@better-openclaw/core 1.0.25 → 1.0.26

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (89) hide show
  1. package/dist/addon-stack.cjs +55 -3
  2. package/dist/addon-stack.cjs.map +1 -1
  3. package/dist/addon-stack.d.cts.map +1 -1
  4. package/dist/addon-stack.d.mts.map +1 -1
  5. package/dist/addon-stack.mjs +54 -2
  6. package/dist/addon-stack.mjs.map +1 -1
  7. package/dist/addon-stack.test.cjs +113 -1
  8. package/dist/addon-stack.test.cjs.map +1 -1
  9. package/dist/addon-stack.test.mjs +112 -0
  10. package/dist/addon-stack.test.mjs.map +1 -1
  11. package/dist/compose-validation.test.cjs +1 -1
  12. package/dist/composer.cjs +1 -1
  13. package/dist/composer.test.cjs +1 -1
  14. package/dist/deployers/strip-host-ports.cjs +1 -1
  15. package/dist/generate.cjs +1 -1
  16. package/dist/generate.test.cjs +1 -1
  17. package/dist/generators/env.cjs +1 -1
  18. package/dist/generators/postgres-init.cjs +5 -0
  19. package/dist/generators/postgres-init.cjs.map +1 -1
  20. package/dist/generators/postgres-init.d.cts.map +1 -1
  21. package/dist/generators/postgres-init.d.mts.map +1 -1
  22. package/dist/generators/postgres-init.mjs +5 -0
  23. package/dist/generators/postgres-init.mjs.map +1 -1
  24. package/dist/generators/skills.cjs +1 -1
  25. package/dist/generators/skills.d.cts.map +1 -1
  26. package/dist/generators/skills.d.mts.map +1 -1
  27. package/dist/generators/skills.mjs +141 -0
  28. package/dist/generators/skills.mjs.map +1 -1
  29. package/dist/index.cjs +1 -1
  30. package/dist/index.d.cts +1 -1
  31. package/dist/index.d.mts +1 -1
  32. package/dist/presets/presets.test.cjs +1 -1
  33. package/dist/{schema-CKBRu-Rt.d.cts → schema-BQnZrcw8.d.cts} +6 -1
  34. package/dist/{schema-CKBRu-Rt.d.cts.map → schema-BQnZrcw8.d.cts.map} +1 -1
  35. package/dist/{schema-Dn-_Jpb6.d.mts → schema-SBpL0bdI.d.mts} +6 -1
  36. package/dist/{schema-Dn-_Jpb6.d.mts.map → schema-SBpL0bdI.d.mts.map} +1 -1
  37. package/dist/schema.cjs +11 -2
  38. package/dist/schema.cjs.map +1 -1
  39. package/dist/schema.d.cts +1 -1
  40. package/dist/schema.d.mts +1 -1
  41. package/dist/schema.mjs +10 -1
  42. package/dist/schema.mjs.map +1 -1
  43. package/dist/services/definitions/burnlink.cjs +142 -0
  44. package/dist/services/definitions/burnlink.cjs.map +1 -0
  45. package/dist/services/definitions/burnlink.d.cts +7 -0
  46. package/dist/services/definitions/burnlink.d.cts.map +1 -0
  47. package/dist/services/definitions/burnlink.d.mts +7 -0
  48. package/dist/services/definitions/burnlink.d.mts.map +1 -0
  49. package/dist/services/definitions/burnlink.mjs +141 -0
  50. package/dist/services/definitions/burnlink.mjs.map +1 -0
  51. package/dist/services/definitions/hindsight.cjs +130 -0
  52. package/dist/services/definitions/hindsight.cjs.map +1 -0
  53. package/dist/services/definitions/hindsight.d.cts +7 -0
  54. package/dist/services/definitions/hindsight.d.cts.map +1 -0
  55. package/dist/services/definitions/hindsight.d.mts +7 -0
  56. package/dist/services/definitions/hindsight.d.mts.map +1 -0
  57. package/dist/services/definitions/hindsight.mjs +129 -0
  58. package/dist/services/definitions/hindsight.mjs.map +1 -0
  59. package/dist/services/definitions/index.cjs +9 -0
  60. package/dist/services/definitions/index.cjs.map +1 -1
  61. package/dist/services/definitions/index.d.cts +4 -1
  62. package/dist/services/definitions/index.d.cts.map +1 -1
  63. package/dist/services/definitions/index.d.mts +4 -1
  64. package/dist/services/definitions/index.d.mts.map +1 -1
  65. package/dist/services/definitions/index.mjs +7 -1
  66. package/dist/services/definitions/index.mjs.map +1 -1
  67. package/dist/services/definitions/opensandbox.cjs +149 -0
  68. package/dist/services/definitions/opensandbox.cjs.map +1 -0
  69. package/dist/services/definitions/opensandbox.d.cts +7 -0
  70. package/dist/services/definitions/opensandbox.d.cts.map +1 -0
  71. package/dist/services/definitions/opensandbox.d.mts +7 -0
  72. package/dist/services/definitions/opensandbox.d.mts.map +1 -0
  73. package/dist/services/definitions/opensandbox.mjs +148 -0
  74. package/dist/services/definitions/opensandbox.mjs.map +1 -0
  75. package/dist/{skills-BlzpHmpH.cjs → skills-BSF7iNa4.cjs} +142 -1
  76. package/dist/{skills-BlzpHmpH.cjs.map → skills-BSF7iNa4.cjs.map} +1 -1
  77. package/dist/types.d.cts +1 -1
  78. package/dist/types.d.mts +1 -1
  79. package/dist/validator.cjs +1 -1
  80. package/package.json +1 -1
  81. package/src/addon-stack.test.ts +158 -0
  82. package/src/addon-stack.ts +48 -0
  83. package/src/generators/postgres-init.ts +2 -0
  84. package/src/generators/skills.ts +142 -0
  85. package/src/schema.ts +7 -0
  86. package/src/services/definitions/burnlink.ts +142 -0
  87. package/src/services/definitions/hindsight.ts +131 -0
  88. package/src/services/definitions/index.ts +10 -0
  89. package/src/services/definitions/opensandbox.ts +156 -0
@@ -213,6 +213,118 @@ describe("generateAddonStack", () => {
213
213
  globalExpect(result.metadata.skippedServices.some((s) => s.serviceId === "ollama" && s.reason === "gpu_required")).toBe(false);
214
214
  globalExpect(result.metadata.resolvedServices).toContain("ollama");
215
215
  });
216
+ it("generates valid compose YAML for opensandbox", () => {
217
+ const result = generateAddonStack({
218
+ instanceId: "test-instance",
219
+ services: ["opensandbox"]
220
+ });
221
+ globalExpect(result.metadata.resolvedServices).toContain("opensandbox");
222
+ const composed = parse(result.composeOverride);
223
+ globalExpect(composed.services).toHaveProperty("opensandbox");
224
+ const volumes = composed.services.opensandbox.volumes;
225
+ globalExpect(volumes.some((v) => v.includes("/var/run/docker.sock"))).toBe(true);
226
+ globalExpect(volumes.some((v) => v.includes("sandbox.toml"))).toBe(true);
227
+ });
228
+ it("generates OPEN_SANDBOX_API_KEY with min 32 bytes via env quirk", () => {
229
+ const match = generateAddonStack({
230
+ instanceId: "test-instance",
231
+ services: ["opensandbox"],
232
+ generateSecrets: true
233
+ }).envFile.match(/OPEN_SANDBOX_API_KEY=([^\n]+)/);
234
+ globalExpect(match).not.toBeNull();
235
+ globalExpect(match[1].length).toBeGreaterThanOrEqual(43);
236
+ });
237
+ it("generates code-sandbox skill file and config patch", () => {
238
+ const result = generateAddonStack({
239
+ instanceId: "test-instance",
240
+ services: ["opensandbox"]
241
+ });
242
+ globalExpect(result.openclawConfigPatch.skills.entries).toHaveProperty("code-sandbox");
243
+ globalExpect(result.openclawConfigPatch.skills.entries["code-sandbox"].enabled).toBe(true);
244
+ const skillFile = Object.values(result.skillFiles).find((content) => content.includes("code-sandbox"));
245
+ globalExpect(skillFile).toBeDefined();
246
+ globalExpect(skillFile).toContain("execute_code");
247
+ globalExpect(skillFile).toContain("create_desktop");
248
+ globalExpect(skillFile).toContain("get_preview_url");
249
+ });
250
+ it("generates proxy route for opensandbox at /sandbox", () => {
251
+ const route = generateAddonStack({
252
+ instanceId: "test-instance",
253
+ services: ["opensandbox"]
254
+ }).proxyRoutes.find((r) => r.serviceId === "opensandbox");
255
+ globalExpect(route).toBeDefined();
256
+ globalExpect(route.path).toBe("/sandbox");
257
+ globalExpect(route.port).toBe(8080);
258
+ });
259
+ it("generates sandbox.toml in additionalFiles", () => {
260
+ const result = generateAddonStack({
261
+ instanceId: "test-instance",
262
+ services: ["opensandbox"]
263
+ });
264
+ globalExpect(result.additionalFiles).toHaveProperty("sandbox.toml");
265
+ const toml = result.additionalFiles["sandbox.toml"];
266
+ globalExpect(toml).toContain("[server]");
267
+ globalExpect(toml).toContain("api_key = \"${OPEN_SANDBOX_API_KEY}\"");
268
+ globalExpect(toml).toContain("[runtime]");
269
+ globalExpect(toml).toContain("[docker]");
270
+ globalExpect(toml).toContain("[secure_runtime]");
271
+ globalExpect(toml).toContain("type = \"gvisor\"");
272
+ });
273
+ it("populates prePullImages with 8 images across 3 priority tiers", () => {
274
+ const images = generateAddonStack({
275
+ instanceId: "test-instance",
276
+ services: ["opensandbox"]
277
+ }).metadata.prePullImages;
278
+ globalExpect(images.length).toBe(8);
279
+ const p1 = images.filter((i) => i.priority === 1);
280
+ globalExpect(p1.length).toBe(4);
281
+ globalExpect(p1.map((i) => i.image)).toContain("opensandbox/server:v1.0.6");
282
+ globalExpect(p1.map((i) => i.image)).toContain("opensandbox/execd:v1.0.6");
283
+ globalExpect(p1.map((i) => i.image)).toContain("opensandbox/desktop:latest");
284
+ globalExpect(p1.map((i) => i.image)).toContain("opensandbox/chrome:latest");
285
+ const p2 = images.filter((i) => i.priority === 2);
286
+ globalExpect(p2.length).toBe(2);
287
+ globalExpect(p2.map((i) => i.image)).toContain("opensandbox/code-interpreter:python");
288
+ globalExpect(p2.map((i) => i.image)).toContain("opensandbox/code-interpreter:node");
289
+ const p3 = images.filter((i) => i.priority === 3);
290
+ globalExpect(p3.length).toBe(2);
291
+ globalExpect(p3.map((i) => i.image)).toContain("opensandbox/code-interpreter:latest");
292
+ globalExpect(p3.map((i) => i.image)).toContain("opensandbox/vscode:latest");
293
+ });
294
+ it("resolves port conflict between opensandbox and searxng (both 8080)", () => {
295
+ const result = generateAddonStack({
296
+ instanceId: "test-instance",
297
+ services: ["opensandbox", "searxng"]
298
+ });
299
+ globalExpect(result.metadata.resolvedServices).toContain("opensandbox");
300
+ globalExpect(result.metadata.resolvedServices).toContain("searxng");
301
+ const assignments = result.metadata.portAssignments;
302
+ const opensandboxPort = assignments["opensandbox:8080"];
303
+ const searxngPort = assignments["searxng:8080"];
304
+ globalExpect(opensandboxPort).toBeDefined();
305
+ globalExpect(searxngPort).toBeDefined();
306
+ globalExpect(opensandboxPort).not.toBe(searxngPort);
307
+ });
308
+ it("does not include opensandbox in prePullImages when not selected", () => {
309
+ const result = generateAddonStack({
310
+ instanceId: "test-instance",
311
+ services: ["qdrant"]
312
+ });
313
+ globalExpect(result.metadata.prePullImages.length).toBe(0);
314
+ globalExpect(result.additionalFiles).not.toHaveProperty("sandbox.toml");
315
+ });
316
+ it("opensandbox does not require postgresql (no postgres-setup)", () => {
317
+ globalExpect(parse(generateAddonStack({
318
+ instanceId: "test-instance",
319
+ services: ["opensandbox"]
320
+ }).composeOverride).services).not.toHaveProperty("postgres-setup");
321
+ });
322
+ it("accounts for 768MB memory in estimatedMemoryMB", () => {
323
+ globalExpect(generateAddonStack({
324
+ instanceId: "test-instance",
325
+ services: ["opensandbox"]
326
+ }).metadata.estimatedMemoryMB).toBeGreaterThanOrEqual(768);
327
+ });
216
328
  });
217
329
  describe("updateAddonStack", () => {
218
330
  it("adds a service to an existing stack", () => {
@@ -1 +1 @@
1
- {"version":3,"file":"addon-stack.test.mjs","names":["expect"],"sources":["../src/addon-stack.test.ts"],"sourcesContent":["import { parse } from \"yaml\";\nimport { describe, expect, it } from \"vitest\";\nimport { generateAddonStack, updateAddonStack } from \"./addon-stack.js\";\nimport { AddonStackInputSchema } from \"./schema.js\";\n\ndescribe(\"generateAddonStack\", () => {\n\tit(\"generates valid compose YAML with a single service (qdrant)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\t// Resolver may generate warnings about recommended services; that's fine\n\t\texpect(result.metadata.serviceCount).toBeGreaterThan(0);\n\t\texpect(result.metadata.resolvedServices).toContain(\"qdrant\");\n\n\t\t// Parse YAML to verify it's valid\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).toHaveProperty(\"qdrant\");\n\n\t\t// Should NOT contain infrastructure services\n\t\texpect(composed.services).not.toHaveProperty(\"openclaw-gateway\");\n\t\texpect(composed.services).not.toHaveProperty(\"openclaw-cli\");\n\t\texpect(composed.services).not.toHaveProperty(\"redis\");\n\t\texpect(composed.services).not.toHaveProperty(\"postgresql\");\n\t\texpect(composed.services).not.toHaveProperty(\"open-webui\");\n\t\texpect(composed.services).not.toHaveProperty(\"caddy\");\n\n\t\t// Should have openclaw-network as external\n\t\texpect(composed.networks).toHaveProperty(\"openclaw-network\");\n\t\texpect(composed.networks[\"openclaw-network\"].external).toBe(true);\n\t});\n\n\tit(\"does not include profiles on any service\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\", \"meilisearch\"],\n\t\t});\n\n\t\tconst composed = parse(result.composeOverride);\n\t\tfor (const [, svc] of Object.entries(composed.services)) {\n\t\t\texpect(svc).not.toHaveProperty(\"profiles\");\n\t\t}\n\t});\n\n\tit(\"does not apply cap_drop or security_opt by default\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\tconst composed = parse(result.composeOverride);\n\t\tconst qdrant = composed.services.qdrant;\n\t\texpect(qdrant).not.toHaveProperty(\"cap_drop\");\n\t\texpect(qdrant).not.toHaveProperty(\"security_opt\");\n\t});\n\n\tit(\"includes