@agenticmail/enterprise 0.5.520 → 0.5.522
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/chunk-ALQ4KGMS.js +7898 -0
- package/dist/chunk-OW7QTPAQ.js +1728 -0
- package/dist/cli-agent-HPLSQ3SO.js +2882 -0
- package/dist/cli-serve-6WVHPRYG.js +322 -0
- package/dist/cli.js +3 -3
- package/dist/dashboard/pages/polymarket.js +25 -4
- package/dist/index.js +2 -2
- package/dist/server-CDNUA6Y5.js +36 -0
- package/dist/setup-CCOBENHY.js +20 -0
- package/logs/cloudflared-error.log +4 -0
- package/package.json +1 -1
|
@@ -0,0 +1,322 @@
|
|
|
1
|
+
import "./chunk-KFQGP6VL.js";
|
|
2
|
+
|
|
3
|
+
// src/cli-serve.ts
|
|
4
|
+
import { existsSync, readFileSync } from "fs";
|
|
5
|
+
import { join } from "path";
|
|
6
|
+
import { homedir } from "os";
|
|
7
|
+
function loadEnvFile() {
|
|
8
|
+
const candidates = [
|
|
9
|
+
join(process.cwd(), ".env"),
|
|
10
|
+
join(homedir(), ".agenticmail", ".env")
|
|
11
|
+
];
|
|
12
|
+
for (const envPath of candidates) {
|
|
13
|
+
if (!existsSync(envPath)) continue;
|
|
14
|
+
try {
|
|
15
|
+
const content = readFileSync(envPath, "utf8");
|
|
16
|
+
for (const line of content.split("\n")) {
|
|
17
|
+
const trimmed = line.trim();
|
|
18
|
+
if (!trimmed || trimmed.startsWith("#")) continue;
|
|
19
|
+
const eq = trimmed.indexOf("=");
|
|
20
|
+
if (eq < 0) continue;
|
|
21
|
+
const key = trimmed.slice(0, eq).trim();
|
|
22
|
+
let val = trimmed.slice(eq + 1).trim();
|
|
23
|
+
if (val.startsWith('"') && val.endsWith('"') || val.startsWith("'") && val.endsWith("'")) {
|
|
24
|
+
val = val.slice(1, -1);
|
|
25
|
+
}
|
|
26
|
+
if (!process.env[key]) process.env[key] = val;
|
|
27
|
+
}
|
|
28
|
+
console.log(`Loaded config from ${envPath}`);
|
|
29
|
+
return;
|
|
30
|
+
} catch {
|
|
31
|
+
}
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
async function ensureSecrets() {
|
|
35
|
+
const { randomUUID } = await import("crypto");
|
|
36
|
+
const envDir = join(homedir(), ".agenticmail");
|
|
37
|
+
const envPath = join(envDir, ".env");
|
|
38
|
+
let dirty = false;
|
|
39
|
+
if (!process.env.JWT_SECRET) {
|
|
40
|
+
process.env.JWT_SECRET = randomUUID() + randomUUID();
|
|
41
|
+
dirty = true;
|
|
42
|
+
console.log("[startup] Generated new JWT_SECRET (existing sessions will need to re-login)");
|
|
43
|
+
}
|
|
44
|
+
if (!process.env.AGENTICMAIL_VAULT_KEY) {
|
|
45
|
+
process.env.AGENTICMAIL_VAULT_KEY = randomUUID() + randomUUID();
|
|
46
|
+
dirty = true;
|
|
47
|
+
console.log("[startup] Generated new AGENTICMAIL_VAULT_KEY");
|
|
48
|
+
console.log("[startup] \u26A0\uFE0F Previously encrypted credentials will need to be re-entered in the dashboard");
|
|
49
|
+
}
|
|
50
|
+
if (dirty) {
|
|
51
|
+
try {
|
|
52
|
+
if (!existsSync(envDir)) {
|
|
53
|
+
const { mkdirSync } = await import("fs");
|
|
54
|
+
mkdirSync(envDir, { recursive: true });
|
|
55
|
+
}
|
|
56
|
+
const { appendFileSync } = await import("fs");
|
|
57
|
+
const lines = [];
|
|
58
|
+
let existing = "";
|
|
59
|
+
if (existsSync(envPath)) {
|
|
60
|
+
existing = readFileSync(envPath, "utf8");
|
|
61
|
+
}
|
|
62
|
+
if (!existing.includes("JWT_SECRET=")) {
|
|
63
|
+
lines.push(`JWT_SECRET=${process.env.JWT_SECRET}`);
