@nekzus/liop 1.3.0-alpha.1 → 2.0.0-alpha.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (122) hide show
  1. package/README.md +41 -17
  2. package/dist/bin/agent.d.ts +0 -1
  3. package/dist/bin/agent.js +5 -306
  4. package/dist/bin/agent.js.map +1 -0
  5. package/dist/{bridge/stream.d.ts → bridge.d.ts} +44 -3
  6. package/dist/bridge.js +2 -0
  7. package/dist/bridge.js.map +1 -0
  8. package/dist/chunk-4ABAFG44.js +33 -0
  9. package/dist/chunk-4ABAFG44.js.map +1 -0
  10. package/dist/chunk-ANFXJGMP.js +2 -0
  11. package/dist/chunk-ANFXJGMP.js.map +1 -0
  12. package/dist/chunk-DBXGYHKY.js +2 -0
  13. package/dist/chunk-DBXGYHKY.js.map +1 -0
  14. package/dist/chunk-HM77MWB6.js +2 -0
  15. package/dist/chunk-HM77MWB6.js.map +1 -0
  16. package/dist/chunk-HNDVAKEK.js +24 -0
  17. package/dist/chunk-HNDVAKEK.js.map +1 -0
  18. package/dist/chunk-HQZHZM6U.js +2 -0
  19. package/dist/chunk-HQZHZM6U.js.map +1 -0
  20. package/dist/chunk-P52IE4L6.js +2 -0
  21. package/dist/chunk-P52IE4L6.js.map +1 -0
  22. package/dist/chunk-PIBCW4BD.js +13 -0
  23. package/dist/chunk-PIBCW4BD.js.map +1 -0
  24. package/dist/chunk-PPCOS2NU.js +2 -0
  25. package/dist/chunk-PPCOS2NU.js.map +1 -0
  26. package/dist/chunk-RWRRBYG4.js +2 -0
  27. package/dist/chunk-RWRRBYG4.js.map +1 -0
  28. package/dist/chunk-S6RJHZV2.js +2 -0
  29. package/dist/chunk-S6RJHZV2.js.map +1 -0
  30. package/dist/chunk-UVTEJYHN.js +2 -0
  31. package/dist/chunk-UVTEJYHN.js.map +1 -0
  32. package/dist/chunk-X6FJATUE.js +29 -0
  33. package/dist/chunk-X6FJATUE.js.map +1 -0
  34. package/dist/chunk-XLVRRGOX.js +3 -0
  35. package/dist/chunk-XLVRRGOX.js.map +1 -0
  36. package/dist/client.d.ts +5 -0
  37. package/dist/client.js +2 -0
  38. package/dist/client.js.map +1 -0
  39. package/dist/{gateway/router.d.ts → gateway.d.ts} +37 -5
  40. package/dist/gateway.js +2 -0
  41. package/dist/gateway.js.map +1 -0
  42. package/dist/{client/index.d.ts → index-CyxNLlz7.d.ts} +24 -5
  43. package/dist/index.d.ts +313 -12
  44. package/dist/index.js +31 -12
  45. package/dist/index.js.map +1 -0
  46. package/dist/kyber-2WDOTUQX.js +2 -0
  47. package/dist/kyber-2WDOTUQX.js.map +1 -0
  48. package/dist/{mesh/node.d.ts → mesh.d.ts} +5 -3
  49. package/dist/mesh.js +2 -0
  50. package/dist/mesh.js.map +1 -0
  51. package/dist/{server/index.d.ts → server.d.ts} +145 -10
  52. package/dist/server.js +2 -0
  53. package/dist/server.js.map +1 -0
  54. package/dist/types.d.ts +17 -14
  55. package/dist/types.js +2 -26
  56. package/dist/types.js.map +1 -0
  57. package/dist/{crypto/verifier.d.ts → verifier-DTCD9imJ.d.ts} +3 -1
  58. package/dist/verifier-RQRYXA4C.js +2 -0
  59. package/dist/verifier-RQRYXA4C.js.map +1 -0
  60. package/dist/workers/logic-execution.d.ts +4 -2
  61. package/dist/workers/logic-execution.js +2 -123
  62. package/dist/workers/logic-execution.js.map +1 -0
  63. package/dist/workers/zk-verifier.d.ts +4 -2
  64. package/dist/workers/zk-verifier.js +2 -98
  65. package/dist/workers/zk-verifier.js.map +1 -0
  66. package/package.json +31 -17
  67. package/dist/bridge/index.d.ts +0 -37
  68. package/dist/bridge/index.js +0 -249
  69. package/dist/bridge/stream.js +0 -210
  70. package/dist/client/index.js +0 -275
  71. package/dist/crypto/logic-image-id.d.ts +0 -3
  72. package/dist/crypto/logic-image-id.js +0 -27
  73. package/dist/crypto/verifier.js +0 -97
  74. package/dist/economy/estimator.d.ts +0 -53
  75. package/dist/economy/estimator.js +0 -69
  76. package/dist/economy/index.d.ts +0 -5
  77. package/dist/economy/index.js +0 -3
  78. package/dist/economy/otel.d.ts +0 -38
  79. package/dist/economy/otel.js +0 -100
  80. package/dist/economy/telemetry.d.ts +0 -77
  81. package/dist/economy/telemetry.js +0 -224
  82. package/dist/errors.d.ts +0 -14
  83. package/dist/errors.js +0 -19
  84. package/dist/gateway/hybrid.d.ts +0 -23
  85. package/dist/gateway/hybrid.js +0 -199
  86. package/dist/gateway/router.js +0 -1036
  87. package/dist/mesh/index.d.ts +0 -1
  88. package/dist/mesh/index.js +0 -1
  89. package/dist/mesh/node.js +0 -853
  90. package/dist/prompts/adapters.d.ts +0 -16
  91. package/dist/prompts/adapters.js +0 -55
  92. package/dist/rpc/client.d.ts +0 -22
  93. package/dist/rpc/client.js +0 -40
  94. package/dist/rpc/codec/lpm.d.ts +0 -20
  95. package/dist/rpc/codec/lpm.js +0 -36
  96. package/dist/rpc/crypto/aes.d.ts +0 -22
  97. package/dist/rpc/crypto/aes.js +0 -47
  98. package/dist/rpc/crypto/kyber.d.ts +0 -27
  99. package/dist/rpc/crypto/kyber.js +0 -70
  100. package/dist/rpc/proto.d.ts +0 -2
  101. package/dist/rpc/proto.js +0 -33
  102. package/dist/rpc/server.d.ts +0 -13
  103. package/dist/rpc/server.js +0 -50
  104. package/dist/rpc/tls.d.ts +0 -26
  105. package/dist/rpc/tls.js +0 -54
  106. package/dist/rpc/types.d.ts +0 -28
  107. package/dist/rpc/types.js +0 -5
  108. package/dist/sandbox/guardian.d.ts +0 -18
  109. package/dist/sandbox/guardian.js +0 -58
  110. package/dist/sandbox/wasi.d.ts +0 -36
  111. package/dist/sandbox/wasi.js +0 -209
  112. package/dist/security/guardian.d.ts +0 -22
  113. package/dist/security/guardian.js +0 -52
  114. package/dist/security/zk.d.ts +0 -37
  115. package/dist/security/zk.js +0 -76
  116. package/dist/server/index.js +0 -937
  117. package/dist/server/pii.d.ts +0 -40
  118. package/dist/server/pii.js +0 -266
  119. package/dist/utils/logger.d.ts +0 -21
  120. package/dist/utils/logger.js +0 -70
  121. package/dist/utils/mcpCompact.d.ts +0 -11
  122. package/dist/utils/mcpCompact.js +0 -29
package/README.md CHANGED
@@ -188,9 +188,24 @@ new LiopServer(
188
188
  serverInfo: { name: string; version: string },
189
189
  config?: {
190
190
  capabilities?: Record<string, unknown>;
191
+ workerPool?: {
192
+ enabled?: boolean; // Enable OS-thread sandboxing (default: true)
193
+ maxThreads?: number; // Max worker threads (default: CPU count)
194
+ maxHeapMb?: number; // V8 heap limit per worker (default: 64, env: LIOP_WORKER_MAX_HEAP_MB)
195
+ };
191
196
  security?: {
192
197
  piiPatterns?: PiiRule[]; // Regex/validator rules for PII detection
193
198
  forbiddenKeys?: string[]; // Keys stripped from outgoing responses
199
+ enableNerScanning?: boolean; // NLP entity detection via compromise (default: false)
200
+ rateLimit?: { // Sliding window rate limiter per tool
201
+ maxPerWindow?: number; // Max calls per window (default: 30)
202
+ windowMs?: number; // Window duration in ms (default: 60000)
203
+ };
204
+ };
205
+ taxonomy?: { // Data domain classification
206
+ domain?: string; // e.g., "finance", "healthcare"
207
+ clearanceTier?: string; // e.g., "tier-0", "tier-1"
208
+ executionTypes?: string[]; // e.g., ["aggregation", "analytics"]
194
209
  };
195
210
  }
196
211
  )
@@ -243,22 +258,31 @@ await bridge.connect();
243
258
  ### The Shield — Multi-Layer Defense
244
259
 
245
260
  ```
246
- ┌─────────────────────────────────────────────────────┐
247
- │ Layer 1: Guardian AST (Zero-Time Static Analysis)
248
- │ Blocks: require, import(), fs, eval, fetch,
249
- process, global, __proto__, XMLHttpRequest
250
- ├─────────────────────────────────────────────────────┤
251
- │ Layer 2: WASI Sandbox (V8 Isolate)
252
- No Node.js globals CPU Fuel limits 3s timeout
253
- ├─────────────────────────────────────────────────────┤
254
- │ Layer 3: PII Shield (Egress Filter) │
255
- Scans output for Email, SSN, Credit Card, IP
256
- Strips forbidden keys from response objects
257
- ├─────────────────────────────────────────────────────┤
258
- │ Layer 4: ZK-Receipt (Integrity Verification) │
259
- SHA-256 ImageID + SHA-512 RISC0-style Seal
260
- LiopMcpBridge verifies before forwarding to LLM
261
- └─────────────────────────────────────────────────────┘
261
+ ┌───────────────────────────────────────────────────────────┐
262
+ │ Layer 1: Guardian AST (Zero-Time Static Analysis)
263
+ │ Blocks: require, import(), fs, eval, fetch, process,
264
+ │ global, __proto__, XMLHttpRequest • 128 import cap
265
+ ├───────────────────────────────────────────────────────────┤
266
+ │ Layer 2: WASI Sandbox (V8 Isolate)
267
+ 25 poisoned globals (incl. Date, TypedArrays)
268
+ │ CPU Fuel limits • 5s timeout • maxHeapMb (64MB default) │
269
+ ├───────────────────────────────────────────────────────────┤
270
+ Layer 3: Prototype Pollution Defense
271
+ Object.freeze() on 6 core prototypes (Object, Array,
272
+ │ String, Number, Boolean, Function) inside sandbox IIFE │
273
+ ├───────────────────────────────────────────────────────────┤
274
+ Layer 4: PII Shield (Egress Filter)
275
+ Scans output for Email, SSN, Credit Card, IP, IBAN,
276
+ │ Passport MRZ • Strips forbidden keys • NER opt-in │
277
+ ├───────────────────────────────────────────────────────────┤
278
+ │ Layer 5: Aggregation-First Policy │
279
+ │ Blocks raw row export • maxOutputRows (default: 10) • │
280
+ │ Conditional error: detailed (dev) vs opaque (production) │
281
+ ├───────────────────────────────────────────────────────────┤
282
+ │ Layer 6: ZK-Receipt (Integrity Verification) │
283
+ │ SHA-256 ImageID + HMAC-SHA256 Seal (Kyber768-derived) │
284
+ │ LiopMcpBridge verifies before forwarding to LLM │
285
+ └───────────────────────────────────────────────────────────┘
262
286
  ```
263
287
 
264
288
  ### PII Patterns
@@ -390,7 +414,7 @@ await server.connectToMesh();
390
414
 
391
415
  This package is continuously tested across multiple platforms and Node.js versions via CI/CD:
392
416
 
393
- - **209+ tests** spanning unit, integration, conformance, and crossnet suites
417
+ - **227+ tests** spanning unit, integration, conformance, adversarial, and crossnet suites
394
418
  - **Multi-OS matrix:** Ubuntu, Windows, macOS
395
419
  - **Node.js versions:** 22.x, 24.x
396
420
  - **Code quality:** Enforced by [Biome.js](https://biomejs.dev/) (linting + formatting)
@@ -1,2 +1 @@
1
1
  #!/usr/bin/env node
2
- export {};
package/dist/bin/agent.js CHANGED
@@ -1,307 +1,6 @@
1
1
  #!/usr/bin/env node
2
- import * as fs from "node:fs";
3
- import * as os from "node:os";
4
- import * as path from "node:path";
5
- import { multiaddr } from "@multiformats/multiaddr";
6
- import { LiopMcpRouter } from "../gateway/router.js";
7
- import { MeshNode } from "../mesh/index.js";
8
- import { LiopServer } from "../server/index.js";
9
- import { log } from "../utils/logger.js";
10
- /**
11
- * Resolves a full libp2p multiaddr (with PeerID) from a LIOP node's
12
- * HTTP health endpoint. This enables zero-config bootstrap — users
13
- * only need to provide a URL, not a cryptographic PeerID.
