@vm0/cli 9.90.6 → 9.91.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/{chunk-YVJVEAKR.js → chunk-35RHCGX2.js} +411 -5
- package/chunk-35RHCGX2.js.map +1 -0
- package/index.js +10 -10
- package/package.json +1 -1
- package/zero.js +23 -6
- package/zero.js.map +1 -1
- package/chunk-YVJVEAKR.js.map +0 -1
|
@@ -49,7 +49,7 @@ if (DSN) {
|
|
|
49
49
|
Sentry.init({
|
|
50
50
|
dsn: DSN,
|
|
51
51
|
environment: process.env.SENTRY_ENVIRONMENT ?? "production",
|
|
52
|
-
release: "9.
|
|
52
|
+
release: "9.91.1",
|
|
53
53
|
sendDefaultPii: false,
|
|
54
54
|
tracesSampleRate: 0,
|
|
55
55
|
shutdownTimeout: 500,
|
|
@@ -68,7 +68,7 @@ if (DSN) {
|
|
|
68
68
|
}
|
|
69
69
|
});
|
|
70
70
|
Sentry.setContext("cli", {
|
|
71
|
-
version: "9.
|
|
71
|
+
version: "9.91.1",
|
|
72
72
|
command: process.argv.slice(2).join(" ")
|
|
73
73
|
});
|
|
74
74
|
Sentry.setContext("runtime", {
|
|
@@ -805,7 +805,6 @@ var logEntrySchema = z5.object({
|
|
|
805
805
|
sessionId: z5.string().nullable(),
|
|
806
806
|
agentId: z5.string().nullable(),
|
|
807
807
|
displayName: z5.string().nullable(),
|
|
808
|
-
orgSlug: z5.string().nullable(),
|
|
809
808
|
framework: z5.string().nullable(),
|
|
810
809
|
triggerSource: triggerSourceSchema.nullable(),
|
|
811
810
|
triggerAgentName: z5.string().nullable(),
|
|
@@ -7547,6 +7546,371 @@ var slackFirewall = {
|
|
|
7547
7546
|
]
|
|
7548
7547
|
};
|
|
7549
7548
|
|
|
7549
|
+
// ../../packages/core/src/firewalls/categories.ts
|
|
7550
|
+
var CATEGORY_REGISTRY = {};
|
|
7551
|
+
function registerCategories(type, data) {
|
|
7552
|
+
CATEGORY_REGISTRY[type] = data;
|
|
7553
|
+
}
|
|
7554
|
+
|
|
7555
|
+
// ../../packages/core/src/firewalls/slack.categories.ts
|
|
7556
|
+
var slackCategories = {
|
|
7557
|
+
// Admin (25)
|
|
7558
|
+
admin: "Admin",
|
|
7559
|
+
"admin.analytics:read": "Admin",
|
|
7560
|
+
"admin.app_activities:read": "Admin",
|
|
7561
|
+
"admin.apps:read": "Admin",
|
|
7562
|
+
"admin.apps:write": "Admin",
|
|
7563
|
+
"admin.barriers:read": "Admin",
|
|
7564
|
+
"admin.barriers:write": "Admin",
|
|
7565
|
+
"admin.conversations:manage_objects": "Admin",
|
|
7566
|
+
"admin.conversations:read": "Admin",
|
|
7567
|
+
"admin.conversations:write": "Admin",
|
|
7568
|
+
"admin.invites:read": "Admin",
|
|
7569
|
+
"admin.invites:write": "Admin",
|
|
7570
|
+
"admin.roles:read": "Admin",
|
|
7571
|
+
"admin.roles:write": "Admin",
|
|
7572
|
+
"admin.teams:read": "Admin",
|
|
7573
|
+
"admin.teams:write": "Admin",
|
|
7574
|
+
"admin.usergroups:read": "Admin",
|
|
7575
|
+
"admin.usergroups:write": "Admin",
|
|
7576
|
+
"admin.users:read": "Admin",
|
|
7577
|
+
"admin.users:write": "Admin",
|
|
7578
|
+
"admin.workflows:read": "Admin",
