prjct-cli 1.45.7 → 1.46.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +21 -1
- package/dist/bin/prjct-core.mjs +282 -261
- package/dist/cli/jira.mjs +33 -1
- package/dist/cli/linear.mjs +33 -1
- package/dist/daemon/entry.mjs +220 -199
- package/dist/templates.json +1 -1
- package/package.json +1 -1
- package/templates/commands/jira.md +15 -9
- package/templates/commands/linear.md +15 -9
- package/templates/global/ANTIGRAVITY.md +1 -1
- package/templates/global/CLAUDE.md +2 -2
- package/templates/global/CURSOR.mdc +1 -1
- package/templates/global/GEMINI.md +1 -1
- package/templates/global/modules/CLAUDE-core.md +2 -2
package/dist/cli/jira.mjs
CHANGED
|
@@ -5,4 +5,36 @@ import { dirname as __pathDirname } from 'path';
|
|
|
5
5
|
var require = __createRequire(import.meta.url);
|
|
6
6
|
var __filename = __fileURLToPath(import.meta.url);
|
|
7
7
|
var __dirname = __pathDirname(__filename);
|
|
8
|
-
var
|
|
8
|
+
var _e=Object.defineProperty;var o=(e,t)=>_e(e,"name",{value:t,configurable:!0}),x=(e=>typeof require<"u"?require:typeof Proxy<"u"?new Proxy(e,{get:(t,r)=>(typeof require<"u"?require:t)[r]}):e)(function(e){if(typeof require<"u")return require.apply(this,arguments);throw Error('Dynamic require of "'+e+'" is not supported')});import{execFile as Fe}from"node:child_process";import te from"node:fs/promises";import ye from"node:os";import re from"node:path";import{promisify as Je}from"node:util";import me from"node:fs";import he from"node:path";import{z as l}from"zod";var C={create(e,t){class r extends Error{static{o(this,"TypedError")}errorName;data;isOperational=!0;constructor(i){let a=t.parse(i);super(`${e}: ${JSON.stringify(a)}`),this.name=e,this.errorName=e,this.data=a,Error.captureStackTrace?.(this,this.constructor)}static throw(i){throw new r(i)}static is(i){return i instanceof r&&i.errorName===e}static create(i){return new r(i)}}return r}},ot=C.create("FileError",l.object({path:l.string(),operation:l.enum(["read","write","delete","create","copy"]),reason:l.string().optional()})),st=C.create("ValidationError",l.object({field:l.string(),expected:l.string(),received:l.string().optional(),message:l.string().optional()})),at=C.create("PermissionError",l.object({action:l.string(),resource:l.string(),reason:l.string().optional()})),ct=C.create("TaskError",l.object({taskId:l.string().optional(),operation:l.enum(["create","update","complete","pause","resume","delete"]),reason:l.string()})),ut=C.create("SessionError",l.object({sessionId:l.string().optional(),reason:l.string()})),lt=C.create("SyncError",l.object({projectId:l.string().optional(),operation:l.enum(["push","pull","auth","connect"]),reason:l.string()}));import K from"node:fs";import L from"node:path";function $e(e){return e instanceof Error&&"code"in e}o($e,"isNodeError");function pe(e){return $e(e)&&e.code==="ENOENT"}o(pe,"isNotFoundError");function E(e){return e instanceof Error?e.message:typeof e=="string"?e:"Unknown error"}o(E,"getErrorMessage");var V=null,Ne=null,A=null;function fe(){if(A)return A;let e=__dirname;for(let t=0;t<5;t++){let r=L.join(e,"package.json");if(K.existsSync(r))try{if(JSON.parse(K.readFileSync(r,"utf-8")).name==="prjct-cli")return A=e,e}catch{}e=L.dirname(e)}return A=L.join(__dirname,"..","..",".."),A}o(fe,"getPackageRoot");function Q(){if(V)return V;try{let e=L.join(fe(),"package.json"),t=JSON.parse(K.readFileSync(e,"utf-8"));return V=t.version,Ne=t,V}catch(e){return console.error("Failed to read version from package.json:",E(e)),"0.0.0"}}o(Q,"getVersion");var yt=Q(),Z=fe();var ee=null,ge=!1;function De(){if(ge)return ee;ge=!0;let e=he.join(Z,"dist","templates.json");try{let t=me.readFileSync(e,"utf-8");return ee=JSON.parse(t),ee}catch{return null}}o(De,"loadBundle");function ve(e){let t=De();if(t?.[e])return t[e];let r=he.join(Z,"templates",e);try{return me.readFileSync(r,"utf-8")}catch{return null}}o(ve,"getTemplateContent");var Ie=Je(Fe),ne={command:"npx",args:["-y","@upstash/context7-mcp@latest"]},Ve=300*1e3,S=null;function Le(){let e=ve("mcp-config.json");if(!e)return{mcpServers:{context7:ne}};try{return JSON.parse(e)}catch{return{mcpServers:{context7:ne}}}}o(Le,"parseTemplateConfig");function Pe(){return Le().mcpServers?.context7||ne}o(Pe,"getContext7Config");function xe(){return process.env.PRJCT_CONTEXT7_CONFIG?process.env.PRJCT_CONTEXT7_CONFIG:process.env.NODE_ENV==="test"?re.join(ye.tmpdir(),"prjct-context7-test","mcp.json"):re.join(ye.homedir(),".claude","mcp.json")}o(xe,"getConfigPath");async function Ee(e){try{let t=await te.readFile(e,"utf-8");return JSON.parse(t)}catch(t){if(pe(t))return{};throw t}}o(Ee,"readConfig");async function qe(){if(process.env.PRJCT_SKIP_CONTEXT7_SMOKE==="1"||process.env.NODE_ENV==="test")return;let e=Pe(),t=[...e.args||[],"--help"];await Ie(e.command||"npx",t,{timeout:15e3})}o(qe,"runSmokeCheck");var ie=class{static{o(this,"Context7Service")}async install(){let t=xe(),r=re.dirname(t);await te.mkdir(r,{recursive:!0});let n=await Ee(t),i=n.mcpServers||{};return i.context7=Pe(),n.mcpServers=i,await te.writeFile(t,JSON.stringify(n,null,2),"utf-8"),S=null,{installed:!0,verified:!1,configPath:t,message:"Context7 MCP configured"}}async verify(){if(S&&Date.now()-S.at<Ve)return S.status;let t=xe(),i=((await