@juspay/neurolink 9.14.0 → 9.15.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +6 -0
- package/README.md +15 -15
- package/dist/auth/anthropicOAuth.d.ts +377 -0
- package/dist/auth/anthropicOAuth.js +914 -0
- package/dist/auth/index.d.ts +20 -0
- package/dist/auth/index.js +29 -0
- package/dist/auth/tokenStore.d.ts +225 -0
- package/dist/auth/tokenStore.js +521 -0
- package/dist/cli/commands/auth.d.ts +50 -0
- package/dist/cli/commands/auth.js +1115 -0
- package/dist/cli/factories/authCommandFactory.d.ts +52 -0
- package/dist/cli/factories/authCommandFactory.js +146 -0
- package/dist/cli/factories/commandFactory.d.ts +6 -0
- package/dist/cli/factories/commandFactory.js +92 -2
- package/dist/cli/parser.js +11 -2
- package/dist/constants/enums.d.ts +20 -0
- package/dist/constants/enums.js +30 -0
- package/dist/constants/index.d.ts +3 -1
- package/dist/constants/index.js +11 -1
- package/dist/index.d.ts +1 -1
- package/dist/lib/auth/anthropicOAuth.d.ts +377 -0
- package/dist/lib/auth/anthropicOAuth.js +915 -0
- package/dist/lib/auth/index.d.ts +20 -0
- package/dist/lib/auth/index.js +30 -0
- package/dist/lib/auth/tokenStore.d.ts +225 -0
- package/dist/lib/auth/tokenStore.js +522 -0
- package/dist/lib/constants/enums.d.ts +20 -0
- package/dist/lib/constants/enums.js +30 -0
- package/dist/lib/constants/index.d.ts +3 -1
- package/dist/lib/constants/index.js +11 -1
- package/dist/lib/index.d.ts +1 -1
- package/dist/lib/models/anthropicModels.d.ts +267 -0
- package/dist/lib/models/anthropicModels.js +528 -0
- package/dist/lib/providers/anthropic.d.ts +123 -2
- package/dist/lib/providers/anthropic.js +800 -10
- package/dist/lib/types/errors.d.ts +62 -0
- package/dist/lib/types/errors.js +107 -0
- package/dist/lib/types/index.d.ts +2 -1
- package/dist/lib/types/index.js +2 -0
- package/dist/lib/types/providers.d.ts +107 -0
- package/dist/lib/types/providers.js +69 -0
- package/dist/lib/types/subscriptionTypes.d.ts +893 -0
- package/dist/lib/types/subscriptionTypes.js +8 -0
- package/dist/lib/utils/providerConfig.d.ts +167 -0
- package/dist/lib/utils/providerConfig.js +619 -9
- package/dist/models/anthropicModels.d.ts +267 -0
- package/dist/models/anthropicModels.js +527 -0
- package/dist/providers/anthropic.d.ts +123 -2
- package/dist/providers/anthropic.js +800 -10
- package/dist/types/errors.d.ts +62 -0
- package/dist/types/errors.js +107 -0
- package/dist/types/index.d.ts +2 -1
- package/dist/types/index.js +2 -0
- package/dist/types/providers.d.ts +107 -0
- package/dist/types/providers.js +69 -0
- package/dist/types/subscriptionTypes.d.ts +893 -0
- package/dist/types/subscriptionTypes.js +7 -0
- package/dist/utils/providerConfig.d.ts +167 -0
- package/dist/utils/providerConfig.js +619 -9
- package/package.json +2 -1
|
@@ -3,7 +3,9 @@
|
|
|
3
3
|
* Consolidated configuration helpers for all AI providers
|
|
4
4
|
* Eliminates duplicate error messages and configuration logic
|
|
5
5
|
* Enhanced with format validation and advanced error classification
|
|
6
|
+
* Extended with Claude subscription OAuth support
|
|
6
7
|
*/
|
|
8
|
+
import { logger } from "./logger.js";
|
|
7
9
|
/**
|
|
8
10
|
* API key format validation patterns (extracted from advanced validation system)
|
|
9
11
|
* Exported for use across the codebase to replace scattered regex patterns
|
|
@@ -18,6 +20,17 @@ export const API_KEY_FORMATS = {
|
|
|
18
20
|
aws: /^[A-Z0-9]{20}$/, // Access Key ID format
|
|
19
21
|
bedrock: /^[A-Z0-9]{20}$/, // AWS access key ID: 20 uppercase alphanumerics
|
|
20
22
|
};
