claude-wec 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +675 -0
- package/README.md +371 -0
- package/dist/api-docs.html +879 -0
- package/dist/assets/KaTeX_AMS-Regular-BQhdFMY1.woff2 +0 -0
- package/dist/assets/KaTeX_AMS-Regular-DMm9YOAa.woff +0 -0
- package/dist/assets/KaTeX_AMS-Regular-DRggAlZN.ttf +0 -0
- package/dist/assets/KaTeX_Caligraphic-Bold-ATXxdsX0.ttf +0 -0
- package/dist/assets/KaTeX_Caligraphic-Bold-BEiXGLvX.woff +0 -0
- package/dist/assets/KaTeX_Caligraphic-Bold-Dq_IR9rO.woff2 +0 -0
- package/dist/assets/KaTeX_Caligraphic-Regular-CTRA-rTL.woff +0 -0
- package/dist/assets/KaTeX_Caligraphic-Regular-Di6jR-x-.woff2 +0 -0
- package/dist/assets/KaTeX_Caligraphic-Regular-wX97UBjC.ttf +0 -0
- package/dist/assets/KaTeX_Fraktur-Bold-BdnERNNW.ttf +0 -0
- package/dist/assets/KaTeX_Fraktur-Bold-BsDP51OF.woff +0 -0
- package/dist/assets/KaTeX_Fraktur-Bold-CL6g_b3V.woff2 +0 -0
- package/dist/assets/KaTeX_Fraktur-Regular-CB_wures.ttf +0 -0
- package/dist/assets/KaTeX_Fraktur-Regular-CTYiF6lA.woff2 +0 -0
- package/dist/assets/KaTeX_Fraktur-Regular-Dxdc4cR9.woff +0 -0
- package/dist/assets/KaTeX_Main-Bold-Cx986IdX.woff2 +0 -0
- package/dist/assets/KaTeX_Main-Bold-Jm3AIy58.woff +0 -0
- package/dist/assets/KaTeX_Main-Bold-waoOVXN0.ttf +0 -0
- package/dist/assets/KaTeX_Main-BoldItalic-DxDJ3AOS.woff2 +0 -0
- package/dist/assets/KaTeX_Main-BoldItalic-DzxPMmG6.ttf +0 -0
- package/dist/assets/KaTeX_Main-BoldItalic-SpSLRI95.woff +0 -0
- package/dist/assets/KaTeX_Main-Italic-3WenGoN9.ttf +0 -0
- package/dist/assets/KaTeX_Main-Italic-BMLOBm91.woff +0 -0
- package/dist/assets/KaTeX_Main-Italic-NWA7e6Wa.woff2 +0 -0
- package/dist/assets/KaTeX_Main-Regular-B22Nviop.woff2 +0 -0
- package/dist/assets/KaTeX_Main-Regular-Dr94JaBh.woff +0 -0
- package/dist/assets/KaTeX_Main-Regular-ypZvNtVU.ttf +0 -0
- package/dist/assets/KaTeX_Math-BoldItalic-B3XSjfu4.ttf +0 -0
- package/dist/assets/KaTeX_Math-BoldItalic-CZnvNsCZ.woff2 +0 -0
- package/dist/assets/KaTeX_Math-BoldItalic-iY-2wyZ7.woff +0 -0
- package/dist/assets/KaTeX_Math-Italic-DA0__PXp.woff +0 -0
- package/dist/assets/KaTeX_Math-Italic-flOr_0UB.ttf +0 -0
- package/dist/assets/KaTeX_Math-Italic-t53AETM-.woff2 +0 -0
- package/dist/assets/KaTeX_SansSerif-Bold-CFMepnvq.ttf +0 -0
- package/dist/assets/KaTeX_SansSerif-Bold-D1sUS0GD.woff2 +0 -0
- package/dist/assets/KaTeX_SansSerif-Bold-DbIhKOiC.woff +0 -0
- package/dist/assets/KaTeX_SansSerif-Italic-C3H0VqGB.woff2 +0 -0
- package/dist/assets/KaTeX_SansSerif-Italic-DN2j7dab.woff +0 -0
- package/dist/assets/KaTeX_SansSerif-Italic-YYjJ1zSn.ttf +0 -0
- package/dist/assets/KaTeX_SansSerif-Regular-BNo7hRIc.ttf +0 -0
- package/dist/assets/KaTeX_SansSerif-Regular-CS6fqUqJ.woff +0 -0
- package/dist/assets/KaTeX_SansSerif-Regular-DDBCnlJ7.woff2 +0 -0
- package/dist/assets/KaTeX_Script-Regular-C5JkGWo-.ttf +0 -0