|
|
7579
|
+
"admin.workflows:write": "Admin",
|
|
7580
|
+
"channels:manage": "Admin",
|
|
7581
|
+
"conversations.connect:manage": "Admin",
|
|
7582
|
+
"team.billing:read": "Admin",
|
|
7583
|
+
// Read (34)
|
|
7584
|
+
"bookmarks:read": "Read",
|
|
7585
|
+
"calls:read": "Read",
|
|
7586
|
+
"canvases:read": "Read",
|
|
7587
|
+
"channels:history": "Read",
|
|
7588
|
+
"channels:read": "Read",
|
|
7589
|
+
"datastore:read": "Read",
|
|
7590
|
+
"dnd:read": "Read",
|
|
7591
|
+
"emoji:read": "Read",
|
|
7592
|
+
"files:read": "Read",
|
|
7593
|
+
"groups:history": "Read",
|
|
7594
|
+
"groups:read": "Read",
|
|
7595
|
+
"hosting:read": "Read",
|
|
7596
|
+
"identity:read": "Read",
|
|
7597
|
+
"im:history": "Read",
|
|
7598
|
+
"im:read": "Read",
|
|
7599
|
+
"lists:read": "Read",
|
|
7600
|
+
"mpim:history": "Read",
|
|
7601
|
+
"mpim:read": "Read",
|
|
7602
|
+
"pins:read": "Read",
|
|
7603
|
+
"reactions:read": "Read",
|
|
7604
|
+
"reminders:read": "Read",
|
|
7605
|
+
"remote_files:read": "Read",
|
|
7606
|
+
"search:read": "Read",
|
|
7607
|
+
"search:read.files": "Read",
|
|
7608
|
+
"search:read.im": "Read",
|
|
7609
|
+
"search:read.mpim": "Read",
|
|
7610
|
+
"search:read.private": "Read",
|
|
7611
|
+
"search:read.public": "Read",
|
|
7612
|
+
"search:read.users": "Read",
|
|
7613
|
+
"stars:read": "Read",
|
|
7614
|
+
"team.preferences:read": "Read",
|
|
7615
|
+
"team:read": "Read",
|
|
7616
|
+
"triggers:read": "Read",
|
|
7617
|
+
"usergroups:read": "Read",
|
|
7618
|
+
"users.profile:read": "Read",
|
|
7619
|
+
"users:read": "Read",
|
|
7620
|
+
"users:read.email": "Read",
|
|
7621
|
+
// Write (22)
|
|
7622
|
+
"bookmarks:write": "Write",
|
|
7623
|
+
"calls:write": "Write",
|
|
7624
|
+
"canvases:write": "Write",
|
|
7625
|
+
"channels:write": "Write",
|
|
7626
|
+
"channels:write.invites": "Write",
|
|
7627
|
+
"channels:write.topic": "Write",
|
|
7628
|
+
"datastore:write": "Write",
|
|
7629
|
+
"dnd:write": "Write",
|
|
7630
|
+
"files:write": "Write",
|
|
7631
|
+
"groups:write": "Write",
|
|
7632
|
+
"groups:write.invites": "Write",
|
|
7633
|
+
"groups:write.topic": "Write",
|
|
7634
|
+
"im:write.topic": "Write",
|
|
7635
|
+
"links:write": "Write",
|
|
7636
|
+
"lists:write": "Write",
|
|
7637
|
+
"pins:write": "Write",
|
|
7638
|
+
"reactions:write": "Write",
|
|
7639
|
+
"reminders:write": "Write",
|
|
7640
|
+
"remote_files:write": "Write",
|
|
7641
|
+
"stars:write": "Write",
|
|
7642
|
+
"triggers:write": "Write",
|
|
7643
|
+
"usergroups:write": "Write",
|
|
7644
|
+
"users.profile:write": "Write",
|
|
7645
|
+
"users:write": "Write",
|
|
7646
|
+
// Send (8)
|
|
7647
|
+
"assistant:write": "Send",
|
|
7648
|
+
