@gguf/claw
Version:
Multi-channel AI gateway with extensible messaging integrations
341 lines (338 loc) • 12.9 kB
JavaScript
import { t as __exportAll } from "./rolldown-runtime-Cbj13DAv.js";
import { B as theme } from "./utils-CP9YLh6M.js";
import { f as defaultRuntime } from "./subsystem-BCQGGxdd.js";
import { t as runCommandWithTimeout } from "./exec-DYqRzFbo.js";
import { i as loadConfig } from "./config-PQiujvsf.js";
import os from "node:os";
import qrcode from "qrcode-terminal";
//#region src/pairing/setup-code.ts
const DEFAULT_GATEWAY_PORT = 18789;
function normalizeUrl(raw, schemeFallback) {
const trimmed = raw.trim();
if (!trimmed) return null;
try {
const parsed = new URL(trimmed);
const scheme = parsed.protocol.replace(":", "");
if (!scheme) return null;
const resolvedScheme = scheme === "http" ? "ws" : scheme === "https" ? "wss" : scheme;
if (resolvedScheme !== "ws" && resolvedScheme !== "wss") return null;
const host = parsed.hostname;
if (!host) return null;
return `${resolvedScheme}://${host}${parsed.port ? `:${parsed.port}` : ""}`;
} catch {}
const withoutPath = trimmed.split("/")[0] ?? "";
if (!withoutPath) return null;
return `${schemeFallback}://${withoutPath}`;
}
function resolveGatewayPort(cfg, env) {
const envRaw = env.OPENCLAW_GATEWAY_PORT?.trim() || env.CLAWDBOT_GATEWAY_PORT?.trim();
if (envRaw) {
const parsed = Number.parseInt(envRaw, 10);
if (Number.isFinite(parsed) && parsed > 0) return parsed;
}
const configPort = cfg.gateway?.port;
if (typeof configPort === "number" && Number.isFinite(configPort) && configPort > 0) return configPort;
return DEFAULT_GATEWAY_PORT;
}
function resolveScheme(cfg, opts) {
if (opts?.forceSecure) return "wss";
return cfg.gateway?.tls?.enabled === true ? "wss" : "ws";
}
function parseIPv4Octets(address) {
const parts = address.split(".");
if (parts.length !== 4) return null;
const octets = parts.map((part) => Number.parseInt(part, 10));
if (octets.some((value) => !Number.isFinite(value) || value < 0 || value > 255)) return null;
return [
octets[0],
octets[1],
octets[2],
octets[3]
];
}
function isPrivateIPv4(address) {
const octets = parseIPv4Octets(address);
if (!octets) return false;
const [a, b] = octets;
if (a === 10) return true;
if (a === 172 && b >= 16 && b <= 31) return true;
if (a === 192 && b === 168) return true;
return false;
}
function isTailnetIPv4(address) {
const octets = parseIPv4Octets(address);
if (!octets) return false;
const [a, b] = octets;
return a === 100 && b >= 64 && b <= 127;
}
function pickIPv4Matching(networkInterfaces, matches) {
const nets = networkInterfaces();
for (const entries of Object.values(nets)) {
if (!entries) continue;
for (const entry of entries) {
const isIpv4 = entry?.family === "IPv4";
if (!entry || entry.internal || !isIpv4) continue;
const address = entry.address?.trim() ?? "";
if (!address) continue;
if (matches(address)) return address;
}
}
return null;
}
function pickLanIPv4(networkInterfaces) {
return pickIPv4Matching(networkInterfaces, isPrivateIPv4);
}
function pickTailnetIPv4(networkInterfaces) {
return pickIPv4Matching(networkInterfaces, isTailnetIPv4);
}
function parsePossiblyNoisyJsonObject(raw) {
const start = raw.indexOf("{");
const end = raw.lastIndexOf("}");
if (start === -1 || end <= start) return {};
try {
return JSON.parse(raw.slice(start, end + 1));
} catch {
return {};
}
}
async function resolveTailnetHost(runCommandWithTimeout) {
if (!runCommandWithTimeout) return null;
for (const candidate of ["tailscale", "/Applications/Tailscale.app/Contents/MacOS/Tailscale"]) try {
const result = await runCommandWithTimeout([
candidate,
"status",
"--json"
], { timeoutMs: 5e3 });
if (result.code !== 0) continue;
const raw = result.stdout.trim();
if (!raw) continue;
const parsed = parsePossiblyNoisyJsonObject(raw);
const self = typeof parsed.Self === "object" && parsed.Self !== null ? parsed.Self : void 0;
const dns = typeof self?.DNSName === "string" ? self.DNSName : void 0;
