diff --git a/.claude/.gitignore b/.claude/.gitignore index 735e81ff..2cad7c3c 100644 --- a/.claude/.gitignore +++ b/.claude/.gitignore @@ -1 +1,2 @@ -hans/ \ No newline at end of file +hans/ +skills/ \ No newline at end of file diff --git a/.github/workflows/e2e-tests.yml b/.github/workflows/e2e-tests.yml index a4064bda..abc5a867 100644 --- a/.github/workflows/e2e-tests.yml +++ b/.github/workflows/e2e-tests.yml @@ -31,24 +31,43 @@ jobs: - name: Build server run: npm run build --workspace=apps/server + - name: Set up Git user + run: | + git config --global user.name "GitHub CI" + git config --global user.email "ci@example.com" + - name: Start backend server run: npm run start --workspace=apps/server & env: PORT: 3008 NODE_ENV: test + # Use a deterministic API key so Playwright can log in reliably + AUTOMAKER_API_KEY: test-api-key-for-e2e-tests + # Reduce log noise in CI + AUTOMAKER_HIDE_API_KEY: 'true' + # Avoid real API calls during CI + AUTOMAKER_MOCK_AGENT: 'true' + # Simulate containerized environment to skip sandbox confirmation dialogs + IS_CONTAINERIZED: 'true' - name: Wait for backend server run: | echo "Waiting for backend server to be ready..." - for i in {1..30}; do - if curl -s http://localhost:3008/api/health > /dev/null 2>&1; then + for i in {1..60}; do + if curl -s -f http://localhost:3008/api/health > /dev/null 2>&1; then echo "Backend server is ready!" + curl -s http://localhost:3008/api/health | jq . 2>/dev/null || echo "Health check response: $(curl -s http://localhost:3008/api/health 2>/dev/null || echo 'No response')" exit 0 fi - echo "Waiting... ($i/30)" + echo "Waiting... ($i/60)" sleep 1 done echo "Backend server failed to start!" + echo "Checking server status..." + ps aux | grep -E "(node|tsx)" | grep -v grep || echo "No node processes found" + netstat -tlnp 2>/dev/null | grep :3008 || echo "Port 3008 not listening" + echo "Testing health endpoint..." + curl -v http://localhost:3008/api/health 2>&1 || echo "Health endpoint failed" exit 1 - name: Run E2E tests @@ -59,6 +78,8 @@ jobs: CI: true VITE_SERVER_URL: http://localhost:3008 VITE_SKIP_SETUP: 'true' + # Keep UI-side login/defaults consistent + AUTOMAKER_API_KEY: test-api-key-for-e2e-tests - name: Upload Playwright report uses: actions/upload-artifact@v4 @@ -68,10 +89,12 @@ jobs: path: apps/ui/playwright-report/ retention-days: 7 - - name: Upload test results + - name: Upload test results (screenshots, traces, videos) uses: actions/upload-artifact@v4 - if: failure() + if: always() with: name: test-results - path: apps/ui/test-results/ + path: | + apps/ui/test-results/ retention-days: 7 + if-no-files-found: ignore diff --git a/.github/workflows/security-audit.yml b/.github/workflows/security-audit.yml index 1a867179..7da30c5d 100644 --- a/.github/workflows/security-audit.yml +++ b/.github/workflows/security-audit.yml @@ -26,5 +26,5 @@ jobs: check-lockfile: 'true' - name: Run npm audit - run: npm audit --audit-level=moderate + run: npm audit --audit-level=critical continue-on-error: false diff --git a/apps/server/.env.example b/apps/server/.env.example index 4210b63d..68b28395 100644 --- a/apps/server/.env.example +++ b/apps/server/.env.example @@ -8,6 +8,20 @@ # Your Anthropic API key for Claude models ANTHROPIC_API_KEY=sk-ant-... +# ============================================ +# OPTIONAL - Additional API Keys +# ============================================ + +# OpenAI API key for Codex/GPT models +OPENAI_API_KEY=sk-... + +# Cursor API key for Cursor models +CURSOR_API_KEY=... + +# OAuth credentials for CLI authentication (extracted automatically) +CLAUDE_OAUTH_CREDENTIALS= +CURSOR_AUTH_TOKEN= + # ============================================ # OPTIONAL - Security # ============================================ diff --git a/apps/server/package.json b/apps/server/package.json index 5baf99fc..8d26339a 100644 --- a/apps/server/package.json +++ b/apps/server/package.json @@ -33,6 +33,7 @@ "@automaker/types": "1.0.0", "@automaker/utils": "1.0.0", "@modelcontextprotocol/sdk": "1.25.1", + "@openai/codex-sdk": "^0.77.0", "cookie-parser": "1.4.7", "cors": "2.8.5", "dotenv": "17.2.3", diff --git a/apps/server/src/index.ts b/apps/server/src/index.ts index 9ba53ed8..755569de 100644 --- a/apps/server/src/index.ts +++ b/apps/server/src/index.ts @@ -53,6 +53,8 @@ import { SettingsService } from './services/settings-service.js'; import { createSpecRegenerationRoutes } from './routes/app-spec/index.js'; import { createClaudeRoutes } from './routes/claude/index.js'; import { ClaudeUsageService } from './services/claude-usage-service.js'; +import { createCodexRoutes } from './routes/codex/index.js'; +import { CodexUsageService } from './services/codex-usage-service.js'; import { createGitHubRoutes } from './routes/github/index.js'; import { createContextRoutes } from './routes/context/index.js'; import { createBacklogPlanRoutes } from './routes/backlog-plan/index.js'; @@ -166,6 +168,7 @@ const agentService = new AgentService(DATA_DIR, events, settingsService); const featureLoader = new FeatureLoader(); const autoModeService = new AutoModeService(events, settingsService); const claudeUsageService = new ClaudeUsageService(); +const codexUsageService = new CodexUsageService(); const mcpTestService = new MCPTestService(settingsService); const ideationService = new IdeationService(events, settingsService, featureLoader); @@ -188,9 +191,10 @@ setInterval(() => { // This helps prevent CSRF and content-type confusion attacks app.use('/api', requireJsonContentType); -// Mount API routes - health and auth are unauthenticated +// Mount API routes - health, auth, and setup are unauthenticated app.use('/api/health', createHealthRoutes()); app.use('/api/auth', createAuthRoutes()); +app.use('/api/setup', createSetupRoutes()); // Apply authentication to all other routes app.use('/api', authMiddleware); @@ -206,7 +210,6 @@ app.use('/api/auto-mode', createAutoModeRoutes(autoModeService)); app.use('/api/enhance-prompt', createEnhancePromptRoutes(settingsService)); app.use('/api/worktree', createWorktreeRoutes()); app.use('/api/git', createGitRoutes()); -app.use('/api/setup', createSetupRoutes()); app.use('/api/suggestions', createSuggestionsRoutes(events, settingsService)); app.use('/api/models', createModelsRoutes()); app.use('/api/spec-regeneration', createSpecRegenerationRoutes(events, settingsService)); @@ -216,6 +219,7 @@ app.use('/api/templates', createTemplatesRoutes()); app.use('/api/terminal', createTerminalRoutes()); app.use('/api/settings', createSettingsRoutes(settingsService)); app.use('/api/claude', createClaudeRoutes(claudeUsageService)); +app.use('/api/codex', createCodexRoutes(codexUsageService)); app.use('/api/github', createGitHubRoutes(events, settingsService)); app.use('/api/context', createContextRoutes(settingsService)); app.use('/api/backlog-plan', createBacklogPlanRoutes(events, settingsService)); diff --git a/apps/server/src/lib/agent-discovery.ts b/apps/server/src/lib/agent-discovery.ts new file mode 100644 index 00000000..b831bdec --- /dev/null +++ b/apps/server/src/lib/agent-discovery.ts @@ -0,0 +1,257 @@ +/** + * Agent Discovery - Scans filesystem for AGENT.md files + * + * Discovers agents from: + * - ~/.claude/agents/ (user-level, global) + * - .claude/agents/ (project-level) + * + * Similar to Skills, but for custom subagents defined in AGENT.md files. + */ + +import path from 'path'; +import os from 'os'; +import { createLogger } from '@automaker/utils'; +import { secureFs, systemPaths } from '@automaker/platform'; +import type { AgentDefinition } from '@automaker/types'; + +const logger = createLogger('AgentDiscovery'); + +export interface FilesystemAgent { + name: string; // Directory name (e.g., 'code-reviewer') + definition: AgentDefinition; + source: 'user' | 'project'; + filePath: string; // Full path to AGENT.md +} + +/** + * Parse agent content string into AgentDefinition + * Format: + * --- + * name: agent-name # Optional + * description: When to use this agent + * tools: tool1, tool2, tool3 # Optional (comma or space separated list) + * model: sonnet # Optional: sonnet, opus, haiku + * --- + * System prompt content here... + */ +function parseAgentContent(content: string, filePath: string): AgentDefinition | null { + // Extract frontmatter + const frontmatterMatch = content.match(/^---\n([\s\S]*?)\n---\n([\s\S]*)$/); + if (!frontmatterMatch) { + logger.warn(`Invalid agent file format (missing frontmatter): ${filePath}`); + return null; + } + + const [, frontmatter, prompt] = frontmatterMatch; + + // Parse description (required) + const description = frontmatter.match(/description:\s*(.+)/)?.[1]?.trim(); + if (!description) { + logger.warn(`Missing description in agent file: ${filePath}`); + return null; + } + + // Parse tools (optional) - supports both comma-separated and space-separated + const toolsMatch = frontmatter.match(/tools:\s*(.+)/); + const tools = toolsMatch + ? toolsMatch[1] + .split(/[,\s]+/) // Split by comma or whitespace + .map((t) => t.trim()) + .filter((t) => t && t !== '') + : undefined; + + // Parse model (optional) - validate against allowed values + const modelMatch = frontmatter.match(/model:\s*(\w+)/); + const modelValue = modelMatch?.[1]?.trim(); + const validModels = ['sonnet', 'opus', 'haiku', 'inherit'] as const; + const model = + modelValue && validModels.includes(modelValue as (typeof validModels)[number]) + ? (modelValue as 'sonnet' | 'opus' | 'haiku' | 'inherit') + : undefined; + + if (modelValue && !model) { + logger.warn( + `Invalid model "${modelValue}" in agent file: ${filePath}. Expected one of: ${validModels.join(', ')}` + ); + } + + return { + description, + prompt: prompt.trim(), + tools, + model, + }; +} + +/** + * Directory entry with type information + */ +interface DirEntry { + name: string; + isFile: boolean; + isDirectory: boolean; +} + +/** + * Filesystem adapter interface for abstracting systemPaths vs secureFs + */ +interface FsAdapter { + exists: (filePath: string) => Promise; + readdir: (dirPath: string) => Promise; + readFile: (filePath: string) => Promise; +} + +/** + * Create a filesystem adapter for system paths (user directory) + */ +function createSystemPathAdapter(): FsAdapter { + return { + exists: (filePath) => Promise.resolve(systemPaths.systemPathExists(filePath)), + readdir: async (dirPath) => { + const entryNames = await systemPaths.systemPathReaddir(dirPath); + const entries: DirEntry[] = []; + for (const name of entryNames) { + const stat = await systemPaths.systemPathStat(path.join(dirPath, name)); + entries.push({ + name, + isFile: stat.isFile(), + isDirectory: stat.isDirectory(), + }); + } + return entries; + }, + readFile: (filePath) => systemPaths.systemPathReadFile(filePath, 'utf-8') as Promise, + }; +} + +/** + * Create a filesystem adapter for project paths (secureFs) + */ +function createSecureFsAdapter(): FsAdapter { + return { + exists: (filePath) => + secureFs + .access(filePath) + .then(() => true) + .catch(() => false), + readdir: async (dirPath) => { + const entries = await secureFs.readdir(dirPath, { withFileTypes: true }); + return entries.map((entry) => ({ + name: entry.name, + isFile: entry.isFile(), + isDirectory: entry.isDirectory(), + })); + }, + readFile: (filePath) => secureFs.readFile(filePath, 'utf-8') as Promise, + }; +} + +/** + * Parse agent file using the provided filesystem adapter + */ +async function parseAgentFileWithAdapter( + filePath: string, + fsAdapter: FsAdapter +): Promise { + try { + const content = await fsAdapter.readFile(filePath); + return parseAgentContent(content, filePath); + } catch (error) { + logger.error(`Failed to parse agent file: ${filePath}`, error); + return null; + } +} + +/** + * Scan a directory for agent .md files + * Agents can be in two formats: + * 1. Flat: agent-name.md (file directly in agents/) + * 2. Subdirectory: agent-name/AGENT.md (folder + file, similar to Skills) + */ +async function scanAgentsDirectory( + baseDir: string, + source: 'user' | 'project' +): Promise { + const agents: FilesystemAgent[] = []; + const fsAdapter = source === 'user' ? createSystemPathAdapter() : createSecureFsAdapter(); + + try { + // Check if directory exists + const exists = await fsAdapter.exists(baseDir); + if (!exists) { + logger.debug(`Directory does not exist: ${baseDir}`); + return agents; + } + + // Read all entries in the directory + const entries = await fsAdapter.readdir(baseDir); + + for (const entry of entries) { + // Check for flat .md file format (agent-name.md) + if (entry.isFile && entry.name.endsWith('.md')) { + const agentName = entry.name.slice(0, -3); // Remove .md extension + const agentFilePath = path.join(baseDir, entry.name); + const definition = await parseAgentFileWithAdapter(agentFilePath, fsAdapter); + if (definition) { + agents.push({ + name: agentName, + definition, + source, + filePath: agentFilePath, + }); + logger.debug(`Discovered ${source} agent (flat): ${agentName}`); + } + } + // Check for subdirectory format (agent-name/AGENT.md) + else if (entry.isDirectory) { + const agentFilePath = path.join(baseDir, entry.name, 'AGENT.md'); + const agentFileExists = await fsAdapter.exists(agentFilePath); + + if (agentFileExists) { + const definition = await parseAgentFileWithAdapter(agentFilePath, fsAdapter); + if (definition) { + agents.push({ + name: entry.name, + definition, + source, + filePath: agentFilePath, + }); + logger.debug(`Discovered ${source} agent (subdirectory): ${entry.name}`); + } + } + } + } + } catch (error) { + logger.error(`Failed to scan agents directory: ${baseDir}`, error); + } + + return agents; +} + +/** + * Discover all filesystem-based agents from user and project sources + */ +export async function discoverFilesystemAgents( + projectPath?: string, + sources: Array<'user' | 'project'> = ['user', 'project'] +): Promise { + const agents: FilesystemAgent[] = []; + + // Discover user-level agents from ~/.claude/agents/ + if (sources.includes('user')) { + const userAgentsDir = path.join(os.homedir(), '.claude', 'agents'); + const userAgents = await scanAgentsDirectory(userAgentsDir, 'user'); + agents.push(...userAgents); + logger.info(`Discovered ${userAgents.length} user-level agents from ${userAgentsDir}`); + } + + // Discover project-level agents from .claude/agents/ + if (sources.includes('project') && projectPath) { + const projectAgentsDir = path.join(projectPath, '.claude', 'agents'); + const projectAgents = await scanAgentsDirectory(projectAgentsDir, 'project'); + agents.push(...projectAgents); + logger.info(`Discovered ${projectAgents.length} project-level agents from ${projectAgentsDir}`); + } + + return agents; +} diff --git a/apps/server/src/lib/auth-utils.ts b/apps/server/src/lib/auth-utils.ts new file mode 100644 index 00000000..936d2277 --- /dev/null +++ b/apps/server/src/lib/auth-utils.ts @@ -0,0 +1,263 @@ +/** + * Secure authentication utilities that avoid environment variable race conditions + */ + +import { spawn } from 'child_process'; +import { createLogger } from '@automaker/utils'; + +const logger = createLogger('AuthUtils'); + +export interface SecureAuthEnv { + [key: string]: string | undefined; +} + +export interface AuthValidationResult { + isValid: boolean; + error?: string; + normalizedKey?: string; +} + +/** + * Validates API key format without modifying process.env + */ +export function validateApiKey( + key: string, + provider: 'anthropic' | 'openai' | 'cursor' +): AuthValidationResult { + if (!key || typeof key !== 'string' || key.trim().length === 0) { + return { isValid: false, error: 'API key is required' }; + } + + const trimmedKey = key.trim(); + + switch (provider) { + case 'anthropic': + if (!trimmedKey.startsWith('sk-ant-')) { + return { + isValid: false, + error: 'Invalid Anthropic API key format. Should start with "sk-ant-"', + }; + } + if (trimmedKey.length < 20) { + return { isValid: false, error: 'Anthropic API key too short' }; + } + break; + + case 'openai': + if (!trimmedKey.startsWith('sk-')) { + return { isValid: false, error: 'Invalid OpenAI API key format. Should start with "sk-"' }; + } + if (trimmedKey.length < 20) { + return { isValid: false, error: 'OpenAI API key too short' }; + } + break; + + case 'cursor': + // Cursor API keys might have different format + if (trimmedKey.length < 10) { + return { isValid: false, error: 'Cursor API key too short' }; + } + break; + } + + return { isValid: true, normalizedKey: trimmedKey }; +} + +/** + * Creates a secure environment object for authentication testing + * without modifying the global process.env + */ +export function createSecureAuthEnv( + authMethod: 'cli' | 'api_key', + apiKey?: string, + provider: 'anthropic' | 'openai' | 'cursor' = 'anthropic' +): SecureAuthEnv { + const env: SecureAuthEnv = { ...process.env }; + + if (authMethod === 'cli') { + // For CLI auth, remove the API key to force CLI authentication + const envKey = provider === 'openai' ? 'OPENAI_API_KEY' : 'ANTHROPIC_API_KEY'; + delete env[envKey]; + } else if (authMethod === 'api_key' && apiKey) { + // For API key auth, validate and set the provided key + const validation = validateApiKey(apiKey, provider); + if (!validation.isValid) { + throw new Error(validation.error); + } + const envKey = provider === 'openai' ? 'OPENAI_API_KEY' : 'ANTHROPIC_API_KEY'; + env[envKey] = validation.normalizedKey; + } + + return env; +} + +/** + * Creates a temporary environment override for the current process + * WARNING: This should only be used in isolated contexts and immediately cleaned up + */ +export function createTempEnvOverride(authEnv: SecureAuthEnv): () => void { + const originalEnv = { ...process.env }; + + // Apply the auth environment + Object.assign(process.env, authEnv); + + // Return cleanup function + return () => { + // Restore original environment + Object.keys(process.env).forEach((key) => { + if (!(key in originalEnv)) { + delete process.env[key]; + } + }); + Object.assign(process.env, originalEnv); + }; +} + +/** + * Spawns a process with secure environment isolation + */ +export function spawnSecureAuth( + command: string, + args: string[], + authEnv: SecureAuthEnv, + options: { + cwd?: string; + timeout?: number; + } = {} +): Promise<{ stdout: string; stderr: string; exitCode: number | null }> { + return new Promise((resolve, reject) => { + const { cwd = process.cwd(), timeout = 30000 } = options; + + logger.debug(`Spawning secure auth process: ${command} ${args.join(' ')}`); + + const child = spawn(command, args, { + cwd, + env: authEnv, + stdio: 'pipe', + shell: false, + }); + + let stdout = ''; + let stderr = ''; + let isResolved = false; + + const timeoutId = setTimeout(() => { + if (!isResolved) { + child.kill('SIGTERM'); + isResolved = true; + reject(new Error('Authentication process timed out')); + } + }, timeout); + + child.stdout?.on('data', (data) => { + stdout += data.toString(); + }); + + child.stderr?.on('data', (data) => { + stderr += data.toString(); + }); + + child.on('close', (code) => { + clearTimeout(timeoutId); + if (!isResolved) { + isResolved = true; + resolve({ stdout, stderr, exitCode: code }); + } + }); + + child.on('error', (error) => { + clearTimeout(timeoutId); + if (!isResolved) { + isResolved = true; + reject(error); + } + }); + }); +} + +/** + * Safely extracts environment variable without race conditions + */ +export function safeGetEnv(key: string): string | undefined { + return process.env[key]; +} + +/** + * Checks if an environment variable would be modified without actually modifying it + */ +export function wouldModifyEnv(key: string, newValue: string): boolean { + const currentValue = safeGetEnv(key); + return currentValue !== newValue; +} + +/** + * Secure auth session management + */ +export class AuthSessionManager { + private static activeSessions = new Map(); + + static createSession( + sessionId: string, + authMethod: 'cli' | 'api_key', + apiKey?: string, + provider: 'anthropic' | 'openai' | 'cursor' = 'anthropic' + ): SecureAuthEnv { + const env = createSecureAuthEnv(authMethod, apiKey, provider); + this.activeSessions.set(sessionId, env); + return env; + } + + static getSession(sessionId: string): SecureAuthEnv | undefined { + return this.activeSessions.get(sessionId); + } + + static destroySession(sessionId: string): void { + this.activeSessions.delete(sessionId); + } + + static cleanup(): void { + this.activeSessions.clear(); + } +} + +/** + * Rate limiting for auth attempts to prevent abuse + */ +export class AuthRateLimiter { + private attempts = new Map(); + + constructor( + private maxAttempts = 5, + private windowMs = 60000 + ) {} + + canAttempt(identifier: string): boolean { + const now = Date.now(); + const record = this.attempts.get(identifier); + + if (!record || now - record.lastAttempt > this.windowMs) { + this.attempts.set(identifier, { count: 1, lastAttempt: now }); + return true; + } + + if (record.count >= this.maxAttempts) { + return false; + } + + record.count++; + record.lastAttempt = now; + return true; + } + + getRemainingAttempts(identifier: string): number { + const record = this.attempts.get(identifier); + if (!record) return this.maxAttempts; + return Math.max(0, this.maxAttempts - record.count); + } + + getResetTime(identifier: string): Date | null { + const record = this.attempts.get(identifier); + if (!record) return null; + return new Date(record.lastAttempt + this.windowMs); + } +} diff --git a/apps/server/src/lib/auth.ts b/apps/server/src/lib/auth.ts index 3120d512..0a4b5389 100644 --- a/apps/server/src/lib/auth.ts +++ b/apps/server/src/lib/auth.ts @@ -262,7 +262,7 @@ export function getSessionCookieOptions(): { return { httpOnly: true, // JavaScript cannot access this cookie secure: process.env.NODE_ENV === 'production', // HTTPS only in production - sameSite: 'strict', // Only sent for same-site requests (CSRF protection) + sameSite: 'lax', // Sent for same-site requests and top-level navigations, but not cross-origin fetch/XHR maxAge: SESSION_MAX_AGE_MS, path: '/', }; diff --git a/apps/server/src/lib/cli-detection.ts b/apps/server/src/lib/cli-detection.ts new file mode 100644 index 00000000..eba4c68a --- /dev/null +++ b/apps/server/src/lib/cli-detection.ts @@ -0,0 +1,447 @@ +/** + * Unified CLI Detection Framework + * + * Provides consistent CLI detection and management across all providers + */ + +import { spawn, execSync } from 'child_process'; +import * as fs from 'fs'; +import * as path from 'path'; +import * as os from 'os'; +import { createLogger } from '@automaker/utils'; + +const logger = createLogger('CliDetection'); + +export interface CliInfo { + name: string; + command: string; + version?: string; + path?: string; + installed: boolean; + authenticated: boolean; + authMethod: 'cli' | 'api_key' | 'none'; + platform?: string; + architectures?: string[]; +} + +export interface CliDetectionOptions { + timeout?: number; + includeWsl?: boolean; + wslDistribution?: string; +} + +export interface CliDetectionResult { + cli: CliInfo; + detected: boolean; + issues: string[]; +} + +export interface UnifiedCliDetection { + claude?: CliDetectionResult; + codex?: CliDetectionResult; + cursor?: CliDetectionResult; +} + +/** + * CLI Configuration for different providers + */ +const CLI_CONFIGS = { + claude: { + name: 'Claude CLI', + commands: ['claude'], + versionArgs: ['--version'], + installCommands: { + darwin: 'brew install anthropics/claude/claude', + linux: 'curl -fsSL https://claude.ai/install.sh | sh', + win32: 'iwr https://claude.ai/install.ps1 -UseBasicParsing | iex', + }, + }, + codex: { + name: 'Codex CLI', + commands: ['codex', 'openai'], + versionArgs: ['--version'], + installCommands: { + darwin: 'npm install -g @openai/codex-cli', + linux: 'npm install -g @openai/codex-cli', + win32: 'npm install -g @openai/codex-cli', + }, + }, + cursor: { + name: 'Cursor CLI', + commands: ['cursor-agent', 'cursor'], + versionArgs: ['--version'], + installCommands: { + darwin: 'brew install cursor/cursor/cursor-agent', + linux: 'curl -fsSL https://cursor.sh/install.sh | sh', + win32: 'iwr https://cursor.sh/install.ps1 -UseBasicParsing | iex', + }, + }, +} as const; + +/** + * Detect if a CLI is installed and available + */ +export async function detectCli( + provider: keyof typeof CLI_CONFIGS, + options: CliDetectionOptions = {} +): Promise { + const config = CLI_CONFIGS[provider]; + const { timeout = 5000, includeWsl = false, wslDistribution } = options; + const issues: string[] = []; + + const cliInfo: CliInfo = { + name: config.name, + command: '', + installed: false, + authenticated: false, + authMethod: 'none', + }; + + try { + // Find the command in PATH + const command = await findCommand([...config.commands]); + if (command) { + cliInfo.command = command; + } + + if (!cliInfo.command) { + issues.push(`${config.name} not found in PATH`); + return { cli: cliInfo, detected: false, issues }; + } + + cliInfo.path = cliInfo.command; + cliInfo.installed = true; + + // Get version + try { + cliInfo.version = await getCliVersion(cliInfo.command, [...config.versionArgs], timeout); + } catch (error) { + issues.push(`Failed to get ${config.name} version: ${error}`); + } + + // Check authentication + cliInfo.authMethod = await checkCliAuth(provider, cliInfo.command); + cliInfo.authenticated = cliInfo.authMethod !== 'none'; + + return { cli: cliInfo, detected: true, issues }; + } catch (error) { + issues.push(`Error detecting ${config.name}: ${error}`); + return { cli: cliInfo, detected: false, issues }; + } +} + +/** + * Detect all CLIs in the system + */ +export async function detectAllCLis( + options: CliDetectionOptions = {} +): Promise { + const results: UnifiedCliDetection = {}; + + // Detect all providers in parallel + const providers = Object.keys(CLI_CONFIGS) as Array; + const detectionPromises = providers.map(async (provider) => { + const result = await detectCli(provider, options); + return { provider, result }; + }); + + const detections = await Promise.all(detectionPromises); + + for (const { provider, result } of detections) { + results[provider] = result; + } + + return results; +} + +/** + * Find the first available command from a list of alternatives + */ +export async function findCommand(commands: string[]): Promise { + for (const command of commands) { + try { + const whichCommand = process.platform === 'win32' ? 'where' : 'which'; + const result = execSync(`${whichCommand} ${command}`, { + encoding: 'utf8', + timeout: 2000, + }).trim(); + + if (result) { + return result.split('\n')[0]; // Take first result on Windows + } + } catch { + // Command not found, try next + } + } + return null; +} + +/** + * Get CLI version + */ +export async function getCliVersion( + command: string, + args: string[], + timeout: number = 5000 +): Promise { + return new Promise((resolve, reject) => { + const child = spawn(command, args, { + stdio: 'pipe', + timeout, + }); + + let stdout = ''; + let stderr = ''; + + child.stdout?.on('data', (data) => { + stdout += data.toString(); + }); + + child.stderr?.on('data', (data) => { + stderr += data.toString(); + }); + + child.on('close', (code) => { + if (code === 0 && stdout) { + resolve(stdout.trim()); + } else if (stderr) { + reject(stderr.trim()); + } else { + reject(`Command exited with code ${code}`); + } + }); + + child.on('error', reject); + }); +} + +/** + * Check authentication status for a CLI + */ +export async function checkCliAuth( + provider: keyof typeof CLI_CONFIGS, + command: string +): Promise<'cli' | 'api_key' | 'none'> { + try { + switch (provider) { + case 'claude': + return await checkClaudeAuth(command); + case 'codex': + return await checkCodexAuth(command); + case 'cursor': + return await checkCursorAuth(command); + default: + return 'none'; + } + } catch { + return 'none'; + } +} + +/** + * Check Claude CLI authentication + */ +async function checkClaudeAuth(command: string): Promise<'cli' | 'api_key' | 'none'> { + try { + // Check for environment variable + if (process.env.ANTHROPIC_API_KEY) { + return 'api_key'; + } + + // Try running a simple command to check CLI auth + const result = await getCliVersion(command, ['--version'], 3000); + if (result) { + return 'cli'; // If version works, assume CLI is authenticated + } + } catch { + // Version command might work even without auth, so we need a better check + } + + // Try a more specific auth check + return new Promise((resolve) => { + const child = spawn(command, ['whoami'], { + stdio: 'pipe', + timeout: 3000, + }); + + let stdout = ''; + let stderr = ''; + + child.stdout?.on('data', (data) => { + stdout += data.toString(); + }); + + child.stderr?.on('data', (data) => { + stderr += data.toString(); + }); + + child.on('close', (code) => { + if (code === 0 && stdout && !stderr.includes('not authenticated')) { + resolve('cli'); + } else { + resolve('none'); + } + }); + + child.on('error', () => { + resolve('none'); + }); + }); +} + +/** + * Check Codex CLI authentication + */ +async function checkCodexAuth(command: string): Promise<'cli' | 'api_key' | 'none'> { + // Check for environment variable + if (process.env.OPENAI_API_KEY) { + return 'api_key'; + } + + try { + // Try a simple auth check + const result = await getCliVersion(command, ['--version'], 3000); + if (result) { + return 'cli'; + } + } catch { + // Version check failed + } + + return 'none'; +} + +/** + * Check Cursor CLI authentication + */ +async function checkCursorAuth(command: string): Promise<'cli' | 'api_key' | 'none'> { + // Check for environment variable + if (process.env.CURSOR_API_KEY) { + return 'api_key'; + } + + // Check for credentials files + const credentialPaths = [ + path.join(os.homedir(), '.cursor', 'credentials.json'), + path.join(os.homedir(), '.config', 'cursor', 'credentials.json'), + path.join(os.homedir(), '.cursor', 'auth.json'), + path.join(os.homedir(), '.config', 'cursor', 'auth.json'), + ]; + + for (const credPath of credentialPaths) { + try { + if (fs.existsSync(credPath)) { + const content = fs.readFileSync(credPath, 'utf8'); + const creds = JSON.parse(content); + if (creds.accessToken || creds.token || creds.apiKey) { + return 'cli'; + } + } + } catch { + // Invalid credentials file + } + } + + // Try a simple command + try { + const result = await getCliVersion(command, ['--version'], 3000); + if (result) { + return 'cli'; + } + } catch { + // Version check failed + } + + return 'none'; +} + +/** + * Get installation instructions for a provider + */ +export function getInstallInstructions( + provider: keyof typeof CLI_CONFIGS, + platform: NodeJS.Platform = process.platform +): string { + const config = CLI_CONFIGS[provider]; + const command = config.installCommands[platform as keyof typeof config.installCommands]; + + if (!command) { + return `No installation instructions available for ${provider} on ${platform}`; + } + + return command; +} + +/** + * Get platform-specific CLI paths and versions + */ +export function getPlatformCliPaths(provider: keyof typeof CLI_CONFIGS): string[] { + const config = CLI_CONFIGS[provider]; + const platform = process.platform; + + switch (platform) { + case 'darwin': + return [ + `/usr/local/bin/${config.commands[0]}`, + `/opt/homebrew/bin/${config.commands[0]}`, + path.join(os.homedir(), '.local', 'bin', config.commands[0]), + ]; + + case 'linux': + return [ + `/usr/bin/${config.commands[0]}`, + `/usr/local/bin/${config.commands[0]}`, + path.join(os.homedir(), '.local', 'bin', config.commands[0]), + path.join(os.homedir(), '.npm', 'global', 'bin', config.commands[0]), + ]; + + case 'win32': + return [ + path.join( + os.homedir(), + 'AppData', + 'Local', + 'Programs', + config.commands[0], + `${config.commands[0]}.exe` + ), + path.join(process.env.ProgramFiles || '', config.commands[0], `${config.commands[0]}.exe`), + path.join( + process.env.ProgramFiles || '', + config.commands[0], + 'bin', + `${config.commands[0]}.exe` + ), + ]; + + default: + return []; + } +} + +/** + * Validate CLI installation + */ +export function validateCliInstallation(cliInfo: CliInfo): { + valid: boolean; + issues: string[]; +} { + const issues: string[] = []; + + if (!cliInfo.installed) { + issues.push('CLI is not installed'); + } + + if (cliInfo.installed && !cliInfo.version) { + issues.push('Could not determine CLI version'); + } + + if (cliInfo.installed && cliInfo.authMethod === 'none') { + issues.push('CLI is not authenticated'); + } + + return { + valid: issues.length === 0, + issues, + }; +} diff --git a/apps/server/src/lib/codex-auth.ts b/apps/server/src/lib/codex-auth.ts new file mode 100644 index 00000000..965885bc --- /dev/null +++ b/apps/server/src/lib/codex-auth.ts @@ -0,0 +1,98 @@ +/** + * Shared utility for checking Codex CLI authentication status + * + * Uses 'codex login status' command to verify authentication. + * Never assumes authenticated - only returns true if CLI confirms. + */ + +import { spawnProcess, getCodexAuthPath } from '@automaker/platform'; +import { findCodexCliPath } from '@automaker/platform'; +import * as fs from 'fs'; + +const CODEX_COMMAND = 'codex'; +const OPENAI_API_KEY_ENV = 'OPENAI_API_KEY'; + +export interface CodexAuthCheckResult { + authenticated: boolean; + method: 'api_key_env' | 'cli_authenticated' | 'none'; +} + +/** + * Check Codex authentication status using 'codex login status' command + * + * @param cliPath Optional CLI path. If not provided, will attempt to find it. + * @returns Authentication status and method + */ +export async function checkCodexAuthentication( + cliPath?: string | null +): Promise { + console.log('[CodexAuth] checkCodexAuthentication called with cliPath:', cliPath); + + const resolvedCliPath = cliPath || (await findCodexCliPath()); + const hasApiKey = !!process.env[OPENAI_API_KEY_ENV]; + + console.log('[CodexAuth] resolvedCliPath:', resolvedCliPath); + console.log('[CodexAuth] hasApiKey:', hasApiKey); + + // Debug: Check auth file + const authFilePath = getCodexAuthPath(); + console.log('[CodexAuth] Auth file path:', authFilePath); + try { + const authFileExists = fs.existsSync(authFilePath); + console.log('[CodexAuth] Auth file exists:', authFileExists); + if (authFileExists) { + const authContent = fs.readFileSync(authFilePath, 'utf-8'); + console.log('[CodexAuth] Auth file content:', authContent.substring(0, 500)); // First 500 chars + } + } catch (error) { + console.log('[CodexAuth] Error reading auth file:', error); + } + + // If CLI is not installed, cannot be authenticated + if (!resolvedCliPath) { + console.log('[CodexAuth] No CLI path found, returning not authenticated'); + return { authenticated: false, method: 'none' }; + } + + try { + console.log('[CodexAuth] Running: ' + resolvedCliPath + ' login status'); + const result = await spawnProcess({ + command: resolvedCliPath || CODEX_COMMAND, + args: ['login', 'status'], + cwd: process.cwd(), + env: { + ...process.env, + TERM: 'dumb', // Avoid interactive output + }, + }); + + console.log('[CodexAuth] Command result:'); + console.log('[CodexAuth] exitCode:', result.exitCode); + console.log('[CodexAuth] stdout:', JSON.stringify(result.stdout)); + console.log('[CodexAuth] stderr:', JSON.stringify(result.stderr)); + + // Check both stdout and stderr for "logged in" - Codex CLI outputs to stderr + const combinedOutput = (result.stdout + result.stderr).toLowerCase(); + const isLoggedIn = combinedOutput.includes('logged in'); + console.log('[CodexAuth] isLoggedIn (contains "logged in" in stdout or stderr):', isLoggedIn); + + if (result.exitCode === 0 && isLoggedIn) { + // Determine auth method based on what we know + const method = hasApiKey ? 'api_key_env' : 'cli_authenticated'; + console.log('[CodexAuth] Authenticated! method:', method); + return { authenticated: true, method }; + } + + console.log( + '[CodexAuth] Not authenticated. exitCode:', + result.exitCode, + 'isLoggedIn:', + isLoggedIn + ); + } catch (error) { + console.log('[CodexAuth] Error running command:', error); + } + + console.log('[CodexAuth] Returning not authenticated'); + return { authenticated: false, method: 'none' }; +} diff --git a/apps/server/src/lib/error-handler.ts b/apps/server/src/lib/error-handler.ts new file mode 100644 index 00000000..770f26a2 --- /dev/null +++ b/apps/server/src/lib/error-handler.ts @@ -0,0 +1,414 @@ +/** + * Unified Error Handling System for CLI Providers + * + * Provides consistent error classification, user-friendly messages, and debugging support + * across all AI providers (Claude, Codex, Cursor) + */ + +import { createLogger } from '@automaker/utils'; + +const logger = createLogger('ErrorHandler'); + +export enum ErrorType { + AUTHENTICATION = 'authentication', + BILLING = 'billing', + RATE_LIMIT = 'rate_limit', + NETWORK = 'network', + TIMEOUT = 'timeout', + VALIDATION = 'validation', + PERMISSION = 'permission', + CLI_NOT_FOUND = 'cli_not_found', + CLI_NOT_INSTALLED = 'cli_not_installed', + MODEL_NOT_SUPPORTED = 'model_not_supported', + INVALID_REQUEST = 'invalid_request', + SERVER_ERROR = 'server_error', + UNKNOWN = 'unknown', +} + +export enum ErrorSeverity { + LOW = 'low', + MEDIUM = 'medium', + HIGH = 'high', + CRITICAL = 'critical', +} + +export interface ErrorClassification { + type: ErrorType; + severity: ErrorSeverity; + userMessage: string; + technicalMessage: string; + suggestedAction?: string; + retryable: boolean; + provider?: string; + context?: Record; +} + +export interface ErrorPattern { + type: ErrorType; + severity: ErrorSeverity; + patterns: RegExp[]; + userMessage: string; + suggestedAction?: string; + retryable: boolean; +} + +/** + * Error patterns for different types of errors + */ +const ERROR_PATTERNS: ErrorPattern[] = [ + // Authentication errors + { + type: ErrorType.AUTHENTICATION, + severity: ErrorSeverity.HIGH, + patterns: [ + /unauthorized/i, + /authentication.*fail/i, + /invalid_api_key/i, + /invalid api key/i, + /not authenticated/i, + /please.*log/i, + /token.*revoked/i, + /oauth.*error/i, + /credentials.*invalid/i, + ], + userMessage: 'Authentication failed. Please check your API key or login credentials.', + suggestedAction: + "Verify your API key is correct and hasn't expired, or run the CLI login command.", + retryable: false, + }, + + // Billing errors + { + type: ErrorType.BILLING, + severity: ErrorSeverity.HIGH, + patterns: [ + /credit.*balance.*low/i, + /insufficient.*credit/i, + /billing.*issue/i, + /payment.*required/i, + /usage.*exceeded/i, + /quota.*exceeded/i, + /add.*credit/i, + ], + userMessage: 'Account has insufficient credits or billing issues.', + suggestedAction: 'Please add credits to your account or check your billing settings.', + retryable: false, + }, + + // Rate limit errors + { + type: ErrorType.RATE_LIMIT, + severity: ErrorSeverity.MEDIUM, + patterns: [ + /rate.*limit/i, + /too.*many.*request/i, + /limit.*reached/i, + /try.*later/i, + /429/i, + /reset.*time/i, + /upgrade.*plan/i, + ], + userMessage: 'Rate limit reached. Please wait before trying again.', + suggestedAction: 'Wait a few minutes before retrying, or consider upgrading your plan.', + retryable: true, + }, + + // Network errors + { + type: ErrorType.NETWORK, + severity: ErrorSeverity.MEDIUM, + patterns: [/network/i, /connection/i, /dns/i, /timeout/i, /econnrefused/i, /enotfound/i], + userMessage: 'Network connection issue.', + suggestedAction: 'Check your internet connection and try again.', + retryable: true, + }, + + // Timeout errors + { + type: ErrorType.TIMEOUT, + severity: ErrorSeverity.MEDIUM, + patterns: [/timeout/i, /aborted/i, /time.*out/i], + userMessage: 'Operation timed out.', + suggestedAction: 'Try again with a simpler request or check your connection.', + retryable: true, + }, + + // Permission errors + { + type: ErrorType.PERMISSION, + severity: ErrorSeverity.HIGH, + patterns: [/permission.*denied/i, /access.*denied/i, /forbidden/i, /403/i, /not.*authorized/i], + userMessage: 'Permission denied.', + suggestedAction: 'Check if you have the required permissions for this operation.', + retryable: false, + }, + + // CLI not found + { + type: ErrorType.CLI_NOT_FOUND, + severity: ErrorSeverity.HIGH, + patterns: [/command not found/i, /not recognized/i, /not.*installed/i, /ENOENT/i], + userMessage: 'CLI tool not found.', + suggestedAction: "Please install the required CLI tool and ensure it's in your PATH.", + retryable: false, + }, + + // Model not supported + { + type: ErrorType.MODEL_NOT_SUPPORTED, + severity: ErrorSeverity.HIGH, + patterns: [/model.*not.*support/i, /unknown.*model/i, /invalid.*model/i], + userMessage: 'Model not supported.', + suggestedAction: 'Check available models and use a supported one.', + retryable: false, + }, + + // Server errors + { + type: ErrorType.SERVER_ERROR, + severity: ErrorSeverity.HIGH, + patterns: [/internal.*server/i, /server.*error/i, /500/i, /502/i, /503/i, /504/i], + userMessage: 'Server error occurred.', + suggestedAction: 'Try again in a few minutes or contact support if the issue persists.', + retryable: true, + }, +]; + +/** + * Classify an error into a specific type with user-friendly message + */ +export function classifyError( + error: unknown, + provider?: string, + context?: Record +): ErrorClassification { + const errorText = getErrorText(error); + + // Try to match against known patterns + for (const pattern of ERROR_PATTERNS) { + for (const regex of pattern.patterns) { + if (regex.test(errorText)) { + return { + type: pattern.type, + severity: pattern.severity, + userMessage: pattern.userMessage, + technicalMessage: errorText, + suggestedAction: pattern.suggestedAction, + retryable: pattern.retryable, + provider, + context, + }; + } + } + } + + // Unknown error + return { + type: ErrorType.UNKNOWN, + severity: ErrorSeverity.MEDIUM, + userMessage: 'An unexpected error occurred.', + technicalMessage: errorText, + suggestedAction: 'Please try again or contact support if the issue persists.', + retryable: true, + provider, + context, + }; +} + +/** + * Get a user-friendly error message + */ +export function getUserFriendlyErrorMessage(error: unknown, provider?: string): string { + const classification = classifyError(error, provider); + + let message = classification.userMessage; + + if (classification.suggestedAction) { + message += ` ${classification.suggestedAction}`; + } + + // Add provider-specific context if available + if (provider) { + message = `[${provider.toUpperCase()}] ${message}`; + } + + return message; +} + +/** + * Check if an error is retryable + */ +export function isRetryableError(error: unknown): boolean { + const classification = classifyError(error); + return classification.retryable; +} + +/** + * Check if an error is authentication-related + */ +export function isAuthenticationError(error: unknown): boolean { + const classification = classifyError(error); + return classification.type === ErrorType.AUTHENTICATION; +} + +/** + * Check if an error is billing-related + */ +export function isBillingError(error: unknown): boolean { + const classification = classifyError(error); + return classification.type === ErrorType.BILLING; +} + +/** + * Check if an error is rate limit related + */ +export function isRateLimitError(error: unknown): boolean { + const classification = classifyError(error); + return classification.type === ErrorType.RATE_LIMIT; +} + +/** + * Get error text from various error types + */ +function getErrorText(error: unknown): string { + if (typeof error === 'string') { + return error; + } + + if (error instanceof Error) { + return error.message; + } + + if (typeof error === 'object' && error !== null) { + // Handle structured error objects + const errorObj = error as any; + + if (errorObj.message) { + return errorObj.message; + } + + if (errorObj.error?.message) { + return errorObj.error.message; + } + + if (errorObj.error) { + return typeof errorObj.error === 'string' ? errorObj.error : JSON.stringify(errorObj.error); + } + + return JSON.stringify(error); + } + + return String(error); +} + +/** + * Create a standardized error response + */ +export function createErrorResponse( + error: unknown, + provider?: string, + context?: Record +): { + success: false; + error: string; + errorType: ErrorType; + severity: ErrorSeverity; + retryable: boolean; + suggestedAction?: string; +} { + const classification = classifyError(error, provider, context); + + return { + success: false, + error: classification.userMessage, + errorType: classification.type, + severity: classification.severity, + retryable: classification.retryable, + suggestedAction: classification.suggestedAction, + }; +} + +/** + * Log error with full context + */ +export function logError( + error: unknown, + provider?: string, + operation?: string, + additionalContext?: Record +): void { + const classification = classifyError(error, provider, { + operation, + ...additionalContext, + }); + + logger.error(`Error in ${provider || 'unknown'}${operation ? ` during ${operation}` : ''}`, { + type: classification.type, + severity: classification.severity, + message: classification.userMessage, + technicalMessage: classification.technicalMessage, + retryable: classification.retryable, + suggestedAction: classification.suggestedAction, + context: classification.context, + }); +} + +/** + * Provider-specific error handlers + */ +export const ProviderErrorHandler = { + claude: { + classify: (error: unknown) => classifyError(error, 'claude'), + getUserMessage: (error: unknown) => getUserFriendlyErrorMessage(error, 'claude'), + isAuth: (error: unknown) => isAuthenticationError(error), + isBilling: (error: unknown) => isBillingError(error), + isRateLimit: (error: unknown) => isRateLimitError(error), + }, + + codex: { + classify: (error: unknown) => classifyError(error, 'codex'), + getUserMessage: (error: unknown) => getUserFriendlyErrorMessage(error, 'codex'), + isAuth: (error: unknown) => isAuthenticationError(error), + isBilling: (error: unknown) => isBillingError(error), + isRateLimit: (error: unknown) => isRateLimitError(error), + }, + + cursor: { + classify: (error: unknown) => classifyError(error, 'cursor'), + getUserMessage: (error: unknown) => getUserFriendlyErrorMessage(error, 'cursor'), + isAuth: (error: unknown) => isAuthenticationError(error), + isBilling: (error: unknown) => isBillingError(error), + isRateLimit: (error: unknown) => isRateLimitError(error), + }, +}; + +/** + * Create a retry handler for retryable errors + */ +export function createRetryHandler(maxRetries: number = 3, baseDelay: number = 1000) { + return async function ( + operation: () => Promise, + shouldRetry: (error: unknown) => boolean = isRetryableError + ): Promise { + let lastError: unknown; + + for (let attempt = 0; attempt <= maxRetries; attempt++) { + try { + return await operation(); + } catch (error) { + lastError = error; + + if (attempt === maxRetries || !shouldRetry(error)) { + throw error; + } + + // Exponential backoff with jitter + const delay = baseDelay * Math.pow(2, attempt) + Math.random() * 1000; + logger.debug(`Retrying operation in ${delay}ms (attempt ${attempt + 1}/${maxRetries})`); + await new Promise((resolve) => setTimeout(resolve, delay)); + } + } + + throw lastError; + }; +} diff --git a/apps/server/src/lib/permission-enforcer.ts b/apps/server/src/lib/permission-enforcer.ts new file mode 100644 index 00000000..003608ee --- /dev/null +++ b/apps/server/src/lib/permission-enforcer.ts @@ -0,0 +1,173 @@ +/** + * Permission enforcement utilities for Cursor provider + */ + +import type { CursorCliConfigFile } from '@automaker/types'; +import { createLogger } from '@automaker/utils'; + +const logger = createLogger('PermissionEnforcer'); + +export interface PermissionCheckResult { + allowed: boolean; + reason?: string; +} + +/** + * Check if a tool call is allowed based on permissions + */ +export function checkToolCallPermission( + toolCall: any, + permissions: CursorCliConfigFile | null +): PermissionCheckResult { + if (!permissions || !permissions.permissions) { + // If no permissions are configured, allow everything (backward compatibility) + return { allowed: true }; + } + + const { allow = [], deny = [] } = permissions.permissions; + + // Check shell tool calls + if (toolCall.shellToolCall?.args?.command) { + const command = toolCall.shellToolCall.args.command; + const toolName = `Shell(${extractCommandName(command)})`; + + // Check deny list first (deny takes precedence) + for (const denyRule of deny) { + if (matchesRule(toolName, denyRule)) { + return { + allowed: false, + reason: `Operation blocked by permission rule: ${denyRule}`, + }; + } + } + + // Then check allow list + for (const allowRule of allow) { + if (matchesRule(toolName, allowRule)) { + return { allowed: true }; + } + } + + return { + allowed: false, + reason: `Operation not in allow list: ${toolName}`, + }; + } + + // Check read tool calls + if (toolCall.readToolCall?.args?.path) { + const path = toolCall.readToolCall.args.path; + const toolName = `Read(${path})`; + + // Check deny list first + for (const denyRule of deny) { + if (matchesRule(toolName, denyRule)) { + return { + allowed: false, + reason: `Read operation blocked by permission rule: ${denyRule}`, + }; + } + } + + // Then check allow list + for (const allowRule of allow) { + if (matchesRule(toolName, allowRule)) { + return { allowed: true }; + } + } + + return { + allowed: false, + reason: `Read operation not in allow list: ${toolName}`, + }; + } + + // Check write tool calls + if (toolCall.writeToolCall?.args?.path) { + const path = toolCall.writeToolCall.args.path; + const toolName = `Write(${path})`; + + // Check deny list first + for (const denyRule of deny) { + if (matchesRule(toolName, denyRule)) { + return { + allowed: false, + reason: `Write operation blocked by permission rule: ${denyRule}`, + }; + } + } + + // Then check allow list + for (const allowRule of allow) { + if (matchesRule(toolName, allowRule)) { + return { allowed: true }; + } + } + + return { + allowed: false, + reason: `Write operation not in allow list: ${toolName}`, + }; + } + + // For other tool types, allow by default for now + return { allowed: true }; +} + +/** + * Extract the base command name from a shell command + */ +function extractCommandName(command: string): string { + // Remove leading spaces and get the first word + const trimmed = command.trim(); + const firstWord = trimmed.split(/\s+/)[0]; + return firstWord || 'unknown'; +} + +/** + * Check if a tool name matches a permission rule + */ +function matchesRule(toolName: string, rule: string): boolean { + // Exact match + if (toolName === rule) { + return true; + } + + // Wildcard patterns + if (rule.includes('*')) { + const regex = new RegExp(rule.replace(/\*/g, '.*')); + return regex.test(toolName); + } + + // Prefix match for shell commands (e.g., "Shell(git)" matches "Shell(git status)") + if (rule.startsWith('Shell(') && toolName.startsWith('Shell(')) { + const ruleCommand = rule.slice(6, -1); // Remove "Shell(" and ")" + const toolCommand = extractCommandName(toolName.slice(6, -1)); // Remove "Shell(" and ")" + return toolCommand.startsWith(ruleCommand); + } + + return false; +} + +/** + * Log permission violations + */ +export function logPermissionViolation(toolCall: any, reason: string, sessionId?: string): void { + const sessionIdStr = sessionId ? ` [${sessionId}]` : ''; + + if (toolCall.shellToolCall?.args?.command) { + logger.warn( + `Permission violation${sessionIdStr}: Shell command blocked - ${toolCall.shellToolCall.args.command} (${reason})` + ); + } else if (toolCall.readToolCall?.args?.path) { + logger.warn( + `Permission violation${sessionIdStr}: Read operation blocked - ${toolCall.readToolCall.args.path} (${reason})` + ); + } else if (toolCall.writeToolCall?.args?.path) { + logger.warn( + `Permission violation${sessionIdStr}: Write operation blocked - ${toolCall.writeToolCall.args.path} (${reason})` + ); + } else { + logger.warn(`Permission violation${sessionIdStr}: Tool call blocked (${reason})`, { toolCall }); + } +} diff --git a/apps/server/src/lib/sdk-options.ts b/apps/server/src/lib/sdk-options.ts index 426cf73d..4d3e670f 100644 --- a/apps/server/src/lib/sdk-options.ts +++ b/apps/server/src/lib/sdk-options.ts @@ -16,7 +16,6 @@ */ import type { Options } from '@anthropic-ai/claude-agent-sdk'; -import os from 'os'; import path from 'path'; import { resolveModelString } from '@automaker/model-resolver'; import { createLogger } from '@automaker/utils'; @@ -31,6 +30,68 @@ import { } from '@automaker/types'; import { isPathAllowed, PathNotAllowedError, getAllowedRootDirectory } from '@automaker/platform'; +/** + * Result of sandbox compatibility check + */ +export interface SandboxCompatibilityResult { + /** Whether sandbox mode can be enabled for this path */ + enabled: boolean; + /** Optional message explaining why sandbox is disabled */ + message?: string; +} + +/** + * Check if a working directory is compatible with sandbox mode. + * Some paths (like cloud storage mounts) may not work with sandboxed execution. + * + * @param cwd - The working directory to check + * @param sandboxRequested - Whether sandbox mode was requested by settings + * @returns Object indicating if sandbox can be enabled and why not if disabled + */ +export function checkSandboxCompatibility( + cwd: string, + sandboxRequested: boolean +): SandboxCompatibilityResult { + if (!sandboxRequested) { + return { enabled: false }; + } + + const resolvedCwd = path.resolve(cwd); + + // Check for cloud storage paths that may not be compatible with sandbox + const cloudStoragePatterns = [ + // macOS mounted volumes + /^\/Volumes\/GoogleDrive/i, + /^\/Volumes\/Dropbox/i, + /^\/Volumes\/OneDrive/i, + /^\/Volumes\/iCloud/i, + // macOS home directory + /^\/Users\/[^/]+\/Google Drive/i, + /^\/Users\/[^/]+\/Dropbox/i, + /^\/Users\/[^/]+\/OneDrive/i, + /^\/Users\/[^/]+\/Library\/Mobile Documents/i, // iCloud + // Linux home directory + /^\/home\/[^/]+\/Google Drive/i, + /^\/home\/[^/]+\/Dropbox/i, + /^\/home\/[^/]+\/OneDrive/i, + // Windows + /^C:\\Users\\[^\\]+\\Google Drive/i, + /^C:\\Users\\[^\\]+\\Dropbox/i, + /^C:\\Users\\[^\\]+\\OneDrive/i, + ]; + + for (const pattern of cloudStoragePatterns) { + if (pattern.test(resolvedCwd)) { + return { + enabled: false, + message: `Sandbox disabled: Cloud storage path detected (${resolvedCwd}). Sandbox mode may not work correctly with cloud-synced directories.`, + }; + } + } + + return { enabled: true }; +} + /** * Validate that a working directory is allowed by ALLOWED_ROOT_DIRECTORY. * This is the centralized security check for ALL AI model invocations. @@ -57,139 +118,6 @@ export function validateWorkingDirectory(cwd: string): void { } } -/** - * Known cloud storage path patterns where sandbox mode is incompatible. - * - * The Claude CLI sandbox feature uses filesystem isolation that conflicts with - * cloud storage providers' virtual filesystem implementations. This causes the - * Claude process to exit with code 1 when sandbox is enabled for these paths. - * - * Affected providers (macOS paths): - * - Dropbox: ~/Library/CloudStorage/Dropbox-* - * - Google Drive: ~/Library/CloudStorage/GoogleDrive-* - * - OneDrive: ~/Library/CloudStorage/OneDrive-* - * - iCloud Drive: ~/Library/Mobile Documents/ - * - Box: ~/Library/CloudStorage/Box-* - * - * Note: This is a known limitation when using cloud storage paths. - */ - -/** - * macOS-specific cloud storage patterns that appear under ~/Library/ - * These are specific enough to use with includes() safely. - */ -const MACOS_CLOUD_STORAGE_PATTERNS = [ - '/Library/CloudStorage/', // Dropbox, Google Drive, OneDrive, Box on macOS - '/Library/Mobile Documents/', // iCloud Drive on macOS -] as const; - -/** - * Generic cloud storage folder names that need to be anchored to the home directory - * to avoid false positives (e.g., /home/user/my-project-about-dropbox/). - */ -const HOME_ANCHORED_CLOUD_FOLDERS = [ - 'Google Drive', // Google Drive on some systems - 'Dropbox', // Dropbox on Linux/alternative installs - 'OneDrive', // OneDrive on Linux/alternative installs -] as const; - -/** - * Check if a path is within a cloud storage location. - * - * Cloud storage providers use virtual filesystem implementations that are - * incompatible with the Claude CLI sandbox feature, causing process crashes. - * - * Uses two detection strategies: - * 1. macOS-specific patterns (under ~/Library/) - checked via includes() - * 2. Generic folder names - anchored to home directory to avoid false positives - * - * @param cwd - The working directory path to check - * @returns true if the path is in a cloud storage location - */ -export function isCloudStoragePath(cwd: string): boolean { - const resolvedPath = path.resolve(cwd); - // Normalize to forward slashes for consistent pattern matching across platforms - let normalizedPath = resolvedPath.split(path.sep).join('/'); - // Remove Windows drive letter if present (e.g., "C:/Users" -> "/Users") - // This ensures Unix paths in tests work the same on Windows - normalizedPath = normalizedPath.replace(/^[A-Za-z]:/, ''); - - // Check macOS-specific patterns (these are specific enough to use includes) - if (MACOS_CLOUD_STORAGE_PATTERNS.some((pattern) => normalizedPath.includes(pattern))) { - return true; - } - - // Check home-anchored patterns to avoid false positives - // e.g., /home/user/my-project-about-dropbox/ should NOT match - const home = os.homedir(); - for (const folder of HOME_ANCHORED_CLOUD_FOLDERS) { - const cloudPath = path.join(home, folder); - let normalizedCloudPath = cloudPath.split(path.sep).join('/'); - // Remove Windows drive letter if present - normalizedCloudPath = normalizedCloudPath.replace(/^[A-Za-z]:/, ''); - // Check if resolved path starts with the cloud storage path followed by a separator - // This ensures we match ~/Dropbox/project but not ~/Dropbox-archive or ~/my-dropbox-tool - if ( - normalizedPath === normalizedCloudPath || - normalizedPath.startsWith(normalizedCloudPath + '/') - ) { - return true; - } - } - - return false; -} - -/** - * Result of sandbox compatibility check - */ -export interface SandboxCheckResult { - /** Whether sandbox should be enabled */ - enabled: boolean; - /** If disabled, the reason why */ - disabledReason?: 'cloud_storage' | 'user_setting'; - /** Human-readable message for logging/UI */ - message?: string; -} - -/** - * Determine if sandbox mode should be enabled for a given configuration. - * - * Sandbox mode is automatically disabled for cloud storage paths because the - * Claude CLI sandbox feature is incompatible with virtual filesystem - * implementations used by cloud storage providers (Dropbox, Google Drive, etc.). - * - * @param cwd - The working directory - * @param enableSandboxMode - User's sandbox mode setting - * @returns SandboxCheckResult with enabled status and reason if disabled - */ -export function checkSandboxCompatibility( - cwd: string, - enableSandboxMode?: boolean -): SandboxCheckResult { - // User has explicitly disabled sandbox mode - if (enableSandboxMode === false) { - return { - enabled: false, - disabledReason: 'user_setting', - }; - } - - // Check for cloud storage incompatibility (applies when enabled or undefined) - if (isCloudStoragePath(cwd)) { - return { - enabled: false, - disabledReason: 'cloud_storage', - message: `Sandbox mode auto-disabled: Project is in a cloud storage location (${cwd}). The Claude CLI sandbox feature is incompatible with cloud storage filesystems. To use sandbox mode, move your project to a local directory.`, - }; - } - - // Sandbox is compatible and enabled (true or undefined defaults to enabled) - return { - enabled: true, - }; -} - /** * Tool presets for different use cases */ @@ -272,55 +200,31 @@ export function getModelForUseCase( /** * Base options that apply to all SDK calls + * AUTONOMOUS MODE: Always bypass permissions for fully autonomous operation */ function getBaseOptions(): Partial { return { - permissionMode: 'acceptEdits', + permissionMode: 'bypassPermissions', + allowDangerouslySkipPermissions: true, }; } /** - * MCP permission options result + * MCP options result */ -interface McpPermissionOptions { - /** Whether tools should be restricted to a preset */ - shouldRestrictTools: boolean; - /** Options to spread when MCP bypass is enabled */ - bypassOptions: Partial; +interface McpOptions { /** Options to spread for MCP servers */ mcpServerOptions: Partial; } /** * Build MCP-related options based on configuration. - * Centralizes the logic for determining permission modes and tool restrictions - * when MCP servers are configured. * * @param config - The SDK options config - * @returns Object with MCP permission settings to spread into final options + * @returns Object with MCP server settings to spread into final options */ -function buildMcpOptions(config: CreateSdkOptionsConfig): McpPermissionOptions { - const hasMcpServers = config.mcpServers && Object.keys(config.mcpServers).length > 0; - // Default to true for autonomous workflow. Security is enforced when adding servers - // via the security warning dialog that explains the risks. - const mcpAutoApprove = config.mcpAutoApproveTools ?? true; - const mcpUnrestricted = config.mcpUnrestrictedTools ?? true; - - // Determine if we should bypass permissions based on settings - const shouldBypassPermissions = hasMcpServers && mcpAutoApprove; - // Determine if we should restrict tools (only when no MCP or unrestricted is disabled) - const shouldRestrictTools = !hasMcpServers || !mcpUnrestricted; - +function buildMcpOptions(config: CreateSdkOptionsConfig): McpOptions { return { - shouldRestrictTools, - // Only include bypass options when MCP is configured and auto-approve is enabled - bypassOptions: shouldBypassPermissions - ? { - permissionMode: 'bypassPermissions' as const, - // Required flag when using bypassPermissions mode - allowDangerouslySkipPermissions: true, - } - : {}, // Include MCP servers if configured mcpServerOptions: config.mcpServers ? { mcpServers: config.mcpServers } : {}, }; @@ -422,18 +326,9 @@ export interface CreateSdkOptionsConfig { /** Enable auto-loading of CLAUDE.md files via SDK's settingSources */ autoLoadClaudeMd?: boolean; - /** Enable sandbox mode for bash command isolation */ - enableSandboxMode?: boolean; - /** MCP servers to make available to the agent */ mcpServers?: Record; - /** Auto-approve MCP tool calls without permission prompts */ - mcpAutoApproveTools?: boolean; - - /** Allow unrestricted tools when MCP servers are enabled */ - mcpUnrestrictedTools?: boolean; - /** Extended thinking level for Claude models */ thinkingLevel?: ThinkingLevel; } @@ -554,7 +449,6 @@ export function createSuggestionsOptions(config: CreateSdkOptionsConfig): Option * - Full tool access for code modification * - Standard turns for interactive sessions * - Model priority: explicit model > session model > chat default - * - Sandbox mode controlled by enableSandboxMode setting (auto-disabled for cloud storage) * - When autoLoadClaudeMd is true, uses preset mode and settingSources for CLAUDE.md loading */ export function createChatOptions(config: CreateSdkOptionsConfig): Options { @@ -573,24 +467,12 @@ export function createChatOptions(config: CreateSdkOptionsConfig): Options { // Build thinking options const thinkingOptions = buildThinkingOptions(config.thinkingLevel); - // Check sandbox compatibility (auto-disables for cloud storage paths) - const sandboxCheck = checkSandboxCompatibility(config.cwd, config.enableSandboxMode); - return { ...getBaseOptions(), model: getModelForUseCase('chat', effectiveModel), maxTurns: MAX_TURNS.standard, cwd: config.cwd, - // Only restrict tools if no MCP servers configured or unrestricted is disabled - ...