@playwo/opencode-cursor-oauth 0.0.0-dev.a9d6c62f0dd9 → 0.0.0-dev.c1bf17c092a2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +19 -91
- package/dist/auth.js +26 -1
- package/dist/index.js +125 -51
- package/dist/logger.d.ts +6 -0
- package/dist/logger.js +142 -0
- package/dist/models.js +26 -2
- package/dist/proxy.d.ts +1 -0
- package/dist/proxy.js +261 -51
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -1,103 +1,31 @@
|
|
|
1
|
-
#
|
|
1
|
+
# opencode-cursor-oauth
|
|
2
2
|
|
|
3
|
-
|
|
4
|
-
models inside OpenCode with full tool-calling support.
|
|
3
|
+
Use Cursor models (Claude, GPT, Gemini, etc.) inside [OpenCode](https://opencode.ai).
|
|
5
4
|
|
|
6
|
-
##
|
|
5
|
+
## What it does
|
|
7
6
|
|
|
8
|
-
|
|
7
|
+
- **OAuth login** to Cursor via browser
|
|
8
|
+
- **Model discovery** — automatically fetches your available Cursor models
|
|
9
|
+
- **Local proxy** — runs an OpenAI-compatible endpoint that translates to Cursor's gRPC protocol
|
|
10
|
+
- **Auto-refresh** — handles token expiration automatically
|
|
9
11
|
|
|
10
|
-
|
|
11
|
-
{
|
|
12
|
-
"$schema": "https://opencode.ai/config.json",
|
|
13
|
-
"plugin": [
|
|
14
|
-
"@playwo/opencode-cursor-oauth"
|
|
15
|
-
],
|
|
16
|
-
"provider": {
|
|
17
|
-
"cursor": {
|
|
18
|
-
"name": "Cursor"
|
|
19
|
-
}
|
|
20
|
-
}
|
|
21
|
-
}
|
|
22
|
-
```
|
|
23
|
-
|
|
24
|
-
The `cursor` provider stub is required because OpenCode drops providers that do
|
|
25
|
-
not already exist in its bundled provider catalog.
|
|
26
|
-
|
|
27
|
-
OpenCode installs npm plugins automatically at startup, so users do not need to
|
|
28
|
-
clone this repository.
|
|
29
|
-
|
|
30
|
-
## Authenticate
|
|
31
|
-
|
|
32
|
-
```sh
|
|
33
|
-
opencode auth login --provider cursor
|
|
34
|
-
```
|
|
35
|
-
|
|
36
|
-
This opens Cursor OAuth in the browser. Tokens are stored in
|
|
37
|
-
`~/.local/share/opencode/auth.json` and refreshed automatically.
|
|
38
|
-
|
|
39
|
-
## Use
|
|
40
|
-
|
|
41
|
-
Start OpenCode and select any Cursor model. The plugin starts a local
|
|
42
|
-
OpenAI-compatible proxy on demand and routes requests through Cursor's gRPC API.
|
|
43
|
-
|
|
44
|
-
## How it works
|
|
45
|
-
|
|
46
|
-
1. OAuth — browser-based login to Cursor via PKCE.
|
|
47
|
-
2. Model discovery — queries Cursor's gRPC API for all available models and fails plugin loading visibly if discovery does not succeed.
|
|
48
|
-
3. Local proxy — translates `POST /v1/chat/completions` into Cursor's
|
|
49
|
-
protobuf/Connect protocol.
|
|
50
|
-
4. Native tool routing — rejects Cursor's built-in filesystem/shell tools and
|
|
51
|
-
exposes OpenCode's tool surface via Cursor MCP instead.
|
|
52
|
-
|
|
53
|
-
Cursor agent streaming uses Cursor's `RunSSE` + `BidiAppend` transport, so the
|
|
54
|
-
plugin runs entirely inside OpenCode without a Node sidecar.
|
|
12
|
+
## Install
|
|
55
13
|
|
|
56
|
-
|
|
14
|
+
Add to your `opencode.json`:
|
|
57
15
|
|
|
16
|
+
```json
|
|
17
|
+
{
|
|
18
|
+
"plugin": ["@playwo/opencode-cursor-oauth"]
|
|
19
|
+
}
|
|
58
20
|
```
|
|
59
|
-
OpenCode --> /v1/chat/completions --> Bun.serve (proxy)
|
|
60
|
-
|
|
|
61
|
-
RunSSE stream + BidiAppend writes
|
|
62
|
-
|
|
|
63
|
-
Cursor Connect/SSE transport
|
|
64
|
-
|
|
|
65
|
-
api2.cursor.sh gRPC
|
|
66
|
-
```
|
|
67
|
-
|
|
68
|
-
### Tool call flow
|
|
69
|
-
|
|
70
|
-
```
|
|
71
|
-
1. Cursor model receives OpenAI tools via RequestContext (as MCP tool defs)
|
|
72
|
-
2. Model tries native tools (readArgs, shellArgs, etc.)
|
|
73
|
-
3. Proxy rejects each with typed error (ReadRejected, ShellRejected, etc.)
|
|
74
|
-
4. Model falls back to MCP tool -> mcpArgs exec message
|
|
75
|
-
5. Proxy emits OpenAI tool_calls SSE chunk, pauses the Cursor stream
|
|
76
|
-
6. OpenCode executes tool, sends result in follow-up request
|
|
77
|
-
7. Proxy resumes the Cursor stream with mcpResult and continues streaming
|
|
78
|
-
```
|
|
79
|
-
|
|
80
|
-
## Develop locally
|
|
81
|
-
|
|
82
|
-
```sh
|
|
83
|
-
bun install
|
|
84
|
-
bun run build
|
|
85
|
-
bun test/smoke.ts
|
|
86
|
-
```
|
|
87
|
-
|
|
88
|
-
## Publish
|
|
89
21
|
|
|
90
|
-
|
|
22
|
+
Then authenticate via the OpenCode UI (Settings → Providers → Cursor → Login).
|
|
91
23
|
|
|
92
|
-
|
|
93
|
-
- versioned releases publish `latest` using the `package.json` version and upload the packed `.tgz` to the GitHub release
|
|
94
|
-
|
|
95
|
-
Repository secrets required:
|
|
24
|
+
## Requirements
|
|
96
25
|
|
|
97
|
-
-
|
|
26
|
+
- Cursor account with API access
|
|
27
|
+
- OpenCode 1.2+
|
|
98
28
|
|
|
99
|
-
##
|
|
29
|
+
## License
|
|
100
30
|
|
|
101
|
-
|
|
102
|
-
- [Bun](https://bun.sh)
|
|
103
|
-
- Active [Cursor](https://cursor.com) subscription
|
|
31
|
+
MIT
|
package/dist/auth.js
CHANGED
|
@@ -1,4 +1,5 @@
|
|
|
1
1
|
import { generatePKCE } from "./pkce";
|
|
2
|
+
import { errorDetails, logPluginError, logPluginWarn } from "./logger";
|
|
2
3
|
const CURSOR_LOGIN_URL = "https://cursor.com/loginDeepControl";
|
|
3
4
|
const CURSOR_POLL_URL = "https://api2.cursor.sh/auth/poll";
|
|
4
5
|
const CURSOR_REFRESH_URL = process.env.CURSOR_REFRESH_URL ??
