import crypto from "node:crypto"; import fs from "node:fs"; import os from "node:os"; import path from "node:path"; import { getPairingAdapter } from "../channels/plugins/pairing.js"; import type { ChannelId, ChannelPairingAdapter } from "../channels/plugins/types.js"; import { resolveOAuthDir, resolveStateDir } from "../config/paths.js"; import { withFileLock as withPathLock } from "../infra/file-lock.js"; import { resolveRequiredHomeDir } from "../infra/home-dir.js"; import { readJsonFileWithFallback, writeJsonFileAtomically } from "../plugin-sdk/json-store.js"; const PAIRING_CODE_LENGTH = 8; const PAIRING_CODE_ALPHABET = "ABCDEFGHJKLMNPQRSTUVWXYZ23456789"; const PAIRING_PENDING_TTL_MS = 60 * 60 * 1000; const PAIRING_PENDING_MAX = 3; const PAIRING_STORE_LOCK_OPTIONS = { retries: { retries: 10, factor: 2, minTimeout: 100, maxTimeout: 10_000, randomize: true, }, stale: 30_000, } as const; export type PairingChannel = ChannelId; export type PairingRequest = { id: string; code: string; createdAt: string; lastSeenAt: string; meta?: Record; }; type PairingStore = { version: 1; requests: PairingRequest[]; }; type AllowFromStore = { version: 1; allowFrom: string[]; }; function resolveCredentialsDir(env: NodeJS.ProcessEnv = process.env): string { const stateDir = resolveStateDir(env, () => resolveRequiredHomeDir(env, os.homedir)); return resolveOAuthDir(env, stateDir); } /** Sanitize channel ID for use in filenames (prevent path traversal). */ function safeChannelKey(channel: PairingChannel): string { const raw = String(channel).trim().toLowerCase(); if (!raw) { throw new Error("invalid pairing channel"); } const safe = raw.replace(/[\\/:*?"<>|]/g, "_").replace(/\.\./g, "_"); if (!safe || safe === "_") { throw new Error("invalid pairing channel"); } return safe; } function resolvePairingPath(channel: PairingChannel, env: NodeJS.ProcessEnv = process.env): string { return path.join(resolveCredentialsDir(env), `${safeChannelKey(channel)}-pairing.json`); } function safeAccountKey(accountId: string): string { const raw = String(accountId).trim().toLowerCase(); if (!raw) { throw new Error("invalid pairing account id"); } const safe = raw.replace(/[\\/:*?"<>|]/g, "_").replace(/\.\./g, "_"); if (!safe || safe === "_") { throw new Error("invalid pairing account id"); } return safe; } function resolveAllowFromPath( channel: PairingChannel, env: NodeJS.ProcessEnv = process.env, accountId?: string, ): string { const base = safeChannelKey(channel); const normalizedAccountId = typeof accountId === "string" ? accountId.trim() : ""; if (!normalizedAccountId) { return path.join(resolveCredentialsDir(env), `${base}-allowFrom.json`); } return path.join( resolveCredentialsDir(env), `${base}-${safeAccountKey(normalizedAccountId)}-allowFrom.json`, ); } async function readJsonFile( filePath: string, fallback: T, ): Promise<{ value: T; exists: boolean }> { return await readJsonFileWithFallback(filePath, fallback); } async function writeJsonFile(filePath: string, value: unknown): Promise { await writeJsonFileAtomically(filePath, value); } async function readPairingRequests(filePath: string): Promise { const { value } = await readJsonFile(filePath, { version: 1, requests: [], }); return Array.isArray(value.requests) ? value.requests : []; } async function readPrunedPairingRequests(filePath: string): Promise<{ requests: PairingRequest[]; removed: boolean; }> { return pruneExpiredRequests(await readPairingRequests(filePath), Date.now()); } async function ensureJsonFile(filePath: string, fallback: unknown) { try { await fs.promises.access(filePath); } catch { await writeJsonFile(filePath, fallback); } } async function withFileLock( filePath: string, fallback: unknown, fn: () => Promise, ): Promise { await ensureJsonFile(filePath, fallback); return await withPathLock(filePath, PAIRING_STORE_LOCK_OPTIONS, async () => { return await fn(); }); } function parseTimestamp(value: string | undefined): number | null { if (!value) { return null; } const parsed = Date.parse(value); if (!Number.isFinite(parsed)) { return null; } return parsed; } function isExpired(entry: PairingRequest, nowMs: number): boolean { const createdAt = parseTimestamp(entry.createdAt); if (!createdAt) { return true; } return nowMs - createdAt > PAIRING_PENDING_TTL_MS; } function pruneExpiredRequests(reqs: PairingRequest[], nowMs: number) { const kept: PairingRequest[] = []; let removed = false; for (const req of reqs) { if (isExpired(req, nowMs)) { removed = true; continue; } kept.push(req); } return { requests: kept, removed }; } function resolveLastSeenAt(entry: PairingRequest): number { return parseTimestamp(entry.lastSeenAt) ?? parseTimestamp(entry.createdAt) ?? 