@autobe/agent 0.27.0 → 0.28.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (109) hide show
  1. package/lib/constants/AutoBeSystemPromptConstant.d.ts +1 -1
  2. package/lib/context/assertSchemaModel.d.ts +1 -1
  3. package/lib/context/assertSchemaModel.js +4 -7
  4. package/lib/context/assertSchemaModel.js.map +1 -1
  5. package/lib/index.mjs +18186 -7689
  6. package/lib/index.mjs.map +1 -1
  7. package/lib/orchestrate/analyze/histories/transformAnalyzeScenarioHistories.js +1 -1
  8. package/lib/orchestrate/analyze/histories/transformAnalyzeScenarioHistories.js.map +1 -1
  9. package/lib/orchestrate/analyze/orchestrateAnalyzeReview.js +164 -86
  10. package/lib/orchestrate/analyze/orchestrateAnalyzeReview.js.map +1 -1
  11. package/lib/orchestrate/analyze/orchestrateAnalyzeScenario.js +656 -335
  12. package/lib/orchestrate/analyze/orchestrateAnalyzeScenario.js.map +1 -1
  13. package/lib/orchestrate/analyze/orchestrateAnalyzeWrite.js +143 -74
  14. package/lib/orchestrate/analyze/orchestrateAnalyzeWrite.js.map +1 -1
  15. package/lib/orchestrate/analyze/structures/IAutoBeAnalyzeReviewApplication.d.ts +17 -52
  16. package/lib/orchestrate/analyze/structures/IAutoBeAnalyzeScenarioApplication.d.ts +25 -22
  17. package/lib/orchestrate/analyze/structures/IAutoBeAnalyzeWriteApplication.d.ts +7 -23
  18. package/lib/orchestrate/common/orchestrateCommonCorrectCasting.js +165 -2
  19. package/lib/orchestrate/common/orchestrateCommonCorrectCasting.js.map +1 -1
  20. package/lib/orchestrate/facade/createAutoBeFacadeController.js +773 -403
  21. package/lib/orchestrate/facade/createAutoBeFacadeController.js.map +1 -1
  22. package/lib/orchestrate/interface/orchestrateInterfaceAuthorizations.js +749 -2
  23. package/lib/orchestrate/interface/orchestrateInterfaceAuthorizations.js.map +1 -1
  24. package/lib/orchestrate/interface/orchestrateInterfaceComplement.js +1637 -9
  25. package/lib/orchestrate/interface/orchestrateInterfaceComplement.js.map +1 -1
  26. package/lib/orchestrate/interface/orchestrateInterfaceEndpoints.js +252 -133
  27. package/lib/orchestrate/interface/orchestrateInterfaceEndpoints.js.map +1 -1
  28. package/lib/orchestrate/interface/orchestrateInterfaceEndpointsReview.js +258 -135
  29. package/lib/orchestrate/interface/orchestrateInterfaceEndpointsReview.js.map +1 -1
  30. package/lib/orchestrate/interface/orchestrateInterfaceGroups.js +342 -226
  31. package/lib/orchestrate/interface/orchestrateInterfaceGroups.js.map +1 -1
  32. package/lib/orchestrate/interface/orchestrateInterfaceOperations.js +633 -1
  33. package/lib/orchestrate/interface/orchestrateInterfaceOperations.js.map +1 -1
  34. package/lib/orchestrate/interface/orchestrateInterfaceOperationsReview.js +785 -3
  35. package/lib/orchestrate/interface/orchestrateInterfaceOperationsReview.js.map +1 -1
  36. package/lib/orchestrate/interface/orchestrateInterfacePrerequisites.js +206 -3
  37. package/lib/orchestrate/interface/orchestrateInterfacePrerequisites.js.map +1 -1
  38. package/lib/orchestrate/interface/orchestrateInterfaceSchemaRename.js +107 -1
  39. package/lib/orchestrate/interface/orchestrateInterfaceSchemaRename.js.map +1 -1
  40. package/lib/orchestrate/interface/orchestrateInterfaceSchemaReview.js +1676 -9
  41. package/lib/orchestrate/interface/orchestrateInterfaceSchemaReview.js.map +1 -1
  42. package/lib/orchestrate/interface/orchestrateInterfaceSchemas.js +1637 -9
  43. package/lib/orchestrate/interface/orchestrateInterfaceSchemas.js.map +1 -1
  44. package/lib/orchestrate/prisma/orchestratePrismaComponent.js +397 -201
  45. package/lib/orchestrate/prisma/orchestratePrismaComponent.js.map +1 -1
  46. package/lib/orchestrate/prisma/orchestratePrismaCorrect.js +1184 -599
  47. package/lib/orchestrate/prisma/orchestratePrismaCorrect.js.map +1 -1
  48. package/lib/orchestrate/prisma/orchestratePrismaReview.js +1202 -608
  49. package/lib/orchestrate/prisma/orchestratePrismaReview.js.map +1 -1
  50. package/lib/orchestrate/prisma/orchestratePrismaSchemas.js +4 -2
  51. package/lib/orchestrate/prisma/orchestratePrismaSchemas.js.map +1 -1
  52. package/lib/orchestrate/realize/orchestrateRealizeAuthorization.js +369 -185
  53. package/lib/orchestrate/realize/orchestrateRealizeAuthorization.js.map +1 -1
  54. package/lib/orchestrate/realize/orchestrateRealizeAuthorizationCorrect.js +405 -203
