diff --git a/cli.ts b/cli.ts index e4d35a6..4f08635 100644 --- a/cli.ts +++ b/cli.ts @@ -15,7 +15,8 @@ import logResponse from "./lib/util/log-response" import { getApiDefinitions } from "./lib/get-api-definitions" import commandLineUsage from "command-line-usage" import { ContextHelpers } from "./lib/types" -import { version } from './package.json'; +import { version } from "./package.json" +import open from "open" const sections = [ { @@ -69,7 +70,7 @@ async function cli(args: ParsedArgs) { console.log(usage) return } - + if ( !config.get(`${getServer()}.pat`) && args._[0] !== "login" && @@ -168,6 +169,30 @@ async function cli(args: ParsedArgs) { logResponse(response) + if (response.data.connect_webview) { + if ( + response.data && + response.data.connect_webview && + response.data.connect_webview.url + ) { + const url = response.data.connect_webview.url + + if (process.env.INSIDE_WEB_BROWSER !== "1") { + const { action } = await prompts({ + type: "confirm", + name: "action", + message: "Would you like to open the webview in your browser?", + }) + + if (action) { + await open(url) + } + } else { + //TODO: Figure out how to open the webview in the browser + } + } + } + if ("action_attempt" in response.data) { const { poll_for_action_attempt } = await prompts({ name: "poll_for_action_attempt", diff --git a/package-lock.json b/package-lock.json index dd7263e..f7dc723 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,15 +1,16 @@ { "name": "seam-cli", - "version": "0.0.26", + "version": "0.0.27", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "seam-cli", - "version": "0.0.26", + "version": "0.0.27", "dependencies": { "@seamapi/http": "^0.12.0", - "@seamapi/types": "^1.72.1", + "@seamapi/types": "^1.75.0", + "open": "^10.0.2", "swagger-parser": "^10.0.3" }, "bin": { @@ -790,9 +791,9 @@ } }, "node_modules/@seamapi/types": { - "version": "1.72.1", - "resolved": "https://registry.npmjs.org/@seamapi/types/-/types-1.72.1.tgz", - "integrity": "sha512-H74ck03A3sYNkFICTyhk8Ro+nzkKeAsrTvAlqWMHlErsf0l63TU0OfE/VHhxacC3PsUz6ex33VK1uBN/6cRRjQ==", + "version": "1.75.0", + "resolved": "https://registry.npmjs.org/@seamapi/types/-/types-1.75.0.tgz", + "integrity": "sha512-oIFgwjaYkO8vjQkw7CPGNGru6FN9zhCrmdrb7HiHLZ/ciYQyihbhQZcf0Pj/+NQn/PQjw8EWDFFU9PnXe4T0cA==", "engines": { "node": ">=18.12.0", "npm": ">= 9.0.0" @@ -1302,6 +1303,20 @@ "integrity": "sha512-GnElqUSGWvFP1Hxv2FdxLuCDzUcHZ1ac/QrOOpZ18r2RHig+S+JXIOT0YIvrHo4XwqLeurlB6CqYminiCxQIEw==", "dev": true }, + "node_modules/bundle-name": { + "version": "4.1.0", + "resolved": "https://registry.npmjs.org/bundle-name/-/bundle-name-4.1.0.tgz", + "integrity": "sha512-tjwM5exMg6BGRI+kNmTntNsvdZS1X8BFYS6tnJ2hdH0kVxM6/eVZ2xy+FqStSWvYmtfFMDLIxurorHwDKfDz5Q==", + "dependencies": { + "run-applescript": "^7.0.0" + }, + "engines": { + "node": ">=18" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, "node_modules/bundle-require": { "version": "4.0.2", "resolved": "https://registry.npmjs.org/bundle-require/-/bundle-require-4.0.2.tgz", @@ -1623,6 +1638,43 @@ "node": ">=4.0.0" } }, + "node_modules/default-browser": { + "version": "5.2.1", + "resolved": "https://registry.npmjs.org/default-browser/-/default-browser-5.2.1.tgz", + "integrity": "sha512-WY/3TUME0x3KPYdRRxEJJvXRHV4PyPoUsxtZa78lwItwRQRHhd2U9xOscaT/YTf8uCXIAjeJOFBVEh/7FtD8Xg==", + "dependencies": { + "bundle-name": "^4.1.0", + "default-browser-id": "^5.0.0" + }, + "engines": { + "node": ">=18" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/default-browser-id": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/default-browser-id/-/default-browser-id-5.0.0.tgz", + "integrity": "sha512-A6p/pu/6fyBcA1TRz/GqWYPViplrftcW2gZC9q79ngNCKAeR/X3gcEdXQHl4KNXV+3wgIJ1CPkJQ3IHM6lcsyA==", + "engines": { + "node": ">=18" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/define-lazy-prop": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/define-lazy-prop/-/define-lazy-prop-3.0.0.tgz", + "integrity": "sha512-N+MeXYoqr3pOgn8xfyRPREN7gHakLYjhsHhWGT3fWAiL4IkAt0iDw14QiiEm2bE30c5XX5q0FtAA3CK5f9/BUg==", + "engines": { + "node": ">=12" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, "node_modules/delayed-stream": { "version": "1.0.0", "resolved": "https://registry.npmjs.org/delayed-stream/-/delayed-stream-1.0.0.tgz", @@ -2159,6 +2211,20 @@ "url": "https://github.com/sponsors/ljharb" } }, + "node_modules/is-docker": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/is-docker/-/is-docker-3.0.0.tgz", + "integrity": "sha512-eljcgEDlEns/7AXFosB5K/2nCM4P7FQPkGc/DWLy5rmFEWvZayGrik1d9/QIY5nJ4f9YsVvBkA6kJpHn9rISdQ==", + "bin": { + "is-docker": "cli.js" + }, + "engines": { + "node": "^12.20.0 || ^14.13.1 || >=16.0.0" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, "node_modules/is-extglob": { "version": "2.1.1", "resolved": "https://registry.npmjs.org/is-extglob/-/is-extglob-2.1.1.tgz", @@ -2189,6 +2255,23 @@ "node": ">=0.10.0" } }, + "node_modules/is-inside-container": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/is-inside-container/-/is-inside-container-1.0.0.tgz", + "integrity": "sha512-KIYLCCJghfHZxqjYBE7rEy0OBuTd5xCHS7tHVgvCLkx7StIoaxwNW3hCALgEUjFfeRk+MG/Qxmp/vtETEF3tRA==", + "dependencies": { + "is-docker": "^3.0.0" + }, + "bin": { + "is-inside-container": "cli.js" + }, + "engines": { + "node": ">=14.16" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, "node_modules/is-number": { "version": "7.0.0", "resolved": "https://registry.npmjs.org/is-number/-/is-number-7.0.0.tgz", @@ -2236,6 +2319,20 @@ "integrity": "sha512-cyA56iCMHAh5CdzjJIa4aohJyeO1YbwLi3Jc35MmRU6poroFjIGZzUzupGiRPOjgHg9TLu43xbpwXk523fMxKA==", "dev": true }, + "node_modules/is-wsl": { + "version": "3.1.0", + "resolved": "https://registry.npmjs.org/is-wsl/-/is-wsl-3.1.0.tgz", + "integrity": "sha512-UcVfVfaK4Sc4m7X3dUSoHoozQGBEFeDC+zVo06t98xe8CzHSZZBekNXH+tu0NalHolcJ/QAGqS46Hef7QXBIMw==", + "dependencies": { + "is-inside-container": "^1.0.0" + }, + "engines": { + "node": ">=16" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, "node_modules/isarray": { "version": "1.0.0", "resolved": "https://registry.npmjs.org/isarray/-/isarray-1.0.0.tgz", @@ -2628,6 +2725,23 @@ "url": "https://github.com/sponsors/sindresorhus" } }, + "node_modules/open": { + "version": "10.0.2", + "resolved": "https://registry.npmjs.org/open/-/open-10.0.2.tgz", + "integrity": "sha512-GnYLdE+E3K8NeSE23N0g67/9q9AXRph5oTUbz6IbIgElPigEnQ2aHuqRge3y0JUr67qoc84xME5kF03fDc3fcA==", + "dependencies": { + "default-browser": "^5.2.1", + "define-lazy-prop": "^3.0.0", + "is-inside-container": "^1.0.0", + "is-wsl": "^3.1.0" + }, + "engines": { + "node": ">=18" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, "node_modules/openapi-types": { "version": "12.1.3", "resolved": "https://registry.npmjs.org/openapi-types/-/openapi-types-12.1.3.tgz", @@ -3064,6 +3178,17 @@ "fsevents": "~2.3.2" } }, + "node_modules/run-applescript": { + "version": "7.0.0", + "resolved": "https://registry.npmjs.org/run-applescript/-/run-applescript-7.0.0.tgz", + "integrity": "sha512-9by4Ij99JUr/MCFBUkDKLWK3G9HVXmabKz9U5MlIAIuvuzkiOicRYs8XJLxX+xahD+mLiiCYDqF9dKAgtzKP1A==", + "engines": { + "node": ">=18" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, "node_modules/run-parallel": { "version": "1.2.0", "resolved": "https://registry.npmjs.org/run-parallel/-/run-parallel-1.2.0.tgz", diff --git a/package.json b/package.json index 297400b..57412f4 100644 --- a/package.json +++ b/package.json @@ -2,7 +2,7 @@ "name": "seam-cli", "module": "index.ts", "type": "module", - "version": "0.0.26", + "version": "0.0.27", "repository": "git@github.com:seamapi/seam-cli.git", "scripts": { "cli": "tsx ./cli.ts", @@ -54,7 +54,8 @@ }, "dependencies": { "@seamapi/http": "^0.12.0", - "@seamapi/types": "^1.72.1", + "@seamapi/types": "^1.75.0", + "open": "^10.0.2", "swagger-parser": "^10.0.3" } } diff --git a/scripts/install.sh b/scripts/install.sh new file mode 100755 index 0000000..6bb3279 --- /dev/null +++ b/scripts/install.sh @@ -0,0 +1,445 @@ +#!