@strapi/admin 5.42.1 → 5.43.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/admin/admin/src/components/Form.js +11 -10
- package/dist/admin/admin/src/components/Form.js.map +1 -1
- package/dist/admin/admin/src/components/Form.mjs +11 -10
- package/dist/admin/admin/src/components/Form.mjs.map +1 -1
- package/dist/admin/admin/src/components/FormInputs/Date.js +2 -2
- package/dist/admin/admin/src/components/FormInputs/Date.js.map +1 -1
- package/dist/admin/admin/src/components/FormInputs/Date.mjs +2 -2
- package/dist/admin/admin/src/components/FormInputs/Date.mjs.map +1 -1
- package/dist/admin/admin/src/components/GuidedTour/Context.js +3 -2
- package/dist/admin/admin/src/components/GuidedTour/Context.js.map +1 -1
- package/dist/admin/admin/src/components/GuidedTour/Context.mjs +3 -2
- package/dist/admin/admin/src/components/GuidedTour/Context.mjs.map +1 -1
- package/dist/admin/admin/src/components/PageHelpers.js +1 -1
- package/dist/admin/admin/src/components/PageHelpers.js.map +1 -1
- package/dist/admin/admin/src/components/PageHelpers.mjs +1 -1
- package/dist/admin/admin/src/components/PageHelpers.mjs.map +1 -1
- package/dist/admin/admin/src/components/Table.js +28 -15
- package/dist/admin/admin/src/components/Table.js.map +1 -1
- package/dist/admin/admin/src/components/Table.mjs +29 -16
- package/dist/admin/admin/src/components/Table.mjs.map +1 -1
- package/dist/admin/admin/src/core/store/configure.js +3 -1
- package/dist/admin/admin/src/core/store/configure.js.map +1 -1
- package/dist/admin/admin/src/core/store/configure.mjs +3 -1
- package/dist/admin/admin/src/core/store/configure.mjs.map +1 -1
- package/dist/admin/admin/src/hooks/usePersistentState.js +9 -4
- package/dist/admin/admin/src/hooks/usePersistentState.js.map +1 -1
- package/dist/admin/admin/src/hooks/usePersistentState.mjs +10 -6
- package/dist/admin/admin/src/hooks/usePersistentState.mjs.map +1 -1
- package/dist/admin/admin/src/pages/Settings/pages/ApplicationInfo/components/LogoInput.js +4 -1
- package/dist/admin/admin/src/pages/Settings/pages/ApplicationInfo/components/LogoInput.js.map +1 -1
- package/dist/admin/admin/src/pages/Settings/pages/ApplicationInfo/components/LogoInput.mjs +4 -1
- package/dist/admin/admin/src/pages/Settings/pages/ApplicationInfo/components/LogoInput.mjs.map +1 -1
- package/dist/admin/admin/src/render.js +2 -0
- package/dist/admin/admin/src/render.js.map +1 -1
- package/dist/admin/admin/src/render.mjs +2 -0
- package/dist/admin/admin/src/render.mjs.map +1 -1
- package/dist/admin/admin/src/services/api.js +2 -2
- package/dist/admin/admin/src/services/api.js.map +1 -1
- package/dist/admin/admin/src/services/api.mjs +2 -2
- package/dist/admin/admin/src/services/api.mjs.map +1 -1
- package/dist/admin/admin/src/translations/nl.json.js +394 -89
- package/dist/admin/admin/src/translations/nl.json.js.map +1 -1
- package/dist/admin/admin/src/translations/nl.json.mjs +393 -90
- package/dist/admin/admin/src/translations/nl.json.mjs.map +1 -1
- package/dist/admin/ee/admin/src/hooks/useAIUsageWarning.js +1 -1
- package/dist/admin/ee/admin/src/hooks/useAIUsageWarning.js.map +1 -1
- package/dist/admin/ee/admin/src/hooks/useAIUsageWarning.mjs +2 -2
- package/dist/admin/ee/admin/src/hooks/useAIUsageWarning.mjs.map +1 -1
- package/dist/admin/ee/admin/src/pages/SettingsPage/pages/ApplicationInfoPage/components/AIUsage.js +1 -1
- package/dist/admin/ee/admin/src/pages/SettingsPage/pages/ApplicationInfoPage/components/AIUsage.js.map +1 -1
- package/dist/admin/ee/admin/src/pages/SettingsPage/pages/ApplicationInfoPage/components/AIUsage.mjs +2 -2
- package/dist/admin/ee/admin/src/pages/SettingsPage/pages/ApplicationInfoPage/components/AIUsage.mjs.map +1 -1
- package/dist/admin/ee/admin/src/services/ai.js +7 -7
- package/dist/admin/ee/admin/src/services/ai.js.map +1 -1
- package/dist/admin/ee/admin/src/services/ai.mjs +6 -6
- package/dist/admin/ee/admin/src/services/ai.mjs.map +1 -1
- package/dist/admin/ee.js +2 -2
- package/dist/admin/ee.mjs +1 -1
- package/dist/admin/index.js +1 -0
- package/dist/admin/index.js.map +1 -1
- package/dist/admin/index.mjs +1 -1
- package/dist/admin/src/core/store/configure.d.ts +2 -2
- package/dist/admin/src/core/store/hooks.d.ts +2 -2
- package/dist/admin/src/ee.d.ts +1 -1
- package/dist/admin/src/hooks/useAdminRoles.d.ts +1 -1
- package/dist/admin/src/hooks/usePersistentState.d.ts +2 -1
- package/dist/admin/src/index.d.ts +1 -1
- package/dist/admin/src/pages/Settings/pages/Webhooks/hooks/useWebhooks.d.ts +4 -4
- package/dist/admin/src/selectors.d.ts +2 -2
- package/dist/admin/src/services/admin.d.ts +6 -6
- package/dist/admin/src/services/api.d.ts +1 -1
- package/dist/admin/src/services/apiTokens.d.ts +1 -1
- package/dist/admin/src/services/auth.d.ts +11 -11
- package/dist/admin/src/services/contentApi.d.ts +1 -1
- package/dist/admin/src/services/contentManager.d.ts +1 -1
- package/dist/admin/src/services/homepage.d.ts +3 -3
- package/dist/admin/src/services/transferTokens.d.ts +1 -1
- package/dist/admin/src/services/users.d.ts +8 -8
- package/dist/admin/src/services/webhooks.d.ts +2 -2
- package/dist/admin/tests/utils.d.ts +1 -1
- package/dist/ee/admin/src/services/ai.d.ts +6 -6
- package/dist/ee/admin/src/services/auditLogs.d.ts +1 -1
- package/dist/ee/server/src/index.d.ts +0 -16
- package/dist/ee/server/src/index.d.ts.map +1 -1
- package/dist/server/ee/server/src/index.js +0 -16
- package/dist/server/ee/server/src/index.js.map +1 -1
- package/dist/server/ee/server/src/index.mjs +0 -16
- package/dist/server/ee/server/src/index.mjs.map +1 -1
- package/dist/server/server/src/ai/controllers/ai.js +52 -0
- package/dist/server/server/src/ai/controllers/ai.js.map +1 -0
- package/dist/server/server/src/ai/controllers/ai.mjs +50 -0
- package/dist/server/server/src/ai/controllers/ai.mjs.map +1 -0
- package/dist/server/{ee/server → server}/src/ai/routes/ai.js +1 -2
- package/dist/server/server/src/ai/routes/ai.js.map +1 -0
- package/dist/server/{ee/server → server}/src/ai/routes/ai.mjs +1 -2
- package/dist/server/server/src/ai/routes/ai.mjs.map +1 -0
- package/dist/server/{ee/server/src/ai/containers → server/src/ai/services}/ai.js +107 -32
- package/dist/server/server/src/ai/services/ai.js.map +1 -0
- package/dist/server/{ee/server/src/ai/containers → server/src/ai/services}/ai.mjs +107 -32
- package/dist/server/server/src/ai/services/ai.mjs.map +1 -0
- package/dist/server/server/src/controllers/index.js +3 -1
- package/dist/server/server/src/controllers/index.js.map +1 -1
- package/dist/server/server/src/controllers/index.mjs +3 -1
- package/dist/server/server/src/controllers/index.mjs.map +1 -1
- package/dist/server/server/src/register.js +4 -0
- package/dist/server/server/src/register.js.map +1 -1
- package/dist/server/server/src/register.mjs +4 -0
- package/dist/server/server/src/register.mjs.map +1 -1
- package/dist/server/server/src/routes/index.js +3 -1
- package/dist/server/server/src/routes/index.js.map +1 -1
- package/dist/server/server/src/routes/index.mjs +3 -1
- package/dist/server/server/src/routes/index.mjs.map +1 -1
- package/dist/{ee/server → server}/src/ai/controllers/ai.d.ts +1 -1
- package/dist/server/src/ai/controllers/ai.d.ts.map +1 -0
- package/dist/server/src/ai/routes/ai.d.ts.map +1 -0
- package/dist/server/src/ai/services/ai.d.ts +30 -0
- package/dist/server/src/ai/services/ai.d.ts.map +1 -0
- package/dist/server/src/controllers/index.d.ts +5 -0
- package/dist/server/src/controllers/index.d.ts.map +1 -1
- package/dist/server/src/index.d.ts +5 -0
- package/dist/server/src/index.d.ts.map +1 -1
- package/dist/server/src/register.d.ts.map +1 -1
- package/dist/server/src/routes/index.d.ts.map +1 -1
- package/dist/shared/contracts/ai.d.ts +3 -3
- package/package.json +8 -8
- package/dist/ee/server/src/ai/containers/ai.d.ts +0 -15
- package/dist/ee/server/src/ai/containers/ai.d.ts.map +0 -1
- package/dist/ee/server/src/ai/controllers/ai.d.ts.map +0 -1
- package/dist/ee/server/src/ai/routes/ai.d.ts.map +0 -1
- package/dist/server/ee/server/src/ai/containers/ai.js.map +0 -1
- package/dist/server/ee/server/src/ai/containers/ai.mjs.map +0 -1
- package/dist/server/ee/server/src/ai/controllers/ai.js +0 -121
- package/dist/server/ee/server/src/ai/controllers/ai.js.map +0 -1
- package/dist/server/ee/server/src/ai/controllers/ai.mjs +0 -119
- package/dist/server/ee/server/src/ai/controllers/ai.mjs.map +0 -1
- package/dist/server/ee/server/src/ai/routes/ai.js.map +0 -1
- package/dist/server/ee/server/src/ai/routes/ai.mjs.map +0 -1
- /package/dist/{ee/server → server}/src/ai/routes/ai.d.ts +0 -0
|
@@ -9,6 +9,7 @@ import user from './user.mjs';
|
|
|
9
9
|
import webhooks from './webhooks.mjs';
|
|
10
10
|
import contentApi from './content-api.mjs';
|
|
11
11
|
import homepage from './homepage.mjs';
|
|
12
|
+
import ai from '../ai/controllers/ai.mjs';
|
|
12
13
|
|
|
13
14
|
var controllers = {
|
|
14
15
|
admin,
|
|
@@ -21,7 +22,8 @@ var controllers = {
|
|
|
21
22
|
user,
|
|
22
23
|
webhooks,
|
|
23
24
|
'content-api': contentApi,
|
|
24
|
-
homepage
|
|
25
|
+
homepage,
|
|
26
|
+
ai
|
|
25
27
|
};
|
|
26
28
|
|
|
27
29
|
export { controllers as default };
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.mjs","sources":["../../../../../server/src/controllers/index.ts"],"sourcesContent":["import type {} from 'koa-body';\n\nimport admin from './admin';\nimport apiToken from './api-token';\nimport authenticatedUser from './authenticated-user';\nimport authentication from './authentication';\nimport permission from './permission';\nimport role from './role';\nimport transfer from './transfer';\nimport user from './user';\nimport webhooks from './webhooks';\nimport contentApi from './content-api';\nimport homepage from './homepage';\n\nexport default {\n admin,\n 'api-token': apiToken,\n 'authenticated-user': authenticatedUser,\n authentication,\n permission,\n role,\n transfer,\n user,\n webhooks,\n 'content-api': contentApi,\n homepage,\n};\n"],"names":["admin","apiToken","authenticatedUser","authentication","permission","role","transfer","user","webhooks","contentApi","homepage"],"mappings":"
