agents 0.2.10 → 0.2.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (94) hide show
  1. package/dist/ai-chat-agent.d.ts +15 -18
  2. package/dist/ai-chat-agent.js +528 -675
  3. package/dist/ai-chat-agent.js.map +1 -1
  4. package/dist/ai-chat-v5-migration-gdyLiTd8.js +155 -0
  5. package/dist/ai-chat-v5-migration-gdyLiTd8.js.map +1 -0
  6. package/dist/ai-chat-v5-migration.d.ts +7 -4
  7. package/dist/ai-chat-v5-migration.js +3 -20
  8. package/dist/ai-react.d.ts +14 -24
  9. package/dist/ai-react.js +257 -343
  10. package/dist/ai-react.js.map +1 -1
  11. package/dist/ai-types-BWW4umHY.d.ts +95 -0
  12. package/dist/ai-types-UZlfLOYP.js +20 -0
  13. package/dist/ai-types-UZlfLOYP.js.map +1 -0
  14. package/dist/ai-types.d.ts +6 -92
  15. package/dist/ai-types.js +3 -8
  16. package/dist/client-CZBVDDoO.js +786 -0
  17. package/dist/client-CZBVDDoO.js.map +1 -0
  18. package/dist/client-CmMi85Sj.d.ts +104 -0
  19. package/dist/client-CrWcaPgn.d.ts +5313 -0
  20. package/dist/client-DjR-lC16.js +117 -0
  21. package/dist/client-DjR-lC16.js.map +1 -0
  22. package/dist/client.d.ts +11 -92
  23. package/dist/client.js +4 -13
  24. package/dist/codemode/ai.d.ts +19 -17
  25. package/dist/codemode/ai.js +90 -5139
  26. package/dist/codemode/ai.js.map +1 -1
  27. package/dist/do-oauth-client-provider-B2jr6UNq.js +93 -0
  28. package/dist/do-oauth-client-provider-B2jr6UNq.js.map +1 -0
  29. package/dist/do-oauth-client-provider-CCwGwnrA.d.ts +55 -0
  30. package/dist/index-Daqy_D9E.d.ts +558 -0
  31. package/dist/index-W4JUkafc.d.ts +54 -0
  32. package/dist/index.d.ts +55 -542
  33. package/dist/index.js +7 -32
  34. package/dist/mcp/client.d.ts +4 -12
  35. package/dist/mcp/client.js +3 -10
  36. package/dist/mcp/do-oauth-client-provider.d.ts +2 -42
  37. package/dist/mcp/do-oauth-client-provider.js +3 -8
  38. package/dist/mcp/index.d.ts +72 -76
  39. package/dist/mcp/index.js +830 -1098
  40. package/dist/mcp/index.js.map +1 -1
  41. package/dist/mcp/x402.d.ts +22 -27
  42. package/dist/mcp/x402.js +186 -3187
  43. package/dist/mcp/x402.js.map +1 -1
  44. package/dist/{mcp-BH1fJeiU.d.ts → mcp-BEwaCsxO.d.ts} +6 -3
  45. package/dist/observability/index.d.ts +3 -34
  46. package/dist/observability/index.js +7 -12
  47. package/dist/react-Cl4ZPPhW.d.ts +113 -0
  48. package/dist/react.d.ts +10 -127
  49. package/dist/react.js +173 -200
  50. package/dist/react.js.map +1 -1
  51. package/dist/schedule.d.ts +13 -10
  52. package/dist/schedule.js +43 -33
  53. package/dist/schedule.js.map +1 -1
  54. package/dist/serializable-gtr9YMhp.d.ts +34 -0
  55. package/dist/serializable.d.ts +7 -32
  56. package/dist/serializable.js +1 -1
  57. package/dist/src-COfG--3R.js +1179 -0
  58. package/dist/src-COfG--3R.js.map +1 -0
  59. package/package.json +9 -3
  60. package/dist/_esm-LV5FJ3HK.js +0 -3922
  61. package/dist/_esm-LV5FJ3HK.js.map +0 -1
  62. package/dist/ai-chat-v5-migration.js.map +0 -1
  63. package/dist/ai-types.js.map +0 -1
  64. package/dist/ccip-CMBYN64O.js +0 -15
  65. package/dist/ccip-CMBYN64O.js.map +0 -1
  66. package/dist/chunk-2Y6KNRNP.js +0 -1343
  67. package/dist/chunk-2Y6KNRNP.js.map +0 -1
