opensteer 0.6.13 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (62) hide show
  1. package/README.md +256 -184
  2. package/dist/chunk-PQYA6IX2.js +32571 -0
  3. package/dist/chunk-PQYA6IX2.js.map +1 -0
  4. package/dist/cli/bin.cjs +38201 -0
  5. package/dist/cli/bin.cjs.map +1 -0
  6. package/dist/cli/bin.d.cts +1 -0
  7. package/dist/cli/bin.d.ts +1 -0
  8. package/dist/cli/bin.js +5612 -0
  9. package/dist/cli/bin.js.map +1 -0
  10. package/dist/index.cjs +31309 -16009
  11. package/dist/index.cjs.map +1 -0
  12. package/dist/index.d.cts +4440 -670
  13. package/dist/index.d.ts +4440 -670
  14. package/dist/index.js +438 -378
  15. package/dist/index.js.map +1 -0
  16. package/package.json +56 -62
  17. package/skills/README.md +21 -20
  18. package/skills/opensteer/SKILL.md +60 -194
  19. package/skills/opensteer/references/cli-reference.md +69 -113
  20. package/skills/opensteer/references/request-workflow.md +81 -0
  21. package/skills/opensteer/references/sdk-reference.md +101 -154
  22. package/CHANGELOG.md +0 -75
  23. package/bin/opensteer.mjs +0 -1423
  24. package/dist/browser-profile-client-CGXc0-P9.d.cts +0 -228
  25. package/dist/browser-profile-client-DHLzMf-K.d.ts +0 -228
  26. package/dist/chunk-2ES46WCO.js +0 -1437
  27. package/dist/chunk-3H5RRIMZ.js +0 -69
  28. package/dist/chunk-AVXUMEDG.js +0 -62
  29. package/dist/chunk-DN3GI5CH.js +0 -57
  30. package/dist/chunk-FAHE5DB2.js +0 -190
  31. package/dist/chunk-HBTSQ2V4.js +0 -15259
  32. package/dist/chunk-K5CL76MG.js +0 -81
  33. package/dist/chunk-U724TBY6.js +0 -1262
  34. package/dist/chunk-ZRCFF546.js +0 -77
  35. package/dist/cli/auth.cjs +0 -2022
  36. package/dist/cli/auth.d.cts +0 -114
  37. package/dist/cli/auth.d.ts +0 -114
  38. package/dist/cli/auth.js +0 -15
  39. package/dist/cli/local-profile.cjs +0 -197
  40. package/dist/cli/local-profile.d.cts +0 -18
  41. package/dist/cli/local-profile.d.ts +0 -18
  42. package/dist/cli/local-profile.js +0 -97
  43. package/dist/cli/profile.cjs +0 -18548
  44. package/dist/cli/profile.d.cts +0 -79
  45. package/dist/cli/profile.d.ts +0 -79
  46. package/dist/cli/profile.js +0 -1328
  47. package/dist/cli/server.cjs +0 -17232
  48. package/dist/cli/server.d.cts +0 -2
  49. package/dist/cli/server.d.ts +0 -2
  50. package/dist/cli/server.js +0 -977
  51. package/dist/cli/skills-installer.cjs +0 -230
  52. package/dist/cli/skills-installer.d.cts +0 -28
  53. package/dist/cli/skills-installer.d.ts +0 -28
  54. package/dist/cli/skills-installer.js +0 -201
  55. package/dist/extractor-4Q3TFZJB.js +0 -8
  56. package/dist/resolver-MGN64KCP.js +0 -7
  57. package/dist/types-Cr10igF3.d.cts +0 -345
  58. package/dist/types-Cr10igF3.d.ts +0 -345
  59. package/skills/electron/SKILL.md +0 -87
  60. package/skills/electron/references/opensteer-electron-recipes.md +0 -88
  61. package/skills/electron/references/opensteer-electron-workflow.md +0 -85
  62. package/skills/opensteer/references/examples.md +0 -118
@@ -1,1262 +0,0 @@
1
- import {
2
- DEFAULT_CLOUD_BASE_URL,
3
- normalizeCloudBaseUrl,
4
- resolveCloudSelection,
5
- resolveConfigWithEnv,
6
- selectCloudCredential,
7
- stripTrailingSlashes
8
- } from "./chunk-2ES46WCO.js";
9
-
10
- // src/cli/auth.ts
11
- import open from "open";
12
-
13
- // src/auth/credential-resolver.ts
14
- function resolveCloudCredential(options) {
15
- const flagCredential = selectCloudCredential({
16
- apiKey: options.apiKeyFlag,
17
- accessToken: options.accessTokenFlag
18
- });
19
- if (flagCredential) {
20
- return toResolvedCloudCredential("flag", flagCredential);
21
- }
22
- const envAuthScheme = parseEnvAuthScheme(options.env.OPENSTEER_AUTH_SCHEME);
23
- const envCredential = selectCloudCredential({
24
- apiKey: options.env.OPENSTEER_API_KEY,
25
- accessToken: options.env.OPENSTEER_ACCESS_TOKEN,
26
- authScheme: envAuthScheme
27
- });
28
- if (envCredential) {
29
- return toResolvedCloudCredential("env", envCredential);
30
- }
31
- return null;
32
- }
33
- function applyCloudCredentialToEnv(env, credential) {
34
- if (credential.kind === "access-token") {
35
- env.OPENSTEER_ACCESS_TOKEN = credential.token;
36
- delete env.OPENSTEER_API_KEY;
37
- env.OPENSTEER_AUTH_SCHEME = "bearer";
38
- return;
39
- }
40
- env.OPENSTEER_API_KEY = credential.token;
41
- delete env.OPENSTEER_ACCESS_TOKEN;
42
- env.OPENSTEER_AUTH_SCHEME = credential.authScheme;
43
- }
44
- function parseEnvAuthScheme(value) {
45
- const normalized = normalizeToken(value);
46
- if (!normalized) return void 0;
47
- if (normalized === "api-key" || normalized === "bearer") {
48
- return normalized;
49
- }
50
- throw new Error(
51
- `Invalid OPENSTEER_AUTH_SCHEME value "${value}". Use "api-key" or "bearer".`
52
- );
53
- }
54
- function normalizeToken(value) {
55
- if (typeof value !== "string") return void 0;
56
- const normalized = value.trim();
57
- return normalized.length ? normalized : void 0;
58
- }
59
- function toResolvedCloudCredential(source, credential) {
60
- if (credential.compatibilityBearerApiKey) {
61
- return {
62
- kind: credential.kind,
63
- source,
64
- token: credential.token,
65
- authScheme: credential.authScheme,
66
- compatibilityBearerApiKey: true
67
- };
68
- }
69
- return {
70
- kind: credential.kind,
71
- source,
72
- token: credential.token,
73
- authScheme: credential.authScheme
74
- };
75
- }
76
-
77
- // src/auth/machine-credential-store.ts
78
- import { createHash } from "crypto";
79
- import fs from "fs";
80
- import os from "os";
81
- import path from "path";
82
-
83
- // src/auth/keychain-store.ts
84
- import { spawnSync } from "child_process";
