-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathconfig.py
More file actions
349 lines (320 loc) · 13.2 KB
/
config.py
File metadata and controls
349 lines (320 loc) · 13.2 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
from __future__ import annotations
import json
from typing import Annotated, Any, Literal
from pydantic import BaseModel, BeforeValidator, ConfigDict, Field, field_validator, model_validator
from pydantic_settings import BaseSettings, NoDecode, SettingsConfigDict
from opencode_a2a import __version__
from opencode_a2a.protocol_versions import (
normalize_protocol_version,
normalize_protocol_versions,
)
from opencode_a2a.sandbox_policy import SandboxPolicy
SandboxMode = Literal[
"unknown",
"read-only",
"workspace-write",
"danger-full-access",
"custom",
]
SandboxFilesystemScope = Literal[
"unknown",
"workspace_only",
"workspace_and_declared_roots",
"unrestricted",
"custom",
]
NetworkAccess = Literal["unknown", "disabled", "enabled", "restricted", "custom"]
ApprovalPolicy = Literal["unknown", "never", "on-request", "on-failure", "untrusted", "custom"]
EscalationBehavior = Literal["unknown", "manual", "automatic", "unsupported", "custom"]
WriteAccessScope = Literal[
"unknown",
"none",
"workspace_only",
"workspace_and_declared_roots",
"unrestricted",
"custom",
]
OutsideWorkspaceAccess = Literal["unknown", "allowed", "disallowed", "custom"]
TaskStoreBackend = Literal["memory", "database"]
StaticAuthScheme = Literal["bearer", "basic"]
def _parse_declared_list(value: Any) -> tuple[str, ...]:
if value is None:
return ()
if isinstance(value, str):
raw = value.strip()
if not raw:
return ()
if raw.startswith("["):
try:
parsed = json.loads(raw)
except json.JSONDecodeError:
parsed = None
else:
if not isinstance(parsed, list):
raise TypeError("Expected a JSON array for declared list values.")
return tuple(str(item).strip() for item in parsed if str(item).strip())
return tuple(item.strip() for item in raw.split(",") if item.strip())
if isinstance(value, (list, tuple)):
return tuple(str(item).strip() for item in value if str(item).strip())
raise TypeError("Expected a comma-separated string, JSON array, or sequence.")
def _parse_auth_credentials(value: Any) -> tuple[Any, ...]:
if value is None:
return ()
if isinstance(value, str):
raw = value.strip()
if not raw:
return ()
try:
parsed = json.loads(raw)
except json.JSONDecodeError as exc:
raise TypeError("Expected a JSON array for static auth credentials.") from exc
if not isinstance(parsed, list):
raise TypeError("Expected a JSON array for static auth credentials.")
return tuple(parsed)
if isinstance(value, (list, tuple)):
return tuple(value)
raise TypeError("Expected a JSON array or sequence for static auth credentials.")
DeclaredStringList = Annotated[tuple[str, ...], NoDecode, BeforeValidator(_parse_declared_list)]
class StaticAuthCredentialSettings(BaseModel):
model_config = ConfigDict(extra="forbid", populate_by_name=True)
credential_id: str | None = None
scheme: StaticAuthScheme
principal: str | None = None
token: str | None = None
username: str | None = None
password: str | None = None
capabilities: tuple[str, ...] = ()
enabled: bool = True
@model_validator(mode="after")
def _validate_shape(self) -> StaticAuthCredentialSettings:
self.credential_id = self.credential_id.strip() if self.credential_id else None
self.principal = self.principal.strip() if self.principal else None
self.token = self.token.strip() if self.token else None
self.username = self.username.strip() if self.username else None
self.password = self.password.strip() if self.password else None
self.capabilities = tuple(
item.strip() for item in self.capabilities if isinstance(item, str) and item.strip()
)
if self.scheme == "bearer":
if not self.token:
raise ValueError("Static bearer credential requires token.")
if self.username or self.password:
raise ValueError("Static bearer credential does not accept username/password.")
if self.principal is None:
raise ValueError(
"Static bearer credential requires explicit principal; "
"registry bearer principals must not default to automation."
)
else:
if not self.username or not self.password:
raise ValueError("Static basic credential requires username/password.")
if self.token:
raise ValueError("Static basic credential does not accept token.")
if self.principal is not None:
raise ValueError(
"Static basic credential does not accept principal; "
"principal defaults to username."
