@jshookmcp/jshook 0.2.8 → 0.2.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +36 -5
- package/README.zh.md +36 -5
- package/dist/{AntiCheatDetector-S8VRj-dD.mjs → AntiCheatDetector-BNk-EoBt.mjs} +3 -3
- package/dist/{CodeInjector-4Z3ngPoX.mjs → CodeInjector-Cq8q01kp.mjs} +5 -5
- package/dist/ConsoleMonitor-CPVQW1Y-.mjs +2201 -0
- package/dist/{DarwinAPI-B8hg_yhz.mjs → DarwinAPI-BNPxu0RH.mjs} +1 -1
- package/dist/DetailedDataManager-BQQcxh64.mjs +217 -0
- package/dist/EventBus-DgPmwpeu.mjs +141 -0
- package/dist/EvidenceGraphBridge-SFesNera.mjs +153 -0
- package/dist/{ExtensionManager-D5-bO9D8.mjs → ExtensionManager-CWYgw0YW.mjs} +13 -6
- package/dist/{FingerprintManager-BVxFJL2-.mjs → FingerprintManager-gzWtkKuf.mjs} +1 -1
- package/dist/{HardwareBreakpoint-DK1yjWkV.mjs → HardwareBreakpoint-B9gZCdFP.mjs} +3 -3
- package/dist/{HeapAnalyzer-CEbo10xU.mjs → HeapAnalyzer-BLDH0dCv.mjs} +4 -4
- package/dist/HookGeneratorBuilders.core.generators.storage-CtcdK78Q.mjs +639 -0
- package/dist/InstrumentationSession-CvPC7Jwy.mjs +244 -0
- package/dist/{MemoryController-DdtnBdD4.mjs → MemoryController-CbVdCIJF.mjs} +3 -3
- package/dist/{MemoryScanSession-RMixN3bX.mjs → MemoryScanSession-BsDZbLYm.mjs} +81 -78
- package/dist/{MemoryScanner-QjK4ld0B.mjs → MemoryScanner-Bcpml6II.mjs} +44 -18
- package/dist/{NativeMemoryManager.impl-CB6gJ0NM.mjs → NativeMemoryManager.impl-dZtA1ZGn.mjs} +14 -53
- package/dist/{NativeMemoryManager.utils-BML4q1ry.mjs → NativeMemoryManager.utils-B-FjA2mJ.mjs} +1 -1
- package/dist/{PEAnalyzer-CK0xe0Fs.mjs → PEAnalyzer-D1lzJ_VG.mjs} +2 -2
- package/dist/PageController-Bqm2kZ_X.mjs +417 -0
- package/dist/{PointerChainEngine-Cd73qu5b.mjs → PointerChainEngine-BOhyVsjx.mjs} +4 -4
- package/dist/PrerequisiteError-Dl33Svkz.mjs +20 -0
- package/dist/ResponseBuilder-D3iFYx2N.mjs +143 -0
- package/dist/ReverseEvidenceGraph-Dlsk94LC.mjs +269 -0
- package/dist/ScriptManager-aHHq0X7U.mjs +3000 -0
- package/dist/{Speedhack-CeF0XmEz.mjs → Speedhack-CqdIFlQl.mjs} +2 -2
- package/dist/{StructureAnalyzer-D4GkMduU.mjs → StructureAnalyzer-DhFaPvRO.mjs} +3 -3
- package/dist/ToolCatalog-C0JGZoOm.mjs +582 -0
- package/dist/ToolError-jh9whhMd.mjs +15 -0
- package/dist/ToolProbe-oC7aPrkv.mjs +45 -0
- package/dist/ToolRegistry-BjaF4oNz.mjs +131 -0
- package/dist/ToolRouter.policy-BWV67ZK-.mjs +304 -0
- package/dist/TraceRecorder-DgxyVbdQ.mjs +519 -0
- package/dist/{Win32API-Bc0QnQsN.mjs → Win32API-CePkipZY.mjs} +1 -1
- package/dist/{Win32Debug-DUHt9XUn.mjs → Win32Debug-BvKs-gxc.mjs} +2 -2
- package/dist/WorkflowEngine-CuvkZtWu.mjs +598 -0
- package/dist/analysis-CL9uACt9.mjs +463 -0
- package/dist/antidebug-CqDTB_uk.mjs +1081 -0
- package/dist/artifactRetention-CFEprwPw.mjs +591 -0
- package/dist/artifacts-Bk2-_uPq.mjs +59 -0
- package/dist/betterSqlite3-0pqusHHH.mjs +74 -0
- package/dist/binary-instrument-CXfpx6fT.mjs +979 -0
- package/dist/bind-helpers-xFfRF-qm.mjs +22 -0
- package/dist/boringssl-inspector-BH2D3VKc.mjs +180 -0
- package/dist/browser-BpOr5PEx.mjs +4082 -0
- package/dist/concurrency-Bt0yv1kJ.mjs +41 -0
- package/dist/{constants-CCvsN80K.mjs → constants-B0OANIBL.mjs} +88 -46
- package/dist/coordination-qUbyF8KU.mjs +259 -0
- package/dist/debugger-gnKxRSN0.mjs +1271 -0
- package/dist/definitions-6M-eejaT.mjs +53 -0
- package/dist/definitions-B18eyf0B.mjs +18 -0
- package/dist/definitions-B3QdlrHv.mjs +34 -0
- package/dist/definitions-B4rAvHNZ.mjs +63 -0
- package/dist/definitions-BB_4jnmy.mjs +37 -0
- package/dist/definitions-BMfYXoNC.mjs +43 -0
- package/dist/definitions-Beid2EB3.mjs +27 -0
- package/dist/definitions-C1UvM5Iy.mjs +126 -0
- package/dist/definitions-CXEI7QC72.mjs +216 -0
- package/dist/definitions-C_4r7Fo-2.mjs +14 -0
- package/dist/definitions-CkFDALoa.mjs +26 -0
- package/dist/definitions-Cke7zEb8.mjs +94 -0
- package/dist/definitions-ClJLzsJQ.mjs +25 -0
- package/dist/definitions-Cq-zroAU.mjs +28 -0
- package/dist/definitions-Cy3Sl6gV.mjs +34 -0
- package/dist/definitions-D3VsGcvz.mjs +47 -0
- package/dist/definitions-DVGfrn7y.mjs +96 -0
- package/dist/definitions-LKpC3-nL.mjs +9 -0
- package/dist/definitions-bAhHQJq9.mjs +359 -0
- package/dist/encoding-Bvz5jLRv.mjs +1065 -0
- package/dist/evidence-graph-bridge-C_fv9PuC.mjs +135 -0
- package/dist/{factory-CibqTNC8.mjs → factory-DxlGh9Xf.mjs} +37 -52
- package/dist/graphql-DYWzJ29s.mjs +1026 -0
- package/dist/handlers-9sAbfIg-.mjs +2552 -0
- package/dist/handlers-Bl8zkwz1.mjs +2716 -0
- package/dist/handlers-C67ktuRN.mjs +710 -0
- package/dist/handlers-C87g8oCe.mjs +276 -0
- package/dist/handlers-CTsDAO6p.mjs +681 -0
- package/dist/handlers-Cgyg6c0U.mjs +645 -0