|
|
64
|
+
}
|
|
65
|
+
if (!existing.includes("AGENTICMAIL_VAULT_KEY=")) {
|
|
66
|
+
lines.push(`AGENTICMAIL_VAULT_KEY=${process.env.AGENTICMAIL_VAULT_KEY}`);
|
|
67
|
+
}
|
|
68
|
+
if (lines.length) {
|
|
69
|
+
appendFileSync(envPath, "\n" + lines.join("\n") + "\n", { mode: 384 });
|
|
70
|
+
console.log(`[startup] Saved secrets to ${envPath}`);
|
|
71
|
+
}
|
|
72
|
+
} catch (e) {
|
|
73
|
+
console.warn(`[startup] Could not save secrets to ${envPath}: ${e.message}`);
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
async function runServe(_args) {
|
|
78
|
+
loadEnvFile();
|
|
79
|
+
const DATABASE_URL = process.env.DATABASE_URL;
|
|
80
|
+
const PORT = parseInt(process.env.PORT || "8080", 10);
|
|
81
|
+
await ensureSecrets();
|
|
82
|
+
const JWT_SECRET = process.env.JWT_SECRET;
|
|
83
|
+
const _VAULT_KEY = process.env.AGENTICMAIL_VAULT_KEY;
|
|
84
|
+
if (!DATABASE_URL) {
|
|
85
|
+
console.error("ERROR: DATABASE_URL is required.");
|
|
86
|
+
console.error("");
|
|
87
|
+
console.error("Set it via environment variable or .env file:");
|
|
88
|
+
console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db npx @agenticmail/enterprise start");
|
|
89
|
+
console.error("");
|
|
90
|
+
console.error("Or create a .env file (in cwd or ~/.agenticmail/.env):");
|
|
91
|
+
console.error(" DATABASE_URL=postgresql://user:pass@host:5432/db");
|
|
92
|
+
console.error(" JWT_SECRET=your-secret-here");
|
|
93
|
+
console.error(" PORT=3200");
|
|
94
|
+
process.exit(1);
|
|
95
|
+
}
|
|
96
|
+
const { createAdapter, smartDbConfig } = await import("./factory-6KTIEZYC.js");
|
|
97
|
+
const { createServer } = await import("./server-CDNUA6Y5.js");
|
|
98
|
+
const db = await createAdapter(smartDbConfig(DATABASE_URL));
|
|
99
|
+
await db.migrate();
|
|
100
|
+
const server = createServer({
|
|
101
|
+
port: PORT,
|
|
102
|
+
db,
|
|
103
|
+
jwtSecret: JWT_SECRET,
|
|
104
|
+
corsOrigins: ["*"]
|
|
105
|
+
});
|
|
106
|
+
await server.start();
|
|
107
|
+
console.log(`AgenticMail Enterprise server running on :${PORT}`);
|
|
108
|
+
try {
|
|
109
|
+
const { startWatcherEngine, initWatcherTables, setWatcherRuntime } = await import("./polymarket-watcher-UI7SIZDF.js");
|
|
110
|
+
const edb = db.getEngineDB?.();
|
|
111
|
+
if (edb) {
|
|
112
|
+
await initWatcherTables(edb);
|
|
113
|
+
startWatcherEngine(db, {
|
|
114
|
+
log: (...args) => console.log(...args),
|
|
115
|
+
onEvent: (agentId, event) => {
|
|
116
|
+
if (event.severity === "critical") {
|
|
117
|
+
console.log(`[poly-watcher] CRITICAL signal for agent ${agentId}: ${event.title}`);
|
|
118
|
+
}
|
|
119
|
+
}
|
|
120
|
+
});
|
|
121
|
+
setTimeout(async () => {
|
|
122
|
+
try {
|
|
123
|
+
const routes = await import("./routes-F3ZKYQBO.js");
|
|
124
|
+
setWatcherRuntime(
|
|
125
|
+
() => routes.getRuntime?.() || null
|
|
126
|
+
);
|
|
127
|
+
} catch (e) {
|
|
128
|
+
console.warn("[poly-watcher] Could not inject runtime:", e.message);
|
|
129
|
+
}
|
|
130
|
+
}, 5e3);
|
|
131
|
+
console.log("[startup] Polymarket watcher engine started");
|
|
132
|
+
}
|
|
133
|
+
setTimeout(async () => {
|
|
134
|
+
try {
|
|
135
|
+
