use std::sync::Arc;
use axum::Json;
use axum::http::{HeaderMap, StatusCode};
use axum::response::IntoResponse;
use serde::{Deserialize, Serialize};
use serde_json::json;
use systemprompt_config::ProfileBootstrap;
use systemprompt_identifiers::JwtToken;
use systemprompt_security::manifest_signing;
use uuid::Uuid;
use super::bridge_data;
use super::messages::extract_credential;
use crate::services::middleware::JwtContextExtractor;
pub(super) const KNOWN_HOSTS: &[&str] = &["claude-code", "claude-desktop", "cowork", "codex-cli"];
#[derive(Debug, Deserialize)]
pub struct EnabledHostsRequest {
pub host_id: String,
pub enabled: bool,
}
#[derive(Debug, Serialize)]
pub struct SetHostPrefResponse {
pub host_id: String,
pub enabled: bool,
}
pub async fn set_enabled_host(
jwt_extractor: Arc<JwtContextExtractor>,
ctx: systemprompt_runtime::AppContext,
headers: HeaderMap,
Json(body): Json<EnabledHostsRequest>,
) -> Result<Json<SetHostPrefResponse>, (StatusCode, String)> {
let credential = extract_credential(&headers).ok_or_else(|| {
(
StatusCode::UNAUTHORIZED,
"Missing Authorization or x-api-key credential".to_string(),
)
})?;
let claims = jwt_extractor
.decode_for_gateway(&JwtToken::new(credential))
.await
.map_err(|e| (StatusCode::UNAUTHORIZED, e.to_string()))?;
if !KNOWN_HOSTS.iter().any(|h| *h == body.host_id) {
return Err((
StatusCode::BAD_REQUEST,
format!("unknown host: {}", body.host_id),
));
}
bridge_data::upsert_host_pref(&ctx, &claims.user_id, &body.host_id, body.enabled)
.await
.map_err(|e| (StatusCode::INTERNAL_SERVER_ERROR, e.to_string()))?;
Ok(Json(SetHostPrefResponse {
host_id: body.host_id,
enabled: body.enabled,
}))
}
pub async fn pubkey() -> impl IntoResponse {
match manifest_signing::pubkey_b64() {
Ok(b64) => (StatusCode::OK, Json(json!({ "pubkey": b64 }))).into_response(),
Err(e) => (
StatusCode::INTERNAL_SERVER_ERROR,
Json(json!({ "error": e.to_string() })),
)
.into_response(),
}
}
#[derive(Debug, Serialize)]
pub struct BridgeProfileResponse {
pub inference_gateway_base_url: String,
pub auth_scheme: String,
pub models: Vec<String>,
pub organization_uuid: Option<String>,
}
pub async fn profile() -> Result<Json<BridgeProfileResponse>, (StatusCode, String)> {
let profile = ProfileBootstrap::get().map_err(|e| {
(
StatusCode::SERVICE_UNAVAILABLE,
format!("Profile not ready: {e}"),
)
})?;
let gateway = profile
.gateway
.as_ref()
.filter(|g| g.enabled)
.ok_or_else(|| (StatusCode::NOT_FOUND, "Gateway not enabled".to_string()))?;
let base = profile.server.api_external_url.trim_end_matches('/');
let prefix = gateway.inference_path_prefix.trim_end_matches('/');
let inference_gateway_base_url = format!("{base}{prefix}");
let models: Vec<String> = gateway.catalog.as_ref().map_or_else(Vec::new, |catalog| {
catalog.models.iter().map(|m| m.id.clone()).collect()
});
let organization_uuid = profile
.cloud
.as_ref()
.and_then(|cloud| cloud.tenant_id.as_deref())
.map(canonicalize_org_uuid);
Ok(Json(BridgeProfileResponse {
inference_gateway_base_url,
auth_scheme: gateway.auth_scheme.clone(),
models,
organization_uuid,
}))
}
fn canonicalize_org_uuid(tenant_id: &str) -> String {
let suffix = tenant_id.strip_prefix("local_").unwrap_or(tenant_id);
if let Ok(parsed) = Uuid::parse_str(suffix) {
return parsed.to_string();
}
Uuid::new_v5(&Uuid::NAMESPACE_OID, tenant_id.as_bytes()).to_string()
}