  55. package/lib/orchestrate/realize/orchestrateRealizeAuthorizationCorrect.js.map +1 -1
  56. package/lib/orchestrate/realize/orchestrateRealizeCorrect.js +130 -2
  57. package/lib/orchestrate/realize/orchestrateRealizeCorrect.js.map +1 -1
  58. package/lib/orchestrate/realize/orchestrateRealizeCorrectCasting.js +165 -2
  59. package/lib/orchestrate/realize/orchestrateRealizeCorrectCasting.js.map +1 -1
  60. package/lib/orchestrate/realize/orchestrateRealizeWrite.js +130 -2
  61. package/lib/orchestrate/realize/orchestrateRealizeWrite.js.map +1 -1
  62. package/lib/orchestrate/test/histories/transformTestWriteHistories.js.map +1 -1
  63. package/lib/orchestrate/test/orchestrateTestCorrect.js +131 -2
  64. package/lib/orchestrate/test/orchestrateTestCorrect.js.map +1 -1
  65. package/lib/orchestrate/test/orchestrateTestCorrectInvalidRequest.js +166 -2
  66. package/lib/orchestrate/test/orchestrateTestCorrectInvalidRequest.js.map +1 -1
  67. package/lib/orchestrate/test/orchestrateTestScenario.js +257 -3
  68. package/lib/orchestrate/test/orchestrateTestScenario.js.map +1 -1
  69. package/lib/orchestrate/test/orchestrateTestScenarioReview.js +283 -3
  70. package/lib/orchestrate/test/orchestrateTestScenarioReview.js.map +1 -1
  71. package/lib/orchestrate/test/orchestrateTestWrite.js +139 -2
  72. package/lib/orchestrate/test/orchestrateTestWrite.js.map +1 -1
  73. package/package.json +9 -9
  74. package/src/constants/AutoBeSystemPromptConstant.ts +1 -1
  75. package/src/context/assertSchemaModel.ts +5 -8
  76. package/src/orchestrate/analyze/orchestrateAnalyzeReview.ts +7 -9
  77. package/src/orchestrate/analyze/orchestrateAnalyzeScenario.ts +13 -9
  78. package/src/orchestrate/analyze/orchestrateAnalyzeWrite.ts +7 -9
  79. package/src/orchestrate/analyze/structures/IAutoBeAnalyzeReviewApplication.ts +19 -54
  80. package/src/orchestrate/analyze/structures/IAutoBeAnalyzeScenarioApplication.ts +25 -22
  81. package/src/orchestrate/analyze/structures/IAutoBeAnalyzeWriteApplication.ts +8 -24
  82. package/src/orchestrate/common/orchestrateCommonCorrectCasting.ts +15 -1
  83. package/src/orchestrate/facade/createAutoBeFacadeController.ts +7 -6
  84. package/src/orchestrate/interface/orchestrateInterfaceAuthorizations.ts +11 -1
  85. package/src/orchestrate/interface/orchestrateInterfaceComplement.ts +11 -1
  86. package/src/orchestrate/interface/orchestrateInterfaceEndpoints.ts +13 -9
  87. package/src/orchestrate/interface/orchestrateInterfaceEndpointsReview.ts +13 -9
  88. package/src/orchestrate/interface/orchestrateInterfaceGroups.ts +17 -14
  89. package/src/orchestrate/interface/orchestrateInterfaceOperations.ts +11 -1
  90. package/src/orchestrate/interface/orchestrateInterfaceOperationsReview.ts +14 -1
  91. package/src/orchestrate/interface/orchestrateInterfacePrerequisites.ts +11 -1
  92. package/src/orchestrate/interface/orchestrateInterfaceSchemaRename.ts +9 -1
  93. package/src/orchestrate/interface/orchestrateInterfaceSchemaReview.ts +14 -1
  94. package/src/orchestrate/interface/orchestrateInterfaceSchemas.ts +11 -1
  95. package/src/orchestrate/prisma/orchestratePrismaComponent.ts +13 -9
  96. package/src/orchestrate/prisma/orchestratePrismaCorrect.ts +7 -9
  97. package/src/orchestrate/prisma/orchestratePrismaReview.ts +7 -10
  98. package/src/orchestrate/realize/orchestrateRealizeAuthorization.ts +13 -9
  99. package/src/orchestrate/realize/orchestrateRealizeAuthorizationCorrect.ts +13 -9
  100. package/src/orchestrate/realize/orchestrateRealizeCorrect.ts +11 -1
  101. package/src/orchestrate/realize/orchestrateRealizeCorrectCasting.ts +15 -1
  102. package/src/orchestrate/realize/orchestrateRealizeWrite.ts +11 -1
  103. package/src/orchestrate/test/experimental/orchestrateTestWrite.ast +5 -1
  104. package/src/orchestrate/test/histories/transformTestWriteHistories.ts +1 -1
  105. package/src/orchestrate/test/orchestrateTestCorrect.ts +11 -1
  106. package/src/orchestrate/test/orchestrateTestCorrectInvalidRequest.ts +18 -1
  107. package/src/orchestrate/test/orchestrateTestScenario.ts +11 -1
  108. package/src/orchestrate/test/orchestrateTestScenarioReview.ts +11 -1
  109. package/src/orchestrate/test/orchestrateTestWrite.ts +11 -1
@@ -148,7 +148,11 @@ function process(ctx, actor, templateFiles, progress, promptCacheKey) {
148
