@vercel/sandbox 1.1.4 → 1.1.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (70) hide show
  1. package/.turbo/turbo-build.log +1 -1
  2. package/.turbo/turbo-test.log +14 -8
  3. package/.turbo/turbo-typecheck.log +1 -1
  4. package/CHANGELOG.md +6 -0
  5. package/__mocks__/picocolors.ts +13 -0
  6. package/dist/api-client/with-retry.js +1 -1
  7. package/dist/api-client/with-retry.js.map +1 -1
  8. package/dist/auth/api.d.ts +6 -0
  9. package/dist/auth/api.js +28 -0
  10. package/dist/auth/api.js.map +1 -0
  11. package/dist/auth/error.d.ts +11 -0
  12. package/dist/auth/error.js +12 -0
  13. package/dist/auth/error.js.map +1 -0
  14. package/dist/auth/file.d.ts +22 -0
  15. package/dist/auth/file.js +66 -0
  16. package/dist/auth/file.js.map +1 -0
  17. package/dist/auth/index.d.ts +6 -0
  18. package/dist/auth/index.js +27 -0
  19. package/dist/auth/index.js.map +1 -0
  20. package/dist/auth/linked-project.d.ts +10 -0
  21. package/dist/auth/linked-project.js +69 -0
  22. package/dist/auth/linked-project.js.map +1 -0
  23. package/dist/auth/oauth.d.ts +131 -0
  24. package/dist/auth/oauth.js +269 -0
  25. package/dist/auth/oauth.js.map +1 -0
  26. package/dist/auth/poll-for-token.d.ts +20 -0
  27. package/dist/auth/poll-for-token.js +66 -0
  28. package/dist/auth/poll-for-token.js.map +1 -0
  29. package/dist/auth/project.d.ts +40 -0
  30. package/dist/auth/project.js +80 -0
  31. package/dist/auth/project.js.map +1 -0
  32. package/dist/auth/zod.d.ts +5 -0
  33. package/dist/auth/zod.js +20 -0
  34. package/dist/auth/zod.js.map +1 -0
  35. package/dist/sandbox.js +1 -1
  36. package/dist/sandbox.js.map +1 -1
  37. package/dist/utils/dev-credentials.d.ts +37 -0
  38. package/dist/utils/dev-credentials.js +191 -0
  39. package/dist/utils/dev-credentials.js.map +1 -0
  40. package/dist/utils/get-credentials.d.ts +16 -0
  41. package/dist/utils/get-credentials.js +66 -7
  42. package/dist/utils/get-credentials.js.map +1 -1
  43. package/dist/utils/log.d.ts +2 -0
  44. package/dist/utils/log.js +24 -0
  45. package/dist/utils/log.js.map +1 -0
  46. package/dist/version.d.ts +1 -1
  47. package/dist/version.js +1 -1
  48. package/package.json +4 -1
  49. package/src/api-client/api-client.test.ts +128 -0
  50. package/src/api-client/with-retry.ts +1 -1
  51. package/src/auth/api.ts +31 -0
  52. package/src/auth/error.ts +8 -0
  53. package/src/auth/file.ts +69 -0
  54. package/src/auth/index.ts +9 -0
  55. package/src/auth/infer-scope.test.ts +178 -0
  56. package/src/auth/linked-project.test.ts +86 -0
  57. package/src/auth/linked-project.ts +40 -0
  58. package/src/auth/oauth.ts +333 -0
  59. package/src/auth/poll-for-token.ts +89 -0
  60. package/src/auth/project.ts +92 -0
  61. package/src/auth/zod.ts +16 -0
  62. package/src/sandbox.ts +1 -1
  63. package/src/utils/dev-credentials.test.ts +217 -0
  64. package/src/utils/dev-credentials.ts +189 -0
  65. package/src/utils/get-credentials.test.ts +20 -0
  66. package/src/utils/get-credentials.ts +72 -8
  67. package/src/utils/log.ts +20 -0
  68. package/src/version.ts +1 -1
  69. package/test-utils/mock-response.ts +12 -0
  70. package/vitest.config.ts +1 -0
@@ -0,0 +1,89 @@
1
+ import { setTimeout } from "node:timers/promises";
2
+ import { updateAuthConfig } from "./file";
3
+ import { DeviceAuthorizationRequest, isOAuthError, OAuth } from "./oauth";