- package/dist/assets/KaTeX_Script-Regular-D3wIWfF6.woff2 +0 -0
- package/dist/assets/KaTeX_Script-Regular-D5yQViql.woff +0 -0
- package/dist/assets/KaTeX_Size1-Regular-C195tn64.woff +0 -0
- package/dist/assets/KaTeX_Size1-Regular-Dbsnue_I.ttf +0 -0
- package/dist/assets/KaTeX_Size1-Regular-mCD8mA8B.woff2 +0 -0
- package/dist/assets/KaTeX_Size2-Regular-B7gKUWhC.ttf +0 -0
- package/dist/assets/KaTeX_Size2-Regular-Dy4dx90m.woff2 +0 -0
- package/dist/assets/KaTeX_Size2-Regular-oD1tc_U0.woff +0 -0
- package/dist/assets/KaTeX_Size3-Regular-CTq5MqoE.woff +0 -0
- package/dist/assets/KaTeX_Size3-Regular-DgpXs0kz.ttf +0 -0
- package/dist/assets/KaTeX_Size4-Regular-BF-4gkZK.woff +0 -0
- package/dist/assets/KaTeX_Size4-Regular-DWFBv043.ttf +0 -0
- package/dist/assets/KaTeX_Size4-Regular-Dl5lxZxV.woff2 +0 -0
- package/dist/assets/KaTeX_Typewriter-Regular-C0xS9mPB.woff +0 -0
- package/dist/assets/KaTeX_Typewriter-Regular-CO6r4hn1.woff2 +0 -0
- package/dist/assets/KaTeX_Typewriter-Regular-D3Ib7_Hf.ttf +0 -0
- package/dist/assets/index-cIxJ4RXb.js +1226 -0
- package/dist/assets/index-oyEz69sP.css +32 -0
- package/dist/assets/vendor-codemirror-CJLzwpLB.js +39 -0
- package/dist/assets/vendor-react-DcyRfQm3.js +59 -0
- package/dist/assets/vendor-xterm-DfaPXD3y.js +66 -0
- package/dist/clear-cache.html +85 -0
- package/dist/convert-icons.md +53 -0
- package/dist/favicon.png +0 -0
- package/dist/favicon.svg +9 -0
- package/dist/generate-icons.js +49 -0
- package/dist/icons/claude-ai-icon.svg +1 -0
- package/dist/icons/codex-white.svg +3 -0
- package/dist/icons/codex.svg +3 -0
- package/dist/icons/cursor-white.svg +12 -0
- package/dist/icons/cursor.svg +1 -0
- package/dist/icons/generate-icons.md +19 -0
- package/dist/icons/icon-128x128.png +0 -0
- package/dist/icons/icon-128x128.svg +12 -0
- package/dist/icons/icon-144x144.png +0 -0
- package/dist/icons/icon-144x144.svg +12 -0
- package/dist/icons/icon-152x152.png +0 -0
- package/dist/icons/icon-152x152.svg +12 -0
- package/dist/icons/icon-192x192.png +0 -0
- package/dist/icons/icon-192x192.svg +12 -0
- package/dist/icons/icon-384x384.png +0 -0
- package/dist/icons/icon-384x384.svg +12 -0
- package/dist/icons/icon-512x512.png +0 -0
- package/dist/icons/icon-512x512.svg +12 -0
- package/dist/icons/icon-72x72.png +0 -0
- package/dist/icons/icon-72x72.svg +12 -0
- package/dist/icons/icon-96x96.png +0 -0
- package/dist/icons/icon-96x96.svg +12 -0
- package/dist/icons/icon-template.svg +12 -0
- package/dist/index.html +52 -0
- package/dist/logo-128.png +0 -0
- package/dist/logo-256.png +0 -0
- package/dist/logo-32.png +0 -0
- package/dist/logo-512.png +0 -0
- package/dist/logo-64.png +0 -0
- package/dist/logo.svg +17 -0
- package/dist/manifest.json +61 -0
- package/dist/screenshots/cli-selection.png +0 -0
- package/dist/screenshots/desktop-main.png +0 -0
- package/dist/screenshots/mobile-chat.png +0 -0
