opensteer 0.6.0 → 0.6.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,1130 @@
1
+ import {
2
+ DEFAULT_CLOUD_BASE_URL,
3
+ createKeychainStore,
4
+ normalizeCloudBaseUrl,
5
+ resolveCloudSelection,
6
+ resolveConfigWithEnv,
7
+ stripTrailingSlashes
8
+ } from "./chunk-WDRMHPWL.js";
9
+
10
+ // src/cli/auth.ts
11
+ import open from "open";
12
+
13
+ // src/auth/credential-resolver.ts
14
+ function resolveCloudCredential(options) {
15
+ const flagApiKey = normalizeToken(options.apiKeyFlag);
16
+ const flagAccessToken = normalizeToken(options.accessTokenFlag);
17
+ if (flagApiKey && flagAccessToken) {
18
+ throw new Error("--api-key and --access-token are mutually exclusive.");
19
+ }
20
+ if (flagAccessToken) {
21
+ return {
22
+ kind: "access-token",
23
+ source: "flag",
24
+ token: flagAccessToken,
25
+ authScheme: "bearer"
26
+ };
27
+ }
28
+ if (flagApiKey) {
29
+ return {
30
+ kind: "api-key",
31
+ source: "flag",
32
+ token: flagApiKey,
33
+ authScheme: "api-key"
34
+ };
35
+ }
36
+ const envAuthScheme = parseEnvAuthScheme(options.env.OPENSTEER_AUTH_SCHEME);
37
+ const envApiKey = normalizeToken(options.env.OPENSTEER_API_KEY);
38
+ const envAccessToken = normalizeToken(options.env.OPENSTEER_ACCESS_TOKEN);
39
+ if (envApiKey && envAccessToken) {
40
+ throw new Error(
41
+ "OPENSTEER_API_KEY and OPENSTEER_ACCESS_TOKEN are mutually exclusive. Set only one."
42
+ );
43
+ }
44
+ if (envAccessToken) {
45
+ return {
46
+ kind: "access-token",
47
+ source: "env",
48
+ token: envAccessToken,
49
+ authScheme: "bearer"
50
+ };
51
+ }
52
+ if (envApiKey) {
53
+ if (envAuthScheme === "bearer") {
54
+ return {
55
+ kind: "access-token",
56
+ source: "env",
57
+ token: envApiKey,
58
+ authScheme: "bearer",
59
+ compatibilityBearerApiKey: true
60
+ };
61
+ }
62
+ return {
63
+ kind: "api-key",
64
+ source: "env",
65
+ token: envApiKey,
66
+ authScheme: envAuthScheme ?? "api-key"
67
+ };
68
+ }
69
+ return null;
70
+ }
71
+ function applyCloudCredentialToEnv(env, credential) {
72
+ if (credential.kind === "access-token") {
73
+ env.OPENSTEER_ACCESS_TOKEN = credential.token;
74
+ delete env.OPENSTEER_API_KEY;
75
+ env.OPENSTEER_AUTH_SCHEME = "bearer";
76
+ return;
77
+ }
78
+ env.OPENSTEER_API_KEY = credential.token;
79
+ delete env.OPENSTEER_ACCESS_TOKEN;
80
+ env.OPENSTEER_AUTH_SCHEME = credential.authScheme;
81
+ }
82
+ function parseEnvAuthScheme(value) {
83
+ const normalized = normalizeToken(value);
84
+ if (!normalized) return void 0;
85
+ if (normalized === "api-key" || normalized === "bearer") {
86
+ return normalized;
87
+ }
88
+ throw new Error(
89
+ `Invalid OPENSTEER_AUTH_SCHEME value "${value}". Use "api-key" or "bearer".`
90
+ );
91
+ }
92
+ function normalizeToken(value) {
93
+ if (typeof value !== "string") return void 0;
94
+ const normalized = value.trim();
95
+ return normalized.length ? normalized : void 0;
96
+ }
97
+
98
+ // src/auth/machine-credential-store.ts
99
+ import { createHash } from "crypto";
100
+ import fs from "fs";
101
+ import os from "os";
102
+ import path from "path";
103
+ var METADATA_VERSION = 2;
104
+ var ACTIVE_TARGET_VERSION = 2;
105
+ var KEYCHAIN_SERVICE = "com.opensteer.cli.cloud";
106
+ var KEYCHAIN_ACCOUNT_PREFIX = "machine:";
107
+ var ACTIVE_TARGET_FILE_NAME = "cli-target.json";
108
+ var MachineCredentialStore = class {
109
+ authDir;
110
+ warn;
111
+ keychain = createKeychainStore();
112
+ warnedFallback = false;
113
+ constructor(options = {}) {
114
+ const appName = options.appName || "opensteer";
115
+ const env = options.env ?? process.env;
116
+ const configDir = resolveConfigDir(appName, env);
117
+ this.authDir = path.join(configDir, "auth");
118
+ this.warn = options.warn ?? (() => void 0);
119
+ }
120
+ readCloudCredential(target) {
121
+ const normalizedTarget = normalizeCloudCredentialTarget(target);
122
+ return this.readCredentialSlot(
123
+ resolveCredentialSlot(this.authDir, normalizedTarget),
124
+ normalizedTarget
125
+ );
126
+ }
127
+ writeCloudCredential(args) {
128
+ const accessToken = args.accessToken.trim();
129
+ const refreshToken2 = args.refreshToken.trim();
130
+ if (!accessToken || !refreshToken2) {
131