postgres-setup when a DB-dependent service is requested (n8n)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t});\n\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).toHaveProperty(\"n8n\");\n\t\texpect(composed.services).toHaveProperty(\"postgres-setup\");\n\n\t\t// postgres-setup should depend on existing postgresql\n\t\texpect(composed.services[\"postgres-setup\"].depends_on).toHaveProperty(\"postgresql\");\n\n\t\t// n8n should depend on postgres-setup\n\t\texpect(composed.services.n8n.depends_on).toHaveProperty(\"postgres-setup\");\n\t});\n\n\tit(\"generates DB passwords in env file for DB-dependent services\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\texpect(result.envFile).toContain(\"N8N_DB_PASSWORD=\");\n\t\t// Password should be non-empty (48 hex chars = 24 bytes)\n\t\tconst match = result.envFile.match(/N8N_DB_PASSWORD=([a-f0-9]+)/);\n\t\texpect(match).not.toBeNull();\n\t\texpect(match![1].length).toBe(48);\n\t});\n\n\tit(\"gracefully handles unknown service IDs without throwing\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"nonexistent-service\", \"qdrant\"],\n\t\t});\n\n\t\t// Should NOT throw\n\t\texpect(result.metadata.skippedServices).toEqual(\n\t\t\texpect.arrayContaining([\n\t\t\t\texpect.objectContaining({\n\t\t\t\t\tserviceId: \"nonexistent-service\",\n\t\t\t\t\treason: \"unknown_service\",\n\t\t\t\t}),\n\t\t\t]),\n\t\t);\n\n\t\t// Valid service should still be included\n\t\texpect(result.metadata.resolvedServices).toContain(\"qdrant\");\n\t});\n\n\tit(\"excludes infrastructure services from the request\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"redis\", \"postgresql\", \"qdrant\"],\n\t\t});\n\n\t\texpect(result.warnings).toEqual(\n\t\t\texpect.arrayContaining([\n\t\t\t\texpect.stringContaining(\"redis\"),\n\t\t\t\texpect.stringContaining(\"postgresql\"),\n\t\t\t]),\n\t\t);\n\t\texpect(result.metadata.resolvedServices).not.toContain(\"redis\");\n\t\texpect(result.metadata.resolvedServices).not.toContain(\"postgresql\");\n\t\texpect(result.metadata.resolvedServices).toContain(\"qdrant\");\n\t});\n\n\tit(\"generates proxy routes from proxyPath\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t});\n\n\t\tconst n8nRoute = result.proxyRoutes.find((r) => r.serviceId === \"n8n\");\n\t\texpect(n8nRoute).toBeDefined();\n\t\texpect(n8nRoute!.path).toBe(\"/n8n\");\n\t\texpect(n8nRoute!.port).toBe(5678);\n\t});\n\n\tit(\"generates skill files and openclaw config patch\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t});\n\n\t\t// n8n has skill binding: n8n-trigger\n\t\texpect(result.openclawConfigPatch.skills.entries).toHaveProperty(\"n8n-trigger\");\n\t\texpect(result.openclawConfigPatch.skills.entries[\"n8n-trigger\"].enabled).toBe(true);\n\t});\n\n\tit(\"resolves port conflicts with reserved ports\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\treservedPorts: [5678], // n8n's default port\n\t\t});\n\n\t\t// Port should be reassigned\n\t\tconst portAssignments = result.metadata.portAssignments;\n\t\tconst n8nAssignment = Object.entries(portAssignments).find(([key]) =>\n\t\t\tkey.startsWith(\"n8n:\"),\n\t\t);\n\t\texpect(n8nAssignment).toBeDefined();\n\t\texpect(n8nAssignment![1]).not.toBe(5678);\n\t});\n\n\tit(\"sanitizes project name from instanceId\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"My_Instance_123\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\t// Should succeed without error\n\t\texpect(result.metadata.serviceCount).toBeGreaterThan(0);\n\t});\n\n\tit(\"returns env vars grouped by service\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\texpect(result.envVars.length).toBeGreaterThanOrEqual(0);\n\t});\n\n\tit(\"returns empty result for no services\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [],\n\t\t});\n\n\t\texpect(result.composeOverride).toContain(\"services: {}\");\n\t\texpect(result.warnings.length).toBeGreaterThan(0);\n\t});\n\n\tit(\"returns empty result when all services are infrastructure\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"redis\", \"postgresql\", \"caddy\"],\n\t\t});\n\n\t\texpect(result.metadata.serviceCount).toBe(0);\n\t\texpect(result.warnings.length).toBeGreaterThan(0);\n\t});\n\n\tit(\"applies env quirks to envFile output (meilisearch MEILI_MASTER_KEY min_length)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"meilisearch\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\t// MEILI_MASTER_KEY should be a base64url string of at least 32 chars (24 bytes)\n\t\tconst match = result.envFile.match(/MEILI_MASTER_KEY=([^\\n]+)/);\n\t\texpect(match).not.toBeNull();\n\t\texpect(match![1].length).toBeGreaterThanOrEqual(32);\n\t\t// Should not be empty\n\t\texpect(match![1]).not.toBe(\"\");\n\t});\n\n\tit(\"applies env quirks to envFile output (grafana GF_SECURITY_ADMIN_PASSWORD)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"grafana\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\tconst match = result.envFile.match(/GF_SECURITY_ADMIN_PASSWORD=([^\\n]+)/);\n\t\texpect(match).not.toBeNull();\n\t\t// Should be at least 22 chars (16 bytes base64url)\n\t\texpect(match![1].length).toBeGreaterThanOrEqual(22);\n\t});\n\n\tit(\"syncs DB_POSTGRESDB_PASSWORD with N8N_DB_PASSWORD via must_sync quirk\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\tconst n8nDbPw = result.envFile.match(/N8N_DB_PASSWORD=([^\\n]+)/);\n\t\tconst dbPostgresPw = result.envFile.match(/DB_POSTGRESDB_PASSWORD=([^\\n]+)/);\n\t\texpect(n8nDbPw).not.toBeNull();\n\t\texpect(dbPostgresPw).not.toBeNull();\n\t\t// Both passwords must match due to must_sync quirk\n\t\texpect(n8nDbPw![1]).toBe(dbPostgresPw![1]);\n\t});\n\n\tit(\"syncs user-provided credential with DB password reference\", () => {\n\t\tconst customPassword = \"my_custom_secure_password\";\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\tgenerateSecrets: true,\n\t\t\tcredentials: {\n\t\t\t\tn8n: { DB_POSTGRESDB_PASSWORD: customPassword },\n\t\t\t},\n\t\t});\n\n\t\t// User value should be used for both the service env var and the ref key\n\t\texpect(result.envFile).toContain(`DB_POSTGRESDB_PASSWORD=${customPassword}`);\n\t\texpect(result.envFile).toContain(`N8N_DB_PASSWORD=${customPassword}`);\n\t});\n\n\tit(\"uses existingServices ports for conflict detection\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\t// n8n uses port 5678, qdrant uses 6333 — qdrant as existing should not conflict\n\t\t\texistingServices: [\"qdrant\"],\n\t\t});\n\n\t\t// n8n should still get its default port (no conflict with qdrant)\n\t\tconst portAssignments = result.metadata.portAssignments;\n\t\tconst n8nAssignment = Object.entries(portAssignments).find(([key]) =>\n\t\t\tkey.startsWith(\"n8n:\"),\n\t\t);\n\t\texpect(n8nAssignment).toBeDefined();\n\t\texpect(n8nAssignment![1]).toBe(5678);\n\t});\n\n\tit(\"does not dual-list GPU services in both skipped and resolved\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"ollama\"],\n\t\t\tgpu: false,\n\t\t});\n\n\t\t// ollama requires GPU — without gpu: true, it should be skipped only\n\t\tconst isSkipped = result.metadata.skippedServices.some(\n\t\t\t(s) => s.serviceId === \"ollama\" && s.reason === \"gpu_required\",\n\t\t);\n\t\tconst isResolved = result.metadata.resolvedServices.includes(\"ollama\");\n\n\t\t// Must be in exactly one list, not both\n\t\tif (isSkipped) {\n\t\t\texpect(isResolved).toBe(false);\n\t\t}\n\t});\n\n\tit(\"includes GPU services when gpu: true is set\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"ollama\"],\n\t\t\tgpu: true,\n\t\t});\n\n\t\t// Should NOT be skipped when GPU support is available\n\t\tconst isSkipped = result.metadata.skippedServices.some(\n\t\t\t(s) => s.serviceId === \"ollama\" && s.reason === \"gpu_required\",\n\t\t);\n\t\texpect(isSkipped).toBe(false);\n\t\texpect(result.metadata.resolvedServices).toContain(\"ollama\");\n\t});\n});\n\ndescribe(\"updateAddonStack\", () => {\n\tit(\"adds a service to an existing stack\", () => {\n\t\t// First generate a base stack\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\t// Then add meilisearch\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\taddServices: [\"meilisearch\"],\n\t\t});\n\n\t\texpect(result.metadata.added).toContain(\"meilisearch\");\n\t\texpect(result.metadata.unchanged).toContain(\"qdrant\");\n\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).toHaveProperty(\"qdrant\");\n\t\texpect(composed.services).toHaveProperty(\"meilisearch\");\n\t});\n\n\tit(\"removes a service from an existing stack\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\", \"meilisearch\"],\n\t\t});\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\tremoveServices: [\"meilisearch\"],\n\t\t});\n\n\t\texpect(result.metadata.removed).toContain(\"meilisearch\");\n\t\texpect(result.metadata.unchanged).toContain(\"qdrant\");\n\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).toHaveProperty(\"qdrant\");\n\t\texpect(composed.services).not.toHaveProperty(\"meilisearch\");\n\t});\n\n\tit(\"preserves existing env values when adding a service\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\t// Simulate user editing an env value\n\t\tconst customEnv = base.envFile.replace(\n\t\t\t/QDRANT_API_KEY=[a-f0-9]+/,\n\t\t\t\"QDRANT_API_KEY=my_custom_key\",\n\t\t);\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: customEnv,\n\t\t\taddServices: [\"meilisearch\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\t// If QDRANT_API_KEY was in the original env, it should be preserved\n\t\tif (customEnv.includes(\"QDRANT_API_KEY=my_custom_key\")) {\n\t\t\texpect(result.envFile).toContain(\"QDRANT_API_KEY=my_custom_key\");\n\t\t}\n\t});\n\n\tit(\"returns images to pull for added services\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\taddServices: [\"meilisearch\"],\n\t\t});\n\n\t\texpect(result.imagesToPull.length).toBeGreaterThan(0);\n\t\texpect(result.imagesToPull.some((img) => img.includes(\"meilisearch\"))).toBe(true);\n\t});\n\n\tit(\"handles empty update gracefully\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t});\n\n\t\texpect(result.metadata.added).toEqual([]);\n\t\texpect(result.metadata.removed).toEqual([]);\n\t\texpect(result.metadata.unchanged).toContain(\"qdrant\");\n\t});\n\n\tit(\"respects generateSecrets: false during update\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\t// With generateSecrets: false, services requiring secrets (like meilisearch)\n\t\t// may be skipped as missing_credentials. Provide credentials explicitly.\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\taddServices: [\"meilisearch\"],\n\t\t\tgenerateSecrets: false,\n\t\t\tcredentials: {\n\t\t\t\tmeilisearch: { MEILI_MASTER_KEY: \"test-master-key-1234567890\" },\n\t\t\t},\n\t\t});\n\n\t\t// Meilisearch should be added since we provided the required credential\n\t\texpect(result.metadata.added).toContain(\"meilisearch\");\n\t});\n\n\tit(\"forwards portOverrides during update\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\taddServices: [\"n8n\"],\n\t\t\tportOverrides: { n8n: { \"5678\": 9999 } },\n\t\t});\n\n\t\t// n8n should be present with the port override\n\t\texpect(result.metadata.added).toContain(\"n8n\");\n\t});\n});\n\ndescribe(\"AddonStackInputSchema\", () => {\n\tit(\"accepts valid input\", () => {\n\t\tconst result = AddonStackInputSchema.safeParse({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\", \"n8n\"],\n\t\t});\n\t\texpect(result.success).toBe(true);\n\t});\n\n\tit(\"requires instanceId\", () => {\n\t\tconst result = AddonStackInputSchema.safeParse({\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\t\texpect(result.success).toBe(false);\n\t});\n\n\tit(\"defaults empty arrays and booleans\", () => {\n\t\tconst result = AddonStackInputSchema.parse({\n\t\t\tinstanceId: \"test\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\t\texpect(result.skillPacks).toEqual([]);\n\t\texpect(result.reservedPorts).toEqual([]);\n\t\texpect(result.generateSecrets).toBe(true);\n\t\texpect(result.platform).toBe(\"linux/amd64\");\n\t});\n});\n"],"mappings":";;;;;AAKA,SAAS,4BAA4B;AACpC,IAAG,qEAAqE;EACvE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;AAGF,eAAO,OAAO,SAAS,aAAa,CAAC,gBAAgB,EAAE;AACvD,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,SAAS;EAG5D,MAAM,WAAW,MAAM,OAAO,gBAAgB;AAC9C,eAAO,SAAS,SAAS,CAAC,eAAe,SAAS;AAGlD,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,mBAAmB;AAChE,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,eAAe;AAC5D,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,QAAQ;AACrD,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,aAAa;AAC1D,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,aAAa;AAC1D,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,QAAQ;AAGrD,eAAO,SAAS,SAAS,CAAC,eAAe,mBAAmB;AAC5D,eAAO,SAAS,SAAS,oBAAoB,SAAS,CAAC,KAAK,KAAK;GAChE;AAEF,IAAG,kDAAkD;EAMpD,MAAM,WAAW,MALF,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,UAAU,cAAc;GACnC,CAAC,CAE4B,gBAAgB;AAC9C,OAAK,MAAM,GAAG,QAAQ,OAAO,QAAQ,SAAS,SAAS,CACtD,cAAO,IAAI,CAAC,IAAI,eAAe,WAAW;GAE1C;AAEF,IAAG,4DAA4D;EAO9D,MAAM,SADW,MALF,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC,CAE4B,gBAAgB,CACtB,SAAS;AACjC,eAAO,OAAO,CAAC,IAAI,eAAe,WAAW;AAC7C,eAAO,OAAO,CAAC,IAAI,eAAe,eAAe;GAChD;AAEF,IAAG,gFAAgF;EAMlF,MAAM,WAAW,MALF,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,CAAC,CAE4B,gBAAgB;AAC9C,eAAO,SAAS,SAAS,CAAC,eAAe,MAAM;AAC/C,eAAO,SAAS,SAAS,CAAC,eAAe,iBAAiB;AAG1D,eAAO,SAAS,SAAS,kBAAkB,WAAW,CAAC,eAAe,aAAa;AAGnF,eAAO,SAAS,SAAS,IAAI,WAAW,CAAC,eAAe,iBAAiB;GACxE;AAEF,IAAG,sEAAsE;EACxE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,iBAAiB;GACjB,CAAC;AAEF,eAAO,OAAO,QAAQ,CAAC,UAAU,mBAAmB;EAEpD,MAAM,QAAQ,OAAO,QAAQ,MAAM,8BAA8B;AACjE,eAAO,MAAM,CAAC,IAAI,UAAU;AAC5B,eAAO,MAAO,GAAG,OAAO,CAAC,KAAK,GAAG;GAChC;AAEF,IAAG,iEAAiE;EACnE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,uBAAuB,SAAS;GAC3C,CAAC;AAGF,eAAO,OAAO,SAAS,gBAAgB,CAAC,QACvCA,aAAO,gBAAgB,CACtBA,aAAO,iBAAiB;GACvB,WAAW;GACX,QAAQ;GACR,CAAC,CACF,CAAC,CACF;AAGD,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,SAAS;GAC3D;AAEF,IAAG,2DAA2D;EAC7D,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU;IAAC;IAAS;IAAc;IAAS;GAC3C,CAAC;AAEF,eAAO,OAAO,SAAS,CAAC,QACvBA,aAAO,gBAAgB,CACtBA,aAAO,iBAAiB,QAAQ,EAChCA,aAAO,iBAAiB,aAAa,CACrC,CAAC,CACF;AACD,eAAO,OAAO,SAAS,iBAAiB,CAAC,IAAI,UAAU,QAAQ;AAC/D,eAAO,OAAO,SAAS,iBAAiB,CAAC,IAAI,UAAU,aAAa;AACpE,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,SAAS;GAC3D;AAEF,IAAG,+CAA+C;EAMjD,MAAM,WALS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,CAAC,CAEsB,YAAY,MAAM,MAAM,EAAE,cAAc,MAAM;AACtE,eAAO,SAAS,CAAC,aAAa;AAC9B,eAAO,SAAU,KAAK,CAAC,KAAK,OAAO;AACnC,eAAO,SAAU,KAAK,CAAC,KAAK,KAAK;GAChC;AAEF,IAAG,yDAAyD;EAC3D,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,CAAC;AAGF,eAAO,OAAO,oBAAoB,OAAO,QAAQ,CAAC,eAAe,cAAc;AAC/E,eAAO,OAAO,oBAAoB,OAAO,QAAQ,eAAe,QAAQ,CAAC,KAAK,KAAK;GAClF;AAEF,IAAG,qDAAqD;EAQvD,MAAM,kBAPS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,eAAe,CAAC,KAAK;GACrB,CAAC,CAG6B,SAAS;EACxC,MAAM,gBAAgB,OAAO,QAAQ,gBAAgB,CAAC,MAAM,CAAC,SAC5D,IAAI,WAAW,OAAO,CACtB;AACD,eAAO,cAAc,CAAC,aAAa;AACnC,eAAO,cAAe,GAAG,CAAC,IAAI,KAAK,KAAK;GACvC;AAEF,IAAG,gDAAgD;AAOlD,eANe,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC,CAGY,SAAS,aAAa,CAAC,gBAAgB,EAAE;GACtD;AAEF,IAAG,6CAA6C;AAM/C,eALe,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC,CAEY,QAAQ,OAAO,CAAC,uBAAuB,EAAE;GACtD;AAEF,IAAG,8CAA8C;EAChD,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,EAAE;GACZ,CAAC;AAEF,eAAO,OAAO,gBAAgB,CAAC,UAAU,eAAe;AACxD,eAAO,OAAO,SAAS,OAAO,CAAC,gBAAgB,EAAE;GAChD;AAEF,IAAG,mEAAmE;EACrE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU;IAAC;IAAS;IAAc;IAAQ;GAC1C,CAAC;AAEF,eAAO,OAAO,SAAS,aAAa,CAAC,KAAK,EAAE;AAC5C,eAAO,OAAO,SAAS,OAAO,CAAC,gBAAgB,EAAE;GAChD;AAEF,IAAG,wFAAwF;EAQ1F,MAAM,QAPS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,iBAAiB;GACjB,CAAC,CAGmB,QAAQ,MAAM,4BAA4B;AAC/D,eAAO,MAAM,CAAC,IAAI,UAAU;AAC5B,eAAO,MAAO,GAAG,OAAO,CAAC,uBAAuB,GAAG;AAEnD,eAAO,MAAO,GAAG,CAAC,IAAI,KAAK,GAAG;GAC7B;AAEF,IAAG,mFAAmF;EAOrF,MAAM,QANS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,UAAU;GACrB,iBAAiB;GACjB,CAAC,CAEmB,QAAQ,MAAM,sCAAsC;AACzE,eAAO,MAAM,CAAC,IAAI,UAAU;AAE5B,eAAO,MAAO,GAAG,OAAO,CAAC,uBAAuB,GAAG;GAClD;AAEF,IAAG,+EAA+E;EACjF,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,iBAAiB;GACjB,CAAC;EAEF,MAAM,UAAU,OAAO,QAAQ,MAAM,2BAA2B;EAChE,MAAM,eAAe,OAAO,QAAQ,MAAM,kCAAkC;AAC5E,eAAO,QAAQ,CAAC,IAAI,UAAU;AAC9B,eAAO,aAAa,CAAC,IAAI,UAAU;AAEnC,eAAO,QAAS,GAAG,CAAC,KAAK,aAAc,GAAG;GACzC;AAEF,IAAG,mEAAmE;EACrE,MAAM,iBAAiB;EACvB,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,iBAAiB;GACjB,aAAa,EACZ,KAAK,EAAE,wBAAwB,gBAAgB,EAC/C;GACD,CAAC;AAGF,eAAO,OAAO,QAAQ,CAAC,UAAU,0BAA0B,iBAAiB;AAC5E,eAAO,OAAO,QAAQ,CAAC,UAAU,mBAAmB,iBAAiB;GACpE;AAEF,IAAG,4DAA4D;EAS9D,MAAM,kBARS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GAEjB,kBAAkB,CAAC,SAAS;GAC5B,CAAC,CAG6B,SAAS;EACxC,MAAM,gBAAgB,OAAO,QAAQ,gBAAgB,CAAC,MAAM,CAAC,SAC5D,IAAI,WAAW,OAAO,CACtB;AACD,eAAO,cAAc,CAAC,aAAa;AACnC,eAAO,cAAe,GAAG,CAAC,KAAK,KAAK;GACnC;AAEF,IAAG,sEAAsE;EACxE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,KAAK;GACL,CAAC;EAGF,MAAM,YAAY,OAAO,SAAS,gBAAgB,MAChD,MAAM,EAAE,cAAc,YAAY,EAAE,WAAW,eAChD;EACD,MAAM,aAAa,OAAO,SAAS,iBAAiB,SAAS,SAAS;AAGtE,MAAI,UACH,cAAO,WAAW,CAAC,KAAK,MAAM;GAE9B;AAEF,IAAG,qDAAqD;EACvD,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,KAAK;GACL,CAAC;AAMF,eAHkB,OAAO,SAAS,gBAAgB,MAChD,MAAM,EAAE,cAAc,YAAY,EAAE,WAAW,eAChD,CACgB,CAAC,KAAK,MAAM;AAC7B,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,SAAS;GAC3D;EACD;AAEF,SAAS,0BAA0B;AAClC,IAAG,6CAA6C;EAE/C,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;EAGF,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,aAAa,CAAC,cAAc;GAC5B,CAAC;AAEF,eAAO,OAAO,SAAS,MAAM,CAAC,UAAU,cAAc;AACtD,eAAO,OAAO,SAAS,UAAU,CAAC,UAAU,SAAS;EAErD,MAAM,WAAW,MAAM,OAAO,gBAAgB;AAC9C,eAAO,SAAS,SAAS,CAAC,eAAe,SAAS;AAClD,eAAO,SAAS,SAAS,CAAC,eAAe,cAAc;GACtD;AAEF,IAAG,kDAAkD;EACpD,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,UAAU,cAAc;GACnC,CAAC;EAEF,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,gBAAgB,CAAC,cAAc;GAC/B,CAAC;AAEF,eAAO,OAAO,SAAS,QAAQ,CAAC,UAAU,cAAc;AACxD,eAAO,OAAO,SAAS,UAAU,CAAC,UAAU,SAAS;EAErD,MAAM,WAAW,MAAM,OAAO,gBAAgB;AAC9C,eAAO,SAAS,SAAS,CAAC,eAAe,SAAS;AAClD,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,cAAc;GAC1D;AAEF,IAAG,6DAA6D;EAC/D,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,iBAAiB;GACjB,CAAC;EAGF,MAAM,YAAY,KAAK,QAAQ,QAC9B,4BACA,+BACA;EAED,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY;GACZ,aAAa,CAAC,cAAc;GAC5B,iBAAiB;GACjB,CAAC;AAGF,MAAI,UAAU,SAAS,+BAA+B,CACrD,cAAO,OAAO,QAAQ,CAAC,UAAU,+BAA+B;GAEhE;AAEF,IAAG,mDAAmD;EACrD,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;EAEF,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,aAAa,CAAC,cAAc;GAC5B,CAAC;AAEF,eAAO,OAAO,aAAa,OAAO,CAAC,gBAAgB,EAAE;AACrD,eAAO,OAAO,aAAa,MAAM,QAAQ,IAAI,SAAS,cAAc,CAAC,CAAC,CAAC,KAAK,KAAK;GAChF;AAEF,IAAG,yCAAyC;EAC3C,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;EAEF,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,CAAC;AAEF,eAAO,OAAO,SAAS,MAAM,CAAC,QAAQ,EAAE,CAAC;AACzC,eAAO,OAAO,SAAS,QAAQ,CAAC,QAAQ,EAAE,CAAC;AAC3C,eAAO,OAAO,SAAS,UAAU,CAAC,UAAU,SAAS;GACpD;AAEF,IAAG,uDAAuD;EACzD,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,iBAAiB;GACjB,CAAC;AAgBF,eAZe,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,aAAa,CAAC,cAAc;GAC5B,iBAAiB;GACjB,aAAa,EACZ,aAAa,EAAE,kBAAkB,8BAA8B,EAC/D;GACD,CAAC,CAGY,SAAS,MAAM,CAAC,UAAU,cAAc;GACrD;AAEF,IAAG,8CAA8C;EAChD,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;AAWF,eATe,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,aAAa,CAAC,MAAM;GACpB,eAAe,EAAE,KAAK,EAAE,QAAQ,MAAM,EAAE;GACxC,CAAC,CAGY,SAAS,MAAM,CAAC,UAAU,MAAM;GAC7C;EACD;AAEF,SAAS,+BAA+B;AACvC,IAAG,6BAA6B;AAK/B,eAJe,sBAAsB,UAAU;GAC9C,YAAY;GACZ,UAAU,CAAC,UAAU,MAAM;GAC3B,CAAC,CACY,QAAQ,CAAC,KAAK,KAAK;GAChC;AAEF,IAAG,6BAA6B;AAI/B,eAHe,sBAAsB,UAAU,EAC9C,UAAU,CAAC,SAAS,EACpB,CAAC,CACY,QAAQ,CAAC,KAAK,MAAM;GACjC;AAEF,IAAG,4CAA4C;EAC9C,MAAM,SAAS,sBAAsB,MAAM;GAC1C,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;AACF,eAAO,OAAO,WAAW,CAAC,QAAQ,EAAE,CAAC;AACrC,eAAO,OAAO,cAAc,CAAC,QAAQ,EAAE,CAAC;AACxC,eAAO,OAAO,gBAAgB,CAAC,KAAK,KAAK;AACzC,eAAO,OAAO,SAAS,CAAC,KAAK,cAAc;GAC1C;EACD"}
1
+ {"version":3,"file":"addon-stack.test.mjs","names":["expect"],"sources":["../src/addon-stack.test.ts"],"sourcesContent":["import { parse } from \"yaml\";\nimport { describe, expect, it } from \"vitest\";\nimport { generateAddonStack, updateAddonStack } from \"./addon-stack.js\";\nimport { AddonStackInputSchema } from \"./schema.js\";\n\ndescribe(\"generateAddonStack\", () => {\n\tit(\"generates valid compose YAML with a single service (qdrant)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\t// Resolver may generate warnings about recommended services; that's fine\n\t\texpect(result.metadata.serviceCount).toBeGreaterThan(0);\n\t\texpect(result.metadata.resolvedServices).toContain(\"qdrant\");\n\n\t\t// Parse YAML to verify it's valid\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).toHaveProperty(\"qdrant\");\n\n\t\t// Should NOT contain infrastructure services\n\t\texpect(composed.services).not.toHaveProperty(\"openclaw-gateway\");\n\t\texpect(composed.services).not.toHaveProperty(\"openclaw-cli\");\n\t\texpect(composed.services).not.toHaveProperty(\"redis\");\n\t\texpect(composed.services).not.toHaveProperty(\"postgresql\");\n\t\texpect(composed.services).not.toHaveProperty(\"open-webui\");\n\t\texpect(composed.services).not.toHaveProperty(\"caddy\");\n\n\t\t// Should have openclaw-network as external\n\t\texpect(composed.networks).toHaveProperty(\"openclaw-network\");\n\t\texpect(composed.networks[\"openclaw-network\"].external).toBe(true);\n\t});\n\n\tit(\"does not include profiles on any service\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\", \"meilisearch\"],\n\t\t});\n\n\t\tconst composed = parse(result.composeOverride);\n\t\tfor (const [, svc] of Object.entries(composed.services)) {\n\t\t\texpect(svc).not.toHaveProperty(\"profiles\");\n\t\t}\n\t});\n\n\tit(\"does not apply cap_drop or security_opt by default\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\tconst composed = parse(result.composeOverride);\n\t\tconst qdrant = composed.services.qdrant;\n\t\texpect(qdrant).not.toHaveProperty(\"cap_drop\");\n\t\texpect(qdrant).not.toHaveProperty(\"security_opt\");\n\t});\n\n\tit(\"includes postgres-setup when a DB-dependent service is requested (n8n)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t});\n\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).toHaveProperty(\"n8n\");\n\t\texpect(composed.services).toHaveProperty(\"postgres-setup\");\n\n\t\t// postgres-setup should depend on existing postgresql\n\t\texpect(composed.services[\"postgres-setup\"].depends_on).toHaveProperty(\"postgresql\");\n\n\t\t// n8n should depend on postgres-setup\n\t\texpect(composed.services.n8n.depends_on).toHaveProperty(\"postgres-setup\");\n\t});\n\n\tit(\"generates DB passwords in env file for DB-dependent services\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\texpect(result.envFile).toContain(\"N8N_DB_PASSWORD=\");\n\t\t// Password should be non-empty (48 hex chars = 24 bytes)\n\t\tconst match = result.envFile.match(/N8N_DB_PASSWORD=([a-f0-9]+)/);\n\t\texpect(match).not.toBeNull();\n\t\texpect(match![1].length).toBe(48);\n\t});\n\n\tit(\"gracefully handles unknown service IDs without throwing\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"nonexistent-service\", \"qdrant\"],\n\t\t});\n\n\t\t// Should NOT throw\n\t\texpect(result.metadata.skippedServices).toEqual(\n\t\t\texpect.arrayContaining([\n\t\t\t\texpect.objectContaining({\n\t\t\t\t\tserviceId: \"nonexistent-service\",\n\t\t\t\t\treason: \"unknown_service\",\n\t\t\t\t}),\n\t\t\t]),\n\t\t);\n\n\t\t// Valid service should still be included\n\t\texpect(result.metadata.resolvedServices).toContain(\"qdrant\");\n\t});\n\n\tit(\"excludes infrastructure services from the request\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"redis\", \"postgresql\", \"qdrant\"],\n\t\t});\n\n\t\texpect(result.warnings).toEqual(\n\t\t\texpect.arrayContaining([\n\t\t\t\texpect.stringContaining(\"redis\"),\n\t\t\t\texpect.stringContaining(\"postgresql\"),\n\t\t\t]),\n\t\t);\n\t\texpect(result.metadata.resolvedServices).not.toContain(\"redis\");\n\t\texpect(result.metadata.resolvedServices).not.toContain(\"postgresql\");\n\t\texpect(result.metadata.resolvedServices).toContain(\"qdrant\");\n\t});\n\n\tit(\"generates proxy routes from proxyPath\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t});\n\n\t\tconst n8nRoute = result.proxyRoutes.find((r) => r.serviceId === \"n8n\");\n\t\texpect(n8nRoute).toBeDefined();\n\t\texpect(n8nRoute!.path).toBe(\"/n8n\");\n\t\texpect(n8nRoute!.port).toBe(5678);\n\t});\n\n\tit(\"generates skill files and openclaw config patch\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t});\n\n\t\t// n8n has skill binding: n8n-trigger\n\t\texpect(result.openclawConfigPatch.skills.entries).toHaveProperty(\"n8n-trigger\");\n\t\texpect(result.openclawConfigPatch.skills.entries[\"n8n-trigger\"].enabled).toBe(true);\n\t});\n\n\tit(\"resolves port conflicts with reserved ports\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\treservedPorts: [5678], // n8n's default port\n\t\t});\n\n\t\t// Port should be reassigned\n\t\tconst portAssignments = result.metadata.portAssignments;\n\t\tconst n8nAssignment = Object.entries(portAssignments).find(([key]) =>\n\t\t\tkey.startsWith(\"n8n:\"),\n\t\t);\n\t\texpect(n8nAssignment).toBeDefined();\n\t\texpect(n8nAssignment![1]).not.toBe(5678);\n\t});\n\n\tit(\"sanitizes project name from instanceId\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"My_Instance_123\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\t// Should succeed without error\n\t\texpect(result.metadata.serviceCount).toBeGreaterThan(0);\n\t});\n\n\tit(\"returns env vars grouped by service\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\texpect(result.envVars.length).toBeGreaterThanOrEqual(0);\n\t});\n\n\tit(\"returns empty result for no services\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [],\n\t\t});\n\n\t\texpect(result.composeOverride).toContain(\"services: {}\");\n\t\texpect(result.warnings.length).toBeGreaterThan(0);\n\t});\n\n\tit(\"returns empty result when all services are