web-agent-bridge 3.3.0 → 3.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +12 -0
- package/README.ar.md +18 -0
- package/README.md +198 -1664
- package/bin/wab-init.js +223 -0
- package/examples/azure-dns-wab.js +83 -0
- package/examples/cloudflare-wab-dns.js +121 -0
- package/examples/cpanel-wab-dns.js +114 -0
- package/examples/dns-discovery-agent.js +166 -0
- package/examples/gcp-dns-wab.js +76 -0
- package/examples/governance-agent.js +169 -0
- package/examples/plesk-wab-dns.js +103 -0
- package/examples/route53-wab-dns.js +144 -0
- package/examples/safe-mode-agent.js +96 -0
- package/examples/wab-sign.js +74 -0
- package/examples/wab-verify.js +60 -0
- package/package.json +5 -5
- package/public/.well-known/wab.json +28 -0
- package/public/activate.html +368 -0
- package/public/adoption-metrics.html +188 -0
- package/public/api.html +1 -1
- package/public/azure-dns-integration.html +289 -0
- package/public/cloudflare-integration.html +380 -0
- package/public/cpanel-integration.html +398 -0
- package/public/css/styles.css +28 -0
- package/public/dashboard.html +1 -0
- package/public/dns.html +101 -172
- package/public/docs.html +1 -0
- package/public/gcp-dns-integration.html +318 -0
- package/public/growth.html +4 -2
- package/public/index.html +227 -31
- package/public/integrations.html +1 -1
- package/public/js/activate.js +145 -0
- package/public/js/auth-nav.js +34 -0
- package/public/js/dns.js +438 -0
- package/public/openapi.json +89 -0
- package/public/plesk-integration.html +375 -0
- package/public/premium.html +1 -1
- package/public/provider-onboarding.html +172 -0
- package/public/provider-sandbox.html +134 -0
- package/public/providers.html +359 -0
- package/public/registrar-integrations.html +141 -0
- package/public/robots.txt +12 -0
- package/public/route53-integration.html +531 -0
- package/public/shieldqr.html +231 -0
- package/public/sitemap.xml +6 -0
- package/public/wab-trust.html +200 -0
- package/public/wab-vs-protocols.html +210 -0
- package/public/whitepaper.html +449 -0
- package/sdk/auto-discovery.js +288 -0
- package/sdk/governance.js +262 -0
- package/sdk/index.js +13 -0
- package/sdk/package.json +2 -2
- package/sdk/safe-mode.js +221 -0
- package/server/index.js +144 -5
- package/server/migrations/007_governance.sql +106 -0
- package/server/migrations/008_plans.sql +144 -0
- package/server/migrations/009_shieldqr.sql +30 -0
- package/server/migrations/010_extended_trust.sql +33 -0
- package/server/models/adapters/mysql.js +1 -1
- package/server/models/adapters/postgresql.js +1 -1
- package/server/models/db.js +60 -1
- package/server/routes/admin-plans.js +76 -0
- package/server/routes/admin-premium.js +4 -2
- package/server/routes/admin-shieldqr.js +90 -0
- package/server/routes/admin-trust-monitor.js +83 -0
- package/server/routes/admin.js +289 -1
- package/server/routes/billing.js +16 -4
- package/server/routes/discovery.js +1933 -2
- package/server/routes/governance.js +208 -0
- package/server/routes/plans.js +33 -0
- package/server/routes/providers.js +650 -0
- package/server/routes/shieldqr.js +88 -0
- package/server/services/email.js +29 -0
- package/server/services/governance.js +466 -0
- package/server/services/plans.js +214 -0
- package/server/services/premium.js +1 -1
- package/server/services/provider-clients.js +740 -0
- package/server/services/shieldqr.js +322 -0
- package/server/services/ssl-inspector.js +42 -0
- package/server/services/ssl-monitor.js +167 -0
- package/server/services/stripe.js +18 -5
- package/server/services/vision.js +1 -1
- package/server/services/wab-crypto.js +178 -0
|
@@ -0,0 +1,650 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* /api/providers — user-facing provider account management.
|
|
3
|
+
*
|
|
4
|
+
* Lets a logged-in user connect their managed-DNS provider (Cloudflare,
|
|
5
|
+
* Route 53, Azure, GCP, cPanel, Plesk, GoDaddy, Namecheap), test the
|
|
6
|
+
* connection, sync zones into provider_domains, and toggle WAB Discovery
|
|
7
|
+
* (`_wab` TXT record) per domain — all server-side, no browser CORS dance.
|
|
8
|
+
*
|
|
9
|
+
* Credentials are AES-256-GCM encrypted at rest via secureFields.