|
|
23
|
+
/**
|
|
24
|
+
* OAuth token format validation patterns
|
|
25
|
+
* These patterns are more flexible as OAuth tokens can vary by provider
|
|
26
|
+
*/
|
|
27
|
+
export const OAUTH_TOKEN_FORMATS = {
|
|
28
|
+
// OAuth access tokens are typically JWT or opaque tokens
|
|
29
|
+
// Claude OAuth access tokens: Bearer tokens with typical JWT structure or opaque format
|
|
30
|
+
"anthropic-access": /^[A-Za-z0-9\-_]+\.[A-Za-z0-9\-_]+\.[A-Za-z0-9\-_]+$|^[A-Za-z0-9\-_]{32,}$/,
|
|
31
|
+
// Refresh tokens are typically longer opaque strings
|
|
32
|
+
"anthropic-refresh": /^[A-Za-z0-9\-_]{32,}$/,
|
|
33
|
+
};
|
|
21
34
|
/**
|
|
22
35
|
* API key length constants to replace scattered magic numbers
|
|
23
36
|
*/
|
|
@@ -166,19 +179,57 @@ export function hasProviderCredentials(envVars) {
|
|
|
166
179
|
// =============================================================================
|
|
167
180
|
/**
|
|
168
181
|
* Creates Anthropic provider configuration
|
|
182
|
+
* Supports both API key and OAuth authentication methods
|
|
169
183
|
*/
|
|
170
184
|
export function createAnthropicConfig() {
|
|
185
|
+
const authMethod = getAnthropicAuthMethod();
|
|
186
|
+
const tier = getAnthropicSubscriptionTier();
|
|
187
|
+
// Base instructions for API key authentication
|
|
188
|
+
const apiKeyInstructions = [
|
|
189
|
+
"🔑 Option 1: API Key Authentication (Recommended for developers)",
|
|
190
|
+
"1. Visit: https://console.anthropic.com/",
|
|
191
|
+
"2. Sign in or create an account",
|
|
192
|
+
"3. Go to API Keys section",
|
|
193
|
+
"4. Create a new API key",
|
|
194
|
+
"5. Set ANTHROPIC_API_KEY in your .env file",
|
|
195
|
+
];
|
|
196
|
+
// OAuth instructions for Claude subscription users
|
|
197
|
+
const oauthInstructions = [
|
|
198
|
+
"",
|
|
199
|
+
"🔐 Option 2: OAuth Authentication (For Claude Pro/Max subscribers)",
|
|
200
|
+
"1. Set ANTHROPIC_AUTH_METHOD=oauth in your .env file",
|
|
201
|
+
"2. Set ANTHROPIC_SUBSCRIPTION_TIER to your tier (free, pro, max)",
|
|
202
|
+
"3. Run the OAuth flow to obtain tokens, or set pre-configured tokens:",
|
|
203
|
+
" - ANTHROPIC_OAUTH_TOKEN=your_access_token",
|
|
204
|
+
" - ANTHROPIC_OAUTH_REFRESH_TOKEN=your_refresh_token (optional)",
|
|
205
|
+
"",
|
|
206
|
+
"📋 Available Subscription Tiers:",
|
|
207
|
+
" - free: Free tier with limited usage",
|
|
208
|
+
" - pro: Claude Pro ($20/month) - Extended usage limits",
|
|
209
|
+
" - max: Claude Max - Highest usage limits",
|
|
210
|
+
" - api: API-based access (pay-per-use)",
|
|
211
|
+
];
|
|
212
|
+
// Choose instructions based on current auth method
|
|
213
|
+
const instructions = authMethod === "oauth"
|
|
214
|
+
? [...oauthInstructions.slice(1), "", ...apiKeyInstructions]
|
|
215
|
+
: [...apiKeyInstructions, ...oauthInstructions];
|
|
171
216
|
return {
|
|
172
217
|
providerName: "Anthropic",
|
|
173
|
-
envVarName: "ANTHROPIC_API_KEY",
|
|
174
|
-
setupUrl: "
|
|
175
|
-
|
|
176
|
-
|
|
177
|
-
|
|
178
|
-
|
|
179
|
-
"
|
|
180
|
-
|
|
181
|
-
|
|
218
|
+
envVarName: authMethod === "oauth" ? "ANTHROPIC_OAUTH_TOKEN" : "ANTHROPIC_API_KEY",
|
|
219
|
+
setupUrl: authMethod === "oauth"
|
|
220
|
+
? "https://claude.ai/settings"
|
|
221
|
+
: "https://console.anthropic.com/",
|
|
222
|
+
description: authMethod === "oauth"
|
|
223
|
+
? `Anthropic OAuth Token (${tier} tier)`
|
|
224
|
+
: "Anthropic API Key",
|
|
225
|
+
instructions,
|
|
226
|
+
fallbackEnvVars: authMethod === "oauth"
|
|
227
|
+
? ["ANTHROPIC_API_KEY"] // Fall back to API key if OAuth token not present
