makecoder 2.0.71 → 2.0.75
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cc.mjs +2455 -2428
- package/dist/coder.js +42 -84
- package/dist/gemini/{chunk-APAUY2EN.js → chunk-5NLMIA5F.js} +2 -2
- package/dist/gemini/{chunk-BO5N4YCB.js → chunk-ERSD2JN4.js} +2 -2
- package/dist/gemini/{chunk-ECIECMFI.js → chunk-RINXQT6K.js} +2 -2
- package/dist/gemini/{chunk-LDCK4LC4.js → chunk-YYIHO5TB.js} +2 -2
- package/dist/gemini/{core-WBV2NJVB.js → core-QJQCNUBM.js} +1 -1
- package/dist/gemini/{devtoolsService-BWVPXV65.js → devtoolsService-6N7SRZYV.js} +2 -2
- package/dist/gemini/{devtoolsService-PCTHRK6I.js → devtoolsService-F37ICBM5.js} +2 -2
- package/dist/gemini/{dist-S65OG37M.js → dist-RUT7TWHF.js} +1 -1
- package/dist/gemini/gemini.js +4 -4
- package/dist/gemini/{interactiveCli-ICTGENKL.js → interactiveCli-F5Z22JJJ.js} +2 -2
- package/dist/gemini/{interactiveCli-E47XD2XX.js → interactiveCli-T7HAFJKN.js} +2 -2
- package/dist/gemini/{oauth2-provider-KNMGGRK6.js → oauth2-provider-224QQNUV.js} +1 -1
- package/dist/gemini/{oauth2-provider-OXLPSPT7.js → oauth2-provider-BAYGJHVR.js} +1 -1
- package/dist/vendor/seccomp/arm64/apply-seccomp +0 -0
- package/dist/vendor/seccomp/x64/apply-seccomp +0 -0
- package/package.json +9 -4
- /package/dist/gemini/{tree-sitter-CZHFXNZB.js → tree-sitter-JHZH2GQM.js} +0 -0
- /package/dist/gemini/{tree-sitter-bash-RYGED55L.js → tree-sitter-bash-KH6DKFBJ.js} +0 -0
|
@@ -991,7 +991,7 @@ ${s}
|
|
|
991
991
|
|
|
992
992
|
... [${u.toLocaleString()} characters omitted] ...
|
|
993
993
|
|
|
994
|
-
${c}`}var h_r="tool-outputs";async function OD(t,e,r,n,o){let s=rp(e).toLowerCase(),c=rp(r.toString()).toLowerCase(),u=c.startsWith(s)?`${c}.txt`:`${s}_${c}.txt`,d=Eu.join(n,h_r);if(o){let a=rp(o);d=Eu.join(d,`session-${a}`)}let l=Eu.join(d,u);return await Fw.mkdir(d,{recursive:!0}),await Fw.writeFile(l,t),{outputFile:l}}var $f=["run_shell_command","ShellTool"];async function TXe(t){if(vge.isAbsolute(t))try{return await VQ.promises.access(t,VQ.constants.X_OK),t}catch{return}let e=(process.env.PATH||"").split(vge.delimiter),r=_Xe.platform()==="win32"?[".exe",".cmd",".bat",""]:[""];for(let n of e)for(let o of r){let s=vge.join(n,t+o);try{return await VQ.promises.access(s,VQ.constants.X_OK),s}catch{continue}}}var pS=null,HQ=null,Qw=null,$Q=class extends Error{constructor(e){super(`Failed to initialize bash parser: ${e.message}`,{cause:e}),this.name="ShellParserInitializationError"}};function m_r(t){return t instanceof Error?t:typeof t=="string"?new Error(t):new Error("Unknown tree-sitter initialization error",{cause:t})}async function y_r(){try{Qw=null;let[t,e]=await Promise.all([Age(()=>import("./tree-sitter-
|
|
994
|
+
${c}`}var h_r="tool-outputs";async function OD(t,e,r,n,o){let s=rp(e).toLowerCase(),c=rp(r.toString()).toLowerCase(),u=c.startsWith(s)?`${c}.txt`:`${s}_${c}.txt`,d=Eu.join(n,h_r);if(o){let a=rp(o);d=Eu.join(d,`session-${a}`)}let l=Eu.join(d,u);return await Fw.mkdir(d,{recursive:!0}),await Fw.writeFile(l,t),{outputFile:l}}var $f=["run_shell_command","ShellTool"];async function TXe(t){if(vge.isAbsolute(t))try{return await VQ.promises.access(t,VQ.constants.X_OK),t}catch{return}let e=(process.env.PATH||"").split(vge.delimiter),r=_Xe.platform()==="win32"?[".exe",".cmd",".bat",""]:[""];for(let n of e)for(let o of r){let s=vge.join(n,t+o);try{return await VQ.promises.access(s,VQ.constants.X_OK),s}catch{continue}}}var pS=null,HQ=null,Qw=null,$Q=class extends Error{constructor(e){super(`Failed to initialize bash parser: ${e.message}`,{cause:e}),this.name="ShellParserInitializationError"}};function m_r(t){return t instanceof Error?t:typeof t=="string"?new Error(t):new Error("Unknown tree-sitter initialization error",{cause:t})}async function y_r(){try{Qw=null;let[t,e]=await Promise.all([Age(()=>import("./tree-sitter-JHZH2GQM.js"),"web-tree-sitter/tree-sitter.wasm"),Age(()=>import("./tree-sitter-bash-KH6DKFBJ.js"),"tree-sitter-bash/tree-sitter-bash.wasm")]);await hge.init({wasmBinary:t}),pS=await fge.load(e)}catch(t){pS=null;let e=m_r(t),r=e instanceof $Q?e:new $Q(e);throw Qw=r,r}}async function zf(){HQ||(HQ=y_r().catch(t=>{HQ=null,F.debug("Failed to initialize shell parsers:",t)})),await HQ}var CXe="__GCLI_POWERSHELL_COMMAND__",A_r=1e3*1e3,E_r=Buffer.from(`
|
|
995
995
|
$ErrorActionPreference = 'Stop'
|
|
996
996
|
$commandText = $env:${CXe}
|
|
997
997
|
if ([string]::IsNullOrEmpty($commandText)) {
|
|
@@ -2839,7 +2839,7 @@ When adding a memory, route it to the right store:
|
|
|
2839
2839
|
# Insufficient context
|
|
2840
2840
|
If you find that you have insufficient context to read or modify the memories as described,
|
|
2841
2841
|
reply with what you need, and exit. Do not search the codebase for the missing context.
|
|
2842
|
-
`.trim();return{kind:"local",name:"save_memory",displayName:"Memory Manager",description:"Writes and reads memory, preferences or facts across ALL future sessions. Use this for recurring instructions like coding styles or tool aliases.",inputConfig:{inputSchema:{type:"object",properties:{request:{type:"string",description:'The memory operation to perform. Examples: "Remember that I prefer tabs over spaces", "Clean up stale memories", "De-duplicate my memories", "Organize my memories".'}},required:["request"]}},outputConfig:{outputName:"result",description:"A summary of the memory operations performed.",schema:KAi},modelConfig:{model:Rw},toolConfig:{tools:[Ai,Cl,Tl,kw,Sl,yi,Co]},get promptConfig(){return{systemPrompt:n(),query:`${r()}\${request}`}},runConfig:{maxTimeMinutes:5,maxTurns:10}}};var xf=class t{static MAX_AUTH_RETRIES=2;authRetryCount=0;async shouldRetryWithHeaders(e,r){if(r.status===401||r.status===403)return this.authRetryCount>=t.MAX_AUTH_RETRIES?void 0:(this.authRetryCount++,this.headers());this.authRetryCount=0}async initialize(){}};var Ndr=6e4;async function Eb(t){if(t.startsWith("$$")||t.startsWith("!!"))return t.slice(1);if(t.startsWith("$")){let e=t.slice(1),r=process.env[e];if(r===void 0||r==="")throw new Error(`Environment variable '${e}' is not set or is empty. Please set it before using this agent.`);return F.debug(`[AuthValueResolver] Resolved env var: ${e}`),r}if(t.startsWith("!")){let e=t.slice(1).trim();if(!e)throw new Error("Empty command in auth value. Expected format: !command");F.debug("[AuthValueResolver] Executing command for auth value");let r=gA();try{let{stdout:n}=await np(r.executable,[...r.argsPrefix,e],{signal:AbortSignal.timeout(Ndr),windowsHide:!0}),o=n.trim();if(!o)throw new Error(`Command '${e}' returned empty output`);return o}catch(n){throw n instanceof Error&&n.name==="AbortError"?new Error(`Command '${e}' timed out after ${Ndr/1e3} seconds`):n}}return t}function Ddr(t){return t.startsWith("$")||t.startsWith("!")}var XAi="X-API-Key",Yue=class extends xf{constructor(r){super();this.config=r;this.headerName=r.name??XAi}type="apiKey";resolvedKey;headerName;async initialize(){Ddr(this.config.key)?(this.resolvedKey=await Eb(this.config.key),F.debug(`[ApiKeyAuthProvider] Resolved API key from: ${this.config.key.startsWith("$")?"env var":"command"}`)):this.resolvedKey=this.config.key}async headers(){if(!this.resolvedKey)throw new Error("ApiKeyAuthProvider not initialized. Call initialize() first.");return{[this.headerName]:this.resolvedKey}}async shouldRetryWithHeaders(r,n){if(n.status!==401&&n.status!==403){this.authRetryCount=0;return}if(!(!this.config.key.startsWith("!")||this.config.key.startsWith("!!"))&&!(this.authRetryCount>=xf.MAX_AUTH_RETRIES))return this.authRetryCount++,F.debug("[ApiKeyAuthProvider] Re-resolving API key after auth failure"),this.resolvedKey=await Eb(this.config.key),this.headers()}};var Jue=class extends xf{constructor(r){super();this.config=r}type="http";resolvedToken;resolvedUsername;resolvedPassword;resolvedValue;async initialize(){let r=this.config;"token"in r?this.resolvedToken=await Eb(r.token):"username"in r?(this.resolvedUsername=await Eb(r.username),this.resolvedPassword=await Eb(r.password)):this.resolvedValue=await Eb(r.value),F.debug(`[HttpAuthProvider] Initialized with scheme: ${this.config.scheme}`)}async headers(){let r=this.config;if("token"in r){if(!this.resolvedToken)throw new Error("HttpAuthProvider not initialized");return{Authorization:`Bearer ${this.resolvedToken}`}}if("username"in r){if(!this.resolvedUsername||!this.resolvedPassword)throw new Error("HttpAuthProvider not initialized");return{Authorization:`Basic ${Buffer.from(`${this.resolvedUsername}:${this.resolvedPassword}`).toString("base64")}`}}if(!this.resolvedValue)throw new Error("HttpAuthProvider not initialized");return{Authorization:`${r.scheme} ${this.resolvedValue}`}}async shouldRetryWithHeaders(r,n){if(n.status===401||n.status===403){if(this.authRetryCount>=xf.MAX_AUTH_RETRIES)return;F.debug("[HttpAuthProvider] Re-resolving values after auth failure"),await this.initialize()}return super.shouldRetryWithHeaders(r,n)}};var Ldr=Fe(Wo(),1);var ow=class extends Error{constructor(e){super(e),this.name="ResourceMismatchError"}},gN=5*60*1e3,As=class{static buildWellKnownUrls(e,r=!1){let n=new URL(e),o=`${n.protocol}//${n.host}`,s=r?"":n.pathname.replace(/\/$/,"");return{protectedResource:new URL(`/.well-known/oauth-protected-resource${s}`,o).toString(),authorizationServer:new URL(`/.well-known/oauth-authorization-server${s}`,o).toString()}}static async fetchProtectedResourceMetadata(e){try{let r=await fetch(e);return r.ok?await r.json():null}catch(r){return F.debug(`Failed to fetch protected resource metadata from ${e}: ${Se(r)}`),null}}static async fetchAuthorizationServerMetadata(e){try{let r=await fetch(e);return r.ok?await r.json():null}catch(r){return F.debug(`Failed to fetch authorization server metadata from ${e}: ${Se(r)}`),null}}static metadataToOAuthConfig(e){return{authorizationUrl:e.authorization_endpoint,issuer:e.issuer,tokenUrl:e.token_endpoint,scopes:e.scopes_supported||[],registrationUrl:e.registration_endpoint}}static async discoverAuthorizationServerMetadata(e){let r=new URL(e),n=`${r.protocol}//${r.host}`,o=[];r.pathname!=="/"&&(o.push(new URL(`/.well-known/oauth-authorization-server${r.pathname}`,n).toString()),o.push(new URL(`/.well-known/openid-configuration${r.pathname}`,n).toString()),o.push(new URL(`${r.pathname}/.well-known/openid-configuration`,n).toString())),o.push(new URL("/.well-known/oauth-authorization-server",n).toString()),o.push(new URL("/.well-known/openid-configuration",n).toString());for(let s of o){let c=await this.fetchAuthorizationServerMetadata(s);if(c)return c}return F.debug(`Metadata discovery failed for authorization server ${e}`),null}static async discoverOAuthConfig(e){try{let r=this.buildWellKnownUrls(e),n=await this.fetchProtectedResourceMetadata(r.protectedResource);if(!n){let s=new URL(e);if(s.pathname&&s.pathname!=="/"){let c=this.buildWellKnownUrls(e,!0);n=await this.fetchProtectedResourceMetadata(c.protectedResource)}}if(n){let s=this.buildResourceParameter(e);if(!this.isEquivalentResourceIdentifier(n.resource,s))throw new ow(`Protected resource ${n.resource} does not match expected ${s}`)}if(n?.authorization_servers?.length){let s=n.authorization_servers[0],c=await this.discoverAuthorizationServerMetadata(s);if(c){let u=this.metadataToOAuthConfig(c);return c.registration_endpoint&&F.log("Dynamic client registration is supported at:",c.registration_endpoint),u}}F.debug(`Trying OAuth discovery fallback at ${e}`);let o=await this.discoverAuthorizationServerMetadata(e);if(o){let s=this.metadataToOAuthConfig(o);return o.registration_endpoint&&F.log("Dynamic client registration is supported at:",o.registration_endpoint),s}return null}catch(r){if(r instanceof ow)throw r;return F.debug(`Failed to discover OAuth configuration: ${Se(r)}`),null}}static parseWWWAuthenticateHeader(e){let r=e.match(/resource_metadata="([^"]+)"/);return r?r[1]:null}static async discoverOAuthFromWWWAuthenticate(e,r){let n=this.parseWWWAuthenticateHeader(e);if(!n)return null;let o=await this.fetchProtectedResourceMetadata(n);if(o&&r){let u=this.buildResourceParameter(r);if(!this.isEquivalentResourceIdentifier(o.resource,u))throw new ow(`Protected resource ${o.resource} does not match expected ${u}`)}if(!o?.authorization_servers?.length)return null;let s=o.authorization_servers[0],c=await this.discoverAuthorizationServerMetadata(s);return c?this.metadataToOAuthConfig(c):null}static extractBaseUrl(e){let r=new URL(e);return`${r.protocol}//${r.host}`}static isSSEEndpoint(e){return e.includes("/sse")||!e.includes("/mcp")}static buildResourceParameter(e){let r=new URL(e);return`${r.protocol}//${r.host}${r.pathname}`}static isEquivalentResourceIdentifier(e,r){let n=o=>{try{return this.buildResourceParameter(o)}catch{return o}};return n(e)===n(r)}static parseTokenExpiry(e){try{let r=JSON.parse(Buffer.from(e.split(".")[1],"base64").toString());if(r&&typeof r.exp=="number")return r.exp*1e3}catch(r){F.error("Failed to parse ID token for expiry time with error:",r)}}};var Mdr=/^(.*\.)?run\.app$/,ZAi=[/^.+\.googleapis\.com$/,Mdr],Kue=class extends xf{constructor(r,n){super();this.config=r;if(!n)throw new Error("targetUrl must be provided to GoogleCredentialsAuthProvider to determine token audience.");let o=new URL(n).hostname;if(Mdr.test(o)&&(this.useIdToken=!0),this.audience=o,!this.useIdToken&&!ZAi.some(u=>u.test(o)))throw new Error(`Host "${o}" is not an allowed host for Google Credential provider.`);let c=this.config.scopes&&this.config.scopes.length>0?this.config.scopes:["https://www.googleapis.com/auth/cloud-platform"];this.auth=new Ldr.GoogleAuth({scopes:c})}type="google-credentials";auth;useIdToken=!1;audience;cachedToken;tokenExpiryTime;async initialize(){}async headers(){if(this.cachedToken&&this.tokenExpiryTime&&Date.now()<this.tokenExpiryTime-gN)return{Authorization:`Bearer ${this.cachedToken}`};if(this.cachedToken=void 0,this.tokenExpiryTime=void 0,this.useIdToken)try{let n=await(await this.auth.getIdTokenClient(this.audience)).idTokenProvider.fetchIdToken(this.audience),o=As.parseTokenExpiry(n);return o&&(this.tokenExpiryTime=o,this.cachedToken=n),{Authorization:`Bearer ${n}`}}catch(r){let n=`Failed to get ADC ID token: ${r instanceof Error?r.message:String(r)}`;throw F.error(n,r),new Error(n)}try{let r=await this.auth.getClient(),n=await r.getAccessToken();if(n.token){this.cachedToken=n.token;let o=r.credentials;return o.expiry_date&&(this.tokenExpiryTime=o.expiry_date),{Authorization:`Bearer ${n.token}`}}throw new Error("Failed to retrieve ADC access token.")}catch(r){let n=`Failed to get ADC access token: ${r instanceof Error?r.message:String(r)}`;throw F.error(n,r),new Error(n)}}async shouldRetryWithHeaders(r,n){if(n.status!==401&&n.status!==403){this.authRetryCount=0;return}if(!(this.authRetryCount>=xf.MAX_AUTH_RETRIES))return this.authRetryCount++,F.debug("[GoogleCredentialsAuthProvider] Re-fetching token after auth failure"),this.cachedToken=void 0,this.tokenExpiryTime=void 0,this.headers()}};var _b=class t{static async create(e){let{agentName:r,authConfig:n,agentCard:o}=e;if(!n)return o?.securitySchemes&&Object.keys(o.securitySchemes).length>0,void 0;switch(n.type){case"google-credentials":{let s=new Kue(n,e.targetUrl);return await s.initialize(),s}case"apiKey":{let s=new Yue(n);return await s.initialize(),s}case"http":{let s=new Jue(n);return await s.initialize(),s}case"oauth2":{let{OAuth2AuthProvider:s}=await import("./oauth2-provider-OXLPSPT7.js"),c=new s(n,e.agentName??"unknown",o,e.agentCardUrl);return await c.initialize(),c}case"openIdConnect":throw new Error("openIdConnect auth provider not yet implemented");default:{let s=n;throw new Error(`Unknown auth type: ${s.type}`)}}}static async createFromConfig(e,r){return await t.create({authConfig:e,agentName:r})}static validateAuthConfig(e,r){if(!r||Object.keys(r).length===0)return{valid:!0};let n=Object.keys(r);if(!e)return{valid:!1,diff:{requiredSchemes:n,configuredType:void 0,missingConfig:["Authentication is required but not configured"]}};let o=t.findMatchingScheme(e,r);return o.matched?{valid:!0}:{valid:!1,diff:{requiredSchemes:n,configuredType:e.type,missingConfig:o.missingConfig}}}static findMatchingScheme(e,r){let n=[];for(let[o,s]of Object.entries(r))switch(s.type){case"apiKey":if(e.type==="apiKey")return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires apiKey authentication`);break;case"http":if(e.type==="http"){if(e.scheme.toLowerCase()===s.scheme.toLowerCase())return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires HTTP ${s.scheme} authentication, but ${e.scheme} was configured`)}else{if(e.type==="google-credentials"&&s.scheme.toLowerCase()==="bearer")return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires HTTP ${s.scheme} authentication`)}break;case"oauth2":if(e.type==="oauth2")return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires OAuth 2.0 authentication`);break;case"openIdConnect":if(e.type==="openIdConnect")return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires OpenID Connect authentication`);break;case"mutualTLS":n.push(`Scheme '${o}' requires mTLS authentication (not yet supported)`);break;default:{let c=s;n.push(`Unknown security scheme type: ${c.type}`)}}return{matched:!1,missingConfig:n}}static describeRequiredAuth(e){let r=[];for(let[n,o]of Object.entries(e))switch(o.type){case"apiKey":r.push(`API Key (${n}): Send ${o.name} in ${o.in}`);break;case"http":r.push(`HTTP ${o.scheme} (${n})`);break;case"oauth2":r.push(`OAuth 2.0 (${n})`);break;case"openIdConnect":r.push(`OpenID Connect (${n})`);break;case"mutualTLS":r.push(`Mutual TLS (${n})`);break;default:{let s=o;r.push(`Unknown (${n}): ${s.type}`)}}return r.join(" OR ")}};var hm=class extends Error{userMessage;agentName;constructor(e,r,n,o){super(r,o),this.name="A2AAgentError",this.agentName=e,this.userMessage=n}},AVe=class extends hm{constructor(e,r){let n=`Agent card not found at ${r} (HTTP 404)`,o=`Agent card not found (404) at ${r}. Verify the agent_card_url in your agent definition.`;super(e,n,o),this.name="AgentCardNotFoundError"}},Xue=class extends hm{statusCode;constructor(e,r,n){let o=n===401?"Unauthorized":"Forbidden",s=`Agent card request returned ${n} ${o} for ${r}`,c=`Authentication failed (${n} ${o}) at ${r}. Check the "auth" configuration in your agent definition.`;super(e,s,c),this.name="AgentCardAuthError",this.statusCode=n}},Zue=class extends hm{requiredAuth;missingFields;constructor(e,r,n){let o=`Agent "${e}" requires authentication but none is configured`,s=`Agent requires ${r} but no auth is configured. Missing: ${n.join(", ")}`;super(e,o,s),this.name="AgentAuthConfigMissingError",this.requiredAuth=r,this.missingFields=n}},ede=class extends hm{constructor(e,r,n){let o=n instanceof Error?n.message:String(n),s=`Failed to connect to agent "${e}" at ${r}: ${o}`,c=`Connection failed for ${r}: ${o}`;super(e,s,c,{cause:n}),this.name="AgentConnectionError"}};function eEi(t){return typeof t=="object"&&t!==null}function tEi(t){let e=[],r=t,n=0,o=10;for(;r&&n<o;){if(eEi(r)){let s=r;r instanceof Error?e.push(r.message):typeof s.message=="string"&&e.push(s.message),typeof s.code=="string"&&e.push(s.code),typeof s.status=="number"?e.push(String(s.status)):typeof s.statusCode=="number"&&e.push(String(s.statusCode)),r=s.cause}else if(typeof r=="string"){e.push(r);break}else{e.push(String(r));break}n++}return e.join(" ")}function Bdr(t,e,r){let n=tEi(r);return/\b(ECONNREFUSED|ENOTFOUND|EHOSTUNREACH|ETIMEDOUT)\b/i.test(n)?new ede(t,e,r):/\b404\b|\bnot[\s_-]?found\b/i.test(n)?new AVe(t,e):/\b401\b|unauthorized/i.test(n)?new Xue(t,e,401):/\b403\b|forbidden/i.test(n)?new Xue(t,e,403):new ede(t,e,r)}function EVe(t){return`${t.name}-config`}var tde=class{constructor(e){this.config=e}agents=new Map;allDefinitions=new Map;builtInAgents=new Set;async initialize(){_e.on("model-changed",this.onModelChanged),await this.loadAgents()}isBuiltIn(e){return this.builtInAgents.has(e)}onModelChanged=()=>{this.refreshAgents("local").catch(e=>{F.error("[AgentRegistry] Failed to refresh agents on model change:",e)})};async reload(){this.config.getA2AClientManager()?.clearCache(),await this.config.reloadAgents(),this.agents.clear(),this.allDefinitions.clear(),await this.loadAgents(),_e.emitAgentsRefreshed()}async acknowledgeAgent(e){let r=this.config.getAcknowledgedAgentsService(),n=this.config.getProjectRoot();e.metadata?.hash&&(await r.acknowledge(n,e.name,e.metadata.hash),await this.registerAgent(e),_e.emitAgentsRefreshed())}dispose(){_e.off("model-changed",this.onModelChanged)}async loadAgents(){if(this.agents.clear(),this.allDefinitions.clear(),this.loadBuiltInAgents(),!this.config.isAgentsEnabled())return;let e=er.getUserAgentsDir(),r=await gVe(e);for(let s of r.errors)F.warn(`[AgentRegistry] Error loading user agent: ${s.message}`),_e.emitFeedback("error",`Agent loading error: ${s.message}`);await Promise.allSettled(r.agents.map(async s=>{try{await this.registerAgent(s)}catch(c){F.warn(`[AgentRegistry] Error registering user agent "${s.name}":`,c),_e.emitFeedback("error",`Error registering user agent "${s.name}": ${c instanceof Error?c.message:String(c)}`)}}));let n=this.config.getFolderTrust(),o=this.config.isTrustedFolder();if(!n||o){let s=this.config.storage.getProjectAgentsDir(),c=await gVe(s);for(let p of c.errors)_e.emitFeedback("error",`Agent loading error: ${p.message}`);let u=this.config.getAcknowledgedAgentsService(),d=this.config.getProjectRoot(),l=[],a=[];for(let p of c.agents){if(p.kind==="remote"&&(p.metadata||(p.metadata={}),p.metadata.hash=p.agentCardUrl??