+ throw new Error("Cannot persist empty machine credential secrets.");
132
+ }
133
+ const baseUrl = normalizeCredentialUrl(args.baseUrl);
134
+ const slot = resolveCredentialSlot(this.authDir, { baseUrl });
135
+ ensureDirectory(this.authDir);
136
+ const secretPayload = {
137
+ accessToken,
138
+ refreshToken: refreshToken2
139
+ };
140
+ let secretBackend = "file";
141
+ if (this.keychain) {
142
+ try {
143
+ this.keychain.set(
144
+ KEYCHAIN_SERVICE,
145
+ slot.keychainAccount,
146
+ JSON.stringify(secretPayload)
147
+ );
148
+ secretBackend = "keychain";
149
+ removeFileIfExists(slot.fallbackSecretPath);
150
+ } catch {
151
+ this.writeFallbackSecret(slot, secretPayload);
152
+ secretBackend = "file";
153
+ }
154
+ } else {
155
+ this.writeFallbackSecret(slot, secretPayload);
156
+ }
157
+ const metadata = {
158
+ version: METADATA_VERSION,
159
+ secretBackend,
160
+ baseUrl,
161
+ scope: args.scope,
162
+ obtainedAt: args.obtainedAt,
163
+ expiresAt: args.expiresAt,
164
+ updatedAt: Date.now()
165
+ };
166
+ writeJsonFile(slot.metadataPath, metadata);
167
+ }
168
+ readActiveCloudTarget() {
169
+ return readActiveCloudTargetMetadata(resolveActiveTargetPath(this.authDir));
170
+ }
171
+ writeActiveCloudTarget(target) {
172
+ const baseUrl = normalizeCredentialUrl(target.baseUrl);
173
+ ensureDirectory(this.authDir);
174
+ writeJsonFile(resolveActiveTargetPath(this.authDir), {
175
+ version: ACTIVE_TARGET_VERSION,
176
+ baseUrl,
177
+ updatedAt: Date.now()
178
+ });
179
+ }
180
+ clearCloudCredential(target) {
181
+ this.clearCredentialSlot(
182
+ resolveCredentialSlot(this.authDir, normalizeCloudCredentialTarget(target))
183
+ );
184
+ }
185
+ readCredentialSlot(slot, target) {
186
+ const metadata = readMetadata(slot.metadataPath);
187
+ if (!metadata) {
188
+ return null;
189
+ }
190
+ if (target && !matchesCredentialTarget(metadata, target)) {
191
+ return null;
192
+ }
193
+ const secret = this.readSecret(slot, metadata.secretBackend);
194
+ if (!secret) {
195
+ return null;
196
+ }
197
+ return {
198
+ baseUrl: metadata.baseUrl,
199
+ scope: metadata.scope,
200
+ accessToken: secret.accessToken,
201
+ refreshToken: secret.refreshToken,
202
+ obtainedAt: metadata.obtainedAt,
203
+ expiresAt: metadata.expiresAt
204
+ };
205
+ }
206
+ readSecret(slot, backend) {
207
+ if (backend === "keychain" && this.keychain) {
208
+ try {
209
+ const secret = this.keychain.get(
210
+ KEYCHAIN_SERVICE,
211
+ slot.keychainAccount
212
+ );
213
+ if (!secret) return null;
214
+ return parseSecretPayload(secret);
215
+ } catch {
216
+ return null;
217
+ }
218
+ }
219
+ return readSecretFile(slot.fallbackSecretPath);
220
+ }
221
+ writeFallbackSecret(slot, secretPayload) {
222
+ writeJsonFile(slot.fallbackSecretPath, secretPayload, {
223
+ mode: 384
224
+ });
225
+ if (!this.warnedFallback) {
226
+ this.warn({
227
+ code: "fallback_file_store",
228
+ path: slot.fallbackSecretPath,
229
+ message: "Secure keychain is unavailable. Falling back to file-based credential storage with mode 0600."
230
+ });
231
+ this.warnedFallback = true;
232
+ }
233
+ }
234
+ clearCredentialSlot(slot) {
235
+ removeFileIfExists(slot.metadataPath);
236
+ removeFileIfExists(slot.fallbackSecretPath);
237
+ if (this.keychain) {
238
+ this.keychain.delete(KEYCHAIN_SERVICE, slot.keychainAccount);
239
+ }
240
+ }
241
+ };
242
+ function createMachineCredentialStore(options = {}) {
243
+ return new MachineCredentialStore(options);
244
+ }
245
+ function resolveCredentialSlot(authDir, target) {
246
+ const normalizedBaseUrl = normalizeCredentialUrl(target.baseUrl);
247
+ const storageKey = createHash("sha256").update(normalizedBaseUrl).digest("hex").slice(0, 24);
248
+ return {
249
+ keychainAccount: `${KEYCHAIN_ACCOUNT_PREFIX}${storageKey}`,
250
+ metadataPath: path.join(authDir, `cli-login.${storageKey}.json`),
251
+ fallbackSecretPath: path.join(
252
+ authDir,
253
+ `cli-login.${storageKey}.secret.json`
254
+ )
255
+ };
256
+ }
257
+ function resolveActiveTargetPath(authDir) {
258
+ return path.join(authDir, ACTIVE_TARGET_FILE_NAME);
259
+ }
260
+ function matchesCredentialTarget(value, target) {
261
+ return normalizeCredentialUrl(value.baseUrl) === normalizeCredentialUrl(target.baseUrl);
