@agentxjs/portagent 0.0.4 ā 0.0.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli/index.js +368 -4
- package/dist/cli/index.js.map +1 -1
- package/dist/server/index.js +2 -0
- package/dist/server/index.js.map +1 -1
- package/package.json +5 -5
package/dist/cli/index.js
CHANGED
|
@@ -1,8 +1,372 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
|
+
import {
|
|
3
|
+
__commonJS,
|
|
4
|
+
__require,
|
|
5
|
+
__toESM
|
|
6
|
+
} from "../chunk-7D4SUZUM.js";
|
|
7
|
+
|
|
8
|
+
// ../../node_modules/.pnpm/dotenv@16.6.1/node_modules/dotenv/package.json
|
|
9
|
+
var require_package = __commonJS({
|
|
10
|
+
"../../node_modules/.pnpm/dotenv@16.6.1/node_modules/dotenv/package.json"(exports, module) {
|
|
11
|
+
module.exports = {
|
|
12
|
+
name: "dotenv",
|
|
13
|
+
version: "16.6.1",
|
|
14
|
+
description: "Loads environment variables from .env file",
|
|
15
|
+
main: "lib/main.js",
|
|
16
|
+
types: "lib/main.d.ts",
|
|
17
|
+
exports: {
|
|
18
|
+
".": {
|
|
19
|
+
types: "./lib/main.d.ts",
|
|
20
|
+
require: "./lib/main.js",
|
|
21
|
+
default: "./lib/main.js"
|
|
22
|
+
},
|
|
23
|
+
"./config": "./config.js",
|
|
24
|
+
"./config.js": "./config.js",
|
|
25
|
+
"./lib/env-options": "./lib/env-options.js",
|
|
26
|
+
"./lib/env-options.js": "./lib/env-options.js",
|
|
27
|
+
"./lib/cli-options": "./lib/cli-options.js",
|
|
28
|
+
"./lib/cli-options.js": "./lib/cli-options.js",
|
|
29
|
+
"./package.json": "./package.json"
|
|
30
|
+
},
|
|
31
|
+
scripts: {
|
|
32
|
+
"dts-check": "tsc --project tests/types/tsconfig.json",
|
|
33
|
+
lint: "standard",
|
|
34
|
+
pretest: "npm run lint && npm run dts-check",
|
|
35
|
+
test: "tap run --allow-empty-coverage --disable-coverage --timeout=60000",
|
|
36
|
+
"test:coverage": "tap run --show-full-coverage --timeout=60000 --coverage-report=text --coverage-report=lcov",
|
|
37
|
+
prerelease: "npm test",
|
|
38
|
+
release: "standard-version"
|
|
39
|
+
},
|
|
40
|
+
repository: {
|
|
41
|
+
type: "git",
|
|
42
|
+
url: "git://github.com/motdotla/dotenv.git"
|
|
43
|
+
},
|
|
44
|
+
homepage: "https://github.com/motdotla/dotenv#readme",
|
|
45
|
+
funding: "https://dotenvx.com",
|
|
46
|
+
keywords: [
|
|
47
|
+
"dotenv",
|
|
48
|
+
"env",
|
|
49
|
+
".env",
|
|
50
|
+
"environment",
|
|
51
|
+
"variables",
|
|
52
|
+
"config",
|
|
53
|
+
"settings"
|
|
54
|
+
],
|
|
55
|
+
readmeFilename: "README.md",
|
|
56
|
+
license: "BSD-2-Clause",
|
|
57
|
+
devDependencies: {
|
|
58
|
+
"@types/node": "^18.11.3",
|
|
59
|
+
decache: "^4.6.2",
|
|
60
|
+
sinon: "^14.0.1",
|
|
61
|
+
standard: "^17.0.0",
|
|
62
|
+
"standard-version": "^9.5.0",
|
|
63
|
+
tap: "^19.2.0",
|
|
64
|
+
typescript: "^4.8.4"
|
|
65
|
+
},
|
|
66
|
+
engines: {
|
|
67
|
+
node: ">=12"
|
|
68
|
+
},
|
|
69
|
+
browser: {
|
|
70
|
+
fs: false
|
|
71
|
+
}
|
|
72
|
+
};
|
|
73
|
+
}
|
|
74
|
+
});
|
|
75
|
+
|
|
76
|
+
// ../../node_modules/.pnpm/dotenv@16.6.1/node_modules/dotenv/lib/main.js
|
|
77
|
+
var require_main = __commonJS({
|
|
78
|
+
"../../node_modules/.pnpm/dotenv@16.6.1/node_modules/dotenv/lib/main.js"(exports, module) {
|
|
79
|
+
"use strict";
|
|
80
|
+
var fs = __require("fs");
|
|
81
|
+
var path = __require("path");
|
|
82
|
+
var os = __require("os");
|
|
83
|
+
var crypto = __require("crypto");
|
|
84
|
+
var packageJson = require_package();
|
|
85
|
+
var version = packageJson.version;
|
|
86
|
+
var LINE = /(?:^|^)\s*(?:export\s+)?([\w.-]+)(?:\s*=\s*?|:\s+?)(\s*'(?:\\'|[^'])*'|\s*"(?:\\"|[^"])*"|\s*`(?:\\`|[^`])*`|[^#\r\n]+)?\s*(?:#.*)?(?:$|$)/mg;
|
|
87
|
+
function parse(src) {
|
|
88
|
+
const obj = {};
|
|
89
|
+
let lines = src.toString();
|
|
90
|
+
lines = lines.replace(/\r\n?/mg, "\n");
|
|
91
|
+
let match;
|
|
92
|
+
while ((match = LINE.exec(lines)) != null) {
|
|
93
|
+
const key = match[1];
|
|
94
|
+
let value = match[2] || "";
|
|
95
|
+
value = value.trim();
|
|
96
|
+
const maybeQuote = value[0];
|
|
97
|
+
value = value.replace(/^(['"`])([\s\S]*)\1$/mg, "$2");
|
|
98
|
+
if (maybeQuote === '"') {
|
|
99
|
+
value = value.replace(/\\n/g, "\n");
|
|
100
|
+
value = value.replace(/\\r/g, "\r");
|
|
101
|
+
}
|
|
102
|
+
obj[key] = value;
|
|
103
|
+
}
|
|
104
|
+
return obj;
|
|
105
|
+
}
|
|
106
|
+
function _parseVault(options) {
|
|
107
|
+
options = options || {};
|
|
108
|
+
const vaultPath = _vaultPath(options);
|
|
109
|
+
options.path = vaultPath;
|
|
110
|
+
const result = DotenvModule.configDotenv(options);
|
|
111
|
+
if (!result.parsed) {
|
|
112
|
+
const err = new Error(`MISSING_DATA: Cannot parse ${vaultPath} for an unknown reason`);
|
|
113
|
+
err.code = "MISSING_DATA";
|
|
114
|
+
throw err;
|
|
115
|
+
}
|
|
116
|
+
const keys = _dotenvKey(options).split(",");
|
|
117
|
+
const length = keys.length;
|
|
118
|
+
let decrypted;
|
|
119
|
+
for (let i = 0; i < length; i++) {
|
|
120
|
+
try {
|
|
121
|
+
const key = keys[i].trim();
|
|
122
|
+
const attrs = _instructions(result, key);
|
|
123
|
+
decrypted = DotenvModule.decrypt(attrs.ciphertext, attrs.key);
|
|
124
|
+
break;
|
|
125
|
+
} catch (error) {
|
|
126
|
+
if (i + 1 >= length) {
|
|
127
|
+
throw error;
|
|
128
|
+
}
|
|
129
|
+
}
|
|
130
|
+
}
|
|
131
|
+
return DotenvModule.parse(decrypted);
|
|
132
|
+
}
|
|
133
|
+
function _warn(message) {
|
|
134
|
+
console.log(`[dotenv@${version}][WARN] ${message}`);
|
|
135
|
+
}
|
|
136
|
+
function _debug(message) {
|
|
137
|
+
console.log(`[dotenv@${version}][DEBUG] ${message}`);
|
|
138
|
+
}
|
|
139
|
+
function _log(message) {
|
|
140
|
+
console.log(`[dotenv@${version}] ${message}`);
|
|
141
|
+
}
|
|
142
|
+
function _dotenvKey(options) {
|
|
143
|
+
if (options && options.DOTENV_KEY && options.DOTENV_KEY.length > 0) {
|
|
144
|
+
return options.DOTENV_KEY;
|
|
145
|
+
}
|
|
146
|
+
if (process.env.DOTENV_KEY && process.env.DOTENV_KEY.length > 0) {
|
|
147
|
+
return process.env.DOTENV_KEY;
|
|
148
|
+
}
|
|
149
|
+
return "";
|
|
150
|
+
}
|
|
151
|
+
function _instructions(result, dotenvKey) {
|
|
152
|
+
let uri;
|
|
153
|
+
try {
|
|
154
|
+
uri = new URL(dotenvKey);
|
|
155
|
+
} catch (error) {
|
|
156
|
+
if (error.code === "ERR_INVALID_URL") {
|
|
157
|
+
const err = new Error("INVALID_DOTENV_KEY: Wrong format. Must be in valid uri format like dotenv://:key_1234@dotenvx.com/vault/.env.vault?environment=development");
|
|
158
|
+
err.code = "INVALID_DOTENV_KEY";
|
|
159
|
+
throw err;
|
|
160
|
+
}
|
|
161
|
+
throw error;
|
|
162
|
+
}
|
|
163
|
+
const key = uri.password;
|
|
164
|
+
if (!key) {
|
|
165
|
+
const err = new Error("INVALID_DOTENV_KEY: Missing key part");
|
|
166
|
+
err.code = "INVALID_DOTENV_KEY";
|
|
167
|
+
throw err;
|
|
168
|
+
}
|
|
169
|
+
const environment = uri.searchParams.get("environment");
|
|
170
|
+
if (!environment) {
|
|
171
|
+
const err = new Error("INVALID_DOTENV_KEY: Missing environment part");
|
|
172
|
+
err.code = "INVALID_DOTENV_KEY";
|
|
173
|
+
throw err;
|
|
174
|
+
}
|
|
175
|
+
const environmentKey = `DOTENV_VAULT_${environment.toUpperCase()}`;
|
|
176
|
+
const ciphertext = result.parsed[environmentKey];
|
|
177
|
+
if (!ciphertext) {
|
|
178
|
+
const err = new Error(`NOT_FOUND_DOTENV_ENVIRONMENT: Cannot locate environment ${environmentKey} in your .env.vault file.`);
|
|
179
|
+
err.code = "NOT_FOUND_DOTENV_ENVIRONMENT";
|
|
180
|
+
throw err;
|
|
181
|
+
}
|
|
182
|
+
return { ciphertext, key };
|
|
183
|
+
}
|
|
184
|
+
function _vaultPath(options) {
|
|
185
|
+
let possibleVaultPath = null;
|
|
186
|
+
if (options && options.path && options.path.length > 0) {
|
|
187
|
+
if (Array.isArray(options.path)) {
|
|
188
|
+
for (const filepath of options.path) {
|
|
189
|
+
if (fs.existsSync(filepath)) {
|
|
190
|
+
possibleVaultPath = filepath.endsWith(".vault") ? filepath : `${filepath}.vault`;
|
|
191
|
+
}
|
|
192
|
+
}
|
|
193
|
+
} else {
|
|
194
|
+
possibleVaultPath = options.path.endsWith(".vault") ? options.path : `${options.path}.vault`;
|
|
195
|
+
}
|
|
196
|
+
} else {
|
|
197
|
+
possibleVaultPath = path.resolve(process.cwd(), ".env.vault");
|
|
198
|
+
}
|
|
199
|
+
if (fs.existsSync(possibleVaultPath)) {
|
|
200
|
+
return possibleVaultPath;
|
|
201
|
+
}
|
|
202
|
+
return null;
|
|
203
|
+
}
|
|
204
|
+
function _resolveHome(envPath) {
|
|
205
|
+
return envPath[0] === "~" ? path.join(os.homedir(), envPath.slice(1)) : envPath;
|
|
206
|
+
}
|
|
207
|
+
function _configVault(options) {
|
|
208
|
+
const debug = Boolean(options && options.debug);
|
|
209
|
+
const quiet = options && "quiet" in options ? options.quiet : true;
|
|
210
|
+
if (debug || !quiet) {
|
|
211
|
+
_log("Loading env from encrypted .env.vault");
|
|
212
|
+
}
|
|
213
|
+
const parsed = DotenvModule._parseVault(options);
|
|
214
|
+
let processEnv = process.env;
|
|
215
|
+
if (options && options.processEnv != null) {
|
|
216
|
+
processEnv = options.processEnv;
|
|
217
|
+
}
|
|
218
|
+
DotenvModule.populate(processEnv, parsed, options);
|
|
219
|
+
return { parsed };
|
|
220
|
+
}
|
|
221
|
+
function configDotenv(options) {
|
|
222
|
+
const dotenvPath = path.resolve(process.cwd(), ".env");
|
|
223
|
+
let encoding = "utf8";
|
|
224
|
+
const debug = Boolean(options && options.debug);
|
|
225
|
+
const quiet = options && "quiet" in options ? options.quiet : true;
|
|
226
|
+
if (options && options.encoding) {
|
|
227
|
+
encoding = options.encoding;
|
|
228
|
+
} else {
|
|
229
|
+
if (debug) {
|
|
230
|
+
_debug("No encoding is specified. UTF-8 is used by default");
|
|
231
|
+
}
|
|
232
|
+
}
|
|
233
|
+
let optionPaths = [dotenvPath];
|
|
234
|
+
if (options && options.path) {
|
|
235
|
+
if (!Array.isArray(options.path)) {
|
|
236
|
+
optionPaths = [_resolveHome(options.path)];
|
|
237
|
+
} else {
|
|
238
|
+
optionPaths = [];
|
|
239
|
+
for (const filepath of options.path) {
|
|
240
|
+
optionPaths.push(_resolveHome(filepath));
|
|
241
|
+
}
|
|
242
|
+
}
|
|
243
|
+
}
|
|
244
|
+
let lastError;
|
|
245
|
+
const parsedAll = {};
|
|
246
|
+
for (const path2 of optionPaths) {
|
|
247
|
+
try {
|
|
248
|
+
const parsed = DotenvModule.parse(fs.readFileSync(path2, { encoding }));
|
|
249
|
+
DotenvModule.populate(parsedAll, parsed, options);
|
|
250
|
+
} catch (e) {
|
|
251
|
+
if (debug) {
|
|
252
|
+
_debug(`Failed to load ${path2} ${e.message}`);
|
|
253
|
+
}
|
|
254
|
+
lastError = e;
|
|
255
|
+
}
|
|
256
|
+
}
|
|
257
|
+
let processEnv = process.env;
|
|
258
|
+
if (options && options.processEnv != null) {
|
|
259
|
+
processEnv = options.processEnv;
|
|
260
|
+
}
|
|
261
|
+
DotenvModule.populate(processEnv, parsedAll, options);
|
|
262
|
+
if (debug || !quiet) {
|
|
263
|
+
const keysCount = Object.keys(parsedAll).length;
|
|
264
|
+
const shortPaths = [];
|
|
265
|
+
for (const filePath of optionPaths) {
|
|
266
|
+
try {
|
|
267
|
+
const relative = path.relative(process.cwd(), filePath);
|
|
268
|
+
shortPaths.push(relative);
|
|
269
|
+
} catch (e) {
|
|
270
|
+
if (debug) {
|
|
271
|
+
_debug(`Failed to load ${filePath} ${e.message}`);
|
|
272
|
+
}
|
|
273
|
+
lastError = e;
|
|
274
|
+
}
|
|
275
|
+
}
|
|
276
|
+
_log(`injecting env (${keysCount}) from ${shortPaths.join(",")}`);
|
|
277
|
+
}
|
|
278
|
+
if (lastError) {
|
|
279
|
+
return { parsed: parsedAll, error: lastError };
|
|
280
|
+
} else {
|
|
281
|
+
return { parsed: parsedAll };
|
|
282
|
+
}
|
|
283
|
+
}
|
|
284
|
+
function config2(options) {
|
|
285
|
+
if (_dotenvKey(options).length === 0) {
|
|
286
|
+
return DotenvModule.configDotenv(options);
|
|
287
|
+
}
|
|
288
|
+
const vaultPath = _vaultPath(options);
|
|
289
|
+
if (!vaultPath) {
|
|
290
|
+
_warn(`You set DOTENV_KEY but you are missing a .env.vault file at ${vaultPath}. Did you forget to build it?`);
|
|
291
|
+
return DotenvModule.configDotenv(options);
|
|
292
|
+
}
|
|
293
|
+
return DotenvModule._configVault(options);
|
|
294
|
+
}
|
|
295
|
+
function decrypt(encrypted, keyStr) {
|
|
296
|
+
const key = Buffer.from(keyStr.slice(-64), "hex");
|
|
297
|
+
let ciphertext = Buffer.from(encrypted, "base64");
|
|
298
|
+
const nonce = ciphertext.subarray(0, 12);
|
|
299
|
+
const authTag = ciphertext.subarray(-16);
|
|
300
|
+
ciphertext = ciphertext.subarray(12, -16);
|
|
301
|
+
try {
|
|
302
|
+
const aesgcm = crypto.createDecipheriv("aes-256-gcm", key, nonce);
|
|
303
|
+
aesgcm.setAuthTag(authTag);
|
|
304
|
+
return `${aesgcm.update(ciphertext)}${aesgcm.final()}`;
|
|
305
|
+
} catch (error) {
|
|
306
|
+
const isRange = error instanceof RangeError;
|
|
307
|
+
const invalidKeyLength = error.message === "Invalid key length";
|
|
308
|
+
const decryptionFailed = error.message === "Unsupported state or unable to authenticate data";
|
|
309
|
+
if (isRange || invalidKeyLength) {
|
|
310
|
+
const err = new Error("INVALID_DOTENV_KEY: It must be 64 characters long (or more)");
|
|
311
|
+
err.code = "INVALID_DOTENV_KEY";
|
|
312
|
+
throw err;
|
|
313
|
+
} else if (decryptionFailed) {
|
|
314
|
+
const err = new Error("DECRYPTION_FAILED: Please check your DOTENV_KEY");
|
|
315
|
+
err.code = "DECRYPTION_FAILED";
|
|
316
|
+
throw err;
|
|
317
|
+
} else {
|
|
318
|
+
throw error;
|
|
319
|
+
}
|
|
320
|
+
}
|
|
321
|
+
}
|
|
322
|
+
function populate(processEnv, parsed, options = {}) {
|
|
323
|
+
const debug = Boolean(options && options.debug);
|
|
324
|
+
const override = Boolean(options && options.override);
|
|
325
|
+
if (typeof parsed !== "object") {
|
|
326
|
+
const err = new Error("OBJECT_REQUIRED: Please check the processEnv argument being passed to populate");
|
|
327
|
+
err.code = "OBJECT_REQUIRED";
|
|
328
|
+
throw err;
|
|
329
|
+
}
|
|
330
|
+
for (const key of Object.keys(parsed)) {
|
|
331
|
+
if (Object.prototype.hasOwnProperty.call(processEnv, key)) {
|
|
332
|
+
if (override === true) {
|
|
333
|
+
processEnv[key] = parsed[key];
|
|
334
|
+
}
|
|
335
|
+
if (debug) {
|
|
336
|
+
if (override === true) {
|
|
337
|
+
_debug(`"${key}" is already defined and WAS overwritten`);
|
|
338
|
+
} else {
|
|
339
|
+
_debug(`"${key}" is already defined and was NOT overwritten`);
|
|
340
|
+
}
|
|
341
|
+
}
|
|
342
|
+
} else {
|
|
343
|
+
processEnv[key] = parsed[key];
|
|
344
|
+
}
|
|
345
|
+
}
|
|
346
|
+
}
|
|
347
|
+
var DotenvModule = {
|
|
348
|
+
configDotenv,
|
|
349
|
+
_configVault,
|
|
350
|
+
_parseVault,
|
|
351
|
+
config: config2,
|
|
352
|
+
decrypt,
|
|
353
|
+
parse,
|
|
354
|
+
populate
|
|
355
|
+
};
|
|
356
|
+
module.exports.configDotenv = DotenvModule.configDotenv;
|
|
357
|
+
module.exports._configVault = DotenvModule._configVault;
|
|
358
|
+
module.exports._parseVault = DotenvModule._parseVault;
|
|
359
|
+
module.exports.config = DotenvModule.config;
|
|
360
|
+
module.exports.decrypt = DotenvModule.decrypt;
|
|
361
|
+
module.exports.parse = DotenvModule.parse;
|
|
362
|
+
module.exports.populate = DotenvModule.populate;
|
|
363
|
+
module.exports = DotenvModule;
|
|
364
|
+
}
|
|
365
|
+
});
|
|
2
366
|
|
|
3
367
|
// src/cli/index.ts
|
|
368
|
+
var import_dotenv = __toESM(require_main(), 1);
|
|
4
369
|
import { Command } from "commander";
|
|
5
|
-
import { config } from "dotenv";
|
|
6
370
|
import { existsSync } from "fs";
|
|
7
371
|
import { resolve } from "path";
|
|
8
372
|
var program = new Command();
|
|
@@ -13,10 +377,10 @@ program.name("portagent").description("Portagent - AgentX Portal Application").v
|
|
|
13
377
|
console.error(`Error: Environment file not found: ${envPath}`);
|
|
14
378
|
process.exit(1);
|
|
15
379
|
}
|
|
16
|
-
config({ path: envPath });
|
|
380
|
+
(0, import_dotenv.config)({ path: envPath });
|
|
17
381
|
} else {