- package/dist/handlers-D6j6yka7.mjs +2124 -0
- package/dist/handlers-DdFzXLvF.mjs +446 -0
- package/dist/handlers-DeLOCd5m.mjs +799 -0
- package/dist/handlers-DlCJN4Td.mjs +757 -0
- package/dist/handlers-DxGIq15_2.mjs +917 -0
- package/dist/handlers-U6L4xhuF.mjs +585 -0
- package/dist/handlers-tB9Mp9ZK.mjs +84 -0
- package/dist/handlers-tiy7EIBp.mjs +572 -0
- package/dist/handlers.impl-DS0d9fUw.mjs +761 -0
- package/dist/hooks-CzCWByww.mjs +898 -0
- package/dist/index.mjs +377 -155
- package/dist/{logger-BmWzC2lM.mjs → logger-Dh_xb7_2.mjs} +14 -6
- package/dist/maintenance-P7ePRXQC.mjs +830 -0
- package/dist/manifest-2ToTpjv8.mjs +106 -0
- package/dist/manifest-3g71z6Bg.mjs +79 -0
- package/dist/manifest-82baTv4U.mjs +45 -0
- package/dist/manifest-B3QVVeBS.mjs +82 -0
- package/dist/manifest-BB2J8IMJ.mjs +149 -0
- package/dist/manifest-BKbgbSiY.mjs +60 -0
- package/dist/manifest-Bcf-TJzH.mjs +848 -0
- package/dist/manifest-BmtZzQiQ2.mjs +45 -0
- package/dist/manifest-Bnd7kqEY.mjs +55 -0
- package/dist/manifest-BqQX6OQC2.mjs +65 -0
- package/dist/manifest-BqrQ4Tpj.mjs +81 -0
- package/dist/manifest-Br4RPFt5.mjs +370 -0
- package/dist/manifest-C5qDjysN.mjs +107 -0
- package/dist/manifest-C9RT5nk32.mjs +34 -0
- package/dist/manifest-CAhOuvSl.mjs +204 -0
- package/dist/manifest-CBYWCUBJ.mjs +51 -0
- package/dist/manifest-CFADCRa1.mjs +37 -0
- package/dist/manifest-CQVhavRF.mjs +114 -0
- package/dist/manifest-CT7zZBV1.mjs +48 -0
- package/dist/manifest-CV12bcrF.mjs +121 -0
- package/dist/manifest-CXsRWjjI.mjs +224 -0
- package/dist/manifest-CZLUCfG02.mjs +95 -0
- package/dist/manifest-D6phHKFd.mjs +131 -0
- package/dist/manifest-DCyjf4n2.mjs +294 -0
- package/dist/manifest-DHsnKgP6.mjs +60 -0
- package/dist/manifest-Df_dliIe.mjs +55 -0
- package/dist/manifest-Dh8WBmEW.mjs +129 -0
- package/dist/manifest-DhKRAT8_.mjs +92 -0
- package/dist/manifest-DlpTj4ic2.mjs +193 -0
- package/dist/manifest-DrbmZcFl2.mjs +253 -0
- package/dist/manifest-DuwHjUa5.mjs +70 -0
- package/dist/manifest-DzwvxPJX.mjs +38 -0
- package/dist/manifest-NXctwWQq.mjs +68 -0
- package/dist/manifest-Sc_0JQ13.mjs +418 -0
- package/dist/manifest-gZ4s_UtG.mjs +96 -0
- package/dist/manifest-qSleDqdO.mjs +1023 -0
- package/dist/modules-C184v-S9.mjs +11365 -0
- package/dist/mojo-ipc-B_H61Afw.mjs +525 -0
- package/dist/network-671Cw6hV.mjs +3346 -0
- package/dist/{artifacts-BbdOMET5.mjs → outputPaths-B1uGmrWZ.mjs} +219 -212
- package/dist/parse-args-BlRjqlkL.mjs +39 -0
- package/dist/platform-WmNn8Sxb.mjs +2070 -0
- package/dist/process-QcbIy5Zq.mjs +1401 -0
- package/dist/proxy-DqNs0bAd.mjs +170 -0
- package/dist/registry-D-6e18lB.mjs +34 -0
- package/dist/response-BQVP-xUn.mjs +28 -0
- package/dist/server/plugin-api.mjs +2 -2
- package/dist/shared-state-board-DV-dpHFJ.mjs +586 -0
- package/dist/sourcemap-Dq8ez8vS.mjs +650 -0
- package/dist/ssrf-policy-ZaUfvhq7.mjs +166 -0
- package/dist/streaming-BUQ0VJsg.mjs +725 -0
- package/dist/tool-builder-DCbIC5Eo.mjs +186 -0
- package/dist/transform-CiYJfNX0.mjs +1007 -0
- package/dist/types-Bx92KJfT.mjs +4 -0
- package/dist/wasm-DQTnHDs4.mjs +531 -0
- package/dist/workflow-f3xJOcjx.mjs +725 -0
- package/package.json +16 -16
- package/dist/ExtensionManager-CPTJhHFg.mjs +0 -2
- package/dist/ToolCatalog-Bq4V2sbJ.mjs +0 -67201
- package/dist/{CacheAdapters-CzFNpD9a.mjs → CacheAdapters-CDe5WPSV.mjs} +0 -0
- package/dist/{StealthVerifier-BzBCFiwx.mjs → StealthVerifier-Bo4T3bz8.mjs} +0 -0
- package/dist/{VersionDetector-CNXcvD46.mjs → VersionDetector-CwVLVdDM.mjs} +0 -0
- package/dist/{formatAddress-ChCSIRWT.mjs → formatAddress-DVkj9kpI.mjs} +0 -0
- package/dist/{types-BBjOqye-.mjs → types-CPhOReNX.mjs} +1 -1
|
@@ -0,0 +1,725 @@
|
|
|
1
|
+
import { t as logger } from "./logger-Dh_xb7_2.mjs";
|
|
2
|
+
import { Cr as WORKFLOW_BUNDLE_CACHE_MAX_BYTES, Dr as WORKFLOW_JS_BUNDLE_MAX_SIZE_BYTES, Er as WORKFLOW_JS_BUNDLE_MAX_REDIRECTS, Tr as WORKFLOW_JS_BUNDLE_FETCH_TIMEOUT_MS, wr as WORKFLOW_BUNDLE_CACHE_TTL_MS } from "./constants-B0OANIBL.mjs";
|
|
3
|
+
import { a as argString, i as argObject, r as argNumber, t as argBool } from "./parse-args-BlRjqlkL.mjs";
|
|
4
|
+
import { a as isLoopbackHost, s as isPrivateHost } from "./ssrf-policy-ZaUfvhq7.mjs";
|
|
5
|
+
import { t as R } from "./ResponseBuilder-D3iFYx2N.mjs";
|
|
6
|
+
import "./definitions-Cke7zEb8.mjs";
|
|
7
|
+
import { BlockList, isIP } from "node:net";
|
|
8
|
+
import { lookup } from "node:dns/promises";
|
|
9
|
+
//#region src/server/domains/workflow/handlers/shared.ts
|
|
10
|
+
/**
|
|
11
|
+
* Shared types, state, and utilities for workflow domain sub-handlers.