262
+ }
263
+ function normalizeCredentialUrl(value) {
264
+ const normalized = stripTrailingSlashes(value.trim());
265
+ if (!normalized) {
266
+ throw new Error("Cannot persist machine credential without baseUrl.");
267
+ }
268
+ return normalized;
269
+ }
270
+ function normalizeCloudCredentialTarget(target) {
271
+ return {
272
+ baseUrl: normalizeCredentialUrl(target.baseUrl)
273
+ };
274
+ }
275
+ function resolveConfigDir(appName, env) {
276
+ if (process.platform === "win32") {
277
+ const appData = env.APPDATA?.trim() || path.join(os.homedir(), "AppData", "Roaming");
278
+ return path.join(appData, appName);
279
+ }
280
+ if (process.platform === "darwin") {
281
+ return path.join(
282
+ os.homedir(),
283
+ "Library",
284
+ "Application Support",
285
+ appName
286
+ );
287
+ }
288
+ const xdgConfigHome = env.XDG_CONFIG_HOME?.trim() || path.join(os.homedir(), ".config");
289
+ return path.join(xdgConfigHome, appName);
290
+ }
291
+ function ensureDirectory(directoryPath) {
292
+ fs.mkdirSync(directoryPath, { recursive: true, mode: 448 });
293
+ }
294
+ function removeFileIfExists(filePath) {
295
+ try {
296
+ fs.rmSync(filePath, { force: true });
297
+ } catch {
298
+ return;
299
+ }
300
+ }
301
+ function readMetadata(filePath) {
302
+ if (!fs.existsSync(filePath)) {
303
+ return null;
304
+ }
305
+ try {
306
+ const raw = fs.readFileSync(filePath, "utf8");
307
+ const parsed = JSON.parse(raw);
308
+ if (parsed.version !== METADATA_VERSION) return null;
309
+ if (parsed.secretBackend !== "keychain" && parsed.secretBackend !== "file") {
310
+ return null;
311
+ }
312
+ if (typeof parsed.baseUrl !== "string" || !parsed.baseUrl.trim()) return null;
313
+ if (!Array.isArray(parsed.scope)) return null;
314
+ if (typeof parsed.obtainedAt !== "number") return null;
315
+ if (typeof parsed.expiresAt !== "number") return null;
316
+ if (typeof parsed.updatedAt !== "number") return null;
317
+ return {
318
+ version: parsed.version,
319
+ secretBackend: parsed.secretBackend,
320
+ baseUrl: parsed.baseUrl,
321
+ scope: parsed.scope.filter(
322
+ (value) => typeof value === "string"
323
+ ),
324
+ obtainedAt: parsed.obtainedAt,
325
+ expiresAt: parsed.expiresAt,
326
+ updatedAt: parsed.updatedAt
327
+ };
328
+ } catch {
329
+ return null;
330
+ }
331
+ }
332
+ function readActiveCloudTargetMetadata(filePath) {
333
+ if (!fs.existsSync(filePath)) {
334
+ return null;
335
+ }
336
+ try {
337
+ const raw = fs.readFileSync(filePath, "utf8");
338
+ const parsed = JSON.parse(raw);
339
+ if (parsed.version !== ACTIVE_TARGET_VERSION) {
340
+ return null;
341
+ }
342
+ if (typeof parsed.baseUrl !== "string" || !parsed.baseUrl.trim()) {
343
+ return null;
344
+ }
345
+ return {
346
+ baseUrl: parsed.baseUrl
347
+ };
348
+ } catch {
349
+ return null;
350
+ }
351
+ }
352
+ function parseSecretPayload(raw) {
353
+ try {
354
+ const parsed = JSON.parse(raw);
355
+ if (typeof parsed.accessToken !== "string" || !parsed.accessToken.trim() || typeof parsed.refreshToken !== "string" || !parsed.refreshToken.trim()) {
356
+ return null;
357
+ }
358
+ return {
359
+ accessToken: parsed.accessToken,
360
+ refreshToken: parsed.refreshToken
361
+ };
362
+ } catch {
363
+ return null;
364
+ }
365
+ }
366
+ function readSecretFile(filePath) {
367
+ if (!fs.existsSync(filePath)) {
368
+ return null;
369
+ }
370
+ try {
371
+ return parseSecretPayload(fs.readFileSync(filePath, "utf8"));
372
+ } catch {
373
+ return null;
374
+ }
375
+ }
376
+ function writeJsonFile(filePath, value, options = {}) {
377
+ fs.writeFileSync(filePath, JSON.stringify(value, null, 2), {
378
+ encoding: "utf8",
379
+ mode: options.mode ?? 384
380
+ });
381
+ if (typeof options.mode === "number") {
382
+ fs.chmodSync(filePath, options.mode);
383
+ }
384
+ }
385
+
386
+ // src/cli/auth.ts
387
+ var CliAuthHttpError = class extends Error {
388
+ status;
389
+ body;
390
+ constructor(message, status, body) {
391
+ super(message);
392
+ this.name = "CliAuthHttpError";
393
+ this.status = status;
394
+ this.body = body;
395
+ }
396
+ };
397
+ var HELP_TEXT = `Usage: opensteer auth <command> [options]
398
+
399
+ Authenticate Opensteer CLI with Opensteer Cloud.
