agents 0.3.10 → 0.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. package/README.md +2 -2
  2. package/dist/{index-N6791tVt.d.ts → agent-DY6QmSI_.d.ts} +3 -25
  3. package/dist/ai-types.js +1 -1
  4. package/dist/client-connection-CGMuV62J.js +472 -0
  5. package/dist/client-connection-CGMuV62J.js.map +1 -0
  6. package/dist/client-storage-Cvy5r9FG.d.ts +355 -0
  7. package/dist/client.d.ts +11 -7
  8. package/dist/client.js +6 -2
  9. package/dist/client.js.map +1 -1
  10. package/dist/email.d.ts +146 -16
  11. package/dist/email.js +222 -2
  12. package/dist/email.js.map +1 -0
  13. package/dist/index.d.ts +142 -41
  14. package/dist/index.js +2326 -6
  15. package/dist/index.js.map +1 -0
  16. package/dist/internal_context.d.ts +33 -6
  17. package/dist/internal_context.js +11 -2
  18. package/dist/internal_context.js.map +1 -0
  19. package/dist/mcp/client.d.ts +516 -2
  20. package/dist/mcp/client.js +662 -3
  21. package/dist/mcp/client.js.map +1 -0
  22. package/dist/mcp/do-oauth-client-provider.d.ts +61 -2
  23. package/dist/mcp/do-oauth-client-provider.js +154 -2
  24. package/dist/mcp/do-oauth-client-provider.js.map +1 -0
  25. package/dist/mcp/index.d.ts +3 -5
  26. package/dist/mcp/index.js +8 -7
  27. package/dist/mcp/index.js.map +1 -1
  28. package/dist/mcp/x402.d.ts +34 -14
  29. package/dist/mcp/x402.js +128 -66
  30. package/dist/mcp/x402.js.map +1 -1
  31. package/dist/{mcp-BwPscEiF.d.ts → mcp-Dw5vDrY8.d.ts} +1 -1
  32. package/dist/observability/index.d.ts +23 -2
  33. package/dist/observability/index.js +25 -6
  34. package/dist/observability/index.js.map +1 -0
  35. package/dist/react.d.ts +10 -10
  36. package/dist/react.js +6 -2
  37. package/dist/react.js.map +1 -1
  38. package/dist/types.d.ts +14 -1
  39. package/dist/types.js +16 -2
  40. package/dist/types.js.map +1 -0
  41. package/dist/utils.js +15 -2
  42. package/dist/utils.js.map +1 -0
  43. package/dist/workflow-types.d.ts +235 -23
  44. package/dist/workflows.d.ts +22 -24
  45. package/dist/workflows.js +2 -5
  46. package/dist/workflows.js.map +1 -1
  47. package/package.json +24 -28
  48. package/dist/client-CtC9E06G.js +0 -1122
  49. package/dist/client-CtC9E06G.js.map +0 -1
  50. package/dist/client-DV1CZKqa.d.ts +0 -969
  51. package/dist/do-oauth-client-provider-BqnOQzjy.d.ts +0 -70
  52. package/dist/do-oauth-client-provider-DDg8QrEA.js +0 -155
  53. package/dist/do-oauth-client-provider-DDg8QrEA.js.map +0 -1
  54. package/dist/email-8ljcpvwV.d.ts +0 -157
  55. package/dist/email-XHsSYsTO.js +0 -223
  56. package/dist/email-XHsSYsTO.js.map +0 -1
  57. package/dist/internal_context-CEu5ji80.d.ts +0 -29
  58. package/dist/internal_context-D9eKFth1.js +0 -8
  59. package/dist/internal_context-D9eKFth1.js.map +0 -1
  60. package/dist/src-i_UcyBYf.js +0 -2147
  61. package/dist/src-i_UcyBYf.js.map +0 -1
  62. package/dist/types-BITaDFf-.js +0 -16
  63. package/dist/types-BITaDFf-.js.map +0 -1
  64. package/dist/types-DSSHBW6w.d.ts +0 -14
  65. package/dist/utils-B49TmLCI.js +0 -16
  66. package/dist/utils-B49TmLCI.js.map +0 -1
  67. package/dist/workflow-types-Z_Oem1FJ.d.ts +0 -260
@@ -1,70 +0,0 @@
1
- import { OAuthClientProvider } from "@modelcontextprotocol/sdk/client/auth.js";
2
- import {
3
- OAuthClientInformation,
4
- OAuthClientInformationFull,
5
- OAuthClientMetadata,
6
- OAuthTokens
7
- } from "@modelcontextprotocol/sdk/shared/auth.js";
8
-
9
- //#region src/mcp/do-oauth-client-provider.d.ts
10
- interface AgentsOAuthProvider extends OAuthClientProvider {
11
- authUrl: string | undefined;
12
- clientId: string | undefined;
13
- serverId: string | undefined;
14
- checkState(state: string): Promise<{
15
- valid: boolean;
16
- serverId?: string;
17
- error?: string;
18
- }>;
19
- consumeState(state: string): Promise<void>;
20
- deleteCodeVerifier(): Promise<void>;
21
- }
22
- declare class DurableObjectOAuthClientProvider implements AgentsOAuthProvider {
23
- storage: DurableObjectStorage;
24
- clientName: string;
25
- baseRedirectUrl: string;
26
- private _authUrl_;
27
- private _serverId_;
28
- private _clientId_;
29
- constructor(
30
- storage: DurableObjectStorage,
31
- clientName: string,
32
- baseRedirectUrl: string
33
- );
34
- get clientMetadata(): OAuthClientMetadata;
35
- get clientUri(): string;
36
- get redirectUrl(): string;
37
- get clientId(): string;
38
- set clientId(clientId_: string);
39
- get serverId(): string;
40
- set serverId(serverId_: string);
41
- keyPrefix(clientId: string): string;
42
- clientInfoKey(clientId: string): string;
43
- clientInformation(): Promise<OAuthClientInformation | undefined>;
44
- saveClientInformation(
45
- clientInformation: OAuthClientInformationFull
46
- ): Promise<void>;
47
- tokenKey(clientId: string): string;
48
- tokens(): Promise<OAuthTokens | undefined>;
49
- saveTokens(tokens: OAuthTokens): Promise<void>;
50
- get authUrl(): string | undefined;
51
- stateKey(nonce: string): string;
52
- state(): Promise<string>;
53
- checkState(state: string): Promise<{
54
- valid: boolean;
55
- serverId?: string;
56
- error?: string;
57
- }>;
58
- consumeState(state: string): Promise<void>;
59
- redirectToAuthorization(authUrl: URL): Promise<void>;
60
- invalidateCredentials(
61
- scope: "all" | "client" | "tokens" | "verifier"
62
- ): Promise<void>;
63
- codeVerifierKey(clientId: string): string;
64
- saveCodeVerifier(verifier: string): Promise<void>;
65
- codeVerifier(): Promise<string>;
66
- deleteCodeVerifier(): Promise<void>;
67
- }
68
- //#endregion
69
- export { DurableObjectOAuthClientProvider as n, AgentsOAuthProvider as t };
70
- //# sourceMappingURL=do-oauth-client-provider-BqnOQzjy.d.ts.map
@@ -1,155 +0,0 @@
1
- import { nanoid } from "nanoid";
2
-
3
- //#region src/mcp/do-oauth-client-provider.ts
4
- const STATE_EXPIRATION_MS = 600 * 1e3;
5
- var DurableObjectOAuthClientProvider = class {
6
- constructor(storage, clientName, baseRedirectUrl) {
7
- this.storage = storage;
8
- this.clientName = clientName;
9
- this.baseRedirectUrl = baseRedirectUrl;
10
