@super_studio/ecforce-ai-agent-server 0.2.0-canary.5 → 1.0.0-canary.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (64) hide show
  1. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/defineProperty.cjs +14 -0
  2. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/defineProperty.mjs +14 -0
  3. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/objectSpread2.cjs +27 -0
  4. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/objectSpread2.mjs +27 -0
  5. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/objectWithoutProperties.cjs +15 -0
  6. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/objectWithoutProperties.mjs +15 -0
  7. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/objectWithoutPropertiesLoose.cjs +14 -0
  8. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/objectWithoutPropertiesLoose.mjs +13 -0
  9. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/toPrimitive.cjs +16 -0
  10. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/toPrimitive.mjs +16 -0
  11. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/toPropertyKey.cjs +11 -0
  12. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/toPropertyKey.mjs +11 -0
  13. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/typeof.cjs +18 -0
  14. package/dist/_virtual/_@oxc-project_runtime@0.103.0/helpers/typeof.mjs +12 -0
  15. package/dist/index.cjs +7 -0
  16. package/dist/index.d.cts +3 -0
  17. package/dist/index.d.mts +3 -0
  18. package/dist/index.mjs +3 -1056
  19. package/dist/lib/constants.cjs +6 -0
  20. package/dist/lib/constants.mjs +6 -0
  21. package/dist/lib/constants.mjs.map +1 -0
  22. package/dist/lib/jwt.cjs +64 -0
  23. package/dist/lib/jwt.mjs +64 -0
  24. package/dist/lib/jwt.mjs.map +1 -0
  25. package/dist/mcp-auth.cjs +52 -0
  26. package/dist/mcp-auth.d.cts +38 -0
  27. package/dist/mcp-auth.d.cts.map +1 -0
  28. package/dist/mcp-auth.d.mts +38 -0
  29. package/dist/mcp-auth.d.mts.map +1 -0
  30. package/dist/mcp-auth.mjs +44 -129
  31. package/dist/mcp-auth.mjs.map +1 -0
  32. package/dist/sdk/__generated__/index.cjs +524 -0
  33. package/dist/sdk/__generated__/index.d.cts +1648 -0
  34. package/dist/sdk/__generated__/index.d.cts.map +1 -0
  35. package/dist/sdk/__generated__/index.d.mts +1648 -0
  36. package/dist/sdk/__generated__/index.d.mts.map +1 -0
  37. package/dist/sdk/__generated__/index.mjs +523 -0
  38. package/dist/sdk/__generated__/index.mjs.map +1 -0
  39. package/dist/sdk/index.cjs +21 -0
  40. package/dist/sdk/index.d.cts +22 -0
  41. package/dist/sdk/index.d.cts.map +1 -0
  42. package/dist/sdk/index.d.mts +22 -0
  43. package/dist/sdk/index.d.mts.map +1 -0
  44. package/dist/sdk/index.mjs +22 -0
  45. package/dist/sdk/index.mjs.map +1 -0
  46. package/package.json +14 -20
  47. package/dist/chunk-FWCSY2DS.mjs +0 -37
  48. package/dist/chunk-ORMEWXMH.js +0 -37
  49. package/dist/index.d.ts +0 -2
  50. package/dist/index.d.ts.map +0 -1
  51. package/dist/index.js +0 -1057
  52. package/dist/lib/constants.d.ts +0 -2
  53. package/dist/lib/constants.d.ts.map +0 -1
  54. package/dist/lib/jwt.d.ts +0 -37
  55. package/dist/lib/jwt.d.ts.map +0 -1
  56. package/dist/mcp-auth.d.ts +0 -35
  57. package/dist/mcp-auth.d.ts.map +0 -1
  58. package/dist/mcp-auth.js +0 -136
  59. package/dist/sdk/__generated__/index.d.ts +0 -1636
  60. package/dist/sdk/__generated__/index.d.ts.map +0 -1
  61. package/dist/sdk/generate.d.ts +0 -2
  62. package/dist/sdk/generate.d.ts.map +0 -1
  63. package/dist/sdk/index.d.ts +0 -19
  64. package/dist/sdk/index.d.ts.map +0 -1
@@ -1,2 +0,0 @@
1
- export declare const API_ENDPOINT = "http://localhost:4043";
2
- //# sourceMappingURL=constants.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../../src/lib/constants.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,YAAY,0BAA0B,CAAC"}
package/dist/lib/jwt.d.ts DELETED
@@ -1,37 +0,0 @@
1
- /**
2
- * このロジックは最新(@auth/core@0.37.2)のAuth.jsのjwt.tsからコピーされました。
3
- */
4
- /** Issues a JWT. By default, the JWT is encrypted using "A256CBC-HS512". */
5
- export declare function encode<Payload = object>(params: JWTEncodeParams<Payload>): Promise<string>;
6
- /** Decodes an Auth.js issued JWT. */
7
- export declare function decode<Payload = object>(params: JWTDecodeParams): Promise<Payload | null>;
8
- export interface JWTEncodeParams<Payload = object> {
9
- /**
10
- * The maximum age of the Auth.js issued JWT in seconds.
