@agenticmail/enterprise 0.5.397 → 0.5.398

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -466,7 +466,7 @@ var AgentHeartbeatManager = class {
466
466
  return;
467
467
  }
468
468
  try {
469
- const { guardrails } = await import("./routes-KL7BIX5B.js");
469
+ const { guardrails } = await import("./routes-XP7T63ZZ.js");
470
470
  const status = await guardrails.getStatus(ctx.agentId);
471
471
  if (status.paused || status.offDuty) {
472
472
  console.log(`[heartbeat] Skipping action dispatch \u2014 agent is ${status.offDuty ? "off duty" : "paused"}`);
@@ -11,7 +11,7 @@ import {
11
11
  init_config_bus,
12
12
  init_routes,
13
13
  routes_exports
14
- } from "./chunk-SL2GRD72.js";
14
+ } from "./chunk-T65CWPW2.js";
15
15
  import {
16
16
  SecureVault,
17
17
  init_vault
@@ -4683,7 +4683,7 @@ function createServer(config) {
4683
4683
  let engineInitialized = false;
4684
4684
  api.all("/engine/*", async (c, _next) => {
4685
4685
  try {
4686
- const { engineRoutes, setEngineDb } = await import("./routes-KL7BIX5B.js");
4686
+ const { engineRoutes, setEngineDb } = await import("./routes-XP7T63ZZ.js");
4687
4687
  const { EngineDatabase } = await import("./db-adapter-2T56ORSD.js");
4688
4688
  if (!engineInitialized) {
4689
4689
  engineInitialized = true;
@@ -4713,13 +4713,13 @@ function createServer(config) {
4713
4713
  engineInitialized = true;
4714
4714
  if (config.runtime?.enabled) {
4715
4715
  try {
4716
- const { createAgentRuntime } = await import("./runtime-WPUNDUHR.js");
4717
- const { mountRuntimeApp, setRuntime } = await import("./routes-KL7BIX5B.js");
4716
+ const { createAgentRuntime } = await import("./runtime-PSSS6LHP.js");
4717
+ const { mountRuntimeApp, setRuntime } = await import("./routes-XP7T63ZZ.js");
4718
4718
  let getEmailConfig;
4719
4719
  let onTokenRefresh;
4720
4720
  let agentMemoryMgr;
4721
4721
  try {
4722
- const { lifecycle: lc, memoryManager: mm } = await import("./routes-KL7BIX5B.js");
4722
+ const { lifecycle: lc, memoryManager: mm } = await import("./routes-XP7T63ZZ.js");
4723
4723
  agentMemoryMgr = mm;
4724
4724
  if (lc) {
4725
4725
  getEmailConfig = (agentId) => {
@@ -4758,7 +4758,7 @@ function createServer(config) {
4758
4758
  }
4759
4759
  } catch {
4760
4760
  }
4761
- const { vault: vaultRef, permissionEngine: permRef, databaseManager: dbMgr } = await import("./routes-KL7BIX5B.js");
4761
+ const { vault: vaultRef, permissionEngine: permRef, databaseManager: dbMgr } = await import("./routes-XP7T63ZZ.js");
4762
4762
  const runtime = createAgentRuntime({
4763
4763
  engineDb,
4764
4764
  adminDb: config.db,
@@ -5009,7 +5009,7 @@ function createServer(config) {
5009
5009
  });
5010
5010
  (async () => {
5011
5011
  try {
5012
- const { engineRoutes, setEngineDb } = await import("./routes-KL7BIX5B.js");
5012
+ const { engineRoutes, setEngineDb } = await import("./routes-XP7T63ZZ.js");
5013
5013
  const { EngineDatabase } = await import("./db-adapter-2T56ORSD.js");
5014
5014
  if (!engineInitialized) {
5015
5015
  engineInitialized = true;
@@ -5033,13 +5033,13 @@ function createServer(config) {
5033
5033
  await setEngineDb(engineDb, config.db);
5034
5034
  if (config.runtime?.enabled) {
5035
5035
  try {
5036
- const { createAgentRuntime } = await import("./runtime-WPUNDUHR.js");
5037
- const { mountRuntimeApp, setRuntime } = await import("./routes-KL7BIX5B.js");
5036
+ const { createAgentRuntime } = await import("./runtime-PSSS6LHP.js");
5037
+ const { mountRuntimeApp, setRuntime } = await import("./routes-XP7T63ZZ.js");
5038
5038
  let getEmailConfig;
5039
5039
  let onTokenRefresh;
5040
5040
  let agentMemoryMgr;
5041
5041
  try {
5042