(mcpOptions.shouldRestrictTools && { allowedTools: [...TOOL_PRESETS.chat] }), - // Apply MCP bypass options if configured - ...mcpOptions.bypassOptions, - ...(sandboxCheck.enabled && { - sandbox: { - enabled: true, - autoAllowBashIfSandboxed: true, - }, - }), + allowedTools: [...TOOL_PRESETS.chat], ...claudeMdOptions, ...thinkingOptions, ...(config.abortController && { abortController: config.abortController }), @@ -605,7 +487,6 @@ export function createChatOptions(config: CreateSdkOptionsConfig): Options { * - Full tool access for code modification and implementation * - Extended turns for thorough feature implementation * - Uses default model (can be overridden) - * - Sandbox mode controlled by enableSandboxMode setting (auto-disabled for cloud storage) * - When autoLoadClaudeMd is true, uses preset mode and settingSources for CLAUDE.md loading */ export function createAutoModeOptions(config: CreateSdkOptionsConfig): Options { @@ -621,24 +502,12 @@ export function createAutoModeOptions(config: CreateSdkOptionsConfig): Options { // Build thinking options const thinkingOptions = buildThinkingOptions(config.thinkingLevel); - // Check sandbox compatibility (auto-disables for cloud storage paths) - const sandboxCheck = checkSandboxCompatibility(config.cwd, config.enableSandboxMode); - return { ...getBaseOptions(), model: getModelForUseCase('auto', config.model), maxTurns: MAX_TURNS.maximum, cwd: config.cwd, - // Only restrict tools if no MCP servers configured or unrestricted is disabled - ...(mcpOptions.shouldRestrictTools && { allowedTools: [...TOOL_PRESETS.fullAccess] }), - // Apply MCP bypass options if configured - ...mcpOptions.bypassOptions, - ...(sandboxCheck.enabled && { - sandbox: { - enabled: true, - autoAllowBashIfSandboxed: true, - }, - }), + allowedTools: [...TOOL_PRESETS.fullAccess], ...claudeMdOptions, ...thinkingOptions, ...(config.abortController && { abortController: config.abortController }), @@ -656,7 +525,6 @@ export function createCustomOptions( config: CreateSdkOptionsConfig & { maxTurns?: number; allowedTools?: readonly string[]; - sandbox?: { enabled: boolean; autoAllowBashIfSandboxed?: boolean }; } ): Options { // Validate working directory before creating options @@ -671,22 +539,17 @@ export function createCustomOptions( // Build thinking options const thinkingOptions = buildThinkingOptions(config.thinkingLevel); - // For custom options: use explicit allowedTools if provided, otherwise use preset based on MCP settings + // For custom options: use explicit allowedTools if provided, otherwise default to readOnly const effectiveAllowedTools = config.allowedTools ? [...config.allowedTools] - : mcpOptions.shouldRestrictTools - ? [...TOOL_PRESETS.readOnly] - : undefined; + : [...TOOL_PRESETS.readOnly]; return { ...getBaseOptions(), model: getModelForUseCase('default', config.model), maxTurns: config.maxTurns ?? MAX_TURNS.maximum, cwd: config.cwd, - ...(effectiveAllowedTools && { allowedTools: effectiveAllowedTools }), - ...(config.sandbox && { sandbox: config.sandbox }), - // Apply MCP bypass options if configured - ...mcpOptions.bypassOptions, + allowedTools: effectiveAllowedTools, ...claudeMdOptions, ...thinkingOptions, ...(config.abortController && { abortController: config.abortController }), diff --git a/apps/server/src/lib/settings-helpers.ts b/apps/server/src/lib/settings-helpers.ts index 9a322994..da3c08fe 100644 --- a/apps/server/src/lib/settings-helpers.ts +++ b/apps/server/src/lib/settings-helpers.ts @@ -55,34 +55,6 @@ export async function getAutoLoadClaudeMdSetting( } } -/** - * Get the enableSandboxMode setting from global settings. - * Returns false if settings service is not available. - * - * @param settingsService - Optional settings service instance - * @param logPrefix - Prefix for log messages (e.g., '[AgentService]') - * @returns Promise resolving to the enableSandboxMode setting value - */ -export async function getEnableSandboxModeSetting( - settingsService?: SettingsService | null, - logPrefix = '[SettingsHelper]' -): Promise { - if (!settingsService) { - logger.info(`${logPrefix} SettingsService not available, sandbox mode disabled`); - return false; - } - - try { - const globalSettings = await settingsService.getGlobalSettings(); - const result = globalSettings.enableSandboxMode ?? false; - logger.info(`${logPrefix} enableSandboxMode from global settings: ${result}`); - return result; - } catch (error) { - logger.error(`${logPrefix} Failed to load enableSandboxMode setting:`, error); - throw error; - } -} - /** * Filters out CLAUDE.md from context files when autoLoadClaudeMd is enabled * and rebuilds the formatted prompt without it. @@ -269,3 +241,83 @@ export async function getPromptCustomization( enhancement: mergeEnhancementPrompts(customization.enhancement), }; } + +/** + * Get Skills configuration from settings. + * Returns configuration for enabling skills and which sources to load from. + * + * @param settingsService - Settings service instance + * @returns Skills configuration with enabled state, sources, and tool inclusion flag + */ +export async function getSkillsConfiguration(settingsService: SettingsService): Promise<{ + enabled: boolean; + sources: Array<'user' | 'project'>; + shouldIncludeInTools: boolean; +}> { + const settings = await settingsService.getGlobalSettings(); + const enabled = settings.enableSkills ?? true; // Default enabled + const sources = settings.skillsSources ?? ['user', 'project']; // Default both sources + + return { + enabled, + sources, + shouldIncludeInTools: enabled && sources.length > 0, + }; +} + +/** + * Get Subagents configuration from settings. + * Returns configuration for enabling subagents and which sources to load from. + * + * @param settingsService - Settings service instance + * @returns Subagents configuration with enabled state, sources, and tool inclusion flag + */ +export async function getSubagentsConfiguration(settingsService: SettingsService): Promise<{ + enabled: boolean; + sources: Array<'user' | 'project'>; + shouldIncludeInTools: boolean; +}> { + const settings = await settingsService.getGlobalSettings(); + const enabled = settings.enableSubagents ?? true; // Default enabled + const sources = settings.subagentsSources ?? ['user', 'project']; // Default both sources + + return { + enabled, + sources, + shouldIncludeInTools: enabled && sources.length > 0, + }; +} + +/** + * Get custom subagents from settings, merging global and project-level definitions. + * Project-level subagents take precedence over global ones with the same name. + * + * @param settingsService - Settings service instance + * @param projectPath - Path to the project for loading project-specific subagents + * @returns Record of agent names to definitions, or undefined if none configured + */ +export async function getCustomSubagents( + settingsService: SettingsService, + projectPath?: string +): Promise | undefined> { + // Get global subagents + const globalSettings = await settingsService.getGlobalSettings(); + const globalSubagents = globalSettings.customSubagents || {}; + + // If no project path, return only global subagents + if (!projectPath) { + return Object.keys(globalSubagents).length > 0 ? globalSubagents : undefined; + } + + // Get project-specific subagents + const projectSettings = await settingsService.getProjectSettings(projectPath); + const projectSubagents = projectSettings.customSubagents || {}; + + // Merge: project-level takes precedence + const merged = { + ...globalSubagents, + ...projectSubagents, + }; + + return Object.keys(merged).length > 0 ? merged : undefined; +} diff --git a/apps/server/src/providers/claude-provider.ts b/apps/server/src/providers/claude-provider.ts index 50e378be..ba86bfad 100644 --- a/apps/server/src/providers/claude-provider.ts +++ b/apps/server/src/providers/claude-provider.ts @@ -10,7 +10,7 @@ import { BaseProvider } from './base-provider.js'; import { classifyError, getUserFriendlyErrorMessage, createLogger } from '@automaker/utils'; const logger = createLogger('ClaudeProvider'); -import { getThinkingTokenBudget } from '@automaker/types'; +import { getThinkingTokenBudget, validateBareModelId } from '@automaker/types'; import type { ExecuteOptions, ProviderMessage, @@ -53,6 +53,10 @@ export class ClaudeProvider extends BaseProvider { * Execute a query using Claude Agent SDK */ async *executeQuery(options: ExecuteOptions): AsyncGenerator { + // Validate that model doesn't have a provider prefix + // AgentService should strip prefixes before passing to providers + validateBareModelId(options.model, 'ClaudeProvider'); + const { prompt, model, @@ -70,14 +74,6 @@ export class ClaudeProvider extends BaseProvider { const maxThinkingTokens = getThinkingTokenBudget(thinkingLevel); // Build Claude SDK options - // AUTONOMOUS MODE: Always bypass permissions for fully autonomous operation - const hasMcpServers = options.mcpServers && Object.keys(options.mcpServers).length > 0; - const defaultTools = ['Read', 'Write', 'Edit', 'Glob', 'Grep', 'Bash', 'WebSearch', 'WebFetch']; - - // AUTONOMOUS MODE: Always bypass permissions and allow unrestricted tools - // Only restrict tools when no MCP servers are configured - const shouldRestrictTools = !hasMcpServers; - const sdkOptions: Options = { model, systemPrompt, @@ -85,10 +81,9 @@ export class ClaudeProvider extends BaseProvider { cwd, // Pass only explicitly allowed environment variables to SDK env: buildEnv(), - // Only restrict tools if explicitly set OR (no MCP / unrestricted disabled) - ...(allowedTools && shouldRestrictTools && { allowedTools }), - ...(!allowedTools && shouldRestrictTools && { allowedTools: defaultTools }), - // AUTONOMOUS MODE: Always bypass permissions and allow dangerous operations + // Pass through allowedTools if provided by caller (decided by sdk-options.ts) + ...(allowedTools && { allowedTools }), + // AUTONOMOUS MODE: Always bypass permissions for fully autonomous operation permissionMode: 'bypassPermissions', allowDangerouslySkipPermissions: true, abortController, @@ -98,12 +93,12 @@ export class ClaudeProvider extends BaseProvider { : {}), // Forward settingSources for CLAUDE.md file loading ...(options.settingSources && { settingSources: options.settingSources }), - // Forward sandbox configuration - ...(options.sandbox && { sandbox: options.sandbox }), // Forward MCP servers configuration ...(options.mcpServers && { mcpServers: options.mcpServers }), // Extended thinking configuration ...(maxThinkingTokens && { maxThinkingTokens }), + // Subagents configuration for specialized task delegation + ...(options.agents && { agents: options.agents }), }; // Build prompt payload diff --git a/apps/server/src/providers/codex-config-manager.ts b/apps/server/src/providers/codex-config-manager.ts new file mode 100644 index 00000000..33031c4a --- /dev/null +++ b/apps/server/src/providers/codex-config-manager.ts @@ -0,0 +1,85 @@ +/** + * Codex Config Manager - Writes MCP server configuration for Codex CLI + */ + +import path from 'path'; +import type { McpServerConfig } from '@automaker/types'; +import * as secureFs from '../lib/secure-fs.js'; + +const CODEX_CONFIG_DIR = '.codex'; +const CODEX_CONFIG_FILENAME = 'config.toml'; +const CODEX_MCP_SECTION = 'mcp_servers'; + +function formatTomlString(value: string): string { + return JSON.stringify(value); +} + +function formatTomlArray(values: string[]): string { + const formatted = values.map((value) => formatTomlString(value)).join(', '); + return `[${formatted}]`; +} + +function formatTomlInlineTable(values: Record): string { + const entries = Object.entries(values).map( + ([key, value]) => `${key} = ${formatTomlString(value)}` + ); + return `{ ${entries.join(', ')} }`; +} + +function formatTomlKey(key: string): string { + return `"${key.replace(/"/g, '\\"')}"`; +} + +function buildServerBlock(name: string, server: McpServerConfig): string[] { + const lines: string[] = []; + const section = `${CODEX_MCP_SECTION}.${formatTomlKey(name)}`; + lines.push(`[${section}]`); + + if (server.type) { + lines.push(`type = ${formatTomlString(server.type)}`); + } + + if ('command' in server && server.command) { + lines.push(`command = ${formatTomlString(server.command)}`); + } + + if ('args' in server && server.args && server.args.length > 0) { + lines.push(`args = ${formatTomlArray(server.args)}`); + } + + if ('env' in server && server.env && Object.keys(server.env).length > 0) { + lines.push(`env = ${formatTomlInlineTable(server.env)}`); + } + + if ('url' in server && server.url) { + lines.push(`url = ${formatTomlString(server.url)}`); + } + + if ('headers' in server && server.headers && Object.keys(server.headers).length > 0) { + lines.push(`headers = ${formatTomlInlineTable(server.headers)}`); + } + + return lines; +} + +export class CodexConfigManager { + async configureMcpServers( + cwd: string, + mcpServers: Record + ): Promise { + const configDir = path.join(cwd, CODEX_CONFIG_DIR); + const configPath = path.join(configDir, CODEX_CONFIG_FILENAME); + + await secureFs.mkdir(configDir, { recursive: true }); + + const blocks: string[] = []; + for (const [name, server] of Object.entries(mcpServers)) { + blocks.push(...buildServerBlock(name, server), ''); + } + + const content = blocks.join('\n').trim(); + if (content) { + await secureFs.writeFile(configPath, content + '\n', 'utf-8'); + } + } +} diff --git a/apps/server/src/providers/codex-models.ts b/apps/server/src/providers/codex-models.ts new file mode 100644 index 00000000..141d5355 --- /dev/null +++ b/apps/server/src/providers/codex-models.ts @@ -0,0 +1,111 @@ +/** + * Codex Model Definitions + * + * Official Codex CLI models as documented at https://developers.openai.com/codex/models/ + */ + +import { CODEX_MODEL_MAP } from '@automaker/types'; +import type { ModelDefinition } from './types.js'; + +const CONTEXT_WINDOW_256K = 256000; +const CONTEXT_WINDOW_128K = 128000; +const MAX_OUTPUT_32K = 32000; +const MAX_OUTPUT_16K = 16000; + +/** + * All available Codex models with their specifications + * Based on https://developers.openai.com/codex/models/ + */ +export const CODEX_MODELS: ModelDefinition[] = [ + // ========== Recommended Codex Models ========== + { + id: CODEX_MODEL_MAP.gpt52Codex, + name: 'GPT-5.2-Codex', + modelString: CODEX_MODEL_MAP.gpt52Codex, + provider: 'openai', + description: + 'Most advanced agentic coding model for complex software engineering (default for ChatGPT users).', + contextWindow: CONTEXT_WINDOW_256K, + maxOutputTokens: MAX_OUTPUT_32K, + supportsVision: true, + supportsTools: true, + tier: 'premium' as const, + default: true, + hasReasoning: true, + }, + { + id: CODEX_MODEL_MAP.gpt51CodexMax, + name: 'GPT-5.1-Codex-Max', + modelString: CODEX_MODEL_MAP.gpt51CodexMax, + provider: 'openai', + description: 'Optimized for long-horizon, agentic coding tasks in Codex.', + contextWindow: CONTEXT_WINDOW_256K, + maxOutputTokens: MAX_OUTPUT_32K, + supportsVision: true, + supportsTools: true, + tier: 'premium' as const, + hasReasoning: true, + }, + { + id: CODEX_MODEL_MAP.gpt51CodexMini, + name: 'GPT-5.1-Codex-Mini', + modelString: CODEX_MODEL_MAP.gpt51CodexMini, + provider: 'openai', + description: 'Smaller, more cost-effective version for faster workflows.', + contextWindow: CONTEXT_WINDOW_128K, + maxOutputTokens: MAX_OUTPUT_16K, + supportsVision: true, + supportsTools: true, + tier: 'basic' as const, + hasReasoning: false, + }, + + // ========== General-Purpose GPT Models ========== + { + id: CODEX_MODEL_MAP.gpt52, + name: 'GPT-5.2', + modelString: CODEX_MODEL_MAP.gpt52, + provider: 'openai', + description: 'Best general agentic model for tasks across industries and domains.', + contextWindow: CONTEXT_WINDOW_256K, + maxOutputTokens: MAX_OUTPUT_32K, + supportsVision: true, + supportsTools: true, + tier: 'standard' as const, + hasReasoning: true, + }, + { + id: CODEX_MODEL_MAP.gpt51, + name: 'GPT-5.1', + modelString: CODEX_MODEL_MAP.gpt51, + provider: 'openai', + description: 'Great for coding and agentic tasks across domains.', + contextWindow: CONTEXT_WINDOW_256K, + maxOutputTokens: MAX_OUTPUT_32K, + supportsVision: true, + supportsTools: true, + tier: 'standard' as const, + hasReasoning: true, + }, +]; + +/** + * Get model definition by ID + */ +export function getCodexModelById(modelId: string): ModelDefinition | undefined { + return CODEX_MODELS.find((m) => m.id === modelId || m.modelString === modelId); +} + +/** + * Get all models that support reasoning + */ +export function getReasoningModels(): ModelDefinition[] { + return CODEX_MODELS.filter((m) => m.hasReasoning); +} + +/** + * Get models by tier + */ +export function getModelsByTier(tier: 'premium' | 'standard' | 'basic'): ModelDefinition[] { + return CODEX_MODELS.filter((m) => m.tier === tier); +} diff --git a/apps/server/src/providers/codex-provider.ts b/apps/server/src/providers/codex-provider.ts new file mode 100644 index 00000000..54e13989 --- /dev/null +++ b/apps/server/src/providers/codex-provider.ts @@ -0,0 +1,1114 @@ +/** + * Codex Provider - Executes queries using Codex CLI + * + * Spawns the Codex CLI and converts JSONL output into ProviderMessage format. + */ + +import path from 'path'; +import { BaseProvider } from './base-provider.js'; +import { + spawnJSONLProcess, + spawnProcess, + findCodexCliPath, + getCodexAuthIndicators, + secureFs, + getDataDirectory, + getCodexConfigDir, +} from '@automaker/platform'; +import { checkCodexAuthentication } from '../lib/codex-auth.js'; +import { + formatHistoryAsText, + extractTextFromContent, + classifyError, + getUserFriendlyErrorMessage, +} from '@automaker/utils'; +import type { + ExecuteOptions, + ProviderMessage, + InstallationStatus, + ModelDefinition, +} from './types.js'; +import { + CODEX_MODEL_MAP, + supportsReasoningEffort, + validateBareModelId, + type CodexApprovalPolicy, + type CodexSandboxMode, + type CodexAuthStatus, +} from '@automaker/types'; +import { CodexConfigManager } from './codex-config-manager.js'; +import { executeCodexSdkQuery } from './codex-sdk-client.js'; +import { + resolveCodexToolCall, + extractCodexTodoItems, + getCodexTodoToolName, +} from './codex-tool-mapping.js'; +import { SettingsService } from '../services/settings-service.js'; +import { checkSandboxCompatibility } from '../lib/sdk-options.js'; +import { CODEX_MODELS } from './codex-models.js'; + +const CODEX_COMMAND = 'codex'; +const CODEX_EXEC_SUBCOMMAND = 'exec'; +const CODEX_JSON_FLAG = '--json'; +const CODEX_MODEL_FLAG = '--model'; +const CODEX_VERSION_FLAG = '--version'; +const CODEX_SANDBOX_FLAG = '--sandbox'; +const CODEX_APPROVAL_FLAG = '--ask-for-approval'; +const CODEX_SEARCH_FLAG = '--search'; +const CODEX_OUTPUT_SCHEMA_FLAG = '--output-schema'; +const CODEX_CONFIG_FLAG = '--config'; +const CODEX_IMAGE_FLAG = '--image'; +const CODEX_ADD_DIR_FLAG = '--add-dir'; +const CODEX_SKIP_GIT_REPO_CHECK_FLAG = '--skip-git-repo-check'; +const CODEX_RESUME_FLAG = 'resume'; +const CODEX_REASONING_EFFORT_KEY = 'reasoning_effort'; +const CODEX_YOLO_FLAG = '--dangerously-bypass-approvals-and-sandbox'; +const OPENAI_API_KEY_ENV = 'OPENAI_API_KEY'; +const CODEX_EXECUTION_MODE_CLI = 'cli'; +const CODEX_EXECUTION_MODE_SDK = 'sdk'; +const ERROR_CODEX_CLI_REQUIRED = + 'Codex CLI is required for tool-enabled requests. Please install Codex CLI and run `codex login`.'; +const ERROR_CODEX_AUTH_REQUIRED = "Codex authentication is required. Please run 'codex login'."; +const ERROR_CODEX_SDK_AUTH_REQUIRED = 'OpenAI API key required for Codex SDK execution.'; + +const CODEX_EVENT_TYPES = { + itemCompleted: 'item.completed', + itemStarted: 'item.started', + itemUpdated: 'item.updated', + turnCompleted: 'turn.completed', + error: 'error', +} as const; + +const CODEX_ITEM_TYPES = { + reasoning: 'reasoning', + agentMessage: 'agent_message', + commandExecution: 'command_execution', + todoList: 'todo_list', +} as const; + +const SYSTEM_PROMPT_LABEL = 'System instructions'; +const HISTORY_HEADER = 'Current request:\n'; +const TEXT_ENCODING = 'utf-8'; +const DEFAULT_TIMEOUT_MS = 30000; +const CONTEXT_WINDOW_256K = 256000; +const MAX_OUTPUT_32K = 32000; +const MAX_OUTPUT_16K = 16000; +const SYSTEM_PROMPT_SEPARATOR = '\n\n'; +const CODEX_INSTRUCTIONS_DIR = '.codex'; +const CODEX_INSTRUCTIONS_SECTION = 'Codex Project Instructions'; +const CODEX_INSTRUCTIONS_PATH_LABEL = 'Path'; +const CODEX_INSTRUCTIONS_SOURCE_LABEL = 'Source'; +const CODEX_INSTRUCTIONS_USER_SOURCE = 'User instructions'; +const CODEX_INSTRUCTIONS_PROJECT_SOURCE = 'Project instructions'; +const CODEX_USER_INSTRUCTIONS_FILE = 'AGENTS.md'; +const CODEX_PROJECT_INSTRUCTIONS_FILES = ['AGENTS.md'] as const; +const CODEX_SETTINGS_DIR_FALLBACK = './data'; +const DEFAULT_CODEX_AUTO_LOAD_AGENTS = false; +const DEFAULT_CODEX_SANDBOX_MODE: CodexSandboxMode = 'workspace-write'; +const DEFAULT_CODEX_APPROVAL_POLICY: CodexApprovalPolicy = 'on-request'; +const TOOL_USE_ID_PREFIX = 'codex-tool-'; +const ITEM_ID_KEYS = ['id', 'item_id', 'call_id', 'tool_use_id', 'command_id'] as const; +const EVENT_ID_KEYS = ['id', 'event_id', 'request_id'] as const; +const COMMAND_OUTPUT_FIELDS = ['output', 'stdout', 'stderr', 'result'] as const; +const COMMAND_OUTPUT_SEPARATOR = '\n'; +const OUTPUT_SCHEMA_FILENAME = 'output-schema.json'; +const OUTPUT_SCHEMA_INDENT_SPACES = 2; +const IMAGE_TEMP_DIR = '.codex-images'; +const IMAGE_FILE_PREFIX = 'image-'; +const IMAGE_FILE_EXT = '.png'; +const DEFAULT_ALLOWED_TOOLS = [ + 'Read', + 'Write', + 'Edit', + 'Glob', + 'Grep', + 'Bash', + 'WebSearch', + 'WebFetch', +] as const; +const SEARCH_TOOL_NAMES = new Set(['WebSearch', 'WebFetch']); +const MIN_MAX_TURNS = 1; +const CONFIG_KEY_MAX_TURNS = 'max_turns'; +const CONSTRAINTS_SECTION_TITLE = 'Codex Execution Constraints'; +const CONSTRAINTS_MAX_TURNS_LABEL = 'Max turns'; +const CONSTRAINTS_ALLOWED_TOOLS_LABEL = 'Allowed tools'; +const CONSTRAINTS_OUTPUT_SCHEMA_LABEL = 'Output format'; +const CONSTRAINTS_SESSION_ID_LABEL = 'Session ID'; +const CONSTRAINTS_NO_TOOLS_VALUE = 'none'; +const CONSTRAINTS_OUTPUT_SCHEMA_VALUE = 'Respond with JSON that matches the provided schema.'; + +type CodexExecutionMode = typeof CODEX_EXECUTION_MODE_CLI | typeof CODEX_EXECUTION_MODE_SDK; +type CodexExecutionPlan = { + mode: CodexExecutionMode; + cliPath: string | null; +}; + +const ALLOWED_ENV_VARS = [ + OPENAI_API_KEY_ENV, + 'PATH', + 'HOME', + 'SHELL', + 'TERM', + 'USER', + 'LANG', + 'LC_ALL', +]; + +function buildEnv(): Record { + const env: Record = {}; + for (const key of ALLOWED_ENV_VARS) { + const value = process.env[key]; + if (value) { + env[key] = value; + } + } + return env; +} + +function hasMcpServersConfigured(options: ExecuteOptions): boolean { + return Boolean(options.mcpServers && Object.keys(options.mcpServers).length > 0); +} + +function isNoToolsRequested(options: ExecuteOptions): boolean { + return Array.isArray(options.allowedTools) && options.allowedTools.length === 0; +} + +function isSdkEligible(options: ExecuteOptions): boolean { + return isNoToolsRequested(options) && !hasMcpServersConfigured(options); +} + +async function resolveCodexExecutionPlan(options: ExecuteOptions): Promise { + const cliPath = await findCodexCliPath(); + const authIndicators = await getCodexAuthIndicators(); + const hasApiKey = Boolean(process.env[OPENAI_API_KEY_ENV]); + const cliAuthenticated = authIndicators.hasOAuthToken || authIndicators.hasApiKey || hasApiKey; + const sdkEligible = isSdkEligible(options); + const cliAvailable = Boolean(cliPath); + + if (sdkEligible) { + if (hasApiKey) { + return { + mode: CODEX_EXECUTION_MODE_SDK, + cliPath, + }; + } + if (!cliAvailable) { + throw new Error(ERROR_CODEX_SDK_AUTH_REQUIRED); + } + } + + if (!cliAvailable) { + throw new Error(ERROR_CODEX_CLI_REQUIRED); + } + + if (!cliAuthenticated) { + throw new Error(ERROR_CODEX_AUTH_REQUIRED); + } + + return { + mode: CODEX_EXECUTION_MODE_CLI, + cliPath, + }; +} + +function getEventType(event: Record): string | null { + if (typeof event.type === 'string') { + return event.type; + } + if (typeof event.event === 'string') { + return event.event; + } + return null; +} + +function extractText(value: unknown): string | null { + if (typeof value === 'string') { + return value; + } + if (Array.isArray(value)) { + return value + .map((item) => extractText(item)) + .filter(Boolean) + .join('\n'); + } + if (value && typeof value === 'object') { + const record = value as Record; + if (typeof record.text === 'string') { + return record.text; + } + if (typeof record.content === 'string') { + return record.content; + } + if (typeof record.message === 'string') { + return record.message; + } + } + return null; +} + +function extractCommandText(item: Record): string | null { + const direct = extractText(item.command ?? item.input ?? item.content); + if (direct) { + return direct; + } + return null; +} + +function extractCommandOutput(item: Record): string | null { + const outputs: string[] = []; + for (const field of COMMAND_OUTPUT_FIELDS) { + const value = item[field]; + const text = extractText(value); + if (text) { + outputs.push(text); + } + } + + if (outputs.length === 0) { + return null; + } + + const uniqueOutputs = outputs.filter((output, index) => outputs.indexOf(output) === index); + return uniqueOutputs.join(COMMAND_OUTPUT_SEPARATOR); +} + +function extractItemType(item: Record): string | null { + if (typeof item.type === 'string') { + return item.type; + } + if (typeof item.kind === 'string') { + return item.kind; + } + return null; +} + +function resolveSystemPrompt(systemPrompt?: unknown): string | null { + if (!systemPrompt) { + return null; + } + if (typeof systemPrompt === 'string') { + return systemPrompt; + } + if (typeof systemPrompt === 'object' && systemPrompt !== null) { + const record = systemPrompt as Record; + if (typeof record.append === 'string') { + return record.append; + } + } + return null; +} + +function buildCombinedPrompt(options: ExecuteOptions, systemPromptText?: string | null): string { + const promptText = + typeof options.prompt === 'string' ? options.prompt : extractTextFromContent(options.prompt); + const historyText = options.conversationHistory + ? formatHistoryAsText(options.conversationHistory) + : ''; + const resolvedSystemPrompt = systemPromptText ?? resolveSystemPrompt(options.systemPrompt); + + const systemSection = resolvedSystemPrompt + ? `${SYSTEM_PROMPT_LABEL}:\n${resolvedSystemPrompt}\n\n` + : ''; + + return `${historyText}${systemSection}${HISTORY_HEADER}${promptText}`; +} + +function formatConfigValue(value: string | number | boolean): string { + return String(value); +} + +function buildConfigOverrides( + overrides: Array<{ key: string; value: string | number | boolean }> +): string[] { + const args: string[] = []; + for (const override of overrides) { + args.push(CODEX_CONFIG_FLAG, `${override.key}=${formatConfigValue(override.value)}`); + } + return args; +} + +function resolveMaxTurns(maxTurns?: number): number | null { + if (typeof maxTurns !== 'number' || Number.isNaN(maxTurns) || !Number.isFinite(maxTurns)) { + return null; + } + const normalized = Math.floor(maxTurns); + return normalized >= MIN_MAX_TURNS ? normalized : null; +} + +function resolveSearchEnabled(allowedTools: string[], restrictTools: boolean): boolean { + const toolsToCheck = restrictTools ? allowedTools : Array.from(DEFAULT_ALLOWED_TOOLS); + return toolsToCheck.some((tool) => SEARCH_TOOL_NAMES.has(tool)); +} + +function buildCodexConstraintsPrompt( + options: ExecuteOptions, + config: { + allowedTools: string[]; + restrictTools: boolean; + maxTurns: number | null; + hasOutputSchema: boolean; + } +): string | null { + const lines: string[] = []; + + if (config.maxTurns !== null) { + lines.push(`${CONSTRAINTS_MAX_TURNS_LABEL}: ${config.maxTurns}`); + } + + if (config.restrictTools) { + const allowed = + config.allowedTools.length > 0 ? config.allowedTools.join(', ') : CONSTRAINTS_NO_TOOLS_VALUE; + lines.push(`${CONSTRAINTS_ALLOWED_TOOLS_LABEL}: ${allowed}`); + } + + if (config.hasOutputSchema) { + lines.push(`${CONSTRAINTS_OUTPUT_SCHEMA_LABEL}: ${CONSTRAINTS_OUTPUT_SCHEMA_VALUE}`); + } + + if (options.sdkSessionId) { + lines.push(`${CONSTRAINTS_SESSION_ID_LABEL}: ${options.sdkSessionId}`); + } + + if (lines.length === 0) { + return null; + } + + return `## ${CONSTRAINTS_SECTION_TITLE}\n${lines.map((line) => `- ${line}`).join('\n')}`; +} + +async function writeOutputSchemaFile( + cwd: string, + outputFormat?: ExecuteOptions['outputFormat'] +): Promise { + if (!outputFormat || outputFormat.type !== 'json_schema') { + return null; + } + if (!outputFormat.schema || typeof outputFormat.schema !== 'object') { + throw new Error('Codex output schema must be a JSON object.'); + } + + const schemaDir = path.join(cwd, CODEX_INSTRUCTIONS_DIR); + await secureFs.mkdir(schemaDir, { recursive: true }); + const schemaPath = path.join(schemaDir, OUTPUT_SCHEMA_FILENAME); + const schemaContent = JSON.stringify(outputFormat.schema, null, OUTPUT_SCHEMA_INDENT_SPACES); + await secureFs.writeFile(schemaPath, schemaContent, TEXT_ENCODING); + return schemaPath; +} + +type ImageBlock = { + type: 'image'; + source: { + type: string; + media_type: string; + data: string; + }; +}; + +function extractImageBlocks(prompt: ExecuteOptions['prompt']): ImageBlock[] { + if (typeof prompt === 'string') { + return []; + } + if (!Array.isArray(prompt)) { + return []; + } + + const images: ImageBlock[] = []; + for (const block of prompt) { + if ( + block && + typeof block === 'object' && + 'type' in block && + block.type === 'image' && + 'source' in block && + block.source && + typeof block.source === 'object' && + 'data' in block.source && + 'media_type' in block.source + ) { + images.push(block as ImageBlock); + } + } + return images; +} + +async function writeImageFiles(cwd: string, imageBlocks: ImageBlock[]): Promise { + if (imageBlocks.length === 0) { + return []; + } + + const imageDir = path.join(cwd, CODEX_INSTRUCTIONS_DIR, IMAGE_TEMP_DIR); + await secureFs.mkdir(imageDir, { recursive: true }); + + const imagePaths: string[] = []; + for (let i = 0; i < imageBlocks.length; i++) { + const imageBlock = imageBlocks[i]; + const imageName = `${IMAGE_FILE_PREFIX}${Date.now()}-${i}${IMAGE_FILE_EXT}`; + const imagePath = path.join(imageDir, imageName); + + // Convert base64 to buffer + const imageData = Buffer.from(imageBlock.source.data, 'base64'); + await secureFs.writeFile(imagePath, imageData); + imagePaths.push(imagePath); + } + + return imagePaths; +} + +function normalizeIdentifier(value: unknown): string | null { + if (typeof value === 'string') { + const trimmed = value.trim(); + return trimmed ? trimmed : null; + } + if (typeof value === 'number' && Number.isFinite(value)) { + return String(value); + } + return null; +} + +function getIdentifierFromRecord( + record: Record, + keys: readonly string[] +): string | null { + for (const key of keys) { + const id = normalizeIdentifier(record[key]); + if (id) { + return id; + } + } + return null; +} + +function getItemIdentifier( + event: Record, + item: Record +): string | null { + return ( + getIdentifierFromRecord(item, ITEM_ID_KEYS) ?? getIdentifierFromRecord(event, EVENT_ID_KEYS) + ); +} + +class CodexToolUseTracker { + private readonly toolUseIdsByItem = new Map(); + private readonly anonymousToolUses: string[] = []; + private sequence = 0; + + register(event: Record, item: Record): string { + const itemId = getItemIdentifier(event, item); + const toolUseId = this.nextToolUseId(); + if (itemId) { + this.toolUseIdsByItem.set(itemId, toolUseId); + } else { + this.anonymousToolUses.push(toolUseId); + } + return toolUseId; + } + + resolve(event: Record, item: Record): string | null { + const itemId = getItemIdentifier(event, item); + if (itemId) { + const toolUseId = this.toolUseIdsByItem.get(itemId); + if (toolUseId) { + this.toolUseIdsByItem.delete(itemId); + return toolUseId; + } + } + + if (this.anonymousToolUses.length > 0) { + return this.anonymousToolUses.shift() || null; + } + + return null; + } + + private nextToolUseId(): string { + this.sequence += 1; + return `${TOOL_USE_ID_PREFIX}${this.sequence}`; + } +} + +type CodexCliSettings = { + autoLoadAgents: boolean; + sandboxMode: CodexSandboxMode; + approvalPolicy: CodexApprovalPolicy; + enableWebSearch: boolean; + enableImages: boolean; + additionalDirs: string[]; + threadId?: string; +}; + +function getCodexSettingsDir(): string { + const configured = getDataDirectory() ?? process.env.DATA_DIR; + return configured ? path.resolve(configured) : path.resolve(CODEX_SETTINGS_DIR_FALLBACK); +} + +async function loadCodexCliSettings( + overrides?: ExecuteOptions['codexSettings'] +): Promise { + const defaults: CodexCliSettings = { + autoLoadAgents: DEFAULT_CODEX_AUTO_LOAD_AGENTS, + sandboxMode: DEFAULT_CODEX_SANDBOX_MODE, + approvalPolicy: DEFAULT_CODEX_APPROVAL_POLICY, + enableWebSearch: false, + enableImages: true, + additionalDirs: [], + threadId: undefined, + }; + + try { + const settingsService = new SettingsService(getCodexSettingsDir()); + const settings = await settingsService.getGlobalSettings(); + const resolved: CodexCliSettings = { + autoLoadAgents: settings.codexAutoLoadAgents ?? defaults.autoLoadAgents, + sandboxMode: settings.codexSandboxMode ?? defaults.sandboxMode, + approvalPolicy: settings.codexApprovalPolicy ?? defaults.approvalPolicy, + enableWebSearch: settings.codexEnableWebSearch ?? defaults.enableWebSearch, + enableImages: settings.codexEnableImages ?? defaults.enableImages, + additionalDirs: settings.codexAdditionalDirs ?? defaults.additionalDirs, + threadId: settings.codexThreadId, + }; + + if (!overrides) { + return resolved; + } + + return { + autoLoadAgents: overrides.autoLoadAgents ?? resolved.autoLoadAgents, + sandboxMode: overrides.sandboxMode ?? resolved.sandboxMode, + approvalPolicy: overrides.approvalPolicy ?? resolved.approvalPolicy, + enableWebSearch: overrides.enableWebSearch ?? resolved.enableWebSearch, + enableImages: overrides.enableImages ?? resolved.enableImages, + additionalDirs: overrides.additionalDirs ?? resolved.additionalDirs, + threadId: overrides.threadId ?? resolved.threadId, + }; + } catch { + return { + autoLoadAgents: overrides?.autoLoadAgents ?? defaults.autoLoadAgents, + sandboxMode: overrides?.sandboxMode ?? defaults.sandboxMode, + approvalPolicy: overrides?.approvalPolicy ?? defaults.approvalPolicy, + enableWebSearch: overrides?.enableWebSearch ?? defaults.enableWebSearch, + enableImages: overrides?.enableImages ?? defaults.enableImages, + additionalDirs: overrides?.additionalDirs ?? defaults.additionalDirs, + threadId: overrides?.threadId ?? defaults.threadId, + }; + } +} + +function buildCodexInstructionsPrompt( + filePath: string, + content: string, + sourceLabel: string +): string { + return `## ${CODEX_INSTRUCTIONS_SECTION}\n**${CODEX_INSTRUCTIONS_SOURCE_LABEL}:** ${sourceLabel}\n**${CODEX_INSTRUCTIONS_PATH_LABEL}:** \`${filePath}\`\n\n${content}`; +} + +async function readCodexInstructionFile(filePath: string): Promise { + try { + const raw = await secureFs.readFile(filePath, TEXT_ENCODING); + const content = String(raw).trim(); + return content ? content : null; + } catch { + return null; + } +} + +async function loadCodexInstructions(cwd: string, enabled: boolean): Promise { + if (!enabled) { + return null; + } + + const sources: Array<{ path: string; content: string; sourceLabel: string }> = []; + const userInstructionsPath = path.join(getCodexConfigDir(), CODEX_USER_INSTRUCTIONS_FILE); + const userContent = await readCodexInstructionFile(userInstructionsPath); + if (userContent) { + sources.push({ + path: userInstructionsPath, + content: userContent, + sourceLabel: CODEX_INSTRUCTIONS_USER_SOURCE, + }); + } + + for (const fileName of CODEX_PROJECT_INSTRUCTIONS_FILES) { + const projectPath = path.join(cwd, CODEX_INSTRUCTIONS_DIR, fileName); + const projectContent = await readCodexInstructionFile(projectPath); + if (projectContent) { + sources.push({ + path: projectPath, + content: projectContent, + sourceLabel: CODEX_INSTRUCTIONS_PROJECT_SOURCE, + }); + } + } + + if (sources.length === 0) { + return null; + } + + const seen = new Set(); + const uniqueSources = sources.filter((source) => { + const normalized = source.content.trim(); + if (seen.has(normalized)) { + return false; + } + seen.add(normalized); + return true; + }); + + return uniqueSources + .map((source) => buildCodexInstructionsPrompt(source.path, source.content, source.sourceLabel)) + .join('\n\n'); +} + +export class CodexProvider extends BaseProvider { + getName(): string { + return 'codex'; + } + + async *executeQuery(options: ExecuteOptions): AsyncGenerator { + // Validate that model doesn't have a provider prefix + // AgentService should strip prefixes before passing to providers + validateBareModelId(options.model, 'CodexProvider'); + + try { + const mcpServers = options.mcpServers ?? {}; + const hasMcpServers = Object.keys(mcpServers).length > 0; + const codexSettings = await loadCodexCliSettings(options.codexSettings); + const codexInstructions = await loadCodexInstructions( + options.cwd, + codexSettings.autoLoadAgents + ); + const baseSystemPrompt = resolveSystemPrompt(options.systemPrompt); + const resolvedMaxTurns = resolveMaxTurns(options.maxTurns); + const resolvedAllowedTools = options.allowedTools ?? Array.from(DEFAULT_ALLOWED_TOOLS); + const restrictTools = !hasMcpServers || options.mcpUnrestrictedTools === false; + const wantsOutputSchema = Boolean( + options.outputFormat && options.outputFormat.type === 'json_schema' + ); + const constraintsPrompt = buildCodexConstraintsPrompt(options, { + allowedTools: resolvedAllowedTools, + restrictTools, + maxTurns: resolvedMaxTurns, + hasOutputSchema: wantsOutputSchema, + }); + const systemPromptParts = [codexInstructions, baseSystemPrompt, constraintsPrompt].filter( + (part): part is string => Boolean(part) + ); + const combinedSystemPrompt = systemPromptParts.length + ? systemPromptParts.join(SYSTEM_PROMPT_SEPARATOR) + : null; + + const executionPlan = await resolveCodexExecutionPlan(options); + if (executionPlan.mode === CODEX_EXECUTION_MODE_SDK) { + yield* executeCodexSdkQuery(options, combinedSystemPrompt); + return; + } + + if (hasMcpServers) { + const configManager = new CodexConfigManager(); + await configManager.configureMcpServers(options.cwd, options.mcpServers!); + } + + const toolUseTracker = new CodexToolUseTracker(); + const sandboxCheck = checkSandboxCompatibility( + options.cwd, + codexSettings.sandboxMode !== 'danger-full-access' + ); + const resolvedSandboxMode = sandboxCheck.enabled + ? codexSettings.sandboxMode + : 'danger-full-access'; + if (!sandboxCheck.enabled && sandboxCheck.message) { + console.warn(`[CodexProvider] ${sandboxCheck.message}`); + } + const searchEnabled = + codexSettings.enableWebSearch || resolveSearchEnabled(resolvedAllowedTools, restrictTools); + const outputSchemaPath = await writeOutputSchemaFile(options.cwd, options.outputFormat); + const imageBlocks = codexSettings.enableImages ? extractImageBlocks(options.prompt) : []; + const imagePaths = await writeImageFiles(options.cwd, imageBlocks); + const approvalPolicy = + hasMcpServers && options.mcpAutoApproveTools !== undefined + ? options.mcpAutoApproveTools + ? 'never' + : 'on-request' + : codexSettings.approvalPolicy; + const promptText = buildCombinedPrompt(options, combinedSystemPrompt); + const commandPath = executionPlan.cliPath || CODEX_COMMAND; + + // Build config overrides for max turns and reasoning effort + const overrides: Array<{ key: string; value: string | number | boolean }> = []; + if (resolvedMaxTurns !== null) { + overrides.push({ key: CONFIG_KEY_MAX_TURNS, value: resolvedMaxTurns }); + } + + // Add reasoning effort if model supports it and reasoningEffort is specified + if ( + options.reasoningEffort && + supportsReasoningEffort(options.model) && + options.reasoningEffort !== 'none' + ) { + overrides.push({ key: CODEX_REASONING_EFFORT_KEY, value: options.reasoningEffort }); + } + + // Add approval policy + overrides.push({ key: 'approval_policy', value: approvalPolicy }); + + // Add web search if enabled + if (searchEnabled) { + overrides.push({ key: 'features.web_search_request', value: true }); + } + + const configOverrides = buildConfigOverrides(overrides); + const preExecArgs: string[] = []; + + // Add additional directories with write access + if (codexSettings.additionalDirs && codexSettings.additionalDirs.length > 0) { + for (const dir of codexSettings.additionalDirs) { + preExecArgs.push(CODEX_ADD_DIR_FLAG, dir); + } + } + + // Model is already bare (no prefix) - validated by executeQuery + const args = [ + CODEX_EXEC_SUBCOMMAND, + CODEX_YOLO_FLAG, + CODEX_SKIP_GIT_REPO_CHECK_FLAG, + ...preExecArgs, + CODEX_MODEL_FLAG, + options.model, + CODEX_JSON_FLAG, + '-', // Read prompt from stdin to avoid shell escaping issues + ]; + + const stream = spawnJSONLProcess({ + command: commandPath, + args, + cwd: options.cwd, + env: buildEnv(), + abortController: options.abortController, + timeout: DEFAULT_TIMEOUT_MS, + stdinData: promptText, // Pass prompt via stdin + }); + + for await (const rawEvent of stream) { + const event = rawEvent as Record; + const eventType = getEventType(event); + + // Track thread/session ID from events + const threadId = event.thread_id; + if (threadId && typeof threadId === 'string') { + this._lastSessionId = threadId; + } + + if (eventType === CODEX_EVENT_TYPES.error) { + const errorText = extractText(event.error ?? event.message) || 'Codex CLI error'; + + // Enhance error message with helpful context + let enhancedError = errorText; + if (errorText.toLowerCase().includes('rate limit')) { + enhancedError = `${errorText}\n\nTip: You're being rate limited. Try reducing concurrent tasks or waiting a few minutes before retrying.`; + } else if ( + errorText.toLowerCase().includes('authentication') || + errorText.toLowerCase().includes('unauthorized') + ) { + enhancedError = `${errorText}\n\nTip: Check that your OPENAI_API_KEY is set correctly or run 'codex auth login' to authenticate.`; + } else if ( + errorText.toLowerCase().includes('not found') || + errorText.toLowerCase().includes('command not found') + ) { + enhancedError = `${errorText}\n\nTip: Make sure the Codex CLI is installed. Run 'npm install -g @openai/codex-cli' to install.`; + } + + console.error('[CodexProvider] CLI error event:', { errorText, event }); + yield { type: 'error', error: enhancedError }; + continue; + } + + if (eventType === CODEX_EVENT_TYPES.turnCompleted) { + const resultText = extractText(event.result) || undefined; + yield { type: 'result', subtype: 'success', result: resultText }; + continue; + } + + if (!eventType) { + const fallbackText = extractText(event); + if (fallbackText) { + yield { + type: 'assistant', + message: { + role: 'assistant', + content: [{ type: 'text', text: fallbackText }], + }, + }; + } + continue; + } + + const item = (event.item ?? {}) as Record; + const itemType = extractItemType(item); + + if ( + eventType === CODEX_EVENT_TYPES.itemStarted && + itemType === CODEX_ITEM_TYPES.commandExecution + ) { + const commandText = extractCommandText(item) || ''; + const tool = resolveCodexToolCall(commandText); + const toolUseId = toolUseTracker.register(event, item); + yield { + type: 'assistant', + message: { + role: 'assistant', + content: [ + { + type: 'tool_use', + name: tool.name, + input: tool.input, + tool_use_id: toolUseId, + }, + ], + }, + }; + continue; + } + + if (eventType === CODEX_EVENT_TYPES.itemUpdated && itemType === CODEX_ITEM_TYPES.todoList) { + const todos = extractCodexTodoItems(item); + if (todos) { + yield { + type: 'assistant', + message: { + role: 'assistant', + content: [ + { + type: 'tool_use', + name: getCodexTodoToolName(), + input: { todos }, + }, + ], + }, + }; + } else { + const todoText = extractText(item) || ''; + const formatted = todoText ? `Updated TODO list:\n${todoText}` : 'Updated TODO list'; + yield { + type: 'assistant', + message: { + role: 'assistant', + content: [{ type: 'text', text: formatted }], + }, + }; + } + continue; + } + + if (eventType === CODEX_EVENT_TYPES.itemCompleted) { + if (itemType === CODEX_ITEM_TYPES.reasoning) { + const thinkingText = extractText(item) || ''; + yield { + type: 'assistant', + message: { + role: 'assistant', + content: [{ type: 'thinking', thinking: thinkingText }], + }, + }; + continue; + } + + if (itemType === CODEX_ITEM_TYPES.commandExecution) { + const commandOutput = + extractCommandOutput(item) ?? extractCommandText(item) ?? extractText(item) ?? ''; + if (commandOutput) { + const toolUseId = toolUseTracker.resolve(event, item); + const toolResultBlock: { + type: 'tool_result'; + content: string; + tool_use_id?: string; + } = { type: 'tool_result', content: commandOutput }; + if (toolUseId) { + toolResultBlock.tool_use_id = toolUseId; + } + yield { + type: 'assistant', + message: { + role: 'assistant', + content: [toolResultBlock], + }, + }; + } + continue; + } + + const text = extractText(item) || extractText(event); + if (text) { + yield { + type: 'assistant', + message: { + role: 'assistant', + content: [{ type: 'text', text }], + }, + }; + } + } + } + } catch (error) { + const errorInfo = classifyError(error); + const userMessage = getUserFriendlyErrorMessage(error); + const enhancedMessage = errorInfo.isRateLimit + ? `${userMessage}\n\nTip: If you're rate limited, try reducing concurrent tasks or waiting a few minutes.` + : userMessage; + + console.error('[CodexProvider] executeQuery() error:', { + type: errorInfo.type, + message: errorInfo.message, + isRateLimit: errorInfo.isRateLimit, + retryAfter: errorInfo.retryAfter, + stack: error instanceof Error ? error.stack : undefined, + }); + + yield { type: 'error', error: enhancedMessage }; + } + } + + async detectInstallation(): Promise { + console.log('[CodexProvider.detectInstallation] Starting...'); + + const cliPath = await findCodexCliPath(); + const hasApiKey = !!process.env[OPENAI_API_KEY_ENV]; + const authIndicators = await getCodexAuthIndicators(); + const installed = !!cliPath; + + console.log('[CodexProvider.detectInstallation] cliPath:', cliPath); + console.log('[CodexProvider.detectInstallation] hasApiKey:', hasApiKey); + console.log( + '[CodexProvider.detectInstallation] authIndicators:', + JSON.stringify(authIndicators) + ); + console.log('[CodexProvider.detectInstallation] installed:', installed); + + let version = ''; + if (installed) { + try { + const result = await spawnProcess({ + command: cliPath || CODEX_COMMAND, + args: [CODEX_VERSION_FLAG], + cwd: process.cwd(), + }); + version = result.stdout.trim(); + console.log('[CodexProvider.detectInstallation] version:', version); + } catch (error) { + console.log('[CodexProvider.detectInstallation] Error getting version:', error); + version = ''; + } + } + + // Determine auth status - always verify with CLI, never assume authenticated + console.log('[CodexProvider.detectInstallation] Calling checkCodexAuthentication...'); + const authCheck = await checkCodexAuthentication(cliPath); + console.log('[CodexProvider.detectInstallation] authCheck result:', JSON.stringify(authCheck)); + const authenticated = authCheck.authenticated; + + const result = { + installed, + path: cliPath || undefined, + version: version || undefined, + method: 'cli' as const, // Installation method + hasApiKey, + authenticated, + }; + console.log('[CodexProvider.detectInstallation] Final result:', JSON.stringify(result)); + return result; + } + + getAvailableModels(): ModelDefinition[] { + // Return all available Codex/OpenAI models + return CODEX_MODELS; + } + + /** + * Check authentication status for Codex CLI + */ + async checkAuth(): Promise { + console.log('[CodexProvider.checkAuth] Starting auth check...'); + + const cliPath = await findCodexCliPath(); + const hasApiKey = !!process.env[OPENAI_API_KEY_ENV]; + const authIndicators = await getCodexAuthIndicators(); + + console.log('[CodexProvider.checkAuth] cliPath:', cliPath); + console.log('[CodexProvider.checkAuth] hasApiKey:', hasApiKey); + console.log('[CodexProvider.checkAuth] authIndicators:', JSON.stringify(authIndicators)); + + // Check for API key in environment + if (hasApiKey) { + console.log('[CodexProvider.checkAuth] Has API key, returning authenticated'); + return { authenticated: true, method: 'api_key' }; + } + + // Check for OAuth/token from Codex CLI + if (authIndicators.hasOAuthToken || authIndicators.hasApiKey) { + console.log( + '[CodexProvider.checkAuth] Has OAuth token or API key in auth file, returning authenticated' + ); + return { authenticated: true, method: 'oauth' }; + } + + // CLI is installed but not authenticated via indicators - try CLI command + console.log('[CodexProvider.checkAuth] No indicators found, trying CLI command...'); + if (cliPath) { + try { + // Try 'codex login status' first (same as checkCodexAuthentication) + console.log('[CodexProvider.checkAuth] Running: ' + cliPath + ' login status'); + const result = await spawnProcess({ + command: cliPath || CODEX_COMMAND, + args: ['login', 'status'], + cwd: process.cwd(), + env: { + ...process.env, + TERM: 'dumb', + }, + }); + console.log('[CodexProvider.checkAuth] login status result:'); + console.log('[CodexProvider.checkAuth] exitCode:', result.exitCode); + console.log('[CodexProvider.checkAuth] stdout:', JSON.stringify(result.stdout)); + console.log('[CodexProvider.checkAuth] stderr:', JSON.stringify(result.stderr)); + + // Check both stdout and stderr - Codex CLI outputs to stderr + const combinedOutput = (result.stdout + result.stderr).toLowerCase(); + const isLoggedIn = combinedOutput.includes('logged in'); + console.log('[CodexProvider.checkAuth] isLoggedIn:', isLoggedIn); + + if (result.exitCode === 0 && isLoggedIn) { + console.log('[CodexProvider.checkAuth] CLI says logged in, returning authenticated'); + return { authenticated: true, method: 'oauth' }; + } + } catch (error) { + console.log('[CodexProvider.checkAuth] Error running login status:', error); + } + } + + console.log('[CodexProvider.checkAuth] Not authenticated'); + return { authenticated: false, method: 'none' }; + } + + /** + * Get the detected CLI path (public accessor for status endpoints) + */ + async getCliPath(): Promise { + const path = await findCodexCliPath(); + return path || null; + } + + /** + * Get the last CLI session ID (for tracking across queries) + * This can be used to resume sessions in subsequent requests + */ + getLastSessionId(): string | null { + return this._lastSessionId ?? null; + } + + /** + * Set a session ID to use for CLI session resumption + */ + setSessionId(sessionId: string | null): void { + this._lastSessionId = sessionId; + } + + private _lastSessionId: string | null = null; +} diff --git a/apps/server/src/providers/codex-sdk-client.ts b/apps/server/src/providers/codex-sdk-client.ts new file mode 100644 index 00000000..51f7c0d2 --- /dev/null +++ b/apps/server/src/providers/codex-sdk-client.ts @@ -0,0 +1,173 @@ +/** + * Codex SDK client - Executes Codex queries via official @openai/codex-sdk + * + * Used for programmatic control of Codex from within the application. + * Provides cleaner integration than spawning CLI processes. + */ + +import { Codex } from '@openai/codex-sdk'; +import { formatHistoryAsText, classifyError, getUserFriendlyErrorMessage } from '@automaker/utils'; +import { supportsReasoningEffort } from '@automaker/types'; +import type { ExecuteOptions, ProviderMessage } from './types.js'; + +const OPENAI_API_KEY_ENV = 'OPENAI_API_KEY'; +const SDK_HISTORY_HEADER = 'Current request:\n'; +const DEFAULT_RESPONSE_TEXT = ''; +const SDK_ERROR_DETAILS_LABEL = 'Details:'; + +type PromptBlock = { + type: string; + text?: string; + source?: { + type?: string; + media_type?: string; + data?: string; + }; +}; + +function resolveApiKey(): string { + const apiKey = process.env[OPENAI_API_KEY_ENV]; + if (!apiKey) { + throw new Error('OPENAI_API_KEY is not set.'); + } + return apiKey; +} + +function normalizePromptBlocks(prompt: ExecuteOptions['prompt']): PromptBlock[] { + if (Array.isArray(prompt)) { + return prompt as PromptBlock[]; + } + return [{ type: 'text', text: prompt }]; +} + +function buildPromptText(options: ExecuteOptions, systemPrompt: string | null): string { + const historyText = + options.conversationHistory && options.conversationHistory.length > 0 + ? formatHistoryAsText(options.conversationHistory) + : ''; + + const promptBlocks = normalizePromptBlocks(options.prompt); + const promptTexts: string[] = []; + + for (const block of promptBlocks) { + if (block.type === 'text' && typeof block.text === 'string' && block.text.trim()) { + promptTexts.push(block.text); + } + } + + const promptContent = promptTexts.join('\n\n'); + if (!promptContent.trim()) { + throw new Error('Codex SDK prompt is empty.'); + } + + const parts: string[] = []; + if (systemPrompt) { + parts.push(`System: ${systemPrompt}`); + } + if (historyText) { + parts.push(historyText); + } + parts.push(`${SDK_HISTORY_HEADER}${promptContent}`); + + return parts.join('\n\n'); +} + +function buildSdkErrorMessage(rawMessage: string, userMessage: string): string { + if (!rawMessage) { + return userMessage; + } + if (!userMessage || rawMessage === userMessage) { + return rawMessage; + } + return `${userMessage}\n\n${SDK_ERROR_DETAILS_LABEL} ${rawMessage}`; +} + +/** + * Execute a query using the official Codex SDK + * + * The SDK provides a cleaner interface than spawning CLI processes: + * - Handles authentication automatically + * - Provides TypeScript types + * - Supports thread management and resumption + * - Better error handling + */ +export async function* executeCodexSdkQuery( + options: ExecuteOptions, + systemPrompt: string | null +): AsyncGenerator { + try { + const apiKey = resolveApiKey(); + const codex = new Codex({ apiKey }); + + // Resume existing thread or start new one + let thread; + if (options.sdkSessionId) { + try { + thread = codex.resumeThread(options.sdkSessionId); + } catch { + // If resume fails, start a new thread + thread = codex.startThread(); + } + } else { + thread = codex.startThread(); + } + + const promptText = buildPromptText(options, systemPrompt); + + // Build run options with reasoning effort if supported + const runOptions: { + signal?: AbortSignal; + reasoning?: { effort: string }; + } = { + signal: options.abortController?.signal, + }; + + // Add reasoning effort if model supports it and reasoningEffort is specified + if ( + options.reasoningEffort && + supportsReasoningEffort(options.model) && + options.reasoningEffort !== 'none' + ) { + runOptions.reasoning = { effort: options.reasoningEffort }; + } + + // Run the query + const result = await thread.run(promptText, runOptions); + + // Extract response text (from finalResponse property) + const outputText = result.finalResponse ?? DEFAULT_RESPONSE_TEXT; + + // Get thread ID (may be null if not populated yet) + const threadId = thread.id ?? undefined; + + // Yield assistant message + yield { + type: 'assistant', + session_id: threadId, + message: { + role: 'assistant', + content: [{ type: 'text', text: outputText }], + }, + }; + + // Yield result + yield { + type: 'result', + subtype: 'success', + session_id: threadId, + result: outputText, + }; + } catch (error) { + const errorInfo = classifyError(error); + const userMessage = getUserFriendlyErrorMessage(error); + const combinedMessage = buildSdkErrorMessage(errorInfo.message, userMessage); + console.error('[CodexSDK] executeQuery() error during execution:', { + type: errorInfo.type, + message: errorInfo.message, + isRateLimit: errorInfo.isRateLimit, + retryAfter: errorInfo.retryAfter, + stack: error instanceof Error ? error.stack : undefined, + }); + yield { type: 'error', error: combinedMessage }; + } +} diff --git a/apps/server/src/providers/codex-tool-mapping.ts b/apps/server/src/providers/codex-tool-mapping.ts new file mode 100644 index 00000000..f951e0f0 --- /dev/null +++ b/apps/server/src/providers/codex-tool-mapping.ts @@ -0,0 +1,436 @@ +export type CodexToolResolution = { + name: string; + input: Record; +}; + +export type CodexTodoItem = { + content: string; + status: 'pending' | 'in_progress' | 'completed'; + activeForm?: string; +}; + +const TOOL_NAME_BASH = 'Bash'; +const TOOL_NAME_READ = 'Read'; +const TOOL_NAME_EDIT = 'Edit'; +const TOOL_NAME_WRITE = 'Write'; +const TOOL_NAME_GREP = 'Grep'; +const TOOL_NAME_GLOB = 'Glob'; +const TOOL_NAME_TODO = 'TodoWrite'; +const TOOL_NAME_DELETE = 'Delete'; +const TOOL_NAME_LS = 'Ls'; + +const INPUT_KEY_COMMAND = 'command'; +const INPUT_KEY_FILE_PATH = 'file_path'; +const INPUT_KEY_PATTERN = 'pattern'; + +const SHELL_WRAPPER_PATTERNS = [ + /^\/bin\/bash\s+-lc\s+["']([\s\S]+)["']$/, + /^bash\s+-lc\s+["']([\s\S]+)["']$/, + /^\/bin\/sh\s+-lc\s+["']([\s\S]+)["']$/, + /^sh\s+-lc\s+["']([\s\S]+)["']$/, + /^cmd\.exe\s+\/c\s+["']?([\s\S]+)["']?$/i, + /^powershell(?:\.exe)?\s+-Command\s+["']?([\s\S]+)["']?$/i, + /^pwsh(?:\.exe)?\s+-Command\s+["']?([\s\S]+)["']?$/i, +] as const; + +const COMMAND_SEPARATOR_PATTERN = /\s*(?:&&|\|\||;)\s*/; +const SEGMENT_SKIP_PREFIXES = ['cd ', 'export ', 'set ', 'pushd '] as const; +const WRAPPER_COMMANDS = new Set(['sudo', 'env', 'command']); +const READ_COMMANDS = new Set(['cat', 'sed', 'head', 'tail', 'less', 'more', 'bat', 'stat', 'wc']); +const SEARCH_COMMANDS = new Set(['rg', 'grep', 'ag', 'ack']); +const GLOB_COMMANDS = new Set(['ls', 'find', 'fd', 'tree']); +const DELETE_COMMANDS = new Set(['rm', 'del', 'erase', 'remove', 'unlink']); +const LIST_COMMANDS = new Set(['ls', 'dir', 'll', 'la']); +const WRITE_COMMANDS = new Set(['tee', 'touch', 'mkdir']); +const APPLY_PATCH_COMMAND = 'apply_patch'; +const APPLY_PATCH_PATTERN = /\bapply_patch\b/; +const REDIRECTION_TARGET_PATTERN = /(?:>>|>)\s*([^\s]+)/; +const SED_IN_PLACE_FLAGS = new Set(['-i', '--in-place']); +const PERL_IN_PLACE_FLAG = /-.*i/; +const SEARCH_PATTERN_FLAGS = new Set(['-e', '--regexp']); +const SEARCH_VALUE_FLAGS = new Set([ + '-g', + '--glob', + '--iglob', + '--type', + '--type-add', + '--type-clear', + '--encoding', +]); +const SEARCH_FILE_LIST_FLAGS = new Set(['--files']); +const TODO_LINE_PATTERN = /^[-*]\s*(?:\[(?[ x~])\]\s*)?(?.+)$/; +const TODO_STATUS_COMPLETED = 'completed'; +const TODO_STATUS_IN_PROGRESS = 'in_progress'; +const TODO_STATUS_PENDING = 'pending'; +const PATCH_FILE_MARKERS = [ + '*** Update File: ', + '*** Add File: ', + '*** Delete File: ', + '*** Move to: ', +] as const; + +function stripShellWrapper(command: string): string { + const trimmed = command.trim(); + for (const pattern of SHELL_WRAPPER_PATTERNS) { + const match = trimmed.match(pattern); + if (match && match[1]) { + return unescapeCommand(match[1].trim()); + } + } + return trimmed; +} + +function unescapeCommand(command: string): string { + return command.replace(/\\(["'])/g, '$1'); +} + +function extractPrimarySegment(command: string): string { + const segments = command + .split(COMMAND_SEPARATOR_PATTERN) + .map((segment) => segment.trim()) + .filter(Boolean); + + for (const segment of segments) { + const shouldSkip = SEGMENT_SKIP_PREFIXES.some((prefix) => segment.startsWith(prefix)); + if (!shouldSkip) { + return segment; + } + } + + return command.trim(); +} + +function tokenizeCommand(command: string): string[] { + const tokens: string[] = []; + let current = ''; + let inSingleQuote = false; + let inDoubleQuote = false; + let isEscaped = false; + + for (const char of command) { + if (isEscaped) { + current += char; + isEscaped = false; + continue; + } + + if (char === '\\') { + isEscaped = true; + continue; + } + + if (char === "'" && !inDoubleQuote) { + inSingleQuote = !inSingleQuote; + continue; + } + + if (char === '"' && !inSingleQuote) { + inDoubleQuote = !inDoubleQuote; + continue; + } + + if (!inSingleQuote && !inDoubleQuote && /\s/.test(char)) { + if (current) { + tokens.push(current); + current = ''; + } + continue; + } + + current += char; + } + + if (current) { + tokens.push(current); + } + + return tokens; +} + +function stripWrapperTokens(tokens: string[]): string[] { + let index = 0; + while (index < tokens.length && WRAPPER_COMMANDS.has(tokens[index].toLowerCase())) { + index += 1; + } + return tokens.slice(index); +} + +function extractFilePathFromTokens(tokens: string[]): string | null { + const candidates = tokens.slice(1).filter((token) => token && !token.startsWith('-')); + if (candidates.length === 0) return null; + return candidates[candidates.length - 1]; +} + +function extractSearchPattern(tokens: string[]): string | null { + const remaining = tokens.slice(1); + + for (let index = 0; index < remaining.length; index += 1) { + const token = remaining[index]; + if (token === '--') { + return remaining[index + 1] ?? null; + } + if (SEARCH_PATTERN_FLAGS.has(token)) { + return remaining[index + 1] ?? null; + } + if (SEARCH_VALUE_FLAGS.has(token)) { + index += 1; + continue; + } + if (token.startsWith('-')) { + continue; + } + return token; + } + + return null; +} + +function extractTeeTarget(tokens: string[]): string | null { + const teeIndex = tokens.findIndex((token) => token === 'tee'); + if (teeIndex < 0) return null; + const candidate = tokens[teeIndex + 1]; + return candidate && !candidate.startsWith('-') ? candidate : null; +} + +function extractRedirectionTarget(command: string): string | null { + const match = command.match(REDIRECTION_TARGET_PATTERN); + return match?.