4
+
5
+ export type PollTokenItem =
6
+ | { _tag: "Timeout"; newInterval: number }
7
+ | { _tag: "SlowDown"; newInterval: number }
8
+ | { _tag: "Error"; error: Error }
9
+ | {
10
+ _tag: "Response";
11
+ response: { text(): Promise<string> };
12
+ };
13
+
14
+ export async function* pollForToken({
15
+ request,
16
+ oauth,
17
+ }: {
18
+ request: DeviceAuthorizationRequest;
19
+ oauth: OAuth;
20
+ }): AsyncGenerator<PollTokenItem, void, void> {
21
+ const controller = new AbortController();
22
+ try {
23
+ let intervalMs = request.interval * 1000;
24
+ while (Date.now() < request.expiresAt) {
25
+ const [tokenResponseError, tokenResponse] =
26
+ await oauth.deviceAccessTokenRequest(request.device_code);
27
+
28
+ if (tokenResponseError) {
29
+ // 2x backoff on connection timeouts per spec https://datatracker.ietf.org/doc/html/rfc8628#section-3.5
30
+ if (tokenResponseError.message.includes("timeout")) {
31
+ intervalMs *= 2;
32
+ yield { _tag: "Timeout" as const, newInterval: intervalMs };
33
+ await setTimeout(intervalMs, { signal: controller.signal });
34
+ continue;
35
+ }
36
+ yield { _tag: "Error" as const, error: tokenResponseError };
37
+ return;
38
+ }
39
+
40
+ yield {
41
+ _tag: "Response" as const,
42
+ response: tokenResponse.clone() as { text(): Promise<string> },
43
+ };
44
+
45
+ const [tokensError, tokens] =
46
+ await oauth.processTokenResponse(tokenResponse);
47
+
48
+ if (isOAuthError(tokensError)) {
49
+ const { code } = tokensError;
50
+ switch (code) {
51
+ case "authorization_pending":
52
+ await setTimeout(intervalMs, { signal: controller.signal });
53
+ continue;
54
+ case "slow_down":
55
+ intervalMs += 5 * 1000;
56
+ yield { _tag: "SlowDown" as const, newInterval: intervalMs };
57
+ await setTimeout(intervalMs, { signal: controller.signal });
58
+ continue;
59
+ default:
60
+ yield { _tag: "Error", error: tokensError.cause };
61
+ return;
62
+ }
63
+ }
64
+
65
+ if (tokensError) {
66
+ yield { _tag: "Error", error: tokensError };
67
+ return;
68
+ }
69
+
70
+ updateAuthConfig({
71
+ token: tokens.access_token,
72
+ expiresAt: new Date(Date.now() + tokens.expires_in * 1000),
73
+ refreshToken: tokens.refresh_token,
74
+ });
75
+
76
+ return;
77
+ }
78
+
79
+ yield {
80
+ _tag: "Error" as const,
81
+ error: new Error(
82
+ "Timed out waiting for authentication. Please try again.",
83
+ ),
84
+ };
85
+ return;
86
+ } finally {
87
+ controller.abort();
88
+ }
89
+ }
@@ -0,0 +1,92 @@
1
+ import { z } from "zod";
2
+ import { fetchApi } from "./api";
3
+ import { NotOk } from "./error";
4
+ import { readLinkedProject } from "./linked-project";
5
+
6
+ const TeamsSchema = z.object({
7
+ teams: z
8
+ .array(
9
+ z.object({
10
+ slug: z.string(),
11
+ }),
12
+ )
13
+ .min(1, `No teams found. Please create a team first.`),
14
+ });
15
+
16
+ const DEFAULT_PROJECT_NAME = "vercel-sandbox-default-project";
17
+
18
+ /**
19
+ * Resolves the team and project scope for sandbox operations.
20
+ *
21
+ * First checks for a locally linked project in `.vercel/project.json`.
22
+ * If found, uses the `projectId` and `orgId` from there.
23
+ *
24
+ * Otherwise, if `teamId` is not provided, selects the first available team for the account.
25
+ * Ensures a default project exists within the team, creating it if necessary.
26
+ *
27
+ * @param opts.token - Vercel API authentication token.
