@expo/cli
Version:
177 lines (176 loc) • 6.88 kB
JavaScript
Object.defineProperty(exports, "__esModule", {
value: true
});
function _export(target, all) {
for(var name in all)Object.defineProperty(target, name, {
enumerable: true,
get: all[name]
});
}
_export(exports, {
UserSecondFactorDeviceMethod: function() {
return UserSecondFactorDeviceMethod;
},
retryUsernamePasswordAuthWithOTPAsync: function() {
return retryUsernamePasswordAuthWithOTPAsync;
}
});
function _assert() {
const data = /*#__PURE__*/ _interop_require_default(require("assert"));
_assert = function() {
return data;
};
return data;
}
function _chalk() {
const data = /*#__PURE__*/ _interop_require_default(require("chalk"));
_chalk = function() {
return data;
};
return data;
}
const _user = require("./user");
const _log = /*#__PURE__*/ _interop_require_wildcard(require("../../log"));
const _errors = require("../../utils/errors");
const _link = require("../../utils/link");
const _prompts = require("../../utils/prompts");
const _client = require("../rest/client");
function _interop_require_default(obj) {
return obj && obj.__esModule ? obj : {
default: obj
};
}
function _getRequireWildcardCache(nodeInterop) {
if (typeof WeakMap !== "function") return null;
var cacheBabelInterop = new WeakMap();
var cacheNodeInterop = new WeakMap();
return (_getRequireWildcardCache = function(nodeInterop) {
return nodeInterop ? cacheNodeInterop : cacheBabelInterop;
})(nodeInterop);
}
function _interop_require_wildcard(obj, nodeInterop) {
if (!nodeInterop && obj && obj.__esModule) {
return obj;
}
if (obj === null || typeof obj !== "object" && typeof obj !== "function") {
return {
default: obj
};
}
var cache = _getRequireWildcardCache(nodeInterop);
if (cache && cache.has(obj)) {
return cache.get(obj);
}
var newObj = {
__proto__: null
};
var hasPropertyDescriptor = Object.defineProperty && Object.getOwnPropertyDescriptor;
for(var key in obj){
if (key !== "default" && Object.prototype.hasOwnProperty.call(obj, key)) {
var desc = hasPropertyDescriptor ? Object.getOwnPropertyDescriptor(obj, key) : null;
if (desc && (desc.get || desc.set)) {
Object.defineProperty(newObj, key, desc);
} else {
newObj[key] = obj[key];
}
}
}
newObj.default = obj;
if (cache) {
cache.set(obj, newObj);
}
return newObj;
}
var UserSecondFactorDeviceMethod = /*#__PURE__*/ function(UserSecondFactorDeviceMethod) {
UserSecondFactorDeviceMethod["AUTHENTICATOR"] = "authenticator";
UserSecondFactorDeviceMethod["SMS"] = "sms";
return UserSecondFactorDeviceMethod;
}({});
const nonInteractiveHelp = `Use the EXPO_TOKEN environment variable to authenticate in CI (${(0, _link.learnMore)('https://docs.expo.dev/accounts/programmatic-access/')})`;
/**
* Prompt for an OTP with the option to cancel the question by answering empty (pressing return key).
*/ async function promptForOTPAsync(cancelBehavior) {
const enterMessage = cancelBehavior === 'cancel' ? (0, _chalk().default)`press {bold Enter} to cancel` : (0, _chalk().default)`press {bold Enter} for more options`;
const { otp } = await (0, _prompts.promptAsync)({
type: 'text',
name: 'otp',
message: `One-time password or backup code (${enterMessage}):`
}, {
nonInteractiveHelp
});
return otp || null;
}
/**
* Prompt for user to choose a backup OTP method. If selected method is SMS, a request
* for a new OTP will be sent to that method. Then, prompt for the OTP, and retry the user login.
*/ async function promptForBackupOTPAsync(username, password, secondFactorDevices) {
const nonPrimarySecondFactorDevices = secondFactorDevices.filter((device)=>!device.is_primary);
if (nonPrimarySecondFactorDevices.length === 0) {
throw new _errors.CommandError('No other second-factor devices set up. Ensure you have set up and certified a backup device.');
}
const hasAuthenticatorSecondFactorDevice = nonPrimarySecondFactorDevices.find((device)=>device.method === "authenticator");
const smsNonPrimarySecondFactorDevices = nonPrimarySecondFactorDevices.filter((device)=>device.method === "sms");
const authenticatorChoiceSentinel = -1;
const cancelChoiceSentinel = -2;
const deviceChoices = smsNonPrimarySecondFactorDevices.map((device, idx)=>({
title: device.sms_phone_number,
value: idx
}));
if (hasAuthenticatorSecondFactorDevice) {
deviceChoices.push({
title: 'Authenticator',
value: authenticatorChoiceSentinel
});
}
deviceChoices.push({
title: 'Cancel',
value: cancelChoiceSentinel
});
const selectedValue = await (0, _prompts.selectAsync)('Select a second-factor device:', deviceChoices, {
nonInteractiveHelp
});
if (selectedValue === cancelChoiceSentinel) {
return null;
} else if (selectedValue === authenticatorChoiceSentinel) {
return await promptForOTPAsync('cancel');
}
const device = smsNonPrimarySecondFactorDevices[selectedValue];
await (0, _client.fetchAsync)('auth/send-sms-otp', {
method: 'POST',
body: JSON.stringify({
username,
password,
secondFactorDeviceID: device.id
})
});
return await promptForOTPAsync('cancel');
}
async function retryUsernamePasswordAuthWithOTPAsync(username, password, metadata) {
const { secondFactorDevices, smsAutomaticallySent } = metadata;
(0, _assert().default)(secondFactorDevices !== undefined && smsAutomaticallySent !== undefined, `Malformed OTP error metadata: ${metadata}`);
const primaryDevice = secondFactorDevices.find((device)=>device.is_primary);
let otp = null;
if (smsAutomaticallySent) {
(0, _assert().default)(primaryDevice, 'OTP should only automatically be sent when there is a primary device');
_log.log(`One-time password was sent to the phone number ending in ${primaryDevice.sms_phone_number}.`);
otp = await promptForOTPAsync('menu');
}
if ((primaryDevice == null ? void 0 : primaryDevice.method) === "authenticator") {
_log.log('One-time password from authenticator required.');
otp = await promptForOTPAsync('menu');
}
// user bailed on case 1 or 2, wants to move to case 3
if (!otp) {
otp = await promptForBackupOTPAsync(username, password, secondFactorDevices);
}
if (!otp) {
throw new _errors.AbortCommandError();
}
await (0, _user.loginAsync)({
username,
password,
otp
});
}
//# sourceMappingURL=otp.js.map
;