"chat:write": "Send",
|
|
7649
|
+
"conversations.connect:write": "Send",
|
|
7650
|
+
"im:write": "Send",
|
|
7651
|
+
"mpim:write": "Send",
|
|
7652
|
+
"mpim:write.topic": "Send",
|
|
7653
|
+
"remote_files:share": "Send",
|
|
7654
|
+
// Misc (5)
|
|
7655
|
+
"channels:join": "Misc",
|
|
7656
|
+
client: "Misc",
|
|
7657
|
+
no_scopes_required: "Misc",
|
|
7658
|
+
openid: "Misc",
|
|
7659
|
+
"tokens.basic": "Misc"
|
|
7660
|
+
};
|
|
7661
|
+
var slackCategoryOrder = ["Read", "Write", "Send", "Admin", "Misc"];
|
|
7662
|
+
registerCategories("slack", {
|
|
7663
|
+
categories: slackCategories,
|
|
7664
|
+
displayOrder: slackCategoryOrder
|
|
7665
|
+
});
|
|
7666
|
+
|
|
7667
|
+
// ../../packages/core/src/firewalls/github.categories.ts
|
|
7668
|
+
var githubCategories = {
|
|
7669
|
+
// Admin (22)
|
|
7670
|
+
"administration:read": "Admin",
|
|
7671
|
+
"administration:write": "Admin",
|
|
7672
|
+
"organization_administration:read": "Admin",
|
|
7673
|
+
"organization_administration:write": "Admin",
|
|
7674
|
+
"organization_hooks:read": "Admin",
|
|
7675
|
+
"organization_hooks:write": "Admin",
|
|
7676
|
+
"organization_self_hosted_runners:read": "Admin",
|
|
7677
|
+
"organization_self_hosted_runners:write": "Admin",
|
|
7678
|
+
"organization_runner_custom_images:read": "Admin",
|
|
7679
|
+
"organization_runner_custom_images:write": "Admin",
|
|
7680
|
+
"repository_hooks:read": "Admin",
|
|
7681
|
+
"repository_hooks:write": "Admin",
|
|
7682
|
+
"organization_personal_access_tokens:read": "Admin",
|
|
7683
|
+
"organization_personal_access_tokens:write": "Admin",
|
|
7684
|
+
"organization_personal_access_token_requests:read": "Admin",
|
|
7685
|
+
"organization_personal_access_token_requests:write": "Admin",
|
|
7686
|
+
"organization_custom_org_roles:read": "Admin",
|
|
7687
|
+
"organization_custom_properties:admin": "Admin",
|
|
7688
|
+
"organization_custom_properties:read": "Admin",
|
|
7689
|
+
"organization_custom_properties:write": "Admin",
|
|
7690
|
+
"organization_network_configurations:read": "Admin",
|
|
7691
|
+
"organization_network_configurations:write": "Admin",
|
|
7692
|
+
// Read — all remaining :read permissions
|
|
7693
|
+
"actions:read": "Read",
|
|
7694
|
+
"actions_variables:read": "Read",
|
|
7695
|
+
"artifact_metadata:read": "Read",
|
|
7696
|
+
"attestations:read": "Read",
|
|
7697
|
+
"blocking:read": "Read",
|
|
7698
|
+
"checks:read": "Read",
|
|
7699
|
+
"codespaces_lifecycle_admin:read": "Read",
|
|
7700
|
+
"codespaces_metadata:read": "Read",
|
|
7701
|
+
"codespaces:read": "Read",
|
|
7702
|
+
"codespaces_user_secrets:read": "Read",
|
|
7703
|
+
"contents:read": "Read",
|
|
7704
|
+
"dependabot_secrets:read": "Read",
|
