@vm0/cli 9.90.6 → 9.91.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -49,7 +49,7 @@ if (DSN) {
49
49
  Sentry.init({
50
50
  dsn: DSN,
51
51
  environment: process.env.SENTRY_ENVIRONMENT ?? "production",
52
- release: "9.90.6",
52
+ release: "9.91.1",
53
53
  sendDefaultPii: false,
54
54
  tracesSampleRate: 0,
55
55
  shutdownTimeout: 500,
@@ -68,7 +68,7 @@ if (DSN) {
68
68
  }
69
69
  });
70
70
  Sentry.setContext("cli", {
71
- version: "9.90.6",
71
+ version: "9.91.1",
72
72
  command: process.argv.slice(2).join(" ")
73
73
  });
74
74
  Sentry.setContext("runtime", {
@@ -805,7 +805,6 @@ var logEntrySchema = z5.object({
805
805
  sessionId: z5.string().nullable(),
806
806
  agentId: z5.string().nullable(),
807
807
  displayName: z5.string().nullable(),
808
- orgSlug: z5.string().nullable(),
809
808
  framework: z5.string().nullable(),
810
809
  triggerSource: triggerSourceSchema.nullable(),
811
810
  triggerAgentName: z5.string().nullable(),
@@ -7547,6 +7546,371 @@ var slackFirewall = {
7547
7546
  ]
7548
7547
  };
7549
7548
 
7549
+ // ../../packages/core/src/firewalls/categories.ts
7550
+ var CATEGORY_REGISTRY = {};
7551
+ function registerCategories(type, data) {
7552
+ CATEGORY_REGISTRY[type] = data;
7553
+ }
7554
+
7555
+ // ../../packages/core/src/firewalls/slack.categories.ts
7556
+ var slackCategories = {
7557
+ // Admin (25)
7558
+ admin: "Admin",
7559
+ "admin.analytics:read": "Admin",
7560
+ "admin.app_activities:read": "Admin",
7561
+ "admin.apps:read": "Admin",
7562
+ "admin.apps:write": "Admin",
7563
+ "admin.barriers:read": "Admin",
7564
+ "admin.barriers:write": "Admin",
7565
+ "admin.conversations:manage_objects": "Admin",
7566
+ "admin.conversations:read": "Admin",
7567
+ "admin.conversations:write": "Admin",
7568
+ "admin.invites:read": "Admin",
7569
+ "admin.invites:write": "Admin",
7570
+ "admin.roles:read": "Admin",
7571
+ "admin.roles:write": "Admin",
7572
+ "admin.teams:read": "Admin",
7573
+ "admin.teams:write": "Admin",
7574
+ "admin.usergroups:read": "Admin",
7575
+ "admin.usergroups:write": "Admin",
7576
+ "admin.users:read": "Admin",
7577
+ "admin.users:write": "Admin",
7578
+ "admin.workflows:read": "Admin",
7579
+ "admin.workflows:write": "Admin",
7580
+ "channels:manage": "Admin",
7581
+ "conversations.connect:manage": "Admin",
7582
+ "team.billing:read": "Admin",
7583
+ // Read (34)
7584
+ "bookmarks:read": "Read",
7585
+ "calls:read": "Read",
7586
+ "canvases:read": "Read",
7587
+ "channels:history": "Read",
7588
+ "channels:read": "Read",
7589
+ "datastore:read": "Read",
7590
+ "dnd:read": "Read",
7591
+ "emoji:read": "Read",
7592
+ "files:read": "Read",
7593
+ "groups:history": "Read",
7594
+ "groups:read": "Read",
7595
+ "hosting:read": "Read",
7596
+ "identity:read": "Read",
7597
+ "im:history": "Read",
7598
+ "im:read": "Read",
7599
+ "lists:read": "Read",
7600
+ "mpim:history": "Read",
7601
+ "mpim:read": "Read",
7602
+ "pins:read": "Read",
7603
+ "reactions:read": "Read",
7604
+ "reminders:read": "Read",
7605
+ "remote_files:read": "Read",
7606
+ "search:read": "Read",
7607
+ "search:read.files": "Read",
7608
