
|
|
66
|
+
await turbine?.login(username, password, newConfig['otp-code']);
|
|
68
67
|
}
|
|
69
|
-
core_1.
|
|
68
|
+
core_1.ux.action.start('Generating the signing key...');
|
|
70
69
|
await (0, fs_extra_1.ensureDir)(storagePath);
|
|
71
|
-
core_1.
|
|
70
|
+
core_1.ux.action.stop();
|
|
72
71
|
const publicKeyPath = (0, node_path_1.join)(storagePath, 'cosign.pub');
|
|
73
72
|
if (!await (0, core_2.fileExists)(publicKeyPath)) {
|
|
74
|
-
core_1.
|
|
73
|
+
core_1.ux.error(`Could not find file public key: ${keyName}`);
|
|
75
74
|
return;
|
|
76
75
|
}
|
|
77
76
|
const publicKey = await (0, promises_2.readFile)(publicKeyPath);
|
|
78
77
|
const publicKeyContents = publicKey.toString();
|
|
79
78
|
if (!/BEGIN PUBLIC KEY/.test(publicKeyContents)) {
|
|
80
|
-
core_1.
|
|
79
|
+
core_1.ux.error(`Invalid public key: ${keyName}`);
|
|
81
80
|
return;
|
|
82
81
|
}
|
|
83
|
-
core_1.
|
|
84
|
-
const success = await
|
|
82
|
+
core_1.ux.action.start('Uploading the key...');
|
|
83
|
+
const success = await turbine?.uploadKey(keyName, publicKeyContents.toString());
|
|
85
84
|
if (success) {
|
|
86
85
|
const hostPath = (0, node_path_1.join)(storagePath, 'hosts.json');
|
|
87
86
|
await (0, fs_extra_1.ensureFile)(hostPath);
|
|
88
|
-
const hosts =
|
|
87
|
+
const hosts = await (0, fs_extra_1.readJson)(hostPath, { throws: false }) ?? {};
|
|
89
88
|
hosts[new URL(newConfig.url).host] = { lastPushed: new Date() };
|
|
90
89
|
await (0, fs_extra_1.writeJson)(hostPath, hosts);
|
|
91
90
|
}
|
|
92
|
-
core_1.
|
|
91
|
+
core_1.ux.action.stop(`${success ? 'done' : 'failed'}`);
|
|
93
92
|
}
|
|
94
93
|
}
|
|
95
94
|
exports.Generate = Generate;
|
|
96
95
|
Generate.description = 'Use to generate and store signing keys in Turbine';
|
|
97
|
-
Generate.flags =
|
|
98
|
-
|
|
96
|
+
Generate.flags = {
|
|
97
|
+
...core_2.Base.BaseFlags,
|
|
98
|
+
username: core_1.Flags.string({ char: 'u', description: 'Turbine username', default: '' }),
|
|
99
|
+
password: core_1.Flags.string({ char: 'p', description: 'Turbine password (ENV: TURBINE_PASSWORD)', default: '', env: 'TURBINE_PASSWORD' }),
|
|
100
|
+
keyName: core_1.Flags.string({ description: 'name used for the key (default: username_YYYY)', default: '', name: 'key-name' }),
|
|
101
|
+
'otp-code': core_1.Flags.string({ char: 'c', description: 'Turbine 2FA code', default: '' }),
|
|
102
|
+
'bypass-certificate-check': core_1.Flags.boolean({ char: 'b', description: 'disable certificate validation for Turbine instance (ENV: TURBINE_BYPASS_CERTIFICATE_CHECK)', env: 'TURBINE_BYPASS_CERTIFICATE_CHECK' }),