28
+ * @param opts.teamId - Optional team slug. If omitted, the first team is selected.
29
+ * @param opts.cwd - Optional directory to search for `.vercel/project.json`. Defaults to `process.cwd()`.
30
+ * @returns The resolved scope with `projectId`, `teamId`, and whether the project was `created`.
31
+ *
32
+ * @throws {NotOk} If the API returns an error other than 404 when checking the project.
33
+ * @throws {ZodError} If no teams exist for the account.
34
+ *
35
+ * @example
36
+ * ```ts
37
+ * const scope = await inferScope({ token: "vercel_..." });
38
+ * // => { projectId: "vercel-sandbox-default-project", teamId: "my-team", created: false }
39
+ * ```
40
+ */
41
+ export async function inferScope(opts: {
42
+ token: string;
43
+ teamId?: string;
44
+ cwd?: string;
45
+ }): Promise<{ projectId: string; teamId: string; created: boolean }> {
46
+ const linkedProject = await readLinkedProject(opts.cwd ?? process.cwd());
47
+ if (linkedProject) {
48
+ return { ...linkedProject, created: false };
49
+ }
50
+
51
+ const teamId = opts.teamId ?? (await selectTeam(opts.token));
52
+
53
+ let created = false;
54
+ try {
55
+ await fetchApi({
56
+ token: opts.token,
57
+ endpoint: `/v2/projects/${encodeURIComponent(DEFAULT_PROJECT_NAME)}?slug=${encodeURIComponent(teamId)}`,
58
+ });
59
+ } catch (e) {
60
+ if (!(e instanceof NotOk) || e.response.statusCode !== 404) {
61
+ throw e;
62
+ }
63
+
64
+ await fetchApi({
65
+ token: opts.token,
66
+ endpoint: `/v11/projects?slug=${encodeURIComponent(teamId)}`,
67
+ method: "POST",
68
+ body: JSON.stringify({
69
+ name: DEFAULT_PROJECT_NAME,
70
+ }),
71
+ });
72
+ created = true;
73
+ }
74
+
75
+ return { projectId: DEFAULT_PROJECT_NAME, teamId, created };
76
+ }
77
+
78
+ /**
79
+ * Selects a team for the current token by querying the Teams API and
80
+ * returning the slug of the first team in the result set.
81
+ *
82
+ * @param token - Authentication token used to call the Vercel API.
83
+ * @returns A promise that resolves to the first team's slug.
84
+ */
85
+ export async function selectTeam(token: string) {
86
+ const {
87
+ teams: [team],
88
+ } = await fetchApi({ token, endpoint: "/v2/teams?limit=1" }).then(
89
+ TeamsSchema.parse,
90
+ );
91
+ return team.slug;
92
+ }
@@ -0,0 +1,16 @@
1
+ import { z } from "zod";
2
+
3
+ /**
4
+ * A Zod codec that serializes and deserializes JSON strings.
5
+ */
6
+ export const json = z.string().transform((jsonString: string, ctx): unknown => {
7
+ try {
8
+ return JSON.parse(jsonString);
9
+ } catch (err: any) {
10
+ ctx.addIssue({
11
+ code: z.ZodIssueCode.custom,
12
+ message: `Invalid JSON: ${err.message}`,
13
+ });
14
+ return z.NEVER;
15
+ }
16
+ });
package/src/sandbox.ts CHANGED
@@ -198,8 +198,8 @@ export class Sandbox {
198
198
  fetch: params?.fetch,
199
199
  });
200
200
  return client.listSandboxes({
201
- ...params,
202
201
  ...credentials,
202
+ ...params,
203
203
  });
204
204
  }
205
205
 
@@ -0,0 +1,217 @@
1
+ import { signInAndGetToken, generateCredentials } from "./dev-credentials";
2
+ import { describe, expect, test, vi, beforeEach, type Mock } from "vitest";
3
+ import { factory } from "factoree";
4
+ import { setTimeout } from "node:timers/promises";
5
+ import { DeviceAuthorizationRequest, OAuth } from "../auth";
6
+
7
+ vi.mock("picocolors");
8
+
9
+ vi.mock("../auth/index", () => ({
10
+ getAuth: vi.fn(),
11
+ inferScope: vi.fn(),
12
+ updateAuthConfig: vi.fn(),
13
+ OAuth: vi.fn(),
14
+ pollForToken: vi.fn(),
15
+ }));
16
+
17
+ import * as auth from "../auth/index";
18
+
19
+ describe("signInAndGetToken", () => {
20
+ test("times out after provided timeout", async () => {
21
+ const consoleError = vi.spyOn(console, "error").mockReturnValue();
22