|
|
1
|
+
{"version":3,"file":"index.mjs","sources":["../../../../../server/src/controllers/index.ts"],"sourcesContent":["import type {} from 'koa-body';\n\nimport admin from './admin';\nimport apiToken from './api-token';\nimport authenticatedUser from './authenticated-user';\nimport authentication from './authentication';\nimport permission from './permission';\nimport role from './role';\nimport transfer from './transfer';\nimport user from './user';\nimport webhooks from './webhooks';\nimport contentApi from './content-api';\nimport homepage from './homepage';\nimport ai from '../ai/controllers/ai';\n\nexport default {\n admin,\n 'api-token': apiToken,\n 'authenticated-user': authenticatedUser,\n authentication,\n permission,\n role,\n transfer,\n user,\n webhooks,\n 'content-api': contentApi,\n homepage,\n ai,\n};\n"],"names":["admin","apiToken","authenticatedUser","authentication","permission","role","transfer","user","webhooks","contentApi","homepage","ai"],"mappings":";;;;;;;;;;;;;AAeA,kBAAe;AACbA,IAAAA,KAAAA;IACA,WAAA,EAAaC,QAAAA;IACb,oBAAA,EAAsBC,iBAAAA;AACtBC,IAAAA,cAAAA;AACAC,IAAAA,UAAAA;AACAC,IAAAA,IAAAA;AACAC,IAAAA,QAAAA;AACAC,IAAAA,IAAAA;AACAC,IAAAA,QAAAA;IACA,aAAA,EAAeC,UAAAA;AACfC,IAAAA,QAAAA;AACAC,IAAAA;AACF,CAAA;;;;"}
|
|
@@ -3,12 +3,16 @@
|
|
|
3
3
|
var serveAdminPanel = require('./routes/serve-admin-panel.js');
|
|
4
4
|
var admin = require('./strategies/admin.js');
|
|
5
5
|
var apiToken = require('./strategies/api-token.js');
|
|
6
|
+
var ai = require('./ai/services/ai.js');
|
|
6
7
|
|
|
7
8
|
var register = (({ strapi })=>{
|
|
8
9
|
const passportMiddleware = strapi.service('admin::passport').init();
|
|
9
10
|
strapi.server.api('admin').use(passportMiddleware);
|
|
10
11
|
strapi.get('auth').register('admin', admin.default);
|
|
11
12
|
strapi.get('auth').register('content-api', apiToken.default);
|
|
13
|
+
strapi.add('ai.admin', ()=>ai.createAiAdminService({
|
|
14
|
+
strapi
|
|
15
|
+
}));
|
|
12
16
|
const shouldServeAdminPanel = strapi.config.get('admin.serveAdminPanel');
|
|
13
17
|
if (shouldServeAdminPanel) {
|
|
14
18
|
serveAdminPanel({
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"register.js","sources":["../../../../server/src/register.ts"],"sourcesContent":["import type { Core } from '@strapi/types';\nimport registerAdminPanelRoute from './routes/serve-admin-panel';\nimport adminAuthStrategy from './strategies/admin';\nimport apiTokenAuthStrategy from './strategies/api-token';\n\nexport default ({ strapi }: { strapi: Core.Strapi }) => {\n const passportMiddleware = strapi.service('admin::passport').init();\n\n strapi.server.api('admin').use(passportMiddleware);\n strapi.get('auth').register('admin', adminAuthStrategy);\n strapi.get('auth').register('content-api', apiTokenAuthStrategy);\n\n const shouldServeAdminPanel = strapi.config.get('admin.serveAdminPanel');\n\n if (shouldServeAdminPanel) {\n registerAdminPanelRoute({ strapi });\n }\n};\n"],"names":["strapi","passportMiddleware","service","init","server","api","use","get","register","adminAuthStrategy","apiTokenAuthStrategy","shouldServeAdminPanel","config","registerAdminPanelRoute"],"mappings":"
|
|
1
|
+
{"version":3,"file":"register.js","sources":["../../../../server/src/register.ts"],"sourcesContent":["import type { Core } from '@strapi/types';\nimport registerAdminPanelRoute from './routes/serve-admin-panel';\nimport adminAuthStrategy from './strategies/admin';\nimport apiTokenAuthStrategy from './strategies/api-token';\nimport { createAiAdminService } from './ai/services/ai';\n\nexport default ({ strapi }: { strapi: Core.Strapi }) => {\n const passportMiddleware = strapi.service('admin::passport').init();\n\n strapi.server.api('admin').use(passportMiddleware);\n strapi.get('auth').register('admin', adminAuthStrategy);\n strapi.get('auth').register('content-api', apiTokenAuthStrategy);\n\n strapi.add('ai.admin', () => createAiAdminService({ strapi }));\n\n const shouldServeAdminPanel = strapi.config.get('admin.serveAdminPanel');\n\n if (shouldServeAdminPanel) {\n registerAdminPanelRoute({ strapi });\n }\n};\n"],"names":["strapi","passportMiddleware","service","init","server","api","use","get","register","adminAuthStrategy","apiTokenAuthStrategy","add","createAiAdminService","shouldServeAdminPanel","config","registerAdminPanelRoute"],"mappings":";;;;;;;AAMA,eAAe,CAAA,CAAC,EAAEA,MAAM,EAA2B,GAAA;AACjD,IAAA,MAAMC,kBAAAA,GAAqBD,MAAAA,CAAOE,OAAO,CAAC,mBAAmBC,IAAI,EAAA;AAEjEH,IAAAA,MAAAA,CAAOI,MAAM,CAACC,GAAG,CAAC,OAAA,CAAA,CAASC,GAAG,CAACL,kBAAAA,CAAAA;AAC/BD,IAAAA,MAAAA,CAAOO,GAAG,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAAC,OAAA,EAASC,aAAAA,CAAAA;AACrCT,IAAAA,MAAAA,CAAOO,GAAG,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAAC,aAAA,EAAeE,gBAAAA,CAAAA;AAE3CV,IAAAA,MAAAA,CAAOW,GAAG,CAAC,UAAA,EAAY,IAAMC,uBAAAA,CAAqB;AAAEZ,YAAAA;AAAO,SAAA,CAAA,CAAA;AAE3D,IAAA,MAAMa,qBAAAA,GAAwBb,MAAAA,CAAOc,MAAM,CAACP,GAAG,CAAC,uBAAA,CAAA;AAEhD,IAAA,IAAIM,qBAAAA,EAAuB;QACzBE,eAAAA,CAAwB;AAAEf,YAAAA;AAAO,SAAA,CAAA;AACnC,IAAA;AACF,CAAA;;;;"}
|
|
@@ -1,12 +1,16 @@
|
|
|
1
1
|
import registerAdminPanelRoute from './routes/serve-admin-panel.mjs';
|
|
2
2
|
import adminAuthStrategy from './strategies/admin.mjs';
|
|
3
3
|
import apiTokenAuthStrategy from './strategies/api-token.mjs';
|
|
4
|
+
import { createAiAdminService } from './ai/services/ai.mjs';
|
|
4
5
|
|
|
5
6
|
var register = (({ strapi })=>{
|
|
6
7
|
const passportMiddleware = strapi.service('admin::passport').init();
|
|
7
8
|
strapi.server.api('admin').use(passportMiddleware);
|
|
8
9
|
strapi.get('auth').register('admin', adminAuthStrategy);
|
|
9
10
|
strapi.get('auth').register('content-api', apiTokenAuthStrategy);
|
|
11
|
+
strapi.add('ai.admin', ()=>createAiAdminService({
|
|
12
|
+
strapi
|
|
13
|
+
}));
|
|
10
14
|
const shouldServeAdminPanel = strapi.config.get('admin.serveAdminPanel');
|
|
11
15
|
if (shouldServeAdminPanel) {
|
|
12
16
|
registerAdminPanelRoute({
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"register.mjs","sources":["../../../../server/src/register.ts"],"sourcesContent":["import type { Core } from '@strapi/types';\nimport registerAdminPanelRoute from './routes/serve-admin-panel';\nimport adminAuthStrategy from './strategies/admin';\nimport apiTokenAuthStrategy from './strategies/api-token';\n\nexport default ({ strapi }: { strapi: Core.Strapi }) => {\n const passportMiddleware = strapi.service('admin::passport').init();\n\n strapi.server.api('admin').use(passportMiddleware);\n strapi.get('auth').register('admin', adminAuthStrategy);\n strapi.get('auth').register('content-api', apiTokenAuthStrategy);\n\n const shouldServeAdminPanel = strapi.config.get('admin.serveAdminPanel');\n\n if (shouldServeAdminPanel) {\n registerAdminPanelRoute({ strapi });\n }\n};\n"],"names":["strapi","passportMiddleware","service","init","server","api","use","get","register","adminAuthStrategy","apiTokenAuthStrategy","shouldServeAdminPanel","config","registerAdminPanelRoute"],"mappings":"
|
|
1
|
+
{"version":3,"file":"register.mjs","sources":["../../../../server/src/register.ts"],"sourcesContent":["import type { Core } from '@strapi/types';\nimport registerAdminPanelRoute from './routes/serve-admin-panel';\nimport adminAuthStrategy from './strategies/admin';\nimport apiTokenAuthStrategy from './strategies/api-token';\nimport { createAiAdminService } from './ai/services/ai';\n\nexport default ({ strapi }: { strapi: Core.Strapi }) => {\n const passportMiddleware = strapi.service('admin::passport').init();\n\n strapi.server.api('admin').use(passportMiddleware);\n strapi.get('auth').register('admin', adminAuthStrategy);\n strapi.get('auth').register('content-api', apiTokenAuthStrategy);\n\n strapi.add('ai.admin', () => createAiAdminService({ strapi }));\n\n const shouldServeAdminPanel = strapi.config.get('admin.serveAdminPanel');\n\n if (shouldServeAdminPanel) {\n registerAdminPanelRoute({ strapi });\n }\n};\n"],"names":["strapi","passportMiddleware","service","init","server","api","use","get","register","adminAuthStrategy","apiTokenAuthStrategy","add","createAiAdminService","shouldServeAdminPanel","config","registerAdminPanelRoute"],"mappings":";;;;;AAMA,eAAe,CAAA,CAAC,EAAEA,MAAM,EAA2B,GAAA;AACjD,IAAA,MAAMC,kBAAAA,GAAqBD,MAAAA,CAAOE,OAAO,CAAC,mBAAmBC,IAAI,EAAA;AAEjEH,IAAAA,MAAAA,CAAOI,MAAM,CAACC,GAAG,CAAC,OAAA,CAAA,CAASC,GAAG,CAACL,kBAAAA,CAAAA;AAC/BD,IAAAA,MAAAA,CAAOO,GAAG,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAAC,OAAA,EAASC,iBAAAA,CAAAA;AACrCT,IAAAA,MAAAA,CAAOO,GAAG,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAAC,aAAA,EAAeE,oBAAAA,CAAAA;AAE3CV,IAAAA,MAAAA,CAAOW,GAAG,CAAC,UAAA,EAAY,IAAMC,oBAAAA,CAAqB;AAAEZ,YAAAA;AAAO,SAAA,CAAA,CAAA;AAE3D,IAAA,MAAMa,qBAAAA,GAAwBb,MAAAA,CAAOc,MAAM,CAACP,GAAG,CAAC,uBAAA,CAAA;AAEhD,IAAA,IAAIM,qBAAAA,EAAuB;QACzBE,uBAAAA,CAAwB;AAAEf,YAAAA;AAAO,SAAA,CAAA;AACnC,IAAA;AACF,CAAA;;;;"}
|
|
@@ -10,6 +10,7 @@ var apiTokens = require('./api-tokens.js');
|
|
|
10
10
|
var contentApi = require('./content-api.js');
|
|
11
11
|
var transfer = require('./transfer.js');
|
|
12
12
|
var homepage = require('./homepage.js');
|
|
13
|
+
var ai = require('../ai/routes/ai.js');
|
|
13
14
|
|
|
14
15
|
const routes = {
|
|
15
16
|
admin: {
|
|
@@ -24,7 +25,8 @@ const routes = {
|
|
|
24
25
|
...apiTokens,
|
|
25
26
|
...contentApi,
|
|
26
27
|
...transfer,
|
|
27
|
-
...homepage
|
|
28
|
+
...homepage,
|
|
29
|
+
...ai.routes
|
|
28
30
|
]
|
|
29
31
|
}
|
|
30
32
