@vibecheckai/cli 3.2.6 → 3.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bin/registry.js +192 -5
- package/bin/runners/lib/agent-firewall/change-packet/builder.js +280 -6
- package/bin/runners/lib/agent-firewall/critic/index.js +151 -0
- package/bin/runners/lib/agent-firewall/critic/judge.js +432 -0
- package/bin/runners/lib/agent-firewall/critic/prompts.js +305 -0
- package/bin/runners/lib/agent-firewall/lawbook/distributor.js +465 -0
- package/bin/runners/lib/agent-firewall/lawbook/evaluator.js +604 -0
- package/bin/runners/lib/agent-firewall/lawbook/index.js +304 -0
- package/bin/runners/lib/agent-firewall/lawbook/registry.js +514 -0
- package/bin/runners/lib/agent-firewall/lawbook/schema.js +420 -0
- package/bin/runners/lib/agent-firewall/logger.js +141 -0
- package/bin/runners/lib/agent-firewall/policy/loader.js +312 -4
- package/bin/runners/lib/agent-firewall/policy/rules/ghost-env.js +113 -1
- package/bin/runners/lib/agent-firewall/policy/rules/ghost-route.js +133 -6
- package/bin/runners/lib/agent-firewall/proposal/extractor.js +394 -0
- package/bin/runners/lib/agent-firewall/proposal/index.js +212 -0
- package/bin/runners/lib/agent-firewall/proposal/schema.js +251 -0
- package/bin/runners/lib/agent-firewall/proposal/validator.js +386 -0
- package/bin/runners/lib/agent-firewall/reality/index.js +332 -0
- package/bin/runners/lib/agent-firewall/reality/state.js +625 -0
- package/bin/runners/lib/agent-firewall/reality/watcher.js +322 -0
- package/bin/runners/lib/agent-firewall/risk/index.js +173 -0
- package/bin/runners/lib/agent-firewall/risk/scorer.js +328 -0
- package/bin/runners/lib/agent-firewall/risk/thresholds.js +321 -0
- package/bin/runners/lib/agent-firewall/risk/vectors.js +421 -0
- package/bin/runners/lib/agent-firewall/simulator/diff-simulator.js +472 -0
- package/bin/runners/lib/agent-firewall/simulator/import-resolver.js +346 -0
- package/bin/runners/lib/agent-firewall/simulator/index.js +181 -0
- package/bin/runners/lib/agent-firewall/simulator/route-validator.js +380 -0
- package/bin/runners/lib/agent-firewall/time-machine/incident-correlator.js +661 -0
- package/bin/runners/lib/agent-firewall/time-machine/index.js +267 -0
- package/bin/runners/lib/agent-firewall/time-machine/replay-engine.js +436 -0
- package/bin/runners/lib/agent-firewall/time-machine/state-reconstructor.js +490 -0
- package/bin/runners/lib/agent-firewall/time-machine/timeline-builder.js +530 -0
- package/bin/runners/lib/analyzers.js +81 -18
- package/bin/runners/lib/authority-badge.js +425 -0
- package/bin/runners/lib/cli-output.js +7 -1
- package/bin/runners/lib/error-handler.js +16 -9
- package/bin/runners/lib/exit-codes.js +275 -0
- package/bin/runners/lib/global-flags.js +37 -0
- package/bin/runners/lib/help-formatter.js +413 -0
- package/bin/runners/lib/logger.js +38 -0
- package/bin/runners/lib/unified-cli-output.js +604 -0
- package/bin/runners/lib/upsell.js +148 -0
- package/bin/runners/runApprove.js +1200 -0
- package/bin/runners/runAuth.js +324 -95
- package/bin/runners/runCheckpoint.js +39 -21
- package/bin/runners/runClassify.js +859 -0
- package/bin/runners/runContext.js +136 -24
