nexus-agents 2.80.2 → 2.80.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{child-mcp-config-UG4CH654.js → child-mcp-config-LLLRMOTQ.js} +3 -3
- package/dist/{chunk-C3BOZZQC.js → chunk-4OPS2AUD.js} +4 -4
- package/dist/{chunk-RFUBLOZQ.js → chunk-6GDF6FLC.js} +8 -8
- package/dist/{chunk-LUVQUKW5.js → chunk-6YQCLEHL.js} +2 -2
- package/dist/{chunk-RCWWUZHA.js → chunk-73K7575Z.js} +2 -2
- package/dist/{chunk-5FUVEIJC.js → chunk-BMNWUPJO.js} +3 -3
- package/dist/{chunk-H4XSKDI6.js → chunk-ERWTZSAR.js} +2 -2
- package/dist/{chunk-RCNNN4E2.js → chunk-HYOIDNBX.js} +29 -29
- package/dist/{chunk-2JQXC3CK.js → chunk-I2HMWH4R.js} +42 -2
- package/dist/chunk-I2HMWH4R.js.map +1 -0
- package/dist/{chunk-JECCDZ2S.js → chunk-LIEFKEAO.js} +2 -2
- package/dist/{chunk-4MHE5UVO.js → chunk-LJIB6TNE.js} +3 -3
- package/dist/{chunk-GHWTMPPL.js → chunk-M66MYHBT.js} +2 -2
- package/dist/{chunk-3QRO77LO.js → chunk-P4W7PV6L.js} +10 -10
- package/dist/{chunk-HXXRFTKP.js → chunk-PKBKWWPK.js} +3 -3
- package/dist/{chunk-2ZRTLW2G.js → chunk-PUSFT342.js} +4 -4
- package/dist/{chunk-FBW6XKZJ.js → chunk-PV3OEDLO.js} +2 -2
- package/dist/{chunk-KN7JWET4.js → chunk-PZEE6T5Y.js} +4 -4
- package/dist/{chunk-5SBD55T7.js → chunk-Q27M6KHP.js} +4 -4
- package/dist/{chunk-7BSVRW2O.js → chunk-Q2PSRDW6.js} +6 -6
- package/dist/{chunk-OO662XRQ.js → chunk-RLQZOEMX.js} +3 -3
- package/dist/{chunk-VQBVL3UD.js → chunk-S77SLJ2J.js} +2 -2
- package/dist/{chunk-376MBRLD.js → chunk-SVKH6ASN.js} +7 -7
- package/dist/{chunk-TE26NHNW.js → chunk-SZ7VPIRA.js} +2 -2
- package/dist/{chunk-FQKQUJBU.js → chunk-T7RGD5JW.js} +3 -3
- package/dist/{chunk-HQR27JGL.js → chunk-UTL2SFIN.js} +2 -2
- package/dist/{chunk-BQ55PBN4.js → chunk-UZCDHAY3.js} +2 -2
- package/dist/{chunk-HDFUSBU3.js → chunk-V2KWEIV5.js} +2 -2
- package/dist/{chunk-TLE2YE6G.js → chunk-WZGCVCRQ.js} +2 -2
- package/dist/{chunk-HYNFZQU4.js → chunk-YLYT7GSG.js} +2 -2
- package/dist/{cli-circuit-breaker-MAN2V7DA.js → cli-circuit-breaker-O5RV47BO.js} +5 -5
- package/dist/cli.js +37 -36
- package/dist/cli.js.map +1 -1
- package/dist/{composite-router-YCIEYOZC.js → composite-router-SKHVZ4UF.js} +3 -3
- package/dist/{consensus-vote-TGTGZSPS.js → consensus-vote-VBXLXVFF.js} +12 -12
- package/dist/{context-retriever-FKJKKPAA.js → context-retriever-KLJ5X4TL.js} +6 -6
- package/dist/{doctor-deep-2KT4LZA6.js → doctor-deep-IH4FG5YZ.js} +4 -4
- package/dist/expert-bridge-EKPDZKMD.js +11 -0
- package/dist/{factory-VXHVQXKR.js → factory-CQUDIMIG.js} +5 -5
- package/dist/factory-FTE7TDCT.js +14 -0
- package/dist/index.js +25 -25
- package/dist/{init-opencode-26YCTSR4.js → init-opencode-MXZJKG32.js} +6 -6
- package/dist/issue-triage-H5VLNGWU.js +15 -0
- package/dist/{learning-persistence-Q63HZ2EB.js → learning-persistence-NX2KHL5T.js} +2 -2
- package/dist/{registry-command-AKJBYP5N.js → registry-command-ALVYOGQY.js} +3 -3
- package/dist/{repo-security-plan-ZGJN6QRW.js → repo-security-plan-VJCWWPWO.js} +4 -4
- package/dist/{research-helpers-synthesize-ZWBBFT2O.js → research-helpers-synthesize-XUTBDVI7.js} +4 -4
- package/dist/{routing-memory-Y5UBVQGM.js → routing-memory-QKQ3OGWW.js} +3 -3
- package/dist/{session-memory-OOBM2GQ7.js → session-memory-N76TNRSK.js} +4 -4
- package/dist/{setup-command-VJLR47CI.js → setup-command-IJ6WIK7O.js} +11 -11
- package/dist/setup-config-Y7KZSFX3.js +10 -0
- package/dist/{setup-custom-api-53SYDF4L.js → setup-custom-api-QEKHNYQJ.js} +5 -5
- package/dist/{tool-memory-RZ7NJCPV.js → tool-memory-MFDLIJOB.js} +5 -5
- package/dist/{weather-report-VOSP7KKV.js → weather-report-IXPYIYE4.js} +3 -3
- package/package.json +1 -1
- package/dist/chunk-2JQXC3CK.js.map +0 -1
- package/dist/expert-bridge-6NA7MK7T.js +0 -11
- package/dist/factory-IIPDY7QB.js +0 -14
- package/dist/issue-triage-NGWFHIKY.js +0 -15
- package/dist/setup-config-F7NK2KVC.js +0 -10
- /package/dist/{child-mcp-config-UG4CH654.js.map → child-mcp-config-LLLRMOTQ.js.map} +0 -0
- /package/dist/{chunk-C3BOZZQC.js.map → chunk-4OPS2AUD.js.map} +0 -0
- /package/dist/{chunk-RFUBLOZQ.js.map → chunk-6GDF6FLC.js.map} +0 -0
- /package/dist/{chunk-LUVQUKW5.js.map → chunk-6YQCLEHL.js.map} +0 -0
- /package/dist/{chunk-RCWWUZHA.js.map → chunk-73K7575Z.js.map} +0 -0
- /package/dist/{chunk-5FUVEIJC.js.map → chunk-BMNWUPJO.js.map} +0 -0
- /package/dist/{chunk-H4XSKDI6.js.map → chunk-ERWTZSAR.js.map} +0 -0
- /package/dist/{chunk-RCNNN4E2.js.map → chunk-HYOIDNBX.js.map} +0 -0
- /package/dist/{chunk-JECCDZ2S.js.map → chunk-LIEFKEAO.js.map} +0 -0
- /package/dist/{chunk-4MHE5UVO.js.map → chunk-LJIB6TNE.js.map} +0 -0
- /package/dist/{chunk-GHWTMPPL.js.map → chunk-M66MYHBT.js.map} +0 -0
- /package/dist/{chunk-3QRO77LO.js.map → chunk-P4W7PV6L.js.map} +0 -0
- /package/dist/{chunk-HXXRFTKP.js.map → chunk-PKBKWWPK.js.map} +0 -0
- /package/dist/{chunk-2ZRTLW2G.js.map → chunk-PUSFT342.js.map} +0 -0
- /package/dist/{chunk-FBW6XKZJ.js.map → chunk-PV3OEDLO.js.map} +0 -0
- /package/dist/{chunk-KN7JWET4.js.map → chunk-PZEE6T5Y.js.map} +0 -0
- /package/dist/{chunk-5SBD55T7.js.map → chunk-Q27M6KHP.js.map} +0 -0
- /package/dist/{chunk-7BSVRW2O.js.map → chunk-Q2PSRDW6.js.map} +0 -0
- /package/dist/{chunk-OO662XRQ.js.map → chunk-RLQZOEMX.js.map} +0 -0
- /package/dist/{chunk-VQBVL3UD.js.map → chunk-S77SLJ2J.js.map} +0 -0
- /package/dist/{chunk-376MBRLD.js.map → chunk-SVKH6ASN.js.map} +0 -0
- /package/dist/{chunk-TE26NHNW.js.map → chunk-SZ7VPIRA.js.map} +0 -0
- /package/dist/{chunk-FQKQUJBU.js.map → chunk-T7RGD5JW.js.map} +0 -0
- /package/dist/{chunk-HQR27JGL.js.map → chunk-UTL2SFIN.js.map} +0 -0
- /package/dist/{chunk-BQ55PBN4.js.map → chunk-UZCDHAY3.js.map} +0 -0
- /package/dist/{chunk-HDFUSBU3.js.map → chunk-V2KWEIV5.js.map} +0 -0
- /package/dist/{chunk-TLE2YE6G.js.map → chunk-WZGCVCRQ.js.map} +0 -0
- /package/dist/{chunk-HYNFZQU4.js.map → chunk-YLYT7GSG.js.map} +0 -0
- /package/dist/{cli-circuit-breaker-MAN2V7DA.js.map → cli-circuit-breaker-O5RV47BO.js.map} +0 -0
- /package/dist/{composite-router-YCIEYOZC.js.map → composite-router-SKHVZ4UF.js.map} +0 -0
- /package/dist/{consensus-vote-TGTGZSPS.js.map → consensus-vote-VBXLXVFF.js.map} +0 -0
- /package/dist/{context-retriever-FKJKKPAA.js.map → context-retriever-KLJ5X4TL.js.map} +0 -0
- /package/dist/{doctor-deep-2KT4LZA6.js.map → doctor-deep-IH4FG5YZ.js.map} +0 -0
- /package/dist/{expert-bridge-6NA7MK7T.js.map → expert-bridge-EKPDZKMD.js.map} +0 -0
- /package/dist/{factory-IIPDY7QB.js.map → factory-CQUDIMIG.js.map} +0 -0
- /package/dist/{factory-VXHVQXKR.js.map → factory-FTE7TDCT.js.map} +0 -0
- /package/dist/{init-opencode-26YCTSR4.js.map → init-opencode-MXZJKG32.js.map} +0 -0
- /package/dist/{issue-triage-NGWFHIKY.js.map → issue-triage-H5VLNGWU.js.map} +0 -0
- /package/dist/{learning-persistence-Q63HZ2EB.js.map → learning-persistence-NX2KHL5T.js.map} +0 -0
- /package/dist/{registry-command-AKJBYP5N.js.map → registry-command-ALVYOGQY.js.map} +0 -0
- /package/dist/{repo-security-plan-ZGJN6QRW.js.map → repo-security-plan-VJCWWPWO.js.map} +0 -0
- /package/dist/{research-helpers-synthesize-ZWBBFT2O.js.map → research-helpers-synthesize-XUTBDVI7.js.map} +0 -0
- /package/dist/{routing-memory-Y5UBVQGM.js.map → routing-memory-QKQ3OGWW.js.map} +0 -0
- /package/dist/{session-memory-OOBM2GQ7.js.map → session-memory-N76TNRSK.js.map} +0 -0
- /package/dist/{setup-command-VJLR47CI.js.map → setup-command-IJ6WIK7O.js.map} +0 -0
- /package/dist/{setup-config-F7NK2KVC.js.map → setup-config-Y7KZSFX3.js.map} +0 -0
- /package/dist/{setup-custom-api-53SYDF4L.js.map → setup-custom-api-QEKHNYQJ.js.map} +0 -0
- /package/dist/{tool-memory-RZ7NJCPV.js.map → tool-memory-MFDLIJOB.js.map} +0 -0
- /package/dist/{weather-report-VOSP7KKV.js.map → weather-report-IXPYIYE4.js.map} +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import {
|
|
2
2
|
createLogger
|
|
3
|
-
} from "./chunk-
|
|
4
|
-
import "./chunk-
|
|
3
|
+
} from "./chunk-LJIB6TNE.js";
|
|
4
|
+
import "./chunk-I2HMWH4R.js";
|
|
5
5
|
import "./chunk-PR4QN5HX.js";
|
|
6
6
|
|
|
7
7
|
// src/cli-adapters/child-mcp-config.ts
|
|
@@ -59,4 +59,4 @@ export {
|
|
|
59
59
|
generateMcpConfig,
|
|
60
60
|
getDefaultAllowedTools
|
|
61
61
|
};
|
|
62
|
-
//# sourceMappingURL=child-mcp-config-
|
|
62
|
+
//# sourceMappingURL=child-mcp-config-LLLRMOTQ.js.map
|
|
@@ -1,17 +1,17 @@
|
|
|
1
1
|
import {
|
|
2
2
|
getToolMemory
|
|
3
|
-
} from "./chunk-
|
|
3
|
+
} from "./chunk-PZEE6T5Y.js";
|
|
4
4
|
import {
|
|
5
5
|
CLI_NAMES,
|
|
6
6
|
StrategyDistiller,
|
|
7
7
|