|
|
228
|
+
: [
|
|
229
|
+
"ANTHROPIC_OAUTH_TOKEN",
|
|
230
|
+
"CLAUDE_OAUTH_TOKEN",
|
|
231
|
+
"ANTHROPIC_OAUTH_ACCESS_TOKEN",
|
|
232
|
+
], // Fall back to OAuth if API key not present
|
|
182
233
|
};
|
|
183
234
|
}
|
|
184
235
|
/**
|
|
@@ -397,4 +448,563 @@ export function getAWSSessionToken() {
|
|
|
397
448
|
export function hasHuggingFaceCredentials() {
|
|
398
449
|
return hasProviderCredentials(["HUGGINGFACE_API_KEY", "HF_TOKEN"]);
|
|
399
450
|
}
|
|
451
|
+
// =============================================================================
|
|
452
|
+
// ANTHROPIC/CLAUDE SUBSCRIPTION AUTH HELPERS
|
|
453
|
+
// =============================================================================
|
|
454
|
+
/**
|
|
455
|
+
* Gets the configured Anthropic authentication method
|
|
456
|
+
* Defaults to "api_key" for backward compatibility
|
|
457
|
+
* @returns The configured authentication method
|
|
458
|
+
*/
|
|
459
|
+
export function getAnthropicAuthMethod() {
|
|
460
|
+
const method = process.env.ANTHROPIC_AUTH_METHOD?.toLowerCase();
|
|
461
|
+
if (method === "oauth") {
|
|
462
|
+
return "oauth";
|
|
463
|
+
}
|
|
464
|
+
return "api_key";
|
|
465
|
+
}
|
|
466
|
+
/**
|
|
467
|
+
* Gets the configured Claude subscription tier
|
|
468
|
+
* Defaults to "api" for backward compatibility (API key users)
|
|
469
|
+
* @returns The configured subscription tier
|
|
470
|
+
*/
|
|
471
|
+
export function getAnthropicSubscriptionTier() {
|
|
472
|
+
const tier = process.env.ANTHROPIC_SUBSCRIPTION_TIER?.toLowerCase();
|
|
473
|
+
switch (tier) {
|
|
474
|
+
case "free":
|
|
475
|
+
return "free";
|
|
476
|
+
case "pro":
|
|
477
|
+
return "pro";
|
|
478
|
+
case "max":
|
|
479
|
+
return "max";
|
|
480
|
+
case "max_5":
|
|
481
|
+
return "max_5";
|
|
482
|
+
case "max_20":
|
|
483
|
+
return "max_20";
|
|
484
|
+
case "api":
|
|
485
|
+
default:
|
|
486
|
+
return "api";
|
|
487
|
+
}
|
|
488
|
+
}
|
|
489
|
+
/**
|
|
490
|
+
* Validates OAuth access token format
|
|
491
|
+
* @param token The token to validate
|
|
492
|
+
* @returns True if the token format is valid
|
|
493
|
+
*/
|
|
494
|
+
export function validateOAuthAccessToken(token) {
|
|
495
|
+
if (!token || token.length < 32) {
|
|
496
|
+
return false;
|
|
497
|
+
}
|
|
498
|
+
const format = OAUTH_TOKEN_FORMATS["anthropic-access"];
|
|
499
|
+
return format.test(token);
|
|
500
|
+
}
|
|
501
|
+
/**
|
|
502
|
+
* Validates OAuth refresh token format
|
|
503
|
+
* @param token The token to validate
|
|
504
|
+
* @returns True if the token format is valid
|
|
505
|
+
*/
|
|
506
|
+
export function validateOAuthRefreshToken(token) {
|
|
507
|
+
if (!token || token.length < 32) {
|
|
508
|
+
return false;
|
|
509
|
+
}
|
|
510
|
+
const format = OAUTH_TOKEN_FORMATS["anthropic-refresh"];
|
|
511
|
+
return format.test(token);
|
|
512
|
+
}
|
|
513
|
+
/**
|
|
514
|
+
* Detects the best available authentication method for Anthropic
|
|
515
|
+
* Checks environment variables and returns the most appropriate auth configuration
|
|
516
|
+
* @returns Complete authentication configuration
|
|
517
|
+
*/
|
|
518
|
+
export function detectAnthropicAuth() {
|
|
519
|
+
const explicitMethod = process.env.ANTHROPIC_AUTH_METHOD?.toLowerCase();
|
|
520
|
+
const tier = getAnthropicSubscriptionTier();
|
|
521
|
+
// Check for OAuth tokens — canonical + fallbacks for backward compatibility
|
|
522
|
+
const accessToken = process.env.ANTHROPIC_OAUTH_TOKEN ??
|
|
523
|
+
process.env.CLAUDE_OAUTH_TOKEN ??