(p.agentCardJson?Udr.createHash("sha256").update(p.agentCardJson).digest("hex"):void 0)),!p.metadata?.hash){a.push(p);continue}await u.isAcknowledged(d,p.name,p.metadata.hash)?a.push(p):l.push(p)}l.length>0&&_e.emitAgentsDiscovered(l),await Promise.allSettled(a.map(async p=>{try{await this.registerAgent(p)}catch(f){F.warn(`[AgentRegistry] Error registering project agent "${p.name}":`,f),_e.emitFeedback("error",`Error registering project agent "${p.name}": ${f instanceof Error?f.message:String(f)}`)}}))}else _e.emitFeedback("info","Skipping project agents due to untrusted folder. To enable, ensure that the project root is trusted.");for(let s of this.config.getExtensions())s.isActive&&s.agents&&await Promise.allSettled(s.agents.map(async c=>{try{await this.registerAgent(c)}catch(u){F.warn(`[AgentRegistry] Error registering extension agent "${c.name}":`,u),_e.emitFeedback("error",`Error registering extension agent "${c.name}": ${u instanceof Error?u.message:String(u)}`)}}));this.config.getDebugMode()&&F.log(`[AgentRegistry] Loaded with ${this.agents.size} agents.`)}loadBuiltInAgents(){let e=Sce(this.config);this.builtInAgents.add(e.name),this.registerLocalAgent(e);let r=Rdr(this.config);this.builtInAgents.add(r.name),this.registerLocalAgent(r);let n=Pdr(this.config);if(this.builtInAgents.add(n.name),this.registerLocalAgent(n),this.config.getBrowserAgentConfig().enabled){let s=Wue(this.config);this.builtInAgents.add(s.name),this.registerLocalAgent(s)}if(this.config.isMemoryManagerEnabled()){this.registerLocalAgent(kdr(this.config));try{let s=er.getGlobalGeminiDir();this.config.getWorkspaceContext().addDirectory(s)}catch(s){F.warn("[AgentRegistry] Could not add global .gemini directory to workspace:",s)}}}async refreshAgents(e="all"){this.loadBuiltInAgents(),await Promise.allSettled(Array.from(this.agents.values()).map(async r=>{(e==="all"||r.kind===e)&&await this.registerAgent(r)}))}async registerAgent(e){e.kind==="local"?this.registerLocalAgent(e):e.kind==="remote"&&await this.registerRemoteAgent(e)}registerLocalAgent(e){if(e.kind!=="local")return;if(!e.name||!e.description){F.warn("[AgentRegistry] Skipping invalid agent definition. Missing name or description.");return}this.allDefinitions.set(e.name,e);let r=this.config.getAgentsSettings().overrides?.[e.name];if(!this.isAgentEnabled(e,r)){this.config.getDebugMode()&&F.log(`[AgentRegistry] Skipping disabled agent '${e.name}'`);return}this.agents.has(e.name)&&this.config.getDebugMode()&&F.log(`[AgentRegistry] Overriding agent '${e.name}'`);let n=this.applyOverrides(e,r);this.agents.set(n.name,n),this.registerModelConfigs(n),this.addAgentPolicy(n)}addAgentPolicy(e){let r=this.config.getPolicyEngine();if(r){if(r.hasRuleForTool(e.name,!0)){this.config.getDebugMode()&&F.log(`[AgentRegistry] User policy exists for '${e.name}', skipping dynamic registration.`);return}r.removeRulesForTool(e.name,"AgentRegistry (Dynamic)"),r.addRule({toolName:e.name,decision:e.kind==="local"?"allow":"ask_user",priority:Xj,source:"AgentRegistry (Dynamic)"})}}isAgentEnabled(e,r){let o=!(e.experimental===!0);return r&&r.enabled!==void 0&&(o=r.enabled),o}async registerRemoteAgent(e){if(e.kind!=="remote")return;if(!e.name){F.warn("[AgentRegistry] Skipping invalid agent definition. Missing name.");return}this.allDefinitions.set(e.name,e);let r=this.config.getAgentsSettings().overrides?.[e.name];if(!this.isAgentEnabled(e,r)){this.config.getDebugMode()&&F.log(`[AgentRegistry] Skipping disabled remote agent '${e.name}'`);return}this.agents.has(e.name)&&this.config.getDebugMode()&&F.log(`[AgentRegistry] Overriding agent '${e.name}'`);let n=e;n.originalDescription===void 0&&(n.originalDescription=n.description);try{let o=this.config.getA2AClientManager();if(!o){F.warn(`[AgentRegistry] Skipping remote agent '${e.name}': A2AClientManager is not available.`);return}let s=Uue(n),c;if(e.auth){let p=await _b.create({authConfig:e.auth,agentName:e.name,targetUrl:s,agentCardUrl:n.agentCardUrl});if(!p)throw new Error(`Failed to create auth provider for agent '${e.name}'`);c=p}let u=await o.loadAgent(n.name,Bue(n),c);if(u.securitySchemes){let p=_b.validateAuthConfig(e.auth,u.securitySchemes);if(!p.valid&&p.diff){let f=_b.describeRequiredAuth(u.securitySchemes),g=new Zue(e.name,f,p.diff.missingConfig);_e.emitFeedback("warning",`[${e.name}] Agent requires authentication: ${f}`),F.warn(`[AgentRegistry] ${g.message}`)}}let d=n.originalDescription,l=u.description,a=[];if(d?.trim()&&a.push(`User Description: ${d.trim()}`),l?.trim()&&a.push(`Agent Description: ${l.trim()}`),u.skills&&u.skills.length>0){let p=u.skills.map(f=>`${f.name}: ${f.description||"No description provided"}`).join(`
|
|
2842
|
+
`.trim();return{kind:"local",name:"save_memory",displayName:"Memory Manager",description:"Writes and reads memory, preferences or facts across ALL future sessions. Use this for recurring instructions like coding styles or tool aliases.",inputConfig:{inputSchema:{type:"object",properties:{request:{type:"string",description:'The memory operation to perform. Examples: "Remember that I prefer tabs over spaces", "Clean up stale memories", "De-duplicate my memories", "Organize my memories".'}},required:["request"]}},outputConfig:{outputName:"result",description:"A summary of the memory operations performed.",schema:KAi},modelConfig:{model:Rw},toolConfig:{tools:[Ai,Cl,Tl,kw,Sl,yi,Co]},get promptConfig(){return{systemPrompt:n(),query:`${r()}\${request}`}},runConfig:{maxTimeMinutes:5,maxTurns:10}}};var xf=class t{static MAX_AUTH_RETRIES=2;authRetryCount=0;async shouldRetryWithHeaders(e,r){if(r.status===401||r.status===403)return this.authRetryCount>=t.MAX_AUTH_RETRIES?void 0:(this.authRetryCount++,this.headers());this.authRetryCount=0}async initialize(){}};var Ndr=6e4;async function Eb(t){if(t.startsWith("$$")||t.startsWith("!!"))return t.slice(1);if(t.startsWith("$")){let e=t.slice(1),r=process.env[e];if(r===void 0||r==="")throw new Error(`Environment variable '${e}' is not set or is empty. Please set it before using this agent.`);return F.debug(`[AuthValueResolver] Resolved env var: ${e}`),r}if(t.startsWith("!")){let e=t.slice(1).trim();if(!e)throw new Error("Empty command in auth value. Expected format: !command");F.debug("[AuthValueResolver] Executing command for auth value");let r=gA();try{let{stdout:n}=await np(r.executable,[...r.argsPrefix,e],{signal:AbortSignal.timeout(Ndr),windowsHide:!0}),o=n.trim();if(!o)throw new Error(`Command '${e}' returned empty output`);return o}catch(n){throw n instanceof Error&&n.name==="AbortError"?new Error(`Command '${e}' timed out after ${Ndr/1e3} seconds`):n}}return t}function Ddr(t){return t.startsWith("$")||t.startsWith("!")}var XAi="X-API-Key",Yue=class extends xf{constructor(r){super();this.config=r;this.headerName=r.name??XAi}type="apiKey";resolvedKey;headerName;async initialize(){Ddr(this.config.key)?(this.resolvedKey=await Eb(this.config.key),F.debug(`[ApiKeyAuthProvider] Resolved API key from: ${this.config.key.startsWith("$")?"env var":"command"}`)):this.resolvedKey=this.config.key}async headers(){if(!this.resolvedKey)throw new Error("ApiKeyAuthProvider not initialized. Call initialize() first.");return{[this.headerName]:this.resolvedKey}}async shouldRetryWithHeaders(r,n){if(n.status!==401&&n.status!==403){this.authRetryCount=0;return}if(!(!this.config.key.startsWith("!")||this.config.key.startsWith("!!"))&&!(this.authRetryCount>=xf.MAX_AUTH_RETRIES))return this.authRetryCount++,F.debug("[ApiKeyAuthProvider] Re-resolving API key after auth failure"),this.resolvedKey=await Eb(this.config.key),this.headers()}};var Jue=class extends xf{constructor(r){super();this.config=r}type="http";resolvedToken;resolvedUsername;resolvedPassword;resolvedValue;async initialize(){let r=this.config;"token"in r?this.resolvedToken=await Eb(r.token):"username"in r?(this.resolvedUsername=await Eb(r.username),this.resolvedPassword=await Eb(r.password)):this.resolvedValue=await Eb(r.value),F.debug(`[HttpAuthProvider] Initialized with scheme: ${this.config.scheme}`)}async headers(){let r=this.config;if("token"in r){if(!this.resolvedToken)throw new Error("HttpAuthProvider not initialized");return{Authorization:`Bearer ${this.resolvedToken}`}}if("username"in r){if(!this.resolvedUsername||!this.resolvedPassword)throw new Error("HttpAuthProvider not initialized");return{Authorization:`Basic ${Buffer.from(`${this.resolvedUsername}:${this.resolvedPassword}`).toString("base64")}`}}if(!this.resolvedValue)throw new Error("HttpAuthProvider not initialized");return{Authorization:`${r.scheme} ${this.resolvedValue}`}}async shouldRetryWithHeaders(r,n){if(n.status===401||n.status===403){if(this.authRetryCount>=xf.MAX_AUTH_RETRIES)return;F.debug("[HttpAuthProvider] Re-resolving values after auth failure"),await this.initialize()}return super.shouldRetryWithHeaders(r,n)}};var Ldr=Fe(Wo(),1);var ow=class extends Error{constructor(e){super(e),this.name="ResourceMismatchError"}},gN=5*60*1e3,As=class{static buildWellKnownUrls(e,r=!1){let n=new URL(e),o=`${n.protocol}//${n.host}`,s=r?"":n.pathname.replace(/\/$/,"");return{protectedResource:new URL(`/.well-known/oauth-protected-resource${s}`,o).toString(),authorizationServer:new URL(`/.well-known/oauth-authorization-server${s}`,o).toString()}}static async fetchProtectedResourceMetadata(e){try{let r=await fetch(e);return r.ok?await r.json():null}catch(r){return F.debug(`Failed to fetch protected resource metadata from ${e}: ${Se(r)}`),null}}static async fetchAuthorizationServerMetadata(e){try{let r=await fetch(e);return r.ok?await r.json():null}catch(r){return F.debug(`Failed to fetch authorization server metadata from ${e}: ${Se(r)}`),null}}static metadataToOAuthConfig(e){return{authorizationUrl:e.authorization_endpoint,issuer:e.issuer,tokenUrl:e.token_endpoint,scopes:e.scopes_supported||[],registrationUrl:e.registration_endpoint}}static async discoverAuthorizationServerMetadata(e){let r=new URL(e),n=`${r.protocol}//${r.host}`,o=[];r.pathname!=="/"&&(o.push(new URL(`/.well-known/oauth-authorization-server${r.pathname}`,n).toString()),o.push(new URL(`/.well-known/openid-configuration${r.pathname}`,n).toString()),o.push(new URL(`${r.pathname}/.well-known/openid-configuration`,n).toString())),o.push(new URL("/.well-known/oauth-authorization-server",n).toString()),o.push(new URL("/.well-known/openid-configuration",n).toString());for(let s of o){let c=await this.fetchAuthorizationServerMetadata(s);if(c)return c}return F.debug(`Metadata discovery failed for authorization server ${e}`),null}static async discoverOAuthConfig(e){try{let r=this.buildWellKnownUrls(e),n=await this.fetchProtectedResourceMetadata(r.protectedResource);if(!n){let s=new URL(e);if(s.pathname&&s.pathname!=="/"){let c=this.buildWellKnownUrls(e,!0);n=await this.fetchProtectedResourceMetadata(c.protectedResource)}}if(n){let s=this.buildResourceParameter(e);if(!this.isEquivalentResourceIdentifier(n.resource,s))throw new ow(`Protected resource ${n.resource} does not match expected ${s}`)}if(n?.authorization_servers?.length){let s=n.authorization_servers[0],c=await this.discoverAuthorizationServerMetadata(s);if(c){let u=this.metadataToOAuthConfig(c);return c.registration_endpoint&&F.log("Dynamic client registration is supported at:",c.registration_endpoint),u}}F.debug(`Trying OAuth discovery fallback at ${e}`);let o=await this.discoverAuthorizationServerMetadata(e);if(o){let s=this.metadataToOAuthConfig(o);return o.registration_endpoint&&F.log("Dynamic client registration is supported at:",o.registration_endpoint),s}return null}catch(r){if(r instanceof ow)throw r;return F.debug(`Failed to discover OAuth configuration: ${Se(r)}`),null}}static parseWWWAuthenticateHeader(e){let r=e.match(/resource_metadata="([^"]+)"/);return r?r[1]:null}static async discoverOAuthFromWWWAuthenticate(e,r){let n=this.parseWWWAuthenticateHeader(e);if(!n)return null;let o=await this.fetchProtectedResourceMetadata(n);if(o&&r){let u=this.buildResourceParameter(r);if(!this.isEquivalentResourceIdentifier(o.resource,u))throw new ow(`Protected resource ${o.resource} does not match expected ${u}`)}if(!o?.authorization_servers?.length)return null;let s=o.authorization_servers[0],c=await this.discoverAuthorizationServerMetadata(s);return c?this.metadataToOAuthConfig(c):null}static extractBaseUrl(e){let r=new URL(e);return`${r.protocol}//${r.host}`}static isSSEEndpoint(e){return e.includes("/sse")||!e.includes("/mcp")}static buildResourceParameter(e){let r=new URL(e);return`${r.protocol}//${r.host}${r.pathname}`}static isEquivalentResourceIdentifier(e,r){let n=o=>{try{return this.buildResourceParameter(o)}catch{return o}};return n(e)===n(r)}static parseTokenExpiry(e){try{let r=JSON.parse(Buffer.from(e.split(".")[1],"base64").toString());if(r&&typeof r.exp=="number")return r.exp*1e3}catch(r){F.error("Failed to parse ID token for expiry time with error:",r)}}};var Mdr=/^(.*\.)?run\.app$/,ZAi=[/^.+\.googleapis\.com$/,Mdr],Kue=class extends xf{constructor(r,n){super();this.config=r;if(!n)throw new Error("targetUrl must be provided to GoogleCredentialsAuthProvider to determine token audience.");let o=new URL(n).hostname;if(Mdr.test(o)&&(this.useIdToken=!0),this.audience=o,!this.useIdToken&&!ZAi.some(u=>u.test(o)))throw new Error(`Host "${o}" is not an allowed host for Google Credential provider.`);let c=this.config.scopes&&this.config.scopes.length>0?this.config.scopes:["https://www.googleapis.com/auth/cloud-platform"];this.auth=new Ldr.GoogleAuth({scopes:c})}type="google-credentials";auth;useIdToken=!1;audience;cachedToken;tokenExpiryTime;async initialize(){}async headers(){if(this.cachedToken&&this.tokenExpiryTime&&Date.now()<this.tokenExpiryTime-gN)return{Authorization:`Bearer ${this.cachedToken}`};if(this.cachedToken=void 0,this.tokenExpiryTime=void 0,this.useIdToken)try{let n=await(await this.auth.getIdTokenClient(this.audience)).idTokenProvider.fetchIdToken(this.audience),o=As.parseTokenExpiry(n);return o&&(this.tokenExpiryTime=o,this.cachedToken=n),{Authorization:`Bearer ${n}`}}catch(r){let n=`Failed to get ADC ID token: ${r instanceof Error?r.message:String(r)}`;throw F.error(n,r),new Error(n)}try{let r=await this.auth.getClient(),n=await r.getAccessToken();if(n.token){this.cachedToken=n.token;let o=r.credentials;return o.expiry_date&&(this.tokenExpiryTime=o.expiry_date),{Authorization:`Bearer ${n.token}`}}throw new Error("Failed to retrieve ADC access token.")}catch(r){let n=`Failed to get ADC access token: ${r instanceof Error?r.message:String(r)}`;throw F.error(n,r),new Error(n)}}async shouldRetryWithHeaders(r,n){if(n.status!==401&&n.status!==403){this.authRetryCount=0;return}if(!(this.authRetryCount>=xf.MAX_AUTH_RETRIES))return this.authRetryCount++,F.debug("[GoogleCredentialsAuthProvider] Re-fetching token after auth failure"),this.cachedToken=void 0,this.tokenExpiryTime=void 0,this.headers()}};var _b=class t{static async create(e){let{agentName:r,authConfig:n,agentCard:o}=e;if(!n)return o?.securitySchemes&&Object.keys(o.securitySchemes).length>0,void 0;switch(n.type){case"google-credentials":{let s=new Kue(n,e.targetUrl);return await s.initialize(),s}case"apiKey":{let s=new Yue(n);return await s.initialize(),s}case"http":{let s=new Jue(n);return await s.initialize(),s}case"oauth2":{let{OAuth2AuthProvider:s}=await import("./oauth2-provider-BAYGJHVR.js"),c=new s(n,e.agentName??"unknown",o,e.agentCardUrl);return await c.initialize(),c}case"openIdConnect":throw new Error("openIdConnect auth provider not yet implemented");default:{let s=n;throw new Error(`Unknown auth type: ${s.type}`)}}}static async createFromConfig(e,r){return await t.create({authConfig:e,agentName:r})}static validateAuthConfig(e,r){if(!r||Object.keys(r).length===0)return{valid:!0};let n=Object.keys(r);if(!e)return{valid:!1,diff:{requiredSchemes:n,configuredType:void 0,missingConfig:["Authentication is required but not configured"]}};let o=t.findMatchingScheme(e,r);return o.matched?{valid:!0}:{valid:!1,diff:{requiredSchemes:n,configuredType:e.type,missingConfig:o.missingConfig}}}static findMatchingScheme(e,r){let n=[];for(let[o,s]of Object.entries(r))switch(s.type){case"apiKey":if(e.type==="apiKey")return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires apiKey authentication`);break;case"http":if(e.type==="http"){if(e.scheme.toLowerCase()===s.scheme.toLowerCase())return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires HTTP ${s.scheme} authentication, but ${e.scheme} was configured`)}else{if(e.type==="google-credentials"&&s.scheme.toLowerCase()==="bearer")return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires HTTP ${s.scheme} authentication`)}break;case"oauth2":if(e.type==="oauth2")return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires OAuth 2.0 authentication`);break;case"openIdConnect":if(e.type==="openIdConnect")return{matched:!0,missingConfig:[]};n.push(`Scheme '${o}' requires OpenID Connect authentication`);break;case"mutualTLS":n.push(`Scheme '${o}' requires mTLS authentication (not yet supported)`);break;default:{let c=s;n.push(`Unknown security scheme type: ${c.type}`)}}return{matched:!1,missingConfig:n}}static describeRequiredAuth(e){let r=[];for(let[n,o]of Object.entries(e))switch(o.type){case"apiKey":r.push(`API Key (${n}): Send ${o.name} in ${o.in}`);break;case"http":r.push(`HTTP ${o.scheme} (${n})`);break;case"oauth2":r.push(`OAuth 2.0 (${n})`);break;case"openIdConnect":r.push(`OpenID Connect (${n})`);break;case"mutualTLS":r.push(`Mutual TLS (${n})`);break;default:{let s=o;r.push(`Unknown (${n}): ${s.type}`)}}return r.join(" OR ")}};var hm=class extends Error{userMessage;agentName;constructor(e,r,n,o){super(r,o),this.name="A2AAgentError",this.agentName=e,this.userMessage=n}},AVe=class extends hm{constructor(e,r){let n=`Agent card not found at ${r} (HTTP 404)`,o=`Agent card not found (404) at ${r}. Verify the agent_card_url in your agent definition.`;super(e,n,o),this.name="AgentCardNotFoundError"}},Xue=class extends hm{statusCode;constructor(e,r,n){let o=n===401?"Unauthorized":"Forbidden",s=`Agent card request returned ${n} ${o} for ${r}`,c=`Authentication failed (${n} ${o}) at ${r}. Check the "auth" configuration in your agent definition.`;super(e,s,c),this.name="AgentCardAuthError",this.statusCode=n}},Zue=class extends hm{requiredAuth;missingFields;constructor(e,r,n){let o=`Agent "${e}" requires authentication but none is configured`,s=`Agent requires ${r} but no auth is configured. Missing: ${n.join(", ")}`;super(e,o,s),this.name="AgentAuthConfigMissingError",this.requiredAuth=r,this.missingFields=n}},ede=class extends hm{constructor(e,r,n){let o=n instanceof Error?n.message:String(n),s=`Failed to connect to agent "${e}" at ${r}: ${o}`,c=`Connection failed for ${r}: ${o}`;super(e,s,c,{cause:n}),this.name="AgentConnectionError"}};function eEi(t){return typeof t=="object"&&t!