|
|
@@ -40,13 +41,32 @@ export async function pollCursorAuth(uuid, verifier) {
|
|
|
40
41
|
}
|
|
41
42
|
throw new Error(`Poll failed: ${response.status}`);
|
|
42
43
|
}
|
|
43
|
-
catch {
|
|
44
|
+
catch (error) {
|
|
44
45
|
consecutiveErrors++;
|
|
45
46
|
if (consecutiveErrors >= 3) {
|
|
47
|
+
logPluginError("Cursor auth polling failed repeatedly", {
|
|
48
|
+
stage: "oauth_poll",
|
|
49
|
+
uuid,
|
|
50
|
+
attempts: attempt + 1,
|
|
51
|
+
consecutiveErrors,
|
|
52
|
+
...errorDetails(error),
|
|
53
|
+
});
|
|
46
54
|
throw new Error("Too many consecutive errors during Cursor auth polling");
|
|
47
55
|
}
|
|
56
|
+
logPluginWarn("Cursor auth polling attempt failed", {
|
|
57
|
+
stage: "oauth_poll",
|
|
58
|
+
uuid,
|
|
59
|
+
attempt: attempt + 1,
|
|
60
|
+
consecutiveErrors,
|
|
61
|
+
...errorDetails(error),
|
|
62
|
+
});
|
|
48
63
|
}
|
|
49
64
|
}
|
|
65
|
+
logPluginError("Cursor authentication polling timed out", {
|
|
66
|
+
stage: "oauth_poll",
|
|
67
|
+
uuid,
|
|
68
|
+
attempts: POLL_MAX_ATTEMPTS,
|
|
69
|
+
});
|
|
50
70
|
throw new Error("Cursor authentication polling timeout");
|
|
51
71
|
}
|
|
52
72
|
export async function refreshCursorToken(refreshToken) {
|
|
@@ -60,6 +80,11 @@ export async function refreshCursorToken(refreshToken) {
|
|
|
60
80
|
});
|
|
61
81
|
if (!response.ok) {
|
|
62
82
|
const error = await response.text();
|
|
83
|
+
logPluginError("Cursor token refresh failed", {
|
|
84
|
+
stage: "token_refresh",
|
|
85
|
+
status: response.status,
|
|
86
|
+
responseBody: error,
|
|
87
|
+
});
|
|
63
88
|
throw new Error(`Cursor token refresh failed: ${error}`);
|
|
64
89
|
}
|
|
65
90
|
const data = (await response.json());
|
package/dist/index.js
CHANGED
|
@@ -1,42 +1,27 @@
|
|
|
1
1
|
import { generateCursorAuthParams, getTokenExpiry, pollCursorAuth, refreshCursorToken, } from "./auth";
|
|
2
|
+
import { configurePluginLogger, errorDetails, logPluginError, logPluginWarn } from "./logger";
|
|
2
3
|
import { getCursorModels } from "./models";
|
|
3
|
-
import { startProxy } from "./proxy";
|
|
4
|
+
import { startProxy, stopProxy, } from "./proxy";
|
|
4
5
|
const CURSOR_PROVIDER_ID = "cursor";
|
|
6
|
+
let lastModelDiscoveryError = null;
|
|
5
7
|
/**
|
|
6
8
|
* OpenCode plugin that provides Cursor authentication and model access.
|
|
7
9
|
* Register in opencode.json: { "plugin": ["opencode-cursor-oauth"] }
|
|
8
10
|
*/
|
|
9
11
|
export const CursorAuthPlugin = async (input) => {
|
|
12
|
+
configurePluginLogger(input);
|
|
10
13
|
return {
|
|
11
14
|
auth: {
|
|
12
15
|
provider: CURSOR_PROVIDER_ID,
|
|
13
16
|
async loader(getAuth, provider) {
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
path: { id: CURSOR_PROVIDER_ID },
|
|
23
|
-
body: {
|
|
24
|
-
type: "oauth",
|
|
25
|
-
refresh: refreshed.refresh,
|
|
26
|
-
access: refreshed.access,
|
|
27
|
-
expires: refreshed.expires,
|
|
28
|
-
},
|
|
29
|
-
});
|
|
30
|
-
accessToken = refreshed.access;
|
|
31
|
-
}
|
|
32
|
-
const models = await getCursorModels(accessToken);
|
|
33
|
-
const port = await startProxy(async () => {
|
|
34
|
-
const currentAuth = await getAuth();
|
|
35
|
-
if (currentAuth.type !== "oauth") {
|
|
36
|
-
throw new Error("Cursor auth not configured");
|
|
37
|
-
}
|
|
38
|
-
if (!currentAuth.access || currentAuth.expires < Date.now()) {
|
|
39
|
-
const refreshed = await refreshCursorToken(currentAuth.refresh);
|
|
17
|
+
try {
|
|
18
|
+
const auth = await getAuth();
|
|
19
|
+
if (!auth || auth.type !== "oauth")
|
|
20
|
+
return {};
|
|
21
|
+
// Ensure we have a valid access token, refreshing if expired
|
|
22
|
+
let accessToken = auth.access;
|
|
23
|
+
if (!accessToken || auth.expires < Date.now()) {
|
|
24
|
+
const refreshed = await refreshCursorToken(auth.refresh);
|
|
40
25
|
await input.client.auth.set({
|
|
41
26
|
path: { id: CURSOR_PROVIDER_ID },
|
|
42
27
|
body: {
|
|
@@ -46,32 +31,78 @@ export const CursorAuthPlugin = async (input) => {
|
|
|
46
31
|
expires: refreshed.expires,
|
|
47
32
|
},
|
|
48
33
|
});
|
|
49
|
-
|
|
34
|
+
accessToken = refreshed.access;
|
|
50
35
|
}
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
}
|
|
64
|
-
else if (Array.isArray(init.headers)) {
|
|
65
|
-
init.headers = init.headers.filter(([key]) => key.toLowerCase() !== "authorization");
|
|
66
|
-
}
|
|
67
|
-
else {
|
|
68
|
-
delete init.headers["authorization"];
|
|
69
|
-
delete init.headers["Authorization"];
|
|
70
|
-
}
|
|
36
|
+
let models;
|
|
37
|
+
models = await getCursorModels(accessToken);
|
|
38
|
+
lastModelDiscoveryError = null;
|
|
39
|
+
const port = await startProxy(async () => {
|
|
40
|
+
const currentAuth = await getAuth();
|
|
41
|
+
if (currentAuth.type !== "oauth") {
|
|
42
|
+
const authError = new Error("Cursor auth not configured");
|
|
43
|
+
logPluginError("Cursor proxy access token lookup failed", {
|
|
44
|
+
stage: "proxy_access_token",
|
|
45
|
+
...errorDetails(authError),
|
|
46
|
+
});
|
|
47
|
+
throw authError;
|
|
71
48
|
}
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
49
|
+
if (!currentAuth.access || currentAuth.expires < Date.now()) {
|
|
50
|
+
const refreshed = await refreshCursorToken(currentAuth.refresh);
|
|
51
|
+
await input.client.auth.set({
|
|
52
|
+
path: { id: CURSOR_PROVIDER_ID },
|
|
53
|
+
body: {
|
|
54
|
+
type: "oauth",
|
|
55
|
+
refresh: refreshed.refresh,
|
|
56
|
+
access: refreshed.access,
|
|
57
|
+
expires: refreshed.expires,
|
|
58
|
+
},
|
|
59
|
+
});
|
|
60
|
+
return refreshed.access;
|
|
61
|
+
}
|
|
62
|
+
return currentAuth.access;
|
|
63
|
+
}, models);
|
|
64
|
+
if (provider) {
|
|
65
|
+
provider.models = buildCursorProviderModels(models, port);
|
|
66
|
+
}
|
|
67
|
+
return {
|
|
68
|
+
baseURL: `http://localhost:${port}/v1`,
|
|
69
|
+
apiKey: "cursor-proxy",
|
|
70
|
+
async fetch(requestInput, init) {
|
|
71
|
+
if (init?.headers) {
|
|
72
|
+
if (init.headers instanceof Headers) {
|
|
73
|
+
init.headers.delete("authorization");
