@agenticmail/enterprise 0.5.230 → 0.5.231

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,222 @@
1
+ import {
2
+ DomainLock
3
+ } from "./chunk-UPU23ZRG.js";
4
+ import "./chunk-KFQGP6VL.js";
5
+
6
+ // src/domain-lock/cli-recover.ts
7
+ function getFlag(args, name) {
8
+ const idx = args.indexOf(name);
9
+ if (idx !== -1 && args[idx + 1]) return args[idx + 1];
10
+ return void 0;
11
+ }
12
+ function hasFlag(args, name) {
13
+ return args.includes(name);
14
+ }
15
+ async function runRecover(args) {
16
+ const { default: inquirer } = await import("inquirer");
17
+ const { default: chalk } = await import("chalk");
18
+ const { default: ora } = await import("ora");
19
+ console.log("");
20
+ console.log(chalk.bold(" AgenticMail Enterprise \u2014 Domain Recovery"));
21
+ console.log(chalk.dim(" Recover your domain registration on a new machine."));
22
+ console.log("");
23
+ console.log(chalk.dim(" You will need:"));
24
+ console.log(chalk.dim(" 1. Your domain name"));
25
+ console.log(chalk.dim(" 2. Your 64-character deployment key (shown once during setup)"));
26
+ console.log(chalk.dim(" 3. Your database connection string"));
27
+ console.log("");
28
+ let domain = getFlag(args, "--domain");
29
+ if (!domain) {
30
+ const answer = await inquirer.prompt([{
31
+ type: "input",
32
+ name: "domain",
33
+ message: "Domain to recover:",
34
+ suffix: chalk.dim(" (the domain you registered during setup)"),
35
+ validate: (v) => {
36
+ const d = v.trim().toLowerCase();
37
+ if (!d.includes(".")) return "Enter a valid domain (e.g. agents.yourcompany.com)";
38
+ if (d.startsWith("http")) return "Enter just the domain, not a URL";
39
+ return true;
40
+ },
41
+ filter: (v) => v.trim().toLowerCase()
42
+ }]);
43
+ domain = answer.domain;
44
+ }
45
+ let key = getFlag(args, "--key");
46
+ if (!key) {
47
+ console.log("");
48
+ console.log(chalk.dim(" Your deployment key was shown once during initial setup."));
49
+ console.log(chalk.dim(" It is a 64-character hexadecimal string."));
50
+ console.log("");
51
+ const answer = await inquirer.prompt([{
52
+ type: "password",
53
+ name: "key",
54
+ message: "Deployment key:",
55
+ mask: "*",
56
+ validate: (v) => {
57
+ if (!v.trim()) return "Deployment key is required";
58
+ if (v.length !== 64) return `Expected 64 characters, got ${v.length}. Check that you copied the full key.`;
59
+ if (!/^[0-9a-fA-F]+$/.test(v)) return "Deployment key should be hexadecimal (0-9, a-f)";
60
+ return true;
61
+ }
62
+ }]);
63
+ key = answer.key;
64
+ }
65
+ console.log("");
66
+ const spinner = ora("Contacting AgenticMail registry...").start();
67
+ const lock = new DomainLock();
68
+ const result = await lock.recover(domain, key);
69
+ if (!result.success) {
70
+ spinner.fail("Recovery failed");
71
+ console.log("");
72
+ console.error(chalk.red(` ${result.error}`));
73
+ console.log("");
74
+ if (result.error?.includes("Invalid deployment key")) {
75
+ console.log(chalk.yellow(" The deployment key does not match this domain."));
76
+ console.log(chalk.dim(" Make sure you are using the key that was shown during the original setup."));
77
