2018-06-11 20:52:01 +00:00
|
|
|
#!/usr/bin/env node
|
|
|
|
(function () {
|
2016-09-30 16:33:38 +00:00
|
|
|
'use strict';
|
|
|
|
|
2018-06-11 20:52:01 +00:00
|
|
|
var pkg = require('../package.json');
|
2018-06-14 08:39:34 +00:00
|
|
|
var os = require('os');
|
2018-06-11 20:52:01 +00:00
|
|
|
|
|
|
|
//var url = require('url');
|
2018-09-11 08:03:50 +00:00
|
|
|
var fs = require('fs');
|
2018-06-11 20:52:01 +00:00
|
|
|
var path = require('path');
|
2018-06-28 03:35:14 +00:00
|
|
|
//var https = require('https');
|
2018-06-11 20:52:01 +00:00
|
|
|
var YAML = require('js-yaml');
|
2018-09-11 08:03:50 +00:00
|
|
|
var TOML = require('toml');
|
2018-09-12 09:33:38 +00:00
|
|
|
var TPLS = TOML.parse(fs.readFileSync(path.join(__dirname, "../lib/en-us.toml"), 'utf8'));
|
2019-02-28 08:42:56 +00:00
|
|
|
var JWT = require('../lib/jwt.js');
|
2019-03-07 08:38:21 +00:00
|
|
|
var keypairs = require('keypairs');
|
2018-09-25 06:45:32 +00:00
|
|
|
|
2018-09-11 08:03:50 +00:00
|
|
|
/*
|
|
|
|
if ('function' !== typeof TOML.stringify) {
|
|
|
|
TOML.stringify = require('json2toml');
|
|
|
|
}
|
|
|
|
*/
|
2018-06-11 20:52:01 +00:00
|
|
|
var recase = require('recase').create({});
|
|
|
|
var camelCopy = recase.camelCopy.bind(recase);
|
|
|
|
//var snakeCopy = recase.snakeCopy.bind(recase);
|
|
|
|
|
2019-05-11 07:50:18 +00:00
|
|
|
var urequest = require('@root/request');
|
2019-03-28 09:23:53 +00:00
|
|
|
var urequestAsync = require('util').promisify(urequest);
|
2018-06-11 20:52:01 +00:00
|
|
|
var common = require('../lib/cli-common.js');
|
|
|
|
|
2019-03-07 06:18:26 +00:00
|
|
|
var defaultConfPath = path.join(os.homedir(), '.config/telebit');
|
|
|
|
var defaultConfFile = path.join(defaultConfPath, 'telebit.yml');
|
|
|
|
|
2018-06-11 20:52:01 +00:00
|
|
|
var argv = process.argv.slice(2);
|
|
|
|
|
2018-06-13 16:45:54 +00:00
|
|
|
var argIndex = argv.indexOf('--config');
|
2018-09-11 08:03:50 +00:00
|
|
|
if (-1 === argIndex) {
|
|
|
|
argIndex = argv.indexOf('-c');
|
|
|
|
}
|
2018-06-11 20:52:01 +00:00
|
|
|
var confpath;
|
2018-06-13 16:45:54 +00:00
|
|
|
var useTty;
|
2018-06-14 08:39:34 +00:00
|
|
|
var state = {};
|
2018-06-13 16:45:54 +00:00
|
|
|
if (-1 === argIndex) {
|
|
|
|
argIndex = argv.indexOf('-c');
|
2018-06-11 20:52:01 +00:00
|
|
|
}
|
2018-06-13 16:45:54 +00:00
|
|
|
if (-1 !== argIndex) {
|
|
|
|
confpath = argv.splice(argIndex, 2)[1];
|
2019-03-07 06:18:26 +00:00
|
|
|
state.configArg = confpath;
|
|
|
|
// shortname
|
|
|
|
if (state.configArg) {
|
|
|
|
if (/^[\w:\.\-]+$/.test(state.configArg)) {
|
|
|
|
state.configDir = defaultConfPath;
|
|
|
|
state.configFile = path.join(defaultConfPath, confpath + '.yml');
|
|
|
|
} else if (/[\/\\]$/.test(state.configArg)) {
|
|
|
|
state.configDir = state.configArg;
|
|
|
|
state.configFile = path.join(state.configDir, 'telebit.yml');
|
|
|
|
} else if (/[\/\\][^\.\/\\]\.[^\.\/\\]$/.test(state.configArg)) {
|
|
|
|
state.configDir = path.pathname(state.configArg);
|
|
|
|
state.configFile = state.configArg;
|
|
|
|
} else {
|
|
|
|
console.error();
|
|
|
|
console.error("Not a valid config path, file, or shortname: '%s'", state.configArg);
|
|
|
|
console.error();
|
|
|
|
console.error("Valid config options look like this:");
|
|
|
|
console.error(" Full path: ~/.config/telebit/telebit.yml (full path)");
|
|
|
|
console.error(" Directory: ~/.config/telebit/ (directory)");
|
|
|
|
console.error(" Shortname: lucky-duck (shortname)");
|
|
|
|
process.exit(37);
|
|
|
|
}
|
|
|
|
confpath = state.configFile;
|
|
|
|
}
|
2018-06-13 16:45:54 +00:00
|
|
|
}
|
|
|
|
argIndex = argv.indexOf('--tty');
|
|
|
|
if (-1 !== argIndex) {
|
|
|
|
useTty = argv.splice(argIndex, 1);
|
2018-06-11 20:52:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
function help() {
|
2018-09-23 05:35:13 +00:00
|
|
|
var keys = Object.keys(TPLS.help).filter(function (key) {
|
|
|
|
return 'remote' !== key;
|
2018-09-22 20:48:39 +00:00
|
|
|
});
|
|
|
|
var key = keys.filter(function (key) {
|
|
|
|
return -1 !== process.argv.indexOf(key);
|
2018-09-23 05:35:13 +00:00
|
|
|
})[0] || 'remote';
|
|
|
|
console.info(TPLS.help[key].replace(/{version}/g, pkg.version));
|
2018-06-11 20:52:01 +00:00
|
|
|
}
|
|
|
|
|
2018-06-14 08:42:41 +00:00
|
|
|
var verstr = [ pkg.name + ' remote v' + pkg.version ];
|
2018-06-13 16:45:54 +00:00
|
|
|
if (!confpath) {
|
2019-03-07 06:18:26 +00:00
|
|
|
state.configDir = defaultConfPath;
|
|
|
|
state.configFile = defaultConfFile;
|
|
|
|
confpath = state.configFile;
|
2018-09-11 08:03:50 +00:00
|
|
|
verstr.push('(--config \'' + confpath.replace(new RegExp('^' + os.homedir()), '~') + '\')');
|
2018-06-11 20:52:01 +00:00
|
|
|
}
|
|
|
|
|
2018-09-22 20:48:39 +00:00
|
|
|
if ([ '-h', '--help', 'help' ].some(function (arg) {
|
|
|
|
return -1 !== argv.indexOf(arg);
|
|
|
|