- package/dist/screenshots/tools-modal.png +0 -0
- package/dist/sw.js +49 -0
- package/package.json +109 -0
- package/server/claude-sdk.js +721 -0
- package/server/cli.js +327 -0
- package/server/cursor-cli.js +267 -0
- package/server/database/auth.db +0 -0
- package/server/database/db.js +361 -0
- package/server/database/init.sql +52 -0
- package/server/index.js +1747 -0
- package/server/middleware/auth.js +111 -0
- package/server/openai-codex.js +389 -0
- package/server/projects.js +1604 -0
- package/server/routes/agent.js +1230 -0
- package/server/routes/auth.js +135 -0
- package/server/routes/cli-auth.js +263 -0
- package/server/routes/codex.js +345 -0
- package/server/routes/commands.js +521 -0
- package/server/routes/cursor.js +795 -0
- package/server/routes/git.js +1128 -0
- package/server/routes/mcp-utils.js +48 -0
- package/server/routes/mcp.js +552 -0
- package/server/routes/projects.js +378 -0
- package/server/routes/settings.js +178 -0
- package/server/routes/taskmaster.js +1963 -0
- package/server/routes/user.js +106 -0
- package/server/utils/commandParser.js +303 -0
- package/server/utils/gitConfig.js +24 -0
- package/server/utils/mcp-detector.js +198 -0
- package/server/utils/taskmaster-websocket.js +129 -0
- package/shared/modelConstants.js +65 -0
|
@@ -0,0 +1,135 @@
|
|
|
1
|
+
import express from 'express';
|
|
2
|
+
import bcrypt from 'bcrypt';
|
|
3
|
+
import { userDb, db } from '../database/db.js';
|
|
4
|
+
import { generateToken, authenticateToken } from '../middleware/auth.js';
|
|
5
|
+
|
|
6
|
+
const router = express.Router();
|
|
7
|
+
|
|
8
|
+
// Check auth status and setup requirements
|
|
9
|
+
router.get('/status', async (req, res) => {
|
|
10
|
+
try {
|
|
11
|
+
const hasUsers = await userDb.hasUsers();
|
|
12
|
+
res.json({
|
|
13
|
+
needsSetup: !hasUsers,
|
|
14
|
+
isAuthenticated: false // Will be overridden by frontend if token exists
|
|
15
|
+
});
|
|
16
|
+
} catch (error) {
|
|
17
|
+
console.error('Auth status error:', error);
|
|
18
|
+
res.status(500).json({ error: 'Internal server error' });
|
|
19
|
+
}
|
|
20
|
+
});
|
|
21
|
+
|
|
22
|
+
// User registration (setup) - only allowed if no users exist
|
|
23
|
+
router.post('/register', async (req, res) => {
|
|
24
|
+
try {
|
|
25
|
+
const { username, password } = req.body;
|
|
26
|
+
|
|
27
|
+
// Validate input
|
|
28
|
+
if (!username || !password) {
|
|
29
|
+
return res.status(400).json({ error: 'Username and password are required' });
|
|
30
|
+
}
|
|
31
|
+
|
|
32
|
+
if (username.length < 3 || password.length < 6) {
|
|
33
|
+
return res.status(400).json({ error: 'Username must be at least 3 characters, password at least 6 characters' });
|
|
34
|
+
}
|
|
35
|
+
|
|
36
|
+
// Use a transaction to prevent race conditions
|
|
37
|
+
db.prepare('BEGIN').run();
|
|
38
|
+
try {
|
|
39
|
+
// Check if users already exist (only allow one user)