11
- *
12
- * @default 30 * 24 * 60 * 60 // 30 days
13
- */
14
- maxAge?: number;
15
- /** Used in combination with `secret`, to derive the encryption secret for JWTs. */
16
- salt: string;
17
- /** Used in combination with `salt`, to derive the encryption secret for JWTs. */
18
- secret: string | string[];
19
- /** The JWT payload. */
20
- token?: Payload;
21
- }
22
- export interface JWTDecodeParams {
23
- /** Used in combination with `secret`, to derive the encryption secret for JWTs. */
24
- salt: string;
25
- /**
26
- * Used in combination with `salt`, to derive the encryption secret for JWTs.
27
- *
28
- * @note
29
- * You can also pass an array of secrets, in which case the first secret that successfully
30
- * decrypts the JWT will be used. This is useful for rotating secrets without invalidating existing sessions.
31
- * The newer secret should be added to the start of the array, which will be used for all new sessions.
32
- */
33
- secret: string | string[];
34
- /** The Auth.js issued JWT to be decoded */
35
- token?: string;
36
- }
37
- //# sourceMappingURL=jwt.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"jwt.d.ts","sourceRoot":"","sources":["../../src/lib/jwt.ts"],"names":[],"mappings":"AAAA;;GAEG;AAkBH,4EAA4E;AAC5E,wBAAsB,MAAM,CAAC,OAAO,GAAG,MAAM,EAC3C,MAAM,EAAE,eAAe,CAAC,OAAO,CAAC,mBAqBjC;AAED,qCAAqC;AACrC,wBAAsB,MAAM,CAAC,OAAO,GAAG,MAAM,EAC3C,MAAM,EAAE,eAAe,GACtB,OAAO,CAAC,OAAO,GAAG,IAAI,CAAC,CAqCzB;AA2BD,MAAM,WAAW,eAAe,CAAC,OAAO,GAAG,MAAM;IAC/C;;;;OAIG;IACH,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,mFAAmF;IACnF,IAAI,EAAE,MAAM,CAAC;IACb,iFAAiF;IACjF,MAAM,EAAE,MAAM,GAAG,MAAM,EAAE,CAAC;IAC1B,uBAAuB;IACvB,KAAK,CAAC,EAAE,OAAO,CAAC;CACjB;AAED,MAAM,WAAW,eAAe;IAC9B,mFAAmF;IACnF,IAAI,EAAE,MAAM,CAAC;IACb;;;;;;;OAOG;IACH,MAAM,EAAE,MAAM,GAAG,MAAM,EAAE,CAAC;IAC1B,2CAA2C;IAC3C,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB"}
@@ -1,35 +0,0 @@
1
- /**
2
- * 共通のMCPトークンのペイロード。
3
- * すべてのapps(cdp, ma, bi)はこのトークンの形になります。
4
- */
5
- export type MCPTokenPayload = {
6
- source: string;
7
- user: {
8
- id: string;
9
- name: string;
10
- email: string;
11
- projectId: string;
12
- };
13
- };
14
- /**
15
- * Uses Auth.js JWT encoding/decoding.