|
|
74
|
+
}
|
|
75
|
+
else if (Array.isArray(init.headers)) {
|
|
76
|
+
init.headers = init.headers.filter(([key]) => key.toLowerCase() !== "authorization");
|
|
77
|
+
}
|
|
78
|
+
else {
|
|
79
|
+
delete init.headers["authorization"];
|
|
80
|
+
delete init.headers["Authorization"];
|
|
81
|
+
}
|
|
82
|
+
}
|
|
83
|
+
return fetch(requestInput, init);
|
|
84
|
+
},
|
|
85
|
+
};
|
|
86
|
+
}
|
|
87
|
+
catch (error) {
|
|
88
|
+
const message = error instanceof Error
|
|
89
|
+
? error.message
|
|
90
|
+
: "Cursor model discovery failed.";
|
|
91
|
+
logPluginError("Cursor auth loader failed", {
|
|
92
|
+
stage: "loader",
|
|
93
|
+
providerID: CURSOR_PROVIDER_ID,
|
|
94
|
+
...errorDetails(error),
|
|
95
|
+
});
|
|
96
|
+
stopProxy();
|
|
97
|
+
if (provider) {
|
|
98
|
+
provider.models = {};
|
|
99
|
+
}
|
|
100
|
+
if (message !== lastModelDiscoveryError) {
|
|
101
|
+
lastModelDiscoveryError = message;
|
|
102
|
+
await showDiscoveryFailureToast(input, message);
|
|
103
|
+
}
|
|
104
|
+
return buildDisabledProviderConfig(message);
|
|
105
|
+
}
|
|
75
106
|
},
|
|
76
107
|
methods: [
|
|
77
108
|
{
|
|
@@ -97,6 +128,12 @@ export const CursorAuthPlugin = async (input) => {
|
|
|
97
128
|
},
|
|
98
129
|
],
|
|
99
130
|
},
|
|
131
|
+
async "chat.headers"(incoming, output) {
|
|
132
|
+
if (incoming.model.providerID !== CURSOR_PROVIDER_ID)
|
|
133
|
+
return;
|
|
134
|
+
output.headers["x-opencode-session-id"] = incoming.sessionID;
|
|
135
|
+
output.headers["x-session-id"] = incoming.sessionID;
|
|
136
|
+
},
|
|
100
137
|
};
|
|
101
138
|
};
|
|
102
139
|
function buildCursorProviderModels(models, port) {
|
|
@@ -145,6 +182,43 @@ function buildCursorProviderModels(models, port) {
|
|
|
145
182
|
},
|
|
146
183
|
]));
|
|
147
184
|
}
|
|
185
|
+
async function showDiscoveryFailureToast(input, message) {
|
|
186
|
+
try {
|
|
187
|
+
await input.client.tui.showToast({
|
|
188
|
+
body: {
|
|
189
|
+
title: "Cursor plugin disabled",
|
|
190
|
+
message,
|
|
191
|
+
variant: "error",
|
|
192
|
+
duration: 8_000,
|
|
193
|
+
},
|
|
194
|
+
});
|
|
195
|
+
}
|
|
196
|
+
catch (error) {
|
|
197
|
+
logPluginWarn("Failed to display Cursor plugin toast", {
|
|
198
|
+
title: "Cursor plugin disabled",
|
|
199
|
+
message,
|
|
200
|
+
...errorDetails(error),
|
|
201
|
+
});
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
function buildDisabledProviderConfig(message) {
|
|
205
|
+
return {
|
|
206
|
+
baseURL: "http://127.0.0.1/cursor-disabled/v1",
|
|
207
|
+
apiKey: "cursor-disabled",
|
|
208
|
+
async fetch() {
|
|
209
|
+
return new Response(JSON.stringify({
|
|
210
|
+
error: {
|
|
211
|
+
message,
|
|
212
|
+
type: "server_error",
|
|
213
|
+
code: "cursor_model_discovery_failed",
|
|
214
|
+
},
|
|
215
|
+
}), {
|
|
216
|
+
status: 503,
|
|
217
|
+
headers: { "Content-Type": "application/json" },
|
|
218
|
+
});
|
|
219
|
+
},
|
|
220
|
+
};
|
|
221
|
+
}
|
|
148
222
|
// $/M token rates from cursor.com/docs/models-and-pricing
|
|
149
223
|
const MODEL_COST_TABLE = {
|
|
150
224
|
// Anthropic
|
package/dist/logger.d.ts
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
1
|
+
import type { PluginInput } from "@opencode-ai/plugin";
|
|
2
|
+
export declare function configurePluginLogger(input: PluginInput): void;
|
|
3
|
+
export declare function errorDetails(error: unknown): Record<string, unknown>;
|
|
4
|
+
export declare function logPluginWarn(message: string, extra?: Record<string, unknown>): void;
|
|
5
|
+
export declare function logPluginError(message: string, extra?: Record<string, unknown>): void;
|
|
6
|
+
export declare function flushPluginLogs(): Promise<void>;
|
package/dist/logger.js
ADDED
|
@@ -0,0 +1,142 @@
|
|
|
1
|
+
const PLUGIN_LOG_SERVICE = "opencode-cursor-oauth";
|
|
2
|
+
const MAX_STRING_LENGTH = 1_500;
|
|
3
|
+
const MAX_ARRAY_LENGTH = 20;
|
|
4
|
+
const MAX_OBJECT_KEYS = 25;
|
|
5
|
+
let currentLogger;
|
|
6
|
+
let pendingLogWrites = Promise.resolve();
|
|
7
|
+
export function configurePluginLogger(input) {
|
|
8
|
+
currentLogger = {
|
|
9
|
+
client: input.client,
|
|
10
|
+
directory: input.directory,
|
|
11
|
+
};
|
|
12
|
+
}
|
|
13
|
+
export function errorDetails(error) {
|
|
14
|
+
if (error instanceof Error) {
|
|
15
|
+
return {
|
|
16
|
+
errorName: error.name,
|
|
17
|
+
errorMessage: error.message,
|
|
18
|
+
errorStack: error.stack,
|
|
19
|
+
errorCause: serializeValue(error.cause, 1),
|
|
20
|
+
};
|
|
21
|
+
}
|
|
22
|
+
return {
|
|
23
|
+
errorType: typeof error,
|
|
24
|
+
errorValue: serializeValue(error, 1),
|
|
25
|
+
};
|
|
26
|
+
}
|
|
27
|
+
export function logPluginWarn(message, extra = {}) {
|
|
28
|
+
logPlugin("warn", message, extra);
|
|
29
|
+
}
|
|
30
|
+
export function logPluginError(message, extra = {}) {
|
|
31
|
+
logPlugin("error", message, extra);
|
|
32
|
+
}
|
|
33
|
+
export function flushPluginLogs() {
|
|
34
|
+
return pendingLogWrites;
|
|
35
|
+
}
|
|
36
|
+
function logPlugin(level, message, extra) {
|
|
37
|
+
const serializedExtra = serializeValue(extra, 0);
|
|
38
|
+
writeConsoleLog(level, message, serializedExtra);
|
|
39
|
+
if (!currentLogger?.client?.app?.log) {
|
|
40
|
+
return;
|
|
41
|
+
}
|
|
42
|
+
pendingLogWrites = pendingLogWrites
|
|
43
|
+
.catch(() => { })
|
|
44
|
+
.then(async () => {
|
|
45
|
+
try {
|
|
46
|
+
await currentLogger?.client.app.log({
|
|
47
|
+
query: { directory: currentLogger.directory },
|
|
48
|
+
body: {
|
|
49
|
+
service: PLUGIN_LOG_SERVICE,
|
|
50
|
+
level,
|
|
51
|
+
message,
|
|
52
|
+
extra: serializedExtra,
|
|
53
|
+
},
|
|
54
|
+
});
|
|
55
|
+
}
|
|
56
|
+
catch (logError) {
|
|
57
|
+
writeConsoleLog("warn", "Failed to forward plugin log to OpenCode", {
|
|
58
|
+
originalLevel: level,
|
|
59
|
+
originalMessage: message,
|
|
60
|
+
...errorDetails(logError),
|
|
61
|
+
});
|
|
62
|
+
}
|
|
63
|
+
});
|
|
64
|
+
}
|
|
65
|
+
function writeConsoleLog(level, message, extra) {
|
|
66
|
+
