@kalphq/cli 0.0.0-dev-20260509012111 → 0.0.0-dev-20260510044447
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{add-KRHLYYTO.js → add-XTXSSGC5.js} +3 -2
- package/dist/{add-KRHLYYTO.js.map → add-XTXSSGC5.js.map} +1 -1
- package/dist/chunk-5RODADXW.js +65 -0
- package/dist/chunk-5RODADXW.js.map +1 -0
- package/dist/chunk-FO24J6XL.js +23 -0
- package/dist/chunk-FO24J6XL.js.map +1 -0
- package/dist/chunk-MM6CND3O.js +84 -0
- package/dist/chunk-MM6CND3O.js.map +1 -0
- package/dist/chunk-TTKFK7NJ.js +232 -0
- package/dist/chunk-TTKFK7NJ.js.map +1 -0
- package/dist/{delete-47ZP6XRB.js → delete-N4OSUK3X.js} +3 -2
- package/dist/{delete-47ZP6XRB.js.map → delete-N4OSUK3X.js.map} +1 -1
- package/dist/deploy-PKK545YR.js +63 -0
- package/dist/deploy-PKK545YR.js.map +1 -0
- package/dist/dev-LE5FR6BF.js +74 -0
- package/dist/dev-LE5FR6BF.js.map +1 -0
- package/dist/index.js +15 -10
- package/dist/index.js.map +1 -1
- package/dist/{list-3ZQIFUOT.js → list-VMJPWHIH.js} +3 -2
- package/dist/{list-3ZQIFUOT.js.map → list-VMJPWHIH.js.map} +1 -1
- package/dist/login-M5Y57ZZU.js +73 -0
- package/dist/login-M5Y57ZZU.js.map +1 -0
- package/dist/{logout-V67DZZXO.js → logout-U5V5K775.js} +5 -4
- package/dist/logout-U5V5K775.js.map +1 -0
- package/dist/push-EI646ZVZ.js +289 -0
- package/dist/push-EI646ZVZ.js.map +1 -0
- package/dist/runtime-template/studio/assets/QueryClientProvider-D-LxTiBd.js +1 -0
- package/dist/runtime-template/studio/assets/index-DpfZiZAs.js +75 -0
- package/dist/runtime-template/studio/assets/inter-cyrillic-ext-wght-normal-BOeWTOD4.woff2 +0 -0
- package/dist/runtime-template/studio/assets/inter-cyrillic-wght-normal-DqGufNeO.woff2 +0 -0
- package/dist/runtime-template/studio/assets/inter-greek-ext-wght-normal-DlzME5K_.woff2 +0 -0
- package/dist/runtime-template/studio/assets/inter-greek-wght-normal-CkhJZR-_.woff2 +0 -0
- package/dist/runtime-template/studio/assets/inter-latin-ext-wght-normal-DO1Apj_S.woff2 +0 -0
- package/dist/runtime-template/studio/assets/inter-latin-wght-normal-Dx4kXJAl.woff2 +0 -0
- package/dist/runtime-template/studio/assets/inter-vietnamese-wght-normal-CBcvBZtf.woff2 +0 -0
- package/dist/runtime-template/studio/assets/replay._executionId-Cs7M_t4A.js +41 -0
- package/dist/runtime-template/studio/assets/routes-DM2dr3uc.js +1 -0
- package/dist/runtime-template/studio/assets/styles-DnCmVxlg.css +2 -0
- package/dist/runtime-template/studio/assets/useAuth-CNMCKtPc.js +1 -0
- package/dist/runtime-template/studio/favicon.ico +0 -0
- package/dist/runtime-template/studio/index.html +13 -0
- package/dist/runtime-template/studio/logo192.png +0 -0
- package/dist/runtime-template/studio/logo512.png +0 -0
- package/dist/runtime-template/studio/manifest.json +25 -0
- package/dist/runtime-template/studio/robots.txt +3 -0