  68. package/dist/chunk-5Y6BEZDY.js +0 -276
  69. package/dist/chunk-5Y6BEZDY.js.map +0 -1
  70. package/dist/chunk-BER7KXUJ.js +0 -18
  71. package/dist/chunk-BER7KXUJ.js.map +0 -1
  72. package/dist/chunk-C2OEBJZ2.js +0 -113
  73. package/dist/chunk-C2OEBJZ2.js.map +0 -1
  74. package/dist/chunk-JJBFIGUC.js +0 -5202
  75. package/dist/chunk-JJBFIGUC.js.map +0 -1
  76. package/dist/chunk-PR4QN5HX.js +0 -43
  77. package/dist/chunk-PR4QN5HX.js.map +0 -1
  78. package/dist/chunk-QEVM4BVL.js +0 -116
  79. package/dist/chunk-QEVM4BVL.js.map +0 -1
  80. package/dist/chunk-QUOGV3WN.js +0 -949
  81. package/dist/chunk-QUOGV3WN.js.map +0 -1
  82. package/dist/chunk-TYAY6AU6.js +0 -159
  83. package/dist/chunk-TYAY6AU6.js.map +0 -1
  84. package/dist/chunk-UJVEAURM.js +0 -150
  85. package/dist/chunk-UJVEAURM.js.map +0 -1
  86. package/dist/client-C8tswVoM.d.ts +0 -5248
  87. package/dist/client.js.map +0 -1
  88. package/dist/index.js.map +0 -1
  89. package/dist/mcp/client.js.map +0 -1
  90. package/dist/mcp/do-oauth-client-provider.js.map +0 -1
  91. package/dist/observability/index.js.map +0 -1
  92. package/dist/secp256k1-M22GZP2U.js +0 -2193
  93. package/dist/secp256k1-M22GZP2U.js.map +0 -1
  94. package/dist/serializable.js.map +0 -1
@@ -0,0 +1,93 @@
1
+ import { nanoid } from "nanoid";
2
+
3
+ //#region src/mcp/do-oauth-client-provider.ts
4
+ var DurableObjectOAuthClientProvider = class {
5
+ constructor(storage, clientName, baseRedirectUrl) {
6
+ this.storage = storage;
7
+ this.clientName = clientName;
8
+ this.baseRedirectUrl = baseRedirectUrl;
9
+ }
10
+ get clientMetadata() {
11
+ return {
12
+ client_name: this.clientName,
13
+ client_uri: this.clientUri,
14
+ grant_types: ["authorization_code", "refresh_token"],
15
+ redirect_uris: [this.redirectUrl],
16
+ response_types: ["code"],
17
+ token_endpoint_auth_method: "none"
18
+ };
19
+ }
20
+ get clientUri() {
21
+ return new URL(this.redirectUrl).origin;
22
+ }
23
+ get redirectUrl() {
24
+ return `${this.baseRedirectUrl}/${this.serverId}`;
25
+ }
26
+ get clientId() {
27
+ if (!this._clientId_) throw new Error("Trying to access clientId before it was set");
28
+ return this._clientId_;
29
+ }
30
+ set clientId(clientId_) {
31
+ this._clientId_ = clientId_;
32
+ }
33
+ get serverId() {
34
+ if (!this._serverId_) throw new Error("Trying to access serverId before it was set");
35
+ return this._serverId_;
36
+ }
37
+ set serverId(serverId_) {
38
+ this._serverId_ = serverId_;
39
+ }
40
+ keyPrefix(clientId) {
41
+ return `/${this.clientName}/${this.serverId}/${clientId}`;
42
+ }
43
+ clientInfoKey(clientId) {
44
+ return `${this.keyPrefix(clientId)}/client_info/`;
45
+ }
46
+ async clientInformation() {
47
+ if (!this._clientId_) return;
48
+ return await this.storage.get(this.clientInfoKey(this.clientId)) ?? void 0;
49
+ }
50
+ async saveClientInformation(clientInformation) {
51
+ await this.storage.put(this.clientInfoKey(clientInformation.client_id), clientInformation);
52
+ this.clientId = clientInformation.client_id;
53
+ }
54
+ tokenKey(clientId) {
55
+ return `${this.keyPrefix(clientId)}/token`;
56
+ }
57
+ async tokens() {