|
|
12
|
+
*/
|
|
13
|
+
const BUILTIN_SCRIPT_ENTRIES = [
|
|
14
|
+
{
|
|
15
|
+
name: "auth_extract",
|
|
16
|
+
description: "Extract auth tokens from localStorage and cookies",
|
|
17
|
+
code: `(function(){
|
|
18
|
+
var keys=['token','active_token','access_token','jwt','auth_token','userRole','id_token','refresh_token'];
|
|
19
|
+
var r={};
|
|
20
|
+
for(var i=0;i<keys.length;i++){var v=localStorage.getItem(keys[i]);if(v)r[keys[i]]=v;}
|
|
21
|
+
r._cookies=document.cookie;
|
|
22
|
+
return r;
|
|
23
|
+
})()`
|
|
24
|
+
},
|
|
25
|
+
{
|
|
26
|
+
name: "bundle_search",
|
|
27
|
+
description: "Fetch a remote JS bundle and search it with regex patterns. params: { url: string, patterns: string[] }",
|
|
28
|
+
code: `(async function(){
|
|
29
|
+
var p=typeof __params__!=='undefined'?__params__:{};
|
|
30
|
+
if(!p.url)return{error:'params.url required'};
|
|
31
|
+
var resp=await fetch(p.url);
|
|
32
|
+
var text=await resp.text();
|
|
33
|
+
var patterns=p.patterns||[];
|
|
34
|
+
var results={};
|
|
35
|
+
for(var i=0;i<patterns.length;i++){
|
|
36
|
+
var re=new RegExp(patterns[i],'g');
|
|
37
|
+
var matches=[];var m;
|
|
38
|
+
while((m=re.exec(text))!==null){
|
|
39
|
+
var s=Math.max(0,m.index-80),e=Math.min(text.length,m.index+m[0].length+80);
|
|
40
|
+
matches.push({match:m[0],ctx:text.slice(s,e)});
|
|
41
|
+
if(matches.length>=10)break;
|
|
42
|
+
}
|
|
43
|
+
results[patterns[i]]=matches;
|
|
44
|
+
}
|
|
45
|
+
return{size:text.length,results:results};
|
|
46
|
+
})()`
|
|
47
|
+
},
|
|
48
|
+
{
|
|
49
|
+
name: "react_fill_form",
|
|
50
|
+
description: "Fill React controlled form inputs using native setter trick. params: { fields: { \"selector\": \"value\" } }",
|
|
51
|
+
code: `(function(){
|
|
52
|
+
var p=typeof __params__!=='undefined'?__params__:{};
|
|
53
|
+
var fields=p.fields||{};
|
|
54
|
+
var ns=Object.getOwnPropertyDescriptor(window.HTMLInputElement.prototype,'value').set;
|
|
55
|
+
var r={};
|
|
56
|
+
var entries=Object.entries(fields);
|
|
57
|
+
for(var i=0;i<entries.length;i++){
|
|
58
|
+
var sel=entries[i][0],val=entries[i][1];
|
|
59
|
+
var el=document.querySelector(sel);
|
|
60
|
+
if(!el){r[sel]='not found';continue;}
|
|
61
|
+
ns.call(el,val);
|
|
62
|
+
el.dispatchEvent(new Event('input',{bubbles:true}));
|
|
63
|
+
el.dispatchEvent(new Event('change',{bubbles:true}));
|
|
64
|
+
r[sel]='filled';
|
|
65
|
+
}
|
|
66
|
+
return r;
|
|
67
|
+
})()`
|
|
68
|
+
},
|
|
69
|
+
{
|
|
70
|
+
name: "dom_find_upgrade_buttons",
|
|
71
|
+
description: "Scan the current page for upgrade/subscription/tier-related UI elements",
|
|
72
|
+
code: `(function(){
|
|
73
|
+
var kw=['upgrade','plus','pro','premium','subscribe','plan','tier','vip','membership'];
|
|
74
|
+
var r=[];
|
|
75
|
+
document.querySelectorAll('button,a,[role=button],[class*=upgrade],[class*=premium],[class*=plus]').forEach(function(el){
|
|
76
|
+
var t=(el.textContent||'').toLowerCase().trim();
|
|
77
|
+
var c=(el.className||'').toLowerCase();
|
|
78
|
+
if(kw.some(function(k){return t.includes(k)||c.includes(k);})){
|
|
79
|
+
r.push({tag:el.tagName,text:t.slice(0,120),cls:c.slice(0,100),href:el.href||null,id:el.id||null});
|
|
80
|
+
}
|
|
81
|
+
});
|
|
82
|
+
return r;
|
|
83
|
+
})()`
|
|
84
|
+
}
|
|
85
|
+
];
|
|
86
|
+
function createWorkflowSharedState(deps) {
|
|
87
|
+
const state = {
|
|
88
|
+
deps,
|
|
89
|
+
scriptRegistry: /* @__PURE__ */ new Map(),
|
|
90
|
+
bundleCache: /* @__PURE__ */ new Map(),
|
|
91
|
+
bundleCacheBytes: 0
|
|
92
|
+
};
|
|
93
|
+
initBuiltinScripts(state.scriptRegistry);
|
|
94
|
+
return state;
|
|
95
|
+
}
|
|
96
|
+
const WORKFLOW_CONSTANTS = {
|
|
97
|
+
BUNDLE_CACHE_TTL_MS: WORKFLOW_BUNDLE_CACHE_TTL_MS,
|
|
98
|
+
MAX_SCRIPTS: 100,
|
|
99
|
+
MAX_BUNDLE_CACHE: 50,
|
|
100
|
+
MAX_BUNDLE_CACHE_BYTES: WORKFLOW_BUNDLE_CACHE_MAX_BYTES
|
|
101
|
+
};
|
|
102
|
+
function initBuiltinScripts(registry) {
|
|
103
|
+
for (const entry of BUILTIN_SCRIPT_ENTRIES) registry.set(entry.name, {
|
|
104
|
+
code: entry.code,
|
|
105
|
+
description: entry.description,
|
|
106
|
+
source: "core",
|
|
107
|
+
protectedFromEviction: true
|
|
108
|
+
});
|
|
109
|
+
}
|
|
110
|
+
function evictBundleCache(state) {
|
|
111
|
+
const now = Date.now();
|
|
112
|
+
for (const [k, v] of state.bundleCache) if (now - v.cachedAt >= WORKFLOW_CONSTANTS.BUNDLE_CACHE_TTL_MS) {
|
|
113
|
+
state.bundleCacheBytes -= v.text.length;
|
|
114
|
+
state.bundleCache.delete(k);
|
|
115
|
+
}
|
|
116
|
+
while (state.bundleCache.size >= WORKFLOW_CONSTANTS.MAX_BUNDLE_CACHE || state.bundleCacheBytes > WORKFLOW_CONSTANTS.MAX_BUNDLE_CACHE_BYTES) {
|
|
117
|
+
const oldest = state.bundleCache.keys().next().value;
|
|
118
|
+
if (oldest !== void 0) {
|
|
119
|
+
const entry = state.bundleCache.get(oldest);
|
|
120
|
+
if (entry) state.bundleCacheBytes -= entry.text.length;
|
|
121
|
+
state.bundleCache.delete(oldest);
|
|
122
|
+
} else break;
|
|
123
|
+
}
|
|
124
|
+
}
|
|
125
|
+
function escapeInlineScriptLiteral(value) {
|
|
126
|
+
return value.replace(/[<>/\u2028\u2029]/g, (char) => {
|
|
127
|
+
switch (char) {
|
|
128
|
+
case "<": return "\\u003C";
|
|
129
|
+
case ">": return "\\u003E";
|
|
130
|
+
case "/": return "\\u002F";
|
|
131
|
+
case "\u2028": return "\\u2028";
|
|
132
|
+
case "\u2029": return "\\u2029";
|
|
133
|
+
default: return char;
|
|
134
|
+
}
|
|
135
|
+
});
|
|
136
|
+
}
|
|
137
|
+
function getOptionalString(value) {
|
|
138
|
+
return typeof value === "string" ? value : void 0;
|
|
139
|
+
}
|
|
140
|
+
function getOptionalRecord(value) {
|
|
141
|
+
if (value === null || typeof value !== "object" || Array.isArray(value)) return void 0;
|
|
142
|
+
return value;
|
|
143
|
+
}
|
|
144
|
+
function jsonTextResult(payload) {
|
|
145
|
+
return R.raw(payload);
|
|
146
|
+
}
|
|
147
|
+
//#endregion
|
|
148
|
+
//#region src/server/domains/workflow/handlers/script-handlers.ts
|
|
149
|
+
/**
|
|
150
|
+
* Script management and extension workflow sub-handler.
