@lobu/connector-sdk 6.1.1 → 7.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/acquire.d.ts +7 -0
- package/dist/browser/acquire.d.ts.map +1 -1
- package/dist/browser/acquire.js +68 -16
- package/dist/browser/acquire.js.map +1 -1
- package/dist/browser/cdp-page.d.ts.map +1 -1
- package/dist/browser/cdp-page.js +111 -29
- package/dist/browser/cdp-page.js.map +1 -1
- package/dist/browser/cdp.d.ts.map +1 -1
- package/dist/browser/cdp.js +10 -7
- package/dist/browser/cdp.js.map +1 -1
- package/dist/browser/devtools-active-port.d.ts +20 -0
- package/dist/browser/devtools-active-port.d.ts.map +1 -0
- package/dist/browser/devtools-active-port.js +46 -0
- package/dist/browser/devtools-active-port.js.map +1 -0
- package/dist/browser/launcher.d.ts +1 -2
- package/dist/browser/launcher.d.ts.map +1 -1
- package/dist/browser/launcher.js +12 -9
- package/dist/browser/launcher.js.map +1 -1
- package/dist/browser/mirror-cookies.d.ts +64 -0
- package/dist/browser/mirror-cookies.d.ts.map +1 -0
- package/dist/browser/mirror-cookies.js +293 -0
- package/dist/browser/mirror-cookies.js.map +1 -0
- package/dist/browser-network.d.ts +6 -0
- package/dist/browser-network.d.ts.map +1 -1
- package/dist/browser-network.js +106 -35
- package/dist/browser-network.js.map +1 -1
- package/dist/connector-types.d.ts +32 -0
- package/dist/connector-types.d.ts.map +1 -1
- package/dist/connector-types.js.map +1 -1
- package/dist/index.d.ts +2 -10
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +0 -6
- package/dist/index.js.map +1 -1
- package/dist/retry.d.ts.map +1 -1
- package/dist/retry.js +59 -86
- package/dist/retry.js.map +1 -1
- package/dist/types.d.ts +0 -134
- package/dist/types.d.ts.map +1 -1
- package/package.json +19 -3
- package/dist/api-paginated.d.ts +0 -79
- package/dist/api-paginated.d.ts.map +0 -1
- package/dist/api-paginated.js +0 -120
- package/dist/api-paginated.js.map +0 -1
- package/dist/base.d.ts +0 -65
- package/dist/base.d.ts.map +0 -1
- package/dist/base.js +0 -122
- package/dist/base.js.map +0 -1
- package/dist/browser-paginated.d.ts +0 -141
- package/dist/browser-paginated.d.ts.map +0 -1
- package/dist/browser-paginated.js +0 -269
- package/dist/browser-paginated.js.map +0 -1
- package/dist/http.d.ts +0 -18
- package/dist/http.d.ts.map +0 -1
- package/dist/http.js +0 -74
- package/dist/http.js.map +0 -1
- package/dist/paginated.d.ts +0 -93
- package/dist/paginated.d.ts.map +0 -1
- package/dist/paginated.js +0 -167
- package/dist/paginated.js.map +0 -1
package/dist/browser/launcher.js
CHANGED
|
@@ -7,15 +7,11 @@ import { mkdir, writeFile } from 'node:fs/promises';
|
|
|
7
7
|
import { join } from 'node:path';
|
|
8
8
|
import { sdkLogger } from '../logger.js';
|
|
9
9
|
import { launchStealthBrowser } from './stealth.js';
|
|
10
|
-
/**
|
|
11
|
-
* Add Puppeteer-compatible methods to Playwright Page
|
|
12
|
-
*/
|
|
10
|
+
/** Add Puppeteer-compatible `setUserAgent` to a Playwright Page. */
|
|
13
11
|
function addCompatibilityMethods(page) {
|
|
14
12
|
if (!page.setUserAgent) {
|
|
15
13
|
page.setUserAgent = async (userAgent) => {
|
|
16
|
-
await page.setExtraHTTPHeaders({
|
|
17
|
-
'User-Agent': userAgent,
|
|
18
|
-
});
|
|
14
|
+
await page.setExtraHTTPHeaders({ 'User-Agent': userAgent });
|
|
19
15
|
};
|
|
20
16
|
}
|
|
21
17
|
return page;
|
|
@@ -23,7 +19,7 @@ function addCompatibilityMethods(page) {
|
|
|
23
19
|
/**
|
|
24
20
|
* Launch browser with Playwright
|
|
25
21
|
*/
|
|
26
|
-
export async function launchBrowser(
|
|
22
|
+
export async function launchBrowser(options = {}) {
|
|
27
23
|
const isDebug = options.debug ?? process.env.BROWSER_DEBUG === '1';
|
|
28
24
|
const enableTrace = options.trace ?? process.env.BROWSER_TRACE === '1';
|
|
29
25
|
const screenshotDir = options.screenshotDir ?? process.env.BROWSER_SCREENSHOT_DIR ?? '/tmp/feed-screenshots';
|
|
@@ -88,8 +84,15 @@ export async function launchBrowser(_env, options = {}) {
|
|
|
88
84
|
export async function captureErrorArtifacts(page, error, feedType, screenshotDir) {
|
|
89
85
|
try {
|
|
90
86
|
await mkdir(screenshotDir, { recursive: true });
|
|
87
|
+
// feedType is caller-controlled and lands in on-disk filenames. Strip
|
|
88
|
+
// path separators, parent-dir references, and any non-filename-safe
|
|
89
|
+
// characters to prevent traversal outside screenshotDir.