148
  }
149
149
  function createController(props) {
150
150
  (0, assertSchemaModel_1.assertSchemaModel)(props.model);
151
- const application = collection[props.model];
151
+ const application = collection[props.model === "chatgpt"
152
+ ? "chatgpt"
153
+ : props.model === "gemini"
154
+ ? "gemini"
155
+ : "claude"];
152
156
  return {
153
157
  protocol: "class",
154
158
  name: "Create Decorator",
@@ -160,209 +164,390 @@ function createController(props) {
160
164
  },
161
165
  };
162
166
  }
163
- const claude = {
164
- model: "claude",
165
- options: {
166
- reference: true,
167
- separate: null
168
- },
169
- functions: [
170
- {
171
- name: "createDecorator",
172
- parameters: {
173
- description: " Properties containing provider, decorator, and payload type\nconfigurations\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationApplication.IProps}",
174
- type: "object",
175
- properties: {
176
- provider: {
177
- description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
178
- $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
179
- },
180
- decorator: {
181
- description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
182
- $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
167
+ const collection = {
168
+ chatgpt: {
169
+ model: "chatgpt",
170
+ options: {
171
+ reference: true,
172
+ strict: false,
173
+ separate: null
174
+ },
175
+ functions: [
176
+ {
177
+ name: "createDecorator",
178
+ parameters: {
179
+ description: " Properties containing provider, decorator, and payload type\nconfigurations\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationApplication.IProps}",
180
+ type: "object",
181
+ properties: {
182
+ provider: {
183
+ description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
184
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
185
+ },
186
+ decorator: {
187
+ description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
188
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
189
+ },
190
+ payload: {
191
+ description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
192
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
193
+ }
183
194
  },
184
- payload: {
185
- description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
186
- $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
195
+ required: [
196
+ "provider",
197
+ "decorator",
198
+ "payload"
199
+ ],
200
+ additionalProperties: false,
201
+ $defs: {
202
+ "IAutoBeRealizeAuthorizationApplication.IProvider": {
203
+ type: "object",
204
+ properties: {
205
+ name: {
206
+ description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.\n\n\n@pattern ^[a-z][a-zA-Z0-9]*$",
207
+ type: "string"
208
+ },
209
+ content: {
210
+ description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
211
+ type: "string"
212
+ }
213
+ },
214
+ required: [
215
+ "name",
216
+ "content"
217
+ ]
218
+ },
219
+ "IAutoBeRealizeAuthorizationApplication.IDecorator": {
220
+ type: "object",
221
+ properties: {
222
+ name: {
223
+ description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
224
+ type: "string"
225
+ },
226
+ content: {
227
+ description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
228
+ type: "string"
229
+ }
230
+ },
231
+ required: [
232
+ "name",
233
+ "content"
234
+ ]
235
+ },
236
+ "IAutoBeRealizeAuthorizationApplication.IPayloadType": {
237
+ type: "object",
238
+ properties: {
239
+ name: {
240
+ description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
241
+ type: "string"
242
+ },
243
+ content: {
244
+ description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
245
+ type: "string"
246
+ }
247
+ },
248
+ required: [
249
+ "name",
250
+ "content"
251
+ ]
252
+ }
187
253
  }
188
254
  },
189
- required: [
190
- "provider",
191
- "decorator",
192
- "payload"
193
- ],
194
- additionalProperties: false,
195
- $defs: {
196
- "IAutoBeRealizeAuthorizationApplication.IProvider": {
197
- type: "object",
198
- properties: {
199
- name: {
200
- description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.",
201
- type: "string",
202
- pattern: "^[a-z][a-zA-Z0-9]*$"
203
- },
204
- content: {
205
- description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
206
- type: "string"
207
- }
255
