kimaki 0.4.96 → 0.4.97
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/anthropic-account-identity.js +62 -0
- package/dist/anthropic-account-identity.test.js +38 -0
- package/dist/anthropic-auth-plugin.js +70 -12
- package/dist/anthropic-auth-state.js +28 -3
- package/dist/anthropic-auth-state.test.js +150 -0
- package/dist/cli-parsing.test.js +12 -9
- package/dist/cli.js +23 -10
- package/dist/discord-command-registration.js +2 -2
- package/dist/system-message.js +1 -1
- package/dist/system-message.test.js +1 -1
- package/dist/worktrees.js +0 -33
- package/package.json +6 -6
- package/src/anthropic-account-identity.test.ts +52 -0
- package/src/anthropic-account-identity.ts +77 -0
- package/src/anthropic-auth-plugin.ts +79 -12
- package/src/{anthropic-auth-plugin.test.ts → anthropic-auth-state.test.ts} +23 -1
- package/src/anthropic-auth-state.ts +36 -3
- package/src/cli-parsing.test.ts +16 -9
- package/src/cli.ts +29 -11
- package/src/discord-command-registration.ts +2 -2
- package/src/system-message.test.ts +1 -1
- package/src/system-message.ts +1 -1
- package/src/worktrees.test.ts +1 -0
- package/src/worktrees.ts +1 -47
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
// Helpers for extracting and normalizing Anthropic OAuth account identity.
|
|
2
|
+
const identityHintKeys = new Set(['user', 'profile', 'account', 'viewer']);
|
|
3
|
+
const idKeys = ['user_id', 'userId', 'account_id', 'accountId', 'id', 'sub'];
|
|
4
|
+
export function normalizeAnthropicAccountIdentity(identity) {
|
|
5
|
+
const email = typeof identity?.email === 'string' && identity.email.trim()
|
|
6
|
+
? identity.email.trim().toLowerCase()
|
|
7
|
+
: undefined;
|
|
8
|
+
const accountId = typeof identity?.accountId === 'string' && identity.accountId.trim()
|
|
9
|
+
? identity.accountId.trim()
|
|
10
|
+
: undefined;
|
|
11
|
+
if (!email && !accountId)
|
|
12
|
+
return undefined;
|
|
13
|
+
return {
|
|
14
|
+
...(email ? { email } : {}),
|
|
15
|
+
...(accountId ? { accountId } : {}),
|
|
16
|
+
};
|
|
17
|
+
}
|
|
18
|
+
function getCandidateFromRecord(record, path) {
|
|
19
|
+
const email = typeof record.email === 'string' ? record.email : undefined;
|
|
20
|
+
const accountId = idKeys
|
|
21
|
+
.map((key) => {
|
|
22
|
+
const value = record[key];
|
|
23
|
+
return typeof value === 'string' ? value : undefined;
|
|
24
|
+
})
|
|
25
|
+
.find((value) => {
|
|
26
|
+
return Boolean(value);
|
|
27
|
+
});
|
|
28
|
+
const normalized = normalizeAnthropicAccountIdentity({ email, accountId });
|
|
29
|
+
if (!normalized)
|
|
30
|
+
return undefined;
|
|
31
|
+
const hasIdentityHint = path.some((segment) => {
|
|
32
|
+
return identityHintKeys.has(segment);
|
|
33
|
+
});
|
|
34
|
+
return {
|
|
35
|
+
...normalized,
|
|
36
|
+
score: (normalized.email ? 4 : 0) + (normalized.accountId ? 2 : 0) + (hasIdentityHint ? 2 : 0),
|
|
37
|
+
};
|
|
38
|
+
}
|
|
39
|
+
function collectIdentityCandidates(value, path = []) {
|
|
40
|
+
if (!value || typeof value !== 'object')
|
|
41
|
+
return [];
|
|
42
|
+
if (Array.isArray(value)) {
|
|
43
|
+
return value.flatMap((entry) => {
|
|
44
|
+
return collectIdentityCandidates(entry, path);
|
|
45
|
+
});
|
|
46
|
+
}
|
|
47
|
+
const record = value;
|
|
48
|
+
const nested = Object.entries(record).flatMap(([key, entry]) => {
|
|
49
|
+
return collectIdentityCandidates(entry, [...path, key]);
|
|
50
|
+
});
|
|
51
|
+
const current = getCandidateFromRecord(record, path);
|
|
52
|
+
return current ? [current, ...nested] : nested;
|
|
53
|
+
}
|
|
54
|
+
export function extractAnthropicAccountIdentity(value) {
|
|
55
|
+
const candidates = collectIdentityCandidates(value);
|
|
56
|
+
const best = candidates.sort((a, b) => {
|
|
57
|
+
return b.score - a.score;
|
|
58
|
+
})[0];
|
|
59
|
+
if (!best)
|
|
60
|
+
return undefined;
|
|
61
|
+
return normalizeAnthropicAccountIdentity(best);
|
|
62
|
+
}
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
// Tests Anthropic OAuth account identity parsing and normalization.