14
- *
15
- * @param url - HTTP URL of a LIOP node's health endpoint (e.g. "http://host:3000")
16
- * @returns Full multiaddr string with PeerID, or null if resolution fails
17
- */
18
- async function resolveBootstrapFromUrl(url) {
19
- try {
20
- const healthUrl = url.endsWith("/health") ? url : `${url}/health`;
21
- const response = await fetch(healthUrl, {
22
- headers: { Accept: "application/json" },
23
- signal: AbortSignal.timeout(10000), // Increased to 10s
24
- });
25
- if (!response.ok)
26
- return null;
27
- const data = await response.json();
28
- if (!data.mesh?.multiaddrs?.length || !data.mesh?.peerId)
29
- return null;
30
- // Find TCP multiaddr (prefer non-websocket for stability)
31
- const tcpAddr = data.mesh.multiaddrs.find((a) => a.includes("/tcp/") &&
32
- !a.includes("/ws") &&
33
- !a.includes("/ip4/127.0.0.1/"));
34
- if (!tcpAddr)
35
- return null;
36
- // Rewrite internal Docker IP using industrial mapper if available
37
- let resolved = industrialAddressMapper(tcpAddr);
38
- if (!resolved || resolved === tcpAddr) {
39
- const urlHost = new URL(url).hostname;
40
- resolved = tcpAddr.replace(/\/ip4\/[^/]+/, `/ip4/${urlHost}`);
41
- }
42
- if (!resolved)
43
- return null;
44
- resolved += resolved.includes("/p2p/") ? "" : `/p2p/${data.mesh.peerId}`;
45
- return resolved;
46
- }
47
- catch {
48
- return null;
49
- }
50
- }
51
- /**
52
- * Normalizes a bootstrap multiaddr string.
53
- * If the address contains a Docker bridge IP (172.16-31.x.x) or Loopback (127.0.0.1),
54
- * rewrites it to the host accessible via LIOP_NEXUS_URL (e.g. WSL2 IP).
55
- * This is critical when WSL2 mirror-mode networking is broken.
56
- */
57
- function normalizeBootstrap(addr) {
58
- const trimmed = addr.trim();
59
- // Remap Docker bridge IPs and ANY external physical IPs to 127.0.0.1
60
- // because Test-NetConnection confirmed 127.0.0.1 is the only reliable path to Docker ports.
61
- const dockerIpRegex = /\/ip4\/172\.(1[6-9]|2[0-9]|3[0-1])\.[0-9]{1,3}\.[0-9]{1,3}/;
62
- const loopbackRegex = /\/ip4\/127\.0\.0\.1/;
63
- const physicalIpRegex = /\/ip4\/192\.168\.[0-9]{1,3}\.[0-9]{1,3}/;
64
- if (dockerIpRegex.test(trimmed) ||
65
- loopbackRegex.test(trimmed) ||
66
- physicalIpRegex.test(trimmed)) {
67
- const targetIp = "127.0.0.1";
68
- const normalized = trimmed
69
- .replace(dockerIpRegex, `/ip4/${targetIp}`)
70
- .replace(loopbackRegex, `/ip4/${targetIp}`)
71
- .replace(physicalIpRegex, `/ip4/${targetIp}`);
72
- if (normalized !== trimmed) {
73
- log.info(`[LIOP-Agent] 🔄 Local Routing Hack → Forced 127.0.0.1: ${normalized}`);
74
- }
75
- return normalized;
76
- }
77
- return trimmed;
78
- }
79
- /**
80
- * industrialAddressMapper
81
- *
82
- * Mapea IPs internas de Docker a puertos industriales mapeados en el Host.
83
- * Nexus (172.20.0.10) -> 13001
84
- * Vault (172.20.0.11) -> 13003
85
- * Bank (172.20.0.12) -> 13004
86
- * Oracle(172.20.0.13) -> 13005
87
- */
88
- function industrialAddressMapper(addr) {
89
- if (addr.includes("/ip4/172.20.0.10"))
90
- return addr.replace(/\/ip4\/172\.20\.0\.10\/tcp\/[0-9]+/, "/ip4/127.0.0.1/tcp/13001");
91
- if (addr.includes("/ip4/172.20.0.11"))
92
- return addr.replace(/\/ip4\/172\.20\.0\.11\/tcp\/[0-9]+/, "/ip4/127.0.0.1/tcp/13003");
93
- if (addr.includes("/ip4/172.20.0.12"))
94
- return addr.replace(/\/ip4\/172\.20\.0\.12\/tcp\/[0-9]+/, "/ip4/127.0.0.1/tcp/13004");
95
- if (addr.includes("/ip4/172.20.0.13"))
96
- return addr.replace(/\/ip4\/172\.20\.0\.13\/tcp\/[0-9]+/, "/ip4/127.0.0.1/tcp/13005");
97
- // Drop container-internal loopbacks to prevent the Host Agent from dialing itself or conflicting ports
98
- if (addr.includes("/ip4/127.0.0.1/tcp/4000") ||
99
- addr.includes("/ip4/127.0.0.1/tcp/3000")) {
100
- return null;
101
- }
102
- return addr;
103
- }
104
- /**
105
- * LIOP Agent (Zero-Config CLI)
106
- *
107
- * Secure Logic-on-Origin gateway for Claude Desktop.
108
- * Communicates via STDIO / JSON-RPC.
109
- *
110
- * All tool discovery is DYNAMIC via the /liop/manifest/1.0.0 protocol.
111
- * No hardcoded tools, PeerIDs, or port mappings.
112
- */
113
- async function main() {
114
- const buildTime = new Date().toISOString();
115
- log.info(`[LIOP-Agent] 🚀 Version 1.2.0-alpha.9 | Build: ${buildTime}`);
116
- const liopDir = path.join(os.homedir(), ".liop");
117
- const identityPath = path.join(liopDir, "identity.json");
118
- if (!fs.existsSync(liopDir)) {
119
- fs.mkdirSync(liopDir, { recursive: true });
120
- }
121
- // 1. Determine Bootstrap Nodes (Zero-Config Discovery)
122
- let bootstrapNodes = [];
123
- // Command line arguments take precedence
124
- const args = process.argv.slice(2);
125
- if (args.length > 0) {
126
- bootstrapNodes = args.filter((a) => a.startsWith("/"));
127
- }
128
- // Priority 1: Physical Beacons (Industrial Pattern) - DETERMINISTIC & INSTANT
129
- if (bootstrapNodes.length === 0) {
130
- const searchDirs = [];
131
- // Priority 1.1: Explicit file from environment variable
132
- if (process.env.LIOP_BOOTSTRAP_FILE) {
133
- const filePath = path.resolve(process.env.LIOP_BOOTSTRAP_FILE);
134
- if (fs.existsSync(filePath)) {
135
- const addr = fs.readFileSync(filePath, "utf8").trim();
136
- if (addr)
137
- bootstrapNodes.push(normalizeBootstrap(addr));
138
- }
139
- }
140
- // Priority 1.2: Traditional locations (Scan for all *.multiaddr)
141
- searchDirs.push(process.cwd(), path.join(process.cwd(), "tests/infra/nexus-data"), liopDir, path.join(path
142
- .dirname(new URL(import.meta.url).pathname)
143
- .replace(/^\/([A-Z]:)/, "$1"), "../../tests/infra/nexus-data"));
144
- for (const dir of searchDirs) {
145
- try {
146
- if (fs.existsSync(dir)) {
147
- const files = fs.readdirSync(dir);
148
- const multiaddrFiles = files.filter((f) => f.endsWith(".multiaddr"));
149
- for (const file of multiaddrFiles) {
150
- const filePath = path.join(dir, file);
151
- const addr = fs.readFileSync(filePath, "utf8").trim();
152
- if (addr) {
153
- const normalized = normalizeBootstrap(addr);
154
- if (!bootstrapNodes.includes(normalized)) {
155
- bootstrapNodes.push(normalized);
156
- log.info(`[LIOP-Agent] ✅ Loaded beacon: ${file} from ${dir}`);
157
- }
158
- }
159
- }
160
- // If we found any beacons in this directory, we consider discovery successful for this layer
161
- if (bootstrapNodes.length > 0)
162
- break;
163
- }
164
- }
165
- catch (_e) {
166
- /* ignore */
167
- }
168
- }
169
- }
170
- // Priority 2: Auto-Discovery via NEXUS URL (Aggressive Parallel Discovery)
171
- if (process.env.LIOP_NEXUS_URL) {
172
- const nexusUrl = process.env.LIOP_NEXUS_URL;
173
- log.info(`[LIOP-Agent] 🌐 Running parallel discovery from: ${nexusUrl} (Sources Found: ${bootstrapNodes.length})`);
174
- const resolved = await resolveBootstrapFromUrl(nexusUrl);
175
- if (resolved) {
176
- const normalized = normalizeBootstrap(resolved);
177
- if (!bootstrapNodes.includes(normalized)) {
178
- bootstrapNodes.push(normalized);
179
- log.info(`[LIOP-Agent] ✅ Added bootstrap from URL discovery: ${normalized}`);
180
- }
181
- }
182
- }
183
- // Priority 3: Environment variable (direct multiaddr)
184
- if (bootstrapNodes.length === 0 && process.env.LIOP_BOOTSTRAP) {
185
- bootstrapNodes.push(process.env.LIOP_BOOTSTRAP.trim());
186
- }
187
- // Final fallback: local Nexus bootstrap for demo environments.
188
- // Avoid injecting stale static peer IDs when discovery already found valid peers.
189
- if (bootstrapNodes.length === 0) {
190
- bootstrapNodes.push("/ip4/127.0.0.1/tcp/13001/p2p/12D3KooWD8FUFdnLQzzLFNdicsaTknM5cpD7os9sK9NWVSVABJMD");
191
- }
192
- // Sanitize/validate all candidate multiaddrs so malformed PeerIDs don't crash startup.
193
- bootstrapNodes = bootstrapNodes.filter((addr) => {
194
- try {
195
- multiaddr(addr);
196
- return true;
197
- }
198
- catch {
199
- log.warn(`[LIOP-Agent] Ignoring invalid bootstrap multiaddr: ${addr}`);
200
- return false;
201
- }
202
- });
203
- // If no bootstrap nodes found, the agent operates in standalone mode.
204
- // It will only serve local tools until peers are discovered.
205
- if (bootstrapNodes.length === 0) {
206
- log.info("[LIOP-Agent] No bootstrap nodes configured. Operating in standalone mode.");
207
- log.info("[LIOP-Agent] Pass a multiaddr as argument or create 'nexus.multiaddr' file.");
208
- }
209
- // Initialize local server node (lightweight, no tools registered locally)
210
- const liopServer = new LiopServer({
211
- name: "@nekzus/liop-agent",
212
- version: "1.0.0",
213
- });
214
- // Enable Zero-Shot Autonomy (Industrial Prompt Injection)
215
- liopServer.enableZeroShotAutonomy();
216
- // 2. Mesh Node Configuration
217
- const meshNode = new MeshNode({
218
- identityPath: identityPath,
219
- bootstrapNodes: bootstrapNodes,
220
- addressMapper: industrialAddressMapper,
221
- });
222
- // Start P2P Mesh
223
- await meshNode.start();
224
- // 3. Initialize the Dynamic Router
225
- // No hardcoded tools — all discovery happens via liop:manifest protocol
226
- const router = new LiopMcpRouter(liopServer, meshNode);
227
- // Proactive Notification to Claude Desktop when tools/resources are discovered dynamically
228
- router.onToolsChanged = () => {
229
- process.stdout.write(`{"jsonrpc":"2.0","method":"notifications/tools/list_changed"}\n`);
230
- process.stdout.write(`{"jsonrpc":"2.0","method":"notifications/resources/list_changed"}\n`);
231
- };
232
- // Initial warming period (2s) then Adaptive Background Discovery
233
- // Polls DHT for new nodes and triggers onToolsChanged when topology shifts.
234
- // Uses exponential backoff to reduce polling load on stable meshes.
235
- setTimeout(() => {
236
- // biome-ignore lint/suspicious/noExplicitAny: access internal for telemetry
237
- const rtSize = meshNode.getRoutingTableSize?.() || 0;
238
- log.info(`[LIOP-Agent] Warm-up complete. Routing Table size: ${rtSize}`);
239
- router.refreshManifestCache(true).catch(() => { });
240
- }, 2000);
241
- const POLL_BASE_MS = 10_000;
242
- const POLL_MAX_MS = 120_000;
243
- let pollIntervalMs = POLL_BASE_MS;
244
- const scheduleAdaptivePoll = () => {
245
- setTimeout(async () => {
246
- const prevSize = router.getCacheSize();
247
- await router.refreshManifestCache(true).catch(() => { });
248
- const newSize = router.getCacheSize();
249
- if (newSize !== prevSize) {
250
- // Topology changed — reset to aggressive polling
251
- pollIntervalMs = POLL_BASE_MS;
252
- log.info(`[LIOP-Agent] Topology change detected (${prevSize} → ${newSize}). Resetting poll to ${POLL_BASE_MS / 1000}s.`);
253
- }
254
- else {
255
- // Stable — relax polling interval (factor 1.5)
256
- pollIntervalMs = Math.min(Math.round(pollIntervalMs * 1.5), POLL_MAX_MS);
257
- }
258
- scheduleAdaptivePoll();
259
- }, pollIntervalMs);
260
- };
261
- scheduleAdaptivePoll();
262
- // 4. STDIO Transport — Buffered Line Reader
263
- // Uses readline to guarantee complete JSON-RPC messages before parsing.