createLogger,
|
|
8
8
|
getOutcomeStore,
|
|
9
9
|
registerPersistentDistillerFactory
|
|
10
|
-
} from "./chunk-
|
|
10
|
+
} from "./chunk-LJIB6TNE.js";
|
|
11
11
|
import {
|
|
12
12
|
ensureLearningDir,
|
|
13
13
|
getRulesFile
|
|
14
|
-
} from "./chunk-
|
|
14
|
+
} from "./chunk-I2HMWH4R.js";
|
|
15
15
|
|
|
16
16
|
// src/learning/strategy-distiller-persistence.ts
|
|
17
17
|
import { writeFileSync, readFileSync, renameSync, unlinkSync, existsSync } from "fs";
|
|
@@ -273,4 +273,4 @@ export {
|
|
|
273
273
|
inferTaskCategory,
|
|
274
274
|
summarizeContextForPrompt
|
|
275
275
|
};
|
|
276
|
-
//# sourceMappingURL=chunk-
|
|
276
|
+
//# sourceMappingURL=chunk-4OPS2AUD.js.map
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import {
|
|
2
2
|
DEFAULTS
|
|
3
|
-
} from "./chunk-
|
|
3
|
+
} from "./chunk-V2KWEIV5.js";
|
|
4
4
|
import {
|
|
5
5
|
resolveInsideRoot
|
|
6
6
|
} from "./chunk-NUBSJGQZ.js";
|
|
@@ -10,7 +10,7 @@ import {
|
|
|
10
10
|
import {
|
|
11
11
|
createAllAdapters,
|
|
12
12
|
probeCli
|
|
13
|
-
} from "./chunk-
|
|
13
|
+
} from "./chunk-BMNWUPJO.js";
|
|
14
14
|
import {
|
|
15
15
|
CliNameSchema,
|
|
16
16
|
DEFAULT_CAPABILITIES,
|
|
@@ -26,7 +26,7 @@ import {
|
|
|
26
26
|
ok,
|
|
27
27
|
symbols,
|
|
28
28
|
writeLine
|
|
29
|
-
} from "./chunk-
|
|
29
|
+
} from "./chunk-LJIB6TNE.js";
|
|
30
30
|
import {
|
|
31
31
|
detectSandbox,
|
|
32
32
|
getLearningDir,
|
|
@@ -37,10 +37,10 @@ import {
|
|
|
37
37
|
getRulesFile,
|
|
38
38
|
isPersistenceEnabled,
|
|
39
39
|
nexusDataPath
|
|
40
|
-
} from "./chunk-
|
|
40
|
+
} from "./chunk-I2HMWH4R.js";
|
|
41
41
|
|
|
42
42
|
// src/version.ts
|
|
43
|
-
var VERSION = true ? "2.80.
|
|
43
|
+
var VERSION = true ? "2.80.3" : "dev";
|
|
44
44
|
|
|
45
45
|
// src/config/schemas-core.ts
|
|
46
46
|
import { z } from "zod";
|
|
@@ -2107,7 +2107,7 @@ async function runDoctorFix(result) {
|
|
|
2107
2107
|
writeLine2("\u2500".repeat(40));
|
|
2108
2108
|
let fixCount = 0;
|
|
2109
2109
|
if (!result.dataDirectory.rootExists || result.dataDirectory.subdirectories.some((d) => !d.exists || !d.writable)) {
|
|
2110
|
-
const { runSetup } = await import("./setup-command-
|
|
2110
|
+
const { runSetup } = await import("./setup-command-IJ6WIK7O.js");
|
|
2111
2111
|
const setupResult = runSetup({
|
|
2112
2112
|
skipMcp: true,
|
|
2113
2113
|
skipRules: true,
|
|
@@ -2121,7 +2121,7 @@ async function runDoctorFix(result) {
|
|
|
2121
2121
|
}
|
|
2122
2122
|
}
|
|
2123
2123
|
if (!result.configFile.found) {
|
|
2124
|
-
const { runConfigInitSync } = await import("./setup-config-
|
|
2124
|
+
const { runConfigInitSync } = await import("./setup-config-Y7KZSFX3.js");
|
|
2125
2125
|
const configResult = runConfigInitSync(process.cwd(), false, false);
|
|
2126
2126
|
if (configResult.success && configResult.created) {
|
|
2127
2127
|
writeLine2(`\u2713 Generated config: ${configResult.path}`);
|
|
@@ -2219,4 +2219,4 @@ export {
|
|
|
2219
2219
|
startStdioServer,
|
|
2220
2220
|
closeServer
|
|
2221
2221
|
};
|
|
2222
|
-
//# sourceMappingURL=chunk-
|
|
2222
|
+
//# sourceMappingURL=chunk-6GDF6FLC.js.map
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import {
|
|
2
2
|
getErrorMessage
|
|
3
|
-
} from "./chunk-
|
|
3
|
+
} from "./chunk-LJIB6TNE.js";
|
|
4
4
|
|
|
5
5
|
// src/cli/setup-config.ts
|
|
6
6
|
import { copyFileSync, existsSync, mkdirSync, writeFileSync } from "fs";
|
|
@@ -77,4 +77,4 @@ function ensureBackup(outputPath) {
|
|
|
77
77
|
export {
|
|
78
78
|
runConfigInitSync
|
|
79
79
|
};
|
|
80
|
-
//# sourceMappingURL=chunk-
|
|
80
|
+
//# sourceMappingURL=chunk-6YQCLEHL.js.map
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import {
|
|
2
2
|
createLogger
|
|
3
|
-
} from "./chunk-
|
|
3
|
+
} from "./chunk-LJIB6TNE.js";
|
|
4
4
|
|
|
5
5
|
// src/config/available-models-cache.ts
|
|
6
6
|
var logger = createLogger({ component: "available-models-cache" });
|
|
@@ -150,4 +150,4 @@ export {
|
|
|
150
150
|
getDefaultAvailableModelsCache,
|
|
151
151
|
setDefaultAvailableModelsCache
|
|
152
152
|
};
|
|
153
|
-
//# sourceMappingURL=chunk-
|
|
153
|
+
//# sourceMappingURL=chunk-73K7575Z.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import {
|
|
2
2
|
CliCircuitBreaker,
|
|
3
3
|
DEFAULT_CIRCUIT_BREAKER_CONFIG
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-LIEFKEAO.js";
|
|
5
5
|
import {
|
|
6
6
|
CLI_SUBPROCESS_TIMEOUTS,
|
|
7
7
|
CLI_TIMEOUTS,
|
|
@@ -24,7 +24,7 @@ import {
|
|
|
24
24
|
getTimeProvider,
|
|
25
25
|
isRateLimitText,
|
|
26
26
|
ok
|
|
27
|
-
} from "./chunk-
|
|
27
|
+
} from "./chunk-LJIB6TNE.js";
|
|
28
28
|
|
|
29
29
|
// src/cli-adapters/subprocess-adapter.ts
|
|
30
30
|
import { spawn } from "child_process";
|
|
@@ -3180,4 +3180,4 @@ export {
|
|
|
3180
3180
|
isCliAvailable,
|
|
3181
3181
|
getAvailableClis
|
|
3182
3182
|
};
|
|
3183
|
-
//# sourceMappingURL=chunk-
|
|
3183
|
+
//# sourceMappingURL=chunk-BMNWUPJO.js.map
|
|
@@ -7,7 +7,7 @@ import {
|
|
|
7
7
|
err,
|
|
8
8
|
getErrorMessage,
|
|
9
9
|
ok
|
|
10
|
-
} from "./chunk-
|
|
10
|
+
} from "./chunk-LJIB6TNE.js";
|
|
11
11
|
|
|
12
12
|
// src/cli/research-helpers-synthesize.ts
|
|
13
13
|
import { z } from "zod";
|
|
@@ -1015,4 +1015,4 @@ export {
|
|
|
1015
1015
|
AttributedInsightSchema,
|
|
1016
1016
|
synthesizeResearch
|
|
1017
1017
|
};
|
|
1018
|
-
//# sourceMappingURL=chunk-
|
|
1018
|
+
//# sourceMappingURL=chunk-ERWTZSAR.js.map
|
|
@@ -7,10 +7,10 @@ import {
|
|
|
7
7
|
import {
|
|
8
8
|
getTokenEnvVars,
|
|
9
9
|
resolveToken
|
|
10
|
-
} from "./chunk-
|
|
10
|
+
} from "./chunk-UZCDHAY3.js";
|
|
11
11
|
import {
|
|
12
12
|
executeExpert
|
|
13
|
-
} from "./chunk-
|
|
13
|
+
} from "./chunk-SVKH6ASN.js";
|
|
14
14
|
import {
|
|
15
15
|
EventTopics,
|
|
16
16
|
NOOP_NOTIFIER,
|
|
@@ -36,7 +36,7 @@ import {
|
|
|
36
36
|
withAccessPolicy,
|
|
37
37
|
withProgressHeartbeat,
|
|
38
38
|
wrapToolWithTimeout
|
|
39
|
-
} from "./chunk-
|
|
39
|
+
} from "./chunk-P4W7PV6L.js";
|
|
40
40
|
import {
|
|
41
41
|
REGISTRY_PATH,
|
|
42
42
|
getProjectRoot,
|
|
@@ -45,14 +45,14 @@ import {
|
|
|
45
45
|
normalizeTopicToCanonical,
|
|
46
46
|
savePapersRegistry,
|
|
47
47
|
synthesizeResearch
|
|
48
|
-
} from "./chunk-
|
|
48
|
+
} from "./chunk-ERWTZSAR.js";
|
|
49
49
|
import {
|
|
50
50
|
IssueTriage,
|
|
51
51
|
sanitizeInput
|
|
52
|
-
} from "./chunk-
|
|
52
|
+
} from "./chunk-RLQZOEMX.js";
|
|
53
53
|
import {
|
|
54
54
|
generateSecurityPlan
|
|
55
|
-
} from "./chunk-
|
|
55
|
+
} from "./chunk-SZ7VPIRA.js";
|
|
56
56
|
import {
|
|
57
57
|
analyzeGitHubRepo
|
|
58
58
|
} from "./chunk-7J7PNOJQ.js";
|
|
@@ -64,7 +64,7 @@ import {
|
|
|
64
64
|
getContextForTask,
|
|
65
65
|
inferTaskCategory,
|
|
66
66
|
summarizeContextForPrompt
|
|
67
|
-
} from "./chunk-
|
|
67
|
+
} from "./chunk-4OPS2AUD.js";
|
|
68
68
|
import {
|
|
69
69
|
DEFAULT_RELEVANCE_CONFIG,
|
|
70
70
|
MemoryImportance,
|
|
@@ -72,19 +72,19 @@ import {
|
|
|
72
72
|
generateHyphenId,
|
|
73
73
|
generateUUID,
|
|
74
74
|
getToolMemory
|
|
75
|
-
} from "./chunk-
|
|
75
|
+
} from "./chunk-PZEE6T5Y.js";
|
|
76
76
|
import {
|
|
77
77
|
DEFAULT_TASK_TTL_MS,
|
|
78
78
|
DEFAULT_TOOL_RATE_LIMITS,
|
|
79
79
|
clampTaskTtl
|
|
80
|
-
} from "./chunk-
|
|
80
|
+
} from "./chunk-6GDF6FLC.js";
|
|
81
81
|
import {
|
|
82
82
|
getAvailabilityCache,
|
|
83
83
|
resolveFallback
|
|
84
|
-
} from "./chunk-
|
|
84
|
+
} from "./chunk-WZGCVCRQ.js";
|
|
85
85
|
import {
|
|
86
86
|
DEFAULTS
|
|
87
|
-
} from "./chunk-
|
|
87
|
+
} from "./chunk-V2KWEIV5.js";
|
|
88
88
|
import {
|
|
89
89
|
resolveInsideRoot
|
|
90
90
|
} from "./chunk-NUBSJGQZ.js";
|
|
@@ -100,7 +100,7 @@ import {
|
|
|
100
100
|
getAvailableClis,
|
|
101
101
|
sleep,
|
|
102
102
|
withTimeout
|
|
103
|
-
} from "./chunk-
|
|
103
|
+
} from "./chunk-BMNWUPJO.js";
|
|
104
104
|
import {
|
|
105
105
|
BUILT_IN_EXPERTS,
|
|
106
106
|
BuiltInExpertTypeSchema,
|
|
@@ -112,7 +112,7 @@ import {
|
|
|
112
112
|
} from "./chunk-PQHVC4BD.js";
|
|
113
113
|
import {
|
|
114
114
|
createSessionMemory
|
|
115
|
-
} from "./chunk-
|
|
115
|
+
} from "./chunk-PV3OEDLO.js";
|
|
116
116
|
import {
|
|
117
117
|
AGENT_ROUTER_TIMEOUTS,
|
|
118
118
|
API_TIMEOUTS,
|
|
@@ -182,11 +182,11 @@ import {
|
|
|
182
182
|
resolveModelIdentitySync,
|
|
183
183
|
toExpertTaskAnalysisResult,
|
|
184
184
|
withStep
|
|
185
|
-
} from "./chunk-
|
|
185
|
+
} from "./chunk-LJIB6TNE.js";
|
|
