agents 0.3.10 → 0.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -2
- package/dist/{index-N6791tVt.d.ts → agent-DY6QmSI_.d.ts} +3 -25
- package/dist/ai-types.js +1 -1
- package/dist/client-connection-CGMuV62J.js +472 -0
- package/dist/client-connection-CGMuV62J.js.map +1 -0
- package/dist/client-storage-Cvy5r9FG.d.ts +355 -0
- package/dist/client.d.ts +11 -7
- package/dist/client.js +6 -2
- package/dist/client.js.map +1 -1
- package/dist/email.d.ts +146 -16
- package/dist/email.js +222 -2
- package/dist/email.js.map +1 -0
- package/dist/index.d.ts +142 -41
- package/dist/index.js +2326 -6
- package/dist/index.js.map +1 -0
- package/dist/internal_context.d.ts +33 -6
- package/dist/internal_context.js +11 -2
- package/dist/internal_context.js.map +1 -0
- package/dist/mcp/client.d.ts +516 -2
- package/dist/mcp/client.js +662 -3
- package/dist/mcp/client.js.map +1 -0
- package/dist/mcp/do-oauth-client-provider.d.ts +61 -2
- package/dist/mcp/do-oauth-client-provider.js +154 -2
- package/dist/mcp/do-oauth-client-provider.js.map +1 -0
- package/dist/mcp/index.d.ts +3 -5
- package/dist/mcp/index.js +8 -7
- package/dist/mcp/index.js.map +1 -1
- package/dist/mcp/x402.d.ts +34 -14
- package/dist/mcp/x402.js +128 -66
- package/dist/mcp/x402.js.map +1 -1
- package/dist/{mcp-BwPscEiF.d.ts → mcp-Dw5vDrY8.d.ts} +1 -1
- package/dist/observability/index.d.ts +23 -2
- package/dist/observability/index.js +25 -6
- package/dist/observability/index.js.map +1 -0
- package/dist/react.d.ts +10 -10
- package/dist/react.js +6 -2
- package/dist/react.js.map +1 -1
- package/dist/types.d.ts +14 -1
- package/dist/types.js +16 -2
- package/dist/types.js.map +1 -0
- package/dist/utils.js +15 -2
- package/dist/utils.js.map +1 -0
- package/dist/workflow-types.d.ts +235 -23
- package/dist/workflows.d.ts +22 -24
- package/dist/workflows.js +2 -5
- package/dist/workflows.js.map +1 -1
- package/package.json +24 -28
- package/dist/client-CtC9E06G.js +0 -1122
- package/dist/client-CtC9E06G.js.map +0 -1
- package/dist/client-DV1CZKqa.d.ts +0 -969
- package/dist/do-oauth-client-provider-BqnOQzjy.d.ts +0 -70
- package/dist/do-oauth-client-provider-DDg8QrEA.js +0 -155
- package/dist/do-oauth-client-provider-DDg8QrEA.js.map +0 -1
- package/dist/email-8ljcpvwV.d.ts +0 -157
- package/dist/email-XHsSYsTO.js +0 -223
- package/dist/email-XHsSYsTO.js.map +0 -1
- package/dist/internal_context-CEu5ji80.d.ts +0 -29
- package/dist/internal_context-D9eKFth1.js +0 -8
- package/dist/internal_context-D9eKFth1.js.map +0 -1
- package/dist/src-i_UcyBYf.js +0 -2147
- package/dist/src-i_UcyBYf.js.map +0 -1
- package/dist/types-BITaDFf-.js +0 -16
- package/dist/types-BITaDFf-.js.map +0 -1
- package/dist/types-DSSHBW6w.d.ts +0 -14
- package/dist/utils-B49TmLCI.js +0 -16
- package/dist/utils-B49TmLCI.js.map +0 -1
- package/dist/workflow-types-Z_Oem1FJ.d.ts +0 -260
|
@@ -1,70 +0,0 @@
|
|
|
1
|
-
import { OAuthClientProvider } from "@modelcontextprotocol/sdk/client/auth.js";
|
|
2
|
-
import {
|
|
3
|
-
OAuthClientInformation,
|
|
4
|
-
OAuthClientInformationFull,
|
|
5
|
-
OAuthClientMetadata,
|
|
6
|
-
OAuthTokens
|
|
7
|
-
} from "@modelcontextprotocol/sdk/shared/auth.js";
|
|
8
|
-
|
|
9
|
-
//#region src/mcp/do-oauth-client-provider.d.ts
|
|
10
|
-
interface AgentsOAuthProvider extends OAuthClientProvider {
|
|
11
|
-
authUrl: string | undefined;
|
|
12
|
-
clientId: string | undefined;
|
|
13
|
-
serverId: string | undefined;
|
|
14
|
-
checkState(state: string): Promise<{
|
|
15
|
-
valid: boolean;
|
|
16
|
-
serverId?: string;
|
|
17
|
-
error?: string;
|
|
18
|
-
}>;
|
|
19
|
-
consumeState(state: string): Promise<void>;
|
|
20
|
-
deleteCodeVerifier(): Promise<void>;
|
|
21
|
-
}
|
|
22
|
-
declare class DurableObjectOAuthClientProvider implements AgentsOAuthProvider {
|
|
23
|
-
storage: DurableObjectStorage;
|
|
24
|
-
clientName: string;
|
|
25
|
-
baseRedirectUrl: string;
|
|
26
|
-
private _authUrl_;
|
|
27
|
-
private _serverId_;
|
|
28
|
-
private _clientId_;
|
|
29
|
-
constructor(
|
|
30
|
-
storage: DurableObjectStorage,
|
|
31
|
-
clientName: string,
|
|
32
|
-
baseRedirectUrl: string
|
|
33
|
-
);
|
|
34
|
-
get clientMetadata(): OAuthClientMetadata;
|
|
35
|
-
get clientUri(): string;
|
|
36
|
-
get redirectUrl(): string;
|
|
37
|
-
get clientId(): string;
|
|
38
|
-
set clientId(clientId_: string);
|
|
39
|
-
get serverId(): string;
|
|
40
|
-
set serverId(serverId_: string);
|
|
41
|
-
keyPrefix(clientId: string): string;
|
|
42
|
-
clientInfoKey(clientId: string): string;
|
|
43
|
-
clientInformation(): Promise<OAuthClientInformation | undefined>;
|
|
44
|
-
saveClientInformation(
|
|
45
|
-
clientInformation: OAuthClientInformationFull
|
|
46
|
-
): Promise<void>;
|
|
47
|
-
tokenKey(clientId: string): string;
|
|
48
|
-
tokens(): Promise<OAuthTokens | undefined>;
|
|
49
|
-
saveTokens(tokens: OAuthTokens): Promise<void>;
|
|
50
|
-
get authUrl(): string | undefined;
|
|
51
|
-
stateKey(nonce: string): string;
|
|
52
|
-
state(): Promise<string>;
|
|
53
|
-
checkState(state: string): Promise<{
|
|
54
|
-
valid: boolean;
|
|
55
|
-
serverId?: string;
|
|
56
|
-
error?: string;
|
|
57
|
-
}>;
|
|
58
|
-
consumeState(state: string): Promise<void>;
|
|
59
|
-
redirectToAuthorization(authUrl: URL): Promise<void>;
|
|
60
|
-
invalidateCredentials(
|
|
61
|
-
scope: "all" | "client" | "tokens" | "verifier"
|
|
62
|
-
): Promise<void>;
|
|
63
|
-
codeVerifierKey(clientId: string): string;
|
|
64
|
-
saveCodeVerifier(verifier: string): Promise<void>;
|
|
65
|
-
codeVerifier(): Promise<string>;
|
|
66
|
-
deleteCodeVerifier(): Promise<void>;
|
|
67
|
-
}
|
|
68
|
-
//#endregion
|
|
69
|
-
export { DurableObjectOAuthClientProvider as n, AgentsOAuthProvider as t };
|
|
70
|
-
//# sourceMappingURL=do-oauth-client-provider-BqnOQzjy.d.ts.map
|
|
@@ -1,155 +0,0 @@
|
|
|
1
|
-
import { nanoid } from "nanoid";
|
|
2
|
-
|
|
3
|
-
//#region src/mcp/do-oauth-client-provider.ts
|
|
4
|
-
const STATE_EXPIRATION_MS = 600 * 1e3;
|
|
5
|
-
var DurableObjectOAuthClientProvider = class {
|
|
6
|
-
constructor(storage, clientName, baseRedirectUrl) {
|
|
7
|
-
this.storage = storage;
|
|
8
|
-
this.clientName = clientName;
|
|
9
|
-
this.baseRedirectUrl = baseRedirectUrl;
|
|
10
|
-
if (!storage) throw new Error("DurableObjectOAuthClientProvider requires a valid DurableObjectStorage instance");
|
|
11
|
-
}
|
|
12
|
-
get clientMetadata() {
|
|
13
|
-
return {
|
|
14
|
-
client_name: this.clientName,
