@agentxjs/portagent 0.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/server/index.ts","../../src/server/auth.ts","../../src/server/database/SQLiteUserRepository.ts","../../src/server/ownership.ts"],"sourcesContent":["/**\n * Portagent Server\n *\n * Hono-based server that combines:\n * - AgentX API (SSE, agents, sessions)\n * - Authentication (simple password + JWT)\n * - Static file serving (Vite build output)\n */\n\nimport { dirname, resolve } from \"path\";\nimport { fileURLToPath } from \"url\";\n\nconst __filename = fileURLToPath(import.meta.url);\nconst __dirname = dirname(__filename);\n\nimport { serve } from \"@hono/node-server\";\nimport { Hono } from \"hono\";\nimport { cors } from \"hono/cors\";\nimport { serveStatic } from \"@hono/node-server/serve-static\";\nimport { existsSync, readFileSync } from \"fs\";\n\nimport { createAgentX, defineAgent } from \"agentxjs\";\nimport { createAgentXHandler, type AgentXHandlerWithUtils } from \"agentxjs/server\";\nimport { toHonoHandler } from \"agentxjs/server/adapters/hono\";\nimport { nodeRuntime } from \"@agentxjs/node-runtime\";\nimport { homedir } from \"node:os\";\nimport { join } from \"node:path\";\n\nimport { createAuthMiddleware, authRoutes } from \"./auth\";\nimport { SQLiteUserRepository } from \"./database\";\nimport { createOwnershipHandler } from \"./ownership\";\n\n// Configuration from environment\nconst PORT = parseInt(process.env.PORT || \"5200\", 10);\nconst JWT_SECRET = process.env.JWT_SECRET || crypto.randomUUID();\nconst USER_DB_PATH = process.env.USER_DB_PATH || join(homedir(), \".agentx/data/portagent.db\");\n\n/**\n * Default Agent Definition\n */\nconst DefaultAgent = defineAgent({\n name: \"Assistant\",\n systemPrompt: \"You are a helpful AI assistant.\",\n});\n\n/**\n * Create and configure the Hono app\n */\nfunction createApp() {\n const app = new Hono();\n\n // CORS\n app.use(\n \"*\",\n cors({\n origin: \"*\",\n allowMethods: [\"GET\", \"POST\", \"PUT\", \"DELETE\", \"HEAD\", \"OPTIONS\"],\n allowHeaders: [\"Content-Type\", \"Authorization\"],\n })\n );\n\n // Create runtime and AgentX instance\n const runtime = nodeRuntime();\n const agentx = createAgentX(runtime);\n\n // Register default definition\n agentx.definitions.register(DefaultAgent);\n\n // Create AgentX handler\n const agentxHandler = createAgentXHandler(agentx, {\n basePath: \"/agentx\",\n allowDynamicCreation: true,\n allowedDefinitions: [\"Assistant\"],\n repository: runtime.repository,\n }) as AgentXHandlerWithUtils;\n\n // Register definition with handler\n agentxHandler.registerDefinition(\"Assistant\", DefaultAgent);\n\n // Initialize user repository (separate database)\n const userRepository = new SQLiteUserRepository(USER_DB_PATH);\n\n // Auth middleware\n const authMiddleware = createAuthMiddleware(JWT_SECRET);\n\n // ============================================================\n // Routes\n // ============================================================\n\n // Health check (no auth)\n app.get(\"/health\", (c) => c.json({ status: \"ok\", timestamp: Date.now() }));\n\n // Auth routes (register, login)\n app.route(\"/api/auth\", authRoutes(userRepository, JWT_SECRET, agentx));\n\n // AgentX API (protected with ownership validation)\n const ownershipHandler = createOwnershipHandler(agentx, agentxHandler);\n app.use(\"/agentx/*\", authMiddleware);\n app.all(\"/agentx/*\", toHonoHandler(ownershipHandler));\n\n // Static files (protected in production)\n const publicDir = resolve(__dirname, \"../public\");\n const isDev = process.env.NODE_ENV !== \"production\";\n\n if (existsSync(publicDir)) {\n // Serve static files\n app.use(\"/*\", serveStatic({ root: publicDir }));\n\n // SPA fallback - serve index.html for all unmatched routes\n app.get(\"*\", (c) => {\n const indexPath = resolve(publicDir, \"index.html\");\n if (existsSync(indexPath)) {\n const html = readFileSync(indexPath, \"utf-8\");\n return c.html(html);\n }\n return c.text(\"Not Found\", 404);\n });\n } else if (isDev) {\n // In dev mode, proxy to Vite\n app.get(\"*\", (c) => {\n return c.text(\n \"Static files not found. Run 'pnpm build:client' first, or use 'pnpm dev' for development.\",\n 404\n );\n });\n }\n\n return { app, agentx, userRepository };\n}\n\n/**\n * Start the server\n */\nasync function startServer() {\n // Check API key\n if (!process.env.LLM_PROVIDER_KEY) {\n console.error(\"Error: LLM_PROVIDER_KEY is required\");\n console.log(\"\\nSet it via environment variable:\");\n console.log(\" export LLM_PROVIDER_KEY=sk-ant-xxx\");\n process.exit(1);\n }\n\n const { app, agentx, userRepository } = createApp();\n\n console.log(`\n ____ _ _\n | _ \\\\ ___ _ __| |_ __ _ __ _ ___ _ __ | |_\n | |_) / _ \\\\| '__| __/ _\\` |/ _\\` |/ _ \\\\ '_ \\\\| __|\n | __/ (_) | | | || (_| | (_| | __/ | | | |_\n |_| \\\\___/|_| \\\\__\\\\__,_|\\\\__, |\\\\___|_| |_|\\\\__|\n |___/\n\n AgentX Portal - Your AI Agent Gateway (Multi-User Mode)\n`);\n\n console.log(\"Configuration:\");\n console.log(` Port: ${PORT}`);\n console.log(` API Key: ${process.env.LLM_PROVIDER_KEY!.substring(0, 15)}...