@agenticmail/enterprise 0.5.367 → 0.5.369
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{agent-tools-XBMJR6DQ.js → agent-tools-QHR2LY5V.js} +1 -1
- package/dist/agent-tools-YZF26YMY.js +14007 -0
- package/dist/{chunk-X2YL6KSY.js → chunk-2EI4AYXM.js} +2 -5
- package/dist/{chunk-ULKGUIVP.js → chunk-IO5EPYLA.js} +7 -2
- package/dist/{chunk-Z3OXPQ73.js → chunk-JNNZKFBP.js} +2 -2
- package/dist/chunk-LEACSX6C.js +4945 -0
- package/dist/chunk-LICMHA7V.js +2583 -0
- package/dist/{chunk-OKLI672B.js → chunk-QHBOQ2IG.js} +2 -2
- package/dist/chunk-SXDQEUHA.js +1727 -0
- package/dist/chunk-ZW24HPRG.js +5101 -0
- package/dist/{cli-agent-JYQSLTKP.js → cli-agent-45NEZY7H.js} +1 -1
- package/dist/cli-agent-VEQZKUCM.js +2483 -0
- package/dist/{cli-serve-YTFZUDRS.js → cli-serve-2K7AX2G2.js} +1 -1
- package/dist/cli-serve-5KMU2NHN.js +281 -0
- package/dist/cli.js +3 -3
- package/dist/index.js +3 -3
- package/dist/{meetings-SQNTB6GD.js → meetings-EMKU56G3.js} +1 -1
- package/dist/meetings-TL77WLKW.js +12 -0
- package/dist/{runtime-5AZEZO75.js → runtime-GS2SAORH.js} +1 -1
- package/dist/runtime-HNPFFKQL.js +45 -0
- package/dist/{server-7IR64ZIT.js → server-EGWD64TG.js} +1 -1
- package/dist/server-ET4HLIC7.js +28 -0
- package/dist/{setup-R4AAM5PT.js → setup-DCBFFTLT.js} +1 -1
- package/dist/setup-WO337O3I.js +20 -0
- package/logs/cloudflared-error.log +6 -0
- package/logs/fola-error.log +1 -0
- package/logs/john-error.log +1 -0
- package/package.json +1 -1
|
@@ -94,7 +94,7 @@ async function runServe(_args) {
|
|
|
94
94
|
process.exit(1);
|
|
95
95
|
}
|
|
96
96
|
const { createAdapter, smartDbConfig } = await import("./factory-RTZU2K54.js");
|
|
97
|
-
const { createServer } = await import("./server-
|
|
97
|
+
const { createServer } = await import("./server-ET4HLIC7.js");
|
|
98
98
|
const db = await createAdapter(smartDbConfig(DATABASE_URL));
|
|
99
99
|
await db.migrate();
|
|
100
100
|
const server = createServer({
|
|
@@ -0,0 +1,281 @@
|
|
|
1
|
+
import "./chunk-KFQGP6VL.js";
|
|
2
|
+
|
|
3
|
+
// src/cli-serve.ts
|
|
4
|
+
import { existsSync, readFileSync } from "fs";
|
|
5
|
+
import { join } from "path";
|
|
6
|
+
import { homedir } from "os";
|
|
7
|
+
function loadEnvFile() {
|
|
8
|
+
const candidates = [
|
|
9
|
+
join(process.cwd(), ".env"),
|
|
10
|
+
join(homedir(), ".agenticmail", ".env")
|
|
11
|
+
];
|
|
12
|
+
for (const envPath of candidates) {
|
|
13
|
+
if (!existsSync(envPath)) continue;
|
|
14
|
+
try {
|
|
15
|
+
const content = readFileSync(envPath, "utf8");
|
|
16
|
+
for (const line of content.split("\n")) {
|
|
17
|
+
const trimmed = line.trim();
|
|
18
|
+
if (!trimmed || trimmed.startsWith("#")) continue;
|
|
19
|
+
const eq = trimmed.indexOf("=");
|
|
20
|
+
if (eq < 0) continue;
|
|
21
|
+
const key = trimmed.slice(0, eq).trim();
|
|
22
|
+
let val = trimmed.slice(eq + 1).trim();
|
|
23
|
+
if (val.startsWith('"') && val.endsWith('"') || val.startsWith("'") && val.endsWith("'")) {
|
|
24
|
+
val = val.slice(1, -1);
|
|
25
|
+
}
|
|
26
|
+
if (!process.env[key]) process.env[key] = val;
|
|
27
|
+
}
|
|