==null}function tEi(t){let e=[],r=t,n=0,o=10;for(;r&&n<o;){if(eEi(r)){let s=r;r instanceof Error?e.push(r.message):typeof s.message=="string"&&e.push(s.message),typeof s.code=="string"&&e.push(s.code),typeof s.status=="number"?e.push(String(s.status)):typeof s.statusCode=="number"&&e.push(String(s.statusCode)),r=s.cause}else if(typeof r=="string"){e.push(r);break}else{e.push(String(r));break}n++}return e.join(" ")}function Bdr(t,e,r){let n=tEi(r);return/\b(ECONNREFUSED|ENOTFOUND|EHOSTUNREACH|ETIMEDOUT)\b/i.test(n)?new ede(t,e,r):/\b404\b|\bnot[\s_-]?found\b/i.test(n)?new AVe(t,e):/\b401\b|unauthorized/i.test(n)?new Xue(t,e,401):/\b403\b|forbidden/i.test(n)?new Xue(t,e,403):new ede(t,e,r)}function EVe(t){return`${t.name}-config`}var tde=class{constructor(e){this.config=e}agents=new Map;allDefinitions=new Map;builtInAgents=new Set;async initialize(){_e.on("model-changed",this.onModelChanged),await this.loadAgents()}isBuiltIn(e){return this.builtInAgents.has(e)}onModelChanged=()=>{this.refreshAgents("local").catch(e=>{F.error("[AgentRegistry] Failed to refresh agents on model change:",e)})};async reload(){this.config.getA2AClientManager()?.clearCache(),await this.config.reloadAgents(),this.agents.clear(),this.allDefinitions.clear(),await this.loadAgents(),_e.emitAgentsRefreshed()}async acknowledgeAgent(e){let r=this.config.getAcknowledgedAgentsService(),n=this.config.getProjectRoot();e.metadata?.hash&&(await r.acknowledge(n,e.name,e.metadata.hash),await this.registerAgent(e),_e.emitAgentsRefreshed())}dispose(){_e.off("model-changed",this.onModelChanged)}async loadAgents(){if(this.agents.clear(),this.allDefinitions.clear(),this.loadBuiltInAgents(),!this.config.isAgentsEnabled())return;let e=er.getUserAgentsDir(),r=await gVe(e);for(let s of r.errors)F.warn(`[AgentRegistry] Error loading user agent: ${s.message}`),_e.emitFeedback("error",`Agent loading error: ${s.message}`);await Promise.allSettled(r.agents.map(async s=>{try{await this.registerAgent(s)}catch(c){F.warn(`[AgentRegistry] Error registering user agent "${s.name}":`,c),_e.emitFeedback("error",`Error registering user agent "${s.name}": ${c instanceof Error?c.message:String(c)}`)}}));let n=this.config.getFolderTrust(),o=this.config.isTrustedFolder();if(!n||o){let s=this.config.storage.getProjectAgentsDir(),c=await gVe(s);for(let p of c.errors)_e.emitFeedback("error",`Agent loading error: ${p.message}`);let u=this.config.getAcknowledgedAgentsService(),d=this.config.getProjectRoot(),l=[],a=[];for(let p of c.agents){if(p.kind==="remote"&&(p.metadata||(p.metadata={}),p.metadata.hash=p.agentCardUrl??(p.agentCardJson?Udr.createHash("sha256").update(p.agentCardJson).digest("hex"):void 0)),!p.metadata?.hash){a.push(p);continue}await u.isAcknowledged(d,p.name,p.metadata.hash)?a.push(p):l.push(p)}l.length>0&&_e.emitAgentsDiscovered(l),await Promise.allSettled(a.map(async p=>{try{await this.registerAgent(p)}catch(f){F.warn(`[AgentRegistry] Error registering project agent "${p.name}":`,f),_e.emitFeedback("error",`Error registering project agent "${p.name}": ${f instanceof Error?f.message:String(f)}`)}}))}else _e.emitFeedback("info","Skipping project agents due to untrusted folder. To enable, ensure that the project root is trusted.");for(let s of this.config.getExtensions())s.isActive&&s.agents&&await Promise.allSettled(s.agents.map(async c=>{try{await this.registerAgent(c)}catch(u){F.warn(`[AgentRegistry] Error registering extension agent "${c.name}":`,u),_e.emitFeedback("error",`Error registering extension agent "${c.name}": ${u instanceof Error?u.message:String(u)}`)}}));this.config.getDebugMode()&&F.log(`[AgentRegistry] Loaded with ${this.agents.size} agents.`)}loadBuiltInAgents(){let e=Sce(this.config);this.builtInAgents.add(e.name),this.registerLocalAgent(e);let r=Rdr(this.config);this.builtInAgents.add(r.name),this.registerLocalAgent(r);let n=Pdr(this.config);if(this.builtInAgents.add(n.name),this.registerLocalAgent(n),this.config.getBrowserAgentConfig().enabled){let s=Wue(this.config);this.builtInAgents.add(s.name),this.registerLocalAgent(s)}if(this.config.isMemoryManagerEnabled()){this.registerLocalAgent(kdr(this.config));try{let s=er.getGlobalGeminiDir();this.config.getWorkspaceContext().addDirectory(s)}catch(s){F.warn("[AgentRegistry] Could not add global .gemini directory to workspace:",s)}}}async refreshAgents(e="all"){this.loadBuiltInAgents(),await Promise.allSettled(Array.from(this.agents.values()).map(async r=>{(e==="all"||r.kind===e)&&await this.registerAgent(r)}))}async registerAgent(e){e.kind==="local"?this.registerLocalAgent(e):e.kind==="remote"&&await this.registerRemoteAgent(e)}registerLocalAgent(e){if(e.kind!=="local")return;if(!e.name||!e.description){F.warn("[AgentRegistry] Skipping invalid agent definition. Missing name or description.");return}this.allDefinitions.set(e.name,e);let r=this.config.getAgentsSettings().overrides?.[e.name];if(!this.isAgentEnabled(e,r)){this.config.getDebugMode()&&F.log(`[AgentRegistry] Skipping disabled agent '${e.name}'`);return}this.agents.has(e.name)&&this.config.getDebugMode()&&F.log(`[AgentRegistry] Overriding agent '${e.name}'`);let n=this.applyOverrides(e,r);this.agents.set(n.name,n),this.registerModelConfigs(n),this.addAgentPolicy(n)}addAgentPolicy(e){let r=this.config.getPolicyEngine();if(r){if(r.hasRuleForTool(e.name,!0)){this.config.getDebugMode()&&F.log(`[AgentRegistry] User policy exists for '${e.name}', skipping dynamic registration.`);return}r.removeRulesForTool(e.name,"AgentRegistry (Dynamic)"),r.addRule({toolName:e.name,decision:e.kind==="local"?"allow":"ask_user",priority:Xj,source:"AgentRegistry (Dynamic)"})}}isAgentEnabled(e,r){let o=!(e.experimental===!0);return r&&r.enabled!==void 0&&(o=r.enabled),o}async registerRemoteAgent(e){if(e.kind!=="remote")return;if(!e.name){F.warn("[AgentRegistry] Skipping invalid agent definition. Missing name.");return}this.allDefinitions.set(e.name,e);let r=this.config.getAgentsSettings().overrides?.[e.name];if(!this.isAgentEnabled(e,r)){this.config.getDebugMode()&&F.log(`[AgentRegistry] Skipping disabled remote agent '${e.name}'`);return}this.agents.has(e.name)&&this.config.getDebugMode()&&F.log(`[AgentRegistry] Overriding agent '${e.name}'`);let n=e;n.originalDescription===void 0&&(n.originalDescription=n.description);try{let o=this.config.getA2AClientManager();if(!o){F.warn(`[AgentRegistry] Skipping remote agent '${e.name}': A2AClientManager is not available.`);return}let s=Uue(n),c;if(e.auth){let p=await _b.create({authConfig:e.auth,agentName:e.name,targetUrl:s,agentCardUrl:n.agentCardUrl});if(!p)throw new Error(`Failed to create auth provider for agent '${e.name}'`);c=p}let u=await o.loadAgent(n.name,Bue(n),c);if(u.securitySchemes){let p=_b.validateAuthConfig(e.auth,u.securitySchemes);if(!p.valid&&p.diff){let f=_b.describeRequiredAuth(u.securitySchemes),g=new Zue(e.name,f,p.diff.missingConfig);_e.emitFeedback("warning",`[${e.name}] Agent requires authentication: ${f}`),F.warn(`[AgentRegistry] ${g.message}`)}}let d=n.originalDescription,l=u.description,a=[];if(d?.trim()&&a.push(`User Description: ${d.trim()}`),l?.trim()&&a.push(`Agent Description: ${l.trim()}`),u.skills&&u.skills.length>0){let p=u.skills.map(f=>`${f.name}: ${f.description||"No description provided"}`).join(`
|
|
2843
2843
|
`);a.push(`Skills:
|
|
2844
2844
|
${p}`)}a.length>0&&(e.description=a.join(`
|
|
2845
2845
|
`)),this.config.getDebugMode()&&F.log(`[AgentRegistry] Registered remote agent '${e.name}' with card: ${e.agentCardUrl??"inline JSON"}`),this.agents.set(e.name,e),this.addAgentPolicy(e)}catch(o){o instanceof hm?_e.emitFeedback("error",`[${e.name}] ${o.userMessage}`):_e.emitFeedback("error",`[${e.name}] Failed to load remote agent: ${o instanceof Error?o.message:String(o)}`),F.warn(`[AgentRegistry] Error loading A2A agent "${e.name}":`,o)}}applyOverrides(e,r){if(e.kind!=="local"||!r)return e;let n={get kind(){return e.kind},get name(){return e.name},get displayName(){return e.displayName},get description(){return e.description},get experimental(){return e.experimental},get metadata(){return e.metadata},get inputConfig(){return e.inputConfig},get outputConfig(){return e.outputConfig},get promptConfig(){return e.promptConfig},get toolConfig(){return e.toolConfig},get processOutput(){return e.processOutput},get runConfig(){return r.runConfig?{...e.runConfig,...r.runConfig}:e.runConfig},get modelConfig(){return r.modelConfig?sN.merge(e.modelConfig,r.modelConfig):e.modelConfig}};return r.tools&&(n.toolConfig={tools:r.tools}),r.mcpServers&&(n.mcpServers={...e.mcpServers,...r.mcpServers}),n}registerModelConfigs(e){let r=e.modelConfig,n=r.model;n==="inherit"&&(n=this.config.getModel());let o={...r,model:n};this.config.modelConfigService.registerRuntimeModelConfig(EVe(e),{modelConfig:o}),o.model&&Cs(o.model)&&this.config.modelConfigService.registerRuntimeModelOverride({match:{overrideScope:e.name},modelConfig:{generateContentConfig:o.generateContentConfig}})}getDefinition(e){return this.agents.get(e)}getAllDefinitions(){return Array.from(this.agents.values())}getAllAgentNames(){return Array.from(this.agents.keys())}getAllDiscoveredAgentNames(){return Array.from(this.allDefinitions.keys())}getDiscoveredDefinition(e){return this.allDefinitions.get(e)}};import*as mN from"node:fs/promises";import*as Fdr from"node:path";var rde=class{acknowledgedAgents={};loaded=!1;async load(){if(this.loaded)return;let e=er.getAcknowledgedAgentsPath();try{let r=await mN.readFile(e,"utf-8");this.acknowledgedAgents=JSON.parse(r)}catch(r){(!Ht(r)||r.code!=="ENOENT")&&F.error("Failed to load acknowledged agents:",Se(r)),this.acknowledgedAgents={}}this.loaded=!0}async save(){let e=er.getAcknowledgedAgentsPath();try{let r=Fdr.dirname(e);await mN.mkdir(r,{recursive:!0}),await mN.writeFile(e,JSON.stringify(this.acknowledgedAgents,null,2),"utf-8")}catch(r){F.error("Failed to save acknowledged agents:",Se(r))}}async isAcknowledged(e,r,n){await this.load();let o=this.acknowledgedAgents[e];return o?o[r]===n:!1}async acknowledge(e,r,n){await this.load(),this.acknowledgedAgents[e]||(this.acknowledgedAgents[e]={}),this.acknowledgedAgents[e][r]=n,await this.save()}};function nde(t,e){let r=/\$\{(\w+)\}/g,n=new Set(Array.from(t.matchAll(r),c=>c[1])),o=new Set(Object.keys(e)),s=Array.from(n).filter(c=>!o.has(c));if(s.length>0)throw new Error(`Template validation failed: Missing required input parameters: ${s.join(", ")}. Available inputs: ${Object.keys(e).join(", ")}`);return t.replace(r,(c,u)=>String(e[u]))}import{AsyncLocalStorage as rEi}from"node:async_hooks";var jdr=new rEi;function _Ve(t,e){return jdr.run(t,e)}function ide(){return jdr.getStore()}var Qdr=Fe(Doe(),1);function C7(t){return typeof t=="object"&&t!==null&&"callId"in t&&"responseParts"in t}function mMo(t){let{displayName:e,status:r,approvalMode:n,hasResultDisplay:o,parentCallId:s}=t;if(s)return!0;switch(e){case ED:switch(r){case"scheduled":case"validating":case"executing":case"awaiting_approval":return!0;case"error":return!o;default:return!1}case SQ:case TQ:return n==="plan";default:return!1}}function w7(t,e,r=3){let n=e.map(c=>({name:c,distance:Qdr.default.get(t,c)}));n.sort((c,u)=>c.distance-u.distance);let o=n.slice(0,r);if(o.length===0)return"";let s=o.map(c=>`"${c.name}"`).join(", ");return o.length>1?` Did you mean one of: ${s}?`:` Did you mean ${s}?`}function yMo(t,e,r){let n;eQ(t)?n=[t.name,t.constructor.name]:n=[t],n.some(o=>$f.includes(o))&&(n=[...new Set([...n,...$f])]);for(let o of r){let s=o.indexOf("(");if(s===-1){if(n.includes(o))return!0;continue}let c=o.substring(0,s);if(!n.includes(c)||!o.endsWith(")"))continue;let u=o.substring(s+1,o.length-1),d;if(typeof e=="string")d=e;else{if(!("command"in e.params))continue;d=String(e.params.command)}if(n.some(l=>$f.includes(l))&&(d===u||d.startsWith(u+" ")))return!0}return!1}var ode=class{constructor(e,r=Jtt,n){this.messageBus=e;this.schedulerId=r;this.onTerminalCall=n}activeCalls=new Map;queue=[];_completedBatch=[];addToolCalls(e){this.enqueue(e)}getToolCall(e){return this.activeCalls.get(e)||this.queue.find(r=>r.request.callId===e)||this._completedBatch.find(r=>r.request.callId===e)}enqueue(e){this.queue.push(...e),this.emitUpdate()}dequeue(){let e=this.queue.shift();return e&&(this.activeCalls.set(e.request.callId,e),this.emitUpdate()),e}peekQueue(){return this.queue[0]}get isActive(){return this.activeCalls.size>0}get allActiveCalls(){return Array.from(this.activeCalls.values())}get activeCallCount(){return this.activeCalls.size}get queueLength(){return this.queue.length}get firstActiveCall(){return this.activeCalls.values().next().value}updateStatus(e,r,n){let o=this.activeCalls.get(e);if(!o)return;let s=this.transitionCall(o,r,n);this.activeCalls.set(e,s),this.emitUpdate()}finalizeCall(e){let r=this.activeCalls.get(e);r&&this.isTerminalCall(r)&&(this._completedBatch.push(r),this.activeCalls.delete(e),this.onTerminalCall?.(r),this.emitUpdate())}updateArgs(e,r,n){let o=this.activeCalls.get(e);!o||o.status==="error"||(this.activeCalls.set(e,this.patchCall(o,{request:{...o.request,args:r},invocation:n})),this.emitUpdate())}setOutcome(e,r){let n=this.activeCalls.get(e);n&&(this.activeCalls.set(e,this.patchCall(n,{outcome:r})),this.emitUpdate())}replaceActiveCallWithTailCall(e,r){this.activeCalls.has(e)&&(this.activeCalls.delete(e),this.queue.unshift(r),this.emitUpdate())}cancelAllQueued(e){if(this.queue.length!==0){for(;this.queue.length>0;){let r=this.queue.shift();if(r.status==="error"){this._completedBatch.push(r),this.onTerminalCall?.(r);continue}let n=this.toCancelled(r,e);this._completedBatch.push(n),this.onTerminalCall?.(n)}this.emitUpdate()}}getSnapshot(){return[...this._completedBatch,...Array.from(this.activeCalls.values()),...this.queue]}clearBatch(){this._completedBatch.length!==0&&(this._completedBatch=[],this.emitUpdate())}get completedBatch(){return[...this._completedBatch]}emitUpdate(){let e=this.getSnapshot();this.messageBus.publish({type:"tool-calls-update",toolCalls:e,schedulerId:this.schedulerId})}isTerminalCall(e){let{status:r}=e;return r==="success"||r==="error"||r==="cancelled"}transitionCall(e,r,n){switch(r){case"success":{if(!C7(n))throw new Error(`Invalid data for 'success' transition (callId: ${e.request.callId})`);return this.toSuccess(e,n)}case"error":{if(!C7(n))throw new Error(`Invalid data for 'error' transition (callId: ${e.request.callId})`);return this.toError(e,n)}case"awaiting_approval":{if(!n)throw new Error(`Missing data for 'awaiting_approval' transition (callId: ${e.request.callId})`);return this.toAwaitingApproval(e,n)}case"scheduled":return this.toScheduled(e);case"cancelled":{if(typeof n!="string"&&!C7(n))throw new Error(`Invalid reason (string) or response for 'cancelled' transition (callId: ${e.request.callId})`);return this.toCancelled(e,n)}case"validating":return this.toValidating(e);case"executing":{if(n!==void 0&&!this.isExecutingToolCallPatch(n))throw new Error(`Invalid patch for 'executing' transition (callId: ${e.request.callId})`);return this.toExecuting(e,n)}default:return r}}isExecutingToolCallPatch(e){return typeof e=="object"&&e!==null}validateHasToolAndInvocation(e,r){if(!("tool"in e&&e.tool&&"invocation"in e&&e.invocation))throw new Error(`Invalid state transition: cannot transition to ${r} without tool/invocation (callId: ${e.request.callId})`)}toSuccess(e,r){this.validateHasToolAndInvocation(e,"success");let n="startTime"in e?e.startTime:void 0;return{request:e.request,tool:e.tool,invocation:e.invocation,status:"success",response:r,durationMs:n?Date.now()-n:void 0,outcome:e.outcome,schedulerId:e.schedulerId,approvalMode:e.approvalMode}}toError(e,r){let n="startTime"in e?e.startTime:void 0;return{request:e.request,status:"error",tool:"tool"in e?e.tool:void 0,response:r,durationMs:n?Date.now()-n:void 0,outcome:e.outcome,schedulerId:e.schedulerId,approvalMode:e.approvalMode}}toAwaitingApproval(e,r){this.validateHasToolAndInvocation(e,"awaiting_approval");let n,o;return this.isEventDrivenApprovalData(r)?(o=r.correlationId,n=r.confirmationDetails):n=r,{request:e.request,tool:e.tool,status:"awaiting_approval",correlationId:o,confirmationDetails:n,startTime:"startTime"in e?e.startTime:void 0,outcome:e.outcome,invocation:e.invocation,schedulerId:e.schedulerId,approvalMode:e.approvalMode}}isEventDrivenApprovalData(e){return typeof e=="object"&&e!==null&&"correlationId"in e&&"confirmationDetails"in e}toScheduled(e){return this.validateHasToolAndInvocation(e,"scheduled"),{request:e.request,tool:e.tool,status:"scheduled",startTime:"startTime"in e?e.startTime:void 0,outcome:e.outcome,invocation:e.invocation,schedulerId:e.schedulerId,approvalMode:e.approvalMode}}toCancelled(e,r){this.validateHasToolAndInvocation(e,"cancelled");let n="startTime"in e?e.startTime:void 0,o;if(this.isWaitingToolCall(e)){let u=e.confirmationDetails;u.type==="edit"&&"fileDiff"in u&&"fileName"in u&&"filePath"in u&&"originalContent"in u&&"newContent"in u&&(o={fileDiff:u.fileDiff,fileName:u.fileName,filePath:u.filePath,originalContent:u.originalContent,newContent:u.newContent,diffStat:u.diffStat??iJe(u.fileDiff)})}let s;if(e.status==="executing"&&e.liveOutput&&(s=e.liveOutput),C7(r)){let u={...r};return u.resultDisplay||(u.resultDisplay=o??s),{request:e.request,tool:e.tool,invocation:e.invocation,status:"cancelled",response:u,durationMs:n?Date.now()-n:void 0,outcome:e.outcome,schedulerId:e.schedulerId,approvalMode:e.approvalMode}}let c=`[Operation Cancelled] Reason: ${r}`;return{request:e.request,tool:e.tool,invocation:e.invocation,status:"cancelled",response:{callId:e.request.callId,responseParts:[{functionResponse:{id:e.request.callId,name:e.request.name,response:{error:c}}}],resultDisplay:o??s,error:void 0,errorType:void 0,contentLength:c.length},durationMs:n?Date.now()-n:void 0,outcome:e.outcome,schedulerId:e.schedulerId,approvalMode:e.approvalMode}}isWaitingToolCall(e){return e.status==="awaiting_approval"}patchCall(e,r){return{...e,...r}}toValidating(e){return this.validateHasToolAndInvocation(e,"validating"),{request:e.request,tool:e.tool,status:"validating",startTime:"startTime"in e?e.startTime:void 0,outcome:e.outcome,invocation:e.invocation,schedulerId:e.schedulerId,approvalMode:e.approvalMode}}toExecuting(e,r){this.validateHasToolAndInvocation(e,"executing");let n=r,o=n?.liveOutput??("liveOutput"in e?e.liveOutput:void 0),s=n?.pid??("pid"in e?e.pid:void 0),c=n?.progressMessage??("progressMessage"in e?e.progressMessage:void 0),u=n?.progressPercent??("progressPercent"in e?e.progressPercent:void 0),d=n?.progress??("progress"in e?e.progress:void 0),l=n?.progressTotal??("progressTotal"in e?e.progressTotal:void 0);return{request:e.request,tool:e.tool,status:"executing",startTime:"startTime"in e?e.startTime:void 0,outcome:e.outcome,invocation:e.invocation,liveOutput:o,pid:s,progressMessage:c,progressPercent:u,progress:d,progressTotal:l,schedulerId:e.schedulerId,approvalMode:e.approvalMode}}};import{on as nEi}from"node:events";import{randomUUID as iEi}from"node:crypto";async function oEi(t,e,r){if(r.aborted)throw new Error("Operation cancelled");try{for await(let[n]of nEi(t,"tool-confirmation-response",{signal:r})){let o=n;if(o.correlationId===e)return{outcome:o.outcome??(o.confirmed?"proceed_once":"cancel"),payload:o.payload}}}catch(n){throw r.aborted||n.name==="AbortError"?new Error("Operation cancelled"):n}throw new Error("Operation cancelled")}async function vVe(t,e,r){let{state:n,onWaitingForConfirmation:o}=r,s=t.request.callId,c="modify_with_editor",u;for(;c==="modify_with_editor";){if(e.aborted)throw new Error("Operation cancelled by user");let d=n.getToolCall(s);if(!d||!("invocation"in d))throw new Error(`Tool call ${s} lost during confirmation loop`);let a=await d.invocation.shouldConfirmExecute(e,r.forcedDecision);if(!a){c="proceed_once";break}r.systemMessage&&(a.systemMessage=r.systemMessage),await sEi(r,a);let p=iEi(),f=a;u=f;let g="ideConfirmation"in a?a.ideConfirmation:void 0;n.updateStatus(s,"awaiting_approval",{confirmationDetails:f,correlationId:p}),o?.(!0);let y=await cEi(r.messageBus,p,e,g);if(o?.(!1),c=y.outcome,"onConfirm"in a&&typeof a.onConfirm=="function"&&await a.onConfirm(c,y.payload),c==="modify_with_editor"){let E=await aEi(r,t,e);E.error&&_e.emitFeedback("error",E.error)}else y.payload&&"newContent"in y.payload&&(await lEi(r,t,y.payload,e),c="proceed_once")}return{outcome:c,lastDetails:u}}async function sEi(t,e){t.config.getHookSystem()&&await t.config.getHookSystem()?.fireToolNotificationEvent({...e,onConfirm:async()=>{}})}async function aEi(t,e,r){let{state:n,modifier:o,getPreferredEditor:s}=t,c=s(),u=await L3t(c,r);if(!u)return{error:R3t};let d=await o.handleModifyWithEditor(n.firstActiveCall,u,r);if(d){let l=e.tool.build(d.updatedParams);n.updateArgs(e.request.callId,d.updatedParams,l)}return{}}async function lEi(t,e,r,n){let{state:o,modifier:s}=t,c=await s.applyInlineModify(o.firstActiveCall,r,n);if(c){let u=e.tool.build(c.updatedParams);o.updateArgs(e.request.callId,c.updatedParams,u)}}async function cEi(t,e,r,n){let o=new AbortController,s=o.signal,c=()=>o.abort();r.aborted?o.abort():r.addEventListener("abort",c);try{let u=oEi(t,e,s);if(!n)return await u;let d=n.then(l=>({outcome:l.status==="accepted"?"proceed_once":"cancel",payload:l.content?{newContent:l.content}:void 0})).catch(l=>(F.warn("Error waiting for confirmation via IDE",l),new Promise(()=>{})));return await Promise.race([u,d])}finally{r.removeEventListener("abort",c),o.abort()}}function qdr(t,e){return{errorMessage:`Tool execution denied by policy.${e?.denyMessage?` ${e.denyMessage}`:""}`,errorType:"policy_violation"}}async function Gdr(t,e,r){let n=t.tool instanceof Wn?t.tool.serverName:void 0,o=t.tool.toolAnnotations,s=await e.getPolicyEngine().check({name:t.request.name,args:t.request.args},n,o,r),{decision:c}=s;if(c==="ask_user"&&t.request.isClientInitiated&&!t.request.args?.additional_permissions)return{decision:"allow",rule:s.rule};if(c==="ask_user"&&!e.isInteractive())throw new Error(`Tool execution for "${t.tool.displayName||t.tool.name}" requires user confirmation, which is not supported in non-interactive mode.`);return{decision:c,rule:s.rule}}async function Vdr(t,e,r,n,o,s){if(uEi(t,e)){n.config.setApprovalMode("autoEdit");return}let c;if(e==="proceed_always_and_save"&&(n.config&&n.config.isTrustedFolder()&&n.config.getWorkspacePoliciesDir()!==void 0?c="workspace":c="user"),r?.type==="mcp"){await pEi(t,e,r,o,c);return}await dEi(t,e,r,o,c,s,n.config)}function uEi(t,e){return e==="proceed_always"&&AD.has(t.name)}async function dEi(t,e,r,n,o,s,c){if(e==="proceed_always"||e==="proceed_always_and_save"){let u=s?.getPolicyUpdateOptions?.(e)||{};if(!u.commandPrefix&&r?.type==="exec")u.commandPrefix=r.rootCommands;else if(!u.argsPattern&&r?.type==="edit"){let d=c?To(r.filePath,c.getTargetDir()):r.filePath;u.argsPattern=W_(d)}await n.publish({type:"update-policy",toolName:t.name,persist:e==="proceed_always_and_save",persistScope:o,...u})}}async function pEi(t,e,r,n,o){if(!(e==="proceed_always"||e==="proceed_always_tool"||e==="proceed_always_server"||e==="proceed_always_and_save"))return;let c=t.name,u=e==="proceed_always_and_save";e==="proceed_always_server"&&(c=eS(r.serverName,"*")),await n.publish({type:"update-policy",toolName:c,mcpName:r.serverName,persist:u,persistScope:o})}function bVe(t,e){if(!(t instanceof bJe))return;let n=(e.getMcpClientManager()?.getMcpServers()??e.getMcpServers()??{})[t.serverName];if(n)return{server_name:t.serverName,tool_name:t.serverToolName,command:n.command,args:n.args,cwd:n.cwd,url:n.url??n.httpUrl,tcp:n.tcp}}async function Hdr(t,e,r,n,o,s,c,u,d){let l=t.params||{},a=!1,p=[],f=c?bVe(t,c):void 0,g=c?.getHookSystem();if(g&&!d){let E=await g.fireBeforeToolEvent(e,l,f,u);if(E?.shouldStopExecution()){let v=E.getEffectiveReason();return{llmContent:`Agent execution stopped by hook: ${v}`,returnDisplay:`Agent execution stopped by hook: ${v}`,error:{type:"stop_execution",message:v}}}let _=E?.getBlockingError();if(_?.blocked)return{llmContent:`Tool execution blocked: ${_.reason}`,returnDisplay:`Tool execution blocked: ${_.reason}`,error:{type:"execution_failed",message:_.reason}};if(E instanceof L0){let v=E.getModifiedToolInput();if(v){Object.assign(t.params,v),F.debug(`Tool input modified by hook for ${e}`),a=!0,p=Object.keys(v);try{t=n.build(t.params)}catch(b){return{llmContent:`Tool parameter modification by hook failed validation: ${b instanceof Error?b.message:String(b)}`,returnDisplay:"Tool parameter modification by hook failed validation.",error:{type:"invalid_tool_params",message:String(b)}}}}}}let y=await t.execute(r,o,s);if(a){let E=`