const prefix = `[${PLUGIN_LOG_SERVICE}] ${message}`;
|
|
67
|
+
const suffix = Object.keys(extra).length > 0 ? ` ${JSON.stringify(extra)}` : "";
|
|
68
|
+
if (level === "error") {
|
|
69
|
+
console.error(`${prefix}${suffix}`);
|
|
70
|
+
return;
|
|
71
|
+
}
|
|
72
|
+
console.warn(`${prefix}${suffix}`);
|
|
73
|
+
}
|
|
74
|
+
function serializeValue(value, depth, seen = new WeakSet()) {
|
|
75
|
+
if (value === null || value === undefined)
|
|
76
|
+
return value;
|
|
77
|
+
if (typeof value === "string")
|
|
78
|
+
return truncateString(value);
|
|
79
|
+
const valueType = typeof value;
|
|
80
|
+
if (valueType === "number" || valueType === "boolean")
|
|
81
|
+
return value;
|
|
82
|
+
if (valueType === "bigint")
|
|
83
|
+
return value.toString();
|
|
84
|
+
if (valueType === "symbol")
|
|
85
|
+
return String(value);
|
|
86
|
+
if (valueType === "function")
|
|
87
|
+
return `[function ${value.name || "anonymous"}]`;
|
|
88
|
+
if (value instanceof URL)
|
|
89
|
+
return value.toString();
|
|
90
|
+
if (value instanceof Headers)
|
|
91
|
+
return Object.fromEntries(value.entries());
|
|
92
|
+
if (value instanceof Error) {
|
|
93
|
+
return {
|
|
94
|
+
name: value.name,
|
|
95
|
+
message: value.message,
|
|
96
|
+
stack: truncateString(value.stack),
|
|
97
|
+
cause: serializeValue(value.cause, depth + 1, seen),
|
|
98
|
+
};
|
|
99
|
+
}
|
|
100
|
+
if (value instanceof Uint8Array) {
|
|
101
|
+
return serializeBinary(value);
|
|
102
|
+
}
|
|
103
|
+
if (Array.isArray(value)) {
|
|
104
|
+
if (depth >= 3)
|
|
105
|
+
return `[array(${value.length})]`;
|
|
106
|
+
return value.slice(0, MAX_ARRAY_LENGTH).map((entry) => serializeValue(entry, depth + 1, seen));
|
|
107
|
+
}
|
|
108
|
+
if (typeof value === "object") {
|
|
109
|
+
if (seen.has(value))
|
|
110
|
+
return "[circular]";
|
|
111
|
+
seen.add(value);
|
|
112
|
+
if (depth >= 3) {
|
|
113
|
+
return `[object ${value.constructor?.name || "Object"}]`;
|
|
114
|
+
}
|
|
115
|
+
const entries = Object.entries(value).slice(0, MAX_OBJECT_KEYS);
|
|
116
|
+
return Object.fromEntries(entries.map(([key, entry]) => [key, serializeValue(entry, depth + 1, seen)]));
|
|
117
|
+
}
|
|
118
|
+
return String(value);
|
|
119
|
+
}
|
|
120
|
+
function serializeBinary(value) {
|
|
121
|
+
const text = new TextDecoder().decode(value);
|
|
122
|
+
const printable = /^[\x09\x0a\x0d\x20-\x7e]*$/.test(text);
|
|
123
|
+
if (printable) {
|
|
124
|
+
return {
|
|
125
|
+
type: "uint8array",
|
|
126
|
+
length: value.length,
|
|
127
|
+
text: truncateString(text),
|
|
128
|
+
};
|
|
129
|
+
}
|
|
130
|
+
return {
|
|
131
|
+
type: "uint8array",
|
|
132
|
+
length: value.length,
|
|
133
|
+
base64: truncateString(Buffer.from(value).toString("base64")),
|
|
134
|
+
};
|
|
135
|
+
}
|
|
136
|
+
function truncateString(value) {
|
|
137
|
+
if (value === undefined)
|
|
138
|
+
return undefined;
|
|
139
|
+
if (value.length <= MAX_STRING_LENGTH)
|
|
140
|
+
return value;
|
|
141
|
+
return `${value.slice(0, MAX_STRING_LENGTH - 3)}...`;
|
|
142
|
+
}
|
package/dist/models.js
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import { create, fromBinary, toBinary } from "@bufbuild/protobuf";
|
|
2
2
|
import { z } from "zod";
|
|
3
|
+
import { errorDetails, logPluginError, logPluginWarn } from "./logger";
|
|
3
4
|
import { callCursorUnaryRpc } from "./proxy";
|
|
4
5
|
import { GetUsableModelsRequestSchema, GetUsableModelsResponseSchema, } from "./proto/agent_pb";
|
|
5
6
|
const GET_USABLE_MODELS_PATH = "/agent.v1.AgentService/GetUsableModels";
|
|
@@ -35,16 +36,32 @@ async function fetchCursorUsableModels(apiKey) {
|
|
|
35
36
|
timeoutMs: MODEL_DISCOVERY_TIMEOUT_MS,
|
|
36
37
|
});
|
|
37
38
|
if (response.timedOut) {
|
|
39
|
+
logPluginError("Cursor model discovery timed out", {
|
|
40
|
+
rpcPath: GET_USABLE_MODELS_PATH,
|
|
41
|
+
timeoutMs: MODEL_DISCOVERY_TIMEOUT_MS,
|
|
42
|
+
});
|
|
38
43
|
throw new CursorModelDiscoveryError(`Cursor model discovery timed out after ${MODEL_DISCOVERY_TIMEOUT_MS}ms.`);
|
|
39
44
|
}
|
|
40
45
|
if (response.exitCode !== 0) {
|
|
46
|
+
logPluginError("Cursor model discovery HTTP failure", {
|
|
47
|
+
rpcPath: GET_USABLE_MODELS_PATH,
|
|
48
|
+
exitCode: response.exitCode,
|
|
49
|
+
responseBody: response.body,
|
|
50
|
+
});
|
|
41
51
|
throw new CursorModelDiscoveryError(buildDiscoveryHttpError(response.exitCode, response.body));
|
|
42
52
|
}
|
|
43
53
|
if (response.body.length === 0) {
|
|
54
|
+
logPluginWarn("Cursor model discovery returned an empty response", {
|
|
55
|
+
rpcPath: GET_USABLE_MODELS_PATH,
|
|
56
|
+
});
|
|
44
57
|
throw new CursorModelDiscoveryError("Cursor model discovery returned an empty response.");
|
|
45
58
|
}
|
|
46
59
|
const decoded = decodeGetUsableModelsResponse(response.body);
|
|
47
60
|
if (!decoded) {
|
|
61
|
+
logPluginError("Cursor model discovery returned an unreadable response", {
|
|
62
|
+
rpcPath: GET_USABLE_MODELS_PATH,
|
|
63
|
+
responseBody: response.body,
|
|
64
|
+
});
|
|
48
65
|
throw new CursorModelDiscoveryError("Cursor model discovery returned an unreadable response.");
|
|
49
66
|
}
|
|
50
67
|
const models = normalizeCursorModels(decoded.models);
|
|
@@ -56,6 +73,10 @@ async function fetchCursorUsableModels(apiKey) {
|
|
|
56
73
|
catch (error) {
|
|
57
74
|
if (error instanceof CursorModelDiscoveryError)
|
|
58
75
|
throw error;
|
|
76
|
+
logPluginError("Cursor model discovery crashed", {
|
|
77
|
+
rpcPath: GET_USABLE_MODELS_PATH,
|
|
78
|
+
...errorDetails(error),
|
|
79
|
+
});
|
|
59
80
|
throw new CursorModelDiscoveryError("Cursor model discovery failed.");
|
|
60
81
|
}
|
|
61
82
|
}
|
|
@@ -73,10 +94,13 @@ export function clearModelCache() {
|
|
|
73
94
|
}
|
|
74
95
|
function buildDiscoveryHttpError(exitCode, body) {
|
|
75
96
|
const detail = extractDiscoveryErrorDetail(body);
|
|
97
|
+
const protocolHint = exitCode === 464
|
|
98
|
+
? " Likely protocol mismatch: Cursor appears to expect an HTTP/2 Connect unary request."