+ console.log(chalk.dim(" If you lost your key, contact support@agenticmail.io for manual verification."));
78
+ } else if (result.error?.includes("not registered")) {
79
+ console.log(chalk.yellow(" This domain was never registered with AgenticMail."));
80
+ console.log(chalk.dim(" Run the setup wizard instead: npx @agenticmail/enterprise setup"));
81
+ }
82
+ console.log("");
83
+ process.exit(1);
84
+ }
85
+ spinner.succeed("Registry accepted recovery \u2014 new DNS challenge issued");
86
+ console.log("");
87
+ console.log(chalk.bold.cyan(" Database Connection"));
88
+ console.log(chalk.dim(" We need to update your database with the new registration.\n"));
89
+ let db = null;
90
+ let dbConnected = false;
91
+ const envDbUrl = process.env.DATABASE_URL;
92
+ if (envDbUrl && !hasFlag(args, "--no-db")) {
93
+ const dbType = detectDbType(envDbUrl);
94
+ spinner.start(`Connecting to database (${dbType}, from DATABASE_URL)...`);
95
+ try {
96
+ const { createAdapter } = await import("./factory-672W7A5B.js");
97
+ db = await createAdapter({ type: dbType, connectionString: envDbUrl });
98
+ await db.migrate();
99
+ dbConnected = true;
100
+ spinner.succeed(`Connected to ${dbType} database`);
101
+ } catch (err) {
102
+ spinner.warn(`Could not connect via DATABASE_URL: ${err.message}`);
103
+ db = null;
104
+ }
105
+ }
106
+ if (!dbConnected && !hasFlag(args, "--no-db")) {
107
+ const { connectDb } = await inquirer.prompt([{
108
+ type: "confirm",
109
+ name: "connectDb",
110
+ message: "Connect to your database now?",
111
+ default: true
112
+ }]);
113
+ if (connectDb) {
114
+ const dbTypes = [
115
+ { name: `PostgreSQL / Supabase / Neon ${chalk.dim("(recommended)")}`, value: "postgres" },
116
+ { name: "MySQL / PlanetScale", value: "mysql" },
117
+ { name: "SQLite (local file)", value: "sqlite" },
118
+ { name: "Turso (LibSQL)", value: "turso" },
119
+ { name: "MongoDB", value: "mongodb" }
120
+ ];
121
+ const { dbType } = await inquirer.prompt([{
122
+ type: "list",
123
+ name: "dbType",
124
+ message: "Database type:",
125
+ choices: dbTypes
126
+ }]);
127
+ const placeholders = {
128
+ postgres: "postgresql://user:pass@host:5432/dbname?sslmode=require",
129
+ mysql: "mysql://user:pass@host:3306/dbname",
130
+ sqlite: "./data/agenticmail.db",
131
+ turso: "libsql://your-db-name-org.turso.io",
132
+ mongodb: "mongodb+srv://user:pass@cluster.mongodb.net/dbname"
133
+ };
134
+ const { connString } = await inquirer.prompt([{
135
+ type: "input",
136
+ name: "connString",
137
+ message: "Connection string:",
138
+ suffix: chalk.dim(`
139
+ e.g. ${placeholders[dbType]}
140
+ >`),
141
+ validate: (v) => v.trim() ? true : "Connection string is required"
142
+ }]);
143
+ spinner.start(`Connecting to ${dbType} database...`);
144
+ try {
145
+ const { createAdapter } = await import("./factory-672W7A5B.js");
146
+ db = await createAdapter({ type: dbType, connectionString: connString.trim() });
147
+ await db.migrate();
148
+ dbConnected = true;
149
+ spinner.succeed(`Connected to ${dbType} database`);
150
+ } catch (err) {
151
+ spinner.fail(`Database connection failed: ${err.message}`);
152
