@agentsh/secure-sandbox 0.1.5 → 0.1.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,6 +1,6 @@
1
1
  # @agentsh/secure-sandbox
2
2
 
3
- Runtime security for AI agent sandboxes. Drop-in protection against prompt injection, secret exfiltration, and sandbox escape — works with [Vercel](https://vercel.com/sandbox), [E2B](https://e2b.dev/), [Daytona](https://www.daytona.io/), [Cloudflare Containers](https://developers.cloudflare.com/containers/), and [Blaxel](https://blaxel.ai/sandbox). Powered by [agentsh](https://www.agentsh.org).
3
+ Runtime security for AI agent sandboxes. Drop-in protection against prompt injection, secret exfiltration, and sandbox escape — works with [Vercel](https://vercel.com/sandbox), [E2B](https://e2b.dev/), [Daytona](https://www.daytona.io/), [Cloudflare Containers](https://developers.cloudflare.com/containers/), [Blaxel](https://blaxel.ai/sandbox), and [Sprites](https://sprites.dev). Powered by [agentsh](https://www.agentsh.org).
4
4
 
5
5
  ```bash
6
6
  npm install @agentsh/secure-sandbox
@@ -113,6 +113,7 @@ Enforcement happens at the **syscall level** — seccomp intercepts process exec
113
113
  | [**Daytona**](https://www.daytona.io/) | ✅ | ✅ | ✅ | ✅ | ✅ | `full` |
114
114
  | [**Cloudflare**](https://developers.cloudflare.com/containers/) | ✅ | ✅ | ❌ | ✅ | ✅ | `landlock` |
115
115
  | [**Blaxel**](https://blaxel.ai/sandbox) | ✅ | ✅ | ✅ | ✅ | ✅ | `full` |
116
+ | [**Sprites**](https://sprites.dev) | ✅ | ✅ | ✅ | ✅ | ✅ | `full` |
116
117
 
117
118
  ```typescript
118
119
  // E2B
@@ -131,6 +132,12 @@ const sandbox = await secureSandbox(adapters.cloudflare(getSandbox(env.Sandbox,
131
132
  // Blaxel
132
133
  import { SandboxInstance } from '@blaxel/core';
133
134
  const sandbox = await secureSandbox(adapters.blaxel(await SandboxInstance.create({ name: 'my-sandbox' })));
135
+
136
+ // Sprites (Fly.io Firecracker microVMs)
137
+ import { SpritesClient } from '@fly/sprites';
138
+ import { sprites } from '@agentsh/secure-sandbox/adapters/sprites';
139
+ const client = new SpritesClient(process.env.SPRITES_TOKEN);
140
+ const sandbox = await secureSandbox(sprites(client.sprite('my-sprite')));
134
141
  ```
135
142
 
136
143
  ## Default Policy
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-CUqsllMs.js';
1
+ import { S as SandboxAdapter } from '../types-S_fIEFHD.js';
2
2
 
3
3
  declare function blaxel(sandbox: any): SandboxAdapter;
4
4
 
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-CUqsllMs.js';
1
+ import { S as SandboxAdapter } from '../types-S_fIEFHD.js';
2
2
 
3
3
  declare function cloudflare(sandbox: any): SandboxAdapter;
4
4
 
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-CUqsllMs.js';
1
+ import { S as SandboxAdapter } from '../types-S_fIEFHD.js';
2
2
 
3
3
  declare function daytona(sandbox: any): SandboxAdapter;
4
4
 
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-CUqsllMs.js';
1
+ import { S as SandboxAdapter } from '../types-S_fIEFHD.js';
2
2
 
3
3
  declare function e2b(sandbox: any): SandboxAdapter;
4
4
 
@@ -3,4 +3,5 @@ export { e2b } from './e2b.js';
3
3
  export { daytona } from './daytona.js';
4
4
  export { cloudflare } from './cloudflare.js';
5
5
  export { blaxel } from './blaxel.js';
6
- import '../types-CUqsllMs.js';
6
+ export { s as sprites, a as spritesDefaults } from '../index-D6DG8Lpi.js';
7
+ import '../types-S_fIEFHD.js';
@@ -1,4 +1,7 @@
1
- import "../chunk-L4KFLVNU.js";
1
+ import {
2
+ sprites,
3
+ spritesDefaults
4
+ } from "../chunk-KXCR2ZML.js";
2
5
  import {
3
6
  blaxel
4
7
  } from "../chunk-UYEAO27E.js";
@@ -21,6 +24,8 @@ export {
21
24
  cloudflare,
22
25
  daytona,
23
26
  e2b,
27
+ sprites,
28
+ spritesDefaults,
24
29
  vercel
25
30
  };
26
31
  //# sourceMappingURL=index.js.map
@@ -1,4 +1,4 @@
1
- import { S as SandboxAdapter } from '../types-CUqsllMs.js';
1
+ import { S as SandboxAdapter } from '../types-S_fIEFHD.js';
2
2
 
3
3
  declare function vercel(sandbox: any): SandboxAdapter;
4
4
 
@@ -0,0 +1,129 @@
1
+ import {
2
+ blaxel
3
+ } from "./chunk-UYEAO27E.js";
4
+ import {
5
+ cloudflare
6
+ } from "./chunk-LMN3KM53.js";
7
+ import {
8
+ daytona
9
+ } from "./chunk-45FKFVMC.js";
10
+ import {
11
+ e2b
12
+ } from "./chunk-2P37YGN7.js";
13
+ import {
14
+ envPrefix,
15
+ shellEscape
16
+ } from "./chunk-OANLKSOD.js";
17
+ import {
18
+ vercel
19
+ } from "./chunk-JY5ERJTX.js";
20
+ import {
21
+ __export
22
+ } from "./chunk-PZ5AY32C.js";
23
+
24
+ // src/adapters/index.ts
25
+ var adapters_exports = {};
26
+ __export(adapters_exports, {
27
+ blaxel: () => blaxel,
28
+ cloudflare: () => cloudflare,
29
+ daytona: () => daytona,
30
+ e2b: () => e2b,
31
+ sprites: () => sprites,
32
+ spritesDefaults: () => spritesDefaults,
33
+ vercel: () => vercel
34
+ });
35
+
36
+ // src/adapters/sprites.ts
37
+ function sprites(sprite) {
38
+ function sh(cmd, opts) {
39
+ if (opts) return sprite.execFile("sh", ["-c", cmd], opts);
40
+ return sprite.execFile("sh", ["-c", cmd]);
41
+ }
42
+ return {
43
+ async exec(cmd, args, opts) {
44
+ const command = `${envPrefix(opts?.env)}${shellEscape(cmd, args)}`;
45
+ const fullCmd = opts?.sudo ? `sudo ${command}` : command;
46
+ try {
47
+ if (opts?.detached) {
48
+ sh(`nohup ${fullCmd} > /dev/null 2>&1 &`).catch(() => {
49
+ });
50
+ return { stdout: "", stderr: "", exitCode: 0 };
51
+ }
52
+ const result = await sh(fullCmd, { cwd: opts?.cwd });
53
+ return {
54
+ stdout: result.stdout ?? "",
55
+ stderr: result.stderr ?? "",
56
+ exitCode: 0
57
+ };
58
+ } catch (err) {
59
+ return {
60
+ stdout: err.stdout ?? "",
61
+ stderr: err.stderr ?? err.message ?? "",
62
+ exitCode: err.exitCode ?? err.code ?? 1
63
+ };
64
+ }
65
+ },
66
+ async writeFile(path, content) {
67
+ const buf = Buffer.isBuffer(content) ? content : Buffer.from(content);
68
+ const b64 = buf.toString("base64");
69
+ try {
70
+ await sh(`printf '%s' '${b64}' | base64 -d > '${path.replace(/'/g, "'\\''")}'`);
71
+ } catch (err) {
72
+ throw new Error(`writeFile failed (exit ${err.exitCode ?? err.code ?? 1}): ${err.stderr ?? err.message ?? ""}`);
73
+ }
74
+ },
75
+ async readFile(path) {
76
+ try {
77
+ const result = await sh(`cat '${path.replace(/'/g, "'\\''")}'`);
78
+ return result.stdout ?? "";
79
+ } catch (err) {
80
+ throw new Error(`readFile failed (exit ${err.exitCode ?? err.code ?? 1}): ${err.stderr ?? err.message ?? ""}`);
81
+ }
82
+ },
83
+ async stop() {
84
+ await sprite.delete();
85
+ }
86
+ };
87
+ }
88
+ function spritesDefaults() {
89
+ const serverConfig = {
90
+ grpc: { addr: "0.0.0.0:50051" },
91
+ logging: { level: "info", format: "json", output: "stdout" },
92
+ sessions: {
93
+ defaultTimeout: "30m",
94
+ idleTimeout: "10m",
95
+ cleanupInterval: "5m"
96
+ },
97
+ audit: { enabled: true, sqlitePath: "/var/lib/agentsh/audit.db" },
98
+ sandboxLimits: { maxMemoryMb: 512, maxCpuPercent: 90, maxProcesses: 100 },
99
+ fuse: { deferred: true },
100
+ networkIntercept: { interceptMode: "tproxy", proxyListenAddr: "127.0.0.1:8888" },
101
+ seccompDetails: {
102
+ execve: true,
103
+ fileMonitor: { enabled: true, enforceWithoutFuse: true }
104
+ },
105
+ cgroups: { enabled: true },
106
+ unixSockets: { enabled: true },
107
+ proxy: { mode: "mitm", port: 8080 },
108
+ dlp: {
109
+ mode: "redact",
110
+ patterns: { credit_card: true, ssn: true, api_key: true }
111
+ },
112
+ approvals: { enabled: false },
113
+ metrics: { enabled: true, path: "/metrics" },
114
+ health: { path: "/healthz", readinessPath: "/readyz" },
115
+ development: { disableAuth: false, verboseErrors: false }
116
+ };
117
+ return {
118
+ installStrategy: "preinstalled",
119
+ realPaths: true,
120
+ serverConfig
121
+ };
122
+ }
123
+
124
+ export {
125
+ sprites,
126
+ spritesDefaults,
127
+ adapters_exports
128
+ };
129
+ //# sourceMappingURL=chunk-KXCR2ZML.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/adapters/index.ts","../src/adapters/sprites.ts"],"sourcesContent":["export { vercel } from './vercel.js';\nexport { e2b } from './e2b.js';\nexport { daytona } from './daytona.js';\nexport { cloudflare } from './cloudflare.js';\nexport { blaxel } from './blaxel.js';\nexport { sprites, spritesDefaults } from './sprites.js';\n","import type { SandboxAdapter, SecureConfig } from '../core/types.js';\nimport type { ServerConfigOpts } from '../core/config.js';\nimport { shellEscape, envPrefix } from '../core/shell.js';\n\nexport function sprites(sprite: any): SandboxAdapter {\n // sprite.exec() does a naive split(/\\s+/) — no shell parsing.\n // Use sprite.execFile('sh', ['-c', cmd]) for shell features (env, pipes, quotes).\n function sh(cmd: string, opts?: Record<string, unknown>) {\n if (opts) return sprite.execFile('sh', ['-c', cmd], opts);\n return sprite.execFile('sh', ['-c', cmd]);\n }\n\n return {\n async exec(cmd, args, opts) {\n const command = `${envPrefix(opts?.env)}${shellEscape(cmd, args)}`;\n const fullCmd = opts?.sudo ? `sudo ${command}` : command;\n\n try {\n if (opts?.detached) {\n sh(`nohup ${fullCmd} > /dev/null 2>&1 &`).catch(() => {});\n return { stdout: '', stderr: '', exitCode: 0 };\n }\n\n const result = await sh(fullCmd, { cwd: opts?.cwd });\n return {\n stdout: result.stdout ?? '',\n stderr: result.stderr ?? '',\n exitCode: 0,\n };\n } catch (err: any) {\n return {\n stdout: err.stdout ?? '',\n stderr: err.stderr ?? err.message ?? '',\n exitCode: err.exitCode ?? err.code ?? 1,\n };\n }\n },\n async writeFile(path, content) {\n const buf = Buffer.isBuffer(content) ? content : Buffer.from(content);\n const b64 = buf.toString('base64');\n try {\n await sh(`printf '%s' '${b64}' | base64 -d > '${path.replace(/'/g, \"'\\\\''\")}'`);\n } catch (err: any) {\n throw new Error(`writeFile failed (exit ${err.exitCode ?? err.code ?? 1}): ${err.stderr ?? err.message ?? ''}`);\n }\n },\n async readFile(path) {\n try {\n const result = await sh(`cat '${path.replace(/'/g, \"'\\\\''\")}'`);\n return result.stdout ?? '';\n } catch (err: any) {\n throw new Error(`readFile failed (exit ${err.exitCode ?? err.code ?? 1}): ${err.stderr ?? err.message ?? ''}`);\n }\n },\n async stop() {\n await sprite.delete();\n },\n };\n}\n\n/**\n * Returns Sprites-optimized defaults for SecureConfig.\n * Spread into your secureSandbox() call:\n *\n * secureSandbox(sprites(s), { ...spritesDefaults(), ...yourOverrides })\n */\nexport function spritesDefaults(): Partial<SecureConfig> {\n const serverConfig: Omit<ServerConfigOpts, 'watchtower' | 'realPaths' | 'threatFeeds' | 'packageChecks'> = {\n grpc: { addr: '0.0.0.0:50051' },\n logging: { level: 'info', format: 'json', output: 'stdout' },\n sessions: {\n defaultTimeout: '30m',\n idleTimeout: '10m',\n cleanupInterval: '5m',\n },\n audit: { enabled: true, sqlitePath: '/var/lib/agentsh/audit.db' },\n sandboxLimits: { maxMemoryMb: 512, maxCpuPercent: 90, maxProcesses: 100 },\n fuse: { deferred: true },\n networkIntercept: { interceptMode: 'tproxy', proxyListenAddr: '127.0.0.1:8888' },\n seccompDetails: {\n execve: true,\n fileMonitor: { enabled: true, enforceWithoutFuse: true },\n },\n cgroups: { enabled: true },\n unixSockets: { enabled: true },\n proxy: { mode: 'mitm', port: 8080 },\n dlp: {\n mode: 'redact',\n patterns: { credit_card: true, ssn: true, api_key: true },\n },\n approvals: { enabled: false },\n metrics: { enabled: true, path: '/metrics' },\n health: { path: '/healthz', readinessPath: '/readyz' },\n development: { disableAuth: false, verboseErrors: false },\n };\n\n return {\n installStrategy: 'preinstalled',\n realPaths: true,\n serverConfig,\n };\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACIO,SAAS,QAAQ,QAA6B;AAGnD,WAAS,GAAG,KAAa,MAAgC;AACvD,QAAI,KAAM,QAAO,OAAO,SAAS,MAAM,CAAC,MAAM,GAAG,GAAG,IAAI;AACxD,WAAO,OAAO,SAAS,MAAM,CAAC,MAAM,GAAG,CAAC;AAAA,EAC1C;AAEA,SAAO;AAAA,IACL,MAAM,KAAK,KAAK,MAAM,MAAM;AAC1B,YAAM,UAAU,GAAG,UAAU,MAAM,GAAG,CAAC,GAAG,YAAY,KAAK,IAAI,CAAC;AAChE,YAAM,UAAU,MAAM,OAAO,QAAQ,OAAO,KAAK;AAEjD,UAAI;AACF,YAAI,MAAM,UAAU;AAClB,aAAG,SAAS,OAAO,qBAAqB,EAAE,MAAM,MAAM;AAAA,UAAC,CAAC;AACxD,iBAAO,EAAE,QAAQ,IAAI,QAAQ,IAAI,UAAU,EAAE;AAAA,QAC/C;AAEA,cAAM,SAAS,MAAM,GAAG,SAAS,EAAE,KAAK,MAAM,IAAI,CAAC;AACnD,eAAO;AAAA,UACL,QAAQ,OAAO,UAAU;AAAA,UACzB,QAAQ,OAAO,UAAU;AAAA,UACzB,UAAU;AAAA,QACZ;AAAA,MACF,SAAS,KAAU;AACjB,eAAO;AAAA,UACL,QAAQ,IAAI,UAAU;AAAA,UACtB,QAAQ,IAAI,UAAU,IAAI,WAAW;AAAA,UACrC,UAAU,IAAI,YAAY,IAAI,QAAQ;AAAA,QACxC;AAAA,MACF;AAAA,IACF;AAAA,IACA,MAAM,UAAU,MAAM,SAAS;AAC7B,YAAM,MAAM,OAAO,SAAS,OAAO,IAAI,UAAU,OAAO,KAAK,OAAO;AACpE,YAAM,MAAM,IAAI,SAAS,QAAQ;AACjC,UAAI;AACF,cAAM,GAAG,gBAAgB,GAAG,oBAAoB,KAAK,QAAQ,MAAM,OAAO,CAAC,GAAG;AAAA,MAChF,SAAS,KAAU;AACjB,cAAM,IAAI,MAAM,0BAA0B,IAAI,YAAY,IAAI,QAAQ,CAAC,MAAM,IAAI,UAAU,IAAI,WAAW,EAAE,EAAE;AAAA,MAChH;AAAA,IACF;AAAA,IACA,MAAM,SAAS,MAAM;AACnB,UAAI;AACF,cAAM,SAAS,MAAM,GAAG,QAAQ,KAAK,QAAQ,MAAM,OAAO,CAAC,GAAG;AAC9D,eAAO,OAAO,UAAU;AAAA,MAC1B,SAAS,KAAU;AACjB,cAAM,IAAI,MAAM,yBAAyB,IAAI,YAAY,IAAI,QAAQ,CAAC,MAAM,IAAI,UAAU,IAAI,WAAW,EAAE,EAAE;AAAA,MAC/G;AAAA,IACF;AAAA,IACA,MAAM,OAAO;AACX,YAAM,OAAO,OAAO;AAAA,IACtB;AAAA,EACF;AACF;AAQO,SAAS,kBAAyC;AACvD,QAAM,eAAqG;AAAA,IACzG,MAAM,EAAE,MAAM,gBAAgB;AAAA,IAC9B,SAAS,EAAE,OAAO,QAAQ,QAAQ,QAAQ,QAAQ,SAAS;AAAA,IAC3D,UAAU;AAAA,MACR,gBAAgB;AAAA,MAChB,aAAa;AAAA,MACb,iBAAiB;AAAA,IACnB;AAAA,IACA,OAAO,EAAE,SAAS,MAAM,YAAY,4BAA4B;AAAA,IAChE,eAAe,EAAE,aAAa,KAAK,eAAe,IAAI,cAAc,IAAI;AAAA,IACxE,MAAM,EAAE,UAAU,KAAK;AAAA,IACvB,kBAAkB,EAAE,eAAe,UAAU,iBAAiB,iBAAiB;AAAA,IAC/E,gBAAgB;AAAA,MACd,QAAQ;AAAA,MACR,aAAa,EAAE,SAAS,MAAM,oBAAoB,KAAK;AAAA,IACzD;AAAA,IACA,SAAS,EAAE,SAAS,KAAK;AAAA,IACzB,aAAa,EAAE,SAAS,KAAK;AAAA,IAC7B,OAAO,EAAE,MAAM,QAAQ,MAAM,KAAK;AAAA,IAClC,KAAK;AAAA,MACH,MAAM;AAAA,MACN,UAAU,EAAE,aAAa,MAAM,KAAK,MAAM,SAAS,KAAK;AAAA,IAC1D;AAAA,IACA,WAAW,EAAE,SAAS,MAAM;AAAA,IAC5B,SAAS,EAAE,SAAS,MAAM,MAAM,WAAW;AAAA,IAC3C,QAAQ,EAAE,MAAM,YAAY,eAAe,UAAU;AAAA,IACrD,aAAa,EAAE,aAAa,OAAO,eAAe,MAAM;AAAA,EAC1D;AAEA,SAAO;AAAA,IACL,iBAAiB;AAAA,IACjB,WAAW;AAAA,IACX;AAAA,EACF;AACF;","names":[]}
@@ -0,0 +1,28 @@
1
+ import { vercel } from './adapters/vercel.js';
2
+ import { e2b } from './adapters/e2b.js';
3
+ import { daytona } from './adapters/daytona.js';
4
+ import { cloudflare } from './adapters/cloudflare.js';
5
+ import { blaxel } from './adapters/blaxel.js';
6
+ import { S as SandboxAdapter, a as SecureConfig } from './types-S_fIEFHD.js';
7
+
8
+ declare function sprites(sprite: any): SandboxAdapter;
9
+ /**
10
+ * Returns Sprites-optimized defaults for SecureConfig.
