web-agent-bridge 3.2.0 → 3.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (256) hide show
  1. package/LICENSE +84 -72
  2. package/README.ar.md +1304 -1152
  3. package/README.md +298 -1635
  4. package/bin/agent-runner.js +474 -474
  5. package/bin/cli.js +237 -138
  6. package/bin/wab-init.js +223 -0
  7. package/bin/wab.js +80 -80
  8. package/examples/azure-dns-wab.js +83 -0
  9. package/examples/bidi-agent.js +119 -119
  10. package/examples/cloudflare-wab-dns.js +121 -0
  11. package/examples/cpanel-wab-dns.js +114 -0
  12. package/examples/cross-site-agent.js +91 -91
  13. package/examples/dns-discovery-agent.js +166 -0
  14. package/examples/gcp-dns-wab.js +76 -0
  15. package/examples/governance-agent.js +169 -0
  16. package/examples/mcp-agent.js +94 -94
  17. package/examples/next-app-router/README.md +44 -44
  18. package/examples/plesk-wab-dns.js +103 -0
  19. package/examples/puppeteer-agent.js +108 -108
  20. package/examples/route53-wab-dns.js +144 -0
  21. package/examples/saas-dashboard/README.md +55 -55
  22. package/examples/safe-mode-agent.js +96 -0
  23. package/examples/shopify-hydrogen/README.md +74 -74
  24. package/examples/vision-agent.js +171 -171
  25. package/examples/wab-sign.js +74 -0
  26. package/examples/wab-verify.js +60 -0
  27. package/examples/wordpress-elementor/README.md +77 -77
  28. package/package.json +19 -6
  29. package/public/.well-known/agent-tools.json +180 -180
  30. package/public/.well-known/ai-assets.json +59 -59
  31. package/public/.well-known/security.txt +8 -0
  32. package/public/.well-known/wab.json +28 -0
  33. package/public/activate.html +368 -0
  34. package/public/adoption-metrics.html +188 -0
  35. package/public/agent-workspace.html +349 -349
  36. package/public/ai.html +198 -198
  37. package/public/api.html +413 -412
  38. package/public/azure-dns-integration.html +289 -0
  39. package/public/browser.html +486 -486
  40. package/public/cloudflare-integration.html +380 -0
  41. package/public/commander-dashboard.html +243 -243
  42. package/public/cookies.html +210 -210
  43. package/public/cpanel-integration.html +398 -0
  44. package/public/css/agent-workspace.css +1713 -1713
  45. package/public/css/premium.css +317 -317
  46. package/public/css/styles.css +1263 -1235
  47. package/public/dashboard.html +707 -706
  48. package/public/dns.html +436 -0
  49. package/public/docs.html +588 -587
  50. package/public/feed.xml +89 -89
  51. package/public/gcp-dns-integration.html +318 -0
  52. package/public/growth.html +465 -463
  53. package/public/index.html +1266 -982
  54. package/public/integrations.html +556 -0
  55. package/public/js/activate.js +145 -0
  56. package/public/js/agent-workspace.js +1740 -1740
  57. package/public/js/auth-nav.js +65 -31
  58. package/public/js/auth-redirect.js +12 -12
  59. package/public/js/cookie-consent.js +56 -56
  60. package/public/js/dns.js +438 -0
  61. package/public/js/wab-demo-page.js +721 -721
  62. package/public/js/ws-client.js +74 -74
  63. package/public/llms-full.txt +360 -360
  64. package/public/llms.txt +125 -125
  65. package/public/login.html +85 -85
  66. package/public/mesh-dashboard.html +328 -328
  67. package/public/openapi.json +669 -580
  68. package/public/phone-shield.html +281 -0
  69. package/public/plesk-integration.html +375 -0
  70. package/public/premium-dashboard.html +2489 -2489
  71. package/public/premium.html +793 -793
  72. package/public/privacy.html +297 -297
  73. package/public/provider-onboarding.html +172 -0
  74. package/public/provider-sandbox.html +134 -0
  75. package/public/providers.html +359 -0
  76. package/public/register.html +105 -105
  77. package/public/registrar-integrations.html +141 -0
  78. package/public/robots.txt +99 -87
  79. package/public/route53-integration.html +531 -0
  80. package/public/script/wab-consent.d.ts +36 -36
  81. package/public/script/wab-consent.js +104 -104
  82. package/public/script/wab-schema.js +131 -131
  83. package/public/script/wab.d.ts +108 -108
  84. package/public/script/wab.min.js +580 -580
  85. package/public/security.txt +8 -0
  86. package/public/shieldqr.html +231 -0
  87. package/public/sitemap.xml +6 -0
  88. package/public/terms.html +256 -256
  89. package/public/wab-trust.html +200 -0
  90. package/public/wab-vs-protocols.html +210 -0
  91. package/public/whitepaper.html +449 -0
  92. package/script/ai-agent-bridge.js +1754 -1754
  93. package/sdk/README.md +99 -99
  94. package/sdk/agent-mesh.js +449 -449
  95. package/sdk/auto-discovery.js +288 -0
  96. package/sdk/commander.js +262 -262
  97. package/sdk/governance.js +262 -0
  98. package/sdk/index.d.ts +464 -464
  99. package/sdk/index.js +25 -1
  100. package/sdk/multi-agent.js +318 -318
  101. package/sdk/package.json +2 -2
  102. package/sdk/safe-mode.js +221 -0
  103. package/sdk/safety-shield.js +219 -0
  104. package/sdk/schema-discovery.js +83 -83
  105. package/server/adapters/index.js +520 -520
  106. package/server/config/plans.js +367 -367
  107. package/server/config/secrets.js +102 -102
  108. package/server/control-plane/index.js +301 -301
  109. package/server/data-plane/index.js +354 -354
  110. package/server/index.js +670 -427
  111. package/server/llm/index.js +404 -404
  112. package/server/middleware/adminAuth.js +35 -35
  113. package/server/middleware/auth.js +50 -50
  114. package/server/middleware/featureGate.js +88 -88
  115. package/server/middleware/rateLimits.js +100 -100
  116. package/server/middleware/sensitiveAction.js +157 -0
  117. package/server/migrations/001_add_analytics_indexes.sql +7 -7
  118. package/server/migrations/002_premium_features.sql +418 -418
  119. package/server/migrations/003_ads_integer_cents.sql +33 -33
  120. package/server/migrations/004_agent_os.sql +158 -158
  121. package/server/migrations/005_marketplace_metering.sql +126 -126
  122. package/server/migrations/007_governance.sql +106 -0
  123. package/server/migrations/008_plans.sql +144 -0
  124. package/server/migrations/009_shieldqr.sql +30 -0
  125. package/server/migrations/010_extended_trust.sql +33 -0
  126. package/server/models/adapters/index.js +33 -33
  127. package/server/models/adapters/mysql.js +183 -183
  128. package/server/models/adapters/postgresql.js +172 -172
  129. package/server/models/adapters/sqlite.js +7 -7
  130. package/server/models/db.js +740 -681
  131. package/server/observability/failure-analysis.js +337 -337
  132. package/server/observability/index.js +394 -394
  133. package/server/protocol/capabilities.js +223 -223
  134. package/server/protocol/index.js +243 -243
  135. package/server/protocol/schema.js +584 -584
