@autobe/agent 0.27.0 → 0.28.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (109) hide show
  1. package/lib/constants/AutoBeSystemPromptConstant.d.ts +1 -1
  2. package/lib/context/assertSchemaModel.d.ts +1 -1
  3. package/lib/context/assertSchemaModel.js +4 -7
  4. package/lib/context/assertSchemaModel.js.map +1 -1
  5. package/lib/index.mjs +18186 -7689
  6. package/lib/index.mjs.map +1 -1
  7. package/lib/orchestrate/analyze/histories/transformAnalyzeScenarioHistories.js +1 -1
  8. package/lib/orchestrate/analyze/histories/transformAnalyzeScenarioHistories.js.map +1 -1
  9. package/lib/orchestrate/analyze/orchestrateAnalyzeReview.js +164 -86
  10. package/lib/orchestrate/analyze/orchestrateAnalyzeReview.js.map +1 -1
  11. package/lib/orchestrate/analyze/orchestrateAnalyzeScenario.js +656 -335
  12. package/lib/orchestrate/analyze/orchestrateAnalyzeScenario.js.map +1 -1
  13. package/lib/orchestrate/analyze/orchestrateAnalyzeWrite.js +143 -74
  14. package/lib/orchestrate/analyze/orchestrateAnalyzeWrite.js.map +1 -1
  15. package/lib/orchestrate/analyze/structures/IAutoBeAnalyzeReviewApplication.d.ts +17 -52
  16. package/lib/orchestrate/analyze/structures/IAutoBeAnalyzeScenarioApplication.d.ts +25 -22
  17. package/lib/orchestrate/analyze/structures/IAutoBeAnalyzeWriteApplication.d.ts +7 -23
  18. package/lib/orchestrate/common/orchestrateCommonCorrectCasting.js +165 -2
  19. package/lib/orchestrate/common/orchestrateCommonCorrectCasting.js.map +1 -1
  20. package/lib/orchestrate/facade/createAutoBeFacadeController.js +773 -403
  21. package/lib/orchestrate/facade/createAutoBeFacadeController.js.map +1 -1
  22. package/lib/orchestrate/interface/orchestrateInterfaceAuthorizations.js +749 -2
  23. package/lib/orchestrate/interface/orchestrateInterfaceAuthorizations.js.map +1 -1
  24. package/lib/orchestrate/interface/orchestrateInterfaceComplement.js +1637 -9
  25. package/lib/orchestrate/interface/orchestrateInterfaceComplement.js.map +1 -1
  26. package/lib/orchestrate/interface/orchestrateInterfaceEndpoints.js +252 -133
  27. package/lib/orchestrate/interface/orchestrateInterfaceEndpoints.js.map +1 -1
  28. package/lib/orchestrate/interface/orchestrateInterfaceEndpointsReview.js +258 -135
  29. package/lib/orchestrate/interface/orchestrateInterfaceEndpointsReview.js.map +1 -1
  30. package/lib/orchestrate/interface/orchestrateInterfaceGroups.js +342 -226
  31. package/lib/orchestrate/interface/orchestrateInterfaceGroups.js.map +1 -1
  32. package/lib/orchestrate/interface/orchestrateInterfaceOperations.js +633 -1
  33. package/lib/orchestrate/interface/orchestrateInterfaceOperations.js.map +1 -1
  34. package/lib/orchestrate/interface/orchestrateInterfaceOperationsReview.js +785 -3
  35. package/lib/orchestrate/interface/orchestrateInterfaceOperationsReview.js.map +1 -1
  36. package/lib/orchestrate/interface/orchestrateInterfacePrerequisites.js +206 -3
  37. package/lib/orchestrate/interface/orchestrateInterfacePrerequisites.js.map +1 -1
  38. package/lib/orchestrate/interface/orchestrateInterfaceSchemaRename.js +107 -1
  39. package/lib/orchestrate/interface/orchestrateInterfaceSchemaRename.js.map +1 -1
  40. package/lib/orchestrate/interface/orchestrateInterfaceSchemaReview.js +1676 -9
  41. package/lib/orchestrate/interface/orchestrateInterfaceSchemaReview.js.map +1 -1
  42. package/lib/orchestrate/interface/orchestrateInterfaceSchemas.js +1637 -9
  43. package/lib/orchestrate/interface/orchestrateInterfaceSchemas.js.map +1 -1
  44. package/lib/orchestrate/prisma/orchestratePrismaComponent.js +397 -201
  45. package/lib/orchestrate/prisma/orchestratePrismaComponent.js.map +1 -1
  46. package/lib/orchestrate/prisma/orchestratePrismaCorrect.js +1184 -599
  47. package/lib/orchestrate/prisma/orchestratePrismaCorrect.js.map +1 -1
  48. package/lib/orchestrate/prisma/orchestratePrismaReview.js +1202 -608
  49. package/lib/orchestrate/prisma/orchestratePrismaReview.js.map +1 -1
  50. package/lib/orchestrate/prisma/orchestratePrismaSchemas.js +4 -2
  51. package/lib/orchestrate/prisma/orchestratePrismaSchemas.js.map +1 -1
  52. package/lib/orchestrate/realize/orchestrateRealizeAuthorization.js +369 -185
  53. package/lib/orchestrate/realize/orchestrateRealizeAuthorization.js.map +1 -1
  54. package/lib/orchestrate/realize/orchestrateRealizeAuthorizationCorrect.js +405 -203
  55. package/lib/orchestrate/realize/orchestrateRealizeAuthorizationCorrect.js.map +1 -1
  56. package/lib/orchestrate/realize/orchestrateRealizeCorrect.js +130 -2
  57. package/lib/orchestrate/realize/orchestrateRealizeCorrect.js.map +1 -1
  58. package/lib/orchestrate/realize/orchestrateRealizeCorrectCasting.js +165 -2
  59. package/lib/orchestrate/realize/orchestrateRealizeCorrectCasting.js.map +1 -1
  60. package/lib/orchestrate/realize/orchestrateRealizeWrite.js +130 -2
  61. package/lib/orchestrate/realize/orchestrateRealizeWrite.js.map +1 -1
  62. package/lib/orchestrate/test/histories/transformTestWriteHistories.js.map +1 -1
  63. package/lib/orchestrate/test/orchestrateTestCorrect.js +131 -2
  64. package/lib/orchestrate/test/orchestrateTestCorrect.js.map +1 -1
  65. package/lib/orchestrate/test/orchestrateTestCorrectInvalidRequest.js +166 -2
  66. package/lib/orchestrate/test/orchestrateTestCorrectInvalidRequest.js.map +1 -1