+ console.log(chalk.yellow("\n Could not connect. You can update settings manually from the dashboard."));
153
+ console.log(chalk.dim(" Or set DATABASE_URL and run this command again.\n"));
154
+ }
155
+ }
156
+ }
157
+ if (dbConnected && db) {
158
+ spinner.start("Updating domain registration in database...");
159
+ try {
160
+ const { createHash } = await import("crypto");
161
+ const keyHash = createHash("sha256").update(key).digest("hex");
162
+ await db.updateSettings({
163
+ domain,
164
+ deploymentKeyHash: keyHash,
165
+ domainRegistrationId: result.registrationId,
166
+ domainDnsChallenge: result.dnsChallenge,
167
+ domainRegisteredAt: (/* @__PURE__ */ new Date()).toISOString(),
168
+ domainStatus: "pending_dns",
169
+ domainVerifiedAt: void 0
170
+ });
171
+ spinner.succeed("Database updated with new registration");
172
+ } catch (err) {
173
+ spinner.warn(`Could not update database: ${err.message}`);
174
+ console.log(chalk.dim(" You can update manually from the dashboard after DNS verification."));
175
+ }
176
+ try {
177
+ await db.disconnect();
178
+ } catch {
179
+ }
180
+ }
181
+ console.log("");
182
+ console.log(chalk.green.bold(" \u2713 Domain recovery successful!"));
183
+ console.log("");
184
+ console.log(chalk.bold(" Next: Add this DNS TXT record to verify ownership"));
185
+ console.log("");
186
+ console.log(` ${chalk.bold("Host:")} ${chalk.cyan(`_agenticmail-verify.${domain}`)}`);
187
+ console.log(` ${chalk.bold("Type:")} ${chalk.cyan("TXT")}`);
188
+ console.log(` ${chalk.bold("Value:")} ${chalk.cyan(result.dnsChallenge)}`);
189
+ console.log("");
190
+ if (dbConnected) {
191
+ console.log(chalk.dim(" After adding the DNS record, verify from the dashboard"));
192
+ console.log(chalk.dim(" or run:"));
193
+ } else {
194
+ console.log(chalk.dim(" After adding the DNS record, connect to your database"));
195
+ console.log(chalk.dim(" and verify:"));
196
+ }
197
+ console.log("");
198
+ console.log(chalk.dim(` npx @agenticmail/enterprise verify-domain --domain ${domain}`));
199
+ console.log("");
200
+ if (!dbConnected) {
201
+ console.log(chalk.yellow.bold(" \u26A0 Database was not updated"));
202
+ console.log(chalk.dim(" The registry accepted your recovery, but your local database"));
203
+ console.log(chalk.dim(" does not have the new DNS challenge yet. Options:"));
204
+ console.log("");
205
+ console.log(chalk.dim(" 1. Set DATABASE_URL and run this command again"));
206
+ console.log(chalk.dim(" 2. Start your server \u2014 the dashboard will show the DNS challenge"));
207
+ console.log(chalk.dim(" 3. Run verify-domain with --db after adding DNS records"));
208
+ console.log("");
209
+ }
210
+ }
211
+ function detectDbType(url) {
212
+ const u = url.toLowerCase().trim();
213
+ if (u.startsWith("postgres") || u.startsWith("pg:")) return "postgres";
214
+ if (u.startsWith("mysql")) return "mysql";
215
+ if (u.startsWith("mongodb")) return "mongodb";
216
+ if (u.startsWith("libsql") || u.includes(".turso.io")) return "turso";
217
+ if (u.endsWith(".db") || u.endsWith(".sqlite") || u.endsWith(".sqlite3") || u.startsWith("file:")) return "sqlite";
218
+ return "postgres";
219
+ }
220
+ export {
