All files / src/agent credential-handler.ts

13.58% Statements 11/81
7.69% Branches 3/39
30% Functions 3/10
13.33% Lines 10/75

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209                                    15x     15x       23x 23x 23x                 8x                                                                                                                                                                         10x 10x   10x                                             10x                                                                                                                          
/**
 * CredentialHandler — Account selection, credential management, and exhaustion handling.
 *
 * Extracted from MultiProviderAgentManager. Handles account lifecycle:
 * selecting the next available account, writing credentials to disk,
 * ensuring they're fresh, and marking accounts as exhausted on failure.
 */
 
import { readFileSync, existsSync } from 'node:fs';
import { join } from 'node:path';
import type { AccountRepository } from '../db/repositories/account-repository.js';
import type { AccountCredentialManager } from './credentials/types.js';
import type { Account } from '../db/schema.js';
import { ensureAccountCredentials } from './accounts/usage.js';
import { getAccountConfigDir } from './accounts/paths.js';
import { setupAccountConfigDir } from './accounts/setup.js';
import { createModuleLogger } from '../logger/index.js';
 
const log = createModuleLogger('credential-handler');
 
/** Default exhaustion duration: 5 hours */
const DEFAULT_EXHAUSTION_HOURS = 5;
 
export class CredentialHandler {
  constructor(
    private workspaceRoot: string,
    private accountRepository?: AccountRepository,
    private credentialManager?: AccountCredentialManager,
  ) {}
 
  /**
   * Select the next available account for a provider.
   * Clears expired exhaustion, returns least-recently-used non-exhausted account.
   * Returns null if no accounts are available.
   */
  async selectAccount(providerName: string): Promise<{ account: Account; accountId: string; configDir: string } | null> {
    Eif (!this.accountRepository) return null;
 
    await this.accountRepository.clearExpiredExhaustion();
    const account = await this.accountRepository.findNextAvailable(providerName);
    if (!account) return null;
 
    const configDir = getAccountConfigDir(this.workspaceRoot, account.id);
    await this.accountRepository.updateLastUsed(account.id);
 
    return { account, accountId: account.id, configDir };
  }
 
  /**
   * Write account credentials from DB to the convention-based config directory.
   * Must be called before ensureCredentials so the files exist on disk.
   */
  writeCredentialsToDisk(account: Account, configDir: string): void {
    if (account.configJson && account.credentials) {
      setupAccountConfigDir(configDir, {
        configJson: JSON.parse(account.configJson),
        credentials: account.credentials,
      });
      log.debug({ accountId: account.id, configDir }, 'wrote account credentials from DB to disk');
    } else {
      log.warn({ accountId: account.id }, 'account has no stored credentials in DB');
    }
  }
 
  /**
   * Read refreshed credentials from disk and persist back to DB.
   * Called after credential refresh to keep DB in sync.
   */
  async persistRefreshedCredentials(accountId: string, configDir: string): Promise<void> {
    if (!this.accountRepository) return;
    try {
      const credPath = join(configDir, '.credentials.json');
      const credentials = readFileSync(credPath, 'utf-8');
      await this.accountRepository.updateCredentials(accountId, credentials);
      log.debug({ accountId }, 'persisted refreshed credentials back to DB');
    } catch (err) {
      log.warn({ accountId, err: err instanceof Error ? err.message : String(err) }, 'failed to persist refreshed credentials to DB');
    }
  }
 
  /**
   * Ensure credentials are valid before spawn/resume.
   * Uses credentialManager if available, otherwise falls back to legacy function.
   * Returns { valid, refreshed } so callers can persist refresh back to DB.
   */
  async ensureCredentials(configDir: string, accountId?: string): Promise<{ valid: boolean; refreshed: boolean }> {
    if (this.credentialManager) {
      const result = await this.credentialManager.ensureValid(configDir, accountId);
      return { valid: result.valid, refreshed: result.refreshed };
    }
    const valid = await ensureAccountCredentials(configDir);
    return { valid, refreshed: false };
  }
 