|
|
2
|
+
import { describe, expect, test } from 'vitest';
|
|
3
|
+
import { extractAnthropicAccountIdentity, normalizeAnthropicAccountIdentity, } from './anthropic-account-identity.js';
|
|
4
|
+
describe('normalizeAnthropicAccountIdentity', () => {
|
|
5
|
+
test('normalizes email casing and drops empty values', () => {
|
|
6
|
+
expect(normalizeAnthropicAccountIdentity({
|
|
7
|
+
email: ' User@Example.com ',
|
|
8
|
+
accountId: ' user_123 ',
|
|
9
|
+
})).toEqual({
|
|
10
|
+
email: 'user@example.com',
|
|
11
|
+
accountId: 'user_123',
|
|
12
|
+
});
|
|
13
|
+
expect(normalizeAnthropicAccountIdentity({ email: ' ' })).toBeUndefined();
|
|
14
|
+
});
|
|
15
|
+
});
|
|
16
|
+
describe('extractAnthropicAccountIdentity', () => {
|
|
17
|
+
test('prefers nested user profile identity from client_data responses', () => {
|
|
18
|
+
expect(extractAnthropicAccountIdentity({
|
|
19
|
+
organizations: [{ id: 'org_123', name: 'Workspace' }],
|
|
20
|
+
user: {
|
|
21
|
+
id: 'usr_123',
|
|
22
|
+
email: 'User@Example.com',
|
|
23
|
+
},
|
|
24
|
+
})).toEqual({
|
|
25
|
+
accountId: 'usr_123',
|
|
26
|
+
email: 'user@example.com',
|
|
27
|
+
});
|
|
28
|
+
});
|
|
29
|
+
test('falls back to profile-style payloads without email', () => {
|
|
30
|
+
expect(extractAnthropicAccountIdentity({
|
|
31
|
+
profile: {
|
|
32
|
+
user_id: 'usr_456',
|
|
33
|
+
},
|
|
34
|
+
})).toEqual({
|
|
35
|
+
accountId: 'usr_456',
|
|
36
|
+
});
|
|
37
|
+
});
|
|
38
|
+
});
|
|
@@ -23,6 +23,7 @@
|
|
|
23
23
|
* - https://github.com/badlogic/pi-mono/blob/main/packages/ai/src/providers/anthropic.ts
|
|
24
24
|
*/
|
|
25
25
|
import { loadAccountStore, rememberAnthropicOAuth, rotateAnthropicAccount, saveAccountStore, setAnthropicAuth, shouldRotateAuth, upsertAccount, withAuthStateLock, } from './anthropic-auth-state.js';
|
|
26
|
+
import { extractAnthropicAccountIdentity, } from './anthropic-account-identity.js';
|
|
26
27
|
// PKCE (Proof Key for Code Exchange) using Web Crypto API.
|
|
27
28
|
// Reference: https://github.com/badlogic/pi-mono/blob/main/packages/ai/src/utils/oauth/pkce.ts
|
|
28
29
|
function base64urlEncode(bytes) {
|
|
@@ -52,6 +53,8 @@ const CLIENT_ID = (() => {
|
|
|
52
53
|
})();
|
|
53
54
|
const TOKEN_URL = 'https://platform.claude.com/v1/oauth/token';
|
|
54
55
|
const CREATE_API_KEY_URL = 'https://api.anthropic.com/api/oauth/claude_cli/create_api_key';
|
|
56
|
+
const CLIENT_DATA_URL = 'https://api.anthropic.com/api/oauth/claude_cli/client_data';
|
|
57
|
+
const PROFILE_URL = 'https://api.anthropic.com/api/oauth/profile';
|
|
55
58
|
const CALLBACK_PORT = 53692;
|
|
56
59
|
const CALLBACK_PATH = '/callback';
|
|
57
60
|
const REDIRECT_URI = `http://localhost:${CALLBACK_PORT}${CALLBACK_PATH}`;
|
|
@@ -64,6 +67,7 @@ const CLAUDE_CODE_BETA = 'claude-code-20250219';
|
|
|
64
67
|
const OAUTH_BETA = 'oauth-2025-04-20';
|
|
65
68
|
const FINE_GRAINED_TOOL_STREAMING_BETA = 'fine-grained-tool-streaming-2025-05-14';
|
|
66
69
|
const INTERLEAVED_THINKING_BETA = 'interleaved-thinking-2025-05-14';
|
|
70
|
+
const TOAST_SESSION_HEADER = 'x-kimaki-session-id';
|
|
67
71
|
const ANTHROPIC_HOSTS = new Set([
|
|
68
72
|
'api.anthropic.com',
|
|
69
73
|
'claude.ai',
|
|
@@ -227,6 +231,29 @@ async function createApiKey(accessToken) {
|
|
|
227
231
|
const json = JSON.parse(responseText);
|
|
228
232
|
return { type: 'success', key: json.raw_key };
|
|
229
233
|
}
|
|
234
|
+
async function fetchAnthropicAccountIdentity(accessToken) {
|
|
235
|
+
const urls = [CLIENT_DATA_URL, PROFILE_URL];
|
|
236
|
+
for (const url of urls) {
|
|
237
|
+
const responseText = await requestText(url, {
|
|
238
|
+
method: 'GET',
|
|
239
|
+
headers: {
|
|
240
|
+
Accept: 'application/json',
|
|
241
|
+
authorization: `Bearer ${accessToken}`,
|
|
242
|
+
'user-agent': process.env.OPENCODE_ANTHROPIC_USER_AGENT || `claude-cli/${CLAUDE_CODE_VERSION}`,
|
|
243
|
+
'x-app': 'cli',