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sources":["../../../../../server/src/routes/index.ts"],"sourcesContent":["import admin from './admin';\nimport authentication from './authentication';\nimport permissions from './permissions';\nimport users from './users';\nimport roles from './roles';\nimport webhooks from './webhooks';\nimport apiTokens from './api-tokens';\nimport contentApi from './content-api';\nimport transfer from './transfer';\nimport homepage from './homepage';\n\nconst routes = {\n admin: {\n type: 'admin',\n routes: [\n ...admin,\n ...authentication,\n ...permissions,\n ...users,\n ...roles,\n ...webhooks,\n ...apiTokens,\n ...contentApi,\n ...transfer,\n ...homepage,\n ],\n },\n};\n\nexport default routes;\n"],"names":["routes","admin","type","authentication","permissions","users","roles","webhooks","apiTokens","contentApi","transfer","homepage"],"mappings":"
|
|
1
|
+
{"version":3,"file":"index.js","sources":["../../../../../server/src/routes/index.ts"],"sourcesContent":["import admin from './admin';\nimport authentication from './authentication';\nimport permissions from './permissions';\nimport users from './users';\nimport roles from './roles';\nimport webhooks from './webhooks';\nimport apiTokens from './api-tokens';\nimport contentApi from './content-api';\nimport transfer from './transfer';\nimport homepage from './homepage';\nimport aiRoutes from '../ai/routes/ai';\n\nconst routes = {\n admin: {\n type: 'admin',\n routes: [\n ...admin,\n ...authentication,\n ...permissions,\n ...users,\n ...roles,\n ...webhooks,\n ...apiTokens,\n ...contentApi,\n ...transfer,\n ...homepage,\n ...aiRoutes.routes,\n ],\n },\n};\n\nexport default routes;\n"],"names":["routes","admin","type","authentication","permissions","users","roles","webhooks","apiTokens","contentApi","transfer","homepage","aiRoutes"],"mappings":";;;;;;;;;;;;;;AAYA,MAAMA,MAAAA,GAAS;IACbC,KAAAA,EAAO;QACLC,IAAAA,EAAM,OAAA;QACNF,MAAAA,EAAQ;AACHC,YAAAA,GAAAA,KAAAA;AACAE,YAAAA,GAAAA,cAAAA;AACAC,YAAAA,GAAAA,WAAAA;AACAC,YAAAA,GAAAA,KAAAA;AACAC,YAAAA,GAAAA,KAAAA;AACAC,YAAAA,GAAAA,QAAAA;AACAC,YAAAA,GAAAA,SAAAA;AACAC,YAAAA,GAAAA,UAAAA;AACAC,YAAAA,GAAAA,QAAAA;AACAC,YAAAA,GAAAA,QAAAA;AACAC,YAAAA,GAAAA,EAAAA,CAASZ;AACb;AACH;AACF;;;;"}
|
|
@@ -8,6 +8,7 @@ import apiTokens from './api-tokens.mjs';
|
|
|
8
8
|
import contentApi from './content-api.mjs';
|
|
9
9
|
import transfer from './transfer.mjs';
|
|
10
10
|
import homepage from './homepage.mjs';
|
|
11
|
+
import aiRoutes from '../ai/routes/ai.mjs';
|
|
11
12
|
|
|
12
13
|
const routes = {
|
|
13
14
|
admin: {
|
|
@@ -22,7 +23,8 @@ const routes = {
|
|
|
22
23
|
...apiTokens,
|
|
23
24
|
...contentApi,
|
|
24
25
|
...transfer,
|
|
25
|
-
...homepage
|
|
26
|
+
...homepage,
|
|
27
|
+
...aiRoutes.routes
|
|
26
28
|
]
|
|
27
29
|
}
|
|
28
30
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.mjs","sources":["../../../../../server/src/routes/index.ts"],"sourcesContent":["import admin from './admin';\nimport authentication from './authentication';\nimport permissions from './permissions';\nimport users from './users';\nimport roles from './roles';\nimport webhooks from './webhooks';\nimport apiTokens from './api-tokens';\nimport contentApi from './content-api';\nimport transfer from './transfer';\nimport homepage from './homepage';\n\nconst routes = {\n admin: {\n type: 'admin',\n routes: [\n ...admin,\n ...authentication,\n ...permissions,\n ...users,\n ...roles,\n ...webhooks,\n ...apiTokens,\n ...contentApi,\n ...transfer,\n ...homepage,\n ],\n },\n};\n\nexport default routes;\n"],"names":["routes","admin","type","authentication","permissions","users","roles","webhooks","apiTokens","contentApi","transfer","homepage"],"mappings":"
|
|
1
|
+
{"version":3,"file":"index.mjs","sources":["../../../../../server/src/routes/index.ts"],"sourcesContent":["import admin from './admin';\nimport authentication from './authentication';\nimport permissions from './permissions';\nimport users from './users';\nimport roles from './roles';\nimport webhooks from './webhooks';\nimport apiTokens from './api-tokens';\nimport contentApi from './content-api';\nimport transfer from './transfer';\nimport homepage from './homepage';\nimport aiRoutes from '../ai/routes/ai';\n\nconst routes = {\n admin: {\n type: 'admin',\n routes: [\n ...admin,\n ...authentication,\n ...permissions,\n ...users,\n ...roles,\n ...webhooks,\n ...apiTokens,\n ...contentApi,\n ...transfer,\n ...homepage,\n ...aiRoutes.routes,\n ],\n },\n};\n\nexport default routes;\n"],"names":["routes","admin","type","authentication","permissions","users","roles","webhooks","apiTokens","contentApi","transfer","homepage","aiRoutes"],"mappings":";;;;;;;;;;;;AAYA,MAAMA,MAAAA,GAAS;IACbC,KAAAA,EAAO;QACLC,IAAAA,EAAM,OAAA;QACNF,MAAAA,EAAQ;AACHC,YAAAA,GAAAA,KAAAA;AACAE,YAAAA,GAAAA,cAAAA;AACAC,YAAAA,GAAAA,WAAAA;AACAC,YAAAA,GAAAA,KAAAA;AACAC,YAAAA,GAAAA,KAAAA;AACAC,YAAAA,GAAAA,QAAAA;AACAC,YAAAA,GAAAA,SAAAA;AACAC,YAAAA,GAAAA,UAAAA;AACAC,YAAAA,GAAAA,QAAAA;AACAC,YAAAA,GAAAA,QAAAA;AACAC,YAAAA,GAAAA,QAAAA,CAASZ;AACb;AACH;AACF;;;;"}
|
|
@@ -2,7 +2,7 @@ import type { Context } from 'koa';
|
|
|
2
2
|
declare const _default: {
|
|
3
3
|
getAiToken(ctx: Context): Promise<Context | undefined>;
|
|
4
4
|
getAiUsage(ctx: Context): Promise<Context | undefined>;
|
|
5
|
-
|
|
5
|
+
getAiFeatureConfig(ctx: Context): Promise<Context | undefined>;
|
|
6
6
|
};
|
|
7
7
|
export default _default;
|
|
8
8
|
//# sourceMappingURL=ai.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ai.d.ts","sourceRoot":"","sources":["../../../../../server/src/ai/controllers/ai.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,KAAK,CAAC;;oBAIX,OAAO;oBAwBP,OAAO;4BAeC,OAAO;;AAxCvC,wBA0DE"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ai.d.ts","sourceRoot":"","sources":["../../../../../server/src/ai/routes/ai.ts"],"names":[],"mappings":";;;;;;;;;;;AAAA,wBA4BE"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
import type { Core } from '@strapi/types';
|
|
2
|
+
declare const createAiAdminService: ({ strapi }: {
|
|
3
|
+
strapi: Core.Strapi;
|
|
4
|
+
}) => {
|
|
5
|
+
isEnabled: () => boolean;
|
|
6
|
+
getAiFeatureConfig: () => Promise<{
|
|
7
|
+
isAiI18nConfigured: boolean;
|
|
8
|
+
isAiMediaLibraryConfigured: boolean;
|
|
9
|
+
}>;
|
|
10
|
+
getAiToken: () => Promise<{
|
|
11
|
+
token: string;
|
|
12
|
+
expiresAt: string | undefined;
|
|
13
|
+
}>;
|
|
14
|
+
getAiUsage: () => Promise<{
|
|
15
|
+
subscription: {
|
|
16
|
+
subscriptionId: string;
|
|
17
|
+
planPriceId: string;
|
|
18
|
+
subscriptionStatus: string;
|
|
19
|
+
isActiveSubscription: boolean;
|
|
20
|
+
cmsAiEnabled: boolean;
|
|
21
|
+
cmsAiCreditsBase: number;
|
|
22
|
+
cmsAiCreditsMaxUsage: number;
|
|
23
|
+
currentTermStart: string;
|
|
24
|
+
currentTermEnd: string;
|
|
25
|
+
};
|
|
26
|
+
cmsAiCreditsUsed: number;
|
|
27
|
+
}>;
|
|
28
|
+
};
|
|
29
|
+
export { createAiAdminService };
|
|
30
|
+
//# sourceMappingURL=ai.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ai.d.ts","sourceRoot":"","sources":["../../../../../server/src/ai/services/ai.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,eAAe,CAAC;AAM1C,QAAA,MAAM,oBAAoB,eAAgB;IAAE,MAAM,EAAE,KAAK,MAAM,CAAA;CAAE;qBAczC,OAAO;;;;;;;;;;;4BAyOH,MAAM;yBACT,MAAM;gCACC,MAAM;kCACJ,OAAO;0BACf,OAAO;8BACH,MAAM;kCACF,MAAM;8BACV,MAAM;4BACR,MAAM;;0BAVE,MAAM;;CAsCzC,CAAC;AAEF,OAAO,EAAE,oBAAoB,EAAE,CAAC"}
|
|
@@ -149,6 +149,11 @@ declare const _default: {
|
|
|
149
149
|
};
|
|
150
150
|
}>;
|
|
151
151
|
};
|
|
152
|
+
ai: {
|
|
153
|
+
getAiToken(ctx: import("koa").Context): Promise<import("koa").Context | undefined>;
|
|
154
|
+
getAiUsage(ctx: import("koa").Context): Promise<import("koa").Context | undefined>;
|
|
155
|
+
getAiFeatureConfig(ctx: import("koa").Context): Promise<import("koa").Context | undefined>;
|
|
156
|
+
};
|
|
152
157
|
};
|
|
153
158
|
export default _default;
|
|
154
159
|
//# sourceMappingURL=index.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../server/src/controllers/index.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../server/src/controllers/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAeA,wBAaE"}
|
|
@@ -370,6 +370,11 @@ declare let admin: {
|
|
|
370
370
|
};
|
|
371
371
|
}>;
|
|
372
372
|
};
|
|
373
|
+
ai: {
|
|
374
|
+
getAiToken(ctx: import("koa").Context): Promise<import("koa").Context | undefined>;
|
|
375
|
+
getAiUsage(ctx: import("koa").Context): Promise<import("koa").Context | undefined>;
|
|
376
|
+
getAiFeatureConfig(ctx: import("koa").Context): Promise<import("koa").Context | undefined>;
|
|
377
|
+
};
|
|
373
378
|
};
|
|
374
379
|
contentTypes: {
|
|
375
380
|
permission: {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../server/src/index.ts"],"names":[],"mappings":";AAeA,QAAA,IAAI,KAAK
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../server/src/index.ts"],"names":[],"mappings":";AAeA,QAAA,IAAI,KAAK;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAWR,CAAC;AAUF,eAAe,KAAK,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"register.d.ts","sourceRoot":"","sources":["../../../server/src/register.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,eAAe,CAAC;
|
|
1
|
+
{"version":3,"file":"register.d.ts","sourceRoot":"","sources":["../../../server/src/register.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,eAAe,CAAC;qCAMd;IAAE,MAAM,EAAE,KAAK,MAAM,CAAA;CAAE;AAAnD,wBAcE"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../server/src/routes/index.ts"],"names":[],"mappings":";
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../server/src/routes/index.ts"],"names":[],"mappings":";AAYA,QAAA,MAAM,MAAM;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAiBX,CAAC;AAEF,eAAe,MAAM,CAAC"}
|
|
@@ -41,15 +41,15 @@ export declare namespace GetAiUsage {
|
|
|
41
41
|
/**
|
|
42
42
|
* GET /ai-feature-config - Get AI feature config
|
|
43
43
|
*/
|
|
44
|
-
export declare namespace
|
|
44
|
+
export declare namespace GetAiFeatureConfig {
|
|
45
45
|
interface Request {
|
|
46
46
|
query: {};
|
|
47
47
|
body: {};
|
|
48
48
|
}
|
|
49
49
|
interface Response {
|
|
50
50
|
data: {
|
|
51
|
-
|
|
52
|
-
|
|
51
|
+
isAiI18nConfigured: boolean;
|
|
52
|
+
isAiMediaLibraryConfigured: boolean;
|
|
53
53
|
};
|
|
54
54
|
error?: errors.ApplicationError;
|
|
55
55
|
}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@strapi/admin",
|
|
3
|
-
"version": "5.