- if (!storage) throw new Error("DurableObjectOAuthClientProvider requires a valid DurableObjectStorage instance");
11
- }
12
- get clientMetadata() {
13
- return {
14
- client_name: this.clientName,
15
- client_uri: this.clientUri,
16
- grant_types: ["authorization_code", "refresh_token"],
17
- redirect_uris: [this.redirectUrl],
18
- response_types: ["code"],
19
- token_endpoint_auth_method: "none"
20
- };
21
- }
22
- get clientUri() {
23
- return new URL(this.redirectUrl).origin;
24
- }
25
- get redirectUrl() {
26
- return this.baseRedirectUrl;
27
- }
28
- get clientId() {
29
- if (!this._clientId_) throw new Error("Trying to access clientId before it was set");
30
- return this._clientId_;
31
- }
32
- set clientId(clientId_) {
33
- this._clientId_ = clientId_;
34
- }
35
- get serverId() {
36
- if (!this._serverId_) throw new Error("Trying to access serverId before it was set");
37
- return this._serverId_;
38
- }
39
- set serverId(serverId_) {
40
- this._serverId_ = serverId_;
41
- }
42
- keyPrefix(clientId) {
43
- return `/${this.clientName}/${this.serverId}/${clientId}`;
44
- }
45
- clientInfoKey(clientId) {
46
- return `${this.keyPrefix(clientId)}/client_info/`;
47
- }
48
- async clientInformation() {
49
- if (!this._clientId_) return;
50
- return await this.storage.get(this.clientInfoKey(this.clientId)) ?? void 0;
51
- }
52
- async saveClientInformation(clientInformation) {
53
- await this.storage.put(this.clientInfoKey(clientInformation.client_id), clientInformation);
54
- this.clientId = clientInformation.client_id;
55
- }
56
- tokenKey(clientId) {
57
- return `${this.keyPrefix(clientId)}/token`;
58
- }
59
- async tokens() {
60
- if (!this._clientId_) return;
61
- return await this.storage.get(this.tokenKey(this.clientId)) ?? void 0;
62
- }
63
- async saveTokens(tokens) {
64
- await this.storage.put(this.tokenKey(this.clientId), tokens);
65
- }
66
- get authUrl() {
67
- return this._authUrl_;
68
- }
69
- stateKey(nonce) {
70
- return `/${this.clientName}/${this.serverId}/state/${nonce}`;
71
- }
72
- async state() {
73
- const nonce = nanoid();
74
- const state = `${nonce}.${this.serverId}`;
75
- const storedState = {
76
- nonce,
77
- serverId: this.serverId,
78
- createdAt: Date.now()
79
- };
80
- await this.storage.put(this.stateKey(nonce), storedState);
81
- return state;
82
- }
83
- async checkState(state) {
84
- const parts = state.split(".");
85
- if (parts.length !== 2) return {
86
- valid: false,
87
- error: "Invalid state format"
88
- };
89
- const [nonce, serverId] = parts;
90
- const key = this.stateKey(nonce);
91
- const storedState = await this.storage.get(key);
92
- if (!storedState) return {
93
- valid: false,
94
- error: "State not found or already used"
95
- };
96
- if (storedState.serverId !== serverId) {
97
- await this.storage.delete(key);
98
- return {
99
- valid: false,
100
- error: "State serverId mismatch"
101
- };
102
- }
103
- if (Date.now() - storedState.createdAt > STATE_EXPIRATION_MS) {
104
- await this.storage.delete(key);
105
- return {
106
- valid: false,
107
- error: "State expired"
108
- };
109
- }
110
- return {
111
- valid: true,
112
- serverId
113
- };
114
- }
115
- async consumeState(state) {
116
- const parts = state.split(".");
117
- if (parts.length !== 2) {
118
- console.warn(`[OAuth] consumeState called with invalid state format: ${state.substring(0, 20)}...`);
119
- return;
120
- }
121
- const [nonce] = parts;
122
- await this.storage.delete(this.stateKey(nonce));
123
- }
124
- async redirectToAuthorization(authUrl) {
125
- this._authUrl_ = authUrl.toString();
126
- }
127
- async invalidateCredentials(scope) {
128
- if (!this._clientId_) return;
129
- const deleteKeys = [];
130
- if (scope === "all" || scope === "client") deleteKeys.push(this.clientInfoKey(this.clientId));
131
- if (scope === "all" || scope === "tokens") deleteKeys.push(this.tokenKey(this.clientId));
132
- if (scope === "all" || scope === "verifier") deleteKeys.push(this.codeVerifierKey(this.clientId));
133
- if (deleteKeys.length > 0) await this.storage.delete(deleteKeys);
134
- }
135
- codeVerifierKey(clientId) {
136
- return `${this.keyPrefix(clientId)}/code_verifier`;
137
- }
138
- async saveCodeVerifier(verifier) {
139
- const key = this.codeVerifierKey(this.clientId);
140
- if (await this.storage.get(key)) return;
141
- await this.storage.put(key, verifier);
142
- }
143
- async codeVerifier() {
144
- const codeVerifier = await this.storage.get(this.codeVerifierKey(this.clientId));
145
- if (!codeVerifier) throw new Error("No code verifier found");
146
- return codeVerifier;
147
- }
148
- async deleteCodeVerifier() {
149
- await this.storage.delete(this.codeVerifierKey(this.clientId));
150
- }
151
- };
152
-
153
- //#endregion
154
- export { DurableObjectOAuthClientProvider as t };
155
- //# sourceMappingURL=do-oauth-client-provider-DDg8QrEA.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"do-oauth-client-provider-DDg8QrEA.js","names":[],"sources":["../src/mcp/do-oauth-client-provider.ts"],"sourcesContent":["import type { OAuthClientProvider } from \"@modelcontextprotocol/sdk/client/auth.js\";\nimport type {\n OAuthClientInformation,\n OAuthClientInformationFull,\n OAuthClientMetadata,\n OAuthTokens\n} from \"@modelcontextprotocol/sdk/shared/auth.js\";\nimport { nanoid } from \"nanoid\";\n\nconst STATE_EXPIRATION_MS = 10 * 60 * 1000; // 10 minutes\n\ninterface StoredState {\n nonce: string;\n serverId: string;\n createdAt: number;\n}\n\n// A slight extension to the standard OAuthClientProvider interface because `redirectToAuthorization` doesn't give us the interface we need\n// This allows us to track authentication for a specific server and associated dynamic client registration\nexport interface AgentsOAuthProvider extends OAuthClientProvider {\n authUrl: string | undefined;\n clientId: string | undefined;\n serverId: string | undefined;\n checkState(\n state: string\n ): Promise<{ valid: boolean; serverId?: string; error?: string }>;\n consumeState(state: string): Promise<void>;\n