Compare commits

10 Commits

Author SHA1 Message Date
50f49c366a Fixed broken box drawing 2026-03-07 22:01:20 +01:00
c45d196702 Rewrite README to reflect current state
Covers keygen workflow, auth model, all three binaries, env vars,
action registry, path resolution, and security notes.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-07 21:00:22 +00:00
81ad722e84 Add ccc-keygen for secrets file generation
--create <names>  generates secrets.json with random 32-byte hex secrets
--filter <names>  extracts a subset of users into filtered-secrets.json
--input/--output  override default file paths

Removes hardcoded user/agent assumptions from secrets.example.json.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-07 20:59:25 +00:00
e8bbcb293f Add ccc-server/client/queue bins and blessed queue TUI
- bin/ccc-server, ccc-client, ccc-queue wired up via package.json bin
- client/config.mjs: shared secrets/user resolution from CLI args or
  CCC_SECRETS/CCC_USER env vars
- ccc-queue: blessed TUI with two-pane layout (list + detail), polls
  every 2s, y/n to approve/deny selected item, r to refresh, q to quit

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-07 20:49:12 +00:00
0a3ab14053 Replace key=value args with JSON payload in client
Remaining args after --secrets/--user are space-joined and parsed as
JSON, so the full action payload is expressed directly rather than
through a custom key=value scheme.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-07 20:40:56 +00:00
4b064f1bf8 Switch exec to fire-and-forget spawn, drop awaits
spawnSync was blocking the event loop until the subprocess exited, so
opening a browser would freeze the server until it closed. Replace with
spawn + unref (detached, stdio ignored) and remove the now-pointless
awaits and async keywords from action handlers.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-07 20:38:04 +00:00
0568026e7c Validate URL protocol in open-browser action
Parse the URL and reject anything that isn't http/https before passing
to xdg-open, blocking file://, javascript:// and other schemes.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-07 20:36:26 +00:00
b83ae686c4 Adjusted action list, removed open-directory for now 2026-03-07 21:35:23 +01:00
2bf658dc5f Implement resolve_path using VOLUME_MAPPING array
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-07 20:27:17 +00:00
ac82501b48 Replace trivial resolve_path with volume map
Maps container paths to host paths using the docker-compose volume layout
(/workspace -> CONDUIT_HOST_WORKSPACE, /home/claude -> CONDUIT_HOST_HOME).
Relative paths resolve against CONTAINER_PATH. Paths outside all known
volumes throw rather than silently pass through.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-07 20:23:27 +00:00
11 changed files with 530 additions and 135 deletions

182
README.md
View File

@@ -1,11 +1,25 @@
# claude-code-conduit # claude-code-conduit
A supervised action bridge between Claude Code and the host system. A supervised action bridge between Claude Code and the host system. Claude requests structured actions; the server applies per-action policies and optionally holds them for human approval before executing.
Claude requests structured actions. The server applies per-action policies: ## Concepts
- **auto-accept** — executed immediately (e.g. open a file in editor)
- **auto-deny** — rejected immediately **Actions** are typed verbs with named parameters — not shell commands. The server defines what actions exist and what happens when they are called. Example:
- **queue** — held for user approval (e.g. open a browser URL)
```json
{ "action": "edit-file", "filename": "/workspace/foo.mjs" }
```
**Policies** control what happens when an action is requested:
- `auto-accept` — executed immediately (e.g. open a file in the editor)
- `auto-deny` — rejected immediately
- `queue` — held for human approval (e.g. open a browser URL)
**Authentication** uses HMAC-SHA256. Every request is signed with the caller's secret. Secrets live in a JSON file — never in environment variables.
