nexus-agents 2.80.2 → 2.80.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (109) hide show
  1. package/dist/{child-mcp-config-UG4CH654.js → child-mcp-config-LLLRMOTQ.js} +3 -3
  2. package/dist/{chunk-C3BOZZQC.js → chunk-4OPS2AUD.js} +4 -4
  3. package/dist/{chunk-RFUBLOZQ.js → chunk-6GDF6FLC.js} +8 -8
  4. package/dist/{chunk-LUVQUKW5.js → chunk-6YQCLEHL.js} +2 -2
  5. package/dist/{chunk-RCWWUZHA.js → chunk-73K7575Z.js} +2 -2
  6. package/dist/{chunk-5FUVEIJC.js → chunk-BMNWUPJO.js} +3 -3
  7. package/dist/{chunk-H4XSKDI6.js → chunk-ERWTZSAR.js} +2 -2
  8. package/dist/{chunk-RCNNN4E2.js → chunk-HYOIDNBX.js} +29 -29
  9. package/dist/{chunk-2JQXC3CK.js → chunk-I2HMWH4R.js} +42 -2
  10. package/dist/chunk-I2HMWH4R.js.map +1 -0
  11. package/dist/{chunk-JECCDZ2S.js → chunk-LIEFKEAO.js} +2 -2
  12. package/dist/{chunk-4MHE5UVO.js → chunk-LJIB6TNE.js} +3 -3
  13. package/dist/{chunk-GHWTMPPL.js → chunk-M66MYHBT.js} +2 -2
  14. package/dist/{chunk-3QRO77LO.js → chunk-P4W7PV6L.js} +10 -10
  15. package/dist/{chunk-HXXRFTKP.js → chunk-PKBKWWPK.js} +3 -3
  16. package/dist/{chunk-2ZRTLW2G.js → chunk-PUSFT342.js} +4 -4
  17. package/dist/{chunk-FBW6XKZJ.js → chunk-PV3OEDLO.js} +2 -2
  18. package/dist/{chunk-KN7JWET4.js → chunk-PZEE6T5Y.js} +4 -4
  19. package/dist/{chunk-5SBD55T7.js → chunk-Q27M6KHP.js} +4 -4
  20. package/dist/{chunk-7BSVRW2O.js → chunk-Q2PSRDW6.js} +6 -6
  21. package/dist/{chunk-OO662XRQ.js → chunk-RLQZOEMX.js} +3 -3
  22. package/dist/{chunk-VQBVL3UD.js → chunk-S77SLJ2J.js} +2 -2
  23. package/dist/{chunk-376MBRLD.js → chunk-SVKH6ASN.js} +7 -7
  24. package/dist/{chunk-TE26NHNW.js → chunk-SZ7VPIRA.js} +2 -2
  25. package/dist/{chunk-FQKQUJBU.js → chunk-T7RGD5JW.js} +3 -3
  26. package/dist/{chunk-HQR27JGL.js → chunk-UTL2SFIN.js} +2 -2
  27. package/dist/{chunk-BQ55PBN4.js → chunk-UZCDHAY3.js} +2 -2
  28. package/dist/{chunk-HDFUSBU3.js → chunk-V2KWEIV5.js} +2 -2
  29. package/dist/{chunk-TLE2YE6G.js → chunk-WZGCVCRQ.js} +2 -2
  30. package/dist/{chunk-HYNFZQU4.js → chunk-YLYT7GSG.js} +2 -2
  31. package/dist/{cli-circuit-breaker-MAN2V7DA.js → cli-circuit-breaker-O5RV47BO.js} +5 -5
  32. package/dist/cli.js +37 -36
  33. package/dist/cli.js.map +1 -1
  34. package/dist/{composite-router-YCIEYOZC.js → composite-router-SKHVZ4UF.js} +3 -3
  35. package/dist/{consensus-vote-TGTGZSPS.js → consensus-vote-VBXLXVFF.js} +12 -12
  36. package/dist/{context-retriever-FKJKKPAA.js → context-retriever-KLJ5X4TL.js} +6 -6
  37. package/dist/{doctor-deep-2KT4LZA6.js → doctor-deep-IH4FG5YZ.js} +4 -4
  38. package/dist/expert-bridge-EKPDZKMD.js +11 -0
  39. package/dist/{factory-VXHVQXKR.js → factory-CQUDIMIG.js} +5 -5
  40. package/dist/factory-FTE7TDCT.js +14 -0
  41. package/dist/index.js +25 -25
  42. package/dist/{init-opencode-26YCTSR4.js → init-opencode-MXZJKG32.js} +6 -6
  43. package/dist/issue-triage-H5VLNGWU.js +15 -0
  44. package/dist/{learning-persistence-Q63HZ2EB.js → learning-persistence-NX2KHL5T.js} +2 -2
  45. package/dist/{registry-command-AKJBYP5N.js → registry-command-ALVYOGQY.js} +3 -3
  46. package/dist/{repo-security-plan-ZGJN6QRW.js → repo-security-plan-VJCWWPWO.js} +4 -4
  47. package/dist/{research-helpers-synthesize-ZWBBFT2O.js → research-helpers-synthesize-XUTBDVI7.js} +4 -4
  48. package/dist/{routing-memory-Y5UBVQGM.js → routing-memory-QKQ3OGWW.js} +3 -3
  49. package/dist/{session-memory-OOBM2GQ7.js → session-memory-N76TNRSK.js} +4 -4
  50. package/dist/{setup-command-VJLR47CI.js → setup-command-IJ6WIK7O.js} +11 -11
  51. package/dist/setup-config-Y7KZSFX3.js +10 -0
  52. package/dist/{setup-custom-api-53SYDF4L.js → setup-custom-api-QEKHNYQJ.js} +5 -5
  53. package/dist/{tool-memory-RZ7NJCPV.js → tool-memory-MFDLIJOB.js} +5 -5
  54. package/dist/{weather-report-VOSP7KKV.js → weather-report-IXPYIYE4.js} +3 -3
  55. package/package.json +1 -1
  56. package/dist/chunk-2JQXC3CK.js.map +0 -1
  57. package/dist/expert-bridge-6NA7MK7T.js +0 -11
  58. package/dist/factory-IIPDY7QB.js +0 -14
  59. package/dist/issue-triage-NGWFHIKY.js +0 -15
  60. package/dist/setup-config-F7NK2KVC.js +0 -10
  61. /package/dist/{child-mcp-config-UG4CH654.js.map → child-mcp-config-LLLRMOTQ.js.map} +0 -0
  62. /package/dist/{chunk-C3BOZZQC.js.map → chunk-4OPS2AUD.js.map} +0 -0
  63. /package/dist/{chunk-RFUBLOZQ.js.map → chunk-6GDF6FLC.js.map} +0 -0
  64. /package/dist/{chunk-LUVQUKW5.js.map → chunk-6YQCLEHL.js.map} +0 -0
  65. /package/dist/{chunk-RCWWUZHA.js.map → chunk-73K7575Z.js.map} +0 -0
  66. /package/dist/{chunk-5FUVEIJC.js.map → chunk-BMNWUPJO.js.map} +0 -0
  67. /package/dist/{chunk-H4XSKDI6.js.map → chunk-ERWTZSAR.js.map} +0 -0
  68. /package/dist/{chunk-RCNNN4E2.js.map → chunk-HYOIDNBX.js.map} +0 -0
  69. /package/dist/{chunk-JECCDZ2S.js.map → chunk-LIEFKEAO.js.map} +0 -0
  70. /package/dist/{chunk-4MHE5UVO.js.map → chunk-LJIB6TNE.js.map} +0 -0
  71. /package/dist/{chunk-GHWTMPPL.js.map → chunk-M66MYHBT.js.map} +0 -0
  72. /package/dist/{chunk-3QRO77LO.js.map → chunk-P4W7PV6L.js.map} +0 -0
  73. /package/dist/{chunk-HXXRFTKP.js.map → chunk-PKBKWWPK.js.map} +0 -0
  74. /package/dist/{chunk-2ZRTLW2G.js.map → chunk-PUSFT342.js.map} +0 -0
  75. /package/dist/{chunk-FBW6XKZJ.js.map → chunk-PV3OEDLO.js.map} +0 -0
  76. /package/dist/{chunk-KN7JWET4.js.map → chunk-PZEE6T5Y.js.map} +0 -0
  77. /package/dist/{chunk-5SBD55T7.js.map → chunk-Q27M6KHP.js.map} +0 -0
  78. /package/dist/{chunk-7BSVRW2O.js.map → chunk-Q2PSRDW6.js.map} +0 -0
  79. /package/dist/{chunk-OO662XRQ.js.map → chunk-RLQZOEMX.js.map} +0 -0
  80. /package/dist/{chunk-VQBVL3UD.js.map → chunk-S77SLJ2J.js.map} +0 -0
  81. /package/dist/{chunk-376MBRLD.js.map → chunk-SVKH6ASN.js.map} +0 -0
  82. /package/dist/{chunk-TE26NHNW.js.map → chunk-SZ7VPIRA.js.map} +0 -0
  83. /package/dist/{chunk-FQKQUJBU.js.map → chunk-T7RGD5JW.js.map} +0 -0
  84. /package/dist/{chunk-HQR27JGL.js.map → chunk-UTL2SFIN.js.map} +0 -0
  85. /package/dist/{chunk-BQ55PBN4.js.map → chunk-UZCDHAY3.js.map} +0 -0
  86. /package/dist/{chunk-HDFUSBU3.js.map → chunk-V2KWEIV5.js.map} +0 -0
  87. /package/dist/{chunk-TLE2YE6G.js.map → chunk-WZGCVCRQ.js.map} +0 -0
  88. /package/dist/{chunk-HYNFZQU4.js.map → chunk-YLYT7GSG.js.map} +0 -0
  89. /package/dist/{cli-circuit-breaker-MAN2V7DA.js.map → cli-circuit-breaker-O5RV47BO.js.map} +0 -0
  90. /package/dist/{composite-router-YCIEYOZC.js.map → composite-router-SKHVZ4UF.js.map} +0 -0
  91. /package/dist/{consensus-vote-TGTGZSPS.js.map → consensus-vote-VBXLXVFF.js.map} +0 -0
  92. /package/dist/{context-retriever-FKJKKPAA.js.map → context-retriever-KLJ5X4TL.js.map} +0 -0
  93. /package/dist/{doctor-deep-2KT4LZA6.js.map → doctor-deep-IH4FG5YZ.js.map} +0 -0
  94. /package/dist/{expert-bridge-6NA7MK7T.js.map → expert-bridge-EKPDZKMD.js.map} +0 -0
  95. /package/dist/{factory-IIPDY7QB.js.map → factory-CQUDIMIG.js.map} +0 -0
  96. /package/dist/{factory-VXHVQXKR.js.map → factory-FTE7TDCT.js.map} +0 -0
  97. /package/dist/{init-opencode-26YCTSR4.js.map → init-opencode-MXZJKG32.js.map} +0 -0
  98. /package/dist/{issue-triage-NGWFHIKY.js.map → issue-triage-H5VLNGWU.js.map} +0 -0
  99. /package/dist/{learning-persistence-Q63HZ2EB.js.map → learning-persistence-NX2KHL5T.js.map} +0 -0
  100. /package/dist/{registry-command-AKJBYP5N.js.map → registry-command-ALVYOGQY.js.map} +0 -0
  101. /package/dist/{repo-security-plan-ZGJN6QRW.js.map → repo-security-plan-VJCWWPWO.js.map} +0 -0
  102. /package/dist/{research-helpers-synthesize-ZWBBFT2O.js.map → research-helpers-synthesize-XUTBDVI7.js.map} +0 -0
  103. /package/dist/{routing-memory-Y5UBVQGM.js.map → routing-memory-QKQ3OGWW.js.map} +0 -0
  104. /package/dist/{session-memory-OOBM2GQ7.js.map → session-memory-N76TNRSK.js.map} +0 -0
  105. /package/dist/{setup-command-VJLR47CI.js.map → setup-command-IJ6WIK7O.js.map} +0 -0
  106. /package/dist/{setup-config-F7NK2KVC.js.map → setup-config-Y7KZSFX3.js.map} +0 -0
  107. /package/dist/{setup-custom-api-53SYDF4L.js.map → setup-custom-api-QEKHNYQJ.js.map} +0 -0
  108. /package/dist/{tool-memory-RZ7NJCPV.js.map → tool-memory-MFDLIJOB.js.map} +0 -0
  109. /package/dist/{weather-report-VOSP7KKV.js.map → weather-report-IXPYIYE4.js.map} +0 -0
@@ -1,7 +1,7 @@
1
1
  import {
2
2
  createLogger
3
- } from "./chunk-4MHE5UVO.js";
4
- import "./chunk-2JQXC3CK.js";
3
+ } from "./chunk-LJIB6TNE.js";