+ description: "Generates authentication provider, decorator, and payload type for\nrole-based authorization.\n\nThis method creates a complete authentication infrastructure for a specific\nrole in the NestJS application. It generates three interconnected\ncomponents that work together to provide JWT-based authentication and\nauthorization.\n\nThe generated components include:\n\n- **Provider Function**: Handles JWT verification and user validation from\n database\n- **Decorator**: NestJS parameter decorator for injecting authenticated user\n data\n- **Payload Type**: TypeScript interface defining the authenticated user\n structure\n\nAll components follow strict naming conventions and integrate with the\nexisting authentication architecture using the shared jwtAuthorize\nfunction.",
256
+ validate: (() => { const _io0 = input => "object" === typeof input.provider && null !== input.provider && _io1(input.provider) && ("object" === typeof input.decorator && null !== input.decorator && _io2(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io3(input.payload)); const _io1 = input => "string" === typeof input.name && RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io2 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io3 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _vo0 = (input, _path, _exceptionable = true) => [("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
257
+ path: _path + ".provider",
258
+ expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
259
+ value: input.provider
260
+ })) && _vo1(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
261
+ path: _path + ".provider",
262
+ expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
263
+ value: input.provider
264
+ }), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
265
+ path: _path + ".decorator",
266
+ expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
267
+ value: input.decorator
268
+ })) && _vo2(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
269
+ path: _path + ".decorator",
270
+ expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
271
+ value: input.decorator
272
+ }), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
273
+ path: _path + ".payload",
274
+ expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
275
+ value: input.payload
276
+ })) && _vo3(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
277
+ path: _path + ".payload",
278
+ expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
279
+ value: input.payload
280
+ })].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
281
+ path: _path + ".name",
282
+ expected: "string & CamelCasePattern",
283
+ value: input.name
284
+ })) || _report(_exceptionable, {
285
+ path: _path + ".name",
286
+ expected: "(string & CamelCasePattern)",
287
+ value: input.name
288
+ }), "string" === typeof input.content || _report(_exceptionable, {
289
+ path: _path + ".content",
290
+ expected: "string",
291
+ value: input.content
292
+ })].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
293
+ path: _path + ".name",
294
+ expected: "string & PascalCasePattern",
295
+ value: input.name
296
+ })) || _report(_exceptionable, {
297
+ path: _path + ".name",
298
+ expected: "(string & PascalCasePattern)",
299
+ value: input.name
300
+ }), "string" === typeof input.content || _report(_exceptionable, {
301
+ path: _path + ".content",
302
+ expected: "string",
303
+ value: input.content
304
+ })].every(flag => flag); const _vo3 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
305
+ path: _path + ".name",
306
+ expected: "string & PascalCasePattern",
307
+ value: input.name
308
+ })) || _report(_exceptionable, {
309
+ path: _path + ".name",
310
+ expected: "(string & PascalCasePattern)",
311
+ value: input.name
312
+ }), "string" === typeof input.content || _report(_exceptionable, {
313
+ path: _path + ".content",
314
+ expected: "string",
315
+ value: input.content
316
+ })].every(flag => flag); const __is = input => "object" === typeof input && null !== input && _io0(input); let errors; let _report; return input => {
317
+ if (false === __is(input)) {
318
+ errors = [];
319
+ _report = __typia_transform__validateReport._validateReport(errors);
320
+ ((input, _path, _exceptionable = true) => ("object" === typeof input && null !== input || _report(true, {
321
+ path: _path + "",
322
+ expected: "IAutoBeRealizeAuthorizationApplication.IProps",
323
+ value: input
324
+ })) && _vo0(input, _path + "", true) || _report(true, {