|
|
40
|
+
const hasUsers = userDb.hasUsers();
|
|
41
|
+
if (hasUsers) {
|
|
42
|
+
db.prepare('ROLLBACK').run();
|
|
43
|
+
return res.status(403).json({ error: 'User already exists. This is a single-user system.' });
|
|
44
|
+
}
|
|
45
|
+
|
|
46
|
+
// Hash password
|
|
47
|
+
const saltRounds = 12;
|
|
48
|
+
const passwordHash = await bcrypt.hash(password, saltRounds);
|
|
49
|
+
|
|
50
|
+
// Create user
|
|
51
|
+
const user = userDb.createUser(username, passwordHash);
|
|
52
|
+
|
|
53
|
+
// Generate token
|
|
54
|
+
const token = generateToken(user);
|
|
55
|
+
|
|
56
|
+
// Update last login
|
|
57
|
+
userDb.updateLastLogin(user.id);
|
|
58
|
+
|
|
59
|
+
db.prepare('COMMIT').run();
|
|
60
|
+
|
|
61
|
+
res.json({
|
|
62
|
+
success: true,
|
|
63
|
+
user: { id: user.id, username: user.username },
|
|
64
|
+
token
|
|
65
|
+
});
|
|
66
|
+
} catch (error) {
|
|
67
|
+
db.prepare('ROLLBACK').run();
|
|
68
|
+
throw error;
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
} catch (error) {
|
|
72
|
+
console.error('Registration error:', error);
|
|
73
|
+
if (error.code === 'SQLITE_CONSTRAINT_UNIQUE') {
|
|
74
|
+
res.status(409).json({ error: 'Username already exists' });
|
|
75
|
+
} else {
|
|
76
|
+
res.status(500).json({ error: 'Internal server error' });
|
|
77
|
+
}
|
|
78
|
+
}
|
|
79
|
+
});
|
|
80
|
+
|
|
81
|
+
// User login
|
|
82
|
+
router.post('/login', async (req, res) => {
|
|
83
|
+
try {
|
|
84
|
+
const { username, password } = req.body;
|
|
85
|
+
|
|
86
|
+
// Validate input
|
|
87
|
+
if (!username || !password) {
|
|
88
|
+
return res.status(400).json({ error: 'Username and password are required' });
|
|
89
|
+
}
|
|
90
|
+
|
|
91
|
+
// Get user from database
|
|
92
|
+
const user = userDb.getUserByUsername(username);
|
|
93
|
+
if (!user) {
|
|
94
|
+
return res.status(401).json({ error: 'Invalid username or password' });
|
|
95
|
+
}
|
|
96
|
+
|
|
97
|
+
// Verify password
|
|
98
|
+
const isValidPassword = await bcrypt.compare(password, user.password_hash);
|
|
99
|
+
if (!isValidPassword) {
|
|
100
|
+
return res.status(401).json({ error: 'Invalid username or password' });
|
|
101
|
+
}
|
|
102
|
+
|
|
103
|
+
// Generate token
|
|
104
|
+
const token = generateToken(user);
|
|
105
|
+
|
|
106
|
+
// Update last login
|
|
107
|
+
userDb.updateLastLogin(user.id);
|
|
108
|
+
|
|
109
|
+
res.json({
|
|
110
|
+
success: true,
|
|
111
|
+
user: { id: user.id, username: user.username },
|
|
112
|
+
token
|
|
113
|
+
});
|
|
114
|
+
|
|
115
|
+
} catch (error) {
|
|
116
|
+
console.error('Login error:', error);
|
|
117
|
+
res.status(500).json({ error: 'Internal server error' });
|
|
118
|
+
}
|
|
119
|
+
});
|
|
120
|
+
|
|
121
|
+
// Get current user (protected route)
|
|
122
|
+
router.get('/user', authenticateToken, (req, res) => {
|
|
123
|