infrastructure\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"redis\", \"postgresql\", \"caddy\"],\n\t\t});\n\n\t\texpect(result.metadata.serviceCount).toBe(0);\n\t\texpect(result.warnings.length).toBeGreaterThan(0);\n\t});\n\n\tit(\"applies env quirks to envFile output (meilisearch MEILI_MASTER_KEY min_length)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"meilisearch\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\t// MEILI_MASTER_KEY should be a base64url string of at least 32 chars (24 bytes)\n\t\tconst match = result.envFile.match(/MEILI_MASTER_KEY=([^\\n]+)/);\n\t\texpect(match).not.toBeNull();\n\t\texpect(match![1].length).toBeGreaterThanOrEqual(32);\n\t\t// Should not be empty\n\t\texpect(match![1]).not.toBe(\"\");\n\t});\n\n\tit(\"applies env quirks to envFile output (grafana GF_SECURITY_ADMIN_PASSWORD)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"grafana\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\tconst match = result.envFile.match(/GF_SECURITY_ADMIN_PASSWORD=([^\\n]+)/);\n\t\texpect(match).not.toBeNull();\n\t\t// Should be at least 22 chars (16 bytes base64url)\n\t\texpect(match![1].length).toBeGreaterThanOrEqual(22);\n\t});\n\n\tit(\"syncs DB_POSTGRESDB_PASSWORD with N8N_DB_PASSWORD via must_sync quirk\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\tconst n8nDbPw = result.envFile.match(/N8N_DB_PASSWORD=([^\\n]+)/);\n\t\tconst dbPostgresPw = result.envFile.match(/DB_POSTGRESDB_PASSWORD=([^\\n]+)/);\n\t\texpect(n8nDbPw).not.toBeNull();\n\t\texpect(dbPostgresPw).not.toBeNull();\n\t\t// Both passwords must match due to must_sync quirk\n\t\texpect(n8nDbPw![1]).toBe(dbPostgresPw![1]);\n\t});\n\n\tit(\"syncs user-provided credential with DB password reference\", () => {\n\t\tconst customPassword = \"my_custom_secure_password\";\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\tgenerateSecrets: true,\n\t\t\tcredentials: {\n\t\t\t\tn8n: { DB_POSTGRESDB_PASSWORD: customPassword },\n\t\t\t},\n\t\t});\n\n\t\t// User value should be used for both the service env var and the ref key\n\t\texpect(result.envFile).toContain(`DB_POSTGRESDB_PASSWORD=${customPassword}`);\n\t\texpect(result.envFile).toContain(`N8N_DB_PASSWORD=${customPassword}`);\n\t});\n\n\tit(\"uses existingServices ports for conflict detection\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"n8n\"],\n\t\t\t// n8n uses port 5678, qdrant uses 6333 — qdrant as existing should not conflict\n\t\t\texistingServices: [\"qdrant\"],\n\t\t});\n\n\t\t// n8n should still get its default port (no conflict with qdrant)\n\t\tconst portAssignments = result.metadata.portAssignments;\n\t\tconst n8nAssignment = Object.entries(portAssignments).find(([key]) =>\n\t\t\tkey.startsWith(\"n8n:\"),\n\t\t);\n\t\texpect(n8nAssignment).toBeDefined();\n\t\texpect(n8nAssignment![1]).toBe(5678);\n\t});\n\n\tit(\"does not dual-list GPU services in both skipped and resolved\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"ollama\"],\n\t\t\tgpu: false,\n\t\t});\n\n\t\t// ollama requires GPU — without gpu: true, it should be skipped only\n\t\tconst isSkipped = result.metadata.skippedServices.some(\n\t\t\t(s) => s.serviceId === \"ollama\" && s.reason === \"gpu_required\",\n\t\t);\n\t\tconst isResolved = result.metadata.resolvedServices.includes(\"ollama\");\n\n\t\t// Must be in exactly one list, not both\n\t\tif (isSkipped) {\n\t\t\texpect(isResolved).toBe(false);\n\t\t}\n\t});\n\n\tit(\"includes GPU services when gpu: true is set\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"ollama\"],\n\t\t\tgpu: true,\n\t\t});\n\n\t\t// Should NOT be skipped when GPU support is available\n\t\tconst isSkipped = result.metadata.skippedServices.some(\n\t\t\t(s) => s.serviceId === \"ollama\" && s.reason === \"gpu_required\",\n\t\t);\n\t\texpect(isSkipped).toBe(false);\n\t\texpect(result.metadata.resolvedServices).toContain(\"ollama\");\n\t});\n\n\t// ── OpenSandbox ────────────────────────────────────────────────────────\n\n\tit(\"generates valid compose YAML for opensandbox\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"opensandbox\"],\n\t\t});\n\n\t\texpect(result.metadata.resolvedServices).toContain(\"opensandbox\");\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).toHaveProperty(\"opensandbox\");\n\n\t\t// Should have Docker socket mount\n\t\tconst volumes = composed.services.opensandbox.volumes as string[];\n\t\texpect(volumes.some((v: string) => v.includes(\"/var/run/docker.sock\"))).toBe(true);\n\n\t\t// Should have config bind mount\n\t\texpect(volumes.some((v: string) => v.includes(\"sandbox.toml\"))).toBe(true);\n\t});\n\n\tit(\"generates OPEN_SANDBOX_API_KEY with min 32 bytes via env quirk\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"opensandbox\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\tconst match = result.envFile.match(/OPEN_SANDBOX_API_KEY=([^\\n]+)/);\n\t\texpect(match).not.toBeNull();\n\t\t// 32 bytes base64url ≈ 43 chars\n\t\texpect(match![1].length).toBeGreaterThanOrEqual(43);\n\t});\n\n\tit(\"generates code-sandbox skill file and config patch\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"opensandbox\"],\n\t\t});\n\n\t\t// Skill config patch\n\t\texpect(result.openclawConfigPatch.skills.entries).toHaveProperty(\"code-sandbox\");\n\t\texpect(result.openclawConfigPatch.skills.entries[\"code-sandbox\"].enabled).toBe(true);\n\n\t\t// Skill file content should exist and contain key actions\n\t\tconst skillFile = Object.values(result.skillFiles).find((content) =>\n\t\t\tcontent.includes(\"code-sandbox\"),\n\t\t);\n\t\texpect(skillFile).toBeDefined();\n\t\texpect(skillFile).toContain(\"execute_code\");\n\t\texpect(skillFile).toContain(\"create_desktop\");\n\t\texpect(skillFile).toContain(\"get_preview_url\");\n\t});\n\n\tit(\"generates proxy route for opensandbox at /sandbox\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"opensandbox\"],\n\t\t});\n\n\t\tconst route = result.proxyRoutes.find((r) => r.serviceId === \"opensandbox\");\n\t\texpect(route).toBeDefined();\n\t\texpect(route!.path).toBe(\"/sandbox\");\n\t\texpect(route!.port).toBe(8080);\n\t});\n\n\tit(\"generates sandbox.toml in additionalFiles\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"opensandbox\"],\n\t\t});\n\n\t\texpect(result.additionalFiles).toHaveProperty(\"sandbox.toml\");\n\t\tconst toml = result.additionalFiles[\"sandbox.toml\"];\n\t\texpect(toml).toContain('[server]');\n\t\texpect(toml).toContain('api_key = \"${OPEN_SANDBOX_API_KEY}\"');\n\t\texpect(toml).toContain('[runtime]');\n\t\texpect(toml).toContain('[docker]');\n\t\texpect(toml).toContain('[secure_runtime]');\n\t\texpect(toml).toContain('type = \"gvisor\"');\n\t});\n\n\tit(\"populates prePullImages with 8 images across 3 priority tiers\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"opensandbox\"],\n\t\t});\n\n\t\tconst images = result.metadata.prePullImages;\n\t\texpect(images.length).toBe(8);\n\n\t\t// Priority 1: core + Homespace\n\t\tconst p1 = images.filter((i) => i.priority === 1);\n\t\texpect(p1.length).toBe(4);\n\t\texpect(p1.map((i) => i.image)).toContain(\"opensandbox/server:v1.0.6\");\n\t\texpect(p1.map((i) => i.image)).toContain(\"opensandbox/execd:v1.0.6\");\n\t\texpect(p1.map((i) => i.image)).toContain(\"opensandbox/desktop:latest\");\n\t\texpect(p1.map((i) => i.image)).toContain(\"opensandbox/chrome:latest\");\n\n\t\t// Priority 2: common languages\n\t\tconst p2 = images.filter((i) => i.priority === 2);\n\t\texpect(p2.length).toBe(2);\n\t\texpect(p2.map((i) => i.image)).toContain(\"opensandbox/code-interpreter:python\");\n\t\texpect(p2.map((i) => i.image)).toContain(\"opensandbox/code-interpreter:node\");\n\n\t\t// Priority 3: optional\n\t\tconst p3 = images.filter((i) => i.priority === 3);\n\t\texpect(p3.length).toBe(2);\n\t\texpect(p3.map((i) => i.image)).toContain(\"opensandbox/code-interpreter:latest\");\n\t\texpect(p3.map((i) => i.image)).toContain(\"opensandbox/vscode:latest\");\n\t});\n\n\tit(\"resolves port conflict between opensandbox and searxng (both 8080)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"opensandbox\", \"searxng\"],\n\t\t});\n\n\t\texpect(result.metadata.resolvedServices).toContain(\"opensandbox\");\n\t\texpect(result.metadata.resolvedServices).toContain(\"searxng\");\n\n\t\t// Both should have port assignments, but they should differ\n\t\tconst assignments = result.metadata.portAssignments;\n\t\tconst opensandboxPort = assignments[\"opensandbox:8080\"];\n\t\tconst searxngPort = assignments[\"searxng:8080\"];\n\t\texpect(opensandboxPort).toBeDefined();\n\t\texpect(searxngPort).toBeDefined();\n\t\texpect(opensandboxPort).not.toBe(searxngPort);\n\t});\n\n\tit(\"does not include opensandbox in prePullImages when not selected\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\texpect(result.metadata.prePullImages.length).toBe(0);\n\t\texpect(result.additionalFiles).not.toHaveProperty(\"sandbox.toml\");\n\t});\n\n\tit(\"opensandbox does not require postgresql (no postgres-setup)\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"opensandbox\"],\n\t\t});\n\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).not.toHaveProperty(\"postgres-setup\");\n\t});\n\n\tit(\"accounts for 768MB memory in estimatedMemoryMB\", () => {\n\t\tconst result = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"opensandbox\"],\n\t\t});\n\n\t\texpect(result.metadata.estimatedMemoryMB).toBeGreaterThanOrEqual(768);\n\t});\n});\n\ndescribe(\"updateAddonStack\", () => {\n\tit(\"adds a service to an existing stack\", () => {\n\t\t// First generate a base stack\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\t// Then add meilisearch\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\taddServices: [\"meilisearch\"],\n\t\t});\n\n\t\texpect(result.metadata.added).toContain(\"meilisearch\");\n\t\texpect(result.metadata.unchanged).toContain(\"qdrant\");\n\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).toHaveProperty(\"qdrant\");\n\t\texpect(composed.services).toHaveProperty(\"meilisearch\");\n\t});\n\n\tit(\"removes a service from an existing stack\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\", \"meilisearch\"],\n\t\t});\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\tremoveServices: [\"meilisearch\"],\n\t\t});\n\n\t\texpect(result.metadata.removed).toContain(\"meilisearch\");\n\t\texpect(result.metadata.unchanged).toContain(\"qdrant\");\n\n\t\tconst composed = parse(result.composeOverride);\n\t\texpect(composed.services).toHaveProperty(\"qdrant\");\n\t\texpect(composed.services).not.toHaveProperty(\"meilisearch\");\n\t});\n\n\tit(\"preserves existing env values when adding a service\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\t// Simulate user editing an env value\n\t\tconst customEnv = base.envFile.replace(\n\t\t\t/QDRANT_API_KEY=[a-f0-9]+/,\n\t\t\t\"QDRANT_API_KEY=my_custom_key\",\n\t\t);\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: customEnv,\n\t\t\taddServices: [\"meilisearch\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\t// If QDRANT_API_KEY was in the original env, it should be preserved\n\t\tif (customEnv.includes(\"QDRANT_API_KEY=my_custom_key\")) {\n\t\t\texpect(result.envFile).toContain(\"QDRANT_API_KEY=my_custom_key\");\n\t\t}\n\t});\n\n\tit(\"returns images to pull for added services\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\taddServices: [\"meilisearch\"],\n\t\t});\n\n\t\texpect(result.imagesToPull.length).toBeGreaterThan(0);\n\t\texpect(result.imagesToPull.some((img) => img.includes(\"meilisearch\"))).toBe(true);\n\t});\n\n\tit(\"handles empty update gracefully\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t});\n\n\t\texpect(result.metadata.added).toEqual([]);\n\t\texpect(result.metadata.removed).toEqual([]);\n\t\texpect(result.metadata.unchanged).toContain(\"qdrant\");\n\t});\n\n\tit(\"respects generateSecrets: false during update\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t\tgenerateSecrets: true,\n\t\t});\n\n\t\t// With generateSecrets: false, services requiring secrets (like meilisearch)\n\t\t// may be skipped as missing_credentials. Provide credentials explicitly.