|
|
3
|
+
"version": "5.43.0",
|
|
4
4
|
"description": "Strapi Admin",
|
|
5
5
|
"homepage": "https://strapi.io",
|
|
6
6
|
"bugs": {
|
|
@@ -91,14 +91,14 @@
|
|
|
91
91
|
"@reduxjs/toolkit": "1.9.7",
|
|
92
92
|
"@strapi/design-system": "2.2.0",
|
|
93
93
|
"@strapi/icons": "2.2.0",
|
|
94
|
-
"@strapi/permissions": "5.
|
|
95
|
-
"@strapi/types": "5.
|
|
96
|
-
"@strapi/typescript-utils": "5.
|
|
97
|
-
"@strapi/utils": "5.
|
|
94
|
+
"@strapi/permissions": "5.43.0",
|
|
95
|
+
"@strapi/types": "5.43.0",
|
|
96
|
+
"@strapi/typescript-utils": "5.43.0",
|
|
97
|
+
"@strapi/utils": "5.43.0",
|
|
98
98
|
"@testing-library/dom": "10.4.1",
|
|
99
99
|
"@testing-library/react": "16.3.0",
|
|
100
100
|
"@testing-library/user-event": "14.6.1",
|
|
101
|
-
"axios": "1.15.
|
|
101
|
+
"axios": "1.15.1",
|
|
102
102
|
"bcryptjs": "2.4.3",
|
|
103
103
|
"boxen": "5.1.2",
|
|
104
104
|
"chalk": "^4.1.2",
|
|
@@ -150,8 +150,8 @@
|
|
|
150
150
|
"zod": "3.25.67"
|
|
151
151
|
},
|
|
152
152
|
"devDependencies": {
|
|
153
|
-
"@strapi/admin-test-utils": "5.
|
|
154
|
-
"@strapi/data-transfer": "5.
|
|
153
|
+
"@strapi/admin-test-utils": "5.43.0",
|
|
154
|
+
"@strapi/data-transfer": "5.43.0",
|
|
155
155
|
"@types/codemirror5": "npm:@types/codemirror@^5.60.15",
|
|
156
156
|
"@types/fs-extra": "11.0.4",
|
|
157
157
|
"@types/invariant": "2.2.36",
|
|
@@ -1,15 +0,0 @@
|
|
|
1
|
-
import type { Core } from '@strapi/types';
|
|
2
|
-
declare const createAIContainer: ({ strapi }: {
|
|
3
|
-
strapi: Core.Strapi;
|
|
4
|
-
}) => {
|
|
5
|
-
getAIFeatureConfig: () => Promise<{
|
|
6
|
-
isAIi18nConfigured: boolean;
|
|
7
|
-
isAIMediaLibraryConfigured: boolean;
|
|
8
|
-
}>;
|
|
9
|
-
getAiToken: () => Promise<{
|
|
10
|
-
token: string;
|
|
11
|
-
expiresAt: string | undefined;
|
|
12
|
-
}>;
|
|
13
|
-
};
|
|
14
|
-
export { createAIContainer };
|
|
15
|
-
//# sourceMappingURL=ai.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"ai.d.ts","sourceRoot":"","sources":["../../../../../../ee/server/src/ai/containers/ai.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,eAAe,CAAC;AAmB1C,QAAA,MAAM,iBAAiB,eAAgB;IAAE,MAAM,EAAE,KAAK,MAAM,CAAA;CAAE;;;;;;;;;CAoL7D,CAAC;AAEF,OAAO,EAAE,iBAAiB,EAAE,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"ai.d.ts","sourceRoot":"","sources":["../../../../../../ee/server/src/ai/controllers/ai.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,KAAK,CAAC;;oBAOX,OAAO;oBAmBP,OAAO;4BA4HC,OAAO;;AAhJvC,wBAuJE"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"ai.d.ts","sourceRoot":"","sources":["../../../../../../ee/server/src/ai/routes/ai.ts"],"names":[],"mappings":";;;;;;;;;;;AAAA,wBA4BE"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"ai.js","sources":["../../../../../../../ee/server/src/ai/containers/ai.ts"],"sourcesContent":["import type { Core } from '@strapi/types';\nimport crypto from 'crypto';\nimport fs from 'fs';\nimport path from 'path';\nimport { AdminUser } from '../../../../../shared/contracts/shared';\n\n/**\n * In-memory cache for AI tokens\n * Key format: `${projectId}:${userId}`\n */\nconst aiTokenCache = new Map<\n string,\n {\n token: string;\n expiresAt?: string;\n expiresAtMs?: number;\n }\n>();\n\nconst createAIContainer = ({ strapi }: { strapi: Core.Strapi }) => {\n const getAIFeatureConfig = async () => {\n const i18nSettings = await strapi.plugin('i18n').service('settings').getSettings();\n const uploadSettings = await strapi.plugin('upload').service('upload').getSettings();\n\n return {\n isAIi18nConfigured: Boolean(i18nSettings?.aiLocalizations),\n isAIMediaLibraryConfigured: Boolean(uploadSettings?.aiMetadata),\n };\n };\n\n const getAiToken = async () => {\n const ERROR_PREFIX = 'AI token request failed:';\n\n // Check if EE features are enabled first\n if (!strapi.ee?.isEE) {\n strapi.log.error(`${ERROR_PREFIX} Enterprise Edition features are not enabled`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n // Get the EE license\n // First try environment variable, then try reading from file\n let eeLicense = process.env.STRAPI_LICENSE;\n\n if (!eeLicense) {\n try {\n const licensePath = path.join(strapi.dirs.app.root, 'license.txt');\n eeLicense = fs.readFileSync(licensePath).toString();\n } catch (error) {\n // License file doesn't exist or can't be read\n }\n }\n\n if (!eeLicense) {\n strapi.log.error(\n `${ERROR_PREFIX} No EE license found. Please ensure STRAPI_LICENSE environment variable is set or license.txt file exists.`\n );\n\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n const aiServerUrl = process.env.STRAPI_AI_URL || 'https://strapi-ai.apps.strapi.io';\n\n if (!aiServerUrl) {\n strapi.log.error(\n `${ERROR_PREFIX} AI server URL not configured. Please set STRAPI_AI_URL environment variable.`\n );\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n // Get the current user\n const user = strapi.requestContext.get()?.state?.user as AdminUser | undefined;\n if (!user) {\n strapi.log.error(`${ERROR_PREFIX} No authenticated user in request context`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n // Create a secure user identifier using only user ID\n const userIdentifier = user.id.toString();\n\n // Get project ID\n const projectId = strapi.config.get('uuid');\n if (!projectId) {\n strapi.log.error(`${ERROR_PREFIX} Project ID not configured`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n // Check cache for existing valid token\n const cacheKey = `${projectId}:${userIdentifier}`;\n const cachedToken = aiTokenCache.get(cacheKey);\n\n if (cachedToken) {\n const now = Date.now();\n // Check if token is still valid (with buffer so it has time to to be used)\n const bufferMs = 2 * 60 * 1000; // 2 minutes\n\n if (cachedToken.expiresAtMs && cachedToken.expiresAtMs - bufferMs > now) {\n strapi.log.info('Using cached AI token');\n\n return {\n token: cachedToken.token,\n expiresAt: cachedToken.expiresAt,\n };\n }\n\n // Token expired or will expire soon, remove from cache\n aiTokenCache.delete(cacheKey);\n }\n\n strapi.log.http('Contacting AI Server for token generation');\n\n try {\n // Call the AI server's getAiJWT endpoint\n const response = await fetch(`${aiServerUrl}/auth/getAiJWT`, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n // No authorization header needed for public endpoint\n // Add request ID for tracing\n 'X-Request-Id': crypto.randomUUID(),\n },\n body: JSON.stringify({\n eeLicense,\n userIdentifier,\n projectId,\n }),\n });\n\n if (!response.ok) {\n let errorData;\n let errorText;\n try {\n errorText = await response.text();\n errorData = JSON.parse(errorText);\n } catch {\n errorData = { error: errorText || 'Failed to parse error response' };\n }\n\n strapi.log.error(`${ERROR_PREFIX} ${errorData?.error || 'Unknown error'}`, {\n status: response.status,\n statusText: response.statusText,\n error: errorData,\n errorText,\n projectId,\n });\n\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n let data;\n try {\n data = (await response.json()) as {\n jwt: string;\n expiresAt?: string;\n };\n } catch (parseError) {\n strapi.log.error(`${ERROR_PREFIX} Failed to parse AI server response`, parseError);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n if (!data.jwt) {\n strapi.log.error(`${ERROR_PREFIX} Invalid response: missing JWT token`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n strapi.log.info('AI token generated successfully', {\n userId: user.id,\n expiresAt: data.expiresAt,\n });\n\n // Cache the token if it has an expiration time\n if (data.expiresAt) {\n const expiresAtMs = new Date(data.expiresAt).getTime();\n aiTokenCache.set(cacheKey, {\n token: data.jwt,\n expiresAt: data.expiresAt,\n expiresAtMs,\n });\n }\n\n // Return the AI JWT with metadata\n // Note: Token expires in 1 hour, client should handle refresh\n return {\n token: data.jwt,\n expiresAt: data.expiresAt, // 1 hour from generation\n };\n } catch (fetchError) {\n if (fetchError instanceof Error && fetchError.name === 'AbortError') {\n strapi.log.error(`${ERROR_PREFIX} Request to AI server timed out`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n throw fetchError;\n }\n };\n\n return {\n getAIFeatureConfig,\n getAiToken,\n };\n};\n\nexport { createAIContainer };\n"],"names":["aiTokenCache","Map","createAIContainer","strapi","getAIFeatureConfig","i18nSettings","plugin","service","getSettings","uploadSettings","isAIi18nConfigured","Boolean","aiLocalizations","isAIMediaLibraryConfigured","aiMetadata","getAiToken","ERROR_PREFIX","ee","isEE","log","error","Error","eeLicense","process","env","STRAPI_LICENSE","licensePath","path","join","dirs","app","root","fs","readFileSync","toString","aiServerUrl","STRAPI_AI_URL","user","requestContext","get","state","userIdentifier","id","projectId","config","cacheKey","cachedToken","now","Date","bufferMs","expiresAtMs","info","token","expiresAt","delete","http","response","fetch","method","headers","crypto","randomUUID","body","JSON","stringify","ok","errorData","errorText","text","parse","status","statusText","data","json","parseError","jwt","userId","getTime","set","fetchError","name"],"mappings":";;;;;;AAMA;;;IAIA,MAAMA,eAAe,IAAIC,GAAAA,EAAAA;AASzB,MAAMC,iBAAAA,GAAoB,CAAC,EAAEC,MAAM,EAA2B,GAAA;AAC5D,IAAA,MAAMC,kBAAAA,GAAqB,UAAA;QACzB,MAAMC,YAAAA,GAAe,MAAMF,MAAAA,CAAOG,MAAM,CAAC,MAAA,CAAA,CAAQC,OAAO,CAAC,UAAA,CAAA,CAAYC,WAAW,EAAA;QAChF,MAAMC,cAAAA,GAAiB,MAAMN,MAAAA,CAAOG,MAAM,CAAC,QAAA,CAAA,CAAUC,OAAO,CAAC,QAAA,CAAA,CAAUC,WAAW,EAAA;QAElF,OAAO;AACLE,YAAAA,kBAAAA,EAAoBC,QAAQN,YAAAA,EAAcO,eAAAA,CAAAA;AAC1CC,YAAAA,0BAAAA,EAA4BF,QAAQF,cAAAA,EAAgBK,UAAAA;AACtD,SAAA;AACF,IAAA,CAAA;AAEA,IAAA,MAAMC,UAAAA,GAAa,UAAA;AACjB,QAAA,MAAMC,YAAAA,GAAe,0BAAA;;AAGrB,QAAA,IAAI,CAACb,MAAAA,CAAOc,EAAE,EAAEC,IAAAA,EAAM;AACpBf,YAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,4CAA4C,CAAC,CAAA;AAC9E,YAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,QAAA;;;AAIA,QAAA,IAAIC,SAAAA,GAAYC,OAAAA,CAAQC,GAAG,CAACC,cAAc;AAE1C,QAAA,IAAI,CAACH,SAAAA,EAAW;YACd,IAAI;gBACF,MAAMI,WAAAA,GAAcC,IAAAA,CAAKC,IAAI,CAACzB,MAAAA,CAAO0B,IAAI,CAACC,GAAG,CAACC,IAAI,EAAE,aAAA,CAAA;AACpDT,gBAAAA,SAAAA,GAAYU,EAAAA,CAAGC,YAAY,CAACP,WAAAA,CAAAA,CAAaQ,QAAQ,EAAA;AACnD,YAAA,CAAA,CAAE,OAAOd,KAAAA,EAAO;;AAEhB,YAAA;AACF,QAAA;AAEA,QAAA,IAAI,CAACE,SAAAA,EAAW;AACdnB,YAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CACd,CAAA,EAAGJ,YAAAA,CAAa,0GAA0G,CAAC,CAAA;AAG7H,YAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,QAAA;AAEA,QAAA,MAAMc,WAAAA,GAAcZ,OAAAA,CAAQC,GAAG,CAACY,aAAa,IAAI,kCAAA;;AAUjD,QAAA,MAAMC,OAAOlC,MAAAA,CAAOmC,cAAc,CAACC,GAAG,IAAIC,KAAAA,EAAOH,IAAAA;AACjD,QAAA,IAAI,CAACA,IAAAA,EAAM;AACTlC,YAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,yCAAyC,CAAC,CAAA;AAC3E,YAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,QAAA;;AAGA,QAAA,MAAMoB,cAAAA,GAAiBJ,IAAAA,CAAKK,EAAE,CAACR,QAAQ,EAAA;;AAGvC,QAAA,MAAMS,SAAAA,GAAYxC,MAAAA,CAAOyC,MAAM,CAACL,GAAG,CAAC,MAAA,CAAA;AACpC,QAAA,IAAI,CAACI,SAAAA,EAAW;AACdxC,YAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,0BAA0B,CAAC,CAAA;AAC5D,YAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,QAAA;;AAGA,QAAA,MAAMwB,QAAAA,GAAW,CAAA,EAAGF,SAAAA,CAAU,CAAC,EAAEF,cAAAA,CAAAA,CAAgB;QACjD,MAAMK,WAAAA,GAAc9C,YAAAA,CAAauC,GAAG,CAACM,QAAAA,CAAAA;AAErC,QAAA,IAAIC,WAAAA,EAAa;YACf,MAAMC,GAAAA,GAAMC,KAAKD,GAAG,EAAA;;AAEpB,YAAA,MAAME,QAAAA,GAAW,CAAA,GAAI,EAAA,GAAK,IAAA,CAAA;AAE1B,YAAA,IAAIH,YAAYI,WAAW,IAAIJ,YAAYI,WAAW,GAAGD,WAAWF,GAAAA,EAAK;gBACvE5C,MAAAA,CAAOgB,GAAG,CAACgC,IAAI,CAAC,uBAAA,CAAA;gBAEhB,OAAO;AACLC,oBAAAA,KAAAA,EAAON,YAAYM,KAAK;AACxBC,oBAAAA,SAAAA,EAAWP,YAAYO;AACzB,iBAAA;AACF,YAAA;;AAGArD,YAAAA,YAAAA,CAAasD,MAAM,CAACT,QAAAA,CAAAA;AACtB,QAAA;QAEA1C,MAAAA,CAAOgB,GAAG,CAACoC,IAAI,CAAC,2CAAA,CAAA;QAEhB,IAAI;;AAEF,YAAA,MAAMC,WAAW,MAAMC,KAAAA,CAAM,GAAGtB,WAAAA,CAAY,cAAc,CAAC,EAAE;gBAC3DuB,MAAAA,EAAQ,MAAA;gBACRC,OAAAA,EAAS;oBACP,cAAA,EAAgB,kBAAA;;;AAGhB,oBAAA,cAAA,EAAgBC,OAAOC,UAAU;AACnC,iBAAA;gBACAC,IAAAA,EAAMC,IAAAA,CAAKC,SAAS,CAAC;AACnB1C,oBAAAA,SAAAA;AACAmB,oBAAAA,cAAAA;AACAE,oBAAAA;AACF,iBAAA;AACF,aAAA,CAAA;YAEA,IAAI,CAACa,QAAAA,CAASS,EAAE,EAAE;gBAChB,IAAIC,SAAAA;gBACJ,IAAIC,SAAAA;gBACJ,IAAI;oBACFA,SAAAA,GAAY,MAAMX,SAASY,IAAI,EAAA;oBAC/BF,SAAAA,GAAYH,IAAAA,CAAKM,KAAK,CAACF,SAAAA,CAAAA;AACzB,gBAAA,CAAA,CAAE,OAAM;oBACND,SAAAA,GAAY;AAAE9C,wBAAAA,KAAAA,EAAO+C,SAAAA,IAAa;AAAiC,qBAAA;AACrE,gBAAA;gBAEAhE,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,CAAC,EAAEkD,SAAAA,EAAW9C,KAAAA,IAAS,eAAA,CAAA,CAAiB,EAAE;AACzEkD,oBAAAA,MAAAA,EAAQd,SAASc,MAAM;AACvBC,oBAAAA,UAAAA,EAAYf,SAASe,UAAU;oBAC/BnD,KAAAA,EAAO8C,SAAAA;AACPC,oBAAAA,SAAAA;AACAxB,oBAAAA;AACF,iBAAA,CAAA;AAEA,gBAAA,MAAM,IAAItB,KAAAA,CAAM,yDAAA,CAAA;AAClB,YAAA;YAEA,IAAImD,IAAAA;YACJ,IAAI;gBACFA,IAAAA,GAAQ,MAAMhB,SAASiB,IAAI,EAAA;AAI7B,YAAA,CAAA,CAAE,OAAOC,UAAAA,EAAY;gBACnBvE,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,GAAGJ,YAAAA,CAAa,mCAAmC,CAAC,EAAE0D,UAAAA,CAAAA;AACvE,gBAAA,MAAM,IAAIrD,KAAAA,CAAM,yDAAA,CAAA;AAClB,YAAA;YAEA,IAAI,CAACmD,IAAAA,CAAKG,GAAG,EAAE;AACbxE,gBAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,oCAAoC,CAAC,CAAA;AACtE,gBAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,YAAA;AAEAlB,YAAAA,MAAAA,CAAOgB,GAAG,CAACgC,IAAI,CAAC,iCAAA,EAAmC;AACjDyB,gBAAAA,MAAAA,EAAQvC,KAAKK,EAAE;AACfW,gBAAAA,SAAAA,EAAWmB,KAAKnB;AAClB,aAAA,CAAA;;YAGA,IAAImB,IAAAA,CAAKnB,SAAS,EAAE;AAClB,gBAAA,MAAMH,cAAc,IAAIF,IAAAA,CAAKwB,IAAAA,CAAKnB,SAAS,EAAEwB,OAAO,EAAA;gBACpD7E,YAAAA,CAAa8E,GAAG,CAACjC,QAAAA,EAAU;AACzBO,oBAAAA,KAAAA,EAAOoB,KAAKG,GAAG;AACftB,oBAAAA,SAAAA,EAAWmB,KAAKnB,SAAS;AACzBH,oBAAAA;AACF,iBAAA,CAAA;AACF,YAAA;;;YAIA,OAAO;AACLE,gBAAAA,KAAAA,EAAOoB,KAAKG,GAAG;AACftB,gBAAAA,SAAAA,EAAWmB,KAAKnB;AAClB,aAAA;AACF,QAAA,CAAA,CAAE,OAAO0B,UAAAA,EAAY;AACnB,YAAA,IAAIA,UAAAA,YAAsB1D,KAAAA,IAAS0D,UAAAA,CAAWC,IAAI,KAAK,YAAA,EAAc;AACnE7E,gBAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,+BAA+B,CAAC,CAAA;AACjE,gBAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,YAAA;YAEA,MAAM0D,UAAAA;AACR,QAAA;AACF,IAAA,CAAA;IAEA,OAAO;AACL3E,QAAAA,kBAAAA;AACAW,QAAAA;AACF,KAAA;AACF;;;;"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"ai.mjs","sources":["../../../../../../../ee/server/src/ai/containers/ai.ts"],"sourcesContent":["import type { Core } from '@strapi/types';\nimport crypto from 'crypto';\nimport fs from 'fs';\nimport path from 'path';\nimport { AdminUser } from '../../../../../shared/contracts/shared';\n\n/**\n * In-memory cache for AI tokens\n * Key format: `${projectId}:${userId}`\n */\nconst aiTokenCache = new Map<\n string,\n {\n token: string;\n expiresAt?: string;\n expiresAtMs?: number;\n }\n>();\n\nconst createAIContainer = ({ strapi }: { strapi: Core.Strapi }) => {\n const getAIFeatureConfig = async () => {\n const i18nSettings = await strapi.plugin('i18n').service('settings').getSettings();\n const uploadSettings = await strapi.plugin('upload').service('upload').getSettings();\n\n return {\n isAIi18nConfigured: Boolean(i18nSettings?.aiLocalizations),\n isAIMediaLibraryConfigured: Boolean(uploadSettings?.aiMetadata),\n };\n };\n\n const getAiToken = async () => {\n const ERROR_PREFIX = 'AI token request failed:';\n\n // Check if EE features are enabled first\n if (!strapi.ee?.isEE) {\n strapi.log.error(`${ERROR_PREFIX} Enterprise Edition features are not enabled`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n // Get the EE license\n // First try environment variable, then try reading from file\n let eeLicense = process.env.STRAPI_LICENSE;\n\n if (!eeLicense) {\n try {\n const licensePath = path.join(strapi.dirs.app.root, 'license.txt');\n eeLicense = fs.readFileSync(licensePath).toString();\n } catch (error) {\n // License file doesn't exist or can't be read\n }\n }\n\n if (!eeLicense) {\n strapi.log.error(\n `${ERROR_PREFIX} No EE license found. Please ensure STRAPI_LICENSE environment variable is set or license.txt file exists.`\n );\n\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n const aiServerUrl = process.env.STRAPI_AI_URL || 'https://strapi-ai.apps.strapi.io';\n\n if (!aiServerUrl) {\n strapi.log.error(\n `${ERROR_PREFIX} AI server URL not configured. Please set STRAPI_AI_URL environment variable.