opensteer 0.6.13 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +256 -184
- package/dist/chunk-PQYA6IX2.js +32571 -0
- package/dist/chunk-PQYA6IX2.js.map +1 -0
- package/dist/cli/bin.cjs +38201 -0
- package/dist/cli/bin.cjs.map +1 -0
- package/dist/cli/bin.d.cts +1 -0
- package/dist/cli/bin.d.ts +1 -0
- package/dist/cli/bin.js +5612 -0
- package/dist/cli/bin.js.map +1 -0
- package/dist/index.cjs +31309 -16009
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.cts +4440 -670
- package/dist/index.d.ts +4440 -670
- package/dist/index.js +438 -378
- package/dist/index.js.map +1 -0
- package/package.json +56 -62
- package/skills/README.md +21 -20
- package/skills/opensteer/SKILL.md +60 -194
- package/skills/opensteer/references/cli-reference.md +69 -113
- package/skills/opensteer/references/request-workflow.md +81 -0
- package/skills/opensteer/references/sdk-reference.md +101 -154
- package/CHANGELOG.md +0 -75
- package/bin/opensteer.mjs +0 -1423
- package/dist/browser-profile-client-CGXc0-P9.d.cts +0 -228
- package/dist/browser-profile-client-DHLzMf-K.d.ts +0 -228
- package/dist/chunk-2ES46WCO.js +0 -1437
- package/dist/chunk-3H5RRIMZ.js +0 -69
- package/dist/chunk-AVXUMEDG.js +0 -62
- package/dist/chunk-DN3GI5CH.js +0 -57
- package/dist/chunk-FAHE5DB2.js +0 -190
- package/dist/chunk-HBTSQ2V4.js +0 -15259
- package/dist/chunk-K5CL76MG.js +0 -81
- package/dist/chunk-U724TBY6.js +0 -1262
- package/dist/chunk-ZRCFF546.js +0 -77
- package/dist/cli/auth.cjs +0 -2022
- package/dist/cli/auth.d.cts +0 -114
- package/dist/cli/auth.d.ts +0 -114
- package/dist/cli/auth.js +0 -15
- package/dist/cli/local-profile.cjs +0 -197
- package/dist/cli/local-profile.d.cts +0 -18
- package/dist/cli/local-profile.d.ts +0 -18
- package/dist/cli/local-profile.js +0 -97
- package/dist/cli/profile.cjs +0 -18548
- package/dist/cli/profile.d.cts +0 -79
- package/dist/cli/profile.d.ts +0 -79
- package/dist/cli/profile.js +0 -1328
- package/dist/cli/server.cjs +0 -17232
- package/dist/cli/server.d.cts +0 -2
- package/dist/cli/server.d.ts +0 -2
- package/dist/cli/server.js +0 -977
- package/dist/cli/skills-installer.cjs +0 -230
- package/dist/cli/skills-installer.d.cts +0 -28
- package/dist/cli/skills-installer.d.ts +0 -28
- package/dist/cli/skills-installer.js +0 -201
- package/dist/extractor-4Q3TFZJB.js +0 -8
- package/dist/resolver-MGN64KCP.js +0 -7
- package/dist/types-Cr10igF3.d.cts +0 -345
- package/dist/types-Cr10igF3.d.ts +0 -345
- package/skills/electron/SKILL.md +0 -87
- package/skills/electron/references/opensteer-electron-recipes.md +0 -88
- package/skills/electron/references/opensteer-electron-workflow.md +0 -85
- package/skills/opensteer/references/examples.md +0 -118
package/dist/chunk-U724TBY6.js
DELETED
|
@@ -1,1262 +0,0 @@
|
|
|
1
|
-
import {
|
|
2
|
-
DEFAULT_CLOUD_BASE_URL,
|
|
3
|
-
normalizeCloudBaseUrl,
|
|
4
|
-
resolveCloudSelection,
|
|
5
|
-
resolveConfigWithEnv,
|
|
6
|
-
selectCloudCredential,
|
|
7
|
-
stripTrailingSlashes
|
|
8
|
-
} from "./chunk-2ES46WCO.js";
|
|
9
|
-
|
|
10
|
-
// src/cli/auth.ts
|
|
11
|
-
import open from "open";
|
|
12
|
-
|
|
13
|
-
// src/auth/credential-resolver.ts
|
|
14
|
-
function resolveCloudCredential(options) {
|
|
15
|
-
const flagCredential = selectCloudCredential({
|
|
16
|
-
apiKey: options.apiKeyFlag,
|
|
17
|
-
accessToken: options.accessTokenFlag
|
|
18
|
-
});
|
|
19
|
-
if (flagCredential) {
|
|
20
|
-
return toResolvedCloudCredential("flag", flagCredential);
|
|
21
|
-
}
|
|
22
|
-
const envAuthScheme = parseEnvAuthScheme(options.env.OPENSTEER_AUTH_SCHEME);
|
|
23
|
-
const envCredential = selectCloudCredential({
|
|
24
|
-
apiKey: options.env.OPENSTEER_API_KEY,
|
|
25
|
-
accessToken: options.env.OPENSTEER_ACCESS_TOKEN,
|
|
26
|
-
authScheme: envAuthScheme
|
|
27
|
-
});
|
|
28
|
-
if (envCredential) {
|
|
29
|
-
return toResolvedCloudCredential("env", envCredential);
|
|
30
|
-
}
|
|
31
|
-
return null;
|
|
32
|
-
}
|
|
33
|
-
function applyCloudCredentialToEnv(env, credential) {
|
|
34
|
-
if (credential.kind === "access-token") {
|
|
35
|
-
env.OPENSTEER_ACCESS_TOKEN = credential.token;
|
|
36
|
-
delete env.OPENSTEER_API_KEY;
|
|
37
|
-
env.OPENSTEER_AUTH_SCHEME = "bearer";
|
|
38
|
-
return;
|
|
39
|
-
}
|
|
40
|
-
env.OPENSTEER_API_KEY = credential.token;
|
|
41
|
-
delete env.OPENSTEER_ACCESS_TOKEN;
|
|
42
|
-
env.OPENSTEER_AUTH_SCHEME = credential.authScheme;
|
|
43
|
-
}
|
|
44
|
-
function parseEnvAuthScheme(value) {
|
|
45
|
-
const normalized = normalizeToken(value);
|
|
46
|
-
if (!normalized) return void 0;
|
|
47
|
-
if (normalized === "api-key" || normalized === "bearer") {
|
|
48
|
-
return normalized;
|
|
49
|
-
}
|
|
50
|
-
throw new Error(
|
|
51
|
-
`Invalid OPENSTEER_AUTH_SCHEME value "${value}". Use "api-key" or "bearer".`
|
|
52
|
-
);
|
|
53
|
-
}
|
|
54
|
-
function normalizeToken(value) {
|
|
55
|
-
if (typeof value !== "string") return void 0;
|
|
56
|
-
const normalized = value.trim();
|
|
57
|
-
return normalized.length ? normalized : void 0;
|
|
58
|
-
}
|
|
59
|
-
function toResolvedCloudCredential(source, credential) {
|
|
60
|
-
if (credential.compatibilityBearerApiKey) {
|
|
61
|
-
return {
|
|
62
|
-
kind: credential.kind,
|
|
63
|
-
source,
|
|
64
|
-
token: credential.token,
|
|
65
|
-
authScheme: credential.authScheme,
|
|
66
|
-
compatibilityBearerApiKey: true
|
|
67
|
-
};
|
|
68
|
-
}
|
|
69
|
-
return {
|
|
70
|
-
kind: credential.kind,
|
|
71
|
-
source,
|
|
72
|
-
token: credential.token,
|
|
73
|
-
authScheme: credential.authScheme
|
|
74
|
-
};
|
|
75
|
-
}
|
|
76
|
-
|
|
77
|
-
// src/auth/machine-credential-store.ts
|
|
78
|
-
import { createHash } from "crypto";
|
|
79
|
-
import fs from "fs";
|
|
80
|
-
import os from "os";
|
|
81
|
-
import path from "path";
|
|
82
|
-
|
|
83
|
-
// src/auth/keychain-store.ts
|
|
84
|
-
import { spawnSync } from "child_process";
|
|
85
|
-
function commandExists(command) {
|
|
86
|
-
const result = spawnSync(command, ["--help"], {
|
|
87
|
-
encoding: "utf8",
|
|
88
|
-
stdio: "ignore"
|
|
89
|
-
});
|
|
90
|
-
return result.error == null;
|
|
91
|
-
}
|
|
92
|
-
function commandFailed(result) {
|
|
93
|
-
return typeof result.status === "number" && result.status !== 0;
|
|
94
|
-
}
|
|
95
|
-
function sanitizeCommandArgs(command, args) {
|
|
96
|
-
if (command !== "security") {
|
|
97
|
-
return args;
|
|
98
|
-
}
|
|
99
|
-
const sanitized = [];
|
|
100
|
-
for (let index = 0; index < args.length; index += 1) {
|
|
101
|
-
const value = args[index];
