@mastra/deployer-cloudflare 0.0.0-pass-headers-for-create-mastra-client-20250530010057 → 0.0.0-pgvector-index-fix-20250905222058

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/CHANGELOG.md +3832 -0
  2. package/LICENSE.md +11 -42
  3. package/dist/babel/mastra-instance-wrapper.d.ts +24 -0
  4. package/dist/babel/mastra-instance-wrapper.d.ts.map +1 -0
  5. package/dist/babel/postgres-store-instance-checker.d.ts +21 -0
  6. package/dist/babel/postgres-store-instance-checker.d.ts.map +1 -0
  7. package/dist/index.cjs +177 -78
  8. package/dist/index.cjs.map +1 -0
  9. package/dist/index.d.ts +45 -1
  10. package/dist/index.d.ts.map +1 -0
  11. package/dist/index.js +160 -79
  12. package/dist/index.js.map +1 -0
  13. package/dist/plugins/__fixtures__/basic.d.ts +5 -0
  14. package/dist/plugins/__fixtures__/basic.d.ts.map +1 -0
  15. package/dist/plugins/__fixtures__/empty-mastra.d.ts +3 -0
  16. package/dist/plugins/__fixtures__/empty-mastra.d.ts.map +1 -0
  17. package/dist/plugins/__fixtures__/multiple-postgres-stores.d.ts +6 -0
  18. package/dist/plugins/__fixtures__/multiple-postgres-stores.d.ts.map +1 -0
  19. package/dist/plugins/mastra-instance-wrapper.d.ts +3 -0
  20. package/dist/plugins/mastra-instance-wrapper.d.ts.map +1 -0
  21. package/dist/plugins/postgres-store-instance-checker.d.ts +3 -0
  22. package/dist/plugins/postgres-store-instance-checker.d.ts.map +1 -0
  23. package/dist/secrets-manager/index.cjs +2 -0
  24. package/dist/secrets-manager/index.cjs.map +1 -0
  25. package/dist/secrets-manager/index.d.ts +25 -1
  26. package/dist/secrets-manager/index.d.ts.map +1 -0
  27. package/dist/secrets-manager/index.js +2 -0
  28. package/dist/secrets-manager/index.js.map +1 -0
  29. package/package.json +35 -22
  30. package/dist/_tsup-dts-rollup.d.cts +0 -85
  31. package/dist/_tsup-dts-rollup.d.ts +0 -85
  32. package/dist/index.d.cts +0 -1
  33. package/dist/secrets-manager/index.d.cts +0 -1
package/dist/index.js CHANGED
@@ -1,31 +1,128 @@
1
1
  import { writeFile } from 'fs/promises';
2
2
  import { join } from 'path';
3
- import { Deployer, createChildProcessLogger } from '@mastra/deployer';
3
+ import { Deployer } from '@mastra/deployer';
4
4
  import virtual from '@rollup/plugin-virtual';
5
- import { Cloudflare } from 'cloudflare';
5
+ import * as babel from '@babel/core';
6
+ import { transformSync } from '@babel/core';
7
+
8
+ // src/index.ts
9
+ function mastraInstanceWrapper() {
10
+ const exportName = "mastra";
11
+ const className = "Mastra";
12
+ const t = babel.types;
13
+ return {
14
+ name: "wrap-mastra",
15
+ visitor: {
16
+ ExportNamedDeclaration(path) {
17
+ if (t.isVariableDeclaration(path.node?.declaration)) {
18
+ for (const declaration of path.node.declaration.declarations) {
19
+ if (t.isIdentifier(declaration?.id, { name: exportName }) && t.isNewExpression(declaration?.init) && t.isIdentifier(declaration.init.callee, { name: className })) {
20
+ declaration.init = t.arrowFunctionExpression([], declaration.init);
21
+ break;
22
+ }
23
+ }
24
+ }
25
+ }
26
+ }
27
+ };
28
+ }
29
+
30
+ // src/plugins/mastra-instance-wrapper.ts
31
+ function mastraInstanceWrapper2(mastraEntryFile) {
32
+ return {
33
+ name: "mastra-wrapper",
34
+ transform(code, id) {
35
+ if (id !== mastraEntryFile) {
36
+ return null;
37
+ }
38
+ const result = transformSync(code, {
39
+ filename: id,
40
+ babelrc: false,
41
+ configFile: false,
42
+ plugins: [mastraInstanceWrapper]
43
+ });
44
+ if (!result?.code) {
45
+ throw new Error("mastra-wrapper plugin did not return code, there is likely a bug in the plugin.");
46
+ }
47
+ return {
48
+ code: result.code,
49
+ map: result?.map
50
+ };
51
+ }
52
+ };
53
+ }
54
+ function postgresStoreInstanceChecker() {
55
+ const t = babel.types;
56
+ const instances = [];
57
+ return {
58
+ name: "postgresstore-instance-checker",
59
+ visitor: {
60
+ NewExpression(path, state) {
61
+ if (t.isIdentifier(path.node.callee) && path.node.callee.name === "PostgresStore") {
62
+ const filename = state.file?.opts?.filename || "unknown file";
63
+ const location = path.node.loc ? `${filename}: line ${path.node.loc.start.line}, column ${path.node.loc.start.column}` : "unknown location";
64
+ instances.push({
65
+ path,
66
+ location
67
+ });
68
+ }
69
+ }
70
+ },
71
+ post() {
72
+ if (instances.length > 1) {
73
+ const errorMessage = [
74
+ `Found ${instances.length} PostgresStore instantiations:`,
75
+ ...instances.map((instance, i) => ` ${i + 1}. At ${instance.location}`),
76
+ "Only one PostgresStore instance should be created per Cloudflare Worker."
77
+ ].join("\n");
78
+ const lastInstance = instances[instances.length - 1];
79
+ throw lastInstance?.path.buildCodeFrameError(errorMessage);
80
+ }
81
+ }
82
+ };
83
+ }
84
+
85
+ // src/plugins/postgres-store-instance-checker.ts
86
+ function postgresStoreInstanceChecker2() {
87
+ return {
88
+ name: "postgres-store-instance-checker",
89
+ transform(code, id) {
90
+ const result = transformSync(code, {
91
+ filename: id,
92
+ babelrc: false,
93
+ configFile: false,
94
+ plugins: [postgresStoreInstanceChecker]
95
+ });
96
+ if (!result?.code) {
97
+ throw new Error(
98
+ "postgres-store-instance-checker plugin did not return code, there is likely a bug in the plugin."