  67. package/lib/orchestrate/test/orchestrateTestScenario.js +257 -3
  68. package/lib/orchestrate/test/orchestrateTestScenario.js.map +1 -1
  69. package/lib/orchestrate/test/orchestrateTestScenarioReview.js +283 -3
  70. package/lib/orchestrate/test/orchestrateTestScenarioReview.js.map +1 -1
  71. package/lib/orchestrate/test/orchestrateTestWrite.js +139 -2
  72. package/lib/orchestrate/test/orchestrateTestWrite.js.map +1 -1
  73. package/package.json +9 -9
  74. package/src/constants/AutoBeSystemPromptConstant.ts +1 -1
  75. package/src/context/assertSchemaModel.ts +5 -8
  76. package/src/orchestrate/analyze/orchestrateAnalyzeReview.ts +7 -9
  77. package/src/orchestrate/analyze/orchestrateAnalyzeScenario.ts +13 -9
  78. package/src/orchestrate/analyze/orchestrateAnalyzeWrite.ts +7 -9
  79. package/src/orchestrate/analyze/structures/IAutoBeAnalyzeReviewApplication.ts +19 -54
  80. package/src/orchestrate/analyze/structures/IAutoBeAnalyzeScenarioApplication.ts +25 -22
  81. package/src/orchestrate/analyze/structures/IAutoBeAnalyzeWriteApplication.ts +8 -24
  82. package/src/orchestrate/common/orchestrateCommonCorrectCasting.ts +15 -1
  83. package/src/orchestrate/facade/createAutoBeFacadeController.ts +7 -6
  84. package/src/orchestrate/interface/orchestrateInterfaceAuthorizations.ts +11 -1
  85. package/src/orchestrate/interface/orchestrateInterfaceComplement.ts +11 -1
  86. package/src/orchestrate/interface/orchestrateInterfaceEndpoints.ts +13 -9
  87. package/src/orchestrate/interface/orchestrateInterfaceEndpointsReview.ts +13 -9
  88. package/src/orchestrate/interface/orchestrateInterfaceGroups.ts +17 -14
  89. package/src/orchestrate/interface/orchestrateInterfaceOperations.ts +11 -1
  90. package/src/orchestrate/interface/orchestrateInterfaceOperationsReview.ts +14 -1
  91. package/src/orchestrate/interface/orchestrateInterfacePrerequisites.ts +11 -1
  92. package/src/orchestrate/interface/orchestrateInterfaceSchemaRename.ts +9 -1
  93. package/src/orchestrate/interface/orchestrateInterfaceSchemaReview.ts +14 -1
  94. package/src/orchestrate/interface/orchestrateInterfaceSchemas.ts +11 -1
  95. package/src/orchestrate/prisma/orchestratePrismaComponent.ts +13 -9
  96. package/src/orchestrate/prisma/orchestratePrismaCorrect.ts +7 -9
  97. package/src/orchestrate/prisma/orchestratePrismaReview.ts +7 -10
  98. package/src/orchestrate/realize/orchestrateRealizeAuthorization.ts +13 -9
  99. package/src/orchestrate/realize/orchestrateRealizeAuthorizationCorrect.ts +13 -9
  100. package/src/orchestrate/realize/orchestrateRealizeCorrect.ts +11 -1
  101. package/src/orchestrate/realize/orchestrateRealizeCorrectCasting.ts +15 -1
  102. package/src/orchestrate/realize/orchestrateRealizeWrite.ts +11 -1
  103. package/src/orchestrate/test/experimental/orchestrateTestWrite.ast +5 -1
  104. package/src/orchestrate/test/histories/transformTestWriteHistories.ts +1 -1
  105. package/src/orchestrate/test/orchestrateTestCorrect.ts +11 -1
  106. package/src/orchestrate/test/orchestrateTestCorrectInvalidRequest.ts +18 -1
  107. package/src/orchestrate/test/orchestrateTestScenario.ts +11 -1
  108. package/src/orchestrate/test/orchestrateTestScenarioReview.ts +11 -1
  109. package/src/orchestrate/test/orchestrateTestWrite.ts +11 -1
@@ -107,7 +107,11 @@ function orchestrateRealizeAuthorizationCorrect(ctx_1, authorization_1, prismaCl
107
107
  }
108
108
  function createController(props) {
109
109
  (0, assertSchemaModel_1.assertSchemaModel)(props.model);
110
- const application = collection[props.model];
110
+ const application = collection[props.model === "chatgpt"
111
+ ? "chatgpt"
112
+ : props.model === "gemini"
113
+ ? "gemini"
114
+ : "claude"];
111
115
  return {
112
116
  protocol: "class",
113
117
  name: "Correct Authorization",
@@ -119,218 +123,414 @@ function createController(props) {
119
123
  },
120
124
  };
121
125
  }
122
- const claude = {
123
- model: "claude",
124
- options: {
125
- reference: true,
126
- separate: null
127
- },
128
- functions: [
129
- {
130
- name: "correctDecorator",
131
- parameters: {
132
- description: " Properties containing error analysis, solution guidance, and corrected components\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationCorrectApplication.IProps}",
133
- type: "object",
134
- properties: {
135
- error_analysis: {
136
- description: "Step 1: TypeScript compilation error analysis and diagnosis.\n\nAI identifies and categorizes all compilation errors (type mismatches,\nimport issues, syntax errors) by component (providers/decorator/payload).\nLists specific error messages with their locations and types for\nsystematic troubleshooting.",
137
- type: "string"
138
- },
139
- solution_guidance: {
140
- description: "Step 2: Solution guidance and fix recommendations.\n\nAI provides clear, actionable instructions on how to resolve each\nidentified error. Includes specific steps like \"add property X to\ninterface Y\", \"update import path from A to B\", or \"change type from C to\nD\". Focus on guidance rather than generating complete code\nimplementations.",
141
- type: "string"
142
- },
143
- provider: {
144
- description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
145