+ const promise = signInAndGetToken(
23
+ {
24
+ getAuth: () => null,
25
+ OAuth: async () => {
26
+ return createOAuthFactory({
27
+ async deviceAuthorizationRequest() {
28
+ return createDeviceAuthorizationRequest({
29
+ device_code: "device_code",
30
+ user_code: "user_code",
31
+ verification_uri_complete: `https://example.vercel.sh/device_code?code=user_code`,
32
+ verification_uri: "https://example.vercel.sh/device_code",
33
+ });
34
+ },
35
+ });
36
+ },
37
+ pollForToken: async function* () {
38
+ await setTimeout(500);
39
+ },
40
+ },
41
+ `100 milliseconds`,
42
+ );
43
+
44
+ await expect(promise).rejects.toThrowError(
45
+ /Authentication flow timed out after 100 milliseconds./,
46
+ );
47
+
48
+ const printed = consoleError.mock.calls.map((x) => x.join(" ")).join("\n");
49
+ expect(printed).toMatchInlineSnapshot(`
50
+ "<yellow><dim>[vercel/sandbox]</dim> No VERCEL_OIDC_TOKEN environment variable found, initiating device authorization flow...
51
+ <dim>[vercel/sandbox]</dim> │ <bold>help:</bold> this flow only happens on development environment.
52
+ <dim>[vercel/sandbox]</dim> │ In production, make sure to set up a proper token, or set up Vercel OIDC [https://vercel.com/docs/oidc].</yellow>
53
+ <blue><dim>[vercel/sandbox]</dim> ╰▶ To authenticate, visit: https://example.vercel.sh/device_code?code=user_code
54
+ <dim>[vercel/sandbox]</dim> or visit <italic>https://example.vercel.sh/device_code</italic> and type <bold>user_code</bold>
55
+ <dim>[vercel/sandbox]</dim> Press <bold><return></bold> to open in your browser</blue>
56
+ <red><dim>[vercel/sandbox]</dim> <bold>error:</bold> Authentication failed: Authentication flow timed out after 100 milliseconds.
57
+ <dim>[vercel/sandbox]</dim> │ Make sure to provide a token to avoid prompting an interactive flow.
58
+ <dim>[vercel/sandbox]</dim> ╰▶ <bold>help:</bold> Link your project with <italic><dim>\`</dim>npx vercel link<dim>\`</dim></italic> to refresh OIDC token automatically.</red>"
59
+ `);
60
+ });
61
+ });
62
+
63
+ const createOAuthFactory = factory<Awaited<OAuth>>();
64
+ const createDeviceAuthorizationRequest = factory<DeviceAuthorizationRequest>();
65
+
66
+ describe("generateCredentials", () => {
67
+ beforeEach(() => {
68
+ vi.clearAllMocks();
69
+ });
70
+
71
+ test("triggers sign-in when auth exists but has no token", async () => {
72
+ // Auth object with refreshToken but no token - this was the bug
73
+ (auth.getAuth as Mock).mockReturnValue({
74
+ refreshToken: "refresh_xxx",
75
+ expiresAt: new Date(Date.now() + 100000),
76
+ });
77
+
78
+ (auth.OAuth as Mock).mockResolvedValue(
79
+ createOAuthFactory({
80
+ async deviceAuthorizationRequest() {
81
+ return createDeviceAuthorizationRequest({
82
+ device_code: "device_code",
83
+ user_code: "user_code",
84
+ verification_uri_complete: "https://vercel.com/device",
85
+ verification_uri: "https://vercel.com/device",
86
+ });
87
+ },
88
+ }),
89
+ );
90
+
91
+ (auth.pollForToken as Mock).mockImplementation(async function* () {
92
+ // Simulate successful auth by updating getAuth to return a token
93
+ (auth.getAuth as Mock).mockReturnValue({ token: "new_token" });
94
+ yield { _tag: "Response" as const };
95
+ });
96
+
97
+ (auth.inferScope as Mock).mockResolvedValue({
98
+ teamId: "team_xxx",
99
+ projectId: "prj_xxx",
100
+ created: false,
101
+ });
102
+
103
+ const result = await generateCredentials({});
104
+
105
+ expect(auth.pollForToken).toHaveBeenCalled();
106
+ expect(result).toEqual({
107
+ token: "new_token",
108
+ teamId: "team_xxx",
109
+ projectId: "prj_xxx",
110
+ });
111
+ });
112
+
113
+ test("triggers sign-in when auth is null", async () => {
114
+ (auth.getAuth as Mock).mockReturnValue(null);
115
+
116
