@agenticmail/enterprise 0.5.374 → 0.5.376

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -356,7 +356,7 @@ function createRuntimeHooks(deps) {
356
356
  var injectedMessages = [...messages];
357
357
  if (deps.knowledgeBaseEnabled !== false) {
358
358
  try {
359
- var { knowledgeBase } = await import("./routes-XTMY7IYO.js");
359
+ var { knowledgeBase } = await import("./routes-NIQHEAV2.js");
360
360
  var kbs = await knowledgeBase.listForAgent(agentId);
361
361
  if (kbs.length > 0) {
362
362
  var contextParts = [];
@@ -389,7 +389,7 @@ ${contextParts.join("\n\n")}`;
389
389
  }
390
390
  if (deps.memoryEnabled !== false) {
391
391
  try {
392
- var { memoryManager } = await import("./routes-XTMY7IYO.js");
392
+ var { memoryManager } = await import("./routes-NIQHEAV2.js");
393
393
  var memories = await memoryManager.queryMemories({
394
394
  agentId,
395
395
  limit: 10,
@@ -410,7 +410,7 @@ ${memories.map(function(m) {
410
410
  }
411
411
  if (deps.policyEnabled !== false) {
412
412
  try {
413
- var { policyEngine } = await import("./routes-XTMY7IYO.js");
413
+ var { policyEngine } = await import("./routes-NIQHEAV2.js");
414
414
  var policies = await policyEngine.getAgentPolicies(agentId, deps.orgId);
415
415
  if (policies.length > 0) {
416
416
  var policyText = policies.map(function(p) {
@@ -435,7 +435,7 @@ ${policyText}`;
435
435
  // ─── Budget Check ──────────────────────────────
436
436
  async checkBudget(agentId, _orgId, _estimatedTokens) {
437
437
  try {
438
- var { lifecycle } = await import("./routes-XTMY7IYO.js");
438
+ var { lifecycle } = await import("./routes-NIQHEAV2.js");
439
439
  var now = Date.now();
440
440
  var cacheKey = `budget_sync_${agentId}`;
441
441
  var lastSync = globalThis[cacheKey] || 0;
@@ -528,7 +528,7 @@ ${policyText}`;
528
528
  // ─── Record LLM Usage ──────────────────────────
529
529
  async recordLLMUsage(agentId, orgId, usage) {
530
530
  try {
531
- var { lifecycle } = await import("./routes-XTMY7IYO.js");
531
+ var { lifecycle } = await import("./routes-NIQHEAV2.js");
532
532
  console.log(`[hooks] recordLLMUsage: agent=${agentId}, input=${usage.inputTokens}, output=${usage.outputTokens}`);
533
533
  await lifecycle.recordLLMUsage(agentId, {
534
534
  inputTokens: usage.inputTokens,
@@ -539,7 +539,7 @@ ${policyText}`;
539
539
  console.log(`[hooks] recordLLMUsage error: ${recordErr.message}`);
540
540
  }
541
541
  try {
542
- var { activity } = await import("./routes-XTMY7IYO.js");
542
+ var { activity } = await import("./routes-NIQHEAV2.js");
543
543
  await activity.record({
544
544
  agentId,
545
545
  orgId,
@@ -587,7 +587,7 @@ ${policyText}`;
587
587
  var cacheKey = `${ctx.agentId}:${ctx.toolName}`;
588
588
  var cached = getCachedPermission(cacheKey);
589
589
  if (cached) return cached;
590
- var { permissionEngine } = await import("./routes-XTMY7IYO.js");
590
+ var { permissionEngine } = await import("./routes-NIQHEAV2.js");
591
591
  var permResult = await permissionEngine.checkPermission(ctx.agentId, ctx.toolName);
592