|
7705
|
+
"deployments:read": "Read",
|
|
7706
|
+
"emails:read": "Read",
|
|
7707
|
+
"enterprise_copilot_metrics:read": "Read",
|
|
7708
|
+
"enterprise_teams:read": "Read",
|
|
7709
|
+
"environments:read": "Read",
|
|
7710
|
+
"followers:read": "Read",
|
|
7711
|
+
"git_signing_ssh_public_keys:read": "Read",
|
|
7712
|
+
"gpg_keys:read": "Read",
|
|
7713
|
+
"interaction_limits:read": "Read",
|
|
7714
|
+
"issue_fields:read": "Read",
|
|
7715
|
+
"issues:read": "Read",
|
|
7716
|
+
"issue_types:read": "Read",
|
|
7717
|
+
"keys:read": "Read",
|
|
7718
|
+
"members:read": "Read",
|
|
7719
|
+
"metadata:read": "Read",
|
|
7720
|
+
"organization_actions_variables:read": "Read",
|
|
7721
|
+
"organization_api_insights:read": "Read",
|
|
7722
|
+
"organization_campaigns:read": "Read",
|
|
7723
|
+
"organization_codespaces:read": "Read",
|
|
7724
|
+
"organization_codespaces_secrets:read": "Read",
|
|
7725
|
+
"organization_copilot_agent_settings:read": "Read",
|
|
7726
|
+
"organization_copilot_metrics:read": "Read",
|
|
7727
|
+
"organization_copilot_seat_management:read": "Read",
|
|
7728
|
+
"organization_dependabot_secrets:read": "Read",
|
|
7729
|
+
"organization_events:read": "Read",
|
|
7730
|
+
"organization_private_registries:read": "Read",
|
|
7731
|
+
"organization_projects:read": "Read",
|
|
7732
|
+
"organization_secrets:read": "Read",
|
|
7733
|
+
"organization_user_blocking:read": "Read",
|
|
7734
|
+
"org_copilot_content_exclusion:read": "Read",
|
|
7735
|
+
"pages:read": "Read",
|
|
7736
|
+
"plan:read": "Read",
|
|
7737
|
+
"private_repository_invitations:read": "Read",
|
|
7738
|
+
"pull_requests:read": "Read",
|
|
7739
|
+
"repository_advisories:read": "Read",
|
|
7740
|
+
"secret_scanning_alerts:read": "Read",
|
|
7741
|
+
"secrets:read": "Read",
|
|
7742
|
+
"security_events:read": "Read",
|
|
7743
|
+
"starring:read": "Read",
|
|
7744
|
+
"statuses:read": "Read",
|
|
7745
|
+
"vulnerability_alerts:read": "Read",
|
|
7746
|
+
"watching:read": "Read",
|
|
7747
|
+
// Write — all remaining :write permissions
|
|
7748
|
+
"actions:write": "Write",
|
|
7749
|
+
"actions_variables:write": "Write",
|
|
7750
|
+
"artifact_metadata:write": "Write",
|
|
7751
|
+
"attestations:write": "Write",
|
|
7752
|
+
"blocking:write": "Write",
|
|
7753
|
+
"checks:write": "Write",
|
|
7754
|
+
"codespaces_lifecycle_admin:write": "Write",
|
|
7755
|
+
"codespaces_secrets:write": "Write",
|
|
7756
|
+
"codespaces_user_secrets:write": "Write",
|
|
7757
|
+
"codespaces:write": "Write",
|
|
7758
|
+
"contents:write": "Write",
|
|
7759
|
+
"dependabot_secrets:write": "Write",
|
|
7760
|
+
"deployments:write": "Write",
|
|
7761
|
+
"emails:write": "Write",
|
|
7762
|
+