+ (auth.OAuth as Mock).mockResolvedValue(
117
+ createOAuthFactory({
118
+ async deviceAuthorizationRequest() {
119
+ return createDeviceAuthorizationRequest({
120
+ device_code: "device_code",
121
+ user_code: "user_code",
122
+ verification_uri_complete: "https://vercel.com/device",
123
+ verification_uri: "https://vercel.com/device",
124
+ });
125
+ },
126
+ }),
127
+ );
128
+
129
+ (auth.pollForToken as Mock).mockImplementation(async function* () {
130
+ (auth.getAuth as Mock).mockReturnValue({ token: "new_token" });
131
+ yield { _tag: "Response" as const };
132
+ });
133
+
134
+ (auth.inferScope as Mock).mockResolvedValue({
135
+ teamId: "team_xxx",
136
+ projectId: "prj_xxx",
137
+ created: false,
138
+ });
139
+
140
+ await generateCredentials({});
141
+
142
+ expect(auth.pollForToken).toHaveBeenCalled();
143
+ });
144
+
145
+ test("skips sign-in when auth has valid token", async () => {
146
+ (auth.getAuth as Mock).mockReturnValue({ token: "valid_token" });
147
+
148
+ (auth.inferScope as Mock).mockResolvedValue({
149
+ teamId: "team_xxx",
150
+ projectId: "prj_xxx",
151
+ created: false,
152
+ });
153
+
154
+ const result = await generateCredentials({});
155
+
156
+ expect(auth.pollForToken).not.toHaveBeenCalled();
157
+ expect(auth.OAuth).not.toHaveBeenCalled();
158
+ expect(result).toEqual({
159
+ token: "valid_token",
160
+ teamId: "team_xxx",
161
+ projectId: "prj_xxx",
162
+ });
163
+ });
164
+
165
+ test("calls inferScope only once when deriving both teamId and projectId", async () => {
166
+ (auth.getAuth as Mock).mockReturnValue({ token: "valid_token" });
167
+
168
+ (auth.inferScope as Mock).mockResolvedValue({
169
+ teamId: "team_xxx",
170
+ projectId: "prj_xxx",
171
+ created: false,
172
+ });
173
+
174
+ await generateCredentials({});
175
+
176
+ expect(auth.inferScope).toHaveBeenCalledTimes(1);
177
+ });
178
+
179
+ test("does not call inferScope when both teamId and projectId are provided", async () => {
180
+ (auth.getAuth as Mock).mockReturnValue({ token: "valid_token" });
181
+
182
+ const result = await generateCredentials({
183
+ teamId: "provided_team",
184
+ projectId: "provided_project",
185
+ });
186
+
187
+ expect(auth.inferScope).not.toHaveBeenCalled();
188
+ expect(result).toEqual({
189
+ token: "valid_token",
190
+ teamId: "provided_team",
191
+ projectId: "provided_project",
192
+ });
193
+ });
194
+
195
+ test("calls inferScope with provided teamId when only teamId is given", async () => {
196
+ (auth.getAuth as Mock).mockReturnValue({ token: "valid_token" });
197
+
198
+ (auth.inferScope as Mock).mockResolvedValue({
199
+ teamId: "provided_team",
200
+ projectId: "inferred_project",
201
+ created: false,
202
+ });
203
+
204
+ const result = await generateCredentials({ teamId: "provided_team" });
205
+
206
+ expect(auth.inferScope).toHaveBeenCalledTimes(1);
207
+ expect(auth.inferScope).toHaveBeenCalledWith({
208
+ teamId: "provided_team",
209
+ token: "valid_token",
210
+ });
211
+ expect(result).toEqual({
212
+ token: "valid_token",
213
+ teamId: "provided_team",
214
+ projectId: "inferred_project",
215
+ });
216
+ });
217
+ });
@@ -0,0 +1,189 @@
1
+ import pico from "picocolors";
2
+ import type { Credentials } from "./get-credentials";
3
+ import ms from "ms";
4
+ import * as Log from "./log";
5
+
6
+ async function importAuth() {
7
+ const auth = await import("../auth/index");
8
+ return auth;
9
+ }
10
+
11
+ export function shouldPromptForCredentials(): boolean {
12
+ return (
13
+ process.env.NODE_ENV !== "production" &&
14
+ !["1", "true"].includes(process.env.CI || "") &&
15
+ process.stdout.isTTY &&
16
+ process.stdin.isTTY
17
+ );
18
+ }
19
+
20
+ /**
21
+ * Returns cached credentials for the given team/project combination.