|
|
524
|
+
process.env.ANTHROPIC_OAUTH_ACCESS_TOKEN;
|
|
525
|
+
const refreshToken = process.env.ANTHROPIC_OAUTH_REFRESH_TOKEN;
|
|
526
|
+
// Check for API key
|
|
527
|
+
const apiKey = process.env.ANTHROPIC_API_KEY;
|
|
528
|
+
// If explicit method is set, use it
|
|
529
|
+
if (explicitMethod === "oauth") {
|
|
530
|
+
if (accessToken) {
|
|
531
|
+
const isValidAccessToken = validateOAuthAccessToken(accessToken);
|
|
532
|
+
const isValidRefreshToken = refreshToken
|
|
533
|
+
? validateOAuthRefreshToken(refreshToken)
|
|
534
|
+
: true;
|
|
535
|
+
if (!isValidAccessToken) {
|
|
536
|
+
return {
|
|
537
|
+
method: "oauth",
|
|
538
|
+
tier,
|
|
539
|
+
accessToken,
|
|
540
|
+
refreshToken,
|
|
541
|
+
isConfigured: false,
|
|
542
|
+
error: "Invalid OAuth access token format. Token should be a valid JWT or opaque token.",
|
|
543
|
+
};
|
|
544
|
+
}
|
|
545
|
+
if (refreshToken && !isValidRefreshToken) {
|
|
546
|
+
return {
|
|
547
|
+
method: "oauth",
|
|
548
|
+
tier,
|
|
549
|
+
accessToken,
|
|
550
|
+
refreshToken,
|
|
551
|
+
isConfigured: false,
|
|
552
|
+
error: "Invalid OAuth refresh token format. Token should be at least 32 characters.",
|
|
553
|
+
};
|
|
554
|
+
}
|
|
555
|
+
return {
|
|
556
|
+
method: "oauth",
|
|
557
|
+
tier,
|
|
558
|
+
accessToken,
|
|
559
|
+
refreshToken,
|
|
560
|
+
isConfigured: true,
|
|
561
|
+
};
|
|
562
|
+
}
|
|
563
|
+
// OAuth method specified but no token
|
|
564
|
+
return {
|
|
565
|
+
method: "oauth",
|
|
566
|
+
tier,
|
|
567
|
+
isConfigured: false,
|
|
568
|
+
error: "OAuth authentication method specified but ANTHROPIC_OAUTH_TOKEN not set.",
|
|
569
|
+
};
|
|
570
|
+
}
|
|
571
|
+
// If explicit method is api_key or not set
|
|
572
|
+
if (apiKey) {
|
|
573
|
+
const isValidApiKey = validateApiKeyFormat("anthropic", apiKey);
|
|
574
|
+
if (!isValidApiKey) {
|
|
575
|
+
// Still return as configured but note the format issue
|
|
576
|
+
return {
|
|
577
|
+
method: "api_key",
|
|
578
|
+
tier: "api", // API key users are always on "api" tier
|
|
579
|
+
apiKey,
|
|
580
|
+
isConfigured: true,
|
|
581
|
+
error: "API key format may be invalid. Expected format: sk-ant-...",
|
|
582
|
+
};
|
|
583
|
+
}
|
|
584
|
+
return {
|
|
585
|
+
method: "api_key",
|
|
586
|
+
tier: "api",
|
|
587
|
+
apiKey,
|
|
588
|
+
isConfigured: true,
|
|
589
|
+
};
|
|
590
|
+
}
|
|
591
|
+
// Check if OAuth tokens are available without explicit method set
|
|
592
|
+
if (accessToken) {
|
|
593
|
+
const isValidAccessToken = validateOAuthAccessToken(accessToken);
|
|
594
|
+
return {
|
|
595
|
+
method: "oauth",
|
|
596
|
+
tier,
|
|
597
|
+
accessToken,
|
|
598
|
+
refreshToken,
|
|
599
|
+
isConfigured: isValidAccessToken,
|
|
600
|
+
error: isValidAccessToken
|
|
601
|
+
? undefined
|
|
602
|
+
: "Invalid OAuth access token format.",
|
|
603
|
+
};
|
|
604
|
+
}
|
|
605
|
+
// No authentication configured
|
|
606
|
+
return {
|
|
607
|
+
method: "api_key",
|
|
608
|
+
tier: "api",
|
|
609
|
+
isConfigured: false,
|
|
610
|
+
error: "No Anthropic authentication configured. Set ANTHROPIC_API_KEY or configure OAuth.",
|
|
611
|
+
};
|
|
612
|
+
}
|
|
613
|
+
/**
|
|
614
|
+
* Checks if Anthropic credentials are available (either API key or OAuth)
|
|
615
|
+
* @returns True if any valid authentication is configured
|
|
616
|
+
*/
|
|
617
|
+
export function hasAnthropicCredentials() {
|
|
618
|
+
const auth = detectAnthropicAuth();
|
|
619
|
+
return auth.isConfigured;
|
|
620
|
+
}
|
|
621
|
+
/**
|
|
622
|
+
* Gets the authentication token or key for Anthropic API calls
|
|
623
|
+
* Returns the appropriate credential based on configured auth method
|
|
624
|
+
* @returns The API key or OAuth access token, or undefined if not configured
|
|
625
|
+
*/
|
|
626
|
+
export function getAnthropicCredential() {
|
|
627
|
+
const auth = detectAnthropicAuth();
|
|
628
|
+
if (!auth.isConfigured) {
|
|
629
|
+
return undefined;
|
|
630
|
+
}
|
|
631
|
+
return auth.method === "oauth" ? auth.accessToken : auth.apiKey;
|
|