11
+ * Spread into your secureSandbox() call:
12
+ *
13
+ * secureSandbox(sprites(s), { ...spritesDefaults(), ...yourOverrides })
14
+ */
15
+ declare function spritesDefaults(): Partial<SecureConfig>;
16
+
17
+ declare const index_blaxel: typeof blaxel;
18
+ declare const index_cloudflare: typeof cloudflare;
19
+ declare const index_daytona: typeof daytona;
20
+ declare const index_e2b: typeof e2b;
21
+ declare const index_sprites: typeof sprites;
22
+ declare const index_spritesDefaults: typeof spritesDefaults;
23
+ declare const index_vercel: typeof vercel;
24
+ declare namespace index {
25
+ export { index_blaxel as blaxel, index_cloudflare as cloudflare, index_daytona as daytona, index_e2b as e2b, index_sprites as sprites, index_spritesDefaults as spritesDefaults, index_vercel as vercel };
26
+ }
27
+
28
+ export { spritesDefaults as a, index as i, sprites as s };
package/dist/index.d.ts CHANGED
@@ -1,8 +1,8 @@
1
- import { S as SandboxAdapter, a as SecureConfig, b as SecuredSandbox, T as ThreatFeedsConfig } from './types-CUqsllMs.js';
2
- export { E as ExecResult, I as InstallStrategy, L as LicenseSpdxMatch, P as PackageChecksConfig, c as PackageMatch, d as PackageRule, e as ProviderConfig, R as ReadFileResult, f as SecurityMode, g as ThreatFeed, W as WriteFileResult } from './types-CUqsllMs.js';
1
+ import { S as SandboxAdapter, a as SecureConfig, b as SecuredSandbox } from './types-S_fIEFHD.js';
2
+ export { E as ExecResult, I as InstallStrategy, L as LicenseSpdxMatch, P as PackageChecksConfig, c as PackageMatch, d as PackageRule, e as ProviderConfig, R as ReadFileResult, f as SecurityMode, T as ThreatFeed, g as ThreatFeedsConfig, W as WriteFileResult, h as defaultThreatFeeds } from './types-S_fIEFHD.js';
3
3
  export { P as PolicyDefinition, i as policies } from './index-Nmlhw9oj.js';
4
4
  import { ZodIssue } from 'zod';
5
- export { i as adapters } from './index-aQ1TVPtG.js';
5
+ export { i as adapters } from './index-D6DG8Lpi.js';
6
6
  import './adapters/vercel.js';
7
7
  import './adapters/e2b.js';
8
8
  import './adapters/daytona.js';
@@ -11,12 +11,6 @@ import './adapters/blaxel.js';
11
11
 
12
12
  declare function secureSandbox(adapter: SandboxAdapter, config?: SecureConfig): Promise<SecuredSandbox>;
13
13
 
14
- /**
15
- * Default threat feeds: URLhaus (malware) + Phishing.Database (phishing).
16
- * Both are free, open source, and updated frequently.
17
- */
18
- declare const defaultThreatFeeds: ThreatFeedsConfig;
19
-
20
14
  declare class AgentSHError extends Error {
21
15
  constructor(message: string);
22
16
  }
@@ -74,4 +68,4 @@ declare class RuntimeError extends AgentSHError {
74
68
  });
75
69
  }
76
70
 
77
- export { AgentSHError, IncompatibleProviderVersionError, IntegrityError, MissingPeerDependencyError, PolicyValidationError, ProvisioningError, RuntimeError, SandboxAdapter, SecureConfig, SecuredSandbox, ThreatFeedsConfig, defaultThreatFeeds, secureSandbox };
71
+ export { AgentSHError, IncompatibleProviderVersionError, IntegrityError, MissingPeerDependencyError, PolicyValidationError, ProvisioningError, RuntimeError, SandboxAdapter, SecureConfig, SecuredSandbox, secureSandbox };
package/dist/index.js CHANGED
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  adapters_exports
3
- } from "./chunk-L4KFLVNU.js";
3
+ } from "./chunk-KXCR2ZML.js";
4
4
  import "./chunk-UYEAO27E.js";
5
5
  import "./chunk-LMN3KM53.js";
6
6
  import "./chunk-45FKFVMC.js";
@@ -135,7 +135,99 @@ function generateServerConfig(opts) {
135
135
  }
136
136
  };
137
137
  if (opts.watchtower) config.watchtower = opts.watchtower;
138
- if (opts.realPaths) config.sessions = { real_paths: true };
138
+ if (opts.grpc) {
139
+ config.server.grpc = { enabled: true, addr: opts.grpc.addr };
140
+ }
141
+ if (opts.serverTimeouts) {
142
+ const http = config.server.http;
143
+ if (opts.serverTimeouts.readTimeout) http.read_timeout = opts.serverTimeouts.readTimeout;
144
+ if (opts.serverTimeouts.writeTimeout) http.write_timeout = opts.serverTimeouts.writeTimeout;
145
+ if (opts.serverTimeouts.maxRequestSize) http.max_request_size = opts.serverTimeouts.maxRequestSize;
146
+ }
147
+ if (opts.logging) config.logging = { ...opts.logging };
148
+ const sessionsObj = {};
149
+ if (opts.realPaths) sessionsObj.real_paths = true;
150
+ if (opts.sessions) {
151
+ if (opts.sessions.baseDir) sessionsObj.base_dir = opts.sessions.baseDir;
152
+ if (opts.sessions.maxSessions !== void 0) sessionsObj.max_sessions = opts.sessions.maxSessions;
153
+ if (opts.sessions.defaultTimeout) sessionsObj.default_timeout = opts.sessions.defaultTimeout;
154
+ if (opts.sessions.idleTimeout) sessionsObj.idle_timeout = opts.sessions.idleTimeout;
155
+ if (opts.sessions.cleanupInterval) sessionsObj.cleanup_interval = opts.sessions.cleanupInterval;
156
+ }
157
+ if (Object.keys(sessionsObj).length > 0) config.sessions = sessionsObj;
158
+ if (opts.audit) {
159
+ const auditObj = {};
160
+ if (opts.audit.enabled !== void 0) auditObj.enabled = opts.audit.enabled;
161
+ if (opts.audit.sqlitePath) auditObj.sqlite_path = opts.audit.sqlitePath;
162
+ config.audit = auditObj;
163
+ }
164
+ if (opts.sandboxLimits) {
165
+ config.sandbox.limits = {
166
+ ...opts.sandboxLimits.maxMemoryMb !== void 0 && { max_memory_mb: opts.sandboxLimits.maxMemoryMb },
167
+ ...opts.sandboxLimits.maxCpuPercent !== void 0 && { max_cpu_percent: opts.sandboxLimits.maxCpuPercent },
168
+ ...opts.sandboxLimits.maxProcesses !== void 0 && { max_processes: opts.sandboxLimits.maxProcesses }
169
+ };
170
+ }
171
+ if (opts.fuse?.deferred !== void 0) {
172
+ config.sandbox.fuse.deferred = opts.fuse.deferred;
173
+ }
174
+ if (opts.networkIntercept) {
175
+ const net = config.sandbox.network;
176
+ if (opts.networkIntercept.interceptMode) net.intercept_mode = opts.networkIntercept.interceptMode;
177
+ if (opts.networkIntercept.proxyListenAddr) net.proxy_listen_addr = opts.networkIntercept.proxyListenAddr;
178
+ }
179
+ if (opts.seccompDetails) {
180
+ const sec = config.sandbox.seccomp;
181
+ if (opts.seccompDetails.execve !== void 0) sec.execve = opts.seccompDetails.execve;
182
+ if (opts.seccompDetails.fileMonitor) {
183
+ sec.file_monitor = {
184
+ ...opts.seccompDetails.fileMonitor.enabled !== void 0 && { enabled: opts.seccompDetails.fileMonitor.enabled },
185
+ ...opts.seccompDetails.fileMonitor.enforceWithoutFuse !== void 0 && { enforce_without_fuse: opts.seccompDetails.fileMonitor.enforceWithoutFuse }
186
+ };
187
+ }
188
+ }
189
+ if (opts.cgroups) {
190
+ config.sandbox.cgroups = { ...opts.cgroups };
191
+ }
192
+ if (opts.unixSockets) {
193
+ config.sandbox.unix_sockets = { ...opts.unixSockets };
194
+ }
195
+ if (opts.proxy) {
196
+ config.proxy = { ...opts.proxy };
197
+ }
198
+ if (opts.dlp) {
199
+ const dlpObj = {};
200
+ if (opts.dlp.mode) dlpObj.mode = opts.dlp.mode;
201
+ if (opts.dlp.patterns) dlpObj.patterns = opts.dlp.patterns;
202
+ if (opts.dlp.customPatterns) {
203
+ dlpObj.custom_patterns = opts.dlp.customPatterns.map((p) => ({
204
+ name: p.name,
205
+ display: p.display,
206
+ regex: p.regex
207
+ }));
208
+ }
209
+ config.dlp = dlpObj;
210
+ }
211
+ if (opts.policiesOverride) {
212
+ config.policies = {
213
+ ...opts.policiesOverride.dir && { dir: opts.policiesOverride.dir },
214
+ ...opts.policiesOverride.defaultPolicy && { default: opts.policiesOverride.defaultPolicy }
215
+ };
216
+ }
217
+ if (opts.approvals) config.approvals = { ...opts.approvals };
218
+ if (opts.metrics) config.metrics = { ...opts.metrics };
219
+ if (opts.health) {
220
+ const healthObj = {};
221
+ if (opts.health.path) healthObj.path = opts.health.path;
222
+ if (opts.health.readinessPath) healthObj.readiness_path = opts.health.readinessPath;
223
+ config.health = healthObj;
224
+ }
225
+ if (opts.development) {
226
+ const devObj = {};
227
+ if (opts.development.disableAuth !== void 0) devObj.disable_auth = opts.development.disableAuth;
228
+ if (opts.development.verboseErrors !== void 0) devObj.verbose_errors = opts.development.verboseErrors;
229
+ config.development = devObj;
230
+ }
139
231
  const feeds = opts.threatFeeds === false ? void 0 : opts.threatFeeds ?? defaultThreatFeeds;
140
232
  if (feeds) {
141
233
  config.threat_feeds = {
@@ -240,7 +332,8 @@ async function provision(adapter, config = {}) {
240
332
  traceParent,
241
333
  policyName = "policy",
242
334
  threatFeeds,
243
- packageChecks
335
+ packageChecks,
336
+ serverConfig: extendedConfig
244
337
  } = config;
245
338
  const policy = rawPolicy ? validatePolicy(rawPolicy) : agentDefault();
246
339
  let securityMode = "full";
@@ -373,7 +466,8 @@ async function provision(adapter, config = {}) {
373
466
  watchtower,
374
467
  realPaths,
375
468
  threatFeeds,
376
- packageChecks
469
+ packageChecks,
470
+ ...extendedConfig
377
471
  });
378
472
  await adapter.writeFile("/etc/agentsh/config.yml", serverConfig, {
379
473
  sudo: true
package/dist/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/core/integrity.ts","../src/core/config.ts","../src/core/traceparent.ts","../src/core/provision.ts","../src/core/runtime.ts","../src/api.ts"],"sourcesContent":["import { IntegrityError } from './errors.js';\n\nexport const PINNED_VERSION = '0.15.0';\n\nexport const CHECKSUMS: Record<string, Record<string, string>> = {\n '0.15.0': {\n linux_amd64:\n '89f7ebbfd75ffd961245ec62b2602fd0cc387740502ac858dbc39c367c5699c5',\n linux_arm64:\n '3fabbd749f9e98fb9f96ddfc94c389a6868cda7ed3668daa8440c39ceec85f3b',\n },\n '0.14.0': {\n linux_amd64:\n '2ab8ba0d6637fe1a5badf840c3db197161a6f9865d721ed216029d229b1b9bbc',\n linux_arm64:\n '929d18dd9fe36e9b2fa830d7ae64b4fb481853e743ade8674fcfcdc73470ed53',\n },\n};\n\n/**\n * Returns the checksum to verify against.\n * If `override` is provided, returns it directly.\n * Otherwise looks up the checksum in the pinned CHECKSUMS map.\n * Throws IntegrityError if no checksum is found.\n */\nexport function getChecksum(\n version: string,\n arch: string,\n override?: string,\n): string {\n if (override) {\n return override;\n }\n\n const versionChecksums = CHECKSUMS[version];\n if (versionChecksums && versionChecksums[arch]) {\n return versionChecksums[arch];\n }\n\n throw new IntegrityError({\n expected: '',\n actual: '',\n message: `No pinned checksum for agentsh v${version}. Provide \\`agentshChecksum\\` explicitly or use \\`skipIntegrityCheck: true\\`.`,\n });\n}\n\n/**\n * Returns an array of shell commands to try for computing SHA-256 checksums.\n * Each command extracts just the hex hash value from the given file.\n */\nexport function buildVerifyCommand(filePath: string): string[] {\n return [\n `sha256sum \"${filePath}\" | awk '{print $1}'`,\n `shasum -a 256 \"${filePath}\" | awk '{print $1}'`,\n `openssl dgst -sha256 \"${filePath}\" | awk '{print $NF}'`,\n ];\n}\n\n/**\n * Returns the download URL for the agentsh binary.\n * If `overrideUrl` is provided, returns it directly.\n * Otherwise returns the default GitHub releases URL.\n */\nexport function binaryUrl(\n version: string,\n arch: string,\n overrideUrl?: string,\n): string {\n if (overrideUrl) {\n return overrideUrl;\n }\n\n return `https://github.com/canyonroad/agentsh/releases/download/v${version}/agentsh_${version}_${arch}.tar.gz`;\n}\n","import yaml from 'js-yaml';\nimport type { ThreatFeedsConfig, PackageChecksConfig, ProviderConfig } from './types.js';\n\nexport interface ServerConfigOpts {\n watchtower?: string;\n realPaths?: boolean;\n threatFeeds?: false | ThreatFeedsConfig;\n packageChecks?: false | PackageChecksConfig;\n}\n\n/**\n * Default threat feeds: URLhaus (malware) + Phishing.Database (phishing).\n * Both are free, open source, and updated frequently.\n */\nexport const defaultThreatFeeds: ThreatFeedsConfig = {\n action: 'deny',\n feeds: [\n {\n name: 'urlhaus',\n url: 'https://urlhaus.abuse.ch/downloads/hostfile/',\n format: 'hostfile',\n refreshInterval: '6h',\n },\n {\n name: 'phishing',\n url: 'https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-ACTIVE.txt',\n format: 'domain-list',\n refreshInterval: '12h',\n },\n ],\n allowlist: [\n 'github.com',\n '*.github.com',\n 'registry.npmjs.org',\n 'registry.yarnpkg.com',\n 'pypi.org',\n 'files.pythonhosted.org',\n 'crates.io',\n 'static.crates.io',\n 'index.crates.io',\n 'proxy.golang.org',\n 'sum.golang.org',\n ],\n};\n\n/**\n * Default package check providers: local, osv, depsdev.\n * All are free and require no API key.\n */\nexport const defaultPackageCheckProviders: Record<string, { enabled: boolean; priority: number }> = {\n local: { enabled: true, priority: 0 },\n osv: { enabled: true, priority: 1 },\n depsdev: { enabled: true, priority: 2 },\n};\n\n/**\n * Convert a camelCase ProviderConfig key to snake_case.\n */\nfunction providerConfigToSnakeCase(config: ProviderConfig): Record<string, unknown> {\n const result: Record<string, unknown> = { enabled: config.enabled ?? true };\n if (config.priority !== undefined) result.priority = config.priority;\n if (config.timeout !== undefined) result.timeout = config.timeout;\n if (config.onFailure !== undefined) result.on_failure = config.onFailure;\n if (config.apiKeyEnv !== undefined) result.api_key_env = config.apiKeyEnv;\n if (config.type !== undefined) result.type = config.type;\n if (config.command !== undefined) result.command = config.command;\n if (config.options !== undefined) result.options = config.options;\n return result;\n}\n\nexport function generateServerConfig(opts: ServerConfigOpts): string {\n const config: Record<string, unknown> = {\n server: {\n http: {\n addr: '127.0.0.1:18080',\n },\n },\n auth: {\n type: 'none',\n },\n policies: {\n system_dir: '/etc/agentsh/system',\n dir: '/etc/agentsh',\n default: 'policy',\n },\n sandbox: {\n enabled: true,\n allow_degraded: true,\n fuse: { enabled: true },\n network: { enabled: true },\n seccomp: { enabled: true },\n },\n };\n if (opts.watchtower) config.watchtower = opts.watchtower;\n if (opts.realPaths) config.sessions = { real_paths: true };\n\n // Threat feeds: enabled by default, opt-out with `threatFeeds: false`\n const feeds = opts.threatFeeds === false ? undefined : (opts.threatFeeds ?? defaultThreatFeeds);\n if (feeds) {\n config.threat_feeds = {\n enabled: true,\n action: feeds.action ?? 'deny',\n feeds: feeds.feeds.map(f => ({\n name: f.name,\n url: f.url,\n format: f.format,\n refresh_interval: f.refreshInterval ?? '6h',\n })),\n ...(feeds.allowlist?.length ? { allowlist: feeds.allowlist } : {}),\n };\n }\n\n // Package checks: disabled by default, opt-in with `packageChecks: {}`\n if (opts.packageChecks) {\n const pc = opts.packageChecks;\n const providers: Record<string, Record<string, unknown>> = {};\n\n // Start with defaults\n for (const [name, def] of Object.entries(defaultPackageCheckProviders)) {\n providers[name] = { ...def };\n }\n\n // Merge user-provided providers\n if (pc.providers) {\n for (const [name, value] of Object.entries(pc.providers)) {\n if (value === false) {\n providers[name] = { enabled: false };\n } else if (value === true) {\n providers[name] = { ...(providers[name] ?? {}), enabled: true };\n } else {\n // ProviderConfig object — merge with existing default if present\n const base = providers[name] ?? {};\n providers[name] = { ...base, ...providerConfigToSnakeCase(value) };\n }\n }\n }\n\n config.package_checks = {\n enabled: true,\n scope: pc.scope ?? 'new_packages_only',\n providers,\n };\n }\n\n return yaml.dump(config, { lineWidth: -1 });\n}\n","/**\n * Read W3C traceparent from the active OpenTelemetry span, if available.\n *\n * Uses dynamic import so @opentelemetry/api is an optional peer dependency.\n * Returns undefined when OTEL is not installed, no span is active, or the\n * trace context is invalid (all-zero trace ID).