/usr/bin/env sh + +set -e + +# error codes +# 1 general +# 2 insufficient perms + +DEBUG=0 +CLEAN_EXIT=0 +BINARY_INSTALLED_PATH="" + +tempdir="" +filename="" +sig_filename="" +key_filename="" + +cleanup() { + exit_code=$? + if [ "$exit_code" -ne 0 ] && [ "$CLEAN_EXIT" -ne 1 ]; then + log "$exit_code" + log "ERROR: script failed during execution" + + if [ "$DEBUG" -eq 0 ]; then + log "For more verbose output, re-run this script with the debug flag (./install.sh --debug)" + fi + fi + + if [ -n "$tempdir" ]; then + delete_tempdir + fi + + clean_exit "$exit_code" +} +trap cleanup EXIT +trap cleanup INT + +clean_exit() { + CLEAN_EXIT=1 + exit "$1" +} + +log() { + # print to stderr + >&2 echo "$1" +} + +log_debug() { + if [ "$DEBUG" -eq 1 ]; then + # print to stderr + >&2 echo "DEBUG: $1" + fi +} + +log_warning() { + # print to stderr + >&2 echo "WARNING: $1" +} + +delete_tempdir() { + # log_debug "Removing temp directory" + # rm -rf "$tempdir" + tempdir="" +} + +linux_shell() { + user="$(whoami)" + grep -E "^$user:" < /etc/passwd | cut -f 7 -d ":" | head -1 +} + +macos_shell() { + dscl . -read ~/ UserShell | sed 's/UserShell: //' +} + +# we currently only support Git Bash for Windows with this script +# so the shell will always be /usr/bin/bash +windows_shell() { + echo "/usr/bin/bash" +} + +# exit code +# 0=installed +# 1=path not writable +# 2=path not in PATH +# 3=path not a directory +# 4=path not found +install_binary() { + install_dir="$1" + # defaults to true + require_dir_in_path="$2" + # defaults to false + create_if_not_exist="$3" + + if [ "$require_dir_in_path" != "false" ] && ! is_dir_in_path "$install_dir"; then + return 2 + fi + + if [ "$create_if_not_exist" = "true" ] && [ ! -e "$install_dir" ]; then + log_debug "$install_dir is in PATH but doesn't exist" + log_debug "Creating $install_dir" + mkdir -m 755 "$install_dir" > /dev/null 2>&1 + fi + + if [ ! -e "$install_dir" ]; then + return 4 + fi + + if [ ! -d "$install_dir" ]; then + return 3 + fi + + if ! is_path_writable "$install_dir"; then + return 1 + fi + + log_debug "Moving binary to $install_dir" + mv -f "$filename" "$install_dir" + return 0 +} + +curl_download() { + url="$1" + output_file="$2" + component="$3" + + # allow curl to fail w/o exiting + set +e + headers=$(curl --tlsv1.2 --proto "=https" -w "%{http_code}" --silent --retry 5 -o "$output_file" -LN -D - "$url" 2>&1) + exit_code=$? + set -e + + status_code="$(echo "$headers" | tail -1)" + + if [ "$status_code" -ne 200 ]; then + log_debug "Request failed with http status $status_code" + log_debug "Response headers:" + log_debug "$headers" + fi + + if [ "$exit_code" -ne 0 ]; then + log "ERROR: curl failed with exit code $exit_code" + + if [ "$exit_code" -eq 60 ]; then + log "" + log "Ensure the ca-certificates package is installed for your distribution" + elif [ "$exit_code" -eq 35 ]; then + # A TLS/SSL connect error. The SSL handshake failed. The SSL handshake can fail due to numerous different reasons so the error message may offer some additional clues. Maybe the parties could not agree to a SSL/TLS version, an agreeable cipher suite or similar. + log "" + log "Failed to complete TLS handshake. Please ensure your system's TLS library is up-to-date (OpenSSL, GnuTLS, libressl, etc.)" + fi + clean_exit 1 + fi + + + # this could be >255, so print HTTP status code rather than using as return code + echo "$status_code" +} + +# note: wget does not retry on 5xx +wget_download() { + url="$1" + output_file="$2" + component="$3" + + security_flags="--secure-protocol=TLSv1_2 --https-only" + # determine if using BusyBox wget (bad) or GNU wget (good) + (wget --help 2>&1 | head -1 | grep -iv busybox > /dev/null 2>&1) || security_flags="" + # only print this warning once per script invocation + if [ -z "$security_flags" ] && [ "$component" = "Binary" ]; then + log_debug "Skipping additional security flags that are unsupported by BusyBox wget" + # log to stderr b/c this function's stdout is parsed + log_warning "This system's wget binary is provided by BusyBox. Doppler strongly suggests installing GNU wget, which provides additional security features." + fi + + # allow wget to fail w/o exiting + set +e + # we explicitly disable shellcheck here b/c security_flags isn't parsed properly when quoted + # shellcheck disable=SC2086 + headers=$(wget $security_flags -q -t 5 -S -O "$output_file" "$url" 2>&1) + exit_code=$? + set -e + + status_code="$(echo "$headers" | grep -o -E '^\s*HTTP/[0-9.]+ [0-9]{3}' | tail -1 | grep -o -E '[0-9]{3}')" + # it's possible for this value to be blank, so confirm that it's a valid status code + valid_status_code=0 + if expr "$status_code" : '[0-9][0-9][0-9]$'>/dev/null; then + valid_status_code=1 + fi + + if [ "$exit_code" -ne 0 ]; then + if [ "$valid_status_code" -eq 1 ]; then + # print the code and continue + log_debug "Request failed with http status $status_code" + log_debug "Response headers:" + log_debug "$headers" + else + # exit immediately + log "ERROR: wget failed with exit code $exit_code" + + if [ "$exit_code" -eq 5 ]; then + log "" + log "Ensure the ca-certificates package is installed for your distribution" + fi + clean_exit 1 + fi + fi + + + # this could be >255, so print HTTP status code rather than using as return code + echo "$status_code" +} + +check_http_status() { + status_code="$1" + component="$2" + + if [ "$status_code" -ne 200 ]; then + error="ERROR: $component download failed with status code $status_code." + if [ "$status_code" -ne 404 ]; then + error="${error} Please try again." + fi + + log "" + log "$error" + + if [ "$status_code" -eq 404 ]; then + log "" + log "Please report this issue:" + log "https://github.com/DopplerHQ/cli/issues/new?template=bug_report.md&title=[BUG]%20Unexpected%20404%20using%20CLI%20install%20script" + fi + + clean_exit 1 + fi +} + +is_dir_in_path() { + dir="$1" + # ensure dir is the full path and not a substring of some longer path. + # after performing a regex search, perform another search w/o regex to filter out matches due to special characters in `$dir` + echo "$PATH" | grep -o -E "(^|:)$dir(:|$)" | grep -q -F "$dir" +} + +is_path_writable() { + dir="$1" + test -w "$dir" +} + +# flag parsing +for arg; do + if [ "$arg" = "--debug" ]; then + DEBUG=1 + fi +done + + +# identify OS +os="unknown" +uname_os=$(uname -s) +case "$uname_os" in + Darwin) os="macos" ;; + Linux) os="linux" ;; + FreeBSD) os="freebsd" ;; + OpenBSD) os="openbsd" ;; + NetBSD) os="netbsd" ;; + *MINGW64*) os="win" ;; + *) + log "ERROR: Unsupported OS '$uname_os'" + log "" + log "Please report this issue:" + log "https://github.com/DopplerHQ/cli/issues/new?template=bug_report.md&title=[BUG]%20Unsupported%20OS" + clean_exit 1 + ;; +esac + +log_debug "Detected OS '$os'" + +# identify arch +arch="unknown" +uname_machine=$(uname -m) +if [ "$uname_machine" = "i386" ] || [ "$uname_machine" = "i686" ]; then + arch="i386" +elif [ "$uname_machine" = "amd64" ] || [ "$uname_machine" = "x86_64" ]; then + arch="amd64" +elif [ "$uname_machine" = "armv6" ] || [ "$uname_machine" = "armv6l" ]; then + arch="armv6" +elif [ "$uname_machine" = "armv7" ] || [ "$uname_machine" = "armv7l" ]; then + arch="armv7" +# armv8? +elif [ "$uname_machine" = "arm64" ] || [ "$uname_machine" = "aarch64" ]; then + arch="arm64" +else + log "ERROR: Unsupported architecture '$uname_machine'" + log "" + log "Please report this issue:" + log "https://github.com/DopplerHQ/cli/issues/new?template=bug_report.md&title=[BUG]%20Unsupported%20architecture" + clean_exit 1 +fi + +log_debug "Detected architecture '$arch'" + + +# identify format +if [ "$os" = "windows" ]; then + format="zip" +else + format="tar" +fi + +log_debug "Detected format '$format'" + +url=https://github.com/seamapi/seam-cli/releases/download/v0.0.8/seam-$os +key_url="https://$DOPPLER_DOMAIN/keys/public" + + +set +e +curl_binary="$(command -v curl)" +wget_binary="$(command -v wget)" + +# check if curl is available +[ -x "$curl_binary" ] +curl_installed=$? # 0 = yes + +# check if wget is available +[ -x "$wget_binary" ] +wget_installed=$? # 0 = yes +set -e + +if [ "$curl_installed" -eq 0 ] || [ "$wget_installed" -eq 0 ]; then + # create hidden temp dir in user's home directory to ensure no other users have write perms + tempdir="$(mktemp -d ~/.tmp.XXXXXXXX)" + log_debug "Using temp directory $tempdir" + + log "Downloading Seam CLI" + file="seam" + filename="$tempdir/$file" + + if [ "$curl_installed" -eq 0 ]; then + log_debug "Using $curl_binary for requests" + + # download binary + log_debug "Downloading binary from $url" + status_code=$(curl_download "$url" "$filename" "Binary") + check_http_status "$status_code" "Binary" + elif [ "$wget_installed" -eq 0 ]; then + log_debug "Using $wget_binary for requests" + + log_debug "Downloading binary from $url" + status_code=$(wget_download "$url" "$filename" "Binary") + check_http_status "$status_code" "Binary" + fi +else + log "ERROR: You must have curl or wget installed" + clean_exit 1 +fi + + +# set appropriate perms +chown "$(id -u):$(id -g)" "$filename" +chmod 755 "$filename" + +# install +log "Installing..." +binary_installed=0 +found_non_writable_path=0 + +if [ "$binary_installed" -eq 0 ]; then + install_dir="/usr/local/bin" + # capture exit code without exiting + set +e + install_binary "$install_dir" + exit_code=$? + set -e + if [ $exit_code -eq 0 ]; then + binary_installed=1 + BINARY_INSTALLED_PATH="$install_dir" + elif [ $exit_code -eq 1 ]; then + found_non_writable_path=1 + fi +fi + +if [ "$binary_installed" -eq 0 ]; then + install_dir="/usr/bin" + # capture exit code without exiting + set +e + install_binary "$install_dir" + exit_code=$? + set -e + if [ $exit_code -eq 0 ]; then + binary_installed=1 + BINARY_INSTALLED_PATH="$install_dir" + elif [ $exit_code -eq 1 ]; then + found_non_writable_path=1 + fi +fi + +if [ "$binary_installed" -eq 0 ]; then + install_dir="/usr/sbin" + # capture exit code without exiting + set +e + install_binary "$install_dir" + exit_code=$? + set -e + if [ $exit_code -eq 0 ]; then + binary_installed=1 + BINARY_INSTALLED_PATH="$install_dir" + elif [ $exit_code -eq 1 ]; then + found_non_writable_path=1 + fi +fi + +if [ "$binary_installed" -eq 0 ]; then + # run again for this directory, but this time create it if it doesn't exist + # this fixes an issue with clean installs on macOS 12+ + install_dir="/usr/local/bin" + # capture exit code without exiting + set +e + install_binary "$install_dir" "true" "true" + exit_code=$? + set -e + if [ $exit_code -eq 0 ]; then + binary_installed=1 + BINARY_INSTALLED_PATH="$install_dir" + elif [ $exit_code -eq 1 ]; then + found_non_writable_path=1 + fi +fi + +if [ "$binary_installed" -eq 0 ]; then + if [ "$found_non_writable_path" -eq 1 ]; then + log "Unable to write to bin directory; please re-run with \`sudo\` or adjust your PATH" + clean_exit 2 + else + log "No supported bin directories are available; please adjust your PATH" + clean_exit 1 + fi +fi + + +delete_tempdir + +message="Installed Seam CLI" +if [ "$CUSTOM_INSTALL_PATH" != "" ]; then + message="$message to $BINARY_INSTALLED_PATH" +fi +echo "$message"