28
|
+
console.log(`Loaded config from ${envPath}`);
|
|
29
|
+
return;
|
|
30
|
+
} catch {
|
|
31
|
+
}
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
async function ensureSecrets() {
|
|
35
|
+
const { randomUUID } = await import("crypto");
|
|
36
|
+
const envDir = join(homedir(), ".agenticmail");
|
|
37
|
+
const envPath = join(envDir, ".env");
|
|
38
|
+
let dirty = false;
|
|
39
|
+
if (!process.env.JWT_SECRET) {
|
|
40
|
+
process.env.JWT_SECRET = randomUUID() + randomUUID();
|
|
41
|
+
dirty = true;
|
|
42
|
+
console.log("[startup] Generated new JWT_SECRET (existing sessions will need to re-login)");
|
|
43
|
+
}
|
|
44
|
+
if (!process.env.AGENTICMAIL_VAULT_KEY) {
|
|
45
|
+
process.env.AGENTICMAIL_VAULT_KEY = randomUUID() + randomUUID();
|
|
46
|
+
dirty = true;
|
|
47
|
+
console.log("[startup] Generated new AGENTICMAIL_VAULT_KEY");
|
|
48
|
+
console.log("[startup] \u26A0\uFE0F Previously encrypted credentials will need to be re-entered in the dashboard");
|
|
49
|
+
}
|
|
50
|
+
if (dirty) {
|
|
51
|
+
try {
|
|
52
|
+
if (!existsSync(envDir)) {
|
|
53
|
+
const { mkdirSync } = await import("fs");
|
|
54
|
+
mkdirSync(envDir, { recursive: true });
|
|
55
|
+
}
|
|
56
|
+
const { appendFileSync } = await import("fs");
|
|
57
|
+
const lines = [];
|
|
58
|
+
let existing = "";
|
|
59
|
+
if (existsSync(envPath)) {
|
|
60
|
+
existing = readFileSync(envPath, "utf8");
|
|
61
|
+
}
|
|
62
|
+
if (!existing.includes("JWT_SECRET=")) {
|
|
63
|
+
lines.push(`JWT_SECRET=${process.env.JWT_SECRET}`);
|
|
64
|
+
}
|
|
65
|
+
if (!existing.includes("AGENTICMAIL_VAULT_KEY=")) {
|
|
66
|
+
lines.push(`AGENTICMAIL_VAULT_KEY=${process.env.AGENTICMAIL_VAULT_KEY}`);
|
|
67
|
+
}
|
|
68
|
+
if (lines.length) {
|
|
69
|
+
appendFileSync(envPath, "\n" + lines.join("\n") + "\n", { mode: 384 });
|
|
70
|
+
console.log(`[startup] Saved secrets to ${envPath}`);
|
|
71
|
+
}
|
|
72
|
+
} catch (e) {
|
|
73
|
+
console.warn(`[startup] Could not save secrets to ${envPath}: ${e.message}`);
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
async function runServe(_args) {
|
|
78
|
+
loadEnvFile();
|
|
79
|
+
const DATABASE_URL = process.env.DATABASE_URL;
|
|
80
|
+
const PORT = parseInt(process.env.PORT || "8080", 10);
|
|
81
|
+
await ensureSecrets();
|
|
82
|
+
const JWT_SECRET = process.env.JWT_SECRET;
|
|
83
|
+
const _VAULT_KEY = process.env.AGENTICMAIL_VAULT_KEY;
|
|
84
|
+
if (!DATABASE_URL) {
|
|
85
|
+
console.error("ERROR: DATABASE_URL is required.");
|
|
86
|
+
console.error("");
|
|
87
|
+
console.error("Set it via environment variable or .env file:");
|
|
88
|
+
console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db npx @agenticmail/enterprise start");
|
|
89
|
+
console.error("");
|
|
90
|
+
console.error("Or create a .env file (in cwd or ~/.agenticmail/.env):");
|
|
91
|
+
console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db");
|
|
92
|
+
console.error(" JWT_SECRET=your-secret-here");
|
|
93
|
+
console.error(" PORT=3200");
|
|
94
|
+
process.exit(1);
|
|
95
|
+
}
|
|
96
|
+
