@vm0/cli 9.113.4 → 9.114.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/{chunk-2TQ7ATTO.js → chunk-KFF4XQ5R.js} +38 -3
- package/{chunk-2TQ7ATTO.js.map → chunk-KFF4XQ5R.js.map} +1 -1
- package/index.js +10 -10
- package/package.json +1 -1
- package/zero.js +389 -61
- package/zero.js.map +1 -1
|
@@ -34652,7 +34652,7 @@ if (DSN) {
|
|
|
34652
34652
|
Sentry.init({
|
|
34653
34653
|
dsn: DSN,
|
|
34654
34654
|
environment: process.env.SENTRY_ENVIRONMENT ?? "production",
|
|
34655
|
-
release: "9.
|
|
34655
|
+
release: "9.114.1",
|
|
34656
34656
|
sendDefaultPii: false,
|
|
34657
34657
|
tracesSampleRate: 0,
|
|
34658
34658
|
shutdownTimeout: 500,
|
|
@@ -34671,7 +34671,7 @@ if (DSN) {
|
|
|
34671
34671
|
}
|
|
34672
34672
|
});
|
|
34673
34673
|
Sentry.setContext("cli", {
|
|
34674
|
-
version: "9.
|
|
34674
|
+
version: "9.114.1",
|
|
34675
34675
|
command: process.argv.slice(2).join(" ")
|
|
34676
34676
|
});
|
|
34677
34677
|
Sentry.setContext("runtime", {
|
|
@@ -61889,6 +61889,7 @@ var xFirewall = {
|
|
|
61889
61889
|
"DELETE /2/account_activity/webhooks/{webhook_id}/subscriptions/{user_id}/all",
|
|
61890
61890
|
"GET /2/activity/stream",
|
|
61891
61891
|
"GET /2/activity/subscriptions",
|
|
61892
|
+
"DELETE /2/activity/subscriptions",
|
|
61892
61893
|
"PUT /2/activity/subscriptions/{subscription_id}",
|
|
61893
61894
|
"DELETE /2/activity/subscriptions/{subscription_id}",
|
|
61894
61895
|
"GET /2/compliance/jobs",
|
|
@@ -68486,6 +68487,30 @@ var networkPolicySchema = external_exports.object({
|
|
|
68486
68487
|
unknownPolicy: firewallPolicyValueSchema
|
|
68487
68488
|
});
|
|
68488
68489
|
var networkPoliciesSchema = external_exports.record(external_exports.string(), networkPolicySchema);
|
|
68490
|
+
var AUTH_SECRET_PATTERN = /\$\{\{\s*secrets\.([a-zA-Z_][a-zA-Z0-9_]*)\s*\}\}/g;
|
|
68491
|
+
function basicAuthTemplateRe() {
|
|
68492
|
+
return /\$\{\{\s*basic\(\s*(?:(secrets|vars)\.([a-zA-Z_][a-zA-Z0-9_]*))?\s*,\s*(?:(secrets|vars)\.([a-zA-Z_][a-zA-Z0-9_]*))?\s*\)\s*\}\}/g;
|
|
68493
|
+
}
|
|
68494
|
+
function extractSecretNamesFromApis(apis) {
|
|
68495
|
+
const names = /* @__PURE__ */ new Set();
|
|
68496
|
+
for (const entry of apis) {
|
|
68497
|
+
for (const value of Object.values(entry.auth.headers)) {
|
|
68498
|
+
for (const match of value.matchAll(AUTH_SECRET_PATTERN)) {
|
|
68499
|
+
names.add(match[1]);
|
|
68500
|
+
}
|
|
68501
|
+
for (const match of value.matchAll(basicAuthTemplateRe())) {
|
|
68502
|
+
if (match[1] === "secrets" && match[2]) names.add(match[2]);
|
|
68503
|
+
if (match[3] === "secrets" && match[4]) names.add(match[4]);
|
|
68504
|
+
}
|
|
68505
|
+
}
|
|
68506
|
+
if (entry.auth.base) {
|
|
68507
|
+
for (const match of entry.auth.base.matchAll(AUTH_SECRET_PATTERN)) {
|
|
68508
|
+
names.add(match[1]);
|
|
68509
|
+
}
|
|
68510
|
+
}
|
|
68511
|
+
}
|
|
68512
|
+
return [...names];
|
|
68513
|
+
}
|
|
68489
68514
|
var BASE_URL_VARS_PATTERN = /\$\{\{\s*vars\.([a-zA-Z_][a-zA-Z0-9_]*)\s*\}\}/;
|
|
68490
68515
|
var BASE_URL_VARS_PATTERN_G = new RegExp(BASE_URL_VARS_PATTERN.source, "g");
|
|
68491
68516
|
|
|
@@ -74724,6 +74749,13 @@ async function getZeroRunAgentEvents(id, options) {
|
|
|
74724
74749
|
if (result.status === 200) return result.body;
|
|
74725
74750
|
handleError(result, `Failed to get zero run events for "${id}"`);
|
|
74726
74751
|
}
|
|
74752
|
+
async function getZeroRunContext(id) {
|
|
74753
|
+
const config2 = await getClientConfig();
|
|
74754
|
+
const client = initClient(zeroRunContextContract, config2);
|
|
74755
|
+
const result = await client.getContext({ params: { id } });
|
|
74756
|
+
if (result.status === 200) return result.body;
|
|
74757
|
+
handleError(result, `Failed to get zero run context for "${id}"`);
|
|
74758
|
+
}
|
|
74727
74759
|
|
|
74728
74760
|
// src/lib/api/domains/logs.ts
|
|
74729
74761
|
init_esm_shims();
|
|
@@ -76487,6 +76519,7 @@ export {
|
|
|
76487
76519
|
external_exports,
|
|
76488
76520
|
volumeConfigSchema,
|
|
76489
76521
|
agentDefinitionSchema,
|
|
76522
|
+
extractSecretNamesFromApis,
|
|
76490
76523
|
ALL_RUN_STATUSES,
|
|
76491
76524
|
MODEL_PROVIDER_TYPES,
|
|
76492
76525
|
getSelectableProviderTypes,
|
|
@@ -76501,6 +76534,7 @@ export {
|
|
|
76501
76534
|
getCustomModelPlaceholder,
|
|
76502
76535
|
CONNECTOR_TYPES,
|
|
76503
76536
|
connectorTypeSchema,
|
|
76537
|
+
getConnectorEnvironmentMapping,
|
|
76504
76538
|
getConnectorDerivedNames,
|
|
76505
76539
|
hasRequiredScopes,
|
|
76506
76540
|
getScopeDiff,
|
|
@@ -76598,6 +76632,7 @@ export {
|
|
|
76598
76632
|
createZeroRun,
|
|
76599
76633
|
getZeroRun,
|
|
76600
76634
|
getZeroRunAgentEvents,
|
|
76635
|
+
getZeroRunContext,
|
|
76601
76636
|
listZeroLogs,
|
|
76602
76637
|
searchZeroLogs,
|
|
76603
76638
|
getSystemLog,
|
|
@@ -76647,4 +76682,4 @@ undici/lib/web/fetch/body.js:
|
|
|
76647
76682
|
undici/lib/web/websocket/frame.js:
|
|
76648
76683
|
(*! ws. MIT License. Einar Otto Stangvik <einaros@gmail.com> *)
|
|
76649
76684
|
*/
|
|
76650
|
-
//# sourceMappingURL=chunk-
|
|
76685
|
+
//# sourceMappingURL=chunk-KFF4XQ5R.js.map
|