)
self.principal = self.username
return self
StaticAuthCredentialList = Annotated[
tuple[StaticAuthCredentialSettings, ...],
NoDecode,
BeforeValidator(_parse_auth_credentials),
]
class Settings(BaseSettings):
model_config = SettingsConfigDict(
env_prefix="",
case_sensitive=False,
env_file=".env",
extra="ignore",
populate_by_name=True,
)
# OpenCode settings
opencode_base_url: str = Field(default="http://127.0.0.1:4096", alias="OPENCODE_BASE_URL")
opencode_workspace_root: str | None = Field(default=None, alias="OPENCODE_WORKSPACE_ROOT")
opencode_agent: str | None = Field(default=None, alias="OPENCODE_AGENT")
opencode_system: str | None = Field(default=None, alias="OPENCODE_SYSTEM")
opencode_variant: str | None = Field(default=None, alias="OPENCODE_VARIANT")
opencode_timeout: float = Field(default=120.0, alias="OPENCODE_TIMEOUT")
opencode_timeout_stream: float | None = Field(default=None, alias="OPENCODE_TIMEOUT_STREAM")
opencode_max_concurrent_requests: int = Field(
default=0,
ge=0,
alias="OPENCODE_MAX_CONCURRENT_REQUESTS",
)
opencode_max_concurrent_streams: int = Field(
default=0,
ge=0,
alias="OPENCODE_MAX_CONCURRENT_STREAMS",
)
# A2A settings
a2a_public_url: str = Field(default="http://127.0.0.1:8000", alias="A2A_PUBLIC_URL")
a2a_project: str | None = Field(default=None, alias="A2A_PROJECT")
a2a_title: str = Field(default="OpenCode A2A", alias="A2A_TITLE")
a2a_description: str = Field(default="OpenCode A2A runtime", alias="A2A_DESCRIPTION")
a2a_version: str = Field(default=__version__, alias="A2A_VERSION")
a2a_protocol_version: str = Field(default="0.3", alias="A2A_PROTOCOL_VERSION")
a2a_supported_protocol_versions: DeclaredStringList = Field(
default=("0.3", "1.0"),
alias="A2A_SUPPORTED_PROTOCOL_VERSIONS",
)
a2a_log_level: str = Field(default="WARNING", alias="A2A_LOG_LEVEL")
a2a_log_payloads: bool = Field(default=False, alias="A2A_LOG_PAYLOADS")
a2a_log_body_limit: int = Field(default=0, alias="A2A_LOG_BODY_LIMIT")
a2a_http_gzip_minimum_size: int = Field(
default=8_192,
ge=0,
alias="A2A_HTTP_GZIP_MINIMUM_SIZE",
)
a2a_max_request_body_bytes: int = Field(
default=1_048_576,
ge=0,
alias="A2A_MAX_REQUEST_BODY_BYTES",
)
a2a_documentation_url: str | None = Field(default=None, alias="A2A_DOCUMENTATION_URL")
a2a_allow_directory_override: bool = Field(default=True, alias="A2A_ALLOW_DIRECTORY_OVERRIDE")
a2a_enable_session_shell: bool = Field(default=False, alias="A2A_ENABLE_SESSION_SHELL")
a2a_enable_workspace_mutations: bool = Field(
default=False,
alias="A2A_ENABLE_WORKSPACE_MUTATIONS",
)
a2a_sandbox_mode: SandboxMode = Field(default="unknown", alias="A2A_SANDBOX_MODE")
a2a_sandbox_filesystem_scope: SandboxFilesystemScope = Field(
default="unknown",
alias="A2A_SANDBOX_FILESYSTEM_SCOPE",
)
a2a_sandbox_writable_roots: DeclaredStringList = Field(
default=(),
alias="A2A_SANDBOX_WRITABLE_ROOTS",
)
a2a_network_access: NetworkAccess = Field(default="unknown", alias="A2A_NETWORK_ACCESS")
a2a_network_allowed_domains: DeclaredStringList = Field(
default=(),
alias="A2A_NETWORK_ALLOWED_DOMAINS",
)
a2a_approval_policy: ApprovalPolicy = Field(
default="unknown",
alias="A2A_APPROVAL_POLICY",
)
a2a_approval_escalation_behavior: EscalationBehavior = Field(
default="unknown",
alias="A2A_APPROVAL_ESCALATION_BEHAVIOR",
)
a2a_write_access_scope: WriteAccessScope = Field(
default="unknown",
alias="A2A_WRITE_ACCESS_SCOPE",
)
a2a_write_access_outside_workspace: OutsideWorkspaceAccess = Field(
default="unknown",
alias="A2A_WRITE_ACCESS_OUTSIDE_WORKSPACE",
)
a2a_host: str = Field(default="127.0.0.1", alias="A2A_HOST")
a2a_port: int = Field(default=8000, alias="A2A_PORT")