  /**
   * Read the access token from a config directory's .credentials.json.
   * Returns null if credentials file is missing or malformed.
   * Used for CLAUDE_CODE_OAUTH_TOKEN env var injection.
   */
  readAccessToken(configDir: string): string | null {
    try {
      const credPath = join(configDir, '.credentials.json');
      if (!existsSync(credPath)) return null;
      const raw = readFileSync(credPath, 'utf-8');
      const parsed = JSON.parse(raw);
      return parsed.claudeAiOauth?.accessToken ?? null;
    } catch {
      return null;
    }
  }
 
  /**
   * Prepare process environment with account credentials.
   * Writes credentials to disk, ensures freshness, injects OAuth token.
   * Used by spawn, resumeForCommit, and resumeInternal.
   */
  async prepareProcessEnv(
    providerEnv: Record<string, string>,
    provider: { configDirEnv?: string },
    accountId: string | null,
  ): Promise<{ processEnv: Record<string, string>; accountConfigDir: string | null }> {
    const processEnv: Record<string, string> = { ...providerEnv };
    let accountConfigDir: string | null = null;
 
    Iif (accountId && provider.configDirEnv && this.accountRepository) {
      accountConfigDir = getAccountConfigDir(this.workspaceRoot, accountId);
      const account = await this.accountRepository.findById(accountId);
      if (account) {
        this.writeCredentialsToDisk(account, accountConfigDir);
      }
      processEnv[provider.configDirEnv] = accountConfigDir;
 
      const { valid, refreshed } = await this.ensureCredentials(accountConfigDir, accountId);
      if (!valid) {
        log.warn({ accountId }, 'failed to refresh credentials');
      }
      if (refreshed) {
        await this.persistRefreshedCredentials(accountId, accountConfigDir);
      }
 
      const accessToken = this.readAccessToken(accountConfigDir);
      if (accessToken) {
        processEnv['CLAUDE_CODE_OAUTH_TOKEN'] = accessToken;
        log.debug({ accountId }, 'CLAUDE_CODE_OAUTH_TOKEN injected');
      }
    }
 
    return { processEnv, accountConfigDir };
  }
 
  /**
   * Check if an error message indicates usage limit exhaustion.
   */
  isUsageLimitError(errorMessage: string): boolean {
    const patterns = [
      'usage limit',
      'rate limit',
      'quota exceeded',
      'too many requests',
      'capacity',
      'exhausted',
    ];
    const lower = errorMessage.toLowerCase();
    return patterns.some((p) => lower.includes(p));
  }
 
  /**
   * Handle account exhaustion: mark current account exhausted and find next available.
   * Returns the new account info if failover succeeded, null otherwise.
   * Does NOT re-spawn — the caller (manager) handles that.
   */
  async handleExhaustion(
    accountId: string,
    providerName: string,
  ): Promise<{ account: Account; accountId: string; configDir: string } | null> {
    if (!this.accountRepository) return null;
 
    log.warn({ accountId, provider: providerName }, 'account exhausted, attempting failover');
 
    // Mark current account as exhausted
    const exhaustedUntil = new Date(Date.now() + DEFAULT_EXHAUSTION_HOURS * 60 * 60 * 1000);
    await this.accountRepository.markExhausted(accountId, exhaustedUntil);
 
    // Find next available account
    const nextAccount = await this.accountRepository.findNextAvailable(providerName);
    if (!nextAccount) {
      log.warn({ accountId }, 'account failover failed, no accounts available');
      return null;
    }
    log.info({ previousAccountId: accountId, newAccountId: nextAccount.id }, 'account failover successful');
 
    // Write credentials and ensure they're fresh
    const nextConfigDir = getAccountConfigDir(this.workspaceRoot, nextAccount.id);
    this.writeCredentialsToDisk(nextAccount, nextConfigDir);
    const { valid, refreshed } = await this.ensureCredentials(nextConfigDir, nextAccount.id);
    if (!valid) {
      log.warn({ newAccountId: nextAccount.id }, 'failed to refresh failover account credentials');
      return null;
    }
    if (refreshed) {
      await this.persistRefreshedCredentials(nextAccount.id, nextConfigDir);
    }
 
    await this.accountRepository.updateLastUsed(nextAccount.id);
 
    return { account: nextAccount, accountId: nextAccount.id, configDir: nextConfigDir };
  }
}