|
|
10
|
+
*/
|
|
11
|
+
|
|
12
|
+
'use strict';
|
|
13
|
+
|
|
14
|
+
const crypto = require('crypto');
|
|
15
|
+
const express = require('express');
|
|
16
|
+
const router = express.Router();
|
|
17
|
+
|
|
18
|
+
const { db } = require('../models/db');
|
|
19
|
+
const { authenticateToken } = require('../middleware/auth');
|
|
20
|
+
const { encryptOptional, decryptOptional } = require('../utils/secureFields');
|
|
21
|
+
const { getAdapter, listProviders } = require('../services/provider-clients');
|
|
22
|
+
|
|
23
|
+
/* ───── helpers ─────────────────────────────────────────────────────── */
|
|
24
|
+
|
|
25
|
+
function newId(prefix = 'pa') {
|
|
26
|
+
return `${prefix}_${crypto.randomBytes(8).toString('hex')}`;
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
function loadAccount(id, userId) {
|
|
30
|
+
const row = db.prepare(
|
|
31
|
+
`SELECT * FROM provider_accounts WHERE id = ? AND user_id = ?`
|
|
32
|
+
).get(id, userId);
|
|
33
|
+
if (!row) return null;
|
|
34
|
+
let creds = null;
|
|
35
|
+
if (row.credentials) {
|
|
36
|
+
const dec = decryptOptional(row.credentials);
|
|
37
|
+
try { creds = dec ? JSON.parse(dec) : null; } catch { creds = null; }
|
|
38
|
+
}
|
|
39
|
+
let config = {};
|
|
40
|
+
try { config = row.config ? JSON.parse(row.config) : {}; } catch { config = {}; }
|
|
41
|
+
return { row, creds, config };
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
function publicAccount(row) {
|
|
45
|
+
let config = {};
|
|
46
|
+
try { config = row.config ? JSON.parse(row.config) : {}; } catch { config = {}; }
|
|
47
|
+
return {
|
|
48
|
+
id: row.id,
|
|
49
|
+
provider_type: row.provider_type,
|
|
50
|
+
label: row.label,
|
|
51
|
+
config,
|
|
52
|
+
status: row.status,
|
|
53
|
+
last_test_at: row.last_test_at,
|
|
54
|
+
last_test_ok: !!row.last_test_ok,
|
|
55
|
+
last_test_error: row.last_test_error,
|
|
56
|
+
last_sync_at: row.last_sync_at,
|
|
57
|
+
domains_count: row.domains_count,
|
|
58
|
+
created_at: row.created_at,
|
|
59
|
+
updated_at: row.updated_at,
|
|
60
|
+
};
|
|
61
|
+
}
|
|
62
|
+
|
|
63
|
+
function logAction(account_id, domain, action, status, duration_ms, detail) {
|
|
64
|
+
try {
|
|
65
|
+
db.prepare(`INSERT INTO provider_action_log
|
|
66
|
+
(account_id, domain, action, status, duration_ms, detail)
|
|
67
|
+
VALUES (?, ?, ?, ?, ?, ?)`).run(
|
|
68
|
+
account_id, domain || null, action, status, duration_ms || null,
|
|
69
|
+
detail ? String(detail).slice(0, 1000) : null
|
|
70
|
+
);
|
|
71
|
+
} catch (e) {
|
|
72
|
+
console.warn('[providers] log failed:', e.message);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
function ensureEncryptionKey(res) {
|
|
77
|
+
if (!process.env.CREDENTIALS_ENCRYPTION_KEY || String(process.env.CREDENTIALS_ENCRYPTION_KEY).length < 8) {
|
|
78
|
+
res.status(500).json({
|
|
79
|
+
error: 'Server is missing CREDENTIALS_ENCRYPTION_KEY env var; refusing to store credentials in plaintext.',
|
|
80
|
+
});
|
|
81
|
+
return false;
|
|
82
|
+
}
|
|
83
|
+
return true;
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
/* ───── GET /api/providers/types — public catalog ─────────────────────── */
|
|
87
|
+
|
|
88
|
+
router.get('/types', (_req, res) => {
|
|
89
|
+
res.json({ providers: listProviders() });
|
|
90
|
+
});
|
|
91
|
+
|
|
92
|
+
/* ───── account CRUD ─────────────────────────────────────────────────── */
|
|
93
|
+
|
|
94
|
+
router.get('/accounts', authenticateToken, (req, res) => {
|
|
95
|
+
const rows = db.prepare(
|
|
96
|
+
`SELECT * FROM provider_accounts WHERE user_id = ? ORDER BY created_at DESC`
|
|
97
|
+
).all(req.user.id);
|
|
98
|
+
res.json({ accounts: rows.map(publicAccount) });
|
|
99
|
+
});
|
|
100
|
+
|
|
101
|
+
router.get('/accounts/:id', authenticateToken, (req, res) => {
|
|
102
|
+
const acc = loadAccount(req.params.id, req.user.id);
|
|
103
|
+
if (!acc) return res.status(404).json({ error: 'Account not found' });
|
|
104
|
+
res.json({ account: publicAccount(acc.row) });
|
|
105
|
+
});
|
|
106
|
+
|
|
107
|
+
router.post('/accounts', authenticateToken, (req, res) => {
|
|
108
|
+
if (!ensureEncryptionKey(res)) return;
|
|
109
|
+
const { provider_type, label, credentials, config } = req.body || {};
|
|
110
|
+
if (!provider_type || !credentials || typeof credentials !== 'object') {
|
|
111
|
+
return res.status(400).json({ error: 'provider_type and credentials object required' });
|
|
112
|
+
}
|
|
113
|
+
|
|
114
|
+
let adapter;
|
|
115
|
+
try { adapter = getAdapter(provider_type); }
|
|
116
|
+
catch (e) { return res.status(400).json({ error: e.message }); }
|
|
117
|
+
|
|
118
|
+
for (const f of adapter.credential_fields || []) {
|
|
119
|
+
if (f.required && !credentials[f.key]) {
|
|
120
|
+
return res.status(400).json({ error: `Missing required credential: ${f.key}` });
|
|
121
|
+
}
|
|
122
|
+
}
|
|
123
|
+
for (const f of adapter.config_fields || []) {
|
|
124
|
+
if (f.required && !(config && config[f.key])) {
|
|
125
|
+
return res.status(400).json({ error: `Missing required config: ${f.key}` });
|
|
126
|
+
}
|
|
127
|
+
}
|
|
128
|
+
|
|
129
|
+
const id = newId();
|
|
130
|
+
const encCreds = encryptOptional(JSON.stringify(credentials));
|
|
131
|
+
db.prepare(`INSERT INTO provider_accounts
|
|
132
|
+
(id, user_id, provider_type, label, credentials, config, status, updated_at)
|
|
133
|
+
VALUES (?, ?, ?, ?, ?, ?, 'pending', datetime('now'))`).run(
|
|
134
|
+
id, req.user.id, provider_type, label || adapter.label, encCreds,
|
|
135
|
+
JSON.stringify(config || {})
|
|
136
|
+
);
|
|
137
|
+
