- Configure CLI api-host to local instance (defaults to cloud otherwise) - Use 127.0.0.1 instead of localhost to avoid IPv6 resolution issues - Present dashboard and CLI as two options with platform guidance - Accept ONECLI_URL as valid credentials in verify step Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
193 lines
5.3 KiB
TypeScript
193 lines
5.3 KiB
TypeScript
/**
|
|
* Step: verify — End-to-end health check of the full installation.
|
|
* Replaces 09-verify.sh
|
|
*
|
|
* Uses better-sqlite3 directly (no sqlite3 CLI), platform-aware service checks.
|
|
*/
|
|
import { execSync } from 'child_process';
|
|
import fs from 'fs';
|
|
import os from 'os';
|
|
import path from 'path';
|
|
|
|
import Database from 'better-sqlite3';
|
|
|
|
import { STORE_DIR } from '../src/config.js';
|
|
import { readEnvFile } from '../src/env.js';
|
|
import { logger } from '../src/logger.js';
|
|
import {
|
|
getPlatform,
|
|
getServiceManager,
|
|
hasSystemd,
|
|
isRoot,
|
|
} from './platform.js';
|
|
import { emitStatus } from './status.js';
|
|
|
|
export async function run(_args: string[]): Promise<void> {
|
|
const projectRoot = process.cwd();
|
|
const platform = getPlatform();
|
|
const homeDir = os.homedir();
|
|
|
|
logger.info('Starting verification');
|
|
|
|
// 1. Check service status
|
|
let service = 'not_found';
|
|
const mgr = getServiceManager();
|
|
|
|
if (mgr === 'launchd') {
|
|
try {
|
|
const output = execSync('launchctl list', { encoding: 'utf-8' });
|
|
if (output.includes('com.nanoclaw')) {
|
|
// Check if it has a PID (actually running)
|
|
const line = output.split('\n').find((l) => l.includes('com.nanoclaw'));
|
|
if (line) {
|
|
const pidField = line.trim().split(/\s+/)[0];
|
|
service = pidField !== '-' && pidField ? 'running' : 'stopped';
|
|
}
|
|
}
|
|
} catch {
|
|
// launchctl not available
|
|
}
|
|
} else if (mgr === 'systemd') {
|
|
const prefix = isRoot() ? 'systemctl' : 'systemctl --user';
|
|
try {
|
|
execSync(`${prefix} is-active nanoclaw`, { stdio: 'ignore' });
|
|
service = 'running';
|
|
} catch {
|
|
try {
|
|
const output = execSync(`${prefix} list-unit-files`, {
|
|
encoding: 'utf-8',
|
|
});
|
|
if (output.includes('nanoclaw')) {
|
|
service = 'stopped';
|
|
}
|
|
} catch {
|
|
// systemctl not available
|
|
}
|
|
}
|
|
} else {
|
|
// Check for nohup PID file
|
|
const pidFile = path.join(projectRoot, 'nanoclaw.pid');
|
|
if (fs.existsSync(pidFile)) {
|
|
try {
|
|
const raw = fs.readFileSync(pidFile, 'utf-8').trim();
|
|
const pid = Number(raw);
|
|
if (raw && Number.isInteger(pid) && pid > 0) {
|
|
process.kill(pid, 0);
|
|
service = 'running';
|
|
}
|
|
} catch {
|
|
service = 'stopped';
|
|
}
|
|
}
|
|
}
|
|
logger.info({ service }, 'Service status');
|
|
|
|
// 2. Check container runtime
|
|
let containerRuntime = 'none';
|
|
try {
|
|
execSync('command -v container', { stdio: 'ignore' });
|
|
containerRuntime = 'apple-container';
|
|
} catch {
|
|
try {
|
|