- const { lifecycle: lc, memoryManager: mm } = await import("./routes-KL7BIX5B.js");
5042
+ const { lifecycle: lc, memoryManager: mm } = await import("./routes-XP7T63ZZ.js");
5043
5043
  agentMemoryMgr = mm;
5044
5044
  if (lc) {
5045
5045
  getEmailConfig = (agentId) => {
@@ -5078,7 +5078,7 @@ function createServer(config) {
5078
5078
  }
5079
5079
  } catch {
5080
5080
  }
5081
- const { vault: vaultRef2, permissionEngine: permRef2, databaseManager: dbMgr2 } = await import("./routes-KL7BIX5B.js");
5081
+ const { vault: vaultRef2, permissionEngine: permRef2, databaseManager: dbMgr2 } = await import("./routes-XP7T63ZZ.js");
5082
5082
  const runtime = createAgentRuntime({
5083
5083
  engineDb,
5084
5084
  adminDb: config.db,
@@ -5090,7 +5090,7 @@ function createServer(config) {
5090
5090
  agentMemoryManager: agentMemoryMgr,
5091
5091
  vault: vaultRef2,
5092
5092
  permissionEngine: permRef2,
5093
- hierarchyManager: (await import("./routes-KL7BIX5B.js")).hierarchyManager ?? void 0,
5093
+ hierarchyManager: (await import("./routes-XP7T63ZZ.js")).hierarchyManager ?? void 0,
5094
5094
  databaseManager: dbMgr2
5095
5095
  });
5096
5096
  await runtime.start();
@@ -5104,7 +5104,7 @@ function createServer(config) {
5104
5104
  }
5105
5105
  console.log("[engine] Eagerly initialized");
5106
5106
  try {
5107
- const { lifecycle: lcRef } = await import("./routes-KL7BIX5B.js");
5107
+ const { lifecycle: lcRef } = await import("./routes-XP7T63ZZ.js");
5108
5108
  if (lcRef) {
5109
5109
  const agents = Array.from(lcRef.agents?.values?.() || []);
5110
5110
  const hasLocalPm2 = agents.some((a) => {
@@ -1234,7 +1234,7 @@ async function deploy(config, db, jwtSecret, vaultKey, spinner, chalk) {
1234
1234
  const { deployTarget, company, database, domain, tunnel, cloud } = config;
1235
1235
  if (deployTarget === "cloudflare-tunnel" && tunnel) {
1236
1236
  spinner.start(`Starting local server on port ${tunnel.port}...`);
1237
- const { createServer: createServer2 } = await import("./server-BWD2O5WP.js");
1237
+ const { createServer: createServer2 } = await import("./server-6WHC3426.js");
1238
1238
  const server2 = createServer2({ port: tunnel.port, db, jwtSecret });
1239
1239
  const handle2 = await server2.start();
1240
1240
  spinner.succeed("Server running");
@@ -1536,7 +1536,7 @@ async function deploy(config, db, jwtSecret, vaultKey, spinner, chalk) {
1536
1536
  return {};
1537
1537
  }
1538
1538
  spinner.start("Starting local server...");
1539
- const { createServer } = await import("./server-BWD2O5WP.js");
1539
+ const { createServer } = await import("./server-6WHC3426.js");
1540
1540
  const server = createServer({ port: 3e3, db, jwtSecret });
1541
1541
  const handle = await server.start();
1542
1542
  spinner.succeed("Server running");
@@ -359,7 +359,7 @@ function createRuntimeHooks(deps) {
359
359
  var injectedMessages = [...messages];
360
360
  if (deps.knowledgeBaseEnabled !== false) {
361
361
  try {
362
- var { knowledgeBase } = await import("./routes-KL7BIX5B.js");
362
+ var { knowledgeBase } = await import("./routes-XP7T63ZZ.js");
363
363
  var kbs = await knowledgeBase.listForAgent(agentId);
364
364
  if (kbs.length > 0) {
365
365
  var contextParts = [];
@@ -392,7 +392,7 @@ ${contextParts.join("\n\n")}`;
392
392
  }
393
393
  if (deps.memoryEnabled !== false) {
394
394
  try {
395
- var { memoryManager } = await import("./routes-KL7BIX5B.js");
395
+ var { memoryManager } = await import("./routes-XP7T63ZZ.js");
396
396
  var memories = await memoryManager.queryMemories({
397
397
  agentId,
398
398
  limit: 10,
@@ -413,7 +413,7 @@ ${memories.map(function(m) {
413
413
  }
414
414
  if (deps.policyEnabled !== false) {
415
415
  try {
416