+ "search:read.im": "Read",
7609
+ "search:read.mpim": "Read",
7610
+ "search:read.private": "Read",
7611
+ "search:read.public": "Read",
7612
+ "search:read.users": "Read",
7613
+ "stars:read": "Read",
7614
+ "team.preferences:read": "Read",
7615
+ "team:read": "Read",
7616
+ "triggers:read": "Read",
7617
+ "usergroups:read": "Read",
7618
+ "users.profile:read": "Read",
7619
+ "users:read": "Read",
7620
+ "users:read.email": "Read",
7621
+ // Write (22)
7622
+ "bookmarks:write": "Write",
7623
+ "calls:write": "Write",
7624
+ "canvases:write": "Write",
7625
+ "channels:write": "Write",
7626
+ "channels:write.invites": "Write",
7627
+ "channels:write.topic": "Write",
7628
+ "datastore:write": "Write",
7629
+ "dnd:write": "Write",
7630
+ "files:write": "Write",
7631
+ "groups:write": "Write",
7632
+ "groups:write.invites": "Write",
7633
+ "groups:write.topic": "Write",
7634
+ "im:write.topic": "Write",
7635
+ "links:write": "Write",
7636
+ "lists:write": "Write",
7637
+ "pins:write": "Write",
7638
+ "reactions:write": "Write",
7639
+ "reminders:write": "Write",
7640
+ "remote_files:write": "Write",
7641
+ "stars:write": "Write",
7642
+ "triggers:write": "Write",
7643
+ "usergroups:write": "Write",
7644
+ "users.profile:write": "Write",
7645
+ "users:write": "Write",
7646
+ // Send (8)
7647
+ "assistant:write": "Send",
7648
+ "chat:write": "Send",
7649
+ "conversations.connect:write": "Send",
7650
+ "im:write": "Send",
7651
+ "mpim:write": "Send",
7652
+ "mpim:write.topic": "Send",
7653
+ "remote_files:share": "Send",
7654
+ // Misc (5)
7655
+ "channels:join": "Misc",
7656
+ client: "Misc",
7657
+ no_scopes_required: "Misc",
7658
+ openid: "Misc",
7659
+ "tokens.basic": "Misc"
7660
+ };
7661
+ var slackCategoryOrder = ["Read", "Write", "Send", "Admin", "Misc"];
7662
+ registerCategories("slack", {
7663
+ categories: slackCategories,
7664
+ displayOrder: slackCategoryOrder
7665
+ });
7666
+
7667
+ // ../../packages/core/src/firewalls/github.categories.ts
7668
+ var githubCategories = {
7669
+ // Admin (22)
7670
+ "administration:read": "Admin",
7671
+ "administration:write": "Admin",
7672
+ "organization_administration:read": "Admin",
7673
+ "organization_administration:write": "Admin",
7674
+ "organization_hooks:read": "Admin",
7675
+ "organization_hooks:write": "Admin",
7676
+ "organization_self_hosted_runners:read": "Admin",
7677
+ "organization_self_hosted_runners:write": "Admin",
7678
+ "organization_runner_custom_images:read": "Admin",
7679
+ "organization_runner_custom_images:write": "Admin",
7680
+ "repository_hooks:read": "Admin",
7681
+ "repository_hooks:write": "Admin",
7682
+ "organization_personal_access_tokens:read": "Admin",
7683
+ "organization_personal_access_tokens:write": "Admin",
7684
+ "organization_personal_access_token_requests:read": "Admin",
7685
+ "organization_personal_access_token_requests:write": "Admin",
7686
+ "organization_custom_org_roles:read": "Admin",
7687
+ "organization_custom_properties:admin": "Admin",
7688
+ "organization_custom_properties:read": "Admin",
7689
+ "organization_custom_properties:write": "Admin",
7690
