@agentsh/secure-sandbox 0.1.3 → 0.1.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-Cz86hRBQ.js';
1
+ import { S as SandboxAdapter } from '../types-CUqsllMs.js';
2
2
 
3
3
  declare function blaxel(sandbox: any): SandboxAdapter;
4
4
 
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-Cz86hRBQ.js';
1
+ import { S as SandboxAdapter } from '../types-CUqsllMs.js';
2
2
 
3
3
  declare function cloudflare(sandbox: any): SandboxAdapter;
4
4
 
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-Cz86hRBQ.js';
1
+ import { S as SandboxAdapter } from '../types-CUqsllMs.js';
2
2
 
3
3
  declare function daytona(sandbox: any): SandboxAdapter;
4
4
 
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-Cz86hRBQ.js';
1
+ import { S as SandboxAdapter } from '../types-CUqsllMs.js';
2
2
 
3
3
  declare function e2b(sandbox: any): SandboxAdapter;
4
4
 
@@ -3,4 +3,4 @@ export { e2b } from './e2b.js';
3
3
  export { daytona } from './daytona.js';
4
4
  export { cloudflare } from './cloudflare.js';
5
5
  export { blaxel } from './blaxel.js';
6
- import '../types-Cz86hRBQ.js';
6
+ import '../types-CUqsllMs.js';
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-Cz86hRBQ.js';
1
+ import { S as SandboxAdapter } from '../types-CUqsllMs.js';
2
2
 
3
3
  declare function vercel(sandbox: any): SandboxAdapter;
4
4
 
@@ -171,13 +171,33 @@ var ConnectRedirectSchema = z.object({
171
171
  match: z.string(),
172
172
  redirectTo: z.string()
173
173
  }).strict();
174
+ var LicenseSpdxMatchSchema = z.object({
175
+ allow: z.array(z.string()).optional(),
176
+ deny: z.array(z.string()).optional()
177
+ }).strict();
178
+ var PackageMatchSchema = z.object({
179
+ packages: z.array(z.string()).optional(),
180
+ namePatterns: z.array(z.string()).optional(),
181
+ findingType: z.string().optional(),
182
+ severity: stringOrArray.optional(),
183
+ reasons: z.array(z.string()).optional(),
184
+ licenseSpdx: LicenseSpdxMatchSchema.optional(),
185
+ ecosystem: z.string().optional(),
186
+ options: z.record(z.unknown()).optional()
187
+ }).strict();
188
+ var PackageRuleSchema = z.object({
189
+ match: PackageMatchSchema,
190
+ action: z.enum(["allow", "warn", "approve", "block"]),
191
+ reason: z.string().optional()
192
+ }).strict();
174
193
  var PolicyDefinitionSchema = z.object({
175
194
  file: z.array(FileRuleSchema).optional(),
176
195
  network: z.array(NetworkRuleSchema).optional(),
177
196
  commands: z.array(CommandRuleSchema).optional(),
178
197
  env: z.array(EnvRuleSchema).optional(),
179
198
  dns: z.array(DnsRedirectSchema).optional(),
180
- connect: z.array(ConnectRedirectSchema).optional()
199
+ connect: z.array(ConnectRedirectSchema).optional(),
200
+ packageRules: z.array(PackageRuleSchema).optional()
181
201
  }).strict();
182
202
  function validatePolicy(policy) {
183
203
  try {
@@ -191,7 +211,7 @@ function validatePolicy(policy) {
191
211
  }
192
212
 
