mirror of
https://gitea.com/actions/setup-node.git
synced 2024-11-23 02:29:33 +01:00
78148dae50
* Updates * Update * Update * Update * Update * Yarn sometimes prefers npmrc, so use same token * Description * Update readme * Feedback * Add type * new toolkit and scoped registries * npmrc in RUNNER_TEMP * Dont always auth * Try exporting blank token * Get auth working for now pending runner changes * Fix string interpolation for auth token. * Don't export both userconfigs * Update authutil.js * Add single quotes for authString * Fix the registry string. * Use userconfig and append trailing slash * Keep in root of repo * Try just adding auth token * Remove auth token * Try changes again * Add tests * Npm and GPR samples * Add types
47 lines
1.5 KiB
JavaScript
47 lines
1.5 KiB
JavaScript
module.exports = authenticationRequestError
|
|
|
|
const { RequestError } = require('@octokit/request-error')
|
|
|
|
function authenticationRequestError (state, error, options) {
|
|
if (!error.headers) throw error
|
|
|
|
const otpRequired = /required/.test(error.headers['x-github-otp'] || '')
|
|
// handle "2FA required" error only
|
|
if (error.status !== 401 || !otpRequired) {
|
|
throw error
|
|
}
|
|
|
|
if (error.status === 401 && otpRequired && error.request && error.request.headers['x-github-otp']) {
|
|
if (state.otp) {
|
|
delete state.otp // no longer valid, request again
|
|
} else {
|
|
throw new RequestError('Invalid one-time password for two-factor authentication', 401, {
|
|
headers: error.headers,
|
|
request: options
|
|
})
|
|
}
|
|
}
|
|
|
|
if (typeof state.auth.on2fa !== 'function') {
|
|
throw new RequestError('2FA required, but options.on2fa is not a function. See https://github.com/octokit/rest.js#authentication', 401, {
|
|
headers: error.headers,
|
|
request: options
|
|
})
|
|
}
|
|
|
|
return Promise.resolve()
|
|
.then(() => {
|
|
return state.auth.on2fa()
|
|
})
|
|
.then((oneTimePassword) => {
|
|
const newOptions = Object.assign(options, {
|
|
headers: Object.assign(options.headers, { 'x-github-otp': oneTimePassword })
|
|
})
|
|
return state.octokit.request(newOptions)
|
|
.then(response => {
|
|
// If OTP still valid, then persist it for following requests
|
|
state.otp = oneTimePassword
|
|
return response
|
|
})
|
|
})
|
|
}
|