|
|
151
|
+
*/
|
|
152
|
+
var ScriptHandlers = class {
|
|
153
|
+
state;
|
|
154
|
+
constructor(state) {
|
|
155
|
+
this.state = state;
|
|
156
|
+
}
|
|
157
|
+
async handlePageScriptRegister(args) {
|
|
158
|
+
const name = getOptionalString(args.name);
|
|
159
|
+
const code = getOptionalString(args.code);
|
|
160
|
+
const description = getOptionalString(args.description) ?? "";
|
|
161
|
+
if (!name || !code) return jsonTextResult({
|
|
162
|
+
success: false,
|
|
163
|
+
error: "name and code are required"
|
|
164
|
+
});
|
|
165
|
+
const isUpdate = this.state.scriptRegistry.has(name);
|
|
166
|
+
if (!isUpdate && this.state.scriptRegistry.size >= WORKFLOW_CONSTANTS.MAX_SCRIPTS) {
|
|
167
|
+
for (const [scriptName, entry] of this.state.scriptRegistry) if (!entry.protectedFromEviction) {
|
|
168
|
+
this.state.scriptRegistry.delete(scriptName);
|
|
169
|
+
break;
|
|
170
|
+
}
|
|
171
|
+
}
|
|
172
|
+
const existingEntry = this.state.scriptRegistry.get(name);
|
|
173
|
+
this.state.scriptRegistry.set(name, {
|
|
174
|
+
code,
|
|
175
|
+
description,
|
|
176
|
+
source: existingEntry?.source ?? "user",
|
|
177
|
+
protectedFromEviction: existingEntry?.protectedFromEviction ?? false
|
|
178
|
+
});
|
|
179
|
+
return jsonTextResult({
|
|
180
|
+
success: true,
|
|
181
|
+
action: isUpdate ? "updated" : "registered",
|
|
182
|
+
name,
|
|
183
|
+
description,
|
|
184
|
+
totalScripts: this.state.scriptRegistry.size,
|
|
185
|
+
available: Array.from(this.state.scriptRegistry.keys())
|
|
186
|
+
});
|
|
187
|
+
}
|
|
188
|
+
async handlePageScriptRun(args) {
|
|
189
|
+
const name = getOptionalString(args.name);
|
|
190
|
+
const params = getOptionalRecord(args.params);
|
|
191
|
+
const entry = name ? this.state.scriptRegistry.get(name) : void 0;
|
|
192
|
+
if (!entry) {
|
|
193
|
+
const available = Array.from(this.state.scriptRegistry.keys());
|
|
194
|
+
return jsonTextResult({
|
|
195
|
+
success: false,
|
|
196
|
+
error: `Script "${name}" not found`,
|
|
197
|
+
available
|
|
198
|
+
});
|
|
199
|
+
}
|
|
200
|
+
let codeToRun;
|
|
201
|
+
if (params !== void 0) codeToRun = `(function(){const __params__=JSON.parse(${escapeInlineScriptLiteral(JSON.stringify(JSON.stringify(params)))});return(${entry.code});})()`;
|
|
202
|
+
else codeToRun = entry.code;
|
|
203
|
+
try {
|
|
204
|
+
return await this.state.deps.browserHandlers.handlePageEvaluate({ code: codeToRun });
|
|
205
|
+
} catch (error) {
|
|
206
|
+
logger.error(`[page_script_run] Script "${name}" failed:`, error);
|
|
207
|
+
return jsonTextResult({
|
|
208
|
+
success: false,
|
|
209
|
+
script: name,
|
|
210
|
+
error: error instanceof Error ? error.message : String(error)
|
|
211
|
+
});
|
|
212
|
+
}
|
|
213
|
+
}
|
|
214
|
+
async handleListExtensionWorkflows() {
|
|
215
|
+
const ctx = this.state.deps.serverContext;
|
|
216
|
+
if (!ctx) return jsonTextResult({
|
|
217
|
+
success: false,
|
|
218
|
+
error: "Extension workflow runtime is unavailable in this handler context"
|
|
219
|
+
});
|
|
220
|
+
const { ensureWorkflowsLoaded } = await import("./ExtensionManager-CWYgw0YW.mjs").then((n) => n.t);
|
|
221
|
+
await ensureWorkflowsLoaded(ctx);
|
|
222
|
+
const workflows = [...ctx.extensionWorkflowsById.values()].filter((record) => record.route?.kind !== "preset");
|
|
223
|
+
workflows.sort((a, b) => a.id.localeCompare(b.id));
|
|
224
|
+
const serializedWorkflows = workflows.map((record) => ({
|
|
225
|
+
id: record.id,
|
|
226
|
+
displayName: record.displayName,
|
|
227
|
+
description: record.description,
|
|
228
|
+
tags: record.tags,
|
|
229
|
+
timeoutMs: record.timeoutMs,
|
|
230
|
+
defaultMaxConcurrency: record.defaultMaxConcurrency,
|
|
231
|
+
source: record.source,
|
|
232
|
+
route: record.route ? {
|
|
233
|
+
kind: record.route.kind,
|
|
234
|
+
priority: record.route.priority,
|
|
235
|
+
requiredDomains: record.route.requiredDomains,
|
|
236
|
+
triggerPatterns: record.route.triggerPatterns.map((pattern) => pattern.source),
|
|
237
|
+
steps: record.route.steps
|
|
238
|
+
} : void 0
|
|
239
|
+
}));
|
|
240
|
+
return jsonTextResult({
|
|
241
|
+
success: true,
|
|
242
|
+
count: serializedWorkflows.length,
|
|
243
|
+
workflows: serializedWorkflows
|
|
244
|
+
});
|
|
245
|
+
}
|
|
246
|
+
async handleRunExtensionWorkflow(args) {
|
|
247
|
+
const ctx = this.state.deps.serverContext;
|
|
248
|
+
if (!ctx) return jsonTextResult({
|
|
249
|
+
success: false,
|
|
250
|
+
error: "Extension workflow runtime is unavailable in this handler context"
|
|
251
|
+
});
|
|
252
|
+
const workflowId = getOptionalString(args.workflowId) ?? getOptionalString(args.id);
|
|
253
|
+
if (!workflowId) return jsonTextResult({
|
|
254
|
+
success: false,
|
|
255
|
+
error: "workflowId is required"
|
|
256
|
+
});
|
|
257
|
+
const { ensureWorkflowsLoaded } = await import("./ExtensionManager-CWYgw0YW.mjs").then((n) => n.t);
|
|
258
|
+
await ensureWorkflowsLoaded(ctx);
|
|
259
|
+
const runtimeRecord = ctx.extensionWorkflowRuntimeById.get(workflowId);
|
|
260
|
+
if (!runtimeRecord) {
|
|
261
|
+
const available = [...ctx.extensionWorkflowsById.values()].filter((record) => record.route?.kind !== "preset").map((record) => record.id);
|
|
262
|
+
available.sort((a, b) => a.localeCompare(b));
|
|
263
|
+
return jsonTextResult({
|
|
264
|
+
success: false,
|
|
265
|
+
error: `Extension workflow "${workflowId}" not found`,
|
|
266
|
+
available
|
|
267
|
+
});
|
|
268
|
+
}
|
|
269
|
+
if (runtimeRecord.route?.kind === "preset") return jsonTextResult({
|
|
270
|
+
success: false,
|
|
271
|
+
workflowId,
|
|
272
|
+
error: `Extension workflow "${workflowId}" is a routing preset and cannot be executed directly. Use route_tool or the suggested preset steps instead.`
|
|
273
|
+
});
|
|
274
|
+
const profile = getOptionalString(args.profile);
|
|
275
|
+
const config = getOptionalRecord(args.config);
|
|
276
|
+
const nodeInputOverrides = argObject(args, "nodeInputOverrides");
|
|
277
|
+
const timeoutMs = argNumber(args, "timeoutMs");
|
|
278
|
+
try {
|
|
279
|
+
const { executeExtensionWorkflow } = await import("./WorkflowEngine-CuvkZtWu.mjs").then((n) => n.t);
|
|
280
|
+
return jsonTextResult({
|
|
281
|
+
success: true,
|
|
282
|
+
...await executeExtensionWorkflow(ctx, runtimeRecord.workflow, {
|
|
283
|
+
profile,
|
|
284
|
+
config,
|
|
285
|
+
nodeInputOverrides,
|
|
286
|
+
timeoutMs
|
|
287
|
+
})
|
|
288
|
+
});
|
|
289
|
+
} catch (error) {
|
|
290
|
+
logger.error(`[run_extension_workflow] Workflow "${workflowId}" failed:`, error);
|
|
291
|
+
return jsonTextResult({
|
|
292
|
+
success: false,
|
|
293
|
+
workflowId,
|
|
294
|
+
error: error instanceof Error ? error.message : String(error)
|
|
295
|
+
});
|
|
296
|
+
}
|
|
297
|
+
}
|
|
298
|
+
};
|
|
299
|
+
//#endregion
|
|
300
|
+
//#region src/server/domains/workflow/handlers/network-policy.ts
|
|
301
|
+
/**
|
|
302
|
+
* Workflow network policy — SSRF-aware URL authorization.