\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\taddServices: [\"meilisearch\"],\n\t\t\tgenerateSecrets: false,\n\t\t\tcredentials: {\n\t\t\t\tmeilisearch: { MEILI_MASTER_KEY: \"test-master-key-1234567890\" },\n\t\t\t},\n\t\t});\n\n\t\t// Meilisearch should be added since we provided the required credential\n\t\texpect(result.metadata.added).toContain(\"meilisearch\");\n\t});\n\n\tit(\"forwards portOverrides during update\", () => {\n\t\tconst base = generateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\n\t\tconst result = updateAddonStack({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tcurrentCompose: base.composeOverride,\n\t\t\tcurrentEnv: base.envFile,\n\t\t\taddServices: [\"n8n\"],\n\t\t\tportOverrides: { n8n: { \"5678\": 9999 } },\n\t\t});\n\n\t\t// n8n should be present with the port override\n\t\texpect(result.metadata.added).toContain(\"n8n\");\n\t});\n});\n\ndescribe(\"AddonStackInputSchema\", () => {\n\tit(\"accepts valid input\", () => {\n\t\tconst result = AddonStackInputSchema.safeParse({\n\t\t\tinstanceId: \"test-instance\",\n\t\t\tservices: [\"qdrant\", \"n8n\"],\n\t\t});\n\t\texpect(result.success).toBe(true);\n\t});\n\n\tit(\"requires instanceId\", () => {\n\t\tconst result = AddonStackInputSchema.safeParse({\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\t\texpect(result.success).toBe(false);\n\t});\n\n\tit(\"defaults empty arrays and booleans\", () => {\n\t\tconst result = AddonStackInputSchema.parse({\n\t\t\tinstanceId: \"test\",\n\t\t\tservices: [\"qdrant\"],\n\t\t});\n\t\texpect(result.skillPacks).toEqual([]);\n\t\texpect(result.reservedPorts).toEqual([]);\n\t\texpect(result.generateSecrets).toBe(true);\n\t\texpect(result.platform).toBe(\"linux/amd64\");\n\t});\n});\n"],"mappings":";;;;;AAKA,SAAS,4BAA4B;AACpC,IAAG,qEAAqE;EACvE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;AAGF,eAAO,OAAO,SAAS,aAAa,CAAC,gBAAgB,EAAE;AACvD,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,SAAS;EAG5D,MAAM,WAAW,MAAM,OAAO,gBAAgB;AAC9C,eAAO,SAAS,SAAS,CAAC,eAAe,SAAS;AAGlD,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,mBAAmB;AAChE,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,eAAe;AAC5D,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,QAAQ;AACrD,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,aAAa;AAC1D,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,aAAa;AAC1D,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,QAAQ;AAGrD,eAAO,SAAS,SAAS,CAAC,eAAe,mBAAmB;AAC5D,eAAO,SAAS,SAAS,oBAAoB,SAAS,CAAC,KAAK,KAAK;GAChE;AAEF,IAAG,kDAAkD;EAMpD,MAAM,WAAW,MALF,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,UAAU,cAAc;GACnC,CAAC,CAE4B,gBAAgB;AAC9C,OAAK,MAAM,GAAG,QAAQ,OAAO,QAAQ,SAAS,SAAS,CACtD,cAAO,IAAI,CAAC,IAAI,eAAe,WAAW;GAE1C;AAEF,IAAG,4DAA4D;EAO9D,MAAM,SADW,MALF,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC,CAE4B,gBAAgB,CACtB,SAAS;AACjC,eAAO,OAAO,CAAC,IAAI,eAAe,WAAW;AAC7C,eAAO,OAAO,CAAC,IAAI,eAAe,eAAe;GAChD;AAEF,IAAG,gFAAgF;EAMlF,MAAM,WAAW,MALF,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,CAAC,CAE4B,gBAAgB;AAC9C,eAAO,SAAS,SAAS,CAAC,eAAe,MAAM;AAC/C,eAAO,SAAS,SAAS,CAAC,eAAe,iBAAiB;AAG1D,eAAO,SAAS,SAAS,kBAAkB,WAAW,CAAC,eAAe,aAAa;AAGnF,eAAO,SAAS,SAAS,IAAI,WAAW,CAAC,eAAe,iBAAiB;GACxE;AAEF,IAAG,sEAAsE;EACxE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,iBAAiB;GACjB,CAAC;AAEF,eAAO,OAAO,QAAQ,CAAC,UAAU,mBAAmB;EAEpD,MAAM,QAAQ,OAAO,QAAQ,MAAM,8BAA8B;AACjE,eAAO,MAAM,CAAC,IAAI,UAAU;AAC5B,eAAO,MAAO,GAAG,OAAO,CAAC,KAAK,GAAG;GAChC;AAEF,IAAG,iEAAiE;EACnE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,uBAAuB,SAAS;GAC3C,CAAC;AAGF,eAAO,OAAO,SAAS,gBAAgB,CAAC,QACvCA,aAAO,gBAAgB,CACtBA,aAAO,iBAAiB;GACvB,WAAW;GACX,QAAQ;GACR,CAAC,CACF,CAAC,CACF;AAGD,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,SAAS;GAC3D;AAEF,IAAG,2DAA2D;EAC7D,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU;IAAC;IAAS;IAAc;IAAS;GAC3C,CAAC;AAEF,eAAO,OAAO,SAAS,CAAC,QACvBA,aAAO,gBAAgB,CACtBA,aAAO,iBAAiB,QAAQ,EAChCA,aAAO,iBAAiB,aAAa,CACrC,CAAC,CACF;AACD,eAAO,OAAO,SAAS,iBAAiB,CAAC,IAAI,UAAU,QAAQ;AAC/D,eAAO,OAAO,SAAS,iBAAiB,CAAC,IAAI,UAAU,aAAa;AACpE,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,SAAS;GAC3D;AAEF,IAAG,+CAA+C;EAMjD,MAAM,WALS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,CAAC,CAEsB,YAAY,MAAM,MAAM,EAAE,cAAc,MAAM;AACtE,eAAO,SAAS,CAAC,aAAa;AAC9B,eAAO,SAAU,KAAK,CAAC,KAAK,OAAO;AACnC,eAAO,SAAU,KAAK,CAAC,KAAK,KAAK;GAChC;AAEF,IAAG,yDAAyD;EAC3D,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,CAAC;AAGF,eAAO,OAAO,oBAAoB,OAAO,QAAQ,CAAC,eAAe,cAAc;AAC/E,eAAO,OAAO,oBAAoB,OAAO,QAAQ,eAAe,QAAQ,CAAC,KAAK,KAAK;GAClF;AAEF,IAAG,qDAAqD;EAQvD,MAAM,kBAPS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,eAAe,CAAC,KAAK;GACrB,CAAC,CAG6B,SAAS;EACxC,MAAM,gBAAgB,OAAO,QAAQ,gBAAgB,CAAC,MAAM,CAAC,SAC5D,IAAI,WAAW,OAAO,CACtB;AACD,eAAO,cAAc,CAAC,aAAa;AACnC,eAAO,cAAe,GAAG,CAAC,IAAI,KAAK,KAAK;GACvC;AAEF,IAAG,gDAAgD;AAOlD,eANe,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC,CAGY,SAAS,aAAa,CAAC,gBAAgB,EAAE;GACtD;AAEF,IAAG,6CAA6C;AAM/C,eALe,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC,CAEY,QAAQ,OAAO,CAAC,uBAAuB,EAAE;GACtD;AAEF,IAAG,8CAA8C;EAChD,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,EAAE;GACZ,CAAC;AAEF,eAAO,OAAO,gBAAgB,CAAC,UAAU,eAAe;AACxD,eAAO,OAAO,SAAS,OAAO,CAAC,gBAAgB,EAAE;GAChD;AAEF,IAAG,mEAAmE;EACrE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU;IAAC;IAAS;IAAc;IAAQ;GAC1C,CAAC;AAEF,eAAO,OAAO,SAAS,aAAa,CAAC,KAAK,EAAE;AAC5C,eAAO,OAAO,SAAS,OAAO,CAAC,gBAAgB,EAAE;GAChD;AAEF,IAAG,wFAAwF;EAQ1F,MAAM,QAPS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,iBAAiB;GACjB,CAAC,CAGmB,QAAQ,MAAM,4BAA4B;AAC/D,eAAO,MAAM,CAAC,IAAI,UAAU;AAC5B,eAAO,MAAO,GAAG,OAAO,CAAC,uBAAuB,GAAG;AAEnD,eAAO,MAAO,GAAG,CAAC,IAAI,KAAK,GAAG;GAC7B;AAEF,IAAG,mFAAmF;EAOrF,MAAM,QANS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,UAAU;GACrB,iBAAiB;GACjB,CAAC,CAEmB,QAAQ,MAAM,sCAAsC;AACzE,eAAO,MAAM,CAAC,IAAI,UAAU;AAE5B,eAAO,MAAO,GAAG,OAAO,CAAC,uBAAuB,GAAG;GAClD;AAEF,IAAG,+EAA+E;EACjF,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,iBAAiB;GACjB,CAAC;EAEF,MAAM,UAAU,OAAO,QAAQ,MAAM,2BAA2B;EAChE,MAAM,eAAe,OAAO,QAAQ,MAAM,kCAAkC;AAC5E,eAAO,QAAQ,CAAC,IAAI,UAAU;AAC9B,eAAO,aAAa,CAAC,IAAI,UAAU;AAEnC,eAAO,QAAS,GAAG,CAAC,KAAK,aAAc,GAAG;GACzC;AAEF,IAAG,mEAAmE;EACrE,MAAM,iBAAiB;EACvB,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GACjB,iBAAiB;GACjB,aAAa,EACZ,KAAK,EAAE,wBAAwB,gBAAgB,EAC/C;GACD,CAAC;AAGF,eAAO,OAAO,QAAQ,CAAC,UAAU,0BAA0B,iBAAiB;AAC5E,eAAO,OAAO,QAAQ,CAAC,UAAU,mBAAmB,iBAAiB;GACpE;AAEF,IAAG,4DAA4D;EAS9D,MAAM,kBARS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,MAAM;GAEjB,kBAAkB,CAAC,SAAS;GAC5B,CAAC,CAG6B,SAAS;EACxC,MAAM,gBAAgB,OAAO,QAAQ,gBAAgB,CAAC,MAAM,CAAC,SAC5D,IAAI,WAAW,OAAO,CACtB;AACD,eAAO,cAAc,CAAC,aAAa;AACnC,eAAO,cAAe,GAAG,CAAC,KAAK,KAAK;GACnC;AAEF,IAAG,sEAAsE;EACxE,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,KAAK;GACL,CAAC;EAGF,MAAM,YAAY,OAAO,SAAS,gBAAgB,MAChD,MAAM,EAAE,cAAc,YAAY,EAAE,WAAW,eAChD;EACD,MAAM,aAAa,OAAO,SAAS,iBAAiB,SAAS,SAAS;AAGtE,MAAI,UACH,cAAO,WAAW,CAAC,KAAK,MAAM;GAE9B;AAEF,IAAG,qDAAqD;EACvD,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,KAAK;GACL,CAAC;AAMF,eAHkB,OAAO,SAAS,gBAAgB,MAChD,MAAM,EAAE,cAAc,YAAY,EAAE,WAAW,eAChD,CACgB,CAAC,KAAK,MAAM;AAC7B,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,SAAS;GAC3D;AAIF,IAAG,sDAAsD;EACxD,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,CAAC;AAEF,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,cAAc;EACjE,MAAM,WAAW,MAAM,OAAO,gBAAgB;AAC9C,eAAO,SAAS,SAAS,CAAC,eAAe,cAAc;EAGvD,MAAM,UAAU,SAAS,SAAS,YAAY;AAC9C,eAAO,QAAQ,MAAM,MAAc,EAAE,SAAS,uBAAuB,CAAC,CAAC,CAAC,KAAK,KAAK;AAGlF,eAAO,QAAQ,MAAM,MAAc,EAAE,SAAS,eAAe,CAAC,CAAC,CAAC,KAAK,KAAK;GACzE;AAEF,IAAG,wEAAwE;EAO1E,MAAM,QANS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,iBAAiB;GACjB,CAAC,CAEmB,QAAQ,MAAM,gCAAgC;AACnE,eAAO,MAAM,CAAC,IAAI,UAAU;AAE5B,eAAO,MAAO,GAAG,OAAO,CAAC,uBAAuB,GAAG;GAClD;AAEF,IAAG,4DAA4D;EAC9D,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,CAAC;AAGF,eAAO,OAAO,oBAAoB,OAAO,QAAQ,CAAC,eAAe,eAAe;AAChF,eAAO,OAAO,oBAAoB,OAAO,QAAQ,gBAAgB,QAAQ,CAAC,KAAK,KAAK;EAGpF,MAAM,YAAY,OAAO,OAAO,OAAO,WAAW,CAAC,MAAM,YACxD,QAAQ,SAAS,eAAe,CAChC;AACD,eAAO,UAAU,CAAC,aAAa;AAC/B,eAAO,UAAU,CAAC,UAAU,eAAe;AAC3C,eAAO,UAAU,CAAC,UAAU,iBAAiB;AAC7C,eAAO,UAAU,CAAC,UAAU,kBAAkB;GAC7C;AAEF,IAAG,2DAA2D;EAM7D,MAAM,QALS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,CAAC,CAEmB,YAAY,MAAM,MAAM,EAAE,cAAc,cAAc;AAC3E,eAAO,MAAM,CAAC,aAAa;AAC3B,eAAO,MAAO,KAAK,CAAC,KAAK,WAAW;AACpC,eAAO,MAAO,KAAK,CAAC,KAAK,KAAK;GAC7B;AAEF,IAAG,mDAAmD;EACrD,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,CAAC;AAEF,eAAO,OAAO,gBAAgB,CAAC,eAAe,eAAe;EAC7D,MAAM,OAAO,OAAO,gBAAgB;AACpC,eAAO,KAAK,CAAC,UAAU,WAAW;AAClC,eAAO,KAAK,CAAC,UAAU,wCAAsC;AAC7D,eAAO,KAAK,CAAC,UAAU,YAAY;AACnC,eAAO,KAAK,CAAC,UAAU,WAAW;AAClC,eAAO,KAAK,CAAC,UAAU,mBAAmB;AAC1C,eAAO,KAAK,CAAC,UAAU,oBAAkB;GACxC;AAEF,IAAG,uEAAuE;EAMzE,MAAM,SALS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,CAAC,CAEoB,SAAS;AAC/B,eAAO,OAAO,OAAO,CAAC,KAAK,EAAE;EAG7B,MAAM,KAAK,OAAO,QAAQ,MAAM,EAAE,aAAa,EAAE;AACjD,eAAO,GAAG,OAAO,CAAC,KAAK,EAAE;AACzB,eAAO,GAAG,KAAK,MAAM,EAAE,MAAM,CAAC,CAAC,UAAU,4BAA4B;AACrE,eAAO,GAAG,KAAK,MAAM,EAAE,MAAM,CAAC,CAAC,UAAU,2BAA2B;AACpE,eAAO,GAAG,KAAK,MAAM,EAAE,MAAM,CAAC,CAAC,UAAU,6BAA6B;AACtE,eAAO,GAAG,KAAK,MAAM,EAAE,MAAM,CAAC,CAAC,UAAU,4BAA4B;EAGrE,MAAM,KAAK,OAAO,QAAQ,MAAM,EAAE,aAAa,EAAE;AACjD,eAAO,GAAG,OAAO,CAAC,KAAK,EAAE;AACzB,eAAO,GAAG,KAAK,MAAM,EAAE,MAAM,CAAC,CAAC,UAAU,sCAAsC;AAC/E,eAAO,GAAG,KAAK,MAAM,EAAE,MAAM,CAAC,CAAC,UAAU,oCAAoC;EAG7E,MAAM,KAAK,OAAO,QAAQ,MAAM,EAAE,aAAa,EAAE;AACjD,eAAO,GAAG,OAAO,CAAC,KAAK,EAAE;AACzB,eAAO,GAAG,KAAK,MAAM,EAAE,MAAM,CAAC,CAAC,UAAU,sCAAsC;AAC/E,eAAO,GAAG,KAAK,MAAM,EAAE,MAAM,CAAC,CAAC,UAAU,4BAA4B;GACpE;AAEF,IAAG,4EAA4E;EAC9E,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,eAAe,UAAU;GACpC,CAAC;AAEF,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,cAAc;AACjE,eAAO,OAAO,SAAS,iBAAiB,CAAC,UAAU,UAAU;EAG7D,MAAM,cAAc,OAAO,SAAS;EACpC,MAAM,kBAAkB,YAAY;EACpC,MAAM,cAAc,YAAY;AAChC,eAAO,gBAAgB,CAAC,aAAa;AACrC,eAAO,YAAY,CAAC,aAAa;AACjC,eAAO,gBAAgB,CAAC,IAAI,KAAK,YAAY;GAC5C;AAEF,IAAG,yEAAyE;EAC3E,MAAM,SAAS,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;AAEF,eAAO,OAAO,SAAS,cAAc,OAAO,CAAC,KAAK,EAAE;AACpD,eAAO,OAAO,gBAAgB,CAAC,IAAI,eAAe,eAAe;GAChE;AAEF,IAAG,qEAAqE;AAOvE,eADiB,MALF,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,CAAC,CAE4B,gBAAgB,CAC9B,SAAS,CAAC,IAAI,eAAe,iBAAiB;GAC7D;AAEF,IAAG,wDAAwD;AAM1D,eALe,mBAAmB;GACjC,YAAY;GACZ,UAAU,CAAC,cAAc;GACzB,CAAC,CAEY,SAAS,kBAAkB,CAAC,uBAAuB,IAAI;GACpE;EACD;AAEF,SAAS,0BAA0B;AAClC,IAAG,6CAA6C;EAE/C,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;EAGF,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,aAAa,CAAC,cAAc;GAC5B,CAAC;AAEF,eAAO,OAAO,SAAS,MAAM,CAAC,UAAU,cAAc;AACtD,eAAO,OAAO,SAAS,UAAU,CAAC,UAAU,SAAS;EAErD,MAAM,WAAW,MAAM,OAAO,gBAAgB;AAC9C,eAAO,SAAS,SAAS,CAAC,eAAe,SAAS;AAClD,eAAO,SAAS,SAAS,CAAC,eAAe,cAAc;GACtD;AAEF,IAAG,kDAAkD;EACpD,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,UAAU,cAAc;GACnC,CAAC;EAEF,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,gBAAgB,CAAC,cAAc;GAC/B,CAAC;AAEF,eAAO,OAAO,SAAS,QAAQ,CAAC,UAAU,cAAc;AACxD,eAAO,OAAO,SAAS,UAAU,CAAC,UAAU,SAAS;EAErD,MAAM,WAAW,MAAM,OAAO,gBAAgB;AAC9C,eAAO,SAAS,SAAS,CAAC,eAAe,SAAS;AAClD,eAAO,SAAS,SAAS,CAAC,IAAI,eAAe,cAAc;GAC1D;AAEF,IAAG,6DAA6D;EAC/D,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,iBAAiB;GACjB,CAAC;EAGF,MAAM,YAAY,KAAK,QAAQ,QAC9B,4BACA,+BACA;EAED,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY;GACZ,aAAa,CAAC,cAAc;GAC5B,iBAAiB;GACjB,CAAC;AAGF,MAAI,UAAU,SAAS,+BAA+B,CACrD,cAAO,OAAO,QAAQ,CAAC,UAAU,+BAA+B;GAEhE;AAEF,IAAG,mDAAmD;EACrD,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;EAEF,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,aAAa,CAAC,cAAc;GAC5B,CAAC;AAEF,eAAO,OAAO,aAAa,OAAO,CAAC,gBAAgB,EAAE;AACrD,eAAO,OAAO,aAAa,MAAM,QAAQ,IAAI,SAAS,cAAc,CAAC,CAAC,CAAC,KAAK,KAAK;GAChF;AAEF,IAAG,yCAAyC;EAC3C,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;EAEF,MAAM,SAAS,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,CAAC;AAEF,eAAO,OAAO,SAAS,MAAM,CAAC,QAAQ,EAAE,CAAC;AACzC,eAAO,OAAO,SAAS,QAAQ,CAAC,QAAQ,EAAE,CAAC;AAC3C,eAAO,OAAO,SAAS,UAAU,CAAC,UAAU,SAAS;GACpD;AAEF,IAAG,uDAAuD;EACzD,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,iBAAiB;GACjB,CAAC;AAgBF,eAZe,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,aAAa,CAAC,cAAc;GAC5B,iBAAiB;GACjB,aAAa,EACZ,aAAa,EAAE,kBAAkB,8BAA8B,EAC/D;GACD,CAAC,CAGY,SAAS,MAAM,CAAC,UAAU,cAAc;GACrD;AAEF,IAAG,8CAA8C;EAChD,MAAM,OAAO,mBAAmB;GAC/B,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;AAWF,eATe,iBAAiB;GAC/B,YAAY;GACZ,gBAAgB,KAAK;GACrB,YAAY,KAAK;GACjB,aAAa,CAAC,MAAM;GACpB,eAAe,EAAE,KAAK,EAAE,QAAQ,MAAM,EAAE;GACxC,CAAC,CAGY,SAAS,MAAM,CAAC,UAAU,MAAM;GAC7C;EACD;AAEF,SAAS,+BAA+B;AACvC,IAAG,6BAA6B;AAK/B,eAJe,sBAAsB,UAAU;GAC9C,YAAY;GACZ,UAAU,CAAC,UAAU,MAAM;GAC3B,CAAC,CACY,QAAQ,CAAC,KAAK,KAAK;GAChC;AAEF,IAAG,6BAA6B;AAI/B,eAHe,sBAAsB,UAAU,EAC9C,UAAU,CAAC,SAAS,EACpB,CAAC,CACY,QAAQ,CAAC,KAAK,MAAM;GACjC;AAEF,IAAG,4CAA4C;EAC9C,MAAM,SAAS,sBAAsB,MAAM;GAC1C,YAAY;GACZ,UAAU,CAAC,SAAS;GACpB,CAAC;AACF,eAAO,OAAO,WAAW,CAAC,QAAQ,EAAE,CAAC;AACrC,eAAO,OAAO,cAAc,CAAC,QAAQ,EAAE,CAAC;AACxC,eAAO,OAAO,gBAAgB,CAAC,KAAK,KAAK;AACzC,eAAO,OAAO,SAAS,CAAC,KAAK,cAAc;GAC1C;EACD"}
@@ -1,4 +1,4 @@
1
- const require_skills = require("./skills-BlzpHmpH.cjs");
1
+ const require_skills = require("./skills-BSF7iNa4.cjs");
2
2
  const require_generate = require("./generate.cjs");
3
3
  const require_presets_registry = require("./presets/registry.cjs");
4
4
  let yaml = require("yaml");
package/dist/composer.cjs CHANGED
@@ -1,5 +1,5 @@
1
1
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
2
- require("./skills-BlzpHmpH.cjs");
2
+ require("./skills-BSF7iNa4.cjs");
3
3
  const require_generators_postgres_init = require("./generators/postgres-init.cjs");
4
4
  let yaml = require("yaml");
5
5
  //#region src/composer.ts
@@ -1,4 +1,4 @@
1
- require("./skills-BlzpHmpH.cjs");
1
+ require("./skills-BSF7iNa4.cjs");
2
2
  const require_test_CTcmp4Su = require("./test.CTcmp4Su-DlzTarwH.cjs");
3
3
  const require_composer = require("./composer.cjs");
4
4
  const require_resolver = require("./resolver.cjs");
@@ -1,5 +1,5 @@
1
1
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
2
- require("../skills-BlzpHmpH.cjs");
