@agenticmail/enterprise 0.5.281 → 0.5.283
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/agent-heartbeat-HVKMZXEP.js +510 -0
- package/dist/agent-tools-FXT4DWIT.js +7 -0
- package/dist/agent-tools-VQ3MX746.js +13881 -0
- package/dist/browser-tool-VRCAS76F.js +4003 -0
- package/dist/chunk-2FOASCL5.js +4739 -0
- package/dist/chunk-5Z4QW7FI.js +1036 -0
- package/dist/chunk-KPGXRGQ4.js +4735 -0
- package/dist/chunk-KUUIDXRJ.js +3780 -0
- package/dist/chunk-LODP4ATE.js +1224 -0
- package/dist/chunk-O3RXJSHR.js +3780 -0
- package/dist/chunk-P5EGIVSM.js +1224 -0
- package/dist/chunk-V3AM4LOU.js +2594 -0
- package/dist/chunk-XPOPU7F4.js +177 -0
- package/dist/cli-agent-4C36ET7J.js +1778 -0
- package/dist/cli-agent-5OF74Z3A.js +1778 -0
- package/dist/cli-serve-756HRJOT.js +114 -0
- package/dist/cli-serve-TJ4ED5FM.js +114 -0
- package/dist/cli.js +3 -3
- package/dist/connection-manager-UHQRYZV2.js +7 -0
- package/dist/dashboard/pages/database-access.js +63 -14
- package/dist/index.js +23 -23
- package/dist/meetings-RR72OBSV.js +1 -1
- package/dist/routes-YARSSU26.js +13695 -0
- package/dist/runtime-3BM2W3YT.js +45 -0
- package/dist/runtime-RILCPBIB.js +45 -0
- package/dist/server-AICCPX7S.js +15 -0
- package/dist/server-XVIBYRNU.js +15 -0
- package/dist/setup-DAT4LP7A.js +20 -0
- package/dist/setup-I23IJDTG.js +20 -0
- package/package.json +1 -1
- package/src/agent-tools/index.ts +11 -0
- package/src/agent-tools/types.ts +2 -0
- package/src/cli-agent.ts +13 -0
- package/src/dashboard/pages/database-access.js +63 -14
- package/src/database-access/connection-manager.ts +28 -0
- package/src/database-access/routes.ts +23 -1
- package/src/runtime/index.ts +8 -0
- package/src/runtime/types.ts +2 -0
- package/src/server.ts +6 -4
|
@@ -0,0 +1,114 @@
|
|
|
1
|
+
import "./chunk-KFQGP6VL.js";
|
|
2
|
+
|
|
3
|
+
// src/cli-serve.ts
|
|
4
|
+
import { existsSync, readFileSync } from "fs";
|
|
5
|
+
import { join } from "path";
|
|
6
|
+
import { homedir } from "os";
|
|
7
|
+
function loadEnvFile() {
|
|
8
|
+
const candidates = [
|
|
9
|
+
join(process.cwd(), ".env"),
|
|
10
|
+
join(homedir(), ".agenticmail", ".env")
|
|
11
|
+
];
|
|
12
|
+
for (const envPath of candidates) {
|
|
13
|
+
if (!existsSync(envPath)) continue;
|
|
14
|
+
try {
|
|
15
|
+
const content = readFileSync(envPath, "utf8");
|
|
16
|
+
for (const line of content.split("\n")) {
|
|
17
|
+
const trimmed = line.trim();
|
|
18
|
+
if (!trimmed || trimmed.startsWith("#")) continue;
|
|
19
|
+
const eq = trimmed.indexOf("=");
|
|
20
|
+
if (eq < 0) continue;
|
|
21
|
+
const key = trimmed.slice(0, eq).trim();
|
|
22
|
+
let val = trimmed.slice(eq + 1).trim();
|
|
23
|
+
if (val.startsWith('"') && val.endsWith('"') || val.startsWith("'") && val.endsWith("'")) {
|
|
24
|
+
val = val.slice(1, -1);
|
|
25
|
+
}
|
|
26
|
+
if (!process.env[key]) process.env[key] = val;
|
|
27
|
+
}
|
|
28
|
+
console.log(`Loaded config from ${envPath}`);
|
|
29
|
+
return;
|
|
30
|
+
} catch {
|
|
31
|
+
}
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
async function ensureSecrets() {
|
|
35
|
+
const { randomUUID } = await import("crypto");
|
|
36
|
+
const envDir = join(homedir(), ".agenticmail");
|
|
37
|
+