Ee(t)).mcpServers||{}).context7;if(!i?.command||!Array.isArray(i.args)||i.args.length===0)return{installed:!1,verified:!1,configPath:t,message:"Context7 MCP not configured in ~/.claude/mcp.json"};try{await qe();let a={installed:!0,verified:!0,configPath:t};return S={at:Date.now(),status:a},a}catch(a){let s={installed:!0,verified:!1,configPath:t,message:`Context7 smoke check failed: ${E(a)}`};return S={at:Date.now(),status:s},s}}async ensureReady(){await this.install();let t=await this.verify();if(!t.verified){let r=t.message||"Context7 MCP is required but not ready. Run `prjct start` to repair configuration.";throw new Error(r)}return t}},we=new ie;import Ce from"node:fs";import q from"node:path";function Be(){return typeof globalThis<"u"&&"Bun"in globalThis?"bun":"node"}o(Be,"detectRuntime");function ke(){return Be()==="bun"}o(ke,"isBun");function Ue(e){if(ke()){let{Database:i}=x("bun:sqlite");return new i(e,{create:!0})}let t=x("better-sqlite3"),r=new t(e),n=r.exec.bind(r);return r.run=i=>n(i),r}o(Ue,"openDatabase");var oe=class{static{o(this,"SystemDatabase")}db=null;dbPath;constructor(){let t=process.env.PRJCT_CLI_HOME?.trim(),r=t?q.resolve(t):q.join(x("node:os").homedir(),".prjct-cli");this.dbPath=q.join(r,"system.db")}getDb(){if(this.db)return this.db;let t=q.dirname(this.dbPath);Ce.existsSync(t)||Ce.mkdirSync(t,{recursive:!0});let r=Ue(this.dbPath);return r.run("PRAGMA journal_mode = WAL"),r.run("PRAGMA synchronous = NORMAL"),r.run("PRAGMA cache_size = -1000"),r.run("PRAGMA temp_store = MEMORY"),this.runMigrations(r),this.db=r,r}runMigrations(t){t.run(`
|
|
9
|
+
CREATE TABLE IF NOT EXISTS _system_migrations (
|
|
10
|
+
version INTEGER PRIMARY KEY,
|
|
11
|
+
name TEXT NOT NULL,
|
|
12
|
+
applied_at TEXT NOT NULL
|
|
13
|
+
)
|
|
14
|
+
`);let r=new Set(t.prepare("SELECT version FROM _system_migrations").all().map(i=>i.version)),n=[{version:1,name:"mcp-health-table",up:o(i=>{i.run(`
|
|
15
|
+
CREATE TABLE mcp_health (
|
|
16
|
+
provider TEXT PRIMARY KEY,
|
|
17
|
+
status TEXT NOT NULL,
|
|
18
|
+
last_checked TEXT NOT NULL,
|
|
19
|
+
last_error TEXT,
|
|
20
|
+
token_version TEXT,
|
|
21
|
+
config_valid INTEGER NOT NULL DEFAULT 0,
|
|
22
|
+
oauth_valid INTEGER NOT NULL DEFAULT 0,
|
|
23
|
+
updated_at TEXT NOT NULL
|
|
24
|
+
)
|
|
25
|
+
`)},"up")}];for(let i of n)r.has(i.version)||(i.up(t),t.prepare("INSERT INTO _system_migrations (version, name, applied_at) VALUES (?, ?, ?)").run(i.version,i.name,new Date().toISOString()))}getMcpHealth(t){return this.getDb().prepare("SELECT * FROM mcp_health WHERE provider = ?").get(t)??null}setMcpHealth(t,r){let n=this.getDb(),i=new Date().toISOString();n.prepare(`
|
|
26
|
+
INSERT OR REPLACE INTO mcp_health
|
|
27
|
+
(provider, status, last_checked, last_error, token_version, config_valid, oauth_valid, updated_at)
|
|
28
|
+
VALUES (?, ?, ?, ?, ?, ?, ?, ?)
|
|
29
|
+
`).run(t,r.status,i,r.lastError??null,r.tokenVersion??null,r.configValid?1:0,r.oauthValid?1:0,i)}clearMcpHealth(t){this.getDb().prepare("DELETE FROM mcp_health WHERE provider = ?").run(t)}close(){this.db&&(this.db.close(),this.db=null)}},b=new oe;import f from"node:fs/promises";import T from"node:os";import p from"node:path";var _="mcp-remote@0.1.38",se={linear:{command:"npx",args:["-y",_,"https://mcp.linear.app/mcp"],description:"Linear MCP server (OAuth)"},jira:{command:"npx",args:["-y",_,"https://mcp.atlassian.com/v1/mcp"],description:"Atlassian MCP server for Jira (OAuth)"}},w={linear:`npx -y ${_} https://mcp.linear.app/mcp`,jira:`npx -y ${_} https://mcp.atlassian.com/v1/mcp`};function j(){return _.split("@")[1]}o(j,"getMcpRemoteVersion");function $(){return process.env.PRJCT_TEST_MODE==="1"?p.join(T.tmpdir(),"prjct-context7-test","mcp.json"):p.join(T.homedir(),".claude","mcp.json")}o($,"getClaudeMcpConfigPath");async function ae(){if(process.env.PRJCT_TEST_MODE==="1")return[{provider:"claude",configPath:$(),mergeIntoExisting:!1}];let e=T.homedir(),t=[],r=p.join(e,".claude");try{await f.access(r),t.push({provider:"claude",configPath:p.join(r,"mcp.json"),mergeIntoExisting:!1})}catch{}let n=p.join(e,".gemini");try{await f.access(n),t.push({provider:"gemini",configPath:p.join(n,"settings.json"),mergeIntoExisting:!0})}catch{}return t}o(ae,"getActiveMcpConfigPaths");async function Se(e,t){let r=await ae();return Promise.all(r.map(async n=>{let i=await He(e,t,n.configPath);return{provider:n.provider,...i}}))}o(Se,"upsertMcpServerAll");async function R(e){let t=await ae(),r=await Promise.all(t.map(async n=>({provider:n.provider,configured:await We(e,n.configPath),path:n.configPath})));return{configured:r.some(n=>n.configured),providers:r}}o(R,"hasMcpServerAny");async function B(e){let t;try{t=await f.readdir(e)}catch{return{valid:!1,reason:"directory not found"}}if(t.length===0)return{valid:!1,reason:"directory empty"};let r=t.filter(n=>n.endsWith("_tokens.json")||n.endsWith(".json"));if(r.length===0)return{valid:!1,reason:"no token files found"};for(let n of r){let i=p.join(e,n);try{let a=await f.readFile(i,"utf-8"),s=JSON.parse(a);if(s.access_token||s.refresh_token)return{valid:!0}}catch{return{valid:!1,reason:`corrupt JSON in ${n}`}}}return{valid:!1,reason:"no valid tokens (missing access_token/refresh_token)"}}o(B,"validateTokenFiles");async function U(){let e=j(),t=p.join(T.homedir(),".mcp-auth"),r=p.join(t,`mcp-remote-${e}`);if((await B(r)).valid)return{migrated:!1,from:null,to:r};let i;try{i=await f.readdir(t)}catch{return{migrated:!1,from:null,to:r}}let a=i.filter(s=>s.startsWith("mcp-remote-")&&s!