+
res.json({
|
|
124
|
+
user: req.user
|
|
125
|
+
});
|
|
126
|
+
});
|
|
127
|
+
|
|
128
|
+
// Logout (client-side token removal, but this endpoint can be used for logging)
|
|
129
|
+
router.post('/logout', authenticateToken, (req, res) => {
|
|
130
|
+
// In a simple JWT system, logout is mainly client-side
|
|
131
|
+
// This endpoint exists for consistency and potential future logging
|
|
132
|
+
res.json({ success: true, message: 'Logged out successfully' });
|
|
133
|
+
});
|
|
134
|
+
|
|
135
|
+
export default router;
|
|
@@ -0,0 +1,263 @@
|
|
|
1
|
+
import express from 'express';
|
|
2
|
+
import { spawn } from 'child_process';
|
|
3
|
+
import fs from 'fs/promises';
|
|
4
|
+
import path from 'path';
|
|
5
|
+
import os from 'os';
|
|
6
|
+
|
|
7
|
+
const router = express.Router();
|
|
8
|
+
|
|
9
|
+
router.get('/claude/status', async (req, res) => {
|
|
10
|
+
try {
|
|
11
|
+
const credentialsResult = await checkClaudeCredentials();
|
|
12
|
+
|
|
13
|
+
if (credentialsResult.authenticated) {
|
|
14
|
+
return res.json({
|
|
15
|
+
authenticated: true,
|
|
16
|
+
email: credentialsResult.email || 'Authenticated',
|
|
17
|
+
method: 'credentials_file'
|
|
18
|
+
});
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
return res.json({
|
|
22
|
+
authenticated: false,
|
|
23
|
+
email: null,
|
|
24
|
+
error: credentialsResult.error || 'Not authenticated'
|
|
25
|
+
});
|
|
26
|
+
|
|
27
|
+
} catch (error) {
|
|
28
|
+
console.error('Error checking Claude auth status:', error);
|
|
29
|
+
res.status(500).json({
|
|
30
|
+
authenticated: false,
|
|
31
|
+
email: null,
|
|
32
|
+
error: error.message
|
|
33
|
+
});
|
|
34
|
+
}
|
|
35
|
+
});
|
|
36
|
+
|
|
37
|
+
router.get('/cursor/status', async (req, res) => {
|
|
38
|
+
try {
|
|
39
|
+
const result = await checkCursorStatus();
|
|
40
|
+
|
|
41
|
+
res.json({
|
|
42
|
+
authenticated: result.authenticated,
|
|
43
|
+
email: result.email,
|
|
44
|
+
error: result.error
|
|
45
|
+
});
|
|
46
|
+
|
|
47
|
+
} catch (error) {
|
|
48
|
+
console.error('Error checking Cursor auth status:', error);
|
|
49
|
+
res.status(500).json({
|
|
50
|
+
authenticated: false,
|
|
51
|
+
email: null,
|
|
52
|
+
error: error.message
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
});
|
|
56
|
+
|
|
57
|
+
router.get('/codex/status', async (req, res) => {
|
|
58
|
+
try {
|
|
59
|
+
const result = await checkCodexCredentials();
|
|
60
|
+
|
|
61
|
+
res.json({
|
|
62
|
+
authenticated: result.authenticated,
|
|
63
|
+
email: result.email,
|
|
64
|
+
error: result.error
|
|
65
|
+
});
|
|
66
|
+
|
|
67
|
+
} catch (error) {
|
|
68
|
+
console.error('Error checking Codex auth status:', error);
|
|
69
|
+
res.status(500).json({
|
|
70
|
+
authenticated: false,
|
|
71
|
+
email: null,
|
|
72
|
+
error: error.message
|
|
73
|
+
});
|
|
74
|
+
}
|
|
75
|
+
});
