web-agent-bridge 1.1.2 → 2.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (94) hide show
  1. package/LICENSE +21 -21
  2. package/README.ar.md +446 -446
  3. package/README.md +780 -844
  4. package/bin/cli.js +80 -80
  5. package/bin/wab.js +80 -80
  6. package/examples/bidi-agent.js +119 -119
  7. package/examples/mcp-agent.js +94 -94
  8. package/examples/next-app-router/README.md +44 -0
  9. package/examples/puppeteer-agent.js +108 -108
  10. package/examples/saas-dashboard/README.md +55 -0
  11. package/examples/shopify-hydrogen/README.md +74 -0
  12. package/examples/vision-agent.js +171 -171
  13. package/examples/wordpress-elementor/README.md +77 -0
  14. package/package.json +69 -78
  15. package/public/.well-known/ai-assets.json +59 -0
  16. package/public/admin/login.html +84 -84
  17. package/public/ai.html +196 -0
  18. package/public/cookies.html +208 -208
  19. package/public/css/premium.css +317 -0
  20. package/public/css/styles.css +1235 -1235
  21. package/public/dashboard.html +704 -704
  22. package/public/demo.html +259 -0
  23. package/public/docs.html +585 -585
  24. package/public/feed.xml +89 -0
  25. package/public/index.html +495 -332
  26. package/public/js/auth-nav.js +31 -31
  27. package/public/js/auth-redirect.js +12 -12
  28. package/public/js/cookie-consent.js +56 -56
  29. package/public/js/wab-demo-page.js +721 -0
  30. package/public/js/ws-client.js +74 -74
  31. package/public/llms-full.txt +309 -0
  32. package/public/llms.txt +85 -0
  33. package/public/login.html +83 -83
  34. package/public/openapi.json +580 -0
  35. package/public/premium-dashboard.html +2487 -0
  36. package/public/premium.html +791 -0
  37. package/public/privacy.html +295 -295
  38. package/public/register.html +103 -103
  39. package/public/robots.txt +87 -0
  40. package/public/script/wab-consent.d.ts +36 -0
  41. package/public/script/wab-consent.js +104 -0
  42. package/public/script/wab-schema.js +131 -0
  43. package/public/script/wab.d.ts +108 -0
  44. package/public/script/wab.min.js +234 -0
  45. package/public/sitemap.xml +93 -0
  46. package/public/terms.html +254 -254
  47. package/public/video/tutorial.mp4 +0 -0
  48. package/script/ai-agent-bridge.js +1558 -1513
  49. package/sdk/README.md +55 -55
  50. package/sdk/index.d.ts +118 -0
  51. package/sdk/index.js +257 -203
  52. package/sdk/package.json +14 -14
  53. package/sdk/schema-discovery.js +83 -0
  54. package/server/config/secrets.js +94 -92
  55. package/server/index.js +0 -9
  56. package/server/middleware/adminAuth.js +30 -30
  57. package/server/middleware/auth.js +41 -41
  58. package/server/middleware/rateLimits.js +24 -24
  59. package/server/migrations/001_add_analytics_indexes.sql +7 -7
  60. package/server/migrations/002_premium_features.sql +418 -0
  61. package/server/models/adapters/index.js +33 -33
  62. package/server/models/adapters/mysql.js +183 -183
  63. package/server/models/adapters/postgresql.js +172 -172
  64. package/server/models/adapters/sqlite.js +7 -7
  65. package/server/models/db.js +561 -561
  66. package/server/routes/admin-premium.js +671 -0
  67. package/server/routes/admin.js +247 -247
  68. package/server/routes/api.js +131 -138
  69. package/server/routes/auth.js +51 -51
  70. package/server/routes/billing.js +45 -45
  71. package/server/routes/discovery.js +406 -329
  72. package/server/routes/license.js +240 -240
  73. package/server/routes/noscript.js +543 -543
  74. package/server/routes/premium-v2.js +686 -0
  75. package/server/routes/premium.js +724 -0
  76. package/server/routes/wab-api.js +476 -476
  77. package/server/services/agent-memory.js +625 -0
  78. package/server/services/email.js +204 -204
  79. package/server/services/fairness.js +420 -420
  80. package/server/services/plugins.js +747 -0
  81. package/server/services/premium.js +1883 -0
  82. package/server/services/self-healing.js +843 -0
  83. package/server/services/stripe.js +192 -192
  84. package/server/services/swarm.js +788 -0
  85. package/server/services/vision.js +871 -0
  86. package/server/utils/cache.js +125 -125
  87. package/server/utils/migrate.js +81 -81
  88. package/server/utils/secureFields.js +50 -50
  89. package/server/ws.js +101 -101
  90. package/docs/DEPLOY.md +0 -118
  91. package/docs/SPEC.md +0 -1540
  92. package/wab-mcp-adapter/README.md +0 -136
  93. package/wab-mcp-adapter/index.js +0 -555
  94. package/wab-mcp-adapter/package.json +0 -17
@@ -1,92 +1,94 @@
1
- /**
2
- * Central JWT and startup secret checks.