|
|
102
|
-
sanitized.push(value);
|
|
103
|
-
if (value === "-w" && index + 1 < args.length) {
|
|
104
|
-
sanitized.push("[REDACTED]");
|
|
105
|
-
index += 1;
|
|
106
|
-
}
|
|
107
|
-
}
|
|
108
|
-
return sanitized;
|
|
109
|
-
}
|
|
110
|
-
function buildCommandError(command, args, result) {
|
|
111
|
-
const stderr = typeof result.stderr === "string" && result.stderr.trim() ? result.stderr.trim() : `Command "${command}" failed with status ${String(result.status)}.`;
|
|
112
|
-
const sanitizedArgs = sanitizeCommandArgs(command, args);
|
|
113
|
-
return new Error(
|
|
114
|
-
[
|
|
115
|
-
`Unable to persist credential via ${command}.`,
|
|
116
|
-
`${command} ${sanitizedArgs.join(" ")}`,
|
|
117
|
-
stderr
|
|
118
|
-
].join(" ")
|
|
119
|
-
);
|
|
120
|
-
}
|
|
121
|
-
function createMacosSecurityStore() {
|
|
122
|
-
return {
|
|
123
|
-
backend: "macos-security",
|
|
124
|
-
get(service, account) {
|
|
125
|
-
const result = spawnSync(
|
|
126
|
-
"security",
|
|
127
|
-
["find-generic-password", "-s", service, "-a", account, "-w"],
|
|
128
|
-
{ encoding: "utf8" }
|
|
129
|
-
);
|
|
130
|
-
if (commandFailed(result)) {
|
|
131
|
-
return null;
|
|
132
|
-
}
|
|
133
|
-
const secret = result.stdout.trim();
|
|
134
|
-
return secret.length ? secret : null;
|
|
135
|
-
},
|
|
136
|
-
set(service, account, secret) {
|
|
137
|
-
const args = [
|
|
138
|
-
"add-generic-password",
|
|
139
|
-
"-U",
|
|
140
|
-
"-s",
|
|
141
|
-
service,
|
|
142
|
-
"-a",
|
|
143
|
-
account,
|
|
144
|
-
"-w",
|
|
145
|
-
secret
|
|
146
|
-
];
|
|
147
|
-
const result = spawnSync("security", args, { encoding: "utf8" });
|
|
148
|
-
if (commandFailed(result)) {
|
|
149
|
-
throw buildCommandError("security", args, result);
|
|
150
|
-
}
|
|
151
|
-
},
|
|
152
|
-
delete(service, account) {
|
|
153
|
-
const args = ["delete-generic-password", "-s", service, "-a", account];
|
|
154
|
-
const result = spawnSync("security", args, { encoding: "utf8" });
|
|
155
|
-
if (commandFailed(result)) {
|
|
156
|
-
return;
|
|
157
|
-
}
|
|
158
|
-
}
|
|
159
|
-
};
|
|
160
|
-
}
|
|
161
|
-
function createLinuxSecretToolStore() {
|
|
162
|
-
return {
|
|
163
|
-
backend: "linux-secret-tool",
|
|
164
|
-
get(service, account) {
|
|
165
|
-
const result = spawnSync(
|
|
166
|
-
"secret-tool",
|
|
167
|
-
["lookup", "service", service, "account", account],
|
|
168
|
-
{
|
|
169
|
-
encoding: "utf8"
|
|
170
|
-
}
|
|
171
|
-
);
|
|
172
|
-
if (commandFailed(result)) {
|
|
173
|
-
return null;
|
|
174
|
-
}
|
|
175
|
-
const secret = result.stdout.trim();
|
|
176
|
-
return secret.length ? secret : null;
|
|
177
|
-
},
|
|
178
|
-
set(service, account, secret) {
|
|
179
|
-
const args = [
|
|
180
|
-
"store",
|
|
181
|
-
"--label",
|
|
182
|
-
"Opensteer CLI",
|
|
183
|
-
"service",
|
|
184
|
-
service,
|
|
185
|
-
"account",
|
|
186
|
-
account
|
|
187
|
-
];
|
|
188
|
-
const result = spawnSync("secret-tool", args, {
|
|
189
|
-
encoding: "utf8",
|
|
190
|
-
input: secret
|
|
191
|
-
});
|
|
192
|
-
if (commandFailed(result)) {
|
|
193
|
-
throw buildCommandError("secret-tool", args, result);
|
|
194
|
-
}
|
|
195
|
-
},
|
|
196
|
-
delete(service, account) {
|
|
197
|
-
const args = ["clear", "service", service, "account", account];
|
|
198
|
-
spawnSync("secret-tool", args, {
|
|
199
|
-
encoding: "utf8"
|
|
200
|
-
});
|
|
201
|
-
}
|
|
202
|
-
};
|
|
203
|
-
}
|
|
204
|
-
function createKeychainStore() {
|
|
205
|
-
if (process.platform === "darwin") {
|
|
206
|
-
if (!commandExists("security")) {
|
|
207
|
-
return null;
|
|
208
|
-
}
|
|
209
|
-
return createMacosSecurityStore();
|
|
210
|
-
}
|
|
211
|
-
if (process.platform === "linux") {
|
|
212
|
-
if (!commandExists("secret-tool")) {
|
|
213
|
-
return null;
|
|
214
|
-
}
|
|
215
|
-
return createLinuxSecretToolStore();
|
|
216
|
-
}
|
|
217
|
-
return null;
|
|
218
|
-
}
|
|
219
|
-
|
|
220
|
-
// src/auth/machine-credential-store.ts
|
|
221
|
-
var METADATA_VERSION = 2;
|
|
222
|
-
var ACTIVE_TARGET_VERSION = 2;
|
|
223
|
-
var KEYCHAIN_SERVICE = "com.opensteer.cli.cloud";
|
|
224
|
-
var KEYCHAIN_ACCOUNT_PREFIX = "machine:";
|
|
225
|
-
var ACTIVE_TARGET_FILE_NAME = "cli-target.json";
|
|
226
|
-
var MachineCredentialStore = class {
|
|
227
|
-
authDir;
|
|
228
|
-
warn;
|
|
229
|
-
keychain = createKeychainStore();
|
|
230
|
-
warnedFallback = false;
|
|
231
|
-
constructor(options = {}) {
|
|
232
|
-
const appName = options.appName || "opensteer";
|
|
233
|
-
const env = options.env ?? process.env;
|
|
234
|
-
const configDir = resolveConfigDir(appName, env);
|
|
235
|
-
this.authDir = path.join(configDir, "auth");
|
|
236
|
-
this.warn = options.warn ?? (() => void 0);
|
|
237
|
-
}
|
|
238
|
-
readCloudCredential(target) {
|
|
239
|
-
const normalizedTarget = normalizeCloudCredentialTarget(target);
|
|
240
|
-
return this.readCredentialSlot(
|
|
241
|
-
resolveCredentialSlot(this.authDir, normalizedTarget),
|
|
242
|
-
normalizedTarget
|
|
243
|
-
);
|
|
244
|
-
}
|
|
245
|
-
writeCloudCredential(args) {
|
|
246
|
-
const accessToken = args.accessToken.trim();
|
|
247
|
-
const refreshToken2 = args.refreshToken.trim();
|
|
248
|
-
if (!accessToken || !refreshToken2) {
|
|
249
|
-
throw new Error("Cannot persist empty machine credential secrets.");
|
|
250
|
-
}
|
|
251
|
-
const baseUrl = normalizeCredentialUrl(args.baseUrl);
|
|
252
|
-
const slot = resolveCredentialSlot(this.authDir, { baseUrl });
|
|
253
|
-
ensureDirectory(this.authDir);
|
|
254
|
-
const secretPayload = {
|
|
255
|
-
accessToken,
|
|
256
|
-
refreshToken: refreshToken2
|
|
257
|
-
};
|
|
258
|
-
let secretBackend = "file";
|
|
259
|
-
if (this.keychain) {
|
|
260
|
-
try {
|
|
261
|
-
this.keychain.set(
|
|
262
|
-
KEYCHAIN_SERVICE,
|
|
263
|
-
slot.keychainAccount,
|
|
264
|
-
JSON.stringify(secretPayload)
|
|
265
|
-
);
|
|
266
|
-
secretBackend = "keychain";
|
|
267
|
-
removeFileIfExists(slot.fallbackSecretPath);
|
|
268
|
-
} catch {
|
|
269
|
-
this.writeFallbackSecret(slot, secretPayload);
|
|
270
|
-
secretBackend = "file";
|
|
271
|
-
}
|
|
272
|
-
} else {
|
|
273
|
-
this.writeFallbackSecret(slot, secretPayload);
|
|
274
|
-
}
|
|
275
|
-
const metadata = {
|
|
276
|
-
version: METADATA_VERSION,
|
|
277
|
-
secretBackend,
|
|
278
|
-
baseUrl,
|
|
279
|
-
scope: args.scope,
|
|
280
|
-
obtainedAt: args.obtainedAt,
|
|
281
|
-
expiresAt: args.expiresAt,
|
|
282
|
-
updatedAt: Date.now()
|
|
283
|
-
};
|
|
284
|
-
writeJsonFile(slot.metadataPath, metadata);
|
|
