@vm0/cli 9.113.3 → 9.114.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -34652,7 +34652,7 @@ if (DSN) {
34652
34652
  Sentry.init({
34653
34653
  dsn: DSN,
34654
34654
  environment: process.env.SENTRY_ENVIRONMENT ?? "production",
34655
- release: "9.113.3",
34655
+ release: "9.114.0",
34656
34656
  sendDefaultPii: false,
34657
34657
  tracesSampleRate: 0,
34658
34658
  shutdownTimeout: 500,
@@ -34671,7 +34671,7 @@ if (DSN) {
34671
34671
  }
34672
34672
  });
34673
34673
  Sentry.setContext("cli", {
34674
- version: "9.113.3",
34674
+ version: "9.114.0",
34675
34675
  command: process.argv.slice(2).join(" ")
34676
34676
  });
34677
34677
  Sentry.setContext("runtime", {
@@ -35786,8 +35786,8 @@ var gmailFirewall = {
35786
35786
  name: "gmail.send",
35787
35787
  description: "Send email on your behalf",
35788
35788
  rules: [
35789
- "POST /v1/users/{userId}/messages/send",
35790
- "POST /v1/users/{userId}/drafts/send"
35789
+ "POST /v1/users/{userId}/drafts/send",
35790
+ "POST /v1/users/{userId}/messages/send"
35791
35791
  ]
35792
35792
  },
35793
35793
  {
@@ -35929,8 +35929,8 @@ var gmailFirewall = {
35929
35929
  name: "gmail.send",
35930
35930
  description: "Send email on your behalf",
35931
35931
  rules: [
35932
- "POST /v1/users/{userId}/messages/send",
35933
- "POST /v1/users/{userId}/drafts/send"
35932
+ "POST /v1/users/{userId}/drafts/send",
35933
+ "POST /v1/users/{userId}/messages/send"
35934
35934
  ]
35935
35935
  }
35936
35936
  ]
@@ -35997,8 +35997,8 @@ var gmailFirewall = {
35997
35997
  name: "gmail.send",
35998
35998
  description: "Send email on your behalf",
35999
35999
  rules: [
36000
- "POST /v1/users/{userId}/messages/send",
36001
- "POST /v1/users/{userId}/drafts/send"
36000
+ "POST /v1/users/{userId}/drafts/send",
36001
+ "POST /v1/users/{userId}/messages/send"
36002
36002
  ]
36003
36003
  }
36004
36004
  ]
@@ -36006,15 +36006,12 @@ var gmailFirewall = {
36006
36006
  ]
36007
36007
  };
36008
36008
  var gmailDefaultAllowed = [
36009
- // Read
36010
36009
  "gmail.readonly",
36011
36010
  "gmail.metadata",
36012
36011
  "gmail.addons.current.message.readonly",
36013
36012
  "gmail.addons.current.message.metadata",
36014
36013
  "gmail.addons.current.message.action",
36015
- // Compose (draft-only after split)
36016
36014
  "gmail.compose",
36017
- // Labels
36018
36015
  "gmail.labels"
36019
36016
  ];
36020
36017
 