logAction(id, null, 'create', 'ok', null, `provider=${provider_type}`);
|
|
138
|
+
const row = db.prepare(`SELECT * FROM provider_accounts WHERE id = ?`).get(id);
|
|
139
|
+
res.status(201).json({ account: publicAccount(row) });
|
|
140
|
+
});
|
|
141
|
+
|
|
142
|
+
router.put('/accounts/:id', authenticateToken, (req, res) => {
|
|
143
|
+
const acc = loadAccount(req.params.id, req.user.id);
|
|
144
|
+
if (!acc) return res.status(404).json({ error: 'Account not found' });
|
|
145
|
+
const { label, credentials, config } = req.body || {};
|
|
146
|
+
|
|
147
|
+
const updates = [`updated_at = datetime('now')`];
|
|
148
|
+
const args = [];
|
|
149
|
+
if (typeof label === 'string') { updates.push('label = ?'); args.push(label); }
|
|
150
|
+
if (credentials && typeof credentials === 'object') {
|
|
151
|
+
if (!ensureEncryptionKey(res)) return;
|
|
152
|
+
updates.push('credentials = ?'); args.push(encryptOptional(JSON.stringify(credentials)));
|
|
153
|
+
updates.push(`status = 'pending'`);
|
|
154
|
+
}
|
|
155
|
+
if (config && typeof config === 'object') {
|
|
156
|
+
updates.push('config = ?'); args.push(JSON.stringify(config));
|
|
157
|
+
}
|
|
158
|
+
args.push(req.params.id);
|
|
159
|
+
db.prepare(`UPDATE provider_accounts SET ${updates.join(', ')} WHERE id = ?`).run(...args);
|
|
160
|
+
logAction(req.params.id, null, 'update', 'ok', null, null);
|
|
161
|
+
const row = db.prepare(`SELECT * FROM provider_accounts WHERE id = ?`).get(req.params.id);
|
|
162
|
+
res.json({ account: publicAccount(row) });
|
|
163
|
+
});
|
|
164
|
+
|
|
165
|
+
router.delete('/accounts/:id', authenticateToken, (req, res) => {
|
|
166
|
+
const acc = loadAccount(req.params.id, req.user.id);
|
|
167
|
+
if (!acc) return res.status(404).json({ error: 'Account not found' });
|
|
168
|
+
db.prepare(`DELETE FROM provider_accounts WHERE id = ?`).run(req.params.id);
|
|
169
|
+
res.json({ ok: true });
|
|
170
|
+
});
|
|
171
|
+
|
|
172
|
+
/* ───── actions: test / sync / toggle ────────────────────────────────── */
|
|
173
|
+
|
|
174
|
+
router.post('/accounts/:id/test', authenticateToken, async (req, res) => {
|
|
175
|
+
const acc = loadAccount(req.params.id, req.user.id);
|
|
176
|
+
if (!acc) return res.status(404).json({ error: 'Account not found' });
|
|
177
|
+
const adapter = getAdapter(acc.row.provider_type);
|
|
178
|
+
const t0 = Date.now();
|
|
179
|
+
try {
|
|
180
|
+
const r = await adapter.testCredentials(acc.creds, acc.config);
|
|
181
|
+
db.prepare(`UPDATE provider_accounts
|
|
182
|
+
SET status='active', last_test_at=datetime('now'), last_test_ok=1, last_test_error=NULL, updated_at=datetime('now')
|
|
183
|
+
WHERE id = ?`).run(acc.row.id);
|
|
184
|
+
logAction(acc.row.id, null, 'test', 'ok', Date.now() - t0, r.detail);
|
|
185
|
+
res.json({ ok: true, detail: r.detail });
|
|
186
|
+
} catch (e) {
|
|
187
|
+
db.prepare(`UPDATE provider_accounts
|
|
188
|
+
SET status='error', last_test_at=datetime('now'), last_test_ok=0, last_test_error=?, updated_at=datetime('now')
|
|
189
|
+
WHERE id = ?`).run(String(e.message).slice(0, 500), acc.row.id);
|
|
190
|
+
logAction(acc.row.id, null, 'test', 'error', Date.now() - t0, e.message);
|
|
191
|
+
res.status(400).json({ ok: false, error: e.message });
|
|
192
|
+
}
|
|
193
|
+
});
|
|
194
|
+
|
|
195
|
+
router.post('/accounts/:id/sync', authenticateToken, async (req, res) => {
|
|
196
|
+
const acc = loadAccount(req.params.id, req.user.id);
|
|
197
|
+
if (!acc) return res.status(404).json({ error: 'Account not found' });
|
|
198
|
+
const adapter = getAdapter(acc.row.provider_type);
|
|
199
|
+
const t0 = Date.now();
|
|
200
|
+
try {
|
|
201
|
+
const zones = await adapter.listDomains(acc.creds, acc.config);
|
|
202
|
+
const upsert = db.prepare(`INSERT INTO provider_domains
|
|
203
|
+
(account_id, domain, zone_id, updated_at)
|
|
204
|
+
VALUES (?, ?, ?, datetime('now'))
|
|
205
|
+
ON CONFLICT(account_id, domain) DO UPDATE SET
|
|
206
|
+
zone_id = excluded.zone_id,
|
|
207
|
+
updated_at = excluded.updated_at`);
|
|
208
|
+
const tx = db.transaction((items) => {
|
|
209
|
+
for (const z of items) upsert.run(acc.row.id, z.domain, z.zone_id || null);
|
|
210
|
+
});
|
|
211
|
+
tx(zones);
|
|
212
|
+
db.prepare(`UPDATE provider_accounts
|
|
213
|
+
SET last_sync_at=datetime('now'), domains_count=?, status='active', updated_at=datetime('now')
|
|
214
|
+
WHERE id = ?`).run(zones.length, acc.row.id);
|
|
215
|
+
logAction(acc.row.id, null, 'sync', 'ok', Date.now() - t0, `${zones.length} domains`);
|
|
216
|
+
res.json({ ok: true, count: zones.length, domains: zones });
|
|
217
|
+
} catch (e) {
|
|
218
|
+
logAction(acc.row.id, null, 'sync', 'error', Date.now() - t0, e.message);
|
|
219
|
+
res.status(400).json({ ok: false, error: e.message });
|
|
220
|
+
}
|
|
221
|
+
});
|
|
222
|
+
|
|
223
|
+
router.get('/accounts/:id/domains', authenticateToken, (req, res) => {
|
|
224
|
+
const acc = loadAccount(req.params.id, req.user.id);
|
|
225
|
+
if (!acc) return res.status(404).json({ error: 'Account not found' });
|
|
226
|
+
const rows = db.prepare(
|
|
227
|
+
`SELECT * FROM provider_domains WHERE account_id = ? ORDER BY domain ASC`
|
|
228
|
+
).all(acc.row.id);
|
|
229
|
+
res.json({ domains: rows });
|
|
230
|
+
});
|
|
231
|
+
|
|
232
|
+
function buildWabTxtValue(_userId, domain) {
|
|
233
|
+
return `v=wab1;manifest=https://${domain}/.well-known/wab.json`;
|
|
234
|
+
}
|
|
235
|
+
|
|
236
|
+
// Build a `_wab` TXT value that includes a `pk=` field when a public key
|
|
237
|
+
// is supplied — required for Trust Layer v1.3 (signed manifest verification).