- $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
146
- },
147
- decorator: {
148
- description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
149
- $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
126
+ const collection = {
127
+ chatgpt: {
128
+ model: "chatgpt",
129
+ options: {
130
+ reference: true,
131
+ strict: false,
132
+ separate: null
133
+ },
134
+ functions: [
135
+ {
136
+ name: "correctDecorator",
137
+ parameters: {
138
+ description: " Properties containing error analysis, solution guidance, and corrected components\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationCorrectApplication.IProps}",
139
+ type: "object",
140
+ properties: {
141
+ error_analysis: {
142
+ description: "Step 1: TypeScript compilation error analysis and diagnosis.\n\nAI identifies and categorizes all compilation errors (type mismatches,\nimport issues, syntax errors) by component (providers/decorator/payload).\nLists specific error messages with their locations and types for\nsystematic troubleshooting.",
143
+ type: "string"
144
+ },
145
+ solution_guidance: {
146
+ description: "Step 2: Solution guidance and fix recommendations.\n\nAI provides clear, actionable instructions on how to resolve each\nidentified error. Includes specific steps like \"add property X to\ninterface Y\", \"update import path from A to B\", or \"change type from C to\nD\". Focus on guidance rather than generating complete code\nimplementations.",
147
+ type: "string"
148
+ },
149
+ provider: {
150
+ description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
151
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
152
+ },
153
+ decorator: {
154
+ description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
155
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
156
+ },
157
+ payload: {
158
+ description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
159
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
160
+ }
150
161
  },
151
- payload: {
152
- description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
153
- $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
162
+ required: [
163
+ "error_analysis",
164
+ "solution_guidance",
165
+ "provider",
166
+ "decorator",
167
+ "payload"
168
+ ],
169
+ additionalProperties: false,
170
+ $defs: {
171
+ "IAutoBeRealizeAuthorizationApplication.IProvider": {
172
+ type: "object",
173
+ properties: {
174
+ name: {
175
+ description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.\n\n\n@pattern ^[a-z][a-zA-Z0-9]*$",
176
+ type: "string"
177
+ },
178
+ content: {
179
+ description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
180
+ type: "string"
181
+ }
182
+ },
183
+ required: [
184
+ "name",
185
+ "content"
186
+ ]
187
+ },
188
+ "IAutoBeRealizeAuthorizationApplication.IDecorator": {
189
+ type: "object",
190
+ properties: {
191
+ name: {
192
+ description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
193
+ type: "string"
194
+ },
195
+ content: {
196
+ description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
197
+ type: "string"
198
+ }
199
+ },
200
+ required: [
201
+ "name",
202
+ "content"
203
+ ]
204
+ },
205
+ "IAutoBeRealizeAuthorizationApplication.IPayloadType": {
206
+ type: "object",
207
+ properties: {
208
+ name: {
209
+ description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
210
+ type: "string"
211
+ },
212
+ content: {
213
+ description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
214
+ type: "string"
215
+ }
216
+ },
217
+ required: [
218
+ "name",
219
+ "content"
220
+ ]
221
+ }
154
222
  }
155
223
  },
156
- required: [
157
- "error_analysis",
158
- "solution_guidance",
159
- "provider",
160
- "decorator",
161
- "payload"
162
- ],
163
- additionalProperties: false,
164
- $defs: {
165
- "IAutoBeRealizeAuthorizationApplication.IProvider": {
166
- type: "object",
167
- properties: {
168
- name: {
169
- description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.",
170
- type: "string",
171
- pattern: "^[a-z][a-zA-Z0-9]*$"
172
- },
173
- content: {
174
- description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
175
- type: "string"
176
- }
224
+ description: "Corrects TypeScript compilation errors in authentication components.\n\nThis method analyzes and fixes compilation errors in previously generated\nauthentication provider, decorator, and payload type implementations. It\nperforms systematic error diagnosis and generates corrected versions of\nall three components while maintaining their interconnected functionality.\n\nThe correction process includes:\n- TypeScript error analysis and categorization by component\n- Identification of type mismatches, import issues, and syntax errors\n- Clear solution guidance for each identified problem\n- Regeneration of all components with fixes applied\n\nThe corrected components maintain the same naming conventions and\narchitectural patterns as the original generation while resolving all\ncompilation issues.",
225