186
186
|
import {
|
|
187
187
|
getNexusDataDir,
|
|
188
188
|
nexusDataPath
|
|
189
|
-
} from "./chunk-
|
|
189
|
+
} from "./chunk-I2HMWH4R.js";
|
|
190
190
|
|
|
191
191
|
// src/agents/state-machine-types.ts
|
|
192
192
|
var VALID_TRANSITIONS = /* @__PURE__ */ new Map([
|
|
@@ -26699,7 +26699,7 @@ async function populateUnifiedContextOnState(state) {
|
|
|
26699
26699
|
try {
|
|
26700
26700
|
const taskCandidate = state["task"];
|
|
26701
26701
|
if (typeof taskCandidate !== "string" || taskCandidate === "") return;
|
|
26702
|
-
const { getContextForTask: getContextForTask2, inferTaskCategory: inferTaskCategory2 } = await import("./context-retriever-
|
|
26702
|
+
const { getContextForTask: getContextForTask2, inferTaskCategory: inferTaskCategory2 } = await import("./context-retriever-KLJ5X4TL.js");
|
|
26703
26703
|
const ctx = await getContextForTask2({
|
|
26704
26704
|
task: taskCandidate,
|
|
26705
26705
|
category: inferTaskCategory2(taskCandidate),
|
|
@@ -41930,7 +41930,7 @@ async function tryIssueTriage(task) {
|
|
|
41930
41930
|
try {
|
|
41931
41931
|
const issueMatch = task.match(/github\.com\/([^/]+\/[^/]+)\/issues\/(\d+)/);
|
|
41932
41932
|
if (issueMatch === null) return null;
|
|
41933
|
-
const { createIssueTriage } = await import("./issue-triage-
|
|
41933
|
+
const { createIssueTriage } = await import("./issue-triage-H5VLNGWU.js");
|
|
41934
41934
|
const triage = createIssueTriage();
|
|
41935
41935
|
const owner = issueMatch[1] ?? "";
|
|
41936
41936
|
const num = issueMatch[2] ?? "";
|
|
@@ -41958,7 +41958,7 @@ var VALID_TEMPLATES = /* @__PURE__ */ new Set([
|
|
|
41958
41958
|
]);
|
|
41959
41959
|
async function classifyWithLLM(task) {
|
|
41960
41960
|
try {
|
|
41961
|
-
const { executeExpert: executeExpert2 } = await import("./expert-bridge-
|
|
41961
|
+
const { executeExpert: executeExpert2 } = await import("./expert-bridge-EKPDZKMD.js");
|
|
41962
41962
|
const prompt = [
|
|
41963
41963
|
"Classify this task into exactly one pipeline template.",
|
|
41964
41964
|
"Templates: dev (implementation/bug fix/refactor), research (investigate/evaluate/compare),",
|
|
@@ -42742,8 +42742,8 @@ var memoryInitPromise = null;
|
|
|
42742
42742
|
async function initPipelineMemory() {
|
|
42743
42743
|
if (cachedMemory !== null) return cachedMemory;
|
|
42744
42744
|
try {
|
|
42745
|
-
const { createSessionMemory: createSessionMemory2 } = await import("./session-memory-
|
|
42746
|
-
const { getLearningDir } = await import("./learning-persistence-
|
|
42745
|
+
const { createSessionMemory: createSessionMemory2 } = await import("./session-memory-N76TNRSK.js");
|
|
42746
|
+
const { getLearningDir } = await import("./learning-persistence-NX2KHL5T.js");
|
|
42747
42747
|
const mem = createSessionMemory2(getLearningDir());
|
|
42748
42748
|
mem.startSession(`pipeline-${String(Date.now())}`);
|
|
42749
42749
|
cachedMemory = {
|
|
@@ -42798,7 +42798,7 @@ function recordRoutingExperience(category, success, durationMs) {
|
|
|
42798
42798
|
callRecord(routingMemoryCache);
|
|
42799
42799
|
return;
|
|
42800
42800
|
}
|
|
42801
|
-
void import("./routing-memory-
|
|
42801
|
+
void import("./routing-memory-QKQ3OGWW.js").then(({ createRoutingMemory }) => {
|
|
42802
42802
|
routingMemoryCache = createRoutingMemory();
|
|
42803
42803
|
callRecord(routingMemoryCache);
|
|
42804
42804
|
}).catch((error) => {
|
|
@@ -42827,7 +42827,7 @@ ${text}` : "";
|
|
|
42827
42827
|
}
|
|
42828
42828
|
async function getWeatherContext() {
|
|
42829
42829
|
try {
|
|
42830
|
-
const { generateWeatherReport: generateWeatherReport2 } = await import("./weather-report-
|
|
42830
|
+
const { generateWeatherReport: generateWeatherReport2 } = await import("./weather-report-IXPYIYE4.js");
|
|
42831
42831
|
const report = generateWeatherReport2({ includeAdaptive: true });
|
|
42832
42832
|
const mappings = "recommendedMappings" in report ? report.recommendedMappings : [];
|
|
42833
42833
|
if (!Array.isArray(mappings) || mappings.length === 0) return "";
|
|
@@ -42845,8 +42845,8 @@ ${lines}
|
|
|
42845
42845
|
}
|
|
42846
42846
|
async function getMemoryContext(task) {
|
|
42847
42847
|
try {
|
|
42848
|
-
const { createSessionMemory: createSessionMemory2 } = await import("./session-memory-
|
|
42849
|
-
const { getLearningDir } = await import("./learning-persistence-
|
|
42848
|
+
const { createSessionMemory: createSessionMemory2 } = await import("./session-memory-N76TNRSK.js");
|
|
42849
|
+
const { getLearningDir } = await import("./learning-persistence-NX2KHL5T.js");
|
|
42850
42850
|
const memory = createSessionMemory2(getLearningDir(), { maxLearningsInContext: 10 });
|
|
42851
42851
|
const learnings = memory.searchLearnings(task.slice(0, 200));
|
|
42852
42852
|
if (learnings.length === 0) return "";
|
|
@@ -42951,7 +42951,7 @@ ${contextBlock}`;
|
|
|
42951
42951
|
const strategy = config.votingStrategy ?? "higher_order";
|
|
42952
42952
|
await postProgress(config, "Vote", `Running consensus with ${strategy} strategy...`);
|
|
42953
42953
|
try {
|
|
42954
|
-
const { executeVoting } = await import("./consensus-vote-
|
|
42954
|
+
const { executeVoting } = await import("./consensus-vote-VBXLXVFF.js");
|
|
42955
42955
|
const votingResult = await executeVoting(
|
|
42956
42956
|
{
|
|
42957
42957
|
proposal: plan.slice(0, 4e3),
|
|
@@ -43845,7 +43845,7 @@ async function extractSymbolsForTask(task) {
|
|
|
43845
43845
|
}
|
|
43846
43846
|
async function queryResearchRegistry(task) {
|
|
43847
43847
|
try {
|
|
43848
|
-
const { synthesizeResearch: synthesizeResearch2 } = await import("./research-helpers-synthesize-
|
|
43848
|
+
const { synthesizeResearch: synthesizeResearch2 } = await import("./research-helpers-synthesize-XUTBDVI7.js");
|
|
43849
43849
|
const topic = task.split(/[.!?\n]/).filter((s) => s.trim().length > 10)[0]?.trim();
|
|
43850
43850
|
if (topic === void 0) return null;
|
|
43851
43851
|
const result = await synthesizeResearch2(topic.slice(0, 50));
|
|
@@ -43930,7 +43930,7 @@ function createScanStageWrapper() {
|
|
|
43930
43930
|
try {
|
|
43931
43931
|
const slug = ctx.task.match(/([a-zA-Z0-9._-]+\/[a-zA-Z0-9._-]+)/)?.[1];
|
|
43932
43932
|
if (slug !== void 0) {
|
|
43933
|
-
const { generateSecurityPlan: generateSecurityPlan2 } = await import("./repo-security-plan-
|
|
43933
|
+
const { generateSecurityPlan: generateSecurityPlan2 } = await import("./repo-security-plan-VJCWWPWO.js");
|
|
43934
43934
|
const plan = await generateSecurityPlan2({ repo: slug, maxScanners: 10 });
|
|
43935
43935
|
const recs = plan.recommendations.slice(0, 5).map((r) => `${r.priority}: ${r.displayName} (${r.category})`).join("; ");
|
|
43936
43936
|
ctx.sharedMemory.write("scan", "decision", { recommendations: recs });
|
|
@@ -49541,7 +49541,7 @@ var GitHubTaskTracker = class {
|
|
|
49541
49541
|
cachedProvider = null;
|
|
49542
49542
|
async getProvider() {
|
|
49543
49543
|
if (this.cachedProvider !== null) return this.cachedProvider;
|
|
49544
|
-
const { createScmProvider } = await import("./factory-
|
|
49544
|
+
const { createScmProvider } = await import("./factory-FTE7TDCT.js");
|
|
49545
49545
|
const result = await createScmProvider({ repo: this.config.repo ?? "" });
|
|
49546
49546
|
if (!result.ok) throw new Error(`SCM provider error: ${result.error.message}`);
|
|
49547
49547
|
this.cachedProvider = result.value;
|
|
@@ -50246,4 +50246,4 @@ export {
|
|
|
50246
50246
|
detectBackend,
|
|
50247
50247
|
createTaskTracker
|
|
50248
50248
|
};
|
|
50249
|
-
//# sourceMappingURL=chunk-
|
|
50249
|
+
//# sourceMappingURL=chunk-HYOIDNBX.js.map
|
|
@@ -3,7 +3,15 @@ import { mkdirSync as mkdirSync2 } from "fs";
|
|
|
3
3
|
import { join as join3 } from "path";
|
|
4
4
|
|
|
5
5
|
// src/config/nexus-data-dir.ts
|
|
6
|
-
import {
|
|
6
|
+
import {
|
|
7
|
+
accessSync as accessSync2,
|
|
8
|
+
constants as fsConstants,
|
|
9
|
+
copyFileSync,
|
|
10
|
+
existsSync as existsSync4,
|
|
11
|
+
mkdirSync,
|
|
12
|
+
renameSync,
|
|
13
|
+
unlinkSync
|
|
14
|
+
} from "fs";
|
|
7
15
|
import { homedir as homedir2 } from "os";
|
|
8
16
|
import { dirname as dirname2, join as join2, resolve as resolve3 } from "path";
|
|
9
17
|
|
|
@@ -280,6 +288,37 @@ function nexusDataPath(...segments) {
|
|
|
280
288
|
function getPerRepoSubdirs() {
|
|
281
289
|
return PER_REPO_SUBDIRS;
|
|
282
290
|
}
|
|
291
|
+
var legacySessionsDbMigrated = false;
|
|
292
|
+