[1] ?? null; +} + +function extractFilePathFromDeleteTokens(tokens: string[]): string | null { + // rm file.txt or rm /path/to/file.txt + // Skip flags and get the first non-flag argument + for (let i = 1; i < tokens.length; i++) { + const token = tokens[i]; + if (token && !token.startsWith('-')) { + return token; + } + } + return null; +} + +function hasSedInPlaceFlag(tokens: string[]): boolean { + return tokens.some((token) => SED_IN_PLACE_FLAGS.has(token) || token.startsWith('-i')); +} + +function hasPerlInPlaceFlag(tokens: string[]): boolean { + return tokens.some((token) => PERL_IN_PLACE_FLAG.test(token)); +} + +function extractPatchFilePath(command: string): string | null { + for (const marker of PATCH_FILE_MARKERS) { + const index = command.indexOf(marker); + if (index < 0) continue; + const start = index + marker.length; + const end = command.indexOf('\n', start); + const rawPath = (end === -1 ? command.slice(start) : command.slice(start, end)).trim(); + if (rawPath) return rawPath; + } + return null; +} + +function buildInputWithFilePath(filePath: string | null): Record { + return filePath ? { [INPUT_KEY_FILE_PATH]: filePath } : {}; +} + +function buildInputWithPattern(pattern: string | null): Record { + return pattern ? { [INPUT_KEY_PATTERN]: pattern } : {}; +} + +export function resolveCodexToolCall(command: string): CodexToolResolution { + const normalized = stripShellWrapper(command); + const primarySegment = extractPrimarySegment(normalized); + const tokens = stripWrapperTokens(tokenizeCommand(primarySegment)); + const commandToken = tokens[0]?.toLowerCase() ?? ''; + + const redirectionTarget = extractRedirectionTarget(primarySegment); + if (redirectionTarget) { + return { + name: TOOL_NAME_WRITE, + input: buildInputWithFilePath(redirectionTarget), + }; + } + + if (commandToken === APPLY_PATCH_COMMAND || APPLY_PATCH_PATTERN.test(primarySegment)) { + return { + name: TOOL_NAME_EDIT, + input: buildInputWithFilePath(extractPatchFilePath(primarySegment)), + }; + } + + if (commandToken === 'sed' && hasSedInPlaceFlag(tokens)) { + return { + name: TOOL_NAME_EDIT, + input: buildInputWithFilePath(extractFilePathFromTokens(tokens)), + }; + } + + if (commandToken === 'perl' && hasPerlInPlaceFlag(tokens)) { + return { + name: TOOL_NAME_EDIT, + input: buildInputWithFilePath(extractFilePathFromTokens(tokens)), + }; + } + + if (WRITE_COMMANDS.has(commandToken)) { + const filePath = + commandToken === 'tee' ? extractTeeTarget(tokens) : extractFilePathFromTokens(tokens); + return { + name: TOOL_NAME_WRITE, + input: buildInputWithFilePath(filePath), + }; + } + + if (SEARCH_COMMANDS.has(commandToken)) { + if (tokens.some((token) => SEARCH_FILE_LIST_FLAGS.has(token))) { + return { + name: TOOL_NAME_GLOB, + input: buildInputWithPattern(extractFilePathFromTokens(tokens)), + }; + } + + return { + name: TOOL_NAME_GREP, + input: buildInputWithPattern(extractSearchPattern(tokens)), + }; + } + + // Handle Delete commands (rm, del, erase, remove, unlink) + if (DELETE_COMMANDS.has(commandToken)) { + // Skip if -r or -rf flags (recursive delete should go to Bash) + if ( + tokens.some((token) => token === '-r' || token === '-rf' || token === '-f' || token === '-rf') + ) { + return { + name: TOOL_NAME_BASH, + input: { [INPUT_KEY_COMMAND]: normalized }, + }; + } + // Simple file deletion - extract the file path + const filePath = extractFilePathFromDeleteTokens(tokens); + if (filePath) { + return { + name: TOOL_NAME_DELETE, + input: { path: filePath }, + }; + } + // Fall back to bash if we can't determine the file path + return { + name: TOOL_NAME_BASH, + input: { [INPUT_KEY_COMMAND]: normalized }, + }; + } + + // Handle simple Ls commands (just listing, not find/glob) + if (LIST_COMMANDS.has(commandToken)) { + const filePath = extractFilePathFromTokens(tokens); + return { + name: TOOL_NAME_LS, + input: { path: filePath || '.' }, + }; + } + + if (GLOB_COMMANDS.has(commandToken)) { + return { + name: TOOL_NAME_GLOB, + input: buildInputWithPattern(extractFilePathFromTokens(tokens)), + }; + } + + if (READ_COMMANDS.has(commandToken)) { + return { + name: TOOL_NAME_READ, + input: buildInputWithFilePath(extractFilePathFromTokens(tokens)), + }; + } + + return { + name: TOOL_NAME_BASH, + input: { [INPUT_KEY_COMMAND]: normalized }, + }; +} + +function parseTodoLines(lines: string[]): CodexTodoItem[] { + const todos: CodexTodoItem[] = []; + + for (const line of lines) { + const match = line.match(TODO_LINE_PATTERN); + if (!match?.groups?.content) continue; + + const statusToken = match.groups.status; + const status = + statusToken === 'x' + ? TODO_STATUS_COMPLETED + : statusToken === '~' + ? TODO_STATUS_IN_PROGRESS + : TODO_STATUS_PENDING; + + todos.push({ content: match.groups.content.trim(), status }); + } + + return todos; +} + +function extractTodoFromArray(value: unknown[]): CodexTodoItem[] { + return value + .map((entry) => { + if (typeof entry === 'string') { + return { content: entry, status: TODO_STATUS_PENDING }; + } + if (entry && typeof entry === 'object') { + const record = entry as Record; + const content = + typeof record.content === 'string' + ? record.content + : typeof record.text === 'string' + ? record.text + : typeof record.title === 'string' + ? record.title + : null; + if (!content) return null; + const status = + record.status === TODO_STATUS_COMPLETED || + record.status === TODO_STATUS_IN_PROGRESS || + record.status === TODO_STATUS_PENDING + ? (record.status as CodexTodoItem['status']) + : TODO_STATUS_PENDING; + const activeForm = typeof record.activeForm === 'string' ? record.activeForm : undefined; + return { content, status, activeForm }; + } + return null; + }) + .filter((item): item is CodexTodoItem => Boolean(item)); +} + +export function extractCodexTodoItems(item: Record): CodexTodoItem[] | null { + const todosValue = item.todos; + if (Array.isArray(todosValue)) { + const todos = extractTodoFromArray(todosValue); + return todos.length > 0 ? todos : null; + } + + const itemsValue = item.items; + if (Array.isArray(itemsValue)) { + const todos = extractTodoFromArray(itemsValue); + return todos.length > 0 ? todos : null; + } + + const textValue = + typeof item.text === 'string' + ? item.text + : typeof item.content === 'string' + ? item.content + : null; + if (!textValue) return null; + + const lines = textValue + .split('\n') + .map((line) => line.trim()) + .filter(Boolean); + const todos = parseTodoLines(lines); + return todos.length > 0 ? todos : null; +} + +export function getCodexTodoToolName(): string { + return TOOL_NAME_TODO; +} diff --git a/apps/server/src/providers/cursor-provider.ts b/apps/server/src/providers/cursor-provider.ts index ca708874..6cefc279 100644 --- a/apps/server/src/providers/cursor-provider.ts +++ b/apps/server/src/providers/cursor-provider.ts @@ -28,7 +28,9 @@ import type { ModelDefinition, ContentBlock, } from './types.js'; -import { stripProviderPrefix } from '@automaker/types'; +import { validateBareModelId } from '@automaker/types'; +import { validateApiKey } from '../lib/auth-utils.js'; +import { getEffectivePermissions } from '../services/cursor-config-service.js'; import { type CursorStreamEvent, type CursorSystemEvent, @@ -315,18 +317,25 @@ export class CursorProvider extends CliProvider { } buildCliArgs(options: ExecuteOptions): string[] { - // Extract model (strip 'cursor-' prefix if present) - const model = stripProviderPrefix(options.model || 'auto'); + // Model is already bare (no prefix) - validated by executeQuery + const model = options.model || 'auto'; // Build CLI arguments for cursor-agent // NOTE: Prompt is NOT included here - it's passed via stdin to avoid // shell escaping issues when content contains $(), backticks, etc. - const cliArgs: string[] = [ + const cliArgs: string[] = []; + + // If using Cursor IDE (cliPath is 'cursor' not 'cursor-agent'), add 'agent' subcommand + if (this.cliPath && !this.cliPath.includes('cursor-agent')) { + cliArgs.push('agent'); + } + + cliArgs.push( '-p', // Print mode (non-interactive) '--output-format', 'stream-json', - '--stream-partial-output', // Real-time streaming - ]; + '--stream-partial-output' // Real-time streaming + ); // Only add --force if NOT in read-only mode // Without --force, Cursor CLI suggests changes but doesn't apply them @@ -472,7 +481,9 @@ export class CursorProvider extends CliProvider { // ========================================================================== /** - * Override CLI detection to add Cursor-specific versions directory check + * Override CLI detection to add Cursor-specific checks: + * 1. Versions directory for cursor-agent installations + * 2. Cursor IDE with 'cursor agent' subcommand support */ protected detectCli(): CliDetectionResult { // First try standard detection (PATH, common paths, WSL) @@ -507,6 +518,39 @@ export class CursorProvider extends CliProvider { } } + // If cursor-agent not found, try to find 'cursor' IDE and use 'cursor agent' subcommand + // The Cursor IDE includes the agent as a subcommand: cursor agent + if (process.platform !== 'win32') { + const cursorPaths = [ + '/usr/bin/cursor', + '/usr/local/bin/cursor', + path.join(os.homedir(), '.local/bin/cursor'), + '/opt/cursor/cursor', + ]; + + for (const cursorPath of cursorPaths) { + if (fs.existsSync(cursorPath)) { + // Verify cursor agent subcommand works + try { + execSync(`"${cursorPath}" agent --version`, { + encoding: 'utf8', + timeout: 5000, + stdio: 'pipe', + }); + logger.debug(`Using cursor agent via Cursor IDE: ${cursorPath}`); + // Return cursor path but we'll use 'cursor agent' subcommand + return { + cliPath: cursorPath, + useWsl: false, + strategy: 'native', + }; + } catch { + // cursor agent subcommand doesn't work, try next path + } + } + } + } + return result; } @@ -605,6 +649,10 @@ export class CursorProvider extends CliProvider { async *executeQuery(options: ExecuteOptions): AsyncGenerator { this.ensureCliDetected(); + // Validate that model doesn't have a provider prefix + // AgentService should strip prefixes before passing to providers + validateBareModelId(options.model, 'CursorProvider'); + if (!this.cliPath) { throw this.createError( CursorErrorCode.NOT_INSTALLED, @@ -642,6 +690,9 @@ export class CursorProvider extends CliProvider { logger.debug(`CursorProvider.executeQuery called with model: "${options.model}"`); + // Get effective permissions for this project + const effectivePermissions = await getEffectivePermissions(options.cwd || process.cwd()); + // Debug: log raw events when AUTOMAKER_DEBUG_RAW_OUTPUT is enabled const debugRawEvents = process.env.AUTOMAKER_DEBUG_RAW_OUTPUT === 'true' || @@ -838,9 +889,16 @@ export class CursorProvider extends CliProvider { }); return result; } - const result = execSync(`"${this.cliPath}" --version`, { + + // If using Cursor IDE, use 'cursor agent --version' + const versionCmd = this.cliPath.includes('cursor-agent') + ? `"${this.cliPath}" --version` + : `"${this.cliPath}" agent --version`; + + const result = execSync(versionCmd, { encoding: 'utf8', timeout: 5000, + stdio: 'pipe', }).trim(); return result; } catch { @@ -857,8 +915,13 @@ export class CursorProvider extends CliProvider { return { authenticated: false, method: 'none' }; } - // Check for API key in environment + // Check for API key in environment with validation if (process.env.CURSOR_API_KEY) { + const validation = validateApiKey(process.env.CURSOR_API_KEY, 'cursor'); + if (!validation.isValid) { + logger.warn('Cursor API key validation failed:', validation.error); + return { authenticated: false, method: 'api_key', error: validation.error }; + } return { authenticated: true, method: 'api_key' }; } diff --git a/apps/server/src/providers/index.ts b/apps/server/src/providers/index.ts index ce0bf8d0..a1da283b 100644 --- a/apps/server/src/providers/index.ts +++ b/apps/server/src/providers/index.ts @@ -25,5 +25,8 @@ export { ClaudeProvider } from './claude-provider.js'; export { CursorProvider, CursorErrorCode, CursorError } from './cursor-provider.js'; export { CursorConfigManager } from './cursor-config-manager.js'; +// OpenCode provider +export { OpencodeProvider } from './opencode-provider.js'; + // Provider factory export { ProviderFactory } from './provider-factory.js'; diff --git a/apps/server/src/providers/opencode-provider.ts b/apps/server/src/providers/opencode-provider.ts new file mode 100644 index 00000000..b54592c3 --- /dev/null +++ b/apps/server/src/providers/opencode-provider.ts @@ -0,0 +1,666 @@ +/** + * OpenCode Provider - Executes queries using opencode CLI + * + * Extends CliProvider with OpenCode-specific configuration: + * - Event normalization for OpenCode's stream-json format + * - Model definitions for anthropic, openai, and google models + * - NPX-based Windows execution strategy + * - Platform-specific npm global installation paths + * + * Spawns the opencode CLI with --output-format stream-json for streaming responses. + */ + +import * as path from 'path'; +import * as os from 'os'; +import { CliProvider, type CliSpawnConfig } from './cli-provider.js'; +import type { + ProviderConfig, + ExecuteOptions, + ProviderMessage, + ModelDefinition, + InstallationStatus, + ContentBlock, +} from '@automaker/types'; +import { stripProviderPrefix } from '@automaker/types'; +import { type SubprocessOptions, getOpenCodeAuthIndicators } from '@automaker/platform'; + +// ============================================================================= +// OpenCode Auth Types +// ============================================================================= + +export interface OpenCodeAuthStatus { + authenticated: boolean; + method: 'api_key' | 'oauth' | 'none'; + hasOAuthToken?: boolean; + hasApiKey?: boolean; +} + +// ============================================================================= +// OpenCode Stream Event Types +// ============================================================================= + +/** + * Base interface for all OpenCode stream events + */ +interface OpenCodeBaseEvent { + /** Event type identifier */ + type: string; + /** Optional session identifier */ + session_id?: string; +} + +/** + * Text delta event - Incremental text output from the model + */ +export interface OpenCodeTextDeltaEvent extends OpenCodeBaseEvent { + type: 'text-delta'; + /** The incremental text content */ + text: string; +} + +/** + * Text end event - Signals completion of text generation + */ +export interface OpenCodeTextEndEvent extends OpenCodeBaseEvent { + type: 'text-end'; +} + +/** + * Tool call event - Request to execute a tool + */ +export interface OpenCodeToolCallEvent extends OpenCodeBaseEvent { + type: 'tool-call'; + /** Unique identifier for this tool call */ + call_id?: string; + /** Tool name to invoke */ + name: string; + /** Arguments to pass to the tool */ + args: unknown; +} + +/** + * Tool result event - Output from a tool execution + */ +export interface OpenCodeToolResultEvent extends OpenCodeBaseEvent { + type: 'tool-result'; + /** The tool call ID this result corresponds to */ + call_id?: string; + /** Output from the tool execution */ + output: string; +} + +/** + * Tool error event - Tool execution failed + */ +export interface OpenCodeToolErrorEvent extends OpenCodeBaseEvent { + type: 'tool-error'; + /** The tool call ID that failed */ + call_id?: string; + /** Error message describing the failure */ + error: string; +} + +/** + * Start step event - Begins an agentic loop iteration + */ +export interface OpenCodeStartStepEvent extends OpenCodeBaseEvent { + type: 'start-step'; + /** Step number in the agentic loop */ + step?: number; +} + +/** + * Finish step event - Completes an agentic loop iteration + */ +export interface OpenCodeFinishStepEvent extends OpenCodeBaseEvent { + type: 'finish-step'; + /** Step number that completed */ + step?: number; + /** Whether the step completed successfully */ + success?: boolean; + /** Optional result data */ + result?: string; + /** Optional error if step failed */ + error?: string; +} + +/** + * Union type of all OpenCode stream events + */ +export type OpenCodeStreamEvent = + | OpenCodeTextDeltaEvent + | OpenCodeTextEndEvent + | OpenCodeToolCallEvent + | OpenCodeToolResultEvent + | OpenCodeToolErrorEvent + | OpenCodeStartStepEvent + | OpenCodeFinishStepEvent; + +// ============================================================================= +// Tool Use ID Generation +// ============================================================================= + +/** Counter for generating unique tool use IDs when call_id is not provided */ +let toolUseIdCounter = 0; + +/** + * Generate a unique tool use ID for tool calls without explicit IDs + */ +function generateToolUseId(): string { + toolUseIdCounter += 1; + return `opencode-tool-${toolUseIdCounter}`; +} + +/** + * Reset the tool use ID counter (useful for testing) + */ +export function resetToolUseIdCounter(): void { + toolUseIdCounter = 0; +} + +// ============================================================================= +// Provider Implementation +// ============================================================================= + +/** + * OpencodeProvider - Integrates opencode CLI as an AI provider + * + * OpenCode is an npm-distributed CLI tool that provides access to + * multiple AI model providers through a unified interface. + */ +export class OpencodeProvider extends CliProvider { + constructor(config: ProviderConfig = {}) { + super(config); + } + + // ========================================================================== + // CliProvider Abstract Method Implementations + // ========================================================================== + + getName(): string { + return 'opencode'; + } + + getCliName(): string { + return 'opencode'; + } + + getSpawnConfig(): CliSpawnConfig { + return { + windowsStrategy: 'npx', + npxPackage: 'opencode-ai@latest', + commonPaths: { + linux: [ + path.join(os.homedir(), '.opencode/bin/opencode'), + path.join(os.homedir(), '.npm-global/bin/opencode'), + '/usr/local/bin/opencode', + '/usr/bin/opencode', + path.join(os.homedir(), '.local/bin/opencode'), + ], + darwin: [ + path.join(os.homedir(), '.opencode/bin/opencode'), + path.join(os.homedir(), '.npm-global/bin/opencode'), + '/usr/local/bin/opencode', + '/opt/homebrew/bin/opencode', + path.join(os.homedir(), '.local/bin/opencode'), + ], + win32: [ + path.join(os.homedir(), '.opencode', 'bin', 'opencode.exe'), + path.join(os.homedir(), 'AppData', 'Roaming', 'npm', 'opencode.cmd'), + path.join(os.homedir(), 'AppData', 'Roaming', 'npm', 'opencode'), + path.join(process.env.APPDATA || '', 'npm', 'opencode.cmd'), + ], + }, + }; + } + + /** + * Build CLI arguments for the `opencode run` command + * + * Arguments built: + * - 'run' subcommand for executing queries + * - '--format', 'stream-json' for JSONL streaming output + * - '-q' / '--quiet' to suppress spinner and interactive elements + * - '-c', '' for working directory + * - '--model', '' for model selection (if specified) + * - '-' as final arg to read prompt from stdin + * + * The prompt is NOT included in CLI args - it's passed via stdin to avoid + * shell escaping issues with special characters in content. + * + * @param options - Execution options containing model, cwd, etc. + * @returns Array of CLI arguments for opencode run + */ + buildCliArgs(options: ExecuteOptions): string[] { + const args: string[] = ['run']; + + // Add streaming JSON output format for JSONL parsing + args.push('--format', 'stream-json'); + + // Suppress spinner and interactive elements for non-TTY usage + args.push('-q'); + + // Set working directory + if (options.cwd) { + args.push('-c', options.cwd); + } + + // Handle model selection + // Strip 'opencode-' prefix if present, OpenCode uses format like 'anthropic/claude-sonnet-4-5' + if (options.model) { + const model = stripProviderPrefix(options.model); + args.push('--model', model); + } + + // Use '-' to indicate reading prompt from stdin + // This avoids shell escaping issues with special characters + args.push('-'); + + return args; + } + + // ========================================================================== + // Prompt Handling + // ========================================================================== + + /** + * Extract prompt text from ExecuteOptions for passing via stdin + * + * Handles both string prompts and array-based prompts with content blocks. + * For array prompts with images, extracts only text content (images would + * need separate handling via file paths if OpenCode supports them). + * + * @param options - Execution options containing the prompt + * @returns Plain text prompt string + */ + private extractPromptText(options: ExecuteOptions): string { + if (typeof options.prompt === 'string') { + return options.prompt; + } + + // Array-based prompt - extract text content + if (Array.isArray(options.prompt)) { + return options.prompt + .filter((block) => block.type === 'text' && block.text) + .map((block) => block.text) + .join('\n'); + } + + throw new Error('Invalid prompt format: expected string or content block array'); + } + + /** + * Build subprocess options with stdin data for prompt + * + * Extends the base class method to add stdinData containing the prompt. + * This allows passing prompts via stdin instead of CLI arguments, + * avoiding shell escaping issues with special characters. + * + * @param options - Execution options + * @param cliArgs - CLI arguments from buildCliArgs + * @returns SubprocessOptions with stdinData set + */ + protected buildSubprocessOptions(options: ExecuteOptions, cliArgs: string[]): SubprocessOptions { + const subprocessOptions = super.buildSubprocessOptions(options, cliArgs); + + // Pass prompt via stdin to avoid shell interpretation of special characters + // like $(), backticks, quotes, etc. that may appear in prompts or file content + subprocessOptions.stdinData = this.extractPromptText(options); + + return subprocessOptions; + } + + /** + * Normalize a raw CLI event to ProviderMessage format + * + * Maps OpenCode event types to the standard ProviderMessage structure: + * - text-delta -> type: 'assistant', content with type: 'text' + * - text-end -> null (informational, no message needed) + * - tool-call -> type: 'assistant', content with type: 'tool_use' + * - tool-result -> type: 'assistant', content with type: 'tool_result' + * - tool-error -> type: 'error' + * - start-step -> null (informational, no message needed) + * - finish-step with success -> type: 'result', subtype: 'success' + * - finish-step with error -> type: 'error' + * + * @param event - Raw event from OpenCode CLI JSONL output + * @returns Normalized ProviderMessage or null to skip the event + */ + normalizeEvent(event: unknown): ProviderMessage | null { + if (!event || typeof event !== 'object') { + return null; + } + + const openCodeEvent = event as OpenCodeStreamEvent; + + switch (openCodeEvent.type) { + case 'text-delta': { + const textEvent = openCodeEvent as OpenCodeTextDeltaEvent; + + // Skip empty text deltas + if (!textEvent.text) { + return null; + } + + const content: ContentBlock[] = [ + { + type: 'text', + text: textEvent.text, + }, + ]; + + return { + type: 'assistant', + session_id: textEvent.session_id, + message: { + role: 'assistant', + content, + }, + }; + } + + case 'text-end': { + // Text end is informational - no message needed + return null; + } + + case 'tool-call': { + const toolEvent = openCodeEvent as OpenCodeToolCallEvent; + + // Generate a tool use ID if not provided + const toolUseId = toolEvent.call_id || generateToolUseId(); + + const content: ContentBlock[] = [ + { + type: 'tool_use', + name: toolEvent.name, + tool_use_id: toolUseId, + input: toolEvent.args, + }, + ]; + + return { + type: 'assistant', + session_id: toolEvent.session_id, + message: { + role: 'assistant', + content, + }, + }; + } + + case 'tool-result': { + const resultEvent = openCodeEvent as OpenCodeToolResultEvent; + + const content: ContentBlock[] = [ + { + type: 'tool_result', + tool_use_id: resultEvent.call_id, + content: resultEvent.output, + }, + ]; + + return { + type: 'assistant', + session_id: resultEvent.session_id, + message: { + role: 'assistant', + content, + }, + }; + } + + case 'tool-error': { + const errorEvent = openCodeEvent as OpenCodeToolErrorEvent; + + return { + type: 'error', + session_id: errorEvent.session_id, + error: errorEvent.error || 'Tool execution failed', + }; + } + + case 'start-step': { + // Start step is informational - no message needed + return null; + } + + case 'finish-step': { + const finishEvent = openCodeEvent as OpenCodeFinishStepEvent; + + // Check if the step failed + if (finishEvent.success === false || finishEvent.error) { + return { + type: 'error', + session_id: finishEvent.session_id, + error: finishEvent.error || 'Step execution failed', + }; + } + + // Successful completion + return { + type: 'result', + subtype: 'success', + session_id: finishEvent.session_id, + result: finishEvent.result, + }; + } + + default: { + // Unknown event type - skip it + return null; + } + } + } + + // ========================================================================== + // Model Configuration + // ========================================================================== + + /** + * Get available models for OpenCode + * + * Returns model definitions for supported AI providers: + * - Anthropic Claude models (Sonnet, Opus, Haiku) + * - OpenAI GPT-4o + * - Google Gemini 2.5 Pro + */ + getAvailableModels(): ModelDefinition[] { + return [ + // OpenCode Free Tier Models + { + id: 'opencode/big-pickle', + name: 'Big Pickle (Free)', + modelString: 'opencode/big-pickle', + provider: 'opencode', + description: 'OpenCode free tier model - great for general coding', + supportsTools: true, + supportsVision: false, + tier: 'basic', + }, + { + id: 'opencode/gpt-5-nano', + name: 'GPT-5 Nano (Free)', + modelString: 'opencode/gpt-5-nano', + provider: 'opencode', + description: 'Fast and lightweight free tier model', + supportsTools: true, + supportsVision: false, + tier: 'basic', + }, + { + id: 'opencode/grok-code', + name: 'Grok Code (Free)', + modelString: 'opencode/grok-code', + provider: 'opencode', + description: 'OpenCode free tier Grok model for coding', + supportsTools: true, + supportsVision: false, + tier: 'basic', + }, + // Amazon Bedrock - Claude Models + { + id: 'amazon-bedrock/anthropic.claude-sonnet-4-5-20250929-v1:0', + name: 'Claude Sonnet 4.5 (Bedrock)', + modelString: 'amazon-bedrock/anthropic.claude-sonnet-4-5-20250929-v1:0', + provider: 'opencode', + description: 'Latest Claude Sonnet via AWS Bedrock - fast and intelligent', + supportsTools: true, + supportsVision: true, + tier: 'premium', + default: true, + }, + { + id: 'amazon-bedrock/anthropic.claude-opus-4-5-20251101-v1:0', + name: 'Claude Opus 4.5 (Bedrock)', + modelString: 'amazon-bedrock/anthropic.claude-opus-4-5-20251101-v1:0', + provider: 'opencode', + description: 'Most capable Claude model via AWS Bedrock', + supportsTools: true, + supportsVision: true, + tier: 'premium', + }, + { + id: 'amazon-bedrock/anthropic.claude-haiku-4-5-20251001-v1:0', + name: 'Claude Haiku 4.5 (Bedrock)', + modelString: 'amazon-bedrock/anthropic.claude-haiku-4-5-20251001-v1:0', + provider: 'opencode', + description: 'Fastest Claude model via AWS Bedrock', + supportsTools: true, + supportsVision: true, + tier: 'standard', + }, + // Amazon Bedrock - DeepSeek Models + { + id: 'amazon-bedrock/deepseek.r1-v1:0', + name: 'DeepSeek R1 (Bedrock)', + modelString: 'amazon-bedrock/deepseek.r1-v1:0', + provider: 'opencode', + description: 'DeepSeek R1 reasoning model - excellent for coding', + supportsTools: true, + supportsVision: false, + tier: 'premium', + }, + // Amazon Bedrock - Amazon Nova Models + { + id: 'amazon-bedrock/amazon.nova-pro-v1:0', + name: 'Amazon Nova Pro (Bedrock)', + modelString: 'amazon-bedrock/amazon.nova-pro-v1:0', + provider: 'opencode', + description: 'Amazon Nova Pro - balanced performance', + supportsTools: true, + supportsVision: true, + tier: 'standard', + }, + // Amazon Bedrock - Meta Llama Models + { + id: 'amazon-bedrock/meta.llama4-maverick-17b-instruct-v1:0', + name: 'Llama 4 Maverick 17B (Bedrock)', + modelString: 'amazon-bedrock/meta.llama4-maverick-17b-instruct-v1:0', + provider: 'opencode', + description: 'Meta Llama 4 Maverick via AWS Bedrock', + supportsTools: true, + supportsVision: false, + tier: 'standard', + }, + // Amazon Bedrock - Qwen Models + { + id: 'amazon-bedrock/qwen.qwen3-coder-480b-a35b-v1:0', + name: 'Qwen3 Coder 480B (Bedrock)', + modelString: 'amazon-bedrock/qwen.qwen3-coder-480b-a35b-v1:0', + provider: 'opencode', + description: 'Qwen3 Coder 480B - excellent for coding', + supportsTools: true, + supportsVision: false, + tier: 'premium', + }, + ]; + } + + // ========================================================================== + // Feature Support + // ========================================================================== + + /** + * Check if a feature is supported by OpenCode + * + * Supported features: + * - tools: Function calling / tool use + * - text: Text generation + * - vision: Image understanding + */ + supportsFeature(feature: string): boolean { + const supportedFeatures = ['tools', 'text', 'vision']; + return supportedFeatures.includes(feature); + } + + // ========================================================================== + // Authentication + // ========================================================================== + + /** + * Check authentication status for OpenCode CLI + * + * Checks for authentication via: + * - OAuth token in auth file + * - API key in auth file + */ + async checkAuth(): Promise { + const authIndicators = await getOpenCodeAuthIndicators(); + + // Check for OAuth token + if (authIndicators.hasOAuthToken) { + return { + authenticated: true, + method: 'oauth', + hasOAuthToken: true, + hasApiKey: authIndicators.hasApiKey, + }; + } + + // Check for API key + if (authIndicators.hasApiKey) { + return { + authenticated: true, + method: 'api_key', + hasOAuthToken: false, + hasApiKey: true, + }; + } + + return { + authenticated: false, + method: 'none', + hasOAuthToken: false, + hasApiKey: false, + }; + } + + // ========================================================================== + // Installation Detection + // ========================================================================== + + /** + * Detect OpenCode installation status + * + * Checks if the opencode CLI is available either through: + * - Direct installation (npm global) + * - NPX (fallback on Windows) + * Also checks authentication status. + */ + async detectInstallation(): Promise { + this.ensureCliDetected(); + + const installed = await this.isInstalled(); + const auth = await this.checkAuth(); + + return { + installed, + path: this.cliPath || undefined, + method: this.detectedStrategy === 'npx' ? 'npm' : 'cli', + authenticated: auth.authenticated, + hasApiKey: auth.hasApiKey, + hasOAuthToken: auth.hasOAuthToken, + }; + } +} diff --git a/apps/server/src/providers/provider-factory.ts b/apps/server/src/providers/provider-factory.ts index 25eb7bd0..c2a18120 100644 --- a/apps/server/src/providers/provider-factory.ts +++ b/apps/server/src/providers/provider-factory.ts @@ -7,7 +7,27 @@ import { BaseProvider } from './base-provider.js'; import type { InstallationStatus, ModelDefinition } from './types.js'; -import { isCursorModel, type ModelProvider } from '@automaker/types'; +import { isCursorModel, isCodexModel, isOpencodeModel, type ModelProvider } from '@automaker/types'; +import * as fs from 'fs'; +import * as path from 'path'; + +const DISCONNECTED_MARKERS: Record = { + claude: '.claude-disconnected', + codex: '.codex-disconnected', + cursor: '.cursor-disconnected', + opencode: '.opencode-disconnected', +}; + +/** + * Check if a provider CLI is disconnected from the app + */ +export function isProviderDisconnected(providerName: string): boolean { + const markerFile = DISCONNECTED_MARKERS[providerName.toLowerCase()]; + if (!markerFile) return false; + + const markerPath = path.join(process.cwd(), '.automaker', markerFile); + return fs.existsSync(markerPath); +} /** * Provider registration entry @@ -75,10 +95,26 @@ export class ProviderFactory { * Get the appropriate provider for a given model ID * * @param modelId Model identifier (e.g., "claude-opus-4-5-20251101", "cursor-gpt-4o", "cursor-auto") + * @param options Optional settings + * @param options.throwOnDisconnected Throw error if provider is disconnected (default: true) * @returns Provider instance for the model + * @throws Error if provider is disconnected and throwOnDisconnected is true */ - static getProviderForModel(modelId: string): BaseProvider { - const providerName = this.getProviderNameForModel(modelId); + static getProviderForModel( + modelId: string, + options: { throwOnDisconnected?: boolean } = {} + ): BaseProvider { + const { throwOnDisconnected = true } = options; + const providerName = this.getProviderForModelName(modelId); + + // Check if provider is disconnected + if (throwOnDisconnected && isProviderDisconnected(providerName)) { + throw new Error( + `${providerName.charAt(0).toUpperCase() + providerName.slice(1)} CLI is disconnected from the app. ` + + `Please go to Settings > Providers and click "Sign In" to reconnect.` + ); + } + const provider = this.getProviderByName(providerName); if (!provider) { @@ -93,6 +129,35 @@ export class ProviderFactory { return provider; } + /** + * Get the provider name for a given model ID (without creating provider instance) + */ + static getProviderForModelName(modelId: string): string { + const lowerModel = modelId.toLowerCase(); + + // Get all registered providers sorted by priority (descending) + const registrations = Array.from(providerRegistry.entries()).sort( + ([, a], [, b]) => (b.priority ?? 0) - (a.priority ?? 0) + ); + + // Check each provider's canHandleModel function + for (const [name, reg] of registrations) { + if (reg.canHandleModel?.(lowerModel)) { + return name; + } + } + + // Fallback: Check for explicit prefixes + for (const [name] of registrations) { + if (lowerModel.startsWith(`${name}-`)) { + return name; + } + } + + // Default to claude (first registered provider or claude) + return 'claude'; + } + /** * Get all available providers */ @@ -156,6 +221,41 @@ export class ProviderFactory { static getRegisteredProviderNames(): string[] { return Array.from(providerRegistry.keys()); } + + /** + * Check if a specific model supports vision/image input + * + * @param modelId Model identifier + * @returns Whether the model supports vision (defaults to true if model not found) + */ + static modelSupportsVision(modelId: string): boolean { + const provider = this.getProviderForModel(modelId); + const models = provider.getAvailableModels(); + + // Find the model in the available models list + for (const model of models) { + if ( + model.id === modelId || + model.modelString === modelId || + model.id.endsWith(`-${modelId}`) || + model.modelString.endsWith(`-${modelId}`) || + model.modelString === modelId.replace(/^(claude|cursor|codex)-/, '') || + model.modelString === modelId.replace(/-(claude|cursor|codex)$/, '') + ) { + return model.supportsVision ?? true; + } + } + + // Also try exact match with model string from provider's model map + for (const model of models) { + if (model.modelString === modelId || model.id === modelId) { + return model.supportsVision ?? true; + } + } + + // Default to true (Claude SDK supports vision by default) + return true; + } } // ============================================================================= @@ -165,6 +265,8 @@ export class ProviderFactory { // Import providers for registration side-effects import { ClaudeProvider } from './claude-provider.js'; import { CursorProvider } from './cursor-provider.js'; +import { CodexProvider } from './codex-provider.js'; +import { OpencodeProvider } from './opencode-provider.js'; // Register Claude provider registerProvider('claude', { @@ -184,3 +286,18 @@ registerProvider('cursor', { canHandleModel: (model: string) => isCursorModel(model), priority: 10, // Higher priority - check Cursor models first }); + +// Register Codex provider +registerProvider('codex', { + factory: () => new CodexProvider(), + aliases: ['openai'], + canHandleModel: (model: string) => isCodexModel(model), + priority: 5, // Medium priority - check after Cursor but before Claude +}); + +// Register OpenCode provider +registerProvider('opencode', { + factory: () => new OpencodeProvider(), + canHandleModel: (model: string) => isOpencodeModel(model), + priority: 3, // Between codex (5) and claude (0) +}); diff --git a/apps/server/src/routes/app-spec/generate-features-from-spec.ts b/apps/server/src/routes/app-spec/generate-features-from-spec.ts index a621c908..d89e5eff 100644 --- a/apps/server/src/routes/app-spec/generate-features-from-spec.ts +++ b/apps/server/src/routes/app-spec/generate-features-from-spec.ts @@ -9,7 +9,7 @@ import { query } from '@anthropic-ai/claude-agent-sdk'; import * as secureFs from '../../lib/secure-fs.js'; import type { EventEmitter } from '../../lib/events.js'; import { createLogger } from '@automaker/utils'; -import { DEFAULT_PHASE_MODELS, isCursorModel } from '@automaker/types'; +import { DEFAULT_PHASE_MODELS, isCursorModel, stripProviderPrefix } from '@automaker/types'; import { resolvePhaseModel } from '@automaker/model-resolver'; import { createFeatureGenerationOptions } from '../../lib/sdk-options.js'; import { ProviderFactory } from '../../providers/provider-factory.js'; @@ -124,6 +124,8 @@ IMPORTANT: Do not ask for clarification. The specification is provided above. Ge logger.info('[FeatureGeneration] Using Cursor provider'); const provider = ProviderFactory.getProviderForModel(model); + // Strip provider prefix - providers expect bare model IDs + const bareModel = stripProviderPrefix(model); // Add explicit instructions for Cursor to return JSON in response const cursorPrompt = `${prompt} @@ -135,7 +137,7 @@ CRITICAL INSTRUCTIONS: for await (const msg of provider.executeQuery({ prompt: cursorPrompt, - model, + model: bareModel, cwd: projectPath, maxTurns: 250, allowedTools: ['Read', 'Glob', 'Grep'], diff --git a/apps/server/src/routes/app-spec/generate-spec.ts b/apps/server/src/routes/app-spec/generate-spec.ts index a0a11514..fe293da2 100644 --- a/apps/server/src/routes/app-spec/generate-spec.ts +++ b/apps/server/src/routes/app-spec/generate-spec.ts @@ -16,7 +16,7 @@ import { type SpecOutput, } from '../../lib/app-spec-format.js'; import { createLogger } from '@automaker/utils'; -import { DEFAULT_PHASE_MODELS, isCursorModel } from '@automaker/types'; +import { DEFAULT_PHASE_MODELS, isCursorModel, stripProviderPrefix } from '@automaker/types'; import { resolvePhaseModel } from '@automaker/model-resolver'; import { createSpecGenerationOptions } from '../../lib/sdk-options.js'; import { extractJson } from '../../lib/json-extractor.js'; @@ -118,6 +118,8 @@ ${getStructuredSpecPromptInstruction()}`; logger.info('[SpecGeneration] Using Cursor provider'); const provider = ProviderFactory.getProviderForModel(model); + // Strip provider prefix - providers expect bare model IDs + const bareModel = stripProviderPrefix(model); // For Cursor, include the JSON schema in the prompt with clear instructions // to return JSON in the response (not write to a file) @@ -134,7 +136,7 @@ Your entire response should be valid JSON starting with { and ending with }. No for await (const msg of provider.executeQuery({ prompt: cursorPrompt, - model, + model: bareModel, cwd: projectPath, maxTurns: 250, allowedTools: ['Read', 'Glob', 'Grep'], diff --git a/apps/server/src/routes/auth/index.ts b/apps/server/src/routes/auth/index.ts index 575000a8..e4ff2c45 100644 --- a/apps/server/src/routes/auth/index.ts +++ b/apps/server/src/routes/auth/index.ts @@ -229,12 +229,13 @@ export function createAuthRoutes(): Router { await invalidateSession(sessionToken); } - // Clear the cookie - res.clearCookie(cookieName, { - httpOnly: true, - secure: process.env.NODE_ENV === 'production', - sameSite: 'strict', - path: '/', + // Clear the cookie by setting it to empty with immediate expiration + // Using res.cookie() with maxAge: 0 is more reliable than clearCookie() + // in cross-origin development environments + res.cookie(cookieName, '', { + ...getSessionCookieOptions(), + maxAge: 0, + expires: new Date(0), }); res.json({ diff --git a/apps/server/src/routes/auto-mode/routes/follow-up-feature.ts b/apps/server/src/routes/auto-mode/routes/follow-up-feature.ts index 1ed14c39..bd9c480d 100644 --- a/apps/server/src/routes/auto-mode/routes/follow-up-feature.ts +++ b/apps/server/src/routes/auto-mode/routes/follow-up-feature.ts @@ -31,7 +31,9 @@ export function createFollowUpFeatureHandler(autoModeService: AutoModeService) { // Start follow-up in background // followUpFeature derives workDir from feature.branchName autoModeService - .followUpFeature(projectPath, featureId, prompt, imagePaths, useWorktrees ?? true) + // Default to false to match run-feature/resume-feature behavior. + // Worktrees should only be used when explicitly enabled by the user. + .followUpFeature(projectPath, featureId, prompt, imagePaths, useWorktrees ?? false) .catch((error) => { logger.error(`[AutoMode] Follow up feature ${featureId} error:`, error); }) diff --git a/apps/server/src/routes/backlog-plan/generate-plan.ts b/apps/server/src/routes/backlog-plan/generate-plan.ts index eb7110eb..d8235e50 100644 --- a/apps/server/src/routes/backlog-plan/generate-plan.ts +++ b/apps/server/src/routes/backlog-plan/generate-plan.ts @@ -7,7 +7,12 @@ import type { EventEmitter } from '../../lib/events.js'; import type { Feature, BacklogPlanResult, BacklogChange, DependencyUpdate } from '@automaker/types'; -import { DEFAULT_PHASE_MODELS, isCursorModel, type ThinkingLevel } from '@automaker/types'; +import { + DEFAULT_PHASE_MODELS, + isCursorModel, + stripProviderPrefix, + type ThinkingLevel, +} from '@automaker/types'; import { resolvePhaseModel } from '@automaker/model-resolver'; import { FeatureLoader } from '../../services/feature-loader.js'; import { ProviderFactory } from '../../providers/provider-factory.js'; @@ -120,6 +125,8 @@ export async function generateBacklogPlan( logger.info('[BacklogPlan] Using model:', effectiveModel); const provider = ProviderFactory.getProviderForModel(effectiveModel); + // Strip provider prefix - providers expect bare model IDs + const bareModel = stripProviderPrefix(effectiveModel); // Get autoLoadClaudeMd setting const autoLoadClaudeMd = await getAutoLoadClaudeMdSetting( @@ -151,7 +158,7 @@ ${userPrompt}`; // Execute the query const stream = provider.executeQuery({ prompt: finalPrompt, - model: effectiveModel, + model: bareModel, cwd: projectPath, systemPrompt: finalSystemPrompt, maxTurns: 1, diff --git a/apps/server/src/routes/claude/index.ts b/apps/server/src/routes/claude/index.ts index 239499f9..20816bbc 100644 --- a/apps/server/src/routes/claude/index.ts +++ b/apps/server/src/routes/claude/index.ts @@ -13,7 +13,10 @@ export function createClaudeRoutes(service: ClaudeUsageService): Router { // Check if Claude CLI is available first const isAvailable = await service.isAvailable(); if (!isAvailable) { - res.status(503).json({ + // IMPORTANT: This endpoint is behind Automaker session auth already. + // Use a 200 + error payload for Claude CLI issues so the UI doesn't + // interpret it as an invalid Automaker session (401/403 triggers logout). + res.status(200).json({ error: 'Claude CLI not found', message: "Please install Claude Code CLI and run 'claude login' to authenticate", }); @@ -26,12 +29,13 @@ export function createClaudeRoutes(service: ClaudeUsageService): Router { const message = error instanceof Error ? error.message : 'Unknown error'; if (message.includes('Authentication required') || message.includes('token_expired')) { - res.status(401).json({ + // Do NOT use 401/403 here: that status code is reserved for Automaker session auth. + res.status(200).json({ error: 'Authentication required', message: "Please run 'claude login' to authenticate", }); } else if (message.includes('timed out')) { - res.status(504).json({ + res.status(200).json({ error: 'Command timed out', message: 'The Claude CLI took too long to respond', }); diff --git a/apps/server/src/routes/codex/index.ts b/apps/server/src/routes/codex/index.ts new file mode 100644 index 00000000..4a2db951 --- /dev/null +++ b/apps/server/src/routes/codex/index.ts @@ -0,0 +1,56 @@ +import { Router, Request, Response } from 'express'; +import { CodexUsageService } from '../../services/codex-usage-service.js'; +import { createLogger } from '@automaker/utils'; + +const logger = createLogger('Codex'); + +export function createCodexRoutes(service: CodexUsageService): Router { + const router = Router(); + + // Get current usage (attempts to fetch from Codex CLI) + router.get('/usage', async (req: Request, res: Response) => { + try { + // Check if Codex CLI is available first + const isAvailable = await service.isAvailable(); + if (!isAvailable) { + // IMPORTANT: This endpoint is behind Automaker session auth already. + // Use a 200 + error payload for Codex CLI issues so the UI doesn't + // interpret it as an invalid Automaker session (401/403 triggers logout). + res.status(200).json({ + error: 'Codex CLI not found', + message: "Please install Codex CLI and run 'codex login' to authenticate", + }); + return; + } + + const usage = await service.fetchUsageData(); + res.json(usage); + } catch (error) { + const message = error instanceof Error ? error.message : 'Unknown error'; + + if (message.includes('not authenticated') || message.includes('login')) { + // Do NOT use 401/403 here: that status code is reserved for Automaker session auth. + res.status(200).json({ + error: 'Authentication required', + message: "Please run 'codex login' to authenticate", + }); + } else if (message.includes('not available') || message.includes('does not provide')) { + // This is the expected case - Codex doesn't provide usage stats + res.status(200).json({ + error: 'Usage statistics not available', + message: message, + }); + } else if (message.includes('timed out')) { + res.status(200).json({ + error: 'Command timed out', + message: 'The Codex CLI took too long to respond', + }); + } else { + logger.error('Error fetching usage:', error); + res.status(500).json({ error: message }); + } + } + }); + + return router; +} diff --git a/apps/server/src/routes/context/routes/describe-file.ts b/apps/server/src/routes/context/routes/describe-file.ts index 8ecb60fd..1e312ff3 100644 --- a/apps/server/src/routes/context/routes/describe-file.ts +++ b/apps/server/src/routes/context/routes/describe-file.ts @@ -13,7 +13,7 @@ import type { Request, Response } from 'express'; import { query } from '@anthropic-ai/claude-agent-sdk'; import { createLogger } from '@automaker/utils'; -import { DEFAULT_PHASE_MODELS, isCursorModel } from '@automaker/types'; +import { DEFAULT_PHASE_MODELS, isCursorModel, stripProviderPrefix } from '@automaker/types'; import { PathNotAllowedError } from '@automaker/platform'; import { resolvePhaseModel } from '@automaker/model-resolver'; import { createCustomOptions } from '../../../lib/sdk-options.js'; @@ -198,6 +198,8 @@ File: ${fileName}${truncated ? ' (truncated)' : ''}`; logger.info(`Using Cursor provider for model: ${model}`); const provider = ProviderFactory.getProviderForModel(model); + // Strip provider prefix - providers expect bare model IDs + const bareModel = stripProviderPrefix(model); // Build a simple text prompt for Cursor (no multi-part content blocks) const cursorPrompt = `${instructionText}\n\n--- FILE CONTENT ---\n${contentToAnalyze}`; @@ -205,7 +207,7 @@ File: ${fileName}${truncated ? ' (truncated)' : ''}`; let responseText = ''; for await (const msg of provider.executeQuery({ prompt: cursorPrompt, - model, + model: bareModel, cwd, maxTurns: 1, allowedTools: [], @@ -232,7 +234,6 @@ File: ${fileName}${truncated ? ' (truncated)' : ''}`; maxTurns: 1, allowedTools: [], autoLoadClaudeMd, - sandbox: { enabled: true, autoAllowBashIfSandboxed: true }, thinkingLevel, // Pass thinking level for extended thinking }); diff --git a/apps/server/src/routes/context/routes/describe-image.ts b/apps/server/src/routes/context/routes/describe-image.ts index 4b4c281d..0ff8e143 100644 --- a/apps/server/src/routes/context/routes/describe-image.ts +++ b/apps/server/src/routes/context/routes/describe-image.ts @@ -14,7 +14,7 @@ import type { Request, Response } from 'express'; import { query } from '@anthropic-ai/claude-agent-sdk'; import { createLogger, readImageAsBase64 } from '@automaker/utils'; -import { DEFAULT_PHASE_MODELS, isCursorModel } from '@automaker/types'; +import { DEFAULT_PHASE_MODELS, isCursorModel, stripProviderPrefix } from '@automaker/types'; import { resolvePhaseModel } from '@automaker/model-resolver'; import { createCustomOptions } from '../../../lib/sdk-options.js'; import { ProviderFactory } from '../../../providers/provider-factory.js'; @@ -357,6 +357,8 @@ export function createDescribeImageHandler( logger.info(`[${requestId}] Using Cursor provider for model: ${model}`); const provider = ProviderFactory.getProviderForModel(model); + // Strip provider prefix - providers expect bare model IDs + const bareModel = stripProviderPrefix(model); // Build prompt with image reference for Cursor // Note: Cursor CLI may not support base64 image blocks directly, @@ -367,7 +369,7 @@ export function createDescribeImageHandler( const queryStart = Date.now(); for await (const msg of provider.executeQuery({ prompt: cursorPrompt, - model, + model: bareModel, cwd, maxTurns: 1, allowedTools: ['Read'], // Allow Read tool so Cursor can read the image if needed @@ -394,14 +396,13 @@ export function createDescribeImageHandler( maxTurns: 1, allowedTools: [], autoLoadClaudeMd, - sandbox: { enabled: true, autoAllowBashIfSandboxed: true }, thinkingLevel, // Pass thinking level for extended thinking }); logger.info( `[${requestId}] SDK options model=${sdkOptions.model} maxTurns=${sdkOptions.maxTurns} allowedTools=${JSON.stringify( sdkOptions.allowedTools - )} sandbox=${JSON.stringify(sdkOptions.sandbox)}` + )}` ); const promptGenerator = (async function* () { diff --git a/apps/server/src/routes/enhance-prompt/routes/enhance.ts b/apps/server/src/routes/enhance-prompt/routes/enhance.ts index 2604726c..4c3a9da4 100644 --- a/apps/server/src/routes/enhance-prompt/routes/enhance.ts +++ b/apps/server/src/routes/enhance-prompt/routes/enhance.ts @@ -12,6 +12,7 @@ import { resolveModelString } from '@automaker/model-resolver'; import { CLAUDE_MODEL_MAP, isCursorModel, + stripProviderPrefix, ThinkingLevel, getThinkingTokenBudget, } from '@automaker/types'; @@ -98,12 +99,14 @@ async function extractTextFromStream( */ async function executeWithCursor(prompt: string, model: string): Promise { const provider = ProviderFactory.getProviderForModel(model); + // Strip provider prefix - providers expect bare model IDs + const bareModel = stripProviderPrefix(model); let responseText = ''; for await (const msg of provider.executeQuery({ prompt, - model, + model: bareModel, cwd: process.cwd(), // Enhancement doesn't need a specific working directory readOnly: true, // Prompt enhancement only generates text, doesn't write files })) { diff --git a/apps/server/src/routes/features/routes/update.ts b/apps/server/src/routes/features/routes/update.ts index 830fb21a..2e960a62 100644 --- a/apps/server/src/routes/features/routes/update.ts +++ b/apps/server/src/routes/features/routes/update.ts @@ -10,11 +10,14 @@ import { getErrorMessage, logError } from '../common.js'; export function createUpdateHandler(featureLoader: FeatureLoader) { return async (req: Request, res: Response): Promise => { try { - const { projectPath, featureId, updates } = req.body as { - projectPath: string; - featureId: string; - updates: Partial; - }; + const { projectPath, featureId, updates, descriptionHistorySource, enhancementMode } = + req.body as { + projectPath: string; + featureId: string; + updates: Partial; + descriptionHistorySource?: 'enhance' | 'edit'; + enhancementMode?: 'improve' | 'technical' | 'simplify' | 'acceptance'; + }; if (!projectPath || !featureId || !updates) { res.status(400).json({ @@ -24,7 +27,13 @@ export function createUpdateHandler(featureLoader: FeatureLoader) { return; } - const updated = await featureLoader.update(projectPath, featureId, updates); + const updated = await featureLoader.update( + projectPath, + featureId, + updates, + descriptionHistorySource, + enhancementMode + ); res.json({ success: true, feature: updated }); } catch (error) { logError(error, 'Update feature failed'); diff --git a/apps/server/src/routes/github/routes/validate-issue.ts b/apps/server/src/routes/github/routes/validate-issue.ts index 9c65d330..237036ae 100644 --- a/apps/server/src/routes/github/routes/validate-issue.ts +++ b/apps/server/src/routes/github/routes/validate-issue.ts @@ -18,7 +18,7 @@ import type { LinkedPRInfo, ThinkingLevel, } from '@automaker/types'; -import { isCursorModel, DEFAULT_PHASE_MODELS } from '@automaker/types'; +import { isCursorModel, DEFAULT_PHASE_MODELS, stripProviderPrefix } from '@automaker/types'; import { resolvePhaseModel } from '@automaker/model-resolver'; import { createSuggestionsOptions } from '../../../lib/sdk-options.js'; import { extractJson } from '../../../lib/json-extractor.js'; @@ -120,6 +120,8 @@ async function runValidation( logger.info(`Using Cursor provider for validation with model: ${model}`); const provider = ProviderFactory.getProviderForModel(model); + // Strip provider prefix - providers expect bare model IDs + const bareModel = stripProviderPrefix(model); // For Cursor, include the system prompt and schema in the user prompt const cursorPrompt = `${ISSUE_VALIDATION_SYSTEM_PROMPT} @@ -137,7 +139,7 @@ ${prompt}`; for await (const msg of provider.executeQuery({ prompt: cursorPrompt, - model, + model: bareModel, cwd: projectPath, readOnly: true, // Issue validation only reads code, doesn't write })) { diff --git a/apps/server/src/routes/settings/index.ts b/apps/server/src/routes/settings/index.ts index cc164856..6f6f6d40 100644 --- a/apps/server/src/routes/settings/index.ts +++ b/apps/server/src/routes/settings/index.ts @@ -23,6 +23,7 @@ import { createGetProjectHandler } from './routes/get-project.js'; import { createUpdateProjectHandler } from './routes/update-project.js'; import { createMigrateHandler } from './routes/migrate.js'; import { createStatusHandler } from './routes/status.js'; +import { createDiscoverAgentsHandler } from './routes/discover-agents.js'; /** * Create settings router with all endpoints @@ -39,6 +40,7 @@ import { createStatusHandler } from './routes/status.js'; * - POST /project - Get project settings (requires projectPath in body) * - PUT /project - Update project settings * - POST /migrate - Migrate settings from localStorage + * - POST /agents/discover - Discover filesystem agents from .claude/agents/ (read-only) * * @param settingsService - Instance of SettingsService for file I/O * @returns Express Router configured with all settings endpoints @@ -72,5 +74,8 @@ export function createSettingsRoutes(settingsService: SettingsService): Router { // Migration from localStorage router.post('/migrate', createMigrateHandler(settingsService)); + // Filesystem agents discovery (read-only) + router.post('/agents/discover', createDiscoverAgentsHandler()); + return router; } diff --git a/apps/server/src/routes/settings/routes/discover-agents.ts b/apps/server/src/routes/settings/routes/discover-agents.ts new file mode 100644 index 00000000..aee4a2a2 --- /dev/null +++ b/apps/server/src/routes/settings/routes/discover-agents.ts @@ -0,0 +1,61 @@ +/** + * Discover Agents Route - Returns filesystem-based agents from .claude/agents/ + * + * Scans both user-level (~/.claude/agents/) and project-level (.claude/agents/) + * directories for AGENT.md files and returns parsed agent definitions. + */ + +import type { Request, Response } from 'express'; +import { discoverFilesystemAgents } from '../../../lib/agent-discovery.js'; +import { createLogger } from '@automaker/utils'; + +const logger = createLogger('DiscoverAgentsRoute'); + +interface DiscoverAgentsRequest { + projectPath?: string; + sources?: Array<'user' | 'project'>; +} + +/** + * Create handler for discovering filesystem agents + * + * POST /api/settings/agents/discover + * Body: { projectPath?: string, sources?: ['user', 'project'] } + * + * Returns: + * { + * success: true, + * agents: Array<{ + * name: string, + * definition: AgentDefinition, + * source: 'user' | 'project', + * filePath: string + * }> + * } + */ +export function createDiscoverAgentsHandler() { + return async (req: Request, res: Response) => { + try { + const { projectPath, sources = ['user', 'project'] } = req.body as DiscoverAgentsRequest; + + logger.info( + `Discovering agents from sources: ${sources.join(', ')}${projectPath ? ` (project: ${projectPath})` : ''}` + ); + + const agents = await discoverFilesystemAgents(projectPath, sources); + + logger.info(`Discovered ${agents.length} filesystem agents`); + + res.json({ + success: true, + agents, + }); + } catch (error) { + logger.error('Failed to discover agents:', error); + res.status(500).json({ + success: false, + error: error instanceof Error ? error.message : 'Failed to discover agents', + }); + } + }; +} diff --git a/apps/server/src/routes/settings/routes/update-global.ts b/apps/server/src/routes/settings/routes/update-global.ts index 6072f237..aafbc5b1 100644 --- a/apps/server/src/routes/settings/routes/update-global.ts +++ b/apps/server/src/routes/settings/routes/update-global.ts @@ -11,7 +11,7 @@ import type { Request, Response } from 'express'; import type { SettingsService } from '../../../services/settings-service.js'; import type { GlobalSettings } from '../../../types/settings.js'; -import { getErrorMessage, logError } from '../common.js'; +import { getErrorMessage, logError, logger } from '../common.js'; /** * Create handler factory for PUT /api/settings/global @@ -32,6 +32,18 @@ export function createUpdateGlobalHandler(settingsService: SettingsService) { return; } + // Minimal debug logging to help diagnose accidental wipes. + if ('projects' in updates || 'theme' in updates || 'localStorageMigrated' in updates) { + const projectsLen = Array.isArray((updates as any).projects) + ? (updates as any).projects.length + : undefined; + logger.info( + `Update global settings request: projects=${projectsLen ?? 'n/a'}, theme=${ + (updates as any).theme ?? 'n/a' + }, localStorageMigrated=${(updates as any).localStorageMigrated ?? 'n/a'}` + ); + } + const settings = await settingsService.updateGlobalSettings(updates); res.json({ diff --git a/apps/server/src/routes/setup/get-claude-status.ts b/apps/server/src/routes/setup/get-claude-status.ts index 3ddd8ed4..4a3ccaf6 100644 --- a/apps/server/src/routes/setup/get-claude-status.ts +++ b/apps/server/src/routes/setup/get-claude-status.ts @@ -6,9 +6,24 @@ import { exec } from 'child_process'; import { promisify } from 'util'; import { getClaudeCliPaths, getClaudeAuthIndicators, systemPathAccess } from '@automaker/platform'; import { getApiKey } from './common.js'; +import * as fs from 'fs'; +import * as path from 'path'; const execAsync = promisify(exec); +const DISCONNECTED_MARKER_FILE = '.claude-disconnected'; + +function isDisconnectedFromApp(): boolean { + try { + // Check if we're in a project directory + const projectRoot = process.cwd(); + const markerPath = path.join(projectRoot, '.automaker', DISCONNECTED_MARKER_FILE); + return fs.existsSync(markerPath); + } catch { + return false; + } +} + export async function getClaudeStatus() { let installed = false; let version = ''; @@ -60,6 +75,30 @@ export async function getClaudeStatus() { } } + // Check if user has manually disconnected from the app + if (isDisconnectedFromApp()) { + return { + status: installed ? 