|
|
18
|
-
config({ path: resolve(process.cwd(), ".env") });
|
|
19
|
-
config({ path: resolve(process.cwd(), ".env.local") });
|
|
382
|
+
(0, import_dotenv.config)({ path: resolve(process.cwd(), ".env") });
|
|
383
|
+
(0, import_dotenv.config)({ path: resolve(process.cwd(), ".env.local") });
|
|
20
384
|
}
|
|
21
385
|
if (options.port) {
|
|
22
386
|
process.env.PORT = options.port;
|
package/dist/cli/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/cli/index.ts"],"sourcesContent":["#!/usr/bin/env node\n/**\n * Portagent CLI\n *\n * Command-line interface for running the Portagent server.\n *\n * Usage:\n * portagent # Start with defaults\n * portagent -p 3000 # Custom port\n * portagent --env-file .env.prod # Load custom env file\n */\n\nimport { Command } from \"commander\";\nimport { config } from \"dotenv\";\nimport { existsSync } from \"fs\";\nimport { resolve } from \"path\";\n\nconst program = new Command();\n\nprogram\n .name(\"portagent\")\n .description(\"Portagent - AgentX Portal Application\")\n .version(\"0.0.1\")\n .option(\"-p, --port <port>\", \"Port to listen on\", \"5200\")\n .option(\"-e, --env-file <path>\", \"Path to environment file\")\n .option(\"--password <password>\", \"Set login password (or use PORTAGENT_PASSWORD env var)\")\n .option(\"--jwt-secret <secret>\", \"JWT secret for token signing (or use JWT_SECRET env var)\")\n .option(\"--api-key <key>\", \"LLM provider API key (or use LLM_PROVIDER_KEY env var)\")\n .option(\"--api-url <url>\", \"LLM provider base URL (or use LLM_PROVIDER_URL env var)\")\n .option(\"--model <model>\", \"LLM model name (or use LLM_PROVIDER_MODEL env var)\")\n .action(async (options) => {\n // Load env file (CLI option takes priority, then defaults)\n if (options.envFile) {\n const envPath = resolve(process.cwd(), options.envFile);\n if (!existsSync(envPath)) {\n console.error(`Error: Environment file not found: ${envPath}`);\n process.exit(1);\n }\n config({ path: envPath });\n } else {\n // Default: load .env and .env.local from current directory\n config({ path: resolve(process.cwd(), \".env\") });\n config({ path: resolve(process.cwd(), \".env.local\") });\n }\n\n // Set environment variables from CLI options (override env file)\n if (options.port) {\n process.env.PORT = options.port;\n }\n if (options.password) {\n process.env.PORTAGENT_PASSWORD = options.password;\n }\n if (options.jwtSecret) {\n process.env.JWT_SECRET = options.jwtSecret;\n }\n if (options.apiKey) {\n process.env.LLM_PROVIDER_KEY = options.apiKey;\n }\n if (options.apiUrl) {\n process.env.LLM_PROVIDER_URL = options.apiUrl;\n }\n if (options.model) {\n process.env.LLM_PROVIDER_MODEL = options.model;\n }\n\n // Import and start server\n const { startServer } = await import(\"../server/index.js\");\n await startServer();\n });\n\nprogram.parse();\n"],"mappings":";;;AAYA,SAAS,eAAe;AACxB,SAAS,cAAc;AACvB,SAAS,kBAAkB;AAC3B,SAAS,eAAe;AAExB,IAAM,UAAU,IAAI,QAAQ;AAE5B,QACG,KAAK,WAAW,EAChB,YAAY,uCAAuC,EACnD,QAAQ,OAAO,EACf,OAAO,qBAAqB,qBAAqB,MAAM,EACvD,OAAO,yBAAyB,0BAA0B,EAC1D,OAAO,yBAAyB,wDAAwD,EACxF,OAAO,yBAAyB,0DAA0D,EAC1F,OAAO,mBAAmB,wDAAwD,EAClF,OAAO,mBAAmB,yDAAyD,EACnF,OAAO,mBAAmB,oDAAoD,EAC9E,OAAO,OAAO,YAAY;AAEzB,MAAI,QAAQ,SAAS;AACnB,UAAM,UAAU,QAAQ,QAAQ,IAAI,GAAG,QAAQ,OAAO;AACtD,QAAI,CAAC,WAAW,OAAO,GAAG;AACxB,cAAQ,MAAM,sCAAsC,OAAO,EAAE;AAC7D,cAAQ,KAAK,CAAC;AAAA,IAChB;AACA,WAAO,EAAE,MAAM,QAAQ,CAAC;AAAA,EAC1B,OAAO;AAEL,WAAO,EAAE,MAAM,QAAQ,QAAQ,IAAI,GAAG,MAAM,EAAE,CAAC;AAC/C,WAAO,EAAE,MAAM,QAAQ,QAAQ,IAAI,GAAG,YAAY,EAAE,CAAC;AAAA,EACvD;AAGA,MAAI,QAAQ,MAAM;AAChB,YAAQ,IAAI,OAAO,QAAQ;AAAA,EAC7B;AACA,MAAI,QAAQ,UAAU;AACpB,YAAQ,IAAI,qBAAqB,QAAQ;AAAA,EAC3C;AACA,MAAI,QAAQ,WAAW;AACrB,YAAQ,IAAI,aAAa,QAAQ;AAAA,EACnC;AACA,MAAI,QAAQ,QAAQ;AAClB,YAAQ,IAAI,mBAAmB,QAAQ;AAAA,EACzC;AACA,MAAI,QAAQ,QAAQ;AAClB,YAAQ,IAAI,mBAAmB,QAAQ;AAAA,EACzC;AACA,MAAI,QAAQ,OAAO;AACjB,YAAQ,IAAI,qBAAqB,QAAQ;AAAA,EAC3C;AAGA,QAAM,EAAE,YAAY,IAAI,MAAM,OAAO,oBAAoB;AACzD,QAAM,YAAY;AACpB,CAAC;AAEH,QAAQ,MAAM;","names":[]}
|
|
1
|
+
{"version":3,"sources":["../../../../node_modules/.pnpm/dotenv@16.6.1/node_modules/dotenv/package.json","../../../../node_modules/.pnpm/dotenv@16.6.1/node_modules/dotenv/lib/main.js","../../src/cli/index.ts"],"sourcesContent":["{\n \"name\": \"dotenv\",\n \"version\": \"16.6.1\",\n \"description\": \"Loads environment variables from .env file\",\n \"main\": \"lib/main.js\",\n \"types\": \"lib/main.d.ts\",\n \"exports\": {\n \".\": {\n \"types\": \"./lib/main.d.ts\",\n \"require\": \"./lib/main.js\",\n \"default\": \"./lib/main.js\"\n },\n \"./config\": \"./config.js\",\n \"./config.js\": \"./config.js\",\n \"./lib/env-options\": \"./lib/env-options.js\",\n \"./lib/env-options.js\": \"./lib/env-options.js\",\n \"./lib/cli-options\": \"./lib/cli-options.js\",\n \"./lib/cli-options.js\": \"./lib/cli-options.js\",\n \"./package.json\": \"./package.json\"\n },\n \"scripts\": {\n \"dts-check\": \"tsc --project tests/types/tsconfig.json\",\n \"lint\": \"standard\",\n \"pretest\": \"npm run lint && npm run dts-check\",\n \"test\": \"tap run --allow-empty-coverage --disable-coverage --timeout=60000\",\n \"test:coverage\": \"tap run --show-full-coverage --timeout=60000 --coverage-report=text --coverage-report=lcov\",\n \"prerelease\": \"npm test\",\n \"release\": \"standard-version\"\n },\n \"repository\": {\n \"type\": \"git\",\n \"url\": \"git://github.com/motdotla/dotenv.git\"\n },\n \"homepage\": \"https://github.com/motdotla/dotenv#readme\",\n \"funding\": \"https://dotenvx.com\",\n \"keywords\": [\n \"dotenv\",\n \"env\",\n \".env\",\n \"environment\",\n \"variables\",\n \"config\",\n \"settings\"\n ],\n \"readmeFilename\": \"README.md\",\n \"license\": \"BSD-2-Clause\",\n \"devDependencies\": {\n \"@types/node\": \"^18.11.3\",\n \"decache\": \"^4.6.2\",\n \"sinon\": \"^14.0.1\",\n \"standard\": \"^17.0.0\",\n \"standard-version\": \"^9.5.0\",\n \"tap\": \"^19.2.0\",\n \"typescript\": \"^4.8.4\"\n },\n \"engines\": {\n \"node\": \">=12\"\n },\n \"browser\": {\n \"fs\": false\n }\n}\n","const fs = require('fs')\nconst path = require('path')\nconst os = require('os')\nconst crypto = require('crypto')\nconst packageJson = require('../package.json')\n\nconst version = packageJson.version\n\nconst LINE = /(?:^|^)\\s*(?:export\\s+)?([\\w.-]+)(?:\\s*=\\s*?|:\\s+?)(\\s*'(?:\\\\'|[^'])*'|\\s*\"(?:\\\\\"|[^\"])*\"|\\s*`(?:\\\\`|[^`])*`|[^#\\r\\n]+)?\\s*(?:#.*)?(?:$|$)/mg\n\n// Parse src into an Object\nfunction parse (src) {\n const obj = {}\n\n // Convert buffer to string\n let lines = src.toString()\n\n // Convert line breaks to same format\n lines = lines.replace(/\\r\\n?/mg, '\\n')\n\n let match\n while ((match = LINE.exec(lines)) != null) {\n const key = match[1]\n\n // Default undefined or null to empty string\n let value = (match[2] || '')\n\n // Remove whitespace\n value = value.trim()\n\n // Check if double quoted\n const maybeQuote = value[0]\n\n // Remove surrounding quotes\n value = value.replace(/^(['\"`])([\\s\\S]*)\\1$/mg, '$2')\n\n // Expand newlines if double quoted\n if (maybeQuote === '\"') {\n value = value.replace(/\\\\n/g, '\\n')\n value = value.replace(/\\\\r/g, '\\r')\n }\n\n // Add to object\n obj[key] = value\n }\n\n return obj\n}\n\nfunction _parseVault (options) {\n options = options || {}\n\n const vaultPath = _vaultPath(options)\n options.path = vaultPath // parse .env.vault\n const result = DotenvModule.configDotenv(options)\n if (!result.parsed) {\n const err = new Error(`MISSING_DATA: Cannot parse ${vaultPath} for an unknown reason`)\n err.code = 'MISSING_DATA'\n throw err\n }\n\n // handle scenario for comma separated keys - for use with key rotation\n // example: DOTENV_KEY=\"dotenv://:key_1234@dotenvx.com/vault/.env.vault?environment=prod,dotenv://:key_7890@dotenvx.com/vault/.env.vault?environment=prod\"\n const keys = _dotenvKey(options).split(',')\n const length = keys.length\n\n let decrypted\n for (let i = 0; i < length; i++) {\n try {\n // Get full key\n const key = keys[i].trim()\n\n // Get instructions for decrypt\n const attrs = _instructions(result, key)\n\n // Decrypt\n decrypted = DotenvModule.decrypt(attrs.ciphertext, attrs.key)\n\n break\n } catch (error) {\n // last key\n if (i + 1 >= length) {\n throw error\n }\n // try next key\n }\n }\n\n // Parse decrypted .env string\n return DotenvModule.parse(decrypted)\n}\n\nfunction _warn (message) {\n console.log(`[dotenv@${version}][WARN] ${message}`)\n}\n\nfunction _debug (message) {\n console.log(`[dotenv@${version}][DEBUG] ${message}`)\n}\n\nfunction _log (message) {\n console.log(`[dotenv@${version}] ${message}`)\n}\n\nfunction _dotenvKey (options) {\n // prioritize developer directly setting options.DOTENV_KEY\n if (options && options.DOTENV_KEY && options.DOTENV_KEY.length > 0) {\n return options.DOTENV_KEY\n }\n\n // secondary infra already contains a DOTENV_KEY environment variable\n if (process.env.DOTENV_KEY && process.env.DOTENV_KEY.length > 0) {\n return process.env.DOTENV_KEY\n }\n\n // fallback to empty string\n return ''\n}\n\nfunction _instructions (result, dotenvKey) {\n // Parse DOTENV_KEY. Format is a URI\n let uri\n try {\n uri = new URL(dotenvKey)\n } catch (error) {\n if (error.code === 'ERR_INVALID_URL') {\n const err = new Error('INVALID_DOTENV_KEY: Wrong format. Must be in valid uri format like dotenv://:key_1234@dotenvx.com/vault/.env.vault?environment=development')\n err.code = 'INVALID_DOTENV_KEY'\n throw err\n }\n\n throw error\n }\n\n // Get decrypt key\n const key = uri.password\n if (!key) {\n const err = new Error('INVALID_DOTENV_KEY: Missing key part')\n err.code = 'INVALID_DOTENV_KEY'\n throw err\n }\n\n // Get environment\n const environment = uri.searchParams.get('environment')\n if (!environment) {\n const err = new Error('INVALID_DOTENV_KEY: Missing environment part')\n err.code = 'INVALID_DOTENV_KEY'\n throw err\n }\n\n // Get ciphertext payload\n const environmentKey = `DOTENV_VAULT_${environment.toUpperCase()}`\n const ciphertext = result.parsed[environmentKey] // DOTENV_VAULT_PRODUCTION\n if (!ciphertext) {\n const err = new Error(`NOT_FOUND_DOTENV_ENVIRONMENT: Cannot locate environment ${environmentKey} in your .env.vault file.`)\n err.code = 'NOT_FOUND_DOTENV_ENVIRONMENT'\n throw err\n }\n\n return { ciphertext, key }\n}\n\nfunction _vaultPath (options) {\n let possibleVaultPath = null\n\n if (options && options.path && options.path.length > 0) {\n if (Array.isArray(options.path)) {\n for (const filepath of options.path) {\n if (fs.existsSync(filepath)) {\n possibleVaultPath = filepath.endsWith('.vault') ? filepath : `${filepath}.vault`\n }\n }\n } else {\n possibleVaultPath = options.path.endsWith('.vault') ? options.path : `${options.path}.vault`\n }\n } else {\n possibleVaultPath = path.resolve(process.cwd(), '.env.vault')\n }\n\n if (fs.existsSync(possibleVaultPath)) {\n return possibleVaultPath\n }\n\n return null\n}\n\nfunction _resolveHome (envPath) {\n return envPath[0] === '~' ? path.join(os.homedir(), envPath.slice(1)) : envPath\n}\n\nfunction _configVault (options) {\n const debug = Boolean(options && options.debug)\n const quiet = options && 'quiet' in options ? options.quiet : true\n\n if (debug || !quiet) {\n _log('Loading env from encrypted .env.vault')\n }\n\n const parsed = DotenvModule._parseVault(options)\n\n let processEnv = process.env\n if (options && options.processEnv != null) {\n processEnv = options.processEnv\n }\n\n DotenvModule.populate(processEnv, parsed, options)\n\n return { parsed }\n}\n\nfunction configDotenv (options) {\n const dotenvPath = path.resolve(process.cwd(), '.env')\n let encoding = 'utf8'\n const debug = Boolean(options && options.debug)\n const quiet = options && 'quiet' in options ? options.quiet : true\n\n if (options && options.encoding) {\n encoding = options.encoding\n } else {\n if (debug) {\n _debug('No encoding is specified. UTF-8 is used by default')\n }\n }\n\n let optionPaths = [dotenvPath] // default, look for .env\n if (options && options.path) {\n if (!Array.isArray(options.path)) {\n optionPaths = [_resolveHome(options.path)]\n } else {\n optionPaths = [] // reset default\n for (const filepath of options.path) {\n optionPaths.push(_resolveHome(filepath))\n }\n }\n }\n\n // Build the parsed data in a temporary object (because we need to return it). Once we have the final\n // parsed data, we will combine it with process.env (or options.processEnv if provided).\n let lastError\n const parsedAll = {}\n for (const path of optionPaths) {\n try {\n // Specifying an encoding returns a string instead of a buffer\n const parsed = DotenvModule.parse(fs.readFileSync(path, { encoding }))\n\n DotenvModule.populate(parsedAll, parsed, options)\n } catch (e) {\n if (debug) {\n _debug(`Failed to load ${path} ${e.message}`)\n }\n lastError = e\n }\n }\n\n let processEnv = process.env\n if (options && options.processEnv != null) {\n processEnv = options.processEnv\n }\n\n DotenvModule.populate(processEnv, parsedAll, options)\n\n if (debug || !quiet) {\n const keysCount = Object.keys(parsedAll).length\n const shortPaths = []\n for (const filePath of optionPaths) {\n try {\n const relative = path.relative(process.cwd(), filePath)\n shortPaths.push(relative)\n } catch (e) {\n if (debug) {\n _debug(`Failed to load ${filePath} ${e.message}`)\n }\n lastError = e\n }\n }\n\n _log(`injecting env (${keysCount}) from ${shortPaths.join(',')}`)\n }\n\n if (lastError) {\n return { parsed: parsedAll, error: lastError }\n } else {\n return { parsed: parsedAll }\n }\n}\n\n// Populates process.env from .env file\nfunction config (options) {\n // fallback to original dotenv if DOTENV_KEY is not set\n if (_dotenvKey(options).length === 0) {\n return DotenvModule.configDotenv(options)\n }\n\n const vaultPath = _vaultPath(options)\n\n // dotenvKey exists but .env.vault file does not exist\n if (!vaultPath) {\n _warn(`You set DOTENV_KEY but you are missing a .env.vault file at ${vaultPath}. Did you forget to build it?`)\n\n return DotenvModule.configDotenv(options)\n }\n\n return DotenvModule._configVault(options)\n}\n\nfunction decrypt (encrypted, keyStr) {\n const key = Buffer.from(keyStr.slice(-64), 'hex')\n let ciphertext = Buffer.from(encrypted, 'base64')\n\n const nonce = ciphertext.subarray(0, 12)\n const authTag = ciphertext.subarray(-16)\n ciphertext = ciphertext.subarray(12, -16)\n\n try {\n const aesgcm = crypto.createDecipheriv('aes-256-gcm', key, nonce)\n aesgcm.setAuthTag(authTag)\n return `${aesgcm.update(ciphertext)}${aesgcm.final()}`\n } catch (error) {\n const isRange = error instanceof RangeError\n const invalidKeyLength = error.message === 'Invalid key length'\n const decryptionFailed = error.message === 'Unsupported state or unable to authenticate data'\n\n if (isRange || invalidKeyLength) {\n const err = new Error('INVALID_DOTENV_KEY: It must be 64 characters long (or more)')\n err.code = 'INVALID_DOTENV_KEY'\n throw err\n } else if (decryptionFailed) {\n const err = new Error('DECRYPTION_FAILED: Please check your DOTENV_KEY')\n err.code = 'DECRYPTION_FAILED'\n throw err\n } else {\n throw error\n }\n }\n}\n\n// Populate process.env with parsed values\nfunction populate (processEnv, parsed, options = {}) {\n const debug = Boolean(options && options.debug)\n const override = Boolean(options && options.override)\n\n if (typeof parsed !