|
|
103
|
+
help: core_1.Flags.help({ char: 'h' }),
|
|
104
|
+
};
|
|
105
|
+
Generate.args = {
|
|
106
|
+
url: core_1.Args.string({
|
|
99
107
|
name: 'url',
|
|
100
108
|
description: 'the url of the turbine instance [https://turbine.acme.com]',
|
|
101
109
|
required: true,
|
|
102
|
-
}
|
|
110
|
+
}),
|
|
111
|
+
};
|
|
103
112
|
//# sourceMappingURL=push.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"push.js","sourceRoot":"","sources":["../../../../../src/commands/turbine/connector/keys/push.ts"],"names":[],"mappings":";;;AAAA,
|
|
1
|
+
{"version":3,"file":"push.js","sourceRoot":"","sources":["../../../../../src/commands/turbine/connector/keys/push.ts"],"names":[],"mappings":";;;AAAA,sCAA2C;AAC3C,wCAA8C;AAC9C,8CAAwC;AACxC,yCAA8B;AAC9B,+CAAwC;AACxC,uCAAmE;AACnE,+CAAyC;AACzC,uCAA+B;AAC/B,qCAA2C;AAE3C,qCAAqC;AACrC,MAAa,QAAS,SAAQ,WAAI;IAqBhC,KAAK,CAAC,GAAG;QACP,MAAM,EAAC,KAAK,EAAE,IAAI,EAAC,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAA;QAChD,MAAM,EACJ,QAAQ,EACR,QAAQ,EACR,0BAA0B,EAAE,sBAAsB,GACnD,GAAG,KAAK,CAAA;QAET,IAAI,EACF,GAAG,GACJ,GAAG,IAAI,CAAA;QAER,IAAI,EACF,UAAU,EAAE,OAAO,GACpB,GAAG,KAAK,CAAA;QAET,IAAI,CAAC,GAAG,EAAE;YACR,GAAG,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,CAAA;SACtC;QAED,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,SAAS,CAA0B,GAAG,CAAC,CAAA;QAExE,IAAI,aAAa,EAAE;YACjB,SAAE,CAAC,GAAG,CAAC,WAAW,GAAG,MAAM,aAAa,CAAC,QAAQ,EAAE,CAAC,CAAA;SACrD;QAED,MAAM,OAAO,GAAa,EAAE,CAAA;QAE5B,IAAI,CAAC,OAAO,EAAE;YACZ,MAAM,WAAW,GAAG,IAAA,gBAAI,EAAC,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,MAAM,CAAC,CAAA;YACvD,MAAM,IAAA,oBAAS,EAAC,WAAW,CAAC,CAAA;YAC5B,MAAM,WAAW,GAAG,MAAM,IAAA,kBAAO,EAAC,WAAW,EAAE,EAAC,aAAa,EAAE,IAAI,EAAC,CAAC,CAAA;YAErE,OAAO,CAAC,IAAI,CAAC,GAAG,WAAW,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,WAAW,EAAE,IAAI,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,WAAW,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAA;SAClI;QAED,MAAM,OAAO,GAAG,MAAM,IAAA,iBAAM,EAAC,CAAC;gBAC5B,IAAI,EAAE,OAAO;gBACb,IAAI,EAAE,KAAK;gBACX,OAAO,EAAE,kEAAkE;gBAC3E,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,GAAG,IAAI,GAAG,CAAC,MAAM,KAAK,CAAC;aACrC,EAAE;gBACD,IAAI,EAAE,OAAO;gBACb,IAAI,EAAE,UAAU;gBAChB,OAAO,EAAE,kBAAkB;gBAC3B,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,aAAa,IAAI,CAAC,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,CAAC;aACnE,EAAE;gBACD,IAAI,EAAE,UAAU;gBAChB,IAAI,EAAE,UAAU;gBAChB,OAAO,EAAE,kBAAkB;gBAC3B,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,aAAa,IAAI,CAAC,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,CAAC;aACnE,