@probelabs/visor 0.1.152 → 0.1.153-ee
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/config.d.ts.map +1 -1
- package/dist/docs/ai-configuration.md +4 -4
- package/dist/docs/sandbox-engines.md +53 -5
- package/dist/examples/ai-with-bash.yaml +2 -2
- package/dist/examples/sandbox-bind-paths.yaml +31 -0
- package/dist/examples/sandbox-host-workdir.yaml +27 -0
- package/dist/examples/workflow-sandbox.yaml +43 -0
- package/dist/generated/config-schema.d.ts +38 -8
- package/dist/generated/config-schema.d.ts.map +1 -1
- package/dist/generated/config-schema.json +40 -8
- package/dist/index.js +1987 -58
- package/dist/sandbox/bubblewrap-sandbox.d.ts.map +1 -1
- package/dist/sandbox/check-runner.d.ts.map +1 -1
- package/dist/sandbox/docker-image-sandbox.d.ts.map +1 -1
- package/dist/sandbox/seatbelt-sandbox.d.ts.map +1 -1
- package/dist/sandbox/types.d.ts +13 -0
- package/dist/sandbox/types.d.ts.map +1 -1
- package/dist/scheduler/schedule-tool.d.ts +2 -0
- package/dist/scheduler/schedule-tool.d.ts.map +1 -1
- package/dist/sdk/{check-provider-registry-QBURXJ6B.mjs → check-provider-registry-XZE5PRSE.mjs} +3 -3
- package/dist/sdk/{check-provider-registry-DCZR46KQ.mjs → check-provider-registry-ZOGNKTC3.mjs} +3 -3
- package/dist/sdk/{chunk-FYK2DJK6.mjs → chunk-CPYQDJ27.mjs} +86 -26
- package/dist/sdk/chunk-CPYQDJ27.mjs.map +1 -0
- package/dist/sdk/{chunk-XJZKNTKZ.mjs → chunk-DXNWUIAN.mjs} +132 -93
- package/dist/sdk/chunk-DXNWUIAN.mjs.map +1 -0
- package/dist/sdk/{chunk-QRR6OJQN.mjs → chunk-EYQWEVZF.mjs} +130 -91
- package/dist/sdk/chunk-EYQWEVZF.mjs.map +1 -0
- package/dist/sdk/{config-MTEIGCOQ.mjs → config-SW3VO4DQ.mjs} +2 -2
- package/dist/sdk/{host-WNCX3MPT.mjs → host-X7ID5EW7.mjs} +2 -2
- package/dist/sdk/knex-store-CRORFJE6.mjs +527 -0
- package/dist/sdk/knex-store-CRORFJE6.mjs.map +1 -0
- package/dist/sdk/loader-NJCF7DUS.mjs +89 -0
- package/dist/sdk/loader-NJCF7DUS.mjs.map +1 -0
- package/dist/sdk/opa-policy-engine-S2S2ULEI.mjs +655 -0
- package/dist/sdk/opa-policy-engine-S2S2ULEI.mjs.map +1 -0
- package/dist/sdk/{schedule-tool-IJC2TSKU.mjs → schedule-tool-74VMD77T.mjs} +3 -3
- package/dist/sdk/{schedule-tool-62XTFB6K.mjs → schedule-tool-WSZKJUNQ.mjs} +3 -3
- package/dist/sdk/{schedule-tool-handler-5K275UT6.mjs → schedule-tool-handler-EOQBRZSD.mjs} +3 -3
- package/dist/sdk/{schedule-tool-handler-T4L2ECBA.mjs → schedule-tool-handler-Q7E5NBHS.mjs} +3 -3
- package/dist/sdk/sdk.d.mts +15 -2
- package/dist/sdk/sdk.d.ts +15 -2
- package/dist/sdk/sdk.js +1765 -292
- package/dist/sdk/sdk.js.map +1 -1
- package/dist/sdk/sdk.mjs +5 -5
- package/dist/sdk/validator-XTZJZZJH.mjs +134 -0
- package/dist/sdk/validator-XTZJZZJH.mjs.map +1 -0
- package/dist/sdk/{workflow-check-provider-6TEZHBZJ.mjs → workflow-check-provider-GIW4WECT.mjs} +3 -3
- package/dist/sdk/{workflow-check-provider-FONJYRMR.mjs → workflow-check-provider-JHHACJHF.mjs} +3 -3
- package/dist/state-machine/workflow-projection.d.ts.map +1 -1
- package/dist/types/config.d.ts +2 -2
- package/dist/types/config.d.ts.map +1 -1
- package/dist/types/workflow.d.ts +8 -0
- package/dist/types/workflow.d.ts.map +1 -1
- package/package.json +1 -1
- package/dist/output/traces/run-2026-03-04T06-46-24-105Z.ndjson +0 -138
- package/dist/output/traces/run-2026-03-04T06-47-08-884Z.ndjson +0 -2197
- package/dist/sdk/check-provider-registry-VY5ZZAEU.mjs +0 -29
- package/dist/sdk/chunk-6VQ73GYD.mjs +0 -443
- package/dist/sdk/chunk-6VQ73GYD.mjs.map +0 -1
- package/dist/sdk/chunk-FP3RZSLW.mjs +0 -739
- package/dist/sdk/chunk-FP3RZSLW.mjs.map +0 -1
- package/dist/sdk/chunk-FYK2DJK6.mjs.map +0 -1
- package/dist/sdk/chunk-LLVVHYIP.mjs +0 -1502
- package/dist/sdk/chunk-LLVVHYIP.mjs.map +0 -1
- package/dist/sdk/chunk-PCI4FXAO.mjs +0 -43715
- package/dist/sdk/chunk-PCI4FXAO.mjs.map +0 -1
- package/dist/sdk/chunk-QRR6OJQN.mjs.map +0 -1
- package/dist/sdk/chunk-XJZKNTKZ.mjs.map +0 -1
- package/dist/sdk/failure-condition-evaluator-TV227HAG.mjs +0 -17
- package/dist/sdk/github-frontend-YLSS5NQ7.mjs +0 -1368
- package/dist/sdk/github-frontend-YLSS5NQ7.mjs.map +0 -1
- package/dist/sdk/routing-FKWK5BHS.mjs +0 -25
- package/dist/sdk/schedule-tool-VOZ536P4.mjs +0 -35
- package/dist/sdk/schedule-tool-handler-5K275UT6.mjs.map +0 -1
- package/dist/sdk/schedule-tool-handler-T4L2ECBA.mjs.map +0 -1
- package/dist/sdk/schedule-tool-handler-WBIZSBGJ.mjs +0 -39
- package/dist/sdk/schedule-tool-handler-WBIZSBGJ.mjs.map +0 -1
- package/dist/sdk/trace-helpers-W33WMBL7.mjs +0 -25
- package/dist/sdk/trace-helpers-W33WMBL7.mjs.map +0 -1
- package/dist/sdk/workflow-check-provider-6TEZHBZJ.mjs.map +0 -1
- package/dist/sdk/workflow-check-provider-FONJYRMR.mjs.map +0 -1
- package/dist/sdk/workflow-check-provider-LREOGGTH.mjs +0 -29
- package/dist/sdk/workflow-check-provider-LREOGGTH.mjs.map +0 -1
- package/dist/traces/run-2026-03-04T06-46-24-105Z.ndjson +0 -138
- package/dist/traces/run-2026-03-04T06-47-08-884Z.ndjson +0 -2197
- /package/dist/sdk/{check-provider-registry-DCZR46KQ.mjs.map → check-provider-registry-XZE5PRSE.mjs.map} +0 -0
- /package/dist/sdk/{check-provider-registry-QBURXJ6B.mjs.map → check-provider-registry-ZOGNKTC3.mjs.map} +0 -0
- /package/dist/sdk/{check-provider-registry-VY5ZZAEU.mjs.map → config-SW3VO4DQ.mjs.map} +0 -0
- /package/dist/sdk/{host-WNCX3MPT.mjs.map → host-X7ID5EW7.mjs.map} +0 -0
- /package/dist/sdk/{config-MTEIGCOQ.mjs.map → schedule-tool-74VMD77T.mjs.map} +0 -0
- /package/dist/sdk/{failure-condition-evaluator-TV227HAG.mjs.map → schedule-tool-WSZKJUNQ.mjs.map} +0 -0
- /package/dist/sdk/{routing-FKWK5BHS.mjs.map → schedule-tool-handler-EOQBRZSD.mjs.map} +0 -0
- /package/dist/sdk/{schedule-tool-62XTFB6K.mjs.map → schedule-tool-handler-Q7E5NBHS.mjs.map} +0 -0
- /package/dist/sdk/{schedule-tool-IJC2TSKU.mjs.map → workflow-check-provider-GIW4WECT.mjs.map} +0 -0
- /package/dist/sdk/{schedule-tool-VOZ536P4.mjs.map → workflow-check-provider-JHHACJHF.mjs.map} +0 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/enterprise/policy/opa-compiler.ts","../../src/enterprise/policy/opa-wasm-evaluator.ts","../../src/enterprise/policy/opa-http-evaluator.ts","../../src/enterprise/policy/policy-input-builder.ts","../../src/enterprise/policy/opa-policy-engine.ts"],"sourcesContent":["/**\n * Copyright (c) ProbeLabs. All rights reserved.\n * Licensed under the Elastic License 2.0; you may not use this file except\n * in compliance with the Elastic License 2.0.\n */\n\nimport * as fs from 'fs';\nimport * as path from 'path';\nimport * as os from 'os';\nimport * as crypto from 'crypto';\nimport { execFileSync } from 'child_process';\n\n/**\n * OPA Rego Compiler - compiles .rego policy files to WASM bundles using the `opa` CLI.