99
+ );
100
+ }
101
+ return {
102
+ code: result.code,
103
+ map: result?.map
104
+ };
105
+ }
106
+ };
107
+ }
6
108
 
7
109
  // src/index.ts
8
110
  var CloudflareDeployer = class extends Deployer {
9
- cloudflare;
10
111
  routes = [];
11
112
  workerNamespace;
12
- scope;
13
113
  env;
14
114
  projectName;
15
115
  d1Databases;
16
116
  kvNamespaces;
17
117
  constructor({
18
- scope,
19
118
  env,
20
119
  projectName = "mastra",
21
120
  routes,
22
121
  workerNamespace,
23
- auth,
24
122
  d1Databases,
25
123
  kvNamespaces
26
124
  }) {
27
125
  super({ name: "CLOUDFLARE" });
28
- this.scope = scope;
29
126
  this.projectName = projectName;
30
127
  this.routes = routes;
31
128
  this.workerNamespace = workerNamespace;
@@ -34,7 +131,6 @@ var CloudflareDeployer = class extends Deployer {
34
131
  }
35
132
  if (d1Databases) this.d1Databases = d1Databases;
36
133
  if (kvNamespaces) this.kvNamespaces = kvNamespaces;
37
- this.cloudflare = new Cloudflare(auth);
38
134
  }
39
135
  async writeFiles(outputDirectory) {
40
136
  const env = await this.loadEnvVars();
@@ -67,53 +163,56 @@ var CloudflareDeployer = class extends Deployer {
67
163
  return `
68
164
  import '#polyfills';
69
165
  import { mastra } from '#mastra';
70
- import { createHonoServer } from '#server';
166
+ import { createHonoServer, getToolExports } from '#server';
167
+ import { tools } from '#tools';
71
168
  import { evaluate } from '@mastra/core/eval';
72
169
  import { AvailableHooks, registerHook } from '@mastra/core/hooks';
73
170
  import { TABLE_EVALS } from '@mastra/core/storage';
74
171
  import { checkEvalStorageFields } from '@mastra/core/utils';
75
172
 
76
- registerHook(AvailableHooks.ON_GENERATION, ({ input, output, metric, runId, agentName, instructions }) => {
77
- evaluate({
78
- agentName,
79
- input,
80
- metric,
81
- output,
82
- runId,
83
- globalRunId: runId,
84
- instructions,
85
- });
86
- });
87
-
88
- registerHook(AvailableHooks.ON_EVALUATION, async traceObject => {
89
- const storage = mastra.getStorage();
90
- if (storage) {
91
- // Check for required fields
92
- const logger = mastra?.getLogger();
93
- const areFieldsValid = checkEvalStorageFields(traceObject, logger);
94
- if (!areFieldsValid) return;
173
+ export default {
174
+ fetch: async (request, env, context) => {
175
+ const _mastra = mastra();
95
176
 
96
- await storage.insert({
97
- tableName: TABLE_EVALS,
98
- record: {
99
- input: traceObject.input,
100
- output: traceObject.output,
101
- result: JSON.stringify(traceObject.result || {}),
102
- agent_name: traceObject.agentName,
103
- metric_name: traceObject.metricName,
104
- instructions: traceObject.instructions,
105
- test_info: null,
106
- global_run_id: traceObject.globalRunId,
107
- run_id: traceObject.runId,
108
- created_at: new Date().toISOString(),
109
- },
177
+ registerHook(AvailableHooks.ON_GENERATION, ({ input, output, metric, runId, agentName, instructions }) => {
178
+ evaluate({
179
+ agentName,
180
+ input,
181
+ metric,
182
+ output,
183
+ runId,
184
+ globalRunId: runId,
185
+ instructions,
186
+ });
110
187
  });
111
- }
112
- });
113
188
 
114
- export default {
115
- fetch: async (request, env, context) => {
116
- const app = await createHonoServer(mastra)
189
+ registerHook(AvailableHooks.ON_EVALUATION, async traceObject => {
190
+ const storage = _mastra.getStorage();
191
+ if (storage) {
192
+ // Check for required fields
193
+ const logger = _mastra?.getLogger();
194
+ const areFieldsValid = checkEvalStorageFields(traceObject, logger);
195
+ if (!areFieldsValid) return;
196
+
197
+ await storage.insert({
198
+ tableName: TABLE_EVALS,
199
+ record: {
200
+ input: traceObject.input,
201
+ output: traceObject.output,
202
+ result: JSON.stringify(traceObject.result || {}),
203
+ agent_name: traceObject.agentName,
204
+ metric_name: traceObject.metricName,
205
+ instructions: traceObject.instructions,
206
+ test_info: null,
207
+ global_run_id: traceObject.globalRunId,
208
+ run_id: traceObject.runId,
209
+ created_at: new Date().toISOString(),
210
+ },
211
+ });
212
+ }
213
+ });
214
+
215
+ const app = await createHonoServer(_mastra, { tools: getToolExports(tools) });
117
216
  return app.fetch(request, env, context);
118
217
  }
119
218
  }
@@ -123,8 +222,11 @@ var CloudflareDeployer = class extends Deployer {
123
222
  await super.prepare(outputDirectory);
124
223
  await this.writeFiles(outputDirectory);
125
224
  }
126
- async getBundlerOptions(serverFile, mastraEntryFile, analyzedBundleInfo, toolsPaths) {
127
- const inputOptions = await super.getBundlerOptions(serverFile, mastraEntryFile, analyzedBundleInfo, toolsPaths);
225
+ async getBundlerOptions(serverFile, mastraEntryFile, analyzedBundleInfo, toolsPaths, { enableSourcemap = false } = {}) {
226
+ const inputOptions = await super.getBundlerOptions(serverFile, mastraEntryFile, analyzedBundleInfo, toolsPaths, {
227
+ enableSourcemap,
228
+ enableEsmShim: false
229
+ });
128
230
  if (Array.isArray(inputOptions.plugins)) {
129
231
  inputOptions.plugins = [
130
232
  virtual({
@@ -133,7 +235,9 @@ process.versions = process.versions || {};
133
235
  process.versions.node = '${process.versions.node}';
134
236
  `
135
237
  }),
136
- ...inputOptions.plugins
238
+ ...inputOptions.plugins,
239
+ postgresStoreInstanceChecker2(),
240
+ mastraInstanceWrapper2(mastraEntryFile)
137
241
  ];
138
242
  }
139
243
  return inputOptions;
@@ -141,36 +245,11 @@ process.versions.node = '${process.versions.node}';
141
245
  async bundle(entryFile, outputDirectory, toolsPaths) {
142
246
  return this._bundle(this.getEntry(), entryFile, outputDirectory, toolsPaths);
143
247
  }
144
- async deploy(outputDirectory) {
145
- const cmd = this.workerNamespace ? `npm exec -- wrangler@latest deploy --dispatch-namespace ${this.workerNamespace}` : "npm exec -- wrangler@latest deploy";
146
- const cpLogger = createChildProcessLogger({
147
- logger: this.logger,
148
- root: join(outputDirectory, this.outputDir)
149
- });
150
- await cpLogger({
151
- cmd,
152
- args: [],
153
- env: {
154
- CLOUDFLARE_API_TOKEN: this.cloudflare.apiToken,
155
- CLOUDFLARE_ACCOUNT_ID: this.scope,
156
- ...this.env,
157
- PATH: process.env.PATH
158
- }
159
- });
248
+ async deploy() {
249
+ this.logger?.info("Deploying to Cloudflare failed. Please use the Cloudflare dashboard to deploy.");
160
250
  }
161
- async tagWorker({
162
- workerName,
163
- namespace,
164
- tags,
165
- scope
166
- }) {
167
- if (!this.cloudflare) {
168
- throw new Error("Cloudflare Deployer not initialized");
169
- }
170