193
213
  // src/policies/merge.ts
194
- var CATEGORIES = ["file", "network", "commands", "env", "dns", "connect"];
214
+ var CATEGORIES = ["file", "network", "commands", "env", "dns", "connect", "packageRules"];
195
215
  function merge(base, ...overrides) {
196
216
  return validatePolicy(mergeInternal(base, overrides, "append"));
197
217
  }
@@ -331,6 +351,50 @@ function agentDefault(extensions) {
331
351
  redirect: ["curl", "wget"],
332
352
  to: { cmd: "agentsh-fetch", args: ["--audit"] }
333
353
  }
354
+ ],
355
+ packageRules: [
356
+ // Critical vulnerability = block
357
+ {
358
+ match: { findingType: "vulnerability", severity: "critical" },
359
+ action: "block",
360
+ reason: "Critical vulnerability \u2014 review before installing"
361
+ },
362
+ // Known malware = block
363
+ {
364
+ match: { findingType: "malware" },
365
+ action: "block",
366
+ reason: "Known malware detected"
367
+ },
368
+ // Typosquat = block
369
+ {
370
+ match: { findingType: "reputation", reasons: ["typosquat"] },
371
+ action: "block",
372
+ reason: "Package flagged as potential typosquat"
373
+ },
374
+ // Medium vulnerability = warn
375
+ {
376
+ match: { findingType: "vulnerability", severity: "medium" },
377
+ action: "warn",
378
+ reason: "Medium vulnerability \u2014 review before using"
379
+ },
380
+ // Copyleft licenses = block
381
+ {
382
+ match: {
383
+ findingType: "license",
384
+ licenseSpdx: { deny: ["AGPL-3.0-only", "SSPL-1.0"] }
385
+ },
386
+ action: "block",
387
+ reason: "Copyleft license incompatible with proprietary code"
388
+ },
389
+ // Package too new = approve (requires human confirmation)
390
+ {
391
+ match: {
392
+ findingType: "reputation",
393
+ reasons: ["package_too_new"]
394
+ },
395
+ action: "approve",
396
+ reason: "Package published recently \u2014 requires approval"
397
+ }
334
398
  ]
335
399
  };
336
400
  return extensions ? merge(base, extensions) : base;
@@ -511,6 +575,43 @@ function serializeConnectRedirects(redirects) {
511
575
  redirect_to: r.redirectTo
512
576
  }));
513
577
  }
578
+ function serializePackageRules(rules) {
579
+ return rules.map((rule) => {
580
+ const match = {};
581
+ if (rule.match.packages) {
582
+ match.packages = rule.match.packages;
583
+ }
584
+ if (rule.match.namePatterns) {
585
+ match.name_patterns = rule.match.namePatterns;
586
+ }
587
+ if (rule.match.findingType) {
588
+ match.finding_type = rule.match.findingType;
589
+ }
590
+ if (rule.match.severity !== void 0) {
591
+ match.severity = rule.match.severity;
592
+ }
593
+ if (rule.match.reasons) {
594
+ match.reasons = rule.match.reasons;
595
+ }
596
+ if (rule.match.licenseSpdx) {
597
+ match.license_spdx = rule.match.licenseSpdx;
598
+ }
599
+ if (rule.match.ecosystem) {
600
+ match.ecosystem = rule.match.ecosystem;
601
+ }
602
+ if (rule.match.options) {
603
+ match.options = rule.match.options;
604
+ }
605
+ const out = {
606
+ match,
607
+ action: rule.action
608
+ };
609
+ if (rule.reason) {
610
+ out.reason = rule.reason;
611
+ }
612
+ return out;
613
+ });
614
+ }
514
615
  function serializePolicy(policy) {
515
616
  const doc = {
516
617
  version: 1,
@@ -534,6 +635,9 @@ function serializePolicy(policy) {
534
635
  if (policy.connect && policy.connect.length > 0) {
535
636
  doc.connect_redirects = serializeConnectRedirects(policy.connect);
536
637
  }
638
+ if (policy.packageRules && policy.packageRules.length > 0) {
639
+ doc.package_rules = serializePackageRules(policy.packageRules);
640
+ }
537
641
  return yaml.dump(doc, { lineWidth: -1 });
538
642
  }
539
643
  function systemPolicyYaml() {
@@ -596,4 +700,4 @@ export {
596
700
  agentSandbox,
597
701
  policies_exports
598
702
  };
599
- //# sourceMappingURL=chunk-NWHVZ3DG.js.map
703
+ //# sourceMappingURL=chunk-GFPHTJLU.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/policies/index.ts","../src/policies/schema.ts","../src/core/errors.ts","../src/policies/merge.ts","../src/policies/presets.ts","../src/policies/serialize.ts"],"sourcesContent":["export { PolicyDefinitionSchema, validatePolicy } from './schema.js';\nexport type { PolicyDefinition, FileRule, NetworkRule, CommandRule, EnvRule, DnsRedirect, ConnectRedirect } from './schema.js';\nexport { agentDefault, devSafe, ciStrict, agentSandbox } from './presets.js';\nexport { merge, mergePrepend } from './merge.js';\nexport { serializePolicy, systemPolicyYaml } from './serialize.js';\n","import { z, ZodError } from 'zod';\nimport { PolicyValidationError } from '../core/errors.js';\n\n// ─── Shared helpers ─────────────────────────────────────────\n\nconst stringOrArray = z.union([z.string(), z.array(z.string())]);\n\n// ─── File rules ─────────────────────────────────────────────\n\nexport const FileOpSchema = z.enum(['read', 'write', 'create', 'delete']);\n\nconst FileAllowRule = z\n .object({ allow: stringOrArray, ops: z.array(FileOpSchema).optional() })\n .strict();\n\nconst FileDenyRule = z\n .object({ deny: stringOrArray, ops: z.array(FileOpSchema).optional() })\n .strict();\n\nconst FileRedirectRule = z\n .object({\n redirect: stringOrArray,\n to: z.string(),\n ops: z.array(FileOpSchema).optional(),\n })\n .strict();\n\nconst FileAuditRule = z\n .object({ audit: stringOrArray, ops: z.array(FileOpSchema).optional() })\n .strict();\n\nconst FileSoftDeleteRule = z.object({ softDelete: stringOrArray }).strict();\n\nexport const FileRuleSchema = z.union([\n FileAllowRule,\n FileDenyRule,\n FileRedirectRule,\n FileAuditRule,\n FileSoftDeleteRule,\n]);\n\n// ─── Network rules ──────────────────────────────────────────\n\nconst NetworkAllowRule = z\n .object({\n allow: stringOrArray,\n ports: z.array(z.number().int().min(1).max(65535)).optional(),\n })\n .strict();\n\nconst NetworkDenyRule = z.object({ deny: stringOrArray }).strict();\n\nconst NetworkRedirectRule = z\n .object({ redirect: z.string(), to: z.string() })\n .strict();\n\nexport const NetworkRuleSchema = z.union([\n NetworkAllowRule,\n NetworkDenyRule,\n NetworkRedirectRule,\n]);\n\n// ─── Command rules ──────────────────────────────────────────\n\nconst CommandRedirectTarget = z.union([\n z.string(),\n z.object({ cmd: z.string(), args: z.array(z.string()) }).strict(),\n]);\n\nconst CommandAllowRule = z.object({ allow: stringOrArray }).strict();\n\nconst CommandDenyRule = z.object({ deny: stringOrArray }).strict();\n\nconst CommandRedirectRule = z\n .object({ redirect: stringOrArray, to: CommandRedirectTarget })\n .strict();\n\nexport const CommandRuleSchema = z.union([\n CommandAllowRule,\n CommandDenyRule,\n CommandRedirectRule,\n]);\n\n// ─── Env rules ──────────────────────────────────────────────\n\nexport const EnvRuleSchema = z\n .object({\n commands: z.array(z.string()),\n allow: z.array(z.string()).optional(),\n deny: z.array(z.string()).optional(),\n })\n .strict();\n\n// ─── DNS / Connect redirects ────────────────────────────────\n\nexport const DnsRedirectSchema = z\n .object({\n match: z.string(),\n resolveTo: z.string(),\n })\n .strict();\n\nexport const ConnectRedirectSchema = z\n .object({\n match: z.string(),\n redirectTo: z.string(),\n })\n .strict();\n\n// ─── Package rules ──────────────────────────────────────────\n\nconst LicenseSpdxMatchSchema = z\n .object({\n allow: z.array(z.string()).optional(),\n deny: z.array(z.string()).optional(),\n })\n .strict();\n\nconst PackageMatchSchema = z\n .object({\n packages: z.array(z.string()).optional(),\n namePatterns: z.array(z.string()).optional(),\n findingType: z.string().optional(),\n severity: stringOrArray.optional(),\n reasons: z.array(z.string()).optional(),\n licenseSpdx: LicenseSpdxMatchSchema.optional(),\n ecosystem: z.string().optional(),\n options: z.record(z.unknown()).optional(),\n })\n .strict();\n\nexport const PackageRuleSchema = z\n .object({\n match: PackageMatchSchema,\n action: z.enum(['allow', 'warn', 'approve', 'block']),\n reason: z.string().optional(),\n })\n .strict();\n\n// ─── PolicyDefinition ───────────────────────────────────────\n\nexport const PolicyDefinitionSchema = z\n .object({\n file: z.array(FileRuleSchema).optional(),\n network: z.array(NetworkRuleSchema).optional(),\n commands: z.array(CommandRuleSchema).optional(),\n env: z.array(EnvRuleSchema).optional(),\n dns: z.array(DnsRedirectSchema).optional(),\n connect: z.array(ConnectRedirectSchema).optional(),\n packageRules: z.array(PackageRuleSchema).optional(),\n })\n .strict();\n\n// ─── Inferred types ─────────────────────────────────────────\n\nexport type PolicyDefinition = z.infer<typeof PolicyDefinitionSchema>;\nexport type FileOp = z.infer<typeof FileOpSchema>;\nexport type FileRule = z.infer<typeof FileRuleSchema>;\nexport type NetworkRule = z.infer<typeof NetworkRuleSchema>;\nexport type CommandRule = z.infer<typeof CommandRuleSchema>;\nexport type EnvRule = z.infer<typeof EnvRuleSchema>;\nexport type DnsRedirect = z.infer<typeof DnsRedirectSchema>;\nexport type ConnectRedirect = z.infer<typeof ConnectRedirectSchema>;\nexport type PackageRule = z.infer<typeof PackageRuleSchema>;\n\n// ─── Validation ─────────────────────────────────────────────\n\nexport function validatePolicy(policy: unknown): PolicyDefinition {\n try {\n return PolicyDefinitionSchema.parse(policy);\n } catch (err) {\n if (err instanceof ZodError) {\n throw new PolicyValidationError({ issues: err.issues });\n }\n throw err;\n }\n}\n","import type { ZodIssue } from 'zod';\n\nexport class AgentSHError extends Error {\n constructor(message: string) {\n super(message);\n this.name = 'AgentSHError';\n }\n}\n\nexport class PolicyValidationError extends AgentSHError {\n readonly issues: ZodIssue[];\n\n constructor({ issues }: { issues: ZodIssue[] }) {\n const summaries = issues\n .map((issue) => `${issue.path.join('.')}: ${issue.message}`)\n .join('; ');\n super(`Policy validation failed: ${summaries}`);\n this.name = 'PolicyValidationError';\n this.issues = issues;\n }\n}\n\nexport class MissingPeerDependencyError extends AgentSHError {\n readonly packageName: string;\n readonly versionRange: string;\n\n constructor({\n packageName,\n versionRange,\n }: {\n packageName: string;\n versionRange: string;\n }) {\n super(\n `${packageName} is required but not installed. Run: npm install ${packageName}@\"${versionRange}\"`,\n );\n this.name = 'MissingPeerDependencyError';\n this.packageName = packageName;\n this.versionRange = versionRange;\n }\n}\n\nexport class IncompatibleProviderVersionError extends AgentSHError {\n readonly installed: string;\n readonly required: string;\n readonly packageName: string;\n\n constructor({\n installed,\n required,\n packageName,\n }: {\n installed: string;\n required: string;\n packageName: string;\n }) {\n super(\n `${packageName} version ${installed} is not supported. @agentsh/secure-sandbox requires ${packageName} ${required}. Please upgrade: npm install ${packageName}@latest`,\n );\n this.name = 'IncompatibleProviderVersionError';\n this.installed = installed;\n this.required = required;\n this.packageName = packageName;\n }\n}\n\nexport class ProvisioningError extends AgentSHError {\n readonly phase: string;\n readonly command: string;\n readonly stderr: string;\n\n constructor({\n phase,\n command,\n stderr,\n }: {\n phase: string;\n command: string;\n stderr: string;\n }) {\n super(`Provisioning failed at phase: ${phase}`);\n this.name = 'ProvisioningError';\n this.phase = phase;\n this.command = command;\n this.stderr = stderr;\n }\n}\n\nexport class IntegrityError extends AgentSHError {\n readonly expected: string;\n readonly actual: string;\n\n constructor({\n expected,\n actual,\n message,\n }: {\n expected: string;\n actual: string;\n message?: string;\n }) {\n super(message ?? `Checksum mismatch: expected ${expected}, got ${actual}`);\n this.name = 'IntegrityError';\n this.expected = expected;\n this.actual = actual;\n }\n}\n\nexport class RuntimeError extends AgentSHError {\n readonly sessionId: string;\n readonly command: string;\n readonly stderr: string;\n\n constructor({\n sessionId,\n command,\n stderr,\n }: {\n sessionId: string;\n command: string;\n stderr: string;\n }) {\n super(`agentsh exec failed (session ${sessionId})`);\n this.name = 'RuntimeError';\n this.sessionId = sessionId;\n this.command = command;\n this.stderr = stderr;\n }\n}\n","import type { PolicyDefinition } from './schema.js';\nimport { validatePolicy } from './schema.js';\n\nconst CATEGORIES = ['file', 'network', 'commands', 'env', 'dns', 'connect', 'packageRules'] as const;\n\n/**\n * Merge policy overrides AFTER base rules for each category.\n * Since agentsh evaluates first-match-wins, appended rules only apply\n * to paths not already matched by base.\n */\nexport function merge(base: PolicyDefinition, ...overrides: Partial<PolicyDefinition>[]): PolicyDefinition {\n return validatePolicy(mergeInternal(base, overrides, 'append'));\n}\n\n/**\n * Merge policy overrides BEFORE base rules for each category,\n * making overrides take priority in first-match-wins evaluation.\n */\nexport function mergePrepend(base: PolicyDefinition, ...overrides: Partial<PolicyDefinition>[]): PolicyDefinition {\n return validatePolicy(mergeInternal(base, overrides, 'prepend'));\n}\n\nfunction mergeInternal(\n base: PolicyDefinition,\n overrides: Partial<PolicyDefinition>[],\n mode: 'append' | 'prepend',\n): PolicyDefinition {\n const result: any = { ...base };\n for (const override of overrides) {\n for (const key of CATEGORIES) {\n if (override[key] != null) {\n const baseRules = result[key] ?? [];\n result[key] = mode === 'append'\n ? [...baseRules, ...override[key]!]\n : [...override[key]!, ...baseRules];\n }\n }\n }\n return result;\n}\n","import type { PolicyDefinition } from './schema.js';\nimport { merge } from './merge.js';\n\n// ─── agentDefault ──────────────────────────────────────────\n\n/**\n * Comprehensive policy for AI coding agents. This is the DEFAULT policy\n * used when no policy is specified. Based on agentsh v0.13's agent-default\n * policy.\n */\nexport function agentDefault(\n extensions?: Partial<PolicyDefinition>,\n): PolicyDefinition {\n const base: PolicyDefinition = {\n file: [\n { allow: '/workspace/**', ops: ['read', 'write', 'create'] },\n // Git/version-control credentials\n { deny: ['/workspace/.git/config', '/workspace/.netrc'] },\n // Secrets and credentials\n { deny: ['**/.env', '**/.env.*', '**/credentials*', '**/*.pem', '**/*.key'] },\n { deny: ['~/.ssh/**', '/proc/*/environ'] },\n // Cloud provider credentials\n { deny: ['~/.aws/**', '~/.gcp/**', '~/.azure/**', '~/.config/gcloud/**'] },\n // Shell config injection (persistence)\n { deny: ['~/.bashrc', '~/.zshrc', '~/.profile', '~/.bash_profile'] },\n // Credential stores\n { deny: ['~/.gitconfig', '~/.netrc', '~/.curlrc', '~/.wgetrc'] },\n // PATH hijacking\n { deny: '~/.local/bin/**' },\n // Agent config files — allow reads (project context), deny writes (prompt injection persistence)\n { deny: ['**/.cursorrules', '**/CLAUDE.md', '**/copilot-instructions.md'], ops: ['write', 'create', 'delete'] },\n ],\n network: [\n {\n allow: [\n 'registry.npmjs.org',\n 'registry.yarnpkg.com',\n 'pypi.org',\n 'files.pythonhosted.org',\n 'crates.io',\n 'static.crates.io',\n 'index.crates.io',\n 'proxy.golang.org',\n 'sum.golang.org',\n 'github.com',\n 'raw.githubusercontent.com',\n ],\n ports: [443],\n },\n { deny: '*' },\n ],\n commands: [\n // Allow safe commands (order matters — first match wins)\n {\n allow: [\n 'bash', 'sh', 'echo', 'cat', 'head', 'tail', 'grep', 'find',\n 'ls', 'wc', 'sort', 'uniq', 'diff', 'pwd', 'date', 'which',\n 'whoami', 'id', 'uname', 'printf', 'test', 'true', 'false',\n 'mkdir', 'cp', 'mv', 'rm', 'touch', 'chmod', 'tr', 'cut',\n 'sed', 'awk', 'tee', 'xargs', 'basename', 'dirname', 'realpath',\n 'base64', 'md5sum', 'sha256sum', 'tar', 'gzip', 'gunzip',\n ],\n },\n // Allow dev tools\n {\n allow: [\n 'git', 'node', 'npm', 'npx', 'yarn', 'pnpm', 'bun',\n 'python', 'python3', 'pip', 'pip3',\n 'cargo', 'rustc', 'go', 'make', 'cmake',\n ],\n },\n // Deny dangerous commands\n { deny: ['env', 'printenv', 'sudo', 'su', 'doas'] },\n { deny: ['shutdown', 'reboot', 'halt', 'poweroff'] },\n { deny: ['nc', 'ncat', 'netcat', 'socat', 'telnet'] },\n { deny: ['git push --force', 'git reset --hard'] },\n {\n redirect: ['curl', 'wget'],\n to: { cmd: 'agentsh-fetch', args: ['--audit'] },\n },\n ],\n packageRules: [\n // Critical vulnerability = block\n {\n match: { findingType: 'vulnerability', severity: 'critical' },\n action: 'block',\n reason: 'Critical vulnerability — review before installing',\n },\n // Known malware = block\n {\n match: { findingType: 'malware' },\n action: 'block',\n reason: 'Known malware detected',\n },\n // Typosquat = block\n {\n match: { findingType: 'reputation', reasons: ['typosquat'] },\n action: 'block',\n reason: 'Package flagged as potential typosquat',\n },\n // Medium vulnerability = warn\n {\n match: { findingType: 'vulnerability', severity: 'medium' },\n action: 'warn',\n reason: 'Medium vulnerability — review before using',\n },\n // Copyleft licenses = block\n {\n match: {\n findingType: 'license',\n licenseSpdx: { deny: ['AGPL-3.0-only', 'SSPL-1.0'] },\n },\n action: 'block',\n reason: 'Copyleft license incompatible with proprietary code',\n },\n // Package too new = approve (requires human confirmation)\n {\n match: {\n findingType: 'reputation',\n reasons: ['package_too_new'],\n },\n action: 'approve',\n reason: 'Package published recently — requires approval',\n },\n ],\n };\n return extensions ? merge(base, extensions) : base;\n}\n\n// ─── devSafe ───────────────────────────────────────────────\n\n/**\n * Permissive defaults for local development. Not recommended for production.\n */\nexport function devSafe(\n extensions?: Partial<PolicyDefinition>,\n): PolicyDefinition {\n const base: PolicyDefinition = {\n file: [\n { allow: '/workspace/**', ops: ['read', 'write', 'create'] },\n { deny: ['**/.env', '**/.env.*', '**/credentials*', '**/*.pem', '**/*.key'] },\n { deny: ['~/.ssh/**', '/proc/*/environ'] },\n { deny: ['~/.aws/**', '~/.gcp/**', '~/.azure/**', '~/.config/gcloud/**'] },\n { deny: ['~/.bashrc', '~/.zshrc', '~/.profile', '~/.bash_profile'] },\n { deny: ['~/.gitconfig', '~/.netrc', '~/.curlrc', '~/.wgetrc'] },\n ],\n network: [\n {\n allow: ['registry.npmjs.org', 'registry.yarnpkg.com'],\n ports: [443],\n },\n ],\n commands: [{ deny: ['env', 'printenv', 'shutdown', 'reboot'] }],\n };\n return extensions ? merge(base, extensions) : base;\n}\n\n// ─── ciStrict ──────────────────────────────────────────────\n\n/**\n * Locked down for CI/CD runners.\n */\nexport function ciStrict(\n extensions?: Partial<PolicyDefinition>,\n): PolicyDefinition {\n const base: PolicyDefinition = {\n file: [\n { allow: '/workspace/**' },\n { deny: ['**/.env', '**/.env.*', '**/credentials*', '**/*.pem', '**/*.key'] },\n { deny: ['~/.aws/**', '~/.gcp/**', '~/.azure/**', '~/.config/gcloud/**'] },\n { deny: '/**' },\n ],\n network: [\n {\n allow: [\n 'registry.npmjs.org',\n 'registry.yarnpkg.com',\n 'pypi.org',\n 'files.pythonhosted.org',\n 'crates.io',\n 'static.crates.io',\n 'index.crates.io',\n 'proxy.golang.org',\n 'sum.golang.org',\n ],\n ports: [443],\n },\n { deny: '*' },\n ],\n commands: [\n { deny: ['env', 'printenv', 'shutdown', 'reboot', 'sudo'] },\n ],\n };\n return extensions ? merge(base, extensions) : base;\n}\n\n// ─── agentSandbox ──────────────────────────────────────────\n\n/**\n * Maximum restriction for untrusted code. Read-only workspace, no network.\n */\nexport function agentSandbox(\n extensions?: Partial<PolicyDefinition>,\n): PolicyDefinition {\n const base: PolicyDefinition = {\n file: [\n { allow: '/workspace/**', ops: ['read'] },\n { deny: '/**' },\n ],\n network: [{ deny: '*' }],\n commands: [\n { deny: ['env', 'printenv', 'sudo', 'su', 'shutdown', 'reboot'] },\n ],\n };\n return extensions ? merge(base, extensions) : base;\n}\n","import yaml from 'js-yaml';\nimport type {\n PolicyDefinition,\n FileRule,\n NetworkRule,\n CommandRule,\n EnvRule,\n DnsRedirect,\n ConnectRedirect,\n PackageRule,\n} from './schema.js';\n\n// ─── Helpers ────────────────────────────────────────────────\n\n/** Normalize a string-or-array value to always be an array. */\nfunction toArray(value: string | string[]): string[] {\n return Array.isArray(value) ? value : [value];\n}\n\n/** Detect the decision key from a rule object. */\ntype DecisionKey = 'allow' | 'deny' | 'redirect' | 'audit' | 'softDelete';\n\nconst FILE_DECISION_KEYS: DecisionKey[] = [\n 'allow',\n 'deny',\n 'redirect',\n 'audit',\n 'softDelete',\n];\n\nconst SIMPLE_DECISION_KEYS: DecisionKey[] = ['allow', 'deny', 'redirect'];\n\nfunction findDecision(\n rule: Record<string, unknown>,\n keys: DecisionKey[],\n): { key: DecisionKey; value: unknown } {\n for (const k of keys) {\n if (k in rule) {\n return { key: k, value: rule[k] };\n }\n }\n throw new Error(`No decision key found in rule: ${JSON.stringify(rule)}`);\n}\n\n/** Map softDelete → soft_delete for YAML output. */\nfunction yamlDecision(key: DecisionKey): string {\n return key === 'softDelete' ? 'soft_delete' : key;\n}\n\n// ─── File rules ─────────────────────────────────────────────\n\nfunction serializeFileRules(rules: FileRule[]): Record<string, unknown>[] {\n return rules.map((rule, i) => {\n const r = rule as Record<string, unknown>;\n const { key, value } = findDecision(r, FILE_DECISION_KEYS);\n const paths = toArray(value as string | string[]);\n\n const out: Record<string, unknown> = {\n name: `file-rule-${i}`,\n paths,\n };\n\n if ('ops' in r && r.ops) {\n out.operations = r.ops;\n }\n\n out.decision = yamlDecision(key);\n\n if (key === 'redirect' && 'to' in r) {\n out.redirect_to = r.to;\n }\n\n return out;\n });\n}\n\n// ─── Network rules ──────────────────────────────────────────\n\nfunction serializeNetworkRules(\n rules: NetworkRule[],\n): Record<string, unknown>[] {\n return rules.map((rule, i) => {\n const r = rule as Record<string, unknown>;\n const { key, value } = findDecision(r, SIMPLE_DECISION_KEYS);\n const domains = toArray(value as string | string[]);\n\n const out: Record<string, unknown> = {\n name: `network-rule-${i}`,\n domains,\n decision: key,\n };\n\n if ('ports' in r && r.ports) {\n out.ports = r.ports;\n }\n\n if (key === 'redirect' && 'to' in r) {\n out.redirect_to = r.to;\n }\n\n return out;\n });\n}\n\n// ─── Command rules ──────────────────────────────────────────\n\nfunction serializeCommandRules(\n rules: CommandRule[],\n): Record<string, unknown>[] {\n return rules.map((rule, i) => {\n const r = rule as Record<string, unknown>;\n const { key, value } = findDecision(r, SIMPLE_DECISION_KEYS);\n const commands = toArray(value as string | string[]);\n\n const out: Record<string, unknown> = {\n name: `command-rule-${i}`,\n commands,\n decision: key,\n };\n\n if (key === 'redirect' && 'to' in r) {\n const to = r.to;\n if (typeof to === 'string') {\n out.redirect_to = to;\n } else if (typeof to === 'object' && to !== null) {\n const target = to as { cmd: string; args: string[] };\n out.redirect_to = { command: target.cmd, args: target.args };\n }\n }\n\n return out;\n });\n}\n\n// ─── Env rules ──────────────────────────────────────────────\n\nfunction serializeEnvRules(rules: EnvRule[]): Record<string, unknown>[] {\n return rules.map((rule, i) => {\n const out: Record<string, unknown> = {\n name: `env-rule-${i}`,\n commands: rule.commands,\n };\n if (rule.allow) {\n out.allow = rule.allow;\n }\n if (rule.deny) {\n out.deny = rule.deny;\n }\n return out;\n });\n}\n\n// ─── DNS redirects ──────────────────────────────────────────\n\nfunction serializeDnsRedirects(\n redirects: DnsRedirect[],\n): Record<string, unknown>[] {\n return redirects.map((r) => ({\n match: r.match,\n resolve_to: r.resolveTo,\n }));\n}\n\n// ─── Connect redirects ──────────────────────────────────────\n\nfunction serializeConnectRedirects(\n redirects: ConnectRedirect[],\n): Record<string, unknown>[] {\n return redirects.map((r) => ({\n match: r.match,\n redirect_to: r.redirectTo,\n }));\n}\n\n// ─── Package rules ───────────────────────────────────────────\n\nfunction serializePackageRules(\n rules: PackageRule[],\n): Record<string, unknown>[] {\n return rules.map((rule) => {\n const match: Record<string, unknown> = {};\n\n if (rule.match.packages) {\n match.packages = rule.match.packages;\n }\n if (rule.match.namePatterns) {\n match.name_patterns = rule.match.namePatterns;\n }\n if (rule.match.findingType) {\n match.finding_type = rule.match.findingType;\n }\n if (rule.match.severity !== undefined) {\n match.severity = rule.match.severity;\n }\n if (rule.match.reasons) {\n match.reasons = rule.match.reasons;\n }\n if (rule.match.licenseSpdx) {\n match.license_spdx = rule.match.licenseSpdx;\n }\n if (rule.match.ecosystem) {\n match.ecosystem = rule.match.ecosystem;\n }\n if (rule.match.options) {\n match.options = rule.match.options;\n }\n\n const out: Record<string, unknown> = {\n match,\n action: rule.action,\n };\n\n if (rule.reason) {\n out.reason = rule.reason;\n }\n\n return out;\n });\n}\n\n// ─── Public API ─────────────────────────────────────────────\n\n/**\n * Converts a PolicyDefinition to agentsh YAML format.\n *\n * Omits empty categories from output.\n */\nexport function serializePolicy(policy: PolicyDefinition): string {\n const doc: Record<string, unknown> = {\n version: 1,\n name: 'secure-sandbox-policy',\n };\n\n if (policy.file && policy.file.length > 0) {\n doc.file_rules = serializeFileRules(policy.file);\n }\n\n if (policy.network && policy.network.length > 0) {\n doc.network_rules = serializeNetworkRules(policy.network);\n }\n\n if (policy.commands && policy.commands.length > 0) {\n doc.command_rules = serializeCommandRules(policy.commands);\n }\n\n if (policy.env && policy.env.length > 0) {\n doc.env_rules = serializeEnvRules(policy.env);\n }\n\n if (policy.dns && policy.dns.length > 0) {\n doc.dns_redirects = serializeDnsRedirects(policy.dns);\n }\n\n if (policy.connect && policy.connect.length > 0) {\n doc.connect_redirects = serializeConnectRedirects(policy.connect);\n }\n\n if (policy.packageRules && policy.packageRules.length > 0) {\n doc.package_rules = serializePackageRules(policy.packageRules);\n }\n\n return yaml.dump(doc, { lineWidth: -1 });\n}\n\n/**\n * Returns the fixed system policy YAML from the spec (Section 9.4).\n *\n * This static set of rules protects agentsh's own configuration, binaries,\n * and processes from tampering by the agent. These rules are written to a\n * separate system policy directory evaluated before user policy.\n */\nexport function systemPolicyYaml(): string {\n const doc = {\n version: 1,\n name: '_system-protection',\n file_rules: [\n {\n name: '_system-protect-config',\n paths: ['/etc/agentsh/**'],\n operations: ['write', 'create', 'delete'],\n decision: 'deny',\n message: 'Policy files are immutable during agent execution',\n },\n {\n name: '_system-protect-binary',\n paths: ['/usr/local/bin/agentsh*', '/usr/bin/agentsh*'],\n operations: ['write', 'create', 'delete'],\n decision: 'deny',\n message: 'agentsh binary is immutable during agent execution',\n },\n {\n name: '_system-protect-shim-files',\n paths: ['/usr/bin/agentsh-shell-shim', '/bin/bash', '/bin/sh'],\n operations: ['write', 'create', 'delete'],\n decision: 'deny',\n message: 'Shell and shim binaries are immutable during agent execution',\n },\n ],\n command_rules: [\n {\n name: '_system-protect-process',\n commands: ['kill', 'killall', 'pkill'],\n args_match: ['agentsh'],\n decision: 'deny',\n message: 'Cannot terminate agentsh processes',\n },\n ],\n };\n\n return yaml.dump(doc, { lineWidth: -1 });\n}\n"],"mappings":";;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,SAAS,GAAG,gBAAgB;;;ACErB,IAAM,eAAN,cAA2B,MAAM;AAAA,EACtC,YAAY,SAAiB;AAC3B,UAAM,OAAO;AACb,SAAK,OAAO;AAAA,EACd;AACF;AAEO,IAAM,wBAAN,cAAoC,aAAa;AAAA,EAC7C;AAAA,EAET,YAAY,EAAE,OAAO,GAA2B;AAC9C,UAAM,YAAY,OACf,IAAI,CAAC,UAAU,GAAG,MAAM,KAAK,KAAK,GAAG,CAAC,KAAK,MAAM,OAAO,EAAE,EAC1D,KAAK,IAAI;AACZ,UAAM,6BAA6B,SAAS,EAAE;AAC9C,SAAK,OAAO;AACZ,SAAK,SAAS;AAAA,EAChB;AACF;AAEO,IAAM,6BAAN,cAAyC,aAAa;AAAA,EAClD;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,EACF,GAGG;AACD;AAAA,MACE,GAAG,WAAW,oDAAoD,WAAW,KAAK,YAAY;AAAA,IAChG;AACA,SAAK,OAAO;AACZ,SAAK,cAAc;AACnB,SAAK,eAAe;AAAA,EACtB;AACF;AAEO,IAAM,mCAAN,cAA+C,aAAa;AAAA,EACxD;AAAA,EACA;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,IACA;AAAA,EACF,GAIG;AACD;AAAA,MACE,GAAG,WAAW,YAAY,SAAS,uDAAuD,WAAW,IAAI,QAAQ,iCAAiC,WAAW;AAAA,IAC/J;AACA,SAAK,OAAO;AACZ,SAAK,YAAY;AACjB,SAAK,WAAW;AAChB,SAAK,cAAc;AAAA,EACrB;AACF;AAEO,IAAM,oBAAN,cAAgC,aAAa;AAAA,EACzC;AAAA,EACA;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,IACA;AAAA,EACF,GAIG;AACD,UAAM,iCAAiC,KAAK,EAAE;AAC9C,SAAK,OAAO;AACZ,SAAK,QAAQ;AACb,SAAK,UAAU;AACf,SAAK,SAAS;AAAA,EAChB;AACF;AAEO,IAAM,iBAAN,cAA6B,aAAa;AAAA,EACtC;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,IACA;AAAA,EACF,GAIG;AACD,UAAM,WAAW,+BAA+B,QAAQ,SAAS,MAAM,EAAE;AACzE,SAAK,OAAO;AACZ,SAAK,WAAW;AAChB,SAAK,SAAS;AAAA,EAChB;AACF;AAEO,IAAM,eAAN,cAA2B,aAAa;AAAA,EACpC;AAAA,EACA;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,IACA;AAAA,EACF,GAIG;AACD,UAAM,gCAAgC,SAAS,GAAG;AAClD,SAAK,OAAO;AACZ,SAAK,YAAY;AACjB,SAAK,UAAU;AACf,SAAK,SAAS;AAAA,EAChB;AACF;;;AD3HA,IAAM,gBAAgB,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;AAIxD,IAAM,eAAe,EAAE,KAAK,CAAC,QAAQ,SAAS,UAAU,QAAQ,CAAC;AAExE,IAAM,gBAAgB,EACnB,OAAO,EAAE,OAAO,eAAe,KAAK,EAAE,MAAM,YAAY,EAAE,SAAS,EAAE,CAAC,EACtE,OAAO;AAEV,IAAM,eAAe,EAClB,OAAO,EAAE,MAAM,eAAe,KAAK,EAAE,MAAM,YAAY,EAAE,SAAS,EAAE,CAAC,EACrE,OAAO;AAEV,IAAM,mBAAmB,EACtB,OAAO;AAAA,EACN,UAAU;AAAA,EACV,IAAI,EAAE,OAAO;AAAA,EACb,KAAK,EAAE,MAAM,YAAY,EAAE,SAAS;AACtC,CAAC,EACA,OAAO;AAEV,IAAM,gBAAgB,EACnB,OAAO,EAAE,OAAO,eAAe,KAAK,EAAE,MAAM,YAAY,EAAE,SAAS,EAAE,CAAC,EACtE,OAAO;AAEV,IAAM,qBAAqB,EAAE,OAAO,EAAE,YAAY,cAAc,CAAC,EAAE,OAAO;AAEnE,IAAM,iBAAiB,EAAE,MAAM;AAAA,EACpC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,CAAC;AAID,IAAM,mBAAmB,EACtB,OAAO;AAAA,EACN,OAAO;AAAA,EACP,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,CAAC,EAAE,IAAI,KAAK,CAAC,EAAE,SAAS;AAC9D,CAAC,EACA,OAAO;AAEV,IAAM,kBAAkB,EAAE,OAAO,EAAE,MAAM,cAAc,CAAC,EAAE,OAAO;AAEjE,IAAM,sBAAsB,EACzB,OAAO,EAAE,UAAU,EAAE,OAAO,GAAG,IAAI,EAAE,OAAO,EAAE,CAAC,EAC/C,OAAO;AAEH,IAAM,oBAAoB,EAAE,MAAM;AAAA,EACvC;AAAA,EACA;AAAA,EACA;AACF,CAAC;AAID,IAAM,wBAAwB,EAAE,MAAM;AAAA,EACpC,EAAE,OAAO;AAAA,EACT,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,GAAG,MAAM,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,CAAC,EAAE,OAAO;AAClE,CAAC;AAED,IAAM,mBAAmB,EAAE,OAAO,EAAE,OAAO,cAAc,CAAC,EAAE,OAAO;AAEnE,IAAM,kBAAkB,EAAE,OAAO,EAAE,MAAM,cAAc,CAAC,EAAE,OAAO;AAEjE,IAAM,sBAAsB,EACzB,OAAO,EAAE,UAAU,eAAe,IAAI,sBAAsB,CAAC,EAC7D,OAAO;AAEH,IAAM,oBAAoB,EAAE,MAAM;AAAA,EACvC;AAAA,EACA;AAAA,EACA;AACF,CAAC;AAIM,IAAM,gBAAgB,EAC1B,OAAO;AAAA,EACN,UAAU,EAAE,MAAM,EAAE,OAAO,CAAC;AAAA,EAC5B,OAAO,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,SAAS;AAAA,EACpC,MAAM,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,SAAS;AACrC,CAAC,EACA,OAAO;AAIH,IAAM,oBAAoB,EAC9B,OAAO;AAAA,EACN,OAAO,EAAE,OAAO;AAAA,EAChB,WAAW,EAAE,OAAO;AACtB,CAAC,EACA,OAAO;AAEH,IAAM,wBAAwB,EAClC,OAAO;AAAA,EACN,OAAO,EAAE,OAAO;AAAA,EAChB,YAAY,EAAE,OAAO;AACvB,CAAC,EACA,OAAO;AAIV,IAAM,yBAAyB,EAC5B,OAAO;AAAA,EACN,OAAO,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,SAAS;AAAA,EACpC,MAAM,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,SAAS;AACrC,CAAC,EACA,OAAO;AAEV,IAAM,qBAAqB,EACxB,OAAO;AAAA,EACN,UAAU,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,SAAS;AAAA,EACvC,cAAc,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,SAAS;AAAA,EAC3C,aAAa,EAAE,OAAO,EAAE,SAAS;AAAA,EACjC,UAAU,cAAc,SAAS;AAAA,EACjC,SAAS,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,SAAS;AAAA,EACtC,aAAa,uBAAuB,SAAS;AAAA,EAC7C,WAAW,EAAE,OAAO,EAAE,SAAS;AAAA,EAC/B,SAAS,EAAE,OAAO,EAAE,QAAQ,CAAC,EAAE,SAAS;AAC1C,CAAC,EACA,OAAO;AAEH,IAAM,oBAAoB,EAC9B,OAAO;AAAA,EACN,OAAO;AAAA,EACP,QAAQ,EAAE,KAAK,CAAC,SAAS,QAAQ,WAAW,OAAO,CAAC;AAAA,EACpD,QAAQ,EAAE,OAAO,EAAE,SAAS;AAC9B,CAAC,EACA,OAAO;AAIH,IAAM,yBAAyB,EACnC,OAAO;AAAA,EACN,MAAM,EAAE,MAAM,cAAc,EAAE,SAAS;AAAA,EACvC,SAAS,EAAE,MAAM,iBAAiB,EAAE,SAAS;AAAA,EAC7C,UAAU,EAAE,MAAM,iBAAiB,EAAE,SAAS;AAAA,EAC9C,KAAK,EAAE,MAAM,aAAa,EAAE,SAAS;AAAA,EACrC,KAAK,EAAE,MAAM,iBAAiB,EAAE,SAAS;AAAA,EACzC,SAAS,EAAE,MAAM,qBAAqB,EAAE,SAAS;AAAA,EACjD,cAAc,EAAE,MAAM,iBAAiB,EAAE,SAAS;AACpD,CAAC,EACA,OAAO;AAgBH,SAAS,eAAe,QAAmC;AAChE,MAAI;AACF,WAAO,uBAAuB,MAAM,MAAM;AAAA,EAC5C,SAAS,KAAK;AACZ,QAAI,eAAe,UAAU;AAC3B,YAAM,IAAI,sBAAsB,EAAE,QAAQ,IAAI,OAAO,CAAC;AAAA,IACxD;AACA,UAAM;AAAA,EACR;AACF;;;AE7KA,IAAM,aAAa,CAAC,QAAQ,WAAW,YAAY,OAAO,OAAO,WAAW,cAAc;AAOnF,SAAS,MAAM,SAA2B,WAA0D;AACzG,SAAO,eAAe,cAAc,MAAM,WAAW,QAAQ,CAAC;AAChE;AAMO,SAAS,aAAa,SAA2B,WAA0D;AAChH,SAAO,eAAe,cAAc,MAAM,WAAW,SAAS,CAAC;AACjE;AAEA,SAAS,cACP,MACA,WACA,MACkB;AAClB,QAAM,SAAc,EAAE,GAAG,KAAK;AAC9B,aAAW,YAAY,WAAW;AAChC,eAAW,OAAO,YAAY;AAC5B,UAAI,SAAS,GAAG,KAAK,MAAM;AACzB,cAAM,YAAY,OAAO,GAAG,KAAK,CAAC;AAClC,eAAO,GAAG,IAAI,SAAS,WACnB,CAAC,GAAG,WAAW,GAAG,SAAS,GAAG,CAAE,IAChC,CAAC,GAAG,SAAS,GAAG,GAAI,GAAG,SAAS;AAAA,MACtC;AAAA,IACF;AAAA,EACF;AACA,SAAO;AACT;;;AC7BO,SAAS,aACd,YACkB;AAClB,QAAM,OAAyB;AAAA,IAC7B,MAAM;AAAA,MACJ,EAAE,OAAO,iBAAiB,KAAK,CAAC,QAAQ,SAAS,QAAQ,EAAE;AAAA;AAAA,MAE3D,EAAE,MAAM,CAAC,0BAA0B,mBAAmB,EAAE;AAAA;AAAA,MAExD,EAAE,MAAM,CAAC,WAAW,aAAa,mBAAmB,YAAY,UAAU,EAAE;AAAA,MAC5E,EAAE,MAAM,CAAC,aAAa,iBAAiB,EAAE;AAAA;AAAA,MAEzC,EAAE,MAAM,CAAC,aAAa,aAAa,eAAe,qBAAqB,EAAE;AAAA;AAAA,MAEzE,EAAE,MAAM,CAAC,aAAa,YAAY,cAAc,iBAAiB,EAAE;AAAA;AAAA,MAEnE,EAAE,MAAM,CAAC,gBAAgB,YAAY,aAAa,WAAW,EAAE;AAAA;AAAA,MAE/D,EAAE,MAAM,kBAAkB;AAAA;AAAA,MAE1B,EAAE,MAAM,CAAC,mBAAmB,gBAAgB,4BAA4B,GAAG,KAAK,CAAC,SAAS,UAAU,QAAQ,EAAE;AAAA,IAChH;AAAA,IACA,SAAS;AAAA,MACP;AAAA,QACE,OAAO;AAAA,UACL;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF;AAAA,QACA,OAAO,CAAC,GAAG;AAAA,MACb;AAAA,MACA,EAAE,MAAM,IAAI;AAAA,IACd;AAAA,IACA,UAAU;AAAA;AAAA,MAER;AAAA,QACE,OAAO;AAAA,UACL;AAAA,UAAQ;AAAA,UAAM;AAAA,UAAQ;AAAA,UAAO;AAAA,UAAQ;AAAA,UAAQ;AAAA,UAAQ;AAAA,UACrD;AAAA,UAAM;AAAA,UAAM;AAAA,UAAQ;AAAA,UAAQ;AAAA,UAAQ;AAAA,UAAO;AAAA,UAAQ;AAAA,UACnD;AAAA,UAAU;AAAA,UAAM;AAAA,UAAS;AAAA,UAAU;AAAA,UAAQ;AAAA,UAAQ;AAAA,UACnD;AAAA,UAAS;AAAA,UAAM;AAAA,UAAM;AAAA,UAAM;AAAA,UAAS;AAAA,UAAS;AAAA,UAAM;AAAA,UACnD;AAAA,UAAO;AAAA,UAAO;AAAA,UAAO;AAAA,UAAS;AAAA,UAAY;AAAA,UAAW;AAAA,UACrD;AAAA,UAAU;AAAA,UAAU;AAAA,UAAa;AAAA,UAAO;AAAA,UAAQ;AAAA,QAClD;AAAA,MACF;AAAA;AAAA,MAEA;AAAA,QACE,OAAO;AAAA,UACL;AAAA,UAAO;AAAA,UAAQ;AAAA,UAAO;AAAA,UAAO;AAAA,UAAQ;AAAA,UAAQ;AAAA,UAC7C;AAAA,UAAU;AAAA,UAAW;AAAA,UAAO;AAAA,UAC5B;AAAA,UAAS;AAAA,UAAS;AAAA,UAAM;AAAA,UAAQ;AAAA,QAClC;AAAA,MACF;AAAA;AAAA,MAEA,EAAE,MAAM,CAAC,OAAO,YAAY,QAAQ,MAAM,MAAM,EAAE;AAAA,MAClD,EAAE,MAAM,CAAC,YAAY,UAAU,QAAQ,UAAU,EAAE;AAAA,MACnD,EAAE,MAAM,CAAC,MAAM,QAAQ,UAAU,SAAS,QAAQ,EAAE;AAAA,MACpD,EAAE,MAAM,CAAC,oBAAoB,kBAAkB,EAAE;AAAA,MACjD;AAAA,QACE,UAAU,CAAC,QAAQ,MAAM;AAAA,QACzB,IAAI,EAAE,KAAK,iBAAiB,MAAM,CAAC,SAAS,EAAE;AAAA,MAChD;AAAA,IACF;AAAA,IACA,cAAc;AAAA;AAAA,MAEZ;AAAA,QACE,OAAO,EAAE,aAAa,iBAAiB,UAAU,WAAW;AAAA,QAC5D,QAAQ;AAAA,QACR,QAAQ;AAAA,MACV;AAAA;AAAA,MAEA;AAAA,QACE,OAAO,EAAE,aAAa,UAAU;AAAA,QAChC,QAAQ;AAAA,QACR,QAAQ;AAAA,MACV;AAAA;AAAA,MAEA;AAAA,QACE,OAAO,EAAE,aAAa,cAAc,SAAS,CAAC,WAAW,EAAE;AAAA,QAC3D,QAAQ;AAAA,QACR,QAAQ;AAAA,MACV;AAAA;AAAA,MAEA;AAAA,QACE,OAAO,EAAE,aAAa,iBAAiB,UAAU,SAAS;AAAA,QAC1D,QAAQ;AAAA,QACR,QAAQ;AAAA,MACV;AAAA;AAAA,MAEA;AAAA,QACE,OAAO;AAAA,UACL,aAAa;AAAA,UACb,aAAa,EAAE,MAAM,CAAC,iBAAiB,UAAU,EAAE;AAAA,QACrD;AAAA,QACA,QAAQ;AAAA,QACR,QAAQ;AAAA,MACV;AAAA;AAAA,MAEA;AAAA,QACE,OAAO;AAAA,UACL,aAAa;AAAA,UACb,SAAS,CAAC,iBAAiB;AAAA,QAC7B;AAAA,QACA,QAAQ;AAAA,QACR,QAAQ;AAAA,MACV;AAAA,IACF;AAAA,EACF;AACA,SAAO,aAAa,MAAM,MAAM,UAAU,IAAI;AAChD;AAOO,SAAS,QACd,YACkB;AAClB,QAAM,OAAyB;AAAA,IAC7B,MAAM;AAAA,MACJ,EAAE,OAAO,iBAAiB,KAAK,CAAC,QAAQ,SAAS,QAAQ,EAAE;AAAA,MAC3D,EAAE,MAAM,CAAC,WAAW,aAAa,mBAAmB,YAAY,UAAU,EAAE;AAAA,MAC5E,EAAE,MAAM,CAAC,aAAa,iBAAiB,EAAE;AAAA,MACzC,EAAE,MAAM,CAAC,aAAa,aAAa,eAAe,qBAAqB,EAAE;AAAA,MACzE,EAAE,MAAM,CAAC,aAAa,YAAY,cAAc,iBAAiB,EAAE;AAAA,MACnE,EAAE,MAAM,CAAC,gBAAgB,YAAY,aAAa,WAAW,EAAE;AAAA,IACjE;AAAA,IACA,SAAS;AAAA,MACP;AAAA,QACE,OAAO,CAAC,sBAAsB,sBAAsB;AAAA,QACpD,OAAO,CAAC,GAAG;AAAA,MACb;AAAA,IACF;AAAA,IACA,UAAU,CAAC,EAAE,MAAM,CAAC,OAAO,YAAY,YAAY,QAAQ,EAAE,CAAC;AAAA,EAChE;AACA,SAAO,aAAa,MAAM,MAAM,UAAU,IAAI;AAChD;AAOO,SAAS,SACd,YACkB;AAClB,QAAM,OAAyB;AAAA,IAC7B,MAAM;AAAA,MACJ,EAAE,OAAO,gBAAgB;AAAA,MACzB,EAAE,MAAM,CAAC,WAAW,aAAa,mBAAmB,YAAY,UAAU,EAAE;AAAA,MAC5E,EAAE,MAAM,CAAC,aAAa,aAAa,eAAe,qBAAqB,EAAE;AAAA,MACzE,EAAE,MAAM,MAAM;AAAA,IAChB;AAAA,IACA,SAAS;AAAA,MACP;AAAA,QACE,OAAO;AAAA,UACL;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF;AAAA,QACA,OAAO,CAAC,GAAG;AAAA,MACb;AAAA,MACA,EAAE,MAAM,IAAI;AAAA,IACd;AAAA,IACA,UAAU;AAAA,MACR,EAAE,MAAM,CAAC,OAAO,YAAY,YAAY,UAAU,MAAM,EAAE;AAAA,IAC5D;AAAA,EACF;AACA,SAAO,aAAa,MAAM,MAAM,UAAU,IAAI;AAChD;AAOO,SAAS,aACd,YACkB;AAClB,QAAM,OAAyB;AAAA,IAC7B,MAAM;AAAA,MACJ,EAAE,OAAO,iBAAiB,KAAK,CAAC,MAAM,EAAE;AAAA,MACxC,EAAE,MAAM,MAAM;AAAA,IAChB;AAAA,IACA,SAAS,CAAC,EAAE,MAAM,IAAI,CAAC;AAAA,IACvB,UAAU;AAAA,MACR,EAAE,MAAM,CAAC,OAAO,YAAY,QAAQ,MAAM,YAAY,QAAQ,EAAE;AAAA,IAClE;AAAA,EACF;AACA,SAAO,aAAa,MAAM,MAAM,UAAU,IAAI;AAChD;;;ACvNA,OAAO,UAAU;AAejB,SAAS,QAAQ,OAAoC;AACnD,SAAO,MAAM,QAAQ,KAAK,IAAI,QAAQ,CAAC,KAAK;AAC9C;AAKA,IAAM,qBAAoC;AAAA,EACxC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEA,IAAM,uBAAsC,CAAC,SAAS,QAAQ,UAAU;AAExE,SAAS,aACP,MACA,MACsC;AACtC,aAAW,KAAK,MAAM;AACpB,QAAI,KAAK,MAAM;AACb,aAAO,EAAE,KAAK,GAAG,OAAO,KAAK,CAAC,EAAE;AAAA,IAClC;AAAA,EACF;AACA,QAAM,IAAI,MAAM,kCAAkC,KAAK,UAAU,IAAI,CAAC,EAAE;AAC1E;AAGA,SAAS,aAAa,KAA0B;AAC9C,SAAO,QAAQ,eAAe,gBAAgB;AAChD;AAIA,SAAS,mBAAmB,OAA8C;AACxE,SAAO,MAAM,IAAI,CAAC,MAAM,MAAM;AAC5B,UAAM,IAAI;AACV,UAAM,EAAE,KAAK,MAAM,IAAI,aAAa,GAAG,kBAAkB;AACzD,UAAM,QAAQ,QAAQ,KAA0B;AAEhD,UAAM,MAA+B;AAAA,MACnC,MAAM,aAAa,CAAC;AAAA,MACpB;AAAA,IACF;AAEA,QAAI,SAAS,KAAK,EAAE,KAAK;AACvB,UAAI,aAAa,EAAE;AAAA,IACrB;AAEA,QAAI,WAAW,aAAa,GAAG;AAE/B,QAAI,QAAQ,cAAc,QAAQ,GAAG;AACnC,UAAI,cAAc,EAAE;AAAA,IACtB;AAEA,WAAO;AAAA,EACT,CAAC;AACH;AAIA,SAAS,sBACP,OAC2B;AAC3B,SAAO,MAAM,IAAI,CAAC,MAAM,MAAM;AAC5B,UAAM,IAAI;AACV,UAAM,EAAE,KAAK,MAAM,IAAI,aAAa,GAAG,oBAAoB;AAC3D,UAAM,UAAU,QAAQ,KAA0B;AAElD,UAAM,MAA+B;AAAA,MACnC,MAAM,gBAAgB,CAAC;AAAA,MACvB;AAAA,MACA,UAAU;AAAA,IACZ;AAEA,QAAI,WAAW,KAAK,EAAE,OAAO;AAC3B,UAAI,QAAQ,EAAE;AAAA,IAChB;AAEA,QAAI,QAAQ,cAAc,QAAQ,GAAG;AACnC,UAAI,cAAc,EAAE;AAAA,IACtB;AAEA,WAAO;AAAA,EACT,CAAC;AACH;AAIA,SAAS,sBACP,OAC2B;AAC3B,SAAO,MAAM,IAAI,CAAC,MAAM,MAAM;AAC5B,UAAM,IAAI;AACV,UAAM,EAAE,KAAK,MAAM,IAAI,aAAa,GAAG,oBAAoB;AAC3D,UAAM,WAAW,QAAQ,KAA0B;AAEnD,UAAM,MAA+B;AAAA,MACnC,MAAM,gBAAgB,CAAC;AAAA,MACvB;AAAA,MACA,UAAU;AAAA,IACZ;AAEA,QAAI,QAAQ,cAAc,QAAQ,GAAG;AACnC,YAAM,KAAK,EAAE;AACb,UAAI,OAAO,OAAO,UAAU;AAC1B,YAAI,cAAc;AAAA,MACpB,WAAW,OAAO,OAAO,YAAY,OAAO,MAAM;AAChD,cAAM,SAAS;AACf,YAAI,cAAc,EAAE,SAAS,OAAO,KAAK,MAAM,OAAO,KAAK;AAAA,MAC7D;AAAA,IACF;AAEA,WAAO;AAAA,EACT,CAAC;AACH;AAIA,SAAS,kBAAkB,OAA6C;AACtE,SAAO,MAAM,IAAI,CAAC,MAAM,MAAM;AAC5B,UAAM,MAA+B;AAAA,MACnC,MAAM,YAAY,CAAC;AAAA,MACnB,UAAU,KAAK;AAAA,IACjB;AACA,QAAI,KAAK,OAAO;AACd,UAAI,QAAQ,KAAK;AAAA,IACnB;AACA,QAAI,KAAK,MAAM;AACb,UAAI,OAAO,KAAK;AAAA,IAClB;AACA,WAAO;AAAA,EACT,CAAC;AACH;AAIA,SAAS,sBACP,WAC2B;AAC3B,SAAO,UAAU,IAAI,CAAC,OAAO;AAAA,IAC3B,OAAO,EAAE;AAAA,IACT,YAAY,EAAE;AAAA,EAChB,EAAE;AACJ;AAIA,SAAS,0BACP,WAC2B;AAC3B,SAAO,UAAU,IAAI,CAAC,OAAO;AAAA,IAC3B,OAAO,EAAE;AAAA,IACT,aAAa,EAAE;AAAA,EACjB,EAAE;AACJ;AAIA,SAAS,sBACP,OAC2B;AAC3B,SAAO,MAAM,IAAI,CAAC,SAAS;AACzB,UAAM,QAAiC,CAAC;AAExC,QAAI,KAAK,MAAM,UAAU;AACvB,YAAM,WAAW,KAAK,MAAM;AAAA,IAC9B;AACA,QAAI,KAAK,MAAM,cAAc;AAC3B,YAAM,gBAAgB,KAAK,MAAM;AAAA,IACnC;AACA,QAAI,KAAK,MAAM,aAAa;AAC1B,YAAM,eAAe,KAAK,MAAM;AAAA,IAClC;AACA,QAAI,KAAK,MAAM,aAAa,QAAW;AACrC,YAAM,WAAW,KAAK,MAAM;AAAA,IAC9B;AACA,QAAI,KAAK,MAAM,SAAS;AACtB,YAAM,UAAU,KAAK,MAAM;AAAA,IAC7B;AACA,QAAI,KAAK,MAAM,aAAa;AAC1B,YAAM,eAAe,KAAK,MAAM;AAAA,IAClC;AACA,QAAI,KAAK,MAAM,WAAW;AACxB,YAAM,YAAY,KAAK,MAAM;AAAA,IAC/B;AACA,QAAI,KAAK,MAAM,SAAS;AACtB,YAAM,UAAU,KAAK,MAAM;AAAA,IAC7B;AAEA,UAAM,MAA+B;AAAA,MACnC;AAAA,MACA,QAAQ,KAAK;AAAA,IACf;AAEA,QAAI,KAAK,QAAQ;AACf,UAAI,SAAS,KAAK;AAAA,IACpB;AAEA,WAAO;AAAA,EACT,CAAC;AACH;AASO,SAAS,gBAAgB,QAAkC;AAChE,QAAM,MAA+B;AAAA,IACnC,SAAS;AAAA,IACT,MAAM;AAAA,EACR;AAEA,MAAI,OAAO,QAAQ,OAAO,KAAK,SAAS,GAAG;AACzC,QAAI,aAAa,mBAAmB,OAAO,IAAI;AAAA,EACjD;AAEA,MAAI,OAAO,WAAW,OAAO,QAAQ,SAAS,GAAG;AAC/C,QAAI,gBAAgB,sBAAsB,OAAO,OAAO;AAAA,EAC1D;AAEA,MAAI,OAAO,YAAY,OAAO,SAAS,SAAS,GAAG;AACjD,QAAI,gBAAgB,sBAAsB,OAAO,QAAQ;AAAA,EAC3D;AAEA,MAAI,OAAO,OAAO,OAAO,IAAI,SAAS,GAAG;AACvC,QAAI,YAAY,kBAAkB,OAAO,GAAG;AAAA,EAC9C;AAEA,MAAI,OAAO,OAAO,OAAO,IAAI,SAAS,GAAG;AACvC,QAAI,gBAAgB,sBAAsB,OAAO,GAAG;AAAA,EACtD;AAEA,MAAI,OAAO,WAAW,OAAO,QAAQ,SAAS,GAAG;AAC/C,QAAI,oBAAoB,0BAA0B,OAAO,OAAO;AAAA,EAClE;AAEA,MAAI,OAAO,gBAAgB,OAAO,aAAa,SAAS,GAAG;AACzD,QAAI,gBAAgB,sBAAsB,OAAO,YAAY;AAAA,EAC/D;AAEA,SAAO,KAAK,KAAK,KAAK,EAAE,WAAW,GAAG,CAAC;AACzC;AASO,SAAS,mBAA2B;AACzC,QAAM,MAAM;AAAA,IACV,SAAS;AAAA,IACT,MAAM;AAAA,IACN,YAAY;AAAA,MACV;AAAA,QACE,MAAM;AAAA,QACN,OAAO,CAAC,iBAAiB;AAAA,QACzB,YAAY,CAAC,SAAS,UAAU,QAAQ;AAAA,QACxC,UAAU;AAAA,QACV,SAAS;AAAA,MACX;AAAA,MACA;AAAA,QACE,MAAM;AAAA,QACN,OAAO,CAAC,2BAA2B,mBAAmB;AAAA,QACtD,YAAY,CAAC,SAAS,UAAU,QAAQ;AAAA,QACxC,UAAU;AAAA,QACV,SAAS;AAAA,MACX;AAAA,MACA;AAAA,QACE,MAAM;AAAA,QACN,OAAO,CAAC,+BAA+B,aAAa,SAAS;AAAA,QAC7D,YAAY,CAAC,SAAS,UAAU,QAAQ;AAAA,QACxC,UAAU;AAAA,QACV,SAAS;AAAA,MACX;AAAA,IACF;AAAA,IACA,eAAe;AAAA,MACb;AAAA,QACE,MAAM;AAAA,QACN,UAAU,CAAC,QAAQ,WAAW,OAAO;AAAA,QACrC,YAAY,CAAC,SAAS;AAAA,QACtB,UAAU;AAAA,QACV,SAAS;AAAA,MACX;AAAA,IACF;AAAA,EACF;AAEA,SAAO,KAAK,KAAK,KAAK,EAAE,WAAW,GAAG,CAAC;AACzC;","names":[]}
@@ -283,6 +283,85 @@ declare const PolicyDefinitionSchema: z.ZodObject<{
283
283
  match: string;
284
284
  redirectTo: string;
285
285
  }>, "many">>;
286
+ packageRules: z.ZodOptional<z.ZodArray<z.ZodObject<{
287
+ match: z.ZodObject<{
288
+ packages: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
289
+ namePatterns: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
290
+ findingType: z.ZodOptional<z.ZodString>;
291
+ severity: z.ZodOptional<z.ZodUnion<[z.ZodString, z.ZodArray<z.ZodString, "many">]>>;
292
+ reasons: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
293
+ licenseSpdx: z.ZodOptional<z.ZodObject<{
294
+ allow: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
295
+ deny: z.ZodOptional<z.ZodArray<z.ZodString, "many">>;
296
+ }, "strict", z.ZodTypeAny, {
297
+ deny?: string[] | undefined;
298
+ allow?: string[] | undefined;
299
+ }, {
300
+ deny?: string[] | undefined;
301
+ allow?: string[] | undefined;
302
+ }>>;
303
+ ecosystem: z.ZodOptional<z.ZodString>;
304
+ options: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodUnknown>>;
305
+ }, "strict", z.ZodTypeAny, {
306
+ options?: Record<string, unknown> | undefined;
307
+ packages?: string[] | undefined;
308
+ namePatterns?: string[] | undefined;
309
+ findingType?: string | undefined;
310
+ severity?: string | string[] | undefined;
311
+ reasons?: string[] | undefined;
312
+ licenseSpdx?: {
313
+ deny?: string[] | undefined;
314
+ allow?: string[] | undefined;
315
+ } | undefined;
316
+ ecosystem?: string | undefined;
317
+ }, {
318
+ options?: Record<string, unknown> | undefined;
319
+ packages?: string[] | undefined;
320
+ namePatterns?: string[] | undefined;
321
+ findingType?: string | undefined;
322
+ severity?: string | string[] | undefined;
323
+ reasons?: string[] | undefined;
324
+ licenseSpdx?: {
325
+ deny?: string[] | undefined;
326
+ allow?: string[] | undefined;
327
+ } | undefined;
328
+ ecosystem?: string | undefined;
329
+ }>;
330
+ action: z.ZodEnum<["allow", "warn", "approve", "block"]>;
331
+ reason: z.ZodOptional<z.ZodString>;
332
+ }, "strict", z.ZodTypeAny, {
333
+ match: {
334
+ options?: Record<string, unknown> | undefined;
335
+ packages?: string[] | undefined;
336
+ namePatterns?: string[] | undefined;
337
+ findingType?: string | undefined;
338
+ severity?: string | string[] | undefined;
339
+ reasons?: string[] | undefined;
340
+ licenseSpdx?: {
341
+ deny?: string[] | undefined;
342
+ allow?: string[] | undefined;
343
+ } | undefined;
344
+ ecosystem?: string | undefined;
345
+ };
346
+ action: "warn" | "allow" | "approve" | "block";
347
+ reason?: string | undefined;
348
+ }, {
349
+ match: {
350
+ options?: Record<string, unknown> | undefined;
351
+ packages?: string[] | undefined;
352
+ namePatterns?: string[] | undefined;
353
+ findingType?: string | undefined;
354
+ severity?: string | string[] | undefined;
355
+ reasons?: string[] | undefined;
356
+ licenseSpdx?: {
357
+ deny?: string[] | undefined;
358
+ allow?: string[] | undefined;
359
+ } | undefined;
360
+ ecosystem?: string | undefined;
361
+ };
362
+ action: "warn" | "allow" | "approve" | "block";
363
+ reason?: string | undefined;
364
+ }>, "many">>;
286
365
  }, "strict", z.ZodTypeAny, {
287
366
  commands?: ({
288
367
  allow: string | string[];
@@ -333,6 +412,23 @@ declare const PolicyDefinitionSchema: z.ZodObject<{
333
412
  match: string;
334
413
  redirectTo: string;
335
414
  }[] | undefined;
415
+ packageRules?: {
416
+ match: {
417
+ options?: Record<string, unknown> | undefined;
418
+ packages?: string[] | undefined;
419
+ namePatterns?: string[] | undefined;
420
+ findingType?: string | undefined;
421
+ severity?: string | string[] | undefined;
422
+ reasons?: string[] | undefined;
423
+ licenseSpdx?: {
424
+ deny?: string[] | undefined;
425
+ allow?: string[] | undefined;
426
+ } | undefined;
427
+ ecosystem?: string | undefined;
428
+ };
429
+ action: "warn" | "allow" | "approve" | "block";
430
+ reason?: string | undefined;
431
+ }[] | undefined;
336
432
  }, {
337
433
  commands?: ({
338
434
  allow: string | string[];
@@ -383,6 +479,23 @@ declare const PolicyDefinitionSchema: z.ZodObject<{
383
479
  match: string;
384
480
  redirectTo: string;
385
481
  }[] | undefined;
482
+ packageRules?: {
483
+ match: {
484
+ options?: Record<string, unknown> | undefined;
485
+ packages?: string[] | undefined;
486
+ namePatterns?: string[] | undefined;
487
+ findingType?: string | undefined;
488
+ severity?: string | string[] | undefined;
489
+ reasons?: string[] | undefined;
490
+ licenseSpdx?: {
491
+ deny?: string[] | undefined;
492
+ allow?: string[] | undefined;
493
+ } | undefined;
494
+ ecosystem?: string | undefined;
495
+ };
496
+ action: "warn" | "allow" | "approve" | "block";
497
+ reason?: string | undefined;
498
+ }[] | undefined;
386
499
  }>;
387
500
  type PolicyDefinition = z.infer<typeof PolicyDefinitionSchema>;
388
501
  type FileRule = z.infer<typeof FileRuleSchema>;
package/dist/index.d.ts CHANGED
@@ -1,6 +1,6 @@
1
- import { S as SandboxAdapter, a as SecureConfig, b as SecuredSandbox, T as ThreatFeedsConfig } from './types-Cz86hRBQ.js';
2
- export { E as ExecResult, I as InstallStrategy, R as ReadFileResult, c as SecurityMode, d as ThreatFeed, W as WriteFileResult } from './types-Cz86hRBQ.js';
3
- export { P as PolicyDefinition, i as policies } from './index-D0UvBOzr.js';
1
+ import { S as SandboxAdapter, a as SecureConfig, b as SecuredSandbox, T as ThreatFeedsConfig } from './types-CUqsllMs.js';
2
+ export { E as ExecResult, I as InstallStrategy, L as LicenseSpdxMatch, P as PackageChecksConfig, c as PackageMatch, d as PackageRule, e as ProviderConfig, R as ReadFileResult, f as SecurityMode, g as ThreatFeed, W as WriteFileResult } from './types-CUqsllMs.js';
3
+ export { P as PolicyDefinition, i as policies } from './index-Nmlhw9oj.js';
4
4
  import { ZodIssue } from 'zod';
5
5
  export { i as adapters } from './index-aQ1TVPtG.js';
6
6
  import './adapters/vercel.js';
package/dist/index.js CHANGED
@@ -20,7 +20,7 @@ import {
20
20
  serializePolicy,
21
21
  systemPolicyYaml,
22
22
  validatePolicy
23
- } from "./chunk-NWHVZ3DG.js";
23
+ } from "./chunk-GFPHTJLU.js";
24
24
  import "./chunk-PZ5AY32C.js";
25
25
 