285
|
-
}
|
|
286
|
-
readActiveCloudTarget() {
|
|
287
|
-
return readActiveCloudTargetMetadata(resolveActiveTargetPath(this.authDir));
|
|
288
|
-
}
|
|
289
|
-
writeActiveCloudTarget(target) {
|
|
290
|
-
const baseUrl = normalizeCredentialUrl(target.baseUrl);
|
|
291
|
-
ensureDirectory(this.authDir);
|
|
292
|
-
writeJsonFile(resolveActiveTargetPath(this.authDir), {
|
|
293
|
-
version: ACTIVE_TARGET_VERSION,
|
|
294
|
-
baseUrl,
|
|
295
|
-
updatedAt: Date.now()
|
|
296
|
-
});
|
|
297
|
-
}
|
|
298
|
-
clearCloudCredential(target) {
|
|
299
|
-
this.clearCredentialSlot(
|
|
300
|
-
resolveCredentialSlot(this.authDir, normalizeCloudCredentialTarget(target))
|
|
301
|
-
);
|
|
302
|
-
}
|
|
303
|
-
readCredentialSlot(slot, target) {
|
|
304
|
-
const metadata = readMetadata(slot.metadataPath);
|
|
305
|
-
if (!metadata) {
|
|
306
|
-
return null;
|
|
307
|
-
}
|
|
308
|
-
if (target && !matchesCredentialTarget(metadata, target)) {
|
|
309
|
-
return null;
|
|
310
|
-
}
|
|
311
|
-
const secret = this.readSecret(slot, metadata.secretBackend);
|
|
312
|
-
if (!secret) {
|
|
313
|
-
return null;
|
|
314
|
-
}
|
|
315
|
-
return {
|
|
316
|
-
baseUrl: metadata.baseUrl,
|
|
317
|
-
scope: metadata.scope,
|
|
318
|
-
accessToken: secret.accessToken,
|
|
319
|
-
refreshToken: secret.refreshToken,
|
|
320
|
-
obtainedAt: metadata.obtainedAt,
|
|
321
|
-
expiresAt: metadata.expiresAt
|
|
322
|
-
};
|
|
323
|
-
}
|
|
324
|
-
readSecret(slot, backend) {
|
|
325
|
-
if (backend === "keychain" && this.keychain) {
|
|
326
|
-
try {
|
|
327
|
-
const secret = this.keychain.get(
|
|
328
|
-
KEYCHAIN_SERVICE,
|
|
329
|
-
slot.keychainAccount
|
|
330
|
-
);
|
|
331
|
-
if (!secret) return null;
|
|
332
|
-
return parseSecretPayload(secret);
|
|
333
|
-
} catch {
|
|
334
|
-
return null;
|
|
335
|
-
}
|
|
336
|
-
}
|
|
337
|
-
return readSecretFile(slot.fallbackSecretPath);
|
|
338
|
-
}
|
|
339
|
-
writeFallbackSecret(slot, secretPayload) {
|
|
340
|
-
writeJsonFile(slot.fallbackSecretPath, secretPayload, {
|
|
341
|
-
mode: 384
|
|
342
|
-
});
|
|
343
|
-
if (!this.warnedFallback) {
|
|
344
|
-
this.warn({
|
|
345
|
-
code: "fallback_file_store",
|
|
346
|
-
path: slot.fallbackSecretPath,
|
|
347
|
-
message: "Secure keychain is unavailable. Falling back to file-based credential storage with mode 0600."
|
|
348
|
-
});
|
|
349
|
-
this.warnedFallback = true;
|
|
350
|
-
}
|
|
351
|
-
}
|
|
352
|
-
clearCredentialSlot(slot) {
|
|
353
|
-
removeFileIfExists(slot.metadataPath);
|
|
354
|
-
removeFileIfExists(slot.fallbackSecretPath);
|
|
355
|
-
if (this.keychain) {
|
|
356
|
-
this.keychain.delete(KEYCHAIN_SERVICE, slot.keychainAccount);
|
|
357
|
-
}
|
|
358
|
-
}
|
|
359
|
-
};
|
|
360
|
-
function createMachineCredentialStore(options = {}) {
|
|
361
|
-
return new MachineCredentialStore(options);
|
|
362
|
-
}
|
|
363
|
-
function resolveCredentialSlot(authDir, target) {
|
|
364
|
-
const normalizedBaseUrl = normalizeCredentialUrl(target.baseUrl);
|
|
365
|
-
const storageKey = createHash("sha256").update(normalizedBaseUrl).digest("hex").slice(0, 24);
|
|
366
|
-
return {
|
|
367
|
-
keychainAccount: `${KEYCHAIN_ACCOUNT_PREFIX}${storageKey}`,
|
|
368
|
-
metadataPath: path.join(authDir, `cli-login.${storageKey}.json`),
|
|
369
|
-
fallbackSecretPath: path.join(
|
|
370
|
-
authDir,
|
|
371
|
-
`cli-login.${storageKey}.secret.json`
|
|
372
|
-
)
|
|
373
|
-
};
|
|
374
|
-
}
|
|
375
|
-
function resolveActiveTargetPath(authDir) {
|
|
376
|
-
return path.join(authDir, ACTIVE_TARGET_FILE_NAME);
|
|
377
|
-
}
|
|
378
|
-
function matchesCredentialTarget(value, target) {
|
|
379
|
-
return normalizeCredentialUrl(value.baseUrl) === normalizeCredentialUrl(target.baseUrl);
|
|
380
|
-
}
|
|
381
|
-
function normalizeCredentialUrl(value) {
|
|
382
|
-
const normalized = stripTrailingSlashes(value.trim());
|
|
383
|
-
if (!normalized) {
|
|
384
|
-
throw new Error("Cannot persist machine credential without baseUrl.");
|
|
385
|
-
}
|
|
386
|
-
return normalized;
|
|
387
|
-
}
|
|
388
|
-
function normalizeCloudCredentialTarget(target) {
|
|
389
|
-
return {
|
|
390
|
-
baseUrl: normalizeCredentialUrl(target.baseUrl)
|
|
391
|
-
};
|
|
392
|
-
}
|
|
393
|
-
function resolveConfigDir(appName, env) {
|
|
394
|
-
if (process.platform === "win32") {
|
|
395
|
-
const appData = env.APPDATA?.trim() || path.join(os.homedir(), "AppData", "Roaming");
|
|
396
|
-
return path.join(appData, appName);
|
|
397
|
-
}
|
|
398
|
-
if (process.platform === "darwin") {
|
|
399
|
-
return path.join(
|
|
400
|
-
os.homedir(),
|
|
401
|
-
"Library",
|
|
402
|
-
"Application Support",
|
|
403
|
-
appName
|
|
404
|
-
);
|
|
405
|
-
}
|
|
406
|
-
const xdgConfigHome = env.XDG_CONFIG_HOME?.trim() || path.join(os.homedir(), ".config");
|
|
407
|
-
return path.join(xdgConfigHome, appName);
|
|
408
|
-
}
|
|
409
|
-
function ensureDirectory(directoryPath) {
|
|
410
|
-
fs.mkdirSync(directoryPath, { recursive: true, mode: 448 });
|
|
411
|
-
}
|
|
412
|
-
function removeFileIfExists(filePath) {
|
|
413
|
-
try {
|
|
414
|
-
fs.rmSync(filePath, { force: true });
|
|
415
|
-
} catch {
|
|
416
|
-
return;
|
|
417
|
-
}
|
|
418
|
-
}
|
|
419
|
-
function readMetadata(filePath) {
|
|
420
|
-
if (!fs.existsSync(filePath)) {
|
|
421
|
-
return null;
|
|
422
|
-
}
|
|
423
|
-
try {
|
|
424
|
-
const raw = fs.readFileSync(filePath, "utf8");
|
|
425
|
-
const parsed = JSON.parse(raw);
|
|
426
|
-
if (parsed.version !== METADATA_VERSION) return null;
|
|
427
|
-
if (parsed.secretBackend !== "keychain" && parsed.secretBackend !== "file") {
|
|
428
|
-
return null;
|
|
429
|
-
}
|
|
430
|
-
if (typeof parsed.baseUrl !== "string" || !parsed.baseUrl.trim()) return null;
|
|
431
|
-
if (!Array.isArray(parsed.scope)) return null;
|
|
432
|
-
if (typeof parsed.obtainedAt !== "number") return null;
|
|
433
|
-
if (typeof parsed.expiresAt !== "number") return null;
|
|
434
|
-
if (typeof parsed.updatedAt !== "number") return null;
|
|
435
|
-
return {
|
|
436
|
-
version: parsed.version,
|
|
437
|
-
secretBackend: parsed.secretBackend,
|
|
438
|
-
baseUrl: parsed.baseUrl,
|
|
439
|
-
scope: parsed.scope.filter(
|
|
440
|
-
(value) => typeof value === "string"
|
|
441
|
-
),
|
|
442
|
-
obtainedAt: parsed.obtainedAt,
|
|
443
|
-
expiresAt: parsed.expiresAt,
|
|
444
|
-
updatedAt: parsed.updatedAt
|
|
445
|
-
};
|
|
446
|
-
} catch {
|
|
447
|
-
return null;
|
|
448
|
-
}
|
|
449
|
-
}
|
|
450
|
-
function readActiveCloudTargetMetadata(filePath) {
|
|