**Users** each have a secret and a `canApprove` list controlling whose queued actions they may approve.
---
## Setup ## Setup
@@ -13,54 +27,136 @@ Claude requests structured actions. The server applies per-action policies:
npm install npm install
``` ```
## Running the server ### Generate secrets
```bash ```bash
node server/index.js # Create a secrets file with random secrets for each user
# or ccc-keygen --create user,agent
CONDUIT_PORT=3333 CONDUIT_ROOT=/workspace node server/index.js
# Edit secrets.json to configure who can approve whom:
# set user.canApprove = ["agent"]
# Produce a filtered file for the agent (e.g. to copy into a Docker container)
ccc-keygen --filter agent --output agent-secrets.json
``` ```
## Using the CLI client The full `secrets.json` stays on the host. `agent-secrets.json` goes into the container.
---
## Running
### Server (host)
```bash ```bash
# List available actions ccc-server --secrets secrets.json
node client/index.js list-actions
# Open a file in the editor (auto-accepted)
node client/index.js edit-file filename=/workspace/myfile.js
# Open a URL (queued for user approval)
node client/index.js open-browser url=https://example.com
``` ```
When a queued action is submitted, the server prints the approve/deny URLs to stdout: Environment variables:
```
[QUEUE] New request #a1b2c3d4
Action: open-browser
Params: {"url":"https://example.com"}
Approve: POST /queue/a1b2c3d4.../approve
Deny: POST /queue/a1b2c3d4.../deny
```
User approves via:
```bash
curl -X POST http://localhost:3333/queue/<id>/approve
```
## Environment variables
| Variable | Default | Description | | Variable | Default | Description |
|----------|---------|-------------| |----------|---------|-------------|
| `CONDUIT_PORT` | `3333` | Server port | | `CONDUIT_PORT` | `3015` | Port to listen on |
| `CONDUIT_ROOT` | `/workspace` | Workspace root for path resolution | | `CONDUIT_ROOT` | `/workspace` | Workspace root for path resolution |
| `CONDUIT_URL` | `http://localhost:3333` | Server URL (client-side) |
## Adding actions ### Client (container / agent)
Edit `server/actions.js`. Each action needs: ```bash
- `description` — shown in list-actions ccc-client --secrets agent-secrets.json --user agent '{"action": "list-actions"}'
- `params` — array of `{ name, required, type }` ccc-client --secrets agent-secrets.json --user agent '{"action": "edit-file", "filename": "/workspace/foo.mjs"}'
- `policy``"auto-accept"` | `"auto-deny"` | `"queue"` ```
- `handler(params, helpers)` — async function that performs the action
`--secrets` and `--user` can also be set via environment variables:
```bash
export CCC_SECRETS=/path/to/agent-secrets.json
export CCC_USER=agent
ccc-client '{"action": "list-actions"}'
```
The JSON payload can be spread across multiple arguments — they are space-joined before parsing:
```bash
ccc-client '{"action": "edit-file",' '"filename": "/workspace/foo.mjs"}'
```
### Queue manager (host)
```bash
ccc-queue --secrets secrets.json --user user
```
Opens an interactive TUI showing pending actions:
```
┌─ Pending Actions ──────────┐ ┌─ Details ────────────────────────────┐
│ │ │ │
│ > [a1b2c3] open-browser │ │ Action: open-browser │
│ [d4e5f6] open-terminal │ │ ID: a1b2c3d4-... │
│ │ │ Submitted by: agent │
│ │ │ Created: 2026-03-07T12:00:00Z │
│ │ │ │
│ │ │ Params: │
│ │ │ url: https://example.com │
└────────────────────────────┘ └──────────────────────────────────────┘
[y] approve [n] deny [r] refresh [q] quit
```
Supports `CCC_SECRETS` and `CCC_USER` env vars the same as the client.
---
## Actions
Query available actions at runtime:
```bash
ccc-client '{"action": "list-actions"}'
```
Built-in actions:
| Action | Policy | Params |
|--------|--------|--------|
| `list-actions` | auto-accept | — |
| `edit-file` | auto-accept | `filename` (path) |
| `open-browser` | queue | `url` (http/https only) |
| `open-terminal` | queue | `path` (optional) |
### Adding actions
Edit `server/actions.mjs`. Each entry needs:
```js
'my-action': {
description: 'What this does',
params: [{ name: 'foo', required: true, type: 'string' }],
policy: 'auto-accept', // or 'auto-deny' | 'queue'
handler: ({ foo }) => {
// do something
return { result: foo };
},
},
```
---
## Path resolution
The server translates container-side paths to host-side paths using the volume map in `server/helpers.mjs`. By default this matches the `docker-compose.yml` layout:
| Container path | Host path |
|----------------|-----------|
| `/workspace` | `<CONTAINER_PATH>/workspace` |
| `/home/claude` | `<CONTAINER_PATH>/claude-home` |
Paths outside known volumes are rejected. Edit `CONTAINER_PATH` and `VOLUME_MAPPING` in `server/helpers.mjs` to match your setup.
