@elizaos/cli 1.6.2-alpha.1 → 1.6.2-alpha.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -152,7 +152,7 @@ Manage an ElizaOS plugin.
152
152
  - `upgrade <path>`: Upgrade a plugin from v0.x to v1.x using AI
153
153
  - Arguments: `<path>` (GitHub URL or local path)
154
154
  - Options: `--api-key <key>`, `--skip-tests`, `--skip-validation`
155
- - See [Plugin Upgrade Documentation](./docs/PLUGIN_UPGRADE.md) for details
155
+ - See [Plugin Upgrade Documentation](./src/utils/upgrade/README.md) for details
156
156
 
157
157
  ### Agent Management
158
158
 
@@ -312,7 +312,7 @@ ElizaOS employs a dual testing strategy:
312
312
 
313
313
  #### `elizaos tee phala <subcommand>`
314
314
 
315
- Manage TEE deployments using the official [Phala Cloud CLI](https://docs.phala.network/phala-cloud/references/tee-cloud-cli). This integration provides seamless access to Phala's decentralized TEE cloud infrastructure directly through the ElizaOS CLI.
315
+ Manage TEE deployments using the official [Phala Cloud CLI](https://docs.phala.com/phala-cloud/references/phala-cloud-cli/phala/docker). This integration provides seamless access to Phala's decentralized TEE cloud infrastructure directly through the ElizaOS CLI.
316
316
 
317
317
  All Phala Cloud CLI commands are passed through transparently, allowing you to use the full functionality of Phala's TEE platform.
318
318
 
@@ -1 +1 @@
1
- {"version":3,"file":"runtime-factory.d.ts","sourceRoot":"","sources":["../../../../src/commands/scenario/src/runtime-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAAa,IAAI,EAAE,aAAa,EAAgB,MAAM,eAAe,CAAC;AAC7E,OAAO,EAAE,WAAW,EAAiB,MAAM,iBAAiB,CAAC;AA+D7D;;;;;GAKG;AACH,wBAAsB,oBAAoB,CACxC,cAAc,GAAE,WAAW,GAAG,IAAW,EACzC,WAAW,GAAE,MAAa,GACzB,OAAO,CAAC;IACT,MAAM,EAAE,WAAW,CAAC;IACpB,IAAI,EAAE,MAAM,CAAC;IACb,aAAa,EAAE,OAAO,CAAC;CACxB,CAAC,CA4ED;AAED;;;;;;GAMG;AACH,wBAAsB,mBAAmB,CACvC,MAAM,EAAE,WAAW,EACnB,SAAS,GAAE,MAAyB,EACpC,WAAW,GAAE,MAAM,EAIlB,GACA,OAAO,CAAC;IACT,OAAO,EAAE,aAAa,CAAC;IACvB,OAAO,EAAE,IAAI,CAAC;CACf,CAAC,CAqCD;AAED;;;GAGG;AACH,wBAAsB,4BAA4B,CAChD,cAAc,GAAE,WAAW,GAAG,IAAW,EACzC,WAAW,GAAE,MAAa,EAC1B,WAAW,GAAE,MAAM,EAIlB,EACD,SAAS,GAAE,MAAyB,GACnC,OAAO,CAAC;IACT,MAAM,EAAE,WAAW,CAAC;IACpB,OAAO,EAAE,aAAa,CAAC;IACvB,OAAO,EAAE,IAAI,CAAC;IACd,IAAI,EAAE,MAAM,CAAC;IACb,aAAa,EAAE,OAAO,CAAC;CACxB,CAAC,CAQD;AAED;;GAEG;AACH,wBAAsB,sBAAsB,CAAC,MAAM,EAAE,WAAW,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAyB7F;AAED;;;;;;;;;GASG;AACH,wBAAsB,cAAc,CAClC,MAAM,EAAE,WAAW,EACnB,OAAO,EAAE,IAAI,EACb,KAAK,EAAE,MAAM,EACb,SAAS,GAAE,MAAc,EACzB,UAAU,CAAC,EAAE,MAAM,GAAG,IAAI,EAC1B,iBAAiB,CAAC,EAAE,IAAI,GACvB,OAAO,CAAC;IAAE,QAAQ,EAAE,MAAM,CAAC;IAAC,MAAM,EAAE,IAAI,CAAA;CAAE,CAAC,CAgQ7C"}
1