|
|
90
|
+
const safeFeedType = (typeof feedType === 'string' ? feedType : 'unknown')
|
|
91
|
+
.replace(/[^a-zA-Z0-9._-]/g, '_')
|
|
92
|
+
.replace(/^\.+/, '_')
|
|
93
|
+
.slice(0, 64) || 'unknown';
|
|
91
94
|
const timestamp = new Date().toISOString().replace(/[:.]/g, '-');
|
|
92
|
-
const baseFilename = `${
|
|
95
|
+
const baseFilename = `${safeFeedType}-${timestamp}`;
|
|
93
96
|
const screenshotPath = join(screenshotDir, `${baseFilename}.png`);
|
|
94
97
|
try {
|
|
95
98
|
await page.screenshot({
|
|
@@ -135,7 +138,7 @@ export async function captureErrorArtifacts(page, error, feedType, screenshotDir
|
|
|
135
138
|
screenshot: screenshotPath,
|
|
136
139
|
html: htmlPath,
|
|
137
140
|
},
|
|
138
|
-
debug_hint: `To debug: BROWSER_DEBUG=1 pnpm sync ${
|
|
141
|
+
debug_hint: `To debug: BROWSER_DEBUG=1 pnpm sync ${safeFeedType} [options]`,
|
|
139
142
|
}, '[BrowserLauncher] Feed failed');
|
|
140
143
|
}
|
|
141
144
|
catch (captureError) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"launcher.js","sourceRoot":"","sources":["../../src/browser/launcher.ts"],"names":[],"mappings":"AAAA,2BAA2B;AAC3B;;;GAGG;AAEH,OAAO,EAAE,KAAK,EAAE,SAAS,EAAE,MAAM,kBAAkB,CAAC;AACpD,OAAO,EAAE,IAAI,EAAE,MAAM,WAAW,CAAC;AACjC,OAAO,EAAE,SAAS,EAAE,MAAM,cAAc,CAAC;
|
|
1
|
+
{"version":3,"file":"launcher.js","sourceRoot":"","sources":["../../src/browser/launcher.ts"],"names":[],"mappings":"AAAA,2BAA2B;AAC3B;;;GAGG;AAEH,OAAO,EAAE,KAAK,EAAE,SAAS,EAAE,MAAM,kBAAkB,CAAC;AACpD,OAAO,EAAE,IAAI,EAAE,MAAM,WAAW,CAAC;AACjC,OAAO,EAAE,SAAS,EAAE,MAAM,cAAc,CAAC;AACzC,OAAO,EAAE,oBAAoB,EAAE,MAAM,cAAc,CAAC;AAepD,oEAAoE;AACpE,SAAS,uBAAuB,CAAC,IAAS;IACxC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QACvB,IAAI,CAAC,YAAY,GAAG,KAAK,EAAE,SAAiB,EAAE,EAAE;YAC9C,MAAM,IAAI,CAAC,mBAAmB,CAAC,EAAE,YAAY,EAAE,SAAS,EAAE,CAAC,CAAC;QAC9D,CAAC,CAAC;IACJ,CAAC;IACD,OAAO,IAAI,CAAC;AACd,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,aAAa,CACjC,UAAgC,EAAE;IAElC,MAAM,OAAO,GAAG,OAAO,CAAC,KAAK,IAAI,OAAO,CAAC,GAAG,CAAC,aAAa,KAAK,GAAG,CAAC;IACnE,MAAM,WAAW,GAAG,OAAO,CAAC,KAAK,IAAI,OAAO,CAAC,GAAG,CAAC,aAAa,KAAK,GAAG,CAAC;IACvE,MAAM,aAAa,GACjB,OAAO,CAAC,aAAa,IAAI,OAAO,CAAC,GAAG,CAAC,sBAAsB,IAAI,uBAAuB,CAAC;IAEzF,MAAM,UAAU,GAAG,OAAO,CAAC,OAAO,IAAI,OAAO,CAAC,GAAG,CAAC,eAAe,KAAK,GAAG,CAAC;IAE1E,SAAS,CAAC,IAAI,CACZ,0DAA0D,CAAC,OAAO,cAAc,UAAU,EAAE,CAC7F,CAAC;IAEF,IAAI,CAAC;QACH,IAAI,UAAU,EAAE,CAAC;YACf,MAAM,cAAc,GAAG,MAAM,oBAAoB,CAAC;gBAChD,QAAQ,EAAE,CAAC,OAAO;gBAClB,KAAK,EAAE,OAAO;aACf,CAAC,CAAC;YAEH,MAAM,OAAO,GAAG,cAAc,CAAC,OAAO,CAAC;YACvC,MAAM,eAAe,GAAG,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAEtD,OAAO,CAAC,OAAO,GAAG,KAAK,IAAI,EAAE;gBAC3B,MAAM,IAAI,GAAG,MAAM,eAAe,EAAE,CAAC;gBACrC,OAAO,uBAAuB,CAAC,IAAI,CAAC,CAAC;YACvC,CAAC,CAAC;YAEF,SAAS,CAAC,IAAI,CAAC,wEAAwE,CAAC,CAAC;YAEzF,OAAO;gBACL,OAAO;gBACP,YAAY,EAAE,IAAI;gBAClB,aAAa;aACd,CAAC;QACJ,CAAC;QAED,MAAM,gBAAgB,GAAG,YAAY,CAAC;QACtC,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,MAAM,CAAC,kBAAkB,CAAC,gBAAgB,CAAC,CAAC;QAEvE,MAAM,OAAO,GAAG,MAAM,QAAQ,CAAC,MAAM,CAAC;YACpC,QAAQ,EAAE,CAAC,OAAO;YAClB,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;YACzB,IAAI,EAAE,CAAC,cAAc,EAAE,0BAA0B,EAAE,yBAAyB,CAAC;YAC7E,QAAQ,EAAE,OAAO;SAClB,CAAC,CAAC;QAEH,MAAM,eAAe,GAAG,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QACtD,OAAO,CAAC,OAAO,GAAG,KAAK,IAAI,EAAE;YAC3B,MAAM,IAAI,GAAG,MAAM,eAAe,EAAE,CAAC;YACrC,OAAO,uBAAuB,CAAC,IAAI,CAAC,CAAC;QACvC,CAAC,CAAC;QAEF,IAAI,OAAO,EAAE,CAAC;YACZ,SAAS,CAAC,IAAI,CAAC,4EAA4E,CAAC,CAAC;QAC/F,CAAC;QAED,IAAI,WAAW,EAAE,CAAC;YAChB,SAAS,CAAC,IAAI,CACZ,8EAA8E,CAC/E,CAAC;QACJ,CAAC;QAED,OAAO;YACL,OAAO;YACP,YAAY,EAAE,IAAI;YAClB,aAAa;SACd,CAAC;IACJ,CAAC;IAAC,OAAO,KAAU,EAAE,CAAC;QACpB,IAAI,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,0BAA0B,CAAC,IAAI,KAAK,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;YAC7F,MAAM,IAAI,KAAK,CACb,yDAAyD;gBACvD,4EAA4E,CAC/E,CAAC;QACJ,CAAC;QAED,SAAS,CAAC,KAAK,CAAC,EAAE,KAAK,EAAE,EAAE,wDAAwD,CAAC,CAAC;QACrF,MAAM,IAAI,KAAK,CAAC,6BAA6B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;IAChE,CAAC;AACH,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,qBAAqB,CACzC,IAAS,EACT,KAAY,EACZ,QAAgB,EAChB,aAAqB;IAErB,IAAI,CAAC;QACH,MAAM,KAAK,CAAC,aAAa,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAEhD,sEAAsE;QACtE,oEAAoE;QACpE,yDAAyD;QACzD,MAAM,YAAY,GAChB,CAAC,OAAO,QAAQ,KAAK,QAAQ,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;aAClD,OAAO,CAAC,kBAAkB,EAAE,GAAG,CAAC;aAChC,OAAO,CAAC,MAAM,EAAE,GAAG,CAAC;aACpB,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,SAAS,CAAC;QAE/B,MAAM,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC,OAAO,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;QACjE,MAAM,YAAY,GAAG,GAAG,YAAY,IAAI,SAAS,EAAE,CAAC;QAEpD,MAAM,cAAc,GAAG,IAAI,CAAC,aAAa,EAAE,GAAG,YAAY,MAAM,CAAC,CAAC;QAClE,IAAI,CAAC;YACH,MAAM,IAAI,CAAC,UAAU,CAAC;gBACpB,IAAI,EAAE,cAAc;gBACpB,QAAQ,EAAE,IAAI;gBACd,OAAO,EAAE,IAAI;aACd,CAAC,CAAC;YACH,SAAS,CAAC,KAAK,CAAC,EAAE,IAAI,EAAE,cAAc,EAAE,EAAE,oCAAoC,CAAC,CAAC;QAClF,CAAC;QAAC,OAAO,eAAe,EAAE,CAAC;YACzB,SAAS,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,eAAe,EAAE,EAAE,gDAAgD,CAAC,CAAC;QAC/F,CAAC;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,aAAa,EAAE,GAAG,YAAY,OAAO,CAAC,CAAC;QAC7D,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;YAClC,MAAM,SAAS,CAAC,QAAQ,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;YACzC,SAAS,CAAC,KAAK,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,EAAE,8BAA8B,CAAC,CAAC;QACtE,CAAC;QAAC,OAAO,SAAS,EAAE,CAAC;YACnB,SAAS,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,EAAE,uCAAuC,CAAC,CAAC;QAChF,CAAC;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,aAAa,EAAE,GAAG,YAAY,MAAM,CAAC,CAAC;QAC5D,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,IAAI;iBACpB,QAAQ,CAAC,GAAG,EAAE;gBACb,OAAQ,MAAM,CAAC,OAA6C,EAAE,OAAO,IAAI,EAAE,CAAC;YAC9E,CAAC,CAAC;iBACD,KAAK,CAAC,GAAG,EAAE,CAAC,EAAE,CAAC,CAAC;YAEnB,IAAI,IAAI,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACpB,MAAM,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,OAAO,CAAC,CAAC;gBACpD,SAAS,CAAC,KAAK,CAAC,yCAAyC,QAAQ,EAAE,CAAC,CAAC;YACvE,CAAC;QACH,CAAC;QAAC,OAAO,SAAS,EAAE,CAAC;YACnB,4BAA4B;QAC9B,CAAC;QAED,SAAS,CAAC,KAAK,CACb;YACE,SAAS,EAAE,QAAQ;YACnB,KAAK,EAAE,KAAK,CAAC,OAAO;YACpB,KAAK,EAAE,KAAK,CAAC,KAAK;YAClB,SAAS,EAAE;gBACT,SAAS,EAAE,aAAa;gBACxB,UAAU,EAAE,cAAc;gBAC1B,IAAI,EAAE,QAAQ;aACf;YACD,UAAU,EAAE,uCAAuC,YAAY,YAAY;SAC5E,EACD,+BAA+B,CAChC,CAAC;IACJ,CAAC;IAAC,OAAO,YAAY,EAAE,CAAC;QACtB,SAAS,CAAC,KAAK,CAAC,EAAE,KAAK,EAAE,YAAY,EAAE,EAAE,qDAAqD,CAAC,CAAC;IAClG,CAAC;AACH,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB,CACpC,EAAoB,EACpB,IAAS,EACT,QAAgB,EAChB,aAAqB;IAErB,IAAI,CAAC;QACH,OAAO,MAAM,EAAE,EAAE,CAAC;IACpB,CAAC;IAAC,OAAO,KAAU,EAAE,CAAC;QACpB,MAAM,qBAAqB,CAAC,IAAI,EAAE,KAAK,EAAE,QAAQ,EAAE,aAAa,CAAC,CAAC;QAClE,MAAM,KAAK,CAAC;IACd,CAAC;AACH,CAAC"}