325
+ path: _path + "",
326
+ expected: "IAutoBeRealizeAuthorizationApplication.IProps",
327
+ value: input
328
+ }))(input, "$input", true);
329
+ const success = 0 === errors.length;
330
+ return success ? {
331
+ success,
332
+ data: input
333
+ } : {
334
+ success,
335
+ errors,
336
+ data: input
337
+ };
338
+ }
339
+ return {
340
+ success: true,
341
+ data: input
342
+ };
343
+ }; })()
344
+ }
345
+ ]
346
+ },
347
+ claude: {
348
+ model: "claude",
349
+ options: {
350
+ reference: true,
351
+ separate: null
352
+ },
353
+ functions: [
354
+ {
355
+ name: "createDecorator",
356
+ parameters: {
357
+ description: " Properties containing provider, decorator, and payload type\nconfigurations\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationApplication.IProps}",
358
+ type: "object",
359
+ properties: {
360
+ provider: {
361
+ description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
362
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
363
+ },
364
+ decorator: {
365
+ description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
366
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
208
367
  },
209
- required: [
210
- "name",
211
- "content"
212
- ]
368
+ payload: {
369
+ description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
370
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
371
+ }
213
372
  },
214
- "IAutoBeRealizeAuthorizationApplication.IDecorator": {
215
- type: "object",
216
- properties: {
217
- name: {
218
- description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.",
219
- type: "string",
220
- pattern: "^[A-Z][a-zA-Z0-9]*$"
373
+ required: [
374
+ "provider",
375
+ "decorator",
376
+ "payload"
377
+ ],
378
+ additionalProperties: false,
379
+ $defs: {
380
+ "IAutoBeRealizeAuthorizationApplication.IProvider": {
381
+ type: "object",
382
+ properties: {
383
+ name: {
384
+ description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.",
385
+ type: "string",
386
+ pattern: "^[a-z][a-zA-Z0-9]*$"
387
+ },
388
+ content: {
389
+ description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
390
+ type: "string"
391
+ }
221
392
  },
222
- content: {
223
- description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
224
- type: "string"
225
- }
393
+ required: [
394
+ "name",
395
+ "content"
396
+ ]
226
397
  },
227
- required: [
228
- "name",
229
- "content"
230
- ]
231
- },
232
- "IAutoBeRealizeAuthorizationApplication.IPayloadType": {
233
- type: "object",
234
- properties: {
235
- name: {
236
- description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.",
237
- type: "string",
238
- pattern: "^[A-Z][a-zA-Z0-9]*$"
398
+ "IAutoBeRealizeAuthorizationApplication.IDecorator": {
399
+ type: "object",
400
+ properties: {
401
+ name: {
402
+ description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.",
403
+ type: "string",
404
+ pattern: "^[A-Z][a-zA-Z0-9]*$"
405
+ },
406
+ content: {
407
+ description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
408
+ type: "string"
409
+ }
239
410
  },
240
- content: {
241
- description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
242
- type: "string"
243
- }
411
+ required: [
412
+ "name",
413
+ "content"
414
+ ]
244
415
  },
245
- required: [
246
- "name",
247
- "content"
248
- ]
416
+ "IAutoBeRealizeAuthorizationApplication.IPayloadType": {
417
+ type: "object",
418
+ properties: {
419
+ name: {
420
+ description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.",
421
+ type: "string",
422
+ pattern: "^[A-Z][a-zA-Z0-9]*$"
423
+ },
424
+ content: {
425
+ description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
426
+ type: "string"
427
+ }
428
+ },
429
+ required: [
430
+ "name",
431
+ "content"
432
+ ]
433
+ }
249
434
  }
250
- }
251
- },
252
- description: "Generates authentication provider, decorator, and payload type for\nrole-based authorization.\n\nThis method creates a complete authentication infrastructure for a specific\nrole in the NestJS application. It generates three interconnected\ncomponents that work together to provide JWT-based authentication and\nauthorization.\n\nThe generated components include:\n\n- **Provider Function**: Handles JWT verification and user validation from\n database\n- **Decorator**: NestJS parameter decorator for injecting authenticated user\n data\n- **Payload Type**: TypeScript interface defining the authenticated user\n structure\n\nAll components follow strict naming conventions and integrate with the\nexisting authentication architecture using the shared jwtAuthorize\nfunction.",