2
+ require("../skills-BSF7iNa4.cjs");
3
3
  let yaml = require("yaml");
4
4
  //#region src/deployers/strip-host-ports.ts
5
5
  /**
package/dist/generate.cjs CHANGED
@@ -1,5 +1,5 @@
1
1
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
2
- const require_skills = require("./skills-BlzpHmpH.cjs");
2
+ const require_skills = require("./skills-BSF7iNa4.cjs");
3
3
  const require_generators_postgres_init = require("./generators/postgres-init.cjs");
4
4
  const require_composer = require("./composer.cjs");
5
5
  const require_resolver = require("./resolver.cjs");
@@ -1,4 +1,4 @@
1
- require("./skills-BlzpHmpH.cjs");
1
+ require("./skills-BSF7iNa4.cjs");
2
2
  const require_test_CTcmp4Su = require("./test.CTcmp4Su-DlzTarwH.cjs");
3
3
  const require_generate = require("./generate.cjs");
4
4
  let yaml = require("yaml");
@@ -1,5 +1,5 @@
1
1
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
2
- require("../skills-BlzpHmpH.cjs");
2
+ require("../skills-BSF7iNa4.cjs");
3
3
  const require_generators_postgres_init = require("./postgres-init.cjs");
4
4
  let node_crypto = require("node:crypto");
5
5
  //#region src/generators/env.ts
@@ -125,6 +125,11 @@ const DB_REQUIREMENTS = {
125
125
  dbUser: "nextcloud",
126
126
  passwordEnvVar: "NEXTCLOUD_DB_PASSWORD"
127
127
  },
128
+ hindsight: {
129
+ dbName: "hindsight",
130
+ dbUser: "hindsight",
131
+ passwordEnvVar: "HINDSIGHT_DB_PASSWORD"
132
+ },
128
133
  "open-saas": {
129
134
  dbName: "opensaas",
130
135
  dbUser: "opensaas",
@@ -1 +1 @@
1
- {"version":3,"file":"postgres-init.cjs","names":[],"sources":["../../src/generators/postgres-init.ts"],"sourcesContent":["import type { ResolverOutput } from \"../types.js\";\n\n/**\n * Database requirement descriptor for a service.\n */\ninterface DbRequirement {\n\tserviceId: string;\n\tserviceName: string;\n\tdbName: string;\n\tdbUser: string;\n\tpasswordEnvVar: string;\n}\n\n/**\n * Known database requirements for services that need their own PostgreSQL database.\n * Maps service ID to the DB name, user, and password env var they expect.\n */\nconst DB_REQUIREMENTS: Record<string, Omit<DbRequirement, \"serviceId\" | \"serviceName\">> = {\n\tn8n: { dbName: \"n8n\", dbUser: \"n8n\", passwordEnvVar: \"N8N_DB_PASSWORD\" },\n\tpostiz: { dbName: \"postiz\", dbUser: \"postiz\", passwordEnvVar: \"POSTIZ_DB_PASSWORD\" },\n\toutline: { dbName: \"outline\", dbUser: \"outline\", passwordEnvVar: \"OUTLINE_DB_PASSWORD\" },\n\tdify: { dbName: \"dify\", dbUser: \"dify\", passwordEnvVar: \"DIFY_DB_PASSWORD\" },\n\ttemporal: { dbName: \"temporal\", dbUser: \"temporal\", passwordEnvVar: \"TEMPORAL_DB_PASSWORD\" },\n\tmattermost: {\n\t\tdbName: \"mattermost\",\n\t\tdbUser: \"mattermost\",\n\t\tpasswordEnvVar: \"MATTERMOST_DB_PASSWORD\",\n\t},\n\t\"matrix-synapse\": { dbName: \"synapse\", dbUser: \"synapse\", passwordEnvVar: \"SYNAPSE_DB_PASSWORD\" },\n\t\"paperless-ngx\": {\n\t\tdbName: \"paperless\",\n\t\tdbUser: \"paperless\",\n\t\tpasswordEnvVar: \"PAPERLESS_DB_PASSWORD\",\n\t},\n\tumami: { dbName: \"umami\", dbUser: \"umami\", passwordEnvVar: \"UMAMI_DB_PASSWORD\" },\n\tmatomo: { dbName: \"matomo\", dbUser: \"matomo\", passwordEnvVar: \"MATOMO_DB_PASSWORD\" },\n\tmixpost: { dbName: \"mixpost\", dbUser: \"mixpost\", passwordEnvVar: \"MIXPOST_DB_PASSWORD\" },\n\t\"cal-com\": { dbName: \"calcom\", dbUser: \"calcom\", passwordEnvVar: \"CALCOM_DB_PASSWORD\" },\n\timmich: { dbName: \"immich\", dbUser: \"immich\", passwordEnvVar: \"IMMICH_DB_PASSWORD\" },\n\tauthentik: { dbName: \"authentik\", dbUser: \"authentik\", passwordEnvVar: \"AUTHENTIK_DB_PASSWORD\" },\n\tchatwoot: { dbName: \"chatwoot\", dbUser: \"chatwoot\", passwordEnvVar: \"CHATWOOT_DB_PASSWORD\" },\n\tfirecrawl: { dbName: \"firecrawl\", dbUser: \"firecrawl\", passwordEnvVar: \"FIRECRAWL_DB_PASSWORD\" },\n\tflagsmith: { dbName: \"flagsmith\", dbUser: \"flagsmith\", passwordEnvVar: \"FLAGSMITH_DB_PASSWORD\" },\n\tinfisical: { dbName: \"infisical\", dbUser: \"infisical\", passwordEnvVar: \"INFISICAL_DB_PASSWORD\" },\n\tkeycloak: { dbName: \"keycloak\", dbUser: \"keycloak\", passwordEnvVar: \"KEYCLOAK_DB_PASSWORD\" },\n\tlistmonk: { dbName: \"listmonk\", dbUser: \"listmonk\", passwordEnvVar: \"LISTMONK_DB_PASSWORD\" },\n\t\"lasuite-meet-backend\": {\n\t\tdbName: \"meet\",\n\t\tdbUser: \"meet\",\n\t\tpasswordEnvVar: \"LASUITE_MEET_DB_PASSWORD\",\n\t},\n\topenpanel: { dbName: \"openpanel\", dbUser: \"openpanel\", passwordEnvVar: \"OPENPANEL_DB_PASSWORD\" },\n\tusesend: { dbName: \"usesend\", dbUser: \"usesend\", passwordEnvVar: \"USESEND_DB_PASSWORD\" },\n\tnextcloud: { dbName: \"nextcloud\", dbUser: \"nextcloud\", passwordEnvVar: \"NEXTCLOUD_DB_PASSWORD\" },\n\t// ── SaaS Boilerplates ────────────────────────────────────────────────────\n\t\"open-saas\": { dbName: \"opensaas\", dbUser: \"opensaas\", passwordEnvVar: \"OPENSAAS_DB_PASSWORD\" },\n\t\"apptension-saas\": {\n\t\tdbName: \"apptensionsaas\",\n\t\tdbUser: \"apptensionsaas\",\n\t\tpasswordEnvVar: \"APPTENSION_SAAS_DB_PASSWORD\",\n\t},\n\t\"boxyhq-saas\": {\n\t\tdbName: \"boxyhqsaas\",\n\t\tdbUser: \"boxyhqsaas\",\n\t\tpasswordEnvVar: \"BOXYHQ_SAAS_DB_PASSWORD\",\n\t},\n\t\"ixartz-saas\": {\n\t\tdbName: \"ixartzsaas\",\n\t\tdbUser: \"ixartzsaas\",\n\t\tpasswordEnvVar: \"IXARTZ_SAAS_DB_PASSWORD\",\n\t},\n};\n\n/**\n * Get the list of database requirements for all resolved services.\n * Exported so other generators (env, composer) can access the same data.\n */\nexport function getDbRequirements(resolved: ResolverOutput): DbRequirement[] {\n\tconst reqs: DbRequirement[] = [];\n\tfor (const { definition } of resolved.services) {\n\t\tconst req = DB_REQUIREMENTS[definition.id];\n\t\tif (req) {\n\t\t\treqs.push({\n\t\t\t\tserviceId: definition.id,\n\t\t\t\tserviceName: definition.name,\n\t\t\t\t...req,\n\t\t\t});\n\t\t}\n\t}\n\treturn reqs;\n}\n\n/**\n * Generates a PostgreSQL initialization script that creates databases and users\n * for all companion services that need their own DB.\n *\n * Returns null if PostgreSQL is not in the resolved stack or no services need extra DBs.\n * The script is designed to be mounted at /docker-entrypoint-initdb.d/init-databases.sh\n * and runs automatically during PostgreSQL's first initialization.\n */\nexport function generatePostgresInit(resolved: ResolverOutput): string | null {\n\tconst hasPostgres = resolved.services.some((s) => s.definition.id === \"postgresql\");\n\tif (!hasPostgres) return null;\n\n\tconst reqs = getDbRequirements(resolved);\n\tif (reqs.length === 0) return null;\n\n\tconst createCalls = reqs\n\t\t.map(\n\t\t\t(r) =>\n\t\t\t\t`create_db_and_user \"${r.dbName}\" \"${r.dbUser}\" \"\\${${r.passwordEnvVar}:-$POSTGRES_PASSWORD}\"`,\n\t\t)\n\t\t.join(\"\\n\");\n\n\treturn `#!/bin/bash\nset -e\n\n# ═══════════════════════════════════════════════════════════════════════════════\n# PostgreSQL Initialization Script\n# Generated by better-openclaw\n#\n# This script runs automatically during PostgreSQL's first initialization.\n# It creates databases and users for all companion services in your stack.\n# ═══════════════════════════════════════════════════════════════════════════════\n\ncreate_db_and_user() {\n local db=\"$1\"\n local user=\"$2\"\n local password=\"$3\"\n\n echo \">>> Creating database '$db' with user '$user'...\"\n\n psql -v ON_ERROR_STOP=1 --username \"$POSTGRES_USER\" --dbname \"$POSTGRES_DB\" <<-EOSQL\n -- Create user if not exists\n DO \\\\$\\\\$\n BEGIN\n IF NOT EXISTS (SELECT FROM pg_catalog.pg_roles WHERE rolname = '$user') THEN\n CREATE ROLE \"$user\" WITH LOGIN PASSWORD '$password';\n RAISE NOTICE 'Created user: $user';\n ELSE\n -- Update password in case it changed\n ALTER ROLE \"$user\" WITH PASSWORD '$password';\n RAISE NOTICE 'User already exists, updated password: $user';\n END IF;\n END\n \\\\$\\\\$;\n\n -- Create database if not exists\n SELECT 'CREATE DATABASE \"$db\" OWNER \"$user\"'\n WHERE NOT EXISTS (SELECT FROM pg_database WHERE datname = '$db')\\\\gexec\n\n -- Grant privileges\n GRANT ALL PRIVILEGES ON DATABASE \"$db\" TO \"$user\";\nEOSQL\n\n echo \">>> Done: database '$db' with user '$user'\"\n}\n\necho \"═══════════════════════════════════════════════════════════\"\necho \" Initializing databases for companion services...\"\necho \"═══════════════════════════════════════════════════════════\"\n\n${createCalls}\n\necho \"\"\necho \"═══════════════════════════════════════════════════════════\"\necho \" All databases initialized successfully!\"\necho \" Services: ${reqs.map((r) => r.serviceName).join(\", \")}\"\necho \"═══════════════════════════════════════════════════════════\"\n`;\n}\n"],"mappings":";;;;;;AAiBA,MAAM,kBAAoF;CACzF,KAAK;EAAE,QAAQ;EAAO,QAAQ;EAAO,gBAAgB;EAAmB;CACxE,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,MAAM;EAAE,QAAQ;EAAQ,QAAQ;EAAQ,gBAAgB;EAAoB;CAC5E,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,YAAY;EACX,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,kBAAkB;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACjG,iBAAiB;EAChB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,OAAO;EAAE,QAAQ;EAAS,QAAQ;EAAS,gBAAgB;EAAqB;CAChF,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,WAAW;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACvF,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,wBAAwB;EACvB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAEhG,aAAa;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC/F,mBAAmB;EAClB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,eAAe;EACd,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,eAAe;EACd,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD;;;;;AAMD,SAAgB,kBAAkB,UAA2C;CAC5E,MAAM,OAAwB,EAAE;AAChC,MAAK,MAAM,EAAE,gBAAgB,SAAS,UAAU;EAC/C,MAAM,MAAM,gBAAgB,WAAW;AACvC,MAAI,IACH,MAAK,KAAK;GACT,WAAW,WAAW;GACtB,aAAa,WAAW;GACxB,GAAG;GACH,CAAC;;AAGJ,QAAO;;;;;;;;;;AAWR,SAAgB,qBAAqB,UAAyC;AAE7E,KAAI,CADgB,SAAS,SAAS,MAAM,MAAM,EAAE,WAAW,OAAO,aAAa,CACjE,QAAO;CAEzB,MAAM,OAAO,kBAAkB,SAAS;AACxC,KAAI,KAAK,WAAW,EAAG,QAAO;AAS9B,QAAO;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAPa,KAClB,KACC,MACA,uBAAuB,EAAE,OAAO,KAAK,EAAE,OAAO,QAAQ,EAAE,eAAe,wBACxE,CACA,KAAK,KAAK,CAkDC;;;;;mBAKK,KAAK,KAAK,MAAM,EAAE,YAAY,CAAC,KAAK,KAAK,CAAC"}
1
+ {"version":3,"file":"postgres-init.cjs","names":[],"sources":["../../src/generators/postgres-init.ts"],"sourcesContent":["import type { ResolverOutput } from \"../types.js\";\n\n/**\n * Database requirement descriptor for a service.\n */\ninterface DbRequirement {\n\tserviceId: string;\n\tserviceName: string;\n\tdbName: string;\n\tdbUser: string;\n\tpasswordEnvVar: string;\n}\n\n/**\n * Known database requirements for services that need their own PostgreSQL database.\n * Maps service ID to the DB name, user, and password env var they expect.\n */\nconst DB_REQUIREMENTS: Record<string, Omit<DbRequirement, \"serviceId\" | \"serviceName\">> = {\n\tn8n: { dbName: \"n8n\", dbUser: \"n8n\", passwordEnvVar: \"N8N_DB_PASSWORD\" },\n\tpostiz: { dbName: \"postiz\", dbUser: \"postiz\", passwordEnvVar: \"POSTIZ_DB_PASSWORD\" },\n\toutline: { dbName: \"outline\", dbUser: \"outline\", passwordEnvVar: \"OUTLINE_DB_PASSWORD\" },\n\tdify: { dbName: \"dify\", dbUser: \"dify\", passwordEnvVar: \"DIFY_DB_PASSWORD\" },\n\ttemporal: { dbName: \"temporal\", dbUser: \"temporal\", passwordEnvVar: \"TEMPORAL_DB_PASSWORD\" },\n\tmattermost: {\n\t\tdbName: \"mattermost\",\n\t\tdbUser: \"mattermost\",\n\t\tpasswordEnvVar: \"MATTERMOST_DB_PASSWORD\",\n\t},\n\t\"matrix-synapse\": { dbName: \"synapse\", dbUser: \"synapse\", passwordEnvVar: \"SYNAPSE_DB_PASSWORD\" },\n\t\"paperless-ngx\": {\n\t\tdbName: \"paperless\",\n\t\tdbUser: \"paperless\",\n\t\tpasswordEnvVar: \"PAPERLESS_DB_PASSWORD\",\n\t},\n\tumami: { dbName: \"umami\", dbUser: \"umami\", passwordEnvVar: \"UMAMI_DB_PASSWORD\" },\n\tmatomo: { dbName: \"matomo\", dbUser: \"matomo\", passwordEnvVar: \"MATOMO_DB_PASSWORD\" },\n\tmixpost: { dbName: \"mixpost\", dbUser: \"mixpost\", passwordEnvVar: \"MIXPOST_DB_PASSWORD\" },\n\t\"cal-com\": { dbName: \"calcom\", dbUser: \"calcom\", passwordEnvVar: \"CALCOM_DB_PASSWORD\" },\n\timmich: { dbName: \"immich\", dbUser: \"immich\", passwordEnvVar: \"IMMICH_DB_PASSWORD\" },\n\tauthentik: { dbName: \"authentik\", dbUser: \"authentik\", passwordEnvVar: \"AUTHENTIK_DB_PASSWORD\" },\n\tchatwoot: { dbName: \"chatwoot\", dbUser: \"chatwoot\", passwordEnvVar: \"CHATWOOT_DB_PASSWORD\" },\n\tfirecrawl: { dbName: \"firecrawl\", dbUser: \"firecrawl\", passwordEnvVar: \"FIRECRAWL_DB_PASSWORD\" },\n\tflagsmith: { dbName: \"flagsmith\", dbUser: \"flagsmith\", passwordEnvVar: \"FLAGSMITH_DB_PASSWORD\" },\n\tinfisical: { dbName: \"infisical\", dbUser: \"infisical\", passwordEnvVar: \"INFISICAL_DB_PASSWORD\" },\n\tkeycloak: { dbName: \"keycloak\", dbUser: \"keycloak\", passwordEnvVar: \"KEYCLOAK_DB_PASSWORD\" },\n\tlistmonk: { dbName: \"listmonk\", dbUser: \"listmonk\", passwordEnvVar: \"LISTMONK_DB_PASSWORD\" },\n\t\"lasuite-meet-backend\": {\n\t\tdbName: \"meet\",\n\t\tdbUser: \"meet\",\n\t\tpasswordEnvVar: \"LASUITE_MEET_DB_PASSWORD\",\n\t},\n\topenpanel: { dbName: \"openpanel\", dbUser: \"openpanel\", passwordEnvVar: \"OPENPANEL_DB_PASSWORD\" },\n\tusesend: { dbName: \"usesend\", dbUser: \"usesend\", passwordEnvVar: \"USESEND_DB_PASSWORD\" },\n\tnextcloud: { dbName: \"nextcloud\", dbUser: \"nextcloud\", passwordEnvVar: \"NEXTCLOUD_DB_PASSWORD\" },\n\t// ── Agent Memory ────────────────────────────────────────────────────────\n\thindsight: { dbName: \"hindsight\", dbUser: \"hindsight\", passwordEnvVar: \"HINDSIGHT_DB_PASSWORD\" },\n\t// ── SaaS Boilerplates ────────────────────────────────────────────────────\n\t\"open-saas\": { dbName: \"opensaas\", dbUser: \"opensaas\", passwordEnvVar: \"OPENSAAS_DB_PASSWORD\" },\n\t\"apptension-saas\": {\n\t\tdbName: \"apptensionsaas\",\n\t\tdbUser: \"apptensionsaas\",\n\t\tpasswordEnvVar: \"APPTENSION_SAAS_DB_PASSWORD\",\n\t},\n\t\"boxyhq-saas\": {\n\t\tdbName: \"boxyhqsaas\",\n\t\tdbUser: \"boxyhqsaas\",\n\t\tpasswordEnvVar: \"BOXYHQ_SAAS_DB_PASSWORD\",\n\t},\n\t\"ixartz-saas\": {\n\t\tdbName: \"ixartzsaas\",\n\t\tdbUser: \"ixartzsaas\",\n\t\tpasswordEnvVar: \"IXARTZ_SAAS_DB_PASSWORD\",\n\t},\n};\n\n/**\n * Get the list of database requirements for all resolved services.