Spaces:
Sleeping
Sleeping
File size: 12,793 Bytes
c1ae554 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 |
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
JWT Authentication for Warp API
Handles JWT token management, refresh, and validation.
Integrates functionality from refresh_jwt.py.
"""
import base64
import json
import os
import time
from pathlib import Path
import httpx
import asyncio
from dotenv import load_dotenv, set_key
from ..config.settings import REFRESH_TOKEN_B64, REFRESH_URL, CLIENT_VERSION, OS_CATEGORY, OS_NAME, OS_VERSION
from .logging import logger, log
def decode_jwt_payload(token: str) -> dict:
"""Decode JWT payload to check expiration"""
try:
parts = token.split('.')
if len(parts) != 3:
return {}
payload_b64 = parts[1]
padding = 4 - len(payload_b64) % 4
if padding != 4:
payload_b64 += '=' * padding
payload_bytes = base64.urlsafe_b64decode(payload_b64)
payload = json.loads(payload_bytes.decode('utf-8'))
return payload
except Exception as e:
logger.debug(f"Error decoding JWT: {e}")
return {}
def is_token_expired(token: str, buffer_minutes: int = 5) -> bool:
payload = decode_jwt_payload(token)
if not payload or 'exp' not in payload:
return True
expiry_time = payload['exp']
current_time = time.time()
buffer_time = buffer_minutes * 60
return (expiry_time - current_time) <= buffer_time
async def refresh_jwt_token() -> dict:
"""Refresh the JWT token using the refresh token.
Prefers environment variable WARP_REFRESH_TOKEN when present; otherwise
falls back to the baked-in REFRESH_TOKEN_B64 payload.
"""
logger.info("Refreshing JWT token...")
# Prefer dynamic refresh token from environment if present
env_refresh = os.getenv("WARP_REFRESH_TOKEN")
if env_refresh:
payload = f"grant_type=refresh_token&refresh_token={env_refresh}".encode("utf-8")
else:
payload = base64.b64decode(REFRESH_TOKEN_B64)
headers = {
"x-warp-client-version": CLIENT_VERSION,
"x-warp-os-category": OS_CATEGORY,
"x-warp-os-name": OS_NAME,
"x-warp-os-version": OS_VERSION,
"content-type": "application/x-www-form-urlencoded",
"accept": "*/*",
"accept-encoding": "gzip, br",
"content-length": str(len(payload))
}
try:
async with httpx.AsyncClient(timeout=30.0) as client:
response = await client.post(
REFRESH_URL,
headers=headers,
content=payload
)
if response.status_code == 200:
token_data = response.json()
logger.info("Token refresh successful")
return token_data
else:
logger.error(f"Token refresh failed: {response.status_code}")
logger.error(f"Response: {response.text}")
return {}
except Exception as e:
logger.error(f"Error refreshing token: {e}")
return {}
def update_env_file(new_jwt: str) -> bool:
env_path = Path(".env")
try:
set_key(str(env_path), "WARP_JWT", new_jwt)
logger.info("Updated .env file with new JWT token")
return True
except Exception as e:
logger.error(f"Error updating .env file: {e}")
return False
def update_env_refresh_token(refresh_token: str) -> bool:
env_path = Path(".env")
try:
set_key(str(env_path), "WARP_REFRESH_TOKEN", refresh_token)
logger.info("Updated .env with WARP_REFRESH_TOKEN")
return True
except Exception as e:
logger.error(f"Error updating .env WARP_REFRESH_TOKEN: {e}")
return False
async def check_and_refresh_token() -> bool:
current_jwt = os.getenv("WARP_JWT")
if not current_jwt:
logger.warning("No JWT token found in environment")
token_data = await refresh_jwt_token()
if token_data and "access_token" in token_data:
return update_env_file(token_data["access_token"])
return False
logger.debug("Checking current JWT token expiration...")
if is_token_expired(current_jwt, buffer_minutes=15):
logger.info("JWT token is expired or expiring soon, refreshing...")