253
- validate: (() => { const _io0 = input => "object" === typeof input.provider && null !== input.provider && _io1(input.provider) && ("object" === typeof input.decorator && null !== input.decorator && _io2(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io3(input.payload)); const _io1 = input => "string" === typeof input.name && RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io2 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io3 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _vo0 = (input, _path, _exceptionable = true) => [("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
254
- path: _path + ".provider",
255
- expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
256
- value: input.provider
257
- })) && _vo1(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
258
- path: _path + ".provider",
259
- expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
260
- value: input.provider
261
- }), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
262
- path: _path + ".decorator",
263
- expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
264
- value: input.decorator
265
- })) && _vo2(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
266
- path: _path + ".decorator",
267
- expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
268
- value: input.decorator
269
- }), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
270
- path: _path + ".payload",
271
- expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
272
- value: input.payload
273
- })) && _vo3(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
274
- path: _path + ".payload",
275
- expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
276
- value: input.payload
277
- })].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
278
- path: _path + ".name",
279
- expected: "string & CamelCasePattern",
280
- value: input.name
281
- })) || _report(_exceptionable, {
282
- path: _path + ".name",
283
- expected: "(string & CamelCasePattern)",
284
- value: input.name
285
- }), "string" === typeof input.content || _report(_exceptionable, {
286
- path: _path + ".content",
287
- expected: "string",
288
- value: input.content
289
- })].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
290
- path: _path + ".name",
291
- expected: "string & PascalCasePattern",
292
- value: input.name
293
- })) || _report(_exceptionable, {
294
- path: _path + ".name",
295
- expected: "(string & PascalCasePattern)",
296
- value: input.name
297
- }), "string" === typeof input.content || _report(_exceptionable, {
298
- path: _path + ".content",
299
- expected: "string",
300
- value: input.content
301
- })].every(flag => flag); const _vo3 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
302
- path: _path + ".name",
303
- expected: "string & PascalCasePattern",
304
- value: input.name
305
- })) || _report(_exceptionable, {
306
- path: _path + ".name",
307
- expected: "(string & PascalCasePattern)",
308
- value: input.name
309
- }), "string" === typeof input.content || _report(_exceptionable, {
310
- path: _path + ".content",
311
- expected: "string",
312
- value: input.content
313
- })].every(flag => flag); const __is = input => "object" === typeof input && null !== input && _io0(input); let errors; let _report; return input => {
314
- if (false === __is(input)) {
315
- errors = [];
316
- _report = __typia_transform__validateReport._validateReport(errors);
317
- ((input, _path, _exceptionable = true) => ("object" === typeof input && null !== input || _report(true, {
318
- path: _path + "",
319
- expected: "IAutoBeRealizeAuthorizationApplication.IProps",
320
- value: input
321
- })) && _vo0(input, _path + "", true) || _report(true, {
322
- path: _path + "",
323
- expected: "IAutoBeRealizeAuthorizationApplication.IProps",
324
- value: input
325
- }))(input, "$input", true);
326
- const success = 0 === errors.length;
327
- return success ? {
328
- success,
329
- data: input
330
- } : {
331
- success,
332
- errors,
435
+ },
436