\n */\nexport async function getTraceparent(): Promise<string | undefined> {\n try {\n const { trace } = await import('@opentelemetry/api');\n const span = trace.getActiveSpan();\n const ctx = span?.spanContext();\n if (!ctx?.traceId || ctx.traceId === '00000000000000000000000000000000') {\n return undefined;\n }\n const flags = (ctx.traceFlags ?? 0).toString(16).padStart(2, '0');\n return `00-${ctx.traceId}-${ctx.spanId}-${flags}`;\n } catch {\n return undefined;\n }\n}\n","import type {\n SandboxAdapter,\n SecureConfig,\n SecurityMode,\n ExecResult,\n} from './types.js';\nimport {\n getChecksum,\n buildVerifyCommand,\n binaryUrl,\n PINNED_VERSION,\n} from './integrity.js';\nimport { generateServerConfig } from './config.js';\nimport { ProvisioningError, IntegrityError } from './errors.js';\nimport { serializePolicy, systemPolicyYaml } from '../policies/serialize.js';\nimport { agentDefault } from '../policies/presets.js';\nimport { validatePolicy } from '../policies/schema.js';\nimport { getTraceparent } from './traceparent.js';\n\n// ─── Security mode ordering (strongest to weakest) ────────────\n\nconst SECURITY_MODE_RANK: Record<SecurityMode, number> = {\n full: 4,\n landlock: 3,\n 'landlock-only': 2,\n minimal: 1,\n};\n\nfunction isWeakerThan(detected: SecurityMode, required: SecurityMode): boolean {\n return SECURITY_MODE_RANK[detected] < SECURITY_MODE_RANK[required];\n}\n\n// ─── Architecture mapping ─────────────────────────────────────\n\nfunction mapArch(uname: string): 'linux_amd64' | 'linux_arm64' {\n const trimmed = uname.trim();\n if (trimmed === 'x86_64') return 'linux_amd64';\n if (trimmed === 'aarch64') return 'linux_arm64';\n throw new ProvisioningError({\n phase: 'install',\n command: 'uname -m',\n stderr: `Unsupported architecture: ${trimmed}`,\n });\n}\n\n// ─── Helper: check if binary exists ───────────────────────────\n\nconst AGENTSH_PATHS = ['/usr/local/bin/agentsh', '/usr/bin/agentsh'];\n\nasync function binaryExists(adapter: SandboxAdapter): Promise<boolean> {\n for (const path of AGENTSH_PATHS) {\n const found = adapter.fileExists\n ? await adapter.fileExists(path)\n : (await adapter.exec('test', ['-f', path])).exitCode === 0;\n if (found) return true;\n }\n return false;\n}\n\n// ─── Helper: sleep ────────────────────────────────────────────\n\nfunction sleep(ms: number): Promise<void> {\n return new Promise((resolve) => setTimeout(resolve, ms));\n}\n\n// ─── Main provisioning function ───────────────────────────────\n\nexport interface ProvisionResult {\n sessionId: string;\n securityMode: SecurityMode;\n /** When true, the shell shim enforces policy — skip agentsh exec wrapper. */\n passthrough?: boolean;\n}\n\nexport async function provision(\n adapter: SandboxAdapter,\n config: SecureConfig = {},\n): Promise<ProvisionResult> {\n const {\n policy: rawPolicy,\n workspace = '/workspace',\n watchtower,\n installStrategy = 'download',\n agentshVersion = PINNED_VERSION,\n agentshArch: archOverride,\n agentshBinaryUrl,\n agentshChecksum,\n skipIntegrityCheck = false,\n minimumSecurityMode,\n realPaths: realPathsOverride,\n traceParent,\n policyName = 'policy',\n threatFeeds,\n packageChecks,\n } = config;\n\n // Resolve and validate policy\n const policy = rawPolicy ? validatePolicy(rawPolicy) : agentDefault();\n\n let securityMode: SecurityMode = 'full';\n\n if (installStrategy === 'running') {\n // agentsh is already fully provisioned and running with the shell shim\n // installed. Commands go through the shim automatically, so we don't\n // create a new session (which would deadlock the server via nested\n // agentsh connections). Instead, read the existing session ID from\n // the environment and use passthrough mode at runtime.\n //\n // Skip detectSecurityMode() — running `agentsh detect` inside a sandbox\n // where the shell shim is already installed would route the command\n // through agentsh's exec API, causing the server to try binding port\n // 18080 again (\"address already in use\"). Default to 'full' since\n // pre-provisioned environments typically have full capabilities.\n await healthCheck(adapter);\n\n securityMode = config.securityMode ?? 'full';\n\n if (minimumSecurityMode && isWeakerThan(securityMode, minimumSecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'securityMode check',\n stderr: `Security mode '${securityMode}' is weaker than required '${minimumSecurityMode}'`,\n });\n }\n\n // Read the existing session ID from config or from the environment\n let sessionId = config.sessionId;\n if (!sessionId) {\n const envResult = await adapter.exec('sh', ['-c', 'echo $AGENTSH_SESSION_ID']);\n sessionId = envResult.stdout.trim();\n }\n if (!sessionId) {\n throw new ProvisioningError({\n phase: 'session',\n command: 'echo $AGENTSH_SESSION_ID',\n stderr: 'AGENTSH_SESSION_ID not set — running strategy requires a pre-created session',\n });\n }\n\n return { sessionId, securityMode, passthrough: true };\n }\n\n // ─── Phase 1: Binary Installation ───────────────────────────\n\n // Step 1: Check if binary exists\n const exists = await binaryExists(adapter);\n\n if (installStrategy === 'preinstalled') {\n if (!exists) {\n throw new ProvisioningError({\n phase: 'install',\n command: AGENTSH_PATHS.map(p => `test -f ${p}`).join(' || '),\n stderr: 'Binary not found but installStrategy is preinstalled',\n });\n }\n // Binary exists and strategy is preinstalled, skip to detect\n } else if (installStrategy === 'download' || installStrategy === 'upload') {\n // If binary already exists, skip installation but still detect\n if (!exists) {\n // Step 2: Detect architecture\n const arch =\n archOverride ?? await detectArch(adapter);\n\n if (installStrategy === 'download') {\n // Step 3a: Download\n await downloadBinary(adapter, agentshVersion, arch, agentshBinaryUrl);\n } else {\n // Step 3b: Upload\n await uploadBinary(adapter, agentshVersion, arch, agentshBinaryUrl);\n }\n\n // Step 4: Verify checksum\n if (!skipIntegrityCheck) {\n await verifyChecksum(\n adapter,\n agentshVersion,\n arch,\n agentshChecksum,\n '/tmp/agentsh.tar.gz',\n );\n }\n\n // Step 5: Install binaries (agentsh + agentsh-shell-shim + agentsh-unixwrap)\n const binaries = [\n { src: '/tmp/agentsh', dest: '/usr/local/bin/agentsh' },\n { src: '/tmp/agentsh-shell-shim', dest: '/usr/bin/agentsh-shell-shim' },\n { src: '/tmp/agentsh-unixwrap', dest: '/usr/local/bin/agentsh-unixwrap' },\n ];\n for (const { src, dest } of binaries) {\n const installResult = await adapter.exec(\n 'install',\n ['-m', '0755', src, dest],\n { sudo: true },\n );\n if (installResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: `install -m 0755 ${src} ${dest}`,\n stderr: installResult.stderr,\n });\n }\n }\n }\n }\n\n // Step 5b: Detect security mode\n securityMode = await detectSecurityMode(adapter);\n\n // Check minimum security mode\n if (minimumSecurityMode && isWeakerThan(securityMode, minimumSecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --json',\n stderr: `Detected security mode '${securityMode}' is weaker than required '${minimumSecurityMode}'`,\n });\n }\n\n // Auto-enable realPaths when FUSE is available (full or landlock modes),\n // unless the user explicitly set it.\n const hasFuse = securityMode === 'full' || securityMode === 'landlock';\n const realPaths = realPathsOverride ?? hasFuse;\n\n // Step 6: Install shell shim\n const shimResult = await adapter.exec(\n 'agentsh',\n [\n 'shim', 'install-shell',\n '--root', '/',\n '--shim', '/usr/bin/agentsh-shell-shim',\n '--bash',\n '--i-understand-this-modifies-the-host',\n ],\n { sudo: true },\n );\n if (shimResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh shim install-shell',\n stderr: shimResult.stderr,\n });\n }\n\n // ─── Phase 2: Policy & Config ───────────────────────────────\n\n // Step 7: Create dirs and make writable for file writes\n const mkdirResult = await adapter.exec(\n 'mkdir',\n ['-p', '/etc/agentsh/system'],\n { sudo: true },\n );\n if (mkdirResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'mkdir -p /etc/agentsh/system',\n stderr: mkdirResult.stderr,\n });\n }\n\n // Temporarily make writable so adapter.writeFile (which may not support sudo) can write\n await adapter.exec('chmod', ['-R', '777', '/etc/agentsh/'], { sudo: true });\n\n await adapter.writeFile(\n '/etc/agentsh/system/policy.yml',\n systemPolicyYaml(),\n { sudo: true },\n );\n\n // Step 8: Write user policy\n await adapter.writeFile(\n '/etc/agentsh/policy.yml',\n serializePolicy(policy),\n { sudo: true },\n );\n\n // Step 9: Write server config\n const serverConfig = generateServerConfig({\n watchtower,\n realPaths,\n threatFeeds,\n packageChecks,\n });\n\n await adapter.writeFile('/etc/agentsh/config.yml', serverConfig, {\n sudo: true,\n });\n\n // Step 10: Set permissions\n const chmodDirResult = await adapter.exec(\n 'find',\n ['/etc/agentsh', '-type', 'd', '-exec', 'chmod', '555', '{}', '+'],\n { sudo: true },\n );\n if (chmodDirResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'find /etc/agentsh -type d -exec chmod 555 {} +',\n stderr: chmodDirResult.stderr,\n });\n }\n\n const chmodFileResult = await adapter.exec(\n 'find',\n ['/etc/agentsh', '-type', 'f', '-exec', 'chmod', '444', '{}', '+'],\n { sudo: true },\n );\n if (chmodFileResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'find /etc/agentsh -type f -exec chmod 444 {} +',\n stderr: chmodFileResult.stderr,\n });\n }\n\n const chownResult = await adapter.exec(\n 'chown',\n ['-R', 'root:root', '/etc/agentsh/'],\n { sudo: true },\n );\n if (chownResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'chown -R root:root /etc/agentsh/',\n stderr: chownResult.stderr,\n });\n }\n\n // ─── Phase 3: Server Startup ────────────────────────────────\n\n // Step 10b: Ensure workspace directory exists\n await adapter.exec('mkdir', ['-p', workspace], { sudo: true });\n\n // Step 11: Start server\n const serverResult = await adapter.exec(\n 'agentsh',\n ['server', '--config', '/etc/agentsh/config.yml'],\n { detached: true, sudo: true },\n );\n if (serverResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'startup',\n command: 'agentsh server --config /etc/agentsh/config.yml',\n stderr: serverResult.stderr,\n });\n }\n\n // Step 12: Health check\n await healthCheck(adapter);\n\n // Step 13: Create session\n const sessionResult = await adapter.exec('agentsh', [\n 'session',\n 'create',\n '--workspace',\n workspace,\n '--policy',\n 'policy',\n ]);\n if (sessionResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'session',\n command: 'agentsh session create',\n stderr: sessionResult.stderr,\n });\n }\n\n let sessionId: string;\n try {\n const sessionData = JSON.parse(sessionResult.stdout);\n sessionId = sessionData.session_id;\n } catch {\n // Fallback: parse text output like \"Session session-xxx started\"\n const match = sessionResult.stdout.match(/Session\\s+(session-[^\\s]+)/);\n if (match) {\n sessionId = match[1];\n } else {\n throw new ProvisioningError({\n phase: 'session',\n command: 'agentsh session create',\n stderr: `Failed to parse session output: ${sessionResult.stdout}`,\n });\n }\n }\n\n // Step 13b: Set trace context if traceParent is provided or OTEL span is active\n const effectiveTraceParent = traceParent ?? (await getTraceparent());\n if (effectiveTraceParent) {\n await adapter.exec('curl', [\n '-X',\n 'PUT',\n `http://127.0.0.1:18080/sessions/${sessionId}/trace-context`,\n '-H',\n 'Content-Type: application/json',\n '-d',\n JSON.stringify({ traceparent: effectiveTraceParent }),\n ]);\n }\n\n // ─── Phase 4: Handoff ───────────────────────────────────────\n\n // Step 14: Return result\n return { sessionId, securityMode };\n}\n\n// ─── Phase 1 helpers ──────────────────────────────────────────\n\nasync function detectArch(\n adapter: SandboxAdapter,\n): Promise<'linux_amd64' | 'linux_arm64'> {\n const result = await adapter.exec('uname', ['-m']);\n if (result.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'uname -m',\n stderr: result.stderr,\n });\n }\n return mapArch(result.stdout);\n}\n\nasync function downloadBinary(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n overrideUrl?: string,\n): Promise<void> {\n const url = binaryUrl(version, arch, overrideUrl);\n\n // Try curl first\n const curlResult = await adapter.exec('curl', [\n '-fsSL',\n url,\n '-o',\n '/tmp/agentsh.tar.gz',\n ]);\n\n if (curlResult.exitCode !== 0) {\n // Fallback to wget (may not be available on all platforms)\n let wgetResult: ExecResult;\n try {\n wgetResult = await adapter.exec('wget', [\n '-q',\n url,\n '-O',\n '/tmp/agentsh.tar.gz',\n ]);\n } catch {\n throw new ProvisioningError({\n phase: 'install',\n command: `curl -fsSL ${url} -o /tmp/agentsh.tar.gz`,\n stderr: curlResult.stderr || 'Download failed (curl failed, wget not available)',\n });\n }\n if (wgetResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: `wget -q ${url} -O /tmp/agentsh.tar.gz`,\n stderr: wgetResult.stderr,\n });\n }\n }\n\n // Extract\n const tarResult = await adapter.exec('tar', [\n 'xz',\n '-C',\n '/tmp/',\n '-f',\n '/tmp/agentsh.tar.gz',\n ]);\n if (tarResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'tar xz -C /tmp/ -f /tmp/agentsh.tar.gz',\n stderr: tarResult.stderr,\n });\n }\n}\n\nasync function uploadBinary(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n overrideUrl?: string,\n): Promise<void> {\n const url = binaryUrl(version, arch, overrideUrl);\n\n // Download on host side using fetch (Node 18+)\n const response = await fetch(url);\n if (!response.ok) {\n throw new ProvisioningError({\n phase: 'install',\n command: `fetch ${url}`,\n stderr: `HTTP ${response.status}: ${response.statusText}`,\n });\n }\n\n const buffer = Buffer.from(await response.arrayBuffer());\n\n // Upload tarball to sandbox and extract\n await adapter.writeFile('/tmp/agentsh.tar.gz', buffer);\n const tarResult = await adapter.exec('tar', [\n 'xz',\n '-C',\n '/tmp/',\n '-f',\n '/tmp/agentsh.tar.gz',\n ]);\n if (tarResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'tar xz -C /tmp/ -f /tmp/agentsh.tar.gz',\n stderr: tarResult.stderr,\n });\n }\n}\n\nasync function verifyChecksum(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n checksumOverride: string | undefined,\n filePath: string,\n): Promise<void> {\n const expected = getChecksum(version, arch, checksumOverride);\n const commands = buildVerifyCommand(filePath);\n\n let actual: string | undefined;\n\n for (const cmd of commands) {\n const result = await adapter.exec('sh', ['-c', cmd]);\n if (result.exitCode === 0 && result.stdout.trim()) {\n actual = result.stdout.trim();\n break;\n }\n }\n\n if (actual === undefined) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'sha256sum / shasum / openssl',\n stderr: 'No checksum tool available in sandbox',\n });\n }\n\n if (actual !== expected) {\n throw new IntegrityError({\n expected,\n actual,\n message: `Checksum mismatch: expected ${expected}, got ${actual}`,\n });\n }\n}\n\nasync function detectSecurityMode(\n adapter: SandboxAdapter,\n): Promise<SecurityMode> {\n const result = await adapter.exec('agentsh', ['detect', '--output', 'json']);\n if (result.