\n *\n * Handles:\n * - Resolving input paths to WASM bytes (direct .wasm, directory with policy.wasm, or .rego files)\n * - Compiling .rego files to WASM via `opa build`\n * - Caching compiled bundles based on content hashes\n * - Extracting policy.wasm from OPA tar.gz bundles\n *\n * Requires:\n * - `opa` CLI on PATH (only when auto-compiling .rego files)\n */\nexport class OpaCompiler {\n private static CACHE_DIR = path.join(os.tmpdir(), 'visor-opa-cache');\n\n /**\n * Resolve the input paths to WASM bytes.\n *\n * Strategy:\n * 1. If any path is a .wasm file, read it directly\n * 2. If a directory contains policy.wasm, read it\n * 3. Otherwise, collect all .rego files and auto-compile via `opa build`\n */\n async resolveWasmBytes(paths: string[]): Promise<Buffer> {\n // Collect .rego files and check for existing .wasm\n const regoFiles: string[] = [];\n\n for (const p of paths) {\n const resolved = path.resolve(p);\n // Reject paths containing '..' after resolution (path traversal)\n if (path.normalize(resolved).includes('..')) {\n throw new Error(`Policy path contains traversal sequences: ${p}`);\n }\n\n // Direct .wasm file\n if (resolved.endsWith('.wasm') && fs.existsSync(resolved)) {\n return fs.readFileSync(resolved);\n }\n\n if (!fs.existsSync(resolved)) continue;\n const stat = fs.statSync(resolved);\n\n if (stat.isDirectory()) {\n // Check for pre-compiled policy.wasm in directory\n const wasmCandidate = path.join(resolved, 'policy.wasm');\n if (fs.existsSync(wasmCandidate)) {\n return fs.readFileSync(wasmCandidate);\n }\n // Collect all .rego files from directory\n const files = fs.readdirSync(resolved);\n for (const f of files) {\n if (f.endsWith('.rego')) {\n regoFiles.push(path.join(resolved, f));\n }\n }\n } else if (resolved.endsWith('.rego')) {\n regoFiles.push(resolved);\n }\n }\n\n if (regoFiles.length === 0) {\n throw new Error(\n `OPA WASM evaluator: no .wasm bundle or .rego files found in: ${paths.join(', ')}`\n );\n }\n\n // Auto-compile .rego -> .wasm\n return this.compileRego(regoFiles);\n }\n\n /**\n * Auto-compile .rego files to a WASM bundle using the `opa` CLI.\n *\n * Caches the compiled bundle based on a content hash of all input .rego files\n * so subsequent runs skip compilation if policies haven't changed.\n */\n private compileRego(regoFiles: string[]): Buffer {\n // Check that `opa` CLI is available\n try {\n execFileSync('opa', ['version'], { stdio: 'pipe' });\n } catch {\n throw new Error(\n 'OPA CLI (`opa`) not found on PATH. Install it from https://www.openpolicyagent.org/docs/latest/#running-opa\\n' +\n 'Or pre-compile your .rego files: opa build -t wasm -e visor -o bundle.tar.gz ' +\n regoFiles.join(' ')\n );\n }\n\n // Compute content hash for cache key\n const hash = crypto.createHash('sha256');\n for (const f of regoFiles.sort()) {\n hash.update(fs.readFileSync(f));\n hash.update(f); // include filename for disambiguation\n }\n const cacheKey = hash.digest('hex').slice(0, 16);\n const cacheDir = OpaCompiler.CACHE_DIR;\n const cachedWasm = path.join(cacheDir, `${cacheKey}.wasm`);\n\n // Return cached bundle if still valid\n if (fs.existsSync(cachedWasm)) {\n return fs.readFileSync(cachedWasm);\n }\n\n // Compile to WASM via opa build\n fs.mkdirSync(cacheDir, { recursive: true });\n const bundleTar = path.join(cacheDir, `${cacheKey}-bundle.tar.gz`);\n\n try {\n const args = [\n 'build',\n '-t',\n 'wasm',\n '-e',\n 'visor', // entrypoint: the visor package tree\n '-o',\n bundleTar,\n ...regoFiles,\n ];\n execFileSync('opa', args, {\n stdio: 'pipe',\n timeout: 30000,\n });\n } catch (err: any) {\n const stderr = err?.stderr?.toString() || '';\n throw new Error(\n `Failed to compile .rego files to WASM:\\n${stderr}\\n` +\n 'Ensure your .rego files are valid and the `opa` CLI is installed.'\n );\n }\n\n // Extract policy.wasm from the tar.gz bundle\n // OPA bundles are tar.gz with /policy.wasm inside\n try {\n execFileSync('tar', ['-xzf', bundleTar, '-C', cacheDir, '/policy.wasm'], {\n stdio: 'pipe',\n });\n const extractedWasm = path.join(cacheDir, 'policy.wasm');\n if (fs.existsSync(extractedWasm)) {\n // Move to cache-key named file\n fs.renameSync(extractedWasm, cachedWasm);\n }\n } catch {\n // Some tar implementations don't like leading /\n try {\n execFileSync('tar', ['-xzf', bundleTar, '-C', cacheDir, 'policy.wasm'], {\n stdio: 'pipe',\n });\n const extractedWasm = path.join(cacheDir, 'policy.wasm');\n if (fs.existsSync(extractedWasm)) {\n fs.renameSync(extractedWasm, cachedWasm);\n }\n } catch (err2: any) {\n throw new Error(`Failed to extract policy.wasm from OPA bundle: ${err2?.message || err2}`);\n }\n }\n\n // Clean up tar\n try {\n fs.unlinkSync(bundleTar);\n } catch {}\n\n if (!fs.existsSync(cachedWasm)) {\n throw new Error('OPA build succeeded but policy.wasm was not found in the bundle');\n }\n\n return fs.readFileSync(cachedWasm);\n }\n}\n","/**\n * Copyright (c) ProbeLabs. All rights reserved.\n * Licensed under the Elastic License 2.0; you may not use this file except\n * in compliance with the Elastic License 2.0.\n */\n\nimport * as fs from 'fs';\nimport * as path from 'path';\nimport { OpaCompiler } from './opa-compiler';\n\n/**\n * OPA WASM Evaluator - loads and evaluates OPA policies locally.\n *\n * Supports three input formats:\n * 1. Pre-compiled `.wasm` bundle — loaded directly (fastest startup)\n * 2. `.rego` files or directory — auto-compiled to WASM via `opa build` CLI\n * 3. Directory with `policy.wasm` inside — loaded directly\n *\n * Compilation and caching of .rego files is delegated to {@link OpaCompiler}.\n *\n * Requires:\n * - `@open-policy-agent/opa-wasm` npm package (optional dep)\n * - `opa` CLI on PATH (only when auto-compiling .rego files)\n */\nexport class OpaWasmEvaluator {\n private policy: any = null;\n private dataDocument: object = {};\n private compiler: OpaCompiler = new OpaCompiler();\n\n async initialize(rulesPath: string | string[]): Promise<void> {\n const paths = Array.isArray(rulesPath) ? rulesPath : [rulesPath];\n const wasmBytes = await this.compiler.resolveWasmBytes(paths);\n\n try {\n // Use createRequire to load the optional dep at runtime without ncc bundling it.\n // `new Function('id', 'return require(id)')` fails in ncc bundles because\n // `require` is not in the `new Function` scope. `createRequire` works correctly\n // because it creates a real Node.js require rooted at the given path.\n // eslint-disable-next-line @typescript-eslint/no-var-requires\n const { createRequire } = require('module') as typeof import('module');\n const runtimeRequire = createRequire(__filename);\n const opaWasm = runtimeRequire('@open-policy-agent/opa-wasm');\n const loadPolicy = opaWasm.loadPolicy || opaWasm.default?.loadPolicy;\n if (!loadPolicy) {\n throw new Error('loadPolicy not found in @open-policy-agent/opa-wasm');\n }\n this.policy = await loadPolicy(wasmBytes);\n } catch (err: any) {\n if (err?.code === 'MODULE_NOT_FOUND' || err?.code === 'ERR_MODULE_NOT_FOUND') {\n throw new Error(\n 'OPA WASM evaluator requires @open-policy-agent/opa-wasm. ' +\n 'Install it with: npm install @open-policy-agent/opa-wasm'\n );\n }\n throw err;\n }\n }\n\n /**\n * Load external data from a JSON file to use as the OPA data document.