16
- * @see https://github.com/nextauthjs/next-auth/blob/main/packages/core/src/jwt.ts
17
- */
18
- export declare function createMCPToken(payload: MCPTokenPayload, options?: {
19
- secret?: string;
20
- salt?: string;
21
- maxAge?: number;
22
- }): Promise<{
23
- token: string;
24
- expiresAt: Date;
25
- }>;
26
- /**
27
- * Uses Auth.js JWT encoding/decoding.
28
- * @see https://github.com/nextauthjs/next-auth/blob/main/packages/core/src/jwt.ts
29
- */
30
- export declare function decodeMCPToken(token: string, options?: {
31
- secret?: string;
32
- salt?: string;
33
- }): Promise<MCPTokenPayload>;
34
- export declare function getMcpToken(req: Request): string;
35
- //# sourceMappingURL=mcp-auth.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"mcp-auth.d.ts","sourceRoot":"","sources":["../src/mcp-auth.ts"],"names":[],"mappings":"AAEA;;;GAGG;AACH,MAAM,MAAM,eAAe,GAAG;IAC5B,MAAM,EAAE,MAAM,CAAC;IACf,IAAI,EAAE;QACJ,EAAE,EAAE,MAAM,CAAC;QACX,IAAI,EAAE,MAAM,CAAC;QACb,KAAK,EAAE,MAAM,CAAC;QACd,SAAS,EAAE,MAAM,CAAC;KACnB,CAAC;CACH,CAAC;AAKF;;;GAGG;AACH,wBAAsB,cAAc,CAClC,OAAO,EAAE,eAAe,EACxB,OAAO,CAAC,EAAE;IACR,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,MAAM,CAAC,EAAE,MAAM,CAAC;CACjB;;;GAkBF;AAED;;;GAGG;AACH,wBAAsB,cAAc,CAClC,KAAK,EAAE,MAAM,EACb,OAAO,CAAC,EAAE;IACR,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,IAAI,CAAC,EAAE,MAAM,CAAC;CACf,GACA,OAAO,CAAC,eAAe,CAAC,CAe1B;AAED,wBAAgB,WAAW,CAAC,GAAG,EAAE,OAAO,UAMvC"}
package/dist/mcp-auth.js DELETED
@@ -1,136 +0,0 @@
1
- "use strict";Object.defineProperty(exports, "__esModule", {value: true});require('./chunk-ORMEWXMH.js');
2
-
3
- // src/lib/jwt.ts
4
- var _hkdf = require('@panva/hkdf');
5
-
6
-
7
-
8
-
9
-
10
- var _jose = require('jose');
11
- var DEFAULT_MAX_AGE = 30 * 24 * 60 * 60;
12
- var now = () => Date.now() / 1e3 | 0;
13
- var alg = "dir";
14
- var enc = "A256CBC-HS512";
15
- async function encode(params) {
16
- const { token = {}, secret, maxAge = DEFAULT_MAX_AGE, salt } = params;
17
- const secrets = Array.isArray(secret) ? secret : [secret];
18
- const encryptionSecret = await getDerivedEncryptionKey(
19
- enc,
20
- secrets[0],
21
- salt
22
- );
23
- const thumbprint = await _jose.calculateJwkThumbprint.call(void 0,
24
- { kty: "oct", k: _jose.base64url.encode(encryptionSecret) },
25
- `sha${encryptionSecret.byteLength << 3}`
26
- );
27
- return await new (0, _jose.EncryptJWT)(token).setProtectedHeader({ alg, enc, kid: thumbprint }).setIssuedAt().setExpirationTime(now() + maxAge).setJti(crypto.randomUUID()).encrypt(encryptionSecret);
28
- }
29
- async function decode(params) {
30
- const { token, secret, salt } = params;
31
- const secrets = Array.isArray(secret) ? secret : [secret];
32
- if (!token) {
33
- return null;
34
- }
35
- const { payload } = await _jose.jwtDecrypt.call(void 0,
36
- token,
37
- async ({ kid, enc: enc2 }) => {
38
- for (const secret2 of secrets) {