== 'object') {\n const err = new Error('OBJECT_REQUIRED: Please check the processEnv argument being passed to populate')\n err.code = 'OBJECT_REQUIRED'\n throw err\n }\n\n // Set process.env\n for (const key of Object.keys(parsed)) {\n if (Object.prototype.hasOwnProperty.call(processEnv, key)) {\n if (override === true) {\n processEnv[key] = parsed[key]\n }\n\n if (debug) {\n if (override === true) {\n _debug(`\"${key}\" is already defined and WAS overwritten`)\n } else {\n _debug(`\"${key}\" is already defined and was NOT overwritten`)\n }\n }\n } else {\n processEnv[key] = parsed[key]\n }\n }\n}\n\nconst DotenvModule = {\n configDotenv,\n _configVault,\n _parseVault,\n config,\n decrypt,\n parse,\n populate\n}\n\nmodule.exports.configDotenv = DotenvModule.configDotenv\nmodule.exports._configVault = DotenvModule._configVault\nmodule.exports._parseVault = DotenvModule._parseVault\nmodule.exports.config = DotenvModule.config\nmodule.exports.decrypt = DotenvModule.decrypt\nmodule.exports.parse = DotenvModule.parse\nmodule.exports.populate = DotenvModule.populate\n\nmodule.exports = DotenvModule\n","#!/usr/bin/env node\n/**\n * Portagent CLI\n *\n * Command-line interface for running the Portagent server.\n *\n * Usage:\n * portagent # Start with defaults\n * portagent -p 3000 # Custom port\n * portagent --env-file .env.prod # Load custom env file\n */\n\nimport { Command } from \"commander\";\nimport { config } from \"dotenv\";\nimport { existsSync } from \"fs\";\nimport { resolve } from \"path\";\n\nconst program = new Command();\n\nprogram\n .name(\"portagent\")\n .description(\"Portagent - AgentX Portal Application\")\n .version(\"0.0.1\")\n .option(\"-p, --port <port>\", \"Port to listen on\", \"5200\")\n .option(\"-e, --env-file <path>\", \"Path to environment file\")\n .option(\"--password <password>\", \"Set login password (or use PORTAGENT_PASSWORD env var)\")\n .option(\"--jwt-secret <secret>\", \"JWT secret for token signing (or use JWT_SECRET env var)\")\n .option(\"--api-key <key>\", \"LLM provider API key (or use LLM_PROVIDER_KEY env var)\")\n .option(\"--api-url <url>\", \"LLM provider base URL (or use LLM_PROVIDER_URL env var)\")\n .option(\"--model <model>\", \"LLM model name (or use LLM_PROVIDER_MODEL env var)\")\n .action(async (options) => {\n // Load env file (CLI option takes priority, then defaults)\n if (options.envFile) {\n const envPath = resolve(process.cwd(), options.envFile);\n if (!existsSync(envPath)) {\n console.error(`Error: Environment file not found: ${envPath}`);\n process.exit(1);\n }\n config({ path: envPath });\n } else {\n // Default: load .env and .env.local from current directory\n config({ path: resolve(process.cwd(), \".env\") });\n config({ path: resolve(process.cwd(), \".env.local\") });\n }\n\n // Set environment variables from CLI options (override env file)\n if (options.port) {\n process.env.PORT = options.port;\n }\n if (options.password) {\n process.env.PORTAGENT_PASSWORD = options.password;\n }\n if (options.jwtSecret) {\n process.env.JWT_SECRET = options.jwtSecret;\n }\n if (options.apiKey) {\n process.env.LLM_PROVIDER_KEY = options.apiKey;\n }\n if (options.apiUrl) {\n process.env.LLM_PROVIDER_URL = options.apiUrl;\n }\n if (options.model) {\n process.env.LLM_PROVIDER_MODEL = options.model;\n }\n\n // Import and start server\n const { startServer } = await import(\"../server/index.js\");\n await startServer();\n });\n\nprogram.parse();\n"],"mappings":";;;;;;;;AAAA;AAAA;AAAA;AAAA,MACE,MAAQ;AAAA,MACR,SAAW;AAAA,MACX,aAAe;AAAA,MACf,MAAQ;AAAA,MACR,OAAS;AAAA,MACT,SAAW;AAAA,QACT,KAAK;AAAA,UACH,OAAS;AAAA,UACT,SAAW;AAAA,UACX,SAAW;AAAA,QACb;AAAA,QACA,YAAY;AAAA,QACZ,eAAe;AAAA,QACf,qBAAqB;AAAA,QACrB,wBAAwB;AAAA,QACxB,qBAAqB;AAAA,QACrB,wBAAwB;AAAA,QACxB,kBAAkB;AAAA,MACpB;AAAA,MACA,SAAW;AAAA,QACT,aAAa;AAAA,QACb,MAAQ;AAAA,QACR,SAAW;AAAA,QACX,MAAQ;AAAA,QACR,iBAAiB;AAAA,QACjB,YAAc;AAAA,QACd,SAAW;AAAA,MACb;AAAA,MACA,YAAc;AAAA,QACZ,MAAQ;AAAA,QACR,KAAO;AAAA,MACT;AAAA,MACA,UAAY;AAAA,MACZ,SAAW;AAAA,MACX,UAAY;AAAA,QACV;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAAA,MACA,gBAAkB;AAAA,MAClB,SAAW;AAAA,MACX,iBAAmB;AAAA,QACjB,eAAe;AAAA,QACf,SAAW;AAAA,QACX,OAAS;AAAA,QACT,UAAY;AAAA,QACZ,oBAAoB;AAAA,QACpB,KAAO;AAAA,QACP,YAAc;AAAA,MAChB;AAAA,MACA,SAAW;AAAA,QACT,MAAQ;AAAA,MACV;AAAA,MACA,SAAW;AAAA,QACT,IAAM;AAAA,MACR;AAAA,IACF;AAAA;AAAA;;;AC7DA;AAAA;AAAA;AAAA,QAAM,KAAK,UAAQ,IAAI;AACvB,QAAM,OAAO,UAAQ,MAAM;AAC3B,QAAM,KAAK,UAAQ,IAAI;AACvB,QAAM,SAAS,UAAQ,QAAQ;AAC/B,QAAM,cAAc;AAEpB,QAAM,UAAU,YAAY;AAE5B,QAAM,OAAO;AAGb,aAAS,MAAO,KAAK;AACnB,YAAM,MAAM,CAAC;AAGb,UAAI,QAAQ,IAAI,SAAS;AAGzB,cAAQ,MAAM,QAAQ,WAAW,IAAI;AAErC,UAAI;AACJ,cAAQ,QAAQ,KAAK,KAAK,KAAK,MAAM,MAAM;AACzC,cAAM,MAAM,MAAM,CAAC;AAGnB,YAAI,QAAS,MAAM,CAAC,KAAK;AAGzB,gBAAQ,MAAM,KAAK;AAGnB,cAAM,aAAa,MAAM,CAAC;AAG1B,gBAAQ,MAAM,QAAQ,0BAA0B,IAAI;AAGpD,YAAI,eAAe,KAAK;AACtB,kBAAQ,MAAM,QAAQ,QAAQ,IAAI;AAClC,kBAAQ,MAAM,QAAQ,QAAQ,IAAI;AAAA,QACpC;AAGA,YAAI,GAAG,IAAI;AAAA,MACb;AAEA,aAAO;AAAA,IACT;AAEA,aAAS,YAAa,SAAS;AAC7B,gBAAU,WAAW,CAAC;AAEtB,YAAM,YAAY,WAAW,OAAO;AACpC,cAAQ,OAAO;AACf,YAAM,SAAS,aAAa,aAAa,OAAO;AAChD,UAAI,CAAC,OAAO,QAAQ;AAClB,cAAM,MAAM,IAAI,MAAM,8BAA8B,SAAS,wBAAwB;AACrF,YAAI,OAAO;AACX,cAAM;AAAA,MACR;AAIA,YAAM,OAAO,WAAW,OAAO,EAAE,MAAM,GAAG;AAC1C,YAAM,SAAS,KAAK;AAEpB,UAAI;AACJ,eAAS,IAAI,GAAG,IAAI,QAAQ,KAAK;AAC/B,YAAI;AAEF,gBAAM,MAAM,KAAK,CAAC,EAAE,KAAK;AAGzB,gBAAM,QAAQ,cAAc,QAAQ,GAAG;AAGvC,sBAAY,aAAa,QAAQ,MAAM,YAAY,MAAM,GAAG;AAE5D;AAAA,QACF,SAAS,OAAO;AAEd,cAAI,IAAI,KAAK,QAAQ;AACnB,kBAAM;AAAA,UACR;AAAA,QAEF;AAAA,MACF;AAGA,aAAO,aAAa,MAAM,SAAS;AAAA,IACrC;AAEA,aAAS,MAAO,SAAS;AACvB,cAAQ,IAAI,WAAW,OAAO,WAAW,OAAO,EAAE;AAAA,IACpD;AAEA,aAAS,OAAQ,SAAS;AACxB,cAAQ,IAAI,WAAW,OAAO,YAAY,OAAO,EAAE;AAAA,IACrD;AAEA,aAAS,KAAM,SAAS;AACtB,cAAQ,IAAI,WAAW,OAAO,KAAK,OAAO,EAAE;AAAA,IAC9C;AAEA,aAAS,WAAY,SAAS;AAE5B,UAAI,WAAW,QAAQ,cAAc,QAAQ,WAAW,SAAS,GAAG;AAClE,eAAO,QAAQ;AAAA,MACjB;AAGA,UAAI,QAAQ,IAAI,cAAc,QAAQ,IAAI,WAAW,SAAS,GAAG;AAC/D,eAAO,QAAQ,IAAI;AAAA,MACrB;AAGA,aAAO;AAAA,IACT;AAEA,aAAS,cAAe,QAAQ,WAAW;AAEzC,UAAI;AACJ,UAAI;AACF,cAAM,IAAI,IAAI,SAAS;AAAA,MACzB,SAAS,OAAO;AACd,YAAI,MAAM,SAAS,mBAAmB;AACpC,gBAAM,MAAM,IAAI,MAAM,4IAA4I;AAClK,cAAI,OAAO;AACX,gBAAM;AAAA,QACR;AAEA,cAAM;AAAA,MACR;AAGA,YAAM,MAAM,IAAI;AAChB,UAAI,CAAC,KAAK;AACR,cAAM,MAAM,IAAI,MAAM,sCAAsC;AAC5D,YAAI,OAAO;AACX,cAAM;AAAA,MACR;AAGA,YAAM,cAAc,IAAI,aAAa,IAAI,aAAa;AACtD,UAAI,CAAC,aAAa;AAChB,cAAM,MAAM,IAAI,MAAM,8CAA8C;AACpE,YAAI,OAAO;AACX,cAAM;AAAA,MACR;AAGA,YAAM,iBAAiB,gBAAgB,YAAY,YAAY,CAAC;AAChE,YAAM,aAAa,OAAO,OAAO,cAAc;AAC/C,UAAI,CAAC,YAAY;AACf,cAAM,MAAM,IAAI,MAAM,2DAA2D,cAAc,2BAA2B;AAC1H,YAAI,OAAO;AACX,cAAM;AAAA,MACR;AAEA,aAAO,EAAE,YAAY,IAAI;AAAA,IAC3B;AAEA,aAAS,WAAY,SAAS;AAC5B,UAAI,oBAAoB;AAExB,UAAI,WAAW,QAAQ,QAAQ,QAAQ,KAAK,SAAS,GAAG;AACtD,YAAI,MAAM,QAAQ,QAAQ,IAAI,GAAG;AAC/B,qBAAW,YAAY,QAAQ,MAAM;AACnC,gBAAI,GAAG,WAAW,QAAQ,GAAG;AAC3B,kCAAoB,SAAS,SAAS,QAAQ,IAAI,WAAW,GAAG,QAAQ;AAAA,YAC1E;AAAA,UACF;AAAA,QACF,OAAO;AACL,8BAAoB,QAAQ,KAAK,SAAS,QAAQ,IAAI,QAAQ,OAAO,GAAG,QAAQ,IAAI;AAAA,QACtF;AAAA,MACF,OAAO;AACL,4BAAoB,KAAK,QAAQ,QAAQ,IAAI,GAAG,YAAY;AAAA,MAC9D;AAEA,UAAI,GAAG,WAAW,iBAAiB,GAAG;AACpC,eAAO;AAAA,MACT;AAEA,aAAO;AAAA,IACT;AAEA,aAAS,aAAc,SAAS;AAC9B,aAAO,QAAQ,CAAC,MAAM,MAAM,KAAK,KAAK,GAAG,QAAQ,GAAG,QAAQ,MAAM,CAAC,CAAC,IAAI;AAAA,IAC1E;AAEA,aAAS,aAAc,SAAS;AAC9B,YAAM,QAAQ,QAAQ,WAAW,QAAQ,KAAK;AAC9C,YAAM,QAAQ,WAAW,WAAW,UAAU,QAAQ,QAAQ;AAE9D,UAAI,SAAS,CAAC,OAAO;AACnB,aAAK,uCAAuC;AAAA,MAC9C;AAEA,YAAM,SAAS,aAAa,YAAY,OAAO;AAE/C,UAAI,aAAa,QAAQ;AACzB,UAAI,WAAW,QAAQ,cAAc,MAAM;AACzC,qBAAa,QAAQ;AAAA,MACvB;AAEA,mBAAa,SAAS,YAAY,QAAQ,OAAO;AAEjD,aAAO,EAAE,OAAO;AAAA,IAClB;AAEA,aAAS,aAAc,SAAS;AAC9B,YAAM,aAAa,KAAK,QAAQ,QAAQ,IAAI,GAAG,MAAM;AACrD,UAAI,WAAW;AACf,YAAM,QAAQ,QAAQ,WAAW,QAAQ,KAAK;AAC9C,YAAM,QAAQ,WAAW,WAAW,UAAU,QAAQ,QAAQ;AAE9D,UAAI,WAAW,QAAQ,UAAU;AAC/B,mBAAW,QAAQ;AAAA,MACrB,OAAO;AACL,YAAI,OAAO;AACT,iBAAO,oDAAoD;AAAA,QAC7D;AAAA,MACF;AAEA,UAAI,cAAc,CAAC,UAAU;AAC7B,UAAI,WAAW,QAAQ,MAAM;AAC3B,YAAI,CAAC,MAAM,QAAQ,QAAQ,IAAI,GAAG;AAChC,wBAAc,CAAC,aAAa,QAAQ,IAAI,CAAC;AAAA,QAC3C,OAAO;AACL,wBAAc,CAAC;AACf,qBAAW,YAAY,QAAQ,MAAM;AACnC,wBAAY,KAAK,aAAa,QAAQ,CAAC;AAAA,UACzC;AAAA,QACF;AAAA,MACF;AAIA,UAAI;AACJ,YAAM,YAAY,CAAC;AACnB,iBAAWA,SAAQ,aAAa;AAC9B,YAAI;AAEF,gBAAM,SAAS,aAAa,MAAM,GAAG,aAAaA,OAAM,EAAE,SAAS,CAAC,CAAC;AAErE,uBAAa,SAAS,WAAW,QAAQ,OAAO;AAAA,QAClD,SAAS,GAAG;AACV,cAAI,OAAO;AACT,mBAAO,kBAAkBA,KAAI,IAAI,EAAE,OAAO,EAAE;AAAA,UAC9C;AACA,sBAAY;AAAA,QACd;AAAA,MACF;AAEA,UAAI,aAAa,QAAQ;AACzB,UAAI,WAAW,QAAQ,cAAc,MAAM;AACzC,qBAAa,QAAQ;AAAA,MACvB;AAEA,mBAAa,SAAS,YAAY,WAAW,OAAO;AAEpD,UAAI,SAAS,CAAC,OAAO;AACnB,cAAM,YAAY,OAAO,KAAK,SAAS,EAAE;AACzC,cAAM,aAAa,CAAC;AACpB,mBAAW,YAAY,aAAa;AAClC,cAAI;AACF,kBAAM,WAAW,KAAK,SAAS,QAAQ,IAAI,GAAG,QAAQ;AACtD,uBAAW,KAAK,QAAQ;AAAA,UAC1B,SAAS,GAAG;AACV,gBAAI,OAAO;AACT,qBAAO,kBAAkB,QAAQ,IAAI,EAAE,OAAO,EAAE;AAAA,YAClD;AACA,wBAAY;AAAA,UACd;AAAA,QACF;AAEA,aAAK,kBAAkB,SAAS,UAAU,WAAW,KAAK,GAAG,CAAC,EAAE;AAAA,MAClE;AAEA,UAAI,WAAW;AACb,eAAO,EAAE,QAAQ,WAAW,OAAO,UAAU;AAAA,MAC/C,OAAO;AACL,eAAO,EAAE,QAAQ,UAAU;AAAA,MAC7B;AAAA,IACF;AAGA,aAASC,QAAQ,SAAS;AAExB,UAAI,WAAW,OAAO,EAAE,WAAW,GAAG;AACpC,eAAO,aAAa,aAAa,OAAO;AAAA,MAC1C;AAEA,YAAM,YAAY,WAAW,OAAO;AAGpC,UAAI,CAAC,WAAW;AACd,cAAM,+DAA+D,SAAS,+BAA+B;AAE7G,eAAO,aAAa,aAAa,OAAO;AAAA,MAC1C;AAEA,aAAO,aAAa,aAAa,OAAO;AAAA,IAC1C;AAEA,aAAS,QAAS,WAAW,QAAQ;AACnC,YAAM,MAAM,OAAO,KAAK,OAAO,MAAM,GAAG,GAAG,KAAK;AAChD,UAAI,aAAa,OAAO,KAAK,WAAW,QAAQ;AAEhD,YAAM,QAAQ,WAAW,SAAS,GAAG,EAAE;AACvC,YAAM,UAAU,WAAW,SAAS,GAAG;AACvC,mBAAa,WAAW,SAAS,IAAI,GAAG;AAExC,UAAI;AACF,cAAM,SAAS,OAAO,iBAAiB,eAAe,KAAK,KAAK;AAChE,eAAO,WAAW,OAAO;AACzB,eAAO,GAAG,OAAO,OAAO,UAAU,CAAC,GAAG,OAAO,MAAM,CAAC;AAAA,MACtD,SAAS,OAAO;AACd,cAAM,UAAU,iBAAiB;AACjC,cAAM,mBAAmB,MAAM,YAAY;AAC3C,cAAM,mBAAmB,MAAM,YAAY;AAE3C,YAAI,WAAW,kBAAkB;AAC/B,gBAAM,MAAM,IAAI,MAAM,6DAA6D;AACnF,cAAI,OAAO;AACX,gBAAM;AAAA,QACR,WAAW,kBAAkB;AAC3B,gBAAM,MAAM,IAAI,MAAM,iDAAiD;AACvE,cAAI,OAAO;AACX,gBAAM;AAAA,QACR,OAAO;AACL,gBAAM;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAGA,aAAS,SAAU,YAAY,QAAQ,UAAU,CAAC,GAAG;AACnD,YAAM,QAAQ,QAAQ,WAAW,QAAQ,KAAK;AAC9C,YAAM,WAAW,QAAQ,WAAW,QAAQ,QAAQ;AAEpD,UAAI,OAAO,WAAW,UAAU;AAC9B,cAAM,MAAM,IAAI,MAAM,gFAAgF;AACtG,YAAI,OAAO;AACX,cAAM;AAAA,MACR;AAGA,iBAAW,OAAO,OAAO,KAAK,MAAM,GAAG;AACrC,YAAI,OAAO,UAAU,eAAe,KAAK,YAAY,GAAG,GAAG;AACzD,cAAI,aAAa,MAAM;AACrB,uBAAW,GAAG,IAAI,OAAO,GAAG;AAAA,UAC9B;AAEA,cAAI,OAAO;AACT,gBAAI,aAAa,MAAM;AACrB,qBAAO,IAAI,GAAG,0CAA0C;AAAA,YAC1D,OAAO;AACL,qBAAO,IAAI,GAAG,8CAA8C;AAAA,YAC9D;AAAA,UACF;AAAA,QACF,OAAO;AACL,qBAAW,GAAG,IAAI,OAAO,GAAG;AAAA,QAC9B;AAAA,MACF;AAAA,IACF;AAEA,QAAM,eAAe;AAAA,MACnB;AAAA,MACA;AAAA,MACA;AAAA,MACA,QAAAA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,IACF;AAEA,WAAO,QAAQ,eAAe,aAAa;AAC3C,WAAO,QAAQ,eAAe,aAAa;AAC3C,WAAO,QAAQ,cAAc,aAAa;AAC1C,WAAO,QAAQ,SAAS,aAAa;AACrC,WAAO,QAAQ,UAAU,aAAa;AACtC,WAAO,QAAQ,QAAQ,aAAa;AACpC,WAAO,QAAQ,WAAW,aAAa;AAEvC,WAAO,UAAU;AAAA;AAAA;;;ACpXjB,oBAAuB;AADvB,SAAS,eAAe;AAExB,SAAS,kBAAkB;AAC3B,SAAS,eAAe;AAExB,IAAM,UAAU,IAAI,QAAQ;AAE5B,QACG,KAAK,WAAW,EAChB,YAAY,uCAAuC,EACnD,QAAQ,OAAO,EACf,OAAO,qBAAqB,qBAAqB,MAAM,EACvD,OAAO,yBAAyB,0BAA0B,EAC1D,OAAO,yBAAyB,wDAAwD,EACxF,OAAO,yBAAyB,0DAA0D,EAC1F,OAAO,mBAAmB,wDAAwD,EAClF,OAAO,mBAAmB,yDAAyD,EACnF,OAAO,mBAAmB,oDAAoD,EAC9E,OAAO,OAAO,YAAY;AAEzB,MAAI,QAAQ,SAAS;AACnB,UAAM,UAAU,QAAQ,QAAQ,IAAI,GAAG,QAAQ,OAAO;AACtD,QAAI,CAAC,WAAW,OAAO,GAAG;AACxB,cAAQ,MAAM,sCAAsC,OAAO,EAAE;AAC7D,cAAQ,KAAK,CAAC;AAAA,IAChB;AACA,8BAAO,EAAE,MAAM,QAAQ,CAAC;AAAA,EAC1B,OAAO;AAEL,8BAAO,EAAE,MAAM,QAAQ,QAAQ,IAAI,GAAG,MAAM,EAAE,CAAC;AAC/C,8BAAO,EAAE,MAAM,QAAQ,QAAQ,IAAI,GAAG,YAAY,EAAE,CAAC;AAAA,EACvD;AAGA,MAAI,QAAQ,MAAM;AAChB,YAAQ,IAAI,OAAO,QAAQ;AAAA,EAC7B;AACA,MAAI,QAAQ,UAAU;AACpB,YAAQ,IAAI,qBAAqB,QAAQ;AAAA,EAC3C;AACA,MAAI,QAAQ,WAAW;AACrB,YAAQ,IAAI,aAAa,QAAQ;AAAA,EACnC;AACA,MAAI,QAAQ,QAAQ;AAClB,YAAQ,IAAI,mBAAmB,QAAQ;AAAA,EACzC;AACA,MAAI,QAAQ,QAAQ;AAClB,YAAQ,IAAI,mBAAmB,QAAQ;AAAA,EACzC;AACA,MAAI,QAAQ,OAAO;AACjB,YAAQ,IAAI,qBAAqB,QAAQ;AAAA,EAC3C;AAGA,QAAM,EAAE,YAAY,IAAI,MAAM,OAAO,oBAAoB;AACzD,QAAM,YAAY;AACpB,CAAC;AAEH,QAAQ,MAAM;","names":["path","config"]}
|
package/dist/server/index.js
CHANGED
package/dist/server/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/server/index.ts","../../src/server/auth.ts","../../src/server/database/SQLiteUserRepository.ts","../../src/server/ownership.ts"],"sourcesContent":["/**\n * Portagent Server\n *\n * Hono-based server that combines:\n * - AgentX API (SSE, agents, sessions)\n * - Authentication (simple password + JWT)\n * - Static file serving (Vite build output)\n */\n\nimport { dirname, resolve } from \"path\";\nimport { fileURLToPath } from \"url\";\n\nconst __filename = fileURLToPath(import.meta.url);\nconst __dirname = dirname(__filename);\n\nimport { serve } from \"@hono/node-server\";\nimport { Hono } from \"hono\";\nimport { cors } from \"hono/cors\";\nimport { serveStatic } from \"@hono/node-server/serve-static\";\nimport { existsSync, readFileSync } from \"fs\";\n\nimport { createAgentX, defineAgent } from \"agentxjs\";\nimport { createAgentXHandler, type AgentXHandlerWithUtils } from \"agentxjs/server\";\nimport { toHonoHandler } from \"agentxjs/server/adapters/hono\";\nimport { nodeRuntime } from \"@agentxjs/node-runtime\";\nimport { homedir } from \"node:os\";\nimport { join } from \"node:path\";\n\nimport { createAuthMiddleware, authRoutes } from \"./auth\";\nimport { SQLiteUserRepository } from \"./database\";\nimport { createOwnershipHandler } from \"./ownership\";\n\n// Configuration from environment\nconst PORT = parseInt(process.env.PORT || \"5200\", 10);\nconst JWT_SECRET = process.env.JWT_SECRET || crypto.randomUUID();\nconst USER_DB_PATH = process.env.USER_DB_PATH || join(homedir(), \".agentx/data/portagent.db\");\n\n/**\n * Default Agent Definition\n */\nconst DefaultAgent = defineAgent({\n name: \"Assistant\",\n systemPrompt: \"You are a helpful AI assistant.\",\n});\n\n/**\n * Create and configure the Hono app\n */\nfunction createApp() {\n const app = new Hono();\n\n // CORS\n app.use(\n \"*\",\n cors({\n origin: \"*\",\n allowMethods: [\"GET\", \"POST\", \"PUT\", \"DELETE\", \"HEAD\", \"OPTIONS\"],\n allowHeaders: [\"Content-Type\", \"Authorization\"],\n })\n );\n\n // Create runtime and AgentX instance\n const runtime = nodeRuntime();\n const agentx = createAgentX(runtime);\n\n // Register default definition\n agentx.definitions.register(DefaultAgent);\n\n // Create AgentX handler\n const agentxHandler = createAgentXHandler(agentx, {\n basePath: \"/agentx\",\n allowDynamicCreation: true,\n allowedDefinitions: [\"Assistant\"],\n repository: runtime.repository,\n }) as AgentXHandlerWithUtils;\n\n // Register definition with handler\n agentxHandler.registerDefinition(\"Assistant\", DefaultAgent);\n\n // Initialize user repository (separate database)\n const userRepository = new SQLiteUserRepository(USER_DB_PATH);\n\n // Auth middleware\n const authMiddleware = createAuthMiddleware(JWT_SECRET);\n\n // ============================================================\n // Routes\n // ============================================================\n\n // Health check (no auth)\n app.get(\"/health\", (c) => c.json({ status: \"ok\", timestamp: Date.now() }));\n\n // Auth routes (register, login)\n app.route(\"/api/auth\", authRoutes(userRepository, JWT_SECRET, agentx));\n\n // AgentX API (protected with ownership validation)\n const ownershipHandler = createOwnershipHandler(agentx, agentxHandler);\n app.use(\"/agentx/*\", authMiddleware);\n app.all(\"/agentx/*\", toHonoHandler(ownershipHandler));\n\n // Static files (protected in production)\n const publicDir = resolve(__dirname, \"../public\");\n const isDev = process.env.NODE_ENV !== \"production\";\n\n if (existsSync(publicDir)) {\n // Serve static files\n app.use(\"/*\", serveStatic({ root: publicDir }));\n\n // SPA fallback - serve index.html for all unmatched routes\n app.get(\"*\", (c) => {\n const indexPath = resolve(publicDir, \"index.html\");\n if (existsSync(indexPath)) {\n const html = readFileSync(indexPath, \"utf-8\");\n return c.html(html);\n }\n return c.text(\"Not Found\", 404);\n });\n } else if (isDev) {\n // In dev mode, proxy to Vite\n app.get(\"*\", (c) => {\n return c.text(\n \"Static files not found. Run 'pnpm build:client' first, or use 'pnpm dev' for development.