deleteCodeVerifier(): Promise<void>;\n}\n\nexport class DurableObjectOAuthClientProvider implements AgentsOAuthProvider {\n private _authUrl_: string | undefined;\n private _serverId_: string | undefined;\n private _clientId_: string | undefined;\n\n constructor(\n public storage: DurableObjectStorage,\n public clientName: string,\n public baseRedirectUrl: string\n ) {\n if (!storage) {\n throw new Error(\n \"DurableObjectOAuthClientProvider requires a valid DurableObjectStorage instance\"\n );\n }\n }\n\n get clientMetadata(): OAuthClientMetadata {\n return {\n client_name: this.clientName,\n client_uri: this.clientUri,\n grant_types: [\"authorization_code\", \"refresh_token\"],\n redirect_uris: [this.redirectUrl],\n response_types: [\"code\"],\n token_endpoint_auth_method: \"none\"\n };\n }\n\n get clientUri() {\n return new URL(this.redirectUrl).origin;\n }\n\n get redirectUrl() {\n return this.baseRedirectUrl;\n }\n\n get clientId() {\n if (!this._clientId_) {\n throw new Error(\"Trying to access clientId before it was set\");\n }\n return this._clientId_;\n }\n\n set clientId(clientId_: string) {\n this._clientId_ = clientId_;\n }\n\n get serverId() {\n if (!this._serverId_) {\n throw new Error(\"Trying to access serverId before it was set\");\n }\n return this._serverId_;\n }\n\n set serverId(serverId_: string) {\n this._serverId_ = serverId_;\n }\n\n keyPrefix(clientId: string) {\n return `/${this.clientName}/${this.serverId}/${clientId}`;\n }\n\n clientInfoKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/client_info/`;\n }\n\n async clientInformation(): Promise<OAuthClientInformation | undefined> {\n if (!this._clientId_) {\n return undefined;\n }\n return (\n (await this.storage.get<OAuthClientInformation>(\n this.clientInfoKey(this.clientId)\n )) ?? undefined\n );\n }\n\n async saveClientInformation(\n clientInformation: OAuthClientInformationFull\n ): Promise<void> {\n await this.storage.put(\n this.clientInfoKey(clientInformation.client_id),\n clientInformation\n );\n this.clientId = clientInformation.client_id;\n }\n\n tokenKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/token`;\n }\n\n async tokens(): Promise<OAuthTokens | undefined> {\n if (!this._clientId_) {\n return undefined;\n }\n return (\n (await this.storage.get<OAuthTokens>(this.tokenKey(this.clientId))) ??\n undefined\n );\n }\n\n async saveTokens(tokens: OAuthTokens): Promise<void> {\n await this.storage.put(this.tokenKey(this.clientId), tokens);\n }\n\n get authUrl() {\n return this._authUrl_;\n }\n\n stateKey(nonce: string) {\n return `/${this.clientName}/${this.serverId}/state/${nonce}`;\n }\n\n async state(): Promise<string> {\n const nonce = nanoid();\n const state = `${nonce}.${this.serverId}`;\n const storedState: StoredState = {\n nonce,\n serverId: this.serverId,\n createdAt: Date.now()\n };\n await this.storage.put(this.stateKey(nonce), storedState);\n return state;\n }\n\n async checkState(\n state: string\n ): Promise<{ valid: boolean; serverId?: string; error?: string }> {\n const parts = state.split(\".\");\n if (parts.length !== 2) {\n return { valid: false, error: \"Invalid state format\" };\n }\n\n const [nonce, serverId] = parts;\n const key = this.stateKey(nonce);\n const storedState = await this.storage.get<StoredState>(key);\n\n if (!storedState) {\n return { valid: false, error: \"State not found or already used\" };\n }\n\n if (storedState.serverId !== serverId) {\n await this.storage.delete(key);\n return { valid: false, error: \"State serverId mismatch\" };\n }\n\n const age = Date.now() - storedState.createdAt;\n if (age > STATE_EXPIRATION_MS) {\n await this.storage.delete(key);\n return { valid: false, error: \"State expired\" };\n }\n\n return { valid: true, serverId };\n }\n\n async consumeState(state: string): Promise<void> {\n const parts = state.split(\".\");\n if (parts.length !== 2) {\n // This should never happen since checkState validates format first.\n // Log for debugging but don't throw - state consumption is best-effort.\n console.warn(\n `[OAuth] consumeState called with invalid state format: ${state.substring(0, 20)}...`\n );\n return;\n }\n const [nonce] = parts;\n await this.storage.delete(this.stateKey(nonce));\n }\n\n async redirectToAuthorization(authUrl: URL): Promise<void> {\n this._authUrl_ = authUrl.toString();\n }\n\n async invalidateCredentials(\n scope: \"all\" | \"client\" | \"tokens\" | \"verifier\"\n ): Promise<void> {\n if (!this._clientId_) return;\n\n const deleteKeys: string[] = [];\n\n if (scope === \"all\" || scope === \"client\") {\n deleteKeys.push(this.clientInfoKey(this.clientId));\n }\n if (scope === \"all\" || scope === \"tokens\") {\n deleteKeys.push(this.tokenKey(this.clientId));\n }\n if (scope === \"all\" || scope === \"verifier\") {\n deleteKeys.push(this.codeVerifierKey(this.clientId));\n }\n\n if (deleteKeys.length > 0) {\n await this.storage.delete(deleteKeys);\n }\n }\n\n codeVerifierKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/code_verifier`;\n }\n\n async saveCodeVerifier(verifier: string): Promise<void> {\n const key = this.codeVerifierKey(this.clientId);\n\n // Don't overwrite existing verifier to preserve first PKCE verifier\n const existing = await this.storage.get<string>(key);\n if (existing) {\n return;\n }\n\n await this.storage.put(key, verifier);\n }\n\n async codeVerifier(): Promise<string> {\n const codeVerifier = await this.storage.get<string>(\n this.codeVerifierKey(this.clientId)\n );\n if (!codeVerifier) {\n throw new Error(\"No code verifier found\");\n }\n return codeVerifier;\n }\n\n async deleteCodeVerifier(): Promise<void> {\n await this.storage.delete(this.codeVerifierKey(this.clientId));\n }\n}\n"],"mappings":";;;AASA,MAAM,sBAAsB,MAAU;AAqBtC,IAAa,mCAAb,MAA6E;CAK3E,YACE,AAAO,SACP,AAAO,YACP,AAAO,iBACP;EAHO;EACA;EACA;AAEP,MAAI,CAAC,QACH,OAAM,IAAI,MACR,kFACD;;CAIL,IAAI,iBAAsC;AACxC,SAAO;GACL,aAAa,KAAK;GAClB,YAAY,KAAK;GACjB,aAAa,CAAC,sBAAsB,gBAAgB;GACpD,eAAe,CAAC,KAAK,YAAY;GACjC,gBAAgB,CAAC,OAAO;GACxB,4BAA4B;GAC7B;;CAGH,IAAI,YAAY;AACd,SAAO,IAAI,IAAI,KAAK,YAAY,CAAC;;CAGnC,IAAI,cAAc;AAChB,SAAO,KAAK;;CAGd,IAAI,WAAW;AACb,MAAI,CAAC,KAAK,WACR,OAAM,IAAI,MAAM,8CAA8C;AAEhE,SAAO,KAAK;;CAGd,IAAI,SAAS,WAAmB;AAC9B,OAAK,aAAa;;CAGpB,IAAI,WAAW;AACb,MAAI,CAAC,KAAK,WACR,OAAM,IAAI,MAAM,8CAA8C;AAEhE,SAAO,KAAK;;CAGd,IAAI,SAAS,WAAmB;AAC9B,OAAK,aAAa;;CAGpB,UAAU,UAAkB;AAC1B,SAAO,IAAI,KAAK,WAAW,GAAG,KAAK,SAAS,GAAG;;CAGjD,cAAc,UAAkB;AAC9B,SAAO,GAAG,KAAK,UAAU,SAAS,CAAC;;CAGrC,MAAM,oBAAiE;AACrE,MAAI,CAAC,KAAK,WACR;AAEF,SACG,MAAM,KAAK,QAAQ,IAClB,KAAK,cAAc,KAAK,SAAS,CAClC,IAAK;;CAIV,MAAM,sBACJ,mBACe;AACf,QAAM,KAAK,QAAQ,IACjB,KAAK,cAAc,kBAAkB,UAAU,EAC/C,kBACD;AACD,OAAK,WAAW,kBAAkB;;CAGpC,SAAS,UAAkB;AACzB,SAAO,GAAG,KAAK,UAAU,SAAS,CAAC;;CAGrC,MAAM,SAA2C;AAC/C,MAAI,CAAC,KAAK,WACR;AAEF,SACG,MAAM,KAAK,QAAQ,IAAiB,KAAK,SAAS,KAAK,SAAS,CAAC,IAClE;;CAIJ,MAAM,WAAW,QAAoC;AACnD,QAAM,KAAK,QAAQ,IAAI,KAAK,SAAS,KAAK,SAAS,EAAE,OAAO;;CAG9D,IAAI,UAAU;AACZ,SAAO,KAAK;;CAGd,SAAS,OAAe;AACtB,SAAO,IAAI,KAAK,WAAW,GAAG,KAAK,SAAS,SAAS;;CAGvD,MAAM,QAAyB;EAC7B,MAAM,QAAQ,QAAQ;EACtB,MAAM,QAAQ,GAAG,MAAM,GAAG,KAAK;EAC/B,MAAM,cAA2B;GAC/B;GACA,UAAU,KAAK;GACf,WAAW,KAAK,KAAK;GACtB;AACD,QAAM,KAAK,QAAQ,IAAI,KAAK,SAAS,MAAM,EAAE,YAAY;AACzD,SAAO;;CAGT,MAAM,WACJ,OACgE;EAChE,MAAM,QAAQ,MAAM,MAAM,IAAI;AAC9B,MAAI,MAAM,WAAW,EACnB,QAAO;GAAE,OAAO;GAAO,OAAO;GAAwB;EAGxD,MAAM,CAAC,OAAO,YAAY;EAC1B,MAAM,MAAM,KAAK,SAAS,MAAM;EAChC,MAAM,cAAc,MAAM,KAAK,QAAQ,IAAiB,IAAI;AAE5D,MAAI,CAAC,YACH,QAAO;GAAE,OAAO;GAAO,OAAO;GAAmC;AAGnE,MAAI,YAAY,aAAa,UAAU;AACrC,SAAM,KAAK,QAAQ,OAAO,IAAI;AAC9B,UAAO;IAAE,OAAO;IAAO,OAAO;IAA2B;;AAI3D,MADY,KAAK,KAAK,GAAG,YAAY,YAC3B,qBAAqB;AAC7B,SAAM,KAAK,QAAQ,OAAO,IAAI;AAC9B,UAAO;IAAE,OAAO;IAAO,OAAO;IAAiB;;AAGjD,SAAO;GAAE,OAAO;GAAM;GAAU;;CAGlC,MAAM,aAAa,OAA8B;EAC/C,MAAM,QAAQ,MAAM,MAAM,IAAI;AAC9B,MAAI,MAAM,WAAW,GAAG;AAGtB,WAAQ,KACN,0DAA0D,MAAM,UAAU,GAAG,GAAG,CAAC,KAClF;AACD;;EAEF,MAAM,CAAC,SAAS;AAChB,QAAM,KAAK,QAAQ,OAAO,KAAK,SAAS,MAAM,CAAC;;CAGjD,MAAM,wBAAwB,SAA6B;AACzD,OAAK,YAAY,QAAQ,UAAU;;CAGrC,MAAM,sBACJ,OACe;AACf,MAAI,CAAC,KAAK,WAAY;EAEtB,MAAM,aAAuB,EAAE;AAE/B,MAAI,UAAU,SAAS,UAAU,SAC/B,YAAW,KAAK,KAAK,cAAc,KAAK,SAAS,CAAC;AAEpD,MAAI,UAAU,SAAS,UAAU,SAC/B,YAAW,KAAK,KAAK,SAAS,KAAK,SAAS,CAAC;AAE/C,MAAI,UAAU,SAAS,UAAU,WAC/B,YAAW,KAAK,KAAK,gBAAgB,KAAK,SAAS,CAAC;AAGtD,MAAI,WAAW,SAAS,EACtB,OAAM,KAAK,QAAQ,OAAO,WAAW;;CAIzC,gBAAgB,UAAkB;AAChC,SAAO,GAAG,KAAK,UAAU,SAAS,CAAC;;CAGrC,MAAM,iBAAiB,UAAiC;EACtD,MAAM,MAAM,KAAK,gBAAgB,KAAK,SAAS;AAI/C,MADiB,MAAM,KAAK,QAAQ,IAAY,IAAI,CAElD;AAGF,QAAM,KAAK,QAAQ,IAAI,KAAK,SAAS;;CAGvC,MAAM,eAAgC;EACpC,MAAM,eAAe,MAAM,KAAK,QAAQ,IACtC,KAAK,gBAAgB,KAAK,SAAS,CACpC;AACD,MAAI,CAAC,aACH,OAAM,IAAI,MAAM,yBAAyB;AAE3C,SAAO;;CAGT,MAAM,qBAAoC;AACxC,QAAM,KAAK,QAAQ,OAAO,KAAK,gBAAgB,KAAK,SAAS,CAAC"}
@@ -1,157 +0,0 @@
1
- //#region src/email.d.ts
2
- /**
3
- * Header object as returned by postal-mime and similar email parsing libraries.
4
- * Each header has a lowercase key and a string value.
5
- */
6
- type EmailHeader = {
7
- /** Lowercase header name (e.g., "content-type", "x-custom-header") */ key: string; /** Header value */
8
- value: string;
9
- };
10
- /**
11
- * Check if an email appears to be an auto-reply based on standard headers.
12
- * Checks for Auto-Submitted (RFC 3834), X-Auto-Response-Suppress, and Precedence headers.
13
- *
14
- * @param headers - Headers array from postal-mime Email.headers or similar format
15
- * @returns true if email appears to be an auto-reply
16
- *
17
- * @example
18
- * ```typescript
19
- * if (isAutoReplyEmail(parsed.headers)) {
20
- * // Skip processing auto-replies
21
- * return;
22
- * }
23
- * ```
24
- */
25
- declare function isAutoReplyEmail(headers: EmailHeader[]): boolean;
26
- /** Default signature expiration: 30 days in seconds */
27
- declare const DEFAULT_MAX_AGE_SECONDS: number;
28
- /**
29
- * Sign agent routing headers for secure reply flows.
30
- * Use this when sending outbound emails to ensure replies can be securely routed back.
31
- *
32
- * @param secret - Secret key for HMAC signing (store in environment variables)
33
- * @param agentName - Name of the agent
34
- * @param agentId - ID of the agent instance
35
- * @returns Headers object with X-Agent-Name, X-Agent-ID, X-Agent-Sig, and X-Agent-Sig-Ts
36
- *
37
- * @example
38
- * ```typescript
39
- * const headers = await signAgentHeaders(env.EMAIL_SECRET, "MyAgent", this.name);
40
- * // Use these headers when sending outbound emails
41
- * ```
42
- */
43
- declare function signAgentHeaders(
44
- secret: string,
45
- agentName: string,
46
- agentId: string
47
- ): Promise<Record<string, string>>;
48
- type EmailResolverResult = {
49
- agentName: string;
50
- agentId: string; /** @internal Indicates this resolver requires secure reply signing */
51
- _secureRouted?: boolean;
52
- } | null;
53
- type EmailResolver<Env> = (
54
- email: ForwardableEmailMessage,
55
- env: Env
56
- ) => Promise<EmailResolverResult>;
57
- /**
58
- * Reason for signature verification failure
59
- */
60
- type SignatureFailureReason =
61
- | "missing_headers"
62
- | "expired"
63
- | "invalid"
64
- | "malformed_timestamp";
65
- /**
66
- * Options for createSecureReplyEmailResolver
67
- */
68
- type SecureReplyResolverOptions = {
69
- /**
70
- * Maximum age of signature in seconds.
71
- * Signatures older than this will be rejected.
72
- * Default: 30 days (2592000 seconds)
73
- */
74
- maxAge?: number;
75
- /**
76
- * Callback invoked when signature verification fails.
77
- * Useful for logging and debugging.
78
- */
79
- onInvalidSignature?: (
80
- email: ForwardableEmailMessage,
81
- reason: SignatureFailureReason
82
- ) => void;
83
- };
84
- /**
85
- * @deprecated REMOVED due to security vulnerability (IDOR via spoofed headers).
86
- * @throws Always throws an error with migration guidance.
87
- */
88
- declare function createHeaderBasedEmailResolver<Env>(): EmailResolver<Env>;
89
- /**
90
- * Create a resolver for routing email replies with signature verification.
91
- * This resolver verifies that replies contain a valid HMAC signature, preventing
92
- * attackers from routing emails to arbitrary agent instances.