- var { policyEngine } = await import("./routes-KL7BIX5B.js");
416
+ var { policyEngine } = await import("./routes-XP7T63ZZ.js");
417
417
  var policies = await policyEngine.getAgentPolicies(agentId, deps.orgId);
418
418
  if (policies.length > 0) {
419
419
  var policyText = policies.map(function(p) {
@@ -438,7 +438,7 @@ ${policyText}`;
438
438
  // ─── Budget Check ──────────────────────────────
439
439
  async checkBudget(agentId, _orgId, _estimatedTokens) {
440
440
  try {
441
- var { lifecycle } = await import("./routes-KL7BIX5B.js");
441
+ var { lifecycle } = await import("./routes-XP7T63ZZ.js");
442
442
  var now = Date.now();
443
443
  var cacheKey = `budget_sync_${agentId}`;
444
444
  var lastSync = globalThis[cacheKey] || 0;
@@ -531,7 +531,7 @@ ${policyText}`;
531
531
  // ─── Record LLM Usage ──────────────────────────
532
532
  async recordLLMUsage(agentId, orgId, usage) {
533
533
  try {
534
- var { lifecycle } = await import("./routes-KL7BIX5B.js");
534
+ var { lifecycle } = await import("./routes-XP7T63ZZ.js");
535
535
  console.log(`[hooks] recordLLMUsage: agent=${agentId}, input=${usage.inputTokens}, output=${usage.outputTokens}`);
536
536
  await lifecycle.recordLLMUsage(agentId, {
537
537
  inputTokens: usage.inputTokens,
@@ -542,7 +542,7 @@ ${policyText}`;
542
542
  console.log(`[hooks] recordLLMUsage error: ${recordErr.message}`);
543
543
  }
544
544
  try {
545
- var { activity } = await import("./routes-KL7BIX5B.js");
545
+ var { activity } = await import("./routes-XP7T63ZZ.js");
546
546
  await activity.record({
547
547
  agentId,
548
548
  orgId,
@@ -590,7 +590,7 @@ ${policyText}`;
590
590
  var cacheKey = `${ctx.agentId}:${ctx.toolName}`;
591
591
  var cached = getCachedPermission(cacheKey);
592
592
  if (cached) return cached;
593
- var { permissionEngine } = await import("./routes-KL7BIX5B.js");
593
+ var { permissionEngine } = await import("./routes-XP7T63ZZ.js");
594
594
  var permResult = await permissionEngine.checkPermission(ctx.agentId, ctx.toolName);
595
595
  var result = {
596
596
  allowed: permResult.allowed,
@@ -599,7 +599,7 @@ ${policyText}`;
599
599
  };
600
600
  if (result.allowed && deps.guardrailsEnabled !== false) {
601
601
  try {
602
- var { guardrails } = await import("./routes-KL7BIX5B.js");
602
+ var { guardrails } = await import("./routes-XP7T63ZZ.js");
603
603
  var status = await guardrails.getStatus(ctx.agentId);
604
604
  if (status.paused || status.offDuty) {
605
605
  result.allowed = false;
@@ -611,7 +611,7 @@ ${policyText}`;
611
611
  }
612
612
  if (result.allowed && deps.dlpEnabled !== false && ctx.parameters) {
613
613
  try {
614
- var { dlp } = await import("./routes-KL7BIX5B.js");
614
+ var { dlp } = await import("./routes-XP7T63ZZ.js");
615
615
  var dlpResult = await dlp.scanParameters({
616
616
  orgId: ctx.orgId,
617
617
  agentId: ctx.agentId,
@@ -631,7 +631,7 @@ ${policyText}`;
631
631
  }
632
632
  if (result.requiresApproval && result.allowed) {
633
633
  try {
634
- var { approvals } = await import("./routes-KL7BIX5B.js");
634
+ var { approvals } = await import("./routes-XP7T63ZZ.js");
635
635
  var approval = await approvals.createAndWait({
636
636
  agentId: ctx.agentId,
637
637
  orgId: ctx.orgId,
@@ -661,7 +661,7 @@ ${policyText}`;
661
661
  // ─── After Tool Call ────────────────────────────
662
662
  async afterToolCall(ctx, result) {
663
663
  try {
664
- var { activity } = await import("./routes-KL7BIX5B.js");
664
+ var { activity } = await import("./routes-XP7T63ZZ.js");
665
665
  await activity.record({
666
666
  agentId: ctx.agentId,
667
667
  orgId: ctx.orgId,
@@ -678,7 +678,7 @@ ${policyText}`;
678
678
  } catch {
679
679
  }
680
680