+ "organization_network_configurations:read": "Admin",
7691
+ "organization_network_configurations:write": "Admin",
7692
+ // Read — all remaining :read permissions
7693
+ "actions:read": "Read",
7694
+ "actions_variables:read": "Read",
7695
+ "artifact_metadata:read": "Read",
7696
+ "attestations:read": "Read",
7697
+ "blocking:read": "Read",
7698
+ "checks:read": "Read",
7699
+ "codespaces_lifecycle_admin:read": "Read",
7700
+ "codespaces_metadata:read": "Read",
7701
+ "codespaces:read": "Read",
7702
+ "codespaces_user_secrets:read": "Read",
7703
+ "contents:read": "Read",
7704
+ "dependabot_secrets:read": "Read",
7705
+ "deployments:read": "Read",
7706
+ "emails:read": "Read",
7707
+ "enterprise_copilot_metrics:read": "Read",
7708
+ "enterprise_teams:read": "Read",
7709
+ "environments:read": "Read",
7710
+ "followers:read": "Read",
7711
+ "git_signing_ssh_public_keys:read": "Read",
7712
+ "gpg_keys:read": "Read",
7713
+ "interaction_limits:read": "Read",
7714
+ "issue_fields:read": "Read",
7715
+ "issues:read": "Read",
7716
+ "issue_types:read": "Read",
7717
+ "keys:read": "Read",
7718
+ "members:read": "Read",
7719
+ "metadata:read": "Read",
7720
+ "organization_actions_variables:read": "Read",
7721
+ "organization_api_insights:read": "Read",
7722
+ "organization_campaigns:read": "Read",
7723
+ "organization_codespaces:read": "Read",
7724
+ "organization_codespaces_secrets:read": "Read",
7725
+ "organization_copilot_agent_settings:read": "Read",
7726
+ "organization_copilot_metrics:read": "Read",
7727
+ "organization_copilot_seat_management:read": "Read",
7728
+ "organization_dependabot_secrets:read": "Read",
7729
+ "organization_events:read": "Read",
7730
+ "organization_private_registries:read": "Read",
7731
+ "organization_projects:read": "Read",
7732
+ "organization_secrets:read": "Read",
7733
+ "organization_user_blocking:read": "Read",
7734
+ "org_copilot_content_exclusion:read": "Read",
7735
+ "pages:read": "Read",
7736
+ "plan:read": "Read",
7737
+ "private_repository_invitations:read": "Read",
7738
+ "pull_requests:read": "Read",
7739
+ "repository_advisories:read": "Read",
7740
+ "secret_scanning_alerts:read": "Read",
7741
+ "secrets:read": "Read",
7742
+ "security_events:read": "Read",
7743
+ "starring:read": "Read",
7744
+ "statuses:read": "Read",
7745
+ "vulnerability_alerts:read": "Read",
7746
+ "watching:read": "Read",
7747
+ // Write — all remaining :write permissions
7748
+ "actions:write": "Write",
7749
+ "actions_variables:write": "Write",
7750
+ "artifact_metadata:write": "Write",
7751
+ "attestations:write": "Write",
7752
+ "blocking:write": "Write",
7753
+ "checks:write": "Write",
7754
+ "codespaces_lifecycle_admin:write": "Write",
7755
+ "codespaces_secrets:write": "Write",
7756
+ "codespaces_user_secrets:write": "Write",
7757
+ "codespaces:write": "Write",
7758
+ "contents:write": "Write",
7759
+ "dependabot_secrets:write": "Write",
7760
+ "deployments:write": "Write",
7761
+ "emails:write": "Write",
7762
+ "enterprise_teams:write": "Write",
7763
+ "environments:write": "Write",
7764
+ "followers:write": "Write",
7765
+ "gists:write": "Write",