0; } function pruneExcessRequests(reqs: PairingRequest[], maxPending: number) { if (maxPending <= 0 || reqs.length <= maxPending) { return { requests: reqs, removed: false }; } const sorted = reqs.slice().toSorted((a, b) => resolveLastSeenAt(a) - resolveLastSeenAt(b)); return { requests: sorted.slice(-maxPending), removed: true }; } function randomCode(): string { // Human-friendly: 8 chars, upper, no ambiguous chars (0O1I). let out = ""; for (let i = 0; i < PAIRING_CODE_LENGTH; i++) { const idx = crypto.randomInt(0, PAIRING_CODE_ALPHABET.length); out += PAIRING_CODE_ALPHABET[idx]; } return out; } function generateUniqueCode(existing: Set): string { for (let attempt = 0; attempt < 500; attempt += 1) { const code = randomCode(); if (!existing.has(code)) { return code; } } throw new Error("failed to generate unique pairing code"); } function normalizePairingAccountId(accountId?: string): string { return accountId?.trim().toLowerCase() || ""; } function requestMatchesAccountId(entry: PairingRequest, normalizedAccountId: string): boolean { if (!normalizedAccountId) { return true; } return ( String(entry.meta?.accountId ?? "") .trim() .toLowerCase() === normalizedAccountId ); } function normalizeId(value: string | number): string { return String(value).trim(); } function normalizeAllowEntry(channel: PairingChannel, entry: string): string { const trimmed = entry.trim(); if (!trimmed) { return ""; } if (trimmed === "*") { return ""; } const adapter = getPairingAdapter(channel); const normalized = adapter?.normalizeAllowEntry ? adapter.normalizeAllowEntry(trimmed) : trimmed; return String(normalized).trim(); } function normalizeAllowFromList(channel: PairingChannel, store: AllowFromStore): string[] { const list = Array.isArray(store.allowFrom) ? store.allowFrom : []; return list.map((v) => normalizeAllowEntry(channel, String(v))).filter(Boolean); } function normalizeAllowFromInput(channel: PairingChannel, entry: string | number): string { return normalizeAllowEntry(channel, normalizeId(entry)); } function dedupePreserveOrder(entries: string[]): string[] { const seen = new Set(); const out: string[] = []; for (const entry of entries) { const normalized = String(entry).trim(); if (!normalized || seen.has(normalized)) { continue; } seen.add(normalized); out.push(normalized); } return out; } async function readAllowFromStateForPath( channel: PairingChannel, filePath: string, ): Promise { const { value } = await readJsonFile(filePath, { version: 1, allowFrom: [], }); return normalizeAllowFromList(channel, value); } function readAllowFromStateForPathSync(channel: PairingChannel, filePath: string): string[] { try { const raw = fs.readFileSync(filePath, "utf8"); const parsed = JSON.parse(raw) as AllowFromStore; return normalizeAllowFromList(channel, parsed); } catch { return []; } } async function readAllowFromState(params: { channel: PairingChannel; entry: string | number; filePath: string; }): Promise<{ current: string[]; normalized: string | null }> { const { value } = await readJsonFile(params.filePath, { version: 1, allowFrom: [], }); const current = normalizeAllowFromList(params.channel, value); const normalized = normalizeAllowFromInput(params.channel, params.entry); return { current, normalized: normalized || null }; } async function writeAllowFromState(filePath: string, allowFrom: string[]): Promise { await writeJsonFile(filePath, { version: 1, allowFrom, } satisfies AllowFromStore); } async function updateAllowFromStoreEntry(params: { channel: PairingChannel; entry: string | number; accountId?: string; env?: NodeJS.ProcessEnv; apply: (current: string[], normalized: string) => string[] | null; }): Promise<{ changed: boolean; allowFrom: string[] }> { const env = params.env ?? process.env; const filePath = resolveAllowFromPath(params.channel, env, params.accountId); return await