  try {
681
- var { lifecycle } = await import("./routes-KL7BIX5B.js");
681
+ var { lifecycle } = await import("./routes-XP7T63ZZ.js");
682
682
  await lifecycle.recordToolCall(ctx.agentId, {
683
683
  toolId: ctx.toolName,
684
684
  tokensUsed: 0,
@@ -690,7 +690,7 @@ ${policyText}`;
690
690
  }
691
691
  if (result.success && EXTERNAL_TOOLS.has(ctx.toolName)) {
692
692
  try {
693
- var { journal } = await import("./routes-KL7BIX5B.js");
693
+ var { journal } = await import("./routes-XP7T63ZZ.js");
694
694
  await journal.record({
695
695
  orgId: ctx.orgId,
696
696
  agentId: ctx.agentId,
@@ -705,7 +705,7 @@ ${policyText}`;
705
705
  }
706
706
  if (result.success && COMMUNICATION_TOOLS.has(ctx.toolName)) {
707
707
  try {
708
- var { commBus } = await import("./routes-KL7BIX5B.js");
708
+ var { commBus } = await import("./routes-XP7T63ZZ.js");
709
709
  await commBus.observeMessage({
710
710
  orgId: ctx.orgId,
711
711
  agentId: ctx.agentId,
@@ -719,7 +719,7 @@ ${policyText}`;
719
719
  // ─── Session Lifecycle ──────────────────────────
720
720
  async onSessionStart(sessionId, agentId, orgId) {
721
721
  try {
722
- var { activity } = await import("./routes-KL7BIX5B.js");
722
+ var { activity } = await import("./routes-XP7T63ZZ.js");
723
723
  await activity.record({
724
724
  agentId,
725
725
  orgId,
@@ -732,7 +732,7 @@ ${policyText}`;
732
732
  },
733
733
  async onSessionEnd(sessionId, agentId, orgId) {
734
734
  try {
735
- var { activity } = await import("./routes-KL7BIX5B.js");
735
+ var { activity } = await import("./routes-XP7T63ZZ.js");
736
736
  await activity.record({
737
737
  agentId,
738
738
  orgId,
@@ -746,7 +746,7 @@ ${policyText}`;
746
746
  // ─── Context Compaction ─────────────────────────
747
747
  async onContextCompaction(sessionId, agentId, summary) {
748
748
  try {
749
- var { memoryManager } = await import("./routes-KL7BIX5B.js");
749
+ var { memoryManager } = await import("./routes-XP7T63ZZ.js");
750
750
  await memoryManager.createMemory({
751
751
  agentId,
752
752
  orgId: deps.orgId,
@@ -2521,7 +2521,7 @@ async function runAgentLoop(config, initialMessages, hooks, options) {
2521
2521
  console.log(`[agent-loop] \u2705 Tool ${toolCall.name} succeeded (${content.length} chars): ${content.slice(0, 300)}`);
2522
2522
  }
2523
2523
  try {
2524
- const { activity } = await import("./routes-KL7BIX5B.js");
2524
+ const { activity } = await import("./routes-XP7T63ZZ.js");
2525
2525
  activity.recordToolCallCompact({
2526
2526
  agentId: config.agentId,
2527
2527
  orgId: config.orgId,
@@ -7103,7 +7103,7 @@ function createAgentRoutes(opts) {
7103
7103
  }
7104
7104
  const managedAgent = await lifecycle2.createAgent(orgId, config, actor);
7105
7105
  try {
7106
- const { knowledgeBase: kbEngine } = await import("./routes-KL7BIX5B.js");
7106
+ const { knowledgeBase: kbEngine } = await import("./routes-XP7T63ZZ.js");
7107
7107
  const allKbs = kbEngine.getAllKnowledgeBases();
7108
7108
  const clientOrgId = managedAgent?.clientOrgId || config?.clientOrgId || null;
7109
7109
  let kbAssigned = 0;
@@ -25437,7 +25437,7 @@ var init_routes3 = __esm({
25437
25437
  if (filterAgent && agentId !== filterAgent) return;
25438
25438
  send(JSON.stringify({ type: "status", ...snapshot }));
25439
25439
  });
25440
- const hb = setInterval(() => send(JSON.stringify({ type: "heartbeat" })), 3e4);
25440
+ const hb = setInterval(() => send(JSON.stringify({ type: "heartbeat" })), 15e3);
25441
25441
  c.req.raw.signal.addEventListener("abort", () => {
25442
25442
  unsub();
25443
25443
  clearInterval(hb);
@@ -25594,7 +25594,7 @@ var init_routes3 = __esm({
25594
25594
  };
25595
25595