264
- // Raw stdin.on("data") can fragment large payloads across multiple chunks.
265
- const readline = await import("node:readline");
266
- const rl = readline.createInterface({
267
- input: process.stdin,
268
- terminal: false,
269
- });
270
- process.stdout.on("error", (err) => {
271
- if (err.code === "EPIPE") {
272
- process.exit(0); // Graceful exit when Claude Desktop disconnects
273
- }
274
- });
275
- rl.on("line", async (line) => {
276
- const trimmed = line.trim();
277
- if (!trimmed)
278
- return;
279
- try {
280
- const request = JSON.parse(trimmed);
281
- if (request.method) {
282
- const response = await router.dispatch(request);
283
- if (response) {
284
- process.stdout.write(`${JSON.stringify(response)}\n`);
285
- }
286
- }
287
- }
288
- catch (_err) {
289
- // Silent catch for binary noise or malformed lines
290
- }
291
- });
292
- rl.on("close", () => {
293
- process.exit(0);
294
- });
295
- // Status directed only to stderr
296
- log.info(`[LIOP-Agent] Guarding Claude Desktop via STDIO.`);
297
- log.info(`[LIOP-Agent] P2P Mesh: Joined (${bootstrapNodes.length} bootstraps)`);
298
- log.info("[LIOP-Agent] Tool discovery: Dynamic via /liop/manifest/1.0.0");
299
- process.on("SIGINT", async () => {
300
- await meshNode.stop();
301
- process.exit(0);
302
- });
303
- }
304
- main().catch((err) => {
305
- log.error(`[LIOP-Agent] Fatal Error: ${err.message}`);
306
- process.exit(1);
307
- });
2
+ import {f as f$1}from'../chunk-X6FJATUE.js';import {g}from'../chunk-4ABAFG44.js';import'../chunk-UVTEJYHN.js';import'../chunk-ANFXJGMP.js';import'../chunk-DBXGYHKY.js';import'../chunk-HM77MWB6.js';import'../chunk-RWRRBYG4.js';import {a as a$1}from'../chunk-PPCOS2NU.js';import {a}from'../chunk-S6RJHZV2.js';import*as p from'fs';import*as $ from'os';import*as f from'path';import {multiaddr}from'@multiformats/multiaddr';async function b(t){try{let c=t.endsWith("/health")?t:`${t}/health`,u=await fetch(c,{headers:{Accept:"application/json"},signal:AbortSignal.timeout(1e4)});if(!u.ok)return null;let e=await u.json();if(!e.mesh?.multiaddrs?.length||!e.mesh?.peerId)return null;let l=e.mesh.multiaddrs.find(r=>r.includes("/tcp/")&&!r.includes("/ws")&&!r.includes("/ip4/127.0.0.1/"));if(!l)return null;let o=R(l);if(!o||o===l){let r=new URL(t).hostname;o=l.replace(/\/ip4\/[^/]+/,`/ip4/${r}`);}return o?(o+=o.includes("/p2p/")?"":`/p2p/${e.mesh.peerId}`,o):null}catch{return null}}function P(t){let c=t.trim(),u=/\/ip4\/172\.(1[6-9]|2[0-9]|3[0-1])\.[0-9]{1,3}\.[0-9]{1,3}/,e=/\/ip4\/127\.0\.0\.1/,l=/\/ip4\/192\.168\.[0-9]{1,3}\.[0-9]{1,3}/;if(u.test(c)||e.test(c)||l.test(c)){let o="127.0.0.1",r=c.replace(u,`/ip4/${o}`).replace(e,`/ip4/${o}`).replace(l,`/ip4/${o}`);return r!==c&&a.info(`[LIOP-Agent] \u{1F504} Local Routing Hack \u2192 Forced 127.0.0.1: ${r}`),r}return c}function R(t){return t.includes("/ip4/172.20.0.10")?t.replace(/\/ip4\/172\.20\.0\.10\/tcp\/[0-9]+/,"/ip4/127.0.0.1/tcp/13001"):t.includes("/ip4/172.20.0.11")?t.replace(/\/ip4\/172\.20\.0\.11\/tcp\/[0-9]+/,"/ip4/127.0.0.1/tcp/13003"):t.includes("/ip4/172.20.0.12")?t.replace(/\/ip4\/172\.20\.0\.12\/tcp\/[0-9]+/,"/ip4/127.0.0.1/tcp/13004"):t.includes("/ip4/172.20.0.13")?t.replace(/\/ip4\/172\.20\.0\.13\/tcp\/[0-9]+/,"/ip4/127.0.0.1/tcp/13005"):t.includes("/ip4/127.0.0.1/tcp/4000")||t.includes("/ip4/127.0.0.1/tcp/3000")?null:t}async function x(){let t=new Date().toISOString();a.info(`[LIOP-Agent] \u{1F680} Version 1.2.0-alpha.9 | Build: ${t}`);let c=f.join($.homedir(),".liop"),u=f.join(c,"identity.json");p.existsSync(c)||p.mkdirSync(c,{recursive:true});let e=[],l=process.argv.slice(2);if(l.length>0&&(e=l.filter(n=>n.startsWith("/"))),e.length===0){let n=[];if(process.env.LIOP_BOOTSTRAP_FILE){let s=f.resolve(process.env.LIOP_BOOTSTRAP_FILE);if(p.existsSync(s)){let a=p.readFileSync(s,"utf8").trim();a&&e.push(P(a));}}n.push(process.cwd(),f.join(process.cwd(),"tests/infra/nexus-data"),c,f.join(f.dirname(new URL(import.meta.url).pathname).replace(/^\/([A-Z]:)/,"$1"),"../../tests/infra/nexus-data"));for(let s of n)try{if(p.existsSync(s)){let m=p.readdirSync(s).filter(g=>g.endsWith(".multiaddr"));for(let g of m){let T=f.join(s,g),S=p.readFileSync(T,"utf8").trim();if(S){let y=P(S);e.includes(y)||(e.push(y),a.info(`[LIOP-Agent] \u2705 Loaded beacon: ${g} from ${s}`));}}if(e.length>0)break}}catch{}}if(process.env.LIOP_NEXUS_URL){let n=process.env.LIOP_NEXUS_URL;a.info(`[LIOP-Agent] \u{1F310} Running parallel discovery from: ${n} (Sources Found: ${e.length})`);let s=await b(n);if(s){let a$1=P(s);e.includes(a$1)||(e.push(a$1),a.info(`[LIOP-Agent] \u2705 Added bootstrap from URL discovery: ${a$1}`));}}e.length===0&&process.env.LIOP_BOOTSTRAP&&e.push(process.env.LIOP_BOOTSTRAP.trim()),e.length===0&&e.push("/ip4/127.0.0.1/tcp/13001/p2p/12D3KooWD8FUFdnLQzzLFNdicsaTknM5cpD7os9sK9NWVSVABJMD"),e=e.filter(n=>{try{return multiaddr(n),!0}catch{return a.warn(`[LIOP-Agent] Ignoring invalid bootstrap multiaddr: ${n}`),false}}),e.length===0&&(a.info("[LIOP-Agent] No bootstrap nodes configured. Operating in standalone mode."),a.info("[LIOP-Agent] Pass a multiaddr as argument or create 'nexus.multiaddr' file."));let o=new f$1({name:"@nekzus/liop-agent",version:"1.0.0"});o.enableZeroShotAutonomy();let r=new a$1({identityPath:u,bootstrapNodes:e,addressMapper:R});await r.start();let d=new g(o,r);d.onToolsChanged=()=>{process.stdout.write(`{"jsonrpc":"2.0","method":"notifications/tools/list_changed"}
3
+ `),process.stdout.write(`{"jsonrpc":"2.0","method":"notifications/resources/list_changed"}
4
+ `);},setTimeout(()=>{let n=r.getRoutingTableSize?.()||0;a.info(`[LIOP-Agent] Warm-up complete. Routing Table size: ${n}`),d.refreshManifestCache(true).catch(()=>{});},2e3);let L=1e4,_=12e4,h=L,I=()=>{setTimeout(async()=>{let n=d.getCacheSize();await d.refreshManifestCache(true).catch(()=>{});let s=d.getCacheSize();s!==n?(h=L,a.info(`[LIOP-Agent] Topology change detected (${n} \u2192 ${s}). Resetting poll to ${L/1e3}s.`)):h=Math.min(Math.round(h*1.5),_),I();},h);};I();let O=(await import('readline')).createInterface({input:process.stdin,terminal:false});process.stdout.on("error",n=>{n.code==="EPIPE"&&process.exit(0);}),O.on("line",async n=>{let s=n.trim();if(s)try{let a=JSON.parse(s);if(a.method){let m=await d.dispatch(a);m&&process.stdout.write(`${JSON.stringify(m)}
5
+ `);}}catch{}}),O.on("close",()=>{process.exit(0);}),a.info("[LIOP-Agent] Guarding Claude Desktop via STDIO."),a.info(`[LIOP-Agent] P2P Mesh: Joined (${e.length} bootstraps)`),a.info("[LIOP-Agent] Tool discovery: Dynamic via /liop/manifest/1.0.0"),process.on("SIGINT",async()=>{await r.stop(),process.exit(0);});}x().catch(t=>{a.error(`[LIOP-Agent] Fatal Error: ${t.message}`),process.exit(1);});//# sourceMappingURL=agent.js.map
6
+ //# sourceMappingURL=agent.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/bin/agent.ts"],"names":["resolveBootstrapFromUrl","url","healthUrl","response","data","tcpAddr","a","resolved","industrialAddressMapper","urlHost","normalizeBootstrap","addr","trimmed","dockerIpRegex","loopbackRegex","physicalIpRegex","targetIp","normalized","log","main","buildTime","liopDir","identityPath","bootstrapNodes","args","searchDirs","filePath","dir","multiaddrFiles","f","file","nexusUrl","multiaddr","liopServer","LiopServer","meshNode","MeshNode","router","LiopMcpRouter","rtSize","POLL_BASE_MS","POLL_MAX_MS","pollIntervalMs","scheduleAdaptivePoll","prevSize","newSize","rl","err","line","request"],"mappings":";oaAmBA,eAAeA,CAAAA,CAAwBC,EAAqC,CAC3E,GAAI,CACH,IAAMC,CAAAA,CAAYD,CAAAA,CAAI,QAAA,CAAS,SAAS,EAAIA,CAAAA,CAAM,CAAA,EAAGA,CAAG,CAAA,OAAA,CAAA,CAClDE,EAAW,MAAM,KAAA,CAAMD,CAAAA,CAAW,CACvC,QAAS,CAAE,MAAA,CAAQ,kBAAmB,CAAA,CACtC,MAAA,CAAQ,WAAA,CAAY,OAAA,CAAQ,GAAK,CAClC,CAAC,CAAA,CACD,GAAI,CAACC,EAAS,EAAA,CAAI,OAAO,IAAA,CAEzB,IAAMC,EAAO,MAAMD,CAAAA,CAAS,IAAA,EAAK,CACjC,GAAI,CAACC,CAAAA,CAAK,IAAA,EAAM,UAAA,EAAY,QAAU,CAACA,CAAAA,CAAK,IAAA,EAAM,MAAA,CAAQ,OAAO,IAAA,CAGjE,IAAMC,CAAAA,CAAUD,CAAAA,CAAK,KAAK,UAAA,CAAW,IAAA,CACnCE,CAAAA,EACAA,CAAAA,CAAE,QAAA,CAAS,OAAO,CAAA,EAClB,CAACA,EAAE,QAAA,CAAS,KAAK,CAAA,EACjB,CAACA,EAAE,QAAA,CAAS,iBAAiB,CAC/B,CAAA,CACA,GAAI,CAACD,CAAAA,CAAS,OAAO,IAAA,CAGrB,IAAIE,CAAAA,CAAWC,CAAAA,CAAwBH,CAAO,CAAA,CAC9C,GAAI,CAACE,CAAAA,EAAYA,CAAAA,GAAaF,CAAAA,CAAS,CACtC,IAAMI,CAAAA,CAAU,IAAI,GAAA,CAAIR,CAAG,CAAA,CAAE,QAAA,CAC7BM,CAAAA,CAAWF,CAAAA,CAAQ,OAAA,CAAQ,cAAA,CAAgB,CAAA,KAAA,EAAQI,CAAO,EAAE,EAC7D,CAEA,OAAKF,CAAAA,EAELA,GAAYA,CAAAA,CAAS,QAAA,CAAS,OAAO,CAAA,CAAI,GAAK,CAAA,KAAA,EAAQH,CAAAA,CAAK,IAAA,CAAK,MAAM,GAE/DG,CAAAA,EAJe,IAKvB,CAAA,KAAQ,CACP,OAAO,IACR,CACD,CAQA,SAASG,EAAmBC,CAAAA,CAAsB,CACjD,IAAMC,CAAAA,CAAUD,EAAK,IAAA,EAAK,CAGpBE,CAAAA,CACL,4DAAA,CACKC,CAAAA,CAAgB,qBAAA,CAChBC,CAAAA,CAAkB,yCAAA,CAExB,GACCF,CAAAA,CAAc,IAAA,CAAKD,CAAO,CAAA,EAC1BE,EAAc,IAAA,CAAKF,CAAO,CAAA,EAC1BG,CAAAA,CAAgB,KAAKH,CAAO,CAAA,CAC3B,CACD,IAAMI,EAAW,WAAA,CACXC,CAAAA,CAAaL,CAAAA,CACjB,OAAA,CAAQC,EAAe,CAAA,KAAA,EAAQG,CAAQ,CAAA,CAAE,CAAA,CACzC,QAAQF,CAAAA,CAAe,CAAA,KAAA,EAAQE,CAAQ,CAAA,CAAE,EACzC,OAAA,CAAQD,CAAAA,CAAiB,CAAA,KAAA,EAAQC,CAAQ,CAAA,