Gathering detailed insights and metrics for verdaccio-github-oauth-ui-team
Gathering detailed insights and metrics for verdaccio-github-oauth-ui-team
npm install verdaccio-github-oauth-ui-team
Typescript
Module System
Min. Node Version
Node Version
NPM Version
33.8
Supply Chain
58.4
Quality
62.2
Maintenance
25
Vulnerability
90.5
License
TypeScript (96.55%)
Shell (3.29%)
Dockerfile (0.16%)
Total Downloads
925
Last Day
1
Last Week
6
Last Month
14
Last Year
102
76 Stars
524 Commits
45 Forks
2 Watching
2 Branches
13 Contributors
Minified
Minified + Gzipped
Latest Version
2.3.10
Package Id
verdaccio-github-oauth-ui-team@2.3.10
Unpacked Size
182.68 kB
Size
38.88 kB
File Count
11
NPM Version
6.14.11
Node Version
14.15.5
Cumulative downloads
Total Downloads
Last day
0%
1
Compared to previous day
Last week
0%
6
Compared to previous week
Last month
180%
14
Compared to previous month
Last year
-30.6%
102
Compared to previous year
31
A GitHub OAuth Plugin for Verdaccio – https://www.verdaccio.org
This is a Verdaccio plugin that offers GitHub OAuth integragtion for both the browser and the command line.
$ npm install verdaccio-github-oauth-ui
YOUR_REGISTRY_URL/-/oauth/callback
Merge the below options with your existing Verdaccio config:
1middlewares: 2 github-oauth-ui: 3 enabled: true 4 5auth: 6 github-oauth-ui: 7 org: GITHUB_ORG 8 client-id: GITHUB_CLIENT_ID 9 client-secret: GITHUB_CLIENT_SECRET 10 enterprise-origin: GITHUB_ENTERPRISE_ORIGIN # optional, if you are using github enterprise 11 team: GITHUB_TEAM # optional, to filter by team name 12 13url_prefix: YOUR_REGISTRY_URL # optional, make sure it is configured as described
middlewares
or the auth
node. Just make sure, the addon is included under both nodes.org
Users within this org will be able to authenticate.
client-id
and client-secret
These values can be obtained from GitHub OAuth app page at https://github.com/settings/developers.
enterprise-origin
(optional)Set this if you are using GitHub Enterprise. Example: https://hostname
team
(optional)Users within specified team will be able to authenticate
url_prefix
(optional)If configured, it must match YOUR_REGISTRY_URL
. See GitHub Config.
If you are behind a proxy server, the plugin needs to know the proxy server in order to make GitHub requests.
Configure the below environment variable.
$ export GLOBAL_AGENT_HTTP_PROXY=http://127.0.0.1:8080
See the global-agent docs for detailed configuration instrcutions.
read:org
access when prompted to authorize.You are now logged in.
The easiest way to configure npm is to use this short command:
$ npx verdaccio-github-oauth-ui --registry http://localhost:4873
Open the "Register Info" dialog and klick "Copy to clipboard":
Select the text in the header and copy it. In case the text is too long, you can double-click it. The invisible part will still be selected and copied.
$ npm config set //localhost:4873:_authToken "SECRET_TOKEN"
$ npm config set //localhost:4873:always-auth true
whoami
command. Example:$ npm whoami --registry http://localhost:4873
n4bb12
If you see your GitHub username, you are ready to start installing and publishing packages.
Click the Logout button as per usual.
Unless OAuth access is revoked in the GitHub settings, the token is valid indefinitely.
To invalidate your active login tokens you need to revoke access on the GitHub OAuth app:
If you have created the GitHub OAuth app, you can also revoke access for all users:
Verdaccio loads plugins by requiring them but global node_modules
are NOT searched by the node resolve algorithm. Despite what examples or documentation might be suggesting, globally installed plugins are not supported. Some solutions that worked for others:
package.json
and install verdaccio + plugins locally.node_modules
folder to the NODE_PATH
environment variable to give node a hint to search for modules here, too.docker.sh
and Dockerfile
in this example.More info: https://github.com/n4bb12/verdaccio-github-oauth-ui/issues/13#issuecomment-435296117
read:org
permission. They can request this during fist login by clicking the Request or Grant button when prompted to authorize Verdaccio with GitHub. If you or a team member accidentally skipped this step, go to https://github.com/settings/applications, find your Verdaccio registry and grant read:org
access from there.No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
Found 1/22 approved changesets -- score normalized to 0
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Reason
project is not fuzzed
Details
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Reason
22 existing vulnerabilities detected
Details
Score
Last Scanned on 2025-01-27
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More