- package/dist/runtime-template/worker-entry.js +2 -0
- package/dist/{secrets-KFMVBKJQ.js → secrets-P7ADVLOS.js} +5 -5
- package/dist/{sync-YFM5P3IS.js → sync-OTO44GQS.js} +3 -2
- package/dist/{sync-YFM5P3IS.js.map → sync-OTO44GQS.js.map} +1 -1
- package/package.json +8 -5
- package/dist/chunk-6LLXGS2P.js +0 -25
- package/dist/chunk-6LLXGS2P.js.map +0 -1
- package/dist/login-JYPWGL6P.js +0 -38
- package/dist/login-JYPWGL6P.js.map +0 -1
- package/dist/logout-V67DZZXO.js.map +0 -1
- package/dist/push-UZADV7TZ.js +0 -255
- package/dist/push-UZADV7TZ.js.map +0 -1
- package/dist/studio-SSJ27ZHR.js +0 -103
- package/dist/studio-SSJ27ZHR.js.map +0 -1
- /package/dist/{secrets-KFMVBKJQ.js.map → secrets-P7ADVLOS.js.map} +0 -0
package/dist/studio-SSJ27ZHR.js
DELETED
|
@@ -1,103 +0,0 @@
|
|
|
1
|
-
#!/usr/bin/env node
|
|
2
|
-
|
|
3
|
-
// src/commands/studio.ts
|
|
4
|
-
import { defineCommand } from "citty";
|
|
5
|
-
import * as p from "@clack/prompts";
|
|
6
|
-
import pc from "picocolors";
|
|
7
|
-
import { readFile, writeFile } from "fs/promises";
|
|
8
|
-
import { join } from "path";
|
|
9
|
-
import { randomBytes } from "crypto";
|
|
10
|
-
import { SignJWT } from "jose";
|
|
11
|
-
import open from "open";
|
|
12
|
-
var LOGO = "\u{1F98B}";
|
|
13
|
-
async function ensureSecretKey(cwd) {
|
|
14
|
-
const envPath = join(cwd, ".env");
|
|
15
|
-
try {
|
|
16
|
-
const envContent2 = await readFile(envPath, "utf-8");
|
|
17
|
-
const match = envContent2.match(/^KALP_SECRET_KEY=(.+)$/m);
|
|
18
|
-
if (match && match[1]) {
|
|
19
|
-
return { key: match[1].trim(), isNew: false };
|
|
20
|
-
}
|
|
21
|
-
} catch {
|
|
22
|
-
}
|
|
23
|
-
const secretKey = randomBytes(32).toString("hex");
|
|
24
|
-
const envContent = `# Kalp Studio Authentication Secret
|
|
25
|
-
KALP_SECRET_KEY=${secretKey}
|
|
26
|
-
`;
|
|
27
|
-
await writeFile(envPath, envContent, "utf-8");
|
|
28
|
-
return { key: secretKey, isNew: true };
|
|
29
|
-
}
|
|
30
|
-
async function readWorkerUrl(cwd) {
|
|
31
|
-
try {
|
|
32
|
-
const statePath = join(cwd, ".kalp", "state.json");
|
|
33
|
-
const content = await readFile(statePath, "utf-8");
|
|
34
|
-
const state = JSON.parse(content);
|
|
35
|
-
return state.workerUrl || null;
|
|
36
|
-
} catch {
|
|
37
|
-
return null;
|
|
38
|
-
}
|
|
39
|
-
}
|
|
40
|
-
var studio_default = defineCommand({
|
|
41
|
-
meta: { name: "studio", description: "Open Kalp Studio in browser" },
|
|
42
|
-
args: {
|
|
43
|
-
url: {
|
|
44
|
-
type: "string",
|
|
45
|
-
alias: "u",
|
|
46
|
-
description: "Worker URL (overrides saved state)",
|
|
47
|
-
required: false
|
|
48
|
-
}
|
|
49
|
-
},
|
|
50
|
-
async run({ args }) {
|
|
51
|
-
const cwd = process.cwd();
|
|
52
|
-
p.intro(`${LOGO} ${pc.bold("kalp studio")}`);
|
|
53
|
-
const s = p.spinner();
|
|
54
|
-