+ {"version":3,"file":"runtime-factory.d.ts","sourceRoot":"","sources":["../../../../src/commands/scenario/src/runtime-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAAa,IAAI,EAAE,aAAa,EAA0C,MAAM,eAAe,CAAC;AACvG,OAAO,EAAE,WAAW,EAAE,MAAM,iBAAiB,CAAC;AA4D9C;;;;;GAKG;AACH,wBAAsB,oBAAoB,CACxC,cAAc,GAAE,WAAW,GAAG,IAAW,EACzC,WAAW,GAAE,MAAa,GACzB,OAAO,CAAC;IACT,MAAM,EAAE,WAAW,CAAC;IACpB,IAAI,EAAE,MAAM,CAAC;IACb,aAAa,EAAE,OAAO,CAAC;CACxB,CAAC,CA4ED;AAED;;;;;;GAMG;AACH,wBAAsB,mBAAmB,CACvC,MAAM,EAAE,WAAW,EACnB,SAAS,GAAE,MAAyB,EACpC,WAAW,GAAE,MAAM,EAIlB,GACA,OAAO,CAAC;IACT,OAAO,EAAE,aAAa,CAAC;IACvB,OAAO,EAAE,IAAI,CAAC;CACf,CAAC,CAkCD;AAED;;;GAGG;AACH,wBAAsB,4BAA4B,CAChD,cAAc,GAAE,WAAW,GAAG,IAAW,EACzC,WAAW,GAAE,MAAa,EAC1B,WAAW,GAAE,MAAM,EAIlB,EACD,SAAS,GAAE,MAAyB,GACnC,OAAO,CAAC;IACT,MAAM,EAAE,WAAW,CAAC;IACpB,OAAO,EAAE,aAAa,CAAC;IACvB,OAAO,EAAE,IAAI,CAAC;IACd,IAAI,EAAE,MAAM,CAAC;IACb,aAAa,EAAE,OAAO,CAAC;CACxB,CAAC,CAQD;AAED;;GAEG;AACH,wBAAsB,sBAAsB,CAAC,MAAM,EAAE,WAAW,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAyB7F;AAED;;;;;;;;;GASG;AACH,wBAAsB,cAAc,CAClC,MAAM,EAAE,WAAW,EACnB,OAAO,EAAE,IAAI,EACb,KAAK,EAAE,MAAM,EACb,SAAS,GAAE,MAAc,EACzB,UAAU,CAAC,EAAE,MAAM,GAAG,IAAI,EAC1B,iBAAiB,CAAC,EAAE,IAAI,GACvB,OAAO,CAAC;IAAE,QAAQ,EAAE,MAAM,CAAC;IAAC,MAAM,EAAE,IAAI,CAAA;CAAE,CAAC,CAgQ7C"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/commands/start/index.ts"],"names":[],"mappings":"AAQA,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAOpC,eAAO,MAAM,KAAK,SA+Nd,CAAC;AAGL,cAAc,SAAS,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/commands/start/index.ts"],"names":[],"mappings":"AAQA,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAOpC,eAAO,MAAM,KAAK,SAgPd,CAAC;AAGL,cAAc,SAAS,CAAC"}
package/dist/index.js CHANGED
@@ -2470,6 +2470,9 @@ var require_parse_options = __commonJS((exports, module) => {
2470
2470
  var require_identifiers = __commonJS((exports, module) => {
2471
2471
  var numeric = /^[0-9]+$/;
2472
2472
  var compareIdentifiers = (a, b) => {
2473
+ if (typeof a === "number" && typeof b === "number") {
2474
+ return a === b ? 0 : a < b ? -1 : 1;
2475
+ }
2473
2476
  const anum = numeric.test(a);
2474
2477
  const bnum = numeric.test(b);
2475
2478
  if (anum && bnum) {
@@ -2572,7 +2575,25 @@ var require_semver = __commonJS((exports, module) => {
2572
2575
  if (!(other instanceof SemVer)) {
2573
2576
  other = new SemVer(other, this.options);
2574
2577
  }
2575
- return compareIdentifiers(this.major, other.major) || compareIdentifiers(this.minor, other.minor) || compareIdentifiers(this.patch, other.patch);
2578
+ if (this.major < other.major) {
2579
+ return -1;
2580
+ }
2581
+ if (this.major > other.major) {
2582
+ return 1;
2583
+ }
2584
+ if (this.minor < other.minor) {
2585
+ return -1;
2586
+ }
2587
+ if (this.minor > other.minor) {
2588
+ return 1;
2589
+ }
2590
+ if (this.patch < other.patch) {
2591
+ return -1;
2592
+ }
2593
+ if (this.patch > other.patch) {
2594
+ return 1;
2595
+ }
2596
+ return 0;
2576
2597
  }
2577
2598
  comparePre(other) {
2578
2599
  if (!(other instanceof SemVer)) {
@@ -3249,6 +3270,7 @@ var require_range = __commonJS((exports, module) => {
3249
3270
  return result;
3250
3271
  };
3251
3272
  var parseComparator = (comp, options) => {
3273
+ comp = comp.replace(re[t.BUILD], "");
3252
3274
  debug("comp", comp, options);
3253
3275
  comp = replaceCarets(comp, options);
3254
3276
  debug("caret", comp);
@@ -4727,7 +4749,7 @@ __export(exports_version, {
4727
4749
  BUILD_TIME: () => BUILD_TIME,
4728
4750
  BUILD_ENV: () => BUILD_ENV