592
  var result = {
593
593
  allowed: permResult.allowed,
@@ -596,7 +596,7 @@ ${policyText}`;
596
596
  };
597
597
  if (result.allowed && deps.guardrailsEnabled !== false) {
598
598
  try {
599
- var { guardrails } = await import("./routes-XTMY7IYO.js");
599
+ var { guardrails } = await import("./routes-NIQHEAV2.js");
600
600
  var status = await guardrails.getStatus(ctx.agentId);
601
601
  if (status.paused || status.offDuty) {
602
602
  result.allowed = false;
@@ -608,7 +608,7 @@ ${policyText}`;
608
608
  }
609
609
  if (result.allowed && deps.dlpEnabled !== false && ctx.parameters) {
610
610
  try {
611
- var { dlp } = await import("./routes-XTMY7IYO.js");
611
+ var { dlp } = await import("./routes-NIQHEAV2.js");
612
612
  var dlpResult = await dlp.scanParameters({
613
613
  orgId: ctx.orgId,
614
614
  agentId: ctx.agentId,
@@ -628,7 +628,7 @@ ${policyText}`;
628
628
  }
629
629
  if (result.requiresApproval && result.allowed) {
630
630
  try {
631
- var { approvals } = await import("./routes-XTMY7IYO.js");
631
+ var { approvals } = await import("./routes-NIQHEAV2.js");
632
632
  var approval = await approvals.createAndWait({
633
633
  agentId: ctx.agentId,
634
634
  orgId: ctx.orgId,
@@ -658,7 +658,7 @@ ${policyText}`;
658
658
  // ─── After Tool Call ────────────────────────────
659
659
  async afterToolCall(ctx, result) {
660
660
  try {
661
- var { activity } = await import("./routes-XTMY7IYO.js");
661
+ var { activity } = await import("./routes-NIQHEAV2.js");
662
662
  await activity.record({
663
663
  agentId: ctx.agentId,
664
664
  orgId: ctx.orgId,
@@ -675,7 +675,7 @@ ${policyText}`;
675
675
  } catch {
676
676
  }
677
677
  try {
678
- var { lifecycle } = await import("./routes-XTMY7IYO.js");
678
+ var { lifecycle } = await import("./routes-NIQHEAV2.js");
679
679
  await lifecycle.recordToolCall(ctx.agentId, {
680
680
  toolId: ctx.toolName,
681
681
  tokensUsed: 0,
@@ -687,7 +687,7 @@ ${policyText}`;
687
687
  }
688
688
  if (result.success && EXTERNAL_TOOLS.has(ctx.toolName)) {
689
689
  try {
690
- var { journal } = await import("./routes-XTMY7IYO.js");
690
+ var { journal } = await import("./routes-NIQHEAV2.js");
691
691
  await journal.record({
692
692
  orgId: ctx.orgId,
693
693
  agentId: ctx.agentId,
@@ -702,7 +702,7 @@ ${policyText}`;
702
702
  }
703
703
  if (result.success && COMMUNICATION_TOOLS.has(ctx.toolName)) {
704
704
  try {
705
- var { commBus } = await import("./routes-XTMY7IYO.js");
705
+ var { commBus } = await import("./routes-NIQHEAV2.js");
706
706
  await commBus.observeMessage({
707
707
  orgId: ctx.orgId,
708
708
  agentId: ctx.agentId,
@@ -716,7 +716,7 @@ ${policyText}`;
716
716
  // ─── Session Lifecycle ──────────────────────────
717
717
  async onSessionStart(sessionId, agentId, orgId) {
718
718
  try {
719
- var { activity } = await import("./routes-XTMY7IYO.js");
719
+ var { activity } = await import("./routes-NIQHEAV2.js");
720
720
  await activity.record({
721
721
  agentId,
722
722
  orgId,
@@ -729,7 +729,7 @@ ${policyText}`;
729
729
  },