|
|
@@ -1,2 +1,2 @@
|
|
|
1
1
|
const require = (await import('node:module')).createRequire(import.meta.url); const __chunk_filename = (await import('node:url')).fileURLToPath(import.meta.url); const __chunk_dirname = (await import('node:path')).dirname(__chunk_filename);
|
|
2
|
-
import{$ as Td,$a as Ve,$b as Wf,$c as Sg,$d as Sh,$e as Si,$h as rl,$i as qm,$k as uo,$l as up,$m as sq,A as Yc,Aa as ue,Ab as vf,Ac as vg,Ad as rh,Ae as ri,Af as mj,Ag as dk,Ah as Sk,Ai as Sl,Aj as $m,Ak as Un,Al as Vo,Am as Tp,B as Zc,Ba as ve,Bb as wf,Bc as wg,Bd as sh,Be as si,Bf as nj,Bg as ek,Bh as Tk,Bi as Tl,Bj as an,Bk as Vn,Bl as Wo,Bm as Up,C as _c,Ca as we,Cb as xf,Cc as xg,Cd as th,Ce as ti,Cf as oj,Cg as fk,Ch as Uk,Ci as Ul,Cj as bn,Ck as Wn,Cl as Xo,Cm as Vp,D as $c,Da as xe,Db as yf,Dc as yg,Dd as uh,De as ui,Df as pj,Dg as gk,Dh as Vk,Di as Vl,Dj as cn,Dk as Xn,Dl as Yo,Dm as Wp,E as ad,Ea as ye,Eb as zf,Ec as zg,Ed as vh,Ee as vi,Ef as qj,Eg as hk,Eh as Wk,Ei as Wl,Ej as dn,Ek as Yn,El as Zo,Em as Xp,F as bd,Fa as ze,Fb as Af,Fc as Ag,Fd as wh,Fe as wi,Ff as rj,Fg as ik,Fh as Xk,Fi as Xl,Fj as en,Fk as Zn,Fl as _o,Fm as Yp,G as cd,Ga as Ae,Gb as Bf,Gc as Bg,Gd as xh,Ge as xi,Gf as sj,Gg as jk,Gh as Yk,Gi as Yl,Gj as fn,Gk as _n,Gl as $o,Gm as Zp,H as dd,Ha as Be,Hb as Cf,Hc as Cg,Hd as yh,He as yi,Hf as tj,Hg as kk,Hh as Zk,Hi as Zl,Hj as gn,Hk as $n,Hl as ap,Hm as _p,I as ed,Ia as Ce,Ib as Df,Ic as Dg,Id as zh,Ie as zi,If as uj,Ig as lk,Ih as _k,Ii as _l,Ij as hn,Ik as ao,Il as bp,Im as $p,J as fd,Ja as De,Jb as Ef,Jc as Eg,Jd as Ah,Je as Ai,Jf as vj,Jg as mk,Jh as $k,Ji as $l,Jj as jn,Jk as bo,Jl as cp,Jm as aq,K as gd,Ka as Ee,Kb as Ff,Kc as Fg,Kd as Bh,Ke as Bi,Kf as wj,Kg as nk,Kh as al,Ki as am,Kj as kn,Kk as co,Kl as dp,Km as bq,L as hd,La as Fe,Lb as Gf,Lc as Gg,Ld as Ch,Le as Ci,Lf as xj,Lg as ok,Lh as bl,Li as bm,Lj as ln,Lk as eo,Ll as ep,Lm as cq,M as id,Ma as Ge,Mb as Hf,Mc as Hg,Md as Dh,Me as Di,Mf as yj,Mg as pk,Mh as cl,Mi as cm,Mj as mn,Mk as fo,Ml as fp,Mm as dq,N as jd,Na as He,Nb as If,Nc as Ig,Nd as Eh,Ne as Ei,Nf as zj,Ng as qk,Nh as dl,Ni as dm,Nj as nn,Nk as go,Nl as gp,Nm as eq,O as kd,Oa as Ie,Ob as Jf,Oc as Jg,Od as Fh,Oe as Fi,Of as Aj,Og as rk,Oh as el,Oi as em,Oj as on,Ok as ho,Ol as hp,Om as fq,P as ld,Pa as Je,Pb as Kf,Pc as Kg,Pd as Gh,Pe as Gi,Pf as Bj,Pg as sk,Ph as fl,Pi as fm,Pj as pn,Pk as io,Pl as ip,Pm as gq,Q as md,Qa as Ke,Qb as Lf,Qd as Hh,Qe as Hi,Qf as Cj,Qg as Ak,Qh as gl,Qi as gm,Qj as qn,Qk as jo,Ql as jp,Qm as hq,R as nd,Ra as Le,Rb as Mf,Rd as Ih,Re as Ii,Rf as Dj,Rg as Bk,Rh as hl,Ri as hm,Rj as rn,Rk as ko,Rl as kp,Rm as iq,S as od,Sa as Me,Sb as Nf,Sd as Jh,Se as Ji,Sf as Ej,Sg as Ck,Sh as il,Si as im,Sj as sn,Sk as lo,Sl as lp,Sm as jq,T as pd,Ta as Ne,Tb as Of,Td as Kh,Te as Ki,Tf as Fj,Tg as Dk,Th as jl,Ti as jm,Tj as tn,Tk as mo,Tl as mp,Tm as kq,U as qd,Ua as Oe,Ub as Pf,Uc as Lg,Ud as Lh,Ue as Li,Uf as Gj,Ug as Ek,Uh as kl,Ui as km,Uj as un,Uk as no,Ul as np,Um as lq,V as rd,Va as Pe,Vb as Qf,Vc as Mg,Vd as Mh,Ve as Mi,Vf as Hj,Vg as Fk,Vh as ll,Vi as lm,Vj as vn,Vk as oo,Vl as op,Vm as mq,W as sd,Wa as Qe,Wb as Rf,Wc as Ng,Wd as Nh,We as Ni,Wf as Ij,Wh as ml,Wi as mm,Wj as wn,Wk as po,Wl as pp,Wm as nq,Xa as Re,Xb as Sf,Xc as Og,Xd as Oh,Xe as Oi,Xg as Gk,Xh as nl,Xi as nm,Xk as qo,Xl as qp,Xm as oq,Ya as Se,Yb as Tf,Yc as Pg,Yd as Ph,Ye as Pi,Yh as ol,Yj as xn,Yk as ro,Yl as rp,Ym as pq,Za as Te,Zb as Uf,Zc as Qg,Zd as Qh,Ze as Qi,Zh as pl,Zi as om,Zk as so,Zl as sp,Zm as qq,_ as Pd,_a as Ue,_b as Vf,_c as Rg,_d as Rh,_e as Ri,_h as ql,_i as pm,_j as yn,_k as to,_l as tp,_m as rq,aa as Ud,ab as We,ac as Xf,ad as Tg,ae as Th,af as Ti,ai as sl,aj as rm,al as vo,am as vp,an as tq,ba as Vd,bb as Xe,bc as Yf,bd as Ug,be as Uh,bf as Ui,bi as tl,bj as sm,bl as wo,bm as wp,bn as uq,c as Ac,ca as Yd,cb as Ye,cc as Zf,cd as Vg,ce as Vh,cf as Vi,ci as ul,cj as tm,cl as xo,cm as xp,cn as vq,d as Bc,da as Zd,db as Ze,dc as _f,dd as Wg,de as Wh,df as Wi,di as vl,dj as um,dl as yo,dm as yp,e as Cc,ea as _d,eb as _e,ec as $f,ed as Xg,ee as Xh,ef as Xi,eg as Jj,ei as wl,ej as vm,el as zo,em as zp,f as Dc,fa as $d,fb as $e,fc as ag,fd as Yg,fe as Yh,ff as Yi,fg as Kj,fi as xl,fj as wm,fk as zn,fl as Ao,fm as Ap,g as Ec,ga as ae,gb as af,gc as bg,gd as Zg,ge as Zh,gf as Zi,gg as Lj,gi as yl,gj as xm,gk as An,gl as Bo,gm as Bp,h as Fc,ha as be,hb as bf,hc as cg,hd as _g,he as _h,hf as _i,hg as Mj,hi as zl,hj as ym,hk as Bn,hl as Co,hm as Cp,i as Gc,ia as ce,ib as cf,ic as dg,id as $g,ie as $h,if as $i,ig as Nj,ii as Al,ij as zm,ik as Cn,il as Do,im as Dp,j as Hc,ja as de,jb as df,jc as eg,jd as ah,je as ai,jf as aj,jg as Oj,ji as Bl,jj as Am,jk as Dn,jl as Eo,k as Ic,ka as ee,kb as ef,kc as fg,kd as bh,ke as bi,kf as bj,kg as Pj,ki as Cl,kj as Bm,kk as En,kl as Fo,km as Ep,l as Jc,la as fe,lb as ff,lc as gg,ld as ch,le as ci,lg as Qj,li as Dl,lj as Cm,lk as Fn,ll as Go,lm as Fp,m as Kc,ma as ge,mb as gf,mc as hg,md as dh,me as di,mg as Rj,mi as El,mj as Dm,mk as Gn,ml as Ho,mm as Gp,n as Lc,na as he,nb as hf,nc as ig,nd as eh,ne as ei,ng as Sj,nh as Hk,ni as Fl,nj as Em,nk as Hn,nl as Io,nm as Hp,o as Mc,oa as ie,ob as jf,oc as jg,od as fh,oe as fi,og as Tj,oh as Ik,oi as Gl,oj as Fm,ok as In,ol as Jo,om as Ip,p as Nc,pa as je,pb as kf,pc as kg,pd as gh,pe as gi,pg as Uj,ph as Jk,pi as Hl,pj as Gm,pk as Jn,pl as Ko,pm as Jp,q as Oc,qa as ke,qb as lf,qc as lg,qd as hh,qe as hi,qf as cj,qg as Vj,qh as Kk,qi as Il,qj as Hm,qk as Kn,ql as Lo,r as Pc,ra as le,rb as mf,rc as mg,rd as ih,re as ii,rf as dj,rg as Wj,rh as Lk,ri as Jl,rj as Im,rk as Ln,rl as Mo,rm as Kp,s as Qc,sa as me,sb as nf,sc as ng,sd as jh,se as ji,sf as ej,sg as Xj,sh as Mk,si as Kl,sj as Tm,sk as Mn,sl as No,sm as Lp,t as Rc,ta as ne,tb as of,tc as og,td as kh,te as ki,tf as fj,tg as Yj,th as Nk,ti as Ll,tj as Um,tk as Nn,tl as Oo,tm as Mp,u as Sc,ua as oe,ub as pf,uc as pg,ud as lh,ue as li,uf as gj,ug as Zj,ui as Ml,uj as Vm,uk as On,ul as Po,um as Np,v as Tc,va as pe,vb as qf,vc as qg,vd as mh,ve as mi,vf as hj,vg as _j,vi as Nl,vj as Wm,vk as Pn,vl as Qo,vm as Op,w as Uc,wa as qe,wb as rf,wc as rg,wd as nh,we as ni,wf as ij,wg as $j,wh as Ok,wi as Ol,wj as Xm,wk as Qn,wl as Ro,wm as Pp,x as Vc,xa as re,xb as sf,xc as sg,xd as oh,xe as oi,xf as jj,xg as ak,xh as Pk,xi as Pl,xj as Ym,xk as Rn,xl as So,xm as Qp,y as Wc,ya as se,yb as tf,yc as tg,yd as ph,ye as pi,yf as kj,yg as bk,yh as Qk,yi as Ql,yj as Zm,yk as Sn,yl as To,ym as Rp,z as Xc,za as te,zb as uf,zc as ug,zd as qh,ze as qi,zf as lj,zg as ck,zh as Rk,zi as Rl,zj as _m,zk as Tn,zl as Uo,zm as Sp}from"./chunk-LDCK4LC4.js";import{$ as I,$a as za,$b as zb,$c as ec,$d as yk,A as h,Aa as _,Ab as _a,Ad as xd,B as i,Ba as $,Bb as $a,Bd as yd,C as j,Ca as aa,Cb as ab,Cd as zd,D as k,Da as ba,Db as bb,Dd as Ad,E as l,Ea as ca,Eb as cb,Ed as Bd,F as m,Fa as da,Fb as db,Fd as Cd,G as n,Ga as ea,Gb as eb,Gd as Dd,H as o,Ha as fa,Hb as fb,Hd as Ed,I as p,Ia as ga,Ib as gb,Id as Fd,J as q,Ja as ha,Jb as hb,Jc as Ob,Jd as Gd,K as r,Ka as ia,Kb as ib,Kc as Pb,Kd as Hd,L as s,La as ja,Lb as jb,Lc as Qb,Ld as Id,M as t,Ma as ka,Mb as kb,Mc as Rb,Md as Jd,N as u,Na as la,Nb as lb,Nc as Sb,Nd as Kd,O as v,Oa as ma,Ob as mb,Oc as Tb,Od as Ld,P as w,Pa as na,Pb as nb,Pc as Ub,Pd as Md,Q as x,Qa as oa,Qb as ob,Qc as Vb,Qd as Nd,R as y,Ra as pa,Rb as pb,Rc as Wb,Rd as Od,S as z,Sa as qa,Sb as qb,Sc as Xb,Sd as Qd,T as A,Ta as ra,Tb as rb,Tc as Yb,Td as Rd,U as B,Ua as sa,Ub as sb,Uc as Zb,Ud as Sd,V as C,Va as ta,Vb as tb,Vc as _b,W as D,Wa as ua,Wb as ub,Wc as $b,Wd as tk,X as E,Xa as va,Xb as vb,Xc as ac,Xd as uk,Y as F,Ya as wa,Yb as wb,Yc as bc,Yd as vk,Z as G,Za as xa,Zb as xb,Zc as cc,Zd as wk,_ as H,_a as ya,_b as yb,_c as dc,_d as xk,aa as J,ab as Aa,ac as Ab,ad as fc,ae as zk,b as a,ba as K,bb as Ba,bc as Bb,bd as gc,be as Jm,c as b,ca as L,cb as Ca,cc as Cb,cd as hc,ce as Km,d as c,da as M,db as Da,dc as Db,dd as ic,de as Lm,ea as N,eb as Ea,ec as Eb,ed as jc,ee as Mm,fa as O,fb as Fa,fc as Fb,fd as kc,fe as Nm,ga as P,gb as Ga,gc as Gb,gd as lc,ge as Om,h as d,ha as Q,hb as Ha,hc as Hb,hd as mc,he as Pm,i as e,ia as R,ib as Ia,ic as Ib,id as nc,ie as Qm,j as f,ja as S,jb as Ja,jd as oc,je as Rm,k as g,kb as Ka,kd as pc,ke as Sm,lb as La,lc as Jb,ld as qc,mb as Ma,mc as Kb,md as rc,na as T,nb as Na,nc as Lb,nd as sc,ob as Oa,oc as Mb,pb as Pa,pc as Nb,pd as tc,qb as Qa,qd as uc,rb as Ra,rd as vc,sb as Sa,sd as wc,tb as Ta,td as xc,ua as U,ub as Ua,ud as yc,va as V,vb as Va,vd as zc,wa as W,wb as Wa,wd as td,xa as X,xb as Xa,xd as ud,ya as Y,yb as Ya,yd as vd,za as Z,zb as Za,zd as wd}from"./chunk-ALYGAQ7G.js";import"./chunk-TWIC4BKL.js";import"./chunk-JAFVB6DI.js";import{b as Wd,c as Xd}from"./chunk-A5A5SUZN.js";import"./chunk-YUXORC52.js";export{tb as ACTIVATE_SKILL_TOOL_NAME,ko as ADMIN_POLICY_TIER,po as ALLOWED_MCP_SERVER_PRIORITY,no as ALLOWED_TOOLS_FLAG_PRIORITY,qc as ALL_BUILTIN_TOOL_NAMES,qo as ALWAYS_ALLOW_PRIORITY,o as ALWAYS_ALLOW_PRIORITY_FRACTION,p as ALWAYS_ALLOW_PRIORITY_OFFSET,fc as ASK_USER_DISPLAY_NAME,Eb as ASK_USER_OPTION_PARAM_DESCRIPTION,Db as ASK_USER_OPTION_PARAM_LABEL,wb as ASK_USER_PARAM_QUESTIONS,yb as ASK_USER_QUESTION_PARAM_HEADER,Bb as ASK_USER_QUESTION_PARAM_MULTI_SELECT,Ab as ASK_USER_QUESTION_PARAM_OPTIONS,Cb as ASK_USER_QUESTION_PARAM_PLACEHOLDER,xb as ASK_USER_QUESTION_PARAM_QUESTION,zb as ASK_USER_QUESTION_PARAM_TYPE,vb as ASK_USER_TOOL_NAME,Ep as AbortError,Id as AccountSuspendedError,ug as ActionStatus,Nk as ActivateSkillTool,oh as ActivityDetector,Bh as ActivityMonitor,Ah as ActivityType,yg as AdminControlsSettingsSchema,im as AfterAgentHookOutput,hm as AfterModelHookOutput,Ml as AgentExecutionBlockedError,Ll as AgentExecutionStoppedError,sn as AgentLoadError,Pp as AgentSession,dn as AgentTerminateMode,pf as ApiErrorEvent,lh as ApiKeyUpdatedEvent,of as ApiRequestEvent,te as ApiRequestPhase,qf as ApiResponseEvent,l as ApprovalMode,tl as AskUserInvocation,sl as AskUserTool,Zo as AuthProviderType,lk as AuthType,Jc as BINARY_EXTENSIONS,Bc as BINARY_FILE_PATTERNS,Kd as BadRequestError,u as BaseDeclarativeTool,uj as BaseLlmClient,s as BaseToolInvocation,fm as BeforeModelHookOutput,em as BeforeToolHookOutput,gm as BeforeToolSelectionHookOutput,Tj as CODE_ASSIST_API_VERSION,Sj as CODE_ASSIST_ENDPOINT,Dc as COMMON_DIRECTORY_EXCLUDES,Ac as COMMON_IGNORE_PATTERNS,Vj as CacheService,Gd as CanceledError,Ld as ChangeAuthRequestedError,Zg as ChatRecordingService,Og as ClearcutLogger,bj as CloseDiffRequestSchema,Uj as CodeAssistServer,Uk as ColorMode,Rl as CompressionStatus,$o as Config,_o as ConfigSchema,Yl as ConfigSource,sf as ConsecaPolicyGenerationEvent,tf as ConsecaVerdictEvent,Tm as ContextManager,Af as ConversationFinishedEvent,tg as ConversationInteractionInteraction,Qd as CoreEvent,Rd as CoreEventEmitter,Ud as CoreToolCallStatus,hh as CreditPurchaseClickEvent,jh as CreditsUsedEvent,tc as DEFAULT_CONTEXT_FILENAME,eo as DEFAULT_CORE_POLICIES_DIR,Mc as DEFAULT_ENCODING,Gn as DEFAULT_FAST_ACK_MODEL_CONFIG_KEY,Gc as DEFAULT_FILE_EXCLUDES,uk as DEFAULT_FILE_FILTERING_OPTIONS,ha as DEFAULT_GEMINI_EMBEDDING_MODEL,$ as DEFAULT_GEMINI_FLASH_LITE_MODEL,_ as DEFAULT_GEMINI_FLASH_MODEL,Z as DEFAULT_GEMINI_MODEL,ca as DEFAULT_GEMINI_MODEL_AUTO,Ci as DEFAULT_GUI_EDITOR,oj as DEFAULT_MAX_ATTEMPTS,Hn as DEFAULT_MAX_INPUT_CHARS,Lb as DEFAULT_MAX_LINES_TEXT_FILE,In as DEFAULT_MAX_OUTPUT_CHARS,gn as DEFAULT_MAX_TIME_MINUTES,fn as DEFAULT_MAX_TURNS,tk as DEFAULT_MEMORY_FILE_FILTERING_OPTIONS,Im as DEFAULT_MODEL_CONFIGS,Nh as DEFAULT_OTLP_ENDPOINT,go as DEFAULT_POLICY_TIER,en as DEFAULT_QUERY_STRING,Mh as DEFAULT_TELEMETRY_TARGET,ia as DEFAULT_THINKING_MODE,Wl as DEFAULT_TOKEN_LIMIT,Xo as DEFAULT_TRUNCATE_TOOL_OUTPUT_THRESHOLD,pc as DISCOVERED_TOOL_PREFIX,sb as DOCS_PARAM_PATH,t as DeclarativeTool,dm as DefaultHookOutput,Vb as DiscoveredMCPTool,Ub as DiscoveredMCPToolInvocation,rk as DiscoveredTool,Fi as EDITOR_DISPLAY_NAMES,ec as EDIT_DISPLAY_NAME,bb as EDIT_PARAM_ALLOW_MULTIPLE,_a as EDIT_PARAM_INSTRUCTION,ab as EDIT_PARAM_NEW_STRING,$a as EDIT_PARAM_OLD_STRING,Za as EDIT_TOOL_NAME,Xb as EDIT_TOOL_NAMES,Hb as ENTER_PLAN_MODE_TOOL_NAME,kh as EVENT_API_KEY_UPDATED,ih as EVENT_CREDITS_USED,gh as EVENT_CREDIT_PURCHASE_CLICK,eh as EVENT_EMPTY_WALLET_MENU_SHOWN,ah as EVENT_OVERAGE_MENU_SHOWN,ch as EVENT_OVERAGE_OPTION_SELECTED,mo as EXCLUDE_TOOLS_FLAG_PRIORITY,Fb as EXIT_PLAN_MODE_TOOL_NAME,Gb as EXIT_PLAN_PARAM_PLAN_FILENAME,ho as EXTENSION_POLICY_TIER,Bj as EditTool,fh as EmptyWalletMenuShownEvent,lf as EndSessionEvent,Xk as ExecutionLifecycleService,Dp as ExitCodes,Tn as ExperimentFlags,If as ExtensionDisableEvent,Gf as ExtensionEnableEvent,Cf as ExtensionInstallEvent,ep as ExtensionIntegrityDataSchema,ip as ExtensionIntegrityManager,fp as ExtensionIntegrityMapSchema,yo as ExtensionLoader,Ef as ExtensionUninstallEvent,Ff as ExtensionUpdateEvent,pj as FETCH_FAILED_MESSAGE,Pf as FORCE_FILE_STORAGE_ENV_VAR,pn as FRONTMATTER_REGEX,zd as FatalAuthenticationError,Fd as FatalCancellationError,Cd as FatalConfigError,yd as FatalError,Ad as FatalInputError,Bd as FatalSandboxError,Ed as FatalToolExecutionError,Dd as FatalTurnLimitedError,zg as FetchAdminControlsResponseSchema,dl as FetchError,Ek as FileDiscoveryService,Hc as FileExclusions,pe as FileOperation,Wi as FileSchema,Gp as FileSearchFactory,rf as FlashFallbackEvent,Kp as FolderTrustDiscoveryService,Hd as ForbiddenError,Ag as G1_CREDIT_TYPE,Eg as G1_UTM_CAMPAIGNS,Qi as GEMINI_CLI_COMPANION_EXTENSION_NAME,Yk as GEMINI_CLI_IDENTIFICATION_ENV_VAR,Zk as GEMINI_CLI_IDENTIFICATION_ENV_VAR_VALUE,G as GEMINI_DIR,vk as GEMINI_IGNORE_FILE_NAME,da as GEMINI_MODEL_ALIAS_AUTO,fa as GEMINI_MODEL_ALIAS_FLASH,ga as GEMINI_MODEL_ALIAS_FLASH_LITE,ea as GEMINI_MODEL_ALIAS_PRO,ae as GEN_AI_AGENT_DESCRIPTION,$d as GEN_AI_AGENT_NAME,ne as GEN_AI_CONVERSATION_ID,be as GEN_AI_INPUT_MESSAGES,_d as GEN_AI_OPERATION_NAME,ce as GEN_AI_OUTPUT_MESSAGES,fe as GEN_AI_PROMPT_NAME,de as GEN_AI_REQUEST_MODEL,ee as GEN_AI_RESPONSE_MODEL,le as GEN_AI_SYSTEM_INSTRUCTIONS,he as GEN_AI_TOOL_CALL_ID,me as GEN_AI_TOOL_DEFINITIONS,ie as GEN_AI_TOOL_DESCRIPTION,ge as GEN_AI_TOOL_NAME,je as GEN_AI_USAGE_INPUT_TOKENS,ke as GEN_AI_USAGE_OUTPUT_TOKENS,rb as GET_INTERNAL_DOCS_TOOL_NAME,hc as GLOB_DISPLAY_NAME,Da as GLOB_TOOL_NAME,H as GOOGLE_ACCOUNTS_FILENAME,pd as GOVERNANCE_FILES,jc as GREP_DISPLAY_NAME,Ma as GREP_PARAM_AFTER,Na as GREP_PARAM_BEFORE,La as GREP_PARAM_CONTEXT,Ga as GREP_PARAM_EXCLUDE_PATTERN,Ka as GREP_PARAM_FIXED_STRINGS,Fa as GREP_PARAM_INCLUDE_PATTERN,Ia as GREP_PARAM_MAX_MATCHES_PER_FILE,Ha as GREP_PARAM_NAMES_ONLY,Oa as GREP_PARAM_NO_IGNORE,Ja as GREP_PARAM_TOTAL_MAX_MATCHES,Ea as GREP_TOOL_NAME,Rg as GcpLogExporter,Qg as GcpMetricExporter,Pg as GcpTraceExporter,Nl as GeminiChat,oe as GeminiCliOperation,nm as GeminiClient,Ql as GeminiEventType,ue as GenAiOperationName,ve as GenAiProviderName,we as GenAiTokenType,Bk as GitIgnoreParser,om as GitService,Lk as GlobTool,Gk as GrepTool,$l as HOOKS_CONFIG_FIELDS,sh as HighWaterMarkTracker,_m as HookAggregator,an as HookEventHandler,_l as HookEventName,$m as HookPlanner,Ym as HookRegistry,Zm as HookRunner,bn as HookSystem,am as HookType,cj as IDEConnectionStatus,Lg as IDE_DEFINITIONS,Ri as IDE_MAX_OPEN_FILES,Si as IDE_MAX_SELECTED_TEXT_LENGTH,Ti as IDE_REQUEST_TIMEOUT_MS,qj as INCOMPLETE_JSON_MESSAGE,Dl as INITIAL_HISTORY_LENGTH,wk as INTEGRITY_FILENAME,xk as INTEGRITY_KEY_FILENAME,dj as IdeClient,zf as IdeConnectionEvent,yf as IdeConnectionType,Yi as IdeContextNotificationSchema,Xi as IdeContextSchema,Ui as IdeContextStore,Zi as IdeDiffAcceptedNotificationSchema,$i as IdeDiffClosedNotificationSchema,_i as IdeDiffRejectedNotificationSchema,m as InProcessCheckerType,Zj as IneligibleTierError,qg as IneligibleTierReasonCode,vg as InitiationMethod,$n as InjectionService,hp as IntegrityDataStatus,cp as IntegrityStatus,gp as IntegrityStoreSchema,Kl as InvalidStreamError,ap as JsonFormatter,Hm as JsonStreamEventType,yk as KEYCHAIN_SERVICE_NAME,Nf as KEYCHAIN_TEST_PREFIX,Mf as KeychainSchema,Qf as KeychainService,Rf as KeychainTokenStorage,D as Kind,Ak as LSTool,ic as LS_DISPLAY_NAME,Qa as LS_PARAM_IGNORE,Pa as LS_TOOL_NAME,_p as LegacyAgentSession,jf as LlmRole,Sn as LocalAgentExecutor,rd as LocalSandboxManager,zp as Logger,dk as LoggingContentGenerator,Nb as MAX_FILE_SIZE_MB,Mb as MAX_LINE_LENGTH_TEXT_FILE,Do as MCPDiscoveryState,Ao as MCPOAuthProvider,yn as MCPOAuthTokenStorage,Yo as MCPServerConfig,Co as MCPServerStatus,Bo as MCP_DEFAULT_TIMEOUT_MSEC,lo as MCP_EXCLUDED_PRIORITY,Ob as MCP_QUALIFIED_NAME_SEPARATOR,Pb as MCP_TOOL_PREFIX,Cc as MEDIA_FILE_PATTERNS,qb as MEMORY_PARAM_FACT,uc as MEMORY_SECTION_HEADER,pb as MEMORY_TOOL_NAME,Hg as MIN_CREDIT_BALANCE,E as MUTATOR_KINDS,Eo as McpClient,xg as McpConfigDefinitionSchema,re as MemoryMetricType,uh as MemoryMonitor,zc as MemoryTool,Wm as MessageBus,h as MessageBusType,wp as MessageSenderType,hj as ModelNotFoundError,Hf as ModelSlashCommandEvent,Bi as NO_EDITOR_AVAILABLE_ERROR,Bf as NetworkRetryAttemptEvent,qd as NoopSandboxManager,jm as NotificationType,xn as OAuthUtils,al as OUTPUT_UPDATE_INTERVAL_MS,Bg as OVERAGE_ELIGIBLE_MODELS,sg as OnboardUserStatusCode,Kf as OnboardingStartEvent,Lf as OnboardingSuccessEvent,aj as OpenDiffRequestSchema,Gm as OutputFormat,bh as OverageMenuShownEvent,dh as OverageOptionSelectedEvent,ya as PARAM_CASE_SENSITIVE,Ca as PARAM_DESCRIPTION,wa as PARAM_DIR_PATH,Ba as PARAM_FILE_FILTERING_OPTIONS,va as PARAM_FILE_PATH,xa as PARAM_PATTERN,Aa as PARAM_RESPECT_GEMINI_IGNORE,za as PARAM_RESPECT_GIT_IGNORE,Ib as PLAN_MODE_PARAM_REASON,rc as PLAN_MODE_TOOLS,W as PREVIEW_GEMINI_3_1_CUSTOM_TOOLS_MODEL,Y as PREVIEW_GEMINI_3_1_FLASH_LITE_MODEL,V as PREVIEW_GEMINI_3_1_MODEL,X as PREVIEW_GEMINI_FLASH_MODEL,U as PREVIEW_GEMINI_MODEL,ba as PREVIEW_GEMINI_MODEL_AUTO,n as PRIORITY_SUBAGENT_TOOL,q as