"enterprise_teams:write": "Write",
|
|
7763
|
+
"environments:write": "Write",
|
|
7764
|
+
"followers:write": "Write",
|
|
7765
|
+
"gists:write": "Write",
|
|
7766
|
+
"git_signing_ssh_public_keys:write": "Write",
|
|
7767
|
+
"gpg_keys:write": "Write",
|
|
7768
|
+
"interaction_limits:write": "Write",
|
|
7769
|
+
"issue_fields:write": "Write",
|
|
7770
|
+
"issues:write": "Write",
|
|
7771
|
+
"issue_types:write": "Write",
|
|
7772
|
+
"keys:write": "Write",
|
|
7773
|
+
"members:write": "Write",
|
|
7774
|
+
"organization_actions_variables:write": "Write",
|
|
7775
|
+
"organization_campaigns:write": "Write",
|
|
7776
|
+
"organization_codespaces_secrets:write": "Write",
|
|
7777
|
+
"organization_codespaces_settings:write": "Write",
|
|
7778
|
+
"organization_codespaces:write": "Write",
|
|
7779
|
+
"organization_copilot_agent_settings:write": "Write",
|
|
7780
|
+
"organization_copilot_seat_management:write": "Write",
|
|
7781
|
+
"organization_dependabot_secrets:write": "Write",
|
|
7782
|
+
"organization_private_registries:write": "Write",
|
|
7783
|
+
"organization_projects:write": "Write",
|
|
7784
|
+
"organization_secrets:write": "Write",
|
|
7785
|
+
"organization_user_blocking:write": "Write",
|
|
7786
|
+
"org_copilot_content_exclusion:write": "Write",
|
|
7787
|
+
"pages:write": "Write",
|
|
7788
|
+
"profile:write": "Write",
|
|
7789
|
+
"pull_requests:write": "Write",
|
|
7790
|
+
"repository_advisories:write": "Write",
|
|
7791
|
+
"repository_custom_properties:write": "Write",
|
|
7792
|
+
"secret_scanning_alerts:write": "Write",
|
|
7793
|
+
"secrets:write": "Write",
|
|
7794
|
+
"security_events:write": "Write",
|
|
7795
|
+
"starring:write": "Write",
|
|
7796
|
+
"statuses:write": "Write",
|
|
7797
|
+
"vulnerability_alerts:write": "Write",
|
|
7798
|
+
"workflows:write": "Write"
|
|
7799
|
+
};
|
|
7800
|
+
var githubCategoryOrder = ["Read", "Write", "Admin"];
|
|
7801
|
+
registerCategories("github", {
|
|
7802
|
+
categories: githubCategories,
|
|
7803
|
+
displayOrder: githubCategoryOrder
|
|
7804
|
+
});
|
|
7805
|
+
|
|
7806
|
+
// ../../packages/core/src/firewalls/gmail.categories.ts
|
|
7807
|
+
var gmailCategories = {
|
|
7808
|
+
// Read (5)
|
|
7809
|
+
"gmail.readonly": "Read",
|
|
7810
|
+
"gmail.metadata": "Read",
|
|
7811
|
+
"gmail.addons.current.message.readonly": "Read",
|
|
7812
|
+
"gmail.addons.current.message.metadata": "Read",
|
|
7813
|
+
"gmail.addons.current.message.action": "Read",
|
|
7814
|
+
// Compose (6)
|
|
7815
|
+
gmail: "Compose",
|
|
7816
|
+
"gmail.modify": "Compose",
|
|
7817
|
+
"gmail.compose": "Compose",
|
|
7818
|
+
"gmail.send": "Compose",
|
|
7819
|
+
"gmail.insert": "Compose",
|
|
7820
|
+
