agents 0.0.0-5342ce4 → 0.0.0-54e1986

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/src/index.ts CHANGED
@@ -12,6 +12,21 @@ import { parseCronExpression } from "cron-schedule";
12
12
  import { nanoid } from "nanoid";
13
13
 
14
14
  import { AsyncLocalStorage } from "node:async_hooks";
15
+ import { MCPClientManager } from "./mcp/client";
16
+ import {
17
+ DurableObjectOAuthClientProvider,
18
+ type AgentsOAuthProvider,
19
+ } from "./mcp/do-oauth-client-provider";
20
+ import type {
21
+ Tool,
22
+ Resource,
23
+ Prompt,
24
+ } from "@modelcontextprotocol/sdk/types.js";
25
+
26
+ import type { Client } from "@modelcontextprotocol/sdk/client/index.js";
27
+ import type { SSEClientTransportOptions } from "@modelcontextprotocol/sdk/client/sse.js";
28
+
29
+ import { camelCaseToKebabCase } from "./client";
15
30
 
16
31
  export type { Connection, WSMessage, ConnectionContext } from "partyserver";
17
32
 
@@ -158,24 +173,90 @@ function getNextCronTime(cron: string) {
158
173
  return interval.getNextDate();
159
174
  }
160
175
 
176
+ /**
177
+ * MCP Server state update message from server -> Client
178
+ */
179
+ export type MCPServerMessage = {
180
+ type: "cf_agent_mcp_servers";
181
+ mcp: MCPServersState;
182
+ };
183
+
184
+ export type MCPServersState = {
185
+ servers: {
186
+ [id: string]: MCPServer;
187
+ };
188
+ tools: Tool[];
189
+ prompts: Prompt[];
190
+ resources: Resource[];
191
+ };
192
+
193
+ export type MCPServer = {
194
+ name: string;
195
+ server_url: string;
196
+ auth_url: string | null;
197
+ state: "authenticating" | "connecting" | "ready" | "discovering" | "failed";
198
+ };
199
+
200
+ /**
201
+ * MCP Server data stored in DO SQL for resuming MCP Server connections
202
+ */
203
+ type MCPServerRow = {
204
+ id: string;
205
+ name: string;
206
+ server_url: string;
207
+ client_id: string | null;
208
+ auth_url: string | null;
209
+ callback_url: string;
210
+ server_options: string;
211
+ };
212
+
161
213
  const STATE_ROW_ID = "cf_state_row_id";
162
214
  const STATE_WAS_CHANGED = "cf_state_was_changed";
163
215
 
164
216
  const DEFAULT_STATE = {} as unknown;
165
217
 
166
- export const unstable_context = new AsyncLocalStorage<{
218
+ const agentContext = new AsyncLocalStorage<{
167
219
  agent: Agent<unknown>;
168
220
  connection: Connection | undefined;
169
221
  request: Request | undefined;
170
222
  }>();
171
223
 
224
+ export function getCurrentAgent<
225
+ T extends Agent<unknown, unknown> = Agent<unknown, unknown>,
226
+ >(): {
227
+ agent: T | undefined;
228
+ connection: Connection | undefined;
229
+ request: Request<unknown, CfProperties<unknown>> | undefined;
230
+ } {
231
+ const store = agentContext.getStore() as
232
+ | {
233
+ agent: T;
234
+ connection: Connection | undefined;
235
+ request: Request<unknown, CfProperties<unknown>> | undefined;
236
+ }
237
+ | undefined;
238
+ if (!store) {
239
+ return {
240
+ agent: undefined,
241
+ connection: undefined,
242
+ request: undefined,
243
+ };
244
+ }
245
+ return store;
246
+ }
247
+
172
248
  /**
173
249
  * Base class for creating Agent implementations
174
250
  * @template Env Environment type containing bindings
175
251
  * @template State State type to store within the Agent
176
252
  */
177
253
  export class Agent<Env, State = unknown> extends Server<Env> {
178
- #state = DEFAULT_STATE as State;
254
+ private _state = DEFAULT_STATE as State;
255
+
256
+ private _ParentClass: typeof Agent<Env, State> =
257
+ Object.getPrototypeOf(this).constructor;
258
+
259
+ mcp: MCPClientManager = new MCPClientManager(this._ParentClass.name, "0.0.1");
179
260
 