a2a_static_auth_credentials: StaticAuthCredentialList = Field(
default=(),
alias="A2A_STATIC_AUTH_CREDENTIALS",
)
a2a_pending_session_claim_ttl_seconds: float = Field(
default=30.0,
gt=0.0,
alias="A2A_PENDING_SESSION_CLAIM_TTL_SECONDS",
)
a2a_interrupt_request_ttl_seconds: float = Field(
default=10_800.0,
ge=0.0,
alias="A2A_INTERRUPT_REQUEST_TTL_SECONDS",
)
a2a_interrupt_request_tombstone_ttl_seconds: float = Field(
default=600.0,
ge=0.0,
alias="A2A_INTERRUPT_REQUEST_TOMBSTONE_TTL_SECONDS",
)
a2a_cancel_abort_timeout_seconds: float = Field(
default=2.0,
ge=0.0,
alias="A2A_CANCEL_ABORT_TIMEOUT_SECONDS",
)
# Outbound A2A Client settings
a2a_client_timeout_seconds: float = Field(default=30.0, alias="A2A_CLIENT_TIMEOUT_SECONDS")
a2a_client_card_fetch_timeout_seconds: float = Field(
default=5.0,
alias="A2A_CLIENT_CARD_FETCH_TIMEOUT_SECONDS",
)
a2a_client_use_client_preference: bool = Field(
default=False, alias="A2A_CLIENT_USE_CLIENT_PREFERENCE"
)
a2a_client_bearer_token: str | None = Field(default=None, alias="A2A_CLIENT_BEARER_TOKEN")
a2a_client_basic_auth: str | None = Field(default=None, alias="A2A_CLIENT_BASIC_AUTH")
a2a_client_protocol_version: str | None = Field(
default=None,
alias="A2A_CLIENT_PROTOCOL_VERSION",
)
a2a_client_cache_ttl_seconds: float = Field(
default=900.0,
ge=0.0,
alias="A2A_CLIENT_CACHE_TTL_SECONDS",
)
a2a_client_cache_maxsize: int = Field(
default=256,
ge=0,
alias="A2A_CLIENT_CACHE_MAXSIZE",
)
a2a_client_supported_transports: DeclaredStringList = Field(
default=("JSONRPC", "HTTP+JSON"),
alias="A2A_CLIENT_SUPPORTED_TRANSPORTS",
)
# Task store settings
a2a_task_store_backend: TaskStoreBackend = Field(
default="database",
alias="A2A_TASK_STORE_BACKEND",
)
a2a_task_store_database_url: str | None = Field(
default="sqlite+aiosqlite:///./opencode-a2a.db",
alias="A2A_TASK_STORE_DATABASE_URL",
)
@model_validator(mode="after")
def _validate_sandbox_policy(self) -> Settings:
SandboxPolicy.from_settings(self).validate_configuration()
if self.a2a_task_store_backend == "database" and not self.a2a_task_store_database_url:
raise ValueError(
"A2A_TASK_STORE_DATABASE_URL is required when A2A_TASK_STORE_BACKEND=database"
)
if self.a2a_protocol_version not in self.a2a_supported_protocol_versions:
supported_display = ", ".join(self.a2a_supported_protocol_versions)
raise ValueError(
"A2A_PROTOCOL_VERSION must be present in A2A_SUPPORTED_PROTOCOL_VERSIONS. "
f"Declared supported versions: {supported_display}"
)
if self.a2a_static_auth_credentials:
if not any(credential.enabled for credential in self.a2a_static_auth_credentials):
raise ValueError(
"A2A_STATIC_AUTH_CREDENTIALS must contain at least one enabled credential"
)
else:
raise ValueError("Configure runtime authentication via A2A_STATIC_AUTH_CREDENTIALS")
return self
@field_validator("a2a_protocol_version", mode="before")
@classmethod
def _normalize_a2a_protocol_version(cls, value: Any) -> str:
if not isinstance(value, str):
raise TypeError("A2A_PROTOCOL_VERSION must be a string.")
return normalize_protocol_version(value)
@field_validator("a2a_client_protocol_version", mode="before")
@classmethod
def _normalize_a2a_client_protocol_version(cls, value: Any) -> str | None:
if value is None:
return None
if not isinstance(value, str):
raise TypeError("A2A_CLIENT_PROTOCOL_VERSION must be a string.")
normalized = value.strip()
if not normalized:
return None
return normalize_protocol_version(normalized)
@field_validator("a2a_supported_protocol_versions")
@classmethod
def _normalize_supported_protocol_versions(
cls,
value: tuple[str, ...],
) -> tuple[str, ...]:
return normalize_protocol_versions(value)