4729
4751
  });
4730
- var CLI_VERSION = "1.6.2-alpha.1", CLI_NAME = "@elizaos/cli", CLI_DESCRIPTION = "elizaOS CLI - Manage your AI agents and plugins", BUILD_TIME = "2025-10-03T20:17:04.912Z", BUILD_ENV = "production", version_default;
4752
+ var CLI_VERSION = "1.6.2-alpha.11", CLI_NAME = "@elizaos/cli", CLI_DESCRIPTION = "elizaOS CLI - Manage your AI agents and plugins", BUILD_TIME = "2025-10-09T09:25:35.495Z", BUILD_ENV = "production", version_default;
4731
4753
  var init_version = __esm(() => {
4732
4754
  version_default = {
4733
4755
  version: CLI_VERSION,
@@ -37646,7 +37668,7 @@ var init_environment = __esm(() => {
37646
37668
  });
37647
37669
 
37648
37670
  // ../../node_modules/puppeteer-core/lib/esm/puppeteer/generated/version.js
37649
- var packageVersion = "24.22.3";
37671
+ var packageVersion = "24.23.0";
37650
37672
 
37651
37673
  // ../../node_modules/puppeteer-core/lib/esm/puppeteer/util/assert.js
37652
37674
  var assert2 = (value, message) => {
@@ -41859,15 +41881,12 @@ class HTTPRequest {
41859
41881
  };
41860
41882
  constructor() {}
41861
41883
  continueRequestOverrides() {
41862
- assert2(this.interception.enabled, "Request Interception is not enabled!");
41863
41884
  return this.interception.requestOverrides;
41864
41885
  }
41865
41886
  responseForRequest() {
41866
- assert2(this.interception.enabled, "Request Interception is not enabled!");
41867
41887
  return this.interception.response;
41868
41888
  }
41869
41889
  abortErrorReason() {
41870
- assert2(this.interception.enabled, "Request Interception is not enabled!");
41871
41890
  return this.interception.abortReason;
41872
41891
  }
41873
41892
  interceptResolutionState() {
@@ -41903,15 +41922,15 @@ class HTTPRequest {
41903
41922
  return await this._continue(this.interception.requestOverrides);
41904
41923
  }
41905
41924
  }
41906
- #canBeIntercepted() {
41907
- return !this.url().startsWith("data:") && !this._fromMemoryCache;
41925
+ verifyInterception() {
41926
+ assert2(this.interception.enabled, "Request Interception is not enabled!");
41927
+ assert2(!this.interception.handled, "Request is already handled!");
41908
41928
  }
41909
41929
  async continue(overrides = {}, priority) {
41910
- if (!this.#canBeIntercepted()) {
41930
+ this.verifyInterception();
41931
+ if (!this.canBeIntercepted()) {
41911
41932
  return;
41912
41933
  }
41913
- assert2(this.interception.enabled, "Request Interception is not enabled!");
41914
- assert2(!this.interception.handled, "Request is already handled!");
41915
41934
  if (priority === undefined) {
41916
41935
  return await this._continue(overrides);
41917
41936
  }
@@ -41932,11 +41951,10 @@ class HTTPRequest {
41932
41951
  return;
41933
41952
  }
41934
41953
  async respond(response, priority) {
41935
- if (!this.#canBeIntercepted()) {
41954
+ this.verifyInterception();
41955
+ if (!this.canBeIntercepted()) {
41936
41956
  return;
41937
41957
  }
41938
- assert2(this.interception.enabled, "Request Interception is not enabled!");
41939
- assert2(!this.interception.handled, "Request is already handled!");
41940
41958