`);\n console.log(` User DB: ${USER_DB_PATH}`);\n console.log(` AgentX DB: ${join(homedir(), \".agentx/data/agentx.db\")}`);\n\n console.log(`\\nEndpoints:`);\n console.log(` GET /health - Health check`);\n console.log(` POST /api/auth/register - Register new user`);\n console.log(` POST /api/auth/login - Login`);\n console.log(` GET /api/auth/verify - Verify token`);\n console.log(` --- AgentX API (protected) ---`);\n console.log(` GET /agentx/info - Platform info`);\n console.log(` GET /agentx/containers - List containers`);\n console.log(` POST /agentx/containers - Create container`);\n console.log(` GET /agentx/containers/:id - Get container`);\n console.log(` DELETE /agentx/containers/:id - Delete container`);\n console.log(` POST /agentx/agents - Create agent`);\n console.log(` GET /agentx/agents/:id/sse - SSE stream`);\n console.log(` POST /agentx/agents/:id/messages- Send message`);\n\n serve({\n fetch: app.fetch,\n port: PORT,\n hostname: \"0.0.0.0\",\n });\n\n console.log(`\\nšŸš€ Server running at http://localhost:${PORT}`);\n\n // Graceful shutdown\n const shutdown = async () => {\n console.log(\"\\nShutting down...\");\n await agentx.agents.destroyAll();\n userRepository.close();\n console.log(\"Server stopped\");\n process.exit(0);\n };\n\n process.on(\"SIGINT\", shutdown);\n process.on(\"SIGTERM\", shutdown);\n}\n\nexport { createApp, startServer };\n","/**\n * Authentication Module\n *\n * Multi-user authentication with JWT tokens.\n * Supports user registration and login.\n */\n\nimport { Hono } from \"hono\";\nimport { createMiddleware } from \"hono/factory\";\nimport * as jose from \"jose\";\nimport type { AgentX } from \"agentxjs\";\nimport type { UserRepository } from \"./user/UserRepository\";\nimport type { UserInfo } from \"./user/types\";\n\nconst TOKEN_EXPIRY = \"7d\"; // 7 days\n\n/**\n * Generate a random password\n */\nexport function generatePassword(): string {\n const chars = \"ABCDEFGHJKLMNPQRSTUVWXYZabcdefghjkmnpqrstuvwxyz23456789\";\n let password = \"\";\n for (let i = 0; i < 12; i++) {\n password += chars.charAt(Math.floor(Math.random() * chars.length));\n }\n return password;\n}\n\n/**\n * Create JWT token\n */\nasync function createToken(secret: string, userId: string): Promise<string> {\n const secretKey = new TextEncoder().encode(secret);\n const token = await new jose.SignJWT({ sub: userId })\n .setProtectedHeader({ alg: \"HS256\" })\n .setIssuedAt()\n .setExpirationTime(TOKEN_EXPIRY)\n .sign(secretKey);\n return token;\n}\n\n/**\n * Verify JWT token\n */\nasync function verifyToken(secret: string, token: string): Promise<{ userId: string } | null> {\n try {\n const secretKey = new TextEncoder().encode(secret);\n const { payload } = await jose.jwtVerify(token, secretKey);\n return { userId: payload.sub as string };\n } catch {\n return null;\n }\n}\n\n/**\n * Convert UserRecord to safe UserInfo (remove password hash)\n */\nfunction toUserInfo(user: {\n userId: string;\n username: string;\n email: string;\n containerId: string;\n displayName?: string;\n avatar?: string;\n createdAt: number;\n}): UserInfo {\n return {\n userId: user.userId,\n username: user.username,\n email: user.email,\n containerId: user.containerId,\n displayName: user.displayName,\n avatar: user.avatar,\n createdAt: user.createdAt,\n };\n}\n\n/**\n * Auth routes\n */\nexport function authRoutes(\n userRepository: UserRepository,\n jwtSecret: string,\n agentx: AgentX\n): Hono {\n const app = new Hono();\n\n // Register\n app.post(\"/register\", async (c) => {\n try {\n const body = await c.req.json<{\n username?: string;\n email?: string;\n password?: string;\n displayName?: string;\n avatar?: string;\n }>();\n\n // Validation\n if (!body.username || !body.email || !body.password) {\n return c.json({ error: \"Username, email, and password are required\" }, 400);\n }\n\n // Basic validation\n if (body.username.length < 3) {\n return c.json({ error: \"Username must be at least 3 characters\" }, 400);\n }\n\n if (body.password.length < 6) {\n return c.json({ error: \"Password must be at least 6 characters\" }, 400);\n }\n\n if (!body.email.includes(\"@\")) {\n return c.json({ error: \"Invalid email format\" }, 400);\n }\n\n // Create Container for the user first\n const container = await agentx.containers.create();\n\n // Create user with the container ID\n const user = await userRepository.createUser({\n username: body.username,\n email: body.email,\n password: body.password,\n containerId: container.containerId,\n displayName: body.displayName,\n avatar: body.avatar,\n });\n\n // Generate token\n const token = await createToken(jwtSecret, user.userId);\n\n return c.json(\n {\n token,\n user: toUserInfo(user),\n expiresIn: TOKEN_EXPIRY,\n },\n 201\n );\n } catch (error) {\n const message = error instanceof Error ? error.message : \"Registration failed\";\n return c.json({ error: message }, 400);\n }\n });\n\n // Login\n app.post(\"/login\", async (c) => {\n try {\n const body = await c.req.json<{\n usernameOrEmail?: string;\n password?: string;\n }>();\n\n if (!body.usernameOrEmail || !body.password) {\n return c.json({ error: \"Username/email and password are required\" }, 400);\n }\n\n // Verify credentials\n const user = await userRepository.verifyPassword(body.usernameOrEmail, body.password);\n\n if (!user) {\n return c.json({ error: \"Invalid credentials\" }, 401);\n }\n\n // Generate token\n const token = await createToken(jwtSecret, user.userId);\n\n