CAAE,CAAA,CAE7C,OAAIC,CAAAA,GAAeL,GAClBM,CAAAA,CAAI,IAAA,CACH,CAAA,mEAAA,EAA0DD,CAAU,EACrE,CAAA,CAEMA,CACR,CAEA,OAAOL,CACR,CAWA,SAASJ,CAAAA,CAAwBG,CAAAA,CAA6B,CAC7D,OAAIA,CAAAA,CAAK,QAAA,CAAS,kBAAkB,EAC5BA,CAAAA,CAAK,OAAA,CACX,oCAAA,CACA,0BACD,EACGA,CAAAA,CAAK,QAAA,CAAS,kBAAkB,CAAA,CAC5BA,EAAK,OAAA,CACX,oCAAA,CACA,0BACD,CAAA,CACGA,CAAAA,CAAK,QAAA,CAAS,kBAAkB,CAAA,CAC5BA,EAAK,OAAA,CACX,oCAAA,CACA,0BACD,CAAA,CACGA,EAAK,QAAA,CAAS,kBAAkB,CAAA,CAC5BA,CAAAA,CAAK,QACX,oCAAA,CACA,0BACD,CAAA,CAIAA,CAAAA,CAAK,SAAS,yBAAyB,CAAA,EACvCA,CAAAA,CAAK,QAAA,CAAS,yBAAyB,CAAA,CAEhC,IAAA,CAGDA,CACR,CAWA,eAAeQ,CAAAA,EAAO,CACrB,IAAMC,CAAAA,CAAY,IAAI,IAAA,EAAK,CAAE,WAAA,EAAY,CACzCF,CAAAA,CAAI,IAAA,CAAK,CAAA,sDAAA,EAAkDE,CAAS,EAAE,CAAA,CAEtE,IAAMC,CAAAA,CAAe,CAAA,CAAA,IAAA,CAAQ,WAAQ,CAAG,OAAO,CAAA,CACzCC,CAAAA,CAAoB,OAAKD,CAAAA,CAAS,eAAe,CAAA,CAE/C,CAAA,CAAA,UAAA,CAAWA,CAAO,CAAA,EACtB,CAAA,CAAA,SAAA,CAAUA,CAAAA,CAAS,CAAE,UAAW,IAAK,CAAC,CAAA,CAI1C,IAAIE,EAA2B,EAAC,CAG1BC,CAAAA,CAAO,OAAA,CAAQ,KAAK,KAAA,CAAM,CAAC,CAAA,CAMjC,GALIA,CAAAA,CAAK,MAAA,CAAS,CAAA,GACjBD,CAAAA,CAAiBC,EAAK,MAAA,CAAQlB,CAAAA,EAAMA,CAAAA,CAAE,UAAA,CAAW,GAAG,CAAC,CAAA,CAAA,CAIlDiB,CAAAA,CAAe,MAAA,GAAW,EAAG,CAChC,IAAME,CAAAA,CAAa,EAAC,CAGpB,GAAI,OAAA,CAAQ,GAAA,CAAI,oBAAqB,CACpC,IAAMC,CAAAA,CAAgB,CAAA,CAAA,OAAA,CAAQ,QAAQ,GAAA,CAAI,mBAAmB,CAAA,CAC7D,GAAO,aAAWA,CAAQ,CAAA,CAAG,CAC5B,IAAMf,CAAAA,CAAU,CAAA,CAAA,YAAA,CAAae,CAAAA,CAAU,MAAM,EAAE,IAAA,EAAK,CAChDf,CAAAA,EAAMY,CAAAA,CAAe,KAAKb,CAAAA,CAAmBC,CAAI,CAAC,EACvD,CACD,CAGAc,CAAAA,CAAW,IAAA,CACV,OAAA,CAAQ,KAAI,CACP,CAAA,CAAA,IAAA,CAAK,OAAA,CAAQ,GAAA,GAAO,wBAAwB,CAAA,CACjDJ,CAAAA,CACK,CAAA,CAAA,IAAA,CAEF,UAAQ,IAAI,GAAA,CAAI,MAAA,CAAA,IAAA,CAAY,GAAG,EAAE,QAAQ,CAAA,CACzC,OAAA,CAAQ,aAAA,CAAe,IAAI,CAAA,CAC7B,8BACD,CACD,EAEA,IAAA,IAAWM,CAAAA,IAAOF,CAAAA,CACjB,GAAI,CACH,GAAO,CAAA,CAAA,UAAA,CAAWE,CAAG,CAAA,CAAG,CAEvB,IAAMC,CAAAA,CADW,CAAA,CAAA,WAAA,CAAYD,CAAG,EACH,MAAA,CAAQE,CAAAA,EAAMA,CAAAA,CAAE,QAAA,CAAS,YAAY,CAAC,CAAA,CAEnE,IAAA,IAAWC,CAAAA,IAAQF,EAAgB,CAClC,IAAMF,CAAAA,CAAgB,CAAA,CAAA,IAAA,CAAKC,EAAKG,CAAI,CAAA,CAC9BnB,CAAAA,CAAU,CAAA,CAAA,YAAA,CAAae,CAAAA,CAAU,MAAM,CAAA,CAAE,IAAA,GAC/C,GAAIf,CAAAA,CAAM,CACT,IAAMM,EAAaP,CAAAA,CAAmBC,CAAI,CAAA,CACrCY,CAAAA,CAAe,SAASN,CAAU,CAAA,GACtCM,CAAAA,CAAe,IAAA,CAAKN,CAAU,CAAA,CAC9BC,CAAAA,CAAI,IAAA,CAAK,CAAA,mCAAA,EAAiCY,CAAI,CAAA,MAAA,EAASH,CAAG,CAAA,CAAE,CAAA,EAE9D,CACD,CAEA,GAAIJ,CAAAA,CAAe,MAAA,CAAS,EAAG,KAChC,CACD,CAAA,KAAa,CAEb,CAEF,CAGA,GAAI,OAAA,CAAQ,IAAI,cAAA,CAAgB,CAC/B,IAAMQ,CAAAA,CAAW,QAAQ,GAAA,CAAI,cAAA,CAC7Bb,CAAAA,CAAI,IAAA,CACH,2DAAoDa,CAAQ,CAAA,iBAAA,EAAoBR,CAAAA,CAAe,MAAM,GACtG,CAAA,CAEA,IAAMhB,CAAAA,CAAW,MAAMP,EAAwB+B,CAAQ,CAAA,CACvD,GAAIxB,CAAAA,CAAU,CACb,IAAMU,GAAAA,CAAaP,CAAAA,CAAmBH,CAAQ,EACzCgB,CAAAA,CAAe,QAAA,CAASN,GAAU,CAAA,GACtCM,CAAAA,CAAe,IAAA,CAAKN,GAAU,CAAA,CAC9BC,EAAI,IAAA,CACH,CAAA,wDAAA,EAAsDD,GAAU,CAAA,CACjE,GAEF,CACD,CAGIM,CAAAA,CAAe,MAAA,GAAW,GAAK,OAAA,CAAQ,GAAA,CAAI,cAAA,EAC9CA,CAAAA,CAAe,KAAK,OAAA,CAAQ,GAAA,CAAI,cAAA,CAAe,IAAA,EAAM,CAAA,CAKlDA,CAAAA,CAAe,MAAA,GAAW,CAAA,EAC7BA,EAAe,IAAA,CACd,mFACD,CAAA,CAIDA,CAAAA,CAAiBA,EAAe,MAAA,CAAQZ,CAAAA,EAAS,CAChD,GAAI,CACH,OAAAqB,SAAAA,CAAUrB,CAAI,EACP,CAAA,CACR,CAAA,KAAQ,CACP,OAAAO,EAAI,IAAA,CAAK,CAAA,mDAAA,EAAsDP,CAAI,CAAA,CAAE,EAC9D,KACR,CACD,CAAC,CAAA,CAIGY,EAAe,MAAA,GAAW,CAAA,GAC7BL,CAAAA,CAAI,IAAA,CACH,2EACD,CAAA,CACAA,CAAAA,CAAI,IAAA,CACH,6EACD,GAID,IAAMe,CAAAA,CAAa,IAAIC,GAAAA,CAAW,CACjC,IAAA,CAAM,oBAAA,CACN,OAAA,CAAS,OACV,CAAC,CAAA,CAGDD,CAAAA,CAAW,sBAAA,GAGX,IAAME,CAAAA,CAAW,IAAIC,GAAAA,CAAS,CAC7B,YAAA,CAAcd,CAAAA,CACd,cAAA,CAAgBC,CAAAA,CAChB,cAAef,CAChB,CAAC,CAAA,CAGD,MAAM2B,EAAS,KAAA,EAAM,CAIrB,IAAME,CAAAA,CAAS,IAAIC,CAAAA,CAAcL,CAAAA,CAAYE,CAAQ,CAAA,CAGrDE,EAAO,cAAA,CAAiB,IAAM,CAC7B,OAAA,CAAQ,OAAO,KAAA,CACd,CAAA;AAAA,CACD,CAAA,CACA,OAAA,CAAQ,MAAA,CAAO,KAAA,CACd,CAAA;AAAA,CACD,EACD,CAAA,CAKA,UAAA,CAAW,IAAM,CAEhB,IAAME,CAAAA,CAAUJ,CAAAA,CAAiB,mBAAA,IAAsB,EAAK,EAC5DjB,CAAAA,CAAI,IAAA,CAAK,sDAAsDqB,CAAM,CAAA,CAAE,EACvEF,CAAAA,CAAO,oBAAA,CAAqB,IAAI,CAAA,CAAE,MAAM,IAAM,CAAC,CAAC,EACjD,EAAG,GAAI,CAAA,CAEP,IAAMG,CAAAA,CAAe,IACfC,CAAAA,CAAc,IAAA,CAChBC,EAAiBF,CAAAA,CAEfG,CAAAA,CAAuB,IAAM,CAClC,UAAA,CAAW,SAAY,CACtB,IAAMC,CAAAA,CAAWP,CAAAA,CAAO,YAAA,EAAa,CACrC,MAAMA,CAAAA,CAAO,oBAAA,CAAqB,IAAI,CAAA,CAAE,MAAM,IAAM,CAAC,CAAC,CAAA,CACtD,IAAMQ,EAAUR,CAAAA,CAAO,YAAA,EAAa,CAEhCQ,CAAAA,GAAYD,GAEfF,CAAAA,CAAiBF,CAAAA,CACjBtB,CAAAA,CAAI,IAAA,CACH,0CAA0C0B,CAAQ,CAAA,QAAA,EAAMC,CAAO,CAAA,qBAAA,EAAwBL,EAAe,GAAI,CAAA,EAAA,CAC3G,GAGAE,CAAAA,CAAiB,IAAA,CAAK,IACrB,IAAA,CAAK,KAAA,CAAMA,CAAAA,CAAiB,GAAG,EAC/BD,CACD,CAAA,CAGDE,CAAAA,GACD,EAAGD,CAAc,EAClB,CAAA,CAEAC,CAAAA,GAMA,IAAMG,CAAAA,CAAAA,CADW,MAAM,OAAO,UAAe,GACzB,eAAA,CAAgB,CACnC,KAAA,CAAO,OAAA,CAAQ,MACf,QAAA,CAAU,KACX,CAAC,CAAA,CAED,QAAQ,MAAA,CAAO,EAAA,CAAG,OAAA,CAAUC,CAAAA,EAAmC,CAC1DA,CAAAA,CAAI,IAAA,GAAS,SAChB,OAAA,CAAQ,IAAA,CAAK,CAAC,EAEhB,CAAC,CAAA,CAEDD,CAAAA,CAAG,GAAG,MAAA,CAAQ,MAAOE,CAAAA,EAAS,CAC7B,IAAMpC,CAAAA,CAAUoC,CAAAA,CAAK,IAAA,EAAK,CAC1B,GAAKpC,CAAAA,CAEL,GAAI,CACH,IAAMqC,CAAAA,CAAU,KAAK,KAAA,CAAMrC,CAAO,CAAA,CAClC,GAAIqC,EAAQ,MAAA,CAAQ,CACnB,IAAM9C,CAAAA,CAAW,MAAMkC,EAAO,QAAA,CAASY,CAAO,CAAA,CAC1C9C,CAAAA,EACH,QAAQ,MAAA,CAAO,KAAA,CAAM,GAAG,IAAA,CAAK,SAAA,CAAUA,CAAQ,CAAC;AAAA,CAAI,EAEtD,CACD,CAAA,KAAe,CAEf,CACD,CAAC,CAAA,CAED2C,CAAAA,CAAG,EAAA,CAAG,OAAA,CAAS,IAAM,CACpB,QAAQ,IAAA,CAAK,CAAC,EACf,CAAC,CAAA,CAGD5B,CAAAA,CAAI,IAAA,CAAK,iDAAiD,CAAA,CAC1DA,CAAAA,CAAI,IAAA,CACH,CAAA,+BAAA,EAAkCK,CAAAA,CAAe,MAAM,CAAA,YAAA,CACxD,CAAA,CACAL,EAAI,IAAA,CAAK,+DAA+D,CAAA,CAExE,OAAA,CAAQ,EAAA,CAAG,QAAA,CAAU,SAAY,CAChC,MAAMiB,CAAAA,CAAS,IAAA,EAAK,CACpB,OAAA,CAAQ,IAAA,CAAK,CAAC,EACf,CAAC,EACF,CAEAhB,CAAAA,EAAK,CAAE,KAAA,CAAO4B,CAAAA,EAAQ,CACrB7B,CAAAA,CAAI,MAAM,CAAA,0BAAA,EAA6B6B,CAAAA,CAAI,OAAO,CAAA,CAAE,CAAA,CACpD,OAAA,CAAQ,IAAA,CAAK,CAAC,EACf,CAAC,CAAA","file":"agent.js","sourcesContent":["#!/usr/bin/env node\nimport * as fs from \"node:fs\";\nimport * as os from \"node:os\";\nimport * as path from \"node:path\";\nimport { multiaddr } from \"@multiformats/multiaddr\";\nimport { LiopMcpRouter } from \"../gateway/router.js\";\nimport { MeshNode } from \"../mesh/index.js\";\nimport { LiopServer } from \"../server/index.js\";\nimport type { McpRequest } from \"../types.js\";\nimport { log } from \"../utils/logger.js\";\n\n/**\n * Resolves a full libp2p multiaddr (with PeerID) from a LIOP node's\n * HTTP health endpoint. This enables zero-config bootstrap — users\n * only need to provide a URL, not a cryptographic PeerID.\n *\n * @param url - HTTP URL of a LIOP node's health endpoint (e.g. \"http://host:3000\")\n * @returns Full multiaddr string with PeerID, or null if resolution fails\n */\nasync function resolveBootstrapFromUrl(url: string): Promise<string | null> {\n\ttry {\n\t\tconst healthUrl = url.endsWith(\"/health\") ? url : `${url}/health`;\n\t\tconst response = await fetch(healthUrl, {\n\t\t\theaders: { Accept: \"application/json\" },\n\t\t\tsignal: AbortSignal.timeout(10000), // Increased to 10s\n\t\t});\n\t\tif (!response.ok) return null;\n\n\t\tconst data = await response.json();\n\t\tif (!data.mesh?.multiaddrs?.length || !data.mesh?.peerId) return null;\n\n\t\t// Find TCP multiaddr (prefer non-websocket for stability)\n\t\tconst tcpAddr = data.mesh.multiaddrs.find(\n\t\t\t(a: string) =>\n\t\t\t\ta.includes(\"/tcp/\") &&\n\t\t\t\t!a.includes(\"/ws\") &&\n\t\t\t\t!a.includes(\"/ip4/127.0.0.1/\"),\n\t\t);\n\t\tif (!tcpAddr) return null;\n\n\t\t// Rewrite internal Docker IP using industrial mapper if available\n\t\tlet resolved = industrialAddressMapper(tcpAddr);\n\t\tif (!resolved || resolved === tcpAddr) {\n\t\t\tconst urlHost = new URL(url).hostname;\n\t\t\tresolved = tcpAddr.replace(/\\/ip4\\/[^/]+/, `/ip4/${urlHost}`);\n\t\t}\n\n\t\tif (!resolved) return null;\n\n\t\tresolved += resolved.includes(\"/p2p/\") ? \"\" : `/p2p/${data.mesh.peerId}`;\n\n\t\treturn resolved;\n\t} catch {\n\t\treturn null;\n\t}\n}\n\n/**\n * Normalizes a bootstrap multiaddr string.\n * If the address contains a Docker bridge IP (172.16-31.x.x) or Loopback (127.0.0.1),\n * rewrites it to the host accessible via LIOP_NEXUS_URL (e.g. WSL2 IP).\n * This is critical when WSL2 mirror-mode networking is broken.\n */\nfunction normalizeBootstrap(addr: string): string {\n\tconst trimmed = addr.trim();\n\t// Remap Docker bridge IPs and ANY external physical IPs to 127.0.0.1\n\t// because Test-NetConnection confirmed 127.0.0.1 is the only reliable path to Docker ports.\n\tconst dockerIpRegex =\n\t\t/\\/ip4\\/172\\.(1[6-9]|2[0-9]|3[0-1])\\.[0-9]{1,3}\\.[0-9]{1,3}/;\n\tconst loopbackRegex = /\\/ip4\\/127\\.0\\.0\\.1/;\n\tconst physicalIpRegex = /\\/ip4\\/192\\.168\\.[0-9]{1,3}\\.[0-9]{1,3}/;\n\n\tif (\n\t\tdockerIpRegex.test(trimmed) ||\n\t\tloopbackRegex.test(trimmed) ||\n\t\tphysicalIpRegex.test(trimmed)\n\t) {\n\t\tconst targetIp = \"127.0.0.1\";\n\t\tconst normalized = trimmed\n\t\t\t.replace(dockerIpRegex, `/ip4/${targetIp}`)\n\t\t\t.replace(loopbackRegex, `/ip4/${targetIp}`)\n\t\t\t.replace(physicalIpRegex, `/ip4/${targetIp}`);\n\n\t\tif (normalized !