  136. package/server/registry/certification.js +271 -271
  137. package/server/registry/index.js +326 -326
  138. package/server/routes/admin-plans.js +76 -0
  139. package/server/routes/admin-premium.js +673 -671
  140. package/server/routes/admin-shieldqr.js +90 -0
  141. package/server/routes/admin-trust-monitor.js +83 -0
  142. package/server/routes/admin.js +549 -261
  143. package/server/routes/ads.js +130 -130
  144. package/server/routes/agent-workspace.js +540 -540
  145. package/server/routes/api.js +150 -150
  146. package/server/routes/auth.js +71 -71
  147. package/server/routes/billing.js +57 -45
  148. package/server/routes/commander.js +316 -316
  149. package/server/routes/demo-showcase.js +332 -332
  150. package/server/routes/demo-store.js +154 -0
  151. package/server/routes/discovery.js +2348 -417
  152. package/server/routes/gateway.js +173 -157
  153. package/server/routes/governance.js +208 -0
  154. package/server/routes/license.js +251 -240
  155. package/server/routes/mesh.js +469 -469
  156. package/server/routes/noscript.js +543 -543
  157. package/server/routes/plans.js +33 -0
  158. package/server/routes/premium-v2.js +686 -686
  159. package/server/routes/premium.js +724 -724
  160. package/server/routes/providers.js +650 -0
  161. package/server/routes/runtime.js +2148 -2147
  162. package/server/routes/shieldqr.js +88 -0
  163. package/server/routes/sovereign.js +465 -385
  164. package/server/routes/universal.js +200 -185
  165. package/server/routes/wab-api.js +850 -501
  166. package/server/runtime/container-worker.js +111 -111
  167. package/server/runtime/container.js +448 -448
  168. package/server/runtime/distributed-worker.js +362 -362
  169. package/server/runtime/event-bus.js +210 -210
  170. package/server/runtime/index.js +253 -253
  171. package/server/runtime/queue.js +599 -599
  172. package/server/runtime/replay.js +666 -666
  173. package/server/runtime/sandbox.js +266 -266
  174. package/server/runtime/scheduler.js +534 -534
  175. package/server/runtime/session-engine.js +293 -293
  176. package/server/runtime/state-manager.js +188 -188
  177. package/server/security/cross-site-redactor.js +196 -0
  178. package/server/security/dry-run.js +180 -0
  179. package/server/security/human-gate-rate-limit.js +147 -0
  180. package/server/security/human-gate-transports.js +178 -0
  181. package/server/security/human-gate.js +281 -0
  182. package/server/security/index.js +368 -368
  183. package/server/security/intent-engine.js +245 -0
  184. package/server/security/reward-guard.js +171 -0
  185. package/server/security/rollback-store.js +239 -0
  186. package/server/security/token-scope.js +404 -0
  187. package/server/security/url-policy.js +139 -0
  188. package/server/services/agent-chat.js +506 -506
  189. package/server/services/agent-learning.js +601 -575
  190. package/server/services/agent-memory.js +625 -625
  191. package/server/services/agent-mesh.js +555 -539
  192. package/server/services/agent-symphony.js +717 -717
  193. package/server/services/agent-tasks.js +1807 -1807
  194. package/server/services/api-key-engine.js +292 -261
  195. package/server/services/cluster.js +894 -894
  196. package/server/services/commander.js +738 -738
  197. package/server/services/edge-compute.js +440 -440
  198. package/server/services/email.js +233 -204
  199. package/server/services/governance.js +466 -0
  200. package/server/services/hosted-runtime.js +205 -205
  201. package/server/services/lfd.js +635 -635
  202. package/server/services/local-ai.js +389 -389
  203. package/server/services/marketplace.js +270 -270
  204. package/server/services/metering.js +182 -182
  205. package/server/services/modules/affiliate-intelligence.js +93 -93
  206. package/server/services/modules/agent-firewall.js +90 -90
  207. package/server/services/modules/bounty.js +89 -89
  208. package/server/services/modules/collective-bargaining.js +92 -92
  209. package/server/services/modules/dark-pattern.js +66 -66
  210. package/server/services/modules/gov-intelligence.js +45 -45
  211. package/server/services/modules/neural.js +55 -55
  212. package/server/services/modules/notary.js +49 -49
  213. package/server/services/modules/price-time-machine.js +86 -86
  214. package/server/services/modules/protocol.js +104 -104
  215. package/server/services/negotiation.js +439 -439
  216. package/server/services/plans.js +214 -0
  217. package/server/services/plugins.js +771 -771
  218. package/server/services/premium.js +1 -1
  219. package/server/services/price-intelligence.js +566 -566
  220. package/server/services/price-shield.js +1137 -1137
  221. package/server/services/provider-clients.js +740 -0
  222. package/server/services/reputation.js +465 -465
  223. package/server/services/search-engine.js +357 -357
  224. package/server/services/security.js +513 -513
  225. package/server/services/self-healing.js +843 -843
  226. package/server/services/shieldqr.js +322 -0
  227. package/server/services/sovereign-shield.js +542 -0
  228. package/server/services/ssl-inspector.js +42 -0
  229. package/server/services/ssl-monitor.js +167 -0
  230. package/server/services/stripe.js +205 -192
  231. package/server/services/swarm.js +788 -788
  232. package/server/services/universal-scraper.js +662 -661
  233. package/server/services/verification.js +481 -481
  234. package/server/services/vision.js +1163 -1163
  235. package/server/services/wab-crypto.js +178 -0
  236. package/server/utils/cache.js +125 -125
  237. package/server/utils/migrate.js +81 -81
  238. package/server/utils/safe-fetch.js +228 -0
  239. package/server/utils/secureFields.js +50 -50
  240. package/server/ws.js +161 -161
  241. package/templates/artisan-marketplace.yaml +104 -104
  242. package/templates/book-price-scout.yaml +98 -98
  243. package/templates/electronics-price-tracker.yaml +108 -108
  244. package/templates/flight-deal-hunter.yaml +113 -113
  245. package/templates/freelancer-direct.yaml +116 -116
  246. package/templates/grocery-price-compare.yaml +93 -93
  247. package/templates/hotel-direct-booking.yaml +113 -113
  248. package/templates/local-services.yaml +98 -98
  249. package/templates/olive-oil-tunisia.yaml +88 -88
  250. package/templates/organic-farm-fresh.yaml +101 -101
  251. package/templates/restaurant-direct.yaml +97 -97
  252. package/public/score.html +0 -263
  253. package/server/migrations/006_growth_suite.sql +0 -138
  254. package/server/routes/growth.js +0 -962
  255. package/server/services/fairness-engine.js +0 -409
  256. package/server/services/fairness.js +0 -420
@@ -0,0 +1,650 @@
1
+ /**
2
+ * /api/providers — user-facing provider account management.