const { autoConnectProxy } = await import("./polymarket-runtime-5MZSMBLF.js");
|
|
136
|
+
const pdb = db.getEngineDB?.();
|
|
137
|
+
if (pdb) await autoConnectProxy(pdb);
|
|
138
|
+
} catch {
|
|
139
|
+
}
|
|
140
|
+
}, 8e3);
|
|
141
|
+
} catch (e) {
|
|
142
|
+
console.warn("[startup] Polymarket watcher engine skipped:", e.message);
|
|
143
|
+
}
|
|
144
|
+
try {
|
|
145
|
+
const { startBackgroundUpdateCheck } = await import("./cli-update-SX7GACL3.js");
|
|
146
|
+
startBackgroundUpdateCheck();
|
|
147
|
+
} catch {
|
|
148
|
+
}
|
|
149
|
+
try {
|
|
150
|
+
const { startPreventSleep } = await import("./screen-unlock-4RPZBHOI.js");
|
|
151
|
+
const adminDb = server.getAdminDb?.() || server.adminDb;
|
|
152
|
+
if (adminDb) {
|
|
153
|
+
const settings = await adminDb.getSettings?.().catch(() => null);
|
|
154
|
+
const screenAccess = settings?.securityConfig?.screenAccess;
|
|
155
|
+
if (screenAccess?.enabled && screenAccess?.preventSleep) {
|
|
156
|
+
startPreventSleep();
|
|
157
|
+
console.log("[startup] Prevent-sleep enabled \u2014 system will stay awake while agents are active");
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
} catch {
|
|
161
|
+
}
|
|
162
|
+
try {
|
|
163
|
+
await setupSystemPersistence();
|
|
164
|
+
} catch (e) {
|
|
165
|
+
console.warn("[startup] System persistence setup skipped: " + e.message);
|
|
166
|
+
}
|
|
167
|
+
const tunnelToken = process.env.CLOUDFLARED_TOKEN;
|
|
168
|
+
if (tunnelToken) {
|
|
169
|
+
try {
|
|
170
|
+
const { execSync, spawn } = await import("child_process");
|
|
171
|
+
try {
|
|
172
|
+
execSync(process.platform === "win32" ? "where cloudflared" : "which cloudflared", { timeout: 3e3 });
|
|
173
|
+
} catch {
|
|
174
|
+
console.log("[startup] cloudflared not found \u2014 skipping tunnel auto-start");
|
|
175
|
+
console.log("[startup] Install cloudflared to enable tunnel: https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/downloads/");
|
|
176
|
+
return;
|
|
177
|
+
}
|
|
178
|
+
try {
|
|
179
|
+
if (process.platform === "win32") {
|
|
180
|
+
const tasklist = execSync('tasklist /FI "IMAGENAME eq cloudflared.exe" /NH', { encoding: "utf8", timeout: 5e3 });
|
|
181
|
+
if (tasklist.includes("cloudflared.exe")) {
|
|
182
|
+
console.log("[startup] cloudflared tunnel already running");
|
|
183
|
+
return;
|
|
184
|
+
}
|
|
185
|
+
} else {
|
|
186
|
+
execSync('pgrep -f "cloudflared.*tunnel.*run"', { timeout: 3e3 });
|
|
187
|
+
console.log("[startup] cloudflared tunnel already running");
|
|
188
|
+
return;
|
|
189
|
+
}
|
|
190
|
+
} catch {
|
|
191
|
+
}
|
|
192
|
+
const subdomain = process.env.AGENTICMAIL_SUBDOMAIN || process.env.AGENTICMAIL_DOMAIN || "";
|
|
193
|
+
console.log(`[startup] Starting cloudflared tunnel${subdomain ? ` for ${subdomain}.agenticmail.io` : ""}...`);
|
|
194
|
+
let cfBin = "cloudflared";
|
|
195
|
+
if (process.platform === "win32") {
|
|
196
|
+
try {
|
|
197
|
+
cfBin = execSync("where cloudflared", { encoding: "utf8", timeout: 3e3 }).trim().split("\n")[0].trim();
|
|
198
|
+
} catch {
|
|
199
|
+
const candidate = `${process.env.LOCALAPPDATA || ""}\\cloudflared\\cloudflared.exe`;
|
|
200
|
+
try {
|
|
201
|
+