'installed' : 'not_installed', + installed, + method, + version, + path: cliPath, + auth: { + authenticated: false, + method: 'none', + hasCredentialsFile: false, + hasToken: false, + hasStoredOAuthToken: false, + hasStoredApiKey: false, + hasEnvApiKey: false, + oauthTokenValid: false, + apiKeyValid: false, + hasCliAuth: false, + hasRecentActivity: false, + }, + }; + } + // Check authentication - detect all possible auth methods // Note: apiKeys.anthropic_oauth_token stores OAuth tokens from subscription auth // apiKeys.anthropic stores direct API keys for pay-per-use diff --git a/apps/server/src/routes/setup/index.ts b/apps/server/src/routes/setup/index.ts index 6c9f42a2..fe38a14e 100644 --- a/apps/server/src/routes/setup/index.ts +++ b/apps/server/src/routes/setup/index.ts @@ -11,8 +11,19 @@ import { createDeleteApiKeyHandler } from './routes/delete-api-key.js'; import { createApiKeysHandler } from './routes/api-keys.js'; import { createPlatformHandler } from './routes/platform.js'; import { createVerifyClaudeAuthHandler } from './routes/verify-claude-auth.js'; +import { createVerifyCodexAuthHandler } from './routes/verify-codex-auth.js'; import { createGhStatusHandler } from './routes/gh-status.js'; import { createCursorStatusHandler } from './routes/cursor-status.js'; +import { createCodexStatusHandler } from './routes/codex-status.js'; +import { createInstallCodexHandler } from './routes/install-codex.js'; +import { createAuthCodexHandler } from './routes/auth-codex.js'; +import { createAuthCursorHandler } from './routes/auth-cursor.js'; +import { createDeauthClaudeHandler } from './routes/deauth-claude.js'; +import { createDeauthCodexHandler } from './routes/deauth-codex.js'; +import { createDeauthCursorHandler } from './routes/deauth-cursor.js'; +import { createAuthOpencodeHandler } from './routes/auth-opencode.js'; +import { createDeauthOpencodeHandler } from './routes/deauth-opencode.js'; +import { createOpencodeStatusHandler } from './routes/opencode-status.js'; import { createGetCursorConfigHandler, createSetCursorDefaultModelHandler, @@ -30,15 +41,30 @@ export function createSetupRoutes(): Router { router.get('/claude-status', createClaudeStatusHandler()); router.post('/install-claude', createInstallClaudeHandler()); router.post('/auth-claude', createAuthClaudeHandler()); + router.post('/deauth-claude', createDeauthClaudeHandler()); router.post('/store-api-key', createStoreApiKeyHandler()); router.post('/delete-api-key', createDeleteApiKeyHandler()); router.get('/api-keys', createApiKeysHandler()); router.get('/platform', createPlatformHandler()); router.post('/verify-claude-auth', createVerifyClaudeAuthHandler()); + router.post('/verify-codex-auth', createVerifyCodexAuthHandler()); router.get('/gh-status', createGhStatusHandler()); // Cursor CLI routes router.get('/cursor-status', createCursorStatusHandler()); + router.post('/auth-cursor', createAuthCursorHandler()); + router.post('/deauth-cursor', createDeauthCursorHandler()); + + // Codex CLI routes + router.get('/codex-status', createCodexStatusHandler()); + router.post('/install-codex', createInstallCodexHandler()); + router.post('/auth-codex', createAuthCodexHandler()); + router.post('/deauth-codex', createDeauthCodexHandler()); + + // OpenCode CLI routes + router.get('/opencode-status', createOpencodeStatusHandler()); + router.post('/auth-opencode', createAuthOpencodeHandler()); + router.post('/deauth-opencode', createDeauthOpencodeHandler()); router.get('/cursor-config', createGetCursorConfigHandler()); router.post('/cursor-config/default-model', createSetCursorDefaultModelHandler()); router.post('/cursor-config/models', createSetCursorModelsHandler()); diff --git a/apps/server/src/routes/setup/routes/api-keys.ts b/apps/server/src/routes/setup/routes/api-keys.ts index d052c187..047b6455 100644 --- a/apps/server/src/routes/setup/routes/api-keys.ts +++ b/apps/server/src/routes/setup/routes/api-keys.ts @@ -11,6 +11,7 @@ export function createApiKeysHandler() { res.json({ success: true, hasAnthropicKey: !!getApiKey('anthropic') || !!process.env.ANTHROPIC_API_KEY, + hasOpenaiKey: !!getApiKey('openai') || !!process.env.OPENAI_API_KEY, }); } catch (error) { logError(error, 'Get API keys failed'); diff --git a/apps/server/src/routes/setup/routes/auth-claude.ts b/apps/server/src/routes/setup/routes/auth-claude.ts index 4531501d..97a170f4 100644 --- a/apps/server/src/routes/setup/routes/auth-claude.ts +++ b/apps/server/src/routes/setup/routes/auth-claude.ts @@ -4,19 +4,54 @@ import type { Request, Response } from 'express'; import { getErrorMessage, logError } from '../common.js'; +import { exec } from 'child_process'; +import { promisify } from 'util'; +import * as fs from 'fs'; +import * as path from 'path'; + +const execAsync = promisify(exec); export function createAuthClaudeHandler() { return async (_req: Request, res: Response): Promise => { try { - res.json({ - success: true, - requiresManualAuth: true, - command: 'claude login', - message: "Please run 'claude login' in your terminal to authenticate", - }); + // Remove the disconnected marker file to reconnect the app to the CLI + const markerPath = path.join(process.cwd(), '.automaker', '.claude-disconnected'); + if (fs.existsSync(markerPath)) { + fs.unlinkSync(markerPath); + } + + // Check if CLI is already authenticated by checking auth indicators + const { getClaudeAuthIndicators } = await import('@automaker/platform'); + const indicators = await getClaudeAuthIndicators(); + const isAlreadyAuthenticated = + indicators.hasStatsCacheWithActivity || + (indicators.hasSettingsFile && indicators.hasProjectsSessions) || + indicators.hasCredentialsFile; + + if (isAlreadyAuthenticated) { + // CLI is already authenticated, just reconnect + res.json({ + success: true, + message: 'Claude CLI is now linked with the app', + wasAlreadyAuthenticated: true, + }); + } else { + // CLI needs authentication - but we can't run claude login here + // because it requires browser OAuth. Just reconnect and let the user authenticate if needed. + res.json({ + success: true, + message: + 'Claude CLI is now linked with the app. If prompted, please authenticate with "claude login" in your terminal.', + requiresManualAuth: true, + }); + } } catch (error) { logError(error, 'Auth Claude failed'); - res.status(500).json({ success: false, error: getErrorMessage(error) }); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + message: 'Failed to link Claude CLI with the app', + }); } }; } diff --git a/apps/server/src/routes/setup/routes/auth-codex.ts b/apps/server/src/routes/setup/routes/auth-codex.ts new file mode 100644 index 00000000..79857bd8 --- /dev/null +++ b/apps/server/src/routes/setup/routes/auth-codex.ts @@ -0,0 +1,50 @@ +/** + * POST /auth-codex endpoint - Authenticate Codex CLI + */ + +import type { Request, Response } from 'express'; +import { logError, getErrorMessage } from '../common.js'; +import * as fs from 'fs'; +import * as path from 'path'; + +export function createAuthCodexHandler() { + return async (_req: Request, res: Response): Promise => { + try { + // Remove the disconnected marker file to reconnect the app to the CLI + const markerPath = path.join(process.cwd(), '.automaker', '.codex-disconnected'); + if (fs.existsSync(markerPath)) { + fs.unlinkSync(markerPath); + } + + // Use the same detection logic as the Codex provider + const { getCodexAuthIndicators } = await import('@automaker/platform'); + const indicators = await getCodexAuthIndicators(); + + const isAlreadyAuthenticated = + indicators.hasApiKey || indicators.hasAuthFile || indicators.hasOAuthToken; + + if (isAlreadyAuthenticated) { + // Already has authentication, just reconnect + res.json({ + success: true, + message: 'Codex CLI is now linked with the app', + wasAlreadyAuthenticated: true, + }); + } else { + res.json({ + success: true, + message: + 'Codex CLI is now linked with the app. If prompted, please authenticate with "codex login" in your terminal.', + requiresManualAuth: true, + }); + } + } catch (error) { + logError(error, 'Auth Codex failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + message: 'Failed to link Codex CLI with the app', + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/auth-cursor.ts b/apps/server/src/routes/setup/routes/auth-cursor.ts new file mode 100644 index 00000000..fbd6339c --- /dev/null +++ b/apps/server/src/routes/setup/routes/auth-cursor.ts @@ -0,0 +1,73 @@ +/** + * POST /auth-cursor endpoint - Authenticate Cursor CLI + */ + +import type { Request, Response } from 'express'; +import { logError, getErrorMessage } from '../common.js'; +import * as fs from 'fs'; +import * as path from 'path'; +import os from 'os'; + +export function createAuthCursorHandler() { + return async (_req: Request, res: Response): Promise => { + try { + // Remove the disconnected marker file to reconnect the app to the CLI + const markerPath = path.join(process.cwd(), '.automaker', '.cursor-disconnected'); + if (fs.existsSync(markerPath)) { + fs.unlinkSync(markerPath); + } + + // Check if Cursor is already authenticated using the same logic as CursorProvider + const isAlreadyAuthenticated = (): boolean => { + // Check for API key in environment + if (process.env.CURSOR_API_KEY) { + return true; + } + + // Check for credentials files + const credentialPaths = [ + path.join(os.homedir(), '.cursor', 'credentials.json'), + path.join(os.homedir(), '.config', 'cursor', 'credentials.json'), + ]; + + for (const credPath of credentialPaths) { + if (fs.existsSync(credPath)) { + try { + const content = fs.readFileSync(credPath, 'utf8'); + const creds = JSON.parse(content); + if (creds.accessToken || creds.token) { + return true; + } + } catch { + // Invalid credentials file, continue checking + } + } + } + + return false; + }; + + if (isAlreadyAuthenticated()) { + res.json({ + success: true, + message: 'Cursor CLI is now linked with the app', + wasAlreadyAuthenticated: true, + }); + } else { + res.json({ + success: true, + message: + 'Cursor CLI is now linked with the app. If prompted, please authenticate with "cursor auth" in your terminal.', + requiresManualAuth: true, + }); + } + } catch (error) { + logError(error, 'Auth Cursor failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + message: 'Failed to link Cursor CLI with the app', + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/auth-opencode.ts b/apps/server/src/routes/setup/routes/auth-opencode.ts new file mode 100644 index 00000000..7d7f35e2 --- /dev/null +++ b/apps/server/src/routes/setup/routes/auth-opencode.ts @@ -0,0 +1,51 @@ +/** + * POST /auth-opencode endpoint - Authenticate OpenCode CLI + */ + +import type { Request, Response } from 'express'; +import { logError, getErrorMessage } from '../common.js'; +import { exec } from 'child_process'; +import { promisify } from 'util'; +import * as fs from 'fs'; +import * as path from 'path'; + +const execAsync = promisify(exec); + +export function createAuthOpencodeHandler() { + return async (_req: Request, res: Response): Promise => { + try { + // Remove the disconnected marker file to reconnect the app to the CLI + const markerPath = path.join(process.cwd(), '.automaker', '.opencode-disconnected'); + if (fs.existsSync(markerPath)) { + fs.unlinkSync(markerPath); + } + + // Check if OpenCode is already authenticated + // For OpenCode, check if there's an auth token or API key + const hasApiKey = !!process.env.OPENCODE_API_KEY; + + if (hasApiKey) { + // Already has authentication, just reconnect + res.json({ + success: true, + message: 'OpenCode CLI is now linked with the app', + wasAlreadyAuthenticated: true, + }); + } else { + res.json({ + success: true, + message: + 'OpenCode CLI is now linked with the app. If prompted, please authenticate with OpenCode.', + requiresManualAuth: true, + }); + } + } catch (error) { + logError(error, 'Auth OpenCode failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + message: 'Failed to link OpenCode CLI with the app', + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/codex-status.ts b/apps/server/src/routes/setup/routes/codex-status.ts new file mode 100644 index 00000000..6e721e05 --- /dev/null +++ b/apps/server/src/routes/setup/routes/codex-status.ts @@ -0,0 +1,81 @@ +/** + * GET /codex-status endpoint - Get Codex CLI installation and auth status + */ + +import type { Request, Response } from 'express'; +import { CodexProvider } from '../../../providers/codex-provider.js'; +import { getErrorMessage, logError } from '../common.js'; +import * as fs from 'fs'; +import * as path from 'path'; + +const DISCONNECTED_MARKER_FILE = '.codex-disconnected'; + +function isCodexDisconnectedFromApp(): boolean { + try { + const projectRoot = process.cwd(); + const markerPath = path.join(projectRoot, '.automaker', DISCONNECTED_MARKER_FILE); + return fs.existsSync(markerPath); + } catch { + return false; + } +} + +/** + * Creates handler for GET /api/setup/codex-status + * Returns Codex CLI installation and authentication status + */ +export function createCodexStatusHandler() { + const installCommand = 'npm install -g @openai/codex'; + const loginCommand = 'codex login'; + + return async (_req: Request, res: Response): Promise => { + try { + // Check if user has manually disconnected from the app + if (isCodexDisconnectedFromApp()) { + res.json({ + success: true, + installed: true, + version: null, + path: null, + auth: { + authenticated: false, + method: 'none', + hasApiKey: false, + }, + installCommand, + loginCommand, + }); + return; + } + + const provider = new CodexProvider(); + const status = await provider.detectInstallation(); + + // Derive auth method from authenticated status and API key presence + let authMethod = 'none'; + if (status.authenticated) { + authMethod = status.hasApiKey ? 'api_key_env' : 'cli_authenticated'; + } + + res.json({ + success: true, + installed: status.installed, + version: status.version || null, + path: status.path || null, + auth: { + authenticated: status.authenticated || false, + method: authMethod, + hasApiKey: status.hasApiKey || false, + }, + installCommand, + loginCommand, + }); + } catch (error) { + logError(error, 'Get Codex status failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/cursor-status.ts b/apps/server/src/routes/setup/routes/cursor-status.ts index 10cc50d5..f9349aa7 100644 --- a/apps/server/src/routes/setup/routes/cursor-status.ts +++ b/apps/server/src/routes/setup/routes/cursor-status.ts @@ -5,6 +5,20 @@ import type { Request, Response } from 'express'; import { CursorProvider } from '../../../providers/cursor-provider.js'; import { getErrorMessage, logError } from '../common.js'; +import * as fs from 'fs'; +import * as path from 'path'; + +const DISCONNECTED_MARKER_FILE = '.cursor-disconnected'; + +function isCursorDisconnectedFromApp(): boolean { + try { + const projectRoot = process.cwd(); + const markerPath = path.join(projectRoot, '.automaker', DISCONNECTED_MARKER_FILE); + return fs.existsSync(markerPath); + } catch { + return false; + } +} /** * Creates handler for GET /api/setup/cursor-status @@ -16,6 +30,30 @@ export function createCursorStatusHandler() { return async (_req: Request, res: Response): Promise => { try { + // Check if user has manually disconnected from the app + if (isCursorDisconnectedFromApp()) { + const provider = new CursorProvider(); + const [installed, version] = await Promise.all([ + provider.isInstalled(), + provider.getVersion(), + ]); + const cliPath = installed ? provider.getCliPath() : null; + + res.json({ + success: true, + installed, + version: version || null, + path: cliPath, + auth: { + authenticated: false, + method: 'none', + }, + installCommand, + loginCommand, + }); + return; + } + const provider = new CursorProvider(); const [installed, version, auth] = await Promise.all([ diff --git a/apps/server/src/routes/setup/routes/deauth-claude.ts b/apps/server/src/routes/setup/routes/deauth-claude.ts new file mode 100644 index 00000000..8f3c1930 --- /dev/null +++ b/apps/server/src/routes/setup/routes/deauth-claude.ts @@ -0,0 +1,44 @@ +/** + * POST /deauth-claude endpoint - Sign out from Claude CLI + */ + +import type { Request, Response } from 'express'; +import { getErrorMessage, logError } from '../common.js'; +import * as fs from 'fs'; +import * as path from 'path'; + +export function createDeauthClaudeHandler() { + return async (_req: Request, res: Response): Promise => { + try { + // Create a marker file to indicate the CLI is disconnected from the app + const automakerDir = path.join(process.cwd(), '.automaker'); + const markerPath = path.join(automakerDir, '.claude-disconnected'); + + // Ensure .automaker directory exists + if (!fs.existsSync(automakerDir)) { + fs.mkdirSync(automakerDir, { recursive: true }); + } + + // Create the marker file with timestamp + fs.writeFileSync( + markerPath, + JSON.stringify({ + disconnectedAt: new Date().toISOString(), + message: 'Claude CLI is disconnected from the app', + }) + ); + + res.json({ + success: true, + message: 'Claude CLI is now disconnected from the app', + }); + } catch (error) { + logError(error, 'Deauth Claude failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + message: 'Failed to disconnect Claude CLI from the app', + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/deauth-codex.ts b/apps/server/src/routes/setup/routes/deauth-codex.ts new file mode 100644 index 00000000..f44a6e15 --- /dev/null +++ b/apps/server/src/routes/setup/routes/deauth-codex.ts @@ -0,0 +1,44 @@ +/** + * POST /deauth-codex endpoint - Sign out from Codex CLI + */ + +import type { Request, Response } from 'express'; +import { logError, getErrorMessage } from '../common.js'; +import * as fs from 'fs'; +import * as path from 'path'; + +export function createDeauthCodexHandler() { + return async (_req: Request, res: Response): Promise => { + try { + // Create a marker file to indicate the CLI is disconnected from the app + const automakerDir = path.join(process.cwd(), '.automaker'); + const markerPath = path.join(automakerDir, '.codex-disconnected'); + + // Ensure .automaker directory exists + if (!fs.existsSync(automakerDir)) { + fs.mkdirSync(automakerDir, { recursive: true }); + } + + // Create the marker file with timestamp + fs.writeFileSync( + markerPath, + JSON.stringify({ + disconnectedAt: new Date().toISOString(), + message: 'Codex CLI is disconnected from the app', + }) + ); + + res.json({ + success: true, + message: 'Codex CLI is now disconnected from the app', + }); + } catch (error) { + logError(error, 'Deauth Codex failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + message: 'Failed to disconnect Codex CLI from the app', + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/deauth-cursor.ts b/apps/server/src/routes/setup/routes/deauth-cursor.ts new file mode 100644 index 00000000..303b2006 --- /dev/null +++ b/apps/server/src/routes/setup/routes/deauth-cursor.ts @@ -0,0 +1,44 @@ +/** + * POST /deauth-cursor endpoint - Sign out from Cursor CLI + */ + +import type { Request, Response } from 'express'; +import { logError, getErrorMessage } from '../common.js'; +import * as fs from 'fs'; +import * as path from 'path'; + +export function createDeauthCursorHandler() { + return async (_req: Request, res: Response): Promise => { + try { + // Create a marker file to indicate the CLI is disconnected from the app + const automakerDir = path.join(process.cwd(), '.automaker'); + const markerPath = path.join(automakerDir, '.cursor-disconnected'); + + // Ensure .automaker directory exists + if (!fs.existsSync(automakerDir)) { + fs.mkdirSync(automakerDir, { recursive: true }); + } + + // Create the marker file with timestamp + fs.writeFileSync( + markerPath, + JSON.stringify({ + disconnectedAt: new Date().toISOString(), + message: 'Cursor CLI is disconnected from the app', + }) + ); + + res.json({ + success: true, + message: 'Cursor CLI is now disconnected from the app', + }); + } catch (error) { + logError(error, 'Deauth Cursor failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + message: 'Failed to disconnect Cursor CLI from the app', + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/deauth-opencode.ts b/apps/server/src/routes/setup/routes/deauth-opencode.ts new file mode 100644 index 00000000..b0567bc8 --- /dev/null +++ b/apps/server/src/routes/setup/routes/deauth-opencode.ts @@ -0,0 +1,40 @@ +import type { Request, Response } from 'express'; +import { logError, getErrorMessage } from '../common.js'; +import * as fs from 'fs'; +import * as path from 'path'; + +export function createDeauthOpencodeHandler() { + return async (_req: Request, res: Response): Promise => { + try { + // Create a marker file to indicate the CLI is disconnected from the app + const automakerDir = path.join(process.cwd(), '.automaker'); + const markerPath = path.join(automakerDir, '.opencode-disconnected'); + + // Ensure .automaker directory exists + if (!fs.existsSync(automakerDir)) { + fs.mkdirSync(automakerDir, { recursive: true }); + } + + // Create the marker file with timestamp + fs.writeFileSync( + markerPath, + JSON.stringify({ + disconnectedAt: new Date().toISOString(), + message: 'OpenCode CLI is disconnected from the app', + }) + ); + + res.json({ + success: true, + message: 'OpenCode CLI is now disconnected from the app', + }); + } catch (error) { + logError(error, 'Deauth OpenCode failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + message: 'Failed to disconnect OpenCode CLI from the app', + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/delete-api-key.ts b/apps/server/src/routes/setup/routes/delete-api-key.ts index 0fee1b8b..242425fb 100644 --- a/apps/server/src/routes/setup/routes/delete-api-key.ts +++ b/apps/server/src/routes/setup/routes/delete-api-key.ts @@ -46,13 +46,14 @@ export function createDeleteApiKeyHandler() { // Map provider to env key name const envKeyMap: Record = { anthropic: 'ANTHROPIC_API_KEY', + openai: 'OPENAI_API_KEY', }; const envKey = envKeyMap[provider]; if (!envKey) { res.status(400).json({ success: false, - error: `Unknown provider: ${provider}. Only anthropic is supported.`, + error: `Unknown provider: ${provider}. Only anthropic and openai are supported.`, }); return; } diff --git a/apps/server/src/routes/setup/routes/install-codex.ts b/apps/server/src/routes/setup/routes/install-codex.ts new file mode 100644 index 00000000..ea40e92d --- /dev/null +++ b/apps/server/src/routes/setup/routes/install-codex.ts @@ -0,0 +1,33 @@ +/** + * POST /install-codex endpoint - Install Codex CLI + */ + +import type { Request, Response } from 'express'; +import { logError, getErrorMessage } from '../common.js'; + +/** + * Creates handler for POST /api/setup/install-codex + * Installs Codex CLI (currently returns instructions for manual install) + */ +export function createInstallCodexHandler() { + return async (_req: Request, res: Response): Promise => { + try { + // For now, return manual installation instructions + // In the future, this could potentially trigger npm global install + const installCommand = 'npm install -g @openai/codex'; + + res.json({ + success: true, + message: `Please install Codex CLI manually by running: ${installCommand}`, + requiresManualInstall: true, + installCommand, + }); + } catch (error) { + logError(error, 'Install Codex failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/opencode-status.ts b/apps/server/src/routes/setup/routes/opencode-status.ts new file mode 100644 index 00000000..f474cfb1 --- /dev/null +++ b/apps/server/src/routes/setup/routes/opencode-status.ts @@ -0,0 +1,59 @@ +/** + * GET /opencode-status endpoint - Get OpenCode CLI installation and auth status + */ + +import type { Request, Response } from 'express'; +import { OpencodeProvider } from '../../../providers/opencode-provider.js'; +import { getErrorMessage, logError } from '../common.js'; + +/** + * Creates handler for GET /api/setup/opencode-status + * Returns OpenCode CLI installation and authentication status + */ +export function createOpencodeStatusHandler() { + const installCommand = 'curl -fsSL https://opencode.ai/install | bash'; + const loginCommand = 'opencode auth login'; + + return async (_req: Request, res: Response): Promise => { + try { + const provider = new OpencodeProvider(); + const status = await provider.detectInstallation(); + + // Derive auth method from authenticated status and API key presence + let authMethod = 'none'; + if (status.authenticated) { + authMethod = status.hasApiKey ? 'api_key_env' : 'cli_authenticated'; + } + + res.json({ + success: true, + installed: status.installed, + version: status.version || null, + path: status.path || null, + auth: { + authenticated: status.authenticated || false, + method: authMethod, + hasApiKey: status.hasApiKey || false, + hasEnvApiKey: !!process.env.ANTHROPIC_API_KEY || !!process.env.OPENAI_API_KEY, + hasOAuthToken: status.hasOAuthToken || false, + }, + recommendation: status.installed + ? undefined + : 'Install OpenCode CLI to use multi-provider AI models.', + installCommand, + loginCommand, + installCommands: { + macos: installCommand, + linux: installCommand, + npm: 'npm install -g opencode-ai', + }, + }); + } catch (error) { + logError(error, 'Get OpenCode status failed'); + res.status(500).json({ + success: false, + error: getErrorMessage(error), + }); + } + }; +} diff --git a/apps/server/src/routes/setup/routes/verify-claude-auth.ts b/apps/server/src/routes/setup/routes/verify-claude-auth.ts index c202ff96..df04d462 100644 --- a/apps/server/src/routes/setup/routes/verify-claude-auth.ts +++ b/apps/server/src/routes/setup/routes/verify-claude-auth.ts @@ -7,8 +7,16 @@ import type { Request, Response } from 'express'; import { query } from '@anthropic-ai/claude-agent-sdk'; import { createLogger } from '@automaker/utils'; import { getApiKey } from '../common.js'; +import { + createSecureAuthEnv, + AuthSessionManager, + AuthRateLimiter, + validateApiKey, + createTempEnvOverride, +} from '../../../lib/auth-utils.js'; const logger = createLogger('Setup'); +const rateLimiter = new AuthRateLimiter(); // Known error patterns that indicate auth failure const AUTH_ERROR_PATTERNS = [ @@ -77,6 +85,19 @@ export function createVerifyClaudeAuthHandler() { apiKey?: string; }; + // Rate limiting to prevent abuse + const clientIp = req.ip || req.socket.remoteAddress || 'unknown'; + if (!rateLimiter.canAttempt(clientIp)) { + const resetTime = rateLimiter.getResetTime(clientIp); + res.status(429).json({ + success: false, + authenticated: false, + error: 'Too many authentication attempts. Please try again later.', + resetTime, + }); + return; + } + logger.info( `[Setup] Verifying Claude authentication using method: ${authMethod || 'auto'}${apiKey ? ' (with provided key)' : ''}` ); @@ -89,37 +110,48 @@ export function createVerifyClaudeAuthHandler() { let errorMessage = ''; let receivedAnyContent = false; - // Save original env values - const originalAnthropicKey = process.env.ANTHROPIC_API_KEY; + // Create secure auth session + const sessionId = `claude-auth-${Date.now()}-${Math.random().toString(36).substr(2, 9)}`; try { - // Configure environment based on auth method - if (authMethod === 'cli') { - // For CLI verification, remove any API key so it uses CLI credentials only - delete process.env.ANTHROPIC_API_KEY; - logger.info('[Setup] Cleared API key environment for CLI verification'); - } else if (authMethod === 'api_key') { - // For API key verification, use provided key, stored key, or env var (in order of priority) - if (apiKey) { - // Use the provided API key (allows testing unsaved keys) - process.env.ANTHROPIC_API_KEY = apiKey; - logger.info('[Setup] Using provided API key for verification'); - } else { - const storedApiKey = getApiKey('anthropic'); - if (storedApiKey) { - process.env.ANTHROPIC_API_KEY = storedApiKey; - logger.info('[Setup] Using stored API key for verification'); - } else if (!process.env.ANTHROPIC_API_KEY) { - res.json({ - success: true, - authenticated: false, - error: 'No API key configured. Please enter an API key first.', - }); - return; - } + // For API key verification, validate the key first + if (authMethod === 'api_key' && apiKey) { + const validation = validateApiKey(apiKey, 'anthropic'); + if (!validation.isValid) { + res.json({ + success: true, + authenticated: false, + error: validation.error, + }); + return; } } + // Create secure environment without modifying process.env + const authEnv = createSecureAuthEnv(authMethod || 'api_key', apiKey, 'anthropic'); + + // For API key verification without provided key, use stored key or env var + if (authMethod === 'api_key' && !apiKey) { + const storedApiKey = getApiKey('anthropic'); + if (storedApiKey) { + authEnv.ANTHROPIC_API_KEY = storedApiKey; + logger.info('[Setup] Using stored API key for verification'); + } else if (!authEnv.ANTHROPIC_API_KEY) { + res.json({ + success: true, + authenticated: false, + error: 'No API key configured. Please enter an API key first.', + }); + return; + } + } + + // Store the secure environment in session manager + AuthSessionManager.createSession(sessionId, authMethod || 'api_key', apiKey, 'anthropic'); + + // Create temporary environment override for SDK call + const cleanupEnv = createTempEnvOverride(authEnv); + // Run a minimal query to verify authentication const stream = query({ prompt: "Reply with only the word 'ok'", @@ -278,13 +310,8 @@ export function createVerifyClaudeAuthHandler() { } } finally { clearTimeout(timeoutId); - // Restore original environment - if (originalAnthropicKey !== undefined) { - process.env.ANTHROPIC_API_KEY = originalAnthropicKey; - } else if (authMethod === 'cli') { - // If we cleared it and there was no original, keep it cleared - delete process.env.ANTHROPIC_API_KEY; - } + // Clean up the auth session + AuthSessionManager.destroySession(sessionId); } logger.info('[Setup] Verification result:', { diff --git a/apps/server/src/routes/setup/routes/verify-codex-auth.ts b/apps/server/src/routes/setup/routes/verify-codex-auth.ts new file mode 100644 index 00000000..00edd0f3 --- /dev/null +++ b/apps/server/src/routes/setup/routes/verify-codex-auth.ts @@ -0,0 +1,282 @@ +/** + * POST /verify-codex-auth endpoint - Verify Codex authentication + */ + +import type { Request, Response } from 'express'; +import { createLogger } from '@automaker/utils'; +import { CODEX_MODEL_MAP } from '@automaker/types'; +import { ProviderFactory } from '../../../providers/provider-factory.js'; +import { getApiKey } from '../common.js'; +import { getCodexAuthIndicators } from '@automaker/platform'; +import { + createSecureAuthEnv, + AuthSessionManager, + AuthRateLimiter, + validateApiKey, + createTempEnvOverride, +} from '../../../lib/auth-utils.js'; + +const logger = createLogger('Setup'); +const rateLimiter = new AuthRateLimiter(); +const OPENAI_API_KEY_ENV = 'OPENAI_API_KEY'; +const AUTH_PROMPT = "Reply with only the word 'ok'"; +const AUTH_TIMEOUT_MS = 30000; +const ERROR_BILLING_MESSAGE = + 'Credit balance is too low. Please add credits to your OpenAI account.'; +const ERROR_RATE_LIMIT_MESSAGE = + 'Rate limit reached. Please wait a while before trying again or upgrade your plan.'; +const ERROR_CLI_AUTH_REQUIRED = + "CLI authentication failed. Please run 'codex login' to authenticate."; +const ERROR_API_KEY_REQUIRED = 'No API key configured. Please enter an API key first.'; +const AUTH_ERROR_PATTERNS = [ + 'authentication', + 'unauthorized', + 'invalid_api_key', + 'invalid api key', + 'api key is invalid', + 'not authenticated', + 'login', + 'auth(', + 'token refresh', + 'tokenrefresh', + 'failed to parse server response', + 'transport channel closed', +]; +const BILLING_ERROR_PATTERNS = [ + 'credit balance is too low', + 'credit balance too low', + 'insufficient credits', + 'insufficient balance', + 'no credits', + 'out of credits', + 'billing', + 'payment required', + 'add credits', +]; +const RATE_LIMIT_PATTERNS = [ + 'limit reached', + 'rate limit', + 'rate_limit', + 'too many requests', + 'resets', + '429', +]; + +function containsAuthError(text: string): boolean { + const lowerText = text.toLowerCase(); + return AUTH_ERROR_PATTERNS.some((pattern) => lowerText.includes(pattern)); +} + +function isBillingError(text: string): boolean { + const lowerText = text.toLowerCase(); + return BILLING_ERROR_PATTERNS.some((pattern) => lowerText.includes(pattern)); +} + +function isRateLimitError(text: string): boolean { + if (isBillingError(text)) { + return false; + } + const lowerText = text.toLowerCase(); + return RATE_LIMIT_PATTERNS.some((pattern) => lowerText.includes(pattern)); +} + +export function createVerifyCodexAuthHandler() { + return async (req: Request, res: Response): Promise => { + const { authMethod, apiKey } = req.body as { + authMethod?: 'cli' | 'api_key'; + apiKey?: string; + }; + + // Create session ID for cleanup + const sessionId = `codex-auth-${Date.now()}-${Math.random().toString(36).substr(2, 9)}`; + + // Rate limiting + const clientIp = req.ip || req.socket.remoteAddress || 'unknown'; + if (!rateLimiter.canAttempt(clientIp)) { + const resetTime = rateLimiter.getResetTime(clientIp); + res.status(429).json({ + success: false, + authenticated: false, + error: 'Too many authentication attempts. Please try again later.', + resetTime, + }); + return; + } + + const abortController = new AbortController(); + const timeoutId = setTimeout(() => abortController.abort(), AUTH_TIMEOUT_MS); + + try { + // Create secure environment without modifying process.env + const authEnv = createSecureAuthEnv(authMethod || 'api_key', apiKey, 'openai'); + + // For API key auth, validate and use the provided key or stored key + if (authMethod === 'api_key') { + if (apiKey) { + // Use the provided API key + const validation = validateApiKey(apiKey, 'openai'); + if (!validation.isValid) { + res.json({ success: true, authenticated: false, error: validation.error }); + return; + } + authEnv[OPENAI_API_KEY_ENV] = validation.normalizedKey; + } else { + // Try stored key + const storedApiKey = getApiKey('openai'); + if (storedApiKey) { + const validation = validateApiKey(storedApiKey, 'openai'); + if (!validation.isValid) { + res.json({ success: true, authenticated: false, error: validation.error }); + return; + } + authEnv[OPENAI_API_KEY_ENV] = validation.normalizedKey; + } else if (!authEnv[OPENAI_API_KEY_ENV]) { + res.json({ success: true, authenticated: false, error: ERROR_API_KEY_REQUIRED }); + return; + } + } + } + + // Create session and temporary environment override + AuthSessionManager.createSession(sessionId, authMethod || 'api_key', undefined, 'openai'); + const cleanupEnv = createTempEnvOverride(authEnv); + + try { + if (authMethod === 'cli') { + const authIndicators = await getCodexAuthIndicators(); + if (!authIndicators.hasOAuthToken && !authIndicators.hasApiKey) { + res.json({ + success: true, + authenticated: false, + error: ERROR_CLI_AUTH_REQUIRED, + }); + return; + } + } + + // Use Codex provider explicitly (not ProviderFactory.getProviderForModel) + // because Cursor also supports GPT models and has higher priority + const provider = ProviderFactory.getProviderByName('codex'); + if (!provider) { + throw new Error('Codex provider not available'); + } + const stream = provider.executeQuery({ + prompt: AUTH_PROMPT, + model: CODEX_MODEL_MAP.gpt52Codex, + cwd: process.cwd(), + maxTurns: 1, + allowedTools: [], + abortController, + }); + + let receivedAnyContent = false; + let errorMessage = ''; + + for await (const msg of stream) { + if (msg.type === 'error' && msg.error) { + if (isBillingError(msg.error)) { + errorMessage = ERROR_BILLING_MESSAGE; + } else if (isRateLimitError(msg.error)) { + errorMessage = ERROR_RATE_LIMIT_MESSAGE; + } else { + errorMessage = msg.error; + } + break; + } + + if (msg.type === 'assistant' && msg.message?.content) { + for (const block of msg.message.content) { + if (block.type === 'text' && block.text) { + receivedAnyContent = true; + if (isBillingError(block.text)) { + errorMessage = ERROR_BILLING_MESSAGE; + break; + } + if (isRateLimitError(block.text)) { + errorMessage = ERROR_RATE_LIMIT_MESSAGE; + break; + } + if (containsAuthError(block.text)) { + errorMessage = block.text; + break; + } + } + } + } + + if (msg.type === 'result' && msg.result) { + receivedAnyContent = true; + if (isBillingError(msg.result)) { + errorMessage = ERROR_BILLING_MESSAGE; + } else if (isRateLimitError(msg.result)) { + errorMessage = ERROR_RATE_LIMIT_MESSAGE; + } else if (containsAuthError(msg.result)) { + errorMessage = msg.result; + break; + } + } + } + + if (errorMessage) { + // Rate limit and billing errors mean auth succeeded but usage is limited + const isUsageLimitError = + errorMessage === ERROR_BILLING_MESSAGE || errorMessage === ERROR_RATE_LIMIT_MESSAGE; + + const response: { + success: boolean; + authenticated: boolean; + error: string; + details?: string; + } = { + success: true, + authenticated: isUsageLimitError ? true : false, + error: isUsageLimitError + ? errorMessage + : authMethod === 'cli' + ? ERROR_CLI_AUTH_REQUIRED + : 'API key is invalid or has been revoked.', + }; + + // Include detailed error for auth failures so users can debug + if (!isUsageLimitError && errorMessage !== response.error) { + response.details = errorMessage; + } + + res.json(response); + return; + } + + if (!receivedAnyContent) { + res.json({ + success: true, + authenticated: false, + error: 'No response received from Codex. Please check your authentication.', + }); + return; + } + + res.json({ success: true, authenticated: true }); + } finally { + // Clean up environment override + cleanupEnv(); + } + } catch (error: unknown) { + const errMessage = error instanceof Error ? error.message : String(error); + logger.error('[Setup] Codex auth verification error:', errMessage); + const normalizedError = isBillingError(errMessage) + ? ERROR_BILLING_MESSAGE + : isRateLimitError(errMessage) + ? ERROR_RATE_LIMIT_MESSAGE + : errMessage; + res.json({ + success: true, + authenticated: false, + error: normalizedError, + }); + } finally { + clearTimeout(timeoutId); + // Clean up session + AuthSessionManager.destroySession(sessionId); + } + }; +} diff --git a/apps/server/src/routes/suggestions/generate-suggestions.ts b/apps/server/src/routes/suggestions/generate-suggestions.ts index 19b73838..2cf7925f 100644 --- a/apps/server/src/routes/suggestions/generate-suggestions.ts +++ b/apps/server/src/routes/suggestions/generate-suggestions.ts @@ -8,7 +8,12 @@ import { query } from '@anthropic-ai/claude-agent-sdk'; import type { EventEmitter } from '../../lib/events.js'; import { createLogger } from '@automaker/utils'; -import { DEFAULT_PHASE_MODELS, isCursorModel, type ThinkingLevel } from '@automaker/types'; +import { + DEFAULT_PHASE_MODELS, + isCursorModel, + stripProviderPrefix, + type ThinkingLevel, +} from '@automaker/types'; import { resolvePhaseModel } from '@automaker/model-resolver'; import { createSuggestionsOptions } from '../../lib/sdk-options.js'; import { extractJsonWithArray } from '../../lib/json-extractor.js'; @@ -207,6 +212,8 @@ The response will be automatically formatted as structured JSON.`; logger.info('[Suggestions] Using Cursor provider'); const provider = ProviderFactory.getProviderForModel(model); + // Strip provider prefix - providers expect bare model IDs + const bareModel = stripProviderPrefix(model); // For Cursor, include the JSON schema in the prompt with clear instructions const cursorPrompt = `${prompt} @@ -222,7 +229,7 @@ Your entire response should be valid JSON starting with { and ending with }. No for await (const msg of provider.executeQuery({ prompt: cursorPrompt, - model, + model: bareModel, cwd: projectPath, maxTurns: 250, allowedTools: ['Read', 'Glob', 'Grep'], diff --git a/apps/server/src/routes/worktree/routes/diffs.ts b/apps/server/src/routes/worktree/routes/diffs.ts index 801dd514..75f43d7f 100644 --- a/apps/server/src/routes/worktree/routes/diffs.ts +++ b/apps/server/src/routes/worktree/routes/diffs.ts @@ -11,9 +11,10 @@ import { getGitRepositoryDiffs } from '../../common.js'; export function createDiffsHandler() { return async (req: Request, res: Response): Promise => { try { - const { projectPath, featureId } = req.body as { + const { projectPath, featureId, useWorktrees } = req.body as { projectPath: string; featureId: string; + useWorktrees?: boolean; }; if (!projectPath || !featureId) { @@ -24,6 +25,19 @@ export function createDiffsHandler() { return; } + // If worktrees aren't enabled, don't probe .worktrees at all. + // This avoids noisy logs that make it look like features are "running in worktrees". + if (useWorktrees === false) { + const result = await getGitRepositoryDiffs(projectPath); + res.json({ + success: true, + diff: result.diff, + files: result.files, + hasChanges: result.hasChanges, + }); + return; + } + // Git worktrees are stored in project directory const worktreePath = path.join(projectPath, '.worktrees', featureId); @@ -41,7 +55,11 @@ export function createDiffsHandler() { }); } catch (innerError) { // Worktree doesn't exist - fallback to main project path - logError(innerError, 'Worktree access failed, falling back to main project'); + const code = (innerError as NodeJS.ErrnoException | undefined)?.code; + // ENOENT is expected when a feature has no worktree; don't log as an error. + if (code && code !== 'ENOENT') { + logError(innerError, 'Worktree access failed, falling back to main project'); + } try { const result = await getGitRepositoryDiffs(projectPath); diff --git a/apps/server/src/routes/worktree/routes/file-diff.ts b/apps/server/src/routes/worktree/routes/file-diff.ts index 82ed79bd..4d29eb26 100644 --- a/apps/server/src/routes/worktree/routes/file-diff.ts +++ b/apps/server/src/routes/worktree/routes/file-diff.ts @@ -15,10 +15,11 @@ const execAsync = promisify(exec); export function createFileDiffHandler() { return async (req: Request, res: Response): Promise => { try { - const { projectPath, featureId, filePath } = req.body as { + const { projectPath, featureId, filePath, useWorktrees } = req.body as { projectPath: string; featureId: string; filePath: string; + useWorktrees?: boolean; }; if (!projectPath || !featureId || !filePath) { @@ -29,6 +30,12 @@ export function createFileDiffHandler() { return; } + // If worktrees aren't enabled, don't probe .worktrees at all. + if (useWorktrees === false) { + res.json({ success: true, diff: '', filePath }); + return; + } + // Git worktrees are stored in project directory const worktreePath = path.join(projectPath, '.worktrees', featureId); @@ -57,7 +64,11 @@ export function createFileDiffHandler() { res.json({ success: true, diff, filePath }); } catch (innerError) { - logError(innerError, 'Worktree file diff failed'); + const code = (innerError as NodeJS.ErrnoException | undefined)?.code; + // ENOENT is expected when a feature has no worktree; don't log as an error. + if (code && code !== 'ENOENT') { + logError(innerError, 'Worktree file diff failed'); + } res.json({ success: true, diff: '', filePath }); } } catch (error) { diff --git a/apps/server/src/services/agent-service.ts b/apps/server/src/services/agent-service.ts index 7736fd6a..359719d3 100644 --- a/apps/server/src/services/agent-service.ts +++ b/apps/server/src/services/agent-service.ts @@ -6,13 +6,16 @@ import path from 'path'; import * as secureFs from '../lib/secure-fs.js'; import type { EventEmitter } from '../lib/events.js'; -import type { ExecuteOptions, ThinkingLevel } from '@automaker/types'; +import type { ExecuteOptions, ThinkingLevel, ReasoningEffort } from '@automaker/types'; +import { stripProviderPrefix } from '@automaker/types'; import { readImageAsBase64, buildPromptWithImages, isAbortError, loadContextFiles, createLogger, + classifyError, + getUserFriendlyErrorMessage, } from '@automaker/utils'; import { ProviderFactory } from '../providers/provider-factory.js'; import { createChatOptions, validateWorkingDirectory } from '../lib/sdk-options.js'; @@ -20,10 +23,12 @@ import { PathNotAllowedError } from '@automaker/platform'; import type { SettingsService } from './settings-service.js'; import { getAutoLoadClaudeMdSetting, - getEnableSandboxModeSetting, filterClaudeMdFromContext, getMCPServersFromSettings, getPromptCustomization, + getSkillsConfiguration, + getSubagentsConfiguration, + getCustomSubagents, } from '../lib/settings-helpers.js'; interface Message { @@ -55,6 +60,7 @@ interface Session { workingDirectory: string; model?: string; thinkingLevel?: ThinkingLevel; // Thinking level for Claude models + reasoningEffort?: ReasoningEffort; // Reasoning effort for Codex models sdkSessionId?: string; // Claude SDK session ID for conversation continuity promptQueue: QueuedPrompt[]; // Queue of prompts to auto-run after current task } @@ -144,6 +150,7 @@ export class AgentService { imagePaths, model, thinkingLevel, + reasoningEffort, }: { sessionId: string; message: string; @@ -151,6 +158,7 @@ export class AgentService { imagePaths?: string[]; model?: string; thinkingLevel?: ThinkingLevel; + reasoningEffort?: ReasoningEffort; }) { const session = this.sessions.get(sessionId); if (!session) { @@ -163,7 +171,7 @@ export class AgentService { throw new Error('Agent is already processing a message'); } - // Update session model and thinking level if provided + // Update session model, thinking level, and reasoning effort if provided if (model) { session.model = model; await this.updateSession(sessionId, { model }); @@ -171,6 +179,21 @@ export class AgentService { if (thinkingLevel !== undefined) { session.thinkingLevel = thinkingLevel; } + if (reasoningEffort !== undefined) { + session.reasoningEffort = reasoningEffort; + } + + // Validate vision support before processing images + const effectiveModel = model || session.model; + if (imagePaths && imagePaths.length > 0 && effectiveModel) { + const supportsVision = ProviderFactory.modelSupportsVision(effectiveModel); + if (!supportsVision) { + throw new Error( + `This model (${effectiveModel}) does not support image input. ` + + `Please switch to a model that supports vision, or remove the images and try again.` + ); + } + } // Read images and convert to base64 const images: Message['images'] = []; @@ -232,19 +255,34 @@ export class AgentService { '[AgentService]' ); - // Load enableSandboxMode setting (global setting only) - const enableSandboxMode = await getEnableSandboxModeSetting( - this.settingsService, - '[AgentService]' - ); - // Load MCP servers from settings (global setting only) const mcpServers = await getMCPServersFromSettings(this.settingsService, '[AgentService]'); - // Load project context files (CLAUDE.md, CODE_QUALITY.md, etc.) + // Get Skills configuration from settings + const skillsConfig = this.settingsService + ? await getSkillsConfiguration(this.settingsService) + : { enabled: false, sources: [] as Array<'user' | 'project'>, shouldIncludeInTools: false }; + + // Get Subagents configuration from settings + const subagentsConfig = this.settingsService + ? await getSubagentsConfiguration(this.settingsService) + : { enabled: false, sources: [] as Array<'user' | 'project'>, shouldIncludeInTools: false }; + + // Get custom subagents from settings (merge global + project-level) only if enabled + const customSubagents = + this.settingsService && subagentsConfig.enabled + ? await getCustomSubagents(this.settingsService, effectiveWorkDir) + : undefined; + + // Load project context files (CLAUDE.md, CODE_QUALITY.md, etc.) and memory files + // Use the user's message as task context for smart memory selection const contextResult = await loadContextFiles({ projectPath: effectiveWorkDir, fsModule: secureFs as Parameters[0]['fsModule'], + taskContext: { + title: message.substring(0, 200), // Use first 200 chars as title + description: message, + }, }); // When autoLoadClaudeMd is enabled, filter out CLAUDE.md to avoid duplication @@ -258,8 +296,9 @@ export class AgentService { : baseSystemPrompt; // Build SDK options using centralized configuration - // Use thinking level from request, or fall back to session's stored thinking level + // Use thinking level and reasoning effort from request, or fall back to session's stored values const effectiveThinkingLevel = thinkingLevel ?? session.thinkingLevel; + const effectiveReasoningEffort = reasoningEffort ?? session.reasoningEffort; const sdkOptions = createChatOptions({ cwd: effectiveWorkDir, model: model, @@ -267,7 +306,6 @@ export class AgentService { systemPrompt: combinedSystemPrompt, abortController: session.abortController!, autoLoadClaudeMd, - enableSandboxMode, thinkingLevel: effectiveThinkingLevel, // Pass thinking level for Claude models mcpServers: Object.keys(mcpServers).length > 0 ? mcpServers : undefined, }); @@ -275,25 +313,71 @@ export class AgentService { // Extract model, maxTurns, and allowedTools from SDK options const effectiveModel = sdkOptions.model!; const maxTurns = sdkOptions.maxTurns; - const allowedTools = sdkOptions.allowedTools as string[] | undefined; + let allowedTools = sdkOptions.allowedTools as string[] | undefined; - // Get provider for this model + // Build merged settingSources array using Set for automatic deduplication + const sdkSettingSources = (sdkOptions.settingSources ?? []).filter( + (source): source is 'user' | 'project' => source === 'user' || source === 'project' + ); + const skillSettingSources = skillsConfig.enabled ? skillsConfig.sources : []; + const settingSources = [...new Set([...sdkSettingSources, ...skillSettingSources])]; + + // Enhance allowedTools with Skills and Subagents tools + // These tools are not in the provider's default set - they're added dynamically based on settings + const needsSkillTool = skillsConfig.shouldIncludeInTools; + const needsTaskTool = + subagentsConfig.shouldIncludeInTools && + customSubagents && + Object.keys(customSubagents).length > 0; + + // Base tools that match the provider's default set + const baseTools = ['Read', 'Write', 'Edit', 'Glob', 'Grep', 'Bash', 'WebSearch', 'WebFetch']; + + if (allowedTools) { + allowedTools = [...allowedTools]; // Create a copy to avoid mutating SDK options + // Add Skill tool if skills are enabled + if (needsSkillTool && !allowedTools.includes('Skill')) { + allowedTools.push('Skill'); + } + // Add Task tool if custom subagents are configured + if (needsTaskTool && !allowedTools.includes('Task')) { + allowedTools.push('Task'); + } + } else if (needsSkillTool || needsTaskTool) { + // If no allowedTools specified but we need to add Skill/Task tools, + // build the full list including base tools + allowedTools = [...baseTools]; + if (needsSkillTool) { + allowedTools.push('Skill'); + } + if (needsTaskTool) { + allowedTools.push('Task'); + } + } + + // Get provider for this model (with prefix) const provider = ProviderFactory.getProviderForModel(effectiveModel); + // Strip provider prefix - providers should receive bare model IDs + const bareModel = stripProviderPrefix(effectiveModel); + // Build options for provider const options: ExecuteOptions = { prompt: '', // Will be set below based on images - model: effectiveModel, + model: bareModel, // Bare model ID (e.g., "gpt-5.1-codex-max", "composer-1") + originalModel: effectiveModel, // Original with prefix for logging (e.g., "codex-gpt-5.1-codex-max") cwd: effectiveWorkDir, systemPrompt: sdkOptions.systemPrompt, maxTurns: maxTurns, allowedTools: allowedTools, abortController: session.abortController!, conversationHistory: conversationHistory.length > 0 ? conversationHistory : undefined, - settingSources: sdkOptions.settingSources, - sandbox: sdkOptions.sandbox, // Pass sandbox configuration + settingSources: settingSources.length > 0 ? settingSources : undefined, sdkSessionId: session.sdkSessionId, // Pass SDK session ID for resuming mcpServers: Object.keys(mcpServers).length > 0 ? mcpServers : undefined, // Pass MCP servers configuration + agents: customSubagents, // Pass custom subagents for task delegation + thinkingLevel: effectiveThinkingLevel, // Pass thinking level for Claude models + reasoningEffort: effectiveReasoningEffort, // Pass reasoning effort for Codex models }; // Build prompt content with images @@ -374,6 +458,53 @@ export class AgentService { content: responseText, toolUses, }); + } else if (msg.type === 'error') { + // Some providers (like Codex CLI/SaaS or Cursor CLI) surface failures as + // streamed error messages instead of throwing. Handle these here so the + // Agent Runner UX matches the Claude/Cursor behavior without changing + // their provider implementations. + const rawErrorText = + (typeof msg.error === 'string' && msg.error.trim()) || + 'Unexpected error from provider during agent execution.'; + + const errorInfo = classifyError(new Error(rawErrorText)); + + // Keep the provider-supplied text intact (Codex already includes helpful tips), + // only add a small rate-limit hint when we can detect it. + const enhancedText = errorInfo.isRateLimit + ? `${rawErrorText}\n\nTip: It looks like you hit a rate limit. Try waiting a bit or reducing concurrent Agent Runner / Auto Mode tasks.` + : rawErrorText; + + this.logger.error('Provider error during agent execution:', { + type: errorInfo.type, + message: errorInfo.message, + }); + + // Mark session as no longer running so the UI and queue stay in sync + session.isRunning = false; + session.abortController = null; + + const errorMessage: Message = { + id: this.generateId(), + role: 'assistant', + content: `Error: ${enhancedText}`, + timestamp: new Date().toISOString(), + isError: true, + }; + + session.messages.push(errorMessage); + await this.saveSession(sessionId, session.messages); + + this.emitAgentEvent(sessionId, { + type: 'error', + error: enhancedText, + message: errorMessage, + }); + + // Don't continue streaming after an error message + return { + success: false, + }; } } diff --git a/apps/server/src/services/auto-mode-service.ts b/apps/server/src/services/auto-mode-service.ts index 078512a3..a2be666f 100644 --- a/apps/server/src/services/auto-mode-service.ts +++ b/apps/server/src/services/auto-mode-service.ts @@ -14,17 +14,17 @@ import type { ExecuteOptions, Feature, ModelProvider, - PipelineConfig, PipelineStep, ThinkingLevel, PlanningMode, } from '@automaker/types'; -import { DEFAULT_PHASE_MODELS } from '@automaker/types'; +import { DEFAULT_PHASE_MODELS, stripProviderPrefix } from '@automaker/types'; import { buildPromptWithImages, - isAbortError, classifyError, loadContextFiles, + appendLearning, + recordMemoryUsage, createLogger, } from '@automaker/utils'; @@ -47,7 +47,6 @@ import type { SettingsService } from './settings-service.js'; import { pipelineService, PipelineService } from './pipeline-service.js'; import { getAutoLoadClaudeMdSetting, - getEnableSandboxModeSetting, filterClaudeMdFromContext, getMCPServersFromSettings, getPromptCustomization, @@ -323,6 +322,8 @@ export class AutoModeService { projectPath, }); + // Note: Memory folder initialization is now handled by loadContextFiles + // Run the loop in the background this.runAutoLoop().catch((error) => { logger.error('Loop error:', error); @@ -514,15 +515,21 @@ export class AutoModeService { // Build the prompt - use continuation prompt if provided (for recovery after plan approval) let prompt: string; - // Load project context files (CLAUDE.md, CODE_QUALITY.md, etc.) - passed as system prompt + // Load project context files (CLAUDE.md, CODE_QUALITY.md, etc.) and memory files + // Context loader uses task context to select relevant memory files const contextResult = await loadContextFiles({ projectPath, fsModule: secureFs as Parameters[0]['fsModule'], + taskContext: { + title: feature.title ?? '', + description: feature.description ?? '', + }, }); // When autoLoadClaudeMd is enabled, filter out CLAUDE.md to avoid duplication // (SDK handles CLAUDE.md via settingSources), but keep other context files like CODE_QUALITY.md - const contextFilesPrompt = filterClaudeMdFromContext(contextResult, autoLoadClaudeMd); + // Note: contextResult.formattedPrompt now includes both context AND memory + const combinedSystemPrompt = filterClaudeMdFromContext(contextResult, autoLoadClaudeMd); if (options?.continuationPrompt) { // Continuation prompt is used when recovering from a plan approval @@ -575,7 +582,7 @@ export class AutoModeService { projectPath, planningMode: feature.planningMode, requirePlanApproval: feature.requirePlanApproval, - systemPrompt: contextFilesPrompt || undefined, + systemPrompt: combinedSystemPrompt || undefined, autoLoadClaudeMd, thinkingLevel: feature.thinkingLevel, } @@ -607,6 +614,36 @@ export class AutoModeService { // Record success to reset consecutive failure tracking this.recordSuccess(); + // Record learnings and memory usage after successful feature completion + try { + const featureDir = getFeatureDir(projectPath, featureId); + const outputPath = path.join(featureDir, 'agent-output.md'); + let agentOutput = ''; + try { + const outputContent = await secureFs.readFile(outputPath, 'utf-8'); + agentOutput = + typeof outputContent === 'string' ? outputContent : outputContent.toString(); + } catch { + // Agent output might not exist yet + } + + // Record memory usage if we loaded any memory files + if (contextResult.memoryFiles.length > 0 && agentOutput) { + await recordMemoryUsage( + projectPath, + contextResult.memoryFiles, + agentOutput, + true, // success + secureFs as Parameters[4] + ); + } + + // Extract and record learnings from the agent output + await this.recordLearningsFromFeature(projectPath, feature, agentOutput); + } catch (learningError) { + console.warn('[AutoMode] Failed to record learnings:', learningError); + } + this.emitAutoModeEvent('auto_mode_feature_complete', { featureId, passes: true, @@ -675,10 +712,14 @@ export class AutoModeService { ): Promise { logger.info(`Executing ${steps.length} pipeline step(s) for feature ${featureId}`); - // Load context files once + // Load context files once with feature context for smart memory selection const contextResult = await loadContextFiles({ projectPath, fsModule: secureFs as Parameters[0]['fsModule'], + taskContext: { + title: feature.title ?? '', + description: feature.description ?? '', + }, }); const contextFilesPrompt = filterClaudeMdFromContext(contextResult, autoLoadClaudeMd); @@ -911,6 +952,10 @@ Complete the pipeline step instructions above. Review the previous work and appl const contextResult = await loadContextFiles({ projectPath, fsModule: secureFs as Parameters[0]['fsModule'], + taskContext: { + title: feature?.title ?? prompt.substring(0, 200), + description: feature?.description ?? prompt, + }, }); // When autoLoadClaudeMd is enabled, filter out CLAUDE.md to avoid duplication @@ -1314,7 +1359,6 @@ Format your response as a structured markdown document.`; allowedTools: sdkOptions.allowedTools as string[], abortController, settingSources: sdkOptions.settingSources, - sandbox: sdkOptions.sandbox, // Pass sandbox configuration thinkingLevel: analysisThinkingLevel, // Pass thinking level }; @@ -1784,9 +1828,13 @@ Format your response as a structured markdown document.`; // Apply dependency-aware ordering const { orderedFeatures } = resolveDependencies(pendingFeatures); + // Get skipVerificationInAutoMode setting + const settings = await this.settingsService?.getGlobalSettings(); + const skipVerification = settings?.skipVerificationInAutoMode ?? false; + // Filter to only features with satisfied dependencies const readyFeatures = orderedFeatures.filter((feature: Feature) => - areDependenciesSatisfied(feature, allFeatures) + areDependenciesSatisfied(feature, allFeatures, { skipVerification }) ); return readyFeatures; @@ -1989,6 +2037,18 @@ This helps parse your summary correctly in the output logs.`; const planningMode = options?.planningMode || 'skip'; const previousContent = options?.previousContent; + // Validate vision support before processing images + const effectiveModel = model || 'claude-sonnet-4-20250514'; + if (imagePaths && imagePaths.length > 0) { + const supportsVision = ProviderFactory.modelSupportsVision(effectiveModel); + if (!supportsVision) { + throw new Error( + `This model (${effectiveModel}) does not support image input. ` + + `Please switch to a model that supports vision (like Claude models), or remove the images and try again.` + ); + } + } + // Check if this planning mode can generate a spec/plan that needs approval // - spec and full always generate specs // - lite only generates approval-ready content when requirePlanApproval is true @@ -2062,9 +2122,6 @@ This mock response was generated because AUTOMAKER_MOCK_AGENT=true was set. ? options.autoLoadClaudeMd : await getAutoLoadClaudeMdSetting(finalProjectPath, this.settingsService, '[AutoMode]'); - // Load enableSandboxMode setting (global setting only) - const enableSandboxMode = await getEnableSandboxModeSetting(this.settingsService, '[AutoMode]'); - // Load MCP servers from settings (global setting only) const mcpServers = await getMCPServersFromSettings(this.settingsService, '[AutoMode]'); @@ -2076,7 +2133,6 @@ This mock response was generated because AUTOMAKER_MOCK_AGENT=true was set. model: model, abortController, autoLoadClaudeMd, - enableSandboxMode, mcpServers: Object.keys(mcpServers).length > 0 ? mcpServers : undefined, thinkingLevel: options?.thinkingLevel, }); @@ -2093,7 +2149,12 @@ This mock response was generated because AUTOMAKER_MOCK_AGENT=true was set. // Get provider for this model const provider = ProviderFactory.getProviderForModel(finalModel); - logger.info(`Using provider "${provider.getName()}" for model "${finalModel}"`); + // Strip provider prefix - providers should receive bare model IDs + const bareModel = stripProviderPrefix(finalModel); + + logger.info( + `Using provider "${provider.getName()}" for model "${finalModel}" (bare: ${bareModel})` + ); // Build prompt content with images using utility const { content: promptContent } = await buildPromptWithImages( @@ -2112,14 +2173,13 @@ This mock response was generated because AUTOMAKER_MOCK_AGENT=true was set. const executeOptions: ExecuteOptions = { prompt: promptContent, - model: finalModel, + model: bareModel, maxTurns: maxTurns, cwd: workDir, allowedTools: allowedTools, abortController, systemPrompt: sdkOptions.systemPrompt, settingSources: sdkOptions.settingSources, - sandbox: sdkOptions.sandbox, // Pass sandbox configuration mcpServers: Object.keys(mcpServers).length > 0 ? mcpServers : undefined, // Pass MCP servers configuration thinkingLevel: options?.thinkingLevel, // Pass thinking level for extended thinking }; @@ -2202,9 +2262,23 @@ This mock response was generated because AUTOMAKER_MOCK_AGENT=true was set. }, WRITE_DEBOUNCE_MS); }; + // Heartbeat logging so "silent" model calls are visible. + // Some runs can take a while before the first streamed message arrives. + const streamStartTime = Date.now(); + let receivedAnyStreamMessage = false; + const STREAM_HEARTBEAT_MS = 15_000; + const streamHeartbeat = setInterval(() => { + if (receivedAnyStreamMessage) return; + const elapsedSeconds = Math.round((Date.now() - streamStartTime) / 1000); + logger.info( + `Waiting for first model response for feature ${featureId} (${elapsedSeconds}s elapsed)...