3
+ *
4
+ * Lets a logged-in user connect their managed-DNS provider (Cloudflare,
5
+ * Route 53, Azure, GCP, cPanel, Plesk, GoDaddy, Namecheap), test the
6
+ * connection, sync zones into provider_domains, and toggle WAB Discovery
7
+ * (`_wab` TXT record) per domain — all server-side, no browser CORS dance.
8
+ *
9
+ * Credentials are AES-256-GCM encrypted at rest via secureFields.
10
+ */
11
+
12
+ 'use strict';
13
+
14
+ const crypto = require('crypto');
15
+ const express = require('express');
16
+ const router = express.Router();
17
+
18
+ const { db } = require('../models/db');
19
+ const { authenticateToken } = require('../middleware/auth');
20
+ const { encryptOptional, decryptOptional } = require('../utils/secureFields');
21
+ const { getAdapter, listProviders } = require('../services/provider-clients');
22
+
23
+ /* ───── helpers ─────────────────────────────────────────────────────── */
24
+
25
+ function newId(prefix = 'pa') {
26
+ return `${prefix}_${crypto.randomBytes(8).toString('hex')}`;
27
+ }
28
+
29
+ function loadAccount(id, userId) {
30
+ const row = db.prepare(
31
+ `SELECT * FROM provider_accounts WHERE id = ? AND user_id = ?`
32
+ ).get(id, userId);
33
+ if (!row) return null;
34
+ let creds = null;
35
+ if (row.credentials) {
36
+ const dec = decryptOptional(row.credentials);
37
+ try { creds = dec ? JSON.parse(dec) : null; } catch { creds = null; }
38
+ }
39
+ let config = {};
40
+ try { config = row.config ? JSON.parse(row.config) : {}; } catch { config = {}; }
41
+ return { row, creds, config };
42
+ }
43
+
44
+ function publicAccount(row) {
45
+ let config = {};
46
+ try { config = row.config ? JSON.parse(row.config) : {}; } catch { config = {}; }
47
+ return {
48
+ id: row.id,
49
+ provider_type: row.provider_type,
50
+ label: row.label,
51
+ config,
52
+ status: row.status,
53
+ last_test_at: row.last_test_at,
54
+ last_test_ok: !!row.last_test_ok,
55
+ last_test_error: row.last_test_error,
56
+ last_sync_at: row.last_sync_at,
57
+ domains_count: row.domains_count,
58
+ created_at: row.created_at,
59
+ updated_at: row.updated_at,
60
+ };
61
+ }
62
+
63
+ function logAction(account_id, domain, action, status, duration_ms, detail) {
64
+ try {
65
+ db.prepare(`INSERT INTO provider_action_log
66
+ (account_id, domain, action, status, duration_ms, detail)
67
+ VALUES (?, ?, ?, ?, ?, ?)`).run(
68
+ account_id, domain || null, action, status, duration_ms || null,
69
+ detail ? String(detail).slice(0, 1000) : null
70
+ );
71
+ } catch (e) {
72
+ console.warn('[providers] log failed:', e.message);
73
+ }
74
+ }
75
+
76
+ function ensureEncryptionKey(res) {
77
+ if (!process.env.CREDENTIALS_ENCRYPTION_KEY || String(process.env.CREDENTIALS_ENCRYPTION_KEY).length < 8) {
78
+ res.status(500).json({
79
+ error: 'Server is missing CREDENTIALS_ENCRYPTION_KEY env var; refusing to store credentials in plaintext.',
80
+ });
81
+ return false;
82
+ }
83
+ return true;
84
+ }
85
+
86
+ /* ───── GET /api/providers/types — public catalog ─────────────────────── */
87
+
88
+ router.get('/types', (_req, res) => {
89
+ res.json({ providers: listProviders() });
90
+ });
91
+
92
+ /* ───── account CRUD ─────────────────────────────────────────────────── */
93
+
94
+ router.get('/accounts', authenticateToken, (req, res) => {
95
+ const rows = db.prepare(
96
+ `SELECT * FROM provider_accounts WHERE user_id = ? ORDER BY created_at DESC`
97
+ ).all(req.user.id);
98
+ res.json({ accounts: rows.map(publicAccount) });
99
+ });
100
+
101
+ router.get('/accounts/:id', authenticateToken, (req, res) => {
102
+ const acc = loadAccount(req.params.id, req.user.id);
103
+ if (!acc) return res.status(404).json({ error: 'Account not found' });
104
+ res.json({ account: publicAccount(acc.row) });
105
+ });
106
+
107
+ router.post('/accounts', authenticateToken, (req, res) => {
108
+ if (!ensureEncryptionKey(res)) return;
109
+ const { provider_type, label, credentials, config } = req.body || {};
110
+ if (!provider_type || !credentials || typeof credentials !== 'object') {
111
+ return res.status(400).json({ error: 'provider_type and credentials object required' });
112
+ }
113
+
114
+ let adapter;
115
+ try { adapter = getAdapter(provider_type); }
116
+ catch (e) { return res.status(400).json({ error: e.message }); }
117
+
118
+ for (const f of adapter.credential_fields || []) {
119
+ if (f.required && !credentials[f.key]) {
120
+ return res.status(400).json({ error: `Missing required credential: ${f.key}` });
121
+ }
122
+ }
123
+ for (const f of adapter.config_fields || []) {
124
+ if (f.required && !(config && config[f.key])) {
125
+ return res.status(400).json({ error: `Missing required config: ${f.key}` });
126
+ }
127
+ }
128
+
129
+ const id = newId();
130
+ const encCreds = encryptOptional(JSON.stringify(credentials));
131
+ db.prepare(`INSERT INTO provider_accounts
132
+ (id, user_id, provider_type, label, credentials, config, status, updated_at)
133
+ VALUES (?, ?, ?, ?, ?, ?, 'pending', datetime('now'))`).run(
134
+ id, req.user.id, provider_type, label || adapter.label, encCreds,