})) {
|
2018-06-11 20:52:01 +00:00
|
|
|
help();
|
|
|
|
process.exit(0);
|
|
|
|
}
|
|
|
|
if (!confpath || /^--/.test(confpath)) {
|
|
|
|
help();
|
|
|
|
process.exit(1);
|
|
|
|
}
|
|
|
|
|
2018-06-29 10:15:23 +00:00
|
|
|
function askForConfig(state, mainCb) {
|
2018-06-13 16:45:54 +00:00
|
|
|
var fs = require('fs');
|
2018-06-28 09:27:34 +00:00
|
|
|
var ttyname = '/dev/tty';
|
|
|
|
var stdin = useTty ? fs.createReadStream(ttyname, {
|
2018-06-28 09:31:31 +00:00
|
|
|
fd: fs.openSync(ttyname, fs.constants.O_RDONLY | fs.constants.O_NOCTTY)
|
2018-06-27 01:11:46 +00:00
|
|
|
}) : process.stdin;
|
2018-06-12 10:36:37 +00:00
|
|
|
var readline = require('readline');
|
|
|
|
var rl = readline.createInterface({
|
2018-06-13 16:45:54 +00:00
|
|
|
input: stdin
|
|
|
|
, output: process.stdout
|
2018-07-12 00:11:37 +00:00
|
|
|
// https://github.com/nodejs/node/issues/21771
|
2018-06-13 18:54:27 +00:00
|
|
|
// https://github.com/nodejs/node/issues/21319
|
2018-07-12 00:11:37 +00:00
|
|
|
, terminal: !/^win/i.test(os.platform()) && !useTty
|
2018-06-12 10:36:37 +00:00
|
|
|
});
|
2018-06-29 10:15:23 +00:00
|
|
|
state._useTty = useTty;
|
2018-06-12 10:36:37 +00:00
|
|
|
|
|
|
|
// NOTE: Use of setTimeout
|
|
|
|
// We're using setTimeout just to make the user experience a little
|
|
|
|
// nicer, as if we're doing something inbetween steps, so that it
|
|
|
|
// is a smooth rather than jerky experience.
|
|
|
|
// >= 300ms is long enough to become distracted and change focus (a full blink, time for an idea to form as a thought)
|
|
|
|
// <= 100ms is shorter than normal human reaction time (ability to place events chronologically, which happened first)
|
|
|
|
// ~ 150-250ms is the sweet spot for most humans (long enough to notice change and not be jarred, but stay on task)
|
|
|
|
var firstSet = [
|
|
|
|
function askEmail(cb) {
|
2018-06-29 10:15:23 +00:00
|
|
|
if (state.config.email) { cb(); return; }
|
2018-10-18 02:46:56 +00:00
|
|
|
console.info(TPLS.remote.setup.email);
|
2018-06-12 10:36:37 +00:00
|
|
|
// TODO attempt to read email from npmrc or the like?
|
|
|
|
rl.question('email: ', function (email) {
|
2018-06-13 17:18:54 +00:00
|
|
|
email = /@/.test(email) && email.trim();
|
2018-06-12 10:36:37 +00:00
|
|
|
if (!email) { askEmail(cb); return; }
|
2018-06-29 10:15:23 +00:00
|
|
|
state.config.email = email.trim();
|
|
|
|
state.config.agreeTos = true;
|
2018-06-12 10:36:37 +00:00
|
|
|
console.info("");
|
|
|
|
setTimeout(cb, 250);
|
|
|
|
});
|
|
|
|
}
|
2018-06-15 22:45:42 +00:00
|
|
|
, function askRelay(cb) {
|
2018-06-23 22:02:08 +00:00
|
|
|
function checkRelay(relay) {
|
2018-06-15 22:45:42 +00:00
|
|
|
// TODO parse and check https://{{relay}}/.well-known/telebit.cloud/directives.json
|
|
|
|
if (!relay) { relay = 'telebit.cloud'; }
|
2018-06-16 01:47:32 +00:00
|
|
|
relay = relay.trim();
|
|
|
|
var urlstr = common.parseUrl(relay) + common.apiDirectory;
|
2018-06-21 06:10:49 +00:00
|
|
|
urequest({ url: urlstr, json: true }, function (err, resp, body) {
|
2018-06-16 01:11:02 +00:00
|
|
|
if (err) {
|
|
|
|
console.error("[Network Error] Failed to retrieve '" + urlstr + "'");
|
2018-06-16 01:47:32 +00:00
|
|
|
console.error(err);
|
2018-06-16 01:11:02 +00:00
|
|
|
askRelay(cb);
|
|
|
|
return;
|
|
|
|
}
|
2018-06-21 18:56:36 +00:00
|
|
|
if (200 !== resp.statusCode || (Buffer.isBuffer(body) || 'object' !== typeof body) || !body.api_host) {
|
2018-10-18 07:11:54 +00:00
|
|
|
console.warn(TPLS.remote.setup.fail_relay_check
|
|
|
|
.replace(/{{\s*status_code\s*}}/, resp.statusCode)
|
|
|
|
.replace(/{{\s*url\s*}}/, urlstr)
|
|
|
|
);
|
2018-06-21 18:56:36 +00:00
|
|
|
console.warn(body);
|
|
|
|
} else if (body && body.pair_request) {
|
2018-06-29 10:15:23 +00:00
|
|
|
state._can_pair = true;
|
2018-06-16 01:11:02 +00:00
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
state.config.relay = relay;
|
2018-06-16 01:11:02 +00:00
|
|
|
cb();
|
2018-06-15 22:45:42 +00:00
|
|
|
});
|
2018-06-23 22:02:08 +00:00
|
|
|
}
|
|
|
|
|
2018-08-08 08:31:36 +00:00
|
|
|
if (state.config.relay) { checkRelay(state.config.relay); return; }
|
2018-06-23 22:02:08 +00:00
|
|
|
console.info("");
|
|
|
|
console.info("");
|
|
|
|
console.info("What relay will you be using? (press enter for default)");
|
|
|
|
console.info("");
|
|
|
|
rl.question('relay [default: telebit.cloud]: ', checkRelay);
|
|
|
|
}
|
|
|
|
, function checkRelay(cb) {
|
2018-06-24 06:34:24 +00:00
|
|
|
nextSet = [];
|
2018-06-29 10:15:23 +00:00
|
|
|
if ('telebit.cloud' !== state.config.relay) {
|
2018-06-24 06:34:24 +00:00
|
|
|
nextSet = nextSet.concat(standardSet);
|
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
if (!state._can_pair) {
|
2018-06-24 06:34:24 +00:00
|
|
|
nextSet = nextSet.concat(fossSet);
|
2018-06-23 22:02:08 +00:00
|
|
|
}
|
|
|
|
cb();