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: result.stderr,\n });\n }\n\n // agentsh detect outputs JSON to stderr\n const jsonOutput = result.stderr || result.stdout;\n let parsed: { security_mode: string };\n try {\n parsed = JSON.parse(jsonOutput);\n } catch {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: `Failed to parse detect JSON: ${jsonOutput.slice(0, 200)}`,\n });\n }\n\n const mode = parsed.security_mode;\n const validModes: SecurityMode[] = ['full', 'landlock', 'landlock-only', 'minimal'];\n if (!validModes.includes(mode as SecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: `Unknown security mode: '${mode}'`,\n });\n }\n return mode as SecurityMode;\n}\n\nasync function healthCheck(adapter: SandboxAdapter): Promise<void> {\n const maxRetries = 10;\n const delayMs = 500;\n\n for (let i = 0; i < maxRetries; i++) {\n const result = await adapter.exec('curl', [\n '-sf',\n 'http://127.0.0.1:18080/health',\n ]);\n if (result.exitCode === 0) {\n return;\n }\n if (i < maxRetries - 1) {\n await sleep(delayMs);\n }\n }\n\n throw new ProvisioningError({\n phase: 'startup',\n command: 'curl http://127.0.0.1:18080/health',\n stderr: 'Health check failed after 10 attempts',\n });\n}\n","import type {\n SandboxAdapter,\n SecuredSandbox,\n SecurityMode,\n ExecResult,\n} from './types.js';\nimport { RuntimeError } from './errors.js';\nimport { getTraceparent } from './traceparent.js';\n\n/** Build env object with TRACEPARENT if an OTEL span is active. */\nasync function traceEnv(): Promise<Record<string, string> | undefined> {\n const tp = await getTraceparent();\n return tp ? { TRACEPARENT: tp } : undefined;\n}\n\n/** Parse the JSON envelope from `agentsh exec --output json`. */\nfunction parseExecJson(raw: ExecResult): ExecResult {\n try {\n const json = JSON.parse(raw.stdout);\n const result = json.result ?? {};\n return {\n exitCode: result.exit_code ?? raw.exitCode,\n stdout: result.stdout ?? '',\n stderr: result.stderr ?? result.error?.message ?? '',\n };\n } catch {\n // If not valid JSON, return as-is (e.g. mock adapters)\n return raw;\n }\n}\n\nexport function createSecuredSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n options?: { passthrough?: boolean },\n): SecuredSandbox {\n if (options?.passthrough) {\n return createPassthroughSandbox(adapter, sessionId, securityMode);\n }\n return createAgentshSandbox(adapter, sessionId, securityMode);\n}\n\n/**\n * Passthrough mode: the shell shim enforces policy on every command,\n * so we run commands directly through the adapter without wrapping\n * them in `agentsh exec`. Used with the 'running' install strategy.\n */\nfunction createPassthroughSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n): SecuredSandbox {\n return {\n sessionId,\n securityMode,\n\n async exec(command, opts) {\n const result = await adapter.exec('bash', ['-c', command], {\n cwd: opts?.cwd,\n });\n return result;\n },\n\n async writeFile(path, content) {\n const b64 = Buffer.from(content, 'utf-8').toString('base64');\n const result = await adapter.exec('sh', [\n '-c',\n 'printf \"%s\" \"$1\" | base64 -d > \"$2\"',\n '_',\n b64,\n path,\n ]);\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'writeFile failed',\n };\n }\n return { success: true as const, path };\n },\n\n async readFile(path) {\n const result = await adapter.exec('cat', [path]);\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'readFile failed',\n };\n }\n return { success: true as const, path, content: result.stdout };\n },\n\n async stop() {\n await adapter.stop?.();\n },\n };\n}\n\n/** Standard mode: wraps commands in `agentsh exec` for policy enforcement. */\nfunction createAgentshSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n): SecuredSandbox {\n return {\n sessionId,\n securityMode,\n\n async exec(command, opts) {\n const args = [\n 'exec',\n '--output',\n 'json',\n sessionId,\n '--',\n 'bash',\n '-c',\n command,\n ];\n const env = await traceEnv();\n const execOpts = { cwd: opts?.cwd, env };\n const result = await adapter.exec('agentsh', args, execOpts);\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command,\n stderr: result.stderr,\n });\n }\n return parseExecJson(result);\n },\n\n async writeFile(path, content) {\n const b64 = Buffer.from(content, 'utf-8').toString('base64');\n const args = [\n 'exec',\n sessionId,\n '--',\n 'sh',\n '-c',\n 'printf \"%s\" \"$1\" | base64 -d > \"$2\"',\n '_',\n b64,\n path,\n ];\n const env = await traceEnv();\n const result = await adapter.exec('agentsh', args, { env });\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command: `writeFile ${path}`,\n stderr: result.stderr,\n });\n }\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'writeFile failed',\n };\n }\n return { success: true as const, path };\n },\n\n async readFile(path) {\n const args = ['exec', sessionId, '--', 'cat', path];\n const env = await traceEnv();\n const result = await adapter.exec('agentsh', args, { env });\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command: `readFile ${path}`,\n stderr: result.stderr,\n });\n }\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'readFile failed',\n };\n }\n return { success: true as const, path, content: result.stdout };\n },\n\n async stop() {\n await adapter.stop?.();\n },\n };\n}\n\nfunction isTransportFailure(result: ExecResult): boolean {\n return result.exitCode === 127 && result.stderr.includes('agentsh');\n}\n","import type {\n SandboxAdapter,\n SecuredSandbox,\n SecureConfig,\n} from './core/types.js';\nimport { provision } from './core/provision.js';\nimport { createSecuredSandbox } from './core/runtime.js';\n\nexport async function secureSandbox(\n adapter: SandboxAdapter,\n config?: SecureConfig,\n): Promise<SecuredSandbox> {\n const resolvedConfig = config ?? {};\n const { sessionId, securityMode, passthrough } = await provision(adapter, {\n workspace: '/workspace',\n ...resolvedConfig,\n });\n return createSecuredSandbox(adapter, sessionId, securityMode, { passthrough });\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAEO,IAAM,iBAAiB;AAEvB,IAAM,YAAoD;AAAA,EAC/D,UAAU;AAAA,IACR,aACE;AAAA,IACF,aACE;AAAA,EACJ;AAAA,EACA,UAAU;AAAA,IACR,aACE;AAAA,IACF,aACE;AAAA,EACJ;AACF;AAQO,SAAS,YACd,SACA,MACA,UACQ;AACR,MAAI,UAAU;AACZ,WAAO;AAAA,EACT;AAEA,QAAM,mBAAmB,UAAU,OAAO;AAC1C,MAAI,oBAAoB,iBAAiB,IAAI,GAAG;AAC9C,WAAO,iBAAiB,IAAI;AAAA,EAC9B;AAEA,QAAM,IAAI,eAAe;AAAA,IACvB,UAAU;AAAA,IACV,QAAQ;AAAA,IACR,SAAS,mCAAmC,OAAO;AAAA,EACrD,CAAC;AACH;AAMO,SAAS,mBAAmB,UAA4B;AAC7D,SAAO;AAAA,IACL,cAAc,QAAQ;AAAA,IACtB,kBAAkB,QAAQ;AAAA,IAC1B,yBAAyB,QAAQ;AAAA,EACnC;AACF;AAOO,SAAS,UACd,SACA,MACA,aACQ;AACR,MAAI,aAAa;AACf,WAAO;AAAA,EACT;AAEA,SAAO,4DAA4D,OAAO,YAAY,OAAO,IAAI,IAAI;AACvG;;;ACzEA,OAAO,UAAU;AAcV,IAAM,qBAAwC;AAAA,EACnD,QAAQ;AAAA,EACR,OAAO;AAAA,IACL;AAAA,MACE,MAAM;AAAA,MACN,KAAK;AAAA,MACL,QAAQ;AAAA,MACR,iBAAiB;AAAA,IACnB;AAAA,IACA;AAAA,MACE,MAAM;AAAA,MACN,KAAK;AAAA,MACL,QAAQ;AAAA,MACR,iBAAiB;AAAA,IACnB;AAAA,EACF;AAAA,EACA,WAAW;AAAA,IACT;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAMO,IAAM,+BAAuF;AAAA,EAClG,OAAO,EAAE,SAAS,MAAM,UAAU,EAAE;AAAA,EACpC,KAAK,EAAE,SAAS,MAAM,UAAU,EAAE;AAAA,EAClC,SAAS,EAAE,SAAS,MAAM,UAAU,EAAE;AACxC;AAKA,SAAS,0BAA0B,QAAiD;AAClF,QAAM,SAAkC,EAAE,SAAS,OAAO,WAAW,KAAK;AAC1E,MAAI,OAAO,aAAa,OAAW,QAAO,WAAW,OAAO;AAC5D,MAAI,OAAO,YAAY,OAAW,QAAO,UAAU,OAAO;AAC1D,MAAI,OAAO,cAAc,OAAW,QAAO,aAAa,OAAO;AAC/D,MAAI,OAAO,cAAc,OAAW,QAAO,cAAc,OAAO;AAChE,MAAI,OAAO,SAAS,OAAW,QAAO,OAAO,OAAO;AACpD,MAAI,OAAO,YAAY,OAAW,QAAO,UAAU,OAAO;AAC1D,MAAI,OAAO,YAAY,OAAW,QAAO,UAAU,OAAO;AAC1D,SAAO;AACT;AAEO,SAAS,qBAAqB,MAAgC;AACnE,QAAM,SAAkC;AAAA,IACtC,QAAQ;AAAA,MACN,MAAM;AAAA,QACJ,MAAM;AAAA,MACR;AAAA,IACF;AAAA,IACA,MAAM;AAAA,MACJ,MAAM;AAAA,IACR;AAAA,IACA,UAAU;AAAA,MACR,YAAY;AAAA,MACZ,KAAK;AAAA,MACL,SAAS;AAAA,IACX;AAAA,IACA,SAAS;AAAA,MACP,SAAS;AAAA,MACT,gBAAgB;AAAA,MAChB,MAAM,EAAE,SAAS,KAAK;AAAA,MACtB,SAAS,EAAE,SAAS,KAAK;AAAA,MACzB,SAAS,EAAE,SAAS,KAAK;AAAA,IAC3B;AAAA,EACF;AACA,MAAI,KAAK,WAAY,QAAO,aAAa,KAAK;AAC9C,MAAI,KAAK,UAAW,QAAO,WAAW,EAAE,YAAY,KAAK;AAGzD,QAAM,QAAQ,KAAK,gBAAgB,QAAQ,SAAa,KAAK,eAAe;AAC5E,MAAI,OAAO;AACT,WAAO,eAAe;AAAA,MACpB,SAAS;AAAA,MACT,QAAQ,MAAM,UAAU;AAAA,MACxB,OAAO,MAAM,MAAM,IAAI,QAAM;AAAA,QAC3B,MAAM,EAAE;AAAA,QACR,KAAK,EAAE;AAAA,QACP,QAAQ,EAAE;AAAA,QACV,kBAAkB,EAAE,mBAAmB;AAAA,MACzC,EAAE;AAAA,MACF,GAAI,MAAM,WAAW,SAAS,EAAE,WAAW,MAAM,UAAU,IAAI,CAAC;AAAA,IAClE;AAAA,EACF;AAGA,MAAI,KAAK,eAAe;AACtB,UAAM,KAAK,KAAK;AAChB,UAAM,YAAqD,CAAC;AAG5D,eAAW,CAAC,MAAM,GAAG,KAAK,OAAO,QAAQ,4BAA4B,GAAG;AACtE,gBAAU,IAAI,IAAI,EAAE,GAAG,IAAI;AAAA,IAC7B;AAGA,QAAI,GAAG,WAAW;AAChB,iBAAW,CAAC,MAAM,KAAK,KAAK,OAAO,QAAQ,GAAG,SAAS,GAAG;AACxD,YAAI,UAAU,OAAO;AACnB,oBAAU,IAAI,IAAI,EAAE,SAAS,MAAM;AAAA,QACrC,WAAW,UAAU,MAAM;AACzB,oBAAU,IAAI,IAAI,EAAE,GAAI,UAAU,IAAI,KAAK,CAAC,GAAI,SAAS,KAAK;AAAA,QAChE,OAAO;AAEL,gBAAM,OAAO,UAAU,IAAI,KAAK,CAAC;AACjC,oBAAU,IAAI,IAAI,EAAE,GAAG,MAAM,GAAG,0BAA0B,KAAK,EAAE;AAAA,QACnE;AAAA,MACF;AAAA,IACF;AAEA,WAAO,iBAAiB;AAAA,MACtB,SAAS;AAAA,MACT,OAAO,GAAG,SAAS;AAAA,MACnB;AAAA,IACF;AAAA,EACF;AAEA,SAAO,KAAK,KAAK,QAAQ,EAAE,WAAW,GAAG,CAAC;AAC5C;;;AC1IA,eAAsB,iBAA8C;AAClE,MAAI;AACF,UAAM,EAAE,MAAM,IAAI,MAAM,OAAO,mBAAoB;AACnD,UAAM,OAAO,MAAM,cAAc;AACjC,UAAM,MAAM,MAAM,YAAY;AAC9B,QAAI,CAAC,KAAK,WAAW,IAAI,YAAY,oCAAoC;AACvE,aAAO;AAAA,IACT;AACA,UAAM,SAAS,IAAI,cAAc,GAAG,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG;AAChE,WAAO,MAAM,IAAI,OAAO,IAAI,IAAI,MAAM,IAAI,KAAK;AAAA,EACjD,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACCA,IAAM,qBAAmD;AAAA,EACvD,MAAM;AAAA,EACN,UAAU;AAAA,EACV,iBAAiB;AAAA,EACjB,SAAS;AACX;AAEA,SAAS,aAAa,UAAwB,UAAiC;AAC7E,SAAO,mBAAmB,QAAQ,IAAI,mBAAmB,QAAQ;AACnE;AAIA,SAAS,QAAQ,OAA8C;AAC7D,QAAM,UAAU,MAAM,KAAK;AAC3B,MAAI,YAAY,SAAU,QAAO;AACjC,MAAI,YAAY,UAAW,QAAO;AAClC,QAAM,IAAI,kBAAkB;AAAA,IAC1B,OAAO;AAAA,IACP,SAAS;AAAA,IACT,QAAQ,6BAA6B,OAAO;AAAA,EAC9C,CAAC;AACH;AAIA,IAAM,gBAAgB,CAAC,0BAA0B,kBAAkB;AAEnE,eAAe,aAAa,SAA2C;AACrE,aAAW,QAAQ,eAAe;AAChC,UAAM,QAAQ,QAAQ,aAClB,MAAM,QAAQ,WAAW,IAAI,KAC5B,MAAM,QAAQ,KAAK,QAAQ,CAAC,MAAM,IAAI,CAAC,GAAG,aAAa;AAC5D,QAAI,MAAO,QAAO;AAAA,EACpB;AACA,SAAO;AACT;AAIA,SAAS,MAAM,IAA2B;AACxC,SAAO,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,EAAE,CAAC;AACzD;AAWA,eAAsB,UACpB,SACA,SAAuB,CAAC,GACE;AAC1B,QAAM;AAAA,IACJ,QAAQ;AAAA,IACR,YAAY;AAAA,IACZ;AAAA,IACA,kBAAkB;AAAA,IAClB,iBAAiB;AAAA,IACjB,aAAa;AAAA,IACb;AAAA,IACA;AAAA,IACA,qBAAqB;AAAA,IACrB;AAAA,IACA,WAAW;AAAA,IACX;AAAA,IACA,aAAa;AAAA,IACb;AAAA,IACA;AAAA,EACF,IAAI;AAGJ,QAAM,SAAS,YAAY,eAAe,SAAS,IAAI,aAAa;AAEpE,MAAI,eAA6B;AAEjC,MAAI,oBAAoB,WAAW;AAYjC,UAAM,YAAY,OAAO;AAEzB,mBAAe,OAAO,gBAAgB;AAEtC,QAAI,uBAAuB,aAAa,cAAc,mBAAmB,GAAG;AAC1E,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ,kBAAkB,YAAY,8BAA8B,mBAAmB;AAAA,MACzF,CAAC;AAAA,IACH;AAGA,QAAIA,aAAY,OAAO;AACvB,QAAI,CAACA,YAAW;AACd,YAAM,YAAY,MAAM,QAAQ,KAAK,MAAM,CAAC,MAAM,0BAA0B,CAAC;AAC7E,MAAAA,aAAY,UAAU,OAAO,KAAK;AAAA,IACpC;AACA,QAAI,CAACA,YAAW;AACd,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAEA,WAAO,EAAE,WAAAA,YAAW,cAAc,aAAa,KAAK;AAAA,EACtD;AAKA,QAAM,SAAS,MAAM,aAAa,OAAO;AAEzC,MAAI,oBAAoB,gBAAgB;AACtC,QAAI,CAAC,QAAQ;AACX,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,cAAc,IAAI,OAAK,WAAW,CAAC,EAAE,EAAE,KAAK,MAAM;AAAA,QAC3D,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAAA,EAEF,WAAW,oBAAoB,cAAc,oBAAoB,UAAU;AAEzE,QAAI,CAAC,QAAQ;AAEX,YAAM,OACJ,gBAAgB,MAAM,WAAW,OAAO;AAE1C,UAAI,oBAAoB,YAAY;AAElC,cAAM,eAAe,SAAS,gBAAgB,MAAM,gBAAgB;AAAA,MACtE,OAAO;AAEL,cAAM,aAAa,SAAS,gBAAgB,MAAM,gBAAgB;AAAA,MACpE;AAGA,UAAI,CAAC,oBAAoB;AACvB,cAAM;AAAA,UACJ;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF;AAAA,MACF;AAGA,YAAM,WAAW;AAAA,QACf,EAAE,KAAK,gBAAgB,MAAM,yBAAyB;AAAA,QACtD,EAAE,KAAK,2BAA2B,MAAM,8BAA8B;AAAA,QACtE,EAAE,KAAK,yBAAyB,MAAM,kCAAkC;AAAA,MAC1E;AACA,iBAAW,EAAE,KAAK,KAAK,KAAK,UAAU;AACpC,cAAM,gBAAgB,MAAM,QAAQ;AAAA,UAClC;AAAA,UACA,CAAC,MAAM,QAAQ,KAAK,IAAI;AAAA,UACxB,EAAE,MAAM,KAAK;AAAA,QACf;AACA,YAAI,cAAc,aAAa,GAAG;AAChC,gBAAM,IAAI,kBAAkB;AAAA,YAC1B,OAAO;AAAA,YACP,SAAS,mBAAmB,GAAG,IAAI,IAAI;AAAA,YACvC,QAAQ,cAAc;AAAA,UACxB,CAAC;AAAA,QACH;AAAA,MACF;AAAA,IACF;AAAA,EACF;AAGA,iBAAe,MAAM,mBAAmB,OAAO;AAG/C,MAAI,uBAAuB,aAAa,cAAc,mBAAmB,GAAG;AAC1E,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,2BAA2B,YAAY,8BAA8B,mBAAmB;AAAA,IAClG,CAAC;AAAA,EACH;AAIA,QAAM,UAAU,iBAAiB,UAAU,iBAAiB;AAC5D,QAAM,YAAY,qBAAqB;AAGvC,QAAM,aAAa,MAAM,QAAQ;AAAA,IAC/B;AAAA,IACA;AAAA,MACE;AAAA,MAAQ;AAAA,MACR;AAAA,MAAU;AAAA,MACV;AAAA,MAAU;AAAA,MACV;AAAA,MACA;AAAA,IACF;AAAA,IACA,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,WAAW,aAAa,GAAG;AAC7B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,WAAW;AAAA,IACrB,CAAC;AAAA,EACH;AAKA,QAAM,cAAc,MAAM,QAAQ;AAAA,IAChC;AAAA,IACA,CAAC,MAAM,qBAAqB;AAAA,IAC5B,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,YAAY,aAAa,GAAG;AAC9B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,YAAY;AAAA,IACtB,CAAC;AAAA,EACH;AAGA,QAAM,QAAQ,KAAK,SAAS,CAAC,MAAM,OAAO,eAAe,GAAG,EAAE,MAAM,KAAK,CAAC;AAE1E,QAAM,QAAQ;AAAA,IACZ;AAAA,IACA,iBAAiB;AAAA,IACjB,EAAE,MAAM,KAAK;AAAA,EACf;AAGA,QAAM,QAAQ;AAAA,IACZ;AAAA,IACA,gBAAgB,MAAM;AAAA,IACtB,EAAE,MAAM,KAAK;AAAA,EACf;AAGA,QAAM,eAAe,qBAAqB;AAAA,IACxC;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AAED,QAAM,QAAQ,UAAU,2BAA2B,cAAc;AAAA,IAC/D,MAAM;AAAA,EACR,CAAC;AAGD,QAAM,iBAAiB,MAAM,QAAQ;AAAA,IACnC;AAAA,IACA,CAAC,gBAAgB,SAAS,KAAK,SAAS,SAAS,OAAO,MAAM,GAAG;AAAA,IACjE,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,eAAe,aAAa,GAAG;AACjC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,eAAe;AAAA,IACzB,CAAC;AAAA,EACH;AAEA,QAAM,kBAAkB,MAAM,QAAQ;AAAA,IACpC;AAAA,IACA,CAAC,gBAAgB,SAAS,KAAK,SAAS,SAAS,OAAO,MAAM,GAAG;AAAA,IACjE,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,gBAAgB,aAAa,GAAG;AAClC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,gBAAgB;AAAA,IAC1B,CAAC;AAAA,EACH;AAEA,QAAM,cAAc,MAAM,QAAQ;AAAA,IAChC;AAAA,IACA,CAAC,MAAM,aAAa,eAAe;AAAA,IACnC,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,YAAY,aAAa,GAAG;AAC9B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,YAAY;AAAA,IACtB,CAAC;AAAA,EACH;AAKA,QAAM,QAAQ,KAAK,SAAS,CAAC,MAAM,SAAS,GAAG,EAAE,MAAM,KAAK,CAAC;AAG7D,QAAM,eAAe,MAAM,QAAQ;AAAA,IACjC;AAAA,IACA,CAAC,UAAU,YAAY,yBAAyB;AAAA,IAChD,EAAE,UAAU,MAAM,MAAM,KAAK;AAAA,EAC/B;AACA,MAAI,aAAa,aAAa,GAAG;AAC/B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,aAAa;AAAA,IACvB,CAAC;AAAA,EACH;AAGA,QAAM,YAAY,OAAO;AAGzB,QAAM,gBAAgB,MAAM,QAAQ,KAAK,WAAW;AAAA,IAClD;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,cAAc,aAAa,GAAG;AAChC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,cAAc;AAAA,IACxB,CAAC;AAAA,EACH;AAEA,MAAI;AACJ,MAAI;AACF,UAAM,cAAc,KAAK,MAAM,cAAc,MAAM;AACnD,gBAAY,YAAY;AAAA,EAC1B,QAAQ;AAEN,UAAM,QAAQ,cAAc,OAAO,MAAM,4BAA4B;AACrE,QAAI,OAAO;AACT,kBAAY,MAAM,CAAC;AAAA,IACrB,OAAO;AACL,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ,mCAAmC,cAAc,MAAM;AAAA,MACjE,CAAC;AAAA,IACH;AAAA,EACF;AAGA,QAAM,uBAAuB,eAAgB,MAAM,eAAe;AAClE,MAAI,sBAAsB;AACxB,UAAM,QAAQ,KAAK,QAAQ;AAAA,MACzB;AAAA,MACA;AAAA,MACA,mCAAmC,SAAS;AAAA,MAC5C;AAAA,MACA;AAAA,MACA;AAAA,MACA,KAAK,UAAU,EAAE,aAAa,qBAAqB,CAAC;AAAA,IACtD,CAAC;AAAA,EACH;AAKA,SAAO,EAAE,WAAW,aAAa;AACnC;AAIA,eAAe,WACb,SACwC;AACxC,QAAM,SAAS,MAAM,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC;AACjD,MAAI,OAAO,aAAa,GAAG;AACzB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,OAAO;AAAA,IACjB,CAAC;AAAA,EACH;AACA,SAAO,QAAQ,OAAO,MAAM;AAC9B;AAEA,eAAe,eACb,SACA,SACA,MACA,aACe;AACf,QAAM,MAAM,UAAU,SAAS,MAAM,WAAW;AAGhD,QAAM,aAAa,MAAM,QAAQ,KAAK,QAAQ;AAAA,IAC5C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AAED,MAAI,WAAW,aAAa,GAAG;AAE7B,QAAI;AACJ,QAAI;AACF,mBAAa,MAAM,QAAQ,KAAK,QAAQ;AAAA,QACtC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAAA,IACH,QAAQ;AACN,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,cAAc,GAAG;AAAA,QAC1B,QAAQ,WAAW,UAAU;AAAA,MAC/B,CAAC;AAAA,IACH;AACA,QAAI,WAAW,aAAa,GAAG;AAC7B,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,WAAW,GAAG;AAAA,QACvB,QAAQ,WAAW;AAAA,MACrB,CAAC;AAAA,IACH;AAAA,EACF;AAGA,QAAM,YAAY,MAAM,QAAQ,KAAK,OAAO;AAAA,IAC1C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,UAAU,aAAa,GAAG;AAC5B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,UAAU;AAAA,IACpB,CAAC;AAAA,EACH;AACF;AAEA,eAAe,aACb,SACA,SACA,MACA,aACe;AACf,QAAM,MAAM,UAAU,SAAS,MAAM,WAAW;AAGhD,QAAM,WAAW,MAAM,MAAM,GAAG;AAChC,MAAI,CAAC,SAAS,IAAI;AAChB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS,SAAS,GAAG;AAAA,MACrB,QAAQ,QAAQ,SAAS,MAAM,KAAK,SAAS,UAAU;AAAA,IACzD,CAAC;AAAA,EACH;AAEA,QAAM,SAAS,OAAO,KAAK,MAAM,SAAS,YAAY,CAAC;AAGvD,QAAM,QAAQ,UAAU,uBAAuB,MAAM;AACrD,QAAM,YAAY,MAAM,QAAQ,KAAK,OAAO;AAAA,IAC1C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,UAAU,aAAa,GAAG;AAC5B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,UAAU;AAAA,IACpB,CAAC;AAAA,EACH;AACF;AAEA,eAAe,eACb,SACA,SACA,MACA,kBACA,UACe;AACf,QAAM,WAAW,YAAY,SAAS,MAAM,gBAAgB;AAC5D,QAAM,WAAW,mBAAmB,QAAQ;AAE5C,MAAI;AAEJ,aAAW,OAAO,UAAU;AAC1B,UAAM,SAAS,MAAM,QAAQ,KAAK,MAAM,CAAC,MAAM,GAAG,CAAC;AACnD,QAAI,OAAO,aAAa,KAAK,OAAO,OAAO,KAAK,GAAG;AACjD,eAAS,OAAO,OAAO,KAAK;AAC5B;AAAA,IACF;AAAA,EACF;AAEA,MAAI,WAAW,QAAW;AACxB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ;AAAA,IACV,CAAC;AAAA,EACH;AAEA,MAAI,WAAW,UAAU;AACvB,UAAM,IAAI,eAAe;AAAA,MACvB;AAAA,MACA;AAAA,MACA,SAAS,+BAA+B,QAAQ,SAAS,MAAM;AAAA,IACjE,CAAC;AAAA,EACH;AACF;AAEA,eAAe,mBACb,SACuB;AACvB,QAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,CAAC,UAAU,YAAY,MAAM,CAAC;AAC3E,MAAI,OAAO,aAAa,GAAG;AACzB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,OAAO;AAAA,IACjB,CAAC;AAAA,EACH;AAGA,QAAM,aAAa,OAAO,UAAU,OAAO;AAC3C,MAAI;AACJ,MAAI;AACF,aAAS,KAAK,MAAM,UAAU;AAAA,EAChC,QAAQ;AACN,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,gCAAgC,WAAW,MAAM,GAAG,GAAG,CAAC;AAAA,IAClE,CAAC;AAAA,EACH;AAEA,QAAM,OAAO,OAAO;AACpB,QAAM,aAA6B,CAAC,QAAQ,YAAY,iBAAiB,SAAS;AAClF,MAAI,CAAC,WAAW,SAAS,IAAoB,GAAG;AAC9C,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,2BAA2B,IAAI;AAAA,IACzC,CAAC;AAAA,EACH;AACA,SAAO;AACT;AAEA,eAAe,YAAY,SAAwC;AACjE,QAAM,aAAa;AACnB,QAAM,UAAU;AAEhB,WAAS,IAAI,GAAG,IAAI,YAAY,KAAK;AACnC,UAAM,SAAS,MAAM,QAAQ,KAAK,QAAQ;AAAA,MACxC;AAAA,MACA;AAAA,IACF,CAAC;AACD,QAAI,OAAO,aAAa,GAAG;AACzB;AAAA,IACF;AACA,QAAI,IAAI,aAAa,GAAG;AACtB,YAAM,MAAM,OAAO;AAAA,IACrB;AAAA,EACF;AAEA,QAAM,IAAI,kBAAkB;AAAA,IAC1B,OAAO;AAAA,IACP,SAAS;AAAA,IACT,QAAQ;AAAA,EACV,CAAC;AACH;;;AC1lBA,eAAe,WAAwD;AACrE,QAAM,KAAK,MAAM,eAAe;AAChC,SAAO,KAAK,EAAE,aAAa,GAAG,IAAI;AACpC;AAGA,SAAS,cAAc,KAA6B;AAClD,MAAI;AACF,UAAM,OAAO,KAAK,MAAM,IAAI,MAAM;AAClC,UAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,WAAO;AAAA,MACL,UAAU,OAAO,aAAa,IAAI;AAAA,MAClC,QAAQ,OAAO,UAAU;AAAA,MACzB,QAAQ,OAAO,UAAU,OAAO,OAAO,WAAW;AAAA,IACpD;AAAA,EACF,QAAQ;AAEN,WAAO;AAAA,EACT;AACF;AAEO,SAAS,qBACd,SACA,WACA,cACA,SACgB;AAChB,MAAI,SAAS,aAAa;AACxB,WAAO,yBAAyB,SAAS,WAAW,YAAY;AAAA,EAClE;AACA,SAAO,qBAAqB,SAAS,WAAW,YAAY;AAC9D;AAOA,SAAS,yBACP,SACA,WACA,cACgB;AAChB,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IAEA,MAAM,KAAK,SAAS,MAAM;AACxB,YAAM,SAAS,MAAM,QAAQ,KAAK,QAAQ,CAAC,MAAM,OAAO,GAAG;AAAA,QACzD,KAAK,MAAM;AAAA,MACb,CAAC;AACD,aAAO;AAAA,IACT;AAAA,IAEA,MAAM,UAAU,MAAM,SAAS;AAC7B,YAAM,MAAM,OAAO,KAAK,SAAS,OAAO,EAAE,SAAS,QAAQ;AAC3D,YAAM,SAAS,MAAM,QAAQ,KAAK,MAAM;AAAA,QACtC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AACD,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,KAAK;AAAA,IACxC;AAAA,IAEA,MAAM,SAAS,MAAM;AACnB,YAAM,SAAS,MAAM,QAAQ,KAAK,OAAO,CAAC,IAAI,CAAC;AAC/C,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,MAAM,SAAS,OAAO,OAAO;AAAA,IAChE;AAAA,IAEA,MAAM,OAAO;AACX,YAAM,QAAQ,OAAO;AAAA,IACvB;AAAA,EACF;AACF;AAGA,SAAS,qBACP,SACA,WACA,cACgB;AAChB,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IAEA,MAAM,KAAK,SAAS,MAAM;AACxB,YAAM,OAAO;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AACA,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,WAAW,EAAE,KAAK,MAAM,KAAK,IAAI;AACvC,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,QAAQ;AAC3D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA;AAAA,UACA,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,aAAO,cAAc,MAAM;AAAA,IAC7B;AAAA,IAEA,MAAM,UAAU,MAAM,SAAS;AAC7B,YAAM,MAAM,OAAO,KAAK,SAAS,OAAO,EAAE,SAAS,QAAQ;AAC3D,YAAM,OAAO;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AACA,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,EAAE,IAAI,CAAC;AAC1D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA,SAAS,aAAa,IAAI;AAAA,UAC1B,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,KAAK;AAAA,IACxC;AAAA,IAEA,MAAM,SAAS,MAAM;AACnB,YAAM,OAAO,CAAC,QAAQ,WAAW,MAAM,OAAO,IAAI;AAClD,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,EAAE,IAAI,CAAC;AAC1D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA,SAAS,YAAY,IAAI;AAAA,UACzB,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,MAAM,SAAS,OAAO,OAAO;AAAA,IAChE;AAAA,IAEA,MAAM,OAAO;AACX,YAAM,QAAQ,OAAO;AAAA,IACvB;AAAA,EACF;AACF;AAEA,SAAS,mBAAmB,QAA6B;AACvD,SAAO,OAAO,aAAa,OAAO,OAAO,OAAO,SAAS,SAAS;AACpE;;;AC5LA,eAAsB,cACpB,SACA,QACyB;AACzB,QAAM,iBAAiB,UAAU,CAAC;AAClC,QAAM,EAAE,WAAW,cAAc,YAAY,IAAI,MAAM,UAAU,SAAS;AAAA,IACxE,WAAW;AAAA,IACX,GAAG;AAAA,EACL,CAAC;AACD,SAAO,qBAAqB,SAAS,WAAW,cAAc,EAAE,YAAY,CAAC;AAC/E;","names":["sessionId"]}
1
+ {"version":3,"sources":["../src/core/integrity.ts","../src/core/config.ts","../src/core/traceparent.ts","../src/core/provision.ts","../src/core/runtime.ts","../src/api.ts"],"sourcesContent":["import { IntegrityError } from './errors.js';\n\nexport const PINNED_VERSION = '0.15.0';\n\nexport const CHECKSUMS: Record<string, Record<string, string>> = {\n '0.15.0': {\n linux_amd64:\n '89f7ebbfd75ffd961245ec62b2602fd0cc387740502ac858dbc39c367c5699c5',\n linux_arm64:\n '3fabbd749f9e98fb9f96ddfc94c389a6868cda7ed3668daa8440c39ceec85f3b',\n },\n '0.14.0': {\n linux_amd64:\n '2ab8ba0d6637fe1a5badf840c3db197161a6f9865d721ed216029d229b1b9bbc',\n linux_arm64:\n '929d18dd9fe36e9b2fa830d7ae64b4fb481853e743ade8674fcfcdc73470ed53',\n },\n};\n\n/**\n * Returns the checksum to verify against.\n * If `override` is provided, returns it directly.\n * Otherwise looks up the checksum in the pinned CHECKSUMS map.\n * Throws IntegrityError if no checksum is found.\n */\nexport function getChecksum(\n version: string,\n arch: string,\n override?: string,\n): string {\n if (override) {\n return override;\n }\n\n const versionChecksums = CHECKSUMS[version];\n if (versionChecksums && versionChecksums[arch]) {\n return versionChecksums[arch];\n }\n\n throw new IntegrityError({\n expected: '',\n actual: '',\n message: `No pinned checksum for agentsh v${version}. Provide \\`agentshChecksum\\` explicitly or use \\`skipIntegrityCheck: true\\`.`,\n });\n}\n\n/**\n * Returns an array of shell commands to try for computing SHA-256 checksums.\n * Each command extracts just the hex hash value from the given file.\n */\nexport function buildVerifyCommand(filePath: string): string[] {\n return [\n `sha256sum \"${filePath}\" | awk '{print $1}'`,\n `shasum -a 256 \"${filePath}\" | awk '{print $1}'`,\n `openssl dgst -sha256 \"${filePath}\" | awk '{print $NF}'`,\n ];\n}\n\n/**\n * Returns the download URL for the agentsh binary.\n * If `overrideUrl` is provided, returns it directly.\n * Otherwise returns the default GitHub releases URL.\n */\nexport function binaryUrl(\n version: string,\n arch: string,\n overrideUrl?: string,\n): string {\n if (overrideUrl) {\n return overrideUrl;\n }\n\n return `https://github.com/canyonroad/agentsh/releases/download/v${version}/agentsh_${version}_${arch}.tar.gz`;\n}\n","import yaml from 'js-yaml';\nimport type { ThreatFeedsConfig, PackageChecksConfig, ProviderConfig } from './types.js';\n\nexport interface ServerConfigOpts {\n watchtower?: string;\n realPaths?: boolean;\n threatFeeds?: false | ThreatFeedsConfig;\n packageChecks?: false | PackageChecksConfig;\n grpc?: { addr: string };\n serverTimeouts?: { readTimeout?: string; writeTimeout?: string; maxRequestSize?: string };\n logging?: { level?: string; format?: string; output?: string };\n sessions?: { baseDir?: string; maxSessions?: number; defaultTimeout?: string; idleTimeout?: string; cleanupInterval?: string };\n audit?: { enabled?: boolean; sqlitePath?: string };\n sandboxLimits?: { maxMemoryMb?: number; maxCpuPercent?: number; maxProcesses?: number };\n fuse?: { deferred?: boolean };\n networkIntercept?: { interceptMode?: string; proxyListenAddr?: string };\n seccompDetails?: { execve?: boolean; fileMonitor?: { enabled?: boolean; enforceWithoutFuse?: boolean } };\n cgroups?: { enabled?: boolean };\n unixSockets?: { enabled?: boolean };\n proxy?: { mode?: string; port?: number; providers?: Record<string, string> };\n dlp?: { mode?: string; patterns?: Record<string, boolean>; customPatterns?: Array<{ name: string; display: string; regex: string }> };\n policiesOverride?: { dir?: string; defaultPolicy?: string };\n approvals?: { enabled?: boolean; mode?: string; timeout?: string };\n metrics?: { enabled?: boolean; path?: string };\n health?: { path?: string; readinessPath?: string };\n development?: { disableAuth?: boolean; verboseErrors?: boolean };\n}\n\n/**\n * Default threat feeds: URLhaus (malware) + Phishing.Database (phishing).\n * Both are free, open source, and updated frequently.\n */\nexport const defaultThreatFeeds: ThreatFeedsConfig = {\n action: 'deny',\n feeds: [\n {\n name: 'urlhaus',\n url: 'https://urlhaus.abuse.ch/downloads/hostfile/',\n format: 'hostfile',\n refreshInterval: '6h',\n },\n {\n name: 'phishing',\n url: 'https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-ACTIVE.txt',\n format: 'domain-list',\n refreshInterval: '12h',\n },\n ],\n allowlist: [\n 'github.com',\n '*.github.com',\n 'registry.npmjs.org',\n 'registry.yarnpkg.com',\n 'pypi.org',\n 'files.pythonhosted.org',\n 'crates.io',\n 'static.crates.io',\n 'index.crates.io',\n 'proxy.golang.org',\n 'sum.golang.org',\n ],\n};\n\n/**\n * Default package check providers: local, osv, depsdev.\n * All are free and require no API key.\n */\nexport const defaultPackageCheckProviders: Record<string, { enabled: boolean; priority: number }> = {\n local: { enabled: true, priority: 0 },\n osv: { enabled: true, priority: 1 },\n depsdev: { enabled: true, priority: 2 },\n};\n\n/**\n * Convert a camelCase ProviderConfig key to snake_case.\n */\nfunction providerConfigToSnakeCase(config: ProviderConfig): Record<string, unknown> {\n const result: Record<string, unknown> = { enabled: config.enabled ?? true };\n if (config.priority !== undefined) result.priority = config.priority;\n if (config.timeout !== undefined) result.timeout = config.timeout;\n if (config.onFailure !== undefined) result.on_failure = config.onFailure;\n if (config.apiKeyEnv !== undefined) result.api_key_env = config.apiKeyEnv;\n if (config.type !== undefined) result.type = config.type;\n if (config.command !== undefined) result.command = config.command;\n if (config.options !== undefined) result.options = config.options;\n return result;\n}\n\nexport function generateServerConfig(opts: ServerConfigOpts): string {\n const config: Record<string, unknown> = {\n server: {\n http: {\n addr: '127.0.0.1:18080',\n },\n },\n auth: {\n type: 'none',\n },\n policies: {\n system_dir: '/etc/agentsh/system',\n dir: '/etc/agentsh',\n default: 'policy',\n },\n sandbox: {\n enabled: true,\n allow_degraded: true,\n fuse: { enabled: true },\n network: { enabled: true },\n seccomp: { enabled: true },\n },\n };\n if (opts.watchtower) config.watchtower = opts.watchtower;\n\n // ─── Extended config sections ─────────────────────────────────\n\n // gRPC\n if (opts.grpc) {\n (config.server as any).grpc = { enabled: true, addr: opts.grpc.addr };\n }\n\n // Server timeouts → merge into server.http\n if (opts.serverTimeouts) {\n const http = (config.server as any).http;\n if (opts.serverTimeouts.readTimeout) http.read_timeout = opts.serverTimeouts.readTimeout;\n if (opts.serverTimeouts.writeTimeout) http.write_timeout = opts.serverTimeouts.writeTimeout;\n if (opts.serverTimeouts.maxRequestSize) http.max_request_size = opts.serverTimeouts.maxRequestSize;\n }\n\n // Logging\n if (opts.logging) config.logging = { ...opts.logging };\n\n // Sessions (merge realPaths + extended sessions)\n const sessionsObj: Record<string, unknown> = {};\n if (opts.realPaths) sessionsObj.real_paths = true;\n if (opts.sessions) {\n if (opts.sessions.baseDir) sessionsObj.base_dir = opts.sessions.baseDir;\n if (opts.sessions.maxSessions !== undefined) sessionsObj.max_sessions = opts.sessions.maxSessions;\n if (opts.sessions.defaultTimeout) sessionsObj.default_timeout = opts.sessions.defaultTimeout;\n if (opts.sessions.idleTimeout) sessionsObj.idle_timeout = opts.sessions.idleTimeout;\n if (opts.sessions.cleanupInterval) sessionsObj.cleanup_interval = opts.sessions.cleanupInterval;\n }\n if (Object.keys(sessionsObj).length > 0) config.sessions = sessionsObj;\n\n // Audit\n if (opts.audit) {\n const auditObj: Record<string, unknown> = {};\n if (opts.audit.enabled !== undefined) auditObj.enabled = opts.audit.enabled;\n if (opts.audit.sqlitePath) auditObj.sqlite_path = opts.audit.sqlitePath;\n config.audit = auditObj;\n }\n\n // Sandbox limits\n if (opts.sandboxLimits) {\n (config.sandbox as any).limits = {\n ...(opts.sandboxLimits.maxMemoryMb !== undefined && { max_memory_mb: opts.sandboxLimits.maxMemoryMb }),\n ...(opts.sandboxLimits.maxCpuPercent !== undefined && { max_cpu_percent: opts.sandboxLimits.maxCpuPercent }),\n ...(opts.sandboxLimits.maxProcesses !== undefined && { max_processes: opts.sandboxLimits.maxProcesses }),\n };\n }\n\n // FUSE deferred\n if (opts.fuse?.deferred !== undefined) {\n (config.sandbox as any).fuse.deferred = opts.fuse.deferred;\n }\n\n // Network intercept\n if (opts.networkIntercept) {\n const net = (config.sandbox as any).network;\n if (opts.networkIntercept.interceptMode) net.intercept_mode = opts.networkIntercept.interceptMode;\n if (opts.networkIntercept.proxyListenAddr) net.proxy_listen_addr = opts.networkIntercept.proxyListenAddr;\n }\n\n // Seccomp details\n if (opts.seccompDetails) {\n const sec = (config.sandbox as any).seccomp;\n if (opts.seccompDetails.execve !== undefined) sec.execve = opts.seccompDetails.execve;\n if (opts.seccompDetails.fileMonitor) {\n sec.file_monitor = {\n ...(opts.seccompDetails.fileMonitor.enabled !== undefined && { enabled: opts.seccompDetails.fileMonitor.enabled }),\n ...(opts.seccompDetails.fileMonitor.enforceWithoutFuse !== undefined && { enforce_without_fuse: opts.seccompDetails.fileMonitor.enforceWithoutFuse }),\n };\n }\n }\n\n // Cgroups\n if (opts.cgroups) {\n (config.sandbox as any).cgroups = { ...opts.cgroups };\n }\n\n // Unix sockets\n if (opts.unixSockets) {\n (config.sandbox as any).unix_sockets = { ...opts.unixSockets };\n }\n\n // Proxy\n if (opts.proxy) {\n config.proxy = { ...opts.proxy };\n }\n\n // DLP\n if (opts.dlp) {\n const dlpObj: Record<string, unknown> = {};\n if (opts.dlp.mode) dlpObj.mode = opts.dlp.mode;\n if (opts.dlp.patterns) dlpObj.patterns = opts.dlp.patterns;\n if (opts.dlp.customPatterns) {\n dlpObj.custom_patterns = opts.dlp.customPatterns.map(p => ({\n name: p.name,\n display: p.display,\n regex: p.regex,\n }));\n }\n config.dlp = dlpObj;\n }\n\n // Policies override\n if (opts.policiesOverride) {\n config.policies = {\n ...(opts.policiesOverride.dir && { dir: opts.policiesOverride.dir }),\n ...(opts.policiesOverride.defaultPolicy && { default: opts.policiesOverride.defaultPolicy }),\n };\n }\n\n // Approvals\n if (opts.approvals) config.approvals = { ...opts.approvals };\n\n // Metrics\n if (opts.metrics) config.metrics = { ...opts.metrics };\n\n // Health\n if (opts.health) {\n const healthObj: Record<string, unknown> = {};\n if (opts.health.path) healthObj.path = opts.health.path;\n if (opts.health.readinessPath) healthObj.readiness_path = opts.health.readinessPath;\n config.health = healthObj;\n }\n\n // Development\n if (opts.development) {\n const devObj: Record<string, unknown> = {};\n if (opts.development.disableAuth !== undefined) devObj.disable_auth = opts.development.disableAuth;\n if (opts.development.verboseErrors !== undefined) devObj.verbose_errors = opts.development.verboseErrors;\n config.development = devObj;\n }\n\n // Threat feeds: enabled by default, opt-out with `threatFeeds: false`\n const feeds = opts.threatFeeds === false ? undefined : (opts.threatFeeds ?? defaultThreatFeeds);\n if (feeds) {\n config.threat_feeds = {\n enabled: true,\n action: feeds.action ?? 'deny',\n feeds: feeds.feeds.map(f => ({\n name: f.name,\n url: f.url,\n format: f.format,\n refresh_interval: f.refreshInterval ?? '6h',\n })),\n ...