const envPath = join(envDir, ".env");
|
|
38
|
+
let dirty = false;
|
|
39
|
+
if (!process.env.JWT_SECRET) {
|
|
40
|
+
process.env.JWT_SECRET = randomUUID() + randomUUID();
|
|
41
|
+
dirty = true;
|
|
42
|
+
console.log("[startup] Generated new JWT_SECRET (existing sessions will need to re-login)");
|
|
43
|
+
}
|
|
44
|
+
if (!process.env.AGENTICMAIL_VAULT_KEY) {
|
|
45
|
+
process.env.AGENTICMAIL_VAULT_KEY = randomUUID() + randomUUID();
|
|
46
|
+
dirty = true;
|
|
47
|
+
console.log("[startup] Generated new AGENTICMAIL_VAULT_KEY");
|
|
48
|
+
console.log("[startup] \u26A0\uFE0F Previously encrypted credentials will need to be re-entered in the dashboard");
|
|
49
|
+
}
|
|
50
|
+
if (dirty) {
|
|
51
|
+
try {
|
|
52
|
+
if (!existsSync(envDir)) {
|
|
53
|
+
const { mkdirSync } = await import("fs");
|
|
54
|
+
mkdirSync(envDir, { recursive: true });
|
|
55
|
+
}
|
|
56
|
+
const { appendFileSync } = await import("fs");
|
|
57
|
+
const lines = [];
|
|
58
|
+
let existing = "";
|
|
59
|
+
if (existsSync(envPath)) {
|
|
60
|
+
existing = readFileSync(envPath, "utf8");
|
|
61
|
+
}
|
|
62
|
+
if (!existing.includes("JWT_SECRET=")) {
|
|
63
|
+
lines.push(`JWT_SECRET=${process.env.JWT_SECRET}`);
|
|
64
|
+
}
|
|
65
|
+
if (!existing.includes("AGENTICMAIL_VAULT_KEY=")) {
|
|
66
|
+
lines.push(`AGENTICMAIL_VAULT_KEY=${process.env.AGENTICMAIL_VAULT_KEY}`);
|
|
67
|
+
}
|
|
68
|
+
if (lines.length) {
|
|
69
|
+
appendFileSync(envPath, "\n" + lines.join("\n") + "\n", { mode: 384 });
|
|
70
|
+
console.log(`[startup] Saved secrets to ${envPath}`);
|
|
71
|
+
}
|
|
72
|
+
} catch (e) {
|
|
73
|
+
console.warn(`[startup] Could not save secrets to ${envPath}: ${e.message}`);
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
async function runServe(_args) {
|
|
78
|
+
loadEnvFile();
|
|
79
|
+
const DATABASE_URL = process.env.DATABASE_URL;
|
|
80
|
+
const PORT = parseInt(process.env.PORT || "8080", 10);
|
|
81
|
+
await ensureSecrets();
|
|
82
|
+
const JWT_SECRET = process.env.JWT_SECRET;
|
|
83
|
+
const VAULT_KEY = process.env.AGENTICMAIL_VAULT_KEY;
|
|
84
|
+
if (!DATABASE_URL) {
|
|
85
|
+
console.error("ERROR: DATABASE_URL is required.");
|
|
86
|
+
console.error("");
|
|
87
|
+
console.error("Set it via environment variable or .env file:");
|
|
88
|
+
console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db npx @agenticmail/enterprise start");
|
|
89
|
+
console.error("");
|
|
90
|
+
console.error("Or create a .env file (in cwd or ~/.agenticmail/.env):");
|
|
91
|
+
console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db");
|
|
92
|
+
console.error(" JWT_SECRET=your-secret-here");
|
|
93
|
+
console.error(" PORT=3200");
|
|
94
|
+
process.exit(1);
|
|
95
|
+
}
|
|
96
|
+
const { createAdapter } = await import("./factory-672W7A5B.js");
|
|
97
|
+
const { createServer } = await import("./server-XVIBYRNU.js");
|
|
98
|
+
const db = await createAdapter({
|
|
99
|
+
type: DATABASE_URL.startsWith("postgres") ? "postgres" : "sqlite",
|
|
100
|
+
connectionString: DATABASE_URL
|
|
101
|
+
});
|
|
102
|
+
await db.migrate();
|
|
103
|
+
const server = createServer({
|
|
104
|
+
port: PORT,
|
|
105
|
+
db,
|
|
106
|
+
jwtSecret: JWT_SECRET,
|
|
107
|
+
corsOrigins: ["*"]
|
|
108