  if (priority === undefined) {
41941
41959
  return await this._respond(response);
41942
41960
  }
@@ -41956,13 +41974,12 @@ class HTTPRequest {
41956
41974
  }
41957
41975
  }
41958
41976
  async abort(errorCode = "failed", priority) {
41959
- if (!this.#canBeIntercepted()) {
41977
+ this.verifyInterception();
41978
+ if (!this.canBeIntercepted()) {
41960
41979
  return;
41961
41980
  }
41962
41981
  const errorReason = errorReasons[errorCode];
41963
41982
  assert2(errorReason, "Unknown error code: " + errorCode);
41964
- assert2(this.interception.enabled, "Request Interception is not enabled!");
41965
- assert2(!this.interception.handled, "Request is already handled!");
41966
41983
  if (priority === undefined) {
41967
41984
  return await this._abort(errorReason);
41968
41985
  }
@@ -57661,8 +57678,8 @@ var init_HTTPRequest2 = __esm(() => {
57661
57678
  init_HTTPResponse();
57662
57679
  requests = new WeakMap;
57663
57680
  BidiHTTPRequest = class BidiHTTPRequest extends HTTPRequest {
57664
- static from(bidiRequest, frame, redirect) {
57665
- const request = new _a3(bidiRequest, frame, redirect);
57681
+ static from(bidiRequest, frame, isNetworkInterceptionEnabled, redirect) {
57682
+ const request = new _a3(bidiRequest, frame, isNetworkInterceptionEnabled, redirect);
57666
57683
  request.#initialize();
57667
57684
  return request;
57668
57685
  }
@@ -57671,10 +57688,10 @@ var init_HTTPRequest2 = __esm(() => {
57671
57688
  id;
57672
57689
  #frame;
57673
57690
  #request;
57674
- constructor(request, frame, redirect) {
57691
+ constructor(request, frame, isNetworkInterceptionEnabled, redirect) {
57675
57692
  super();
57676
57693
  requests.set(request, this);
57677
- this.interception.enabled = request.isBlocked;
57694
+ this.interception.enabled = isNetworkInterceptionEnabled;
57678
57695
  this.#request = request;
57679
57696
  this.#frame = frame;
57680
57697
  this.#redirectChain = redirect ? redirect.#redirectChain : [];
@@ -57685,7 +57702,7 @@ var init_HTTPRequest2 = __esm(() => {
57685
57702
  }
57686
57703
  #initialize() {
57687
57704
  this.#request.on("redirect", (request) => {
57688
- const httpRequest = _a3.from(request, this.#frame, this);
57705
+ const httpRequest = _a3.from(request, this.#frame, this.interception.enabled, this);
57689
57706
  this.#redirectChain.push(this);
57690
57707
  request.once("success", () => {
57691
57708
  this.#frame.page().trustedEmitter.emit("requestfinished", httpRequest);
@@ -57708,6 +57725,15 @@ var init_HTTPRequest2 = __esm(() => {
57708
57725
  });
57709
57726
  }
57710
57727
  }
57728
+ canBeIntercepted() {
57729
+ return this.#request.isBlocked;
57730
+ }
57731
+ interceptResolutionState() {
57732
+ if (!this.#request.isBlocked) {
57733
+ return { action: InterceptResolutionAction.Disabled };
57734
+ }
57735
+ return super.interceptResolutionState();
57736
+ }
57711
57737
  url() {
57712
57738
  return this.#request.url;
57713
57739
  }
@@ -58593,7 +58619,7 @@ var init_Frame2 = __esm(() => {
58593
58619
  this.page().trustedEmitter.emit("framedetached", this);
58594
58620
  });
58595
58621