  for (const n of cluster.getAllNodes()) send(JSON.stringify({ type: "node", event: "snapshot", ...n }));
25596
25596
  const unsub = cluster.subscribe((_nodeId, node, event) => send(JSON.stringify({ type: "node", event, ...node })));
25597
- const hb = setInterval(() => send(JSON.stringify({ type: "heartbeat" })), 3e4);
25597
+ const hb = setInterval(() => send(JSON.stringify({ type: "heartbeat" })), 15e3);
25598
25598
  c.req.raw.signal.addEventListener("abort", () => {
25599
25599
  unsub();
25600
25600
  clearInterval(hb);
@@ -776,7 +776,7 @@ async function runAgent(_args) {
776
776
  const agent = agentRow[0];
777
777
  console.log(` Agent: ${agent.display_name || agent.name}`);
778
778
  console.log(` State: ${agent.state}`);
779
- const routes = await import("./routes-KL7BIX5B.js");
779
+ const routes = await import("./routes-XP7T63ZZ.js");
780
780
  await routes.lifecycle.setDb(engineDb);
781
781
  await routes.lifecycle.loadFromDb();
782
782
  routes.lifecycle.standaloneMode = true;
@@ -834,10 +834,10 @@ async function runAgent(_args) {
834
834
  }
835
835
  } catch {
836
836
  }
837
- const { createAgentRuntime } = await import("./runtime-WPUNDUHR.js");
837
+ const { createAgentRuntime } = await import("./runtime-PSSS6LHP.js");
838
838
  let orgIntMgr = null;
839
839
  try {
840
- const { orgIntegrations: oi } = await import("./routes-KL7BIX5B.js");
840
+ const { orgIntegrations: oi } = await import("./routes-XP7T63ZZ.js");
841
841
  orgIntMgr = oi;
842
842
  } catch {
843
843
  }
@@ -1236,7 +1236,7 @@ Please complete this task now.`,
1236
1236
  }
1237
1237
  if (scope === "all" || scope === "permissions") {
1238
1238
  try {
1239
- const { permissionEngine } = await import("./routes-KL7BIX5B.js");
1239
+ const { permissionEngine } = await import("./routes-XP7T63ZZ.js");
1240
1240
  await permissionEngine.setDb(engineDb);
1241
1241
  reloaded.push("permissions");
1242
1242
  } catch {
@@ -1276,7 +1276,7 @@ Please complete this task now.`,
1276
1276
  }
1277
1277
  if (scope === "all" || scope === "guardrails") {
1278
1278
  try {
1279
- const { guardrails } = await import("./routes-KL7BIX5B.js");
1279
+ const { guardrails } = await import("./routes-XP7T63ZZ.js");
1280
1280
  await guardrails.loadFromDb?.();
1281
1281
  reloaded.push("guardrails");
1282
1282
  } catch {
@@ -2216,7 +2216,7 @@ Available tools: ${providerType === "imap" ? "email_send (to, subject, body)" :
2216
2216
  console.log("[guardrails] Disabled via autonomy settings");
2217
2217
  }
2218
2218
  try {
2219
- const { AgentHeartbeatManager } = await import("./agent-heartbeat-PFF7ZAIJ.js");
2219
+ const { AgentHeartbeatManager } = await import("./agent-heartbeat-WM5TG3WF.js");
2220
2220
  const hbOrgRows = await engineDb.query(`SELECT org_id FROM managed_agents WHERE id = $1`, [AGENT_ID]);
2221
2221
  const hbOrgId = hbOrgRows?.[0]?.org_id || "";
2222
2222
  const hbManagerEmail = config.managerEmail || (config.manager?.type === "external" ? config.manager.email : null);
@@ -94,7 +94,7 @@ async function runServe(_args) {
94
94
  process.exit(1);
95
95
  }
96
96
  const { createAdapter, smartDbConfig } = await import("./factory-XRYYBBCW.js");
97
- const { createServer } = await import("./server-BWD2O5WP.js");
97
+ const { createServer } = await import("./server-6WHC3426.js");
98
98
  const db = await createAdapter(smartDbConfig(DATABASE_URL));
99
99
  await db.migrate();
100
100
  const server = createServer({
package/dist/cli.js CHANGED
@@ -65,14 +65,14 @@ Skill Development:
65
65
  break;
66
66
  case "serve":
67
67
  case "start":
68
- import("./cli-serve-CY6V5YHF.js").then((m) => m.runServe(args.slice(1))).catch(fatal);
68