token_data = await refresh_jwt_token()
if token_data and "access_token" in token_data:
new_jwt = token_data["access_token"]
if not is_token_expired(new_jwt, buffer_minutes=0):
logger.info("New token is valid")
return update_env_file(new_jwt)
else:
logger.warning("New token appears to be invalid or expired")
return False
else:
logger.error("Failed to get new token from refresh")
return False
else:
payload = decode_jwt_payload(current_jwt)
if payload and 'exp' in payload:
expiry_time = payload['exp']
time_left = expiry_time - time.time()
hours_left = time_left / 3600
logger.debug(f"Current token is still valid ({hours_left:.1f} hours remaining)")
else:
logger.debug("Current token appears valid")
return True
async def get_valid_jwt() -> str:
from dotenv import load_dotenv as _load
_load(override=True)
jwt = os.getenv("WARP_JWT")
if not jwt:
logger.info("No JWT token found, attempting to refresh...")
if await check_and_refresh_token():
_load(override=True)
jwt = os.getenv("WARP_JWT")
if not jwt:
raise RuntimeError("WARP_JWT is not set and refresh failed")
if is_token_expired(jwt, buffer_minutes=2):
logger.info("JWT token is expired or expiring soon, attempting to refresh...")
if await check_and_refresh_token():
_load(override=True)
jwt = os.getenv("WARP_JWT")
if not jwt or is_token_expired(jwt, buffer_minutes=0):
logger.warning("Warning: New token has short expiry but proceeding anyway")
else:
logger.warning("Warning: JWT token refresh failed, trying to use existing token")
return jwt
def get_jwt_token() -> str:
from dotenv import load_dotenv as _load
_load()
return os.getenv("WARP_JWT", "")
async def refresh_jwt_if_needed() -> bool:
try:
return await check_and_refresh_token()
except Exception as e:
logger.error(f"JWT refresh failed: {e}")
return False
# ============ Anonymous token acquisition (quota refresh) ============
_ANON_GQL_URL = "https://app.warp.dev/graphql/v2?op=CreateAnonymousUser"
_IDENTITY_TOOLKIT_BASE = "https://identitytoolkit.googleapis.com/v1/accounts:signInWithCustomToken"
def _extract_google_api_key_from_refresh_url() -> str:
try:
# REFRESH_URL like: https://app.warp.dev/proxy/token?key=API_KEY
from urllib.parse import urlparse, parse_qs
parsed = urlparse(REFRESH_URL)
qs = parse_qs(parsed.query)
key = qs.get("key", [""])[0]
return key
except Exception:
return ""
async def _create_anonymous_user() -> dict:
headers = {
"accept-encoding": "gzip, br",
"content-type": "application/json",
"x-warp-client-version": CLIENT_VERSION,
"x-warp-os-category": OS_CATEGORY,
"x-warp-os-name": OS_NAME,
"x-warp-os-version": OS_VERSION,
}
# GraphQL payload per anonymous.MD
query = (
"mutation CreateAnonymousUser($input: CreateAnonymousUserInput!, $requestContext: RequestContext!) {\n"
" createAnonymousUser(input: $input, requestContext: $requestContext) {\n"
" __typename\n"
" ... on CreateAnonymousUserOutput {\n"
" expiresAt\n"
" anonymousUserType\n"
" firebaseUid\n"
" idToken\n"
" isInviteValid\n"
" responseContext { serverVersion }\n"
" }\n"
" ... on UserFacingError {\n"
" error { __typename message }\n"
" responseContext { serverVersion }\n"
" }\n"
" }\n"
"}\n"
)
variables = {
"input": {
"anonymousUserType": "NATIVE_CLIENT_ANONYMOUS_USER_FEATURE_GATED",
"expirationType": "NO_EXPIRATION",
"referralCode": None
},
"requestContext": {
"clientContext": {"version": CLIENT_VERSION},
"osContext": {
"category": OS_CATEGORY,