|
|
244
|
+
},
|
|
245
|
+
}).catch(() => {
|
|
246
|
+
return undefined;
|
|
247
|
+
});
|
|
248
|
+
if (!responseText)
|
|
249
|
+
continue;
|
|
250
|
+
const parsed = JSON.parse(responseText);
|
|
251
|
+
const identity = extractAnthropicAccountIdentity(parsed);
|
|
252
|
+
if (identity)
|
|
253
|
+
return identity;
|
|
254
|
+
}
|
|
255
|
+
return undefined;
|
|
256
|
+
}
|
|
230
257
|
async function startCallbackServer(expectedState) {
|
|
231
258
|
return new Promise((resolve, reject) => {
|
|
232
259
|
let settle;
|
|
@@ -376,12 +403,13 @@ function buildAuthorizeHandler(mode) {
|
|
|
376
403
|
if (mode === 'apikey') {
|
|
377
404
|
return createApiKey(creds.access);
|
|
378
405
|
}
|
|
406
|
+
const identity = await fetchAnthropicAccountIdentity(creds.access);
|
|
379
407
|
await rememberAnthropicOAuth({
|
|
380
408
|
type: 'oauth',
|
|
381
409
|
refresh: creds.refresh,
|
|
382
410
|
access: creds.access,
|
|
383
411
|
expires: creds.expires,
|
|
384
|
-
});
|
|
412
|
+
}, identity);
|
|
385
413
|
return creds;
|
|
386
414
|
};
|
|
387
415
|
if (!isRemote) {
|
|
@@ -395,8 +423,7 @@ function buildAuthorizeHandler(mode) {
|
|
|
395
423
|
const result = await waitForCallback(auth.callbackServer);
|
|
396
424
|
return await finalize(result);
|
|
397
425
|
}
|
|
398
|
-
catch
|
|
399
|
-
console.error(`[anthropic-auth] ${error}`);
|
|
426
|
+
catch {
|
|
400
427
|
return { type: 'failed' };
|
|
401
428
|
}
|
|
402
429
|
})();
|
|
@@ -414,8 +441,7 @@ function buildAuthorizeHandler(mode) {
|
|
|
414
441
|
const result = await waitForCallback(auth.callbackServer, input);
|
|
415
442
|
return await finalize(result);
|
|
416
443
|
}
|
|
417
|
-
catch
|
|
418
|
-
console.error(`[anthropic-auth] ${error}`);
|
|
444
|
+
catch {
|
|
419
445
|
return { type: 'failed' };
|
|
420
446
|
}
|
|
421
447
|
})();
|
|
@@ -577,6 +603,12 @@ function wrapResponseStream(response, reverseToolNameMap) {
|
|
|
577
603
|
headers: response.headers,
|
|
578
604
|
});
|
|
579
605
|
}
|
|
606
|
+
function appendToastSessionMarker({ message, sessionId, }) {
|
|
607
|
+
if (!sessionId) {
|
|
608
|
+
return message;
|
|
609
|
+
}
|
|
610
|
+
return `${message} ${sessionId}`;
|
|
611
|
+
}
|
|
580
612
|
// --- Beta headers ---
|
|
581
613
|
function getRequiredBetas(modelId) {
|
|
582
614
|
const betas = [CLAUDE_CODE_BETA, OAUTH_BETA, FINE_GRAINED_TOOL_STREAMING_BETA];
|
|
@@ -624,7 +656,19 @@ async function getFreshOAuth(getAuth, client) {
|
|
|
624
656
|
await setAnthropicAuth(refreshed, client);
|
|
625
657
|
const store = await loadAccountStore();
|
|
626
658
|
if (store.accounts.length > 0) {
|
|
627
|
-
|
|
659
|
+
const identity = (() => {
|
|
660
|
+
const currentIndex = store.accounts.findIndex((account) => {
|
|
661
|
+
return account.refresh === latest.refresh || account.access === latest.access;
|
|
662
|
+
});
|
|
663
|
+
const current = currentIndex >= 0 ? store.accounts[currentIndex] : undefined;
|
|
664
|
+
if (!current)
|
|
665
|
+
return undefined;
|
|
666
|
+
return {
|
|
667
|
+
...(current.email ? { email: current.email } : {}),
|
|
668
|
+
...(current.accountId ? { accountId: current.accountId } : {}),
|
|
669
|
+
};
|
|
670
|
+
})();
|
|
671
|
+
upsertAccount(store, { ...refreshed, ...identity });
|
|
628
672
|
await saveAccountStore(store);
|
|
629
673
|
}
|
|
630
674
|
return refreshed;
|
|
@@ -637,6 +681,12 @@ async function getFreshOAuth(getAuth, client) {
|
|
|
637
681
|
// --- Plugin export ---
|
|
638
682
|
const AnthropicAuthPlugin = async ({ client }) => {
|
|
639
683
|
return {
|
|
684
|
+
'chat.headers': async (input, output) => {
|
|
685
|
+
if (input.model.providerID !== 'anthropic') {
|
|
686
|
+
return;
|
|
687
|
+
}
|
|
688
|
+
output.headers[TOAST_SESSION_HEADER] = input.sessionID;
|
|
689
|
+
},
|
|
640
690
|
auth: {
|
|
641
691
|
provider: 'anthropic',
|
|
642
692
|
async loader(getAuth, provider) {
|
|