26
26
  // src/core/integrity.ts
@@ -95,6 +95,22 @@ var defaultThreatFeeds = {
95
95
  "sum.golang.org"
96
96
  ]
97
97
  };
98
+ var defaultPackageCheckProviders = {
99
+ local: { enabled: true, priority: 0 },
100
+ osv: { enabled: true, priority: 1 },
101
+ depsdev: { enabled: true, priority: 2 }
102
+ };
103
+ function providerConfigToSnakeCase(config) {
104
+ const result = { enabled: config.enabled ?? true };
105
+ if (config.priority !== void 0) result.priority = config.priority;
106
+ if (config.timeout !== void 0) result.timeout = config.timeout;
107
+ if (config.onFailure !== void 0) result.on_failure = config.onFailure;
108
+ if (config.apiKeyEnv !== void 0) result.api_key_env = config.apiKeyEnv;
109
+ if (config.type !== void 0) result.type = config.type;
110
+ if (config.command !== void 0) result.command = config.command;
111
+ if (config.options !== void 0) result.options = config.options;
112
+ return result;
113
+ }
98
114
  function generateServerConfig(opts) {
99
115
  const config = {
100
116
  server: {
@@ -110,15 +126,16 @@ function generateServerConfig(opts) {
110
126
  dir: "/etc/agentsh",
111
127
  default: "policy"
112
128
  },
113
- workspace: opts.workspace,
114
129
  sandbox: {
115
130
  enabled: true,
116
- allow_degraded: true
131
+ allow_degraded: true,
132
+ fuse: { enabled: true },
133
+ network: { enabled: true },
134
+ seccomp: { enabled: true }
117
135
  }
118
136
  };
119
137
  if (opts.watchtower) config.watchtower = opts.watchtower;
120
- if (opts.enforceRedirects) config.enforce_redirects = true;
121
- if (opts.realPaths) config.real_paths = true;
138
+ if (opts.realPaths) config.sessions = { real_paths: true };
122
139
  const feeds = opts.threatFeeds === false ? void 0 : opts.threatFeeds ?? defaultThreatFeeds;
123
140
  if (feeds) {
124
141
  config.threat_feeds = {
@@ -133,6 +150,30 @@ function generateServerConfig(opts) {
133
150
  ...feeds.allowlist?.length ? { allowlist: feeds.allowlist } : {}
134
151
  };
135
152
  }
153
+ if (opts.packageChecks) {
154
+ const pc = opts.packageChecks;
155
+ const providers = {};
156
+ for (const [name, def] of Object.entries(defaultPackageCheckProviders)) {
157
+ providers[name] = { ...def };
158
+ }
159
+ if (pc.providers) {
160
+ for (const [name, value] of Object.entries(pc.providers)) {
161
+ if (value === false) {
162
+ providers[name] = { enabled: false };
163
+ } else if (value === true) {
164
+ providers[name] = { ...providers[name] ?? {}, enabled: true };
165
+ } else {
166
+ const base = providers[name] ?? {};
167
+ providers[name] = { ...base, ...providerConfigToSnakeCase(value) };
168
+ }
169
+ }
170
+ }
171
+ config.package_checks = {
172
+ enabled: true,
173
+ scope: pc.scope ?? "new_packages_only",
174
+ providers
175
+ };
176
+ }
136
177
  return yaml.dump(config, { lineWidth: -1 });
137
178
  }
138
179
 