180
261
  /**
181
262
  * Initial state for the Agent
@@ -187,9 +268,9 @@ export class Agent<Env, State = unknown> extends Server<Env> {
187
268
  * Current state of the Agent
188
269
  */
189
270
  get state(): State {
190
- if (this.#state !== DEFAULT_STATE) {
271
+ if (this._state !== DEFAULT_STATE) {
191
272
  // state was previously set, and populated internal state
192
- return this.#state;
273
+ return this._state;
193
274
  }
194
275
  // looks like this is the first time the state is being accessed
195
276
  // check if the state was set in a previous life
@@ -209,8 +290,8 @@ export class Agent<Env, State = unknown> extends Server<Env> {
209
290
  ) {
210
291
  const state = result[0]?.state as string; // could be null?
211
292
 
212
- this.#state = JSON.parse(state);
213
- return this.#state;
293
+ this._state = JSON.parse(state);
294
+ return this._state;
214
295
  }
215
296
 
216
297
  // ok, this is the first time the state is being accessed
@@ -271,7 +352,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
271
352
  `;
272
353
 
273
354
  void this.ctx.blockConcurrencyWhile(async () => {
274
- return this.#tryCatch(async () => {
355
+ return this._tryCatch(async () => {
275
356
  // Create alarms table if it doesn't exist
276
357
  this.sql`
277
358
  CREATE TABLE IF NOT EXISTS cf_agents_schedules (
@@ -291,13 +372,53 @@ export class Agent<Env, State = unknown> extends Server<Env> {
291
372
  });
292
373
  });
293
374
 
375
+ this.sql`
376
+ CREATE TABLE IF NOT EXISTS cf_agents_mcp_servers (
377
+ id TEXT PRIMARY KEY NOT NULL,
378
+ name TEXT NOT NULL,
379
+ server_url TEXT NOT NULL,
380
+ callback_url TEXT NOT NULL,
381
+ client_id TEXT,
382
+ auth_url TEXT,
383
+ server_options TEXT
384
+ )
385
+ `;
386
+
387
+ const _onRequest = this.onRequest.bind(this);
388
+ this.onRequest = (request: Request) => {
389
+ return agentContext.run(
390
+ { agent: this, connection: undefined, request },
391
+ async () => {
392
+ if (this.mcp.isCallbackRequest(request)) {
393
+ await this.mcp.handleCallbackRequest(request);
394
+
395
+ // after the MCP connection handshake, we can send updated mcp state
396
+ this.broadcast(
397
+ JSON.stringify({
398
+ type: "cf_agent_mcp_servers",
399
+ mcp: this._getMcpServerStateInternal(),
400
+ })
401
+ );
402
+
403
+ // We probably should let the user configure this response/redirect, but this is fine for now.
404
+ return new Response("<script>window.close();</script>", {
405
+ status: 200,
406
+ headers: { "content-type": "text/html" },
407
+ });
408
+ }
409
+
410
+ return this._tryCatch(() => _onRequest(request));
411
+ }
412
+ );
413
+ };
414
+
294
415
  const _onMessage = this.onMessage.bind(this);
295
416
  this.onMessage = async (connection: Connection, message: WSMessage) => {
296
- return unstable_context.run(
417
+ return agentContext.run(
297
418
  { agent: this, connection, request: undefined },
298
419
  async () => {
299
420
  if (typeof message !== "string") {
300
- return this.#tryCatch(() => _onMessage(connection, message));
421
+ return this._tryCatch(() => _onMessage(connection, message));
301
422
  }
302
423
 