EAAE;gBACD,IAAI,EAAE,MAAM;gBACZ,IAAI,EAAE,SAAS;gBACf,OAAO,EAAE,eAAe;gBACxB,OAAO,EAAE,OAAO;gBAChB,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC;aAC7C,CAAC,CAAC,CAAA;QAEH,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,EAAE,EAAC,GAAG,EAAC,EAAE,OAAO,CAAC,CAAA;QACtD,OAAO,GAAG,OAAO,CAAC,OAAO,CAAA;QACzB,MAAM,WAAW,GAAG,IAAA,gBAAI,EAAC,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,MAAM,EAAE,OAAO,CAAC,CAAA;QAChE,MAAM,IAAA,oBAAS,EAAC,WAAW,CAAC,CAAA;QAC5B,MAAM,cAAc,GAAG,IAAA,gBAAI,EAAC,WAAW,EAAE,YAAY,CAAC,CAAA;QACtD,IAAI,CAAC,MAAM,IAAA,iBAAU,EAAC,cAAc,CAAC,EAAE;YACrC,SAAE,CAAC,KAAK,CAAC,uBAAuB,OAAO,GAAG,CAAC,CAAA;SAC5C;QAED,MAAM,OAAO,GAAG,MAAM,iBAAO,CAAC,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,sBAAsB,CAAC,CAAA;QAExE,IAAI,SAAS,CAAC,QAAQ,IAAI,SAAS,CAAC,QAAQ,EAAE;YAC5C,MAAM,OAAO,EAAE,KAAK,CAAC,QAAQ,EAAE,QAAQ,EAAE,SAAS,CAAC,UAAU,CAAC,CAAC,CAAA;SAChE;QAED,SAAE,CAAC,MAAM,CAAC,KAAK,CAAC,+BAA+B,CAAC,CAAA;QAEhD,MAAM,IAAA,oBAAS,EAAC,WAAW,CAAC,CAAA;QAE5B,SAAE,CAAC,MAAM,CAAC,IAAI,EAAE,CAAA;QAEhB,MAAM,aAAa,GAAG,IAAA,gBAAI,EAAC,WAAW,EAAE,YAAY,CAAC,CAAA;QACrD,IAAI,CAAC,MAAM,IAAA,iBAAU,EAAC,aAAa,CAAC,EAAE;YACpC,SAAE,CAAC,KAAK,CAAC,mCAAmC,OAAO,EAAE,CAAC,CAAA;YACtD,OAAM;SACP;QAED,MAAM,SAAS,GAAG,MAAM,IAAA,mBAAQ,EAAC,aAAa,CAAC,CAAA;QAE/C,MAAM,iBAAiB,GAAG,SAAS,CAAC,QAAQ,EAAE,CAAA;QAE9C,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,iBAAiB,CAAC,EAAE;YAC/C,SAAE,CAAC,KAAK,CAAC,uBAAuB,OAAO,EAAE,CAAC,CAAA;YAC1C,OAAM;SACP;QAED,SAAE,CAAC,MAAM,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAA;QAEvC,MAAM,OAAO,GAAG,MAAM,OAAO,EAAE,SAAS,CAAC,OAAO,EAAE,iBAAiB,CAAC,QAAQ,EAAE,CAAC,CAAA;QAE/E,IAAI,OAAO,EAAE;YACX,MAAM,QAAQ,GAAG,IAAA,gBAAI,EAAC,WAAW,EAAE,YAAY,CAAC,CAAA;YAChD,MAAM,IAAA,qBAAU,EAAC,QAAQ,CAAC,CAAA;YAC1B,MAAM,KAAK,GAAG,MAAM,IAAA,mBAAQ,EAAC,QAAQ,EAAE,EAAC,MAAM,EAAE,KAAK,EAAC,CAAC,IAAI,EAAE,CAAA;YAC7D,KAAK,CAAC,IAAI,GAAG,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,GAAG,EAAC,UAAU,EAAE,IAAI,IAAI,EAAE,EAAC,CAAA;YAC7D,MAAM,IAAA,oBAAS,EAAC,QAAQ,EAAE,KAAK,CAAC,CAAA;SACjC;QAED,SAAE,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAA;IAClD,CAAC;;AAjIH,4BAkIC;AAjIQ,oBAAW,GAAG,mDAAmD,CAAA;AAEjE,cAAK,GAAG;IACb,GAAG,WAAI,CAAC,SAAS;IACjB,QAAQ,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,kBAAkB,EAAE,OAAO,EAAE,EAAE,EAAC,CAAC;IACjF,QAAQ,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,0CAA0C,EAAE,OAAO,EAAE,EAAE,EAAE,GAAG,EAAE,kBAAkB,EAAC,CAAC;IAClI,OAAO,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,WAAW,EAAE,gDAAgD,EAAE,OAAO,EAAE,EAAE,EAAE,IAAI,EAAE,UAAU,EAAC,CAAC;IACrH,UAAU,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