Documentation | Linux/macOS/Windows |
---|---|
MaidSafe website | SAFE Dev Forum | SAFE Network Forum |
---|
This crate implements a CLI (Command Line Interface) for the safe_authenticator crate.
Note this crate is no longer maintained, it has been deprecated and its functionality replaced with the SAFE Authenticator daemon which is maintained in https://github.com/maidsafe/safe-api.
The SAFE Browser provides an integrated Authenticator GUI for users to create SAFE Network accounts, log in using an existing account's credentials (secret and password), authorise applications which need to store data on the network on behalf of the user, as well as revoke permissions previously granted to applications.
However, there are some scenarios where having to launch the browser just to be able to have the authenticator running is not that practical. E.g., developers working on a desktop SAFE application, either during development, testing, or even debugging phase, may find it uncomfortable or overkill if all they need is just the apps credentials to connect to the SAFE Network to test the main logic of such application, and perhaps not the authorisation flow. In these scenarios having a CLI is much more flexible and easy to use as its output could also be chained with other commands and/or applications can simply execute the CLI and read the result from its stdout
instead of having to interface with the SAFE Browser/Authenticator through the system URI protocol.
Simply put, this tool provides an alternative to the Authenticator that is currently integrated in the SAFE Browser, and to its communication protocol, allowing to perform the same set of operations but through a command line user interface.
The latest version of the SAFE Authenticator CLI can be downloaded from the releases page. Once it's downloaded and unpacked, you can follow the steps in this User Guide by starting from the Using the CLI section further down in this document.
If otherwise you prefer to build the SAFE Authenticator CLI from source code, please follow the instructions in the next two section below.
In order to build this CLI from source code you need to make sure you have rustc v1.37.0
(or higher) installed. Please take a look at this notes about Rust installation if you need help with installing it. We recommend you install it with rustup
which will install cargo
tool since this guide makes use of it.
Once Rust and its toolchain are installed, run the following commands to clone this repository and build the safe_auth
crate (the build process may take several minutes the first time you run it on this crate):
$ git clone https://github.com/maidsafe/safe-authenticator-cli.git
$ cd safe-authenticator-cli
$ cargo build
By default, the safe_auth
CLI is built with Non-Mock libraries. If you are intending to use it with the Mock
network you'll need to specify the mock-network
feature in every command you run with cargo
, e.g. to build it for the Mock
network you can run:
$ cargo build --features mock-network
Keep in mind that when running the safe_auth CLI with cargo run
as explained in the following sections below, please also make sure to set the mock-network
feature if you want to use the Mock
network, e.g. with the following command the safe_auth
will try to connect, create an account with test-coins and login to the Mock
network:
$ cargo run --features mock-network -- --test-coins
The base command, if built is $ safe_auth
, or all commands can be run via $ cargo run --features mock-network -- <command>
.
You can run all existing tests with:
$ cargo test --features mock-network
The safe_auth
internal functions have some documentation written as doc tests. You can run these specific tests with the following command:
$ cargo test --doc --features mock-network
The safe_auth
can be executed with:
cargo run -- <list of arguments/options>
- or directly with the executable generated:
./target/debug/safe_auth <list of arguments/options>
As any other CLI, the safe_auth
supports the --help
argument which outputs a help message with information on the supported arguments and options, you can get this help message with:
$ safe_auth --help
The safe_auth
output can be of two different formats:
- The default one which is intended for human users of the tool
- One that can be used by any other applications parsing the output string obtained from the
stdout
Apart from the output generated in the stdout
, the safe_auth
tool also generates logs at different levels like any other Rust application. These logs levels (debug
, info
, etc.) can be set by setting the RUST_LOG
environment variable, e.g. to set info
level:
$ export RUST_LOG=safe_auth=info
Windows users in Command Prompt, will first need to run set RUST_LOG=safe_auth=info
. If using Windows PowerShell, run $env:RUST_LOG = "safe_auth=info"
Note that this environment variable will only persist in your current terminal until it is closed.
Now let's look at some of the features and operations supported, how they can be executed from the CLI, and how they can be combined together.
In order to create a SAFE Network account we need some safecoins to pay with. Since this is still under development, we can have the authenticator CLI to generate some test-coins and use them for paying the cost of creating an account. We can do so by passing --test-coins
flag, the safe_auth CLI will then request us to enter a secret phrase and password for the new account to be created:
$ safe_auth --test-coins
Secret:
Password:
Account was created successfully!
SafeKey created and preloaded with test-coins. Owner key pair generated:
pk = 8dc704a138a6b1fc5f1c5cab04896597e21d693f2ed7ad0bb9fd8837a0b4bf03afb4acfb7ed7d116f5490ab341bb0bf9
sk = 496cbe0c66d6867c96bbc17a0cb23afb98f18b517a2a48ea7671b22d86639556
Alternatively, if we own some safecoins on a SafeKey
already (see the safe_cli User Guide for details about SafeKey
s), we can provide the corresponding secret key so the safe_auth CLI to use it for paying the cost of creating the account, as well as setting it as the default SafeKey
for the account being created:
$ safe_auth --sk <secret key hex string>
Secret:
Password:
Account was created successfully!