- await this.cloudflare.workersForPlatforms.dispatch.namespaces.scripts.tags.update(namespace, workerName, {
171
- account_id: scope,
172
- body: tags
173
- });
251
+ async tagWorker() {
252
+ throw new Error("tagWorker method is no longer supported. Use the Cloudflare dashboard or API directly.");
174
253
  }
175
254
  async lint(entryFile, outputDirectory, toolsPaths) {
176
255
  await super.lint(entryFile, outputDirectory, toolsPaths);
@@ -185,3 +264,5 @@ process.versions.node = '${process.versions.node}';
185
264
  };
186
265
 
187
266
  export { CloudflareDeployer };
267
+ //# sourceMappingURL=index.js.map
268
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/babel/mastra-instance-wrapper.ts","../src/plugins/mastra-instance-wrapper.ts","../src/babel/postgres-store-instance-checker.ts","../src/plugins/postgres-store-instance-checker.ts","../src/index.ts"],"names":["mastraInstanceWrapper","babel2","postgresStoreInstanceChecker","transformSync"],"mappings":";;;;;;;;AAwBO,SAAS,qBAAA,GAAmC;AACjD,EAAA,MAAM,UAAA,GAAa,QAAA;AACnB,EAAA,MAAM,SAAA,GAAY,QAAA;AAClB,EAAA,MAAM,CAAA,GAAU,KAAA,CAAA,KAAA;AAEhB,EAAA,OAAO;AAAA,IACL,IAAA,EAAM,aAAA;AAAA,IACN,OAAA,EAAS;AAAA,MACP,uBAAuB,IAAA,EAAM;AAC3B,QAAA,IAAI,CAAA,CAAE,qBAAA,CAAsB,IAAA,CAAK,IAAA,EAAM,WAAW,CAAA,EAAG;AACnD,UAAA,KAAA,MAAW,WAAA,IAAe,IAAA,CAAK,IAAA,CAAK,WAAA,CAAY,YAAA,EAAc;AAC5D,YAAA,IACE,CAAA,CAAE,aAAa,WAAA,EAAa,EAAA,EAAI,EAAE,IAAA,EAAM,UAAA,EAAY,CAAA,IACpD,CAAA,CAAE,eAAA,CAAgB,aAAa,IAAI,CAAA,IACnC,CAAA,CAAE,YAAA,CAAa,WAAA,CAAY,IAAA,CAAK,QAAQ,EAAE,IAAA,EAAM,SAAA,EAAW,CAAA,EAC3D;AACA,cAAA,WAAA,CAAY,OAAO,CAAA,CAAE,uBAAA,CAAwB,EAAC,EAAG,YAAY,IAAI,CAAA;AAEjE,cAAA;AAAA,YACF;AAAA,UACF;AAAA,QACF;AAAA,MACF;AAAA;AACF,GACF;AACF;;;AC7CO,SAASA,uBAAsB,eAAA,EAAiC;AACrE,EAAA,OAAO;AAAA,IACL,IAAA,EAAM,gBAAA;AAAA,IACN,SAAA,CAAU,MAAM,EAAA,EAAI;AAClB,MAAA,IAAI,OAAO,eAAA,EAAiB;AAC1B,QAAA,OAAO,IAAA;AAAA,MACT;AAEA,MAAA,MAAM,MAAA,GAAS,cAAc,IAAA,EAAM;AAAA,QACjC,QAAA,EAAU,EAAA;AAAA,QACV,OAAA,EAAS,KAAA;AAAA,QACT,UAAA,EAAY,KAAA;AAAA,QACZ,OAAA,EAAS,CAAC,qBAA0B;AAAA,OACrC,CAAA;AAED,MAAA,IAAI,CAAC,QAAQ,IAAA,EAAM;AACjB,QAAA,MAAM,IAAI,MAAM,iFAAiF,CAAA;AAAA,MACnG;AAEA,MAAA,OAAO;AAAA,QACL,MAAM,MAAA,CAAO,IAAA;AAAA,QACb,KAAK,MAAA,EAAQ;AAAA,OACf;AAAA,IACF;AAAA,GACF;AACF;ACPO,SAAS,4BAAA,GAA0C;AACxD,EAAA,MAAM,CAAA,GAAUC,KAAA,CAAA,KAAA;AAChB,EAAA,MAAM,YAAmE,EAAC;AAE1E,EAAA,OAAO;AAAA,IACL,IAAA,EAAM,gCAAA;AAAA,IACN,OAAA,EAAS;AAAA,MACP,aAAA,CAAc,MAAM,KAAA,EAAO;AACzB,QAAA,IAAI,CAAA,CAAE,YAAA,CAAa,IAAA,CAAK,IAAA,CAAK,MAAM,KAAK,IAAA,CAAK,IAAA,CAAK,MAAA,CAAO,IAAA,KAAS,eAAA,EAAiB;AACjF,UAAA,MAAM,QAAA,GAAW,KAAA,CAAM,IAAA,EAAM,IAAA,EAAM,QAAA,IAAY,cAAA;AAC/C,UAAA,MAAM,WAAW,IAAA,CAAK,IAAA,CAAK,MACvB,CAAA,EAAG,QAAQ,UAAU,IAAA,CAAK,IAAA,CAAK,GAAA,CAAI,KAAA,CAAM,IAAI,CAAA,SAAA,EAAY,IAAA,CAAK,KAAK,GAAA,CAAI,KAAA,CAAM,MAAM,CAAA,CAAA,GACnF,kBAAA;AAEJ,UAAA,SAAA,CAAU,IAAA,CAAK;AAAA,YACb,IAAA;AAAA,YACA;AAAA,WACD,CAAA;AAAA,QACH;AAAA,MACF;AAAA,KACF;AAAA,IACA,IAAA,GAAO;AACL,MAAA,IAAI,SAAA,CAAU,SAAS,CAAA,EAAG;AACxB,QAAA,MAAM,YAAA,GAAe;AAAA,UACnB,CAAA,MAAA,EAAS,UAAU,MAAM,CAAA,8BAAA,CAAA;AAAA,UACzB,GAAG,SAAA,CAAU,GAAA,CAAI,CAAC,QAAA,EAAU,CAAA,KAAM,CAAA,EAAA,EAAK,CAAA,GAAI,CAAC,CAAA,KAAA,EAAQ,QAAA,CAAS,QAAQ,CAAA,CAAE,CAAA;AAAA,UACvE;AAAA,SACF,CAAE,KAAK,IAAI,CAAA;AAEX,QAAA,MAAM,YAAA,GAAe,SAAA,CAAU,SAAA,CAAU,MAAA,GAAS,CAAC,CAAA;AACnD,QAAA,MAAM,YAAA,EAAc,IAAA,CAAK,mBAAA,CAAoB,YAAY,CAAA;AAAA,MAC3D;AAAA,IACF;AAAA,GACF;AACF;;;ACpDO,SAASC,6BAAAA,GAAuC;AACrD,EAAA,OAAO;AAAA,IACL,IAAA,EAAM,iCAAA;AAAA,IACN,SAAA,CAAU,MAAM,EAAA,EAAI;AAClB,MAAA,MAAM,MAAA,GAASC,cAAc,IAAA,EAAM;AAAA,QACjC,QAAA,EAAU,EAAA;AAAA,QACV,OAAA,EAAS,KAAA;AAAA,QACT,UAAA,EAAY,KAAA;AAAA,QACZ,OAAA,EAAS,CAAC,4BAAiC;AAAA,OAC5C,CAAA;AAED,MAAA,IAAI,CAAC,QAAQ,IAAA,EAAM;AACjB,QAAA,MAAM,IAAI,KAAA;AAAA,UACR;AAAA,SACF;AAAA,MACF;AAEA,MAAA,OAAO;AAAA,QACL,MAAM,MAAA,CAAO,IAAA;AAAA,QACb,KAAK,MAAA,EAAQ;AAAA,OACf;AAAA,IACF;AAAA,GACF;AACF;;;ACDO,IAAM,kBAAA,GAAN,cAAiC,QAAA,CAAS;AAAA,EAC/C,SAAqB,EAAC;AAAA,EACtB,eAAA;AAAA,EACA,GAAA;AAAA,EACA,WAAA;AAAA,EACA,WAAA;AAAA,EACA,YAAA;AAAA,EAEA,WAAA,CAAY;AAAA,IACV,GAAA;AAAA,IACA,WAAA,GAAc,QAAA;AAAA,IACd,MAAA;AAAA,IACA,eAAA;AAAA,IACA,WAAA;AAAA,IACA;AAAA,GACF,EAOG;AACD,IAAA,KAAA,CAAM,EAAE,IAAA,EAAM,YAAA,EAAc,CAAA;AAE5B,IAAA,IAAA,CAAK,WAAA,GAAc,WAAA;AACnB,IAAA,IAAA,CAAK,MAAA,GAAS,MAAA;AACd,IAAA,IAAA,CAAK,eAAA,GAAkB,eAAA;AAEvB,IAAA,IAAI,GAAA,EAAK;AACP,MAAA,IAAA,CAAK,GAAA,GAAM,GAAA;AAAA,IACb;AAEA,IAAA,IAAI,WAAA,OAAkB,WAAA,GAAc,WAAA;AACpC,IAAA,IAAI,YAAA,OAAmB,YAAA,GAAe,YAAA;AAAA,EACxC;AAAA,EAEA,MAAM,WAAW,eAAA,EAAwC;AACvD,IAAA,MAAM,GAAA,GAAM,MAAM,IAAA,CAAK,WAAA,EAAY;AACnC,IAAA,MAAM,YAAA,GAAe,MAAA,CAAO,MAAA,CAAO,EAAC,EAAG,MAAA,CAAO,WAAA,CAAY,GAAA,CAAI,OAAA,EAAS,CAAA,EAAG,IAAA,CAAK,GAAG,CAAA;AAElF,IAAA,MAAM,eAAe,IAAA,CAAK,WAAA;AAE1B,IAAA,MAAM,cAAA,GAAsC;AAAA,MAC1C,IAAA,EAAM,YAAA;AAAA,MACN,IAAA,EAAM,aAAA;AAAA,MACN,kBAAA,EAAoB,YAAA;AAAA,MACpB,mBAAA,EAAqB,CAAC,eAAA,EAAiB,oCAAoC,CAAA;AAAA,MAC3E,aAAA,EAAe;AAAA,QACb,IAAA,EAAM;AAAA,UACJ,OAAA,EAAS;AAAA;AACX,OACF;AAAA,MACA,IAAA,EAAM;AAAA,KACR;AAEA,IAAA,IAAI,CAAC,IAAA,CAAK,eAAA,IAAmB,IAAA,CAAK,MAAA,EAAQ;AACxC,MAAA,cAAA,CAAe,SAAS,IAAA,CAAK,MAAA;AAAA,IAC/B;AAEA,IAAA,IAAI,IAAA,CAAK,aAAa,MAAA,EAAQ;AAC5B,MAAA,cAAA,CAAe,eAAe,IAAA,CAAK,WAAA;AAAA,IACrC;AACA,IAAA,IAAI,IAAA,CAAK,cAAc,MAAA,EAAQ;AAC7B,MAAA,cAAA,CAAe,gBAAgB,IAAA,CAAK,YAAA;AAAA,IACtC;AACA,IAAA,MAAM,SAAA,CAAU,IAAA,CAAK,eAAA,EAAiB,IAAA,CAAK,SAAA,EAAW,eAAe,CAAA,EAAG,IAAA,CAAK,SAAA,CAAU,cAAc,CAAC,CAAA;AAAA,EACxG;AAAA,EAEQ,QAAA,GAAmB;AACzB,IAAA,OAAO;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;AAAA;AAAA;AAAA;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,CAAA;AAAA,EAyDT;AAAA,EACA,MAAM,QAAQ,eAAA,EAAwC;AACpD,IAAA,MAAM,KAAA,CAAM,QAAQ,eAAe,CAAA;AACnC,IAAA,MAAM,IAAA,CAAK,WAAW,eAAe,CAAA;AAAA,EACvC;AAAA,EAEA,MAAM,iBAAA,CACJ,UAAA,EACA,eAAA,EACA,kBAAA,EACA,UAAA,EACA,EAAE,eAAA,GAAkB,KAAA,EAAM,GAAmC,EAAC,EAC9D;AACA,IAAA,MAAM,eAAe,MAAM,KAAA,CAAM,kBAAkB,UAAA,EAAY,eAAA,EAAiB,oBAAoB,UAAA,EAAY;AAAA,MAC9G,eAAA;AAAA,MACA,aAAA,EAAe;AAAA,KAChB,CAAA;AAED,IAAA,IAAI,KAAA,CAAM,OAAA,CAAQ,YAAA,CAAa,OAAO,CAAA,EAAG;AACvC,MAAA,YAAA,CAAa,OAAA,GAAU;AAAA,QACrB,OAAA,CAAQ;AAAA,UACN,YAAA,EAAc;AAAA;AAAA,yBAAA,EAEG,OAAA,CAAQ,SAAS,IAAI,CAAA;AAAA,MAAA;AAAA,SAEvC,CAAA;AAAA,QACD,GAAG,YAAA,CAAa,OAAA;AAAA,QAChBD,6BAAAA,EAA6B;AAAA,QAC7BF,uBAAsB,eAAe;AAAA,OACvC;AAAA,IACF;AAEA,IAAA,OAAO,YAAA;AAAA,EACT;AAAA,EAEA,MAAM,MAAA,CAAO,SAAA,EAAmB,eAAA,EAAyB,UAAA,EAAkD;AACzG,IAAA,OAAO,KAAK,OAAA,CAAQ,IAAA,CAAK,UAAS,EAAG,SAAA,EAAW,iBAAiB,UAAU,CAAA;AAAA,EAC7E;AAAA,EAEA,MAAM,MAAA,GAAwB;AAC5B,IAAA,IAAA,CAAK,MAAA,EAAQ,KAAK,gFAAgF,CAAA;AAAA,EACpG;AAAA,EAEA,MAAM,SAAA,GAA2B;AAC/B,IAAA,MAAM,IAAI,MAAM,wFAAwF,CAAA;AAAA,EAC1G;AAAA,EAEA,MAAM,IAAA,CAAK,SAAA,EAAmB,eAAA,EAAyB,UAAA,EAAkD;AACvG,IAAA,MAAM,KAAA,CAAM,IAAA,CAAK,SAAA,EAAW,eAAA,EAAiB,UAAU,CAAA;AAEvD,IAAA,MAAM,SAAA,GAAa,MAAM,IAAA,CAAK,IAAA,CAAK,kBAAkB,CAAC,gBAAgB,CAAC,CAAA,KAAO,CAAA,EAAA,CAAA;AAE9E,IAAA,IAAI,SAAA,EAAW;AACb,MAAA,IAAA,CAAK,MAAA,CAAO,KAAA;AAAA,QACV;AAAA,OACF;AACA,MAAA,OAAA,CAAQ,KAAK,CAAC,CAAA;AAAA,IAChB;AAAA,EACF;AACF","file":"index.js","sourcesContent":["import type { PluginObj } from '@babel/core';\nimport * as babel from '@babel/core';\n\n/**\n * Babel plugin that transforms Mastra exports for Cloudflare Workers compatibility.