+ import("./cli-serve-BL66W43E.js").then((m) => m.runServe(args.slice(1))).catch(fatal);
69
69
  break;
70
70
  case "agent":
71
- import("./cli-agent-X356EE3C.js").then((m) => m.runAgent(args.slice(1))).catch(fatal);
71
+ import("./cli-agent-ZOFSKQ6U.js").then((m) => m.runAgent(args.slice(1))).catch(fatal);
72
72
  break;
73
73
  case "setup":
74
74
  default:
75
- import("./setup-GGMNQVWH.js").then((m) => m.runSetupWizard()).catch(fatal);
75
+ import("./setup-WPG2MWOZ.js").then((m) => m.runSetupWizard()).catch(fatal);
76
76
  break;
77
77
  }
78
78
  function fatal(err) {
package/dist/index.js CHANGED
@@ -1,7 +1,7 @@
1
1
  import {
2
2
  provision,
3
3
  runSetupWizard
4
- } from "./chunk-6XGF35TY.js";
4
+ } from "./chunk-ECYPEFN5.js";
5
5
  import {
6
6
  AgenticMailManager,
7
7
  GoogleEmailProvider,
@@ -28,7 +28,7 @@ import {
28
28
  executeTool,
29
29
  runAgentLoop,
30
30
  toolsToDefinitions
31
- } from "./chunk-5OY7G6NG.js";
31
+ } from "./chunk-NAGOOW72.js";
32
32
  import "./chunk-WPM52NBU.js";
33
33
  import {
34
34
  ValidationError,
@@ -43,7 +43,7 @@ import {
43
43
  requireRole,
44
44
  securityHeaders,
45
45
  validate
46
- } from "./chunk-X5ULMFKP.js";
46
+ } from "./chunk-BSSL2XAC.js";
47
47
  import "./chunk-DJBCRQTD.js";
48
48
  import {
49
49
  PROVIDER_REGISTRY,
@@ -83,7 +83,7 @@ import {
83
83
  init_storage_manager,
84
84
  init_tenant,
85
85
  init_workforce
86
- } from "./chunk-SL2GRD72.js";
86
+ } from "./chunk-T65CWPW2.js";
87
87
  import "./chunk-WYDVMFGJ.js";
88
88
  import "./chunk-3UAFHUEC.js";
89
89
  import {
@@ -35,7 +35,7 @@ import {
35
35
  tenants,
36
36
  vault,
37
37
  workforce
38
- } from "./chunk-SL2GRD72.js";
38
+ } from "./chunk-T65CWPW2.js";
39
39
  import "./chunk-WYDVMFGJ.js";
40
40
  import "./chunk-3UAFHUEC.js";
41
41
  import "./chunk-E6B4W3WG.js";
@@ -14,7 +14,7 @@ import {
14
14
  executeTool,
15
15
  runAgentLoop,
16
16
  toolsToDefinitions
17
- } from "./chunk-5OY7G6NG.js";
17
+ } from "./chunk-NAGOOW72.js";
18
18
  import "./chunk-WPM52NBU.js";
19
19
  import {
20
20
  PROVIDER_REGISTRY,
@@ -1,9 +1,9 @@
1
1
  import {
2
2
  createServer
3
- } from "./chunk-X5ULMFKP.js";
3
+ } from "./chunk-BSSL2XAC.js";
4
4
  import "./chunk-DJBCRQTD.js";
5
5
  import "./chunk-UF3ZJMJO.js";
6
- import "./chunk-SL2GRD72.js";
6
+ import "./chunk-T65CWPW2.js";
7
7
  import "./chunk-WYDVMFGJ.js";
8
8
  import "./chunk-3UAFHUEC.js";
9
9
  import "./chunk-E6B4W3WG.js";
@@ -6,7 +6,7 @@ import {
6
6
  promptRegistration,
7
7
  provision,
8
8
  runSetupWizard
9
- } from "./chunk-6XGF35TY.js";
9
+ } from "./chunk-ECYPEFN5.js";
10
10
  import "./chunk-P6W565WH.js";
11
11
  import "./chunk-KFQGP6VL.js";
12
12
  export {
@@ -135,3 +135,60 @@
135
135
  2026-03-06 03:17:57: 2026-03-06T02:17:57Z ERR Request failed error="Unable to reach the origin service. The service may be down or it may not be responding to traffic from cloudflared: EOF" connIndex=0 dest=https://enterprise.agenticmail.io/dashboard/agents/3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.200.43 type=http
136
136
  2026-03-06 03:17:57: 2026-03-06T02:17:57Z ERR error="Unable to reach the origin service. The service may be down or it may not be responding to traffic from cloudflared: EOF" connIndex=0 event=1 ingressRule=0 originService=http://localhost:8080
137
137
  2026-03-06 03:17:57: 2026-03-06T02:17:57Z ERR Request failed error="Unable to reach the origin service. The service may be down or it may not be responding to traffic from cloudflared: EOF" connIndex=0 dest=https://enterprise.agenticmail.io/favicon.ico event=0 ip=198.41.200.43 type=http
138
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Initiating graceful shutdown due to signal interrupt ...