\n * Exported so other generators (env, composer) can access the same data.\n */\nexport function getDbRequirements(resolved: ResolverOutput): DbRequirement[] {\n\tconst reqs: DbRequirement[] = [];\n\tfor (const { definition } of resolved.services) {\n\t\tconst req = DB_REQUIREMENTS[definition.id];\n\t\tif (req) {\n\t\t\treqs.push({\n\t\t\t\tserviceId: definition.id,\n\t\t\t\tserviceName: definition.name,\n\t\t\t\t...req,\n\t\t\t});\n\t\t}\n\t}\n\treturn reqs;\n}\n\n/**\n * Generates a PostgreSQL initialization script that creates databases and users\n * for all companion services that need their own DB.\n *\n * Returns null if PostgreSQL is not in the resolved stack or no services need extra DBs.\n * The script is designed to be mounted at /docker-entrypoint-initdb.d/init-databases.sh\n * and runs automatically during PostgreSQL's first initialization.\n */\nexport function generatePostgresInit(resolved: ResolverOutput): string | null {\n\tconst hasPostgres = resolved.services.some((s) => s.definition.id === \"postgresql\");\n\tif (!hasPostgres) return null;\n\n\tconst reqs = getDbRequirements(resolved);\n\tif (reqs.length === 0) return null;\n\n\tconst createCalls = reqs\n\t\t.map(\n\t\t\t(r) =>\n\t\t\t\t`create_db_and_user \"${r.dbName}\" \"${r.dbUser}\" \"\\${${r.passwordEnvVar}:-$POSTGRES_PASSWORD}\"`,\n\t\t)\n\t\t.join(\"\\n\");\n\n\treturn `#!/bin/bash\nset -e\n\n# ═══════════════════════════════════════════════════════════════════════════════\n# PostgreSQL Initialization Script\n# Generated by better-openclaw\n#\n# This script runs automatically during PostgreSQL's first initialization.\n# It creates databases and users for all companion services in your stack.\n# ═══════════════════════════════════════════════════════════════════════════════\n\ncreate_db_and_user() {\n local db=\"$1\"\n local user=\"$2\"\n local password=\"$3\"\n\n echo \">>> Creating database '$db' with user '$user'...\"\n\n psql -v ON_ERROR_STOP=1 --username \"$POSTGRES_USER\" --dbname \"$POSTGRES_DB\" <<-EOSQL\n -- Create user if not exists\n DO \\\\$\\\\$\n BEGIN\n IF NOT EXISTS (SELECT FROM pg_catalog.pg_roles WHERE rolname = '$user') THEN\n CREATE ROLE \"$user\" WITH LOGIN PASSWORD '$password';\n RAISE NOTICE 'Created user: $user';\n ELSE\n -- Update password in case it changed\n ALTER ROLE \"$user\" WITH PASSWORD '$password';\n RAISE NOTICE 'User already exists, updated password: $user';\n END IF;\n END\n \\\\$\\\\$;\n\n -- Create database if not exists\n SELECT 'CREATE DATABASE \"$db\" OWNER \"$user\"'\n WHERE NOT EXISTS (SELECT FROM pg_database WHERE datname = '$db')\\\\gexec\n\n -- Grant privileges\n GRANT ALL PRIVILEGES ON DATABASE \"$db\" TO \"$user\";\nEOSQL\n\n echo \">>> Done: database '$db' with user '$user'\"\n}\n\necho \"═══════════════════════════════════════════════════════════\"\necho \" Initializing databases for companion services...\"\necho \"═══════════════════════════════════════════════════════════\"\n\n${createCalls}\n\necho \"\"\necho \"═══════════════════════════════════════════════════════════\"\necho \" All databases initialized successfully!\"\necho \" Services: ${reqs.map((r) => r.serviceName).join(\", \")}\"\necho \"═══════════════════════════════════════════════════════════\"\n`;\n}\n"],"mappings":";;;;;;AAiBA,MAAM,kBAAoF;CACzF,KAAK;EAAE,QAAQ;EAAO,QAAQ;EAAO,gBAAgB;EAAmB;CACxE,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,MAAM;EAAE,QAAQ;EAAQ,QAAQ;EAAQ,gBAAgB;EAAoB;CAC5E,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,YAAY;EACX,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,kBAAkB;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACjG,iBAAiB;EAChB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,OAAO;EAAE,QAAQ;EAAS,QAAQ;EAAS,gBAAgB;EAAqB;CAChF,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,WAAW;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACvF,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,wBAAwB;EACvB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAEhG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAEhG,aAAa;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC/F,mBAAmB;EAClB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,eAAe;EACd,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,eAAe;EACd,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD;;;;;AAMD,SAAgB,kBAAkB,UAA2C;CAC5E,MAAM,OAAwB,EAAE;AAChC,MAAK,MAAM,EAAE,gBAAgB,SAAS,UAAU;EAC/C,MAAM,MAAM,gBAAgB,WAAW;AACvC,MAAI,IACH,MAAK,KAAK;GACT,WAAW,WAAW;GACtB,aAAa,WAAW;GACxB,GAAG;GACH,CAAC;;AAGJ,QAAO;;;;;;;;;;AAWR,SAAgB,qBAAqB,UAAyC;AAE7E,KAAI,CADgB,SAAS,SAAS,MAAM,MAAM,EAAE,WAAW,OAAO,aAAa,CACjE,QAAO;CAEzB,MAAM,OAAO,kBAAkB,SAAS;AACxC,KAAI,KAAK,WAAW,EAAG,QAAO;AAS9B,QAAO;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAPa,KAClB,KACC,MACA,uBAAuB,EAAE,OAAO,KAAK,EAAE,OAAO,QAAQ,EAAE,eAAe,wBACxE,CACA,KAAK,KAAK,CAkDC;;;;;mBAKK,KAAK,KAAK,MAAM,EAAE,YAAY,CAAC,KAAK,KAAK,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"postgres-init.d.cts","names":[],"sources":["../../src/generators/postgres-init.ts"],"mappings":";;;;;AAAkD;UAKxC,aAAA;EACT,SAAA;EACA,WAAA;EACA,MAAA;EACA,MAAA;EACA,cAAA;AAAA;;;;AAmED;iBAAgB,iBAAA,CAAkB,QAAA,EAAU,cAAA,GAAiB,aAAA;;;;;;;;AAuB7D;iBAAgB,oBAAA,CAAqB,QAAA,EAAU,cAAA"}
1
+ {"version":3,"file":"postgres-init.d.cts","names":[],"sources":["../../src/generators/postgres-init.ts"],"mappings":";;;;;AAAkD;UAKxC,aAAA;EACT,SAAA;EACA,WAAA;EACA,MAAA;EACA,MAAA;EACA,cAAA;AAAA;;;;AAqED;iBAAgB,iBAAA,CAAkB,QAAA,EAAU,cAAA,GAAiB,aAAA;;;;;;;;AAuB7D;iBAAgB,oBAAA,CAAqB,QAAA,EAAU,cAAA"}
@@ -1 +1 @@
1
- {"version":3,"file":"postgres-init.d.mts","names":[],"sources":["../../src/generators/postgres-init.ts"],"mappings":";;;;;;UAKU,aAAA;EACT,SAAA;EACA,WAAA;EACA,MAAA;EACA,MAAA;EACA,cAAA;AAAA;;;;;iBAmEe,iBAAA,CAAkB,QAAA,EAAU,cAAA,GAAiB,aAAA;;;;;;;;;iBAuB7C,oBAAA,CAAqB,QAAA,EAAU,cAAA"}
1
+ {"version":3,"file":"postgres-init.d.mts","names":[],"sources":["../../src/generators/postgres-init.ts"],"mappings":";;;;;;UAKU,aAAA;EACT,SAAA;EACA,WAAA;EACA,MAAA;EACA,MAAA;EACA,cAAA;AAAA;;;;;iBAqEe,iBAAA,CAAkB,QAAA,EAAU,cAAA,GAAiB,aAAA;;;;;;;;;iBAuB7C,oBAAA,CAAqB,QAAA,EAAU,cAAA"}
@@ -124,6 +124,11 @@ const DB_REQUIREMENTS = {
124
124
  dbUser: "nextcloud",
125
125
  passwordEnvVar: "NEXTCLOUD_DB_PASSWORD"
126
126
  },
127
+ hindsight: {
128
+ dbName: "hindsight",
129
+ dbUser: "hindsight",
130
+ passwordEnvVar: "HINDSIGHT_DB_PASSWORD"
131
+ },
127
132
  "open-saas": {
128
133
  dbName: "opensaas",
129
134
  dbUser: "opensaas",
@@ -1 +1 @@
1
- {"version":3,"file":"postgres-init.mjs","names":[],"sources":["../../src/generators/postgres-init.ts"],"sourcesContent":["import type { ResolverOutput } from \"../types.js\";\n\n/**\n * Database requirement descriptor for a service.\n */\ninterface DbRequirement {\n\tserviceId: string;\n\tserviceName: string;\n\tdbName: string;\n\tdbUser: string;\n\tpasswordEnvVar: string;\n}\n\n/**\n * Known database requirements for services that need their own PostgreSQL database.\n * Maps service ID to the DB name, user, and password env var they expect.\n */\nconst DB_REQUIREMENTS: Record<string, Omit<DbRequirement, \"serviceId\" | \"serviceName\">> = {\n\tn8n: { dbName: \"n8n\", dbUser: \"n8n\", passwordEnvVar: \"N8N_DB_PASSWORD\" },\n\tpostiz: { dbName: \"postiz\", dbUser: \"postiz\", passwordEnvVar: \"POSTIZ_DB_PASSWORD\" },\n\toutline: { dbName: \"outline\", dbUser: \"outline\", passwordEnvVar: \"OUTLINE_DB_PASSWORD\" },\n\tdify: { dbName: \"dify\", dbUser: \"dify\", passwordEnvVar: \"DIFY_DB_PASSWORD\" },\n\ttemporal: { dbName: \"temporal\", dbUser: \"temporal\", passwordEnvVar: \"TEMPORAL_DB_PASSWORD\" },\n\tmattermost: {\n\t\tdbName: \"mattermost\",\n\t\tdbUser: \"mattermost\",\n\t\tpasswordEnvVar: \"MATTERMOST_DB_PASSWORD\",\n\t},\n\t\"matrix-synapse\": { dbName: \"synapse\", dbUser: \"synapse\", passwordEnvVar: \"SYNAPSE_DB_PASSWORD\" },\n\t\"paperless-ngx\": {\n\t\tdbName: \"paperless\",\n\t\tdbUser: \"paperless\",\n\t\tpasswordEnvVar: \"PAPERLESS_DB_PASSWORD\",\n\t},\n\tumami: { dbName: \"umami\", dbUser: \"umami\", passwordEnvVar: \"UMAMI_DB_PASSWORD\" },\n\tmatomo: { dbName: \"matomo\", dbUser: \"matomo\", passwordEnvVar: \"MATOMO_DB_PASSWORD\" },\n\tmixpost: { dbName: \"mixpost\", dbUser: \"mixpost\", passwordEnvVar: \"MIXPOST_DB_PASSWORD\" },\n\t\"cal-com\": { dbName: \"calcom\", dbUser: \"calcom\", passwordEnvVar: \"CALCOM_DB_PASSWORD\" },\n\timmich: { dbName: \"immich\", dbUser: \"immich\", passwordEnvVar: \"IMMICH_DB_PASSWORD\" },\n\tauthentik: { dbName: \"authentik\", dbUser: \"authentik\", passwordEnvVar: \"AUTHENTIK_DB_PASSWORD\" },\n\tchatwoot: { dbName: \"chatwoot\", dbUser: \"chatwoot\", passwordEnvVar: \"CHATWOOT_DB_PASSWORD\" },\n\tfirecrawl: { dbName: \"firecrawl\", dbUser: \"firecrawl\", passwordEnvVar: \"FIRECRAWL_DB_PASSWORD\" },\n\tflagsmith: { dbName: \"flagsmith\", dbUser: \"flagsmith\", passwordEnvVar: \"FLAGSMITH_DB_PASSWORD\" },\n\tinfisical: { dbName: \"infisical\", dbUser: \"infisical\", passwordEnvVar: \"INFISICAL_DB_PASSWORD\" },\n\tkeycloak: { dbName: \"keycloak\", dbUser: \"keycloak\", passwordEnvVar: \"KEYCLOAK_DB_PASSWORD\" },\n\tlistmonk: { dbName: \"listmonk\", dbUser: \"listmonk\", passwordEnvVar: \"LISTMONK_DB_PASSWORD\" },\n\t\"lasuite-meet-backend\": {\n\t\tdbName: \"meet\",\n\t\tdbUser: \"meet\",\n\t\tpasswordEnvVar: \"LASUITE_MEET_DB_PASSWORD\",\n\t},\n\topenpanel: { dbName: \"openpanel\", dbUser: \"openpanel\", passwordEnvVar: \"OPENPANEL_DB_PASSWORD\" },\n\tusesend: { dbName: \"usesend\", dbUser: \"usesend\", passwordEnvVar: \"USESEND_DB_PASSWORD\" },\n\tnextcloud: { dbName: \"nextcloud\", dbUser: \"nextcloud\", passwordEnvVar: \"NEXTCLOUD_DB_PASSWORD\" },\n\t// ── SaaS Boilerplates ────────────────────────────────────────────────────\n\t\"open-saas\": { dbName: \"opensaas\", dbUser: \"opensaas\", passwordEnvVar: \"OPENSAAS_DB_PASSWORD\" },\n\t\"apptension-saas\": {\n\t\tdbName: \"apptensionsaas\",\n\t\tdbUser: \"apptensionsaas\",\n\t\tpasswordEnvVar: \"APPTENSION_SAAS_DB_PASSWORD\",\n\t},\n\t\"boxyhq-saas\": {\n\t\tdbName: \"boxyhqsaas\",\n\t\tdbUser: \"boxyhqsaas\",\n\t\tpasswordEnvVar: \"BOXYHQ_SAAS_DB_PASSWORD\",\n\t},\n\t\"ixartz-saas\": {\n\t\tdbName: \"ixartzsaas\",\n\t\tdbUser: \"ixartzsaas\",\n\t\tpasswordEnvVar: \"IXARTZ_SAAS_DB_PASSWORD\",\n\t},\n};\n\n/**\n * Get the list of database requirements for all resolved services.\n * Exported so other generators (env, composer) can access the same data.\n */\nexport function getDbRequirements(resolved: ResolverOutput): DbRequirement[] {\n\tconst reqs: DbRequirement[] = [];\n\tfor (const { definition } of resolved.services) {\n\t\tconst req = DB_REQUIREMENTS[definition.id];\n\t\tif (req) {\n\t\t\treqs.push({\n\t\t\t\tserviceId: definition.id,\n\t\t\t\tserviceName: definition.name,\n\t\t\t\t...req,\n\t\t\t});\n\t\t}\n\t}\n\treturn reqs;\n}\n\n/**\n * Generates a PostgreSQL initialization script that creates databases and users\n * for all companion services that need their own DB.\n *\n * Returns null if PostgreSQL is not in the resolved stack or no services need extra DBs.\n * The script is designed to be mounted at /docker-entrypoint-initdb.d/init-databases.sh\n * and runs automatically during PostgreSQL's first initialization.\n */\nexport function generatePostgresInit(resolved: ResolverOutput): string | null {\n\tconst hasPostgres = resolved.services.some((s) => s.definition.id === \"postgresql\");\n\tif (!hasPostgres) return null;\n\n\tconst reqs = getDbRequirements(resolved);\n\tif (reqs.length === 0) return null;\n\n\tconst createCalls = reqs\n\t\t.map(\n\t\t\t(r) =>\n\t\t\t\t`create_db_and_user \"${r.dbName}\" \"${r.dbUser}\" \"\\${${r.passwordEnvVar}:-$POSTGRES_PASSWORD}\"`,\n\t\t)\n\t\t.join(\"\\n\");\n\n\treturn `#!/bin/bash\nset -e\n\n# ═══════════════════════════════════════════════════════════════════════════════\n# PostgreSQL Initialization Script\n# Generated by better-openclaw\n#\n# This script runs automatically during PostgreSQL's first initialization.\n# It creates databases and users for all companion services in your stack.