== trimmed) {\n\t\t\tlog.info(\n\t\t\t\t`[LIOP-Agent] 🔄 Local Routing Hack → Forced 127.0.0.1: ${normalized}`,\n\t\t\t);\n\t\t}\n\t\treturn normalized;\n\t}\n\n\treturn trimmed;\n}\n\n/**\n * industrialAddressMapper\n *\n * Mapea IPs internas de Docker a puertos industriales mapeados en el Host.\n * Nexus (172.20.0.10) -> 13001\n * Vault (172.20.0.11) -> 13003\n * Bank (172.20.0.12) -> 13004\n * Oracle(172.20.0.13) -> 13005\n */\nfunction industrialAddressMapper(addr: string): string | null {\n\tif (addr.includes(\"/ip4/172.20.0.10\"))\n\t\treturn addr.replace(\n\t\t\t/\\/ip4\\/172\\.20\\.0\\.10\\/tcp\\/[0-9]+/,\n\t\t\t\"/ip4/127.0.0.1/tcp/13001\",\n\t\t);\n\tif (addr.includes(\"/ip4/172.20.0.11\"))\n\t\treturn addr.replace(\n\t\t\t/\\/ip4\\/172\\.20\\.0\\.11\\/tcp\\/[0-9]+/,\n\t\t\t\"/ip4/127.0.0.1/tcp/13003\",\n\t\t);\n\tif (addr.includes(\"/ip4/172.20.0.12\"))\n\t\treturn addr.replace(\n\t\t\t/\\/ip4\\/172\\.20\\.0\\.12\\/tcp\\/[0-9]+/,\n\t\t\t\"/ip4/127.0.0.1/tcp/13004\",\n\t\t);\n\tif (addr.includes(\"/ip4/172.20.0.13\"))\n\t\treturn addr.replace(\n\t\t\t/\\/ip4\\/172\\.20\\.0\\.13\\/tcp\\/[0-9]+/,\n\t\t\t\"/ip4/127.0.0.1/tcp/13005\",\n\t\t);\n\n\t// Drop container-internal loopbacks to prevent the Host Agent from dialing itself or conflicting ports\n\tif (\n\t\taddr.includes(\"/ip4/127.0.0.1/tcp/4000\") ||\n\t\taddr.includes(\"/ip4/127.0.0.1/tcp/3000\")\n\t) {\n\t\treturn null;\n\t}\n\n\treturn addr;\n}\n\n/**\n * LIOP Agent (Zero-Config CLI)\n *\n * Secure Logic-on-Origin gateway for Claude Desktop.\n * Communicates via STDIO / JSON-RPC.\n *\n * All tool discovery is DYNAMIC via the /liop/manifest/1.0.0 protocol.\n * No hardcoded tools, PeerIDs, or port mappings.\n */\nasync function main() {\n\tconst buildTime = new Date().toISOString();\n\tlog.info(`[LIOP-Agent] 🚀 Version 1.2.0-alpha.9 | Build: ${buildTime}`);\n\n\tconst liopDir = path.join(os.homedir(), \".liop\");\n\tconst identityPath = path.join(liopDir, \"identity.json\");\n\n\tif (!fs.existsSync(liopDir)) {\n\t\tfs.mkdirSync(liopDir, { recursive: true });\n\t}\n\n\t// 1. Determine Bootstrap Nodes (Zero-Config Discovery)\n\tlet bootstrapNodes: string[] = [];\n\n\t// Command line arguments take precedence\n\tconst args = process.argv.slice(2);\n\tif (args.length > 0) {\n\t\tbootstrapNodes = args.filter((a) => a.startsWith(\"/\"));\n\t}\n\n\t// Priority 1: Physical Beacons (Industrial Pattern) - DETERMINISTIC & INSTANT\n\tif (bootstrapNodes.length === 0) {\n\t\tconst searchDirs = [];\n\n\t\t// Priority 1.1: Explicit file from environment variable\n\t\tif (process.env.LIOP_BOOTSTRAP_FILE) {\n\t\t\tconst filePath = path.resolve(process.env.LIOP_BOOTSTRAP_FILE);\n\t\t\tif (fs.existsSync(filePath)) {\n\t\t\t\tconst addr = fs.readFileSync(filePath, \"utf8\").trim();\n\t\t\t\tif (addr) bootstrapNodes.push(normalizeBootstrap(addr));\n\t\t\t}\n\t\t}\n\n\t\t// Priority 1.2: Traditional locations (Scan for all *.multiaddr)\n\t\tsearchDirs.push(\n\t\t\tprocess.cwd(),\n\t\t\tpath.join(process.cwd(), \"tests/infra/nexus-data\"),\n\t\t\tliopDir,\n\t\t\tpath.join(\n\t\t\t\tpath\n\t\t\t\t\t.dirname(new URL(import.meta.url).pathname)\n\t\t\t\t\t.replace(/^\\/([A-Z]:)/, \"$1\"),\n\t\t\t\t\"../../tests/infra/nexus-data\",\n\t\t\t),\n\t\t);\n\n\t\tfor (const dir of searchDirs) {\n\t\t\ttry {\n\t\t\t\tif (fs.existsSync(dir)) {\n\t\t\t\t\tconst files = fs.readdirSync(dir);\n\t\t\t\t\tconst multiaddrFiles = files.filter((f) => f.endsWith(\".multiaddr\"));\n\n\t\t\t\t\tfor (const file of multiaddrFiles) {\n\t\t\t\t\t\tconst filePath = path.join(dir, file);\n\t\t\t\t\t\tconst addr = fs.readFileSync(filePath, \"utf8\").trim();\n\t\t\t\t\t\tif (addr) {\n\t\t\t\t\t\t\tconst normalized = normalizeBootstrap(addr);\n\t\t\t\t\t\t\tif (!bootstrapNodes.includes(normalized)) {\n\t\t\t\t\t\t\t\tbootstrapNodes.push(normalized);\n\t\t\t\t\t\t\t\tlog.info(`[LIOP-Agent] ✅ Loaded beacon: ${file} from ${dir}`);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\t// If we found any beacons in this directory, we consider discovery successful for this layer\n\t\t\t\t\tif (bootstrapNodes.length > 0) break;\n\t\t\t\t}\n\t\t\t} catch (_e) {\n\t\t\t\t/* ignore */\n\t\t\t}\n\t\t}\n\t}\n\n\t// Priority 2: Auto-Discovery via NEXUS URL (Aggressive Parallel Discovery)\n\tif (process.env.LIOP_NEXUS_URL) {\n\t\tconst nexusUrl = process.env.LIOP_NEXUS_URL;\n\t\tlog.info(\n\t\t\t`[LIOP-Agent] 🌐 Running parallel discovery from: ${nexusUrl} (Sources Found: ${bootstrapNodes.length})`,\n\t\t);\n\n\t\tconst resolved = await resolveBootstrapFromUrl(nexusUrl);\n\t\tif (resolved) {\n\t\t\tconst normalized = normalizeBootstrap(resolved);\n\t\t\tif (!bootstrapNodes.includes(normalized)) {\n\t\t\t\tbootstrapNodes.push(normalized);\n\t\t\t\tlog.info(\n\t\t\t\t\t`[LIOP-Agent] ✅ Added bootstrap from URL discovery: ${normalized}`,\n\t\t\t\t);\n\t\t\t}\n\t\t}\n\t}\n\n\t// Priority 3: Environment variable (direct multiaddr)\n\tif (bootstrapNodes.length === 0 && process.env.LIOP_BOOTSTRAP) {\n\t\tbootstrapNodes.push(process.env.LIOP_BOOTSTRAP.trim());\n\t}\n\n\t// Final fallback: local Nexus bootstrap for demo environments.\n\t// Avoid injecting stale static peer IDs when discovery already found valid peers.\n\tif (bootstrapNodes.length === 0) {\n\t\tbootstrapNodes.push(\n\t\t\t\"/ip4/127.0.0.1/tcp/13001/p2p/12D3KooWD8FUFdnLQzzLFNdicsaTknM5cpD7os9sK9NWVSVABJMD\",\n\t\t);\n\t}\n\n\t// Sanitize/validate all candidate multiaddrs so malformed PeerIDs don't crash startup.\n\tbootstrapNodes = bootstrapNodes.filter((addr) => {\n\t\ttry {\n\t\t\tmultiaddr(addr);\n\t\t\treturn true;\n\t\t} catch {\n\t\t\tlog.warn(`[LIOP-Agent] Ignoring invalid bootstrap multiaddr: ${addr}`);\n\t\t\treturn false;\n\t\t}\n\t});\n\n\t// If no bootstrap nodes found, the agent operates in standalone mode.\n\t// It will only serve local tools until peers are discovered.\n\tif (bootstrapNodes.length === 0) {\n\t\tlog.info(\n\t\t\t\"[LIOP-Agent] No bootstrap nodes configured. Operating in standalone mode.\",\n\t\t);\n\t\tlog.info(\n\t\t\t\"[LIOP-Agent] Pass a multiaddr as argument or create 'nexus.multiaddr' file.\",\n\t\t);\n\t}\n\n\t// Initialize local server node (lightweight, no tools registered locally)\n\tconst liopServer = new LiopServer({\n\t\tname: \"@nekzus/liop-agent\",\n\t\tversion: \"1.0.0\",\n\t});\n\n\t// Enable Zero-Shot Autonomy (Industrial Prompt Injection)\n\tliopServer.enableZeroShotAutonomy();\n\n\t// 2. Mesh Node Configuration\n\tconst meshNode = new MeshNode({\n\t\tidentityPath: identityPath,\n\t\tbootstrapNodes: bootstrapNodes,\n\t\taddressMapper: industrialAddressMapper,\n\t});\n\n\t// Start P2P Mesh\n\tawait meshNode.start();\n\n\t// 3. Initialize the Dynamic Router\n\t// No hardcoded tools — all discovery happens via liop:manifest protocol\n\tconst router = new LiopMcpRouter(liopServer, meshNode);\n\n\t// Proactive Notification to Claude Desktop when tools/resources are discovered dynamically\n\trouter.onToolsChanged = () => {\n\t\tprocess.stdout.write(\n\t\t\t`{\"jsonrpc\":\"2.0\",\"method\":\"notifications/tools/list_changed\"}\\n`,\n\t\t);\n\t\tprocess.stdout.write(\n\t\t\t`{\"jsonrpc\":\"2.0\",\"method\":\"notifications/resources/list_changed\"}\\n`,\n\t\t);\n\t};\n\n\t// Initial warming period (2s) then Adaptive Background Discovery\n\t// Polls DHT for new nodes and triggers onToolsChanged when topology shifts.\n\t// Uses exponential backoff to reduce polling load on stable meshes.\n\tsetTimeout(() => {\n\t\t// biome-ignore lint/suspicious/noExplicitAny: access internal for telemetry\n\t\tconst rtSize = (meshNode as any).getRoutingTableSize?.() || 0;\n\t\tlog.info(`[LIOP-Agent] Warm-up complete. Routing Table size: ${rtSize}`);\n\t\trouter.refreshManifestCache(true).catch(() => {});\n\t}, 2000);\n\n\tconst POLL_BASE_MS = 10_000;\n\tconst POLL_MAX_MS = 120_000;\n\tlet pollIntervalMs = POLL_BASE_MS;\n\n\tconst scheduleAdaptivePoll = () => {\n\t\tsetTimeout(async () => {\n\t\t\tconst prevSize = router.getCacheSize();\n\t\t\tawait router.refreshManifestCache(true).catch(() => {});\n\t\t\tconst newSize = router.getCacheSize();\n\n\t\t\tif (newSize !== prevSize) {\n\t\t\t\t// Topology changed — reset to aggressive polling\n\t\t\t\tpollIntervalMs = POLL_BASE_MS;\n\t\t\t\tlog.info(\n\t\t\t\t\t`[LIOP-Agent] Topology change detected (${prevSize} → ${newSize}). Resetting poll to ${POLL_BASE_MS / 1000}s.`,\n\t\t\t\t);\n\t\t\t} else {\n\t\t\t\t// Stable — relax polling interval (factor 1.5)\n\t\t\t\tpollIntervalMs = Math.min(\n\t\t\t\t\tMath.round(pollIntervalMs * 1.5),\n\t\t\t\t\tPOLL_MAX_MS,\n\t\t\t\t);\n\t\t\t}\n\n\t\t\tscheduleAdaptivePoll();\n\t\t}, pollIntervalMs);\n\t};\n\n\tscheduleAdaptivePoll();\n\n\t// 4. STDIO Transport — Buffered Line Reader\n\t// Uses readline to guarantee complete JSON-RPC messages before parsing.\n\t// Raw stdin.on(\"data\") can fragment large payloads across multiple chunks.\n\tconst readline = await import(\"node:readline\");\n\tconst rl = readline.createInterface({\n\t\tinput: process.stdin,\n\t\tterminal: false,\n\t});\n\n\tprocess.stdout.on(\"error\", (err: Error & { code?: string }) => {\n\t\tif (err.code === \"EPIPE\") {\n\t\t\tprocess.exit(0); // Graceful exit when Claude Desktop disconnects\n\t\t}\n\t});\n\n\trl.on(\"line\", async (line) => {\n\t\tconst trimmed = line.trim();\n\t\tif (!trimmed) return;\n\n\t\ttry {\n\t\t\tconst request = JSON.parse(trimmed) as McpRequest;\n\t\t\tif (request.method) {\n\t\t\t\tconst response = await router.dispatch(request);\n\t\t\t\tif (response) {\n\t\t\t\t\tprocess.stdout.write(`${JSON.stringify(response)}\\n`);\n\t\t\t\t}\n\t\t\t}\n\t\t} catch (_err) {\n\t\t\t// Silent catch for binary noise or malformed lines\n\t\t}\n\t});\n\n\trl.on(\"close\", () => {\n\t\tprocess.exit(0);\n\t});\n\n\t// Status directed only to stderr\n\tlog.info(`[LIOP-Agent] Guarding Claude Desktop via STDIO.`);\n\tlog.info(\n\t\t`[LIOP-Agent] P2P Mesh: Joined (${bootstrapNodes.length} bootstraps)`,\n\t);\n\tlog.info(\"[LIOP-Agent] Tool discovery: Dynamic via /liop/manifest/1.0.0\");\n\n\tprocess.on(\"SIGINT\", async () => {\n\t\tawait meshNode.stop();\n\t\tprocess.exit(0);\n\t});\n}\n\nmain().catch((err) => {\n\tlog.error(`[LIOP-Agent] Fatal Error: ${err.message}`);\n\tprocess.exit(1);\n});\n"]}