|
2018-06-15 22:45:42 +00:00
|
|
|
}
|
2018-06-23 22:02:08 +00:00
|
|
|
];
|
|
|
|
var standardSet = [
|
2018-10-18 07:11:54 +00:00
|
|
|
// There are questions that we need to ask in the CLI
|
2018-06-23 22:02:08 +00:00
|
|
|
// if we can't guarantee that they are being asked in the web interface
|
|
|
|
function askAgree(cb) {
|
2018-06-29 10:15:23 +00:00
|
|
|
if (state.config.agreeTos) { cb(); return; }
|
2018-06-12 10:36:37 +00:00
|
|
|
console.info("");
|
|
|
|
console.info("");
|
|
|
|
console.info("Do you accept the terms of service for each and all of the following?");
|
|
|
|
console.info("");
|
|
|
|
console.info("\tTelebit - End-to-End Encrypted Relay");
|
|
|
|
console.info("\tGreenlock - Automated HTTPS");
|
|
|
|
console.info("\tLet's Encrypt - TLS Certificates");
|
|
|
|
console.info("");
|
|
|
|
console.info("Type 'y' or 'yes' to accept these Terms of Service.");
|
|
|
|
console.info("");
|
|
|
|
rl.question('agree to all? [y/N]: ', function (resp) {
|
|
|
|
resp = resp.trim();
|
|
|
|
if (!/^y(es)?$/i.test(resp) && 'true' !== resp) {
|
|
|
|
throw new Error("You didn't accept the Terms of Service... not sure what to do...");
|
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
state.config.agreeTos = true;
|
2018-06-12 10:36:37 +00:00
|
|
|
console.info("");
|
|
|
|
setTimeout(cb, 250);
|
|
|
|
});
|
|
|
|
}
|
2018-06-23 22:02:08 +00:00
|
|
|
, function askUpdates(cb) {
|
|
|
|
// required means transactional, security alerts, mandatory updates
|
2018-06-13 17:18:54 +00:00
|
|
|
var options = [ 'newsletter', 'important', 'required' ];
|
2018-06-29 10:15:23 +00:00
|
|
|
if (-1 !== options.indexOf(state._updates)) { cb(); return; }
|
2018-06-13 17:18:54 +00:00
|
|
|
console.info("");
|
|
|
|
console.info("");
|
|
|
|
console.info("What updates would you like to receive? (" + options.join(',') + ")");
|
|
|
|
console.info("");
|
2018-06-21 11:01:16 +00:00
|
|
|
rl.question('messages (default: important): ', function (updates) {
|
2018-06-29 10:15:23 +00:00
|
|
|
state._updates = (updates || '').trim().toLowerCase();
|
|
|
|
if (!state._updates) { state._updates = 'important'; }
|
|
|
|
if (-1 === options.indexOf(state._updates)) { askUpdates(cb); return; }
|
|
|
|
|
|
|
|
if ('newsletter' === state._updates) {
|
|
|
|
state.config.newsletter = true;
|
|
|
|
state.config.communityMember = true;
|
|
|
|
} else if ('important' === state._updates) {
|
|
|
|
state.config.communityMember = true;
|
2018-06-13 17:18:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
setTimeout(cb, 250);
|
|
|
|
});
|
|
|
|
}
|
2018-06-12 10:36:37 +00:00
|
|
|
, function askTelemetry(cb) {
|
2018-06-29 10:15:23 +00:00
|
|
|
if (state.config.telemetry) { cb(); return; }
|
2018-06-12 10:36:37 +00:00
|
|
|
console.info("");
|
|
|
|
console.info("");
|
|
|
|
console.info("Contribute project telemetry data? (press enter for default [yes])");
|
|
|
|
console.info("");
|
|
|
|
rl.question('telemetry [Y/n]: ', function (telemetry) {
|
|
|
|
if (!telemetry || /^y(es)?$/i.test(telemetry)) {
|
2018-06-29 10:15:23 +00:00
|
|
|
state.config.telemetry = true;
|
2018-06-12 10:36:37 +00:00
|
|
|
}
|
|
|
|
setTimeout(cb, 250);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
];
|
2018-06-23 22:02:08 +00:00
|
|
|
var fossSet = [
|
2018-06-12 10:36:37 +00:00
|
|
|
function askTokenOrSecret(cb) {
|
2018-06-29 10:15:23 +00:00
|
|
|
if (state._can_pair || state.token || state.config.token
|
|
|
|
|| state.secret || state.config.secret) { cb(); return; }
|
2018-06-12 10:36:37 +00:00
|
|
|
console.info("");
|
|
|
|
console.info("");
|
2018-06-29 10:15:23 +00:00
|
|
|
console.info("What's your authorization for '" + state.config.relay + "'?");
|
2018-06-12 10:36:37 +00:00
|
|
|
console.info("");
|
|
|
|
// TODO check .well-known to learn supported token types
|
|
|
|
console.info("Currently supported:");
|
|
|
|
console.info("");
|
|
|
|
console.info("\tToken (JWT format)");
|
|
|
|
console.info("\tShared Secret (HMAC hex)");
|
|
|
|
//console.info("\tPrivate key (hex)");
|
|
|
|
console.info("");
|
|
|
|
rl.question('auth: ', function (resp) {
|
|
|
|
resp = (resp || '').trim();
|
|
|
|
try {
|
2019-02-28 08:42:56 +00:00
|
|
|
JWT.decode(resp);
|
2018-06-29 20:51:56 +00:00
|
|
|
state.config.token = resp;
|
2018-06-12 10:36:37 +00:00
|
|
|
} catch(e) {
|
2018-06-21 19:24:09 +00:00
|
|
|
// is not jwt
|
2018-06-12 10:36:37 +00:00
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
if (!state.config.token) {
|
2018-06-12 10:36:37 +00:00
|
|
|
resp = resp.toLowerCase();
|
|
|
|
if (resp === Buffer.from(resp, 'hex').toString('hex')) {
|
2018-06-29 10:15:23 +00:00
|
|
|
state.config.secret = resp;
|
2018-06-12 10:36:37 +00:00
|
|
|
}
|
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
if (!state.config.token && !state.config.secret) {
|
2018-06-12 10:36:37 +00:00