|
+
});
|
|
109
|
+
await server.start();
|
|
110
|
+
console.log(`AgenticMail Enterprise server running on :${PORT}`);
|
|
111
|
+
}
|
|
112
|
+
export {
|
|
113
|
+
runServe
|
|
114
|
+
};
|
|
@@ -0,0 +1,114 @@
|
|
|
1
|
+
import "./chunk-KFQGP6VL.js";
|
|
2
|
+
|
|
3
|
+
// src/cli-serve.ts
|
|
4
|
+
import { existsSync, readFileSync } from "fs";
|
|
5
|
+
import { join } from "path";
|
|
6
|
+
import { homedir } from "os";
|
|
7
|
+
function loadEnvFile() {
|
|
8
|
+
const candidates = [
|
|
9
|
+
join(process.cwd(), ".env"),
|
|
10
|
+
join(homedir(), ".agenticmail", ".env")
|
|
11
|
+
];
|
|
12
|
+
for (const envPath of candidates) {
|
|
13
|
+
if (!existsSync(envPath)) continue;
|
|
14
|
+
try {
|
|
15
|
+
const content = readFileSync(envPath, "utf8");
|
|
16
|
+
for (const line of content.split("\n")) {
|
|
17
|
+
const trimmed = line.trim();
|
|
18
|
+
if (!trimmed || trimmed.startsWith("#")) continue;
|
|
19
|
+
const eq = trimmed.indexOf("=");
|
|
20
|
+
if (eq < 0) continue;
|
|
21
|
+
const key = trimmed.slice(0, eq).trim();
|
|
22
|
+
let val = trimmed.slice(eq + 1).trim();
|
|
23
|
+
if (val.startsWith('"') && val.endsWith('"') || val.startsWith("'") && val.endsWith("'")) {
|
|
24
|
+
val = val.slice(1, -1);
|
|
25
|
+
}
|
|
26
|
+
if (!process.env[key]) process.env[key] = val;
|
|
27
|
+
}
|
|
28
|
+
console.log(`Loaded config from ${envPath}`);
|
|
29
|
+
return;
|
|
30
|
+
} catch {
|
|
31
|
+
}
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
async function ensureSecrets() {
|
|
35
|
+
const { randomUUID } = await import("crypto");
|
|
36
|
+
const envDir = join(homedir(), ".agenticmail");
|
|
37
|
+
const envPath = join(envDir, ".env");
|
|
38
|
+
let dirty = false;
|
|
39
|
+
if (!process.env.JWT_SECRET) {
|
|
40
|
+
process.env.JWT_SECRET = randomUUID() + randomUUID();
|
|
41
|
+
dirty = true;
|
|
42
|
+
console.log("[startup] Generated new JWT_SECRET (existing sessions will need to re-login)");
|
|
43
|
+
}
|
|
44
|
+
if (!process.env.AGENTICMAIL_VAULT_KEY) {
|
|
45
|
+
process.env.AGENTICMAIL_VAULT_KEY = randomUUID() + randomUUID();
|
|
46
|
+
dirty = true;
|
|
47
|
+
console.log("[startup] Generated new AGENTICMAIL_VAULT_KEY");
|
|
48
|
+
console.log("[startup] \u26A0\uFE0F Previously encrypted credentials will need to be re-entered in the dashboard");
|
|
49
|
+
}
|
|
50
|
+
if (dirty) {
|
|
51
|
+
try {
|
|
52
|
+
if (!existsSync(envDir)) {
|
|
53
|
+
const { mkdirSync } = await import("fs");
|
|
54
|
+
mkdirSync(envDir, { recursive: true });
|
|
55
|
+
}
|
|
56
|
+
const { appendFileSync } = await import("fs");
|
|
57
|
+
const lines = [];
|
|
58
|
+
let existing = "";
|
|
59
|
+
if (existsSync(envPath)) {
|
|
60
|
+
existing = readFileSync(envPath, "utf8");
|
|
61
|
+
}
|
|
62
|
+
if (!existing.includes("JWT_SECRET=")) {
|
|
63
|
+
lines.push(`JWT_SECRET=${process.env.JWT_SECRET}`);
|
|
64
|
+
}
|
|
65
|
+
if (!existing.includes("AGENTICMAIL_VAULT_KEY=")) {
|
|
66
|
+
lines.push(`AGENTICMAIL_VAULT_KEY=${process.env.AGENTICMAIL_VAULT_KEY}`);
|
|
67
|
+
}
|
|
68
|
+
if (lines.length) {
|
|
69
|
+
appendFileSync(envPath, "\n" + lines.join("\n") + "\n", { mode: 384 });
|
|
70
|
+
console.log(`[startup] Saved secrets to ${envPath}`);
|
|
