web-agent-bridge 1.2.0 → 2.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. package/LICENSE +21 -21
  2. package/README.ar.md +572 -446
  3. package/README.md +968 -933
  4. package/bin/agent-runner.js +465 -0
  5. package/bin/cli.js +138 -80
  6. package/bin/wab.js +80 -80
  7. package/examples/bidi-agent.js +119 -119
  8. package/examples/mcp-agent.js +94 -94
  9. package/examples/next-app-router/README.md +44 -0
  10. package/examples/puppeteer-agent.js +108 -108
  11. package/examples/saas-dashboard/README.md +55 -0
  12. package/examples/shopify-hydrogen/README.md +74 -0
  13. package/examples/vision-agent.js +171 -171
  14. package/examples/wordpress-elementor/README.md +77 -0
  15. package/package.json +71 -78
  16. package/public/.well-known/ai-assets.json +59 -0
  17. package/public/admin/login.html +84 -84
  18. package/public/ai.html +196 -0
  19. package/public/cookies.html +208 -208
  20. package/public/css/premium.css +317 -0
  21. package/public/css/styles.css +1235 -1235
  22. package/public/dashboard.html +704 -704
  23. package/public/demo.html +259 -0
  24. package/public/docs.html +585 -585
  25. package/public/feed.xml +89 -0
  26. package/public/index.html +581 -332
  27. package/public/js/auth-nav.js +31 -31
  28. package/public/js/auth-redirect.js +12 -12
  29. package/public/js/cookie-consent.js +56 -56
  30. package/public/js/wab-demo-page.js +721 -0
  31. package/public/js/ws-client.js +74 -74
  32. package/public/llms-full.txt +309 -0
  33. package/public/llms.txt +85 -0
  34. package/public/login.html +83 -83
  35. package/public/openapi.json +580 -0
  36. package/public/premium-dashboard.html +2487 -0
  37. package/public/premium.html +791 -0
  38. package/public/privacy.html +295 -295
  39. package/public/register.html +103 -103
  40. package/public/robots.txt +87 -0
  41. package/public/script/wab-consent.d.ts +36 -0
  42. package/public/script/wab-consent.js +104 -0
  43. package/public/script/wab-schema.js +131 -0
  44. package/public/script/wab.d.ts +108 -0
  45. package/public/script/wab.min.js +405 -0
  46. package/public/sitemap.xml +93 -0
  47. package/public/sovereign.html +660 -0
  48. package/public/terms.html +254 -254
  49. package/public/video/tutorial.mp4 +0 -0
  50. package/script/ai-agent-bridge.js +1558 -1513
  51. package/sdk/README.md +55 -55
  52. package/sdk/index.d.ts +118 -0
  53. package/sdk/index.js +257 -203
  54. package/sdk/package.json +14 -14
  55. package/sdk/schema-discovery.js +83 -0
  56. package/server/config/secrets.js +94 -92
  57. package/server/index.js +2 -9
  58. package/server/middleware/adminAuth.js +30 -30
  59. package/server/middleware/auth.js +41 -41
  60. package/server/middleware/rateLimits.js +24 -24
  61. package/server/migrations/001_add_analytics_indexes.sql +7 -7
  62. package/server/migrations/002_premium_features.sql +418 -0
  63. package/server/models/adapters/index.js +33 -33
  64. package/server/models/adapters/mysql.js +183 -183
  65. package/server/models/adapters/postgresql.js +172 -172
  66. package/server/models/adapters/sqlite.js +7 -7
  67. package/server/models/db.js +561 -561
  68. package/server/routes/admin-premium.js +671 -0
  69. package/server/routes/admin.js +247 -247
  70. package/server/routes/api.js +131 -138
  71. package/server/routes/auth.js +51 -51
  72. package/server/routes/billing.js +45 -45