3
- * User tokens and admin tokens use different secrets and audiences in production.
4
- */
5
-
6
- const jwt = require('jsonwebtoken');
7
-
8
- const JWT_ISSUER = 'wab';
9
- const JWT_AUD_USER = 'wab:user';
10
- const JWT_AUD_ADMIN = 'wab:admin';
11
-
12
- const jwtVerifyUser = { issuer: JWT_ISSUER, audience: JWT_AUD_USER };
13
- const jwtVerifyAdmin = { issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN };
14
-
15
- function isTest() {
16
- return process.env.NODE_ENV === 'test';
17
- }
18
-
19
- function isProd() {
20
- return process.env.NODE_ENV === 'production';
21
- }
22
-
23
- function assertSecretsAtStartup() {
24
- if (isTest()) return;
25
- if (isProd()) {
26
- if (!process.env.JWT_SECRET) {
27
- throw new Error('FATAL: JWT_SECRET is required in production');
28
- }
29
- if (!process.env.JWT_SECRET_ADMIN) {
30
- throw new Error('FATAL: JWT_SECRET_ADMIN is required in production');
31
- }
32
- }
33
- }
34
-
35
- function getJwtUserSecret() {
36
- if (isTest()) {
37
- return process.env.JWT_SECRET || 'test-secret-key-for-testing';
38
- }
39
- if (isProd()) {
40
- return process.env.JWT_SECRET;
41
- }
42
- return process.env.JWT_SECRET || 'dev-user-secret-change-in-development';
43
- }
44
-
45
- function getJwtAdminSecret() {
46
- if (isTest()) {
47
- return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || 'test-secret-key-for-testing-admin';
48
- }
49
- if (isProd()) {
50
- return process.env.JWT_SECRET_ADMIN;
51
- }
52
- return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || 'dev-admin-secret-change-in-development';
53
- }
54
-
55
- function signUserToken(payload, options = {}) {
56
- return jwt.sign(
57
- { ...payload },
58
- getJwtUserSecret(),
59
- { expiresIn: options.expiresIn || '7d', issuer: JWT_ISSUER, audience: JWT_AUD_USER }
60
- );
61
- }
62
-
63
- function signAdminToken(payload, options = {}) {
64
- return jwt.sign(
65
- { ...payload },
66
- getJwtAdminSecret(),
67
- { expiresIn: options.expiresIn || '12h', issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN }
68
- );
69
- }
70
-
71
- function verifyUserToken(token) {
72
- return jwt.verify(token, getJwtUserSecret(), jwtVerifyUser);
73
- }
74
-
75
- function verifyAdminToken(token) {
76
- return jwt.verify(token, getJwtAdminSecret(), jwtVerifyAdmin);
77
- }
78
-
79
- module.exports = {
80
- assertSecretsAtStartup,
81
- getJwtUserSecret,
82
- getJwtAdminSecret,
83
- signUserToken,
84
- signAdminToken,
85
- verifyUserToken,
86
- verifyAdminToken,
87
- JWT_ISSUER,
88
- JWT_AUD_USER,
89
- JWT_AUD_ADMIN,
90
- jwtVerifyUser,
91
- jwtVerifyAdmin
92
- };
1
+ /**
2
+ * Central JWT and startup secret checks.
3
+ * User tokens and admin tokens use different secrets and audiences in production.