71
|
+
}
|
|
72
|
+
} catch (e) {
|
|
73
|
+
console.warn(`[startup] Could not save secrets to ${envPath}: ${e.message}`);
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
async function runServe(_args) {
|
|
78
|
+
loadEnvFile();
|
|
79
|
+
const DATABASE_URL = process.env.DATABASE_URL;
|
|
80
|
+
const PORT = parseInt(process.env.PORT || "8080", 10);
|
|
81
|
+
await ensureSecrets();
|
|
82
|
+
const JWT_SECRET = process.env.JWT_SECRET;
|
|
83
|
+
const VAULT_KEY = process.env.AGENTICMAIL_VAULT_KEY;
|
|
84
|
+
if (!DATABASE_URL) {
|
|
85
|
+
console.error("ERROR: DATABASE_URL is required.");
|
|
86
|
+
console.error("");
|
|
87
|
+
console.error("Set it via environment variable or .env file:");
|
|
88
|
+
console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db npx @agenticmail/enterprise start");
|
|
89
|
+
console.error("");
|
|
90
|
+
console.error("Or create a .env file (in cwd or ~/.agenticmail/.env):");
|
|
91
|
+
console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db");
|
|
92
|
+
console.error(" JWT_SECRET=your-secret-here");
|
|
93
|
+
console.error(" PORT=3200");
|
|
94
|
+
process.exit(1);
|
|
95
|
+
}
|
|
96
|
+
const { createAdapter } = await import("./factory-672W7A5B.js");
|
|
97
|
+
const { createServer } = await import("./server-AICCPX7S.js");
|
|
98
|
+
const db = await createAdapter({
|
|
99
|
+
type: DATABASE_URL.startsWith("postgres") ? "postgres" : "sqlite",
|
|
100
|
+
connectionString: DATABASE_URL
|
|
101
|
+
});
|
|
102
|
+
await db.migrate();
|
|
103
|
+
const server = createServer({
|
|
104
|
+
port: PORT,
|
|
105
|
+
db,
|
|
106
|
+
jwtSecret: JWT_SECRET,
|
|
107
|
+
corsOrigins: ["*"]
|
|
108
|
+
});
|
|
109
|
+
await server.start();
|
|
110
|
+
console.log(`AgenticMail Enterprise server running on :${PORT}`);
|
|
111
|
+
}
|
|
112
|
+
export {
|
|
113
|
+
runServe
|
|
114
|
+
};
|
package/dist/cli.js
CHANGED
|
@@ -53,14 +53,14 @@ Skill Development:
|
|
|
53
53
|
break;
|
|
54
54
|
case "serve":
|
|
55
55
|
case "start":
|
|
56
|
-
import("./cli-serve-
|
|
56
|
+
import("./cli-serve-TJ4ED5FM.js").then((m) => m.runServe(args.slice(1))).catch(fatal);
|
|
57
57
|
break;
|
|
58
58
|
case "agent":
|
|
59
|
-
import("./cli-agent-
|
|
59
|
+
import("./cli-agent-4C36ET7J.js").then((m) => m.runAgent(args.slice(1))).catch(fatal);
|
|
60
60
|
break;
|
|
61
61
|
case "setup":
|
|
62
62
|
default:
|
|
63
|
-
import("./setup-
|
|
63
|
+
import("./setup-I23IJDTG.js").then((m) => m.runSetupWizard()).catch(fatal);
|
|
64
64
|
break;
|
|
65
65
|
}
|
|
66
66
|
function fatal(err) {
|
|
@@ -473,26 +473,63 @@ function AddConnectionModal(props) {
|
|
|
473
473
|
var [dbType, setDbType] = useState('');
|
|
474
474
|
var [form, setForm] = useState({ name: '', host: '', port: '', database: '', username: '', password: '', connectionString: '', ssl: false, description: '' });
|
|
475
475
|
var [saving, setSaving] = useState(false);
|
|
476
|
+
var [testing, setTesting] = useState(false);
|
|
477
|
+
var [testResult, setTestResult] = useState(null); // { success, error, latencyMs }
|
|
476
478
|
|
|
477
|
-
var set = function(key, val) { setForm(function(f) { var n = Object.assign({}, f); n[key] = val; return n; }); };
|
|
479
|
+