|
|
15
|
-
client_uri: this.clientUri,
|
|
16
|
-
grant_types: ["authorization_code", "refresh_token"],
|
|
17
|
-
redirect_uris: [this.redirectUrl],
|
|
18
|
-
response_types: ["code"],
|
|
19
|
-
token_endpoint_auth_method: "none"
|
|
20
|
-
};
|
|
21
|
-
}
|
|
22
|
-
get clientUri() {
|
|
23
|
-
return new URL(this.redirectUrl).origin;
|
|
24
|
-
}
|
|
25
|
-
get redirectUrl() {
|
|
26
|
-
return this.baseRedirectUrl;
|
|
27
|
-
}
|
|
28
|
-
get clientId() {
|
|
29
|
-
if (!this._clientId_) throw new Error("Trying to access clientId before it was set");
|
|
30
|
-
return this._clientId_;
|
|
31
|
-
}
|
|
32
|
-
set clientId(clientId_) {
|
|
33
|
-
this._clientId_ = clientId_;
|
|
34
|
-
}
|
|
35
|
-
get serverId() {
|
|
36
|
-
if (!this._serverId_) throw new Error("Trying to access serverId before it was set");
|
|
37
|
-
return this._serverId_;
|
|
38
|
-
}
|
|
39
|
-
set serverId(serverId_) {
|
|
40
|
-
this._serverId_ = serverId_;
|
|
41
|
-
}
|
|
42
|
-
keyPrefix(clientId) {
|
|
43
|
-
return `/${this.clientName}/${this.serverId}/${clientId}`;
|
|
44
|
-
}
|
|
45
|
-
clientInfoKey(clientId) {
|
|
46
|
-
return `${this.keyPrefix(clientId)}/client_info/`;
|
|
47
|
-
}
|
|
48
|
-
async clientInformation() {
|
|
49
|
-
if (!this._clientId_) return;
|
|
50
|
-
return await this.storage.get(this.clientInfoKey(this.clientId)) ?? void 0;
|
|
51
|
-
}
|
|
52
|
-
async saveClientInformation(clientInformation) {
|
|
53
|
-
await this.storage.put(this.clientInfoKey(clientInformation.client_id), clientInformation);
|
|
54
|
-
this.clientId = clientInformation.client_id;
|
|
55
|
-
}
|
|
56
|
-
tokenKey(clientId) {
|
|
57
|
-
return `${this.keyPrefix(clientId)}/token`;
|
|
58
|
-
}
|
|
59
|
-
async tokens() {
|
|
60
|
-
if (!this._clientId_) return;
|
|
61
|
-
return await this.storage.get(this.tokenKey(this.clientId)) ?? void 0;
|
|
62
|
-
}
|
|
63
|
-
async saveTokens(tokens) {
|
|
64
|
-
await this.storage.put(this.tokenKey(this.clientId), tokens);
|
|
65
|
-
}
|
|
66
|
-
get authUrl() {
|
|
67
|
-
return this._authUrl_;
|
|
68
|
-
}
|
|
69
|
-
stateKey(nonce) {
|
|
70
|
-
return `/${this.clientName}/${this.serverId}/state/${nonce}`;
|
|
71
|
-
}
|
|
72
|
-
async state() {
|
|
73
|
-
const nonce = nanoid();
|
|
74
|
-
const state = `${nonce}.${this.serverId}`;
|
|
75
|
-
const storedState = {
|
|
76
|
-
nonce,
|
|
77
|
-
serverId: this.serverId,
|
|
78
|
-
createdAt: Date.now()
|
|
79
|
-
};
|
|
80
|
-
await this.storage.put(this.stateKey(nonce), storedState);
|
|
81
|
-
return state;
|
|
82
|
-
}
|
|
83
|
-
async checkState(state) {
|
|
84
|
-
const parts = state.split(".");
|
|
85
|
-
if (parts.length !== 2) return {
|
|
86
|
-
valid: false,
|
|
87
|
-
error: "Invalid state format"
|
|
88
|
-
};
|
|
89
|
-
const [nonce, serverId] = parts;
|
|
90
|
-
const key = this.stateKey(nonce);
|
|
91
|
-
const storedState = await this.storage.get(key);
|
|
92
|
-
if (!storedState) return {
|
|
93
|
-
valid: false,
|
|
94
|
-
error: "State not found or already used"
|
|
95
|
-
};
|
|
96
|
-
if (storedState.serverId !== serverId) {
|
|
97
|
-
await this.storage.delete(key);
|
|
98
|
-
return {
|
|
99
|
-
valid: false,
|
|
100
|
-
error: "State serverId mismatch"
|
|
101
|
-
};
|
|
102
|
-
}
|
|
103
|
-
if (Date.now() - storedState.createdAt > STATE_EXPIRATION_MS) {
|
|
104
|
-
await this.storage.delete(key);
|
|
105
|
-
return {
|
|
106
|
-
valid: false,
|
|
107
|
-
error: "State expired"
|
|
108
|
-
};
|
|
109
|
-
}
|
|
110
|
-
return {
|
|
111
|
-
valid: true,
|
|
112
|
-
serverId
|
|
113
|
-
};
|
|
114
|
-
}
|
|
115
|
-
async consumeState(state) {
|
|
116
|
-
const parts = state.split(".");
|
|
117
|
-
if (parts.length !== 2) {
|
|
118
|
-
console.warn(`[OAuth] consumeState called with invalid state format: ${state.substring(0, 20)}...`);
|
|
119
|
-
return;
|
|
120
|
-
}
|
|
121
|
-
const [nonce] = parts;
|
|
122
|
-
await this.storage.delete(this.stateKey(nonce));
|
|
123
|
-
}
|
|
124
|
-
async redirectToAuthorization(authUrl) {
|
|
125
|
-
this._authUrl_ = authUrl.toString();
|
|
126
|
-
}
|
|
127
|
-
async invalidateCredentials(scope) {
|
|
128
|
-
if (!this._clientId_) return;
|
|
129
|
-
const deleteKeys = [];
|
|
130
|
-
if (scope === "all" || scope === "client") deleteKeys.push(this.clientInfoKey(this.clientId));
|
|
131
|
-
if (scope === "all" || scope === "tokens") deleteKeys.push(this.tokenKey(this.clientId));
|
|
132
|
-
if (scope === "all" || scope === "verifier") deleteKeys.push(this.codeVerifierKey(this.clientId));
|
|
133
|
-
if (deleteKeys.length > 0) await this.storage.delete(deleteKeys);
|
|
134
|
-
}
|
|
135
|
-
codeVerifierKey(clientId) {
|
|
136
|
-
return `${this.keyPrefix(clientId)}/code_verifier`;
|
|
137
|
-
}
|
|
138
|
-
async saveCodeVerifier(verifier) {
|
|
139
|
-
const key = this.codeVerifierKey(this.clientId);
|
|
140
|
-
if (await this.storage.get(key)) return;
|
|
141
|
-
await this.storage.put(key, verifier);
|
|
142
|
-
}
|
|
143
|
-
async codeVerifier() {
|
|
144
|
-
const codeVerifier = await this.storage.get(this.codeVerifierKey(this.clientId));
|
|
145
|
-
if (!codeVerifier) throw new Error("No code verifier found");
|
|
146
|
-
return codeVerifier;
|
|
147
|
-
}
|
|
148
|
-
async deleteCodeVerifier() {
|
|
149
|
-
await this.storage.delete(this.codeVerifierKey(this.clientId));
|
|
150
|
-
}
|
|
151
|
-
};
|
|
152
|
-
|
|
153
|
-
//#endregion
|
|
154
|
-
export { DurableObjectOAuthClientProvider as t };
|
|
155
|
-
//# sourceMappingURL=do-oauth-client-provider-DDg8QrEA.