PRIORITY_YOLO_ALLOW_ALL,Ec as PYTHON_EXCLUDES,qe as PerformanceMetricType,vl as PlanErrorMessages,j as PolicyDecision,Xm as PolicyEngine,dp as PolicyIntegrityManager,mm as PreCompressTrigger,el as PrivateIpError,Xj as ProjectIdRequiredError,i as QuestionType,gc as READ_FILE_DISPLAY_NAME,Ta as READ_FILE_PARAM_END_LINE,Sa as READ_FILE_PARAM_START_LINE,Ra as READ_FILE_TOOL_NAME,mc as READ_MANY_FILES_DISPLAY_NAME,kb as READ_MANY_FILES_TOOL_NAME,mb as READ_MANY_PARAM_EXCLUDE,lb as READ_MANY_PARAM_INCLUDE,nb as READ_MANY_PARAM_RECURSIVE,ob as READ_MANY_PARAM_USE_DEFAULT_EXCLUDES,F as READ_ONLY_KINDS,Kb as REFERENCE_CONTENT_END,Jb as REFERENCE_CONTENT_START,Td as ROOT_SCHEDULER_ID,th as RateLimiter,Fk as ReadFileTool,$p as ReadManyFilesTool,kk as RecordingContentGenerator,Kj as ReleaseChannel,wg as RequiredMcpServerConfigSchema,qk as ResourceRegistry,jj as RetryableQuotaError,wf as RewindEvent,Jk as RipGrepTool,_k as SCROLLBACK_LIMIT,zk as SECRET_KEY_ACCOUNT,Of as SECRET_PREFIX,Zd as SERVICE_DESCRIPTION,Yd as SERVICE_NAME,Yg as SESSION_FILE_PREFIX,Va as SHELL_PARAM_COMMAND,Wa as SHELL_PARAM_IS_BACKGROUND,Ua as SHELL_TOOL_NAME,$c as SHELL_TOOL_NAMES,ub as SKILL_PARAM_NAME,kn as SUBAGENT_CANCELLED_ERROR_MESSAGE,jn as SUBAGENT_REJECTED_ERROR_PREFIX,Il as SYNTHETIC_THOUGHT_SIGNATURE,Fc as SYSTEM_FILE_EXCLUDES,qm as SandboxedFileSystemService,En as Scheduler,d as SchemaValidator,af as SemanticAttributes,lm as SessionEndReason,km as SessionStartSource,$k as ShellExecutionService,cl as ShellTool,bl as ShellToolInvocation,zo as SimpleExtensionLoader,Un as SkillManager,vf as SlashCommandStatus,Xd as SpanStatusCode,pm as StandardFileSystemService,kf as StartSessionEvent,Jh as StartupProfiler,T as Storage,Hl as StreamEventType,bp as StreamJsonFormatter,hn as SubagentActivityErrorType,vm as TASK_TYPE_LABELS,gb as TODOS_ITEM_PARAM_DESCRIPTION,hb as TODOS_ITEM_PARAM_STATUS,fb as TODOS_PARAM_TODOS,Yb as TOOLS_REQUIRING_NARROWING,nc as TOOL_LEGACY_ALIASES,Zc as TOOL_OUTPUTS_DIR,bc as TRACKER_ADD_DEPENDENCY_TOOL_NAME,Zb as TRACKER_CREATE_TASK_TOOL_NAME,$b as TRACKER_GET_TASK_TOOL_NAME,ac as TRACKER_LIST_TASKS_TOOL_NAME,_b as TRACKER_UPDATE_TASK_TOOL_NAME,cc as TRACKER_VISUALIZE_TOOL_NAME,oo as TRUSTED_MCP_SERVER_PRIORITY,wm as TaskStatus,xm as TaskStatusSchema,tm as TaskType,um as TaskTypeSchema,Lh as TelemetryTarget,ij as TerminalQuotaError,Vd as ToolCallDecision,nf as ToolCallEvent,C as ToolConfirmationOutcome,b as ToolErrorType,se as ToolExecutionPhase,Dn as ToolExecutor,Df as ToolOutputTruncatedEvent,sk as ToolRegistry,Em as TrackerAddDependencyTool,Am as TrackerCreateTaskTool,Cm as TrackerGetTaskTool,Dm as TrackerListTasksTool,Um as TrackerService,ym as TrackerTaskSchema,Bm as TrackerUpdateTaskTool,Fm as TrackerVisualizeTool,Sl as Turn,mj as UPGRADE_URL_PAGE,jo as USER_POLICY_TIER,Kn as USER_STEERING_INSTRUCTION,_g as UiTelemetryService,Jd as UnauthorizedError,Pd as UserAccountManager,mf as UserPromptEvent,rg as UserTierId,aa as VALID_GEMINI_MODELS,Yj as ValidationCancelledError,kj as ValidationRequiredError,Wd as ValueType,lc as WEB_FETCH_DISPLAY_NAME,jb as WEB_FETCH_PARAM_PROMPT,ib as WEB_FETCH_TOOL_NAME,kc as WEB_SEARCH_DISPLAY_NAME,db as WEB_SEARCH_PARAM_QUERY,cb as WEB_SEARCH_TOOL_NAME,io as WORKSPACE_POLICY_TIER,dc as WRITE_FILE_DISPLAY_NAME,Ya as WRITE_FILE_PARAM_CONTENT,Xa as WRITE_FILE_TOOL_NAME,eb as WRITE_TODOS_TOOL_NAME,jq as WarningPriority,Jf as WebFetchFallbackAttemptEvent,ql as WebFetchTool,rl as WebSearchTool,nd as WindowsSandboxManager,Vm as WorkspaceContext,lq as WorktreeService,Ej as WriteFileTool,sm as WriteTodosTool,Lj as _clearCache,Go as addMCPStatusChangeListener,tp as addMemory,Ki as allowEditorTypeInSandbox,ri as appendToLastTextPart,Ap as applyAdminAllowlist,xj as applyReplacement,Bp as applyRequiredServers,yl as assumeExhaustive,kg as authEvents,Fg as buildG1Url,zm as buildTodosReturnDisplay,Tp as buildToolResponseData,Ln as buildUserSteeringHintPrompt,mh as bytesToMB,yj as calculateReplacement,Hk as canUseRipgrep,Pm as categorizeAndConcatenate,zl as checkExhaustive,lj as classifyGoogleError,sq as cleanupWorktree,jk as clearApiKey,og as clearCachedCredentialFile,fo as clearEmittedPolicyWarnings,ng as clearOauthClientCache,hf as computeModelAddedAndRemovedLines,Lm as concatenateInstructions,Oo as connectAndDiscover,Uo as connectToMcpServer,Rp as contentPartsToGeminiParts,Wk as convertColorToHex,pl as convertGithubUrlToRaw,Jp as convertSessionToClientHistory,si as convertToFunctionResponse,Ip as convertToRestPayload,Sd as coreEvents,Wj as createCache,ek as createCodeAssistContentGenerator,ok as createContentGenerator,nk as createContentGeneratorConfig,Hj as createConversationOffered,cm as createHookOutput,wo as createPolicyEngineConfig,xo as createPolicyUpdater,kl as createSafeProxyAgent,od as createSandboxManager,Hh as createSessionId,Up as createTranslationState,Vo as createTransport,Rn as createUnauthorizedToolError,Vf as createWorkingStdio,pq as createWorktree,mq as createWorktreeService,a as debugLogger,yp as decodeTagName,Jm as deduplicatePathsByFileIdentity,Nc as detectBOM,Tk as detectEncodingFromBuffer,Uc as detectFileType,Ng as detectIdeFromEnv,df as detectLineEnding,cg as disableBracketedPasteMode,_f as disableKittyKeyboardProtocol,eg as disableLineWrapping,ag as disableModifyOtherKeys,Yf as disableMouseEvents,Wf as disableMouseTracking,Mo as discoverMcpTools,Qo as discoverPrompts,Ro as discoverResources,Po as discoverTools,Cn as doesToolInvocationMatch,bg as enableBracketedPasteMode,Zf as enableKittyKeyboardProtocol,dg as enableLineWrapping,$f as enableModifyOtherKeys,Xf as enableMouseEvents,xp as encodeTagName,Ik as ensureRgPath,fg as enterAlternateScreen,N as escapePath,fd as escapeShellArg,ck as estimateContextBreakdown,md as execStreaming,gg as exitAlternateScreen,Ic as extractExtensionsFromPatterns,Wn as fetchAdminControls,Xn as fetchAdminControlsOnce,ll as fetchWithTimeout,Wc as fileExists,Fp as filter,Dk as findGitRoot,qi as flatMapTextParts,wn as flattenMemory,Qh as flushTelemetry,Nn as formatBackgroundCompletionForModel,nh as formatBytes,mp as formatCheckpointDisplayList,tq as formatForSpeech,Sb as formatMcpToolName,uo as formatPolicyError,Ij as formatProtoJsonDuration,Yc as formatTruncatedToolOutput,Mn as formatUserHintsForModel,Qp as geminiPartsToContentParts,lp as generateCheckpointFileName,Qn as generateFastAckText,On as generateSteeringAckMessage,Mp as generateSummary,Wb as generateValidName,ph as getActivityDetector,Dh as getActivityMonitor,_n as getAdminBlockedMcpServersMessage,Zn as getAdminErrorMessage,nn as getAgentCardLoadOptions,xc as getAllGeminiMdFilenames,Ko as getAllMCPServerStatuses,ro as getAlwaysAllowPriorityFraction,Al as getApprovalModeDescription,mk as getAuthTypeFromEnv,mg as getAvailablePort,Qk as getCachedEncodingForBuffer,pp as getCheckpointInfoList,Ai as getCitations,fk as getCodeAssistServer,id as getCommandRoot,jd as getCommandRoots,kq as getCompatibilityWarnings,Vl as getCompressionPrompt,jg as getConsentForOauth,Me as getConventionAttributes,Ul as getCoreSystemPrompt,Dj as getCorrectedFileContent,wc as getCurrentGeminiMdFilename,Oi as getDiffCommand,El as getDirectoryContextString,la as getDisplayString,Ji as getEditorCommand,Gi as getEditorDisplayName,Fl as getEnvironmentContext,Om as getEnvironmentMemoryPaths,wd as getErrorMessage,zj as getErrorReplaceResult,gj as getErrorStatus,xd as getErrorType,cn as getExperiments,Nm as getExtensionMemoryPaths,gf as getFileDiffFromResultDisplay,Mk as getFolderStructure,Cp as getFsErrorMessage,ui as getFunctionCalls,wi as getFunctionCallsAsJson,vi as getFunctionCallsFromParts,xi as getFunctionCallsFromPartsAsJson,Gg as getG1CreditBalance,yc as getGlobalMemoryFilePath,Mm as getGlobalMemoryPaths,bm as getHookKey,k as getHookSource,Np as getIdeInstaller,Gl as getInitialChatHistory,Lo as getMCPDiscoveryState,Op as getMCPServerPrompts,Jo as getMCPServerStatus,wh as getMemoryMonitor,lg as getOauthClient,Jj as getPackageJson,Bl as getPlanModeExitMessage,so as getPolicyDirectories,to as getPolicyTier,Lp as getPreviousSession,P as getProjectHash,nq as getProjectRootForWorktree,wj as getPromptIdWithFallback,Ok as getPty,Rc as getRealPath,Mj as getReleaseChannel,on as getRemoteAgentTargetUrl,pi as getResponseText,ti as getResponseTextFromParts,rj as getRetryErrorType,dd as getShellConfiguration,Pc as getSpecificMimeType,yi as getStructuredResponse,zi as getStructuredResponseFromParts,Rk as getSystemEncoding,oc as getToolAliases,kp as getToolCallDataSchema,Bn as getToolSuggestion,np as getTruncatedCheckpointNames,Qj as getVersion,oq as getWorktreePath,nj as handleFallback,w as hasCycleInSchema,To as hasNetworkTransport,gd as hasRedirection,y as hasSummary,Hi as hasValidEditorCommand,Ii as hasValidEditorCommandAsync,rq as hasWorktreeChanges,I as homedir,Vi as ideContextStore,Ch as initializeActivityMonitor,vh as initializeMemoryMonitor,bd as initializeShellParsers,Ph as initializeTelemetry,So as invokeMcpPrompt,vd as isAbortError,Nd as isAccountSuspendedError,ua as isActiveModel,il as isAddressPrivate,ak as isApiError,gq as isAppleTerminal,Od as isAuthenticationError,sa as isAutoModel,r as isBackgroundExecutionData,cf as isBinary,Tc as isBinaryFile,Mg as isCloudShell,ul as isCompletedAskUserTool,qa as isCustomModel,fq as isDumbTerminal,Aj as isEditToolParams,Li as isEditorAvailable,Mi as isEditorAvailableAsync,Sc as isEmpty,Wo as isEnabled,c as isFatalToolError,B as isFileDiff,pa as isGemini2Model,oa as isGemini3Model,qq as isGeminiWorktree,Ck as isGitRepository,dq as isGnuScreen,z as isGrepResult,Di as isGuiEditor,ig as isHeadlessMode,Pl as isInvalidArgumentError,bq as isJetBrainsTerminal,A as isListResult,gl as isLoopbackHost,eq as isLowColorTmux,Tb as isMcpToolAnnotation,Qb as isMcpToolName,Nj as isNightly,ud as isNodeError,Cg as isOverageEligibleModel,Xe as isPerformanceMonitoringActive,Oj as isPreview,ma as isPreviewModel,hl as isPrivateIp,jl as isPrivateIpAsync,na as isProModel,g as isRecord,sj as isRetryableError,Ol as isSchemaDepthError,Pj as isStable,bk as isStructuredError,x as isStructuredToolResult,ln as isSubagentProgress,R as isSubpath,Oh as isTelemetrySdkInitialized,Ei as isTerminalEditor,cq as isTmux,v as isTool,mn as isToolActivityError,zn as isToolCallResponseInfo,rh as isUserActive,Zl as isUserVisibleHook,Jl as isValidNonThoughtTextPart,sc as isValidToolName,ed as isWindows,aq as isWindows10,Qc as isWithinRoot,Cj as isWriteFileToolParams,e as jsonToMarkdown,jp as listExtensions,vp as listMemoryFiles,vn as loadAgentsFromDirectory,hk as loadApiKey,vo as loadExtensionPolicies,Sm as loadJitSubdirectoryMemory,bo as loadPoliciesFromToml,Qm as loadServerHierarchicalMemory,rn as loadSkillFromFile,qn as loadSkillsFromDir,Lc as loadWasmBinary,Yh as logApiError,Wh as logApiRequest,Zh as logApiResponse,ni as logBillingEvent,ci as logChatCompression,Sh as logCliConfiguration,Vg as logConsecaPolicyGeneration,Wg as logConsecaVerdict,bi as logConversationFinishedEvent,ji as logExtensionDisable,ii as logExtensionEnable,fi as logExtensionInstallEvent,gi as logExtensionUninstall,hi as logExtensionUpdateEvent,Xh as logFlashFallback,ai as logIdeConnection,ei as logModelSlashCommand,di as logNetworkRetryAttempt,li as logOnboardingStart,mi as logOnboardingSuccess,$h as logRewind,_h as logSlashCommand,Uh as logToolCall,Vh as logToolOutputTruncated,Th as logUserPrompt,ki as logWebFetchFallbackAttempt,xf as makeChatCompressionEvent,uq as makeFakeConfig,M as makeRelative,uf as makeSlashCommandEvent,Yp as mapError,Wp as mapFinishReason,Xp as mapHttpToGrpcStatus,Zp as mapUsage,un as markdownToAgentDefinition,Fo as mcpServerRequiresOAuth,Q as normalizePath,Jn as normalizeSpace,nl as normalizeUrl,ej as openBrowserSecurely,Pi as openDiff,tn as parseAgentMarkdown,Hp as parseAndFormatApiError,Sg as parseBooleanEnvFlag,cd as parseCommandDetails,td as parseGoogleApiError,Rb as parseMcpToolName,ol as parsePrompt,Tg as parseTelemetryTargetValue,Xg as parseThought,Cl as partListUnionToString,oi as partToString,Uf as patchStdio,rp as performInit,qp as performRestore,No as populateMcpServerCommand,op as processRestorableToolCalls,Vc as processSingleFileContent,vj as promptIdContext,Oc as readFileWithEncoding,Km as readGeminiMdFiles,vq as readPathFromWorkspace,ao as readPolicyFiles,Kc as readWasmBinaryFromDisk,Ae as recordApiErrorMetrics,Te as recordApiRequestBreakdown,Ze as recordApiResponseMetrics,We as recordBaselineComparison,He as recordContentRetry,Ie as recordContentRetryFailure,Fj as recordConversationOffered,Pe as recordCpuUsage,$e as recordCreditPurchaseClick,xh as recordCurrentMemoryUsage,ze as recordCustomApiResponseMetrics,ye as recordCustomTokenUsageMetrics,De as recordExitFail,Be as recordFileOperationMetric,Ce as recordFlickerFrame,Le as recordGenAiClientOperationDuration,Ke as recordGenAiClientTokenUsage,Fe as recordInvalidChunk,Oe as recordMemoryUsage,Je as recordModelRoutingMetrics,_e as recordOverageOptionSelected,Ve as recordPerformanceRegression,Ue as recordPerformanceScore,Ge as recordRetryAttemptMetrics,Ee as recordSlowRender,Ne as recordStartupPerformance,Se as recordTokenEfficiency,Ye as recordTokenUsageMetrics,Gj as recordToolCallInteractions,xe as recordToolCallMetrics,Re as recordToolExecutionBreakdown,Qe as recordToolQueueDepth,qh as recordUserActivity,up as refreshMemory,Rm as refreshServerHierarchicalMemory,Ho as removeMCPStatusChangeListener,gk as resetApiKeyCacheForTesting,Pk as resetEncodingCache,pg as resetOauthClientForTesting,_j as resetUserDataCacheForTesting,Rj as resetVersionCache,ka as resolveClassifierModel,Ni as resolveEditorAsync,ad as resolveExecutable,ja as resolveModel,Tl as resolvePathFromEnv,Ug as resolveTelemetrySettings,S as resolveToRealPath,tj as retryWithBackoff,Ih as runInDevTraceSpan,f as safeJsonToMarkdown,bf as safeLiteralReplace,ff as safeTemplateReplace,Vn as sanitizeAdminSettings,Xc as sanitizeFilenamePart,fl as sanitizeHostname,sd as sanitizePaths,ik as saveApiKey,_c as saveTruncatedToolOutput,Fn as scheduleAgentTools,Vk as serializeTerminalToObject,Gh as sessionId,vc as setGeminiMdFilename,ml as setGlobalProxy,$j as setupUser,L as shortenPath,rm as shouldAttemptBrowserLaunch,Ig as shouldAutoUseCredits,hg as shouldEnterAlternateScreen,An as shouldHideToolCall,fj as shouldLaunchBrowser,Kg as shouldShowEmptyWalletMenu,Jg as shouldShowOverageMenu,sp as showMemory,Rh as shutdownTelemetry,Kk as sortFileEntries,ld as spawnAsync,hd as splitCommands,Eh as startGlobalActivityMonitoring,yh as startGlobalMemoryMonitoring,Kh as startupProfiler,Yn as stopAdminControlsPolling,Fh as stopGlobalActivityMonitoring,zh as stopGlobalMemoryMonitoring,kd as stripShellWrapper,hq as supports256Colors,ra as supportsModernFeatures,ta as supportsMultimodalFunctionResponse,iq as supportsTrueColor,K as tildeifyPath,J as tmpdir,Md as toFriendlyError,Xl as tokenLimit,Sp as toolResultDisplayToContentParts,Vp as translateEvent,Pn as truncateFastAckInput,ef as truncateString,$g as uiTelemetryService,O as unescapePath,Io as updateMCPServerStatus,pk as validateBaseUrl,co as validateMcpPolicyToolNames,xl as validatePlanContent,wl as validatePlanPath,Sk as windowsCodePageToEncoding,Dg as wrapInAccountChooser,Tf as writeToStderr,Sf as writeToStdout};
|
|
2
|
+
import{$ as Td,$a as Ve,$b as Wf,$c as Sg,$d as Sh,$e as Si,$h as rl,$i as qm,$k as uo,$l as up,$m as sq,A as Yc,Aa as ue,Ab as vf,Ac as vg,Ad as rh,Ae as ri,Af as mj,Ag as dk,Ah as Sk,Ai as Sl,Aj as $m,Ak as Un,Al as Vo,Am as Tp,B as Zc,Ba as ve,Bb as wf,Bc as wg,Bd as sh,Be as si,Bf as nj,Bg as ek,Bh as Tk,Bi as Tl,Bj as an,Bk as Vn,Bl as Wo,Bm as Up,C as _c,Ca as we,Cb as xf,Cc as xg,Cd as th,Ce as ti,Cf as oj,Cg as fk,Ch as Uk,Ci as Ul,Cj as bn,Ck as Wn,Cl as Xo,Cm as Vp,D as $c,Da as xe,Db as yf,Dc as yg,Dd as uh,De as ui,Df as pj,Dg as gk,Dh as Vk,Di as Vl,Dj as cn,Dk as Xn,Dl as Yo,Dm as Wp,E as ad,Ea as ye,Eb as zf,Ec as zg,Ed as vh,Ee as vi,Ef as qj,Eg as hk,Eh as Wk,Ei as Wl,Ej as dn,Ek as Yn,El as Zo,Em as Xp,F as bd,Fa as ze,Fb as Af,Fc as Ag,Fd as wh,Fe as wi,Ff as rj,Fg as ik,Fh as Xk,Fi as Xl,Fj as en,Fk as Zn,Fl as _o,Fm as Yp,G as cd,Ga as Ae,Gb as Bf,Gc as Bg,Gd as xh,Ge as xi,Gf as sj,Gg as jk,Gh as Yk,Gi as Yl,Gj as fn,Gk as _n,Gl as $o,Gm as Zp,H as dd,Ha as Be,Hb as Cf,Hc as Cg,Hd as yh,He as yi,Hf as tj,Hg as kk,Hh as Zk,Hi as Zl,Hj as gn,Hk as $n,Hl as ap,Hm as _p,I as ed,Ia as Ce,Ib as Df,Ic as Dg,Id as zh,Ie as zi,If as uj,Ig as lk,Ih as _k,Ii as _l,Ij as hn,Ik as ao,Il as bp,Im as $p,J as fd,Ja as De,Jb as Ef,Jc as Eg,Jd as Ah,Je as Ai,Jf as vj,Jg as mk,Jh as $k,Ji as $l,Jj as jn,Jk as bo,Jl as cp,Jm as aq,K as gd,Ka as Ee,Kb as Ff,Kc as Fg,Kd as Bh,Ke as Bi,Kf as wj,Kg as nk,Kh as al,Ki as am,Kj as kn,Kk as co,Kl as dp,Km as bq,L as hd,La as Fe,Lb as Gf,Lc as Gg,Ld as Ch,Le as Ci,Lf as xj,Lg as ok,Lh as bl,Li as bm,Lj as ln,Lk as eo,Ll as ep,Lm as cq,M as id,Ma as Ge,Mb as Hf,Mc as Hg,Md as Dh,Me as Di,Mf as yj,Mg as pk,Mh as cl,Mi as cm,Mj as mn,Mk as fo,Ml as fp,Mm as dq,N as jd,Na as He,Nb as If,Nc as Ig,Nd as Eh,Ne as Ei,Nf as zj,Ng as qk,Nh as dl,Ni as dm,Nj as nn,Nk as go,Nl as gp,Nm as eq,O as kd,Oa as Ie,Ob as Jf,Oc as Jg,Od as Fh,Oe as Fi,Of as Aj,Og as rk,Oh as el,Oi as em,Oj as on,Ok as ho,Ol as hp,Om as fq,P as ld,Pa as Je,Pb as Kf,Pc as Kg,Pd as Gh,Pe as Gi,Pf as Bj,Pg as sk,Ph as fl,Pi as fm,Pj as pn,Pk as io,Pl as ip,Pm as gq,Q as md,Qa as Ke,Qb as Lf,Qd as Hh,Qe as Hi,Qf as Cj,Qg as Ak,Qh as gl,Qi as gm,Qj as qn,Qk as jo,Ql as jp,Qm as hq,R as nd,Ra as Le,Rb as Mf,Rd as Ih,Re as Ii,Rf as Dj,Rg as Bk,Rh as hl,Ri as hm,Rj as rn,Rk as ko,Rl as kp,Rm as iq,S as od,Sa as Me,Sb as Nf,Sd as Jh,Se as Ji,Sf as Ej,Sg as Ck,Sh as il,Si as im,Sj as sn,Sk as lo,Sl as lp,Sm as jq,T as pd,Ta as Ne,Tb as Of,Td as Kh,Te as Ki,Tf as Fj,Tg as Dk,Th as jl,Ti as jm,Tj as tn,Tk as mo,Tl as mp,Tm as kq,U as qd,Ua as Oe,Ub as Pf,Uc as Lg,Ud as Lh,Ue as Li,Uf as Gj,Ug as Ek,Uh as kl,Ui as km,Uj as un,Uk as no,Ul as np,Um as lq,V as rd,Va as Pe,Vb as Qf,Vc as Mg,Vd as Mh,Ve as Mi,Vf as Hj,Vg as Fk,Vh as ll,Vi as lm,Vj as vn,Vk as oo,Vl as op,Vm as mq,W as sd,Wa as Qe,Wb as Rf,Wc as Ng,Wd as Nh,We as Ni,Wf as Ij,Wh as ml,Wi as mm,Wj as wn,Wk as po,Wl as pp,Wm as nq,Xa as Re,Xb as Sf,Xc as Og,Xd as Oh,Xe as Oi,Xg as Gk,Xh as nl,Xi as nm,Xk as qo,Xl as qp,Xm as oq,Ya as Se,Yb as Tf,Yc as Pg,Yd as Ph,Ye as Pi,Yh as ol,Yj as xn,Yk as ro,Yl as rp,Ym as pq,Za as Te,Zb as Uf,Zc as Qg,Zd as Qh,Ze as Qi,Zh as pl,Zi as om,Zk as so,Zl as sp,Zm as qq,_ as Pd,_a as Ue,_b as Vf,_c as Rg,_d as Rh,_e as Ri,_h as ql,_i as pm,_j as yn,_k as to,_l as tp,_m as rq,aa as Ud,ab as We,ac as Xf,ad as Tg,ae as Th,af as Ti,ai as sl,aj as rm,al as vo,am as vp,an as tq,ba as Vd,bb as Xe,bc as Yf,bd as Ug,be as Uh,bf as Ui,bi as tl,bj as sm,bl as wo,bm as wp,bn as uq,c as Ac,ca as Yd,cb as Ye,cc as Zf,cd as Vg,ce as Vh,cf as Vi,ci as ul,cj as tm,cl as xo,cm as xp,cn as vq,d as Bc,da as Zd,db as Ze,dc as _f,dd as Wg,de as Wh,df as Wi,di as vl,dj as um,dl as yo,dm as yp,e as Cc,ea as _d,eb as _e,ec as $f,ed as Xg,ee as Xh,ef as Xi,eg as Jj,ei as wl,ej as vm,el as zo,em as zp,f as Dc,fa as $d,fb as $e,fc as ag,fd as Yg,fe as Yh,ff as Yi,fg as Kj,fi as xl,fj as wm,fk as zn,fl as Ao,fm as Ap,g as Ec,ga as ae,gb as af,gc as bg,gd as Zg,ge as Zh,gf as Zi,gg as Lj,gi as yl,gj as xm,gk as An,gl as Bo,gm as Bp,h as Fc,ha as be,hb as bf,hc as cg,hd as _g,he as _h,hf as _i,hg as Mj,hi as zl,hj as ym,hk as Bn,hl as Co,hm as Cp,i as Gc,ia as ce,ib as cf,ic as dg,id as $g,ie as $h,if as $i,ig as Nj,ii as Al,ij as zm,ik as Cn,il as Do,im as Dp,j as Hc,ja as de,jb as df,jc as eg,jd as ah,je as ai,jf as aj,jg as Oj,ji as Bl,jj as Am,jk as Dn,jl as Eo,k as Ic,ka as ee,kb as ef,kc as fg,kd as bh,ke as bi,kf as bj,kg as Pj,ki as Cl,kj as Bm,kk as En,kl as Fo,km as Ep,l as Jc,la as fe,lb as ff,lc as gg,ld as ch,le as ci,lg as Qj,li as Dl,lj as Cm,lk as Fn,ll as Go,lm as Fp,m as Kc,ma as ge,mb as gf,mc as hg,md as dh,me as di,mg as Rj,mi as El,mj as Dm,mk as Gn,ml as Ho,mm as Gp,n as Lc,na as he,nb as hf,nc as ig,nd as eh,ne as ei,ng as Sj,nh as Hk,ni as Fl,nj as Em,nk as Hn,nl as Io,nm as Hp,o as Mc,oa as ie,ob as jf,oc as jg,od as fh,oe as fi,og as Tj,oh as Ik,oi as Gl,oj as Fm,ok as In,ol as Jo,om as Ip,p as Nc,pa as je,pb as kf,pc as kg,pd as gh,pe as gi,pg as Uj,ph as Jk,pi as Hl,pj as Gm,pk as Jn,pl as Ko,pm as Jp,q as Oc,qa as ke,qb as lf,qc as lg,qd as hh,qe as hi,qf as cj,qg as Vj,qh as Kk,qi as Il,qj as Hm,qk as Kn,ql as Lo,r as Pc,ra as le,rb as mf,rc as mg,rd as ih,re as ii,rf as dj,rg as Wj,rh as Lk,ri as Jl,rj as Im,rk as Ln,rl as Mo,rm as Kp,s as Qc,sa as me,sb as nf,sc as ng,sd as jh,se as ji,sf as ej,sg as Xj,sh as Mk,si as Kl,sj as Tm,sk as Mn,sl as No,sm as