  73. package/server/routes/discovery.js +406 -329
  74. package/server/routes/license.js +240 -240
  75. package/server/routes/noscript.js +543 -543
  76. package/server/routes/premium-v2.js +686 -0
  77. package/server/routes/premium.js +724 -0
  78. package/server/routes/sovereign.js +307 -0
  79. package/server/routes/wab-api.js +476 -476
  80. package/server/services/agent-memory.js +625 -0
  81. package/server/services/email.js +204 -204
  82. package/server/services/fairness.js +420 -420
  83. package/server/services/negotiation.js +439 -0
  84. package/server/services/plugins.js +747 -0
  85. package/server/services/premium.js +1883 -0
  86. package/server/services/reputation.js +465 -0
  87. package/server/services/self-healing.js +843 -0
  88. package/server/services/stripe.js +192 -192
  89. package/server/services/swarm.js +788 -0
  90. package/server/services/verification.js +481 -0
  91. package/server/services/vision.js +871 -0
  92. package/server/utils/cache.js +125 -125
  93. package/server/utils/migrate.js +81 -81
  94. package/server/utils/secureFields.js +50 -50
  95. package/server/ws.js +101 -101
  96. package/templates/artisan-marketplace.yaml +104 -0
  97. package/templates/book-price-scout.yaml +98 -0
  98. package/templates/electronics-price-tracker.yaml +108 -0
  99. package/templates/flight-deal-hunter.yaml +113 -0
  100. package/templates/freelancer-direct.yaml +116 -0
  101. package/templates/grocery-price-compare.yaml +93 -0
  102. package/templates/hotel-direct-booking.yaml +113 -0
  103. package/templates/local-services.yaml +98 -0
  104. package/templates/olive-oil-tunisia.yaml +88 -0
  105. package/templates/organic-farm-fresh.yaml +101 -0
  106. package/templates/restaurant-direct.yaml +97 -0
  107. package/docs/DEPLOY.md +0 -118
  108. package/docs/SPEC.md +0 -1540
  109. package/wab-mcp-adapter/README.md +0 -136
  110. package/wab-mcp-adapter/index.js +0 -555
  111. package/wab-mcp-adapter/package.json +0 -17
@@ -1,92 +1,94 @@
1
- /**
2
- * Central JWT and startup secret checks.
3
- * User tokens and admin tokens use different secrets and audiences in production.
4
- */
5
-
6
- const jwt = require('jsonwebtoken');
7
-
8
- const JWT_ISSUER = 'wab';
9
- const JWT_AUD_USER = 'wab:user';
10
- const JWT_AUD_ADMIN = 'wab:admin';
11
-
12
- const jwtVerifyUser = { issuer: JWT_ISSUER, audience: JWT_AUD_USER };
13
- const jwtVerifyAdmin = { issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN };
14
-
15
- function isTest() {
16
- return process.env.NODE_ENV === 'test';
17
- }
18
-
19
- function isProd() {
20
- return process.env.NODE_ENV === 'production';
21
- }
22
-
23
- function assertSecretsAtStartup() {
24
- if (isTest()) return;
25
- if (isProd()) {
26
- if (!process.env.JWT_SECRET) {
27
- throw new Error('FATAL: JWT_SECRET is required in production');
28
- }
29
- if (!process.env.JWT_SECRET_ADMIN) {
30
- throw new Error('FATAL: JWT_SECRET_ADMIN is required in production');
31
- }
32
- }
33
- }
34
-
35
- function getJwtUserSecret() {
36
- if (isTest()) {
37
- return process.env.JWT_SECRET || 'test-secret-key-for-testing';
38
- }
39
- if (isProd()) {
40
- return process.env.JWT_SECRET;
41
- }
42
- return process.env.JWT_SECRET || 'dev-user-secret-change-in-development';
43
- }
44
-
45
- function getJwtAdminSecret() {
46
- if (isTest()) {
47
- return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || 'test-secret-key-for-testing-admin';