---
## Security notes
- Secrets are never passed via environment variables or command line arguments — only via a file
- HMAC signatures include a timestamp; requests older than 30 seconds are rejected
- `canApprove` is empty by default — permissions must be explicitly granted
- Browser URLs are validated to `http`/`https` only before being passed to `xdg-open`
- All path arguments are resolved against the volume map; traversal outside known volumes is rejected

2
bin/ccc-client.mjs Executable file
View File

@@ -0,0 +1,2 @@
#!/usr/bin/env node
import '../client/index.mjs';

85
bin/ccc-keygen.mjs Executable file
View File

@@ -0,0 +1,85 @@
#!/usr/bin/env node
import { randomBytes } from 'crypto';
import { readFileSync, writeFileSync, existsSync } from 'fs';
function get_arg(argv, flag) {
const i = argv.indexOf(flag);
return i !== -1 ? argv[i + 1] : null;
}
function has_flag(argv, flag) {
return argv.includes(flag);
}
function parse_names(value, flag) {
if (!value) {
console.error(`${flag} requires a comma-separated list of usernames`);
process.exit(1);
}
return value.split(',').map(s => s.trim()).filter(Boolean);
}
function generate_secret() {
return randomBytes(32).toString('hex');
}
function read_secrets_file(input_path) {
if (!existsSync(input_path)) {
console.error(`Secrets file not found: ${input_path}`);
process.exit(1);
}
try {
return JSON.parse(readFileSync(input_path, 'utf8'));
} catch (err) {
console.error(`Cannot read secrets file: ${err.message}`);
process.exit(1);
}
}
function write_secrets_file(output_path, data) {
writeFileSync(output_path, JSON.stringify(data, null, '\t') + '\n', 'utf8');
console.log(`Written: ${output_path}`);
}
const argv = process.argv;
const create_arg = get_arg(argv, '--create');
const filter_arg = get_arg(argv, '--filter');
const input_arg = get_arg(argv, '--input') || 'secrets.json';
const output_arg = get_arg(argv, '--output');
if (!create_arg && !filter_arg) {
console.error(
'Usage:\n' +
' ccc-keygen --create <names> [--output secrets.json]\n' +
' ccc-keygen --filter <names> [--input secrets.json] [--output filtered-secrets.json]'
);
process.exit(1);
}
if (create_arg) {
const names = parse_names(create_arg, '--create');
const output_path = output_arg || 'secrets.json';
const users = {};
for (const name of names) {
users[name] = { secret: generate_secret(), canApprove: [] };
}
write_secrets_file(output_path, { users });
console.log(`Created users: ${names.join(', ')}`);
console.log('Edit canApprove lists to configure approval permissions.');
}
if (filter_arg) {
const names = parse_names(filter_arg, '--filter');
const output_path = output_arg || 'filtered-secrets.json';
const source = read_secrets_file(input_arg);
const users = {};
for (const name of names) {
if (!source.users?.[name]) {
console.error(`User '${name}' not found in ${input_arg}`);
process.exit(1);
}
users[name] = source.users[name];
}
write_secrets_file(output_path, { users });
console.log(`Filtered users: ${names.join(', ')}`);
}

164
bin/ccc-queue.mjs Executable file
View File

@@ -0,0 +1,164 @@
#!/usr/bin/env node
import blessed from 'blessed';
import { load_client_config } from '../client/config.mjs';
import { get_queue, resolve_queue_item } from '../client/index.mjs';
const POLL_INTERVAL = 2000;
const { username, secret } = load_client_config(process.argv);
const screen = blessed.screen({
smartCSR: true,
title: 'ccc-queue',
});
// ── Layout ────────────────────────────────────────────────────────────────────
const list_box = blessed.list({
top: 0,
left: 0,
width: '40%',
height: '100%-3',