|
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Decrypt cookies from a user-owned Chrome profile and inject them into a
|
|
3
|
+
* headless connector subprocess — the "mirror" model. The user picks a
|
|
4
|
+
* Chrome profile in the Lobu menu bar; at sync time we decrypt cookies
|
|
5
|
+
* via the macOS Keychain, drop Google-account domains (to avoid Google's
|
|
6
|
+
* session-conflict logout on the user's real Chrome), and hand a
|
|
7
|
+
* Playwright-ready Cookie[] to the runner. macOS only in v1.
|
|
8
|
+
*/
|
|
9
|
+
import type { Cookie } from 'playwright';
|
|
10
|
+
export interface DecryptChromeCookiesParams {
|
|
11
|
+
/** "chrome" / "brave" / "arc" / "edge". v1 only honors "chrome". */
|
|
12
|
+
sourceBrowser?: string;
|
|
13
|
+
/** Absolute path to Chrome's user-data root (the dir that contains
|
|
14
|
+
* "Default", "Profile 1", etc. plus Local State). */
|
|
15
|
+
userDataRoot: string;
|
|
16
|
+
/** Subdir name of the source profile, e.g. "Default" or "Profile 1". */
|
|
17
|
+
sourceProfileDir: string;
|
|
18
|
+
/** Optional allow-list of host domains. When set, only cookies whose
|
|
19
|
+
* host_key matches one of these (exact, leading-dot, or wildcard
|
|
20
|
+
* subdomain) are returned. Empty = keep all. Used by `lobu memory
|
|
21
|
+
* browser-auth` to scope captures to a specific connector. */
|
|
22
|
+
allowDomains?: string[];
|
|
23
|
+
/** Optional deny-list of host domains. Cookies whose host_key matches
|
|
24
|
+
* any of these are dropped. Used by mirror mode to skip Google-account
|
|
25
|
+
* cookies (avoids Google's session-conflict logout). */
|
|
26
|
+
denyDomains?: Set<string>;
|
|
27
|
+
}
|
|
28
|
+
export interface DecryptChromeCookiesResult {
|
|
29
|
+
cookies: Cookie[];
|
|
30
|
+
/** How many cookies decrypted successfully before filtering. */
|
|
31
|
+
total_decrypted: number;
|
|
32
|
+
/** How many cookies got dropped by the deny-list. */
|
|
33
|
+
denied: number;
|
|
34
|
+
/** How many cookies got dropped by the allow-list (or by validation). */
|
|
35
|
+
filtered: number;
|
|
36
|
+
}
|
|
37
|
+
export interface MirrorCookieAcquireParams {
|
|
38
|
+
sourceBrowser: string;
|
|
39
|
+
userDataRoot: string;
|
|
40
|
+
sourceProfileDir: string;
|
|
41
|
+
}
|
|
42
|
+
export interface MirrorCookieAcquireResult {
|
|
43
|
+
cookies: Cookie[];
|
|
44
|
+
skipped_google_count: number;
|
|
45
|
+
total_decrypted_count: number;
|
|
46
|
+
}
|
|
47
|
+
/**
|
|
48
|
+
* Mirror-mode wrapper: decrypt the profile's cookies, filter out the
|
|
49
|
+
* Google-account deny-list. Used by `lobu connector run` so the connector
|
|
50
|
+
* subprocess can run authenticated against a user's Chrome state without
|
|
51
|
+
* launching anything.
|
|
52
|
+
*/
|
|
53
|
+
export declare function acquireMirroredCookies(params: MirrorCookieAcquireParams): Promise<MirrorCookieAcquireResult>;
|
|
54
|
+
/**
|
|
55
|
+
* Decrypt cookies from a macOS Chrome profile's SQLite store via the
|
|
56
|
+
* Keychain entry. Generic primitive consumed by both mirror mode (with
|
|
57
|
+
* the Google deny-list) and the CLI's `lobu memory browser-auth` capture
|
|
58
|
+
* flow (with a connector-scoped allow-list). Replaces the older
|
|
59
|
+
* `extractCookiesMacOS` that used to live in
|
|
60
|
+
* `packages/cli/src/commands/memory/_lib/browser-auth-cmd.ts` — that
|
|
61
|
+
* file now imports this.
|
|
62
|
+
*/
|
|
63
|
+
export declare function decryptChromeCookiesMacOS(params: DecryptChromeCookiesParams): Promise<DecryptChromeCookiesResult>;
|
|
64
|
+
//# sourceMappingURL=mirror-cookies.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mirror-cookies.d.ts","sourceRoot":"","sources":["../../src/browser/mirror-cookies.ts"],"names":[],"mappings":"AAAA;;;;;;;GAOG;AAMH,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,YAAY,CAAC;AAsCzC,MAAM,WAAW,0BAA0B;IACzC,oEAAoE;IACpE,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB;yDACqD;IACrD,YAAY,EAAE,MAAM,CAAC;IACrB,wEAAwE;IACxE,gBAAgB,EAAE,MAAM,CAAC;IACzB;;;kEAG8D;IAC9D,YAAY,CAAC,EAAE,MAAM,EAAE,CAAC;IACxB;;4DAEwD;IACxD,WAAW,CAAC,EAAE,GAAG,CAAC,MAAM,CAAC,CAAC;CAC3B;AAED,MAAM,WAAW,0BAA0B;IACzC,OAAO,EAAE,MAAM,EAAE,CAAC;IAClB,gEAAgE;IAChE,eAAe,EAAE,MAAM,CAAC;IACxB,qDAAqD;IACrD,MAAM,EAAE,MAAM,CAAC;IACf,yEAAyE;IACzE,QAAQ,EAAE,MAAM,CAAC;CAClB;AAED,MAAM,WAAW,yBAAyB;IACxC,aAAa,EAAE,MAAM,CAAC;IACtB,YAAY,EAAE,MAAM,CAAC;IACrB,gBAAgB,EAAE,MAAM,CAAC;CAC1B;AAED,MAAM,WAAW,yBAAyB;IACxC,OAAO,EAAE,MAAM,EAAE,CAAC;IAClB,oBAAoB,EAAE,MAAM,CAAC;IAC7B,qBAAqB,EAAE,MAAM,CAAC;CAC/B;AAED;;;;;GAKG;AACH,wBAAsB,sBAAsB,CAC1C,MAAM,EAAE,yBAAyB,GAChC,OAAO,CAAC,yBAAyB,CAAC,CAsBpC;AAED;;;;;;;;GAQG;AACH,wBAAsB,yBAAyB,CAC7C,MAAM,EAAE,0BAA0B,GACjC,OAAO,CAAC,0BAA0B,CAAC,CA+MrC"}
|
|
@@ -0,0 +1,293 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Decrypt cookies from a user-owned Chrome profile and inject them into a
|
|
3
|
+
* headless connector subprocess — the "mirror" model. The user picks a
|
|
4
|
+
* Chrome profile in the Lobu menu bar; at sync time we decrypt cookies
|
|
5
|
+
* via the macOS Keychain, drop Google-account domains (to avoid Google's
|
|
6
|
+
* session-conflict logout on the user's real Chrome), and hand a
|
|
7
|
+
* Playwright-ready Cookie[] to the runner. macOS only in v1.