(await import("fs")).statSync(candidate);
|
|
202
|
+
cfBin = candidate;
|
|
203
|
+
} catch {
|
|
204
|
+
}
|
|
205
|
+
}
|
|
206
|
+
}
|
|
207
|
+
const child = spawn(cfBin, ["tunnel", "--no-autoupdate", "run", "--token", tunnelToken], {
|
|
208
|
+
detached: true,
|
|
209
|
+
stdio: "ignore"
|
|
210
|
+
});
|
|
211
|
+
child.unref();
|
|
212
|
+
console.log("[startup] cloudflared tunnel started (pid " + child.pid + ")");
|
|
213
|
+
} catch (e) {
|
|
214
|
+
console.warn("[startup] Could not auto-start cloudflared: " + e.message);
|
|
215
|
+
}
|
|
216
|
+
}
|
|
217
|
+
}
|
|
218
|
+
async function setupSystemPersistence() {
|
|
219
|
+
const { execSync, spawnSync } = await import("child_process");
|
|
220
|
+
const { existsSync: exists, writeFileSync, mkdirSync } = await import("fs");
|
|
221
|
+
const { join: pathJoin } = await import("path");
|
|
222
|
+
const platform = process.platform;
|
|
223
|
+
if (!process.env.PM2_HOME && !process.env.pm_id) {
|
|
224
|
+
return;
|
|
225
|
+
}
|
|
226
|
+
const markerDir = pathJoin(homedir(), ".agenticmail");
|
|
227
|
+
const markerFile = pathJoin(markerDir, ".persistence-configured");
|
|
228
|
+
if (exists(markerFile)) {
|
|
229
|
+
try {
|
|
230
|
+
execSync("pm2 save --silent", { timeout: 1e4, stdio: "ignore" });
|
|
231
|
+
} catch {
|
|
232
|
+
}
|
|
233
|
+
return;
|
|
234
|
+
}
|
|
235
|
+
console.log("[startup] Configuring system persistence (one-time setup)...");
|
|
236
|
+
try {
|
|
237
|
+
if (platform === "darwin") {
|
|
238
|
+
const result = spawnSync("pm2", ["startup", "launchd", "--silent"], {
|
|
239
|
+
timeout: 15e3,
|
|
240
|
+
stdio: "pipe",
|
|
241
|
+
encoding: "utf-8"
|
|
242
|
+
});
|
|
243
|
+
const output = (result.stdout || "") + (result.stderr || "");
|
|
244
|
+
const sudoMatch = output.match(/sudo\s+env\s+.*pm2\s+startup.*/);
|
|
245
|
+
if (sudoMatch) {
|
|
246
|
+
console.log("[startup] PM2 startup requires sudo. Run this once:");
|
|
247
|
+
console.log(" " + sudoMatch[0]);
|
|
248
|
+
} else {
|
|
249
|
+
console.log("[startup] PM2 startup configured (launchd)");
|
|
250
|
+
}
|
|
251
|
+
const plistPath = pathJoin(homedir(), "Library", "LaunchAgents", `pm2.${process.env.USER || "user"}.plist`);
|
|
252
|
+
if (exists(plistPath)) {
|
|
253
|
+
try {
|
|
254
|
+
execSync(`launchctl load -w "${plistPath}"`, { timeout: 5e3, stdio: "ignore" });
|
|
255
|
+
} catch {
|
|
256
|
+
}
|
|
257
|
+
}
|
|
258
|
+
} else if (platform === "linux") {
|
|
259
|
+
const result = spawnSync("pm2", ["startup", "systemd", "--silent"], {
|
|
260
|
+
timeout: 15e3,
|
|
261
|
+
stdio: "pipe",
|
|
262
|
+
encoding: "utf-8"
|
|
263
|
+
});
|
|
264
|
+
const output = (result.stdout || "") + (result.stderr || "");
|
|
265
|
+
const sudoMatch = output.match(/sudo\s+env\s+.*pm2\s+startup.*/);
|
|
266
|
+
if (sudoMatch) {
|
|
267
|
+
try {
|
|
268
|
+
execSync(sudoMatch[0], { timeout: 15e3, stdio: "ignore" });
|
|
269
|
+
console.log("[startup] PM2 startup configured (systemd)");
|
|
270
|
+
} catch {
|
|
271
|
+
console.log("[startup] PM2 startup requires root. Run this once:");
|
|
272
|
+
console.log(" " + sudoMatch[0]);
|
|
273
|
+
}
|
|
274
|
+
} else {
|
|
275
|
+