|
|
303
|
+
*/
|
|
304
|
+
function normalizeWorkflowHostname(host) {
|
|
305
|
+
return host.trim().replace(/^\[|\]$/g, "").toLowerCase();
|
|
306
|
+
}
|
|
307
|
+
function parseWorkflowStringArray(raw) {
|
|
308
|
+
if (raw === void 0) return [];
|
|
309
|
+
const parsed = typeof raw === "string" ? (() => {
|
|
310
|
+
try {
|
|
311
|
+
return JSON.parse(raw);
|
|
312
|
+
} catch {
|
|
313
|
+
return null;
|
|
314
|
+
}
|
|
315
|
+
})() : raw;
|
|
316
|
+
if (!Array.isArray(parsed)) return null;
|
|
317
|
+
const values = parsed.filter((entry) => typeof entry === "string");
|
|
318
|
+
if (values.length !== parsed.length) return null;
|
|
319
|
+
return values.map((entry) => entry.trim()).filter((entry) => entry.length > 0);
|
|
320
|
+
}
|
|
321
|
+
function normalizeWorkflowHostPattern(raw) {
|
|
322
|
+
const trimmed = raw.trim();
|
|
323
|
+
const candidate = trimmed.includes("://") ? trimmed : `http://${trimmed}`;
|
|
324
|
+
try {
|
|
325
|
+
const parsed = new URL(candidate);
|
|
326
|
+
if (parsed.port.length > 0) return {
|
|
327
|
+
scope: "host",
|
|
328
|
+
value: parsed.host.toLowerCase()
|
|
329
|
+
};
|
|
330
|
+
return {
|
|
331
|
+
scope: "hostname",
|
|
332
|
+
value: normalizeWorkflowHostname(parsed.hostname)
|
|
333
|
+
};
|
|
334
|
+
} catch {
|
|
335
|
+
return {
|
|
336
|
+
scope: "hostname",
|
|
337
|
+
value: normalizeWorkflowHostname(trimmed)
|
|
338
|
+
};
|
|
339
|
+
}
|
|
340
|
+
}
|
|
341
|
+
function parseWorkflowBoolean(raw, fieldName) {
|
|
342
|
+
if (raw === void 0) return {
|
|
343
|
+
ok: true,
|
|
344
|
+
value: false
|
|
345
|
+
};
|
|
346
|
+
if (typeof raw !== "boolean") return {
|
|
347
|
+
ok: false,
|
|
348
|
+
error: `${fieldName} must be a boolean when provided`
|
|
349
|
+
};
|
|
350
|
+
return {
|
|
351
|
+
ok: true,
|
|
352
|
+
value: raw
|
|
353
|
+
};
|
|
354
|
+
}
|
|
355
|
+
function parseWorkflowNetworkPolicy(args) {
|
|
356
|
+
const rawNetworkPolicy = args.networkPolicy;
|
|
357
|
+
if (rawNetworkPolicy === void 0) return { policy: {
|
|
358
|
+
allowPrivateNetwork: false,
|
|
359
|
+
allowInsecureHttp: false,
|
|
360
|
+
allowedHosts: [],
|
|
361
|
+
allowedRedirectHosts: [],
|
|
362
|
+
allowedCidrs: [],
|
|
363
|
+
allowedCidrBlockList: new BlockList()
|
|
364
|
+
} };
|
|
365
|
+
const parsedInput = typeof rawNetworkPolicy === "string" ? (() => {
|
|
366
|
+
try {
|
|
367
|
+
return JSON.parse(rawNetworkPolicy);
|
|
368
|
+
} catch {
|
|
369
|
+
return null;
|
|
370
|
+
}
|
|
371
|
+
})() : rawNetworkPolicy;
|
|
372
|
+
if (!parsedInput || typeof parsedInput !== "object" || Array.isArray(parsedInput)) return { error: "networkPolicy must be an object or valid JSON object string" };
|
|
373
|
+
const record = parsedInput;
|
|
374
|
+
const allowPrivateNetwork = parseWorkflowBoolean(record.allowPrivateNetwork, "networkPolicy.allowPrivateNetwork");
|
|
375
|
+
if (!allowPrivateNetwork.ok) return { error: allowPrivateNetwork.error };
|
|
376
|
+
const allowInsecureHttp = parseWorkflowBoolean(record.allowInsecureHttp, "networkPolicy.allowInsecureHttp");
|
|
377
|
+
if (!allowInsecureHttp.ok) return { error: allowInsecureHttp.error };
|
|
378
|
+
const allowedHosts = parseWorkflowStringArray(record.allowedHosts);
|
|
379
|
+
if (allowedHosts === null) return { error: "networkPolicy.allowedHosts must be an array of strings" };
|
|
380
|
+
const allowedRedirectHosts = parseWorkflowStringArray(record.allowedRedirectHosts);
|
|
381
|
+
if (allowedRedirectHosts === null) return { error: "networkPolicy.allowedRedirectHosts must be an array of strings" };
|
|
382
|
+
const allowedCidrs = parseWorkflowStringArray(record.allowedCidrs);
|
|
383
|
+
if (allowedCidrs === null) return { error: "networkPolicy.allowedCidrs must be an array of strings" };
|
|
384
|
+
const allowedCidrBlockList = new BlockList();
|
|
385
|
+
for (const cidr of allowedCidrs) {
|
|
386
|
+
const [address, prefixRaw] = cidr.split("/");
|
|
387
|
+
if (!address || !prefixRaw) return { error: `Invalid CIDR in networkPolicy.allowedCidrs: "${cidr}"` };
|
|
388
|
+
const family = isIP(address);
|
|
389
|
+
if (family === 0) return { error: `Invalid CIDR base address in networkPolicy.allowedCidrs: "${cidr}"` };
|
|
390
|
+
const prefix = Number(prefixRaw);
|
|
391
|
+