if (dns && dns.length > 0) return dns.replace(/\.$/, "");
const ips = Array.isArray(self?.TailscaleIPs) ? self.TailscaleIPs : [];
if (ips.length > 0) return ips[0] ?? null;
} catch {
continue;
}
return null;
}
function resolveAuth(cfg, env) {
const mode = cfg.gateway?.auth?.mode;
const token = env.OPENCLAW_GATEWAY_TOKEN?.trim() || env.CLAWDBOT_GATEWAY_TOKEN?.trim() || cfg.gateway?.auth?.token?.trim();
const password = env.OPENCLAW_GATEWAY_PASSWORD?.trim() || env.CLAWDBOT_GATEWAY_PASSWORD?.trim() || cfg.gateway?.auth?.password?.trim();
if (mode === "password") {
if (!password) return { error: "Gateway auth is set to password, but no password is configured." };
return {
password,
label: "password"
};
}
if (mode === "token") {
if (!token) return { error: "Gateway auth is set to token, but no token is configured." };
return {
token,
label: "token"
};
}
if (token) return {
token,
label: "token"
};
if (password) return {
password,
label: "password"
};
return { error: "Gateway auth is not configured (no token or password)." };
}
async function resolveGatewayUrl(cfg, opts) {
const scheme = resolveScheme(cfg, { forceSecure: opts.forceSecure });
const port = resolveGatewayPort(cfg, opts.env);
if (typeof opts.publicUrl === "string" && opts.publicUrl.trim()) {
const url = normalizeUrl(opts.publicUrl, scheme);
if (url) return {
url,
source: "plugins.entries.device-pair.config.publicUrl"
};
return { error: "Configured publicUrl is invalid." };
}
const remoteUrlRaw = cfg.gateway?.remote?.url;
const remoteUrl = typeof remoteUrlRaw === "string" && remoteUrlRaw.trim() ? normalizeUrl(remoteUrlRaw, scheme) : null;
if (opts.preferRemoteUrl && remoteUrl) return {
url: remoteUrl,
source: "gateway.remote.url"
};
const tailscaleMode = cfg.gateway?.tailscale?.mode ?? "off";
if (tailscaleMode === "serve" || tailscaleMode === "funnel") {
const host = await resolveTailnetHost(opts.runCommandWithTimeout);
if (!host) return { error: "Tailscale Serve is enabled, but MagicDNS could not be resolved." };
return {
url: `wss://${host}`,
source: `gateway.tailscale.mode=${tailscaleMode}`
};
}
if (remoteUrl) return {
url: remoteUrl,
source: "gateway.remote.url"
};
const bind = cfg.gateway?.bind ?? "loopback";
if (bind === "custom") {
const host = cfg.gateway?.customBindHost?.trim();
if (host) return {
url: `${scheme}://${host}:${port}`,
source: "gateway.bind=custom"
};
return { error: "gateway.bind=custom requires gateway.customBindHost." };
}
if (bind === "tailnet") {
const host = pickTailnetIPv4(opts.networkInterfaces);
if (host) return {
url: `${scheme}://${host}:${port}`,
source: "gateway.bind=tailnet"
};
return { error: "gateway.bind=tailnet set, but no tailnet IP was found." };
}
if (bind === "lan") {
const host = pickLanIPv4(opts.networkInterfaces);
if (host) return {
url: `${scheme}://${host}:${port}`,
source: "gateway.bind=lan"
};
return { error: "gateway.bind=lan set, but no private LAN IP was found." };
}
return { error: "Gateway is only bound to loopback. Set gateway.bind=lan, enable tailscale serve, or configure plugins.entries.device-pair.config.publicUrl." };
}
function encodePairingSetupCode(payload) {
const json = JSON.stringify(payload);
return Buffer.from(json, "utf8").toString("base64").replace(/\+/g, "-").replace(/\//g, "_").replace(/=+$/g, "");
}
async function resolvePairingSetupFromConfig(cfg, options = {}) {
const env = options.env ?? process.env;
const auth = resolveAuth(cfg, env);
if (auth.error) return {
ok: false,
error: auth.error
};
const urlResult = await resolveGatewayUrl(cfg, {
env,
publicUrl: options.publicUrl,
preferRemoteUrl: options.preferRemoteUrl,
forceSecure: options.forceSecure,
runCommandWithTimeout: options.runCommandWithTimeout,
networkInterfaces: options.networkInterfaces ?? os.networkInterfaces
});
if (!urlResult.url) return {
ok: false,
error: urlResult.error ?? "Gateway URL unavailable."
};
if (!auth.label) return {
ok: false,
error: "Gateway auth is not configured (no token or password)."