"gmail.addons.current.action.compose": "Compose",
|
|
7821
|
+
// Admin (3)
|
|
7822
|
+
"gmail.settings.basic": "Admin",
|
|
7823
|
+
"gmail.settings.sharing": "Admin",
|
|
7824
|
+
"gmail.labels": "Admin"
|
|
7825
|
+
};
|
|
7826
|
+
var gmailCategoryOrder = ["Read", "Compose", "Admin"];
|
|
7827
|
+
registerCategories("gmail", {
|
|
7828
|
+
categories: gmailCategories,
|
|
7829
|
+
displayOrder: gmailCategoryOrder
|
|
7830
|
+
});
|
|
7831
|
+
|
|
7832
|
+
// ../../packages/core/src/firewalls/vercel.categories.ts
|
|
7833
|
+
var vercelCategories = {
|
|
7834
|
+
// Admin (14)
|
|
7835
|
+
"access-groups:read": "Admin",
|
|
7836
|
+
"access-groups:write": "Admin",
|
|
7837
|
+
"authentication:read": "Admin",
|
|
7838
|
+
"authentication:write": "Admin",
|
|
7839
|
+
"billing:read": "Admin",
|
|
7840
|
+
"billing:write": "Admin",
|
|
7841
|
+
"marketplace:read": "Admin",
|
|
7842
|
+
"marketplace:write": "Admin",
|
|
7843
|
+
"projectMembers:read": "Admin",
|
|
7844
|
+
"projectMembers:write": "Admin",
|
|
7845
|
+
"security:read": "Admin",
|
|
7846
|
+
"security:write": "Admin",
|
|
7847
|
+
"teams:read": "Admin",
|
|
7848
|
+
"teams:write": "Admin",
|
|
7849
|
+
"user:write": "Admin",
|
|
7850
|
+
// Deploy (4)
|
|
7851
|
+
"deployments:write": "Deploy",
|
|
7852
|
+
"checks:write": "Deploy",
|
|
7853
|
+
"checks-v2:write": "Deploy",
|
|
7854
|
+
"rolling-release:write": "Deploy",
|
|
7855
|
+
// Read — all non-admin :read permissions
|
|
7856
|
+
"aliases:read": "Read",
|
|
7857
|
+
"api-observability:read": "Read",
|
|
7858
|
+
"artifacts:read": "Read",
|
|
7859
|
+
"bulk-redirects:read": "Read",
|
|
7860
|
+
"certs:read": "Read",
|
|
7861
|
+
"checks:read": "Read",
|
|
7862
|
+
"checks-v2:read": "Read",
|
|
7863
|
+
"connect:read": "Read",
|
|
7864
|
+
"deployments:read": "Read",
|
|
7865
|
+
"dns:read": "Read",
|
|
7866
|
+
"domains:read": "Read",
|
|
7867
|
+
"domains-registrar:read": "Read",
|
|
7868
|
+
"drains:read": "Read",
|
|
7869
|
+
"edge-config:read": "Read",
|
|
7870
|
+
"environment:read": "Read",
|
|
7871
|
+
"feature-flags:read": "Read",
|
|
7872
|
+
"integrations:read": "Read",
|
|
7873
|
+
"logDrains:read": "Read",
|
|
7874
|
+
"logs:read": "Read",
|
|
7875
|
+
"microfrontends:read": "Read",
|
|
7876
|
+
"project-routes:read": "Read",
|
|
7877
|
+
"projects:read": "Read",
|
|
7878
|
+
"rolling-release:read": "Read",
|
|
7879
|
+
"sandboxes:read": "Read",
|
|
7880
|
+
"sandboxes-v2-beta:read": "Read",
|
|
7881
|
+
"user:read": "Read",
|
|
7882
|
+
"webhooks:read": "Read",
|
|
7883
|
+
// Write — all remaining :write not in Deploy or Admin
|
|
7884
|
+
"aliases:write": "Write",
|
|
7885
|
+
"api-observability:write": "Write",
|
|
7886
|
+
"artifacts:write": "Write",