\n * The loaded data will be passed to `policy.setData()` during evaluation,\n * making it available in Rego via `data.<key>`.\n */\n loadData(dataPath: string): void {\n const resolved = path.resolve(dataPath);\n if (path.normalize(resolved).includes('..')) {\n throw new Error(`Data path contains traversal sequences: ${dataPath}`);\n }\n if (!fs.existsSync(resolved)) {\n throw new Error(`OPA data file not found: ${resolved}`);\n }\n const stat = fs.statSync(resolved);\n if (stat.size > 10 * 1024 * 1024) {\n throw new Error(`OPA data file exceeds 10MB limit: ${resolved} (${stat.size} bytes)`);\n }\n const raw = fs.readFileSync(resolved, 'utf-8');\n try {\n const parsed = JSON.parse(raw);\n if (typeof parsed !== 'object' || parsed === null || Array.isArray(parsed)) {\n throw new Error('OPA data file must contain a JSON object (not an array or primitive)');\n }\n this.dataDocument = parsed;\n } catch (err: any) {\n if (err.message.startsWith('OPA data file must')) {\n throw err;\n }\n throw new Error(`Failed to parse OPA data file ${resolved}: ${err.message}`);\n }\n }\n\n async evaluate(input: object): Promise<any> {\n if (!this.policy) {\n throw new Error('OPA WASM evaluator not initialized');\n }\n\n this.policy.setData(this.dataDocument);\n const resultSet = this.policy.evaluate(input);\n\n if (Array.isArray(resultSet) && resultSet.length > 0) {\n return resultSet[0].result;\n }\n return undefined;\n }\n\n async shutdown(): Promise<void> {\n if (this.policy) {\n // opa-wasm policy objects may have a close/free method for WASM cleanup\n if (typeof this.policy.close === 'function') {\n try {\n this.policy.close();\n } catch {}\n } else if (typeof this.policy.free === 'function') {\n try {\n this.policy.free();\n } catch {}\n }\n }\n this.policy = null;\n }\n}\n","/**\n * Copyright (c) ProbeLabs. All rights reserved.\n * Licensed under the Elastic License 2.0; you may not use this file except\n * in compliance with the Elastic License 2.0.\n */\n\n/**\n * OPA HTTP Evaluator - evaluates policies via an external OPA server's REST API.\n *\n * Uses the built-in `fetch` API (Node 18+), so no extra dependencies are needed.\n */\nexport class OpaHttpEvaluator {\n private baseUrl: string;\n private timeout: number;\n\n constructor(baseUrl: string, timeout: number = 5000) {\n // Validate URL format and protocol\n let parsed: URL;\n try {\n parsed = new URL(baseUrl);\n } catch {\n throw new Error(`OPA HTTP evaluator: invalid URL: ${baseUrl}`);\n }\n if (!['http:', 'https:'].includes(parsed.protocol)) {\n throw new Error(\n `OPA HTTP evaluator: url must use http:// or https:// protocol, got: ${baseUrl}`\n );\n }\n // Block cloud metadata, loopback, link-local, and private network addresses\n const hostname = parsed.hostname;\n if (this.isBlockedHostname(hostname)) {\n throw new Error(\n `OPA HTTP evaluator: url must not point to internal, loopback, or private network addresses`\n );\n }\n // Normalize: strip trailing slash\n this.baseUrl = baseUrl.replace(/\\/+$/, '');\n this.timeout = timeout;\n }\n\n /**\n * Check if a hostname is blocked due to SSRF concerns.\n *\n * Blocks:\n * - Loopback addresses (127.x.x.x, localhost, 0.0.0.0, ::1)\n * - Link-local addresses (169.254.x.x)\n * - Private networks (10.x.x.x, 172.16-31.x.x, 192.168.x.x)\n * - IPv6 unique local addresses (fd00::/8)\n * - Cloud metadata services (*.internal)\n */\n private isBlockedHostname(hostname: string): boolean {\n if (!hostname) return true; // block empty hostnames\n\n // Normalize hostname: lowercase and remove brackets for IPv6\n const normalized = hostname.toLowerCase().replace(/^\\[|\\]$/g, '');\n\n // Block .internal domains (cloud metadata services)\n if (normalized === 'metadata.google.internal' || normalized.endsWith('.internal')) {\n return true;\n }\n\n // Block localhost variants\n if (normalized === 'localhost' || normalized === 'localhost.localdomain') {\n return true;\n }\n\n // Block IPv6 loopback\n if (normalized === '::1' || normalized === '0:0:0:0:0:0:0:1') {\n return true;\n }\n\n // Check IPv4 patterns\n const ipv4Pattern = /^(\\d{1,3})\\.(\\d{1,3})\\.(\\d{1,3})\\.(\\d{1,3})$/;\n const ipv4Match = normalized.match(ipv4Pattern);\n if (ipv4Match) {\n const octets = ipv4Match.slice(1, 5).map(Number);\n\n // Validate octets are in range [0, 255]\n if (octets.some(octet => octet > 255)) {\n return false;\n }\n\n const [a, b] = octets;\n\n // Block loopback: 127.0.0.0/8\n if (a === 127) {\n return true;\n }\n\n // Block 0.0.0.0/8 (this host)\n if (a === 0) {\n return true;\n }\n\n // Block link-local: 169.254.0.0/16\n if (a === 169 && b === 254) {\n return true;\n }\n\n // Block private networks\n // 10.0.0.0/8\n if (a === 10) {\n return true;\n }\n // 172.16.0.0/12 (172.16.x.x through 172.31.x.x)\n if (a === 172 && b >= 16 && b <= 31) {\n return true;\n }\n // 192.168.0.0/16\n if (a === 192 && b === 168) {\n return true;\n }\n }\n\n // Check IPv6 patterns\n // Block unique local addresses: fd00::/8\n if (normalized.startsWith('fd') || normalized.startsWith('fc')) {\n return true;\n }\n // Block link-local: fe80::/10\n if (normalized.startsWith('fe80:')) {\n return true;\n }\n\n return false;\n }\n\n /**\n * Evaluate a policy rule against an input document via OPA REST API.\n *\n * @param input - The input document to evaluate\n * @param rulePath - OPA rule path (e.g., 'visor/check/execute')\n * @returns The result object from OPA, or undefined on error\n */\n async evaluate(input: object, rulePath: string): Promise<any> {\n // OPA Data API: POST /v1/data/<path>\n const encodedPath = rulePath\n .split('/')\n .map(s => encodeURIComponent(s))\n .join('/');\n const url = `${this.baseUrl}/v1/data/${encodedPath}`;\n\n const controller = new AbortController();\n const timer = setTimeout(() => controller.abort(), this.timeout);\n\n try {\n const response = await fetch(url, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({ input }),\n signal: controller.signal,\n });\n\n if (!response.ok) {\n throw new Error(`OPA HTTP ${response.status}: ${response.statusText}`);\n }\n\n let body: unknown;\n try {\n body = await response.json();\n } catch (jsonErr) {\n throw new Error(\n `OPA HTTP evaluator: failed to parse JSON response: ${jsonErr instanceof Error ? jsonErr.message : String(jsonErr)}`\n );\n }\n // OPA returns { result: { ... } }\n return (body as any)?.result;\n } finally {\n clearTimeout(timer);\n }\n }\n\n async shutdown(): Promise<void> {\n // No persistent connections to close\n }\n}\n","/**\n * Copyright (c) ProbeLabs. All rights reserved.\n * Licensed under the Elastic License 2.0; you may not use this file except\n * in compliance with the Elastic License 2.0.