mirror of
https://github.com/Memo-2023/mana-monorepo.git
synced 2026-05-16 20:19:39 +02:00
Previous commit 38dc80654 carries this M3 title but its payload is an
unrelated apps/api/picture change — shared-.git-index race with a
parallel session (see feedback_git_workflow.md). This commit holds the
actual M3.b/c/d code. Leaving the misnamed commit for the user to
re-attribute / revert as they prefer.
Closes the M3 loop from docs/plans/mana-mcp-and-personas.md. The
runner picks up due personas, drives each through Claude + MCP for
one simulated turn, collects actions + ratings, persists through
service-key internal endpoints in mana-auth.
Internal endpoints (mana-auth, service-key-gated)
- GET /api/v1/internal/personas/due
Returns personas whose tickCadence + lastActiveAt say they're
due. Rules: hourly > 1h, daily > 24h, weekdays > 24h mon-fri.
NULLS FIRST so never-run personas go ahead of stale ones.
- POST /api/v1/internal/personas/:id/actions
Batch ≤ 500. Row ids are deterministic
`${tickId}-${i}-${toolName}` + ON CONFLICT DO NOTHING so the
runner can retry a tick without doubling audit rows. Also
bumps personas.last_active_at so the next /due call sees it.
- POST /api/v1/internal/personas/:id/feedback
Batch ≤ 100. Row id is `${tickId}-${module}` — natural key is
one rating per module per tick.
Runner tick pipeline (services/mana-persona-runner/src/runner/)
- claude-session.ts
Two phases per tick. runMainTurn feeds the persona's system
prompt + a German "simulate a day" user prompt to Claude Agent
SDK's query(), with mana-mcp wired in as a streamable-HTTP MCP
server. We iterate the returned AsyncGenerator and extract
tool_use blocks into ActionRows; a tool_result with
is_error=true flips the most recent action. runRatingTurn is a
fresh query() with tools:[] asking Claude in character to rate
each used module 1-5 as strict JSON. We parse with tolerance
for whitespace / fences. Unparseable output becomes a synthetic
'__parse' feedback row so operators see the failure.
- tick.ts
Orchestrator. Skips when config.paused. Fetches /due, processes
in batches of config.concurrency via Promise.allSettled so a
single persona failure never kills the batch. Returns
{due, ranSuccessfully, failed[], durationMs}.
- types.ts
ActionRow + FeedbackRow shapes shared between claude-session
and the internal client.
Runner bootstrap (src/index.ts)
- setInterval(config.tickIntervalMs) starts the tick loop on boot.
tickInFlight guards against overlap when Claude latency >
interval. If MANA_SERVICE_KEY or ANTHROPIC_API_KEY is missing,
loop is disabled with a warn line — /health + /diag/login still
work.
- POST /diag/tick (dev-only) fires one tick on demand, returns
the result. Avoids waiting a full interval during testing.
- Graceful SIGTERM/SIGINT shutdown clears the interval.
Client
- clients/mana-auth-internal.ts
X-Service-Key client for the three endpoints above.
Constructor throws on empty serviceKey — fail loud.
Boot smoke verified: /health returns ok, /diag/tick 500s with
descriptive messages when keys absent. Warning lines on boot when
keys are missing. Type-check green across mana-auth, tool-registry,
mcp, persona-runner.
M3 exit gate is the end-to-end smoke recipe (docker up → db:push →
seed:personas → diag/tick → psql) documented in
services/mana-persona-runner/CLAUDE.md.
M2.d (cross-space family/team memberships) still deferred.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
187 lines
8.9 KiB
TypeScript
187 lines
8.9 KiB
TypeScript
/**
|
|
* mana-auth — Central authentication service
|
|
*
|
|
* Hono + Bun runtime. Replaces NestJS-based mana-auth.
|
|
* Uses Better Auth natively (fetch-based handler, no Express conversion).