const { createAdapter, smartDbConfig } = await import("./factory-RTZU2K54.js");
|
|
97
|
+
const { createServer } = await import("./server-EGWD64TG.js");
|
|
98
|
+
const db = await createAdapter(smartDbConfig(DATABASE_URL));
|
|
99
|
+
await db.migrate();
|
|
100
|
+
const server = createServer({
|
|
101
|
+
port: PORT,
|
|
102
|
+
db,
|
|
103
|
+
jwtSecret: JWT_SECRET,
|
|
104
|
+
corsOrigins: ["*"]
|
|
105
|
+
});
|
|
106
|
+
await server.start();
|
|
107
|
+
console.log(`AgenticMail Enterprise server running on :${PORT}`);
|
|
108
|
+
try {
|
|
109
|
+
const { startPreventSleep } = await import("./screen-unlock-4RPZBHOI.js");
|
|
110
|
+
const adminDb = server.getAdminDb?.() || server.adminDb;
|
|
111
|
+
if (adminDb) {
|
|
112
|
+
const settings = await adminDb.getSettings?.().catch(() => null);
|
|
113
|
+
const screenAccess = settings?.securityConfig?.screenAccess;
|
|
114
|
+
if (screenAccess?.enabled && screenAccess?.preventSleep) {
|
|
115
|
+
startPreventSleep();
|
|
116
|
+
console.log("[startup] Prevent-sleep enabled \u2014 system will stay awake while agents are active");
|
|
117
|
+
}
|
|
118
|
+
}
|
|
119
|
+
} catch {
|
|
120
|
+
}
|
|
121
|
+
try {
|
|
122
|
+
await setupSystemPersistence();
|
|
123
|
+
} catch (e) {
|
|
124
|
+
console.warn("[startup] System persistence setup skipped: " + e.message);
|
|
125
|
+
}
|
|
126
|
+
const tunnelToken = process.env.CLOUDFLARED_TOKEN;
|
|
127
|
+
if (tunnelToken) {
|
|
128
|
+
try {
|
|
129
|
+
const { execSync, spawn } = await import("child_process");
|
|
130
|
+
try {
|
|
131
|
+
execSync(process.platform === "win32" ? "where cloudflared" : "which cloudflared", { timeout: 3e3 });
|
|
132
|
+
} catch {
|
|
133
|
+
console.log("[startup] cloudflared not found \u2014 skipping tunnel auto-start");
|
|
134
|
+
console.log("[startup] Install cloudflared to enable tunnel: https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/downloads/");
|
|
135
|
+
return;
|
|
136
|
+
}
|
|
137
|
+
try {
|
|
138
|
+
if (process.platform === "win32") {
|
|
139
|
+
const tasklist = execSync('tasklist /FI "IMAGENAME eq cloudflared.exe" /NH', { encoding: "utf8", timeout: 5e3 });
|
|
140
|
+
if (tasklist.includes("cloudflared.exe")) {
|
|
141
|
+
console.log("[startup] cloudflared tunnel already running");
|
|
142
|
+
return;
|
|
143
|
+
}
|
|
144
|
+
} else {
|
|
145
|
+
execSync('pgrep -f "cloudflared.*tunnel.*run"', { timeout: 3e3 });
|
|
146
|
+
console.log("[startup] cloudflared tunnel already running");
|
|
147
|
+
return;
|
|
148
|
+
}
|
|
149
|
+
} catch {
|
|
150
|
+
}
|
|
151
|
+
const subdomain = process.env.AGENTICMAIL_SUBDOMAIN || process.env.AGENTICMAIL_DOMAIN || "";
|
|
152
|
+
console.log(`[startup] Starting cloudflared tunnel${subdomain ? ` for ${subdomain}.agenticmail.io` : ""}...`);
|
|
153
|
+
let cfBin = "cloudflared";
|
|
154
|
+
if (process.platform === "win32") {
|
|
155
|
+
try {
|
|
156
|
+
cfBin = execSync("where cloudflared", { encoding: "utf8", timeout: 3e3 }).trim().split("\n")[0].trim();
|
|
157
|
+
} catch {
|
|
158
|
+
const candidate = `${process.env.LOCALAPPDATA || ""}\\cloudflared\\cloudflared.exe`;