135
+ JSON.stringify(config || {})
136
+ );
137
+ logAction(id, null, 'create', 'ok', null, `provider=${provider_type}`);
138
+ const row = db.prepare(`SELECT * FROM provider_accounts WHERE id = ?`).get(id);
139
+ res.status(201).json({ account: publicAccount(row) });
140
+ });
141
+
142
+ router.put('/accounts/:id', authenticateToken, (req, res) => {
143
+ const acc = loadAccount(req.params.id, req.user.id);
144
+ if (!acc) return res.status(404).json({ error: 'Account not found' });
145
+ const { label, credentials, config } = req.body || {};
146
+
147
+ const updates = [`updated_at = datetime('now')`];
148
+ const args = [];
149
+ if (typeof label === 'string') { updates.push('label = ?'); args.push(label); }
150
+ if (credentials && typeof credentials === 'object') {
151
+ if (!ensureEncryptionKey(res)) return;
152
+ updates.push('credentials = ?'); args.push(encryptOptional(JSON.stringify(credentials)));
153
+ updates.push(`status = 'pending'`);
154
+ }
155
+ if (config && typeof config === 'object') {
156
+ updates.push('config = ?'); args.push(JSON.stringify(config));
157
+ }
158
+ args.push(req.params.id);
159
+ db.prepare(`UPDATE provider_accounts SET ${updates.join(', ')} WHERE id = ?`).run(...args);
160
+ logAction(req.params.id, null, 'update', 'ok', null, null);
161
+ const row = db.prepare(`SELECT * FROM provider_accounts WHERE id = ?`).get(req.params.id);
162
+ res.json({ account: publicAccount(row) });
163
+ });
164
+
165
+ router.delete('/accounts/:id', authenticateToken, (req, res) => {
166
+ const acc = loadAccount(req.params.id, req.user.id);
167
+ if (!acc) return res.status(404).json({ error: 'Account not found' });
168
+ db.prepare(`DELETE FROM provider_accounts WHERE id = ?`).run(req.params.id);
169
+ res.json({ ok: true });
170
+ });
171
+
172
+ /* ───── actions: test / sync / toggle ────────────────────────────────── */
173
+
174
+ router.post('/accounts/:id/test', authenticateToken, async (req, res) => {
175
+ const acc = loadAccount(req.params.id, req.user.id);
176
+ if (!acc) return res.status(404).json({ error: 'Account not found' });
177
+ const adapter = getAdapter(acc.row.provider_type);
178
+ const t0 = Date.now();
179
+ try {
180
+ const r = await adapter.testCredentials(acc.creds, acc.config);
181
+ db.prepare(`UPDATE provider_accounts
182
+ SET status='active', last_test_at=datetime('now'), last_test_ok=1, last_test_error=NULL, updated_at=datetime('now')
183
+ WHERE id = ?`).run(acc.row.id);
184
+ logAction(acc.row.id, null, 'test', 'ok', Date.now() - t0, r.detail);
185
+ res.json({ ok: true, detail: r.detail });
186
+ } catch (e) {
187
+ db.prepare(`UPDATE provider_accounts
188
+ SET status='error', last_test_at=datetime('now'), last_test_ok=0, last_test_error=?, updated_at=datetime('now')
189
+ WHERE id = ?`).run(String(e.message).slice(0, 500), acc.row.id);
190
+ logAction(acc.row.id, null, 'test', 'error', Date.now() - t0, e.message);
191
+ res.status(400).json({ ok: false, error: e.message });
192
+ }
193
+ });
194
+
195
+ router.post('/accounts/:id/sync', authenticateToken, async (req, res) => {
196
+ const acc = loadAccount(req.params.id, req.user.id);
197
+ if (!acc) return res.status(404).json({ error: 'Account not found' });
198
+ const adapter = getAdapter(acc.row.provider_type);
199
+ const t0 = Date.now();
200
+ try {
201
+ const zones = await adapter.listDomains(acc.creds, acc.config);
202
+ const upsert = db.prepare(`INSERT INTO provider_domains
203
+ (account_id, domain, zone_id, updated_at)
204
+ VALUES (?, ?, ?, datetime('now'))
205
+ ON CONFLICT(account_id, domain) DO UPDATE SET
206
+ zone_id = excluded.zone_id,
207
+ updated_at = excluded.updated_at`);
208
+ const tx = db.transaction((items) => {
209
+ for (const z of items) upsert.run(acc.row.id, z.domain, z.zone_id || null);
210
+ });
211
+ tx(zones);
212
+ db.prepare(`UPDATE provider_accounts
213
+ SET last_sync_at=datetime('now'), domains_count=?, status='active', updated_at=datetime('now')
214
+ WHERE id = ?`).run(zones.length, acc.row.id);
215
+ logAction(acc.row.id, null, 'sync', 'ok', Date.now() - t0, `${zones.length} domains`);
216
+ res.json({ ok: true, count: zones.length, domains: zones });
217
+ } catch (e) {
218
+ logAction(acc.row.id, null, 'sync', 'error', Date.now() - t0, e.message);
219
+ res.status(400).json({ ok: false, error: e.message });
220
+ }
221
+ });
222
+
223
+ router.get('/accounts/:id/domains', authenticateToken, (req, res) => {
224
+ const acc = loadAccount(req.params.id, req.user.id);
225
+ if (!acc) return res.status(404).json({ error: 'Account not found' });
226
+ const rows = db.prepare(
227
+ `SELECT * FROM provider_domains WHERE account_id = ? ORDER BY domain ASC`
228
+ ).all(acc.row.id);
229
+ res.json({ domains: rows });
230
+ });
231
+
232
+ function buildWabTxtValue(_userId, domain) {
233
+ return `v=wab1;manifest=https://${domain}/.well-known/wab.json`;
234
+ }
235
+
236
+ // Build a `_wab` TXT value that includes a `pk=` field when a public key
237
+ // is supplied — required for Trust Layer v1.3 (signed manifest verification).