|
|
|
askTokenOrSecret(cb);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
setTimeout(cb, 250);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
, function askServernames(cb) {
|
2018-06-29 10:15:23 +00:00
|
|
|
if (!state.config.secret || state.config._servernames) { cb(); return; }
|
2018-06-12 10:36:37 +00:00
|
|
|
console.info("");
|
|
|
|
console.info("");
|
|
|
|
console.info("What servername(s) will you be relaying here?");
|
|
|
|
console.info("(use a comma-separated list such as example.com,example.net)");
|
|
|
|
console.info("");
|
|
|
|
rl.question('domain(s): ', function (resp) {
|
|
|
|
resp = (resp || '').trim().split(/,/g);
|
|
|
|
if (!resp.length) { askServernames(); return; }
|
|
|
|
// TODO validate the domains
|
2018-06-29 10:15:23 +00:00
|
|
|
state.config._servernames = resp;
|
2018-06-12 10:36:37 +00:00
|
|
|
setTimeout(cb, 250);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
, function askPorts(cb) {
|
2018-06-29 10:15:23 +00:00
|
|
|
if (!state.config.secret || state.config._ports) { cb(); return; }
|
2018-06-12 10:36:37 +00:00
|
|
|
console.info("");
|
|
|
|
console.info("");
|
|
|
|
console.info("What tcp port(s) will you be relaying here?");
|
|
|
|
console.info("(use a comma-separated list such as 2222,5050)");
|
|
|
|
console.info("");
|
|
|
|
rl.question('port(s) [default:none]: ', function (resp) {
|
|
|
|
resp = (resp || '').trim().split(/,/g);
|
|
|
|
if (!resp.length) { askPorts(); return; }
|
|
|
|
// TODO validate the domains
|
2018-06-29 10:15:23 +00:00
|
|
|
state.config._ports = resp;
|
2018-06-12 10:36:37 +00:00
|
|
|
setTimeout(cb, 250);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
];
|
|
|
|
var nextSet = firstSet;
|
|
|
|
|
|
|
|
function next() {
|
|
|
|
var q = nextSet.shift();
|
2018-06-13 17:18:54 +00:00
|
|
|
if (!q) {
|
2018-06-13 18:54:27 +00:00
|
|
|
// https://github.com/nodejs/node/issues/21319
|
2018-06-29 02:35:58 +00:00
|
|
|
if (useTty) { try { stdin.push(null); } catch(e) { /*ignore*/ } }
|
2018-06-13 19:38:59 +00:00
|
|
|
rl.close();
|
2018-06-24 08:53:29 +00:00
|
|
|
if (useTty) { try { stdin.close(); } catch(e) { /*ignore*/ } }
|
2018-06-29 10:15:23 +00:00
|
|
|
mainCb(null, state);
|
2018-06-13 17:18:54 +00:00
|
|
|
return;
|
|
|
|
}
|
2018-06-12 10:36:37 +00:00
|
|
|
q(next);
|
|
|
|
}
|
|
|
|
|
|
|
|
next();
|
2018-06-11 20:52:01 +00:00
|
|
|
}
|
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
var RC;
|
2018-06-28 03:35:14 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
function parseConfig(err, text) {
|
2019-03-28 09:23:53 +00:00
|
|
|
function handleConfig(config) {
|
2018-09-25 06:45:32 +00:00
|
|
|
state.config = config;
|
|
|
|
var verstrd = [ pkg.name + ' daemon v' + state.config.version ];
|
|
|
|
if (state.config.version && state.config.version !== pkg.version) {
|
|
|
|
console.info(verstr.join(' '), verstrd.join(' '));
|
|
|
|
} else {
|
|
|
|
console.info(verstr.join(' '));
|
|
|
|
}
|
2018-06-28 03:35:14 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
//
|
|
|
|
// check for init first, before anything else
|
|
|
|
// because it has arguments that may help in
|
|
|
|
// the next steps
|
|
|
|
//
|
|
|
|
if (-1 !== argv.indexOf('init')) {
|
|
|
|
parsers.init(argv, function (err) {
|
|
|
|
if (err) {
|
|
|
|
console.error("Error while initializing config [init]:");
|
|
|
|
throw err;
|
2018-06-21 11:01:16 +00:00
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
getToken(function (err) {
|
|
|
|
if (err) {
|
|
|
|
console.error("Error while getting token [init]:");
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
parseCli(state);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
return;
|
|
|
|
}
|
2018-06-21 11:01:16 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
if (!state.config.relay || !state.config.token) {
|
|
|
|
if (!state.config.relay) {
|
2019-05-12 05:40:22 +00:00
|
|
|
try {
|
|
|
|
state.config.relay = 'telebit.cloud';
|
|
|
|
} catch(e) {
|
|
|
|
console.error(state.config);
|
|
|
|
throw e;
|
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
}
|
2018-06-13 19:12:38 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
//console.log("question the user?", Date.now());
|
|
|
|
askForConfig(state, function (err, state) {
|
|
|
|
// no errors actually get passed, so this is just future-proofing
|
|
|
|
if (err) { throw err; }
|
2018-06-13 19:12:38 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
if (!state.config.token && state._can_pair) {
|
|
|
|
state.config._otp = common.otp();
|
2018-06-13 19:12:38 +00:00
|
|
|
}
|
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
//console.log("done questioning:", Date.now());
|
|
|
|
if (!state.token && !state.config.token) {
|
|
|
|
if (err) {
|
|
|
|
console.error("Error while initializing config [init]:");
|
|
|
|
throw err;