\n# ═══════════════════════════════════════════════════════════════════════════════\n\ncreate_db_and_user() {\n local db=\"$1\"\n local user=\"$2\"\n local password=\"$3\"\n\n echo \">>> Creating database '$db' with user '$user'...\"\n\n psql -v ON_ERROR_STOP=1 --username \"$POSTGRES_USER\" --dbname \"$POSTGRES_DB\" <<-EOSQL\n -- Create user if not exists\n DO \\\\$\\\\$\n BEGIN\n IF NOT EXISTS (SELECT FROM pg_catalog.pg_roles WHERE rolname = '$user') THEN\n CREATE ROLE \"$user\" WITH LOGIN PASSWORD '$password';\n RAISE NOTICE 'Created user: $user';\n ELSE\n -- Update password in case it changed\n ALTER ROLE \"$user\" WITH PASSWORD '$password';\n RAISE NOTICE 'User already exists, updated password: $user';\n END IF;\n END\n \\\\$\\\\$;\n\n -- Create database if not exists\n SELECT 'CREATE DATABASE \"$db\" OWNER \"$user\"'\n WHERE NOT EXISTS (SELECT FROM pg_database WHERE datname = '$db')\\\\gexec\n\n -- Grant privileges\n GRANT ALL PRIVILEGES ON DATABASE \"$db\" TO \"$user\";\nEOSQL\n\n echo \">>> Done: database '$db' with user '$user'\"\n}\n\necho \"═══════════════════════════════════════════════════════════\"\necho \" Initializing databases for companion services...\"\necho \"═══════════════════════════════════════════════════════════\"\n\n${createCalls}\n\necho \"\"\necho \"═══════════════════════════════════════════════════════════\"\necho \" All databases initialized successfully!\"\necho \" Services: ${reqs.map((r) => r.serviceName).join(\", \")}\"\necho \"═══════════════════════════════════════════════════════════\"\n`;\n}\n"],"mappings":";;;;;AAiBA,MAAM,kBAAoF;CACzF,KAAK;EAAE,QAAQ;EAAO,QAAQ;EAAO,gBAAgB;EAAmB;CACxE,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,MAAM;EAAE,QAAQ;EAAQ,QAAQ;EAAQ,gBAAgB;EAAoB;CAC5E,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,YAAY;EACX,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,kBAAkB;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACjG,iBAAiB;EAChB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,OAAO;EAAE,QAAQ;EAAS,QAAQ;EAAS,gBAAgB;EAAqB;CAChF,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,WAAW;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACvF,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,wBAAwB;EACvB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAEhG,aAAa;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC/F,mBAAmB;EAClB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,eAAe;EACd,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,eAAe;EACd,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD;;;;;AAMD,SAAgB,kBAAkB,UAA2C;CAC5E,MAAM,OAAwB,EAAE;AAChC,MAAK,MAAM,EAAE,gBAAgB,SAAS,UAAU;EAC/C,MAAM,MAAM,gBAAgB,WAAW;AACvC,MAAI,IACH,MAAK,KAAK;GACT,WAAW,WAAW;GACtB,aAAa,WAAW;GACxB,GAAG;GACH,CAAC;;AAGJ,QAAO;;;;;;;;;;AAWR,SAAgB,qBAAqB,UAAyC;AAE7E,KAAI,CADgB,SAAS,SAAS,MAAM,MAAM,EAAE,WAAW,OAAO,aAAa,CACjE,QAAO;CAEzB,MAAM,OAAO,kBAAkB,SAAS;AACxC,KAAI,KAAK,WAAW,EAAG,QAAO;AAS9B,QAAO;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAPa,KAClB,KACC,MACA,uBAAuB,EAAE,OAAO,KAAK,EAAE,OAAO,QAAQ,EAAE,eAAe,wBACxE,CACA,KAAK,KAAK,CAkDC;;;;;mBAKK,KAAK,KAAK,MAAM,EAAE,YAAY,CAAC,KAAK,KAAK,CAAC"}
1
+ {"version":3,"file":"postgres-init.mjs","names":[],"sources":["../../src/generators/postgres-init.ts"],"sourcesContent":["import type { ResolverOutput } from \"../types.js\";\n\n/**\n * Database requirement descriptor for a service.\n */\ninterface DbRequirement {\n\tserviceId: string;\n\tserviceName: string;\n\tdbName: string;\n\tdbUser: string;\n\tpasswordEnvVar: string;\n}\n\n/**\n * Known database requirements for services that need their own PostgreSQL database.\n * Maps service ID to the DB name, user, and password env var they expect.\n */\nconst DB_REQUIREMENTS: Record<string, Omit<DbRequirement, \"serviceId\" | \"serviceName\">> = {\n\tn8n: { dbName: \"n8n\", dbUser: \"n8n\", passwordEnvVar: \"N8N_DB_PASSWORD\" },\n\tpostiz: { dbName: \"postiz\", dbUser: \"postiz\", passwordEnvVar: \"POSTIZ_DB_PASSWORD\" },\n\toutline: { dbName: \"outline\", dbUser: \"outline\", passwordEnvVar: \"OUTLINE_DB_PASSWORD\" },\n\tdify: { dbName: \"dify\", dbUser: \"dify\", passwordEnvVar: \"DIFY_DB_PASSWORD\" },\n\ttemporal: { dbName: \"temporal\", dbUser: \"temporal\", passwordEnvVar: \"TEMPORAL_DB_PASSWORD\" },\n\tmattermost: {\n\t\tdbName: \"mattermost\",\n\t\tdbUser: \"mattermost\",\n\t\tpasswordEnvVar: \"MATTERMOST_DB_PASSWORD\",\n\t},\n\t\"matrix-synapse\": { dbName: \"synapse\", dbUser: \"synapse\", passwordEnvVar: \"SYNAPSE_DB_PASSWORD\" },\n\t\"paperless-ngx\": {\n\t\tdbName: \"paperless\",\n\t\tdbUser: \"paperless\",\n\t\tpasswordEnvVar: \"PAPERLESS_DB_PASSWORD\",\n\t},\n\tumami: { dbName: \"umami\", dbUser: \"umami\", passwordEnvVar: \"UMAMI_DB_PASSWORD\" },\n\tmatomo: { dbName: \"matomo\", dbUser: \"matomo\", passwordEnvVar: \"MATOMO_DB_PASSWORD\" },\n\tmixpost: { dbName: \"mixpost\", dbUser: \"mixpost\", passwordEnvVar: \"MIXPOST_DB_PASSWORD\" },\n\t\"cal-com\": { dbName: \"calcom\", dbUser: \"calcom\", passwordEnvVar: \"CALCOM_DB_PASSWORD\" },\n\timmich: { dbName: \"immich\", dbUser: \"immich\", passwordEnvVar: \"IMMICH_DB_PASSWORD\" },\n\tauthentik: { dbName: \"authentik\", dbUser: \"authentik\", passwordEnvVar: \"AUTHENTIK_DB_PASSWORD\" },\n\tchatwoot: { dbName: \"chatwoot\", dbUser: \"chatwoot\", passwordEnvVar: \"CHATWOOT_DB_PASSWORD\" },\n\tfirecrawl: { dbName: \"firecrawl\", dbUser: \"firecrawl\", passwordEnvVar: \"FIRECRAWL_DB_PASSWORD\" },\n\tflagsmith: { dbName: \"flagsmith\", dbUser: \"flagsmith\", passwordEnvVar: \"FLAGSMITH_DB_PASSWORD\" },\n\tinfisical: { dbName: \"infisical\", dbUser: \"infisical\", passwordEnvVar: \"INFISICAL_DB_PASSWORD\" },\n\tkeycloak: { dbName: \"keycloak\", dbUser: \"keycloak\", passwordEnvVar: \"KEYCLOAK_DB_PASSWORD\" },\n\tlistmonk: { dbName: \"listmonk\", dbUser: \"listmonk\", passwordEnvVar: \"LISTMONK_DB_PASSWORD\" },\n\t\"lasuite-meet-backend\": {\n\t\tdbName: \"meet\",\n\t\tdbUser: \"meet\",\n\t\tpasswordEnvVar: \"LASUITE_MEET_DB_PASSWORD\",\n\t},\n\topenpanel: { dbName: \"openpanel\", dbUser: \"openpanel\", passwordEnvVar: \"OPENPANEL_DB_PASSWORD\" },\n\tusesend: { dbName: \"usesend\", dbUser: \"usesend\", passwordEnvVar: \"USESEND_DB_PASSWORD\" },\n\tnextcloud: { dbName: \"nextcloud\", dbUser: \"nextcloud\", passwordEnvVar: \"NEXTCLOUD_DB_PASSWORD\" },\n\t// ── Agent Memory ────────────────────────────────────────────────────────\n\thindsight: { dbName: \"hindsight\", dbUser: \"hindsight\", passwordEnvVar: \"HINDSIGHT_DB_PASSWORD\" },\n\t// ── SaaS Boilerplates ────────────────────────────────────────────────────\n\t\"open-saas\": { dbName: \"opensaas\", dbUser: \"opensaas\", passwordEnvVar: \"OPENSAAS_DB_PASSWORD\" },\n\t\"apptension-saas\": {\n\t\tdbName: \"apptensionsaas\",\n\t\tdbUser: \"apptensionsaas\",\n\t\tpasswordEnvVar: \"APPTENSION_SAAS_DB_PASSWORD\",\n\t},\n\t\"boxyhq-saas\": {\n\t\tdbName: \"boxyhqsaas\",\n\t\tdbUser: \"boxyhqsaas\",\n\t\tpasswordEnvVar: \"BOXYHQ_SAAS_DB_PASSWORD\",\n\t},\n\t\"ixartz-saas\": {\n\t\tdbName: \"ixartzsaas\",\n\t\tdbUser: \"ixartzsaas\",\n\t\tpasswordEnvVar: \"IXARTZ_SAAS_DB_PASSWORD\",\n\t},\n};\n\n/**\n * Get the list of database requirements for all resolved services.\n * Exported so other generators (env, composer) can access the same data.\n */\nexport function getDbRequirements(resolved: ResolverOutput): DbRequirement[] {\n\tconst reqs: DbRequirement[] = [];\n\tfor (const { definition } of resolved.services) {\n\t\tconst req = DB_REQUIREMENTS[definition.id];\n\t\tif (req) {\n\t\t\treqs.push({\n\t\t\t\tserviceId: definition.id,\n\t\t\t\tserviceName: definition.name,\n\t\t\t\t...req,\n\t\t\t});\n\t\t}\n\t}\n\treturn reqs;\n}\n\n/**\n * Generates a PostgreSQL initialization script that creates databases and users\n * for all companion services that need their own DB.\n *\n * Returns null if PostgreSQL is not in the resolved stack or no services need extra DBs.\n * The script is designed to be mounted at /docker-entrypoint-initdb.d/init-databases.sh\n * and runs automatically during PostgreSQL's first initialization.\n */\nexport function generatePostgresInit(resolved: ResolverOutput): string | null {\n\tconst hasPostgres = resolved.services.some((s) => s.definition.id === \"postgresql\");\n\tif (!hasPostgres) return null;\n\n\tconst reqs = getDbRequirements(resolved);\n\tif (reqs.length === 0) return null;\n\n\tconst createCalls = reqs\n\t\t.map(\n\t\t\t(r) =>\n\t\t\t\t`create_db_and_user \"${r.dbName}\" \"${r.dbUser}\" \"\\${${r.passwordEnvVar}:-$POSTGRES_PASSWORD}\"`,\n\t\t)\n\t\t.join(\"\\n\");\n\n\treturn `#!/bin/bash\nset -e\n\n# ═══════════════════════════════════════════════════════════════════════════════\n# PostgreSQL Initialization Script\n# Generated by better-openclaw\n#\n# This script runs automatically during PostgreSQL's first initialization.\n# It creates databases and users for all companion services in your stack.\n# ═══════════════════════════════════════════════════════════════════════════════\n\ncreate_db_and_user() {\n local db=\"$1\"\n local user=\"$2\"\n local password=\"$3\"\n\n echo \">>> Creating database '$db' with user '$user'...\"\n\n psql -v ON_ERROR_STOP=1 --username \"$POSTGRES_USER\" --dbname \"$POSTGRES_DB\" <<-EOSQL\n -- Create user if not exists\n DO \\\\$\\\\$\n BEGIN\n IF NOT EXISTS (SELECT FROM pg_catalog.pg_roles WHERE rolname = '$user') THEN\n CREATE ROLE \"$user\" WITH LOGIN PASSWORD '$password';\n RAISE NOTICE 'Created user: $user';\n ELSE\n -- Update password in case it changed\n ALTER ROLE \"$user\" WITH PASSWORD '$password';\n RAISE NOTICE 'User already exists, updated password: $user';\n END IF;\n END\n \\\\$\\\\$;\n\n -- Create database if not exists\n SELECT 'CREATE DATABASE \"$db\" OWNER \"$user\"'\n WHERE NOT EXISTS (SELECT FROM pg_database WHERE datname = '$db')\\\\gexec\n\n -- Grant privileges\n GRANT ALL PRIVILEGES ON DATABASE \"$db\" TO \"$user\";\nEOSQL\n\n echo \">>> Done: database '$db' with user '$user'\"\n}\n\necho \"═══════════════════════════════════════════════════════════\"\necho \" Initializing databases for companion services...\"\necho \"═══════════════════════════════════════════════════════════\"\n\n${createCalls}\n\necho \"\"\necho \"═══════════════════════════════════════════════════════════\"\necho \" All databases initialized successfully!\"\necho \" Services: ${reqs.map((r) => r.serviceName).join(\", \")}\"\necho \"═══════════════════════════════════════════════════════════\"\n`;\n}\n"],"mappings":";;;;;AAiBA,MAAM,kBAAoF;CACzF,KAAK;EAAE,QAAQ;EAAO,QAAQ;EAAO,gBAAgB;EAAmB;CACxE,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,MAAM;EAAE,QAAQ;EAAQ,QAAQ;EAAQ,gBAAgB;EAAoB;CAC5E,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,YAAY;EACX,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,kBAAkB;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACjG,iBAAiB;EAChB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,OAAO;EAAE,QAAQ;EAAS,QAAQ;EAAS,gBAAgB;EAAqB;CAChF,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,WAAW;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACvF,QAAQ;EAAE,QAAQ;EAAU,QAAQ;EAAU,gBAAgB;EAAsB;CACpF,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,UAAU;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC5F,wBAAwB;EACvB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAChG,SAAS;EAAE,QAAQ;EAAW,QAAQ;EAAW,gBAAgB;EAAuB;CACxF,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAEhG,WAAW;EAAE,QAAQ;EAAa,QAAQ;EAAa,gBAAgB;EAAyB;CAEhG,aAAa;EAAE,QAAQ;EAAY,QAAQ;EAAY,gBAAgB;EAAwB;CAC/F,mBAAmB;EAClB,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,eAAe;EACd,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD,eAAe;EACd,QAAQ;EACR,QAAQ;EACR,gBAAgB;EAChB;CACD;;;;;AAMD,SAAgB,kBAAkB,UAA2C;CAC5E,MAAM,OAAwB,EAAE;AAChC,MAAK,MAAM,EAAE,gBAAgB,SAAS,UAAU;EAC/C,MAAM,MAAM,gBAAgB,WAAW;AACvC,MAAI,IACH,MAAK,KAAK;GACT,WAAW,WAAW;GACtB,aAAa,WAAW;GACxB,GAAG;GACH,CAAC;;AAGJ,QAAO;;;;;;;;;;AAWR,SAAgB,qBAAqB,UAAyC;AAE7E,KAAI,CADgB,SAAS,SAAS,MAAM,MAAM,EAAE,WAAW,OAAO,aAAa,CACjE,QAAO;CAEzB,MAAM,OAAO,kBAAkB,SAAS;AACxC,KAAI,KAAK,WAAW,EAAG,QAAO;AAS9B,QAAO;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAPa,KAClB,KACC,MACA,uBAAuB,EAAE,OAAO,KAAK,EAAE,OAAO,QAAQ,EAAE,eAAe,wBACxE,CACA,KAAK,KAAK,CAkDC;;;;;mBAKK,KAAK,KAAK,MAAM,EAAE,YAAY,CAAC,KAAK,KAAK,CAAC"}
@@ -1,3 +1,3 @@
1
1
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
2
- const require_skills = require("../skills-BlzpHmpH.cjs");
2
+ const require_skills = require("../skills-BSF7iNa4.cjs");
3
3
  exports.generateSkillFiles = require_skills.generateSkillFiles;
@@ -1 +1 @@
1
- {"version":3,"file":"skills.d.cts","names":[],"sources":["../../src/generators/skills.ts"],"mappings":";;;;;AAmiBA;;;;;iBAAgB,kBAAA,CAAmB,QAAA,EAAU,cAAA,GAAiB,MAAA"}
1
+ {"version":3,"file":"skills.d.cts","names":[],"sources":["../../src/generators/skills.ts"],"mappings":";;;;;AAirBA;;;;;iBAAgB,kBAAA,CAAmB,QAAA,EAAU,cAAA,GAAiB,MAAA"}
@@ -1 +1 @@
1
- {"version":3,"file":"skills.d.mts","names":[],"sources":["../../src/generators/skills.ts"],"mappings":";;;;;;AAmiBA;;;;iBAAgB,kBAAA,CAAmB,QAAA,EAAU,cAAA,GAAiB,MAAA"}
1
+ {"version":3,"file":"skills.d.mts","names":[],"sources":["../../src/generators/skills.ts"],"mappings":";;;;;;AAirBA;;;;iBAAgB,kBAAA,CAAmB,QAAA,EAAU,cAAA,GAAiB,MAAA"}