- package/bin/runners/runDoctor.js +108 -68
- package/bin/runners/runFix.js +6 -5
- package/bin/runners/runGuard.js +212 -118
- package/bin/runners/runInit.js +3 -2
- package/bin/runners/runMcp.js +130 -52
- package/bin/runners/runPolish.js +43 -20
- package/bin/runners/runProve.js +1 -2
- package/bin/runners/runReport.js +3 -2
- package/bin/runners/runScan.js +63 -44
- package/bin/runners/runShip.js +3 -4
- package/bin/runners/runValidate.js +19 -2
- package/bin/runners/runWatch.js +104 -53
- package/bin/vibecheck.js +106 -19
- package/mcp-server/HARDENING_SUMMARY.md +299 -0
- package/mcp-server/agent-firewall-interceptor.js +367 -31
- package/mcp-server/authority-tools.js +569 -0
- package/mcp-server/conductor/conflict-resolver.js +588 -0
- package/mcp-server/conductor/execution-planner.js +544 -0
- package/mcp-server/conductor/index.js +377 -0
- package/mcp-server/conductor/lock-manager.js +615 -0
- package/mcp-server/conductor/request-queue.js +550 -0
- package/mcp-server/conductor/session-manager.js +500 -0
- package/mcp-server/conductor/tools.js +510 -0
- package/mcp-server/index.js +1149 -243
- package/mcp-server/lib/{api-client.js → api-client.cjs} +40 -4
- package/mcp-server/lib/logger.cjs +30 -0
- package/mcp-server/logger.js +173 -0
- package/mcp-server/package.json +2 -2
- package/mcp-server/premium-tools.js +2 -2
- package/mcp-server/tier-auth.js +245 -35
- package/mcp-server/truth-firewall-tools.js +145 -15
- package/mcp-server/vibecheck-tools.js +2 -2
- package/package.json +2 -3
- package/mcp-server/index.old.js +0 -4137
- package/mcp-server/package-lock.json +0 -165
|
@@ -0,0 +1,510 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Conductor MCP Tools
|
|
3
|
+
*
|
|
4
|
+
* MCP tool definitions for multi-agent coordination.
|
|
5
|
+
*
|
|
6
|
+
* Codename: Conductor
|
|
7
|
+
*/
|
|
8
|
+
|
|
9
|
+
"use strict";
|
|
10
|
+
|
|
11
|
+
import conductor from "./index.js";
|
|
12
|
+
|
|
13
|
+
/**
|
|
14
|
+
* Tool definitions for the Conductor module
|
|
15
|
+
*/
|
|
16
|
+
export const CONDUCTOR_TOOLS = {
|
|
17
|
+
// Register an agent session
|
|
18
|
+
vibecheck_conductor_register: {
|
|
19
|
+
name: "vibecheck_conductor_register",
|
|
20
|
+
description: "Register an AI agent session for multi-agent coordination. Call this at the start of any multi-agent workflow.",
|
|
21
|
+
inputSchema: {
|
|
22
|
+
type: "object",
|
|
23
|
+
properties: {
|
|
24
|
+
agentId: {
|
|
25
|
+
type: "string",
|
|
26
|
+
description: "Unique identifier for the agent (e.g., 'cursor', 'copilot', 'custom-agent')",
|
|
27
|
+
},
|
|
28
|
+
tier: {
|
|
29
|
+
type: "string",
|
|
30
|
+
enum: ["FREE", "STARTER", "PRO", "ENTERPRISE"],
|
|
31
|
+
default: "FREE",
|
|
32
|
+
description: "User's subscription tier",
|
|
33
|
+
},
|
|
34
|
+
projectRoot: {
|
|
35
|
+
type: "string",
|
|
36
|
+
description: "Project root directory path",
|
|
37
|
+
},
|
|
38
|
+
workingFiles: {
|
|
39
|
+
type: "array",
|
|
40
|
+
items: { type: "string" },
|
|
41
|
+
description: "Initial list of files this agent plans to work on",
|
|
42
|
+
},
|
|
43
|
+
},
|
|
44
|
+
required: ["agentId", "projectRoot"],
|
|
45
|
+
},