4
+ import "./chunk-I2HMWH4R.js";
5
5
  import "./chunk-PR4QN5HX.js";
6
6
 
7
7
  // src/cli-adapters/child-mcp-config.ts
@@ -59,4 +59,4 @@ export {
59
59
  generateMcpConfig,
60
60
  getDefaultAllowedTools
61
61
  };
62
- //# sourceMappingURL=child-mcp-config-UG4CH654.js.map
62
+ //# sourceMappingURL=child-mcp-config-LLLRMOTQ.js.map
@@ -1,17 +1,17 @@
1
1
  import {
2
2
  getToolMemory
3
- } from "./chunk-KN7JWET4.js";
3
+ } from "./chunk-PZEE6T5Y.js";
4
4
  import {
5
5
  CLI_NAMES,
6
6
  StrategyDistiller,
7
7
  createLogger,
8
8
  getOutcomeStore,
9
9
  registerPersistentDistillerFactory
10
- } from "./chunk-4MHE5UVO.js";
10
+ } from "./chunk-LJIB6TNE.js";
11
11
  import {
12
12
  ensureLearningDir,
13
13
  getRulesFile
14
- } from "./chunk-2JQXC3CK.js";
14
+ } from "./chunk-I2HMWH4R.js";
15
15
 
16
16
  // src/learning/strategy-distiller-persistence.ts
17
17
  import { writeFileSync, readFileSync, renameSync, unlinkSync, existsSync } from "fs";
@@ -273,4 +273,4 @@ export {
273
273
  inferTaskCategory,
274
274
  summarizeContextForPrompt
275
275
  };
276
- //# sourceMappingURL=chunk-C3BOZZQC.js.map
276
+ //# sourceMappingURL=chunk-4OPS2AUD.js.map
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  DEFAULTS
3
- } from "./chunk-HDFUSBU3.js";
3
+ } from "./chunk-V2KWEIV5.js";
4
4
  import {
5
5
  resolveInsideRoot
6
6
  } from "./chunk-NUBSJGQZ.js";
@@ -10,7 +10,7 @@ import {
10
10
  import {
11
11
  createAllAdapters,
12
12
  probeCli
13
- } from "./chunk-5FUVEIJC.js";
13
+ } from "./chunk-BMNWUPJO.js";
14
14
  import {
15
15
  CliNameSchema,
16
16
  DEFAULT_CAPABILITIES,
@@ -26,7 +26,7 @@ import {
26
26
  ok,
27
27
  symbols,
28
28
  writeLine
29
- } from "./chunk-4MHE5UVO.js";
29
+ } from "./chunk-LJIB6TNE.js";
30
30
  import {
31
31
  detectSandbox,
32
32
  getLearningDir,
@@ -37,10 +37,10 @@ import {
37
37
  getRulesFile,
38
38
  isPersistenceEnabled,
39
39
  nexusDataPath
40
- } from "./chunk-2JQXC3CK.js";
40
+ } from "./chunk-I2HMWH4R.js";
41
41
 
42
42
  // src/version.ts
43
- var VERSION = true ? "2.80.2" : "dev";
43
+ var VERSION = true ? "2.80.3" : "dev";
44
44
 
45
45
  // src/config/schemas-core.ts
46
46
  import { z } from "zod";
@@ -2107,7 +2107,7 @@ async function runDoctorFix(result) {
2107
2107
  writeLine2("\u2500".repeat(40));
2108
2108
  let fixCount = 0;
2109
2109
  if (!result.dataDirectory.rootExists || result.dataDirectory.subdirectories.some((d) => !d.exists || !d.writable)) {
2110
- const { runSetup } = await import("./setup-command-VJLR47CI.js");
2110
+ const { runSetup } = await import("./setup-command-IJ6WIK7O.js");
2111
2111
  const setupResult = runSetup({
2112
2112
  skipMcp: true,
2113
2113
  skipRules: true,
@@ -2121,7 +2121,7 @@ async function runDoctorFix(result) {
2121
2121
  }
2122
2122
  }
2123
2123
  if (!result.configFile.found) {
2124
- const { runConfigInitSync } = await import("./setup-config-F7NK2KVC.js");
2124
+ const { runConfigInitSync } = await import("./setup-config-Y7KZSFX3.js");
2125
2125
  const configResult = runConfigInitSync(process.cwd(), false, false);
2126
2126
  if (configResult.success && configResult.created) {
2127
2127
  writeLine2(`\u2713 Generated config: ${configResult.path}`);
@@ -2219,4 +2219,4 @@ export {
2219
2219
  startStdioServer,
2220
2220
  closeServer
2221
2221
  };
2222
- //# sourceMappingURL=chunk-RFUBLOZQ.js.map
2222
+ //# sourceMappingURL=chunk-6GDF6FLC.js.map
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  getErrorMessage
3
- } from "./chunk-4MHE5UVO.js";
3
+ } from "./chunk-LJIB6TNE.js";
4
4
 
5
5
  // src/cli/setup-config.ts
6
6
  import { copyFileSync, existsSync, mkdirSync, writeFileSync } from "fs";
@@ -77,4 +77,4 @@ function ensureBackup(outputPath) {
77
77
  export {
78
78
  runConfigInitSync
79
79
  };
80
- //# sourceMappingURL=chunk-LUVQUKW5.js.map
80
+ //# sourceMappingURL=chunk-6YQCLEHL.js.map
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  createLogger
3
- } from "./chunk-4MHE5UVO.js";
3
+ } from "./chunk-LJIB6TNE.js";
4
4
 
5
5
  // src/config/available-models-cache.ts
6
6
  var logger = createLogger({ component: "available-models-cache" });
@@ -150,4 +150,4 @@ export {
150
150
  getDefaultAvailableModelsCache,
151
151
  setDefaultAvailableModelsCache
152
152
  };
153
- //# sourceMappingURL=chunk-RCWWUZHA.js.map
153
+ //# sourceMappingURL=chunk-73K7575Z.js.map
@@ -1,7 +1,7 @@
1
1
  import {
2
2
  CliCircuitBreaker,
3
3
  DEFAULT_CIRCUIT_BREAKER_CONFIG
4
- } from "./chunk-JECCDZ2S.js";
4
+ } from "./chunk-LIEFKEAO.js";
5
5
  import {
6
6
  CLI_SUBPROCESS_TIMEOUTS,
7
7
  CLI_TIMEOUTS,
@@ -24,7 +24,7 @@ import {
24
24
  getTimeProvider,
25
25
  isRateLimitText,
26
26
  ok
27
- } from "./chunk-4MHE5UVO.js";
27
+ } from "./chunk-LJIB6TNE.js";
28
28
 
29
29
  // src/cli-adapters/subprocess-adapter.ts
30
30
  import { spawn } from "child_process";
@@ -3180,4 +3180,4 @@ export {
3180
3180
  isCliAvailable,
3181
3181
  getAvailableClis
3182
3182
  };
3183
- //# sourceMappingURL=chunk-5FUVEIJC.js.map
3183
+ //# sourceMappingURL=chunk-BMNWUPJO.js.map
@@ -7,7 +7,7 @@ import {
7
7
  err,
8
8
  getErrorMessage,
9
9
  ok
10
- } from "./chunk-4MHE5UVO.js";
10
+ } from "./chunk-LJIB6TNE.js";
11
11
 
12
12
  // src/cli/research-helpers-synthesize.ts
13
13
  import { z } from "zod";
@@ -1015,4 +1015,4 @@ export {
1015
1015
  AttributedInsightSchema,
1016
1016
  synthesizeResearch
1017
1017
  };
1018
- //# sourceMappingURL=chunk-H4XSKDI6.js.map
1018
+ //# sourceMappingURL=chunk-ERWTZSAR.js.map
@@ -7,10 +7,10 @@ import {
7
7
  import {
8
8
  getTokenEnvVars,
9
9
  resolveToken
10
- } from "./chunk-BQ55PBN4.js";
10
+ } from "./chunk-UZCDHAY3.js";
11
11
  import {
12
12
  executeExpert
13
- } from "./chunk-376MBRLD.js";
13
+ } from "./chunk-SVKH6ASN.js";
14
14
  import {
15
15
  EventTopics,
16
16
  NOOP_NOTIFIER,
@@ -36,7 +36,7 @@ import {
36
36
  withAccessPolicy,
37
37
  withProgressHeartbeat,
38
38
  wrapToolWithTimeout
39
- } from "./chunk-3QRO77LO.js";
39
+ } from "./chunk-P4W7PV6L.js";
40
40
  import {
41
41
  REGISTRY_PATH,
42
42
  getProjectRoot,
@@ -45,14 +45,14 @@ import {
45
45
  normalizeTopicToCanonical,
46
46
  savePapersRegistry,
47
47
  synthesizeResearch
48
- } from "./chunk-H4XSKDI6.js";
48
+ } from "./chunk-ERWTZSAR.js";
49
49
  import {
50
50
  IssueTriage,
51
51
  sanitizeInput
52
- } from "./chunk-OO662XRQ.js";
52
+ } from "./chunk-RLQZOEMX.js";
53
53
  import {
54
54
  generateSecurityPlan
55
- } from "./chunk-TE26NHNW.js";
55
+ } from "./chunk-SZ7VPIRA.js";
56
56
  import {
57
57
  analyzeGitHubRepo
58
58
  } from "./chunk-7J7PNOJQ.js";
@@ -64,7 +64,7 @@ import {
64
64
  getContextForTask,
65
65
  inferTaskCategory,
66
66
  summarizeContextForPrompt
67
- } from "./chunk-C3BOZZQC.js";
67
+ } from "./chunk-4OPS2AUD.js";
68
68
  import {
69
69
  DEFAULT_RELEVANCE_CONFIG,
70
70
  MemoryImportance,
@@ -72,19 +72,19 @@ import {
72
72
  generateHyphenId,
73
73
  generateUUID,
74
74
  getToolMemory
75
- } from "./chunk-KN7JWET4.js";
75
+ } from "./chunk-PZEE6T5Y.js";
76
76
  import {
77
77
  DEFAULT_TASK_TTL_MS,
78
78
  DEFAULT_TOOL_RATE_LIMITS,
79
79
  clampTaskTtl
80
- } from "./chunk-RFUBLOZQ.js";
80
+ } from "./chunk-6GDF6FLC.js";
81
81
  import {
82
82
  getAvailabilityCache,
83
83
  resolveFallback
84
- } from "./chunk-TLE2YE6G.js";
84
+ } from "./chunk-WZGCVCRQ.js";
85
85
  import {
86
86
  DEFAULTS
87
- } from "./chunk-HDFUSBU3.js";
87
+ } from "./chunk-V2KWEIV5.js";
88
88
  import {
89
89
  resolveInsideRoot
90
90
  } from "./chunk-NUBSJGQZ.js";
@@ -100,7 +100,7 @@ import {
100
100
  getAvailableClis,
101
101
  sleep,
102
102
  withTimeout
103
- } from "./chunk-5FUVEIJC.js";
103
+ } from "./chunk-BMNWUPJO.js";
104
104
  import {
105
105
  BUILT_IN_EXPERTS,
106
106
  BuiltInExpertTypeSchema,
@@ -112,7 +112,7 @@ import {
112
112
  } from "./chunk-PQHVC4BD.js";
113
113
  import {
114
114
  createSessionMemory
115
- } from "./chunk-FBW6XKZJ.js";
115
+ } from "./chunk-PV3OEDLO.js";
116
116
  import {
117
117
  AGENT_ROUTER_TIMEOUTS,
118
118
  API_TIMEOUTS,
@@ -182,11 +182,11 @@ import {
182
182
  resolveModelIdentitySync,
183
183
  toExpertTaskAnalysisResult,
184
184
  withStep
185
- } from "./chunk-4MHE5UVO.js";
185
+ } from "./chunk-LJIB6TNE.js";
186
186
  import {
187
187
  getNexusDataDir,
188
188
  nexusDataPath
189