var SQLITE_SIDECAR_SUFFIXES = ["", "-wal", "-shm", "-journal"];
|
|
293
|
+
function sessionsDbPath() {
|
|
294
|
+
const target = nexusDataPath("sessions", "sessions.db");
|
|
295
|
+
if (!legacySessionsDbMigrated) {
|
|
296
|
+
legacySessionsDbMigrated = true;
|
|
297
|
+
migrateLegacySessionsDb(target);
|
|
298
|
+
}
|
|
299
|
+
return target;
|
|
300
|
+
}
|
|
301
|
+
function migrateLegacySessionsDb(target) {
|
|
302
|
+
const legacy = nexusDataPath("sessions.db");
|
|
303
|
+
if (legacy === target || !existsSync4(legacy) || existsSync4(target)) return;
|
|
304
|
+
try {
|
|
305
|
+
mkdirSync(dirname2(target), { recursive: true });
|
|
306
|
+
for (const suffix of SQLITE_SIDECAR_SUFFIXES) {
|
|
307
|
+
const from = `${legacy}${suffix}`;
|
|
308
|
+
if (existsSync4(from)) moveFile(from, `${target}${suffix}`);
|
|
309
|
+
}
|
|
310
|
+
} catch {
|
|
311
|
+
}
|
|
312
|
+
}
|
|
313
|
+
function moveFile(from, to) {
|
|
314
|
+
try {
|
|
315
|
+
renameSync(from, to);
|
|
316
|
+
} catch (err) {
|
|
317
|
+
if (err.code !== "EXDEV") throw err;
|
|
318
|
+
copyFileSync(from, to);
|
|
319
|
+
unlinkSync(from);
|
|
320
|
+
}
|
|
321
|
+
}
|
|
283
322
|
|
|
284
323
|
// src/config/learning-persistence.ts
|
|
285
324
|
function getLearningDir() {
|
|
@@ -308,10 +347,11 @@ export {
|
|
|
308
347
|
getNexusRepoDir,
|
|
309
348
|
nexusDataPath,
|
|
310
349
|
getPerRepoSubdirs,
|
|
350
|
+
sessionsDbPath,
|
|
311
351
|
getLearningDir,
|
|
312
352
|
getOutcomesFile,
|
|
313
353
|
getRulesFile,
|
|
314
354
|
isPersistenceEnabled,
|
|
315
355
|
ensureLearningDir
|
|
316
356
|
};
|
|
317
|
-
//# sourceMappingURL=chunk-
|
|
357
|
+
//# sourceMappingURL=chunk-I2HMWH4R.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/config/learning-persistence.ts","../src/config/nexus-data-dir.ts","../src/config/sandbox-detection.ts","../src/config/repo-root-detection.ts","../src/config/portable-mode.ts"],"sourcesContent":["/**\n * Shared configuration for cross-session learning persistence.\n *\n * Controls where learning data (outcomes, distilled rules) is stored\n * on disk and whether persistence is enabled via feature flag.\n *\n * @module config/learning-persistence\n * (Source: Issue #1009 — Cross-session persistence)\n */\n\nimport { mkdirSync } from 'node:fs';\nimport { join } from 'node:path';\nimport { getNexusDataDir } from './nexus-data-dir.js';\n\n// ============================================================================\n// Path resolution (#2316: must read NEXUS_DATA_DIR at call time, not import)\n// ============================================================================\n\n/**\n * Base directory for learning persistence data. Resolved at call time so\n * `NEXUS_DATA_DIR` overrides take effect — the const-at-import-time\n * pattern this replaces was the bug discovered while dogfooding v2.63.0\n * (#2316). Outcome counts on a fresh portable workspace were leaking\n * the host home directory's outcome history.\n */\nexport function getLearningDir(): string {\n return join(getNexusDataDir(), 'learning');\n}\n\n/** JSONL file for persisted task outcomes. */\nexport function getOutcomesFile(): string {\n return join(getLearningDir(), 'outcomes.jsonl');\n}\n\n/** JSON file for persisted distilled rules. */\nexport function getRulesFile(): string {\n return join(getLearningDir(), 'rules.json');\n}\n\n// Note: previous LEARNING_DIR / OUTCOMES_FILE / RULES_FILE exports were\n// removed in #2316 — they were evaluated at module import time and ignored\n// `NEXUS_DATA_DIR`. All callers must use the getter functions above.\n\n/** Directory mode: owner-only (rwx------). */\nconst DIR_MODE = 0o700;\n\n// ============================================================================\n// Helpers\n// ============================================================================\n\n/**\n * Check whether learning persistence is enabled via feature flag.\n *\n * Defaults to true — cross-session LinUCB routing data persists to\n * `~/.nexus-agents/learning/` unless explicitly disabled.\n * Only routing metadata is stored (model, success, duration, category).\n * No user prompts, API keys, or model outputs are persisted.\n *\n * Set NEXUS_PERSIST_LEARNING=false to disable.\n */\nexport function isPersistenceEnabled(): boolean {\n return process.env['NEXUS_PERSIST_LEARNING'] !== 'false';\n}\n\n/** Ensure the learning data directory exists. */\nexport function ensureLearningDir(dir?: string): void {\n mkdirSync(dir ?? getLearningDir(), { recursive: true, mode: DIR_MODE });\n}\n","/**\n * Nexus runtime data directory resolver (#2302, child of #2301).\n *\n * Returns the absolute path under which nexus-agents stores runtime state.\n * Two categories of state exist (epic #2872, vote #2876):\n *\n * - **Per-repo** state (sessions, checkpoints, traces, runs, audit,\n * pipeline, tasks) — tied to the work happening in a specific codebase.\n * When `NEXUS_REPO_PREFERRED=1` is set and the caller is inside a git\n * repo, these resolve to `<repo-root>/.nexus-agents/<subdir>/`.\n * - **Cross-repo** state (learning, voting, memory, weather, research,\n * auth, usage, models manifest) — accumulates across the operator's\n * whole workflow. Always resolves to `~/.nexus-agents/<subdir>/` so the\n * learning/routing feedback loop from #1389 / #1407 keeps working.\n *\n * Resolution order (first match wins):\n * 1. `NEXUS_DATA_DIR` env var if set + non-empty. Wins for both categories\n * — the operator's explicit choice overrides the split.\n * 2. Sandbox-mode default (#2501): when `NEXUS_SANDBOX` is set, use\n * `${NEXUS_SANDBOX_ROOT ?? '/'}/.nexus-agents`. Sandboxed deployments\n * typically mount a multi-repo root; state goes there, shared across\n * repo subfolders rather than buried inside one.\n * 3. Per-repo subdirs (when `findRepoRoot(cwd)` succeeds AND\n * `NEXUS_REPO_PREFERRED` is not explicitly `'0'`):\n * `<repo-root>/.nexus-agents/<subdir>/`. Auto-adds `.nexus-agents/`\n * to the repo's `.gitignore` on first resolution (fail-closed).\n * 4. Cross-repo subdirs when `~/.nexus-agents/` is unwritable AND we're\n * in a repo: per-repo fallback at `<repo-root>/.nexus-agents/<subdir>/`\n * with one-time stderr announce. Issue #2888 — gives sandbox users\n * a working `research/`, `memory/`, etc. without env-var wrangling\n * while preserving the vote #2876 default for normal-machine users.\n * 5. `<homedir>/.nexus-agents` (cross-repo state on normal machines,\n * plus everything when not in a git repo or when\n * `NEXUS_REPO_PREFERRED=0`).\n *\n * `NEXUS_REPO_PREFERRED` defaults **ON** as of this release per vote\n * #2876. Escape hatches preserved:\n * - `NEXUS_REPO_PREFERRED=0` — fully opt out (homedir for everything).\n * - `NEXUS_DATA_DIR=~/.nexus-agents` — explicit override wins over\n * the tier and the categorization both.\n * - `nexus-agents migrate` (#2879) — relocate existing homedir state\n * into `<repo>/.nexus-agents/` before flipping in production.\n *\n * @module config/nexus-data-dir\n */\n\nimport {\n accessSync,\n constants as fsConstants,\n copyFileSync,\n existsSync,\n mkdirSync,\n renameSync,\n unlinkSync,\n} from 'node:fs';\nimport { homedir } from 'node:os';\nimport { dirname, join, resolve } from 'node:path';\n\nimport { detectSandbox } from './sandbox-detection.js';\nimport { findRepoRoot } from './repo-root-detection.js';\nimport { ensureGitignored } from './portable-mode.js';\n\n/**\n * Subdirs scoped to a single repo's work (per the epic #2872 vote).\n * When `NEXUS_REPO_PREFERRED=1` and the caller is inside a git repo, these\n * route to `<repo-root>/.nexus-agents/`; otherwise homedir. The complement\n * (everything not in this set) always goes to homedir so cross-project\n * learning state stays intact.\n *\n * Source-of-truth for the categorization: vote #2876 conditions + audit\n * thread on epic #2872. Adding a new entry here is the appropriate way to\n * mark new state as per-repo — do that as a deliberate decision, not by\n * default.\n */\nconst PER_REPO_SUBDIRS: ReadonlySet<string> = new Set([\n 'sessions',\n 'checkpoints',\n 'traces',\n 'runs',\n 'audit',\n 'pipeline',\n 'tasks',\n]);\n\n/** Returns the absolute path to the nexus-agents data directory. */\nexport function getNexusDataDir(): string {\n const fromEnv = process.env['NEXUS_DATA_DIR']?.trim();\n if (fromEnv !== undefined && fromEnv !