|
|
46
|
+
},
|
|
47
|
+
|
|
48
|
+
// Acquire a lock on a file or folder
|
|
49
|
+
vibecheck_conductor_acquire_lock: {
|
|
50
|
+
name: "vibecheck_conductor_acquire_lock",
|
|
51
|
+
description: "Acquire a lock on a file or folder to prevent concurrent modifications by other agents.",
|
|
52
|
+
inputSchema: {
|
|
53
|
+
type: "object",
|
|
54
|
+
properties: {
|
|
55
|
+
sessionId: {
|
|
56
|
+
type: "string",
|
|
57
|
+
description: "Session ID from vibecheck_conductor_register",
|
|
58
|
+
},
|
|
59
|
+
path: {
|
|
60
|
+
type: "string",
|
|
61
|
+
description: "File or folder path to lock",
|
|
62
|
+
},
|
|
63
|
+
type: {
|
|
64
|
+
type: "string",
|
|
65
|
+
enum: ["exclusive", "shared"],
|
|
66
|
+
default: "exclusive",
|
|
67
|
+
description: "Lock type: 'exclusive' for write access, 'shared' for read access",
|
|
68
|
+
},
|
|
69
|
+
reason: {
|
|
70
|
+
type: "string",
|
|
71
|
+
description: "Reason for acquiring the lock",
|
|
72
|
+
},
|
|
73
|
+
},
|
|
74
|
+
required: ["sessionId", "path"],
|
|
75
|
+
},
|
|
76
|
+
},
|
|
77
|
+
|
|
78
|
+
// Release a lock
|
|
79
|
+
vibecheck_conductor_release_lock: {
|
|
80
|
+
name: "vibecheck_conductor_release_lock",
|
|
81
|
+
description: "Release a previously acquired lock.",
|
|
82
|
+
inputSchema: {
|
|
83
|
+
type: "object",
|
|
84
|
+
properties: {
|
|
85
|
+
lockId: {
|
|
86
|
+
type: "string",
|
|
87
|
+
description: "Lock ID to release",
|
|
88
|
+
},
|
|
89
|
+
sessionId: {
|
|
90
|
+
type: "string",
|
|
91
|
+
description: "Session ID that owns the lock",
|
|
92
|
+
},
|
|
93
|
+
},
|
|
94
|
+
required: ["lockId", "sessionId"],
|
|
95
|
+
},
|
|
96
|
+
},
|
|
97
|
+
|
|
98
|
+
// Submit a coordinated proposal
|
|
99
|
+
vibecheck_conductor_propose: {
|
|
100
|
+
name: "vibecheck_conductor_propose",
|
|
101
|
+
description: "Submit a change proposal for multi-agent coordination. Checks for conflicts with other agents.",
|
|
102
|
+
inputSchema: {
|
|
103
|
+
type: "object",
|
|
104
|
+
properties: {
|
|
105
|
+
sessionId: {
|
|
106
|
+
type: "string",
|
|
107
|
+
description: "Session ID from vibecheck_conductor_register",
|
|
108
|
+
},
|
|
109
|
+
proposalId: {
|
|
110
|
+
type: "string",
|
|
111
|
+
description: "Unique proposal ID",
|
|
112
|
+
},
|
|
113
|
+
intent: {
|
|
114
|
+
type: "string",
|
|
115
|
+
description: "What you intend to accomplish with this change",
|
|
116
|
+
},
|
|
117
|
+
operations: {
|
|
118
|
+
type: "array",
|
|
119
|
+
items: {
|
|
120
|
+
type: "object",
|
|
121
|
+
properties: {
|
|
122
|
+
type: { type: "string", enum: ["create", "modify", "delete", "move"] },
|
|
123
|
+
path: { type: "string" },
|
|
124
|
+
content: { type: "string" },
|
|
125
|
+
},
|
|
126
|
+
},
|
|
127
|
+
description: "List of file operations in this proposal",
|
|
128
|
+
},
|
|
129
|
+
assumptions: {
|
|
130
|
+
type: "array",
|
|
131
|
+
items: {
|
|
132
|
+
type: "object",
|
|
133
|
+
properties: {
|
|
134
|
+
type: { type: "string" },
|
|
135
|
+
target: { type: "string" },
|
|
136
|
+
expectedValue: {},
|
|
137
|
+
},
|
|
138
|
+
},
|
|
139
|
+
description: "Assumptions this proposal makes about the codebase",