7766
+ "git_signing_ssh_public_keys:write": "Write",
7767
+ "gpg_keys:write": "Write",
7768
+ "interaction_limits:write": "Write",
7769
+ "issue_fields:write": "Write",
7770
+ "issues:write": "Write",
7771
+ "issue_types:write": "Write",
7772
+ "keys:write": "Write",
7773
+ "members:write": "Write",
7774
+ "organization_actions_variables:write": "Write",
7775
+ "organization_campaigns:write": "Write",
7776
+ "organization_codespaces_secrets:write": "Write",
7777
+ "organization_codespaces_settings:write": "Write",
7778
+ "organization_codespaces:write": "Write",
7779
+ "organization_copilot_agent_settings:write": "Write",
7780
+ "organization_copilot_seat_management:write": "Write",
7781
+ "organization_dependabot_secrets:write": "Write",
7782
+ "organization_private_registries:write": "Write",
7783
+ "organization_projects:write": "Write",
7784
+ "organization_secrets:write": "Write",
7785
+ "organization_user_blocking:write": "Write",
7786
+ "org_copilot_content_exclusion:write": "Write",
7787
+ "pages:write": "Write",
7788
+ "profile:write": "Write",
7789
+ "pull_requests:write": "Write",
7790
+ "repository_advisories:write": "Write",
7791
+ "repository_custom_properties:write": "Write",
7792
+ "secret_scanning_alerts:write": "Write",
7793
+ "secrets:write": "Write",
7794
+ "security_events:write": "Write",
7795
+ "starring:write": "Write",
7796
+ "statuses:write": "Write",
7797
+ "vulnerability_alerts:write": "Write",
7798
+ "workflows:write": "Write"
7799
+ };
7800
+ var githubCategoryOrder = ["Read", "Write", "Admin"];
7801
+ registerCategories("github", {
7802
+ categories: githubCategories,
7803
+ displayOrder: githubCategoryOrder
7804
+ });
7805
+
7806
+ // ../../packages/core/src/firewalls/gmail.categories.ts
7807
+ var gmailCategories = {
7808
+ // Read (5)
7809
+ "gmail.readonly": "Read",
7810
+ "gmail.metadata": "Read",
7811
+ "gmail.addons.current.message.readonly": "Read",
7812
+ "gmail.addons.current.message.metadata": "Read",
7813
+ "gmail.addons.current.message.action": "Read",
7814
+ // Compose (6)
7815
+ gmail: "Compose",
7816
+ "gmail.modify": "Compose",
7817
+ "gmail.compose": "Compose",
7818
+ "gmail.send": "Compose",
7819
+ "gmail.insert": "Compose",
7820
+ "gmail.addons.current.action.compose": "Compose",
7821
+ // Admin (3)
7822
+ "gmail.settings.basic": "Admin",
7823
+ "gmail.settings.sharing": "Admin",
7824
+ "gmail.labels": "Admin"
7825
+ };
7826
+ var gmailCategoryOrder = ["Read", "Compose", "Admin"];
7827
+ registerCategories("gmail", {
7828
+ categories: gmailCategories,
7829
+ displayOrder: gmailCategoryOrder
7830
+ });
7831
+
7832
+ // ../../packages/core/src/firewalls/vercel.categories.ts
7833
+ var vercelCategories = {
7834
+ // Admin (14)
7835
+ "access-groups:read": "Admin",
7836
+ "access-groups:write": "Admin",
7837
+ "authentication:read": "Admin",
7838
+ "authentication:write": "Admin",
7839
+ "billing:read": "Admin",
7840
+ "billing:write": "Admin",
7841
+ "marketplace:read": "Admin",
7842
+ "marketplace:write": "Admin",
7843
+ "projectMembers:read": "Admin",
7844
+ "projectMembers:write": "Admin",
7845