};
return {
ok: true,
payload: {
url: urlResult.url,
token: auth.token,
password: auth.password
},
authLabel: auth.label,
urlSource: urlResult.source ?? "unknown"
};
}
//#endregion
//#region src/cli/qr-cli.ts
var qr_cli_exports = /* @__PURE__ */ __exportAll({ registerQrCli: () => registerQrCli });
function renderQrAscii(data) {
return new Promise((resolve) => {
qrcode.generate(data, { small: true }, (output) => {
resolve(output);
});
});
}
function readDevicePairPublicUrlFromConfig(cfg) {
const value = cfg.plugins?.entries?.["device-pair"]?.config?.["publicUrl"];
if (typeof value !== "string") return;
const trimmed = value.trim();
return trimmed.length > 0 ? trimmed : void 0;
}
function registerQrCli(program) {
program.command("qr").description("Generate an iOS pairing QR code and setup code").option("--remote", "Use gateway.remote.url and gateway.remote token/password (ignores device-pair publicUrl)", false).option("--url <url>", "Override gateway URL used in the setup payload").option("--public-url <url>", "Override gateway public URL used in the setup payload").option("--token <token>", "Override gateway token for setup payload").option("--password <password>", "Override gateway password for setup payload").option("--setup-code-only", "Print only the setup code", false).option("--no-ascii", "Skip ASCII QR rendering").option("--json", "Output JSON", false).action(async (opts) => {
try {
if (opts.token && opts.password) throw new Error("Use either --token or --password, not both.");
const loaded = loadConfig();
const cfg = {
...loaded,
gateway: {
...loaded.gateway,
auth: { ...loaded.gateway?.auth }
}
};
const token = typeof opts.token === "string" ? opts.token.trim() : "";
const password = typeof opts.password === "string" ? opts.password.trim() : "";
const wantsRemote = opts.remote === true;
if (token) {
cfg.gateway.auth.mode = "token";
cfg.gateway.auth.token = token;
}
if (password) {
cfg.gateway.auth.mode = "password";
cfg.gateway.auth.password = password;
}
if (wantsRemote && !token && !password) {
const remoteToken = typeof cfg.gateway?.remote?.token === "string" ? cfg.gateway.remote.token.trim() : "";
const remotePassword = typeof cfg.gateway?.remote?.password === "string" ? cfg.gateway.remote.password.trim() : "";
if (remoteToken) {
cfg.gateway.auth.mode = "token";
cfg.gateway.auth.token = remoteToken;
cfg.gateway.auth.password = void 0;
} else if (remotePassword) {
cfg.gateway.auth.mode = "password";
cfg.gateway.auth.password = remotePassword;
cfg.gateway.auth.token = void 0;
}
}
if (wantsRemote && !opts.url && !opts.publicUrl) {
const tailscaleMode = cfg.gateway?.tailscale?.mode ?? "off";
const remoteUrl = cfg.gateway?.remote?.url;
if (!(typeof remoteUrl === "string" && remoteUrl.trim().length > 0) && !(tailscaleMode === "serve" || tailscaleMode === "funnel")) throw new Error("qr --remote requires gateway.remote.url (or gateway.tailscale.mode=serve/funnel).");
}
const resolved = await resolvePairingSetupFromConfig(cfg, {
publicUrl: (typeof opts.url === "string" && opts.url.trim() ? opts.url.trim() : typeof opts.publicUrl === "string" && opts.publicUrl.trim() ? opts.publicUrl.trim() : void 0) ?? (wantsRemote ? void 0 : readDevicePairPublicUrlFromConfig(cfg)),
preferRemoteUrl: wantsRemote,
runCommandWithTimeout: async (argv, runOpts) => await runCommandWithTimeout(argv, { timeoutMs: runOpts.timeoutMs })
});
if (!resolved.ok) throw new Error(resolved.error);
const setupCode = encodePairingSetupCode(resolved.payload);
if (opts.setupCodeOnly) {
defaultRuntime.log(setupCode);
return;
}
if (opts.json) {
defaultRuntime.log(JSON.stringify({
setupCode,
gatewayUrl: resolved.payload.url,
auth: resolved.authLabel,
urlSource: resolved.urlSource
}, null, 2));
return;
}
const lines = [
theme.heading("Pairing QR"),
"Scan this with the OpenClaw iOS app (Onboarding -> Scan QR).",
""
];
if (opts.ascii !== false) {
const qrAscii = await renderQrAscii(setupCode);
lines.push(qrAscii.trimEnd(), "");
}
lines.push(`${theme.muted("Setup code:")} ${setupCode}`, `${theme.muted("Gateway:")} ${resolved.payload.url}`, `${theme.muted("Auth:")} ${resolved.authLabel}`, `${theme.muted("Source:")} ${resolved.urlSource}`, "", "Approve after scan with:", ` ${theme.command("openclaw devices list")}`, ` ${theme.command("openclaw devices approve <requestId>")}`);
defaultRuntime.log(lines.join("\n"));
} catch (err) {
defaultRuntime.error(String(err));
defaultRuntime.exit(1);
}
});
}
//#endregion
export { registerQrCli as n, qr_cli_exports as t };