632
|
+
}
|
|
633
|
+
/**
|
|
634
|
+
* Checks if OAuth refresh is needed based on token state
|
|
635
|
+
* This is a placeholder for actual token expiration checking
|
|
636
|
+
* @returns True if refresh is needed
|
|
637
|
+
*/
|
|
638
|
+
export function needsOAuthRefresh() {
|
|
639
|
+
const auth = detectAnthropicAuth();
|
|
640
|
+
if (auth.method !== "oauth" || !auth.isConfigured) {
|
|
641
|
+
return false;
|
|
642
|
+
}
|
|
643
|
+
// In a real implementation, you would check token expiration
|
|
644
|
+
// For now, we just check if a refresh token is available
|
|
645
|
+
// The actual refresh logic would be in the OAuth client
|
|
646
|
+
return !!auth.refreshToken;
|
|
647
|
+
}
|
|
648
|
+
/**
|
|
649
|
+
* Gets subscription tier limits for informational purposes
|
|
650
|
+
* These are approximate limits and may change
|
|
651
|
+
* @param tier The subscription tier
|
|
652
|
+
* @returns Object with tier limit information
|
|
653
|
+
*/
|
|
654
|
+
export function getSubscriptionTierLimits(tier) {
|
|
655
|
+
switch (tier) {
|
|
656
|
+
case "free":
|
|
657
|
+
return {
|
|
658
|
+
messagesPerDay: 10,
|
|
659
|
+
contextWindow: 100000,
|
|
660
|
+
priorityAccess: false,
|
|
661
|
+
description: "Free tier with limited daily messages",
|
|
662
|
+
};
|
|
663
|
+
case "pro":
|
|
664
|
+
return {
|
|
665
|
+
messagesPerDay: 100,
|
|
666
|
+
contextWindow: 200000,
|
|
667
|
+
priorityAccess: true,
|
|
668
|
+
description: "Claude Pro subscription with extended limits",
|
|
669
|
+
};
|
|
670
|
+
case "max":
|
|
671
|
+
return {
|
|
672
|
+
messagesPerDay: "unlimited",
|
|
673
|
+
contextWindow: 200000,
|
|
674
|
+
priorityAccess: true,
|
|
675
|
+
description: "Claude Max subscription with highest limits",
|
|
676
|
+
};
|
|
677
|
+
case "max_5":
|
|
678
|
+
return {
|
|
679
|
+
messagesPerDay: "unlimited",
|
|
680
|
+
contextWindow: 200000,
|
|
681
|
+
priorityAccess: true,
|
|
682
|
+
description: "Claude Max 5x usage tier with priority processing",
|
|
683
|
+
};
|
|
684
|
+
case "max_20":
|
|
685
|
+
return {
|
|
686
|
+
messagesPerDay: "unlimited",
|
|
687
|
+
contextWindow: 200000,
|
|
688
|
+
priorityAccess: true,
|
|
689
|
+
description: "Claude Max 20x usage tier with maximum capacity",
|
|
690
|
+
};
|
|
691
|
+
case "api":
|
|
692
|
+
default:
|
|
693
|
+
return {
|
|
694
|
+
messagesPerDay: "unlimited",
|
|
695
|
+
contextWindow: 200000,
|
|
696
|
+
priorityAccess: true,
|
|
697
|
+
description: "API access with pay-per-use billing",
|
|
698
|
+
};
|
|
699
|
+
}
|
|
700
|
+
}
|
|
701
|
+
// =============================================================================
|
|
702
|
+
// ENVIRONMENT VARIABLE CONSTANTS
|
|
703
|
+
// =============================================================================
|
|
704
|
+
/**
|
|
705
|
+
* Environment variables for Anthropic/Claude subscription configuration
|
|
706
|
+
* These control authentication method, subscription tier, and feature flags
|
|
707
|
+
*/
|
|
708
|
+
export const ANTHROPIC_ENV_VARS = {
|
|
709
|
+
/** Authentication method: "api_key" or "oauth" */
|
|
710
|
+
AUTH_METHOD: "ANTHROPIC_AUTH_METHOD",
|
|
711
|
+
/** Subscription tier: "free", "pro", "max", "max_5", "max_20", or "api" */
|
|
712
|
+
SUBSCRIPTION_TIER: "ANTHROPIC_SUBSCRIPTION_TIER",
|
|
713
|
+
/** Enable beta features: "true" or "false" */
|
|
714
|
+
ENABLE_BETA_FEATURES: "ANTHROPIC_ENABLE_BETA_FEATURES",
|
|
715
|
+
/** API key for api_key authentication */
|
|
716
|
+
API_KEY: "ANTHROPIC_API_KEY",
|
|
717
|
+
/** OAuth access token for oauth authentication (canonical, with BC fallbacks) */
|
|
718
|
+
OAUTH_ACCESS_TOKEN: "ANTHROPIC_OAUTH_TOKEN",
|
|
719
|
+
/** OAuth refresh token for oauth authentication */
|
|
720
|
+
OAUTH_REFRESH_TOKEN: "ANTHROPIC_OAUTH_REFRESH_TOKEN",
|
|
721
|
+
/** OAuth token expiry timestamp (Unix epoch in seconds) */
|
|
722
|
+
OAUTH_TOKEN_EXPIRY: "ANTHROPIC_OAUTH_TOKEN_EXPIRY",
|
|
723
|
+
};
|
|
724
|
+
/**
|
|
725
|
+
* Valid subscription tier values for validation
|
|
726
|
+