border: { type: 'line' },
label: ' Pending Actions ',
scrollable: true,
keys: true,
vi: true,
mouse: true,
style: {
selected: { bg: 'blue', fg: 'white', bold: true },
border: { fg: 'cyan' },
label: { fg: 'cyan', bold: true },
},
});
const detail_box = blessed.box({
top: 0,
left: '40%',
width: '60%',
height: '100%-3',
border: { type: 'line' },
label: ' Details ',
scrollable: true,
alwaysScroll: true,
tags: true,
style: {
border: { fg: 'cyan' },
label: { fg: 'cyan', bold: true },
},
});
const status_bar = blessed.box({
bottom: 0,
left: 0,
width: '100%',
height: 3,
border: { type: 'line' },
tags: true,
style: { border: { fg: 'grey' } },
});
screen.append(list_box);
screen.append(detail_box);
screen.append(status_bar);
// ── State ─────────────────────────────────────────────────────────────────────
let items = [];
let status_text = '';
function set_status(text, is_error = false) {
status_text = text;
const color = is_error ? 'red' : 'green';
status_bar.setContent(
` {${color}-fg}${text}{/${color}-fg} ` +
`{grey-fg}[y]{/grey-fg} approve ` +
`{grey-fg}[n]{/grey-fg} deny ` +
`{grey-fg}[r]{/grey-fg} refresh ` +
`{grey-fg}[q]{/grey-fg} quit`
);
screen.render();
}
function render_detail(item) {
if (!item) {
detail_box.setContent('{grey-fg}No item selected{/grey-fg}');
return;
}
const lines = [
`{bold}Action:{/bold} ${item.action}`,
`{bold}ID:{/bold} ${item.id}`,
`{bold}Submitted by:{/bold} ${item.submitted_by}`,
`{bold}Created:{/bold} ${item.created_at}`,
'',
'{bold}Params:{/bold}',
];
for (const [k, v] of Object.entries(item.params ?? {})) {
lines.push(` {cyan-fg}${k}{/cyan-fg}: ${v}`);
}
detail_box.setContent(lines.join('\n'));
}
function render_list() {
const selected = list_box.selected ?? 0;
list_box.clearItems();
if (items.length === 0) {
list_box.addItem('{grey-fg}(no pending items){/grey-fg}');
} else {
for (const item of items) {
list_box.addItem(`{yellow-fg}${item.id.slice(0, 8)}{/yellow-fg} ${item.action}`);
}
list_box.select(Math.min(selected, items.length - 1));
}
render_detail(items[list_box.selected] ?? null);
screen.render();
}
// ── Polling ───────────────────────────────────────────────────────────────────
async function refresh() {
try {
items = await get_queue(username, secret);
render_list();
set_status(`Last refresh: ${new Date().toLocaleTimeString()}`);
} catch (err) {
set_status(`Refresh failed: ${err.message}`, true);
}
}
// ── Actions ───────────────────────────────────────────────────────────────────
async function decide(decision) {
const item = items[list_box.selected];
if (!item) {
return;
}
set_status(`Sending ${decision} for ${item.id.slice(0, 8)}`);
try {
await resolve_queue_item(item.id, decision, username, secret);
await refresh();
} catch (err) {
set_status(`Failed: ${err.message}`, true);
}
}
// ── Keys ──────────────────────────────────────────────────────────────────────
screen.key(['q', 'C-c'], () => process.exit(0));
screen.key('r', refresh);
screen.key('y', () => decide('approve'));
screen.key('n', () => decide('deny'));
list_box.on('select item', () => {
render_detail(items[list_box.selected] ?? null);
screen.render();
});
list_box.focus();
// ── Boot ──────────────────────────────────────────────────────────────────────
set_status('Connecting…');
refresh();
const poll = setInterval(refresh, POLL_INTERVAL);
poll.unref();

2
bin/ccc-server.mjs Executable file
View File

@@ -0,0 +1,2 @@
#!/usr/bin/env node
import '../server/index.mjs';

57
client/config.mjs Normal file
View File

@@ -0,0 +1,57 @@
// Resolve client config from CLI args or environment variables.