  this.browsingContext.on("request", ({ request }) => {
58596
- const httpRequest = BidiHTTPRequest.from(request, this);
58622
+ const httpRequest = BidiHTTPRequest.from(request, this, this.page().isNetworkInterceptionEnabled);
58597
58623
  request.once("success", () => {
58598
58624
  this.page().trustedEmitter.emit("requestfinished", httpRequest);
58599
58625
  });
@@ -59489,7 +59515,7 @@ function testUrlMatchCookie(cookie, url2) {
59489
59515
  }
59490
59516
  function bidiToPuppeteerCookie(bidiCookie, returnCompositePartitionKey = false) {
59491
59517
  const partitionKey = bidiCookie[CDP_SPECIFIC_PREFIX + "partitionKey"];
59492
- function getParitionKey() {
59518
+ function getPartitionKey() {
59493
59519
  if (typeof partitionKey === "string") {
59494
59520
  return { partitionKey };
59495
59521
  }
@@ -59520,7 +59546,7 @@ function bidiToPuppeteerCookie(bidiCookie, returnCompositePartitionKey = false)
59520
59546
  expires: bidiCookie.expiry ?? -1,
59521
59547
  session: bidiCookie.expiry === undefined || bidiCookie.expiry <= 0,
59522
59548
  ...cdpSpecificCookiePropertiesFromBidiToPuppeteer(bidiCookie, "sameParty", "sourceScheme", "partitionKeyOpaque", "priority"),
59523
- ...getParitionKey()
59549
+ ...getPartitionKey()
59524
59550
  };
59525
59551
  }
59526
59552
  function cdpSpecificCookiePropertiesFromBidiToPuppeteer(bidiCookie, ...propertyNames) {
@@ -60138,9 +60164,12 @@ var init_Page2 = __esm(() => {
60138
60164
  workers() {
60139
60165
  return [...this.#workers];
60140
60166
  }
60141
- #userInterception;
60167
+ get isNetworkInterceptionEnabled() {
60168
+ return Boolean(this.#requestInterception) || Boolean(this.#extraHeadersInterception) || Boolean(this.#authInterception) || Boolean(this.#userAgentInterception);
60169
+ }
60170
+ #requestInterception;
60142
60171
  async setRequestInterception(enable) {
60143
- this.#userInterception = await this.#toggleInterception(["beforeRequestSent"], this.#userInterception, enable);
60172
+ this.#requestInterception = await this.#toggleInterception(["beforeRequestSent"], this.#requestInterception, enable);
60144
60173
  }
60145
60174
  _extraHTTPHeaders = {};
60146
60175
  #extraHeadersInterception;
@@ -60869,6 +60898,7 @@ var __runInitializers19 = function(thisArg, initializers, value) {
60869
60898
  return value;
60870
60899
  }, __disposeResources19, Browser4;
60871
60900
  var init_Browser2 = __esm(() => {
60901
+ init_Errors();
60872
60902
  init_EventEmitter();
60873
60903
  init_decorators();
60874
60904
  init_disposable();
@@ -61062,10 +61092,31 @@ var init_Browser2 = __esm(() => {
61062
61092
  sslProxy: options.proxyServer,
61063
61093
  noProxy: options.proxyBypassList
61064
61094
  };
61065
- const { result: { userContext: context2 } } = await this.session.send("browser.createUserContext", {
61095
+ const { result: { userContext } } = await this.session.send("browser.createUserContext", {
61066
61096
  proxy: proxyConfig
61067
61097
  });
61068
- return this.#createUserContext(context2);
61098
+ if (options.downloadBehavior?.policy === "allowAndName") {
61099
+ throw new UnsupportedOperation("`allowAndName` is not supported in WebDriver BiDi");