139
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR failed to run the datagram handler error="Application error 0x0 (remote)" connIndex=0 event=0 ip=198.41.200.43
140
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR failed to serve tunnel connection error="accept stream listener encountered a failure while serving" connIndex=0 event=0 ip=198.41.200.43
141
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR Serve tunnel error error="accept stream listener encountered a failure while serving" connIndex=0 event=0 ip=198.41.200.43
142
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Retrying connection in up to 1s connIndex=0 event=0 ip=198.41.200.43
143
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR Connection terminated connIndex=0
144
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR failed to run the datagram handler error="context canceled" connIndex=3 event=0 ip=198.41.192.37
145
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR failed to run the datagram handler error="context canceled" connIndex=1 event=0 ip=198.41.192.67
146
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR failed to serve tunnel connection error="accept stream listener encountered a failure while serving" connIndex=3 event=0 ip=198.41.192.37
147
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR failed to serve tunnel connection error="accept stream listener encountered a failure while serving" connIndex=1 event=0 ip=198.41.192.67
148
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR Serve tunnel error error="accept stream listener encountered a failure while serving" connIndex=3 event=0 ip=198.41.192.37
149
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR Serve tunnel error error="accept stream listener encountered a failure while serving" connIndex=1 event=0 ip=198.41.192.67
150
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Retrying connection in up to 1s connIndex=1 event=0 ip=198.41.192.67
151
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Retrying connection in up to 1s connIndex=3 event=0 ip=198.41.192.37
152
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR Connection terminated connIndex=1
153
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR Connection terminated connIndex=3
154
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR failed to run the datagram handler error="context canceled" connIndex=2 event=0 ip=198.41.200.33
155
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR failed to serve tunnel connection error="accept stream listener encountered a failure while serving" connIndex=2 event=0 ip=198.41.200.33
156
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR Serve tunnel error error="accept stream listener encountered a failure while serving" connIndex=2 event=0 ip=198.41.200.33
157
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Retrying connection in up to 1s connIndex=2 event=0 ip=198.41.200.33
158
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR Connection terminated connIndex=2
159
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z ERR no more connections active and exiting
160
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Tunnel server stopped
161
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Metrics server stopped
162
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Starting tunnel tunnelID=18dbfae9-fe5c-4380-a5c7-e5e875255b06
163
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Version 2026.2.0 (Checksum dc6e60da390e702c4db3332d0cc9cf4e98a88df99f17273e9b3d83f435695fb4)
164
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF GOOS: darwin, GOVersion: go1.25.7, GoArch: arm64
165
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Settings: map[cred-file:/Users/ope/.cloudflared/18dbfae9-fe5c-4380-a5c7-e5e875255b06.json credentials-file:/Users/ope/.cloudflared/18dbfae9-fe5c-4380-a5c7-e5e875255b06.json]
166
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF cloudflared will not automatically update if installed by a package manager.
167
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Generated Connector ID: 0ff6ec1f-8128-4273-9956-6d0eafc1f7cd
168
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Initial protocol quic
169
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF ICMP proxy will use 192.168.86.21 as source for IPv4
170
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF ICMP proxy will use fe80::1c9c:15a9:2404:3154 in zone en1 as source for IPv6
171
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Created ICMP proxy listening on 192.168.86.21:0
172
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF ICMP proxy will use 192.168.86.21 as source for IPv4
173
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF ICMP proxy will use fe80::1c9c:15a9:2404:3154 in zone en1 as source for IPv6