400
+
401
+ Commands:
402
+ login Start device login flow in browser
403
+ status Show saved machine login state for the selected cloud host
404
+ logout Revoke and remove saved machine login for the selected cloud host
405
+
406
+ Options:
407
+ --base-url <url> Cloud API base URL (defaults to env or the last selected host)
408
+ --json JSON output (login prompts go to stderr)
409
+ --no-browser Do not auto-open your default browser during login
410
+ -h, --help Show this help
411
+ `;
412
+ var DEFAULT_AUTH_SITE_URL = "https://opensteer.com";
413
+ var INTERNAL_AUTH_SITE_URL_ENV = "OPENSTEER_INTERNAL_AUTH_SITE_URL";
414
+ function createDefaultDeps() {
415
+ const env = process.env;
416
+ return {
417
+ env,
418
+ store: createMachineCredentialStore({
419
+ env,
420
+ warn: (warning) => {
421
+ process.stderr.write(`${warning.message} (${warning.path})
422
+ `);
423
+ }
424
+ }),
425
+ fetchFn: fetch,
426
+ writeStdout: (message) => process.stdout.write(message),
427
+ writeStderr: (message) => process.stderr.write(message),
428
+ isInteractive: () => Boolean(process.stdin.isTTY && process.stdout.isTTY),
429
+ sleep: async (ms) => {
430
+ await new Promise((resolve) => setTimeout(resolve, ms));
431
+ },
432
+ now: () => Date.now(),
433
+ openExternalUrl: openDefaultBrowser
434
+ };
435
+ }
436
+ function readFlagValue(args, index, flag) {
437
+ const value = args[index + 1];
438
+ if (value === void 0 || value.startsWith("-")) {
439
+ return {
440
+ ok: false,
441
+ error: `${flag} requires a value.`
442
+ };
443
+ }
444
+ return {
445
+ ok: true,
446
+ value,
447
+ nextIndex: index + 1
448
+ };
449
+ }
450
+ function parseAuthCommonArgs(rawArgs) {
451
+ const args = {};
452
+ for (let i = 0; i < rawArgs.length; i++) {
453
+ const arg = rawArgs[i];
454
+ if (arg === "--json") {
455
+ args.json = true;
456
+ continue;
457
+ }
458
+ if (arg === "--base-url") {
459
+ const value = readFlagValue(rawArgs, i, "--base-url");
460
+ if (!value.ok) return { args, error: value.error };
461
+ args.baseUrl = value.value;
462
+ i = value.nextIndex;
463
+ continue;
464
+ }
465
+ return {
466
+ args,
467
+ error: `Unsupported option "${arg}".`
468
+ };
469
+ }
470
+ return { args };
471
+ }
472
+ function parseOpensteerAuthArgs(rawArgs) {
473
+ if (!rawArgs.length) {
474
+ return { mode: "help" };
475
+ }
476
+ const [subcommand, ...rest] = rawArgs;
477
+ if (subcommand === "--help" || subcommand === "-h" || subcommand === "help") {
478
+ return { mode: "help" };
479
+ }
480
+ if (subcommand === "login") {
481
+ let openBrowser = true;
482
+ const filtered = [];
483
+ for (const arg of rest) {
484
+ if (arg === "--no-browser") {
485
+ openBrowser = false;
486
+ continue;
487
+ }
488
+ filtered.push(arg);
489
+ }
490
+ const parsed = parseAuthCommonArgs(filtered);
491
+ if (parsed.error) return { mode: "error", error: parsed.error };
492
+ return {
493
+ mode: "login",
494
+ args: {
495
+ ...parsed.args,
496
+ openBrowser
497
+ }
498
+ };
499
+ }
500
+ if (subcommand === "status") {
501
+ const parsed = parseAuthCommonArgs(rest);
502
+ if (parsed.error) return { mode: "error", error: parsed.error };
503
+ return { mode: "status", args: parsed.args };
504
+ }
505
+ if (subcommand === "logout") {
506
+ const parsed = parseAuthCommonArgs(rest);
507
+ if (parsed.error) return { mode: "error", error: parsed.error };
508
+ return { mode: "logout", args: parsed.args };
509
+ }
510
+ return {
511
+ mode: "error",
512
+ error: `Unsupported auth subcommand "${subcommand}".`
513
+ };
514
+ }
515
+ function printHelp(deps) {
516
+ deps.writeStdout(`${HELP_TEXT}
517
+ `);
518
+ }
519
+ function writeHumanLine(deps, message) {
520
+ deps.writeStdout(`${message}
521
+ `);
522
+ }
523
+ function writeJsonLine(deps, payload) {
524
+ deps.writeStdout(`${JSON.stringify(payload)}
525
+ `);
526
+ }
527
+ function resolveBaseUrl(provided, env) {
528
+ const baseUrl = normalizeCloudBaseUrl(
529
+ (provided || env.OPENSTEER_BASE_URL || DEFAULT_CLOUD_BASE_URL).trim()
530
+ );
531
+ assertSecureUrl(baseUrl, "--base-url");
532
+ return baseUrl;
533
+ }
534
+ function resolveAuthSiteUrl(env) {
535
+ const authSiteUrl = normalizeCloudBaseUrl(
536
+ (env[INTERNAL_AUTH_SITE_URL_ENV] || DEFAULT_AUTH_SITE_URL).trim()
537
+ );
538
+ assertSecureUrl(
539
+ authSiteUrl,
540
+ `environment variable ${INTERNAL_AUTH_SITE_URL_ENV}`
541
+ );
542
+ return authSiteUrl;
543
+ }
544
+ function hasExplicitCloudTargetSelection(providedBaseUrl, env) {
545
+ return Boolean(
546
+ providedBaseUrl?.trim() || env.OPENSTEER_BASE_URL?.trim()
547
+ );
548
+ }
549
+ function readRememberedCloudTarget(store) {
550
+ const activeTarget = store.readActiveCloudTarget();
551
+ if (!activeTarget) {
552
+ return null;
553
+ }
554
+ try {
555
+ const baseUrl = normalizeCloudBaseUrl(activeTarget.baseUrl);
556
+ assertSecureUrl(baseUrl, "--base-url");
557
+ return { baseUrl };
558
+ } catch {
559
+ return null;
560
+ }
561
+ }
562
+ function resolveCloudTarget(args, env, store, options = {}) {
563
+ if (options.allowRememberedTarget !== false && !hasExplicitCloudTargetSelection(args.baseUrl, env)) {