238
+ function buildWabTxtValueWithKey(domain, publicKeyB64) {
239
+ const base = `v=wab1;manifest=https://${domain}/.well-known/wab.json`;
240
+ if (!publicKeyB64) return base;
241
+ return `${base};pk=ed25519:${publicKeyB64}`;
242
+ }
243
+
244
+ // Build a minimal but production-shaped wab.json starter manifest.
245
+ function buildStarterManifest(domain) {
246
+ return {
247
+ wab_version: '1.3',
248
+ name: domain,
249
+ description: `WAB-enabled site at ${domain}`,
250
+ endpoint: `https://${domain}/.well-known/wab.json`,
251
+ capabilities: {
252
+ discovery: true,
253
+ read: true,
254
+ execute: false,
255
+ },
256
+ actions: [
257
+ {
258
+ id: 'home',
259
+ name: 'Home page',
260
+ method: 'GET',
261
+ url: `https://${domain}/`,
262
+ readonly: true,
263
+ },
264
+ ],
265
+ contact: { type: 'web', url: `https://${domain}/` },
266
+ issued_at: new Date().toISOString(),
267
+ };
268
+ }
269
+
270
+ router.post('/accounts/:id/domains/:domain/enable-wab', authenticateToken, async (req, res) => {
271
+ const acc = loadAccount(req.params.id, req.user.id);
272
+ if (!acc) return res.status(404).json({ error: 'Account not found' });
273
+ const domain = req.params.domain;
274
+ const adapter = getAdapter(acc.row.provider_type);
275
+ const txtValue = (req.body && req.body.txt_value) || buildWabTxtValue(req.user.id, domain);
276
+ const t0 = Date.now();
277
+
278
+ const dom = db.prepare(`SELECT * FROM provider_domains WHERE account_id = ? AND domain = ?`).get(acc.row.id, domain);
279
+ const opts = dom && dom.zone_id ? { zone_id: dom.zone_id } : {};
280
+
281
+ try {
282
+ const r = await adapter.enableWAB(acc.creds, acc.config, domain, txtValue, opts);
283
+ db.prepare(`INSERT INTO provider_domains
284
+ (account_id, domain, zone_id, wab_enabled, wab_record_value, last_action, last_action_at, last_action_status, updated_at)
285
+ VALUES (?, ?, ?, 1, ?, 'enable', datetime('now'), 'ok', datetime('now'))
286
+ ON CONFLICT(account_id, domain) DO UPDATE SET
287
+ wab_enabled = 1,
288
+ wab_record_value = excluded.wab_record_value,
289
+ last_action = 'enable',
290
+ last_action_at = datetime('now'),
291
+ last_action_status = 'ok',
292
+ last_action_error = NULL,
293
+ updated_at = datetime('now')`)
294
+ .run(acc.row.id, domain, (dom && dom.zone_id) || null, txtValue);
295
+ logAction(acc.row.id, domain, 'enable-wab', 'ok', Date.now() - t0, r.detail);
296
+ res.json({ ok: true, detail: r.detail, txt_value: txtValue });
297
+ } catch (e) {
298
+ db.prepare(`INSERT INTO provider_domains
299
+ (account_id, domain, last_action, last_action_at, last_action_status, last_action_error, updated_at)
300
+ VALUES (?, ?, 'enable', datetime('now'), 'error', ?, datetime('now'))
301
+ ON CONFLICT(account_id, domain) DO UPDATE SET
302
+ last_action = 'enable',
303
+ last_action_at = datetime('now'),
304
+ last_action_status = 'error',
305
+ last_action_error = excluded.last_action_error,
306
+ updated_at = datetime('now')`)
307
+ .run(acc.row.id, domain, String(e.message).slice(0, 500));
308
+ logAction(acc.row.id, domain, 'enable-wab', 'error', Date.now() - t0, e.message);
309
+ res.status(400).json({ ok: false, error: e.message });
310
+ }
311
+ });
312
+
313
+ router.post('/accounts/:id/domains/:domain/disable-wab', authenticateToken, async (req, res) => {
314
+ const acc = loadAccount(req.params.id, req.user.id);
315
+ if (!acc) return res.status(404).json({ error: 'Account not found' });
316
+ const domain = req.params.domain;
317
+ const adapter = getAdapter(acc.row.provider_type);
318
+ const t0 = Date.now();
319
+ try {
320
+ const r = await adapter.disableWAB(acc.creds, acc.config, domain);
321
+ db.prepare(`UPDATE provider_domains SET
322
+ wab_enabled = 0,
323
+ last_action = 'disable',
324
+ last_action_at = datetime('now'),
325
+ last_action_status = 'ok',
326
+ last_action_error = NULL,
327
+ updated_at = datetime('now')
328
+ WHERE account_id = ? AND domain = ?`).run(acc.row.id, domain);
329
+ logAction(acc.row.id, domain, 'disable-wab', 'ok', Date.now() - t0, r.detail);
330
+ res.json({ ok: true, detail: r.detail });
331
+ } catch (e) {
332
+ logAction(acc.row.id, domain, 'disable-wab', 'error', Date.now() - t0, e.message);
333
+ res.status(400).json({ ok: false, error: e.message });
334
+ }
335
+ });
336
+
337
+ router.get('/accounts/:id/log', authenticateToken, (req, res) => {
338
+ const acc = loadAccount(req.params.id, req.user.id);
339
+ if (!acc) return res.status(404).json({ error: 'Account not found' });
340
+ const limit = Math.min(parseInt(req.query.limit, 10) || 50, 200);
341
+ const rows = db.prepare(
342
+ `SELECT id, domain, action, status, duration_ms, detail, created_at
343
+ FROM provider_action_log WHERE account_id = ?