const maxPrefix = family === 4 ? 32 : 128;
|
|
392
|
+
if (!Number.isInteger(prefix) || prefix < 0 || prefix > maxPrefix) return { error: `Invalid CIDR prefix in networkPolicy.allowedCidrs: "${cidr}"` };
|
|
393
|
+
allowedCidrBlockList.addSubnet(address, prefix, family === 4 ? "ipv4" : "ipv6");
|
|
394
|
+
}
|
|
395
|
+
return { policy: {
|
|
396
|
+
allowPrivateNetwork: allowPrivateNetwork.value,
|
|
397
|
+
allowInsecureHttp: allowInsecureHttp.value,
|
|
398
|
+
allowedHosts: allowedHosts.map(normalizeWorkflowHostPattern),
|
|
399
|
+
allowedRedirectHosts: allowedRedirectHosts.map(normalizeWorkflowHostPattern),
|
|
400
|
+
allowedCidrs,
|
|
401
|
+
allowedCidrBlockList
|
|
402
|
+
} };
|
|
403
|
+
}
|
|
404
|
+
async function authorizeWorkflowUrl(targetUrl, policy, options) {
|
|
405
|
+
let parsedUrl;
|
|
406
|
+
try {
|
|
407
|
+
parsedUrl = new URL(targetUrl);
|
|
408
|
+
} catch {
|
|
409
|
+
throw new Error(`Invalid ${options.label}: ${targetUrl}`);
|
|
410
|
+
}
|
|
411
|
+
if (parsedUrl.protocol !== "http:" && parsedUrl.protocol !== "https:") throw new Error(`Unsupported protocol for ${options.label}: ${parsedUrl.protocol} — only http/https allowed`);
|
|
412
|
+
const normalizedHostname = normalizeWorkflowHostname(parsedUrl.hostname);
|
|
413
|
+
const parsedHost = parsedUrl.host.toLowerCase();
|
|
414
|
+
const ipFamily = isIP(normalizedHostname);
|
|
415
|
+
const resolvedIp = ipFamily !== 0 ? normalizedHostname : await lookup(normalizedHostname).then((result) => result.address).catch((error) => {
|
|
416
|
+
throw new Error(`DNS resolution failed for "${targetUrl}"`, { cause: error });
|
|
417
|
+
});
|
|
418
|
+
const resolvedFamily = isIP(resolvedIp);
|
|
419
|
+
const matchesAllowedCidr = resolvedFamily !== 0 && policy.allowedCidrs.length > 0 && policy.allowedCidrBlockList.check(resolvedIp, resolvedFamily === 4 ? "ipv4" : "ipv6");
|
|
420
|
+
const hostPatterns = options.allowRedirectHosts && policy.allowedRedirectHosts.length > 0 ? policy.allowedRedirectHosts : policy.allowedHosts;
|
|
421
|
+
const matchesAllowedHost = hostPatterns.some((pattern) => pattern.scope === "host" ? pattern.value === parsedHost : pattern.value === normalizedHostname);
|
|
422
|
+
const hasHostOrCidrRules = hostPatterns.length > 0 || policy.allowedCidrs.length > 0;
|
|
423
|
+
const isAuthorizedTarget = !hasHostOrCidrRules || matchesAllowedHost || matchesAllowedCidr;
|
|
424
|
+
if (isPrivateHost(normalizedHostname) || isPrivateHost(resolvedIp)) {
|
|
425
|
+
if (!policy.allowPrivateNetwork) throw new Error(`Blocked: ${options.label} "${targetUrl}" resolves to a private/reserved address`);
|
|
426
|
+
if (!hasHostOrCidrRules || !isAuthorizedTarget) throw new Error(`Blocked: ${options.label} "${targetUrl}" requires an explicit networkPolicy host or CIDR allow rule`);
|
|
427
|
+
} else if (hasHostOrCidrRules && !isAuthorizedTarget) throw new Error(`Blocked: ${options.label} "${targetUrl}" is not authorized by networkPolicy`);
|
|
428
|
+
const loopbackTarget = isLoopbackHost(normalizedHostname) || isLoopbackHost(resolvedIp);
|
|
429
|
+
if (parsedUrl.protocol === "http:" && !loopbackTarget) {
|
|
430
|
+
if (!policy.allowInsecureHttp) throw new Error(`Blocked: insecure HTTP requires networkPolicy.allowInsecureHttp for "${targetUrl}"`);
|
|
431
|
+
if (!hasHostOrCidrRules || !isAuthorizedTarget) throw new Error(`Blocked: insecure HTTP target "${targetUrl}" requires an explicit networkPolicy host or CIDR allow rule`);
|
|
432
|
+
}
|
|
433
|
+
const fetchHeaders = {};
|
|
434
|
+
let fetchUrl = parsedUrl.toString();
|
|
435
|
+
if (options.rewriteHttpHostToResolvedIp && parsedUrl.protocol === "http:" && ipFamily === 0) {
|
|
436
|
+
const originalHost = parsedUrl.host;
|
|
437
|
+
const pinnedUrl = new URL(parsedUrl.toString());
|
|
438
|
+
pinnedUrl.hostname = resolvedIp.includes(":") ? `[${resolvedIp}]` : resolvedIp;
|
|
439
|
+
fetchUrl = pinnedUrl.toString();
|
|
440
|
+
fetchHeaders.Host = originalHost;
|
|
441
|
+
}
|
|
442
|
+
return {
|
|
443
|
+
parsedUrl,
|
|
444
|
+
resolvedIp,
|
|
445
|
+
fetchUrl,
|
|
446
|
+
headers: fetchHeaders
|
|
447
|
+
};
|
|
448
|
+
}
|
|
449
|
+
//#endregion
|
|
450
|
+
//#region src/server/domains/workflow/handlers/api-handlers.ts
|
|
451
|
+
/**
|
|
452
|
+
* API probe sub-handler.