85
- function commandExists(command) {
86
- const result = spawnSync(command, ["--help"], {
87
- encoding: "utf8",
88
- stdio: "ignore"
89
- });
90
- return result.error == null;
91
- }
92
- function commandFailed(result) {
93
- return typeof result.status === "number" && result.status !== 0;
94
- }
95
- function sanitizeCommandArgs(command, args) {
96
- if (command !== "security") {
97
- return args;
98
- }
99
- const sanitized = [];
100
- for (let index = 0; index < args.length; index += 1) {
101
- const value = args[index];
102
- sanitized.push(value);
103
- if (value === "-w" && index + 1 < args.length) {
104
- sanitized.push("[REDACTED]");
105
- index += 1;
106
- }
107
- }
108
- return sanitized;
109
- }
110
- function buildCommandError(command, args, result) {
111
- const stderr = typeof result.stderr === "string" && result.stderr.trim() ? result.stderr.trim() : `Command "${command}" failed with status ${String(result.status)}.`;
112
- const sanitizedArgs = sanitizeCommandArgs(command, args);
113
- return new Error(
114
- [
115
- `Unable to persist credential via ${command}.`,
116
- `${command} ${sanitizedArgs.join(" ")}`,
117
- stderr
118
- ].join(" ")
119
- );
120
- }
121
- function createMacosSecurityStore() {
122
- return {
123
- backend: "macos-security",
124
- get(service, account) {
125
- const result = spawnSync(
126
- "security",
127
- ["find-generic-password", "-s", service, "-a", account, "-w"],
128
- { encoding: "utf8" }
129
- );
130
- if (commandFailed(result)) {
131
- return null;
132
- }
133
- const secret = result.stdout.trim();
134
- return secret.length ? secret : null;
135
- },
136
- set(service, account, secret) {
137
- const args = [
138
- "add-generic-password",
139
- "-U",
140
- "-s",
141
- service,
142
- "-a",
143
- account,
144
- "-w",
145
- secret
146
- ];
147
- const result = spawnSync("security", args, { encoding: "utf8" });
148
- if (commandFailed(result)) {
149
- throw buildCommandError("security", args, result);
150
- }
151
- },
152
- delete(service, account) {
153
- const args = ["delete-generic-password", "-s", service, "-a", account];
154
- const result = spawnSync("security", args, { encoding: "utf8" });
155
- if (commandFailed(result)) {
156
- return;
157
- }
158
- }
159
- };
160
- }
161
- function createLinuxSecretToolStore() {
162
- return {
163
- backend: "linux-secret-tool",
164
- get(service, account) {
165
- const result = spawnSync(
166
- "secret-tool",
167
- ["lookup", "service", service, "account", account],
168
- {
169
- encoding: "utf8"
170
- }
171
- );
172
- if (commandFailed(result)) {
173
- return null;
174
- }
175
- const secret = result.stdout.trim();
176
- return secret.length ? secret : null;
177
- },
178
- set(service, account, secret) {
179
- const args = [
180
- "store",
181
- "--label",
182
- "Opensteer CLI",
183
- "service",
184
- service,
185
- "account",
186
- account
187
- ];
188
- const result = spawnSync("secret-tool", args, {
189
- encoding: "utf8",
190
- input: secret
191
- });
192
- if (commandFailed(result)) {
193
- throw buildCommandError("secret-tool", args, result);
194
- }
195
- },
196
- delete(service, account) {
197
- const args = ["clear", "service", service, "account", account];
198
- spawnSync("secret-tool", args, {
199
- encoding: "utf8"
200
- });
201
- }
202
- };
203
- }
204
- function createKeychainStore() {
205
- if (process.platform === "darwin") {
206
- if (!commandExists("security")) {
207
- return null;
208
- }
209
- return createMacosSecurityStore();
210
- }
211
- if (process.platform === "linux") {
212
- if (!commandExists("secret-tool")) {
213
- return null;
214
- }
215
- return createLinuxSecretToolStore();
216
- }
217
- return null;
218
- }
219
-
220
- // src/auth/machine-credential-store.ts
221
- var METADATA_VERSION = 2;
222
- var ACTIVE_TARGET_VERSION = 2;
223
- var KEYCHAIN_SERVICE = "com.opensteer.cli.cloud";
224
- var KEYCHAIN_ACCOUNT_PREFIX = "machine:";
225
- var ACTIVE_TARGET_FILE_NAME = "cli-target.json";
226
- var MachineCredentialStore = class {
227
- authDir;
228
- warn;
229
- keychain = createKeychainStore();
230
- warnedFallback = false;
231
- constructor(options = {}) {
232
- const appName = options.appName || "opensteer";
233
- const env = options.env ?? process.env;
234
- const configDir = resolveConfigDir(appName, env);
235
- this.authDir = path.join(configDir, "auth");
236
- this.warn = options.warn ?? (() => void 0);
237
- }
238
- readCloudCredential(target) {
239
- const normalizedTarget = normalizeCloudCredentialTarget(target);
240
- return this.readCredentialSlot(
241
- resolveCredentialSlot(this.authDir, normalizedTarget),
242
- normalizedTarget
243
- );
244
- }
245
- writeCloudCredential(args) {
246
- const accessToken = args.accessToken.trim();
247
- const refreshToken2 = args.refreshToken.trim();
248
- if (!accessToken || !refreshToken2) {
249
- throw new Error("Cannot persist empty machine credential secrets.");
250
- }
251
- const baseUrl = normalizeCredentialUrl(args.baseUrl);
252
- const slot = resolveCredentialSlot(this.authDir, { baseUrl });
253
- ensureDirectory(this.authDir);
254
- const secretPayload = {
255
- accessToken,
256
- refreshToken: refreshToken2
257
- };
258
- let secretBackend = "file";
259
- if (this.keychain) {
260
- try {
261
- this.keychain.set(
262
- KEYCHAIN_SERVICE,
263
- slot.keychainAccount,
264
- JSON.stringify(secretPayload)
265
- );
266
- secretBackend = "keychain";
267
- removeFileIfExists(slot.fallbackSecretPath);
268
- } catch {
269
- this.writeFallbackSecret(slot, secretPayload);
270
- secretBackend = "file";