\n *\n * This plugin:\n * 1. Identifies named exports of the 'mastra' variable\n * 2. Checks if the export is a new instance of the 'Mastra' class\n * 3. Wraps the Mastra instantiation in an arrow function to ensure proper initialization\n * in the Cloudflare Workers environment\n *\n * The transformation ensures the Mastra instance is properly scoped and initialized\n * for each request in the Cloudflare Workers environment.\n *\n * @returns {PluginObj} A Babel plugin object with a visitor that performs the transformation\n *\n * @example\n * // Before transformation:\n * export const mastra = new Mastra();\n *\n * // After transformation:\n * export const mastra = () => new Mastra();\n */\nexport function mastraInstanceWrapper(): PluginObj {\n const exportName = 'mastra';\n const className = 'Mastra';\n const t = babel.types;\n\n return {\n name: 'wrap-mastra',\n visitor: {\n ExportNamedDeclaration(path) {\n if (t.isVariableDeclaration(path.node?.declaration)) {\n for (const declaration of path.node.declaration.declarations) {\n if (\n t.isIdentifier(declaration?.id, { name: exportName }) &&\n t.isNewExpression(declaration?.init) &&\n t.isIdentifier(declaration.init.callee, { name: className })\n ) {\n declaration.init = t.arrowFunctionExpression([], declaration.init);\n // there should be only one \"mastra\" export, so we can exit the loop\n break;\n }\n }\n }\n },\n },\n } as PluginObj;\n}\n","import { transformSync } from '@babel/core';\nimport type { Plugin } from 'rollup';\nimport { mastraInstanceWrapper as mastraInstanceWrapperBabel } from '../babel/mastra-instance-wrapper';\n\nexport function mastraInstanceWrapper(mastraEntryFile: string): Plugin {\n return {\n name: 'mastra-wrapper',\n transform(code, id) {\n if (id !== mastraEntryFile) {\n return null;\n }\n\n const result = transformSync(code, {\n filename: id,\n babelrc: false,\n configFile: false,\n plugins: [mastraInstanceWrapperBabel],\n });\n\n if (!result?.code) {\n throw new Error('mastra-wrapper plugin did not return code, there is likely a bug in the plugin.');\n }\n\n return {\n code: result.code,\n map: result?.map,\n };\n },\n };\n}\n","import type { NodePath, PluginObj } from '@babel/core';\nimport * as babel from '@babel/core';\nimport type { NewExpression } from '@babel/types';\n\n/**\n * Babel plugin that enforces singleton PostgresStore instances in Cloudflare Workers.\n *\n * This plugin:\n * 1. Scans for all `new PostgresStore()` instantiations\n * 2. Records their file locations\n * 3. Throws an error if multiple instances are found\n *\n * Cloudflare Workers should only create one PostgresStore instance to avoid connection\n * pool exhaustion and ensure proper resource management.\n *\n * @returns {PluginObj} A Babel plugin object that validates PostgresStore usage\n *\n * @example\n * // Throws error if multiple instances found:\n * const store1 = new PostgresStore();\n * const store2 = new PostgresStore(); // Error thrown here\n */\nexport function postgresStoreInstanceChecker(): PluginObj {\n const t = babel.types;\n const instances: { path: NodePath<NewExpression>; location: string }[] = [];\n\n return {\n name: 'postgresstore-instance-checker',\n visitor: {\n NewExpression(path, state) {\n if (t.isIdentifier(path.node.callee) && path.node.callee.name === 'PostgresStore') {\n const filename = state.file?.opts?.filename || 'unknown file';\n const location = path.node.loc\n ? `${filename}: line ${path.node.loc.start.line}, column ${path.node.loc.start.column}`\n : 'unknown location';\n\n instances.push({\n path,\n location,\n });\n }\n },\n },\n post() {\n if (instances.length > 1) {\n const errorMessage = [\n `Found ${instances.length} PostgresStore instantiations:`,\n ...instances.map((instance, i) => ` ${i + 1}. At ${instance.location}`),\n 'Only one PostgresStore instance should be created per Cloudflare Worker.',\n ].join('\\n');\n\n const lastInstance = instances[instances.length - 1];\n throw lastInstance?.path.buildCodeFrameError(errorMessage);\n }\n },\n } as PluginObj;\n}\n","import { transformSync } from '@babel/core';\nimport type { Plugin } from 'rollup';\nimport { postgresStoreInstanceChecker as postgresStoreInstanceCheckerBabel } from '../babel/postgres-store-instance-checker';\n\nexport function postgresStoreInstanceChecker(): Plugin {\n return {\n name: 'postgres-store-instance-checker',\n transform(code, id) {\n const result = transformSync(code, {\n filename: id,\n babelrc: false,\n configFile: false,\n plugins: [postgresStoreInstanceCheckerBabel],\n });\n\n if (!result?.code) {\n throw new Error(\n 'postgres-store-instance-checker plugin did not return code, there is likely a bug in the plugin.',\n );\n }\n\n return {\n code: result.code,\n map: result?.map,\n };\n },\n };\n}\n","import { writeFile } from 'fs/promises';\nimport { join } from 'path';\nimport { Deployer } from '@mastra/deployer';\nimport type { analyzeBundle } from '@mastra/deployer/analyze';\nimport virtual from '@rollup/plugin-virtual';\nimport { mastraInstanceWrapper } from './plugins/mastra-instance-wrapper';\nimport { postgresStoreInstanceChecker } from './plugins/postgres-store-instance-checker';\n\ninterface CFRoute {\n pattern: string;\n zone_name: string;\n custom_domain?: boolean;\n}\n\ninterface D1DatabaseBinding {\n binding: string;\n database_name: string;\n database_id: string;\n preview_database_id?: string;\n}\n\ninterface KVNamespaceBinding {\n binding: string;\n id: string;\n}\n\nexport class CloudflareDeployer extends Deployer {\n routes?: CFRoute[] = [];\n workerNamespace?: string;\n env?: Record<string, any>;\n projectName?: string;\n d1Databases?: D1DatabaseBinding[];\n kvNamespaces?: KVNamespaceBinding[];\n\n constructor({\n env,\n projectName = 'mastra',\n routes,\n workerNamespace,\n d1Databases,\n kvNamespaces,\n }: {\n env?: Record<string, any>;\n projectName?: string;\n routes?: CFRoute[];\n workerNamespace?: string;\n d1Databases?: D1DatabaseBinding[];\n kvNamespaces?: KVNamespaceBinding[];\n }) {\n super({ name: 'CLOUDFLARE' });\n\n this.projectName = projectName;\n this.routes = routes;\n this.workerNamespace = workerNamespace;\n\n if (env) {\n this.env = env;\n }\n\n if (d1Databases) this.d1Databases = d1Databases;\n if (kvNamespaces) this.kvNamespaces = kvNamespaces;\n }\n\n async writeFiles(outputDirectory: string): Promise<void> {\n const env = await this.loadEnvVars();\n const envsAsObject = Object.assign({}, Object.fromEntries(env.entries()), this.env);\n\n const cfWorkerName = this.projectName;\n\n const wranglerConfig: Record<string, any> = {\n name: cfWorkerName,\n main: './index.mjs',\n compatibility_date: '2025-04-01',\n compatibility_flags: ['nodejs_compat', 'nodejs_compat_populate_process_env'],\n observability: {\n logs: {\n enabled: true,\n },\n },\n vars: envsAsObject,\n };\n\n if (!this.workerNamespace && this.routes) {\n wranglerConfig.routes = this.routes;\n }\n\n if (this.d1Databases?.length) {\n wranglerConfig.d1_databases = this.d1Databases;\n }\n if (this.kvNamespaces?.length) {\n wranglerConfig.kv_namespaces = this.kvNamespaces;\n }\n await writeFile(join(outputDirectory, this.outputDir, 'wrangler.json'), JSON.stringify(wranglerConfig));\n }\n\n private getEntry(): string {\n return `\n import '#polyfills';\n import { mastra } from '#mastra';\n import { createHonoServer, getToolExports } from '#server';\n import { tools } from '#tools';\n import { evaluate } from '@mastra/core/eval';\n import { AvailableHooks, registerHook } from '@mastra/core/hooks';\n import { TABLE_EVALS } from '@mastra/core/storage';\n import { checkEvalStorageFields } from '@mastra/core/utils';\n\n export default {\n fetch: async (request, env, context) => {\n const _mastra = mastra();\n\n registerHook(AvailableHooks.ON_GENERATION, ({ input, output, metric, runId, agentName, instructions }) => {\n evaluate({\n agentName,\n input,\n metric,\n output,\n runId,\n globalRunId: runId,\n instructions,\n });\n });\n\n registerHook(AvailableHooks.ON_EVALUATION, async traceObject => {\n const storage = _mastra.getStorage();\n if (storage) {\n // Check for required fields\n const logger = _mastra?.getLogger();\n const areFieldsValid = checkEvalStorageFields(traceObject, logger);\n if (!areFieldsValid) return;\n\n await storage.insert({\n tableName: TABLE_EVALS,\n record: {\n input: traceObject.input,\n output: traceObject.output,\n result: JSON.stringify(traceObject.result || {}),\n agent_name: traceObject.agentName,\n metric_name: traceObject.metricName,\n instructions: traceObject.instructions,\n test_info: null,\n global_run_id: traceObject.globalRunId,\n run_id: traceObject.runId,\n created_at: new Date().toISOString(),\n },\n });\n }\n });\n \n const app = await createHonoServer(_mastra, { tools: getToolExports(tools) });\n return app.fetch(request, env, context);\n }\n }\n`;\n }\n async prepare(outputDirectory: string): Promise<void> {\n await super.prepare(outputDirectory);\n await this.writeFiles(outputDirectory);\n }\n\n async getBundlerOptions(\n serverFile: string,\n mastraEntryFile: string,\n analyzedBundleInfo: Awaited<ReturnType<typeof analyzeBundle>>,\n toolsPaths: (string | string[])[],\n { enableSourcemap = false }: { enableSourcemap?: boolean } = {},\n ) {\n const inputOptions = await super.getBundlerOptions(serverFile, mastraEntryFile, analyzedBundleInfo, toolsPaths, {\n enableSourcemap,\n enableEsmShim: false,\n });\n\n if (Array.isArray(inputOptions.plugins)) {\n inputOptions.plugins = [\n virtual({\n '#polyfills': `\nprocess.versions = process.versions || {};\nprocess.versions.node = '${process.versions.node}';\n `,\n }),\n ...inputOptions.plugins,\n postgresStoreInstanceChecker(),\n mastraInstanceWrapper(mastraEntryFile),\n ];\n }\n\n return inputOptions;\n }\n\n async bundle(entryFile: string, outputDirectory: string, toolsPaths: (string | string[])[]): Promise<void> {\n return this._bundle(this.getEntry(), entryFile, outputDirectory, toolsPaths);\n }\n\n async deploy(): Promise<void> {\n this.logger?.info('Deploying to Cloudflare failed. Please use the Cloudflare dashboard to deploy.');\n }\n\n async tagWorker(): Promise<void> {\n throw new Error('tagWorker method is no longer supported. Use the Cloudflare dashboard or API directly.');\n }\n\n async lint(entryFile: string, outputDirectory: string, toolsPaths: (string | string[])[]): Promise<void> {\n await super.lint(entryFile, outputDirectory, toolsPaths);\n\n const hasLibsql = (await this.deps.checkDependencies(['@mastra/libsql'])) === `ok`;\n\n if (hasLibsql) {\n this.logger.error(\n 'Cloudflare Deployer does not support @libsql/client(which may have been installed by @mastra/libsql) as a dependency. Please use Cloudflare D1 instead @mastra/cloudflare-d1',\n );\n process.exit(1);\n }\n }\n}\n"]}
@@ -0,0 +1,5 @@
1
+ export const mastra: Mastra<{
2
+ weatherAgent: any;
3
+ }, Record<string, import("@mastra/core/workflows/legacy").LegacyWorkflow<import("@mastra/core/workflows/legacy").LegacyStep<string, any, any, import("@mastra/core/workflows/legacy").StepExecutionContext<any, import("@mastra/core/workflows/legacy").WorkflowContext<any, import("@mastra/core/workflows/legacy").LegacyStep<string, any, any, any>[], Record<string, any>>>>[], string, any, any>>, Record<string, import("@mastra/core/workflows").Workflow<any, import("@mastra/core").Step<string, any, any, any, any, any>[], string, import("zod").ZodType<any, import("zod").ZodTypeDef, any>, import("zod").ZodType<any, import("zod").ZodTypeDef, any>, import("zod").ZodType<any, import("zod").ZodTypeDef, any>>>, Record<string, import("@mastra/core/vector").MastraVector<import("@mastra/core/vector/filter").VectorFilter>>, Record<string, import("@mastra/core/tts").MastraTTS>, import("@mastra/core/logger").ConsoleLogger, Record<string, import("@mastra/core/network").AgentNetwork>, Record<string, import("@mastra/core/network/vNext").NewAgentNetwork>, Record<string, import("@mastra/core/mcp").MCPServerBase>, Record<string, import("@mastra/core/scores").MastraScorer<any, any, any, any>>>;
4
+ import { Mastra } from '@mastra/core/mastra';
5
+ //# sourceMappingURL=basic.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"basic.d.ts","sourceRoot":"","sources":["../../../src/plugins/__fixtures__/basic.js"],"names":[],"mappings":"AAOA;;gqCA+BG;uBArCoB,qBAAqB"}
@@ -0,0 +1,3 @@
1