|
|
238
|
+
function buildWabTxtValueWithKey(domain, publicKeyB64) {
|
|
239
|
+
const base = `v=wab1;manifest=https://${domain}/.well-known/wab.json`;
|
|
240
|
+
if (!publicKeyB64) return base;
|
|
241
|
+
return `${base};pk=ed25519:${publicKeyB64}`;
|
|
242
|
+
}
|
|
243
|
+
|
|
244
|
+
// Build a minimal but production-shaped wab.json starter manifest.
|
|
245
|
+
function buildStarterManifest(domain) {
|
|
246
|
+
return {
|
|
247
|
+
wab_version: '1.3',
|
|
248
|
+
name: domain,
|
|
249
|
+
description: `WAB-enabled site at ${domain}`,
|
|
250
|
+
endpoint: `https://${domain}/.well-known/wab.json`,
|
|
251
|
+
capabilities: {
|
|
252
|
+
discovery: true,
|
|
253
|
+
read: true,
|
|
254
|
+
execute: false,
|
|
255
|
+
},
|
|
256
|
+
actions: [
|
|
257
|
+
{
|
|
258
|
+
id: 'home',
|
|
259
|
+
name: 'Home page',
|
|
260
|
+
method: 'GET',
|
|
261
|
+
url: `https://${domain}/`,
|
|
262
|
+
readonly: true,
|
|
263
|
+
},
|
|
264
|
+
],
|
|
265
|
+
contact: { type: 'web', url: `https://${domain}/` },
|
|
266
|
+
issued_at: new Date().toISOString(),
|
|
267
|
+
};
|
|
268
|
+
}
|
|
269
|
+
|
|
270
|
+
router.post('/accounts/:id/domains/:domain/enable-wab', authenticateToken, async (req, res) => {
|
|
271
|
+
const acc = loadAccount(req.params.id, req.user.id);
|
|
272
|
+
if (!acc) return res.status(404).json({ error: 'Account not found' });
|
|
273
|
+
const domain = req.params.domain;
|
|
274
|
+
const adapter = getAdapter(acc.row.provider_type);
|
|
275
|
+
const txtValue = (req.body && req.body.txt_value) || buildWabTxtValue(req.user.id, domain);
|
|
276
|
+
const t0 = Date.now();
|
|
277
|
+
|
|
278
|
+
const dom = db.prepare(`SELECT * FROM provider_domains WHERE account_id = ? AND domain = ?`).get(acc.row.id, domain);
|
|
279
|
+
const opts = dom && dom.zone_id ? { zone_id: dom.zone_id } : {};
|
|
280
|
+
|
|
281
|
+
try {
|
|
282
|
+
const r = await adapter.enableWAB(acc.creds, acc.config, domain, txtValue, opts);
|
|
283
|
+
db.prepare(`INSERT INTO provider_domains
|
|
284
|
+
(account_id, domain, zone_id, wab_enabled, wab_record_value, last_action, last_action_at, last_action_status, updated_at)
|
|
285
|
+
VALUES (?, ?, ?, 1, ?, 'enable', datetime('now'), 'ok', datetime('now'))
|
|
286
|
+
ON CONFLICT(account_id, domain) DO UPDATE SET
|
|
287
|
+
wab_enabled = 1,
|
|
288
|
+
wab_record_value = excluded.wab_record_value,
|
|
289
|
+
last_action = 'enable',
|
|
290
|
+
last_action_at = datetime('now'),
|
|
291
|
+
last_action_status = 'ok',
|
|
292
|
+
last_action_error = NULL,
|
|
293
|
+
updated_at = datetime('now')`)
|
|
294
|
+
.run(acc.row.id, domain, (dom && dom.zone_id) || null, txtValue);
|
|
295
|
+
logAction(acc.row.id, domain, 'enable-wab', 'ok', Date.now() - t0, r.detail);
|
|
296
|
+
res.json({ ok: true, detail: r.detail, txt_value: txtValue });
|
|
297
|
+
} catch (e) {
|
|
298
|
+
db.prepare(`INSERT INTO provider_domains
|
|
299
|
+
(account_id, domain, last_action, last_action_at, last_action_status, last_action_error, updated_at)
|
|
300
|
+
VALUES (?, ?, 'enable', datetime('now'), 'error', ?, datetime('now'))
|
|
301
|
+
ON CONFLICT(account_id, domain) DO UPDATE SET
|
|
302
|
+
last_action = 'enable',
|
|
303
|
+
last_action_at = datetime('now'),
|
|
304
|
+
last_action_status = 'error',
|
|
305
|
+
last_action_error = excluded.last_action_error,
|
|
306
|
+
updated_at = datetime('now')`)
|
|
307
|
+
.run(acc.row.id, domain, String(e.message).slice(0, 500));
|
|
308
|
+
logAction(acc.row.id, domain, 'enable-wab', 'error', Date.now() - t0, e.message);
|
|
309
|
+
res.status(400).json({ ok: false, error: e.message });
|
|
310
|
+
}
|
|
311
|
+
});
|
|
312
|
+
|
|
313
|
+
router.post('/accounts/:id/domains/:domain/disable-wab', authenticateToken, async (req, res) => {
|
|
314
|
+
const acc = loadAccount(req.params.id, req.user.id);
|
|
315
|
+
if (!acc) return res.status(404).json({ error: 'Account not found' });
|
|
316
|
+
const domain = req.params.domain;
|
|
317
|
+
const adapter = getAdapter(acc.row.provider_type);
|
|
318
|
+
const t0 = Date.now();
|
|
319
|
+
try {
|
|
320
|
+
const r = await adapter.disableWAB(acc.creds, acc.config, domain);
|
|
321
|
+
db.prepare(`UPDATE provider_domains SET
|
|
322
|
+
wab_enabled = 0,
|
|
323
|
+
last_action = 'disable',
|
|
324
|
+
last_action_at = datetime('now'),
|
|
325
|
+
last_action_status = 'ok',
|
|
326
|
+
last_action_error = NULL,
|
|
327
|
+
updated_at = datetime('now')
|
|
328
|
+
WHERE account_id = ? AND domain = ?`).run(acc.row.id, domain);
|
|
329
|
+
logAction(acc.row.id, domain, 'disable-wab', 'ok', Date.now() - t0, r.detail);
|
|
330
|
+
res.json({ ok: true, detail: r.detail });
|
|
331
|
+
} catch (e) {
|
|
332
|
+
logAction(acc.row.id, domain, 'disable-wab', 'error', Date.now() - t0, e.message);
|
|
333
|
+
res.status(400).json({ ok: false, error: e.message });
|
|
334
|
+
}
|
|
335
|
+
});
|
|
336
|
+
|
|
337
|
+
router.get('/accounts/:id/log', authenticateToken, (req, res) => {
|
|
338
|
+
const acc = loadAccount(req.params.id, req.user.id);
|
|
339
|
+
if (!acc) return res.status(404).json({ error: 'Account not found' });
|
|
340
|
+
const limit = Math.min(parseInt(req.query.limit, 10) || 50, 200);
|
|
341
|
+
const rows = db.prepare(
|
|
342
|
+
`SELECT id, domain, action, status, duration_ms, detail, created_at
|
|
343
|
+
FROM provider_action_log WHERE account_id = ?