Lp,t as Rc,ta as ne,tb as of,tc as og,td as kh,te as ki,tf as fj,tg as Yj,th as Nk,ti as Ll,tj as Um,tk as Nn,tl as Oo,tm as Mp,u as Sc,ua as oe,ub as pf,uc as pg,ud as lh,ue as li,uf as gj,ug as Zj,ui as Ml,uj as Vm,uk as On,ul as Po,um as Np,v as Tc,va as pe,vb as qf,vc as qg,vd as mh,ve as mi,vf as hj,vg as _j,vi as Nl,vj as Wm,vk as Pn,vl as Qo,vm as Op,w as Uc,wa as qe,wb as rf,wc as rg,wd as nh,we as ni,wf as ij,wg as $j,wh as Ok,wi as Ol,wj as Xm,wk as Qn,wl as Ro,wm as Pp,x as Vc,xa as re,xb as sf,xc as sg,xd as oh,xe as oi,xf as jj,xg as ak,xh as Pk,xi as Pl,xj as Ym,xk as Rn,xl as So,xm as Qp,y as Wc,ya as se,yb as tf,yc as tg,yd as ph,ye as pi,yf as kj,yg as bk,yh as Qk,yi as Ql,yj as Zm,yk as Sn,yl as To,ym as Rp,z as Xc,za as te,zb as uf,zc as ug,zd as qh,ze as qi,zf as lj,zg as ck,zh as Rk,zi as Rl,zj as _m,zk as Tn,zl as Uo,zm as Sp}from"./chunk-YYIHO5TB.js";import{$ as I,$a as za,$b as zb,$c as ec,$d as yk,A as h,Aa as _,Ab as _a,Ad as xd,B as i,Ba as $,Bb as $a,Bd as yd,C as j,Ca as aa,Cb as ab,Cd as zd,D as k,Da as ba,Db as bb,Dd as Ad,E as l,Ea as ca,Eb as cb,Ed as Bd,F as m,Fa as da,Fb as db,Fd as Cd,G as n,Ga as ea,Gb as eb,Gd as Dd,H as o,Ha as fa,Hb as fb,Hd as Ed,I as p,Ia as ga,Ib as gb,Id as Fd,J as q,Ja as ha,Jb as hb,Jc as Ob,Jd as Gd,K as r,Ka as ia,Kb as ib,Kc as Pb,Kd as Hd,L as s,La as ja,Lb as jb,Lc as Qb,Ld as Id,M as t,Ma as ka,Mb as kb,Mc as Rb,Md as Jd,N as u,Na as la,Nb as lb,Nc as Sb,Nd as Kd,O as v,Oa as ma,Ob as mb,Oc as Tb,Od as Ld,P as w,Pa as na,Pb as nb,Pc as Ub,Pd as Md,Q as x,Qa as oa,Qb as ob,Qc as Vb,Qd as Nd,R as y,Ra as pa,Rb as pb,Rc as Wb,Rd as Od,S as z,Sa as qa,Sb as qb,Sc as Xb,Sd as Qd,T as A,Ta as ra,Tb as rb,Tc as Yb,Td as Rd,U as B,Ua as sa,Ub as sb,Uc as Zb,Ud as Sd,V as C,Va as ta,Vb as tb,Vc as _b,W as D,Wa as ua,Wb as ub,Wc as $b,Wd as tk,X as E,Xa as va,Xb as vb,Xc as ac,Xd as uk,Y as F,Ya as wa,Yb as wb,Yc as bc,Yd as vk,Z as G,Za as xa,Zb as xb,Zc as cc,Zd as wk,_ as H,_a as ya,_b as yb,_c as dc,_d as xk,aa as J,ab as Aa,ac as Ab,ad as fc,ae as zk,b as a,ba as K,bb as Ba,bc as Bb,bd as gc,be as Jm,c as b,ca as L,cb as Ca,cc as Cb,cd as hc,ce as Km,d as c,da as M,db as Da,dc as Db,dd as ic,de as Lm,ea as N,eb as Ea,ec as Eb,ed as jc,ee as Mm,fa as O,fb as Fa,fc as Fb,fd as kc,fe as Nm,ga as P,gb as Ga,gc as Gb,gd as lc,ge as Om,h as d,ha as Q,hb as Ha,hc as Hb,hd as mc,he as Pm,i as e,ia as R,ib as Ia,ic as Ib,id as nc,ie as Qm,j as f,ja as S,jb as Ja,jd as oc,je as Rm,k as g,kb as Ka,kd as pc,ke as Sm,lb as La,lc as Jb,ld as qc,mb as Ma,mc as Kb,md as rc,na as T,nb as Na,nc as Lb,nd as sc,ob as Oa,oc as Mb,pb as Pa,pc as Nb,pd as tc,qb as Qa,qd as uc,rb as Ra,rd as vc,sb as Sa,sd as wc,tb as Ta,td as xc,ua as U,ub as Ua,ud as yc,va as V,vb as Va,vd as zc,wa as W,wb as Wa,wd as td,xa as X,xb as Xa,xd as ud,ya as Y,yb as Ya,yd as vd,za as Z,zb as Za,zd as wd}from"./chunk-ALYGAQ7G.js";import"./chunk-TWIC4BKL.js";import"./chunk-JAFVB6DI.js";import{b as Wd,c as Xd}from"./chunk-A5A5SUZN.js";import"./chunk-YUXORC52.js";export{tb as ACTIVATE_SKILL_TOOL_NAME,ko as ADMIN_POLICY_TIER,po as ALLOWED_MCP_SERVER_PRIORITY,no as ALLOWED_TOOLS_FLAG_PRIORITY,qc as ALL_BUILTIN_TOOL_NAMES,qo as ALWAYS_ALLOW_PRIORITY,o as ALWAYS_ALLOW_PRIORITY_FRACTION,p as ALWAYS_ALLOW_PRIORITY_OFFSET,fc as ASK_USER_DISPLAY_NAME,Eb as ASK_USER_OPTION_PARAM_DESCRIPTION,Db as ASK_USER_OPTION_PARAM_LABEL,wb as ASK_USER_PARAM_QUESTIONS,yb as ASK_USER_QUESTION_PARAM_HEADER,Bb as ASK_USER_QUESTION_PARAM_MULTI_SELECT,Ab as ASK_USER_QUESTION_PARAM_OPTIONS,Cb as ASK_USER_QUESTION_PARAM_PLACEHOLDER,xb as ASK_USER_QUESTION_PARAM_QUESTION,zb as ASK_USER_QUESTION_PARAM_TYPE,vb as ASK_USER_TOOL_NAME,Ep as AbortError,Id as AccountSuspendedError,ug as ActionStatus,Nk as ActivateSkillTool,oh as ActivityDetector,Bh as ActivityMonitor,Ah as ActivityType,yg as AdminControlsSettingsSchema,im as AfterAgentHookOutput,hm as AfterModelHookOutput,Ml as AgentExecutionBlockedError,Ll as AgentExecutionStoppedError,sn as AgentLoadError,Pp as AgentSession,dn as AgentTerminateMode,pf as ApiErrorEvent,lh as ApiKeyUpdatedEvent,of as ApiRequestEvent,te as ApiRequestPhase,qf as ApiResponseEvent,l as ApprovalMode,tl as AskUserInvocation,sl as AskUserTool,Zo as AuthProviderType,lk as AuthType,Jc as BINARY_EXTENSIONS,Bc as BINARY_FILE_PATTERNS,Kd as BadRequestError,u as BaseDeclarativeTool,uj as BaseLlmClient,s as BaseToolInvocation,fm as BeforeModelHookOutput,em as BeforeToolHookOutput,gm as BeforeToolSelectionHookOutput,Tj as CODE_ASSIST_API_VERSION,Sj as CODE_ASSIST_ENDPOINT,Dc as COMMON_DIRECTORY_EXCLUDES,Ac as COMMON_IGNORE_PATTERNS,Vj as CacheService,Gd as CanceledError,Ld as ChangeAuthRequestedError,Zg as ChatRecordingService,Og as ClearcutLogger,bj as CloseDiffRequestSchema,Uj as CodeAssistServer,Uk as ColorMode,Rl as CompressionStatus,$o as Config,_o as ConfigSchema,Yl as ConfigSource,sf as ConsecaPolicyGenerationEvent,tf as ConsecaVerdictEvent,Tm as ContextManager,Af as ConversationFinishedEvent,tg as ConversationInteractionInteraction,Qd as CoreEvent,Rd as CoreEventEmitter,Ud as CoreToolCallStatus,hh as CreditPurchaseClickEvent,jh as CreditsUsedEvent,tc as DEFAULT_CONTEXT_FILENAME,eo as DEFAULT_CORE_POLICIES_DIR,Mc as DEFAULT_ENCODING,Gn as DEFAULT_FAST_ACK_MODEL_CONFIG_KEY,Gc as DEFAULT_FILE_EXCLUDES,uk as DEFAULT_FILE_FILTERING_OPTIONS,ha as DEFAULT_GEMINI_EMBEDDING_MODEL,$ as DEFAULT_GEMINI_FLASH_LITE_MODEL,_ as DEFAULT_GEMINI_FLASH_MODEL,Z as DEFAULT_GEMINI_MODEL,ca as DEFAULT_GEMINI_MODEL_AUTO,Ci as DEFAULT_GUI_EDITOR,oj as DEFAULT_MAX_ATTEMPTS,Hn as DEFAULT_MAX_INPUT_CHARS,Lb as DEFAULT_MAX_LINES_TEXT_FILE,In as DEFAULT_MAX_OUTPUT_CHARS,gn as DEFAULT_MAX_TIME_MINUTES,fn as DEFAULT_MAX_TURNS,tk as DEFAULT_MEMORY_FILE_FILTERING_OPTIONS,Im as DEFAULT_MODEL_CONFIGS,Nh as DEFAULT_OTLP_ENDPOINT,go as DEFAULT_POLICY_TIER,en as DEFAULT_QUERY_STRING,Mh as DEFAULT_TELEMETRY_TARGET,ia as DEFAULT_THINKING_MODE,Wl as DEFAULT_TOKEN_LIMIT,Xo as DEFAULT_TRUNCATE_TOOL_OUTPUT_THRESHOLD,pc as DISCOVERED_TOOL_PREFIX,sb as DOCS_PARAM_PATH,t as DeclarativeTool,dm as DefaultHookOutput,Vb as DiscoveredMCPTool,Ub as DiscoveredMCPToolInvocation,rk as DiscoveredTool,Fi as EDITOR_DISPLAY_NAMES,ec as EDIT_DISPLAY_NAME,bb as EDIT_PARAM_ALLOW_MULTIPLE,_a as EDIT_PARAM_INSTRUCTION,ab as EDIT_PARAM_NEW_STRING,$a as EDIT_PARAM_OLD_STRING,Za as EDIT_TOOL_NAME,Xb as EDIT_TOOL_NAMES,Hb as ENTER_PLAN_MODE_TOOL_NAME,kh as EVENT_API_KEY_UPDATED,ih as EVENT_CREDITS_USED,gh as EVENT_CREDIT_PURCHASE_CLICK,eh as EVENT_EMPTY_WALLET_MENU_SHOWN,ah as EVENT_OVERAGE_MENU_SHOWN,ch as EVENT_OVERAGE_OPTION_SELECTED,mo as EXCLUDE_TOOLS_FLAG_PRIORITY,Fb as EXIT_PLAN_MODE_TOOL_NAME,Gb as EXIT_PLAN_PARAM_PLAN_FILENAME,ho as EXTENSION_POLICY_TIER,Bj as EditTool,fh as EmptyWalletMenuShownEvent,lf as EndSessionEvent,Xk as ExecutionLifecycleService,Dp as ExitCodes,Tn as ExperimentFlags,If as ExtensionDisableEvent,Gf as ExtensionEnableEvent,Cf as ExtensionInstallEvent,ep as ExtensionIntegrityDataSchema,ip as ExtensionIntegrityManager,fp as ExtensionIntegrityMapSchema,yo as ExtensionLoader,Ef as ExtensionUninstallEvent,Ff as ExtensionUpdateEvent,pj as FETCH_FAILED_MESSAGE,Pf as FORCE_FILE_STORAGE_ENV_VAR,pn as FRONTMATTER_REGEX,zd as FatalAuthenticationError,Fd as FatalCancellationError,Cd as FatalConfigError,yd as FatalError,Ad as FatalInputError,Bd as FatalSandboxError,Ed as FatalToolExecutionError,Dd as FatalTurnLimitedError,zg as FetchAdminControlsResponseSchema,dl as FetchError,Ek as FileDiscoveryService,Hc as FileExclusions,pe as FileOperation,Wi as FileSchema,Gp as FileSearchFactory,rf as FlashFallbackEvent,Kp as FolderTrustDiscoveryService,Hd as ForbiddenError,Ag as G1_CREDIT_TYPE,Eg as G1_UTM_CAMPAIGNS,Qi as GEMINI_CLI_COMPANION_EXTENSION_NAME,Yk as GEMINI_CLI_IDENTIFICATION_ENV_VAR,Zk as GEMINI_CLI_IDENTIFICATION_ENV_VAR_VALUE,G as GEMINI_DIR,vk as GEMINI_IGNORE_FILE_NAME,da as GEMINI_MODEL_ALIAS_AUTO,fa as GEMINI_MODEL_ALIAS_FLASH,ga as GEMINI_MODEL_ALIAS_FLASH_LITE,ea as GEMINI_MODEL_ALIAS_PRO,ae as GEN_AI_AGENT_DESCRIPTION,$d as GEN_AI_AGENT_NAME,ne as GEN_AI_CONVERSATION_ID,be as GEN_AI_INPUT_MESSAGES,_d as GEN_AI_OPERATION_NAME,ce as GEN_AI_OUTPUT_MESSAGES,fe as GEN_AI_PROMPT_NAME,de as GEN_AI_REQUEST_MODEL,ee as GEN_AI_RESPONSE_MODEL,le as GEN_AI_SYSTEM_INSTRUCTIONS,he as GEN_AI_TOOL_CALL_ID,me as GEN_AI_TOOL_DEFINITIONS,ie as GEN_AI_TOOL_DESCRIPTION,ge as GEN_AI_TOOL_NAME,je as GEN_AI_USAGE_INPUT_TOKENS,ke as GEN_AI_USAGE_OUTPUT_TOKENS,rb as GET_INTERNAL_DOCS_TOOL_NAME,hc as GLOB_DISPLAY_NAME,Da as GLOB_TOOL_NAME,H as GOOGLE_ACCOUNTS_FILENAME,pd as GOVERNANCE_FILES,jc as GREP_DISPLAY_NAME,Ma as GREP_PARAM_AFTER,Na as GREP_PARAM_BEFORE,La as GREP_PARAM_CONTEXT,Ga as GREP_PARAM_EXCLUDE_PATTERN,Ka as GREP_PARAM_FIXED_STRINGS,Fa as GREP_PARAM_INCLUDE_PATTERN,Ia as GREP_PARAM_MAX_MATCHES_PER_FILE,Ha as GREP_PARAM_NAMES_ONLY,Oa as GREP_PARAM_NO_IGNORE,Ja as GREP_PARAM_TOTAL_MAX_MATCHES,Ea as GREP_TOOL_NAME,Rg as GcpLogExporter,Qg as GcpMetricExporter,Pg as GcpTraceExporter,Nl as GeminiChat,oe as GeminiCliOperation,nm as GeminiClient,Ql as GeminiEventType,ue as GenAiOperationName,ve as GenAiProviderName,we as GenAiTokenType,Bk as GitIgnoreParser,om as GitService,Lk as GlobTool,Gk as GrepTool,$l as HOOKS_CONFIG_FIELDS,sh as HighWaterMarkTracker,_m as HookAggregator,an as HookEventHandler,_l as HookEventName,$m as HookPlanner,Ym as HookRegistry,Zm as HookRunner,bn as HookSystem,am as HookType,cj as IDEConnectionStatus,Lg as IDE_DEFINITIONS,Ri as IDE_MAX_OPEN_FILES,Si as IDE_MAX_SELECTED_TEXT_LENGTH,Ti as IDE_REQUEST_TIMEOUT_MS,qj as INCOMPLETE_JSON_MESSAGE,Dl as INITIAL_HISTORY_LENGTH,wk as INTEGRITY_FILENAME,xk as INTEGRITY_KEY_FILENAME,dj as IdeClient,zf as IdeConnectionEvent,yf as IdeConnectionType,Yi as IdeContextNotificationSchema,Xi as IdeContextSchema,Ui as IdeContextStore,Zi as IdeDiffAcceptedNotificationSchema,$i as IdeDiffClosedNotificationSchema,_i as IdeDiffRejectedNotificationSchema,m as InProcessCheckerType,Zj as IneligibleTierError,qg as IneligibleTierReasonCode,vg as InitiationMethod,$n as InjectionService,hp as IntegrityDataStatus,cp as IntegrityStatus,gp as IntegrityStoreSchema,Kl as InvalidStreamError,ap as JsonFormatter,Hm as JsonStreamEventType,yk as KEYCHAIN_SERVICE_NAME,Nf as KEYCHAIN_TEST_PREFIX,Mf as KeychainSchema,Qf as KeychainService,Rf as KeychainTokenStorage,D as Kind,Ak as LSTool,ic as LS_DISPLAY_NAME,Qa as LS_PARAM_IGNORE,Pa as LS_TOOL_NAME,_p as LegacyAgentSession,jf as LlmRole,Sn as LocalAgentExecutor,rd as LocalSandboxManager,zp as Logger,dk as LoggingContentGenerator,Nb as MAX_FILE_SIZE_MB,Mb as MAX_LINE_LENGTH_TEXT_FILE,Do as MCPDiscoveryState,Ao as MCPOAuthProvider,yn as MCPOAuthTokenStorage,Yo as MCPServerConfig,Co as MCPServerStatus,Bo as MCP_DEFAULT_TIMEOUT_MSEC,lo as MCP_EXCLUDED_PRIORITY,Ob as MCP_QUALIFIED_NAME_SEPARATOR,Pb as MCP_TOOL_PREFIX,Cc as MEDIA_FILE_PATTERNS,qb as MEMORY_PARAM_FACT,uc as MEMORY_SECTION_HEADER,pb as MEMORY_TOOL_NAME,Hg as MIN_CREDIT_BALANCE,E as MUTATOR_KINDS,Eo as McpClient,xg as McpConfigDefinitionSchema,re as MemoryMetricType,uh as MemoryMonitor,zc as MemoryTool,Wm as MessageBus,h as MessageBusType,wp as MessageSenderType,hj as ModelNotFoundError,Hf as ModelSlashCommandEvent,Bi as NO_EDITOR_AVAILABLE_ERROR,Bf as NetworkRetryAttemptEvent,qd as NoopSandboxManager,jm as NotificationType,xn as OAuthUtils,al as OUTPUT_UPDATE_INTERVAL_MS,Bg as OVERAGE_ELIGIBLE_MODELS,sg as OnboardUserStatusCode,Kf as OnboardingStartEvent,Lf as OnboardingSuccessEvent,aj as OpenDiffRequestSchema,Gm as OutputFormat,bh as OverageMenuShownEvent,dh as OverageOptionSelectedEvent,ya as PARAM_CASE_SENSITIVE,Ca as PARAM_DESCRIPTION,wa as PARAM_DIR_PATH,Ba as PARAM_FILE_FILTERING_OPTIONS,va as PARAM_FILE_PATH,xa as PARAM_PATTERN,Aa as PARAM_RESPECT_GEMINI_IGNORE,za as PARAM_RESPECT_GIT_IGNORE,Ib as PLAN_MODE_PARAM_REASON,rc as PLAN_MODE_TOOLS,W as PREVIEW_GEMINI_3_1_CUSTOM_TOOLS_MODEL,Y as PREVIEW_GEMINI_3_1_FLASH_LITE_MODEL,V as PREVIEW_GEMINI_3_1_MODEL,X as PREVIEW_GEMINI_FLASH_MODEL,U as PREVIEW_GEMINI_MODEL,ba as PREVIEW_GEMINI_MODEL_AUTO,n as PRIORITY_SUBAGENT_TOOL,q as PRIORITY_YOLO_ALLOW_ALL,Ec as PYTHON_EXCLUDES,qe as PerformanceMetricType,vl as PlanErrorMessages,j as PolicyDecision,Xm as PolicyEngine,dp as PolicyIntegrityManager,mm as PreCompressTrigger,el as PrivateIpError,Xj as ProjectIdRequiredError,i as QuestionType,gc as READ_FILE_DISPLAY_NAME,Ta as READ_FILE_PARAM_END_LINE,Sa as READ_FILE_PARAM_START_LINE,Ra as READ_FILE_TOOL_NAME,mc as READ_MANY_FILES_DISPLAY_NAME,kb as READ_MANY_FILES_TOOL_NAME,mb as READ_MANY_PARAM_EXCLUDE,lb as READ_MANY_PARAM_INCLUDE,nb as READ_MANY_PARAM_RECURSIVE,ob as READ_MANY_PARAM_USE_DEFAULT_EXCLUDES,F as READ_ONLY_KINDS,Kb as REFERENCE_CONTENT_END,Jb as REFERENCE_CONTENT_START,Td as ROOT_SCHEDULER_ID,th as RateLimiter,Fk as ReadFileTool,$p as ReadManyFilesTool,kk as RecordingContentGenerator,Kj as ReleaseChannel,wg as RequiredMcpServerConfigSchema,qk as ResourceRegistry,jj as RetryableQuotaError,wf as RewindEvent,Jk as RipGrepTool,_k as SCROLLBACK_LIMIT,zk as SECRET_KEY_ACCOUNT,Of as SECRET_PREFIX,Zd as SERVICE_DESCRIPTION,Yd as SERVICE_NAME,Yg as SESSION_FILE_PREFIX,Va as SHELL_PARAM_COMMAND,Wa as SHELL_PARAM_IS_BACKGROUND,Ua as SHELL_TOOL_NAME,$c as SHELL_TOOL_NAMES,ub as SKILL_PARAM_NAME,kn as SUBAGENT_CANCELLED_ERROR_MESSAGE,jn as SUBAGENT_REJECTED_ERROR_PREFIX,Il as SYNTHETIC_THOUGHT_SIGNATURE,Fc as SYSTEM_FILE_EXCLUDES,qm as SandboxedFileSystemService,En as Scheduler,d as SchemaValidator,af as SemanticAttributes,lm as SessionEndReason,km as SessionStartSource,$k as ShellExecutionService,cl as ShellTool,bl as ShellToolInvocation,zo as SimpleExtensionLoader,Un as SkillManager,vf as SlashCommandStatus,Xd as SpanStatusCode,pm as StandardFileSystemService,kf as StartSessionEvent,Jh as StartupProfiler,T as Storage,Hl as StreamEventType,bp as StreamJsonFormatter,hn as SubagentActivityErrorType,vm as TASK_TYPE_LABELS,gb as TODOS_ITEM_PARAM_DESCRIPTION,hb as TODOS_ITEM_PARAM_STATUS,fb as TODOS_PARAM_TODOS,Yb as TOOLS_REQUIRING_NARROWING,nc as TOOL_LEGACY_ALIASES,Zc as TOOL_OUTPUTS_DIR,bc as TRACKER_ADD_DEPENDENCY_TOOL_NAME,Zb as TRACKER_CREATE_TASK_TOOL_NAME,$b as TRACKER_GET_TASK_TOOL_NAME,ac as TRACKER_LIST_TASKS_TOOL_NAME,_b as TRACKER_UPDATE_TASK_TOOL_NAME,cc as TRACKER_VISUALIZE_TOOL_NAME,oo as TRUSTED_MCP_SERVER_PRIORITY,wm as TaskStatus,xm as TaskStatusSchema,tm as TaskType,um as TaskTypeSchema,Lh as TelemetryTarget,ij as TerminalQuotaError,Vd as ToolCallDecision,nf as ToolCallEvent,C as ToolConfirmationOutcome,b as ToolErrorType,se as ToolExecutionPhase,Dn as ToolExecutor,Df as ToolOutputTruncatedEvent,sk as ToolRegistry,Em as TrackerAddDependencyTool,Am as TrackerCreateTaskTool,Cm as TrackerGetTaskTool,Dm as TrackerListTasksTool,Um as TrackerService,ym as TrackerTaskSchema,Bm as TrackerUpdateTaskTool,Fm as TrackerVisualizeTool,Sl as Turn,mj as UPGRADE_URL_PAGE,jo as USER_POLICY_TIER,Kn as USER_STEERING_INSTRUCTION,_g as UiTelemetryService,Jd as UnauthorizedError,Pd as UserAccountManager,mf as UserPromptEvent,rg as UserTierId,aa as VALID_GEMINI_MODELS,Yj as ValidationCancelledError,kj as ValidationRequiredError,Wd as ValueType,lc as WEB_FETCH_DISPLAY_NAME,jb as WEB_FETCH_PARAM_PROMPT,ib as WEB_FETCH_TOOL_NAME,kc as WEB_SEARCH_DISPLAY_NAME,db as WEB_SEARCH_PARAM_QUERY,cb as WEB_SEARCH_TOOL_NAME,io as WORKSPACE_POLICY_TIER,dc as WRITE_FILE_DISPLAY_NAME,Ya as WRITE_FILE_PARAM_CONTENT,Xa as WRITE_FILE_TOOL_NAME,eb as WRITE_TODOS_TOOL_NAME,jq as WarningPriority,Jf as WebFetchFallbackAttemptEvent,ql as WebFetchTool,rl as WebSearchTool,nd as WindowsSandboxManager,Vm as WorkspaceContext,lq as WorktreeService,Ej as WriteFileTool,sm as WriteTodosTool,Lj as _clearCache,Go as addMCPStatusChangeListener,tp as addMemory,Ki as allowEditorTypeInSandbox,ri as appendToLastTextPart,Ap as applyAdminAllowlist,xj as applyReplacement,Bp as applyRequiredServers,yl as assumeExhaustive,kg as authEvents,Fg as buildG1Url,zm as buildTodosReturnDisplay,Tp as buildToolResponseData,Ln as buildUserSteeringHintPrompt,mh as bytesToMB,yj as calculateReplacement,Hk as canUseRipgrep,Pm as categorizeAndConcatenate,zl as checkExhaustive,lj as classifyGoogleError,sq as cleanupWorktree,jk as clearApiKey,og as clearCachedCredentialFile,fo as clearEmittedPolicyWarnings,ng as clearOauthClientCache,hf as computeModelAddedAndRemovedLines,Lm as concatenateInstructions,Oo as connectAndDiscover,Uo as connectToMcpServer,Rp as contentPartsToGeminiParts,Wk as convertColorToHex,pl as convertGithubUrlToRaw,Jp as convertSessionToClientHistory,si as convertToFunctionResponse,Ip as convertToRestPayload,Sd as coreEvents,Wj as createCache,ek as createCodeAssistContentGenerator,ok as createContentGenerator,nk as createContentGeneratorConfig,Hj as createConversationOffered,cm as createHookOutput,wo as createPolicyEngineConfig,xo as createPolicyUpdater,kl as createSafeProxyAgent,od as createSandboxManager,Hh as createSessionId,Up as createTranslationState,Vo as createTransport,Rn as createUnauthorizedToolError,Vf as createWorkingStdio,pq as createWorktree,mq as createWorktreeService,a as debugLogger,yp as decodeTagName,Jm as deduplicatePathsByFileIdentity,Nc as detectBOM,Tk as detectEncodingFromBuffer,Uc as detectFileType,Ng as detectIdeFromEnv,df as detectLineEnding,cg as disableBracketedPasteMode,_f as disableKittyKeyboardProtocol,eg as disableLineWrapping,ag as disableModifyOtherKeys,Yf as disableMouseEvents,Wf as disableMouseTracking,Mo as discoverMcpTools,Qo as discoverPrompts,Ro as discoverResources,Po as discoverTools,Cn as doesToolInvocationMatch,bg as enableBracketedPasteMode,Zf as enableKittyKeyboardProtocol,dg as enableLineWrapping,$f as enableModifyOtherKeys,Xf as enableMouseEvents,xp as encodeTagName,Ik as ensureRgPath,fg as enterAlternateScreen,N as escapePath,fd as escapeShellArg,ck as estimateContextBreakdown,md as execStreaming,gg as exitAlternateScreen,Ic as extractExtensionsFromPatterns,Wn as fetchAdminControls,Xn as fetchAdminControlsOnce,ll as fetchWithTimeout,Wc as fileExists,Fp as filter,Dk as findGitRoot,qi as flatMapTextParts,wn as flattenMemory,Qh as flushTelemetry,Nn as formatBackgroundCompletionForModel,nh as formatBytes,mp as formatCheckpointDisplayList,tq as formatForSpeech,Sb as formatMcpToolName,uo as formatPolicyError,Ij as formatProtoJsonDuration,Yc as formatTruncatedToolOutput,Mn as formatUserHintsForModel,Qp as geminiPartsToContentParts,lp as generateCheckpointFileName,Qn as generateFastAckText,On as generateSteeringAckMessage,Mp as generateSummary,Wb as generateValidName,ph as getActivityDetector,Dh as getActivityMonitor,_n as getAdminBlockedMcpServersMessage,Zn as getAdminErrorMessage,nn as getAgentCardLoadOptions,xc as getAllGeminiMdFilenames,Ko as getAllMCPServerStatuses,ro as getAlwaysAllowPriorityFraction,Al as getApprovalModeDescription,mk as getAuthTypeFromEnv,mg as getAvailablePort,Qk as getCachedEncodingForBuffer,pp as getCheckpointInfoList,Ai as getCitations,fk as getCodeAssistServer,id as getCommandRoot,jd as getCommandRoots,kq as getCompatibilityWarnings,Vl as getCompressionPrompt,jg as getConsentForOauth,Me as getConventionAttributes,Ul as getCoreSystemPrompt,Dj as getCorrectedFileContent,wc as getCurrentGeminiMdFilename,Oi as getDiffCommand,El as getDirectoryContextString,la as getDisplayString,Ji as getEditorCommand,Gi as getEditorDisplayName,Fl as getEnvironmentContext,Om as getEnvironmentMemoryPaths,wd as getErrorMessage,zj as getErrorReplaceResult,gj as getErrorStatus,xd as getErrorType,cn as getExperiments,Nm as getExtensionMemoryPaths,gf as getFileDiffFromResultDisplay,Mk as getFolderStructure,Cp as getFsErrorMessage,ui as getFunctionCalls,wi as getFunctionCallsAsJson,vi as getFunctionCallsFromParts,xi as getFunctionCallsFromPartsAsJson,Gg as getG1CreditBalance,yc as getGlobalMemoryFilePath,Mm as getGlobalMemoryPaths,bm as getHookKey,k as getHookSource,Np as getIdeInstaller,Gl as getInitialChatHistory,Lo as getMCPDiscoveryState,Op as getMCPServerPrompts,Jo as getMCPServerStatus,wh as getMemoryMonitor,lg as getOauthClient,Jj as getPackageJson,Bl as getPlanModeExitMessage,so as getPolicyDirectories,to as getPolicyTier,Lp as getPreviousSession,P as getProjectHash,nq as getProjectRootForWorktree,wj as getPromptIdWithFallback,Ok as getPty,Rc as getRealPath,Mj as getReleaseChannel,on as getRemoteAgentTargetUrl,pi as getResponseText,ti as getResponseTextFromParts,rj as getRetryErrorType,dd as getShellConfiguration,Pc as getSpecificMimeType,yi as getStructuredResponse,zi as getStructuredResponseFromParts,Rk as getSystemEncoding,oc as getToolAliases,kp as getToolCallDataSchema,Bn as getToolSuggestion,np as getTruncatedCheckpointNames,Qj as