π File detail
remote/remotePermissionBridge.ts
π― Use case
This file lives under βremote/β, which covers remote sessions, WebSockets, and SDK message bridging. On the API surface it exposes createSyntheticAssistantMessage and createToolStub β mainly functions, hooks, or classes. Dependencies touch crypto. It composes internal code from entrypoints, Tool, types, and utils (relative imports).
Generated from folder role, exports, dependency roots, and inline comments β not hand-reviewed for every path.
π§ Inline summary
import { randomUUID } from 'crypto' import type { SDKControlPermissionRequest } from '../entrypoints/sdk/controlTypes.js' import type { Tool } from '../Tool.js' import type { AssistantMessage } from '../types/message.js' import { jsonStringify } from '../utils/slowOperations.js'
π€ Exports (heuristic)
createSyntheticAssistantMessagecreateToolStub
π External import roots
Package roots from from "β¦" (relative paths omitted).
crypto
π₯οΈ Source preview
import { randomUUID } from 'crypto'
import type { SDKControlPermissionRequest } from '../entrypoints/sdk/controlTypes.js'
import type { Tool } from '../Tool.js'
import type { AssistantMessage } from '../types/message.js'
import { jsonStringify } from '../utils/slowOperations.js'
/**
* Create a synthetic AssistantMessage for remote permission requests.
* The ToolUseConfirm type requires an AssistantMessage, but in remote mode
* we don't have a real one β the tool use runs on the CCR container.
*/
export function createSyntheticAssistantMessage(
request: SDKControlPermissionRequest,
requestId: string,
): AssistantMessage {
return {
type: 'assistant',
uuid: randomUUID(),
message: {
id: `remote-${requestId}`,
type: 'message',
role: 'assistant',
content: [
{
type: 'tool_use',
id: request.tool_use_id,
name: request.tool_name,
input: request.input,
},
],
model: '',
stop_reason: null,
stop_sequence: null,
container: null,
context_management: null,
usage: {
input_tokens: 0,
output_tokens: 0,
cache_creation_input_tokens: 0,
cache_read_input_tokens: 0,
},
} as AssistantMessage['message'],
requestId: undefined,
timestamp: new Date().toISOString(),
}
}
/**
* Create a minimal Tool stub for tools that aren't loaded locally.
* This happens when the remote CCR has tools (e.g., MCP tools) that the
* local CLI doesn't know about. The stub routes to FallbackPermissionRequest.
*/
export function createToolStub(toolName: string): Tool {
return {
name: toolName,
inputSchema: {} as Tool['inputSchema'],
isEnabled: () => true,
userFacingName: () => toolName,
renderToolUseMessage: (input: Record<string, unknown>) => {
const entries = Object.entries(input)
if (entries.length === 0) return ''
return entries
.slice(0, 3)
.map(([key, value]) => {
const valueStr =
typeof value === 'string' ? value : jsonStringify(value)
return `${key}: ${valueStr}`
})
.join(', ')
},
call: async () => ({ data: '' }),
description: async () => '',
prompt: () => '',
isReadOnly: () => false,
isMcp: false,
needsPermissions: () => true,
} as unknown as Tool
}