*/
|
|
727
|
+
export const VALID_SUBSCRIPTION_TIERS = [
|
|
728
|
+
"free",
|
|
729
|
+
"pro",
|
|
730
|
+
"max",
|
|
731
|
+
"max_5",
|
|
732
|
+
"max_20",
|
|
733
|
+
"api",
|
|
734
|
+
];
|
|
735
|
+
/**
|
|
736
|
+
* Valid authentication method values for validation
|
|
737
|
+
*/
|
|
738
|
+
export const VALID_AUTH_METHODS = [
|
|
739
|
+
"api_key",
|
|
740
|
+
"oauth",
|
|
741
|
+
];
|
|
742
|
+
// =============================================================================
|
|
743
|
+
// SUBSCRIPTION TIER VALIDATION
|
|
744
|
+
// =============================================================================
|
|
745
|
+
/**
|
|
746
|
+
* Validates a subscription tier value
|
|
747
|
+
* @param tier The tier value to validate
|
|
748
|
+
* @returns True if the tier is valid, false otherwise
|
|
749
|
+
*/
|
|
750
|
+
export function isValidSubscriptionTier(tier) {
|
|
751
|
+
if (!tier) {
|
|
752
|
+
return false;
|
|
753
|
+
}
|
|
754
|
+
return VALID_SUBSCRIPTION_TIERS.includes(tier);
|
|
755
|
+
}
|
|
756
|
+
/**
|
|
757
|
+
* Validates an authentication method value
|
|
758
|
+
* @param method The method value to validate
|
|
759
|
+
* @returns True if the method is valid, false otherwise
|
|
760
|
+
*/
|
|
761
|
+
export function isValidAuthMethod(method) {
|
|
762
|
+
if (!method) {
|
|
763
|
+
return false;
|
|
764
|
+
}
|
|
765
|
+
return VALID_AUTH_METHODS.includes(method);
|
|
766
|
+
}
|
|
767
|
+
/**
|
|
768
|
+
* Validates subscription tier and returns a detailed result
|
|
769
|
+
* @param tier The tier value to validate
|
|
770
|
+
* @returns Validation result with error details if invalid
|
|
771
|
+
*/
|
|
772
|
+
export function validateSubscriptionTier(tier) {
|
|
773
|
+
if (!tier) {
|
|
774
|
+
return {
|
|
775
|
+
isValid: false,
|
|
776
|
+
error: "Subscription tier is required but not provided.",
|
|
777
|
+
};
|
|
778
|
+
}
|
|
779
|
+
const normalizedTier = tier.toLowerCase().trim();
|
|
780
|
+
if (isValidSubscriptionTier(normalizedTier)) {
|
|
781
|
+
return {
|
|
782
|
+
isValid: true,
|
|
783
|
+
tier: normalizedTier,
|
|
784
|
+
};
|
|
785
|
+
}
|
|
786
|
+
return {
|
|
787
|
+
isValid: false,
|
|
788
|
+
error: `Invalid subscription tier "${tier}". Valid values are: ${VALID_SUBSCRIPTION_TIERS.join(", ")}`,
|
|
789
|
+
};
|
|
790
|
+
}
|
|
791
|
+
// =============================================================================
|
|
792
|
+
// ANTHROPIC AUTH CONFIG FUNCTIONS
|
|
793
|
+
// =============================================================================
|
|
794
|
+
/**
|
|
795
|
+
* Gets the complete Anthropic authentication configuration
|
|
796
|
+
* Detects auth method from environment or config and loads appropriate credentials
|
|
797
|
+
*
|
|
798
|
+
* @returns Complete AnthropicAuthConfig with method, credentials, and tier
|
|
799
|
+
*/
|
|
800
|
+
export function getAnthropicAuthConfig() {
|
|
801
|
+
const method = getAnthropicAuthMethod();
|
|
802
|
+
const tier = detectSubscriptionTier();
|
|
803
|
+
if (method === "oauth") {
|
|
804
|
+
const accessToken = process.env[ANTHROPIC_ENV_VARS.OAUTH_ACCESS_TOKEN];
|
|
805
|
+
const refreshToken = process.env[ANTHROPIC_ENV_VARS.OAUTH_REFRESH_TOKEN];
|
|
806
|
+
const tokenExpiryStr = process.env[ANTHROPIC_ENV_VARS.OAUTH_TOKEN_EXPIRY];
|
|
807
|
+
// Parse token expiry if provided
|
|
808
|
+
let expiresAt;
|
|
809
|
+
if (tokenExpiryStr) {
|
|
810
|
+
const parsed = parseInt(tokenExpiryStr, 10);
|
|
811
|
+
if (!isNaN(parsed)) {
|
|
812
|
+
expiresAt = parsed;
|
|
813
|
+
}
|
|
814
|
+
}
|
|
815
|
+
// Build OAuth token object
|
|
816
|
+
const oauthToken = accessToken
|
|
817
|
+
? {
|
|
818
|
+
accessToken,
|
|
819
|
+
refreshToken,
|
|
820
|
+
expiresAt,
|
|
821
|
+
tokenType: "Bearer",
|
|
822
|
+
}
|
|
823
|
+
: undefined;
|
|
824
|
+
return {
|
|
825
|
+
method: "oauth",
|
|
826
|
+
oauthToken,
|
|
827
|
+
accessToken, // Legacy field for backward compatibility
|
|
828
|
+
refreshToken, // Legacy field for backward compatibility
|
|
829
|
+