564
+ const rememberedTarget = readRememberedCloudTarget(store);
565
+ if (rememberedTarget) {
566
+ return rememberedTarget;
567
+ }
568
+ }
569
+ const baseUrl = resolveBaseUrl(args.baseUrl, env);
570
+ return { baseUrl };
571
+ }
572
+ function assertSecureUrl(value, flag) {
573
+ let parsed;
574
+ try {
575
+ parsed = new URL(value);
576
+ } catch {
577
+ throw new Error(`Invalid ${flag} "${value}".`);
578
+ }
579
+ if (parsed.protocol === "https:") {
580
+ return;
581
+ }
582
+ if (parsed.protocol === "http:") {
583
+ const host = parsed.hostname.toLowerCase();
584
+ if (host === "localhost" || host === "127.0.0.1" || host === "::1") {
585
+ return;
586
+ }
587
+ }
588
+ throw new Error(
589
+ `Insecure URL "${value}". Use HTTPS, or HTTP only for localhost.`
590
+ );
591
+ }
592
+ async function postJson(fetchFn, url, body) {
593
+ const response = await fetchFn(url, {
594
+ method: "POST",
595
+ headers: {
596
+ "content-type": "application/json"
597
+ },
598
+ body: JSON.stringify(body)
599
+ });
600
+ let payload = null;
601
+ try {
602
+ payload = await response.json();
603
+ } catch {
604
+ payload = null;
605
+ }
606
+ if (!response.ok) {
607
+ throw new CliAuthHttpError(
608
+ `Auth request failed with status ${response.status}.`,
609
+ response.status,
610
+ payload
611
+ );
612
+ }
613
+ return payload;
614
+ }
615
+ function parseScope(rawScope) {
616
+ if (!rawScope) return ["cloud:browser"];
617
+ const values = rawScope.split(" ").map((value) => value.trim()).filter(Boolean);
618
+ return values.length ? values : ["cloud:browser"];
619
+ }
620
+ function parseCliTokenResponse(payload) {
621
+ const accessToken = typeof payload.access_token === "string" ? payload.access_token.trim() : "";
622
+ const refreshToken2 = typeof payload.refresh_token === "string" ? payload.refresh_token.trim() : "";
623
+ const expiresInSec = typeof payload.expires_in === "number" && Number.isFinite(payload.expires_in) && payload.expires_in > 0 ? Math.trunc(payload.expires_in) : 0;
624
+ if (!accessToken || !refreshToken2 || !expiresInSec) {
625
+ throw new Error("Invalid token response from cloud auth endpoint.");
626
+ }
627
+ return {
628
+ accessToken,
629
+ refreshToken: refreshToken2,
630
+ expiresInSec,
631
+ scope: parseScope(payload.scope)
632
+ };
633
+ }
634
+ function parseCliOauthError(error) {
635
+ if (!error || typeof error !== "object" || Array.isArray(error)) {
636
+ return null;
637
+ }
638
+ const root = error;
639
+ return {
640
+ error: typeof root.error === "string" ? root.error : void 0,
641
+ error_description: typeof root.error_description === "string" ? root.error_description : void 0,
642
+ interval: typeof root.interval === "number" ? root.interval : void 0
643
+ };
644
+ }
645
+ async function startDeviceAuthorization(authSiteUrl, fetchFn) {
646
+ const response = await postJson(
647
+ fetchFn,
648
+ `${authSiteUrl}/api/cli-auth/device/start`,
649
+ {
650
+ scope: ["cloud:browser"]
651
+ }
652
+ );
653
+ if (!response || typeof response.device_code !== "string" || !response.device_code.trim() || typeof response.user_code !== "string" || !response.user_code.trim() || typeof response.verification_uri_complete !== "string" || !response.verification_uri_complete.trim() || typeof response.expires_in !== "number" || response.expires_in <= 0 || typeof response.interval !== "number" || response.interval <= 0) {
654
+ throw new Error("Invalid device authorization response from cloud.");
655
+ }
656
+ return response;
657
+ }
658
+ async function pollDeviceToken(authSiteUrl, deviceCode, fetchFn) {
659
+ return await postJson(
660
+ fetchFn,
661
+ `${authSiteUrl}/api/cli-auth/device/token`,
662
+ {
663
+ grant_type: "urn:ietf:params:oauth:grant-type:device_code",
664
+ device_code: deviceCode
665
+ }
666
+ );
667
+ }
668
+ async function refreshToken(authSiteUrl, refreshTokenValue, fetchFn) {
669
+ return await postJson(fetchFn, `${authSiteUrl}/api/cli-auth/token`, {
670
+ grant_type: "refresh_token",
671
+ refresh_token: refreshTokenValue
672
+ });
673
+ }
674
+ async function revokeToken(authSiteUrl, refreshTokenValue, fetchFn) {
675
+ await postJson(fetchFn, `${authSiteUrl}/api/cli-auth/revoke`, {
676
+ token: refreshTokenValue
677
+ });
678
+ }
679
+ async function openDefaultBrowser(url) {
680
+ try {
681
+ const child = await open(url, {
682
+ wait: false
683
+ });
684
+ child.on("error", () => void 0);
685
+ child.unref();
686
+ return true;
687
+ } catch {
688
+ return false;
689
+ }
690
+ }
691
+ async function runDeviceLoginFlow(args) {
692
+ const start = await startDeviceAuthorization(args.authSiteUrl, args.fetchFn);
693
+ if (args.openBrowser) {
694
+ args.writeProgress(
695
+ "Opening your default browser for Opensteer CLI authentication.\n"
696
+ );
697
+ args.writeProgress(
698
+ `If nothing opens, use this URL:
699
+ ${start.verification_uri_complete}
700
+ `
701
+ );
702
+ } else {
703
+ if (args.openBrowserDisabledReason) {
704
+ args.writeProgress(
705
+ `Automatic browser open is disabled (${args.openBrowserDisabledReason}).