93
- *
94
- * @param secret - Secret key for HMAC verification (must match the key used with signAgentHeaders)
95
- * @param options - Optional configuration for signature verification
96
- * @returns A function that resolves the agent to route the email to, or null if signature is invalid
97
- *
98
- * @example
99
- * ```typescript
100
- * // In your email handler
101
- * const secureResolver = createSecureReplyEmailResolver(env.EMAIL_SECRET, {
102
- * maxAge: 7 * 24 * 60 * 60, // 7 days
103
- * onInvalidSignature: (email, reason) => {
104
- * console.warn(`Invalid signature from ${email.from}: ${reason}`);
105
- * }
106
- * });
107
- * const addressResolver = createAddressBasedEmailResolver("MyAgent");
108
- *
109
- * await routeAgentEmail(email, env, {
110
- * resolver: async (email, env) => {
111
- * // Try secure reply routing first
112
- * const replyRouting = await secureResolver(email, env);
113
- * if (replyRouting) return replyRouting;
114
- * // Fall back to address-based routing
115
- * return addressResolver(email, env);
116
- * }
117
- * });
118
- * ```
119
- */
120
- declare function createSecureReplyEmailResolver<Env>(
121
- secret: string,
122
- options?: SecureReplyResolverOptions
123
- ): EmailResolver<Env>;
124
- /**
125
- * Create a resolver that uses the email address to determine the agent to route the email to
126
- * @param defaultAgentName The default agent name to use if the email address does not contain a sub-address
127
- * @returns A function that resolves the agent to route the email to
128
- */
129
- declare function createAddressBasedEmailResolver<Env>(
130
- defaultAgentName: string
131
- ): EmailResolver<Env>;
132
- /**
133
- * Create a resolver that uses the agentName and agentId to determine the agent to route the email to
134
- * @param agentName The name of the agent to route the email to
135
- * @param agentId The id of the agent to route the email to
136
- * @returns A function that resolves the agent to route the email to
137
- */
138
- declare function createCatchAllEmailResolver<Env>(
139
- agentName: string,
140
- agentId: string
141
- ): EmailResolver<Env>;
142
- //#endregion
143
- export {
144
- SecureReplyResolverOptions as a,
145
- createCatchAllEmailResolver as c,
146
- isAutoReplyEmail as d,
147
- signAgentHeaders as f,
148
- EmailResolverResult as i,
149
- createHeaderBasedEmailResolver as l,
150
- EmailHeader as n,
151
- SignatureFailureReason as o,
152
- EmailResolver as r,
153
- createAddressBasedEmailResolver as s,
154
- DEFAULT_MAX_AGE_SECONDS as t,
155
- createSecureReplyEmailResolver as u
156
- };
157
- //# sourceMappingURL=email-8ljcpvwV.d.ts.map
@@ -1,223 +0,0 @@
1
- //#region src/email.ts
2
- /**
3
- * Check if an email appears to be an auto-reply based on standard headers.
4
- * Checks for Auto-Submitted (RFC 3834), X-Auto-Response-Suppress, and Precedence headers.
5
- *
6
- * @param headers - Headers array from postal-mime Email.headers or similar format
7
- * @returns true if email appears to be an auto-reply
8
- *
9
- * @example
10
- * ```typescript
11
- * if (isAutoReplyEmail(parsed.headers)) {
12
- * // Skip processing auto-replies
13
- * return;
14
- * }
15
- * ```
16
- */
17
- function isAutoReplyEmail(headers) {
18
- return headers.some((h) => {
19
- const key = h.key.toLowerCase();
20
- const value = h.value.toLowerCase();
21
- if (key === "auto-submitted") return value !== "no";
22
- if (key === "x-auto-response-suppress") return true;
23
- if (key === "precedence") return value === "bulk" || value === "junk" || value === "list";
24
- return false;
25
- });
26
- }
27
- /** Default signature expiration: 30 days in seconds */
28
- const DEFAULT_MAX_AGE_SECONDS = 720 * 60 * 60;
29
- /** Maximum allowed clock skew for future timestamps: 5 minutes */
30
- const MAX_CLOCK_SKEW_SECONDS = 300;
31
- /**
32
- * Compute HMAC-SHA256 signature for agent routing headers
33
- * @param secret - Secret key for HMAC
34
- * @param agentName - Name of the agent
35
- * @param agentId - ID of the agent instance
36
- * @param timestamp - Unix timestamp in seconds
37
- * @returns Base64-encoded HMAC signature
38
- */
39
- async function computeAgentSignature(secret, agentName, agentId, timestamp) {
40
- const encoder = new TextEncoder();
41
- const key = await crypto.subtle.importKey("raw", encoder.encode(secret), {
42
- name: "HMAC",
43
- hash: "SHA-256"
44
- }, false, ["sign"]);
45
- const data = encoder.encode(`${agentName}:${agentId}:${timestamp}`);
46
- const signature = await crypto.subtle.sign("HMAC", key, data);
47
- return btoa(String.fromCharCode(...new Uint8Array(signature)));
48
- }
49
- /**
50
- * Verify HMAC-SHA256 signature for agent routing headers
51
- * @param secret - Secret key for HMAC
52
- * @param agentName - Name of the agent
53
- * @param agentId - ID of the agent instance
54
- * @param signature - Base64-encoded signature to verify
55
- * @param timestamp - Unix timestamp in seconds when signature was created
56
- * @param maxAgeSeconds - Maximum age of signature in seconds (default: 30 days)
57
- * @returns Verification result with reason if invalid
58
- */
59
- async function verifyAgentSignature(secret, agentName, agentId, signature, timestamp, maxAgeSeconds = DEFAULT_MAX_AGE_SECONDS) {
60
- try {
61
- const timestampNum = Number.parseInt(timestamp, 10);
62
- if (Number.isNaN(timestampNum)) return {
63
- valid: false,
64
- reason: "malformed_timestamp"
65
- };
66
- const now = Math.floor(Date.now() / 1e3);
67
- if (timestampNum > now + MAX_CLOCK_SKEW_SECONDS) return {
68
- valid: false,
69
- reason: "invalid"
70
- };
71
- if (now - timestampNum > maxAgeSeconds) return {
72
- valid: false,
73
- reason: "expired"
74
- };
75
- const expected = await computeAgentSignature(secret, agentName, agentId, timestamp);
76
- if (expected.length !== signature.length) return {
77
- valid: false,
78
- reason: "invalid"
79
- };
80
- let result = 0;
81
- for (let i = 0; i < expected.length; i++) result |= expected.charCodeAt(i) ^ signature.charCodeAt(i);
82
- if (result !== 0) return {
83
- valid: false,
84
- reason: "invalid"
85
- };
86
- return { valid: true };
87
- } catch (error) {
88
- console.warn("[agents] Signature verification error:", error);
89
- return {
90
- valid: false,
91
- reason: "invalid"
92
- };
93
- }
94
- }
95
- /**
96
- * Sign agent routing headers for secure reply flows.
97
- * Use this when sending outbound emails to ensure replies can be securely routed back.
98
- *
99
- * @param secret - Secret key for HMAC signing (store in environment variables)
100
- * @param agentName - Name of the agent
101
- * @param agentId - ID of the agent instance
102
- * @returns Headers object with X-Agent-Name, X-Agent-ID, X-Agent-Sig, and X-Agent-Sig-Ts
103
- *
104
- * @example
105
- * ```typescript
106
- * const headers = await signAgentHeaders(env.EMAIL_SECRET, "MyAgent", this.name);
107
- * // Use these headers when sending outbound emails
108
- * ```
109
- */
110
- async function signAgentHeaders(secret, agentName, agentId) {
111
- if (!secret) throw new Error("secret is required for signing agent headers");
112
- if (!agentName) throw new Error("agentName is required for signing agent headers");
113
- if (!agentId) throw new Error("agentId is required for signing agent headers");
114
- if (agentName.includes(":")) throw new Error("agentName cannot contain colons");
115
- if (agentId.includes(":")) throw new Error("agentId cannot contain colons");
116
- const timestamp = Math.floor(Date.now() / 1e3).toString();
117
- const signature = await computeAgentSignature(secret, agentName, agentId, timestamp);
118
- return {
119
- "X-Agent-Name": agentName,
120
- "X-Agent-ID": agentId,
121
- "X-Agent-Sig": signature,
122
- "X-Agent-Sig-Ts": timestamp
123
- };
124
- }
125
- /**
126
- * @deprecated REMOVED due to security vulnerability (IDOR via spoofed headers).