"linuxKernelVersion": None,
"name": OS_NAME,
"version": OS_VERSION,
}
}
}
body = {"query": query, "variables": variables, "operationName": "CreateAnonymousUser"}
async with httpx.AsyncClient(timeout=httpx.Timeout(30.0)) as client:
resp = await client.post(_ANON_GQL_URL, headers=headers, json=body)
if resp.status_code != 200:
raise RuntimeError(f"CreateAnonymousUser failed: HTTP {resp.status_code} {resp.text[:200]}")
data = resp.json()
return data
async def _exchange_id_token_for_refresh_token(id_token: str) -> dict:
key = _extract_google_api_key_from_refresh_url()
url = f"{_IDENTITY_TOOLKIT_BASE}?key={key}" if key else f"{_IDENTITY_TOOLKIT_BASE}?key=AIzaSyBdy3O3S9hrdayLJxJ7mriBR4qgUaUygAs"
headers = {
"accept-encoding": "gzip, br",
"content-type": "application/x-www-form-urlencoded",
"x-warp-client-version": CLIENT_VERSION,
"x-warp-os-category": OS_CATEGORY,
"x-warp-os-name": OS_NAME,
"x-warp-os-version": OS_VERSION,
}
form = {
"returnSecureToken": "true",
"token": id_token,
}
async with httpx.AsyncClient(timeout=httpx.Timeout(30.0)) as client:
resp = await client.post(url, headers=headers, data=form)
if resp.status_code != 200:
raise RuntimeError(f"signInWithCustomToken failed: HTTP {resp.status_code} {resp.text[:200]}")
return resp.json()
async def acquire_anonymous_access_token() -> str:
"""Acquire a new anonymous access token (quota refresh) and persist to .env.
Returns the new access token string. Raises on failure.
"""
logger.info("Acquiring anonymous access token via GraphQL + Identity Toolkit…")
data = await _create_anonymous_user()
id_token = None
try:
id_token = data["data"]["createAnonymousUser"].get("idToken")
except Exception:
pass
if not id_token:
raise RuntimeError(f"CreateAnonymousUser did not return idToken: {data}")
signin = await _exchange_id_token_for_refresh_token(id_token)
refresh_token = signin.get("refreshToken")
if not refresh_token:
raise RuntimeError(f"signInWithCustomToken did not return refreshToken: {signin}")
# Persist refresh token for future time-based refreshes
update_env_refresh_token(refresh_token)
# Now call Warp proxy token endpoint to get access_token using this refresh token
payload = f"grant_type=refresh_token&refresh_token={refresh_token}".encode("utf-8")
headers = {
"x-warp-client-version": CLIENT_VERSION,
"x-warp-os-category": OS_CATEGORY,
"x-warp-os-name": OS_NAME,
"x-warp-os-version": OS_VERSION,
"content-type": "application/x-www-form-urlencoded",
"accept": "*/*",
"accept-encoding": "gzip, br",
"content-length": str(len(payload))
}
async with httpx.AsyncClient(timeout=httpx.Timeout(30.0)) as client:
resp = await client.post(REFRESH_URL, headers=headers, content=payload)
if resp.status_code != 200:
raise RuntimeError(f"Acquire access_token failed: HTTP {resp.status_code} {resp.text[:200]}")
token_data = resp.json()
access = token_data.get("access_token")
if not access:
raise RuntimeError(f"No access_token in response: {token_data}")
update_env_file(access)
return access
def print_token_info():
current_jwt = os.getenv("WARP_JWT")
if not current_jwt:
logger.info("No JWT token found")
return
payload = decode_jwt_payload(current_jwt)
if not payload:
logger.info("Cannot decode JWT token")
return
logger.info("=== JWT Token Information ===")
if 'email' in payload:
logger.info(f"Email: {payload['email']}")
if 'user_id' in payload:
logger.info(f"User ID: {payload['user_id']}") |