|
2018-07-01 01:34:15 +00:00
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
getToken(function (err) {
|
|
|
|
if (err) {
|
|
|
|
console.error("Error while getting token [init]:");
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
parseCli(state);
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
parseCli(state);
|
2018-06-11 20:52:01 +00:00
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
});
|
2018-06-29 20:51:56 +00:00
|
|
|
return;
|
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
//console.log("no questioning:");
|
|
|
|
parseCli(state);
|
2018-06-23 22:02:08 +00:00
|
|
|
}
|
2018-09-25 07:14:54 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
function parseCli(/*state*/) {
|
|
|
|
var special = [
|
|
|
|
'false', 'none', 'off', 'disable'
|
|
|
|
, 'true', 'auto', 'on', 'enable'
|
|
|
|
];
|
|
|
|
if (-1 !== argv.indexOf('init')) {
|
|
|
|
RC.request({ service: 'list', method: 'POST', data: [] }, handleRemoteRequest('list'));
|
2018-06-29 10:15:23 +00:00
|
|
|
return;
|
|
|
|
}
|
2018-06-23 22:02:08 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
if ([ 'ssh', 'http', 'tcp' ].some(function (key) {
|
|
|
|
if (key !== argv[0]) {
|
|
|
|
return false;
|
2018-06-29 10:15:23 +00:00
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
if (argv[1]) {
|
|
|
|
if (String(argv[1]) === String(parseInt(argv[1], 10))) {
|
|
|
|
// looks like a port
|
|
|
|
argv[1] = parseInt(argv[1], 10);
|
|
|
|
} else if (/\/|\\/.test(argv[1])) {
|
|
|
|
// looks like a path
|
|
|
|
argv[1] = path.resolve(argv[1]);
|
|
|
|
// TODO make a default assignment here
|
|
|
|
} else if (-1 === special.indexOf(argv[1])) {
|
|
|
|
console.error("Not sure what you meant by '" + argv[1] + "'.");
|
|
|
|
console.error("Remember: paths should begin with ." + path.sep + ", like '." + path.sep + argv[1] + "'");
|
|
|
|
return true;
|
2018-06-29 10:15:23 +00:00
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
RC.request({ service: argv[0], method: 'POST', data: argv.slice(1) }, handleRemoteRequest(argv[0]));
|
|
|
|
return true;
|
2018-06-29 20:51:56 +00:00
|
|
|
}
|
2018-09-25 06:54:51 +00:00
|
|
|
help();
|
2018-09-25 06:45:32 +00:00
|
|
|
return true;
|
|
|
|
})) {
|
|
|
|
return;
|
2018-06-29 10:15:23 +00:00
|
|
|
}
|
2018-06-11 20:52:01 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
// Two styles:
|
|
|
|
// http 3000
|
|
|
|
// http modulename
|
|
|
|
function makeRpc(key) {
|
|
|
|
if (key !== argv[0]) {
|
|
|
|
return false;
|
2018-07-06 04:13:56 +00:00
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
RC.request({ service: argv[0], method: 'POST', data: argv.slice(1) }, handleRemoteRequest(argv[0]));
|
2018-06-11 20:52:01 +00:00
|
|
|
return true;
|
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
if ([ 'status', 'enable', 'disable', 'restart', 'list', 'save' ].some(makeRpc)) {
|
|
|
|
return;
|
2018-06-29 10:15:23 +00:00
|
|
|
}
|
2018-06-23 22:02:08 +00:00
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
help();
|
|
|
|
process.exit(11);
|
2018-06-23 22:02:08 +00:00
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
try {
|
|
|
|
state._clientConfig = JSON.parse(text || '{}');
|
|
|
|
} catch(e1) {
|
|
|
|
try {
|
|
|
|
state._clientConfig = YAML.safeLoad(text || '{}');
|
|
|
|
} catch(e2) {
|
2018-09-11 08:03:50 +00:00
|
|
|
try {
|
|
|
|
state._clientConfig = TOML.parse(text || '');
|
|
|
|
} catch(e3) {
|
|
|
|
console.error(e1.message);
|
|
|
|
console.error(e2.message);
|
|
|
|
process.exit(1);
|
|
|
|
return;
|
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
}
|
2018-06-23 22:02:08 +00:00
|
|
|
}
|
|
|
|
|
2018-06-29 10:15:23 +00:00
|
|
|
state._clientConfig = camelCopy(state._clientConfig || {}) || {};
|
2018-09-25 07:14:54 +00:00
|
|
|
RC = require('../lib/rc/index.js').create(state);
|
2019-03-28 09:23:53 +00:00
|
|
|
RC.requestAsync = require('util').promisify(RC.request);
|
2018-06-29 10:15:23 +00:00
|
|
|
|
|
|
|
if (!Object.keys(state._clientConfig).length) {
|
|
|
|
console.info('(' + state._ipc.comment + ": " + state._ipc.path + ')');
|
|
|
|
console.info("");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err && 'ENOENT' === err.code) || !Object.keys(state._clientConfig).length) {
|
|
|
|
if (!err || 'ENOENT' === err.code) {
|
|
|
|
//console.warn("Empty config file. Run 'telebit init' to configure.\n");
|
|
|
|
} else {
|
|
|
|
console.warn("Couldn't load config:\n\n\t" + err.message + "\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-25 06:45:32 +00:00
|
|
|
function handleRemoteRequest(service, fn) {
|
|
|
|
return function (err, body) {
|
|
|
|
if ('function' === typeof fn) {
|
|
|
|
fn(err, body); // XXX was resp
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
console.info("");
|
|
|
|
if (err) {
|
|
|
|
console.warn("'" + service + "' may have failed."
