chapa-cli 0.2.6 → 0.2.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.js +6 -18
- package/package.json +1 -1
package/dist/index.js
CHANGED
|
@@ -323,14 +323,6 @@ var MAX_POLL_ATTEMPTS = 150;
|
|
|
323
323
|
function sleep(ms) {
|
|
324
324
|
return new Promise((resolve) => setTimeout(resolve, ms));
|
|
325
325
|
}
|
|
326
|
-
function restoreTls(insecure, original) {
|
|
327
|
-
if (!insecure) return;
|
|
328
|
-
if (original === void 0) {
|
|
329
|
-
delete process.env.NODE_TLS_REJECT_UNAUTHORIZED;
|
|
330
|
-
} else {
|
|
331
|
-
process.env.NODE_TLS_REJECT_UNAUTHORIZED = original;
|
|
332
|
-
}
|
|
333
|
-
}
|
|
334
326
|
var TLS_ERROR_PATTERNS = [
|
|
335
327
|
// Node.js error codes (uppercase)
|
|
336
328
|
"UNABLE_TO_VERIFY_LEAF_SIGNATURE",
|
|
@@ -369,12 +361,6 @@ function getFullErrorChain(err) {
|
|
|
369
361
|
}
|
|
370
362
|
async function login(serverUrl, opts = {}) {
|
|
371
363
|
const { verbose = false, insecure = false } = opts;
|
|
372
|
-
const originalTlsSetting = process.env.NODE_TLS_REJECT_UNAUTHORIZED;
|
|
373
|
-
if (insecure) {
|
|
374
|
-
process.env.NODE_TLS_REJECT_UNAUTHORIZED = "0";
|
|
375
|
-
console.warn("\n\u26A0 TLS certificate verification disabled (--insecure).");
|
|
376
|
-
console.warn(" Use only on corporate networks with TLS interception.\n");
|
|
377
|
-
}
|
|
378
364
|
const baseUrl = serverUrl.replace(/\/+$/, "");
|
|
379
365
|
const sessionId = randomUUID();
|
|
380
366
|
const authorizeUrl = `${baseUrl}/cli/authorize?session=${sessionId}`;
|
|
@@ -433,22 +419,19 @@ TLS certificate error: ${rootMsg}`);
|
|
|
433
419
|
console.log(`
|
|
434
420
|
Logged in as ${data.handle}!`);
|
|
435
421
|
console.log("Credentials saved to ~/.chapa/credentials.json");
|
|
436
|
-
restoreTls(insecure, originalTlsSetting);
|
|
437
422
|
return;
|
|
438
423
|
}
|
|
439
424
|
if (data?.status === "expired") {
|
|
440
|
-
restoreTls(insecure, originalTlsSetting);
|
|
441
425
|
console.error("\nSession expired. Please try again.");
|
|
442
426
|
process.exit(1);
|
|
443
427
|
}
|
|
444
428
|
}
|
|
445
|
-
restoreTls(insecure, originalTlsSetting);
|
|
446
429
|
console.error("\nTimed out waiting for approval. Please try again.");
|
|
447
430
|
process.exit(1);
|
|
448
431
|
}
|
|
449
432
|
|
|
450
433
|
// src/index.ts
|
|
451
|
-
var VERSION = true ? "0.2.
|
|
434
|
+
var VERSION = true ? "0.2.7" : "0.0.0-dev";
|
|
452
435
|
var HELP_TEXT = `chapa-cli v${VERSION}
|
|
453
436
|
|
|
454
437
|
Merge GitHub EMU (Enterprise Managed User) contributions into your Chapa badge.
|
|
@@ -479,6 +462,11 @@ async function main() {
|
|
|
479
462
|
console.log(HELP_TEXT);
|
|
480
463
|
process.exit(0);
|
|
481
464
|
}
|
|
465
|
+
if (args.insecure) {
|
|
466
|
+
process.env.NODE_TLS_REJECT_UNAUTHORIZED = "0";
|
|
467
|
+
console.warn("\n\u26A0 TLS certificate verification disabled (--insecure).");
|
|
468
|
+
console.warn(" Use only on corporate networks with TLS interception.\n");
|
|
469
|
+
}
|
|
482
470
|
if (args.command === "login") {
|
|
483
471
|
await login(args.server, { verbose: args.verbose, insecure: args.insecure });
|
|
484
472
|
return;
|