\n */\n\nimport type { PolicyConfig, PolicyRoleConfig, StepPolicyOverride } from '../../policy/types';\n\n/**\n * OPA input document shape (internal to enterprise code).\n * This mirrors what OPA .rego rules expect — OSS code never sees this type.\n */\nexport interface OpaInput {\n scope: string;\n check?: {\n id: string;\n type: string;\n group?: string;\n tags?: string[];\n criticality?: string;\n sandbox?: string;\n policy?: StepPolicyOverride;\n };\n tool?: {\n serverName: string;\n methodName: string;\n transport?: string;\n };\n capability?: {\n allowEdit?: boolean;\n allowBash?: boolean;\n allowedTools?: string[];\n enableDelegate?: boolean;\n enableExecutePlan?: boolean;\n sandbox?: string;\n };\n actor: {\n authorAssociation?: string;\n login?: string;\n roles: string[];\n isLocalMode: boolean;\n slack?: {\n userId?: string;\n email?: string;\n channelId?: string;\n channelType?: 'channel' | 'dm' | 'group';\n };\n };\n repository?: {\n owner?: string;\n name?: string;\n branch?: string;\n baseBranch?: string;\n event?: string;\n action?: string;\n };\n pullRequest?: {\n number?: number;\n labels?: string[];\n draft?: boolean;\n changedFiles?: number;\n };\n}\n\nexport interface ActorContext {\n authorAssociation?: string;\n login?: string;\n isLocalMode: boolean;\n slack?: {\n userId?: string;\n email?: string;\n channelId?: string;\n channelType?: 'channel' | 'dm' | 'group';\n };\n}\n\nexport interface RepositoryContext {\n owner?: string;\n name?: string;\n branch?: string;\n baseBranch?: string;\n event?: string;\n action?: string;\n}\n\nexport interface PullRequestContext {\n number?: number;\n labels?: string[];\n draft?: boolean;\n changedFiles?: number;\n}\n\nexport interface CheckContext {\n id: string;\n type: string;\n group?: string;\n tags?: string[];\n criticality?: string;\n sandbox?: string;\n policy?: StepPolicyOverride;\n}\n\n/**\n * Builds OPA-compatible input documents from engine context.\n *\n * Resolves actor roles from the `policy.roles` config section by matching\n * the actor's authorAssociation and login against role definitions.\n */\nexport class PolicyInputBuilder {\n private roles: Record<string, PolicyRoleConfig>;\n private actor: ActorContext;\n private repository?: RepositoryContext;\n private pullRequest?: PullRequestContext;\n\n constructor(\n policyConfig: PolicyConfig,\n actor: ActorContext,\n repository?: RepositoryContext,\n pullRequest?: PullRequestContext\n ) {\n this.roles = policyConfig.roles || {};\n this.actor = actor;\n this.repository = repository;\n this.pullRequest = pullRequest;\n }\n\n /** Resolve which roles apply to the current actor. */\n resolveRoles(): string[] {\n const matched: string[] = [];\n\n for (const [roleName, roleConfig] of Object.entries(this.roles)) {\n let identityMatch = false;\n\n if (\n roleConfig.author_association &&\n this.actor.authorAssociation &&\n roleConfig.author_association.includes(this.actor.authorAssociation)\n ) {\n identityMatch = true;\n }\n\n if (\n !identityMatch &&\n roleConfig.users &&\n this.actor.login &&\n roleConfig.users.includes(this.actor.login)\n ) {\n identityMatch = true;\n }\n\n // Slack user ID match\n if (\n !identityMatch &&\n roleConfig.slack_users &&\n this.actor.slack?.userId &&\n roleConfig.slack_users.includes(this.actor.slack.userId)\n ) {\n identityMatch = true;\n }\n\n // Email match (case-insensitive)\n if (!identityMatch && roleConfig.emails && this.actor.slack?.email) {\n const actorEmail = this.actor.slack.email.toLowerCase();\n if (roleConfig.emails.some(e => e.toLowerCase() === actorEmail)) {\n identityMatch = true;\n }\n }\n\n // Note: teams-based role resolution requires GitHub API access (read:org scope)\n // and is not yet implemented. If configured, the role will not match via teams.\n\n if (!identityMatch) continue;\n\n // slack_channels gate: if set, the role only applies when triggered from one of these channels\n if (roleConfig.slack_channels && roleConfig.slack_channels.length > 0) {\n if (\n !this.actor.slack?.channelId ||\n !roleConfig.slack_channels.includes(this.actor.slack.channelId)\n ) {\n continue;\n }\n }\n\n matched.push(roleName);\n }\n\n return matched;\n }\n\n private buildActor() {\n return {\n authorAssociation: this.actor.authorAssociation,\n login: this.actor.login,\n roles: this.resolveRoles(),\n isLocalMode: this.actor.isLocalMode,\n ...(this.actor.slack && { slack: this.actor.slack }),\n };\n }\n\n forCheckExecution(check: CheckContext): OpaInput {\n return {\n scope: 'check.execute',\n check: {\n id: check.id,\n type: check.type,\n group: check.group,\n tags: check.tags,\n criticality: check.criticality,\n sandbox: check.sandbox,\n policy: check.policy,\n },\n actor: this.buildActor(),\n repository: this.repository,\n pullRequest: this.pullRequest,\n };\n }\n\n forToolInvocation(serverName: string, methodName: string, transport?: string): OpaInput {\n return {\n scope: 'tool.invoke',\n tool: { serverName, methodName, transport },\n actor: this.buildActor(),\n repository: this.repository,\n pullRequest: this.pullRequest,\n };\n }\n\n forCapabilityResolve(\n checkId: string,\n capabilities: {\n allowEdit?: boolean;\n allowBash?: boolean;\n allowedTools?: string[];\n enableDelegate?: boolean;\n enableExecutePlan?: boolean;\n sandbox?: string;\n }\n ): OpaInput {\n return {\n scope: 'capability.resolve',\n check: { id: checkId, type: 'ai' },\n capability: capabilities,\n actor: this.buildActor(),\n repository: this.repository,\n pullRequest: this.pullRequest,\n };\n }\n}\n","/**\n * Copyright (c) ProbeLabs. All rights reserved.\n * Licensed under the Elastic License 2.0; you may not use this file except\n * in compliance with the Elastic License 2.0.\n */\n\nimport type {\n PolicyEngine,\n PolicyConfig,\n PolicyDecision,\n StepPolicyOverride,\n} from '../../policy/types';\nimport { OpaWasmEvaluator } from './opa-wasm-evaluator';\nimport { OpaHttpEvaluator } from './opa-http-evaluator';\nimport {\n PolicyInputBuilder,\n type ActorContext,\n type RepositoryContext,\n type PullRequestContext,\n} from './policy-input-builder';\n\n/**\n * Enterprise OPA Policy Engine.\n *\n * Wraps both WASM (local) and HTTP (remote) OPA evaluators behind the\n * OSS PolicyEngine interface. All OPA input building and role resolution\n * is handled internally — the OSS call sites pass only plain types.