174
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Starting metrics server on 127.0.0.1:20241/metrics
175
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Tunnel connection curve preferences: [X25519MLKEM768 CurveP256] connIndex=0 event=0 ip=198.41.192.37
176
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Registered tunnel connection connIndex=0 connection=77f04fe0-bf07-4753-a416-03e5c208e977 event=0 ip=198.41.192.37 location=atl01 protocol=quic
177
+ 2026-03-06 03:19:32: 2026-03-06T02:19:32Z INF Tunnel connection curve preferences: [X25519MLKEM768 CurveP256] connIndex=1 event=0 ip=198.41.200.53
178
+ 2026-03-06 03:19:33: 2026-03-06T02:19:33Z INF Registered tunnel connection connIndex=1 connection=adf43c72-b846-437c-a380-b3c59236abff event=0 ip=198.41.200.53 location=atl14 protocol=quic
179
+ 2026-03-06 03:19:33: 2026-03-06T02:19:33Z INF Tunnel connection curve preferences: [X25519MLKEM768 CurveP256] connIndex=2 event=0 ip=198.41.200.33
180
+ 2026-03-06 03:19:34: 2026-03-06T02:19:34Z INF Registered tunnel connection connIndex=2 connection=12b10b17-4108-4d02-bf0d-c44a5b56a030 event=0 ip=198.41.200.33 location=atl11 protocol=quic
181
+ 2026-03-06 03:19:34: 2026-03-06T02:19:34Z INF Tunnel connection curve preferences: [X25519MLKEM768 CurveP256] connIndex=3 event=0 ip=198.41.192.107
182
+ 2026-03-06 03:19:35: 2026-03-06T02:19:35Z INF Registered tunnel connection connIndex=3 connection=641704ba-c048-442d-ad26-edac486e991e event=0 ip=198.41.192.107 location=atl12 protocol=quic
183
+ 2026-03-06 03:24:10: 2026-03-06T02:24:10Z ERR error="stream 113 canceled by remote with error code 0" connIndex=1 event=1 ingressRule=0 originService=http://localhost:3100
184
+ 2026-03-06 03:24:10: 2026-03-06T02:24:10Z ERR Request failed error="stream 113 canceled by remote with error code 0" connIndex=1 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.200.53 type=http
185
+ 2026-03-06 03:24:12: 2026-03-06T02:24:12Z ERR error="stream 129 canceled by remote with error code 0" connIndex=1 event=1 ingressRule=0 originService=http://localhost:3100
186
+ 2026-03-06 03:24:12: 2026-03-06T02:24:12Z ERR Request failed error="stream 129 canceled by remote with error code 0" connIndex=1 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.200.53 type=http
187
+ 2026-03-06 03:24:47: 2026-03-06T02:24:47Z ERR error="unexpected EOF" connIndex=1 event=1 ingressRule=0 originService=http://localhost:3100
188
+ 2026-03-06 03:24:47: 2026-03-06T02:24:47Z ERR Request failed error="unexpected EOF" connIndex=1 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.200.53 type=http
189
+ 2026-03-06 03:24:47: 2026-03-06T02:24:47Z ERR error="unexpected EOF" connIndex=1 event=1 ingressRule=0 originService=http://localhost:3100
190
+ 2026-03-06 03:24:47: 2026-03-06T02:24:47Z ERR Request failed error="unexpected EOF" connIndex=1 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.200.53 type=http
191
+ 2026-03-06 03:26:50: 2026-03-06T02:26:50Z ERR error="stream 321 canceled by remote with error code 0" connIndex=1 event=1 ingressRule=0 originService=http://localhost:3100
192
+ 2026-03-06 03:26:50: 2026-03-06T02:26:50Z ERR Request failed error="stream 321 canceled by remote with error code 0" connIndex=1 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.200.53 type=http
193
+ 2026-03-06 03:26:50: 2026-03-06T02:26:50Z ERR error="stream 325 canceled by remote with error code 0" connIndex=1 event=1 ingressRule=0 originService=http://localhost:3100
194
+ 2026-03-06 03:26:50: 2026-03-06T02:26:50Z ERR Request failed error="stream 325 canceled by remote with error code 0" connIndex=1 dest=https://enterprise.agenticmail.io/api/engine/agent-status-stream?agentId=3eecd57d-03ae-440d-8945-5b35f43a8d90 event=0 ip=198.41.200.53 type=http
@@ -6,3 +6,5 @@
6
6
  2026-03-06 00:51:46: [TaskPoller] spawnForTask error: No API key configured for provider: undefined
7
7
  2026-03-06 02:52:02: Fatal error: current transaction is aborted, commands ignored until end of transaction block
8
8
  2026-03-06 03:02:32: Fatal error: current transaction is aborted, commands ignored until end of transaction block
9
+ 2026-03-06 03:24:40: [TaskPoller] spawnForTask error: Cannot find module '/Users/ope/Desktop/projects/agenticmail/enterprise/dist/agent-tools-SXHMNUVO.js' imported from /Users/ope/Desktop/projects/agenticmail/enterprise/dist/chunk-ZG54KN2R.js
10
+ 2026-03-06 03:24:55: [TaskPoller] spawnForTask error: No API key configured for provider: undefined
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@agenticmail/enterprise",
3
- "version": "0.5.397",
3
+ "version": "0.5.398",
4
4
  "description": "AgenticMail Enterprise — cloud-hosted AI agent identity, email, auth & compliance for organizations",
5
5
  "type": "module",
6
6
  "bin": {