58
+ if (!this._clientId_) return;
59
+ return await this.storage.get(this.tokenKey(this.clientId)) ?? void 0;
60
+ }
61
+ async saveTokens(tokens) {
62
+ await this.storage.put(this.tokenKey(this.clientId), tokens);
63
+ }
64
+ get authUrl() {
65
+ return this._authUrl_;
66
+ }
67
+ /**
68
+ * Because this operates on the server side (but we need browser auth), we send this url back to the user
69
+ * and require user interact to initiate the redirect flow
70
+ */
71
+ async redirectToAuthorization(authUrl) {
72
+ const stateToken = nanoid();
73
+ authUrl.searchParams.set("state", stateToken);
74
+ this._authUrl_ = authUrl.toString();
75
+ }
76
+ codeVerifierKey(clientId) {
77
+ return `${this.keyPrefix(clientId)}/code_verifier`;
78
+ }
79
+ async saveCodeVerifier(verifier) {
80
+ const key = this.codeVerifierKey(this.clientId);
81
+ if (await this.storage.get(key)) return;
82
+ await this.storage.put(key, verifier);
83
+ }
84
+ async codeVerifier() {
85
+ const codeVerifier = await this.storage.get(this.codeVerifierKey(this.clientId));
86
+ if (!codeVerifier) throw new Error("No code verifier found");
87
+ return codeVerifier;
88
+ }
89
+ };
90
+
91
+ //#endregion
92
+ export { DurableObjectOAuthClientProvider };
93
+ //# sourceMappingURL=do-oauth-client-provider-B2jr6UNq.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"do-oauth-client-provider-B2jr6UNq.js","names":["storage: DurableObjectStorage","clientName: string","baseRedirectUrl: string"],"sources":["../src/mcp/do-oauth-client-provider.ts"],"sourcesContent":["import type { OAuthClientProvider } from \"@modelcontextprotocol/sdk/client/auth.js\";\nimport type {\n OAuthClientInformation,\n OAuthClientInformationFull,\n OAuthClientMetadata,\n OAuthTokens\n} from \"@modelcontextprotocol/sdk/shared/auth.js\";\nimport { nanoid } from \"nanoid\";\n\n// A slight extension to the standard OAuthClientProvider interface because `redirectToAuthorization` doesn't give us the interface we need\n// This allows us to track authentication for a specific server and associated dynamic client registration\nexport interface AgentsOAuthProvider extends OAuthClientProvider {\n authUrl: string | undefined;\n clientId: string | undefined;\n serverId: string | undefined;\n}\n\nexport class DurableObjectOAuthClientProvider implements AgentsOAuthProvider {\n private _authUrl_: string | undefined;\n private _serverId_: string | undefined;\n private _clientId_: string | undefined;\n\n constructor(\n public storage: DurableObjectStorage,\n public clientName: string,\n public baseRedirectUrl: string\n ) {}\n\n get clientMetadata(): OAuthClientMetadata {\n return {\n client_name: this.clientName,\n client_uri: this.clientUri,\n grant_types: [\"authorization_code\", \"refresh_token\"],\n redirect_uris: [this.redirectUrl],\n response_types: [\"code\"],\n token_endpoint_auth_method: \"none\"\n };\n }\n\n get clientUri() {\n return new URL(this.redirectUrl).origin;\n }\n\n get redirectUrl() {\n return `${this.baseRedirectUrl}/${this.serverId}`;\n }\n\n get clientId() {\n if (!this._clientId_) {\n throw new Error(\"Trying to access clientId before it was set\");\n }\n return