+ description: "Generates authentication provider, decorator, and payload type for\nrole-based authorization.\n\nThis method creates a complete authentication infrastructure for a specific\nrole in the NestJS application. It generates three interconnected\ncomponents that work together to provide JWT-based authentication and\nauthorization.\n\nThe generated components include:\n\n- **Provider Function**: Handles JWT verification and user validation from\n database\n- **Decorator**: NestJS parameter decorator for injecting authenticated user\n data\n- **Payload Type**: TypeScript interface defining the authenticated user\n structure\n\nAll components follow strict naming conventions and integrate with the\nexisting authentication architecture using the shared jwtAuthorize\nfunction.",
437
+ validate: (() => { const _io0 = input => "object" === typeof input.provider && null !== input.provider && _io1(input.provider) && ("object" === typeof input.decorator && null !== input.decorator && _io2(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io3(input.payload)); const _io1 = input => "string" === typeof input.name && RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io2 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io3 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _vo0 = (input, _path, _exceptionable = true) => [("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
438
+ path: _path + ".provider",
439
+ expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
440
+ value: input.provider
441
+ })) && _vo1(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
442
+ path: _path + ".provider",
443
+ expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
444
+ value: input.provider
445
+ }), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
446
+ path: _path + ".decorator",
447
+ expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
448
+ value: input.decorator
449
+ })) && _vo2(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
450
+ path: _path + ".decorator",
451
+ expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
452
+ value: input.decorator
453
+ }), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
454
+ path: _path + ".payload",
455
+ expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
456
+ value: input.payload
457
+ })) && _vo3(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
458
+ path: _path + ".payload",
459
+ expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
460
+ value: input.payload
461
+ })].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
462
+ path: _path + ".name",
463
+ expected: "string & CamelCasePattern",
464
+ value: input.name
465
+ })) || _report(_exceptionable, {
466
+ path: _path + ".name",
467
+ expected: "(string & CamelCasePattern)",
468
+ value: input.name
469
+ }), "string" === typeof input.content || _report(_exceptionable, {
470
+ path: _path + ".content",
471
+ expected: "string",
472
+ value: input.content
473
+ })].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
474
+ path: _path + ".name",
475
+ expected: "string & PascalCasePattern",
476
+ value: input.name
477
+ })) || _report(_exceptionable, {
478
+ path: _path + ".name",
479
+ expected: "(string & PascalCasePattern)",
480
+ value: input.name
481
+ }), "string" === typeof input.content || _report(_exceptionable, {
482
+ path: _path + ".content",
483
+ expected: "string",
484
+ value: input.content
485
+ })].every(flag => flag); const _vo3 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
486
+ path: _path + ".name",
487
+ expected: "string & PascalCasePattern",
488
+ value: input.name
489
+ })) || _report(_exceptionable, {
490
+ path: _path + ".name",
491
+ expected: "(string & PascalCasePattern)",
492
+ value: input.name
493
+ }), "string" === typeof input.content || _report(_exceptionable, {
494
+ path: _path + ".content",
495
+ expected: "string",
496
+ value: input.content
497
+ })].every(flag => flag); const __is = input => "object" === typeof input && null !== input && _io0(input); let errors; let _report; return input => {
498
+ if (false === __is(input)) {
499
+ errors = [];
500
+ _report = __typia_transform__validateReport._validateReport(errors);
501
+ ((input, _path, _exceptionable = true) => ("object" === typeof input && null !== input || _report(true, {
502
+ path: _path + "",
503
+ expected: "IAutoBeRealizeAuthorizationApplication.IProps",
504
+ value: input
505
+ })) && _vo0(input, _path + "", true) || _report(true, {