@@ -51235,7 +51232,7 @@ var CONNECTOR_TYPES_DEF = {
51235
51232
  oauth: {
51236
51233
  authorizationUrl: "https://github.com/login/oauth/authorize",
51237
51234
  tokenUrl: "https://github.com/login/oauth/access_token",
51238
- scopes: ["repo", "project"]
51235
+ scopes: ["repo", "project", "workflow"]
51239
51236
  }
51240
51237
  },
51241
51238
  notion: {
@@ -68489,6 +68486,30 @@ var networkPolicySchema = external_exports.object({
68489
68486
  unknownPolicy: firewallPolicyValueSchema
68490
68487
  });
68491
68488
  var networkPoliciesSchema = external_exports.record(external_exports.string(), networkPolicySchema);
68489
+ var AUTH_SECRET_PATTERN = /\$\{\{\s*secrets\.([a-zA-Z_][a-zA-Z0-9_]*)\s*\}\}/g;
68490
+ function basicAuthTemplateRe() {
68491
+ return /\$\{\{\s*basic\(\s*(?:(secrets|vars)\.([a-zA-Z_][a-zA-Z0-9_]*))?\s*,\s*(?:(secrets|vars)\.([a-zA-Z_][a-zA-Z0-9_]*))?\s*\)\s*\}\}/g;
68492
+ }
68493
+ function extractSecretNamesFromApis(apis) {
68494
+ const names = /* @__PURE__ */ new Set();
68495
+ for (const entry of apis) {
68496
+ for (const value of Object.values(entry.auth.headers)) {
68497
+ for (const match of value.matchAll(AUTH_SECRET_PATTERN)) {
68498
+ names.add(match[1]);
68499
+ }
68500
+ for (const match of value.matchAll(basicAuthTemplateRe())) {
68501
+ if (match[1] === "secrets" && match[2]) names.add(match[2]);
68502
+ if (match[3] === "secrets" && match[4]) names.add(match[4]);
68503
+ }
68504
+ }
68505
+ if (entry.auth.base) {
68506
+ for (const match of entry.auth.base.matchAll(AUTH_SECRET_PATTERN)) {
68507
+ names.add(match[1]);
68508
+ }
68509
+ }
68510
+ }
68511
+ return [...names];
68512
+ }
68492
68513
  var BASE_URL_VARS_PATTERN = /\$\{\{\s*vars\.([a-zA-Z_][a-zA-Z0-9_]*)\s*\}\}/;
68493
68514
  var BASE_URL_VARS_PATTERN_G = new RegExp(BASE_URL_VARS_PATTERN.source, "g");
68494
68515
 
@@ -72418,6 +72439,7 @@ var runContextFirewallSchema = external_exports.object({
72418
72439
  var runContextResponseSchema = external_exports.object({
72419
72440
  prompt: external_exports.string(),
72420
72441
  appendSystemPrompt: external_exports.string().nullable(),
72442
+ runId: external_exports.string(),
72421
72443
  sessionId: external_exports.string().nullable(),
72422
72444
  secretNames: external_exports.array(external_exports.string()),
72423
72445
  vars: external_exports.record(external_exports.string(), external_exports.string()).nullable(),
@@ -74726,6 +74748,13 @@ async function getZeroRunAgentEvents(id, options) {
74726
74748
  if (result.status === 200) return result.body;
74727
74749
  handleError(result, `Failed to get zero run events for "${id}"`);
74728
74750
  }
74751
+ async function getZeroRunContext(id) {
74752
+ const config2 = await getClientConfig();
74753
+ const client = initClient(zeroRunContextContract, config2);
74754
+ const result = await client.getContext({ params: { id } });
74755
+ if (result.status === 200) return result.body;
74756
+ handleError(result, `Failed to get zero run context for "${id}"`);
74757
+ }
74729
74758
 
74730
74759
  // src/lib/api/domains/logs.ts
74731
74760
  init_esm_shims();
@@ -76489,6 +76518,7 @@ export {
76489
76518
  external_exports,
76490
76519
  volumeConfigSchema,
76491
76520
  agentDefinitionSchema,
76521
+ extractSecretNamesFromApis,
76492
76522
  ALL_RUN_STATUSES,
76493
76523
  MODEL_PROVIDER_TYPES,
76494
76524
  getSelectableProviderTypes,
@@ -76503,6 +76533,7 @@ export {
76503
76533
  getCustomModelPlaceholder,
76504
76534
  CONNECTOR_TYPES,
76505
76535
  connectorTypeSchema,
76536
+ getConnectorEnvironmentMapping,
76506
76537
  getConnectorDerivedNames,
76507
76538
  hasRequiredScopes,
76508
76539
  getScopeDiff,
@@ -76600,6 +76631,7 @@ export {
76600
76631
  createZeroRun,
76601
76632
  getZeroRun,
76602
76633
  getZeroRunAgentEvents,
76634
+ getZeroRunContext,
76603
76635
  listZeroLogs,
76604
76636
  searchZeroLogs,
76605
76637
  getSystemLog,
@@ -76649,4 +76681,4 @@ undici/lib/web/fetch/body.js:
76649
76681
  undici/lib/web/websocket/frame.js:
76650
76682
  (*! ws. MIT License. Einar Otto Stangvik <einaros@gmail.com> *)
76651
76683
  */
76652
- //# sourceMappingURL=chunk-3M2HM4GT.js.map
76684
+ //# sourceMappingURL=chunk-YGGTGOHH.js.map