|
|
159
|
+
try {
|
|
160
|
+
(await import("fs")).statSync(candidate);
|
|
161
|
+
cfBin = candidate;
|
|
162
|
+
} catch {
|
|
163
|
+
}
|
|
164
|
+
}
|
|
165
|
+
}
|
|
166
|
+
const child = spawn(cfBin, ["tunnel", "--no-autoupdate", "run", "--token", tunnelToken], {
|
|
167
|
+
detached: true,
|
|
168
|
+
stdio: "ignore"
|
|
169
|
+
});
|
|
170
|
+
child.unref();
|
|
171
|
+
console.log("[startup] cloudflared tunnel started (pid " + child.pid + ")");
|
|
172
|
+
} catch (e) {
|
|
173
|
+
console.warn("[startup] Could not auto-start cloudflared: " + e.message);
|
|
174
|
+
}
|
|
175
|
+
}
|
|
176
|
+
}
|
|
177
|
+
async function setupSystemPersistence() {
|
|
178
|
+
const { execSync, spawnSync } = await import("child_process");
|
|
179
|
+
const { existsSync: exists, writeFileSync, mkdirSync } = await import("fs");
|
|
180
|
+
const { join: pathJoin } = await import("path");
|
|
181
|
+
const platform = process.platform;
|
|
182
|
+
if (!process.env.PM2_HOME && !process.env.pm_id) {
|
|
183
|
+
return;
|
|
184
|
+
}
|
|
185
|
+
const markerDir = pathJoin(homedir(), ".agenticmail");
|
|
186
|
+
const markerFile = pathJoin(markerDir, ".persistence-configured");
|
|
187
|
+
if (exists(markerFile)) {
|
|
188
|
+
try {
|
|
189
|
+
execSync("pm2 save --silent", { timeout: 1e4, stdio: "ignore" });
|
|
190
|
+
} catch {
|
|
191
|
+
}
|
|
192
|
+
return;
|
|
193
|
+
}
|
|
194
|
+
console.log("[startup] Configuring system persistence (one-time setup)...");
|
|
195
|
+
try {
|
|
196
|
+
if (platform === "darwin") {
|
|
197
|
+
const result = spawnSync("pm2", ["startup", "launchd", "--silent"], {
|
|
198
|
+
timeout: 15e3,
|
|
199
|
+
stdio: "pipe",
|
|
200
|
+
encoding: "utf-8"
|
|
201
|
+
});
|
|
202
|
+
const output = (result.stdout || "") + (result.stderr || "");
|
|
203
|
+
const sudoMatch = output.match(/sudo\s+env\s+.*pm2\s+startup.*/);
|
|
204
|
+
if (sudoMatch) {
|
|
205
|
+
console.log("[startup] PM2 startup requires sudo. Run this once:");
|
|
206
|
+
console.log(" " + sudoMatch[0]);
|
|
207
|
+
} else {
|
|
208
|
+
console.log("[startup] PM2 startup configured (launchd)");
|
|
209
|
+
}
|
|
210
|
+
const plistPath = pathJoin(homedir(), "Library", "LaunchAgents", `pm2.${process.env.USER || "user"}.plist`);
|
|
211
|
+
if (exists(plistPath)) {
|
|
212
|
+
try {
|
|
213
|
+
execSync(`launchctl load -w "${plistPath}"`, { timeout: 5e3, stdio: "ignore" });
|
|
214
|
+
} catch {
|
|
215
|
+
}
|
|
216
|
+
}
|
|
217
|
+
} else if (platform === "linux") {
|
|
218
|
+
const result = spawnSync("pm2", ["startup", "systemd", "--silent"], {
|
|
219
|
+
timeout: 15e3,
|
|
220
|
+
stdio: "pipe",
|
|
221
|
+
encoding: "utf-8"
|
|
222
|
+
});
|
|
223
|
+
const output = (result.stdout || "") + (result.stderr || "");
|
|
224
|
+
const sudoMatch = output.match(/sudo\s+env\s+.*pm2\s+startup.*/);
|
|
225
|
+
if (sudoMatch) {
|
|
226
|
+
try {
|
|
227
|
+
execSync(sudoMatch[0], { timeout: 15e3, stdio: "ignore" });
|
|
228
|
+
console.log("[startup] PM2 startup configured (systemd)");
|
|
229
|
+
} catch {
|
|
230
|