(feeds.allowlist?.length ? { allowlist: feeds.allowlist } : {}),\n };\n }\n\n // Package checks: disabled by default, opt-in with `packageChecks: {}`\n if (opts.packageChecks) {\n const pc = opts.packageChecks;\n const providers: Record<string, Record<string, unknown>> = {};\n\n // Start with defaults\n for (const [name, def] of Object.entries(defaultPackageCheckProviders)) {\n providers[name] = { ...def };\n }\n\n // Merge user-provided providers\n if (pc.providers) {\n for (const [name, value] of Object.entries(pc.providers)) {\n if (value === false) {\n providers[name] = { enabled: false };\n } else if (value === true) {\n providers[name] = { ...(providers[name] ?? {}), enabled: true };\n } else {\n // ProviderConfig object — merge with existing default if present\n const base = providers[name] ?? {};\n providers[name] = { ...base, ...providerConfigToSnakeCase(value) };\n }\n }\n }\n\n config.package_checks = {\n enabled: true,\n scope: pc.scope ?? 'new_packages_only',\n providers,\n };\n }\n\n return yaml.dump(config, { lineWidth: -1 });\n}\n","/**\n * Read W3C traceparent from the active OpenTelemetry span, if available.\n *\n * Uses dynamic import so @opentelemetry/api is an optional peer dependency.\n * Returns undefined when OTEL is not installed, no span is active, or the\n * trace context is invalid (all-zero trace ID).\n */\nexport async function getTraceparent(): Promise<string | undefined> {\n try {\n const { trace } = await import('@opentelemetry/api');\n const span = trace.getActiveSpan();\n const ctx = span?.spanContext();\n if (!ctx?.traceId || ctx.traceId === '00000000000000000000000000000000') {\n return undefined;\n }\n const flags = (ctx.traceFlags ?? 0).toString(16).padStart(2, '0');\n return `00-${ctx.traceId}-${ctx.spanId}-${flags}`;\n } catch {\n return undefined;\n }\n}\n","import type {\n SandboxAdapter,\n SecureConfig,\n SecurityMode,\n ExecResult,\n} from './types.js';\nimport {\n getChecksum,\n buildVerifyCommand,\n binaryUrl,\n PINNED_VERSION,\n} from './integrity.js';\nimport { generateServerConfig } from './config.js';\nimport { ProvisioningError, IntegrityError } from './errors.js';\nimport { serializePolicy, systemPolicyYaml } from '../policies/serialize.js';\nimport { agentDefault } from '../policies/presets.js';\nimport { validatePolicy } from '../policies/schema.js';\nimport { getTraceparent } from './traceparent.js';\n\n// ─── Security mode ordering (strongest to weakest) ────────────\n\nconst SECURITY_MODE_RANK: Record<SecurityMode, number> = {\n full: 4,\n landlock: 3,\n 'landlock-only': 2,\n minimal: 1,\n};\n\nfunction isWeakerThan(detected: SecurityMode, required: SecurityMode): boolean {\n return SECURITY_MODE_RANK[detected] < SECURITY_MODE_RANK[required];\n}\n\n// ─── Architecture mapping ─────────────────────────────────────\n\nfunction mapArch(uname: string): 'linux_amd64' | 'linux_arm64' {\n const trimmed = uname.trim();\n if (trimmed === 'x86_64') return 'linux_amd64';\n if (trimmed === 'aarch64') return 'linux_arm64';\n throw new ProvisioningError({\n phase: 'install',\n command: 'uname -m',\n stderr: `Unsupported architecture: ${trimmed}`,\n });\n}\n\n// ─── Helper: check if binary exists ───────────────────────────\n\nconst AGENTSH_PATHS = ['/usr/local/bin/agentsh', '/usr/bin/agentsh'];\n\nasync function binaryExists(adapter: SandboxAdapter): Promise<boolean> {\n for (const path of AGENTSH_PATHS) {\n const found = adapter.fileExists\n ? await adapter.fileExists(path)\n : (await adapter.exec('test', ['-f', path])).exitCode === 0;\n if (found) return true;\n }\n return false;\n}\n\n// ─── Helper: sleep ────────────────────────────────────────────\n\nfunction sleep(ms: number): Promise<void> {\n return new Promise((resolve) => setTimeout(resolve, ms));\n}\n\n// ─── Main provisioning function ───────────────────────────────\n\nexport interface ProvisionResult {\n sessionId: string;\n securityMode: SecurityMode;\n /** When true, the shell shim enforces policy — skip agentsh exec wrapper. */\n passthrough?: boolean;\n}\n\nexport async function provision(\n adapter: SandboxAdapter,\n config: SecureConfig = {},\n): Promise<ProvisionResult> {\n const {\n policy: rawPolicy,\n workspace = '/workspace',\n watchtower,\n installStrategy = 'download',\n agentshVersion = PINNED_VERSION,\n agentshArch: archOverride,\n agentshBinaryUrl,\n agentshChecksum,\n skipIntegrityCheck = false,\n minimumSecurityMode,\n realPaths: realPathsOverride,\n traceParent,\n policyName = 'policy',\n threatFeeds,\n packageChecks,\n serverConfig: extendedConfig,\n } = config;\n\n // Resolve and validate policy\n const policy = rawPolicy ? validatePolicy(rawPolicy) : agentDefault();\n\n let securityMode: SecurityMode = 'full';\n\n if (installStrategy === 'running') {\n // agentsh is already fully provisioned and running with the shell shim\n // installed. Commands go through the shim automatically, so we don't\n // create a new session (which would deadlock the server via nested\n // agentsh connections). Instead, read the existing session ID from\n // the environment and use passthrough mode at runtime.\n //\n // Skip detectSecurityMode() — running `agentsh detect` inside a sandbox\n // where the shell shim is already installed would route the command\n // through agentsh's exec API, causing the server to try binding port\n // 18080 again (\"address already in use\"). Default to 'full' since\n // pre-provisioned environments typically have full capabilities.\n await healthCheck(adapter);\n\n securityMode = config.securityMode ?? 'full';\n\n if (minimumSecurityMode && isWeakerThan(securityMode, minimumSecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'securityMode check',\n stderr: `Security mode '${securityMode}' is weaker than required '${minimumSecurityMode}'`,\n });\n }\n\n // Read the existing session ID from config or from the environment\n let sessionId = config.sessionId;\n if (!sessionId) {\n const envResult = await adapter.exec('sh', ['-c', 'echo $AGENTSH_SESSION_ID']);\n sessionId = envResult.stdout.trim();\n }\n if (!sessionId) {\n throw new ProvisioningError({\n phase: 'session',\n command: 'echo $AGENTSH_SESSION_ID',\n stderr: 'AGENTSH_SESSION_ID not set — running strategy requires a pre-created session',\n });\n }\n\n return { sessionId, securityMode, passthrough: true };\n }\n\n // ─── Phase 1: Binary Installation ───────────────────────────\n\n // Step 1: Check if binary exists\n const exists = await binaryExists(adapter);\n\n if (installStrategy === 'preinstalled') {\n if (!exists) {\n throw new ProvisioningError({\n phase: 'install',\n command: AGENTSH_PATHS.map(p => `test -f ${p}`).join(' || '),\n stderr: 'Binary not found but installStrategy is preinstalled',\n });\n }\n // Binary exists and strategy is preinstalled, skip to detect\n } else if (installStrategy === 'download' || installStrategy === 'upload') {\n // If binary already exists, skip installation but still detect\n if (!exists) {\n // Step 2: Detect architecture\n const arch =\n archOverride ?? await detectArch(adapter);\n\n if (installStrategy === 'download') {\n // Step 3a: Download\n await downloadBinary(adapter, agentshVersion, arch, agentshBinaryUrl);\n } else {\n // Step 3b: Upload\n await uploadBinary(adapter, agentshVersion, arch, agentshBinaryUrl);\n }\n\n // Step 4: Verify checksum\n if (!skipIntegrityCheck) {\n await verifyChecksum(\n adapter,\n agentshVersion,\n arch,\n agentshChecksum,\n '/tmp/agentsh.tar.gz',\n );\n }\n\n // Step 5: Install binaries (agentsh + agentsh-shell-shim + agentsh-unixwrap)\n const binaries = [\n { src: '/tmp/agentsh', dest: '/usr/local/bin/agentsh' },\n { src: '/tmp/agentsh-shell-shim', dest: '/usr/bin/agentsh-shell-shim' },\n { src: '/tmp/agentsh-unixwrap', dest: '/usr/local/bin/agentsh-unixwrap' },\n ];\n for (const { src, dest } of binaries) {\n const installResult = await adapter.exec(\n 'install',\n ['-m', '0755', src, dest],\n { sudo: true },\n );\n if (installResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: `install -m 0755 ${src} ${dest}`,\n stderr: installResult.stderr,\n });\n }\n }\n }\n }\n\n // Step 5b: Detect security mode\n securityMode = await detectSecurityMode(adapter);\n\n // Check minimum security mode\n if (minimumSecurityMode && isWeakerThan(securityMode, minimumSecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --json',\n stderr: `Detected security mode '${securityMode}' is weaker than required '${minimumSecurityMode}'`,\n });\n }\n\n // Auto-enable realPaths when FUSE is available (full or landlock modes),\n // unless the user explicitly set it.\n const hasFuse = securityMode === 'full' || securityMode === 'landlock';\n const realPaths = realPathsOverride ?? hasFuse;\n\n // Step 6: Install shell shim\n const shimResult = await adapter.exec(\n 'agentsh',\n [\n 'shim', 'install-shell',\n '--root', '/',\n '--shim', '/usr/bin/agentsh-shell-shim',\n '--bash',\n '--i-understand-this-modifies-the-host',\n ],\n { sudo: true },\n );\n if (shimResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh shim install-shell',\n stderr: shimResult.stderr,\n });\n }\n\n // ─── Phase 2: Policy & Config ───────────────────────────────\n\n // Step 7: Create dirs and make writable for file writes\n const mkdirResult = await adapter.exec(\n 'mkdir',\n ['-p', '/etc/agentsh/system'],\n { sudo: true },\n );\n if (mkdirResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'mkdir -p /etc/agentsh/system',\n stderr: mkdirResult.stderr,\n });\n }\n\n // Temporarily make writable so adapter.writeFile (which may not support sudo) can write\n await adapter.exec('chmod', ['-R', '777', '/etc/agentsh/'], { sudo: true });\n\n await adapter.writeFile(\n '/etc/agentsh/system/policy.yml',\n systemPolicyYaml(),\n { sudo: true },\n );\n\n // Step 8: Write user policy\n await adapter.writeFile(\n '/etc/agentsh/policy.yml',\n serializePolicy(policy),\n { sudo: true },\n );\n\n // Step 9: Write server config\n const serverConfig = generateServerConfig({\n watchtower,\n realPaths,\n threatFeeds,\n packageChecks,\n ...extendedConfig,\n });\n\n await adapter.writeFile('/etc/agentsh/config.yml', serverConfig, {\n sudo: true,\n });\n\n // Step 10: Set permissions\n const chmodDirResult = await adapter.exec(\n 'find',\n ['/etc/agentsh', '-type', 'd', '-exec', 'chmod', '555', '{}', '+'],\n { sudo: true },\n );\n if (chmodDirResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'find /etc/agentsh -type d -exec chmod 555 {} +',\n stderr: chmodDirResult.stderr,\n });\n }\n\n const chmodFileResult = await adapter.exec(\n 'find',\n ['/etc/agentsh', '-type', 'f', '-exec', 'chmod', '444', '{}', '+'],\n { sudo: true },\n );\n if (chmodFileResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'find /etc/agentsh -type f -exec chmod 444 {} +',\n stderr: chmodFileResult.stderr,\n });\n }\n\n const chownResult = await adapter.exec(\n 'chown',\n ['-R', 'root:root', '/etc/agentsh/'],\n { sudo: true },\n );\n if (chownResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'policy',\n command: 'chown -R root:root /etc/agentsh/',\n stderr: chownResult.stderr,\n });\n }\n\n // ─── Phase 3: Server Startup ────────────────────────────────\n\n // Step 10b: Ensure workspace directory exists\n await adapter.exec('mkdir', ['-p', workspace], { sudo: true });\n\n // Step 11: Start server\n const serverResult = await adapter.exec(\n 'agentsh',\n ['server', '--config', '/etc/agentsh/config.yml'],\n { detached: true, sudo: true },\n );\n if (serverResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'startup',\n command: 'agentsh server --config /etc/agentsh/config.yml',\n stderr: serverResult.stderr,\n });\n }\n\n // Step 12: Health check\n await healthCheck(adapter);\n\n // Step 13: Create session\n const sessionResult = await adapter.exec('agentsh', [\n 'session',\n 'create',\n '--workspace',\n workspace,\n '--policy',\n 'policy',\n ]);\n if (sessionResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'session',\n command: 'agentsh session create',\n stderr: sessionResult.stderr,\n });\n }\n\n let sessionId: string;\n try {\n const sessionData = JSON.parse(sessionResult.stdout);\n sessionId = sessionData.session_id;\n } catch {\n // Fallback: parse text output like \"Session session-xxx started\"\n const match = sessionResult.stdout.match(/Session\\s+(session-[^\\s]+)/);\n if (match) {\n sessionId = match[1];\n } else {\n throw new ProvisioningError({\n phase: 'session',\n command: 'agentsh session create',\n stderr: `Failed to parse session output: ${sessionResult.stdout}`,\n });\n }\n }\n\n // Step 13b: Set trace context if traceParent is provided or OTEL span is active\n const effectiveTraceParent = traceParent ?? (await getTraceparent());\n if (effectiveTraceParent) {\n await adapter.exec('curl', [\n '-X',\n 'PUT',\n `http://127.0.0.1:18080/sessions/${sessionId}/trace-context`,\n '-H',\n 'Content-Type: application/json',\n '-d',\n JSON.stringify({ traceparent: effectiveTraceParent }),\n ]);\n }\n\n // ─── Phase 4: Handoff ───────────────────────────────────────\n\n // Step 14: Return result\n return { sessionId, securityMode };\n}\n\n// ─── Phase 1 helpers ──────────────────────────────────────────\n\nasync function detectArch(\n adapter: SandboxAdapter,\n): Promise<'linux_amd64' | 'linux_arm64'> {\n const result = await adapter.exec('uname', ['-m']);\n if (result.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'uname -m',\n stderr: result.stderr,\n });\n }\n return mapArch(result.stdout);\n}\n\nasync function downloadBinary(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n overrideUrl?: string,\n): Promise<void> {\n const url = binaryUrl(version, arch, overrideUrl);\n\n // Try curl first\n const curlResult = await adapter.exec('curl', [\n '-fsSL',\n url,\n '-o',\n '/tmp/agentsh.tar.gz',\n ]);\n\n if (curlResult.exitCode !== 0) {\n // Fallback to wget (may not be available on all platforms)\n let wgetResult: ExecResult;\n try {\n wgetResult = await adapter.exec('wget', [\n '-q',\n url,\n '-O',\n '/tmp/agentsh.tar.gz',\n ]);\n } catch {\n throw new ProvisioningError({\n phase: 'install',\n command: `curl -fsSL ${url} -o /tmp/agentsh.tar.gz`,\n stderr: curlResult.stderr || 'Download failed (curl failed, wget not available)',\n });\n }\n if (wgetResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: `wget -q ${url} -O /tmp/agentsh.tar.gz`,\n stderr: wgetResult.stderr,\n });\n }\n }\n\n // Extract\n const tarResult = await adapter.exec('tar', [\n 'xz',\n '-C',\n '/tmp/',\n '-f',\n '/tmp/agentsh.tar.gz',\n ]);\n if (tarResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'tar xz -C /tmp/ -f /tmp/agentsh.tar.gz',\n stderr: tarResult.stderr,\n });\n }\n}\n\nasync function uploadBinary(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n overrideUrl?: string,\n): Promise<void> {\n const url = binaryUrl(version, arch, overrideUrl);\n\n // Download on host side using fetch (Node 18+)\n const response = await fetch(url);\n if (!response.ok) {\n throw new ProvisioningError({\n phase: 'install',\n command: `fetch ${url}`,\n stderr: `HTTP ${response.status}: ${response.statusText}`,\n });\n }\n\n const buffer = Buffer.from(await response.arrayBuffer());\n\n // Upload tarball to sandbox and extract\n await adapter.writeFile('/tmp/agentsh.tar.gz', buffer);\n const tarResult = await adapter.exec('tar', [\n 'xz',\n '-C',\n '/tmp/',\n '-f',\n '/tmp/agentsh.tar.gz',\n ]);\n if (tarResult.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'tar xz -C /tmp/ -f /tmp/agentsh.tar.gz',\n stderr: tarResult.stderr,\n });\n }\n}\n\nasync function verifyChecksum(\n adapter: SandboxAdapter,\n version: string,\n arch: string,\n checksumOverride: string | undefined,\n filePath: string,\n): Promise<void> {\n const expected = getChecksum(version, arch, checksumOverride);\n const commands = buildVerifyCommand(filePath);\n\n let actual: string | undefined;\n\n for (const cmd of commands) {\n const result = await adapter.exec('sh', ['-c', cmd]);\n if (result.exitCode === 0 && result.stdout.trim()) {\n actual = result.stdout.trim();\n break;\n }\n }\n\n if (actual === undefined) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'sha256sum / shasum / openssl',\n stderr: 'No checksum tool available in sandbox',\n });\n }\n\n if (actual !