|
|
344
|
+
ORDER BY created_at DESC LIMIT ?`
|
|
345
|
+
).all(acc.row.id, limit);
|
|
346
|
+
res.json({ log: rows });
|
|
347
|
+
});
|
|
348
|
+
|
|
349
|
+
/* ───── Provider Kit (Phase 19) ──────────────────────────────────────
|
|
350
|
+
*
|
|
351
|
+
* GET /api/providers/kit/:provider?domain=example.com
|
|
352
|
+
*
|
|
353
|
+
* Returns a self-contained "Enable AI Access (WAB)" kit for any provider:
|
|
354
|
+
* - DNS template (record name, type, value, TTL)
|
|
355
|
+
* - wab.json starter (3 templates: messaging | booking | generic)
|
|
356
|
+
* - keypair generation script (Node + browser-friendly)
|
|
357
|
+
* - validation curl/script
|
|
358
|
+
* - provider-specific UI copy + integration hints (panel/CLI/API)
|
|
359
|
+
*
|
|
360
|
+
* Public — no auth — so providers can preview before integrating. The
|
|
361
|
+
* actual record push still goes through /quick-enable (auth + adapter).
|
|
362
|
+
*/
|
|
363
|
+
const PROVIDER_KIT_HINTS = {
|
|
364
|
+
cloudflare: {
|
|
365
|
+
label: 'Cloudflare',
|
|
366
|
+
panel_path: 'DNS → Records → Add record',
|
|
367
|
+
cli: 'wrangler dns record create',
|
|
368
|
+
api_doc: 'https://developers.cloudflare.com/api/operations/dns-records-for-a-zone-create-dns-record',
|
|
369
|
+
button_label: 'Enable AI Access (WAB)',
|
|
370
|
+
integration_hint: 'Add a one-click action to the DNS dashboard that POSTs to /api/providers/quick-enable. Surface the resulting WAB Score badge on the domain summary card.',
|
|
371
|
+
},
|
|
372
|
+
godaddy: { label: 'GoDaddy', panel_path: 'My Products → DNS → Records → Add', cli: null, api_doc: 'https://developer.godaddy.com/doc/endpoint/domains', button_label: 'Enable AI Access (WAB)' },
|
|
373
|
+
namecheap: { label: 'Namecheap', panel_path: 'Domain List → Manage → Advanced DNS → Add New Record', cli: null, api_doc: 'https://www.namecheap.com/support/api/methods/', button_label: 'Enable AI Access (WAB)' },
|
|
374
|
+
route53: { label: 'AWS Route 53', panel_path: 'Hosted zones → Create record', cli: 'aws route53 change-resource-record-sets', api_doc: 'https://docs.aws.amazon.com/Route53/latest/APIReference/', button_label: 'Enable AI Access (WAB)' },
|
|
375
|
+
azure: { label: 'Azure DNS', panel_path: 'DNS zones → Recordsets → +Recordset', cli: 'az network dns record-set txt', api_doc: 'https://learn.microsoft.com/en-us/rest/api/dns/', button_label: 'Enable AI Access (WAB)' },
|
|
376
|
+
gcp: { label: 'Google Cloud DNS', panel_path: 'Network services → Cloud DNS → Zone → Add record set', cli: 'gcloud dns record-sets create', api_doc: 'https://cloud.google.com/dns/docs/reference/rest/v1', button_label: 'Enable AI Access (WAB)' },
|
|
377
|
+
cpanel: { label: 'cPanel', panel_path: 'Zone Editor → Add Record (TXT)', cli: 'cpanel-uapi DNS add_zone_record', api_doc: 'https://api.docs.cpanel.net/', button_label: 'Enable AI Access (WAB)' },
|
|
378
|
+
plesk: { label: 'Plesk', panel_path: 'Domains → DNS Settings → Add Record (TXT)', cli: 'plesk bin dns --add', api_doc: 'https://docs.plesk.com/en-US/obsidian/api-rpc/', button_label: 'Enable AI Access (WAB)' },
|
|
379
|
+
hostinger: { label: 'Hostinger', panel_path: 'hPanel → Domains → DNS / Nameservers → Manage DNS records → Add record (TXT)', cli: null, api_doc: 'https://developers.hostinger.com/', button_label: 'Enable AI Access (WAB)' },
|
|
380
|
+
generic: { label: 'Generic DNS', panel_path: 'DNS / Zone editor → Add TXT record', cli: null, api_doc: null, button_label: 'Enable AI Access (WAB)' },
|
|
381
|
+
};
|
|
382
|
+
|
|
383
|
+
function buildManifestTemplate(domain, kind) {
|
|
384
|
+
const base = {
|
|
385
|
+
wab_version: '1.3',
|
|
386
|
+
name: domain,
|
|
387
|
+
description: `WAB-enabled site at ${domain}`,
|
|
388
|
+
endpoint: `https://${domain}/.well-known/wab.json`,
|
|
389
|
+
contact: { type: 'web', url: `https://${domain}/` },
|
|
390
|
+
};
|
|
391
|
+
if (kind === 'messaging') {
|
|
392
|
+
return { ...base, capabilities: { discovery: true, read: true, execute: true },
|
|
393
|
+
actions: [
|
|
394
|
+