+
console.log("[startup] PM2 startup requires root. Run this once:");
|
|
231
|
+
console.log(" " + sudoMatch[0]);
|
|
232
|
+
}
|
|
233
|
+
} else {
|
|
234
|
+
console.log("[startup] PM2 startup configured (systemd)");
|
|
235
|
+
}
|
|
236
|
+
} else if (platform === "win32") {
|
|
237
|
+
try {
|
|
238
|
+
execSync("npm list -g pm2-windows-startup", { timeout: 1e4, stdio: "ignore" });
|
|
239
|
+
} catch {
|
|
240
|
+
console.log("[startup] Installing pm2-windows-startup...");
|
|
241
|
+
try {
|
|
242
|
+
execSync("npm install -g pm2-windows-startup", { timeout: 6e4, stdio: "ignore" });
|
|
243
|
+
execSync("pm2-startup install", { timeout: 15e3, stdio: "ignore" });
|
|
244
|
+
console.log("[startup] PM2 startup configured (Windows Service)");
|
|
245
|
+
} catch (e) {
|
|
246
|
+
console.warn("[startup] Could not install pm2-windows-startup: " + e.message);
|
|
247
|
+
}
|
|
248
|
+
}
|
|
249
|
+
}
|
|
250
|
+
} catch (e) {
|
|
251
|
+
console.warn("[startup] PM2 startup setup: " + e.message);
|
|
252
|
+
}
|
|
253
|
+
try {
|
|
254
|
+
const moduleList = execSync("pm2 ls --silent 2>/dev/null || true", { timeout: 1e4, encoding: "utf-8" });
|
|
255
|
+
if (!moduleList.includes("pm2-logrotate")) {
|
|
256
|
+
console.log("[startup] Installing pm2-logrotate...");
|
|
257
|
+
execSync("pm2 install pm2-logrotate --silent", { timeout: 6e4, stdio: "ignore" });
|
|
258
|
+
execSync("pm2 set pm2-logrotate:max_size 10M --silent", { timeout: 5e3, stdio: "ignore" });
|
|
259
|
+
execSync("pm2 set pm2-logrotate:retain 5 --silent", { timeout: 5e3, stdio: "ignore" });
|
|
260
|
+
execSync("pm2 set pm2-logrotate:compress true --silent", { timeout: 5e3, stdio: "ignore" });
|
|
261
|
+
console.log("[startup] Log rotation configured (10MB, 5 files)");
|
|
262
|
+
}
|
|
263
|
+
} catch {
|
|
264
|
+
}
|
|
265
|
+
try {
|
|
266
|
+
execSync("pm2 save --silent", { timeout: 1e4, stdio: "ignore" });
|
|
267
|
+
console.log("[startup] Process list saved");
|
|
268
|
+
} catch {
|
|
269
|
+
}
|
|
270
|
+
try {
|
|
271
|
+
if (!exists(markerDir)) mkdirSync(markerDir, { recursive: true });
|
|
272
|
+
writeFileSync(markerFile, (/* @__PURE__ */ new Date()).toISOString() + `
|
|
273
|
+
platform=${platform}
|
|
274
|
+
`, { mode: 384 });
|
|
275
|
+
console.log("[startup] System persistence configured successfully");
|
|
276
|
+
} catch {
|
|
277
|
+
}
|
|
278
|
+
}
|
|
279
|
+
export {
|
|
280
|
+
runServe
|
|
281
|
+
};
|
package/dist/cli.js
CHANGED
|
@@ -57,14 +57,14 @@ Skill Development:
|
|
|
57
57
|
break;
|
|
58
58
|
case "serve":
|
|
59
59
|
case "start":
|
|
60
|
-
import("./cli-serve-
|
|
60
|
+
import("./cli-serve-5KMU2NHN.js").then((m) => m.runServe(args.slice(1))).catch(fatal);
|
|
61
61
|
break;
|
|
62
62
|
case "agent":
|
|
63
|
-
import("./cli-agent-
|
|
63
|
+
import("./cli-agent-45NEZY7H.js").then((m) => m.runAgent(args.slice(1))).catch(fatal);
|
|
64
64
|
break;
|
|
65
65
|
case "setup":
|
|
66
66
|
default:
|
|
67
|
-
import("./setup-
|
|
67
|
+
import("./setup-WO337O3I.js").then((m) => m.runSetupWizard()).catch(fatal);
|
|
68
68