451
|
-
if (!fs.existsSync(filePath)) {
|
|
452
|
-
return null;
|
|
453
|
-
}
|
|
454
|
-
try {
|
|
455
|
-
const raw = fs.readFileSync(filePath, "utf8");
|
|
456
|
-
const parsed = JSON.parse(raw);
|
|
457
|
-
if (parsed.version !== ACTIVE_TARGET_VERSION) {
|
|
458
|
-
return null;
|
|
459
|
-
}
|
|
460
|
-
if (typeof parsed.baseUrl !== "string" || !parsed.baseUrl.trim()) {
|
|
461
|
-
return null;
|
|
462
|
-
}
|
|
463
|
-
return {
|
|
464
|
-
baseUrl: parsed.baseUrl
|
|
465
|
-
};
|
|
466
|
-
} catch {
|
|
467
|
-
return null;
|
|
468
|
-
}
|
|
469
|
-
}
|
|
470
|
-
function parseSecretPayload(raw) {
|
|
471
|
-
try {
|
|
472
|
-
const parsed = JSON.parse(raw);
|
|
473
|
-
if (typeof parsed.accessToken !== "string" || !parsed.accessToken.trim() || typeof parsed.refreshToken !== "string" || !parsed.refreshToken.trim()) {
|
|
474
|
-
return null;
|
|
475
|
-
}
|
|
476
|
-
return {
|
|
477
|
-
accessToken: parsed.accessToken,
|
|
478
|
-
refreshToken: parsed.refreshToken
|
|
479
|
-
};
|
|
480
|
-
} catch {
|
|
481
|
-
return null;
|
|
482
|
-
}
|
|
483
|
-
}
|
|
484
|
-
function readSecretFile(filePath) {
|
|
485
|
-
if (!fs.existsSync(filePath)) {
|
|
486
|
-
return null;
|
|
487
|
-
}
|
|
488
|
-
try {
|
|
489
|
-
return parseSecretPayload(fs.readFileSync(filePath, "utf8"));
|
|
490
|
-
} catch {
|
|
491
|
-
return null;
|
|
492
|
-
}
|
|
493
|
-
}
|
|
494
|
-
function writeJsonFile(filePath, value, options = {}) {
|
|
495
|
-
fs.writeFileSync(filePath, JSON.stringify(value, null, 2), {
|
|
496
|
-
encoding: "utf8",
|
|
497
|
-
mode: options.mode ?? 384
|
|
498
|
-
});
|
|
499
|
-
if (typeof options.mode === "number") {
|
|
500
|
-
fs.chmodSync(filePath, options.mode);
|
|
501
|
-
}
|
|
502
|
-
}
|
|
503
|
-
|
|
504
|
-
// src/cli/auth.ts
|
|
505
|
-
var CliAuthHttpError = class extends Error {
|
|
506
|
-
status;
|
|
507
|
-
body;
|
|
508
|
-
constructor(message, status, body) {
|
|
509
|
-
super(message);
|
|
510
|
-
this.name = "CliAuthHttpError";
|
|
511
|
-
this.status = status;
|
|
512
|
-
this.body = body;
|
|
513
|
-
}
|
|
514
|
-
};
|
|
515
|
-
var HELP_TEXT = `Usage: opensteer auth <command> [options]
|
|
516
|
-
|
|
517
|
-
Authenticate Opensteer CLI with Opensteer Cloud.
|
|
518
|
-
|
|
519
|
-
Commands:
|
|
520
|
-
login Start device login flow in browser
|
|
521
|
-
status Show saved machine login state for the selected cloud host
|
|
522
|
-
logout Revoke and remove saved machine login for the selected cloud host
|
|
523
|
-
|
|
524
|
-
Options:
|
|
525
|
-
--base-url <url> Cloud API base URL (defaults to env or the last selected host)
|
|
526
|
-
--json JSON output (login prompts go to stderr)
|
|
527
|
-
--no-browser Do not auto-open your default browser during login
|
|
528
|
-
-h, --help Show this help
|
|
529
|
-
`;
|
|
530
|
-
var DEFAULT_AUTH_SITE_URL = "https://opensteer.com";
|
|
531
|
-
var INTERNAL_AUTH_SITE_URL_ENV = "OPENSTEER_INTERNAL_AUTH_SITE_URL";
|
|
532
|
-
function createDefaultDeps() {
|
|
533
|
-
const env = process.env;
|
|
534
|
-
return {
|
|
535
|
-
env,
|
|
536
|
-
store: createMachineCredentialStore({
|
|
537
|
-
env,
|
|
538
|
-
warn: (warning) => {
|
|
539
|
-
process.stderr.write(`${warning.message} (${warning.path})
|
|
540
|
-
`);
|
|
541
|
-
}
|
|
542
|
-
}),
|
|
543
|
-
fetchFn: fetch,
|
|
544
|
-
writeStdout: (message) => process.stdout.write(message),
|
|
545
|
-
writeStderr: (message) => process.stderr.write(message),
|
|
546
|
-
isInteractive: () => Boolean(process.stdin.isTTY && process.stdout.isTTY),
|
|
547
|
-
sleep: async (ms) => {
|
|
548
|
-
await new Promise((resolve) => setTimeout(resolve, ms));
|
|
549
|
-
},
|
|
550
|
-
now: () => Date.now(),
|
|
551
|
-
openExternalUrl: openDefaultBrowser
|
|
552
|
-
};
|
|
553
|
-
}
|
|
554
|
-
function readFlagValue(args, index, flag) {
|
|
555
|
-
const value = args[index + 1];
|
|
556
|
-
if (value === void 0 || value.startsWith("-")) {
|
|
557
|
-
return {
|
|
558
|
-
ok: false,
|
|
559
|
-
error: `${flag} requires a value.`
|
|
560
|
-
};
|
|
561
|
-
}
|
|
562
|
-
return {
|
|
563
|
-
ok: true,
|
|
564
|
-
value,
|
|
565
|
-
nextIndex: index + 1
|
|
566
|
-
};
|
|
567
|
-
}
|
|
568
|
-
function parseAuthCommonArgs(rawArgs) {
|
|
569
|
-
const args = {};
|
|
570
|
-
for (let i = 0; i < rawArgs.length; i++) {
|
|
571
|
-
const arg = rawArgs[i];
|
|
572
|
-
if (arg === "--json") {
|
|
573
|
-
args.json = true;
|
|
574
|
-
continue;
|
|
575
|
-
}
|
|
576
|
-
if (arg === "--base-url") {
|
|
577
|
-
const value = readFlagValue(rawArgs, i, "--base-url");
|
|
578
|
-
if (!value.ok) return { args, error: value.error };
|
|
579
|
-
args.baseUrl = value.value;
|
|
580
|
-
i = value.nextIndex;
|
|
581
|
-
continue;
|
|
582
|
-
}
|
|
583
|
-
return {
|
|
584
|
-
args,
|
|
585
|
-
error: `Unsupported option "${arg}".`
|
|
586
|
-
};
|
|
587
|
-
}
|
|
588
|
-
return { args };
|
|
589
|
-
}
|
|
590
|
-
function parseOpensteerAuthArgs(rawArgs) {
|
|
591
|
-
if (!rawArgs.length) {
|
|
592
|
-
return { mode: "help" };
|
|
593
|
-
}
|
|
594
|
-
const [subcommand, ...rest] = rawArgs;
|
|
595
|
-
if (subcommand === "--help" || subcommand === "-h" || subcommand === "help") {
|
|
596
|
-
return { mode: "help" };
|
|
597
|
-
}
|
|
598
|
-
if (subcommand === "login") {
|
|
599
|
-
let openBrowser = true;
|
|
600
|
-
const filtered = [];
|
|
601
|
-
for (const arg of rest) {
|
|
602
|
-
if (arg === "--no-browser") {
|
|
603
|
-
openBrowser = false;
|
|
604
|
-
continue;
|
|
605
|
-
}
|
|
606
|
-
filtered.push(arg);
|
|
607
|
-
}
|
|
608
|
-
const parsed = parseAuthCommonArgs(filtered);
|
|
609
|
-
if (parsed.error) return { mode: "error", error: parsed.error };
|
|
610
|
-
return {
|
|
611
|
-
mode: "login",
|
|
612
|
-
args: {
|
|
613
|
-
...parsed.args,
|
|
614
|
-
openBrowser
|
|
615
|
-
}
|
|
616
|
-
};
|
|
617
|
-
}
|
|
618
|
-
if (subcommand === "status") {
|
|
619
|
-
const parsed = parseAuthCommonArgs(rest);
|
|
620
|
-
if (parsed.error) return { mode: "error", error: parsed.error };
|
|
621
|
-
return { mode: "status", args: parsed.args };
|
|
622
|
-
}
|
|
623
|
-
if (subcommand === "logout") {
|
|
624
|
-
const parsed = parseAuthCommonArgs(rest);
|
|
625
|
-
if (parsed.error) return { mode: "error", error: parsed.error };
|
|
626
|
-
return { mode: "logout", args: parsed.args };
|
|
627
|
-
}
|
|
628
|
-
return {
|
|
629
|
-
mode: "error",
|
|
630
|
-
error: `Unsupported auth subcommand "${subcommand}".`
|
|
631
|
-
};
|
|
632
|
-
}
|
|
633
|
-
function printHelp(deps) {
|
|
634
|
-