console.log("[startup] PM2 startup configured (systemd)");
|
|
276
|
+
}
|
|
277
|
+
} else if (platform === "win32") {
|
|
278
|
+
try {
|
|
279
|
+
execSync("npm list -g pm2-windows-startup", { timeout: 1e4, stdio: "ignore" });
|
|
280
|
+
} catch {
|
|
281
|
+
console.log("[startup] Installing pm2-windows-startup...");
|
|
282
|
+
try {
|
|
283
|
+
execSync("npm install -g pm2-windows-startup", { timeout: 6e4, stdio: "ignore" });
|
|
284
|
+
execSync("pm2-startup install", { timeout: 15e3, stdio: "ignore" });
|
|
285
|
+
console.log("[startup] PM2 startup configured (Windows Service)");
|
|
286
|
+
} catch (e) {
|
|
287
|
+
console.warn("[startup] Could not install pm2-windows-startup: " + e.message);
|
|
288
|
+
}
|
|
289
|
+
}
|
|
290
|
+
}
|
|
291
|
+
} catch (e) {
|
|
292
|
+
console.warn("[startup] PM2 startup setup: " + e.message);
|
|
293
|
+
}
|
|
294
|
+
try {
|
|
295
|
+
const moduleList = execSync("pm2 ls --silent 2>/dev/null || true", { timeout: 1e4, encoding: "utf-8" });
|
|
296
|
+
if (!moduleList.includes("pm2-logrotate")) {
|
|
297
|
+
console.log("[startup] Installing pm2-logrotate...");
|
|
298
|
+
execSync("pm2 install pm2-logrotate --silent", { timeout: 6e4, stdio: "ignore" });
|
|
299
|
+
execSync("pm2 set pm2-logrotate:max_size 10M --silent", { timeout: 5e3, stdio: "ignore" });
|
|
300
|
+
execSync("pm2 set pm2-logrotate:retain 5 --silent", { timeout: 5e3, stdio: "ignore" });
|
|
301
|
+
execSync("pm2 set pm2-logrotate:compress true --silent", { timeout: 5e3, stdio: "ignore" });
|
|
302
|
+
console.log("[startup] Log rotation configured (10MB, 5 files)");
|
|
303
|
+
}
|
|
304
|
+
} catch {
|
|
305
|
+
}
|
|
306
|
+
try {
|
|
307
|
+
execSync("pm2 save --silent", { timeout: 1e4, stdio: "ignore" });
|
|
308
|
+
console.log("[startup] Process list saved");
|
|
309
|
+
} catch {
|
|
310
|
+
}
|
|
311
|
+
try {
|
|
312
|
+
if (!exists(markerDir)) mkdirSync(markerDir, { recursive: true });
|
|
313
|
+
writeFileSync(markerFile, (/* @__PURE__ */ new Date()).toISOString() + `
|
|
314
|
+
platform=${platform}
|
|
315
|
+
`, { mode: 384 });
|
|
316
|
+
console.log("[startup] System persistence configured successfully");
|
|
317
|
+
} catch {
|
|
318
|
+
}
|
|
319
|
+
}
|
|
320
|
+
export {
|
|
321
|
+
runServe
|
|
322
|
+
};
|
package/dist/cli.js
CHANGED
|
@@ -65,14 +65,14 @@ Skill Development:
|
|
|
65
65
|
break;
|
|
66
66
|
case "serve":
|
|
67
67
|
case "start":
|
|
68
|
-
import("./cli-serve-
|
|
68
|
+
import("./cli-serve-6WVHPRYG.js").then((m) => m.runServe(args.slice(1))).catch(fatal);
|
|
69
69
|
break;
|
|
70
70
|
case "agent":
|
|
71
|
-
import("./cli-agent-
|
|
71
|
+
import("./cli-agent-HPLSQ3SO.js").then((m) => m.runAgent(args.slice(1))).catch(fatal);
|
|
72
72
|
break;
|
|
73
73
|
case "setup":
|
|
74
74
|
default:
|
|
75
|
-
import("./setup-
|
|
75
|
+
import("./setup-CCOBENHY.js").then((m) => m.runSetupWizard()).catch(fatal);
|
|
76
76
|
break;
|
|
77
77
|
}
|
|
78
78
|
function fatal(err) {
|
|
@@ -1787,9 +1787,19 @@ export function PolymarketPage() {
|
|
|
1787
1787
|
h('div', { style: _tip }, h('strong', null, 'Tip: '), 'Create an agent with the "Polymarket Trader" template (Finance category) to get started.')