var set = function(key, val) { setForm(function(f) { var n = Object.assign({}, f); n[key] = val; return n; }); setTestResult(null); };
|
|
478
480
|
|
|
479
481
|
var isConnString = form.connectionString.length > 0;
|
|
480
482
|
|
|
483
|
+
var buildBody = function() {
|
|
484
|
+
var body = { type: dbType, name: form.name || (ALL_DB_TYPES.find(function(t) { return t.value === dbType; })?.label + ' Connection'), description: form.description, status: 'inactive' };
|
|
485
|
+
if (isConnString) {
|
|
486
|
+
body.connectionString = form.connectionString;
|
|
487
|
+
} else {
|
|
488
|
+
body.host = form.host;
|
|
489
|
+
body.port = form.port ? parseInt(form.port) : undefined;
|
|
490
|
+
body.database = form.database;
|
|
491
|
+
body.username = form.username;
|
|
492
|
+
body.password = form.password;
|
|
493
|
+
body.ssl = form.ssl;
|
|
494
|
+
}
|
|
495
|
+
return body;
|
|
496
|
+
};
|
|
497
|
+
|
|
498
|
+
var testConnection = async function() {
|
|
499
|
+
setTesting(true);
|
|
500
|
+
setTestResult(null);
|
|
501
|
+
try {
|
|
502
|
+
var result = await engineCall('/database/connections/test', { method: 'POST', body: JSON.stringify(buildBody()) });
|
|
503
|
+
setTestResult(result);
|
|
504
|
+
} catch (e) {
|
|
505
|
+
setTestResult({ success: false, error: e.message || 'Connection test failed' });
|
|
506
|
+
}
|
|
507
|
+
setTesting(false);
|
|
508
|
+
};
|
|
509
|
+
|
|
481
510
|
var save = async function() {
|
|
511
|
+
// Test connection first if not already tested successfully
|
|
512
|
+
if (!testResult || !testResult.success) {
|
|
513
|
+
setTesting(true);
|
|
514
|
+
setTestResult(null);
|
|
515
|
+
try {
|
|
516
|
+
var result = await engineCall('/database/connections/test', { method: 'POST', body: JSON.stringify(buildBody()) });
|
|
517
|
+
setTestResult(result);
|
|
518
|
+
if (!result.success) {
|
|
519
|
+
setTesting(false);
|
|
520
|
+
return; // Don't save if test fails
|
|
521
|
+
}
|
|
522
|
+
} catch (e) {
|
|
523
|
+
setTestResult({ success: false, error: e.message || 'Connection test failed' });
|
|
524
|
+
setTesting(false);
|
|
525
|
+
return;
|
|
526
|
+
}
|
|
527
|
+
setTesting(false);
|
|
528
|
+
}
|
|
529
|
+
|
|
482
530
|
setSaving(true);
|
|
483
531
|
try {
|
|
484
|
-
|
|
485
|
-
if (isConnString) {
|
|
486
|
-
body.connectionString = form.connectionString;
|
|
487
|
-
} else {
|
|
488
|
-
body.host = form.host;
|
|
489
|
-
body.port = form.port ? parseInt(form.port) : undefined;
|
|
490
|
-
body.database = form.database;
|
|
491
|
-
body.username = form.username;
|
|
492
|
-
body.password = form.password;
|
|
493
|
-
body.ssl = form.ssl;
|
|
494
|
-
}
|
|
495
|
-
await engineCall('/database/connections', { method: 'POST', body: JSON.stringify(body) });
|
|
532
|
+
await engineCall('/database/connections', { method: 'POST', body: JSON.stringify(buildBody()) });
|
|
496
533
|
props.onSave();
|
|
497
534
|
props.onClose();
|
|
498
535
|
} catch (e) { alert('Failed: ' + e.message); }
|
|
@@ -572,9 +609,21 @@ function AddConnectionModal(props) {
|
|
|
572
609
|
h('div', { style: s.label }, 'Description (optional)'),
|
|
573
610
|
h('input', { style: s.input, placeholder: 'What is this database used for?', value: form.description, onInput: function(e) { set('description', e.target.value); } }),