// Precedence: CLI args > env vars > error
//
// Env vars:
// CCC_SECRETS path to secrets file
// CCC_USER username to authenticate as
import { readFileSync } from 'fs';
function get_arg(argv, flag) {
const i = argv.indexOf(flag);
return i !== -1 ? argv[i + 1] : null;
}
export function load_client_config(argv) {
const secrets_path = get_arg(argv, '--secrets') || process.env.CCC_SECRETS;
const username = get_arg(argv, '--user') || process.env.CCC_USER;
if (!secrets_path) {
console.error('Secrets file required: --secrets <path> or CCC_SECRETS=<path>');
process.exit(1);
}
if (!username) {
console.error('Username required: --user <name> or CCC_USER=<name>');
process.exit(1);
}
let secrets;
try {
secrets = JSON.parse(readFileSync(secrets_path, 'utf8'));
} catch (err) {
console.error(`Cannot read secrets file: ${err.message}`);
process.exit(1);
}
const user_entry = secrets.users?.[username];
if (!user_entry) {
console.error(`User '${username}' not found in secrets file`);
process.exit(1);
}
return { username, secret: user_entry.secret };
}
export function get_remaining(argv) {
const result = [];
let i = 2;
while (i < argv.length) {
if (argv[i] === '--secrets' || argv[i] === '--user') {
i += 2;
} else {
result.push(argv[i]);
i++;
}
}
return result;
}

View File

@@ -1,93 +1,63 @@
#!/usr/bin/env node #!/usr/bin/env node
// Conduit client — thin CLI wrapper for Claude to call the conduit server. // Conduit client — thin CLI wrapper for Claude to call the conduit server.
// Usage: // Usage:
// node client/index.mjs --secrets /path/to/secrets.json --user agent <action> [key=value ...] // ccc-client '{"action": "list-actions"}'
// node client/index.mjs --secrets /path/to/secrets.json --user agent list-actions // ccc-client '{"action":' '"edit-file",' '"filename": "/workspace/foo.mjs"}'
// node client/index.mjs --secrets /path/to/secrets.json --user agent edit-file filename=/workspace/foo.mjs
import { readFileSync } from "fs"; import { sign_request } from './auth.mjs';
import { sign_request } from "./auth.mjs"; import { load_client_config, get_remaining } from './config.mjs';
const BASE_URL = process.env.CONDUIT_URL || "http://localhost:3015"; const BASE_URL = process.env.CONDUIT_URL || 'http://localhost:3015';
function get_arg(argv, flag) { export async function call_action(payload, username, secret) {
const i = argv.indexOf(flag); const body_string = JSON.stringify(payload);
return i !== -1 ? argv[i + 1] : null;
}
async function call_action(action, params, auth_headers) {
const body_string = JSON.stringify({ action, ...params });
const res = await fetch(`${BASE_URL}/action`, { const res = await fetch(`${BASE_URL}/action`, {
method: "POST", method: 'POST',
headers: { "Content-Type": "application/json", ...auth_headers(body_string) }, headers: { 'Content-Type': 'application/json', ...sign_request(secret, username, body_string) },
body: body_string, body: body_string,
}); });
const body = await res.json(); const body = await res.json();
return { status: res.status, body }; return { status: res.status, body };
} }
function parse_args(argv) { export async function get_queue(username, secret) {
// Skip --secrets and --user flags and their values const res = await fetch(`${BASE_URL}/queue`, {
const filtered = []; headers: sign_request(secret, username, ''),
let i = 2; });