` + ); + }, STREAM_HEARTBEAT_MS); + // Wrap stream processing in try/finally to ensure timeout cleanup on any error/abort try { streamLoop: for await (const msg of stream) { + receivedAnyStreamMessage = true; // Log raw stream event for debugging appendRawEvent(msg); @@ -2404,7 +2478,7 @@ After generating the revised spec, output: // Make revision call const revisionStream = provider.executeQuery({ prompt: revisionPrompt, - model: finalModel, + model: bareModel, maxTurns: maxTurns || 100, cwd: workDir, allowedTools: allowedTools, @@ -2542,7 +2616,7 @@ After generating the revised spec, output: // Execute task with dedicated agent const taskStream = provider.executeQuery({ prompt: taskPrompt, - model: finalModel, + model: bareModel, maxTurns: Math.min(maxTurns || 100, 50), // Limit turns per task cwd: workDir, allowedTools: allowedTools, @@ -2630,7 +2704,7 @@ Implement all the changes described in the plan above.`; const continuationStream = provider.executeQuery({ prompt: continuationPrompt, - model: finalModel, + model: bareModel, maxTurns: maxTurns, cwd: workDir, allowedTools: allowedTools, @@ -2721,6 +2795,7 @@ Implement all the changes described in the plan above.`; } } } finally { + clearInterval(streamHeartbeat); // ALWAYS clear pending timeouts to prevent memory leaks // This runs on success, error, or abort if (writeTimeout) { @@ -2874,4 +2949,207 @@ Begin implementing task ${task.id} now.`; } }); } + + /** + * Extract and record learnings from a completed feature + * Uses a quick Claude call to identify important decisions and patterns + */ + private async recordLearningsFromFeature( + projectPath: string, + feature: Feature, + agentOutput: string + ): Promise { + if (!agentOutput || agentOutput.length < 100) { + // Not enough output to extract learnings from + console.log( + `[AutoMode] Skipping learning extraction - output too short (${agentOutput?.length || 0} chars)` + ); + return; + } + + console.log( + `[AutoMode] Extracting learnings from feature "${feature.title}" (${agentOutput.length} chars)` + ); + + // Limit output to avoid token limits + const truncatedOutput = agentOutput.length > 10000 ? agentOutput.slice(-10000) : agentOutput; + + const userPrompt = `You are an Architecture Decision Record (ADR) extractor. Analyze this implementation and return ONLY JSON with learnings. No explanations. + +Feature: "${feature.title}" + +Implementation log: +${truncatedOutput} + +Extract MEANINGFUL learnings - not obvious things. For each, capture: +- DECISIONS: Why this approach vs alternatives? What would break if changed? +- GOTCHAS: What was unexpected? What's the root cause? How to avoid? +- PATTERNS: Why this pattern? What problem does it solve? Trade-offs? + +JSON format ONLY (no markdown, no text): +{"learnings": [{ + "category": "architecture|api|ui|database|auth|testing|performance|security|gotchas", + "type": "decision|gotcha|pattern", + "content": "What was done/learned", + "context": "Problem being solved or situation faced", + "why": "Reasoning - why this approach", + "rejected": "Alternative considered and why rejected", + "tradeoffs": "What became easier/harder", + "breaking": "What breaks if this is changed/removed" +}]} + +IMPORTANT: Only include NON-OBVIOUS learnings with real reasoning. Skip trivial patterns. +If nothing notable: {"learnings": []}`; + + try { + // Import query dynamically to avoid circular dependencies + const { query } = await import('@anthropic-ai/claude-agent-sdk'); + + // Get model from phase settings + const settings = await this.settingsService?.getGlobalSettings(); + const phaseModelEntry = + settings?.phaseModels?.memoryExtractionModel || DEFAULT_PHASE_MODELS.memoryExtractionModel; + const { model } = resolvePhaseModel(phaseModelEntry); + + const stream = query({ + prompt: userPrompt, + options: { + model, + maxTurns: 1, + allowedTools: [], + permissionMode: 'acceptEdits', + systemPrompt: + 'You are a JSON extraction assistant. You MUST respond with ONLY valid JSON, no explanations, no markdown, no other text. Extract learnings from the provided implementation context and return them as JSON.', + }, + }); + + // Extract text from stream + let responseText = ''; + for await (const msg of stream) { + if (msg.type === 'assistant' && msg.message?.content) { + for (const block of msg.message.content) { + if (block.type === 'text' && block.text) { + responseText += block.text; + } + } + } else if (msg.type === 'result' && msg.subtype === 'success') { + responseText = msg.result || responseText; + } + } + + console.log(`[AutoMode] Learning extraction response: ${responseText.length} chars`); + console.log(`[AutoMode] Response preview: ${responseText.substring(0, 300)}`); + + // Parse the response - handle JSON in markdown code blocks or raw + let jsonStr: string | null = null; + + // First try to find JSON in markdown code blocks + const codeBlockMatch = responseText.match(/```(?:json)?\s*(\{[\s\S]*?\})\s*```/); + if (codeBlockMatch) { + console.log('[AutoMode] Found JSON in code block'); + jsonStr = codeBlockMatch[1]; + } else { + // Fall back to finding balanced braces containing "learnings" + // Use a more precise approach: find the opening brace before "learnings" + const learningsIndex = responseText.indexOf('"learnings"'); + if (learningsIndex !== -1) { + // Find the opening brace before "learnings" + let braceStart = responseText.lastIndexOf('{', learningsIndex); + if (braceStart !== -1) { + // Find matching closing brace + let braceCount = 0; + let braceEnd = -1; + for (let i = braceStart; i < responseText.length; i++) { + if (responseText[i] === '{') braceCount++; + if (responseText[i] === '}') braceCount--; + if (braceCount === 0) { + braceEnd = i; + break; + } + } + if (braceEnd !== -1) { + jsonStr = responseText.substring(braceStart, braceEnd + 1); + } + } + } + } + + if (!jsonStr) { + console.log('[AutoMode] Could not extract JSON from response'); + return; + } + + console.log(`[AutoMode] Extracted JSON: ${jsonStr.substring(0, 200)}`); + + let parsed: { learnings?: unknown[] }; + try { + parsed = JSON.parse(jsonStr); + } catch { + console.warn('[AutoMode] Failed to parse learnings JSON:', jsonStr.substring(0, 200)); + return; + } + + if (!parsed.learnings || !Array.isArray(parsed.learnings)) { + console.log('[AutoMode] No learnings array in parsed response'); + return; + } + + console.log(`[AutoMode] Found ${parsed.learnings.length} potential learnings`); + + // Valid learning types + const validTypes = new Set(['decision', 'learning', 'pattern', 'gotcha']); + + // Record each learning + for (const item of parsed.learnings) { + // Validate required fields with proper type narrowing + if (!item || typeof item !== 'object') continue; + + const learning = item as Record; + if ( + !learning.category || + typeof learning.category !== 'string' || + !learning.content || + typeof learning.content !== 'string' || + !learning.content.trim() + ) { + continue; + } + + // Validate and normalize type + const typeStr = typeof learning.type === 'string' ? learning.type : 'learning'; + const learningType = validTypes.has(typeStr) + ? (typeStr as 'decision' | 'learning' | 'pattern' | 'gotcha') + : 'learning'; + + console.log( + `[AutoMode] Appending learning: category=${learning.category}, type=${learningType}` + ); + await appendLearning( + projectPath, + { + category: learning.category, + type: learningType, + content: learning.content.trim(), + context: typeof learning.context === 'string' ? learning.context : undefined, + why: typeof learning.why === 'string' ? learning.why : undefined, + rejected: typeof learning.rejected === 'string' ? learning.rejected : undefined, + tradeoffs: typeof learning.tradeoffs === 'string' ? learning.tradeoffs : undefined, + breaking: typeof learning.breaking === 'string' ? learning.breaking : undefined, + }, + secureFs as Parameters[2] + ); + } + + const validLearnings = parsed.learnings.filter( + (l) => l && typeof l === 'object' && (l as Record).content + ); + if (validLearnings.length > 0) { + console.log( + `[AutoMode] Recorded ${parsed.learnings.length} learning(s) from feature ${feature.id}` + ); + } + } catch (error) { + console.warn(`[AutoMode] Failed to extract learnings from feature ${feature.id}:`, error); + } + } } diff --git a/apps/server/src/services/codex-usage-service.ts b/apps/server/src/services/codex-usage-service.ts new file mode 100644 index 00000000..bf8aff99 --- /dev/null +++ b/apps/server/src/services/codex-usage-service.ts @@ -0,0 +1,404 @@ +import { + findCodexCliPath, + spawnProcess, + getCodexAuthPath, + systemPathExists, + systemPathReadFile, +} from '@automaker/platform'; +import { createLogger } from '@automaker/utils'; + +const logger = createLogger('CodexUsage'); + +export interface CodexRateLimitWindow { + limit: number; + used: number; + remaining: number; + usedPercent: number; + windowDurationMins: number; + resetsAt: number; +} + +export interface CodexCreditsSnapshot { + balance?: string; + unlimited?: boolean; + hasCredits?: boolean; +} + +export type CodexPlanType = 'free' | 'plus' | 'pro' | 'team' | 'enterprise' | 'edu' | 'unknown'; + +export interface CodexUsageData { + rateLimits: { + primary?: CodexRateLimitWindow; + secondary?: CodexRateLimitWindow; + credits?: CodexCreditsSnapshot; + planType?: CodexPlanType; + } | null; + lastUpdated: string; +} + +/** + * Codex Usage Service + * + * Attempts to fetch usage data from Codex CLI and OpenAI API. + * Codex CLI doesn't provide a direct usage command, but we can: + * 1. Parse usage info from error responses (rate limit errors contain plan info) + * 2. Check for OpenAI API usage if API key is available + */ +export class CodexUsageService { + private cachedCliPath: string | null = null; + + /** + * Check if Codex CLI is available on the system + */ + async isAvailable(): Promise { + this.cachedCliPath = await findCodexCliPath(); + return Boolean(this.cachedCliPath); + } + + /** + * Attempt to fetch usage data + * + * Tries multiple approaches: + * 1. Always try to get plan type from auth file first (authoritative source) + * 2. Check for OpenAI API key in environment for API usage + * 3. Make a test request to capture rate limit headers from CLI + * 4. Combine results from auth file and CLI + */ + async fetchUsageData(): Promise { + const cliPath = this.cachedCliPath || (await findCodexCliPath()); + + if (!cliPath) { + throw new Error('Codex CLI not found. Please install it with: npm install -g @openai/codex'); + } + + // Always try to get plan type from auth file first - this is the authoritative source + const authPlanType = await this.getPlanTypeFromAuthFile(); + + // Check if user has an API key that we can use + const hasApiKey = !!process.env.OPENAI_API_KEY; + + if (hasApiKey) { + // Try to get usage from OpenAI API + const openaiUsage = await this.fetchOpenAIUsage(); + if (openaiUsage) { + // Merge with auth file plan type if available + if (authPlanType && openaiUsage.rateLimits) { + openaiUsage.rateLimits.planType = authPlanType; + } + return openaiUsage; + } + } + + // Try to get usage from Codex CLI by making a simple request + const codexUsage = await this.fetchCodexUsage(cliPath, authPlanType); + if (codexUsage) { + return codexUsage; + } + + // Fallback: try to parse full usage from auth file + const authUsage = await this.fetchFromAuthFile(); + if (authUsage) { + return authUsage; + } + + // If all else fails, return a message with helpful information + throw new Error( + 'Codex usage statistics require additional configuration. ' + + 'To enable usage tracking:\n\n' + + '1. Set your OpenAI API key in the environment:\n' + + ' export OPENAI_API_KEY=sk-...\n\n' + + '2. Or check your usage at:\n' + + ' https://platform.openai.com/usage\n\n' + + 'Note: If using Codex CLI with ChatGPT OAuth authentication, ' + + 'usage data must be queried through your OpenAI account.' + ); + } + + /** + * Extract plan type from auth file JWT token + * Returns the actual plan type or 'unknown' if not available + */ + private async getPlanTypeFromAuthFile(): Promise { + try { + const authFilePath = getCodexAuthPath(); + const exists = await systemPathExists(authFilePath); + + if (!exists) { + return 'unknown'; + } + + const authContent = await systemPathReadFile(authFilePath); + const authData = JSON.parse(authContent); + + if (!authData.tokens?.id_token) { + return 'unknown'; + } + + const claims = this.parseJwt(authData.tokens.id_token); + if (!claims) { + return 'unknown'; + } + + // Extract plan type from nested OpenAI auth object with type validation + const openaiAuthClaim = claims['https://api.openai.com/auth']; + + let accountType: string | undefined; + let isSubscriptionExpired = false; + + if ( + openaiAuthClaim && + typeof openaiAuthClaim === 'object' && + !Array.isArray(openaiAuthClaim) + ) { + const openaiAuth = openaiAuthClaim as Record; + + if (typeof openaiAuth.chatgpt_plan_type === 'string') { + accountType = openaiAuth.chatgpt_plan_type; + } + + // Check if subscription has expired + if (typeof openaiAuth.chatgpt_subscription_active_until === 'string') { + const expiryDate = new Date(openaiAuth.chatgpt_subscription_active_until); + if (!isNaN(expiryDate.getTime())) { + isSubscriptionExpired = expiryDate < new Date(); + } + } + } else { + // Fallback: try top-level claim names + const possibleClaimNames = [ + 'https://chatgpt.com/account_type', + 'account_type', + 'plan', + 'plan_type', + ]; + + for (const claimName of possibleClaimNames) { + const claimValue = claims[claimName]; + if (claimValue && typeof claimValue === 'string') { + accountType = claimValue; + break; + } + } + } + + // If subscription is expired, treat as free plan + if (isSubscriptionExpired && accountType && accountType !== 'free') { + logger.info(`Subscription expired, using "free" instead of "${accountType}"`); + accountType = 'free'; + } + + if (accountType) { + const normalizedType = accountType.toLowerCase(); + if (['free', 'plus', 'pro', 'team', 'enterprise', 'edu'].includes(normalizedType)) { + return normalizedType as CodexPlanType; + } + } + } catch (error) { + logger.error('Failed to get plan type from auth file:', error); + } + + return 'unknown'; + } + + /** + * Try to fetch usage from OpenAI API using the API key + */ + private async fetchOpenAIUsage(): Promise { + const apiKey = process.env.OPENAI_API_KEY; + if (!apiKey) { + return null; + } + + try { + const endTime = Math.floor(Date.now() / 1000); + const startTime = endTime - 7 * 24 * 60 * 60; // Last 7 days + + const response = await fetch( + `https://api.openai.com/v1/organization/usage/completions?start_time=${startTime}&end_time=${endTime}&limit=1`, + { + headers: { + Authorization: `Bearer ${apiKey}`, + 'Content-Type': 'application/json', + }, + } + ); + + if (response.ok) { + const data = await response.json(); + return this.parseOpenAIUsage(data); + } + } catch (error) { + logger.error('Failed to fetch from OpenAI API:', error); + } + + return null; + } + + /** + * Parse OpenAI usage API response + */ + private parseOpenAIUsage(data: any): CodexUsageData { + let totalInputTokens = 0; + let totalOutputTokens = 0; + + if (data.data && Array.isArray(data.data)) { + for (const bucket of data.data) { + if (bucket.results && Array.isArray(bucket.results)) { + for (const result of bucket.results) { + totalInputTokens += result.input_tokens || 0; + totalOutputTokens += result.output_tokens || 0; + } + } + } + } + + return { + rateLimits: { + planType: 'unknown', + credits: { + hasCredits: true, + }, + }, + lastUpdated: new Date().toISOString(), + }; + } + + /** + * Try to fetch usage by making a test request to Codex CLI + * and parsing rate limit information from the response + */ + private async fetchCodexUsage( + cliPath: string, + authPlanType: CodexPlanType + ): Promise { + try { + // Make a simple request to trigger rate limit info if at limit + const result = await spawnProcess({ + command: cliPath, + args: ['exec', '--', 'echo', 'test'], + cwd: process.cwd(), + env: { + ...process.env, + TERM: 'dumb', + }, + timeout: 10000, + }); + + // Parse the output for rate limit information + const combinedOutput = (result.stdout + result.stderr).toLowerCase(); + + // Check if we got a rate limit error + const rateLimitMatch = combinedOutput.match( + /usage_limit_reached.*?"plan_type":"([^"]+)".*?"resets_at":(\d+).*?"resets_in_seconds":(\d+)/ + ); + + if (rateLimitMatch) { + // Rate limit error contains the plan type - use that as it's the most authoritative + const planType = rateLimitMatch[1] as CodexPlanType; + const resetsAt = parseInt(rateLimitMatch[2], 10); + const resetsInSeconds = parseInt(rateLimitMatch[3], 10); + + logger.info( + `Rate limit hit - plan: ${planType}, resets in ${Math.ceil(resetsInSeconds / 60)} mins` + ); + + return { + rateLimits: { + planType, + primary: { + limit: 0, + used: 0, + remaining: 0, + usedPercent: 100, + windowDurationMins: Math.ceil(resetsInSeconds / 60), + resetsAt, + }, + }, + lastUpdated: new Date().toISOString(), + }; + } + + // No rate limit error - use the plan type from auth file + const isFreePlan = authPlanType === 'free'; + + return { + rateLimits: { + planType: authPlanType, + credits: { + hasCredits: true, + unlimited: !isFreePlan && authPlanType !== 'unknown', + }, + }, + lastUpdated: new Date().toISOString(), + }; + } catch (error) { + logger.error('Failed to fetch from Codex CLI:', error); + } + + return null; + } + + /** + * Try to extract usage info from the Codex auth file + * Reuses getPlanTypeFromAuthFile to avoid code duplication + */ + private async fetchFromAuthFile(): Promise { + try { + const planType = await this.getPlanTypeFromAuthFile(); + + if (planType === 'unknown') { + return null; + } + + const isFreePlan = planType === 'free'; + + return { + rateLimits: { + planType, + credits: { + hasCredits: true, + unlimited: !isFreePlan, + }, + }, + lastUpdated: new Date().toISOString(), + }; + } catch (error) { + logger.error('Failed to parse auth file:', error); + } + + return null; + } + + /** + * Parse JWT token to extract claims + */ + private parseJwt(token: string): any { + try { + const parts = token.split('.'); + + if (parts.length !== 3) { + return null; + } + + const base64Url = parts[1]; + const base64 = base64Url.replace(/-/g, '+').replace(/_/g, '/'); + + // Use Buffer for Node.js environment instead of atob + let jsonPayload: string; + if (typeof Buffer !== 'undefined') { + jsonPayload = Buffer.from(base64, 'base64').toString('utf-8'); + } else { + jsonPayload = decodeURIComponent( + atob(base64) + .split('') + .map((c) => '%' + ('00' + c.charCodeAt(0).toString(16)).slice(-2)) + .join('') + ); + } + + return JSON.parse(jsonPayload); + } catch { + return null; + } + } +} diff --git a/apps/server/src/services/feature-loader.ts b/apps/server/src/services/feature-loader.ts index 562ccc66..93cff796 100644 --- a/apps/server/src/services/feature-loader.ts +++ b/apps/server/src/services/feature-loader.ts @@ -4,7 +4,7 @@ */ import path from 'path'; -import type { Feature } from '@automaker/types'; +import type { Feature, DescriptionHistoryEntry } from '@automaker/types'; import { createLogger } from '@automaker/utils'; import * as secureFs from '../lib/secure-fs.js'; import { @@ -274,6 +274,16 @@ export class FeatureLoader { featureData.imagePaths ); + // Initialize description history with the initial description + const initialHistory: DescriptionHistoryEntry[] = []; + if (featureData.description && featureData.description.trim()) { + initialHistory.push({ + description: featureData.description, + timestamp: new Date().toISOString(), + source: 'initial', + }); + } + // Ensure feature has required fields const feature: Feature = { category: featureData.category || 'Uncategorized', @@ -281,6 +291,7 @@ export class FeatureLoader { ...featureData, id: featureId, imagePaths: migratedImagePaths, + descriptionHistory: initialHistory, }; // Write feature.json @@ -292,11 +303,18 @@ export class FeatureLoader { /** * Update a feature (partial updates supported) + * @param projectPath - Path to the project + * @param featureId - ID of the feature to update + * @param updates - Partial feature updates + * @param descriptionHistorySource - Source of description change ('enhance' or 'edit') + * @param enhancementMode - Enhancement mode if source is 'enhance' */ async update( projectPath: string, featureId: string, - updates: Partial + updates: Partial, + descriptionHistorySource?: 'enhance' | 'edit', + enhancementMode?: 'improve' | 'technical' | 'simplify' | 'acceptance' ): Promise { const feature = await this.get(projectPath, featureId); if (!feature) { @@ -313,11 +331,28 @@ export class FeatureLoader { updatedImagePaths = await this.migrateImages(projectPath, featureId, updates.imagePaths); } + // Track description history if description changed + let updatedHistory = feature.descriptionHistory || []; + if ( + updates.description !== undefined && + updates.description !== feature.description && + updates.description.trim() + ) { + const historyEntry: DescriptionHistoryEntry = { + description: updates.description, + timestamp: new Date().toISOString(), + source: descriptionHistorySource || 'edit', + ...(descriptionHistorySource === 'enhance' && enhancementMode ? { enhancementMode } : {}), + }; + updatedHistory = [...updatedHistory, historyEntry]; + } + // Merge updates const updatedFeature: Feature = { ...feature, ...updates, ...(updatedImagePaths !== undefined ? { imagePaths: updatedImagePaths } : {}), + descriptionHistory: updatedHistory, }; // Write back to file diff --git a/apps/server/src/services/ideation-service.ts b/apps/server/src/services/ideation-service.ts index 7973db05..81fc3de6 100644 --- a/apps/server/src/services/ideation-service.ts +++ b/apps/server/src/services/ideation-service.ts @@ -40,6 +40,7 @@ import type { SettingsService } from './settings-service.js'; import type { FeatureLoader } from './feature-loader.js'; import { createChatOptions, validateWorkingDirectory } from '../lib/sdk-options.js'; import { resolveModelString } from '@automaker/model-resolver'; +import { stripProviderPrefix } from '@automaker/types'; const logger = createLogger('IdeationService'); @@ -201,7 +202,7 @@ export class IdeationService { existingWorkContext ); - // Resolve model alias to canonical identifier + // Resolve model alias to canonical identifier (with prefix) const modelId = resolveModelString(options?.model ?? 'sonnet'); // Create SDK options @@ -214,9 +215,13 @@ export class IdeationService { const provider = ProviderFactory.getProviderForModel(modelId); + // Strip provider prefix - providers need bare model IDs + const bareModel = stripProviderPrefix(modelId); + const executeOptions: ExecuteOptions = { prompt: message, - model: modelId, + model: bareModel, + originalModel: modelId, cwd: projectPath, systemPrompt: sdkOptions.systemPrompt, maxTurns: 1, // Single turn for ideation @@ -648,7 +653,7 @@ export class IdeationService { existingWorkContext ); - // Resolve model alias to canonical identifier + // Resolve model alias to canonical identifier (with prefix) const modelId = resolveModelString('sonnet'); // Create SDK options @@ -661,9 +666,13 @@ export class IdeationService { const provider = ProviderFactory.getProviderForModel(modelId); + // Strip provider prefix - providers need bare model IDs + const bareModel = stripProviderPrefix(modelId); + const executeOptions: ExecuteOptions = { prompt: prompt.prompt, - model: modelId, + model: bareModel, + originalModel: modelId, cwd: projectPath, systemPrompt: sdkOptions.systemPrompt, maxTurns: 1, diff --git a/apps/server/src/services/settings-service.ts b/apps/server/src/services/settings-service.ts index 94bdce24..7acd2ed1 100644 --- a/apps/server/src/services/settings-service.ts +++ b/apps/server/src/services/settings-service.ts @@ -153,14 +153,6 @@ export class SettingsService { const storedVersion = settings.version || 1; let needsSave = false; - // Migration v1 -> v2: Force enableSandboxMode to false for existing users - // Sandbox mode can cause issues on some systems, so we're disabling it by default - if (storedVersion < 2) { - logger.info('Migrating settings from v1 to v2: disabling sandbox mode'); - result.enableSandboxMode = false; - needsSave = true; - } - // Migration v2 -> v3: Convert string phase models to PhaseModelEntry objects // Note: migratePhaseModels() handles the actual conversion for both v1 and v2 formats if (storedVersion < 3) { @@ -170,6 +162,16 @@ export class SettingsService { needsSave = true; } + // Migration v3 -> v4: Add onboarding/setup wizard state fields + // Older settings files never stored setup state in settings.json (it lived in localStorage), + // so default to "setup complete" for existing installs to avoid forcing re-onboarding. + if (storedVersion < 4) { + if (settings.setupComplete === undefined) result.setupComplete = true; + if (settings.isFirstRun === undefined) result.isFirstRun = false; + if (settings.skipClaudeSetup === undefined) result.skipClaudeSetup = false; + needsSave = true; + } + // Update version if any migration occurred if (needsSave) { result.version = SETTINGS_VERSION; @@ -264,25 +266,79 @@ export class SettingsService { const settingsPath = getGlobalSettingsPath(this.dataDir); const current = await this.getGlobalSettings(); + + // Guard against destructive "empty array/object" overwrites. + // During auth transitions, the UI can briefly have default/empty state and accidentally + // sync it, wiping persisted settings (especially `projects`). + const sanitizedUpdates: Partial = { ...updates }; + let attemptedProjectWipe = false; + + const ignoreEmptyArrayOverwrite = (key: K): void => { + const nextVal = sanitizedUpdates[key] as unknown; + const curVal = current[key] as unknown; + if ( + Array.isArray(nextVal) && + nextVal.length === 0 && + Array.isArray(curVal) && + curVal.length > 0 + ) { + delete sanitizedUpdates[key]; + } + }; + + const currentProjectsLen = Array.isArray(current.projects) ? current.projects.length : 0; + if ( + Array.isArray(sanitizedUpdates.projects) && + sanitizedUpdates.projects.length === 0 && + currentProjectsLen > 0 + ) { + attemptedProjectWipe = true; + delete sanitizedUpdates.projects; + } + + ignoreEmptyArrayOverwrite('trashedProjects'); + ignoreEmptyArrayOverwrite('projectHistory'); + ignoreEmptyArrayOverwrite('recentFolders'); + ignoreEmptyArrayOverwrite('aiProfiles'); + ignoreEmptyArrayOverwrite('mcpServers'); + ignoreEmptyArrayOverwrite('enabledCursorModels'); + + // Empty object overwrite guard + if ( + sanitizedUpdates.lastSelectedSessionByProject && + typeof sanitizedUpdates.lastSelectedSessionByProject === 'object' && + !Array.isArray(sanitizedUpdates.lastSelectedSessionByProject) && + Object.keys(sanitizedUpdates.lastSelectedSessionByProject).length === 0 && + current.lastSelectedSessionByProject && + Object.keys(current.lastSelectedSessionByProject).length > 0 + ) { + delete sanitizedUpdates.lastSelectedSessionByProject; + } + + // If a request attempted to wipe projects, also ignore theme changes in that same request. + if (attemptedProjectWipe) { + delete sanitizedUpdates.theme; + } + const updated: GlobalSettings = { ...current, - ...updates, + ...sanitizedUpdates, version: SETTINGS_VERSION, }; // Deep merge keyboard shortcuts if provided - if (updates.keyboardShortcuts) { + if (sanitizedUpdates.keyboardShortcuts) { updated.keyboardShortcuts = { ...current.keyboardShortcuts, - ...updates.keyboardShortcuts, + ...sanitizedUpdates.keyboardShortcuts, }; } // Deep merge phaseModels if provided - if (updates.phaseModels) { + if (sanitizedUpdates.phaseModels) { updated.phaseModels = { ...current.phaseModels, - ...updates.phaseModels, + ...sanitizedUpdates.phaseModels, }; } @@ -523,8 +579,26 @@ export class SettingsService { } } + // Parse setup wizard state (previously stored in localStorage) + let setupState: Record = {}; + if (localStorageData['automaker-setup']) { + try { + const parsed = JSON.parse(localStorageData['automaker-setup']); + setupState = parsed.state || parsed; + } catch (e) { + errors.push(`Failed to parse automaker-setup: ${e}`); + } + } + // Extract global settings const globalSettings: Partial = { + setupComplete: + setupState.setupComplete !== undefined ? (setupState.setupComplete as boolean) : false, + isFirstRun: setupState.isFirstRun !== undefined ? (setupState.isFirstRun as boolean) : true, + skipClaudeSetup: + setupState.skipClaudeSetup !== undefined + ? (setupState.skipClaudeSetup as boolean) + : false, theme: (appState.theme as GlobalSettings['theme']) || 'dark', sidebarOpen: appState.sidebarOpen !== undefined ? (appState.sidebarOpen as boolean) : true, chatHistoryOpen: (appState.chatHistoryOpen as boolean) || false, @@ -537,7 +611,12 @@ export class SettingsService { appState.enableDependencyBlocking !== undefined ? (appState.enableDependencyBlocking as boolean) : true, - useWorktrees: (appState.useWorktrees as boolean) || false, + skipVerificationInAutoMode: + appState.skipVerificationInAutoMode !== undefined + ? (appState.skipVerificationInAutoMode as boolean) + : false, + useWorktrees: + appState.useWorktrees !== undefined ? (appState.useWorktrees as boolean) : true, showProfilesOnly: (appState.showProfilesOnly as boolean) || false, defaultPlanningMode: (appState.defaultPlanningMode as GlobalSettings['defaultPlanningMode']) || 'skip', diff --git a/apps/server/src/tests/cli-integration.test.ts b/apps/server/src/tests/cli-integration.test.ts new file mode 100644 index 00000000..7e84eb54 --- /dev/null +++ b/apps/server/src/tests/cli-integration.test.ts @@ -0,0 +1,373 @@ +/** + * CLI Integration Tests + * + * Comprehensive tests for CLI detection, authentication, and operations + * across all providers (Claude, Codex, Cursor) + */ + +import { describe, it, expect, beforeEach, afterEach } from 'vitest'; +import { + detectCli, + detectAllCLis, + findCommand, + getCliVersion, + getInstallInstructions, + validateCliInstallation, +} from '../lib/cli-detection.js'; +import { classifyError, getUserFriendlyErrorMessage } from '../lib/error-handler.js'; + +describe('CLI Detection Framework', () => { + describe('findCommand', () => { + it('should find existing command', async () => { + // Test with a command that should exist + const result = await findCommand(['node']); + expect(result).toBeTruthy(); + }); + + it('should return null for non-existent command', async () => { + const result = await findCommand(['nonexistent-command-12345']); + expect(result).toBeNull(); + }); + + it('should find first available command from alternatives', async () => { + const result = await findCommand(['nonexistent-command-12345', 'node']); + expect(result).toBeTruthy(); + expect(result).toContain('node'); + }); + }); + + describe('getCliVersion', () => { + it('should get version for existing command', async () => { + const version = await getCliVersion('node', ['--version'], 5000); + expect(version).toBeTruthy(); + expect(typeof version).toBe('string'); + }); + + it('should timeout for non-responsive command', async () => { + await expect(getCliVersion('sleep', ['10'], 1000)).rejects.toThrow(); + }, 15000); // Give extra time for test timeout + + it("should handle command that doesn't exist", async () => { + await expect( + getCliVersion('nonexistent-command-12345', ['--version'], 2000) + ).rejects.toThrow(); + }); + }); + + describe('getInstallInstructions', () => { + it('should return instructions for supported platforms', () => { + const claudeInstructions = getInstallInstructions('claude', 'darwin'); + expect(claudeInstructions).toContain('brew install'); + + const codexInstructions = getInstallInstructions('codex', 'linux'); + expect(codexInstructions).toContain('npm install'); + }); + + it('should handle unsupported platform', () => { + const instructions = getInstallInstructions('claude', 'unknown-platform' as any); + expect(instructions).toContain('No installation instructions available'); + }); + }); + + describe('validateCliInstallation', () => { + it('should validate properly installed CLI', () => { + const cliInfo = { + name: 'Test CLI', + command: 'node', + version: 'v18.0.0', + path: '/usr/bin/node', + installed: true, + authenticated: true, + authMethod: 'cli' as const, + }; + + const result = validateCliInstallation(cliInfo); + expect(result.valid).toBe(true); + expect(result.issues).toHaveLength(0); + }); + + it('should detect issues with installation', () => { + const cliInfo = { + name: 'Test CLI', + command: '', + version: '', + path: '', + installed: false, + authenticated: false, + authMethod: 'none' as const, + }; + + const result = validateCliInstallation(cliInfo); + expect(result.valid).toBe(false); + expect(result.issues.length).toBeGreaterThan(0); + expect(result.issues).toContain('CLI is not installed'); + }); + }); +}); + +describe('Error Handling System', () => { + describe('classifyError', () => { + it('should classify authentication errors', () => { + const authError = new Error('invalid_api_key: Your API key is invalid'); + const result = classifyError(authError, 'claude'); + + expect(result.type).toBe('authentication'); + expect(result.severity).toBe('high'); + expect(result.userMessage).toContain('Authentication failed'); + expect(result.retryable).toBe(false); + expect(result.provider).toBe('claude'); + }); + + it('should classify billing errors', () => { + const billingError = new Error('credit balance is too low'); + const result = classifyError(billingError); + + expect(result.type).toBe('billing'); + expect(result.severity).toBe('high'); + expect(result.userMessage).toContain('insufficient credits'); + expect(result.retryable).toBe(false); + }); + + it('should classify rate limit errors', () => { + const rateLimitError = new Error('Rate limit reached. Try again later.'); + const result = classifyError(rateLimitError); + + expect(result.type).toBe('rate_limit'); + expect(result.severity).toBe('medium'); + expect(result.userMessage).toContain('Rate limit reached'); + expect(result.retryable).toBe(true); + }); + + it('should classify network errors', () => { + const networkError = new Error('ECONNREFUSED: Connection refused'); + const result = classifyError(networkError); + + expect(result.type).toBe('network'); + expect(result.severity).toBe('medium'); + expect(result.userMessage).toContain('Network connection issue'); + expect(result.retryable).toBe(true); + }); + + it('should handle unknown errors', () => { + const unknownError = new Error('Something completely unexpected happened'); + const result = classifyError(unknownError); + + expect(result.type).toBe('unknown'); + expect(result.severity).toBe('medium'); + expect(result.userMessage).toContain('unexpected error'); + expect(result.retryable).toBe(true); + }); + }); + + describe('getUserFriendlyErrorMessage', () => { + it('should include provider name in message', () => { + const error = new Error('invalid_api_key'); + const message = getUserFriendlyErrorMessage(error, 'claude'); + + expect(message).toContain('[CLAUDE]'); + }); + + it('should include suggested action when available', () => { + const error = new Error('invalid_api_key'); + const message = getUserFriendlyErrorMessage(error); + + expect(message).toContain('Verify your API key'); + }); + }); +}); + +describe('Provider-Specific Tests', () => { + describe('Claude CLI Detection', () => { + it('should detect Claude CLI if installed', async () => { + const result = await detectCli('claude'); + + if (result.detected) { + expect(result.cli.name).toBe('Claude CLI'); + expect(result.cli.installed).toBe(true); + expect(result.cli.command).toBeTruthy(); + } + // If not installed, that's also a valid test result + }); + + it('should handle missing Claude CLI gracefully', async () => { + // This test will pass regardless of whether Claude is installed + const result = await detectCli('claude'); + expect(typeof result.detected).toBe('boolean'); + expect(Array.isArray(result.issues)).toBe(true); + }); + }); + + describe('Codex CLI Detection', () => { + it('should detect Codex CLI if installed', async () => { + const result = await detectCli('codex'); + + if (result.detected) { + expect(result.cli.name).toBe('Codex CLI'); + expect(result.cli.installed).toBe(true); + expect(result.cli.command).toBeTruthy(); + } + }); + }); + + describe('Cursor CLI Detection', () => { + it('should detect Cursor CLI if installed', async () => { + const result = await detectCli('cursor'); + + if (result.detected) { + expect(result.cli.name).toBe('Cursor CLI'); + expect(result.cli.installed).toBe(true); + expect(result.cli.command).toBeTruthy(); + } + }); + }); +}); + +describe('Integration Tests', () => { + describe('detectAllCLis', () => { + it('should detect all available CLIs', async () => { + const results = await detectAllCLis(); + + expect(results).toHaveProperty('claude'); + expect(results).toHaveProperty('codex'); + expect(results).toHaveProperty('cursor'); + + // Each should have the expected structure + Object.values(results).forEach((result) => { + expect(result).toHaveProperty('cli'); + expect(result).toHaveProperty('detected'); + expect(result).toHaveProperty('issues'); + expect(result.cli).toHaveProperty('name'); + expect(result.cli).toHaveProperty('installed'); + expect(result.cli).toHaveProperty('authenticated'); + }); + }, 30000); // Longer timeout for CLI detection + + it('should handle concurrent CLI detection', async () => { + // Run detection multiple times concurrently + const promises = [detectAllCLis(), detectAllCLis(), detectAllCLis()]; + + const results = await Promise.all(promises); + + // All should return consistent results + expect(results).toHaveLength(3); + results.forEach((result) => { + expect(result).toHaveProperty('claude'); + expect(result).toHaveProperty('codex'); + expect(result).toHaveProperty('cursor'); + }); + }, 45000); + }); +}); + +describe('Error Recovery Tests', () => { + it('should handle partial CLI detection failures', async () => { + // Mock a scenario where some CLIs fail to detect + const results = await detectAllCLis(); + + // Should still return results for all providers + expect(results).toHaveProperty('claude'); + expect(results).toHaveProperty('codex'); + expect(results).toHaveProperty('cursor'); + + // Should provide error information for failures + Object.entries(results).forEach(([provider, result]) => { + if (!result.detected && result.issues.length > 0) { + expect(result.issues.length).toBeGreaterThan(0); + expect(result.issues[0]).toBeTruthy(); + } + }); + }); + + it('should handle timeout during CLI detection', async () => { + // Test with very short timeout + const result = await detectCli('claude', { timeout: 1 }); + + // Should handle gracefully without throwing + expect(typeof result.detected).toBe('boolean'); + expect(Array.isArray(result.issues)).toBe(true); + }); +}); + +describe('Security Tests', () => { + it('should not expose sensitive information in error messages', () => { + const errorWithKey = new Error('invalid_api_key: sk-ant-abc123secret456'); + const message = getUserFriendlyErrorMessage(errorWithKey); + + // Should not expose the actual API key + expect(message).not.toContain('sk-ant-abc123secret456'); + expect(message).toContain('Authentication failed'); + }); + + it('should sanitize file paths in error messages', () => { + const errorWithPath = new Error('Permission denied: /home/user/.ssh/id_rsa'); + const message = getUserFriendlyErrorMessage(errorWithPath); + + // Should not expose sensitive file paths + expect(message).not.toContain('/home/user/.ssh/id_rsa'); + }); +}); + +// Performance Tests +describe('Performance Tests', () => { + it('should detect CLIs within reasonable time', async () => { + const startTime = Date.now(); + const results = await detectAllCLis(); + const endTime = Date.now(); + + const duration = endTime - startTime; + expect(duration).toBeLessThan(10000); // Should complete in under 10 seconds + expect(results).toHaveProperty('claude'); + expect(results).toHaveProperty('codex'); + expect(results).toHaveProperty('cursor'); + }, 15000); + + it('should handle rapid repeated calls', async () => { + // Make multiple rapid calls + const promises = Array.from({ length: 10 }, () => detectAllCLis()); + const results = await Promise.all(promises); + + // All should complete successfully + expect(results).toHaveLength(10); + results.forEach((result) => { + expect(result).toHaveProperty('claude'); + expect(result).toHaveProperty('codex'); + expect(result).toHaveProperty('cursor'); + }); + }, 60000); +}); + +// Edge Cases +describe('Edge Cases', () => { + it('should handle empty CLI names', async () => { + await expect(detectCli('' as any)).rejects.toThrow(); + }); + + it('should handle null CLI names', async () => { + await expect(detectCli(null as any)).rejects.toThrow(); + }); + + it('should handle undefined CLI names', async () => { + await expect(detectCli(undefined as any)).rejects.toThrow(); + }); + + it('should handle malformed error objects', () => { + const testCases = [ + null, + undefined, + '', + 123, + [], + { nested: { error: { message: 'test' } } }, + { error: 'simple string error' }, + ]; + + testCases.forEach((error) => { + expect(() => { + const result = classifyError(error); + expect(result).toHaveProperty('type'); + expect(result).toHaveProperty('severity'); + expect(result).toHaveProperty('userMessage'); + }).not.toThrow(); + }); + }); +}); diff --git a/apps/server/tests/unit/lib/auth.test.ts b/apps/server/tests/unit/lib/auth.test.ts index 70f50def..8708062f 100644 --- a/apps/server/tests/unit/lib/auth.test.ts +++ b/apps/server/tests/unit/lib/auth.test.ts @@ -277,7 +277,7 @@ describe('auth.ts', () => { const options = getSessionCookieOptions(); expect(options.httpOnly).toBe(true); - expect(options.sameSite).toBe('strict'); + expect(options.sameSite).toBe('lax'); expect(options.path).toBe('/'); expect(options.maxAge).toBeGreaterThan(0); }); diff --git a/apps/server/tests/unit/lib/sdk-options.test.ts b/apps/server/tests/unit/lib/sdk-options.test.ts index b442ae1d..029cd8fa 100644 --- a/apps/server/tests/unit/lib/sdk-options.test.ts +++ b/apps/server/tests/unit/lib/sdk-options.test.ts @@ -1,161 +1,15 @@ import { describe, it, expect, vi, beforeEach, afterEach } from 'vitest'; -import os from 'os'; describe('sdk-options.ts', () => { let originalEnv: NodeJS.ProcessEnv; - let homedirSpy: ReturnType; beforeEach(() => { originalEnv = { ...process.env }; vi.resetModules(); - // Spy on os.homedir and set default return value - homedirSpy = vi.spyOn(os, 'homedir').mockReturnValue('/Users/test'); }); afterEach(() => { process.env = originalEnv; - homedirSpy.mockRestore(); - }); - - describe('isCloudStoragePath', () => { - it('should detect Dropbox paths on macOS', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect(isCloudStoragePath('/Users/test/Library/CloudStorage/Dropbox-Personal/project')).toBe( - true - ); - expect(isCloudStoragePath('/Users/test/Library/CloudStorage/Dropbox/project')).toBe(true); - }); - - it('should detect Google Drive paths on macOS', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect( - isCloudStoragePath('/Users/test/Library/CloudStorage/GoogleDrive-user@gmail.com/project') - ).toBe(true); - }); - - it('should detect OneDrive paths on macOS', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect(isCloudStoragePath('/Users/test/Library/CloudStorage/OneDrive-Personal/project')).toBe( - true - ); - }); - - it('should detect iCloud Drive paths on macOS', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect( - isCloudStoragePath('/Users/test/Library/Mobile Documents/com~apple~CloudDocs/project') - ).toBe(true); - }); - - it('should detect home-anchored Dropbox paths', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect(isCloudStoragePath('/Users/test/Dropbox')).toBe(true); - expect(isCloudStoragePath('/Users/test/Dropbox/project')).toBe(true); - expect(isCloudStoragePath('/Users/test/Dropbox/nested/deep/project')).toBe(true); - }); - - it('should detect home-anchored Google Drive paths', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect(isCloudStoragePath('/Users/test/Google Drive')).toBe(true); - expect(isCloudStoragePath('/Users/test/Google Drive/project')).toBe(true); - }); - - it('should detect home-anchored OneDrive paths', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect(isCloudStoragePath('/Users/test/OneDrive')).toBe(true); - expect(isCloudStoragePath('/Users/test/OneDrive/project')).toBe(true); - }); - - it('should return false for local paths', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect(isCloudStoragePath('/Users/test/projects/myapp')).toBe(false); - expect(isCloudStoragePath('/home/user/code/project')).toBe(false); - expect(isCloudStoragePath('/var/www/app')).toBe(false); - }); - - it('should return false for relative paths not in cloud storage', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect(isCloudStoragePath('./project')).toBe(false); - expect(isCloudStoragePath('../other-project')).toBe(false); - }); - - // Tests for false positive prevention - paths that contain cloud storage names but aren't cloud storage - it('should NOT flag paths that merely contain "dropbox" in the name', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - // Projects with dropbox-like names - expect(isCloudStoragePath('/home/user/my-project-about-dropbox')).toBe(false); - expect(isCloudStoragePath('/Users/test/projects/dropbox-clone')).toBe(false); - expect(isCloudStoragePath('/Users/test/projects/Dropbox-backup-tool')).toBe(false); - // Dropbox folder that's NOT in the home directory - expect(isCloudStoragePath('/var/shared/Dropbox/project')).toBe(false); - }); - - it('should NOT flag paths that merely contain "Google Drive" in the name', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect(isCloudStoragePath('/Users/test/projects/google-drive-api-client')).toBe(false); - expect(isCloudStoragePath('/home/user/Google Drive API Tests')).toBe(false); - }); - - it('should NOT flag paths that merely contain "OneDrive" in the name', async () => { - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - expect(isCloudStoragePath('/Users/test/projects/onedrive-sync-tool')).toBe(false); - expect(isCloudStoragePath('/home/user/OneDrive-migration-scripts')).toBe(false); - }); - - it('should handle different home directories correctly', async () => { - // Change the mocked home directory - homedirSpy.mockReturnValue('/home/linuxuser'); - const { isCloudStoragePath } = await import('@/lib/sdk-options.js'); - - // Should detect Dropbox under the Linux home directory - expect(isCloudStoragePath('/home/linuxuser/Dropbox/project')).toBe(true); - // Should NOT detect Dropbox under the old home directory (since home changed) - expect(isCloudStoragePath('/Users/test/Dropbox/project')).toBe(false); - }); - }); - - describe('checkSandboxCompatibility', () => { - it('should return enabled=false when user disables sandbox', async () => { - const { checkSandboxCompatibility } = await import('@/lib/sdk-options.js'); - const result = checkSandboxCompatibility('/Users/test/project', false); - expect(result.enabled).toBe(false); - expect(result.disabledReason).toBe('user_setting'); - }); - - it('should return enabled=false for cloud storage paths even when sandbox enabled', async () => { - const { checkSandboxCompatibility } = await import('@/lib/sdk-options.js'); - const result = checkSandboxCompatibility( - '/Users/test/Library/CloudStorage/Dropbox-Personal/project', - true - ); - expect(result.enabled).toBe(false); - expect(result.disabledReason).toBe('cloud_storage'); - expect(result.message).toContain('cloud storage'); - }); - - it('should return enabled=true for local paths when sandbox enabled', async () => { - const { checkSandboxCompatibility } = await import('@/lib/sdk-options.js'); - const result = checkSandboxCompatibility('/Users/test/projects/myapp', true); - expect(result.enabled).toBe(true); - expect(result.disabledReason).toBeUndefined(); - }); - - it('should return enabled=true when enableSandboxMode is undefined for local paths', async () => { - const { checkSandboxCompatibility } = await import('@/lib/sdk-options.js'); - const result = checkSandboxCompatibility('/Users/test/project', undefined); - expect(result.enabled).toBe(true); - expect(result.disabledReason).toBeUndefined(); - }); - - it('should return enabled=false for cloud storage paths when enableSandboxMode is undefined', async () => { - const { checkSandboxCompatibility } = await import('@/lib/sdk-options.js'); - const result = checkSandboxCompatibility( - '/Users/test/Library/CloudStorage/Dropbox-Personal/project', - undefined - ); - expect(result.enabled).toBe(false); - expect(result.disabledReason).toBe('cloud_storage'); - }); }); describe('TOOL_PRESETS', () => { @@ -325,19 +179,15 @@ describe('sdk-options.ts', () => { it('should create options with chat settings', async () => { const { createChatOptions, TOOL_PRESETS, MAX_TURNS } = await import('@/lib/sdk-options.js'); - const options = createChatOptions({ cwd: '/test/path', enableSandboxMode: true }); + const options = createChatOptions({ cwd: '/test/path' }); expect(options.cwd).toBe('/test/path'); expect(options.maxTurns).toBe(MAX_TURNS.standard); expect(options.allowedTools).toEqual([...TOOL_PRESETS.chat]); - expect(options.sandbox).toEqual({ - enabled: true, - autoAllowBashIfSandboxed: true, - }); }); it('should prefer explicit model over session model', async () => { - const { createChatOptions, getModelForUseCase } = await import('@/lib/sdk-options.js'); + const { createChatOptions } = await import('@/lib/sdk-options.js'); const options = createChatOptions({ cwd: '/test/path', @@ -358,41 +208,6 @@ describe('sdk-options.ts', () => { expect(options.model).toBe('claude-sonnet-4-20250514'); }); - - it('should not set sandbox when enableSandboxMode is false', async () => { - const { createChatOptions } = await import('@/lib/sdk-options.js'); - - const options = createChatOptions({ - cwd: '/test/path', - enableSandboxMode: false, - }); - - expect(options.sandbox).toBeUndefined(); - }); - - it('should enable sandbox by default when enableSandboxMode is not provided', async () => { - const { createChatOptions } = await import('@/lib/sdk-options.js'); - - const options = createChatOptions({ - cwd: '/test/path', - }); - - expect(options.sandbox).toEqual({ - enabled: true, - autoAllowBashIfSandboxed: true, - }); - }); - - it('should auto-disable sandbox for cloud storage paths', async () => { - const { createChatOptions } = await import('@/lib/sdk-options.js'); - - const options = createChatOptions({ - cwd: '/Users/test/Library/CloudStorage/Dropbox-Personal/project', - enableSandboxMode: true, - }); - - expect(options.sandbox).toBeUndefined(); - }); }); describe('createAutoModeOptions', () => { @@ -400,15 +215,11 @@ describe('sdk-options.ts', () => { const { createAutoModeOptions, TOOL_PRESETS, MAX_TURNS } = await import('@/lib/sdk-options.js'); - const options = createAutoModeOptions({ cwd: '/test/path', enableSandboxMode: true }); + const options = createAutoModeOptions({ cwd: '/test/path' }); expect(options.cwd).toBe('/test/path'); expect(options.maxTurns).toBe(MAX_TURNS.maximum); expect(options.allowedTools).toEqual([...TOOL_PRESETS.fullAccess]); - expect(options.sandbox).toEqual({ - enabled: true, - autoAllowBashIfSandboxed: true, - }); }); it('should include systemPrompt when provided', async () => { @@ -433,62 +244,6 @@ describe('sdk-options.ts', () => { expect(options.abortController).toBe(abortController); }); - - it('should not set sandbox when enableSandboxMode is false', async () => { - const { createAutoModeOptions } = await import('@/lib/sdk-options.js'); - - const options = createAutoModeOptions({ - cwd: '/test/path', - enableSandboxMode: false, - }); - - expect(options.sandbox).toBeUndefined(); - }); - - it('should enable sandbox by default when enableSandboxMode is not provided', async () => { - const { createAutoModeOptions } = await import('@/lib/sdk-options.js'); - - const options = createAutoModeOptions({ - cwd: '/test/path', - }); - - expect(options.sandbox).toEqual({ - enabled: true, - autoAllowBashIfSandboxed: true, - }); - }); - - it('should auto-disable sandbox for cloud storage paths', async () => { - const { createAutoModeOptions } = await import('@/lib/sdk-options.js'); - - const options = createAutoModeOptions({ - cwd: '/Users/test/Library/CloudStorage/Dropbox-Personal/project', - enableSandboxMode: true, - }); - - expect(options.sandbox).toBeUndefined(); - }); - - it('should auto-disable sandbox for cloud storage paths even when enableSandboxMode is not provided', async () => { - const { createAutoModeOptions } = await import('@/lib/sdk-options.js'); - - const options = createAutoModeOptions({ - cwd: '/Users/test/Library/CloudStorage/Dropbox-Personal/project', - }); - - expect(options.sandbox).toBeUndefined(); - }); - - it('should auto-disable sandbox for iCloud paths', async () => { - const { createAutoModeOptions } = await import('@/lib/sdk-options.js'); - - const options = createAutoModeOptions({ - cwd: '/Users/test/Library/Mobile Documents/com~apple~CloudDocs/project', - enableSandboxMode: true, - }); - - expect(options.sandbox).toBeUndefined(); - }); }); describe('createCustomOptions', () => { @@ -499,13 +254,11 @@ describe('sdk-options.ts', () => { cwd: '/test/path', maxTurns: 10, allowedTools: ['Read', 'Write'], - sandbox: { enabled: true }, }); expect(options.cwd).toBe('/test/path'); expect(options.maxTurns).toBe(10); expect(options.allowedTools).toEqual(['Read', 'Write']); - expect(options.sandbox).toEqual({ enabled: true }); }); it('should use defaults when optional params not provided', async () => { @@ -517,20 +270,6 @@ describe('sdk-options.ts', () => { expect(options.allowedTools).toEqual([...TOOL_PRESETS.readOnly]); }); - it('should include sandbox when provided', async () => { - const { createCustomOptions } = await import('@/lib/sdk-options.js'); - - const options = createCustomOptions({ - cwd: '/test/path', - sandbox: { enabled: true, autoAllowBashIfSandboxed: false }, - }); - - expect(options.sandbox).toEqual({ - enabled: true, - autoAllowBashIfSandboxed: false, - }); - }); - it('should include systemPrompt when provided', async () => { const { createCustomOptions } = await import('@/lib/sdk-options.js'); diff --git a/apps/server/tests/unit/lib/validation-storage.test.ts b/apps/server/tests/unit/lib/validation-storage.test.ts index f135da76..05b44fc7 100644 --- a/apps/server/tests/unit/lib/validation-storage.test.ts +++ b/apps/server/tests/unit/lib/validation-storage.test.ts @@ -179,8 +179,7 @@ describe('validation-storage.ts', () => { }); it('should return false for validation exactly at 24 hours', () => { - const exactDate = new Date(); - exactDate.setHours(exactDate.getHours() - 24); + const exactDate = new Date(Date.now() - 24 * 60 * 60 * 1000 + 100); const validation = createMockValidation({ validatedAt: exactDate.toISOString(), diff --git a/apps/server/tests/unit/providers/claude-provider.test.ts b/apps/server/tests/unit/providers/claude-provider.test.ts index 38e1bf4c..f107c4f4 100644 --- a/apps/server/tests/unit/providers/claude-provider.test.ts +++ b/apps/server/tests/unit/providers/claude-provider.test.ts @@ -37,6 +37,7 @@ describe('claude-provider.ts', () => { const generator = provider.executeQuery({ prompt: 'Hello', + model: 'claude-opus-4-5-20251101', cwd: '/test', }); @@ -79,7 +80,7 @@ describe('claude-provider.ts', () => { }); }); - it('should use default allowed tools when not specified', async () => { + it('should not include allowedTools when not specified (caller decides via sdk-options)', async () => { vi.mocked(sdk.query).mockReturnValue( (async function* () { yield { type: 'text', text: 'test' }; @@ -88,6 +89,7 @@ describe('claude-provider.ts', () => { const generator = provider.executeQuery({ prompt: 'Test', + model: 'claude-opus-4-5-20251101', cwd: '/test', }); @@ -95,37 +97,8 @@ describe('claude-provider.ts', () => { expect(sdk.query).toHaveBeenCalledWith({ prompt: 'Test', - options: expect.objectContaining({ - allowedTools: ['Read', 'Write', 'Edit', 'Glob', 'Grep', 'Bash', 'WebSearch', 'WebFetch'], - }), - }); - }); - - it('should pass sandbox configuration when provided', async () => { - vi.mocked(sdk.query).mockReturnValue( - (async function* () { - yield { type: 'text', text: 'test' }; - })() - ); - - const generator = provider.executeQuery({ - prompt: 'Test', - cwd: '/test', - sandbox: { - enabled: true, - autoAllowBashIfSandboxed: true, - }, - }); - - await collectAsyncGenerator(generator); - - expect(sdk.query).toHaveBeenCalledWith({ - prompt: 'Test', - options: expect.objectContaining({ - sandbox: { - enabled: true, - autoAllowBashIfSandboxed: true, - }, + options: expect.not.objectContaining({ + allowedTools: expect.anything(), }), }); }); @@ -141,6 +114,7 @@ describe('claude-provider.ts', () => { const generator = provider.executeQuery({ prompt: 'Test', + model: 'claude-opus-4-5-20251101', cwd: '/test', abortController, }); @@ -169,6 +143,7 @@ describe('claude-provider.ts', () => { const generator = provider.executeQuery({ prompt: 'Current message', + model: 'claude-opus-4-5-20251101', cwd: '/test', conversationHistory, sdkSessionId: 'test-session-id', @@ -199,6 +174,7 @@ describe('claude-provider.ts', () => { const generator = provider.executeQuery({ prompt: arrayPrompt as any, + model: 'claude-opus-4-5-20251101', cwd: '/test', }); @@ -218,6 +194,7 @@ describe('claude-provider.ts', () => { const generator = provider.executeQuery({ prompt: 'Test', + model: 'claude-opus-4-5-20251101', cwd: '/test', }); @@ -243,6 +220,7 @@ describe('claude-provider.ts', () => { const generator = provider.executeQuery({ prompt: 'Test', + model: 'claude-opus-4-5-20251101', cwd: '/test', }); diff --git a/apps/server/tests/unit/providers/codex-provider.test.ts b/apps/server/tests/unit/providers/codex-provider.test.ts new file mode 100644 index 00000000..ada1aae1 --- /dev/null +++ b/apps/server/tests/unit/providers/codex-provider.test.ts @@ -0,0 +1,293 @@ +import { describe, it, expect, vi, beforeEach, afterAll } from 'vitest'; +import os from 'os'; +import path from 'path'; +import { CodexProvider } from '../../../src/providers/codex-provider.js'; +import type { ProviderMessage } from '../../../src/providers/types.js'; +import { collectAsyncGenerator } from '../../utils/helpers.js'; +import { + spawnJSONLProcess, + findCodexCliPath, + secureFs, + getCodexConfigDir, + getCodexAuthIndicators, +} from '@automaker/platform'; + +const OPENAI_API_KEY_ENV = 'OPENAI_API_KEY'; +const originalOpenAIKey = process.env[OPENAI_API_KEY_ENV]; + +const codexRunMock = vi.fn(); + +vi.mock('@openai/codex-sdk', () => ({ + Codex: class { + constructor(_opts: { apiKey: string }) {} + startThread() { + return { + id: 'thread-123', + run: codexRunMock, + }; + } + resumeThread() { + return { + id: 'thread-123', + run: codexRunMock, + }; + } + }, +})); + +const EXEC_SUBCOMMAND = 'exec'; + +vi.mock('@automaker/platform', () => ({ + spawnJSONLProcess: vi.fn(), + spawnProcess: vi.fn(), + findCodexCliPath: vi.fn(), + getCodexAuthIndicators: vi.fn().mockResolvedValue({ + hasAuthFile: false, + hasOAuthToken: false, + hasApiKey: false, + }), + getCodexConfigDir: vi.fn().mockReturnValue('/home/test/.codex'), + secureFs: { + readFile: vi.fn(), + mkdir: vi.fn(), + writeFile: vi.fn(), + }, + getDataDirectory: vi.fn(), +})); + +vi.mock('@/services/settings-service.js', () => ({ + SettingsService: class { + async getGlobalSettings() { + return { + codexAutoLoadAgents: false, + codexSandboxMode: 'workspace-write', + codexApprovalPolicy: 'on-request', + }; + } + }, +})); + +describe('codex-provider.ts', () => { + let provider: CodexProvider; + + afterAll(() => { + if (originalOpenAIKey !