39
- const encryptionSecret = await getDerivedEncryptionKey(
40
- enc2,
41
- secret2,
42
- salt
43
- );
44
- if (kid === void 0) {
45
- return encryptionSecret;
46
- }
47
- const thumbprint = await _jose.calculateJwkThumbprint.call(void 0,
48
- { kty: "oct", k: _jose.base64url.encode(encryptionSecret) },
49
- `sha${encryptionSecret.byteLength << 3}`
50
- );
51
- if (kid === thumbprint) {
52
- return encryptionSecret;
53
- }
54
- }
55
- throw new Error("no matching decryption secret");
56
- },
57
- {
58
- clockTolerance: 15,
59
- keyManagementAlgorithms: [alg],
60
- contentEncryptionAlgorithms: [enc, "A256GCM"]
61
- }
62
- );
63
- return payload;
64
- }
65
- async function getDerivedEncryptionKey(enc2, keyMaterial, salt) {
66
- let length;
67
- switch (enc2) {
68
- case "A256CBC-HS512":
69
- length = 64;
70
- break;
71
- case "A256GCM":
72
- length = 32;
73
- break;
74
- default:
75
- throw new Error("Unsupported JWT Content Encryption Algorithm");
76
- }
77
- return await _hkdf.hkdf.call(void 0,
78
- "sha256",
79
- keyMaterial,
80
- salt,
81
- `Auth.js Generated Encryption Key (${salt})`,
82
- length
83
- );
84
- }
85
-
86
- // src/mcp-auth.ts
87
- var DEFAULT_MAX_AGE2 = 60 * 10;
88
- var DEFAULT_SALT = process.env.STAGE === "local" ? "dev" : process.env.STAGE;
89
- async function createMCPToken(payload, options) {
90
- var _a, _b, _c;
91
- const maxAge = (_a = options == null ? void 0 : options.maxAge) != null ? _a : DEFAULT_MAX_AGE2;
92
- const secret = (_b = options == null ? void 0 : options.secret) != null ? _b : process.env.MCP_TOKEN_SECRET;
93
- const salt = (_c = options == null ? void 0 : options.salt) != null ? _c : DEFAULT_SALT;
94
- if (!secret || !salt) {
95
- throw new Error("Secret or salt is not set");
96
- }
97
- const token = await encode({
98
- token: payload,
99
- secret,
100
- salt,
101
- maxAge
102
- });
103
- return {
104
- token,
105
- expiresAt: new Date(Date.now() + maxAge * 1e3)
106
- };
107
- }
108
- async function decodeMCPToken(token, options) {
109
- var _a, _b;
110
- const secret = (_a = options == null ? void 0 : options.secret) != null ? _a : process.env.MCP_TOKEN_SECRET;
111
- const salt = (_b = options == null ? void 0 : options.salt) != null ? _b : DEFAULT_SALT;
112
- if (!secret || !salt) {
113
- throw new Error("Secret or salt is not set");
114
- }
115
- const decoded = await decode({
116
- token,
117
- secret,
118
- salt
119
- });
120
- if (!decoded) {
121
- throw new Error("Invalid token");
122
- }
123
- return decoded;
124
- }
125
- function getMcpToken(req) {
126
- const mcpToken = req.headers.get("X-MCP-Token");
127
- if (!mcpToken || typeof mcpToken !== "string") {
128
- throw new Error("Unauthorized");
129
- }
130
- return mcpToken;
131
- }
132
-
133
-
134
-
135
-
136
- exports.createMCPToken = createMCPToken; exports.decodeMCPToken = decodeMCPToken; exports.getMcpToken = getMcpToken;