deps.writeStdout(`${HELP_TEXT}
|
|
635
|
-
`);
|
|
636
|
-
}
|
|
637
|
-
function writeHumanLine(deps, message) {
|
|
638
|
-
deps.writeStdout(`${message}
|
|
639
|
-
`);
|
|
640
|
-
}
|
|
641
|
-
function writeJsonLine(deps, payload) {
|
|
642
|
-
deps.writeStdout(`${JSON.stringify(payload)}
|
|
643
|
-
`);
|
|
644
|
-
}
|
|
645
|
-
function resolveBaseUrl(provided, env) {
|
|
646
|
-
const baseUrl = normalizeCloudBaseUrl(
|
|
647
|
-
(provided || env.OPENSTEER_BASE_URL || DEFAULT_CLOUD_BASE_URL).trim()
|
|
648
|
-
);
|
|
649
|
-
assertSecureUrl(baseUrl, "--base-url");
|
|
650
|
-
return baseUrl;
|
|
651
|
-
}
|
|
652
|
-
function resolveAuthSiteUrl(env) {
|
|
653
|
-
const authSiteUrl = normalizeCloudBaseUrl(
|
|
654
|
-
(env[INTERNAL_AUTH_SITE_URL_ENV] || DEFAULT_AUTH_SITE_URL).trim()
|
|
655
|
-
);
|
|
656
|
-
assertSecureUrl(
|
|
657
|
-
authSiteUrl,
|
|
658
|
-
`environment variable ${INTERNAL_AUTH_SITE_URL_ENV}`
|
|
659
|
-
);
|
|
660
|
-
return authSiteUrl;
|
|
661
|
-
}
|
|
662
|
-
function hasExplicitCloudTargetSelection(providedBaseUrl, env) {
|
|
663
|
-
return Boolean(
|
|
664
|
-
providedBaseUrl?.trim() || env.OPENSTEER_BASE_URL?.trim()
|
|
665
|
-
);
|
|
666
|
-
}
|
|
667
|
-
function readRememberedCloudTarget(store) {
|
|
668
|
-
const activeTarget = store.readActiveCloudTarget();
|
|
669
|
-
if (!activeTarget) {
|
|
670
|
-
return null;
|
|
671
|
-
}
|
|
672
|
-
try {
|
|
673
|
-
const baseUrl = normalizeCloudBaseUrl(activeTarget.baseUrl);
|
|
674
|
-
assertSecureUrl(baseUrl, "--base-url");
|
|
675
|
-
return { baseUrl };
|
|
676
|
-
} catch {
|
|
677
|
-
return null;
|
|
678
|
-
}
|
|
679
|
-
}
|
|
680
|
-
function resolveCloudTarget(args, env, store, options = {}) {
|
|
681
|
-
if (options.allowRememberedTarget !== false && !hasExplicitCloudTargetSelection(args.baseUrl, env)) {
|
|
682
|
-
const rememberedTarget = readRememberedCloudTarget(store);
|
|
683
|
-
if (rememberedTarget) {
|
|
684
|
-
return rememberedTarget;
|
|
685
|
-
}
|
|
686
|
-
}
|
|
687
|
-
const baseUrl = resolveBaseUrl(args.baseUrl, env);
|
|
688
|
-
return { baseUrl };
|
|
689
|
-
}
|
|
690
|
-
function assertSecureUrl(value, flag) {
|
|
691
|
-
let parsed;
|
|
692
|
-
try {
|
|
693
|
-
parsed = new URL(value);
|
|
694
|
-
} catch {
|
|
695
|
-
throw new Error(`Invalid ${flag} "${value}".`);
|
|
696
|
-
}
|
|
697
|
-
if (parsed.protocol === "https:") {
|
|
698
|
-
return;
|
|
699
|
-
}
|
|
700
|
-
if (parsed.protocol === "http:") {
|
|
701
|
-
const host = parsed.hostname.toLowerCase();
|
|
702
|
-
if (host === "localhost" || host === "127.0.0.1" || host === "::1") {
|
|
703
|
-
return;
|
|
704
|
-
}
|
|
705
|
-
}
|
|
706
|
-
throw new Error(
|
|
707
|
-
`Insecure URL "${value}". Use HTTPS, or HTTP only for localhost.`
|
|
708
|
-
);
|
|
709
|
-
}
|
|
710
|
-
async function postJson(fetchFn, url, body) {
|
|
711
|
-
const response = await fetchFn(url, {
|
|
712
|
-
method: "POST",
|
|
713
|
-
headers: {
|
|
714
|
-
"content-type": "application/json"
|
|
715
|
-
},
|
|
716
|
-
body: JSON.stringify(body)
|
|
717
|
-
});
|
|
718
|
-
let payload = null;
|
|
719
|
-
try {
|
|
720
|
-
payload = await response.json();
|
|
721
|
-
} catch {
|
|
722
|
-
payload = null;
|
|
723
|
-
}
|
|
724
|
-
if (!response.ok) {
|
|
725
|
-
throw new CliAuthHttpError(
|
|
726
|
-
`Auth request failed with status ${response.status}.`,
|
|
727
|
-
response.status,
|
|
728
|
-
payload
|
|
729
|
-
);
|
|
730
|
-
}
|
|
731
|
-
return payload;
|
|
732
|
-
}
|
|
733
|
-
function parseScope(rawScope) {
|
|
734
|
-
if (!rawScope) return ["cloud:browser"];
|
|
735
|
-
const values = rawScope.split(" ").map((value) => value.trim()).filter(Boolean);
|
|
736
|
-
return values.length ? values : ["cloud:browser"];
|
|
737
|
-
}
|
|
738
|
-
function parseCliTokenResponse(payload) {
|
|
739
|
-
const accessToken = typeof payload.access_token === "string" ? payload.access_token.trim() : "";
|
|
740
|
-
const refreshToken2 = typeof payload.refresh_token === "string" ? payload.refresh_token.trim() : "";
|
|
741
|
-
const expiresInSec = typeof payload.expires_in === "number" && Number.isFinite(payload.expires_in) && payload.expires_in > 0 ? Math.trunc(payload.expires_in) : 0;
|
|
742
|
-
if (!accessToken || !refreshToken2 || !expiresInSec) {
|
|
743
|
-
throw new Error("Invalid token response from cloud auth endpoint.");
|
|
744
|
-
}
|
|
745
|
-
return {
|
|
746
|
-
accessToken,
|
|
747
|
-
refreshToken: refreshToken2,
|
|
748
|
-
expiresInSec,
|
|
749
|
-
scope: parseScope(payload.scope)
|
|
750
|
-
};
|
|
751
|
-
}
|
|
752
|
-
function parseCliOauthError(error) {
|
|
753
|
-
if (!error || typeof error !== "object" || Array.isArray(error)) {
|
|
754
|
-
return null;
|
|
755
|
-
}
|
|
756
|
-
const root = error;
|
|
757
|
-
return {
|
|
758
|
-
error: typeof root.error === "string" ? root.error : void 0,
|
|
759
|
-
error_description: typeof root.error_description === "string" ? root.error_description : void 0,
|
|
760
|
-
interval: typeof root.interval === "number" ? root.interval : void 0
|
|
761
|
-
};
|
|
762
|
-
}
|
|
763
|
-
async function startDeviceAuthorization(authSiteUrl, fetchFn) {
|
|
764
|
-
const response = await postJson(
|
|
765
|
-
fetchFn,
|
|
766
|
-
`${authSiteUrl}/api/cli-auth/device/start`,
|
|
767
|
-
{
|
|
768
|
-
scope: ["cloud:browser"]
|
|
769
|
-
}
|
|
770
|
-
);
|
|
771
|
-
if (!response || typeof response.device_code !== "string" || !response.device_code.trim() || typeof response.user_code !== "string" || !response.user_code.trim() || typeof response.verification_uri_complete !== "string" || !response.verification_uri_complete.trim() || typeof response.expires_in !== "number" || response.expires_in <= 0 || typeof response.interval !== "number" || response.interval <= 0) {
|
|
772
|
-
throw new Error("Invalid device authorization response from cloud.");
|
|
773
|
-
}
|
|
774
|
-
return response;
|
|
775
|
-
}
|
|
776
|
-
async function pollDeviceToken(authSiteUrl, deviceCode, fetchFn) {
|
|
777
|
-
return await postJson(
|
|
778
|
-
fetchFn,
|
|
779
|
-
`${authSiteUrl}/api/cli-auth/device/token`,
|
|
780
|
-
{
|
|
781
|
-
grant_type: "urn:ietf:params:oauth:grant-type:device_code",
|
|
782
|
-
device_code: deviceCode
|
|
783
|
-
}
|
|
784
|
-
);
|
|
785
|
-
}
|
|
786
|
-
async function refreshToken(authSiteUrl, refreshTokenValue, fetchFn) {
|
|
787
|
-
return await postJson(fetchFn, `${authSiteUrl}/api/cli-auth/token`, {
|
|
788
|
-
grant_type: "refresh_token",
|
|
789
|
-
refresh_token: refreshTokenValue
|
|
790