730
730
  async onSessionEnd(sessionId, agentId, orgId) {
731
731
  try {
732
- var { activity } = await import("./routes-XTMY7IYO.js");
732
+ var { activity } = await import("./routes-NIQHEAV2.js");
733
733
  await activity.record({
734
734
  agentId,
735
735
  orgId,
@@ -743,7 +743,7 @@ ${policyText}`;
743
743
  // ─── Context Compaction ─────────────────────────
744
744
  async onContextCompaction(sessionId, agentId, summary) {
745
745
  try {
746
- var { memoryManager } = await import("./routes-XTMY7IYO.js");
746
+ var { memoryManager } = await import("./routes-NIQHEAV2.js");
747
747
  await memoryManager.createMemory({
748
748
  agentId,
749
749
  orgId: deps.orgId,
@@ -2518,7 +2518,7 @@ async function runAgentLoop(config, initialMessages, hooks, options) {
2518
2518
  console.log(`[agent-loop] \u2705 Tool ${toolCall.name} succeeded (${content.length} chars): ${content.slice(0, 300)}`);
2519
2519
  }
2520
2520
  try {
2521
- const { activity } = await import("./routes-XTMY7IYO.js");
2521
+ const { activity } = await import("./routes-NIQHEAV2.js");
2522
2522
  activity.recordToolCallCompact({
2523
2523
  agentId: config.agentId,
2524
2524
  orgId: config.orgId,
@@ -2763,7 +2763,8 @@ var TIER_MAP = {
2763
2763
  msg_telegram: 2,
2764
2764
  mcp_bridge: 3,
2765
2765
  filesystem: 2,
2766
- web: 2
2766
+ web: 2,
2767
+ smtp_email: 2
2767
2768
  };
2768
2769
  var TOOL_REGISTRY = {
2769
2770
  // ── Core (8) ──
@@ -3088,9 +3089,9 @@ var CONTEXT_PROMOTIONS = {
3088
3089
  // Messaging channels: load the relevant channel's tools + common tools
3089
3090
  // The agent's OWN channel tools are essential (Tier 1-like for that session)
3090
3091
  // Other channel tools and specialist tools load on demand
3091
- whatsapp: ["msg_whatsapp", ..._COMMON_T2],
3092
- telegram: ["msg_telegram", ..._COMMON_T2],
3093
- email: ["agenticmail", "gws_gmail", ..._COMMON_T2],
3092
+ whatsapp: ["msg_whatsapp", "smtp_email", ..._COMMON_T2],
3093
+ telegram: ["msg_telegram", "smtp_email", ..._COMMON_T2],
3094
+ email: ["agenticmail", "gws_gmail", "smtp_email", ..._COMMON_T2],
3094
3095
  // Task/full: broader set for agent-to-agent work
3095
3096
  task: ["agenticmail", ..._COMMON_T2],
3096
3097
  full: _ALL_SETS
@@ -3099,7 +3100,7 @@ var SIGNAL_RULES = [
3099
3100
  // Email mentions
3100
3101
  {
3101
3102
  patterns: [/\bemail\b/i, /\bgmail\b/i, /\binbox\b/i, /\bsend.*mail\b/i],
3102
- sets: ["gws_gmail"]
3103
+ sets: ["gws_gmail", "smtp_email"]
3103
3104
  },
3104
3105
  // Calendar mentions
3105
3106
  {
@@ -3402,7 +3403,7 @@ function createRequestToolsTool(allTools, activeSets, _context) {
3402
3403
  };
3403
3404
  }
3404
3405
  async function createToolsForContext(options, context, opts) {
3405
- const { createAllTools } = await import("./agent-tools-CUJHKMUN.js");
3406
+ const { createAllTools } = await import("./agent-tools-GJUIPPHV.js");
3406
3407
  if (context === "full") {
3407
3408
  return createAllTools(options);
3408
3409
  }
@@ -11,7 +11,11 @@ import {
11
11
  init_config_bus,
12
12
  init_routes,