221
+ runRecover
222
+ };
@@ -0,0 +1,114 @@
1
+ import "./chunk-KFQGP6VL.js";
2
+
3
+ // src/cli-serve.ts
4
+ import { existsSync, readFileSync } from "fs";
5
+ import { join } from "path";
6
+ import { homedir } from "os";
7
+ function loadEnvFile() {
8
+ const candidates = [
9
+ join(process.cwd(), ".env"),
10
+ join(homedir(), ".agenticmail", ".env")
11
+ ];
12
+ for (const envPath of candidates) {
13
+ if (!existsSync(envPath)) continue;
14
+ try {
15
+ const content = readFileSync(envPath, "utf8");
16
+ for (const line of content.split("\n")) {
17
+ const trimmed = line.trim();
18
+ if (!trimmed || trimmed.startsWith("#")) continue;
19
+ const eq = trimmed.indexOf("=");
20
+ if (eq < 0) continue;
21
+ const key = trimmed.slice(0, eq).trim();
22
+ let val = trimmed.slice(eq + 1).trim();
23
+ if (val.startsWith('"') && val.endsWith('"') || val.startsWith("'") && val.endsWith("'")) {
24
+ val = val.slice(1, -1);
25
+ }
26
+ if (!process.env[key]) process.env[key] = val;
27
+ }
28
+ console.log(`Loaded config from ${envPath}`);
29
+ return;
30
+ } catch {
31
+ }
32
+ }
33
+ }
34
+ async function ensureSecrets() {
35
+ const { randomUUID } = await import("crypto");
36
+ const envDir = join(homedir(), ".agenticmail");
37
+ const envPath = join(envDir, ".env");
38
+ let dirty = false;
39
+ if (!process.env.JWT_SECRET) {
40
+ process.env.JWT_SECRET = randomUUID() + randomUUID();
41
+ dirty = true;
42
+ console.log("[startup] Generated new JWT_SECRET (existing sessions will need to re-login)");
43
+ }
44
+ if (!process.env.AGENTICMAIL_VAULT_KEY) {
45
+ process.env.AGENTICMAIL_VAULT_KEY = randomUUID() + randomUUID();
46
+ dirty = true;
47
+ console.log("[startup] Generated new AGENTICMAIL_VAULT_KEY");
48
+ console.log("[startup] \u26A0\uFE0F Previously encrypted credentials will need to be re-entered in the dashboard");
49
+ }
50
+ if (dirty) {
51
+ try {
52
+ if (!existsSync(envDir)) {
53
+ const { mkdirSync } = await import("fs");
54
+ mkdirSync(envDir, { recursive: true });
55
+ }
56
+ const { appendFileSync } = await import("fs");
57
+ const lines = [];
58
+ let existing = "";
59
+ if (existsSync(envPath)) {
60
+ existing = readFileSync(envPath, "utf8");
61
+ }
62
+ if (!existing.includes("JWT_SECRET=")) {
63
+ lines.push(`JWT_SECRET=${process.env.JWT_SECRET}`);
64
+ }
65
+ if (!existing.includes("AGENTICMAIL_VAULT_KEY=")) {
66
+ lines.push(`AGENTICMAIL_VAULT_KEY=${process.env.AGENTICMAIL_VAULT_KEY}`);
67
+ }
68
+ if (lines.length) {
69
+ appendFileSync(envPath, "\n" + lines.join("\n") + "\n", { mode: 384 });
70
+ console.log(`[startup] Saved secrets to ${envPath}`);
71
+ }
72
+ } catch (e) {
73
+ console.warn(`[startup] Could not save secrets to ${envPath}: ${e.message}`);
74
+ }
75
+ }
76
+ }
77
+ async function runServe(_args) {
78
+ loadEnvFile();
79
+ const DATABASE_URL = process.env.DATABASE_URL;
80
+ const PORT = parseInt(process.env.PORT || "8080", 10);
81
+ await ensureSecrets();
82
+ const JWT_SECRET = process.env.JWT_SECRET;
83
+ const VAULT_KEY = process.env.AGENTICMAIL_VAULT_KEY;
84
+ if (!DATABASE_URL) {
85
+ console.error("ERROR: DATABASE_URL is required.");
86
+ console.error("");