|
-
});
|
|
791
|
-
}
|
|
792
|
-
async function revokeToken(authSiteUrl, refreshTokenValue, fetchFn) {
|
|
793
|
-
await postJson(fetchFn, `${authSiteUrl}/api/cli-auth/revoke`, {
|
|
794
|
-
token: refreshTokenValue
|
|
795
|
-
});
|
|
796
|
-
}
|
|
797
|
-
async function openDefaultBrowser(url) {
|
|
798
|
-
try {
|
|
799
|
-
const child = await open(url, {
|
|
800
|
-
wait: false
|
|
801
|
-
});
|
|
802
|
-
child.on("error", () => void 0);
|
|
803
|
-
child.unref();
|
|
804
|
-
return true;
|
|
805
|
-
} catch {
|
|
806
|
-
return false;
|
|
807
|
-
}
|
|
808
|
-
}
|
|
809
|
-
async function runDeviceLoginFlow(args) {
|
|
810
|
-
const start = await startDeviceAuthorization(args.authSiteUrl, args.fetchFn);
|
|
811
|
-
if (args.openBrowser) {
|
|
812
|
-
args.writeProgress(
|
|
813
|
-
"Opening your default browser for Opensteer CLI authentication.\n"
|
|
814
|
-
);
|
|
815
|
-
args.writeProgress(
|
|
816
|
-
`If nothing opens, use this URL:
|
|
817
|
-
${start.verification_uri_complete}
|
|
818
|
-
`
|
|
819
|
-
);
|
|
820
|
-
} else {
|
|
821
|
-
if (args.openBrowserDisabledReason) {
|
|
822
|
-
args.writeProgress(
|
|
823
|
-
`Automatic browser open is disabled (${args.openBrowserDisabledReason}).
|
|
824
|
-
`
|
|
825
|
-
);
|
|
826
|
-
}
|
|
827
|
-
args.writeProgress(
|
|
828
|
-
`Open this URL to authenticate Opensteer CLI:
|
|
829
|
-
${start.verification_uri_complete}
|
|
830
|
-
`
|
|
831
|
-
);
|
|
832
|
-
}
|
|
833
|
-
args.writeProgress(`Verification code: ${start.user_code}
|
|
834
|
-
`);
|
|
835
|
-
if (args.openBrowser) {
|
|
836
|
-
const browserOpened = await args.openExternalUrl(
|
|
837
|
-
start.verification_uri_complete
|
|
838
|
-
);
|
|
839
|
-
if (browserOpened) {
|
|
840
|
-
args.writeProgress(
|
|
841
|
-
"Opened your default browser. Finish authentication there; this terminal will continue automatically.\n"
|
|
842
|
-
);
|
|
843
|
-
} else {
|
|
844
|
-
args.writeProgress(
|
|
845
|
-
"Could not open your default browser automatically. Paste the URL above into a browser to continue.\n"
|
|
846
|
-
);
|
|
847
|
-
}
|
|
848
|
-
}
|
|
849
|
-
const deadline = args.now() + start.expires_in * 1e3;
|
|
850
|
-
let pollIntervalMs = Math.max(1, Math.trunc(start.interval)) * 1e3;
|
|
851
|
-
while (args.now() <= deadline) {
|
|
852
|
-
await args.sleep(pollIntervalMs);
|
|
853
|
-
try {
|
|
854
|
-
const tokenPayload = await pollDeviceToken(
|
|
855
|
-
args.authSiteUrl,
|
|
856
|
-
start.device_code,
|
|
857
|
-
args.fetchFn
|
|
858
|
-
);
|
|
859
|
-
const parsed = parseCliTokenResponse(tokenPayload);
|
|
860
|
-
return {
|
|
861
|
-
accessToken: parsed.accessToken,
|
|
862
|
-
refreshToken: parsed.refreshToken,
|
|
863
|
-
expiresAt: args.now() + parsed.expiresInSec * 1e3,
|
|
864
|
-
scope: parsed.scope
|
|
865
|
-
};
|
|
866
|
-
} catch (error) {
|
|
867
|
-
if (error instanceof CliAuthHttpError) {
|
|
868
|
-
const oauthError = parseCliOauthError(error.body);
|
|
869
|
-
if (!oauthError?.error) {
|
|
870
|
-
throw error;
|
|
871
|
-
}
|
|
872
|
-
if (oauthError.error === "authorization_pending") {
|
|
873
|
-
continue;
|
|
874
|
-
}
|
|
875
|
-
if (oauthError.error === "slow_down") {
|
|
876
|
-
const hintedInterval = typeof oauthError.interval === "number" && oauthError.interval > 0 ? Math.trunc(oauthError.interval) * 1e3 : pollIntervalMs + 5e3;
|
|
877
|
-
pollIntervalMs = Math.max(hintedInterval, pollIntervalMs + 1e3);
|
|
878
|
-
continue;
|
|
879
|
-
}
|
|
880
|
-
if (oauthError.error === "expired_token") {
|
|
881
|
-
throw new Error(
|
|
882
|
-
'Device authorization expired before approval. Run "opensteer auth login" again.'
|
|
883
|
-
);
|
|
884
|
-
}
|
|
885
|
-
if (oauthError.error === "access_denied") {
|
|
886
|
-
throw new Error(
|
|
887
|
-
'Cloud login was denied. Run "opensteer auth login" to retry.'
|
|
888
|
-
);
|
|
889
|
-
}
|
|
890
|
-
throw new Error(
|
|
891
|
-
oauthError.error_description || `Cloud login failed: ${oauthError.error}.`
|
|
892
|
-
);
|
|
893
|
-
}
|
|
894
|
-
throw error;
|
|
895
|
-
}
|
|
896
|
-
}
|
|
897
|
-
throw new Error(
|
|
898
|
-
'Timed out waiting for cloud login approval. Run "opensteer auth login" again.'
|
|
899
|
-
);
|
|
900
|
-
}
|
|
901
|
-
async function refreshSavedCredential(saved, deps) {
|
|
902
|
-
const tokenPayload = await refreshToken(
|
|
903
|
-
resolveAuthSiteUrl(deps.env),
|
|
904
|
-
saved.refreshToken,
|
|
905
|
-
deps.fetchFn
|
|
906
|
-
);
|
|
907
|
-
const parsed = parseCliTokenResponse(tokenPayload);
|
|
908
|
-
const updated = {
|
|
909
|
-
accessToken: parsed.accessToken,
|
|
910
|
-
refreshToken: parsed.refreshToken,
|
|
911
|
-
expiresAt: deps.now() + parsed.expiresInSec * 1e3,
|
|
912
|
-
scope: parsed.scope
|
|
913
|
-
};
|
|
914
|
-
deps.store.writeCloudCredential({
|
|
915
|
-
baseUrl: saved.baseUrl,
|
|
916
|
-
scope: updated.scope,
|
|
917
|
-
accessToken: updated.accessToken,
|
|
918
|
-
refreshToken: updated.refreshToken,
|
|
919
|
-
obtainedAt: deps.now(),
|
|
920
|
-
expiresAt: updated.expiresAt
|
|
921
|
-
});
|
|
922
|
-
return updated;
|
|
923
|
-
}
|
|
924
|
-
async function ensureSavedCredentialIsFresh(saved, deps) {
|
|
925
|
-
const refreshSkewMs = 6e4;
|
|
926
|
-
if (saved.expiresAt > deps.now() + refreshSkewMs) {
|
|
927
|
-
return saved;
|
|
928
|
-
}
|
|
929
|
-
try {
|
|
930
|
-
const refreshed = await refreshSavedCredential(saved, deps);
|
|
931
|
-
return {
|
|
932
|
-
...saved,
|
|
933
|
-
accessToken: refreshed.accessToken,
|
|
934
|
-
refreshToken: refreshed.refreshToken,
|
|
935
|
-
expiresAt: refreshed.expiresAt,
|
|
936
|
-
scope: refreshed.scope,
|
|
937
|
-
obtainedAt: deps.now()
|
|
938
|
-
};
|
|
939
|
-
} catch (error) {
|
|
940
|
-
if (error instanceof CliAuthHttpError) {
|
|
941
|
-
const oauth = parseCliOauthError(error.body);
|
|
942
|
-
if (oauth?.error === "invalid_grant" || oauth?.error === "expired_token") {
|
|
943
|
-
deps.store.clearCloudCredential({
|
|
944
|
-
baseUrl: saved.baseUrl
|
|
945
|
-
});
|
|
946
|
-
return null;
|
|
947
|
-
}
|
|
948
|
-
}
|
|
949
|
-
deps.writeStderr(
|
|
950
|
-
`Unable to refresh saved cloud login: ${error instanceof Error ? error.message : "unknown error"}
|
|
951
|
-
`
|
|
952
|
-
);
|
|
953
|
-
return null;
|
|
954
|
-
}
|
|
955
|
-
}
|
|
956
|
-
function toAuthMissingMessage(commandName) {
|
|
957
|
-
return [
|
|
958
|
-
`${commandName} requires cloud authentication.`,
|
|
959
|
-
'Use --api-key, --access-token, OPENSTEER_API_KEY, OPENSTEER_ACCESS_TOKEN, or run "opensteer auth login".'