==`mcp-remote-${e}`).sort().reverse();for(let s of a){let u=p.join(t,s);if((await B(u)).valid){await f.mkdir(r,{recursive:!0});let d=await f.readdir(u);for(let c of d)await f.copyFile(p.join(u,c),p.join(r,c));return{migrated:!0,from:u,to:r}}}return{migrated:!1,from:null,to:r}}o(U,"migrateOAuthTokens");async function H(e){if((await B(e)).valid)return!1;try{let r=await f.readdir(e);for(let n of r)await f.unlink(p.join(e,n));return await f.rmdir(e),!0}catch{return!1}}o(H,"cleanCorruptedTokens");async function W(e){let t=[],r=!1,n=await ae();for(let i of n){let a=await ce(i.configPath),s=a.mcpServers?.[e];if(!s){t.push(`${i.provider}: no ${e} entry in mcp.json`);continue}let u=se[e];if(s.command!==u.command||JSON.stringify(s.args)!==JSON.stringify(u.args)){t.push(`${i.provider}: ${e} config doesn't match preset (stale version?)`);let m={...a.mcpServers||{}};m[e]=u,a.mcpServers=m,await Te(a,i.configPath),r=!0}}return{valid:t.length===0,issues:t,autoFixed:r}}o(W,"validateMcpConfig");async function X(e){let t=j(),r=p.join(T.homedir(),".mcp-auth"),n=p.join(r,`mcp-remote-${t}`),i=!1,a=!1,s=await B(n);if(s.valid)return b.setMcpHealth(e,{status:"healthy",tokenVersion:t,oauthValid:!0}),{ready:!0,tokenDir:n,hint:"OAuth tokens verified \u2014 restart your AI client.",validated:!0,migrated:!1,cleaned:!1};s.reason&&s.reason!=="directory not found"&&s.reason!=="directory empty"&&(a=await H(n));let u=await U();if(u.migrated)return i=!0,b.setMcpHealth(e,{status:"healthy",tokenVersion:t,oauthValid:!0}),{ready:!0,tokenDir:n,hint:`Tokens migrated from ${p.basename(u.from)} \u2014 restart your AI client.`,validated:!0,migrated:!0,cleaned:a};let m=[];try{m=(await f.readdir(r)).filter(v=>v.startsWith("mcp-remote-")&&v!==`mcp-remote-${t}`)}catch{}let d=a?`Previous tokens were invalid and cleaned. Run in a terminal: ${w[e]}`:m.length>0?`Legacy tokens found (${m.join(", ")}) but invalid. Run: ${w[e]}`:`OAuth not completed. Run in a terminal: ${w[e]}`;return b.setMcpHealth(e,{status:"unhealthy",lastError:d,tokenVersion:t,oauthValid:!1}),{ready:!1,tokenDir:null,hint:d,validated:!1,migrated:!1,cleaned:a}}o(X,"checkOAuthTokens");async function be(){let e=j(),t=p.join(T.homedir(),".mcp-auth"),r=[],n;try{n=await f.readdir(t)}catch{return{expectedVersion:e,dirs:r}}let i=n.filter(a=>a.startsWith("mcp-remote-")).sort();for(let a of i){let s=p.join(t,a),u=a.replace("mcp-remote-",""),m=u===e,d=[];try{if(!(await f.stat(s)).isDirectory())continue;d=await f.readdir(s)}catch{continue}let c=d.find(P=>P.endsWith("_tokens.json"))??null,v=!1,h,M=!1,O=!1,z;if(c)try{let P=await f.readFile(p.join(s,c),"utf-8"),y=JSON.parse(P);M=!!y.access_token,O=!!y.refresh_token,y.expires_in&&(z=y.expires_in),v=M||O,v||(h="no valid tokens (missing access_token/refresh_token)")}catch{h=`corrupt JSON in ${c}`}else{let P=d.filter(y=>y.endsWith(".json"));if(P.length===0)h="no token files found";else{for(let y of P)try{let Ae=await f.readFile(p.join(s,y),"utf-8"),I=JSON.parse(Ae);I.access_token&&(M=!0),I.refresh_token&&(O=!0),I.expires_in&&(z=I.expires_in)}catch{h=`corrupt JSON in ${y}`}v=M||O,!v&&!h&&(h="no valid tokens (missing access_token/refresh_token)")}}r.push({version:u,path:s,isCurrent:m,files:d,tokenFile:c,valid:v,reason:h,hasAccessToken:M,hasRefreshToken:O,expiresIn:z})}return{expectedVersion:e,dirs:r}}o(be,"scanTokenDirectories");async function ce(e=$()){try{let t=await f.readFile(e,"utf-8");return JSON.parse(t)}catch(t){let r=E(t).toLowerCase();if(r.includes("no such file")||r.includes("enoent"))return{};throw new Error(`Failed to read MCP config at ${e}: ${E(t)}`)}}o(ce,"readMcpConfig");async function Te(e,t=$()){await f.mkdir(p.dirname(t),{recursive:!0}),await f.writeFile(t,JSON.stringify(e,null,2),"utf-8")}o(Te,"writeMcpConfig");async function He(e,t,r=$()){let n=await ce(r),i={...n.mcpServers||{}},a=i[e];i[e]=t,n.mcpServers=i;let s=JSON.stringify(a)!==JSON.stringify(t);return await Te(n,r),{path:r,changed:s}}o(He,"upsertMcpServer");async function We(e,t=$()){return!!(await ce(t)).mcpServers?.[e]}o(We,"hasMcpServer");function Xe(){return`\u26A1 prjct
|
|
30
|
+
|
|
31
|
+
---`}o(Xe,"mdHeader");function Ge(){return`---
|
|
32
|
+
\u26A1 prjct \xB7 v${Q()}`}o(Ge,"mdFooter");function G(...e){return Ye(Xe(),...e.filter(Boolean),Ge())}o(G,"mdOutput");function N(e,t){let r=`| ${e.join(" | ")} |`,n=`|${e.map(()=>"---").join("|")}|`,i=t.map(a=>`| ${a.join(" | ")} |`);return[r,n,...i].join(`
|
|
33
|
+
`)}o(N,"mdTable");function je(e,t=""){return`\`\`\`${t}
|
|
34
|
+
${e}
|
|
35
|
+
\`\`\``}o(je,"mdCodeBlock");function g(e,t){return`> ${{success:"\u2705",warn:"\u26A0\uFE0F",error:"\u274C",info:"\u2139\uFE0F"}[e]} **${t}**`}o(g,"mdCallout");function D(e,t,r=3){return`### ${e}
|
|
36
|
+
${t}`}o(D,"mdSection");function Re(e,t=!1){return e.map((r,n)=>t?`${n+1}. ${r}`:`- ${r}`).join(`
|
|
37
|
+
`)}o(Re,"mdList");function Ye(...e){return e.filter(Boolean).join(`
|
|
38
|
+
|
|
39
|
+