|
|
140
|
+
},
|
|
141
|
+
projectRoot: {
|
|
142
|
+
type: "string",
|
|
143
|
+
description: "Project root directory",
|
|
144
|
+
},
|
|
145
|
+
},
|
|
146
|
+
required: ["sessionId", "proposalId", "intent", "operations", "projectRoot"],
|
|
147
|
+
},
|
|
148
|
+
},
|
|
149
|
+
|
|
150
|
+
// Get coordination status
|
|
151
|
+
vibecheck_conductor_status: {
|
|
152
|
+
name: "vibecheck_conductor_status",
|
|
153
|
+
description: "Get the current status of multi-agent coordination including active sessions, locks, and conflicts.",
|
|
154
|
+
inputSchema: {
|
|
155
|
+
type: "object",
|
|
156
|
+
properties: {
|
|
157
|
+
projectRoot: {
|
|
158
|
+
type: "string",
|
|
159
|
+
description: "Project root directory",
|
|
160
|
+
},
|
|
161
|
+
includeDetails: {
|
|
162
|
+
type: "boolean",
|
|
163
|
+
default: false,
|
|
164
|
+
description: "Include detailed information about each session and lock",
|
|
165
|
+
},
|
|
166
|
+
},
|
|
167
|
+
required: ["projectRoot"],
|
|
168
|
+
},
|
|
169
|
+
},
|
|
170
|
+
|
|
171
|
+
// Terminate a session
|
|
172
|
+
vibecheck_conductor_terminate: {
|
|
173
|
+
name: "vibecheck_conductor_terminate",
|
|
174
|
+
description: "Terminate an agent session and release all its locks.",
|
|
175
|
+
inputSchema: {
|
|
176
|
+
type: "object",
|
|
177
|
+
properties: {
|
|
178
|
+
sessionId: {
|
|
179
|
+
type: "string",
|
|
180
|
+
description: "Session ID to terminate",
|
|
181
|
+
},
|
|
182
|
+
},
|
|
183
|
+
required: ["sessionId"],
|
|
184
|
+
},
|
|
185
|
+
},
|
|
186
|
+
};
|
|
187
|
+
|
|
188
|
+
/**
|
|
189
|
+
* Handle conductor register tool call
|
|
190
|
+
*/
|
|
191
|
+
export async function handleConductorRegister(args, projectRoot) {
|
|
192
|
+
try {
|
|
193
|
+
// Input validation
|
|
194
|
+
if (!args || typeof args !== 'object') {
|
|
195
|
+
return { success: false, error: "Invalid arguments" };
|
|
196
|
+
}
|
|
197
|
+
if (!args.agentId || typeof args.agentId !== 'string') {
|
|
198
|
+
return { success: false, error: "agentId is required and must be a string" };
|
|
199
|
+
}
|
|
200
|
+
|
|
201
|
+
const resolvedRoot = args.projectRoot || projectRoot;
|
|
202
|
+
if (!resolvedRoot) {
|
|
203
|
+
return { success: false, error: "projectRoot is required" };
|
|
204
|
+
}
|
|
205
|
+
|
|
206
|
+
conductor.init(resolvedRoot);
|
|
207
|
+
|
|
208
|
+
const session = conductor.registerAgent({
|
|
209
|
+
agentId: args.agentId,
|
|
210
|
+
tier: args.tier || "FREE",
|
|
211
|
+
projectRoot: resolvedRoot,
|
|
212
|
+
workingFiles: Array.isArray(args.workingFiles) ? args.workingFiles : [],
|
|
213
|
+
});
|
|
214
|
+
|
|
215
|
+
return {
|
|
216
|
+
success: true,
|
|
217
|
+
sessionId: session.sessionId,
|
|
218
|
+
agentId: session.agentId,
|
|
219
|
+
tier: session.tier,
|
|
220
|
+
trust: session.trust,
|
|
221
|
+
message: `Agent '${args.agentId}' registered successfully`,
|
|
222
|
+
};
|
|
223
|
+
} catch (error) {
|
|
224
|
+
return {
|
|
225
|
+
success: false,
|
|
226
|
+
error: getErrorMessage(error),
|
|
227
|
+
};
|
|
228
|
+
}
|
|
229
|
+
}
|
|
230
|
+
|
|
231
|
+
/**
|
|
232
|
+
* Handle conductor acquire lock tool call
|
|
233
|
+
*/