|
|
960
|
-
].join(" ");
|
|
961
|
-
}
|
|
962
|
-
function describeBrowserOpenMode(args, deps) {
|
|
963
|
-
if (!args.openBrowser) {
|
|
964
|
-
return {
|
|
965
|
-
enabled: false,
|
|
966
|
-
disabledReason: "--no-browser"
|
|
967
|
-
};
|
|
968
|
-
}
|
|
969
|
-
if (!deps.isInteractive()) {
|
|
970
|
-
return {
|
|
971
|
-
enabled: false,
|
|
972
|
-
disabledReason: "this shell is not interactive"
|
|
973
|
-
};
|
|
974
|
-
}
|
|
975
|
-
if (isCiEnvironment(deps.env)) {
|
|
976
|
-
return {
|
|
977
|
-
enabled: false,
|
|
978
|
-
disabledReason: "CI"
|
|
979
|
-
};
|
|
980
|
-
}
|
|
981
|
-
return {
|
|
982
|
-
enabled: true
|
|
983
|
-
};
|
|
984
|
-
}
|
|
985
|
-
function isCiEnvironment(env) {
|
|
986
|
-
const value = env.CI?.trim().toLowerCase();
|
|
987
|
-
return Boolean(value && value !== "0" && value !== "false");
|
|
988
|
-
}
|
|
989
|
-
function resolveCloudSessionEnvForRootDir(rootDir, env) {
|
|
990
|
-
const resolved = resolveConfigWithEnv(
|
|
991
|
-
{
|
|
992
|
-
storage: { rootDir }
|
|
993
|
-
},
|
|
994
|
-
{
|
|
995
|
-
env
|
|
996
|
-
}
|
|
997
|
-
);
|
|
998
|
-
return {
|
|
999
|
-
cloud: resolveCloudSelection(
|
|
1000
|
-
{
|
|
1001
|
-
cloud: resolved.config.cloud
|
|
1002
|
-
},
|
|
1003
|
-
resolved.env
|
|
1004
|
-
).cloud,
|
|
1005
|
-
env: resolved.env
|
|
1006
|
-
};
|
|
1007
|
-
}
|
|
1008
|
-
function isCloudModeEnabledForRootDir(rootDir, env) {
|
|
1009
|
-
return resolveCloudSessionEnvForRootDir(rootDir, env).cloud;
|
|
1010
|
-
}
|
|
1011
|
-
async function ensureCloudCredentialsForOpenCommand(options) {
|
|
1012
|
-
const processEnv = options.env ?? process.env;
|
|
1013
|
-
const runtime = resolveCloudSessionEnvForRootDir(options.scopeDir, processEnv);
|
|
1014
|
-
if (!runtime.cloud) {
|
|
1015
|
-
return null;
|
|
1016
|
-
}
|
|
1017
|
-
const writeStderr = options.writeStderr ?? ((message) => process.stderr.write(message));
|
|
1018
|
-
const auth = await ensureCloudCredentialsForCommand({
|
|
1019
|
-
commandName: "opensteer open",
|
|
1020
|
-
env: runtime.env,
|
|
1021
|
-
store: options.store,
|
|
1022
|
-
apiKeyFlag: options.apiKeyFlag,
|
|
1023
|
-
accessTokenFlag: options.accessTokenFlag,
|
|
1024
|
-
interactive: options.interactive,
|
|
1025
|
-
autoLoginIfNeeded: true,
|
|
1026
|
-
writeProgress: options.writeProgress ?? writeStderr,
|
|
1027
|
-
writeStderr,
|
|
1028
|
-
fetchFn: options.fetchFn,
|
|
1029
|
-
sleep: options.sleep,
|
|
1030
|
-
now: options.now,
|
|
1031
|
-
openExternalUrl: options.openExternalUrl
|
|
1032
|
-
});
|
|
1033
|
-
applyCloudCredentialToEnv(processEnv, {
|
|
1034
|
-
kind: auth.kind,
|
|
1035
|
-
source: auth.source,
|
|
1036
|
-
token: auth.token,
|
|
1037
|
-
authScheme: auth.authScheme
|
|
1038
|
-
});
|
|
1039
|
-
processEnv.OPENSTEER_BASE_URL = auth.baseUrl;
|
|
1040
|
-
return auth;
|
|
1041
|
-
}
|
|
1042
|
-
async function ensureCloudCredentialsForCommand(options) {
|
|
1043
|
-
const env = options.env ?? process.env;
|
|
1044
|
-
const writeProgress = options.writeProgress ?? options.writeStdout ?? ((message) => process.stdout.write(message));
|
|
1045
|
-
const writeStderr = options.writeStderr ?? ((message) => process.stderr.write(message));
|
|
1046
|
-
const fetchFn = options.fetchFn ?? fetch;
|
|
1047
|
-
const sleep = options.sleep ?? (async (ms) => {
|
|
1048
|
-
await new Promise((resolve) => setTimeout(resolve, ms));
|
|
1049
|
-
});
|
|
1050
|
-
const now = options.now ?? Date.now;
|
|
1051
|
-
const openExternalUrl = options.openExternalUrl ?? openDefaultBrowser;
|
|
1052
|
-
const store = options.store ?? createMachineCredentialStore({
|
|
1053
|
-
env,
|
|
1054
|
-
warn: (warning) => {
|
|
1055
|
-
writeStderr(`${warning.message} (${warning.path})
|
|
1056
|
-
`);
|
|
1057
|
-
}
|
|
1058
|
-
});
|
|
1059
|
-
const { baseUrl } = resolveCloudTarget(options, env, store);
|
|
1060
|
-
const initialCredential = resolveCloudCredential({
|
|
1061
|
-
env,
|
|
1062
|
-
apiKeyFlag: options.apiKeyFlag,
|
|
1063
|
-
accessTokenFlag: options.accessTokenFlag
|
|
1064
|
-
});
|
|
1065
|
-
let credential = initialCredential;
|
|
1066
|
-
if (!credential) {
|
|
1067
|
-
const saved = store.readCloudCredential({ baseUrl });
|
|
1068
|
-
const freshSaved = saved ? await ensureSavedCredentialIsFresh(saved, {
|
|
1069
|
-
env,
|
|
1070
|
-
fetchFn,
|
|
1071
|
-
store,
|
|
1072
|
-
now,
|
|
1073
|
-
writeStderr
|
|
1074
|
-
}) : null;
|
|
1075
|
-
if (freshSaved) {
|
|
1076
|
-
credential = {
|
|
1077
|
-
kind: "access-token",
|
|
1078
|
-
source: "saved",
|
|
1079
|
-
token: freshSaved.accessToken,
|
|
1080
|
-
authScheme: "bearer"
|
|
1081
|
-
};
|
|
1082
|
-
}
|
|
1083
|
-
}
|
|
1084
|
-
if (!credential) {
|
|
1085
|
-
if (options.autoLoginIfNeeded && (options.interactive ?? false)) {
|
|
1086
|
-
const loggedIn = await runDeviceLoginFlow({
|
|
1087
|
-
authSiteUrl: resolveAuthSiteUrl(env),
|
|
1088
|
-
fetchFn,
|
|
1089
|
-
writeProgress,
|
|
1090
|
-
openExternalUrl,
|
|
1091
|
-
sleep,
|
|
1092
|
-
now,
|
|
1093
|
-
openBrowser: true
|
|
1094
|
-
});
|
|
1095
|
-
store.writeCloudCredential({
|
|
1096
|
-
baseUrl,
|
|
1097
|
-
scope: loggedIn.scope,
|
|
1098
|
-
accessToken: loggedIn.accessToken,
|
|
1099
|
-
refreshToken: loggedIn.refreshToken,
|
|
1100
|
-
obtainedAt: now(),
|
|
1101
|
-
expiresAt: loggedIn.expiresAt
|
|
1102
|
-
});
|
|
1103
|
-
credential = {
|
|
1104
|
-
kind: "access-token",
|
|
1105
|
-
source: "saved",
|
|
1106
|
-
token: loggedIn.accessToken,
|
|
1107
|
-
authScheme: "bearer"
|
|
1108
|
-
};
|
|
1109
|
-
writeProgress("Cloud login complete.\n");
|
|
1110
|
-
} else {
|
|
1111
|
-
