@vm0/cli 9.113.3 → 9.114.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/{chunk-3M2HM4GT.js → chunk-YGGTGOHH.js} +45 -13
- package/{chunk-3M2HM4GT.js.map → chunk-YGGTGOHH.js.map} +1 -1
- package/index.js +10 -10
- package/package.json +1 -1
- package/zero.js +389 -61
- package/zero.js.map +1 -1
|
@@ -34652,7 +34652,7 @@ if (DSN) {
|
|
|
34652
34652
|
Sentry.init({
|
|
34653
34653
|
dsn: DSN,
|
|
34654
34654
|
environment: process.env.SENTRY_ENVIRONMENT ?? "production",
|
|
34655
|
-
release: "9.
|
|
34655
|
+
release: "9.114.0",
|
|
34656
34656
|
sendDefaultPii: false,
|
|
34657
34657
|
tracesSampleRate: 0,
|
|
34658
34658
|
shutdownTimeout: 500,
|
|
@@ -34671,7 +34671,7 @@ if (DSN) {
|
|
|
34671
34671
|
}
|
|
34672
34672
|
});
|
|
34673
34673
|
Sentry.setContext("cli", {
|
|
34674
|
-
version: "9.
|
|
34674
|
+
version: "9.114.0",
|
|
34675
34675
|
command: process.argv.slice(2).join(" ")
|
|
34676
34676
|
});
|
|
34677
34677
|
Sentry.setContext("runtime", {
|
|
@@ -35786,8 +35786,8 @@ var gmailFirewall = {
|
|
|
35786
35786
|
name: "gmail.send",
|
|
35787
35787
|
description: "Send email on your behalf",
|
|
35788
35788
|
rules: [
|
|
35789
|
-
"POST /v1/users/{userId}/
|
|
35790
|
-
"POST /v1/users/{userId}/
|
|
35789
|
+
"POST /v1/users/{userId}/drafts/send",
|
|
35790
|
+
"POST /v1/users/{userId}/messages/send"
|
|
35791
35791
|
]
|
|
35792
35792
|
},
|
|
35793
35793
|
{
|
|
@@ -35929,8 +35929,8 @@ var gmailFirewall = {
|
|
|
35929
35929
|
name: "gmail.send",
|
|
35930
35930
|
description: "Send email on your behalf",
|
|
35931
35931
|
rules: [
|
|
35932
|
-
"POST /v1/users/{userId}/
|
|
35933
|
-
"POST /v1/users/{userId}/
|
|
35932
|
+
"POST /v1/users/{userId}/drafts/send",
|
|
35933
|
+
"POST /v1/users/{userId}/messages/send"
|
|
35934
35934
|
]
|
|
35935
35935
|
}
|
|
35936
35936
|
]
|
|
@@ -35997,8 +35997,8 @@ var gmailFirewall = {
|
|
|
35997
35997
|
name: "gmail.send",
|
|
35998
35998
|
description: "Send email on your behalf",
|
|
35999
35999
|
rules: [
|
|
36000
|
-
"POST /v1/users/{userId}/
|
|
36001
|
-
"POST /v1/users/{userId}/
|
|
36000
|
+
"POST /v1/users/{userId}/drafts/send",
|
|
36001
|
+
"POST /v1/users/{userId}/messages/send"
|
|
36002
36002
|
]
|
|
36003
36003
|
}
|
|
36004
36004
|
]
|
|
@@ -36006,15 +36006,12 @@ var gmailFirewall = {
|
|
|
36006
36006
|
]
|
|
36007
36007
|
};
|
|
36008
36008
|
var gmailDefaultAllowed = [
|
|
36009
|
-
// Read
|
|
36010
36009
|
"gmail.readonly",
|
|
36011
36010
|
"gmail.metadata",
|
|
36012
36011
|
"gmail.addons.current.message.readonly",
|
|
36013
36012
|
"gmail.addons.current.message.metadata",
|
|
36014
36013
|
"gmail.addons.current.message.action",
|
|
36015
|
-
// Compose (draft-only after split)
|
|
36016
36014
|
"gmail.compose",
|
|
36017
|
-
// Labels
|
|
36018
36015
|
"gmail.labels"
|
|
36019
36016
|
];
|
|
36020
36017
|
|
|
@@ -51235,7 +51232,7 @@ var CONNECTOR_TYPES_DEF = {
|
|
|
51235
51232
|
oauth: {
|
|
51236
51233
|
authorizationUrl: "https://github.com/login/oauth/authorize",
|
|
51237
51234
|
tokenUrl: "https://github.com/login/oauth/access_token",
|
|
51238
|
-
scopes: ["repo", "project"]
|
|
51235
|
+
scopes: ["repo", "project", "workflow"]
|
|
51239
51236
|
}
|
|
51240
51237
|
},
|
|
51241
51238
|
notion: {
|
|
@@ -68489,6 +68486,30 @@ var networkPolicySchema = external_exports.object({
|
|
|
68489
68486
|
unknownPolicy: firewallPolicyValueSchema
|
|
68490
68487
|
});
|
|
68491
68488
|
var networkPoliciesSchema = external_exports.record(external_exports.string(), networkPolicySchema);
|
|
68489
|
+
var AUTH_SECRET_PATTERN = /\$\{\{\s*secrets\.([a-zA-Z_][a-zA-Z0-9_]*)\s*\}\}/g;
|
|
68490
|
+
function basicAuthTemplateRe() {
|
|
68491
|
+