s.start("Checking authentication secret");
|
|
55
|
-
const { key: secretKey, isNew: isNewSecret } = await ensureSecretKey(cwd);
|
|
56
|
-
s.stop("Authentication secret ready");
|
|
57
|
-
if (isNewSecret) {
|
|
58
|
-
p.log.warning("No KALP_SECRET_KEY found. Generated a new one in .env");
|
|
59
|
-
p.note(
|
|
60
|
-
"Please run 'kalp push' to sync the new secret with Cloudflare",
|
|
61
|
-
"Action Required"
|
|
62
|
-
);
|
|
63
|
-
}
|
|
64
|
-
const workerUrl = args.url || await readWorkerUrl(cwd);
|
|
65
|
-
const isDev = !args.url;
|
|
66
|
-
const studioBaseUrl = isDev ? "http://localhost:5173" : workerUrl;
|
|
67
|
-
if (isDev) {
|
|
68
|
-
p.log.info("Using local Studio dev server (http://localhost:5173)");
|
|
69
|
-
p.note(
|
|
70
|
-
"Make sure to run 'pnpm --filter=@kalphq/studio dev' first",
|
|
71
|
-
"Dev Mode"
|
|
72
|
-
);
|
|
73
|
-
} else if (!studioBaseUrl) {
|
|
74
|
-
p.log.error(
|
|
75
|
-
"No worker URL found. Run 'kalp push' first or use --url flag"
|
|
76
|
-
);
|
|
77
|
-
process.exit(1);
|
|
78
|
-
}
|
|
79
|
-
s.start("Generating authentication token");
|
|
80
|
-
const secret = new TextEncoder().encode(secretKey);
|
|
81
|
-
const token = await new SignJWT({
|
|
82
|
-
sub: "cli-user",
|
|
83
|
-
aud: "kalp-studio",
|
|
84
|
-
iat: Date.now(),
|
|
85
|
-
exp: Math.floor(Date.now() / 1e3) + 3600
|
|
86
|
-
// 1 hour
|
|
87
|
-
}).setProtectedHeader({ alg: "HS256" }).sign(secret);
|
|
88
|
-
s.stop("Token generated");
|
|
89
|
-
let studioUrl;
|
|
90
|
-
if (isDev) {
|
|
91
|
-
studioUrl = `${studioBaseUrl}/?token=${token}`;
|
|
92
|
-
} else {
|
|
93
|
-
studioUrl = studioBaseUrl.replace(/\/a\//, "/studio/a/") + `?token=${token}`;
|
|
94
|
-
}
|
|
95
|
-
p.log.info(`Opening Studio at ${pc.cyan(studioUrl)}`);
|
|
96
|
-
await open(studioUrl);
|
|
97
|
-
p.outro(`${LOGO} ${pc.green("Studio opened")}`);
|
|
98
|
-
}
|
|
99
|
-
});
|
|
100
|
-
export {
|
|
101
|
-
studio_default as default
|
|
102
|
-
};
|
|
103
|
-
//# sourceMappingURL=studio-SSJ27ZHR.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/commands/studio.ts"],"sourcesContent":["import { defineCommand } from \"citty\";\nimport * as p from \"@clack/prompts\";\nimport pc from \"picocolors\";\nimport { readFile, writeFile } from \"node:fs/promises\";\nimport { join } from \"node:path\";\nimport { randomBytes } from \"node:crypto\";\nimport { SignJWT } from \"jose\";\nimport open from \"open\";\n\nconst LOGO = \"🦋\";\n\n/**\n * Generate KALP_SECRET_KEY if not exists.\n * Returns the key and whether it was newly created.\n */\nasync function ensureSecretKey(\n cwd: string,\n): Promise<{ key: string; isNew: boolean }> {\n const envPath = join(cwd, \".env\");\n\n try {\n const envContent = await readFile(envPath, \"utf-8\");\n const match = envContent.match(/^KALP_SECRET_KEY=(.