127
- * @throws Always throws an error with migration guidance.
128
- */
129
- function createHeaderBasedEmailResolver() {
130
- throw new Error("createHeaderBasedEmailResolver has been removed due to a security vulnerability. It trusted attacker-controlled email headers for routing, enabling IDOR attacks.\n\nMigration options:\n - For inbound mail: use createAddressBasedEmailResolver(agentName)\n - For reply flows: use createSecureReplyEmailResolver(secret) with signed headers\n\nSee https://github.com/cloudflare/agents/blob/main/docs/email.md for details.");
131
- }
132
- /**
133
- * Create a resolver for routing email replies with signature verification.
134
- * This resolver verifies that replies contain a valid HMAC signature, preventing
135
- * attackers from routing emails to arbitrary agent instances.
136
- *
137
- * @param secret - Secret key for HMAC verification (must match the key used with signAgentHeaders)
138
- * @param options - Optional configuration for signature verification
139
- * @returns A function that resolves the agent to route the email to, or null if signature is invalid
140
- *
141
- * @example
142
- * ```typescript
143
- * // In your email handler
144
- * const secureResolver = createSecureReplyEmailResolver(env.EMAIL_SECRET, {
145
- * maxAge: 7 * 24 * 60 * 60, // 7 days
146
- * onInvalidSignature: (email, reason) => {
147
- * console.warn(`Invalid signature from ${email.from}: ${reason}`);
148
- * }
149
- * });
150
- * const addressResolver = createAddressBasedEmailResolver("MyAgent");
151
- *
152
- * await routeAgentEmail(email, env, {
153
- * resolver: async (email, env) => {
154
- * // Try secure reply routing first
155
- * const replyRouting = await secureResolver(email, env);
156
- * if (replyRouting) return replyRouting;
157
- * // Fall back to address-based routing
158
- * return addressResolver(email, env);
159
- * }
160
- * });
161
- * ```
162
- */
163
- function createSecureReplyEmailResolver(secret, options) {
164
- if (!secret) throw new Error("secret is required for createSecureReplyEmailResolver");
165
- const maxAge = options?.maxAge ?? DEFAULT_MAX_AGE_SECONDS;
166
- const onInvalidSignature = options?.onInvalidSignature;
167
- return async (email, _env) => {
168
- const agentName = email.headers.get("x-agent-name");
169
- const agentId = email.headers.get("x-agent-id");
170
- const signature = email.headers.get("x-agent-sig");
171
- const timestamp = email.headers.get("x-agent-sig-ts");
172
- if (!agentName || !agentId || !signature || !timestamp) {
173
- onInvalidSignature?.(email, "missing_headers");
174
- return null;
175
- }
176
- const result = await verifyAgentSignature(secret, agentName, agentId, signature, timestamp, maxAge);
177
- if (!result.valid) {
178
- onInvalidSignature?.(email, result.reason);
179
- return null;
180
- }
181
- return {
182
- agentName,
183
- agentId,
184
- _secureRouted: true
185
- };
186
- };
187
- }
188
- /**
189
- * Create a resolver that uses the email address to determine the agent to route the email to
190
- * @param defaultAgentName The default agent name to use if the email address does not contain a sub-address
191
- * @returns A function that resolves the agent to route the email to
192
- */
193
- function createAddressBasedEmailResolver(defaultAgentName) {
194
- return async (email, _env) => {
195
- const emailMatch = email.to.match(/^([^+@]{1,64})(?:\+([^@]{1,64}))?@(.{1,253})$/);
196
- if (!emailMatch) return null;
197
- const [, localPart, subAddress] = emailMatch;
198
- if (subAddress) return {
199
- agentName: localPart,
200
- agentId: subAddress
201
- };
202
- return {
203
- agentName: defaultAgentName,
204
- agentId: localPart
205
- };
206
- };
207
- }
208
- /**
209
- * Create a resolver that uses the agentName and agentId to determine the agent to route the email to
210
- * @param agentName The name of the agent to route the email to
211
- * @param agentId The id of the agent to route the email to
212
- * @returns A function that resolves the agent to route the email to
213
- */
214
- function createCatchAllEmailResolver(agentName, agentId) {
215
- return async () => ({
216
- agentName,
217
- agentId
218
- });
219
- }
220
-
221
- //#endregion
222
- export { createSecureReplyEmailResolver as a, createHeaderBasedEmailResolver as i, createAddressBasedEmailResolver as n, isAutoReplyEmail as o, createCatchAllEmailResolver as r, signAgentHeaders as s, DEFAULT_MAX_AGE_SECONDS as t };
223
- //# sourceMappingURL=email-XHsSYsTO.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"email-XHsSYsTO.js","names":[],"sources":["../src/email.ts"],"sourcesContent":["/**\n * Email routing types, resolvers, and signing utilities for Agents\n */\n\n// Re-export AgentEmail type\nexport type { AgentEmail } from \"./internal_context\";\n\n// ============================================================================\n// Email header utilities\n// ============================================================================\n\n/**\n * Header object as returned by postal-mime and similar email parsing libraries.\n * Each header has a lowercase key and a string value.\n */\nexport type EmailHeader = {\n /** Lowercase header name (e.g., \"content-type\", \"x-custom-header\") */\n key: string;\n /** Header value */\n value: string;\n};\n\n/**\n * Check if an email appears to be an auto-reply based on standard headers.\n * Checks for Auto-Submitted (RFC 3834), X-Auto-Response-Suppress, and Precedence headers.\n *\n * @param headers - Headers array from postal-mime Email.headers or similar format\n * @returns true if email appears to be an auto-reply\n *\n * @example\n * ```typescript\n * if (isAutoReplyEmail(parsed.headers)) {\n * // Skip processing auto-replies\n * return;\n * }\n * ```\n */\nexport function isAutoReplyEmail(headers: EmailHeader[]): boolean {\n return headers.some((h) => {\n const key = h.key.toLowerCase();\n const value = h.value.toLowerCase();\n\n // RFC 3834: Auto-Submitted header\n // \"no\" means normal (human-sent) email, anything else indicates auto-reply\n if (key === \"auto-submitted\") {\n return value !