\n */\nexport class OpaPolicyEngine implements PolicyEngine {\n private evaluator: OpaWasmEvaluator | OpaHttpEvaluator | null = null;\n private fallback: 'allow' | 'deny' | 'warn';\n private timeout: number;\n private config: PolicyConfig;\n private inputBuilder: PolicyInputBuilder | null = null;\n private logger: any = null;\n\n constructor(config: PolicyConfig) {\n this.config = config;\n this.fallback = config.fallback || 'deny';\n this.timeout = config.timeout || 5000;\n }\n\n async initialize(config: PolicyConfig): Promise<void> {\n // Resolve logger once at initialization\n try {\n this.logger = require('../../logger').logger;\n } catch {\n // logger not available in this context\n }\n\n // Build actor/repo context from environment (available at engine init time)\n const actor: ActorContext = {\n authorAssociation: process.env.VISOR_AUTHOR_ASSOCIATION,\n login: process.env.VISOR_AUTHOR_LOGIN || process.env.GITHUB_ACTOR,\n isLocalMode: !process.env.GITHUB_ACTIONS,\n };\n const repo: RepositoryContext = {\n owner: process.env.GITHUB_REPOSITORY_OWNER,\n name: process.env.GITHUB_REPOSITORY?.split('/')[1],\n branch: process.env.GITHUB_HEAD_REF,\n baseBranch: process.env.GITHUB_BASE_REF,\n event: process.env.GITHUB_EVENT_NAME,\n };\n const prNum = process.env.GITHUB_PR_NUMBER\n ? parseInt(process.env.GITHUB_PR_NUMBER, 10)\n : undefined;\n const pullRequest: PullRequestContext = {\n number: prNum !== undefined && Number.isFinite(prNum) ? prNum : undefined,\n };\n this.inputBuilder = new PolicyInputBuilder(config, actor, repo, pullRequest);\n\n if (config.engine === 'local') {\n if (!config.rules) {\n throw new Error('OPA local mode requires `policy.rules` path to .wasm or .rego files');\n }\n const wasm = new OpaWasmEvaluator();\n await wasm.initialize(config.rules);\n if (config.data) {\n wasm.loadData(config.data);\n }\n this.evaluator = wasm;\n } else if (config.engine === 'remote') {\n if (!config.url) {\n throw new Error('OPA remote mode requires `policy.url` pointing to OPA server');\n }\n this.evaluator = new OpaHttpEvaluator(config.url, this.timeout);\n } else {\n this.evaluator = null;\n }\n }\n\n /**\n * Update actor/repo/PR context (e.g., after PR info becomes available).\n * Called by the enterprise loader when engine context is enriched.\n */\n setActorContext(\n actor: ActorContext,\n repo?: RepositoryContext,\n pullRequest?: PullRequestContext\n ): void {\n this.inputBuilder = new PolicyInputBuilder(this.config, actor, repo, pullRequest);\n }\n\n async evaluateCheckExecution(checkId: string, checkConfig: unknown): Promise<PolicyDecision> {\n if (!this.evaluator || !this.inputBuilder) return { allowed: true };\n const cfg =\n checkConfig && typeof checkConfig === 'object'\n ? (checkConfig as Record<string, unknown>)\n : {};\n const policyOverride = cfg.policy as StepPolicyOverride | undefined;\n const input = this.inputBuilder.forCheckExecution({\n id: checkId,\n type: (cfg.type as string) || 'ai',\n group: cfg.group as string | undefined,\n tags: cfg.tags as string[] | undefined,\n criticality: cfg.criticality as string | undefined,\n sandbox: cfg.sandbox as string | undefined,\n policy: policyOverride,\n });\n return this.doEvaluate(input, this.resolveRulePath('check.execute', policyOverride?.rule));\n }\n\n async evaluateToolInvocation(\n serverName: string,\n methodName: string,\n transport?: string\n ): Promise<PolicyDecision> {\n if (!this.evaluator || !this.inputBuilder) return { allowed: true };\n const input = this.inputBuilder.forToolInvocation(serverName, methodName, transport);\n return this.doEvaluate(input, 'visor/tool/invoke');\n }\n\n async evaluateCapabilities(\n checkId: string,\n capabilities: {\n allowEdit?: boolean;\n allowBash?: boolean;\n allowedTools?: string[];\n }\n ): Promise<PolicyDecision> {\n if (!this.evaluator || !this.inputBuilder) return { allowed: true };\n const input = this.inputBuilder.forCapabilityResolve(checkId, capabilities);\n return this.doEvaluate(input, 'visor/capability/resolve');\n }\n\n async shutdown(): Promise<void> {\n if (this.evaluator && 'shutdown' in this.evaluator) {\n await this.evaluator.shutdown();\n }\n this.evaluator = null;\n this.inputBuilder = null;\n }\n\n private resolveRulePath(defaultScope: string, override?: string): string {\n if (override) {\n return override.startsWith('visor/') ? override : `visor/${override}`;\n }\n return `visor/${defaultScope.replace(/\\./g, '/')}`;\n }\n\n private async doEvaluate(input: object, rulePath: string): Promise<PolicyDecision> {\n try {\n this.logger?.debug(`[PolicyEngine] Evaluating ${rulePath}`, JSON.stringify(input));\n let timer: ReturnType<typeof setTimeout> | undefined;\n const timeoutPromise = new Promise<never>((_resolve, reject) => {\n timer = setTimeout(() => reject(new Error('policy evaluation timeout')), this.timeout);\n });\n try {\n const result = await Promise.race([this.rawEvaluate(input, rulePath), timeoutPromise]);\n const decision = this.parseDecision(result);\n // In warn mode, override denied decisions to allowed but flag as warn\n if (!decision.allowed && this.fallback === 'warn') {\n decision.allowed = true;\n decision.warn = true;\n decision.reason = `audit: ${decision.reason || 'policy denied'}`;\n }\n this.logger?.debug(\n `[PolicyEngine] Decision for ${rulePath}: allowed=${decision.allowed}, warn=${decision.warn || false}, reason=${decision.reason || 'none'}`\n );\n return decision;\n } finally {\n if (timer) clearTimeout(timer);\n }\n } catch (err) {\n const msg = err instanceof Error ? err.message : String(err);\n this.logger?.warn(`[PolicyEngine] Evaluation failed for ${rulePath}: ${msg}`);\n return {\n allowed: this.fallback === 'allow' || this.fallback === 'warn',\n warn: this.fallback === 'warn' ? true : undefined,\n reason: `policy evaluation failed, fallback=${this.fallback}`,\n };\n }\n }\n\n private async rawEvaluate(input: object, rulePath: string): Promise<any> {\n if (this.evaluator instanceof OpaWasmEvaluator) {\n const result = await this.evaluator.evaluate(input);\n // WASM compiled with `-e visor` entrypoint returns the full visor package tree.\n // Navigate to the specific rule subtree using rulePath segments.\n // e.g., 'visor/check/execute' → result.check.execute\n return this.navigateWasmResult(result, rulePath);\n }\n return (this.evaluator as OpaHttpEvaluator).evaluate(input, rulePath);\n }\n\n /**\n * Navigate nested OPA WASM result tree to reach the specific rule's output.\n * The WASM entrypoint `-e visor` means the result root IS the visor package,\n * so we strip the `visor/` prefix and walk the remaining segments.\n */\n private navigateWasmResult(result: any, rulePath: string): any {\n if (!result || typeof result !== 'object') return result;\n // Strip the 'visor/' prefix (matches our compilation entrypoint)\n const segments = rulePath.replace(/^visor\\//, '').split('/');\n let current = result;\n for (const seg of segments) {\n if (current && typeof current === 'object' && seg in current) {\n current = current[seg];\n } else {\n return undefined; // path not found in result tree\n }\n }\n return current;\n }\n\n private parseDecision(result: any): PolicyDecision {\n if (result === undefined || result === null) {\n return {\n allowed: this.fallback === 'allow' || this.fallback === 'warn',\n warn: this.fallback === 'warn' ? true : undefined,\n reason: this.fallback === 'warn' ? 