return c.json({\n token,\n user: toUserInfo(user),\n expiresIn: TOKEN_EXPIRY,\n });\n } catch (error) {\n const message = error instanceof Error ? error.message : \"Login failed\";\n return c.json({ error: message }, 500);\n }\n });\n\n // Verify token\n app.get(\"/verify\", async (c) => {\n const authHeader = c.req.header(\"Authorization\");\n if (!authHeader || !authHeader.startsWith(\"Bearer \")) {\n return c.json({ valid: false }, 401);\n }\n\n const token = authHeader.slice(7);\n const result = await verifyToken(jwtSecret, token);\n\n if (!result) {\n return c.json({ valid: false }, 401);\n }\n\n // Get user info\n const user = await userRepository.findUserById(result.userId);\n if (!user || !user.isActive) {\n return c.json({ valid: false }, 401);\n }\n\n return c.json({ valid: true, user: toUserInfo(user) });\n });\n\n // Logout (client-side only, just for API consistency)\n app.post(\"/logout\", (c) => {\n return c.json({ success: true });\n });\n\n return app;\n}\n\n/**\n * Create auth middleware\n */\nexport function createAuthMiddleware(jwtSecret: string) {\n return createMiddleware(async (c, next) => {\n // Skip auth for SSE connections with token in query\n const url = new URL(c.req.url);\n const queryToken = url.searchParams.get(\"token\");\n\n // Check Authorization header first\n const authHeader = c.req.header(\"Authorization\");\n let token: string | null = null;\n\n if (authHeader && authHeader.startsWith(\"Bearer \")) {\n token = authHeader.slice(7);\n } else if (queryToken) {\n // Allow token in query param for SSE (EventSource doesn't support headers)\n token = queryToken;\n }\n\n if (!token) {\n return c.json({ error: \"Unauthorized\" }, 401);\n }\n\n const result = await verifyToken(jwtSecret, token);\n if (!result) {\n return c.json({ error: \"Invalid token\" }, 401);\n }\n\n // Set user info in context\n c.set(\"userId\", result.userId);\n\n // Also set as custom header for downstream handlers\n c.header(\"X-User-Id\", result.userId);\n\n await next();\n });\n}\n","/**\n * SQLiteUserRepository - SQLite implementation of UserRepository\n *\n * Manages user data in separate portagent.db database.\n * This is independent from AgentX's agentx.db.\n *\n * Relationship to AgentX:\n * - User (portagent.db) ←→ Container.config.ownerId (agentx.db)\n * - User.userId is stored in Container.config.ownerId field\n */\n\nimport Database from \"better-sqlite3\";\nimport { randomUUID } from \"crypto\";\nimport { hash, compare } from \"bcrypt\";\nimport type { UserRepository } from \"../user/UserRepository\";\nimport type { UserRecord, RegisterUserInput } from \"../user/types\";\n\nconst SALT_ROUNDS = 10;\n\n/**\n * SQLite implementation of UserRepository\n */\nexport class SQLiteUserRepository implements UserRepository {\n private db: Database.Database;\n\n constructor(dbPath: string) {\n this.db = new Database(dbPath);\n this.initDatabase();\n }\n\n /**\n * Initialize database schema\n */\n private initDatabase(): void {\n // Enable foreign keys\n this.db.pragma(\"foreign_keys = ON\");\n\n // Create users table\n this.db.exec(`\n CREATE TABLE IF NOT EXISTS users (\n userId TEXT PRIMARY KEY,\n username TEXT UNIQUE NOT NULL,\n email TEXT UNIQUE NOT NULL,\n passwordHash TEXT NOT NULL,\n containerId TEXT NOT NULL,\n displayName TEXT,\n avatar TEXT,\n isActive INTEGER NOT NULL DEFAULT 1,\n createdAt INTEGER NOT NULL,\n updatedAt INTEGER NOT NULL\n );\n\n CREATE INDEX IF NOT EXISTS idx_users_username ON users(username);\n CREATE INDEX IF NOT EXISTS idx_users_email ON users(email);\n CREATE INDEX IF NOT EXISTS idx_users_containerId ON users(containerId);\n `);\n }\n\n /**\n * Create a new user\n */\n async createUser(input: RegisterUserInput): Promise<UserRecord> {\n // Check if username exists\n if (await this.usernameExists(input.username)) {\n throw new Error(`Username '${input.username}' already exists`);\n }\n\n // Check if email exists\n if (await this.emailExists(input.email)) {\n throw new Error(`Email '${input.email}' already exists`);\n }\n\n // Hash password\n const passwordHash = await hash(input.password, SALT_ROUNDS);\n\n // Create user record\n const userId = randomUUID();\n const now = Date.now();\n\n const user: UserRecord = {\n userId,\n username: input.username,\n email: input.email,\n passwordHash,\n containerId: input.containerId,\n displayName: input.displayName,\n avatar: input.avatar,\n isActive: true,\n createdAt: now,\n updatedAt: now,\n };\n\n // Insert into database\n const stmt = this.db.prepare(`\n INSERT INTO users (\n userId, username, email, passwordHash, containerId, displayName, avatar, isActive, createdAt, updatedAt\n ) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?)\n `);\n\n stmt.run(\n user.userId,\n user.username,\n user.email,\n user.passwordHash,\n user.containerId,\n user.displayName,\n user.avatar,\n user.isActive ? 1 : 0,\n user.createdAt,\n user.updatedAt\n );\n\n return user;\n }\n\n /**\n * Find user by ID\n */\n async findUserById(userId: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE userId = ?\n `);\n\n const row = stmt.get(userId) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Find user by username\n */\n async findUserByUsername(username: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE username = ?