|
|
1788
1788
|
)
|
|
1789
1789
|
),
|
|
1790
|
+
wallet && wallet.mismatch && h('div', { style: { padding: '12px 16px', marginBottom: 16, background: 'rgba(239,68,68,0.1)', border: '2px solid rgba(239,68,68,0.4)', borderRadius: 8, color: '#dc2626' } },
|
|
1791
|
+
h('strong', null, '\u26A0 WALLET KEY MISMATCH — '),
|
|
1792
|
+
'The private key in the database derives address ',
|
|
1793
|
+
h('code', { style: { fontSize: 12 } }, shortAddr(wallet.signerAddress)),
|
|
1794
|
+
' but your funded wallet is ',
|
|
1795
|
+
h('code', { style: { fontSize: 12 } }, shortAddr(wallet.address)),
|
|
1796
|
+
'. The agent cannot access funds at the stored address. ',
|
|
1797
|
+
h('strong', null, 'This is likely caused by a VAULT_KEY change. '),
|
|
1798
|
+
'Check your VAULT_KEY environment variable matches the one used when the wallet was created, then restart.'
|
|
1799
|
+
),
|
|
1790
1800
|
h('div', { className: 'stats-grid', style: { display: "grid", gridTemplateColumns: "repeat(auto-fill,minmax(160px,1fr))", gap: "12px", marginBottom: "24px" } },
|
|
1791
|
-
statCard('Funder', wallet ? shortAddr(wallet.address) : 'Not set', wallet ? 'Connected' : null),
|
|
1792
|
-
wallet && wallet.signerAddress && wallet.signerAddress !== wallet.address ? statCard('Signer', shortAddr(wallet.signerAddress), 'Trading key') : null,
|
|
1801
|
+
statCard('Funder', wallet ? shortAddr(wallet.address) : 'Not set', wallet ? (wallet.mismatch ? 'KEY MISMATCH' : 'Connected') : null),
|
|
1802
|
+
wallet && wallet.signerAddress && wallet.signerAddress !== wallet.address ? statCard('Signer', shortAddr(wallet.signerAddress), wallet.mismatch ? 'Wrong key!' : 'Trading key') : null,
|
|
1793
1803
|
statCard('Mode', config?.mode || 'N/A'),
|
|
1794
1804
|
statCard('Pending', pendingTrades.length),
|
|
1795
1805
|
statCard('Live Positions', livePositions.length),
|
|
@@ -2950,9 +2960,20 @@ export function PolymarketPage() {
|
|
|
2950
2960
|
h('strong', null, '\u26A0 SECURITY WARNING'), h('br'),
|
|
2951
2961
|
'Anyone with this key has FULL CONTROL of this wallet and all funds. Never share it. Never paste it into untrusted sites.'
|
|
2952
2962
|
),
|
|
2963
|
+
exportedKey.mismatch && h('div', { style: { padding: 12, background: 'rgba(239,68,68,0.15)', border: '2px solid rgba(239,68,68,0.5)', borderRadius: 8, marginBottom: 16, fontSize: 12, color: '#dc2626', lineHeight: 1.6 } },
|
|
2964
|
+
h('strong', null, '\u26A0 CRITICAL: KEY MISMATCH'), h('br'),
|
|
2965
|
+
'This private key derives address ', h('code', null, exportedKey.address),
|
|
2966
|
+
' but your funded wallet is ', h('code', null, exportedKey.storedFunderAddress), '. ',
|
|
2967
|
+
h('br'), h('strong', null, 'The agent CANNOT access funds at the stored address. '),
|
|
2968
|
+
'This is likely caused by a VAULT_KEY environment variable change. Restore the original VAULT_KEY and restart to recover access.'