|
|
7887
|
+
"bulk-redirects:write": "Write",
|
|
7888
|
+
"certs:write": "Write",
|
|
7889
|
+
"connect:write": "Write",
|
|
7890
|
+
"dns:write": "Write",
|
|
7891
|
+
"domains:write": "Write",
|
|
7892
|
+
"domains-registrar:write": "Write",
|
|
7893
|
+
"drains:write": "Write",
|
|
7894
|
+
"edge-cache:write": "Write",
|
|
7895
|
+
"edge-config:write": "Write",
|
|
7896
|
+
"environment:write": "Write",
|
|
7897
|
+
"feature-flags:write": "Write",
|
|
7898
|
+
"integrations:write": "Write",
|
|
7899
|
+
"logDrains:write": "Write",
|
|
7900
|
+
"microfrontends:write": "Write",
|
|
7901
|
+
"project-routes:write": "Write",
|
|
7902
|
+
"projects:write": "Write",
|
|
7903
|
+
"sandboxes:write": "Write",
|
|
7904
|
+
"sandboxes-v2-beta:write": "Write",
|
|
7905
|
+
"static-ips:write": "Write",
|
|
7906
|
+
"webhooks:write": "Write"
|
|
7907
|
+
};
|
|
7908
|
+
var vercelCategoryOrder = ["Read", "Deploy", "Write", "Admin"];
|
|
7909
|
+
registerCategories("vercel", {
|
|
7910
|
+
categories: vercelCategories,
|
|
7911
|
+
displayOrder: vercelCategoryOrder
|
|
7912
|
+
});
|
|
7913
|
+
|
|
7550
7914
|
// ../../packages/core/src/firewalls/agentmail.generated.ts
|
|
7551
7915
|
var agentmailFirewall = {
|
|
7552
7916
|
name: "agentmail",
|
|
@@ -15400,6 +15764,19 @@ var vercelFirewall = {
|
|
|
15400
15764
|
"PUT /v1/installations/{integrationConfigurationId}/resources/{resourceId}/secrets"
|
|
15401
15765
|
]
|
|
15402
15766
|
},
|
|
15767
|
+
{
|
|
15768
|
+
name: "microfrontends:read",
|
|
15769
|
+
rules: [
|
|
15770
|
+
"GET /v1/microfrontends/groups",
|
|
15771
|
+
"GET /v1/microfrontends/groups/{groupId}/projects",
|
|
15772
|
+
"GET /v1/microfrontends/projects/{projectIdOrName}/production-mfe-config",
|
|
15773
|
+
"GET /v1/microfrontends/{deploymentId}/config"
|
|
15774
|
+
]
|
|
15775
|
+
},
|
|
15776
|
+
{
|
|
15777
|
+
name: "microfrontends:write",
|
|
15778
|
+
rules: ["POST /v1/microfrontends/group"]
|
|
15779
|
+
},
|
|
15403
15780
|
{
|
|
15404
15781
|
name: "project-routes:read",
|
|
15405
15782
|
rules: [
|
|
@@ -15449,6 +15826,7 @@ var vercelFirewall = {
|
|
|
15449
15826
|
"POST /v1/projects/{idOrName}/domains/{domain}/move",
|
|
15450
15827
|
"DELETE /v1/projects/{idOrName}/env",
|
|
15451
15828
|
"PATCH /v1/projects/{idOrName}/protection-bypass",
|
|
15829
|
+
"PATCH /v1/projects/{projectId}/microfrontends",
|
|
15452
15830
|
"POST /v1/projects/{projectId}/pause",
|
|
15453
15831
|
"POST /v1/projects/{projectId}/rollback/{deploymentId}",
|
|
15454
15832
|
"POST /v1/projects/{projectId}/unpause",
|
|
@@ -15583,6 +15961,8 @@ var vercelFirewall = {
|
|
|
15583
15961
|
"POST /v1/teams/{teamId}/members/teams/join",
|
|
15584
15962
|