+ validate: (() => { const _io0 = input => "string" === typeof input.error_analysis && "string" === typeof input.solution_guidance && ("object" === typeof input.provider && null !== input.provider && _io1(input.provider)) && ("object" === typeof input.decorator && null !== input.decorator && _io2(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io3(input.payload)); const _io1 = input => "string" === typeof input.name && RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io2 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io3 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _vo0 = (input, _path, _exceptionable = true) => ["string" === typeof input.error_analysis || _report(_exceptionable, {
226
+ path: _path + ".error_analysis",
227
+ expected: "string",
228
+ value: input.error_analysis
229
+ }), "string" === typeof input.solution_guidance || _report(_exceptionable, {
230
+ path: _path + ".solution_guidance",
231
+ expected: "string",
232
+ value: input.solution_guidance
233
+ }), ("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
234
+ path: _path + ".provider",
235
+ expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
236
+ value: input.provider
237
+ })) && _vo1(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
238
+ path: _path + ".provider",
239
+ expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
240
+ value: input.provider
241
+ }), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
242
+ path: _path + ".decorator",
243
+ expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
244
+ value: input.decorator
245
+ })) && _vo2(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
246
+ path: _path + ".decorator",
247
+ expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
248
+ value: input.decorator
249
+ }), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
250
+ path: _path + ".payload",
251
+ expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
252
+ value: input.payload
253
+ })) && _vo3(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
254
+ path: _path + ".payload",
255
+ expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
256
+ value: input.payload
257
+ })].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
258
+ path: _path + ".name",
259
+ expected: "string & CamelCasePattern",
260
+ value: input.name
261
+ })) || _report(_exceptionable, {
262
+ path: _path + ".name",
263
+ expected: "(string & CamelCasePattern)",
264
+ value: input.name
265
+ }), "string" === typeof input.content || _report(_exceptionable, {
266
+ path: _path + ".content",
267
+ expected: "string",
268
+ value: input.content
269
+ })].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
270
+ path: _path + ".name",
271
+ expected: "string & PascalCasePattern",
272
+ value: input.name
273
+ })) || _report(_exceptionable, {
274
+ path: _path + ".name",
275
+ expected: "(string & PascalCasePattern)",
276
+ value: input.name
277
+ }), "string" === typeof input.content || _report(_exceptionable, {
278
+ path: _path + ".content",
279
+ expected: "string",
280
+ value: input.content
281
+ })].every(flag => flag); const _vo3 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
282
+ path: _path + ".name",
283
+ expected: "string & PascalCasePattern",
284
+ value: input.name
285
+ })) || _report(_exceptionable, {
286
+ path: _path + ".name",
287
+ expected: "(string & PascalCasePattern)",
288
+ value: input.name
289
+ }), "string" === typeof input.content || _report(_exceptionable, {
290
+ path: _path + ".content",
291
+ expected: "string",
292
+ value: input.content
293
+ })].every(flag => flag); const __is = input => "object" === typeof input && null !== input && _io0(input); let errors; let _report; return input => {
294
+ if (false === __is(input)) {
295
+ errors = [];
296
+ _report = __typia_transform__validateReport._validateReport(errors);
297
+ ((input, _path, _exceptionable = true) => ("object" === typeof input && null !== input || _report(true, {
298
+ path: _path + "",
299
+ expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
300
+ value: input
301
+ })) && _vo0(input, _path + "", true) || _report(true, {
302
+ path: _path + "",
303
+ expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
304
+ value: input
305
+ }))(input, "$input", true);
306
+ const success = 0 === errors.length;
307
+ return success ? {
308
+ success,
309
+ data: input
310
+ } : {
311
+ success,
312
+ errors,
313
+ data: input
314
+ };
315
+ }
316
+ return {
317
+ success: true,
318
+ data: input
319
+ };
320
+ }; })()
321
+ }
322
+ ]
323
+ },
324
+ claude: {
325
+ model: "claude",
326
+ options: {
327
+ reference: true,
328
+ separate: null
329
+ },
330
+ functions: [
331
+ {
332
+ name: "correctDecorator",
333
+ parameters: {
334
+ description: " Properties containing error analysis, solution guidance, and corrected components\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationCorrectApplication.IProps}",
335
+ type: "object",
336
+ properties: {
337
+ error_analysis: {
338
+ description: "Step 1: TypeScript compilation error analysis and diagnosis.\n\nAI identifies and categorizes all compilation errors (type mismatches,\nimport issues, syntax errors) by component (providers/decorator/payload).\nLists specific error messages with their locations and types for\nsystematic troubleshooting.",
339
+ type: "string"
340
+ },
341
+ solution_guidance: {
342
+ description: "Step 2: Solution guidance and fix recommendations.\n\nAI provides clear, actionable instructions on how to resolve each\nidentified error. Includes specific steps like \"add property X to\ninterface Y\", \"update import path from A to B\", or \"change type from C to\nD\". Focus on guidance rather than generating complete code\nimplementations.",