@@ -196,10 +237,10 @@ async function provision(adapter, config = {}) {
196
237
  skipIntegrityCheck = false,
197
238
  minimumSecurityMode,
198
239
  realPaths: realPathsOverride,
199
- enforceRedirects = false,
200
240
  traceParent,
201
241
  policyName = "policy",
202
- threatFeeds
242
+ threatFeeds,
243
+ packageChecks
203
244
  } = config;
204
245
  const policy = rawPolicy ? validatePolicy(rawPolicy) : agentDefault();
205
246
  let securityMode = "full";
@@ -329,11 +370,10 @@ async function provision(adapter, config = {}) {
329
370
  { sudo: true }
330
371
  );
331
372
  const serverConfig = generateServerConfig({
332
- workspace,
333
373
  watchtower,
334
- enforceRedirects,
335
374
  realPaths,
336
- threatFeeds
375
+ threatFeeds,
376
+ packageChecks
337
377
  });
338
378
  await adapter.writeFile("/etc/agentsh/config.yml", serverConfig, {
339
379
  sudo: true
package/dist/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/core/integrity.ts","../src/core/config.ts","../src/core/traceparent.ts","../src/core/provision.ts","../src/core/runtime.ts","../src/api.ts"],"sourcesContent":["import { IntegrityError } from './errors.js';\n\nexport const PINNED_VERSION = '0.15.0';\n\nexport const CHECKSUMS: Record<string, Record<string, string>> = {\n '0.15.0': {\n linux_amd64:\n '89f7ebbfd75ffd961245ec62b2602fd0cc387740502ac858dbc39c367c5699c5',\n linux_arm64:\n '3fabbd749f9e98fb9f96ddfc94c389a6868cda7ed3668daa8440c39ceec85f3b',\n },\n '0.14.0': {\n linux_amd64:\n '2ab8ba0d6637fe1a5badf840c3db197161a6f9865d721ed216029d229b1b9bbc',\n linux_arm64:\n '929d18dd9fe36e9b2fa830d7ae64b4fb481853e743ade8674fcfcdc73470ed53',\n },\n};\n\n/**\n * Returns the checksum to verify against.\n * If `override` is provided, returns it directly.\n * Otherwise looks up the checksum in the pinned CHECKSUMS map.\n * Throws IntegrityError if no checksum is found.\n */\nexport function getChecksum(\n version: string,\n arch: string,\n override?: string,\n): string {\n if (override) {\n return override;\n }\n\n const versionChecksums = CHECKSUMS[version];\n if (versionChecksums && versionChecksums[arch]) {\n return versionChecksums[arch];\n }\n\n throw new IntegrityError({\n expected: '',\n actual: '',\n message: `No pinned checksum for agentsh v${version}. Provide \\`agentshChecksum\\` explicitly or use \\`skipIntegrityCheck: true\\`.`,\n });\n}\n\n/**\n * Returns an array of shell commands to try for computing SHA-256 checksums.\n * Each command extracts just the hex hash value from the given file.\n */\nexport function buildVerifyCommand(filePath: string): string[] {\n return [\n `sha256sum \"${filePath}\" | awk '{print $1}'`,\n `shasum -a 256 \"${filePath}\" | awk '{print $1}'`,\n `openssl dgst -sha256 \"${filePath}\" | awk '{print $NF}'`,\n ];\n}\n\n/**\n * Returns the download URL for the agentsh binary.\n * If `overrideUrl` is provided, returns it directly.\n * Otherwise returns the default GitHub releases URL.\n */\nexport function binaryUrl(\n version: string,\n arch: string,\n overrideUrl?: string,\n): string {\n if (overrideUrl) {\n return overrideUrl;\n }\n\n return `https://github.com/canyonroad/agentsh/releases/download/v${version}/agentsh_${version}_${arch}.tar.gz`;\n}\n","import yaml from 'js-yaml';\nimport type { ThreatFeedsConfig } from './types.js';\n\nexport interface ServerConfigOpts {\n workspace: string;\n watchtower?: string;\n enforceRedirects?: boolean;\n realPaths?: boolean;\n threatFeeds?: false | ThreatFeedsConfig;\n}\n\n/**\n * Default threat feeds: URLhaus (malware) + Phishing.Database (phishing).\n * Both are free, open source, and updated frequently.\n */\nexport const defaultThreatFeeds: ThreatFeedsConfig = {\n action: 'deny',\n feeds: [\n {\n name: 'urlhaus',\n url: 'https://urlhaus.abuse.ch/downloads/hostfile/',\n format: 'hostfile',\n refreshInterval: '6h',\n },\n {\n name: 'phishing',\n url: 'https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-ACTIVE.txt',\n format: 'domain-list',\n refreshInterval: '12h',\n },\n ],\n allowlist: [\n 'github.com',\n '*.github.com',\n 'registry.npmjs.org',\n 'registry.yarnpkg.com',\n 'pypi.org',\n 'files.pythonhosted.org',\n 'crates.io',\n 'static.crates.io',\n 'index.crates.io',\n 'proxy.golang.org',\n 'sum.golang.org',\n ],\n};\n\nexport function generateServerConfig(opts: ServerConfigOpts): string {\n const config: Record<string, unknown> = {\n server: {\n http: {\n addr: '127.0.0.1:18080',\n },\n },\n auth: {\n type: 'none',\n },\n policies: {\n system_dir: '/etc/agentsh/system',\n dir: '/etc/agentsh',\n default: 'policy',\n },\n workspace: opts.workspace,\n sandbox: {\n enabled: true,\n allow_degraded: true,\n },\n };\n if (opts.watchtower) config.watchtower = opts.watchtower;\n if (opts.enforceRedirects) config.enforce_redirects = true;\n if (opts.realPaths) config.real_paths = true;\n\n // Threat feeds: enabled by default, opt-out with `threatFeeds: false`\n const feeds = opts.threatFeeds === false ? undefined : (opts.threatFeeds ?? defaultThreatFeeds);\n if (feeds) {\n config.threat_feeds = {\n enabled: true,\n action: feeds.action ?? 'deny',\n feeds: feeds.feeds.map(f => ({\n name: f.name,\n url: f.url,\n format: f.format,\n refresh_interval: f.refreshInterval ?? '6h',\n })),\n ...(feeds.allowlist?.length ? { allowlist: feeds.allowlist } : {}),\n };\n }\n\n return yaml.dump(config, { lineWidth: -1 });\n}\n","/**\n * Read W3C traceparent from the active OpenTelemetry span, if available.\n *\n * Uses dynamic import so @opentelemetry/api is an optional peer dependency.\n * Returns undefined when OTEL is not installed, no span is active, or the\n * trace context is invalid (all-zero trace ID).\n */\nexport async function getTraceparent(): Promise<string | undefined> {\n try {\n const { trace } = await import('@opentelemetry/api');\n const span = trace.getActiveSpan();\n const ctx = span?.spanContext();\n if (!ctx?.traceId || ctx.traceId === '00000000000000000000000000000000') {\n return undefined;\n }\n const flags = (ctx.traceFlags ?? 0).toString(16).padStart(2, '0');\n return `00-${ctx.traceId}-${ctx.spanId}-${flags}`;\n } catch {\n return undefined;\n }\n}\n","import type {\n SandboxAdapter,\n SecureConfig,\n SecurityMode,\n ExecResult,\n} from './types.js';\nimport {\n getChecksum,\n buildVerifyCommand,\n binaryUrl,\n PINNED_VERSION,\n} from './integrity.js';\nimport { generateServerConfig } from './config.js';\nimport { ProvisioningError, IntegrityError } from './errors.js';\nimport { serializePolicy, systemPolicyYaml } from '../policies/serialize.js';\nimport { agentDefault } from '../policies/presets.js';\nimport { validatePolicy } from '../policies/schema.js';\nimport { getTraceparent } from './traceparent.js';\n\n// ─── Security mode ordering (strongest to weakest) ────────────\n\nconst SECURITY_MODE_RANK: Record<SecurityMode, number> = {\n full: 4,\n landlock: 3,\n 'landlock-only': 2,\n minimal: 1,\n};\n\nfunction isWeakerThan(detected: SecurityMode, required: SecurityMode): boolean {\n return SECURITY_MODE_RANK[detected] < SECURITY_MODE_RANK[required];\n}\n\n// ─── Architecture mapping ─────────────────────────────────────\n\nfunction mapArch(uname: string): 'linux_amd64' | 'linux_arm64' {\n const trimmed = uname.trim();\n if (trimmed === 'x86_64') return 'linux_amd64';\n if (trimmed === 'aarch64') return 'linux_arm64';\n throw new ProvisioningError({\n phase: 'install',\n command: 'uname -m',\n stderr: `Unsupported architecture: ${trimmed}`,\n });\n}\n\n// ─── Helper: check if binary exists ───────────────────────────\n\nconst AGENTSH_PATHS = ['/usr/local/bin/agentsh', '/usr/bin/agentsh'];\n\nasync function binaryExists(adapter: SandboxAdapter): Promise<boolean> {\n for (const path of AGENTSH_PATHS) {\n const found = adapter.fileExists\n ? await adapter.fileExists(path)\n : (await adapter.exec('test', ['-f', path])).exitCode === 0;\n if (found) return true;\n }\n return false;\n}\n\n// ─── Helper: sleep ────────────────────────────────────────────\n\nfunction sleep(ms: number): Promise<void> {\n return new Promise((resolve) => setTimeout(resolve, ms));\n}\n\n// ─── Main provisioning function ───────────────────────────────\n\nexport interface ProvisionResult {\n sessionId: string;\n securityMode: SecurityMode;\n /** When true, the shell shim enforces policy — skip agentsh exec wrapper. */\n passthrough?: boolean;\n}\n\nexport async function provision(\n adapter: SandboxAdapter,\n config: SecureConfig = {},\n): Promise<ProvisionResult> {\n const {\n policy: rawPolicy,\n workspace = '/workspace',\n watchtower,\n installStrategy = 'download',\n agentshVersion = PINNED_VERSION,\n agentshArch: archOverride,\n agentshBinaryUrl,\n agentshChecksum,\n skipIntegrityCheck = false,\n minimumSecurityMode,\n realPaths: realPathsOverride,\n enforceRedirects = false,\n traceParent,\n policyName = 'policy',\n threatFeeds,\n } = config;\n\n // Resolve and validate policy\n const policy = rawPolicy ? validatePolicy(rawPolicy) : agentDefault();\n\n let securityMode: SecurityMode = 'full';\n\n if (installStrategy === 'running') {\n // agentsh is already fully provisioned and running with the shell shim\n // installed. Commands go through the shim automatically, so we don't\n // create a new session (which would deadlock the server via nested\n // agentsh connections). Instead, read the existing session ID from\n // the environment and use passthrough mode at runtime.\n //\n // Skip detectSecurityMode() — running `agentsh detect` inside a sandbox\n // where the shell shim is already installed would route the command\n // through agentsh's exec API, causing the server to try binding port\n // 18080 again (\"address already in use\"). Default to 'full' since\n // pre-provisioned environments typically have full capabilities.\n await healthCheck(adapter);\n\n securityMode = config.securityMode ?? 'full';\n\n if (minimumSecurityMode && isWeakerThan(securityMode, minimumSecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'securityMode check',\n stderr: `Security mode '${securityMode}' is weaker than required '${minimumSecurityMode}'`,\n });\n }\n\n // Read the existing session ID from config or from the environment\n let sessionId = config.sessionId;\n if (!sessionId) {\n const envResult = await adapter.exec('sh', ['-c', 'echo $AGENTSH_SESSION_ID']);\n sessionId = envResult.stdout.trim();\n }\n if (!sessionId) {\n throw new ProvisioningError({\n phase: 'session',\n command: 'echo $AGENTSH_SESSION_ID',\n stderr: 'AGENTSH_SESSION_ID not set — running strategy requires a pre-created session',\n });\n }\n\n return { sessionId, securityMode, passthrough: true };\n }\n\n // ─── Phase 1: Binary Installation ───────────────────────────\n\n // Step 1: Check if binary exists\n const exists = await binaryExists(adapter);\n\n if (installStrategy === 'preinstalled') {\n if (!exists) {\n throw new ProvisioningError({\n phase: 'install',\n command: AGENTSH_PATHS.map(p => `test -f ${p}`).join(' || '),\n stderr: 'Binary not found but installStrategy is preinstalled',\n });\n }\n // Binary exists and strategy is preinstalled, skip to detect\n } else if (installStrategy === 'download' || installStrategy === 'upload') {\n // If binary already exists, skip installation but still detect\n if (!exists) {\n // Step 2: Detect architecture\n const arch =\n archOverride ?? await detectArch(adapter);\n\n if (installStrategy === 'download') {\n // Step 3a: Download\n await downloadBinary(adapter, agentshVersion, arch, agentshBinaryUrl);\n } else {\n // Step 3b: Upload\n await uploadBinary(adapter, agentshVersion, arch, agentshBinaryUrl);\n }\n\n // Step 4: Verify checksum\n if (!skipIntegrityCheck) {\n await verifyChecksum(\n adapter,\n agentshVersion,\n arch,\n agentshChecksum,\n '/tmp/agentsh.tar.gz',\n );\n }\n\n // Step 5: Install binaries (agentsh + agentsh-shell-shim + agentsh-unixwrap)\n const binaries = [\n { src: '/tmp/agentsh', dest: '/usr/local/bin/agentsh' },\n { src: '/tmp/agentsh-shell-shim', dest: '/usr/bin/agentsh-shell-shim' },\n { src: '/tmp/agentsh-unixwrap', dest: '/usr/local/bin/agentsh-unixwrap' },\n ];\n for (const { src, dest } of binaries) {\n const installResult = await adapter.exec(\n 'install',\n ['-m', '0755', src, dest],\n { sudo: true },\n );\n if (installResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: `install -m 0755 ${src} ${dest}`,\n stderr: installResult.stderr,\n });\n }\n }\n }\n }\n\n // Step 5b: Detect security mode\n securityMode = await detectSecurityMode(adapter);\n\n // Check minimum security mode\n if (minimumSecurityMode && isWeakerThan(securityMode, minimumSecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --json',\n stderr: `Detected security mode '${securityMode}' is weaker than required '${minimumSecurityMode}'`,\n });\n }\n\n // Auto-enable realPaths when FUSE is available (full or landlock modes),\n // unless the user explicitly set it.\n const hasFuse = securityMode === 'full' || securityMode === 'landlock';\n const realPaths = realPathsOverride ?? hasFuse;\n\n // Step 6: Install shell shim\n const shimResult = await adapter.exec(\n 'agentsh',\n [\n 'shim', 'install-shell',\n '--root', '/',\n '--shim', '/usr/bin/agentsh-shell-shim',\n '--bash',\n '--i-understand-this-modifies-the-host',\n ],\n { sudo: true },\n );\n if (shimResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh shim install-shell',\n stderr: shimResult.stderr,\n });\n }\n\n // ─── Phase 2: Policy & Config ───────────────────────────────\n\n // Step 7: Create dirs and make writable for file writes\n const mkdirResult = await adapter.exec(\n 'mkdir',\n ['-p', '/etc/agentsh/system'],\n { sudo: true },\n );\n if (mkdirResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'mkdir -p /etc/agentsh/system',\n stderr: mkdirResult.stderr,\n });\n }\n\n // Temporarily make writable so adapter.writeFile (which may not support sudo) can write\n await adapter.exec('chmod', ['-R', '777', '/etc/agentsh/'], { sudo: true });\n\n await adapter.writeFile(\n '/etc/agentsh/system/policy.yml',\n systemPolicyYaml(),\n { sudo: true },\n );\n\n // Step 8: Write user policy\n await adapter.writeFile(\n '/etc/agentsh/policy.yml',\n serializePolicy(policy),\n { sudo: true },\n );\n\n // Step 9: Write server config\n const serverConfig = generateServerConfig({\n workspace,\n watchtower,\n enforceRedirects,\n realPaths,\n threatFeeds,\n });\n\n await adapter.writeFile('/etc/agentsh/config.yml', serverConfig, {\n sudo: true,\n });\n\n // Step 10: Set permissions\n const chmodDirResult = await adapter.exec(\n 'find',\n ['/etc/agentsh', '-type', 'd', '-exec', 'chmod', '555', '{}', '+'],\n { sudo: true },\n );\n if (chmodDirResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'find /etc/agentsh -type d -exec chmod 555 {} +',\n stderr: chmodDirResult.stderr,\n });\n }\n\n const chmodFileResult = await adapter.exec(\n 'find',\n ['/etc/agentsh', '-type', 'f', '-exec', 'chmod', '444', '{}', '+'],\n { sudo: true },\n );\n if (chmodFileResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'find /etc/agentsh -type f -exec chmod 444 {} +',\n stderr: chmodFileResult.stderr,\n });\n }\n\n const chownResult = await adapter.exec(\n 'chown',\n ['-R', 'root:root', '/etc/agentsh/'],\n { sudo: true },\n );\n if (chownResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'chown -R root:root /etc/agentsh/',\n stderr: chownResult.stderr,\n });\n }\n\n // ─── Phase 3: Server Startup ────────────────────────────────\n\n // Step 10b: Ensure workspace directory exists\n await adapter.exec('mkdir', ['-p', workspace], { sudo: true });\n\n // Step 11: Start server\n const serverResult = await adapter.exec(\n 'agentsh',\n ['server', '--config', '/etc/agentsh/config.yml'],\n { detached: true, sudo: true },\n );\n if (serverResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'startup',\n command: 'agentsh server --config /etc/agentsh/config.yml',\n stderr: serverResult.stderr,\n });\n }\n\n // Step 12: Health check\n await healthCheck(adapter);\n\n // Step 13: Create session\n const sessionResult = await adapter.exec('agentsh', [\n 'session',\n 'create',\n '--workspace',\n workspace,\n '--policy',\n 'policy',\n ]);\n if (sessionResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'session',\n command: 'agentsh session create',\n stderr: sessionResult.stderr,\n });\n }\n\n let sessionId: string;\n try {\n const sessionData = JSON.parse(sessionResult.stdout);\n sessionId = sessionData.session_id;\n } catch {\n // Fallback: parse text output like \"Session session-xxx started\"\n const match = sessionResult.stdout.match(/Session\\s+(session-[^\\s]+)/);\n if (match) {\n sessionId = match[1];\n } else {\n throw new ProvisioningError({\n phase: 'session',\n command: 'agentsh session create',\n stderr: `Failed to parse session output: ${sessionResult.stdout}`,\n });\n }\n }\n\n // Step 13b: Set trace context if traceParent is provided or OTEL span is active\n const effectiveTraceParent = traceParent ?? (await getTraceparent());\n if (effectiveTraceParent) {\n await adapter.exec('curl', [\n '-X',\n 'PUT',\n `http://127.0.0.1:18080/sessions/${sessionId}/trace-context`,\n '-H',\n 'Content-Type: application/json',\n '-d',\n JSON.stringify({ traceparent: effectiveTraceParent }),\n ]);\n }\n\n // ─── Phase 4: Handoff ───────────────────────────────────────\n\n // Step 14: Return result\n return { sessionId, securityMode };\n}\n\n// ─── Phase 1 helpers ──────────────────────────────────────────\n\nasync function detectArch(\n adapter: SandboxAdapter,\n): Promise<'linux_amd64' | 'linux_arm64'> {\n const result = await adapter.exec('uname', ['-m']);\n if (result.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'uname -m',\n stderr: result.stderr,\n });\n }\n return mapArch(result.stdout);\n}\n\nasync function downloadBinary(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n overrideUrl?: string,\n): Promise<void> {\n const url = binaryUrl(version, arch, overrideUrl);\n\n // Try curl first\n const curlResult = await adapter.exec('curl', [\n '-fsSL',\n url,\n '-o',\n '/tmp/agentsh.tar.gz',\n ]);\n\n if (curlResult.exitCode !== 0) {\n // Fallback to wget (may not be available on all platforms)\n let wgetResult: ExecResult;\n try {\n wgetResult = await adapter.exec('wget', [\n '-q',\n url,\n '-O',\n '/tmp/agentsh.tar.gz',\n ]);\n } catch {\n throw new ProvisioningError({\n phase: 'install',\n command: `curl -fsSL ${url} -o /tmp/agentsh.tar.gz`,\n stderr: curlResult.stderr || 'Download failed (curl failed, wget not available)',\n });\n }\n if (wgetResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: `wget -q ${url} -O /tmp/agentsh.tar.gz`,\n stderr: wgetResult.stderr,\n });\n }\n }\n\n // Extract\n const tarResult = await adapter.exec('tar', [\n 'xz',\n '-C',\n '/tmp/',\n '-f',\n '/tmp/agentsh.tar.gz',\n ]);\n if (tarResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'tar xz -C /tmp/ -f /tmp/agentsh.tar.gz',\n stderr: tarResult.stderr,\n });\n }\n}\n\nasync function uploadBinary(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n overrideUrl?: string,\n): Promise<void> {\n const url = binaryUrl(version, arch, overrideUrl);\n\n // Download on host side using fetch (Node 18+)\n const response = await fetch(url);\n if (!response.ok) {\n throw new ProvisioningError({\n phase: 'install',\n command: `fetch ${url}`,\n stderr: `HTTP ${response.status}: ${response.statusText}`,\n });\n }\n\n const buffer = Buffer.from(await response.arrayBuffer());\n\n // Upload tarball to sandbox and extract\n await adapter.writeFile('/tmp/agentsh.tar.gz', buffer);\n const tarResult = await adapter.exec('tar', [\n 'xz',\n '-C',\n '/tmp/',\n '-f',\n '/tmp/agentsh.tar.gz',\n ]);\n if (tarResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'tar xz -C /tmp/ -f /tmp/agentsh.tar.gz',\n stderr: tarResult.stderr,\n });\n }\n}\n\nasync function verifyChecksum(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n checksumOverride: string | undefined,\n filePath: string,\n): Promise<void> {\n const expected = getChecksum(version, arch, checksumOverride);\n const commands = buildVerifyCommand(filePath);\n\n let actual: string | undefined;\n\n for (const cmd of commands) {\n const result = await adapter.exec('sh', ['-c', cmd]);\n if (result.exitCode === 0 && result.stdout.trim()) {\n actual = result.stdout.trim();\n break;\n }\n }\n\n if (actual === undefined) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'sha256sum / shasum / openssl',\n stderr: 'No checksum tool available in sandbox',\n });\n }\n\n if (actual !== expected) {\n throw new IntegrityError({\n expected,\n actual,\n message: `Checksum mismatch: expected ${expected}, got ${actual}`,\n });\n }\n}\n\nasync function detectSecurityMode(\n adapter: SandboxAdapter,\n): Promise<SecurityMode> {\n const result = await adapter.exec('agentsh', ['detect', '--output', 'json']);\n if (result.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: result.stderr,\n });\n }\n\n // agentsh detect outputs JSON to stderr\n const jsonOutput = result.stderr || result.stdout;\n let parsed: { security_mode: string };\n try {\n parsed = JSON.parse(jsonOutput);\n } catch {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: `Failed to parse detect JSON: ${jsonOutput.slice(0, 200)}`,\n });\n }\n\n const mode = parsed.security_mode;\n const validModes: SecurityMode[] = ['full', 'landlock', 'landlock-only', 'minimal'];\n if (!validModes.includes(mode as SecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: `Unknown security mode: '${mode}'`,\n });\n }\n return mode as SecurityMode;\n}\n\nasync function healthCheck(adapter: SandboxAdapter): Promise<void> {\n const maxRetries = 10;\n const delayMs = 500;\n\n for (let i = 0; i < maxRetries; i++) {\n const result = await adapter.exec('curl', [\n '-sf',\n 'http://127.0.0.1:18080/health',\n ]);\n if (result.exitCode === 0) {\n return;\n }\n if (i < maxRetries - 1) {\n await sleep(delayMs);\n }\n }\n\n throw new ProvisioningError({\n phase: 'startup',\n command: 'curl http://127.0.0.1:18080/health',\n stderr: 'Health check failed after 10 attempts',\n });\n}\n","import type {\n SandboxAdapter,\n SecuredSandbox,\n SecurityMode,\n ExecResult,\n} from './types.js';\nimport { RuntimeError } from './errors.js';\nimport { getTraceparent } from './traceparent.js';\n\n/** Build env object with TRACEPARENT if an OTEL span is active. */\nasync function traceEnv(): Promise<Record<string, string> | undefined> {\n const tp = await getTraceparent();\n return tp ? { TRACEPARENT: tp } : undefined;\n}\n\n/** Parse the JSON envelope from `agentsh exec --output json`. */\nfunction parseExecJson(raw: ExecResult): ExecResult {\n try {\n const json = JSON.parse(raw.stdout);\n const result = json.result ?? {};\n return {\n exitCode: result.exit_code ?? raw.exitCode,\n stdout: result.stdout ?? '',\n stderr: result.stderr ?? result.error?.message ?? '',\n };\n } catch {\n // If not valid JSON, return as-is (e.g. mock adapters)\n return raw;\n }\n}\n\nexport function createSecuredSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n options?: { passthrough?: boolean },\n): SecuredSandbox {\n if (options?.passthrough) {\n return createPassthroughSandbox(adapter, sessionId, securityMode);\n }\n return createAgentshSandbox(adapter, sessionId, securityMode);\n}\n\n/**\n * Passthrough mode: the shell shim enforces policy on every command,\n * so we run commands directly through the adapter without wrapping\n * them in `agentsh exec`. Used with the 'running' install strategy.\n */\nfunction createPassthroughSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n): SecuredSandbox {\n return {\n sessionId,\n securityMode,\n\n async exec(command, opts) {\n const result = await adapter.exec('bash', ['-c', command], {\n cwd: opts?.cwd,\n });\n return result;\n },\n\n async writeFile(path, content) {\n const b64 = Buffer.from(content, 'utf-8').toString('base64');\n const result = await adapter.exec('sh', [\n '-c',\n 'printf \"%s\" \"$1\" | base64 -d > \"$2\"',\n '_',\n b64,\n path,\n ]);\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'writeFile failed',\n };\n }\n return { success: true as const, path };\n },\n\n async readFile(path) {\n const result = await adapter.exec('cat', [path]);\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'readFile failed',\n };\n }\n return { success: true as const, path, content: result.stdout };\n },\n\n async stop() {\n await adapter.stop?.();\n },\n };\n}\n\n/** Standard mode: wraps commands in `agentsh exec` for policy enforcement. */\nfunction createAgentshSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n): SecuredSandbox {\n return {\n sessionId,\n securityMode,\n\n async exec(command, opts) {\n const args = [\n 'exec',\n '--output',\n 'json',\n sessionId,\n '--',\n 'bash',\n '-c',\n command,\n ];\n const env = await traceEnv();\n const execOpts = { cwd: opts?.cwd, env };\n const result = await adapter.exec('agentsh', args, execOpts);\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command,\n stderr: result.stderr,\n });\n }\n return parseExecJson(result);\n },\n\n async writeFile(path, content) {\n const b64 = Buffer.from(content, 'utf-8').toString('base64');\n const args = [\n 'exec',\n sessionId,\n '--',\n 'sh',\n '-c',\n 'printf \"%s\" \"$1\" | base64 -d > \"$2\"',\n '_',\n b64,\n path,\n ];\n const env = await traceEnv();\n const result = await adapter.exec('agentsh', args, { env });\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command: `writeFile ${path}`,\n stderr: result.stderr,\n });\n }\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'writeFile failed',\n };\n }\n return { success: true as const, path };\n },\n\n async readFile(path) {\n const args = ['exec', sessionId, '--', 'cat', path];\n const env = await traceEnv();\n const result = await adapter.exec('agentsh', args, { env });\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command: `readFile ${path}`,\n stderr: result.stderr,\n });\n }\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'readFile failed',\n };\n }\n return { success: true as const, path, content: result.stdout };\n },\n\n async stop() {\n await adapter.stop?.