|
|
8
|
+
*/
|
|
9
|
+
import { execFileSync } from 'node:child_process';
|
|
10
|
+
import { copyFileSync, existsSync, mkdtempSync, rmSync } from 'node:fs';
|
|
11
|
+
import { tmpdir } from 'node:os';
|
|
12
|
+
import { join } from 'node:path';
|
|
13
|
+
import { sdkLogger } from '../logger.js';
|
|
14
|
+
/** Google-account domains we never copy. Two Chrome instances presenting
|
|
15
|
+
* the same Google OAuth cookies trigger Google's session-conflict
|
|
16
|
+
* heuristic, which force-logs out the user's real Chrome. The set covers
|
|
17
|
+
* Google's Sign-In, YouTube, Gmail, and content-CDN auth — enough to keep
|
|
18
|
+
* Lobu-side Chromium out of the Google account entirely. */
|
|
19
|
+
const GOOGLE_ACCOUNT_DOMAINS_DENY_LIST = new Set([
|
|
20
|
+
'google.com',
|
|
21
|
+
'accounts.google.com',
|
|
22
|
+
'mail.google.com',
|
|
23
|
+
'gmail.com',
|
|
24
|
+
'youtube.com',
|
|
25
|
+
'googleusercontent.com',
|
|
26
|
+
'googleapis.com',
|
|
27
|
+
]);
|
|
28
|
+
/** Map auth_data.source_browser → (Application Support relative path, Keychain service/account).
|
|
29
|
+
* We only fully support Chrome in v1; the others are stubbed for the future
|
|
30
|
+
* but always return null on the keychain lookup path. */
|
|
31
|
+
function browserConfig(sourceBrowser) {
|
|
32
|
+
switch (sourceBrowser) {
|
|
33
|
+
case 'chrome':
|
|
34
|
+
return {
|
|
35
|
+
userDataRootDefault: 'Google/Chrome',
|
|
36
|
+
keychain: { service: 'Chrome Safe Storage', account: 'Chrome' },
|
|
37
|
+
};
|
|
38
|
+
// Brave / Edge / Arc decryption needs different keychain entries plus
|
|
39
|
+
// version probing — held back until the v1 mirror flow lands.
|
|
40
|
+
default:
|
|
41
|
+
return null;
|
|
42
|
+
}
|
|
43
|
+
}
|
|
44
|
+
/**
|
|
45
|
+
* Mirror-mode wrapper: decrypt the profile's cookies, filter out the
|
|
46
|
+
* Google-account deny-list. Used by `lobu connector run` so the connector
|
|
47
|
+
* subprocess can run authenticated against a user's Chrome state without
|
|
48
|
+
* launching anything.
|
|
49
|
+
*/
|
|
50
|
+
export async function acquireMirroredCookies(params) {
|
|
51
|
+
const result = await decryptChromeCookiesMacOS({
|
|
52
|
+
sourceBrowser: params.sourceBrowser,
|
|
53
|
+
userDataRoot: params.userDataRoot,
|
|
54
|
+
sourceProfileDir: params.sourceProfileDir,
|
|
55
|
+
denyDomains: new Set(GOOGLE_ACCOUNT_DOMAINS_DENY_LIST),
|
|
56
|
+
});
|
|
57
|
+
sdkLogger.info({
|
|
58
|
+
userDataRoot: params.userDataRoot,
|
|
59
|
+
sourceProfileDir: params.sourceProfileDir,
|
|
60
|
+
totalDecryptedCount: result.total_decrypted,
|
|
61
|
+
skippedGoogleCount: result.denied,
|
|
62
|
+
keptCount: result.cookies.length,
|
|
63
|
+
}, '[MirrorCookies] Acquired');
|
|
64
|
+
return {
|
|
65
|
+
cookies: result.cookies,
|
|
66
|
+
skipped_google_count: result.denied,
|
|
67
|
+
total_decrypted_count: result.total_decrypted,
|
|
68
|
+
};
|
|
69
|
+
}
|
|
70
|
+
/**
|
|
71
|
+
* Decrypt cookies from a macOS Chrome profile's SQLite store via the
|
|
72
|
+
* Keychain entry. Generic primitive consumed by both mirror mode (with
|
|
73
|
+
* the Google deny-list) and the CLI's `lobu memory browser-auth` capture
|
|
74
|
+
* flow (with a connector-scoped allow-list). Replaces the older
|
|
75
|
+
* `extractCookiesMacOS` that used to live in
|
|
76
|
+
* `packages/cli/src/commands/memory/_lib/browser-auth-cmd.ts` — that
|
|
77
|
+
* file now imports this.
|
|
78
|
+
*/
|
|
79
|
+
export async function decryptChromeCookiesMacOS(params) {
|
|
80
|
+
if (process.platform !== 'darwin') {
|
|
81
|
+
throw new Error(`Mirror cookie acquisition is currently macOS-only (process.platform=${process.platform}). Linux/Windows pending.`);
|
|
82
|
+
}
|
|
83
|
+
const cfg = browserConfig(params.sourceBrowser ?? 'chrome');
|
|
84
|
+
if (!cfg) {
|
|
85
|
+
throw new Error(`Mirror mode does not yet support source_browser='${params.sourceBrowser}' (v1 is Chrome only).`);
|
|
86
|
+
}
|
|
87
|
+
// `sourceProfileDir` is supplied by the CLI/UI (user-picked Chrome
|
|
88
|
+
// profile slug like "Default" or "Profile 1"). Reject anything that
|
|
89
|
+
// contains path separators or parent-dir references so the join below
|
|
90
|
+
// can't escape `userDataRoot` and read an arbitrary SQLite file.
|
|
91
|
+
const profileDir = params.sourceProfileDir;
|
|
92
|
+
if (typeof profileDir !== 'string' ||
|
|
93
|
+
profileDir.length === 0 ||
|
|
94
|
+
/[/\\\0]/.test(profileDir) ||
|
|
95
|
+
profileDir === '.' ||
|
|
96
|
+
profileDir === '..' ||
|
|
97
|
+
profileDir.startsWith('..')) {
|
|
98
|
+
throw new Error(`Invalid sourceProfileDir '${profileDir}': must be a single Chrome profile directory name (e.g. "Default", "Profile 1")`);
|
|
99
|
+
}
|
|
100
|
+
const cookiePath = join(params.userDataRoot, params.sourceProfileDir, 'Cookies');
|
|
101
|
+
if (!existsSync(cookiePath)) {
|
|
102
|
+
throw new Error(`Source Chrome profile has no Cookies file at ${cookiePath}. The profile may have been deleted or renamed — re-pick in Lobu.`);
|
|
103
|
+
}
|
|
104
|
+
const { pbkdf2Sync, createDecipheriv } = await import('node:crypto');
|
|
105
|
+
// node:sqlite is stable on Node 22+; the lobu repo pins Node 22-24.