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"do-oauth-client-provider-DDg8QrEA.js","names":[],"sources":["../src/mcp/do-oauth-client-provider.ts"],"sourcesContent":["import type { OAuthClientProvider } from \"@modelcontextprotocol/sdk/client/auth.js\";\nimport type {\n OAuthClientInformation,\n OAuthClientInformationFull,\n OAuthClientMetadata,\n OAuthTokens\n} from \"@modelcontextprotocol/sdk/shared/auth.js\";\nimport { nanoid } from \"nanoid\";\n\nconst STATE_EXPIRATION_MS = 10 * 60 * 1000; // 10 minutes\n\ninterface StoredState {\n nonce: string;\n serverId: string;\n createdAt: number;\n}\n\n// A slight extension to the standard OAuthClientProvider interface because `redirectToAuthorization` doesn't give us the interface we need\n// This allows us to track authentication for a specific server and associated dynamic client registration\nexport interface AgentsOAuthProvider extends OAuthClientProvider {\n authUrl: string | undefined;\n clientId: string | undefined;\n serverId: string | undefined;\n checkState(\n state: string\n ): Promise<{ valid: boolean; serverId?: string; error?: string }>;\n consumeState(state: string): Promise<void>;\n deleteCodeVerifier(): Promise<void>;\n}\n\nexport class DurableObjectOAuthClientProvider implements AgentsOAuthProvider {\n private _authUrl_: string | undefined;\n private _serverId_: string | undefined;\n private _clientId_: string | undefined;\n\n constructor(\n public storage: DurableObjectStorage,\n public clientName: string,\n public baseRedirectUrl: string\n ) {\n if (!storage) {\n throw new Error(\n \"DurableObjectOAuthClientProvider requires a valid DurableObjectStorage instance\"\n );\n }\n }\n\n get clientMetadata(): OAuthClientMetadata {\n return {\n client_name: this.clientName,\n client_uri: this.clientUri,\n grant_types: [\"authorization_code\", \"refresh_token\"],\n redirect_uris: [this.redirectUrl],\n response_types: [\"code\"],\n token_endpoint_auth_method: \"none\"\n };\n }\n\n get clientUri() {\n return new URL(this.redirectUrl).origin;\n }\n\n get redirectUrl() {\n return this.baseRedirectUrl;\n }\n\n get clientId() {\n if (!this._clientId_) {\n throw new Error(\"Trying to access clientId before it was set\");\n }\n return this._clientId_;\n }\n\n set clientId(clientId_: string) {\n this._clientId_ = clientId_;\n }\n\n get serverId() {\n if (!this._serverId_) {\n throw new Error(\"Trying to access serverId before it was set\");\n }\n return this._serverId_;\n }\n\n set serverId(serverId_: string) {\n this._serverId_ = serverId_;\n }\n\n keyPrefix(clientId: string) {\n return `/${this.clientName}/${this.serverId}/${clientId}`;\n }\n\n clientInfoKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/client_info/`;\n }\n\n async clientInformation(): Promise<OAuthClientInformation | undefined> {\n if (!this._clientId_) {\n return undefined;\n }\n return (\n (await this.storage.get<OAuthClientInformation>(\n this.clientInfoKey(this.clientId)\n )) ?? undefined\n );\n }\n\n async saveClientInformation(\n clientInformation: OAuthClientInformationFull\n ): Promise<void> {\n await this.storage.put(\n this.clientInfoKey(clientInformation.client_id),\n clientInformation\n );\n this.clientId = clientInformation.client_id;\n }\n\n tokenKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/token`;\n }\n\n async tokens(): Promise<OAuthTokens | undefined> {\n if (!this._clientId_) {\n return undefined;\n }\n return (\n (await this.storage.get<OAuthTokens>(this.tokenKey(this.clientId))) ??\n undefined\n );\n }\n\n async saveTokens(tokens: OAuthTokens): Promise<void> {\n await this.storage.put(this.tokenKey(this.clientId), tokens);\n }\n\n get authUrl() {\n return this._authUrl_;\n }\n\n stateKey(nonce: string) {\n return `/${this.clientName}/${this.serverId}/state/${nonce}`;\n }\n\n async state(): Promise<string> {\n const nonce = nanoid();\n const state = `${nonce}.${this.serverId}`;\n const storedState: StoredState = {\n nonce,\n serverId: this.serverId,\n createdAt: Date.now()\n };\n await this.storage.put(this.stateKey(nonce), storedState);\n return state;\n }\n\n async checkState(\n state: string\n ): Promise<{ valid: boolean; serverId?: string; error?: string }> {\n const parts = state.split(\".\");\n if (parts.length !== 2) {\n return { valid: false, error: \"Invalid state format\" };\n }\n\n const [nonce, serverId] = parts;\n const key = this.stateKey(nonce);\n const storedState = await this.storage.get<StoredState>(key);\n\n if (!storedState) {\n return { valid: false, error: \"State not found or already used\" };\n }\n\n if (storedState.serverId !== serverId) {\n await this.storage.delete(key);\n return { valid: false, error: \"State serverId mismatch\" };\n }\n\n const age = Date.now() - storedState.createdAt;\n if (age > STATE_EXPIRATION_MS) {\n await this.storage.delete(key);\n return { valid: false, error: \"State expired\" };\n }\n\n return { valid: true, serverId };\n }\n\n async consumeState(state: string): Promise<void> {\n const parts = state.split(\".\");\n if (parts.length !== 2) {\n // This should never happen since checkState validates format first.\n // Log for debugging but don't throw - state consumption is best-effort.\n console.warn(\n `[OAuth] consumeState called with invalid state format: ${state.substring(0, 20)}...`\n );\n return;\n }\n const [nonce] = parts;\n await this.storage.delete(this.stateKey(nonce));\n }\n\n async redirectToAuthorization(authUrl: URL): Promise<void> {\n this._authUrl_ = authUrl.toString();\n }\n\n async invalidateCredentials(\n scope: \"all\" | \"client\" | \"tokens\" | \"verifier\"\n ): Promise<void> {\n if (!this._clientId_) return;\n\n const deleteKeys: string[] = [];\n\n if (scope === \"all\" || scope === \"client\") {\n deleteKeys.push(this.clientInfoKey(this.clientId));\n }\n if (scope === \"all\" || scope === \"tokens\") {\n deleteKeys.push(this.tokenKey(this.clientId));\n }\n if (scope === \"all\" || scope === \"verifier\") {\n deleteKeys.push(this.codeVerifierKey(this.clientId));\n }\n\n if (deleteKeys.length > 0) {\n await this.storage.delete(deleteKeys);\n }\n }\n\n codeVerifierKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/code_verifier`;\n }\n\n async saveCodeVerifier(verifier: string): Promise<void> {\n const key = this.codeVerifierKey(this.clientId);\n\n // Don't overwrite existing verifier to preserve first PKCE verifier\n const existing = await this.storage.get<string>(key);\n if (existing) {\n return;\n }\n\n await this.storage.put(key, verifier);\n }\n\n async codeVerifier(): Promise<string> {\n const codeVerifier = await this.storage.get<string>(\n this.codeVerifierKey(this.clientId)\n );\n if (!codeVerifier) {\n throw new Error(\"No code verifier found\");\n }\n return codeVerifier;\n }\n\n async deleteCodeVerifier(): Promise<void> {\n await this.storage.delete(this.codeVerifierKey(this.clientId));\n }\n}\n"],"mappings":";;;AASA,MAAM,sBAAsB,MAAU;AAqBtC,IAAa,mCAAb,MAA6E;CAK3E,YACE,AAAO,SACP,AAAO,YACP,AAAO,iBACP;EAHO;EACA;EACA;AAEP,MAAI,CAAC,QACH,OAAM,IAAI,MACR,kFACD;;CAIL,IAAI,iBAAsC;AACxC,SAAO;GACL,aAAa,KAAK;GAClB,YAAY,KAAK;GACjB,aAAa,CAAC,sBAAsB,gBAAgB;GACpD,eAAe,CAAC,KAAK,YAAY;GACjC,gBAAgB,CAAC,OAAO;GACxB,4BAA4B;GAC7B;;CAGH,IAAI,YAAY;AACd,SAAO,IAAI,IAAI,KAAK,YAAY,CAAC;;CAGnC,IAAI,cAAc;AAChB,SAAO,KAAK;;CAGd,IAAI,WAAW;AACb,MAAI,CAAC,KAAK,WACR,OAAM,IAAI,MAAM,8CAA8C;AAEhE,SAAO,KAAK;;CAGd,IAAI,SAAS,WAAmB;AAC9B,OAAK,aAAa;;CAGpB,IAAI,WAAW;AACb,MAAI,CAAC,KAAK,WACR,OAAM,IAAI,MAAM,8CAA8C;AAEhE,SAAO,KAAK;;CAGd,IAAI,SAAS,WAAmB;AAC9B,OAAK,aAAa;;CAGpB,UAAU,UAAkB;AAC1B,SAAO,IAAI,KAAK,WAAW,GAAG,KAAK,SAAS,GAAG;;CAGjD,cAAc,UAAkB;AAC9B,SAAO,GAAG,KAAK,UAAU,SAAS,CAAC;;CAGrC,MAAM,oBAAiE;AACrE,MAAI,CAAC,KAAK,WACR;AAEF,SACG,MAAM,KAAK,QAAQ,IAClB,KAAK,cAAc,KAAK,SAAS,CAClC,IAAK;;CAIV,MAAM,sBACJ,mBACe;AACf,QAAM,KAAK,QAAQ,IACjB,KAAK,cAAc,kBAAkB,UAAU,EAC/C,kBACD;AACD,OAAK,WAAW,kBAAkB;;CAGpC,SAAS,UAAkB;AACzB,SAAO,GAAG,KAAK,UAAU,SAAS,CAAC;;CAGrC,MAAM,SAA2C;AAC/C,MAAI,CAAC,KAAK,WACR;AAEF,SACG,MAAM,KAAK,QAAQ,IAAiB,KAAK,SAAS,KAAK,SAAS,CAAC,IAClE;;CAIJ,MAAM,WAAW,QAAoC;AACnD,QAAM,KAAK,QAAQ,IAAI,KAAK,SAAS,KAAK,SAAS,EAAE,OAAO;;CAG9D,IAAI,UAAU;AACZ,SAAO,KAAK;;CAGd,SAAS,OAAe;AACtB,SAAO,IAAI,KAAK,WAAW,GAAG,KAAK,SAAS,SAAS;;CAGvD,MAAM,QAAyB;EAC7B,MAAM,QAAQ,QAAQ;EACtB,MAAM,QAAQ,GAAG,MAAM,GAAG,KAAK;EAC/B,MAAM,cAA2B;GAC/B;GACA,UAAU,KAAK;GACf,WAAW,KAAK,KAAK;GACtB;AACD,QAAM,KAAK,QAAQ,IAAI,KAAK,SAAS,MAAM,EAAE,YAAY;AACzD,SAAO;;CAGT,MAAM,WACJ,OACgE;EAChE,MAAM,QAAQ,MAAM,MAAM,IAAI;AAC9B,MAAI,MAAM,WAAW,EACnB,QAAO;GAAE,OAAO;GAAO,OAAO;GAAwB;EAGxD,MAAM,CAAC,OAAO,YAAY;EAC1B,MAAM,MAAM,KAAK,SAAS,MAAM;EAChC,MAAM,cAAc,MAAM,KAAK,QAAQ,IAAiB,IAAI;AAE5D,MAAI,CAAC,YACH,QAAO;GAAE,OAAO;GAAO,OAAO;GAAmC;AAGnE,MAAI,YAAY,aAAa,UAAU;AACrC,SAAM,KAAK,QAAQ,OAAO,IAAI;AAC9B,UAAO;IAAE,OAAO;IAAO,OAAO;IAA2B;;AAI3D,MADY,KAAK,KAAK,GAAG,YAAY,YAC3B,qBAAqB;AAC7B,SAAM,KAAK,QAAQ,OAAO,IAAI;AAC9B,UAAO;IAAE,OAAO;IAAO,OAAO;IAAiB;;AAGjD,SAAO;GAAE,OAAO;GAAM;GAAU;;CAGlC,MAAM,aAAa,OAA8B;EAC/C,MAAM,QAAQ,MAAM,MAAM,IAAI;AAC9B,MAAI,MAAM,WAAW,GAAG;AAGtB,WAAQ,KACN,0DAA0D,MAAM,UAAU,GAAG,GAAG,CAAC,KAClF;AACD;;EAEF,MAAM,CAAC,SAAS;AAChB,QAAM,KAAK,QAAQ,OAAO,KAAK,SAAS,MAAM,CAAC;;CAGjD,MAAM,wBAAwB,SAA6B;AACzD,OAAK,YAAY,QAAQ,UAAU;;CAGrC,MAAM,sBACJ,OACe;AACf,MAAI,CAAC,KAAK,WAAY;EAEtB,MAAM,aAAuB,EAAE;AAE/B,MAAI,UAAU,SAAS,UAAU,SAC/B,YAAW,KAAK,KAAK,cAAc,KAAK,SAAS,CAAC;AAEpD,MAAI,UAAU,SAAS,UAAU,SAC/B,YAAW,KAAK,KAAK,SAAS,KAAK,SAAS,CAAC;AAE/C,MAAI,UAAU,SAAS,UAAU,WAC/B,YAAW,KAAK,KAAK,gBAAgB,KAAK,SAAS,CAAC;AAGtD,MAAI,WAAW,SAAS,EACtB,OAAM,KAAK,QAAQ,OAAO,WAAW;;CAIzC,gBAAgB,UAAkB;AAChC,SAAO,GAAG,KAAK,UAAU,SAAS,CAAC;;CAGrC,MAAM,iBAAiB,UAAiC;EACtD,MAAM,MAAM,KAAK,gBAAgB,KAAK,SAAS;AAI/C,MADiB,MAAM,KAAK,QAAQ,IAAY,IAAI,CAElD;AAGF,QAAM,KAAK,QAAQ,IAAI,KAAK,SAAS;;CAGvC,MAAM,eAAgC;EACpC,MAAM,eAAe,MAAM,KAAK,QAAQ,IACtC,KAAK,gBAAgB,KAAK,SAAS,CACpC;AACD,MAAI,CAAC,aACH,OAAM,IAAI,MAAM,yBAAyB;AAE3C,SAAO;;CAGT,MAAM,qBAAoC;AACxC,QAAM,KAAK,QAAQ,OAAO,KAAK,gBAAgB,KAAK,SAAS,CAAC"}
|
package/dist/email-8ljcpvwV.d.ts
DELETED
|
@@ -1,157 +0,0 @@
|
|
|
1
|
-
//#region src/email.d.ts
|
|
2
|
-
/**
|
|
3
|
-
* Header object as returned by postal-mime and similar email parsing libraries.
|
|
4
|
-
* Each header has a lowercase key and a string value.
|
|
5
|
-
*/
|
|
6
|
-
type EmailHeader = {
|
|
7
|
-
/** Lowercase header name (e.g., "content-type", "x-custom-header") */ key: string; /** Header value */
|
|
8
|
-
value: string;
|
|
9
|
-
};
|
|
10
|
-
/**
|
|
11
|
-
* Check if an email appears to be an auto-reply based on standard headers.
|
|
12
|
-
* Checks for Auto-Submitted (RFC 3834), X-Auto-Response-Suppress, and Precedence headers.
|
|
13
|
-
*
|
|
14
|
-
* @param headers - Headers array from postal-mime Email.headers or similar format
|
|
15
|
-
* @returns true if email appears to be an auto-reply
|
|
16
|
-
*
|
|
17
|
-
* @example
|
|
18
|
-
* ```typescript
|
|
19
|
-
* if (isAutoReplyEmail(parsed.headers)) {
|
|
20
|
-
* // Skip processing auto-replies
|
|
21
|
-
* return;
|
|
22
|
-
* }
|
|
23
|
-
* ```
|
|
24
|
-
*/
|
|
25
|
-
declare function isAutoReplyEmail(headers: EmailHeader[]): boolean;
|
|
26
|
-
/** Default signature expiration: 30 days in seconds */
|
|
27
|
-
declare const DEFAULT_MAX_AGE_SECONDS: number;
|
|
28
|
-
/**
|
|
29
|
-
* Sign agent routing headers for secure reply flows.
|
|
30
|
-
* Use this when sending outbound emails to ensure replies can be securely routed back.
|
|
31
|
-
*
|
|
32
|
-
* @param secret - Secret key for HMAC signing (store in environment variables)
|
|
33
|
-
* @param agentName - Name of the agent
|
|
34
|
-
* @param agentId - ID of the agent instance
|
|
35
|
-
* @returns Headers object with X-Agent-Name, X-Agent-ID, X-Agent-Sig, and X-Agent-Sig-Ts
|
|
36
|
-
*
|
|
37
|
-
* @example
|
|
38
|
-
* ```typescript
|
|
39
|
-
* const headers = await signAgentHeaders(env.EMAIL_SECRET, "MyAgent", this.name);
|
|
40
|
-
* // Use these headers when sending outbound emails
|
|
41
|
-
* ```
|
|
42
|
-
*/
|
|
43
|
-
declare function signAgentHeaders(
|
|
44
|
-
secret: string,
|
|
45
|
-
agentName: string,
|
|
46
|
-
agentId: string
|
|
47
|
-
): Promise<Record<string, string>>;
|
|
48
|
-
type EmailResolverResult = {
|
|
49
|
-
agentName: string;
|
|
50
|
-
agentId: string; /** @internal Indicates this resolver requires secure reply signing */
|
|
51
|
-
_secureRouted?: boolean;
|
|
52
|
-
} | null;
|
|
53
|
-
type EmailResolver<Env> = (
|
|
54
|
-
email: ForwardableEmailMessage,
|
|
55
|
-
env: Env
|
|
56
|
-
) => Promise<EmailResolverResult>;
|
|
57
|
-
/**
|
|
58
|
-
* Reason for signature verification failure
|
|
59
|
-
*/
|
|
60
|
-
type SignatureFailureReason =
|
|
61
|
-
| "missing_headers"
|
|
62
|
-
| "expired"
|
|
63
|
-
| "invalid"
|
|
64
|
-
| "malformed_timestamp";
|
|
65
|
-
/**
|
|
66
|
-
* Options for createSecureReplyEmailResolver
|
|
67
|
-
*/
|
|
68
|
-
type SecureReplyResolverOptions = {
|
|
69
|
-
/**
|
|
70
|
-
* Maximum age of signature in seconds.
|
|
71
|
-
* Signatures older than this will be rejected.
|
|
72
|
-
* Default: 30 days (2592000 seconds)
|
|
73
|
-
*/
|
|
74
|
-
maxAge?: number;
|
|
75
|
-
/**
|
|
76
|
-
* Callback invoked when signature verification fails.
|
|
77
|
-
* Useful for logging and debugging.
|
|
78
|
-
*/
|
|
79
|
-
onInvalidSignature?: (
|
|
80
|
-
email: ForwardableEmailMessage,
|
|
81
|
-
reason: SignatureFailureReason
|
|
82
|
-
) => void;
|
|
83
|
-
};
|
|
84
|
-
/**
|
|
85
|
-
* @deprecated REMOVED due to security vulnerability (IDOR via spoofed headers).
|
|
86
|
-
* @throws Always throws an error with migration guidance.
|
|
87
|
-
*/
|
|
88
|
-
declare function createHeaderBasedEmailResolver<Env>(): EmailResolver<Env>;
|
|
89
|
-
/**
|
|
90
|
-
* Create a resolver for routing email replies with signature verification.
|
|
91
|
-
* This resolver verifies that replies contain a valid HMAC signature, preventing
|
|
92
|
-
* attackers from routing emails to arbitrary agent instances.