withFileLock( filePath, { version: 1, allowFrom: [] } satisfies AllowFromStore, async () => { const { current, normalized } = await readAllowFromState({ channel: params.channel, entry: params.entry, filePath, }); if (!normalized) { return { changed: false, allowFrom: current }; } const next = params.apply(current, normalized); if (!next) { return { changed: false, allowFrom: current }; } await writeAllowFromState(filePath, next); return { changed: true, allowFrom: next }; }, ); } export async function readChannelAllowFromStore( channel: PairingChannel, env: NodeJS.ProcessEnv = process.env, accountId?: string, ): Promise { const normalizedAccountId = accountId?.trim().toLowerCase() ?? ""; if (!normalizedAccountId) { const filePath = resolveAllowFromPath(channel, env); return await readAllowFromStateForPath(channel, filePath); } const scopedPath = resolveAllowFromPath(channel, env, accountId); const scopedEntries = await readAllowFromStateForPath(channel, scopedPath); // Backward compatibility: legacy channel-level allowFrom store was unscoped. // Keep honoring it alongside account-scoped files to prevent re-pair prompts after upgrades. const legacyPath = resolveAllowFromPath(channel, env); const legacyEntries = await readAllowFromStateForPath(channel, legacyPath); return dedupePreserveOrder([...scopedEntries, ...legacyEntries]); } export function readChannelAllowFromStoreSync( channel: PairingChannel, env: NodeJS.ProcessEnv = process.env, accountId?: string, ): string[] { const normalizedAccountId = accountId?.trim().toLowerCase() ?? ""; if (!normalizedAccountId) { const filePath = resolveAllowFromPath(channel, env); return readAllowFromStateForPathSync(channel, filePath); } const scopedPath = resolveAllowFromPath(channel, env, accountId); const scopedEntries = readAllowFromStateForPathSync(channel, scopedPath); const legacyPath = resolveAllowFromPath(channel, env); const legacyEntries = readAllowFromStateForPathSync(channel, legacyPath); return dedupePreserveOrder([...scopedEntries, ...legacyEntries]); } type AllowFromStoreEntryUpdateParams = { channel: PairingChannel; entry: string | number; accountId?: string; env?: NodeJS.ProcessEnv; }; type ChannelAllowFromStoreEntryMutation = ( current: string[], normalized: string, ) => string[] | null; async function updateChannelAllowFromStore( params: { apply: ChannelAllowFromStoreEntryMutation; } & AllowFromStoreEntryUpdateParams, ): Promise<{ changed: boolean; allowFrom: string[] }> { return await updateAllowFromStoreEntry({ channel: params.channel, entry: params.entry, accountId: params.accountId, env: params.env, apply: params.apply, }); } async function mutateChannelAllowFromStoreEntry( params: AllowFromStoreEntryUpdateParams, apply: ChannelAllowFromStoreEntryMutation, ): Promise<{ changed: boolean; allowFrom: string[] }> { return await updateChannelAllowFromStore({ ...params, apply, }); } export async function addChannelAllowFromStoreEntry( params: AllowFromStoreEntryUpdateParams, ): Promise<{ changed: boolean; allowFrom: string[] }> { return await mutateChannelAllowFromStoreEntry(params, (current, normalized) => { if (current.includes(normalized)) { return null; } return [...current, normalized]; }); } export async function removeChannelAllowFromStoreEntry( params: AllowFromStoreEntryUpdateParams, ): Promise<{ changed: boolean; allowFrom: string[] }> { return await mutateChannelAllowFromStoreEntry(params, (current, normalized) => { const next = current.filter((entry) => entry !== normalized); if (next.length === current.length) { return null; } return next; }); } export async function listChannelPairingRequests( channel: PairingChannel, env: NodeJS.ProcessEnv = process.env, accountId?: string, ): Promise { const filePath = resolvePairingPath(channel, env); return await withFileLock( filePath, { version: 1, requests: [] } satisfies PairingStore, async () => { const { requests: prunedExpired, removed: expiredRemoved } = await readPrunedPairingRequests(filePath); const { requests: pruned, removed: cappedRemoved } = pruneExcessRequests( prunedExpired, PAIRING_PENDING_MAX, ); if (expiredRemoved || cappedRemoved) { await writeJsonFile(filePath, { version: 1, requests: pruned, } satisfies PairingStore); } const normalizedAccountId = normalizePairingAccountId(accountId); const