|
|
|
|
+ " Consider peaking at the logs either with 'journalctl -xeu telebit' or /opt/telebit/var/log/error.log");
|
|
|
|
console.warn(err.statusCode, err.message);
|
|
|
|
//cb(new Error("not okay"), body);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!body) {
|
|
|
|
console.info("👌");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
body = JSON.parse(body);
|
|
|
|
} catch(e) {
|
|
|
|
// ignore
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if ("AWAIT_AUTH" === body.code) {
|
|
|
|
console.info(body.message);
|
|
|
|
} else if ("CONFIG" === body.code) {
|
|
|
|
delete body.code;
|
|
|
|
//console.info(TOML.stringify(body));
|
|
|
|
console.info(YAML.safeDump(body));
|
|
|
|
} else {
|
|
|
|
if ('http' === body.module) {
|
|
|
|
// TODO we'll support slingshot-ing in the future
|
2018-09-25 08:18:38 +00:00
|
|
|
if (body.local) {
|
|
|
|
if (String(body.local) === String(parseInt(body.local, 10))) {
|
|
|
|
console.info('> Forwarding https://' + body.remote + ' => localhost:' + body.local);
|
|
|
|
} else {
|
|
|
|
console.info('> Serving ' + body.local + ' as https://' + body.remote);
|
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
} else {
|
2018-09-25 08:18:38 +00:00
|
|
|
console.info('> Rejecting End-to-End Encrypted HTTPS for now');
|
2018-09-25 06:45:32 +00:00
|
|
|
}
|
|
|
|
} else if ('tcp' === body.module) {
|
2018-09-25 08:18:38 +00:00
|
|
|
if (body.local) {
|
2018-09-25 06:45:32 +00:00
|
|
|
console.info('> Forwarding ' + state.config.relay + ':' + body.remote + ' => localhost:' + body.local);
|
2018-09-25 08:18:38 +00:00
|
|
|
} else {
|
|
|
|
console.info('> Rejecting Legacy TCP');
|
|
|
|
}
|
2018-09-25 06:45:32 +00:00
|
|
|
} else if ('ssh' === body.module) {
|
2018-09-25 08:18:38 +00:00
|
|
|
//console.info('> Forwarding ' + state.config.relay + ' -p ' + JSON.stringify(body) + ' => localhost:' + body.local);
|
|
|
|
if (body.local) {
|
2018-09-25 06:45:32 +00:00
|
|
|
console.info('> Forwarding ssh+https (openssl proxy) => localhost:' + body.local);
|
2018-09-25 08:18:38 +00:00
|
|
|
} else {
|
|
|
|
console.info('> Rejecting SSH-over-HTTPS for now');
|
|
|
|
}
|
2018-10-16 03:48:28 +00:00
|
|
|
} else if ('status' === body.module) {
|
|
|
|
// TODO funny one this one
|
2018-10-16 04:17:10 +00:00
|
|
|
if (body.port) {
|
|
|
|
console.info('http://localhost:' + (body.port));
|
|
|
|
}
|
2018-10-16 03:48:28 +00:00
|
|
|
console.info(JSON.stringify(body, null, 2));
|
2018-09-25 06:45:32 +00:00
|
|
|
} else {
|
|
|
|
console.info(JSON.stringify(body, null, 2));
|
|
|
|
}
|
|
|
|
console.info();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
function getToken(fn) {
|
|
|
|
state.relay = state.config.relay;
|
|
|
|
|
|
|
|
// { _otp, config: {} }
|
|
|
|
common.api.token(state, {
|
|
|
|
error: function (err/*, next*/) {
|
|
|
|
console.error("[Error] common.api.token:");
|
|
|
|
console.error(err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
, directory: function (dir, next) {
|
|
|
|
//console.log('[directory] Telebit Relay Discovered:');
|
|
|
|
//console.log(dir);
|
|
|
|
state._apiDirectory = dir;
|
|
|
|
next();
|
|
|
|
}
|
|
|
|
, tunnelUrl: function (tunnelUrl, next) {
|
|
|
|
//console.log('[tunnelUrl] Telebit Relay Tunnel Socket:', tunnelUrl);
|
|
|
|
state.wss = tunnelUrl;
|
|
|
|
next();
|
|
|
|
}
|
|
|
|
, requested: function (authReq, next) {
|
|
|
|
//console.log("[requested] Pairing Requested");
|
|
|
|
state.config._otp = state.config._otp = authReq.otp;
|
|
|
|
|
|
|
|
if (!state.config.token && state._can_pair) {
|
|
|
|
console.info(TPLS.remote.code.replace(/0000/g, state.config._otp));
|
|
|
|
}
|
|
|
|
|
|
|
|
next();
|
|
|
|
}
|
|
|
|
, connect: function (pretoken, next) {
|
|
|
|
//console.log("[connect] Enabling Pairing Locally...");
|
|
|
|
state.config.pretoken = pretoken;
|
|
|
|
state._connecting = true;
|
|
|
|
|
|
|
|
// TODO use php-style object querification
|
|
|
|
RC.request({ service: 'config', method: 'POST', data: state.config }, handleRemoteRequest('config', function (err/*, body*/) {
|
|
|
|
if (err) {
|
|
|
|
state._error = err;
|
|
|
|
console.error("Error while initializing config [connect]:");
|
|
|
|
console.error(err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
console.info("waiting...");
|
|
|
|
next();
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
, offer: function (token, next) {
|
|
|
|
//console.log("[offer] Pairing Enabled by Relay");
|
|
|
|
state.config.token = token;
|
|
|
|
if (state._error) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
state._connecting = true;
|
|
|
|
try {
|
2019-02-28 08:42:56 +00:00
|
|
|
JWT.decode(token);
|
|
|
|
//console.log(JWT.decode(token));