706
+ `
707
+ );
708
+ }
709
+ args.writeProgress(
710
+ `Open this URL to authenticate Opensteer CLI:
711
+ ${start.verification_uri_complete}
712
+ `
713
+ );
714
+ }
715
+ args.writeProgress(`Verification code: ${start.user_code}
716
+ `);
717
+ if (args.openBrowser) {
718
+ const browserOpened = await args.openExternalUrl(
719
+ start.verification_uri_complete
720
+ );
721
+ if (browserOpened) {
722
+ args.writeProgress(
723
+ "Opened your default browser. Finish authentication there; this terminal will continue automatically.\n"
724
+ );
725
+ } else {
726
+ args.writeProgress(
727
+ "Could not open your default browser automatically. Paste the URL above into a browser to continue.\n"
728
+ );
729
+ }
730
+ }
731
+ const deadline = args.now() + start.expires_in * 1e3;
732
+ let pollIntervalMs = Math.max(1, Math.trunc(start.interval)) * 1e3;
733
+ while (args.now() <= deadline) {
734
+ await args.sleep(pollIntervalMs);
735
+ try {
736
+ const tokenPayload = await pollDeviceToken(
737
+ args.authSiteUrl,
738
+ start.device_code,
739
+ args.fetchFn
740
+ );
741
+ const parsed = parseCliTokenResponse(tokenPayload);
742
+ return {
743
+ accessToken: parsed.accessToken,
744
+ refreshToken: parsed.refreshToken,
745
+ expiresAt: args.now() + parsed.expiresInSec * 1e3,
746
+ scope: parsed.scope
747
+ };
748
+ } catch (error) {
749
+ if (error instanceof CliAuthHttpError) {
750
+ const oauthError = parseCliOauthError(error.body);
751
+ if (!oauthError?.error) {
752
+ throw error;
753
+ }
754
+ if (oauthError.error === "authorization_pending") {
755
+ continue;
756
+ }
757
+ if (oauthError.error === "slow_down") {
758
+ const hintedInterval = typeof oauthError.interval === "number" && oauthError.interval > 0 ? Math.trunc(oauthError.interval) * 1e3 : pollIntervalMs + 5e3;
759
+ pollIntervalMs = Math.max(hintedInterval, pollIntervalMs + 1e3);
760
+ continue;
761
+ }
762
+ if (oauthError.error === "expired_token") {
763
+ throw new Error(
764
+ 'Device authorization expired before approval. Run "opensteer auth login" again.'
765
+ );
766
+ }
767
+ if (oauthError.error === "access_denied") {
768
+ throw new Error(
769
+ 'Cloud login was denied. Run "opensteer auth login" to retry.'
770
+ );
771
+ }
772
+ throw new Error(
773
+ oauthError.error_description || `Cloud login failed: ${oauthError.error}.`
774
+ );
775
+ }
776
+ throw error;
777
+ }
778
+ }
779
+ throw new Error(
780
+ 'Timed out waiting for cloud login approval. Run "opensteer auth login" again.'
781
+ );
782
+ }
783
+ async function refreshSavedCredential(saved, deps) {
784
+ const tokenPayload = await refreshToken(
785
+ resolveAuthSiteUrl(deps.env),
786
+ saved.refreshToken,
787
+ deps.fetchFn
788
+ );
789
+ const parsed = parseCliTokenResponse(tokenPayload);
790
+ const updated = {
791
+ accessToken: parsed.accessToken,
792
+ refreshToken: parsed.refreshToken,
793
+ expiresAt: deps.now() + parsed.expiresInSec * 1e3,
794
+ scope: parsed.scope
795
+ };
796
+ deps.store.writeCloudCredential({
797
+ baseUrl: saved.baseUrl,
798
+ scope: updated.scope,
799
+ accessToken: updated.accessToken,
800
+ refreshToken: updated.refreshToken,
801
+ obtainedAt: deps.now(),
802
+ expiresAt: updated.expiresAt
803
+ });
804
+ return updated;
805
+ }
806
+ async function ensureSavedCredentialIsFresh(saved, deps) {
807
+ const refreshSkewMs = 6e4;
808
+ if (saved.expiresAt > deps.now() + refreshSkewMs) {
809
+ return saved;
810
+ }
811
+ try {
812
+ const refreshed = await refreshSavedCredential(saved, deps);
813
+ return {
814
+ ...saved,
815
+ accessToken: refreshed.accessToken,
816
+ refreshToken: refreshed.refreshToken,
817
+ expiresAt: refreshed.expiresAt,
818
+ scope: refreshed.scope,
819
+ obtainedAt: deps.now()
820
+ };
821
+ } catch (error) {
822
+ if (error instanceof CliAuthHttpError) {
823
+ const oauth = parseCliOauthError(error.body);
824
+ if (oauth?.error === "invalid_grant" || oauth?.error === "expired_token") {
825
+ deps.store.clearCloudCredential({
826
+ baseUrl: saved.baseUrl
827
+ });
828
+ return null;
829
+ }
830
+ }
831
+ deps.writeStderr(
832
+ `Unable to refresh saved cloud login: ${error instanceof Error ? error.message : "unknown error"}
833
+ `
834
+ );
835
+ return null;
836
+ }
837
+ }
838
+ function toAuthMissingMessage(commandName) {
839
+ return [
840
+ `${commandName} requires cloud authentication.`,
841
+ 'Use --api-key, --access-token, OPENSTEER_API_KEY, OPENSTEER_ACCESS_TOKEN, or run "opensteer auth login".'