|
|
106
|
+
// @types/node 20 doesn't include the typings yet, so the dynamic-import
|
|
107
|
+
// module specifier trips the TS resolver — suppress.
|
|
108
|
+
// @ts-expect-error — node:sqlite typings not in @types/node@20
|
|
109
|
+
const { DatabaseSync } = await import('node:sqlite');
|
|
110
|
+
// Chrome holds a write lock on Cookies; copy to temp so the read can
|
|
111
|
+
// happen safely even while Chrome is running. SQLite WAL mode makes the
|
|
112
|
+
// snapshot consistent.
|
|
113
|
+
const tmpDir = mkdtempSync(join(tmpdir(), 'lobu-mirror-'));
|
|
114
|
+
const tmpCookiePath = join(tmpDir, 'Cookies');
|
|
115
|
+
copyFileSync(cookiePath, tmpCookiePath);
|
|
116
|
+
const journalSrc = join(params.userDataRoot, params.sourceProfileDir, 'Cookies-journal');
|
|
117
|
+
if (existsSync(journalSrc)) {
|
|
118
|
+
copyFileSync(journalSrc, join(tmpDir, 'Cookies-journal'));
|
|
119
|
+
}
|
|
120
|
+
try {
|
|
121
|
+
let keychainKey = null;
|
|
122
|
+
try {
|
|
123
|
+
// execFileSync (no shell) — keychain service/account are hardcoded today
|
|
124
|
+
// but if the browserConfig table ever grows from caller input, the shell
|
|
125
|
+
// form would be a command-injection foothold. Pass args explicitly.
|
|
126
|
+
keychainKey = execFileSync('security', [
|
|
127
|
+
'find-generic-password',
|
|
128
|
+
'-w',
|
|
129
|
+
'-s',
|
|
130
|
+
cfg.keychain.service,
|
|
131
|
+
'-a',
|
|
132
|
+
cfg.keychain.account,
|
|
133
|
+
], { encoding: 'utf-8', stdio: ['pipe', 'pipe', 'pipe'] }).trim();
|
|
134
|
+
}
|
|
135
|
+
catch {
|
|
136
|
+
keychainKey = null;
|
|
137
|
+
}
|
|
138
|
+
if (!keychainKey) {
|
|
139
|
+
throw new Error('Could not read the Chrome encryption key from macOS Keychain. ' +
|
|
140
|
+
'If a system dialog appeared, click "Always Allow" and retry. If no dialog appeared, ' +
|
|
141
|
+
'your Keychain may be locked — run: security unlock-keychain');
|
|
142
|
+
}
|
|
143
|
+
// Chrome's key derivation: PBKDF2(keychainKey, "saltysalt", 1003, 16, sha1).
|
|
144
|
+
const derivedKey = pbkdf2Sync(keychainKey, 'saltysalt', 1003, 16, 'sha1');
|
|
145
|
+
const db = new DatabaseSync(tmpCookiePath, { readOnly: true });
|
|
146
|
+
let rows;
|
|
147
|
+
try {
|
|
148
|
+
rows = db
|
|
149
|
+
.prepare(`SELECT name, host_key, path, encrypted_value,
|
|
150
|
+
CAST(expires_utc AS TEXT) as expires_utc_text,
|
|
151
|
+
is_httponly, is_secure, samesite
|
|
152
|
+
FROM cookies`)
|
|
153
|
+
.all();
|
|
154
|
+
}
|
|
155
|
+
finally {
|
|
156
|
+
// Close the SQLite handle even if prepare/all throws — otherwise the
|
|
157
|
+
// temp DB stays open until the process exits, which on a hot reload
|
|
158
|
+
// path leaks one fd per sync.
|
|
159
|
+
try {
|
|
160
|
+
db.close();
|
|
161
|
+
}
|
|
162
|
+
catch {
|
|
163
|
+
/* best-effort */
|
|
164
|
+
}
|
|
165
|
+
}
|
|
166
|
+
const cookies = [];
|
|
167
|
+
let totalDecrypted = 0;
|
|
168
|
+
let denied = 0;
|
|
169
|
+
let filtered = 0;
|
|
170
|
+
const chromeEpochOffset = 11644473600n;
|
|
171
|
+
const iv = Buffer.alloc(16, ' ');
|
|
172
|
+
const allowSet = params.allowDomains?.length
|
|
173
|
+
? buildAllowMatcher(params.allowDomains)
|
|
174
|
+
: null;
|
|
175
|
+
for (const row of rows) {
|
|
176
|
+
const raw = row.encrypted_value;
|
|
177
|
+
const encrypted = raw instanceof Buffer ? raw : Buffer.from(raw);
|
|
178
|
+
let value = '';
|
|
179
|
+
if (encrypted.length > 3) {
|
|
180
|
+
const version = encrypted.slice(0, 3).toString('utf-8');
|
|
181
|
+
if (version === 'v10' || version === 'v11') {
|
|
182
|
+
const ciphertext = encrypted.slice(3);
|
|
183
|
+
try {
|
|
184
|
+
const decipher = createDecipheriv('aes-128-cbc', derivedKey, iv);
|
|
185
|
+
const dec = Buffer.concat([decipher.update(ciphertext), decipher.final()]);
|
|
186
|
+
value = extractCookieValue(dec);
|
|
187
|
+
}
|
|
188
|
+
catch {
|
|
189
|
+
continue;
|
|
190
|
+
}
|
|
191
|
+
}
|
|
192
|
+
else {
|
|
193
|
+
value = encrypted.toString('utf-8');
|
|
194
|
+
}
|
|
195
|
+
}
|
|
196
|
+
if (!value && !row.name)
|
|
197
|
+
continue;
|
|
198
|
+
totalDecrypted += 1;
|
|
199
|
+
// Deny-list (e.g. Google account domains for mirror mode) wins over
|
|
200
|
+
// allow-list — keeps callers from accidentally allowing something
|
|
201
|
+
// the deny-list intended to skip.
|
|
202
|
+
if (params.denyDomains && matchesDomainSet(row.host_key, params.denyDomains)) {
|
|
203
|
+
denied += 1;
|
|
204
|
+
continue;
|
|
205
|
+
}
|
|
206
|
+
if (allowSet && !allowSet(row.host_key)) {
|
|
207
|
+
filtered += 1;
|
|
208
|
+
continue;
|
|
209
|
+
}
|
|
210
|
+
// Playwright's addCookies is fail-fast on any invalid entry. A
|
|
211
|
+
// handful of cookies decrypt to garbage (pre-M80 layout, legacy
|
|
212
|
+
// v10 variants); reject anything with non-printable bytes since
|
|
213
|
+
// those are clearly metadata leaking through, not a real value.
|
|
214
|
+
if (!row.name || !row.host_key || !isLikelyCookieValue(value)) {
|
|
215
|
+
filtered += 1;
|
|
216
|
+
continue;
|
|
217
|
+
}
|
|
218
|
+
const rowPath = row.path && row.path.length > 0 ? row.path : '/';
|
|
219
|
+
const expiresUtc = BigInt(row.expires_utc_text ?? '0');
|
|
220
|
+
const expiresUnix = expiresUtc > 0n ? Number(expiresUtc / 1000000n - chromeEpochOffset) : -1;
|
|
221
|
+
// Chrome's `samesite` is -1 (unspecified) | 0 (None) | 1 (Lax) | 2
|
|
222
|
+
// (Strict). Playwright requires exactly one of the three named
|
|
223
|
+
// values; collapse "unspecified" to Lax (the modern Chrome
|
|
224
|
+
// default). "None" requires Secure — promote insecure-None to Lax
|
|
225
|
+
// so the addCookies batch stays valid.