throw new Error(toAuthMissingMessage(options.commandName));
|
|
1112
|
-
}
|
|
1113
|
-
}
|
|
1114
|
-
store.writeActiveCloudTarget({ baseUrl });
|
|
1115
|
-
applyCloudCredentialToEnv(env, credential);
|
|
1116
|
-
env.OPENSTEER_BASE_URL = baseUrl;
|
|
1117
|
-
return {
|
|
1118
|
-
token: credential.token,
|
|
1119
|
-
authScheme: credential.authScheme,
|
|
1120
|
-
source: credential.source,
|
|
1121
|
-
kind: credential.kind,
|
|
1122
|
-
baseUrl
|
|
1123
|
-
};
|
|
1124
|
-
}
|
|
1125
|
-
async function runLogin(args, deps) {
|
|
1126
|
-
const { baseUrl } = resolveCloudTarget(args, deps.env, deps.store, {
|
|
1127
|
-
allowRememberedTarget: false
|
|
1128
|
-
});
|
|
1129
|
-
const writeProgress = args.json ? deps.writeStderr : deps.writeStdout;
|
|
1130
|
-
const browserOpenMode = describeBrowserOpenMode(args, deps);
|
|
1131
|
-
const login = await runDeviceLoginFlow({
|
|
1132
|
-
authSiteUrl: resolveAuthSiteUrl(deps.env),
|
|
1133
|
-
fetchFn: deps.fetchFn,
|
|
1134
|
-
writeProgress,
|
|
1135
|
-
openExternalUrl: deps.openExternalUrl,
|
|
1136
|
-
sleep: deps.sleep,
|
|
1137
|
-
now: deps.now,
|
|
1138
|
-
openBrowser: browserOpenMode.enabled,
|
|
1139
|
-
openBrowserDisabledReason: browserOpenMode.disabledReason
|
|
1140
|
-
});
|
|
1141
|
-
deps.store.writeCloudCredential({
|
|
1142
|
-
baseUrl,
|
|
1143
|
-
scope: login.scope,
|
|
1144
|
-
accessToken: login.accessToken,
|
|
1145
|
-
refreshToken: login.refreshToken,
|
|
1146
|
-
obtainedAt: deps.now(),
|
|
1147
|
-
expiresAt: login.expiresAt
|
|
1148
|
-
});
|
|
1149
|
-
deps.store.writeActiveCloudTarget({ baseUrl });
|
|
1150
|
-
if (args.json) {
|
|
1151
|
-
writeJsonLine(deps, {
|
|
1152
|
-
loggedIn: true,
|
|
1153
|
-
baseUrl,
|
|
1154
|
-
expiresAt: login.expiresAt,
|
|
1155
|
-
scope: login.scope,
|
|
1156
|
-
authSource: "device"
|
|
1157
|
-
});
|
|
1158
|
-
return 0;
|
|
1159
|
-
}
|
|
1160
|
-
writeHumanLine(deps, "Opensteer CLI login successful.");
|
|
1161
|
-
return 0;
|
|
1162
|
-
}
|
|
1163
|
-
async function runStatus(args, deps) {
|
|
1164
|
-
const { baseUrl } = resolveCloudTarget(args, deps.env, deps.store);
|
|
1165
|
-
deps.store.writeActiveCloudTarget({ baseUrl });
|
|
1166
|
-
const saved = deps.store.readCloudCredential({ baseUrl });
|
|
1167
|
-
if (!saved) {
|
|
1168
|
-
if (args.json) {
|
|
1169
|
-
writeJsonLine(deps, {
|
|
1170
|
-
loggedIn: false,
|
|
1171
|
-
baseUrl
|
|
1172
|
-
});
|
|
1173
|
-
} else {
|
|
1174
|
-
writeHumanLine(deps, `Opensteer CLI is not logged in for ${baseUrl}.`);
|
|
1175
|
-
}
|
|
1176
|
-
return 0;
|
|
1177
|
-
}
|
|
1178
|
-
const now = deps.now();
|
|
1179
|
-
const expired = saved.expiresAt <= now;
|
|
1180
|
-
if (args.json) {
|
|
1181
|
-
writeJsonLine(deps, {
|
|
1182
|
-
loggedIn: true,
|
|
1183
|
-
expired,
|
|
1184
|
-
baseUrl: saved.baseUrl,
|
|
1185
|
-
expiresAt: saved.expiresAt,
|
|
1186
|
-
scope: saved.scope
|
|
1187
|
-
});
|
|
1188
|
-
return 0;
|
|
1189
|
-
}
|
|
1190
|
-
writeHumanLine(
|
|
1191
|
-
deps,
|
|
1192
|
-
expired ? "Opensteer CLI has a saved login, but the access token is expired." : "Opensteer CLI is logged in."
|
|
1193
|
-
);
|
|
1194
|
-
writeHumanLine(deps, ` API Base URL: ${saved.baseUrl}`);
|
|
1195
|
-
writeHumanLine(deps, ` Expires At: ${new Date(saved.expiresAt).toISOString()}`);
|
|
1196
|
-
return 0;
|
|
1197
|
-
}
|
|
1198
|
-
async function runLogout(args, deps) {
|
|
1199
|
-
const { baseUrl } = resolveCloudTarget(args, deps.env, deps.store);
|
|
1200
|
-
deps.store.writeActiveCloudTarget({ baseUrl });
|
|
1201
|
-
const saved = deps.store.readCloudCredential({ baseUrl });
|
|
1202
|
-
if (saved) {
|
|
1203
|
-
try {
|
|
1204
|
-
await revokeToken(
|
|
1205
|
-
resolveAuthSiteUrl(deps.env),
|
|
1206
|
-
saved.refreshToken,
|
|
1207
|
-
deps.fetchFn
|
|
1208
|
-
);
|
|
1209
|
-
} catch {
|
|
1210
|
-
}
|
|
1211
|
-
}
|
|
1212
|
-
deps.store.clearCloudCredential({ baseUrl });
|
|
1213
|
-
if (args.json) {
|
|
1214
|
-
writeJsonLine(deps, {
|
|
1215
|
-
loggedOut: true,
|
|
1216
|
-
baseUrl
|
|
1217
|
-
});
|
|
1218
|
-
return 0;
|
|
1219
|
-
}
|
|
1220
|
-
writeHumanLine(deps, `Opensteer CLI login removed for ${baseUrl}.`);
|
|
1221
|
-
return 0;
|
|
1222
|
-
}
|
|
1223
|
-
async function runOpensteerAuthCli(rawArgs, overrideDeps = {}) {
|
|
1224
|
-
const deps = {
|
|
1225
|
-
...createDefaultDeps(),
|
|
1226
|
-
...overrideDeps
|
|
1227
|
-
};
|
|
1228
|
-
const parsed = parseOpensteerAuthArgs(rawArgs);
|
|
1229
|
-
if (parsed.mode === "help") {
|
|
1230
|
-
printHelp(deps);
|
|
1231
|
-
return 0;
|
|
1232
|
-
}
|
|
1233
|
-
if (parsed.mode === "error") {
|
|
1234
|
-
deps.writeStderr(`${parsed.error}
|
|
1235
|
-
`);
|
|
1236
|
-
deps.writeStderr('Run "opensteer auth --help" for usage.\n');
|
|
1237
|
-
return 1;
|
|
1238
|
-
}
|
|
1239
|
-
try {
|
|
1240
|
-
if (parsed.mode === "login") {
|
|
1241
|
-
return await runLogin(parsed.args, deps);
|
|
1242
|
-
}
|
|
1243
|
-
if (parsed.mode === "status") {
|
|
1244
|
-
return await runStatus(parsed.args, deps);
|
|
1245
|
-
}
|
|
1246
|
-
return await runLogout(parsed.args, deps);
|
|
1247
|
-
} catch (error) {
|
|
1248
|
-
const message = error instanceof Error ? error.message : "Auth command failed.";
|
|
1249
|
-
deps.writeStderr(`${message}
|
|
1250
|
-
`);
|
|
1251
|
-
return 1;
|
|
1252
|
-
}
|
|
1253
|
-
}
|
|
1254
|
-
|
|
1255
|
-
export {
|
|
1256
|
-
createKeychainStore,
|
|
1257
|
-
parseOpensteerAuthArgs,
|
|
1258
|
-
isCloudModeEnabledForRootDir,
|
|
1259
|
-
ensureCloudCredentialsForOpenCommand,
|
|
1260
|
-
ensureCloudCredentialsForCommand,
|
|
1261
|
-
runOpensteerAuthCli
|
|
1262
|
-
};
|