|
|
99
|
+
: "";
|
|
76
100
|
if (!detail) {
|
|
77
|
-
return `Cursor model discovery failed with HTTP ${exitCode}
|
|
101
|
+
return `Cursor model discovery failed with HTTP ${exitCode}.${protocolHint}`;
|
|
78
102
|
}
|
|
79
|
-
return `Cursor model discovery failed with HTTP ${exitCode}: ${detail}`;
|
|
103
|
+
return `Cursor model discovery failed with HTTP ${exitCode}: ${detail}.${protocolHint}`;
|
|
80
104
|
}
|
|
81
105
|
function extractDiscoveryErrorDetail(body) {
|
|
82
106
|
if (body.length === 0)
|
package/dist/proxy.d.ts
CHANGED
package/dist/proxy.js
CHANGED
|
@@ -16,8 +16,11 @@ import { create, fromBinary, fromJson, toBinary, toJson } from "@bufbuild/protob
|
|
|
16
16
|
import { ValueSchema } from "@bufbuild/protobuf/wkt";
|
|
17
17
|
import { AgentClientMessageSchema, AgentRunRequestSchema, AgentServerMessageSchema, BidiRequestIdSchema, ClientHeartbeatSchema, ConversationActionSchema, ConversationStateStructureSchema, ConversationStepSchema, AgentConversationTurnStructureSchema, ConversationTurnStructureSchema, AssistantMessageSchema, BackgroundShellSpawnResultSchema, DeleteResultSchema, DeleteRejectedSchema, DiagnosticsResultSchema, ExecClientMessageSchema, FetchErrorSchema, FetchResultSchema, GetBlobResultSchema, GrepErrorSchema, GrepResultSchema, KvClientMessageSchema, LsRejectedSchema, LsResultSchema, McpErrorSchema, McpResultSchema, McpSuccessSchema, McpTextContentSchema, McpToolDefinitionSchema, McpToolResultContentItemSchema, ModelDetailsSchema, ReadRejectedSchema, ReadResultSchema, RequestContextResultSchema, RequestContextSchema, RequestContextSuccessSchema, SetBlobResultSchema, ShellRejectedSchema, ShellResultSchema, UserMessageActionSchema, UserMessageSchema, WriteRejectedSchema, WriteResultSchema, WriteShellStdinErrorSchema, WriteShellStdinResultSchema, } from "./proto/agent_pb";
|
|
18
18
|
import { createHash } from "node:crypto";
|
|
19
|
+
import { connect as connectHttp2 } from "node:http2";
|
|
20
|
+
import { errorDetails, logPluginError, logPluginWarn } from "./logger";
|
|
19
21
|
const CURSOR_API_URL = process.env.CURSOR_API_URL ?? "https://api2.cursor.sh";
|
|
20
22
|
const CURSOR_CLIENT_VERSION = "cli-2026.01.09-231024f";
|
|
23
|
+
const CURSOR_CONNECT_PROTOCOL_VERSION = "1";
|
|
21
24
|
const CONNECT_END_STREAM_FLAG = 0b00000010;
|
|
22
25
|
const SSE_HEADERS = {
|
|
23
26
|
"Content-Type": "text/event-stream",
|
|
@@ -47,18 +50,19 @@ function frameConnectMessage(data, flags = 0) {
|
|
|
47
50
|
return frame;
|
|
48
51
|
}
|
|
49
52
|
function buildCursorHeaders(options, contentType, extra = {}) {
|
|
50
|
-
const headers = new Headers(
|
|
53
|
+
const headers = new Headers(buildCursorHeaderValues(options, contentType, extra));
|
|
54
|
+
return headers;
|
|
55
|
+
}
|
|
56
|
+
function buildCursorHeaderValues(options, contentType, extra = {}) {
|
|
57
|
+
return {
|
|
51
58
|
authorization: `Bearer ${options.accessToken}`,
|
|
52
59
|
"content-type": contentType,
|
|
53
60
|
"x-ghost-mode": "true",
|
|
54
61
|
"x-cursor-client-version": CURSOR_CLIENT_VERSION,
|
|
55
62
|
"x-cursor-client-type": "cli",
|
|
56
63
|
"x-request-id": crypto.randomUUID(),
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
headers.set(key, value);
|
|
60
|
-
}
|
|
61
|
-
return headers;
|
|
64
|
+
...extra,
|
|
65
|
+
};
|
|
62
66
|
}
|
|
63
67
|
function encodeVarint(value) {
|
|
64
68
|
if (!Number.isSafeInteger(value) || value < 0) {
|
|
@@ -130,6 +134,11 @@ async function createCursorSession(options) {
|
|
|
130
134
|
});
|
|
131
135
|
if (!response.ok || !response.body) {
|
|
132
136
|
const errorBody = await response.text().catch(() => "");
|
|
137
|
+
logPluginError("Cursor RunSSE request failed", {
|
|
138
|
+
requestId: options.requestId,
|
|
139
|
+
status: response.status,
|
|
140
|
+
responseBody: errorBody,
|
|
141
|
+
});
|
|
133
142
|
throw new Error(`RunSSE failed: ${response.status}${errorBody ? ` ${errorBody}` : ""}`);
|
|
134
143
|
}
|
|
135
144
|
const cbs = {
|
|
@@ -160,6 +169,12 @@ async function createCursorSession(options) {
|
|
|
160
169
|
});
|
|
161
170
|
if (!appendResponse.ok) {
|
|
162
171
|
const errorBody = await appendResponse.text().catch(() => "");
|
|
172
|
+
logPluginError("Cursor BidiAppend request failed", {
|
|
173
|
+
requestId: options.requestId,
|
|
174
|
+
appendSeqno: appendSeqno - 1,
|
|
175
|
+
status: appendResponse.status,
|
|
176
|
+
responseBody: errorBody,
|
|
177
|
+
});
|
|
163
178
|
throw new Error(`BidiAppend failed: ${appendResponse.status}${errorBody ? ` ${errorBody}` : ""}`);
|
|
164
179
|
}
|
|
165
180
|
await appendResponse.arrayBuffer().catch(() => undefined);
|
|
@@ -183,7 +198,11 @@ async function createCursorSession(options) {
|
|
|
183
198
|
}
|
|
184
199
|
}
|
|
185
200
|
}
|
|
186
|
-
catch {
|
|
201
|
+
catch (error) {
|
|
202
|
+
logPluginWarn("Cursor stream reader closed with error", {
|
|
203
|
+
requestId: options.requestId,
|
|
204
|
+
...errorDetails(error),
|
|
205
|
+
});
|
|
187
206
|
finish(alive ? 1 : closeCode);
|
|
188
207
|
}
|
|
189
208
|
})();
|
|
@@ -196,7 +215,11 @@ async function createCursorSession(options) {
|
|
|
196
215
|
return;
|
|
197
216
|
writeChain = writeChain
|
|
198
217
|
.then(() => append(data))
|
|
199
|
-
.catch(() => {
|
|
218
|
+
.catch((error) => {
|
|
219
|
+
logPluginError("Cursor stream append failed", {
|
|
220
|
+
requestId: options.requestId,
|
|
221
|
+
...errorDetails(error),
|
|
222
|
+
});
|
|
200
223
|
try {
|
|
201
224
|
abortController.abort();
|
|
202
225
|
}
|
|