,kBAAkB,EAAE,OAAO,EAAE,EAAE,EAAC,CAAC;IACnF,0BAA0B,EAAE,YAAK,CAAC,OAAO,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,6FAA6F,EAAE,GAAG,EAAE,kCAAkC,EAAC,CAAC;IAC3M,IAAI,EAAE,YAAK,CAAC,IAAI,CAAC,EAAC,IAAI,EAAE,GAAG,EAAC,CAAC;CAC9B,CAAA;AAEM,aAAI,GAAG;IACZ,GAAG,EAAE,WAAI,CAAC,MAAM,CAAC;QACf,IAAI,EAAE,KAAK;QACX,WAAW,EAAE,4DAA4D;QACzE,QAAQ,EAAE,IAAI;KACf,CAAC;CACH,CAAA"}
|
|
@@ -2,16 +2,18 @@ import { Base } from '@sw-tsdk/core';
|
|
|
2
2
|
export declare class Push extends Base {
|
|
3
3
|
static description: string;
|
|
4
4
|
static flags: {
|
|
5
|
-
username: import("@oclif/core/lib/interfaces").OptionFlag<string>;
|
|
6
|
-
password: import("@oclif/core/lib/interfaces").OptionFlag<string>;
|
|
5
|
+
username: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
6
|
+
password: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
7
|
+
'otp-code': import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
7
8
|
'bypass-certificate-check': import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
|
|
8
9
|
help: import("@oclif/core/lib/interfaces").BooleanFlag<void>;
|
|
9
|
-
'log-level': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined>;
|
|
10
|
+
'log-level': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
|
|
10
11
|
};
|
|
11
12
|
static args: {
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
13
|
+
file: import("@oclif/core/lib/interfaces/parser").Arg<string, {
|
|
14
|
+
exists?: boolean | undefined;
|
|
15
|
+
}>;
|
|
16
|
+
url: import("@oclif/core/lib/interfaces/parser").Arg<string, Record<string, unknown>>;
|
|
17
|
+
};
|
|
16
18
|
run(): Promise<void>;
|
|
17
19
|
}
|
|
@@ -18,10 +18,10 @@ class Push extends core_3.Base {
|
|
|
18
18
|
}
|
|
19
19
|
const turbineConfig = await this.getConfig(url);
|
|
20
20
|
if (turbineConfig) {
|
|
21
|
-
core_2.
|
|
21
|
+
core_2.ux.log(`Config: ${url} | ${turbineConfig.username}`);
|
|
22
22
|
}
|
|
23
23
|
if (!await (0, core_3.fileExists)(file)) {
|
|
24
|
-
core_2.
|
|
24
|
+
core_2.ux.error(`Could not find file: ${file}`);
|
|
25
25
|
return;
|
|
26
26
|
}
|
|
27
27
|
const answers = await (0, inquirer_1.prompt)([{
|
|
@@ -43,23 +43,33 @@ class Push extends core_3.Base {
|
|
|
43
43
|
const newConfig = Object.assign(flags, { url }, answers);
|
|
44
44
|
const turbine = await turbine_1.Turbine.get(newConfig.url, bypassCertificateCheck);
|
|
45
45
|
if (newConfig.username && newConfig.password) {
|
|
46
|
-
await
|
|
46
|
+
await turbine?.login(newConfig.username, newConfig.password, newConfig['otp-code']);
|
|
47
47
|
}
|
|
48
|
-
core_2.