303
424
  let parsed: unknown;
@@ -305,11 +426,11 @@ export class Agent<Env, State = unknown> extends Server<Env> {
305
426
  parsed = JSON.parse(message);
306
427
  } catch (e) {
307
428
  // silently fail and let the onMessage handler handle it
308
- return this.#tryCatch(() => _onMessage(connection, message));
429
+ return this._tryCatch(() => _onMessage(connection, message));
309
430
  }
310
431
 
311
432
  if (isStateUpdateMessage(parsed)) {
312
- this.#setStateInternal(parsed.state as State, connection);
433
+ this._setStateInternal(parsed.state as State, connection);
313
434
  return;
314
435
  }
315
436
 
@@ -323,7 +444,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
323
444
  throw new Error(`Method ${method} does not exist`);
324
445
  }
325
446
 
326
- if (!this.#isCallable(method)) {
447
+ if (!this._isCallable(method)) {
327
448
  throw new Error(`Method ${method} is not callable`);
328
449
  }
329
450
 
@@ -362,7 +483,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
362
483
  return;
363
484
  }
364
485
 
365
- return this.#tryCatch(() => _onMessage(connection, message));
486
+ return this._tryCatch(() => _onMessage(connection, message));
366
487
  }
367
488
  );
368
489
  };
@@ -371,7 +492,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
371
492
  this.onConnect = (connection: Connection, ctx: ConnectionContext) => {
372
493
  // TODO: This is a hack to ensure the state is sent after the connection is established
373
494
  // must fix this
374
- return unstable_context.run(
495
+ return agentContext.run(
375
496
  { agent: this, connection, request: ctx.request },
376
497
  async () => {
377
498
  setTimeout(() => {
@@ -383,15 +504,65 @@ export class Agent<Env, State = unknown> extends Server<Env> {
383
504
  })
384
505
  );
385
506
  }
386
- return this.#tryCatch(() => _onConnect(connection, ctx));
507
+
508
+ connection.send(
509
+ JSON.stringify({
510
+ type: "cf_agent_mcp_servers",
511
+ mcp: this._getMcpServerStateInternal(),
512
+ })
513
+ );
514
+
515
+ return this._tryCatch(() => _onConnect(connection, ctx));
387
516
  }, 20);
388
517
  }
389
518
  );
390
519
  };
520
+
521
+ const _onStart = this.onStart.bind(this);
522
+ this.onStart = async () => {
523
+ return agentContext.run(
524
+ { agent: this, connection: undefined, request: undefined },
525
+ async () => {
526
+ const servers = this.sql<MCPServerRow>`
527
+ SELECT id, name, server_url, client_id, auth_url, callback_url, server_options FROM cf_agents_mcp_servers;
528
+ `;
529
+
530
+ // from DO storage, reconnect to all servers using our saved auth information
531
+ await Promise.allSettled(
532
+ servers.map((server) => {
533
+ return this._connectToMcpServerInternal(
534
+ server.name,
535
+ server.server_url,
536
+ server.callback_url,
537
+ server.server_options
538
+ ? JSON.parse(server.server_options)
539
+ : undefined,
540
+ {
541
+ id: server.id,
542
+ oauthClientId: server.client_id ?? undefined,
543
+ }
544
+ );
545
+ })
546
+ );
547
+
548
+ this.broadcast(
549
+ JSON.stringify({
550
+ type: "cf_agent_mcp_servers",
551
+ mcp: this._getMcpServerStateInternal(),
552
+ })
553
+ );
554
+
555
+ await this._tryCatch(() => _onStart());
556
+ }
557
+ );
558
+ };
391
559
  }
392
560
 