@@ -236,6 +259,17 @@ async function createCursorSession(options) {
|
|
|
236
259
|
};
|
|
237
260
|
}
|
|
238
261
|
export async function callCursorUnaryRpc(options) {
|
|
262
|
+
const target = new URL(options.rpcPath, options.url ?? CURSOR_API_URL);
|
|
263
|
+
const transport = options.transport ?? "auto";
|
|
264
|
+
if (transport === "http2" || (transport === "auto" && target.protocol === "https:")) {
|
|
265
|
+
const http2Result = await callCursorUnaryRpcOverHttp2(options, target);
|
|
266
|
+
if (transport === "http2" || http2Result.timedOut || http2Result.exitCode !== 1) {
|
|
267
|
+
return http2Result;
|
|
268
|
+
}
|
|
269
|
+
}
|
|
270
|
+
return callCursorUnaryRpcOverFetch(options, target);
|
|
271
|
+
}
|
|
272
|
+
async function callCursorUnaryRpcOverFetch(options, target) {
|
|
239
273
|
let timedOut = false;
|
|
240
274
|
const timeoutMs = options.timeoutMs ?? 5_000;
|
|
241
275
|
const controller = new AbortController();
|
|
@@ -246,9 +280,13 @@ export async function callCursorUnaryRpc(options) {
|
|
|
246
280
|
}, timeoutMs)
|
|
247
281
|
: undefined;
|
|
248
282
|
try {
|
|
249
|
-
const response = await fetch(
|
|
283
|
+
const response = await fetch(target, {
|
|
250
284
|
method: "POST",
|
|
251
|
-
headers: buildCursorHeaders(options, "application/proto"
|
|
285
|
+
headers: buildCursorHeaders(options, "application/proto", {
|
|
286
|
+
accept: "application/proto, application/json",
|
|
287
|
+
"connect-protocol-version": CURSOR_CONNECT_PROTOCOL_VERSION,
|
|
288
|
+
"connect-timeout-ms": String(timeoutMs),
|
|
289
|
+
}),
|
|
252
290
|
body: toFetchBody(options.requestBody),
|
|
253
291
|
signal: controller.signal,
|
|
254
292
|
});
|
|
@@ -260,6 +298,12 @@ export async function callCursorUnaryRpc(options) {
|
|
|
260
298
|
};
|
|
261
299
|
}
|
|
262
300
|
catch {
|
|
301
|
+
logPluginError("Cursor unary fetch transport failed", {
|
|
302
|
+
rpcPath: options.rpcPath,
|
|
303
|
+
url: target.toString(),
|
|
304
|
+
timeoutMs,
|
|
305
|
+
timedOut,
|
|
306
|
+
});
|
|
263
307
|
return {
|
|
264
308
|
body: new Uint8Array(),
|
|
265
309
|
exitCode: timedOut ? 124 : 1,
|
|
@@ -271,6 +315,121 @@ export async function callCursorUnaryRpc(options) {
|
|
|
271
315
|
clearTimeout(timeout);
|
|
272
316
|
}
|
|
273
317
|
}
|
|
318
|
+
async function callCursorUnaryRpcOverHttp2(options, target) {
|
|
319
|
+
const timeoutMs = options.timeoutMs ?? 5_000;
|
|
320
|
+
const authority = `${target.protocol}//${target.host}`;
|
|
321
|
+
return new Promise((resolve) => {
|
|
322
|
+
let settled = false;
|
|
323
|
+
let timedOut = false;
|
|
324
|
+
let session;
|
|
325
|
+
let stream;
|
|
326
|
+
const finish = (result) => {
|
|
327
|
+
if (settled)
|
|
328
|
+
return;
|
|
329
|
+
settled = true;
|
|
330
|
+
if (timeout)
|
|
331
|
+
clearTimeout(timeout);
|
|
332
|
+
try {
|
|
333
|
+
stream?.close();
|
|
334
|
+
}
|
|
335
|
+
catch { }
|
|
336
|
+
try {
|
|
337
|
+
session?.close();
|
|
338
|
+
}
|
|
339
|
+
catch { }
|
|
340
|
+
resolve(result);
|
|
341
|
+
};
|
|
342
|
+
const timeout = timeoutMs > 0
|
|
343
|
+
? setTimeout(() => {
|
|
344
|
+
timedOut = true;
|
|
345
|
+
finish({
|
|
346
|
+
body: new Uint8Array(),
|
|
347
|
+
exitCode: 124,
|
|
348
|
+
timedOut: true,
|
|
349
|
+
});
|
|
350
|
+
}, timeoutMs)
|
|
351
|
+
: undefined;
|
|
352
|
+
try {
|
|
353
|
+
session = connectHttp2(authority);
|
|
354
|
+
session.once("error", (error) => {
|
|
355
|
+
logPluginError("Cursor unary HTTP/2 session failed", {
|
|
356
|
+
rpcPath: options.rpcPath,
|
|
357
|
+
url: target.toString(),
|
|
358
|
+
timedOut,
|
|
359
|
+
...errorDetails(error),
|
|
360
|
+
});
|
|
361
|
+
finish({
|
|
362
|
+
body: new Uint8Array(),
|
|
363
|
+
exitCode: timedOut ? 124 : 1,
|
|
364
|
+
timedOut,
|
|
365
|
+
});
|
|
366
|
+
});
|
|
367
|
+
const headers = {
|
|
368
|
+
":method": "POST",
|
|
369
|
+
":path": `${target.pathname}${target.search}`,
|
|
370
|
+
...buildCursorHeaderValues(options, "application/proto", {
|
|
371
|
+
accept: "application/proto, application/json",
|
|
372
|
+
"connect-protocol-version": CURSOR_CONNECT_PROTOCOL_VERSION,
|
|
373
|
+
"connect-timeout-ms": String(timeoutMs),
|
|
374
|
+
}),
|
|
375
|
+
};
|
|
376
|
+
stream = session.request(headers);
|
|
377
|
+
let statusCode = 0;
|
|
378
|
+
const chunks = [];
|
|
379
|
+
stream.once("response", (responseHeaders) => {
|
|
380
|
+
const statusHeader = responseHeaders[":status"];
|
|
381
|
+
statusCode = typeof statusHeader === "number"
|
|
382
|
+
? statusHeader
|
|
383
|
+
: Number(statusHeader ?? 0);
|
|
384
|
+
});
|
|
385
|
+
stream.on("data", (chunk) => {
|
|
386
|
+
chunks.push(Buffer.from(chunk));
|
|
387
|
+
});
|
|
388
|
+
stream.once("end", () => {
|
|
389
|
+
const body = new Uint8Array(Buffer.concat(chunks));
|
|
390
|
+
finish({
|
|
391
|
+
body,
|
|
392
|
+
exitCode: statusCode >= 200 && statusCode < 300 ? 0 : (statusCode || 1),
|
|
393
|
+
timedOut,
|
|
394
|
+
});
|
|
395
|
+
});
|
|
396
|
+
stream.once("error", (error) => {
|
|
397
|
+
logPluginError("Cursor unary HTTP/2 stream failed", {
|
|
398
|
+
rpcPath: options.rpcPath,
|
|
399
|
+
url: target.toString(),
|
|
400
|
+
timedOut,
|
|
401
|
+
...errorDetails(error),
|
|
402
|
+
});
|
|
403
|
+
finish({
|
|
404
|
+
body: new Uint8Array(),
|
|
405
|
+
exitCode: timedOut ? 124 : 1,
|
|
406
|
+
timedOut,
|
|
407
|
+
});
|
|
408
|
+
});
|
|
409
|
+
// Bun's node:http2 client currently breaks on end(Buffer.alloc(0)) against
|
|
410
|
+
// Cursor's HTTPS endpoint, but a header-only end() succeeds for empty unary bodies.