61100
+ }
61101
+ if (options.downloadBehavior?.policy === "allow") {
61102
+ if (options.downloadBehavior.downloadPath === undefined) {
61103
+ throw new UnsupportedOperation("`downloadPath` is required in `allow` download behavior");
61104
+ }
61105
+ await this.session.send("browser.setDownloadBehavior", {
61106
+ downloadBehavior: {
61107
+ type: "allowed",
61108
+ destinationFolder: options.downloadBehavior.downloadPath
61109
+ },
61110
+ userContexts: [userContext]
61111
+ });
61112
+ }
61113
+ if (options.downloadBehavior?.policy === "deny") {
61114
+ await this.session.send("browser.setDownloadBehavior", {
61115
+ downloadBehavior: { type: "denied" },
61116
+ userContexts: [userContext]
61117
+ });
61118
+ }
61119
+ return this.#createUserContext(userContext);
61069
61120
  }
61070
61121
  async installExtension(path47) {
61071
61122
  const { result: { extension } } = await this.session.send("webExtension.install", {
@@ -61395,7 +61446,7 @@ var init_Browser3 = __esm(() => {
61395
61446
  "goog:prerenderingDisabled": true
61396
61447
  }
61397
61448
  });
61398
- await session.subscribe((session.capabilities.browserName.toLocaleLowerCase().includes("firefox") ? BidiBrowser2.subscribeModules : [...BidiBrowser2.subscribeModules, ...BidiBrowser2.subscribeCdpEvents]).filter((module) => {
61449
+ await session.subscribe((opts.cdpConnection ? [...BidiBrowser2.subscribeModules, ...BidiBrowser2.subscribeCdpEvents] : BidiBrowser2.subscribeModules).filter((module) => {
61399
61450
  if (!opts.networkEnabled) {
61400
61451
  return module !== "network" && module !== "goog:cdp.Network.requestWillBeSent";
61401
61452
  }
@@ -273387,8 +273438,8 @@ __export(exports_runtime_factory, {
273387
273438
  createScenarioAgent: () => createScenarioAgent,
273388
273439
  askAgentViaApi: () => askAgentViaApi
273389
273440
  });
273390
- import { stringToUuid as stringToUuid2 } from "@elizaos/core";
273391
- import { AgentServer, ConfigManager } from "@elizaos/server";
273441
+ import { stringToUuid as stringToUuid2, setDefaultSecretsFromEnv } from "@elizaos/core";
273442
+ import { AgentServer } from "@elizaos/server";
273392
273443
  import { ElizaClient } from "@elizaos/api-client";
273393
273444
  import { ChannelType, stringToUuid as stringToUuidCore } from "@elizaos/core";
273394
273445
  import fs38 from "fs";
@@ -273501,8 +273552,7 @@ async function createScenarioAgent(server2, agentName = "scenario-agent", plugin
273501
273552
  chat: ["Direct", "Helpful"]
273502
273553
  }
273503
273554
  };
273504
- const configManager = new ConfigManager;
273505
- await configManager.setDefaultSecretsFromEnv(character);
273555
+ await setDefaultSecretsFromEnv(character);
273506
273556
  const [runtime] = await server2.startAgents([character]);
273507
273557
  if (!runtime) {
273508
273558
  throw new Error(`Failed to start agent: ${character.name}`);
@@ -297629,6 +297679,9 @@ class CdpHTTPRequest extends HTTPRequest {
297629
297679
  errorText: this._failureText
297630
297680
  };
297631
297681
  }
297682
+ canBeIntercepted() {
297683
