UNPKG

@expo/cli

Version:
177 lines (176 loc) 6.88 kB
"use strict"; Object.defineProperty(exports, "__esModule", { value: true }); function _export(target, all) { for(var name in all)Object.defineProperty(target, name, { enumerable: true, get: all[name] }); } _export(exports, { UserSecondFactorDeviceMethod: function() { return UserSecondFactorDeviceMethod; }, retryUsernamePasswordAuthWithOTPAsync: function() { return retryUsernamePasswordAuthWithOTPAsync; } }); function _assert() { const data = /*#__PURE__*/ _interop_require_default(require("assert")); _assert = function() { return data; }; return data; } function _chalk() { const data = /*#__PURE__*/ _interop_require_default(require("chalk")); _chalk = function() { return data; }; return data; } const _user = require("./user"); const _log = /*#__PURE__*/ _interop_require_wildcard(require("../../log")); const _errors = require("../../utils/errors"); const _link = require("../../utils/link"); const _prompts = require("../../utils/prompts"); const _client = require("../rest/client"); function _interop_require_default(obj) { return obj && obj.__esModule ? obj : { default: obj }; } function _getRequireWildcardCache(nodeInterop) { if (typeof WeakMap !== "function") return null; var cacheBabelInterop = new WeakMap(); var cacheNodeInterop = new WeakMap(); return (_getRequireWildcardCache = function(nodeInterop) { return nodeInterop ? cacheNodeInterop : cacheBabelInterop; })(nodeInterop); } function _interop_require_wildcard(obj, nodeInterop) { if (!nodeInterop && obj && obj.__esModule) { return obj; } if (obj === null || typeof obj !== "object" && typeof obj !== "function") { return { default: obj }; } var cache = _getRequireWildcardCache(nodeInterop); if (cache && cache.has(obj)) { return cache.get(obj); } var newObj = { __proto__: null }; var hasPropertyDescriptor = Object.defineProperty && Object.getOwnPropertyDescriptor; for(var key in obj){ if (key !== "default" && Object.prototype.hasOwnProperty.call(obj, key)) { var desc = hasPropertyDescriptor ? Object.getOwnPropertyDescriptor(obj, key) : null; if (desc && (desc.get || desc.set)) { Object.defineProperty(newObj, key, desc); } else { newObj[key] = obj[key]; } } } newObj.default = obj; if (cache) { cache.set(obj, newObj); } return newObj; } var UserSecondFactorDeviceMethod = /*#__PURE__*/ function(UserSecondFactorDeviceMethod) { UserSecondFactorDeviceMethod["AUTHENTICATOR"] = "authenticator"; UserSecondFactorDeviceMethod["SMS"] = "sms"; return UserSecondFactorDeviceMethod; }({}); const nonInteractiveHelp = `Use the EXPO_TOKEN environment variable to authenticate in CI (${(0, _link.learnMore)('https://docs.expo.dev/accounts/programmatic-access/')})`; /** * Prompt for an OTP with the option to cancel the question by answering empty (pressing return key). */ async function promptForOTPAsync(cancelBehavior) { const enterMessage = cancelBehavior === 'cancel' ? (0, _chalk().default)`press {bold Enter} to cancel` : (0, _chalk().default)`press {bold Enter} for more options`; const { otp } = await (0, _prompts.promptAsync)({ type: 'text', name: 'otp', message: `One-time password or backup code (${enterMessage}):` }, { nonInteractiveHelp }); return otp || null; } /** * Prompt for user to choose a backup OTP method. If selected method is SMS, a request * for a new OTP will be sent to that method. Then, prompt for the OTP, and retry the user login. */ async function promptForBackupOTPAsync(username, password, secondFactorDevices) { const nonPrimarySecondFactorDevices = secondFactorDevices.filter((device)=>!device.is_primary); if (nonPrimarySecondFactorDevices.length === 0) { throw new _errors.CommandError('No other second-factor devices set up. Ensure you have set up and certified a backup device.'); } const hasAuthenticatorSecondFactorDevice = nonPrimarySecondFactorDevices.find((device)=>device.method === "authenticator"); const smsNonPrimarySecondFactorDevices = nonPrimarySecondFactorDevices.filter((device)=>device.method === "sms"); const authenticatorChoiceSentinel = -1; const cancelChoiceSentinel = -2; const deviceChoices = smsNonPrimarySecondFactorDevices.map((device, idx)=>({ title: device.sms_phone_number, value: idx })); if (hasAuthenticatorSecondFactorDevice) { deviceChoices.push({ title: 'Authenticator', value: authenticatorChoiceSentinel }); } deviceChoices.push({ title: 'Cancel', value: cancelChoiceSentinel }); const selectedValue = await (0, _prompts.selectAsync)('Select a second-factor device:', deviceChoices, { nonInteractiveHelp }); if (selectedValue === cancelChoiceSentinel) { return null; } else if (selectedValue === authenticatorChoiceSentinel) { return await promptForOTPAsync('cancel'); } const device = smsNonPrimarySecondFactorDevices[selectedValue]; await (0, _client.fetchAsync)('auth/send-sms-otp', { method: 'POST', body: JSON.stringify({ username, password, secondFactorDeviceID: device.id }) }); return await promptForOTPAsync('cancel'); } async function retryUsernamePasswordAuthWithOTPAsync(username, password, metadata) { const { secondFactorDevices, smsAutomaticallySent } = metadata; (0, _assert().default)(secondFactorDevices !== undefined && smsAutomaticallySent !== undefined, `Malformed OTP error metadata: ${metadata}`); const primaryDevice = secondFactorDevices.find((device)=>device.is_primary); let otp = null; if (smsAutomaticallySent) { (0, _assert().default)(primaryDevice, 'OTP should only automatically be sent when there is a primary device'); _log.log(`One-time password was sent to the phone number ending in ${primaryDevice.sms_phone_number}.`); otp = await promptForOTPAsync('menu'); } if ((primaryDevice == null ? void 0 : primaryDevice.method) === "authenticator") { _log.log('One-time password from authenticator required.'); otp = await promptForOTPAsync('menu'); } // user bailed on case 1 or 2, wants to move to case 3 if (!otp) { otp = await promptForBackupOTPAsync(username, password, secondFactorDevices); } if (!otp) { throw new _errors.AbortCommandError(); } await (0, _user.loginAsync)({ username, password, otp }); } //# sourceMappingURL=otp.js.map