|
|
2969
|
+
),
|
|
2953
2970
|
h('div', { style: { marginBottom: 16 } },
|
|
2954
|
-
h('label', { style: _labelStyle }, 'Wallet Address'),
|
|
2955
|
-
h('div', { style: { fontFamily: 'var(--font-mono)', fontSize: 13, padding: '10px 12px', background: 'var(--bg-secondary)', borderRadius: 6, wordBreak: 'break-all', userSelect: 'all' } }, exportedKey.address)
|
|
2971
|
+
h('label', { style: _labelStyle }, exportedKey.mismatch ? 'Derived Address (from private key)' : 'Wallet Address'),
|
|
2972
|
+
h('div', { style: { fontFamily: 'var(--font-mono)', fontSize: 13, padding: '10px 12px', background: 'var(--bg-secondary)', borderRadius: 6, wordBreak: 'break-all', userSelect: 'all' } }, exportedKey.address),
|
|
2973
|
+
exportedKey.mismatch && h('div', { style: { marginTop: 8 } },
|
|
2974
|
+
h('label', { style: _labelStyle }, 'Stored Funder Address (has funds)'),
|
|
2975
|
+
h('div', { style: { fontFamily: 'var(--font-mono)', fontSize: 13, padding: '10px 12px', background: 'rgba(239,68,68,0.06)', borderRadius: 6, wordBreak: 'break-all', userSelect: 'all', border: '1px solid rgba(239,68,68,0.2)' } }, exportedKey.storedFunderAddress)
|
|
2976
|
+
)
|
|
2956
2977
|
),
|
|
2957
2978
|
h('div', { style: { marginBottom: 16 } },
|
|
2958
2979
|
h('label', { style: _labelStyle }, 'Private Key'),
|
package/dist/index.js
CHANGED
|
@@ -7,7 +7,7 @@ import {
|
|
|
7
7
|
import {
|
|
8
8
|
provision,
|
|
9
9
|
runSetupWizard
|
|
10
|
-
} from "./chunk-
|
|
10
|
+
} from "./chunk-OW7QTPAQ.js";
|
|
11
11
|
import {
|
|
12
12
|
AgenticMailManager,
|
|
13
13
|
GoogleEmailProvider,
|
|
@@ -43,7 +43,7 @@ import {
|
|
|
43
43
|
requireRole,
|
|
44
44
|
securityHeaders,
|
|
45
45
|
validate
|
|
46
|
-
} from "./chunk-
|
|
46
|
+
} from "./chunk-ALQ4KGMS.js";
|
|
47
47
|
import "./chunk-DJBCRQTD.js";
|
|
48
48
|
import {
|
|
49
49
|
PROVIDER_REGISTRY,
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
import {
|
|
2
|
+
createServer
|
|
3
|
+
} from "./chunk-ALQ4KGMS.js";
|
|
4
|
+
import "./chunk-DJBCRQTD.js";
|
|
5
|
+
import "./chunk-UF3ZJMJO.js";
|
|
6
|
+
import "./chunk-UEUOUZOD.js";
|
|
7
|
+
import "./chunk-TK55CSBH.js";
|
|
8
|
+
import "./chunk-Z7NVD3OQ.js";
|
|
9
|
+
import "./chunk-VSBC4SWO.js";
|
|
10
|
+
import "./chunk-AF3WSNVX.js";
|
|
11
|
+
import "./chunk-74ZCQKYU.js";
|
|
12
|
+
import "./chunk-ET6WZFPS.js";
|
|
13
|
+
import "./chunk-FQWJMPKW.js";
|
|
14
|
+
import "./chunk-ZW7JLXWZ.js";
|
|
15
|
+
import "./chunk-NCODRQSS.js";
|
|
16
|
+
import "./chunk-PSZU6FMQ.js";
|
|
17
|
+
import "./chunk-PV334IXV.js";
|
|
18
|
+
import "./chunk-X5IZUXDC.js";
|
|
19
|
+
import "./chunk-I5IGHBXW.js";
|
|
20
|
+
import "./chunk-3OB247K5.js";
|
|
21
|
+
import "./chunk-WUAWWKTN.js";
|
|
22
|
+
import "./chunk-2CDGYMJK.js";
|
|
23
|
+