{ id: 'send_message', name: 'Send a direct message', method: 'POST', url: `https://${domain}/api/messages`, params: [{ name: 'to', type: 'string', required: true }, { name: 'body', type: 'string', required: true }] },
|
|
395
|
+
{ id: 'list_inbox', name: 'List recent messages', method: 'GET', url: `https://${domain}/api/messages`, readonly: true },
|
|
396
|
+
] };
|
|
397
|
+
}
|
|
398
|
+
if (kind === 'booking') {
|
|
399
|
+
return { ...base, capabilities: { discovery: true, read: true, execute: true },
|
|
400
|
+
actions: [
|
|
401
|
+
{ id: 'list_slots', name: 'List available slots', method: 'GET', url: `https://${domain}/api/availability`, readonly: true, params: [{ name: 'date', type: 'string', required: true }] },
|
|
402
|
+
{ id: 'book', name: 'Book a slot', method: 'POST', url: `https://${domain}/api/bookings`, params: [{ name: 'slot_id', type: 'string', required: true }, { name: 'name', type: 'string', required: true }, { name: 'email', type: 'string', required: true }] },
|
|
403
|
+
] };
|
|
404
|
+
}
|
|
405
|
+
return { ...base, capabilities: { discovery: true, read: true, execute: false },
|
|
406
|
+
actions: [{ id: 'home', name: 'Home page', method: 'GET', url: `https://${domain}/`, readonly: true }] };
|
|
407
|
+
}
|
|
408
|
+
|
|
409
|
+
router.get('/kit/:provider', (req, res) => {
|
|
410
|
+
const provider = String(req.params.provider || '').toLowerCase();
|
|
411
|
+
const hints = PROVIDER_KIT_HINTS[provider] || PROVIDER_KIT_HINTS.generic;
|
|
412
|
+
|
|
413
|
+
const rawDomain = String(req.query.domain || 'example.com');
|
|
414
|
+
const domain = sanitizeDomainQuick(rawDomain) || 'example.com';
|
|
415
|
+
const kind = ['messaging', 'booking', 'generic'].includes(req.query.kind) ? req.query.kind : 'generic';
|
|
416
|
+
|
|
417
|
+
// Placeholder values — operator should swap these for their own.
|
|
418
|
+
const samplePk = 'BASE64_PUBLIC_KEY_REPLACE_ME';
|
|
419
|
+
const txt = `v=wab1;manifest=https://${domain}/.well-known/wab.json;pk=ed25519:${samplePk}`;
|
|
420
|
+
|
|
421
|
+
const dns = {
|
|
422
|
+
name: `_wab.${domain}`,
|
|
423
|
+
type: 'TXT',
|
|
424
|
+
value: txt,
|
|
425
|
+
ttl: 300,
|
|
426
|
+
instructions: hints.panel_path,
|
|
427
|
+
};
|
|
428
|
+
|
|
429
|
+
const manifest = buildManifestTemplate(domain, kind);
|
|
430
|
+
|
|
431
|
+
// Self-contained Node generator script the operator can run locally.
|
|
432
|
+
const generatorScript =
|
|
433
|
+
`#!/usr/bin/env node
|
|
434
|
+
// One-shot Ed25519 keypair + signed wab.json + DNS TXT line.
|
|
435
|
+
// Save as wab-enable.js and run: node wab-enable.js ${domain}
|
|
436
|
+
const crypto = require('crypto');
|
|
437
|
+
const fs = require('fs');
|
|
438
|
+
const domain = process.argv[2] || '${domain}';
|
|
439
|
+
const { publicKey, privateKey } = crypto.generateKeyPairSync('ed25519');
|
|
440
|
+
const pubB64 = publicKey.export({ type: 'spki', format: 'der' }).slice(-32).toString('base64');
|
|
441
|
+
const privB64 = privateKey.export({ type: 'pkcs8', format: 'der' }).slice(-32).toString('base64');
|
|
442
|
+
const manifest = ${JSON.stringify(manifest, null, 2)};
|
|
443
|
+
manifest.endpoint = 'https://' + domain + '/.well-known/wab.json';
|
|
444
|
+
const canonical = Buffer.from(JSON.stringify(manifest));
|
|
445
|
+
const sig = crypto.sign(null, canonical, privateKey).toString('base64');
|
|
446
|
+
manifest.signature = { algorithm: 'ed25519', value: sig, key_id: crypto.createHash('sha256').update(pubB64).digest('base64').slice(0, 16), signed_at: new Date().toISOString() };
|
|
447
|
+
fs.writeFileSync('wab.json', JSON.stringify(manifest, null, 2));
|
|
448
|
+
fs.writeFileSync('wab-private.key', privB64);
|
|
449
|
+
console.log('wab.json written. Upload to https://' + domain + '/.well-known/wab.json');
|
|
450
|
+
console.log('Add DNS TXT record:');
|
|
451
|
+
console.log(' Name: _wab.' + domain);
|
|
452
|
+
console.log(' Type: TXT');
|
|
453
|
+
console.log(' Value: v=wab1;manifest=https://' + domain + '/.well-known/wab.json;pk=ed25519:' + pubB64);
|
|
454
|
+
console.log('Keep wab-private.key safe — it is your signing identity.');
|
|
455
|
+
`;
|
|
456
|
+
|
|
457
|
+
// Validation snippet — runs against the WAB API.