- } from "./chunk-2JQXC3CK.js";
189
+ } from "./chunk-I2HMWH4R.js";
190
190
 
191
191
  // src/agents/state-machine-types.ts
192
192
  var VALID_TRANSITIONS = /* @__PURE__ */ new Map([
@@ -26699,7 +26699,7 @@ async function populateUnifiedContextOnState(state) {
26699
26699
  try {
26700
26700
  const taskCandidate = state["task"];
26701
26701
  if (typeof taskCandidate !== "string" || taskCandidate === "") return;
26702
- const { getContextForTask: getContextForTask2, inferTaskCategory: inferTaskCategory2 } = await import("./context-retriever-FKJKKPAA.js");
26702
+ const { getContextForTask: getContextForTask2, inferTaskCategory: inferTaskCategory2 } = await import("./context-retriever-KLJ5X4TL.js");
26703
26703
  const ctx = await getContextForTask2({
26704
26704
  task: taskCandidate,
26705
26705
  category: inferTaskCategory2(taskCandidate),
@@ -41930,7 +41930,7 @@ async function tryIssueTriage(task) {
41930
41930
  try {
41931
41931
  const issueMatch = task.match(/github\.com\/([^/]+\/[^/]+)\/issues\/(\d+)/);
41932
41932
  if (issueMatch === null) return null;
41933
- const { createIssueTriage } = await import("./issue-triage-NGWFHIKY.js");
41933
+ const { createIssueTriage } = await import("./issue-triage-H5VLNGWU.js");
41934
41934
  const triage = createIssueTriage();
41935
41935
  const owner = issueMatch[1] ?? "";
41936
41936
  const num = issueMatch[2] ?? "";
@@ -41958,7 +41958,7 @@ var VALID_TEMPLATES = /* @__PURE__ */ new Set([
41958
41958
  ]);
41959
41959
  async function classifyWithLLM(task) {
41960
41960
  try {
41961
- const { executeExpert: executeExpert2 } = await import("./expert-bridge-6NA7MK7T.js");
41961
+ const { executeExpert: executeExpert2 } = await import("./expert-bridge-EKPDZKMD.js");
41962
41962
  const prompt = [
41963
41963
  "Classify this task into exactly one pipeline template.",
41964
41964
  "Templates: dev (implementation/bug fix/refactor), research (investigate/evaluate/compare),",
@@ -42742,8 +42742,8 @@ var memoryInitPromise = null;
42742
42742
  async function initPipelineMemory() {
42743
42743
  if (cachedMemory !== null) return cachedMemory;
42744
42744
  try {
42745
- const { createSessionMemory: createSessionMemory2 } = await import("./session-memory-OOBM2GQ7.js");
42746
- const { getLearningDir } = await import("./learning-persistence-Q63HZ2EB.js");
42745
+ const { createSessionMemory: createSessionMemory2 } = await import("./session-memory-N76TNRSK.js");
42746
+ const { getLearningDir } = await import("./learning-persistence-NX2KHL5T.js");
42747
42747
  const mem = createSessionMemory2(getLearningDir());
42748
42748
  mem.startSession(`pipeline-${String(Date.now())}`);
42749
42749
  cachedMemory = {
@@ -42798,7 +42798,7 @@ function recordRoutingExperience(category, success, durationMs) {
42798
42798
  callRecord(routingMemoryCache);
42799
42799
  return;
42800
42800
  }
42801
- void import("./routing-memory-Y5UBVQGM.js").then(({ createRoutingMemory }) => {
42801
+ void import("./routing-memory-QKQ3OGWW.js").then(({ createRoutingMemory }) => {
42802
42802
  routingMemoryCache = createRoutingMemory();
42803
42803
  callRecord(routingMemoryCache);
42804
42804
  }).catch((error) => {
@@ -42827,7 +42827,7 @@ ${text}` : "";
42827
42827
  }
42828
42828
  async function getWeatherContext() {
42829
42829
  try {
42830
- const { generateWeatherReport: generateWeatherReport2 } = await import("./weather-report-VOSP7KKV.js");
42830
+ const { generateWeatherReport: generateWeatherReport2 } = await import("./weather-report-IXPYIYE4.js");
42831
42831
  const report = generateWeatherReport2({ includeAdaptive: true });
42832
42832
  const mappings = "recommendedMappings" in report ? report.recommendedMappings : [];
42833
42833
  if (!Array.isArray(mappings) || mappings.length === 0) return "";
@@ -42845,8 +42845,8 @@ ${lines}
42845
42845
  }
42846
42846
  async function getMemoryContext(task) {
42847
42847
  try {
42848
- const { createSessionMemory: createSessionMemory2 } = await import("./session-memory-OOBM2GQ7.js");
42849
- const { getLearningDir } = await import("./learning-persistence-Q63HZ2EB.js");
42848
+ const { createSessionMemory: createSessionMemory2 } = await import("./session-memory-N76TNRSK.js");
42849
+ const { getLearningDir } = await import("./learning-persistence-NX2KHL5T.js");
42850
42850
  const memory = createSessionMemory2(getLearningDir(), { maxLearningsInContext: 10 });
42851
42851
  const learnings = memory.searchLearnings(task.slice(0, 200));
42852
42852
  if (learnings.length === 0) return "";
@@ -42951,7 +42951,7 @@ ${contextBlock}`;
42951
42951
  const strategy = config.votingStrategy ?? "higher_order";
42952
42952
  await postProgress(config, "Vote", `Running consensus with ${strategy} strategy...`);
42953
42953
  try {
42954
- const { executeVoting } = await import("./consensus-vote-TGTGZSPS.js");
42954
+ const { executeVoting } = await import("./consensus-vote-VBXLXVFF.js");
42955
42955
  const votingResult = await executeVoting(
42956
42956
  {
42957
42957
  proposal: plan.slice(0, 4e3),
@@ -43845,7 +43845,7 @@ async function extractSymbolsForTask(task) {
43845
43845
  }
43846
43846
  async function queryResearchRegistry(task) {
43847
43847
  try {
43848
- const { synthesizeResearch: synthesizeResearch2 } = await import("./research-helpers-synthesize-ZWBBFT2O.js");
43848
+ const { synthesizeResearch: synthesizeResearch2 } = await import("./research-helpers-synthesize-XUTBDVI7.js");
43849
43849
  const topic = task.split(/[.!?\n]/).filter((s) => s.trim().length > 10)[0]?.trim();
43850
43850
  if (topic === void 0) return null;
43851
43851
  const result = await synthesizeResearch2(topic.slice(0, 50));
@@ -43930,7 +43930,7 @@ function createScanStageWrapper() {
43930
43930
  try {
43931
43931
  const slug = ctx.task.match(/([a-zA-Z0-9._-]+\/[a-zA-Z0-9._-]+)/)?.[1];
43932
43932
  if (slug !== void 0) {
43933
- const { generateSecurityPlan: generateSecurityPlan2 } = await import("./repo-security-plan-ZGJN6QRW.js");
43933
+ const { generateSecurityPlan: generateSecurityPlan2 } = await import("./repo-security-plan-VJCWWPWO.js");
43934
43934
  const plan = await generateSecurityPlan2({ repo: slug, maxScanners: 10 });
43935
43935
  const recs = plan.recommendations.slice(0, 5).map((r) => `${r.priority}: ${r.displayName} (${r.category})`).join("; ");
43936
43936
  ctx.sharedMemory.write("scan", "decision", { recommendations: recs });
@@ -49541,7 +49541,7 @@ var GitHubTaskTracker = class {
49541
49541
  cachedProvider = null;
49542
49542
  async getProvider() {
49543
49543
  if (this.cachedProvider !== null) return this.cachedProvider;
49544
- const { createScmProvider } = await import("./factory-IIPDY7QB.js");
49544
+ const { createScmProvider } = await import("./factory-FTE7TDCT.js");
49545
49545
  const result = await createScmProvider({ repo: this.config.repo ?? "" });
49546
49546
  if (!result.ok) throw new Error(`SCM provider error: ${result.error.message}`);
49547
49547
  this.cachedProvider = result.value;
@@ -50246,4 +50246,4 @@ export {
50246
50246
  detectBackend,
50247
50247
  createTaskTracker
50248
50248
  };
50249
- //# sourceMappingURL=chunk-RCNNN4E2.js.map
50249
+ //# sourceMappingURL=chunk-HYOIDNBX.js.map
@@ -3,7 +3,15 @@ import { mkdirSync as mkdirSync2 } from "fs";
3
3
  import { join as join3 } from "path";
4
4
 
5
5
  // src/config/nexus-data-dir.ts
6
- import { accessSync as accessSync2, constants as fsConstants, existsSync as existsSync4, mkdirSync } from "fs";
6
+ import {
7
+ accessSync as accessSync2,
8
+ constants as fsConstants,
9
+ copyFileSync,
10
+ existsSync as existsSync4,
11
+ mkdirSync,
12
+ renameSync,
13
+ unlinkSync
14
+ } from "fs";
7
15
  import { homedir as homedir2 } from "os";
8
16
  import { dirname as dirname2, join as join2, resolve as resolve3 } from "path";
9
17
 
@@ -280,6 +288,37 @@ function nexusDataPath(...segments) {
280
288
  function getPerRepoSubdirs() {
281
289
  return PER_REPO_SUBDIRS;
282
290
  }
291
+ var legacySessionsDbMigrated = false;
292
+ var SQLITE_SIDECAR_SUFFIXES = ["", "-wal", "-shm", "-journal"];
293
+ function sessionsDbPath() {
294
+ const target = nexusDataPath("sessions", "sessions.db");
295
+ if (!legacySessionsDbMigrated) {
296
+ legacySessionsDbMigrated = true;
297
+ migrateLegacySessionsDb(target);
298
+ }
299