execSync('docker info', { stdio: 'ignore' });
|
|
containerRuntime = 'docker';
|
|
} catch {
|
|
// No runtime
|
|
}
|
|
}
|
|
|
|
// 3. Check credentials
|
|
let credentials = 'missing';
|
|
const envFile = path.join(projectRoot, '.env');
|
|
if (fs.existsSync(envFile)) {
|
|
const envContent = fs.readFileSync(envFile, 'utf-8');
|
|
if (/^(CLAUDE_CODE_OAUTH_TOKEN|ANTHROPIC_API_KEY|ONECLI_URL)=/m.test(envContent)) {
|
|
credentials = 'configured';
|
|
}
|
|
}
|
|
|
|
// 4. Check channel auth (detect configured channels by credentials)
|
|
const envVars = readEnvFile([
|
|
'TELEGRAM_BOT_TOKEN',
|
|
'SLACK_BOT_TOKEN',
|
|
'SLACK_APP_TOKEN',
|
|
'DISCORD_BOT_TOKEN',
|
|
]);
|
|
|
|
const channelAuth: Record<string, string> = {};
|
|
|
|
// WhatsApp: check for auth credentials on disk
|
|
const authDir = path.join(projectRoot, 'store', 'auth');
|
|
if (fs.existsSync(authDir) && fs.readdirSync(authDir).length > 0) {
|
|
channelAuth.whatsapp = 'authenticated';
|
|
}
|
|
|
|
// Token-based channels: check .env
|
|
if (process.env.TELEGRAM_BOT_TOKEN || envVars.TELEGRAM_BOT_TOKEN) {
|
|
channelAuth.telegram = 'configured';
|
|
}
|
|
if (
|
|
(process.env.SLACK_BOT_TOKEN || envVars.SLACK_BOT_TOKEN) &&
|
|
(process.env.SLACK_APP_TOKEN || envVars.SLACK_APP_TOKEN)
|
|
) {
|
|
channelAuth.slack = 'configured';
|
|
}
|
|
if (process.env.DISCORD_BOT_TOKEN || envVars.DISCORD_BOT_TOKEN) {
|
|
channelAuth.discord = 'configured';
|
|
}
|
|
|
|
const configuredChannels = Object.keys(channelAuth);
|
|
const anyChannelConfigured = configuredChannels.length > 0;
|
|
|
|
// 5. Check registered groups (using better-sqlite3, not sqlite3 CLI)
|
|
let registeredGroups = 0;
|
|
const dbPath = path.join(STORE_DIR, 'messages.db');
|
|
if (fs.existsSync(dbPath)) {
|
|
try {
|
|
const db = new Database(dbPath, { readonly: true });
|
|
const row = db
|
|
.prepare('SELECT COUNT(*) as count FROM registered_groups')
|
|
.get() as { count: number };
|
|
registeredGroups = row.count;
|
|
db.close();
|
|
} catch {
|
|
// Table might not exist
|
|
}
|
|
}
|
|
|
|
// 6. Check mount allowlist
|
|
let mountAllowlist = 'missing';
|
|
if (
|
|
fs.existsSync(
|
|
path.join(homeDir, '.config', 'nanoclaw', 'mount-allowlist.json'),
|
|
)
|
|
) {
|
|
mountAllowlist = 'configured';
|
|
}
|
|
|
|
// Determine overall status
|
|
const status =
|
|
service === 'running' &&
|
|
credentials !== 'missing' &&
|
|
anyChannelConfigured &&
|
|
registeredGroups > 0
|
|
? 'success'
|
|
: 'failed';
|
|
|
|
logger.info({ status, channelAuth }, 'Verification complete');
|
|
|
|
emitStatus('VERIFY', {
|
|
SERVICE: service,
|
|
CONTAINER_RUNTIME: containerRuntime,
|
|
CREDENTIALS: credentials,
|
|
CONFIGURED_CHANNELS: configuredChannels.join(','),
|
|
CHANNEL_AUTH: JSON.stringify(channelAuth),
|
|
REGISTERED_GROUPS: registeredGroups,
|
|
MOUNT_ALLOWLIST: mountAllowlist,
|
|
STATUS: status,
|
|
LOG: 'logs/setup.log',
|
|
});
|
|
|
|
if (status === 'failed') process.exit(1);
|
|
}
|