|
|
453
|
+
*/
|
|
454
|
+
var ApiHandlers = class {
|
|
455
|
+
state;
|
|
456
|
+
constructor(state) {
|
|
457
|
+
this.state = state;
|
|
458
|
+
}
|
|
459
|
+
async handleApiProbeBatch(args) {
|
|
460
|
+
const rawBaseUrl = typeof args.baseUrl === "string" ? args.baseUrl.trim() : "";
|
|
461
|
+
if (rawBaseUrl.length === 0) return R.fail("baseUrl is required and must be a non-empty string").json();
|
|
462
|
+
const policyResult = parseWorkflowNetworkPolicy(args);
|
|
463
|
+
if (!policyResult.policy) return R.fail(policyResult.error).json();
|
|
464
|
+
let normalizedBaseUrl;
|
|
465
|
+
let authorizationHeaders = {};
|
|
466
|
+
try {
|
|
467
|
+
const authorization = await authorizeWorkflowUrl(rawBaseUrl, policyResult.policy, {
|
|
468
|
+
label: "baseUrl",
|
|
469
|
+
rewriteHttpHostToResolvedIp: true
|
|
470
|
+
});
|
|
471
|
+
normalizedBaseUrl = authorization.fetchUrl.replace(/\/$/, "");
|
|
472
|
+
authorizationHeaders = authorization.headers;
|
|
473
|
+
} catch (error) {
|
|
474
|
+
return R.fail(error).json();
|
|
475
|
+
}
|
|
476
|
+
const baseUrl = normalizedBaseUrl;
|
|
477
|
+
const rawPaths = args.paths;
|
|
478
|
+
const paths = Array.isArray(rawPaths) ? rawPaths : typeof rawPaths === "string" ? (() => {
|
|
479
|
+
try {
|
|
480
|
+
return JSON.parse(rawPaths);
|
|
481
|
+
} catch {
|
|
482
|
+
return [];
|
|
483
|
+
}
|
|
484
|
+
})() : [];
|
|
485
|
+
const method = (argString(args, "method") ?? "GET").toUpperCase();
|
|
486
|
+
const extraHeaders = argObject(args, "headers") ?? {};
|
|
487
|
+
const bodyTemplate = argString(args, "bodyTemplate") ?? null;
|
|
488
|
+
const includeBodyStatuses = Array.isArray(args.includeBodyStatuses) ? args.includeBodyStatuses.filter((v) => typeof v === "number") : [
|
|
489
|
+
200,
|
|
490
|
+
201,
|
|
491
|
+
204
|
|
492
|
+
];
|
|
493
|
+
const maxBodySnippetLength = Math.max(0, Math.min(argNumber(args, "maxBodySnippetLength", 500), 1e4));
|
|
494
|
+
const autoInjectAuth = argBool(args, "autoInjectAuth", true);
|
|
495
|
+
if (!paths || paths.length === 0) return R.fail("paths array is required and must not be empty").json();
|
|
496
|
+
const probeCode = `(async function() {
|
|
497
|
+
var baseUrl = ${JSON.stringify(baseUrl)};
|
|
498
|
+
var paths = ${JSON.stringify(paths)};
|
|
499
|
+
var method = ${JSON.stringify(method)};
|
|
500
|
+
var extraHeaders = ${JSON.stringify(extraHeaders)};
|
|
501
|
+
var includeBodyStatuses = ${JSON.stringify(includeBodyStatuses)};
|
|
502
|
+
var maxSnippetLen = ${JSON.stringify(maxBodySnippetLength)};
|
|
503
|
+
var autoInjectAuth = ${JSON.stringify(autoInjectAuth)};
|
|
504
|
+
var bodyTemplate = ${JSON.stringify(bodyTemplate)};
|
|
505
|
+
var authHeaders = ${JSON.stringify(authorizationHeaders)};
|
|
506
|
+
var headers = Object.assign({'Content-Type':'application/json'}, extraHeaders, authHeaders);
|
|
507
|
+
if (autoInjectAuth) {
|
|
508
|
+
var token = localStorage.getItem('token') || localStorage.getItem('active_token') || localStorage.getItem('access_token');
|
|
509
|
+
if (token) headers['Authorization'] = 'Bearer ' + token;
|
|
510
|
+
}
|
|
511
|
+
var results = {};
|
|
512
|
+
async function probePath(path) {
|
|
513
|
+
try {
|
|
514
|
+
var opts = {method: method, headers: headers, redirect: 'error'};
|
|
515
|
+
if (bodyTemplate && (method === 'POST' || method === 'PUT' || method === 'PATCH')) {
|
|
516
|
+
opts.body = bodyTemplate;
|
|
517
|
+
}
|
|
518
|
+
var resp = await fetch(baseUrl + path, opts);
|
|
519
|
+
var ct = resp.headers.get('content-type') || '';
|
|
520
|
+
var snippet = null;
|
|
521
|
+
if (includeBodyStatuses.indexOf(resp.status) !== -1) {
|
|
522
|
+
var text = await resp.text();
|
|
523
|
+
if (!ct.includes('text/html') && !ct.includes('application/xml')) {
|
|
524
|
+
snippet = text.length > maxSnippetLen ? text.slice(0, maxSnippetLen) + '...[truncated]' : text;
|
|
525
|
+
} else {
|
|
526
|
+
snippet = '[HTML/XML response suppressed]';
|
|
527
|
+
}
|
|
528
|
+
}
|
|
529
|
+
return [path, {status: resp.status, contentType: ct.split(';')[0].trim(), snippet: snippet}];
|
|
530
|
+
} catch(e) {
|
|
531
|
+
return [path, {status: -1, error: e instanceof Error ? e.message : String(e)}];
|
|
532
|
+
}
|
|
533
|
+
}
|
|
534
|
+
var nextIndex = 0;
|
|
535
|
+
var maxConcurrency = Math.min(paths.length, 6);
|
|
536
|
+
await Promise.all(Array.from({ length: maxConcurrency }, async function() {
|
|
537
|
+
while (nextIndex < paths.length) {
|
|
538
|
+
var currentIndex = nextIndex++;
|
|
539
|
+
var currentPath = paths[currentIndex];
|
|
540
|
+
var entry = await probePath(currentPath);
|
|
541
|
+
results[entry[0]] = entry[1];
|
|
542
|
+
}
|
|
543
|
+
}));
|
|
544
|
+
return {probed: paths.length, method: method, baseUrl: baseUrl, results: results};
|
|
545
|
+
})()`;
|
|
546
|
+
try {
|
|
547
|
+
const resp = await this.state.deps.browserHandlers.handlePageEvaluate({ code: probeCode });
|
|
548
|
+
const data = R.parse(resp);
|
|
549
|
+
return R.ok().merge(data).json();
|
|
550
|
+
} catch (error) {
|
|
551
|
+
logger.error("[api_probe_batch] Error:", error);
|
|
552
|
+
return R.fail(error).json();
|
|
553
|
+
}
|
|
554
|
+
}
|
|
555
|
+
};
|
|
556
|
+
//#endregion
|
|
557
|
+
//#region src/server/domains/workflow/handlers/account-handlers.ts
|
|
558
|
+
/**
|
|
559
|
+
* JS bundle search sub-handler.
|
|
560
|
+
*/
|
|
561
|
+
var AccountHandlers = class {
|
|
562
|
+
state;
|
|
563
|
+
constructor(state) {
|
|
564
|
+
this.state = state;
|
|
565
|
+
}
|
|
566
|
+
async handleJsBundleSearch(args) {
|
|
567
|
+
const url = argString(args, "url", "");
|
|
568
|
+
const rawPatterns = args.patterns;
|
|
569
|
+
const patterns = Array.isArray(rawPatterns) ? rawPatterns : typeof rawPatterns === "string" ? (() => {
|
|
570
|
+
try {
|
|
571
|
+
return JSON.parse(rawPatterns);
|
|
572
|
+
} catch {
|
|
573
|
+
return [];
|
|
574
|
+
}
|
|
575
|
+
})() : [];
|
|
576
|
+
const cacheBundle = argBool(args, "cacheBundle", true);
|
|
577
|
+
const stripNoise = argBool(args, "stripNoise", true);
|
|
578
|
+
const maxMatches = argNumber(args, "maxMatches", 10);
|
|
579
|
+
const policyResult = parseWorkflowNetworkPolicy(args);
|
|
580
|
+
if (!url || !patterns || patterns.length === 0) return R.fail("url and patterns are required").json();