|
|
93
|
-
*
|
|
94
|
-
* @param secret - Secret key for HMAC verification (must match the key used with signAgentHeaders)
|
|
95
|
-
* @param options - Optional configuration for signature verification
|
|
96
|
-
* @returns A function that resolves the agent to route the email to, or null if signature is invalid
|
|
97
|
-
*
|
|
98
|
-
* @example
|
|
99
|
-
* ```typescript
|
|
100
|
-
* // In your email handler
|
|
101
|
-
* const secureResolver = createSecureReplyEmailResolver(env.EMAIL_SECRET, {
|
|
102
|
-
* maxAge: 7 * 24 * 60 * 60, // 7 days
|
|
103
|
-
* onInvalidSignature: (email, reason) => {
|
|
104
|
-
* console.warn(`Invalid signature from ${email.from}: ${reason}`);
|
|
105
|
-
* }
|
|
106
|
-
* });
|
|
107
|
-
* const addressResolver = createAddressBasedEmailResolver("MyAgent");
|
|
108
|
-
*
|
|
109
|
-
* await routeAgentEmail(email, env, {
|
|
110
|
-
* resolver: async (email, env) => {
|
|
111
|
-
* // Try secure reply routing first
|
|
112
|
-
* const replyRouting = await secureResolver(email, env);
|
|
113
|
-
* if (replyRouting) return replyRouting;
|
|
114
|
-
* // Fall back to address-based routing
|
|
115
|
-
* return addressResolver(email, env);
|
|
116
|
-
* }
|
|
117
|
-
* });
|
|
118
|
-
* ```
|
|
119
|
-
*/
|
|
120
|
-
declare function createSecureReplyEmailResolver<Env>(
|
|
121
|
-
secret: string,
|
|
122
|
-
options?: SecureReplyResolverOptions
|
|
123
|
-
): EmailResolver<Env>;
|
|
124
|
-
/**
|
|
125
|
-
* Create a resolver that uses the email address to determine the agent to route the email to
|
|
126
|
-
* @param defaultAgentName The default agent name to use if the email address does not contain a sub-address
|
|
127
|
-
* @returns A function that resolves the agent to route the email to
|
|
128
|
-
*/
|
|
129
|
-
declare function createAddressBasedEmailResolver<Env>(
|
|
130
|
-
defaultAgentName: string
|
|
131
|
-
): EmailResolver<Env>;
|
|
132
|
-
/**
|
|
133
|
-
* Create a resolver that uses the agentName and agentId to determine the agent to route the email to
|
|
134
|
-
* @param agentName The name of the agent to route the email to
|
|
135
|
-
* @param agentId The id of the agent to route the email to
|
|
136
|
-
* @returns A function that resolves the agent to route the email to
|
|
137
|
-
*/
|
|
138
|
-
declare function createCatchAllEmailResolver<Env>(
|
|
139
|
-
agentName: string,
|
|
140
|
-
agentId: string
|
|
141
|
-
): EmailResolver<Env>;
|
|
142
|
-
//#endregion
|
|
143
|
-
export {
|
|
144
|
-
SecureReplyResolverOptions as a,
|
|
145
|
-
createCatchAllEmailResolver as c,
|
|
146
|
-
isAutoReplyEmail as d,
|
|
147
|
-
signAgentHeaders as f,
|
|
148
|
-
EmailResolverResult as i,
|
|
149
|
-
createHeaderBasedEmailResolver as l,
|
|
150
|
-
EmailHeader as n,
|
|
151
|
-
SignatureFailureReason as o,
|
|
152
|
-
EmailResolver as r,
|
|
153
|
-
createAddressBasedEmailResolver as s,
|
|
154
|
-
DEFAULT_MAX_AGE_SECONDS as t,
|
|
155
|
-
createSecureReplyEmailResolver as u
|
|
156
|
-
};
|
|
157
|
-
//# sourceMappingURL=email-8ljcpvwV.d.ts.map
|
package/dist/email-XHsSYsTO.js
DELETED
|
@@ -1,223 +0,0 @@
|
|
|
1
|
-
//#region src/email.ts
|
|
2
|
-
/**
|
|
3
|
-
* Check if an email appears to be an auto-reply based on standard headers.
|
|
4
|
-
* Checks for Auto-Submitted (RFC 3834), X-Auto-Response-Suppress, and Precedence headers.
|
|
5
|
-
*
|
|
6
|
-
* @param headers - Headers array from postal-mime Email.headers or similar format
|
|
7
|
-
* @returns true if email appears to be an auto-reply
|
|
8
|
-
*
|
|
9
|
-
* @example
|
|
10
|
-
* ```typescript
|
|
11
|
-
* if (isAutoReplyEmail(parsed.headers)) {
|
|
12
|
-
* // Skip processing auto-replies
|
|
13
|
-
* return;
|
|
14
|
-
* }
|
|
15
|
-
* ```
|
|
16
|
-
*/
|
|
17
|
-
function isAutoReplyEmail(headers) {
|
|
18
|
-
return headers.some((h) => {
|
|
19
|
-
const key = h.key.toLowerCase();
|
|
20
|
-
const value = h.value.toLowerCase();
|
|
21
|
-
if (key === "auto-submitted") return value !== "no";
|
|
22
|
-
if (key === "x-auto-response-suppress") return true;
|
|
23
|
-
if (key === "precedence") return value === "bulk" || value === "junk" || value === "list";
|
|
24
|
-
return false;
|
|
25
|
-
});
|
|
26
|
-
}
|
|
27
|
-
/** Default signature expiration: 30 days in seconds */
|
|
28
|
-
const DEFAULT_MAX_AGE_SECONDS = 720 * 60 * 60;
|
|
29
|
-
/** Maximum allowed clock skew for future timestamps: 5 minutes */
|
|
30
|
-
const MAX_CLOCK_SKEW_SECONDS = 300;
|
|
31
|
-
/**
|
|
32
|
-
* Compute HMAC-SHA256 signature for agent routing headers
|
|
33
|
-
* @param secret - Secret key for HMAC
|
|
34
|
-
* @param agentName - Name of the agent
|
|
35
|
-
* @param agentId - ID of the agent instance
|
|
36
|
-
* @param timestamp - Unix timestamp in seconds
|
|
37
|
-
* @returns Base64-encoded HMAC signature
|
|
38
|
-
*/
|
|
39
|
-
async function computeAgentSignature(secret, agentName, agentId, timestamp) {
|
|
40
|
-
const encoder = new TextEncoder();
|
|
41
|
-
const key = await crypto.subtle.importKey("raw", encoder.encode(secret), {
|
|
42
|
-
name: "HMAC",
|
|
43
|
-
hash: "SHA-256"
|
|
44
|
-
}, false, ["sign"]);
|
|
45
|
-
const data = encoder.encode(`${agentName}:${agentId}:${timestamp}`);
|
|
46
|
-
const signature = await crypto.subtle.sign("HMAC", key, data);
|
|
47
|
-
return btoa(String.fromCharCode(...new Uint8Array(signature)));
|
|
48
|
-
}
|
|
49
|
-
/**
|
|
50
|
-
* Verify HMAC-SHA256 signature for agent routing headers
|
|
51
|
-
* @param secret - Secret key for HMAC
|
|
52
|
-
* @param agentName - Name of the agent
|
|
53
|
-
* @param agentId - ID of the agent instance
|
|
54
|
-
* @param signature - Base64-encoded signature to verify
|
|
55
|
-
* @param timestamp - Unix timestamp in seconds when signature was created
|
|
56
|
-
* @param maxAgeSeconds - Maximum age of signature in seconds (default: 30 days)
|
|
57
|
-
* @returns Verification result with reason if invalid
|
|
58
|
-
*/
|
|
59
|
-
async function verifyAgentSignature(secret, agentName, agentId, signature, timestamp, maxAgeSeconds = DEFAULT_MAX_AGE_SECONDS) {
|
|
60
|
-
try {
|
|
61
|
-
const timestampNum = Number.parseInt(timestamp, 10);
|
|
62
|
-
if (Number.isNaN(timestampNum)) return {
|
|
63
|
-
valid: false,
|
|
64
|
-
reason: "malformed_timestamp"
|
|
65
|
-
};
|
|
66
|
-
const now = Math.floor(Date.now() / 1e3);
|
|
67
|
-
if (timestampNum > now + MAX_CLOCK_SKEW_SECONDS) return {
|
|
68
|
-
valid: false,
|
|
69
|
-
reason: "invalid"
|
|
70
|
-
};
|
|
71
|
-
if (now - timestampNum > maxAgeSeconds) return {
|
|
72
|
-
valid: false,
|
|
73
|
-
reason: "expired"
|
|
74
|
-
};
|
|
75
|
-
const expected = await computeAgentSignature(secret, agentName, agentId, timestamp);
|
|
76
|
-
if (expected.length !== signature.length) return {
|
|
77
|
-
valid: false,
|
|
78
|
-
reason: "invalid"
|
|
79
|
-
};
|
|
80
|
-
let result = 0;
|
|
81
|
-
for (let i = 0; i < expected.length; i++) result |= expected.charCodeAt(i) ^ signature.charCodeAt(i);
|
|
82
|
-
if (result !== 0) return {
|
|
83
|
-
valid: false,
|
|
84
|
-
reason: "invalid"
|
|
85
|
-
};
|
|
86
|
-
return { valid: true };
|
|
87
|
-
} catch (error) {
|
|
88
|
-
console.warn("[agents] Signature verification error:", error);
|
|
89
|
-
return {
|
|
90
|
-
valid: false,
|
|
91
|
-
reason: "invalid"
|
|
92
|
-
};
|
|
93
|
-
}
|
|
94
|
-
}
|
|
95
|
-
/**
|
|
96
|
-
* Sign agent routing headers for secure reply flows.