+ export const mastra: Mastra<Record<string, import("@mastra/core/agent").Agent<any, import("@mastra/core/agent").ToolsInput, Record<string, import("@mastra/core").Metric>>>, Record<string, import("@mastra/core/workflows/legacy").LegacyWorkflow<import("@mastra/core/workflows/legacy").LegacyStep<string, any, any, import("@mastra/core/workflows/legacy").StepExecutionContext<any, import("@mastra/core/workflows/legacy").WorkflowContext<any, import("@mastra/core/workflows/legacy").LegacyStep<string, any, any, any>[], Record<string, any>>>>[], string, any, any>>, Record<string, import("@mastra/core/workflows").Workflow<any, import("@mastra/core").Step<string, any, any, any, any, any>[], string, import("zod").ZodType<any, import("zod").ZodTypeDef, any>, import("zod").ZodType<any, import("zod").ZodTypeDef, any>, import("zod").ZodType<any, import("zod").ZodTypeDef, any>>>, Record<string, import("@mastra/core/vector").MastraVector<import("@mastra/core/vector/filter").VectorFilter>>, Record<string, import("@mastra/core/tts").MastraTTS>, import("@mastra/core/logger").IMastraLogger, Record<string, import("@mastra/core/network").AgentNetwork>, Record<string, import("@mastra/core/network/vNext").NewAgentNetwork>, Record<string, import("@mastra/core/mcp").MCPServerBase>, Record<string, import("@mastra/core/scores").MastraScorer<any, any, any, any>>>;
2
+ import { Mastra } from '@mastra/core/mastra';
3
+ //# sourceMappingURL=empty-mastra.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"empty-mastra.d.ts","sourceRoot":"","sources":["../../../src/plugins/__fixtures__/empty-mastra.js"],"names":[],"mappings":"AACA,00CAAmC;uBADZ,qBAAqB"}
@@ -0,0 +1,6 @@
1
+ export const storage: any;
2
+ export const mastra: Mastra<{
3
+ weatherAgent: any;
4
+ }, Record<string, import("@mastra/core/workflows/legacy").LegacyWorkflow<import("@mastra/core/workflows/legacy").LegacyStep<string, any, any, import("@mastra/core/workflows/legacy").StepExecutionContext<any, import("@mastra/core/workflows/legacy").WorkflowContext<any, import("@mastra/core/workflows/legacy").LegacyStep<string, any, any, any>[], Record<string, any>>>>[], string, any, any>>, Record<string, import("@mastra/core/workflows").Workflow<any, import("@mastra/core").Step<string, any, any, any, any, any>[], string, import("zod").ZodType<any, import("zod").ZodTypeDef, any>, import("zod").ZodType<any, import("zod").ZodTypeDef, any>, import("zod").ZodType<any, import("zod").ZodTypeDef, any>>>, Record<string, import("@mastra/core/vector").MastraVector<import("@mastra/core/vector/filter").VectorFilter>>, Record<string, import("@mastra/core/tts").MastraTTS>, import("@mastra/core/logger").ConsoleLogger, Record<string, import("@mastra/core/network").AgentNetwork>, Record<string, import("@mastra/core/network/vNext").NewAgentNetwork>, Record<string, import("@mastra/core/mcp").MCPServerBase>, Record<string, import("@mastra/core/scores").MastraScorer<any, any, any, any>>>;
5
+ import { Mastra } from '@mastra/core/mastra';
6
+ //# sourceMappingURL=multiple-postgres-stores.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"multiple-postgres-stores.d.ts","sourceRoot":"","sources":["../../../src/plugins/__fixtures__/multiple-postgres-stores.js"],"names":[],"mappings":"AAOA,0BAEG;AAEH;;gqCA+BG;uBAzCoB,qBAAqB"}
@@ -0,0 +1,3 @@
1
+ import type { Plugin } from 'rollup';
2
+ export declare function mastraInstanceWrapper(mastraEntryFile: string): Plugin;
3
+ //# sourceMappingURL=mastra-instance-wrapper.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"mastra-instance-wrapper.d.ts","sourceRoot":"","sources":["../../src/plugins/mastra-instance-wrapper.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAGrC,wBAAgB,qBAAqB,CAAC,eAAe,EAAE,MAAM,GAAG,MAAM,CAyBrE"}
@@ -0,0 +1,3 @@
1
+ import type { Plugin } from 'rollup';
2
+ export declare function postgresStoreInstanceChecker(): Plugin;
3
+ //# sourceMappingURL=postgres-store-instance-checker.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"postgres-store-instance-checker.d.ts","sourceRoot":"","sources":["../../src/plugins/postgres-store-instance-checker.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAGrC,wBAAgB,4BAA4B,IAAI,MAAM,CAuBrD"}
@@ -87,3 +87,5 @@ var CloudflareSecretsManager = class {
87
87
  };
88
88
 
89
89
  exports.CloudflareSecretsManager = CloudflareSecretsManager;
90
+ //# sourceMappingURL=index.cjs.map
91
+ //# sourceMappingURL=index.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/secrets-manager/index.ts"],"names":[],"mappings":";;;AAAO,IAAM,2BAAN,MAA+B;AAAA,EACpC,SAAA;AAAA,EACA,QAAA;AAAA,EACA,OAAA;AAAA,EAEA,WAAA,CAAY,EAAE,SAAA,EAAW,QAAA,EAAS,EAA4C;AAC5E,IAAA,IAAA,CAAK,SAAA,GAAY,SAAA;AACjB,IAAA,IAAA,CAAK,QAAA,GAAW,QAAA;AAChB,IAAA,IAAA,CAAK,OAAA,GAAU,sCAAA;AAAA,EACjB;AAAA,EAEA,MAAM,YAAA,CAAa;AAAA,IACjB,QAAA;AAAA,IACA,UAAA;AAAA,IACA;AAAA,GACF,EAIG;AACD,IAAA,MAAM,GAAA,GAAM,GAAG,IAAA,CAAK,OAAO,aAAa,IAAA,CAAK,SAAS,oBAAoB,QAAQ,CAAA,QAAA,CAAA;AAElF,IAAA,IAAI;AACF,MAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,GAAA,EAAK;AAAA,QAChC,MAAA,EAAQ,KAAA;AAAA,QACR,OAAA,EAAS;AAAA,UACP,aAAA,EAAe,CAAA,OAAA,EAAU,IAAA,CAAK,QAAQ,CAAA,CAAA;AAAA,UACtC,cAAA,EAAgB;AAAA,SAClB;AAAA,QACA,IAAA,EAAM,KAAK,SAAA,CAAU;AAAA,UACnB,IAAA,EAAM,UAAA;AAAA,UACN,IAAA,EAAM;AAAA,SACP;AAAA,OACF,CAAA;AAED,MAAA,MAAM,IAAA,GAAQ,MAAM,QAAA,CAAS,IAAA,EAAK;AAElC,MAAA,IAAI,CAAC,KAAK,OAAA,EAAS;AACjB,QAAA,MAAM,IAAI,KAAA,CAAM,IAAA,CAAK,MAAA,CAAO,CAAC,EAAE,OAAO,CAAA;AAAA,MACxC;AAEA,MAAA,OAAO,IAAA,CAAK,MAAA;AAAA,IACd,SAAS,KAAA,EAAO;AACd,MAAA,OAAA,CAAQ,KAAA,CAAM,4BAA4B,KAAK,CAAA;AAC/C,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA,EAEA,MAAM,oBAAA,CAAqB;AAAA,IACzB,QAAA;AAAA,IACA,UAAA;AAAA,IACA;AAAA,GACF,EAIG;AACD,IAAA,MAAM,UAAA,GAAa,CAAA,QAAA,EAAW,UAAA,CAAW,WAAA,EAAa,CAAA,CAAA;AACtD,IAAA,MAAM,WAAA,GAAc,IAAA,CAAK,SAAA,CAAU,OAAO,CAAA;AAE1C,IAAA,OAAO,KAAK,YAAA,CAAa,EAAE,QAAA,EAAU,UAAA,EAAY,aAAa,CAAA;AAAA,EAChE;AAAA,EAEA,MAAM,YAAA,CAAa,EAAE,QAAA,EAAU,YAAW,EAA6C;AACrF,IAAA,MAAM,GAAA,GAAM,CAAA,EAAG,IAAA,CAAK,OAAO,CAAA,UAAA,EAAa,KAAK,SAAS,CAAA,iBAAA,EAAoB,QAAQ,CAAA,SAAA,EAAY,UAAU,CAAA,CAAA;AAExG,IAAA,IAAI;AACF,MAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,GAAA,EAAK;AAAA,QAChC,MAAA,EAAQ,QAAA;AAAA,QACR,OAAA,EAAS;AAAA,UACP,aAAA,EAAe,CAAA,OAAA,EAAU,IAAA,CAAK,QAAQ,CAAA;AAAA;AACxC,OACD,CAAA;AAED,MAAA,MAAM,IAAA,GAAQ,MAAM,QAAA,CAAS,IAAA,EAAK;AAElC,MAAA,IAAI,CAAC,KAAK,OAAA,EAAS;AACjB,QAAA,MAAM,IAAI,KAAA,CAAM,IAAA,CAAK,MAAA,CAAO,CAAC,EAAE,OAAO,CAAA;AAAA,MACxC;AAEA,MAAA,OAAO,IAAA,CAAK,MAAA;AAAA,IACd,SAAS,KAAA,EAAO;AACd,MAAA,OAAA,CAAQ,KAAA,CAAM,4BAA4B,KAAK,CAAA;AAC/C,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,QAAA,EAAkB;AAClC,IAAA,MAAM,GAAA,GAAM,GAAG,IAAA,CAAK,OAAO,aAAa,IAAA,CAAK,SAAS,oBAAoB,QAAQ,CAAA,QAAA,CAAA;AAElF,IAAA,IAAI;AACF,MAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,GAAA,EAAK;AAAA,QAChC,OAAA,EAAS;AAAA,UACP,aAAA,EAAe,CAAA,OAAA,EAAU,IAAA,CAAK,QAAQ,CAAA;AAAA;AACxC,OACD,CAAA;AAED,MAAA,MAAM,IAAA,GAAQ,MAAM,QAAA,CAAS,IAAA,EAAK;AAElC,MAAA,IAAI,CAAC,KAAK,OAAA,EAAS;AACjB,QAAA,MAAM,IAAI,KAAA,CAAM,IAAA,CAAK,MAAA,CAAO,CAAC,EAAE,OAAO,CAAA;AAAA,MACxC;AAEA,MAAA,OAAO,IAAA,CAAK,MAAA;AAAA,IACd,SAAS,KAAA,EAAO;AACd,MAAA,OAAA,CAAQ,KAAA,CAAM,2BAA2B,KAAK,CAAA;AAC9C,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AACF","file":"index.cjs","sourcesContent":["export