== '') {\n return resolve(fromEnv);\n }\n const sandbox = detectSandbox();\n if (sandbox.active) {\n return resolve(sandbox.root ?? '/', '.nexus-agents');\n }\n return join(homedir(), '.nexus-agents');\n}\n\n/**\n * No-op kept for source-compatibility with consumers that called this\n * earlier in development. The resolver is no longer cached, so resetting\n * is unnecessary. Kept exported (rather than removed) to avoid breaking\n * imports in tests that may have already adopted it.\n */\nexport function resetNexusDataDirCache(): void {\n // intentionally empty — see module docstring\n}\n\n/**\n * Tracks per-process state for the auto-gitignore wiring: we only need\n * to (a) probe + append to `.gitignore` once per repo, and (b) bail\n * cleanly if the operator has explicitly silenced the auto-add via\n * `NEXUS_GITIGNORE_AUTO=0`. Reset in tests via the helper below.\n */\nconst gitignoredRoots = new Set<string>();\n\n/** Test helper — clears the auto-gitignore \"already did this\" memo. */\nexport function _resetGitignoreMemoForTests(): void {\n gitignoredRoots.clear();\n}\n\n/**\n * Returns the repo-scoped `.nexus-agents/` directory if all of the\n * following hold: `NEXUS_REPO_PREFERRED` is NOT explicitly `'0'` (it\n * defaults ON as of vote #2876), `NEXUS_DATA_DIR` is not explicitly set\n * (explicit override always wins), no sandbox is active, and\n * `findRepoRoot(cwd)` finds an ancestor `.git`.\n *\n * Side effect: on the first successful resolution per process per repo,\n * appends `.nexus-agents/` to the repo's `.gitignore` if not already\n * present. The operator can silence this with `NEXUS_GITIGNORE_AUTO=0`\n * (e.g. on CI runners with a frozen working tree).\n *\n * Returns `null` when any precondition fails; callers fall back to\n * `getNexusDataDir()` (homedir).\n */\nexport function getNexusRepoDir(): string | null {\n if (process.env['NEXUS_REPO_PREFERRED'] === '0') return null;\n const fromEnv = process.env['NEXUS_DATA_DIR']?.trim();\n if (fromEnv !== undefined && fromEnv !== '') return null;\n if (detectSandbox().active) return null;\n const root = findRepoRoot(process.cwd());\n if (root === null) return null;\n maybeAutoGitignore(root);\n return join(root, '.nexus-agents');\n}\n\n/**\n * Best-effort fail-closed wiring: once per process per repo, ensure\n * `.nexus-agents/` is in `<repo>/.gitignore`. Silenced via\n * `NEXUS_GITIGNORE_AUTO=0`. Failures are non-fatal — the helper logs\n * to stderr and continues.\n */\nfunction maybeAutoGitignore(repoRoot: string): void {\n if (process.env['NEXUS_GITIGNORE_AUTO'] === '0') return;\n if (gitignoredRoots.has(repoRoot)) return;\n gitignoredRoots.add(repoRoot);\n // Only attempt when the repo root looks real — avoid spamming stderr\n // from temp-dir test fixtures that race the lifecycle.\n if (!existsSync(repoRoot)) return;\n ensureGitignored(repoRoot, '.nexus-agents/');\n}\n\n/**\n * Per-process memo: was the homedir base directory found writable on first\n * probe? Used to short-circuit the sandbox-fallback decision in\n * `nexusDataPath()` without spending a syscall on every call.\n */\nlet homedirWritable: boolean | undefined;\n\n/** Per-process memo: have we already announced a fallback for this subdir? */\nconst announcedFallbacks = new Set<string>();\n\n/** Test helper — clears the homedir-writability + announcement memos. */\nexport function _resetWritabilityMemoForTests(): void {\n homedirWritable = undefined;\n announcedFallbacks.clear();\n}\n\n/**\n * Returns true if `getNexusDataDir()` resolves to a writable location. Probed\n * once per process and memo'd — flips the sandbox-fallback on/off for\n * cross-repo subdirs. `mkdirSync(recursive: true)` is the safest probe\n * because it both creates the dir if missing and surfaces ENOENT/EACCES\n * issues at the same point. Failures here are non-fatal — they just route\n * cross-repo state to the per-repo fallback (issue #2888).\n */\nfunction isHomedirBaseWritable(): boolean {\n if (homedirWritable !== undefined) return homedirWritable;\n const base = getNexusDataDir();\n try {\n mkdirSync(base, { recursive: true });\n accessSync(base, fsConstants.W_OK);\n homedirWritable = true;\n } catch {\n homedirWritable = false;\n }\n return homedirWritable;\n}\n\n/**\n * Emit a one-time stderr warning when a cross-repo subdir falls back to\n * the per-repo location. Operators in sandboxes get a clear signal about\n * what happened without per-call noise.\n */\nfunction announceCrossRepoFallback(subdir: string, repoPath: string): void {\n if (announcedFallbacks.has(subdir)) return;\n announcedFallbacks.add(subdir);\n process.stderr.write(\n `[nexus] ${subdir}: homedir ~/.nexus-agents is not writable; ` +\n `using per-repo fallback at ${repoPath}. See docs/guides/SANDBOXED-USAGE.md.\\n`\n );\n}\n\n/**\n * Returns a path joined under the appropriate data directory for the\n * given subdir.\n *\n * Routing decision (first match wins):\n * 1. **Per-repo subdir + in a repo + `NEXUS_REPO_PREFERRED` not '0'** →\n * `<repo>/.nexus-agents/<subdir>/...`. Standard behavior since #2884.\n * 2. **Cross-repo subdir + homedir unwritable + in a repo** →\n * `<repo>/.nexus-agents/<subdir>/...` as a sandbox-friendly fallback\n * (issue #2888). Emits a one-time stderr warning per subdir.\n * 3. **Otherwise** → `<homedir>/.nexus-agents/<subdir>/...`. If homedir\n * is also unwritable, the actual write will surface the error.\n *\n * Existing callers don't need to change — the routing decision is driven\n * by the first segment, not by caller-declared intent.\n */\nexport function nexusDataPath(...segments: string[]): string {\n const first = segments[0];\n\n // Tier 1: per-repo subdir + repo-preferred default.\n if (first !== undefined && PER_REPO_SUBDIRS.has(first)) {\n const repoDir = getNexusRepoDir();\n if (repoDir !== null) {\n return join(repoDir, ...segments);\n }\n }\n\n // Tier 2: cross-repo subdir but homedir isn't reachable. Fall back to\n // the per-repo location if we're in a repo, so sandbox users get a\n // working `research/`, `memory/`, etc. without manual env-var setup.\n // Vote #2876 preserved: this only fires when homedir is physically\n // unreachable; normal-machine users see no change.\n if (first !== undefined && !isHomedirBaseWritable()) {\n const repoDir = getNexusRepoDir();\n if (repoDir !== null) {\n const fallbackPath = join(repoDir, ...segments);\n announceCrossRepoFallback(first, fallbackPath);\n return fallbackPath;\n }\n // No repo to fall back to AND homedir unreachable — return the\n // homedir path anyway. The caller's eventual write will surface\n // the underlying EACCES/ENOENT, which is the right error to show\n // because the environment is genuinely broken at that point.\n }\n\n return join(getNexusDataDir(), ...segments);\n}\n\n/**\n * Like `nexusDataPath()` but eagerly creates the parent directory so\n * callers don't have to remember `mkdirSync(dirname(p), { recursive: true })`\n * before every write. Issue #2890. Use when the returned path will be\n * written to immediately; for read-only resolution prefer `nexusDataPath()`.\n *\n * If the call resolves to a directory (single segment or no segments),\n * the target IS the resolved path. If it resolves to a file (multiple\n * segments), the target is its parent.\n */\nexport function nexusDataPathEnsure(...segments: string[]): string {\n const resolved = nexusDataPath(...segments);\n const target = segments.length > 1 ? dirname(resolved) : resolved;\n mkdirSync(target, { recursive: true });\n return resolved;\n}\n\n/**\n * Explicitly homedir-scoped path. Use this in code that handles\n * cross-project state (routing memory, model registry cache, auth,\n * research catalog) where you want a hard guarantee that the resolver\n * never routes per-repo, even if a new subdir gets accidentally added\n * to the `PER_REPO_SUBDIRS` allowlist later.\n */\nexport function nexusSharedPath(...segments: string[]): string {\n return join(getNexusDataDir(), ...segments);\n}\n\n/**\n * Returns the read-only categorization used by `nexusDataPath()`.\n * Exposed for tests and for tooling that wants to introspect which\n * subdirs are per-repo (e.g. the `nexus-agents migrate` command).