\n `);\n\n const row = stmt.get(username) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Find user by email\n */\n async findUserByEmail(email: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE email = ?\n `);\n\n const row = stmt.get(email) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Find user by username or email\n */\n async findUserByUsernameOrEmail(usernameOrEmail: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE username = ? OR email = ?\n `);\n\n const row = stmt.get(usernameOrEmail, usernameOrEmail) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Update user\n */\n async updateUser(\n userId: string,\n updates: Partial<Omit<UserRecord, \"userId\">>\n ): Promise<UserRecord> {\n const user = await this.findUserById(userId);\n if (!user) {\n throw new Error(`User ${userId} not found`);\n }\n\n // Build SET clause dynamically\n const fields: string[] = [];\n const values: any[] = [];\n\n if (updates.username !== undefined) {\n fields.push(\"username = ?\");\n values.push(updates.username);\n }\n if (updates.email !== undefined) {\n fields.push(\"email = ?\");\n values.push(updates.email);\n }\n if (updates.passwordHash !== undefined) {\n fields.push(\"passwordHash = ?\");\n values.push(updates.passwordHash);\n }\n if (updates.displayName !== undefined) {\n fields.push(\"displayName = ?\");\n values.push(updates.displayName);\n }\n if (updates.avatar !== undefined) {\n fields.push(\"avatar = ?\");\n values.push(updates.avatar);\n }\n if (updates.isActive !== undefined) {\n fields.push(\"isActive = ?\");\n values.push(updates.isActive ? 1 : 0);\n }\n\n // Always update updatedAt\n fields.push(\"updatedAt = ?\");\n values.push(Date.now());\n\n if (fields.length === 0) {\n return user; // No updates\n }\n\n // Execute update\n values.push(userId);\n const stmt = this.db.prepare(`\n UPDATE users SET ${fields.join(\", \")} WHERE userId = ?\n `);\n\n stmt.run(...values);\n\n // Return updated user\n return (await this.findUserById(userId))!;\n }\n\n /**\n * Delete user\n */\n async deleteUser(userId: string): Promise<boolean> {\n const stmt = this.db.prepare(`\n DELETE FROM users WHERE userId = ?\n `);\n\n const result = stmt.run(userId);\n return result.changes > 0;\n }\n\n /**\n * List all users\n */\n async listUsers(): Promise<UserRecord[]> {\n const stmt = this.db.prepare(`\n SELECT * FROM users ORDER BY createdAt DESC\n `);\n\n const rows = stmt.all() as any[];\n return rows.map((row) => this.rowToUser(row));\n }\n\n /**\n * Check if username exists\n */\n async usernameExists(username: string): Promise<boolean> {\n const stmt = this.db.prepare(`\n SELECT 1 FROM users WHERE username = ?\n `);\n\n return stmt.get(username) !== undefined;\n }\n\n /**\n * Check if email exists\n */\n async emailExists(email: string): Promise<boolean> {\n const stmt = this.db.prepare(`\n SELECT 1 FROM users WHERE email = ?\n `);\n\n return stmt.get(email) !== undefined;\n }\n\n /**\n * Verify password for login\n *\n * @param usernameOrEmail - Username or email\n * @param password - Plain text password\n * @returns User record if valid, null if invalid\n */\n async verifyPassword(usernameOrEmail: string, password: string): Promise<UserRecord | null> {\n const user = await this.findUserByUsernameOrEmail(usernameOrEmail);\n if (!user) {\n return null;\n }\n\n if (!user.isActive) {\n return null; // Inactive user\n }\n\n const isValid = await compare(password, user.passwordHash);\n return isValid ? user : null;\n }\n\n /**\n * Close database connection\n */\n close(): void {\n this.db.close();\n }\n\n // ============================================================================\n // Private Helpers\n // ============================================================================\n\n private rowToUser(row: any): UserRecord {\n return {\n userId: row.userId,\n username: row.username,\n email: row.email,\n passwordHash: row.passwordHash,\n containerId: row.containerId,\n displayName: row.displayName,\n avatar: row.avatar,\n isActive: row.isActive === 1,\n createdAt: row.createdAt,\n updatedAt: row.updatedAt,\n };\n }\n}\n","/**\n * Ownership Validation Middleware\n *\n * Wraps AgentX handler to enforce user ownership of resources.\n * Uses Container.config.ownerId to link users with containers.\n */\n\nimport type { AgentXHandler } from \"agentxjs/server\";\nimport type { AgentX } from \"agentxjs\";\n\n/**\n * Extract userId from Hono context (set by auth middleware)\n */\nfunction getUserId(request: Request): string | null {\n // This is a workaround - ideally we'd get userId from context\n // But Web Standard Request doesn't have context\n // So we rely on the fact that auth middleware already validated the token\n // and we can re-extract it here\n const authHeader = request.headers.get(\"Authorization\");\n if (!authHeader || !authHeader.startsWith(\"Bearer \")) {\n // Check query param for SSE\n const url = new URL(request.url);\n const queryToken = url.searchParams.get(\"token\");\n if (!queryToken) {\n return null;\n }\n }\n // Note: We'll need to decode JWT again here, or pass userId via custom header\n // For now, we'll use a simpler approach: Add X-User-Id header in auth middleware\n return request.headers.get(\"X-User-Id\");\n}\n\n/**\n * Create ownership validation wrapper for