+ return target;
300
+ }
301
+ function migrateLegacySessionsDb(target) {
302
+ const legacy = nexusDataPath("sessions.db");
303
+ if (legacy === target || !existsSync4(legacy) || existsSync4(target)) return;
304
+ try {
305
+ mkdirSync(dirname2(target), { recursive: true });
306
+ for (const suffix of SQLITE_SIDECAR_SUFFIXES) {
307
+ const from = `${legacy}${suffix}`;
308
+ if (existsSync4(from)) moveFile(from, `${target}${suffix}`);
309
+ }
310
+ } catch {
311
+ }
312
+ }
313
+ function moveFile(from, to) {
314
+ try {
315
+ renameSync(from, to);
316
+ } catch (err) {
317
+ if (err.code !== "EXDEV") throw err;
318
+ copyFileSync(from, to);
319
+ unlinkSync(from);
320
+ }
321
+ }
283
322
 
284
323
  // src/config/learning-persistence.ts
285
324
  function getLearningDir() {
@@ -308,10 +347,11 @@ export {
308
347
  getNexusRepoDir,
309
348
  nexusDataPath,
310
349
  getPerRepoSubdirs,
350
+ sessionsDbPath,
311
351
  getLearningDir,
312
352
  getOutcomesFile,
313
353
  getRulesFile,
314
354
  isPersistenceEnabled,
315
355
  ensureLearningDir
316
356
  };
317
- //# sourceMappingURL=chunk-2JQXC3CK.js.map
357
+ //# sourceMappingURL=chunk-I2HMWH4R.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/config/learning-persistence.ts","../src/config/nexus-data-dir.ts","../src/config/sandbox-detection.ts","../src/config/repo-root-detection.ts","../src/config/portable-mode.ts"],"sourcesContent":["/**\n * Shared configuration for cross-session learning persistence.\n *\n * Controls where learning data (outcomes, distilled rules) is stored\n * on disk and whether persistence is enabled via feature flag.\n *\n * @module config/learning-persistence\n * (Source: Issue #1009 — Cross-session persistence)\n */\n\nimport { mkdirSync } from 'node:fs';\nimport { join } from 'node:path';\nimport { getNexusDataDir } from './nexus-data-dir.js';\n\n// ============================================================================\n// Path resolution (#2316: must read NEXUS_DATA_DIR at call time, not import)\n// ============================================================================\n\n/**\n * Base directory for learning persistence data. Resolved at call time so\n * `NEXUS_DATA_DIR` overrides take effect — the const-at-import-time\n * pattern this replaces was the bug discovered while dogfooding v2.63.0\n * (#2316). Outcome counts on a fresh portable workspace were leaking\n * the host home directory's outcome history.\n */\nexport function getLearningDir(): string {\n return join(getNexusDataDir(), 'learning');\n}\n\n/** JSONL file for persisted task outcomes. */\nexport function getOutcomesFile(): string {\n return join(getLearningDir(), 'outcomes.jsonl');\n}\n\n/** JSON file for persisted distilled rules. */\nexport function getRulesFile(): string {\n return join(getLearningDir(), 'rules.json');\n}\n\n// Note: previous LEARNING_DIR / OUTCOMES_FILE / RULES_FILE exports were\n// removed in #2316 — they were evaluated at module import time and ignored\n// `NEXUS_DATA_DIR`. All callers must use the getter functions above.\n\n/** Directory mode: owner-only (rwx------). */\nconst DIR_MODE = 0o700;\n\n// ============================================================================\n// Helpers\n// ============================================================================\n\n/**\n * Check whether learning persistence is enabled via feature flag.\n *\n * Defaults to true — cross-session LinUCB routing data persists to\n * `~/.nexus-agents/learning/` unless explicitly disabled.\n * Only routing metadata is stored (model, success, duration, category).\n * No user prompts, API keys, or model outputs are persisted.\n *\n * Set NEXUS_PERSIST_LEARNING=false to disable.\n */\nexport function isPersistenceEnabled(): boolean {\n return process.env['NEXUS_PERSIST_LEARNING'] !== 'false';\n}\n\n/** Ensure the learning data directory exists. */\nexport function ensureLearningDir(dir?: string): void {\n mkdirSync(dir ?? getLearningDir(), { recursive: true, mode: DIR_MODE });\n}\n","/**\n * Nexus runtime data directory resolver (#2302, child of #2301).\n *\n * Returns the absolute path under which nexus-agents stores runtime state.\n * Two categories of state exist (epic #2872, vote #2876):\n *\n * - **Per-repo** state (sessions, checkpoints, traces, runs, audit,\n * pipeline, tasks) — tied to the work happening in a specific codebase.\n * When `NEXUS_REPO_PREFERRED=1` is set and the caller is inside a git\n * repo, these resolve to `<repo-root>/.nexus-agents/<subdir>/`.\n * - **Cross-repo** state (learning, voting, memory, weather, research,\n * auth, usage, models manifest) — accumulates across the operator's\n * whole workflow. Always resolves to `~/.nexus-agents/<subdir>/` so the\n * learning/routing feedback loop from #1389 / #1407 keeps working.\n *\n * Resolution order (first match wins):\n * 1. `NEXUS_DATA_DIR` env var if set + non-empty. Wins for both categories\n * — the operator's explicit choice overrides the split.\n * 2. Sandbox-mode default (#2501): when `NEXUS_SANDBOX` is set, use\n * `${NEXUS_SANDBOX_ROOT ?? '/'}/.nexus-agents`. Sandboxed deployments\n * typically mount a multi-repo root; state goes there, shared across\n * repo subfolders rather than buried inside one.\n * 3. Per-repo subdirs (when `findRepoRoot(cwd)` succeeds AND\n * `NEXUS_REPO_PREFERRED` is not explicitly `'0'`):\n * `<repo-root>/.nexus-agents/<subdir>/`. Auto-adds `.nexus-agents/`\n * to the repo's `.gitignore` on first resolution (fail-closed).\n * 4. Cross-repo subdirs when `~/.nexus-agents/` is unwritable AND we're\n * in a repo: per-repo fallback at `<repo-root>/.nexus-agents/<subdir>/`\n * with one-time stderr announce. Issue #2888 — gives sandbox users\n * a working `research/`, `memory/`, etc. without env-var wrangling\n * while preserving the vote #2876 default for normal-machine users.\n * 5. `<homedir>/.nexus-agents` (cross-repo state on normal machines,\n * plus everything when not in a git repo or when\n * `NEXUS_REPO_PREFERRED=0`).\n *\n * `NEXUS_REPO_PREFERRED` defaults **ON** as of this release per vote\n * #2876. Escape hatches preserved:\n * - `NEXUS_REPO_PREFERRED=0` — fully opt out (homedir for everything).\n * - `NEXUS_DATA_DIR=~/.nexus-agents` — explicit override wins over\n * the tier and the categorization both.\n * - `nexus-agents migrate` (#2879) — relocate existing homedir state\n * into `<repo>/.nexus-agents/` before flipping in production.\n *\n * @module config/nexus-data-dir\n */\n\nimport {\n accessSync,\n constants as fsConstants,\n copyFileSync,\n existsSync,\n mkdirSync,\n renameSync,\n unlinkSync,\n} from 'node:fs';\nimport { homedir } from 'node:os';\nimport { dirname, join, resolve } from 'node:path';\n\nimport { detectSandbox } from './sandbox-detection.js';\nimport { findRepoRoot } from './repo-root-detection.js';\nimport { ensureGitignored } from './portable-mode.js';\n\n/**\n * Subdirs scoped to a single repo's work (per the epic #2872 vote).\n * When `NEXUS_REPO_PREFERRED=1` and the caller is inside a git repo, these\n * route to `<repo-root>/.nexus-agents/`; otherwise homedir. The complement\n * (everything not in this set) always goes to homedir so cross-project\n * learning state stays intact.\n *\n * Source-of-truth for the categorization: vote #2876 conditions + audit\n * thread on epic #2872. Adding a new entry here is the appropriate way to\n * mark new state as per-repo — do that as a deliberate decision, not by\n * default.\n */\nconst PER_REPO_SUBDIRS: ReadonlySet<string> = new Set([\n 'sessions',\n 'checkpoints',\n 'traces',\n 'runs',\n 'audit',\n 'pipeline',\n 'tasks',\n]);\n\n/** Returns the absolute path to the nexus-agents data directory. */\nexport function getNexusDataDir(): string {\n const fromEnv = process.env['NEXUS_DATA_DIR']?.trim();\n if (fromEnv !== undefined && fromEnv !== '') {\n return resolve(fromEnv);\n }\n const sandbox = detectSandbox();\n if (sandbox.active) {\n return resolve(sandbox.root ?? '/', '.nexus-agents');\n }\n return join(homedir(), '.nexus-agents');\n}\n\n/**\n * No-op kept for source-compatibility with consumers that called this\n * earlier in development. The resolver is no longer cached, so resetting\n * is unnecessary. Kept exported (rather than removed) to avoid breaking\n * imports in tests that may have already adopted it.