class CloudflareSecretsManager {\n accountId: string;\n apiToken: string;\n baseUrl: string;\n\n constructor({ accountId, apiToken }: { accountId: string; apiToken: string }) {\n this.accountId = accountId;\n this.apiToken = apiToken;\n this.baseUrl = 'https://api.cloudflare.com/client/v4';\n }\n\n async createSecret({\n workerId,\n secretName,\n secretValue,\n }: {\n workerId: string;\n secretName: string;\n secretValue: string;\n }) {\n const url = `${this.baseUrl}/accounts/${this.accountId}/workers/scripts/${workerId}/secrets`;\n\n try {\n const response = await fetch(url, {\n method: 'PUT',\n headers: {\n Authorization: `Bearer ${this.apiToken}`,\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({\n name: secretName,\n text: secretValue,\n }),\n });\n\n const data = (await response.json()) as { success: boolean; result: any; errors: any[] };\n\n if (!data.success) {\n throw new Error(data.errors[0].message);\n }\n\n return data.result;\n } catch (error) {\n console.error('Failed to create secret:', error);\n throw error;\n }\n }\n\n async createProjectSecrets({\n workerId,\n customerId,\n envVars,\n }: {\n workerId: string;\n customerId: string;\n envVars: Record<string, string>;\n }) {\n const secretName = `PROJECT_${customerId.toUpperCase()}`;\n const secretValue = JSON.stringify(envVars);\n\n return this.createSecret({ workerId, secretName, secretValue });\n }\n\n async deleteSecret({ workerId, secretName }: { workerId: string; secretName: string }) {\n const url = `${this.baseUrl}/accounts/${this.accountId}/workers/scripts/${workerId}/secrets/${secretName}`;\n\n try {\n const response = await fetch(url, {\n method: 'DELETE',\n headers: {\n Authorization: `Bearer ${this.apiToken}`,\n },\n });\n\n const data = (await response.json()) as { success: boolean; result: any; errors: any[] };\n\n if (!data.success) {\n throw new Error(data.errors[0].message);\n }\n\n return data.result;\n } catch (error) {\n console.error('Failed to delete secret:', error);\n throw error;\n }\n }\n\n async listSecrets(workerId: string) {\n const url = `${this.baseUrl}/accounts/${this.accountId}/workers/scripts/${workerId}/secrets`;\n\n try {\n const response = await fetch(url, {\n headers: {\n Authorization: `Bearer ${this.apiToken}`,\n },\n });\n\n const data = (await response.json()) as { success: boolean; result: any; errors: any[] };\n\n if (!data.success) {\n throw new Error(data.errors[0].message);\n }\n\n return data.result;\n } catch (error) {\n console.error('Failed to list secrets:', error);\n throw error;\n }\n }\n}\n"]}
@@ -1 +1,25 @@
1
- export { CloudflareSecretsManager } from '../_tsup-dts-rollup.js';
1
+ export declare class CloudflareSecretsManager {
2
+ accountId: string;
3
+ apiToken: string;
4
+ baseUrl: string;
5
+ constructor({ accountId, apiToken }: {
6
+ accountId: string;
7
+ apiToken: string;
8
+ });
9
+ createSecret({ workerId, secretName, secretValue, }: {
10
+ workerId: string;
11
+ secretName: string;
12
+ secretValue: string;
13
+ }): Promise<any>;
14
+ createProjectSecrets({ workerId, customerId, envVars, }: {
15
+ workerId: string;
16
+ customerId: string;
17
+ envVars: Record<string, string>;
18
+ }): Promise<any>;
19
+ deleteSecret({ workerId, secretName }: {
20
+ workerId: string;
21
+ secretName: string;
22
+ }): Promise<any>;
23
+ listSecrets(workerId: string): Promise<any>;
24
+ }
25
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/secrets-manager/index.ts"],"names":[],"mappings":"AAAA,qBAAa,wBAAwB;IACnC,SAAS,EAAE,MAAM,CAAC;IAClB,QAAQ,EAAE,MAAM,CAAC;IACjB,OAAO,EAAE,MAAM,CAAC;gBAEJ,EAAE,SAAS,EAAE,QAAQ,EAAE,EAAE;QAAE,SAAS,EAAE,MAAM,CAAC;QAAC,QAAQ,EAAE,MAAM,CAAA;KAAE;IAMtE,YAAY,CAAC,EACjB,QAAQ,EACR,UAAU,EACV,WAAW,GACZ,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,UAAU,EAAE,MAAM,CAAC;QACnB,WAAW,EAAE,MAAM,CAAC;KACrB;IA6BK,oBAAoB,CAAC,EACzB,QAAQ,EACR,UAAU,EACV,OAAO,GACR,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,UAAU,EAAE,MAAM,CAAC;QACnB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;KACjC;IAOK,YAAY,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,EAAE;QAAE,QAAQ,EAAE,MAAM,CAAC;QAAC,UAAU,EAAE,MAAM,CAAA;KAAE;IAwB/E,WAAW,CAAC,QAAQ,EAAE,MAAM;CAsBnC"}
@@ -85,3 +85,5 @@ var CloudflareSecretsManager = class {
85
85
  };
86
86
 
87
87
  export { CloudflareSecretsManager };
88
+ //# sourceMappingURL=index.js.map
89
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/secrets-manager/index.ts"],"names":[],"mappings":";AAAO,IAAM,2BAAN,MAA+B;AAAA,EACpC,SAAA;AAAA,EACA,QAAA;AAAA,EACA,OAAA;AAAA,EAEA,WAAA,CAAY,EAAE,SAAA,EAAW,QAAA,EAAS,EAA4C;AAC5E,IAAA,IAAA,CAAK,SAAA,GAAY,SAAA;AACjB,IAAA,IAAA,CAAK,QAAA,GAAW,QAAA;AAChB,IAAA,IAAA,CAAK,OAAA,GAAU,sCAAA;AAAA,EACjB;AAAA,EAEA,MAAM,YAAA,CAAa;AAAA,IACjB,QAAA;AAAA,IACA,UAAA;AAAA,IACA;AAAA,GACF,EAIG;AACD,IAAA,MAAM,GAAA,GAAM,GAAG,IAAA,CAAK,OAAO,aAAa,IAAA,CAAK,SAAS,oBAAoB,QAAQ,CAAA,QAAA,CAAA;AAElF,IAAA,IAAI;AACF,MAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,GAAA,EAAK;AAAA,QAChC,MAAA,EAAQ,KAAA;AAAA,QACR,OAAA,EAAS;AAAA,UACP,aAAA,EAAe,CAAA,OAAA,EAAU,IAAA,CAAK,QAAQ,CAAA,CAAA;AAAA,UACtC,cAAA,EAAgB;AAAA,SAClB;AAAA,QACA,IAAA,EAAM,KAAK,SAAA,CAAU;AAAA,UACnB,IAAA,EAAM,UAAA;AAAA,UACN,IAAA,EAAM;AAAA,SACP;AAAA,OACF,CAAA;AAED,MAAA,MAAM,IAAA,GAAQ,MAAM,QAAA,CAAS,IAAA,EAAK;AAElC,MAAA,IAAI,CAAC,KAAK,OAAA,EAAS;AACjB,QAAA,MAAM,IAAI,KAAA,CAAM,IAAA,CAAK,MAAA,CAAO,CAAC,EAAE,OAAO,CAAA;AAAA,MACxC;AAEA,MAAA,OAAO,IAAA,CAAK,MAAA;AAAA,IACd,SAAS,KAAA,EAAO;AACd,MAAA,OAAA,CAAQ,KAAA,CAAM,4BAA4B,KAAK,CAAA;AAC/C,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA,EAEA,MAAM,oBAAA,CAAqB;AAAA,IACzB,QAAA;AAAA,IACA,UAAA;AAAA,IACA;AAAA,GACF,EAIG;AACD,IAAA,MAAM,UAAA,GAAa,CAAA,QAAA,EAAW,UAAA,CAAW,WAAA,EAAa,CAAA,CAAA;AACtD,IAAA,MAAM,WAAA,GAAc,IAAA,CAAK,SAAA,CAAU,OAAO,CAAA;AAE1C,IAAA,OAAO,KAAK,YAAA,CAAa,EAAE,QAAA,EAAU,UAAA,EAAY,aAAa,CAAA;AAAA,EAChE;AAAA,EAEA,MAAM,YAAA,CAAa,EAAE,QAAA,EAAU,YAAW,EAA6C;AACrF,IAAA,MAAM,GAAA,GAAM,CAAA,EAAG,IAAA,CAAK,OAAO,CAAA,UAAA,EAAa,KAAK,SAAS,CAAA,iBAAA,EAAoB,QAAQ,CAAA,SAAA,EAAY,UAAU,CAAA,CAAA;AAExG,IAAA,IAAI;AACF,MAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,GAAA,EAAK;AAAA,QAChC,MAAA,EAAQ,QAAA;AAAA,QACR,OAAA,EAAS;AAAA,UACP,aAAA,EAAe,CAAA,OAAA,EAAU,IAAA,CAAK,QAAQ,CAAA;AAAA;AACxC,OACD,CAAA;AAED,MAAA,MAAM,IAAA,GAAQ,MAAM,QAAA,CAAS,IAAA,EAAK;AAElC,MAAA,IAAI,CAAC,KAAK,OAAA,EAAS;AACjB,QAAA,MAAM,IAAI,KAAA,CAAM,IAAA,CAAK,MAAA,CAAO,CAAC,EAAE,OAAO,CAAA;AAAA,MACxC;AAEA,MAAA,OAAO,IAAA,CAAK,MAAA;AAAA,IACd,SAAS,KAAA,EAAO;AACd,MAAA,OAAA,CAAQ,KAAA,CAAM,4BAA4B,KAAK,CAAA;AAC/C,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,QAAA,EAAkB;AAClC,IAAA,MAAM,GAAA,GAAM,GAAG,IAAA,CAAK,OAAO,aAAa,IAAA,CAAK,SAAS,oBAAoB,QAAQ,CAAA,QAAA,CAAA;AAElF,IAAA,IAAI;AACF,MAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,GAAA,EAAK;AAAA,QAChC,OAAA,EAAS;AAAA,UACP,aAAA,EAAe,CAAA,OAAA,EAAU,IAAA,CAAK,QAAQ,CAAA;AAAA;AACxC,OACD,CAAA;AAED,MAAA,MAAM,IAAA,GAAQ,MAAM,QAAA,CAAS,IAAA,EAAK;AAElC,MAAA,IAAI,CAAC,KAAK,OAAA,EAAS;AACjB,QAAA,MAAM,IAAI,KAAA,CAAM,IAAA,CAAK,MAAA,CAAO,CAAC,EAAE,OAAO,CAAA;AAAA,MACxC;AAEA,MAAA,OAAO,IAAA,CAAK,MAAA;AAAA,IACd,SAAS,KAAA,EAAO;AACd,MAAA,OAAA,CAAQ,KAAA,CAAM,2BAA2B,KAAK,CAAA;AAC9C,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AACF","file":"index.js","sourcesContent":["export