271
- }
272
- } else {
273
- this.writeFallbackSecret(slot, secretPayload);
274
- }
275
- const metadata = {
276
- version: METADATA_VERSION,
277
- secretBackend,
278
- baseUrl,
279
- scope: args.scope,
280
- obtainedAt: args.obtainedAt,
281
- expiresAt: args.expiresAt,
282
- updatedAt: Date.now()
283
- };
284
- writeJsonFile(slot.metadataPath, metadata);
285
- }
286
- readActiveCloudTarget() {
287
- return readActiveCloudTargetMetadata(resolveActiveTargetPath(this.authDir));
288
- }
289
- writeActiveCloudTarget(target) {
290
- const baseUrl = normalizeCredentialUrl(target.baseUrl);
291
- ensureDirectory(this.authDir);
292
- writeJsonFile(resolveActiveTargetPath(this.authDir), {
293
- version: ACTIVE_TARGET_VERSION,
294
- baseUrl,
295
- updatedAt: Date.now()
296
- });
297
- }
298
- clearCloudCredential(target) {
299
- this.clearCredentialSlot(
300
- resolveCredentialSlot(this.authDir, normalizeCloudCredentialTarget(target))
301
- );
302
- }
303
- readCredentialSlot(slot, target) {
304
- const metadata = readMetadata(slot.metadataPath);
305
- if (!metadata) {
306
- return null;
307
- }
308
- if (target && !matchesCredentialTarget(metadata, target)) {
309
- return null;
310
- }
311
- const secret = this.readSecret(slot, metadata.secretBackend);
312
- if (!secret) {
313
- return null;
314
- }
315
- return {
316
- baseUrl: metadata.baseUrl,
317
- scope: metadata.scope,
318
- accessToken: secret.accessToken,
319
- refreshToken: secret.refreshToken,
320
- obtainedAt: metadata.obtainedAt,
321
- expiresAt: metadata.expiresAt
322
- };
323
- }
324
- readSecret(slot, backend) {
325
- if (backend === "keychain" && this.keychain) {
326
- try {
327
- const secret = this.keychain.get(
328
- KEYCHAIN_SERVICE,
329
- slot.keychainAccount
330
- );
331
- if (!secret) return null;
332
- return parseSecretPayload(secret);
333
- } catch {
334
- return null;
335
- }
336
- }
337
- return readSecretFile(slot.fallbackSecretPath);
338
- }
339
- writeFallbackSecret(slot, secretPayload) {
340
- writeJsonFile(slot.fallbackSecretPath, secretPayload, {
341
- mode: 384
342
- });
343
- if (!this.warnedFallback) {
344
- this.warn({
345
- code: "fallback_file_store",
346
- path: slot.fallbackSecretPath,
347
- message: "Secure keychain is unavailable. Falling back to file-based credential storage with mode 0600."
348
- });
349
- this.warnedFallback = true;
350
- }
351
- }
352
- clearCredentialSlot(slot) {
353
- removeFileIfExists(slot.metadataPath);
354
- removeFileIfExists(slot.fallbackSecretPath);
355
- if (this.keychain) {
356
- this.keychain.delete(KEYCHAIN_SERVICE, slot.keychainAccount);
357
- }
358
- }
359
- };
360
- function createMachineCredentialStore(options = {}) {
361
- return new MachineCredentialStore(options);
362
- }
363
- function resolveCredentialSlot(authDir, target) {
364
- const normalizedBaseUrl = normalizeCredentialUrl(target.baseUrl);
365
- const storageKey = createHash("sha256").update(normalizedBaseUrl).digest("hex").slice(0, 24);
366
- return {
367
- keychainAccount: `${KEYCHAIN_ACCOUNT_PREFIX}${storageKey}`,
368
- metadataPath: path.join(authDir, `cli-login.${storageKey}.json`),
369
- fallbackSecretPath: path.join(
370
- authDir,
371
- `cli-login.${storageKey}.secret.json`
372
- )
373
- };
374
- }
375
- function resolveActiveTargetPath(authDir) {
376
- return path.join(authDir, ACTIVE_TARGET_FILE_NAME);
377
- }
378
- function matchesCredentialTarget(value, target) {
379
- return normalizeCredentialUrl(value.baseUrl) === normalizeCredentialUrl(target.baseUrl);
380
- }
381
- function normalizeCredentialUrl(value) {
382
- const normalized = stripTrailingSlashes(value.trim());
383
- if (!normalized) {
384
- throw new Error("Cannot persist machine credential without baseUrl.");
385
- }
386
- return normalized;
387
- }
388
- function normalizeCloudCredentialTarget(target) {
389
- return {
390
- baseUrl: normalizeCredentialUrl(target.baseUrl)
391
- };
392
- }
393
- function resolveConfigDir(appName, env) {
394
- if (process.platform === "win32") {
395
- const appData = env.APPDATA?.trim() || path.join(os.homedir(), "AppData", "Roaming");
396
- return path.join(appData, appName);
397
- }
398
- if (process.platform === "darwin") {
399
- return path.join(
400
- os.homedir(),
401
- "Library",
402
- "Application Support",
403
- appName
404
- );
405
- }
406
- const xdgConfigHome = env.XDG_CONFIG_HOME?.trim() || path.join(os.homedir(), ".config");
407
- return path.join(xdgConfigHome, appName);
408
- }
409
- function ensureDirectory(directoryPath) {
410
- fs.mkdirSync(directoryPath, { recursive: true, mode: 448 });
411
- }
412
- function removeFileIfExists(filePath) {
413
- try {
414
- fs.rmSync(filePath, { force: true });
415
- } catch {
416
- return;
417
- }
418
- }
419
- function readMetadata(filePath) {
420
- if (!fs.existsSync(filePath)) {
421
- return null;
422
- }
423
- try {
424
- const raw = fs.readFileSync(filePath, "utf8");
425
- const parsed = JSON.parse(raw);
426
- if (parsed.version !== METADATA_VERSION) return null;
427
- if (parsed.secretBackend !== "keychain" && parsed.secretBackend !== "file") {
428
- return null;
429
- }
430
- if (typeof parsed.baseUrl !== "string" || !parsed.baseUrl.trim()) return null;
431
- if (!Array.isArray(parsed.scope)) return null;
432
- if (typeof parsed.obtainedAt !== "number") return null;
433
- if (typeof parsed.expiresAt !== "number") return null;
434
- if (typeof parsed.updatedAt !== "number") return null;
435
- return {
436
- version: parsed.version,
437
- secretBackend: parsed.secretBackend,
438
- baseUrl: parsed.baseUrl,
439
- scope: parsed.scope.filter(