`\n );\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n // Get the current user\n const user = strapi.requestContext.get()?.state?.user as AdminUser | undefined;\n if (!user) {\n strapi.log.error(`${ERROR_PREFIX} No authenticated user in request context`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n // Create a secure user identifier using only user ID\n const userIdentifier = user.id.toString();\n\n // Get project ID\n const projectId = strapi.config.get('uuid');\n if (!projectId) {\n strapi.log.error(`${ERROR_PREFIX} Project ID not configured`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n // Check cache for existing valid token\n const cacheKey = `${projectId}:${userIdentifier}`;\n const cachedToken = aiTokenCache.get(cacheKey);\n\n if (cachedToken) {\n const now = Date.now();\n // Check if token is still valid (with buffer so it has time to to be used)\n const bufferMs = 2 * 60 * 1000; // 2 minutes\n\n if (cachedToken.expiresAtMs && cachedToken.expiresAtMs - bufferMs > now) {\n strapi.log.info('Using cached AI token');\n\n return {\n token: cachedToken.token,\n expiresAt: cachedToken.expiresAt,\n };\n }\n\n // Token expired or will expire soon, remove from cache\n aiTokenCache.delete(cacheKey);\n }\n\n strapi.log.http('Contacting AI Server for token generation');\n\n try {\n // Call the AI server's getAiJWT endpoint\n const response = await fetch(`${aiServerUrl}/auth/getAiJWT`, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n // No authorization header needed for public endpoint\n // Add request ID for tracing\n 'X-Request-Id': crypto.randomUUID(),\n },\n body: JSON.stringify({\n eeLicense,\n userIdentifier,\n projectId,\n }),\n });\n\n if (!response.ok) {\n let errorData;\n let errorText;\n try {\n errorText = await response.text();\n errorData = JSON.parse(errorText);\n } catch {\n errorData = { error: errorText || 'Failed to parse error response' };\n }\n\n strapi.log.error(`${ERROR_PREFIX} ${errorData?.error || 'Unknown error'}`, {\n status: response.status,\n statusText: response.statusText,\n error: errorData,\n errorText,\n projectId,\n });\n\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n let data;\n try {\n data = (await response.json()) as {\n jwt: string;\n expiresAt?: string;\n };\n } catch (parseError) {\n strapi.log.error(`${ERROR_PREFIX} Failed to parse AI server response`, parseError);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n if (!data.jwt) {\n strapi.log.error(`${ERROR_PREFIX} Invalid response: missing JWT token`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n strapi.log.info('AI token generated successfully', {\n userId: user.id,\n expiresAt: data.expiresAt,\n });\n\n // Cache the token if it has an expiration time\n if (data.expiresAt) {\n const expiresAtMs = new Date(data.expiresAt).getTime();\n aiTokenCache.set(cacheKey, {\n token: data.jwt,\n expiresAt: data.expiresAt,\n expiresAtMs,\n });\n }\n\n // Return the AI JWT with metadata\n // Note: Token expires in 1 hour, client should handle refresh\n return {\n token: data.jwt,\n expiresAt: data.expiresAt, // 1 hour from generation\n };\n } catch (fetchError) {\n if (fetchError instanceof Error && fetchError.name === 'AbortError') {\n strapi.log.error(`${ERROR_PREFIX} Request to AI server timed out`);\n throw new Error('AI token request failed. Check server logs for details.');\n }\n\n throw fetchError;\n }\n };\n\n return {\n getAIFeatureConfig,\n getAiToken,\n };\n};\n\nexport { createAIContainer };\n"],"names":["aiTokenCache","Map","createAIContainer","strapi","getAIFeatureConfig","i18nSettings","plugin","service","getSettings","uploadSettings","isAIi18nConfigured","Boolean","aiLocalizations","isAIMediaLibraryConfigured","aiMetadata","getAiToken","ERROR_PREFIX","ee","isEE","log","error","Error","eeLicense","process","env","STRAPI_LICENSE","licensePath","path","join","dirs","app","root","fs","readFileSync","toString","aiServerUrl","STRAPI_AI_URL","user","requestContext","get","state","userIdentifier","id","projectId","config","cacheKey","cachedToken","now","Date","bufferMs","expiresAtMs","info","token","expiresAt","delete","http","response","fetch","method","headers","crypto","randomUUID","body","JSON","stringify","ok","errorData","errorText","text","parse","status","statusText","data","json","parseError","jwt","userId","getTime","set","fetchError","name"],"mappings":";;;;AAMA;;;IAIA,MAAMA,eAAe,IAAIC,GAAAA,EAAAA;AASzB,MAAMC,iBAAAA,GAAoB,CAAC,EAAEC,MAAM,EAA2B,GAAA;AAC5D,IAAA,MAAMC,kBAAAA,GAAqB,UAAA;QACzB,MAAMC,YAAAA,GAAe,MAAMF,MAAAA,CAAOG,MAAM,CAAC,MAAA,CAAA,CAAQC,OAAO,CAAC,UAAA,CAAA,CAAYC,WAAW,EAAA;QAChF,MAAMC,cAAAA,GAAiB,MAAMN,MAAAA,CAAOG,MAAM,CAAC,QAAA,CAAA,CAAUC,OAAO,CAAC,QAAA,CAAA,CAAUC,WAAW,EAAA;QAElF,OAAO;AACLE,YAAAA,kBAAAA,EAAoBC,QAAQN,YAAAA,EAAcO,eAAAA,CAAAA;AAC1CC,YAAAA,0BAAAA,EAA4BF,QAAQF,cAAAA,EAAgBK,UAAAA;AACtD,SAAA;AACF,IAAA,CAAA;AAEA,IAAA,MAAMC,UAAAA,GAAa,UAAA;AACjB,QAAA,MAAMC,YAAAA,GAAe,0BAAA;;AAGrB,QAAA,IAAI,CAACb,MAAAA,CAAOc,EAAE,EAAEC,IAAAA,EAAM;AACpBf,YAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,4CAA4C,CAAC,CAAA;AAC9E,YAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,QAAA;;;AAIA,QAAA,IAAIC,SAAAA,GAAYC,OAAAA,CAAQC,GAAG,CAACC,cAAc;AAE1C,QAAA,IAAI,CAACH,SAAAA,EAAW;YACd,IAAI;gBACF,MAAMI,WAAAA,GAAcC,IAAAA,CAAKC,IAAI,CAACzB,MAAAA,CAAO0B,IAAI,CAACC,GAAG,CAACC,IAAI,EAAE,aAAA,CAAA;AACpDT,gBAAAA,SAAAA,GAAYU,EAAAA,CAAGC,YAAY,CAACP,WAAAA,CAAAA,CAAaQ,QAAQ,EAAA;AACnD,YAAA,CAAA,CAAE,OAAOd,KAAAA,EAAO;;AAEhB,YAAA;AACF,QAAA;AAEA,QAAA,IAAI,CAACE,SAAAA,EAAW;AACdnB,YAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CACd,CAAA,EAAGJ,YAAAA,CAAa,0GAA0G,CAAC,CAAA;AAG7H,YAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,QAAA;AAEA,QAAA,MAAMc,WAAAA,GAAcZ,OAAAA,CAAQC,GAAG,CAACY,aAAa,IAAI,kCAAA;;AAUjD,QAAA,MAAMC,OAAOlC,MAAAA,CAAOmC,cAAc,CAACC,GAAG,IAAIC,KAAAA,EAAOH,IAAAA;AACjD,QAAA,IAAI,CAACA,IAAAA,EAAM;AACTlC,YAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,yCAAyC,CAAC,CAAA;AAC3E,YAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,QAAA;;AAGA,QAAA,MAAMoB,cAAAA,GAAiBJ,IAAAA,CAAKK,EAAE,CAACR,QAAQ,EAAA;;AAGvC,QAAA,MAAMS,SAAAA,GAAYxC,MAAAA,CAAOyC,MAAM,CAACL,GAAG,CAAC,MAAA,CAAA;AACpC,QAAA,IAAI,CAACI,SAAAA,EAAW;AACdxC,YAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,0BAA0B,CAAC,CAAA;AAC5D,YAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,QAAA;;AAGA,QAAA,MAAMwB,QAAAA,GAAW,CAAA,EAAGF,SAAAA,CAAU,CAAC,EAAEF,cAAAA,CAAAA,CAAgB;QACjD,MAAMK,WAAAA,GAAc9C,YAAAA,CAAauC,GAAG,CAACM,QAAAA,CAAAA;AAErC,QAAA,IAAIC,WAAAA,EAAa;YACf,MAAMC,GAAAA,GAAMC,KAAKD,GAAG,EAAA;;AAEpB,YAAA,MAAME,QAAAA,GAAW,CAAA,GAAI,EAAA,GAAK,IAAA,CAAA;AAE1B,YAAA,IAAIH,YAAYI,WAAW,IAAIJ,YAAYI,WAAW,GAAGD,WAAWF,GAAAA,EAAK;gBACvE5C,MAAAA,CAAOgB,GAAG,CAACgC,IAAI,CAAC,uBAAA,CAAA;gBAEhB,OAAO;AACLC,oBAAAA,KAAAA,EAAON,YAAYM,KAAK;AACxBC,oBAAAA,SAAAA,EAAWP,YAAYO;AACzB,iBAAA;AACF,YAAA;;AAGArD,YAAAA,YAAAA,CAAasD,MAAM,CAACT,QAAAA,CAAAA;AACtB,QAAA;QAEA1C,MAAAA,CAAOgB,GAAG,CAACoC,IAAI,CAAC,2CAAA,CAAA;QAEhB,IAAI;;AAEF,YAAA,MAAMC,WAAW,MAAMC,KAAAA,CAAM,GAAGtB,WAAAA,CAAY,cAAc,CAAC,EAAE;gBAC3DuB,MAAAA,EAAQ,MAAA;gBACRC,OAAAA,EAAS;oBACP,cAAA,EAAgB,kBAAA;;;AAGhB,oBAAA,cAAA,EAAgBC,OAAOC,UAAU;AACnC,iBAAA;gBACAC,IAAAA,EAAMC,IAAAA,CAAKC,SAAS,CAAC;AACnB1C,oBAAAA,SAAAA;AACAmB,oBAAAA,cAAAA;AACAE,oBAAAA;AACF,iBAAA;AACF,aAAA,CAAA;YAEA,IAAI,CAACa,QAAAA,CAASS,EAAE,EAAE;gBAChB,IAAIC,SAAAA;gBACJ,IAAIC,SAAAA;gBACJ,IAAI;oBACFA,SAAAA,GAAY,MAAMX,SAASY,IAAI,EAAA;oBAC/BF,SAAAA,GAAYH,IAAAA,CAAKM,KAAK,CAACF,SAAAA,CAAAA;AACzB,gBAAA,CAAA,CAAE,OAAM;oBACND,SAAAA,GAAY;AAAE9C,wBAAAA,KAAAA,EAAO+C,SAAAA,IAAa;AAAiC,qBAAA;AACrE,gBAAA;gBAEAhE,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,CAAC,EAAEkD,SAAAA,EAAW9C,KAAAA,IAAS,eAAA,CAAA,CAAiB,EAAE;AACzEkD,oBAAAA,MAAAA,EAAQd,SAASc,MAAM;AACvBC,oBAAAA,UAAAA,EAAYf,SAASe,UAAU;oBAC/BnD,KAAAA,EAAO8C,SAAAA;AACPC,oBAAAA,SAAAA;AACAxB,oBAAAA;AACF,iBAAA,CAAA;AAEA,gBAAA,MAAM,IAAItB,KAAAA,CAAM,yDAAA,CAAA;AAClB,YAAA;YAEA,IAAImD,IAAAA;YACJ,IAAI;gBACFA,IAAAA,GAAQ,MAAMhB,SAASiB,IAAI,EAAA;AAI7B,YAAA,CAAA,CAAE,OAAOC,UAAAA,EAAY;gBACnBvE,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,GAAGJ,YAAAA,CAAa,mCAAmC,CAAC,EAAE0D,UAAAA,CAAAA;AACvE,gBAAA,MAAM,IAAIrD,KAAAA,CAAM,yDAAA,CAAA;AAClB,YAAA;YAEA,IAAI,CAACmD,IAAAA,CAAKG,GAAG,EAAE;AACbxE,gBAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,oCAAoC,CAAC,CAAA;AACtE,gBAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,YAAA;AAEAlB,YAAAA,MAAAA,CAAOgB,GAAG,CAACgC,IAAI,CAAC,iCAAA,EAAmC;AACjDyB,gBAAAA,MAAAA,EAAQvC,KAAKK,EAAE;AACfW,gBAAAA,SAAAA,EAAWmB,KAAKnB;AAClB,aAAA,CAAA;;YAGA,IAAImB,IAAAA,CAAKnB,SAAS,EAAE;AAClB,gBAAA,MAAMH,cAAc,IAAIF,IAAAA,CAAKwB,IAAAA,CAAKnB,SAAS,EAAEwB,OAAO,EAAA;gBACpD7E,YAAAA,CAAa8E,GAAG,CAACjC,QAAAA,EAAU;AACzBO,oBAAAA,KAAAA,EAAOoB,KAAKG,GAAG;AACftB,oBAAAA,SAAAA,EAAWmB,KAAKnB,SAAS;AACzBH,oBAAAA;AACF,iBAAA,CAAA;AACF,YAAA;;;YAIA,OAAO;AACLE,gBAAAA,KAAAA,EAAOoB,KAAKG,GAAG;AACftB,gBAAAA,SAAAA,EAAWmB,KAAKnB;AAClB,aAAA;AACF,QAAA,CAAA,CAAE,OAAO0B,UAAAA,EAAY;AACnB,YAAA,IAAIA,UAAAA,YAAsB1D,KAAAA,IAAS0D,UAAAA,CAAWC,IAAI,KAAK,YAAA,EAAc;AACnE7E,gBAAAA,MAAAA,CAAOgB,GAAG,CAACC,KAAK,CAAC,CAAA,EAAGJ,YAAAA,CAAa,+BAA+B,CAAC,CAAA;AACjE,gBAAA,MAAM,IAAIK,KAAAA,CAAM,yDAAA,CAAA;AAClB,YAAA;YAEA,MAAM0D,UAAAA;AACR,QAAA;AACF,IAAA,CAAA;IAEA,OAAO;AACL3E,QAAAA,kBAAAA;AACAW,QAAAA;AACF,KAAA;AACF;;;;"}
|
|
@@ -1,121 +0,0 @@
|
|
|
1
|
-
'use strict';
|
|
2
|
-
|
|
3
|
-
var path = require('path');
|
|
4
|
-
var fs = require('fs');
|
|
5
|
-
var crypto = require('crypto');
|
|
6
|
-
|
|
7
|
-
var aiController = {
|
|
8
|
-
async getAiToken (ctx) {
|
|
9
|
-
try {
|
|
10
|
-
// TODO: auth check is not necessary? Already protected by route middleware?