|
|
76
|
+
|
|
77
|
+
async function checkClaudeCredentials() {
|
|
78
|
+
try {
|
|
79
|
+
const credPath = path.join(os.homedir(), '.claude', '.credentials.json');
|
|
80
|
+
const content = await fs.readFile(credPath, 'utf8');
|
|
81
|
+
const creds = JSON.parse(content);
|
|
82
|
+
|
|
83
|
+
const oauth = creds.claudeAiOauth;
|
|
84
|
+
if (oauth && oauth.accessToken) {
|
|
85
|
+
const isExpired = oauth.expiresAt && Date.now() >= oauth.expiresAt;
|
|
86
|
+
|
|
87
|
+
if (!isExpired) {
|
|
88
|
+
return {
|
|
89
|
+
authenticated: true,
|
|
90
|
+
email: creds.email || creds.user || null
|
|
91
|
+
};
|
|
92
|
+
}
|
|
93
|
+
}
|
|
94
|
+
|
|
95
|
+
return {
|
|
96
|
+
authenticated: false,
|
|
97
|
+
email: null
|
|
98
|
+
};
|
|
99
|
+
} catch (error) {
|
|
100
|
+
return {
|
|
101
|
+
authenticated: false,
|
|
102
|
+
email: null
|
|
103
|
+
};
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
|
|
107
|
+
function checkCursorStatus() {
|
|
108
|
+
return new Promise((resolve) => {
|
|
109
|
+
let processCompleted = false;
|
|
110
|
+
|
|
111
|
+
const timeout = setTimeout(() => {
|
|
112
|
+
if (!processCompleted) {
|
|
113
|
+
processCompleted = true;
|
|
114
|
+
if (childProcess) {
|
|
115
|
+
childProcess.kill();
|
|
116
|
+
}
|
|
117
|
+
resolve({
|
|
118
|
+
authenticated: false,
|
|
119
|
+
email: null,
|
|
120
|
+
error: 'Command timeout'
|
|
121
|
+
});
|
|
122
|
+
}
|
|
123
|
+
}, 5000);
|
|
124
|
+
|
|
125
|
+
let childProcess;
|
|
126
|
+
try {
|
|
127
|
+
childProcess = spawn('cursor-agent', ['status']);
|
|
128
|
+
} catch (err) {
|
|
129
|
+
clearTimeout(timeout);
|
|
130
|
+
processCompleted = true;
|
|
131
|
+
resolve({
|
|
132
|
+
authenticated: false,
|
|
133
|
+
email: null,
|
|
134
|
+
error: 'Cursor CLI not found or not installed'
|
|
135
|
+
});
|
|
136
|
+
return;
|
|
137
|
+
}
|
|
138
|
+
|
|
139
|
+
let stdout = '';
|
|
140
|
+
let stderr = '';
|
|
141
|
+
|
|
142
|
+
childProcess.stdout.on('data', (data) => {
|
|
143
|
+
stdout += data.toString();
|
|
144
|
+
});
|
|
145
|
+
|
|
146
|
+
childProcess.stderr.on('data', (data) => {
|
|
147
|
+
stderr += data.toString();
|
|
148
|
+
});
|
|
149
|
+
|
|
150
|
+
childProcess.on('close', (code) => {
|
|
151
|
+
if (processCompleted) return;
|
|
152
|
+
processCompleted = true;
|
|
153
|
+
clearTimeout(timeout);
|
|
154
|
+
|
|
155
|
+
if (code === 0) {
|
|
156
|
+
const emailMatch = stdout.match(/Logged in as ([a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,})/i);
|
|
157
|
+
|
|
158
|
+
if (emailMatch) {
|
|
159
|
+
resolve({
|
|
160
|
+
authenticated: true,
|
|
161
|
+
email: emailMatch[1],
|
|
162
|
+
output: stdout
|
|
163
|
+
});
|
|
164
|
+
} else if (stdout.includes('Logged in')) {
|
|
165
|
+
resolve({
|
|
166
|
+
authenticated: true,
|
|
167
|
+
email: 'Logged in',
|
|
168
|
+
output: stdout
|
|
169
|
+
});
|
|