13
13
  routes_exports
14
- } from "./chunk-LVKRN4IR.js";
14
+ } from "./chunk-VPWGFA5K.js";
15
+ import {
16
+ SecureVault,
17
+ init_vault
18
+ } from "./chunk-WUAWWKTN.js";
15
19
  import {
16
20
  CircuitBreaker,
17
21
  HealthMonitor,
@@ -35,10 +39,6 @@ import {
35
39
  init_transport_encryption,
36
40
  transportEncryptionMiddleware
37
41
  } from "./chunk-FLQ5FLHW.js";
38
- import {
39
- SecureVault,
40
- init_vault
41
- } from "./chunk-WUAWWKTN.js";
42
42
  import {
43
43
  __require,
44
44
  __toCommonJS
@@ -3267,6 +3267,28 @@ function createAdminRoutes(db) {
3267
3267
  return c.json({ error: e.message }, 500);
3268
3268
  }
3269
3269
  });
3270
+ api.get("/system/update-check", async (c) => {
3271
+ try {
3272
+ const { checkForUpdate, getCachedUpdateCheck } = await import("./cli-update-6ZZTT5UR.js");
3273
+ const cached = getCachedUpdateCheck();
3274
+ if (cached && Date.now() - new Date(cached.checkedAt).getTime() < 5 * 6e4) {
3275
+ return c.json(cached);
3276
+ }
3277
+ const info = await checkForUpdate();
3278
+ return c.json(info);
3279
+ } catch (e) {
3280
+ return c.json({ error: e.message }, 500);
3281
+ }
3282
+ });
3283
+ api.post("/system/update", async (c) => {
3284
+ try {
3285
+ const { performUpdate } = await import("./cli-update-6ZZTT5UR.js");
3286
+ const result = await performUpdate({ restart: true });
3287
+ return c.json(result);
3288
+ } catch (e) {
3289
+ return c.json({ error: e.message }, 500);
3290
+ }
3291
+ });
3270
3292
  return api;
3271
3293
  }
3272
3294
 
@@ -4661,7 +4683,7 @@ function createServer(config) {
4661
4683
  let engineInitialized = false;
4662
4684
  api.all("/engine/*", async (c, _next) => {
4663
4685
  try {
4664
- const { engineRoutes, setEngineDb } = await import("./routes-Q3YMFXX3.js");
4686
+ const { engineRoutes, setEngineDb } = await import("./routes-NIQHEAV2.js");
4665
4687
  const { EngineDatabase } = await import("./db-adapter-2T56ORSD.js");
4666
4688
  if (!engineInitialized) {
4667
4689
  engineInitialized = true;
@@ -4691,13 +4713,13 @@ function createServer(config) {
4691
4713
  engineInitialized = true;
4692
4714
  if (config.runtime?.enabled) {
4693
4715
  try {
4694
- const { createAgentRuntime } = await import("./runtime-WKWJ5BGT.js");
4695
- const { mountRuntimeApp, setRuntime } = await import("./routes-Q3YMFXX3.js");
4716
+ const { createAgentRuntime } = await import("./runtime-SUDXHYMB.js");
4717
+ const { mountRuntimeApp, setRuntime } = await import("./routes-NIQHEAV2.js");
4696
4718
  let getEmailConfig;
4697
4719
  let onTokenRefresh;
4698
4720
  let agentMemoryMgr;
4699
4721
  try {
4700
- const { lifecycle: lc, memoryManager: mm } = await import("./routes-Q3YMFXX3.js");
4722
+ const { lifecycle: lc, memoryManager: mm } = await import("./routes-NIQHEAV2.js");
4701
4723
  agentMemoryMgr = mm;
4702
4724
  if (lc) {
4703
4725
  getEmailConfig = (agentId) => {
@@ -4736,7 +4758,7 @@ function createServer(config) {
4736
4758
  }
4737
4759
  } catch {
4738
4760
  }
4739