4
+ */
5
+
6
+ const crypto = require('crypto');
7
+ const jwt = require('jsonwebtoken');
8
+
9
+ const JWT_ISSUER = 'wab';
10
+ const JWT_AUD_USER = 'wab:user';
11
+ const JWT_AUD_ADMIN = 'wab:admin';
12
+
13
+ const jwtVerifyUser = { issuer: JWT_ISSUER, audience: JWT_AUD_USER };
14
+ const jwtVerifyAdmin = { issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN };
15
+
16
+ let _autoUserSecret = null;
17
+ let _autoAdminSecret = null;
18
+
19
+ function generateAutoSecret(label) {
20
+ const secret = crypto.randomBytes(48).toString('base64url');
21
+ console.warn(`[WAB] WARNING: ${label} not set — generated ephemeral secret. Tokens will not survive restarts. Set ${label} env var for persistent sessions.`);
22
+ return secret;
23
+ }
24
+
25
+ function isTest() {
26
+ return process.env.NODE_ENV === 'test';
27
+ }
28
+
29
+ function isProd() {
30
+ return process.env.NODE_ENV === 'production';
31
+ }
32
+
33
+ function assertSecretsAtStartup() {
34
+ if (isTest()) return;
35
+ if (isProd() && !process.env.JWT_SECRET) {
36
+ _autoUserSecret = generateAutoSecret('JWT_SECRET');
37
+ }
38
+ if (isProd() && !process.env.JWT_SECRET_ADMIN) {
39
+ _autoAdminSecret = generateAutoSecret('JWT_SECRET_ADMIN');
40
+ }
41
+ }
42
+
43
+ function getJwtUserSecret() {
44
+ if (isTest()) {
45
+ return process.env.JWT_SECRET || 'test-secret-key-for-testing';
46
+ }
47
+ return process.env.JWT_SECRET || _autoUserSecret || 'dev-user-secret-change-in-development';
48
+ }
49
+
50
+ function getJwtAdminSecret() {
51
+ if (isTest()) {
52
+ return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || 'test-secret-key-for-testing-admin';
53
+ }
54
+ return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || _autoAdminSecret || _autoUserSecret || 'dev-admin-secret-change-in-development';
55
+ }
56
+
57
+ function signUserToken(payload, options = {}) {
58
+ return jwt.sign(
59
+ { ...payload },
60
+ getJwtUserSecret(),
61
+ { expiresIn: options.expiresIn || '7d', issuer: JWT_ISSUER, audience: JWT_AUD_USER }
62
+ );
63
+ }
64
+
65
+ function signAdminToken(payload, options = {}) {
66
+ return jwt.sign(
67
+ { ...payload },
68
+ getJwtAdminSecret(),
69
+ { expiresIn: options.expiresIn || '12h', issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN }
70
+ );
71
+ }
72
+
73
+ function verifyUserToken(token) {
74
+ return jwt.verify(token, getJwtUserSecret(), jwtVerifyUser);
75
+ }
76
+
77
+ function verifyAdminToken(token) {
78
+ return jwt.verify(token, getJwtAdminSecret(), jwtVerifyAdmin);
79
+ }
80
+
81
+ module.exports = {
82
+ assertSecretsAtStartup,
83
+ getJwtUserSecret,
84
+ getJwtAdminSecret,
85
+ signUserToken,
86
+ signAdminToken,
87
+ verifyUserToken,
88
+ verifyAdminToken,
89
+ JWT_ISSUER,
90
+ JWT_AUD_USER,
91
+ JWT_AUD_ADMIN,
92
+ jwtVerifyUser,
93
+ jwtVerifyAdmin
94
+ };
package/server/index.js CHANGED
@@ -18,9 +18,6 @@ const apiRoutes = require('./routes/api');
18
18
  const licenseRoutes = require('./routes/license');
19
19
  const adminRoutes = require('./routes/admin');
20
20
  const billingRoutes = require('./routes/billing');
21
- const noscriptRoutes = require('./routes/noscript');
22
- const discoveryRoutes = require('./routes/discovery');
23
- const wabApiRoutes = require('./routes/wab-api');
24
21
  const { handleWebhookRequest } = require('./services/stripe');
25
22
 
26
23
  const app = express();
@@ -114,9 +111,6 @@ app.use('/api', apiLimiter, apiRoutes);
114
111
  app.use('/api/license', licenseLimiter, licenseRoutes);
115
112
  app.use('/api/admin', apiLimiter, adminRoutes);
116
113
  app.use('/api/billing', apiLimiter, billingRoutes);
117
- app.use('/api/noscript', noscriptRoutes);
118
- app.use('/api/wab', wabApiRoutes);