48
- }
49
- if (isProd()) {
50
- return process.env.JWT_SECRET_ADMIN;
51
- }
52
- return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || 'dev-admin-secret-change-in-development';
53
- }
54
-
55
- function signUserToken(payload, options = {}) {
56
- return jwt.sign(
57
- { ...payload },
58
- getJwtUserSecret(),
59
- { expiresIn: options.expiresIn || '7d', issuer: JWT_ISSUER, audience: JWT_AUD_USER }
60
- );
61
- }
62
-
63
- function signAdminToken(payload, options = {}) {
64
- return jwt.sign(
65
- { ...payload },
66
- getJwtAdminSecret(),
67
- { expiresIn: options.expiresIn || '12h', issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN }
68
- );
69
- }
70
-
71
- function verifyUserToken(token) {
72
- return jwt.verify(token, getJwtUserSecret(), jwtVerifyUser);
73
- }
74
-
75
- function verifyAdminToken(token) {
76
- return jwt.verify(token, getJwtAdminSecret(), jwtVerifyAdmin);
77
- }
78
-
79
- module.exports = {
80
- assertSecretsAtStartup,
81
- getJwtUserSecret,
82
- getJwtAdminSecret,
83
- signUserToken,
84
- signAdminToken,
85
- verifyUserToken,
86
- verifyAdminToken,
87
- JWT_ISSUER,
88
- JWT_AUD_USER,
89
- JWT_AUD_ADMIN,
90
- jwtVerifyUser,
91
- jwtVerifyAdmin
92
- };
1
+ /**
2
+ * Central JWT and startup secret checks.
3
+ * User tokens and admin tokens use different secrets and audiences in production.
4
+ */
5
+
6
+ const crypto = require('crypto');
7
+ const jwt = require('jsonwebtoken');
8
+
9
+ const JWT_ISSUER = 'wab';
10
+ const JWT_AUD_USER = 'wab:user';
11
+ const JWT_AUD_ADMIN = 'wab:admin';
12
+
13
+ const jwtVerifyUser = { issuer: JWT_ISSUER, audience: JWT_AUD_USER };
14
+ const jwtVerifyAdmin = { issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN };
15
+
16
+ let _autoUserSecret = null;
17
+ let _autoAdminSecret = null;
18
+
19
+ function generateAutoSecret(label) {
20
+ const secret = crypto.randomBytes(48).toString('base64url');
21
+ console.warn(`[WAB] WARNING: ${label} not set — generated ephemeral secret. Tokens will not survive restarts. Set ${label} env var for persistent sessions.`);
22
+ return secret;
23
+ }
24
+
25
+ function isTest() {
26
+ return process.env.NODE_ENV === 'test';
27
+ }
28
+
29
+ function isProd() {
30
+ return process.env.NODE_ENV === 'production';
31
+ }
32
+
33
+ function assertSecretsAtStartup() {
34
+ if (isTest()) return;
35
+ if (isProd() && !process.env.JWT_SECRET) {
36
+ _autoUserSecret = generateAutoSecret('JWT_SECRET');
37
+ }
38
+ if (isProd() && !process.env.JWT_SECRET_ADMIN) {
39
+ _autoAdminSecret = generateAutoSecret('JWT_SECRET_ADMIN');
40
+ }
41
+ }
42
+
43
+ function getJwtUserSecret() {
44
+ if (isTest()) {
45
+ return process.env.JWT_SECRET || 'test-secret-key-for-testing';
46
+ }
47
+ return process.env.JWT_SECRET || _autoUserSecret || 'dev-user-secret-change-in-development';
48
+ }
49
+
50
+ function getJwtAdminSecret() {
51
+ if (isTest()) {
52
+ return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || 'test-secret-key-for-testing-admin';
53
+ }
54
+ return process.env.JWT_SECRET_ADMIN || process.env.JWT_SECRET || _autoAdminSecret || _autoUserSecret || 'dev-admin-secret-change-in-development';
55
+ }
56
+
57
+ function signUserToken(payload, options = {}) {
58
+ return jwt.sign(
59
+ { ...payload },
60
+ getJwtUserSecret(),
61
+ { expiresIn: options.expiresIn || '7d', issuer: JWT_ISSUER, audience: JWT_AUD_USER }
