mirror of
https://github.com/google-gemini/gemini-cli.git
synced 2026-03-16 09:01:17 -07:00
166 lines
5.4 KiB
TypeScript
166 lines
5.4 KiB
TypeScript
/**
|
|
* @license
|
|
* Copyright 2025 Google LLC
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
import { OAuth2Client } from 'google-auth-library';
|
|
import * as http from 'http';
|
|
import url from 'url';
|
|
import crypto from 'crypto';
|
|
import * as net from 'net';
|
|
import open from 'open';
|
|
import path from 'node:path';
|
|
import { promises as fs } from 'node:fs';
|
|
|
|
// OAuth Client ID used to initiate OAuth2Client class.
|
|
const OAUTH_CLIENT_ID =
|
|
'681255809395-oo8ft2oprdrnp9e3aqf6av3hmdib135j.apps.googleusercontent.com';
|
|
|
|
// OAuth Secret value used to initiate OAuth2Client class.
|
|
// Note: It's ok to save this in git because this is an installed application
|
|
// as described here: https://developers.google.com/identity/protocols/oauth2#installed
|
|
// "The process results in a client ID and, in some cases, a client secret,
|
|
// which you embed in the source code of your application. (In this context,
|
|
// the client secret is obviously not treated as a secret.)"
|
|
const OAUTH_CLIENT_SECRET = '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';
|
|
|
|
// OAuth Scopes for Cloud Code authorization.
|
|
const OAUTH_SCOPE = [
|
|
'https://www.googleapis.com/auth/cloud-platform',
|
|
'https://www.googleapis.com/auth/userinfo.email',
|
|
'https://www.googleapis.com/auth/userinfo.profile',
|
|
];
|
|
|
|
const HTTP_REDIRECT = 301;
|
|
const SIGN_IN_SUCCESS_URL =
|
|
'https://developers.google.com/gemini-code-assist/auth_success_gemini';
|
|
const SIGN_IN_FAILURE_URL =
|
|
'https://developers.google.com/gemini-code-assist/auth_failure_gemini';
|
|
|
|
const GEMINI_DIR = '.gemini';
|
|
const CREDENTIAL_FILENAME = 'oauth_creds.json';
|
|
|
|
export async function getCachedCredentialClient(): Promise<OAuth2Client> {
|
|
try {
|
|
const creds = await fs.readFile(
|
|
path.join(process.cwd(), GEMINI_DIR, CREDENTIAL_FILENAME),
|
|
'utf-8',
|
|
);
|
|
|
|
const oAuth2Client = new OAuth2Client({
|
|
clientId: OAUTH_CLIENT_ID,
|
|
clientSecret: OAUTH_CLIENT_SECRET,
|
|
});
|
|
oAuth2Client.setCredentials(JSON.parse(creds));
|
|
// This will either return the existing token or refresh it.
|
|
await oAuth2Client.getAccessToken();
|
|
// If we are here, the token is valid.
|
|
return oAuth2Client;
|
|
} catch (_) {
|
|
// Could not load credentials.
|
|
throw new Error('Could not load credentials');
|
|
}
|
|
}
|
|
|
|
export async function clearCachedCredentials(): Promise<void> {
|
|
await fs.rm(path.join(process.cwd(), GEMINI_DIR, CREDENTIAL_FILENAME));
|
|
}
|
|
|
|
export async function getOauthClient(): Promise<OAuth2Client> {
|
|
try {
|
|
return await getCachedCredentialClient();
|
|
} catch (_) {
|
|
const loggedInClient = await webLoginClient();
|
|
await fs.mkdir(path.join(process.cwd(), GEMINI_DIR), { recursive: true });
|
|
await fs.writeFile(
|
|
path.join(process.cwd(), GEMINI_DIR, CREDENTIAL_FILENAME),
|
|
JSON.stringify(loggedInClient.credentials, null, 2),
|
|
);
|
|
return loggedInClient;
|
|
}
|
|
}
|
|
|
|
export async function webLoginClient(): Promise<OAuth2Client> {
|
|
const port = await getAvailablePort();
|
|
const oAuth2Client = new OAuth2Client({
|
|
clientId: OAUTH_CLIENT_ID,
|
|
clientSecret: OAUTH_CLIENT_SECRET,
|
|
redirectUri: `http://localhost:${port}/oauth2callback`,
|
|
});
|
|
|
|
return new Promise((resolve, reject) => {
|
|
const state = crypto.randomBytes(32).toString('hex');
|
|
const authURL: string = oAuth2Client.generateAuthUrl({
|
|
access_type: 'offline',
|
|
scope: OAUTH_SCOPE,
|
|
state,
|
|
});
|
|
console.log(
|
|
`\n\nCode Assist login required.\n` +
|
|
`Attempting to open authentication page in your browser.\n` +
|
|
`Otherwise navigate to:\n\n${authURL}\n\n`,
|
|
);
|
|
open(authURL);
|
|
console.log('Waiting for authentication...');
|
|
|
|
const server = http.createServer(async (req, res) => {
|
|
try {
|
|
if (req.url!.indexOf('/oauth2callback') === -1) {
|
|
res.writeHead(HTTP_REDIRECT, { Location: SIGN_IN_FAILURE_URL });
|
|
res.end();
|
|
reject(new Error('Unexpected request: ' + req.url));
|
|
}
|
|
// acquire the code from the querystring, and close the web server.
|
|
const qs = new url.URL(req.url!, 'http://localhost:3000').searchParams;
|
|
if (qs.get('error')) {
|
|
res.writeHead(HTTP_REDIRECT, { Location: SIGN_IN_FAILURE_URL });
|
|
res.end();
|
|
|
|
reject(new Error(`Error during authentication: ${qs.get('error')}`));
|
|
} else if (qs.get('state') !== state) {
|
|
res.end('State mismatch. Possible CSRF attack');
|
|
|
|
reject(new Error('State mismatch. Possible CSRF attack'));
|
|
} else if (qs.get('code')) {
|
|
const code: string = qs.get('code')!;
|
|
const { tokens } = await oAuth2Client.getToken(code);
|
|
oAuth2Client.setCredentials(tokens);
|
|
|
|
res.writeHead(HTTP_REDIRECT, { Location: SIGN_IN_SUCCESS_URL });
|
|
res.end();
|
|
resolve(oAuth2Client);
|
|
} else {
|
|
reject(new Error('No code found in request'));
|
|
}
|
|
} catch (e) {
|
|
reject(e);
|
|
} finally {
|
|
server.close();
|
|
}
|
|
});
|
|
server.listen(port);
|
|
});
|
|
}
|
|
|
|
function getAvailablePort(): Promise<number> {
|
|
return new Promise((resolve, reject) => {
|
|
let port = 0;
|
|
try {
|
|
const server = net.createServer();
|
|
server.listen(0, () => {
|
|
const address = server.address()! as net.AddressInfo;
|
|
port = address.port;
|
|
});
|
|
server.on('listening', () => {
|
|
server.close();
|
|
server.unref();
|
|
});
|
|
server.on('error', (e) => reject(e));
|
|
server.on('close', () => resolve(port));
|
|
} catch (e) {
|
|
reject(e);
|
|
}
|
|
});
|
|
}
|