\n */\nexport function resetNexusDataDirCache(): void {\n // intentionally empty — see module docstring\n}\n\n/**\n * Tracks per-process state for the auto-gitignore wiring: we only need\n * to (a) probe + append to `.gitignore` once per repo, and (b) bail\n * cleanly if the operator has explicitly silenced the auto-add via\n * `NEXUS_GITIGNORE_AUTO=0`. Reset in tests via the helper below.\n */\nconst gitignoredRoots = new Set<string>();\n\n/** Test helper — clears the auto-gitignore \"already did this\" memo. */\nexport function _resetGitignoreMemoForTests(): void {\n gitignoredRoots.clear();\n}\n\n/**\n * Returns the repo-scoped `.nexus-agents/` directory if all of the\n * following hold: `NEXUS_REPO_PREFERRED` is NOT explicitly `'0'` (it\n * defaults ON as of vote #2876), `NEXUS_DATA_DIR` is not explicitly set\n * (explicit override always wins), no sandbox is active, and\n * `findRepoRoot(cwd)` finds an ancestor `.git`.\n *\n * Side effect: on the first successful resolution per process per repo,\n * appends `.nexus-agents/` to the repo's `.gitignore` if not already\n * present. The operator can silence this with `NEXUS_GITIGNORE_AUTO=0`\n * (e.g. on CI runners with a frozen working tree).\n *\n * Returns `null` when any precondition fails; callers fall back to\n * `getNexusDataDir()` (homedir).\n */\nexport function getNexusRepoDir(): string | null {\n if (process.env['NEXUS_REPO_PREFERRED'] === '0') return null;\n const fromEnv = process.env['NEXUS_DATA_DIR']?.trim();\n if (fromEnv !== undefined && fromEnv !== '') return null;\n if (detectSandbox().active) return null;\n const root = findRepoRoot(process.cwd());\n if (root === null) return null;\n maybeAutoGitignore(root);\n return join(root, '.nexus-agents');\n}\n\n/**\n * Best-effort fail-closed wiring: once per process per repo, ensure\n * `.nexus-agents/` is in `<repo>/.gitignore`. Silenced via\n * `NEXUS_GITIGNORE_AUTO=0`. Failures are non-fatal — the helper logs\n * to stderr and continues.\n */\nfunction maybeAutoGitignore(repoRoot: string): void {\n if (process.env['NEXUS_GITIGNORE_AUTO'] === '0') return;\n if (gitignoredRoots.has(repoRoot)) return;\n gitignoredRoots.add(repoRoot);\n // Only attempt when the repo root looks real — avoid spamming stderr\n // from temp-dir test fixtures that race the lifecycle.\n if (!existsSync(repoRoot)) return;\n ensureGitignored(repoRoot, '.nexus-agents/');\n}\n\n/**\n * Per-process memo: was the homedir base directory found writable on first\n * probe? Used to short-circuit the sandbox-fallback decision in\n * `nexusDataPath()` without spending a syscall on every call.\n */\nlet homedirWritable: boolean | undefined;\n\n/** Per-process memo: have we already announced a fallback for this subdir? */\nconst announcedFallbacks = new Set<string>();\n\n/** Test helper — clears the homedir-writability + announcement memos. */\nexport function _resetWritabilityMemoForTests(): void {\n homedirWritable = undefined;\n announcedFallbacks.clear();\n}\n\n/**\n * Returns true if `getNexusDataDir()` resolves to a writable location. Probed\n * once per process and memo'd — flips the sandbox-fallback on/off for\n * cross-repo subdirs. `mkdirSync(recursive: true)` is the safest probe\n * because it both creates the dir if missing and surfaces ENOENT/EACCES\n * issues at the same point. Failures here are non-fatal — they just route\n * cross-repo state to the per-repo fallback (issue #2888).\n */\nfunction isHomedirBaseWritable(): boolean {\n if (homedirWritable !== undefined) return homedirWritable;\n const base = getNexusDataDir();\n try {\n mkdirSync(base, { recursive: true });\n accessSync(base, fsConstants.W_OK);\n homedirWritable = true;\n } catch {\n homedirWritable = false;\n }\n return homedirWritable;\n}\n\n/**\n * Emit a one-time stderr warning when a cross-repo subdir falls back to\n * the per-repo location. Operators in sandboxes get a clear signal about\n * what happened without per-call noise.\n */\nfunction announceCrossRepoFallback(subdir: string, repoPath: string): void {\n if (announcedFallbacks.has(subdir)) return;\n announcedFallbacks.add(subdir);\n process.stderr.write(\n `[nexus] ${subdir}: homedir ~/.nexus-agents is not writable; ` +\n `using per-repo fallback at ${repoPath}. See docs/guides/SANDBOXED-USAGE.md.\\n`\n );\n}\n\n/**\n * Returns a path joined under the appropriate data directory for the\n * given subdir.\n *\n * Routing decision (first match wins):\n * 1. **Per-repo subdir + in a repo + `NEXUS_REPO_PREFERRED` not '0'** →\n * `<repo>/.nexus-agents/<subdir>/...`. Standard behavior since #2884.\n * 2. **Cross-repo subdir + homedir unwritable + in a repo** →\n * `<repo>/.nexus-agents/<subdir>/...` as a sandbox-friendly fallback\n * (issue #2888). Emits a one-time stderr warning per subdir.\n * 3. **Otherwise** → `<homedir>/.nexus-agents/<subdir>/...`. If homedir\n * is also unwritable, the actual write will surface the error.\n *\n * Existing callers don't need to change — the routing decision is driven\n * by the first segment, not by caller-declared intent.\n */\nexport function nexusDataPath(...segments: string[]): string {\n const first = segments[0];\n\n // Tier 1: per-repo subdir + repo-preferred default.\n if (first !== undefined && PER_REPO_SUBDIRS.has(first)) {\n const repoDir = getNexusRepoDir();\n if (repoDir !== null) {\n return join(repoDir, ...segments);\n }\n }\n\n // Tier 2: cross-repo subdir but homedir isn't reachable. Fall back to\n // the per-repo location if we're in a repo, so sandbox users get a\n // working `research/`, `memory/`, etc. without manual env-var setup.\n // Vote #2876 preserved: this only fires when homedir is physically\n // unreachable; normal-machine users see no change.\n if (first !== undefined && !isHomedirBaseWritable()) {\n const repoDir = getNexusRepoDir();\n if (repoDir !== null) {\n const fallbackPath = join(repoDir, ...segments);\n announceCrossRepoFallback(first, fallbackPath);\n return fallbackPath;\n }\n // No repo to fall back to AND homedir unreachable — return the\n // homedir path anyway. The caller's eventual write will surface\n // the underlying EACCES/ENOENT, which is the right error to show\n // because the environment is genuinely broken at that point.\n }\n\n return join(getNexusDataDir(), ...segments);\n}\n\n/**\n * Like `nexusDataPath()` but eagerly creates the parent directory so\n * callers don't have to remember `mkdirSync(dirname(p), { recursive: true })`\n * before every write. Issue #2890. Use when the returned path will be\n * written to immediately; for read-only resolution prefer `nexusDataPath()`.\n *\n * If the call resolves to a directory (single segment or no segments),\n * the target IS the resolved path. If it resolves to a file (multiple\n * segments), the target is its parent.\n */\nexport function nexusDataPathEnsure(...segments: string[]): string {\n const resolved = nexusDataPath(...segments);\n const target = segments.length > 1 ? dirname(resolved) : resolved;\n mkdirSync(target, { recursive: true });\n return resolved;\n}\n\n/**\n * Explicitly homedir-scoped path. Use this in code that handles\n * cross-project state (routing memory, model registry cache, auth,\n * research catalog) where you want a hard guarantee that the resolver\n * never routes per-repo, even if a new subdir gets accidentally added\n * to the `PER_REPO_SUBDIRS` allowlist later.\n */\nexport function nexusSharedPath(...segments: string[]): string {\n return join(getNexusDataDir(), ...segments);\n}\n\n/**\n * Returns the read-only categorization used by `nexusDataPath()`.\n * Exposed for tests and for tooling that wants to introspect which\n * subdirs are per-repo (e.g. the `nexus-agents migrate` command).\n */\nexport function getPerRepoSubdirs(): ReadonlySet<string> {\n return PER_REPO_SUBDIRS;\n}\n\n/** Per-process memo — the legacy session-DB relocation runs at most once. */\nlet legacySessionsDbMigrated = false;\n\n/** Test helper — clears the session-DB migration \"already did this\" memo. */\nexport function _resetSessionsDbMigrationMemoForTests(): void {\n legacySessionsDbMigrated = false;\n}\n\n/** SQLite sidecar suffixes that must travel with the main DB file. */\nconst SQLITE_SIDECAR_SUFFIXES = ['', '-wal', '-shm', '-journal'] as const;\n\n/**\n * Resolves the session-database path, performing a one-time relocation\n * of any pre-#2902 database on the first call per process.