`)}o(Ye,"mdJoin");var J=process.argv.slice(2),Me=J.indexOf("--json"),de=Me!==-1;de&&J.splice(Me,1);var Oe=J.indexOf("--md"),Y=Oe!==-1;Y&&J.splice(Oe,1);var[ue,...le]=J;function k(e){if(de){console.log(JSON.stringify(e,null,2));return}if(typeof e=="string"){console.log(e);return}console.log(JSON.stringify(e,null,2))}o(k,"output");function F(e,t=1){console.error(de?JSON.stringify({error:e}):`Error: ${e}`),process.exit(t)}o(F,"error");async function ze(){let e=j(),t=x("node:path").join(x("node:os").homedir(),".mcp-auth",`mcp-remote-${e}`),r=await W("jira"),n=await H(t),i=await Se("jira",se.jira),a=await U(),s=await X("jira");if(b.setMcpHealth("jira",{status:s.ready?"healthy":"unhealthy",tokenVersion:e,configValid:!0,oauthValid:s.ready,lastError:s.ready?null:s.hint}),Y){let u=[];u.push("## Jira MCP Setup"),r.autoFixed&&u.push(g("warn","MCP config was outdated and has been auto-fixed.")),n&&u.push(g("warn","Corrupted token files were cleaned up."));let m=i.map(d=>[d.provider,d.path,d.changed?"updated":"unchanged"]);u.push(D("MCP Config",N(["Provider","Path","Status"],m))),a.migrated&&u.push(g("success",`Tokens migrated from ${x("node:path").basename(a.from)}.`)),s.ready?u.push(g("success","Jira MCP is ready. Restart your AI client to activate.")):(u.push(g("info","OAuth required \u2014 complete the steps below.")),u.push(D("Next Steps",Re([`Open a NEW terminal and run:
|
|
40
|
+
${je(w.jira,"bash")}`,"Complete OAuth authorization in the browser.","Run `prjct jira verify --md` to confirm tokens were saved.","Restart your AI client. Jira MCP tools will be ready."],!0)))),console.log(G(...u));return}k({success:!0,provider:"jira",mode:"mcp",configAutoFixed:r.autoFixed,tokensCleaned:n,tokensMigrated:a.migrated,oauthReady:s.ready,installedIn:i.map(u=>({provider:u.provider,path:u.path,updated:u.changed})),nextSteps:s.ready?["Restart your AI client \u2014 Jira MCP is ready."]:[`STEP 1 (done): MCP config written to ${i.map(u=>u.provider).join(", ")}.`,`STEP 2: Open a NEW terminal and run: ${w.jira}`,"STEP 2: A browser will open for OAuth \u2014 complete the authorization.","STEP 3: Run `prjct jira verify` to confirm tokens were saved.","STEP 4: Restart your AI client. Jira MCP tools will be ready."],authCommand:w.jira})}o(ze,"setup");async function Ke(){let e=await be(),t=await W("jira"),r=await R("jira"),n=await U(),i=j(),a=x("node:path").join(x("node:os").homedir(),".mcp-auth",`mcp-remote-${i}`),s=!1,u=e.dirs.find(c=>c.isCurrent);u&&!u.valid&&u.files.length>0&&!n.migrated&&(s=await H(a));let m=await X("jira"),d={installed:!1,verified:!1};try{d=await we.verify()}catch(c){d={installed:!1,verified:!1,message:`check failed: ${c instanceof Error?c.message:"unknown"}`}}if(Y){let c=[];if(c.push("## Jira MCP Verification"),r.configured?t.autoFixed&&c.push(g("warn","MCP config was outdated and has been auto-fixed.")):c.push(g("error","Jira MCP not configured. Run `prjct jira setup` first.")),e.dirs.length===0)c.push(g("error","No token directories found in `~/.mcp-auth/`. OAuth has not been completed."));else{let v=e.dirs.map(h=>[`mcp-remote-${h.version}`,h.isCurrent?"yes":"no",h.valid?"valid":"invalid",h.tokenFile??"\u2014",h.reason??(h.valid?"OK":"\u2014")]);c.push(D("Token Directories",N(["Directory","Current","Status","Token File","Details"],v)))}n.migrated&&c.push(g("success",`Tokens auto-migrated from ${x("node:path").basename(n.from)}.`)),s&&c.push(g("warn","Corrupted token files were cleaned up.")),d.installed?d.verified?c.push(g("success","Context7 MCP is healthy.")):c.push(g("warn",`Context7 MCP configured but not working: ${d.message??"smoke check failed"}. Run \`prjct sync\` to repair.`)):c.push(g("warn","Context7 MCP not configured. Run `prjct sync` to install.")),m.ready?c.push(g("success","READY \u2014 Jira OAuth tokens verified. Restart your AI client to activate.")):c.push(g("error",`NOT READY \u2014 ${m.hint}`)),console.log(G(...c));return}k({provider:"jira",command:"verify",expectedVersion:e.expectedVersion,dirs:e.dirs.map(c=>({version:c.version,isCurrent:c.isCurrent,valid:c.valid,tokenFile:c.tokenFile,reason:c.reason,hasAccessToken:c.hasAccessToken,hasRefreshToken:c.hasRefreshToken})),configValid:t.valid,configAutoFixed:t.autoFixed,migrated:n.migrated,migratedFrom:n.from,cleaned:s,ready:m.ready,hint:m.hint,context7:{installed:d.installed,verified:d.verified,message:d.message}})}o(Ke,"verify");async function Qe(){let e=await R("jira"),t=await W("jira"),r=e.configured?await X("jira"):null;if(Y){let n=[];n.push("## Jira MCP Status");let i=[["MCP configured",e.configured?"yes":"no"],["Config valid",t.valid?"yes":`no (${t.issues.join(", ")})`]];r&&(i.push(["OAuth tokens",r.ready?"valid":"missing/invalid"]),r.migrated&&i.push(["Tokens migrated","yes"]),r.cleaned&&i.push(["Corrupted cleaned","yes"]));let a=e.providers.map(s=>[s.provider,s.configured?"yes":"no",s.path]);n.push(N(["Check","Result"],i)),n.push(D("Providers",N(["Provider","Configured","Path"],a))),e.configured?r?.ready?n.push(g("success","Jira MCP is healthy. Restart your AI client if tools are not visible.")):n.push(g("warn",r?.hint??"OAuth tokens not found.")):n.push(g("error","Jira MCP not configured. Run `prjct jira setup` to configure.")),t.autoFixed&&n.push(g("info","MCP config was auto-fixed during this check.")),console.log(G(...n));return}k({provider:"jira",mode:"mcp",configured:e.configured,configValid:t.valid,configAutoFixed:t.autoFixed,oauthReady:r?.ready??!1,oauthValidated:r?.validated??!1,oauthMigrated:r?.migrated??!1,oauthCleaned:r?.cleaned??!1,providers:e.providers,hint:e.configured?r?.hint??"":"Run `prjct jira setup` to configure Jira MCP."