import "./chunk-V3LPIDTL.js";
|
|
24
|
+
import "./chunk-A4CX3XQS.js";
|
|
25
|
+
import "./chunk-BUJVI44B.js";
|
|
26
|
+
import "./chunk-YDD5TC5Q.js";
|
|
27
|
+
import "./chunk-37ABTUFU.js";
|
|
28
|
+
import "./chunk-NU657BBQ.js";
|
|
29
|
+
import "./chunk-PGAU3W3M.js";
|
|
30
|
+
import "./chunk-FLQ5FLHW.js";
|
|
31
|
+
import "./chunk-TOGMCQSJ.js";
|
|
32
|
+
import "./chunk-22U7TZPN.js";
|
|
33
|
+
import "./chunk-KFQGP6VL.js";
|
|
34
|
+
export {
|
|
35
|
+
createServer
|
|
36
|
+
};
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
import {
|
|
2
|
+
promptCompanyInfo,
|
|
3
|
+
promptDatabase,
|
|
4
|
+
promptDeployment,
|
|
5
|
+
promptDomain,
|
|
6
|
+
promptRegistration,
|
|
7
|
+
provision,
|
|
8
|
+
runSetupWizard
|
|
9
|
+
} from "./chunk-OW7QTPAQ.js";
|
|
10
|
+
import "./chunk-5KB5MAZK.js";
|
|
11
|
+
import "./chunk-KFQGP6VL.js";
|
|
12
|
+
export {
|
|
13
|
+
promptCompanyInfo,
|
|
14
|
+
promptDatabase,
|
|
15
|
+
promptDeployment,
|
|
16
|
+
promptDomain,
|
|
17
|
+
promptRegistration,
|
|
18
|
+
provision,
|
|
19
|
+
runSetupWizard
|
|
20
|
+
};
|
|
@@ -82,3 +82,7 @@
|
|
|
82
82
|
2026-03-15 01:46:09: 2026-03-15T00:46:09Z ERR Request failed error="stream 8165 canceled by remote with error code 0" connIndex=3 dest=https://enterprise.agenticmail.io/api/polymarket/67ba24f1-c8af-40b4-9df5-c05b81fc1e7a/price-stream event=0 ip=198.41.200.23 type=http
|
|
83
83
|
2026-03-15 01:46:15: 2026-03-15T00:46:15Z ERR error="stream 405 canceled by remote with error code 0" connIndex=2 event=1 ingressRule=0 originService=http://localhost:3100
|
|
84
84
|
2026-03-15 01:46:15: 2026-03-15T00:46:15Z ERR Request failed error="stream 405 canceled by remote with error code 0" connIndex=2 dest=https://enterprise.agenticmail.io/api/polymarket/stream?agentId=67ba24f1-c8af-40b4-9df5-c05b81fc1e7a event=0 ip=198.41.192.167 type=http
|
|
85
|
+
2026-03-15 02:06:35: 2026-03-15T01:06:35Z ERR error="stream 8853 canceled by remote with error code 0" connIndex=3 event=1 ingressRule=0 originService=http://localhost:3100
|
|
86
|
+
2026-03-15 02:06:35: 2026-03-15T01:06:35Z ERR Request failed error="stream 8853 canceled by remote with error code 0" connIndex=3 dest=https://enterprise.agenticmail.io/api/polymarket/67ba24f1-c8af-40b4-9df5-c05b81fc1e7a/price-stream event=0 ip=198.41.200.23 type=http
|
|
87
|
+
2026-03-15 02:06:41: 2026-03-15T01:06:41Z ERR error="stream 8857 canceled by remote with error code 0" connIndex=3 event=1 ingressRule=0 originService=http://localhost:3100
|
|
88
|
+
2026-03-15 02:06:41: 2026-03-15T01:06:41Z ERR Request failed error="stream 8857 canceled by remote with error code 0" connIndex=3 dest=https://enterprise.agenticmail.io/api/polymarket/stream?agentId=67ba24f1-c8af-40b4-9df5-c05b81fc1e7a event=0 ip=198.41.200.23 type=http
|