62
+ );
63
+ }
64
+
65
+ function signAdminToken(payload, options = {}) {
66
+ return jwt.sign(
67
+ { ...payload },
68
+ getJwtAdminSecret(),
69
+ { expiresIn: options.expiresIn || '12h', issuer: JWT_ISSUER, audience: JWT_AUD_ADMIN }
70
+ );
71
+ }
72
+
73
+ function verifyUserToken(token) {
74
+ return jwt.verify(token, getJwtUserSecret(), jwtVerifyUser);
75
+ }
76
+
77
+ function verifyAdminToken(token) {
78
+ return jwt.verify(token, getJwtAdminSecret(), jwtVerifyAdmin);
79
+ }
80
+
81
+ module.exports = {
82
+ assertSecretsAtStartup,
83
+ getJwtUserSecret,
84
+ getJwtAdminSecret,
85
+ signUserToken,
86
+ signAdminToken,
87
+ verifyUserToken,
88
+ verifyAdminToken,
89
+ JWT_ISSUER,
90
+ JWT_AUD_USER,
91
+ JWT_AUD_ADMIN,
92
+ jwtVerifyUser,
93
+ jwtVerifyAdmin
94
+ };
package/server/index.js CHANGED
@@ -18,9 +18,7 @@ const apiRoutes = require('./routes/api');
18
18
  const licenseRoutes = require('./routes/license');
19
19
  const adminRoutes = require('./routes/admin');
20
20
  const billingRoutes = require('./routes/billing');
21
- const noscriptRoutes = require('./routes/noscript');
22
- const discoveryRoutes = require('./routes/discovery');
23
- const wabApiRoutes = require('./routes/wab-api');
21
+ const sovereignRoutes = require('./routes/sovereign');
24
22
  const { handleWebhookRequest } = require('./services/stripe');
25
23
 
26
24
  const app = express();
@@ -114,9 +112,7 @@ app.use('/api', apiLimiter, apiRoutes);
114
112
  app.use('/api/license', licenseLimiter, licenseRoutes);
115
113
  app.use('/api/admin', apiLimiter, adminRoutes);
116
114
  app.use('/api/billing', apiLimiter, billingRoutes);
117
- app.use('/api/noscript', noscriptRoutes);
118
- app.use('/api/wab', wabApiRoutes);
119
- app.use('/', discoveryRoutes);
115
+ app.use('/api/sovereign', apiLimiter, sovereignRoutes);
120
116
 
121
117
  app.get('/dashboard', (req, res) => {
122
118
  res.sendFile(path.join(__dirname, '..', 'public', 'dashboard.html'));
@@ -136,9 +132,6 @@ app.get('/admin/login', (req, res) => {
136
132
  app.get('/admin', (req, res) => {
137
133
  res.sendFile(path.join(__dirname, '..', 'public', 'admin', 'dashboard.html'));
138
134
  });
139
- app.get('/premium', (req, res) => {
140
- res.sendFile(path.join(__dirname, '..', 'public', 'premium.html'));
141
- });
142
135
  app.get('/privacy', (req, res) => {
143
136
  res.sendFile(path.join(__dirname, '..', 'public', 'privacy.html'));
144
137
  });
@@ -1,30 +1,30 @@
1
- const { signAdminToken, verifyAdminToken } = require('../config/secrets');
2
-
3
- function generateAdminToken(admin) {
4
- return signAdminToken(
5
- { id: admin.id, email: admin.email, name: admin.name, role: admin.role, isAdmin: true },
6
- { expiresIn: '12h' }
7
- );
8
- }
9
-
10
- function authenticateAdmin(req, res, next) {
11
- const authHeader = req.headers['authorization'];
12
- const token = authHeader && authHeader.split(' ')[1];
13
-
14
- if (!token) {
15
- return res.status(401).json({ error: 'Admin access token required' });
16
- }
17
-
18
- try {
19
- const decoded = verifyAdminToken(token);
20
- if (!decoded.isAdmin) {
21
- return res.status(403).json({ error: 'Admin privileges required' });
22
- }
23
- req.admin = decoded;
24
- next();
25
- } catch (err) {
26
- return res.status(403).json({ error: 'Invalid or expired admin token' });
27
- }
28
- }
29
-
30