\n */\nexport function getPerRepoSubdirs(): ReadonlySet<string> {\n return PER_REPO_SUBDIRS;\n}\n\n/** Per-process memo — the legacy session-DB relocation runs at most once. */\nlet legacySessionsDbMigrated = false;\n\n/** Test helper — clears the session-DB migration \"already did this\" memo. */\nexport function _resetSessionsDbMigrationMemoForTests(): void {\n legacySessionsDbMigrated = false;\n}\n\n/** SQLite sidecar suffixes that must travel with the main DB file. */\nconst SQLITE_SIDECAR_SUFFIXES = ['', '-wal', '-shm', '-journal'] as const;\n\n/**\n * Resolves the session-database path, performing a one-time relocation\n * of any pre-#2902 database on the first call per process.\n *\n * The session DB is per-repo episodic state and belongs in the\n * `sessions/` bucket alongside the session journals — vote #2876\n * categorized `sessions/` as per-repo, and issue #2902 (consensus\n * 3/3) extended that to the DB. Before #2902 the DB resolved via\n * `nexusDataPath('sessions.db')`; because `sessions.db` is not a\n * per-repo first segment, that landed cross-repo at\n * `~/.nexus-agents/sessions.db`, so a DB started in one repo leaked\n * into every other repo.\n *\n * If a legacy DB exists at the old location and none exists at the\n * new one, the legacy file (and any SQLite sidecars) is moved so\n * existing session history is preserved rather than silently\n * orphaned. The move is best-effort: a failure leaves the legacy DB\n * untouched for manual recovery and the caller gets a fresh DB at the\n * new path. `NEXUS_DATA_DIR` / `NEXUS_REPO_PREFERRED` / the\n * `NEXUS_SESSIONS_DB` override all sit upstream of this resolver.\n */\nexport function sessionsDbPath(): string {\n const target = nexusDataPath('sessions', 'sessions.db');\n if (!legacySessionsDbMigrated) {\n legacySessionsDbMigrated = true;\n migrateLegacySessionsDb(target);\n }\n return target;\n}\n\n/** One-time relocation of a pre-#2902 session DB. Best-effort — see `sessionsDbPath`. */\nfunction migrateLegacySessionsDb(target: string): void {\n const legacy = nexusDataPath('sessions.db'); // pre-#2902 resolution\n if (legacy === target || !existsSync(legacy) || existsSync(target)) return;\n try {\n mkdirSync(dirname(target), { recursive: true });\n for (const suffix of SQLITE_SIDECAR_SUFFIXES) {\n const from = `${legacy}${suffix}`;\n if (existsSync(from)) moveFile(from, `${target}${suffix}`);\n }\n } catch {\n // Best-effort — a migration failure must never break session storage.\n }\n}\n\n/** Moves a file, falling back to copy+unlink across a filesystem boundary. */\nfunction moveFile(from: string, to: string): void {\n try {\n renameSync(from, to);\n } catch (err) {\n if ((err as NodeJS.ErrnoException).code !== 'EXDEV') throw err;\n copyFileSync(from, to);\n unlinkSync(from);\n }\n}\n","/**\n * Sandbox detection (#2501, child 1 of epic #2500).\n *\n * nexus-agents needs to know whether it's running inside a host-provided\n * sandbox (Docker Desktop Sandbox + OpenCode, Codex sandbox, locked-down\n * CI runner) so it can adjust behaviour:\n *\n * - default `NEXUS_DATA_DIR` to the multi-repo root rather than `~/...`\n * - skip CLI subprocess detection (binaries aren't there)\n * - fail-fast when the gateway is unreachable instead of degrading\n * - suppress diagnostics that don't apply\n *\n * The signal is **explicit**: the image author (Dockerfile, devcontainer,\n * harness wrapper) sets `NEXUS_SANDBOX=<flavor>`. The flavor string is\n * for diagnostics + per-flavor branching (`docker-opencode`, `codex`,\n * `claude-code`, `ci-restricted`, …); presence is the on/off signal.\n *\n * A heuristic check runs alongside for verification — if `NEXUS_SANDBOX`\n * claims `docker-opencode` but `/.dockerenv` is missing, that's a\n * misconfiguration worth surfacing to the operator.\n *\n * @module config/sandbox-detection\n */\n\nimport { existsSync, readFileSync } from 'node:fs';\n\n/**\n * Heuristic detection result. Independent from the explicit\n * `NEXUS_SANDBOX` env var; produced by inspecting filesystem markers.\n */\nexport type SandboxHeuristic = 'docker' | 'podman' | 'unknown' | null;\n\nexport interface SandboxInfo {\n /**\n * True iff `NEXUS_SANDBOX` is set + non-empty. The explicit signal\n * the rest of the codebase keys off — never `true` by heuristic alone.\n */\n readonly active: boolean;\n /**\n * Operator-supplied flavor string, e.g. `docker-opencode`. Undefined\n * when `active === false` or the env var is empty.\n */\n readonly flavor: string | undefined;\n /**\n * Multi-repo root the user mounted. From `NEXUS_SANDBOX_ROOT`. Undefined\n * when unset; consumers that need a default substitute `/`.\n */\n readonly root: string | undefined;\n /**\n * Independent heuristic match — `null` when we couldn't run the check,\n * `'unknown'` when ran but no marker matched. Used by `doctor` to flag\n * mismatches between the explicit signal and the runtime environment.\n */\n readonly heuristicMatch: SandboxHeuristic;\n}\n\n/**\n * Detect whether nexus-agents is running inside a host-provided sandbox.\n * Pure read of env + filesystem; no caching (cheap enough to recompute,\n * and tests routinely mutate process.env).\n */\nexport function detectSandbox(): SandboxInfo {\n const flavorRaw = process.env['NEXUS_SANDBOX']?.trim();\n const flavor = flavorRaw !== undefined && flavorRaw !== '' ? flavorRaw : undefined;\n const active = flavor !== undefined;\n\n const rootRaw = process.env['NEXUS_SANDBOX_ROOT']?.trim();\n const root = rootRaw !== undefined && rootRaw !== '' ? rootRaw : undefined;\n\n return {\n active,\n flavor,\n root,\n heuristicMatch: detectContainerHeuristic(),\n };\n}\n\n/**\n * Look for filesystem markers indicating a container runtime. Used as a\n * cross-check against the explicit `NEXUS_SANDBOX` signal.\n *\n * Order of checks:\n * 1. `/.dockerenv` (Docker)\n * 2. `/run/.containerenv` (Podman)\n * 3. `/proc/1/cgroup` containing `docker` or `containerd` strings\n *\n * Returns `null` when none of the checks could run (non-Linux host with\n * no `/proc`, sandbox blocks `existsSync`, etc.) — distinct from\n * `'unknown'` (checks ran, no marker matched) so the doctor message can\n * differentiate \"we couldn't tell\" from \"we checked, no container\".\n */\nfunction detectContainerHeuristic(): SandboxHeuristic {\n try {\n if (existsSync('/.dockerenv')) return 'docker';\n if (existsSync('/run/.containerenv')) return 'podman';\n if (existsSync('/proc/1/cgroup')) {\n const cgroup = readFileSync('/proc/1/cgroup', 'utf8');\n if (/\\bdocker\\b/.test(cgroup)) return 'docker';\n if (/\\bcontainerd\\b/.test(cgroup)) return 'docker';\n }\n return 'unknown';\n } catch {\n return null;\n }\n}\n","/**\n * Repo-root detection — walks upward from a starting directory looking for\n * `.git` so callers can scope state to the current git repo. Built for\n * epic #2872 (issue #2882) to support the per-repo `.nexus-agents/` data\n * directory ratified by vote #2876.\n *\n * Defenses adopted:\n * - Walks upward but stops at filesystem root (no infinite loop on\n * symlinks-to-self).\n * - Stops at filesystem boundary (different `stat.dev`) — refuses to\n * escape across mount points. Prevents a sandboxed workdir from\n * resolving a `.git` on the host filesystem.\n * - Detects git worktrees: `.git` may be a *file* containing\n * `gitdir: <path>` rather than a directory.\n * - Realpath's the final root and rejects results that escape the\n * starting cwd by symlink.\n *\n * Deferred (tracked separately; not blocking #2882):\n * - CVE-2022-24765-style ownership check (refuse `.git` owned by a\n * different uid than the running process). The git CLI added\n * `safe.directory` for this; we don't have a comparable allowlist\n * surface yet. In CI the heuristic is too noisy to be useful\n * (runners often clone as a different uid than the workload).\n * File-system isolation (the `stat.dev` check above) covers the\n * bulk of the attack class.\n *\n * @module config/repo-root-detection\n */\n\nimport { existsSync, readFileSync, realpathSync, statSync } from 'node:fs';\nimport { dirname, isAbsolute, resolve } from 'node:path';\n\n/**\n * Walks upward from `start` looking for `.git` (file or directory).\n * Returns the absolute path to the directory containing it, or `null`.\n *\n * Worktrees: a `.git` file (not dir) with contents `gitdir: <path>` is\n * still recognised as marking the repo root. The pointed-to gitdir is\n * NOT followed — we just need the worktree's own root.\n *\n * Filesystem boundary: stops walking if the next ancestor lives on a\n * different filesystem (different `stat.dev`). This prevents a workdir\n * mounted inside a sandbox from finding a host-side `.git`.