();\n },\n };\n}\n\nfunction isTransportFailure(result: ExecResult): boolean {\n return result.exitCode === 127 && result.stderr.includes('agentsh');\n}\n","import type {\n SandboxAdapter,\n SecuredSandbox,\n SecureConfig,\n} from './core/types.js';\nimport { provision } from './core/provision.js';\nimport { createSecuredSandbox } from './core/runtime.js';\n\nexport async function secureSandbox(\n adapter: SandboxAdapter,\n config?: SecureConfig,\n): Promise<SecuredSandbox> {\n const resolvedConfig = config ?? {};\n const { sessionId, securityMode, passthrough } = await provision(adapter, {\n workspace: '/workspace',\n ...resolvedConfig,\n });\n return createSecuredSandbox(adapter, sessionId, securityMode, { passthrough });\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAEO,IAAM,iBAAiB;AAEvB,IAAM,YAAoD;AAAA,EAC/D,UAAU;AAAA,IACR,aACE;AAAA,IACF,aACE;AAAA,EACJ;AAAA,EACA,UAAU;AAAA,IACR,aACE;AAAA,IACF,aACE;AAAA,EACJ;AACF;AAQO,SAAS,YACd,SACA,MACA,UACQ;AACR,MAAI,UAAU;AACZ,WAAO;AAAA,EACT;AAEA,QAAM,mBAAmB,UAAU,OAAO;AAC1C,MAAI,oBAAoB,iBAAiB,IAAI,GAAG;AAC9C,WAAO,iBAAiB,IAAI;AAAA,EAC9B;AAEA,QAAM,IAAI,eAAe;AAAA,IACvB,UAAU;AAAA,IACV,QAAQ;AAAA,IACR,SAAS,mCAAmC,OAAO;AAAA,EACrD,CAAC;AACH;AAMO,SAAS,mBAAmB,UAA4B;AAC7D,SAAO;AAAA,IACL,cAAc,QAAQ;AAAA,IACtB,kBAAkB,QAAQ;AAAA,IAC1B,yBAAyB,QAAQ;AAAA,EACnC;AACF;AAOO,SAAS,UACd,SACA,MACA,aACQ;AACR,MAAI,aAAa;AACf,WAAO;AAAA,EACT;AAEA,SAAO,4DAA4D,OAAO,YAAY,OAAO,IAAI,IAAI;AACvG;;;ACzEA,OAAO,UAAU;AAeV,IAAM,qBAAwC;AAAA,EACnD,QAAQ;AAAA,EACR,OAAO;AAAA,IACL;AAAA,MACE,MAAM;AAAA,MACN,KAAK;AAAA,MACL,QAAQ;AAAA,MACR,iBAAiB;AAAA,IACnB;AAAA,IACA;AAAA,MACE,MAAM;AAAA,MACN,KAAK;AAAA,MACL,QAAQ;AAAA,MACR,iBAAiB;AAAA,IACnB;AAAA,EACF;AAAA,EACA,WAAW;AAAA,IACT;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAEO,SAAS,qBAAqB,MAAgC;AACnE,QAAM,SAAkC;AAAA,IACtC,QAAQ;AAAA,MACN,MAAM;AAAA,QACJ,MAAM;AAAA,MACR;AAAA,IACF;AAAA,IACA,MAAM;AAAA,MACJ,MAAM;AAAA,IACR;AAAA,IACA,UAAU;AAAA,MACR,YAAY;AAAA,MACZ,KAAK;AAAA,MACL,SAAS;AAAA,IACX;AAAA,IACA,WAAW,KAAK;AAAA,IAChB,SAAS;AAAA,MACP,SAAS;AAAA,MACT,gBAAgB;AAAA,IAClB;AAAA,EACF;AACA,MAAI,KAAK,WAAY,QAAO,aAAa,KAAK;AAC9C,MAAI,KAAK,iBAAkB,QAAO,oBAAoB;AACtD,MAAI,KAAK,UAAW,QAAO,aAAa;AAGxC,QAAM,QAAQ,KAAK,gBAAgB,QAAQ,SAAa,KAAK,eAAe;AAC5E,MAAI,OAAO;AACT,WAAO,eAAe;AAAA,MACpB,SAAS;AAAA,MACT,QAAQ,MAAM,UAAU;AAAA,MACxB,OAAO,MAAM,MAAM,IAAI,QAAM;AAAA,QAC3B,MAAM,EAAE;AAAA,QACR,KAAK,EAAE;AAAA,QACP,QAAQ,EAAE;AAAA,QACV,kBAAkB,EAAE,mBAAmB;AAAA,MACzC,EAAE;AAAA,MACF,GAAI,MAAM,WAAW,SAAS,EAAE,WAAW,MAAM,UAAU,IAAI,CAAC;AAAA,IAClE;AAAA,EACF;AAEA,SAAO,KAAK,KAAK,QAAQ,EAAE,WAAW,GAAG,CAAC;AAC5C;;;ACjFA,eAAsB,iBAA8C;AAClE,MAAI;AACF,UAAM,EAAE,MAAM,IAAI,MAAM,OAAO,mBAAoB;AACnD,UAAM,OAAO,MAAM,cAAc;AACjC,UAAM,MAAM,MAAM,YAAY;AAC9B,QAAI,CAAC,KAAK,WAAW,IAAI,YAAY,oCAAoC;AACvE,aAAO;AAAA,IACT;AACA,UAAM,SAAS,IAAI,cAAc,GAAG,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG;AAChE,WAAO,MAAM,IAAI,OAAO,IAAI,IAAI,MAAM,IAAI,KAAK;AAAA,EACjD,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACCA,IAAM,qBAAmD;AAAA,EACvD,MAAM;AAAA,EACN,UAAU;AAAA,EACV,iBAAiB;AAAA,EACjB,SAAS;AACX;AAEA,SAAS,aAAa,UAAwB,UAAiC;AAC7E,SAAO,mBAAmB,QAAQ,IAAI,mBAAmB,QAAQ;AACnE;AAIA,SAAS,QAAQ,OAA8C;AAC7D,QAAM,UAAU,MAAM,KAAK;AAC3B,MAAI,YAAY,SAAU,QAAO;AACjC,MAAI,YAAY,UAAW,QAAO;AAClC,QAAM,IAAI,kBAAkB;AAAA,IAC1B,OAAO;AAAA,IACP,SAAS;AAAA,IACT,QAAQ,6BAA6B,OAAO;AAAA,EAC9C,CAAC;AACH;AAIA,IAAM,gBAAgB,CAAC,0BAA0B,kBAAkB;AAEnE,eAAe,aAAa,SAA2C;AACrE,aAAW,QAAQ,eAAe;AAChC,UAAM,QAAQ,QAAQ,aAClB,MAAM,QAAQ,WAAW,IAAI,KAC5B,MAAM,QAAQ,KAAK,QAAQ,CAAC,MAAM,IAAI,CAAC,GAAG,aAAa;AAC5D,QAAI,MAAO,QAAO;AAAA,EACpB;AACA,SAAO;AACT;AAIA,SAAS,MAAM,IAA2B;AACxC,SAAO,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,EAAE,CAAC;AACzD;AAWA,eAAsB,UACpB,SACA,SAAuB,CAAC,GACE;AAC1B,QAAM;AAAA,IACJ,QAAQ;AAAA,IACR,YAAY;AAAA,IACZ;AAAA,IACA,kBAAkB;AAAA,IAClB,iBAAiB;AAAA,IACjB,aAAa;AAAA,IACb;AAAA,IACA;AAAA,IACA,qBAAqB;AAAA,IACrB;AAAA,IACA,WAAW;AAAA,IACX,mBAAmB;AAAA,IACnB;AAAA,IACA,aAAa;AAAA,IACb;AAAA,EACF,IAAI;AAGJ,QAAM,SAAS,YAAY,eAAe,SAAS,IAAI,aAAa;AAEpE,MAAI,eAA6B;AAEjC,MAAI,oBAAoB,WAAW;AAYjC,UAAM,YAAY,OAAO;AAEzB,mBAAe,OAAO,gBAAgB;AAEtC,QAAI,uBAAuB,aAAa,cAAc,mBAAmB,GAAG;AAC1E,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ,kBAAkB,YAAY,8BAA8B,mBAAmB;AAAA,MACzF,CAAC;AAAA,IACH;AAGA,QAAIA,aAAY,OAAO;AACvB,QAAI,CAACA,YAAW;AACd,YAAM,YAAY,MAAM,QAAQ,KAAK,MAAM,CAAC,MAAM,0BAA0B,CAAC;AAC7E,MAAAA,aAAY,UAAU,OAAO,KAAK;AAAA,IACpC;AACA,QAAI,CAACA,YAAW;AACd,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAEA,WAAO,EAAE,WAAAA,YAAW,cAAc,aAAa,KAAK;AAAA,EACtD;AAKA,QAAM,SAAS,MAAM,aAAa,OAAO;AAEzC,MAAI,oBAAoB,gBAAgB;AACtC,QAAI,CAAC,QAAQ;AACX,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,cAAc,IAAI,OAAK,WAAW,CAAC,EAAE,EAAE,KAAK,MAAM;AAAA,QAC3D,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAAA,EAEF,WAAW,oBAAoB,cAAc,oBAAoB,UAAU;AAEzE,QAAI,CAAC,QAAQ;AAEX,YAAM,OACJ,gBAAgB,MAAM,WAAW,OAAO;AAE1C,UAAI,oBAAoB,YAAY;AAElC,cAAM,eAAe,SAAS,gBAAgB,MAAM,gBAAgB;AAAA,MACtE,OAAO;AAEL,cAAM,aAAa,SAAS,gBAAgB,MAAM,gBAAgB;AAAA,MACpE;AAGA,UAAI,CAAC,oBAAoB;AACvB,cAAM;AAAA,UACJ;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF;AAAA,MACF;AAGA,YAAM,WAAW;AAAA,QACf,EAAE,KAAK,gBAAgB,MAAM,yBAAyB;AAAA,QACtD,EAAE,KAAK,2BAA2B,MAAM,8BAA8B;AAAA,QACtE,EAAE,KAAK,yBAAyB,MAAM,kCAAkC;AAAA,MAC1E;AACA,iBAAW,EAAE,KAAK,KAAK,KAAK,UAAU;AACpC,cAAM,gBAAgB,MAAM,QAAQ;AAAA,UAClC;AAAA,UACA,CAAC,MAAM,QAAQ,KAAK,IAAI;AAAA,UACxB,EAAE,MAAM,KAAK;AAAA,QACf;AACA,YAAI,cAAc,aAAa,GAAG;AAChC,gBAAM,IAAI,kBAAkB;AAAA,YAC1B,OAAO;AAAA,YACP,SAAS,mBAAmB,GAAG,IAAI,IAAI;AAAA,YACvC,QAAQ,cAAc;AAAA,UACxB,CAAC;AAAA,QACH;AAAA,MACF;AAAA,IACF;AAAA,EACF;AAGA,iBAAe,MAAM,mBAAmB,OAAO;AAG/C,MAAI,uBAAuB,aAAa,cAAc,mBAAmB,GAAG;AAC1E,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,2BAA2B,YAAY,8BAA8B,mBAAmB;AAAA,IAClG,CAAC;AAAA,EACH;AAIA,QAAM,UAAU,iBAAiB,UAAU,iBAAiB;AAC5D,QAAM,YAAY,qBAAqB;AAGvC,QAAM,aAAa,MAAM,QAAQ;AAAA,IAC/B;AAAA,IACA;AAAA,MACE;AAAA,MAAQ;AAAA,MACR;AAAA,MAAU;AAAA,MACV;AAAA,MAAU;AAAA,MACV;AAAA,MACA;AAAA,IACF;AAAA,IACA,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,WAAW,aAAa,GAAG;AAC7B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,WAAW;AAAA,IACrB,CAAC;AAAA,EACH;AAKA,QAAM,cAAc,MAAM,QAAQ;AAAA,IAChC;AAAA,IACA,CAAC,MAAM,qBAAqB;AAAA,IAC5B,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,YAAY,aAAa,GAAG;AAC9B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,YAAY;AAAA,IACtB,CAAC;AAAA,EACH;AAGA,QAAM,QAAQ,KAAK,SAAS,CAAC,MAAM,OAAO,eAAe,GAAG,EAAE,MAAM,KAAK,CAAC;AAE1E,QAAM,QAAQ;AAAA,IACZ;AAAA,IACA,iBAAiB;AAAA,IACjB,EAAE,MAAM,KAAK;AAAA,EACf;AAGA,QAAM,QAAQ;AAAA,IACZ;AAAA,IACA,gBAAgB,MAAM;AAAA,IACtB,EAAE,MAAM,KAAK;AAAA,EACf;AAGA,QAAM,eAAe,qBAAqB;AAAA,IACxC;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AAED,QAAM,QAAQ,UAAU,2BAA2B,cAAc;AAAA,IAC/D,MAAM;AAAA,EACR,CAAC;AAGD,QAAM,iBAAiB,MAAM,QAAQ;AAAA,IACnC;AAAA,IACA,CAAC,gBAAgB,SAAS,KAAK,SAAS,SAAS,OAAO,MAAM,GAAG;AAAA,IACjE,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,eAAe,aAAa,GAAG;AACjC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,eAAe;AAAA,IACzB,CAAC;AAAA,EACH;AAEA,QAAM,kBAAkB,MAAM,QAAQ;AAAA,IACpC;AAAA,IACA,CAAC,gBAAgB,SAAS,KAAK,SAAS,SAAS,OAAO,MAAM,GAAG;AAAA,IACjE,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,gBAAgB,aAAa,GAAG;AAClC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,gBAAgB;AAAA,IAC1B,CAAC;AAAA,EACH;AAEA,QAAM,cAAc,MAAM,QAAQ;AAAA,IAChC;AAAA,IACA,CAAC,MAAM,aAAa,eAAe;AAAA,IACnC,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,YAAY,aAAa,GAAG;AAC9B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,YAAY;AAAA,IACtB,CAAC;AAAA,EACH;AAKA,QAAM,QAAQ,KAAK,SAAS,CAAC,MAAM,SAAS,GAAG,EAAE,MAAM,KAAK,CAAC;AAG7D,QAAM,eAAe,MAAM,QAAQ;AAAA,IACjC;AAAA,IACA,CAAC,UAAU,YAAY,yBAAyB;AAAA,IAChD,EAAE,UAAU,MAAM,MAAM,KAAK;AAAA,EAC/B;AACA,MAAI,aAAa,aAAa,GAAG;AAC/B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,aAAa;AAAA,IACvB,CAAC;AAAA,EACH;AAGA,QAAM,YAAY,OAAO;AAGzB,QAAM,gBAAgB,MAAM,QAAQ,KAAK,WAAW;AAAA,IAClD;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,cAAc,aAAa,GAAG;AAChC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,cAAc;AAAA,IACxB,CAAC;AAAA,EACH;AAEA,MAAI;AACJ,MAAI;AACF,UAAM,cAAc,KAAK,MAAM,cAAc,MAAM;AACnD,gBAAY,YAAY;AAAA,EAC1B,QAAQ;AAEN,UAAM,QAAQ,cAAc,OAAO,MAAM,4BAA4B;AACrE,QAAI,OAAO;AACT,kBAAY,MAAM,CAAC;AAAA,IACrB,OAAO;AACL,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ,mCAAmC,cAAc,MAAM;AAAA,MACjE,CAAC;AAAA,IACH;AAAA,EACF;AAGA,QAAM,uBAAuB,eAAgB,MAAM,eAAe;AAClE,MAAI,sBAAsB;AACxB,UAAM,QAAQ,KAAK,QAAQ;AAAA,MACzB;AAAA,MACA;AAAA,MACA,mCAAmC,SAAS;AAAA,MAC5C;AAAA,MACA;AAAA,MACA;AAAA,MACA,KAAK,UAAU,EAAE,aAAa,qBAAqB,CAAC;AAAA,IACtD,CAAC;AAAA,EACH;AAKA,SAAO,EAAE,WAAW,aAAa;AACnC;AAIA,eAAe,WACb,SACwC;AACxC,QAAM,SAAS,MAAM,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC;AACjD,MAAI,OAAO,aAAa,GAAG;AACzB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,OAAO;AAAA,IACjB,CAAC;AAAA,EACH;AACA,SAAO,QAAQ,OAAO,MAAM;AAC9B;AAEA,eAAe,eACb,SACA,SACA,MACA,aACe;AACf,QAAM,MAAM,UAAU,SAAS,MAAM,WAAW;AAGhD,QAAM,aAAa,MAAM,QAAQ,KAAK,QAAQ;AAAA,IAC5C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AAED,MAAI,WAAW,aAAa,GAAG;AAE7B,QAAI;AACJ,QAAI;AACF,mBAAa,MAAM,QAAQ,KAAK,QAAQ;AAAA,QACtC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAAA,IACH,QAAQ;AACN,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,cAAc,GAAG;AAAA,QAC1B,QAAQ,WAAW,UAAU;AAAA,MAC/B,CAAC;AAAA,IACH;AACA,QAAI,WAAW,aAAa,GAAG;AAC7B,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,WAAW,GAAG;AAAA,QACvB,QAAQ,WAAW;AAAA,MACrB,CAAC;AAAA,IACH;AAAA,EACF;AAGA,QAAM,YAAY,MAAM,QAAQ,KAAK,OAAO;AAAA,IAC1C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,UAAU,aAAa,GAAG;AAC5B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,UAAU;AAAA,IACpB,CAAC;AAAA,EACH;AACF;AAEA,eAAe,aACb,SACA,SACA,MACA,aACe;AACf,QAAM,MAAM,UAAU,SAAS,MAAM,WAAW;AAGhD,QAAM,WAAW,MAAM,MAAM,GAAG;AAChC,MAAI,CAAC,SAAS,IAAI;AAChB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS,SAAS,GAAG;AAAA,MACrB,QAAQ,QAAQ,SAAS,MAAM,KAAK,SAAS,UAAU;AAAA,IACzD,CAAC;AAAA,EACH;AAEA,QAAM,SAAS,OAAO,KAAK,MAAM,SAAS,YAAY,CAAC;AAGvD,QAAM,QAAQ,UAAU,uBAAuB,MAAM;AACrD,QAAM,YAAY,MAAM,QAAQ,KAAK,OAAO;AAAA,IAC1C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,UAAU,aAAa,GAAG;AAC5B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,UAAU;AAAA,IACpB,CAAC;AAAA,EACH;AACF;AAEA,eAAe,eACb,SACA,SACA,MACA,kBACA,UACe;AACf,QAAM,WAAW,YAAY,SAAS,MAAM,gBAAgB;AAC5D,QAAM,WAAW,mBAAmB,QAAQ;AAE5C,MAAI;AAEJ,aAAW,OAAO,UAAU;AAC1B,UAAM,SAAS,MAAM,QAAQ,KAAK,MAAM,CAAC,MAAM,GAAG,CAAC;AACnD,QAAI,OAAO,aAAa,KAAK,OAAO,OAAO,KAAK,GAAG;AACjD,eAAS,OAAO,OAAO,KAAK;AAC5B;AAAA,IACF;AAAA,EACF;AAEA,MAAI,WAAW,QAAW;AACxB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ;AAAA,IACV,CAAC;AAAA,EACH;AAEA,MAAI,WAAW,UAAU;AACvB,UAAM,IAAI,eAAe;AAAA,MACvB;AAAA,MACA;AAAA,MACA,SAAS,+BAA+B,QAAQ,SAAS,MAAM;AAAA,IACjE,CAAC;AAAA,EACH;AACF;AAEA,eAAe,mBACb,SACuB;AACvB,QAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,CAAC,UAAU,YAAY,MAAM,CAAC;AAC3E,MAAI,OAAO,aAAa,GAAG;AACzB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,OAAO;AAAA,IACjB,CAAC;AAAA,EACH;AAGA,QAAM,aAAa,OAAO,UAAU,OAAO;AAC3C,MAAI;AACJ,MAAI;AACF,aAAS,KAAK,MAAM,UAAU;AAAA,EAChC,QAAQ;AACN,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,gCAAgC,WAAW,MAAM,GAAG,GAAG,CAAC;AAAA,IAClE,CAAC;AAAA,EACH;AAEA,QAAM,OAAO,OAAO;AACpB,QAAM,aAA6B,CAAC,QAAQ,YAAY,iBAAiB,SAAS;AAClF,MAAI,CAAC,WAAW,SAAS,IAAoB,GAAG;AAC9C,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,2BAA2B,IAAI;AAAA,IACzC,CAAC;AAAA,EACH;AACA,SAAO;AACT;AAEA,eAAe,YAAY,SAAwC;AACjE,QAAM,aAAa;AACnB,QAAM,UAAU;AAEhB,WAAS,IAAI,GAAG,IAAI,YAAY,KAAK;AACnC,UAAM,SAAS,MAAM,QAAQ,KAAK,QAAQ;AAAA,MACxC;AAAA,MACA;AAAA,IACF,CAAC;AACD,QAAI,OAAO,aAAa,GAAG;AACzB;AAAA,IACF;AACA,QAAI,IAAI,aAAa,GAAG;AACtB,YAAM,MAAM,OAAO;AAAA,IACrB;AAAA,EACF;AAEA,QAAM,IAAI,kBAAkB;AAAA,IAC1B,OAAO;AAAA,IACP,SAAS;AAAA,IACT,QAAQ;AAAA,EACV,CAAC;AACH;;;AC3lBA,eAAe,WAAwD;AACrE,QAAM,KAAK,MAAM,eAAe;AAChC,SAAO,KAAK,EAAE,aAAa,GAAG,IAAI;AACpC;AAGA,SAAS,cAAc,KAA6B;AAClD,MAAI;AACF,UAAM,OAAO,KAAK,MAAM,IAAI,MAAM;AAClC,UAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,WAAO;AAAA,MACL,UAAU,OAAO,aAAa,IAAI;AAAA,MAClC,QAAQ,OAAO,UAAU;AAAA,MACzB,QAAQ,OAAO,UAAU,OAAO,OAAO,WAAW;AAAA,IACpD;AAAA,EACF,QAAQ;AAEN,WAAO;AAAA,EACT;AACF;AAEO,SAAS,qBACd,SACA,WACA,cACA,SACgB;AAChB,MAAI,SAAS,aAAa;AACxB,WAAO,yBAAyB,SAAS,WAAW,YAAY;AAAA,EAClE;AACA,SAAO,qBAAqB,SAAS,WAAW,YAAY;AAC9D;AAOA,SAAS,yBACP,SACA,WACA,cACgB;AAChB,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IAEA,MAAM,KAAK,SAAS,MAAM;AACxB,YAAM,SAAS,MAAM,QAAQ,KAAK,QAAQ,CAAC,MAAM,OAAO,GAAG;AAAA,QACzD,KAAK,MAAM;AAAA,MACb,CAAC;AACD,aAAO;AAAA,IACT;AAAA,IAEA,MAAM,UAAU,MAAM,SAAS;AAC7B,YAAM,MAAM,OAAO,KAAK,SAAS,OAAO,EAAE,SAAS,QAAQ;AAC3D,YAAM,SAAS,MAAM,QAAQ,KAAK,MAAM;AAAA,QACtC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AACD,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,KAAK;AAAA,IACxC;AAAA,IAEA,MAAM,SAAS,MAAM;AACnB,YAAM,SAAS,MAAM,QAAQ,KAAK,OAAO,CAAC,IAAI,CAAC;AAC/C,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,MAAM,SAAS,OAAO,OAAO;AAAA,IAChE;AAAA,IAEA,MAAM,OAAO;AACX,YAAM,QAAQ,OAAO;AAAA,IACvB;AAAA,EACF;AACF;AAGA,SAAS,qBACP,SACA,WACA,cACgB;AAChB,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IAEA,MAAM,KAAK,SAAS,MAAM;AACxB,YAAM,OAAO;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AACA,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,WAAW,EAAE,KAAK,MAAM,KAAK,IAAI;AACvC,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,QAAQ;AAC3D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA;AAAA,UACA,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,aAAO,cAAc,MAAM;AAAA,IAC7B;AAAA,IAEA,MAAM,UAAU,MAAM,SAAS;AAC7B,YAAM,MAAM,OAAO,KAAK,SAAS,OAAO,EAAE,SAAS,QAAQ;AAC3D,YAAM,OAAO;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AACA,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,EAAE,IAAI,CAAC;AAC1D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA,SAAS,aAAa,IAAI;AAAA,UAC1B,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,KAAK;AAAA,IACxC;AAAA,IAEA,MAAM,SAAS,MAAM;AACnB,YAAM,OAAO,CAAC,QAAQ,WAAW,MAAM,OAAO,IAAI;AAClD,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,EAAE,IAAI,CAAC;AAC1D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA,SAAS,YAAY,IAAI;AAAA,UACzB,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,MAAM,SAAS,OAAO,OAAO;AAAA,IAChE;AAAA,IAEA,MAAM,OAAO;AACX,YAAM,QAAQ,OAAO;AAAA,IACvB;AAAA,EACF;AACF;AAEA,SAAS,mBAAmB,QAA6B;AACvD,SAAO,OAAO,aAAa,OAAO,OAAO,OAAO,SAAS,SAAS;AACpE;;;AC5LA,eAAsB,cACpB,SACA,QACyB;AACzB,QAAM,iBAAiB,UAAU,CAAC;AAClC,QAAM,EAAE,WAAW,cAAc,YAAY,IAAI,MAAM,UAAU,SAAS;AAAA,IACxE,WAAW;AAAA,IACX,GAAG;AAAA,EACL,CAAC;AACD,SAAO,qBAAqB,SAAS,WAAW,cAAc,EAAE,YAAY,CAAC;AAC/E;","names":["sessionId"]}
1
+ {"version":3,"sources":["../src/core/integrity.ts","../src/core/config.ts","../src/core/traceparent.ts","../src/core/provision.ts","../src/core/runtime.ts","../src/api.ts"],"sourcesContent":["import { IntegrityError } from './errors.js';\n\nexport const PINNED_VERSION = '0.15.0';\n\nexport const CHECKSUMS: Record<string, Record<string, string>> = {\n '0.15.0': {\n linux_amd64:\n '89f7ebbfd75ffd961245ec62b2602fd0cc387740502ac858dbc39c367c5699c5',\n linux_arm64:\n '3fabbd749f9e98fb9f96ddfc94c389a6868cda7ed3668daa8440c39ceec85f3b',\n },\n '0.14.0': {\n linux_amd64:\n '2ab8ba0d6637fe1a5badf840c3db197161a6f9865d721ed216029d229b1b9bbc',\n linux_arm64:\n '929d18dd9fe36e9b2fa830d7ae64b4fb481853e743ade8674fcfcdc73470ed53',\n },\n};\n\n/**\n * Returns the checksum to verify against.\n * If `override` is provided, returns it directly.\n * Otherwise looks up the checksum in the pinned CHECKSUMS map.\n * Throws IntegrityError if no checksum is found.\n */\nexport function getChecksum(\n version: string,\n arch: string,\n override?: string,\n): string {\n if (override) {\n return override;\n }\n\n const versionChecksums = CHECKSUMS[version];\n if (versionChecksums && versionChecksums[arch]) {\n return versionChecksums[arch];\n }\n\n throw new IntegrityError({\n expected: '',\n actual: '',\n message: `No pinned checksum for agentsh v${version}. Provide \\`agentshChecksum\\` explicitly or use \\`skipIntegrityCheck: true\\`.`,\n });\n}\n\n/**\n * Returns an array of shell commands to try for computing SHA-256 checksums.\n * Each command extracts just the hex hash value from the given file.\n */\nexport function buildVerifyCommand(filePath: string): string[] {\n return [\n `sha256sum \"${filePath}\" | awk '{print $1}'`,\n `shasum -a 256 \"${filePath}\" | awk '{print $1}'`,\n `openssl dgst -sha256 \"${filePath}\" | awk '{print $NF}'`,\n ];\n}\n\n/**\n * Returns the download URL for the agentsh binary.\n * If `overrideUrl` is provided, returns it directly.\n * Otherwise returns the default GitHub releases URL.\n */\nexport function binaryUrl(\n version: string,\n arch: string,\n overrideUrl?: string,\n): string {\n if (overrideUrl) {\n return overrideUrl;\n }\n\n return `https://github.com/canyonroad/agentsh/releases/download/v${version}/agentsh_${version}_${arch}.tar.gz`;\n}\n","import yaml from 'js-yaml';\nimport type { ThreatFeedsConfig, PackageChecksConfig, ProviderConfig } from './types.js';\n\nexport interface ServerConfigOpts {\n watchtower?: string;\n realPaths?: boolean;\n threatFeeds?: false | ThreatFeedsConfig;\n packageChecks?: false | PackageChecksConfig;\n}\n\n/**\n * Default threat feeds: URLhaus (malware) + Phishing.Database (phishing).\n * Both are free, open source, and updated frequently.\n */\nexport const defaultThreatFeeds: ThreatFeedsConfig = {\n action: 'deny',\n feeds: [\n {\n name: 'urlhaus',\n url: 'https://urlhaus.abuse.ch/downloads/hostfile/',\n format: 'hostfile',\n refreshInterval: '6h',\n },\n {\n name: 'phishing',\n url: 'https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-ACTIVE.txt',\n format: 'domain-list',\n refreshInterval: '12h',\n },\n ],\n allowlist: [\n 'github.com',\n '*.github.com',\n 'registry.npmjs.org',\n 'registry.yarnpkg.com',\n 'pypi.org',\n 'files.pythonhosted.org',\n 'crates.io',\n 'static.crates.io',\n 'index.crates.io',\n 'proxy.golang.org',\n 'sum.golang.org',\n ],\n};\n\n/**\n * Default package check providers: local, osv, depsdev.\n * All are free and require no API key.\n */\nexport const defaultPackageCheckProviders: Record<string, { enabled: boolean; priority: number }> = {\n local: { enabled: true, priority: 0 },\n osv: { enabled: true, priority: 1 },\n depsdev: { enabled: true, priority: 2 },\n};\n\n/**\n * Convert a camelCase ProviderConfig key to snake_case.\n */\nfunction providerConfigToSnakeCase(config: ProviderConfig): Record<string, unknown> {\n const result: Record<string, unknown> = { enabled: config.enabled ?? true };\n if (config.priority !== undefined) result.priority = config.priority;\n if (config.timeout !== undefined) result.timeout = config.timeout;\n if (config.onFailure !== undefined) result.on_failure = config.onFailure;\n if (config.apiKeyEnv !== undefined) result.api_key_env = config.apiKeyEnv;\n if (config.type !== undefined) result.type = config.type;\n if (config.command !== undefined) result.command = config.command;\n if (config.options !== undefined) result.options = config.options;\n return result;\n}\n\nexport function generateServerConfig(opts: ServerConfigOpts): string {\n const config: Record<string, unknown> = {\n server: {\n http: {\n addr: '127.0.0.1:18080',\n },\n },\n auth: {\n type: 'none',\n },\n policies: {\n system_dir: '/etc/agentsh/system',\n dir: '/etc/agentsh',\n default: 'policy',\n },\n sandbox: {\n enabled: true,\n allow_degraded: true,\n fuse: { enabled: true },\n network: { enabled: true },\n seccomp: { enabled: true },\n },\n };\n if (opts.watchtower) config.watchtower = opts.watchtower;\n if (opts.realPaths) config.sessions = { real_paths: true };\n\n // Threat feeds: enabled by default, opt-out with `threatFeeds: false`\n const feeds = opts.threatFeeds === false ? undefined : (opts.threatFeeds ?? defaultThreatFeeds);\n if (feeds) {\n config.threat_feeds = {\n enabled: true,\n action: feeds.action ?? 'deny',\n feeds: feeds.feeds.map(f => ({\n name: f.name,\n url: f.url,\n format: f.format,\n refresh_interval: f.refreshInterval ?? '6h',\n })),\n ...(feeds.allowlist?.length ? { allowlist: feeds.allowlist } : {}),\n };\n }\n\n // Package checks: disabled by default, opt-in with `packageChecks: {}`\n if (opts.packageChecks) {\n const pc = opts.packageChecks;\n const providers: Record<string, Record<string, unknown>> = {};\n\n // Start with defaults\n for (const [name, def] of Object.entries(defaultPackageCheckProviders)) {\n providers[name] = { ...def };\n }\n\n // Merge user-provided providers\n if (pc.providers) {\n for (const [name, value] of Object.entries(pc.providers)) {\n if (value === false) {\n providers[name] = { enabled: false };\n } else if (value === true) {\n providers[name] = { ...(providers[name] ?? {}), enabled: true };\n } else {\n // ProviderConfig object — merge with existing default if present\n const base = providers[name] ?? {};\n providers[name] = { ...base, ...providerConfigToSnakeCase(value) };\n }\n }\n }\n\n config.package_checks = {\n enabled: true,\n scope: pc.scope ?? 'new_packages_only',\n providers,\n };\n }\n\n return yaml.dump(config, { lineWidth: -1 });\n}\n","/**\n * Read W3C traceparent from the active OpenTelemetry span, if available.\n *\n * Uses dynamic import so @opentelemetry/api is an optional peer dependency.\n * Returns undefined when OTEL is not installed, no span is active, or the\n * trace context is invalid (all-zero trace ID).\n */\nexport async function getTraceparent(): Promise<string | undefined> {\n try {\n const { trace } = await import('@opentelemetry/api');\n const span = trace.getActiveSpan();\n const ctx = span?.spanContext();\n if (!ctx?.traceId || ctx.traceId === '00000000000000000000000000000000') {\n return undefined;\n }\n const flags = (ctx.traceFlags ?? 0).toString(16).padStart(2, '0');\n return `00-${ctx.traceId}-${ctx.spanId}-${flags}`;\n } catch {\n return undefined;\n }\n}\n","import type {\n SandboxAdapter,\n SecureConfig,\n SecurityMode,\n ExecResult,\n} from './types.js';\nimport {\n getChecksum,\n buildVerifyCommand,\n binaryUrl,\n PINNED_VERSION,\n} from './integrity.js';\nimport { generateServerConfig } from './config.js';\nimport { ProvisioningError, IntegrityError } from './errors.js';\nimport { serializePolicy, systemPolicyYaml } from '../policies/serialize.js';\nimport { agentDefault } from '../policies/presets.js';\nimport { validatePolicy } from '../policies/schema.js';\nimport { getTraceparent } from './traceparent.js';\n\n// ─── Security mode ordering (strongest to weakest) ────────────\n\nconst SECURITY_MODE_RANK: Record<SecurityMode, number> = {\n full: 4,\n landlock: 3,\n 'landlock-only': 2,\n minimal: 1,\n};\n\nfunction isWeakerThan(detected: SecurityMode, required: SecurityMode): boolean {\n return SECURITY_MODE_RANK[detected] < SECURITY_MODE_RANK[required];\n}\n\n// ─── Architecture mapping ─────────────────────────────────────\n\nfunction mapArch(uname: string): 'linux_amd64' | 'linux_arm64' {\n const trimmed = uname.trim();\n if (trimmed === 'x86_64') return 'linux_amd64';\n if (trimmed === 'aarch64') return 'linux_arm64';\n throw new ProvisioningError({\n phase: 'install',\n command: 'uname -m',\n stderr: `Unsupported architecture: ${trimmed}`,\n });\n}\n\n// ─── Helper: check if binary exists ───────────────────────────\n\nconst AGENTSH_PATHS = ['/usr/local/bin/agentsh', '/usr/bin/agentsh'];\n\nasync function binaryExists(adapter: SandboxAdapter): Promise<boolean> {\n for (const path of AGENTSH_PATHS) {\n const found = adapter.fileExists\n ? await adapter.fileExists(path)\n : (await adapter.exec('test', ['-f', path])).exitCode === 0;\n if (found) return true;\n }\n return false;\n}\n\n// ─── Helper: sleep ────────────────────────────────────────────\n\nfunction sleep(ms: number): Promise<void> {\n return new Promise((resolve) => setTimeout(resolve, ms));\n}\n\n// ─── Main provisioning function ───────────────────────────────\n\nexport interface ProvisionResult {\n sessionId: string;\n securityMode: SecurityMode;\n /** When true, the shell shim enforces policy — skip agentsh exec wrapper. */\n passthrough?: boolean;\n}\n\nexport async function provision(\n adapter: SandboxAdapter,\n config: SecureConfig = {},\n): Promise<ProvisionResult> {\n const {\n policy: rawPolicy,\n workspace = '/workspace',\n watchtower,\n installStrategy = 'download',\n agentshVersion = PINNED_VERSION,\n agentshArch: archOverride,\n agentshBinaryUrl,\n agentshChecksum,\n skipIntegrityCheck = false,\n minimumSecurityMode,\n realPaths: realPathsOverride,\n traceParent,\n policyName = 'policy',\n threatFeeds,\n packageChecks,\n } = config;\n\n // Resolve and validate policy\n const policy = rawPolicy ? validatePolicy(rawPolicy) : agentDefault();\n\n let securityMode: SecurityMode = 'full';\n\n if (installStrategy === 'running') {\n // agentsh is already fully provisioned and running with the shell shim\n // installed. Commands go through the shim automatically, so we don't\n // create a new session (which would deadlock the server via nested\n // agentsh connections). Instead, read the existing session ID from\n // the environment and use passthrough mode at runtime.\n //\n // Skip detectSecurityMode() — running `agentsh detect` inside a sandbox\n // where the shell shim is already installed would route the command\n // through agentsh's exec API, causing the server to try binding port\n // 18080 again (\"address already in use\"). Default to 'full' since\n // pre-provisioned environments typically have full capabilities.\n await healthCheck(adapter);\n\n securityMode = config.securityMode ?? 'full';\n\n if (minimumSecurityMode && isWeakerThan(securityMode, minimumSecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'securityMode check',\n stderr: `Security mode '${securityMode}' is weaker than required '${minimumSecurityMode}'`,\n });\n }\n\n // Read the existing session ID from config or from the environment\n let sessionId = config.sessionId;\n if (!sessionId) {\n const envResult = await adapter.exec('sh', ['-c', 'echo $AGENTSH_SESSION_ID']);\n sessionId = envResult.stdout.trim();\n }\n if (!sessionId) {\n throw new ProvisioningError({\n phase: 'session',\n command: 'echo $AGENTSH_SESSION_ID',\n stderr: 'AGENTSH_SESSION_ID not set — running strategy requires a pre-created session',\n });\n }\n\n return { sessionId, securityMode, passthrough: true };\n }\n\n // ─── Phase 1: Binary Installation ───────────────────────────\n\n // Step 1: Check if binary exists\n const exists = await binaryExists(adapter);\n\n if (installStrategy === 'preinstalled') {\n if (!exists) {\n throw new ProvisioningError({\n phase: 'install',\n command: AGENTSH_PATHS.map(p => `test -f ${p}`).join(' || '),\n stderr: 'Binary not found but installStrategy is preinstalled',\n });\n }\n // Binary exists and strategy is preinstalled, skip to detect\n } else if (installStrategy === 'download' || installStrategy === 'upload') {\n // If binary already exists, skip installation but still detect\n if (!exists) {\n // Step 2: Detect architecture\n const arch =\n archOverride ?? await detectArch(adapter);\n\n if (installStrategy === 'download') {\n // Step 3a: Download\n await downloadBinary(adapter, agentshVersion, arch, agentshBinaryUrl);\n } else {\n // Step 3b: Upload\n await uploadBinary(adapter, agentshVersion, arch, agentshBinaryUrl);\n }\n\n // Step 4: Verify checksum\n if (!skipIntegrityCheck) {\n await verifyChecksum(\n adapter,\n agentshVersion,\n arch,\n agentshChecksum,\n '/tmp/agentsh.tar.gz',\n );\n }\n\n // Step 5: Install binaries (agentsh + agentsh-shell-shim + agentsh-unixwrap)\n const binaries = [\n { src: '/tmp/agentsh', dest: '/usr/local/bin/agentsh' },\n { src: '/tmp/agentsh-shell-shim', dest: '/usr/bin/agentsh-shell-shim' },\n { src: '/tmp/agentsh-unixwrap', dest: '/usr/local/bin/agentsh-unixwrap' },\n ];\n for (const { src, dest } of binaries) {\n const installResult = await adapter.exec(\n 'install',\n ['-m', '0755', src, dest],\n { sudo: true },\n );\n if (installResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: `install -m 0755 ${src} ${dest}`,\n stderr: installResult.stderr,\n });\n }\n }\n }\n }\n\n // Step 5b: Detect security mode\n securityMode = await detectSecurityMode(adapter);\n\n // Check minimum security mode\n if (minimumSecurityMode && isWeakerThan(securityMode, minimumSecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --json',\n stderr: `Detected security mode '${securityMode}' is weaker than required '${minimumSecurityMode}'`,\n });\n }\n\n // Auto-enable realPaths when FUSE is available (full or landlock modes),\n // unless the user explicitly set it.