@@ -668,11 +718,6 @@ const AnthropicAuthPlugin = async ({ client }) => {
|
|
|
668
718
|
.text()
|
|
669
719
|
.catch(() => undefined)
|
|
670
720
|
: undefined;
|
|
671
|
-
const rewritten = rewriteRequestPayload(originalBody, (msg) => {
|
|
672
|
-
client.tui.showToast({
|
|
673
|
-
body: { message: msg, variant: 'error' },
|
|
674
|
-
}).catch(() => { });
|
|
675
|
-
});
|
|
676
721
|
const headers = new Headers(init?.headers);
|
|
677
722
|
if (input instanceof Request) {
|
|
678
723
|
input.headers.forEach((v, k) => {
|
|
@@ -680,9 +725,19 @@ const AnthropicAuthPlugin = async ({ client }) => {
|
|
|
680
725
|
headers.set(k, v);
|
|
681
726
|
});
|
|
682
727
|
}
|
|
728
|
+
const sessionId = headers.get(TOAST_SESSION_HEADER) ?? undefined;
|
|
729
|
+
const rewritten = rewriteRequestPayload(originalBody, (msg) => {
|
|
730
|
+
client.tui.showToast({
|
|
731
|
+
body: {
|
|
732
|
+
message: appendToastSessionMarker({ message: msg, sessionId }),
|
|
733
|
+
variant: 'error',
|
|
734
|
+
},
|
|
735
|
+
}).catch(() => { });
|
|
736
|
+
});
|
|
683
737
|
const betas = getRequiredBetas(rewritten.modelId);
|
|
684
738
|
const runRequest = async (auth) => {
|
|
685
739
|
const requestHeaders = new Headers(headers);
|
|
740
|
+
requestHeaders.delete(TOAST_SESSION_HEADER);
|
|
686
741
|
requestHeaders.set('accept', 'application/json');
|
|
687
742
|
requestHeaders.set('anthropic-beta', mergeBetas(requestHeaders.get('anthropic-beta'), betas));
|
|
688
743
|
requestHeaders.set('anthropic-dangerous-direct-browser-access', 'true');
|
|
@@ -711,7 +766,10 @@ const AnthropicAuthPlugin = async ({ client }) => {
|
|
|
711
766
|
// Show toast notification so Discord thread shows the rotation
|
|
712
767
|
client.tui.showToast({
|
|
713
768
|
body: {
|
|
714
|
-
message:
|
|
769
|
+
message: appendToastSessionMarker({
|
|
770
|
+
message: `Switching from account ${rotated.fromLabel} to account ${rotated.toLabel}`,
|
|
771
|
+
sessionId,
|
|
772
|
+
}),
|
|
715
773
|
variant: 'info',
|
|
716
774
|
},
|
|
717
775
|
}).catch(() => { });
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
import * as fs from 'node:fs/promises';
|
|
2
2
|
import { homedir } from 'node:os';
|
|
3
3
|
import path from 'node:path';
|
|
4
|
+
import { normalizeAnthropicAccountIdentity, } from './anthropic-account-identity.js';
|
|
4
5
|
const AUTH_LOCK_STALE_MS = 30_000;
|
|
5
6
|
const AUTH_LOCK_RETRY_MS = 100;
|
|
6
7
|
async function readJson(filePath, fallback) {
|
|
@@ -80,6 +81,8 @@ export function normalizeAccountStore(input) {
|
|
|
80
81
|
typeof account.refresh === 'string' &&
|
|
81
82
|
typeof account.access === 'string' &&
|
|
82
83
|
typeof account.expires === 'number' &&
|
|
84
|
+
(typeof account.email === 'undefined' || typeof account.email === 'string') &&
|
|
85
|
+
(typeof account.accountId === 'undefined' || typeof account.accountId === 'string') &&
|
|
83
86
|
typeof account.addedAt === 'number' &&
|
|
84
87
|
typeof account.lastUsed === 'number')
|
|
85
88
|
: [];
|
|
@@ -96,8 +99,13 @@ export async function saveAccountStore(store) {
|
|
|
96
99
|
}
|
|
97
100
|
/** Short label for an account: first 8 + last 4 chars of refresh token. */
|
|
98
101
|
export function accountLabel(account, index) {
|
|
102
|
+
const accountWithIdentity = account;
|
|
103
|
+
const identity = accountWithIdentity.email || accountWithIdentity.accountId;
|
|
99
104
|
const r = account.refresh;
|
|
100
105
|
const short = r.length > 12 ? `${r.slice(0, 8)}...${r.slice(-4)}` : r;
|
|
106
|
+
if (identity) {
|
|
107
|
+
return index !== undefined ? `#${index + 1} (${identity})` : identity;
|
|
108
|
+
}
|
|
101
109
|
return index !== undefined ? `#${index + 1} (${short})` : short;
|
|
102
110
|
}
|
|
103
111
|
function findCurrentAccountIndex(store, auth) {
|
|
@@ -116,14 +124,29 @@ function findCurrentAccountIndex(store, auth) {
|
|
|
116
124
|
return store.activeIndex;
|
|
117
125
|
}
|
|
118