@@ -1,8 +1,13 @@
1
- import type { LiopServer } from "../server/index.js";
1
+ import { McpServer } from '@modelcontextprotocol/sdk/server/mcp.js';
2
+ import { LiopServer, LiopServerOptions } from './server.js';
3
+ import 'zod';
4
+ import './mesh.js';
5
+ import './types.js';
6
+
2
7
  /**
3
8
  * Configuration options for LiopStreamBridge.
4
9
  */
5
- export interface LiopStreamBridgeOptions {
10
+ interface LiopStreamBridgeOptions {
6
11
  /** Port to listen on (default: 3000) */
7
12
  port?: number;
8
13
  /** Max concurrent sessions per IP (default: 5) */
@@ -24,7 +29,7 @@ export interface LiopStreamBridgeOptions {
24
29
  * - Per-IP rate limiting on session creation
25
30
  * - Automatic eviction of idle sessions (TTL)
26
31
  */
27
- export declare class LiopStreamBridge {
32
+ declare class LiopStreamBridge {
28
33
  private options;
29
34
  private app;
30
35
  private httpServer;
@@ -60,3 +65,39 @@ export declare class LiopStreamBridge {
60
65
  */
61
66
  stop(): Promise<void>;
62
67
  }
68
+
69
+ interface LiopBridgeOptions {
70
+ publishToMesh?: boolean;
71
+ meshIdentity?: string;
72
+ serverInfo?: {
73
+ name: string;
74
+ version: string;
75
+ };
76
+ security?: LiopServerOptions["security"];
77
+ }
78
+ /**
79
+ * LIOP MCP Bridge
80
+ * A bi-directional bridge that allows legacy MCP servers to join the LIOP mesh,
81
+ * or exposes a LIOP server as an MCP-compatible stdio process for tools like Claude Desktop.
82
+ */
83
+ declare class LiopMcpBridge {
84
+ private options;
85
+ private liopServer;
86
+ private legacyMcpServer;
87
+ constructor(source: LiopServer | McpServer | any, options?: LiopBridgeOptions);
88
+ /**
89
+ * Handles an incoming standard MCP JSON-RPC 2.0 payload.
90
+ * Pipes it to the underlying server (LIOP or Legacy MCP).
91
+ */
92
+ handleJsonRpcRequest(payload: Record<string, unknown>): Promise<unknown>;
93
+ private handleLiopToMcp;
94
+ private successResponse;
95
+ private errorResponse;
96
+ private verifyZkReceipt;
97
+ /**
98
+ * Connects the bridge via stdio or Mesh depending on mode.
99
+ */
100
+ connect(): Promise<void>;
101
+ }
102
+
103
+ export { type LiopBridgeOptions, LiopMcpBridge, LiopStreamBridge, type LiopStreamBridgeOptions };
package/dist/bridge.js ADDED
@@ -0,0 +1,2 @@
1
+ export{b as LiopMcpBridge,a as LiopStreamBridge}from'./chunk-XLVRRGOX.js';import'./chunk-S6RJHZV2.js';//# sourceMappingURL=bridge.js.map
2
+ //# sourceMappingURL=bridge.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":[],"names":[],"mappings":"","file":"bridge.js"}
@@ -0,0 +1,33 @@
1
+ import {a as a$1}from'./chunk-UVTEJYHN.js';import {a as a$3}from'./chunk-DBXGYHKY.js';import {a as a$2,c}from'./chunk-HM77MWB6.js';import {a}from'./chunk-S6RJHZV2.js';import {metrics}from'@opentelemetry/api';import*as N from'crypto';var C=class{name="o200k_base";countFn;constructor(e,r){this.countFn=e,r&&r(1e4);}countTokens(e){return e.length===0?0:this.countFn(e)}},R=class{name="heuristic (chars/4)";countTokens(e){return e.length===0?0:Math.ceil(e.length/4)}};async function B(){try{let y=await import('gpt-tokenizer'),e=new C(y.countTokens,y.setMergeCacheSize);return a.debug("[LIOP-Economy] Token estimator initialized: o200k_base"),e}catch{return a.info("[LIOP-Economy] gpt-tokenizer unavailable, falling back to heuristic estimator"),new R}}function U(){return new R}var V="@nekzus/liop",J="1.2.0-alpha.9",q=[1,4,16,64,256,1024,4096,16384,65536,262144,1048576,4194304,16777216,67108864],Q=[.01,.02,.04,.08,.16,.32,.64,1.28,2.56,5.12,10.24,20.48,40.96,81.92],E=class{tokenUsage;operationDuration;active=false;constructor(){try{let e=metrics.getMeter(V,J);this.tokenUsage=e.createHistogram("gen_ai.client.token.usage",{description:"Number of tokens used in LIOP Logic-on-Origin operations",unit:"{token}",advice:{explicitBucketBoundaries:q}}),this.operationDuration=e.createHistogram("gen_ai.client.operation.duration",{description:"Duration of LIOP operations",unit:"s",advice:{explicitBucketBoundaries:Q}}),this.active=!0,a.debug("[LIOP-OTel] gen_ai.* metrics bridge initialized");}catch(e){a.debug(`[LIOP-OTel] Bridge disabled: ${e instanceof Error?e.message:String(e)}`);let r={record:()=>{}};this.tokenUsage=r,this.operationDuration=r;}}recordTokens(e,r,s,n){this.tokenUsage.record(e,{"gen_ai.system":"liop","gen_ai.operation.name":s,"gen_ai.token.type":r,"gen_ai.request.model":"liop-mesh",...n?{"liop.tool.name":n}:{}});}recordDuration(e,r,s){this.operationDuration.record(e/1e3,{"gen_ai.system":"liop","gen_ai.operation.name":r,...s?{"error.type":s}:{}});}isActive(){return this.active}};var W={tools_list:"chat",tool_call:"execute_tool",resource_read:"chat",resource_list:"chat",prompt_get:"chat",prompt_list:"chat",diagnostic:"chat"},I=class y{static instance=null;operations=[];sessionId;startedAt;estimator;otelBridge;constructor(){this.sessionId=crypto.randomUUID(),this.startedAt=Date.now(),this.estimator=U(),this.otelBridge=new E,this.initRealEstimator();}initRealEstimator(){B().then(e=>{this.estimator=e;}).catch(()=>{});}static getInstance(){return y.instance||(y.instance=new y),y.instance}countTokens(e){try{return this.estimator.countTokens(e)}catch{return Math.ceil(e.length/4)}}record(e){let r={...e,timestamp:Date.now()};this.operations.push(r);try{let s=W[e.type]||"chat";e.estimatedInputTokens>0&&this.otelBridge.recordTokens(e.estimatedInputTokens,"input",s,e.toolName),e.estimatedOutputTokens>0&&this.otelBridge.recordTokens(e.estimatedOutputTokens,"output",s,e.toolName),e.durationMs!==void 0&&this.otelBridge.recordDuration(e.durationMs,s);}catch{}}estimateTokens(e){return this.countTokens(e)}getReport(){return {sessionId:this.sessionId,operations:[...this.operations],totalInputTokens:this.operations.reduce((e,r)=>e+r.estimatedInputTokens,0),totalOutputTokens:this.operations.reduce((e,r)=>e+r.estimatedOutputTokens,0),estimatorName:this.estimator.name,sessionUptimeMs:Date.now()-this.startedAt}}getPerToolReport(){let e=new Map;for(let r of this.operations){let s=r.toolName||r.method,n=e.get(s)||{input:0,output:0,calls:0,avgDurationMs:0},t=n.avgDurationMs*n.calls+(r.durationMs||0),o=n.calls+1;e.set(s,{input:n.input+r.estimatedInputTokens,output:n.output+r.estimatedOutputTokens,calls:o,avgDurationMs:o>0?t/o:0});}return e}formatStatusBlock(){let e=this.getReport();if(e.operations.length===0)return "";let r=this.formatUptime(e.sessionUptimeMs),s=e.totalInputTokens+e.totalOutputTokens,n=new Map;for(let l of e.operations){let d=l.type,g=n.get(d)||{count:0,input:0,output:0};n.set(d,{count:g.count+1,input:g.input+l.estimatedInputTokens,output:g.output+l.estimatedOutputTokens});}let t=Array.from(n.entries()),o=t.map(([l,d],g)=>{let P=g===t.length-1?"\u2502 \u2514\u2500":"\u2502 \u251C\u2500",S=d.output>0?` / ${d.output.toLocaleString()} out`:"";return `${P} ${l} \xD7${d.count} \u2192 ${d.input.toLocaleString()} in${S}`}),c=this.getPerToolReport(),a=Array.from(c.entries()).filter(([l])=>l!=="tools/list"&&l!=="LiopMeshStatus"),u=[];a.length>0&&(u.push("\u251C\u2500 By Tool:"),a.forEach(([l,d],g)=>{let P=g===a.length-1?"\u2502 \u2514\u2500":"\u2502 \u251C\u2500",S=d.output>0?` / ${d.output.toLocaleString()} out`:"",v=d.avgDurationMs>0?` ~${Math.round(d.avgDurationMs)}ms`:"";u.push(`${P} ${l}: ${d.input.toLocaleString()} in${S} (\xD7${d.calls})${v}`);}));let f=e.operations.filter(l=>l.durationMs!==void 0),m=f.length>0?Math.round(f.reduce((l,d)=>l+(d.durationMs||0),0)/f.length):0,i=this.otelBridge.isActive()?"gen_ai.client.token.usage \u2192 active":"disabled";return [`
2
+ Token Economy:`,`\u251C\u2500 Session: ${e.sessionId.slice(0,8)} (${r})`,`\u251C\u2500 Estimator: ${e.estimatorName}`,`\u251C\u2500 Operations: ${e.operations.length}`,...o,`\u251C\u2500 Total: ${e.totalInputTokens.toLocaleString()} in / ${e.totalOutputTokens.toLocaleString()} out (${s.toLocaleString()} combined)`,...u,...m>0?[`\u251C\u2500 Avg Latency: ${m}ms`]:[],`\u2514\u2500 OTel: ${i}`].join(`