'audit: no policy result' : 'no policy result',\n };\n }\n\n const allowed = result.allowed !== false;\n const decision: PolicyDecision = {\n allowed,\n reason: result.reason,\n };\n\n if (result.capabilities) {\n decision.capabilities = result.capabilities;\n }\n\n return decision;\n }\n}\n"],"mappings":";;;;;;;;;;;;AAMA,YAAY,QAAQ;AACpB,YAAY,UAAU;AACtB,YAAY,QAAQ;AACpB,YAAY,YAAY;AACxB,SAAS,oBAAoB;AAV7B,IAwBa;AAxBb;AAAA;AAAA;AAwBO,IAAM,cAAN,MAAM,aAAY;AAAA,MACvB,OAAe,YAAiB,UAAQ,UAAO,GAAG,iBAAiB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,MAUnE,MAAM,iBAAiB,OAAkC;AAEvD,cAAM,YAAsB,CAAC;AAE7B,mBAAW,KAAK,OAAO;AACrB,gBAAM,WAAgB,aAAQ,CAAC;AAE/B,cAAS,eAAU,QAAQ,EAAE,SAAS,IAAI,GAAG;AAC3C,kBAAM,IAAI,MAAM,6CAA6C,CAAC,EAAE;AAAA,UAClE;AAGA,cAAI,SAAS,SAAS,OAAO,KAAQ,cAAW,QAAQ,GAAG;AACzD,mBAAU,gBAAa,QAAQ;AAAA,UACjC;AAEA,cAAI,CAAI,cAAW,QAAQ,EAAG;AAC9B,gBAAM,OAAU,YAAS,QAAQ;AAEjC,cAAI,KAAK,YAAY,GAAG;AAEtB,kBAAM,gBAAqB,UAAK,UAAU,aAAa;AACvD,gBAAO,cAAW,aAAa,GAAG;AAChC,qBAAU,gBAAa,aAAa;AAAA,YACtC;AAEA,kBAAM,QAAW,eAAY,QAAQ;AACrC,uBAAW,KAAK,OAAO;AACrB,kBAAI,EAAE,SAAS,OAAO,GAAG;AACvB,0BAAU,KAAU,UAAK,UAAU,CAAC,CAAC;AAAA,cACvC;AAAA,YACF;AAAA,UACF,WAAW,SAAS,SAAS,OAAO,GAAG;AACrC,sBAAU,KAAK,QAAQ;AAAA,UACzB;AAAA,QACF;AAEA,YAAI,UAAU,WAAW,GAAG;AAC1B,gBAAM,IAAI;AAAA,YACR,gEAAgE,MAAM,KAAK,IAAI,CAAC;AAAA,UAClF;AAAA,QACF;AAGA,eAAO,KAAK,YAAY,SAAS;AAAA,MACnC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,MAQQ,YAAY,WAA6B;AAE/C,YAAI;AACF,uBAAa,OAAO,CAAC,SAAS,GAAG,EAAE,OAAO,OAAO,CAAC;AAAA,QACpD,QAAQ;AACN,gBAAM,IAAI;AAAA,YACR,+LAEE,UAAU,KAAK,GAAG;AAAA,UACtB;AAAA,QACF;AAGA,cAAM,OAAc,kBAAW,QAAQ;AACvC,mBAAW,KAAK,UAAU,KAAK,GAAG;AAChC,eAAK,OAAU,gBAAa,CAAC,CAAC;AAC9B,eAAK,OAAO,CAAC;AAAA,QACf;AACA,cAAM,WAAW,KAAK,OAAO,KAAK,EAAE,MAAM,GAAG,EAAE;AAC/C,cAAM,WAAW,aAAY;AAC7B,cAAM,aAAkB,UAAK,UAAU,GAAG,QAAQ,OAAO;AAGzD,YAAO,cAAW,UAAU,GAAG;AAC7B,iBAAU,gBAAa,UAAU;AAAA,QACnC;AAGA,QAAG,aAAU,UAAU,EAAE,WAAW,KAAK,CAAC;AAC1C,cAAM,YAAiB,UAAK,UAAU,GAAG,QAAQ,gBAAgB;AAEjE,YAAI;AACF,gBAAM,OAAO;AAAA,YACX;AAAA,YACA;AAAA,YACA;AAAA,YACA;AAAA,YACA;AAAA;AAAA,YACA;AAAA,YACA;AAAA,YACA,GAAG;AAAA,UACL;AACA,uBAAa,OAAO,MAAM;AAAA,YACxB,OAAO;AAAA,YACP,SAAS;AAAA,UACX,CAAC;AAAA,QACH,SAAS,KAAU;AACjB,gBAAM,SAAS,KAAK,QAAQ,SAAS,KAAK;AAC1C,gBAAM,IAAI;AAAA,YACR;AAAA,EAA2C,MAAM;AAAA;AAAA,UAEnD;AAAA,QACF;AAIA,YAAI;AACF,uBAAa,OAAO,CAAC,QAAQ,WAAW,MAAM,UAAU,cAAc,GAAG;AAAA,YACvE,OAAO;AAAA,UACT,CAAC;AACD,gBAAM,gBAAqB,UAAK,UAAU,aAAa;AACvD,cAAO,cAAW,aAAa,GAAG;AAEhC,YAAG,cAAW,eAAe,UAAU;AAAA,UACzC;AAAA,QACF,QAAQ;AAEN,cAAI;AACF,yBAAa,OAAO,CAAC,QAAQ,WAAW,MAAM,UAAU,aAAa,GAAG;AAAA,cACtE,OAAO;AAAA,YACT,CAAC;AACD,kBAAM,gBAAqB,UAAK,UAAU,aAAa;AACvD,gBAAO,cAAW,aAAa,GAAG;AAChC,cAAG,cAAW,eAAe,UAAU;AAAA,YACzC;AAAA,UACF,SAAS,MAAW;AAClB,kBAAM,IAAI,MAAM,kDAAkD,MAAM,WAAW,IAAI,EAAE;AAAA,UAC3F;AAAA,QACF;AAGA,YAAI;AACF,UAAG,cAAW,SAAS;AAAA,QACzB,QAAQ;AAAA,QAAC;AAET,YAAI,CAAI,cAAW,UAAU,GAAG;AAC9B,gBAAM,IAAI,MAAM,iEAAiE;AAAA,QACnF;AAEA,eAAU,gBAAa,UAAU;AAAA,MACnC;AAAA,IACF;AAAA;AAAA;;;AC7KA,YAAYA,SAAQ;AACpB,YAAYC,WAAU;AAPtB,IAwBa;AAxBb;AAAA;AAAA;AAQA;AAgBO,IAAM,mBAAN,MAAuB;AAAA,MACpB,SAAc;AAAA,MACd,eAAuB,CAAC;AAAA,MACxB,WAAwB,IAAI,YAAY;AAAA,MAEhD,MAAM,WAAW,WAA6C;AAC5D,cAAM,QAAQ,MAAM,QAAQ,SAAS,IAAI,YAAY,CAAC,SAAS;AAC/D,cAAM,YAAY,MAAM,KAAK,SAAS,iBAAiB,KAAK;AAE5D,YAAI;AAMF,gBAAM,EAAE,cAAc,IAAI,UAAQ,QAAQ;AAC1C,gBAAM,iBAAiB,cAAc,UAAU;AAC/C,gBAAM,UAAU,eAAe,6BAA6B;AAC5D,gBAAM,aAAa,QAAQ,cAAc,QAAQ,SAAS;AAC1D,cAAI,CAAC,YAAY;AACf,kBAAM,IAAI,MAAM,qDAAqD;AAAA,UACvE;AACA,eAAK,SAAS,MAAM,WAAW,SAAS;AAAA,QAC1C,SAAS,KAAU;AACjB,cAAI,KAAK,SAAS,sBAAsB,KAAK,SAAS,wBAAwB;AAC5E,kBAAM,IAAI;AAAA,cACR;AAAA,YAEF;AAAA,UACF;AACA,gBAAM;AAAA,QACR;AAAA,MACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,MAOA,SAAS,UAAwB;AAC/B,cAAM,WAAgB,cAAQ,QAAQ;AACtC,YAAS,gBAAU,QAAQ,EAAE,SAAS,IAAI,GAAG;AAC3C,gBAAM,IAAI,MAAM,2CAA2C,QAAQ,EAAE;AAAA,QACvE;AACA,YAAI,CAAI,eAAW,QAAQ,GAAG;AAC5B,gBAAM,IAAI,MAAM,4BAA4B,QAAQ,EAAE;AAAA,QACxD;AACA,cAAM,OAAU,aAAS,QAAQ;AACjC,YAAI,KAAK,OAAO,KAAK,OAAO,MAAM;AAChC,gBAAM,IAAI,MAAM,qCAAqC,QAAQ,KAAK,KAAK,IAAI,SAAS;AAAA,QACtF;AACA,cAAM,MAAS,iBAAa,UAAU,OAAO;AAC7C,YAAI;AACF,gBAAM,SAAS,KAAK,MAAM,GAAG;AAC7B,cAAI,OAAO,WAAW,YAAY,WAAW,QAAQ,MAAM,QAAQ,MAAM,GAAG;AAC1E,kBAAM,IAAI,MAAM,sEAAsE;AAAA,UACxF;AACA,eAAK,eAAe;AAAA,QACtB,SAAS,KAAU;AACjB,cAAI,IAAI,QAAQ,WAAW,oBAAoB,GAAG;AAChD,kBAAM;AAAA,UACR;AACA,gBAAM,IAAI,MAAM,iCAAiC,QAAQ,KAAK,IAAI,OAAO,EAAE;AAAA,QAC7E;AAAA,MACF;AAAA,MAEA,MAAM,SAAS,OAA6B;AAC1C,YAAI,CAAC,KAAK,QAAQ;AAChB,gBAAM,IAAI,MAAM,oCAAoC;AAAA,QACtD;AAEA,aAAK,OAAO,QAAQ,KAAK,YAAY;AACrC,cAAM,YAAY,KAAK,OAAO,SAAS,KAAK;AAE5C,YAAI,MAAM,QAAQ,SAAS,KAAK,UAAU,SAAS,GAAG;AACpD,iBAAO,UAAU,CAAC,EAAE;AAAA,QACtB;AACA,eAAO;AAAA,MACT;AAAA,MAEA,MAAM,WAA0B;AAC9B,YAAI,KAAK,QAAQ;AAEf,cAAI,OAAO,KAAK,OAAO,UAAU,YAAY;AAC3C,gBAAI;AACF,mBAAK,OAAO,MAAM;AAAA,YACpB,QAAQ;AAAA,YAAC;AAAA,UACX,WAAW,OAAO,KAAK,OAAO,SAAS,YAAY;AACjD,gBAAI;AACF,mBAAK,OAAO,KAAK;AAAA,YACnB,QAAQ;AAAA,YAAC;AAAA,UACX;AAAA,QACF;AACA,aAAK,SAAS;AAAA,MAChB;AAAA,IACF;AAAA;AAAA;;;ACvHA,IAWa;AAXb;AAAA;AAAA;AAWO,IAAM,mBAAN,MAAuB;AAAA,MACpB;AAAA,MACA;AAAA,MAER,YAAY,SAAiB,UAAkB,KAAM;AAEnD,YAAI;AACJ,YAAI;AACF,mBAAS,IAAI,IAAI,OAAO;AAAA,QAC1B,QAAQ;AACN,gBAAM,IAAI,MAAM,oCAAoC,OAAO,EAAE;AAAA,QAC/D;AACA,YAAI,CAAC,CAAC,SAAS,QAAQ,EAAE,SAAS,OAAO,QAAQ,GAAG;AAClD,gBAAM,IAAI;AAAA,YACR,uEAAuE,OAAO;AAAA,UAChF;AAAA,QACF;AAEA,cAAM,WAAW,OAAO;AACxB,YAAI,KAAK,kBAAkB,QAAQ,GAAG;AACpC,gBAAM,IAAI;AAAA,YACR;AAAA,UACF;AAAA,QACF;AAEA,aAAK,UAAU,QAAQ,QAAQ,QAAQ,EAAE;AACzC,aAAK,UAAU;AAAA,MACjB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,MAYQ,kBAAkB,UAA2B;AACnD,YAAI,CAAC,SAAU,QAAO;AAGtB,cAAM,aAAa,SAAS,YAAY,EAAE,QAAQ,YAAY,EAAE;AAGhE,YAAI,eAAe,8BAA8B,WAAW,SAAS,WAAW,GAAG;AACjF,iBAAO;AAAA,QACT;AAGA,YAAI,eAAe,eAAe,eAAe,yBAAyB;AACxE,iBAAO;AAAA,QACT;AAGA,YAAI,eAAe,SAAS,eAAe,mBAAmB;AAC5D,iBAAO;AAAA,QACT;AAGA,cAAM,cAAc;AACpB,cAAM,YAAY,WAAW,MAAM,WAAW;AAC9C,YAAI,WAAW;AACb,gBAAM,SAAS,UAAU,MAAM,GAAG,CAAC,EAAE,IAAI,MAAM;AAG/C,cAAI,OAAO,KAAK,WAAS,QAAQ,GAAG,GAAG;AACrC,mBAAO;AAAA,UACT;AAEA,gBAAM,CAAC,GAAG,CAAC,IAAI;AAGf,cAAI,MAAM,KAAK;AACb,mBAAO;AAAA,UACT;AAGA,cAAI,MAAM,GAAG;AACX,mBAAO;AAAA,UACT;AAGA,cAAI,MAAM,OAAO,MAAM,KAAK;AAC1B,mBAAO;AAAA,UACT;AAIA,cAAI,MAAM,IAAI;AACZ,mBAAO;AAAA,UACT;AAEA,cAAI,MAAM,OAAO,KAAK,MAAM,KAAK,IAAI;AACnC,mBAAO;AAAA,UACT;AAEA,cAAI,MAAM,OAAO,MAAM,KAAK;AAC1B,mBAAO;AAAA,UACT;AAAA,QACF;AAIA,YAAI,WAAW,WAAW,IAAI,KAAK,WAAW,WAAW,IAAI,GAAG;AAC9D,iBAAO;AAAA,QACT;AAEA,YAAI,WAAW,WAAW,OAAO,GAAG;AAClC,iBAAO;AAAA,QACT;AAEA,eAAO;AAAA,MACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,MASA,MAAM,SAAS,OAAe,UAAgC;AAE5D,cAAM,cAAc,SACjB,MAAM,GAAG,EACT,IAAI,OAAK,mBAAmB,CAAC,CAAC,EAC9B,KAAK,GAAG;AACX,cAAM,MAAM,GAAG,KAAK,OAAO,YAAY,WAAW;AAElD,cAAM,aAAa,IAAI,gBAAgB;AACvC,cAAM,QAAQ,WAAW,MAAM,WAAW,MAAM,GAAG,KAAK,OAAO;AAE/D,YAAI;AACF,gBAAM,WAAW,MAAM,MAAM,KAAK;AAAA,YAChC,QAAQ;AAAA,YACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,YAC9B,QAAQ,WAAW;AAAA,UACrB,CAAC;AAED,cAAI,CAAC,SAAS,IAAI;AAChB,kBAAM,IAAI,MAAM,YAAY,SAAS,MAAM,KAAK,SAAS,UAAU,EAAE;AAAA,UACvE;AAEA,cAAI;AACJ,cAAI;AACF,mBAAO,MAAM,SAAS,KAAK;AAAA,UAC7B,SAAS,SAAS;AAChB,kBAAM,IAAI;AAAA,cACR,sDAAsD,mBAAmB,QAAQ,QAAQ,UAAU,OAAO,OAAO,CAAC;AAAA,YACpH;AAAA,UACF;AAEA,iBAAQ,MAAc;AAAA,QACxB,UAAE;AACA,uBAAa,KAAK;AAAA,QACpB;AAAA,MACF;AAAA,MAEA,MAAM,WAA0B;AAAA,MAEhC;AAAA,IACF;AAAA;AAAA;;;AC/KA,IA4Ga;AA5Gb;AAAA;AAAA;AA4GO,IAAM,qBAAN,MAAyB;AAAA,MACtB;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MAER,YACE,cACA,OACA,YACA,aACA;AACA,aAAK,QAAQ,aAAa,SAAS,CAAC;AACpC,aAAK,QAAQ;AACb,aAAK,aAAa;AAClB,aAAK,cAAc;AAAA,MACrB;AAAA;AAAA,MAGA,eAAyB;AACvB,cAAM,UAAoB,CAAC;AAE3B,mBAAW,CAAC,UAAU,UAAU,KAAK,OAAO,QAAQ,KAAK,KAAK,GAAG;AAC/D,cAAI,gBAAgB;AAEpB,cACE,WAAW,sBACX,KAAK,MAAM,qBACX,WAAW,mBAAmB,SAAS,KAAK,MAAM,iBAAiB,GACnE;AACA,4BAAgB;AAAA,UAClB;AAEA,cACE,CAAC,iBACD,WAAW,SACX,KAAK,MAAM,SACX,WAAW,MAAM,SAAS,KAAK,MAAM,KAAK,GAC1C;AACA,4BAAgB;AAAA,UAClB;AAGA,cACE,CAAC,iBACD,WAAW,eACX,KAAK,MAAM,OAAO,UAClB,WAAW,YAAY,SAAS,KAAK,MAAM,MAAM,MAAM,GACvD;AACA,4BAAgB;AAAA,UAClB;AAGA,cAAI,CAAC,iBAAiB,WAAW,UAAU,KAAK,MAAM,OAAO,OAAO;AAClE,kBAAM,aAAa,KAAK,MAAM,MAAM,MAAM,YAAY;AACtD,gBAAI,WAAW,OAAO,KAAK,OAAK,EAAE,YAAY,MAAM,UAAU,GAAG;AAC/D,8BAAgB;AAAA,YAClB;AAAA,UACF;AAKA,cAAI,CAAC,cAAe;AAGpB,cAAI,WAAW,kBAAkB,WAAW,eAAe,SAAS,GAAG;AACrE,gBACE,CAAC,KAAK,MAAM,OAAO,aACnB,CAAC,WAAW,eAAe,SAAS,KAAK,MAAM,MAAM,SAAS,GAC9D;AACA;AAAA,YACF;AAAA,UACF;AAEA,kBAAQ,KAAK,QAAQ;AAAA,QACvB;AAEA,eAAO;AAAA,MACT;AAAA,MAEQ,aAAa;AACnB,eAAO;AAAA,UACL,mBAAmB,KAAK,MAAM;AAAA,UAC9B,OAAO,KAAK,MAAM;AAAA,UAClB,OAAO,KAAK,aAAa;AAAA,UACzB,aAAa,KAAK,MAAM;AAAA,UACxB,GAAI,KAAK,MAAM,SAAS,EAAE,OAAO,KAAK,MAAM,MAAM;AAAA,QACpD;AAAA,MACF;AAAA,MAEA,kBAAkB,OAA+B;AAC/C,eAAO;AAAA,UACL,OAAO;AAAA,UACP,OAAO;AAAA,YACL,IAAI,MAAM;AAAA,YACV,MAAM,MAAM;AAAA,YACZ,OAAO,MAAM;AAAA,YACb,MAAM,MAAM;AAAA,YACZ,aAAa,MAAM;AAAA,YACnB,SAAS,MAAM;AAAA,YACf,QAAQ,MAAM;AAAA,UAChB;AAAA,UACA,OAAO,KAAK,WAAW;AAAA,UACvB,YAAY,KAAK;AAAA,UACjB,aAAa,KAAK;AAAA,QACpB;AAAA,MACF;AAAA,MAEA,kBAAkB,YAAoB,YAAoB,WAA8B;AACtF,eAAO;AAAA,UACL,OAAO;AAAA,UACP,MAAM,EAAE,YAAY,YAAY,UAAU;AAAA,UAC1C,OAAO,KAAK,WAAW;AAAA,UACvB,YAAY,KAAK;AAAA,UACjB,aAAa,KAAK;AAAA,QACpB;AAAA,MACF;AAAA,MAEA,qBACE,SACA,cAQU;AACV,eAAO;AAAA,UACL,OAAO;AAAA,UACP,OAAO,EAAE,IAAI,SAAS,MAAM,KAAK;AAAA,UACjC,YAAY;AAAA,UACZ,OAAO,KAAK,WAAW;AAAA,UACvB,YAAY,KAAK;AAAA,UACjB,aAAa,KAAK;AAAA,QACpB;AAAA,MACF;AAAA,IACF;AAAA;AAAA;;;ACvPA,IA4Ba;AA5Bb;AAAA;AAYA;AACA;AACA;AAcO,IAAM,kBAAN,MAA8C;AAAA,MAC3C,YAAwD;AAAA,MACxD;AAAA,MACA;AAAA,MACA;AAAA,MACA,eAA0C;AAAA,MAC1C,SAAc;AAAA,MAEtB,YAAY,QAAsB;AAChC,aAAK,SAAS;AACd,aAAK,WAAW,OAAO,YAAY;AACnC,aAAK,UAAU,OAAO,WAAW;AAAA,MACnC;AAAA,MAEA,MAAM,WAAW,QAAqC;AAEpD,YAAI;AACF,eAAK,SAAS,8CAAwB;AAAA,QACxC,QAAQ;AAAA,QAER;AAGA,cAAM,QAAsB;AAAA,UAC1B,mBAAmB,QAAQ,IAAI;AAAA,UAC/B,OAAO,QAAQ,IAAI,sBAAsB,QAAQ,IAAI;AAAA,UACrD,aAAa,CAAC,QAAQ,IAAI;AAAA,QAC5B;AACA,cAAM,OAA0B;AAAA,UAC9B,OAAO,QAAQ,IAAI;AAAA,UACnB,MAAM,QAAQ,IAAI,mBAAmB,MAAM,GAAG,EAAE,CAAC;AAAA,UACjD,QAAQ,QAAQ,IAAI;AAAA,UACpB,YAAY,QAAQ,IAAI;AAAA,UACxB,OAAO,QAAQ,IAAI;AAAA,QACrB;AACA,cAAM,QAAQ,QAAQ,IAAI,mBACtB,SAAS,QAAQ,IAAI,kBAAkB,EAAE,IACzC;AACJ,cAAM,cAAkC;AAAA,UACtC,QAAQ,UAAU,UAAa,OAAO,SAAS,KAAK,IAAI,QAAQ;AAAA,QAClE;AACA,aAAK,eAAe,IAAI,mBAAmB,QAAQ,OAAO,MAAM,WAAW;AAE3E,YAAI,OAAO,WAAW,SAAS;AAC7B,cAAI,CAAC,OAAO,OAAO;AACjB,kBAAM,IAAI,MAAM,qEAAqE;AAAA,UACvF;AACA,gBAAM,OAAO,IAAI,iBAAiB;AAClC,gBAAM,KAAK,WAAW,OAAO,KAAK;AAClC,cAAI,OAAO,MAAM;AACf,iBAAK,SAAS,OAAO,IAAI;AAAA,UAC3B;AACA,eAAK,YAAY;AAAA,QACnB,WAAW,OAAO,WAAW,UAAU;AACrC,cAAI,CAAC,OAAO,KAAK;AACf,kBAAM,IAAI,MAAM,8DAA8D;AAAA,UAChF;AACA,eAAK,YAAY,IAAI,iBAAiB,OAAO,KAAK,KAAK,OAAO;AAAA,QAChE,OAAO;AACL,eAAK,YAAY;AAAA,QACnB;AAAA,MACF;AAAA;AAAA;AAAA;AAAA;AAAA,MAMA,gBACE,OACA,MACA,aACM;AACN,aAAK,eAAe,IAAI,mBAAmB,KAAK,QAAQ,OAAO,MAAM,WAAW;AAAA,MAClF;AAAA,MAEA,MAAM,uBAAuB,SAAiB,aAA+C;AAC3F,YAAI,CAAC,KAAK,aAAa,CAAC,KAAK,aAAc,QAAO,EAAE,SAAS,KAAK;AAClE,cAAM,MACJ,eAAe,OAAO,gBAAgB,WACjC,cACD,CAAC;AACP,cAAM,iBAAiB,IAAI;AAC3B,cAAM,QAAQ,KAAK,aAAa,kBAAkB;AAAA,UAChD,IAAI;AAAA,UACJ,MAAO,IAAI,QAAmB;AAAA,UAC9B,OAAO,IAAI;AAAA,UACX,MAAM,IAAI;AAAA,UACV,aAAa,IAAI;AAAA,UACjB,SAAS,IAAI;AAAA,UACb,QAAQ;AAAA,QACV,CAAC;AACD,eAAO,KAAK,WAAW,OAAO,KAAK,gBAAgB,iBAAiB,gBAAgB,IAAI,CAAC;AAAA,MAC3F;AAAA,MAEA,MAAM,uBACJ,YACA,YACA,WACyB;AACzB,YAAI,CAAC,KAAK,aAAa,CAAC,KAAK,aAAc,QAAO,EAAE,SAAS,KAAK;AAClE,cAAM,QAAQ,KAAK,aAAa,kBAAkB,YAAY,YAAY,SAAS;AACnF,eAAO,KAAK,WAAW,OAAO,mBAAmB;AAAA,MACnD;AAAA,MAEA,MAAM,qBACJ,SACA,cAKyB;AACzB,YAAI,CAAC,KAAK,aAAa,CAAC,KAAK,aAAc,QAAO,EAAE,SAAS,KAAK;AAClE,cAAM,QAAQ,KAAK,aAAa,qBAAqB,SAAS,YAAY;AAC1E,eAAO,KAAK,WAAW,OAAO,0BAA0B;AAAA,MAC1D;AAAA,MAEA,MAAM,WAA0B;AAC9B,YAAI,KAAK,aAAa,cAAc,KAAK,WAAW;AAClD,gBAAM,KAAK,UAAU,SAAS;AAAA,QAChC;AACA,aAAK,YAAY;AACjB,aAAK,eAAe;AAAA,MACtB;AAAA,MAEQ,gBAAgB,cAAsB,UAA2B;AACvE,YAAI,UAAU;AACZ,iBAAO,SAAS,WAAW,QAAQ,IAAI,WAAW,SAAS,QAAQ;AAAA,QACrE;AACA,eAAO,SAAS,aAAa,QAAQ,OAAO,GAAG,CAAC;AAAA,MAClD;AAAA,MAEA,MAAc,WAAW,OAAe,UAA2C;AACjF,YAAI;AACF,eAAK,QAAQ,MAAM,6BAA6B,QAAQ,IAAI,KAAK,UAAU,KAAK,CAAC;AACjF,cAAI;AACJ,gBAAM,iBAAiB,IAAI,QAAe,CAAC,UAAU,WAAW;AAC9D,oBAAQ,WAAW,MAAM,OAAO,IAAI,MAAM,2BAA2B,CAAC,GAAG,KAAK,OAAO;AAAA,UACvF,CAAC;AACD,cAAI;AACF,kBAAM,SAAS,MAAM,QAAQ,KAAK,CAAC,KAAK,YAAY,OAAO,QAAQ,GAAG,cAAc,CAAC;AACrF,kBAAM,WAAW,KAAK,cAAc,MAAM;AAE1C,gBAAI,CAAC,SAAS,WAAW,KAAK,aAAa,QAAQ;AACjD,uBAAS,UAAU;AACnB,uBAAS,OAAO;AAChB,uBAAS,SAAS,UAAU,SAAS,UAAU,eAAe;AAAA,YAChE;AACA,iBAAK,QAAQ;AAAA,cACX,+BAA+B,QAAQ,aAAa,SAAS,OAAO,UAAU,SAAS,QAAQ,KAAK,YAAY,SAAS,UAAU,MAAM;AAAA,YAC3I;AACA,mBAAO;AAAA,UACT,UAAE;AACA,gBAAI,MAAO,cAAa,KAAK;AAAA,UAC/B;AAAA,QACF,SAAS,KAAK;AACZ,gBAAM,MAAM,eAAe,QAAQ,IAAI,UAAU,OAAO,GAAG;AAC3D,eAAK,QAAQ,KAAK,wCAAwC,QAAQ,KAAK,GAAG,EAAE;AAC5E,iBAAO;AAAA,YACL,SAAS,KAAK,aAAa,WAAW,KAAK,aAAa;AAAA,YACxD,MAAM,KAAK,aAAa,SAAS,OAAO;AAAA,YACxC,QAAQ,sCAAsC,KAAK,QAAQ;AAAA,UAC7D;AAAA,QACF;AAAA,MACF;AAAA,MAEA,MAAc,YAAY,OAAe,UAAgC;AACvE,YAAI,KAAK,qBAAqB,kBAAkB;AAC9C,gBAAM,SAAS,MAAM,KAAK,UAAU,SAAS,KAAK;AAIlD,iBAAO,KAAK,mBAAmB,QAAQ,QAAQ;AAAA,QACjD;AACA,eAAQ,KAAK,UAA+B,SAAS,OAAO,QAAQ;AAAA,MACtE;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,MAOQ,mBAAmB,QAAa,UAAuB;AAC7D,YAAI,CAAC,UAAU,OAAO,WAAW,SAAU,QAAO;AAElD,cAAM,WAAW,SAAS,QAAQ,YAAY,EAAE,EAAE,MAAM,GAAG;AAC3D,YAAI,UAAU;AACd,mBAAW,OAAO,UAAU;AAC1B,cAAI,WAAW,OAAO,YAAY,YAAY,OAAO,SAAS;AAC5D,sBAAU,QAAQ,GAAG;AAAA,UACvB,OAAO;AACL,mBAAO;AAAA,UACT;AAAA,QACF;AACA,eAAO;AAAA,MACT;AAAA,MAEQ,cAAc,QAA6B;AACjD,YAAI,WAAW,UAAa,WAAW,MAAM;AAC3C,iBAAO;AAAA,YACL,SAAS,KAAK,aAAa,WAAW,KAAK,aAAa;AAAA,YACxD,MAAM,KAAK,aAAa,SAAS,OAAO;AAAA,YACxC,QAAQ,KAAK,aAAa,SAAS,4BAA4B;AAAA,UACjE;AAAA,QACF;AAEA,cAAM,UAAU,OAAO,YAAY;AACnC,cAAM,WAA2B;AAAA,UAC/B;AAAA,UACA,QAAQ,OAAO;AAAA,QACjB;AAEA,YAAI,OAAO,cAAc;AACvB,mBAAS,eAAe,OAAO;AAAA,QACjC;AAEA,eAAO;AAAA,MACT;AAAA,IACF;AAAA;AAAA;","names":["fs","path"]}
|
|
@@ -4,7 +4,7 @@ import {
|
|
|
4
4
|
handleScheduleAction,
|
|
5
5
|
init_schedule_tool,
|
|
6
6
|
isScheduleTool
|
|
7
|
-
} from "./chunk-
|
|
7
|
+
} from "./chunk-EYQWEVZF.mjs";