393
- #setStateInternal(state: State, source: Connection | "server" = "server") {
394
- this.#state = state;
561
+ private _setStateInternal(
562
+ state: State,
563
+ source: Connection | "server" = "server"
564
+ ) {
565
+ this._state = state;
395
566
  this.sql`
396
567
  INSERT OR REPLACE INTO cf_agents_state (id, state)
397
568
  VALUES (${STATE_ROW_ID}, ${JSON.stringify(state)})
@@ -407,9 +578,9 @@ export class Agent<Env, State = unknown> extends Server<Env> {
407
578
  }),
408
579
  source !== "server" ? [source.id] : []
409
580
  );
410
- return this.#tryCatch(() => {
411
- const { connection, request } = unstable_context.getStore() || {};
412
- return unstable_context.run(
581
+ return this._tryCatch(() => {
582
+ const { connection, request } = agentContext.getStore() || {};
583
+ return agentContext.run(
413
584
  { agent: this, connection, request },
414
585
  async () => {
415
586
  return this.onStateUpdate(state, source);
@@ -423,7 +594,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
423
594
  * @param state New state to set
424
595
  */
425
596
  setState(state: State) {
426
- this.#setStateInternal(state, "server");
597
+ this._setStateInternal(state, "server");
427
598
  }
428
599
 
429
600
  /**
@@ -440,7 +611,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
440
611
  * @param email Email message to process
441
612
  */
442
613
  onEmail(email: ForwardableEmailMessage) {
443
- return unstable_context.run(
614
+ return agentContext.run(
444
615
  { agent: this, connection: undefined, request: undefined },
445
616
  async () => {
446
617
  console.error("onEmail not implemented");
@@ -448,7 +619,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
448
619
  );
449
620
  }
450
621
 
451
- async #tryCatch<T>(fn: () => T | Promise<T>) {
622
+ private async _tryCatch<T>(fn: () => T | Promise<T>) {
452
623
  try {
453
624
  return await fn();
454
625
  } catch (e) {
@@ -522,7 +693,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
522
693
  )}, 'scheduled', ${timestamp})
523
694
  `;
524
695
 
525
- await this.#scheduleNextAlarm();
696
+ await this._scheduleNextAlarm();
526
697
 
527
698
  return {
528
699
  id,
@@ -543,7 +714,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
543
714
  )}, 'delayed', ${when}, ${timestamp})
544
715
  `;
545
716
 
546
- await this.#scheduleNextAlarm();
717
+ await this._scheduleNextAlarm();
547
718
 
548
719
  return {
549
720
  id,
@@ -565,7 +736,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
565
736
  )}, 'cron', ${when}, ${timestamp})
566
737
  `;
567
738
 
568
- await this.#scheduleNextAlarm();
739
+ await this._scheduleNextAlarm();
569
740
 
570
741
  return {
571
742
  id,
@@ -652,11 +823,11 @@ export class Agent<Env, State = unknown> extends Server<Env> {
652
823
  async cancelSchedule(id: string): Promise<boolean> {
653
824
  this.sql`DELETE FROM cf_agents_schedules WHERE id = ${id}`;
654
825
 
655
- await this.#scheduleNextAlarm();
826
+ await this._scheduleNextAlarm();
656
827
  return true;
657
828
  }
658
829
 
659
- async #scheduleNextAlarm() {
830
+ private async _scheduleNextAlarm() {
660
831
  // Find the next schedule that needs to be executed
661
832
  const result = this.sql`
662
833
  SELECT time FROM cf_agents_schedules
@@ -673,10 +844,14 @@ export class Agent<Env, State = unknown> extends Server<Env> {
673
844
  }
674
845
 
675
846
  /**
676
- * Method called when an alarm fires
677
- * Executes any scheduled tasks that are due
847
+ * Method called when an alarm fires.
848
+ * Executes any scheduled tasks that are due.
849
+ *
850
+ * @remarks
851
+ * To schedule a task, please use the `this.schedule` method instead.
852
+ * See {@link https://developers.cloudflare.com/agents/api-reference/schedule-tasks/}
678
853
  */
679
- async alarm() {
854
+ public readonly alarm = async () => {
680
855
  const now = Math.floor(Date.now() / 1000);
681
856
 