"PATCH /v1/teams/{teamId}/members/{uid}",
|
|
15585
15963
|
"DELETE /v1/teams/{teamId}/members/{uid}",
|
|
15964
|
+
"PATCH /v1/teams/{teamId}/microfrontends/{groupId}",
|
|
15965
|
+
"DELETE /v1/teams/{teamId}/microfrontends/{groupId}",
|
|
15586
15966
|
"POST /v1/teams/{teamId}/request",
|
|
15587
15967
|
"PATCH /v2/teams/{teamId}",
|
|
15588
15968
|
"POST /v2/teams/{teamId}/members"
|
|
@@ -17618,6 +17998,28 @@ var zeroRunContextContract = c25.router({
|
|
|
17618
17998
|
summary: "Get run execution context snapshot for debugging"
|
|
17619
17999
|
}
|
|
17620
18000
|
});
|
|
18001
|
+
var zeroRunNetworkLogsContract = c25.router({
|
|
18002
|
+
getNetworkLogs: {
|
|
18003
|
+
method: "GET",
|
|
18004
|
+
path: "/api/zero/runs/:id/network",
|
|
18005
|
+
headers: authHeadersSchema,
|
|
18006
|
+
pathParams: z31.object({
|
|
18007
|
+
id: z31.string().min(1, "Run ID is required")
|
|
18008
|
+
}),
|
|
18009
|
+
query: z31.object({
|
|
18010
|
+
since: z31.coerce.number().optional(),
|
|
18011
|
+
limit: z31.coerce.number().min(1).max(500).default(500),
|
|
18012
|
+
order: z31.enum(["asc", "desc"]).default("asc")
|
|
18013
|
+
}),
|
|
18014
|
+
responses: {
|
|
18015
|
+
200: networkLogsResponseSchema,
|
|
18016
|
+
400: apiErrorSchema,
|
|
18017
|
+
401: apiErrorSchema,
|
|
18018
|
+
404: apiErrorSchema
|
|
18019
|
+
},
|
|
18020
|
+
summary: "Get network logs for a run"
|
|
18021
|
+
}
|
|
18022
|
+
});
|
|
17621
18023
|
|
|
17622
18024
|
// ../../packages/core/src/contracts/zero-schedules.ts
|
|
17623
18025
|
import { z as z32 } from "zod";
|
|
@@ -17626,7 +18028,6 @@ var scheduleResponseSchema = z32.object({
|
|
|
17626
18028
|
id: z32.string().uuid(),
|
|
17627
18029
|
agentId: z32.string().uuid(),
|
|
17628
18030
|
displayName: z32.string().nullable(),
|
|
17629
|
-
orgSlug: z32.string(),
|
|
17630
18031
|
userId: z32.string(),
|
|
17631
18032
|
name: z32.string(),
|
|
17632
18033
|
triggerType: z32.enum(["cron", "once", "loop"]),
|
|
@@ -18782,6 +19183,11 @@ var FEATURE_SWITCHES = {
|
|
|
18782
19183
|
enabledUserHashes: STAFF_USER_HASHES,
|
|
18783
19184
|
enabledOrgIdHashes: STAFF_ORG_ID_HASHES
|
|
18784
19185
|
},
|
|
19186
|
+
["runNetwork" /* RunNetwork */]: {
|
|
19187
|
+
maintainer: "liangyou@vm0.ai",
|
|
19188
|
+
enabled: false,
|
|
19189
|
+
enabledOrgIdHashes: STAFF_ORG_ID_HASHES
|
|
19190
|
+
},
|
|
18785
19191
|
["activityLogList" /* ActivityLogList */]: {
|
|
18786
19192
|
maintainer: "ethan@vm0.ai",
|
|
18787
19193
|
enabled: false,
|
|
@@ -20893,4 +21299,4 @@ export {
|
|
|
20893
21299
|
pollEvents,
|
|
20894
21300
|
showNextSteps
|
|
20895
21301
|
};
|
|
20896
|
-
//# sourceMappingURL=chunk-
|
|
21302
|
+
//# sourceMappingURL=chunk-35RHCGX2.js.map
|