119
- app.use('/', discoveryRoutes);
120
114
 
121
115
  app.get('/dashboard', (req, res) => {
122
116
  res.sendFile(path.join(__dirname, '..', 'public', 'dashboard.html'));
@@ -136,9 +130,6 @@ app.get('/admin/login', (req, res) => {
136
130
  app.get('/admin', (req, res) => {
137
131
  res.sendFile(path.join(__dirname, '..', 'public', 'admin', 'dashboard.html'));
138
132
  });
139
- app.get('/premium', (req, res) => {
140
- res.sendFile(path.join(__dirname, '..', 'public', 'premium.html'));
141
- });
142
133
  app.get('/privacy', (req, res) => {
143
134
  res.sendFile(path.join(__dirname, '..', 'public', 'privacy.html'));
144
135
  });
@@ -1,30 +1,30 @@
1
- const { signAdminToken, verifyAdminToken } = require('../config/secrets');
2
-
3
- function generateAdminToken(admin) {
4
- return signAdminToken(
5
- { id: admin.id, email: admin.email, name: admin.name, role: admin.role, isAdmin: true },
6
- { expiresIn: '12h' }
7
- );
8
- }
9
-
10
- function authenticateAdmin(req, res, next) {
11
- const authHeader = req.headers['authorization'];
12
- const token = authHeader && authHeader.split(' ')[1];
13
-
14
- if (!token) {
15
- return res.status(401).json({ error: 'Admin access token required' });
16
- }
17
-
18
- try {
19
- const decoded = verifyAdminToken(token);
20
- if (!decoded.isAdmin) {
21
- return res.status(403).json({ error: 'Admin privileges required' });
22
- }
23
- req.admin = decoded;
24
- next();
25
- } catch (err) {
26
- return res.status(403).json({ error: 'Invalid or expired admin token' });
27
- }
28
- }
29
-
30
- module.exports = { generateAdminToken, authenticateAdmin };
1
+ const { signAdminToken, verifyAdminToken } = require('../config/secrets');
2
+
3
+ function generateAdminToken(admin) {
4
+ return signAdminToken(
5
+ { id: admin.id, email: admin.email, name: admin.name, role: admin.role, isAdmin: true },
6
+ { expiresIn: '12h' }
7
+ );
8
+ }
9
+
10
+ function authenticateAdmin(req, res, next) {
11
+ const authHeader = req.headers['authorization'];
12
+ const token = authHeader && authHeader.split(' ')[1];
13
+
14
+ if (!token) {
15
+ return res.status(401).json({ error: 'Admin access token required' });
16
+ }
17
+
18
+ try {
19
+ const decoded = verifyAdminToken(token);
20
+ if (!decoded.isAdmin) {
21
+ return res.status(403).json({ error: 'Admin privileges required' });
22
+ }
23
+ req.admin = decoded;
24
+ next();
25
+ } catch (err) {
26
+ return res.status(403).json({ error: 'Invalid or expired admin token' });
27
+ }
28
+ }
29
+
30
+ module.exports = { generateAdminToken, authenticateAdmin };
@@ -1,41 +1,41 @@
1
- const { signUserToken, verifyUserToken } = require('../config/secrets');
2
-
3
- function generateToken(user) {
4
- return signUserToken(
5
- { id: user.id, email: user.email, name: user.name },
6
- { expiresIn: '7d' }
7
- );
8
- }
9
-
10
- function authenticateToken(req, res, next) {
11
- const authHeader = req.headers['authorization'];
12
- const token = authHeader && authHeader.split(' ')[1];
13
-
14
- if (!token) {
15
- return res.status(401).json({ error: 'Access token required' });
16
- }
17
-
18
- try {
19
- const decoded = verifyUserToken(token);
20
- req.user = decoded;
21
- next();
22
- } catch (err) {
23
- return res.status(403).json({ error: 'Invalid or expired token' });
24
- }
25
- }
26
-
27
- function optionalAuth(req, res, next) {
28
- const authHeader = req.headers['authorization'];
29
- const token = authHeader && authHeader.split(' ')[1];
30
-
31
- if (token) {
32
- try {
33
- req.user = verifyUserToken(token);
34
- } catch (e) {
35
- // ignore invalid tokens for optional auth
36
- }
37
- }
38
- next();
39
- }
40
-
41