+ return !this.url().startsWith("data:") && !this._fromMemoryCache;
297684
+ }
297632
297685
  async _continue(overrides = {}) {
297633
297686
  const { url: url2, method, postData, headers } = overrides;
297634
297687
  this.interception.handled = true;
@@ -303338,9 +303391,9 @@ init_WaitTask();
303338
303391
  init_XPathQueryHandler();
303339
303392
  // ../../node_modules/puppeteer-core/lib/esm/puppeteer/revisions.js
303340
303393
  var PUPPETEER_REVISIONS = Object.freeze({
303341
- chrome: "140.0.7339.207",
303342
- "chrome-headless-shell": "140.0.7339.207",
303343
- firefox: "stable_143.0.1"
303394
+ chrome: "141.0.7390.54",
303395
+ "chrome-headless-shell": "141.0.7390.54",
303396
+ firefox: "stable_143.0.3"
303344
303397
  });
303345
303398
  // ../../node_modules/puppeteer-core/lib/esm/puppeteer/util/util.js
303346
303399
  init_Deferred();
@@ -305532,12 +305585,13 @@ class BrowserLauncher {
305532
305585
  const transport = new PipeTransport(pipeWrite, pipeRead);
305533
305586
  return new Connection("", transport, opts.slowMo, opts.protocolTimeout);
305534
305587
  }
305535
- async createBiDiOverCdpBrowser(browserProcess, connection, closeCallback, opts) {
305588
+ async createBiDiOverCdpBrowser(browserProcess, cdpConnection, closeCallback, opts) {
305589
+ const bidiOnly = process.env["PUPPETEER_WEBDRIVER_BIDI_ONLY"] === "true";
305536
305590
  const BiDi = await Promise.resolve().then(() => (init_bidi(), exports_bidi));
305537
- const bidiConnection = await BiDi.connectBidiOverCdp(connection);
305591
+ const bidiConnection = await BiDi.connectBidiOverCdp(cdpConnection);
305538
305592
  return await BiDi.BidiBrowser.create({
305539
305593
  connection: bidiConnection,
305540
- cdpConnection: connection,
305594
+ cdpConnection: bidiOnly ? undefined : cdpConnection,
305541
305595
  closeCallback,
305542
305596
  process: browserProcess.nodeProcess,
305543
305597
  defaultViewport: opts.defaultViewport,
@@ -307267,7 +307321,23 @@ var start = new Command().name("start").description("Build and start the Eliza a
307267
307321
  dataDir: process.env.PGLITE_DATA_DIR,
307268
307322
  postgresUrl: process.env.POSTGRES_URL
307269
307323
  });
307270
- await server2.start(options.port || 3000);
307324
+ let port;
307325
+ if (options.port !== undefined) {
307326
+ port = options.port;
307327
+ } else {
307328
+ const envPort = process.env.SERVER_PORT;
307329
+ if (envPort) {
307330
+ try {
307331
+ port = validatePort(envPort);
307332
+ } catch {
307333
+ logger42.warn(`Invalid SERVER_PORT "${envPort}", falling back to 3000`);
307334
+ port = 3000;
307335
+ }
307336
+ } else {
307337
+ port = 3000;
307338
+ }
307339
+ }
307340
+ await server2.start(port);
307271
307341
  if (projectAgents && projectAgents.length > 0) {
307272
307342
  const runtimes = [];
307273
307343
  const agentRuntimeMap = new Map;
@@ -309529,5 +309599,5 @@ main().catch((error47) => {
309529
309599
  process.exit(1);
309530
309600
  });
309531
309601
 
309532
- //# debugId=9C6EA047380CA49A64756E2164756E21
309602
+ //# debugId=9B60106BF07FA92664756E2164756E21
309533
309603
  //# sourceMappingURL=index.js.map