If we already have an account created, we can invoke the safe_auth CLI without any argument to login using the credentials of the existing account:
$ safe_auth
Secret:
Password:
Logged in the SAFE Network successfully!
It's possible (though not secure) to use a simple json file to pass secret
and password
to the auth CLI, and so avoid having to manually input both.
// my.config.json
{
"password": "v2SwvNl7MR52A5mdtoeXjDVqch3tWm",
"secret": "v2SwvNl7MR52A5mdtoeXjDVqch3tWm"
}
And so you can log in, thus:
$ safe_auth --config ./my.config.json
Logged in the SAFE Network successfully!
Another method for passing secret/password involves using the environment variables SAFE_AUTH_SECRET
and SAFE_AUTH_PASSWORD
.
With those set (eg, on linux/osx: export SAFE_AUTH_SECRET="<your secret>;"
, and export SAFE_AUTH_PASSWORD="<your password>"
), you can then login without needing to enter login details, or pass a config file:
$ safe_auth
Logged in the SAFE Network successfully!
Or, you can choose to pass the environment variables to the command directly (though this can be insecure):
$ SAFE_AUTH_SECRET="<secret>" SAFE_AUTH_PASSWORD="<password>" safe_auth
Logged in the SAFE Network successfully!
Please note, that both the secret and password environment variables must be set to use this method. If only one is set, an error will be thrown.
$ safe_auth --req <auth req string>
Secret:
Password:
Logged in the SAFE Network successfully!
The following application authorisation request was received:
+---------------------------------+--------------+------------------+----------------------------------------------+
| Id | Name | Vendor | Permissions requested |
+---------------------------------+--------------+------------------+----------------------------------------------+
| <app ID> | <app's name> | <vendor name> | Own container: false |
| | | | Default containers: <permissions requested> |
+---------------------------------+--------------+------------------+----------------------------------------------+
Allow authorisation? [y/N]:
Authorisation will be allowed...
Authorisation response string: <auth response>
As you can see before each authorisation request is allowed, the user is prompted for confirmation. Optionally, this prompt can be disabled to have the safe_auth
to automatically allow all incoming authorisation requests. We can do this by passing the --allow-all-auth
argument in the command line:
$ safe_auth --allow-all-auth --req <auth req string>
For example, the following command passes a valid encoded authorisation request as the value of the --req
argument and it allows the authorisation to be made without prompting:
$ safe_auth --allow-all-auth --req bAAAAAABU6IEAEAAAAAACMAAAAAAAAAAANZSXILTNMFUWI43BMZSS45DFON2C4YLVORUGK3TUNFRWC5DPOIXGG3DJFZUWIAILAAAAAAAAAAAF65DFON2F643DN5YGKGYAAAAAAAAAABJHK43UEBAXK5DIMVXHI2LDMF2G64RAINGESICUMVZXIEAAAAAAAAAAABGWC2LEKNQWMZJONZSXIICMORSAAAIAAAAAAAAAAADQAAAAAAAAAAC7OB2WE3DJMMAQAAAAAAAAAAAAAAAAAAI
The expected encoded authorisation request string is the one that can be generated by any application using the SAFE API, e.g. an application using the safe_app_nodejs
would make use of the genAuthUri, genConnUri, genContainerAuthUri, or genShareMDataUri functions to generate such encoded string.
The output obtained from the safe_auth
CLI command when passing a --req
argument, can then be used by such a Nodejs application to connect to the SAFE Network with the loginFromUri function.
$ safe_auth --apps
Secret:
Password:
Logged in the SAFE Network successfully!
+---------------------------------+--------------+------------------+---------------------+
| Authorised Applications | | | |
+---------------------------------+--------------+------------------+---------------------+
| Id | Name | Vendor | Permissions |
+---------------------------------+--------------+------------------+---------------------+
| <app ID> | <app's name> | <vendor name> | <app's permissions> |
+---------------------------------+--------------+------------------+---------------------+
| ... |
+---------------------------------+--------------+------------------+---------------------+
$ safe_auth --revoke <app ID>
Secret:
Password:
Logged in the SAFE Network successfully!
Authorised permissions were revoked for app '<app ID>'
$ safe_auth --daemon 41805
Secret:
Password:
Exposing service on 127.0.0.1:41805
Then on a separate terminal you can authorise an application with:
$ curl -X GET http://localhost:41805/authorise/<auth req string>
This SAFE Network application is licensed under the General Public License (GPL), version 3 (LICENSE http://www.gnu.org/licenses/gpl-3.0.en.html).
Copyrights in the SAFE Network are retained by their contributors. No copyright assignment is required to contribute to this project.