506
+ path: _path + "",
507
+ expected: "IAutoBeRealizeAuthorizationApplication.IProps",
508
+ value: input
509
+ }))(input, "$input", true);
510
+ const success = 0 === errors.length;
511
+ return success ? {
512
+ success,
513
+ data: input
514
+ } : {
515
+ success,
516
+ errors,
517
+ data: input
518
+ };
519
+ }
520
+ return {
521
+ success: true,
333
522
  data: input
334
523
  };
335
- }
336
- return {
337
- success: true,
338
- data: input
339
- };
340
- }; })()
341
- }
342
- ]
343
- };
344
- const collection = {
345
- chatgpt: {
346
- model: "chatgpt",
524
+ }; })()
525
+ }
526
+ ]
527
+ },
528
+ gemini: {
529
+ model: "gemini",
347
530
  options: {
348
531
  reference: true,
349
- strict: false,
350
532
  separate: null
351
533
  },
352
534
  functions: [
353
535
  {
354
536
  name: "createDecorator",
355
537
  parameters: {
356
- description: " Properties containing provider, decorator, and payload type\nconfigurations\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationApplication.IProps}\n\n### Description of {@link provider} property:\n\n> Authentication Provider function configuration containing the function\n> name and implementation code. The Provider handles JWT token\n> verification, role validation, and database queries to authenticate\n> users.\n\n### Description of {@link decorator} property:\n\n> Authentication Decorator configuration containing the decorator name and\n> implementation code. The Decorator integrates with NestJS parameter\n> decorators to automatically inject authenticated user data into\n> Controller methods.\n\n### Description of {@link payload} property:\n\n> Authentication Payload Type configuration containing the payload type\n> name and implementation code. The Payload Type is used to define the\n> structure of the authenticated user data that will be injected into\n> Controller methods when using the decorator. It serves as the TypeScript\n> type for the parameter in Controller method signatures.",
538
+ description: " Properties containing provider, decorator, and payload type\nconfigurations\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationApplication.IProps}",
357
539
  type: "object",
358
540
  properties: {
359
541
  provider: {
542
+ description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
360
543
  $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
361
544
  },
362
545
  decorator: {
546
+ description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
363
547
  $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
364
548
  },
365
549
  payload: {
550
+ description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
366
551
  $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
367
552
  }
368
553
  },
@@ -377,8 +562,9 @@ const collection = {
377
562
  type: "object",
378
563
  properties: {
379
564
  name: {
380
- description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.\n\n\n@pattern ^[a-z][a-zA-Z0-9]*$",
381
- type: "string"
565
+ description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.",
566
+ type: "string",
567
+ pattern: "^[a-z][a-zA-Z0-9]*$"
382
568
  },
383
569
  content: {
384
570
  description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
@@ -394,8 +580,9 @@ const collection = {
394
580
  type: "object",
395
581
  properties: {
396
582
  name: {
397
- description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
398
- type: "string"
583
+ description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.",
584
+ type: "string",
585
+ pattern: "^[A-Z][a-zA-Z0-9]*$"
399
586
  },
400
587
  content: {
401
588
  description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
@@ -411,8 +598,9 @@ const collection = {
411
598
  type: "object",
412
599
  properties: {
413
600
  name: {
414
- description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
415
- type: "string"
601
+ description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.",
602
+ type: "string",
603
+ pattern: "^[A-Z][a-zA-Z0-9]*$"
416
604
  },
417
605
  content: {
418
606
  description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
@@ -518,9 +706,5 @@ const collection = {
518
706
  }
519
707
  ]
520
708
  },
521
- claude,
522
- llama: claude,
523
- deepseek: claude,
524
- "3.1": claude,
525
709
  };
526
710
  //# sourceMappingURL=orchestrateRealizeAuthorization.js.map