126
|
export function upsertAccount(store, auth, now = Date.now()) {
|
|
127
|
+
const authWithIdentity = auth;
|
|
128
|
+
const identity = normalizeAnthropicAccountIdentity({
|
|
129
|
+
email: authWithIdentity.email,
|
|
130
|
+
accountId: authWithIdentity.accountId,
|
|
131
|
+
});
|
|
119
132
|
const index = store.accounts.findIndex((account) => {
|
|
120
|
-
|
|
133
|
+
if (account.refresh === auth.refresh || account.access === auth.access) {
|
|
134
|
+
return true;
|
|
135
|
+
}
|
|
136
|
+
if (identity?.accountId && account.accountId === identity.accountId) {
|
|
137
|
+
return true;
|
|
138
|
+
}
|
|
139
|
+
if (identity?.email && account.email === identity.email) {
|
|
140
|
+
return true;
|
|
141
|
+
}
|
|
142
|
+
return false;
|
|
121
143
|
});
|
|
122
144
|
const nextAccount = {
|
|
123
145
|
type: 'oauth',
|
|
124
146
|
refresh: auth.refresh,
|
|
125
147
|
access: auth.access,
|
|
126
148
|
expires: auth.expires,
|
|
149
|
+
...identity,
|
|
127
150
|
addedAt: now,
|
|
128
151
|
lastUsed: now,
|
|
129
152
|
};
|
|
@@ -139,14 +162,16 @@ export function upsertAccount(store, auth, now = Date.now()) {
|
|
|
139
162
|
...existing,
|
|
140
163
|
...nextAccount,
|
|
141
164
|
addedAt: existing.addedAt,
|
|
165
|
+
email: nextAccount.email || existing.email,
|
|
166
|
+
accountId: nextAccount.accountId || existing.accountId,
|
|
142
167
|
};
|
|
143
168
|
store.activeIndex = index;
|
|
144
169
|
return index;
|
|
145
170
|
}
|
|
146
|
-
export async function rememberAnthropicOAuth(auth) {
|
|
171
|
+
export async function rememberAnthropicOAuth(auth, identity) {
|
|
147
172
|
await withAuthStateLock(async () => {
|
|
148
173
|
const store = await loadAccountStore();
|
|
149
|
-
upsertAccount(store, auth);
|
|
174
|
+
upsertAccount(store, { ...auth, ...normalizeAnthropicAccountIdentity(identity) });
|
|
150
175
|
await saveAccountStore(store);
|
|
151
176
|
});
|
|
152
177
|
}
|
|
@@ -0,0 +1,150 @@
|
|
|
1
|
+
// Tests Anthropic OAuth account persistence, deduplication, and rotation.
|
|
2
|
+
import { mkdtemp, readFile, rm, mkdir, writeFile } from 'node:fs/promises';
|
|
3
|
+
import { tmpdir } from 'node:os';
|
|
4
|
+
import path from 'node:path';
|
|
5
|
+
import { afterEach, beforeEach, describe, expect, test } from 'vitest';
|
|
6
|
+
import { accountLabel, authFilePath, loadAccountStore, rememberAnthropicOAuth, removeAccount, rotateAnthropicAccount, saveAccountStore, shouldRotateAuth, } from './anthropic-auth-state.js';
|
|
7
|
+
const firstAccount = {
|
|
8
|
+
type: 'oauth',
|
|
9
|
+
refresh: 'refresh-first',
|
|
10
|
+
access: 'access-first',
|
|
11
|
+
expires: 1,
|
|
12
|
+
};
|
|
13
|
+
const secondAccount = {
|
|
14
|
+
type: 'oauth',
|
|
15
|
+
refresh: 'refresh-second',
|
|
16
|
+
access: 'access-second',
|
|
17
|
+
expires: 2,
|
|
18
|
+
};
|
|
19
|
+
let originalXdgDataHome;
|
|
20
|
+
let tempDir = '';
|
|
21
|
+
beforeEach(async () => {
|
|
22
|
+
originalXdgDataHome = process.env.XDG_DATA_HOME;
|
|
23
|
+
tempDir = await mkdtemp(path.join(tmpdir(), 'anthropic-auth-plugin-'));
|
|
24
|
+
process.env.XDG_DATA_HOME = tempDir;
|
|
25
|
+
});
|
|
26
|
+
afterEach(async () => {
|
|
27
|
+
if (originalXdgDataHome === undefined) {
|
|
28
|
+
delete process.env.XDG_DATA_HOME;
|
|
29
|
+
}
|
|
30
|
+
else {
|
|
31
|
+
process.env.XDG_DATA_HOME = originalXdgDataHome;
|
|
32
|
+
}
|
|
33
|
+
await rm(tempDir, { force: true, recursive: true });
|
|
34
|
+
});
|
|
35
|
+
describe('rememberAnthropicOAuth', () => {
|
|
36
|
+
test('stores accounts and updates existing entries by refresh token', async () => {
|
|
37
|
+
await rememberAnthropicOAuth(firstAccount);
|
|
38
|
+
await rememberAnthropicOAuth({ ...firstAccount, access: 'access-first-new', expires: 3 });
|
|
39
|
+
const store = await loadAccountStore();
|
|
40
|
+
expect(store.activeIndex).toBe(0);
|
|
41
|
+
expect(store.accounts).toHaveLength(1);
|
|
42
|
+