344
+ ORDER BY created_at DESC LIMIT ?`
345
+ ).all(acc.row.id, limit);
346
+ res.json({ log: rows });
347
+ });
348
+
349
+ /* ───── Provider Kit (Phase 19) ──────────────────────────────────────
350
+ *
351
+ * GET /api/providers/kit/:provider?domain=example.com
352
+ *
353
+ * Returns a self-contained "Enable AI Access (WAB)" kit for any provider:
354
+ * - DNS template (record name, type, value, TTL)
355
+ * - wab.json starter (3 templates: messaging | booking | generic)
356
+ * - keypair generation script (Node + browser-friendly)
357
+ * - validation curl/script
358
+ * - provider-specific UI copy + integration hints (panel/CLI/API)
359
+ *
360
+ * Public — no auth — so providers can preview before integrating. The
361
+ * actual record push still goes through /quick-enable (auth + adapter).
362
+ */
363
+ const PROVIDER_KIT_HINTS = {
364
+ cloudflare: {
365
+ label: 'Cloudflare',
366
+ panel_path: 'DNS → Records → Add record',
367
+ cli: 'wrangler dns record create',
368
+ api_doc: 'https://developers.cloudflare.com/api/operations/dns-records-for-a-zone-create-dns-record',
369
+ button_label: 'Enable AI Access (WAB)',
370
+ integration_hint: 'Add a one-click action to the DNS dashboard that POSTs to /api/providers/quick-enable. Surface the resulting WAB Score badge on the domain summary card.',
371
+ },
372
+ godaddy: { label: 'GoDaddy', panel_path: 'My Products → DNS → Records → Add', cli: null, api_doc: 'https://developer.godaddy.com/doc/endpoint/domains', button_label: 'Enable AI Access (WAB)' },
373
+ namecheap: { label: 'Namecheap', panel_path: 'Domain List → Manage → Advanced DNS → Add New Record', cli: null, api_doc: 'https://www.namecheap.com/support/api/methods/', button_label: 'Enable AI Access (WAB)' },
374
+ route53: { label: 'AWS Route 53', panel_path: 'Hosted zones → Create record', cli: 'aws route53 change-resource-record-sets', api_doc: 'https://docs.aws.amazon.com/Route53/latest/APIReference/', button_label: 'Enable AI Access (WAB)' },
375
+ azure: { label: 'Azure DNS', panel_path: 'DNS zones → Recordsets → +Recordset', cli: 'az network dns record-set txt', api_doc: 'https://learn.microsoft.com/en-us/rest/api/dns/', button_label: 'Enable AI Access (WAB)' },
376
+ gcp: { label: 'Google Cloud DNS', panel_path: 'Network services → Cloud DNS → Zone → Add record set', cli: 'gcloud dns record-sets create', api_doc: 'https://cloud.google.com/dns/docs/reference/rest/v1', button_label: 'Enable AI Access (WAB)' },
377
+ cpanel: { label: 'cPanel', panel_path: 'Zone Editor → Add Record (TXT)', cli: 'cpanel-uapi DNS add_zone_record', api_doc: 'https://api.docs.cpanel.net/', button_label: 'Enable AI Access (WAB)' },
378
+ plesk: { label: 'Plesk', panel_path: 'Domains → DNS Settings → Add Record (TXT)', cli: 'plesk bin dns --add', api_doc: 'https://docs.plesk.com/en-US/obsidian/api-rpc/', button_label: 'Enable AI Access (WAB)' },
379
+ hostinger: { label: 'Hostinger', panel_path: 'hPanel → Domains → DNS / Nameservers → Manage DNS records → Add record (TXT)', cli: null, api_doc: 'https://developers.hostinger.com/', button_label: 'Enable AI Access (WAB)' },
380
+ generic: { label: 'Generic DNS', panel_path: 'DNS / Zone editor → Add TXT record', cli: null, api_doc: null, button_label: 'Enable AI Access (WAB)' },
381
+ };
382
+
383
+ function buildManifestTemplate(domain, kind) {
384
+ const base = {
385
+ wab_version: '1.3',
386
+ name: domain,
387
+ description: `WAB-enabled site at ${domain}`,
388
+ endpoint: `https://${domain}/.well-known/wab.json`,
389
+ contact: { type: 'web', url: `https://${domain}/` },
390
+ };
391
+ if (kind === 'messaging') {
392
+ return { ...base, capabilities: { discovery: true, read: true, execute: true },
393
+ actions: [
394
+ { id: 'send_message', name: 'Send a direct message', method: 'POST', url: `https://${domain}/api/messages`, params: [{ name: 'to', type: 'string', required: true }, { name: 'body', type: 'string', required: true }] },
395
+ { id: 'list_inbox', name: 'List recent messages', method: 'GET', url: `https://${domain}/api/messages`, readonly: true },
396
+ ] };
397
+ }
398
+ if (kind === 'booking') {
399
+ return { ...base, capabilities: { discovery: true, read: true, execute: true },
400
+ actions: [
401
+ { id: 'list_slots', name: 'List available slots', method: 'GET', url: `https://${domain}/api/availability`, readonly: true, params: [{ name: 'date', type: 'string', required: true }] },
402
+ { id: 'book', name: 'Book a slot', method: 'POST', url: `https://${domain}/api/bookings`, params: [{ name: 'slot_id', type: 'string', required: true }, { name: 'name', type: 'string', required: true }, { name: 'email', type: 'string', required: true }] },
403
+ ] };
404
+ }
405
+ return { ...base, capabilities: { discovery: true, read: true, execute: false },
406
+ actions: [{ id: 'home', name: 'Home page', method: 'GET', url: `https://${domain}/`, readonly: true }] };
407
+ }
408
+
409
+ router.get('/kit/:provider', (req, res) => {
410
+ const provider = String(req.params.provider || '').toLowerCase();
411
+ const hints = PROVIDER_KIT_HINTS[provider] || PROVIDER_KIT_HINTS.generic;
412
+
413
+ const rawDomain = String(req.query.domain || 'example.com');
414
+ const domain = sanitizeDomainQuick(rawDomain) || 'example.com';
415
+ const kind = ['messaging', 'booking', 'generic'].includes(req.query.kind) ? req.query.kind : 'generic';
416
+
417
+ // Placeholder values — operator should swap these for their own.