getVersion,oq as getWorktreePath,nj as handleFallback,w as hasCycleInSchema,To as hasNetworkTransport,gd as hasRedirection,y as hasSummary,Hi as hasValidEditorCommand,Ii as hasValidEditorCommandAsync,rq as hasWorktreeChanges,I as homedir,Vi as ideContextStore,Ch as initializeActivityMonitor,vh as initializeMemoryMonitor,bd as initializeShellParsers,Ph as initializeTelemetry,So as invokeMcpPrompt,vd as isAbortError,Nd as isAccountSuspendedError,ua as isActiveModel,il as isAddressPrivate,ak as isApiError,gq as isAppleTerminal,Od as isAuthenticationError,sa as isAutoModel,r as isBackgroundExecutionData,cf as isBinary,Tc as isBinaryFile,Mg as isCloudShell,ul as isCompletedAskUserTool,qa as isCustomModel,fq as isDumbTerminal,Aj as isEditToolParams,Li as isEditorAvailable,Mi as isEditorAvailableAsync,Sc as isEmpty,Wo as isEnabled,c as isFatalToolError,B as isFileDiff,pa as isGemini2Model,oa as isGemini3Model,qq as isGeminiWorktree,Ck as isGitRepository,dq as isGnuScreen,z as isGrepResult,Di as isGuiEditor,ig as isHeadlessMode,Pl as isInvalidArgumentError,bq as isJetBrainsTerminal,A as isListResult,gl as isLoopbackHost,eq as isLowColorTmux,Tb as isMcpToolAnnotation,Qb as isMcpToolName,Nj as isNightly,ud as isNodeError,Cg as isOverageEligibleModel,Xe as isPerformanceMonitoringActive,Oj as isPreview,ma as isPreviewModel,hl as isPrivateIp,jl as isPrivateIpAsync,na as isProModel,g as isRecord,sj as isRetryableError,Ol as isSchemaDepthError,Pj as isStable,bk as isStructuredError,x as isStructuredToolResult,ln as isSubagentProgress,R as isSubpath,Oh as isTelemetrySdkInitialized,Ei as isTerminalEditor,cq as isTmux,v as isTool,mn as isToolActivityError,zn as isToolCallResponseInfo,rh as isUserActive,Zl as isUserVisibleHook,Jl as isValidNonThoughtTextPart,sc as isValidToolName,ed as isWindows,aq as isWindows10,Qc as isWithinRoot,Cj as isWriteFileToolParams,e as jsonToMarkdown,jp as listExtensions,vp as listMemoryFiles,vn as loadAgentsFromDirectory,hk as loadApiKey,vo as loadExtensionPolicies,Sm as loadJitSubdirectoryMemory,bo as loadPoliciesFromToml,Qm as loadServerHierarchicalMemory,rn as loadSkillFromFile,qn as loadSkillsFromDir,Lc as loadWasmBinary,Yh as logApiError,Wh as logApiRequest,Zh as logApiResponse,ni as logBillingEvent,ci as logChatCompression,Sh as logCliConfiguration,Vg as logConsecaPolicyGeneration,Wg as logConsecaVerdict,bi as logConversationFinishedEvent,ji as logExtensionDisable,ii as logExtensionEnable,fi as logExtensionInstallEvent,gi as logExtensionUninstall,hi as logExtensionUpdateEvent,Xh as logFlashFallback,ai as logIdeConnection,ei as logModelSlashCommand,di as logNetworkRetryAttempt,li as logOnboardingStart,mi as logOnboardingSuccess,$h as logRewind,_h as logSlashCommand,Uh as logToolCall,Vh as logToolOutputTruncated,Th as logUserPrompt,ki as logWebFetchFallbackAttempt,xf as makeChatCompressionEvent,uq as makeFakeConfig,M as makeRelative,uf as makeSlashCommandEvent,Yp as mapError,Wp as mapFinishReason,Xp as mapHttpToGrpcStatus,Zp as mapUsage,un as markdownToAgentDefinition,Fo as mcpServerRequiresOAuth,Q as normalizePath,Jn as normalizeSpace,nl as normalizeUrl,ej as openBrowserSecurely,Pi as openDiff,tn as parseAgentMarkdown,Hp as parseAndFormatApiError,Sg as parseBooleanEnvFlag,cd as parseCommandDetails,td as parseGoogleApiError,Rb as parseMcpToolName,ol as parsePrompt,Tg as parseTelemetryTargetValue,Xg as parseThought,Cl as partListUnionToString,oi as partToString,Uf as patchStdio,rp as performInit,qp as performRestore,No as populateMcpServerCommand,op as processRestorableToolCalls,Vc as processSingleFileContent,vj as promptIdContext,Oc as readFileWithEncoding,Km as readGeminiMdFiles,vq as readPathFromWorkspace,ao as readPolicyFiles,Kc as readWasmBinaryFromDisk,Ae as recordApiErrorMetrics,Te as recordApiRequestBreakdown,Ze as recordApiResponseMetrics,We as recordBaselineComparison,He as recordContentRetry,Ie as recordContentRetryFailure,Fj as recordConversationOffered,Pe as recordCpuUsage,$e as recordCreditPurchaseClick,xh as recordCurrentMemoryUsage,ze as recordCustomApiResponseMetrics,ye as recordCustomTokenUsageMetrics,De as recordExitFail,Be as recordFileOperationMetric,Ce as recordFlickerFrame,Le as recordGenAiClientOperationDuration,Ke as recordGenAiClientTokenUsage,Fe as recordInvalidChunk,Oe as recordMemoryUsage,Je as recordModelRoutingMetrics,_e as recordOverageOptionSelected,Ve as recordPerformanceRegression,Ue as recordPerformanceScore,Ge as recordRetryAttemptMetrics,Ee as recordSlowRender,Ne as recordStartupPerformance,Se as recordTokenEfficiency,Ye as recordTokenUsageMetrics,Gj as recordToolCallInteractions,xe as recordToolCallMetrics,Re as recordToolExecutionBreakdown,Qe as recordToolQueueDepth,qh as recordUserActivity,up as refreshMemory,Rm as refreshServerHierarchicalMemory,Ho as removeMCPStatusChangeListener,gk as resetApiKeyCacheForTesting,Pk as resetEncodingCache,pg as resetOauthClientForTesting,_j as resetUserDataCacheForTesting,Rj as resetVersionCache,ka as resolveClassifierModel,Ni as resolveEditorAsync,ad as resolveExecutable,ja as resolveModel,Tl as resolvePathFromEnv,Ug as resolveTelemetrySettings,S as resolveToRealPath,tj as retryWithBackoff,Ih as runInDevTraceSpan,f as safeJsonToMarkdown,bf as safeLiteralReplace,ff as safeTemplateReplace,Vn as sanitizeAdminSettings,Xc as sanitizeFilenamePart,fl as sanitizeHostname,sd as sanitizePaths,ik as saveApiKey,_c as saveTruncatedToolOutput,Fn as scheduleAgentTools,Vk as serializeTerminalToObject,Gh as sessionId,vc as setGeminiMdFilename,ml as setGlobalProxy,$j as setupUser,L as shortenPath,rm as shouldAttemptBrowserLaunch,Ig as shouldAutoUseCredits,hg as shouldEnterAlternateScreen,An as shouldHideToolCall,fj as shouldLaunchBrowser,Kg as shouldShowEmptyWalletMenu,Jg as shouldShowOverageMenu,sp as showMemory,Rh as shutdownTelemetry,Kk as sortFileEntries,ld as spawnAsync,hd as splitCommands,Eh as startGlobalActivityMonitoring,yh as startGlobalMemoryMonitoring,Kh as startupProfiler,Yn as stopAdminControlsPolling,Fh as stopGlobalActivityMonitoring,zh as stopGlobalMemoryMonitoring,kd as stripShellWrapper,hq as supports256Colors,ra as supportsModernFeatures,ta as supportsMultimodalFunctionResponse,iq as supportsTrueColor,K as tildeifyPath,J as tmpdir,Md as toFriendlyError,Xl as tokenLimit,Sp as toolResultDisplayToContentParts,Vp as translateEvent,Pn as truncateFastAckInput,ef as truncateString,$g as uiTelemetryService,O as unescapePath,Io as updateMCPServerStatus,pk as validateBaseUrl,co as validateMcpPolicyToolNames,xl as validatePlanContent,wl as validatePlanPath,Sk as windowsCodePageToEncoding,Dg as wrapInAccountChooser,Tf as writeToStderr,Sf as writeToStdout};
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
const require = (await import('node:module')).createRequire(import.meta.url); const __chunk_filename = (await import('node:url')).fileURLToPath(import.meta.url); const __chunk_dirname = (await import('node:path')).dirname(__chunk_filename);
|
|
2
|
-
import"./chunk-
|
|
3
|
-
`;M.promises.appendFile(o,p).catch(a=>{d.error("Failed to write to activity log:",a)})}catch(p){d.error("Failed to prepare activity log entry:",p)}};s.on("console",i=>r("console",i)),s.on("network",i=>r("network",i))}function Y(s,e,t,o,n){let r=[],i=null,l=null,p=null,a=null,h=0,k=2,b=()=>{try{i=new S(`ws://${e}:${t}/ws`),i.on("open",()=>{d.debug(`WebSocket connected to ${e}:${t}`),h=0,m({type:"register",sessionId:o.getSessionId(),timestamp:Date.now()})}),i.on("message",c=>{try{let f=JSON.parse(c.toString());typeof f=="object"&&f!==null&&"type"in f&&typeof f.type=="string"&&y({type:f.type,sessionId:"sessionId"in f&&typeof f.sessionId=="string"?f.sessionId:void 0})}catch(f){d.debug("Invalid WebSocket message:",f)}}),i.on("close",()=>{d.debug(`WebSocket disconnected from ${e}:${t}`),v(),g()}),i.on("error",c=>{d.debug("WebSocket error:",c)})}catch(c){d.debug("Failed to connect WebSocket:",c),g()}},y=c=>{switch(c.type){case"registered":p=c.sessionId||null,d.debug(`WebSocket session registered: ${p}`),a&&clearInterval(a),a=setInterval(()=>{m({type:"pong",timestamp:Date.now()})},15e3),A();break;case"ping":m({type:"pong",timestamp:Date.now()});break;default:break}},m=c=>{i&&i.readyState===S.OPEN&&i.send(JSON.stringify(c))},L=(c,f)=>{let w={type:c,payload:f,sessionId:p||o.getSessionId(),timestamp:Date.now()};if(!i||i.readyState!==S.OPEN||!s.isNetworkLoggingEnabled()){r.push(w),r.length>te&&r.shift();return}m(w)},A=()=>{if(!i||i.readyState!==S.OPEN||!s.isNetworkLoggingEnabled())return;let{network:c,console:f}=s.drainBufferedLogs(),w=[...c.map(u=>({type:"network",payload:u,timestamp:"timestamp"in u&&u.timestamp?u.timestamp:Date.now()})),...f.map(u=>({type:"console",payload:u,timestamp:u.timestamp}))].sort((u,I)=>u.timestamp-I.timestamp);d.debug(`Flushing ${w.length} initial buffered logs and ${r.length} transport buffered logs...`);for(let u of w)m({type:u.type,payload:u.payload,sessionId:p||o.getSessionId(),timestamp:Date.now()});for(;r.length>0;){let u=r.shift();m(u)}},v=()=>{a&&(clearInterval(a),a=null),i=null},g=()=>{if(!l){if(h++,h>k&&n){d.debug(`WebSocket reconnect failed after ${k} attempts, promoting to server...`),n();return}l=setTimeout(()=>{l=null,d.debug("Reconnecting WebSocket..."),b()},1e3)}};b(),s.on("console",c=>L("console",c)),s.on("network",c=>L("network",c)),s.on("network-logging-enabled",()=>{d.debug("Network logging enabled, flushing buffer..."),A()}),process.on("exit",()=>{l&&clearTimeout(l),i&&i.close(),v()})}var X=!1;function ne(s){X||(X=!0,_.on("console-log",e=>{s.logConsole(e)}))}function H(s,e){let t=N.getInstance();t.enable(),e.mode==="network"?(Y(t,e.host,e.port,s,e.onReconnectFailed),t.enableNetworkLogging()):e.mode==="file"&&se(t,s,e.filePath),ne(t)}function C(s,e,t,o){let n=N.getInstance();Y(n,e,t,s,o)}var T=25417,E="127.0.0.1",Z=3,U=0,R=null,B=null;function j(s,e){return new Promise(t=>{let o=new S(`ws://${s}:${e}/ws`),n=setTimeout(()=>{o.close(),t(!1)},500);o.on("open",()=>{clearTimeout(n),o.close(),t(!0)}),o.on("error",()=>{clearTimeout(n),o.close(),t(!1)})})}async function K(s,e){let o=(await import("@google/gemini-cli-devtools")).DevTools.getInstance(),n=await o.start(),r=o.getPort();return r===e?(d.log(`DevTools available at: ${n}`),{host:s,port:r}):await j(s,e)?(await o.stop(),d.log(`DevTools (existing) at: http://${s}:${e}`),{host:s,port:e}):(d.log(`DevTools available at: ${n}`),{host:s,port:r})}async function F(s){if(U++,U>Z){d.debug(`Giving up on DevTools promotion after ${Z} attempts`);return}try{let e=await K(E,T);C(s,e.host,e.port,()=>F(s))}catch(e){d.debug("Failed to promote to DevTools server:",e)}}async function ke(s){let e=process.env.GEMINI_CLI_ACTIVITY_LOG_TARGET;if(e){if(!s.storage)return;H(s,{mode:"file",filePath:e})}else{H(s,{mode:"buffer"});try{await j(E,T)&&(C(s,E,T,()=>F(s)),N.getInstance().enableNetworkLogging(),B=`http://localhost:${T}`,d.log(`DevTools (existing) at startup: ${B}`))}catch{}}}function re(s){return B?Promise.resolve(B):R||(R=ie(s).catch(e=>{throw R=null,e}),R)}async function ie(s){let e=()=>F(s),t=await j(E,T),o=E,n=T;if(t)d.log(`DevTools (existing) at: http://${E}:${T}`);else try{let l=await K(E,T);o=l.host,n=l.port}catch(l){throw d.debug("Failed to start DevTools:",l),l}C(s,o,n,e),N.getInstance().enableNetworkLogging();let i=`http://localhost:${n}`;return B=i,i}async function ve(s,e,t,o){if(e){t();return}try{let{openBrowserSecurely:n,shouldLaunchBrowser:r}=await import("./core-
|
|
2
|
+
import"./chunk-YYIHO5TB.js";import{Ud as _,b as d}from"./chunk-ALYGAQ7G.js";import{b as S}from"./chunk-TWIC4BKL.js";import"./chunk-JAFVB6DI.js";import"./chunk-A5A5SUZN.js";import"./chunk-YUXORC52.js";import z from"node:http";import G from"node:https";import J from"node:zlib";import M from"node:fs";import V from"node:path";import{EventEmitter as ee}from"node:events";var O="x-activity-request-id",te=100;function oe(s){return!Array.isArray(s)}function P(s){return typeof s=="object"&&s!==null&&!(s instanceof URL)&&!Array.isArray(s)}function $(s){return typeof s=="function"}function x(s,e){if(e.length===0)return s({});if(e.length===1){let t=e[0];return typeof t=="string"||t instanceof URL||P(t)?s(t):s({})}if(e.length===2){let t=e[0],o=e[1];if((typeof t=="string"||t instanceof URL)&&($(o)||P(o))||P(t)&&$(o))return s(t,o)}if(e.length===3){let t=e[0],o=e[1],n=e[2];if((typeof t=="string"||t instanceof URL)&&P(o)&&$(n))return s(t,o,n)}return s({})}var N=class s extends ee{static instance;isInterceptionEnabled=!1;requestStartTimes=new Map;networkLoggingEnabled=!1;networkBufferMap=new Map;networkBufferIds=[];consoleBuffer=[];bufferLimit=10;static getInstance(){return s.instance||(s.instance=new s),s.instance}enableNetworkLogging(){this.networkLoggingEnabled=!0,this.emit("network-logging-enabled")}disableNetworkLogging(){this.networkLoggingEnabled=!1}isNetworkLoggingEnabled(){return this.networkLoggingEnabled}drainBufferedLogs(){let e=[];for(let o of this.networkBufferIds){let n=this.networkBufferMap.get(o);n&&e.push(...n)}let t=[...this.consoleBuffer];return this.networkBufferMap.clear(),this.networkBufferIds=[],this.consoleBuffer=[],{network:e,console:t}}getBufferedLogs(){let e=[];for(let t of this.networkBufferIds){let o=this.networkBufferMap.get(t);o&&e.push(...o)}return{network:e,console:[...this.consoleBuffer]}}clearBufferedLogs(){this.networkBufferMap.clear(),this.networkBufferIds=[],this.consoleBuffer=[]}stringifyHeaders(e){let t={};if(!e)return t;if(e instanceof Headers)e.forEach((o,n)=>{t[n.toLowerCase()]=o});else if(typeof e=="object"&&e!==null)for(let[o,n]of Object.entries(e))t[o.toLowerCase()]=Array.isArray(n)?n.join(", "):String(n);return t}sanitizeNetworkLog(e){if(!e||typeof e!="object")return e;let t={...e};if("headers"in t&&t.headers){let o={...t.headers};for(let n of Object.keys(o))["authorization","cookie","x-goog-api-key"].includes(n.toLowerCase())&&(o[n]="[REDACTED]");t.headers=o}if("response"in t&&t.response?.headers){let o={...t.response.headers};for(let n of Object.keys(o))["set-cookie"].includes(n.toLowerCase())&&(o[n]="[REDACTED]");t.response={...t.response,headers:o}}return t}emitNetworkEvent(e){this.safeEmitNetwork(e)}safeEmitNetwork(e){let t=this.sanitizeNetworkLog(e),o=t.id;if(!this.networkBufferMap.has(o)&&(this.networkBufferIds.push(o),this.networkBufferMap.set(o,[]),this.networkBufferIds.length>this.bufferLimit)){let n=this.networkBufferIds.shift();this.networkBufferMap.delete(n)}this.networkBufferMap.get(o).push(t),this.emit("network",t)}enable(){this.isInterceptionEnabled||(this.isInterceptionEnabled=!0,this.patchGlobalFetch(),this.patchNodeHttp())}patchGlobalFetch(){if(!global.fetch)return;let e=global.fetch;global.fetch=async(t,o)=>{let n=typeof t=="string"?t:t instanceof URL?t.toString():t.url;if(n.includes("127.0.0.1")||n.includes("localhost"))return e(t,o);let r=Math.random().toString(36).substring(7),i=(o?.method||"GET").toUpperCase(),l={...o},p=new Headers(o?.headers||{});p.set(O,r),l.headers=p;let a="";o?.body&&(typeof o.body=="string"?a=o.body:o.body instanceof URLSearchParams&&(a=o.body.toString())),this.requestStartTimes.set(r,Date.now()),this.safeEmitNetwork({id:r,timestamp:Date.now(),method:i,url:n,headers:this.stringifyHeaders(l.headers),body:a,pending:!0});try{let h=await e(t,l),k=h.clone();if(k.body){let b=k.body.getReader(),y=new TextDecoder,m=[],L=0;(async()=>{try{for(;;){let{done:c,value:f}=await b.read();if(c)break;let w=y.decode(f,{stream:!0});m.push(w),this.safeEmitNetwork({id:r,pending:!0,chunk:{index:L++,data:w,timestamp:Date.now()}})}let v=this.requestStartTimes.get(r),g=v?Date.now()-v:0;this.requestStartTimes.delete(r),this.safeEmitNetwork({id:r,pending:!1,response:{status:h.status,headers:this.stringifyHeaders(h.headers),body:m.join(""),durationMs:g}})}catch(v){let g=v instanceof Error?v.message:String(v);this.safeEmitNetwork({id:r,pending:!1,error:`Failed to read response body: ${g}`})}})()}else k.text().then(b=>{let y=this.requestStartTimes.get(r),m=y?Date.now()-y:0;this.requestStartTimes.delete(r),this.safeEmitNetwork({id:r,pending:!1,response:{status:h.status,headers:this.stringifyHeaders(h.headers),body:b,durationMs:m}})}).catch(b=>{let y=b instanceof Error?b.message:String(b);this.safeEmitNetwork({id:r,pending:!1,error:`Failed to read response body: ${y}`})});return h}catch(h){this.requestStartTimes.delete(r);let k=h instanceof Error?h.message:String(h);throw this.safeEmitNetwork({id:r,pending:!1,error:k}),h}}}patchNodeHttp(){let e=this,t=z.request,o=G.request,n=(r,i,l)=>{let p=i[0],a;typeof p=="string"||p instanceof URL?a=p:p&&typeof p=="object"?a=P(p)?p:{}:a={};let h="";if(typeof a=="string"?h=a:a instanceof URL?h=a.href:h=("href"in a&&typeof a.href=="string"?a.href:"")||`${l}//${a.hostname||a.host||"localhost"}${a.path||"/"}`,h.includes("127.0.0.1")||h.includes("localhost"))return x(r,i);let k=typeof a=="object"&&a!==null&&!(a instanceof URL)?a.headers:void 0,b={};if(k&&oe(k)&&(b=k),b[O])return delete b[O],x(r,i);let y=Math.random().toString(36).substring(7);this.requestStartTimes.set(y,Date.now());let m=x(r,i),L=[],A=m.write,v=m.end;return m.write=function(g,...c){if(g){let f=c[0],w=typeof f=="string"&&Buffer.isEncoding(f)?f:void 0;L.push(Buffer.isBuffer(g)?g:typeof g=="string"?Buffer.from(g,w):Buffer.from(g instanceof Uint8Array?g:String(g)))}return A.apply(this,[g,...c])},m.end=function(g,...c){let f=typeof g=="function"?void 0:g;if(f){let u=c[0],I=typeof u=="string"&&Buffer.isEncoding(u)?u:void 0;L.push(Buffer.isBuffer(f)?f:typeof f=="string"?Buffer.from(f,I):Buffer.from(f instanceof Uint8Array?f:String(f)))}let w=Buffer.concat(L).toString("utf8");return e.safeEmitNetwork({id:y,timestamp:Date.now(),method:m.method||"GET",url:h,headers:e.stringifyHeaders(m.getHeaders()),body:w,pending:!0}),v.apply(this,[g,...c])},m.on("response",g=>{let c=[],f=0;g.on("data",w=>{let u=Buffer.from(w);c.push(u),e.safeEmitNetwork({id:y,pending:!0,chunk:{index:f++,data:u.toString("utf8"),timestamp:Date.now()}})}),g.on("end",()=>{let w=Buffer.concat(c),u=g.headers["content-encoding"],I=D=>{let q=D.toString("utf8"),W=e.requestStartTimes.get(y),Q=W?Date.now()-W:0;e.requestStartTimes.delete(y),e.safeEmitNetwork({id:y,pending:!1,response:{status:g.statusCode||0,headers:e.stringifyHeaders(g.headers),body:q,durationMs:Q}})};u==="gzip"?J.gunzip(w,(D,q)=>{I(D?w:q)}):u==="deflate"?J.inflate(w,(D,q)=>{I(D?w:q)}):I(w)})}),m.on("error",g=>{e.requestStartTimes.delete(y);let c=g.message;e.safeEmitNetwork({id:y,pending:!1,error:c})}),m};Object.defineProperty(z,"request",{value:(r,i,l)=>n(t,l!==void 0?[r,i,l]:i!==void 0?[r,i]:[r],"http:"),writable:!0,configurable:!0}),Object.defineProperty(G,"request",{value:(r,i,l)=>n(o,l!==void 0?[r,i,l]:i!==void 0?[r,i]:[r],"https:"),writable:!0,configurable:!0})}logConsole(e){let t={...e,timestamp:Date.now()};this.consoleBuffer.push(t),this.consoleBuffer.length>this.bufferLimit&&this.consoleBuffer.shift(),this.emit("console",t)}};function se(s,e,t){let o=t||(e.storage?V.join(e.storage.getProjectTempLogsDir(),`session-${e.getSessionId()}.jsonl`):null);if(!o)return;let n=V.dirname(o);M.existsSync(n)||M.mkdirSync(n,{recursive:!0});let r=(i,l)=>{try{let p=JSON.stringify({type:i,payload:l,sessionId:e.getSessionId(),timestamp:Date.now()})+`
|
|
3
|
+