170
|
+
} else {
|
|
171
|
+
resolve({
|
|
172
|
+
authenticated: false,
|
|
173
|
+
email: null,
|
|
174
|
+
error: 'Not logged in'
|
|
175
|
+
});
|
|
176
|
+
}
|
|
177
|
+
} else {
|
|
178
|
+
resolve({
|
|
179
|
+
authenticated: false,
|
|
180
|
+
email: null,
|
|
181
|
+
error: stderr || 'Not logged in'
|
|
182
|
+
});
|
|
183
|
+
}
|
|
184
|
+
});
|
|
185
|
+
|
|
186
|
+
childProcess.on('error', (err) => {
|
|
187
|
+
if (processCompleted) return;
|
|
188
|
+
processCompleted = true;
|
|
189
|
+
clearTimeout(timeout);
|
|
190
|
+
|
|
191
|
+
resolve({
|
|
192
|
+
authenticated: false,
|
|
193
|
+
email: null,
|
|
194
|
+
error: 'Cursor CLI not found or not installed'
|
|
195
|
+
});
|
|
196
|
+
});
|
|
197
|
+
});
|
|
198
|
+
}
|
|
199
|
+
|
|
200
|
+
async function checkCodexCredentials() {
|
|
201
|
+
try {
|
|
202
|
+
const authPath = path.join(os.homedir(), '.codex', 'auth.json');
|
|
203
|
+
const content = await fs.readFile(authPath, 'utf8');
|
|
204
|
+
const auth = JSON.parse(content);
|
|
205
|
+
|
|
206
|
+
// Tokens are nested under 'tokens' key
|
|
207
|
+
const tokens = auth.tokens || {};
|
|
208
|
+
|
|
209
|
+
// Check for valid tokens (id_token or access_token)
|
|
210
|
+
if (tokens.id_token || tokens.access_token) {
|
|
211
|
+
// Try to extract email from id_token JWT payload
|
|
212
|
+
let email = 'Authenticated';
|
|
213
|
+
if (tokens.id_token) {
|
|
214
|
+
try {
|
|
215
|
+
// JWT is base64url encoded: header.payload.signature
|
|
216
|
+
const parts = tokens.id_token.split('.');
|
|
217
|
+
if (parts.length >= 2) {
|
|
218
|
+
// Decode the payload (second part)
|
|
219
|
+
const payload = JSON.parse(Buffer.from(parts[1], 'base64url').toString('utf8'));
|
|
220
|
+
email = payload.email || payload.user || 'Authenticated';
|
|
221
|
+
}
|
|
222
|
+
} catch {
|
|
223
|
+
// If JWT decoding fails, use fallback
|
|
224
|
+
email = 'Authenticated';
|
|
225
|
+
}
|
|
226
|
+
}
|
|
227
|
+
|
|
228
|
+
return {
|
|
229
|
+
authenticated: true,
|
|
230
|
+
email
|
|
231
|
+
};
|
|
232
|
+
}
|
|
233
|
+
|
|
234
|
+
// Also check for OPENAI_API_KEY as fallback auth method
|
|
235
|
+
if (auth.OPENAI_API_KEY) {
|
|
236
|
+
return {
|
|
237
|
+
authenticated: true,
|
|
238
|
+
email: 'API Key Auth'
|
|
239
|
+
};
|
|
240
|
+
}
|
|
241
|
+
|
|
242
|
+
return {
|
|
243
|
+
authenticated: false,
|
|
244
|
+
email: null,
|
|
245
|
+
error: 'No valid tokens found'
|
|
246
|
+
};
|
|
247
|
+
} catch (error) {
|
|
248
|
+
if (error.code === 'ENOENT') {
|
|
249
|
+
return {
|
|
250
|
+
authenticated: false,
|
|
251
|
+
email: null,
|
|
252
|
+
error: 'Codex not configured'
|
|
253
|
+
};
|
|
254
|
+
}
|
|
255
|
+
return {
|
|
256
|
+
authenticated: false,
|
|
257
|
+
email: null,
|
|
258
|
+
error: error.message
|
|
259
|
+
};
|
|
260
|
+
}
|
|
261
|
+
}
|
|
262
|
+
|
|
263
|
+
export default router;
|