tokenExpiry: expiresAt ? expiresAt * 1000 : undefined, // Convert to milliseconds
|
|
830
|
+
subscriptionTier: tier,
|
|
831
|
+
autoRefresh: !!refreshToken,
|
|
832
|
+
};
|
|
833
|
+
}
|
|
834
|
+
// API key authentication
|
|
835
|
+
const apiKey = process.env[ANTHROPIC_ENV_VARS.API_KEY];
|
|
836
|
+
return {
|
|
837
|
+
method: "api_key",
|
|
838
|
+
apiKey,
|
|
839
|
+
subscriptionTier: tier,
|
|
840
|
+
autoRefresh: false,
|
|
841
|
+
};
|
|
842
|
+
}
|
|
843
|
+
/**
|
|
844
|
+
* Detects the subscription tier from environment variables or config
|
|
845
|
+
* Checks environment variable first, then config, defaults to "api" if using API key
|
|
846
|
+
*
|
|
847
|
+
* @returns The detected subscription tier
|
|
848
|
+
*/
|
|
849
|
+
export function detectSubscriptionTier() {
|
|
850
|
+
// 1. Check environment variable first (highest priority)
|
|
851
|
+
const envTier = process.env[ANTHROPIC_ENV_VARS.SUBSCRIPTION_TIER];
|
|
852
|
+
if (envTier) {
|
|
853
|
+
const validation = validateSubscriptionTier(envTier);
|
|
854
|
+
if (validation.isValid && validation.tier) {
|
|
855
|
+
return validation.tier;
|
|
856
|
+
}
|
|
857
|
+
logger.warn("Invalid ANTHROPIC_SUBSCRIPTION_TIER value", {
|
|
858
|
+
value: envTier,
|
|
859
|
+
validValues: VALID_SUBSCRIPTION_TIERS,
|
|
860
|
+
fallback: "Defaulting based on auth method",
|
|
861
|
+
});
|
|
862
|
+
}
|
|
863
|
+
// 2. Check config file (could be extended to read from config file)
|
|
864
|
+
// For now, we check if there's a tier set via other means
|
|
865
|
+
// This is a placeholder for config file integration
|
|
866
|
+
// const configTier = loadConfigTier(); // Future: implement config file loading
|
|
867
|
+
// 3. Default based on authentication method
|
|
868
|
+
const authMethod = getAnthropicAuthMethod();
|
|
869
|
+
if (authMethod === "oauth") {
|
|
870
|
+
// OAuth users are typically subscription users, default to "pro"
|
|
871
|
+
// unless they've explicitly configured otherwise
|
|
872
|
+
logger.debug("[detectSubscriptionTier] OAuth auth detected, defaulting to pro tier");
|
|
873
|
+
return "pro";
|
|
874
|
+
}
|
|
875
|
+
// 4. API key users default to "api" tier
|
|
876
|
+
logger.debug("[detectSubscriptionTier] API key auth, defaulting to api tier");
|
|
877
|
+
return "api";
|
|
878
|
+
}
|
|
879
|
+
/**
|
|
880
|
+
* Determines whether beta features should be enabled
|
|
881
|
+
* Checks environment/config and defaults based on authentication method
|
|
882
|
+
*
|
|
883
|
+
* @returns True if beta features should be enabled
|
|
884
|
+
*/
|
|
885
|
+
export function shouldEnableBetaFeatures() {
|
|
886
|
+
// 1. Check explicit environment variable first (highest priority)
|
|
887
|
+
const envValue = process.env[ANTHROPIC_ENV_VARS.ENABLE_BETA_FEATURES];
|
|
888
|
+
if (envValue !== undefined) {
|
|
889
|
+
const normalized = envValue.toLowerCase().trim();
|
|
890
|
+
if (normalized === "true" || normalized === "1" || normalized === "yes") {
|
|
891
|
+
return true;
|
|
892
|
+
}
|
|
893
|
+
if (normalized === "false" || normalized === "0" || normalized === "no") {
|
|
894
|
+
return false;
|
|
895
|
+
}
|
|
896
|
+
logger.warn("Invalid ANTHROPIC_ENABLE_BETA_FEATURES value", {
|
|
897
|
+
value: envValue,
|
|
898
|
+
expected: ["true", "false"],
|
|
899
|
+
fallback: "Defaulting based on auth method",
|
|
900
|
+
});
|
|
901
|
+
}
|
|
902
|
+
// 2. Check config file (placeholder for future config integration)
|
|
903
|
+
// const configValue = loadConfigBetaFeatures();
|
|
904
|
+
// 3. Default based on authentication method
|
|
905
|
+
// OAuth users get beta features enabled by default
|
|
906
|
+
// API key users get beta features disabled by default for stability
|
|
907
|
+
const authMethod = getAnthropicAuthMethod();
|
|
908
|
+
return authMethod === "oauth";
|
|
909
|
+
}
|
|
910
|
+
/**
|
|
911
|
+
* Gets complete subscription configuration including auth, tier, and features
|
|
912
|
+
* Combines all configuration sources into a unified config object
|
|
913
|
+
*
|
|
914
|
+