|
|
97
|
-
* Use this when sending outbound emails to ensure replies can be securely routed back.
|
|
98
|
-
*
|
|
99
|
-
* @param secret - Secret key for HMAC signing (store in environment variables)
|
|
100
|
-
* @param agentName - Name of the agent
|
|
101
|
-
* @param agentId - ID of the agent instance
|
|
102
|
-
* @returns Headers object with X-Agent-Name, X-Agent-ID, X-Agent-Sig, and X-Agent-Sig-Ts
|
|
103
|
-
*
|
|
104
|
-
* @example
|
|
105
|
-
* ```typescript
|
|
106
|
-
* const headers = await signAgentHeaders(env.EMAIL_SECRET, "MyAgent", this.name);
|
|
107
|
-
* // Use these headers when sending outbound emails
|
|
108
|
-
* ```
|
|
109
|
-
*/
|
|
110
|
-
async function signAgentHeaders(secret, agentName, agentId) {
|
|
111
|
-
if (!secret) throw new Error("secret is required for signing agent headers");
|
|
112
|
-
if (!agentName) throw new Error("agentName is required for signing agent headers");
|
|
113
|
-
if (!agentId) throw new Error("agentId is required for signing agent headers");
|
|
114
|
-
if (agentName.includes(":")) throw new Error("agentName cannot contain colons");
|
|
115
|
-
if (agentId.includes(":")) throw new Error("agentId cannot contain colons");
|
|
116
|
-
const timestamp = Math.floor(Date.now() / 1e3).toString();
|
|
117
|
-
const signature = await computeAgentSignature(secret, agentName, agentId, timestamp);
|
|
118
|
-
return {
|
|
119
|
-
"X-Agent-Name": agentName,
|
|
120
|
-
"X-Agent-ID": agentId,
|
|
121
|
-
"X-Agent-Sig": signature,
|
|
122
|
-
"X-Agent-Sig-Ts": timestamp
|
|
123
|
-
};
|
|
124
|
-
}
|
|
125
|
-
/**
|
|
126
|
-
* @deprecated REMOVED due to security vulnerability (IDOR via spoofed headers).
|
|
127
|
-
* @throws Always throws an error with migration guidance.
|
|
128
|
-
*/
|
|
129
|
-
function createHeaderBasedEmailResolver() {
|
|
130
|
-
throw new Error("createHeaderBasedEmailResolver has been removed due to a security vulnerability. It trusted attacker-controlled email headers for routing, enabling IDOR attacks.\n\nMigration options:\n - For inbound mail: use createAddressBasedEmailResolver(agentName)\n - For reply flows: use createSecureReplyEmailResolver(secret) with signed headers\n\nSee https://github.com/cloudflare/agents/blob/main/docs/email.md for details.");
|
|
131
|
-
}
|
|
132
|
-
/**
|
|
133
|
-
* Create a resolver for routing email replies with signature verification.
|
|
134
|
-
* This resolver verifies that replies contain a valid HMAC signature, preventing
|
|
135
|
-
* attackers from routing emails to arbitrary agent instances.
|
|
136
|
-
*
|
|
137
|
-
* @param secret - Secret key for HMAC verification (must match the key used with signAgentHeaders)
|
|
138
|
-
* @param options - Optional configuration for signature verification
|
|
139
|
-
* @returns A function that resolves the agent to route the email to, or null if signature is invalid
|
|
140
|
-
*
|
|
141
|
-
* @example
|
|
142
|
-
* ```typescript
|
|
143
|
-
* // In your email handler
|
|
144
|
-
* const secureResolver = createSecureReplyEmailResolver(env.EMAIL_SECRET, {
|
|
145
|
-
* maxAge: 7 * 24 * 60 * 60, // 7 days
|
|
146
|
-
* onInvalidSignature: (email, reason) => {
|
|
147
|
-
* console.warn(`Invalid signature from ${email.from}: ${reason}`);
|
|
148
|
-
* }
|
|
149
|
-
* });
|
|
150
|
-
* const addressResolver = createAddressBasedEmailResolver("MyAgent");
|
|
151
|
-
*
|
|
152
|
-
* await routeAgentEmail(email, env, {
|
|
153
|
-
* resolver: async (email, env) => {
|
|
154
|
-
* // Try secure reply routing first
|
|
155
|
-
* const replyRouting = await secureResolver(email, env);
|
|
156
|
-
* if (replyRouting) return replyRouting;
|
|
157
|
-
* // Fall back to address-based routing
|
|
158
|
-
* return addressResolver(email, env);
|
|
159
|
-
* }
|
|
160
|
-
* });
|
|
161
|
-
* ```
|
|
162
|
-
*/
|
|
163
|
-
function createSecureReplyEmailResolver(secret, options) {
|
|
164
|
-
if (!secret) throw new Error("secret is required for createSecureReplyEmailResolver");
|
|
165
|
-
const maxAge = options?.maxAge ?? DEFAULT_MAX_AGE_SECONDS;
|
|
166
|
-
const onInvalidSignature = options?.onInvalidSignature;
|
|
167
|
-
return async (email, _env) => {
|
|
168
|
-
const agentName = email.headers.get("x-agent-name");
|
|
169
|
-
const agentId = email.headers.get("x-agent-id");
|
|
170
|
-
const signature = email.headers.get("x-agent-sig");
|
|
171
|
-
const timestamp = email.headers.get("x-agent-sig-ts");
|
|
172
|
-
if (!agentName || !agentId || !signature || !timestamp) {
|
|
173
|
-
onInvalidSignature?.(email, "missing_headers");
|
|
174
|
-
return null;
|
|
175
|
-
}
|
|
176
|
-
const result = await verifyAgentSignature(secret, agentName, agentId, signature, timestamp, maxAge);
|
|
177
|
-
if (!result.valid) {
|
|
178
|
-
onInvalidSignature?.(email, result.reason);
|
|
179
|
-
return null;
|
|
180
|
-
}
|
|
181
|
-
return {
|
|
182
|
-
agentName,
|
|
183
|
-
agentId,
|
|
184
|
-
_secureRouted: true
|
|
185
|
-
};
|
|
186
|
-
};
|
|
187
|
-
}
|
|
188
|
-
/**
|
|
189
|
-
* Create a resolver that uses the email address to determine the agent to route the email to
|
|
190
|
-
* @param defaultAgentName The default agent name to use if the email address does not contain a sub-address
|
|
191
|
-
* @returns A function that resolves the agent to route the email to
|
|
192
|
-
*/
|
|
193
|
-
function createAddressBasedEmailResolver(defaultAgentName) {
|
|
194
|
-
return async (email, _env) => {
|
|
195
|
-
const emailMatch = email.to.match(/^([^+@]{1,64})(?:\+([^@]{1,64}))?@(.{1,253})$/);
|
|
196
|
-
if (!emailMatch) return null;
|
|
197
|
-
const [, localPart, subAddress] = emailMatch;
|
|
198
|
-
if (subAddress) return {
|
|
199
|
-
agentName: localPart,
|
|
200
|
-
agentId: subAddress
|
|
201
|
-
};
|
|
202
|
-
return {
|
|
203
|
-
agentName: defaultAgentName,
|
|
204
|
-
agentId: localPart
|
|
205
|
-
};
|
|
206
|
-
};
|
|
207
|
-
}
|
|
208
|
-
/**
|
|
209
|
-
* Create a resolver that uses the agentName and agentId to determine the agent to route the email to
|
|
210
|
-
* @param agentName The name of the agent to route the email to
|
|
211
|
-
* @param agentId The id of the agent to route the email to
|
|
212
|
-
* @returns A function that resolves the agent to route the email to
|
|
213
|
-
*/
|
|
214
|
-
function createCatchAllEmailResolver(agentName, agentId) {
|
|
215
|
-
return async () => ({
|
|
216
|
-
agentName,
|
|
217
|
-
agentId
|
|
218
|
-
});
|
|
219
|
-
}
|
|
220
|
-
|
|
221
|
-
//#endregion
|
|
222
|
-
export { createSecureReplyEmailResolver as a, createHeaderBasedEmailResolver as i, createAddressBasedEmailResolver as n, isAutoReplyEmail as o, createCatchAllEmailResolver as r, signAgentHeaders as s, DEFAULT_MAX_AGE_SECONDS as t };
|
|
223
|
-