expect(store.accounts[0]).toMatchObject({
|
|
43
|
+
refresh: 'refresh-first',
|
|
44
|
+
access: 'access-first-new',
|
|
45
|
+
expires: 3,
|
|
46
|
+
});
|
|
47
|
+
});
|
|
48
|
+
test('deduplicates new tokens by email or account ID', async () => {
|
|
49
|
+
await rememberAnthropicOAuth(firstAccount, {
|
|
50
|
+
email: 'user@example.com',
|
|
51
|
+
accountId: 'usr_123',
|
|
52
|
+
});
|
|
53
|
+
await rememberAnthropicOAuth(secondAccount, {
|
|
54
|
+
email: 'User@example.com',
|
|
55
|
+
accountId: 'usr_123',
|
|
56
|
+
});
|
|
57
|
+
const store = await loadAccountStore();
|
|
58
|
+
expect(store.accounts).toHaveLength(1);
|
|
59
|
+
expect(store.accounts[0]).toMatchObject({
|
|
60
|
+
refresh: 'refresh-second',
|
|
61
|
+
access: 'access-second',
|
|
62
|
+
email: 'user@example.com',
|
|
63
|
+
accountId: 'usr_123',
|
|
64
|
+
});
|
|
65
|
+
expect(accountLabel(store.accounts[0])).toBe('user@example.com');
|
|
66
|
+
});
|
|
67
|
+
});
|
|
68
|
+
describe('rotateAnthropicAccount', () => {
|
|
69
|
+
test('rotates to the next stored account and syncs auth state', async () => {
|
|
70
|
+
await saveAccountStore({
|
|
71
|
+
version: 1,
|
|
72
|
+
activeIndex: 0,
|
|
73
|
+
accounts: [
|
|
74
|
+
{ ...firstAccount, addedAt: 1, lastUsed: 1 },
|
|
75
|
+
{ ...secondAccount, addedAt: 2, lastUsed: 2 },
|
|
76
|
+
],
|
|
77
|
+
});
|
|
78
|
+
const authSetCalls = [];
|
|
79
|
+
const client = {
|
|
80
|
+
auth: {
|
|
81
|
+
set: async (input) => {
|
|
82
|
+
authSetCalls.push(input);
|
|
83
|
+
},
|
|
84
|
+
},
|
|
85
|
+
};
|
|
86
|
+
const rotated = await rotateAnthropicAccount(firstAccount, client);
|
|
87
|
+
const store = await loadAccountStore();
|
|
88
|
+
const authJson = JSON.parse(await readFile(authFilePath(), 'utf8'));
|
|
89
|
+
expect(rotated).toMatchObject({
|
|
90
|
+
auth: { refresh: 'refresh-second' },
|
|
91
|
+
fromLabel: '#1 (refresh-...irst)',
|
|
92
|
+
toLabel: '#2 (refresh-...cond)',
|
|
93
|
+
fromIndex: 0,
|
|
94
|
+
toIndex: 1,
|
|
95
|
+
});
|
|
96
|
+
expect(store.activeIndex).toBe(1);
|
|
97
|
+
expect(authJson.anthropic?.refresh).toBe('refresh-second');
|
|
98
|
+
expect(authSetCalls).toEqual([
|
|
99
|
+
{
|
|
100
|
+
path: { id: 'anthropic' },
|
|
101
|
+
body: {
|
|
102
|
+
type: 'oauth',
|
|
103
|
+
refresh: 'refresh-second',
|
|
104
|
+
access: 'access-second',
|
|
105
|
+
expires: 2,
|
|
106
|
+
},
|
|
107
|
+
},
|
|
108
|
+
]);
|
|
109
|
+
});
|
|
110
|
+
});
|
|
111
|
+
describe('removeAccount', () => {
|
|
112
|
+
test('removing the active account promotes the next stored account', async () => {
|
|
113
|
+
await saveAccountStore({
|
|
114
|
+
version: 1,
|
|
115
|
+
activeIndex: 1,
|
|
116
|
+
accounts: [
|
|
117
|
+
{ ...firstAccount, addedAt: 1, lastUsed: 1 },
|
|
118
|
+
{ ...secondAccount, addedAt: 2, lastUsed: 2 },
|
|
119
|
+
],
|
|
120
|
+
});
|
|
121
|
+
await removeAccount(1);
|
|
122
|
+
const store = await loadAccountStore();
|
|
123
|
+
const authJson = JSON.parse(await readFile(authFilePath(), 'utf8'));
|
|
124
|
+
expect(store.activeIndex).toBe(0);
|
|
125
|
+
expect(store.accounts).toHaveLength(1);
|
|
126
|
+
expect(store.accounts[0]?.refresh).toBe('refresh-first');
|
|
127
|
+
expect(authJson.anthropic?.refresh).toBe('refresh-first');
|
|
128
|
+
});
|
|
129
|
+
test('removing the last account clears active Anthropic auth', async () => {
|
|
130
|
+
await saveAccountStore({
|
|
131
|
+
version: 1,
|
|
132
|
+
activeIndex: 0,
|
|
133
|
+
accounts: [{ ...firstAccount, addedAt: 1, lastUsed: 1 }],
|
|
134
|
+
});
|
|
135
|
+
await mkdir(path.dirname(authFilePath()), { recursive: true });
|
|
136
|
+
await writeFile(authFilePath(), JSON.stringify({ anthropic: firstAccount }, null, 2));
|
|
137
|
+
await removeAccount(0);
|
|
138
|
+
const store = await loadAccountStore();
|
|
139
|
+
const authJson = JSON.parse(await readFile(authFilePath(), 'utf8'));
|
|
140
|
+
expect(store.accounts).toHaveLength(0);