AgentX handler\n *\n * Enforces:\n * - Container.config.ownerId must match current user\n * - Session.userId must match current user (AgentX already has this)\n *\n * @param agentx - AgentX instance\n * @param baseHandler - Original AgentX handler\n * @returns Wrapped handler with ownership validation\n */\nexport function createOwnershipHandler(agentx: AgentX, baseHandler: AgentXHandler): AgentXHandler {\n return async (request: Request): Promise<Response> => {\n const url = new URL(request.url);\n const method = request.method;\n const path = url.pathname;\n\n // Extract userId from request\n const userId = getUserId(request);\n if (!userId) {\n // If no userId, let base handler reject with 401\n return baseHandler(request);\n }\n\n // ============================================================================\n // Container ownership validation\n // ============================================================================\n\n // POST /containers - Set ownerId on creation\n if (method === \"POST\" && path.endsWith(\"/containers\")) {\n // Intercept container creation to inject ownerId\n try {\n const body = await request.json();\n const config = body.config || {};\n config.ownerId = userId; // Inject ownerId\n\n // Create new request with modified body, preserving all original fields\n const modifiedBody = { ...body, config };\n const modifiedRequest = new Request(request.url, {\n method: request.method,\n headers: request.headers,\n body: JSON.stringify(modifiedBody),\n });\n\n return baseHandler(modifiedRequest);\n } catch {\n return baseHandler(request);\n }\n }\n\n // PUT /containers/:id - Upsert semantics (create or update)\n const putContainerMatch = path.match(/\\/containers\\/([^/]+)$/);\n if (method === \"PUT\" && putContainerMatch) {\n const containerId = putContainerMatch[1];\n\n const existingContainer = await agentx.containers.get(containerId);\n\n if (existingContainer) {\n // Update: validate ownership\n const ownerId = (existingContainer.config as Record<string, unknown>)?.ownerId;\n if (ownerId && ownerId !== userId) {\n return new Response(JSON.stringify({ error: \"Access denied\" }), {\n status: 403,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n return baseHandler(request);\n } else {\n // Create: inject ownerId into the request body\n try {\n const body = await request.json();\n const config = body.config || {};\n config.ownerId = userId;\n\n const modifiedBody = { ...body, config };\n const modifiedRequest = new Request(request.url, {\n method: request.method,\n headers: request.headers,\n body: JSON.stringify(modifiedBody),\n });\n\n return baseHandler(modifiedRequest);\n } catch {\n return baseHandler(request);\n }\n }\n }\n\n // GET /containers/:id - Validate ownership\n const getContainerMatch = path.match(/\\/containers\\/([^/]+)$/);\n if (method === \"GET\" && getContainerMatch) {\n const containerId = getContainerMatch[1];\n\n // Check ownership before allowing access\n const container = await agentx.containers.get(containerId);\n if (!container) {\n return new Response(JSON.stringify({ error: \"Container not found\" }), {\n status: 404,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n const ownerId = (container.config as Record<string, unknown>)?.ownerId;\n if (ownerId && ownerId !== userId) {\n return new Response(JSON.stringify({ error: \"Access denied\" }), {\n status: 403,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n return baseHandler(request);\n }\n\n // DELETE /containers/:id - Validate ownership\n const deleteContainerMatch = path.match(/\\/containers\\/([^/]+)$/);\n if (method === \"DELETE\" && deleteContainerMatch) {\n const containerId = deleteContainerMatch[1];\n\n const container = await agentx.containers.get(containerId);\n if (!container) {\n return new Response(JSON.stringify({ error: \"Container not found\" }), {\n status: 404,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n const ownerId = (container.config as Record<string, unknown>)?.ownerId;\n if (ownerId && ownerId !== userId) {\n return new Response(JSON.stringify({ error: \"Access denied\" }), {\n status: 403,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n return baseHandler(request);\n }\n\n // GET /containers - Filter by ownerId\n if (method === \"GET\" && path.endsWith(\"/containers\")) {\n const response = await baseHandler(request);\n\n // Filter response to only show user's containers\n if (response.ok) {\n const body = await response.json();\n if (Array.isArray(body)) {\n const filtered = body.filter((container: { config?: { ownerId?: string } }) => {\n const ownerId = container.config?.ownerId;\n return !ownerId || ownerId === userId; // Show if no owner or owned by user\n });\n\n return new Response(JSON.stringify(filtered), {\n status: 200,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n }\n\n return response;\n }\n\n // ============================================================================\n // Session ownership validation (already handled by AgentX via userId)\n // ============================================================================\n\n // For Sessions, AgentX already filters by userId in Session.userId field\n // So we don't need additional validation here\n\n // ============================================================================\n // Agent ownership validation (via containerId)\n // ============================================================================\n\n // Agents belong to Containers, so we validate Container ownership\n // TODO: Add agent ownership validation if needed\n\n // ============================================================================\n // Default: Pass through to base handler\n // ============================================================================\n\n return baseHandler(request);\n };\n}\n"],"mappings":";AASA,SAAS,SAAS,eAAe;AACjC,SAAS,qBAAqB;AAK9B,SAAS,aAAa;AACtB,SAAS,QAAAA,aAAY;AACrB,SAAS,YAAY;AACrB,SAAS,mBAAmB;AAC5B,SAAS,YAAY,oBAAoB;AAEzC,SAAS,cAAc,mBAAmB;AAC1C,SAAS,2BAAwD;AACjE,SAAS,qBAAqB;AAC9B,SAAS,mBAAmB;AAC5B,SAAS,eAAe;AACxB,SAAS,YAAY;;;ACnBrB,SAAS,YAAY;AACrB,SAAS,wBAAwB;AACjC,YAAY,UAAU;AAKtB,IAAM,eAAe;AAiBrB,eAAe,YAAY,QAAgB,QAAiC;AAC1E,QAAM,YAAY,IAAI,YAAY,EAAE,OAAO,MAAM;AACjD,QAAM,QAAQ,MAAM,IAAS,aAAQ,EAAE,KAAK,OAAO,CAAC,EACjD,mBAAmB,EAAE,KAAK,QAAQ,CAAC,EACnC,YAAY,EACZ,kBAAkB,YAAY,EAC9B,KAAK,SAAS;AACjB,SAAO;AACT;AAKA,eAAe,YAAY,QAAgB,OAAmD;AAC5F,MAAI;AACF,UAAM,YAAY,IAAI,YAAY,EAAE,OAAO,MAAM;AACjD,UAAM,EAAE,QAAQ,IAAI,MAAW,eAAU,OAAO,SAAS;AACzD,WAAO,EAAE,QAAQ,QAAQ,IAAc;AAAA,EACzC,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAKA,SAAS,WAAW,MAQP;AACX,SAAO;AAAA,IACL,QAAQ,KAAK;AAAA,IACb,UAAU,KAAK;AAAA,IACf,OAAO,KAAK;AAAA,IACZ,aAAa,KAAK;AAAA,IAClB,aAAa,KAAK;AAAA,IAClB,QAAQ,KAAK;AAAA,IACb,WAAW,KAAK;AAAA,EAClB;AACF;AAKO,SAAS,WACd,gBACA,WACA,QACM;AACN,QAAM,MAAM,IAAI,KAAK;AAGrB,MAAI,KAAK,aAAa,OAAO,MAAM;AACjC,QAAI;AACF,YAAM,OAAO,MAAM,EAAE,IAAI,KAMtB;AAGH,UAAI,CAAC,KAAK,YAAY,CAAC,KAAK,SAAS,CAAC,KAAK,UAAU;AACnD,eAAO,EAAE,KAAK,EAAE,OAAO,6CAA6C,GAAG,GAAG;AAAA,MAC5E;AAGA,UAAI,KAAK,SAAS,SAAS,GAAG;AAC5B,eAAO,EAAE,KAAK,EAAE,OAAO,yCAAyC,GAAG,GAAG;AAAA,MACxE;AAEA,UAAI,KAAK,SAAS,SAAS,GAAG;AAC5B,eAAO,EAAE,KAAK,EAAE,OAAO,yCAAyC,GAAG,GAAG;AAAA,MACxE;AAEA,UAAI,CAAC,KAAK,MAAM,SAAS,GAAG,GAAG;AAC7B,eAAO,EAAE,KAAK,EAAE,OAAO,uBAAuB,GAAG,GAAG;AAAA,MACtD;AAGA,YAAM,YAAY,MAAM,OAAO,WAAW,OAAO;AAGjD,YAAM,OAAO,MAAM,eAAe,WAAW;AAAA,QAC3C,UAAU,KAAK;AAAA,QACf,OAAO,KAAK;AAAA,QACZ,UAAU,KAAK;AAAA,QACf,aAAa,UAAU;AAAA,QACvB,aAAa,KAAK;AAAA,QAClB,QAAQ,KAAK;AAAA,MACf,CAAC;AAGD,YAAM,QAAQ,MAAM,YAAY,WAAW,KAAK,MAAM;AAEtD,aAAO,EAAE;AAAA,QACP;AAAA,UACE;AAAA,UACA,MAAM,WAAW,IAAI;AAAA,UACrB,WAAW;AAAA,QACb;AAAA,QACA;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,YAAM,UAAU,iBAAiB,QAAQ,MAAM,UAAU;AACzD,aAAO,EAAE,KAAK,EAAE,OAAO,QAAQ,GAAG,GAAG;AAAA,IACvC;AAAA,EACF,CAAC;AAGD,MAAI,KAAK,UAAU,OAAO,MAAM;AAC9B,QAAI;AACF,YAAM,OAAO,MAAM,EAAE,IAAI,KAGtB;AAEH,UAAI,CAAC,KAAK,mBAAmB,CAAC,KAAK,UAAU;AAC3C,eAAO,EAAE,KAAK,EAAE,OAAO,2CAA2C,GAAG,GAAG;AAAA,MAC1E;AAGA,YAAM,OAAO,MAAM,eAAe,eAAe,KAAK,iBAAiB,KAAK,QAAQ;AAEpF,UAAI,CAAC,MAAM;AACT,eAAO,EAAE,KAAK,EAAE,OAAO,sBAAsB,GAAG,GAAG;AAAA,MACrD;AAGA,YAAM,QAAQ,MAAM,YAAY,WAAW,KAAK,MAAM;AAEtD,aAAO,EAAE,KAAK;AAAA,QACZ;AAAA,QACA,MAAM,WAAW,IAAI;AAAA,QACrB,WAAW;AAAA,MACb,CAAC;AAAA,IACH,SAAS,OAAO;AACd,YAAM,UAAU,iBAAiB,QAAQ,MAAM,UAAU;AACzD,aAAO,EAAE,KAAK,EAAE,OAAO,QAAQ,GAAG,GAAG;AAAA,IACvC;AAAA,EACF,CAAC;AAGD,MAAI,IAAI,WAAW,OAAO,MAAM;AAC9B,UAAM,aAAa,EAAE,IAAI,OAAO,eAAe;AAC/C,QAAI,CAAC,cAAc,CAAC,WAAW,WAAW,SAAS,GAAG;AACpD,aAAO,EAAE,KAAK,EAAE,OAAO,MAAM,GAAG,GAAG;AAAA,IACrC;AAEA,UAAM,QAAQ,WAAW,MAAM,CAAC;AAChC,UAAM,SAAS,MAAM,YAAY,WAAW,KAAK;AAEjD,QAAI,CAAC,QAAQ;AACX,aAAO,EAAE,KAAK,EAAE,OAAO,MAAM,GAAG,GAAG;AAAA,IACrC;AAGA,UAAM,OAAO,MAAM,eAAe,aAAa,OAAO,MAAM;AAC5D,QAAI,CAAC,QAAQ,CAAC,KAAK,UAAU;AAC3B,aAAO,EAAE,KAAK,EAAE,OAAO,MAAM,GAAG,GAAG;AAAA,IACrC;AAEA,WAAO,EAAE,KAAK,EAAE,OAAO,MAAM,MAAM,WAAW,IAAI,EAAE,CAAC;AAAA,EACvD,CAAC;AAGD,MAAI,KAAK,WAAW,CAAC,MAAM;AACzB,WAAO,EAAE,KAAK,EAAE,SAAS,KAAK,CAAC;AAAA,EACjC,CAAC;AAED,SAAO;AACT;AAKO,SAAS,qBAAqB,WAAmB;AACtD,SAAO,iBAAiB,OAAO,GAAG,SAAS;AAEzC,UAAM,MAAM,IAAI,IAAI,EAAE,IAAI,GAAG;AAC7B,UAAM,aAAa,IAAI,aAAa,IAAI,OAAO;AAG/C,UAAM,aAAa,EAAE,IAAI,OAAO,eAAe;AAC/C,QAAI,QAAuB;AAE3B,QAAI,cAAc,WAAW,WAAW,SAAS,GAAG;AAClD,cAAQ,WAAW,MAAM,CAAC;AAAA,IAC5B,WAAW,YAAY;AAErB,cAAQ;AAAA,IACV;AAEA,QAAI,CAAC,OAAO;AACV,aAAO,EAAE,KAAK,EAAE,OAAO,eAAe,GAAG,GAAG;AAAA,IAC9C;AAEA,UAAM,SAAS,MAAM,YAAY,WAAW,KAAK;AACjD,QAAI,CAAC,QAAQ;AACX,aAAO,EAAE,KAAK,EAAE,OAAO,gBAAgB,GAAG,GAAG;AAAA,IAC/C;AAGA,MAAE,IAAI,UAAU,OAAO,MAAM;AAG7B,MAAE,OAAO,aAAa,OAAO,MAAM;AAEnC,UAAM,KAAK;AAAA,EACb,CAAC;AACH;;;AC5OA,OAAO,cAAc;AACrB,SAAS,kBAAkB;AAC3B,SAAS,MAAM,eAAe;AAI9B,IAAM,cAAc;AAKb,IAAM,uBAAN,MAAqD;AAAA,EAClD;AAAA,EAER,YAAY,QAAgB;AAC1B,SAAK,KAAK,IAAI,SAAS,MAAM;AAC7B,SAAK,aAAa;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA,EAKQ,eAAqB;AAE3B,SAAK,GAAG,OAAO,mBAAmB;AAGlC,SAAK,GAAG,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,KAiBZ;AAAA,EACH;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WAAW,OAA+C;AAE9D,QAAI,MAAM,KAAK,eAAe,MAAM,QAAQ,GAAG;AAC7C,YAAM,IAAI,MAAM,aAAa,MAAM,QAAQ,kBAAkB;AAAA,IAC/D;AAGA,QAAI,MAAM,KAAK,YAAY,MAAM,KAAK,GAAG;AACvC,YAAM,IAAI,MAAM,UAAU,MAAM,KAAK,kBAAkB;AAAA,IACzD;AAGA,UAAM,eAAe,MAAM,KAAK,MAAM,UAAU,WAAW;AAG3D,UAAM,SAAS,WAAW;AAC1B,UAAM,MAAM,KAAK,IAAI;AAErB,UAAM,OAAmB;AAAA,MACvB;AAAA,MACA,UAAU,MAAM;AAAA,MAChB,OAAO,MAAM;AAAA,MACb;AAAA,MACA,aAAa,MAAM;AAAA,MACnB,aAAa,MAAM;AAAA,MACnB,QAAQ,MAAM;AAAA,MACd,UAAU;AAAA,MACV,WAAW;AAAA,MACX,WAAW;AAAA,IACb;AAGA,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA;AAAA;AAAA,KAI5B;AAED,SAAK;AAAA,MACH,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK,WAAW,IAAI;AAAA,MACpB,KAAK;AAAA,MACL,KAAK;AAAA,IACP;AAEA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,aAAa,QAA4C;AAC7D,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,MAAM;AAC3B,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,mBAAmB,UAA8C;AACrE,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,QAAQ;AAC7B,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,OAA2C;AAC/D,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,KAAK;AAC1B,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,0BAA0B,iBAAqD;AACnF,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,iBAAiB,eAAe;AACrD,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WACJ,QACA,SACqB;AACrB,UAAM,OAAO,MAAM,KAAK,aAAa,MAAM;AAC3C,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,MAAM,QAAQ,MAAM,YAAY;AAAA,IAC5C;AAGA,UAAM,SAAmB,CAAC;AAC1B,UAAM,SAAgB,CAAC;AAEvB,QAAI,QAAQ,aAAa,QAAW;AAClC,aAAO,KAAK,cAAc;AAC1B,aAAO,KAAK,QAAQ,QAAQ;AAAA,IAC9B;AACA,QAAI,QAAQ,UAAU,QAAW;AAC/B,aAAO,KAAK,WAAW;AACvB,aAAO,KAAK,QAAQ,KAAK;AAAA,IAC3B;AACA,QAAI,QAAQ,iBAAiB,QAAW;AACtC,aAAO,KAAK,kBAAkB;AAC9B,aAAO,KAAK,QAAQ,YAAY;AAAA,IAClC;AACA,QAAI,QAAQ,gBAAgB,QAAW;AACrC,aAAO,KAAK,iBAAiB;AAC7B,aAAO,KAAK,QAAQ,WAAW;AAAA,IACjC;AACA,QAAI,QAAQ,WAAW,QAAW;AAChC,aAAO,KAAK,YAAY;AACxB,aAAO,KAAK,QAAQ,MAAM;AAAA,IAC5B;AACA,QAAI,QAAQ,aAAa,QAAW;AAClC,aAAO,KAAK,cAAc;AAC1B,aAAO,KAAK,QAAQ,WAAW,IAAI,CAAC;AAAA,IACtC;AAGA,WAAO,KAAK,eAAe;AAC3B,WAAO,KAAK,KAAK,IAAI,CAAC;AAEtB,QAAI,OAAO,WAAW,GAAG;AACvB,aAAO;AAAA,IACT;AAGA,WAAO,KAAK,MAAM;AAClB,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA,yBACR,OAAO,KAAK,IAAI,CAAC;AAAA,KACrC;AAED,SAAK,IAAI,GAAG,MAAM;AAGlB,WAAQ,MAAM,KAAK,aAAa,MAAM;AAAA,EACxC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WAAW,QAAkC;AACjD,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,SAAS,KAAK,IAAI,MAAM;AAC9B,WAAO,OAAO,UAAU;AAAA,EAC1B;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAmC;AACvC,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,OAAO,KAAK,IAAI;AACtB,WAAO,KAAK,IAAI,CAAC,QAAQ,KAAK,UAAU,GAAG,CAAC;AAAA,EAC9C;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,eAAe,UAAoC;AACvD,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,WAAO,KAAK,IAAI,QAAQ,MAAM;AAAA,EAChC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAY,OAAiC;AACjD,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,WAAO,KAAK,IAAI,KAAK,MAAM;AAAA,EAC7B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,MAAM,eAAe,iBAAyB,UAA8C;AAC1F,UAAM,OAAO,MAAM,KAAK,0BAA0B,eAAe;AACjE,QAAI,CAAC,MAAM;AACT,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,KAAK,UAAU;AAClB,aAAO;AAAA,IACT;AAEA,UAAM,UAAU,MAAM,QAAQ,UAAU,KAAK,YAAY;AACzD,WAAO,UAAU,OAAO;AAAA,EAC1B;AAAA;AAAA;AAAA;AAAA,EAKA,QAAc;AACZ,SAAK,GAAG,MAAM;AAAA,EAChB;AAAA;AAAA;AAAA;AAAA,EAMQ,UAAU,KAAsB;AACtC,WAAO;AAAA,MACL,QAAQ,IAAI;AAAA,MACZ,UAAU,IAAI;AAAA,MACd,OAAO,IAAI;AAAA,MACX,cAAc,IAAI;AAAA,MAClB,aAAa,IAAI;AAAA,MACjB,aAAa,IAAI;AAAA,MACjB,QAAQ,IAAI;AAAA,MACZ,UAAU,IAAI,aAAa;AAAA,MAC3B,WAAW,IAAI;AAAA,MACf,WAAW,IAAI;AAAA,IACjB;AAAA,EACF;AACF;;;AC/SA,SAAS,UAAU,SAAiC;AAKlD,QAAM,aAAa,QAAQ,QAAQ,IAAI,eAAe;AACtD,MAAI,CAAC,cAAc,CAAC,WAAW,WAAW,SAAS,GAAG;AAEpD,UAAM,MAAM,IAAI,IAAI,QAAQ,GAAG;AAC/B,UAAM,aAAa,IAAI,aAAa,IAAI,OAAO;AAC/C,QAAI,CAAC,YAAY;AACf,aAAO;AAAA,IACT;AAAA,EACF;AAGA,SAAO,QAAQ,QAAQ,IAAI,WAAW;AACxC;AAaO,SAAS,uBAAuB,QAAgB,aAA2C;AAChG,SAAO,OAAO,YAAwC;AACpD,UAAM,MAAM,IAAI,IAAI,QAAQ,GAAG;AAC/B,UAAM,SAAS,QAAQ;AACvB,UAAM,OAAO,IAAI;AAGjB,UAAM,SAAS,UAAU,OAAO;AAChC,QAAI,CAAC,QAAQ;AAEX,aAAO,YAAY,OAAO;AAAA,IAC5B;AAOA,QAAI,WAAW,UAAU,KAAK,SAAS,aAAa,GAAG;AAErD,UAAI;AACF,cAAM,OAAO,MAAM,QAAQ,KAAK;AAChC,cAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,eAAO,UAAU;AAGjB,cAAM,eAAe,EAAE,GAAG,MAAM,OAAO;AACvC,cAAM,kBAAkB,IAAI,QAAQ,QAAQ,KAAK;AAAA,UAC/C,QAAQ,QAAQ;AAAA,UAChB,SAAS,QAAQ;AAAA,UACjB,MAAM,KAAK,UAAU,YAAY;AAAA,QACnC,CAAC;AAED,eAAO,YAAY,eAAe;AAAA,MACpC,QAAQ;AACN,eAAO,YAAY,OAAO;AAAA,MAC5B;AAAA,IACF;AAGA,UAAM,oBAAoB,KAAK,MAAM,wBAAwB;AAC7D,QAAI,WAAW,SAAS,mBAAmB;AACzC,YAAM,cAAc,kBAAkB,CAAC;AAEvC,YAAM,oBAAoB,MAAM,OAAO,WAAW,IAAI,WAAW;AAEjE,UAAI,mBAAmB;AAErB,cAAM,UAAW,kBAAkB,QAAoC;AACvE,YAAI,WAAW,YAAY,QAAQ;AACjC,iBAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,gBAAgB,CAAC,GAAG;AAAA,YAC9D,QAAQ;AAAA,YACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAChD,CAAC;AAAA,QACH;AACA,eAAO,YAAY,OAAO;AAAA,MAC5B,OAAO;AAEL,YAAI;AACF,gBAAM,OAAO,MAAM,QAAQ,KAAK;AAChC,gBAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,iBAAO,UAAU;AAEjB,gBAAM,eAAe,EAAE,GAAG,MAAM,OAAO;AACvC,gBAAM,kBAAkB,IAAI,QAAQ,QAAQ,KAAK;AAAA,YAC/C,QAAQ,QAAQ;AAAA,YAChB,SAAS,QAAQ;AAAA,YACjB,MAAM,KAAK,UAAU,YAAY;AAAA,UACnC,CAAC;AAED,iBAAO,YAAY,eAAe;AAAA,QACpC,QAAQ;AACN,iBAAO,YAAY,OAAO;AAAA,QAC5B;AAAA,MACF;AAAA,IACF;AAGA,UAAM,oBAAoB,KAAK,MAAM,wBAAwB;AAC7D,QAAI,WAAW,SAAS,mBAAmB;AACzC,YAAM,cAAc,kBAAkB,CAAC;AAGvC,YAAM,YAAY,MAAM,OAAO,WAAW,IAAI,WAAW;AACzD,UAAI,CAAC,WAAW;AACd,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,sBAAsB,CAAC,GAAG;AAAA,UACpE,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,YAAM,UAAW,UAAU,QAAoC;AAC/D,UAAI,WAAW,YAAY,QAAQ;AACjC,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,gBAAgB,CAAC,GAAG;AAAA,UAC9D,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,aAAO,YAAY,OAAO;AAAA,IAC5B;AAGA,UAAM,uBAAuB,KAAK,MAAM,wBAAwB;AAChE,QAAI,WAAW,YAAY,sBAAsB;AAC/C,YAAM,cAAc,qBAAqB,CAAC;AAE1C,YAAM,YAAY,MAAM,OAAO,WAAW,IAAI