|
|
49
|
-
const success = await
|
|
50
|
-
core_2.
|
|
48
|
+
core_2.ux.action.start('Pushing the connector...');
|
|
49
|
+
const success = await turbine?.uploadConnector(file);
|
|
50
|
+
core_2.ux.action.stop(`${success ? 'done' : 'failed'}`);
|
|
51
51
|
}
|
|
52
52
|
}
|
|
53
53
|
exports.Push = Push;
|
|
54
54
|
Push.description = 'Use to push an integration to Turbine';
|
|
55
|
-
Push.flags =
|
|
56
|
-
|
|
55
|
+
Push.flags = {
|
|
56
|
+
...core_3.Base.BaseFlags,
|
|
57
|
+
username: core_1.Flags.string({ char: 'u', description: 'Turbine username', default: '' }),
|
|
58
|
+
password: core_1.Flags.string({ char: 'p', description: 'Turbine password (ENV: TURBINE_PASSWORD)', default: '', env: 'TURBINE_PASSWORD' }),
|
|
59
|
+
'otp-code': core_1.Flags.string({ char: 'c', description: 'Turbine 2FA code', default: '' }),
|
|
60
|
+
'bypass-certificate-check': core_1.Flags.boolean({ char: 'b', description: 'disable certificate validation for Turbine instance (ENV: TURBINE_BYPASS_CERTIFICATE_CHECK)', env: 'TURBINE_BYPASS_CERTIFICATE_CHECK' }),
|
|
61
|
+
help: core_1.Flags.help({ char: 'h' }),
|
|
62
|
+
};
|
|
63
|
+
Push.args = {
|
|
64
|
+
file: core_1.Args.file({
|
|
57
65
|
name: 'file',
|
|
58
66
|
description: 'path of the file to be uploaded to Turbine',
|
|
59
67
|
required: true,
|
|
60
|
-
},
|
|
68
|
+
}),
|
|
69
|
+
url: core_1.Args.string({
|
|
61
70
|
name: 'url',
|
|
62
71
|
description: 'the url of the turbine instance [https://turbine.acme.com]',
|
|
63
|
-
required:
|
|
64
|
-
}
|
|
72
|
+
required: true,
|
|
73
|
+
}),
|
|
74
|
+
};
|
|
65
75
|
//# sourceMappingURL=push.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"push.js","sourceRoot":"","sources":["../../../../src/commands/turbine/connector/push.ts"],"names":[],"mappings":";;;AAAA,
|
|
1
|
+
{"version":3,"file":"push.js","sourceRoot":"","sources":["../../../../src/commands/turbine/connector/push.ts"],"names":[],"mappings":";;;AAAA,sCAAuC;AACvC,sCAA8B;AAC9B,wCAA8C;AAC9C,8CAAwC;AACxC,uCAA+B;AAE/B,qCAAqC;AACrC,MAAa,IAAK,SAAQ,WAAI;IAyB5B,KAAK,CAAC,GAAG;QACP,MAAM,EAAC,KAAK,EAAE,IAAI,EAAC,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAA;QAC5C,MAAM,EACJ,QAAQ,EACR,QAAQ,EACR,0BAA0B,EAAE,sBAAsB,GACnD,GAAG,KAAK,CAAA;QAET,IAAI,EACF,GAAG,GACJ,GAAG,IAAI,CAAA;QAER,MAAM,EACJ,IAAI,GACL,GAAG,IAAI,CAAA;QAER,IAAI,CAAC,GAAG,EAAE;YACR,GAAG,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