|
|
141
|
+
expect(authJson.anthropic).toBeUndefined();
|
|
142
|
+
});
|
|
143
|
+
});
|
|
144
|
+
describe('shouldRotateAuth', () => {
|
|
145
|
+
test('only rotates on rate limit or auth failures', () => {
|
|
146
|
+
expect(shouldRotateAuth(429, '')).toBe(true);
|
|
147
|
+
expect(shouldRotateAuth(401, 'permission_error')).toBe(true);
|
|
148
|
+
expect(shouldRotateAuth(400, 'bad request')).toBe(false);
|
|
149
|
+
});
|
|
150
|
+
});
|
package/dist/cli-parsing.test.js
CHANGED
|
@@ -22,8 +22,8 @@ function createCliForIdParsing() {
|
|
|
22
22
|
.command('add-project', 'Add a project')
|
|
23
23
|
.option('-g, --guild <guildId>', 'Discord guild/server ID');
|
|
24
24
|
cli.command('task delete <id>', 'Delete task');
|
|
25
|
-
cli.command('anthropic-accounts list', 'List stored Anthropic accounts')
|
|
26
|
-
cli.command('anthropic-accounts remove <
|
|
25
|
+
cli.command('anthropic-accounts list', 'List stored Anthropic accounts');
|
|
26
|
+
cli.command('anthropic-accounts remove <indexOrEmail>', 'Remove stored Anthropic account');
|
|
27
27
|
return cli;
|
|
28
28
|
}
|
|
29
29
|
describe('goke CLI ID parsing', () => {
|
|
@@ -113,13 +113,16 @@ describe('goke CLI ID parsing', () => {
|
|
|
113
113
|
expect(result.args[0]).toBe(taskId);
|
|
114
114
|
expect(typeof result.args[0]).toBe('string');
|
|
115
115
|
});
|
|
116
|
-
test('
|
|
116
|
+
test('anthropic account remove parses index and email as strings', () => {
|
|
117
117
|
const cli = createCliForIdParsing();
|
|
118
|
-
const
|
|
119
|
-
|
|
120
|
-
expect(
|
|
118
|
+
const indexResult = cli.parse(['node', 'kimaki', 'anthropic-accounts', 'remove', '2'], { run: false });
|
|
119
|
+
const emailResult = cli.parse(['node', 'kimaki', 'anthropic-accounts', 'remove', 'user@example.com'], { run: false });
|
|
120
|
+
expect(indexResult.args[0]).toBe('2');
|
|
121
|
+
expect(typeof indexResult.args[0]).toBe('string');
|
|
122
|
+
expect(emailResult.args[0]).toBe('user@example.com');
|
|
123
|
+
expect(typeof emailResult.args[0]).toBe('string');
|
|
121
124
|
});
|
|
122
|
-
test('
|
|
125
|
+
test('anthropic account commands are included in help output', () => {
|
|
123
126
|
const stdout = {
|
|
124
127
|
text: '',
|
|
125
128
|
write(data) {
|
|
@@ -128,10 +131,10 @@ describe('goke CLI ID parsing', () => {
|
|
|
128
131
|
};
|
|
129
132
|
const cli = goke('kimaki', { stdout: stdout });
|
|
130
133
|
cli.command('send', 'Send a message');
|
|
131
|
-
cli.command('anthropic-accounts list', 'List stored Anthropic accounts')
|
|
134
|
+
cli.command('anthropic-accounts list', 'List stored Anthropic accounts');
|
|
132
135
|
cli.help();
|
|
133
136
|
cli.parse(['node', 'kimaki', '--help'], { run: false });
|
|
134
137
|
expect(stdout.text).toContain('send');
|
|
135
|
-
expect(stdout.text).
|
|
138
|
+
expect(stdout.text).toContain('anthropic-accounts');
|
|
136
139
|
});
|
|
137
140
|
});
|
package/dist/cli.js
CHANGED
|
@@ -662,7 +662,8 @@ async function resolveCredentials({ forceRestartOnboarding, forceGateway, gatewa
|
|
|
662
662
|
options: [
|
|
663
663
|
{
|
|
664
664
|
value: 'gateway',
|
|
665
|
-
|
|
665
|
+
disabled: true,
|
|
666
|
+
label: 'Gateway (pre-built Kimaki bot, currently disabled because of Discord verification process. will be re-enabled soon)',
|
|
666
667
|
},
|
|
667
668
|
{
|
|
668
669
|
value: 'self_hosted',
|
|
@@ -2224,7 +2225,6 @@ cli
|
|
|
2224
2225
|
});
|
|
2225
2226
|
cli
|
|
2226
2227
|
.command('anthropic-accounts list', 'List stored Anthropic OAuth accounts used for automatic rotation')
|
|
2227
|
-
.hidden()
|
|
2228
2228
|
.action(async () => {
|
|
2229
2229
|
const store = await loadAccountStore();
|
|
2230
2230
|
console.log(`Store: ${accountsFilePath()}`);
|
|
@@ -2239,16 +2239,29 @@ cli
|
|
|
2239
2239
|
process.exit(0);
|
|
2240
2240
|
});
|
|
2241
2241
|
cli
|
|
2242
|
-
.command('anthropic-accounts remove <
|
|
2243
|
-
.