== expected) {\n throw new IntegrityError({\n expected,\n actual,\n message: `Checksum mismatch: expected ${expected}, got ${actual}`,\n });\n }\n}\n\nasync function detectSecurityMode(\n adapter: SandboxAdapter,\n): Promise<SecurityMode> {\n const result = await adapter.exec('agentsh', ['detect', '--output', 'json']);\n if (result.exitCode !== 0) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: result.stderr,\n });\n }\n\n // agentsh detect outputs JSON to stderr\n const jsonOutput = result.stderr || result.stdout;\n let parsed: { security_mode: string };\n try {\n parsed = JSON.parse(jsonOutput);\n } catch {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: `Failed to parse detect JSON: ${jsonOutput.slice(0, 200)}`,\n });\n }\n\n const mode = parsed.security_mode;\n const validModes: SecurityMode[] = ['full', 'landlock', 'landlock-only', 'minimal'];\n if (!validModes.includes(mode as SecurityMode)) {\n throw new ProvisioningError({\n phase: 'install',\n command: 'agentsh detect --output json',\n stderr: `Unknown security mode: '${mode}'`,\n });\n }\n return mode as SecurityMode;\n}\n\nasync function healthCheck(adapter: SandboxAdapter): Promise<void> {\n const maxRetries = 10;\n const delayMs = 500;\n\n for (let i = 0; i < maxRetries; i++) {\n const result = await adapter.exec('curl', [\n '-sf',\n 'http://127.0.0.1:18080/health',\n ]);\n if (result.exitCode === 0) {\n return;\n }\n if (i < maxRetries - 1) {\n await sleep(delayMs);\n }\n }\n\n throw new ProvisioningError({\n phase: 'startup',\n command: 'curl http://127.0.0.1:18080/health',\n stderr: 'Health check failed after 10 attempts',\n });\n}\n","import type {\n SandboxAdapter,\n SecuredSandbox,\n SecurityMode,\n ExecResult,\n} from './types.js';\nimport { RuntimeError } from './errors.js';\nimport { getTraceparent } from './traceparent.js';\n\n/** Build env object with TRACEPARENT if an OTEL span is active. */\nasync function traceEnv(): Promise<Record<string, string> | undefined> {\n const tp = await getTraceparent();\n return tp ? { TRACEPARENT: tp } : undefined;\n}\n\n/** Parse the JSON envelope from `agentsh exec --output json`. */\nfunction parseExecJson(raw: ExecResult): ExecResult {\n try {\n const json = JSON.parse(raw.stdout);\n const result = json.result ?? {};\n return {\n exitCode: result.exit_code ?? raw.exitCode,\n stdout: result.stdout ?? '',\n stderr: result.stderr ?? result.error?.message ?? '',\n };\n } catch {\n // If not valid JSON, return as-is (e.g. mock adapters)\n return raw;\n }\n}\n\nexport function createSecuredSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n options?: { passthrough?: boolean },\n): SecuredSandbox {\n if (options?.passthrough) {\n return createPassthroughSandbox(adapter, sessionId, securityMode);\n }\n return createAgentshSandbox(adapter, sessionId, securityMode);\n}\n\n/**\n * Passthrough mode: the shell shim enforces policy on every command,\n * so we run commands directly through the adapter without wrapping\n * them in `agentsh exec`. Used with the 'running' install strategy.\n */\nfunction createPassthroughSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n): SecuredSandbox {\n return {\n sessionId,\n securityMode,\n\n async exec(command, opts) {\n const result = await adapter.exec('bash', ['-c', command], {\n cwd: opts?.cwd,\n });\n return result;\n },\n\n async writeFile(path, content) {\n const b64 = Buffer.from(content, 'utf-8').toString('base64');\n const result = await adapter.exec('sh', [\n '-c',\n 'printf \"%s\" \"$1\" | base64 -d > \"$2\"',\n '_',\n b64,\n path,\n ]);\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'writeFile failed',\n };\n }\n return { success: true as const, path };\n },\n\n async readFile(path) {\n const result = await adapter.exec('cat', [path]);\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'readFile failed',\n };\n }\n return { success: true as const, path, content: result.stdout };\n },\n\n async stop() {\n await adapter.stop?.();\n },\n };\n}\n\n/** Standard mode: wraps commands in `agentsh exec` for policy enforcement. */\nfunction createAgentshSandbox(\n adapter: SandboxAdapter,\n sessionId: string,\n securityMode: SecurityMode,\n): SecuredSandbox {\n return {\n sessionId,\n securityMode,\n\n async exec(command, opts) {\n const args = [\n 'exec',\n '--output',\n 'json',\n sessionId,\n '--',\n 'bash',\n '-c',\n command,\n ];\n const env = await traceEnv();\n const execOpts = { cwd: opts?.cwd, env };\n const result = await adapter.exec('agentsh', args, execOpts);\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command,\n stderr: result.stderr,\n });\n }\n return parseExecJson(result);\n },\n\n async writeFile(path, content) {\n const b64 = Buffer.from(content, 'utf-8').toString('base64');\n const args = [\n 'exec',\n sessionId,\n '--',\n 'sh',\n '-c',\n 'printf \"%s\" \"$1\" | base64 -d > \"$2\"',\n '_',\n b64,\n path,\n ];\n const env = await traceEnv();\n const result = await adapter.exec('agentsh', args, { env });\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command: `writeFile ${path}`,\n stderr: result.stderr,\n });\n }\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'writeFile failed',\n };\n }\n return { success: true as const, path };\n },\n\n async readFile(path) {\n const args = ['exec', sessionId, '--', 'cat', path];\n const env = await traceEnv();\n const result = await adapter.exec('agentsh', args, { env });\n if (isTransportFailure(result)) {\n throw new RuntimeError({\n sessionId,\n command: `readFile ${path}`,\n stderr: result.stderr,\n });\n }\n if (result.exitCode !== 0) {\n return {\n success: false as const,\n path,\n error: result.stderr || 'readFile failed',\n };\n }\n return { success: true as const, path, content: result.stdout };\n },\n\n async stop() {\n await adapter.stop?.();\n },\n };\n}\n\nfunction isTransportFailure(result: ExecResult): boolean {\n return result.exitCode === 127 && result.stderr.includes('agentsh');\n}\n","import type {\n SandboxAdapter,\n SecuredSandbox,\n SecureConfig,\n} from './core/types.js';\nimport { provision } from './core/provision.js';\nimport { createSecuredSandbox } from './core/runtime.js';\n\nexport async function secureSandbox(\n adapter: SandboxAdapter,\n config?: SecureConfig,\n): Promise<SecuredSandbox> {\n const resolvedConfig = config ?? {};\n const { sessionId, securityMode, passthrough } = await provision(adapter, {\n workspace: '/workspace',\n ...resolvedConfig,\n });\n return createSecuredSandbox(adapter, sessionId, securityMode, { passthrough });\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAEO,IAAM,iBAAiB;AAEvB,IAAM,YAAoD;AAAA,EAC/D,UAAU;AAAA,IACR,aACE;AAAA,IACF,aACE;AAAA,EACJ;AAAA,EACA,UAAU;AAAA,IACR,aACE;AAAA,IACF,aACE;AAAA,EACJ;AACF;AAQO,SAAS,YACd,SACA,MACA,UACQ;AACR,MAAI,UAAU;AACZ,WAAO;AAAA,EACT;AAEA,QAAM,mBAAmB,UAAU,OAAO;AAC1C,MAAI,oBAAoB,iBAAiB,IAAI,GAAG;AAC9C,WAAO,iBAAiB,IAAI;AAAA,EAC9B;AAEA,QAAM,IAAI,eAAe;AAAA,IACvB,UAAU;AAAA,IACV,QAAQ;AAAA,IACR,SAAS,mCAAmC,OAAO;AAAA,EACrD,CAAC;AACH;AAMO,SAAS,mBAAmB,UAA4B;AAC7D,SAAO;AAAA,IACL,cAAc,QAAQ;AAAA,IACtB,kBAAkB,QAAQ;AAAA,IAC1B,yBAAyB,QAAQ;AAAA,EACnC;AACF;AAOO,SAAS,UACd,SACA,MACA,aACQ;AACR,MAAI,aAAa;AACf,WAAO;AAAA,EACT;AAEA,SAAO,4DAA4D,OAAO,YAAY,OAAO,IAAI,IAAI;AACvG;;;ACzEA,OAAO,UAAU;AAgCV,IAAM,qBAAwC;AAAA,EACnD,QAAQ;AAAA,EACR,OAAO;AAAA,IACL;AAAA,MACE,MAAM;AAAA,MACN,KAAK;AAAA,MACL,QAAQ;AAAA,MACR,iBAAiB;AAAA,IACnB;AAAA,IACA;AAAA,MACE,MAAM;AAAA,MACN,KAAK;AAAA,MACL,QAAQ;AAAA,MACR,iBAAiB;AAAA,IACnB;AAAA,EACF;AAAA,EACA,WAAW;AAAA,IACT;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAMO,IAAM,+BAAuF;AAAA,EAClG,OAAO,EAAE,SAAS,MAAM,UAAU,EAAE;AAAA,EACpC,KAAK,EAAE,SAAS,MAAM,UAAU,EAAE;AAAA,EAClC,SAAS,EAAE,SAAS,MAAM,UAAU,EAAE;AACxC;AAKA,SAAS,0BAA0B,QAAiD;AAClF,QAAM,SAAkC,EAAE,SAAS,OAAO,WAAW,KAAK;AAC1E,MAAI,OAAO,aAAa,OAAW,QAAO,WAAW,OAAO;AAC5D,MAAI,OAAO,YAAY,OAAW,QAAO,UAAU,OAAO;AAC1D,MAAI,OAAO,cAAc,OAAW,QAAO,aAAa,OAAO;AAC/D,MAAI,OAAO,cAAc,OAAW,QAAO,cAAc,OAAO;AAChE,MAAI,OAAO,SAAS,OAAW,QAAO,OAAO,OAAO;AACpD,MAAI,OAAO,YAAY,OAAW,QAAO,UAAU,OAAO;AAC1D,MAAI,OAAO,YAAY,OAAW,QAAO,UAAU,OAAO;AAC1D,SAAO;AACT;AAEO,SAAS,qBAAqB,MAAgC;AACnE,QAAM,SAAkC;AAAA,IACtC,QAAQ;AAAA,MACN,MAAM;AAAA,QACJ,MAAM;AAAA,MACR;AAAA,IACF;AAAA,IACA,MAAM;AAAA,MACJ,MAAM;AAAA,IACR;AAAA,IACA,UAAU;AAAA,MACR,YAAY;AAAA,MACZ,KAAK;AAAA,MACL,SAAS;AAAA,IACX;AAAA,IACA,SAAS;AAAA,MACP,SAAS;AAAA,MACT,gBAAgB;AAAA,MAChB,MAAM,EAAE,SAAS,KAAK;AAAA,MACtB,SAAS,EAAE,SAAS,KAAK;AAAA,MACzB,SAAS,EAAE,SAAS,KAAK;AAAA,IAC3B;AAAA,EACF;AACA,MAAI,KAAK,WAAY,QAAO,aAAa,KAAK;AAK9C,MAAI,KAAK,MAAM;AACb,IAAC,OAAO,OAAe,OAAO,EAAE,SAAS,MAAM,MAAM,KAAK,KAAK,KAAK;AAAA,EACtE;AAGA,MAAI,KAAK,gBAAgB;AACvB,UAAM,OAAQ,OAAO,OAAe;AACpC,QAAI,KAAK,eAAe,YAAa,MAAK,eAAe,KAAK,eAAe;AAC7E,QAAI,KAAK,eAAe,aAAc,MAAK,gBAAgB,KAAK,eAAe;AAC/E,QAAI,KAAK,eAAe,eAAgB,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAGA,MAAI,KAAK,QAAS,QAAO,UAAU,EAAE,GAAG,KAAK,QAAQ;AAGrD,QAAM,cAAuC,CAAC;AAC9C,MAAI,KAAK,UAAW,aAAY,aAAa;AAC7C,MAAI,KAAK,UAAU;AACjB,QAAI,KAAK,SAAS,QAAS,aAAY,WAAW,KAAK,SAAS;AAChE,QAAI,KAAK,SAAS,gBAAgB,OAAW,aAAY,eAAe,KAAK,SAAS;AACtF,QAAI,KAAK,SAAS,eAAgB,aAAY,kBAAkB,KAAK,SAAS;AAC9E,QAAI,KAAK,SAAS,YAAa,aAAY,eAAe,KAAK,SAAS;AACxE,QAAI,KAAK,SAAS,gBAAiB,aAAY,mBAAmB,KAAK,SAAS;AAAA,EAClF;AACA,MAAI,OAAO,KAAK,WAAW,EAAE,SAAS,EAAG,QAAO,WAAW;AAG3D,MAAI,KAAK,OAAO;AACd,UAAM,WAAoC,CAAC;AAC3C,QAAI,KAAK,MAAM,YAAY,OAAW,UAAS,UAAU,KAAK,MAAM;AACpE,QAAI,KAAK,MAAM,WAAY,UAAS,cAAc,KAAK,MAAM;AAC7D,WAAO,QAAQ;AAAA,EACjB;AAGA,MAAI,KAAK,eAAe;AACtB,IAAC,OAAO,QAAgB,SAAS;AAAA,MAC/B,GAAI,KAAK,cAAc,gBAAgB,UAAa,EAAE,eAAe,KAAK,cAAc,YAAY;AAAA,MACpG,GAAI,KAAK,cAAc,kBAAkB,UAAa,EAAE,iBAAiB,KAAK,cAAc,cAAc;AAAA,MAC1G,GAAI,KAAK,cAAc,iBAAiB,UAAa,EAAE,eAAe,KAAK,cAAc,aAAa;AAAA,IACxG;AAAA,EACF;AAGA,MAAI,KAAK,MAAM,aAAa,QAAW;AACrC,IAAC,OAAO,QAAgB,KAAK,WAAW,KAAK,KAAK;AAAA,EACpD;AAGA,MAAI,KAAK,kBAAkB;AACzB,UAAM,MAAO,OAAO,QAAgB;AACpC,QAAI,KAAK,iBAAiB,cAAe,KAAI,iBAAiB,KAAK,iBAAiB;AACpF,QAAI,KAAK,iBAAiB,gBAAiB,KAAI,oBAAoB,KAAK,iBAAiB;AAAA,EAC3F;AAGA,MAAI,KAAK,gBAAgB;AACvB,UAAM,MAAO,OAAO,QAAgB;AACpC,QAAI,KAAK,eAAe,WAAW,OAAW,KAAI,SAAS,KAAK,eAAe;AAC/E,QAAI,KAAK,eAAe,aAAa;AACnC,UAAI,eAAe;AAAA,QACjB,GAAI,KAAK,eAAe,YAAY,YAAY,UAAa,EAAE,SAAS,KAAK,eAAe,YAAY,QAAQ;AAAA,QAChH,GAAI,KAAK,eAAe,YAAY,uBAAuB,UAAa,EAAE,sBAAsB,KAAK,eAAe,YAAY,mBAAmB;AAAA,MACrJ;AAAA,IACF;AAAA,EACF;AAGA,MAAI,KAAK,SAAS;AAChB,IAAC,OAAO,QAAgB,UAAU,EAAE,GAAG,KAAK,QAAQ;AAAA,EACtD;AAGA,MAAI,KAAK,aAAa;AACpB,IAAC,OAAO,QAAgB,eAAe,EAAE,GAAG,KAAK,YAAY;AAAA,EAC/D;AAGA,MAAI,KAAK,OAAO;AACd,WAAO,QAAQ,EAAE,GAAG,KAAK,MAAM;AAAA,EACjC;AAGA,MAAI,KAAK,KAAK;AACZ,UAAM,SAAkC,CAAC;AACzC,QAAI,KAAK,IAAI,KAAM,QAAO,OAAO,KAAK,IAAI;AAC1C,QAAI,KAAK,IAAI,SAAU,QAAO,WAAW,KAAK,IAAI;AAClD,QAAI,KAAK,IAAI,gBAAgB;AAC3B,aAAO,kBAAkB,KAAK,IAAI,eAAe,IAAI,QAAM;AAAA,QACzD,MAAM,EAAE;AAAA,QACR,SAAS,EAAE;AAAA,QACX,OAAO,EAAE;AAAA,MACX,EAAE;AAAA,IACJ;AACA,WAAO,MAAM;AAAA,EACf;AAGA,MAAI,KAAK,kBAAkB;AACzB,WAAO,WAAW;AAAA,MAChB,GAAI,KAAK,iBAAiB,OAAO,EAAE,KAAK,KAAK,iBAAiB,IAAI;AAAA,MAClE,GAAI,KAAK,iBAAiB,iBAAiB,EAAE,SAAS,KAAK,iBAAiB,cAAc;AAAA,IAC5F;AAAA,EACF;AAGA,MAAI,KAAK,UAAW,QAAO,YAAY,EAAE,GAAG,KAAK,UAAU;AAG3D,MAAI,KAAK,QAAS,QAAO,UAAU,EAAE,GAAG,KAAK,QAAQ;AAGrD,MAAI,KAAK,QAAQ;AACf,UAAM,YAAqC,CAAC;AAC5C,QAAI,KAAK,OAAO,KAAM,WAAU,OAAO,KAAK,OAAO;AACnD,QAAI,KAAK,OAAO,cAAe,WAAU,iBAAiB,KAAK,OAAO;AACtE,WAAO,SAAS;AAAA,EAClB;AAGA,MAAI,KAAK,aAAa;AACpB,UAAM,SAAkC,CAAC;AACzC,QAAI,KAAK,YAAY,gBAAgB,OAAW,QAAO,eAAe,KAAK,YAAY;AACvF,QAAI,KAAK,YAAY,kBAAkB,OAAW,QAAO,iBAAiB,KAAK,YAAY;AAC3F,WAAO,cAAc;AAAA,EACvB;AAGA,QAAM,QAAQ,KAAK,gBAAgB,QAAQ,SAAa,KAAK,eAAe;AAC5E,MAAI,OAAO;AACT,WAAO,eAAe;AAAA,MACpB,SAAS;AAAA,MACT,QAAQ,MAAM,UAAU;AAAA,MACxB,OAAO,MAAM,MAAM,IAAI,QAAM;AAAA,QAC3B,MAAM,EAAE;AAAA,QACR,KAAK,EAAE;AAAA,QACP,QAAQ,EAAE;AAAA,QACV,kBAAkB,EAAE,mBAAmB;AAAA,MACzC,EAAE;AAAA,MACF,GAAI,MAAM,WAAW,SAAS,EAAE,WAAW,MAAM,UAAU,IAAI,CAAC;AAAA,IAClE;AAAA,EACF;AAGA,MAAI,KAAK,eAAe;AACtB,UAAM,KAAK,KAAK;AAChB,UAAM,YAAqD,CAAC;AAG5D,eAAW,CAAC,MAAM,GAAG,KAAK,OAAO,QAAQ,4BAA4B,GAAG;AACtE,gBAAU,IAAI,IAAI,EAAE,GAAG,IAAI;AAAA,IAC7B;AAGA,QAAI,GAAG,WAAW;AAChB,iBAAW,CAAC,MAAM,KAAK,KAAK,OAAO,QAAQ,GAAG,SAAS,GAAG;AACxD,YAAI,UAAU,OAAO;AACnB,oBAAU,IAAI,IAAI,EAAE,SAAS,MAAM;AAAA,QACrC,WAAW,UAAU,MAAM;AACzB,oBAAU,IAAI,IAAI,EAAE,GAAI,UAAU,IAAI,KAAK,CAAC,GAAI,SAAS,KAAK;AAAA,QAChE,OAAO;AAEL,gBAAM,OAAO,UAAU,IAAI,KAAK,CAAC;AACjC,oBAAU,IAAI,IAAI,EAAE,GAAG,MAAM,GAAG,0BAA0B,KAAK,EAAE;AAAA,QACnE;AAAA,MACF;AAAA,IACF;AAEA,WAAO,iBAAiB;AAAA,MACtB,SAAS;AAAA,MACT,OAAO,GAAG,SAAS;AAAA,MACnB;AAAA,IACF;AAAA,EACF;AAEA,SAAO,KAAK,KAAK,QAAQ,EAAE,WAAW,GAAG,CAAC;AAC5C;;;AC9RA,eAAsB,iBAA8C;AAClE,MAAI;AACF,UAAM,EAAE,MAAM,IAAI,MAAM,OAAO,mBAAoB;AACnD,UAAM,OAAO,MAAM,cAAc;AACjC,UAAM,MAAM,MAAM,YAAY;AAC9B,QAAI,CAAC,KAAK,WAAW,IAAI,YAAY,oCAAoC;AACvE,aAAO;AAAA,IACT;AACA,UAAM,SAAS,IAAI,cAAc,GAAG,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG;AAChE,WAAO,MAAM,IAAI,OAAO,IAAI,IAAI,MAAM,IAAI,KAAK;AAAA,EACjD,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACCA,IAAM,qBAAmD;AAAA,EACvD,MAAM;AAAA,EACN,UAAU;AAAA,EACV,iBAAiB;AAAA,EACjB,SAAS;AACX;AAEA,SAAS,aAAa,UAAwB,UAAiC;AAC7E,SAAO,mBAAmB,QAAQ,IAAI,mBAAmB,QAAQ;AACnE;AAIA,SAAS,QAAQ,OAA8C;AAC7D,QAAM,UAAU,MAAM,KAAK;AAC3B,MAAI,YAAY,SAAU,QAAO;AACjC,MAAI,YAAY,UAAW,QAAO;AAClC,QAAM,IAAI,kBAAkB;AAAA,IAC1B,OAAO;AAAA,IACP,SAAS;AAAA,IACT,QAAQ,6BAA6B,OAAO;AAAA,EAC9C,CAAC;AACH;AAIA,IAAM,gBAAgB,CAAC,0BAA0B,kBAAkB;AAEnE,eAAe,aAAa,SAA2C;AACrE,aAAW,QAAQ,eAAe;AAChC,UAAM,QAAQ,QAAQ,aAClB,MAAM,QAAQ,WAAW,IAAI,KAC5B,MAAM,QAAQ,KAAK,QAAQ,CAAC,MAAM,IAAI,CAAC,GAAG,aAAa;AAC5D,QAAI,MAAO,QAAO;AAAA,EACpB;AACA,SAAO;AACT;AAIA,SAAS,MAAM,IAA2B;AACxC,SAAO,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,EAAE,CAAC;AACzD;AAWA,eAAsB,UACpB,SACA,SAAuB,CAAC,GACE;AAC1B,QAAM;AAAA,IACJ,QAAQ;AAAA,IACR,YAAY;AAAA,IACZ;AAAA,IACA,kBAAkB;AAAA,IAClB,iBAAiB;AAAA,IACjB,aAAa;AAAA,IACb;AAAA,IACA;AAAA,IACA,qBAAqB;AAAA,IACrB;AAAA,IACA,WAAW;AAAA,IACX;AAAA,IACA,aAAa;AAAA,IACb;AAAA,IACA;AAAA,IACA,cAAc;AAAA,EAChB,IAAI;AAGJ,QAAM,SAAS,YAAY,eAAe,SAAS,IAAI,aAAa;AAEpE,MAAI,eAA6B;AAEjC,MAAI,oBAAoB,WAAW;AAYjC,UAAM,YAAY,OAAO;AAEzB,mBAAe,OAAO,gBAAgB;AAEtC,QAAI,uBAAuB,aAAa,cAAc,mBAAmB,GAAG;AAC1E,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ,kBAAkB,YAAY,8BAA8B,mBAAmB;AAAA,MACzF,CAAC;AAAA,IACH;AAGA,QAAIA,aAAY,OAAO;AACvB,QAAI,CAACA,YAAW;AACd,YAAM,YAAY,MAAM,QAAQ,KAAK,MAAM,CAAC,MAAM,0BAA0B,CAAC;AAC7E,MAAAA,aAAY,UAAU,OAAO,KAAK;AAAA,IACpC;AACA,QAAI,CAACA,YAAW;AACd,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAEA,WAAO,EAAE,WAAAA,YAAW,cAAc,aAAa,KAAK;AAAA,EACtD;AAKA,QAAM,SAAS,MAAM,aAAa,OAAO;AAEzC,MAAI,oBAAoB,gBAAgB;AACtC,QAAI,CAAC,QAAQ;AACX,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,cAAc,IAAI,OAAK,WAAW,CAAC,EAAE,EAAE,KAAK,MAAM;AAAA,QAC3D,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAAA,EAEF,WAAW,oBAAoB,cAAc,oBAAoB,UAAU;AAEzE,QAAI,CAAC,QAAQ;AAEX,YAAM,OACJ,gBAAgB,MAAM,WAAW,OAAO;AAE1C,UAAI,oBAAoB,YAAY;AAElC,cAAM,eAAe,SAAS,gBAAgB,MAAM,gBAAgB;AAAA,MACtE,OAAO;AAEL,cAAM,aAAa,SAAS,gBAAgB,MAAM,gBAAgB;AAAA,MACpE;AAGA,UAAI,CAAC,oBAAoB;AACvB,cAAM;AAAA,UACJ;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF;AAAA,MACF;AAGA,YAAM,WAAW;AAAA,QACf,EAAE,KAAK,gBAAgB,MAAM,yBAAyB;AAAA,QACtD,EAAE,KAAK,2BAA2B,MAAM,8BAA8B;AAAA,QACtE,EAAE,KAAK,yBAAyB,MAAM,kCAAkC;AAAA,MAC1E;AACA,iBAAW,EAAE,KAAK,KAAK,KAAK,UAAU;AACpC,cAAM,gBAAgB,MAAM,QAAQ;AAAA,UAClC;AAAA,UACA,CAAC,MAAM,QAAQ,KAAK,IAAI;AAAA,UACxB,EAAE,MAAM,KAAK;AAAA,QACf;AACA,YAAI,cAAc,aAAa,GAAG;AAChC,gBAAM,IAAI,kBAAkB;AAAA,YAC1B,OAAO;AAAA,YACP,SAAS,mBAAmB,GAAG,IAAI,IAAI;AAAA,YACvC,QAAQ,cAAc;AAAA,UACxB,CAAC;AAAA,QACH;AAAA,MACF;AAAA,IACF;AAAA,EACF;AAGA,iBAAe,MAAM,mBAAmB,OAAO;AAG/C,MAAI,uBAAuB,aAAa,cAAc,mBAAmB,GAAG;AAC1E,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,2BAA2B,YAAY,8BAA8B,mBAAmB;AAAA,IAClG,CAAC;AAAA,EACH;AAIA,QAAM,UAAU,iBAAiB,UAAU,iBAAiB;AAC5D,QAAM,YAAY,qBAAqB;AAGvC,QAAM,aAAa,MAAM,QAAQ;AAAA,IAC/B;AAAA,IACA;AAAA,MACE;AAAA,MAAQ;AAAA,MACR;AAAA,MAAU;AAAA,MACV;AAAA,MAAU;AAAA,MACV;AAAA,MACA;AAAA,IACF;AAAA,IACA,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