418
+ const samplePk = 'BASE64_PUBLIC_KEY_REPLACE_ME';
419
+ const txt = `v=wab1;manifest=https://${domain}/.well-known/wab.json;pk=ed25519:${samplePk}`;
420
+
421
+ const dns = {
422
+ name: `_wab.${domain}`,
423
+ type: 'TXT',
424
+ value: txt,
425
+ ttl: 300,
426
+ instructions: hints.panel_path,
427
+ };
428
+
429
+ const manifest = buildManifestTemplate(domain, kind);
430
+
431
+ // Self-contained Node generator script the operator can run locally.
432
+ const generatorScript =
433
+ `#!/usr/bin/env node
434
+ // One-shot Ed25519 keypair + signed wab.json + DNS TXT line.
435
+ // Save as wab-enable.js and run: node wab-enable.js ${domain}
436
+ const crypto = require('crypto');
437
+ const fs = require('fs');
438
+ const domain = process.argv[2] || '${domain}';
439
+ const { publicKey, privateKey } = crypto.generateKeyPairSync('ed25519');
440
+ const pubB64 = publicKey.export({ type: 'spki', format: 'der' }).slice(-32).toString('base64');
441
+ const privB64 = privateKey.export({ type: 'pkcs8', format: 'der' }).slice(-32).toString('base64');
442
+ const manifest = ${JSON.stringify(manifest, null, 2)};
443
+ manifest.endpoint = 'https://' + domain + '/.well-known/wab.json';
444
+ const canonical = Buffer.from(JSON.stringify(manifest));
445
+ const sig = crypto.sign(null, canonical, privateKey).toString('base64');
446
+ manifest.signature = { algorithm: 'ed25519', value: sig, key_id: crypto.createHash('sha256').update(pubB64).digest('base64').slice(0, 16), signed_at: new Date().toISOString() };
447
+ fs.writeFileSync('wab.json', JSON.stringify(manifest, null, 2));
448
+ fs.writeFileSync('wab-private.key', privB64);
449
+ console.log('wab.json written. Upload to https://' + domain + '/.well-known/wab.json');
450
+ console.log('Add DNS TXT record:');
451
+ console.log(' Name: _wab.' + domain);
452
+ console.log(' Type: TXT');
453
+ console.log(' Value: v=wab1;manifest=https://' + domain + '/.well-known/wab.json;pk=ed25519:' + pubB64);
454
+ console.log('Keep wab-private.key safe — it is your signing identity.');
455
+ `;
456
+
457
+ // Validation snippet — runs against the WAB API.
458
+ const validateScript =
459
+ `# Verify trust + score after publishing:
460
+ curl -s https://webagentbridge.com/api/discovery/trust/${domain} | jq
461
+ curl -s https://webagentbridge.com/api/discovery/score/${domain} | jq
462
+ curl -s 'https://webagentbridge.com/api/discovery/compliance/${domain}?policy=standard' | jq
463
+ `;
464
+
465
+ res.json({
466
+ wab_version: '1.3.0',
467
+ provider,
468
+ provider_label: hints.label,
469
+ domain,
470
+ kit_kind: kind,
471
+ button: {
472
+ label: hints.button_label,
473
+ action_url: `https://webagentbridge.com/api/providers/quick-enable`,
474
+ integration_hint: hints.integration_hint || 'Bind this button to a single POST to /api/providers/quick-enable with the user\'s domain. Show the returned wab.json + DNS record in a confirmation modal, then push it via your existing DNS code path.',
475
+ },
476
+ dns,
477
+ manifest,
478
+ manifest_alternatives: ['messaging', 'booking', 'generic'],
479
+ scripts: {
480
+ generator_node: generatorScript,
481
+ validate_bash: validateScript,
482
+ },
483
+ provider_panel: {
484
+ path: hints.panel_path,
485
+ cli: hints.cli,
486
+ api_doc: hints.api_doc,
487
+ },
488
+ next_steps: [
489
+ `Save scripts.generator_node as wab-enable.js and run: node wab-enable.js ${domain}`,
490
+ `Place the resulting wab.json at https://${domain}/.well-known/wab.json (HTTPS, application/json).`,
491
+ `Add the DNS TXT record shown in dns.value to ${dns.name}.`,
492
+ `Verify with scripts.validate_bash — expect trust_score ≥ 80 and signature_valid:true.`,
493
+ `Embed the badge: <img src="https://webagentbridge.com/badge/${domain}.svg">`,
494
+ ],
495
+ score_badge: `https://webagentbridge.com/badge/${domain}.svg`,
496
+ compliance_endpoint: `https://webagentbridge.com/api/discovery/compliance/${domain}`,
497
+ });
498
+ });
499
+
500
+ router.get('/kit', (_req, res) => {
501
+ res.json({
502
+ wab_version: '1.3.0',
503
+ providers: Object.keys(PROVIDER_KIT_HINTS).map(k => ({
504
+ provider: k,
505
+ label: PROVIDER_KIT_HINTS[k].label,
506
+ kit_url: `/api/providers/kit/${k}?domain=example.com`,
507
+ })),
508
+ note: 'Pass ?domain=<yourdomain>&kind=messaging|booking|generic to customise.',
509
+ });
510
+ });
511
+
512
+ /* ───── Zero-Friction Quick-Enable (Phase 18) ────────────────────────
513
+ * One call, one round-trip:
514
+ * 1. Generate fresh Ed25519 keypair (server never persists private key).
515
+ * 2. Build a starter wab.json manifest signed with that key.
516
+ * 3. Build the `_wab` TXT value with embedded pk=.
517
+ * 4. (Optional) push the TXT record live via the provider adapter.
518
+ * 5. Return everything the operator needs to drop into their site.
519
+ *
520
+ * If `account_id` is omitted, this acts as a stateless generator — useful
521
+ * for sites that don't use a managed-DNS provider integration.
522
+ *
523
+ * Body:
524
+ * { domain, account_id?, push?, manifest_overrides? }
525
+ *
526
+ * Response:
527
+ * {
528
+ * ok, domain,
529
+ * keys: { public_key, private_key, fingerprint }, // SAVE the private!