|
|
*/
|
|
|
|
import { Hono } from 'hono';
|
|
import { cors } from 'hono/cors';
|
|
import { loadConfig } from './config';
|
|
import { getDb } from './db/connection';
|
|
import { createBetterAuth } from './auth/better-auth.config';
|
|
import { serviceErrorHandler as errorHandler } from '@mana/shared-hono';
|
|
import { jwtAuth } from './middleware/jwt-auth';
|
|
import { serviceAuth } from './middleware/service-auth';
|
|
import { SecurityEventsService, AccountLockoutService } from './services/security';
|
|
import { SignupLimitService } from './services/signup-limit';
|
|
import { ApiKeysService } from './services/api-keys';
|
|
import { UserDataService } from './services/user-data';
|
|
import { EncryptionVaultService } from './services/encryption-vault';
|
|
import { MissionGrantService } from './services/encryption-vault/mission-grant';
|
|
import { loadKek } from './services/encryption-vault/kek';
|
|
import { createAuthRoutes } from './routes/auth';
|
|
import { createGuildRoutes } from './routes/guilds';
|
|
import { createApiKeyRoutes, createApiKeyValidationRoute } from './routes/api-keys';
|
|
import { createMeRoutes } from './routes/me';
|
|
import { createEncryptionVaultRoutes } from './routes/encryption-vault';
|
|
import { createAiMissionGrantRoutes } from './routes/ai-mission-grant';
|
|
import { createSettingsRoutes } from './routes/settings';
|
|
import { createAdminRoutes } from './routes/admin';
|
|
import { createAdminPersonasRoutes } from './routes/admin-personas';
|
|
import { createInternalPersonasRoutes } from './routes/internal-personas';
|
|
|
|
// ─── Bootstrap ──────────────────────────────────────────────
|
|
|
|
const config = loadConfig();
|
|
const db = getDb(config.databaseUrl);
|
|
const auth = createBetterAuth(config.databaseUrl);
|
|
|
|
// Load the Key Encryption Key before any vault operation can run.
|
|
// Top-level await is supported by Bun. Throws if MANA_AUTH_KEK is
|
|
// missing in production or malformed in any environment.
|
|
await loadKek(config.encryptionKek);
|
|
|
|
// Initialize services
|
|
const security = new SecurityEventsService(db);
|
|
const lockout = new AccountLockoutService(db);
|
|
const signupLimit = new SignupLimitService(db);
|
|
const apiKeysService = new ApiKeysService(db);
|
|
const userDataService = new UserDataService(db, config);
|
|
const encryptionVaultService = new EncryptionVaultService(db);
|
|
const missionGrantService = new MissionGrantService(
|
|
encryptionVaultService,
|
|
config.missionGrantPublicKeyPem
|
|
);
|
|
|
|
// ─── App ────────────────────────────────────────────────────
|
|
|
|
const app = new Hono();
|
|
|
|
app.onError(errorHandler);
|
|
app.use(
|
|
'*',
|
|
cors({
|
|
origin: config.cors.origins,
|
|
credentials: true,
|
|
allowHeaders: ['Content-Type', 'Authorization', 'X-Service-Key', 'X-App-Id'],
|
|
exposeHeaders: ['Set-Cookie'],
|
|
})
|
|
);
|
|
|
|
// ─── Health ─────────────────────────────────────────────────
|
|
|
|
app.get('/health', (c) =>
|
|
c.json({ status: 'ok', service: 'mana-auth', timestamp: new Date().toISOString() })
|
|
);
|
|
|
|
// ─── Better Auth Native Handler ─────────────────────────────
|
|
|
|
app.all('/api/auth/*', async (c) => auth.handler(c.req.raw));
|
|
app.get('/.well-known/openid-configuration', async (c) => auth.handler(c.req.raw));
|
|
|
|
// ─── Custom Auth Endpoints ──────────────────────────────────
|
|
|
|
app.route('/api/v1/auth', createAuthRoutes(auth, config, security, lockout, signupLimit));
|
|
|
|
// ─── Guilds ─────────────────────────────────────────────────
|
|
|
|
app.use('/api/v1/gilden/*', jwtAuth(config.baseUrl));
|
|
app.route('/api/v1/gilden', createGuildRoutes(auth, config));
|
|
|
|
// ─── API Keys ───────────────────────────────────────────────
|
|
|
|
app.use('/api/v1/api-keys/*', jwtAuth(config.baseUrl));
|
|
app.route('/api/v1/api-keys', createApiKeyRoutes(apiKeysService));
|
|
app.route('/api/v1/api-keys', createApiKeyValidationRoute(apiKeysService));
|
|
|
|
// ─── Me (GDPR) ──────────────────────────────────────────────
|
|
|
|
app.use('/api/v1/me/*', jwtAuth(config.baseUrl));
|
|
app.route('/api/v1/me', createMeRoutes(userDataService));
|
|
|
|
// ─── Encryption vault (per-user master key custody) ────────
|
|
// Mounted under /me so it inherits the JWT middleware above and shows
|
|
// up in the same self-service surface as the GDPR endpoints.