|
|
11
|
-
// Security check: Ensure user is authenticated and has proper permissions
|
|
12
|
-
if (!ctx.state.user) {
|
|
13
|
-
return ctx.unauthorized('Authentication required');
|
|
14
|
-
}
|
|
15
|
-
const aiToken = await strapi.get('ai').getAiToken();
|
|
16
|
-
ctx.body = {
|
|
17
|
-
data: aiToken
|
|
18
|
-
};
|
|
19
|
-
} catch (error) {
|
|
20
|
-
const errorMessage = 'AI token request failed. Check server logs for details.';
|
|
21
|
-
return ctx.internalServerError(errorMessage);
|
|
22
|
-
}
|
|
23
|
-
},
|
|
24
|
-
async getAiUsage (ctx) {
|
|
25
|
-
const ERROR_PREFIX = 'AI usage data request failed:';
|
|
26
|
-
const USER_ERROR_MESSAGE = 'AI usage data request failed. Check server logs for details.';
|
|
27
|
-
// Security check: Ensure user is authenticated and has proper permissions
|
|
28
|
-
if (!ctx.state.user) {
|
|
29
|
-
return ctx.unauthorized('Authentication required');
|
|
30
|
-
}
|
|
31
|
-
// Check if EE features are enabled first
|
|
32
|
-
if (!strapi.ee?.isEE) {
|
|
33
|
-
strapi.log.error(`${ERROR_PREFIX} Enterprise Edition features are not enabled`);
|
|
34
|
-
return ctx.internalServerError(USER_ERROR_MESSAGE);
|
|
35
|
-
}
|
|
36
|
-
// Get the EE license
|
|
37
|
-
// First try environment variable, then try reading from file
|
|
38
|
-
let eeLicense = process.env.STRAPI_LICENSE;
|
|
39
|
-
if (!eeLicense) {
|
|
40
|
-
try {
|
|
41
|
-
const licensePath = path.join(strapi.dirs.app.root, 'license.txt');
|
|
42
|
-
eeLicense = fs.readFileSync(licensePath).toString();
|
|
43
|
-
} catch (error) {
|
|
44
|
-
// License file doesn't exist or can't be read
|
|
45
|
-
}
|
|
46
|
-
}
|
|
47
|
-
if (!eeLicense) {
|
|
48
|
-
strapi.log.error(`${ERROR_PREFIX} No EE license found. Please ensure STRAPI_LICENSE environment variable is set or license.txt file exists.`);
|
|
49
|
-
return ctx.internalServerError(USER_ERROR_MESSAGE);
|
|
50
|
-
}
|
|
51
|
-
const aiServerUrl = process.env.STRAPI_AI_URL || 'https://strapi-ai.apps.strapi.io';
|
|
52
|
-
// Get project ID
|
|
53
|
-
const projectId = strapi.config.get('uuid');
|
|
54
|
-
if (!projectId) {
|
|
55
|
-
strapi.log.error(`${ERROR_PREFIX} Project ID not configured`);
|
|
56
|
-
return ctx.internalServerError(USER_ERROR_MESSAGE);
|
|
57
|
-
}
|
|
58
|
-
try {
|
|
59
|
-
// Call the AI server's getAiJWT endpoint
|
|
60
|
-
const response = await fetch(`${aiServerUrl}/cms/ai-data`, {
|
|
61
|
-
method: 'POST',
|
|
62
|
-
headers: {
|
|
63
|
-
'Content-Type': 'application/json',
|
|
64
|
-
// No authorization header needed for public endpoint
|
|
65
|
-
// Add request ID for tracing
|
|
66
|
-
'X-Request-Id': crypto.randomUUID()
|
|
67
|
-
},
|
|
68
|
-
body: JSON.stringify({
|
|
69
|
-
eeKey: eeLicense,
|
|
70
|
-
projectId
|
|
71
|
-
})
|
|
72
|
-
});
|
|
73
|
-
if (!response.ok) {
|
|
74
|
-
let errorData;
|
|
75
|
-
let errorText;
|
|
76
|
-
try {
|
|
77
|
-
errorText = await response.text();
|
|
78
|
-
errorData = JSON.parse(errorText);
|
|
79
|
-
} catch {
|
|
80
|
-
errorData = {
|
|
81
|
-
error: errorText || 'Failed to parse error response'
|
|
82
|
-
};
|
|
83
|
-
}
|
|
84
|
-
strapi.log.error(`${ERROR_PREFIX} ${errorData?.error || 'Unknown error'}`, {
|
|
85
|
-
status: response.status,
|
|
86
|
-
statusText: response.statusText,
|
|
87
|
-
error: errorData,
|
|
88
|
-
errorText,
|
|
89
|
-
projectId
|
|
90
|
-
});
|
|
91
|
-
return ctx.internalServerError(USER_ERROR_MESSAGE);
|
|
92
|
-
}
|
|
93
|
-
let data;
|
|
94
|
-
try {
|
|
95
|
-
data = await response.json();
|
|
96
|
-
} catch (parseError) {
|
|
97
|
-
strapi.log.error(`${ERROR_PREFIX} Failed to parse AI server response`, parseError);
|
|
98
|
-
return ctx.internalServerError(USER_ERROR_MESSAGE);
|
|
99
|
-
}
|
|
100
|
-
ctx.body = {
|
|
101
|
-
...data.data,
|
|
102
|
-
subscription: data.subscription
|
|
103
|
-
};
|
|
104
|
-
} catch (fetchError) {
|
|
105
|
-
if (fetchError instanceof Error && fetchError.name === 'AbortError') {
|
|
106
|
-
strapi.log.error(`${ERROR_PREFIX} Request to AI server timed out`);
|
|
107
|
-
return ctx.internalServerError(USER_ERROR_MESSAGE);
|
|
108
|
-
}
|
|
109
|
-
throw fetchError;
|
|
110
|
-
}
|
|
111
|
-
},
|
|
112
|
-
async getAIFeatureConfig (ctx) {
|
|
113
|
-
const aiFeatureConfig = await strapi.get('ai').getAIFeatureConfig();
|
|
114
|
-
ctx.body = {
|
|
115
|
-
data: aiFeatureConfig
|
|
116
|
-
};
|
|
117
|
-
}
|
|
118
|
-
};
|
|
119
|
-
|
|
120
|
-
module.exports = aiController;
|
|
121
|
-
//# sourceMappingURL=ai.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"ai.js","sources":["../../../../../../../ee/server/src/ai/controllers/ai.ts"],"sourcesContent":["import type { Context } from 'koa';\nimport path from 'path';\nimport fs from 'fs';\nimport crypto from 'crypto';\nimport { GetAiToken } from '../../../../../shared/contracts/ai';\n\nexport default {\n async getAiToken(ctx: Context) {\n try {\n // TODO: auth check is not necessary? Already protected by route middleware?\n // Security check: Ensure user is authenticated and has proper permissions\n if (!ctx.state.user) {\n return ctx.unauthorized('Authentication required');\n }\n\n const aiToken = await strapi.get('ai').getAiToken();\n\n ctx.body = {\n data: aiToken,\n } satisfies GetAiToken.Response;\n } catch (error) {\n const errorMessage = 'AI token request failed. Check server logs for details.';\n return ctx.internalServerError(errorMessage);\n }\n },\n\n async getAiUsage(ctx: Context) {\n const ERROR_PREFIX = 'AI usage data request failed:';\n const USER_ERROR_MESSAGE = 'AI usage data request failed. Check server logs for details.';\n // Security check: Ensure user is authenticated and has proper permissions\n if (!ctx.state.user) {\n return ctx.unauthorized('Authentication required');\n }\n\n // Check if EE features are enabled first\n if (!strapi.ee?.isEE) {\n strapi.log.error(`${ERROR_PREFIX} Enterprise Edition features are not enabled`);\n return ctx.internalServerError(USER_ERROR_MESSAGE);\n }\n\n // Get the EE license\n // First try environment variable, then try reading from file\n let eeLicense = process.env.STRAPI_LICENSE;\n\n if (!eeLicense) {\n try {\n const licensePath = path.join(strapi.dirs.app.root, 'license.txt');\n eeLicense = fs.readFileSync(licensePath).toString();\n } catch (error) {\n // License file doesn't exist or can't be read\n }\n }\n\n if (!eeLicense) {\n strapi.log.error(\n `${ERROR_PREFIX} No EE license found. Please ensure STRAPI_LICENSE environment variable is set or license.txt file exists.