* @returns Complete subscription configuration
|
|
915
|
+
*/
|
|
916
|
+
export function getAnthropicSubscriptionConfig() {
|
|
917
|
+
const auth = getAnthropicAuthConfig();
|
|
918
|
+
const tier = detectSubscriptionTier();
|
|
919
|
+
const betaFeaturesEnabled = shouldEnableBetaFeatures();
|
|
920
|
+
const limits = getSubscriptionTierLimits(tier);
|
|
921
|
+
// Determine if properly configured
|
|
922
|
+
let isConfigured = false;
|
|
923
|
+
let error;
|
|
924
|
+
if (auth.method === "oauth") {
|
|
925
|
+
if (auth.oauthToken?.accessToken || auth.accessToken) {
|
|
926
|
+
isConfigured = true;
|
|
927
|
+
}
|
|
928
|
+
else {
|
|
929
|
+
error =
|
|
930
|
+
"OAuth authentication method specified but no access token configured. " +
|
|
931
|
+
`Set ${ANTHROPIC_ENV_VARS.OAUTH_ACCESS_TOKEN} environment variable.`;
|
|
932
|
+
}
|
|
933
|
+
}
|
|
934
|
+
else {
|
|
935
|
+
if (auth.apiKey) {
|
|
936
|
+
isConfigured = true;
|
|
937
|
+
}
|
|
938
|
+
else {
|
|
939
|
+
error =
|
|
940
|
+
"API key authentication method specified but no API key configured. " +
|
|
941
|
+
`Set ${ANTHROPIC_ENV_VARS.API_KEY} environment variable.`;
|
|
942
|
+
}
|
|
943
|
+
}
|
|
944
|
+
return {
|
|
945
|
+
auth,
|
|
946
|
+
tier,
|
|
947
|
+
betaFeaturesEnabled,
|
|
948
|
+
limits,
|
|
949
|
+
isConfigured,
|
|
950
|
+
error,
|
|
951
|
+
};
|
|
952
|
+
}
|
|
953
|
+
/**
|
|
954
|
+
* Checks if the current subscription tier has access to a specific feature
|
|
955
|
+
* @param feature The feature to check
|
|
956
|
+
* @param currentTier The current subscription tier (optional, auto-detects if not provided)
|
|
957
|
+
* @returns True if the tier has access to the feature
|
|
958
|
+
*/
|
|
959
|
+
export function hasSubscriptionFeature(feature, currentTier) {
|
|
960
|
+
const tier = currentTier ?? detectSubscriptionTier();
|
|
961
|
+
const limits = getSubscriptionTierLimits(tier);
|
|
962
|
+
// Map features to tier capabilities
|
|
963
|
+
switch (feature) {
|
|
964
|
+
case "extended_thinking":
|
|
965
|
+
// Extended thinking requires pro or higher, or API tier
|
|
966
|
+
return tier !== "free";
|
|
967
|
+
case "priority_access":
|
|
968
|
+
return limits.priorityAccess;
|
|
969
|
+
case "vision":
|
|
970
|
+
case "file_analysis":
|
|
971
|
+
// Available on all tiers
|
|
972
|
+
return true;
|
|
973
|
+
case "mcp_tools":
|
|
974
|
+
// MCP tools require pro or higher
|
|
975
|
+
return tier !== "free";
|
|
976
|
+
case "computer_use":
|
|
977
|
+
// Computer use requires max tier or API
|
|
978
|
+
return (tier === "max" ||
|
|
979
|
+
tier === "max_5" ||
|
|
980
|
+
tier === "max_20" ||
|
|
981
|
+
tier === "api");
|
|
982
|
+
case "web_search":
|
|
983
|
+
// Web search available on pro or higher
|
|
984
|
+
return tier !== "free";
|
|
985
|
+
default:
|
|
986
|
+
return false;
|
|
987
|
+
}
|
|
988
|
+
}
|
|
989
|
+
/**
|
|
990
|
+
* Gets a human-readable description of the current authentication configuration
|
|
991
|
+
* Useful for debugging and user feedback
|
|
992
|
+
*
|
|
993
|
+
* @returns Human-readable configuration description
|
|
994
|
+
*/
|
|
995
|
+
export function describeAnthropicConfig() {
|
|
996
|
+
const config = getAnthropicSubscriptionConfig();
|
|
997
|
+
const lines = [];
|
|
998
|
+
lines.push(`Authentication Method: ${config.auth.method}`);
|
|
999
|
+
lines.push(`Subscription Tier: ${config.tier}`);
|
|
1000
|
+
lines.push(`Beta Features: ${config.betaFeaturesEnabled ? "Enabled" : "Disabled"}`);
|
|
1001
|
+
lines.push(`Configured: ${config.isConfigured ? "Yes" : "No"}`);
|
|
1002
|
+
if (config.error) {
|
|
1003
|
+
lines.push(`Error: ${config.error}`);
|
|
1004
|
+
}
|
|
1005
|
+
lines.push(`Daily Messages: ${config.limits.messagesPerDay}`);
|
|
1006
|
+
lines.push(`Context Window: ${config.limits.contextWindow.toLocaleString()} tokens`);
|
|
1007
|
+
lines.push(`Priority Access: ${config.limits.priorityAccess ? "Yes" : "No"}`);
|
|
1008
|
+
return lines.join("\n");
|
|
1009
|
+
}
|
|
400
1010
|
//# sourceMappingURL=providerConfig.js.map
|