\",\n 404\n );\n });\n }\n\n return { app, agentx, userRepository };\n}\n\n/**\n * Start the server\n */\nasync function startServer() {\n // Check API key\n if (!process.env.LLM_PROVIDER_KEY) {\n console.error(\"Error: LLM_PROVIDER_KEY is required\");\n console.log(\"\\nSet it via environment variable:\");\n console.log(\" export LLM_PROVIDER_KEY=sk-ant-xxx\");\n process.exit(1);\n }\n\n const { app, agentx, userRepository } = createApp();\n\n console.log(`\n ____ _ _\n | _ \\\\ ___ _ __| |_ __ _ __ _ ___ _ __ | |_\n | |_) / _ \\\\| '__| __/ _\\` |/ _\\` |/ _ \\\\ '_ \\\\| __|\n | __/ (_) | | | || (_| | (_| | __/ | | | |_\n |_| \\\\___/|_| \\\\__\\\\__,_|\\\\__, |\\\\___|_| |_|\\\\__|\n |___/\n\n AgentX Portal - Your AI Agent Gateway (Multi-User Mode)\n`);\n\n console.log(\"Configuration:\");\n console.log(` Port: ${PORT}`);\n console.log(` API Key: ${process.env.LLM_PROVIDER_KEY!.substring(0, 15)}...`);\n console.log(` User DB: ${USER_DB_PATH}`);\n console.log(` AgentX DB: ${join(homedir(), \".agentx/data/agentx.db\")}`);\n\n console.log(`\\nEndpoints:`);\n console.log(` GET /health - Health check`);\n console.log(` POST /api/auth/register - Register new user`);\n console.log(` POST /api/auth/login - Login`);\n console.log(` GET /api/auth/verify - Verify token`);\n console.log(` --- AgentX API (protected) ---`);\n console.log(` GET /agentx/info - Platform info`);\n console.log(` GET /agentx/containers - List containers`);\n console.log(` POST /agentx/containers - Create container`);\n console.log(` GET /agentx/containers/:id - Get container`);\n console.log(` DELETE /agentx/containers/:id - Delete container`);\n console.log(` POST /agentx/agents - Create agent`);\n console.log(` GET /agentx/agents/:id/sse - SSE stream`);\n console.log(` POST /agentx/agents/:id/messages- Send message`);\n\n serve({\n fetch: app.fetch,\n port: PORT,\n hostname: \"0.0.0.0\",\n });\n\n console.log(`\\nš Server running at http://localhost:${PORT}`);\n\n // Graceful shutdown\n const shutdown = async () => {\n console.log(\"\\nShutting down...\");\n await agentx.agents.destroyAll();\n userRepository.close();\n console.log(\"Server stopped\");\n process.exit(0);\n };\n\n process.on(\"SIGINT\", shutdown);\n process.on(\"SIGTERM\", shutdown);\n}\n\nexport { createApp, startServer };\n","/**\n * Authentication Module\n *\n * Multi-user authentication with JWT tokens.\n * Supports user registration and login.\n */\n\nimport { Hono } from \"hono\";\nimport { createMiddleware } from \"hono/factory\";\nimport * as jose from \"jose\";\nimport type { AgentX } from \"agentxjs\";\nimport type { UserRepository } from \"./user/UserRepository\";\nimport type { UserInfo } from \"./user/types\";\n\nconst TOKEN_EXPIRY = \"7d\"; // 7 days\n\n/**\n * Generate a random password\n */\nexport function generatePassword(): string {\n const chars = \"ABCDEFGHJKLMNPQRSTUVWXYZabcdefghjkmnpqrstuvwxyz23456789\";\n let password = \"\";\n for (let i = 0; i < 12; i++) {\n password += chars.charAt(Math.floor(Math.random() * chars.length));\n }\n return password;\n}\n\n/**\n * Create JWT token\n */\nasync function createToken(secret: string, userId: string): Promise<string> {\n const secretKey = new TextEncoder().encode(secret);\n const token = await new jose.SignJWT({ sub: userId })\n .setProtectedHeader({ alg: \"HS256\" })\n .setIssuedAt()\n .setExpirationTime(TOKEN_EXPIRY)\n .sign(secretKey);\n return token;\n}\n\n/**\n * Verify JWT token\n */\nasync function verifyToken(secret: string, token: string): Promise<{ userId: string } | null> {\n try {\n const secretKey = new TextEncoder().encode(secret);\n const { payload } = await jose.jwtVerify(token, secretKey);\n return { userId: payload.sub as string };\n } catch {\n return null;\n }\n}\n\n/**\n * Convert UserRecord to safe UserInfo (remove password hash)\n */\nfunction toUserInfo(user: {\n userId: string;\n username: string;\n email: string;\n containerId: string;\n displayName?: string;\n avatar?: string;\n createdAt: number;\n}): UserInfo {\n return {\n userId: user.userId,\n username: user.username,\n email: user.email,\n containerId: user.containerId,\n displayName: user.displayName,\n avatar: user.avatar,\n createdAt: user.createdAt,\n };\n}\n\n/**\n * Auth routes\n */\nexport function authRoutes(\n userRepository: UserRepository,\n jwtSecret: string,\n agentx: AgentX\n): Hono {\n const app = new Hono();\n\n // Register\n app.post(\"/register\", async (c) => {\n try {\n const body = await c.req.json<{\n username?: string;\n email?: string;\n password?: string;\n displayName?: string;\n avatar?: string;\n }>();\n\n // Validation\n if (!body.username || !body.email || !body.password) {\n return c.json({ error: \"Username, email, and password are required\" }, 400);\n }\n\n // Basic validation\n if (body.username.length < 3) {\n return c.json({ error: \"Username must be at least 3 characters\" }, 400);\n }\n\n if (body.password.length < 6) {\n return c.json({ error: \"Password must be at least 6 characters\" }, 400);\n }\n\n if (!body.email.includes(\"@\")) {\n return c.json({ error: \"Invalid email format\" }, 400);\n }\n\n // Create Container for the user first\n const container = await agentx.containers.create();\n\n // Create user with the container ID\n const user = await userRepository.createUser({\n username: body.username,\n email: body.email,\n password: body.password,\n containerId: container.containerId,\n displayName: body.displayName,\n avatar: body.avatar,\n });\n\n // Generate token\n const token = await createToken(jwtSecret, user.userId);\n\n return c.json(\n {\n token,\n user: toUserInfo(user),\n expiresIn: TOKEN_EXPIRY,\n },\n 201\n );\n } catch (error) {\n const message = error instanceof Error ? error.message : \"Registration failed\";\n return c.json({ error: message }, 400);\n }\n });\n\n // Login\n app.post(\"/login\", async (c) => {\n try {\n const body = await c.req.json<{\n usernameOrEmail?: string;\n password?: string;\n }>();\n\n if (!body.usernameOrEmail || !body.password) {\n return c.json({ error: \"Username/email and password are required\" }, 400);\n }\n\n // Verify credentials\n const user = await userRepository.verifyPassword(body.usernameOrEmail, body.password);\n\n if (!user) {\n return c.json({ error: \"Invalid credentials\" }, 401);\n }\n\n // Generate token\n const token = await createToken(jwtSecret, user.userId);\n\n return c.json({\n token,\n user: toUserInfo(user),\n expiresIn: TOKEN_EXPIRY,\n });\n } catch (error) {\n const message = error instanceof Error ? error.message : \"Login failed\";\n return c.json({ error: message }, 500);\n }\n });\n\n // Verify token\n app.get(\"/verify\", async (c) => {\n const authHeader = c.req.header(\"Authorization\");\n if (!authHeader || !authHeader.startsWith(\"Bearer \")) {\n return c.json({ valid: false }, 401);\n }\n\n const token = authHeader.slice(7);\n const result = await verifyToken(jwtSecret, token);\n\n if (!result) {\n return c.json({ valid: false }, 401);\n }\n\n // Get user info\n const user = await userRepository.findUserById(result.userId);\n if (!user || !user.isActive) {\n return c.json({ valid: false }, 401);\n }\n\n return c.json({ valid: true, user: toUserInfo(user) });\n });\n\n // Logout (client-side only, just for API consistency)\n app.post(\"/logout\", (c) => {\n return c.json({ success: true });\n });\n\n return app;\n}\n\n/**\n * Create auth middleware\n */\nexport function createAuthMiddleware(jwtSecret: string) {\n return createMiddleware(async (c, next) => {\n // Skip auth for SSE connections with token in query\n const url = new URL(c.req.url);\n const queryToken = url.searchParams.get(\"token\");\n\n // Check Authorization header first\n const authHeader = c.req.header(\"Authorization\");\n let token: string | null = null;\n\n if (authHeader && authHeader.startsWith(\"Bearer \")) {\n token = authHeader.slice(7);\n } else if (queryToken) {\n // Allow token in query param for SSE (EventSource doesn't support headers)\n token = queryToken;\n }\n\n if (!token) {\n return c.json({ error: \"Unauthorized\" }, 401);\n }\n\n const result = await verifyToken(jwtSecret, token);\n if (!result) {\n return c.json({ error: \"Invalid token\" }, 401);\n }\n\n // Set user info in context\n c.set(\"userId\", result.userId);\n\n // Also set as custom header for downstream handlers\n c.header(\"X-User-Id\", result.userId);\n\n await next();\n });\n}\n","/**\n * SQLiteUserRepository - SQLite implementation of UserRepository\n *\n * Manages user data in separate portagent.db database.\n * This is independent from AgentX's agentx.db.\n *\n * Relationship to AgentX:\n * - User (portagent.db) āā Container.config.ownerId (agentx.db)\n * - User.userId is stored in Container.config.ownerId field\n */\n\nimport Database from \"better-sqlite3\";\nimport { randomUUID } from \"crypto\";\nimport { hash, compare } from \"bcrypt\";\nimport type { UserRepository } from \"../user/UserRepository\";\nimport type { UserRecord, RegisterUserInput } from \"../user/types\";\n\nconst SALT_ROUNDS = 10;\n\n/**\n * SQLite implementation of UserRepository\n */\nexport class SQLiteUserRepository implements UserRepository {\n private db: Database.Database;\n\n constructor(dbPath: string) {\n this.db = new Database(dbPath);\n this.initDatabase();\n }\n\n /**\n * Initialize database schema\n */\n private initDatabase(): void {\n // Enable foreign keys\n this.db.pragma(\"foreign_keys = ON\");\n\n // Create users table\n this.db.exec(`\n CREATE TABLE IF NOT EXISTS users (\n userId TEXT PRIMARY KEY,\n username TEXT UNIQUE NOT NULL,\n email TEXT UNIQUE NOT NULL,\n passwordHash TEXT NOT NULL,\n containerId TEXT NOT NULL,\n displayName TEXT,\n avatar TEXT,\n isActive INTEGER NOT NULL DEFAULT 1,\n createdAt INTEGER NOT NULL,\n updatedAt INTEGER NOT NULL\n );\n\n CREATE INDEX IF NOT EXISTS idx_users_username ON users(username);\n CREATE INDEX IF NOT EXISTS idx_users_email ON users(email);\n CREATE INDEX IF NOT EXISTS idx_users_containerId ON users(containerId);\n `);\n }\n\n /**\n * Create a new user\n */\n async createUser(input: RegisterUserInput): Promise<UserRecord> {\n // Check if username exists\n if (await this.usernameExists(input.username)) {\n throw new Error(`Username '${input.username}' already exists`);\n }\n\n // Check if email exists\n if (await this.emailExists(input.email)) {\n throw new Error(`Email '${input.email}' already exists`);\n }\n\n // Hash password\n const passwordHash = await hash(input.password, SALT_ROUNDS);\n\n // Create user record\n const userId = randomUUID();\n const now = Date.now();\n\n const user: UserRecord = {\n userId,\n username: input.username,\n email: input.email,\n passwordHash,\n containerId: input.containerId,\n displayName: input.displayName,\n avatar: input.avatar,\n isActive: true,\n createdAt: now,\n updatedAt: now,\n };\n\n // Insert into database\n const stmt = this.db.prepare(`\n INSERT INTO users (\n userId, username, email, passwordHash, containerId, displayName, avatar, isActive, createdAt, updatedAt\n ) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?)\n `);\n\n stmt.run(\n user.userId,\n user.username,\n user.email,\n user.passwordHash,\n user.containerId,\n user.displayName,\n user.avatar,\n user.isActive ? 1 : 0,\n user.createdAt,\n user.updatedAt\n );\n\n return user;\n }\n\n /**\n * Find user by ID\n */\n async findUserById(userId: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE userId = ?\n `);\n\n const row = stmt.get(userId) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Find user by username\n */\n async findUserByUsername(username: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE username = ?\n `);\n\n const row = stmt.get(username) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Find user by email\n */\n async findUserByEmail(email: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE email = ?\n `);\n\n const row = stmt.get(email) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Find user by username or email\n */\n async findUserByUsernameOrEmail(usernameOrEmail: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE username = ? OR email = ?\n `);\n\n const row = stmt.get(usernameOrEmail, usernameOrEmail) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Update user\n */\n async updateUser(\n userId: string,\n updates: Partial<Omit<UserRecord, \"userId\">>\n ): Promise<UserRecord> {\n const user = await this.findUserById(userId);\n if (!user) {\n throw new Error(`User ${userId} not found`);\n }\n\n // Build SET clause dynamically\n const fields: string[] = [];\n const values: any[] = [];\n\n if (updates.username !== undefined) {\n fields.push(\"username = ?\");\n values.push(updates.username);\n }\n if (updates.email !== undefined) {\n fields.push(\"email = ?\");\n values.push(updates.email);\n }\n if (updates.passwordHash !== undefined) {\n fields.push(\"passwordHash = ?\");\n values.push(updates.passwordHash);\n }\n if (updates.displayName !== undefined) {\n fields.push(\"displayName = ?\");\n values.push(updates.displayName);\n }\n if (updates.avatar !== undefined) {\n fields.push(\"avatar = ?\");\n values.push(updates.avatar);\n }\n if (updates.isActive !== undefined) {\n fields.push(\"isActive = ?\");\n values.push(updates.isActive ? 1 : 0);\n }\n\n // Always update updatedAt\n fields.push(\"updatedAt = ?\");\n values.push(Date.now());\n\n if (fields.length === 0) {\n return user; // No updates\n }\n\n // Execute update\n values.push(userId);\n const stmt = this.db.prepare(`\n UPDATE users SET ${fields.join(\", \")} WHERE userId = ?\n `);\n\n stmt.run(...values);\n\n // Return updated user\n return (await this.findUserById(userId))!;\n }\n\n /**\n * Delete user\n */\n async deleteUser(userId: string): Promise<boolean> {\n const stmt = this.db.prepare(`\n DELETE FROM users WHERE userId = ?\n `);\n\n const result = stmt.run(userId);\n return result.changes > 0;\n }\n\n /**\n * List all users\n */\n async listUsers(): Promise<UserRecord[]> {\n const stmt = this.db.prepare(`\n SELECT * FROM users ORDER BY createdAt DESC\n `);\n\n const rows = stmt.all() as any[];\n return rows.map((row) => this.rowToUser(row));\n }\n\n /**\n * Check if username exists\n */\n async usernameExists(username: string): Promise<boolean> {\n const stmt = this.db.prepare(`\n SELECT 1 FROM users WHERE username = ?\n `);\n\n return stmt.get(username) !== undefined;\n }\n\n /**\n * Check if email exists\n */\n async emailExists(email: string): Promise<boolean> {\n const stmt = this.db.prepare(`\n SELECT 1 FROM users WHERE email = ?\n `);\n\n return stmt.get(email) !== undefined;\n }\n\n /**\n * Verify password for login\n *\n * @param usernameOrEmail - Username or email\n * @param password - Plain text password\n * @returns User record if valid, null if invalid\n */\n async verifyPassword(usernameOrEmail: string, password: string): Promise<UserRecord | null> {\n const user = await this.findUserByUsernameOrEmail(usernameOrEmail);\n if (!user) {\n return null;\n }\n\n if (!user.isActive) {\n return null; // Inactive user\n }\n\n const isValid = await compare(password, user.passwordHash);\n return isValid ? user : null;\n }\n\n /**\n * Close database connection\n */\n close(): void {\n this.db.close();\n }\n\n // ============================================================================\n // Private Helpers\n // ============================================================================\n\n private rowToUser(row: any): UserRecord {\n return {\n userId: row.userId,\n username: row.username,\n email: row.email,\n passwordHash: row.passwordHash,\n containerId: row.containerId,\n displayName: row.displayName,\n avatar: row.avatar,\n isActive: row.isActive === 1,\n createdAt: row.createdAt,\n updatedAt: row.updatedAt,\n };\n }\n}\n","/**\n * Ownership Validation Middleware\n *\n * Wraps AgentX handler to enforce user ownership of resources.