\n const hasFuse = securityMode === 'full' || securityMode === 'landlock';\n const realPaths = realPathsOverride ?? hasFuse;\n\n // Step 6: Install shell shim\n const shimResult = await adapter.exec(\n 'agentsh',\n [\n 'shim', 'install-shell',\n '--root', '/',\n '--shim', '/usr/bin/agentsh-shell-shim',\n '--bash',\n '--i-understand-this-modifies-the-host',\n ],\n { sudo: true },\n );\n if (shimResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh shim install-shell',\n stderr: shimResult.stderr,\n });\n }\n\n // ─── Phase 2: Policy & Config ───────────────────────────────\n\n // Step 7: Create dirs and make writable for file writes\n const mkdirResult = await adapter.exec(\n 'mkdir',\n ['-p', '/etc/agentsh/system'],\n { sudo: true },\n );\n if (mkdirResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'mkdir -p /etc/agentsh/system',\n stderr: mkdirResult.stderr,\n });\n }\n\n // Temporarily make writable so adapter.writeFile (which may not support sudo) can write\n await adapter.exec('chmod', ['-R', '777', '/etc/agentsh/'], { sudo: true });\n\n await adapter.writeFile(\n '/etc/agentsh/system/policy.yml',\n systemPolicyYaml(),\n { sudo: true },\n );\n\n // Step 8: Write user policy\n await adapter.writeFile(\n '/etc/agentsh/policy.yml',\n serializePolicy(policy),\n { sudo: true },\n );\n\n // Step 9: Write server config\n const serverConfig = generateServerConfig({\n watchtower,\n realPaths,\n threatFeeds,\n packageChecks,\n });\n\n await adapter.writeFile('/etc/agentsh/config.yml', serverConfig, {\n sudo: true,\n });\n\n // Step 10: Set permissions\n const chmodDirResult = await adapter.exec(\n 'find',\n ['/etc/agentsh', '-type', 'd', '-exec', 'chmod', '555', '{}', '+'],\n { sudo: true },\n );\n if (chmodDirResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'find /etc/agentsh -type d -exec chmod 555 {} +',\n stderr: chmodDirResult.stderr,\n });\n }\n\n const chmodFileResult = await adapter.exec(\n 'find',\n ['/etc/agentsh', '-type', 'f', '-exec', 'chmod', '444', '{}', '+'],\n { sudo: true },\n );\n if (chmodFileResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'find /etc/agentsh -type f -exec chmod 444 {} +',\n stderr: chmodFileResult.stderr,\n });\n }\n\n const chownResult = await adapter.exec(\n 'chown',\n ['-R', 'root:root', '/etc/agentsh/'],\n { sudo: true },\n );\n if (chownResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'chown -R root:root /etc/agentsh/',\n stderr: chownResult.stderr,\n });\n }\n\n // ─── Phase 3: Server Startup ────────────────────────────────\n\n // Step 10b: Ensure workspace directory exists\n await adapter.exec('mkdir', ['-p', workspace], { sudo: true });\n\n // Step 11: Start server\n const serverResult = await adapter.exec(\n 'agentsh',\n ['server', '--config', '/etc/agentsh/config.yml'],\n { detached: true, sudo: true },\n );\n if (serverResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'startup',\n command: 'agentsh server --config /etc/agentsh/config.yml',\n stderr: serverResult.stderr,\n });\n }\n\n // Step 12: Health check\n await healthCheck(adapter);\n\n // Step 13: Create session\n const sessionResult = await adapter.exec('agentsh', [\n 'session',\n 'create',\n '--workspace',\n workspace,\n '--policy',\n 'policy',\n ]);\n if (sessionResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'session',\n command: 'agentsh session create',\n stderr: sessionResult.stderr,\n });\n }\n\n let sessionId: string;\n try {\n const sessionData = JSON.parse(sessionResult.stdout);\n sessionId = sessionData.session_id;\n } catch {\n // Fallback: parse text output like \"Session session-xxx started\"\n const match = sessionResult.stdout.match(/Session\\s+(session-[^\\s]+)/);\n if (match) {\n sessionId = match[1];\n } else {\n throw new ProvisioningError({\n phase: 'session',\n command: 'agentsh session create',\n stderr: `Failed to parse session output: ${sessionResult.stdout}`,\n });\n }\n }\n\n // Step 13b: Set trace context if traceParent is provided or OTEL span is active\n const effectiveTraceParent = traceParent ?? (await getTraceparent());\n if (effectiveTraceParent) {\n await adapter.exec('curl', [\n '-X',\n 'PUT',\n `http://127.0.0.1:18080/sessions/${sessionId}/trace-context`,\n '-H',\n 'Content-Type: application/json',\n '-d',\n JSON.stringify({ traceparent: effectiveTraceParent }),\n ]);\n }\n\n // ─── Phase 4: Handoff ───────────────────────────────────────\n\n // Step 14: Return result\n return { sessionId, securityMode };\n}\n\n// ─── Phase 1 helpers ──────────────────────────────────────────\n\nasync function detectArch(\n adapter: SandboxAdapter,\n): Promise<'linux_amd64' | 'linux_arm64'> {\n const result = await adapter.exec('uname', ['-m']);\n if (result.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'uname -m',\n stderr: result.stderr,\n });\n }\n return mapArch(result.stdout);\n}\n\nasync function downloadBinary(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n overrideUrl?: string,\n): Promise<void> {\n const url = binaryUrl(version, arch, overrideUrl);\n\n // Try curl first\n const curlResult = await adapter.exec('curl', [\n '-fsSL',\n url,\n '-o',\n '/tmp/agentsh.tar.gz',\n ]);\n\n if (curlResult.exitCode !== 0) {\n // Fallback to wget (may not be available on all platforms)\n let wgetResult: ExecResult;\n try {\n wgetResult = await adapter.exec('wget', [\n '-q',\n url,\n '-O',\n '/tmp/agentsh.tar.gz',\n ]);\n } catch {\n throw new ProvisioningError({\n phase: 'install',\n command: `curl -fsSL ${url} -o /tmp/agentsh.tar.gz`,\n stderr: curlResult.stderr || 'Download failed (curl failed, wget not available)',\n });\n }\n if (wgetResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: `wget -q ${url} -O /tmp/agentsh.tar.gz`,\n stderr: wgetResult.stderr,\n });\n }\n }\n\n // Extract\n const tarResult = await adapter.exec('tar', [\n 'xz',\n '-C',\n '/tmp/',\n '-f',\n '/tmp/agentsh.tar.gz',\n ]);\n if (tarResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'tar xz -C /tmp/ -f /tmp/agentsh.tar.gz',\n stderr: tarResult.stderr,\n });\n }\n}\n\nasync function uploadBinary(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n overrideUrl?: string,\n): Promise<void> {\n const url = binaryUrl(version, arch, overrideUrl);\n\n // Download on host side using fetch (Node 18+)\n const response = await fetch(url);\n if (!response.ok) {\n throw new ProvisioningError({\n phase: 'install',\n command: `fetch ${url}`,\n stderr: `HTTP ${response.status}: ${response.statusText}`,\n });\n }\n\n const buffer = Buffer.from(await response.arrayBuffer());\n\n // Upload tarball to sandbox and extract\n await adapter.writeFile('/tmp/agentsh.tar.gz', buffer);\n const tarResult = await adapter.exec('tar', [\n 'xz',\n '-C',\n '/tmp/',\n '-f',\n '/tmp/agentsh.tar.gz',\n ]);\n if (tarResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'tar xz -C /tmp/ -f /tmp/agentsh.tar.gz',\n stderr: tarResult.stderr,\n });\n }\n}\n\nasync function verifyChecksum(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n checksumOverride: string | undefined,\n filePath: string,\n): Promise<void> {\n const expected = getChecksum(version, arch, checksumOverride);\n const commands = buildVerifyCommand(filePath);\n\n let actual: string | undefined;\n\n for (const cmd of commands) {\n const result = await adapter.exec('sh', ['-c', cmd]);\n if (result.exitCode === 0 && result.stdout.trim()) {\n actual = result.stdout.trim();\n break;\n }\n }\n\n if (actual === undefined) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'sha256sum / shasum / openssl',\n stderr: 'No checksum tool available in sandbox',\n });\n }\n\n if (actual !== expected) {\n throw new IntegrityError({\n expected,\n actual,\n message: `Checksum mismatch: expected ${expected}, got ${actual}`,\n });\n }\n}\n\nasync function detectSecurityMode(\n adapter: SandboxAdapter,\n): Promise<SecurityMode> {\n const result = await adapter.exec('agentsh', ['detect', '--output', 'json']);\n if (result.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: result.stderr,\n });\n }\n\n // agentsh detect outputs JSON to stderr\n const jsonOutput = result.stderr || result.stdout;\n let parsed: { security_mode: string };\n try {\n parsed = JSON.parse(jsonOutput);\n } catch {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: `Failed to parse detect JSON: ${jsonOutput.slice(0, 200)}`,\n });\n }\n\n const mode = parsed.security_mode;\n const validModes: SecurityMode[] = ['full', 'landlock', 'landlock-only', 'minimal'];\n if (!validModes.includes(mode as SecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: `Unknown security mode: '${mode}'`,\n });\n }\n return mode as SecurityMode;\n}\n\nasync function healthCheck(adapter: SandboxAdapter): Promise<void> {\n const maxRetries = 10;\n const delayMs = 500;\n\n for (let i = 0; i < maxRetries; i++) {\n const result = await adapter.exec('curl', [\n '-sf',\n 'http://127.0.0.1:18080/health',\n ]);\n if (result.exitCode === 0) {\n return;\n }\n if (i < maxRetries - 1) {\n await sleep(delayMs);\n }\n }\n\n throw new ProvisioningError({\n phase: 'startup',\n command: 'curl http://127.0.0.1:18080/health',\n stderr: 'Health check failed after 10 attempts',\n });\n}\n","import type {\n SandboxAdapter,\n SecuredSandbox,\n SecurityMode,\n ExecResult,\n} from './types.js';\nimport { RuntimeError } from './errors.js';\nimport { getTraceparent } from './traceparent.js';\n\n/** Build env object with TRACEPARENT if an OTEL span is active. */\nasync function traceEnv(): Promise<Record<string, string> | undefined> {\n const tp = await getTraceparent();\n return tp ? { TRACEPARENT: tp } : undefined;\n}\n\n/** Parse the JSON envelope from `agentsh exec --output json`. */\nfunction parseExecJson(raw: ExecResult): ExecResult {\n try {\n const json = JSON.parse(raw.stdout);\n const result = json.result ?? {};\n return {\n exitCode: result.exit_code ?? raw.exitCode,\n stdout: result.stdout ?? '',\n stderr: result.stderr ?? result.error?.message ?? '',\n };\n } catch {\n // If not valid JSON, return as-is (e.g. mock adapters)\n return raw;\n }\n}\n\nexport function createSecuredSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n options?: { passthrough?: boolean },\n): SecuredSandbox {\n if (options?.passthrough) {\n return createPassthroughSandbox(adapter, sessionId, securityMode);\n }\n return createAgentshSandbox(adapter, sessionId, securityMode);\n}\n\n/**\n * Passthrough mode: the shell shim enforces policy on every command,\n * so we run commands directly through the adapter without wrapping\n * them in `agentsh exec`. Used with the 'running' install strategy.\n */\nfunction createPassthroughSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n): SecuredSandbox {\n return {\n sessionId,\n securityMode,\n\n async exec(command, opts) {\n const result = await adapter.exec('bash', ['-c', command], {\n cwd: opts?.cwd,\n });\n return result;\n },\n\n async writeFile(path, content) {\n const b64 = Buffer.from(content, 'utf-8').toString('base64');\n const result = await adapter.exec('sh', [\n '-c',\n 'printf \"%s\" \"$1\" | base64 -d > \"$2\"',\n '_',\n b64,\n path,\n ]);\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'writeFile failed',\n };\n }\n return { success: true as const, path };\n },\n\n async readFile(path) {\n const result = await adapter.exec('cat', [path]);\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'readFile failed',\n };\n }\n return { success: true as const, path, content: result.stdout };\n },\n\n async stop() {\n await adapter.stop?.();\n },\n };\n}\n\n/** Standard mode: wraps commands in `agentsh exec` for policy enforcement. */\nfunction createAgentshSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n): SecuredSandbox {\n return {\n sessionId,\n securityMode,\n\n async exec(command, opts) {\n const args = [\n 'exec',\n '--output',\n 'json',\n sessionId,\n '--',\n 'bash',\n '-c',\n command,\n ];\n const env = await traceEnv();\n const execOpts = { cwd: opts?.cwd, env };\n const result = await adapter.exec('agentsh', args, execOpts);\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command,\n stderr: result.stderr,\n });\n }\n return parseExecJson(result);\n },\n\n async writeFile(path, content) {\n const b64 = Buffer.from(content, 'utf-8').toString('base64');\n const args = [\n 'exec',\n sessionId,\n '--',\n 'sh',\n '-c',\n 'printf \"%s\" \"$1\" | base64 -d > \"$2\"',\n '_',\n b64,\n path,\n ];\n const env = await traceEnv();\n const result = await adapter.exec('agentsh', args, { env });\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command: `writeFile ${path}`,\n stderr: result.stderr,\n });\n }\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'writeFile failed',\n };\n }\n return { success: true as const, path };\n },\n\n async readFile(path) {\n const args = ['exec', sessionId, '--', 'cat', path];\n const env = await traceEnv();\n const result = await adapter.exec('agentsh', args, { env });\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command: `readFile ${path}`,\n stderr: result.stderr,\n });\n }\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'readFile failed',\n };\n }\n return { success: true as const, path, content: result.stdout };\n },\n\n async stop() {\n await adapter.stop?.();\n },\n };\n}\n\nfunction isTransportFailure(result: ExecResult): boolean {\n return result.exitCode === 127 && result.stderr.includes('agentsh');\n}\n","import type {\n SandboxAdapter,\n SecuredSandbox,\n SecureConfig,\n} from './core/types.js';\nimport { provision } from './core/provision.js';\nimport { createSecuredSandbox } from './core/runtime.js';\n\nexport async function secureSandbox(\n adapter: SandboxAdapter,\n config?: SecureConfig,\n): Promise<SecuredSandbox> {\n const resolvedConfig = config ?? {};\n const { sessionId, securityMode, passthrough } = await provision(adapter, {\n workspace: '/workspace',\n ...resolvedConfig,\n });\n return createSecuredSandbox(adapter, sessionId, securityMode, { passthrough });\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAEO,IAAM,iBAAiB;AAEvB,IAAM,YAAoD;AAAA,EAC/D,UAAU;AAAA,IACR,aACE;AAAA,IACF,aACE;AAAA,EACJ;AAAA,EACA,UAAU;AAAA,IACR,aACE;AAAA,IACF,aACE;AAAA,EACJ;AACF;AAQO,SAAS,YACd,SACA,MACA,UACQ;AACR,MAAI,UAAU;AACZ,WAAO;AAAA,EACT;AAEA,QAAM,mBAAmB,UAAU,OAAO;AAC1C,MAAI,oBAAoB,iBAAiB,IAAI,GAAG;AAC9C,WAAO,iBAAiB,IAAI;AAAA,EAC9B;AAEA,QAAM,IAAI,eAAe;AAAA,IACvB,UAAU;AAAA,IACV,QAAQ;AAAA,IACR,SAAS,mCAAmC,OAAO;AAAA,EACrD,CAAC;AACH;AAMO,SAAS,mBAAmB,UAA4B;AAC7D,SAAO;AAAA,IACL,cAAc,QAAQ;AAAA,IACtB,kBAAkB,QAAQ;AAAA,IAC1B,yBAAyB,QAAQ;AAAA,EACnC;AACF;AAOO,SAAS,UACd,SACA,MACA,aACQ;AACR,MAAI,aAAa;AACf,WAAO;AAAA,EACT;AAEA,SAAO,4DAA4D,OAAO,YAAY,OAAO,IAAI,IAAI;AACvG;;;ACzEA,OAAO,UAAU;AAcV,IAAM,qBAAwC;AAAA,EACnD,QAAQ;AAAA,EACR,OAAO;AAAA,IACL;AAAA,MACE,MAAM;AAAA,MACN,KAAK;AAAA,MACL,QAAQ;AAAA,MACR,iBAAiB;AAAA,IACnB;AAAA,IACA;AAAA,MACE,MAAM;AAAA,MACN,KAAK;AAAA,MACL,QAAQ;AAAA,MACR,iBAAiB;AAAA,IACnB;AAAA,EACF;AAAA,EACA,WAAW;AAAA,IACT;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAMO,IAAM,+BAAuF;AAAA,EAClG,OAAO,EAAE,SAAS,MAAM,UAAU,EAAE;AAAA,EACpC,KAAK,EAAE,SAAS,MAAM,UAAU,EAAE;AAAA,EAClC,SAAS,EAAE,SAAS,MAAM,UAAU,EAAE;AACxC;AAKA,SAAS,0BAA0B,QAAiD;AAClF,QAAM,SAAkC,EAAE,SAAS,OAAO,WAAW,KAAK;AAC1E,MAAI,OAAO,aAAa,OAAW,QAAO,WAAW,OAAO;AAC5D,MAAI,OAAO,YAAY,OAAW,QAAO,UAAU,OAAO;AAC1D,MAAI,OAAO,cAAc,OAAW,QAAO,aAAa,OAAO;AAC/D,MAAI,OAAO,cAAc,OAAW,QAAO,cAAc,OAAO;AAChE,MAAI,OAAO,SAAS,OAAW,QAAO,OAAO,OAAO;AACpD,MAAI,OAAO,YAAY,OAAW,QAAO,UAAU,OAAO;AAC1D,MAAI,OAAO,YAAY,OAAW,QAAO,UAAU,OAAO;AAC1D,SAAO;AACT;AAEO,SAAS,qBAAqB,MAAgC;AACnE,QAAM,SAAkC;AAAA,IACtC,QAAQ;AAAA,MACN,MAAM;AAAA,QACJ,MAAM;AAAA,MACR;AAAA,IACF;AAAA,IACA,MAAM;AAAA,MACJ,MAAM;AAAA,IACR;AAAA,IACA,UAAU;AAAA,MACR,YAAY;AAAA,MACZ,KAAK;AAAA,MACL,SAAS;AAAA,IACX;AAAA,IACA,SAAS;AAAA,MACP,SAAS;AAAA,MACT,gBAAgB;AAAA,MAChB,MAAM,EAAE,SAAS,KAAK;AAAA,MACtB,SAAS,EAAE,SAAS,KAAK;AAAA,MACzB,SAAS,EAAE,SAAS,KAAK;AAAA,IAC3B;AAAA,EACF;AACA,MAAI,KAAK,WAAY,QAAO,aAAa,KAAK;AAC9C,MAAI,KAAK,UAAW,QAAO,WAAW,EAAE,YAAY,KAAK;AAGzD,QAAM,QAAQ,KAAK,gBAAgB,QAAQ,SAAa,KAAK,eAAe;AAC5E,MAAI,OAAO;AACT,WAAO,eAAe;AAAA,MACpB,SAAS;AAAA,MACT,QAAQ,MAAM,UAAU;AAAA,MACxB,OAAO,MAAM,MAAM,IAAI,QAAM;AAAA,QAC3B,MAAM,EAAE;AAAA,QACR,KAAK,EAAE;AAAA,QACP,QAAQ,EAAE;AAAA,QACV,kBAAkB,EAAE,mBAAmB;AAAA,MACzC,EAAE;AAAA,MACF,GAAI,MAAM,WAAW,SAAS,EAAE,WAAW,MAAM,UAAU,IAAI,CAAC;AAAA,IAClE;AAAA,EACF;AAGA,MAAI,KAAK,eAAe;AACtB,UAAM,KAAK,KAAK;AAChB,UAAM,YAAqD,CAAC;AAG5D,eAAW,CAAC,MAAM,GAAG,KAAK,OAAO,QAAQ,4BAA4B,GAAG;AACtE,gBAAU,IAAI,IAAI,EAAE,GAAG,IAAI;AAAA,IAC7B;AAGA,QAAI,GAAG,WAAW;AAChB,iBAAW,CAAC,MAAM,KAAK,KAAK,OAAO,QAAQ,GAAG,SAAS,GAAG;AACxD,YAAI,UAAU,OAAO;AACnB,oBAAU,IAAI,IAAI,EAAE,SAAS,MAAM;AAAA,QACrC,WAAW,UAAU,MAAM;AACzB,oBAAU,IAAI,IAAI,EAAE,GAAI,UAAU,IAAI,KAAK,CAAC,GAAI,SAAS,KAAK;AAAA,QAChE,OAAO;AAEL,gBAAM,OAAO,UAAU,IAAI,KAAK,CAAC;AACjC,oBAAU,IAAI,IAAI,EAAE,GAAG,MAAM,GAAG,0BAA0B,KAAK,EAAE;AAAA,QACnE;AAAA,MACF;AAAA,IACF;AAEA,WAAO,iBAAiB;AAAA,MACtB,SAAS;AAAA,MACT,OAAO,GAAG,SAAS;AAAA,MACnB;AAAA,IACF;AAAA,EACF;AAEA,SAAO,KAAK,KAAK,QAAQ,EAAE,WAAW,GAAG,CAAC;AAC5C;;;AC1IA,eAAsB,iBAA8C;AAClE,MAAI;AACF,UAAM,EAAE,MAAM,IAAI,MAAM,OAAO,mBAAoB;AACnD,UAAM,OAAO,MAAM,cAAc;AACjC,UAAM,MAAM,MAAM,YAAY;AAC9B,QAAI,CAAC,KAAK,WAAW,IAAI,YAAY,oCAAoC;AACvE,aAAO;AAAA,IACT;AACA,UAAM,SAAS,IAAI,cAAc,GAAG,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG;AAChE,WAAO,MAAM,IAAI,OAAO,IAAI,IAAI,MAAM,IAAI,KAAK;AAAA,EACjD,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACCA,IAAM,qBAAmD;AAAA,EACvD,MAAM;AAAA,EACN,UAAU;AAAA,EACV,iBAAiB;AAAA,EACjB,SAAS;AACX;AAEA,SAAS,aAAa,UAAwB,UAAiC;AAC7E,SAAO,mBAAmB,QAAQ,IAAI,mBAAmB,QAAQ;AACnE;AAIA,SAAS,QAAQ,OAA8C;AAC7D,QAAM,UAAU,MAAM,KAAK;AAC3B,MAAI,YAAY,SAAU,QAAO;AACjC,MAAI,YAAY,UAAW,QAAO;AAClC,QAAM,IAAI,kBAAkB;AAAA,IAC1B,OAAO;AAAA,IACP,SAAS;AAAA,IACT,QAAQ,6BAA6B,OAAO;AAAA,EAC9C,CAAC;AACH;AAIA,IAAM,gBAAgB,CAAC,0BAA0B,kBAAkB;AAEnE,eAAe,aAAa,SAA2C;AACrE,aAAW,QAAQ,eAAe;AAChC,UAAM,QAAQ,QAAQ,aAClB,MAAM,QAAQ,WAAW,IAAI,KAC5B,MAAM,QAAQ,KAAK,QAAQ,CAAC,MAAM,IAAI,CAAC,GAAG,aAAa;AAC5D,QAAI,MAAO,QAAO;AAAA,EACpB;AACA,SAAO;AACT;AAIA,SAAS,MAAM,IAA2B;AACxC,SAAO,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,EAAE,CAAC;AACzD;AAWA,eAAsB,UACpB,SACA,SAAuB,CAAC,GACE;AAC1B,QAAM;AAAA,IACJ,QAAQ;AAAA,IACR,YAAY;AAAA,IACZ;AAAA,IACA,kBAAkB;AAAA,IAClB,iBAAiB;AAAA,IACjB,aAAa;AAAA,IACb;AAAA,IACA;AAAA,IACA,qBAAqB;AAAA,IACrB;AAAA,IACA,WAAW;AAAA,IACX;AAAA,IACA,aAAa;AAAA,IACb;AAAA,IACA;AAAA,EACF,IAAI;AAGJ,QAAM,SAAS,YAAY,eAAe,SAAS,IAAI,aAAa;AAEpE,MAAI,eAA6B;AAEjC,MAAI,oBAAoB,WAAW;AAYjC,UAAM,YAAY,OAAO;AAEzB,mBAAe,OAAO,gBAAgB;AAEtC,QAAI,uBAAuB,aAAa,cAAc,mBAAmB,GAAG;AAC1E,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ,kBAAkB,YAAY,8BAA8B,mBAAmB;AAAA,MACzF,CAAC;AAAA,IACH;AAGA,QAAIA,aAAY,OAAO;AACvB,QAAI,CAACA,YAAW;AACd,YAAM,YAAY,MAAM,QAAQ,KAAK,MAAM,CAAC,MAAM,0BAA0B,CAAC;AAC7E,MAAAA,aAAY,UAAU,OAAO,KAAK;AAAA,IACpC;AACA,QAAI,CAACA,YAAW;AACd,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAEA,WAAO,EAAE,WAAAA,YAAW,cAAc,aAAa,KAAK;AAAA,EACtD;AAKA,QAAM,SAAS,MAAM,aAAa,OAAO;AAEzC,MAAI,oBAAoB,gBAAgB;AACtC,QAAI,CAAC,QAAQ;AACX,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,cAAc,IAAI,OAAK,WAAW,CAAC,EAAE,EAAE,KAAK,MAAM;AAAA,QAC3D,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAAA,EAEF,WAAW,oBAAoB,cAAc,oBAAoB,UAAU;AAEzE,QAAI,CAAC,QAAQ;AAEX,YAAM,OACJ,gBAAgB,MAAM,WAAW,OAAO;AAE1C,UAAI,oBAAoB,YAAY;AAElC,cAAM,eAAe,SAAS,gBAAgB,MAAM,gBAAgB;AAAA,MACtE,OAAO;AAEL,cAAM,aAAa,SAAS,gBAAgB,MAAM,gBAAgB;AAAA,MACpE;AAGA,UAAI,CAAC,oBAAoB;AACvB,cAAM;AAAA,UACJ;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF;AAAA,MACF;AAGA,YAAM,WAAW;AAAA,QACf,EAAE,KAAK,gBAAgB,MAAM,yBAAyB;AAAA,QACtD,EAAE,KAAK,2BAA2B,MAAM,8BAA8B;AAAA,QACtE,EAAE,KAAK,yBAAyB,MAAM,kCAAkC;AAAA,MAC1E;AACA,iBAAW,EAAE,KAAK,KAAK,KAAK,UAAU;AACpC,cAAM,gBAAgB,MAAM,QAAQ;AAAA,UAClC;AAAA,UACA,CAAC,MAAM,QAAQ,KAAK,IAAI;AAAA,UACxB,EAAE,MAAM,KAAK;AAAA,QACf;AACA,YAAI,cAAc,aAAa,GAAG;AAChC,gBAAM,IAAI,kBAAkB;AAAA,YAC1B,OAAO;AAAA,YACP,SAAS,mBAAmB,GAAG,IAAI,IAAI;AAAA,YACvC,QAAQ,cAAc;AAAA,UACxB,CAAC;AAAA,QACH;AAAA,MACF;AAAA,IACF;AAAA,EACF;AAGA,iBAAe,MAAM,mBAAmB,OAAO;AAG/C,MAAI,uBAAuB,aAAa,cAAc,mBAAmB,GAAG;AAC1E,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,2BAA2B,YAAY,8BAA8B,mBAAmB;AAAA,IAClG,CAAC;AAAA,EACH;AAIA,QAAM,UAAU,iBAAiB,UAAU,iBAAiB;AAC5D,QAAM,YAAY,qBAAqB;AAGvC,QAAM,aAAa,MAAM,QAAQ;AAAA,IAC/B;AAAA,IACA;AAAA,MACE;AAAA,MAAQ;AAAA,MACR;AAAA,MAAU;AAAA,MACV;AAAA,MAAU;AAAA,MACV;AAAA,MACA;AAAA,IACF;AAAA,IACA,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,WAAW,aAAa,GAAG;AAC7B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,WAAW;AAAA,IACrB,CAAC;AAAA,EACH;AAKA,QAAM,cAAc,MAAM,QAAQ;AAAA,IAChC;AAAA,IACA,CAAC,MAAM,qBAAqB;AAAA,IAC5B,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,YAAY,aAAa,GAAG;AAC9B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,YAAY;AAAA,IACtB,CAAC;AAAA,EACH;AAGA,QAAM,QAAQ,KAAK,SAAS,CAAC,MAAM,OAAO,eAAe,GAAG,EAAE,MAAM,KAAK,CAAC;AAE1E,QAAM,QAAQ;AAAA,IACZ;AAAA,IACA,iBAAiB;AAAA,IACjB,EAAE,MAAM,KAAK;AAAA,EACf;AAGA,QAAM,QAAQ;AAAA,IACZ;AAAA,IACA,gBAAgB,MAAM;AAAA,IACtB,EAAE,MAAM,KAAK;AAAA,EACf;AAGA,QAAM,eAAe,qBAAqB;AAAA,IACxC;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AAED,QAAM,QAAQ,UAAU,2BAA2B,cAAc;AAAA,IAC/D,MAAM;AAAA,EACR,CAAC;AAGD,QAAM,iBAAiB,MAAM,QAAQ;AAAA,IACnC;AAAA,IACA,CAAC,gBAAgB,SAAS,KAAK,SAAS,SAAS,OAAO,MAAM,GAAG;AAAA,IACjE,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,eAAe,aAAa,GAAG;AACjC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,eAAe;AAAA,IACzB,CAAC;AAAA,EACH;AAEA,QAAM,kBAAkB,MAAM,QAAQ;AAAA,IACpC;AAAA,IACA,CAAC,gBAAgB,SAAS,KAAK,SAAS,SAAS,OAAO,MAAM,GAAG;AAAA,IACjE,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,gBAAgB,aAAa,GAAG;AAClC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,gBAAgB;AAAA,IAC1B,CAAC;AAAA,EACH;AAEA,QAAM,cAAc,MAAM,QAAQ;AAAA,IAChC;AAAA,IACA,CAAC,MAAM,aAAa,eAAe;AAAA,IACnC,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,YAAY,aAAa,GAAG;AAC9B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,YAAY;AAAA,IACtB,CAAC;AAAA,EACH;AAKA,QAAM,QAAQ,KAAK,SAAS,CAAC,MAAM,SAAS,GAAG,EAAE,MAAM,KAAK,CAAC;AAG7D,QAAM,eAAe,MAAM,QAAQ;AAAA,IACjC;AAAA,IACA,CAAC,UAAU,YAAY,yBAAyB;AAAA,IAChD,EAAE,UAAU,MAAM,MAAM,KAAK;AAAA,EAC/B;AACA,MAAI,aAAa,aAAa,GAAG;AAC/B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,aAAa;AAAA,IACvB,CAAC;AAAA,EACH;AAGA,QAAM,YAAY,OAAO;AAGzB,QAAM,gBAAgB,MAAM,QAAQ,KAAK,WAAW;AAAA,IAClD;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,cAAc,aAAa,GAAG;AAChC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,cAAc;AAAA,IACxB,CAAC;AAAA,EACH;AAEA,MAAI;AACJ,MAAI;AACF,UAAM,cAAc,KAAK,MAAM,cAAc,MAAM;AACnD,gBAAY,YAAY;AAAA,EAC1B,QAAQ;AAEN,UAAM,QAAQ,cAAc,OAAO,MAAM,4BAA4B;AACrE,QAAI,OAAO;AACT,kBAAY,MAAM,CAAC;AAAA,IACrB,OAAO;AACL,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ,mCAAmC,cAAc,MAAM;AAAA,MACjE,CAAC;AAAA,IACH;AAAA,EACF;AAGA,QAAM,uBAAuB,eAAgB,MAAM,eAAe;AAClE,MAAI,sBAAsB;AACxB,UAAM,QAAQ,KAAK,QAAQ;AAAA,MACzB;AAAA,MACA;AAAA,MACA,mCAAmC,SAAS;AAAA,MAC5C;AAAA,MACA;AAAA,MACA;AAAA,MACA,KAAK,UAAU,EAAE,aAAa,qBAAqB,CAAC;AAAA,IACtD,CAAC;AAAA,EACH;AAKA,SAAO,EAAE,WAAW,aAAa;AACnC;AAIA,eAAe,WACb,SACwC;AACxC,QAAM,SAAS,MAAM,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC;AACjD,MAAI,OAAO,aAAa,GAAG;AACzB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,OAAO;AAAA,IACjB,CAAC;AAAA,EACH;AACA,SAAO,QAAQ,OAAO,MAAM;AAC9B;AAEA,eAAe,eACb,SACA,SACA,MACA,aACe;AACf,QAAM,MAAM,UAAU,SAAS,MAAM,WAAW;AAGhD,QAAM,aAAa,MAAM,QAAQ,KAAK,QAAQ;AAAA,IAC5C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AAED,MAAI,WAAW,aAAa,GAAG;AAE7B,QAAI;AACJ,QAAI;AACF,mBAAa,MAAM,QAAQ,KAAK,QAAQ;AAAA,QACtC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAAA,IACH,QAAQ;AACN,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,cAAc,GAAG;AAAA,QAC1B,QAAQ,WAAW,UAAU;AAAA,MAC/B,CAAC;AAAA,IACH;AACA,QAAI,WAAW,aAAa,GAAG;AAC7B,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,WAAW,GAAG;AAAA,QACvB,QAAQ,WAAW;AAAA,MACrB,CAAC;AAAA,IACH;AAAA,EACF;AAGA,QAAM,YAAY,MAAM,QAAQ,KAAK,OAAO;AAAA,IAC1C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,UAAU,aAAa,GAAG;AAC5B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,UAAU;AAAA,IACpB,CAAC;AAAA,EACH;AACF;AAEA,eAAe,aACb,SACA,SACA,MACA,aACe;AACf,QAAM,MAAM,UAAU,SAAS,MAAM,WAAW;AAGhD,QAAM,WAAW,MAAM,MAAM,GAAG;AAChC,MAAI,CAAC,SAAS,IAAI;AAChB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS,SAAS,GAAG;AAAA,MACrB,QAAQ,QAAQ,SAAS,MAAM,KAAK,SAAS,UAAU;AAAA,IACzD,CAAC;AAAA,EACH;AAEA,QAAM,SAAS,OAAO,KAAK,MAAM,SAAS,YAAY,CAAC;AAGvD,QAAM,QAAQ,UAAU,uBAAuB,MAAM;AACrD,QAAM,YAAY,MAAM,QAAQ,KAAK,OAAO;AAAA,IAC1C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,UAAU,aAAa,GAAG;AAC5B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,UAAU;AAAA,IACpB,CAAC;AAAA,EACH;AACF;AAEA,eAAe,eACb,SACA,SACA,MACA,kBACA,UACe;AACf,QAAM,WAAW,YAAY,SAAS,MAAM,gBAAgB;AAC5D,QAAM,WAAW,mBAAmB,QAAQ;AAE5C,MAAI;AAEJ,aAAW,OAAO,UAAU;AAC1B,UAAM,SAAS,MAAM,QAAQ,KAAK,MAAM,CAAC,MAAM,GAAG,CAAC;AACnD,QAAI,OAAO,aAAa,KAAK,OAAO,OAAO,KAAK,GAAG;AACjD,eAAS,OAAO,OAAO,KAAK;AAC5B;AAAA,IACF;AAAA,EACF;AAEA,MAAI,WAAW,QAAW;AACxB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ;AAAA,IACV,CAAC;AAAA,EACH;AAEA,MAAI,WAAW,UAAU;AACvB,UAAM,IAAI,eAAe;AAAA,MACvB;AAAA,MACA;AAAA,MACA,SAAS,+BAA+B,QAAQ,SAAS,MAAM;AAAA,IACjE,CAAC;AAAA,EACH;AACF;AAEA,eAAe,mBACb,SACuB;AACvB,QAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,CAAC,UAAU,YAAY,MAAM,CAAC;AAC3E,MAAI,OAAO,aAAa,GAAG;AACzB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,OAAO;AAAA,IACjB,CAAC;AAAA,EACH;AAGA,QAAM,aAAa,OAAO,UAAU,OAAO;AAC3C,MAAI;AACJ,MAAI;AACF,aAAS,KAAK,MAAM,UAAU;AAAA,EAChC,QAAQ;AACN,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,gCAAgC,WAAW,MAAM,GAAG,GAAG,CAAC;AAAA,IAClE,CAAC;AAAA,EACH;AAEA,QAAM,OAAO,OAAO;AACpB,QAAM,aAA6B,CAAC,QAAQ,YAAY,iBAAiB,SAAS;AAClF,MAAI,CAAC,WAAW,SAAS,IAAoB,GAAG;AAC9C,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,2BAA2B,IAAI;AAAA,IACzC,CAAC;AAAA,EACH;AACA,SAAO;AACT;AAEA,eAAe,YAAY,SAAwC;AACjE,QAAM,aAAa;AACnB,QAAM,UAAU;AAEhB,WAAS,IAAI,GAAG,IAAI,YAAY,KAAK;AACnC,UAAM,SAAS,MAAM,QAAQ,KAAK,QAAQ;AAAA,MACxC;AAAA,MACA;AAAA,IACF,CAAC;AACD,QAAI,OAAO,aAAa,GAAG;AACzB;AAAA,IACF;AACA,QAAI,IAAI,aAAa,GAAG;AACtB,YAAM,MAAM,OAAO;AAAA,IACrB;AAAA,EACF;AAEA,QAAM,IAAI,kBAAkB;AAAA,IAC1B,OAAO;AAAA,IACP,SAAS;AAAA,IACT,QAAQ;AAAA,EACV,CAAC;AACH;;;AC1lBA,eAAe,WAAwD;AACrE,QAAM,KAAK,MAAM,eAAe;AAChC,SAAO,KAAK,EAAE,aAAa,GAAG,IAAI;AACpC;AAGA,SAAS,cAAc,KAA6B;AAClD,MAAI;AACF,UAAM,OAAO,KAAK,MAAM,IAAI,MAAM;AAClC,UAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,WAAO;AAAA,MACL,UAAU,OAAO,aAAa,IAAI;AAAA,MAClC,QAAQ,OAAO,UAAU;AAAA,MACzB,QAAQ,OAAO,UAAU,OAAO,OAAO,WAAW;AAAA,IACpD;AAAA,EACF,QAAQ;AAEN,WAAO;AAAA,EACT;AACF;AAEO,SAAS,qBACd,SACA,WACA,cACA,SACgB;AAChB,MAAI,SAAS,aAAa;AACxB,WAAO,yBAAyB,SAAS,WAAW,YAAY;AAAA,EAClE;AACA,SAAO,qBAAqB,SAAS,WAAW,YAAY;AAC9D;AAOA,SAAS,yBACP,SACA,WACA,cACgB;AAChB,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IAEA,MAAM,KAAK,SAAS,MAAM;AACxB,YAAM,SAAS,MAAM,QAAQ,KAAK,QAAQ,CAAC,MAAM,OAAO,GAAG;AAAA,QACzD,KAAK,MAAM;AAAA,MACb,CAAC;AACD,aAAO;AAAA,IACT;AAAA,IAEA,MAAM,UAAU,MAAM,SAAS;AAC7B,YAAM,MAAM,OAAO,KAAK,SAAS,OAAO,EAAE,SAAS,QAAQ;AAC3D,YAAM,SAAS,MAAM,QAAQ,KAAK,MAAM;AAAA,QACtC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AACD,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,KAAK;AAAA,IACxC;AAAA,IAEA,MAAM,SAAS,MAAM;AACnB,YAAM,SAAS,MAAM,QAAQ,KAAK,OAAO,CAAC,IAAI,CAAC;AAC/C,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,MAAM,SAAS,OAAO,OAAO;AAAA,IAChE;AAAA,IAEA,MAAM,OAAO;AACX,YAAM,QAAQ,OAAO;AAAA,IACvB;AAAA,EACF;AACF;AAGA,SAAS,qBACP,SACA,WACA,cACgB;AAChB,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IAEA,MAAM,KAAK,SAAS,MAAM;AACxB,YAAM,OAAO;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AACA,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,WAAW,EAAE,KAAK,MAAM,KAAK,IAAI;AACvC,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,QAAQ;AAC3D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA;AAAA,UACA,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,aAAO,cAAc,MAAM;AAAA,IAC7B;AAAA,IAEA,MAAM,UAAU,MAAM,SAAS;AAC7B,YAAM,MAAM,OAAO,KAAK,SAAS,OAAO,EAAE,SAAS,QAAQ;AAC3D,YAAM,OAAO;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AACA,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,EAAE,IAAI,CAAC;AAC1D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA,SAAS,aAAa,IAAI;AAAA,UAC1B,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,KAAK;AAAA,IACxC;AAAA,IAEA,MAAM,SAAS,MAAM;AACnB,YAAM,OAAO,CAAC,QAAQ,WAAW,MAAM,OAAO,IAAI;AAClD,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,EAAE,IAAI,CAAC;AAC1D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA,SAAS,YAAY,IAAI;AAAA,UACzB,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,MAAM,SAAS,OAAO,OAAO;AAAA,IAChE;AAAA,IAEA,MAAM,OAAO;AACX,YAAM,QAAQ,OAAO;AAAA,IACvB;AAAA,EACF;AACF;AAEA,SAAS,mBAAmB,QAA6B;AACvD,SAAO,OAAO,aAAa,OAAO,OAAO,OAAO,SAAS,SAAS;AACpE;;;AC5LA,eAAsB,cACpB,SACA,QACyB;AACzB,QAAM,iBAAiB,UAAU,CAAC;AAClC,QAAM,EAAE,WAAW,cAAc,YAAY,IAAI,MAAM,UAAU,SAAS;AAAA,IACxE,WAAW;AAAA,IACX,GAAG;AAAA,EACL,CAAC;AACD,SAAO,qBAAqB,SAAS,WAAW,cAAc,EAAE,YAAY,CAAC;AAC/E;","names":["sessionId"]}
@@ -1,2 +1,2 @@
1
- export { C as CommandRule, a as ConnectRedirect, D as DnsRedirect, E as EnvRule, F as FileRule, N as NetworkRule, P as PolicyDefinition, b as PolicyDefinitionSchema, c as agentDefault, d as agentSandbox, e as ciStrict, f as devSafe, m as merge, g as mergePrepend, s as serializePolicy, h as systemPolicyYaml, v as validatePolicy } from '../index-D0UvBOzr.js';
1
+ export { C as CommandRule, a as ConnectRedirect, D as DnsRedirect, E as EnvRule, F as FileRule, N as NetworkRule, P as PolicyDefinition, b as PolicyDefinitionSchema, c as agentDefault, d as agentSandbox, e as ciStrict, f as devSafe, m as merge, g as mergePrepend, s as serializePolicy, h as systemPolicyYaml, v as validatePolicy } from '../index-Nmlhw9oj.js';
2
2
  import 'zod';
@@ -9,7 +9,7 @@ import {
9
9
  serializePolicy,
10
10
  systemPolicyYaml,
11
11
  validatePolicy
12
- } from "../chunk-NWHVZ3DG.js";
12
+ } from "../chunk-GFPHTJLU.js";
13
13
  import "../chunk-PZ5AY32C.js";
14
14
  export {
15
15
  PolicyDefinitionSchema,
@@ -1,4 +1,4 @@
1
- import { E as ExecResult, c as SecurityMode, b as SecuredSandbox } from '../types-Cz86hRBQ.js';
1
+ import { E as ExecResult, f as SecurityMode, b as SecuredSandbox } from '../types-CUqsllMs.js';
2
2
 