|
|
458
|
+
const validateScript =
|
|
459
|
+
`# Verify trust + score after publishing:
|
|
460
|
+
curl -s https://webagentbridge.com/api/discovery/trust/${domain} | jq
|
|
461
|
+
curl -s https://webagentbridge.com/api/discovery/score/${domain} | jq
|
|
462
|
+
curl -s 'https://webagentbridge.com/api/discovery/compliance/${domain}?policy=standard' | jq
|
|
463
|
+
`;
|
|
464
|
+
|
|
465
|
+
res.json({
|
|
466
|
+
wab_version: '1.3.0',
|
|
467
|
+
provider,
|
|
468
|
+
provider_label: hints.label,
|
|
469
|
+
domain,
|
|
470
|
+
kit_kind: kind,
|
|
471
|
+
button: {
|
|
472
|
+
label: hints.button_label,
|
|
473
|
+
action_url: `https://webagentbridge.com/api/providers/quick-enable`,
|
|
474
|
+
integration_hint: hints.integration_hint || 'Bind this button to a single POST to /api/providers/quick-enable with the user\'s domain. Show the returned wab.json + DNS record in a confirmation modal, then push it via your existing DNS code path.',
|
|
475
|
+
},
|
|
476
|
+
dns,
|
|
477
|
+
manifest,
|
|
478
|
+
manifest_alternatives: ['messaging', 'booking', 'generic'],
|
|
479
|
+
scripts: {
|
|
480
|
+
generator_node: generatorScript,
|
|
481
|
+
validate_bash: validateScript,
|
|
482
|
+
},
|
|
483
|
+
provider_panel: {
|
|
484
|
+
path: hints.panel_path,
|
|
485
|
+
cli: hints.cli,
|
|
486
|
+
api_doc: hints.api_doc,
|
|
487
|
+
},
|
|
488
|
+
next_steps: [
|
|
489
|
+
`Save scripts.generator_node as wab-enable.js and run: node wab-enable.js ${domain}`,
|
|
490
|
+
`Place the resulting wab.json at https://${domain}/.well-known/wab.json (HTTPS, application/json).`,
|
|
491
|
+
`Add the DNS TXT record shown in dns.value to ${dns.name}.`,
|
|
492
|
+
`Verify with scripts.validate_bash — expect trust_score ≥ 80 and signature_valid:true.`,
|
|
493
|
+
`Embed the badge: <img src="https://webagentbridge.com/badge/${domain}.svg">`,
|
|
494
|
+
],
|
|
495
|
+
score_badge: `https://webagentbridge.com/badge/${domain}.svg`,
|
|
496
|
+
compliance_endpoint: `https://webagentbridge.com/api/discovery/compliance/${domain}`,
|
|
497
|
+
});
|
|
498
|
+
});
|
|
499
|
+
|
|
500
|
+
router.get('/kit', (_req, res) => {
|
|
501
|
+
res.json({
|
|
502
|
+
wab_version: '1.3.0',
|
|
503
|
+
providers: Object.keys(PROVIDER_KIT_HINTS).map(k => ({
|
|
504
|
+
provider: k,
|
|
505
|
+
label: PROVIDER_KIT_HINTS[k].label,
|
|
506
|
+
kit_url: `/api/providers/kit/${k}?domain=example.com`,
|
|
507
|
+
})),
|
|
508
|
+
note: 'Pass ?domain=<yourdomain>&kind=messaging|booking|generic to customise.',
|
|
509
|
+
});
|
|
510
|
+
});
|
|
511
|
+
|
|
512
|
+
/* ───── Zero-Friction Quick-Enable (Phase 18) ────────────────────────
|
|
513
|
+
* One call, one round-trip:
|
|
514
|
+
* 1. Generate fresh Ed25519 keypair (server never persists private key).
|
|
515
|
+
* 2. Build a starter wab.json manifest signed with that key.
|
|
516
|
+
* 3. Build the `_wab` TXT value with embedded pk=.
|
|
517
|
+
* 4. (Optional) push the TXT record live via the provider adapter.
|
|
518
|
+
* 5. Return everything the operator needs to drop into their site.
|
|
519
|
+
*
|
|
520
|
+
* If `account_id` is omitted, this acts as a stateless generator — useful
|
|
521
|
+
* for sites that don't use a managed-DNS provider integration.
|
|
522
|
+
*
|
|
523
|
+
* Body:
|
|
524
|
+
* { domain, account_id?, push?, manifest_overrides? }
|
|
525
|
+
*
|
|
526
|
+
* Response:
|
|
527
|
+
* {
|
|
528
|
+
* ok, domain,
|
|
529
|
+
* keys: { public_key, private_key, fingerprint }, // SAVE the private!