|
2018-09-25 06:45:32 +00:00
|
|
|
} catch(e) {
|
|
|
|
console.warn("[warning] could not decode token");
|
|
|
|
}
|
|
|
|
RC.request({ service: 'config', method: 'POST', data: state.config }, handleRemoteRequest('config', function (err/*, body*/) {
|
|
|
|
if (err) {
|
|
|
|
state._error = err;
|
|
|
|
console.error("Error while initializing config [offer]:");
|
|
|
|
console.error(err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
//console.log("Pairing Enabled Locally");
|
|
|
|
next();
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
, granted: function (_, next) {
|
|
|
|
//console.log("[grant] Pairing complete!");
|
|
|
|
next();
|
|
|
|
}
|
|
|
|
, end: function () {
|
|
|
|
RC.request({ service: 'enable', method: 'POST', data: [] }, handleRemoteRequest('enable', function (err) {
|
|
|
|
if (err) { console.error(err); return; }
|
|
|
|
console.info("Success");
|
|
|
|
|
|
|
|
// workaround for https://github.com/nodejs/node/issues/21319
|
|
|
|
if (state._useTty) {
|
|
|
|
setTimeout(function () {
|
|
|
|
console.info("Some fun things to try first:\n");
|
|
|
|
console.info(" ~/telebit http ~/public");
|
|
|
|
console.info(" ~/telebit tcp 5050");
|
|
|
|
console.info(" ~/telebit ssh auto");
|
|
|
|
console.info();
|
|
|
|
console.info("Press any key to continue...");
|
|
|
|
console.info();
|
|
|
|
process.exit(0);
|
|
|
|
}, 0.5 * 1000);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
// end workaround
|
|
|
|
|
|
|
|
//parseCli(state);
|
|
|
|
fn();
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2019-03-28 09:23:53 +00:00
|
|
|
var bootState = {};
|
|
|
|
function bootstrap() {
|
|
|
|
// Create / retrieve account (sign-in, more or less)
|
|
|
|
// TODO hit directory resource /.well-known/openid-configuration -> acme_uri (?)
|
|
|
|
// Occassionally rotate the key just for the sake of testing the key rotation
|
2019-05-11 07:50:18 +00:00
|
|
|
return urequestAsync({
|
|
|
|
method: 'HEAD'
|
|
|
|
, url: RC.resolve('/acme/new-nonce')
|
|
|
|
, headers: { "User-Agent": 'Telebit/' + pkg.version }
|
|
|
|
}).then(function (resp) {
|
2019-03-28 09:23:53 +00:00
|
|
|
var nonce = resp.headers['replay-nonce'];
|
|
|
|
var newAccountUrl = RC.resolve('/acme/new-acct');
|
|
|
|
return keypairs.signJws({
|
|
|
|
jwk: state.key
|
|
|
|
, protected: {
|
|
|
|
// alg will be filled out automatically
|
|
|
|
jwk: state.pub
|
2019-05-11 20:34:55 +00:00
|
|
|
, kid: false
|
2019-03-28 09:23:53 +00:00
|
|
|
, nonce: nonce
|
|
|
|
, url: newAccountUrl
|
|
|
|
}
|
|
|
|
, payload: JSON.stringify({
|
|
|
|
// We can auto-agree here because the client is the user agent of the primary user
|
|
|
|
termsOfServiceAgreed: true
|
|
|
|
, contact: [] // I don't think we have email yet...
|
|
|
|
//, externalAccountBinding: null
|
|
|
|
})
|
|
|
|
}).then(function (jws) {
|
|
|
|
return urequestAsync({
|
|
|
|
url: newAccountUrl
|
|
|
|
, method: 'POST'
|
|
|
|
, json: jws // TODO default to post when body is present
|
2019-05-11 07:50:18 +00:00
|
|
|
, headers: {
|
|
|
|
"Content-Type": 'application/jose+json'
|
|
|
|
, "User-Agent": 'Telebit/' + pkg.version
|
|
|
|
}
|
2019-03-28 09:23:53 +00:00
|
|
|
}).then(function (resp) {
|
|
|
|
//nonce = resp.headers['replay-nonce'];
|
|
|
|
if (!resp.body || 'valid' !== resp.body.status) {
|
2019-05-11 22:53:24 +00:00
|
|
|
console.error('request jws:', jws);
|
|
|
|
console.error('response:');
|
|
|
|
console.error(resp.headers);
|
|
|
|
console.error(resp.body);
|
2019-03-28 09:23:53 +00:00
|
|
|
throw new Error("did not successfully create or restore account");
|
|
|
|
}
|
|
|
|
return RC.requestAsync({ service: 'config', method: 'GET' }).catch(function (err) {
|
|
|
|
if (err) {
|
|
|
|
if ('ENOENT' === err.code || 'ECONNREFUSED' === err.code) {
|
|
|
|
console.error("Either the telebit service was not already (and could not be started) or its socket could not be written to.");
|
|
|
|
console.error(err);
|
|
|
|
} else if ('ENOTSOCK' === err.code) {
|
|
|
|
console.error(err);
|
|
|
|
return;
|
|
|
|
} else {
|
|
|
|
console.error(err);
|
|
|
|
}
|
|
|
|
process.exit(101);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}).then(handleConfig);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}).catch(RC.createErrorHandler(bootstrap, bootState, function (err) {
|
|
|
|
console.error(err);
|
|
|
|
process.exit(17);
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
|
|
|
bootstrap();
|
2018-06-23 22:02:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var parsers = {
|
2018-06-29 10:15:23 +00:00
|
|
|
init: function (argv, parseCb) {
|
2018-06-12 10:36:37 +00:00
|
|
|
var answers = {};
|
2018-06-29 10:15:23 +00:00
|
|
|
var boolish = [ '--advanced' ];