|
|
234
|
+
export async function handleConductorAcquireLock(args, projectRoot) {
|
|
235
|
+
try {
|
|
236
|
+
// Input validation
|
|
237
|
+
if (!args?.sessionId || !args?.path) {
|
|
238
|
+
return { success: false, error: "sessionId and path are required" };
|
|
239
|
+
}
|
|
240
|
+
if (!projectRoot) {
|
|
241
|
+
return { success: false, error: "projectRoot context is required" };
|
|
242
|
+
}
|
|
243
|
+
|
|
244
|
+
conductor.init(projectRoot);
|
|
245
|
+
|
|
246
|
+
const result = conductor.acquireLock({
|
|
247
|
+
sessionId: args.sessionId,
|
|
248
|
+
path: args.path,
|
|
249
|
+
type: args.type || "exclusive",
|
|
250
|
+
reason: args.reason || "",
|
|
251
|
+
});
|
|
252
|
+
|
|
253
|
+
if (result.acquired) {
|
|
254
|
+
return {
|
|
255
|
+
success: true,
|
|
256
|
+
lockId: result.lock.lockId,
|
|
257
|
+
path: result.lock.path,
|
|
258
|
+
type: result.lock.type,
|
|
259
|
+
expiresAt: result.lock.expiresAt,
|
|
260
|
+
upgraded: result.upgraded || false,
|
|
261
|
+
refreshed: result.refreshed || false,
|
|
262
|
+
message: result.upgraded
|
|
263
|
+
? "Lock upgraded to exclusive"
|
|
264
|
+
: result.refreshed
|
|
265
|
+
? "Lock refreshed"
|
|
266
|
+
: "Lock acquired",
|
|
267
|
+
};
|
|
268
|
+
} else {
|
|
269
|
+
return {
|
|
270
|
+
success: false,
|
|
271
|
+
conflict: true,
|
|
272
|
+
blockedBy: result.conflictingLocks.map(l => ({
|
|
273
|
+
lockId: l.lockId,
|
|
274
|
+
agentId: l.agentId,
|
|
275
|
+
sessionId: l.sessionId,
|
|
276
|
+
path: l.path,
|
|
277
|
+
reason: l.reason,
|
|
278
|
+
})),
|
|
279
|
+
message: result.message,
|
|
280
|
+
};
|
|
281
|
+
}
|
|
282
|
+
} catch (error) {
|
|
283
|
+
return {
|
|
284
|
+
success: false,
|
|
285
|
+
error: getErrorMessage(error),
|
|
286
|
+
};
|
|
287
|
+
}
|
|
288
|
+
}
|
|
289
|
+
|
|
290
|
+
/**
|
|
291
|
+
* Handle conductor release lock tool call
|
|
292
|
+
*/
|
|
293
|
+
export async function handleConductorReleaseLock(args, projectRoot) {
|
|
294
|
+
try {
|
|
295
|
+
// Input validation
|
|
296
|
+
if (!args?.lockId || !args?.sessionId) {
|
|
297
|
+
return { success: false, error: "lockId and sessionId are required" };
|
|
298
|
+
}
|
|
299
|
+
if (!projectRoot) {
|
|
300
|
+
return { success: false, error: "projectRoot context is required" };
|
|
301
|
+
}
|
|
302
|
+
|
|
303
|
+
conductor.init(projectRoot);
|
|
304
|
+
|
|
305
|
+
const success = conductor.releaseLock(args.lockId, args.sessionId);
|
|
306
|
+
|
|
307
|
+
return {
|
|
308
|
+
success,
|
|
309
|
+
message: success ? "Lock released" : "Lock not found or not owned by session",
|
|
310
|
+
};
|
|
311
|
+
} catch (error) {
|
|
312
|
+
return {
|
|
313
|
+
success: false,
|
|
314
|
+
error: getErrorMessage(error),
|
|
315
|
+
};
|
|
316
|
+
}
|
|
317
|
+
}
|
|
318
|
+
|
|
319
|
+
/**
|
|
320
|
+
* Handle conductor propose tool call
|
|
321
|
+
*/
|
|
322
|
+
export async function handleConductorPropose(args, projectRoot) {
|
|
323
|
+
try {
|
|
324
|
+
conductor.init(args.projectRoot || projectRoot);
|
|
325
|
+
|
|
326
|
+
const session = conductor.sessionManager.getSession(args.sessionId);
|
|
327
|
+
if (!session) {
|
|
328
|
+
return {