\n *\n * The session DB is per-repo episodic state and belongs in the\n * `sessions/` bucket alongside the session journals — vote #2876\n * categorized `sessions/` as per-repo, and issue #2902 (consensus\n * 3/3) extended that to the DB. Before #2902 the DB resolved via\n * `nexusDataPath('sessions.db')`; because `sessions.db` is not a\n * per-repo first segment, that landed cross-repo at\n * `~/.nexus-agents/sessions.db`, so a DB started in one repo leaked\n * into every other repo.\n *\n * If a legacy DB exists at the old location and none exists at the\n * new one, the legacy file (and any SQLite sidecars) is moved so\n * existing session history is preserved rather than silently\n * orphaned. The move is best-effort: a failure leaves the legacy DB\n * untouched for manual recovery and the caller gets a fresh DB at the\n * new path. `NEXUS_DATA_DIR` / `NEXUS_REPO_PREFERRED` / the\n * `NEXUS_SESSIONS_DB` override all sit upstream of this resolver.\n */\nexport function sessionsDbPath(): string {\n const target = nexusDataPath('sessions', 'sessions.db');\n if (!legacySessionsDbMigrated) {\n legacySessionsDbMigrated = true;\n migrateLegacySessionsDb(target);\n }\n return target;\n}\n\n/** One-time relocation of a pre-#2902 session DB. Best-effort — see `sessionsDbPath`. */\nfunction migrateLegacySessionsDb(target: string): void {\n const legacy = nexusDataPath('sessions.db'); // pre-#2902 resolution\n if (legacy === target || !existsSync(legacy) || existsSync(target)) return;\n try {\n mkdirSync(dirname(target), { recursive: true });\n for (const suffix of SQLITE_SIDECAR_SUFFIXES) {\n const from = `${legacy}${suffix}`;\n if (existsSync(from)) moveFile(from, `${target}${suffix}`);\n }\n } catch {\n // Best-effort — a migration failure must never break session storage.\n }\n}\n\n/** Moves a file, falling back to copy+unlink across a filesystem boundary. */\nfunction moveFile(from: string, to: string): void {\n try {\n renameSync(from, to);\n } catch (err) {\n if ((err as NodeJS.ErrnoException).code !== 'EXDEV') throw err;\n copyFileSync(from, to);\n unlinkSync(from);\n }\n}\n","/**\n * Sandbox detection (#2501, child 1 of epic #2500).\n *\n * nexus-agents needs to know whether it's running inside a host-provided\n * sandbox (Docker Desktop Sandbox + OpenCode, Codex sandbox, locked-down\n * CI runner) so it can adjust behaviour:\n *\n * - default `NEXUS_DATA_DIR` to the multi-repo root rather than `~/...`\n * - skip CLI subprocess detection (binaries aren't there)\n * - fail-fast when the gateway is unreachable instead of degrading\n * - suppress diagnostics that don't apply\n *\n * The signal is **explicit**: the image author (Dockerfile, devcontainer,\n * harness wrapper) sets `NEXUS_SANDBOX=<flavor>`. The flavor string is\n * for diagnostics + per-flavor branching (`docker-opencode`, `codex`,\n * `claude-code`, `ci-restricted`, …); presence is the on/off signal.\n *\n * A heuristic check runs alongside for verification — if `NEXUS_SANDBOX`\n * claims `docker-opencode` but `/.dockerenv` is missing, that's a\n * misconfiguration worth surfacing to the operator.\n *\n * @module config/sandbox-detection\n */\n\nimport { existsSync, readFileSync } from 'node:fs';\n\n/**\n * Heuristic detection result. Independent from the explicit\n * `NEXUS_SANDBOX` env var; produced by inspecting filesystem markers.\n */\nexport type SandboxHeuristic = 'docker' | 'podman' | 'unknown' | null;\n\nexport interface SandboxInfo {\n /**\n * True iff `NEXUS_SANDBOX` is set + non-empty. The explicit signal\n * the rest of the codebase keys off — never `true` by heuristic alone.\n */\n readonly active: boolean;\n /**\n * Operator-supplied flavor string, e.g. `docker-opencode`. Undefined\n * when `active === false` or the env var is empty.\n */\n readonly flavor: string | undefined;\n /**\n * Multi-repo root the user mounted. From `NEXUS_SANDBOX_ROOT`. Undefined\n * when unset; consumers that need a default substitute `/`.\n */\n readonly root: string | undefined;\n /**\n * Independent heuristic match — `null` when we couldn't run the check,\n * `'unknown'` when ran but no marker matched. Used by `doctor` to flag\n * mismatches between the explicit signal and the runtime environment.\n */\n readonly heuristicMatch: SandboxHeuristic;\n}\n\n/**\n * Detect whether nexus-agents is running inside a host-provided sandbox.\n * Pure read of env + filesystem; no caching (cheap enough to recompute,\n * and tests routinely mutate process.env).\n */\nexport function detectSandbox(): SandboxInfo {\n const flavorRaw = process.env['NEXUS_SANDBOX']?.trim();\n const flavor = flavorRaw !== undefined && flavorRaw !== '' ? flavorRaw : undefined;\n const active = flavor !== undefined;\n\n const rootRaw = process.env['NEXUS_SANDBOX_ROOT']?.trim();\n const root = rootRaw !== undefined && rootRaw !== '' ? rootRaw : undefined;\n\n return {\n active,\n flavor,\n root,\n heuristicMatch: detectContainerHeuristic(),\n };\n}\n\n/**\n * Look for filesystem markers indicating a container runtime. Used as a\n * cross-check against the explicit `NEXUS_SANDBOX` signal.\n *\n * Order of checks:\n * 1. `/.dockerenv` (Docker)\n * 2. `/run/.containerenv` (Podman)\n * 3. `/proc/1/cgroup` containing `docker` or `containerd` strings\n *\n * Returns `null` when none of the checks could run (non-Linux host with\n * no `/proc`, sandbox blocks `existsSync`, etc.) — distinct from\n * `'unknown'` (checks ran, no marker matched) so the doctor message can\n * differentiate \"we couldn't tell\" from \"we checked, no container\".\n */\nfunction detectContainerHeuristic(): SandboxHeuristic {\n try {\n if (existsSync('/.dockerenv')) return 'docker';\n if (existsSync('/run/.containerenv')) return 'podman';\n if (existsSync('/proc/1/cgroup')) {\n const cgroup = readFileSync('/proc/1/cgroup', 'utf8');\n if (/\\bdocker\\b/.test(cgroup)) return 'docker';\n if (/\\bcontainerd\\b/.test(cgroup)) return 'docker';\n }\n return 'unknown';\n } catch {\n return null;\n }\n}\n","/**\n * Repo-root detection — walks upward from a starting directory looking for\n * `.git` so callers can scope state to the current git repo. Built for\n * epic #2872 (issue #2882) to support the per-repo `.nexus-agents/` data\n * directory ratified by vote #2876.\n *\n * Defenses adopted:\n * - Walks upward but stops at filesystem root (no infinite loop on\n * symlinks-to-self).\n * - Stops at filesystem boundary (different `stat.dev`) — refuses to\n * escape across mount points. Prevents a sandboxed workdir from\n * resolving a `.git` on the host filesystem.\n * - Detects git worktrees: `.git` may be a *file* containing\n * `gitdir: <path>` rather than a directory.\n * - Realpath's the final root and rejects results that escape the\n * starting cwd by symlink.\n *\n * Deferred (tracked separately; not blocking #2882):\n * - CVE-2022-24765-style ownership check (refuse `.git` owned by a\n * different uid than the running process). The git CLI added\n * `safe.directory` for this; we don't have a comparable allowlist\n * surface yet. In CI the heuristic is too noisy to be useful\n * (runners often clone as a different uid than the workload).\n * File-system isolation (the `stat.dev` check above) covers the\n * bulk of the attack class.\n *\n * @module config/repo-root-detection\n */\n\nimport { existsSync, readFileSync, realpathSync, statSync } from 'node:fs';\nimport { dirname, isAbsolute, resolve } from 'node:path';\n\n/**\n * Walks upward from `start` looking for `.git` (file or directory).\n * Returns the absolute path to the directory containing it, or `null`.\n *\n * Worktrees: a `.git` file (not dir) with contents `gitdir: <path>` is\n * still recognised as marking the repo root. The pointed-to gitdir is\n * NOT followed — we just need the worktree's own root.\n *\n * Filesystem boundary: stops walking if the next ancestor lives on a\n * different filesystem (different `stat.dev`). This prevents a workdir\n * mounted inside a sandbox from finding a host-side `.git`.