440
- (value) => typeof value === "string"
441
- ),
442
- obtainedAt: parsed.obtainedAt,
443
- expiresAt: parsed.expiresAt,
444
- updatedAt: parsed.updatedAt
445
- };
446
- } catch {
447
- return null;
448
- }
449
- }
450
- function readActiveCloudTargetMetadata(filePath) {
451
- if (!fs.existsSync(filePath)) {
452
- return null;
453
- }
454
- try {
455
- const raw = fs.readFileSync(filePath, "utf8");
456
- const parsed = JSON.parse(raw);
457
- if (parsed.version !== ACTIVE_TARGET_VERSION) {
458
- return null;
459
- }
460
- if (typeof parsed.baseUrl !== "string" || !parsed.baseUrl.trim()) {
461
- return null;
462
- }
463
- return {
464
- baseUrl: parsed.baseUrl
465
- };
466
- } catch {
467
- return null;
468
- }
469
- }
470
- function parseSecretPayload(raw) {
471
- try {
472
- const parsed = JSON.parse(raw);
473
- if (typeof parsed.accessToken !== "string" || !parsed.accessToken.trim() || typeof parsed.refreshToken !== "string" || !parsed.refreshToken.trim()) {
474
- return null;
475
- }
476
- return {
477
- accessToken: parsed.accessToken,
478
- refreshToken: parsed.refreshToken
479
- };
480
- } catch {
481
- return null;
482
- }
483
- }
484
- function readSecretFile(filePath) {
485
- if (!fs.existsSync(filePath)) {
486
- return null;
487
- }
488
- try {
489
- return parseSecretPayload(fs.readFileSync(filePath, "utf8"));
490
- } catch {
491
- return null;
492
- }
493
- }
494
- function writeJsonFile(filePath, value, options = {}) {
495
- fs.writeFileSync(filePath, JSON.stringify(value, null, 2), {
496
- encoding: "utf8",
497
- mode: options.mode ?? 384
498
- });
499
- if (typeof options.mode === "number") {
500
- fs.chmodSync(filePath, options.mode);
501
- }
502
- }
503
-
504
- // src/cli/auth.ts
505
- var CliAuthHttpError = class extends Error {
506
- status;
507
- body;
508
- constructor(message, status, body) {
509
- super(message);
510
- this.name = "CliAuthHttpError";
511
- this.status = status;
512
- this.body = body;
513
- }
514
- };
515
- var HELP_TEXT = `Usage: opensteer auth <command> [options]
516
-
517
- Authenticate Opensteer CLI with Opensteer Cloud.
518
-
519
- Commands:
520
- login Start device login flow in browser
521
- status Show saved machine login state for the selected cloud host
522
- logout Revoke and remove saved machine login for the selected cloud host
523
-
524
- Options:
525
- --base-url <url> Cloud API base URL (defaults to env or the last selected host)
526
- --json JSON output (login prompts go to stderr)
527
- --no-browser Do not auto-open your default browser during login
528
- -h, --help Show this help
529
- `;
530
- var DEFAULT_AUTH_SITE_URL = "https://opensteer.com";
531
- var INTERNAL_AUTH_SITE_URL_ENV = "OPENSTEER_INTERNAL_AUTH_SITE_URL";
532
- function createDefaultDeps() {
533
- const env = process.env;
534
- return {
535
- env,
536
- store: createMachineCredentialStore({
537
- env,
538
- warn: (warning) => {
539
- process.stderr.write(`${warning.message} (${warning.path})
540
- `);
541
- }
542
- }),
543
- fetchFn: fetch,
544
- writeStdout: (message) => process.stdout.write(message),
545
- writeStderr: (message) => process.stderr.write(message),
546
- isInteractive: () => Boolean(process.stdin.isTTY && process.stdout.isTTY),
547
- sleep: async (ms) => {
548
- await new Promise((resolve) => setTimeout(resolve, ms));
549
- },
550
- now: () => Date.now(),
551
- openExternalUrl: openDefaultBrowser
552
- };
553
- }
554
- function readFlagValue(args, index, flag) {
555
- const value = args[index + 1];
556
- if (value === void 0 || value.startsWith("-")) {
557
- return {
558
- ok: false,
559
- error: `${flag} requires a value.`
560
- };
561
- }
562
- return {
563
- ok: true,
564
- value,
565
- nextIndex: index + 1
566
- };
567
- }
568
- function parseAuthCommonArgs(rawArgs) {
569
- const args = {};
570
- for (let i = 0; i < rawArgs.length; i++) {
571
- const arg = rawArgs[i];
572
- if (arg === "--json") {
573
- args.json = true;
574
- continue;
575
- }
576
- if (arg === "--base-url") {
577
- const value = readFlagValue(rawArgs, i, "--base-url");
578
- if (!value.ok) return { args, error: value.error };
579
- args.baseUrl = value.value;
580
- i = value.nextIndex;
581
- continue;
582
- }
583
- return {
584
- args,
585
- error: `Unsupported option "${arg}".`
586
- };
587
- }
588
- return { args };
589
- }
590
- function parseOpensteerAuthArgs(rawArgs) {
591
- if (!rawArgs.length) {
592
- return { mode: "help" };
593
- }
594
- const [subcommand, ...rest] = rawArgs;
595
- if (subcommand === "--help" || subcommand === "-h" || subcommand === "help") {
596
- return { mode: "help" };
597
- }
598
- if (subcommand === "login") {
599
- let openBrowser = true;
600
- const filtered = [];
601
- for (const arg of rest) {
602
- if (arg === "--no-browser") {
603
- openBrowser = false;
604
- continue;
605
- }
606
- filtered.push(arg);
607
- }
608
- const parsed = parseAuthCommonArgs(filtered);
609
- if (parsed.error) return { mode: "error", error: parsed.error };
610
- return {
611
- mode: "login",
612
- args: {
613
- ...parsed.args,
614
- openBrowser
615
- }
616
- };
617
- }
618
- if (subcommand === "status") {
619
- const parsed = parseAuthCommonArgs(rest);
620
- if (parsed.error) return { mode: "error", error: parsed.error };
621
- return { mode: "status", args: parsed.args };
622
- }
623
- if (subcommand === "logout") {
624
- const parsed = parseAuthCommonArgs(rest);
625
- if (parsed.error) return { mode: "error", error: parsed.error };
626
- return { mode: "logout", args: parsed.args };
627
- }
628
- return {
629
- mode: "error",
630