+)$/m);\n if (match && match[1]) {\n return { key: match[1].trim(), isNew: false };\n }\n } catch {\n // .env doesn't exist, create it\n }\n\n // Generate new secret\n const secretKey = randomBytes(32).toString(\"hex\");\n const envContent = `# Kalp Studio Authentication Secret\nKALP_SECRET_KEY=${secretKey}\n`;\n\n await writeFile(envPath, envContent, \"utf-8\");\n return { key: secretKey, isNew: true };\n}\n\n/**\n * Read worker URL from .kalp/state.json.\n */\nasync function readWorkerUrl(cwd: string): Promise<string | null> {\n try {\n const statePath = join(cwd, \".kalp\", \"state.json\");\n const content = await readFile(statePath, \"utf-8\");\n const state = JSON.parse(content);\n return state.workerUrl || null;\n } catch {\n return null;\n }\n}\n\nexport default defineCommand({\n meta: { name: \"studio\", description: \"Open Kalp Studio in browser\" },\n args: {\n url: {\n type: \"string\",\n alias: \"u\",\n description: \"Worker URL (overrides saved state)\",\n required: false,\n },\n },\n async run({ args }) {\n const cwd = process.cwd();\n\n p.intro(`${LOGO} ${pc.bold(\"kalp studio\")}`);\n\n // 1. Ensure KALP_SECRET_KEY exists\n const s = p.spinner();\n s.start(\"Checking authentication secret\");\n\n const { key: secretKey, isNew: isNewSecret } = await ensureSecretKey(cwd);\n\n s.stop(\"Authentication secret ready\");\n\n if (isNewSecret) {\n p.log.warning(\"No KALP_SECRET_KEY found. Generated a new one in .env\");\n p.note(\n \"Please run 'kalp push' to sync the new secret with Cloudflare\",\n \"Action Required\",\n );\n }\n\n // 2. Get worker URL (for production Cloudflare deployment)\n // For development, use the local Studio dev server\n const workerUrl = args.url || (await readWorkerUrl(cwd));\n\n // For local development, use the Studio dev server on port 5173\n // For production, the Studio is embedded in the Cloudflare Worker\n const isDev = !args.url; // If user didn't provide --url, assume dev mode\n const studioBaseUrl = isDev ? \"http://localhost:5173\" : workerUrl;\n\n if (isDev) {\n p.log.info(\"Using local Studio dev server (http://localhost:5173)\");\n p.note(\n \"Make sure to run 'pnpm --filter=@kalphq/studio dev' first\",\n \"Dev Mode\",\n );\n } else if (!studioBaseUrl) {\n p.log.error(\n \"No worker URL found. Run 'kalp push' first or use --url flag\",\n );\n process.exit(1);\n }\n\n // 3. Generate JWT (1 hour expiry)\n s.start(\"Generating authentication token\");\n\n const secret = new TextEncoder().encode(secretKey);\n const token = await new SignJWT({\n sub: \"cli-user\",\n aud: \"kalp-studio\",\n iat: Date.now(),\n exp: Math.floor(Date.now() / 1000) + 3600, // 1 hour\n })\n .setProtectedHeader({ alg: \"HS256\" })\n .sign(secret);\n\n s.stop(\"Token generated\");\n\n // 4. Open browser\n let studioUrl: string;\n if (isDev) {\n // Dev mode: use local Studio dev server\n studioUrl = `${studioBaseUrl}/?token=${token}`;\n } else {\n // Production: construct URL by inserting /studio before /a/agentName\n // workerUrl is like http://localhost:3000/a/support\n // We want http://localhost:3000/studio/a/support\n studioUrl =\n studioBaseUrl!.replace(/\\/a\\//, \"/studio/a/\") + `?token=${token}`;\n }\n p.log.info(`Opening Studio at ${pc.cyan(studioUrl)}`);\n\n await open(studioUrl);\n\n p.outro(`${LOGO} ${pc.green(\"Studio opened\")}`);\n },\n});\n"],"mappings":";;;AAAA,SAAS,qBAAqB;AAC9B,YAAY,OAAO;AACnB,OAAO,QAAQ;AACf,SAAS,UAAU,iBAAiB;AACpC,SAAS,YAAY;AACrB,SAAS,mBAAmB;AAC5B,SAAS,eAAe;AACxB,OAAO,UAAU;AAEjB,IAAM,OAAO;AAMb,eAAe,gBACb,KAC0C;AAC1C,QAAM,UAAU,KAAK,KAAK,MAAM;AAEhC,MAAI;AACF,UAAMA,cAAa,MAAM,SAAS,SAAS,OAAO;AAClD,UAAM,QAAQA,YAAW,MAAM,yBAAyB;AACxD,QAAI,SAAS,MAAM,CAAC,GAAG;AACrB,aAAO,EAAE,KAAK,MAAM,CAAC,EAAE,KAAK,GAAG,OAAO,MAAM;AAAA,IAC9C;AAAA,EACF,QAAQ;AAAA,EAER;AAGA,QAAM,YAAY,YAAY,EAAE,EAAE,SAAS,KAAK;AAChD,QAAM,aAAa;AAAA,kBACH,SAAS;AAAA;AAGzB,QAAM,UAAU,SAAS,YAAY,OAAO;AAC5C,SAAO,EAAE,KAAK,WAAW,OAAO,KAAK;AACvC;AAKA,eAAe,cAAc,KAAqC;AAChE,MAAI;AACF,UAAM,YAAY,KAAK,KAAK,SAAS,YAAY;AACjD,UAAM,UAAU,MAAM,SAAS,WAAW,OAAO;AACjD,UAAM,QAAQ,KAAK,MAAM,OAAO;AAChC,WAAO,MAAM,aAAa;AAAA,EAC5B,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAEA,IAAO,iBAAQ,cAAc;AAAA,EAC3B,MAAM,EAAE,MAAM,UAAU,aAAa,8BAA8B;AAAA,EACnE,MAAM;AAAA,IACJ,KAAK;AAAA,MACH,MAAM;AAAA,MACN,OAAO;AAAA,MACP,aAAa;AAAA,MACb,UAAU;AAAA,IACZ;AAAA,EACF;AAAA,EACA,MAAM,IAAI,EAAE,KAAK,GAAG;AAClB,UAAM,MAAM,QAAQ,IAAI;AAExB,IAAE,QAAM,GAAG,IAAI,IAAI,GAAG,KAAK,aAAa,CAAC,EAAE;AAG3C,UAAM,IAAM,UAAQ;AACpB,MAAE,MAAM,gCAAgC;AAExC,UAAM,EAAE,KAAK,WAAW,OAAO,YAAY,IAAI,MAAM,gBAAgB,GAAG;AAExE,MAAE,KAAK,6BAA6B;AAEpC,QAAI,aAAa;AACf,MAAE,MAAI,QAAQ,uDAAuD;AACrE,MAAE;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAAA,IACF;AAIA,UAAM,YAAY,KAAK,OAAQ,MAAM,cAAc,GAAG;AAItD,UAAM,QAAQ,CAAC,KAAK;AACpB,UAAM,gBAAgB,QAAQ,0BAA0B;AAExD,QAAI,OAAO;AACT,MAAE,MAAI,KAAK,uDAAuD;AAClE,MAAE;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAAA,IACF,WAAW,CAAC,eAAe;AACzB,MAAE,MAAI;AAAA,QACJ;AAAA,MACF;AACA,cAAQ,KAAK,CAAC;AAAA,IAChB;AAGA,MAAE,MAAM,iCAAiC;AAEzC,UAAM,SAAS,IAAI,YAAY,EAAE,OAAO,SAAS;AACjD,UAAM,QAAQ,MAAM,IAAI,QAAQ;AAAA,MAC9B,KAAK;AAAA,MACL,KAAK;AAAA,MACL,KAAK,KAAK,IAAI;AAAA,MACd,KAAK,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI,IAAI;AAAA;AAAA,IACvC,CAAC,EACE,mBAAmB,EAAE,KAAK,QAAQ,CAAC,EACnC,KAAK,MAAM;AAEd,MAAE,KAAK,iBAAiB;AAGxB,QAAI;AACJ,QAAI,OAAO;AAET,kBAAY,GAAG,aAAa,WAAW,KAAK;AAAA,IAC9C,OAAO;AAIL,kBACE,cAAe,QAAQ,SAAS,YAAY,IAAI,UAAU,KAAK;AAAA,IACnE;AACA,IAAE,MAAI,KAAK,qBAAqB,GAAG,KAAK,SAAS,CAAC,EAAE;AAEpD,UAAM,KAAK,SAAS;AAEpB,IAAE,QAAM,GAAG,IAAI,IAAI,GAAG,MAAM,eAAe,CAAC,EAAE;AAAA,EAChD;AACF,CAAC;","names":["envContent"]}
|
|
File without changes
|