== undefined) { + process.env[OPENAI_API_KEY_ENV] = originalOpenAIKey; + } else { + delete process.env[OPENAI_API_KEY_ENV]; + } + }); + + beforeEach(() => { + vi.clearAllMocks(); + vi.mocked(getCodexConfigDir).mockReturnValue('/home/test/.codex'); + vi.mocked(findCodexCliPath).mockResolvedValue('/usr/bin/codex'); + vi.mocked(getCodexAuthIndicators).mockResolvedValue({ + hasAuthFile: true, + hasOAuthToken: true, + hasApiKey: false, + }); + delete process.env[OPENAI_API_KEY_ENV]; + provider = new CodexProvider(); + }); + + describe('executeQuery', () => { + it('emits tool_use and tool_result with shared tool_use_id for command execution', async () => { + const mockEvents = [ + { + type: 'item.started', + item: { + type: 'command_execution', + id: 'cmd-1', + command: 'ls', + }, + }, + { + type: 'item.completed', + item: { + type: 'command_execution', + id: 'cmd-1', + output: 'file1\nfile2', + }, + }, + ]; + + vi.mocked(spawnJSONLProcess).mockReturnValue( + (async function* () { + for (const event of mockEvents) { + yield event; + } + })() + ); + const results = await collectAsyncGenerator( + provider.executeQuery({ + prompt: 'List files', + model: 'gpt-5.2', + cwd: '/tmp', + }) + ); + + expect(results).toHaveLength(2); + const toolUse = results[0]; + const toolResult = results[1]; + + expect(toolUse.type).toBe('assistant'); + expect(toolUse.message?.content[0].type).toBe('tool_use'); + const toolUseId = toolUse.message?.content[0].tool_use_id; + expect(toolUseId).toBeDefined(); + + expect(toolResult.type).toBe('assistant'); + expect(toolResult.message?.content[0].type).toBe('tool_result'); + expect(toolResult.message?.content[0].tool_use_id).toBe(toolUseId); + expect(toolResult.message?.content[0].content).toBe('file1\nfile2'); + }); + + it('adds output schema and max turn overrides when configured', async () => { + // Note: With full-permissions always on, these flags are no longer used + // This test now only verifies the basic CLI structure + // Using gpt-5.1-codex-max which should route to Codex (not Cursor) + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + await collectAsyncGenerator( + provider.executeQuery({ + prompt: 'Test config', + model: 'gpt-5.1-codex-max', + cwd: '/tmp', + allowedTools: ['Read', 'Write'], + maxTurns: 5, + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + expect(call.args).toContain('exec'); // Should have exec subcommand + expect(call.args).toContain('--dangerously-bypass-approvals-and-sandbox'); // Should have YOLO flag + expect(call.args).toContain('--model'); + expect(call.args).toContain('--json'); + }); + + it('overrides approval policy when MCP auto-approval is enabled', async () => { + // Note: With full-permissions always on (--dangerously-bypass-approvals-and-sandbox), + // approval policy is bypassed, not configured via --config + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + await collectAsyncGenerator( + provider.executeQuery({ + prompt: 'Test approvals', + model: 'gpt-5.1-codex-max', + cwd: '/tmp', + mcpServers: { mock: { type: 'stdio', command: 'node' } }, + mcpAutoApproveTools: true, + codexSettings: { approvalPolicy: 'untrusted' }, + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + const execIndex = call.args.indexOf(EXEC_SUBCOMMAND); + expect(call.args).toContain('--dangerously-bypass-approvals-and-sandbox'); // YOLO flag bypasses approval + expect(call.args).toContain('--model'); + expect(call.args).toContain('--json'); + }); + + it('injects user and project instructions when auto-load is enabled', async () => { + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + const userPath = path.join('/home/test/.codex', 'AGENTS.md'); + const projectPath = path.join('/tmp/project', '.codex', 'AGENTS.md'); + vi.mocked(secureFs.readFile).mockImplementation(async (filePath: string) => { + if (filePath === userPath) { + return 'User rules'; + } + if (filePath === projectPath) { + return 'Project rules'; + } + throw new Error('missing'); + }); + + await collectAsyncGenerator( + provider.executeQuery({ + prompt: 'Hello', + model: 'gpt-5.2', + cwd: '/tmp/project', + codexSettings: { autoLoadAgents: true }, + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + const promptText = call.stdinData; + expect(promptText).toContain('User rules'); + expect(promptText).toContain('Project rules'); + }); + + it('disables sandbox mode when running in cloud storage paths', async () => { + // Note: With full-permissions always on (--dangerously-bypass-approvals-and-sandbox), + // sandbox mode is bypassed, not configured via --sandbox flag + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + const cloudPath = path.join(os.homedir(), 'Dropbox', 'project'); + await collectAsyncGenerator( + provider.executeQuery({ + prompt: 'Hello', + model: 'gpt-5.1-codex-max', + cwd: cloudPath, + codexSettings: { sandboxMode: 'workspace-write' }, + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + // YOLO flag bypasses sandbox entirely + expect(call.args).toContain('--dangerously-bypass-approvals-and-sandbox'); + expect(call.args).toContain('--model'); + expect(call.args).toContain('--json'); + }); + + it('uses the SDK when no tools are requested and an API key is present', async () => { + process.env[OPENAI_API_KEY_ENV] = 'sk-test'; + codexRunMock.mockResolvedValue({ finalResponse: 'Hello from SDK' }); + + const results = await collectAsyncGenerator( + provider.executeQuery({ + prompt: 'Hello', + model: 'gpt-5.2', + cwd: '/tmp', + allowedTools: [], + }) + ); + + expect(results[0].message?.content[0].text).toBe('Hello from SDK'); + expect(results[1].result).toBe('Hello from SDK'); + }); + + it('uses the CLI when tools are requested even if an API key is present', async () => { + process.env[OPENAI_API_KEY_ENV] = 'sk-test'; + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + await collectAsyncGenerator( + provider.executeQuery({ + prompt: 'Read files', + model: 'gpt-5.2', + cwd: '/tmp', + allowedTools: ['Read'], + }) + ); + + expect(codexRunMock).not.toHaveBeenCalled(); + expect(spawnJSONLProcess).toHaveBeenCalled(); + }); + + it('falls back to CLI when no tools are requested and no API key is available', async () => { + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + await collectAsyncGenerator( + provider.executeQuery({ + prompt: 'Hello', + model: 'gpt-5.2', + cwd: '/tmp', + allowedTools: [], + }) + ); + + expect(codexRunMock).not.toHaveBeenCalled(); + expect(spawnJSONLProcess).toHaveBeenCalled(); + }); + }); +}); diff --git a/apps/server/tests/unit/providers/opencode-provider.test.ts b/apps/server/tests/unit/providers/opencode-provider.test.ts new file mode 100644 index 00000000..b33217a8 --- /dev/null +++ b/apps/server/tests/unit/providers/opencode-provider.test.ts @@ -0,0 +1,1277 @@ +import { describe, it, expect, vi, beforeEach, afterEach } from 'vitest'; +import { + OpencodeProvider, + resetToolUseIdCounter, +} from '../../../src/providers/opencode-provider.js'; +import type { ProviderMessage } from '@automaker/types'; +import { collectAsyncGenerator } from '../../utils/helpers.js'; +import { spawnJSONLProcess, getOpenCodeAuthIndicators } from '@automaker/platform'; + +vi.mock('@automaker/platform', () => ({ + spawnJSONLProcess: vi.fn(), + isWslAvailable: vi.fn().mockReturnValue(false), + findCliInWsl: vi.fn().mockReturnValue(null), + createWslCommand: vi.fn(), + windowsToWslPath: vi.fn(), + getOpenCodeAuthIndicators: vi.fn().mockResolvedValue({ + hasAuthFile: false, + hasOAuthToken: false, + hasApiKey: false, + }), +})); + +describe('opencode-provider.ts', () => { + let provider: OpencodeProvider; + + beforeEach(() => { + vi.clearAllMocks(); + resetToolUseIdCounter(); + provider = new OpencodeProvider(); + }); + + afterEach(() => { + // Note: Don't use vi.restoreAllMocks() here as it would undo the module-level + // mock implementations (like getOpenCodeAuthIndicators) set up with vi.mock() + }); + + // ========================================================================== + // Basic Provider Tests + // ========================================================================== + + describe('getName', () => { + it("should return 'opencode' as provider name", () => { + expect(provider.getName()).toBe('opencode'); + }); + }); + + describe('getCliName', () => { + it("should return 'opencode' as CLI name", () => { + expect(provider.getCliName()).toBe('opencode'); + }); + }); + + describe('getAvailableModels', () => { + it('should return 10 models', () => { + const models = provider.getAvailableModels(); + expect(models).toHaveLength(10); + }); + + it('should include Claude Sonnet 4.5 (Bedrock) as default', () => { + const models = provider.getAvailableModels(); + const sonnet = models.find( + (m) => m.id === 'amazon-bedrock/anthropic.claude-sonnet-4-5-20250929-v1:0' + ); + + expect(sonnet).toBeDefined(); + expect(sonnet?.name).toBe('Claude Sonnet 4.5 (Bedrock)'); + expect(sonnet?.provider).toBe('opencode'); + expect(sonnet?.default).toBe(true); + expect(sonnet?.modelString).toBe('amazon-bedrock/anthropic.claude-sonnet-4-5-20250929-v1:0'); + }); + + it('should include Claude Opus 4.5 (Bedrock)', () => { + const models = provider.getAvailableModels(); + const opus = models.find( + (m) => m.id === 'amazon-bedrock/anthropic.claude-opus-4-5-20251101-v1:0' + ); + + expect(opus).toBeDefined(); + expect(opus?.name).toBe('Claude Opus 4.5 (Bedrock)'); + expect(opus?.modelString).toBe('amazon-bedrock/anthropic.claude-opus-4-5-20251101-v1:0'); + }); + + it('should include Claude Haiku 4.5 (Bedrock)', () => { + const models = provider.getAvailableModels(); + const haiku = models.find( + (m) => m.id === 'amazon-bedrock/anthropic.claude-haiku-4-5-20251001-v1:0' + ); + + expect(haiku).toBeDefined(); + expect(haiku?.name).toBe('Claude Haiku 4.5 (Bedrock)'); + expect(haiku?.tier).toBe('standard'); + }); + + it('should include free tier Big Pickle model', () => { + const models = provider.getAvailableModels(); + const bigPickle = models.find((m) => m.id === 'opencode/big-pickle'); + + expect(bigPickle).toBeDefined(); + expect(bigPickle?.name).toBe('Big Pickle (Free)'); + expect(bigPickle?.modelString).toBe('opencode/big-pickle'); + expect(bigPickle?.tier).toBe('basic'); + }); + + it('should include DeepSeek R1 (Bedrock)', () => { + const models = provider.getAvailableModels(); + const deepseek = models.find((m) => m.id === 'amazon-bedrock/deepseek.r1-v1:0'); + + expect(deepseek).toBeDefined(); + expect(deepseek?.name).toBe('DeepSeek R1 (Bedrock)'); + expect(deepseek?.tier).toBe('premium'); + }); + + it('should have all models support tools', () => { + const models = provider.getAvailableModels(); + + models.forEach((model) => { + expect(model.supportsTools).toBe(true); + }); + }); + + it('should have models with modelString property', () => { + const models = provider.getAvailableModels(); + + for (const model of models) { + expect(model).toHaveProperty('modelString'); + expect(typeof model.modelString).toBe('string'); + } + }); + }); + + describe('supportsFeature', () => { + it("should support 'tools' feature", () => { + expect(provider.supportsFeature('tools')).toBe(true); + }); + + it("should support 'text' feature", () => { + expect(provider.supportsFeature('text')).toBe(true); + }); + + it("should support 'vision' feature", () => { + expect(provider.supportsFeature('vision')).toBe(true); + }); + + it("should not support 'thinking' feature", () => { + expect(provider.supportsFeature('thinking')).toBe(false); + }); + + it("should not support 'mcp' feature", () => { + expect(provider.supportsFeature('mcp')).toBe(false); + }); + + it("should not support 'cli' feature", () => { + expect(provider.supportsFeature('cli')).toBe(false); + }); + + it('should return false for unknown features', () => { + expect(provider.supportsFeature('unknown-feature')).toBe(false); + expect(provider.supportsFeature('nonexistent')).toBe(false); + expect(provider.supportsFeature('')).toBe(false); + }); + }); + + // ========================================================================== + // buildCliArgs Tests + // ========================================================================== + + describe('buildCliArgs', () => { + it('should build correct args with run subcommand', () => { + const args = provider.buildCliArgs({ + prompt: 'Hello', + cwd: '/tmp/project', + }); + + expect(args[0]).toBe('run'); + }); + + it('should include --format stream-json for streaming output', () => { + const args = provider.buildCliArgs({ + prompt: 'Hello', + cwd: '/tmp/project', + }); + + const formatIndex = args.indexOf('--format'); + expect(formatIndex).toBeGreaterThan(-1); + expect(args[formatIndex + 1]).toBe('stream-json'); + }); + + it('should include -q flag for quiet mode', () => { + const args = provider.buildCliArgs({ + prompt: 'Hello', + cwd: '/tmp/project', + }); + + expect(args).toContain('-q'); + }); + + it('should include working directory with -c flag', () => { + const args = provider.buildCliArgs({ + prompt: 'Hello', + cwd: '/tmp/my-project', + }); + + const cwdIndex = args.indexOf('-c'); + expect(cwdIndex).toBeGreaterThan(-1); + expect(args[cwdIndex + 1]).toBe('/tmp/my-project'); + }); + + it('should include model with --model flag', () => { + const args = provider.buildCliArgs({ + prompt: 'Hello', + model: 'anthropic/claude-sonnet-4-5', + cwd: '/tmp/project', + }); + + const modelIndex = args.indexOf('--model'); + expect(modelIndex).toBeGreaterThan(-1); + expect(args[modelIndex + 1]).toBe('anthropic/claude-sonnet-4-5'); + }); + + it('should strip opencode- prefix from model', () => { + const args = provider.buildCliArgs({ + prompt: 'Hello', + model: 'opencode-anthropic/claude-sonnet-4-5', + cwd: '/tmp/project', + }); + + const modelIndex = args.indexOf('--model'); + expect(args[modelIndex + 1]).toBe('anthropic/claude-sonnet-4-5'); + }); + + it('should include dash as final arg for stdin prompt', () => { + const args = provider.buildCliArgs({ + prompt: 'Hello', + cwd: '/tmp/project', + }); + + expect(args[args.length - 1]).toBe('-'); + }); + + it('should handle missing cwd', () => { + const args = provider.buildCliArgs({ + prompt: 'Hello', + }); + + expect(args).not.toContain('-c'); + }); + + it('should handle missing model', () => { + const args = provider.buildCliArgs({ + prompt: 'Hello', + cwd: '/tmp/project', + }); + + expect(args).not.toContain('--model'); + }); + }); + + // ========================================================================== + // normalizeEvent Tests + // ========================================================================== + + describe('normalizeEvent', () => { + describe('text-delta events', () => { + it('should convert text-delta to assistant message with text content', () => { + const event = { + type: 'text-delta', + text: 'Hello, world!', + session_id: 'test-session', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toEqual({ + type: 'assistant', + session_id: 'test-session', + message: { + role: 'assistant', + content: [ + { + type: 'text', + text: 'Hello, world!', + }, + ], + }, + }); + }); + + it('should return null for empty text-delta', () => { + const event = { + type: 'text-delta', + text: '', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toBeNull(); + }); + + it('should return null for text-delta with undefined text', () => { + const event = { + type: 'text-delta', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toBeNull(); + }); + }); + + describe('text-end events', () => { + it('should return null for text-end events (informational)', () => { + const event = { + type: 'text-end', + session_id: 'test-session', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toBeNull(); + }); + }); + + describe('tool-call events', () => { + it('should convert tool-call to assistant message with tool_use content', () => { + const event = { + type: 'tool-call', + call_id: 'call-123', + name: 'Read', + args: { file_path: '/tmp/test.txt' }, + session_id: 'test-session', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toEqual({ + type: 'assistant', + session_id: 'test-session', + message: { + role: 'assistant', + content: [ + { + type: 'tool_use', + name: 'Read', + tool_use_id: 'call-123', + input: { file_path: '/tmp/test.txt' }, + }, + ], + }, + }); + }); + + it('should generate tool_use_id when call_id is missing', () => { + const event = { + type: 'tool-call', + name: 'Write', + args: { content: 'test' }, + }; + + const result = provider.normalizeEvent(event); + + expect(result?.message?.content[0].type).toBe('tool_use'); + expect(result?.message?.content[0].tool_use_id).toBe('opencode-tool-1'); + + // Second call should increment + const result2 = provider.normalizeEvent({ + type: 'tool-call', + name: 'Edit', + args: {}, + }); + expect(result2?.message?.content[0].tool_use_id).toBe('opencode-tool-2'); + }); + }); + + describe('tool-result events', () => { + it('should convert tool-result to assistant message with tool_result content', () => { + const event = { + type: 'tool-result', + call_id: 'call-123', + output: 'File contents here', + session_id: 'test-session', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toEqual({ + type: 'assistant', + session_id: 'test-session', + message: { + role: 'assistant', + content: [ + { + type: 'tool_result', + tool_use_id: 'call-123', + content: 'File contents here', + }, + ], + }, + }); + }); + + it('should handle tool-result without call_id', () => { + const event = { + type: 'tool-result', + output: 'Result without ID', + }; + + const result = provider.normalizeEvent(event); + + expect(result?.message?.content[0].type).toBe('tool_result'); + expect(result?.message?.content[0].tool_use_id).toBeUndefined(); + }); + }); + + describe('tool-error events', () => { + it('should convert tool-error to error message', () => { + const event = { + type: 'tool-error', + call_id: 'call-123', + error: 'File not found', + session_id: 'test-session', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toEqual({ + type: 'error', + session_id: 'test-session', + error: 'File not found', + }); + }); + + it('should provide default error message when error is missing', () => { + const event = { + type: 'tool-error', + call_id: 'call-123', + }; + + const result = provider.normalizeEvent(event); + + expect(result?.type).toBe('error'); + expect(result?.error).toBe('Tool execution failed'); + }); + }); + + describe('start-step events', () => { + it('should return null for start-step events (informational)', () => { + const event = { + type: 'start-step', + step: 1, + session_id: 'test-session', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toBeNull(); + }); + }); + + describe('finish-step events', () => { + it('should convert successful finish-step to result message', () => { + const event = { + type: 'finish-step', + step: 1, + success: true, + result: 'Task completed successfully', + session_id: 'test-session', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toEqual({ + type: 'result', + subtype: 'success', + session_id: 'test-session', + result: 'Task completed successfully', + }); + }); + + it('should convert finish-step with success=false to error message', () => { + const event = { + type: 'finish-step', + step: 1, + success: false, + error: 'Something went wrong', + session_id: 'test-session', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toEqual({ + type: 'error', + session_id: 'test-session', + error: 'Something went wrong', + }); + }); + + it('should convert finish-step with error property to error message', () => { + const event = { + type: 'finish-step', + step: 1, + error: 'Process failed', + }; + + const result = provider.normalizeEvent(event); + + expect(result?.type).toBe('error'); + expect(result?.error).toBe('Process failed'); + }); + + it('should provide default error message for failed step without error text', () => { + const event = { + type: 'finish-step', + step: 1, + success: false, + }; + + const result = provider.normalizeEvent(event); + + expect(result?.type).toBe('error'); + expect(result?.error).toBe('Step execution failed'); + }); + + it('should treat finish-step without success flag as success', () => { + const event = { + type: 'finish-step', + step: 1, + result: 'Done', + }; + + const result = provider.normalizeEvent(event); + + expect(result?.type).toBe('result'); + expect(result?.subtype).toBe('success'); + }); + }); + + describe('unknown events', () => { + it('should return null for unknown event types', () => { + const event = { + type: 'unknown-event', + data: 'some data', + }; + + const result = provider.normalizeEvent(event); + + expect(result).toBeNull(); + }); + + it('should return null for null input', () => { + const result = provider.normalizeEvent(null); + expect(result).toBeNull(); + }); + + it('should return null for undefined input', () => { + const result = provider.normalizeEvent(undefined); + expect(result).toBeNull(); + }); + + it('should return null for non-object input', () => { + expect(provider.normalizeEvent('string')).toBeNull(); + expect(provider.normalizeEvent(123)).toBeNull(); + expect(provider.normalizeEvent(true)).toBeNull(); + }); + + it('should return null for events without type', () => { + expect(provider.normalizeEvent({})).toBeNull(); + expect(provider.normalizeEvent({ data: 'no type' })).toBeNull(); + }); + }); + }); + + // ========================================================================== + // executeQuery Tests + // ========================================================================== + + describe('executeQuery', () => { + /** + * Helper to set up the provider with a mocked CLI path + * This bypasses CLI detection for testing + */ + function setupMockedProvider(): OpencodeProvider { + const mockedProvider = new OpencodeProvider(); + // Access protected property to simulate CLI detection + (mockedProvider as unknown as { cliPath: string }).cliPath = '/usr/bin/opencode'; + (mockedProvider as unknown as { detectedStrategy: string }).detectedStrategy = 'native'; + return mockedProvider; + } + + it('should stream text-delta events as assistant messages', async () => { + const mockedProvider = setupMockedProvider(); + + const mockEvents = [ + { type: 'text-delta', text: 'Hello ' }, + { type: 'text-delta', text: 'World!' }, + { type: 'text-end' }, + ]; + + vi.mocked(spawnJSONLProcess).mockReturnValue( + (async function* () { + for (const event of mockEvents) { + yield event; + } + })() + ); + + const results = await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: 'Say hello', + model: 'anthropic/claude-sonnet-4-5', + cwd: '/tmp', + }) + ); + + // text-end should be filtered out (returns null) + expect(results).toHaveLength(2); + expect(results[0].type).toBe('assistant'); + expect(results[0].message?.content[0].text).toBe('Hello '); + expect(results[1].message?.content[0].text).toBe('World!'); + }); + + it('should emit tool_use and tool_result with matching IDs', async () => { + const mockedProvider = setupMockedProvider(); + + const mockEvents = [ + { + type: 'tool-call', + call_id: 'tool-1', + name: 'Read', + args: { file_path: '/tmp/test.txt' }, + }, + { + type: 'tool-result', + call_id: 'tool-1', + output: 'File contents', + }, + ]; + + vi.mocked(spawnJSONLProcess).mockReturnValue( + (async function* () { + for (const event of mockEvents) { + yield event; + } + })() + ); + + const results = await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: 'Read a file', + cwd: '/tmp', + }) + ); + + expect(results).toHaveLength(2); + + const toolUse = results[0]; + const toolResult = results[1]; + + expect(toolUse.type).toBe('assistant'); + expect(toolUse.message?.content[0].type).toBe('tool_use'); + expect(toolUse.message?.content[0].tool_use_id).toBe('tool-1'); + + expect(toolResult.type).toBe('assistant'); + expect(toolResult.message?.content[0].type).toBe('tool_result'); + expect(toolResult.message?.content[0].tool_use_id).toBe('tool-1'); + }); + + it('should pass stdinData containing the prompt', async () => { + const mockedProvider = setupMockedProvider(); + + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: 'My test prompt', + cwd: '/tmp', + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + expect(call.stdinData).toBe('My test prompt'); + }); + + it('should extract text from array prompt', async () => { + const mockedProvider = setupMockedProvider(); + + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + const arrayPrompt = [ + { type: 'text', text: 'First part' }, + { type: 'image', source: { type: 'base64', data: '...' } }, + { type: 'text', text: 'Second part' }, + ]; + + await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: arrayPrompt as unknown as string, + cwd: '/tmp', + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + expect(call.stdinData).toBe('First part\nSecond part'); + }); + + it('should include correct CLI args in subprocess options', async () => { + const mockedProvider = setupMockedProvider(); + + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: 'Test', + model: 'opencode-anthropic/claude-opus-4-5', + cwd: '/tmp/workspace', + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + expect(call.args).toContain('run'); + expect(call.args).toContain('--format'); + expect(call.args).toContain('stream-json'); + expect(call.args).toContain('-q'); + expect(call.args).toContain('-c'); + expect(call.args).toContain('/tmp/workspace'); + expect(call.args).toContain('--model'); + expect(call.args).toContain('anthropic/claude-opus-4-5'); + }); + + it('should skip null-normalized events', async () => { + const mockedProvider = setupMockedProvider(); + + const mockEvents = [ + { type: 'unknown-internal-event', data: 'ignored' }, + { type: 'text-delta', text: 'Valid text' }, + { type: 'another-unknown', foo: 'bar' }, + { type: 'finish-step', result: 'Done' }, + ]; + + vi.mocked(spawnJSONLProcess).mockReturnValue( + (async function* () { + for (const event of mockEvents) { + yield event; + } + })() + ); + + const results = await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: 'Test', + cwd: '/test', + }) + ); + + // Should only have valid events (text and result), not the unknown ones + expect(results.length).toBe(2); + }); + + it('should throw error when CLI is not installed', async () => { + // Create provider and explicitly set cliPath to null to simulate not installed + // Set detectedStrategy to 'npx' to prevent ensureCliDetected from re-running detection + const unmockedProvider = new OpencodeProvider(); + (unmockedProvider as unknown as { cliPath: string | null }).cliPath = null; + (unmockedProvider as unknown as { detectedStrategy: string }).detectedStrategy = 'npx'; + + await expect( + collectAsyncGenerator( + unmockedProvider.executeQuery({ + prompt: 'Test', + cwd: '/test', + }) + ) + ).rejects.toThrow(/CLI not found/); + }); + }); + + // ========================================================================== + // getSpawnConfig Tests + // ========================================================================== + + describe('getSpawnConfig', () => { + it('should return npx as Windows strategy', () => { + const config = provider.getSpawnConfig(); + expect(config.windowsStrategy).toBe('npx'); + }); + + it('should specify opencode-ai@latest as npx package', () => { + const config = provider.getSpawnConfig(); + expect(config.npxPackage).toBe('opencode-ai@latest'); + }); + + it('should include common paths for Linux', () => { + const config = provider.getSpawnConfig(); + const linuxPaths = config.commonPaths['linux']; + + expect(linuxPaths).toBeDefined(); + expect(linuxPaths.length).toBeGreaterThan(0); + expect(linuxPaths.some((p) => p.includes('opencode'))).toBe(true); + }); + + it('should include common paths for macOS', () => { + const config = provider.getSpawnConfig(); + const darwinPaths = config.commonPaths['darwin']; + + expect(darwinPaths).toBeDefined(); + expect(darwinPaths.length).toBeGreaterThan(0); + expect(darwinPaths.some((p) => p.includes('homebrew'))).toBe(true); + }); + + it('should include common paths for Windows', () => { + const config = provider.getSpawnConfig(); + const win32Paths = config.commonPaths['win32']; + + expect(win32Paths).toBeDefined(); + expect(win32Paths.length).toBeGreaterThan(0); + expect(win32Paths.some((p) => p.includes('npm'))).toBe(true); + }); + }); + + // ========================================================================== + // detectInstallation Tests + // ========================================================================== + + describe('detectInstallation', () => { + beforeEach(() => { + // Ensure the mock implementation is set up for each test + vi.mocked(getOpenCodeAuthIndicators).mockResolvedValue({ + hasAuthFile: false, + hasOAuthToken: false, + hasApiKey: false, + }); + }); + + it('should return installed true when CLI is found', async () => { + (provider as unknown as { cliPath: string }).cliPath = '/usr/local/bin/opencode'; + (provider as unknown as { detectedStrategy: string }).detectedStrategy = 'native'; + + const result = await provider.detectInstallation(); + + expect(result.installed).toBe(true); + expect(result.path).toBe('/usr/local/bin/opencode'); + }); + + it('should return installed false when CLI is not found', async () => { + // Set both cliPath to null and detectedStrategy to something other than 'native' + // to prevent ensureCliDetected from re-detecting + (provider as unknown as { cliPath: string | null }).cliPath = null; + (provider as unknown as { detectedStrategy: string }).detectedStrategy = 'npx'; + + const result = await provider.detectInstallation(); + + expect(result.installed).toBe(false); + }); + + it('should return method as npm when using npx strategy', async () => { + (provider as unknown as { cliPath: string }).cliPath = 'npx'; + (provider as unknown as { detectedStrategy: string }).detectedStrategy = 'npx'; + + const result = await provider.detectInstallation(); + + expect(result.method).toBe('npm'); + }); + + it('should return method as cli when using native strategy', async () => { + (provider as unknown as { cliPath: string }).cliPath = '/usr/local/bin/opencode'; + (provider as unknown as { detectedStrategy: string }).detectedStrategy = 'native'; + + const result = await provider.detectInstallation(); + + expect(result.method).toBe('cli'); + }); + }); + + // ========================================================================== + // Config Management Tests (inherited from BaseProvider) + // ========================================================================== + + describe('config management', () => { + it('should get and set config', () => { + provider.setConfig({ apiKey: 'test-api-key' }); + + const config = provider.getConfig(); + expect(config.apiKey).toBe('test-api-key'); + }); + + it('should merge config updates', () => { + provider.setConfig({ apiKey: 'key1' }); + provider.setConfig({ model: 'model1' }); + + const config = provider.getConfig(); + expect(config.apiKey).toBe('key1'); + expect(config.model).toBe('model1'); + }); + }); + + describe('validateConfig', () => { + it('should validate config from base class', () => { + const result = provider.validateConfig(); + + expect(result.valid).toBe(true); + expect(result.errors).toHaveLength(0); + }); + }); + + // ========================================================================== + // Additional Edge Case Tests + // ========================================================================== + + describe('extractPromptText edge cases', () => { + function setupMockedProvider(): OpencodeProvider { + const mockedProvider = new OpencodeProvider(); + (mockedProvider as unknown as { cliPath: string }).cliPath = '/usr/bin/opencode'; + (mockedProvider as unknown as { detectedStrategy: string }).detectedStrategy = 'native'; + return mockedProvider; + } + + it('should handle empty array prompt', async () => { + const mockedProvider = setupMockedProvider(); + + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: [] as unknown as string, + cwd: '/tmp', + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + expect(call.stdinData).toBe(''); + }); + + it('should handle array prompt with only image blocks (no text)', async () => { + const mockedProvider = setupMockedProvider(); + + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + const imageOnlyPrompt = [ + { type: 'image', source: { type: 'base64', data: 'abc123' } }, + { type: 'image', source: { type: 'base64', data: 'def456' } }, + ]; + + await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: imageOnlyPrompt as unknown as string, + cwd: '/tmp', + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + expect(call.stdinData).toBe(''); + }); + + it('should handle array prompt with mixed content types', async () => { + const mockedProvider = setupMockedProvider(); + + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + const mixedPrompt = [ + { type: 'text', text: 'Analyze this image' }, + { type: 'image', source: { type: 'base64', data: 'abc123' } }, + { type: 'text', text: 'And this one' }, + { type: 'image', source: { type: 'base64', data: 'def456' } }, + { type: 'text', text: 'What differences do you see?' }, + ]; + + await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: mixedPrompt as unknown as string, + cwd: '/tmp', + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + expect(call.stdinData).toBe('Analyze this image\nAnd this one\nWhat differences do you see?'); + }); + + it('should handle text blocks with empty text property', async () => { + const mockedProvider = setupMockedProvider(); + + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + const promptWithEmptyText = [ + { type: 'text', text: 'Hello' }, + { type: 'text', text: '' }, + { type: 'text', text: 'World' }, + ]; + + await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: promptWithEmptyText as unknown as string, + cwd: '/tmp', + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + // Empty text blocks should be filtered out + expect(call.stdinData).toBe('Hello\nWorld'); + }); + }); + + describe('abort handling', () => { + function setupMockedProvider(): OpencodeProvider { + const mockedProvider = new OpencodeProvider(); + (mockedProvider as unknown as { cliPath: string }).cliPath = '/usr/bin/opencode'; + (mockedProvider as unknown as { detectedStrategy: string }).detectedStrategy = 'native'; + return mockedProvider; + } + + it('should pass abortController to subprocess options', async () => { + const mockedProvider = setupMockedProvider(); + + vi.mocked(spawnJSONLProcess).mockReturnValue((async function* () {})()); + + const abortController = new AbortController(); + + await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: 'Test', + cwd: '/tmp', + abortController, + }) + ); + + const call = vi.mocked(spawnJSONLProcess).mock.calls[0][0]; + expect(call.abortController).toBe(abortController); + }); + }); + + describe('session_id preservation', () => { + function setupMockedProvider(): OpencodeProvider { + const mockedProvider = new OpencodeProvider(); + (mockedProvider as unknown as { cliPath: string }).cliPath = '/usr/bin/opencode'; + (mockedProvider as unknown as { detectedStrategy: string }).detectedStrategy = 'native'; + return mockedProvider; + } + + it('should preserve session_id through the full executeQuery flow', async () => { + const mockedProvider = setupMockedProvider(); + const sessionId = 'test-session-123'; + + const mockEvents = [ + { type: 'text-delta', text: 'Hello ', session_id: sessionId }, + { type: 'tool-call', name: 'Read', args: {}, call_id: 'c1', session_id: sessionId }, + { type: 'tool-result', call_id: 'c1', output: 'file content', session_id: sessionId }, + { type: 'finish-step', result: 'Done', session_id: sessionId }, + ]; + + vi.mocked(spawnJSONLProcess).mockReturnValue( + (async function* () { + for (const event of mockEvents) { + yield event; + } + })() + ); + + const results = await collectAsyncGenerator( + mockedProvider.executeQuery({ + prompt: 'Test', + cwd: '/tmp', + }) + ); + + // All emitted messages should have the session_id + expect(results).toHaveLength(4); + results.forEach((result) => { + expect(result.session_id).toBe(sessionId); + }); + }); + }); + + describe('normalizeEvent additional edge cases', () => { + it('should handle tool-call with empty args object', () => { + const event = { + type: 'tool-call', + call_id: 'call-123', + name: 'Glob', + args: {}, + }; + + const result = provider.normalizeEvent(event); + + expect(result?.message?.content[0].type).toBe('tool_use'); + expect(result?.message?.content[0].input).toEqual({}); + }); + + it('should handle tool-call with null args', () => { + const event = { + type: 'tool-call', + call_id: 'call-123', + name: 'Glob', + args: null, + }; + + const result = provider.normalizeEvent(event); + + expect(result?.message?.content[0].type).toBe('tool_use'); + expect(result?.message?.content[0].input).toBeNull(); + }); + + it('should handle tool-call with complex nested args', () => { + const event = { + type: 'tool-call', + call_id: 'call-123', + name: 'Edit', + args: { + file_path: '/tmp/test.ts', + changes: [ + { line: 10, old: 'foo', new: 'bar' }, + { line: 20, old: 'baz', new: 'qux' }, + ], + options: { replace_all: true }, + }, + }; + + const result = provider.normalizeEvent(event); + + expect(result?.message?.content[0].type).toBe('tool_use'); + expect(result?.message?.content[0].input).toEqual({ + file_path: '/tmp/test.ts', + changes: [ + { line: 10, old: 'foo', new: 'bar' }, + { line: 20, old: 'baz', new: 'qux' }, + ], + options: { replace_all: true }, + }); + }); + + it('should handle tool-result with empty output', () => { + const event = { + type: 'tool-result', + call_id: 'call-123', + output: '', + }; + + const result = provider.normalizeEvent(event); + + expect(result?.message?.content[0].type).toBe('tool_result'); + expect(result?.message?.content[0].content).toBe(''); + }); + + it('should handle text-delta with whitespace-only text', () => { + const event = { + type: 'text-delta', + text: ' ', + }; + + const result = provider.normalizeEvent(event); + + // Whitespace should be preserved (not filtered like empty string) + expect(result).not.toBeNull(); + expect(result?.message?.content[0].text).toBe(' '); + }); + + it('should handle text-delta with newlines', () => { + const event = { + type: 'text-delta', + text: 'Line 1\nLine 2\nLine 3', + }; + + const result = provider.normalizeEvent(event); + + expect(result?.message?.content[0].text).toBe('Line 1\nLine 2\nLine 3'); + }); + + it('should handle finish-step with both result and error (error takes precedence)', () => { + const event = { + type: 'finish-step', + result: 'Some result', + error: 'But also an error', + success: false, + }; + + const result = provider.normalizeEvent(event); + + expect(result?.type).toBe('error'); + expect(result?.error).toBe('But also an error'); + }); + }); + + describe('isInstalled', () => { + it('should return true when CLI path is set', async () => { + (provider as unknown as { cliPath: string }).cliPath = '/usr/bin/opencode'; + (provider as unknown as { detectedStrategy: string }).detectedStrategy = 'native'; + + const result = await provider.isInstalled(); + + expect(result).toBe(true); + }); + + it('should return false when CLI path is null', async () => { + (provider as unknown as { cliPath: string | null }).cliPath = null; + (provider as unknown as { detectedStrategy: string }).detectedStrategy = 'npx'; + + const result = await provider.isInstalled(); + + expect(result).toBe(false); + }); + }); + + describe('model tier validation', () => { + it('should have exactly one default model', () => { + const models = provider.getAvailableModels(); + const defaultModels = models.filter((m) => m.default === true); + + expect(defaultModels).toHaveLength(1); + expect(defaultModels[0].id).toBe('amazon-bedrock/anthropic.claude-sonnet-4-5-20250929-v1:0'); + }); + + it('should have valid tier values for all models', () => { + const models = provider.getAvailableModels(); + const validTiers = ['basic', 'standard', 'premium']; + + models.forEach((model) => { + expect(validTiers).toContain(model.tier); + }); + }); + + it('should have descriptions for all models', () => { + const models = provider.getAvailableModels(); + + models.forEach((model) => { + expect(model.description).toBeDefined(); + expect(typeof model.description).toBe('string'); + expect(model.description!.length).toBeGreaterThan(0); + }); + }); + }); + + describe('buildCliArgs edge cases', () => { + it('should handle very long prompts', () => { + const longPrompt = 'a'.repeat(10000); + const args = provider.buildCliArgs({ + prompt: longPrompt, + cwd: '/tmp', + }); + + // The prompt is NOT in args (it's passed via stdin) + // Just verify the args structure is correct + expect(args).toContain('run'); + expect(args).toContain('-'); + expect(args.join(' ')).not.toContain(longPrompt); + }); + + it('should handle prompts with special characters', () => { + const specialPrompt = 'Test $HOME $(rm -rf /) `command` "quotes" \'single\''; + const args = provider.buildCliArgs({ + prompt: specialPrompt, + cwd: '/tmp', + }); + + // Special chars in prompt should not affect args (prompt is via stdin) + expect(args).toContain('run'); + expect(args).toContain('-'); + }); + + it('should handle cwd with spaces', () => { + const args = provider.buildCliArgs({ + prompt: 'Test', + cwd: '/tmp/path with spaces/project', + }); + + const cwdIndex = args.indexOf('-c'); + expect(args[cwdIndex + 1]).toBe('/tmp/path with spaces/project'); + }); + + it('should handle model with unusual characters', () => { + const args = provider.buildCliArgs({ + prompt: 'Test', + model: 'opencode-provider/model-v1.2.3-beta', + cwd: '/tmp', + }); + + const modelIndex = args.indexOf('--model'); + expect(args[modelIndex + 1]).toBe('provider/model-v1.2.3-beta'); + }); + }); +}); diff --git a/apps/server/tests/unit/providers/provider-factory.test.ts b/apps/server/tests/unit/providers/provider-factory.test.ts index eb37d83a..5b717364 100644 --- a/apps/server/tests/unit/providers/provider-factory.test.ts +++ b/apps/server/tests/unit/providers/provider-factory.test.ts @@ -2,18 +2,42 @@ import { describe, it, expect, vi, beforeEach, afterEach } from 'vitest'; import { ProviderFactory } from '@/providers/provider-factory.js'; import { ClaudeProvider } from '@/providers/claude-provider.js'; import { CursorProvider } from '@/providers/cursor-provider.js'; +import { CodexProvider } from '@/providers/codex-provider.js'; +import { OpencodeProvider } from '@/providers/opencode-provider.js'; describe('provider-factory.ts', () => { let consoleSpy: any; + let detectClaudeSpy: any; + let detectCursorSpy: any; + let detectCodexSpy: any; + let detectOpencodeSpy: any; beforeEach(() => { consoleSpy = { warn: vi.spyOn(console, 'warn').mockImplementation(() => {}), }; + + // Avoid hitting real CLI / filesystem checks during unit tests + detectClaudeSpy = vi + .spyOn(ClaudeProvider.prototype, 'detectInstallation') + .mockResolvedValue({ installed: true }); + detectCursorSpy = vi + .spyOn(CursorProvider.prototype, 'detectInstallation') + .mockResolvedValue({ installed: true }); + detectCodexSpy = vi + .spyOn(CodexProvider.prototype, 'detectInstallation') + .mockResolvedValue({ installed: true }); + detectOpencodeSpy = vi + .spyOn(OpencodeProvider.prototype, 'detectInstallation') + .mockResolvedValue({ installed: true }); }); afterEach(() => { consoleSpy.warn.mockRestore(); + detectClaudeSpy.mockRestore(); + detectCursorSpy.mockRestore(); + detectCodexSpy.mockRestore(); + detectOpencodeSpy.mockRestore(); }); describe('getProviderForModel', () => { @@ -111,10 +135,11 @@ describe('provider-factory.ts', () => { }); describe('Cursor models via model ID lookup', () => { - it('should return CursorProvider for gpt-5.2 (valid Cursor model)', () => { - // gpt-5.2 is in CURSOR_MODEL_MAP + it('should return CodexProvider for gpt-5.2 (Codex model, not Cursor)', () => { + // gpt-5.2 is in both CURSOR_MODEL_MAP and CODEX_MODEL_CONFIG_MAP + // It should route to Codex since Codex models take priority const provider = ProviderFactory.getProviderForModel('gpt-5.2'); - expect(provider).toBeInstanceOf(CursorProvider); + expect(provider).toBeInstanceOf(CodexProvider); }); it('should return CursorProvider for grok (valid Cursor model)', () => { @@ -141,9 +166,9 @@ describe('provider-factory.ts', () => { expect(hasClaudeProvider).toBe(true); }); - it('should return exactly 2 providers', () => { + it('should return exactly 4 providers', () => { const providers = ProviderFactory.getAllProviders(); - expect(providers).toHaveLength(2); + expect(providers).toHaveLength(4); }); it('should include CursorProvider', () => { @@ -179,7 +204,9 @@ describe('provider-factory.ts', () => { expect(keys).toContain('claude'); expect(keys).toContain('cursor'); - expect(keys).toHaveLength(2); + expect(keys).toContain('codex'); + expect(keys).toContain('opencode'); + expect(keys).toHaveLength(4); }); it('should include cursor status', async () => { diff --git a/apps/server/tests/unit/services/settings-service.test.ts b/apps/server/tests/unit/services/settings-service.test.ts index ff09b817..3a0c6d77 100644 --- a/apps/server/tests/unit/services/settings-service.test.ts +++ b/apps/server/tests/unit/services/settings-service.test.ts @@ -144,6 +144,33 @@ describe('settings-service.ts', () => { expect(updated.keyboardShortcuts.agent).toBe(DEFAULT_GLOBAL_SETTINGS.keyboardShortcuts.agent); }); + it('should not overwrite non-empty projects with an empty array (data loss guard)', async () => { + const initial: GlobalSettings = { + ...DEFAULT_GLOBAL_SETTINGS, + theme: 'solarized' as GlobalSettings['theme'], + projects: [ + { + id: 'proj1', + name: 'Project 1', + path: '/tmp/project-1', + lastOpened: new Date().toISOString(), + }, + ] as any, + }; + const settingsPath = path.join(testDataDir, 'settings.json'); + await fs.writeFile(settingsPath, JSON.stringify(initial, null, 2)); + + const updated = await settingsService.updateGlobalSettings({ + projects: [], + theme: 'light', + } as any); + + expect(updated.projects.length).toBe(1); + expect((updated.projects as any)[0]?.id).toBe('proj1'); + // Theme should be preserved in the same request if it attempted to wipe projects + expect(updated.theme).toBe('solarized'); + }); + it('should create data directory if it does not exist', async () => { const newDataDir = path.join(os.tmpdir(), `new-data-dir-${Date.now()}`); const newService = new SettingsService(newDataDir); diff --git a/apps/ui/playwright.config.ts b/apps/ui/playwright.config.ts index 5ea2fb7b..f301fa30 100644 --- a/apps/ui/playwright.config.ts +++ b/apps/ui/playwright.config.ts @@ -3,6 +3,7 @@ import { defineConfig, devices } from '@playwright/test'; const port = process.env.TEST_PORT || 3007; const serverPort = process.env.TEST_SERVER_PORT || 3008; const reuseServer = process.env.TEST_REUSE_SERVER === 'true'; +const useExternalBackend = !!process.env.VITE_SERVER_URL; // Always use mock agent for tests (disables rate limiting, uses mock Claude responses) const mockAgent = true; @@ -33,31 +34,38 @@ export default defineConfig({ webServer: [ // Backend server - runs with mock agent enabled in CI // Uses dev:test (no file watching) to avoid port conflicts from server restarts - { - command: `cd ../server && npm run dev:test`, - url: `http://localhost:${serverPort}/api/health`, - // Don't reuse existing server to ensure we use the test API key - reuseExistingServer: false, - timeout: 60000, - env: { - ...process.env, - PORT: String(serverPort), - // Enable mock agent in CI to avoid real API calls - AUTOMAKER_MOCK_AGENT: mockAgent ? 'true' : 'false', - // Set a test API key for web mode authentication - AUTOMAKER_API_KEY: process.env.AUTOMAKER_API_KEY || 'test-api-key-for-e2e-tests', - // Hide the API key banner to reduce log noise - AUTOMAKER_HIDE_API_KEY: 'true', - // No ALLOWED_ROOT_DIRECTORY restriction - allow all paths for testing - // Simulate containerized environment to skip sandbox confirmation dialogs - IS_CONTAINERIZED: 'true', - }, - }, + ...(useExternalBackend + ? [] + : [ + { + command: `cd ../server && npm run dev:test`, + url: `http://localhost:${serverPort}/api/health`, + // Don't reuse existing server to ensure we use the test API key + reuseExistingServer: false, + timeout: 60000, + env: { + ...process.env, + PORT: String(serverPort), + // Enable mock agent in CI to avoid real API calls + AUTOMAKER_MOCK_AGENT: mockAgent ? 'true' : 'false', + // Set a test API key for web mode authentication + AUTOMAKER_API_KEY: + process.env.AUTOMAKER_API_KEY || 'test-api-key-for-e2e-tests', + // Hide the API key banner to reduce log noise + AUTOMAKER_HIDE_API_KEY: 'true', + // Explicitly unset ALLOWED_ROOT_DIRECTORY to allow all paths for testing + // (prevents inheriting /projects from Docker or other environments) + ALLOWED_ROOT_DIRECTORY: '', + // Simulate containerized environment to skip sandbox confirmation dialogs + IS_CONTAINERIZED: 'true', + }, + }, + ]), // Frontend Vite dev server { command: `npm run dev`, url: `http://localhost:${port}`, - reuseExistingServer: true, + reuseExistingServer: false, timeout: 120000, env: { ...process.env, diff --git a/apps/ui/scripts/kill-test-servers.mjs b/apps/ui/scripts/kill-test-servers.mjs index 02121c74..677f39e7 100644 --- a/apps/ui/scripts/kill-test-servers.mjs +++ b/apps/ui/scripts/kill-test-servers.mjs @@ -10,24 +10,42 @@ const execAsync = promisify(exec); const SERVER_PORT = process.env.TEST_SERVER_PORT || 3008; const UI_PORT = process.env.TEST_PORT || 3007; +const USE_EXTERNAL_SERVER = !!process.env.VITE_SERVER_URL; async function killProcessOnPort(port) { try { - const { stdout } = await execAsync(`lsof -ti:${port}`); - const pids = stdout.trim().split('\n').filter(Boolean); + const hasLsof = await execAsync('command -v lsof').then( + () => true, + () => false + ); - if (pids.length > 0) { - console.log(`[KillTestServers] Found process(es) on port ${port}: ${pids.join(', ')}`); - for (const pid of pids) { - try { - await execAsync(`kill -9 ${pid}`); - console.log(`[KillTestServers] Killed process ${pid}`); - } catch (error) { - // Process might have already exited + if (hasLsof) { + const { stdout } = await execAsync(`lsof -ti:${port}`); + const pids = stdout.trim().split('\n').filter(Boolean); + + if (pids.length > 0) { + console.log(`[KillTestServers] Found process(es) on port ${port}: ${pids.join(', ')}`); + for (const pid of pids) { + try { + await execAsync(`kill -9 ${pid}`); + console.log(`[KillTestServers] Killed process ${pid}`); + } catch (error) { + // Process might have already exited + } } + await new Promise((resolve) => setTimeout(resolve, 500)); } - // Wait a moment for the port to be released + return; + } + + const hasFuser = await execAsync('command -v fuser').then( + () => true, + () => false + ); + if (hasFuser) { + await execAsync(`fuser -k -9 ${port}/tcp`).catch(() => undefined); await new Promise((resolve) => setTimeout(resolve, 500)); + return; } } catch (error) { // No process on port, which is fine @@ -36,7 +54,9 @@ async function killProcessOnPort(port) { async function main() { console.log('[KillTestServers] Checking for existing test servers...'); - await killProcessOnPort(Number(SERVER_PORT)); + if (!USE_EXTERNAL_SERVER) { + await killProcessOnPort(Number(SERVER_PORT)); + } await killProcessOnPort(Number(UI_PORT)); console.log('[KillTestServers] Done'); } diff --git a/apps/ui/scripts/setup-e2e-fixtures.mjs b/apps/ui/scripts/setup-e2e-fixtures.mjs index 62de432f..e6009fd4 100644 --- a/apps/ui/scripts/setup-e2e-fixtures.mjs +++ b/apps/ui/scripts/setup-e2e-fixtures.mjs @@ -3,9 +3,11 @@ /** * Setup script for E2E test fixtures * Creates the necessary test fixture directories and files before running Playwright tests + * Also resets the server's settings.json to a known state for test isolation */ import * as fs from 'fs'; +import * as os from 'os'; import * as path from 'path'; import { fileURLToPath } from 'url'; @@ -16,6 +18,9 @@ const __dirname = path.dirname(__filename); const WORKSPACE_ROOT = path.resolve(__dirname, '../../..'); const FIXTURE_PATH = path.join(WORKSPACE_ROOT, 'test/fixtures/projectA'); const SPEC_FILE_PATH = path.join(FIXTURE_PATH, '.automaker/app_spec.txt'); +const SERVER_SETTINGS_PATH = path.join(WORKSPACE_ROOT, 'apps/server/data/settings.json'); +// Create a shared test workspace directory that will be used as default for project creation +const TEST_WORKSPACE_DIR = path.join(os.tmpdir(), 'automaker-e2e-workspace'); const SPEC_CONTENT = ` Test Project A @@ -27,10 +32,154 @@ const SPEC_CONTENT = ` `; +// Clean settings.json for E2E tests - no current project so localStorage can control state +const E2E_SETTINGS = { + version: 4, + setupComplete: true, + isFirstRun: false, + skipClaudeSetup: false, + theme: 'dark', + sidebarOpen: true, + chatHistoryOpen: false, + kanbanCardDetailLevel: 'standard', + maxConcurrency: 3, + defaultSkipTests: true, + enableDependencyBlocking: true, + skipVerificationInAutoMode: false, + useWorktrees: true, + showProfilesOnly: false, + defaultPlanningMode: 'skip', + defaultRequirePlanApproval: false, + defaultAIProfileId: null, + muteDoneSound: false, + phaseModels: { + enhancementModel: { model: 'sonnet' }, + fileDescriptionModel: { model: 'haiku' }, + imageDescriptionModel: { model: 'haiku' }, + validationModel: { model: 'sonnet' }, + specGenerationModel: { model: 'opus' }, + featureGenerationModel: { model: 'sonnet' }, + backlogPlanningModel: { model: 'sonnet' }, + projectAnalysisModel: { model: 'sonnet' }, + suggestionsModel: { model: 'sonnet' }, + }, + enhancementModel: 'sonnet', + validationModel: 'opus', + enabledCursorModels: ['auto', 'composer-1'], + cursorDefaultModel: 'auto', + keyboardShortcuts: { + board: 'K', + agent: 'A', + spec: 'D', + context: 'C', + settings: 'S', + profiles: 'M', + terminal: 'T', + toggleSidebar: '`', + addFeature: 'N', + addContextFile: 'N', + startNext: 'G', + newSession: 'N', + openProject: 'O', + projectPicker: 'P', + cyclePrevProject: 'Q', + cycleNextProject: 'E', + addProfile: 'N', + splitTerminalRight: 'Alt+D', + splitTerminalDown: 'Alt+S', + closeTerminal: 'Alt+W', + tools: 'T', + ideation: 'I', + githubIssues: 'G', + githubPrs: 'R', + newTerminalTab: 'Alt+T', + }, + aiProfiles: [ + { + id: 'profile-heavy-task', + name: 'Heavy Task', + description: + 'Claude Opus with Ultrathink for complex architecture, migrations, or deep debugging.', + model: 'opus', + thinkingLevel: 'ultrathink', + provider: 'claude', + isBuiltIn: true, + icon: 'Brain', + }, + { + id: 'profile-balanced', + name: 'Balanced', + description: 'Claude Sonnet with medium thinking for typical development tasks.', + model: 'sonnet', + thinkingLevel: 'medium', + provider: 'claude', + isBuiltIn: true, + icon: 'Scale', + }, + { + id: 'profile-quick-edit', + name: 'Quick Edit', + description: 'Claude Haiku for fast, simple edits and minor fixes.', + model: 'haiku', + thinkingLevel: 'none', + provider: 'claude', + isBuiltIn: true, + icon: 'Zap', + }, + { + id: 'profile-cursor-refactoring', + name: 'Cursor Refactoring', + description: 'Cursor Composer 1 for refactoring tasks.', + provider: 'cursor', + cursorModel: 'composer-1', + isBuiltIn: true, + icon: 'Sparkles', + }, + ], + // Default test project using the fixture path - tests can override via route mocking if needed + projects: [ + { + id: 'e2e-default-project', + name: 'E2E Test Project', + path: FIXTURE_PATH, + lastOpened: new Date().toISOString(), + }, + ], + trashedProjects: [], + currentProjectId: 'e2e-default-project', + projectHistory: [], + projectHistoryIndex: 0, + lastProjectDir: TEST_WORKSPACE_DIR, + recentFolders: [], + worktreePanelCollapsed: false, + lastSelectedSessionByProject: {}, + autoLoadClaudeMd: false, + skipSandboxWarning: true, + codexAutoLoadAgents: false, + codexSandboxMode: 'workspace-write', + codexApprovalPolicy: 'on-request', + codexEnableWebSearch: false, + codexEnableImages: true, + codexAdditionalDirs: [], + mcpServers: [], + enableSandboxMode: false, + mcpAutoApproveTools: true, + mcpUnrestrictedTools: true, + promptCustomization: {}, + localStorageMigrated: true, +}; + function setupFixtures() { console.log('Setting up E2E test fixtures...'); console.log(`Workspace root: ${WORKSPACE_ROOT}`); console.log(`Fixture path: ${FIXTURE_PATH}`); + console.log(`Test workspace dir: ${TEST_WORKSPACE_DIR}`); + + // Create test workspace directory for project creation tests + if (!fs.existsSync(TEST_WORKSPACE_DIR)) { + fs.mkdirSync(TEST_WORKSPACE_DIR, { recursive: true }); + console.log(`Created test workspace directory: ${TEST_WORKSPACE_DIR}`); + } // Create fixture directory const specDir = path.dirname(SPEC_FILE_PATH); @@ -43,6 +192,15 @@ function setupFixtures() { fs.writeFileSync(SPEC_FILE_PATH, SPEC_CONTENT); console.log(`Created fixture file: ${SPEC_FILE_PATH}`); + // Reset server settings.json to a clean state for E2E tests + const settingsDir = path.dirname(SERVER_SETTINGS_PATH); + if (!fs.existsSync(settingsDir)) { + fs.mkdirSync(settingsDir, { recursive: true }); + console.log(`Created directory: ${settingsDir}`); + } + fs.writeFileSync(SERVER_SETTINGS_PATH, JSON.stringify(E2E_SETTINGS, null, 2)); + console.log(`Reset server settings: ${SERVER_SETTINGS_PATH}`); + console.log('E2E test fixtures setup complete!'); } diff --git a/apps/ui/src/app.tsx b/apps/ui/src/app.tsx index 47dbc647..31a71e85 100644 --- a/apps/ui/src/app.tsx +++ b/apps/ui/src/app.tsx @@ -3,7 +3,7 @@ import { RouterProvider } from '@tanstack/react-router'; import { createLogger } from '@automaker/utils/logger'; import { router } from './utils/router'; import { SplashScreen } from './components/splash-screen'; -import { useSettingsMigration } from './hooks/use-settings-migration'; +import { useSettingsSync } from './hooks/use-settings-sync'; import { useCursorStatusInit } from './hooks/use-cursor-status-init'; import './styles/global.css'; import './styles/theme-imports'; @@ -32,10 +32,14 @@ export default function App() { } }, []); - // Run settings migration on startup (localStorage -> file storage) - const migrationState = useSettingsMigration(); - if (migrationState.migrated) { - logger.info('Settings migrated to file storage'); + // Settings are now loaded in __root.tsx after successful session verification + // This ensures a unified flow: verify session → load settings → redirect + // We no longer block router rendering here - settings loading happens in __root.tsx + + // Sync settings changes back to server (API-first persistence) + const settingsSyncState = useSettingsSync(); + if (settingsSyncState.error) { + logger.error('Settings sync error:', settingsSyncState.error); } // Initialize Cursor CLI status at startup diff --git a/apps/ui/src/components/codex-usage-popover.tsx b/apps/ui/src/components/codex-usage-popover.tsx new file mode 100644 index 00000000..f6005b6a --- /dev/null +++ b/apps/ui/src/components/codex-usage-popover.tsx @@ -0,0 +1,405 @@ +import { useState, useEffect, useMemo, useCallback } from 'react'; +import { Popover, PopoverContent, PopoverTrigger } from '@/components/ui/popover'; +import { Button } from '@/components/ui/button'; +import { RefreshCw, AlertTriangle, CheckCircle, XCircle, Clock, ExternalLink } from 'lucide-react'; +import { cn } from '@/lib/utils'; +import { getElectronAPI } from '@/lib/electron'; +import { useAppStore } from '@/store/app-store'; +import { useSetupStore } from '@/store/setup-store'; + +// Error codes for distinguishing failure modes +const ERROR_CODES = { + API_BRIDGE_UNAVAILABLE: 'API_BRIDGE_UNAVAILABLE', + AUTH_ERROR: 'AUTH_ERROR', + NOT_AVAILABLE: 'NOT_AVAILABLE', + UNKNOWN: 'UNKNOWN', +} as const; + +type ErrorCode = (typeof ERROR_CODES)[keyof typeof ERROR_CODES]; + +type UsageError = { + code: ErrorCode; + message: string; +}; + +// Fixed refresh interval (45 seconds) +const REFRESH_INTERVAL_SECONDS = 45; + +// Helper to format reset time +function formatResetTime(unixTimestamp: number): string { + const date = new Date(unixTimestamp * 1000); + const now = new Date(); + const diff = date.getTime() - now.getTime(); + + // If less than 1 hour, show minutes + if (diff < 3600000) { + const mins = Math.ceil(diff / 60000); + return `Resets in ${mins}m`; + } + + // If less than 24 hours, show hours and minutes + if (diff < 86400000) { + const hours = Math.floor(diff / 3600000); + const mins = Math.ceil((diff % 3600000) / 60000); + return `Resets in ${hours}h ${mins > 0 ? `${mins}m` : ''}`; + } + + // Otherwise show date + return `Resets ${date.toLocaleDateString()} at ${date.toLocaleTimeString([], { hour: '2-digit', minute: '2-digit' })}`; +} + +// Helper to format window duration +function getWindowLabel(durationMins: number): { title: string; subtitle: string } { + if (durationMins < 60) { + return { title: `${durationMins}min Window`, subtitle: 'Rate limit' }; + } + if (durationMins < 1440) { + const hours = Math.round(durationMins / 60); + return { title: `${hours}h Window`, subtitle: 'Rate limit' }; + } + const days = Math.round(durationMins / 1440); + return { title: `${days}d Window`, subtitle: 'Rate limit' }; +} + +export function CodexUsagePopover() { + const { codexUsage, codexUsageLastUpdated, setCodexUsage } = useAppStore(); + const codexAuthStatus = useSetupStore((state) => state.codexAuthStatus); + const [open, setOpen] = useState(false); + const [loading, setLoading] = useState(false); + const [error, setError] = useState(null); + + // Check if Codex is authenticated + const isCodexAuthenticated = codexAuthStatus?.authenticated; + + // Check if data is stale (older than 2 minutes) + const isStale = useMemo(() => { + return !codexUsageLastUpdated || Date.now() - codexUsageLastUpdated > 2 * 60 * 1000; + }, [codexUsageLastUpdated]); + + const fetchUsage = useCallback( + async (isAutoRefresh = false) => { + if (!isAutoRefresh) setLoading(true); + setError(null); + try { + const api = getElectronAPI(); + if (!api.codex) { + setError({ + code: ERROR_CODES.API_BRIDGE_UNAVAILABLE, + message: 'Codex API bridge not available', + }); + return; + } + const data = await api.codex.getUsage(); + if ('error' in data) { + // Check if it's the "not available" error + if ( + data.message?.includes('not available') || + data.message?.includes('does not provide') + ) { + setError({ + code: ERROR_CODES.NOT_AVAILABLE, + message: data.message || data.error, + }); + } else { + setError({ + code: ERROR_CODES.AUTH_ERROR, + message: data.message || data.error, + }); + } + return; + } + setCodexUsage(data); + } catch (err) { + setError({ + code: ERROR_CODES.UNKNOWN, + message: err instanceof Error ? err.message : 'Failed to fetch usage', + }); + } finally { + if (!isAutoRefresh) setLoading(false); + } + }, + [setCodexUsage] + ); + + // Auto-fetch on mount if data is stale (only if authenticated) + useEffect(() => { + if (isStale && isCodexAuthenticated) { + fetchUsage(true); + } + }, [isStale, isCodexAuthenticated, fetchUsage]); + + useEffect(() => { + // Skip if not authenticated + if (!isCodexAuthenticated) return; + + // Initial fetch when opened + if (open) { + if (!codexUsage || isStale) { + fetchUsage(); + } + } + + // Auto-refresh interval (only when open) + let intervalId: NodeJS.Timeout | null = null; + if (open) { + intervalId = setInterval(() => { + fetchUsage(true); + }, REFRESH_INTERVAL_SECONDS * 1000); + } + + return () => { + if (intervalId) clearInterval(intervalId); + }; + }, [open, codexUsage, isStale, isCodexAuthenticated, fetchUsage]); + + // Derived status color/icon helper + const getStatusInfo = (percentage: number) => { + if (percentage >= 75) return { color: 'text-red-500', icon: XCircle, bg: 'bg-red-500' }; + if (percentage >= 50) + return { color: 'text-orange-500', icon: AlertTriangle, bg: 'bg-orange-500' }; + return { color: 'text-green-500', icon: CheckCircle, bg: 'bg-green-500' }; + }; + + // Helper component for the progress bar + const ProgressBar = ({ percentage, colorClass }: { percentage: number; colorClass: string }) => ( +
+
+
+ ); + + const UsageCard = ({ + title, + subtitle, + percentage, + resetText, + isPrimary = false, + stale = false, + }: { + title: string; + subtitle: string; + percentage: number; + resetText?: string; + isPrimary?: boolean; + stale?: boolean; + }) => { + const isValidPercentage = + typeof percentage === 'number' && !isNaN(percentage) && isFinite(percentage); + const safePercentage = isValidPercentage ? percentage : 0; + + const status = getStatusInfo(safePercentage); + const StatusIcon = status.icon; + + return ( +
+
+
+

