use std::path::Path;
use std::sync::Arc;
use anyhow::{Context, Result};
use chrono::Duration as ChronoDuration;
use clap::Args;
use serde::{Deserialize, Serialize};
use crate::cli_settings::CliConfig;
use crate::paths::ResolvedPaths;
use crate::shared::CommandResult;
use systemprompt_agent::repository::context::ContextRepository;
use systemprompt_cloud::{CredentialsBootstrap, SessionKey};
use systemprompt_config::{ProfileBootstrap, SecretsBootstrap};
use systemprompt_database::{Database, DbPool};
use systemprompt_identifiers::{SessionId, UserId};
use systemprompt_logging::CliService;
use systemprompt_models::auth::{Permission, RateLimitTier, UserType};
use systemprompt_models::{Profile, Secrets};
use systemprompt_security::{SessionGenerator, SessionParams};
use super::login_helpers::{
SessionStoreParams, create_session, fetch_admin_user, save_session_to_store,
try_use_existing_session,
};
#[derive(Debug, Args)]
pub struct LoginArgs {
#[arg(
long,
env = "SYSTEMPROMPT_ADMIN_EMAIL",
hide = true,
help = "Override email from credentials"
)]
pub email: Option<String>,
#[arg(long, default_value = "24", help = "Session duration in hours")]
pub duration_hours: i64,
#[arg(long, help = "Only output the token (for scripting)")]
pub token_only: bool,
#[arg(
long,
help = "Force creation of a new session even if a valid one exists"
)]
pub force_new: bool,
}
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct LoginOutput {
pub status: String,
pub user_id: UserId,
pub email: String,
pub session_id: SessionId,
pub expires_in_hours: i64,
}
pub async fn execute(
mut args: LoginArgs,
_config: &CliConfig,
) -> Result<CommandResult<LoginOutput>> {
let profile = ProfileBootstrap::get().context("No profile loaded")?;
let profile_path = ProfileBootstrap::get_path().context("Profile path not set")?;
let secrets = SecretsBootstrap::get().context("Secrets not initialized")?;
if args.email.is_none() {
args.email = Some(resolve_email().await?);
}
login_for_profile(profile, profile_path, secrets, &args).await
}
pub async fn login_for_profile(
profile: &Profile,
profile_path: &str,
secrets: &Secrets,
args: &LoginArgs,
) -> Result<CommandResult<LoginOutput>> {
let sessions_dir = ResolvedPaths::discover().sessions_dir();
let session_key = session_key_for_profile(profile);
let email = args
.email
.as_deref()
.context("Email is required for login")?;
let database_url = secrets.effective_database_url(profile.database.external_db_access);
let db = Database::new_postgres(database_url)
.await
.context("Failed to connect to database")?;
let db_pool = DbPool::from(Arc::new(db));
if !args.force_new {
if let Some(output) =
try_use_existing_session(&sessions_dir, &session_key, args, &db_pool).await?
{
return Ok(output);
}
}
if !args.token_only {
CliService::info(&format!("Fetching admin user: {}", email));
}
let admin_user = fetch_admin_user(&db_pool, email, profile.target.is_cloud()).await?;
if !args.token_only {
CliService::info("Creating session...");
}
let session_id = create_session(
&profile.server.api_external_url,
&admin_user.id,
&admin_user.email,
)
.await?;
if !args.token_only {
CliService::info("Creating context...");
}
let profile_name = Path::new(profile_path)
.parent()
.and_then(|d| d.file_name())
.and_then(|n| n.to_str())
.unwrap_or("unknown");
let context_repo = ContextRepository::new(&db_pool)?;
let context_id = context_repo
.create_context(
&admin_user.id,
Some(&session_id),
&format!("CLI Session - {}", profile_name),
)
.await
.context("Failed to create CLI context")?;
if !args.token_only {
CliService::info("Generating token...");
}
let session_generator = SessionGenerator::new(&secrets.jwt_secret, &profile.security.issuer);
let duration = ChronoDuration::hours(args.duration_hours);
let session_token = session_generator
.generate(&SessionParams {
user_id: &admin_user.id,
session_id: &session_id,
email: &admin_user.email,
duration,
user_type: UserType::Admin,
permissions: vec![Permission::Admin],
roles: vec!["admin".to_string()],
rate_limit_tier: RateLimitTier::Admin,
})
.context("Failed to generate session token")?;
save_session_to_store(SessionStoreParams {
sessions_dir: &sessions_dir,
session_key: &session_key,
profile_path,
session_token: session_token.clone(),
session_id: session_id.clone(),
context_id,
user_id: admin_user.id.clone(),
user_email: &admin_user.email,
})?;
let output = LoginOutput {
status: "created".to_string(),
user_id: admin_user.id.clone(),
email: admin_user.email.clone(),
session_id,
expires_in_hours: args.duration_hours,
};
if args.token_only {
CliService::output(session_token.as_str());
return Ok(CommandResult::text(output).with_skip_render());
}
CliService::success(&format!(
"Session saved to {}/index.json",
sessions_dir.display()
));
Ok(CommandResult::card(output).with_title("Admin Session"))
}
fn session_key_for_profile(profile: &Profile) -> SessionKey {
if profile.target.is_local() {
SessionKey::Local
} else {
let tenant_id = profile.cloud.as_ref().and_then(|c| c.tenant_id.as_deref());
SessionKey::from_tenant_id(tenant_id)
}
}
async fn resolve_email() -> Result<String> {
CredentialsBootstrap::try_init()
.await
.context("Failed to initialize credentials")?;
let creds = CredentialsBootstrap::require().map_err(|_| {
anyhow::anyhow!(
"No credentials found. Run 'systemprompt cloud auth login' first to authenticate."
)
})?;
Ok(creds.user_email.clone())
}