\n * Uses Container.config.ownerId to link users with containers.\n */\n\nimport type { AgentXHandler } from \"agentxjs/server\";\nimport type { AgentX } from \"agentxjs\";\n\n/**\n * Extract userId from Hono context (set by auth middleware)\n */\nfunction getUserId(request: Request): string | null {\n // This is a workaround - ideally we'd get userId from context\n // But Web Standard Request doesn't have context\n // So we rely on the fact that auth middleware already validated the token\n // and we can re-extract it here\n const authHeader = request.headers.get(\"Authorization\");\n if (!authHeader || !authHeader.startsWith(\"Bearer \")) {\n // Check query param for SSE\n const url = new URL(request.url);\n const queryToken = url.searchParams.get(\"token\");\n if (!queryToken) {\n return null;\n }\n }\n // Note: We'll need to decode JWT again here, or pass userId via custom header\n // For now, we'll use a simpler approach: Add X-User-Id header in auth middleware\n return request.headers.get(\"X-User-Id\");\n}\n\n/**\n * Create ownership validation wrapper for AgentX handler\n *\n * Enforces:\n * - Container.config.ownerId must match current user\n * - Session.userId must match current user (AgentX already has this)\n *\n * @param agentx - AgentX instance\n * @param baseHandler - Original AgentX handler\n * @returns Wrapped handler with ownership validation\n */\nexport function createOwnershipHandler(agentx: AgentX, baseHandler: AgentXHandler): AgentXHandler {\n return async (request: Request): Promise<Response> => {\n const url = new URL(request.url);\n const method = request.method;\n const path = url.pathname;\n\n // Extract userId from request\n const userId = getUserId(request);\n if (!userId) {\n // If no userId, let base handler reject with 401\n return baseHandler(request);\n }\n\n // ============================================================================\n // Container ownership validation\n // ============================================================================\n\n // POST /containers - Set ownerId on creation\n if (method === \"POST\" && path.endsWith(\"/containers\")) {\n // Intercept container creation to inject ownerId\n try {\n const body = await request.json();\n const config = body.config || {};\n config.ownerId = userId; // Inject ownerId\n\n // Create new request with modified body, preserving all original fields\n const modifiedBody = { ...body, config };\n const modifiedRequest = new Request(request.url, {\n method: request.method,\n headers: request.headers,\n body: JSON.stringify(modifiedBody),\n });\n\n return baseHandler(modifiedRequest);\n } catch {\n return baseHandler(request);\n }\n }\n\n // PUT /containers/:id - Upsert semantics (create or update)\n const putContainerMatch = path.match(/\\/containers\\/([^/]+)$/);\n if (method === \"PUT\" && putContainerMatch) {\n const containerId = putContainerMatch[1];\n\n const existingContainer = await agentx.containers.get(containerId);\n\n if (existingContainer) {\n // Update: validate ownership\n const ownerId = (existingContainer.config as Record<string, unknown>)?.ownerId;\n if (ownerId && ownerId !== userId) {\n return new Response(JSON.stringify({ error: \"Access denied\" }), {\n status: 403,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n return baseHandler(request);\n } else {\n // Create: inject ownerId into the request body\n try {\n const body = await request.json();\n const config = body.config || {};\n config.ownerId = userId;\n\n const modifiedBody = { ...body, config };\n const modifiedRequest = new Request(request.url, {\n method: request.method,\n headers: request.headers,\n body: JSON.stringify(modifiedBody),\n });\n\n return baseHandler(modifiedRequest);\n } catch {\n return baseHandler(request);\n }\n }\n }\n\n // GET /containers/:id - Validate ownership\n const getContainerMatch = path.match(/\\/containers\\/([^/]+)$/);\n if (method === \"GET\" && getContainerMatch) {\n const containerId = getContainerMatch[1];\n\n // Check ownership before allowing access\n const container = await agentx.containers.get(containerId);\n if (!container) {\n return new Response(JSON.stringify({ error: \"Container not found\" }), {\n status: 404,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n const ownerId = (container.config as Record<string, unknown>)?.ownerId;\n if (ownerId && ownerId !== userId) {\n return new Response(JSON.stringify({ error: \"Access denied\" }), {\n status: 403,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n return baseHandler(request);\n }\n\n // DELETE /containers/:id - Validate ownership\n const deleteContainerMatch = path.match(/\\/containers\\/([^/]+)$/);\n if (method === \"DELETE\" && deleteContainerMatch) {\n const containerId = deleteContainerMatch[1];\n\n const container = await agentx.containers.get(containerId);\n if (!container) {\n return new Response(JSON.stringify({ error: \"Container not found\" }), {\n status: 404,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n const ownerId = (container.config as Record<string, unknown>)?.ownerId;\n if (ownerId && ownerId !== userId) {\n return new Response(JSON.stringify({ error: \"Access denied\" }), {\n status: 403,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n return baseHandler(request);\n }\n\n // GET /containers - Filter by ownerId\n if (method === \"GET\" && path.endsWith(\"/containers\")) {\n const response = await baseHandler(request);\n\n // Filter response to only show user's containers\n if (response.ok) {\n const body = await response.json();\n if (Array.isArray(body)) {\n const filtered = body.filter((container: { config?: { ownerId?: string } }) => {\n const ownerId = container.config?.ownerId;\n return !ownerId || ownerId === userId; // Show if no owner or owned by user\n });\n\n return new Response(JSON.stringify(filtered), {\n status: 200,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n }\n\n return response;\n }\n\n // ============================================================================\n // Session ownership validation (already handled by AgentX via userId)\n // ============================================================================\n\n // For Sessions, AgentX already filters by userId in Session.userId field\n // So we don't need additional validation here\n\n // ============================================================================\n // Agent ownership validation (via containerId)\n // ============================================================================\n\n // Agents belong to Containers, so we validate Container ownership\n // TODO: Add agent ownership validation if needed\n\n // ============================================================================\n // Default: Pass through to base handler\n // ============================================================================\n\n return baseHandler(request);\n };\n}\n"],"mappings":";AASA,SAAS,SAAS,eAAe;AACjC,SAAS,qBAAqB;AAK9B,SAAS,aAAa;AACtB,SAAS,QAAAA,aAAY;AACrB,SAAS,YAAY;AACrB,SAAS,mBAAmB;AAC5B,SAAS,YAAY,oBAAoB;AAEzC,SAAS,cAAc,mBAAmB;AAC1C,SAAS,2BAAwD;AACjE,SAAS,qBAAqB;AAC9B,SAAS,mBAAmB;AAC5B,SAAS,eAAe;AACxB,SAAS,YAAY;;;ACnBrB,SAAS,YAAY;AACrB,SAAS,wBAAwB;AACjC,YAAY,UAAU;AAKtB,IAAM,eAAe;AAiBrB,eAAe,YAAY,QAAgB,QAAiC;AAC1E,QAAM,YAAY,IAAI,YAAY,EAAE,OAAO,MAAM;AACjD,QAAM,QAAQ,MAAM,IAAS,aAAQ,EAAE,KAAK,OAAO,CAAC,EACjD,mBAAmB,EAAE,KAAK,QAAQ,CAAC,EACnC,YAAY,EACZ,kBAAkB,YAAY,EAC9B,KAAK,SAAS;AACjB,SAAO;AACT;AAKA,eAAe,YAAY,QAAgB,OAAmD;AAC5F,MAAI;AACF,UAAM,YAAY,IAAI,YAAY,EAAE,OAAO,MAAM;AACjD,UAAM,EAAE,QAAQ,IAAI,MAAW,eAAU,OAAO,SAAS;AACzD,WAAO,EAAE,QAAQ,QAAQ,IAAc;AAAA,EACzC,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAKA,SAAS,WAAW,MAQP;AACX,SAAO;AAAA,IACL,QAAQ,KAAK;AAAA,IACb,UAAU,KAAK;AAAA,IACf,OAAO,KAAK;AAAA,IACZ,aAAa,KAAK;AAAA,IAClB,aAAa,KAAK;AAAA,IAClB,QAAQ,KAAK;AAAA,IACb,WAAW,KAAK;AAAA,EAClB;AACF;AAKO,SAAS,WACd,gBACA,WACA,QACM;AACN,QAAM,MAAM,IAAI,KAAK;AAGrB,MAAI,KAAK,aAAa,OAAO,MAAM;AACjC,QAAI;AACF,YAAM,OAAO,MAAM,EAAE,IAAI,KAMtB;AAGH,UAAI,CAAC,KAAK,YAAY,CAAC,KAAK,SAAS,CAAC,KAAK,UAAU;AACnD,eAAO,EAAE,KAAK,EAAE,OAAO,6CAA6C,GAAG,GAAG;AAAA,MAC5E;AAGA,UAAI,KAAK,SAAS,SAAS,GAAG;AAC5B,eAAO,EAAE,KAAK,EAAE,OAAO,yCAAyC,GAAG,GAAG;AAAA,MACxE;AAEA,UAAI,KAAK,SAAS,SAAS,GAAG;AAC5B,eAAO,EAAE,KAAK,EAAE,OAAO,yCAAyC,GAAG,GAAG;AAAA,MACxE;AAEA,UAAI,CAAC,KAAK,MAAM,SAAS,GAAG,GAAG;AAC7B,eAAO,EAAE,KAAK,EAAE,OAAO,uBAAuB,GAAG,GAAG;AAAA,MACtD;AAGA,YAAM,YAAY,MAAM,OAAO,WAAW,OAAO;AAGjD,YAAM,OAAO,MAAM,eAAe,WAAW;AAAA,QAC3C,UAAU,KAAK;AAAA,QACf,OAAO,KAAK;AAAA,QACZ,UAAU,KAAK;AAAA,QACf,aAAa,UAAU;AAAA,QACvB,aAAa,KAAK;AAAA,QAClB,QAAQ,KAAK;AAAA,MACf,CAAC;AAGD,YAAM,QAAQ,MAAM,YAAY,WAAW,KAAK,MAAM;AAEtD,aAAO,EAAE;AAAA,QACP;AAAA,UACE;AAAA,UACA,MAAM,WAAW,IAAI;AAAA,UACrB,WAAW;AAAA,QACb;AAAA,QACA;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,YAAM,UAAU,iBAAiB,QAAQ,MAAM,UAAU;AACzD,aAAO,EAAE,KAAK,EAAE,OAAO,QAAQ,GAAG,GAAG;AAAA,IACvC;AAAA,EACF,CAAC;AAGD,MAAI,KAAK,UAAU,OAAO,MAAM;AAC9B,QAAI;AACF,YAAM,OAAO,MAAM,EAAE,IAAI,KAGtB;AAEH,UAAI,CAAC,KAAK,mBAAmB,CAAC,KAAK,UAAU;AAC3C,eAAO,EAAE,KAAK,EAAE,OAAO,2CAA2C,GAAG,GAAG;AAAA,MAC1E;AAGA,YAAM,OAAO,MAAM,eAAe,eAAe,KAAK,iBAAiB,KAAK,QAAQ;AAEpF,UAAI,CAAC,MAAM;AACT,eAAO,EAAE,KAAK,EAAE,OAAO,sBAAsB,GAAG,GAAG;AAAA,MACrD;AAGA,YAAM,QAAQ,MAAM,YAAY,WAAW,KAAK,MAAM;AAEtD,aAAO,EAAE,KAAK;AAAA,QACZ;AAAA,QACA,MAAM,WAAW,IAAI;AAAA,QACrB,WAAW;AAAA,MACb,CAAC;AAAA,IACH,SAAS,OAAO;AACd,YAAM,UAAU,iBAAiB,QAAQ,MAAM,UAAU;AACzD,aAAO,EAAE,KAAK,EAAE,OAAO,QAAQ,GAAG,GAAG;AAAA,IACvC;AAAA,EACF,CAAC;AAGD,MAAI,IAAI,WAAW,OAAO,MAAM;AAC9B,UAAM,aAAa,EAAE,IAAI,OAAO,eAAe;AAC/C,QAAI,CAAC,cAAc,CAAC,WAAW,WAAW,SAAS,GAAG;AACpD,aAAO,EAAE,KAAK,EAAE,OAAO,MAAM,GAAG,GAAG;AAAA,IACrC;AAEA,UAAM,QAAQ,WAAW,MAAM,CAAC;AAChC,UAAM,SAAS,MAAM,YAAY,WAAW,KAAK;AAEjD,QAAI,CAAC,QAAQ;AACX,aAAO,EAAE,KAAK,EAAE,OAAO,MAAM,GAAG,GAAG;AAAA,IACrC;AAGA,UAAM,OAAO,MAAM,eAAe,aAAa,OAAO,MAAM;AAC5D,QAAI,CAAC,QAAQ,CAAC,KAAK,UAAU;AAC3B,aAAO,EAAE,KAAK,EAAE,OAAO,MAAM,GAAG,GAAG;AAAA,IACrC;AAEA,WAAO,EAAE,KAAK,EAAE,OAAO,MAAM,MAAM,WAAW,IAAI,EAAE,CAAC;AAAA,EACvD,CAAC;AAGD,MAAI,KAAK,WAAW,CAAC,MAAM;AACzB,WAAO,EAAE,KAAK,EAAE,SAAS,KAAK,CAAC;AAAA,EACjC,CAAC;AAED,SAAO;AACT;AAKO,SAAS,qBAAqB,WAAmB;AACtD,SAAO,iBAAiB,OAAO,GAAG,SAAS;AAEzC,UAAM,MAAM,IAAI,IAAI,EAAE,IAAI,GAAG;AAC7B,UAAM,aAAa,IAAI,aAAa,IAAI,OAAO;AAG/C,UAAM,aAAa,EAAE,IAAI,OAAO,eAAe;AAC/C,QAAI,QAAuB;AAE3B,QAAI,cAAc,WAAW,WAAW,SAAS,GAAG;AAClD,cAAQ,WAAW,MAAM,CAAC;AAAA,IAC5B,WAAW,YAAY;AAErB,cAAQ;AAAA,IACV;AAEA,QAAI,CAAC,OAAO;AACV,aAAO,EAAE,KAAK,EAAE,OAAO,eAAe,GAAG,GAAG;AAAA,IAC9C;AAEA,UAAM,SAAS,MAAM,YAAY,WAAW,KAAK;AACjD,QAAI,CAAC,QAAQ;AACX,aAAO,EAAE,KAAK,EAAE,OAAO,gBAAgB,GAAG,GAAG;AAAA,IAC/C;AAGA,MAAE,IAAI,UAAU,OAAO,MAAM;AAG7B,MAAE,OAAO,aAAa,OAAO,MAAM;AAEnC,UAAM,KAAK;AAAA,EACb,CAAC;AACH;;;AC5OA,OAAO,cAAc;AACrB,SAAS,kBAAkB;AAC3B,SAAS,MAAM,eAAe;AAI9B,IAAM,cAAc;AAKb,IAAM,uBAAN,MAAqD;AAAA,EAClD;AAAA,EAER,YAAY,QAAgB;AAC1B,SAAK,KAAK,IAAI,SAAS,MAAM;AAC7B,SAAK,aAAa;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA,EAKQ,eAAqB;AAE3B,SAAK,GAAG,OAAO,mBAAmB;AAGlC,SAAK,GAAG,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,KAiBZ;AAAA,EACH;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WAAW,OAA+C;AAE9D,QAAI,MAAM,KAAK,eAAe,MAAM,QAAQ,GAAG;AAC7C,YAAM,IAAI,MAAM,aAAa,MAAM,QAAQ,kBAAkB;AAAA,IAC/D;AAGA,QAAI,MAAM,KAAK,YAAY,MAAM,KAAK,GAAG;AACvC,YAAM,IAAI,MAAM,UAAU,MAAM,KAAK,kBAAkB;AAAA,IACzD;AAGA,UAAM,eAAe,MAAM,KAAK,MAAM,UAAU,WAAW;AAG3D,UAAM,SAAS,WAAW;AAC1B,UAAM,MAAM,KAAK,IAAI;AAErB,UAAM,OAAmB;AAAA,MACvB;AAAA,MACA,UAAU,MAAM;AAAA,MAChB,OAAO,MAAM;AAAA,MACb;AAAA,MACA,aAAa,MAAM;AAAA,MACnB,aAAa,MAAM;AAAA,MACnB,QAAQ,MAAM;AAAA,MACd,UAAU;AAAA,MACV,WAAW;AAAA,MACX,WAAW;AAAA,IACb;AAGA,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA;AAAA;AAAA,KAI5B;AAED,SAAK;AAAA,MACH,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK,WAAW,IAAI;AAAA,MACpB,KAAK;AAAA,MACL,KAAK;AAAA,IACP;AAEA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,aAAa,QAA4C;AAC7D,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,MAAM;AAC3B,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,mBAAmB,UAA8C;AACrE,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,QAAQ;AAC7B,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,OAA2C;AAC/D,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,KAAK;AAC1B,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,0BAA0B,iBAAqD;AACnF,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,iBAAiB,eAAe;AACrD,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WACJ,QACA,SACqB;AACrB,UAAM,OAAO,MAAM,KAAK,aAAa,MAAM;AAC3C,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,MAAM,QAAQ,MAAM,YAAY;AAAA,IAC5C;AAGA,UAAM,SAAmB,CAAC;AAC1B,UAAM,SAAgB,CAAC;AAEvB,QAAI,QAAQ,aAAa,QAAW;AAClC,aAAO,KAAK,cAAc;AAC1B,aAAO,KAAK,QAAQ,QAAQ;AAAA,IAC9B;AACA,QAAI,QAAQ,UAAU,QAAW;AAC/B,aAAO,KAAK,WAAW;AACvB,aAAO,KAAK,QAAQ,KAAK;AAAA,IAC3B;AACA,QAAI,QAAQ,iBAAiB,QAAW;AACtC,aAAO,KAAK,kBAAkB;AAC9B,aAAO,KAAK,QAAQ,YAAY;AAAA,IAClC;AACA,QAAI,QAAQ,gBAAgB,QAAW;AACrC,aAAO,KAAK,iBAAiB;AAC7B,aAAO,KAAK,QAAQ,WAAW;AAAA,IACjC;AACA,QAAI,QAAQ,WAAW,QAAW;AAChC,aAAO,KAAK,YAAY;AACxB,aAAO,KAAK,QAAQ,MAAM;AAAA,IAC5B;AACA,QAAI,QAAQ,aAAa,QAAW;AAClC,aAAO,KAAK,cAAc;AAC1B,aAAO,KAAK,QAAQ,WAAW,IAAI,CAAC;AAAA,IACtC;AAGA,WAAO,KAAK,eAAe;AAC3B,WAAO,KAAK,KAAK,IAAI,CAAC;AAEtB,QAAI,OAAO,WAAW,GAAG;AACvB,aAAO;AAAA,IACT;AAGA,WAAO,KAAK,MAAM;AAClB,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA,yBACR,OAAO,KAAK,IAAI,CAAC;AAAA,KACrC;AAED,SAAK,IAAI,GAAG,MAAM;AAGlB,WAAQ,MAAM,KAAK,aAAa,MAAM;AAAA,EACxC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WAAW,QAAkC;AACjD,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,SAAS,KAAK,IAAI,MAAM;AAC9B,WAAO,OAAO,UAAU;AAAA,EAC1B;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAmC;AACvC,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,OAAO,KAAK,IAAI;AACtB,WAAO,KAAK,IAAI,CAAC,QAAQ,KAAK,UAAU,GAAG,CAAC;AAAA,EAC9C;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,eAAe,UAAoC;AACvD,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,WAAO,KAAK,IAAI,QAAQ,MAAM;AAAA,EAChC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAY,OAAiC;AACjD,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,WAAO,KAAK,IAAI,KAAK,MAAM;AAAA,EAC7B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,MAAM,eAAe,iBAAyB,UAA8C;AAC1F,UAAM,OAAO,MAAM,KAAK,0BAA0B,eAAe;AACjE,QAAI,CAAC,MAAM;AACT,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,KAAK,UAAU;AAClB,aAAO;AAAA,IACT;AAEA,UAAM,UAAU,MAAM,QAAQ,UAAU,KAAK,YAAY;AACzD,WAAO,UAAU,OAAO;AAAA,EAC1B;AAAA;AAAA;AAAA;AAAA,EAKA,QAAc;AACZ,SAAK,GAAG,MAAM;AAAA,EAChB;AAAA;AAAA;AAAA;AAAA,EAMQ,UAAU,KAAsB;AACtC,WAAO;AAAA,MACL,QAAQ,IAAI;AAAA,MACZ,UAAU,IAAI;AAAA,MACd,OAAO,IAAI;AAAA,MACX,cAAc,IAAI;AAAA,MAClB,aAAa,IAAI;AAAA,MACjB,aAAa,IAAI;AAAA,MACjB,QAAQ,IAAI;AAAA,MACZ,UAAU,IAAI,aAAa;AAAA,MAC3B,WAAW,IAAI;AAAA,MACf,WAAW,IAAI;AAAA,IACjB;AAAA,EACF;AACF;;;AC/SA,SAAS,UAAU,SAAiC;AAKlD,QAAM,aAAa,QAAQ,QAAQ,IAAI,eAAe;AACtD,MAAI,CAAC,cAAc,CAAC,WAAW,WAAW,SAAS,GAAG;AAEpD,UAAM,MAAM,IAAI,IAAI,QAAQ,GAAG;AAC/B,UAAM,aAAa,IAAI,aAAa,IAAI,OAAO;AAC/C,QAAI,CAAC,YAAY;AACf,aAAO;AAAA,IACT;AAAA,EACF;AAGA,SAAO,QAAQ,QAAQ,IAAI,WAAW;AACxC;AAaO,SAAS,uBAAuB,QAAgB,aAA2C;AAChG,SAAO,OAAO,YAAwC;AACpD,UAAM,MAAM,IAAI,IAAI,QAAQ,GAAG;AAC/