})}o(Qe,"status");async function Ze(e,t,r){let{configured:n}=await R("jira");n||F("Jira MCP is not configured. Run `prjct jira setup` first.");let i={success:!0,provider:"jira",mode:"mcp",delegated:!0,command:e,args:t,hint:r?.hint??"Run this operation using Jira MCP tools in your current AI client session.",nextSteps:["Open your MCP-enabled AI client/session.",`Execute the Jira MCP operation for "${e}".`]};r?.jql&&(i.jql=r.jql),r?.scope&&(i.scope=r.scope),k(i)}o(Ze,"runMcpOperation");async function et(e){let{configured:t}=await R("jira");t||F("Jira MCP is not configured. Run `prjct jira setup` first."),k({success:!0,provider:"jira",mode:"mcp",delegated:!0,command:"sprint",scope:"active_sprint",args:e,jql:"sprint = currentSprint() AND assignee = currentUser() ORDER BY priority DESC",hint:"Fetch your issues in the active sprint via Jira MCP tools.",nextSteps:["Use the Jira MCP search tool with the JQL above to list your active sprint issues.","Issues returned include sprint metadata (sprint name, start/end dates)."]})}o(et,"sprintOperation");async function tt(e){let{configured:t}=await R("jira");t||F("Jira MCP is not configured. Run `prjct jira setup` first."),k({success:!0,provider:"jira",mode:"mcp",delegated:!0,command:"backlog",scope:"backlog",args:e,jql:"sprint is EMPTY AND assignee = currentUser() AND statusCategory != Done ORDER BY priority DESC",hint:"Fetch your backlog issues (not in any sprint) via Jira MCP tools.",nextSteps:["Use the Jira MCP search tool with the JQL above to list your backlog issues.","Backlog issues have no sprint assigned \u2014 differentiate from sprint issues by the sprint field being empty."]})}o(tt,"backlogOperation");async function rt(){try{switch(ue){case"setup":await ze();break;case"verify":await Ke();break;case"status":await Qe();break;case"help":case"--help":case"-h":case void 0:k({usage:"prjct jira <command>",commands:{setup:"Configure Jira MCP server",verify:"Verify OAuth tokens after completing authorization",status:"Check Jira MCP configuration",sprint:"List your issues in the active sprint (MCP)",backlog:"List your backlog issues not in any sprint (MCP)",sync:"Delegate issue sync via MCP tools",list:"Delegate issue listing via MCP tools",get:"Delegate issue retrieval via MCP tools",create:"Delegate issue creation via MCP tools",update:"Delegate issue update via MCP tools",start:"Delegate status transition to in-progress via MCP tools",done:"Delegate status transition to done via MCP tools",transition:"Delegate workflow transition via MCP tools"},note:"Jira is MCP-only. sprint/backlog provide JQL for your AI client MCP session."});break;case"sprint":await et(le);break;case"backlog":await tt(le);break;case"sync":case"start":case"done":case"list":case"get":case"create":case"update":case"transition":case"comment":case"projects":case"boards":await Ze(ue,le);break;default:F(`Unknown command: ${ue}. Use --help to see available commands.`)}}catch(e){F(E(e))}}o(rt,"main");rt();
|
package/dist/cli/linear.mjs
CHANGED
|
@@ -5,4 +5,36 @@ import { dirname as __pathDirname } from 'path';
|
|
|
5
5
|
var require = __createRequire(import.meta.url);
|
|
6
6
|
var __filename = __fileURLToPath(import.meta.url);
|
|
7
7
|
var __dirname = __pathDirname(__filename);
|
|
8
|
-
var
|
|
8
|
+
var Ae=Object.defineProperty;var o=(e,t)=>Ae(e,"name",{value:t,configurable:!0}),x=(e=>typeof require<"u"?require:typeof Proxy<"u"?new Proxy(e,{get:(t,n)=>(typeof require<"u"?require:t)[n]}):e)(function(e){if(typeof require<"u")return require.apply(this,arguments);throw Error('Dynamic require of "'+e+'" is not supported')});import{execFile as De}from"node:child_process";import ee from"node:fs/promises";import ve from"node:os";import te from"node:path";import{promisify as Fe}from"node:util";import ge from"node:fs";import me from"node:path";import{z as l}from"zod";var S={create(e,t){class n extends Error{static{o(this,"TypedError")}errorName;data;isOperational=!0;constructor(i){let a=t.parse(i);super(`${e}: ${JSON.stringify(a)}`),this.name=e,this.errorName=e,this.data=a,Error.captureStackTrace?.(this,this.constructor)}static throw(i){throw new n(i)}static is(i){return i instanceof n&&i.errorName===e}static create(i){return new n(i)}}return n}},rt=S.create("FileError",l.object({path:l.string(),operation:l.enum(["read","write","delete","create","copy"]),reason:l.string().optional()})),it=S.create("ValidationError",l.object({field:l.string(),expected:l.string(),received:l.string().optional(),message:l.string().optional()})),ot=S.create("PermissionError",l.object({action:l.string(),resource:l.string(),reason:l.string().optional()})),st=S.create("TaskError",l.object({taskId:l.string().optional(),operation:l.enum(["create","update","complete","pause","resume","delete"]),reason:l.string()})),at=S.create("SessionError",l.object({sessionId:l.string().optional(),reason:l.string()})),ct=S.create("SyncError",l.object({projectId:l.string().optional(),operation:l.enum(["push","pull","auth","connect"]),reason:l.string()}));import Y from"node:fs";import L from"node:path";function $e(e){return e instanceof Error&&"code"in e}o($e,"isNodeError");function de(e){return $e(e)&&e.code==="ENOENT"}o(de,"isNotFoundError");function E(e){return e instanceof Error?e.message:typeof e=="string"?e:"Unknown error"}o(E,"getErrorMessage");var I=null,_e=null,O=null;function pe(){if(O)return O;let e=__dirname;for(let t=0;t<5;t++){let n=L.join(e,"package.json");if(Y.existsSync(n))try{if(JSON.parse(Y.readFileSync(n,"utf-8")).name==="prjct-cli")return O=e,e}catch{}e=L.dirname(e)}return O=L.join(__dirname,"..","..",".."),O}o(pe,"getPackageRoot");function K(){if(I)return I;try{let e=L.join(pe(),"package.json"),t=JSON.parse(Y.readFileSync(e,"utf-8"));return I=t.version,_e=t,I}catch(e){return console.error("Failed to read version from package.json:",E(e)),"0.0.0"}}o(K,"getVersion");var ht=K(),Z=pe();var Q=null,fe=!1;function Ne(){if(fe)return Q;fe=!0;let e=me.join(Z,"dist","templates.json");try{let t=ge.readFileSync(e,"utf-8");return Q=JSON.parse(t),Q}catch{return null}}o(Ne,"loadBundle");function he(e){let t=Ne();if(t?.[e])return t[e];let n=me.join(Z,"templates",e);try{return ge.readFileSync(n,"utf-8")}catch{return null}}o(he,"getTemplateContent");var Ie=Fe(De),ne={command:"npx",args:["-y","@upstash/context7-mcp@latest"]},Le=300*1e3,T=null;function Ve(){let e=he("mcp-config.json");if(!e)return{mcpServers:{context7:ne}};try{return JSON.parse(e)}catch{return{mcpServers:{context7:ne}}}}o(Ve,"parseTemplateConfig");function Ee(){return Ve().mcpServers?.context7||ne}o(Ee,"getContext7Config");function ye(){return process.env.PRJCT_CONTEXT7_CONFIG?process.env.PRJCT_CONTEXT7_CONFIG:process.env.NODE_ENV==="test"?te.join(ve.tmpdir(),"prjct-context7-test","mcp.json"):te.join(ve.homedir(),".claude","mcp.json")}o(ye,"getConfigPath");async function xe(e){try{let t=await ee.readFile(e,"utf-8");return JSON.parse(t)}catch(t){if(de(t))return{};throw t}}o(xe,"readConfig");async function Je(){if(process.env.PRJCT_SKIP_CONTEXT7_SMOKE==="1"||process.env.NODE_ENV==="test")return;let e=Ee(),t=[...e.args||[],"--help"];await Ie(e.command||"npx",t,{timeout:15e3})}o(Je,"runSmokeCheck");var re=class{static{o(this,"Context7Service")}async install(){let t=ye(),n=te.dirname(t);await ee.mkdir(n,{recursive:!0});let r=await xe(t),i=r.mcpServers||{};return i.context7=Ee(),r.mcpServers=i,await ee.writeFile(t,JSON.stringify(r,null,2),"utf-8"),T=null,{installed:!0,verified:!1,configPath:t,message:"Context7 MCP configured"}}async verify(){if(T&&Date.now()-T.at<Le)return T.status;let t=ye(),i=((await xe(t)).mcpServers||{}).context7;if(!i?.command||!Array.isArray(i.args)||i.args.length===0)return{installed:!1,verified:!1,configPath:t,message:"Context7 MCP not configured in ~/.claude/mcp.json"};try{await Je();let a={installed:!0,verified:!0,configPath:t};return T={at:Date.now(),status:a},a}catch(a){let s={installed:!0,verified:!1,configPath:t,message:`Context7 smoke check failed: ${E(a)}`};return T={at:Date.now(),status:s},s}}async ensureReady(){await this.install();let t=await this.verify();if(!t.verified){let n=t.message||"Context7 MCP is required but not ready. Run `prjct start` to repair configuration.";throw new Error(n)}return t}},Pe=new re;import Se from"node:fs";import V from"node:path";function qe(){return typeof globalThis<"u"&&"Bun"in globalThis?"bun":"node"}o(qe,"detectRuntime");function we(){return qe()==="bun"}o(we,"isBun");function Be(e){if(we()){let{Database:i}=x("bun:sqlite");return new i(e,{create:!0})}let t=x("better-sqlite3"),n=new t(e),r=n.exec.bind(n);return n.run=i=>r(i),n}o(Be,"openDatabase");var ie=class{static{o(this,"SystemDatabase")}db=null;dbPath;constructor(){let t=process.env.PRJCT_CLI_HOME?.trim(),n=t?V.resolve(t):V.join(x("node:os").homedir(),".prjct-cli");this.dbPath=V.join(n,"system.db")}getDb(){if(this.db)return this.db;let t=V.dirname(this.dbPath);Se.existsSync(t)||Se.mkdirSync(t,{recursive:!0});let n=Be(this.dbPath);return n.run("PRAGMA journal_mode = WAL"),n.run("PRAGMA synchronous = NORMAL"),n.run("PRAGMA cache_size = -1000"),n.run("PRAGMA temp_store = MEMORY"),this.runMigrations(n),this.db=n,n}runMigrations(t){t.run(`
|
|
9
|
+
CREATE TABLE IF NOT EXISTS _system_migrations (
|
|
10
|
+
version INTEGER PRIMARY KEY,
|
|
11
|
+
name TEXT NOT NULL,
|
|
12
|
+
applied_at TEXT NOT NULL
|
|
13
|
+
)
|
|
14
|
+
`);let n=new Set(t.prepare("SELECT version FROM _system_migrations").all().map(i=>i.version)),r=[{version:1,name:"mcp-health-table",up:o(i=>{i.run(`
|
|
15
|
+
CREATE TABLE mcp_health (
|
|
16
|
+
provider TEXT PRIMARY KEY,
|
|
17
|
+
status TEXT NOT NULL,
|
|
18
|
+
last_checked TEXT NOT NULL,
|
|
19
|
+
last_error TEXT,
|
|
20
|
+
token_version TEXT,
|
|
21
|
+
config_valid INTEGER NOT NULL DEFAULT 0,
|
|
22
|
+
oauth_valid INTEGER NOT NULL DEFAULT 0,
|
|
23
|
+
updated_at TEXT NOT NULL
|
|
24
|
+
)
|
|
25
|
+
`)},"up")}];for(let i of r)n.has(i.version)||(i.up(t),t.prepare("INSERT INTO _system_migrations (version, name, applied_at) VALUES (?, ?, ?)").run(i.version,i.name,new Date().toISOString()))}getMcpHealth(t){return this.getDb().prepare("SELECT * FROM mcp_health WHERE provider = ?").get(t)??null}setMcpHealth(t,n){let r=this.getDb(),i=new Date().toISOString();r.prepare(`
|
|
26
|
+
INSERT OR REPLACE INTO mcp_health
|
|
27
|
+
(provider, status, last_checked, last_error, token_version, config_valid, oauth_valid, updated_at)
|
|
28
|
+
VALUES (?, ?, ?, ?, ?, ?, ?, ?)