\n */\nexport function findRepoRoot(start: string): string | null {\n if (!isAbsolute(start)) {\n start = resolve(start);\n }\n\n let current: string;\n try {\n current = realpathSync(start);\n } catch {\n return null;\n }\n\n let startDev: number | undefined;\n try {\n startDev = statSync(current).dev;\n } catch {\n return null;\n }\n\n // Walk up. Depth cap is paranoid but bounds the loop on pathological\n // symlinks even though realpathSync above should already prevent cycles.\n for (let i = 0; i < 64; i++) {\n if (isRepoRoot(current)) {\n return current;\n }\n const parent = dirname(current);\n if (parent === current) {\n // Hit filesystem root.\n return null;\n }\n try {\n if (statSync(parent).dev !== startDev) {\n // Crossed a mount point; refuse to escape.\n return null;\n }\n } catch {\n return null;\n }\n current = parent;\n }\n return null;\n}\n\n/** True iff `dir/.git` exists as a directory or a git-worktree marker file. */\nexport function isRepoRoot(dir: string): boolean {\n const gitPath = `${dir}/.git`;\n if (!existsSync(gitPath)) return false;\n try {\n const st = statSync(gitPath);\n if (st.isDirectory()) return true;\n if (st.isFile()) {\n // Worktree: first line should be `gitdir: <path>`.\n const head = readFileSync(gitPath, 'utf-8').slice(0, 256);\n return head.startsWith('gitdir:');\n }\n } catch {\n return false;\n }\n return false;\n}\n","/**\n * portable-mode — auto-detect sandboxed execution environments and\n * redirect nexus-agents data to a workspace-local directory.\n *\n * The existing `getNexusDataDir()` already respects `NEXUS_DATA_DIR` and\n * `NEXUS_PORTABLE_MODE`. This module wires up the *auto-detection* path\n * so operators running inside a Docker / restricted-FS / sandboxed\n * environment don't have to set the env vars manually — nexus-agents\n * notices and announces the flip.\n *\n * Source: Issue #2471 (epic #2467 child).\n *\n * Detection rules (first match wins):\n * 1. `NEXUS_DATA_DIR` already set → respect, no auto-detect\n * 2. `NEXUS_PORTABLE_MODE=0` → operator opted out, no auto-detect\n * 3. `NEXUS_PORTABLE_MODE=1` → portable mode, no detection needed\n * 4. Heuristic: home directory not writable\n * 5. Heuristic: container env vars set (KUBERNETES_SERVICE_HOST,\n * DOCKER_CONTAINER, ECS_CONTAINER_METADATA_URI, SANDBOX, etc.)\n *\n * When portable mode fires:\n * - Sets `process.env.NEXUS_DATA_DIR` to `<cwd>/.nexus-agents`\n * - Announces once on stderr (subsequent calls are silent)\n * - If cwd is a git repo, appends `.nexus-agents/` to .gitignore\n *\n * To force off: `NEXUS_PORTABLE_MODE=0`. To force on without heuristics:\n * `NEXUS_PORTABLE_MODE=1`. To override target dir: `NEXUS_DATA_DIR=...`.\n */\n\nimport { accessSync, constants, existsSync, readFileSync, appendFileSync, statSync } from 'node:fs';\nimport { homedir } from 'node:os';\nimport { join, resolve } from 'node:path';\n\n/** Container / sandbox environment variables that strongly imply portable mode. */\nconst SANDBOX_ENV_VARS: readonly string[] = [\n 'KUBERNETES_SERVICE_HOST',\n 'DOCKER_CONTAINER',\n 'ECS_CONTAINER_METADATA_URI',\n 'ECS_CONTAINER_METADATA_URI_V4',\n 'SANDBOX',\n 'NEXUS_SANDBOX',\n];\n\nlet DETECTED = false;\n\ninterface DetectionResult {\n readonly portable: boolean;\n readonly dataDir: string;\n readonly reason:\n | 'env-data-dir'\n | 'env-opt-out'\n | 'env-opt-in'\n | 'home-unwritable'\n | 'container-env'\n | 'default';\n}\n\nfunction isHomeWritable(): boolean {\n try {\n const home = homedir();\n if (!existsSync(home)) return false;\n accessSync(home, constants.W_OK);\n return true;\n } catch {\n return false;\n }\n}\n\nfunction inSandboxEnv(): boolean {\n for (const v of SANDBOX_ENV_VARS) {\n const val = process.env[v];\n if (val !== undefined && val !== '') return true;\n }\n return false;\n}\n\nfunction checkExplicitEnv(cwd: string): DetectionResult | null {\n const fromEnv = process.env['NEXUS_DATA_DIR']?.trim();\n if (fromEnv !== undefined && fromEnv !== '') {\n return { portable: false, dataDir: resolve(fromEnv), reason: 'env-data-dir' };\n }\n const portableEnv = process.env['NEXUS_PORTABLE_MODE'];\n if (portableEnv === '0' || portableEnv === 'false') {\n return { portable: false, dataDir: join(homedir(), '.nexus-agents'), reason: 'env-opt-out' };\n }\n if (portableEnv === '1' || portableEnv === 'true') {\n return { portable: true, dataDir: join(cwd, '.nexus-agents'), reason: 'env-opt-in' };\n }\n return null;\n}\n\nfunction checkHeuristics(cwd: string): DetectionResult | null {\n if (!isHomeWritable()) {\n return { portable: true, dataDir: join(cwd, '.nexus-agents'), reason: 'home-unwritable' };\n }\n if (inSandboxEnv()) {\n return { portable: true, dataDir: join(cwd, '.nexus-agents'), reason: 'container-env' };\n }\n return null;\n}\n\n/**\n * Decide whether to flip nexus-agents to portable mode and what data dir\n * to use. Pure function; no side effects beyond reading env + filesystem.\n */\nexport function detectPortableMode(cwd: string = process.cwd()): DetectionResult {\n return (\n checkExplicitEnv(cwd) ??\n checkHeuristics(cwd) ?? {\n portable: false,\n dataDir: join(homedir(), '.nexus-agents'),\n reason: 'default',\n }\n );\n}\n\n/**\n * Apply detected portable mode at process startup. Idempotent (subsequent\n * calls are no-ops). Announces on stderr once when the auto-detection\n * heuristic triggers — env-opt-in/out doesn't announce because the\n * operator already knows.\n */\nexport function applyPortableMode(cwd: string = process.cwd()): void {\n if (DETECTED) return;\n DETECTED = true;\n\n const result = detectPortableMode(cwd);\n\n // No env, no heuristic match — nothing to do.\n if (!result.portable) return;\n\n // The heuristic-driven cases announce; explicit opt-in is silent.\n if (result.reason === 'home-unwritable' || result.reason === 'container-env') {\n process.stderr.write(\n `[portable-mode] Sandbox detected (${result.reason}). Using ${result.dataDir} for all nexus-agents data.\\n` +\n ` Set NEXUS_PORTABLE_MODE=0 to override; see docs/guides/SANDBOXED-USAGE.md\\n`\n );\n }\n\n process.env['NEXUS_DATA_DIR'] = result.dataDir;\n\n if (isInsideGitRepo(cwd)) {\n ensureGitignored(cwd, '.nexus-agents/');\n }\n}\n\nfunction isInsideGitRepo(cwd: string): boolean {\n try {\n const gitDir = join(cwd, '.git');\n return existsSync(gitDir) && statSync(gitDir).isDirectory();\n } catch {\n return false;\n }\n}\n\n/**\n * Append `entry` to `<cwd>/.gitignore` if not already present. Stderr\n * announce on the first append. Exported because the repo-preferred\n * resolver in `nexus-data-dir.ts` reuses the same auto-gitignore behavior\n * when `<repo>/.nexus-agents/` becomes the active data dir (epic #2872).\n */\nexport function ensureGitignored(cwd: string, entry: string): void {\n const path = join(cwd, '.gitignore');\n try {\n const existing = existsSync(path) ? readFileSync(path, 'utf-8') : '';\n const lines = existing.split('\\n').map((l) => l.trim());\n if (lines.includes(entry) || lines.includes(entry.replace(/\\/$/, ''))) return;\n const sep = existing.length > 0 && !existing.endsWith('\\n') ? '\\n' : '';\n appendFileSync(path, `${sep}${entry}\\n`, 'utf-8');\n process.stderr.write(\n `[portable-mode] Added '${entry}' to ${path} so nexus-agents data is gitignored.\\n`\n );\n } catch (e: unknown) {\n // Non-fatal — operator can add the line themselves.\n const msg = e instanceof Error ? e.message : String(e);\n process.stderr.write(\n `[portable-mode] Could not auto-update ${path} (${msg}). Add '${entry}' manually if you don't want nexus-agents data tracked by git.