- module.exports = { generateAdminToken, authenticateAdmin };
1
+ const { signAdminToken, verifyAdminToken } = require('../config/secrets');
2
+
3
+ function generateAdminToken(admin) {
4
+ return signAdminToken(
5
+ { id: admin.id, email: admin.email, name: admin.name, role: admin.role, isAdmin: true },
6
+ { expiresIn: '12h' }
7
+ );
8
+ }
9
+
10
+ function authenticateAdmin(req, res, next) {
11
+ const authHeader = req.headers['authorization'];
12
+ const token = authHeader && authHeader.split(' ')[1];
13
+
14
+ if (!token) {
15
+ return res.status(401).json({ error: 'Admin access token required' });
16
+ }
17
+
18
+ try {
19
+ const decoded = verifyAdminToken(token);
20
+ if (!decoded.isAdmin) {
21
+ return res.status(403).json({ error: 'Admin privileges required' });
22
+ }
23
+ req.admin = decoded;
24
+ next();
25
+ } catch (err) {
26
+ return res.status(403).json({ error: 'Invalid or expired admin token' });
27
+ }
28
+ }
29
+
30
+ module.exports = { generateAdminToken, authenticateAdmin };
@@ -1,41 +1,41 @@
1
- const { signUserToken, verifyUserToken } = require('../config/secrets');
2
-
3
- function generateToken(user) {
4
- return signUserToken(
5
- { id: user.id, email: user.email, name: user.name },
6
- { expiresIn: '7d' }
7
- );
8
- }
9
-
10
- function authenticateToken(req, res, next) {
11
- const authHeader = req.headers['authorization'];
12
- const token = authHeader && authHeader.split(' ')[1];
13
-
14
- if (!token) {
15
- return res.status(401).json({ error: 'Access token required' });
16
- }
17
-
18
- try {
19
- const decoded = verifyUserToken(token);
20
- req.user = decoded;
21
- next();
22
- } catch (err) {
23
- return res.status(403).json({ error: 'Invalid or expired token' });
24
- }
25
- }
26
-
27
- function optionalAuth(req, res, next) {
28
- const authHeader = req.headers['authorization'];
29
- const token = authHeader && authHeader.split(' ')[1];
30
-
31
- if (token) {
32
- try {
33
- req.user = verifyUserToken(token);
34
- } catch (e) {
35
- // ignore invalid tokens for optional auth
36
- }
37
- }
38
- next();
39
- }
40
-
41
- module.exports = { generateToken, authenticateToken, optionalAuth };
1
+ const { signUserToken, verifyUserToken } = require('../config/secrets');
2
+
3
+ function generateToken(user) {
4
+ return signUserToken(
5
+ { id: user.id, email: user.email, name: user.name },
6
+ { expiresIn: '7d' }
7
+ );
8
+ }
9
+
10
+ function authenticateToken(req, res, next) {
11
+ const authHeader = req.headers['authorization'];
12
+ const token = authHeader && authHeader.split(' ')[1];
13
+
14
+ if (!token) {
15
+ return res.status(401).json({ error: 'Access token required' });
16
+ }
17
+
18
+ try {
19
+ const decoded = verifyUserToken(token);
20
+ req.user = decoded;
21
+ next();
22
+ } catch (err) {
23
+ return res.status(403).json({ error: 'Invalid or expired token' });
24
+ }
25
+ }
26
+
27
+ function optionalAuth(req, res, next) {
28
+ const authHeader = req.headers['authorization'];
29
+ const token = authHeader && authHeader.split(' ')[1];
30
+
31
+ if (token) {
32
+ try {
33
+ req.user = verifyUserToken(token);
34
+ } catch (e) {
35
+ // ignore invalid tokens for optional auth
36
+ }
37
+ }
38
+ next();
39
+ }
40
+
41
+ module.exports = { generateToken, authenticateToken, optionalAuth };
@@ -1,24 +1,24 @@
1
- /**
2
- * Stricter rate limits for license token / track endpoints (used inside license router).