B,UAAM,SAAS,QAAQ;AACvB,UAAM,OAAO,IAAI;AAGjB,UAAM,SAAS,UAAU,OAAO;AAChC,QAAI,CAAC,QAAQ;AAEX,aAAO,YAAY,OAAO;AAAA,IAC5B;AAOA,QAAI,WAAW,UAAU,KAAK,SAAS,aAAa,GAAG;AAErD,UAAI;AACF,cAAM,OAAO,MAAM,QAAQ,KAAK;AAChC,cAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,eAAO,UAAU;AAGjB,cAAM,eAAe,EAAE,GAAG,MAAM,OAAO;AACvC,cAAM,kBAAkB,IAAI,QAAQ,QAAQ,KAAK;AAAA,UAC/C,QAAQ,QAAQ;AAAA,UAChB,SAAS,QAAQ;AAAA,UACjB,MAAM,KAAK,UAAU,YAAY;AAAA,QACnC,CAAC;AAED,eAAO,YAAY,eAAe;AAAA,MACpC,QAAQ;AACN,eAAO,YAAY,OAAO;AAAA,MAC5B;AAAA,IACF;AAGA,UAAM,oBAAoB,KAAK,MAAM,wBAAwB;AAC7D,QAAI,WAAW,SAAS,mBAAmB;AACzC,YAAM,cAAc,kBAAkB,CAAC;AAEvC,YAAM,oBAAoB,MAAM,OAAO,WAAW,IAAI,WAAW;AAEjE,UAAI,mBAAmB;AAErB,cAAM,UAAW,kBAAkB,QAAoC;AACvE,YAAI,WAAW,YAAY,QAAQ;AACjC,iBAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,gBAAgB,CAAC,GAAG;AAAA,YAC9D,QAAQ;AAAA,YACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAChD,CAAC;AAAA,QACH;AACA,eAAO,YAAY,OAAO;AAAA,MAC5B,OAAO;AAEL,YAAI;AACF,gBAAM,OAAO,MAAM,QAAQ,KAAK;AAChC,gBAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,iBAAO,UAAU;AAEjB,gBAAM,eAAe,EAAE,GAAG,MAAM,OAAO;AACvC,gBAAM,kBAAkB,IAAI,QAAQ,QAAQ,KAAK;AAAA,YAC/C,QAAQ,QAAQ;AAAA,YAChB,SAAS,QAAQ;AAAA,YACjB,MAAM,KAAK,UAAU,YAAY;AAAA,UACnC,CAAC;AAED,iBAAO,YAAY,eAAe;AAAA,QACpC,QAAQ;AACN,iBAAO,YAAY,OAAO;AAAA,QAC5B;AAAA,MACF;AAAA,IACF;AAGA,UAAM,oBAAoB,KAAK,MAAM,wBAAwB;AAC7D,QAAI,WAAW,SAAS,mBAAmB;AACzC,YAAM,cAAc,kBAAkB,CAAC;AAGvC,YAAM,YAAY,MAAM,OAAO,WAAW,IAAI,WAAW;AACzD,UAAI,CAAC,WAAW;AACd,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,sBAAsB,CAAC,GAAG;AAAA,UACpE,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,YAAM,UAAW,UAAU,QAAoC;AAC/D,UAAI,WAAW,YAAY,QAAQ;AACjC,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,gBAAgB,CAAC,GAAG;AAAA,UAC9D,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,aAAO,YAAY,OAAO;AAAA,IAC5B;AAGA,UAAM,uBAAuB,KAAK,MAAM,wBAAwB;AAChE,QAAI,WAAW,YAAY,sBAAsB;AAC/C,YAAM,cAAc,qBAAqB,CAAC;AAE1C,YAAM,YAAY,MAAM,OAAO,WAAW,IAAI,WAAW;AACzD,UAAI,CAAC,WAAW;AACd,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,sBAAsB,CAAC,GAAG;AAAA,UACpE,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,YAAM,UAAW,UAAU,QAAoC;AAC/D,UAAI,WAAW,YAAY,QAAQ;AACjC,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,gBAAgB,CAAC,GAAG;AAAA,UAC9D,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,aAAO,YAAY,OAAO;AAAA,IAC5B;AAGA,QAAI,WAAW,SAAS,KAAK,SAAS,aAAa,GAAG;AACpD,YAAM,WAAW,MAAM,YAAY,OAAO;AAG1C,UAAI,SAAS,IAAI;AACf,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,YAAI,MAAM,QAAQ,IAAI,GAAG;AACvB,gBAAM,WAAW,KAAK,OAAO,CAAC,cAAiD;AAC7E,kBAAM,UAAU,UAAU,QAAQ;AAClC,mBAAO,CAAC,WAAW,YAAY;AAAA,UACjC,CAAC;AAED,iBAAO,IAAI,SAAS,KAAK,UAAU,QAAQ,GAAG;AAAA,YAC5C,QAAQ;AAAA,YACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAChD,CAAC;AAAA,QACH;AAAA,MACF;AAEA,aAAO;AAAA,IACT;AAoBA,WAAO,YAAY,OAAO;AAAA,EAC5B;AACF;;;AHxMA,IAAM,aAAa,cAAc,YAAY,GAAG;AAChD,IAAM,YAAY,QAAQ,UAAU;AAoBpC,IAAM,OAAO,SAAS,QAAQ,IAAI,QAAQ,QAAQ,EAAE;AACpD,IAAM,aAAa,QAAQ,IAAI,cAAc,OAAO,WAAW;AAC/D,IAAM,eAAe,QAAQ,IAAI,gBAAgB,KAAK,QAAQ,GAAG,2BAA2B;AAK5F,IAAM,eAAe,YAAY;AAAA,EAC/B,MAAM;AAAA,EACN,cAAc;AAChB,CAAC;AAKD,SAAS,YAAY;AACnB,QAAM,MAAM,IAAIC,MAAK;AAGrB,MAAI;AAAA,IACF;AAAA,IACA,KAAK;AAAA,MACH,QAAQ;AAAA,MACR,cAAc,CAAC,OAAO,QAAQ,OAAO,UAAU,QAAQ,SAAS;AAAA,MAChE,cAAc,CAAC,gBAAgB,eAAe;AAAA,IAChD,CAAC;AAAA,EACH;AAGA,QAAM,UAAU,YAAY;AAC5B,QAAM,SAAS,aAAa,OAAO;AAGnC,SAAO,YAAY,SAAS,YAAY;AAGxC,QAAM,gBAAgB,oBAAoB,QAAQ;AAAA,IAChD,UAAU;AAAA,IACV,sBAAsB;AAAA,IACtB,oBAAoB,CAAC,WAAW;AAAA,IAChC,YAAY,QAAQ;AAAA,EACtB,CAAC;AAGD,gBAAc,mBAAmB,aAAa,YAAY;AAG1D,QAAM,iBAAiB,IAAI,qBAAqB,YAAY;AAG5D,QAAM,iBAAiB,qBAAqB,UAAU;AAOtD,MAAI,IAAI,WAAW,CAAC,MAAM,EAAE,KAAK,EAAE,QAAQ,MAAM,WAAW,KAAK,IAAI,EAAE,CAAC,CAAC;AAGzE,MAAI,MAAM,aAAa,WAAW,gBAAgB,YAAY,MAAM,CAAC;AAGrE,QAAM,mBAAmB,uBAAuB,QAAQ,aAAa;AACrE,MAAI,IAAI,aAAa,cAAc;AACnC,MAAI,IAAI,aAAa,cAAc,gBAAgB,CAAC;AAGpD,QAAM,YAAY,QAAQ,WAAW,WAAW;AAChD,QAAM,QAAQ,QAAQ,IAAI,aAAa;AAEvC,MAAI,WAAW,SAAS,GAAG;AAEzB,QAAI,IAAI,MAAM,YAAY,EAAE,MAAM,UAAU,CAAC,CAAC;AAG9C,QAAI,IAAI,KAAK,CAAC,MAAM;AAClB,YAAM,YAAY,QAAQ,WAAW,YAAY;AACjD,UAAI,WAAW,SAAS,GAAG;AACzB,cAAM,OAAO,aAAa,WAAW,OAAO;AAC5C,eAAO,EAAE,KAAK,IAAI;AAAA,MACpB;AACA,aAAO,EAAE,KAAK,aAAa,GAAG;AAAA,IAChC,CAAC;AAAA,EACH,WAAW,OAAO;AAEhB,QAAI,IAAI,KAAK,CAAC,MAAM;AAClB,aAAO,EAAE;AAAA,QACP;AAAA,QACA;AAAA,MACF;AAAA,IACF,CAAC;AAAA,EACH;AAEA,SAAO,EAAE,KAAK,QAAQ,eAAe;AACvC;AAKA,eAAe,cAAc;AAE3B,MAAI,CAAC,QAAQ,IAAI,kBAAkB;AACjC,YAAQ,MAAM,qCAAqC;AACnD,YAAQ,IAAI,oCAAoC;AAChD,YAAQ,IAAI,sCAAsC;AAClD,YAAQ,KAAK,CAAC;AAAA,EAChB;AAEA,QAAM,EAAE,KAAK,QAAQ,eAAe,IAAI,UAAU;AAElD,UAAQ,IAAI;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,CASb;AAEC,UAAQ,IAAI,gBAAgB;AAC5B,UAAQ,IAAI,WAAW,IAAI,EAAE;AAC7B,UAAQ,IAAI,cAAc,QAAQ,IAAI,iBAAkB,UAAU,GAAG,EAAE,CAAC,KAAK;AAC7E,UAAQ,IAAI,cAAc,YAAY,EAAE;AACxC,UAAQ,IAAI,gBAAgB,KAAK,QAAQ,GAAG,wBAAwB,CAAC,EAAE;AAEvE,UAAQ,IAAI;AAAA,WAAc;AAC1B,UAAQ,IAAI,kDAAkD;AAC9D,UAAQ,IAAI,uDAAuD;AACnE,UAAQ,IAAI,2CAA2C;AACvD,UAAQ,IAAI,kDAAkD;AAC9D,UAAQ,IAAI,mCAAmC;AAC/C,UAAQ,IAAI,mDAAmD;AAC/D,UAAQ,IAAI,qDAAqD;AACjE,UAAQ,IAAI,sDAAsD;AAClE,UAAQ,IAAI,mDAAmD;AAC/D,UAAQ,IAAI,sDAAsD;AAClE,UAAQ,IAAI,kDAAkD;AAC9D,UAAQ,IAAI,gDAAgD;AAC5D,UAAQ,IAAI,kDAAkD;AAE9D,QAAM;AAAA,IACJ,OAAO,IAAI;AAAA,IACX,MAAM;AAAA,IACN,UAAU;AAAA,EACZ,CAAC;AAED,UAAQ,IAAI;AAAA,+CAA2C,IAAI,EAAE;AAG7D,QAAM,WAAW,YAAY;AAC3B,YAAQ,IAAI,oBAAoB;AAChC,UAAM,OAAO,OAAO,WAAW;AAC/B,mBAAe,MAAM;AACrB,YAAQ,IAAI,gBAAgB;AAC5B,YAAQ,KAAK,CAAC;AAAA,EAChB;AAEA,UAAQ,GAAG,UAAU,QAAQ;AAC7B,UAAQ,GAAG,WAAW,QAAQ;AAChC;","names":["Hono","Hono"]}
|
|
1
|
+
{"version":3,"sources":["../../src/server/index.ts","../../src/server/auth.ts","../../src/server/database/SQLiteUserRepository.ts","../../src/server/ownership.ts"],"sourcesContent":["/**\n * Portagent Server\n *\n * Hono-based server that combines:\n * - AgentX API (SSE, agents, sessions)\n * - Authentication (simple password + JWT)\n * - Static file serving (Vite build output)\n */\n\nimport { dirname, resolve } from \"path\";\nimport { fileURLToPath } from \"url\";\n\nconst __filename = fileURLToPath(import.meta.url);\nconst __dirname = dirname(__filename);\n\nimport { serve } from \"@hono/node-server\";\nimport { Hono } from \"hono\";\nimport { cors } from \"hono/cors\";\nimport { serveStatic } from \"@hono/node-server/serve-static\";\nimport { existsSync, readFileSync } from \"fs\";\n\nimport { createAgentX, defineAgent } from \"agentxjs\";\nimport { createAgentXHandler, type AgentXHandlerWithUtils } from \"agentxjs/server\";\nimport { toHonoHandler } from \"agentxjs/server/adapters/hono\";\nimport { nodeRuntime } from \"@agentxjs/node-runtime\";\nimport { homedir } from \"node:os\";\nimport { join } from \"node:path\";\n\nimport { createAuthMiddleware, authRoutes } from \"./auth\";\nimport { SQLiteUserRepository } from \"./database\";\nimport { createOwnershipHandler } from \"./ownership\";\n\n// Configuration from environment\nconst PORT = parseInt(process.env.PORT || \"5200\", 10);\nconst JWT_SECRET = process.env.JWT_SECRET || crypto.randomUUID();\nconst USER_DB_PATH = process.env.USER_DB_PATH || join(homedir(), \".agentx/data/portagent.db\");\n\n/**\n * Default Agent Definition\n */\nconst DefaultAgent = defineAgent({\n name: \"Assistant\",\n systemPrompt: \"You are a helpful AI assistant.\",\n});\n\n/**\n * Create and configure the Hono app\n */\nfunction createApp() {\n const app = new Hono();\n\n // CORS\n app.use(\n \"*\",\n cors({\n origin: \"*\",\n allowMethods: [\"GET\", \"POST\", \"PUT\", \"DELETE\", \"HEAD\", \"OPTIONS\"],\n allowHeaders: [\"Content-Type\", \"Authorization\"],\n })\n );\n\n // Create runtime and AgentX instance\n const runtime = nodeRuntime();\n const agentx = createAgentX(runtime);\n\n // Register default definition\n agentx.definitions.register(DefaultAgent);\n\n // Create AgentX handler\n const agentxHandler = createAgentXHandler(agentx, {\n basePath: \"/agentx\",\n allowDynamicCreation: true,\n allowedDefinitions: [\"Assistant\"],\n repository: runtime.repository,\n }) as AgentXHandlerWithUtils;\n\n // Register definition with handler\n agentxHandler.registerDefinition(\"Assistant\", DefaultAgent);\n\n // Initialize user repository (separate database)\n const userRepository = new SQLiteUserRepository(USER_DB_PATH);\n\n // Auth middleware\n const authMiddleware = createAuthMiddleware(JWT_SECRET);\n\n // ============================================================\n // Routes\n // ============================================================\n\n // Health check (no auth)\n app.get(\"/health\", (c) => c.json({ status: \"ok\", timestamp: Date.now() }));\n\n // Auth routes (register, login)\n app.route(\"/api/auth\", authRoutes(userRepository, JWT_SECRET, agentx));\n\n // AgentX API (protected with ownership validation)\n const ownershipHandler = createOwnershipHandler(agentx, agentxHandler);\n app.use(\"/agentx/*\", authMiddleware);\n app.all(\"/agentx/*\", toHonoHandler(ownershipHandler));\n\n // Static files (protected in production)\n const publicDir = resolve(__dirname, \"../public\");\n const isDev = process.env.NODE_ENV !== \"production\";\n\n if (existsSync(publicDir)) {\n // Serve static files\n app.use(\"/*\", serveStatic({ root: publicDir }));\n\n // SPA fallback - serve index.html for all unmatched routes\n app.get(\"*\", (c) => {\n const indexPath = resolve(publicDir, \"index.html\");\n if (existsSync(indexPath)) {\n const html = readFileSync(indexPath, \"utf-8\");\n return c.html(html);\n }\n return c.text(\"Not Found\", 404);\n });\n } else if (isDev) {\n // In dev mode, proxy to Vite\n app.get(\"*\", (c) => {\n return c.text(\n \"Static files not found. Run 'pnpm build:client' first, or use 'pnpm dev' for development.\",\n 404\n );\n });\n }\n\n return { app, agentx, userRepository };\n}\n\n/**\n * Start the server\n */\nasync function startServer() {\n // Check API key\n if (!process.env.LLM_PROVIDER_KEY) {\n console.error(\"Error: LLM_PROVIDER_KEY is required\");\n console.log(\"\\nSet it via environment variable:\");\n console.log(\" export LLM_PROVIDER_KEY=sk-ant-xxx\");\n process.exit(1);\n }\n\n const { app, agentx, userRepository } = createApp();\n\n console.log(`\n ____ _ _\n | _ \\\\ ___ _ __| |_ __ _ __ _ ___ _ __ | |_\n | |_) / _ \\\\| '__| __/ _\\` |/ _\\` |/ _ \\\\ '_ \\\\| __|\n | __/ (_) | | | || (_| | (_| | __/ | | | |_\n |_| \\\\___/|_| \\\\__\\\\__,_|\\\\__, |\\\\___|_| |_|\\\\__|\n |___/\n\n AgentX Portal - Your AI Agent Gateway (Multi-User Mode)\n`);\n\n console.log(\"Configuration:\");\n console.log(` Port: ${PORT}`);\n console.log(` API Key: ${process.env.LLM_PROVIDER_KEY!.substring(0, 15)}...`);\n console.log(` User DB: ${USER_DB_PATH}`);\n console.log(` AgentX DB: ${join(homedir(), \".agentx/data/agentx.db\")}`);\n\n console.log(`\\nEndpoints:`);\n console.log(` GET /health - Health check`);\n console.log(` POST /api/auth/register - Register new user`);\n console.log(` POST /api/auth/login - Login`);\n console.log(` GET /api/auth/verify - Verify token`);\n console.log(` --- AgentX API (protected) ---`);\n console.log(` GET /agentx/info - Platform info`);\n console.log(` GET /agentx/containers - List containers`);\n console.log(` POST /agentx/containers - Create container`);\n console.log(` GET /agentx/containers/:id - Get container`);\n console.log(` DELETE /agentx/containers/:id - Delete container`);\n console.log(` POST /agentx/agents - Create agent`);\n console.log(` GET /agentx/agents/:id/sse - SSE stream`);\n console.log(` POST /agentx/agents/:id/messages- Send message`);\n\n serve({\n fetch: app.fetch,\n port: PORT,\n hostname: \"0.0.0.0\",\n });\n\n console.log(`\\nš Server running at http://localhost:${PORT}`);\n\n // Graceful shutdown\n const shutdown = async () => {\n console.log(\"\\nShutting down...\");\n await agentx.agents.destroyAll();\n userRepository.close();\n console.log(\"Server stopped\");\n process.exit(0);\n };\n\n process.on(\"SIGINT\", shutdown);\n process.on(\"SIGTERM\", shutdown);\n}\n\nexport { createApp, startServer };\n","/**\n * Authentication Module\n *\n * Multi-user authentication with JWT tokens.\n * Supports user registration and login.\n */\n\nimport { Hono } from \"hono\";\nimport { createMiddleware } from \"hono/factory\";\nimport * as jose from \"jose\";\nimport type { AgentX } from \"agentxjs\";\nimport type { UserRepository } from \"./user/UserRepository\";\nimport type { UserInfo } from \"./user/types\";\n\nconst TOKEN_EXPIRY = \"7d\"; // 7 days\n\n/**\n * Generate a random password\n */\nexport function generatePassword(): string {\n const chars = \"ABCDEFGHJKLMNPQRSTUVWXYZabcdefghjkmnpqrstuvwxyz23456789\";\n let password = \"\";\n for (let i = 0; i < 12; i++) {\n password += chars.charAt(Math.floor(Math.random() * chars.length));\n }\n return password;\n}\n\n/**\n * Create JWT token\n */\nasync function createToken(secret: string, userId: string): Promise<string> {\n const secretKey = new TextEncoder().encode(secret);\n const token = await new jose.SignJWT({ sub: userId })\n .setProtectedHeader({ alg: \"HS256\" })\n .setIssuedAt()\n .setExpirationTime(TOKEN_EXPIRY)\n .sign(secretKey);\n return token;\n}\n\n/**\n * Verify JWT token\n */\nasync function verifyToken(secret: string, token: string): Promise<{ userId: string } | null> {\n try {\n const secretKey = new TextEncoder().encode(secret);\n const { payload } = await jose.jwtVerify(token, secretKey);\n return { userId: payload.sub as string };\n } catch {\n return null;\n }\n}\n\n/**\n * Convert UserRecord to safe UserInfo (remove password hash)\n */\nfunction toUserInfo(user: {\n userId: string;\n username: string;\n email: string;\n containerId: string;\n displayName?: string;\n avatar?: string;\n createdAt: number;\n}): UserInfo {\n return {\n userId: user.userId,\n username: user.username,\n email: user.email,\n containerId: user.containerId,\n displayName: user.displayName,\n avatar: user.avatar,\n createdAt: user.createdAt,\n };\n}\n\n/**\n * Auth routes\n */\nexport function authRoutes(\n userRepository: UserRepository,\n jwtSecret: string,\n agentx: AgentX\n): Hono {\n const app = new Hono();\n\n // Register\n app.post(\"/register\", async (c) => {\n try {\n const body = await c.req.json<{\n username?: string;\n email?: string;\n password?: string;\n displayName?: string;\n avatar?: string;\n }>();\n\n // Validation\n if (!body.username || !body.email || !body.password) {\n return c.json({ error: \"Username, email, and password are required\" }, 400);\n }\n\n // Basic validation\n if (body.username.length < 3) {\n return c.json({ error: \"Username must be at least 3 characters\" }, 400);\n }\n\n if (body.password.length < 6) {\n return c.json({ error: \"Password must be at least 6 characters\" }, 400);\n }\n\n if (!body.email.includes(\"@\")) {\n return c.json({ error: \"Invalid email format\" }, 400);\n }\n\n // Create Container for the user first\n const container = await agentx.containers.create();\n\n // Create user with the container ID\n const user = await userRepository.createUser({\n username: body.username,\n email: body.email,\n password: body.password,\n containerId: container.containerId,\n displayName: body.displayName,\n avatar: body.avatar,\n });\n\n // Generate token\n const token = await createToken(jwtSecret, user.userId);\n\n return c.json(\n {\n token,\n user: toUserInfo(user),\n expiresIn: TOKEN_EXPIRY,\n },\n 201\n );\n } catch (error) {\n const message = error instanceof Error ? error.message : \"Registration failed\";\n return c.json({ error: message }, 400);\n }\n });\n\n // Login\n app.post(\"/login\", async (c) => {\n try {\n const body = await c.req.json<{\n usernameOrEmail?: string;\n password?: string;\n }>();\n\n if (!body.usernameOrEmail || !body.password) {\n return c.json({ error: \"Username/email and password are required\" }, 400);\n }\n\n // Verify credentials\n const user = await userRepository.verifyPassword(body.usernameOrEmail, body.password);\n\n if (!user) {\n return c.json({ error: \"Invalid credentials\" }, 401);\n }\n\n // Generate token\n const token = await createToken(jwtSecret, user.userId);\n\n return c.json({\n token,\n user: toUserInfo(user),\n expiresIn: TOKEN_EXPIRY,\n });\n } catch (error) {\n const message = error instanceof Error ? error.message : \"Login failed\";\n return c.json({ error: message }, 500);\n }\n });\n\n // Verify token\n app.get(\"/verify\", async (c) => {\n const authHeader = c.req.header(\"Authorization\");\n if (!authHeader || !authHeader.startsWith(\"Bearer \")) {\n return c.json({ valid: false }, 401);\n }\n\n const token = authHeader.slice(7);\n const result = await verifyToken(jwtSecret, token);\n\n if (!result) {\n return c.json({ valid: false }, 401);\n }\n\n // Get user info\n const user = await userRepository.findUserById(result.userId);\n if (!user || !user.isActive) {\n return c.json({ valid: false }, 401);\n }\n\n return c.json({ valid: true, user: toUserInfo(user) });\n });\n\n // Logout (client-side only, just for API consistency)\n app.post(\"/logout\", (c) => {\n return c.json({ success: true });\n });\n\n return app;\n}\n\n/**\n * Create auth middleware\n */\nexport function createAuthMiddleware(jwtSecret: string) {\n return createMiddleware(async (c, next) => {\n // Skip auth for SSE connections with token in query\n const url = new URL(c.req.url);\n const queryToken = url.searchParams.get(\"token\");\n\n // Check Authorization header first\n const authHeader = c.req.header(\"Authorization\");\n let token: string | null = null;\n\n if (authHeader && authHeader.startsWith(\"Bearer \")) {\n token = authHeader.slice(7);\n } else if (queryToken) {\n // Allow token in query param for SSE (EventSource doesn't support headers)\n token = queryToken;\n }\n\n if (!token) {\n return c.json({ error: \"Unauthorized\" }, 401);\n }\n\n const result = await verifyToken(jwtSecret, token);\n if (!result) {\n return c.json({ error: \"Invalid token\" }, 401);\n }\n\n // Set user info in context\n c.set(\"userId\", result.userId);\n\n // Also set as custom header for downstream handlers\n c.header(\"X-User-Id\", result.userId);\n\n await next();\n });\n}\n","/**\n * SQLiteUserRepository - SQLite implementation of UserRepository\n *\n * Manages user data in separate portagent.db database.\n * This is independent from AgentX's agentx.db.\n *\n * Relationship to AgentX:\n * - User (portagent.db) āā Container.config.ownerId (agentx.db)\n * - User.userId is stored in Container.config.ownerId field\n */\n\nimport Database from \"better-sqlite3\";\nimport { randomUUID } from \"crypto\";\nimport { hash, compare } from \"bcrypt\";\nimport type { UserRepository } from \"../user/UserRepository\";\nimport type { UserRecord, RegisterUserInput } from \"../user/types\";\n\nconst SALT_ROUNDS = 10;\n\n/**\n * SQLite implementation of UserRepository\n */\nexport class SQLiteUserRepository implements UserRepository {\n private db: Database.Database;\n\n constructor(dbPath: string) {\n this.db = new Database(dbPath);\n this.initDatabase();\n }\n\n /**\n * Initialize database schema\n */\n private initDatabase(): void {\n // Enable foreign keys\n this.db.pragma(\"foreign_keys = ON\");\n\n // Create users table\n this.db.exec(`\n CREATE TABLE IF NOT EXISTS users (\n userId TEXT PRIMARY KEY,\n username TEXT UNIQUE NOT NULL,\n email TEXT UNIQUE NOT NULL,\n passwordHash TEXT NOT NULL,\n containerId TEXT NOT NULL,\n displayName TEXT,\n avatar TEXT,\n isActive INTEGER NOT NULL DEFAULT 1,\n createdAt INTEGER NOT NULL,\n updatedAt INTEGER NOT NULL\n );\n\n CREATE INDEX IF NOT EXISTS idx_users_username ON users(username);\n CREATE INDEX IF NOT EXISTS idx_users_email ON users(email);\n CREATE INDEX IF NOT EXISTS idx_users_containerId ON users(containerId);\n `);\n }\n\n /**\n * Create a new user\n */\n async createUser(input: RegisterUserInput): Promise<UserRecord> {\n // Check if username exists\n if (await this.usernameExists(input.username)) {\n throw new Error(`Username '${input.username}' already exists`);\n }\n\n // Check if email exists\n if (await this.emailExists(input.email)) {\n throw new Error(`Email '${input.email}' already exists`);\n }\n\n // Hash password\n const passwordHash = await hash(input.password, SALT_ROUNDS);\n\n // Create user record\n const userId = randomUUID();\n const now = Date.now();\n\n const user: UserRecord = {\n userId,\n username: input.username,\n email: input.email,\n passwordHash,\n containerId: input.containerId,\n displayName: input.displayName,\n avatar: input.avatar,\n isActive: true,\n createdAt: now,\n updatedAt: now,\n };\n\n // Insert into database\n const stmt = this.db.prepare(`\n INSERT INTO users (\n userId, username, email, passwordHash, containerId, displayName, avatar, isActive, createdAt, updatedAt\n ) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?)\n `);\n\n stmt.run(\n user.userId,\n user.username,\n user.email,\n user.passwordHash,\n user.containerId,\n user.displayName,\n user.avatar,\n user.isActive ? 1 : 0,\n user.createdAt,\n user.updatedAt\n );\n\n return user;\n }\n\n /**\n * Find user by ID\n */\n async findUserById(userId: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE userId = ?\n `);\n\n const row = stmt.get(userId) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Find user by username\n */\n async findUserByUsername(username: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE username = ?\n `);\n\n const row = stmt.get(username) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Find user by email\n */\n async findUserByEmail(email: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE email = ?\n `);\n\n const row = stmt.get(email) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Find user by username or email\n */\n async findUserByUsernameOrEmail(usernameOrEmail: string): Promise<UserRecord | null> {\n const stmt = this.db.prepare(`\n SELECT * FROM users WHERE username = ? OR email = ?\n `);\n\n const row = stmt.get(usernameOrEmail, usernameOrEmail) as any;\n return row ? this.rowToUser(row) : null;\n }\n\n /**\n * Update user\n */\n async updateUser(\n userId: string,\n updates: Partial<Omit<UserRecord, \"userId\">>\n ): Promise<UserRecord> {\n const user = await this.findUserById(userId);\n if (!user) {\n throw new Error(`User ${userId} not found`);\n }\n\n // Build SET clause dynamically\n const fields: string[] = [];\n const values: any[] = [];\n\n if (updates.username !== undefined) {\n fields.push(\"username = ?\");\n values.push(updates.username);\n }\n if (updates.email !== undefined) {\n fields.push(\"email = ?\");\n values.push(updates.email);\n }\n if (updates.passwordHash !== undefined) {\n fields.push(\"passwordHash = ?\");\n values.push(updates.passwordHash);\n }\n if (updates.displayName !== undefined) {\n fields.push(\"displayName = ?\");\n values.push(updates.displayName);\n }\n if (updates.avatar !== undefined) {\n fields.push(\"avatar = ?\");\n values.push(updates.avatar);\n }\n if (updates.isActive !== undefined) {\n fields.push(\"isActive = ?\");\n values.push(updates.isActive ? 1 : 0);\n }\n\n // Always update updatedAt\n fields.push(\"updatedAt = ?\");\n values.push(Date.now());\n\n if (fields.length === 0) {\n return user; // No updates\n }\n\n // Execute update\n values.push(userId);\n const stmt = this.db.prepare(`\n UPDATE users SET ${fields.join(\", \")} WHERE userId = ?\n `);\n\n stmt.run(...values);\n\n // Return updated user\n return (await this.findUserById(userId))!;\n }\n\n /**\n * Delete user\n */\n async deleteUser(userId: string): Promise<boolean> {\n const stmt = this.db.prepare(`\n DELETE FROM users WHERE userId = ?\n `);\n\n const result = stmt.run(userId);\n return result.changes > 0;\n }\n\n /**\n * List all users\n */\n async listUsers(): Promise<UserRecord[]> {\n const stmt = this.db.prepare(`\n SELECT * FROM users ORDER BY createdAt DESC\n `);\n\n const rows = stmt.all() as any[];\n return rows.map((row) => this.rowToUser(row));\n }\n\n /**\n * Check if username exists\n */\n async usernameExists(username: string): Promise<boolean> {\n const stmt = this.db.prepare(`\n SELECT 1 FROM users WHERE username = ?\n `);\n\n return stmt.get(username) !== undefined;\n }\n\n /**\n * Check if email exists\n */\n async emailExists(email: string): Promise<boolean> {\n const stmt = this.db.prepare(`\n SELECT 1 FROM users WHERE email = ?\n `);\n\n return stmt.get(email) !== undefined;\n }\n\n /**\n * Verify password for login\n *\n * @param usernameOrEmail - Username or email\n * @param password - Plain text password\n * @returns User record if valid, null if invalid\n */\n async verifyPassword(usernameOrEmail: string, password: string): Promise<UserRecord | null> {\n const user = await this.findUserByUsernameOrEmail(usernameOrEmail);\n if (!user) {\n return null;\n }\n\n if (!user.isActive) {\n return null; // Inactive user\n }\n\n const isValid = await compare(password, user.passwordHash);\n return isValid ? user : null;\n }\n\n /**\n * Close database connection\n */\n close(): void {\n this.db.close();\n }\n\n // ============================================================================\n // Private Helpers\n // ============================================================================\n\n private rowToUser(row: any): UserRecord {\n return {\n userId: row.userId,\n username: row.username,\n email: row.email,\n passwordHash: row.passwordHash,\n containerId: row.containerId,\n displayName: row.displayName,\n avatar: row.avatar,\n isActive: row.isActive === 1,\n createdAt: row.createdAt,\n updatedAt: row.updatedAt,\n };\n }\n}\n","/**\n * Ownership Validation Middleware\n *\n * Wraps AgentX handler to enforce user ownership of resources.\n * Uses Container.config.ownerId to link users with containers.\n */\n\nimport type { AgentXHandler } from \"agentxjs/server\";\nimport type { AgentX } from \"agentxjs\";\n\n/**\n * Extract userId from Hono context (set by auth middleware)\n */\nfunction getUserId(request: Request): string | null {\n // This is a workaround - ideally we'd get userId from context\n // But Web Standard Request doesn't have context\n // So we rely on the fact that auth middleware already validated the token\n // and we can re-extract it here\n const authHeader = request.headers.get(\"Authorization\");\n if (!authHeader || !authHeader.startsWith(\"Bearer \")) {\n // Check query param for SSE\n const url = new URL(request.url);\n const queryToken = url.searchParams.get(\"token\");\n if (!queryToken) {\n return null;\n }\n }\n // Note: We'll need to decode JWT again here, or pass userId via custom header\n // For now, we'll use a simpler approach: Add X-User-Id header in auth middleware\n return request.headers.get(\"X-User-Id\");\n}\n\n/**\n * Create ownership validation wrapper for AgentX handler\n *\n * Enforces:\n * - Container.config.ownerId must match current user\n * - Session.userId must match current user (AgentX already has this)\n *\n * @param agentx - AgentX instance\n * @param baseHandler - Original AgentX handler\n * @returns Wrapped handler with ownership validation\n */\nexport function createOwnershipHandler(agentx: AgentX, baseHandler: AgentXHandler): AgentXHandler {\n return async (request: Request): Promise<Response> => {\n const url = new URL(request.url);\n const method = request.method;\n const path = url.pathname;\n\n // Extract userId from request\n const userId = getUserId(request);\n if (!userId) {\n // If no userId, let base handler reject with 401\n return baseHandler(request);\n }\n\n // ============================================================================\n // Container ownership validation\n // ============================================================================\n\n // POST /containers - Set ownerId on creation\n if (method === \"POST\" && path.endsWith(\"/containers\")) {\n // Intercept container creation to inject ownerId\n try {\n const body = await request.json();\n const config = body.config || {};\n config.ownerId = userId; // Inject ownerId\n\n // Create new request with modified body, preserving all original fields\n const modifiedBody = { ...body, config };\n const modifiedRequest = new Request(request.url, {\n method: request.method,\n headers: request.headers,\n body: JSON.stringify(modifiedBody),\n });\n\n return baseHandler(modifiedRequest);\n } catch {\n return baseHandler(request);\n }\n }\n\n // PUT /containers/:id - Upsert semantics (create or update)\n const putContainerMatch = path.match(/\\/containers\\/([^/]+)$/);\n if (method === \"PUT\" && putContainerMatch) {\n const containerId = putContainerMatch[1];\n\n const existingContainer = await agentx.containers.get(containerId);\n\n if (existingContainer) {\n // Update: validate ownership\n const ownerId = (existingContainer.config as Record<string, unknown>)?.ownerId;\n if (ownerId && ownerId !== userId) {\n return new Response(JSON.stringify({ error: \"Access denied\" }), {\n status: 403,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n return baseHandler(request);\n } else {\n // Create: inject ownerId into the request body\n try {\n const body = await request.json();\n const config = body.config || {};\n config.ownerId = userId;\n\n const modifiedBody = { ...body, config };\n const modifiedRequest = new Request(request.url, {\n method: request.method,\n headers: request.headers,\n body: JSON.stringify(modifiedBody),\n });\n\n return baseHandler(modifiedRequest);\n } catch {\n return baseHandler(request);\n }\n }\n }\n\n // GET /containers/:id - Validate ownership\n const getContainerMatch = path.match(/\\/containers\\/([^/]+)$/);\n if (method === \"GET\" && getContainerMatch) {\n const containerId = getContainerMatch[1];\n\n // Check ownership before allowing access\n const container = await agentx.containers.get(containerId);\n if (!container) {\n return new Response(JSON.stringify({ error: \"Container not found\" }), {\n status: 404,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n const ownerId = (container.config as Record<string, unknown>)?.ownerId;\n if (ownerId && ownerId !== userId) {\n return new Response(JSON.stringify({ error: \"Access denied\" }), {\n status: 403,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n return baseHandler(request);\n }\n\n // DELETE /containers/:id - Validate ownership\n const deleteContainerMatch = path.match(/\\/containers\\/([^/]+)$/);\n if (method === \"DELETE\" && deleteContainerMatch) {\n const containerId = deleteContainerMatch[1];\n\n const container = await agentx.containers.get(containerId);\n if (!container) {\n return new Response(JSON.stringify({ error: \"Container not found\" }), {\n status: 404,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n const ownerId = (container.config as Record<string, unknown>)?.ownerId;\n if (ownerId && ownerId !