,WAAW;AACzD,UAAI,CAAC,WAAW;AACd,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,sBAAsB,CAAC,GAAG;AAAA,UACpE,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,YAAM,UAAW,UAAU,QAAoC;AAC/D,UAAI,WAAW,YAAY,QAAQ;AACjC,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,gBAAgB,CAAC,GAAG;AAAA,UAC9D,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,aAAO,YAAY,OAAO;AAAA,IAC5B;AAGA,QAAI,WAAW,SAAS,KAAK,SAAS,aAAa,GAAG;AACpD,YAAM,WAAW,MAAM,YAAY,OAAO;AAG1C,UAAI,SAAS,IAAI;AACf,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,YAAI,MAAM,QAAQ,IAAI,GAAG;AACvB,gBAAM,WAAW,KAAK,OAAO,CAAC,cAAiD;AAC7E,kBAAM,UAAU,UAAU,QAAQ;AAClC,mBAAO,CAAC,WAAW,YAAY;AAAA,UACjC,CAAC;AAED,iBAAO,IAAI,SAAS,KAAK,UAAU,QAAQ,GAAG;AAAA,YAC5C,QAAQ;AAAA,YACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAChD,CAAC;AAAA,QACH;AAAA,MACF;AAEA,aAAO;AAAA,IACT;AAoBA,WAAO,YAAY,OAAO;AAAA,EAC5B;AACF;;;AHxMA,IAAM,aAAa,cAAc,YAAY,GAAG;AAChD,IAAM,YAAY,QAAQ,UAAU;AAoBpC,IAAM,OAAO,SAAS,QAAQ,IAAI,QAAQ,QAAQ,EAAE;AACpD,IAAM,aAAa,QAAQ,IAAI,cAAc,OAAO,WAAW;AAC/D,IAAM,eAAe,QAAQ,IAAI,gBAAgB,KAAK,QAAQ,GAAG,2BAA2B;AAK5F,IAAM,eAAe,YAAY;AAAA,EAC/B,MAAM;AAAA,EACN,cAAc;AAChB,CAAC;AAKD,SAAS,YAAY;AACnB,QAAM,MAAM,IAAIC,MAAK;AAGrB,MAAI;AAAA,IACF;AAAA,IACA,KAAK;AAAA,MACH,QAAQ;AAAA,MACR,cAAc,CAAC,OAAO,QAAQ,OAAO,UAAU,QAAQ,SAAS;AAAA,MAChE,cAAc,CAAC,gBAAgB,eAAe;AAAA,IAChD,CAAC;AAAA,EACH;AAGA,QAAM,UAAU,YAAY;AAC5B,QAAM,SAAS,aAAa,OAAO;AAGnC,SAAO,YAAY,SAAS,YAAY;AAGxC,QAAM,gBAAgB,oBAAoB,QAAQ;AAAA,IAChD,UAAU;AAAA,IACV,sBAAsB;AAAA,IACtB,oBAAoB,CAAC,WAAW;AAAA,IAChC,YAAY,QAAQ;AAAA,EACtB,CAAC;AAGD,gBAAc,mBAAmB,aAAa,YAAY;AAG1D,QAAM,iBAAiB,IAAI,qBAAqB,YAAY;AAG5D,QAAM,iBAAiB,qBAAqB,UAAU;AAOtD,MAAI,IAAI,WAAW,CAAC,MAAM,EAAE,KAAK,EAAE,QAAQ,MAAM,WAAW,KAAK,IAAI,EAAE,CAAC,CAAC;AAGzE,MAAI,MAAM,aAAa,WAAW,gBAAgB,YAAY,MAAM,CAAC;AAGrE,QAAM,mBAAmB,uBAAuB,QAAQ,aAAa;AACrE,MAAI,IAAI,aAAa,cAAc;AACnC,MAAI,IAAI,aAAa,cAAc,gBAAgB,CAAC;AAGpD,QAAM,YAAY,QAAQ,WAAW,WAAW;AAChD,QAAM,QAAQ,QAAQ,IAAI,aAAa;AAEvC,MAAI,WAAW,SAAS,GAAG;AAEzB,QAAI,IAAI,MAAM,YAAY,EAAE,MAAM,UAAU,CAAC,CAAC;AAG9C,QAAI,IAAI,KAAK,CAAC,MAAM;AAClB,YAAM,YAAY,QAAQ,WAAW,YAAY;AACjD,UAAI,WAAW,SAAS,GAAG;AACzB,cAAM,OAAO,aAAa,WAAW,OAAO;AAC5C,eAAO,EAAE,KAAK,IAAI;AAAA,MACpB;AACA,aAAO,EAAE,KAAK,aAAa,GAAG;AAAA,IAChC,CAAC;AAAA,EACH,WAAW,OAAO;AAEhB,QAAI,IAAI,KAAK,CAAC,MAAM;AAClB,aAAO,EAAE;AAAA,QACP;AAAA,QACA;AAAA,MACF;AAAA,IACF,CAAC;AAAA,EACH;AAEA,SAAO,EAAE,KAAK,QAAQ,eAAe;AACvC;AAKA,eAAe,cAAc;AAE3B,MAAI,CAAC,QAAQ,IAAI,kBAAkB;AACjC,YAAQ,MAAM,qCAAqC;AACnD,YAAQ,IAAI,oCAAoC;AAChD,YAAQ,IAAI,sCAAsC;AAClD,YAAQ,KAAK,CAAC;AAAA,EAChB;AAEA,QAAM,EAAE,KAAK,QAAQ,eAAe,IAAI,UAAU;AAElD,UAAQ,IAAI;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,CASb;AAEC,UAAQ,IAAI,gBAAgB;AAC5B,UAAQ,IAAI,WAAW,IAAI,EAAE;AAC7B,UAAQ,IAAI,cAAc,QAAQ,IAAI,iBAAkB,UAAU,GAAG,EAAE,CAAC,KAAK;AAC7E,UAAQ,IAAI,cAAc,YAAY,EAAE;AACxC,UAAQ,IAAI,gBAAgB,KAAK,QAAQ,GAAG,wBAAwB,CAAC,EAAE;AAEvE,UAAQ,IAAI;AAAA,WAAc;AAC1B,UAAQ,IAAI,kDAAkD;AAC9D,UAAQ,IAAI,uDAAuD;AACnE,UAAQ,IAAI,2CAA2C;AACvD,UAAQ,IAAI,kDAAkD;AAC9D,UAAQ,IAAI,mCAAmC;AAC/C,UAAQ,IAAI,mDAAmD;AAC/D,UAAQ,IAAI,qDAAqD;AACjE,UAAQ,IAAI,sDAAsD;AAClE,UAAQ,IAAI,mDAAmD;AAC/D,UAAQ,IAAI,sDAAsD;AAClE,UAAQ,IAAI,kDAAkD;AAC9D,UAAQ,IAAI,gDAAgD;AAC5D,UAAQ,IAAI,kDAAkD;AAE9D,QAAM;AAAA,IACJ,OAAO,IAAI;AAAA,IACX,MAAM;AAAA,IACN,UAAU;AAAA,EACZ,CAAC;AAED,UAAQ,IAAI;AAAA,+CAA2C,IAAI,EAAE;AAG7D,QAAM,WAAW,YAAY;AAC3B,YAAQ,IAAI,oBAAoB;AAChC,UAAM,OAAO,OAAO,WAAW;AAC/B,mBAAe,MAAM;AACrB,YAAQ,IAAI,gBAAgB;AAC5B,YAAQ,KAAK,CAAC;AAAA,EAChB;AAEA,UAAQ,GAAG,UAAU,QAAQ;AAC7B,UAAQ,GAAG,WAAW,QAAQ;AAChC;","names":["Hono","Hono"]}
package/package.json ADDED
@@ -0,0 +1,63 @@
1
+ {
2
+ "name": "@agentxjs/portagent",
3
+ "version": "0.0.2",
4
+ "description": "Portagent - AgentX Portal Application",
5
+ "type": "module",
6
+ "bin": {
7
+ "portagent": "./bin/portagent.js"
8
+ },
9
+ "main": "./dist/server/index.js",
10
+ "files": [
11
+ "dist",
12
+ "bin",
13
+ "README.md"
14
+ ],
15
+ "dependencies": {
16
+ "@hono/node-server": "^1.13.7",
17
+ "bcrypt": "^6.0.0",
18
+ "better-sqlite3": "^11.10.0",
19
+ "commander": "^12.1.0",
20
+ "hono": "^4.6.12",
21
+ "jose": "^5.9.6",
22
+ "react": "^18.3.1",
23
+ "react-dom": "^18.3.1",
24
+ "react-router-dom": "^7.1.1",
25
+ "@agentxjs/types": "0.0.2",
26
+ "@agentxjs/ui": "0.0.2",
27
+ "agentxjs": "0.0.2",
28
+ "@agentxjs/node-runtime": "0.0.2"
29
+ },
30
+ "publishConfig": {
31
+ "access": "public"
32
+ },
33
+ "devDependencies": {
34
+ "@tailwindcss/postcss": "^4.1.17",
35
+ "@types/bcrypt": "^6.0.0",
36
+ "@types/better-sqlite3": "^7.6.13",
37
+ "@types/node": "^24.9.2",
38
+ "@types/react": "^18.3.12",
39
+ "@types/react-dom": "^18.3.1",
40
+ "@vitejs/plugin-react": "^4.3.4",
41
+ "autoprefixer": "^10.4.20",
42
+ "concurrently": "^9.1.0",
43
+ "dotenv": "^16.6.1",
44
+ "postcss": "^8.4.49",
45
+ "tailwindcss": "^4.1.17",
46
+ "tsup": "^8.3.5",
47
+ "tsx": "^4.19.2",
48
+ "typescript": "^5.9.3",
49
+ "vite": "^6.0.5"
50
+ },
51
+ "scripts": {
52
+ "dev": "concurrently \"pnpm dev:server\" \"pnpm dev:client\"",
53
+ "dev:server": "tsx --watch src/server/main.ts",
54
+ "dev:client": "vite",
55
+ "build": "pnpm build:client && pnpm build:server",
56
+ "build:client": "vite build",
57
+ "build:server": "tsup",
58
+ "start": "node dist/cli/index.js",
59
+ "typecheck": "tsc --noEmit",
60
+ "lint": "eslint .",
61
+ "preview": "vite preview"
62
+ }
63
+ }