682
857
  // Get all schedules that should be executed now
@@ -690,7 +865,7 @@ export class Agent<Env, State = unknown> extends Server<Env> {
690
865
  console.error(`callback ${row.callback} not found`);
691
866
  continue;
692
867
  }
693
- await unstable_context.run(
868
+ await agentContext.run(
694
869
  { agent: this, connection: undefined, request: undefined },
695
870
  async () => {
696
871
  try {
@@ -722,8 +897,8 @@ export class Agent<Env, State = unknown> extends Server<Env> {
722
897
  }
723
898
 
724
899
  // Schedule the next alarm
725
- await this.#scheduleNextAlarm();
726
- }
900
+ await this._scheduleNextAlarm();
901
+ };
727
902
 
728
903
  /**
729
904
  * Destroy the Agent, removing all state and scheduled tasks
@@ -732,20 +907,176 @@ export class Agent<Env, State = unknown> extends Server<Env> {
732
907
  // drop all tables
733
908
  this.sql`DROP TABLE IF EXISTS cf_agents_state`;
734
909
  this.sql`DROP TABLE IF EXISTS cf_agents_schedules`;
910
+ this.sql`DROP TABLE IF EXISTS cf_agents_mcp_servers`;
735
911
 
736
912
  // delete all alarms
737
913
  await this.ctx.storage.deleteAlarm();
738
914
  await this.ctx.storage.deleteAll();
739
915
  }
740
916
 