3
+ `)}formatUptime(e){let r=Math.floor(e/1e3);if(r<60)return `${r}s`;let s=Math.floor(r/60),n=r%60;if(s<60)return `${s}m ${n}s`;let t=Math.floor(s/60),o=s%60;return `${t}h ${o}m`}reset(){this.operations=[];}static destroy(){y.instance=null;}};function M(){let y=process.env.LIOP_MCP_COMPACT_TOOL_DESCRIPTIONS?.toLowerCase().trim();return y==="1"||y==="true"||y==="yes"}function b(y){let e=y,r=[`
4
+
5
+ [LIOP-PROTO-V1:`,`\r
6
+ \r
7
+ [LIOP-PROTO-V1:`,`
8
+ [LIOP-PROTO-V1:`];for(let s of r){let n=e.indexOf(s);if(n!==-1){e=e.slice(0,n);break}}return e.trimEnd()}var z=300,$=5,F=class y{constructor(e,r=null,s=50051){this.liopServer=e;this.meshNode=r;this.defaultRpcPort=s;this.meshNode&&(this.meshNode.registerManifestHandler(()=>{let n=this.liopServer.listTools().map(o=>({name:o.name,description:o.description,inputSchema:o.inputSchema})),t=this.liopServer.listResources().map(o=>({name:o.name,uri:o.uri,description:o.description,mimeType:o.mimeType}));return {peerId:this.meshNode?.getPeerId()||"unknown",grpcPort:this.defaultRpcPort,tools:[...n],resources:t,serverInfo:this.liopServer.getServerInfo()}}),this.meshNode.announceManifest().catch(n=>{a.info(`[LIOP-Router] Failed to announce manifest: ${n instanceof Error?n.message:String(n)}`);})),process.env.LIOP_DIAGNOSTIC_LEVEL==="full"&&process.stderr.write(`\u26A0\uFE0F [LIOP-Security] Diagnostic level set to FULL \u2014 PeerIDs and network topology are exposed. Do NOT use in production.
9
+ `);}manifestCache=new Map;currentDiscovery=null;verifier=new a$1;onToolsChanged;manifestFailureState=new Map;static MANIFEST_FAILURE_BASE_COOLDOWN_MS=15e3;static MANIFEST_FAILURE_MAX_COOLDOWN_MS=5*6e4;static MANIFEST_SKIP_LOG_THROTTLE_MS=3e4;shouldSkipManifestQuery(e){let r=this.manifestFailureState.get(e);if(!r)return false;let s=Date.now();return s>=r.cooldownUntil?false:(s-r.lastSkipLogAt>y.MANIFEST_SKIP_LOG_THROTTLE_MS&&(a.info(`[LIOP-Router] Skipping manifest query for ${e} during cooldown (${Math.ceil((r.cooldownUntil-s)/1e3)}s remaining)`),r.lastSkipLogAt=s),true)}recordManifestQuerySuccess(e){this.manifestFailureState.delete(e);}recordManifestQueryFailure(e){let r=Date.now(),n=(this.manifestFailureState.get(e)?.failures||0)+1,t=Math.min(y.MANIFEST_FAILURE_BASE_COOLDOWN_MS*2**Math.max(0,n-1),y.MANIFEST_FAILURE_MAX_COOLDOWN_MS);this.manifestFailureState.set(e,{failures:n,cooldownUntil:r+t,lastSkipLogAt:0});}async dispatch(e){let{method:r,params:s,id:n}=e;switch(a.info(`[LIOP-Router] Processing: ${r}`),r){case "initialize":return {jsonrpc:"2.0",id:n,result:{protocolVersion:"2025-11-25",capabilities:{tools:{listChanged:true},resources:{listChanged:true},prompts:{listChanged:true}},serverInfo:this.liopServer.getServerInfo()}};case "notifications/initialized":return this.kickDiscoveryAfterInitialized().catch(()=>{}),null;case "notifications/cancelled":return null;case "ping":return {jsonrpc:"2.0",id:n,result:{}};case "tools/list":{let t=this.liopServer.listTools(),o=await this.getRemoteTools(),c=M()?t.map(p=>({...p,description:b(p.description??"")})):t;a.info(`[LIOP-Router] tools/list: ${t.length} local, ${o.length} remote tools found`);let u=[{name:"LiopMeshStatus",description:"LiopMeshStatus: Returns the current dynamic diagnostic status of the Zero-Trust Neural Mesh.",inputSchema:{type:"object",properties:{},additionalProperties:false}},...c,...o],f=I.getInstance(),m=JSON.stringify(u),i=JSON.stringify({tools:u});return f.record({type:"tools_list",method:"tools/list",estimatedInputTokens:f.countTokens(m),estimatedOutputTokens:f.countTokens(i)}),{jsonrpc:"2.0",id:n,result:{tools:u}}}case "tools/call":return this.transcodeMcpToLiop(n,s);case "resources/list":{let t=this.liopServer.listResources(),o=await this.getRemoteResources(),c=[...t,...o],a=I.getInstance(),u=JSON.stringify(c);return a.record({type:"resource_list",method:"resources/list",estimatedInputTokens:0,estimatedOutputTokens:a.countTokens(u)}),{jsonrpc:"2.0",id:n,result:{resources:c}}}case "resources/read":{let t=s;if(!t?.uri)return {jsonrpc:"2.0",id:n,error:{code:-32602,message:"Missing resource uri"}};try{let o=Date.now(),c=await this.liopServer.readResource(t.uri),a=I.getInstance(),u=JSON.stringify(c);return a.record({type:"resource_read",method:"resources/read",toolName:t.uri,estimatedInputTokens:a.countTokens(t.uri),estimatedOutputTokens:a.countTokens(u),durationMs:Date.now()-o}),{jsonrpc:"2.0",id:n,result:c}}catch(o){let c=t.uri;for(let{manifest:a$1}of this.manifestCache.values()){let u=a$1.resources.find(f=>f.uri===c);if(u)return a.info(`[LIOP-Router] Resolved resource ${c} from cache (Peer: ${a$1.peerId})`),{jsonrpc:"2.0",id:n,result:{contents:[{uri:u.uri,mimeType:u.mimeType||"text/plain",text:u.text||u.description||"No content provided"}]}}}return {jsonrpc:"2.0",id:n,error:{code:-32e3,message:o instanceof Error?o.message:String(o)}}}}case "prompts/list":{let t=this.liopServer.listPrompts(),o=I.getInstance(),c=JSON.stringify(t);return o.record({type:"prompt_list",method:"prompts/list",estimatedInputTokens:0,estimatedOutputTokens:o.countTokens(c)}),{jsonrpc:"2.0",id:n,result:{prompts:t}}}case "prompts/get":{let t=s;if(!t?.name)return {jsonrpc:"2.0",id:n,error:{code:-32602,message:"Missing prompt name"}};try{let o=Date.now(),c=await this.liopServer.getPrompt({name:t.name,arguments:t.arguments||{}}),a=I.getInstance(),u=JSON.stringify({name:t.name,arguments:t.arguments}),f=JSON.stringify(c);return a.record({type:"prompt_get",method:"prompts/get",toolName:t.name,estimatedInputTokens:a.countTokens(u),estimatedOutputTokens:a.countTokens(f),durationMs:Date.now()-o}),{jsonrpc:"2.0",id:n,result:c}}catch(o){return {jsonrpc:"2.0",id:n,error:{code:-32e3,message:o instanceof Error?o.message:String(o)}}}}default:return {jsonrpc:"2.0",id:n,error:{code:-32601,message:`Method not found: ${r}`}}}}kickDiscoveryAfterInitialized(){return (async()=>{await new Promise(e=>setTimeout(e,250)),await Promise.race([this.refreshManifestCache(true),new Promise(e=>setTimeout(e,15e3))]).catch(()=>{});})()}async refreshManifestCache(e=false){if(this.meshNode){if(this.currentDiscovery)return this.currentDiscovery;if(!e&&this.manifestCache.size>0){let r=Date.now();if(Array.from(this.manifestCache.values()).every(({cachedAt:n})=>r-n<z*1e3))return}return this.currentDiscovery=(async()=>{try{let r=Array.from(this.manifestCache.values()).reduce((i,{manifest:p})=>i+p.tools.length,0);if(this.manifestCache.size===0)for(let i=0;i<3;i++){if((this.meshNode.node?.getConnections().length||0)>0){a.info("[LIOP-Router] P2P Connection established. Starting discovery...");break}a.info(`[LIOP-Router] Waiting for P2P connections (attempt ${i+1}/10)...`),await new Promise(l=>setTimeout(l,1e3));}let s=[],n=this.manifestCache.size===0?5:1;for(let i=0;i<n;i++){for(let g=0;g<$;g++){s=await this.meshNode?.discoverManifestProviders()||[];let P=this.meshNode?.getPeerId();if(s.filter(v=>v!==P).length>0)break;g<$-1&&(a.info(`[LIOP-Router] DHT discovery attempt ${g+1}/${$}...`),await new Promise(v=>setTimeout(v,1e3)));}let p=this.meshNode.node?.getConnections().map(g=>g.remotePeer.toString())||[];p.length>0&&(s=Array.from(new Set([...s,...p])));let l=this.meshNode?.getPeerId();if(s.filter(g=>g!==l).length>0)break;i<n-1&&(a.info(`[LIOP-Router] Initial discovery failed (0 providers). Retrying in 1s (${i+1}/${n})...`),await new Promise(g=>setTimeout(g,1e3)));}if(s.length===0){a.info("[LIOP-Router] No manifest providers found after all attempts.");return}e||a.info(`[LIOP-Router] Discovered ${s.length} candidate manifest providers`);let t=new Set((this.meshNode.node?.getConnections?.()||[]).map(i=>i.remotePeer.toString()));s=[...s].sort((i,p)=>{let l=t.has(i)?1:0;return (t.has(p)?1:0)-l});let o=0,c=0,a$1=!1,u=this.meshNode?.getPeerId(),f=s.filter(i=>{if(!this.meshNode||i===u||this.shouldSkipManifestQuery(i))return !1;let p=this.manifestCache.get(i);return p&&Date.now()-p.cachedAt<z*1e3?(o++,!1):!0}),m=await Promise.allSettled(f.map(async i=>this.meshNode?(a.info(`[LIOP-Router] Querying manifest from: ${i}`),{peerId:i,manifest:await this.meshNode.queryManifest(i)}):null));for(let i of m)if(i.status==="fulfilled"&&i.value?.manifest){let{peerId:p,manifest:l}=i.value;this.manifestCache.set(p,{manifest:l,cachedAt:Date.now()}),this.recordManifestQuerySuccess(p),a$1=!0,o++,a.info(`[LIOP-Router] Manifest received from ${p} (${l.tools.length} tools)`);}else i.status==="fulfilled"&&i.value?(this.recordManifestQueryFailure(i.value.peerId),c++,a.info(`[LIOP-Router] Manifest query returned NULL for ${i.value.peerId}`)):i.status==="rejected"&&(c++,a.info("[LIOP-Router] Fatal error querying manifest:",i.reason instanceof Error?i.reason.message:String(i.reason)));this._discoveryStats={candidates:s.length,success:o,failures:c,lastDiscovery:Date.now()},a$1&&Array.from(this.manifestCache.values()).reduce((p,{manifest:l})=>p+l.tools.length,0)!==r&&this.onToolsChanged&&(process.stderr.write(`[LIOP-Router] Mesh topology updated! Emitting notifications/tools/list_changed.