|
|
29
|
+
`).run(t,n.status,i,n.lastError??null,n.tokenVersion??null,n.configValid?1:0,n.oauthValid?1:0,i)}clearMcpHealth(t){this.getDb().prepare("DELETE FROM mcp_health WHERE provider = ?").run(t)}close(){this.db&&(this.db.close(),this.db=null)}},k=new ie;import f from"node:fs/promises";import C from"node:os";import p from"node:path";var j="mcp-remote@0.1.38",oe={linear:{command:"npx",args:["-y",j,"https://mcp.linear.app/mcp"],description:"Linear MCP server (OAuth)"},jira:{command:"npx",args:["-y",j,"https://mcp.atlassian.com/v1/mcp"],description:"Atlassian MCP server for Jira (OAuth)"}},w={linear:`npx -y ${j} https://mcp.linear.app/mcp`,jira:`npx -y ${j} https://mcp.atlassian.com/v1/mcp`};function b(){return j.split("@")[1]}o(b,"getMcpRemoteVersion");function A(){return process.env.PRJCT_TEST_MODE==="1"?p.join(C.tmpdir(),"prjct-context7-test","mcp.json"):p.join(C.homedir(),".claude","mcp.json")}o(A,"getClaudeMcpConfigPath");async function se(){if(process.env.PRJCT_TEST_MODE==="1")return[{provider:"claude",configPath:A(),mergeIntoExisting:!1}];let e=C.homedir(),t=[],n=p.join(e,".claude");try{await f.access(n),t.push({provider:"claude",configPath:p.join(n,"mcp.json"),mergeIntoExisting:!1})}catch{}let r=p.join(e,".gemini");try{await f.access(r),t.push({provider:"gemini",configPath:p.join(r,"settings.json"),mergeIntoExisting:!0})}catch{}return t}o(se,"getActiveMcpConfigPaths");async function Te(e,t){let n=await se();return Promise.all(n.map(async r=>{let i=await Ue(e,t,r.configPath);return{provider:r.provider,...i}}))}o(Te,"upsertMcpServerAll");async function q(e){let t=await se(),n=await Promise.all(t.map(async r=>({provider:r.provider,configured:await He(e,r.configPath),path:r.configPath})));return{configured:n.some(r=>r.configured),providers:n}}o(q,"hasMcpServerAny");async function J(e){let t;try{t=await f.readdir(e)}catch{return{valid:!1,reason:"directory not found"}}if(t.length===0)return{valid:!1,reason:"directory empty"};let n=t.filter(r=>r.endsWith("_tokens.json")||r.endsWith(".json"));if(n.length===0)return{valid:!1,reason:"no token files found"};for(let r of n){let i=p.join(e,r);try{let a=await f.readFile(i,"utf-8"),s=JSON.parse(a);if(s.access_token||s.refresh_token)return{valid:!0}}catch{return{valid:!1,reason:`corrupt JSON in ${r}`}}}return{valid:!1,reason:"no valid tokens (missing access_token/refresh_token)"}}o(J,"validateTokenFiles");async function B(){let e=b(),t=p.join(C.homedir(),".mcp-auth"),n=p.join(t,`mcp-remote-${e}`);if((await J(n)).valid)return{migrated:!1,from:null,to:n};let i;try{i=await f.readdir(t)}catch{return{migrated:!1,from:null,to:n}}let a=i.filter(s=>s.startsWith("mcp-remote-")&&s!==`mcp-remote-${e}`).sort().reverse();for(let s of a){let u=p.join(t,s);if((await J(u)).valid){await f.mkdir(n,{recursive:!0});let d=await f.readdir(u);for(let c of d)await f.copyFile(p.join(u,c),p.join(n,c));return{migrated:!0,from:u,to:n}}}return{migrated:!1,from:null,to:n}}o(B,"migrateOAuthTokens");async function U(e){if((await J(e)).valid)return!1;try{let n=await f.readdir(e);for(let r of n)await f.unlink(p.join(e,r));return await f.rmdir(e),!0}catch{return!1}}o(U,"cleanCorruptedTokens");async function H(e){let t=[],n=!1,r=await se();for(let i of r){let a=await ae(i.configPath),s=a.mcpServers?.[e];if(!s){t.push(`${i.provider}: no ${e} entry in mcp.json`);continue}let u=oe[e];if(s.command!==u.command||JSON.stringify(s.args)!==JSON.stringify(u.args)){t.push(`${i.provider}: ${e} config doesn't match preset (stale version?)`);let m={...a.mcpServers||{}};m[e]=u,a.mcpServers=m,await Ce(a,i.configPath),n=!0}}return{valid:t.length===0,issues:t,autoFixed:n}}o(H,"validateMcpConfig");async function W(e){let t=b(),n=p.join(C.homedir(),".mcp-auth"),r=p.join(n,`mcp-remote-${t}`),i=!1,a=!1,s=await J(r);if(s.valid)return k.setMcpHealth(e,{status:"healthy",tokenVersion:t,oauthValid:!0}),{ready:!0,tokenDir:r,hint:"OAuth tokens verified \u2014 restart your AI client.",validated:!0,migrated:!1,cleaned:!1};s.reason&&s.reason!=="directory not found"&&s.reason!=="directory empty"&&(a=await U(r));let u=await B();if(u.migrated)return i=!0,k.setMcpHealth(e,{status:"healthy",tokenVersion:t,oauthValid:!0}),{ready:!0,tokenDir:r,hint:`Tokens migrated from ${p.basename(u.from)} \u2014 restart your AI client.`,validated:!0,migrated:!0,cleaned:a};let m=[];try{m=(await f.readdir(n)).filter(v=>v.startsWith("mcp-remote-")&&v!==`mcp-remote-${t}`)}catch{}let d=a?`Previous tokens were invalid and cleaned. Run in a terminal: ${w[e]}`:m.length>0?`Legacy tokens found (${m.join(", ")}) but invalid. Run: ${w[e]}`:`OAuth not completed. Run in a terminal: ${w[e]}`;return k.setMcpHealth(e,{status:"unhealthy",lastError:d,tokenVersion:t,oauthValid:!1}),{ready:!1,tokenDir:null,hint:d,validated:!1,migrated:!1,cleaned:a}}o(W,"checkOAuthTokens");async function ke(){let e=b(),t=p.join(C.homedir(),".mcp-auth"),n=[],r;try{r=await f.readdir(t)}catch{return{expectedVersion:e,dirs:n}}let i=r.filter(a=>a.startsWith("mcp-remote-")).sort();for(let a of i){let s=p.join(t,a),u=a.replace("mcp-remote-",""),m=u===e,d=[];try{if(!