class CloudflareSecretsManager {\n accountId: string;\n apiToken: string;\n baseUrl: string;\n\n constructor({ accountId, apiToken }: { accountId: string; apiToken: string }) {\n this.accountId = accountId;\n this.apiToken = apiToken;\n this.baseUrl = 'https://api.cloudflare.com/client/v4';\n }\n\n async createSecret({\n workerId,\n secretName,\n secretValue,\n }: {\n workerId: string;\n secretName: string;\n secretValue: string;\n }) {\n const url = `${this.baseUrl}/accounts/${this.accountId}/workers/scripts/${workerId}/secrets`;\n\n try {\n const response = await fetch(url, {\n method: 'PUT',\n headers: {\n Authorization: `Bearer ${this.apiToken}`,\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({\n name: secretName,\n text: secretValue,\n }),\n });\n\n const data = (await response.json()) as { success: boolean; result: any; errors: any[] };\n\n if (!data.success) {\n throw new Error(data.errors[0].message);\n }\n\n return data.result;\n } catch (error) {\n console.error('Failed to create secret:', error);\n throw error;\n }\n }\n\n async createProjectSecrets({\n workerId,\n customerId,\n envVars,\n }: {\n workerId: string;\n customerId: string;\n envVars: Record<string, string>;\n }) {\n const secretName = `PROJECT_${customerId.toUpperCase()}`;\n const secretValue = JSON.stringify(envVars);\n\n return this.createSecret({ workerId, secretName, secretValue });\n }\n\n async deleteSecret({ workerId, secretName }: { workerId: string; secretName: string }) {\n const url = `${this.baseUrl}/accounts/${this.accountId}/workers/scripts/${workerId}/secrets/${secretName}`;\n\n try {\n const response = await fetch(url, {\n method: 'DELETE',\n headers: {\n Authorization: `Bearer ${this.apiToken}`,\n },\n });\n\n const data = (await response.json()) as { success: boolean; result: any; errors: any[] };\n\n if (!data.success) {\n throw new Error(data.errors[0].message);\n }\n\n return data.result;\n } catch (error) {\n console.error('Failed to delete secret:', error);\n throw error;\n }\n }\n\n async listSecrets(workerId: string) {\n const url = `${this.baseUrl}/accounts/${this.accountId}/workers/scripts/${workerId}/secrets`;\n\n try {\n const response = await fetch(url, {\n headers: {\n Authorization: `Bearer ${this.apiToken}`,\n },\n });\n\n const data = (await response.json()) as { success: boolean; result: any; errors: any[] };\n\n if (!data.success) {\n throw new Error(data.errors[0].message);\n }\n\n return data.result;\n } catch (error) {\n console.error('Failed to list secrets:', error);\n throw error;\n }\n }\n}\n"]}
package/package.json CHANGED
@@ -1,10 +1,11 @@
1
1
  {
2
2
  "name": "@mastra/deployer-cloudflare",
3
- "version": "0.0.0-pass-headers-for-create-mastra-client-20250530010057",
3
+ "version": "0.0.0-pgvector-index-fix-20250905222058",
4
4
  "description": "",
5
5
  "type": "module",
6
6
  "files": [
7
- "dist"
7
+ "dist",
8
+ "CHANGELOG.md"
8
9
  ],
9
10
  "main": "dist/index.js",
10
11
  "types": "dist/index.d.ts",
@@ -15,7 +16,7 @@
15
16
  "default": "./dist/index.js"
16
17
  },
17
18
  "require": {
18
- "types": "./dist/index.d.cts",
19
+ "types": "./dist/index.d.ts",
19
20
  "default": "./dist/index.cjs"
20
21
  }
21
22
  },
@@ -25,7 +26,7 @@
25
26
  "default": "./dist/secrets-manager/index.js"
26
27
  },
27
28
  "require": {
28
- "types": "./dist/secrets-manager/index.d.cts",
29
+ "types": "./dist/secrets-manager/index.d.ts",
29
30
  "default": "./dist/secrets-manager/index.cjs"
30
31
  }
31
32
  },
@@ -33,32 +34,44 @@
33
34
  },
34
35
  "keywords": [],
35
36
  "author": "",
36
- "license": "Elastic-2.0",
37
+ "license": "Apache-2.0",
37
38
  "dependencies": {
38
- "@babel/core": "^7.26.10",
39
+ "@babel/core": "^7.28.0",
39
40
  "@rollup/plugin-virtual": "^3.0.2",
40
- "cloudflare": "^4.1.0",
41
- "rollup": "^4.35.0",
42
- "wrangler": "^4.4.0",
43
- "zod": "^3.24.3",
44
- "@mastra/deployer": "0.0.0-pass-headers-for-create-mastra-client-20250530010057"
41
+ "cloudflare": "^4.5.0",
42
+ "rollup": "~4.50.0",
43
+ "@mastra/deployer": "0.0.0-pgvector-index-fix-20250905222058"
45
44
  },
46
45
  "devDependencies": {
47
- "@microsoft/api-extractor": "^7.52.5",
48
- "@types/node": "^20.17.27",
49
- "eslint": "^9.23.0",
50
- "tsup": "^8.4.0",
51
- "typescript": "^5.8.2",
52
- "vitest": "^3.1.2",
53
- "@internal/lint": "0.0.0-pass-headers-for-create-mastra-client-20250530010057",
54
- "@mastra/core": "0.0.0-pass-headers-for-create-mastra-client-20250530010057"
46
+ "@babel/types": "^7.28.2",
47
+ "@microsoft/api-extractor": "^7.52.8",
48
+ "@types/babel__core": "^7.20.5",
49
+ "@types/node": "^20.19.0",
50
+ "eslint": "^9.30.1",
51
+ "tsup": "^8.5.0",
52
+ "typescript": "^5.8.3",
53
+ "vitest": "^3.2.4",
54
+ "zod": "^3.25.76",
55
+ "@internal/lint": "0.0.0-pgvector-index-fix-20250905222058",
56
+ "@internal/types-builder": "0.0.0-pgvector-index-fix-20250905222058",
57
+ "@mastra/core": "0.0.0-pgvector-index-fix-20250905222058"
58
+ },
59
+ "homepage": "https://mastra.ai",
60
+ "repository": {
61
+ "type": "git",
62
+ "url": "git+https://github.com/mastra-ai/mastra.git",
63
+ "directory": "deployers/cloudflare"
64
+ },
65
+ "bugs": {
66
+ "url": "https://github.com/mastra-ai/mastra/issues"
55
67
  },
56
68
  "peerDependencies": {
57
- "@mastra/core": "^0.10.0"
69
+ "zod": "^3.25.0 || ^4.0.0",
70
+ "@mastra/core": "0.0.0-pgvector-index-fix-20250905222058"
58
71
  },
59
72
  "scripts": {
60
- "build": "tsup src/index.ts src/secrets-manager/index.ts --format esm,cjs --experimental-dts --clean --treeshake=smallest --splitting",
61
- "build:watch": "pnpm build --watch",
73
+ "build": "tsup --silent --config tsup.config.ts",
74
+ "build:watch": "tsup --watch --silent --config tsup.config.ts",
62
75
  "test": "vitest run",
63
76
  "lint": "eslint ."
64
77
  }