343
+ type: "string"
344
+ },
345
+ provider: {
346
+ description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
347
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
177
348
  },
178
- required: [
179
- "name",
180
- "content"
181
- ]
349
+ decorator: {
350
+ description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
351
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
352
+ },
353
+ payload: {
354
+ description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
355
+ $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
356
+ }
182
357
  },
183
- "IAutoBeRealizeAuthorizationApplication.IDecorator": {
184
- type: "object",
185
- properties: {
186
- name: {
187
- description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.",
188
- type: "string",
189
- pattern: "^[A-Z][a-zA-Z0-9]*$"
358
+ required: [
359
+ "error_analysis",
360
+ "solution_guidance",
361
+ "provider",
362
+ "decorator",
363
+ "payload"
364
+ ],
365
+ additionalProperties: false,
366
+ $defs: {
367
+ "IAutoBeRealizeAuthorizationApplication.IProvider": {
368
+ type: "object",
369
+ properties: {
370
+ name: {
371
+ description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.",
372
+ type: "string",
373
+ pattern: "^[a-z][a-zA-Z0-9]*$"
374
+ },
375
+ content: {
376
+ description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
377
+ type: "string"
378
+ }
190
379
  },
191
- content: {
192
- description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
193
- type: "string"
194
- }
380
+ required: [
381
+ "name",
382
+ "content"
383
+ ]
195
384
  },
196
- required: [
197
- "name",
198
- "content"
199
- ]
200
- },
201
- "IAutoBeRealizeAuthorizationApplication.IPayloadType": {
202
- type: "object",
203
- properties: {
204
- name: {
205
- description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.",
206
- type: "string",
207
- pattern: "^[A-Z][a-zA-Z0-9]*$"
385
+ "IAutoBeRealizeAuthorizationApplication.IDecorator": {
386
+ type: "object",
387
+ properties: {
388
+ name: {
389
+ description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.",
390
+ type: "string",
391
+ pattern: "^[A-Z][a-zA-Z0-9]*$"
392
+ },
393
+ content: {
394
+ description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
395
+ type: "string"
396
+ }
208
397
  },
209
- content: {
210
- description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
211
- type: "string"
212
- }
398
+ required: [
399
+ "name",
400
+ "content"
401
+ ]
213
402
  },
214
- required: [
215
- "name",
216
- "content"
217
- ]
403
+ "IAutoBeRealizeAuthorizationApplication.IPayloadType": {
404
+ type: "object",
405
+ properties: {
406
+ name: {
407
+ description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.",
408
+ type: "string",
409
+ pattern: "^[A-Z][a-zA-Z0-9]*$"
410
+ },
411
+ content: {
412
+ description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
413
+ type: "string"
414
+ }
415
+ },
416
+ required: [
417
+ "name",
418
+ "content"
419
+ ]
420
+ }
218
421
  }
219
- }
220
- },
221
- description: "Corrects TypeScript compilation errors in authentication components.\n\nThis method analyzes and fixes compilation errors in previously generated\nauthentication provider, decorator, and payload type implementations. It\nperforms systematic error diagnosis and generates corrected versions of\nall three components while maintaining their interconnected functionality.\n\nThe correction process includes:\n- TypeScript error analysis and categorization by component\n- Identification of type mismatches, import issues, and syntax errors\n- Clear solution guidance for each identified problem\n- Regeneration of all components with fixes applied\n\nThe corrected components maintain the same naming conventions and\narchitectural patterns as the original generation while resolving all\ncompilation issues.",
222
- validate: (() => { const _io0 = input => "string" === typeof input.error_analysis && "string" === typeof input.solution_guidance && ("object" === typeof input.provider && null !== input.provider && _io1(input.provider)) && ("object" === typeof input.decorator && null !== input.decorator && _io2(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io3(input.payload)); const _io1 = input => "string" === typeof input.name && RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io2 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io3 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _vo0 = (input, _path, _exceptionable = true) => ["string" === typeof input.error_analysis || _report(_exceptionable, {
223
- path: _path + ".error_analysis",
224
- expected: "string",
225
- value: input.error_analysis
226
- }), "string" === typeof input.solution_guidance || _report(_exceptionable, {
227
- path: _path + ".solution_guidance",
228
- expected: "string",
229
- value: input.solution_guidance
230
- }), ("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
231
- path: _path + ".provider",
232
- expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
233
- value: input.provider
234
- })) && _vo1(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