87
+ console.error("Set it via environment variable or .env file:");
88
+ console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db npx @agenticmail/enterprise start");
89
+ console.error("");
90
+ console.error("Or create a .env file (in cwd or ~/.agenticmail/.env):");
91
+ console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db");
92
+ console.error(" JWT_SECRET=your-secret-here");
93
+ console.error(" PORT=3200");
94
+ process.exit(1);
95
+ }
96
+ const { createAdapter } = await import("./factory-672W7A5B.js");
97
+ const { createServer } = await import("./server-RZ22KAON.js");
98
+ const db = await createAdapter({
99
+ type: DATABASE_URL.startsWith("postgres") ? "postgres" : "sqlite",
100
+ connectionString: DATABASE_URL
101
+ });
102
+ await db.migrate();
103
+ const server = createServer({
104
+ port: PORT,
105
+ db,
106
+ jwtSecret: JWT_SECRET,
107
+ corsOrigins: ["*"]
108
+ });
109
+ await server.start();
110
+ console.log(`AgenticMail Enterprise server running on :${PORT}`);
111
+ }
112
+ export {
113
+ runServe
114
+ };
@@ -0,0 +1,149 @@
1
+ import {
2
+ DomainLock
3
+ } from "./chunk-UPU23ZRG.js";
4
+ import "./chunk-KFQGP6VL.js";
5
+
6
+ // src/domain-lock/cli-verify.ts
7
+ function getFlag(args, name) {
8
+ const idx = args.indexOf(name);
9
+ if (idx !== -1 && args[idx + 1]) return args[idx + 1];
10
+ return void 0;
11
+ }
12
+ function hasFlag(args, name) {
13
+ return args.includes(name);
14
+ }
15
+ function detectDbType(url) {
16
+ const u = url.toLowerCase().trim();
17
+ if (u.startsWith("postgres") || u.startsWith("pg:")) return "postgres";
18
+ if (u.startsWith("mysql")) return "mysql";
19
+ if (u.startsWith("mongodb")) return "mongodb";
20
+ if (u.startsWith("libsql") || u.includes(".turso.io")) return "turso";
21
+ if (u.endsWith(".db") || u.endsWith(".sqlite") || u.endsWith(".sqlite3") || u.startsWith("file:")) return "sqlite";
22
+ return "postgres";
23
+ }
24
+ async function runVerifyDomain(args) {
25
+ const { default: chalk } = await import("chalk");
26
+ const { default: ora } = await import("ora");
27
+ console.log("");
28
+ console.log(chalk.bold(" AgenticMail Enterprise \u2014 Domain Verification"));
29
+ console.log("");
30
+ let domain = getFlag(args, "--domain");
31
+ let dnsChallenge;
32
+ let db = null;
33
+ let dbConnected = false;
34
+ const envDbUrl = process.env.DATABASE_URL;
35
+ if (envDbUrl) {
36
+ const dbType = detectDbType(envDbUrl);
37
+ const spinner = ora(`Connecting to database (${dbType})...`).start();
38
+ try {
39
+ const { createAdapter } = await import("./factory-672W7A5B.js");
40
+ db = await createAdapter({ type: dbType, connectionString: envDbUrl });
41
+ await db.migrate();
42
+ const settings = await db.getSettings();
43
+ if (!domain && settings?.domain) domain = settings.domain;
44
+ if (settings?.domainDnsChallenge) dnsChallenge = settings.domainDnsChallenge;
45
+ dbConnected = true;
46
+ spinner.succeed(`Connected to ${dbType} database` + (domain ? ` (domain: ${domain})` : ""));
47
+ } catch (err) {
48
+ spinner.warn(`Could not connect via DATABASE_URL: ${err.message}`);
49
+ db = null;
50
+ }
51
+ }
52