\n */\nexport function findRepoRoot(start: string): string | null {\n if (!isAbsolute(start)) {\n start = resolve(start);\n }\n\n let current: string;\n try {\n current = realpathSync(start);\n } catch {\n return null;\n }\n\n let startDev: number | undefined;\n try {\n startDev = statSync(current).dev;\n } catch {\n return null;\n }\n\n // Walk up. Depth cap is paranoid but bounds the loop on pathological\n // symlinks even though realpathSync above should already prevent cycles.\n for (let i = 0; i < 64; i++) {\n if (isRepoRoot(current)) {\n return current;\n }\n const parent = dirname(current);\n if (parent === current) {\n // Hit filesystem root.\n return null;\n }\n try {\n if (statSync(parent).dev !== startDev) {\n // Crossed a mount point; refuse to escape.\n return null;\n }\n } catch {\n return null;\n }\n current = parent;\n }\n return null;\n}\n\n/** True iff `dir/.git` exists as a directory or a git-worktree marker file. */\nexport function isRepoRoot(dir: string): boolean {\n const gitPath = `${dir}/.git`;\n if (!existsSync(gitPath)) return false;\n try {\n const st = statSync(gitPath);\n if (st.isDirectory()) return true;\n if (st.isFile()) {\n // Worktree: first line should be `gitdir: <path>`.\n const head = readFileSync(gitPath, 'utf-8').slice(0, 256);\n return head.startsWith('gitdir:');\n }\n } catch {\n return false;\n }\n return false;\n}\n","/**\n * portable-mode — auto-detect sandboxed execution environments and\n * redirect nexus-agents data to a workspace-local directory.\n *\n * The existing `getNexusDataDir()` already respects `NEXUS_DATA_DIR` and\n * `NEXUS_PORTABLE_MODE`. This module wires up the *auto-detection* path\n * so operators running inside a Docker / restricted-FS / sandboxed\n * environment don't have to set the env vars manually — nexus-agents\n * notices and announces the flip.\n *\n * Source: Issue #2471 (epic #2467 child).\n *\n * Detection rules (first match wins):\n * 1. `NEXUS_DATA_DIR` already set → respect, no auto-detect\n * 2. `NEXUS_PORTABLE_MODE=0` → operator opted out, no auto-detect\n * 3. `NEXUS_PORTABLE_MODE=1` → portable mode, no detection needed\n * 4. Heuristic: home directory not writable\n * 5. Heuristic: container env vars set (KUBERNETES_SERVICE_HOST,\n * DOCKER_CONTAINER, ECS_CONTAINER_METADATA_URI, SANDBOX, etc.)\n *\n * When portable mode fires:\n * - Sets `process.env.NEXUS_DATA_DIR` to `<cwd>/.nexus-agents`\n * - Announces once on stderr (subsequent calls are silent)\n * - If cwd is a git repo, appends `.nexus-agents/` to .gitignore\n *\n * To force off: `NEXUS_PORTABLE_MODE=0`. To force on without heuristics:\n * `NEXUS_PORTABLE_MODE=1`. To override target dir: `NEXUS_DATA_DIR=...`.\n */\n\nimport { accessSync, constants, existsSync, readFileSync, appendFileSync, statSync } from 'node:fs';\nimport { homedir } from 'node:os';\nimport { join, resolve } from 'node:path';\n\n/** Container / sandbox environment variables that strongly imply portable mode. */\nconst SANDBOX_ENV_VARS: readonly string[] = [\n 'KUBERNETES_SERVICE_HOST',\n 'DOCKER_CONTAINER',\n 'ECS_CONTAINER_METADATA_URI',\n 'ECS_CONTAINER_METADATA_URI_V4',\n 'SANDBOX',\n 'NEXUS_SANDBOX',\n];\n\nlet DETECTED = false;\n\ninterface DetectionResult {\n readonly portable: boolean;\n readonly dataDir: string;\n readonly reason:\n | 'env-data-dir'\n | 'env-opt-out'\n | 'env-opt-in'\n | 'home-unwritable'\n | 'container-env'\n | 'default';\n}\n\nfunction isHomeWritable(): boolean {\n try {\n const home = homedir();\n if (!existsSync(home)) return false;\n accessSync(home, constants.W_OK);\n return true;\n } catch {\n return false;\n }\n}\n\nfunction inSandboxEnv(): boolean {\n for (const v of SANDBOX_ENV_VARS) {\n const val = process.env[v];\n if (val !== undefined && val !== '') return true;\n }\n return false;\n}\n\nfunction checkExplicitEnv(cwd: string): DetectionResult | null {\n const fromEnv = process.env['NEXUS_DATA_DIR']?.trim();\n if (fromEnv !== undefined && fromEnv !== '') {\n return { portable: false, dataDir: resolve(fromEnv), reason: 'env-data-dir' };\n }\n const portableEnv = process.env['NEXUS_PORTABLE_MODE'];\n if (portableEnv === '0' || portableEnv === 'false') {\n return { portable: false, dataDir: join(homedir(), '.nexus-agents'), reason: 'env-opt-out' };\n }\n if (portableEnv === '1' || portableEnv === 'true') {\n return { portable: true, dataDir: join(cwd, '.nexus-agents'), reason: 'env-opt-in' };\n }\n return null;\n}\n\nfunction checkHeuristics(cwd: string): DetectionResult | null {\n if (!isHomeWritable()) {\n return { portable: true, dataDir: join(cwd, '.nexus-agents'), reason: 'home-unwritable' };\n }\n if (inSandboxEnv()) {\n return { portable: true, dataDir: join(cwd, '.nexus-agents'), reason: 'container-env' };\n }\n return null;\n}\n\n/**\n * Decide whether to flip nexus-agents to portable mode and what data dir\n * to use. Pure function; no side effects beyond reading env + filesystem.\n */\nexport function detectPortableMode(cwd: string = process.cwd()): DetectionResult {\n return (\n checkExplicitEnv(cwd) ??\n checkHeuristics(cwd) ?? {\n portable: false,\n dataDir: join(homedir(), '.nexus-agents'),\n reason: 'default',\n }\n );\n}\n\n/**\n * Apply detected portable mode at process startup. Idempotent (subsequent\n * calls are no-ops). Announces on stderr once when the auto-detection\n * heuristic triggers — env-opt-in/out doesn't announce because the\n * operator already knows.\n */\nexport function applyPortableMode(cwd: string = process.cwd()): void {\n if (DETECTED) return;\n DETECTED = true;\n\n const result = detectPortableMode(cwd);\n\n // No env, no heuristic match — nothing to do.\n if (!result.portable) return;\n\n // The heuristic-driven cases announce; explicit opt-in is silent.\n if (result.reason === 'home-unwritable' || result.reason === 'container-env') {\n process.stderr.write(\n `[portable-mode] Sandbox detected (${result.reason}). Using ${result.dataDir} for all nexus-agents data.\\n` +\n ` Set NEXUS_PORTABLE_MODE=0 to override; see docs/guides/SANDBOXED-USAGE.md\\n`\n );\n }\n\n process.env['NEXUS_DATA_DIR'] = result.dataDir;\n\n if (isInsideGitRepo(cwd)) {\n ensureGitignored(cwd, '.nexus-agents/');\n }\n}\n\nfunction isInsideGitRepo(cwd: string): boolean {\n try {\n const gitDir = join(cwd, '.git');\n return existsSync(gitDir) && statSync(gitDir).isDirectory();\n } catch {\n return false;\n }\n}\n\n/**\n * Append `entry` to `<cwd>/.gitignore` if not already present. Stderr\n * announce on the first append. Exported because the repo-preferred\n * resolver in `nexus-data-dir.ts` reuses the same auto-gitignore behavior\n * when `<repo>/.nexus-agents/` becomes the active data dir (epic #2872).\n */\nexport function ensureGitignored(cwd: string, entry: string): void {\n const path = join(cwd, '.gitignore');\n try {\n const existing = existsSync(path) ? readFileSync(path, 'utf-8') : '';\n const lines = existing.split('\\n').map((l) => l.trim());\n if (lines.includes(entry) || lines.includes(entry.replace(/\\/$/, ''))) return;\n const sep = existing.length > 0 && !existing.endsWith('\\n') ? '\\n' : '';\n appendFileSync(path, `${sep}${entry}\\n`, 'utf-8');\n process.stderr.write(\n `[portable-mode] Added '${entry}' to ${path} so nexus-agents data is gitignored.\\n`\n );\n } catch (e: unknown) {\n // Non-fatal — operator can add the line themselves.\n const msg = e instanceof Error ? e.message : String(e);\n process.stderr.write(\n `[portable-mode] Could not auto-update ${path} (${msg}). Add '${entry}' manually if you don't want nexus-agents data tracked by git.