|
|
226
|
+
const sameSite = row.samesite === 0 ? 'None' : row.samesite === 2 ? 'Strict' : 'Lax';
|
|
227
|
+
const finalSameSite = sameSite === 'None' && row.is_secure !== 1 ? 'Lax' : sameSite;
|
|
228
|
+
cookies.push({
|
|
229
|
+
name: row.name,
|
|
230
|
+
value,
|
|
231
|
+
domain: row.host_key,
|
|
232
|
+
path: rowPath,
|
|
233
|
+
expires: expiresUnix,
|
|
234
|
+
httpOnly: row.is_httponly === 1,
|
|
235
|
+
secure: row.is_secure === 1,
|
|
236
|
+
sameSite: finalSameSite,
|
|
237
|
+
});
|
|
238
|
+
}
|
|
239
|
+
return { cookies, total_decrypted: totalDecrypted, denied, filtered };
|
|
240
|
+
}
|
|
241
|
+
finally {
|
|
242
|
+
try {
|
|
243
|
+
rmSync(tmpDir, { recursive: true, force: true });
|
|
244
|
+
}
|
|
245
|
+
catch {
|
|
246
|
+
// ignore tmp dir cleanup failure
|
|
247
|
+
}
|
|
248
|
+
}
|
|
249
|
+
}
|
|
250
|
+
/** Chrome M80+ prepends 32 bytes of SHA256(host_key) to the plaintext
|
|
251
|
+
* before encrypting (per Chromium's `os_crypt_mac.mm`). Slice those off
|
|
252
|
+
* and the remainder is the cookie value, with PKCS#7 padding stripped
|
|
253
|
+
* automatically by Node's `createDecipheriv.final()`. Pre-M80 cookies
|
|
254
|
+
* that lack the prefix decrypt to all-garbage under this slice and get
|
|
255
|
+
* dropped by `isLikelyCookieValue` downstream. */
|
|
256
|
+
function extractCookieValue(buf) {
|
|
257
|
+
if (buf.length <= 32)
|
|
258
|
+
return buf.toString('utf-8');
|
|
259
|
+
return buf.slice(32).toString('utf-8');
|
|
260
|
+
}
|
|
261
|
+
/** Build a host-matching predicate for an allow-list: exact host match or
|
|
262
|
+
* subdomain match (matches `.example.com` and `sub.example.com`). */
|
|
263
|
+
function buildAllowMatcher(domains) {
|
|
264
|
+
const patterns = domains.map((d) => d.replace(/^\./, '').toLowerCase());
|
|
265
|
+
return (host) => {
|
|
266
|
+
const normalized = host.toLowerCase();
|
|
267
|
+
return patterns.some((p) => normalized === p || normalized.endsWith(`.${p}`));
|
|
268
|
+
};
|
|
269
|
+
}
|
|
270
|
+
function matchesDomainSet(host, deny) {
|
|
271
|
+
const normalized = host.replace(/^\./, '').toLowerCase();
|
|
272
|
+
if (deny.has(normalized))
|
|
273
|
+
return true;
|
|
274
|
+
for (const denied of deny) {
|
|
275
|
+
if (normalized.endsWith(`.${denied}`))
|
|
276
|
+
return true;
|
|
277
|
+
}
|
|
278
|
+
return false;
|
|
279
|
+
}
|
|
280
|
+
/** Real cookie values are printable ASCII (the Set-Cookie wire format
|
|
281
|
+
* forbids control characters). Anything else is a decryption artifact
|
|
282
|
+
* we should drop before sending to Playwright. */
|
|
283
|
+
function isLikelyCookieValue(value) {
|
|
284
|
+
if (!value)
|
|
285
|
+
return false;
|
|
286
|
+
for (let i = 0; i < value.length; i++) {
|
|
287
|
+
const c = value.charCodeAt(i);
|
|
288
|
+
if (c < 0x20 || c > 0x7e)
|
|
289
|
+
return false;
|
|
290
|
+
}
|
|
291
|
+
return true;
|
|
292
|
+
}
|
|
293
|
+
//# sourceMappingURL=mirror-cookies.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mirror-cookies.js","sourceRoot":"","sources":["../../src/browser/mirror-cookies.ts"],"names":[],"mappings":"AAAA;;;;;;;GAOG;AAEH,OAAO,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAC;AAClD,OAAO,EAAE,YAAY,EAAE,UAAU,EAAE,WAAW,EAAE,MAAM,EAAE,MAAM,SAAS,CAAC;AACxE,OAAO,EAAE,MAAM,EAAE,MAAM,SAAS,CAAC;AACjC,OAAO,EAAE,IAAI,EAAE,MAAM,WAAW,CAAC;AAEjC,OAAO,EAAE,SAAS,EAAE,MAAM,cAAc,CAAC;AAEzC;;;;4DAI4D;AAC5D,MAAM,gCAAgC,GAAG,IAAI,GAAG,CAAC;IAC/C,YAAY;IACZ,qBAAqB;IACrB,iBAAiB;IACjB,WAAW;IACX,aAAa;IACb,uBAAuB;IACvB,gBAAgB;CACjB,CAAC,CAAC;AAEH;;yDAEyD;AACzD,SAAS,aAAa,CAAC,aAAqB;IAI1C,QAAQ,aAAa,EAAE,CAAC;QACtB,KAAK,QAAQ;YACX,OAAO;gBACL,mBAAmB,EAAE,eAAe;gBACpC,QAAQ,EAAE,EAAE,OAAO,EAAE,qBAAqB,EAAE,OAAO,EAAE,QAAQ,EAAE;aAChE,CAAC;QACJ,sEAAsE;QACtE,8DAA8D;QAC9D;YACE,OAAO,IAAI,CAAC;IAChB,CAAC;AACH,CAAC;AA2CD;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,sBAAsB,CAC1C,MAAiC;IAEjC,MAAM,MAAM,GAAG,MAAM,yBAAyB,CAAC;QAC7C,aAAa,EAAE,MAAM,CAAC,aAAa;QACnC,YAAY,EAAE,MAAM,CAAC,YAAY;QACjC,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;QACzC,WAAW,EAAE,IAAI,GAAG,CAAC,gCAAgC,CAAC;KACvD,CAAC,CAAC;IACH,SAAS,CAAC,IAAI,CACZ;QACE,YAAY,EAAE,MAAM,CAAC,YAAY;QACjC,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;QACzC,mBAAmB,EAAE,MAAM,CAAC,eAAe;QAC3C,kBAAkB,EAAE,MAAM,CAAC,MAAM;QACjC,SAAS,EAAE,MAAM,CAAC,OAAO,CAAC,MAAM;KACjC,EACD,0BAA0B,CAC3B,CAAC;IACF,OAAO;QACL,OAAO,EAAE,MAAM,CAAC,OAAO;QACvB,oBAAoB,EAAE,MAAM,CAAC,MAAM;QACnC,qBAAqB,EAAE,MAAM,CAAC,eAAe;KAC9C,CAAC;AACJ,CAAC;AAED;;;;;;;;GAQG;AACH,MAAM,CAAC,KAAK,UAAU,yBAAyB,CAC7C,MAAkC;IAElC,IAAI,OAAO,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAClC,MAAM,IAAI,KAAK,CACb,uEAAuE,OAAO,CAAC,QAAQ,2BAA2B,CACnH,CAAC;IACJ,CAAC;IACD,MAAM,GAAG,GAAG,aAAa,CAAC,MAAM,CAAC,aAAa,IAAI,QAAQ,CAAC,CAAC;IAC5D,IAAI,CAAC,GAAG,EAAE,CAAC;QACT,MAAM,IAAI,KAAK,CACb,oDAAoD,MAAM,CAAC,aAAa,wBAAwB,CACjG,CAAC;IACJ,CAAC;IAED,mEAAmE;IACnE,oEAAoE;IACpE,sEAAsE;IACtE,iEAAiE;IACjE,MAAM,UAAU,GAAG,MAAM,CAAC,gBAAgB,CAAC;IAC3C,IACE,OAAO,UAAU,KAAK,QAAQ;QAC9B,UAAU,CAAC,MAAM,KAAK,CAAC;QACvB,SAAS,CAAC,IAAI,CAAC,UAAU,CAAC;QAC1B,UAAU,KAAK,GAAG;QAClB,UAAU,KAAK,IAAI;QACnB,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,EAC3B,CAAC;QACD,MAAM,IAAI,KAAK,CACb,6BAA6B,UAAU,iFAAiF,CACzH,CAAC;IACJ,CAAC;IAED,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,MAAM,CAAC,gBAAgB,EAAE,SAAS,CAAC,CAAC;IACjF,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CACb,gDAAgD,UAAU,mEAAmE,CAC9H,CAAC;IACJ,CAAC;IAED,MAAM,EAAE,UAAU,EAAE,gBAAgB,EAAE,GAAG,MAAM,MAAM,CAAC,aAAa,CAAC,CAAC;IACrE,oEAAoE;IACpE,wEAAwE;IACxE,qDAAqD;IACrD,+DAA+D;IAC/D,MAAM,EAAE,YAAY,EAAE,GAAG,MAAM,MAAM,CAAC,aAAa,CAAC,CAAC;IAErD,qEAAqE;IACrE,wEAAwE;IACxE,uBAAuB;IACvB,MAAM,MAAM,GAAG,WAAW,CAAC,IAAI,CAAC,MAAM,EAAE,EAAE,cAAc,CAAC,CAAC,CAAC;IAC3D,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;IAC9C,YAAY,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;IACxC,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,MAAM,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;IACzF,IAAI,UAAU,CAAC,UAAU,CAAC,EAAE,CAAC;QAC3B,YAAY,CAAC,UAAU,EAAE,IAAI,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC,CAAC;IAC5D,CAAC;IAED,IAAI,CAAC;QACH,IAAI,WAAW,GAAkB,IAAI,CAAC;QACtC,IAAI,CAAC;YACH,yEAAyE;YACzE,yEAAyE;YACzE,oEAAoE;YACpE,WAAW,GAAG,YAAY,CACxB,UAAU,EACV;gBACE,uBAAuB;gBACvB,IAAI;gBACJ,IAAI;gBACJ,GAAG,CAAC,QAAQ,CAAC,OAAO;gBACpB,IAAI;gBACJ,GAAG,CAAC,QAAQ,CAAC,OAAO;aACrB,EACD,EAAE,QAAQ,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,CACvD,CAAC,IAAI,EAAE,CAAC;QACX,CAAC;QAAC,MAAM,CAAC;YACP,WAAW,GAAG,IAAI,CAAC;QACrB,CAAC;QACD,IAAI,CAAC,WAAW,EAAE,CAAC;YACjB,MAAM,IAAI,KAAK,CACb,gEAAgE;gBAC9D,sFAAsF;gBACtF,6DAA6D,CAChE,CAAC;QACJ,CAAC;QAED,6EAA6E;QAC7E,MAAM,UAAU,GAAG,UAAU,CAAC,WAAW,EAAE,WAAW,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,CAAC,CAAC;QAE1E,MAAM,EAAE,GAAG,IAAI,YAAY,CAAC,aAAa,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAC;QAC/D,IAAI,IASF,CAAC;QACH,IAAI,CAAC;YACH,IAAI,GAAG,EAAE;iBACN,OAAO,CACN;;;wBAGc,CACf;iBACA,GAAG,EAAiB,CAAC;QAC1B,CAAC;gBAAS,CAAC;YACT,qEAAqE;YACrE,oEAAoE;YACpE,8BAA8B;YAC9B,IAAI,CAAC;gBACH,EAAE,CAAC,KAAK,EAAE,CAAC;YACb,CAAC;YAAC,MAAM,CAAC;gBACP,iBAAiB;YACnB,CAAC;QACH,CAAC;QAED,MAAM,OAAO,GAAa,EAAE,CAAC;QAC7B,IAAI,cAAc,GAAG,CAAC,CAAC;QACvB,IAAI,MAAM,GAAG,CAAC,CAAC;QACf,IAAI,QAAQ,GAAG,CAAC,CAAC;QACjB,MAAM,iBAAiB,GAAG,YAAY,CAAC;QACvC,MAAM,EAAE,GAAG,MAAM,CAAC,KAAK,CAAC,EAAE,EAAE,GAAG,CAAC,CAAC;QACjC,MAAM,QAAQ,GAAG,MAAM,CAAC,YAAY,EAAE,MAAM;YAC1C,CAAC,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC;YACxC,CAAC,CAAC,IAAI,CAAC;QAET,KAAK,MAAM,GAAG,IAAI,IAAI,EAAE,CAAC;YACvB,MAAM,GAAG,GAAG,GAAG,CAAC,eAAe,CAAC;YAChC,MAAM,SAAS,GAAG,GAAG,YAAY,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YACjE,IAAI,KAAK,GAAG,EAAE,CAAC;YAEf,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzB,MAAM,OAAO,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;gBACxD,IAAI,OAAO,KAAK,KAAK,IAAI,OAAO,KAAK,KAAK,EAAE,CAAC;oBAC3C,MAAM,UAAU,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;oBACtC,IAAI,CAAC;wBACH,MAAM,QAAQ,GAAG,gBAAgB,CAAC,aAAa,EAAE,UAAU,EAAE,EAAE,CAAC,CAAC;wBACjE,MAAM,GAAG,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,UAAU,CAAC,EAAE,QAAQ,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC;wBAC3E,KAAK,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;oBAClC,CAAC;oBAAC,MAAM,CAAC;wBACP,SAAS;oBACX,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,KAAK,GAAG,SAAS,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;gBACtC,CAAC;YACH,CAAC;YACD,IAAI,CAAC,KAAK,IAAI,CAAC,GAAG,CAAC,IAAI;gBAAE,SAAS;YAClC,cAAc,IAAI,CAAC,CAAC;YAEpB,oEAAoE;YACpE,kEAAkE;YAClE,kCAAkC;YAClC,IAAI,MAAM,CAAC,WAAW,IAAI,gBAAgB,CAAC,GAAG,CAAC,QAAQ,EAAE,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC;gBAC7E,MAAM,IAAI,CAAC,CAAC;gBACZ,SAAS;YACX,CAAC;YACD,IAAI,QAAQ,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACxC,QAAQ,IAAI,CAAC,CAAC;gBACd,SAAS;YACX,CAAC;YAED,+DAA+D;YAC/D,gEAAgE;YAChE,gEAAgE;YAChE,gEAAgE;YAChE,IAAI,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC,GAAG,CAAC,QAAQ,IAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,EAAE,CAAC;gBAC9D,QAAQ,IAAI,CAAC,CAAC;gBACd,SAAS;YACX,CAAC;YACD,MAAM,OAAO,GAAG,GAAG,CAAC,IAAI,IAAI,GAAG,CAAC,IAAI,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC,GAAG,CAAC;YAEjE,MAAM,UAAU,GAAG,MAAM,CAAC,GAAG,CAAC,gBAAgB,IAAI,GAAG,CAAC,CAAC;YACvD,MAAM,WAAW,GACf,UAAU,GAAG,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,UAAU,GAAG,QAAQ,GAAG,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;YAE3E,mEAAmE;YACnE,+DAA+D;YAC/D,2DAA2D;YAC3D,kEAAkE;YAClE,uCAAuC;YACvC,MAAM,QAAQ,GACZ,GAAG,CAAC,QAAQ,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,QAAQ,KAAK,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC;YACtE,MAAM,aAAa,GACjB,QAAQ,KAAK,MAAM,IAAI,GAAG,