|
|
574
611
|
),
|
|
612
|
+
// Connection test result
|
|
613
|
+
testResult && h('div', { style: css('padding: 8px 12px; border-radius: 6px; font-size: 12px; ' + (testResult.success
|
|
614
|
+
? 'background: rgba(21,128,61,0.1); color: var(--success); border: 1px solid rgba(21,128,61,0.3);'
|
|
615
|
+
: 'background: rgba(239,68,68,0.1); color: var(--danger); border: 1px solid rgba(239,68,68,0.3);')) },
|
|
616
|
+
testResult.success
|
|
617
|
+
? 'Connection successful! (' + testResult.latencyMs + 'ms)'
|
|
618
|
+
: 'Connection failed: ' + (testResult.error || 'Unknown error'),
|
|
619
|
+
),
|
|
620
|
+
|
|
575
621
|
h('div', { style: css('display: flex; justify-content: space-between; margin-top: 8px;') },
|
|
576
622
|
h('button', { style: s.btn, onClick: function() { setStep(1); } }, '← Back'),
|
|
577
|
-
h('
|
|
623
|
+
h('div', { style: css('display: flex; gap: 8px;') },
|
|
624
|
+
h('button', { style: s.btn, disabled: testing || saving || (!isConnString && !form.host), onClick: testConnection }, testing ? 'Testing...' : 'Test Connection'),
|
|
625
|
+
h('button', { style: s.btnPrimary, disabled: testing || saving || (!isConnString && !form.host), onClick: save }, saving ? 'Saving...' : testing ? 'Testing...' : 'Add Connection'),
|
|
626
|
+
),
|
|
578
627
|
),
|
|
579
628
|
),
|
|
580
629
|
),
|
package/dist/index.js
CHANGED
|
@@ -1,3 +1,9 @@
|
|
|
1
|
+
import {
|
|
2
|
+
AgenticMailManager,
|
|
3
|
+
GoogleEmailProvider,
|
|
4
|
+
MicrosoftEmailProvider,
|
|
5
|
+
createEmailProvider
|
|
6
|
+
} from "./chunk-HKCKMCPY.js";
|
|
1
7
|
import {
|
|
2
8
|
deployToCloud,
|
|
3
9
|
generateDockerCompose,
|
|
@@ -7,28 +13,7 @@ import {
|
|
|
7
13
|
import {
|
|
8
14
|
provision,
|
|
9
15
|
runSetupWizard
|
|
10
|
-
} from "./chunk-
|
|
11
|
-
import {
|
|
12
|
-
ValidationError,
|
|
13
|
-
auditLogger,
|
|
14
|
-
createAdminRoutes,
|
|
15
|
-
createAuthRoutes,
|
|
16
|
-
createServer,
|
|
17
|
-
errorHandler,
|
|
18
|
-
rateLimiter,
|
|
19
|
-
requestIdMiddleware,
|
|
20
|
-
requestLogger,
|
|
21
|
-
requireRole,
|
|
22
|
-
securityHeaders,
|
|
23
|
-
validate
|
|
24
|
-
} from "./chunk-LJHLPJ7C.js";
|
|
25
|
-
import "./chunk-OF4MUWWS.js";
|
|
26
|
-
import {
|
|
27
|
-
AgenticMailManager,
|
|
28
|
-
GoogleEmailProvider,
|
|
29
|
-
MicrosoftEmailProvider,
|
|
30
|
-
createEmailProvider
|
|
31
|
-
} from "./chunk-HKCKMCPY.js";
|
|
16
|
+
} from "./chunk-LODP4ATE.js";
|
|
32
17
|
import {
|
|
33
18
|
AgentRuntime,
|
|
34
19
|
EmailChannel,
|
|
@@ -43,7 +28,22 @@ import {
|
|
|
43
28
|
executeTool,
|
|
44
29
|
runAgentLoop,
|
|
45
30
|
toolsToDefinitions
|
|
46
|
-
} from "./chunk-
|
|
31
|
+
} from "./chunk-2FOASCL5.js";
|
|
32
|
+
import {
|
|
33
|
+
ValidationError,
|
|
34
|
+
auditLogger,
|
|
35
|
+
createAdminRoutes,
|
|
36
|
+
createAuthRoutes,
|
|
37
|
+
createServer,
|
|
38
|
+
errorHandler,
|
|
39
|
+
rateLimiter,
|
|
40
|
+
requestIdMiddleware,
|
|
41
|
+
requestLogger,
|
|
42
|
+
requireRole,
|
|
43
|
+
securityHeaders,
|
|
44
|
+
validate
|
|
45
|
+
} from "./chunk-KUUIDXRJ.js";
|
|
46
|
+
import "./chunk-OF4MUWWS.js";
|
|
47
47
|
import {
|
|
48
48
|
PROVIDER_REGISTRY,
|
|
49
49
|
listAllProviders,
|