== \"no\";\n }\n\n // X-Auto-Response-Suppress: any value indicates sender doesn't want auto-replies\n if (key === \"x-auto-response-suppress\") {\n return true;\n }\n\n // Precedence: only bulk/junk/list indicate automated/mass mail\n if (key === \"precedence\") {\n return value === \"bulk\" || value === \"junk\" || value === \"list\";\n }\n\n return false;\n });\n}\n\n// ============================================================================\n// Signing utilities\n// ============================================================================\n\n/** Default signature expiration: 30 days in seconds */\nexport const DEFAULT_MAX_AGE_SECONDS = 30 * 24 * 60 * 60;\n\n/** Maximum allowed clock skew for future timestamps: 5 minutes */\nconst MAX_CLOCK_SKEW_SECONDS = 5 * 60;\n\n/**\n * Compute HMAC-SHA256 signature for agent routing headers\n * @param secret - Secret key for HMAC\n * @param agentName - Name of the agent\n * @param agentId - ID of the agent instance\n * @param timestamp - Unix timestamp in seconds\n * @returns Base64-encoded HMAC signature\n */\nasync function computeAgentSignature(\n secret: string,\n agentName: string,\n agentId: string,\n timestamp: string\n): Promise<string> {\n const encoder = new TextEncoder();\n const key = await crypto.subtle.importKey(\n \"raw\",\n encoder.encode(secret),\n { name: \"HMAC\", hash: \"SHA-256\" },\n false,\n [\"sign\"]\n );\n const data = encoder.encode(`${agentName}:${agentId}:${timestamp}`);\n const signature = await crypto.subtle.sign(\"HMAC\", key, data);\n return btoa(String.fromCharCode(...new Uint8Array(signature)));\n}\n\n/**\n * Result of signature verification\n */\ntype SignatureVerificationResult =\n | { valid: true }\n | { valid: false; reason: \"expired\" | \"invalid\" | \"malformed_timestamp\" };\n\n/**\n * Verify HMAC-SHA256 signature for agent routing headers\n * @param secret - Secret key for HMAC\n * @param agentName - Name of the agent\n * @param agentId - ID of the agent instance\n * @param signature - Base64-encoded signature to verify\n * @param timestamp - Unix timestamp in seconds when signature was created\n * @param maxAgeSeconds - Maximum age of signature in seconds (default: 30 days)\n * @returns Verification result with reason if invalid\n */\nasync function verifyAgentSignature(\n secret: string,\n agentName: string,\n agentId: string,\n signature: string,\n timestamp: string,\n maxAgeSeconds: number = DEFAULT_MAX_AGE_SECONDS\n): Promise<SignatureVerificationResult> {\n try {\n // Validate timestamp format\n const timestampNum = Number.parseInt(timestamp, 10);\n if (Number.isNaN(timestampNum)) {\n return { valid: false, reason: \"malformed_timestamp\" };\n }\n\n // Check timestamp validity\n const now = Math.floor(Date.now() / 1000);\n\n // Reject timestamps too far in the future (prevents extending signature validity)\n if (timestampNum > now + MAX_CLOCK_SKEW_SECONDS) {\n return { valid: false, reason: \"invalid\" };\n }\n\n // Check if signature has expired\n if (now - timestampNum > maxAgeSeconds) {\n return { valid: false, reason: \"expired\" };\n }\n\n const expected = await computeAgentSignature(\n secret,\n agentName,\n agentId,\n timestamp\n );\n // Constant-time comparison to prevent timing attacks\n if (expected.length !== signature.length) {\n return { valid: false, reason: \"invalid\" };\n }\n let result = 0;\n for (let i = 0; i < expected.length; i++) {\n result |= expected.charCodeAt(i) ^ signature.charCodeAt(i);\n }\n if (result !== 0) {\n return { valid: false, reason: \"invalid\" };\n }\n return { valid: true };\n } catch (error) {\n console.warn(\"[agents] Signature verification error:\", error);\n return { valid: false, reason: \"invalid\" };\n }\n}\n\n/**\n * Sign agent routing headers for secure reply flows.\n * Use this when sending outbound emails to ensure replies can be securely routed back.\n *\n * @param secret - Secret key for HMAC signing (store in environment variables)\n * @param agentName - Name of the agent\n * @param agentId - ID of the agent instance\n * @returns Headers object with X-Agent-Name, X-Agent-ID, X-Agent-Sig, and X-Agent-Sig-Ts\n *\n * @example\n * ```typescript\n * const headers = await signAgentHeaders(env.EMAIL_SECRET, \"MyAgent\", this.name);\n * // Use these headers when sending outbound emails\n * ```\n */\nexport async function signAgentHeaders(\n secret: string,\n agentName: string,\n agentId: string\n): Promise<Record<string, string>> {\n if (!secret) {\n throw new Error(\"secret is required for signing agent headers\");\n }\n if (!agentName) {\n throw new Error(\"agentName is required for signing agent headers\");\n }\n if (!agentId) {\n throw new Error(\"agentId is required for signing agent headers\");\n }\n // Reject colons to prevent signature confusion attacks\n // (signature payload uses colon as delimiter: \"agentName:agentId:timestamp\")\n if (agentName.includes(\":\")) {\n throw new Error(\"agentName cannot contain colons\");\n }\n if (agentId.includes(\":\")) {\n throw new Error(\"agentId cannot contain colons\");\n }\n\n const timestamp = Math.floor(Date.now() / 1000).toString();\n const signature = await computeAgentSignature(\n secret,\n agentName,\n agentId,\n timestamp\n );\n return {\n \"X-Agent-Name\": agentName,\n \"X-Agent-ID\": agentId,\n \"X-Agent-Sig\": signature,\n \"X-Agent-Sig-Ts\": timestamp\n };\n}\n\n// ============================================================================\n// Email routing types and resolvers\n// ============================================================================\n\nexport type EmailResolverResult = {\n agentName: string;\n agentId: string;\n /** @internal Indicates this resolver requires secure reply signing */\n _secureRouted?: boolean;\n} | null;\n\nexport type EmailResolver<Env> = (\n email: ForwardableEmailMessage,\n env: Env\n) => Promise<EmailResolverResult>;\n\n/**\n * Reason for signature verification failure\n */\nexport type SignatureFailureReason =\n | \"missing_headers\"\n | \"expired\"\n | \"invalid\"\n | \"malformed_timestamp\";\n\n/**\n * Options for createSecureReplyEmailResolver\n */\nexport type SecureReplyResolverOptions = {\n /**\n * Maximum age of signature in seconds.\n * Signatures older than this will be rejected.\n * Default: 30 days (2592000 seconds)\n */\n maxAge?: number;\n /**\n * Callback invoked when signature verification fails.\n * Useful for logging and debugging.\n */\n onInvalidSignature?: (\n email: ForwardableEmailMessage,\n reason: SignatureFailureReason\n ) => void;\n};\n\n/**\n * @deprecated REMOVED due to security vulnerability (IDOR via spoofed headers).\n * @throws Always throws an error with migration guidance.\n */\nexport function createHeaderBasedEmailResolver<Env>(): EmailResolver<Env> {\n throw new Error(\n \"createHeaderBasedEmailResolver has been removed due to a security vulnerability. \" +\n \"It trusted attacker-controlled email headers for routing, enabling IDOR attacks.\\n\\n\" +\n \"Migration options:\\n\" +\n \" - For inbound mail: use createAddressBasedEmailResolver(agentName)\\n\" +\n \" - For reply flows: use createSecureReplyEmailResolver(secret) with signed headers\\n\\n\" +\n \"See https://github.com/cloudflare/agents/blob/main/docs/email.md for details.