\\n`\n );\n }\n}\n\n/** Test-only reset of the once-only state. */\nexport function _resetDetectedForTests(): void {\n DETECTED = false;\n}\n"],"mappings":";AAUA,SAAS,aAAAA,kBAAiB;AAC1B,SAAS,QAAAC,aAAY;;;ACmCrB;AAAA,EACE,cAAAC;AAAA,EACA,aAAa;AAAA,EACb;AAAA,EACA,cAAAC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,OACK;AACP,SAAS,WAAAC,gBAAe;AACxB,SAAS,WAAAC,UAAS,QAAAC,OAAM,WAAAC,gBAAe;;;AChCvC,SAAS,YAAY,oBAAoB;AAqClC,SAAS,gBAA6B;AAC3C,QAAM,YAAY,QAAQ,IAAI,eAAe,GAAG,KAAK;AACrD,QAAM,SAAS,cAAc,UAAa,cAAc,KAAK,YAAY;AACzE,QAAM,SAAS,WAAW;AAE1B,QAAM,UAAU,QAAQ,IAAI,oBAAoB,GAAG,KAAK;AACxD,QAAM,OAAO,YAAY,UAAa,YAAY,KAAK,UAAU;AAEjE,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA,gBAAgB,yBAAyB;AAAA,EAC3C;AACF;AAgBA,SAAS,2BAA6C;AACpD,MAAI;AACF,QAAI,WAAW,aAAa,EAAG,QAAO;AACtC,QAAI,WAAW,oBAAoB,EAAG,QAAO;AAC7C,QAAI,WAAW,gBAAgB,GAAG;AAChC,YAAM,SAAS,aAAa,kBAAkB,MAAM;AACpD,UAAI,aAAa,KAAK,MAAM,EAAG,QAAO;AACtC,UAAI,iBAAiB,KAAK,MAAM,EAAG,QAAO;AAAA,IAC5C;AACA,WAAO;AAAA,EACT,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;AC3EA,SAAS,cAAAC,aAAY,gBAAAC,eAAc,cAAc,gBAAgB;AACjE,SAAS,SAAS,YAAY,eAAe;AActC,SAAS,aAAa,OAA8B;AACzD,MAAI,CAAC,WAAW,KAAK,GAAG;AACtB,YAAQ,QAAQ,KAAK;AAAA,EACvB;AAEA,MAAI;AACJ,MAAI;AACF,cAAU,aAAa,KAAK;AAAA,EAC9B,QAAQ;AACN,WAAO;AAAA,EACT;AAEA,MAAI;AACJ,MAAI;AACF,eAAW,SAAS,OAAO,EAAE;AAAA,EAC/B,QAAQ;AACN,WAAO;AAAA,EACT;AAIA,WAAS,IAAI,GAAG,IAAI,IAAI,KAAK;AAC3B,QAAI,WAAW,OAAO,GAAG;AACvB,aAAO;AAAA,IACT;AACA,UAAM,SAAS,QAAQ,OAAO;AAC9B,QAAI,WAAW,SAAS;AAEtB,aAAO;AAAA,IACT;AACA,QAAI;AACF,UAAI,SAAS,MAAM,EAAE,QAAQ,UAAU;AAErC,eAAO;AAAA,MACT;AAAA,IACF,QAAQ;AACN,aAAO;AAAA,IACT;AACA,cAAU;AAAA,EACZ;AACA,SAAO;AACT;AAGO,SAAS,WAAW,KAAsB;AAC/C,QAAM,UAAU,GAAG,GAAG;AACtB,MAAI,CAACD,YAAW,OAAO,EAAG,QAAO;AACjC,MAAI;AACF,UAAM,KAAK,SAAS,OAAO;AAC3B,QAAI,GAAG,YAAY,EAAG,QAAO;AAC7B,QAAI,GAAG,OAAO,GAAG;AAEf,YAAM,OAAOC,cAAa,SAAS,OAAO,EAAE,MAAM,GAAG,GAAG;AACxD,aAAO,KAAK,WAAW,SAAS;AAAA,IAClC;AAAA,EACF,QAAQ;AACN,WAAO;AAAA,EACT;AACA,SAAO;AACT;;;AC1EA,SAAS,YAAY,WAAW,cAAAC,aAAY,gBAAAC,eAAc,gBAAgB,YAAAC,iBAAgB;AAC1F,SAAS,eAAe;AACxB,SAAS,MAAM,WAAAC,gBAAe;AAG9B,IAAM,mBAAsC;AAAA,EAC1C;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEA,IAAI,WAAW;AAcf,SAAS,iBAA0B;AACjC,MAAI;AACF,UAAM,OAAO,QAAQ;AACrB,QAAI,CAACH,YAAW,IAAI,EAAG,QAAO;AAC9B,eAAW,MAAM,UAAU,IAAI;AAC/B,WAAO;AAAA,EACT,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAEA,SAAS,eAAwB;AAC/B,aAAW,KAAK,kBAAkB;AAChC,UAAM,MAAM,QAAQ,IAAI,CAAC;AACzB,QAAI,QAAQ,UAAa,QAAQ,GAAI,QAAO;AAAA,EAC9C;AACA,SAAO;AACT;AAEA,SAAS,iBAAiB,KAAqC;AAC7D,QAAM,UAAU,QAAQ,IAAI,gBAAgB,GAAG,KAAK;AACpD,MAAI,YAAY,UAAa,YAAY,IAAI;AAC3C,WAAO,EAAE,UAAU,OAAO,SAASG,SAAQ,OAAO,GAAG,QAAQ,eAAe;AAAA,EAC9E;AACA,QAAM,cAAc,QAAQ,IAAI,qBAAqB;AACrD,MAAI,gBAAgB,OAAO,gBAAgB,SAAS;AAClD,WAAO,EAAE,UAAU,OAAO,SAAS,KAAK,QAAQ,GAAG,eAAe,GAAG,QAAQ,cAAc;AAAA,EAC7F;AACA,MAAI,gBAAgB,OAAO,gBAAgB,QAAQ;AACjD,WAAO,EAAE,UAAU,MAAM,SAAS,KAAK,KAAK,eAAe,GAAG,QAAQ,aAAa;AAAA,EACrF;AACA,SAAO;AACT;AAEA,SAAS,gBAAgB,KAAqC;AAC5D,MAAI,CAAC,eAAe,GAAG;AACrB,WAAO,EAAE,UAAU,MAAM,SAAS,KAAK,KAAK,eAAe,GAAG,QAAQ,kBAAkB;AAAA,EAC1F;AACA,MAAI,aAAa,GAAG;AAClB,WAAO,EAAE,UAAU,MAAM,SAAS,KAAK,KAAK,eAAe,GAAG,QAAQ,gBAAgB;AAAA,EACxF;AACA,SAAO;AACT;AAMO,SAAS,mBAAmB,MAAc,QAAQ,IAAI,GAAoB;AAC/E,SACE,iBAAiB,GAAG,KACpB,gBAAgB,GAAG,KAAK;AAAA,IACtB,UAAU;AAAA,IACV,SAAS,KAAK,QAAQ,GAAG,eAAe;AAAA,IACxC,QAAQ;AAAA,EACV;AAEJ;AAQO,SAAS,kBAAkB,MAAc,QAAQ,IAAI,GAAS;AACnE,MAAI,SAAU;AACd,aAAW;AAEX,QAAM,SAAS,mBAAmB,GAAG;AAGrC,MAAI,CAAC,OAAO,SAAU;AAGtB,MAAI,OAAO,WAAW,qBAAqB,OAAO,WAAW,iBAAiB;AAC5E,YAAQ,OAAO;AAAA,MACb,qCAAqC,OAAO,MAAM,YAAY,OAAO,OAAO;AAAA;AAAA;AAAA,IAE9E;AAAA,EACF;AAEA,UAAQ,IAAI,gBAAgB,IAAI,OAAO;AAEvC,MAAI,gBAAgB,GAAG,GAAG;AACxB,qBAAiB,KAAK,gBAAgB;AAAA,EACxC;AACF;AAEA,SAAS,gBAAgB,KAAsB;AAC7C,MAAI;AACF,UAAM,SAAS,KAAK,KAAK,MAAM;AAC/B,WAAOH,YAAW,MAAM,KAAKE,UAAS,MAAM,EAAE,YAAY;AAAA,EAC5D,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAQO,SAAS,iBAAiB,KAAa,OAAqB;AACjE,QAAM,OAAO,KAAK,KAAK,YAAY;AACnC,MAAI;AACF,UAAM,WAAWF,YAAW,IAAI,IAAIC,cAAa,MAAM,OAAO,IAAI;AAClE,UAAM,QAAQ,SAAS,MAAM,IAAI,EAAE,IAAI,CAAC,MAAM,EAAE,KAAK,CAAC;AACtD,QAAI,MAAM,SAAS,KAAK,KAAK,MAAM,SAAS,MAAM,QAAQ,OAAO,EAAE,CAAC,EAAG;AACvE,UAAM,MAAM,SAAS,SAAS,KAAK,CAAC,SAAS,SAAS,IAAI,IAAI,OAAO;AACrE,mBAAe,MAAM,GAAG,GAAG,GAAG,KAAK;AAAA,GAAM,OAAO;AAChD,YAAQ,OAAO;AAAA,MACb,0BAA0B,KAAK,QAAQ,IAAI;AAAA;AAAA,IAC7C;AAAA,EACF,SAAS,GAAY;AAEnB,UAAM,MAAM,aAAa,QAAQ,EAAE,UAAU,OAAO,CAAC;AACrD,YAAQ,OAAO;AAAA,MACb,yCAAyC,IAAI,KAAK,GAAG,WAAW,KAAK;AAAA;AAAA,IACvE;AAAA,EACF;AACF;;;AHzGA,IAAM,mBAAwC,oBAAI,IAAI;AAAA,EACpD;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,CAAC;AAGM,SAAS,kBAA0B;AACxC,QAAM,UAAU,QAAQ,IAAI,gBAAgB,GAAG,KAAK;AACpD,MAAI,YAAY,UAAa,YAAY,IAAI;AAC3C,WAAOG,SAAQ,OAAO;AAAA,EACxB;AACA,QAAM,UAAU,cAAc;AAC9B,MAAI,QAAQ,QAAQ;AAClB,WAAOA,SAAQ,QAAQ,QAAQ,KAAK,eAAe;AAAA,EACrD;AACA,SAAOC,MAAKC,SAAQ,GAAG,eAAe;AACxC;AAkBA,IAAM,kBAAkB,oBAAI,IAAY;AAsBjC,SAAS,kBAAiC;AAC/C,MAAI,QAAQ,IAAI,sBAAsB,MAAM,IAAK,QAAO;AACxD,QAAM,UAAU,QAAQ,IAAI,gBAAgB,GAAG,KAAK;AACpD,MAAI,YAAY,UAAa,YAAY,GAAI,QAAO;AACpD,MAAI,cAAc,EAAE,OAAQ,QAAO;AACnC,QAAM,OAAO,aAAa,QAAQ,IAAI,CAAC;AACvC,MAAI,SAAS,KAAM,QAAO;AAC1B,qBAAmB,IAAI;AACvB,SAAOC,MAAK,MAAM,eAAe;AACnC;AAQA,SAAS,mBAAmB,UAAwB;AAClD,MAAI,QAAQ,IAAI,sBAAsB,MAAM,IAAK;AACjD,MAAI,gBAAgB,IAAI,QAAQ,EAAG;AACnC,kBAAgB,IAAI,QAAQ;AAG5B,MAAI,CAACC,YAAW,QAAQ,EAAG;AAC3B,mBAAiB,UAAU,gBAAgB;AAC7C;AAOA,IAAI;AAGJ,IAAM,qBAAqB,oBAAI,IAAY;AAgB3C,SAAS,wBAAiC;AACxC,MAAI,oBAAoB,OAAW,QAAO;AAC1C,QAAM,OAAO,gBAAgB;AAC7B,MAAI;AACF,cAAU,MAAM,EAAE,WAAW,KAAK,CAAC;AACnC,IAAAC,YAAW,MAAM,YAAY,IAAI;AACjC,sBAAkB;AAAA,EACpB,QAAQ;AACN,sBAAkB;AAAA,EACpB;AACA,SAAO;AACT;AAOA,SAAS,0BAA0B,QAAgB,UAAwB;AACzE,MAAI,mBAAmB,IAAI,MAAM,EAAG;AACpC,qBAAmB,IAAI,MAAM;AAC7B,UAAQ,OAAO;AAAA,IACb,WAAW,MAAM,yEACe,QAAQ;AAAA;AAAA,EAC1C;AACF;AAkBO,SAAS,iBAAiB,UAA4B;AAC3D,QAAM,QAAQ,SAAS,CAAC;AAGxB,MAAI,UAAU,UAAa,iBAAiB,IAAI,KAAK,GAAG;AACtD,UAAM,UAAU,gBAAgB;AAChC,QAAI,YAAY,MAAM;AACpB,aAAOC,MAAK,SAAS,GAAG,QAAQ;AAAA,IAClC;AAAA,EACF;AAOA,MAAI,UAAU,UAAa,CAAC,sBAAsB,GAAG;AACnD,UAAM,UAAU,gBAAgB;AAChC,QAAI,YAAY,MAAM;AACpB,YAAM,eAAeA,MAAK,SAAS,GAAG,QAAQ;AAC9C,gCAA0B,OAAO,YAAY;AAC7C,aAAO;AAAA,IACT;AAAA,EAKF;AAEA,SAAOA,MAAK,gBAAgB,GAAG,GAAG,QAAQ;AAC5C;AAmCO,SAAS,oBAAyC;AACvD,SAAO;AACT;AAGA,IAAI,2BAA2B;AAQ/B,IAAM,0BAA0B,CAAC,IAAI,QAAQ,QAAQ,UAAU;AAuBxD,SAAS,iBAAyB;AACvC,QAAM,SAAS,cAAc,YAAY,aAAa;AACtD,MAAI,CAAC,0BAA0B;AAC7B,+BAA2B;AAC3B,4BAAwB,MAAM;AAAA,EAChC;AACA,SAAO;AACT;AAGA,SAAS,wBAAwB,QAAsB;AACrD,QAAM,SAAS,cAAc,aAAa;AAC1C,MAAI,WAAW,UAAU,CAACC,YAAW,MAAM,KAAKA,YAAW,MAAM,EAAG;AACpE,MAAI;AACF,cAAUC,SAAQ,MAAM,GAAG,EAAE,WAAW,KAAK,CAAC;AAC9C,eAAW,UAAU,yBAAyB;AAC5C,YAAM,OAAO,GAAG,MAAM,GAAG,MAAM;AAC/B,UAAID,YAAW,IAAI,EAAG,UAAS,MAAM,GAAG,MAAM,GAAG,MAAM,EAAE;AAAA,IAC3D;AAAA,EACF,QAAQ;AAAA,EAER;AACF;AAGA,SAAS,SAAS,MAAc,IAAkB;AAChD,MAAI;AACF,eAAW,MAAM,EAAE;AAAA,EACrB,SAAS,KAAK;AACZ,QAAK,IAA8B,SAAS,QAAS,OAAM;AAC3D,iBAAa,MAAM,EAAE;AACrB,eAAW,IAAI;AAAA,EACjB;AACF;;;ADlVO,SAAS,iBAAyB;AACvC,SAAOE,MAAK,gBAAgB,GAAG,UAAU;AAC3C;AAGO,SAAS,kBAA0B;AACxC,SAAOA,MAAK,eAAe,GAAG,gBAAgB;AAChD;AAGO,SAAS,eAAuB;AACrC,SAAOA,MAAK,eAAe,GAAG,YAAY;AAC5C;AAOA,IAAM,WAAW;AAgBV,SAAS,uBAAgC;AAC9C,SAAO,QAAQ,IAAI,wBAAwB,MAAM;AACnD;AAGO,SAAS,kBAAkB,KAAoB;AACpD,EAAAC,WAAU,OAAO,eAAe,GAAG,EAAE,WAAW,MAAM,MAAM,SAAS,CAAC;AACxE;","names":["mkdirSync","join","accessSync","existsSync","homedir","dirname","join","resolve","existsSync","readFileSync","existsSync","readFileSync","statSync","resolve","resolve","join","homedir","join","existsSync","accessSync","join","existsSync","dirname","join","mkdirSync"]}
@@ -5,7 +5,7 @@ import {
5
5
  getErrorMessage,
6
6
  getTimeProvider,
7
7
  ok
8
- } from "./chunk-4MHE5UVO.js";
8
+ } from "./chunk-LJIB6TNE.js";
9
9
 
10
10
  // src/cli-adapters/circuit-breaker-types.ts
11
11
  var CircuitErrorCode = {
@@ -353,4 +353,4 @@ export {
353
353
  CircuitBreakerRegistry,
354
354
  mapCliErrorToCategory
355
355
  };
356
- //# sourceMappingURL=chunk-JECCDZ2S.js.map
356
+ //# sourceMappingURL=chunk-LIEFKEAO.js.map
@@ -1,7 +1,7 @@
1
1
  import {
2
2
  isPersistenceEnabled,
3
3
  nexusDataPath
4
- } from "./chunk-2JQXC3CK.js";
4
+ } from "./chunk-I2HMWH4R.js";
5
5
  import {
6
6
  __require
7
7
  } from "./chunk-PR4QN5HX.js";
@@ -10981,7 +10981,7 @@ var CompositeRouter = class _CompositeRouter {
10981
10981
  */
10982
10982
  async consultUnifiedContext(task) {
10983
10983
  try {
10984
- const { getContextForTask, inferTaskCategory } = await import("./context-retriever-FKJKKPAA.js");
10984
+ const { getContextForTask, inferTaskCategory } = await import("./context-retriever-KLJ5X4TL.js");
10985
10985
  const ctx = await getContextForTask({
10986
10986
  task: task.content,
10987
10987
  category: inferTaskCategory(task.content),
@@ -12279,4 +12279,4 @@ export {
12279
12279
  ParseError,
12280
12280
  OrchestratorError
12281
12281
  };
12282
- //# sourceMappingURL=chunk-4MHE5UVO.js.map
12282
+ //# sourceMappingURL=chunk-LJIB6TNE.js.map
@@ -2,7 +2,7 @@ import {
2
2
  ConfigError,
3
3
  err,
4
4
  ok
5
- } from "./chunk-4MHE5UVO.js";
5
+ } from "./chunk-LJIB6TNE.js";
6
6
 
7
7
  // src/adapters/sdk/types.ts
8
8
  var PROVIDER_ENV_KEYS = {
@@ -117,4 +117,4 @@ export {
117
117
  CUSTOM_API_ALLOW_PRIVATE_ENV,
118
118
  validateCustomApiBaseUrl
119
119
  };
120
- //# sourceMappingURL=chunk-GHWTMPPL.js.map
120
+ //# sourceMappingURL=chunk-M66MYHBT.js.map