{title}

+

{subtitle}

+
+ {isValidPercentage ? ( +
+ + + {Math.round(safePercentage)}% + +
+ ) : ( + N/A + )} +
+ + {resetText && ( +
+

+ + {resetText} +

+
+ )} +
+ ); + }; + + // Header Button + const maxPercentage = codexUsage?.rateLimits + ? Math.max( + codexUsage.rateLimits.primary?.usedPercent || 0, + codexUsage.rateLimits.secondary?.usedPercent || 0 + ) + : 0; + + const getProgressBarColor = (percentage: number) => { + if (percentage >= 80) return 'bg-red-500'; + if (percentage >= 50) return 'bg-yellow-500'; + return 'bg-green-500'; + }; + + const trigger = ( + + ); + + return ( + + {trigger} + + {/* Header */} +
+
+ Codex Usage +
+ {error && error.code !== ERROR_CODES.NOT_AVAILABLE && ( + + )} +
+ + {/* Content */} +
+ {error ? ( +
+ +
+

+ {error.code === ERROR_CODES.NOT_AVAILABLE ? 'Usage not available' : error.message} +

+

+ {error.code === ERROR_CODES.API_BRIDGE_UNAVAILABLE ? ( + 'Ensure the Electron bridge is running or restart the app' + ) : error.code === ERROR_CODES.NOT_AVAILABLE ? ( + <> + Codex CLI doesn't provide usage statistics. Check{' '} + + OpenAI dashboard + {' '} + for usage details. + + ) : ( + <> + Make sure Codex CLI is installed and authenticated via{' '} + codex login + + )} +

+
+
+ ) : !codexUsage ? ( + // Loading state +
+ +

Loading usage data...

+
+ ) : codexUsage.rateLimits ? ( + <> + {/* Primary Window Card */} + {codexUsage.rateLimits.primary && ( + + )} + + {/* Secondary Window Card */} + {codexUsage.rateLimits.secondary && ( + + )} + + {/* Plan Type */} + {codexUsage.rateLimits.planType && ( +
+

+ Plan:{' '} + + {codexUsage.rateLimits.planType.charAt(0).toUpperCase() + + codexUsage.rateLimits.planType.slice(1)} + +

+
+ )} + + ) : ( +
+ +

No usage data available

+
+ )} +
+ + {/* Footer */} +
+ + OpenAI Dashboard + + + Updates every minute +
+
+
+ ); +} diff --git a/apps/ui/src/components/dialogs/file-browser-dialog.tsx b/apps/ui/src/components/dialogs/file-browser-dialog.tsx index ce09f63b..53c20daa 100644 --- a/apps/ui/src/components/dialogs/file-browser-dialog.tsx +++ b/apps/ui/src/components/dialogs/file-browser-dialog.tsx @@ -11,10 +11,10 @@ import { import { Button } from '@/components/ui/button'; import { PathInput } from '@/components/ui/path-input'; import { Kbd, KbdGroup } from '@/components/ui/kbd'; -import { getJSON, setJSON } from '@/lib/storage'; import { getDefaultWorkspaceDirectory, saveLastProjectDirectory } from '@/lib/workspace-config'; import { useOSDetection } from '@/hooks'; import { apiPost } from '@/lib/api-fetch'; +import { useAppStore } from '@/store/app-store'; interface DirectoryEntry { name: string; @@ -40,28 +40,8 @@ interface FileBrowserDialogProps { initialPath?: string; } -const RECENT_FOLDERS_KEY = 'file-browser-recent-folders'; const MAX_RECENT_FOLDERS = 5; -function getRecentFolders(): string[] { - return getJSON(RECENT_FOLDERS_KEY) ?? []; -} - -function addRecentFolder(path: string): void { - const recent = getRecentFolders(); - // Remove if already exists, then add to front - const filtered = recent.filter((p) => p !== path); - const updated = [path, ...filtered].slice(0, MAX_RECENT_FOLDERS); - setJSON(RECENT_FOLDERS_KEY, updated); -} - -function removeRecentFolder(path: string): string[] { - const recent = getRecentFolders(); - const updated = recent.filter((p) => p !== path); - setJSON(RECENT_FOLDERS_KEY, updated); - return updated; -} - export function FileBrowserDialog({ open, onOpenChange, @@ -78,20 +58,20 @@ export function FileBrowserDialog({ const [loading, setLoading] = useState(false); const [error, setError] = useState(''); const [warning, setWarning] = useState(''); - const [recentFolders, setRecentFolders] = useState([]); - // Load recent folders when dialog opens - useEffect(() => { - if (open) { - setRecentFolders(getRecentFolders()); - } - }, [open]); + // Use recent folders from app store (synced via API) + const recentFolders = useAppStore((s) => s.recentFolders); + const setRecentFolders = useAppStore((s) => s.setRecentFolders); + const addRecentFolder = useAppStore((s) => s.addRecentFolder); - const handleRemoveRecent = useCallback((e: React.MouseEvent, path: string) => { - e.stopPropagation(); - const updated = removeRecentFolder(path); - setRecentFolders(updated); - }, []); + const handleRemoveRecent = useCallback( + (e: React.MouseEvent, path: string) => { + e.stopPropagation(); + const updated = recentFolders.filter((p) => p !== path); + setRecentFolders(updated); + }, + [recentFolders, setRecentFolders] + ); const browseDirectory = useCallback(async (dirPath?: string) => { setLoading(true); diff --git a/apps/ui/src/components/dialogs/sandbox-rejection-screen.tsx b/apps/ui/src/components/dialogs/sandbox-rejection-screen.tsx index 2e830f15..1e057836 100644 --- a/apps/ui/src/components/dialogs/sandbox-rejection-screen.tsx +++ b/apps/ui/src/components/dialogs/sandbox-rejection-screen.tsx @@ -5,34 +5,16 @@ * Prompts them to either restart the app in a container or reload to try again. */ -import { useState } from 'react'; -import { createLogger } from '@automaker/utils/logger'; -import { ShieldX, RefreshCw, Container, Copy, Check } from 'lucide-react'; - -const logger = createLogger('SandboxRejectionScreen'); +import { ShieldX, RefreshCw } from 'lucide-react'; import { Button } from '@/components/ui/button'; -const DOCKER_COMMAND = 'npm run dev:docker'; - export function SandboxRejectionScreen() { - const [copied, setCopied] = useState(false); - const handleReload = () => { // Clear the rejection state and reload sessionStorage.removeItem('automaker-sandbox-denied'); window.location.reload(); }; - const handleCopy = async () => { - try { - await navigator.clipboard.writeText(DOCKER_COMMAND); - setCopied(true); - setTimeout(() => setCopied(false), 2000); - } catch (err) { - logger.error('Failed to copy:', err); - } - }; - return (
@@ -49,32 +31,10 @@ export function SandboxRejectionScreen() {

-
-
- -
-

Run in Docker (Recommended)

-

- Run Automaker in a containerized sandbox environment: -

-
- {DOCKER_COMMAND} - -
-
-
-
+

+ For safer operation, consider running Automaker in Docker. See the README for + instructions. +

-
-

- For safer operation, consider running Automaker in Docker: -

-
- {DOCKER_COMMAND} - -
-
+

+ For safer operation, consider running Automaker in Docker. See the README for + instructions. +

diff --git a/apps/ui/src/components/layout/sidebar/components/automaker-logo.tsx b/apps/ui/src/components/layout/sidebar/components/automaker-logo.tsx index ac8ed22d..2a7363f2 100644 --- a/apps/ui/src/components/layout/sidebar/components/automaker-logo.tsx +++ b/apps/ui/src/components/layout/sidebar/components/automaker-logo.tsx @@ -1,13 +1,30 @@ import type { NavigateOptions } from '@tanstack/react-router'; import { cn } from '@/lib/utils'; +import { useOSDetection } from '@/hooks/use-os-detection'; interface AutomakerLogoProps { sidebarOpen: boolean; navigate: (opts: NavigateOptions) => void; } +function getOSAbbreviation(os: string): string { + switch (os) { + case 'mac': + return 'M'; + case 'windows': + return 'W'; + case 'linux': + return 'L'; + default: + return '?'; + } +} + export function AutomakerLogo({ sidebarOpen, navigate }: AutomakerLogoProps) { const appVersion = typeof __APP_VERSION__ !== 'undefined' ? __APP_VERSION__ : '0.0.0'; + const { os } = useOSDetection(); + const appMode = import.meta.env.VITE_APP_MODE || '?'; + const versionSuffix = `${getOSAbbreviation(os)}${appMode}`; return (
navigate({ to: '/' })} data-testid="logo-button" > - {!sidebarOpen ? ( -
- - - - - - - - - - - - + + + - - - - - - - v{appVersion} - -
- ) : ( -
+ + + + + + + + + + + + + + + + v{appVersion} {versionSuffix} + +
+ + {/* Expanded logo - only shown when sidebar is open on large screens */} + {sidebarOpen && ( +
- v{appVersion} + v{appVersion} {versionSuffix}
)} diff --git a/apps/ui/src/components/layout/sidebar/components/sidebar-header.tsx b/apps/ui/src/components/layout/sidebar/components/sidebar-header.tsx index d209988e..bd47d9d2 100644 --- a/apps/ui/src/components/layout/sidebar/components/sidebar-header.tsx +++ b/apps/ui/src/components/layout/sidebar/components/sidebar-header.tsx @@ -21,8 +21,10 @@ export function SidebarHeader({ sidebarOpen, navigate }: SidebarHeaderProps) { 'bg-gradient-to-b from-transparent to-background/5', 'flex items-center', sidebarOpen ? 'px-3 lg:px-5 justify-start' : 'px-3 justify-center', - // Add left padding on macOS to avoid overlapping with traffic light buttons - isMac && 'pt-4 pl-20' + // Add left padding on macOS to avoid overlapping with traffic light buttons (only when expanded) + isMac && sidebarOpen && 'pt-4 pl-20', + // Smaller top padding on macOS when collapsed + isMac && !sidebarOpen && 'pt-4' )} > diff --git a/apps/ui/src/components/layout/sidebar/components/sidebar-navigation.tsx b/apps/ui/src/components/layout/sidebar/components/sidebar-navigation.tsx index 002530f5..65b1bc13 100644 --- a/apps/ui/src/components/layout/sidebar/components/sidebar-navigation.tsx +++ b/apps/ui/src/components/layout/sidebar/components/sidebar-navigation.tsx @@ -52,7 +52,8 @@ export function SidebarNavigation({ + ); + + // Determine which tabs to show + const showClaudeTab = isClaudeCliVerified; + const showCodexTab = isCodexAuthenticated; + + return ( + + {trigger} + + setActiveTab(v as 'claude' | 'codex')}> + {/* Tabs Header */} + {showClaudeTab && showCodexTab && ( + + + + Claude + + + + Codex + + + )} + + {/* Claude Tab Content */} + + {/* Header */} +
+
+ + Claude Usage +
+ {claudeError && ( + + )} +
+ + {/* Content */} +
+ {claudeError ? ( +
+ +
+

{claudeError.message}

+

+ {claudeError.code === ERROR_CODES.API_BRIDGE_UNAVAILABLE ? ( + 'Ensure the Electron bridge is running or restart the app' + ) : ( + <> + Make sure Claude CLI is installed and authenticated via{' '} + claude login + + )} +

+
+
+ ) : !claudeUsage ? ( +
+ +

Loading usage data...

+
+ ) : ( + <> + + +
+ + +
+ + {claudeUsage.costLimit && claudeUsage.costLimit > 0 && ( + 0 + ? ((claudeUsage.costUsed ?? 0) / claudeUsage.costLimit) * 100 + : 0 + } + stale={isClaudeStale} + /> + )} + + )} +
+ + {/* Footer */} +
+ + Claude Status + + Updates every minute +
+
+ + {/* Codex Tab Content */} + + {/* Header */} +
+
+ + Codex Usage +
+ {codexError && codexError.code !== ERROR_CODES.NOT_AVAILABLE && ( + + )} +
+ + {/* Content */} +
+ {codexError ? ( +
+ +
+

+ {codexError.code === ERROR_CODES.NOT_AVAILABLE + ? 'Usage not available' + : codexError.message} +

+

+ {codexError.code === ERROR_CODES.API_BRIDGE_UNAVAILABLE ? ( + 'Ensure the Electron bridge is running or restart the app' + ) : codexError.code === ERROR_CODES.NOT_AVAILABLE ? ( + <> + Codex CLI doesn't provide usage statistics. Check{' '} + + OpenAI dashboard + {' '} + for usage details. + + ) : ( + <> + Make sure Codex CLI is installed and authenticated via{' '} + codex login + + )} +

+
+
+ ) : !codexUsage ? ( +
+ +

Loading usage data...

+
+ ) : codexUsage.rateLimits ? ( + <> + {codexUsage.rateLimits.primary && ( + + )} + + {codexUsage.rateLimits.secondary && ( + + )} + + {codexUsage.rateLimits.planType && ( +
+

+ Plan:{' '} + + {codexUsage.rateLimits.planType.charAt(0).toUpperCase() + + codexUsage.rateLimits.planType.slice(1)} + +

+
+ )} + + ) : ( +
+ +

No usage data available

+
+ )} +
+ + {/* Footer */} +
+ + OpenAI Dashboard + + Updates every minute +
+
+
+
+
+ ); +} diff --git a/apps/ui/src/components/views/agent-view.tsx b/apps/ui/src/components/views/agent-view.tsx index b70e32d9..be56f70d 100644 --- a/apps/ui/src/components/views/agent-view.tsx +++ b/apps/ui/src/components/views/agent-view.tsx @@ -161,7 +161,6 @@ export function AgentView() { isConnected={isConnected} isProcessing={isProcessing} currentTool={currentTool} - agentError={agentError} messagesCount={messages.length} showSessionManager={showSessionManager} onToggleSessionManager={() => setShowSessionManager(!showSessionManager)} diff --git a/apps/ui/src/components/views/agent-view/components/agent-header.tsx b/apps/ui/src/components/views/agent-view/components/agent-header.tsx index ee020ac5..a6152736 100644 --- a/apps/ui/src/components/views/agent-view/components/agent-header.tsx +++ b/apps/ui/src/components/views/agent-view/components/agent-header.tsx @@ -7,7 +7,6 @@ interface AgentHeaderProps { isConnected: boolean; isProcessing: boolean; currentTool: string | null; - agentError: string | null; messagesCount: number; showSessionManager: boolean; onToggleSessionManager: () => void; @@ -20,7 +19,6 @@ export function AgentHeader({ isConnected, isProcessing, currentTool, - agentError, messagesCount, showSessionManager, onToggleSessionManager, @@ -61,7 +59,6 @@ export function AgentHeader({ {currentTool}
)} - {agentError && {agentError}} {currentSessionId && messagesCount > 0 && (
)} + {/* Auto Mode Settings Dialog */} + + + + +
+ + + + + + setEnhancementMode('improve')}> + Improve Clarity + + setEnhancementMode('technical')}> + Add Technical Details + + setEnhancementMode('simplify')}> + Simplify + + setEnhancementMode('acceptance')}> + Add Acceptance Criteria + + + + + - - - setEnhancementMode('improve')}> - Improve Clarity - - setEnhancementMode('technical')}> - Add Technical Details - - setEnhancementMode('simplify')}> - Simplify - - setEnhancementMode('acceptance')}> - Add Acceptance Criteria - - - - + +
+
+ + - + {/* AI & Execution Section */} +
+
+ + AI & Execution
-
- - setNewFeature({ ...newFeature, category: value })} - suggestions={categorySuggestions} - placeholder="e.g., Core, UI, API" - data-testid="feature-category-input" - /> + +
+
+ + { + onOpenChange(false); + navigate({ to: '/profiles' }); + }} + testIdPrefix="add-feature-profile" + /> +
+
+ + +
- {useWorktrees && ( - setNewFeature({ ...newFeature, branchName: value })} + +
+ {modelSupportsPlanningMode && ( +
+ + +
+ )} +
+ +
+
+ setSkipTests(!checked)} + data-testid="add-feature-skip-tests-checkbox" + /> + +
+ {modelSupportsPlanningMode && ( +
+ setRequirePlanApproval(!!checked)} + disabled={planningMode === 'skip' || planningMode === 'lite'} + data-testid="add-feature-require-approval-checkbox" + /> + +
+ )} +
+
+
+
+ + {/* Organization Section */} +
+
+ + Organization +
+ +
+
+ + +
+
+ + +
+
+ + {/* Work Mode Selector */} +
+ - )} +
+
+
- {/* Priority Selector */} - setNewFeature({ ...newFeature, priority })} - testIdPrefix="priority" - /> - - - {/* Model Tab */} - - {/* Show Advanced Options Toggle */} - {showProfilesOnly && ( -
-
-

Simple Mode Active

-

- Only showing AI profiles. Advanced model tweaking is hidden. -

-
- -
- )} - - {/* Quick Select Profile Section */} - { - onOpenChange(false); - navigate({ to: '/profiles' }); - }} - /> - - {/* Separator */} - {aiProfiles.length > 0 && (!showProfilesOnly || showAdvancedOptions) && ( -
- )} - - {/* Claude Models Section */} - {(!showProfilesOnly || showAdvancedOptions) && ( - <> - - {newModelAllowsThinking && ( - - setNewFeature({ ...newFeature, thinkingLevel: level }) - } - /> - )} - - )} - - - {/* Options Tab */} - - {/* Planning Mode Section */} - - -
- - {/* Testing Section */} - setNewFeature({ ...newFeature, skipTests })} - /> - - + + +
+

Version History

+

+ Click a version to restore it +

+
+
+ {[...(feature.descriptionHistory || [])] + .reverse() + .map((entry: DescriptionHistoryEntry, index: number) => { + const isCurrentVersion = + entry.description === editingFeature.description; + const date = new Date(entry.timestamp); + const formattedDate = date.toLocaleDateString(undefined, { + month: 'short', + day: 'numeric', + hour: '2-digit', + minute: '2-digit', + }); + const sourceLabel = + entry.source === 'initial' + ? 'Original' + : entry.source === 'enhance' + ? `Enhanced (${entry.enhancementMode || 'improve'})` + : 'Edited'; + + return ( + + ); + })} +
+
+ + )} +
+ onChange={(value) => { setEditingFeature({ ...editingFeature, description: value, - }) - } + }); + // Track that this change was a manual edit (unless already enhanced) + if (!descriptionChangeSource || descriptionChangeSource === 'edit') { + setDescriptionChangeSource('edit'); + } + }} images={editingFeature.imagePaths ?? []} onImagesChange={(images) => setEditingFeature({ @@ -338,6 +463,7 @@ export function EditFeatureDialog({ data-testid="edit-feature-description" />
+
-
- - - + + +
+ + + + + + setEnhancementMode('improve')}> + Improve Clarity + + setEnhancementMode('technical')}> + Add Technical Details + + setEnhancementMode('simplify')}> + Simplify + + setEnhancementMode('acceptance')}> + Add Acceptance Criteria + + + + + - - - setEnhancementMode('improve')}> - Improve Clarity - - setEnhancementMode('technical')}> - Add Technical Details - - setEnhancementMode('simplify')}> - Simplify - - setEnhancementMode('acceptance')}> - Add Acceptance Criteria - - - - + +
+
+ +
- + {/* AI & Execution Section */} +
+
+ + AI & Execution
-
- - - setEditingFeature({ - ...editingFeature, - category: value, - }) - } - suggestions={categorySuggestions} - placeholder="e.g., Core, UI, API" - data-testid="edit-feature-category" - /> + +
+
+ + { + onClose(); + navigate({ to: '/profiles' }); + }} + testIdPrefix="edit-feature-profile" + /> +
+
+ + +
- {useWorktrees && ( - + {modelSupportsPlanningMode && ( +
+ + +
+ )} +
+ +
+
+ + setEditingFeature({ ...editingFeature, skipTests: !checked }) + } + data-testid="edit-feature-skip-tests-checkbox" + /> + +
+ {modelSupportsPlanningMode && ( +
+ setRequirePlanApproval(!!checked)} + disabled={planningMode === 'skip' || planningMode === 'lite'} + data-testid="edit-feature-require-approval-checkbox" + /> + +
+ )} +
+
+
+
+ + {/* Organization Section */} +
+
+ + Organization +
+ +
+
+ + + setEditingFeature({ + ...editingFeature, + category: value, + }) + } + suggestions={categorySuggestions} + placeholder="e.g., Core, UI, API" + data-testid="edit-feature-category" + /> +
+
+ + + setEditingFeature({ + ...editingFeature, + priority, + }) + } + testIdPrefix="edit-priority" + /> +
+
+ + {/* Work Mode Selector */} +
+ setEditingFeature({ @@ -431,110 +698,12 @@ export function EditFeatureDialog({ branchCardCounts={branchCardCounts} currentBranch={currentBranch} disabled={editingFeature.status !== 'backlog'} - testIdPrefix="edit-feature" + testIdPrefix="edit-feature-work-mode" /> - )} +
+
+ - {/* Priority Selector */} - - setEditingFeature({ - ...editingFeature, - priority, - }) - } - testIdPrefix="edit-priority" - /> -
- - {/* Model Tab */} - - {/* Show Advanced Options Toggle */} - {showProfilesOnly && ( -
-
-

Simple Mode Active

-

- Only showing AI profiles. Advanced model tweaking is hidden. -

-
- -
- )} - - {/* Quick Select Profile Section */} - - - {/* Separator */} - {aiProfiles.length > 0 && (!showProfilesOnly || showEditAdvancedOptions) && ( -
- )} - - {/* Claude Models Section */} - {(!showProfilesOnly || showEditAdvancedOptions) && ( - <> - - {editModelAllowsThinking && ( - - setEditingFeature({ - ...editingFeature, - thinkingLevel: level, - }) - } - testIdPrefix="edit-thinking-level" - /> - )} - - )} - - - {/* Options Tab */} - - {/* Planning Mode Section */} - - -
- - {/* Testing Section */} - setEditingFeature({ ...editingFeature, skipTests })} - testIdPrefix="edit" - /> - - +
@@ -136,7 +158,7 @@ export function ModelSelector({
@@ -188,6 +210,67 @@ export function ModelSelector({
)} + + {/* Codex Models */} + {selectedProvider === 'codex' && ( +
+ {/* Warning when Codex CLI is not available */} + {!isCodexAvailable && ( +
+ +
+ Codex CLI is not installed or authenticated. Configure it in Settings → AI + Providers. +
+
+ )} + +
+ + + CLI + +
+
+ {CODEX_MODELS.map((option) => { + const isSelected = selectedModel === option.id; + return ( + + ); + })} +
+
+ )} ); } diff --git a/apps/ui/src/components/views/board-view/shared/planning-mode-select.tsx b/apps/ui/src/components/views/board-view/shared/planning-mode-select.tsx index 95407c84..b0966cee 100644 --- a/apps/ui/src/components/views/board-view/shared/planning-mode-select.tsx +++ b/apps/ui/src/components/views/board-view/shared/planning-mode-select.tsx @@ -19,6 +19,8 @@ interface PlanningModeSelectProps { testIdPrefix?: string; className?: string; disabled?: boolean; + /** If true, only renders the dropdown without description or checkbox */ + compact?: boolean; } const modes = [ @@ -81,47 +83,58 @@ export function PlanningModeSelect({ testIdPrefix = 'planning-mode', className, disabled = false, + compact = false, }: PlanningModeSelectProps) { const selectedMode = modes.find((m) => m.value === mode); // Disable approval checkbox for skip/lite modes since they don't use planning const isApprovalDisabled = disabled || mode === 'skip' || mode === 'lite'; + const selectDropdown = ( + + ); + + // Compact mode - just the dropdown + if (compact) { + return
{selectDropdown}
; + } + + // Full mode with description and optional checkbox return (
- + {selectDropdown} {selectedMode &&

{selectedMode.description}

} {onRequireApprovalChange && (
diff --git a/apps/ui/src/components/views/board-view/shared/priority-selector.tsx b/apps/ui/src/components/views/board-view/shared/priority-selector.tsx index e6f805ad..0e770cf9 100644 --- a/apps/ui/src/components/views/board-view/shared/priority-selector.tsx +++ b/apps/ui/src/components/views/board-view/shared/priority-selector.tsx @@ -1,4 +1,3 @@ -import { Label } from '@/components/ui/label'; import { cn } from '@/lib/utils'; interface PrioritySelectorProps { @@ -13,49 +12,46 @@ export function PrioritySelector({ testIdPrefix = 'priority', }: PrioritySelectorProps) { return ( -
- -
- - - -
+
+ + +
); } diff --git a/apps/ui/src/components/views/board-view/shared/profile-quick-select.tsx b/apps/ui/src/components/views/board-view/shared/profile-quick-select.tsx index 674d1455..6f74510d 100644 --- a/apps/ui/src/components/views/board-view/shared/profile-quick-select.tsx +++ b/apps/ui/src/components/views/board-view/shared/profile-quick-select.tsx @@ -2,7 +2,12 @@ import { Label } from '@/components/ui/label'; import { Brain, UserCircle, Terminal } from 'lucide-react'; import { cn } from '@/lib/utils'; import type { ModelAlias, ThinkingLevel, AIProfile, CursorModelId } from '@automaker/types'; -import { CURSOR_MODEL_MAP, profileHasThinking, PROVIDER_PREFIXES } from '@automaker/types'; +import { + CURSOR_MODEL_MAP, + profileHasThinking, + PROVIDER_PREFIXES, + getCodexModelLabel, +} from '@automaker/types'; import { PROFILE_ICONS } from './model-constants'; /** @@ -14,6 +19,9 @@ function getProfileModelDisplay(profile: AIProfile): string { const modelConfig = CURSOR_MODEL_MAP[cursorModel]; return modelConfig?.label || cursorModel; } + if (profile.provider === 'codex') { + return getCodexModelLabel(profile.codexModel || 'codex-gpt-5.2-codex'); + } // Claude return profile.model || 'sonnet'; } @@ -26,6 +34,10 @@ function getProfileThinkingDisplay(profile: AIProfile): string | null { // For Cursor, thinking is embedded in the model return profileHasThinking(profile) ? 'thinking' : null; } + if (profile.provider === 'codex') { + // For Codex, thinking is embedded in the model + return profileHasThinking(profile) ? 'thinking' : null; + } // Claude return profile.thinkingLevel && profile.thinkingLevel !== 'none' ? profile.thinkingLevel : null; } diff --git a/apps/ui/src/components/views/board-view/shared/profile-select.tsx b/apps/ui/src/components/views/board-view/shared/profile-select.tsx index d586ff6c..c3c68a1c 100644 --- a/apps/ui/src/components/views/board-view/shared/profile-select.tsx +++ b/apps/ui/src/components/views/board-view/shared/profile-select.tsx @@ -8,7 +8,12 @@ import { import { Brain, Terminal } from 'lucide-react'; import { cn } from '@/lib/utils'; import type { ModelAlias, ThinkingLevel, AIProfile, CursorModelId } from '@automaker/types'; -import { CURSOR_MODEL_MAP, profileHasThinking, PROVIDER_PREFIXES } from '@automaker/types'; +import { + CURSOR_MODEL_MAP, + profileHasThinking, + PROVIDER_PREFIXES, + getCodexModelLabel, +} from '@automaker/types'; import { PROFILE_ICONS } from './model-constants'; /** @@ -20,6 +25,9 @@ function getProfileModelDisplay(profile: AIProfile): string { const modelConfig = CURSOR_MODEL_MAP[cursorModel]; return modelConfig?.label || cursorModel; } + if (profile.provider === 'codex') { + return getCodexModelLabel(profile.codexModel || 'codex-gpt-5.2-codex'); + } // Claude return profile.model || 'sonnet'; } @@ -32,6 +40,10 @@ function getProfileThinkingDisplay(profile: AIProfile): string | null { // For Cursor, thinking is embedded in the model return profileHasThinking(profile) ? 'thinking' : null; } + if (profile.provider === 'codex') { + // For Codex, thinking is embedded in the model + return profileHasThinking(profile) ? 'thinking' : null; + } // Claude return profile.thinkingLevel && profile.thinkingLevel !== 'none' ? profile.thinkingLevel : null; } diff --git a/apps/ui/src/components/views/board-view/shared/profile-typeahead.tsx b/apps/ui/src/components/views/board-view/shared/profile-typeahead.tsx new file mode 100644 index 00000000..4080676c --- /dev/null +++ b/apps/ui/src/components/views/board-view/shared/profile-typeahead.tsx @@ -0,0 +1,237 @@ +import * as React from 'react'; +import { Check, ChevronsUpDown, UserCircle, Settings2 } from 'lucide-react'; +import { cn } from '@/lib/utils'; +import { Button } from '@/components/ui/button'; +import { + Command, + CommandEmpty, + CommandGroup, + CommandInput, + CommandItem, + CommandList, + CommandSeparator, +} from '@/components/ui/command'; +import { Popover, PopoverContent, PopoverTrigger } from '@/components/ui/popover'; +import { Badge } from '@/components/ui/badge'; +import type { AIProfile } from '@automaker/types'; +import { CURSOR_MODEL_MAP, profileHasThinking, getCodexModelLabel } from '@automaker/types'; +import { PROVIDER_ICON_COMPONENTS } from '@/components/ui/provider-icon'; + +/** + * Get display string for a profile's model configuration + */ +function getProfileModelDisplay(profile: AIProfile): string { + if (profile.provider === 'cursor') { + const cursorModel = profile.cursorModel || 'auto'; + const modelConfig = CURSOR_MODEL_MAP[cursorModel]; + return modelConfig?.label || cursorModel; + } + if (profile.provider === 'codex') { + return getCodexModelLabel(profile.codexModel || 'codex-gpt-5.2-codex'); + } + if (profile.provider === 'opencode') { + // Extract a short label from the opencode model + const modelId = profile.opencodeModel || ''; + if (modelId.includes('/')) { + const parts = modelId.split('/'); + return parts[parts.length - 1].split('.')[0] || modelId; + } + return modelId; + } + // Claude + return profile.model || 'sonnet'; +} + +/** + * Get display string for a profile's thinking configuration + */ +function getProfileThinkingDisplay(profile: AIProfile): string | null { + if (profile.provider === 'cursor' || profile.provider === 'codex') { + return profileHasThinking(profile) ? 'thinking' : null; + } + // Claude + return profile.thinkingLevel && profile.thinkingLevel !== 'none' ? profile.thinkingLevel : null; +} + +interface ProfileTypeaheadProps { + profiles: AIProfile[]; + selectedProfileId?: string; + onSelect: (profile: AIProfile) => void; + placeholder?: string; + className?: string; + disabled?: boolean; + showManageLink?: boolean; + onManageLinkClick?: () => void; + testIdPrefix?: string; +} + +export function ProfileTypeahead({ + profiles, + selectedProfileId, + onSelect, + placeholder = 'Select profile...', + className, + disabled = false, + showManageLink = false, + onManageLinkClick, + testIdPrefix = 'profile-typeahead', +}: ProfileTypeaheadProps) { + const [open, setOpen] = React.useState(false); + const [inputValue, setInputValue] = React.useState(''); + const [triggerWidth, setTriggerWidth] = React.useState(0); + const triggerRef = React.useRef(null); + + const selectedProfile = React.useMemo( + () => profiles.find((p) => p.id === selectedProfileId), + [profiles, selectedProfileId] + ); + + // Update trigger width when component mounts or value changes + React.useEffect(() => { + if (triggerRef.current) { + const updateWidth = () => { + setTriggerWidth(triggerRef.current?.offsetWidth || 0); + }; + updateWidth(); + const resizeObserver = new ResizeObserver(updateWidth); + resizeObserver.observe(triggerRef.current); + return () => { + resizeObserver.disconnect(); + }; + } + }, [selectedProfileId]); + + // Filter profiles based on input + const filteredProfiles = React.useMemo(() => { + if (!inputValue) return profiles; + const lower = inputValue.toLowerCase(); + return profiles.filter( + (p) => + p.name.toLowerCase().includes(lower) || + p.description?.toLowerCase().includes(lower) || + p.provider.toLowerCase().includes(lower) + ); + }, [profiles, inputValue]); + + const handleSelect = (profile: AIProfile) => { + onSelect(profile); + setInputValue(''); + setOpen(false); + }; + + return ( + + + + + + + + + No profile found. + + {filteredProfiles.map((profile) => { + const ProviderIcon = PROVIDER_ICON_COMPONENTS[profile.provider]; + const isSelected = profile.id === selectedProfileId; + const modelDisplay = getProfileModelDisplay(profile); + const thinkingDisplay = getProfileThinkingDisplay(profile); + + return ( + handleSelect(profile)} + className="flex items-center gap-2 py-2" + data-testid={`${testIdPrefix}-option-${profile.id}`} + > +
+ {ProviderIcon ? ( + + ) : ( + + )} +
+ {profile.name} + + {modelDisplay} + {thinkingDisplay && ( + + {thinkingDisplay} + )} + +
+
+
+ {profile.isBuiltIn && ( + + Built-in + + )} + +
+
+ ); + })} +
+ {showManageLink && onManageLinkClick && ( + <> + + + { + setOpen(false); + onManageLinkClick(); + }} + className="text-muted-foreground" + data-testid={`${testIdPrefix}-manage-link`} + > + + Manage AI Profiles + + + + )} +
+
+
+
+ ); +} diff --git a/apps/ui/src/components/views/board-view/shared/reasoning-effort-selector.tsx b/apps/ui/src/components/views/board-view/shared/reasoning-effort-selector.tsx new file mode 100644 index 00000000..33011cfc --- /dev/null +++ b/apps/ui/src/components/views/board-view/shared/reasoning-effort-selector.tsx @@ -0,0 +1,47 @@ +import { Label } from '@/components/ui/label'; +import { Brain } from 'lucide-react'; +import { cn } from '@/lib/utils'; +import type { ReasoningEffort } from '@automaker/types'; +import { REASONING_EFFORT_LEVELS, REASONING_EFFORT_LABELS } from './model-constants'; + +interface ReasoningEffortSelectorProps { + selectedEffort: ReasoningEffort; + onEffortSelect: (effort: ReasoningEffort) => void; + testIdPrefix?: string; +} + +export function ReasoningEffortSelector({ + selectedEffort, + onEffortSelect, + testIdPrefix = 'reasoning-effort', +}: ReasoningEffortSelectorProps) { + return ( +
+ +
+ {REASONING_EFFORT_LEVELS.map((effort) => ( + + ))} +
+

+ Higher efforts give more reasoning tokens for complex problems. +

+
+ ); +} diff --git a/apps/ui/src/components/views/board-view/shared/work-mode-selector.tsx b/apps/ui/src/components/views/board-view/shared/work-mode-selector.tsx new file mode 100644 index 00000000..b2e7c274 --- /dev/null +++ b/apps/ui/src/components/views/board-view/shared/work-mode-selector.tsx @@ -0,0 +1,163 @@ +'use client'; + +import { Label } from '@/components/ui/label'; +import { BranchAutocomplete } from '@/components/ui/branch-autocomplete'; +import { GitBranch, GitFork, Pencil } from 'lucide-react'; +import { cn } from '@/lib/utils'; + +export type WorkMode = 'current' | 'auto' | 'custom'; + +interface WorkModeSelectorProps { + workMode: WorkMode; + onWorkModeChange: (mode: WorkMode) => void; + branchName: string; + onBranchNameChange: (branchName: string) => void; + branchSuggestions: string[]; + branchCardCounts?: Record; + currentBranch?: string; + disabled?: boolean; + testIdPrefix?: string; +} + +const WORK_MODES = [ + { + value: 'current' as const, + label: 'Current Branch', + description: 'Work directly on the selected branch', + icon: GitBranch, + }, + { + value: 'auto' as const, + label: 'Auto Worktree', + description: 'Create isolated worktree automatically', + icon: GitFork, + }, + { + value: 'custom' as const, + label: 'Custom Branch', + description: 'Specify a branch name', + icon: Pencil, + }, +]; + +export function WorkModeSelector({ + workMode, + onWorkModeChange, + branchName, + onBranchNameChange, + branchSuggestions, + branchCardCounts, + currentBranch, + disabled = false, + testIdPrefix = 'work-mode', +}: WorkModeSelectorProps) { + const hasError = workMode === 'custom' && !branchName.trim(); + + return ( +
+ + +
+ {WORK_MODES.map((mode) => { + const isSelected = workMode === mode.value; + const Icon = mode.icon; + return ( + + ); + })} +
+ + {/* Description text based on selected mode */} +

+ {workMode === 'current' && ( + <> + Work will be done directly on{' '} + {currentBranch ? ( + {currentBranch} + ) : ( + 'the current branch' + )} + . No isolation. + + )} + {workMode === 'auto' && ( + <> + A new worktree will be created automatically based on{' '} + {currentBranch ? ( + {currentBranch} + ) : ( + 'the current branch' + )}{' '} + when this card is created. + + )} + {workMode === 'custom' && ( + <>Specify a branch name below. A worktree will be created if it doesn't exist. + )} +

+ + {/* Branch input for custom mode */} + {workMode === 'custom' && ( +
+ + {hasError && ( +

+ Branch name is required for custom branch mode. +

+ )} +
+ )} + + {disabled && ( +

+ Work mode cannot be changed after work has started. +

+ )} +
+ ); +} diff --git a/apps/ui/src/components/views/board-view/worktree-panel/components/worktree-tab.tsx b/apps/ui/src/components/views/board-view/worktree-panel/components/worktree-tab.tsx index 9e357231..828e9a2b 100644 --- a/apps/ui/src/components/views/board-view/worktree-panel/components/worktree-tab.tsx +++ b/apps/ui/src/components/views/board-view/worktree-panel/components/worktree-tab.tsx @@ -1,3 +1,4 @@ +// @ts-nocheck import { Button } from '@/components/ui/button'; import { RefreshCw, Globe, Loader2, CircleDot, GitPullRequest } from 'lucide-react'; import { cn } from '@/lib/utils'; diff --git a/apps/ui/src/components/views/board-view/worktree-panel/worktree-panel.tsx b/apps/ui/src/components/views/board-view/worktree-panel/worktree-panel.tsx index 0f4a1765..e0030d09 100644 --- a/apps/ui/src/components/views/board-view/worktree-panel/worktree-panel.tsx +++ b/apps/ui/src/components/views/board-view/worktree-panel/worktree-panel.tsx @@ -1,8 +1,8 @@ -import { useState, useEffect, useRef } from 'react'; +import { useEffect, useRef } from 'react'; import { Button } from '@/components/ui/button'; import { GitBranch, Plus, RefreshCw, PanelLeftOpen, PanelLeftClose } from 'lucide-react'; import { cn, pathsEqual } from '@/lib/utils'; -import { getItem, setItem } from '@/lib/storage'; +import { useAppStore } from '@/store/app-store'; import type { WorktreePanelProps, WorktreeInfo } from './types'; import { useWorktrees, @@ -14,8 +14,6 @@ import { } from './hooks'; import { WorktreeTab } from './components'; -const WORKTREE_PANEL_COLLAPSED_KEY = 'worktree-panel-collapsed'; - export function WorktreePanel({ projectPath, onCreateWorktree, @@ -85,17 +83,11 @@ export function WorktreePanel({ features, }); - // Collapse state with localStorage persistence - const [isCollapsed, setIsCollapsed] = useState(() => { - const saved = getItem(WORKTREE_PANEL_COLLAPSED_KEY); - return saved === 'true'; - }); + // Collapse state from store (synced via API) + const isCollapsed = useAppStore((s) => s.worktreePanelCollapsed); + const setWorktreePanelCollapsed = useAppStore((s) => s.setWorktreePanelCollapsed); - useEffect(() => { - setItem(WORKTREE_PANEL_COLLAPSED_KEY, String(isCollapsed)); - }, [isCollapsed]); - - const toggleCollapsed = () => setIsCollapsed((prev) => !prev); + const toggleCollapsed = () => setWorktreePanelCollapsed(!isCollapsed); // Periodic interval check (5 seconds) to detect branch changes on disk // Reduced from 1s to 5s to minimize GPU/CPU usage from frequent re-renders diff --git a/apps/ui/src/components/views/context-view.tsx b/apps/ui/src/components/views/context-view.tsx index ab33dbe8..41dc3816 100644 --- a/apps/ui/src/components/views/context-view.tsx +++ b/apps/ui/src/components/views/context-view.tsx @@ -496,6 +496,14 @@ export function ContextView() { setNewMarkdownContent(''); } catch (error) { logger.error('Failed to create markdown:', error); + // Close dialog and reset state even on error to avoid stuck dialog + setIsCreateMarkdownOpen(false); + setNewMarkdownName(''); + setNewMarkdownDescription(''); + setNewMarkdownContent(''); + toast.error('Failed to create markdown file', { + description: error instanceof Error ? error.message : 'Unknown error occurred', + }); } }; diff --git a/apps/ui/src/components/views/github-issues-view.tsx b/apps/ui/src/components/views/github-issues-view.tsx index 3b316eb3..e8e5536b 100644 --- a/apps/ui/src/components/views/github-issues-view.tsx +++ b/apps/ui/src/components/views/github-issues-view.tsx @@ -1,3 +1,4 @@ +// @ts-nocheck import { useState, useCallback, useMemo } from 'react'; import { createLogger } from '@automaker/utils/logger'; import { CircleDot, RefreshCw } from 'lucide-react'; diff --git a/apps/ui/src/components/views/github-issues-view/hooks/use-issue-validation.ts b/apps/ui/src/components/views/github-issues-view/hooks/use-issue-validation.ts index da582d2d..7978e9fe 100644 --- a/apps/ui/src/components/views/github-issues-view/hooks/use-issue-validation.ts +++ b/apps/ui/src/components/views/github-issues-view/hooks/use-issue-validation.ts @@ -1,3 +1,4 @@ +// @ts-nocheck import { useState, useEffect, useCallback, useRef } from 'react'; import { createLogger } from '@automaker/utils/logger'; import { diff --git a/apps/ui/src/components/views/interview-view.tsx b/apps/ui/src/components/views/interview-view.tsx index 2bf809a5..75d8ab27 100644 --- a/apps/ui/src/components/views/interview-view.tsx +++ b/apps/ui/src/components/views/interview-view.tsx @@ -1,3 +1,4 @@ +// @ts-nocheck import { useState, useCallback, useRef, useEffect } from 'react'; import { createLogger } from '@automaker/utils/logger'; import { useAppStore, Feature } from '@/store/app-store'; diff --git a/apps/ui/src/components/views/logged-out-view.tsx b/apps/ui/src/components/views/logged-out-view.tsx new file mode 100644 index 00000000..3239a9bd --- /dev/null +++ b/apps/ui/src/components/views/logged-out-view.tsx @@ -0,0 +1,29 @@ +import { useNavigate } from '@tanstack/react-router'; +import { Button } from '@/components/ui/button'; +import { LogOut } from 'lucide-react'; + +export function LoggedOutView() { + const navigate = useNavigate(); + + return ( +
+
+
+
+ +
+