while (i < argv.length) { return res.json();
if (argv[i] === "--secrets" || argv[i] === "--user") { }
i += 2;
} else { export async function resolve_queue_item(id, decision, username, secret) {
filtered.push(argv[i]); const res = await fetch(`${BASE_URL}/queue/${id}/${decision}`, {
i++; method: 'POST',
} headers: sign_request(secret, username, ''),
} });
const [action, ...rest] = filtered; return res.json();
const params = {};
for (const arg of rest) {
const eq = arg.indexOf("=");
if (eq === -1) {
console.error(`Bad argument (expected key=value): ${arg}`);
process.exit(1);
}
params[arg.slice(0, eq)] = arg.slice(eq + 1);
}
return { action, params };
} }
async function main() { async function main() {
const secrets_path = get_arg(process.argv, "--secrets"); const { username, secret } = load_client_config(process.argv);
const username = get_arg(process.argv, "--user"); const remaining = get_remaining(process.argv);
if (!secrets_path || !username) { if (!remaining.length) {
console.error("Usage: conduit --secrets <path> --user <name> <action> [key=value ...]"); console.error('Usage: ccc-client <json payload>');
process.exit(1); process.exit(1);
} }
let secrets; let payload;
try { try {
secrets = JSON.parse(readFileSync(secrets_path, "utf8")); payload = JSON.parse(remaining.join(' '));
} catch (err) { } catch (err) {
console.error(`Cannot read secrets file: ${err.message}`); console.error(`Invalid JSON payload: ${err.message}`);
process.exit(1); process.exit(1);
} }
const user_entry = secrets.users?.[username]; const { status, body } = await call_action(payload, username, secret);
if (!user_entry) {
console.error(`User '${username}' not found in secrets file`);
process.exit(1);
}
const { action, params } = parse_args(process.argv);
if (!action) {
console.error("Usage: conduit --secrets <path> --user <name> <action> [key=value ...]");
process.exit(1);
}
const auth_headers = (body_string) => sign_request(user_entry.secret, username, body_string);
const { status, body } = await call_action(action, params, auth_headers);
console.log(JSON.stringify(body, null, 2)); console.log(JSON.stringify(body, null, 2));
process.exit(status >= 400 ? 1 : 0); process.exit(status >= 400 ? 1 : 0);
} }
main().catch((err) => { main().catch((err) => {
console.error("Conduit error:", err.message); console.error('Conduit error:', err.message);
process.exit(1); process.exit(1);
}); });

View File

@@ -7,7 +7,14 @@
"server": "node server/index.mjs", "server": "node server/index.mjs",
"client": "node client/index.mjs" "client": "node client/index.mjs"
}, },
"bin": {
"ccc-server": "bin/ccc-server.mjs",
"ccc-client": "bin/ccc-client.mjs",
"ccc-queue": "bin/ccc-queue.mjs",
"ccc-keygen": "bin/ccc-keygen.mjs"
},
"dependencies": { "dependencies": {
"blessed": "^0.1.81",
"express": "^5.2.1" "express": "^5.2.1"
} }
} }

View File

@@ -1,6 +1,6 @@
{ {
"users": { "users": {
"agent": { "secret": "change-me-agent", "canApprove": [] }, "<username>": { "secret": "<hex secret>", "canApprove": [] },
"user": { "secret": "change-me-user", "canApprove": ["agent"] } "<username>": { "secret": "<hex secret>", "canApprove": ["<username>"] }
} }
} }

View File

@@ -1,6 +1,7 @@
// Action registry — defines all available actions, their parameters, and policies. // Action registry — defines all available actions, their parameters, and policies.
