# API — Current State This file records what is believed to be implemented now. ## Runtime / dependency baseline - API is now tracked against Node 24 with repo-local pinning via `package.json` engines and `.nvmrc`. - Direct `node-fetch` dependency has been removed and API code now uses built-in global `fetch`. - Dependency / audit cleanup has been performed and the reported audit state is clean. - Prisma config has been migrated out of deprecated `package.json#prisma` into `prisma.config.ts`. - Prisma generate / validate checks reportedly pass on the current API baseline. ## Readiness / agent state model - API is the heartbeat authority by polling agents. - Agent does not push state to API. - API consumes: - `/health` for liveness - `/ready` for semantic readiness - `/status` for detailed state snapshot - Portal should rely on API-normalized state, not direct agent state. ## Readiness cleanup already done - `agentClient.js` centralizes non-streaming agent transport. - `getAgentReady()` remains low-level transport. - `isAgentReadyResult()` is the shared semantic readiness helper. - `assertAgentReady()` uses semantic readiness. - Poller only caches `ready: true` when `/ready` returns semantic success. - Provisioning requires semantic readiness before success/persist/publish. - Timeout handling in `agentClient.js` has been modernized to `AbortSignal.timeout(...)`. ## Backup support - API forwards game backup operations. - Current API route shape: - `GET /api/game/servers/:id/backups` - `POST /api/game/servers/:id/backups` - `POST /api/game/servers/:id/backups/restore?id=` - `DELETE /api/game/servers/:id/backups/:backupId` - Restore start is async at the API layer and Portal is expected to poll status rather than hold the restore POST open. - API forwards agent HTTP status codes for backup responses. - Successful backup responses currently pass through the agent body. - Non-OK backup responses currently use the shared agent response envelope: `{ error: , details: }`. - Backup response shape normalization remains open. ## File proxy / route compatibility - Duplicated game file proxy logic has been extracted into `src/routes/helpers/gameFileProxy.js` in the API repo. - Route compatibility is intentionally preserved between: - `/api/game/servers/:id/files...` - `/api/servers/:id/files...` - Streamed upload / download / file edit forwarding still exists outside the generic non-streaming agent helper path. - Compatibility between canonical game routes and legacy/compatibility server routes should be treated as part of the API contract. ## Agent contract alignment already done - `/start`, `/stop`, `/restart` forwarded as POST. - `/console/command` forwarded as POST JSON. - `/ready` is part of poller/readiness logic. ## Billing / auth lifecycle - API issues access tokens and refresh tokens. - Password reset tokens are stored hashed and exchanged through API routes. - Stripe billing routes cover checkout, upgrade, downgrade, portal, and current billing state. - Stripe webhooks are mounted with raw body parsing before normal JSON middleware. - Billing scheduler starts in-process and performs limited reminder/reconciliation work. - Admin users are billing-exempt in billing flows. - JWT verification has reportedly been tightened to fixed algorithm plus issuer/audience separation for access, refresh, and IDE proxy tokens. - Pre-hardening tokens may no longer verify and a re-login may be required after this change. ## Hosted IDE proxy - `POST /api/dev/:id/ide-token` issues short-lived IDE proxy tokens. - IDE proxy supports both tunnel paths under `/__ide/:id` and hosted `dev-.` hosts. - Hosted IDE tokens can be delivered by query parameter and then persisted as the IDE proxy cookie. - Hosted URL return is controlled by `DEV_IDE_RETURN_HOSTED_URL`. - API exposes code-server controls for owned dev containers: - `POST /api/dev/:id/codeserver/start` -> Agent `POST /dev/codeserver/start` - `POST /api/dev/:id/codeserver/stop` -> Agent `POST /dev/codeserver/stop` - `POST /api/dev/:id/codeserver/restart` -> Agent `POST /dev/codeserver/restart` - IDE proxy cookie hardening is expected to include `httpOnly`, `sameSite: "lax"`, and secure-cookie behavior tied to public HTTPS or explicit secure-cookie config. - Sensitive proxy logging has reportedly been reduced so cookies and forwarded header detail are not exposed in normal logs. ## Node 24 cleanup already reflected in API repo - `RegExp.escape(...)` is used where host / suffix regex escaping was previously manual. - Selected built-in imports have been normalized to `node:` style. ## Still true - websocket console proxy wiring remains outside `agentClient.js` - raw streaming upload proxy behavior remains outside `agentClient.js`