|
|
581
|
+
if (!policyResult.policy) return R.fail(policyResult.error).json();
|
|
582
|
+
const networkPolicy = policyResult.policy;
|
|
583
|
+
const MAX_BUNDLE_SIZE = WORKFLOW_JS_BUNDLE_MAX_SIZE_BYTES;
|
|
584
|
+
const MAX_REDIRECTS = WORKFLOW_JS_BUNDLE_MAX_REDIRECTS;
|
|
585
|
+
const safeFetch = async (targetUrl, signal) => {
|
|
586
|
+
let currentUrl = targetUrl;
|
|
587
|
+
for (let hops = 0; hops < MAX_REDIRECTS; hops++) {
|
|
588
|
+
const authorization = await authorizeWorkflowUrl(currentUrl, networkPolicy, {
|
|
589
|
+
label: hops === 0 ? "bundle URL" : "redirect target",
|
|
590
|
+
allowRedirectHosts: hops > 0,
|
|
591
|
+
rewriteHttpHostToResolvedIp: true
|
|
592
|
+
});
|
|
593
|
+
const resp = await fetch(authorization.fetchUrl, {
|
|
594
|
+
signal,
|
|
595
|
+
redirect: "manual",
|
|
596
|
+
headers: authorization.headers
|
|
597
|
+
});
|
|
598
|
+
if (resp.status >= 300 && resp.status < 400) {
|
|
599
|
+
const location = resp.headers.get("location");
|
|
600
|
+
if (!location) throw new Error(`Redirect ${resp.status} without Location header`);
|
|
601
|
+
currentUrl = new URL(location, currentUrl).toString();
|
|
602
|
+
continue;
|
|
603
|
+
}
|
|
604
|
+
return resp;
|
|
605
|
+
}
|
|
606
|
+
throw new Error(`Too many redirects (>${MAX_REDIRECTS})`);
|
|
607
|
+
};
|
|
608
|
+
let bundleText;
|
|
609
|
+
let fromCache = false;
|
|
610
|
+
try {
|
|
611
|
+
if (cacheBundle) {
|
|
612
|
+
const cached = this.state.bundleCache.get(url);
|
|
613
|
+
if (cached && Date.now() - cached.cachedAt < WORKFLOW_CONSTANTS.BUNDLE_CACHE_TTL_MS) {
|
|
614
|
+
bundleText = cached.text;
|
|
615
|
+
fromCache = true;
|
|
616
|
+
} else {
|
|
617
|
+
const controller = new AbortController();
|
|
618
|
+
const timeoutId = setTimeout(() => controller.abort(), WORKFLOW_JS_BUNDLE_FETCH_TIMEOUT_MS);
|
|
619
|
+
try {
|
|
620
|
+
const resp = await safeFetch(url, controller.signal);
|
|
621
|
+
if (!resp.ok) return R.fail(`Fetch failed: ${resp.status} ${resp.statusText}`).merge({ url }).json();
|
|
622
|
+
bundleText = await resp.text();
|
|
623
|
+
if (bundleText.length > MAX_BUNDLE_SIZE) return R.fail(`Response too large: ${bundleText.length} bytes exceeds ${MAX_BUNDLE_SIZE} limit`).merge({ url }).json();
|
|
624
|
+
evictBundleCache(this.state);
|
|
625
|
+
this.state.bundleCache.set(url, {
|
|
626
|
+
text: bundleText,
|
|
627
|
+
cachedAt: Date.now()
|
|
628
|
+
});
|
|
629
|
+
this.state.bundleCacheBytes += bundleText.length;
|
|
630
|
+
} finally {
|
|
631
|
+
clearTimeout(timeoutId);
|
|
632
|
+
}
|
|
633
|
+
}
|
|
634
|
+
} else {
|
|
635
|
+
const controller = new AbortController();
|
|
636
|
+
const timeoutId = setTimeout(() => controller.abort(), 3e4);
|
|
637
|
+
try {
|
|
638
|
+
const resp = await safeFetch(url, controller.signal);
|
|
639
|
+
if (!resp.ok) return R.fail(`Fetch failed: ${resp.status} ${resp.statusText}`).merge({ url }).json();
|
|
640
|
+
bundleText = await resp.text();
|
|
641
|
+
if (bundleText.length > MAX_BUNDLE_SIZE) return R.fail(`Response too large: ${bundleText.length} bytes exceeds ${MAX_BUNDLE_SIZE} limit`).merge({ url }).json();
|
|
642
|
+
} finally {
|
|
643
|
+
clearTimeout(timeoutId);
|
|
644
|
+
}
|
|
645
|
+
}
|
|
646
|
+
} catch (fetchError) {
|
|
647
|
+
return R.fail(fetchError).merge({ url }).json();
|
|
648
|
+
}
|
|
649
|
+
const results = {};
|
|
650
|
+
for (const pattern of patterns) {
|
|
651
|
+
const contextBefore = pattern.contextBefore ?? 80;
|
|
652
|
+
const contextAfter = pattern.contextAfter ?? 80;
|
|
653
|
+
let re;
|
|
654
|
+
try {
|
|
655
|
+
re = new RegExp(pattern.regex, "g");
|
|
656
|
+
} catch (e) {
|
|
657
|
+
results[pattern.name] = [{
|
|
658
|
+
match: "",
|
|
659
|
+
index: -1,
|
|
660
|
+
context: `Invalid regex: ${e instanceof Error ? e.message : String(e)}`
|
|
661
|
+
}];
|
|
662
|
+
continue;
|
|
663
|
+
}
|
|
664
|
+
const matches = [];
|
|
665
|
+
let m;
|
|
666
|
+
while ((m = re.exec(bundleText)) !== null) {
|
|
667
|
+
const s = Math.max(0, m.index - contextBefore);
|
|
668
|
+
const e = Math.min(bundleText.length, m.index + m[0].length + contextAfter);
|
|
669
|
+
const ctx = bundleText.slice(s, e);
|
|
670
|
+
if (stripNoise) {
|
|
671
|
+
if (/[Mm]\d{1,6}(?:\.\d+)?[, ]\d{1,6}(?:\.\d+)?[CLHVSQTAZclhvsqtaz]/.test(ctx)) continue;
|
|
672
|
+
if (/data:[a-z+-]+\/[a-z+-]+;base64,/i.test(ctx)) continue;
|
|
673
|
+
if (ctx.replace(/[^A-Za-z0-9+/=]/g, "").length > ctx.length * .85 && ctx.length > 200) continue;
|
|
674
|
+
}
|
|
675
|
+
matches.push({
|
|
676
|
+
match: m[0],
|
|
677
|
+
index: m.index,
|
|
678
|
+
context: ctx
|
|
679
|
+
});
|
|
680
|
+
if (matches.length >= maxMatches) break;
|
|
681
|
+
}
|
|
682
|
+
results[pattern.name] = matches;
|
|
683
|
+
}
|
|
684
|
+
return R.ok().merge({
|
|
685
|
+
bundleUrl: url,
|
|
686
|
+
bundleSize: bundleText.length,
|
|
687
|
+
cached: fromCache,
|
|
688
|
+
patternsSearched: patterns.length,
|
|
689
|
+
results
|
|
690
|
+
}).json();
|
|
691
|
+
}
|
|
692
|
+
};
|
|
693
|
+
//#endregion
|
|
694
|
+
//#region src/server/domains/workflow/handlers.impl.core.ts
|
|
695
|
+
var WorkflowHandlers = class {
|
|
696
|
+
scripts;
|
|
697
|
+
api;
|
|
698
|
+
account;
|
|
699
|
+
constructor(deps) {
|
|
700
|
+
const state = createWorkflowSharedState(deps);
|
|
701
|
+
this.scripts = new ScriptHandlers(state);
|
|
702
|
+
this.api = new ApiHandlers(state);
|
|
703
|
+
this.account = new AccountHandlers(state);
|
|
704
|
+
}
|
|
705
|
+
handlePageScriptRegister(args) {
|
|
706
|
+
return this.scripts.handlePageScriptRegister(args);
|
|
707
|
+
}
|
|
708
|
+
handlePageScriptRun(args) {
|
|
709
|
+
return this.scripts.handlePageScriptRun(args);
|
|
710
|
+
}
|
|
711
|
+
handleListExtensionWorkflows() {
|
|
712
|
+
return this.scripts.handleListExtensionWorkflows();
|
|
713
|
+
}
|
|
714
|
+
handleRunExtensionWorkflow(args) {
|
|
715
|
+
return this.scripts.handleRunExtensionWorkflow(args);
|
|
716
|
+
}
|
|
717
|
+
handleApiProbeBatch(args) {
|
|
718
|
+
return this.api.handleApiProbeBatch(args);
|
|
719
|
+
}
|
|
720
|
+
handleJsBundleSearch(args) {
|
|
721
|
+
return this.account.handleJsBundleSearch(args);
|
|
722
|
+
}
|
|
723
|
+
};
|
|
724
|
+
//#endregion
|
|
725
|
+
export { WorkflowHandlers };
|