\"\n );\n}\n\n/**\n * Create a resolver for routing email replies with signature verification.\n * This resolver verifies that replies contain a valid HMAC signature, preventing\n * attackers from routing emails to arbitrary agent instances.\n *\n * @param secret - Secret key for HMAC verification (must match the key used with signAgentHeaders)\n * @param options - Optional configuration for signature verification\n * @returns A function that resolves the agent to route the email to, or null if signature is invalid\n *\n * @example\n * ```typescript\n * // In your email handler\n * const secureResolver = createSecureReplyEmailResolver(env.EMAIL_SECRET, {\n * maxAge: 7 * 24 * 60 * 60, // 7 days\n * onInvalidSignature: (email, reason) => {\n * console.warn(`Invalid signature from ${email.from}: ${reason}`);\n * }\n * });\n * const addressResolver = createAddressBasedEmailResolver(\"MyAgent\");\n *\n * await routeAgentEmail(email, env, {\n * resolver: async (email, env) => {\n * // Try secure reply routing first\n * const replyRouting = await secureResolver(email, env);\n * if (replyRouting) return replyRouting;\n * // Fall back to address-based routing\n * return addressResolver(email, env);\n * }\n * });\n * ```\n */\nexport function createSecureReplyEmailResolver<Env>(\n secret: string,\n options?: SecureReplyResolverOptions\n): EmailResolver<Env> {\n if (!secret) {\n throw new Error(\"secret is required for createSecureReplyEmailResolver\");\n }\n\n const maxAge = options?.maxAge ?? DEFAULT_MAX_AGE_SECONDS;\n const onInvalidSignature = options?.onInvalidSignature;\n\n return async (email: ForwardableEmailMessage, _env: Env) => {\n const agentName = email.headers.get(\"x-agent-name\");\n const agentId = email.headers.get(\"x-agent-id\");\n const signature = email.headers.get(\"x-agent-sig\");\n const timestamp = email.headers.get(\"x-agent-sig-ts\");\n\n if (!agentName || !agentId || !signature || !timestamp) {\n onInvalidSignature?.(email, \"missing_headers\");\n return null;\n }\n\n const result = await verifyAgentSignature(\n secret,\n agentName,\n agentId,\n signature,\n timestamp,\n maxAge\n );\n\n if (!result.valid) {\n onInvalidSignature?.(email, result.reason);\n return null;\n }\n\n return { agentName, agentId, _secureRouted: true };\n };\n}\n\n/**\n * Create a resolver that uses the email address to determine the agent to route the email to\n * @param defaultAgentName The default agent name to use if the email address does not contain a sub-address\n * @returns A function that resolves the agent to route the email to\n */\nexport function createAddressBasedEmailResolver<Env>(\n defaultAgentName: string\n): EmailResolver<Env> {\n return async (email: ForwardableEmailMessage, _env: Env) => {\n // Length limits per RFC 5321: local part max 64 chars, domain max 253 chars\n const emailMatch = email.to.match(\n /^([^+@]{1,64})(?:\\+([^@]{1,64}))?@(.{1,253})$/\n );\n if (!emailMatch) {\n return null;\n }\n\n const [, localPart, subAddress] = emailMatch;\n\n if (subAddress) {\n return {\n agentName: localPart,\n agentId: subAddress\n };\n }\n\n // Option 2: Use defaultAgentName namespace, localPart as agentId\n // Common for catch-all email routing to a single EmailAgent namespace\n return {\n agentName: defaultAgentName,\n agentId: localPart\n };\n };\n}\n\n/**\n * Create a resolver that uses the agentName and agentId to determine the agent to route the email to\n * @param agentName The name of the agent to route the email to\n * @param agentId The id of the agent to route the email to\n * @returns A function that resolves the agent to route the email to\n */\nexport function createCatchAllEmailResolver<Env>(\n agentName: string,\n agentId: string\n): EmailResolver<Env> {\n return async () => ({ agentName, agentId });\n}\n"],"mappings":";;;;;;;;;;;;;;;;AAqCA,SAAgB,iBAAiB,SAAiC;AAChE,QAAO,QAAQ,MAAM,MAAM;EACzB,MAAM,MAAM,EAAE,IAAI,aAAa;EAC/B,MAAM,QAAQ,EAAE,MAAM,aAAa;AAInC,MAAI,QAAQ,iBACV,QAAO,UAAU;AAInB,MAAI,QAAQ,2BACV,QAAO;AAIT,MAAI,QAAQ,aACV,QAAO,UAAU,UAAU,UAAU,UAAU,UAAU;AAG3D,SAAO;GACP;;;AAQJ,MAAa,0BAA0B,MAAU,KAAK;;AAGtD,MAAM,yBAAyB;;;;;;;;;AAU/B,eAAe,sBACb,QACA,WACA,SACA,WACiB;CACjB,MAAM,UAAU,IAAI,aAAa;CACjC,MAAM,MAAM,MAAM,OAAO,OAAO,UAC9B,OACA,QAAQ,OAAO,OAAO,EACtB;EAAE,MAAM;EAAQ,MAAM;EAAW,EACjC,OACA,CAAC,OAAO,CACT;CACD,MAAM,OAAO,QAAQ,OAAO,GAAG,UAAU,GAAG,QAAQ,GAAG,YAAY;CACnE,MAAM,YAAY,MAAM,OAAO,OAAO,KAAK,QAAQ,KAAK,KAAK;AAC7D,QAAO,KAAK,OAAO,aAAa,GAAG,IAAI,WAAW,UAAU,CAAC,CAAC;;;;;;;;;;;;AAoBhE,eAAe,qBACb,QACA,WACA,SACA,WACA,WACA,gBAAwB,yBACc;AACtC,KAAI;EAEF,MAAM,eAAe,OAAO,SAAS,WAAW,GAAG;AACnD,MAAI,OAAO,MAAM,aAAa,CAC5B,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAuB;EAIxD,MAAM,MAAM,KAAK,MAAM,KAAK,KAAK,GAAG,IAAK;AAGzC,MAAI,eAAe,MAAM,uBACvB,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;AAI5C,MAAI,MAAM,eAAe,cACvB,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;EAG5C,MAAM,WAAW,MAAM,sBACrB,QACA,WACA,SACA,UACD;AAED,MAAI,SAAS,WAAW,UAAU,OAChC,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;EAE5C,IAAI,SAAS;AACb,OAAK,IAAI,IAAI,GAAG,IAAI,SAAS,QAAQ,IACnC,WAAU,SAAS,WAAW,EAAE,GAAG,UAAU,WAAW,EAAE;AAE5D,MAAI,WAAW,EACb,QAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;AAE5C,SAAO,EAAE,OAAO,MAAM;UACf,OAAO;AACd,UAAQ,KAAK,0CAA0C,MAAM;AAC7D,SAAO;GAAE,OAAO;GAAO,QAAQ;GAAW;;;;;;;;;;;;;;;;;;AAmB9C,eAAsB,iBACpB,QACA,WACA,SACiC;AACjC,KAAI,CAAC,OACH,OAAM,IAAI,MAAM,+CAA+C;AAEjE,KAAI,CAAC,UACH,OAAM,IAAI,MAAM,kDAAkD;AAEpE,KAAI,CAAC,QACH,OAAM,IAAI,MAAM,gDAAgD;AAIlE,KAAI,UAAU,SAAS,IAAI,CACzB,OAAM,IAAI,MAAM,kCAAkC;AAEpD,KAAI,QAAQ,SAAS,IAAI,CACvB,OAAM,IAAI,MAAM,gCAAgC;CAGlD,MAAM,YAAY,KAAK,MAAM,KAAK,KAAK,GAAG,IAAK,CAAC,UAAU;CAC1D,MAAM,YAAY,MAAM,sBACtB,QACA,WACA,SACA,UACD;AACD,QAAO;EACL,gBAAgB;EAChB,cAAc;EACd,eAAe;EACf,kBAAkB;EACnB;;;;;;AAoDH,SAAgB,iCAA0D;AACxE,OAAM,IAAI,MACR,saAMD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAkCH,SAAgB,+BACd,QACA,SACoB;AACpB,KAAI,CAAC,OACH,OAAM,IAAI,MAAM,wDAAwD;CAG1E,MAAM,SAAS,SAAS,UAAU;CAClC,MAAM,qBAAqB,SAAS;AAEpC,QAAO,OAAO,OAAgC,SAAc;EAC1D,MAAM,YAAY,MAAM,QAAQ,IAAI,eAAe;EACnD,MAAM,UAAU,MAAM,QAAQ,IAAI,aAAa;EAC/C,MAAM,YAAY,MAAM,QAAQ,IAAI,cAAc;EAClD,MAAM,YAAY,MAAM,QAAQ,IAAI,iBAAiB;AAErD,MAAI,CAAC,aAAa,CAAC,WAAW,CAAC,aAAa,CAAC,WAAW;AACtD,wBAAqB,OAAO,kBAAkB;AAC9C,UAAO;;EAGT,MAAM,SAAS,MAAM,qBACnB,QACA,WACA,SACA,WACA,WACA,OACD;AAED,MAAI,CAAC,OAAO,OAAO;AACjB,wBAAqB,OAAO,OAAO,OAAO;AAC1C,UAAO;;AAGT,SAAO;GAAE;GAAW;GAAS,eAAe;GAAM;;;;;;;;AAStD,SAAgB,gCACd,kBACoB;AACpB,QAAO,OAAO,OAAgC,SAAc;EAE1D,MAAM,aAAa,MAAM,GAAG,MAC1B,gDACD;AACD,MAAI,CAAC,WACH,QAAO;EAGT,MAAM,GAAG,WAAW,cAAc;AAElC,MAAI,WACF,QAAO;GACL,WAAW;GACX,SAAS;GACV;AAKH,SAAO;GACL,WAAW;GACX,SAAS;GACV;;;;;;;;;AAUL,SAAgB,4BACd,WACA,SACoB;AACpB,QAAO,aAAa;EAAE;EAAW;EAAS"}