== userId) {\n return new Response(JSON.stringify({ error: \"Access denied\" }), {\n status: 403,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n\n return baseHandler(request);\n }\n\n // GET /containers - Filter by ownerId\n if (method === \"GET\" && path.endsWith(\"/containers\")) {\n const response = await baseHandler(request);\n\n // Filter response to only show user's containers\n if (response.ok) {\n const body = await response.json();\n if (Array.isArray(body)) {\n const filtered = body.filter((container: { config?: { ownerId?: string } }) => {\n const ownerId = container.config?.ownerId;\n return !ownerId || ownerId === userId; // Show if no owner or owned by user\n });\n\n return new Response(JSON.stringify(filtered), {\n status: 200,\n headers: { \"Content-Type\": \"application/json\" },\n });\n }\n }\n\n return response;\n }\n\n // ============================================================================\n // Session ownership validation (already handled by AgentX via userId)\n // ============================================================================\n\n // For Sessions, AgentX already filters by userId in Session.userId field\n // So we don't need additional validation here\n\n // ============================================================================\n // Agent ownership validation (via containerId)\n // ============================================================================\n\n // Agents belong to Containers, so we validate Container ownership\n // TODO: Add agent ownership validation if needed\n\n // ============================================================================\n // Default: Pass through to base handler\n // ============================================================================\n\n return baseHandler(request);\n };\n}\n"],"mappings":";;;AASA,SAAS,SAAS,eAAe;AACjC,SAAS,qBAAqB;AAK9B,SAAS,aAAa;AACtB,SAAS,QAAAA,aAAY;AACrB,SAAS,YAAY;AACrB,SAAS,mBAAmB;AAC5B,SAAS,YAAY,oBAAoB;AAEzC,SAAS,cAAc,mBAAmB;AAC1C,SAAS,2BAAwD;AACjE,SAAS,qBAAqB;AAC9B,SAAS,mBAAmB;AAC5B,SAAS,eAAe;AACxB,SAAS,YAAY;;;ACnBrB,SAAS,YAAY;AACrB,SAAS,wBAAwB;AACjC,YAAY,UAAU;AAKtB,IAAM,eAAe;AAiBrB,eAAe,YAAY,QAAgB,QAAiC;AAC1E,QAAM,YAAY,IAAI,YAAY,EAAE,OAAO,MAAM;AACjD,QAAM,QAAQ,MAAM,IAAS,aAAQ,EAAE,KAAK,OAAO,CAAC,EACjD,mBAAmB,EAAE,KAAK,QAAQ,CAAC,EACnC,YAAY,EACZ,kBAAkB,YAAY,EAC9B,KAAK,SAAS;AACjB,SAAO;AACT;AAKA,eAAe,YAAY,QAAgB,OAAmD;AAC5F,MAAI;AACF,UAAM,YAAY,IAAI,YAAY,EAAE,OAAO,MAAM;AACjD,UAAM,EAAE,QAAQ,IAAI,MAAW,eAAU,OAAO,SAAS;AACzD,WAAO,EAAE,QAAQ,QAAQ,IAAc;AAAA,EACzC,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAKA,SAAS,WAAW,MAQP;AACX,SAAO;AAAA,IACL,QAAQ,KAAK;AAAA,IACb,UAAU,KAAK;AAAA,IACf,OAAO,KAAK;AAAA,IACZ,aAAa,KAAK;AAAA,IAClB,aAAa,KAAK;AAAA,IAClB,QAAQ,KAAK;AAAA,IACb,WAAW,KAAK;AAAA,EAClB;AACF;AAKO,SAAS,WACd,gBACA,WACA,QACM;AACN,QAAM,MAAM,IAAI,KAAK;AAGrB,MAAI,KAAK,aAAa,OAAO,MAAM;AACjC,QAAI;AACF,YAAM,OAAO,MAAM,EAAE,IAAI,KAMtB;AAGH,UAAI,CAAC,KAAK,YAAY,CAAC,KAAK,SAAS,CAAC,KAAK,UAAU;AACnD,eAAO,EAAE,KAAK,EAAE,OAAO,6CAA6C,GAAG,GAAG;AAAA,MAC5E;AAGA,UAAI,KAAK,SAAS,SAAS,GAAG;AAC5B,eAAO,EAAE,KAAK,EAAE,OAAO,yCAAyC,GAAG,GAAG;AAAA,MACxE;AAEA,UAAI,KAAK,SAAS,SAAS,GAAG;AAC5B,eAAO,EAAE,KAAK,EAAE,OAAO,yCAAyC,GAAG,GAAG;AAAA,MACxE;AAEA,UAAI,CAAC,KAAK,MAAM,SAAS,GAAG,GAAG;AAC7B,eAAO,EAAE,KAAK,EAAE,OAAO,uBAAuB,GAAG,GAAG;AAAA,MACtD;AAGA,YAAM,YAAY,MAAM,OAAO,WAAW,OAAO;AAGjD,YAAM,OAAO,MAAM,eAAe,WAAW;AAAA,QAC3C,UAAU,KAAK;AAAA,QACf,OAAO,KAAK;AAAA,QACZ,UAAU,KAAK;AAAA,QACf,aAAa,UAAU;AAAA,QACvB,aAAa,KAAK;AAAA,QAClB,QAAQ,KAAK;AAAA,MACf,CAAC;AAGD,YAAM,QAAQ,MAAM,YAAY,WAAW,KAAK,MAAM;AAEtD,aAAO,EAAE;AAAA,QACP;AAAA,UACE;AAAA,UACA,MAAM,WAAW,IAAI;AAAA,UACrB,WAAW;AAAA,QACb;AAAA,QACA;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,YAAM,UAAU,iBAAiB,QAAQ,MAAM,UAAU;AACzD,aAAO,EAAE,KAAK,EAAE,OAAO,QAAQ,GAAG,GAAG;AAAA,IACvC;AAAA,EACF,CAAC;AAGD,MAAI,KAAK,UAAU,OAAO,MAAM;AAC9B,QAAI;AACF,YAAM,OAAO,MAAM,EAAE,IAAI,KAGtB;AAEH,UAAI,CAAC,KAAK,mBAAmB,CAAC,KAAK,UAAU;AAC3C,eAAO,EAAE,KAAK,EAAE,OAAO,2CAA2C,GAAG,GAAG;AAAA,MAC1E;AAGA,YAAM,OAAO,MAAM,eAAe,eAAe,KAAK,iBAAiB,KAAK,QAAQ;AAEpF,UAAI,CAAC,MAAM;AACT,eAAO,EAAE,KAAK,EAAE,OAAO,sBAAsB,GAAG,GAAG;AAAA,MACrD;AAGA,YAAM,QAAQ,MAAM,YAAY,WAAW,KAAK,MAAM;AAEtD,aAAO,EAAE,KAAK;AAAA,QACZ;AAAA,QACA,MAAM,WAAW,IAAI;AAAA,QACrB,WAAW;AAAA,MACb,CAAC;AAAA,IACH,SAAS,OAAO;AACd,YAAM,UAAU,iBAAiB,QAAQ,MAAM,UAAU;AACzD,aAAO,EAAE,KAAK,EAAE,OAAO,QAAQ,GAAG,GAAG;AAAA,IACvC;AAAA,EACF,CAAC;AAGD,MAAI,IAAI,WAAW,OAAO,MAAM;AAC9B,UAAM,aAAa,EAAE,IAAI,OAAO,eAAe;AAC/C,QAAI,CAAC,cAAc,CAAC,WAAW,WAAW,SAAS,GAAG;AACpD,aAAO,EAAE,KAAK,EAAE,OAAO,MAAM,GAAG,GAAG;AAAA,IACrC;AAEA,UAAM,QAAQ,WAAW,MAAM,CAAC;AAChC,UAAM,SAAS,MAAM,YAAY,WAAW,KAAK;AAEjD,QAAI,CAAC,QAAQ;AACX,aAAO,EAAE,KAAK,EAAE,OAAO,MAAM,GAAG,GAAG;AAAA,IACrC;AAGA,UAAM,OAAO,MAAM,eAAe,aAAa,OAAO,MAAM;AAC5D,QAAI,CAAC,QAAQ,CAAC,KAAK,UAAU;AAC3B,aAAO,EAAE,KAAK,EAAE,OAAO,MAAM,GAAG,GAAG;AAAA,IACrC;AAEA,WAAO,EAAE,KAAK,EAAE,OAAO,MAAM,MAAM,WAAW,IAAI,EAAE,CAAC;AAAA,EACvD,CAAC;AAGD,MAAI,KAAK,WAAW,CAAC,MAAM;AACzB,WAAO,EAAE,KAAK,EAAE,SAAS,KAAK,CAAC;AAAA,EACjC,CAAC;AAED,SAAO;AACT;AAKO,SAAS,qBAAqB,WAAmB;AACtD,SAAO,iBAAiB,OAAO,GAAG,SAAS;AAEzC,UAAM,MAAM,IAAI,IAAI,EAAE,IAAI,GAAG;AAC7B,UAAM,aAAa,IAAI,aAAa,IAAI,OAAO;AAG/C,UAAM,aAAa,EAAE,IAAI,OAAO,eAAe;AAC/C,QAAI,QAAuB;AAE3B,QAAI,cAAc,WAAW,WAAW,SAAS,GAAG;AAClD,cAAQ,WAAW,MAAM,CAAC;AAAA,IAC5B,WAAW,YAAY;AAErB,cAAQ;AAAA,IACV;AAEA,QAAI,CAAC,OAAO;AACV,aAAO,EAAE,KAAK,EAAE,OAAO,eAAe,GAAG,GAAG;AAAA,IAC9C;AAEA,UAAM,SAAS,MAAM,YAAY,WAAW,KAAK;AACjD,QAAI,CAAC,QAAQ;AACX,aAAO,EAAE,KAAK,EAAE,OAAO,gBAAgB,GAAG,GAAG;AAAA,IAC/C;AAGA,MAAE,IAAI,UAAU,OAAO,MAAM;AAG7B,MAAE,OAAO,aAAa,OAAO,MAAM;AAEnC,UAAM,KAAK;AAAA,EACb,CAAC;AACH;;;AC5OA,OAAO,cAAc;AACrB,SAAS,kBAAkB;AAC3B,SAAS,MAAM,eAAe;AAI9B,IAAM,cAAc;AAKb,IAAM,uBAAN,MAAqD;AAAA,EAClD;AAAA,EAER,YAAY,QAAgB;AAC1B,SAAK,KAAK,IAAI,SAAS,MAAM;AAC7B,SAAK,aAAa;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA,EAKQ,eAAqB;AAE3B,SAAK,GAAG,OAAO,mBAAmB;AAGlC,SAAK,GAAG,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,KAiBZ;AAAA,EACH;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WAAW,OAA+C;AAE9D,QAAI,MAAM,KAAK,eAAe,MAAM,QAAQ,GAAG;AAC7C,YAAM,IAAI,MAAM,aAAa,MAAM,QAAQ,kBAAkB;AAAA,IAC/D;AAGA,QAAI,MAAM,KAAK,YAAY,MAAM,KAAK,GAAG;AACvC,YAAM,IAAI,MAAM,UAAU,MAAM,KAAK,kBAAkB;AAAA,IACzD;AAGA,UAAM,eAAe,MAAM,KAAK,MAAM,UAAU,WAAW;AAG3D,UAAM,SAAS,WAAW;AAC1B,UAAM,MAAM,KAAK,IAAI;AAErB,UAAM,OAAmB;AAAA,MACvB;AAAA,MACA,UAAU,MAAM;AAAA,MAChB,OAAO,MAAM;AAAA,MACb;AAAA,MACA,aAAa,MAAM;AAAA,MACnB,aAAa,MAAM;AAAA,MACnB,QAAQ,MAAM;AAAA,MACd,UAAU;AAAA,MACV,WAAW;AAAA,MACX,WAAW;AAAA,IACb;AAGA,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA;AAAA;AAAA,KAI5B;AAED,SAAK;AAAA,MACH,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK,WAAW,IAAI;AAAA,MACpB,KAAK;AAAA,MACL,KAAK;AAAA,IACP;AAEA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,aAAa,QAA4C;AAC7D,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,MAAM;AAC3B,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,mBAAmB,UAA8C;AACrE,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,QAAQ;AAC7B,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,OAA2C;AAC/D,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,KAAK;AAC1B,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,0BAA0B,iBAAqD;AACnF,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,MAAM,KAAK,IAAI,iBAAiB,eAAe;AACrD,WAAO,MAAM,KAAK,UAAU,GAAG,IAAI;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WACJ,QACA,SACqB;AACrB,UAAM,OAAO,MAAM,KAAK,aAAa,MAAM;AAC3C,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,MAAM,QAAQ,MAAM,YAAY;AAAA,IAC5C;AAGA,UAAM,SAAmB,CAAC;AAC1B,UAAM,SAAgB,CAAC;AAEvB,QAAI,QAAQ,aAAa,QAAW;AAClC,aAAO,KAAK,cAAc;AAC1B,aAAO,KAAK,QAAQ,QAAQ;AAAA,IAC9B;AACA,QAAI,QAAQ,UAAU,QAAW;AAC/B,aAAO,KAAK,WAAW;AACvB,aAAO,KAAK,QAAQ,KAAK;AAAA,IAC3B;AACA,QAAI,QAAQ,iBAAiB,QAAW;AACtC,aAAO,KAAK,kBAAkB;AAC9B,aAAO,KAAK,QAAQ,YAAY;AAAA,IAClC;AACA,QAAI,QAAQ,gBAAgB,QAAW;AACrC,aAAO,KAAK,iBAAiB;AAC7B,aAAO,KAAK,QAAQ,WAAW;AAAA,IACjC;AACA,QAAI,QAAQ,WAAW,QAAW;AAChC,aAAO,KAAK,YAAY;AACxB,aAAO,KAAK,QAAQ,MAAM;AAAA,IAC5B;AACA,QAAI,QAAQ,aAAa,QAAW;AAClC,aAAO,KAAK,cAAc;AAC1B,aAAO,KAAK,QAAQ,WAAW,IAAI,CAAC;AAAA,IACtC;AAGA,WAAO,KAAK,eAAe;AAC3B,WAAO,KAAK,KAAK,IAAI,CAAC;AAEtB,QAAI,OAAO,WAAW,GAAG;AACvB,aAAO;AAAA,IACT;AAGA,WAAO,KAAK,MAAM;AAClB,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA,yBACR,OAAO,KAAK,IAAI,CAAC;AAAA,KACrC;AAED,SAAK,IAAI,GAAG,MAAM;AAGlB,WAAQ,MAAM,KAAK,aAAa,MAAM;AAAA,EACxC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,WAAW,QAAkC;AACjD,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,SAAS,KAAK,IAAI,MAAM;AAC9B,WAAO,OAAO,UAAU;AAAA,EAC1B;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAmC;AACvC,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,UAAM,OAAO,KAAK,IAAI;AACtB,WAAO,KAAK,IAAI,CAAC,QAAQ,KAAK,UAAU,GAAG,CAAC;AAAA,EAC9C;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,eAAe,UAAoC;AACvD,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,WAAO,KAAK,IAAI,QAAQ,MAAM;AAAA,EAChC;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAY,OAAiC;AACjD,UAAM,OAAO,KAAK,GAAG,QAAQ;AAAA;AAAA,KAE5B;AAED,WAAO,KAAK,IAAI,KAAK,MAAM;AAAA,EAC7B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,MAAM,eAAe,iBAAyB,UAA8C;AAC1F,UAAM,OAAO,MAAM,KAAK,0BAA0B,eAAe;AACjE,QAAI,CAAC,MAAM;AACT,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,KAAK,UAAU;AAClB,aAAO;AAAA,IACT;AAEA,UAAM,UAAU,MAAM,QAAQ,UAAU,KAAK,YAAY;AACzD,WAAO,UAAU,OAAO;AAAA,EAC1B;AAAA;AAAA;AAAA;AAAA,EAKA,QAAc;AACZ,SAAK,GAAG,MAAM;AAAA,EAChB;AAAA;AAAA;AAAA;AAAA,EAMQ,UAAU,KAAsB;AACtC,WAAO;AAAA,MACL,QAAQ,IAAI;AAAA,MACZ,UAAU,IAAI;AAAA,MACd,OAAO,IAAI;AAAA,MACX,cAAc,IAAI;AAAA,MAClB,aAAa,IAAI;AAAA,MACjB,aAAa,IAAI;AAAA,MACjB,QAAQ,IAAI;AAAA,MACZ,UAAU,IAAI,aAAa;AAAA,MAC3B,WAAW,IAAI;AAAA,MACf,WAAW,IAAI;AAAA,IACjB;AAAA,EACF;AACF;;;AC/SA,SAAS,UAAU,SAAiC;AAKlD,QAAM,aAAa,QAAQ,QAAQ,IAAI,eAAe;AACtD,MAAI,CAAC,cAAc,CAAC,WAAW,WAAW,SAAS,GAAG;AAEpD,UAAM,MAAM,IAAI,IAAI,QAAQ,GAAG;AAC/B,UAAM,aAAa,IAAI,aAAa,IAAI,OAAO;AAC/C,QAAI,CAAC,YAAY;AACf,aAAO;AAAA,IACT;AAAA,EACF;AAGA,SAAO,QAAQ,QAAQ,IAAI,WAAW;AACxC;AAaO,SAAS,uBAAuB,QAAgB,aAA2C;AAChG,SAAO,OAAO,YAAwC;AACpD,UAAM,MAAM,IAAI,IAAI,QAAQ,GAAG;AAC/B,UAAM,SAAS,QAAQ;AACvB,UAAM,OAAO,IAAI;AAGjB,UAAM,SAAS,UAAU,OAAO;AAChC,QAAI,CAAC,QAAQ;AAEX,aAAO,YAAY,OAAO;AAAA,IAC5B;AAOA,QAAI,WAAW,UAAU,KAAK,SAAS,aAAa,GAAG;AAErD,UAAI;AACF,cAAM,OAAO,MAAM,QAAQ,KAAK;AAChC,cAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,eAAO,UAAU;AAGjB,cAAM,eAAe,EAAE,GAAG,MAAM,OAAO;AACvC,cAAM,kBAAkB,IAAI,QAAQ,QAAQ,KAAK;AAAA,UAC/C,QAAQ,QAAQ;AAAA,UAChB,SAAS,QAAQ;AAAA,UACjB,MAAM,KAAK,UAAU,YAAY;AAAA,QACnC,CAAC;AAED,eAAO,YAAY,eAAe;AAAA,MACpC,QAAQ;AACN,eAAO,YAAY,OAAO;AAAA,MAC5B;AAAA,IACF;AAGA,UAAM,oBAAoB,KAAK,MAAM,wBAAwB;AAC7D,QAAI,WAAW,SAAS,mBAAmB;AACzC,YAAM,cAAc,kBAAkB,CAAC;AAEvC,YAAM,oBAAoB,MAAM,OAAO,WAAW,IAAI,WAAW;AAEjE,UAAI,mBAAmB;AAErB,cAAM,UAAW,kBAAkB,QAAoC;AACvE,YAAI,WAAW,YAAY,QAAQ;AACjC,iBAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,gBAAgB,CAAC,GAAG;AAAA,YAC9D,QAAQ;AAAA,YACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAChD,CAAC;AAAA,QACH;AACA,eAAO,YAAY,OAAO;AAAA,MAC5B,OAAO;AAEL,YAAI;AACF,gBAAM,OAAO,MAAM,QAAQ,KAAK;AAChC,gBAAM,SAAS,KAAK,UAAU,CAAC;AAC/B,iBAAO,UAAU;AAEjB,gBAAM,eAAe,EAAE,GAAG,MAAM,OAAO;AACvC,gBAAM,kBAAkB,IAAI,QAAQ,QAAQ,KAAK;AAAA,YAC/C,QAAQ,QAAQ;AAAA,YAChB,SAAS,QAAQ;AAAA,YACjB,MAAM,KAAK,UAAU,YAAY;AAAA,UACnC,CAAC;AAED,iBAAO,YAAY,eAAe;AAAA,QACpC,QAAQ;AACN,iBAAO,YAAY,OAAO;AAAA,QAC5B;AAAA,MACF;AAAA,IACF;AAGA,UAAM,oBAAoB,KAAK,MAAM,wBAAwB;AAC7D,QAAI,WAAW,SAAS,mBAAmB;AACzC,YAAM,cAAc,kBAAkB,CAAC;AAGvC,YAAM,YAAY,MAAM,OAAO,WAAW,IAAI,WAAW;AACzD,UAAI,CAAC,WAAW;AACd,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,sBAAsB,CAAC,GAAG;AAAA,UACpE,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,YAAM,UAAW,UAAU,QAAoC;AAC/D,UAAI,WAAW,YAAY,QAAQ;AACjC,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,gBAAgB,CAAC,GAAG;AAAA,UAC9D,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,aAAO,YAAY,OAAO;AAAA,IAC5B;AAGA,UAAM,uBAAuB,KAAK,MAAM,wBAAwB;AAChE,QAAI,WAAW,YAAY,sBAAsB;AAC/C,YAAM,cAAc,qBAAqB,CAAC;AAE1C,YAAM,YAAY,MAAM,OAAO,WAAW,IAAI,WAAW;AACzD,UAAI,CAAC,WAAW;AACd,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,sBAAsB,CAAC,GAAG;AAAA,UACpE,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,YAAM,UAAW,UAAU,QAAoC;AAC/D,UAAI,WAAW,YAAY,QAAQ;AACjC,eAAO,IAAI,SAAS,KAAK,UAAU,EAAE,OAAO,gBAAgB,CAAC,GAAG;AAAA,UAC9D,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAChD,CAAC;AAAA,MACH;AAEA,aAAO,YAAY,OAAO;AAAA,IAC5B;AAGA,QAAI,WAAW,SAAS,KAAK,SAAS,aAAa,GAAG;AACpD,YAAM,WAAW,MAAM,YAAY,OAAO;AAG1C,UAAI,SAAS,IAAI;AACf,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,YAAI,MAAM,QAAQ,IAAI,GAAG;AACvB,gBAAM,WAAW,KAAK,OAAO,CAAC,cAAiD;AAC7E,kBAAM,UAAU,UAAU,QAAQ;AAClC,mBAAO,CAAC,WAAW,YAAY;AAAA,UACjC,CAAC;AAED,iBAAO,IAAI,SAAS,KAAK,UAAU,QAAQ,GAAG;AAAA,YAC5C,QAAQ;AAAA,YACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAChD,CAAC;AAAA,QACH;AAAA,MACF;AAEA,aAAO;AAAA,IACT;AAoBA,WAAO,YAAY,OAAO;AAAA,EAC5B;AACF;;;AHxMA,IAAM,aAAa,cAAc,YAAY,GAAG;AAChD,IAAM,YAAY,QAAQ,UAAU;AAoBpC,IAAM,OAAO,SAAS,QAAQ,IAAI,QAAQ,QAAQ,EAAE;AACpD,IAAM,aAAa,QAAQ,IAAI,cAAc,OAAO,WAAW;AAC/D,IAAM,eAAe,QAAQ,IAAI,gBAAgB,KAAK,QAAQ,GAAG,2BAA2B;AAK5F,IAAM,eAAe,YAAY;AAAA,EAC/B,MAAM;AAAA,EACN,cAAc;AAChB,CAAC;AAKD,SAAS,YAAY;AACnB,QAAM,MAAM,IAAIC,MAAK;AAGrB,MAAI;AAAA,IACF;AAAA,IACA,KAAK;AAAA,MACH,QAAQ;AAAA,MACR,cAAc,CAAC,OAAO,QAAQ,OAAO,UAAU,QAAQ,SAAS;AAAA,MAChE,cAAc,CAAC,gBAAgB,eAAe;AAAA,IAChD,CAAC;AAAA,EACH;AAGA,QAAM,UAAU,YAAY;AAC5B,QAAM,SAAS,aAAa,OAAO;AAGnC,SAAO,YAAY,SAAS,YAAY;AAGxC,QAAM,gBAAgB,oBAAoB,QAAQ;AAAA,IAChD,UAAU;AAAA,IACV,sBAAsB;AAAA,IACtB,oBAAoB,CAAC,WAAW;AAAA,IAChC,YAAY,QAAQ;AAAA,EACtB,CAAC;AAGD,gBAAc,mBAAmB,aAAa,YAAY;AAG1D,QAAM,iBAAiB,IAAI,qBAAqB,YAAY;AAG5D,QAAM,iBAAiB,qBAAqB,UAAU;AAOtD,MAAI,IAAI,WAAW,CAAC,MAAM,EAAE,KAAK,EAAE,QAAQ,MAAM,WAAW,KAAK,IAAI,EAAE,CAAC,CAAC;AAGzE,MAAI,MAAM,aAAa,WAAW,gBAAgB,YAAY,MAAM,CAAC;AAGrE,QAAM,mBAAmB,uBAAuB,QAAQ,aAAa;AACrE,MAAI,IAAI,aAAa,cAAc;AACnC,MAAI,IAAI,aAAa,cAAc,gBAAgB,CAAC;AAGpD,QAAM,YAAY,QAAQ,WAAW,WAAW;AAChD,QAAM,QAAQ,QAAQ,IAAI,aAAa;AAEvC,MAAI,WAAW,SAAS,GAAG;AAEzB,QAAI,IAAI,MAAM,YAAY,EAAE,MAAM,UAAU,CAAC,CAAC;AAG9C,QAAI,IAAI,KAAK,CAAC,MAAM;AAClB,YAAM,YAAY,QAAQ,WAAW,YAAY;AACjD,UAAI,WAAW,SAAS,GAAG;AACzB,cAAM,OAAO,aAAa,WAAW,OAAO;AAC5C,eAAO,EAAE,KAAK,IAAI;AAAA,MACpB;AACA,aAAO,EAAE,KAAK,aAAa,GAAG;AAAA,IAChC,CAAC;AAAA,EACH,WAAW,OAAO;AAEhB,QAAI,IAAI,KAAK,CAAC,MAAM;AAClB,aAAO,EAAE;AAAA,QACP;AAAA,QACA;AAAA,MACF;AAAA,IACF,CAAC;AAAA,EACH;AAEA,SAAO,EAAE,KAAK,QAAQ,eAAe;AACvC;AAKA,eAAe,cAAc;AAE3B,MAAI,CAAC,QAAQ,IAAI,kBAAkB;AACjC,YAAQ,MAAM,qCAAqC;AACnD,YAAQ,IAAI,oCAAoC;AAChD,YAAQ,IAAI,sCAAsC;AAClD,YAAQ,KAAK,CAAC;AAAA,EAChB;AAEA,QAAM,EAAE,KAAK,QAAQ,eAAe,IAAI,UAAU;AAElD,UAAQ,IAAI;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,CASb;AAEC,UAAQ,IAAI,gBAAgB;AAC5B,UAAQ,IAAI,WAAW,IAAI,EAAE;AAC7B,UAAQ,IAAI,cAAc,QAAQ,IAAI,iBAAkB,UAAU,GAAG,EAAE,CAAC,KAAK;AAC7E,UAAQ,IAAI,cAAc,YAAY,EAAE;AACxC,UAAQ,IAAI,gBAAgB,KAAK,QAAQ,GAAG,wBAAwB,CAAC,EAAE;AAEvE,UAAQ,IAAI;AAAA,WAAc;AAC1B,UAAQ,IAAI,kDAAkD;AAC9D,UAAQ,IAAI,uDAAuD;AACnE,UAAQ,IAAI,2CAA2C;AACvD,UAAQ,IAAI,kDAAkD;AAC9D,UAAQ,IAAI,mCAAmC;AAC/C,UAAQ,IAAI,mDAAmD;AAC/D,UAAQ,IAAI,qDAAqD;AACjE,UAAQ,IAAI,sDAAsD;AAClE,UAAQ,IAAI,mDAAmD;AAC/D,UAAQ,IAAI,sDAAsD;AAClE,UAAQ,IAAI,kDAAkD;AAC9D,UAAQ,IAAI,gDAAgD;AAC5D,UAAQ,IAAI,kDAAkD;AAE9D,QAAM;AAAA,IACJ,OAAO,IAAI;AAAA,IACX,MAAM;AAAA,IACN,UAAU;AAAA,EACZ,CAAC;AAED,UAAQ,IAAI;AAAA,+CAA2C,IAAI,EAAE;AAG7D,QAAM,WAAW,YAAY;AAC3B,YAAQ,IAAI,oBAAoB;AAChC,UAAM,OAAO,OAAO,WAAW;AAC/B,mBAAe,MAAM;AACrB,YAAQ,IAAI,gBAAgB;AAC5B,YAAQ,KAAK,CAAC;AAAA,EAChB;AAEA,UAAQ,GAAG,UAAU,QAAQ;AAC7B,UAAQ,GAAG,WAAW,QAAQ;AAChC;","names":["Hono","Hono"]}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@agentxjs/portagent",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.6",
|
|
4
4
|
"description": "Portagent - AgentX Portal Application",
|
|
5
5
|
"license": "MIT",
|
|
6
6
|
"repository": {
|
|
@@ -29,10 +29,10 @@
|
|
|
29
29
|
"react": "^18.3.1",
|
|
30
30
|
"react-dom": "^18.3.1",
|
|
31
31
|
"react-router-dom": "^7.1.1",
|
|
32
|
-
"@agentxjs/
|
|
33
|
-
"@agentxjs/
|
|
34
|
-
"@agentxjs/
|
|
35
|
-
"agentxjs": "0.0.
|
|
32
|
+
"@agentxjs/node-runtime": "0.0.5",
|
|
33
|
+
"@agentxjs/types": "0.0.5",
|
|
34
|
+
"@agentxjs/ui": "0.0.5",
|
|
35
|
+
"agentxjs": "0.0.5"
|
|
36
36
|
},
|
|
37
37
|
"publishConfig": {
|
|
38
38
|
"access": "public"
|