- const { vault: vaultRef, permissionEngine: permRef, databaseManager: dbMgr } = await import("./routes-Q3YMFXX3.js");
4761
+ const { vault: vaultRef, permissionEngine: permRef, databaseManager: dbMgr } = await import("./routes-NIQHEAV2.js");
4740
4762
  const runtime = createAgentRuntime({
4741
4763
  engineDb,
4742
4764
  adminDb: config.db,
@@ -4936,7 +4958,7 @@ function createServer(config) {
4936
4958
  });
4937
4959
  (async () => {
4938
4960
  try {
4939
- const { engineRoutes, setEngineDb } = await import("./routes-Q3YMFXX3.js");
4961
+ const { engineRoutes, setEngineDb } = await import("./routes-NIQHEAV2.js");
4940
4962
  const { EngineDatabase } = await import("./db-adapter-2T56ORSD.js");
4941
4963
  if (!engineInitialized) {
4942
4964
  engineInitialized = true;
@@ -4960,13 +4982,13 @@ function createServer(config) {
4960
4982
  await setEngineDb(engineDb, config.db);
4961
4983
  if (config.runtime?.enabled) {
4962
4984
  try {
4963
- const { createAgentRuntime } = await import("./runtime-WKWJ5BGT.js");
4964
- const { mountRuntimeApp, setRuntime } = await import("./routes-Q3YMFXX3.js");
4985
+ const { createAgentRuntime } = await import("./runtime-SUDXHYMB.js");
4986
+ const { mountRuntimeApp, setRuntime } = await import("./routes-NIQHEAV2.js");
4965
4987
  let getEmailConfig;
4966
4988
  let onTokenRefresh;
4967
4989
  let agentMemoryMgr;
4968
4990
  try {
4969
- const { lifecycle: lc, memoryManager: mm } = await import("./routes-Q3YMFXX3.js");
4991
+ const { lifecycle: lc, memoryManager: mm } = await import("./routes-NIQHEAV2.js");
4970
4992
  agentMemoryMgr = mm;
4971
4993
  if (lc) {
4972
4994
  getEmailConfig = (agentId) => {
@@ -5005,7 +5027,7 @@ function createServer(config) {
5005
5027
  }
5006
5028
  } catch {
5007
5029
  }
5008
- const { vault: vaultRef2, permissionEngine: permRef2, databaseManager: dbMgr2 } = await import("./routes-Q3YMFXX3.js");
5030
+ const { vault: vaultRef2, permissionEngine: permRef2, databaseManager: dbMgr2 } = await import("./routes-NIQHEAV2.js");
5009
5031
  const runtime = createAgentRuntime({
5010
5032
  engineDb,
5011
5033
  adminDb: config.db,
@@ -5017,7 +5039,7 @@ function createServer(config) {
5017
5039
  agentMemoryManager: agentMemoryMgr,
5018
5040
  vault: vaultRef2,
5019
5041
  permissionEngine: permRef2,
5020
- hierarchyManager: (await import("./routes-Q3YMFXX3.js")).hierarchyManager ?? void 0,
5042
+ hierarchyManager: (await import("./routes-NIQHEAV2.js")).hierarchyManager ?? void 0,
5021
5043
  databaseManager: dbMgr2
5022
5044
  });
5023
5045
  await runtime.start();
@@ -5031,7 +5053,7 @@ function createServer(config) {
5031
5053
  }
5032
5054
  console.log("[engine] Eagerly initialized");
5033
5055
  try {
5034
- const { lifecycle: lcRef } = await import("./routes-Q3YMFXX3.js");
5056
+ const { lifecycle: lcRef } = await import("./routes-NIQHEAV2.js");
5035
5057
  if (lcRef) {
5036
5058
  const agents = Array.from(lcRef.agents?.values?.() || []);
5037
5059
  const hasLocalPm2 = agents.some((a) => {
@@ -1234,7 +1234,7 @@ async function deploy(config, db, jwtSecret, vaultKey, spinner, chalk) {
