mirror of
https://github.com/titanscouting/tra-analysis.git
synced 2025-09-06 15:07:21 +00:00
push all website files
This commit is contained in:
79
website/node_modules/npm/lib/auth/legacy.js
generated
vendored
Normal file
79
website/node_modules/npm/lib/auth/legacy.js
generated
vendored
Normal file
@@ -0,0 +1,79 @@
|
||||
'use strict'
|
||||
const read = require('../utils/read-user-info.js')
|
||||
const profile = require('npm-profile')
|
||||
const log = require('npmlog')
|
||||
const npm = require('../npm.js')
|
||||
const output = require('../utils/output.js')
|
||||
const pacoteOpts = require('../config/pacote')
|
||||
const fetchOpts = require('../config/fetch-opts')
|
||||
const openUrl = require('../utils/open-url')
|
||||
|
||||
const openerPromise = (url) => new Promise((resolve, reject) => {
|
||||
openUrl(url, 'to complete your login please visit', (er) => er ? reject(er) : resolve())
|
||||
})
|
||||
|
||||
const loginPrompter = (creds) => {
|
||||
const opts = { log: log }
|
||||
return read.username('Username:', creds.username, opts).then((u) => {
|
||||
creds.username = u
|
||||
return read.password('Password:', creds.password)
|
||||
}).then((p) => {
|
||||
creds.password = p
|
||||
return read.email('Email: (this IS public) ', creds.email, opts)
|
||||
}).then((e) => {
|
||||
creds.email = e
|
||||
return creds
|
||||
})
|
||||
}
|
||||
|
||||
module.exports.login = (creds, registry, scope, cb) => {
|
||||
const conf = {
|
||||
log: log,
|
||||
creds: creds,
|
||||
registry: registry,
|
||||
auth: {
|
||||
otp: npm.config.get('otp')
|
||||
},
|
||||
scope: scope,
|
||||
opts: fetchOpts.fromPacote(pacoteOpts())
|
||||
}
|
||||
login(conf).then((newCreds) => cb(null, newCreds)).catch(cb)
|
||||
}
|
||||
|
||||
function login (conf) {
|
||||
return profile.login(openerPromise, loginPrompter, conf)
|
||||
.catch((err) => {
|
||||
if (err.code === 'EOTP') throw err
|
||||
const u = conf.creds.username
|
||||
const p = conf.creds.password
|
||||
const e = conf.creds.email
|
||||
if (!(u && p && e)) throw err
|
||||
return profile.adduserCouch(u, e, p, conf)
|
||||
})
|
||||
.catch((err) => {
|
||||
if (err.code !== 'EOTP') throw err
|
||||
return read.otp('Enter one-time password from your authenticator app: ').then((otp) => {
|
||||
conf.auth.otp = otp
|
||||
const u = conf.creds.username
|
||||
const p = conf.creds.password
|
||||
return profile.loginCouch(u, p, conf)
|
||||
})
|
||||
}).then((result) => {
|
||||
const newCreds = {}
|
||||
if (result && result.token) {
|
||||
newCreds.token = result.token
|
||||
} else {
|
||||
newCreds.username = conf.creds.username
|
||||
newCreds.password = conf.creds.password
|
||||
newCreds.email = conf.creds.email
|
||||
newCreds.alwaysAuth = npm.config.get('always-auth')
|
||||
}
|
||||
|
||||
const usermsg = conf.creds.username ? ' user ' + conf.creds.username : ''
|
||||
conf.log.info('login', 'Authorized' + usermsg)
|
||||
const scopeMessage = conf.scope ? ' to scope ' + conf.scope : ''
|
||||
const userout = conf.creds.username ? ' as ' + conf.creds.username : ''
|
||||
output('Logged in%s%s on %s.', userout, scopeMessage, conf.registry)
|
||||
return newCreds
|
||||
})
|
||||
}
|
7
website/node_modules/npm/lib/auth/oauth.js
generated
vendored
Normal file
7
website/node_modules/npm/lib/auth/oauth.js
generated
vendored
Normal file
@@ -0,0 +1,7 @@
|
||||
var ssoAuth = require('./sso')
|
||||
var npm = require('../npm')
|
||||
|
||||
module.exports.login = function login () {
|
||||
npm.config.set('sso-type', 'oauth')
|
||||
ssoAuth.login.apply(this, arguments)
|
||||
}
|
7
website/node_modules/npm/lib/auth/saml.js
generated
vendored
Normal file
7
website/node_modules/npm/lib/auth/saml.js
generated
vendored
Normal file
@@ -0,0 +1,7 @@
|
||||
var ssoAuth = require('./sso')
|
||||
var npm = require('../npm')
|
||||
|
||||
module.exports.login = function login () {
|
||||
npm.config.set('sso-type', 'saml')
|
||||
ssoAuth.login.apply(this, arguments)
|
||||
}
|
56
website/node_modules/npm/lib/auth/sso.js
generated
vendored
Normal file
56
website/node_modules/npm/lib/auth/sso.js
generated
vendored
Normal file
@@ -0,0 +1,56 @@
|
||||
var log = require('npmlog')
|
||||
var npm = require('../npm.js')
|
||||
var output = require('../utils/output')
|
||||
var openUrl = require('../utils/open-url')
|
||||
|
||||
module.exports.login = function login (creds, registry, scope, cb) {
|
||||
var ssoType = npm.config.get('sso-type')
|
||||
if (!ssoType) { return cb(new Error('Missing option: sso-type')) }
|
||||
|
||||
var params = {
|
||||
// We're reusing the legacy login endpoint, so we need some dummy
|
||||
// stuff here to pass validation. They're never used.
|
||||
auth: {
|
||||
username: 'npm_' + ssoType + '_auth_dummy_user',
|
||||
password: 'placeholder',
|
||||
email: 'support@npmjs.com',
|
||||
authType: ssoType
|
||||
}
|
||||
}
|
||||
npm.registry.adduser(registry, params, function (er, doc) {
|
||||
if (er) return cb(er)
|
||||
if (!doc || !doc.token) return cb(new Error('no SSO token returned'))
|
||||
if (!doc.sso) return cb(new Error('no SSO URL returned by services'))
|
||||
|
||||
openUrl(doc.sso, 'to complete your login please visit', function () {
|
||||
pollForSession(registry, doc.token, function (err, username) {
|
||||
if (err) return cb(err)
|
||||
|
||||
log.info('adduser', 'Authorized user %s', username)
|
||||
var scopeMessage = scope ? ' to scope ' + scope : ''
|
||||
output('Logged in as %s%s on %s.', username, scopeMessage, registry)
|
||||
|
||||
cb(null, { token: doc.token })
|
||||
})
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
function pollForSession (registry, token, cb) {
|
||||
log.info('adduser', 'Polling for validated SSO session')
|
||||
npm.registry.whoami(registry, {
|
||||
auth: {
|
||||
token: token
|
||||
}
|
||||
}, function (er, username) {
|
||||
if (er && er.statusCode !== 401) {
|
||||
cb(er)
|
||||
} else if (!username) {
|
||||
setTimeout(function () {
|
||||
pollForSession(registry, token, cb)
|
||||
}, npm.config.get('sso-poll-frequency'))
|
||||
} else {
|
||||
cb(null, username)
|
||||
}
|
||||
})
|
||||
}
|
Reference in New Issue
Block a user