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,QAAQ,CAAC;YAEhE,OAAO,CAAC,IAAI,CAAC;gBACX,IAAI,EAAE,GAAG,CAAC,IAAI;gBACd,KAAK;gBACL,MAAM,EAAE,GAAG,CAAC,QAAQ;gBACpB,IAAI,EAAE,OAAO;gBACb,OAAO,EAAE,WAAW;gBACpB,QAAQ,EAAE,GAAG,CAAC,WAAW,KAAK,CAAC;gBAC/B,MAAM,EAAE,GAAG,CAAC,SAAS,KAAK,CAAC;gBAC3B,QAAQ,EAAE,aAAa;aACxB,CAAC,CAAC;QACL,CAAC;QACD,OAAO,EAAE,OAAO,EAAE,eAAe,EAAE,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC;IACxE,CAAC;YAAS,CAAC;QACT,IAAI,CAAC;YACH,MAAM,CAAC,MAAM,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;QACnD,CAAC;QAAC,MAAM,CAAC;YACP,iCAAiC;QACnC,CAAC;IACH,CAAC;AACH,CAAC;AAED;;;;;kDAKkD;AAClD,SAAS,kBAAkB,CAAC,GAAW;IACrC,IAAI,GAAG,CAAC,MAAM,IAAI,EAAE;QAAE,OAAO,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;IACnD,OAAO,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;AACzC,CAAC;AAED;qEACqE;AACrE,SAAS,iBAAiB,CAAC,OAAiB;IAC1C,MAAM,QAAQ,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC;IACxE,OAAO,CAAC,IAAY,EAAE,EAAE;QACtB,MAAM,UAAU,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;QACtC,OAAO,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,UAAU,KAAK,CAAC,IAAI,UAAU,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAC;IAChF,CAAC,CAAC;AACJ,CAAC;AAED,SAAS,gBAAgB,CAAC,IAAY,EAAE,IAAiB;IACvD,MAAM,UAAU,GAAG,IAAI,CAAC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC,WAAW,EAAE,CAAC;IACzD,IAAI,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC;QAAE,OAAO,IAAI,CAAC;IACtC,KAAK,MAAM,MAAM,IAAI,IAAI,EAAE,CAAC;QAC1B,IAAI,UAAU,CAAC,QAAQ,CAAC,IAAI,MAAM,EAAE,CAAC;YAAE,OAAO,IAAI,CAAC;IACrD,CAAC;IACD,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;kDAEkD;AAClD,SAAS,mBAAmB,CAAC,KAAa;IACxC,IAAI,CAAC,KAAK;QAAE,OAAO,KAAK,CAAC;IACzB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;QACtC,MAAM,CAAC,GAAG,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;QAC9B,IAAI,CAAC,GAAG,IAAI,IAAI,CAAC,GAAG,IAAI;YAAE,OAAO,KAAK,CAAC;IACzC,CAAC;IACD,OAAO,IAAI,CAAC;AACd,CAAC"}
|
|
@@ -47,5 +47,11 @@ export declare function browserNetworkSync<TItem>(opts: {
|
|
|
47
47
|
* When set, CDP is tried first; if unavailable, falls back to Playwright + cookies.
|
|
48
48
|
*/
|
|
49
49
|
cdpUrl?: string | 'auto' | null;
|
|
50
|
+
/**
|
|
51
|
+
* Device-bound managed --user-data-dir. When set, Playwright launches via
|
|
52
|
+
* launchPersistentContext and CDP is skipped — cookies live on disk in this
|
|
53
|
+
* profile dir.
|
|
54
|
+
*/
|
|
55
|
+
userDataDir?: string;
|
|
50
56
|
}): Promise<BrowserNetworkResult<TItem>>;
|
|
51
57
|
//# sourceMappingURL=browser-network.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"browser-network.d.ts","sourceRoot":"","sources":["../src/browser-network.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;GAWG;AAEH,OAAO,KAAK,EAA2B,MAAM,EAAE,IAAI,EAAY,MAAM,YAAY,CAAC;AAKlF,MAAM,WAAW,oBAAoB;IACnC,gFAAgF;IAChF,iBAAiB,EAAE,CAAC,MAAM,GAAG,MAAM,CAAC,EAAE,CAAC;IACvC,mEAAmE;IACnE,WAAW,EAAE,MAAM,EAAE,CAAC;IACtB,uEAAuE;IACvE,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,kDAAkD;IAClD,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,uEAAuE;IACvE,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B,gDAAgD;IAChD,mBAAmB,CAAC,EAAE,MAAM,CAAC;IAC7B,kEAAkE;IAClE,OAAO,CAAC,EAAE,OAAO,CAAC;CACnB;AAED,MAAM,WAAW,oBAAoB,CAAC,KAAK;IACzC,KAAK,EAAE,KAAK,EAAE,CAAC;IACf,OAAO,EAAE,MAAM,EAAE,CAAC;IAClB,YAAY,EAAE,MAAM,CAAC;IACrB,qCAAqC;IACrC,OAAO,EAAE,KAAK,GAAG,YAAY,CAAC;CAC/B;
|
|
1
|
+
{"version":3,"file":"browser-network.d.ts","sourceRoot":"","sources":["../src/browser-network.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;GAWG;AAEH,OAAO,KAAK,EAA2B,MAAM,EAAE,IAAI,EAAY,MAAM,YAAY,CAAC;AAKlF,MAAM,WAAW,oBAAoB;IACnC,gFAAgF;IAChF,iBAAiB,EAAE,CAAC,MAAM,GAAG,MAAM,CAAC,EAAE,CAAC;IACvC,mEAAmE;IACnE,WAAW,EAAE,MAAM,EAAE,CAAC;IACtB,uEAAuE;IACvE,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,kDAAkD;IAClD,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,uEAAuE;IACvE,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B,gDAAgD;IAChD,mBAAmB,CAAC,EAAE,MAAM,CAAC;IAC7B,kEAAkE;IAClE,OAAO,CAAC,EAAE,OAAO,CAAC;CACnB;AAED,MAAM,WAAW,oBAAoB,CAAC,KAAK;IACzC,KAAK,EAAE,KAAK,EAAE,CAAC;IACf,OAAO,EAAE,MAAM,EAAE,CAAC;IAClB,YAAY,EAAE,MAAM,CAAC;IACrB,qCAAqC;IACrC,OAAO,EAAE,KAAK,GAAG,YAAY,CAAC;CAC/B;AAgKD,wBAAsB,kBAAkB,CAAC,KAAK,EAAE,IAAI,EAAE;IACpD,MAAM,EAAE,oBAAoB,CAAC;IAC7B,GAAG,EAAE,MAAM,CAAC;IACZ,+EAA+E;IAC/E,OAAO,EAAE,MAAM,EAAE,CAAC;IAClB,aAAa,EAAE,CAAC,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,OAAO,KAAK,KAAK,EAAE,CAAC;IACvD,eAAe,CAAC,EAAE,CAAC,IAAI,EAAE,IAAI,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IAChD,SAAS,CAAC,EAAE,CAAC,IAAI,EAAE,IAAI,KAAK,OAAO,CAAC,OAAO,CAAC,CAAC;IAC7C;;;OAGG;IACH,MAAM,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,IAAI,CAAC;IAChC;;;;OAIG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB,GAAG,OAAO,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC,CAoHvC"}
|