\\n`\n );\n }\n}\n\n/** Test-only reset of the once-only state. */\nexport function _resetDetectedForTests(): void {\n DETECTED = false;\n}\n"],"mappings":";AAUA,SAAS,aAAAA,kBAAiB;AAC1B,SAAS,QAAAC,aAAY;;;ACmCrB;AAAA,EACE,cAAAC;AAAA,EACA,aAAa;AAAA,EACb;AAAA,EACA,cAAAC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,OACK;AACP,SAAS,WAAAC,gBAAe;AACxB,SAAS,WAAAC,UAAS,QAAAC,OAAM,WAAAC,gBAAe;;;AChCvC,SAAS,YAAY,oBAAoB;AAqClC,SAAS,gBAA6B;AAC3C,QAAM,YAAY,QAAQ,IAAI,eAAe,GAAG,KAAK;AACrD,QAAM,SAAS,cAAc,UAAa,cAAc,KAAK,YAAY;AACzE,QAAM,SAAS,WAAW;AAE1B,QAAM,UAAU,QAAQ,IAAI,oBAAoB,GAAG,KAAK;AACxD,QAAM,OAAO,YAAY,UAAa,YAAY,KAAK,UAAU;AAEjE,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA,gBAAgB,yBAAyB;AAAA,EAC3C;AACF;AAgBA,SAAS,2BAA6C;AACpD,MAAI;AACF,QAAI,WAAW,aAAa,EAAG,QAAO;AACtC,QAAI,WAAW,oBAAoB,EAAG,QAAO;AAC7C,QAAI,WAAW,gBAAgB,GAAG;AAChC,YAAM,SAAS,aAAa,kBAAkB,MAAM;AACpD,UAAI,aAAa,KAAK,MAAM,EAAG,QAAO;AACtC,UAAI,iBAAiB,KAAK,MAAM,EAAG,QAAO;AAAA,IAC5C;AACA,WAAO;AAAA,EACT,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;AC3EA,SAAS,cAAAC,aAAY,gBAAAC,eAAc,cAAc,gBAAgB;AACjE,SAAS,SAAS,YAAY,eAAe;AActC,SAAS,aAAa,OAA8B;AACzD,MAAI,CAAC,WAAW,KAAK,GAAG;AACtB,YAAQ,QAAQ,KAAK;AAAA,EACvB;AAEA,MAAI;AACJ,MAAI;AACF,cAAU,aAAa,KAAK;AAAA,EAC9B,QAAQ;AACN,WAAO;AAAA,EACT;AAEA,MAAI;AACJ,MAAI;AACF,eAAW,SAAS,OAAO,EAAE;AAAA,EAC/B,QAAQ;AACN,WAAO;AAAA,EACT;AAIA,WAAS,IAAI,GAAG,IAAI,IAAI,KAAK;AAC3B,QAAI,WAAW,OAAO,GAAG;AACvB,aAAO;AAAA,IACT;AACA,UAAM,SAAS,QAAQ,OAAO;AAC9B,QAAI,WAAW,SAAS;AAEtB,aAAO;AAAA,IACT;AACA,QAAI;AACF,UAAI,SAAS,MAAM,EAAE,QAAQ,UAAU;AAErC,eAAO;AAAA,MACT;AAAA,IACF,QAAQ;AACN,aAAO;AAAA,IACT;AACA,cAAU;AAAA,EACZ;AACA,SAAO;AACT;AAGO,SAAS,WAAW,KAAsB;AAC/C,QAAM,UAAU,GAAG,GAAG;AACtB,MAAI,CAACD,YAAW,OAAO,EAAG,QAAO;AACjC,MAAI;AACF,UAAM,KAAK,SAAS,OAAO;AAC3B,QAAI,GAAG,YAAY,EAAG,QAAO;AAC7B,QAAI,GAAG,OAAO,GAAG;AAEf,YAAM,OAAOC,cAAa,SAAS,OAAO,EAAE,MAAM,GAAG,GAAG;AACxD,aAAO,KAAK,WAAW,SAAS;AAAA,IAClC;AAAA,EACF,QAAQ;AACN,WAAO;AAAA,EACT;AACA,SAAO;AACT;;;AC1EA,SAAS,YAAY,WAAW,cAAAC,aAAY,gBAAAC,eAAc,gBAAgB,YAAAC,iBAAgB;AAC1F,SAAS,eAAe;AACxB,SAAS,MAAM,WAAAC,gBAAe;AAG9B,IAAM,mBAAsC;AAAA,EAC1C;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEA,IAAI,WAAW;AAcf,SAAS,iBAA0B;AACjC,MAAI;AACF,UAAM,OAAO,QAAQ;AACrB,QAAI,CAACH,YAAW,IAAI,EAAG,QAAO;AAC9B,eAAW,MAAM,UAAU,IAAI;AAC/B,WAAO;AAAA,EACT,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAEA,SAAS,eAAwB;AAC/B,aAAW,KAAK,kBAAkB;AAChC,UAAM,MAAM,QAAQ,IAAI,CAAC;AACzB,QAAI,QAAQ,UAAa,QAAQ,GAAI,QAAO;AAAA,EAC9C;AACA,SAAO;AACT;AAEA,SAAS,iBAAiB,KAAqC;AAC7D,QAAM,UAAU,QAAQ,IAAI,gBAAgB,GAAG,KAAK;AACpD,MAAI,YAAY,UAAa,YAAY,IAAI;AAC3C,WAAO,EAAE,UAAU,OAAO,SAASG,SAAQ,OAAO,GAAG,QAAQ,eAAe;AAAA,EAC9E;AACA,QAAM,cAAc,QAAQ,IAAI,qBAAqB;AACrD,MAAI,gBAAgB,OAAO,gBAAgB,SAAS;AAClD,WAAO,EAAE,UAAU,OAAO,SAAS,KAAK,QAAQ,GAAG,eAAe,GAAG,QAAQ,cAAc;AAAA,EAC7F;AACA,MAAI,gBAAgB,OAAO,gBAAgB,QAAQ;AACjD,WAAO,EAAE,UAAU,MAAM,SAAS,KAAK,KAAK,eAAe,GAAG,QAAQ,aAAa;AAAA,EACrF;AACA,SAAO;AACT;AAEA,SAAS,gBAAgB,KAAqC;AAC5D,MAAI,CAAC,eAAe,GAAG;AACrB,WAAO,EAAE,UAAU,MAAM,SAAS,KAAK,KAAK,eAAe,GAAG,QAAQ,kBAAkB;AAAA,EAC1F;AACA,MAAI,aAAa,GAAG;AAClB,WAAO,EAAE,UAAU,MAAM,SAAS,KAAK,KAAK,eAAe,GAAG,QAAQ,gBAAgB;AAAA,EACxF;AACA,SAAO;AACT;AAMO,SAAS,mBAAmB,MAAc,QAAQ,IAAI,GAAoB;AAC/E,SACE,iBAAiB,GAAG,KACpB,gBAAgB,GAAG,KAAK;AAAA,IACtB,UAAU;AAAA,IACV,SAAS,KAAK,QAAQ,GAAG,eAAe;AAAA,IACxC,QAAQ;AAAA,EACV;AAEJ;AAQO,SAAS,kBAAkB,MAAc,QAAQ,IAAI,GAAS;AACnE,MAAI,SAAU;AACd,aAAW;AAEX,QAAM,SAAS,mBAAmB,GAAG;AAGrC,MAAI,CAAC,OAAO,SAAU;AAGtB,MAAI,OAAO,WAAW,qBAAqB,OAAO,WAAW,iBAAiB;AAC5E,YAAQ,OAAO;AAAA,MACb,qCAAqC,OAAO,MAAM,YAAY,OAAO,OAAO;AAAA;AAAA;AAAA,IAE9E;AAAA,EACF;AAEA,UAAQ,IAAI,gBAAgB,IAAI,OAAO;AAEvC,MAAI,gBAAgB,GAAG,GAAG;AACxB,qBAAiB,KAAK,gBAAgB;AAAA,EACxC;AACF;AAEA,SAAS,gBAAgB,KAAsB;AAC7C,MAAI;AACF,UAAM,SAAS,KAAK,KAAK,MAAM;AAC/B,WAAOH,YAAW,MAAM,KAAKE,UAAS,MAAM,EAAE,YAAY;AAAA,EAC5D,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAQO,SAAS,iBAAiB,KAAa,OAAqB;AACjE,QAAM,OAAO,KAAK,KAAK,YAAY;AACnC,MAAI;AACF,UAAM,WAAWF,YAAW,IAAI,IAAIC,cAAa,MAAM,OAAO,IAAI;AAClE,UAAM,QAAQ,SAAS,MAAM,IAAI,EAAE,IAAI,CAAC,MAAM,EAAE,KAAK,CAAC;AACtD,QAAI,MAAM,SAAS,KAAK,KAAK,MAAM,SAAS,MAAM,QAAQ,OAAO,EAAE,CAAC,EAAG;AACvE,UAAM,MAAM,SAAS,SAAS,KAAK,CAAC,SAAS,SAAS,IAAI,IAAI,OAAO;AACrE,mBAAe,MAAM,GAAG,GAAG,GAAG,KAAK;AAAA,GAAM,OAAO;AAChD,YAAQ,OAAO;AAAA,MACb,0BAA0B,KAAK,QAAQ,IAAI;AAAA;AAAA,IAC7C;AAAA,EACF,SAAS,GAAY;AAEnB,UAAM,MAAM,aAAa,QAAQ,EAAE,UAAU,OAAO,CAAC;AACrD,YAAQ,OAAO;AAAA,MACb,yCAAyC,IAAI,KAAK,GAAG,WAAW,KAAK;AAAA;AAAA,IACvE;AAAA,EACF;AACF;;;AHzGA,IAAM,mBAAwC,oBAAI,IAAI;AAAA,EACpD;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,CAAC;AAGM,SAAS,kBAA0B;AACxC,QAAM,UAAU,QAAQ,IAAI,gBAAgB,GAAG,KAAK;AACpD,MAAI,YAAY,UAAa,YAAY,IAAI;AAC3C,WAAOG,SAAQ,OAAO;AAAA,EACxB;AACA,QAAM,UAAU,cAAc;AAC9B,MAAI,QAAQ,QAAQ;AAClB,WAAOA,SAAQ,QAAQ,QAAQ,KAAK,eAAe;AAAA,EACrD;AACA,SAAOC,MAAKC,SAAQ,GAAG,eAAe;AACxC;AAkBA,IAAM,kBAAkB,oBAAI,IAAY;AAsBjC,SAAS,kBAAiC;AAC/C,MAAI,QAAQ,IAAI,sBAAsB,MAAM,IAAK,QAAO;AACxD,QAAM,UAAU,QAAQ,IAAI,gBAAgB,GAAG,KAAK;AACpD,MAAI,YAAY,UAAa,YAAY,GAAI,QAAO;AACpD,MAAI,cAAc,EAAE,OAAQ,QAAO;AACnC,QAAM,OAAO,aAAa,QAAQ,IAAI,CAAC;AACvC,MAAI,SAAS,KAAM,QAAO;AAC1B,qBAAmB,IAAI;AACvB,SAAOC,MAAK,MAAM,eAAe;AACnC;AAQA,SAAS,mBAAmB,UAAwB;AAClD,MAAI,QAAQ,IAAI,sBAAsB,MAAM,IAAK;AACjD,MAAI,gBAAgB,IAAI,QAAQ,EAAG;AACnC,kBAAgB,IAAI,QAAQ;AAG5B,MAAI,CAACC,YAAW,QAAQ,EAAG;AAC3B,mBAAiB,UAAU,gBAAgB;AAC7C;AAOA,IAAI;AAGJ,IAAM,qBAAqB,oBAAI,IAAY;AAgB3C,SAAS,wBAAiC;AACxC,MAAI,oBAAoB,OAAW,QAAO;AAC1C,QAAM,OAAO,gBAAgB;AAC7B,MAAI;AACF,cAAU,MAAM,EAAE,WAAW,KAAK,CAAC;AACnC,IAAAC,YAAW,MAAM,YAAY,IAAI;AACjC,sBAAkB;AAAA,EACpB,QAAQ;AACN,sBAAkB;AAAA,EACpB;AACA,SAAO;AACT;AAOA,SAAS,0BAA0B,QAAgB,UAAwB;AACzE,MAAI,mBAAmB,IAAI,MAAM,EAAG;AACpC,qBAAmB,IAAI,MAAM;AAC7B,UAAQ,OAAO;AAAA,IACb,WAAW,MAAM,yEACe,QAAQ;AAAA;AAAA,EAC1C;AACF;AAkBO,SAAS,iBAAiB,UAA4B;AAC3D,QAAM,QAAQ,SAAS,CAAC;AAGxB,MAAI,UAAU,UAAa,iBAAiB,IAAI,KAAK,GAAG;AACtD,UAAM,UAAU,gBAAgB;AAChC,QAAI,YAAY,MAAM;AACpB,aAAOC,MAAK,SAAS,GAAG,QAAQ;AAAA,IAClC;AAAA,EACF;AAOA,MAAI,UAAU,UAAa,CAAC,sBAAsB,GAAG;AACnD,UAAM,UAAU,gBAAgB;AAChC,QAAI,YAAY,MAAM;AACpB,YAAM,eAAeA,MAAK,SAAS,GAAG,QAAQ;AAC9C,gCAA0B,OAAO,YAAY;AAC7C,aAAO;AAAA,IACT;AAAA,EAKF;AAEA,SAAOA,MAAK,gBAAgB,GAAG,GAAG,QAAQ;AAC5C;AAmCO,SAAS,oBAAyC;AACvD,SAAO;AACT;AAGA,IAAI,2BAA2B;AAQ/B,IAAM,0BAA0B,CAAC,IAAI,QAAQ,QAAQ,UAAU;AAuBxD,SAAS,iBAAyB;AACvC,QAAM,SAAS,cAAc,YAAY,aAAa;AACtD,MAAI,CAAC,0BAA0B;AAC7B,+BAA2B;AAC3B,4BAAwB,MAAM;AAAA,EAChC;AACA,SAAO;AACT;AAGA,SAAS,wBAAwB,QAAsB;AACrD,QAAM,SAAS,cAAc,aAAa;AAC1C,MAAI,WAAW,UAAU,CAACC,YAAW,MAAM,KAAKA,YAAW,MAAM,EAAG;AACpE,MAAI;AACF,cAAUC,SAAQ,MAAM,GAAG,EAAE,WAAW,KAAK,CAAC;AAC9C,eAAW,UAAU,yBAAyB;AAC5C,YAAM,OAAO,GAAG,MAAM,GAAG,MAAM;AAC/B,UAAID,YAAW,IAAI,EAAG,UAAS,MAAM,GAAG,MAAM,GAAG,MAAM,EAAE;AAAA,IAC3D;AAAA,EACF,QAAQ;AAAA,EAER;AACF;AAGA,SAAS,SAAS,MAAc,IAAkB;AAChD,MAAI;AACF,eAAW,MAAM,EAAE;AAAA,EACrB,SAAS,KAAK;AACZ,QAAK,IAA8B,SAAS,QAAS,OAAM;AAC3D,iBAAa,MAAM,EAAE;AACrB,eAAW,IAAI;AAAA,EACjB;AACF;;;ADlVO,SAAS,iBAAyB;AACvC,SAAOE,MAAK,gBAAgB,GAAG,UAAU;AAC3C;AAGO,SAAS,kBAA0B;AACxC,SAAOA,MAAK,eAAe,GAAG,gBAAgB;AAChD;AAGO,SAAS,eAAuB;AACrC,SAAOA,MAAK,eAAe,GAAG,YAAY;AAC5C;AAOA,IAAM,WAAW;AAgBV,SAAS,uBAAgC;AAC9C,SAAO,QAAQ,IAAI,wBAAwB,MAAM;AACnD;AAGO,SAAS,kBAAkB,KAAoB;AACpD,EAAAC,WAAU,OAAO,eAAe,GAAG,EAAE,WAAW,MAAM,MAAM,SAAS,CAAC;AACxE;","names":["mkdirSync","join","accessSync","existsSync","homedir","dirname","join","resolve","existsSync","readFileSync","existsSync","readFileSync","statSync","resolve","resolve","join","homedir","join","existsSync","accessSync","join","existsSync","dirname","join","mkdirSync"]}
|
|
@@ -5,7 +5,7 @@ import {
|
|
|
5
5
|
getErrorMessage,
|
|
6
6
|
getTimeProvider,
|
|
7
7
|
ok
|
|
8
|
-
} from "./chunk-
|
|
8
|
+
} from "./chunk-LJIB6TNE.js";
|
|
9
9
|
|
|
10
10
|
// src/cli-adapters/circuit-breaker-types.ts
|
|
11
11
|
var CircuitErrorCode = {
|
|
@@ -353,4 +353,4 @@ export {
|
|
|
353
353
|
CircuitBreakerRegistry,
|
|
354
354
|
mapCliErrorToCategory
|
|
355
355
|
};
|
|
356
|
-
//# sourceMappingURL=chunk-
|
|
356
|
+
//# sourceMappingURL=chunk-LIEFKEAO.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import {
|
|
2
2
|
isPersistenceEnabled,
|
|
3
3
|
nexusDataPath
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-I2HMWH4R.js";
|
|
5
5
|
import {
|
|
6
6
|
__require
|
|
7
7
|
} from "./chunk-PR4QN5HX.js";
|
|
@@ -10981,7 +10981,7 @@ var CompositeRouter = class _CompositeRouter {
|
|
|
10981
10981
|
*/
|
|
10982
10982
|
async consultUnifiedContext(task) {
|
|
10983
10983
|
try {
|
|
10984
|
-
const { getContextForTask, inferTaskCategory } = await import("./context-retriever-
|
|
10984
|
+
const { getContextForTask, inferTaskCategory } = await import("./context-retriever-KLJ5X4TL.js");
|
|
10985
10985
|
const ctx = await getContextForTask({
|
|
10986
10986
|
task: task.content,
|
|
10987
10987
|
category: inferTaskCategory(task.content),
|
|
@@ -12279,4 +12279,4 @@ export {
|
|
|
12279
12279
|
ParseError,
|
|
12280
12280
|
OrchestratorError
|
|
12281
12281
|
};
|
|
12282
|
-
//# sourceMappingURL=chunk-
|
|
12282
|
+
//# sourceMappingURL=chunk-LJIB6TNE.js.map
|
|
@@ -2,7 +2,7 @@ import {
|
|
|
2
2
|
ConfigError,
|
|
3
3
|
err,
|
|
4
4
|
ok
|
|
5
|
-
} from "./chunk-
|
|
5
|
+
} from "./chunk-LJIB6TNE.js";
|
|
6
6
|
|
|
7
7
|
// src/adapters/sdk/types.ts
|
|
8
8
|
var PROVIDER_ENV_KEYS = {
|
|
@@ -117,4 +117,4 @@ export {
|
|
|
117
117
|
CUSTOM_API_ALLOW_PRIVATE_ENV,
|
|
118
118
|
validateCustomApiBaseUrl
|
|
119
119
|
};
|
|
120
|
-
//# sourceMappingURL=chunk-
|
|
120
|
+
//# sourceMappingURL=chunk-M66MYHBT.js.map
|