1234
1234
  const { deployTarget, company, database, domain, tunnel, cloud } = config;
1235
1235
  if (deployTarget === "cloudflare-tunnel" && tunnel) {
1236
1236
  spinner.start(`Starting local server on port ${tunnel.port}...`);
1237
- const { createServer: createServer2 } = await import("./server-RHXEW7LO.js");
1237
+ const { createServer: createServer2 } = await import("./server-Q52YXWZD.js");
1238
1238
  const server2 = createServer2({ port: tunnel.port, db, jwtSecret });
1239
1239
  const handle2 = await server2.start();
1240
1240
  spinner.succeed("Server running");
@@ -1535,7 +1535,7 @@ async function deploy(config, db, jwtSecret, vaultKey, spinner, chalk) {
1535
1535
  return {};
1536
1536
  }
1537
1537
  spinner.start("Starting local server...");
1538
- const { createServer } = await import("./server-RHXEW7LO.js");
1538
+ const { createServer } = await import("./server-Q52YXWZD.js");
1539
1539
  const server = createServer({ port: 3e3, db, jwtSecret });
1540
1540
  const handle = await server.start();
1541
1541
  spinner.succeed("Server running");
@@ -1,7 +1,18 @@
1
+ import {
2
+ DatabaseConnectionManager,
3
+ init_connection_manager,
4
+ init_query_sanitizer
5
+ } from "./chunk-WYDVMFGJ.js";
1
6
  import {
2
7
  init_agent_tools,
3
8
  init_types
4
9
  } from "./chunk-3UAFHUEC.js";
10
+ import {
11
+ AgentConfigGenerator,
12
+ DeploymentEngine,
13
+ init_agent_config,
14
+ init_deployer
15
+ } from "./chunk-FT5MAYTU.js";
5
16
  import {
6
17
  init_messaging_history,
7
18
  storeMessage
@@ -24,10 +35,9 @@ import {
24
35
  init_agent_status
25
36
  } from "./chunk-C6JP5NR6.js";
26
37
  import {
27
- DatabaseConnectionManager,
28
- init_connection_manager,
29
- init_query_sanitizer
30
- } from "./chunk-WYDVMFGJ.js";
38
+ SecureVault,
39
+ init_vault
40
+ } from "./chunk-WUAWWKTN.js";
31
41
  import {
32
42
  BUILTIN_SKILLS,
33
43
  PRESET_PROFILES,
@@ -35,12 +45,6 @@ import {
35
45
  SKILL_SUITES,
36
46
  init_skills as init_skills2
37
47
  } from "./chunk-TCDRCMJJ.js";
38
- import {
39
- AgentConfigGenerator,
40
- DeploymentEngine,
41
- init_agent_config,
42
- init_deployer
43
- } from "./chunk-FT5MAYTU.js";
44
48
  import {
45
49
  init_resilience,
46
50
  withRetry
@@ -53,10 +57,6 @@ import {
53
57
  setTransportEncryptionConfig,
54
58
  transportEncryptionMiddleware
55
59
  } from "./chunk-FLQ5FLHW.js";
56
- import {
57
- SecureVault,
58
- init_vault
59
- } from "./chunk-WUAWWKTN.js";
60
60
  import {
61
61
  Emoji,
62
62
  FULL_SKILL_DEFINITIONS,
@@ -7103,7 +7103,7 @@ function createAgentRoutes(opts) {
7103
7103
  }
7104
7104
  const managedAgent = await lifecycle2.createAgent(orgId, config, actor);
7105
7105
  try {
7106
- const { knowledgeBase: kbEngine } = await import("./routes-Q3YMFXX3.js");
7106
+ const { knowledgeBase: kbEngine } = await import("./routes-NIQHEAV2.js");
7107
7107
  const allKbs = kbEngine.getAllKnowledgeBases();
7108
7108
  const clientOrgId = managedAgent?.clientOrgId || config?.clientOrgId || null;
7109
7109
  let kbAssigned = 0;