|
|
329
|
+
success: false,
|
|
330
|
+
error: "Invalid or expired session. Please register first.",
|
|
331
|
+
};
|
|
332
|
+
}
|
|
333
|
+
|
|
334
|
+
const proposal = {
|
|
335
|
+
proposalId: args.proposalId,
|
|
336
|
+
sessionId: args.sessionId,
|
|
337
|
+
agentId: session.agentId,
|
|
338
|
+
tier: session.tier,
|
|
339
|
+
intent: args.intent,
|
|
340
|
+
operations: args.operations || [],
|
|
341
|
+
assumptions: args.assumptions || [],
|
|
342
|
+
createdAt: new Date(),
|
|
343
|
+
};
|
|
344
|
+
|
|
345
|
+
const result = conductor.submitProposal(proposal);
|
|
346
|
+
|
|
347
|
+
if (result.accepted) {
|
|
348
|
+
// Update session with working files
|
|
349
|
+
const files = proposal.operations.map(op => op.path).filter(Boolean);
|
|
350
|
+
for (const file of files) {
|
|
351
|
+
conductor.sessionManager.addWorkingFile(args.sessionId, file);
|
|
352
|
+
}
|
|
353
|
+
|
|
354
|
+
return {
|
|
355
|
+
success: true,
|
|
356
|
+
accepted: true,
|
|
357
|
+
requestId: result.requestId,
|
|
358
|
+
queuePosition: result.position,
|
|
359
|
+
warnings: result.warnings.map(w => ({
|
|
360
|
+
type: w.type,
|
|
361
|
+
severity: w.severity,
|
|
362
|
+
description: w.description,
|
|
363
|
+
})),
|
|
364
|
+
message: `Proposal accepted and queued at position ${result.position}`,
|
|
365
|
+
};
|
|
366
|
+
} else {
|
|
367
|
+
return {
|
|
368
|
+
success: false,
|
|
369
|
+
accepted: false,
|
|
370
|
+
conflicts: result.conflicts.map(c => ({
|
|
371
|
+
type: c.type,
|
|
372
|
+
severity: c.severity,
|
|
373
|
+
description: c.description,
|
|
374
|
+
conflictsWith: c.proposalA === args.proposalId ? c.proposalB : c.proposalA,
|
|
375
|
+
})),
|
|
376
|
+
message: "Proposal blocked by conflicts. Resolve conflicts before proceeding.",
|
|
377
|
+
};
|
|
378
|
+
}
|
|
379
|
+
} catch (error) {
|
|
380
|
+
return {
|
|
381
|
+
success: false,
|
|
382
|
+
error: getErrorMessage(error),
|
|
383
|
+
};
|
|
384
|
+
}
|
|
385
|
+
}
|
|
386
|
+
|
|
387
|
+
/**
|
|
388
|
+
* Handle conductor status tool call
|
|
389
|
+
*/
|
|
390
|
+
export async function handleConductorStatus(args, projectRoot) {
|
|
391
|
+
try {
|
|
392
|
+
const resolvedRoot = args?.projectRoot || projectRoot;
|
|
393
|
+
if (!resolvedRoot) {
|
|
394
|
+
return { success: false, error: "projectRoot is required" };
|
|
395
|
+
}
|
|
396
|
+
|
|
397
|
+
conductor.init(resolvedRoot);
|
|
398
|
+
|
|
399
|
+
const status = conductor.getStatus(resolvedRoot);
|
|
400
|
+
|
|
401
|
+
const response = {
|
|
402
|
+
success: true,
|
|
403
|
+
status: {
|
|
404
|
+
totalSessions: status.sessions.totalSessions,
|
|
405
|
+
activeAgents: status.sessions.activeAgents,
|
|
406
|
+
totalLocks: status.locks.totalLocks,
|
|
407
|
+
queueLength: status.queue.queueLength,
|
|
408
|
+
processing: status.queue.processing,
|
|
409
|
+
unresolvedConflicts: status.conflicts,
|
|
410
|
+
deadlocks: status.deadlocks.length,
|
|
411
|
+
},
|
|
412
|
+
};
|
|
413
|
+
|
|
414
|
+
if (args.includeDetails) {
|
|
415
|
+
response.details = {
|
|
416
|
+
agents: status.activeAgents,
|
|
417
|
+
sessionsByTier: status.sessions.byTier,
|
|
418
|
+
lockStats: status.locks,