- module.exports = { generateToken, authenticateToken, optionalAuth };
1
+ const { signUserToken, verifyUserToken } = require('../config/secrets');
2
+
3
+ function generateToken(user) {
4
+ return signUserToken(
5
+ { id: user.id, email: user.email, name: user.name },
6
+ { expiresIn: '7d' }
7
+ );
8
+ }
9
+
10
+ function authenticateToken(req, res, next) {
11
+ const authHeader = req.headers['authorization'];
12
+ const token = authHeader && authHeader.split(' ')[1];
13
+
14
+ if (!token) {
15
+ return res.status(401).json({ error: 'Access token required' });
16
+ }
17
+
18
+ try {
19
+ const decoded = verifyUserToken(token);
20
+ req.user = decoded;
21
+ next();
22
+ } catch (err) {
23
+ return res.status(403).json({ error: 'Invalid or expired token' });
24
+ }
25
+ }
26
+
27
+ function optionalAuth(req, res, next) {
28
+ const authHeader = req.headers['authorization'];
29
+ const token = authHeader && authHeader.split(' ')[1];
30
+
31
+ if (token) {
32
+ try {
33
+ req.user = verifyUserToken(token);
34
+ } catch (e) {
35
+ // ignore invalid tokens for optional auth
36
+ }
37
+ }
38
+ next();
39
+ }
40
+
41
+ module.exports = { generateToken, authenticateToken, optionalAuth };
@@ -1,24 +1,24 @@
1
- /**
2
- * Stricter rate limits for license token / track endpoints (used inside license router).
3
- */
4
-
5
- const rateLimit = require('express-rate-limit');
6
-
7
- const licenseTokenLimiter = rateLimit({
8
- windowMs: 15 * 60 * 1000,
9
- max: 30,
10
- standardHeaders: true,
11
- legacyHeaders: false,
12
- message: { error: 'Too many token requests, please try again later' }
13
- });
14
-
15
- const licenseTrackLimiter = rateLimit({
16
- windowMs: 60 * 1000,
17
- max: 300,
18
- standardHeaders: true,
19
- legacyHeaders: false,
20
- keyGenerator: (req) => `${req.ip}:${req.body?.sessionToken || req.body?.siteId || 'anon'}`,
21
- message: { error: 'Too many track requests, please try again later' }
22
- });
23
-
24
- module.exports = { licenseTokenLimiter, licenseTrackLimiter };
1
+ /**
2
+ * Stricter rate limits for license token / track endpoints (used inside license router).
3
+ */
4
+
5
+ const rateLimit = require('express-rate-limit');
6
+
7
+ const licenseTokenLimiter = rateLimit({
8
+ windowMs: 15 * 60 * 1000,
9
+ max: 30,
10
+ standardHeaders: true,
11
+ legacyHeaders: false,
12
+ message: { error: 'Too many token requests, please try again later' }
13
+ });
14
+
15
+ const licenseTrackLimiter = rateLimit({
16
+ windowMs: 60 * 1000,
17
+ max: 300,
18
+ standardHeaders: true,
19
+ legacyHeaders: false,
20
+ keyGenerator: (req) => `${req.ip}:${req.body?.sessionToken || req.body?.siteId || 'anon'}`,
21
+ message: { error: 'Too many track requests, please try again later' }
22
+ });
23
+
24
+ module.exports = { licenseTokenLimiter, licenseTrackLimiter };
@@ -1,7 +1,7 @@
1
- -- Migration 001: Add composite indexes for analytics performance
2
- -- Created: 2024-12-01
3
-
4
- CREATE INDEX IF NOT EXISTS idx_analytics_site_action ON analytics(site_id, action_name);
5
- CREATE INDEX IF NOT EXISTS idx_analytics_site_created ON analytics(site_id, created_at);
6
- CREATE INDEX IF NOT EXISTS idx_subscriptions_user ON subscriptions(user_id);
7
- CREATE INDEX IF NOT EXISTS idx_subscriptions_status ON subscriptions(status);
1
+ -- Migration 001: Add composite indexes for analytics performance
2
+ -- Created: 2024-12-01
3
+
4
+ CREATE INDEX IF NOT EXISTS idx_analytics_site_action ON analytics(site_id, action_name);
5
+ CREATE INDEX IF NOT EXISTS idx_analytics_site_created ON analytics(site_id, created_at);
6
+ CREATE INDEX IF NOT EXISTS idx_subscriptions_user ON subscriptions(user_id);
7
+ CREATE INDEX IF NOT EXISTS idx_subscriptions_status ON subscriptions(status);