- error: `Unsupported auth subcommand "${subcommand}".`
631
- };
632
- }
633
- function printHelp(deps) {
634
- deps.writeStdout(`${HELP_TEXT}
635
- `);
636
- }
637
- function writeHumanLine(deps, message) {
638
- deps.writeStdout(`${message}
639
- `);
640
- }
641
- function writeJsonLine(deps, payload) {
642
- deps.writeStdout(`${JSON.stringify(payload)}
643
- `);
644
- }
645
- function resolveBaseUrl(provided, env) {
646
- const baseUrl = normalizeCloudBaseUrl(
647
- (provided || env.OPENSTEER_BASE_URL || DEFAULT_CLOUD_BASE_URL).trim()
648
- );
649
- assertSecureUrl(baseUrl, "--base-url");
650
- return baseUrl;
651
- }
652
- function resolveAuthSiteUrl(env) {
653
- const authSiteUrl = normalizeCloudBaseUrl(
654
- (env[INTERNAL_AUTH_SITE_URL_ENV] || DEFAULT_AUTH_SITE_URL).trim()
655
- );
656
- assertSecureUrl(
657
- authSiteUrl,
658
- `environment variable ${INTERNAL_AUTH_SITE_URL_ENV}`
659
- );
660
- return authSiteUrl;
661
- }
662
- function hasExplicitCloudTargetSelection(providedBaseUrl, env) {
663
- return Boolean(
664
- providedBaseUrl?.trim() || env.OPENSTEER_BASE_URL?.trim()
665
- );
666
- }
667
- function readRememberedCloudTarget(store) {
668
- const activeTarget = store.readActiveCloudTarget();
669
- if (!activeTarget) {
670
- return null;
671
- }
672
- try {
673
- const baseUrl = normalizeCloudBaseUrl(activeTarget.baseUrl);
674
- assertSecureUrl(baseUrl, "--base-url");
675
- return { baseUrl };
676
- } catch {
677
- return null;
678
- }
679
- }
680
- function resolveCloudTarget(args, env, store, options = {}) {
681
- if (options.allowRememberedTarget !== false && !hasExplicitCloudTargetSelection(args.baseUrl, env)) {
682
- const rememberedTarget = readRememberedCloudTarget(store);
683
- if (rememberedTarget) {
684
- return rememberedTarget;
685
- }
686
- }
687
- const baseUrl = resolveBaseUrl(args.baseUrl, env);
688
- return { baseUrl };
689
- }
690
- function assertSecureUrl(value, flag) {
691
- let parsed;
692
- try {
693
- parsed = new URL(value);
694
- } catch {
695
- throw new Error(`Invalid ${flag} "${value}".`);
696
- }
697
- if (parsed.protocol === "https:") {
698
- return;
699
- }
700
- if (parsed.protocol === "http:") {
701
- const host = parsed.hostname.toLowerCase();
702
- if (host === "localhost" || host === "127.0.0.1" || host === "::1") {
703
- return;
704
- }
705
- }
706
- throw new Error(
707
- `Insecure URL "${value}". Use HTTPS, or HTTP only for localhost.`
708
- );
709
- }
710
- async function postJson(fetchFn, url, body) {
711
- const response = await fetchFn(url, {
712
- method: "POST",
713
- headers: {
714
- "content-type": "application/json"
715
- },
716
- body: JSON.stringify(body)
717
- });
718
- let payload = null;
719
- try {
720
- payload = await response.json();
721
- } catch {
722
- payload = null;
723
- }
724
- if (!response.ok) {
725
- throw new CliAuthHttpError(
726
- `Auth request failed with status ${response.status}.`,
727
- response.status,
728
- payload
729
- );
730
- }
731
- return payload;
732
- }
733
- function parseScope(rawScope) {
734
- if (!rawScope) return ["cloud:browser"];
735
- const values = rawScope.split(" ").map((value) => value.trim()).filter(Boolean);
736
- return values.length ? values : ["cloud:browser"];
737
- }
738
- function parseCliTokenResponse(payload) {
739
- const accessToken = typeof payload.access_token === "string" ? payload.access_token.trim() : "";
740
- const refreshToken2 = typeof payload.refresh_token === "string" ? payload.refresh_token.trim() : "";
741
- const expiresInSec = typeof payload.expires_in === "number" && Number.isFinite(payload.expires_in) && payload.expires_in > 0 ? Math.trunc(payload.expires_in) : 0;
742
- if (!accessToken || !refreshToken2 || !expiresInSec) {
743
- throw new Error("Invalid token response from cloud auth endpoint.");
744
- }
745
- return {
746
- accessToken,
747
- refreshToken: refreshToken2,
748
- expiresInSec,
749
- scope: parseScope(payload.scope)
750
- };
751
- }
752
- function parseCliOauthError(error) {
753
- if (!error || typeof error !== "object" || Array.isArray(error)) {
754
- return null;
755
- }
756
- const root = error;
757
- return {
758
- error: typeof root.error === "string" ? root.error : void 0,
759
- error_description: typeof root.error_description === "string" ? root.error_description : void 0,
760
- interval: typeof root.interval === "number" ? root.interval : void 0
761
- };
762
- }
763
- async function startDeviceAuthorization(authSiteUrl, fetchFn) {
764
- const response = await postJson(
765
- fetchFn,
766
- `${authSiteUrl}/api/cli-auth/device/start`,
767
- {
768
- scope: ["cloud:browser"]
769
- }
770
- );
771
- if (!response || typeof response.device_code !== "string" || !response.device_code.trim() || typeof response.user_code !== "string" || !response.user_code.trim() || typeof response.verification_uri_complete !== "string" || !response.verification_uri_complete.trim() || typeof response.expires_in !== "number" || response.expires_in <= 0 || typeof response.interval !== "number" || response.interval <= 0) {
772
- throw new Error("Invalid device authorization response from cloud.");
773
- }
774
- return response;
775
- }
776
- async function pollDeviceToken(authSiteUrl, deviceCode, fetchFn) {
777
- return await postJson(
778
- fetchFn,
779
- `${authSiteUrl}/api/cli-auth/device/token`,
780
- {
781
- grant_type: "urn:ietf:params:oauth:grant-type:device_code",
782
- device_code: deviceCode
783
- }
784
- );
785
- }
786
- async function refreshToken(authSiteUrl, refreshTokenValue, fetchFn) {
787
- return await postJson(fetchFn, `${authSiteUrl}/api/cli-auth/token`, {