|
|
8
8
|
import "./chunk-KFKHU6CM.mjs";
|
|
9
9
|
import "./chunk-M3BYMES6.mjs";
|
|
10
10
|
import "./chunk-LG4AUKHB.mjs";
|
|
@@ -12,7 +12,7 @@ import "./chunk-B7BVQM5K.mjs";
|
|
|
12
12
|
import "./chunk-XXAEN5KU.mjs";
|
|
13
13
|
import "./chunk-GEW6LS32.mjs";
|
|
14
14
|
import "./chunk-DNDS7R3N.mjs";
|
|
15
|
-
import "./chunk-
|
|
15
|
+
import "./chunk-CPYQDJ27.mjs";
|
|
16
16
|
import "./chunk-NCWIZVOT.mjs";
|
|
17
17
|
import "./chunk-ZCUGMT7X.mjs";
|
|
18
18
|
import "./chunk-WG7P66MJ.mjs";
|
|
@@ -32,4 +32,4 @@ export {
|
|
|
32
32
|
handleScheduleAction,
|
|
33
33
|
isScheduleTool
|
|
34
34
|
};
|
|
35
|
-
//# sourceMappingURL=schedule-tool-
|
|
35
|
+
//# sourceMappingURL=schedule-tool-74VMD77T.mjs.map
|
|
@@ -4,7 +4,7 @@ import {
|
|
|
4
4
|
handleScheduleAction,
|
|
5
5
|
init_schedule_tool,
|
|
6
6
|
isScheduleTool
|
|
7
|
-
} from "./chunk-
|
|
7
|
+
} from "./chunk-DXNWUIAN.mjs";
|
|
8
8
|
import "./chunk-KFKHU6CM.mjs";
|
|
9
9
|
import "./chunk-M3BYMES6.mjs";
|
|
10
10
|
import "./chunk-LG4AUKHB.mjs";
|
|
@@ -12,7 +12,7 @@ import "./chunk-B7BVQM5K.mjs";
|
|
|
12
12
|
import "./chunk-XXAEN5KU.mjs";
|
|
13
13
|
import "./chunk-GEW6LS32.mjs";
|
|
14
14
|
import "./chunk-DNDS7R3N.mjs";
|
|
15
|
-
import "./chunk-
|
|
15
|
+
import "./chunk-CPYQDJ27.mjs";
|
|
16
16
|
import "./chunk-NCWIZVOT.mjs";
|
|
17
17
|
import "./chunk-ZCUGMT7X.mjs";
|
|
18
18
|
import "./chunk-WG7P66MJ.mjs";
|
|
@@ -32,4 +32,4 @@ export {
|
|
|
32
32
|
handleScheduleAction,
|
|
33
33
|
isScheduleTool
|
|
34
34
|
};
|
|
35
|
-
//# sourceMappingURL=schedule-tool-
|
|
35
|
+
//# sourceMappingURL=schedule-tool-WSZKJUNQ.mjs.map
|
|
@@ -6,7 +6,7 @@ import {
|
|
|
6
6
|
extractSlackContext,
|
|
7
7
|
init_schedule_tool_handler,
|
|
8
8
|
isScheduleToolCall
|
|
9
|
-
} from "./chunk-
|
|
9
|
+
} from "./chunk-EYQWEVZF.mjs";
|
|
10
10
|
import "./chunk-KFKHU6CM.mjs";
|
|
11
11
|
import "./chunk-M3BYMES6.mjs";
|
|
12
12
|
import "./chunk-LG4AUKHB.mjs";
|
|
@@ -14,7 +14,7 @@ import "./chunk-B7BVQM5K.mjs";
|
|
|
14
14
|
import "./chunk-XXAEN5KU.mjs";
|
|
15
15
|
import "./chunk-GEW6LS32.mjs";
|
|
16
16
|
import "./chunk-DNDS7R3N.mjs";
|
|
17
|
-
import "./chunk-
|
|
17
|
+
import "./chunk-CPYQDJ27.mjs";
|
|
18
18
|
import "./chunk-NCWIZVOT.mjs";
|
|
19
19
|
import "./chunk-ZCUGMT7X.mjs";
|
|
20
20
|
import "./chunk-WG7P66MJ.mjs";
|
|
@@ -36,4 +36,4 @@ export {
|
|
|
36
36
|
extractSlackContext,
|
|
37
37
|
isScheduleToolCall
|
|
38
38
|
};
|
|
39
|
-
//# sourceMappingURL=schedule-tool-handler-
|
|
39
|
+
//# sourceMappingURL=schedule-tool-handler-EOQBRZSD.mjs.map
|
|
@@ -6,7 +6,7 @@ import {
|
|
|
6
6
|
extractSlackContext,
|
|
7
7
|
init_schedule_tool_handler,
|
|
8
8
|
isScheduleToolCall
|
|
9
|
-
} from "./chunk-
|
|
9
|
+
} from "./chunk-DXNWUIAN.mjs";
|
|
10
10
|
import "./chunk-KFKHU6CM.mjs";
|
|
11
11
|
import "./chunk-M3BYMES6.mjs";
|
|
12
12
|
import "./chunk-LG4AUKHB.mjs";
|
|
@@ -14,7 +14,7 @@ import "./chunk-B7BVQM5K.mjs";
|
|
|
14
14
|
import "./chunk-XXAEN5KU.mjs";
|
|
15
15
|
import "./chunk-GEW6LS32.mjs";
|
|
16
16
|
import "./chunk-DNDS7R3N.mjs";
|
|
17
|
-
import "./chunk-
|
|
17
|
+
import "./chunk-CPYQDJ27.mjs";
|
|
18
18
|
import "./chunk-NCWIZVOT.mjs";
|
|
19
19
|
import "./chunk-ZCUGMT7X.mjs";
|
|
20
20
|
import "./chunk-WG7P66MJ.mjs";
|
|
@@ -36,4 +36,4 @@ export {
|
|
|
36
36
|
extractSlackContext,
|
|
37
37
|
isScheduleToolCall
|
|
38
38
|
};
|
|
39
|
-
//# sourceMappingURL=schedule-tool-handler-
|
|
39
|
+
//# sourceMappingURL=schedule-tool-handler-Q7E5NBHS.mjs.map
|
package/dist/sdk/sdk.d.mts
CHANGED
|
@@ -130,6 +130,17 @@ interface SandboxResourceConfig {
|
|
|
130
130
|
/** CPU limit (e.g., 1.0, 0.5) */
|
|
131
131
|
cpu?: number;
|
|
132
132
|
}
|
|
133
|
+
/**
|
|
134
|
+
* Additional host path to bind-mount into the sandbox
|
|
135
|
+
*/
|
|
136
|
+
interface SandboxBindPath {
|
|
137
|
+
/** Host path (supports ~ prefix for home directory) */
|
|
138
|
+
host: string;
|
|
139
|
+
/** Container path (defaults to resolved host path) */
|
|
140
|
+
container?: string;
|
|
141
|
+
/** Mount as read-only (default: true) */
|
|
142
|
+
read_only?: boolean;
|
|
143
|
+
}
|
|
133
144
|
/**
|
|
134
145
|
* Configuration for a single sandbox environment
|
|
135
146
|
*/
|
|
@@ -160,6 +171,8 @@ interface SandboxConfig {
|
|
|
160
171
|
visor_path?: string;
|
|
161
172
|
/** Cache volume configuration */
|
|
162
173
|
cache?: SandboxCacheConfig;
|
|
174
|
+
/** Additional host paths to bind-mount into the sandbox */
|
|
175
|
+
bind_paths?: SandboxBindPath[];
|
|
163
176
|
}
|
|
164
177
|
|
|
165
178
|
/**
|
|
@@ -304,9 +317,9 @@ interface BashConfig {
|
|
|
304
317
|
/** Array of blocked command patterns (e.g., ['rm -rf', 'sudo']) */
|
|
305
318
|
deny?: string[];
|
|
306
319
|
/** Disable default safe command list (use with caution) */
|
|
307
|
-
|
|
320
|
+
disableDefaultAllow?: boolean;
|
|
308
321
|
/** Disable default dangerous command blocklist (use with extreme caution) */
|
|
309
|
-
|
|
322
|
+
disableDefaultDeny?: boolean;
|
|
310
323
|
/** Execution timeout in milliseconds */
|
|
311
324
|
timeout?: number;
|
|
312
325
|
/** Default working directory for command execution */
|
package/dist/sdk/sdk.d.ts
CHANGED
|
@@ -130,6 +130,17 @@ interface SandboxResourceConfig {
|
|
|
130
130
|
/** CPU limit (e.g., 1.0, 0.5) */
|
|
131
131
|
cpu?: number;
|
|
132
132
|
}
|
|
133
|
+
/**
|
|
134
|
+
* Additional host path to bind-mount into the sandbox
|
|
135
|
+
*/
|
|
136
|
+
interface SandboxBindPath {
|
|
137
|
+
/** Host path (supports ~ prefix for home directory) */
|
|
138
|
+
host: string;
|
|
139
|
+
/** Container path (defaults to resolved host path) */
|
|
140
|
+
container?: string;
|
|
141
|
+
/** Mount as read-only (default: true) */
|
|
142
|
+
read_only?: boolean;
|
|
143
|
+
}
|
|
133
144
|
/**
|
|
134
145
|
* Configuration for a single sandbox environment
|
|
135
146
|
*/
|
|
@@ -160,6 +171,8 @@ interface SandboxConfig {
|
|
|
160
171
|
visor_path?: string;
|
|
161
172
|
/** Cache volume configuration */
|
|
162
173
|
cache?: SandboxCacheConfig;
|
|
174
|
+
/** Additional host paths to bind-mount into the sandbox */
|
|
175
|
+
bind_paths?: SandboxBindPath[];
|
|
163
176
|
}
|
|
164
177
|
|
|
165
178
|
/**
|
|
@@ -304,9 +317,9 @@ interface BashConfig {
|
|
|
304
317
|
/** Array of blocked command patterns (e.g., ['rm -rf', 'sudo']) */
|
|
305
318
|
deny?: string[];
|
|
306
319
|
/** Disable default safe command list (use with caution) */
|
|
307
|
-
|
|
320
|
+
disableDefaultAllow?: boolean;
|
|
308
321
|
/** Disable default dangerous command blocklist (use with extreme caution) */
|
|
309
|
-
|
|
322
|
+
disableDefaultDeny?: boolean;
|
|
310
323
|
/** Execution timeout in milliseconds */
|
|
311
324
|
timeout?: number;
|
|
312
325
|
/** Default working directory for command execution */
|