|
|
419
|
+
queueByTier: status.queue.byTier,
|
|
420
|
+
};
|
|
421
|
+
|
|
422
|
+
if (status.deadlocks.length > 0) {
|
|
423
|
+
response.details.deadlocks = status.deadlocks;
|
|
424
|
+
}
|
|
425
|
+
}
|
|
426
|
+
|
|
427
|
+
return response;
|
|
428
|
+
} catch (error) {
|
|
429
|
+
return {
|
|
430
|
+
success: false,
|
|
431
|
+
error: getErrorMessage(error),
|
|
432
|
+
};
|
|
433
|
+
}
|
|
434
|
+
}
|
|
435
|
+
|
|
436
|
+
/**
|
|
437
|
+
* Handle conductor terminate tool call
|
|
438
|
+
*/
|
|
439
|
+
export async function handleConductorTerminate(args, projectRoot) {
|
|
440
|
+
try {
|
|
441
|
+
// Input validation
|
|
442
|
+
if (!args?.sessionId) {
|
|
443
|
+
return { success: false, error: "sessionId is required" };
|
|
444
|
+
}
|
|
445
|
+
if (!projectRoot) {
|
|
446
|
+
return { success: false, error: "projectRoot context is required" };
|
|
447
|
+
}
|
|
448
|
+
|
|
449
|
+
conductor.init(projectRoot);
|
|
450
|
+
|
|
451
|
+
const result = conductor.terminateSession(args.sessionId);
|
|
452
|
+
|
|
453
|
+
return {
|
|
454
|
+
success: result.sessionTerminated,
|
|
455
|
+
locksReleased: result.locksReleased,
|
|
456
|
+
message: result.sessionTerminated
|
|
457
|
+
? `Session terminated, ${result.locksReleased} locks released`
|
|
458
|
+
: "Session not found",
|
|
459
|
+
};
|
|
460
|
+
} catch (error) {
|
|
461
|
+
return {
|
|
462
|
+
success: false,
|
|
463
|
+
error: getErrorMessage(error),
|
|
464
|
+
};
|
|
465
|
+
}
|
|
466
|
+
}
|
|
467
|
+
|
|
468
|
+
/**
|
|
469
|
+
* Router for conductor tool calls
|
|
470
|
+
*/
|
|
471
|
+
export async function handleConductorToolCall(toolName, args, projectRoot) {
|
|
472
|
+
// Top-level safety guard
|
|
473
|
+
try {
|
|
474
|
+
if (!toolName || typeof toolName !== 'string') {
|
|
475
|
+
return { success: false, error: "Invalid tool name" };
|
|
476
|
+
}
|
|
477
|
+
|
|
478
|
+
switch (toolName) {
|
|
479
|
+
case "vibecheck_conductor_register":
|
|
480
|
+
return handleConductorRegister(args, projectRoot);
|
|
481
|
+
case "vibecheck_conductor_acquire_lock":
|
|
482
|
+
return handleConductorAcquireLock(args, projectRoot);
|
|
483
|
+
case "vibecheck_conductor_release_lock":
|
|
484
|
+
return handleConductorReleaseLock(args, projectRoot);
|
|
485
|
+
case "vibecheck_conductor_propose":
|
|
486
|
+
return handleConductorPropose(args, projectRoot);
|
|
487
|
+
case "vibecheck_conductor_status":
|
|
488
|
+
return handleConductorStatus(args, projectRoot);
|
|
489
|
+
case "vibecheck_conductor_terminate":
|
|
490
|
+
return handleConductorTerminate(args, projectRoot);
|
|
491
|
+
default:
|
|
492
|
+
return {
|
|
493
|
+
success: false,
|
|
494
|
+
error: `Unknown conductor tool: ${toolName}`,
|
|
495
|
+
};
|
|
496
|
+
}
|
|
497
|
+
} catch (error) {
|
|
498
|
+
return {
|
|
499
|
+
success: false,
|
|
500
|
+
error: `Conductor error: ${getErrorMessage(error)}`,
|
|
501
|
+
};
|
|
502
|
+
}
|
|
503
|
+
}
|
|
504
|
+
|
|
505
|
+
/**
|
|
506
|
+
* Get all conductor tool definitions
|
|
507
|
+
*/
|
|
508
|
+
export function getConductorTools() {
|
|
509
|
+
return Object.values(CONDUCTOR_TOOLS);
|
|
510
|
+
}
|