3
3
  interface MockConfig {
4
4
  commands?: Record<string, ExecResult>;
@@ -155,12 +155,6 @@ interface SecureConfig {
155
155
  * to override auto-detection.
156
156
  */
157
157
  realPaths?: boolean;
158
- /**
159
- * Make redirect rules enforced (deny execution) instead of shadowing
160
- * to a stub binary.
161
- * Default: false (shadow mode).
162
- */
163
- enforceRedirects?: boolean;
164
158
  /**
165
159
  * W3C traceparent header to propagate into the agentsh session.
166
160
  * Format: '00-<trace-id>-<span-id>-<flags>'
@@ -184,6 +178,11 @@ interface SecureConfig {
184
178
  * Set to `false` to disable, or provide a custom ThreatFeedsConfig.
185
179
  */
186
180
  threatFeeds?: false | ThreatFeedsConfig;
181
+ /**
182
+ * Package install security checks.
183
+ * Set to `false` to disable, or provide a PackageChecksConfig.
184
+ */
185
+ packageChecks?: false | PackageChecksConfig;
187
186
  }
188
187
  interface ThreatFeed {
189
188
  /** Display name for this feed. */
@@ -203,5 +202,61 @@ interface ThreatFeedsConfig {
203
202
  /** Domains to exclude from blocking (e.g. legitimate services that may appear in feeds). */
204
203
  allowlist?: string[];
205
204
  }
205
+ interface ProviderConfig {
206
+ /** Whether this provider is enabled. */
207
+ enabled?: boolean;
208
+ /** Priority order (lower = higher priority). */
209
+ priority?: number;
210
+ /** Timeout duration string (e.g. '30s', '2m'). */
211
+ timeout?: string;
212
+ /** Action on provider failure. */
213
+ onFailure?: 'warn' | 'deny' | 'allow' | 'approve';
214
+ /** Environment variable name holding the API key. */
215
+ apiKeyEnv?: string;
216
+ /** Provider type. */
217
+ type?: 'exec';
218
+ /** Command to execute (for 'exec' type providers). */
219
+ command?: string;
220
+ /** Additional provider-specific options. */
221
+ options?: Record<string, unknown>;
222
+ }
223
+ interface PackageChecksConfig {
224
+ /** Whether to check only new packages or all installs. */
225
+ scope?: 'new_packages_only' | 'all_installs';
226
+ /** Map of provider name to provider configuration (or boolean shorthand). */
227
+ providers?: Record<string, boolean | ProviderConfig>;
228
+ }
229
+ interface LicenseSpdxMatch {
230
+ /** Allowed SPDX license identifiers. */
231
+ allow?: string[];
232
+ /** Denied SPDX license identifiers. */
233
+ deny?: string[];
234
+ }
235
+ interface PackageMatch {
236
+ /** Exact package names to match. */
237
+ packages?: string[];
238
+ /** Glob/regex patterns for package names. */
239
+ namePatterns?: string[];
240
+ /** Type of finding to match (e.g. 'malware', 'vulnerability'). */
241
+ findingType?: string;
242
+ /** Severity level to match. */
243
+ severity?: string | string[];
244
+ /** Reasons to match. */
245
+ reasons?: string[];
246
+ /** SPDX license matching criteria. */
247
+ licenseSpdx?: LicenseSpdxMatch;
248
+ /** Package ecosystem (e.g. 'npm', 'pip'). */
249
+ ecosystem?: string;
250
+ /** Additional match options. */
251
+ options?: Record<string, unknown>;
252
+ }
253
+ interface PackageRule {
254
+ /** Matching criteria for the rule. */
255
+ match: PackageMatch;
256
+ /** Action to take when the rule matches. */
257
+ action: 'allow' | 'warn' | 'approve' | 'block';
258
+ /** Human-readable reason for the rule. */
259
+ reason?: string;
260
+ }
206
261
 