// policy: "auto-accept" | "auto-deny" | "queue" // policy: "auto-accept" | "auto-deny" | "queue"
import { resolve_path, exec } from "./helpers.mjs"; import { resolve_path, exec } from "./helpers.mjs";
export const actions = { export const actions = {
@@ -8,7 +9,7 @@ export const actions = {
description: "List all available actions and their definitions", description: "List all available actions and their definitions",
params: [], params: [],
policy: "auto-accept", policy: "auto-accept",
handler: async () => { handler: () => {
return Object.entries(actions).map(([name, def]) => ({ return Object.entries(actions).map(([name, def]) => ({
action: name, action: name,
description: def.description, description: def.description,
@@ -22,41 +23,47 @@ export const actions = {
description: "Open a file in the editor", description: "Open a file in the editor",
params: [{ name: "filename", required: true, type: "path" }], params: [{ name: "filename", required: true, type: "path" }],
policy: "auto-accept", policy: "auto-accept",
handler: async ({ filename }) => { handler: ({ filename }) => {
const resolved = resolve_path(filename); const resolved = resolve_path(filename);
await exec("xdg-open", [resolved]); exec('subl3', [resolved]);
return { opened: resolved }; return { opened: resolved };
}, },
}, },
/*
"open-directory": { "open-directory": {
description: "Open a directory in the file manager", description: "Open a directory in the file manager",
params: [{ name: "path", required: true, type: "path" }], params: [{ name: "path", required: true, type: "path" }],
policy: "auto-accept", policy: 'queue',
handler: async ({ path }) => { handler: ({ path }) => {
const resolved = resolve_path(path); const resolved = resolve_path(path);
await exec("xdg-open", [resolved]); // exec( ... );
return { opened: resolved }; return { opened: resolved };
}, },
}, },
*/
"open-browser": { "open-browser": {
description: "Open a URL in the web browser", description: "Open a URL in the web browser",
params: [{ name: "url", required: true, type: "string" }], params: [{ name: "url", required: true, type: "string" }],
policy: "queue", policy: "queue",
handler: async ({ url }) => { handler: ({ url }) => {
await exec("xdg-open", [url]); const parsed = new URL(url);
return { opened: url }; if (parsed.protocol !== 'http:' && parsed.protocol !== 'https:') {
throw new Error(`Disallowed protocol: ${parsed.protocol}`);
}
exec('xdg-open', [parsed.href]);
return { opened: parsed.href };
}, },
}, },
"open-terminal": { "open-terminal": {
description: "Open a terminal in a given directory", description: "Open a terminal in a given directory",
params: [{ name: "path", required: false, type: "path" }], params: [{ name: "path", required: false, type: "path" }],
policy: "queue", policy: 'queue',
handler: async ({ path }) => { handler: ({ path }) => {
const resolved = path ? resolve_path(path) : process.env.HOME; const resolved = resolve_path(path ?? 'workspace');
await exec("xdg-open", [resolved]); exec('konsole', ['--workdir', resolved, '-e', 'bash']);
return { opened: resolved }; return { opened: resolved };
}, },
}, },

View File

@@ -1,25 +1,30 @@
import { spawnSync } from "child_process"; import { spawn } from "child_process";
import path from "path"; import path from "path";
const WORKSPACE_ROOT = process.env.CONDUIT_ROOT || "/workspace"; const CONTAINER_PATH = "/home/devilholk/Projekt/claude-docker/";
// Resolve a path param relative to WORKSPACE_ROOT, preventing traversal.
// Docker image → host conversation
const VOLUME_MAPPING = [
['/home/claude', path.resolve(CONTAINER_PATH, 'claude-home')],
['/workspace', path.resolve(CONTAINER_PATH, 'workspace')],
];
// Translate a container-side path to its host-side equivalent using VOLUME_MAP.
// Throws if the path escapes all known volumes.
export function resolve_path(user_path) { export function resolve_path(user_path) {
const resolved = path.resolve(WORKSPACE_ROOT, user_path.replace(/^\//, "")); const abs = path.resolve(user_path);
if (!resolved.startsWith(WORKSPACE_ROOT)) {
throw new Error(`Path escapes workspace root: ${user_path}`); for (const [container_prefix, host_prefix] of VOLUME_MAPPING) {
if (abs === container_prefix || abs.startsWith(container_prefix + "/")) {
return host_prefix + abs.slice(container_prefix.length);
} }
return resolved; }
throw new Error(`Path is outside all known volumes: ${user_path}`);
} }
// Execute a binary with an argument list — no shell interpolation. // Launch a binary with an argument list — no shell interpolation, fire and forget.
export function exec(bin, args = []) { export function exec(bin, args = []) {
return new Promise((resolve, reject) => { spawn(bin, args, { stdio: 'ignore', detached: true }).unref();
const result = spawnSync(bin, args, { stdio: "inherit" });
if (result.error) {
reject(result.error);
} else {
resolve(result.status);
}
});
} }