this._clientId_;\n }\n\n set clientId(clientId_: string) {\n this._clientId_ = clientId_;\n }\n\n get serverId() {\n if (!this._serverId_) {\n throw new Error(\"Trying to access serverId before it was set\");\n }\n return this._serverId_;\n }\n\n set serverId(serverId_: string) {\n this._serverId_ = serverId_;\n }\n\n keyPrefix(clientId: string) {\n return `/${this.clientName}/${this.serverId}/${clientId}`;\n }\n\n clientInfoKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/client_info/`;\n }\n\n async clientInformation(): Promise<OAuthClientInformation | undefined> {\n if (!this._clientId_) {\n return undefined;\n }\n return (\n (await this.storage.get<OAuthClientInformation>(\n this.clientInfoKey(this.clientId)\n )) ?? undefined\n );\n }\n\n async saveClientInformation(\n clientInformation: OAuthClientInformationFull\n ): Promise<void> {\n await this.storage.put(\n this.clientInfoKey(clientInformation.client_id),\n clientInformation\n );\n this.clientId = clientInformation.client_id;\n }\n\n tokenKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/token`;\n }\n\n async tokens(): Promise<OAuthTokens | undefined> {\n if (!this._clientId_) {\n return undefined;\n }\n return (\n (await this.storage.get<OAuthTokens>(this.tokenKey(this.clientId))) ??\n undefined\n );\n }\n\n async saveTokens(tokens: OAuthTokens): Promise<void> {\n await this.storage.put(this.tokenKey(this.clientId), tokens);\n }\n\n get authUrl() {\n return this._authUrl_;\n }\n\n /**\n * Because this operates on the server side (but we need browser auth), we send this url back to the user\n * and require user interact to initiate the redirect flow\n */\n async redirectToAuthorization(authUrl: URL): Promise<void> {\n // Generate secure random token for state parameter\n const stateToken = nanoid();\n authUrl.searchParams.set(\"state\", stateToken);\n this._authUrl_ = authUrl.toString();\n }\n\n codeVerifierKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/code_verifier`;\n }\n\n async saveCodeVerifier(verifier: string): Promise<void> {\n const key = this.codeVerifierKey(this.clientId);\n\n // Don't overwrite existing verifier to preserve first PKCE verifier\n const existing = await this.storage.get<string>(key);\n if (existing) {\n return;\n }\n\n await this.storage.put(key, verifier);\n }\n\n async codeVerifier(): Promise<string> {\n const codeVerifier = await this.storage.get<string>(\n this.codeVerifierKey(this.clientId)\n );\n if (!codeVerifier) {\n throw new Error(\"No code verifier found\");\n }\n return codeVerifier;\n }\n}\n"],"mappings":";;;AAiBA,IAAa,mCAAb,MAA6E;CAK3E,YACE,AAAOA,SACP,AAAOC,YACP,AAAOC,iBACP;EAHO;EACA;EACA;;CAGT,IAAI,iBAAsC;AACxC,SAAO;GACL,aAAa,KAAK;GAClB,YAAY,KAAK;GACjB,aAAa,CAAC,sBAAsB,gBAAgB;GACpD,eAAe,CAAC,KAAK,YAAY;GACjC,gBAAgB,CAAC,OAAO;GACxB,4BAA4B;GAC7B;;CAGH,IAAI,YAAY;AACd,SAAO,IAAI,IAAI,KAAK,YAAY,CAAC;;CAGnC,IAAI,cAAc;AAChB,SAAO,GAAG,KAAK,gBAAgB,GAAG,KAAK;;CAGzC,IAAI,WAAW;AACb,MAAI,CAAC,KAAK,WACR,OAAM,IAAI,MAAM,8CAA8C;AAEhE,SAAO,KAAK;;CAGd,IAAI,SAAS,WAAmB;AAC9B,OAAK,aAAa;;CAGpB,IAAI,WAAW;AACb,MAAI,CAAC,KAAK,WACR,OAAM,IAAI,MAAM,8CAA8C;AAEhE,SAAO,KAAK;;CAGd,IAAI,SAAS,WAAmB;AAC9B,OAAK,aAAa;;CAGpB,UAAU,UAAkB;AAC1B,SAAO,IAAI,KAAK,WAAW,GAAG,KAAK,SAAS,GAAG;;CAGjD,cAAc,UAAkB;AAC9B,SAAO,GAAG,KAAK,UAAU,SAAS,CAAC;;CAGrC,MAAM,oBAAiE;AACrE,MAAI,CAAC,KAAK,WACR;AAEF,SACG,MAAM,KAAK,QAAQ,IAClB,KAAK,cAAc,KAAK,SAAS,CAClC,IAAK;;CAIV,MAAM,sBACJ,mBACe;AACf,QAAM,KAAK,QAAQ,IACjB,KAAK,cAAc,kBAAkB,UAAU,EAC/C,kBACD;AACD,OAAK,WAAW,kBAAkB;;CAGpC,SAAS,UAAkB;AACzB,SAAO,GAAG,KAAK,UAAU,SAAS,CAAC;;CAGrC,MAAM,SAA2C;AAC/C,MAAI,CAAC,KAAK,WACR;AAEF,SACG,MAAM,KAAK,QAAQ,IAAiB,KAAK,SAAS,KAAK,SAAS,CAAC,IAClE;;CAIJ,MAAM,WAAW,QAAoC;AACnD,QAAM,KAAK,QAAQ,IAAI,KAAK,SAAS,KAAK,SAAS,EAAE,OAAO;;CAG9D,IAAI,UAAU;AACZ,SAAO,KAAK;;;;;;CAOd,MAAM,wBAAwB,SAA6B;EAEzD,MAAM,aAAa,QAAQ;AAC3B,UAAQ,aAAa,IAAI,SAAS,WAAW;AAC7C,OAAK,YAAY,QAAQ,UAAU;;CAGrC,gBAAgB,UAAkB;AAChC,SAAO,GAAG,KAAK,UAAU,SAAS,CAAC;;CAGrC,MAAM,iBAAiB,UAAiC;EACtD,MAAM,MAAM,KAAK,gBAAgB,KAAK,SAAS;AAI/C,MADiB,MAAM,KAAK,QAAQ,IAAY,IAAI,CAElD;AAGF,QAAM,KAAK,QAAQ,IAAI,KAAK,SAAS;;CAGvC,MAAM,eAAgC;EACpC,MAAM,eAAe,MAAM,KAAK,QAAQ,IACtC,KAAK,gBAAgB,KAAK,SAAS,CACpC;AACD,MAAI,CAAC,aACH,OAAM,IAAI,MAAM,yBAAyB;AAE3C,SAAO"}
@@ -0,0 +1,55 @@
1
+ import { OAuthClientProvider } from "@modelcontextprotocol/sdk/client/auth.js";
2
+ import {
3
+ OAuthClientInformation,
4
+ OAuthClientInformationFull,
5
+ OAuthClientMetadata,
6
+ OAuthTokens
7
+ } from "@modelcontextprotocol/sdk/shared/auth.js";
8
+
9
+ //#region src/mcp/do-oauth-client-provider.d.ts
10
+ interface AgentsOAuthProvider extends OAuthClientProvider {
11
+ authUrl: string | undefined;
12
+ clientId: string | undefined;
13
+ serverId: string | undefined;
14
+ }
15
+ declare class DurableObjectOAuthClientProvider implements AgentsOAuthProvider {
16
+ storage: DurableObjectStorage;
17
+ clientName: string;
18
+ baseRedirectUrl: string;
19
+ private _authUrl_;
20
+ private _serverId_;
21
+ private _clientId_;
22
+ constructor(
23
+ storage: DurableObjectStorage,
24
+ clientName: string,
25
+ baseRedirectUrl: string
26
+ );
27
+ get clientMetadata(): OAuthClientMetadata;
28
+ get clientUri(): string;
29
+ get redirectUrl(): string;
30
+ get clientId(): string;
31
+ set clientId(clientId_: string);
32
+ get serverId(): string;
33
+ set serverId(serverId_: string);
34
+ keyPrefix(clientId: string): string;
35
+ clientInfoKey(clientId: string): string;
36
+ clientInformation(): Promise<OAuthClientInformation | undefined>;
37
+ saveClientInformation(
38
+ clientInformation: OAuthClientInformationFull
39
+ ): Promise<void>;
40
+ tokenKey(clientId: string): string;
41
+ tokens(): Promise<OAuthTokens | undefined>;
42
+ saveTokens(tokens: OAuthTokens): Promise<void>;
43
+ get authUrl(): string | undefined;
44
+ /**
45
+ * Because this operates on the server side (but we need browser auth), we send this url back to the user
46
+ * and require user interact to initiate the redirect flow
47
+ */
48
+ redirectToAuthorization(authUrl: URL): Promise<void>;
49
+ codeVerifierKey(clientId: string): string;
50
+ saveCodeVerifier(verifier: string): Promise<void>;
51
+ codeVerifier(): Promise<string>;
52
+ }
53
+ //#endregion
54
+ export { AgentsOAuthProvider, DurableObjectOAuthClientProvider };
55
+ //# sourceMappingURL=do-oauth-client-provider-CCwGwnrA.d.ts.map