|
|
530
|
+
* dns: { name, type, value, ttl },
|
|
531
|
+
* manifest: { ... signed wab.json ... },
|
|
532
|
+
* pushed: boolean,
|
|
533
|
+
* push_detail: string|null,
|
|
534
|
+
* instructions: { ... }
|
|
535
|
+
* }
|
|
536
|
+
*/
|
|
537
|
+
const wabCryptoLazy = (() => {
|
|
538
|
+
let mod = null;
|
|
539
|
+
return () => (mod = mod || require('../services/wab-crypto'));
|
|
540
|
+
})();
|
|
541
|
+
|
|
542
|
+
function sanitizeDomainQuick(s) {
|
|
543
|
+
if (!s || typeof s !== 'string') return null;
|
|
544
|
+
const d = s.trim().toLowerCase().replace(/^https?:\/\//, '').replace(/\/.*$/, '').replace(/^www\./, '');
|
|
545
|
+
return /^[a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?(\.[a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?)+$/.test(d) ? d : null;
|
|
546
|
+
}
|
|
547
|
+
|
|
548
|
+
router.post('/quick-enable', authenticateToken, async (req, res) => {
|
|
549
|
+
const body = req.body || {};
|
|
550
|
+
const domain = sanitizeDomainQuick(body.domain);
|
|
551
|
+
if (!domain) return res.status(400).json({ ok: false, error: 'invalid_domain' });
|
|
552
|
+
|
|
553
|
+
const wabCrypto = wabCryptoLazy();
|
|
554
|
+
const t0 = Date.now();
|
|
555
|
+
|
|
556
|
+
// 1. Generate keypair (stateless — caller is responsible for storing private key)
|
|
557
|
+
let kp;
|
|
558
|
+
try {
|
|
559
|
+
kp = wabCrypto.generateKeyPair();
|
|
560
|
+
} catch (e) {
|
|
561
|
+
return res.status(500).json({ ok: false, error: 'keygen_failed', details: e.message });
|
|
562
|
+
}
|
|
563
|
+
|
|
564
|
+
// 2. Build manifest, merge any caller overrides, then sign
|
|
565
|
+
const baseManifest = buildStarterManifest(domain);
|
|
566
|
+
const manifest = {
|
|
567
|
+
...baseManifest,
|
|
568
|
+
...(body.manifest_overrides && typeof body.manifest_overrides === 'object' ? body.manifest_overrides : {}),
|
|
569
|
+
name: (body.manifest_overrides && body.manifest_overrides.name) || baseManifest.name,
|
|
570
|
+
endpoint: baseManifest.endpoint, // never let overrides hijack endpoint
|
|
571
|
+
wab_version: baseManifest.wab_version,
|
|
572
|
+
issued_at: baseManifest.issued_at,
|
|
573
|
+
};
|
|
574
|
+
let signedManifest;
|
|
575
|
+
try {
|
|
576
|
+
signedManifest = wabCrypto.signManifest(manifest, kp.private_key, { key_id: kp.fingerprint });
|
|
577
|
+
} catch (e) {
|
|
578
|
+
return res.status(500).json({ ok: false, error: 'sign_failed', details: e.message });
|
|
579
|
+
}
|
|
580
|
+
|
|
581
|
+
// 3. Build the DNS TXT value (with pk=)
|
|
582
|
+
const txtValue = buildWabTxtValueWithKey(domain, kp.public_key);
|
|
583
|
+
const dns = { name: `_wab.${domain}`, type: 'TXT', value: txtValue, ttl: 300 };
|
|
584
|
+
|
|
585
|
+
// 4. Optionally push to provider
|
|
586
|
+
let pushed = false;
|
|
587
|
+
let pushDetail = null;
|
|
588
|
+
let pushError = null;
|
|
589
|
+
if (body.push && body.account_id) {
|
|
590
|
+
const acc = loadAccount(body.account_id, req.user.id);
|
|
591
|
+
if (!acc) {
|
|
592
|
+
pushError = 'account_not_found';
|
|
593
|
+
} else {
|
|
594
|
+
const adapter = getAdapter(acc.row.provider_type);
|
|
595
|
+
const dom = db.prepare(`SELECT * FROM provider_domains WHERE account_id = ? AND domain = ?`)
|
|
596
|
+
.get(acc.row.id, domain);
|
|
597
|
+
const opts = dom && dom.zone_id ? { zone_id: dom.zone_id } : {};
|
|
598
|
+
try {
|
|
599
|
+
const r = await adapter.enableWAB(acc.creds, acc.config, domain, txtValue, opts);
|
|
600
|
+
pushed = true;
|
|
601
|
+
pushDetail = r && r.detail;
|
|
602
|
+
db.prepare(`INSERT INTO provider_domains
|
|
603
|
+
(account_id, domain, zone_id, wab_enabled, wab_record_value, last_action, last_action_at, last_action_status, updated_at)
|
|
604
|
+
VALUES (?, ?, ?, 1, ?, 'enable', datetime('now'), 'ok', datetime('now'))
|
|
605
|
+
ON CONFLICT(account_id, domain) DO UPDATE SET
|
|
606
|
+
wab_enabled = 1,
|
|
607
|
+
wab_record_value = excluded.wab_record_value,
|
|
608
|
+
last_action = 'enable',
|
|
609
|
+
last_action_at = datetime('now'),
|
|
610
|
+
last_action_status = 'ok',
|
|
611
|
+
last_action_error = NULL,
|
|
612
|
+
updated_at = datetime('now')`)
|
|
613
|
+
.run(acc.row.id, domain, (dom && dom.zone_id) || null, txtValue);
|
|
614
|
+
logAction(acc.row.id, domain, 'quick-enable', 'ok', Date.now() - t0, pushDetail);
|
|
615
|
+
} catch (e) {
|
|
616
|
+
pushError = String(e.message || e).slice(0, 500);
|
|
617
|
+
logAction(acc.row.id, domain, 'quick-enable', 'error', Date.now() - t0, pushError);
|
|
618
|
+
}
|
|
619
|
+
}
|
|
620
|
+
}
|
|
621
|
+
|
|
622
|
+
res.json({
|
|
623
|
+
ok: true,
|
|
624
|
+
domain,
|
|
625
|
+
keys: {
|
|
626
|
+
algorithm: 'ed25519',
|
|
627
|
+
public_key: kp.public_key,
|
|
628
|
+
private_key: kp.private_key,
|
|
629
|
+
fingerprint: kp.fingerprint,
|
|
630
|
+
created_at: kp.created_at,
|
|
631
|
+
warning: 'Store private_key securely. WAB does NOT persist it server-side.',
|
|
632
|
+
},
|
|
633
|
+
dns,
|
|
634
|
+
manifest: signedManifest,
|
|
635
|
+
pushed,
|
|
636
|
+
push_detail: pushDetail,
|
|
637
|
+
push_error: pushError,
|
|
638
|
+
instructions: {
|
|
639
|
+
step_1: `Save the wab.json manifest at: https://${domain}/.well-known/wab.json (publicly readable, served as application/json over HTTPS).`,
|
|
640
|
+
step_2: `Add a DNS TXT record. Name: _wab.${domain} Value: ${txtValue} TTL: 300`,
|
|
641
|
+
step_3: 'Verify the setup with: GET /api/discovery/trust/' + domain,
|
|
642
|
+
step_4: 'Check your WAB Score with: GET /api/discovery/score/' + domain,
|
|
643
|
+
step_5: 'Embed your trust badge: <img src="https://webagentbridge.com/badge/' + domain + '.svg">',
|
|
644
|
+
private_key_warning: 'Keep your private_key offline (e.g. password manager / HSM). Use it only to re-sign your manifest when capabilities change.',
|
|
645
|
+
},
|
|
646
|
+
elapsed_ms: Date.now() - t0,
|
|
647
|
+
});
|
|
648
|
+
});
|
|
649
|
+
|
|
650
|
+
module.exports = router;
|