|
2018-06-12 10:36:37 +00:00
|
|
|
if ('init' !== argv[0]) {
|
|
|
|
throw new Error("init must be the first argument");
|
|
|
|
}
|
|
|
|
argv.shift();
|
2018-06-23 22:02:08 +00:00
|
|
|
|
2018-06-29 10:15:23 +00:00
|
|
|
// init --foo bar
|
|
|
|
argv.forEach(function (arg, i) {
|
|
|
|
if (!/^--/.test(arg)) { return; }
|
|
|
|
if (-1 !== boolish.indexOf(arg)) {
|
|
|
|
answers['_' + arg.replace(/^--/, '')] = true;
|
|
|
|
}
|
|
|
|
if (/^-/.test(argv[i + 1])) {
|
|
|
|
throw new Error(argv[i + 1] + ' requires an argument');
|
|
|
|
}
|
|
|
|
answers[arg] = argv[i + 1];
|
|
|
|
});
|
|
|
|
|
|
|
|
// init foo:bar
|
|
|
|
argv.forEach(function (arg) {
|
|
|
|
if (/^--/.test(arg)) { return; }
|
|
|
|
var parts = arg.split(/:/g);
|
|
|
|
if (2 !== parts.length) {
|
|
|
|
throw new Error("bad option to init: '" + arg + "'");
|
|
|
|
}
|
|
|
|
if (answers[parts[0]]) {
|
|
|
|
throw new Error("duplicate key to init '" + parts[0] + "'");
|
|
|
|
}
|
|
|
|
answers[parts[0]] = parts[1];
|
|
|
|
});
|
2018-06-23 22:02:08 +00:00
|
|
|
|
2018-08-08 07:39:27 +00:00
|
|
|
if (answers.relay) {
|
|
|
|
console.info("using --relay " + answers.relay);
|
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
// things that aren't straight-forward copy-over
|
|
|
|
if (!answers.advanced && !answers.relay) {
|
|
|
|
answers.relay = 'telebit.cloud';
|
|
|
|
}
|
|
|
|
if (Array.isArray(common._NOTIFICATIONS[answers.update])) {
|
|
|
|
common._NOTIFICATIONS[answers.update].forEach(function (name) {
|
|
|
|
state.config[name] = true;
|
2018-06-28 03:35:14 +00:00
|
|
|
});
|
2018-06-29 10:15:23 +00:00
|
|
|
}
|
|
|
|
if (answers.servernames) {
|
|
|
|
state.config._servernames = answers.servernames;
|
|
|
|
}
|
|
|
|
if (answers.ports) {
|
|
|
|
state.config._ports = answers.ports;
|
|
|
|
}
|
2018-06-28 03:35:14 +00:00
|
|
|
|
2018-06-29 10:15:23 +00:00
|
|
|
// things that are straight-forward copy-over
|
|
|
|
common.CONFIG_KEYS.forEach(function (key) {
|
|
|
|
if ('true' === answers[key]) { answers[key] = true; }
|
|
|
|
if ('false' === answers[key]) { answers[key] = false; }
|
|
|
|
if ('null' === answers[key]) { answers[key] = null; }
|
|
|
|
if ('undefined' === answers[key]) { delete answers[key]; }
|
|
|
|
if ('undefined' !== typeof answers[key]) {
|
|
|
|
state.config[key] = answers[key];
|
2018-06-21 19:24:09 +00:00
|
|
|
}
|
2018-06-29 10:15:23 +00:00
|
|
|
});
|
2018-06-21 11:01:16 +00:00
|
|
|
|
2018-06-29 10:15:23 +00:00
|
|
|
askForConfig(state, function (err, state) {
|
|
|
|
if (err) { parseCb(err); return; }
|
2018-06-28 03:35:14 +00:00
|
|
|
|
2018-06-29 10:15:23 +00:00
|
|
|
if (!state.config.token && state._can_pair) {
|
|
|
|
state.config._otp = common.otp();
|
|
|
|
}
|
2018-06-28 03:35:14 +00:00
|
|
|
|
2018-07-01 00:18:03 +00:00
|
|
|
argv.unshift('init');
|
2018-06-29 10:15:23 +00:00
|
|
|
parseCb(null, state);
|
2018-06-12 10:36:37 +00:00
|
|
|
});
|
|
|
|
}
|
2018-06-23 22:02:08 +00:00
|
|
|
};
|
2018-06-11 20:52:01 +00:00
|
|
|
|
2019-03-07 06:18:26 +00:00
|
|
|
var keystore = require('../lib/keystore.js').create(state);
|
|
|
|
state.keystore = keystore;
|
|
|
|
state.keystoreSecure = !keystore.insecure;
|
2019-03-09 12:05:37 +00:00
|
|
|
keystore.all().then(function (list) {
|
|
|
|
var keyext = '.key.jwk.json';
|
|
|
|
var key;
|
|
|
|
// TODO create map by account and index into that map to get the master key
|
|
|
|
// and sort keys in the process
|
|
|
|
list.some(function (el) {
|
|
|
|
if (keyext === el.account.slice(-keyext.length)
|
|
|
|
&& el.password.kty && el.password.kid) {
|
|
|
|
key = el.password;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
if (key) {
|
2019-03-07 06:28:28 +00:00
|
|
|
state.key = key;
|
2019-03-07 08:38:21 +00:00
|
|
|
state.pub = keypairs.neuter({ jwk: key });
|
2019-03-07 06:18:26 +00:00
|
|
|
fs.readFile(confpath, 'utf8', parseConfig);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-03-07 06:28:28 +00:00
|
|
|
return keypairs.generate().then(function (pair) {
|
|
|
|
var jwk = pair.private;
|
2019-03-09 12:05:37 +00:00
|
|
|
return keypairs.thumbprint({ jwk: jwk }).then(function (kid) {
|
2019-03-07 08:38:21 +00:00
|
|
|
jwk.kid = kid;
|
2019-03-09 12:05:37 +00:00
|
|
|
return keystore.set(kid + keyext, jwk).then(function () {
|
2019-03-07 06:28:28 +00:00
|
|
|
var size = (jwk.crv || Buffer.from(jwk.n, 'base64').byteLength * 8);
|
|
|
|
console.info("Generated new %s %s private key with thumbprint %s", jwk.kty, size, kid);
|
|
|
|
state.key = jwk;
|
|
|
|
fs.readFile(confpath, 'utf8', parseConfig);
|
|
|
|
});
|
2019-03-07 06:18:26 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
2018-06-11 20:52:01 +00:00
|
|
|
|
|
|
|
}());
|