22
+ *
23
+ * @remarks
24
+ * The cache is keyed by `teamId` and `projectId`. A new credential generation
25
+ * is triggered only when these values change or when a previous attempt failed.
26
+ *
27
+ * **Important:** Successfully resolved credentials are cached indefinitely and
28
+ * will not be refreshed even if the token expires. Cache invalidation only occurs
29
+ * on rejection (error). This is intentional for development use cases where
30
+ * short-lived sessions don't require proactive token refresh.
31
+ */
32
+ export const cachedGenerateCredentials = (() => {
33
+ let cache:
34
+ | [{ teamId?: string; projectId?: string }, Promise<Credentials>]
35
+ | null = null;
36
+ return async (opts: { projectId?: string; teamId?: string }) => {
37
+ if (
38
+ !cache ||
39
+ cache[0].teamId !== opts.teamId ||
40
+ cache[0].projectId !== opts.projectId
41
+ ) {
42
+ const promise = generateCredentials(opts).catch((err) => {
43
+ cache = null;
44
+ throw err;
45
+ });
46
+ cache = [opts, promise];
47
+ }
48
+ const v = await cache[1];
49
+ Log.write(
50
+ "warn",
51
+ `using inferred credentials team=${v.teamId} project=${v.projectId}`,
52
+ );
53
+ return v;
54
+ };
55
+ })();
56
+
57
+ /**
58
+ * Generates credentials by authenticating and inferring scope.
59
+ *
60
+ * @internal This is exported for testing purposes. Consider using
61
+ * {@link cachedGenerateCredentials} instead, which caches the result
62
+ * to avoid redundant authentication flows.
63
+ */
64
+ export async function generateCredentials(opts: {
65
+ teamId?: string;
66
+ projectId?: string;
67
+ }): Promise<Credentials> {
68
+ const { OAuth, pollForToken, getAuth, updateAuthConfig, inferScope } =
69
+ await importAuth();
70
+ let auth = getAuth();
71
+ if (!auth?.token) {
72
+ const timeout: ms.StringValue = process.env.VERCEL_URL
73
+ ? /* when deployed to vercel we don't want to have a long timeout */ "1 minute"
74
+ : "5 minutes";
75
+ auth = await signInAndGetToken({ OAuth, pollForToken, getAuth }, timeout);
76
+ }
77
+ if (
78
+ auth?.refreshToken &&
79
+ auth.expiresAt &&
80
+ auth.expiresAt.getTime() <= Date.now()
81
+ ) {
82
+ const oauth = await OAuth();
83
+ const newToken = await oauth.refreshToken(auth.refreshToken);
84
+ auth = {
85
+ expiresAt: new Date(Date.now() + newToken.expires_in * 1000),
86
+ token: newToken.access_token,
87
+ refreshToken: newToken.refresh_token || auth.refreshToken,
88
+ };
89
+ updateAuthConfig(auth);
90
+ }
91
+
92
+ if (!auth?.token) {
93
+ throw new Error("Failed to retrieve authentication token.");
94
+ }
95
+
96
+ if (opts.teamId && opts.projectId) {
97
+ return {
98
+ token: auth.token,
99
+ teamId: opts.teamId,
100
+ projectId: opts.projectId,
101
+ };
102
+ }
103
+
104
+ const scope = await inferScope({ teamId: opts.teamId, token: auth.token });
105
+
106
+ if (scope.created) {
107
+ Log.write(
108
+ "info",
109
+ `Created default project "${scope.projectId}" in team "${scope.teamId}".`,
110
+ );
111
+ }
112
+
113
+ return {
114
+ token: auth.token,
115
+ teamId: opts.teamId || scope.teamId,
116
+ projectId: opts.projectId || scope.projectId,
117
+ };
118
+ }
119
+
120
+ export async function signInAndGetToken(