788
- grant_type: "refresh_token",
789
- refresh_token: refreshTokenValue
790
- });
791
- }
792
- async function revokeToken(authSiteUrl, refreshTokenValue, fetchFn) {
793
- await postJson(fetchFn, `${authSiteUrl}/api/cli-auth/revoke`, {
794
- token: refreshTokenValue
795
- });
796
- }
797
- async function openDefaultBrowser(url) {
798
- try {
799
- const child = await open(url, {
800
- wait: false
801
- });
802
- child.on("error", () => void 0);
803
- child.unref();
804
- return true;
805
- } catch {
806
- return false;
807
- }
808
- }
809
- async function runDeviceLoginFlow(args) {
810
- const start = await startDeviceAuthorization(args.authSiteUrl, args.fetchFn);
811
- if (args.openBrowser) {
812
- args.writeProgress(
813
- "Opening your default browser for Opensteer CLI authentication.\n"
814
- );
815
- args.writeProgress(
816
- `If nothing opens, use this URL:
817
- ${start.verification_uri_complete}
818
- `
819
- );
820
- } else {
821
- if (args.openBrowserDisabledReason) {
822
- args.writeProgress(
823
- `Automatic browser open is disabled (${args.openBrowserDisabledReason}).
824
- `
825
- );
826
- }
827
- args.writeProgress(
828
- `Open this URL to authenticate Opensteer CLI:
829
- ${start.verification_uri_complete}
830
- `
831
- );
832
- }
833
- args.writeProgress(`Verification code: ${start.user_code}
834
- `);
835
- if (args.openBrowser) {
836
- const browserOpened = await args.openExternalUrl(
837
- start.verification_uri_complete
838
- );
839
- if (browserOpened) {
840
- args.writeProgress(
841
- "Opened your default browser. Finish authentication there; this terminal will continue automatically.\n"
842
- );
843
- } else {
844
- args.writeProgress(
845
- "Could not open your default browser automatically. Paste the URL above into a browser to continue.\n"
846
- );
847
- }
848
- }
849
- const deadline = args.now() + start.expires_in * 1e3;
850
- let pollIntervalMs = Math.max(1, Math.trunc(start.interval)) * 1e3;
851
- while (args.now() <= deadline) {
852
- await args.sleep(pollIntervalMs);
853
- try {
854
- const tokenPayload = await pollDeviceToken(
855
- args.authSiteUrl,
856
- start.device_code,
857
- args.fetchFn
858
- );
859
- const parsed = parseCliTokenResponse(tokenPayload);
860
- return {
861
- accessToken: parsed.accessToken,
862
- refreshToken: parsed.refreshToken,
863
- expiresAt: args.now() + parsed.expiresInSec * 1e3,
864
- scope: parsed.scope
865
- };
866
- } catch (error) {
867
- if (error instanceof CliAuthHttpError) {
868
- const oauthError = parseCliOauthError(error.body);
869
- if (!oauthError?.error) {
870
- throw error;
871
- }
872
- if (oauthError.error === "authorization_pending") {
873
- continue;
874
- }
875
- if (oauthError.error === "slow_down") {
876
- const hintedInterval = typeof oauthError.interval === "number" && oauthError.interval > 0 ? Math.trunc(oauthError.interval) * 1e3 : pollIntervalMs + 5e3;
877
- pollIntervalMs = Math.max(hintedInterval, pollIntervalMs + 1e3);
878
- continue;
879
- }
880
- if (oauthError.error === "expired_token") {
881
- throw new Error(
882
- 'Device authorization expired before approval. Run "opensteer auth login" again.'
883
- );
884
- }
885
- if (oauthError.error === "access_denied") {
886
- throw new Error(
887
- 'Cloud login was denied. Run "opensteer auth login" to retry.'
888
- );
889
- }
890
- throw new Error(
891
- oauthError.error_description || `Cloud login failed: ${oauthError.error}.`
892
- );
893
- }
894
- throw error;
895
- }
896
- }
897
- throw new Error(
898
- 'Timed out waiting for cloud login approval. Run "opensteer auth login" again.'
899
- );
900
- }
901
- async function refreshSavedCredential(saved, deps) {
902
- const tokenPayload = await refreshToken(
903
- resolveAuthSiteUrl(deps.env),
904
- saved.refreshToken,
905
- deps.fetchFn
906
- );
907
- const parsed = parseCliTokenResponse(tokenPayload);
908
- const updated = {
909
- accessToken: parsed.accessToken,
910
- refreshToken: parsed.refreshToken,
911
- expiresAt: deps.now() + parsed.expiresInSec * 1e3,
912
- scope: parsed.scope
913
- };
914
- deps.store.writeCloudCredential({
915
- baseUrl: saved.baseUrl,
916
- scope: updated.scope,
917
- accessToken: updated.accessToken,
918
- refreshToken: updated.refreshToken,
919
- obtainedAt: deps.now(),
920
- expiresAt: updated.expiresAt
921
- });
922
- return updated;
923
- }
924
- async function ensureSavedCredentialIsFresh(saved, deps) {
925
- const refreshSkewMs = 6e4;
926
- if (saved.expiresAt > deps.now() + refreshSkewMs) {
927
- return saved;
928
- }
929
- try {
930
- const refreshed = await refreshSavedCredential(saved, deps);
931
- return {
932
- ...saved,
933
- accessToken: refreshed.accessToken,
934
- refreshToken: refreshed.refreshToken,
935
- expiresAt: refreshed.expiresAt,
936
- scope: refreshed.scope,
937
- obtainedAt: deps.now()
938
- };
939
- } catch (error) {
940
- if (error instanceof CliAuthHttpError) {
941
- const oauth = parseCliOauthError(error.body);
942
- if (oauth?.error === "invalid_grant" || oauth?.error === "expired_token") {
943
- deps.store.clearCloudCredential({
944
- baseUrl: saved.baseUrl
945
- });
946
- return null;
947
- }
948
- }
949
- deps.writeStderr(
950
- `Unable to refresh saved cloud login: ${error instanceof Error ? error.message : "unknown error"}
951
- `
952
- );
953
- return null;
954
- }
955
- }
956
- function toAuthMissingMessage(commandName) {
957
- return [
958
- `${commandName} requires cloud authentication.`,
959
- 'Use --api-key, --access-token, OPENSTEER_API_KEY, OPENSTEER_ACCESS_TOKEN, or run "opensteer auth login".'