+ if (!dbConnected) {
53
+ const dbPath = getFlag(args, "--db");
54
+ const dbType = getFlag(args, "--db-type") || "sqlite";
55
+ if (dbPath) {
56
+ const spinner = ora(`Connecting to ${dbType} database...`).start();
57
+ try {
58
+ const { createAdapter } = await import("./factory-672W7A5B.js");
59
+ db = await createAdapter({ type: dbType, connectionString: dbPath });
60
+ await db.migrate();
61
+ const settings = await db.getSettings();
62
+ if (!domain && settings?.domain) domain = settings.domain;
63
+ if (settings?.domainDnsChallenge) dnsChallenge = settings.domainDnsChallenge;
64
+ dbConnected = true;
65
+ spinner.succeed(`Connected to ${dbType} database`);
66
+ } catch {
67
+ spinner.warn("Could not read local database");
68
+ }
69
+ }
70
+ }
71
+ if (!domain) {
72
+ const { default: inquirer } = await import("inquirer");
73
+ const answer = await inquirer.prompt([{
74
+ type: "input",
75
+ name: "domain",
76
+ message: "Domain to verify:",
77
+ suffix: chalk.dim(" (e.g. agents.yourcompany.com)"),
78
+ validate: (v) => v.includes(".") || "Enter a valid domain",
79
+ filter: (v) => v.trim().toLowerCase()
80
+ }]);
81
+ domain = answer.domain;
82
+ }
83
+ const lock = new DomainLock();
84
+ const maxAttempts = hasFlag(args, "--poll") ? 5 : 1;
85
+ for (let attempt = 1; attempt <= maxAttempts; attempt++) {
86
+ const spinner = ora(
87
+ maxAttempts > 1 ? `Checking DNS verification (attempt ${attempt}/${maxAttempts})...` : "Checking DNS verification..."
88
+ ).start();
89
+ try {
90
+ const result = await lock.checkVerification(domain);
91
+ if (!result.success) {
92
+ spinner.fail("Verification check failed");
93
+ console.log("");
94
+ console.error(chalk.red(` ${result.error}`));
95
+ console.log("");
96
+ if (db) await db.disconnect();
97
+ process.exit(1);
98
+ }
99
+ if (result.verified) {
100
+ spinner.succeed("Domain verified!");
101
+ if (dbConnected && db) {
102
+ try {
103
+ await db.updateSettings({
104
+ domainStatus: "verified",
105
+ domainVerifiedAt: (/* @__PURE__ */ new Date()).toISOString()
106
+ });
107
+ console.log(chalk.dim(" Database updated with verified status."));
108
+ } catch {
109
+ }
110
+ }
111
+ console.log("");
112
+ console.log(chalk.green.bold(` \u2713 ${domain} is verified and protected.`));
113
+ console.log(chalk.dim(" Your deployment domain is locked. No other instance can claim it."));
114
+ console.log(chalk.dim(" The system now operates 100% offline \u2014 no outbound calls are made."));
115
+ console.log("");
116
+ if (db) await db.disconnect();
117
+ return;
118
+ }
119
+ } catch (err) {
120
+ spinner.warn(`Check failed: ${err.message}`);
121
+ }
122
+ if (attempt < maxAttempts) {
123
+ const waitSpinner = ora(`DNS record not found yet. Retrying in 10 seconds...`).start();
124
+ await new Promise((r) => setTimeout(r, 1e4));
125
+ waitSpinner.stop();
126
+ }
127
+ }
128
+ console.log("");
129
+ console.log(chalk.yellow(" DNS record not detected yet."));
130
+ console.log("");
131
+ console.log(chalk.bold(" Make sure this TXT record exists at your DNS provider:"));
132
+ console.log("");
133
+ console.log(` ${chalk.bold("Host:")} ${chalk.cyan(`_agenticmail-verify.${domain}`)}`);