235
- path: _path + ".provider",
236
- expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
237
- value: input.provider
238
- }), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
239
- path: _path + ".decorator",
240
- expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
241
- value: input.decorator
242
- })) && _vo2(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
243
- path: _path + ".decorator",
244
- expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
245
- value: input.decorator
246
- }), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
247
- path: _path + ".payload",
248
- expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
249
- value: input.payload
250
- })) && _vo3(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
251
- path: _path + ".payload",
252
- expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
253
- value: input.payload
254
- })].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
255
- path: _path + ".name",
256
- expected: "string & CamelCasePattern",
257
- value: input.name
258
- })) || _report(_exceptionable, {
259
- path: _path + ".name",
260
- expected: "(string & CamelCasePattern)",
261
- value: input.name
262
- }), "string" === typeof input.content || _report(_exceptionable, {
263
- path: _path + ".content",
264
- expected: "string",
265
- value: input.content
266
- })].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
267
- path: _path + ".name",
268
- expected: "string & PascalCasePattern",
269
- value: input.name
270
- })) || _report(_exceptionable, {
271
- path: _path + ".name",
272
- expected: "(string & PascalCasePattern)",
273
- value: input.name
274
- }), "string" === typeof input.content || _report(_exceptionable, {
275
- path: _path + ".content",
276
- expected: "string",
277
- value: input.content
278
- })].every(flag => flag); const _vo3 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
279
- path: _path + ".name",
280
- expected: "string & PascalCasePattern",
281
- value: input.name
282
- })) || _report(_exceptionable, {
283
- path: _path + ".name",
284
- expected: "(string & PascalCasePattern)",
285
- value: input.name
286
- }), "string" === typeof input.content || _report(_exceptionable, {
287
- path: _path + ".content",
288
- expected: "string",
289
- value: input.content
290
- })].every(flag => flag); const __is = input => "object" === typeof input && null !== input && _io0(input); let errors; let _report; return input => {
291
- if (false === __is(input)) {
292
- errors = [];
293
- _report = __typia_transform__validateReport._validateReport(errors);
294
- ((input, _path, _exceptionable = true) => ("object" === typeof input && null !== input || _report(true, {
295
- path: _path + "",
296
- expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
297
- value: input
298
- })) && _vo0(input, _path + "", true) || _report(true, {
299
- path: _path + "",
300
- expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
301
- value: input
302
- }))(input, "$input", true);
303
- const success = 0 === errors.length;
304
- return success ? {
305
- success,
306
- data: input
307
- } : {
308
- success,
309
- errors,
422
+ },
423
+ description: "Corrects TypeScript compilation errors in authentication components.\n\nThis method analyzes and fixes compilation errors in previously generated\nauthentication provider, decorator, and payload type implementations. It\nperforms systematic error diagnosis and generates corrected versions of\nall three components while maintaining their interconnected functionality.\n\nThe correction process includes:\n- TypeScript error analysis and categorization by component\n- Identification of type mismatches, import issues, and syntax errors\n- Clear solution guidance for each identified problem\n- Regeneration of all components with fixes applied\n\nThe corrected components maintain the same naming conventions and\narchitectural patterns as the original generation while resolving all\ncompilation issues.",
424
+ validate: (() => { const _io0 = input => "string" === typeof input.error_analysis && "string" === typeof input.solution_guidance && ("object" === typeof input.provider && null !== input.provider && _io1(input.provider)) && ("object" === typeof input.decorator && null !== input.decorator && _io2(input.decorator)) && ("object" === typeof input.payload && null !== input.payload && _io3(input.payload)); const _io1 = input => "string" === typeof input.name && RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io2 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _io3 = input => "string" === typeof input.name && RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) && "string" === typeof input.content; const _vo0 = (input, _path, _exceptionable = true) => ["string" === typeof input.error_analysis || _report(_exceptionable, {
425
+ path: _path + ".error_analysis",
426
+ expected: "string",
427
+ value: input.error_analysis
428
+ }), "string" === typeof input.solution_guidance || _report(_exceptionable, {
429
+ path: _path + ".solution_guidance",
430
+ expected: "string",
431
+ value: input.solution_guidance
432
+ }), ("object" === typeof input.provider && null !== input.provider || _report(_exceptionable, {
433
+ path: _path + ".provider",
434
+ expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
435
+ value: input.provider
436
+ })) && _vo1(input.provider, _path + ".provider", true && _exceptionable) || _report(_exceptionable, {
437
+ path: _path + ".provider",
438
+ expected: "IAutoBeRealizeAuthorizationApplication.IProvider",
439
+ value: input.provider
440
+ }), ("object" === typeof input.decorator && null !== input.decorator || _report(_exceptionable, {
441
+ path: _path + ".decorator",
442
+ expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
443
+ value: input.decorator
444
+ })) && _vo2(input.decorator, _path + ".decorator", true && _exceptionable) || _report(_exceptionable, {
445
+ path: _path + ".decorator",
446
+ expected: "IAutoBeRealizeAuthorizationApplication.IDecorator",
447
+ value: input.decorator
448
+ }), ("object" === typeof input.payload && null !== input.payload || _report(_exceptionable, {
449
+ path: _path + ".payload",
450
+ expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
451
+ value: input.payload
452
+ })) && _vo3(input.payload, _path + ".payload", true && _exceptionable) || _report(_exceptionable, {
453
+ path: _path + ".payload",
454
+ expected: "IAutoBeRealizeAuthorizationApplication.IPayloadType",
455
+ value: input.payload
456
+ })].every(flag => flag); const _vo1 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[a-z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
457
+ path: _path + ".name",
458
+ expected: "string & CamelCasePattern",
459
+ value: input.name
460
+ })) || _report(_exceptionable, {
461
+ path: _path + ".name",
462
+ expected: "(string & CamelCasePattern)",
463
+ value: input.name
464
+ }), "string" === typeof input.content || _report(_exceptionable, {
465
+ path: _path + ".content",
466
+ expected: "string",
467
+ value: input.content
468
+ })].every(flag => flag); const _vo2 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
469
+ path: _path + ".name",
470
+ expected: "string & PascalCasePattern",
471
+ value: input.name
472
+ })) || _report(_exceptionable, {
473
+ path: _path + ".name",
474
+ expected: "(string & PascalCasePattern)",
475
+ value: input.name
476
+ }), "string" === typeof input.content || _report(_exceptionable, {
477
+ path: _path + ".content",
478
+ expected: "string",
479
+ value: input.content
480
+ })].every(flag => flag); const _vo3 = (input, _path, _exceptionable = true) => ["string" === typeof input.name && (RegExp("^[A-Z][a-zA-Z0-9]*$").test(input.name) || _report(_exceptionable, {
481
+ path: _path + ".name",
482
+ expected: "string & PascalCasePattern",
483
+ value: input.name
484
+ })) || _report(_exceptionable, {
485
+ path: _path + ".name",
486
+ expected: "(string & PascalCasePattern)",
487
+ value: input.name
488
+ }), "string" === typeof input.content || _report(_exceptionable, {
489
+ path: _path + ".content",
490
+ expected: "string",
491
+ value: input.content
492
+ })].every(flag => flag); const __is = input => "object" === typeof input && null !== input && _io0(input); let errors; let _report; return input => {
493
+ if (false === __is(input)) {
494
+ errors = [];
495
+ _report = __typia_transform__validateReport._validateReport(errors);
496
+ ((input, _path, _exceptionable = true) => ("object" === typeof input && null !== input || _report(true, {
497
+ path: _path + "",
498
+ expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
499
+ value: input
500
+ })) && _vo0(input, _path + "", true) || _report(true, {
501
+ path: _path + "",
502
+ expected: "IAutoBeRealizeAuthorizationCorrectApplication.IProps",
503
+ value: input
504
+ }))(input, "$input", true);
505
+ const success = 0 === errors.length;
506
+ return success ? {
507
+ success,
508
+ data: input
509
+ } : {
510
+ success,
511
+ errors,
512
+ data: input
513
+ };
514
+ }
515
+ return {
516
+ success: true,
310
517
  data: input
311
518
  };
312
- }
313
- return {
314
- success: true,
315
- data: input
316
- };
317
- }; })()
318
- }
319
- ]
320
- };
321
- const collection = {
322
- chatgpt: {
323
- model: "chatgpt",
519
+ }; })()
520
+ }
521
+ ]
522
+ },
523
+ gemini: {
524
+ model: "gemini",
324
525
  options: {
325
526
  reference: true,
326
- strict: false,
327
527
  separate: null
328
528
  },
329
529
  functions: [
330
530
  {
331
531
  name: "correctDecorator",
332
532
  parameters: {
333
- description: " Properties containing error analysis, solution guidance, and corrected components\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationCorrectApplication.IProps}\n\n### Description of {@link provider} property:\n\n> Authentication Provider function configuration containing the function\n> name and implementation code. The Provider handles JWT token\n> verification, role validation, and database queries to authenticate\n> users.\n\n### Description of {@link decorator} property:\n\n> Authentication Decorator configuration containing the decorator name and\n> implementation code. The Decorator integrates with NestJS parameter\n> decorators to automatically inject authenticated user data into\n> Controller methods.\n\n### Description of {@link payload} property:\n\n> Authentication Payload Type configuration containing the payload type\n> name and implementation code. The Payload Type is used to define the\n> structure of the authenticated user data that will be injected into\n> Controller methods when using the decorator. It serves as the TypeScript\n> type for the parameter in Controller method signatures.",