741
- /**
742
- * Get all methods marked as callable on this Agent
743
- * @returns A map of method names to their metadata
744
- */
745
- #isCallable(method: string): boolean {
917
+ private _isCallable(method: string): boolean {
746
918
  // biome-ignore lint/complexity/noBannedTypes: <explanation>
747
919
  return callableMetadata.has(this[method as keyof this] as Function);
748
920
  }
921
+
922
+ /**
923
+ * Connect to a new MCP Server
924
+ *
925
+ * @param url MCP Server SSE URL
926
+ * @param callbackHost Base host for the agent, used for the redirect URI.
927
+ * @param agentsPrefix agents routing prefix if not using `agents`
928
+ * @param options MCP client and transport (header) options
929
+ * @returns authUrl
930
+ */
931
+ async addMcpServer(
932
+ serverName: string,
933
+ url: string,
934
+ callbackHost: string,
935
+ agentsPrefix = "agents",
936
+ options?: {
937
+ client?: ConstructorParameters<typeof Client>[1];
938
+ transport?: {
939
+ headers: HeadersInit;
940
+ };
941
+ }
942
+ ): Promise<{ id: string; authUrl: string | undefined }> {
943
+ const callbackUrl = `${callbackHost}/${agentsPrefix}/${camelCaseToKebabCase(this._ParentClass.name)}/${this.name}/callback`;
944
+
945
+ const result = await this._connectToMcpServerInternal(
946
+ serverName,
947
+ url,
948
+ callbackUrl,
949
+ options
950
+ );
951
+
952
+ this.broadcast(
953
+ JSON.stringify({
954
+ type: "cf_agent_mcp_servers",
955
+ mcp: this._getMcpServerStateInternal(),
956
+ })
957
+ );
958
+
959
+ return result;
960
+ }
961
+
962
+ async _connectToMcpServerInternal(
963
+ serverName: string,
964
+ url: string,
965
+ callbackUrl: string,
966
+ // it's important that any options here are serializable because we put them into our sqlite DB for reconnection purposes
967
+ options?: {
968
+ client?: ConstructorParameters<typeof Client>[1];
969
+ /**
970
+ * We don't expose the normal set of transport options because:
971
+ * 1) we can't serialize things like the auth provider or a fetch function into the DB for reconnection purposes
972
+ * 2) We probably want these options to be agnostic to the transport type (SSE vs Streamable)
973
+ *
974
+ * This has the limitation that you can't override fetch, but I think headers should handle nearly all cases needed (i.e. non-standard bearer auth).
975
+ */
976
+ transport?: {
977
+ headers?: HeadersInit;
978
+ };
979
+ },
980
+ reconnect?: {
981
+ id: string;
982
+ oauthClientId?: string;
983
+ }
984
+ ): Promise<{ id: string; authUrl: string | undefined }> {
985
+ const authProvider = new DurableObjectOAuthClientProvider(
986
+ this.ctx.storage,
987
+ this.name,
988
+ callbackUrl
989
+ );
990
+
991
+ if (reconnect) {
992
+ authProvider.serverId = reconnect.id;
993
+ if (reconnect.oauthClientId) {
994
+ authProvider.clientId = reconnect.oauthClientId;
995
+ }
996
+ }
997
+
998
+ // allows passing through transport headers if necessary
999
+ // this handles some non-standard bearer auth setups (i.e. MCP server behind CF access instead of OAuth)
1000
+ let headerTransportOpts: SSEClientTransportOptions = {};
1001
+ if (options?.transport?.headers) {
1002
+ headerTransportOpts = {
1003
+ eventSourceInit: {
1004
+ fetch: (url, init) =>
1005
+ fetch(url, {
1006
+ ...init,
1007
+ headers: options?.transport?.headers,
1008
+ }),
1009
+ },
1010
+ requestInit: {
1011
+ headers: options?.transport?.headers,
1012
+ },
1013
+ };
1014
+ }
1015
+
1016
+ const { id, authUrl, clientId } = await this.mcp.connect(url, {
1017
+ reconnect,
1018
+ transport: {
1019
+ ...headerTransportOpts,
1020
+ authProvider,
1021
+ },
1022
+ client: options?.client,
1023
+ });
1024
+
1025
+ this.sql`
1026
+ INSERT OR REPLACE INTO cf_agents_mcp_servers (id, name, server_url, client_id, auth_url, callback_url, server_options)
1027
+ VALUES (
1028
+ ${id},
1029
+ ${serverName},
1030
+ ${url},
1031
+ ${clientId ?? null},
1032
+ ${authUrl ?? null},
1033
+ ${callbackUrl},
1034
+ ${options ? JSON.stringify(options) : null}
1035
+ );
1036
+ `;
1037
+
1038
+ return {
1039
+ id,
1040
+ authUrl,
1041
+ };
1042
+ }
1043
+
1044
+ async removeMcpServer(id: string) {
1045
+ this.mcp.closeConnection(id);
1046
+ this.sql`
1047
+ DELETE FROM cf_agents_mcp_servers WHERE id = ${id};
1048
+ `;
1049
+ this.broadcast(
1050
+ JSON.stringify({
1051
+ type: "cf_agent_mcp_servers",
1052
+ mcp: this._getMcpServerStateInternal(),
1053
+ })
1054
+ );
1055
+ }
1056
+
1057
+ private _getMcpServerStateInternal(): MCPServersState {
1058
+ const mcpState: MCPServersState = {
1059
+ servers: {},
1060
+ tools: this.mcp.listTools(),
1061
+ prompts: this.mcp.listPrompts(),
1062
+ resources: this.mcp.listResources(),
1063
+ };
1064
+
1065
+ const servers = this.sql<MCPServerRow>`
1066
+ SELECT id, name, server_url, client_id, auth_url, callback_url, server_options FROM cf_agents_mcp_servers;
1067
+ `;
1068
+
1069
+ for (const server of servers) {
1070
+ mcpState.servers[server.id] = {
1071
+ name: server.name,
1072
+ server_url: server.server_url,
1073
+ auth_url: server.auth_url,
1074
+ state: this.mcp.mcpConnections[server.id].connectionState,
1075
+ };
1076
+ }
1077
+
1078
+ return mcpState;
1079
+ }
749
1080
  }
750
1081
 