134
+ console.log(` ${chalk.bold("Type:")} ${chalk.cyan("TXT")}`);
135
+ if (dnsChallenge) {
136
+ console.log(` ${chalk.bold("Value:")} ${chalk.cyan(dnsChallenge)}`);
137
+ } else {
138
+ console.log(` ${chalk.bold("Value:")} ${chalk.dim("(check your dashboard or setup output)")}`);
139
+ }
140
+ console.log("");
141
+ console.log(chalk.dim(" DNS propagation can take up to 48 hours."));
142
+ console.log(chalk.dim(" Run with --poll to retry automatically:"));
143
+ console.log(chalk.dim(` npx @agenticmail/enterprise verify-domain --domain ${domain} --poll`));
144
+ console.log("");
145
+ if (db) await db.disconnect();
146
+ }
147
+ export {
148
+ runVerifyDomain
149
+ };
package/dist/cli.js CHANGED
@@ -14,10 +14,10 @@ switch (command) {
14
14
  import("./cli-submit-skill-LDFJGSKO.js").then((m) => m.runSubmitSkill(args.slice(1))).catch(fatal);
15
15
  break;
16
16
  case "recover":
17
- import("./cli-recover-UWMQORT4.js").then((m) => m.runRecover(args.slice(1))).catch(fatal);
17
+ import("./cli-recover-GNWBEKCR.js").then((m) => m.runRecover(args.slice(1))).catch(fatal);
18
18
  break;
19
19
  case "verify-domain":
20
- import("./cli-verify-ENB4NVHG.js").then((m) => m.runVerifyDomain(args.slice(1))).catch(fatal);
20
+ import("./cli-verify-F3KN23M7.js").then((m) => m.runVerifyDomain(args.slice(1))).catch(fatal);
21
21
  break;
22
22
  case "--help":
23
23
  case "-h":
@@ -53,14 +53,14 @@ Skill Development:
53
53
  break;
54
54
  case "serve":
55
55
  case "start":
56
- import("./cli-serve-YEDRINZV.js").then((m) => m.runServe(args.slice(1))).catch(fatal);
56
+ import("./cli-serve-NGGPNMP7.js").then((m) => m.runServe(args.slice(1))).catch(fatal);
57
57
  break;
58
58
  case "agent":
59
- import("./cli-agent-5ZU3YHEY.js").then((m) => m.runAgent(args.slice(1))).catch(fatal);
59
+ import("./cli-agent-M3YGU3IG.js").then((m) => m.runAgent(args.slice(1))).catch(fatal);
60
60
  break;
61
61
  case "setup":
62
62
  default:
63
- import("./setup-FNMKPXP2.js").then((m) => m.runSetupWizard()).catch(fatal);
63
+ import("./setup-3RGSSGB3.js").then((m) => m.runSetupWizard()).catch(fatal);
64
64
  break;
65
65
  }
66
66
  function fatal(err) {
@@ -0,0 +1,9 @@
1
+ import {
2
+ createAdapter,
3
+ getSupportedDatabases
4
+ } from "./chunk-ULRBF2T7.js";
5
+ import "./chunk-KFQGP6VL.js";
6
+ export {
7
+ createAdapter,
8
+ getSupportedDatabases
9
+ };
package/dist/index.js CHANGED
@@ -7,7 +7,7 @@ import {
7
7
  import {
8
8
  provision,
9
9
  runSetupWizard
10
- } from "./chunk-EKAHAAGY.js";
10
+ } from "./chunk-YNG3KJKA.js";
11
11
  import {
12
12
  AgenticMailManager,
13
13
  GoogleEmailProvider,
@@ -42,7 +42,7 @@ import {
42
42
  requireRole,
43
43
  securityHeaders,
44
44
  validate
45
- } from "./chunk-DFDEYMA5.js";
45
+ } from "./chunk-KQ5NV6LM.js";
46
46
  import "./chunk-OF4MUWWS.js";
47
47
  import {
48
48
  PROVIDER_REGISTRY,
@@ -113,7 +113,7 @@ import {
113
113
  import {
114
114
  createAdapter,
115
115
  getSupportedDatabases
116
- } from "./chunk-VQQ4SYYQ.js";
116
+ } from "./chunk-ULRBF2T7.js";
117
117
  import {
118
118
  AGENTICMAIL_TOOLS,
119
119
  ALL_TOOLS,