530
+ * dns: { name, type, value, ttl },
531
+ * manifest: { ... signed wab.json ... },
532
+ * pushed: boolean,
533
+ * push_detail: string|null,
534
+ * instructions: { ... }
535
+ * }
536
+ */
537
+ const wabCryptoLazy = (() => {
538
+ let mod = null;
539
+ return () => (mod = mod || require('../services/wab-crypto'));
540
+ })();
541
+
542
+ function sanitizeDomainQuick(s) {
543
+ if (!s || typeof s !== 'string') return null;
544
+ const d = s.trim().toLowerCase().replace(/^https?:\/\//, '').replace(/\/.*$/, '').replace(/^www\./, '');
545
+ return /^[a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?(\.[a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?)+$/.test(d) ? d : null;
546
+ }
547
+
548
+ router.post('/quick-enable', authenticateToken, async (req, res) => {
549
+ const body = req.body || {};
550
+ const domain = sanitizeDomainQuick(body.domain);
551
+ if (!domain) return res.status(400).json({ ok: false, error: 'invalid_domain' });
552
+
553
+ const wabCrypto = wabCryptoLazy();
554
+ const t0 = Date.now();
555
+
556
+ // 1. Generate keypair (stateless — caller is responsible for storing private key)
557
+ let kp;
558
+ try {
559
+ kp = wabCrypto.generateKeyPair();
560
+ } catch (e) {
561
+ return res.status(500).json({ ok: false, error: 'keygen_failed', details: e.message });
562
+ }
563
+
564
+ // 2. Build manifest, merge any caller overrides, then sign
565
+ const baseManifest = buildStarterManifest(domain);
566
+ const manifest = {
567
+ ...baseManifest,
568
+ ...(body.manifest_overrides && typeof body.manifest_overrides === 'object' ? body.manifest_overrides : {}),
569
+ name: (body.manifest_overrides && body.manifest_overrides.name) || baseManifest.name,
570
+ endpoint: baseManifest.endpoint, // never let overrides hijack endpoint
571
+ wab_version: baseManifest.wab_version,
572
+ issued_at: baseManifest.issued_at,
573
+ };
574
+ let signedManifest;
575
+ try {
576
+ signedManifest = wabCrypto.signManifest(manifest, kp.private_key, { key_id: kp.fingerprint });
577
+ } catch (e) {
578
+ return res.status(500).json({ ok: false, error: 'sign_failed', details: e.message });
579
+ }
580
+
581
+ // 3. Build the DNS TXT value (with pk=)
582
+ const txtValue = buildWabTxtValueWithKey(domain, kp.public_key);
583
+ const dns = { name: `_wab.${domain}`, type: 'TXT', value: txtValue, ttl: 300 };
584
+
585
+ // 4. Optionally push to provider
586
+ let pushed = false;
587
+ let pushDetail = null;
588
+ let pushError = null;
589
+ if (body.push && body.account_id) {
590
+ const acc = loadAccount(body.account_id, req.user.id);
591
+ if (!acc) {
592
+ pushError = 'account_not_found';
593
+ } else {
594
+ const adapter = getAdapter(acc.row.provider_type);
595
+ const dom = db.prepare(`SELECT * FROM provider_domains WHERE account_id = ? AND domain = ?`)
596
+ .get(acc.row.id, domain);
597
+ const opts = dom && dom.zone_id ? { zone_id: dom.zone_id } : {};
598
+ try {
599
+ const r = await adapter.enableWAB(acc.creds, acc.config, domain, txtValue, opts);
600
+ pushed = true;
601
+ pushDetail = r && r.detail;
602
+ db.prepare(`INSERT INTO provider_domains
603
+ (account_id, domain, zone_id, wab_enabled, wab_record_value, last_action, last_action_at, last_action_status, updated_at)
604
+ VALUES (?, ?, ?, 1, ?, 'enable', datetime('now'), 'ok', datetime('now'))
605
+ ON CONFLICT(account_id, domain) DO UPDATE SET
606
+ wab_enabled = 1,
607
+ wab_record_value = excluded.wab_record_value,
608
+ last_action = 'enable',
609
+ last_action_at = datetime('now'),
610
+ last_action_status = 'ok',
611
+ last_action_error = NULL,
612
+ updated_at = datetime('now')`)
613
+ .run(acc.row.id, domain, (dom && dom.zone_id) || null, txtValue);
614
+ logAction(acc.row.id, domain, 'quick-enable', 'ok', Date.now() - t0, pushDetail);
615
+ } catch (e) {
616
+ pushError = String(e.message || e).slice(0, 500);
617
+ logAction(acc.row.id, domain, 'quick-enable', 'error', Date.now() - t0, pushError);
618
+ }
619
+ }
620
+ }
621
+
622
+ res.json({
623
+ ok: true,
624
+ domain,
625
+ keys: {
626
+ algorithm: 'ed25519',
627
+ public_key: kp.public_key,
628
+ private_key: kp.private_key,
629
+ fingerprint: kp.fingerprint,
630
+ created_at: kp.created_at,
631
+ warning: 'Store private_key securely. WAB does NOT persist it server-side.',
632
+ },
633
+ dns,
634
+ manifest: signedManifest,
635
+ pushed,
636
+ push_detail: pushDetail,
637
+ push_error: pushError,
638
+ instructions: {
639
+ step_1: `Save the wab.json manifest at: https://${domain}/.well-known/wab.json (publicly readable, served as application/json over HTTPS).`,
640
+ step_2: `Add a DNS TXT record. Name: _wab.${domain} Value: ${txtValue} TTL: 300`,
641
+ step_3: 'Verify the setup with: GET /api/discovery/trust/' + domain,
642
+ step_4: 'Check your WAB Score with: GET /api/discovery/score/' + domain,
643
+ step_5: 'Embed your trust badge: <img src="https://webagentbridge.com/badge/' + domain + '.svg">',
644
+ private_key_warning: 'Keep your private_key offline (e.g. password manager / HSM). Use it only to re-sign your manifest when capabilities change.',
645
+ },
646
+ elapsed_ms: Date.now() - t0,
647
+ });
648
+ });
649
+
650
+ module.exports = router;