751
1082
  /**
@@ -849,7 +1180,7 @@ export async function routeAgentEmail<Env>(
849
1180
  * @param options Options for Agent creation
850
1181
  * @returns Promise resolving to an Agent instance stub
851
1182
  */
852
- export function getAgentByName<Env, T extends Agent<Env>>(
1183
+ export async function getAgentByName<Env, T extends Agent<Env>>(
853
1184
  namespace: AgentNamespace<T>,
854
1185
  name: string,
855
1186
  options?: {
@@ -864,13 +1195,13 @@ export function getAgentByName<Env, T extends Agent<Env>>(
864
1195
  * A wrapper for streaming responses in callable methods
865
1196
  */
866
1197
  export class StreamingResponse {
867
- #connection: Connection;
868
- #id: string;
869
- #closed = false;
1198
+ private _connection: Connection;
1199
+ private _id: string;
1200
+ private _closed = false;
870
1201
 
871
1202
  constructor(connection: Connection, id: string) {
872
- this.#connection = connection;
873
- this.#id = id;
1203
+ this._connection = connection;
1204
+ this._id = id;
874
1205
  }
875
1206
 
876
1207
  /**
@@ -878,17 +1209,17 @@ export class StreamingResponse {
878
1209
  * @param chunk The data to send
879
1210
  */
880
1211
  send(chunk: unknown) {
881
- if (this.#closed) {
1212
+ if (this._closed) {
882
1213
  throw new Error("StreamingResponse is already closed");
883
1214
  }
884
1215
  const response: RPCResponse = {
885
1216
  type: "rpc",
886
- id: this.#id,
1217
+ id: this._id,
887
1218
  success: true,
888
1219
  result: chunk,
889
1220
  done: false,
890
1221
  };
891
- this.#connection.send(JSON.stringify(response));
1222
+ this._connection.send(JSON.stringify(response));
892
1223
  }
893
1224
 
894
1225
  /**
@@ -896,17 +1227,17 @@ export class StreamingResponse {
896
1227
  * @param finalChunk Optional final chunk of data to send
897
1228
  */
898
1229
  end(finalChunk?: unknown) {
899
- if (this.#closed) {
1230
+ if (this._closed) {
900
1231
  throw new Error("StreamingResponse is already closed");
901
1232
  }
902
- this.#closed = true;
1233
+ this._closed = true;
903
1234
  const response: RPCResponse = {
904
1235
  type: "rpc",
905
- id: this.#id,
1236
+ id: this._id,
906
1237
  success: true,
907
1238
  result: finalChunk,
908
1239
  done: true,
909
1240
  };
910
- this.#connection.send(JSON.stringify(response));
1241
+ this._connection.send(JSON.stringify(response));
911
1242
  }
912
1243
  }
@@ -1,16 +0,0 @@
1
- var __typeError = (msg) => {
2
- throw TypeError(msg);
3
- };
4
- var __accessCheck = (obj, member, msg) => member.has(obj) || __typeError("Cannot " + msg);
5
- var __privateGet = (obj, member, getter) => (__accessCheck(obj, member, "read from private field"), getter ? getter.call(obj) : member.get(obj));
6
- var __privateAdd = (obj, member, value) => member.has(obj) ? __typeError("Cannot add the same private member more than once") : member instanceof WeakSet ? member.add(obj) : member.set(obj, value);
7
- var __privateSet = (obj, member, value, setter) => (__accessCheck(obj, member, "write to private field"), setter ? setter.call(obj, value) : member.set(obj, value), value);
8
- var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "access private method"), method);
9
-
10
- export {
11
- __privateGet,
12
- __privateAdd,
13
- __privateSet,
14
- __privateMethod
15
- };
16
- //# sourceMappingURL=chunk-HMLY7DHA.js.map
@@ -1 +0,0 @@
1
- {"version":3,"sources":[],"sourcesContent":[],"mappings":"","names":[]}