blob: 1bf54936cd96ba96d0206eb5109d4341e3275553 [file] [log] [blame]
module.exports = adduser
var log = require("npmlog")
, npm = require("./npm.js")
, read = require("read")
, userValidate = require("npm-user-validate")
, crypto
try {
crypto = require("crypto")
} catch (ex) {}
adduser.usage = 'npm adduser [--registry=url] [--scope=@orgname] [--always-auth]' +
'\n\naliases: login'
function adduser (args, cb) {
npm.spinner.stop()
if (!crypto) return cb(new Error(
"You must compile node with ssl support to use the adduser feature"))
var creds = npm.config.getCredentialsByURI(npm.config.get("registry"))
var c = { u : creds.username || ""
, p : creds.password || ""
, e : creds.email || ""
}
, u = {}
, fns = [readUsername, readPassword, readEmail, save]
loop()
function loop (er) {
if (er) return cb(er)
var fn = fns.shift()
if (fn) return fn(c, u, loop)
cb()
}
}
function readUsername (c, u, cb) {
var v = userValidate.username
read({prompt: "Username: ", default: c.u || ""}, function (er, un) {
if (er) {
return cb(er.message === "cancelled" ? er.message : er)
}
// make sure it's valid. we have to do this here, because
// couchdb will only ever say "bad password" with a 401 when
// you try to PUT a _users record that the validate_doc_update
// rejects for *any* reason.
if (!un) {
return readUsername(c, u, cb)
}
var error = v(un)
if (error) {
log.warn(error.message)
return readUsername(c, u, cb)
}
c.changed = c.u !== un
u.u = un
cb(er)
})
}
function readPassword (c, u, cb) {
var v = userValidate.pw
var prompt
if (c.p && !c.changed) {
prompt = "Password: (or leave unchanged) "
} else {
prompt = "Password: "
}
read({prompt: prompt, silent: true}, function (er, pw) {
if (er) {
return cb(er.message === "cancelled" ? er.message : er)
}
if (!c.changed && pw === "") {
// when the username was not changed,
// empty response means "use the old value"
pw = c.p
}
if (!pw) {
return readPassword(c, u, cb)
}
var error = v(pw)
if (error) {
log.warn(error.message)
return readPassword(c, u, cb)
}
c.changed = c.changed || c.p !== pw
u.p = pw
cb(er)
})
}
function readEmail (c, u, cb) {
var v = userValidate.email
var r = { prompt: "Email: (this IS public) ", default: c.e || "" }
read(r, function (er, em) {
if (er) {
return cb(er.message === "cancelled" ? er.message : er)
}
if (!em) {
return readEmail(c, u, cb)
}
var error = v(em)
if (error) {
log.warn(error.message)
return readEmail(c, u, cb)
}
u.e = em
cb(er)
})
}
function save (c, u, cb) {
npm.spinner.start()
// save existing configs, but yank off for this PUT
var uri = npm.config.get("registry")
var scope = npm.config.get("scope")
// there may be a saved scope and no --registry (for login)
if (scope) {
if (scope.charAt(0) !== "@") scope = "@" + scope
var scopedRegistry = npm.config.get(scope + ":registry")
var cliRegistry = npm.config.get("registry", "cli")
if (scopedRegistry && !cliRegistry) uri = scopedRegistry
}
var params = {
auth : {
username : u.u,
password : u.p,
email : u.e
}
}
npm.registry.adduser(uri, params, function (er, doc) {
npm.spinner.stop()
if (er) return cb(er)
// don't want this polluting the configuration
npm.config.del("_token", "user")
if (scope) npm.config.set(scope + ":registry", uri, "user")
if (doc && doc.token) {
npm.config.setCredentialsByURI(uri, {
token : doc.token
})
}
else {
npm.config.setCredentialsByURI(uri, {
username : u.u,
password : u.p,
email : u.e,
alwaysAuth : npm.config.get("always-auth")
})
}
log.info('adduser', 'Authorized user %s', u.u)
var scopeMessage = scope ? ' to scope ' + scope : ''
console.log('Logged in as %s%s on %s.', u.u, scopeMessage, uri)
npm.config.save('user', cb)
})
}