|
|
2244
|
-
|
|
2245
|
-
const
|
|
2246
|
-
|
|
2247
|
-
|
|
2242
|
+
.command('anthropic-accounts remove <indexOrEmail>', 'Remove a stored Anthropic OAuth account from the rotation pool by index or email')
|
|
2243
|
+
.action(async (indexOrEmail) => {
|
|
2244
|
+
const value = Number(indexOrEmail);
|
|
2245
|
+
const store = await loadAccountStore();
|
|
2246
|
+
const resolvedIndex = (() => {
|
|
2247
|
+
if (Number.isInteger(value) && value >= 1) {
|
|
2248
|
+
return value - 1;
|
|
2249
|
+
}
|
|
2250
|
+
const email = indexOrEmail.trim().toLowerCase();
|
|
2251
|
+
if (!email) {
|
|
2252
|
+
return -1;
|
|
2253
|
+
}
|
|
2254
|
+
return store.accounts.findIndex((account) => {
|
|
2255
|
+
return account.email?.toLowerCase() === email;
|
|
2256
|
+
});
|
|
2257
|
+
})();
|
|
2258
|
+
if (resolvedIndex < 0) {
|
|
2259
|
+
cliLogger.error('Usage: kimaki anthropic-accounts remove <index-or-email>');
|
|
2248
2260
|
process.exit(EXIT_NO_RESTART);
|
|
2249
2261
|
}
|
|
2250
|
-
|
|
2251
|
-
|
|
2262
|
+
const removed = store.accounts[resolvedIndex];
|
|
2263
|
+
await removeAccount(resolvedIndex);
|
|
2264
|
+
cliLogger.log(`Removed Anthropic account ${removed ? accountLabel(removed, resolvedIndex) : indexOrEmail}`);
|
|
2252
2265
|
process.exit(0);
|
|
2253
2266
|
});
|
|
2254
2267
|
cli
|
|
@@ -110,7 +110,7 @@ export async function registerCommands({ token, appId, guildIds, userCommands =
|
|
|
110
110
|
.toJSON(),
|
|
111
111
|
new SlashCommandBuilder()
|
|
112
112
|
.setName('new-worktree')
|
|
113
|
-
.setDescription(truncateCommandDescription('Create a git worktree branch from
|
|
113
|
+
.setDescription(truncateCommandDescription('Create a git worktree branch from HEAD by default. Optionally pick a base branch.'))
|
|
114
114
|
.addStringOption((option) => {
|
|
115
115
|
option
|
|
116
116
|
.setName('name')
|
|
@@ -121,7 +121,7 @@ export async function registerCommands({ token, appId, guildIds, userCommands =
|
|
|
121
121
|
.addStringOption((option) => {
|
|
122
122
|
option
|
|
123
123
|
.setName('base-branch')
|
|
124
|
-
.setDescription(truncateCommandDescription('Branch to create the worktree from (default:
|
|
124
|
+
.setDescription(truncateCommandDescription('Branch to create the worktree from (default: HEAD)'))
|
|
125
125
|
.setRequired(false)
|
|
126
126
|
.setAutocomplete(true);
|
|
127
127
|
return option;
|
package/dist/system-message.js
CHANGED
|
@@ -450,7 +450,7 @@ kimaki send --channel ${channelId} --prompt "your task description" --worktree w
|
|
|
450
450
|
|
|
451
451
|
This creates a new Discord thread with an isolated git worktree and starts a session in it. The worktree name should be kebab-case and descriptive of the task.
|
|
452
452
|
|
|
453
|
-
By default, worktrees are created from \`
|
|
453
|
+
By default, worktrees are created from \`HEAD\`, which means whatever commit or branch the current checkout is on. If you want a different base, pass \`--base-branch\` or use the slash command option explicitly.
|
|
454
454
|
|
|
455
455
|
Critical recursion guard:
|
|
456
456
|
- If you already are in a worktree thread, do not create another worktree unless the user explicitly asks for a nested worktree.
|
|
@@ -217,7 +217,7 @@ describe('system-message', () => {
|
|
|
217
217
|
|
|
218
218
|
This creates a new Discord thread with an isolated git worktree and starts a session in it. The worktree name should be kebab-case and descriptive of the task.
|
|
219
219
|
|
|
220
|
-
By default, worktrees are created from \`
|
|
220
|
+
By default, worktrees are created from \`HEAD\`, which means whatever commit or branch the current checkout is on. If you want a different base, pass \`--base-branch\` or use the slash command option explicitly.
|
|
221
221
|
|
|
222
222
|
Critical recursion guard:
|
|
223
223
|
- If you already are in a worktree thread, do not create another worktree unless the user explicitly asks for a nested worktree.
|