960
- ].join(" ");
961
- }
962
- function describeBrowserOpenMode(args, deps) {
963
- if (!args.openBrowser) {
964
- return {
965
- enabled: false,
966
- disabledReason: "--no-browser"
967
- };
968
- }
969
- if (!deps.isInteractive()) {
970
- return {
971
- enabled: false,
972
- disabledReason: "this shell is not interactive"
973
- };
974
- }
975
- if (isCiEnvironment(deps.env)) {
976
- return {
977
- enabled: false,
978
- disabledReason: "CI"
979
- };
980
- }
981
- return {
982
- enabled: true
983
- };
984
- }
985
- function isCiEnvironment(env) {
986
- const value = env.CI?.trim().toLowerCase();
987
- return Boolean(value && value !== "0" && value !== "false");
988
- }
989
- function resolveCloudSessionEnvForRootDir(rootDir, env) {
990
- const resolved = resolveConfigWithEnv(
991
- {
992
- storage: { rootDir }
993
- },
994
- {
995
- env
996
- }
997
- );
998
- return {
999
- cloud: resolveCloudSelection(
1000
- {
1001
- cloud: resolved.config.cloud
1002
- },
1003
- resolved.env
1004
- ).cloud,
1005
- env: resolved.env
1006
- };
1007
- }
1008
- function isCloudModeEnabledForRootDir(rootDir, env) {
1009
- return resolveCloudSessionEnvForRootDir(rootDir, env).cloud;
1010
- }
1011
- async function ensureCloudCredentialsForOpenCommand(options) {
1012
- const processEnv = options.env ?? process.env;
1013
- const runtime = resolveCloudSessionEnvForRootDir(options.scopeDir, processEnv);
1014
- if (!runtime.cloud) {
1015
- return null;
1016
- }
1017
- const writeStderr = options.writeStderr ?? ((message) => process.stderr.write(message));
1018
- const auth = await ensureCloudCredentialsForCommand({
1019
- commandName: "opensteer open",
1020
- env: runtime.env,
1021
- store: options.store,
1022
- apiKeyFlag: options.apiKeyFlag,
1023
- accessTokenFlag: options.accessTokenFlag,
1024
- interactive: options.interactive,
1025
- autoLoginIfNeeded: true,
1026
- writeProgress: options.writeProgress ?? writeStderr,
1027
- writeStderr,
1028
- fetchFn: options.fetchFn,
1029
- sleep: options.sleep,
1030
- now: options.now,
1031
- openExternalUrl: options.openExternalUrl
1032
- });
1033
- applyCloudCredentialToEnv(processEnv, {
1034
- kind: auth.kind,
1035
- source: auth.source,
1036
- token: auth.token,
1037
- authScheme: auth.authScheme
1038
- });
1039
- processEnv.OPENSTEER_BASE_URL = auth.baseUrl;
1040
- return auth;
1041
- }
1042
- async function ensureCloudCredentialsForCommand(options) {
1043
- const env = options.env ?? process.env;
1044
- const writeProgress = options.writeProgress ?? options.writeStdout ?? ((message) => process.stdout.write(message));
1045
- const writeStderr = options.writeStderr ?? ((message) => process.stderr.write(message));
1046
- const fetchFn = options.fetchFn ?? fetch;
1047
- const sleep = options.sleep ?? (async (ms) => {
1048
- await new Promise((resolve) => setTimeout(resolve, ms));
1049
- });
1050
- const now = options.now ?? Date.now;
1051
- const openExternalUrl = options.openExternalUrl ?? openDefaultBrowser;
1052
- const store = options.store ?? createMachineCredentialStore({
1053
- env,
1054
- warn: (warning) => {
1055
- writeStderr(`${warning.message} (${warning.path})
1056
- `);
1057
- }
1058
- });
1059
- const { baseUrl } = resolveCloudTarget(options, env, store);
1060
- const initialCredential = resolveCloudCredential({
1061
- env,
1062
- apiKeyFlag: options.apiKeyFlag,
1063
- accessTokenFlag: options.accessTokenFlag
1064
- });
1065
- let credential = initialCredential;
1066
- if (!credential) {
1067
- const saved = store.readCloudCredential({ baseUrl });
1068
- const freshSaved = saved ? await ensureSavedCredentialIsFresh(saved, {
1069
- env,
1070
- fetchFn,
1071
- store,
1072
- now,
1073
- writeStderr
1074
- }) : null;
1075
- if (freshSaved) {
1076
- credential = {
1077
- kind: "access-token",
1078
- source: "saved",
1079
- token: freshSaved.accessToken,
1080
- authScheme: "bearer"
1081
- };
1082
- }
1083
- }
1084
- if (!credential) {
1085
- if (options.autoLoginIfNeeded && (options.interactive ?? false)) {
1086
- const loggedIn = await runDeviceLoginFlow({
1087
- authSiteUrl: resolveAuthSiteUrl(env),
1088
- fetchFn,
1089
- writeProgress,
1090
- openExternalUrl,
1091
- sleep,
1092
- now,
1093
- openBrowser: true
1094
- });
1095
- store.writeCloudCredential({
1096
- baseUrl,
1097
- scope: loggedIn.scope,
1098
- accessToken: loggedIn.accessToken,
1099
- refreshToken: loggedIn.refreshToken,
1100
- obtainedAt: now(),
1101
- expiresAt: loggedIn.expiresAt
1102
- });
1103
- credential = {
1104
- kind: "access-token",
1105
- source: "saved",
1106
- token: loggedIn.accessToken,
1107
- authScheme: "bearer"
1108
- };
1109
- writeProgress("Cloud login complete.\n");
1110
- } else {
1111