533
+ description: " Properties containing error analysis, solution guidance, and corrected components\n\n------------------------------\n\nCurrent Type: {@link IAutoBeRealizeAuthorizationCorrectApplication.IProps}",
334
534
  type: "object",
335
535
  properties: {
336
536
  error_analysis: {
@@ -342,12 +542,15 @@ const collection = {
342
542
  type: "string"
343
543
  },
344
544
  provider: {
545
+ description: "Authentication Provider function configuration containing the function\nname and implementation code. The Provider handles JWT token\nverification, role validation, and database queries to authenticate\nusers.",
345
546
  $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IProvider"
346
547
  },
347
548
  decorator: {
549
+ description: "Authentication Decorator configuration containing the decorator name and\nimplementation code. The Decorator integrates with NestJS parameter\ndecorators to automatically inject authenticated user data into\nController methods.",
348
550
  $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IDecorator"
349
551
  },
350
552
  payload: {
553
+ description: "Authentication Payload Type configuration containing the payload type\nname and implementation code. The Payload Type is used to define the\nstructure of the authenticated user data that will be injected into\nController methods when using the decorator. It serves as the TypeScript\ntype for the parameter in Controller method signatures.",
351
554
  $ref: "#/$defs/IAutoBeRealizeAuthorizationApplication.IPayloadType"
352
555
  }
353
556
  },
@@ -364,8 +567,9 @@ const collection = {
364
567
  type: "object",
365
568
  properties: {
366
569
  name: {
367
- description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.\n\n\n@pattern ^[a-z][a-zA-Z0-9]*$",
368
- type: "string"
570
+ description: "The name of the authentication Provider function in {role}Authorize\nformat (e.g., adminAuthorize, userAuthorize). This function will be\ncalled by the decorator to verify JWT tokens and return authenticated\nuser information for the specified role.\n\nDO: Use camelCase naming convention.",
571
+ type: "string",
572
+ pattern: "^[a-z][a-zA-Z0-9]*$"
369
573
  },
370
574
  content: {
371
575
  description: "Complete TypeScript code for the authentication Provider function. Must\ninclude: JWT token verification using jwtAuthorize function, role type\nchecking against payload.type, database query using\nMyGlobal.prisma.{tableName} pattern to verify user existence, and proper\nerror handling with ForbiddenException and UnauthorizedException. The\nfunction should return the authenticated user payload data.",
@@ -381,8 +585,9 @@ const collection = {
381
585
  type: "object",
382
586
  properties: {
383
587
  name: {
384
- description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
385
- type: "string"
588
+ description: "The name of the Decorator to be generated in {Actor}Auth format (e.g.,\nAdminAuth, UserAuth). This decorator will be used as a parameter\ndecorator in Controller methods to automatically authenticate and\nauthorize users for the specific role, injecting the authenticated user\npayload as a method parameter.\n\nDO: Use PascalCase naming convention.",
589
+ type: "string",
590
+ pattern: "^[A-Z][a-zA-Z0-9]*$"
386
591
  },
387
592
  content: {
388
593
  description: "Complete TypeScript code for the authentication Decorator implementation.\nMust include: SwaggerCustomizer integration to add bearer token security\nschema to API documentation, createParamDecorator implementation that\ncalls the corresponding Provider function for authentication, Singleton\npattern using tstl library for efficient decorator instance management,\nand proper TypeScript typing for the ParameterDecorator interface.",
@@ -398,8 +603,9 @@ const collection = {
398
603
  type: "object",
399
604
  properties: {
400
605
  name: {
401
- description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.\n\n\n@pattern ^[A-Z][a-zA-Z0-9]*$",
402
- type: "string"
606
+ description: "The name of the Payload type to be generated in {Actor}Payload format\n(e.g., AdminPayload, UserPayload). This type defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator.\n\nDO: Use PascalCase naming convention.",
607
+ type: "string",
608
+ pattern: "^[A-Z][a-zA-Z0-9]*$"
403
609
  },
404
610
  content: {
405
611
  description: "Complete TypeScript code for the Payload type interface in {Actor}Payload\nformat (e.g., AdminPayload, UserPayload). Must include: id field with\nUUID format validation, type field as role discriminator, and proper\ntypia tags for validation. This interface defines the structure of the\nauthenticated user data that will be injected into Controller methods\nwhen using the decorator and serves as the TypeScript type for the\nparameter in Controller method signatures.",
@@ -513,9 +719,5 @@ const collection = {
513
719
  }
514
720
  ]
515
721
  },
516
- claude,
517
- llama: claude,
518
- deepseek: claude,
519
- "3.1": claude,
520
722
  };
521
723
  //# sourceMappingURL=orchestrateRealizeAuthorizationCorrect.js.map