,CAAA;SACtC;QAED,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,SAAS,CAA0B,GAAG,CAAC,CAAA;QAExE,IAAI,aAAa,EAAE;YACjB,SAAE,CAAC,GAAG,CAAC,WAAW,GAAG,MAAM,aAAa,CAAC,QAAQ,EAAE,CAAC,CAAA;SACrD;QAED,IAAI,CAAC,MAAM,IAAA,iBAAU,EAAC,IAAI,CAAC,EAAE;YAC3B,SAAE,CAAC,KAAK,CAAC,wBAAwB,IAAI,EAAE,CAAC,CAAA;YACxC,OAAM;SACP;QAED,MAAM,OAAO,GAAG,MAAM,IAAA,iBAAM,EAAC,CAAC;gBAC5B,IAAI,EAAE,OAAO;gBACb,IAAI,EAAE,KAAK;gBACX,OAAO,EAAE,kEAAkE;gBAC3E,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,GAAG,IAAI,GAAG,CAAC,MAAM,KAAK,CAAC;aACrC,EAAE;gBACD,IAAI,EAAE,OAAO;gBACb,IAAI,EAAE,UAAU;gBAChB,OAAO,EAAE,kBAAkB;gBAC3B,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,aAAa,IAAI,CAAC,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,CAAC;aACnE,EAAE;gBACD,IAAI,EAAE,UAAU;gBAChB,IAAI,EAAE,UAAU;gBAChB,OAAO,EAAE,kBAAkB;gBAC3B,IAAI,EAAE,GAAG,EAAE,CAAC,CAAC,aAAa,IAAI,CAAC,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,CAAC;aACnE,CAAC,CAAC,CAAA;QAEH,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,EAAE,EAAC,GAAG,EAAC,EAAE,OAAO,CAAC,CAAA;QAEtD,MAAM,OAAO,GAAG,MAAM,iBAAO,CAAC,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,sBAAsB,CAAC,CAAA;QAExE,IAAI,SAAS,CAAC,QAAQ,IAAI,SAAS,CAAC,QAAQ,EAAE;YAC5C,MAAM,OAAO,EAAE,KAAK,CAAC,SAAS,CAAC,QAAQ,EAAE,SAAS,CAAC,QAAQ,EAAE,SAAS,CAAC,UAAU,CAAC,CAAC,CAAA;SACpF;QAED,SAAE,CAAC,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAAC,CAAA;QAE3C,MAAM,OAAO,GAAG,MAAM,OAAO,EAAE,eAAe,CAAC,IAAI,CAAC,CAAA;QAEpD,SAAE,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAA;IAClD,CAAC;;AAtFH,oBAuFC;AAtFQ,gBAAW,GAAG,uCAAuC,CAAA;AAErD,UAAK,GAAG;IACb,GAAG,WAAI,CAAC,SAAS;IACjB,QAAQ,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,kBAAkB,EAAE,OAAO,EAAE,EAAE,EAAC,CAAC;IACjF,QAAQ,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,0CAA0C,EAAE,OAAO,EAAE,EAAE,EAAE,GAAG,EAAE,kBAAkB,EAAC,CAAC;IAClI,UAAU,EAAE,YAAK,CAAC,MAAM,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,kBAAkB,EAAE,OAAO,EAAE,EAAE,EAAC,CAAC;IACnF,0BAA0B,EAAE,YAAK,CAAC,OAAO,CAAC,EAAC,IAAI,EAAE,GAAG,EAAE,WAAW,EAAE,6FAA6F,EAAE,GAAG,EAAE,kCAAkC,EAAC,CAAC;IAC3M,IAAI,EAAE,YAAK,CAAC,IAAI,CAAC,EAAC,IAAI,EAAE,GAAG,EAAC,CAAC;CAC9B,CAAA;AAEM,SAAI,GAAG;IACZ,IAAI,EAAE,WAAI,CAAC,IAAI,CAAC;QACd,IAAI,EAAE,MAAM;QACZ,WAAW,EAAE,4CAA4C;QACzD,QAAQ,EAAE,IAAI;KACf,CAAC;IACF,GAAG,EAAE,WAAI,CAAC,MAAM,CAAC;QACf,IAAI,EAAE,KAAK;QACX,WAAW,EAAE,4DAA4D;QACzE,QAAQ,EAAE,IAAI;KACf,CAAC;CACH,CAAA"}
|