|
|
411
|
+
if (options.requestBody.length > 0) {
|
|
412
|
+
stream.end(Buffer.from(options.requestBody));
|
|
413
|
+
}
|
|
414
|
+
else {
|
|
415
|
+
stream.end();
|
|
416
|
+
}
|
|
417
|
+
}
|
|
418
|
+
catch (error) {
|
|
419
|
+
logPluginError("Cursor unary HTTP/2 setup failed", {
|
|
420
|
+
rpcPath: options.rpcPath,
|
|
421
|
+
url: target.toString(),
|
|
422
|
+
timedOut,
|
|
423
|
+
...errorDetails(error),
|
|
424
|
+
});
|
|
425
|
+
finish({
|
|
426
|
+
body: new Uint8Array(),
|
|
427
|
+
exitCode: timedOut ? 124 : 1,
|
|
428
|
+
timedOut,
|
|
429
|
+
});
|
|
430
|
+
}
|
|
431
|
+
});
|
|
432
|
+
}
|
|
274
433
|
let proxyServer;
|
|
275
434
|
let proxyPort;
|
|
276
435
|
let proxyAccessTokenProvider;
|
|
@@ -312,10 +471,18 @@ export async function startProxy(getAccessToken, models = []) {
|
|
|
312
471
|
throw new Error("Cursor proxy access token provider not configured");
|
|
313
472
|
}
|
|
314
473
|
const accessToken = await proxyAccessTokenProvider();
|
|
315
|
-
|
|
474
|
+
const sessionId = req.headers.get("x-opencode-session-id")
|
|
475
|
+
?? req.headers.get("x-session-id")
|
|
476
|
+
?? undefined;
|
|
477
|
+
return handleChatCompletion(body, accessToken, { sessionId });
|
|
316
478
|
}
|
|
317
479
|
catch (err) {
|
|
318
480
|
const message = err instanceof Error ? err.message : String(err);
|
|
481
|
+
logPluginError("Cursor proxy request failed", {
|
|
482
|
+
path: url.pathname,
|
|
483
|
+
method: req.method,
|
|
484
|
+
...errorDetails(err),
|
|
485
|
+
});
|
|
319
486
|
return new Response(JSON.stringify({
|
|
320
487
|
error: { message, type: "server_error", code: "internal_error" },
|
|
321
488
|
}), { status: 500, headers: { "Content-Type": "application/json" } });
|
|
@@ -345,7 +512,7 @@ export function stopProxy() {
|
|
|
345
512
|
activeBridges.clear();
|
|
346
513
|
conversationStates.clear();
|
|
347
514
|
}
|
|
348
|
-
function handleChatCompletion(body, accessToken) {
|
|
515
|
+
function handleChatCompletion(body, accessToken, context = {}) {
|
|
349
516
|
const { systemPrompt, userText, turns, toolResults } = parseMessages(body.messages);
|
|
350
517
|
const modelId = body.model;
|
|
351
518
|
const tools = body.tools ?? [];
|
|
@@ -359,8 +526,8 @@ function handleChatCompletion(body, accessToken) {
|
|
|
359
526
|
}
|
|
360
527
|
// bridgeKey: model-specific, for active tool-call bridges
|
|
361
528
|
// convKey: model-independent, for conversation state that survives model switches
|
|
362
|
-
const bridgeKey = deriveBridgeKey(modelId, body.messages);
|
|
363
|
-
const convKey = deriveConversationKey(body.messages);
|
|
529
|
+
const bridgeKey = deriveBridgeKey(modelId, body.messages, context.sessionId);
|
|
530
|
+
const convKey = deriveConversationKey(body.messages, context.sessionId);
|
|
364
531
|
const activeBridge = activeBridges.get(bridgeKey);
|
|
365
532
|
if (activeBridge && toolResults.length > 0) {
|
|
366
533
|
activeBridges.delete(bridgeKey);
|
|
@@ -382,7 +549,7 @@ function handleChatCompletion(body, accessToken) {
|
|
|
382
549
|
let stored = conversationStates.get(convKey);
|
|
383
550
|
if (!stored) {
|
|
384
551
|
stored = {
|
|
385
|
-
conversationId:
|
|
552
|
+
conversationId: crypto.randomUUID(),
|
|
386
553
|
checkpoint: null,
|
|
387
554
|
blobStore: new Map(),
|
|
388
555
|
lastAccessMs: Date.now(),
|
|
@@ -602,6 +769,12 @@ function makeHeartbeatBytes() {
|
|
|
602
769
|
});
|
|
603
770
|
return toBinary(AgentClientMessageSchema, heartbeat);
|
|
604
771
|
}
|
|
772
|
+
function scheduleBridgeEnd(bridge) {
|
|
773
|
+
queueMicrotask(() => {
|
|
774
|
+
if (bridge.alive)
|
|
775
|
+
bridge.end();
|
|
776
|
+
});
|
|
777
|
+
}
|
|
605
778
|
/**
|
|
606
779
|
* Create a stateful parser for Connect protocol frames.
|
|
607
780
|
* Handles buffering partial data across chunks.
|
|
@@ -744,6 +917,12 @@ function handleKvMessage(kvMsg, blobStore, sendFrame) {
|
|
|
744
917
|
const blobId = kvMsg.message.value.blobId;
|
|
745
918
|
const blobIdKey = Buffer.from(blobId).toString("hex");
|
|
746
919
|
const blobData = blobStore.get(blobIdKey);
|
|
920
|
+
if (!blobData) {
|
|
921
|
+
logPluginWarn("Cursor requested missing blob", {
|
|
922
|
+
blobId: blobIdKey,
|
|
923
|
+
knownBlobCount: blobStore.size,
|
|
924
|
+
});
|
|
925
|
+
}
|
|
747
926
|
sendKvResponse(kvMsg, "getBlobResult", create(GetBlobResultSchema, blobData ? { blobData } : {}), sendFrame);
|
|
748
927
|
}
|
|
749
928
|
else if (kvCase === "setBlobArgs") {
|
|
@@ -909,7 +1088,13 @@ function sendExecResult(execMsg, messageCase, value, sendFrame) {
|
|
|
909
1088
|
sendFrame(toBinary(AgentClientMessageSchema, clientMessage));
|
|
910
1089
|
}
|
|
911
1090
|
/** Derive a key for active bridge lookup (tool-call continuations). Model-specific. */
|
|
912
|
-
function deriveBridgeKey(modelId, messages) {
|
|
1091
|
+
function deriveBridgeKey(modelId, messages, sessionId) {
|
|
1092
|
+
if (sessionId) {
|
|
1093
|
+
return createHash("sha256")
|
|
1094
|
+
.update(`bridge:${sessionId}:${modelId}`)
|
|
1095
|
+
.digest("hex")
|
|
1096
|
+
.slice(0, 16);
|
|
1097
|
+
}
|
|
913
1098
|
const firstUserMsg = messages.find((m) => m.role === "user");
|
|
914
1099
|
const firstUserText = firstUserMsg ? textContent(firstUserMsg.content) : "";
|
|
915
1100
|
return createHash("sha256")
|
|
@@ -918,29 +1103,23 @@ function deriveBridgeKey(modelId, messages) {
|
|
|
918
1103
|
.slice(0, 16);
|
|
919
1104
|
}
|
|
920
1105
|
/** Derive a key for conversation state. Model-independent so context survives model switches. */
|
|
921
|
-
function deriveConversationKey(messages) {
|
|
922
|
-
|
|
923
|
-
|
|
1106
|
+
function deriveConversationKey(messages, sessionId) {
|
|
1107
|
+
if (sessionId) {
|
|
1108
|
+
return createHash("sha256")
|
|
1109
|
+
.update(`session:${sessionId}`)
|
|
1110
|
+
.digest("hex")
|
|
1111
|
+
.slice(0, 16);
|
|
1112
|
+
}
|
|
924
1113
|
return createHash("sha256")
|
|
925
|
-
.update(
|
|
1114
|
+
.update(buildConversationFingerprint(messages))
|
|
926
1115
|
.digest("hex")
|
|
927
1116
|
.slice(0, 16);
|
|
928
1117
|
}
|
|
929
|
-
|
|
930
|
-
|
|
931
|
-
|
|
932
|
-
|
|
933
|
-
|
|
934
|
-
.digest("hex")
|
|
935
|
-
.slice(0, 32);
|
|
936
|
-
// Format as UUID: xxxxxxxx-xxxx-4xxx-Nxxx-xxxxxxxxxxxx
|
|
937
|
-
return [
|
|
938
|
-
hex.slice(0, 8),
|
|
939
|
-
hex.slice(8, 12),
|
|
940
|
-
`4${hex.slice(13, 16)}`,
|
|
941
|
-
`${(0x8 | (parseInt(hex[16], 16) & 0x3)).toString(16)}${hex.slice(17, 20)}`,
|
|
942
|
-
hex.slice(20, 32),
|
|
943
|
-
].join("-");
|
|
1118
|
+
function buildConversationFingerprint(messages) {
|
|
1119