|
|
app.route('/api/v1/me/encryption-vault', createEncryptionVaultRoutes(encryptionVaultService));
|
|
|
|
// ─── AI Mission Grant ──────────────────────────────────────
|
|
// Mints per-mission Key-Grants so the mana-ai background runner can
|
|
// decrypt scoped encrypted records. Under /me so it inherits the JWT
|
|
// middleware above. See docs/plans/ai-mission-key-grant.md.
|
|
app.route('/api/v1/me/ai-mission-grant', createAiMissionGrantRoutes(missionGrantService));
|
|
|
|
// ─── Settings ──────────────────────────────────────────────
|
|
|
|
app.use('/api/v1/settings/*', jwtAuth(config.baseUrl));
|
|
app.use('/api/v1/settings', jwtAuth(config.baseUrl));
|
|
app.route('/api/v1/settings', createSettingsRoutes(db));
|
|
|
|
// ─── Admin ──────────────────────────────────────────────────
|
|
|
|
app.use('/api/v1/admin/*', jwtAuth(config.baseUrl));
|
|
app.route('/api/v1/admin', createAdminRoutes(db, userDataService));
|
|
app.route('/api/v1/admin/personas', createAdminPersonasRoutes(db, auth));
|
|
|
|
// ─── Internal API ───────────────────────────────────────────
|
|
|
|
app.use('/api/v1/internal/*', serviceAuth(config.serviceKey));
|
|
|
|
app.route('/api/v1/internal/personas', createInternalPersonasRoutes(db));
|
|
|
|
app.get('/api/v1/internal/org/:orgId/member/:userId', async (c) => {
|
|
const { orgId, userId } = c.req.param();
|
|
const { members } = await import('./db/schema/organizations');
|
|
const { eq, and } = await import('drizzle-orm');
|
|
const [member] = await db
|
|
.select()
|
|
.from(members)
|
|
.where(and(eq(members.organizationId, orgId), eq(members.userId, userId)))
|
|
.limit(1);
|
|
return c.json({ isMember: !!member, role: member?.role || '' });
|
|
});
|
|
|
|
/**
|
|
* List every Space (organization) the given user is a member of. Used by
|
|
* mana-sync to pass the current user's space-membership list into the
|
|
* `app.current_user_space_ids` session setting so the multi-member RLS
|
|
* policy can let space co-members read each other's records.
|
|
*
|
|
* Returns a flat array of organization ids — mana-sync doesn't care
|
|
* about names/roles here, only the set. Cached 5 min client-side.
|
|
*/
|
|
app.get('/api/v1/internal/users/:userId/memberships', async (c) => {
|
|
const { userId } = c.req.param();
|
|
const { members } = await import('./db/schema/organizations');
|
|
const { eq } = await import('drizzle-orm');
|
|
const rows = await db
|
|
.select({ organizationId: members.organizationId, role: members.role })
|
|
.from(members)
|
|
.where(eq(members.userId, userId));
|
|
return c.json({
|
|
userId,
|
|
memberships: rows.map((r) => ({ organizationId: r.organizationId, role: r.role })),
|
|
});
|
|
});
|
|
|
|
// ─── Login Page (OIDC) ─────────────────────────────────────
|
|
|
|
app.get('/login', (c) => {
|
|
const q = c.req.query();
|
|
return c.html(`<!DOCTYPE html>
|
|
<html><head><title>Mana Login</title></head>
|
|
<body style="font-family:system-ui;max-width:400px;margin:80px auto;padding:20px;">
|
|
<h1>Mana Login</h1>
|
|
<form method="POST" action="/api/auth/sign-in/email">
|
|
<input type="hidden" name="callbackURL" value="${q.callbackURL || '/'}" />
|
|
<label>Email<br><input type="email" name="email" required style="width:100%;padding:8px;margin:4px 0 12px;"></label>
|
|
<label>Password<br><input type="password" name="password" required style="width:100%;padding:8px;margin:4px 0 12px;"></label>
|
|
<button type="submit" style="width:100%;padding:10px;background:#3b82f6;color:white;border:none;cursor:pointer;">Login</button>
|
|
</form></body></html>`);
|
|
});
|
|
|
|
// ─── Start ──────────────────────────────────────────────────
|
|
|
|
console.log(`mana-auth starting on port ${config.port}...`);
|
|
|
|
export default { port: config.port, fetch: app.fetch };
|