//# sourceMappingURL=email-XHsSYsTO.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"email-XHsSYsTO.js","names":[],"sources":["../src/email.ts"],"sourcesContent":["/**\n * Email routing types, resolvers, and signing utilities for Agents\n */\n\n// Re-export AgentEmail type\nexport type { AgentEmail } from \"./internal_context\";\n\n// ============================================================================\n// Email header utilities\n// ============================================================================\n\n/**\n * Header object as returned by postal-mime and similar email parsing libraries.\n * Each header has a lowercase key and a string value.\n */\nexport type EmailHeader = {\n /** Lowercase header name (e.g., \"content-type\", \"x-custom-header\") */\n key: string;\n /** Header value */\n value: string;\n};\n\n/**\n * Check if an email appears to be an auto-reply based on standard headers.\n * Checks for Auto-Submitted (RFC 3834), X-Auto-Response-Suppress, and Precedence headers.\n *\n * @param headers - Headers array from postal-mime Email.headers or similar format\n * @returns true if email appears to be an auto-reply\n *\n * @example\n * ```typescript\n * if (isAutoReplyEmail(parsed.headers)) {\n * // Skip processing auto-replies\n * return;\n * }\n * ```\n */\nexport function isAutoReplyEmail(headers: EmailHeader[]): boolean {\n return headers.some((h) => {\n const key = h.key.toLowerCase();\n const value = h.value.toLowerCase();\n\n // RFC 3834: Auto-Submitted header\n // \"no\" means normal (human-sent) email, anything else indicates auto-reply\n if (key === \"auto-submitted\") {\n return value !== \"no\";\n }\n\n // X-Auto-Response-Suppress: any value indicates sender doesn't want auto-replies\n if (key === \"x-auto-response-suppress\") {\n return true;\n }\n\n // Precedence: only bulk/junk/list indicate automated/mass mail\n if (key === \"precedence\") {\n return value === \"bulk\" || value === \"junk\" || value === \"list\";\n }\n\n return false;\n });\n}\n\n// ============================================================================\n// Signing utilities\n// ============================================================================\n\n/** Default signature expiration: 30 days in seconds */\nexport const DEFAULT_MAX_AGE_SECONDS = 30 * 24 * 60 * 60;\n\n/** Maximum allowed clock skew for future timestamps: 5 minutes */\nconst MAX_CLOCK_SKEW_SECONDS = 5 * 60;\n\n/**\n * Compute HMAC-SHA256 signature for agent routing headers\n * @param secret - Secret key for HMAC\n * @param agentName - Name of the agent\n * @param agentId - ID of the agent instance\n * @param timestamp - Unix timestamp in seconds\n * @returns Base64-encoded HMAC signature\n */\nasync function computeAgentSignature(\n secret: string,\n agentName: string,\n agentId: string,\n timestamp: string\n): Promise<string> {\n const encoder = new TextEncoder();\n const key = await crypto.subtle.importKey(\n \"raw\",\n encoder.encode(secret),\n { name: \"HMAC\", hash: \"SHA-256\" },\n false,\n [\"sign\"]\n );\n const data = encoder.encode(`${agentName}:${agentId}:${timestamp}`);\n const signature = await crypto.subtle.sign(\"HMAC\", key, data);\n return btoa(String.fromCharCode(...new Uint8Array(signature)));\n}\n\n/**\n * Result of signature verification\n */\ntype SignatureVerificationResult =\n | { valid: true }\n | { valid: false; reason: \"expired\" | \"invalid\" | \"malformed_timestamp\" };\n\n/**\n * Verify HMAC-SHA256 signature for agent routing headers\n * @param secret - Secret key for HMAC\n * @param agentName - Name of the agent\n * @param agentId - ID of the agent instance\n * @param signature - Base64-encoded signature to verify\n * @param timestamp - Unix timestamp in seconds when signature was created\n * @param maxAgeSeconds - Maximum age of signature in seconds (default: 30 days)\n * @returns Verification result with reason if invalid\n */\nasync function verifyAgentSignature(\n secret: string,\n agentName: string,\n agentId: string,\n signature: string,\n timestamp: string,\n maxAgeSeconds: number = DEFAULT_MAX_AGE_SECONDS\n): Promise<SignatureVerificationResult> {\n try {\n // Validate timestamp format\n const timestampNum = Number.parseInt(timestamp, 10);\n if (Number.isNaN(timestampNum)) {\n return { valid: false, reason: \"malformed_timestamp\" };\n }\n\n // Check timestamp validity\n const now = Math.floor(Date.now() / 1000);\n\n // Reject timestamps too far in the future (prevents extending signature validity)\n if (timestampNum > now + MAX_CLOCK_SKEW_SECONDS) {\n return { valid: false, reason: \"invalid\" };\n }\n\n // Check if signature has expired\n if (now - timestampNum > maxAgeSeconds) {\n return { valid: false, reason: \"expired\" };\n }\n\n const expected = await computeAgentSignature(\n secret,\n agentName,\n agentId,\n timestamp\n );\n // Constant-time comparison to prevent timing attacks\n if (expected.length !== signature.length) {\n return { valid: false, reason: \"invalid\" };\n }\n let result = 0;\n for (let i = 0; i < expected.length; i++) {\n result |= expected.charCodeAt(i) ^ signature.charCodeAt(i);\n }\n if (result !== 0) {\n return { valid: false, reason: \"invalid\" };\n }\n return { valid: true };\n } catch (error) {\n console.warn(\"[agents] Signature verification error:\", error);\n return { valid: false, reason: \"invalid\" };\n }\n}\n\n/**\n * Sign agent routing headers for secure reply flows.\n * Use this when sending outbound emails to ensure replies can be securely routed back.\n *\n * @param secret - Secret key for HMAC signing (store in environment variables)\n * @param agentName - Name of the agent\n * @param agentId - ID of the agent instance\n * @returns Headers object with X-Agent-Name, X-Agent-ID, X-Agent-Sig, and X-Agent-Sig-Ts\n *\n * @example\n * ```typescript\n * const headers = await signAgentHeaders(env.EMAIL_SECRET, \"MyAgent\", this.name);\n * // Use these headers when sending outbound emails\n * ```\n */\nexport async function signAgentHeaders(\n secret: string,\n agentName: string,\n agentId: string\n): Promise<Record<string, string>> {\n if (!secret) {\n throw new Error(\"secret is required for signing agent headers\");\n }\n if (!agentName) {\n throw new Error(\"agentName is required for signing agent headers\");\n }\n if (!agentId) {\n throw new Error(\"agentId is required for signing agent headers\");\n }\n // Reject colons to prevent signature confusion attacks\n // (signature payload uses colon as delimiter: \"agentName:agentId:timestamp\")\n if (agentName.includes(\":\")) {\n throw new Error(\"agentName cannot contain colons\");\n }\n if (agentId.includes(\":\")) {\n throw new Error(\"agentId cannot contain colons\");\n }\n\n const timestamp = Math.floor(Date.now() / 1000).toString();\n const signature = await computeAgentSignature(\n secret,\n agentName,\n agentId,\n timestamp\n );\n return {\n \"X-Agent-Name\": agentName,\n \"X-Agent-ID\": agentId,\n \"X-Agent-Sig\": signature,\n \"X-Agent-Sig-Ts\": timestamp\n };\n}\n\n// ============================================================================\n// Email routing types and resolvers\n// ============================================================================\n\nexport type EmailResolverResult = {\n agentName: string;\n agentId: string;\n /** @internal Indicates this resolver requires secure reply signing */\n _secureRouted?: boolean;\n} | null;\n\nexport type EmailResolver<Env> = (\n email: ForwardableEmailMessage,\n env: Env\n) => Promise<EmailResolverResult>;\n\n/**\n * Reason for signature verification failure\n */\nexport type SignatureFailureReason =\n | \"missing_headers\"\n | \"expired\"\n | \"invalid\"\n | \"malformed_timestamp\";\n\n/**\n * Options for createSecureReplyEmailResolver\n */\nexport type SecureReplyResolverOptions = {\n /**\n * Maximum age of signature in seconds.\n * Signatures older than this will be rejected.\n * Default: 30 days (2592000 seconds)\n */\n maxAge?: number;\n /**\n * Callback invoked when signature verification fails.\n * Useful for logging and debugging.