|
+
return messages.map((message) => {
|
|
1120
|
+
const toolCallIDs = (message.tool_calls ?? []).map((call) => call.id).join(",");
|
|
1121
|
+
return `${message.role}:${textContent(message.content)}:${message.tool_call_id ?? ""}:${toolCallIDs}`;
|
|
1122
|
+
}).join("\n---\n");
|
|
944
1123
|
}
|
|
945
1124
|
/** Create an SSE streaming Response that reads from a live bridge. */
|
|
946
1125
|
function createBridgeStreamResponse(bridge, heartbeatTimer, blobStore, mcpTools, modelId, bridgeKey, convKey) {
|
|
@@ -992,6 +1171,7 @@ function createBridgeStreamResponse(bridge, heartbeatTimer, blobStore, mcpTools,
|
|
|
992
1171
|
};
|
|
993
1172
|
const tagFilter = createThinkingTagFilter();
|
|
994
1173
|
let mcpExecReceived = false;
|
|
1174
|
+
let endStreamError = null;
|
|
995
1175
|
const processChunk = createConnectFrameParser((messageBytes) => {
|
|
996
1176
|
try {
|
|
997
1177
|
const serverMessage = fromBinary(AgentServerMessageSchema, messageBytes);
|
|
@@ -1051,10 +1231,16 @@ function createBridgeStreamResponse(bridge, heartbeatTimer, blobStore, mcpTools,
|
|
|
1051
1231
|
// Skip unparseable messages
|
|
1052
1232
|
}
|
|
1053
1233
|
}, (endStreamBytes) => {
|
|
1054
|
-
|
|
1055
|
-
if (
|
|
1056
|
-
|
|
1234
|
+
endStreamError = parseConnectEndStream(endStreamBytes);
|
|
1235
|
+
if (endStreamError) {
|
|
1236
|
+
logPluginError("Cursor stream returned Connect end-stream error", {
|
|
1237
|
+
modelId,
|
|
1238
|
+
bridgeKey,
|
|
1239
|
+
convKey,
|
|
1240
|
+
...errorDetails(endStreamError),
|
|
1241
|
+
});
|
|
1057
1242
|
}
|
|
1243
|
+
scheduleBridgeEnd(bridge);
|
|
1058
1244
|
});
|
|
1059
1245
|
bridge.onData(processChunk);
|
|
1060
1246
|
bridge.onClose((code) => {
|
|
@@ -1065,6 +1251,14 @@ function createBridgeStreamResponse(bridge, heartbeatTimer, blobStore, mcpTools,
|
|
|
1065
1251
|
stored.blobStore.set(k, v);
|
|
1066
1252
|
stored.lastAccessMs = Date.now();
|
|
1067
1253
|
}
|
|
1254
|
+
if (endStreamError) {
|
|
1255
|
+
activeBridges.delete(bridgeKey);
|
|
1256
|
+
if (!closed) {
|
|
1257
|
+
closed = true;
|
|
1258
|
+
controller.error(endStreamError);
|
|
1259
|
+
}
|
|
1260
|
+
return;
|
|
1261
|
+
}
|
|
1068
1262
|
if (!mcpExecReceived) {
|
|
1069
1263
|
const flushed = tagFilter.flush();
|
|
1070
1264
|
if (flushed.reasoning)
|
|
@@ -1076,16 +1270,17 @@ function createBridgeStreamResponse(bridge, heartbeatTimer, blobStore, mcpTools,
|
|
|
1076
1270
|
sendDone();
|
|
1077
1271
|
closeController();
|
|
1078
1272
|
}
|
|
1079
|
-
else
|
|
1080
|
-
// Bridge died while tool calls are pending (timeout, crash, etc.).
|
|
1081
|
-
// Close the SSE stream so the client doesn't hang forever.
|
|
1082
|
-
sendSSE(makeChunk({ content: "\n[Error: bridge connection lost]" }));
|
|
1083
|
-
sendSSE(makeChunk({}, "stop"));
|
|
1084
|
-
sendSSE(makeUsageChunk());
|
|
1085
|
-
sendDone();
|
|
1086
|
-
closeController();
|
|
1087
|
-
// Remove stale entry so the next request doesn't try to resume it.
|
|
1273
|
+
else {
|
|
1088
1274
|
activeBridges.delete(bridgeKey);
|
|
1275
|
+
if (code !== 0 && !closed) {
|
|
1276
|
+
// Bridge died while tool calls are pending (timeout, crash, etc.).
|
|
1277
|
+
// Close the SSE stream so the client doesn't hang forever.
|
|
1278
|
+
sendSSE(makeChunk({ content: "\n[Error: bridge connection lost]" }));
|
|
1279
|
+
sendSSE(makeChunk({}, "stop"));
|
|
1280
|
+
sendSSE(makeUsageChunk());
|
|
1281
|
+
sendDone();
|
|
1282
|
+
closeController();
|
|
1283
|
+
}
|
|
1089
1284
|
}
|
|
1090
1285
|
});
|
|
1091
1286
|
},
|
|
@@ -1154,7 +1349,7 @@ function handleToolResultResume(active, toolResults, modelId, bridgeKey, convKey
|
|
|
1154
1349
|
async function handleNonStreamingResponse(payload, accessToken, modelId, convKey) {
|
|
1155
1350
|
const completionId = `chatcmpl-${crypto.randomUUID().replace(/-/g, "").slice(0, 28)}`;
|
|
1156
1351
|
const created = Math.floor(Date.now() / 1000);
|
|
1157
|
-
const { text, usage } = await collectFullResponse(payload, accessToken, convKey);
|
|
1352
|
+
const { text, usage } = await collectFullResponse(payload, accessToken, modelId, convKey);
|
|
1158
1353
|
return new Response(JSON.stringify({
|
|
1159
1354
|
id: completionId,
|
|
1160
1355
|
object: "chat.completion",
|
|
@@ -1170,9 +1365,10 @@ async function handleNonStreamingResponse(payload, accessToken, modelId, convKey
|
|
|
1170
1365
|
usage,
|
|
1171
1366
|
}), { headers: { "Content-Type": "application/json" } });
|
|
1172
1367
|
}
|
|
1173
|
-
async function collectFullResponse(payload, accessToken, convKey) {
|
|
1174
|
-
const { promise, resolve } = Promise.withResolvers();
|
|
1368
|
+
async function collectFullResponse(payload, accessToken, modelId, convKey) {
|
|
1369
|
+
const { promise, resolve, reject } = Promise.withResolvers();
|
|
1175
1370
|
let fullText = "";
|
|
1371
|
+
let endStreamError = null;
|
|
1176
1372
|
const { bridge, heartbeatTimer } = await startBridge(accessToken, payload.requestBytes);
|
|
1177
1373
|
const state = {
|
|
1178
1374
|
toolCallIndex: 0,
|
|
@@ -1200,7 +1396,17 @@ async function collectFullResponse(payload, accessToken, convKey) {
|
|
|
1200
1396
|
catch {
|
|
1201
1397
|
// Skip
|
|
1202
1398
|
}
|
|
1203
|
-
}, () => {
|
|
1399
|
+
}, (endStreamBytes) => {
|
|
1400
|
+
endStreamError = parseConnectEndStream(endStreamBytes);
|
|
1401
|
+
if (endStreamError) {
|
|
1402
|
+
logPluginError("Cursor non-streaming response returned Connect end-stream error", {
|
|
1403
|
+
modelId,
|
|
1404
|
+
convKey,
|
|
1405
|
+
...errorDetails(endStreamError),
|
|
1406
|
+
});
|
|
1407
|
+
}
|
|
1408
|
+
scheduleBridgeEnd(bridge);
|
|
1409
|
+
}));
|
|
1204
1410
|
bridge.onClose(() => {
|
|
1205
1411
|
clearInterval(heartbeatTimer);
|
|
1206
1412
|
const stored = conversationStates.get(convKey);
|
|
@@ -1211,6 +1417,10 @@ async function collectFullResponse(payload, accessToken, convKey) {
|
|
|
1211
1417
|
}
|
|
1212
1418
|
const flushed = tagFilter.flush();
|
|
1213
1419
|
fullText += flushed.content;
|
|
1420
|
+
if (endStreamError) {
|
|
1421
|
+
reject(endStreamError);
|
|
1422
|
+
return;
|
|
1423
|
+
}
|
|
1214
1424
|
const usage = computeUsage(state);
|
|
1215
1425
|
resolve({
|
|
1216
1426
|
text: fullText,
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@playwo/opencode-cursor-oauth",
|
|
3
|
-
"version": "0.0.0-dev.
|
|
3
|
+
"version": "0.0.0-dev.c1bf17c092a2",
|
|
4
4
|
"description": "OpenCode plugin that connects Cursor's API to OpenCode via OAuth, model discovery, and a local OpenAI-compatible proxy.",
|
|
5
5
|
"license": "MIT",
|
|
6
6
|
"type": "module",
|