207
- export type { ExecResult as E, InstallStrategy as I, ReadFileResult as R, SandboxAdapter as S, ThreatFeedsConfig as T, WriteFileResult as W, SecureConfig as a, SecuredSandbox as b, SecurityMode as c, ThreatFeed as d };
262
+ export type { ExecResult as E, InstallStrategy as I, LicenseSpdxMatch as L, PackageChecksConfig as P, ReadFileResult as R, SandboxAdapter as S, ThreatFeedsConfig as T, WriteFileResult as W, SecureConfig as a, SecuredSandbox as b, PackageMatch as c, PackageRule as d, ProviderConfig as e, SecurityMode as f, ThreatFeed as g };
package/package.json CHANGED
@@ -1,11 +1,12 @@
1
1
  {
2
2
  "name": "@agentsh/secure-sandbox",
3
- "version": "0.1.3",
3
+ "version": "0.1.5",
4
4
  "license": "Apache-2.0",
5
5
  "repository": {
6
6
  "type": "git",
7
7
  "url": "https://github.com/canyonroad/agentsh-secure-sandbox"
8
8
  },
9
+ "homepage": "https://www.agentsh.org/secure-sandbox/",
9
10
  "type": "module",
10
11
  "exports": {
11
12
  ".": {
@@ -1 +0,0 @@
1
- {"version":3,"sources":["../src/policies/index.ts","../src/policies/schema.ts","../src/core/errors.ts","../src/policies/merge.ts","../src/policies/presets.ts","../src/policies/serialize.ts"],"sourcesContent":["export { PolicyDefinitionSchema, validatePolicy } from './schema.js';\nexport type { PolicyDefinition, FileRule, NetworkRule, CommandRule, EnvRule, DnsRedirect, ConnectRedirect } from './schema.js';\nexport { agentDefault, devSafe, ciStrict, agentSandbox } from './presets.js';\nexport { merge, mergePrepend } from './merge.js';\nexport { serializePolicy, systemPolicyYaml } from './serialize.js';\n","import { z, ZodError } from 'zod';\nimport { PolicyValidationError } from '../core/errors.js';\n\n// ─── Shared helpers ─────────────────────────────────────────\n\nconst stringOrArray = z.union([z.string(), z.array(z.string())]);\n\n// ─── File rules ─────────────────────────────────────────────\n\nexport const FileOpSchema = z.enum(['read', 'write', 'create', 'delete']);\n\nconst FileAllowRule = z\n .object({ allow: stringOrArray, ops: z.array(FileOpSchema).optional() })\n .strict();\n\nconst FileDenyRule = z\n .object({ deny: stringOrArray, ops: z.array(FileOpSchema).optional() })\n .strict();\n\nconst FileRedirectRule = z\n .object({\n redirect: stringOrArray,\n to: z.string(),\n ops: z.array(FileOpSchema).optional(),\n })\n .strict();\n\nconst FileAuditRule = z\n .object({ audit: stringOrArray, ops: z.array(FileOpSchema).optional() })\n .strict();\n\nconst FileSoftDeleteRule = z.object({ softDelete: stringOrArray }).strict();\n\nexport const FileRuleSchema = z.union([\n FileAllowRule,\n FileDenyRule,\n FileRedirectRule,\n FileAuditRule,\n FileSoftDeleteRule,\n]);\n\n// ─── Network rules ──────────────────────────────────────────\n\nconst NetworkAllowRule = z\n .object({\n allow: stringOrArray,\n ports: z.array(z.number().int().min(1).max(65535)).optional(),\n })\n .strict();\n\nconst NetworkDenyRule = z.object({ deny: stringOrArray }).strict();\n\nconst NetworkRedirectRule = z\n .object({ redirect: z.string(), to: z.string() })\n .strict();\n\nexport const NetworkRuleSchema = z.union([\n NetworkAllowRule,\n NetworkDenyRule,\n NetworkRedirectRule,\n]);\n\n// ─── Command rules ──────────────────────────────────────────\n\nconst CommandRedirectTarget = z.union([\n z.string(),\n z.object({ cmd: z.string(), args: z.array(z.string()) }).strict(),\n]);\n\nconst CommandAllowRule = z.object({ allow: stringOrArray }).strict();\n\nconst CommandDenyRule = z.object({ deny: stringOrArray }).strict();\n\nconst CommandRedirectRule = z\n .object({ redirect: stringOrArray, to: CommandRedirectTarget })\n .strict();\n\nexport const CommandRuleSchema = z.union([\n CommandAllowRule,\n CommandDenyRule,\n CommandRedirectRule,\n]);\n\n// ─── Env rules ──────────────────────────────────────────────\n\nexport const EnvRuleSchema = z\n .object({\n commands: z.array(z.string()),\n allow: z.array(z.string()).optional(),\n deny: z.array(z.string()).optional(),\n })\n .strict();\n\n// ─── DNS / Connect redirects ────────────────────────────────\n\nexport const DnsRedirectSchema = z\n .object({\n match: z.string(),\n resolveTo: z.string(),\n })\n .strict();\n\nexport const ConnectRedirectSchema = z\n .object({\n match: z.string(),\n redirectTo: z.string(),\n })\n .strict();\n\n// ─── PolicyDefinition ───────────────────────────────────────\n\nexport const PolicyDefinitionSchema = z\n .object({\n file: z.array(FileRuleSchema).optional(),\n network: z.array(NetworkRuleSchema).optional(),\n commands: z.array(CommandRuleSchema).optional(),\n env: z.array(EnvRuleSchema).optional(),\n dns: z.array(DnsRedirectSchema).optional(),\n connect: z.array(ConnectRedirectSchema).optional(),\n })\n .strict();\n\n// ─── Inferred types ─────────────────────────────────────────\n\nexport type PolicyDefinition = z.infer<typeof PolicyDefinitionSchema>;\nexport type FileOp = z.infer<typeof FileOpSchema>;\nexport type FileRule = z.infer<typeof FileRuleSchema>;\nexport type NetworkRule = z.infer<typeof NetworkRuleSchema>;\nexport type CommandRule = z.infer<typeof CommandRuleSchema>;\nexport type EnvRule = z.infer<typeof EnvRuleSchema>;\nexport type DnsRedirect = z.infer<typeof DnsRedirectSchema>;\nexport type ConnectRedirect = z.infer<typeof ConnectRedirectSchema>;\n\n// ─── Validation ─────────────────────────────────────────────\n\nexport function validatePolicy(policy: unknown): PolicyDefinition {\n try {\n return PolicyDefinitionSchema.parse(policy);\n } catch (err) {\n if (err instanceof ZodError) {\n throw new PolicyValidationError({ issues: err.issues });\n }\n throw err;\n }\n}\n","import type { ZodIssue } from 'zod';\n\nexport class AgentSHError extends Error {\n constructor(message: string) {\n super(message);\n this.name = 'AgentSHError';\n }\n}\n\nexport class PolicyValidationError extends AgentSHError {\n readonly issues: ZodIssue[];\n\n constructor({ issues }: { issues: ZodIssue[] }) {\n const summaries = issues\n .map((issue) => `${issue.path.join('.')}: ${issue.message}`)\n .join('; ');\n super(`Policy validation failed: ${summaries}`);\n this.name = 'PolicyValidationError';\n this.issues = issues;\n }\n}\n\nexport class MissingPeerDependencyError extends AgentSHError {\n readonly packageName: string;\n readonly versionRange: string;\n\n constructor({\n packageName,\n versionRange,\n }: {\n packageName: string;\n versionRange: string;\n }) {\n super(\n `${packageName} is required but not installed. Run: npm install ${packageName}@\"${versionRange}\"`,\n );\n this.name = 'MissingPeerDependencyError';\n this.packageName = packageName;\n this.versionRange = versionRange;\n }\n}\n\nexport class IncompatibleProviderVersionError extends AgentSHError {\n readonly installed: string;\n readonly required: string;\n readonly packageName: string;\n\n constructor({\n installed,\n required,\n packageName,\n }: {\n installed: string;\n required: string;\n packageName: string;\n }) {\n super(\n `${packageName} version ${installed} is not supported. @agentsh/secure-sandbox requires ${packageName} ${required}. Please upgrade: npm install ${packageName}@latest`,\n );\n this.name = 'IncompatibleProviderVersionError';\n this.installed = installed;\n this.required = required;\n this.packageName = packageName;\n }\n}\n\nexport class ProvisioningError extends AgentSHError {\n readonly phase: string;\n readonly command: string;\n readonly stderr: string;\n\n constructor({\n phase,\n command,\n stderr,\n }: {\n phase: string;\n command: string;\n stderr: string;\n }) {\n super(`Provisioning failed at phase: ${phase}`);\n this.name = 'ProvisioningError';\n this.phase = phase;\n this.command = command;\n this.stderr = stderr;\n }\n}\n\nexport class IntegrityError extends AgentSHError {\n readonly expected: string;\n readonly actual: string;\n\n constructor({\n expected,\n actual,\n message,\n }: {\n expected: string;\n actual: string;\n message?: string;\n }) {\n super(message ?? `Checksum mismatch: expected ${expected}, got ${actual}`);\n this.name = 'IntegrityError';\n this.expected = expected;\n this.actual = actual;\n }\n}\n\nexport class RuntimeError extends AgentSHError {\n readonly sessionId: string;\n readonly command: string;\n readonly stderr: string;\n\n constructor({\n sessionId,\n command,\n stderr,\n }: {\n sessionId: string;\n command: string;\n stderr: string;\n }) {\n super(`agentsh exec failed (session ${sessionId})`);\n this.name = 'RuntimeError';\n this.sessionId = sessionId;\n this.command = command;\n this.stderr = stderr;\n }\n}\n","import type { PolicyDefinition } from './schema.js';\nimport { validatePolicy } from './schema.js';\n\nconst CATEGORIES = ['file', 'network', 'commands', 'env', 'dns', 'connect'] as const;\n\n/**\n * Merge policy overrides AFTER base rules for each category.\n * Since agentsh evaluates first-match-wins, appended rules only apply\n * to paths not already matched by base.\n */\nexport function merge(base: PolicyDefinition, ...overrides: Partial<PolicyDefinition>[]): PolicyDefinition {\n return validatePolicy(mergeInternal(base, overrides, 'append'));\n}\n\n/**\n * Merge policy overrides BEFORE base rules for each category,\n * making overrides take priority in first-match-wins evaluation.\n */\nexport function mergePrepend(base: PolicyDefinition, ...overrides: Partial<PolicyDefinition>[]): PolicyDefinition {\n return validatePolicy(mergeInternal(base, overrides, 'prepend'));\n}\n\nfunction mergeInternal(\n base: PolicyDefinition,\n overrides: Partial<PolicyDefinition>[],\n mode: 'append' | 'prepend',\n): PolicyDefinition {\n const result: any = { ...base };\n for (const override of overrides) {\n for (const key of CATEGORIES) {\n if (override[key] != null) {\n const baseRules = result[key] ?? [];\n result[key] = mode === 'append'\n ? [...baseRules, ...override[key]!]\n : [...override[key]!, ...baseRules];\n }\n }\n }\n return result;\n}\n","import type { PolicyDefinition } from './schema.js';\nimport { merge } from './merge.js';\n\n// ─── agentDefault ──────────────────────────────────────────\n\n/**\n * Comprehensive policy for AI coding agents. This is the DEFAULT policy\n * used when no policy is specified. Based on agentsh v0.13's agent-default\n * policy.\n */\nexport function agentDefault(\n extensions?: Partial<PolicyDefinition>,\n): PolicyDefinition {\n const base: PolicyDefinition = {\n file: [\n { allow: '/workspace/**', ops: ['read', 'write', 'create'] },\n // Git/version-control credentials\n { deny: ['/workspace/.git/config', '/workspace/.netrc'] },\n // Secrets and credentials\n { deny: ['**/.env', '**/.env.*', '**/credentials*', '**/*.pem', '**/*.key'] },\n { deny: ['~/.ssh/**', '/proc/*/environ'] },\n // Cloud provider credentials\n { deny: ['~/.aws/**', '~/.gcp/**', '~/.azure/**', '~/.config/gcloud/**'] },\n // Shell config injection (persistence)\n { deny: ['~/.bashrc', '~/.zshrc', '~/.profile', '~/.bash_profile'] },\n // Credential stores\n { deny: ['~/.gitconfig', '~/.netrc', '~/.curlrc', '~/.wgetrc'] },\n // PATH hijacking\n { deny: '~/.local/bin/**' },\n // Agent config files — allow reads (project context), deny writes (prompt injection persistence)\n { deny: ['**/.cursorrules', '**/CLAUDE.md', '**/copilot-instructions.md'], ops: ['write', 'create', 'delete'] },\n ],\n network: [\n {\n allow: [\n 'registry.npmjs.org',\n 'registry.yarnpkg.com',\n 'pypi.org',\n 'files.pythonhosted.org',\n 'crates.io',\n 'static.crates.io',\n 'index.crates.io',\n 'proxy.golang.org',\n 'sum.golang.org',\n 'github.com',\n 'raw.githubusercontent.com',\n ],\n ports: [443],\n },\n { deny: '*' },\n ],\n commands: [\n // Allow safe commands (order matters — first match wins)\n {\n allow: [\n 'bash', 'sh', 'echo', 'cat', 'head', 'tail', 'grep', 'find',\n 'ls', 'wc', 'sort', 'uniq', 'diff', 'pwd', 'date', 'which',\n 'whoami', 'id', 'uname', 'printf', 'test', 'true', 'false',\n 'mkdir', 'cp', 'mv', 'rm', 'touch', 'chmod', 'tr', 'cut',\n 'sed', 'awk', 'tee', 'xargs', 'basename', 'dirname', 'realpath',\n 'base64', 'md5sum', 'sha256sum', 'tar', 'gzip', 'gunzip',\n ],\n },\n // Allow dev tools\n {\n allow: [\n 'git', 'node', 'npm', 'npx', 'yarn', 'pnpm', 'bun',\n 'python', 'python3', 'pip', 'pip3',\n 'cargo', 'rustc', 'go', 'make', 'cmake',\n ],\n },\n // Deny dangerous commands\n { deny: ['env', 'printenv', 'sudo', 'su', 'doas'] },\n { deny: ['shutdown', 'reboot', 'halt', 'poweroff'] },\n { deny: ['nc', 'ncat', 'netcat', 'socat', 'telnet'] },\n { deny: ['git push --force', 'git reset --hard'] },\n {\n redirect: ['curl', 'wget'],\n to: { cmd: 'agentsh-fetch', args: ['--audit'] },\n },\n ],\n };\n return extensions ? merge(base, extensions) : base;\n}\n\n// ─── devSafe ───────────────────────────────────────────────\n\n/**\n * Permissive defaults for local development. Not recommended for production.\n */\nexport function devSafe(\n extensions?: Partial<PolicyDefinition>,\n): PolicyDefinition {\n const base: PolicyDefinition = {\n file: [\n { allow: '/workspace/**', ops: ['read', 'write', 'create'] },\n { deny: ['**/.env', '**/.env.*', '**/credentials*', '**/*.pem', '**/*.key'] },\n { deny: ['~/.ssh/**', '/proc/*/environ'] },\n { deny: ['~/.aws/**', '~/.gcp/**', '~/.azure/**', '~/.config/gcloud/**'] },\n { deny: ['~/.bashrc', '~/.zshrc', '~/.profile', '~/.bash_profile'] },\n { deny: ['~/.gitconfig', '~/.netrc', '~/.curlrc', '~/.wgetrc'] },\n ],\n network: [\n {\n allow: ['registry.npmjs.org', 'registry.yarnpkg.com'],\n ports: [443],\n },\n ],\n commands: [{ deny: ['env', 'printenv', 'shutdown', 'reboot'] }],\n };\n return extensions ? merge(base, extensions) : base;\n}\n\n// ─── ciStrict ──────────────────────────────────────────────\n\n/**\n * Locked down for CI/CD runners.\n */\nexport function ciStrict(\n extensions?: Partial<PolicyDefinition>,\n): PolicyDefinition {\n const base: PolicyDefinition = {\n file: [\n { allow: '/workspace/**' },\n { deny: ['**/.env', '**/.env.*', '**/credentials*', '**/*.pem', '**/*.key'] },\n { deny: ['~/.aws/**', '~/.gcp/**', '~/.azure/**', '~/.config/gcloud/**'] },\n { deny: '/**' },\n ],\n network: [\n {\n allow: [\n 'registry.npmjs.org',\n 'registry.yarnpkg.com',\n 'pypi.org',\n 'files.pythonhosted.org',\n 'crates.io',\n 'static.crates.io',\n 'index.crates.io',\n 'proxy.golang.org',\n 'sum.golang.org',\n ],\n ports: [443],\n },\n { deny: '*' },\n ],\n commands: [\n { deny: ['env', 'printenv', 'shutdown', 'reboot', 'sudo'] },\n ],\n };\n return extensions ? merge(base, extensions) : base;\n}\n\n// ─── agentSandbox ──────────────────────────────────────────\n\n/**\n * Maximum restriction for untrusted code. Read-only workspace, no network.\n */\nexport function agentSandbox(\n extensions?: Partial<PolicyDefinition>,\n): PolicyDefinition {\n const base: PolicyDefinition = {\n file: [\n { allow: '/workspace/**', ops: ['read'] },\n { deny: '/**' },\n ],\n network: [{ deny: '*' }],\n commands: [\n { deny: ['env', 'printenv', 'sudo', 'su', 'shutdown', 'reboot'] },\n ],\n };\n return extensions ? merge(base, extensions) : base;\n}\n","import yaml from 'js-yaml';\nimport type {\n PolicyDefinition,\n FileRule,\n NetworkRule,\n CommandRule,\n EnvRule,\n DnsRedirect,\n ConnectRedirect,\n} from './schema.js';\n\n// ─── Helpers ────────────────────────────────────────────────\n\n/** Normalize a string-or-array value to always be an array. */\nfunction toArray(value: string | string[]): string[] {\n return Array.isArray(value) ? value : [value];\n}\n\n/** Detect the decision key from a rule object. */\ntype DecisionKey = 'allow' | 'deny' | 'redirect' | 'audit' | 'softDelete';\n\nconst FILE_DECISION_KEYS: DecisionKey[] = [\n 'allow',\n 'deny',\n 'redirect',\n 'audit',\n 'softDelete',\n];\n\nconst SIMPLE_DECISION_KEYS: DecisionKey[] = ['allow', 'deny', 'redirect'];\n\nfunction findDecision(\n rule: Record<string, unknown>,\n keys: DecisionKey[],\n): { key: DecisionKey; value: unknown } {\n for (const k of keys) {\n if (k in rule) {\n return { key: k, value: rule[k] };\n }\n }\n throw new Error(`No decision key found in rule: ${JSON.stringify(rule)}`);\n}\n\n/** Map softDelete → soft_delete for YAML output. */\nfunction yamlDecision(key: DecisionKey): string {\n return key === 'softDelete' ? 'soft_delete' : key;\n}\n\n// ─── File rules ─────────────────────────────────────────────\n\nfunction serializeFileRules(rules: FileRule[]): Record<string, unknown>[] {\n return rules.map((rule, i) => {\n const r = rule as Record<string, unknown>;\n const { key, value } = findDecision(r, FILE_DECISION_KEYS);\n const paths = toArray(value as string | string[]);\n\n const out: Record<string, unknown> = {\n name: `file-rule-${i}`,\n paths,\n };\n\n if ('ops' in r && r.ops) {\n out.operations = r.ops;\n }\n\n out.decision = yamlDecision(key);\n\n if (key === 'redirect' && 'to' in r) {\n out.redirect_to = r.to;\n }\n\n return out;\n });\n}\n\n// ─── Network rules ──────────────────────────────────────────\n\nfunction serializeNetworkRules(\n rules: NetworkRule[],\n): Record<string, unknown>[] {\n return rules.map((rule, i) => {\n const r = rule as Record<string, unknown>;\n const { key, value } = findDecision(r, SIMPLE_DECISION_KEYS);\n const domains = toArray(value as string | string[]);\n\n const out: Record<string, unknown> = {\n name: `network-rule-${i}`,\n domains,\n decision: key,\n };\n\n if ('ports' in r && r.ports) {\n out.ports = r.ports;\n }\n\n if (key === 'redirect' && 'to' in r) {\n out.redirect_to = r.to;\n }\n\n return out;\n });\n}\n\n// ─── Command rules ──────────────────────────────────────────\n\nfunction serializeCommandRules(\n rules: CommandRule[],\n): Record<string, unknown>[] {\n return rules.map((rule, i) => {\n const r = rule as Record<string, unknown>;\n const { key, value } = findDecision(r, SIMPLE_DECISION_KEYS);\n const commands = toArray(value as string | string[]);\n\n const out: Record<string, unknown> = {\n name: `command-rule-${i}`,\n commands,\n decision: key,\n };\n\n if (key === 'redirect' && 'to' in r) {\n const to = r.to;\n if (typeof to === 'string') {\n out.redirect_to = to;\n } else if (typeof to === 'object' && to !== null) {\n const target = to as { cmd: string; args: string[] };\n out.redirect_to = { command: target.cmd, args: target.args };\n }\n }\n\n return out;\n });\n}\n\n// ─── Env rules ──────────────────────────────────────────────\n\nfunction serializeEnvRules(rules: EnvRule[]): Record<string, unknown>[] {\n return rules.map((rule, i) => {\n const out: Record<string, unknown> = {\n name: `env-rule-${i}`,\n commands: rule.commands,\n };\n if (rule.allow) {\n out.allow = rule.allow;\n }\n if (rule.deny) {\n out.deny = rule.deny;\n }\n return out;\n });\n}\n\n// ─── DNS redirects ──────────────────────────────────────────\n\nfunction serializeDnsRedirects(\n redirects: DnsRedirect[],\n): Record<string, unknown>[] {\n return redirects.map((r) => ({\n match: r.match,\n resolve_to: r.resolveTo,\n }));\n}\n\n// ─── Connect redirects ──────────────────────────────────────\n\nfunction serializeConnectRedirects(\n redirects: ConnectRedirect[],\n): Record<string, unknown>[] {\n return redirects.map((r) => ({\n match: r.match,\n redirect_to: r.redirectTo,\n }));\n}\n\n// ─── Public API ─────────────────────────────────────────────\n\n/**\n * Converts a PolicyDefinition to agentsh YAML format.\n *\n * Omits empty categories from output.\n */\nexport function serializePolicy(policy: PolicyDefinition): string {\n const doc: Record<string, unknown> = {\n version: 1,\n name: 'secure-sandbox-policy',\n };\n\n if (policy.file && policy.file.length > 0) {\n doc.file_rules = serializeFileRules(policy.file);\n }\n\n if (policy.network && policy.network.length > 0) {\n doc.network_rules = serializeNetworkRules(policy.network);\n }\n\n if (policy.commands && policy.commands.length > 0) {\n doc.command_rules = serializeCommandRules(policy.commands);\n }\n\n if (policy.env && policy.env.length > 0) {\n doc.env_rules = serializeEnvRules(policy.env);\n }\n\n if (policy.dns && policy.dns.length > 0) {\n doc.dns_redirects = serializeDnsRedirects(policy.dns);\n }\n\n if (policy.connect && policy.connect.length > 0) {\n doc.connect_redirects = serializeConnectRedirects(policy.connect);\n }\n\n return yaml.dump(doc, { lineWidth: -1 });\n}\n\n/**\n * Returns the fixed system policy YAML from the spec (Section 9.4).\n *\n * This static set of rules protects agentsh's own configuration, binaries,\n * and processes from tampering by the agent. These rules are written to a\n * separate system policy directory evaluated before user policy.\n */\nexport function systemPolicyYaml(): string {\n const doc = {\n version: 1,\n name: '_system-protection',\n file_rules: [\n {\n name: '_system-protect-config',\n paths: ['/etc/agentsh/**'],\n operations: ['write', 'create', 'delete'],\n decision: 'deny',\n message: 'Policy files are immutable during agent execution',\n },\n {\n name: '_system-protect-binary',\n paths: ['/usr/local/bin/agentsh*', '/usr/bin/agentsh*'],\n operations: ['write', 'create', 'delete'],\n decision: 'deny',\n message: 'agentsh binary is immutable during agent execution',\n },\n {\n name: '_system-protect-shim-files',\n paths: ['/usr/bin/agentsh-shell-shim', '/bin/bash', '/bin/sh'],\n operations: ['write', 'create', 'delete'],\n decision: 'deny',\n message: 'Shell and shim binaries are immutable during agent execution',\n },\n ],\n command_rules: [\n {\n name: '_system-protect-process',\n commands: ['kill', 'killall', 'pkill'],\n args_match: ['agentsh'],\n decision: 'deny',\n message: 'Cannot terminate agentsh processes',\n },\n ],\n };\n\n return yaml.dump(doc, { lineWidth: -1 });\n}\n"],"mappings":";;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,SAAS,GAAG,gBAAgB;;;ACErB,IAAM,eAAN,cAA2B,MAAM;AAAA,EACtC,YAAY,SAAiB;AAC3B,UAAM,OAAO;AACb,SAAK,OAAO;AAAA,EACd;AACF;AAEO,IAAM,wBAAN,cAAoC,aAAa;AAAA,EAC7C;AAAA,EAET,YAAY,EAAE,OAAO,GAA2B;AAC9C,UAAM,YAAY,OACf,IAAI,CAAC,UAAU,GAAG,MAAM,KAAK,KAAK,GAAG,CAAC,KAAK,MAAM,OAAO,EAAE,EAC1D,KAAK,IAAI;AACZ,UAAM,6BAA6B,SAAS,EAAE;AAC9C,SAAK,OAAO;AACZ,SAAK,SAAS;AAAA,EAChB;AACF;AAEO,IAAM,6BAAN,cAAyC,aAAa;AAAA,EAClD;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,EACF,GAGG;AACD;AAAA,MACE,GAAG,WAAW,oDAAoD,WAAW,KAAK,YAAY;AAAA,IAChG;AACA,SAAK,OAAO;AACZ,SAAK,cAAc;AACnB,SAAK,eAAe;AAAA,EACtB;AACF;AAEO,IAAM,mCAAN,cAA+C,aAAa;AAAA,EACxD;AAAA,EACA;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,IACA;AAAA,EACF,GAIG;AACD;AAAA,MACE,GAAG,WAAW,YAAY,SAAS,uDAAuD,WAAW,IAAI,QAAQ,iCAAiC,WAAW;AAAA,IAC/J;AACA,SAAK,OAAO;AACZ,SAAK,YAAY;AACjB,SAAK,WAAW;AAChB,SAAK,cAAc;AAAA,EACrB;AACF;AAEO,IAAM,oBAAN,cAAgC,aAAa;AAAA,EACzC;AAAA,EACA;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,IACA;AAAA,EACF,GAIG;AACD,UAAM,iCAAiC,KAAK,EAAE;AAC9C,SAAK,OAAO;AACZ,SAAK,QAAQ;AACb,SAAK,UAAU;AACf,SAAK,SAAS;AAAA,EAChB;AACF;AAEO,IAAM,iBAAN,cAA6B,aAAa;AAAA,EACtC;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,IACA;AAAA,EACF,GAIG;AACD,UAAM,WAAW,+BAA+B,QAAQ,SAAS,MAAM,EAAE;AACzE,SAAK,OAAO;AACZ,SAAK,WAAW;AAChB,SAAK,SAAS;AAAA,EAChB;AACF;AAEO,IAAM,eAAN,cAA2B,aAAa;AAAA,EACpC;AAAA,EACA;AAAA,EACA;AAAA,EAET,YAAY;AAAA,IACV;AAAA,IACA;AAAA,IACA;AAAA,EACF,GAIG;AACD,UAAM,gCAAgC,SAAS,GAAG;AAClD,SAAK,OAAO;AACZ,SAAK,YAAY;AACjB,SAAK,UAAU;AACf,SAAK,SAAS;AAAA,EAChB;AACF;;;AD3HA,IAAM,gBAAgB,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;AAIxD,IAAM,eAAe,EAAE,KAAK,CAAC,QAAQ,SAAS,UAAU,QAAQ,CAAC;AAExE,IAAM,gBAAgB,EACnB,OAAO,EAAE,OAAO,eAAe,KAAK,EAAE,MAAM,YAAY,EAAE,SAAS,EAAE,CAAC,EACtE,OAAO;AAEV,IAAM,eAAe,EAClB,OAAO,EAAE,MAAM,eAAe,KAAK,EAAE,MAAM,YAAY,EAAE,SAAS,EAAE,CAAC,EACrE,OAAO;AAEV,IAAM,mBAAmB,EACtB,OAAO;AAAA,EACN,UAAU;AAAA,EACV,IAAI,EAAE,OAAO;AAAA,EACb,KAAK,EAAE,MAAM,YAAY,EAAE,SAAS;AACtC,CAAC,EACA,OAAO;AAEV,IAAM,gBAAgB,EACnB,OAAO,EAAE,OAAO,eAAe,KAAK,EAAE,MAAM,YAAY,EAAE,SAAS,EAAE,CAAC,EACtE,OAAO;AAEV,IAAM,qBAAqB,EAAE,OAAO,EAAE,YAAY,cAAc,CAAC,EAAE,OAAO;AAEnE,IAAM,iBAAiB,EAAE,MAAM;AAAA,EACpC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,CAAC;AAID,IAAM,mBAAmB,EACtB,OAAO;AAAA,EACN,OAAO;AAAA,EACP,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,CAAC,EAAE,IAAI,KAAK,CAAC,EAAE,SAAS;AAC9D,CAAC,EACA,OAAO;AAEV,IAAM,kBAAkB,EAAE,OAAO,EAAE,MAAM,cAAc,CAAC,EAAE,OAAO;AAEjE,IAAM,sBAAsB,EACzB,OAAO,EAAE,UAAU,EAAE,OAAO,GAAG,IAAI,EAAE,OAAO,EAAE,CAAC,EAC/C,OAAO;AAEH,IAAM,oBAAoB,EAAE,MAAM;AAAA,EACvC;AAAA,EACA;AAAA,EACA;AACF,CAAC;AAID,IAAM,wBAAwB,EAAE,MAAM;AAAA,EACpC,EAAE,OAAO;AAAA,EACT,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,GAAG,MAAM,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,CAAC,EAAE,OAAO;AAClE,CAAC;AAED,IAAM,mBAAmB,EAAE,OAAO,EAAE,OAAO,cAAc,CAAC,EAAE,OAAO;AAEnE,IAAM,kBAAkB,EAAE,OAAO,EAAE,MAAM,cAAc,CAAC,EAAE,OAAO;AAEjE,IAAM,sBAAsB,EACzB,OAAO,EAAE,UAAU,eAAe,IAAI,sBAAsB,CAAC,EAC7D,OAAO;AAEH,IAAM,oBAAoB,EAAE,MAAM;AAAA,EACvC;AAAA,EACA;AAAA,EACA;AACF,CAAC;AAIM,IAAM,gBAAgB,EAC1B,OAAO;AAAA,EACN,UAAU,EAAE,MAAM,EAAE,OAAO,CAAC;AAAA,EAC5B,OAAO,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,SAAS;AAAA,EACpC,MAAM,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,SAAS;AACrC,CAAC,EACA,OAAO;AAIH,IAAM,oBAAoB,EAC9B,OAAO;AAAA,EACN,OAAO,EAAE,OAAO;AAAA,EAChB,WAAW,EAAE,OAAO;AACtB,CAAC,EACA,OAAO;AAEH,IAAM,wBAAwB,EAClC,OAAO;AAAA,EACN,OAAO,EAAE,OAAO;AAAA,EAChB,YAAY,EAAE,OAAO;AACvB,CAAC,EACA,OAAO;AAIH,IAAM,yBAAyB,EACnC,OAAO;AAAA,EACN,MAAM,EAAE,MAAM,cAAc,EAAE,SAAS;AAAA,EACvC,SAAS,EAAE,MAAM,iBAAiB,EAAE,SAAS;AAAA,EAC7C,UAAU,EAAE,MAAM,iBAAiB,EAAE,SAAS;AAAA,EAC9C,KAAK,EAAE,MAAM,aAAa,EAAE,SAAS;AAAA,EACrC,KAAK,EAAE,MAAM,iBAAiB,EAAE,SAAS;AAAA,EACzC,SAAS,EAAE,MAAM,qBAAqB,EAAE,SAAS;AACnD,CAAC,EACA,OAAO;AAeH,SAAS,eAAe,QAAmC;AAChE,MAAI;AACF,WAAO,uBAAuB,MAAM,MAAM;AAAA,EAC5C,SAAS,KAAK;AACZ,QAAI,eAAe,UAAU;AAC3B,YAAM,IAAI,sBAAsB,EAAE,QAAQ,IAAI,OAAO,CAAC;AAAA,IACxD;AACA,UAAM;AAAA,EACR;AACF;;;AE7IA,IAAM,aAAa,CAAC,QAAQ,WAAW,YAAY,OAAO,OAAO,SAAS;AAOnE,SAAS,MAAM,SAA2B,WAA0D;AACzG,SAAO,eAAe,cAAc,MAAM,WAAW,QAAQ,CAAC;AAChE;AAMO,SAAS,aAAa,SAA2B,WAA0D;AAChH,SAAO,eAAe,cAAc,MAAM,WAAW,SAAS,CAAC;AACjE;AAEA,SAAS,cACP,MACA,WACA,MACkB;AAClB,QAAM,SAAc,EAAE,GAAG,KAAK;AAC9B,aAAW,YAAY,WAAW;AAChC,eAAW,OAAO,YAAY;AAC5B,UAAI,SAAS,GAAG,KAAK,MAAM;AACzB,cAAM,YAAY,OAAO,GAAG,KAAK,CAAC;AAClC,eAAO,GAAG,IAAI,SAAS,WACnB,CAAC,GAAG,WAAW,GAAG,SAAS,GAAG,CAAE,IAChC,CAAC,GAAG,SAAS,GAAG,GAAI,GAAG,SAAS;AAAA,MACtC;AAAA,IACF;AAAA,EACF;AACA,SAAO;AACT;;;AC7BO,SAAS,aACd,YACkB;AAClB,QAAM,OAAyB;AAAA,IAC7B,MAAM;AAAA,MACJ,EAAE,OAAO,iBAAiB,KAAK,CAAC,QAAQ,SAAS,QAAQ,EAAE;AAAA;AAAA,MAE3D,EAAE,MAAM,CAAC,0BAA0B,mBAAmB,EAAE;AAAA;AAAA,MAExD,EAAE,MAAM,CAAC,WAAW,aAAa,mBAAmB,YAAY,UAAU,EAAE;AAAA,MAC5E,EAAE,MAAM,CAAC,aAAa,iBAAiB,EAAE;AAAA;AAAA,MAEzC,EAAE,MAAM,CAAC,aAAa,aAAa,eAAe,qBAAqB,EAAE;AAAA;AAAA,MAEzE,EAAE,MAAM,CAAC,aAAa,YAAY,cAAc,iBAAiB,EAAE;AAAA;AAAA,MAEnE,EAAE,MAAM,CAAC,gBAAgB,YAAY,aAAa,WAAW,EAAE;AAAA;AAAA,MAE/D,EAAE,MAAM,kBAAkB;AAAA;AAAA,MAE1B,EAAE,MAAM,CAAC,mBAAmB,gBAAgB,4BAA4B,GAAG,KAAK,CAAC,SAAS,UAAU,QAAQ,EAAE;AAAA,IAChH;AAAA,IACA,SAAS;AAAA,MACP;AAAA,QACE,OAAO;AAAA,UACL;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF;AAAA,QACA,OAAO,CAAC,GAAG;AAAA,MACb;AAAA,MACA,EAAE,MAAM,IAAI;AAAA,IACd;AAAA,IACA,UAAU;AAAA;AAAA,MAER;AAAA,QACE,OAAO;AAAA,UACL;AAAA,UAAQ;AAAA,UAAM;AAAA,UAAQ;AAAA,UAAO;AAAA,UAAQ;AAAA,UAAQ;AAAA,UAAQ;AAAA,UACrD;AAAA,UAAM;AAAA,UAAM;AAAA,UAAQ;AAAA,UAAQ;AAAA,UAAQ;AAAA,UAAO;AAAA,UAAQ;AAAA,UACnD;AAAA,UAAU;AAAA,UAAM;AAAA,UAAS;AAAA,UAAU;AAAA,UAAQ;AAAA,UAAQ;AAAA,UACnD;AAAA,UAAS;AAAA,UAAM;AAAA,UAAM;AAAA,UAAM;AAAA,UAAS;AAAA,UAAS;AAAA,UAAM;AAAA,UACnD;AAAA,UAAO;AAAA,UAAO;AAAA,UAAO;AAAA,UAAS;AAAA,UAAY;AAAA,UAAW;AAAA,UACrD;AAAA,UAAU;AAAA,UAAU;AAAA,UAAa;AAAA,UAAO;AAAA,UAAQ;AAAA,QAClD;AAAA,MACF;AAAA;AAAA,MAEA;AAAA,QACE,OAAO;AAAA,UACL;AAAA,UAAO;AAAA,UAAQ;AAAA,UAAO;AAAA,UAAO;AAAA,UAAQ;AAAA,UAAQ;AAAA,UAC7C;AAAA,UAAU;AAAA,UAAW;AAAA,UAAO;AAAA,UAC5B;AAAA,UAAS;AAAA,UAAS;AAAA,UAAM;AAAA,UAAQ;AAAA,QAClC;AAAA,MACF;AAAA;AAAA,MAEA,EAAE,MAAM,CAAC,OAAO,YAAY,QAAQ,MAAM,MAAM,EAAE;AAAA,MAClD,EAAE,MAAM,CAAC,YAAY,UAAU,QAAQ,UAAU,EAAE;AAAA,MACnD,EAAE,MAAM,CAAC,MAAM,QAAQ,UAAU,SAAS,QAAQ,EAAE;AAAA,MACpD,EAAE,MAAM,CAAC,oBAAoB,kBAAkB,EAAE;AAAA,MACjD;AAAA,QACE,UAAU,CAAC,QAAQ,MAAM;AAAA,QACzB,IAAI,EAAE,KAAK,iBAAiB,MAAM,CAAC,SAAS,EAAE;AAAA,MAChD;AAAA,IACF;AAAA,EACF;AACA,SAAO,aAAa,MAAM,MAAM,UAAU,IAAI;AAChD;AAOO,SAAS,QACd,YACkB;AAClB,QAAM,OAAyB;AAAA,IAC7B,MAAM;AAAA,MACJ,EAAE,OAAO,iBAAiB,KAAK,CAAC,QAAQ,SAAS,QAAQ,EAAE;AAAA,MAC3D,EAAE,MAAM,CAAC,WAAW,aAAa,mBAAmB,YAAY,UAAU,EAAE;AAAA,MAC5E,EAAE,MAAM,CAAC,aAAa,iBAAiB,EAAE;AAAA,MACzC,EAAE,MAAM,CAAC,aAAa,aAAa,eAAe,qBAAqB,EAAE;AAAA,MACzE,EAAE,MAAM,CAAC,aAAa,YAAY,cAAc,iBAAiB,EAAE;AAAA,MACnE,EAAE,MAAM,CAAC,gBAAgB,YAAY,aAAa,WAAW,EAAE;AAAA,IACjE;AAAA,IACA,SAAS;AAAA,MACP;AAAA,QACE,OAAO,CAAC,sBAAsB,sBAAsB;AAAA,QACpD,OAAO,CAAC,GAAG;AAAA,MACb;AAAA,IACF;AAAA,IACA,UAAU,CAAC,EAAE,MAAM,CAAC,OAAO,YAAY,YAAY,QAAQ,EAAE,CAAC;AAAA,EAChE;AACA,SAAO,aAAa,MAAM,MAAM,UAAU,IAAI;AAChD;AAOO,SAAS,SACd,YACkB;AAClB,QAAM,OAAyB;AAAA,IAC7B,MAAM;AAAA,MACJ,EAAE,OAAO,gBAAgB;AAAA,MACzB,EAAE,MAAM,CAAC,WAAW,aAAa,mBAAmB,YAAY,UAAU,EAAE;AAAA,MAC5E,EAAE,MAAM,CAAC,aAAa,aAAa,eAAe,qBAAqB,EAAE;AAAA,MACzE,EAAE,MAAM,MAAM;AAAA,IAChB;AAAA,IACA,SAAS;AAAA,MACP;AAAA,QACE,OAAO;AAAA,UACL;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF;AAAA,QACA,OAAO,CAAC,GAAG;AAAA,MACb;AAAA,MACA,EAAE,MAAM,IAAI;AAAA,IACd;AAAA,IACA,UAAU;AAAA,MACR,EAAE,MAAM,CAAC,OAAO,YAAY,YAAY,UAAU,MAAM,EAAE;AAAA,IAC5D;AAAA,EACF;AACA,SAAO,aAAa,MAAM,MAAM,UAAU,IAAI;AAChD;AAOO,SAAS,aACd,YACkB;AAClB,QAAM,OAAyB;AAAA,IAC7B,MAAM;AAAA,MACJ,EAAE,OAAO,iBAAiB,KAAK,CAAC,MAAM,EAAE;AAAA,MACxC,EAAE,MAAM,MAAM;AAAA,IAChB;AAAA,IACA,SAAS,CAAC,EAAE,MAAM,IAAI,CAAC;AAAA,IACvB,UAAU;AAAA,MACR,EAAE,MAAM,CAAC,OAAO,YAAY,QAAQ,MAAM,YAAY,QAAQ,EAAE;AAAA,IAClE;AAAA,EACF;AACA,SAAO,aAAa,MAAM,MAAM,UAAU,IAAI;AAChD;;;AC3KA,OAAO,UAAU;AAcjB,SAAS,QAAQ,OAAoC;AACnD,SAAO,MAAM,QAAQ,KAAK,IAAI,QAAQ,CAAC,KAAK;AAC9C;AAKA,IAAM,qBAAoC;AAAA,EACxC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEA,IAAM,uBAAsC,CAAC,SAAS,QAAQ,UAAU;AAExE,SAAS,aACP,MACA,MACsC;AACtC,aAAW,KAAK,MAAM;AACpB,QAAI,KAAK,MAAM;AACb,aAAO,EAAE,KAAK,GAAG,OAAO,KAAK,CAAC,EAAE;AAAA,IAClC;AAAA,EACF;AACA,QAAM,IAAI,MAAM,kCAAkC,KAAK,UAAU,IAAI,CAAC,EAAE;AAC1E;AAGA,SAAS,aAAa,KAA0B;AAC9C,SAAO,QAAQ,eAAe,gBAAgB;AAChD;AAIA,SAAS,mBAAmB,OAA8C;AACxE,SAAO,MAAM,IAAI,CAAC,MAAM,MAAM;AAC5B,UAAM,IAAI;AACV,UAAM,EAAE,KAAK,MAAM,IAAI,aAAa,GAAG,kBAAkB;AACzD,UAAM,QAAQ,QAAQ,KAA0B;AAEhD,UAAM,MAA+B;AAAA,MACnC,MAAM,aAAa,CAAC;AAAA,MACpB;AAAA,IACF;AAEA,QAAI,SAAS,KAAK,EAAE,KAAK;AACvB,UAAI,aAAa,EAAE;AAAA,IACrB;AAEA,QAAI,WAAW,aAAa,GAAG;AAE/B,QAAI,QAAQ,cAAc,QAAQ,GAAG;AACnC,UAAI,cAAc,EAAE;AAAA,IACtB;AAEA,WAAO;AAAA,EACT,CAAC;AACH;AAIA,SAAS,sBACP,OAC2B;AAC3B,SAAO,MAAM,IAAI,CAAC,MAAM,MAAM;AAC5B,UAAM,IAAI;AACV,UAAM,EAAE,KAAK,MAAM,IAAI,aAAa,GAAG,oBAAoB;AAC3D,UAAM,UAAU,QAAQ,KAA0B;AAElD,UAAM,MAA+B;AAAA,MACnC,MAAM,gBAAgB,CAAC;AAAA,MACvB;AAAA,MACA,UAAU;AAAA,IACZ;AAEA,QAAI,WAAW,KAAK,EAAE,OAAO;AAC3B,UAAI,QAAQ,EAAE;AAAA,IAChB;AAEA,QAAI,QAAQ,cAAc,QAAQ,GAAG;AACnC,UAAI,cAAc,EAAE;AAAA,IACtB;AAEA,WAAO;AAAA,EACT,CAAC;AACH;AAIA,SAAS,sBACP,OAC2B;AAC3B,SAAO,MAAM,IAAI,CAAC,MAAM,MAAM;AAC5B,UAAM,IAAI;AACV,UAAM,EAAE,KAAK,MAAM,IAAI,aAAa,GAAG,oBAAoB;AAC3D,UAAM,WAAW,QAAQ,KAA0B;AAEnD,UAAM,MAA+B;AAAA,MACnC,MAAM,gBAAgB,CAAC;AAAA,MACvB;AAAA,MACA,UAAU;AAAA,IACZ;AAEA,QAAI,QAAQ,cAAc,QAAQ,GAAG;AACnC,YAAM,KAAK,EAAE;AACb,UAAI,OAAO,OAAO,UAAU;AAC1B,YAAI,cAAc;AAAA,MACpB,WAAW,OAAO,OAAO,YAAY,OAAO,MAAM;AAChD,cAAM,SAAS;AACf,YAAI,cAAc,EAAE,SAAS,OAAO,KAAK,MAAM,OAAO,KAAK;AAAA,MAC7D;AAAA,IACF;AAEA,WAAO;AAAA,EACT,CAAC;AACH;AAIA,SAAS,kBAAkB,OAA6C;AACtE,SAAO,MAAM,IAAI,CAAC,MAAM,MAAM;AAC5B,UAAM,MAA+B;AAAA,MACnC,MAAM,YAAY,CAAC;AAAA,MACnB,UAAU,KAAK;AAAA,IACjB;AACA,QAAI,KAAK,OAAO;AACd,UAAI,QAAQ,KAAK;AAAA,IACnB;AACA,QAAI,KAAK,MAAM;AACb,UAAI,OAAO,KAAK;AAAA,IAClB;AACA,WAAO;AAAA,EACT,CAAC;AACH;AAIA,SAAS,sBACP,WAC2B;AAC3B,SAAO,UAAU,IAAI,CAAC,OAAO;AAAA,IAC3B,OAAO,EAAE;AAAA,IACT,YAAY,EAAE;AAAA,EAChB,EAAE;AACJ;AAIA,SAAS,0BACP,WAC2B;AAC3B,SAAO,UAAU,IAAI,CAAC,OAAO;AAAA,IAC3B,OAAO,EAAE;AAAA,IACT,aAAa,EAAE;AAAA,EACjB,EAAE;AACJ;AASO,SAAS,gBAAgB,QAAkC;AAChE,QAAM,MAA+B;AAAA,IACnC,SAAS;AAAA,IACT,MAAM;AAAA,EACR;AAEA,MAAI,OAAO,QAAQ,OAAO,KAAK,SAAS,GAAG;AACzC,QAAI,aAAa,mBAAmB,OAAO,IAAI;AAAA,EACjD;AAEA,MAAI,OAAO,WAAW,OAAO,QAAQ,SAAS,GAAG;AAC/C,QAAI,gBAAgB,sBAAsB,OAAO,OAAO;AAAA,EAC1D;AAEA,MAAI,OAAO,YAAY,OAAO,SAAS,SAAS,GAAG;AACjD,QAAI,gBAAgB,sBAAsB,OAAO,QAAQ;AAAA,EAC3D;AAEA,MAAI,OAAO,OAAO,OAAO,IAAI,SAAS,GAAG;AACvC,QAAI,YAAY,kBAAkB,OAAO,GAAG;AAAA,EAC9C;AAEA,MAAI,OAAO,OAAO,OAAO,IAAI,SAAS,GAAG;AACvC,QAAI,gBAAgB,sBAAsB,OAAO,GAAG;AAAA,EACtD;AAEA,MAAI,OAAO,WAAW,OAAO,QAAQ,SAAS,GAAG;AAC/C,QAAI,oBAAoB,0BAA0B,OAAO,OAAO;AAAA,EAClE;AAEA,SAAO,KAAK,KAAK,KAAK,EAAE,WAAW,GAAG,CAAC;AACzC;AASO,SAAS,mBAA2B;AACzC,QAAM,MAAM;AAAA,IACV,SAAS;AAAA,IACT,MAAM;AAAA,IACN,YAAY;AAAA,MACV;AAAA,QACE,MAAM;AAAA,QACN,OAAO,CAAC,iBAAiB;AAAA,QACzB,YAAY,CAAC,SAAS,UAAU,QAAQ;AAAA,QACxC,UAAU;AAAA,QACV,SAAS;AAAA,MACX;AAAA,MACA;AAAA,QACE,MAAM;AAAA,QACN,OAAO,CAAC,2BAA2B,mBAAmB;AAAA,QACtD,YAAY,CAAC,SAAS,UAAU,QAAQ;AAAA,QACxC,UAAU;AAAA,QACV,SAAS;AAAA,MACX;AAAA,MACA;AAAA,QACE,MAAM;AAAA,QACN,OAAO,CAAC,+BAA+B,aAAa,SAAS;AAAA,QAC7D,YAAY,CAAC,SAAS,UAAU,QAAQ;AAAA,QACxC,UAAU;AAAA,QACV,SAAS;AAAA,MACX;AAAA,IACF;AAAA,IACA,eAAe;AAAA,MACb;AAAA,QACE,MAAM;AAAA,QACN,UAAU,CAAC,QAAQ,WAAW,OAAO;AAAA,QACrC,YAAY,CAAC,SAAS;AAAA,QACtB,UAAU;AAAA,QACV,SAAS;AAAA,MACX;AAAA,IACF;AAAA,EACF;AAEA,SAAO,KAAK,KAAK,KAAK,EAAE,WAAW,GAAG,CAAC;AACzC;","names":[]}