|
break;
|
|
69
69
|
}
|
|
70
70
|
function fatal(err) {
|
package/dist/index.js
CHANGED
|
@@ -13,7 +13,7 @@ import {
|
|
|
13
13
|
import {
|
|
14
14
|
provision,
|
|
15
15
|
runSetupWizard
|
|
16
|
-
} from "./chunk-
|
|
16
|
+
} from "./chunk-QHBOQ2IG.js";
|
|
17
17
|
import {
|
|
18
18
|
AgentRuntime,
|
|
19
19
|
EmailChannel,
|
|
@@ -28,7 +28,7 @@ import {
|
|
|
28
28
|
executeTool,
|
|
29
29
|
runAgentLoop,
|
|
30
30
|
toolsToDefinitions
|
|
31
|
-
} from "./chunk-
|
|
31
|
+
} from "./chunk-LEACSX6C.js";
|
|
32
32
|
import {
|
|
33
33
|
ValidationError,
|
|
34
34
|
auditLogger,
|
|
@@ -42,7 +42,7 @@ import {
|
|
|
42
42
|
requireRole,
|
|
43
43
|
securityHeaders,
|
|
44
44
|
validate
|
|
45
|
-
} from "./chunk-
|
|
45
|
+
} from "./chunk-JNNZKFBP.js";
|
|
46
46
|
import "./chunk-DJBCRQTD.js";
|
|
47
47
|
import {
|
|
48
48
|
PROVIDER_REGISTRY,
|
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
import {
|
|
2
|
+
AgentRuntime,
|
|
3
|
+
EmailChannel,
|
|
4
|
+
FollowUpScheduler,
|
|
5
|
+
SessionManager,
|
|
6
|
+
SubAgentManager,
|
|
7
|
+
ToolRegistry,
|
|
8
|
+
callLLM,
|
|
9
|
+
createAgentRuntime,
|
|
10
|
+
createNoopHooks,
|
|
11
|
+
createRuntimeHooks,
|
|
12
|
+
estimateMessageTokens,
|
|
13
|
+
estimateTokens,
|
|
14
|
+
executeTool,
|
|
15
|
+
runAgentLoop,
|
|
16
|
+
toolsToDefinitions
|
|
17
|
+
} from "./chunk-LEACSX6C.js";
|
|
18
|
+
import {
|
|
19
|
+
PROVIDER_REGISTRY,
|
|
20
|
+
listAllProviders,
|
|
21
|
+
resolveApiKeyForProvider,
|
|
22
|
+
resolveProvider
|
|
23
|
+
} from "./chunk-UF3ZJMJO.js";
|
|
24
|
+
import "./chunk-KFQGP6VL.js";
|
|
25
|
+
export {
|
|
26
|
+
AgentRuntime,
|
|
27
|
+
EmailChannel,
|
|
28
|
+
FollowUpScheduler,
|
|
29
|
+
PROVIDER_REGISTRY,
|
|
30
|
+
SessionManager,
|
|
31
|
+
SubAgentManager,
|
|
32
|
+
ToolRegistry,
|
|
33
|
+
callLLM,
|
|
34
|
+
createAgentRuntime,
|
|
35
|
+
createNoopHooks,
|
|
36
|
+
createRuntimeHooks,
|
|
37
|
+
estimateMessageTokens,
|
|
38
|
+
estimateTokens,
|
|
39
|
+
executeTool,
|
|
40
|
+
listAllProviders,
|
|
41
|
+
resolveApiKeyForProvider,
|
|
42
|
+
resolveProvider,
|
|
43
|
+
runAgentLoop,
|
|
44
|
+
toolsToDefinitions
|
|
45
|
+
};
|
|
@@ -0,0 +1,28 @@
|
|
|
1
|
+
import {
|
|
2
|
+
createServer
|
|
3
|
+
} from "./chunk-ZW24HPRG.js";
|
|
4
|
+
import "./chunk-DJBCRQTD.js";
|
|
5
|
+
import "./chunk-UF3ZJMJO.js";
|
|
6
|
+
import "./chunk-YB5BWHQU.js";
|
|
7
|
+
import "./chunk-3UAFHUEC.js";
|
|
8
|
+
import "./chunk-Z7NVD3OQ.js";
|
|
9
|
+
import "./chunk-VSBC4SWO.js";
|
|
10
|
+
import "./chunk-AF3WSNVX.js";
|
|
11
|
+
import "./chunk-74ZCQKYU.js";
|
|
12
|
+
import "./chunk-Z6K5FKAB.js";
|
|
13
|
+
import "./chunk-C6JP5NR6.js";
|
|
14
|
+
import "./chunk-WYDVMFGJ.js";
|
|
15
|
+
import "./chunk-HIQY73V2.js";
|
|
16
|
+
import "./chunk-FT5MAYTU.js";
|
|
17
|
+
import "./chunk-YDD5TC5Q.js";
|
|
18
|
+
import "./chunk-37ABTUFU.js";
|
|
19
|
+
import "./chunk-NU657BBQ.js";
|
|
20
|
+
import "./chunk-PGAU3W3M.js";
|
|
21
|
+
import "./chunk-FLQ5FLHW.js";
|
|
22
|
+
import "./chunk-WUAWWKTN.js";
|
|
23
|
+
import "./chunk-5WDYN4UV.js";