return /\$\{\{\s*basic\(\s*(?:(secrets|vars)\.([a-zA-Z_][a-zA-Z0-9_]*))?\s*,\s*(?:(secrets|vars)\.([a-zA-Z_][a-zA-Z0-9_]*))?\s*\)\s*\}\}/g;
|
|
68492
|
+
}
|
|
68493
|
+
function extractSecretNamesFromApis(apis) {
|
|
68494
|
+
const names = /* @__PURE__ */ new Set();
|
|
68495
|
+
for (const entry of apis) {
|
|
68496
|
+
for (const value of Object.values(entry.auth.headers)) {
|
|
68497
|
+
for (const match of value.matchAll(AUTH_SECRET_PATTERN)) {
|
|
68498
|
+
names.add(match[1]);
|
|
68499
|
+
}
|
|
68500
|
+
for (const match of value.matchAll(basicAuthTemplateRe())) {
|
|
68501
|
+
if (match[1] === "secrets" && match[2]) names.add(match[2]);
|
|
68502
|
+
if (match[3] === "secrets" && match[4]) names.add(match[4]);
|
|
68503
|
+
}
|
|
68504
|
+
}
|
|
68505
|
+
if (entry.auth.base) {
|
|
68506
|
+
for (const match of entry.auth.base.matchAll(AUTH_SECRET_PATTERN)) {
|
|
68507
|
+
names.add(match[1]);
|
|
68508
|
+
}
|
|
68509
|
+
}
|
|
68510
|
+
}
|
|
68511
|
+
return [...names];
|
|
68512
|
+
}
|
|
68492
68513
|
var BASE_URL_VARS_PATTERN = /\$\{\{\s*vars\.([a-zA-Z_][a-zA-Z0-9_]*)\s*\}\}/;
|
|
68493
68514
|
var BASE_URL_VARS_PATTERN_G = new RegExp(BASE_URL_VARS_PATTERN.source, "g");
|
|
68494
68515
|
|
|
@@ -72418,6 +72439,7 @@ var runContextFirewallSchema = external_exports.object({
|
|
|
72418
72439
|
var runContextResponseSchema = external_exports.object({
|
|
72419
72440
|
prompt: external_exports.string(),
|
|
72420
72441
|
appendSystemPrompt: external_exports.string().nullable(),
|
|
72442
|
+
runId: external_exports.string(),
|
|
72421
72443
|
sessionId: external_exports.string().nullable(),
|
|
72422
72444
|
secretNames: external_exports.array(external_exports.string()),
|
|
72423
72445
|
vars: external_exports.record(external_exports.string(), external_exports.string()).nullable(),
|
|
@@ -74726,6 +74748,13 @@ async function getZeroRunAgentEvents(id, options) {
|
|
|
74726
74748
|
if (result.status === 200) return result.body;
|
|
74727
74749
|
handleError(result, `Failed to get zero run events for "${id}"`);
|
|
74728
74750
|
}
|
|
74751
|
+
async function getZeroRunContext(id) {
|
|
74752
|
+
const config2 = await getClientConfig();
|
|
74753
|
+
const client = initClient(zeroRunContextContract, config2);
|
|
74754
|
+
const result = await client.getContext({ params: { id } });
|
|
74755
|
+
if (result.status === 200) return result.body;
|
|
74756
|
+
handleError(result, `Failed to get zero run context for "${id}"`);
|
|
74757
|
+
}
|
|
74729
74758
|
|
|
74730
74759
|
// src/lib/api/domains/logs.ts
|
|
74731
74760
|
init_esm_shims();
|
|
@@ -76489,6 +76518,7 @@ export {
|
|
|
76489
76518
|
external_exports,
|
|
76490
76519
|
volumeConfigSchema,
|
|
76491
76520
|
agentDefinitionSchema,
|
|
76521
|
+
extractSecretNamesFromApis,
|
|
76492
76522
|
ALL_RUN_STATUSES,
|
|
76493
76523
|
MODEL_PROVIDER_TYPES,
|
|
76494
76524
|
getSelectableProviderTypes,
|
|
@@ -76503,6 +76533,7 @@ export {
|
|
|
76503
76533
|
getCustomModelPlaceholder,
|
|
76504
76534
|
CONNECTOR_TYPES,
|
|
76505
76535
|
connectorTypeSchema,
|
|
76536
|
+
getConnectorEnvironmentMapping,
|
|
76506
76537
|
getConnectorDerivedNames,
|
|
76507
76538
|
hasRequiredScopes,
|
|
76508
76539
|
getScopeDiff,
|
|
@@ -76600,6 +76631,7 @@ export {
|
|
|
76600
76631
|
createZeroRun,
|
|
76601
76632
|
getZeroRun,
|
|
76602
76633
|
getZeroRunAgentEvents,
|
|
76634
|
+
getZeroRunContext,
|
|
76603
76635
|
listZeroLogs,
|
|
76604
76636
|
searchZeroLogs,
|
|
76605
76637
|
getSystemLog,
|
|
@@ -76649,4 +76681,4 @@ undici/lib/web/fetch/body.js:
|
|
|
76649
76681
|
undici/lib/web/websocket/frame.js:
|
|
76650
76682
|
(*! ws. MIT License. Einar Otto Stangvik <einaros@gmail.com> *)
|
|
76651
76683
|
*/
|
|
76652
|
-
//# sourceMappingURL=chunk-
|
|
76684
|
+
//# sourceMappingURL=chunk-YGGTGOHH.js.map
|