`\n );\n\n return ctx.internalServerError(USER_ERROR_MESSAGE);\n }\n\n const aiServerUrl = process.env.STRAPI_AI_URL || 'https://strapi-ai.apps.strapi.io';\n\n if (!aiServerUrl) {\n strapi.log.error(\n `${ERROR_PREFIX} AI server URL not configured. Please set STRAPI_AI_URL or STRAPI_AI_URL environment variable.`\n );\n return ctx.internalServerError(USER_ERROR_MESSAGE);\n }\n\n // Get project ID\n const projectId = strapi.config.get('uuid');\n if (!projectId) {\n strapi.log.error(`${ERROR_PREFIX} Project ID not configured`);\n return ctx.internalServerError(USER_ERROR_MESSAGE);\n }\n\n try {\n // Call the AI server's getAiJWT endpoint\n const response = await fetch(`${aiServerUrl}/cms/ai-data`, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n // No authorization header needed for public endpoint\n // Add request ID for tracing\n 'X-Request-Id': crypto.randomUUID(),\n },\n body: JSON.stringify({\n eeKey: eeLicense,\n projectId,\n }),\n });\n\n if (!response.ok) {\n let errorData;\n let errorText;\n try {\n errorText = await response.text();\n errorData = JSON.parse(errorText);\n } catch {\n errorData = { error: errorText || 'Failed to parse error response' };\n }\n\n strapi.log.error(`${ERROR_PREFIX} ${errorData?.error || 'Unknown error'}`, {\n status: response.status,\n statusText: response.statusText,\n error: errorData,\n errorText,\n projectId,\n });\n\n return ctx.internalServerError(USER_ERROR_MESSAGE);\n }\n\n let data;\n try {\n data = (await response.json()) as {\n data: {\n cmsAiCreditsUsed: number;\n };\n subscription: {\n subscriptionId: string;\n planPriceId: string;\n subscriptionStatus: string;\n isActiveSubscription: boolean;\n cmsAiEnabled: boolean;\n cmsAiCreditsBase: number;\n cmsAiCreditsMaxUsage: number;\n currentTermStart: string;\n currentTermEnd: string;\n };\n };\n } catch (parseError) {\n strapi.log.error(`${ERROR_PREFIX} Failed to parse AI server response`, parseError);\n return ctx.internalServerError(USER_ERROR_MESSAGE);\n }\n\n ctx.body = {\n ...data.data,\n subscription: data.subscription,\n };\n } catch (fetchError) {\n if (fetchError instanceof Error && fetchError.name === 'AbortError') {\n strapi.log.error(`${ERROR_PREFIX} Request to AI server timed out`);\n return ctx.internalServerError(USER_ERROR_MESSAGE);\n }\n\n throw fetchError;\n }\n },\n async getAIFeatureConfig(ctx: Context) {\n const aiFeatureConfig = await strapi.get('ai').getAIFeatureConfig();\n\n ctx.body = {\n data: aiFeatureConfig,\n };\n },\n};\n"],"names":["getAiToken","ctx","state","user","unauthorized","aiToken","strapi","get","body","data","error","errorMessage","internalServerError","getAiUsage","ERROR_PREFIX","USER_ERROR_MESSAGE","ee","isEE","log","eeLicense","process","env","STRAPI_LICENSE","licensePath","path","join","dirs","app","root","fs","readFileSync","toString","aiServerUrl","STRAPI_AI_URL","projectId","config","response","fetch","method","headers","crypto","randomUUID","JSON","stringify","eeKey","ok","errorData","errorText","text","parse","status","statusText","json","parseError","subscription","fetchError","Error","name","getAIFeatureConfig","aiFeatureConfig"],"mappings":";;;;;;AAMA,mBAAe;AACb,IAAA,MAAMA,YAAWC,GAAY,EAAA;QAC3B,IAAI;;;AAGF,YAAA,IAAI,CAACA,GAAAA,CAAIC,KAAK,CAACC,IAAI,EAAE;gBACnB,OAAOF,GAAAA,CAAIG,YAAY,CAAC,yBAAA,CAAA;AAC1B,YAAA;AAEA,YAAA,MAAMC,UAAU,MAAMC,MAAAA,CAAOC,GAAG,CAAC,MAAMP,UAAU,EAAA;AAEjDC,YAAAA,GAAAA,CAAIO,IAAI,GAAG;gBACTC,IAAAA,EAAMJ;AACR,aAAA;AACF,QAAA,CAAA,CAAE,OAAOK,KAAAA,EAAO;AACd,YAAA,MAAMC,YAAAA,GAAe,yDAAA;YACrB,OAAOV,GAAAA,CAAIW,mBAAmB,CAACD,YAAAA,CAAAA;AACjC,QAAA;AACF,IAAA,CAAA;AAEA,IAAA,MAAME,YAAWZ,GAAY,EAAA;AAC3B,QAAA,MAAMa,YAAAA,GAAe,+BAAA;AACrB,QAAA,MAAMC,kBAAAA,GAAqB,8DAAA;;AAE3B,QAAA,IAAI,CAACd,GAAAA,CAAIC,KAAK,CAACC,IAAI,EAAE;YACnB,OAAOF,GAAAA,CAAIG,YAAY,CAAC,yBAAA,CAAA;AAC1B,QAAA;;AAGA,QAAA,IAAI,CAACE,MAAAA,CAAOU,EAAE,EAAEC,IAAAA,EAAM;AACpBX,YAAAA,MAAAA,CAAOY,GAAG,CAACR,KAAK,CAAC,CAAA,EAAGI,YAAAA,CAAa,4CAA4C,CAAC,CAAA;YAC9E,OAAOb,GAAAA,CAAIW,mBAAmB,CAACG,kBAAAA,CAAAA;AACjC,QAAA;;;AAIA,QAAA,IAAII,SAAAA,GAAYC,OAAAA,CAAQC,GAAG,CAACC,cAAc;AAE1C,QAAA,IAAI,CAACH,SAAAA,EAAW;YACd,IAAI;gBACF,MAAMI,WAAAA,GAAcC,IAAAA,CAAKC,IAAI,CAACnB,MAAAA,CAAOoB,IAAI,CAACC,GAAG,CAACC,IAAI,EAAE,aAAA,CAAA;AACpDT,gBAAAA,SAAAA,GAAYU,EAAAA,CAAGC,YAAY,CAACP,WAAAA,CAAAA,CAAaQ,QAAQ,EAAA;AACnD,YAAA,CAAA,CAAE,OAAOrB,KAAAA,EAAO;;AAEhB,YAAA;AACF,QAAA;AAEA,QAAA,IAAI,CAACS,SAAAA,EAAW;AACdb,YAAAA,MAAAA,CAAOY,GAAG,CAACR,KAAK,CACd,CAAA,EAAGI,YAAAA,CAAa,0GAA0G,CAAC,CAAA;YAG7H,OAAOb,GAAAA,CAAIW,mBAAmB,CAACG,kBAAAA,CAAAA;AACjC,QAAA;AAEA,QAAA,MAAMiB,WAAAA,GAAcZ,OAAAA,CAAQC,GAAG,CAACY,aAAa,IAAI,kCAAA;;AAUjD,QAAA,MAAMC,SAAAA,GAAY5B,MAAAA,CAAO6B,MAAM,CAAC5B,GAAG,CAAC,MAAA,CAAA;AACpC,QAAA,IAAI,CAAC2B,SAAAA,EAAW;AACd5B,YAAAA,MAAAA,CAAOY,GAAG,CAACR,KAAK,CAAC,CAAA,EAAGI,YAAAA,CAAa,0BAA0B,CAAC,CAAA;YAC5D,OAAOb,GAAAA,CAAIW,mBAAmB,CAACG,kBAAAA,CAAAA;AACjC,QAAA;QAEA,IAAI;;AAEF,YAAA,MAAMqB,WAAW,MAAMC,KAAAA,CAAM,GAAGL,WAAAA,CAAY,YAAY,CAAC,EAAE;gBACzDM,MAAAA,EAAQ,MAAA;gBACRC,OAAAA,EAAS;oBACP,cAAA,EAAgB,kBAAA;;;AAGhB,oBAAA,cAAA,EAAgBC,OAAOC,UAAU;AACnC,iBAAA;gBACAjC,IAAAA,EAAMkC,IAAAA,CAAKC,SAAS,CAAC;oBACnBC,KAAAA,EAAOzB,SAAAA;AACPe,oBAAAA;AACF,iBAAA;AACF,aAAA,CAAA;YAEA,IAAI,CAACE,QAAAA,CAASS,EAAE,EAAE;gBAChB,IAAIC,SAAAA;gBACJ,IAAIC,SAAAA;gBACJ,IAAI;oBACFA,SAAAA,GAAY,MAAMX,SAASY,IAAI,EAAA;oBAC/BF,SAAAA,GAAYJ,IAAAA,CAAKO,KAAK,CAACF,SAAAA,CAAAA;AACzB,gBAAA,CAAA,CAAE,OAAM;oBACND,SAAAA,GAAY;AAAEpC,wBAAAA,KAAAA,EAAOqC,SAAAA,IAAa;AAAiC,qBAAA;AACrE,gBAAA;gBAEAzC,MAAAA,CAAOY,GAAG,CAACR,KAAK,CAAC,CAAA,EAAGI,YAAAA,CAAa,CAAC,EAAEgC,SAAAA,EAAWpC,KAAAA,IAAS,eAAA,CAAA,CAAiB,EAAE;AACzEwC,oBAAAA,MAAAA,EAAQd,SAASc,MAAM;AACvBC,oBAAAA,UAAAA,EAAYf,SAASe,UAAU;oBAC/BzC,KAAAA,EAAOoC,SAAAA;AACPC,oBAAAA,SAAAA;AACAb,oBAAAA;AACF,iBAAA,CAAA;gBAEA,OAAOjC,GAAAA,CAAIW,mBAAmB,CAACG,kBAAAA,CAAAA;AACjC,YAAA;YAEA,IAAIN,IAAAA;YACJ,IAAI;gBACFA,IAAAA,GAAQ,MAAM2B,SAASgB,IAAI,EAAA;AAgB7B,YAAA,CAAA,CAAE,OAAOC,UAAAA,EAAY;gBACnB/C,MAAAA,CAAOY,GAAG,CAACR,KAAK,CAAC,GAAGI,YAAAA,CAAa,mCAAmC,CAAC,EAAEuC,UAAAA,CAAAA;gBACvE,OAAOpD,GAAAA,CAAIW,mBAAmB,CAACG,kBAAAA,CAAAA;AACjC,YAAA;AAEAd,YAAAA,GAAAA,CAAIO,IAAI,GAAG;AACT,gBAAA,GAAGC,KAAKA,IAAI;AACZ6C,gBAAAA,YAAAA,EAAc7C,KAAK6C;AACrB,aAAA;AACF,QAAA,CAAA,CAAE,OAAOC,UAAAA,EAAY;AACnB,YAAA,IAAIA,UAAAA,YAAsBC,KAAAA,IAASD,UAAAA,CAAWE,IAAI,KAAK,YAAA,EAAc;AACnEnD,gBAAAA,MAAAA,CAAOY,GAAG,CAACR,KAAK,CAAC,CAAA,EAAGI,YAAAA,CAAa,+BAA+B,CAAC,CAAA;gBACjE,OAAOb,GAAAA,CAAIW,mBAAmB,CAACG,kBAAAA,CAAAA;AACjC,YAAA;YAEA,MAAMwC,UAAAA;AACR,QAAA;AACF,IAAA,CAAA;AACA,IAAA,MAAMG,oBAAmBzD,GAAY,EAAA;AACnC,QAAA,MAAM0D,kBAAkB,MAAMrD,MAAAA,CAAOC,GAAG,CAAC,MAAMmD,kBAAkB,EAAA;AAEjEzD,QAAAA,GAAAA,CAAIO,IAAI,GAAG;YACTC,IAAAA,EAAMkD;AACR,SAAA;AACF,IAAA;AACF,CAAA;;;;"}
|