|
|
24
|
+
import "./chunk-22U7TZPN.js";
|
|
25
|
+
import "./chunk-KFQGP6VL.js";
|
|
26
|
+
export {
|
|
27
|
+
createServer
|
|
28
|
+
};
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
import {
|
|
2
|
+
promptCompanyInfo,
|
|
3
|
+
promptDatabase,
|
|
4
|
+
promptDeployment,
|
|
5
|
+
promptDomain,
|
|
6
|
+
promptRegistration,
|
|
7
|
+
provision,
|
|
8
|
+
runSetupWizard
|
|
9
|
+
} from "./chunk-QHBOQ2IG.js";
|
|
10
|
+
import "./chunk-Z3I6GNTS.js";
|
|
11
|
+
import "./chunk-KFQGP6VL.js";
|
|
12
|
+
export {
|
|
13
|
+
promptCompanyInfo,
|
|
14
|
+
promptDatabase,
|
|
15
|
+
promptDeployment,
|
|
16
|
+
promptDomain,
|
|
17
|
+
promptRegistration,
|
|
18
|
+
provision,
|
|
19
|
+
runSetupWizard
|
|
20
|
+
};
|
|
@@ -159,3 +159,9 @@
|
|
|
159
159
|
2026-03-05 20:36:07: 2026-03-05T19:36:07Z ERR Request failed error="stream 993 canceled by remote with error code 0" connIndex=0 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.192.107 type=http
|
|
160
160
|
2026-03-05 20:36:34: 2026-03-05T19:36:34Z ERR error="stream 1381 canceled by remote with error code 0" connIndex=0 event=1 ingressRule=0 originService=http://localhost:3100
|
|
161
161
|
2026-03-05 20:36:34: 2026-03-05T19:36:34Z ERR Request failed error="stream 1381 canceled by remote with error code 0" connIndex=0 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.192.107 type=http
|
|
162
|
+
2026-03-05 21:13:03: 2026-03-05T20:13:03Z ERR error="stream 1349 canceled by remote with error code 0" connIndex=0 event=1 ingressRule=0 originService=http://localhost:3100
|
|
163
|
+
2026-03-05 21:13:03: 2026-03-05T20:13:03Z ERR Request failed error="stream 1349 canceled by remote with error code 0" connIndex=0 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.192.107 type=http
|
|
164
|
+
2026-03-05 21:13:04: 2026-03-05T20:13:04Z ERR error="stream 1425 canceled by remote with error code 0" connIndex=0 event=1 ingressRule=0 originService=http://localhost:3100
|
|
165
|
+
2026-03-05 21:13:04: 2026-03-05T20:13:04Z ERR Request failed error="stream 1425 canceled by remote with error code 0" connIndex=0 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.192.107 type=http
|
|
166
|
+
2026-03-05 21:13:33: 2026-03-05T20:13:33Z ERR error="stream 1805 canceled by remote with error code 0" connIndex=0 event=1 ingressRule=0 originService=http://localhost:3100
|
|
167
|
+
2026-03-05 21:13:33: 2026-03-05T20:13:33Z ERR Request failed error="stream 1805 canceled by remote with error code 0" connIndex=0 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.192.107 type=http
|
package/logs/fola-error.log
CHANGED
package/logs/john-error.log
CHANGED
|
@@ -7,3 +7,4 @@
|
|
|
7
7
|
2026-03-05 06:30:59: ERROR: DATABASE_URL is required
|
|
8
8
|
2026-03-05 06:31:11: Fatal error: current transaction is aborted, commands ignored until end of transaction block
|
|
9
9
|
2026-03-05 21:05:33: [TaskPoller] spawnForTask error: No API key configured for provider: undefined
|
|
10
|
+
2026-03-05 21:23:33: [TaskPoller] spawnForTask error: No API key configured for provider: undefined
|