,WAAW,aAAa,GAAG;AAC7B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,WAAW;AAAA,IACrB,CAAC;AAAA,EACH;AAKA,QAAM,cAAc,MAAM,QAAQ;AAAA,IAChC;AAAA,IACA,CAAC,MAAM,qBAAqB;AAAA,IAC5B,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,YAAY,aAAa,GAAG;AAC9B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,YAAY;AAAA,IACtB,CAAC;AAAA,EACH;AAGA,QAAM,QAAQ,KAAK,SAAS,CAAC,MAAM,OAAO,eAAe,GAAG,EAAE,MAAM,KAAK,CAAC;AAE1E,QAAM,QAAQ;AAAA,IACZ;AAAA,IACA,iBAAiB;AAAA,IACjB,EAAE,MAAM,KAAK;AAAA,EACf;AAGA,QAAM,QAAQ;AAAA,IACZ;AAAA,IACA,gBAAgB,MAAM;AAAA,IACtB,EAAE,MAAM,KAAK;AAAA,EACf;AAGA,QAAM,eAAe,qBAAqB;AAAA,IACxC;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA,GAAG;AAAA,EACL,CAAC;AAED,QAAM,QAAQ,UAAU,2BAA2B,cAAc;AAAA,IAC/D,MAAM;AAAA,EACR,CAAC;AAGD,QAAM,iBAAiB,MAAM,QAAQ;AAAA,IACnC;AAAA,IACA,CAAC,gBAAgB,SAAS,KAAK,SAAS,SAAS,OAAO,MAAM,GAAG;AAAA,IACjE,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,eAAe,aAAa,GAAG;AACjC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,eAAe;AAAA,IACzB,CAAC;AAAA,EACH;AAEA,QAAM,kBAAkB,MAAM,QAAQ;AAAA,IACpC;AAAA,IACA,CAAC,gBAAgB,SAAS,KAAK,SAAS,SAAS,OAAO,MAAM,GAAG;AAAA,IACjE,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,gBAAgB,aAAa,GAAG;AAClC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,gBAAgB;AAAA,IAC1B,CAAC;AAAA,EACH;AAEA,QAAM,cAAc,MAAM,QAAQ;AAAA,IAChC;AAAA,IACA,CAAC,MAAM,aAAa,eAAe;AAAA,IACnC,EAAE,MAAM,KAAK;AAAA,EACf;AACA,MAAI,YAAY,aAAa,GAAG;AAC9B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,YAAY;AAAA,IACtB,CAAC;AAAA,EACH;AAKA,QAAM,QAAQ,KAAK,SAAS,CAAC,MAAM,SAAS,GAAG,EAAE,MAAM,KAAK,CAAC;AAG7D,QAAM,eAAe,MAAM,QAAQ;AAAA,IACjC;AAAA,IACA,CAAC,UAAU,YAAY,yBAAyB;AAAA,IAChD,EAAE,UAAU,MAAM,MAAM,KAAK;AAAA,EAC/B;AACA,MAAI,aAAa,aAAa,GAAG;AAC/B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,aAAa;AAAA,IACvB,CAAC;AAAA,EACH;AAGA,QAAM,YAAY,OAAO;AAGzB,QAAM,gBAAgB,MAAM,QAAQ,KAAK,WAAW;AAAA,IAClD;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,cAAc,aAAa,GAAG;AAChC,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,cAAc;AAAA,IACxB,CAAC;AAAA,EACH;AAEA,MAAI;AACJ,MAAI;AACF,UAAM,cAAc,KAAK,MAAM,cAAc,MAAM;AACnD,gBAAY,YAAY;AAAA,EAC1B,QAAQ;AAEN,UAAM,QAAQ,cAAc,OAAO,MAAM,4BAA4B;AACrE,QAAI,OAAO;AACT,kBAAY,MAAM,CAAC;AAAA,IACrB,OAAO;AACL,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS;AAAA,QACT,QAAQ,mCAAmC,cAAc,MAAM;AAAA,MACjE,CAAC;AAAA,IACH;AAAA,EACF;AAGA,QAAM,uBAAuB,eAAgB,MAAM,eAAe;AAClE,MAAI,sBAAsB;AACxB,UAAM,QAAQ,KAAK,QAAQ;AAAA,MACzB;AAAA,MACA;AAAA,MACA,mCAAmC,SAAS;AAAA,MAC5C;AAAA,MACA;AAAA,MACA;AAAA,MACA,KAAK,UAAU,EAAE,aAAa,qBAAqB,CAAC;AAAA,IACtD,CAAC;AAAA,EACH;AAKA,SAAO,EAAE,WAAW,aAAa;AACnC;AAIA,eAAe,WACb,SACwC;AACxC,QAAM,SAAS,MAAM,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC;AACjD,MAAI,OAAO,aAAa,GAAG;AACzB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,OAAO;AAAA,IACjB,CAAC;AAAA,EACH;AACA,SAAO,QAAQ,OAAO,MAAM;AAC9B;AAEA,eAAe,eACb,SACA,SACA,MACA,aACe;AACf,QAAM,MAAM,UAAU,SAAS,MAAM,WAAW;AAGhD,QAAM,aAAa,MAAM,QAAQ,KAAK,QAAQ;AAAA,IAC5C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AAED,MAAI,WAAW,aAAa,GAAG;AAE7B,QAAI;AACJ,QAAI;AACF,mBAAa,MAAM,QAAQ,KAAK,QAAQ;AAAA,QACtC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAAA,IACH,QAAQ;AACN,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,cAAc,GAAG;AAAA,QAC1B,QAAQ,WAAW,UAAU;AAAA,MAC/B,CAAC;AAAA,IACH;AACA,QAAI,WAAW,aAAa,GAAG;AAC7B,YAAM,IAAI,kBAAkB;AAAA,QAC1B,OAAO;AAAA,QACP,SAAS,WAAW,GAAG;AAAA,QACvB,QAAQ,WAAW;AAAA,MACrB,CAAC;AAAA,IACH;AAAA,EACF;AAGA,QAAM,YAAY,MAAM,QAAQ,KAAK,OAAO;AAAA,IAC1C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,UAAU,aAAa,GAAG;AAC5B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,UAAU;AAAA,IACpB,CAAC;AAAA,EACH;AACF;AAEA,eAAe,aACb,SACA,SACA,MACA,aACe;AACf,QAAM,MAAM,UAAU,SAAS,MAAM,WAAW;AAGhD,QAAM,WAAW,MAAM,MAAM,GAAG;AAChC,MAAI,CAAC,SAAS,IAAI;AAChB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS,SAAS,GAAG;AAAA,MACrB,QAAQ,QAAQ,SAAS,MAAM,KAAK,SAAS,UAAU;AAAA,IACzD,CAAC;AAAA,EACH;AAEA,QAAM,SAAS,OAAO,KAAK,MAAM,SAAS,YAAY,CAAC;AAGvD,QAAM,QAAQ,UAAU,uBAAuB,MAAM;AACrD,QAAM,YAAY,MAAM,QAAQ,KAAK,OAAO;AAAA,IAC1C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AACD,MAAI,UAAU,aAAa,GAAG;AAC5B,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,UAAU;AAAA,IACpB,CAAC;AAAA,EACH;AACF;AAEA,eAAe,eACb,SACA,SACA,MACA,kBACA,UACe;AACf,QAAM,WAAW,YAAY,SAAS,MAAM,gBAAgB;AAC5D,QAAM,WAAW,mBAAmB,QAAQ;AAE5C,MAAI;AAEJ,aAAW,OAAO,UAAU;AAC1B,UAAM,SAAS,MAAM,QAAQ,KAAK,MAAM,CAAC,MAAM,GAAG,CAAC;AACnD,QAAI,OAAO,aAAa,KAAK,OAAO,OAAO,KAAK,GAAG;AACjD,eAAS,OAAO,OAAO,KAAK;AAC5B;AAAA,IACF;AAAA,EACF;AAEA,MAAI,WAAW,QAAW;AACxB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ;AAAA,IACV,CAAC;AAAA,EACH;AAEA,MAAI,WAAW,UAAU;AACvB,UAAM,IAAI,eAAe;AAAA,MACvB;AAAA,MACA;AAAA,MACA,SAAS,+BAA+B,QAAQ,SAAS,MAAM;AAAA,IACjE,CAAC;AAAA,EACH;AACF;AAEA,eAAe,mBACb,SACuB;AACvB,QAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,CAAC,UAAU,YAAY,MAAM,CAAC;AAC3E,MAAI,OAAO,aAAa,GAAG;AACzB,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,OAAO;AAAA,IACjB,CAAC;AAAA,EACH;AAGA,QAAM,aAAa,OAAO,UAAU,OAAO;AAC3C,MAAI;AACJ,MAAI;AACF,aAAS,KAAK,MAAM,UAAU;AAAA,EAChC,QAAQ;AACN,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,gCAAgC,WAAW,MAAM,GAAG,GAAG,CAAC;AAAA,IAClE,CAAC;AAAA,EACH;AAEA,QAAM,OAAO,OAAO;AACpB,QAAM,aAA6B,CAAC,QAAQ,YAAY,iBAAiB,SAAS;AAClF,MAAI,CAAC,WAAW,SAAS,IAAoB,GAAG;AAC9C,UAAM,IAAI,kBAAkB;AAAA,MAC1B,OAAO;AAAA,MACP,SAAS;AAAA,MACT,QAAQ,2BAA2B,IAAI;AAAA,IACzC,CAAC;AAAA,EACH;AACA,SAAO;AACT;AAEA,eAAe,YAAY,SAAwC;AACjE,QAAM,aAAa;AACnB,QAAM,UAAU;AAEhB,WAAS,IAAI,GAAG,IAAI,YAAY,KAAK;AACnC,UAAM,SAAS,MAAM,QAAQ,KAAK,QAAQ;AAAA,MACxC;AAAA,MACA;AAAA,IACF,CAAC;AACD,QAAI,OAAO,aAAa,GAAG;AACzB;AAAA,IACF;AACA,QAAI,IAAI,aAAa,GAAG;AACtB,YAAM,MAAM,OAAO;AAAA,IACrB;AAAA,EACF;AAEA,QAAM,IAAI,kBAAkB;AAAA,IAC1B,OAAO;AAAA,IACP,SAAS;AAAA,IACT,QAAQ;AAAA,EACV,CAAC;AACH;;;AC5lBA,eAAe,WAAwD;AACrE,QAAM,KAAK,MAAM,eAAe;AAChC,SAAO,KAAK,EAAE,aAAa,GAAG,IAAI;AACpC;AAGA,SAAS,cAAc,KAA6B;AAClD,MAAI;AACF,UAAM,OAAO,KAAK,MAAM,IAAI,MAAM;AAClC,UAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,WAAO;AAAA,MACL,UAAU,OAAO,aAAa,IAAI;AAAA,MAClC,QAAQ,OAAO,UAAU;AAAA,MACzB,QAAQ,OAAO,UAAU,OAAO,OAAO,WAAW;AAAA,IACpD;AAAA,EACF,QAAQ;AAEN,WAAO;AAAA,EACT;AACF;AAEO,SAAS,qBACd,SACA,WACA,cACA,SACgB;AAChB,MAAI,SAAS,aAAa;AACxB,WAAO,yBAAyB,SAAS,WAAW,YAAY;AAAA,EAClE;AACA,SAAO,qBAAqB,SAAS,WAAW,YAAY;AAC9D;AAOA,SAAS,yBACP,SACA,WACA,cACgB;AAChB,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IAEA,MAAM,KAAK,SAAS,MAAM;AACxB,YAAM,SAAS,MAAM,QAAQ,KAAK,QAAQ,CAAC,MAAM,OAAO,GAAG;AAAA,QACzD,KAAK,MAAM;AAAA,MACb,CAAC;AACD,aAAO;AAAA,IACT;AAAA,IAEA,MAAM,UAAU,MAAM,SAAS;AAC7B,YAAM,MAAM,OAAO,KAAK,SAAS,OAAO,EAAE,SAAS,QAAQ;AAC3D,YAAM,SAAS,MAAM,QAAQ,KAAK,MAAM;AAAA,QACtC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AACD,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,KAAK;AAAA,IACxC;AAAA,IAEA,MAAM,SAAS,MAAM;AACnB,YAAM,SAAS,MAAM,QAAQ,KAAK,OAAO,CAAC,IAAI,CAAC;AAC/C,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,MAAM,SAAS,OAAO,OAAO;AAAA,IAChE;AAAA,IAEA,MAAM,OAAO;AACX,YAAM,QAAQ,OAAO;AAAA,IACvB;AAAA,EACF;AACF;AAGA,SAAS,qBACP,SACA,WACA,cACgB;AAChB,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IAEA,MAAM,KAAK,SAAS,MAAM;AACxB,YAAM,OAAO;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AACA,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,WAAW,EAAE,KAAK,MAAM,KAAK,IAAI;AACvC,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,QAAQ;AAC3D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA;AAAA,UACA,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,aAAO,cAAc,MAAM;AAAA,IAC7B;AAAA,IAEA,MAAM,UAAU,MAAM,SAAS;AAC7B,YAAM,MAAM,OAAO,KAAK,SAAS,OAAO,EAAE,SAAS,QAAQ;AAC3D,YAAM,OAAO;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AACA,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,EAAE,IAAI,CAAC;AAC1D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA,SAAS,aAAa,IAAI;AAAA,UAC1B,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,KAAK;AAAA,IACxC;AAAA,IAEA,MAAM,SAAS,MAAM;AACnB,YAAM,OAAO,CAAC,QAAQ,WAAW,MAAM,OAAO,IAAI;AAClD,YAAM,MAAM,MAAM,SAAS;AAC3B,YAAM,SAAS,MAAM,QAAQ,KAAK,WAAW,MAAM,EAAE,IAAI,CAAC;AAC1D,UAAI,mBAAmB,MAAM,GAAG;AAC9B,cAAM,IAAI,aAAa;AAAA,UACrB;AAAA,UACA,SAAS,YAAY,IAAI;AAAA,UACzB,QAAQ,OAAO;AAAA,QACjB,CAAC;AAAA,MACH;AACA,UAAI,OAAO,aAAa,GAAG;AACzB,eAAO;AAAA,UACL,SAAS;AAAA,UACT;AAAA,UACA,OAAO,OAAO,UAAU;AAAA,QAC1B;AAAA,MACF;AACA,aAAO,EAAE,SAAS,MAAe,MAAM,SAAS,OAAO,OAAO;AAAA,IAChE;AAAA,IAEA,MAAM,OAAO;AACX,YAAM,QAAQ,OAAO;AAAA,IACvB;AAAA,EACF;AACF;AAEA,SAAS,mBAAmB,QAA6B;AACvD,SAAO,OAAO,aAAa,OAAO,OAAO,OAAO,SAAS,SAAS;AACpE;;;AC5LA,eAAsB,cACpB,SACA,QACyB;AACzB,QAAM,iBAAiB,UAAU,CAAC;AAClC,QAAM,EAAE,WAAW,cAAc,YAAY,IAAI,MAAM,UAAU,SAAS;AAAA,IACxE,WAAW;AAAA,IACX,GAAG;AAAA,EACL,CAAC;AACD,SAAO,qBAAqB,SAAS,WAAW,cAAc,EAAE,YAAY,CAAC;AAC/E;","names":["sessionId"]}
@@ -1,4 +1,4 @@
1
- import { E as ExecResult, f as SecurityMode, b as SecuredSandbox } from '../types-CUqsllMs.js';
1
+ import { E as ExecResult, f as SecurityMode, b as SecuredSandbox } from '../types-S_fIEFHD.js';
2
2
 
3
3
  interface MockConfig {
4
4
  commands?: Record<string, ExecResult>;
@@ -1,3 +1,99 @@
1
+ interface ServerConfigOpts {
2
+ watchtower?: string;
3
+ realPaths?: boolean;
4
+ threatFeeds?: false | ThreatFeedsConfig;
5
+ packageChecks?: false | PackageChecksConfig;
6
+ grpc?: {
7
+ addr: string;
8
+ };
9
+ serverTimeouts?: {
10
+ readTimeout?: string;
11
+ writeTimeout?: string;
12
+ maxRequestSize?: string;
13
+ };
14
+ logging?: {
15
+ level?: string;
16
+ format?: string;
17
+ output?: string;
18
+ };
19
+ sessions?: {
20
+ baseDir?: string;
21
+ maxSessions?: number;
22
+ defaultTimeout?: string;
23
+ idleTimeout?: string;
24
+ cleanupInterval?: string;
25
+ };
26
+ audit?: {
27
+ enabled?: boolean;
28
+ sqlitePath?: string;
29
+ };
30
+ sandboxLimits?: {
31
+ maxMemoryMb?: number;
32
+ maxCpuPercent?: number;
33
+ maxProcesses?: number;
34
+ };
35
+ fuse?: {
36
+ deferred?: boolean;
37
+ };
38
+ networkIntercept?: {
39
+ interceptMode?: string;
40
+ proxyListenAddr?: string;
41
+ };
42
+ seccompDetails?: {
43
+ execve?: boolean;
44
+ fileMonitor?: {
45
+ enabled?: boolean;
46
+ enforceWithoutFuse?: boolean;
47
+ };
48
+ };
49
+ cgroups?: {
50
+ enabled?: boolean;
51
+ };
52
+ unixSockets?: {
53
+ enabled?: boolean;
54
+ };
55
+ proxy?: {
56
+ mode?: string;
57
+ port?: number;
58
+ providers?: Record<string, string>;
59
+ };
60
+ dlp?: {
61
+ mode?: string;
62
+ patterns?: Record<string, boolean>;
63
+ customPatterns?: Array<{
64
+ name: string;
65
+ display: string;
66
+ regex: string;
67
+ }>;
68
+ };
69
+ policiesOverride?: {
70
+ dir?: string;
71
+ defaultPolicy?: string;
72
+ };
73
+ approvals?: {
74
+ enabled?: boolean;
75
+ mode?: string;
76
+ timeout?: string;
77
+ };
78
+ metrics?: {
79
+ enabled?: boolean;
80
+ path?: string;
81
+ };
82
+ health?: {
83
+ path?: string;
84
+ readinessPath?: string;
85
+ };
86
+ development?: {
87
+ disableAuth?: boolean;
88
+ verboseErrors?: boolean;
89
+ };
90
+ }
91
+ /**
92
+ * Default threat feeds: URLhaus (malware) + Phishing.Database (phishing).
93
+ * Both are free, open source, and updated frequently.
94
+ */
95
+ declare const defaultThreatFeeds: ThreatFeedsConfig;
96
+
1
97
  interface ExecResult {
2
98
  stdout: string;
3
99
  stderr: string;
@@ -183,6 +279,8 @@ interface SecureConfig {
183
279
  * Set to `false` to disable, or provide a PackageChecksConfig.
184
280
  */
185
281
  packageChecks?: false | PackageChecksConfig;
282
+ /** Extended server config options (gRPC, logging, sessions, audit, DLP, proxy, etc.). */
283
+ serverConfig?: Omit<ServerConfigOpts, 'watchtower' | 'realPaths' | 'threatFeeds' | 'packageChecks'>;
186
284
  }
187
285
  interface ThreatFeed {
188
286
  /** Display name for this feed. */
@@ -259,4 +357,4 @@ interface PackageRule {
259
357
  reason?: string;
260
358
  }
261
359
 
262
- export type { ExecResult as E, InstallStrategy as I, LicenseSpdxMatch as L, PackageChecksConfig as P, ReadFileResult as R, SandboxAdapter as S, ThreatFeedsConfig as T, WriteFileResult as W, SecureConfig as a, SecuredSandbox as b, PackageMatch as c, PackageRule as d, ProviderConfig as e, SecurityMode as f, ThreatFeed as g };
360
+ export { type ExecResult as E, type InstallStrategy as I, type LicenseSpdxMatch as L, type PackageChecksConfig as P, type ReadFileResult as R, type SandboxAdapter as S, type ThreatFeed as T, type WriteFileResult as W, type SecureConfig as a, type SecuredSandbox as b, type PackageMatch as c, type PackageRule as d, type ProviderConfig as e, type SecurityMode as f, type ThreatFeedsConfig as g, defaultThreatFeeds as h };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@agentsh/secure-sandbox",
3
- "version": "0.1.5",
3
+ "version": "0.1.6",
4
4
  "license": "Apache-2.0",
5
5
  "repository": {
6
6
  "type": "git",
@@ -37,6 +37,10 @@
37
37
  "types": "./dist/adapters/blaxel.d.ts",
38
38
  "import": "./dist/adapters/blaxel.js"
39
39
  },
40
+ "./adapters/sprites": {
41
+ "types": "./dist/adapters/sprites.d.ts",
42
+ "import": "./dist/adapters/sprites.js"
43
+ },
40
44
  "./policies": {
41
45
  "types": "./dist/policies/index.d.ts",
42
46
  "import": "./dist/policies/index.js"
@@ -56,6 +60,7 @@
56
60
  "build": "tsup",
57
61
  "test": "vitest run",
58
62
  "test:e2e": "E2E=1 vitest run --config vitest.e2e.config.ts",
63
+ "test:e2e:sprites": "npx tsx src/e2e/sprites-e2e-runner.ts",
59
64
  "test:watch": "vitest",
60
65
  "typecheck": "tsc --noEmit",
61
66
  "prepublishOnly": "npm run build"
@@ -68,6 +73,7 @@
68
73
  "@blaxel/core": "^0.2.71",
69
74
  "@cloudflare/sandbox": "^0.7.13",
70
75
  "@daytonaio/sdk": "^0.149.0",
76
+ "@fly/sprites": "^0.0.1-rc37",
71
77
  "@types/js-yaml": "^4.0.9",
72
78
  "@types/node": "^25.3.5",
73
79
  "@vercel/sandbox": "^1.8.0",
@@ -83,6 +89,7 @@
83
89
  "@cloudflare/sandbox": "^0.1.0",
84
90
  "@daytonaio/sdk": "^0.12.0 || ^1.0.0",
85
91
  "@e2b/code-interpreter": "^1.2.0",
92
+ "@fly/sprites": "^1.0.0",
86
93
  "@vercel/sandbox": "^1.0.0"
87
94
  },
88
95
  "peerDependenciesMeta": {
@@ -100,6 +107,9 @@
100
107
  },
101
108
  "@daytonaio/sdk": {
102
109
  "optional": true
110
+ },
111
+ "@fly/sprites": {
112
+ "optional": true
103
113
  }
104
114
  }
105
115
  }
@@ -1,33 +0,0 @@
1
- import {
2
- blaxel
3
- } from "./chunk-UYEAO27E.js";
4
- import {
5
- cloudflare
6
- } from "./chunk-LMN3KM53.js";
7
- import {
8
- daytona
9
- } from "./chunk-45FKFVMC.js";
10
- import {
11
- e2b
12
- } from "./chunk-2P37YGN7.js";
13
- import {
14
- vercel
15
- } from "./chunk-JY5ERJTX.js";
16
- import {
17
- __export
18
- } from "./chunk-PZ5AY32C.js";
19
-
20
- // src/adapters/index.ts
21
- var adapters_exports = {};
22
- __export(adapters_exports, {
23
- blaxel: () => blaxel,
24
- cloudflare: () => cloudflare,
25
- daytona: () => daytona,
26
- e2b: () => e2b,
27
- vercel: () => vercel
28
- });
29
-
30
- export {
31
- adapters_exports
32
- };
33
- //# sourceMappingURL=chunk-L4KFLVNU.js.map
@@ -1 +0,0 @@
1
- {"version":3,"sources":["../src/adapters/index.ts"],"sourcesContent":["export { vercel } from './vercel.js';\nexport { e2b } from './e2b.js';\nexport { daytona } from './daytona.js';\nexport { cloudflare } from './cloudflare.js';\nexport { blaxel } from './blaxel.js';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;","names":[]}
@@ -1,16 +0,0 @@
1
- import { vercel } from './adapters/vercel.js';
2
- import { e2b } from './adapters/e2b.js';
3
- import { daytona } from './adapters/daytona.js';
4
- import { cloudflare } from './adapters/cloudflare.js';
5
- import { blaxel } from './adapters/blaxel.js';
6
-
7
- declare const index_blaxel: typeof blaxel;
8
- declare const index_cloudflare: typeof cloudflare;
9
- declare const index_daytona: typeof daytona;
10
- declare const index_e2b: typeof e2b;
11
- declare const index_vercel: typeof vercel;
12
- declare namespace index {
13
- export { index_blaxel as blaxel, index_cloudflare as cloudflare, index_daytona as daytona, index_e2b as e2b, index_vercel as vercel };
14
- }
15
-
16
- export { index as i };