+ "security:read": "Admin",
7846
+ "security:write": "Admin",
7847
+ "teams:read": "Admin",
7848
+ "teams:write": "Admin",
7849
+ "user:write": "Admin",
7850
+ // Deploy (4)
7851
+ "deployments:write": "Deploy",
7852
+ "checks:write": "Deploy",
7853
+ "checks-v2:write": "Deploy",
7854
+ "rolling-release:write": "Deploy",
7855
+ // Read — all non-admin :read permissions
7856
+ "aliases:read": "Read",
7857
+ "api-observability:read": "Read",
7858
+ "artifacts:read": "Read",
7859
+ "bulk-redirects:read": "Read",
7860
+ "certs:read": "Read",
7861
+ "checks:read": "Read",
7862
+ "checks-v2:read": "Read",
7863
+ "connect:read": "Read",
7864
+ "deployments:read": "Read",
7865
+ "dns:read": "Read",
7866
+ "domains:read": "Read",
7867
+ "domains-registrar:read": "Read",
7868
+ "drains:read": "Read",
7869
+ "edge-config:read": "Read",
7870
+ "environment:read": "Read",
7871
+ "feature-flags:read": "Read",
7872
+ "integrations:read": "Read",
7873
+ "logDrains:read": "Read",
7874
+ "logs:read": "Read",
7875
+ "microfrontends:read": "Read",
7876
+ "project-routes:read": "Read",
7877
+ "projects:read": "Read",
7878
+ "rolling-release:read": "Read",
7879
+ "sandboxes:read": "Read",
7880
+ "sandboxes-v2-beta:read": "Read",
7881
+ "user:read": "Read",
7882
+ "webhooks:read": "Read",
7883
+ // Write — all remaining :write not in Deploy or Admin
7884
+ "aliases:write": "Write",
7885
+ "api-observability:write": "Write",
7886
+ "artifacts:write": "Write",
7887
+ "bulk-redirects:write": "Write",
7888
+ "certs:write": "Write",
7889
+ "connect:write": "Write",
7890
+ "dns:write": "Write",
7891
+ "domains:write": "Write",
7892
+ "domains-registrar:write": "Write",
7893
+ "drains:write": "Write",
7894
+ "edge-cache:write": "Write",
7895
+ "edge-config:write": "Write",
7896
+ "environment:write": "Write",
7897
+ "feature-flags:write": "Write",
7898
+ "integrations:write": "Write",
7899
+ "logDrains:write": "Write",
7900
+ "microfrontends:write": "Write",
7901
+ "project-routes:write": "Write",
7902
+ "projects:write": "Write",
7903
+ "sandboxes:write": "Write",
7904
+ "sandboxes-v2-beta:write": "Write",
7905
+ "static-ips:write": "Write",
7906
+ "webhooks:write": "Write"
7907
+ };
7908
+ var vercelCategoryOrder = ["Read", "Deploy", "Write", "Admin"];
7909
+ registerCategories("vercel", {
7910
+ categories: vercelCategories,
7911
+ displayOrder: vercelCategoryOrder
7912
+ });
7913
+
7550
7914
  // ../../packages/core/src/firewalls/agentmail.generated.ts
7551
7915
  var agentmailFirewall = {
7552
7916
  name: "agentmail",
@@ -15400,6 +15764,19 @@ var vercelFirewall = {
15400
15764
  "PUT /v1/installations/{integrationConfigurationId}/resources/{resourceId}/secrets"
15401
15765
  ]
15402
15766
  },
15767
+ {
15768
+ name: "microfrontends:read",
15769
+ rules: [
15770
+ "GET /v1/microfrontends/groups",
15771
+ "GET /v1/microfrontends/groups/{groupId}/projects",
15772
+ "GET /v1/microfrontends/projects/{projectIdOrName}/production-mfe-config",
15773
+ "GET /v1/microfrontends/{deploymentId}/config"
15774
+ ]
15775
+ },
15776
+ {
15777
+ name: "microfrontends:write",
15778
+ rules: ["POST /v1/microfrontends/group"]