121
+ auth: Pick<
122
+ Awaited<ReturnType<typeof importAuth>>,
123
+ "OAuth" | "getAuth" | "pollForToken"
124
+ >,
125
+ timeout: ms.StringValue,
126
+ ) {
127
+ Log.write("warn", [
128
+ `No VERCEL_OIDC_TOKEN environment variable found, initiating device authorization flow...`,
129
+ `│ ${pico.bold("help:")} this flow only happens on development environment.`,
130
+ `│ In production, make sure to set up a proper token, or set up Vercel OIDC [https://vercel.com/docs/oidc].`,
131
+ ]);
132
+ const oauth = await auth.OAuth();
133
+ const request = await oauth.deviceAuthorizationRequest();
134
+ Log.write("info", [
135
+ `╰▶ To authenticate, visit: ${request.verification_uri_complete}`,
136
+ ` or visit ${pico.italic(request.verification_uri)} and type ${pico.bold(request.user_code)}`,
137
+ ` Press ${pico.bold("<return>")} to open in your browser`,
138
+ ]);
139
+
140
+ let error: Error | undefined;
141
+ const generator = auth.pollForToken({ request, oauth });
142
+ let done = false;
143
+ let spawnedTimeout = setTimeout(() => {
144
+ if (done) return;
145
+ const message = [
146
+ `Authentication flow timed out after ${timeout}.`,
147
+ `│ Make sure to provide a token to avoid prompting an interactive flow.`,
148
+ `╰▶ ${pico.bold("help:")} Link your project with ${Log.code("npx vercel link")} to refresh OIDC token automatically.`,
149
+ ].join("\n");
150
+ error = new Error(message);
151
+ // Note: generator.return() initiates cooperative cancellation. The generator's
152
+ // finally block will abort pending setTimeout calls, but any in-flight HTTP
153
+ // request will complete before the generator terminates. This is acceptable
154
+ // for this dev-only timeout scenario.
155
+ generator.return();
156
+ }, ms(timeout));
157
+ try {
158
+ for await (const event of generator) {
159
+ switch (event._tag) {
160
+ case "SlowDown":
161
+ case "Timeout":
162
+ case "Response":
163
+ break;
164
+ case "Error":
165
+ error = event.error;
166
+ break;
167
+ default:
168
+ throw new Error(
169
+ `Unknown event type: ${JSON.stringify(event satisfies never)}`,
170
+ );
171
+ }
172
+ }
173
+ } finally {
174
+ done = true;
175
+ clearTimeout(spawnedTimeout);
176
+ }
177
+
178
+ if (error) {
179
+ Log.write(
180
+ "error",
181
+ `${pico.bold("error:")} Authentication failed: ${error.message}`,
182
+ );
183
+ throw error;
184
+ }
185
+
186
+ Log.write("success", `${pico.bold("done!")} Authenticated successfully!`);
187
+ const stored = auth.getAuth();
188
+ return stored;
189
+ }
@@ -0,0 +1,20 @@
1
+ import { test, expect, beforeEach } from "vitest";
2
+ import {
3
+ getCredentials,
4
+ LocalOidcContextError,
5
+ VercelOidcContextError,
6
+ } from "./get-credentials";
7
+
8
+ beforeEach(() => {
9
+ delete process.env.VERCEL_OIDC_TOKEN;
10
+ });
11
+
12
+ test("explains how to set up oidc in local", async () => {
13
+ delete process.env.VERCEL_URL;
14
+ await expect(getCredentials()).rejects.toThrowError(LocalOidcContextError);
15
+ });
16
+
17
+ test("explains how to set up oidc in vercel", async () => {
18
+ process.env.VERCEL_URL = "example.vercel.sh";
19
+ await expect(getCredentials()).rejects.toThrowError(VercelOidcContextError);
20
+ });