`;M.promises.appendFile(o,p).catch(a=>{d.error("Failed to write to activity log:",a)})}catch(p){d.error("Failed to prepare activity log entry:",p)}};s.on("console",i=>r("console",i)),s.on("network",i=>r("network",i))}function Y(s,e,t,o,n){let r=[],i=null,l=null,p=null,a=null,h=0,k=2,b=()=>{try{i=new S(`ws://${e}:${t}/ws`),i.on("open",()=>{d.debug(`WebSocket connected to ${e}:${t}`),h=0,m({type:"register",sessionId:o.getSessionId(),timestamp:Date.now()})}),i.on("message",c=>{try{let f=JSON.parse(c.toString());typeof f=="object"&&f!==null&&"type"in f&&typeof f.type=="string"&&y({type:f.type,sessionId:"sessionId"in f&&typeof f.sessionId=="string"?f.sessionId:void 0})}catch(f){d.debug("Invalid WebSocket message:",f)}}),i.on("close",()=>{d.debug(`WebSocket disconnected from ${e}:${t}`),v(),g()}),i.on("error",c=>{d.debug("WebSocket error:",c)})}catch(c){d.debug("Failed to connect WebSocket:",c),g()}},y=c=>{switch(c.type){case"registered":p=c.sessionId||null,d.debug(`WebSocket session registered: ${p}`),a&&clearInterval(a),a=setInterval(()=>{m({type:"pong",timestamp:Date.now()})},15e3),A();break;case"ping":m({type:"pong",timestamp:Date.now()});break;default:break}},m=c=>{i&&i.readyState===S.OPEN&&i.send(JSON.stringify(c))},L=(c,f)=>{let w={type:c,payload:f,sessionId:p||o.getSessionId(),timestamp:Date.now()};if(!i||i.readyState!==S.OPEN||!s.isNetworkLoggingEnabled()){r.push(w),r.length>te&&r.shift();return}m(w)},A=()=>{if(!i||i.readyState!==S.OPEN||!s.isNetworkLoggingEnabled())return;let{network:c,console:f}=s.drainBufferedLogs(),w=[...c.map(u=>({type:"network",payload:u,timestamp:"timestamp"in u&&u.timestamp?u.timestamp:Date.now()})),...f.map(u=>({type:"console",payload:u,timestamp:u.timestamp}))].sort((u,I)=>u.timestamp-I.timestamp);d.debug(`Flushing ${w.length} initial buffered logs and ${r.length} transport buffered logs...`);for(let u of w)m({type:u.type,payload:u.payload,sessionId:p||o.getSessionId(),timestamp:Date.now()});for(;r.length>0;){let u=r.shift();m(u)}},v=()=>{a&&(clearInterval(a),a=null),i=null},g=()=>{if(!l){if(h++,h>k&&n){d.debug(`WebSocket reconnect failed after ${k} attempts, promoting to server...`),n();return}l=setTimeout(()=>{l=null,d.debug("Reconnecting WebSocket..."),b()},1e3)}};b(),s.on("console",c=>L("console",c)),s.on("network",c=>L("network",c)),s.on("network-logging-enabled",()=>{d.debug("Network logging enabled, flushing buffer..."),A()}),process.on("exit",()=>{l&&clearTimeout(l),i&&i.close(),v()})}var X=!1;function ne(s){X||(X=!0,_.on("console-log",e=>{s.logConsole(e)}))}function H(s,e){let t=N.getInstance();t.enable(),e.mode==="network"?(Y(t,e.host,e.port,s,e.onReconnectFailed),t.enableNetworkLogging()):e.mode==="file"&&se(t,s,e.filePath),ne(t)}function C(s,e,t,o){let n=N.getInstance();Y(n,e,t,s,o)}var T=25417,E="127.0.0.1",Z=3,U=0,R=null,B=null;function j(s,e){return new Promise(t=>{let o=new S(`ws://${s}:${e}/ws`),n=setTimeout(()=>{o.close(),t(!1)},500);o.on("open",()=>{clearTimeout(n),o.close(),t(!0)}),o.on("error",()=>{clearTimeout(n),o.close(),t(!1)})})}async function K(s,e){let o=(await import("@google/gemini-cli-devtools")).DevTools.getInstance(),n=await o.start(),r=o.getPort();return r===e?(d.log(`DevTools available at: ${n}`),{host:s,port:r}):await j(s,e)?(await o.stop(),d.log(`DevTools (existing) at: http://${s}:${e}`),{host:s,port:e}):(d.log(`DevTools available at: ${n}`),{host:s,port:r})}async function F(s){if(U++,U>Z){d.debug(`Giving up on DevTools promotion after ${Z} attempts`);return}try{let e=await K(E,T);C(s,e.host,e.port,()=>F(s))}catch(e){d.debug("Failed to promote to DevTools server:",e)}}async function ke(s){let e=process.env.GEMINI_CLI_ACTIVITY_LOG_TARGET;if(e){if(!s.storage)return;H(s,{mode:"file",filePath:e})}else{H(s,{mode:"buffer"});try{await j(E,T)&&(C(s,E,T,()=>F(s)),N.getInstance().enableNetworkLogging(),B=`http://localhost:${T}`,d.log(`DevTools (existing) at startup: ${B}`))}catch{}}}function re(s){return B?Promise.resolve(B):R||(R=ie(s).catch(e=>{throw R=null,e}),R)}async function ie(s){let e=()=>F(s),t=await j(E,T),o=E,n=T;if(t)d.log(`DevTools (existing) at: http://${E}:${T}`);else try{let l=await K(E,T);o=l.host,n=l.port}catch(l){throw d.debug("Failed to start DevTools:",l),l}C(s,o,n,e),N.getInstance().enableNetworkLogging();let i=`http://localhost:${n}`;return B=i,i}async function ve(s,e,t,o){if(e){t();return}try{let{openBrowserSecurely:n,shouldLaunchBrowser:r}=await import("./core-QJQCNUBM.js"),i=await re(s);if(r())try{await n(i);return}catch(l){d.warn("Failed to open browser securely:",l)}o()}catch(n){o(),d.error("Failed to start DevTools server:",n)}}function Le(){U=0,R=null,B=null}export{Le as resetForTesting,ke as setupInitialActivityLogger,re as startDevToolsServer,ve as toggleDevToolsPanel};
|
|
4
4
|
/**
|
|
5
5
|
* @license
|
|
6
6
|
* Copyright 2025 Google LLC
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
const require = (await import('node:module')).createRequire(import.meta.url); const __chunk_filename = (await import('node:url')).fileURLToPath(import.meta.url); const __chunk_dirname = (await import('node:path')).dirname(__chunk_filename);
|
|
2
|
-
import"./chunk-
|
|
3
|
-
`;M.promises.appendFile(o,p).catch(a=>{d.error("Failed to write to activity log:",a)})}catch(p){d.error("Failed to prepare activity log entry:",p)}};s.on("console",i=>r("console",i)),s.on("network",i=>r("network",i))}function Z(s,e,t,o,n){let r=[],i=null,l=null,p=null,a=null,h=0,k=2,b=()=>{try{i=new S(`ws://${e}:${t}/ws`),i.on("open",()=>{d.debug(`WebSocket connected to ${e}:${t}`),h=0,m({type:"register",sessionId:o.getSessionId(),timestamp:Date.now()})}),i.on("message",c=>{try{let f=JSON.parse(c.toString());typeof f=="object"&&f!==null&&"type"in f&&typeof f.type=="string"&&y({type:f.type,sessionId:"sessionId"in f&&typeof f.sessionId=="string"?f.sessionId:void 0})}catch(f){d.debug("Invalid WebSocket message:",f)}}),i.on("close",()=>{d.debug(`WebSocket disconnected from ${e}:${t}`),v(),g()}),i.on("error",c=>{d.debug("WebSocket error:",c)})}catch(c){d.debug("Failed to connect WebSocket:",c),g()}},y=c=>{switch(c.type){case"registered":p=c.sessionId||null,d.debug(`WebSocket session registered: ${p}`),a&&clearInterval(a),a=setInterval(()=>{m({type:"pong",timestamp:Date.now()})},15e3),A();break;case"ping":m({type:"pong",timestamp:Date.now()});break;default:break}},m=c=>{i&&i.readyState===S.OPEN&&i.send(JSON.stringify(c))},L=(c,f)=>{let w={type:c,payload:f,sessionId:p||o.getSessionId(),timestamp:Date.now()};if(!i||i.readyState!==S.OPEN||!s.isNetworkLoggingEnabled()){r.push(w),r.length>oe&&r.shift();return}m(w)},A=()=>{if(!i||i.readyState!==S.OPEN||!s.isNetworkLoggingEnabled())return;let{network:c,console:f}=s.drainBufferedLogs(),w=[...c.map(u=>({type:"network",payload:u,timestamp:"timestamp"in u&&u.timestamp?u.timestamp:Date.now()})),...f.map(u=>({type:"console",payload:u,timestamp:u.timestamp}))].sort((u,I)=>u.timestamp-I.timestamp);d.debug(`Flushing ${w.length} initial buffered logs and ${r.length} transport buffered logs...`);for(let u of w)m({type:u.type,payload:u.payload,sessionId:p||o.getSessionId(),timestamp:Date.now()});for(;r.length>0;){let u=r.shift();m(u)}},v=()=>{a&&(clearInterval(a),a=null),i=null},g=()=>{if(!l){if(h++,h>k&&n){d.debug(`WebSocket reconnect failed after ${k} attempts, promoting to server...`),n();return}l=setTimeout(()=>{l=null,d.debug("Reconnecting WebSocket..."),b()},1e3)}};b(),s.on("console",c=>L("console",c)),s.on("network",c=>L("network",c)),s.on("network-logging-enabled",()=>{d.debug("Network logging enabled, flushing buffer..."),A()}),process.on("exit",()=>{l&&clearTimeout(l),i&&i.close(),v()})}var Y=!1;function re(s){Y||(Y=!0,z.on(_.ConsoleLog,e=>{s.logConsole(e)}))}function H(s,e){let t=N.getInstance();t.enable(),e.mode==="network"?(Z(t,e.host,e.port,s,e.onReconnectFailed),t.enableNetworkLogging()):e.mode==="file"&&ne(t,s,e.filePath),re(t)}function C(s,e,t,o){let n=N.getInstance();Z(n,e,t,s,o)}var T=25417,E="127.0.0.1",K=3,U=0,R=null,B=null;function j(s,e){return new Promise(t=>{let o=new S(`ws://${s}:${e}/ws`),n=setTimeout(()=>{o.close(),t(!1)},500);o.on("open",()=>{clearTimeout(n),o.close(),t(!0)}),o.on("error",()=>{clearTimeout(n),o.close(),t(!1)})})}async function Q(s,e){let o=(await import("@google/gemini-cli-devtools")).DevTools.getInstance(),n=await o.start(),r=o.getPort();return r===e?(d.log(`DevTools available at: ${n}`),{host:s,port:r}):await j(s,e)?(await o.stop(),d.log(`DevTools (existing) at: http://${s}:${e}`),{host:s,port:e}):(d.log(`DevTools available at: ${n}`),{host:s,port:r})}async function F(s){if(U++,U>K){d.debug(`Giving up on DevTools promotion after ${K} attempts`);return}try{let e=await Q(E,T);C(s,e.host,e.port,()=>F(s))}catch(e){d.debug("Failed to promote to DevTools server:",e)}}async function ke(s){let e=process.env.GEMINI_CLI_ACTIVITY_LOG_TARGET;if(e){if(!s.storage)return;H(s,{mode:"file",filePath:e})}else{H(s,{mode:"buffer"});try{await j(E,T)&&(C(s,E,T,()=>F(s)),N.getInstance().enableNetworkLogging(),B=`http://localhost:${T}`,d.log(`DevTools (existing) at startup: ${B}`))}catch{}}}function ie(s){return B?Promise.resolve(B):R||(R=ae(s).catch(e=>{throw R=null,e}),R)}async function ae(s){let e=()=>F(s),t=await j(E,T),o=E,n=T;if(t)d.log(`DevTools (existing) at: http://${E}:${T}`);else try{let l=await Q(E,T);o=l.host,n=l.port}catch(l){throw d.debug("Failed to start DevTools:",l),l}C(s,o,n,e),N.getInstance().enableNetworkLogging();let i=`http://localhost:${n}`;return B=i,i}async function ve(s,e,t,o){if(e){t();return}try{let{openBrowserSecurely:n,shouldLaunchBrowser:r}=await import("./dist-
|
|
2
|
+
import"./chunk-5NLMIA5F.js";import{Sd as _,Ud as z,b as d}from"./chunk-SX66NO2U.js";import{b as S}from"./chunk-TWIC4BKL.js";import"./chunk-JAFVB6DI.js";import"./chunk-A5A5SUZN.js";import"./chunk-YUXORC52.js";import G from"node:http";import J from"node:https";import V from"node:zlib";import M from"node:fs";import X from"node:path";import{EventEmitter as te}from"node:events";var O="x-activity-request-id",oe=100;function se(s){return!Array.isArray(s)}function P(s){return typeof s=="object"&&s!==null&&!(s instanceof URL)&&!Array.isArray(s)}function $(s){return typeof s=="function"}function x(s,e){if(e.length===0)return s({});if(e.length===1){let t=e[0];return typeof t=="string"||t instanceof URL||P(t)?s(t):s({})}if(e.length===2){let t=e[0],o=e[1];if((typeof t=="string"||t instanceof URL)&&($(o)||P(o))||P(t)&&$(o))return s(t,o)}if(e.length===3){let t=e[0],o=e[1],n=e[2];if((typeof t=="string"||t instanceof URL)&&P(o)&&$(n))return s(t,o,n)}return s({})}var N=class s extends te{static instance;isInterceptionEnabled=!1;requestStartTimes=new Map;networkLoggingEnabled=!1;networkBufferMap=new Map;networkBufferIds=[];consoleBuffer=[];bufferLimit=10;static getInstance(){return s.instance||(s.instance=new s),s.instance}enableNetworkLogging(){this.networkLoggingEnabled=!0,this.emit("network-logging-enabled")}disableNetworkLogging(){this.networkLoggingEnabled=!1}isNetworkLoggingEnabled(){return this.networkLoggingEnabled}drainBufferedLogs(){let e=[];for(let o of this.networkBufferIds){let n=this.networkBufferMap.get(o);n&&e.push(...n)}let t=[...this.consoleBuffer];return this.networkBufferMap.clear(),this.networkBufferIds=[],this.consoleBuffer=[],{network:e,console:t}}getBufferedLogs(){let e=[];for(let t of this.networkBufferIds){let o=this.networkBufferMap.get(t);o&&e.push(...o)}return{network:e,console:[...this.consoleBuffer]}}clearBufferedLogs(){this.networkBufferMap.clear(),this.networkBufferIds=[],this.consoleBuffer=[]}stringifyHeaders(e){let t={};if(!e)return t;if(e instanceof Headers)e.forEach((o,n)=>{t[n.toLowerCase()]=o});else if(typeof e=="object"&&e!==null)for(let[o,n]of Object.entries(e))t[o.toLowerCase()]=Array.isArray(n)?n.join(", "):String(n);return t}sanitizeNetworkLog(e){if(!e||typeof e!="object")return e;let t={...e};if("headers"in t&&t.headers){let o={...t.headers};for(let n of Object.keys(o))["authorization","cookie","x-goog-api-key"].includes(n.toLowerCase())&&(o[n]="[REDACTED]");t.headers=o}if("response"in t&&t.response?.headers){let o={...t.response.headers};for(let n of Object.keys(o))["set-cookie"].includes(n.toLowerCase())&&(o[n]="[REDACTED]");t.response={...t.response,headers:o}}return t}emitNetworkEvent(e){this.safeEmitNetwork(e)}safeEmitNetwork(e){let t=this.sanitizeNetworkLog(e),o=t.id;if(!this.networkBufferMap.has(o)&&(this.networkBufferIds.push(o),this.networkBufferMap.set(o,[]),this.networkBufferIds.length>this.bufferLimit)){let n=this.networkBufferIds.shift();this.networkBufferMap.delete(n)}this.networkBufferMap.get(o).push(t),this.emit("network",t)}enable(){this.isInterceptionEnabled||(this.isInterceptionEnabled=!0,this.patchGlobalFetch(),this.patchNodeHttp())}patchGlobalFetch(){if(!global.fetch)return;let e=global.fetch;global.fetch=async(t,o)=>{let n=typeof t=="string"?t:t instanceof URL?t.toString():t.url;if(n.includes("127.0.0.1")||n.includes("localhost"))return e(t,o);let r=Math.random().toString(36).substring(7),i=(o?.method||"GET").toUpperCase(),l={...o},p=new Headers(o?.headers||{});p.set(O,r),l.headers=p;let a="";o?.body&&(typeof o.body=="string"?a=o.body:o.body instanceof URLSearchParams&&(a=o.body.toString())),this.requestStartTimes.set(r,Date.now()),this.safeEmitNetwork({id:r,timestamp:Date.now(),method:i,url:n,headers:this.stringifyHeaders(l.headers),body:a,pending:!0});try{let h=await e(t,l),k=h.clone();if(k.body){let b=k.body.getReader(),y=new TextDecoder,m=[],L=0;(async()=>{try{for(;;){let{done:c,value:f}=await b.read();if(c)break;let w=y.decode(f,{stream:!0});m.push(w),this.safeEmitNetwork({id:r,pending:!0,chunk:{index:L++,data:w,timestamp:Date.now()}})}let v=this.requestStartTimes.get(r),g=v?Date.now()-v:0;this.requestStartTimes.delete(r),this.safeEmitNetwork({id:r,pending:!1,response:{status:h.status,headers:this.stringifyHeaders(h.headers),body:m.join(""),durationMs:g}})}catch(v){let g=v instanceof Error?v.message:String(v);this.safeEmitNetwork({id:r,pending:!1,error:`Failed to read response body: ${g}`})}})()}else k.text().then(b=>{let y=this.requestStartTimes.get(r),m=y?Date.now()-y:0;this.requestStartTimes.delete(r),this.safeEmitNetwork({id:r,pending:!1,response:{status:h.status,headers:this.stringifyHeaders(h.headers),body:b,durationMs:m}})}).catch(b=>{let y=b instanceof Error?b.message:String(b);this.safeEmitNetwork({id:r,pending:!1,error:`Failed to read response body: ${y}`})});return h}catch(h){this.requestStartTimes.delete(r);let k=h instanceof Error?h.message:String(h);throw this.safeEmitNetwork({id:r,pending:!1,error:k}),h}}}patchNodeHttp(){let e=this,t=G.request,o=J.request,n=(r,i,l)=>{let p=i[0],a;typeof p=="string"||p instanceof URL?a=p:p&&typeof p=="object"?a=P(p)?p:{}:a={};let h="";if(typeof a=="string"?h=a:a instanceof URL?h=a.href:h=("href"in a&&typeof a.href=="string"?a.href:"")||`${l}//${a.hostname||a.host||"localhost"}${a.path||"/"}`,h.includes("127.0.0.1")||h.includes("localhost"))return x(r,i);let k=typeof a=="object"&&a!==null&&!(a instanceof URL)?a.headers:void 0,b={};if(k&&se(k)&&(b=k),b[O])return delete b[O],x(r,i);let y=Math.random().toString(36).substring(7);this.requestStartTimes.set(y,Date.now());let m=x(r,i),L=[],A=m.write,v=m.end;return m.write=function(g,...c){if(g){let f=c[0],w=typeof f=="string"&&Buffer.isEncoding(f)?f:void 0;L.push(Buffer.isBuffer(g)?g:typeof g=="string"?Buffer.from(g,w):Buffer.from(g instanceof Uint8Array?g:String(g)))}return A.apply(this,[g,...c])},m.end=function(g,...c){let f=typeof g=="function"?void 0:g;if(f){let u=c[0],I=typeof u=="string"&&Buffer.isEncoding(u)?u:void 0;L.push(Buffer.isBuffer(f)?f:typeof f=="string"?Buffer.from(f,I):Buffer.from(f instanceof Uint8Array?f:String(f)))}let w=Buffer.concat(L).toString("utf8");return e.safeEmitNetwork({id:y,timestamp:Date.now(),method:m.method||"GET",url:h,headers:e.stringifyHeaders(m.getHeaders()),body:w,pending:!0}),v.apply(this,[g,...c])},m.on("response",g=>{let c=[],f=0;g.on("data",w=>{let u=Buffer.from(w);c.push(u),e.safeEmitNetwork({id:y,pending:!0,chunk:{index:f++,data:u.toString("utf8"),timestamp:Date.now()}})}),g.on("end",()=>{let w=Buffer.concat(c),u=g.headers["content-encoding"],I=D=>{let q=D.toString("utf8"),W=e.requestStartTimes.get(y),ee=W?Date.now()-W:0;e.requestStartTimes.delete(y),e.safeEmitNetwork({id:y,pending:!1,response:{status:g.statusCode||0,headers:e.stringifyHeaders(g.headers),body:q,durationMs:ee}})};u==="gzip"?V.gunzip(w,(D,q)=>{I(D?w:q)}):u==="deflate"?V.inflate(w,(D,q)=>{I(D?w:q)}):I(w)})}),m.on("error",g=>{e.requestStartTimes.delete(y);let c=g.message;e.safeEmitNetwork({id:y,pending:!1,error:c})}),m};Object.defineProperty(G,"request",{value:(r,i,l)=>n(t,l!==void 0?[r,i,l]:i!==void 0?[r,i]:[r],"http:"),writable:!0,configurable:!0}),Object.defineProperty(J,"request",{value:(r,i,l)=>n(o,l!==void 0?[r,i,l]:i!==void 0?[r,i]:[r],"https:"),writable:!0,configurable:!0})}logConsole(e){let t={...e,timestamp:Date.now()};this.consoleBuffer.push(t),this.consoleBuffer.length>this.bufferLimit&&this.consoleBuffer.shift(),this.emit("console",t)}};function ne(s,e,t){let o=t||(e.storage?X.join(e.storage.getProjectTempLogsDir(),`session-${e.getSessionId()}.jsonl`):null);if(!o)return;let n=X.dirname(o);M.existsSync(n)||M.mkdirSync(n,{recursive:!0});let r=(i,l)=>{try{let p=JSON.stringify({type:i,payload:l,sessionId:e.getSessionId(),timestamp:Date.now()})+`
|
|
3
|
+
`;M.promises.appendFile(o,p).catch(a=>{d.error("Failed to write to activity log:",a)})}catch(p){d.error("Failed to prepare activity log entry:",p)}};s.on("console",i=>r("console",i)),s.on("network",i=>r("network",i))}function Z(s,e,t,o,n){let r=[],i=null,l=null,p=null,a=null,h=0,k=2,b=()=>{try{i=new S(`ws://${e}:${t}/ws`),i.on("open",()=>{d.debug(`WebSocket connected to ${e}:${t}`),h=0,m({type:"register",sessionId:o.getSessionId(),timestamp:Date.now()})}),i.on("message",c=>{try{let f=JSON.parse(c.toString());typeof f=="object"&&f!==null&&"type"in f&&typeof f.type=="string"&&y({type:f.type,sessionId:"sessionId"in f&&typeof f.sessionId=="string"?f.sessionId:void 0})}catch(f){d.debug("Invalid WebSocket message:",f)}}),i.on("close",()=>{d.debug(`WebSocket disconnected from ${e}:${t}`),v(),g()}),i.on("error",c=>{d.debug("WebSocket error:",c)})}catch(c){d.debug("Failed to connect WebSocket:",c),g()}},y=c=>{switch(c.type){case"registered":p=c.sessionId||null,d.debug(`WebSocket session registered: ${p}`),a&&clearInterval(a),a=setInterval(()=>{m({type:"pong",timestamp:Date.now()})},15e3),A();break;case"ping":m({type:"pong",timestamp:Date.now()});break;default:break}},m=c=>{i&&i.readyState===S.OPEN&&i.send(JSON.stringify(c))},L=(c,f)=>{let w={type:c,payload:f,sessionId:p||o.getSessionId(),timestamp:Date.now()};if(!i||i.readyState!==S.OPEN||!s.isNetworkLoggingEnabled()){r.push(w),r.length>oe&&r.shift();return}m(w)},A=()=>{if(!i||i.readyState!==S.OPEN||!s.isNetworkLoggingEnabled())return;let{network:c,console:f}=s.drainBufferedLogs(),w=[...c.map(u=>({type:"network",payload:u,timestamp:"timestamp"in u&&u.timestamp?u.timestamp:Date.now()})),...f.map(u=>({type:"console",payload:u,timestamp:u.timestamp}))].sort((u,I)=>u.timestamp-I.timestamp);d.debug(`Flushing ${w.length} initial buffered logs and ${r.length} transport buffered logs...`);for(let u of w)m({type:u.type,payload:u.payload,sessionId:p||o.getSessionId(),timestamp:Date.now()});for(;r.length>0;){let u=r.shift();m(u)}},v=()=>{a&&(clearInterval(a),a=null),i=null},g=()=>{if(!l){if(h++,h>k&&n){d.debug(`WebSocket reconnect failed after ${k} attempts, promoting to server...`),n();return}l=setTimeout(()=>{l=null,d.debug("Reconnecting WebSocket..."),b()},1e3)}};b(),s.on("console",c=>L("console",c)),s.on("network",c=>L("network",c)),s.on("network-logging-enabled",()=>{d.debug("Network logging enabled, flushing buffer..."),A()}),process.on("exit",()=>{l&&clearTimeout(l),i&&i.close(),v()})}var Y=!1;function re(s){Y||(Y=!0,z.on(_.ConsoleLog,e=>{s.logConsole(e)}))}function H(s,e){let t=N.getInstance();t.enable(),e.mode==="network"?(Z(t,e.host,e.port,s,e.onReconnectFailed),t.enableNetworkLogging()):e.mode==="file"&&ne(t,s,e.filePath),re(t)}function C(s,e,t,o){let n=N.getInstance();Z(n,e,t,s,o)}var T=25417,E="127.0.0.1",K=3,U=0,R=null,B=null;function j(s,e){return new Promise(t=>{let o=new S(`ws://${s}:${e}/ws`),n=setTimeout(()=>{o.close(),t(!1)},500);o.on("open",()=>{clearTimeout(n),o.close(),t(!0)}),o.on("error",()=>{clearTimeout(n),o.close(),t(!1)})})}async function Q(s,e){let o=(await import("@google/gemini-cli-devtools")).DevTools.getInstance(),n=await o.start(),r=o.getPort();return r===e?(d.log(`DevTools available at: ${n}`),{host:s,port:r}):await j(s,e)?(await o.stop(),d.log(`DevTools (existing) at: http://${s}:${e}`),{host:s,port:e}):(d.log(`DevTools available at: ${n}`),{host:s,port:r})}async function F(s){if(U++,U>K){d.debug(`Giving up on DevTools promotion after ${K} attempts`);return}try{let e=await Q(E,T);C(s,e.host,e.port,()=>F(s))}catch(e){d.debug("Failed to promote to DevTools server:",e)}}async function ke(s){let e=process.env.GEMINI_CLI_ACTIVITY_LOG_TARGET;if(e){if(!s.storage)return;H(s,{mode:"file",filePath:e})}else{H(s,{mode:"buffer"});try{await j(E,T)&&(C(s,E,T,()=>F(s)),N.getInstance().enableNetworkLogging(),B=`http://localhost:${T}`,d.log(`DevTools (existing) at startup: ${B}`))}catch{}}}function ie(s){return B?Promise.resolve(B):R||(R=ae(s).catch(e=>{throw R=null,e}),R)}async function ae(s){let e=()=>F(s),t=await j(E,T),o=E,n=T;if(t)d.log(`DevTools (existing) at: http://${E}:${T}`);else try{let l=await Q(E,T);o=l.host,n=l.port}catch(l){throw d.debug("Failed to start DevTools:",l),l}C(s,o,n,e),N.getInstance().enableNetworkLogging();let i=`http://localhost:${n}`;return B=i,i}async function ve(s,e,t,o){if(e){t();return}try{let{openBrowserSecurely:n,shouldLaunchBrowser:r}=await import("./dist-RUT7TWHF.js"),i=await ie(s);if(r())try{await n(i);return}catch(l){d.warn("Failed to open browser securely:",l)}o()}catch(n){o(),d.error("Failed to start DevTools server:",n)}}function Le(){U=0,R=null,B=null}export{Le as resetForTesting,ke as setupInitialActivityLogger,ie as startDevToolsServer,ve as toggleDevToolsPanel};
|
|
4
4
|
/**
|
|
5
5
|
* @license
|
|
6
6
|
* Copyright 2025 Google LLC
|