filtered = normalizedAccountId ? pruned.filter((entry) => requestMatchesAccountId(entry, normalizedAccountId)) : pruned; return filtered .filter( (r) => r && typeof r.id === "string" && typeof r.code === "string" && typeof r.createdAt === "string", ) .slice() .toSorted((a, b) => a.createdAt.localeCompare(b.createdAt)); }, ); } export async function upsertChannelPairingRequest(params: { channel: PairingChannel; id: string | number; accountId?: string; meta?: Record; env?: NodeJS.ProcessEnv; /** Extension channels can pass their adapter directly to bypass registry lookup. */ pairingAdapter?: ChannelPairingAdapter; }): Promise<{ code: string; created: boolean }> { const env = params.env ?? process.env; const filePath = resolvePairingPath(params.channel, env); return await withFileLock( filePath, { version: 1, requests: [] } satisfies PairingStore, async () => { const now = new Date().toISOString(); const nowMs = Date.now(); const id = normalizeId(params.id); const normalizedAccountId = params.accountId?.trim(); const baseMeta = params.meta && typeof params.meta === "object" ? Object.fromEntries( Object.entries(params.meta) .map(([k, v]) => [k, String(v ?? "").trim()] as const) .filter(([_, v]) => Boolean(v)), ) : undefined; const meta = normalizedAccountId ? { ...baseMeta, accountId: normalizedAccountId } : baseMeta; let reqs = await readPairingRequests(filePath); const { requests: prunedExpired, removed: expiredRemoved } = pruneExpiredRequests( reqs, nowMs, ); reqs = prunedExpired; const existingIdx = reqs.findIndex((r) => r.id === id); const existingCodes = new Set( reqs.map((req) => String(req.code ?? "") .trim() .toUpperCase(), ), ); if (existingIdx >= 0) { const existing = reqs[existingIdx]; const existingCode = existing && typeof existing.code === "string" ? existing.code.trim() : ""; const code = existingCode || generateUniqueCode(existingCodes); const next: PairingRequest = { id, code, createdAt: existing?.createdAt ?? now, lastSeenAt: now, meta: meta ?? existing?.meta, }; reqs[existingIdx] = next; const { requests: capped } = pruneExcessRequests(reqs, PAIRING_PENDING_MAX); await writeJsonFile(filePath, { version: 1, requests: capped, } satisfies PairingStore); return { code, created: false }; } const { requests: capped, removed: cappedRemoved } = pruneExcessRequests( reqs, PAIRING_PENDING_MAX, ); reqs = capped; if (PAIRING_PENDING_MAX > 0 && reqs.length >= PAIRING_PENDING_MAX) { if (expiredRemoved || cappedRemoved) { await writeJsonFile(filePath, { version: 1, requests: reqs, } satisfies PairingStore); } return { code: "", created: false }; } const code = generateUniqueCode(existingCodes); const next: PairingRequest = { id, code, createdAt: now, lastSeenAt: now, ...(meta ? { meta } : {}), }; await writeJsonFile(filePath, { version: 1, requests: [...reqs, next], } satisfies PairingStore); return { code, created: true }; }, ); } export async function approveChannelPairingCode(params: { channel: PairingChannel; code: string; accountId?: string; env?: NodeJS.ProcessEnv; }): Promise<{ id: string; entry?: PairingRequest } | null> { const env = params.env ?? process.env; const code = params.code.trim().toUpperCase(); if (!code) { return null; } const filePath = resolvePairingPath(params.channel, env); return await withFileLock( filePath, { version: 1, requests: [] } satisfies PairingStore, async () => { const { requests: pruned, removed } = await readPrunedPairingRequests(filePath); const normalizedAccountId = normalizePairingAccountId(params.accountId); const idx = pruned.findIndex((r) => { if (String(r.code ?? "").toUpperCase() !== code) { return false; } return requestMatchesAccountId(r, normalizedAccountId); }); if (idx < 0) { if (removed) { await writeJsonFile(filePath, { version: 1, requests: pruned, } satisfies PairingStore); } return null; } const entry = pruned[idx]; if (!entry) { return null; } pruned.splice(idx, 1); await writeJsonFile(filePath, { version: 1, requests: pruned, } satisfies PairingStore); const entryAccountId = String(entry.meta?.accountId ?? "").trim() || undefined; await addChannelAllowFromStoreEntry({ channel: params.channel, entry: entry.id, accountId: params.accountId?.trim() || entryAccountId, env, }); return { id: entry.id, entry }; }, ); }