842
+ ].join(" ");
843
+ }
844
+ function describeBrowserOpenMode(args, deps) {
845
+ if (!args.openBrowser) {
846
+ return {
847
+ enabled: false,
848
+ disabledReason: "--no-browser"
849
+ };
850
+ }
851
+ if (!deps.isInteractive()) {
852
+ return {
853
+ enabled: false,
854
+ disabledReason: "this shell is not interactive"
855
+ };
856
+ }
857
+ if (isCiEnvironment(deps.env)) {
858
+ return {
859
+ enabled: false,
860
+ disabledReason: "CI"
861
+ };
862
+ }
863
+ return {
864
+ enabled: true
865
+ };
866
+ }
867
+ function isCiEnvironment(env) {
868
+ const value = env.CI?.trim().toLowerCase();
869
+ return Boolean(value && value !== "0" && value !== "false");
870
+ }
871
+ function isCloudModeEnabledForRootDir(rootDir, env) {
872
+ const resolved = resolveConfigWithEnv(
873
+ {
874
+ storage: { rootDir }
875
+ },
876
+ {
877
+ env
878
+ }
879
+ );
880
+ return resolveCloudSelection(
881
+ {
882
+ cloud: resolved.config.cloud
883
+ },
884
+ resolved.env
885
+ ).cloud;
886
+ }
887
+ async function ensureCloudCredentialsForOpenCommand(options) {
888
+ const env = options.env ?? process.env;
889
+ if (!isCloudModeEnabledForRootDir(options.scopeDir, env)) {
890
+ return null;
891
+ }
892
+ const writeStderr = options.writeStderr ?? ((message) => process.stderr.write(message));
893
+ return await ensureCloudCredentialsForCommand({
894
+ commandName: "opensteer open",
895
+ env,
896
+ store: options.store,
897
+ apiKeyFlag: options.apiKeyFlag,
898
+ accessTokenFlag: options.accessTokenFlag,
899
+ interactive: options.interactive,
900
+ autoLoginIfNeeded: true,
901
+ writeProgress: options.writeProgress ?? writeStderr,
902
+ writeStderr,
903
+ fetchFn: options.fetchFn,
904
+ sleep: options.sleep,
905
+ now: options.now,
906
+ openExternalUrl: options.openExternalUrl
907
+ });
908
+ }
909
+ async function ensureCloudCredentialsForCommand(options) {
910
+ const env = options.env ?? process.env;
911
+ const writeProgress = options.writeProgress ?? options.writeStdout ?? ((message) => process.stdout.write(message));
912
+ const writeStderr = options.writeStderr ?? ((message) => process.stderr.write(message));
913
+ const fetchFn = options.fetchFn ?? fetch;
914
+ const sleep = options.sleep ?? (async (ms) => {
915
+ await new Promise((resolve) => setTimeout(resolve, ms));
916
+ });
917
+ const now = options.now ?? Date.now;
918
+ const openExternalUrl = options.openExternalUrl ?? openDefaultBrowser;
919
+ const store = options.store ?? createMachineCredentialStore({
920
+ env,
921
+ warn: (warning) => {
922
+ writeStderr(`${warning.message} (${warning.path})
923
+ `);
924
+ }
925
+ });
926
+ const { baseUrl } = resolveCloudTarget(options, env, store);
927
+ const initialCredential = resolveCloudCredential({
928
+ env,
929
+ apiKeyFlag: options.apiKeyFlag,
930
+ accessTokenFlag: options.accessTokenFlag
931
+ });
932
+ let credential = initialCredential;
933
+ if (!credential) {
934
+ const saved = store.readCloudCredential({ baseUrl });
935
+ const freshSaved = saved ? await ensureSavedCredentialIsFresh(saved, {
936
+ env,
937
+ fetchFn,
938
+ store,
939
+ now,
940
+ writeStderr
941
+ }) : null;
942
+ if (freshSaved) {
943
+ credential = {
944
+ kind: "access-token",
945
+ source: "saved",
946
+ token: freshSaved.accessToken,
947
+ authScheme: "bearer"
948
+ };
949
+ }
950
+ }
951
+ if (!credential) {
952
+ if (options.autoLoginIfNeeded && (options.interactive ?? false)) {
953
+ const loggedIn = await runDeviceLoginFlow({
954
+ authSiteUrl: resolveAuthSiteUrl(env),
955
+ fetchFn,
956
+ writeProgress,
957
+ openExternalUrl,
958
+ sleep,
959
+ now,
960
+ openBrowser: true
961
+ });
962
+ store.writeCloudCredential({
963
+ baseUrl,
964
+ scope: loggedIn.scope,
965
+ accessToken: loggedIn.accessToken,
966
+ refreshToken: loggedIn.refreshToken,
967
+ obtainedAt: now(),
968
+ expiresAt: loggedIn.expiresAt
969
+ });
970
+ credential = {
971
+ kind: "access-token",
972
+ source: "saved",
973
+ token: loggedIn.accessToken,
974
+ authScheme: "bearer"
975
+ };
976
+ writeProgress("Cloud login complete.\n");
977
+ } else {
978
+ throw new Error(toAuthMissingMessage(options.commandName));
979
+ }
980
+ }
981
+ store.writeActiveCloudTarget({ baseUrl });
982
+ applyCloudCredentialToEnv(env, credential);
983
+ env.OPENSTEER_BASE_URL = baseUrl;
984
+ return {
985
+ token: credential.token,
986
+ authScheme: credential.authScheme,
987
+ source: credential.source,
988
+ kind: credential.kind,
989