10
+ `),this.onToolsChanged());}finally{this.currentDiscovery=null;}})(),this.currentDiscovery}}getCacheSize(){return this.manifestCache.size}async getRemoteTools(){let e=Number.parseInt(process.env.LIOP_EXPECTED_PROVIDERS??"4",10);if(this.manifestCache.size<e&&this.meshNode){let t=Number.parseInt(process.env.LIOP_INITIAL_DISCOVERY_TIMEOUT_MS??"12000",10),o=Number.isFinite(t)&&t>0?t:12e3,c=Date.now()+o,a$1=0,u=-1;for(;Date.now()<c&&!(this.manifestCache.size>=e||(await Promise.race([this.refreshManifestCache(true),new Promise(f=>setTimeout(f,3e3))]).catch(()=>{}),this.manifestCache.size>=e));){if(this.manifestCache.size===u){if(a$1++,a$1>=3&&this.manifestCache.size>0){a.info(`[LIOP-Router] Provider count stabilized at ${this.manifestCache.size}/${e}. Proceeding with available mesh.`);break}}else a$1=0,u=this.manifestCache.size;await new Promise(f=>setTimeout(f,1e3));}this.manifestCache.size<e&&(a.info(`[LIOP-Router] \u26A0\uFE0F Mesh partially available: ${this.manifestCache.size}/${e} providers. Some tools may be unavailable. Check Docker containers.`),this.refreshManifestCache(true).catch(()=>{}));}let r=[],s=new Set,n=new Set(this.liopServer.listTools().map(t=>t.name));for(let[t,{manifest:o}]of this.manifestCache.entries())for(let c of o.tools){if(c.name==="LiopMeshStatus")continue;let a=c.name;(s.has(c.name)||n.has(c.name))&&(a=`${c.name}_${t.slice(-4)}`),s.add(a);let u=o.serverInfo?.name||"Unknown Provider",f=c.description||`Remote tool from ${u}`,m={name:a,description:M()?b(f):f,inputSchema:c.inputSchema||{type:"object",properties:{}}};typeof m.inputSchema=="object"&&!m.inputSchema.type&&(m.inputSchema.type="object"),typeof m.inputSchema=="object"&&!m.inputSchema.properties&&(m.inputSchema.properties={});let i="";o.taxonomy&&(i=`
11
+ [LIOP-DOMAIN: ${o.taxonomy.domain}]`);let p=m.inputSchema.properties||{},l="";!M()&&p.payload&&(l=`
12
+ [REQUIRES: LIOP-PROTO-V1 ENVELOPE]`),!M()&&m.description.includes("STRICT SCHEMA ADHERENCE")&&(m.description=m.description.replace("STRICT SCHEMA ADHERENCE:","[INDUSTRIAL-REQUISITE] STRICT SCHEMA ADHERENCE (MANDATORY):"));let d=M()?`
13
+ (Peer: ${t.slice(-8)})${i}`:`
14
+ (Origin: ${t.slice(-8)})${i}${l}`;m.description=`${m.description}${d}`,r.push(m);}return r}async getRemoteResources(){this.currentDiscovery||this.refreshManifestCache(true).catch(()=>{});let e=[],r=new Set(this.liopServer.listResources().map(s=>s.uri));for(let[s,{manifest:n}]of this.manifestCache.entries())for(let t of n.resources)if(!r.has(t.uri)){let o={...t},c=n.serverInfo?.name||"Unknown Provider",a="";n.taxonomy&&(a=`
15
+
16
+ [LIOP Zero-Trust Blueprint]
17
+ Domain: ${n.taxonomy.domain}
18
+ Clearance Tier: ${n.taxonomy.clearanceTier}`,n.taxonomy.executionTypes&&n.taxonomy.executionTypes.length>0&&(a+=`
19
+ Execution Types: ${n.taxonomy.executionTypes.join(", ")}`));let u=`
20
+
21
+ [LIOP Zero-Trust Origin]
22
+ Provider: ${c}
23
+ Network ID: ${s}${a}`;o.uri.startsWith("liop://schema/")?(o.name=`[SCHEMA] ${o.name}`,o.description=`[CRITICAL SCHEMA] ${o.description||"Data Dictionary for Zero-Shot Autonomy"}${u}`):o.description=o.description?`${o.description}${u}`:u.trim(),e.push(o),r.add(t.uri);}return e}resolveManifestTarget(e){for(let[s,{manifest:n}]of this.manifestCache.entries())if(n.tools.find(o=>o.name===e))return {peerId:s,originalToolName:e};let r=e.split("_");if(r.length>1){let s=r.pop(),n=r.join("_");for(let[t,{manifest:o}]of this.manifestCache.entries())if(t.endsWith(s||"")&&o.tools.find(a=>a.name===n))return {peerId:t,originalToolName:n}}return null}redactPeerId(e){return (process.env.LIOP_DIAGNOSTIC_LEVEL||"redacted")==="full"?e:`***${e.slice(-8)}`}async transcodeMcpToLiop(e,r){let s=r.name;if(s==="LiopMeshStatus"){this.refreshManifestCache(true).catch(()=>{});let t=this._discoveryStats||{candidates:0,success:0,failures:0},o=this.manifestCache.size,c=this.meshNode?"Active":"Offline",a=Array.from(this.manifestCache.values()).reduce((T,{manifest:k})=>T+k.tools.length,0),u=this.meshNode?this.meshNode.node?.getConnections().length:0,f=this.meshNode&&this.meshNode.config?.bootstrapNodes?this.meshNode.config.bootstrapNodes:[],m=f.length,p=(process.env.LIOP_DIAGNOSTIC_LEVEL||"redacted")!=="minimal",l=p?f.map(T=>{let k=T.split("/"),L=k[k.length-1];return ` \u2022 ${L?L.slice(-8):"Unknown"} (bootstrap)`}).join(`
24
+ `):"",d=this.meshNode?this.meshNode.getRoutingTableSize():0,g=this.meshNode?.getPeerId()||"Offline",P=g==="Offline"?g:this.redactPeerId(g),S=Array.from(this.manifestCache.entries()).flatMap(([T,{manifest:k}])=>k.tools.map(L=>` \u2022 ${L.name} (from origin: ${this.redactPeerId(T)})`)).join(`
25
+ `),v=[`LIOP Mesh Status: ${c==="Active"?"Active":"Offline"}`,`Local Agent Identity: ${P}`,`Network: ${u} Conns | ${d} Mesh Nodes | ${m} Bootstraps`,p&&m>0?`
26
+ Active Bootstraps:
27
+ ${l}
28
+ `:"",`Discovery: ${t.candidates} Candidates | ${t.success} OK | ${t.failures} FAIL`,`Tooling: ${o} Providers | ${a} Total Remote Tools`,a>0?`
29
+ Discovered Remote Tools (Zero-Trust Origins):
30
+ ${S}`:`
31
+ No remote tools discovered yet.`,I.getInstance().formatStatusBlock()].filter(T=>T!=="").join(`
32
+ `),O=I.getInstance();return O.record({type:"diagnostic",method:"tools/call",toolName:"LiopMeshStatus",estimatedInputTokens:0,estimatedOutputTokens:O.countTokens(v)}),{jsonrpc:"2.0",id:e,result:{content:[{type:"text",text:v}]}}}let n=this.liopServer.listTools().some(t=>t.name===s);if(!n&&this.meshNode){let t=this.resolveManifestTarget(s);if(t||(await this.refreshManifestCache(),t=this.resolveManifestTarget(s)),t)return a.info(`[LIOP-Router] Resolved ${s} via manifest cache (Peer: ${t.peerId}, Original: ${t.originalToolName})`),this.routeToRemoteProvider(e,t.originalToolName,t.peerId,r);let o=[];for(let c=0;c<3&&(o=await this.meshNode.findProviders(s),!(o.length>0));c++)c<2&&await new Promise(a=>setTimeout(a,1e3));if(o.length>0)return this.routeToRemoteProvider(e,s,o[0],r)}if(n)try{let t=Date.now(),o=await this.liopServer.callTool({name:s,arguments:r.arguments||{}}),c=I.getInstance(),a=JSON.stringify(r.arguments||{}),u=JSON.stringify(o);return c.record({type:"tool_call",method:"tools/call",toolName:s,estimatedInputTokens:c.countTokens(a),estimatedOutputTokens:c.countTokens(u),durationMs:Date.now()-t}),{jsonrpc:"2.0",id:e,result:o}}catch(t){return {jsonrpc:"2.0",id:e,error:{code:-32e3,message:t instanceof Error?t.message:String(t)}}}return {jsonrpc:"2.0",id:e,error:{code:-32002,message:`No provider found for tool: ${s}. Ensure the provider node is active and connected to the mesh.`}}}async routeToRemoteProvider(e,r,s,n){if(!this.meshNode)return {jsonrpc:"2.0",id:e,error:{code:-32603,message:"Mesh Node inactive"}};let t=this.manifestCache.get(s),o=this.defaultRpcPort;if(t)o=t.manifest.grpcPort;else {let i=await this.meshNode.queryManifest(s);i&&(o=i.grpcPort,this.manifestCache.set(s,{manifest:i,cachedAt:Date.now()}),t=this.manifestCache.get(s));}if(t&&process.env.LIOP_USE_PUBLISHED_GRPC_PORTS==="1"){let i=t.manifest.serverInfo?.name?.toLowerCase()||"";i.includes("vault")?o=13011:i.includes("bank")?o=13021:i.includes("oracle")&&(o=13031);}let c$1=await this.meshNode.resolvePeer(s),a$1=null,u=await import('os'),f=Object.values(u.networkInterfaces()).flat().filter(i=>i?.family==="IPv4").map(i=>i?.address);for(let i of c$1){let p=i.split("/"),l=p.indexOf("ip4");if(l!==-1){let d=p[l+1];if(d==="127.0.0.1"||f.includes(d)){a$1=`127.0.0.1:${o}`;break}a$1||(a$1=`${d}:${o}`);}}a$1||(a$1=`127.0.0.1:${o}`),a.info(`[LIOP-Router] Dynamic route: ${r} -> ${a$1} (PeerID: ${s})`);let m=new a$2.LogicMesh(a$1,c());return this.performTranscoding(e,m,r,n,s)}async performTranscoding(e,r,s,n,t){let o=s,c=this.meshNode?await this.meshNode.sign(Buffer.from(o)):Buffer.from([]),a=Date.now();return new Promise(u=>{r.negotiateIntent({agent_did:`did:liop:${this.meshNode?.getPeerId()||"mcp-proxy"}`,capability_hash:o,proof_of_intent:c},async(f,m)=>{if(f||!m.accepted)return u({jsonrpc:"2.0",id:e,result:{content:[{type:"text",text:`PQC Handshake Failed: ${f?.message||"Rejected"}`}],isError:true}});let{ciphertext:i,sharedSecret:p}=await a$3.encapsulateAsymmetric(m.kyber_public_key),l=JSON.stringify(n.arguments||{}),d=`return { "__liop_proxy_tool": "${s}", "__liop_proxy_args": ${l} };`,g=N.randomBytes(12),P=this.encryptWithNonce(Buffer.from(d),p,g),S=r.executeLogic({session_token:m.session_token,wasm_binary:new Uint8Array(P),inputs:{},pqc_ciphertext:i,aes_nonce:g}),v="",O=null;S.on("data",T=>{v+=T.semantic_evidence,O=T;}),S.on("end",async()=>{try{if(O&&!await this.verifier.verifyZkReceipt(Buffer.from(d),Buffer.from(O.cryptographic_proof).toString("hex"),Buffer.from(O.zk_receipt)))return u({jsonrpc:"2.0",id:e,result:{content:[{type:"text",text:"SECURITY ALERT: Remote response failed cryptographic integrity audit."}],isError:!0}});let T=JSON.parse(v),k=I.getInstance();k.record({type:"tool_call",method:"tools/call",toolName:s,peerId:t,estimatedInputTokens:k.countTokens(l),estimatedOutputTokens:k.countTokens(v),durationMs:Date.now()-a}),u({jsonrpc:"2.0",id:e,result:T});}catch{u({jsonrpc:"2.0",id:e,result:{content:[{type:"text",text:v}]}});}}),S.on("error",T=>u({jsonrpc:"2.0",id:e,result:{content:[{type:"text",text:`LIOP gRPC Error: ${T.message}`}],isError:true}}));});})}encryptWithNonce(e,r,s){let n=N.createCipheriv("aes-256-gcm",r,s),t=Buffer.concat([n.update(e),n.final()]);return Buffer.concat([t,n.getAuthTag()])}};export{C as a,R as b,B as c,U as d,E as e,I as f,F as g};//# sourceMappingURL=chunk-4ABAFG44.js.map
33
+ //# sourceMappingURL=chunk-4ABAFG44.js.map