15779
+ },
15403
15780
  {
15404
15781
  name: "project-routes:read",
15405
15782
  rules: [
@@ -15449,6 +15826,7 @@ var vercelFirewall = {
15449
15826
  "POST /v1/projects/{idOrName}/domains/{domain}/move",
15450
15827
  "DELETE /v1/projects/{idOrName}/env",
15451
15828
  "PATCH /v1/projects/{idOrName}/protection-bypass",
15829
+ "PATCH /v1/projects/{projectId}/microfrontends",
15452
15830
  "POST /v1/projects/{projectId}/pause",
15453
15831
  "POST /v1/projects/{projectId}/rollback/{deploymentId}",
15454
15832
  "POST /v1/projects/{projectId}/unpause",
@@ -15583,6 +15961,8 @@ var vercelFirewall = {
15583
15961
  "POST /v1/teams/{teamId}/members/teams/join",
15584
15962
  "PATCH /v1/teams/{teamId}/members/{uid}",
15585
15963
  "DELETE /v1/teams/{teamId}/members/{uid}",
15964
+ "PATCH /v1/teams/{teamId}/microfrontends/{groupId}",
15965
+ "DELETE /v1/teams/{teamId}/microfrontends/{groupId}",
15586
15966
  "POST /v1/teams/{teamId}/request",
15587
15967
  "PATCH /v2/teams/{teamId}",
15588
15968
  "POST /v2/teams/{teamId}/members"
@@ -17618,6 +17998,28 @@ var zeroRunContextContract = c25.router({
17618
17998
  summary: "Get run execution context snapshot for debugging"
17619
17999
  }
17620
18000
  });
18001
+ var zeroRunNetworkLogsContract = c25.router({
18002
+ getNetworkLogs: {
18003
+ method: "GET",
18004
+ path: "/api/zero/runs/:id/network",
18005
+ headers: authHeadersSchema,
18006
+ pathParams: z31.object({
18007
+ id: z31.string().min(1, "Run ID is required")
18008
+ }),
18009
+ query: z31.object({
18010
+ since: z31.coerce.number().optional(),
18011
+ limit: z31.coerce.number().min(1).max(500).default(500),
18012
+ order: z31.enum(["asc", "desc"]).default("asc")
18013
+ }),
18014
+ responses: {
18015
+ 200: networkLogsResponseSchema,
18016
+ 400: apiErrorSchema,
18017
+ 401: apiErrorSchema,
18018
+ 404: apiErrorSchema
18019
+ },
18020
+ summary: "Get network logs for a run"
18021
+ }
18022
+ });
17621
18023
 
17622
18024
  // ../../packages/core/src/contracts/zero-schedules.ts
17623
18025
  import { z as z32 } from "zod";
@@ -17626,7 +18028,6 @@ var scheduleResponseSchema = z32.object({
17626
18028
  id: z32.string().uuid(),
17627
18029
  agentId: z32.string().uuid(),
17628
18030
  displayName: z32.string().nullable(),
17629
- orgSlug: z32.string(),
17630
18031
  userId: z32.string(),
17631
18032
  name: z32.string(),
17632
18033
  triggerType: z32.enum(["cron", "once", "loop"]),
@@ -18782,6 +19183,11 @@ var FEATURE_SWITCHES = {
18782
19183
  enabledUserHashes: STAFF_USER_HASHES,
18783
19184
  enabledOrgIdHashes: STAFF_ORG_ID_HASHES
18784
19185
  },
19186
+ ["runNetwork" /* RunNetwork */]: {
19187
+ maintainer: "liangyou@vm0.ai",
19188
+ enabled: false,
19189
+ enabledOrgIdHashes: STAFF_ORG_ID_HASHES
19190
+ },
18785
19191
  ["activityLogList" /* ActivityLogList */]: {
18786
19192
  maintainer: "ethan@vm0.ai",
18787
19193
  enabled: false,
@@ -20893,4 +21299,4 @@ export {
20893
21299
  pollEvents,
20894
21300
  showNextSteps
20895
21301
  };
20896
- //# sourceMappingURL=chunk-YVJVEAKR.js.map
21302
+ //# sourceMappingURL=chunk-35RHCGX2.js.map