3
- */
4
-
5
- const rateLimit = require('express-rate-limit');
6
-
7
- const licenseTokenLimiter = rateLimit({
8
- windowMs: 15 * 60 * 1000,
9
- max: 30,
10
- standardHeaders: true,
11
- legacyHeaders: false,
12
- message: { error: 'Too many token requests, please try again later' }
13
- });
14
-
15
- const licenseTrackLimiter = rateLimit({
16
- windowMs: 60 * 1000,
17
- max: 300,
18
- standardHeaders: true,
19
- legacyHeaders: false,
20
- keyGenerator: (req) => `${req.ip}:${req.body?.sessionToken || req.body?.siteId || 'anon'}`,
21
- message: { error: 'Too many track requests, please try again later' }
22
- });
23
-
24
- module.exports = { licenseTokenLimiter, licenseTrackLimiter };
1
+ /**
2
+ * Stricter rate limits for license token / track endpoints (used inside license router).
3
+ */
4
+
5
+ const rateLimit = require('express-rate-limit');
6
+
7
+ const licenseTokenLimiter = rateLimit({
8
+ windowMs: 15 * 60 * 1000,
9
+ max: 30,
10
+ standardHeaders: true,
11
+ legacyHeaders: false,
12
+ message: { error: 'Too many token requests, please try again later' }
13
+ });
14
+
15
+ const licenseTrackLimiter = rateLimit({
16
+ windowMs: 60 * 1000,
17
+ max: 300,
18
+ standardHeaders: true,
19
+ legacyHeaders: false,
20
+ keyGenerator: (req) => `${req.ip}:${req.body?.sessionToken || req.body?.siteId || 'anon'}`,
21
+ message: { error: 'Too many track requests, please try again later' }
22
+ });
23
+
24
+ module.exports = { licenseTokenLimiter, licenseTrackLimiter };
@@ -1,7 +1,7 @@
1
- -- Migration 001: Add composite indexes for analytics performance
2
- -- Created: 2024-12-01
3
-
4
- CREATE INDEX IF NOT EXISTS idx_analytics_site_action ON analytics(site_id, action_name);
5
- CREATE INDEX IF NOT EXISTS idx_analytics_site_created ON analytics(site_id, created_at);
6
- CREATE INDEX IF NOT EXISTS idx_subscriptions_user ON subscriptions(user_id);
7
- CREATE INDEX IF NOT EXISTS idx_subscriptions_status ON subscriptions(status);
1
+ -- Migration 001: Add composite indexes for analytics performance
2
+ -- Created: 2024-12-01
3
+
4
+ CREATE INDEX IF NOT EXISTS idx_analytics_site_action ON analytics(site_id, action_name);
5
+ CREATE INDEX IF NOT EXISTS idx_analytics_site_created ON analytics(site_id, created_at);
6
+ CREATE INDEX IF NOT EXISTS idx_subscriptions_user ON subscriptions(user_id);
7
+ CREATE INDEX IF NOT EXISTS idx_subscriptions_status ON subscriptions(status);