- throw new Error(toAuthMissingMessage(options.commandName));
1112
- }
1113
- }
1114
- store.writeActiveCloudTarget({ baseUrl });
1115
- applyCloudCredentialToEnv(env, credential);
1116
- env.OPENSTEER_BASE_URL = baseUrl;
1117
- return {
1118
- token: credential.token,
1119
- authScheme: credential.authScheme,
1120
- source: credential.source,
1121
- kind: credential.kind,
1122
- baseUrl
1123
- };
1124
- }
1125
- async function runLogin(args, deps) {
1126
- const { baseUrl } = resolveCloudTarget(args, deps.env, deps.store, {
1127
- allowRememberedTarget: false
1128
- });
1129
- const writeProgress = args.json ? deps.writeStderr : deps.writeStdout;
1130
- const browserOpenMode = describeBrowserOpenMode(args, deps);
1131
- const login = await runDeviceLoginFlow({
1132
- authSiteUrl: resolveAuthSiteUrl(deps.env),
1133
- fetchFn: deps.fetchFn,
1134
- writeProgress,
1135
- openExternalUrl: deps.openExternalUrl,
1136
- sleep: deps.sleep,
1137
- now: deps.now,
1138
- openBrowser: browserOpenMode.enabled,
1139
- openBrowserDisabledReason: browserOpenMode.disabledReason
1140
- });
1141
- deps.store.writeCloudCredential({
1142
- baseUrl,
1143
- scope: login.scope,
1144
- accessToken: login.accessToken,
1145
- refreshToken: login.refreshToken,
1146
- obtainedAt: deps.now(),
1147
- expiresAt: login.expiresAt
1148
- });
1149
- deps.store.writeActiveCloudTarget({ baseUrl });
1150
- if (args.json) {
1151
- writeJsonLine(deps, {
1152
- loggedIn: true,
1153
- baseUrl,
1154
- expiresAt: login.expiresAt,
1155
- scope: login.scope,
1156
- authSource: "device"
1157
- });
1158
- return 0;
1159
- }
1160
- writeHumanLine(deps, "Opensteer CLI login successful.");
1161
- return 0;
1162
- }
1163
- async function runStatus(args, deps) {
1164
- const { baseUrl } = resolveCloudTarget(args, deps.env, deps.store);
1165
- deps.store.writeActiveCloudTarget({ baseUrl });
1166
- const saved = deps.store.readCloudCredential({ baseUrl });
1167
- if (!saved) {
1168
- if (args.json) {
1169
- writeJsonLine(deps, {
1170
- loggedIn: false,
1171
- baseUrl
1172
- });
1173
- } else {
1174
- writeHumanLine(deps, `Opensteer CLI is not logged in for ${baseUrl}.`);
1175
- }
1176
- return 0;
1177
- }
1178
- const now = deps.now();
1179
- const expired = saved.expiresAt <= now;
1180
- if (args.json) {
1181
- writeJsonLine(deps, {
1182
- loggedIn: true,
1183
- expired,
1184
- baseUrl: saved.baseUrl,
1185
- expiresAt: saved.expiresAt,
1186
- scope: saved.scope
1187
- });
1188
- return 0;
1189
- }
1190
- writeHumanLine(
1191
- deps,
1192
- expired ? "Opensteer CLI has a saved login, but the access token is expired." : "Opensteer CLI is logged in."
1193
- );
1194
- writeHumanLine(deps, ` API Base URL: ${saved.baseUrl}`);
1195
- writeHumanLine(deps, ` Expires At: ${new Date(saved.expiresAt).toISOString()}`);
1196
- return 0;
1197
- }
1198
- async function runLogout(args, deps) {
1199
- const { baseUrl } = resolveCloudTarget(args, deps.env, deps.store);
1200
- deps.store.writeActiveCloudTarget({ baseUrl });
1201
- const saved = deps.store.readCloudCredential({ baseUrl });
1202
- if (saved) {
1203
- try {
1204
- await revokeToken(
1205
- resolveAuthSiteUrl(deps.env),
1206
- saved.refreshToken,
1207
- deps.fetchFn
1208
- );
1209
- } catch {
1210
- }
1211
- }
1212
- deps.store.clearCloudCredential({ baseUrl });
1213
- if (args.json) {
1214
- writeJsonLine(deps, {
1215
- loggedOut: true,
1216
- baseUrl
1217
- });
1218
- return 0;
1219
- }
1220
- writeHumanLine(deps, `Opensteer CLI login removed for ${baseUrl}.`);
1221
- return 0;
1222
- }
1223
- async function runOpensteerAuthCli(rawArgs, overrideDeps = {}) {
1224
- const deps = {
1225
- ...createDefaultDeps(),
1226
- ...overrideDeps
1227
- };
1228
- const parsed = parseOpensteerAuthArgs(rawArgs);
1229
- if (parsed.mode === "help") {
1230
- printHelp(deps);
1231
- return 0;
1232
- }
1233
- if (parsed.mode === "error") {
1234
- deps.writeStderr(`${parsed.error}
1235
- `);
1236
- deps.writeStderr('Run "opensteer auth --help" for usage.\n');
1237
- return 1;
1238
- }
1239
- try {
1240
- if (parsed.mode === "login") {
1241
- return await runLogin(parsed.args, deps);
1242
- }
1243
- if (parsed.mode === "status") {
1244
- return await runStatus(parsed.args, deps);
1245
- }
1246
- return await runLogout(parsed.args, deps);
1247
- } catch (error) {
1248
- const message = error instanceof Error ? error.message : "Auth command failed.";
1249
- deps.writeStderr(`${message}
1250
- `);
1251
- return 1;
1252
- }
1253
- }
1254
-
1255
- export {
1256
- createKeychainStore,
1257
- parseOpensteerAuthArgs,
1258
- isCloudModeEnabledForRootDir,
1259
- ensureCloudCredentialsForOpenCommand,
1260
- ensureCloudCredentialsForCommand,
1261
- runOpensteerAuthCli
1262
- };