You’ve been logged out

+

+ Your session expired, or the server restarted. Please log in again. +

+
+ +
+ +
+
+
+ ); +} diff --git a/apps/ui/src/components/views/login-view.tsx b/apps/ui/src/components/views/login-view.tsx index c619f1f2..445bd937 100644 --- a/apps/ui/src/components/views/login-view.tsx +++ b/apps/ui/src/components/views/login-view.tsx @@ -1,50 +1,363 @@ /** * Login View - Web mode authentication * - * Prompts user to enter the API key shown in server console. - * On successful login, sets an HTTP-only session cookie. + * Uses a state machine for clear, maintainable flow: + * + * States: + * checking_server → server_error (after 5 retries) + * checking_server → awaiting_login (401/unauthenticated) + * checking_server → checking_setup (authenticated) + * awaiting_login → logging_in → login_error | checking_setup + * checking_setup → redirecting */ -import { useState } from 'react'; +import { useReducer, useEffect, useRef } from 'react'; import { useNavigate } from '@tanstack/react-router'; -import { login } from '@/lib/http-api-client'; +import { login, getHttpApiClient, getServerUrlSync } from '@/lib/http-api-client'; import { Button } from '@/components/ui/button'; import { Input } from '@/components/ui/input'; -import { KeyRound, AlertCircle, Loader2 } from 'lucide-react'; +import { KeyRound, AlertCircle, Loader2, RefreshCw, ServerCrash } from 'lucide-react'; import { useAuthStore } from '@/store/auth-store'; import { useSetupStore } from '@/store/setup-store'; +// ============================================================================= +// State Machine Types +// ============================================================================= + +type State = + | { phase: 'checking_server'; attempt: number } + | { phase: 'server_error'; message: string } + | { phase: 'awaiting_login'; apiKey: string; error: string | null } + | { phase: 'logging_in'; apiKey: string } + | { phase: 'checking_setup' } + | { phase: 'redirecting'; to: string }; + +type Action = + | { type: 'SERVER_CHECK_RETRY'; attempt: number } + | { type: 'SERVER_ERROR'; message: string } + | { type: 'AUTH_REQUIRED' } + | { type: 'AUTH_VALID' } + | { type: 'UPDATE_API_KEY'; value: string } + | { type: 'SUBMIT_LOGIN' } + | { type: 'LOGIN_ERROR'; message: string } + | { type: 'REDIRECT'; to: string } + | { type: 'RETRY_SERVER_CHECK' }; + +const initialState: State = { phase: 'checking_server', attempt: 1 }; + +// ============================================================================= +// State Machine Reducer +// ============================================================================= + +function reducer(state: State, action: Action): State { + switch (action.type) { + case 'SERVER_CHECK_RETRY': + return { phase: 'checking_server', attempt: action.attempt }; + + case 'SERVER_ERROR': + return { phase: 'server_error', message: action.message }; + + case 'AUTH_REQUIRED': + return { phase: 'awaiting_login', apiKey: '', error: null }; + + case 'AUTH_VALID': + return { phase: 'checking_setup' }; + + case 'UPDATE_API_KEY': + if (state.phase !== 'awaiting_login') return state; + return { ...state, apiKey: action.value }; + + case 'SUBMIT_LOGIN': + if (state.phase !== 'awaiting_login') return state; + return { phase: 'logging_in', apiKey: state.apiKey }; + + case 'LOGIN_ERROR': + if (state.phase !== 'logging_in') return state; + return { phase: 'awaiting_login', apiKey: state.apiKey, error: action.message }; + + case 'REDIRECT': + return { phase: 'redirecting', to: action.to }; + + case 'RETRY_SERVER_CHECK': + return { phase: 'checking_server', attempt: 1 }; + + default: + return state; + } +} + +// ============================================================================= +// Constants +// ============================================================================= + +const MAX_RETRIES = 5; +const BACKOFF_BASE_MS = 400; + +// ============================================================================= +// Imperative Flow Logic (runs once on mount) +// ============================================================================= + +/** + * Check auth status without triggering side effects. + * Unlike the httpClient methods, this does NOT call handleUnauthorized() + * which would navigate us away to /logged-out. + * + * Relies on HTTP-only session cookie being sent via credentials: 'include'. + * + * Returns: { authenticated: true } or { authenticated: false } + * Throws: on network errors (for retry logic) + */ +async function checkAuthStatusSafe(): Promise<{ authenticated: boolean }> { + const serverUrl = getServerUrlSync(); + + const response = await fetch(`${serverUrl}/api/auth/status`, { + credentials: 'include', // Send HTTP-only session cookie + signal: AbortSignal.timeout(5000), + }); + + // Any response means server is reachable + const data = await response.json(); + return { authenticated: data.authenticated === true }; +} + +/** + * Check if server is reachable and if we have a valid session. + */ +async function checkServerAndSession( + dispatch: React.Dispatch, + setAuthState: (state: { isAuthenticated: boolean; authChecked: boolean }) => void, + signal?: AbortSignal +): Promise { + for (let attempt = 1; attempt <= MAX_RETRIES; attempt++) { + // Return early if the component has unmounted + if (signal?.aborted) { + return; + } + + dispatch({ type: 'SERVER_CHECK_RETRY', attempt }); + + try { + const result = await checkAuthStatusSafe(); + + // Return early if the component has unmounted + if (signal?.aborted) { + return; + } + + if (result.authenticated) { + // Server is reachable and we're authenticated + setAuthState({ isAuthenticated: true, authChecked: true }); + dispatch({ type: 'AUTH_VALID' }); + return; + } + + // Server is reachable but we need to login + dispatch({ type: 'AUTH_REQUIRED' }); + return; + } catch (error: unknown) { + // Network error - server is not reachable + console.debug(`Server check attempt ${attempt}/${MAX_RETRIES} failed:`, error); + + if (attempt === MAX_RETRIES) { + // Return early if the component has unmounted + if (!signal?.aborted) { + dispatch({ + type: 'SERVER_ERROR', + message: 'Unable to connect to server. Please check that the server is running.', + }); + } + return; + } + + // Exponential backoff before retry + const backoffMs = BACKOFF_BASE_MS * Math.pow(2, attempt - 1); + await new Promise((resolve) => setTimeout(resolve, backoffMs)); + } + } +} + +async function checkSetupStatus( + dispatch: React.Dispatch, + signal?: AbortSignal +): Promise { + const httpClient = getHttpApiClient(); + + try { + const result = await httpClient.settings.getGlobal(); + + // Return early if aborted + if (signal?.aborted) { + return; + } + + if (result.success && result.settings) { + // Check the setupComplete field from settings + // This is set to true when user completes the setup wizard + const setupComplete = (result.settings as { setupComplete?: boolean }).setupComplete === true; + + // IMPORTANT: Update the Zustand store BEFORE redirecting + // Otherwise __root.tsx routing effect will override our redirect + // because it reads setupComplete from the store (which defaults to false) + useSetupStore.getState().setSetupComplete(setupComplete); + + dispatch({ type: 'REDIRECT', to: setupComplete ? '/' : '/setup' }); + } else { + // No settings yet = first run = need setup + useSetupStore.getState().setSetupComplete(false); + dispatch({ type: 'REDIRECT', to: '/setup' }); + } + } catch { + // Return early if aborted + if (signal?.aborted) { + return; + } + // If we can't get settings, go to setup to be safe + useSetupStore.getState().setSetupComplete(false); + dispatch({ type: 'REDIRECT', to: '/setup' }); + } +} + +async function performLogin( + apiKey: string, + dispatch: React.Dispatch, + setAuthState: (state: { isAuthenticated: boolean; authChecked: boolean }) => void +): Promise { + try { + const result = await login(apiKey.trim()); + + if (result.success) { + setAuthState({ isAuthenticated: true, authChecked: true }); + dispatch({ type: 'AUTH_VALID' }); + } else { + dispatch({ type: 'LOGIN_ERROR', message: result.error || 'Invalid API key' }); + } + } catch { + dispatch({ type: 'LOGIN_ERROR', message: 'Failed to connect to server' }); + } +} + +// ============================================================================= +// Component +// ============================================================================= + export function LoginView() { const navigate = useNavigate(); const setAuthState = useAuthStore((s) => s.setAuthState); - const setupComplete = useSetupStore((s) => s.setupComplete); - const [apiKey, setApiKey] = useState(''); - const [error, setError] = useState(null); - const [isLoading, setIsLoading] = useState(false); + const [state, dispatch] = useReducer(reducer, initialState); + const retryControllerRef = useRef(null); - const handleSubmit = async (e: React.FormEvent) => { - e.preventDefault(); - setError(null); - setIsLoading(true); + // Run initial server/session check on mount. + // IMPORTANT: Do not "run once" via a ref guard here. + // In React StrictMode (dev), effects mount -> cleanup -> mount. + // If we abort in cleanup and also skip the second run, we'll get stuck forever on "Connecting...". + useEffect(() => { + const controller = new AbortController(); + checkServerAndSession(dispatch, setAuthState, controller.signal); - try { - const result = await login(apiKey.trim()); - if (result.success) { - // Mark as authenticated for this session (cookie-based auth) - setAuthState({ isAuthenticated: true, authChecked: true }); + return () => { + controller.abort(); + retryControllerRef.current?.abort(); + }; + }, [setAuthState]); - // After auth, determine if setup is needed or go to app - navigate({ to: setupComplete ? '/' : '/setup' }); - } else { - setError(result.error || 'Invalid API key'); - } - } catch (err) { - setError('Failed to connect to server'); - } finally { - setIsLoading(false); + // When we enter checking_setup phase, check setup status + useEffect(() => { + if (state.phase === 'checking_setup') { + const controller = new AbortController(); + checkSetupStatus(dispatch, controller.signal); + + return () => { + controller.abort(); + }; } + }, [state.phase]); + + // When we enter redirecting phase, navigate + useEffect(() => { + if (state.phase === 'redirecting') { + navigate({ to: state.to }); + } + }, [state.phase, state.phase === 'redirecting' ? state.to : null, navigate]); + + // Handle login form submission + const handleSubmit = (e: React.FormEvent) => { + e.preventDefault(); + if (state.phase !== 'awaiting_login' || !state.apiKey.trim()) return; + + dispatch({ type: 'SUBMIT_LOGIN' }); + performLogin(state.apiKey, dispatch, setAuthState); }; + // Handle retry button for server errors + const handleRetry = () => { + // Abort any previous retry request + retryControllerRef.current?.abort(); + + dispatch({ type: 'RETRY_SERVER_CHECK' }); + const controller = new AbortController(); + retryControllerRef.current = controller; + checkServerAndSession(dispatch, setAuthState, controller.signal); + }; + + // ============================================================================= + // Render based on current state + // ============================================================================= + + // Checking server connectivity + if (state.phase === 'checking_server') { + return ( +
+
+ +

+ Connecting to server + {state.attempt > 1 ? ` (attempt ${state.attempt}/${MAX_RETRIES})` : '...'} +

+
+
+ ); + } + + // Server unreachable after retries + if (state.phase === 'server_error') { + return ( +
+
+
+ +
+
+

Server Unavailable

+

{state.message}

+
+ +
+
+ ); + } + + // Checking setup status after auth + if (state.phase === 'checking_setup' || state.phase === 'redirecting') { + return ( +
+
+ +

+ {state.phase === 'checking_setup' ? 'Loading settings...' : 'Redirecting...'} +

+
+
+ ); + } + + // Login form (awaiting_login or logging_in) + const isLoggingIn = state.phase === 'logging_in'; + const apiKey = state.phase === 'awaiting_login' ? state.apiKey : state.apiKey; + const error = state.phase === 'awaiting_login' ? state.error : null; + return (
@@ -70,8 +383,8 @@ export function LoginView() { type="password" placeholder="Enter API key..." value={apiKey} - onChange={(e) => setApiKey(e.target.value)} - disabled={isLoading} + onChange={(e) => dispatch({ type: 'UPDATE_API_KEY', value: e.target.value })} + disabled={isLoggingIn} autoFocus className="font-mono" data-testid="login-api-key-input" @@ -88,10 +401,10 @@ export function LoginView() { + +
@@ -222,7 +322,7 @@ export function ProfileForm({ {formData.provider === 'cursor' && (
@@ -262,13 +362,13 @@ export function ProfileForm({ )} - {config.tier} + Tier
@@ -283,6 +383,123 @@ export function ProfileForm({
)} + {/* Codex Model Selection */} + {formData.provider === 'codex' && ( +
+ +
+ {Object.entries(CODEX_MODEL_MAP).map(([_, modelId]) => { + const modelConfig = { + label: modelId, + badge: 'Standard' as const, + hasReasoning: false, + }; + + return ( + + ); + })} +
+
+ )} + + {/* OpenCode Model Selection */} + {formData.provider === 'opencode' && ( +
+ +
+ {OPENCODE_MODELS.map((model) => ( + + ))} +
+
+ )} + {/* Claude Thinking Level */} {formData.provider === 'claude' && supportsThinking && (
diff --git a/apps/ui/src/components/views/profiles-view/components/sortable-profile-card.tsx b/apps/ui/src/components/views/profiles-view/components/sortable-profile-card.tsx index 929b0cd7..d14bfbdc 100644 --- a/apps/ui/src/components/views/profiles-view/components/sortable-profile-card.tsx +++ b/apps/ui/src/components/views/profiles-view/components/sortable-profile-card.tsx @@ -1,11 +1,12 @@ import { Button } from '@/components/ui/button'; import { cn } from '@/lib/utils'; -import { GripVertical, Lock, Pencil, Trash2, Brain, Bot, Terminal } from 'lucide-react'; +import { GripVertical, Lock, Pencil, Trash2 } from 'lucide-react'; import { useSortable } from '@dnd-kit/sortable'; import { CSS } from '@dnd-kit/utilities'; import type { AIProfile } from '@automaker/types'; -import { CURSOR_MODEL_MAP, profileHasThinking } from '@automaker/types'; +import { CURSOR_MODEL_MAP, profileHasThinking, getCodexModelLabel } from '@automaker/types'; import { PROFILE_ICONS } from '../constants'; +import { AnthropicIcon, CursorIcon, OpenAIIcon } from '@/components/ui/provider-icon'; interface SortableProfileCardProps { profile: AIProfile; @@ -24,7 +25,13 @@ export function SortableProfileCard({ profile, onEdit, onDelete }: SortableProfi opacity: isDragging ? 0.5 : 1, }; - const IconComponent = profile.icon ? PROFILE_ICONS[profile.icon] : Brain; + const getDefaultIcon = () => { + if (profile.provider === 'cursor') return CursorIcon; + if (profile.provider === 'codex') return OpenAIIcon; + return AnthropicIcon; + }; + + const IconComponent = profile.icon ? PROFILE_ICONS[profile.icon] : getDefaultIcon(); return (
{profile.provider === 'cursor' ? ( - + + ) : profile.provider === 'codex' ? ( + ) : ( - + )} - {profile.provider === 'cursor' ? 'Cursor' : 'Claude'} + {profile.provider === 'cursor' + ? 'Cursor' + : profile.provider === 'codex' + ? 'Codex' + : 'Claude'} {/* Model badge */} @@ -85,7 +98,9 @@ export function SortableProfileCard({ profile, onEdit, onDelete }: SortableProfi ? CURSOR_MODEL_MAP[profile.cursorModel || 'auto']?.label || profile.cursorModel || 'auto' - : profile.model || 'sonnet'} + : profile.provider === 'codex' + ? getCodexModelLabel(profile.codexModel || 'codex-gpt-5.2-codex') + : profile.model || 'sonnet'} {/* Thinking badge - works for both providers */} diff --git a/apps/ui/src/components/views/profiles-view/constants.ts b/apps/ui/src/components/views/profiles-view/constants.ts index 6158b46f..72b2f0ee 100644 --- a/apps/ui/src/components/views/profiles-view/constants.ts +++ b/apps/ui/src/components/views/profiles-view/constants.ts @@ -1,5 +1,6 @@ import { Brain, Zap, Scale, Cpu, Rocket, Sparkles } from 'lucide-react'; import type { ModelAlias, ThinkingLevel } from '@/store/app-store'; +import { AnthropicIcon, CursorIcon, OpenAIIcon } from '@/components/ui/provider-icon'; // Icon mapping for profiles export const PROFILE_ICONS: Record> = { @@ -9,6 +10,9 @@ export const PROFILE_ICONS: Record { + if (viewId === 'providers') { + navigateTo('claude-provider'); + } else { + navigateTo(viewId); + } + }; + const [showDeleteDialog, setShowDeleteDialog] = useState(false); const [showKeyboardMapDialog, setShowKeyboardMapDialog] = useState(false); // Render the active section based on current view const renderActiveSection = () => { switch (activeView) { + case 'claude-provider': + return ; + case 'cursor-provider': + return ; + case 'codex-provider': + return ; + case 'opencode-provider': + return ; case 'providers': - case 'claude': // Backwards compatibility - return ; + case 'claude': // Backwards compatibility - redirect to claude-provider + return ; case 'mcp-servers': return ; case 'prompts': @@ -109,9 +133,9 @@ export function SettingsView() { case 'appearance': return ( handleSetTheme(theme as any)} /> ); case 'terminal': @@ -130,6 +154,7 @@ export function SettingsView() { showProfilesOnly={showProfilesOnly} defaultSkipTests={defaultSkipTests} enableDependencyBlocking={enableDependencyBlocking} + skipVerificationInAutoMode={skipVerificationInAutoMode} useWorktrees={useWorktrees} defaultPlanningMode={defaultPlanningMode} defaultRequirePlanApproval={defaultRequirePlanApproval} @@ -138,19 +163,27 @@ export function SettingsView() { onShowProfilesOnlyChange={setShowProfilesOnly} onDefaultSkipTestsChange={setDefaultSkipTests} onEnableDependencyBlockingChange={setEnableDependencyBlocking} + onSkipVerificationInAutoModeChange={setSkipVerificationInAutoMode} onUseWorktreesChange={setUseWorktrees} onDefaultPlanningModeChange={setDefaultPlanningMode} onDefaultRequirePlanApprovalChange={setDefaultRequirePlanApproval} onDefaultAIProfileIdChange={setDefaultAIProfileId} /> ); + case 'account': + return ; + case 'security': + return ( + + ); case 'danger': return ( setShowDeleteDialog(true)} - skipSandboxWarning={skipSandboxWarning} - onResetSandboxWarning={() => setSkipSandboxWarning(false)} /> ); default: @@ -170,7 +203,7 @@ export function SettingsView() { navItems={NAV_ITEMS} activeSection={activeView} currentProject={currentProject} - onNavigate={navigateTo} + onNavigate={handleNavigate} /> {/* Content Panel - Shows only the active section */} diff --git a/apps/ui/src/components/views/settings-view/account/account-section.tsx b/apps/ui/src/components/views/settings-view/account/account-section.tsx new file mode 100644 index 00000000..8c44706b --- /dev/null +++ b/apps/ui/src/components/views/settings-view/account/account-section.tsx @@ -0,0 +1,77 @@ +import { useState } from 'react'; +import { useNavigate } from '@tanstack/react-router'; +import { Button } from '@/components/ui/button'; +import { LogOut, User } from 'lucide-react'; +import { cn } from '@/lib/utils'; +import { logout } from '@/lib/http-api-client'; +import { useAuthStore } from '@/store/auth-store'; + +export function AccountSection() { + const navigate = useNavigate(); + const [isLoggingOut, setIsLoggingOut] = useState(false); + + const handleLogout = async () => { + setIsLoggingOut(true); + try { + await logout(); + // Reset auth state + useAuthStore.getState().resetAuth(); + // Navigate to logged out page + navigate({ to: '/logged-out' }); + } catch (error) { + console.error('Logout failed:', error); + setIsLoggingOut(false); + } + }; + + return ( +
+
+
+
+ +
+

Account

+
+

Manage your session and account.

+
+
+ {/* Logout */} +
+
+
+ +
+
+

Log Out

+

+ End your current session and return to the login screen +

+
+
+ +
+
+
+ ); +} diff --git a/apps/ui/src/components/views/settings-view/account/index.ts b/apps/ui/src/components/views/settings-view/account/index.ts new file mode 100644 index 00000000..ecaeaa49 --- /dev/null +++ b/apps/ui/src/components/views/settings-view/account/index.ts @@ -0,0 +1 @@ +export { AccountSection } from './account-section'; diff --git a/apps/ui/src/components/views/settings-view/api-keys/api-keys-section.tsx b/apps/ui/src/components/views/settings-view/api-keys/api-keys-section.tsx index e0261e97..088f3ddf 100644 --- a/apps/ui/src/components/views/settings-view/api-keys/api-keys-section.tsx +++ b/apps/ui/src/components/views/settings-view/api-keys/api-keys-section.tsx @@ -1,7 +1,7 @@ import { useAppStore } from '@/store/app-store'; import { useSetupStore } from '@/store/setup-store'; import { Button } from '@/components/ui/button'; -import { Key, CheckCircle2, Settings, Trash2, Loader2 } from 'lucide-react'; +import { Key, CheckCircle2, Trash2, Loader2 } from 'lucide-react'; import { ApiKeyField } from './api-key-field'; import { buildProviderConfigs } from '@/config/api-providers'; import { SecurityNotice } from './security-notice'; @@ -10,13 +10,13 @@ import { cn } from '@/lib/utils'; import { useState, useCallback } from 'react'; import { getElectronAPI } from '@/lib/electron'; import { toast } from 'sonner'; -import { useNavigate } from '@tanstack/react-router'; export function ApiKeysSection() { const { apiKeys, setApiKeys } = useAppStore(); - const { claudeAuthStatus, setClaudeAuthStatus, setSetupComplete } = useSetupStore(); + const { claudeAuthStatus, setClaudeAuthStatus, codexAuthStatus, setCodexAuthStatus } = + useSetupStore(); const [isDeletingAnthropicKey, setIsDeletingAnthropicKey] = useState(false); - const navigate = useNavigate(); + const [isDeletingOpenaiKey, setIsDeletingOpenaiKey] = useState(false); const { providerConfigParams, handleSave, saved } = useApiKeyManagement(); @@ -51,11 +51,33 @@ export function ApiKeysSection() { } }, [apiKeys, setApiKeys, claudeAuthStatus, setClaudeAuthStatus]); - // Open setup wizard - const openSetupWizard = useCallback(() => { - setSetupComplete(false); - navigate({ to: '/setup' }); - }, [setSetupComplete, navigate]); + // Delete OpenAI API key + const deleteOpenaiKey = useCallback(async () => { + setIsDeletingOpenaiKey(true); + try { + const api = getElectronAPI(); + if (!api.setup?.deleteApiKey) { + toast.error('Delete API not available'); + return; + } + + const result = await api.setup.deleteApiKey('openai'); + if (result.success) { + setApiKeys({ ...apiKeys, openai: '' }); + setCodexAuthStatus({ + authenticated: false, + method: 'none', + }); + toast.success('OpenAI API key deleted'); + } else { + toast.error(result.error || 'Failed to delete API key'); + } + } catch (error) { + toast.error('Failed to delete API key'); + } finally { + setIsDeletingOpenaiKey(false); + } + }, [apiKeys, setApiKeys, setCodexAuthStatus]); return (
- - {apiKeys.anthropic && ( + )}
diff --git a/apps/ui/src/components/views/settings-view/api-keys/hooks/use-api-key-management.ts b/apps/ui/src/components/views/settings-view/api-keys/hooks/use-api-key-management.ts index d2f12839..6cff2f83 100644 --- a/apps/ui/src/components/views/settings-view/api-keys/hooks/use-api-key-management.ts +++ b/apps/ui/src/components/views/settings-view/api-keys/hooks/use-api-key-management.ts @@ -1,3 +1,4 @@ +// @ts-nocheck import { useState, useEffect } from 'react'; import { createLogger } from '@automaker/utils/logger'; import { useAppStore } from '@/store/app-store'; @@ -14,6 +15,7 @@ interface TestResult { interface ApiKeyStatus { hasAnthropicKey: boolean; hasGoogleKey: boolean; + hasOpenaiKey: boolean; } /** @@ -26,16 +28,20 @@ export function useApiKeyManagement() { // API key values const [anthropicKey, setAnthropicKey] = useState(apiKeys.anthropic); const [googleKey, setGoogleKey] = useState(apiKeys.google); + const [openaiKey, setOpenaiKey] = useState(apiKeys.openai); // Visibility toggles const [showAnthropicKey, setShowAnthropicKey] = useState(false); const [showGoogleKey, setShowGoogleKey] = useState(false); + const [showOpenaiKey, setShowOpenaiKey] = useState(false); // Test connection states const [testingConnection, setTestingConnection] = useState(false); const [testResult, setTestResult] = useState(null); const [testingGeminiConnection, setTestingGeminiConnection] = useState(false); const [geminiTestResult, setGeminiTestResult] = useState(null); + const [testingOpenaiConnection, setTestingOpenaiConnection] = useState(false); + const [openaiTestResult, setOpenaiTestResult] = useState(null); // API key status from environment const [apiKeyStatus, setApiKeyStatus] = useState(null); @@ -47,6 +53,7 @@ export function useApiKeyManagement() { useEffect(() => { setAnthropicKey(apiKeys.anthropic); setGoogleKey(apiKeys.google); + setOpenaiKey(apiKeys.openai); }, [apiKeys]); // Check API key status from environment on mount @@ -60,6 +67,7 @@ export function useApiKeyManagement() { setApiKeyStatus({ hasAnthropicKey: status.hasAnthropicKey, hasGoogleKey: status.hasGoogleKey, + hasOpenaiKey: status.hasOpenaiKey, }); } } catch (error) { @@ -135,11 +143,42 @@ export function useApiKeyManagement() { setTestingGeminiConnection(false); }; + // Test OpenAI/Codex connection + const handleTestOpenaiConnection = async () => { + setTestingOpenaiConnection(true); + setOpenaiTestResult(null); + + try { + const api = getElectronAPI(); + const data = await api.setup.verifyCodexAuth('api_key', openaiKey); + + if (data.success && data.authenticated) { + setOpenaiTestResult({ + success: true, + message: 'Connection successful! Codex responded.', + }); + } else { + setOpenaiTestResult({ + success: false, + message: data.error || 'Failed to connect to OpenAI API.', + }); + } + } catch { + setOpenaiTestResult({ + success: false, + message: 'Network error. Please check your connection.', + }); + } finally { + setTestingOpenaiConnection(false); + } + }; + // Save API keys const handleSave = () => { setApiKeys({ anthropic: anthropicKey, google: googleKey, + openai: openaiKey, }); setSaved(true); setTimeout(() => setSaved(false), 2000); @@ -166,6 +205,15 @@ export function useApiKeyManagement() { onTest: handleTestGeminiConnection, result: geminiTestResult, }, + openai: { + value: openaiKey, + setValue: setOpenaiKey, + show: showOpenaiKey, + setShow: setShowOpenaiKey, + testing: testingOpenaiConnection, + onTest: handleTestOpenaiConnection, + result: openaiTestResult, + }, }; return { diff --git a/apps/ui/src/components/views/settings-view/claude/claude-md-settings.tsx b/apps/ui/src/components/views/settings-view/claude/claude-md-settings.tsx index ae5a67e4..d70a24a9 100644 --- a/apps/ui/src/components/views/settings-view/claude/claude-md-settings.tsx +++ b/apps/ui/src/components/views/settings-view/claude/claude-md-settings.tsx @@ -1,13 +1,11 @@ import { Label } from '@/components/ui/label'; import { Checkbox } from '@/components/ui/checkbox'; -import { FileCode, Shield } from 'lucide-react'; +import { FileCode } from 'lucide-react'; import { cn } from '@/lib/utils'; interface ClaudeMdSettingsProps { autoLoadClaudeMd: boolean; onAutoLoadClaudeMdChange: (enabled: boolean) => void; - enableSandboxMode: boolean; - onEnableSandboxModeChange: (enabled: boolean) => void; } /** @@ -15,23 +13,18 @@ interface ClaudeMdSettingsProps { * * UI controls for Claude Agent SDK settings including: * - Auto-loading of project instructions from .claude/CLAUDE.md files - * - Sandbox mode for isolated bash command execution * * Usage: * ```tsx * * ``` */ export function ClaudeMdSettings({ autoLoadClaudeMd, onAutoLoadClaudeMdChange, - enableSandboxMode, - onEnableSandboxModeChange, }: ClaudeMdSettingsProps) { return (
- -
- onEnableSandboxModeChange(checked === true)} - className="mt-1" - data-testid="enable-sandbox-mode-checkbox" - /> -
- -

- Run bash commands in an isolated sandbox environment for additional security. - - Note: On some systems, enabling sandbox mode may cause the agent to hang without - responding. If you experience issues, try disabling this option. - -

-
-
); diff --git a/apps/ui/src/components/views/settings-view/cli-status/claude-cli-status.tsx b/apps/ui/src/components/views/settings-view/cli-status/claude-cli-status.tsx index c808c37a..2457969b 100644 --- a/apps/ui/src/components/views/settings-view/cli-status/claude-cli-status.tsx +++ b/apps/ui/src/components/views/settings-view/cli-status/claude-cli-status.tsx @@ -1,8 +1,12 @@ +import { useState, useCallback } from 'react'; import { Button } from '@/components/ui/button'; -import { Terminal, CheckCircle2, AlertCircle, RefreshCw, XCircle } from 'lucide-react'; +import { CheckCircle2, AlertCircle, RefreshCw, XCircle } from 'lucide-react'; import { cn } from '@/lib/utils'; import type { CliStatus } from '../shared/types'; import type { ClaudeAuthStatus } from '@/store/setup-store'; +import { AnthropicIcon } from '@/components/ui/provider-icon'; +import { getElectronAPI } from '@/lib/electron'; +import { toast } from 'sonner'; interface CliStatusProps { status: CliStatus | null; @@ -80,6 +84,60 @@ function ClaudeCliStatusSkeleton() { } export function ClaudeCliStatus({ status, authStatus, isChecking, onRefresh }: CliStatusProps) { + const [isAuthenticating, setIsAuthenticating] = useState(false); + const [isDeauthenticating, setIsDeauthenticating] = useState(false); + + const handleSignIn = useCallback(async () => { + setIsAuthenticating(true); + try { + const api = getElectronAPI(); + const result = await api.setup.authClaude(); + + if (result.success) { + toast.success('Signed In', { + description: 'Successfully authenticated Claude CLI', + }); + onRefresh(); + } else if (result.error) { + toast.error('Authentication Failed', { + description: result.error, + }); + } + } catch (error) { + toast.error('Authentication Failed', { + description: error instanceof Error ? error.message : 'Unknown error', + }); + } finally { + setIsAuthenticating(false); + } + }, [onRefresh]); + + const handleSignOut = useCallback(async () => { + setIsDeauthenticating(true); + try { + const api = getElectronAPI(); + const result = await api.setup.deauthClaude(); + + if (result.success) { + toast.success('Signed Out', { + description: 'Successfully signed out from Claude CLI', + }); + // Refresh status after successful logout + onRefresh(); + } else if (result.error) { + toast.error('Sign Out Failed', { + description: result.error, + }); + } + } catch (error) { + toast.error('Sign Out Failed', { + description: error instanceof Error ? error.message : 'Unknown error', + }); + } finally { + setIsDeauthenticating(false); + } + }, [onRefresh]); + if (!status) return ; return ( @@ -95,7 +153,7 @@ export function ClaudeCliStatus({ status, authStatus, isChecking, onRefresh }: C
- +

Claude Code CLI @@ -152,7 +210,7 @@ export function ClaudeCliStatus({ status, authStatus, isChecking, onRefresh }: C

{/* Authentication Status */} {authStatus?.authenticated ? ( -
+
@@ -164,6 +222,15 @@ export function ClaudeCliStatus({ status, authStatus, isChecking, onRefresh }: C {getAuthMethodLabel(authStatus.method)}

+
) : ( @@ -174,9 +241,17 @@ export function ClaudeCliStatus({ status, authStatus, isChecking, onRefresh }: C

Not Authenticated

- Run claude login{' '} - or set an API key to authenticate. + Click Sign In below to get authentication instructions.

+
)} diff --git a/apps/ui/src/components/views/settings-view/cli-status/cli-status-card.tsx b/apps/ui/src/components/views/settings-view/cli-status/cli-status-card.tsx new file mode 100644 index 00000000..dd194c1f --- /dev/null +++ b/apps/ui/src/components/views/settings-view/cli-status/cli-status-card.tsx @@ -0,0 +1,151 @@ +import { Button } from '@/components/ui/button'; +import { CheckCircle2, AlertCircle, RefreshCw } from 'lucide-react'; +import { cn } from '@/lib/utils'; +import type { CliStatus } from '../shared/types'; + +interface CliStatusCardProps { + title: string; + description: string; + status: CliStatus | null; + isChecking: boolean; + onRefresh: () => void; + refreshTestId: string; + icon: React.ComponentType<{ className?: string }>; + fallbackRecommendation: string; +} + +export function CliStatusCard({ + title, + description, + status, + isChecking, + onRefresh, + refreshTestId, + icon: Icon, + fallbackRecommendation, +}: CliStatusCardProps) { + if (!status) return null; + + return ( +
+
+
+
+
+ +
+

{title}

+
+ +
+

{description}

+
+
+ {status.success && status.status === 'installed' ? ( +
+
+
+ +
+
+

{title} Installed

+
+ {status.method && ( +

+ Method: {status.method} +

+ )} + {status.version && ( +

+ Version: {status.version} +

+ )} + {status.path && ( +

+ Path: {status.path} +

+ )} +
+
+
+ {status.recommendation && ( +

{status.recommendation}

+ )} +
+ ) : ( +
+
+
+ +
+
+

{title} Not Detected

+

+ {status.recommendation || fallbackRecommendation} +

+
+
+ {status.installCommands && ( +
+

Installation Commands:

+
+ {status.installCommands.npm && ( +
+

+ npm +

+ + {status.installCommands.npm} + +
+ )} + {status.installCommands.macos && ( +
+

+ macOS/Linux +

+ + {status.installCommands.macos} + +
+ )} + {status.installCommands.windows && ( +
+

+ Windows (PowerShell) +

+ + {status.installCommands.windows} + +
+ )} +
+
+ )} +
+ )} +
+
+ ); +} diff --git a/apps/ui/src/components/views/settings-view/cli-status/codex-cli-status.tsx b/apps/ui/src/components/views/settings-view/cli-status/codex-cli-status.tsx new file mode 100644 index 00000000..86635264 --- /dev/null +++ b/apps/ui/src/components/views/settings-view/cli-status/codex-cli-status.tsx @@ -0,0 +1,311 @@ +import { useState, useCallback } from 'react'; +import { Button } from '@/components/ui/button'; +import { CheckCircle2, AlertCircle, RefreshCw, XCircle } from 'lucide-react'; +import { cn } from '@/lib/utils'; +import type { CliStatus } from '../shared/types'; +import type { CodexAuthStatus } from '@/store/setup-store'; +import { OpenAIIcon } from '@/components/ui/provider-icon'; +import { getElectronAPI } from '@/lib/electron'; +import { toast } from 'sonner'; + +interface CliStatusProps { + status: CliStatus | null; + authStatus?: CodexAuthStatus | null; + isChecking: boolean; + onRefresh: () => void; +} + +function getAuthMethodLabel(method: string): string { + switch (method) { + case 'api_key': + return 'API Key'; + case 'api_key_env': + return 'API Key (Environment)'; + case 'cli_authenticated': + case 'oauth': + return 'CLI Authentication'; + default: + return method || 'Unknown'; + } +} + +function SkeletonPulse({ className }: { className?: string }) { + return
; +} + +function CodexCliStatusSkeleton() { + return ( +
+
+
+
+ + +
+ +
+
+ +
+
+
+ {/* Installation status skeleton */} +
+ +
+ + + +
+
+ {/* Auth status skeleton */} +
+ +
+ + +
+
+
+
+ ); +} + +export function CodexCliStatus({ status, authStatus, isChecking, onRefresh }: CliStatusProps) { + const [isAuthenticating, setIsAuthenticating] = useState(false); + const [isDeauthenticating, setIsDeauthenticating] = useState(false); + + const handleSignIn = useCallback(async () => { + setIsAuthenticating(true); + try { + const api = getElectronAPI(); + const result = await api.setup.authCodex(); + + if (result.success) { + toast.success('Signed In', { + description: 'Successfully authenticated Codex CLI', + }); + onRefresh(); + } else if (result.error) { + toast.error('Authentication Failed', { + description: result.error, + }); + } + } catch (error) { + toast.error('Authentication Failed', { + description: error instanceof Error ? error.message : 'Unknown error', + }); + } finally { + setIsAuthenticating(false); + } + }, [onRefresh]); + + const handleSignOut = useCallback(async () => { + setIsDeauthenticating(true); + try { + const api = getElectronAPI(); + const result = await api.setup.deauthCodex(); + + if (result.success) { + toast.success('Signed Out', { + description: 'Successfully signed out from Codex CLI', + }); + // Refresh status after successful logout + onRefresh(); + } else if (result.error) { + toast.error('Sign Out Failed', { + description: result.error, + }); + } + } catch (error) { + toast.error('Sign Out Failed', { + description: error instanceof Error ? error.message : 'Unknown error', + }); + } finally { + setIsDeauthenticating(false); + } + }, [onRefresh]); + + if (!status) return ; + + return ( +
+
+
+
+
+ +
+

Codex CLI

+
+ +
+

+ Codex CLI powers OpenAI models for coding and automation workflows. +

+
+
+ {status.success && status.status === 'installed' ? ( +
+
+
+ +
+
+

Codex CLI Installed

+
+ {status.method && ( +

+ Method: {status.method} +

+ )} + {status.version && ( +

+ Version: {status.version} +

+ )} + {status.path && ( +

+ Path: {status.path} +

+ )} +
+
+
+ {/* Authentication Status */} + {authStatus?.authenticated ? ( +
+
+ +
+
+

Authenticated

+
+

+ Method:{' '} + {getAuthMethodLabel(authStatus.method)} +

+
+ +
+
+ ) : ( +
+
+ +
+
+

Not Authenticated

+

+ Click Sign In below to get authentication instructions. +

+ +
+
+ )} + + {status.recommendation && ( +

{status.recommendation}

+ )} +
+ ) : ( +
+
+
+ +
+
+

Codex CLI Not Detected

+

+ {status.recommendation || + 'Install Codex CLI to unlock OpenAI models with tool support.'} +

+
+
+ {status.installCommands && ( +
+

Installation Commands:

+
+ {status.installCommands.npm && ( +
+

+ npm +

+ + {status.installCommands.npm} + +
+ )} + {status.installCommands.macos && ( +
+

+ macOS/Linux +

+ + {status.installCommands.macos} + +
+ )} + {status.installCommands.windows && ( +
+

+ Windows (PowerShell) +

+ + {status.installCommands.windows} + +
+ )} +
+
+ )} +
+ )} +
+
+ ); +} diff --git a/apps/ui/src/components/views/settings-view/cli-status/cursor-cli-status.tsx b/apps/ui/src/components/views/settings-view/cli-status/cursor-cli-status.tsx index ebcec5ab..bc49270c 100644 --- a/apps/ui/src/components/views/settings-view/cli-status/cursor-cli-status.tsx +++ b/apps/ui/src/components/views/settings-view/cli-status/cursor-cli-status.tsx @@ -1,6 +1,10 @@ +import { useState, useCallback } from 'react'; import { Button } from '@/components/ui/button'; -import { Terminal, CheckCircle2, AlertCircle, RefreshCw, XCircle } from 'lucide-react'; +import { CheckCircle2, AlertCircle, RefreshCw, XCircle } from 'lucide-react'; import { cn } from '@/lib/utils'; +import { CursorIcon } from '@/components/ui/provider-icon'; +import { getElectronAPI } from '@/lib/electron'; +import { toast } from 'sonner'; interface CursorStatus { installed: boolean; @@ -200,6 +204,60 @@ export function ModelConfigSkeleton() { } export function CursorCliStatus({ status, isChecking, onRefresh }: CursorCliStatusProps) { + const [isAuthenticating, setIsAuthenticating] = useState(false); + const [isDeauthenticating, setIsDeauthenticating] = useState(false); + + const handleSignIn = useCallback(async () => { + setIsAuthenticating(true); + try { + const api = getElectronAPI(); + const result = await api.setup.authCursor(); + + if (result.success) { + toast.success('Signed In', { + description: 'Successfully authenticated Cursor CLI', + }); + onRefresh(); + } else if (result.error) { + toast.error('Authentication Failed', { + description: result.error, + }); + } + } catch (error) { + toast.error('Authentication Failed', { + description: error instanceof Error ? error.message : 'Unknown error', + }); + } finally { + setIsAuthenticating(false); + } + }, [onRefresh]); + + const handleSignOut = useCallback(async () => { + setIsDeauthenticating(true); + try { + const api = getElectronAPI(); + const result = await api.setup.deauthCursor(); + + if (result.success) { + toast.success('Signed Out', { + description: 'Successfully signed out from Cursor CLI', + }); + // Refresh status after successful logout + onRefresh(); + } else if (result.error) { + toast.error('Sign Out Failed', { + description: result.error, + }); + } + } catch (error) { + toast.error('Sign Out Failed', { + description: error instanceof Error ? error.message : 'Unknown error', + }); + } finally { + setIsDeauthenticating(false); + } + }, [onRefresh]); + if (!status) return ; return ( @@ -215,7 +273,7 @@ export function CursorCliStatus({ status, isChecking, onRefresh }: CursorCliStat
- +

Cursor CLI

@@ -261,7 +319,7 @@ export function CursorCliStatus({ status, isChecking, onRefresh }: CursorCliStat {/* Authentication Status */} {status.authenticated ? ( -
+
@@ -275,6 +333,15 @@ export function CursorCliStatus({ status, isChecking, onRefresh }: CursorCliStat

+
) : ( @@ -285,9 +352,17 @@ export function CursorCliStatus({ status, isChecking, onRefresh }: CursorCliStat

Not Authenticated

- Run cursor auth{' '} - to authenticate with Cursor. + Click Sign In below to get authentication instructions.

+
)} diff --git a/apps/ui/src/components/views/settings-view/cli-status/opencode-cli-status.tsx b/apps/ui/src/components/views/settings-view/cli-status/opencode-cli-status.tsx new file mode 100644 index 00000000..a68dbcb7 --- /dev/null +++ b/apps/ui/src/components/views/settings-view/cli-status/opencode-cli-status.tsx @@ -0,0 +1,306 @@ +import { Button } from '@/components/ui/button'; +import { CheckCircle2, AlertCircle, RefreshCw, XCircle, Bot } from 'lucide-react'; +import { cn } from '@/lib/utils'; +import type { CliStatus } from '../shared/types'; + +export type OpencodeAuthMethod = + | 'api_key_env' // ANTHROPIC_API_KEY or other provider env vars + | 'api_key' // Manually stored API key + | 'oauth' // OAuth authentication + | 'config_file' // Config file with credentials + | 'none'; + +export interface OpencodeAuthStatus { + authenticated: boolean; + method: OpencodeAuthMethod; + hasApiKey?: boolean; + hasEnvApiKey?: boolean; + hasOAuthToken?: boolean; + error?: string; +} + +function getAuthMethodLabel(method: OpencodeAuthMethod): string { + switch (method) { + case 'api_key': + return 'API Key'; + case 'api_key_env': + return 'API Key (Environment)'; + case 'oauth': + return 'OAuth Authentication'; + case 'config_file': + return 'Configuration File'; + default: + return method || 'Unknown'; + } +} + +interface OpencodeCliStatusProps { + status: CliStatus | null; + authStatus?: OpencodeAuthStatus | null; + isChecking: boolean; + onRefresh: () => void; +} + +function SkeletonPulse({ className }: { className?: string }) { + return
; +} + +export function OpencodeCliStatusSkeleton() { + return ( +
+
+
+
+ + +
+ +
+
+ +
+
+
+ {/* Installation status skeleton */} +
+ +
+ + + +
+
+ {/* Auth status skeleton */} +
+ +
+ + +
+
+
+
+ ); +} + +export function OpencodeModelConfigSkeleton() { + return ( +
+
+
+ + +
+
+ +
+
+
+ {/* Default Model skeleton */} +
+ + +
+ {/* Available Models skeleton */} +
+ + {/* Provider group skeleton */} +
+
+ + +
+
+ {[1, 2, 3].map((i) => ( +
+
+ +
+ + +
+
+ +
+ ))} +
+
+
+
+
+ ); +} + +export function OpencodeCliStatus({ + status, + authStatus, + isChecking, + onRefresh, +}: OpencodeCliStatusProps) { + if (!status) return ; + + return ( +
+
+
+
+
+ +
+

OpenCode CLI

+
+ +
+

+ OpenCode CLI provides multi-provider AI support with Claude, GPT, and Gemini models. +

+
+
+ {status.success && status.status === 'installed' ? ( +
+
+
+ +
+
+

OpenCode CLI Installed

+
+ {status.method && ( +

+ Method: {status.method} +

+ )} + {status.version && ( +

+ Version: {status.version} +

+ )} + {status.path && ( +

+ Path: {status.path} +

+ )} +
+
+
+ + {/* Authentication Status */} + {authStatus?.authenticated ? ( +
+
+ +
+
+

Authenticated

+
+

+ Method:{' '} + {getAuthMethodLabel(authStatus.method)} +

+
+
+
+ ) : ( +
+
+ +
+
+

Not Authenticated

+

+ Run{' '} + opencode auth or + set an API key to authenticate. +

+
+
+ )} + + {status.recommendation && ( +

{status.recommendation}

+ )} +
+ ) : ( +
+
+
+ +
+
+

OpenCode CLI Not Detected

+

+ {status.recommendation || 'Install OpenCode CLI to use multi-provider AI models.'} +

+
+
+ {status.installCommands && ( +
+

Installation Commands:

+
+ {status.installCommands.npm && ( +
+

+ npm +

+ + {status.installCommands.npm} + +
+ )} + {status.installCommands.macos && ( +
+

+ macOS/Linux +

+ + {status.installCommands.macos} + +
+ )} +
+
+ )} +
+ )} +
+
+ ); +} diff --git a/apps/ui/src/components/views/settings-view/codex/codex-settings.tsx b/apps/ui/src/components/views/settings-view/codex/codex-settings.tsx new file mode 100644 index 00000000..d46f7a05 --- /dev/null +++ b/apps/ui/src/components/views/settings-view/codex/codex-settings.tsx @@ -0,0 +1,122 @@ +import { Label } from '@/components/ui/label'; +import { Checkbox } from '@/components/ui/checkbox'; +import { FileCode, Globe, ImageIcon } from 'lucide-react'; +import { cn } from '@/lib/utils'; +import { OpenAIIcon } from '@/components/ui/provider-icon'; + +interface CodexSettingsProps { + autoLoadCodexAgents: boolean; + codexEnableWebSearch: boolean; + codexEnableImages: boolean; + onAutoLoadCodexAgentsChange: (enabled: boolean) => void; + onCodexEnableWebSearchChange: (enabled: boolean) => void; + onCodexEnableImagesChange: (enabled: boolean) => void; +} + +const CARD_TITLE = 'Codex CLI Settings'; +const CARD_SUBTITLE = 'Configure Codex instructions and capabilities.'; +const AGENTS_TITLE = 'Auto-load AGENTS.md Instructions'; +const AGENTS_DESCRIPTION = 'Automatically inject project instructions from'; +const AGENTS_PATH = '.codex/AGENTS.md'; +const AGENTS_SUFFIX = 'on each Codex run.'; +const WEB_SEARCH_TITLE = 'Enable Web Search'; +const WEB_SEARCH_DESCRIPTION = 'Allow Codex to search the web for current information.'; +const IMAGES_TITLE = 'Enable Image Support'; +const IMAGES_DESCRIPTION = 'Allow Codex to process images attached to prompts.'; + +export function CodexSettings({ + autoLoadCodexAgents, + codexEnableWebSearch, + codexEnableImages, + onAutoLoadCodexAgentsChange, + onCodexEnableWebSearchChange, + onCodexEnableImagesChange, +}: CodexSettingsProps) { + return ( +
+
+
+
+ +
+

{CARD_TITLE}

+
+

{CARD_SUBTITLE}

+
+
+
+ onAutoLoadCodexAgentsChange(checked === true)} + className="mt-1" + data-testid="auto-load-codex-agents-checkbox" + /> +
+ +

+ {AGENTS_DESCRIPTION}{' '} + {AGENTS_PATH}{' '} + {AGENTS_SUFFIX} +

+
+
+ +
+ onCodexEnableWebSearchChange(checked === true)} + className="mt-1" + data-testid="codex-enable-web-search-checkbox" + /> +
+ +

+ {WEB_SEARCH_DESCRIPTION} +

+
+
+ +
+ onCodexEnableImagesChange(checked === true)} + className="mt-1" + data-testid="codex-enable-images-checkbox" + /> +
+ +

{IMAGES_DESCRIPTION}

+
+
+
+
+ ); +} diff --git a/apps/ui/src/components/views/settings-view/codex/codex-usage-section.tsx b/apps/ui/src/components/views/settings-view/codex/codex-usage-section.tsx new file mode 100644 index 00000000..1e927777 --- /dev/null +++ b/apps/ui/src/components/views/settings-view/codex/codex-usage-section.tsx @@ -0,0 +1,238 @@ +// @ts-nocheck +import { useCallback, useEffect, useState } from 'react'; +import { Button } from '@/components/ui/button'; +import { RefreshCw, AlertCircle } from 'lucide-react'; +import { OpenAIIcon } from '@/components/ui/provider-icon'; +import { cn } from '@/lib/utils'; +import { getElectronAPI } from '@/lib/electron'; +import { + formatCodexCredits, + formatCodexPlanType, + formatCodexResetTime, + getCodexWindowLabel, +} from '@/lib/codex-usage-format'; +import { useSetupStore } from '@/store/setup-store'; +import { useAppStore, type CodexRateLimitWindow } from '@/store/app-store'; + +const ERROR_NO_API = 'Codex usage API not available'; +const CODEX_USAGE_TITLE = 'Codex Usage'; +const CODEX_USAGE_SUBTITLE = 'Shows usage limits reported by the Codex CLI.'; +const CODEX_AUTH_WARNING = 'Authenticate Codex CLI to view usage limits.'; +const CODEX_LOGIN_COMMAND = 'codex login'; +const CODEX_NO_USAGE_MESSAGE = + 'Usage limits are not available yet. Try refreshing if this persists.'; +const UPDATED_LABEL = 'Updated'; +const CODEX_FETCH_ERROR = 'Failed to fetch usage'; +const CODEX_REFRESH_LABEL = 'Refresh Codex usage'; +const PLAN_LABEL = 'Plan'; +const CREDITS_LABEL = 'Credits'; +const WARNING_THRESHOLD = 75; +const CAUTION_THRESHOLD = 50; +const MAX_PERCENTAGE = 100; +const REFRESH_INTERVAL_MS = 60_000; +const STALE_THRESHOLD_MS = 2 * 60_000; +const USAGE_COLOR_CRITICAL = 'bg-red-500'; +const USAGE_COLOR_WARNING = 'bg-amber-500'; +const USAGE_COLOR_OK = 'bg-emerald-500'; + +const isRateLimitWindow = ( + limitWindow: CodexRateLimitWindow | null +): limitWindow is CodexRateLimitWindow => Boolean(limitWindow); + +export function CodexUsageSection() { + const codexAuthStatus = useSetupStore((state) => state.codexAuthStatus); + const { codexUsage, codexUsageLastUpdated, setCodexUsage } = useAppStore(); + const [error, setError] = useState(null); + const [isLoading, setIsLoading] = useState(false); + + const canFetchUsage = !!codexAuthStatus?.authenticated; + const rateLimits = codexUsage?.rateLimits ?? null; + const primary = rateLimits?.primary ?? null; + const secondary = rateLimits?.secondary ?? null; + const credits = rateLimits?.credits ?? null; + const planType = rateLimits?.planType ?? null; + const rateLimitWindows = [primary, secondary].filter(isRateLimitWindow); + const hasMetrics = rateLimitWindows.length > 0; + const lastUpdatedLabel = codexUsage?.lastUpdated + ? new Date(codexUsage.lastUpdated).toLocaleString() + : null; + const showAuthWarning = !canFetchUsage && !codexUsage && !isLoading; + const isStale = !codexUsageLastUpdated || Date.now() - codexUsageLastUpdated > STALE_THRESHOLD_MS; + + const fetchUsage = useCallback(async () => { + setIsLoading(true); + setError(null); + try { + const api = getElectronAPI(); + if (!api.codex) { + setError(ERROR_NO_API); + return; + } + const result = await api.codex.getUsage(); + if ('error' in result) { + setError(result.message || result.error); + return; + } + setCodexUsage(result); + } catch (fetchError) { + const message = fetchError instanceof Error ? fetchError.message : CODEX_FETCH_ERROR; + setError(message); + } finally { + setIsLoading(false); + } + }, [setCodexUsage]); + + useEffect(() => { + if (canFetchUsage && isStale) { + void fetchUsage(); + } + }, [fetchUsage, canFetchUsage, isStale]); + + useEffect(() => { + if (!canFetchUsage) return undefined; + + const intervalId = setInterval(() => { + void fetchUsage(); + }, REFRESH_INTERVAL_MS); + + return () => clearInterval(intervalId); + }, [fetchUsage, canFetchUsage]); + + const getUsageColor = (percentage: number) => { + if (percentage >= WARNING_THRESHOLD) { + return USAGE_COLOR_CRITICAL; + } + if (percentage >= CAUTION_THRESHOLD) { + return USAGE_COLOR_WARNING; + } + return USAGE_COLOR_OK; + }; + + const RateLimitCard = ({ + title, + subtitle, + window: limitWindow, + }: { + title: string; + subtitle: string; + window: CodexRateLimitWindow; + }) => { + const safePercentage = Math.min(Math.max(limitWindow.usedPercent, 0), MAX_PERCENTAGE); + const resetLabel = formatCodexResetTime(limitWindow.resetsAt); + + return ( +
+
+
+

{title}

+

{subtitle}

+
+ + {Math.round(safePercentage)}% + +
+
+
+
+ {resetLabel &&

{resetLabel}

} +
+ ); + }; + + return ( +
+
+
+
+ +
+

+ {CODEX_USAGE_TITLE} +

+ +
+

{CODEX_USAGE_SUBTITLE}

+
+
+ {showAuthWarning && ( +
+ +
+ {CODEX_AUTH_WARNING} Run {CODEX_LOGIN_COMMAND}. +
+
+ )} + {error && ( +
+ +
{error}
+
+ )} + {hasMetrics && ( +
+ {rateLimitWindows.map((limitWindow, index) => { + const { title, subtitle } = getCodexWindowLabel(limitWindow.windowDurationMins); + return ( + + ); + })} +
+ )} + {(planType || credits) && ( +
+ {planType && ( +
+ {PLAN_LABEL}:{' '} + {formatCodexPlanType(planType)} +
+ )} + {credits && ( +
+ {CREDITS_LABEL}:{' '} + {formatCodexCredits(credits)} +
+ )} +
+ )} + {!hasMetrics && !error && canFetchUsage && !isLoading && ( +
+ {CODEX_NO_USAGE_MESSAGE} +
+ )} + {lastUpdatedLabel && ( +
+ {UPDATED_LABEL} {lastUpdatedLabel} +
+ )} +
+
+ ); +} diff --git a/apps/ui/src/components/views/settings-view/components/settings-navigation.tsx b/apps/ui/src/components/views/settings-view/components/settings-navigation.tsx index 1083b10d..4af7f5bf 100644 --- a/apps/ui/src/components/views/settings-view/components/settings-navigation.tsx +++ b/apps/ui/src/components/views/settings-view/components/settings-navigation.tsx @@ -1,8 +1,13 @@ +import { useState, useEffect } from 'react'; +import { ChevronDown, ChevronRight } from 'lucide-react'; import { cn } from '@/lib/utils'; import type { Project } from '@/lib/electron'; -import type { NavigationItem } from '../config/navigation'; +import type { NavigationItem, NavigationGroup } from '../config/navigation'; +import { GLOBAL_NAV_GROUPS, PROJECT_NAV_ITEMS } from '../config/navigation'; import type { SettingsViewId } from '../hooks/use-settings-view'; +const PROVIDERS_DROPDOWN_KEY = 'settings-providers-dropdown-open'; + interface SettingsNavigationProps { navItems: NavigationItem[]; activeSection: SettingsViewId; @@ -10,33 +15,118 @@ interface SettingsNavigationProps { onNavigate: (sectionId: SettingsViewId) => void; } -export function SettingsNavigation({ - navItems, - activeSection, - currentProject, +function NavButton({ + item, + isActive, onNavigate, -}: SettingsNavigationProps) { +}: { + item: NavigationItem; + isActive: boolean; + onNavigate: (sectionId: SettingsViewId) => void; +}) { + const Icon = item.icon; return ( -