+ baseUrl
990
+ };
991
+ }
992
+ async function runLogin(args, deps) {
993
+ const { baseUrl } = resolveCloudTarget(args, deps.env, deps.store, {
994
+ allowRememberedTarget: false
995
+ });
996
+ const writeProgress = args.json ? deps.writeStderr : deps.writeStdout;
997
+ const browserOpenMode = describeBrowserOpenMode(args, deps);
998
+ const login = await runDeviceLoginFlow({
999
+ authSiteUrl: resolveAuthSiteUrl(deps.env),
1000
+ fetchFn: deps.fetchFn,
1001
+ writeProgress,
1002
+ openExternalUrl: deps.openExternalUrl,
1003
+ sleep: deps.sleep,
1004
+ now: deps.now,
1005
+ openBrowser: browserOpenMode.enabled,
1006
+ openBrowserDisabledReason: browserOpenMode.disabledReason
1007
+ });
1008
+ deps.store.writeCloudCredential({
1009
+ baseUrl,
1010
+ scope: login.scope,
1011
+ accessToken: login.accessToken,
1012
+ refreshToken: login.refreshToken,
1013
+ obtainedAt: deps.now(),
1014
+ expiresAt: login.expiresAt
1015
+ });
1016
+ deps.store.writeActiveCloudTarget({ baseUrl });
1017
+ if (args.json) {
1018
+ writeJsonLine(deps, {
1019
+ loggedIn: true,
1020
+ baseUrl,
1021
+ expiresAt: login.expiresAt,
1022
+ scope: login.scope,
1023
+ authSource: "device"
1024
+ });
1025
+ return 0;
1026
+ }
1027
+ writeHumanLine(deps, "Opensteer CLI login successful.");
1028
+ writeHumanLine(deps, ` API Base URL: ${baseUrl}`);
1029
+ writeHumanLine(deps, ` Expires At: ${new Date(login.expiresAt).toISOString()}`);
1030
+ return 0;
1031
+ }
1032
+ async function runStatus(args, deps) {
1033
+ const { baseUrl } = resolveCloudTarget(args, deps.env, deps.store);
1034
+ deps.store.writeActiveCloudTarget({ baseUrl });
1035
+ const saved = deps.store.readCloudCredential({ baseUrl });
1036
+ if (!saved) {
1037
+ if (args.json) {
1038
+ writeJsonLine(deps, {
1039
+ loggedIn: false,
1040
+ baseUrl
1041
+ });
1042
+ } else {
1043
+ writeHumanLine(deps, `Opensteer CLI is not logged in for ${baseUrl}.`);
1044
+ }
1045
+ return 0;
1046
+ }
1047
+ const now = deps.now();
1048
+ const expired = saved.expiresAt <= now;
1049
+ if (args.json) {
1050
+ writeJsonLine(deps, {
1051
+ loggedIn: true,
1052
+ expired,
1053
+ baseUrl: saved.baseUrl,
1054
+ expiresAt: saved.expiresAt,
1055
+ scope: saved.scope
1056
+ });
1057
+ return 0;
1058
+ }
1059
+ writeHumanLine(
1060
+ deps,
1061
+ expired ? "Opensteer CLI has a saved login, but the access token is expired." : "Opensteer CLI is logged in."
1062
+ );
1063
+ writeHumanLine(deps, ` API Base URL: ${saved.baseUrl}`);
1064
+ writeHumanLine(deps, ` Expires At: ${new Date(saved.expiresAt).toISOString()}`);
1065
+ return 0;
1066
+ }
1067
+ async function runLogout(args, deps) {
1068
+ const { baseUrl } = resolveCloudTarget(args, deps.env, deps.store);
1069
+ deps.store.writeActiveCloudTarget({ baseUrl });
1070
+ const saved = deps.store.readCloudCredential({ baseUrl });
1071
+ if (saved) {
1072
+ try {
1073
+ await revokeToken(
1074
+ resolveAuthSiteUrl(deps.env),
1075
+ saved.refreshToken,
1076
+ deps.fetchFn
1077
+ );
1078
+ } catch {
1079
+ }
1080
+ }
1081
+ deps.store.clearCloudCredential({ baseUrl });
1082
+ if (args.json) {
1083
+ writeJsonLine(deps, {
1084
+ loggedOut: true,
1085
+ baseUrl
1086
+ });
1087
+ return 0;
1088
+ }
1089
+ writeHumanLine(deps, `Opensteer CLI login removed for ${baseUrl}.`);
1090
+ return 0;
1091
+ }
1092
+ async function runOpensteerAuthCli(rawArgs, overrideDeps = {}) {
1093
+ const deps = {
1094
+ ...createDefaultDeps(),
1095
+ ...overrideDeps
1096
+ };
1097
+ const parsed = parseOpensteerAuthArgs(rawArgs);
1098
+ if (parsed.mode === "help") {
1099
+ printHelp(deps);
1100
+ return 0;
1101
+ }
1102
+ if (parsed.mode === "error") {
1103
+ deps.writeStderr(`${parsed.error}
1104
+ `);
1105
+ deps.writeStderr('Run "opensteer auth --help" for usage.\n');
1106
+ return 1;
1107
+ }
1108
+ try {
1109
+ if (parsed.mode === "login") {
1110
+ return await runLogin(parsed.args, deps);
1111
+ }
1112
+ if (parsed.mode === "status") {
1113
+ return await runStatus(parsed.args, deps);
1114
+ }
1115
+ return await runLogout(parsed.args, deps);
1116
+ } catch (error) {
1117
+ const message = error instanceof Error ? error.message : "Auth command failed.";
1118
+ deps.writeStderr(`${message}
1119
+ `);
1120
+ return 1;
1121
+ }
1122
+ }
1123
+
1124
+ export {
1125
+ parseOpensteerAuthArgs,
1126
+ isCloudModeEnabledForRootDir,
1127
+ ensureCloudCredentialsForOpenCommand,
1128
+ ensureCloudCredentialsForCommand,
1129
+ runOpensteerAuthCli
1130
+ };