\n */\n onInvalidSignature?: (\n email: ForwardableEmailMessage,\n reason: SignatureFailureReason\n ) => void;\n};\n\n/**\n * @deprecated REMOVED due to security vulnerability (IDOR via spoofed headers).\n * @throws Always throws an error with migration guidance.\n */\nexport function createHeaderBasedEmailResolver<Env>(): EmailResolver<Env> {\n throw new Error(\n \"createHeaderBasedEmailResolver has been removed due to a security vulnerability. \" +\n \"It trusted attacker-controlled email headers for routing, enabling IDOR attacks.\\n\\n\" +\n \"Migration options:\\n\" +\n \" - For inbound mail: use createAddressBasedEmailResolver(agentName)\\n\" +\n \" - For reply flows: use createSecureReplyEmailResolver(secret) with signed headers\\n\\n\" +\n \"See https://github.com/cloudflare/agents/blob/main/docs/email.md for details.\"\n );\n}\n\n/**\n * Create a resolver for routing email replies with signature verification.\n * This resolver verifies that replies contain a valid HMAC signature, preventing\n * attackers from routing emails to arbitrary agent instances.\n *\n * @param secret - Secret key for HMAC verification (must match the key used with signAgentHeaders)\n * @param options - Optional configuration for signature verification\n * @returns A function that resolves the agent to route the email to, or null if signature is invalid\n *\n * @example\n * ```typescript\n * // In your email handler\n * const secureResolver = createSecureReplyEmailResolver(env.EMAIL_SECRET, {\n * maxAge: 7 * 24 * 60 * 60, // 7 days\n * onInvalidSignature: (email, reason) => {\n * console.warn(`Invalid signature from ${email.from}: ${reason}`);\n * }\n * });\n * const addressResolver = createAddressBasedEmailResolver(\"MyAgent\");\n *\n * await routeAgentEmail(email, env, {\n * resolver: async (email, env) => {\n * // Try secure reply routing first\n * const replyRouting = await secureResolver(email, env);\n * if (replyRouting) return replyRouting;\n * // Fall back to address-based routing\n * return addressResolver(email, env);\n * }\n * });\n * ```\n */\nexport function createSecureReplyEmailResolver<Env>(\n secret: string,\n options?: SecureReplyResolverOptions\n): EmailResolver<Env> {\n if (!secret) {\n throw new Error(\"secret is required for createSecureReplyEmailResolver\");\n }\n\n const maxAge = options?.maxAge ?? DEFAULT_MAX_AGE_SECONDS;\n const onInvalidSignature = options?.onInvalidSignature;\n\n return async (email: ForwardableEmailMessage, _env: Env) => {\n const agentName = email.headers.get(\"x-agent-name\");\n const agentId = email.headers.get(\"x-agent-id\");\n const signature = email.headers.get(\"x-agent-sig\");\n const timestamp = email.headers.get(\"x-agent-sig-ts\");\n\n if (!agentName || !agentId || !signature || !timestamp) {\n onInvalidSignature?.(email, \"missing_headers\");\n return null;\n }\n\n const result = await verifyAgentSignature(\n secret,\n agentName,\n agentId,\n signature,\n timestamp,\n maxAge\n );\n\n if (!result.valid) {\n onInvalidSignature?.(email, result.reason);\n return null;\n }\n\n return { agentName, agentId, _secureRouted: true };\n };\n}\n\n/**\n * Create a resolver that uses the email address to determine the agent to route the email to\n * @param defaultAgentName The default agent name to use if the email address does not contain a sub-address\n * @returns A function that resolves the agent to route the email to\n */\nexport function createAddressBasedEmailResolver<Env>(\n defaultAgentName: string\n): EmailResolver<Env> {\n return async (email: ForwardableEmailMessage, _env: Env) => {\n // Length limits per RFC 5321: local part max 64 chars, domain max 253 chars\n const emailMatch = email.to.match(\n /^([^+@]{1,64})(?:\\+([^@]{1,64}))?@(.{1,253})$/\n );\n if (!emailMatch) {\n return null;\n }\n\n const [, localPart, subAddress] = emailMatch;\n\n if (subAddress) {\n return {\n agentName: localPart,\n agentId: subAddress\n };\n }\n\n // Option 2: Use defaultAgentName namespace, localPart as agentId\n // Common for catch-all email routing to a single EmailAgent namespace\n return {\n agentName: defaultAgentName,\n agentId: localPart\n };\n };\n}\n\n/**\n * Create a resolver that uses the agentName and agentId to determine the agent to route the email to\n * @param agentName The name of the agent to route the email to\n * @param agentId The id of the agent to route the email to\n * @returns A function that resolves the agent to route the email to\n */\nexport function createCatchAllEmailResolver<Env>(\n agentName: string,\n agentId: string\n): EmailResolver<Env> {\n return async () => ({ agentName, agentId });\n}\n"],"mappings":";;;;;;;;;;;;;;;;AAqCA,SAAgB,iBAAiB,SAAiC;AAChE,QAAO,QAAQ,MAAM,MAAM;EACzB,MAAM,MAAM,EAAE,IAAI,aAAa;EAC/B,MAAM,QAAQ,EAAE,MAAM,aAAa;AAInC,MAAI,QAAQ,iBACV,QAAO,UAAU;AAInB,MAAI,QAAQ,2BACV,QAAO;AAIT,MAAI,QAAQ,aACV,QAAO,UAAU,UAAU,UAAU,UAAU,UAAU;AAG3D,SAAO;GACP;;;AAQJ,MAAa,0BAA0B,MAAU,KAAK;;AAGtD,MAAM,yBAAyB;;;;;;;;;AAU/B,eAAe,sBACb,QACA,WACA,SACA,WACiB;CACjB,MAAM,UAAU,IAAI,aAAa;CACjC,MAAM,MAAM,MAAM,OAAO,OAAO,UAC9B,OACA,QAAQ,OAAO,OAAO,EACtB;EAAE,MAAM;EAAQ,MAAM;EAAW,EACjC,OACA,CAAC,OAAO,CACT;CACD,MAAM,OAAO,QAAQ,OAAO,GAAG,UAAU,GAAG,QAAQ,GAAG,YAAY;CACnE,MAAM,YAAY,MAAM,OAAO,OAAO,KAAK,QAAQ,KAAK,KAAK;AAC7D,QAAO,KAAK,OAAO,aAAa,GAAG,IAAI,WAAW,UAAU,CAAC,CAAC;;;;;;;;;;;;AAoBhE,eAAe,qBACb,QACA,WACA,SACA,WACA,WACA,gBAAwB,yBACc;AACtC,KAAI;EAEF,MAAM,eAAe,OAAO,SAAS,WAAW,GAAG;AACnD,MAAI,OAAO,MAAM,aAAa,CAC5B,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAuB;EAIxD,MAAM,MAAM,KAAK,MAAM,KAAK,KAAK,GAAG,IAAK;AAGzC,MAAI,eAAe,MAAM,uBACvB,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;AAI5C,MAAI,MAAM,eAAe,cACvB,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;EAG5C,MAAM,WAAW,MAAM,sBACrB,QACA,WACA,SACA,UACD;AAED,MAAI,SAAS,WAAW,UAAU,OAChC,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;EAE5C,IAAI,SAAS;AACb,OAAK,IAAI,IAAI,GAAG,IAAI,SAAS,QAAQ,IACnC,WAAU,SAAS,WAAW,EAAE,GAAG,UAAU,WAAW,EAAE;AAE5D,MAAI,WAAW,EACb,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;AAE5C,SAAO,EAAE,OAAO,MAAM;UACf,OAAO;AACd,UAAQ,KAAK,0CAA0C,MAAM;AAC7D,SAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;;;;;;;;;;;;;;;;;;AAmB9C,eAAsB,iBACpB,QACA,WACA,SACiC;AACjC,KAAI,CAAC,OACH,OAAM,IAAI,MAAM,+CAA+C;AAEjE,KAAI,CAAC,UACH,OAAM,IAAI,MAAM,kDAAkD;AAEpE,KAAI,CAAC,QACH,OAAM,IAAI,MAAM,gDAAgD;AAIlE,KAAI,UAAU,SAAS,IAAI,CACzB,OAAM,IAAI,MAAM,kCAAkC;AAEpD,KAAI,QAAQ,SAAS,IAAI,CACvB,OAAM,IAAI,MAAM,gCAAgC;CAGlD,MAAM,YAAY,KAAK,MAAM,KAAK,KAAK,GAAG,IAAK,CAAC,UAAU;CAC1D,MAAM,YAAY,MAAM,sBACtB,QACA,WACA,SACA,UACD;AACD,QAAO;EACL,gBAAgB;EAChB,cAAc;EACd,eAAe;EACf,kBAAkB;EACnB;;;;;;AAoDH,SAAgB,iCAA0D;AACxE,OAAM,IAAI,MACR,saAMD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAkCH,SAAgB,+BACd,QACA,SACoB;AACpB,KAAI,CAAC,OACH,OAAM,IAAI,MAAM,wDAAwD;CAG1E,MAAM,SAAS,SAAS,UAAU;CAClC,MAAM,qBAAqB,SAAS;AAEpC,QAAO,OAAO,OAAgC,SAAc;EAC1D,MAAM,YAAY,MAAM,QAAQ,IAAI,eAAe;EACnD,MAAM,UAAU,MAAM,QAAQ,IAAI,aAAa;EAC/C,MAAM,YAAY,MAAM,QAAQ,IAAI,cAAc;EAClD,MAAM,YAAY,MAAM,QAAQ,IAAI,iBAAiB;AAErD,MAAI,CAAC,aAAa,CAAC,WAAW,CAAC,aAAa,CAAC,WAAW;AACtD,wBAAqB,OAAO,kBAAkB;AAC9C,UAAO;;EAGT,MAAM,SAAS,MAAM,qBACnB,QACA,WACA,SACA,WACA,WACA,OACD;AAED,MAAI,CAAC,OAAO,OAAO;AACjB,wBAAqB,OAAO,OAAO,OAAO;AAC1C,UAAO;;AAGT,SAAO;GAAE;GAAW;GAAS,eAAe;GAAM;;;;;;;;AAStD,SAAgB,gCACd,kBACoB;AACpB,QAAO,OAAO,OAAgC,SAAc;EAE1D,MAAM,aAAa,MAAM,GAAG,MAC1B,gDACD;AACD,MAAI,CAAC,WACH,QAAO;EAGT,MAAM,GAAG,WAAW,cAAc;AAElC,MAAI,WACF,QAAO;GACL,WAAW;GACX,SAAS;GACV;AAKH,SAAO;GACL,WAAW;GACX,SAAS;GACV;;;;;;;;;AAUL,SAAgB,4BACd,WACA,SACoB;AACpB,QAAO,aAAa;EAAE;EAAW;EAAS"}
|