(await f.stat(s)).isDirectory())continue;d=await f.readdir(s)}catch{continue}let c=d.find(P=>P.endsWith("_tokens.json"))??null,v=!1,h,R=!1,M=!1,z;if(c)try{let P=await f.readFile(p.join(s,c),"utf-8"),y=JSON.parse(P);R=!!y.access_token,M=!!y.refresh_token,y.expires_in&&(z=y.expires_in),v=R||M,v||(h="no valid tokens (missing access_token/refresh_token)")}catch{h=`corrupt JSON in ${c}`}else{let P=d.filter(y=>y.endsWith(".json"));if(P.length===0)h="no token files found";else{for(let y of P)try{let je=await f.readFile(p.join(s,y),"utf-8"),F=JSON.parse(je);F.access_token&&(R=!0),F.refresh_token&&(M=!0),F.expires_in&&(z=F.expires_in)}catch{h=`corrupt JSON in ${y}`}v=R||M,!v&&!h&&(h="no valid tokens (missing access_token/refresh_token)")}}n.push({version:u,path:s,isCurrent:m,files:d,tokenFile:c,valid:v,reason:h,hasAccessToken:R,hasRefreshToken:M,expiresIn:z})}return{expectedVersion:e,dirs:n}}o(ke,"scanTokenDirectories");async function ae(e=A()){try{let t=await f.readFile(e,"utf-8");return JSON.parse(t)}catch(t){let n=E(t).toLowerCase();if(n.includes("no such file")||n.includes("enoent"))return{};throw new Error(`Failed to read MCP config at ${e}: ${E(t)}`)}}o(ae,"readMcpConfig");async function Ce(e,t=A()){await f.mkdir(p.dirname(t),{recursive:!0}),await f.writeFile(t,JSON.stringify(e,null,2),"utf-8")}o(Ce,"writeMcpConfig");async function Ue(e,t,n=A()){let r=await ae(n),i={...r.mcpServers||{}},a=i[e];i[e]=t,r.mcpServers=i;let s=JSON.stringify(a)!==JSON.stringify(t);return await Ce(r,n),{path:n,changed:s}}o(Ue,"upsertMcpServer");async function He(e,t=A()){return!!(await ae(t)).mcpServers?.[e]}o(He,"hasMcpServer");function We(){return`\u26A1 prjct
|
|
30
|
+
|
|
31
|
+
---`}o(We,"mdHeader");function Xe(){return`---
|
|
32
|
+
\u26A1 prjct \xB7 v${K()}`}o(Xe,"mdFooter");function X(...e){return Ge(We(),...e.filter(Boolean),Xe())}o(X,"mdOutput");function $(e,t){let n=`| ${e.join(" | ")} |`,r=`|${e.map(()=>"---").join("|")}|`,i=t.map(a=>`| ${a.join(" | ")} |`);return[n,r,...i].join(`
|
|
33
|
+
`)}o($,"mdTable");function be(e,t=""){return`\`\`\`${t}
|
|
34
|
+
${e}
|
|
35
|
+
\`\`\``}o(be,"mdCodeBlock");function g(e,t){return`> ${{success:"\u2705",warn:"\u26A0\uFE0F",error:"\u274C",info:"\u2139\uFE0F"}[e]} **${t}**`}o(g,"mdCallout");function _(e,t,n=3){return`### ${e}
|
|
36
|
+
${t}`}o(_,"mdSection");function Re(e,t=!1){return e.map((n,r)=>t?`${r+1}. ${n}`:`- ${n}`).join(`
|
|
37
|
+
`)}o(Re,"mdList");function Ge(...e){return e.filter(Boolean).join(`
|
|
38
|
+
|
|
39
|
+
`)}o(Ge,"mdJoin");var N=process.argv.slice(2),Me=N.indexOf("--json"),le=Me!==-1;le&&N.splice(Me,1);var Oe=N.indexOf("--md"),G=Oe!==-1;G&&N.splice(Oe,1);var[ce,...ze]=N;function D(e){if(le){console.log(JSON.stringify(e,null,2));return}if(typeof e=="string"){console.log(e);return}console.log(JSON.stringify(e,null,2))}o(D,"output");function ue(e,t=1){console.error(le?JSON.stringify({error:e}):`Error: ${e}`),process.exit(t)}o(ue,"error");async function Ye(){let e=b(),t=x("node:path").join(x("node:os").homedir(),".mcp-auth",`mcp-remote-${e}`),n=await H("linear"),r=await U(t),i=await Te("linear",oe.linear),a=await B(),s=await W("linear");if(k.setMcpHealth("linear",{status:s.ready?"healthy":"unhealthy",tokenVersion:e,configValid:!0,oauthValid:s.ready,lastError:s.ready?null:s.hint}),G){let u=[];u.push("## Linear MCP Setup"),n.autoFixed&&u.push(g("warn","MCP config was outdated and has been auto-fixed.")),r&&u.push(g("warn","Corrupted token files were cleaned up."));let m=i.map(d=>[d.provider,d.path,d.changed?"updated":"unchanged"]);u.push(_("MCP Config",$(["Provider","Path","Status"],m))),a.migrated&&u.push(g("success",`Tokens migrated from ${x("node:path").basename(a.from)}.`)),s.ready?u.push(g("success","Linear MCP is ready. Restart your AI client to activate.")):(u.push(g("info","OAuth required \u2014 complete the steps below.")),u.push(_("Next Steps",Re([`Open a NEW terminal and run:
|
|
40
|
+
${be(w.linear,"bash")}`,"Complete OAuth authorization in the browser.","Run `prjct linear verify --md` to confirm tokens were saved.","Restart your AI client. Linear MCP tools will be ready."],!0)))),console.log(X(...u));return}D({success:!0,provider:"linear",mode:"mcp",configAutoFixed:n.autoFixed,tokensCleaned:r,tokensMigrated:a.migrated,oauthReady:s.ready,installedIn:i.map(u=>({provider:u.provider,path:u.path,updated:u.changed})),nextSteps:s.ready?["Restart your AI client \u2014 Linear MCP is ready."]:[`STEP 1 (done): MCP config written to ${i.map(u=>u.provider).join(", ")}.`,`STEP 2: Open a NEW terminal and run: ${w.linear}`,"STEP 2: A browser will open for OAuth \u2014 complete the authorization.","STEP 3: Run `prjct linear verify` to confirm tokens were saved.","STEP 4: Restart your AI client. Linear MCP tools will be ready."],authCommand:w.linear})}o(Ye,"setup");async function Ke(){let e=await ke(),t=await H("linear"),n=await q("linear"),r=await B(),i=b(),a=x("node:path").join(x("node:os").homedir(),".mcp-auth",`mcp-remote-${i}`),s=!1,u=e.dirs.find(c=>c.isCurrent);u&&!u.valid&&u.files.length>0&&!r.migrated&&(s=await U(a));let m=await W("linear"),d={installed:!1,verified:!1};try{d=await Pe.verify()}catch(c){d={installed:!1,verified:!1,message:`check failed: ${c instanceof Error?c.message:"unknown"}`}}if(G){let c=[];if(c.push("## Linear MCP Verification"),n.configured?t.autoFixed&&c.push(g("warn","MCP config was outdated and has been auto-fixed.")):c.push(g("error","Linear MCP not configured. Run `prjct linear setup` first.")),e.dirs.length===0)c.push(g("error","No token directories found in `~/.mcp-auth/`. OAuth has not been completed."));else{let v=e.dirs.map(h=>[`mcp-remote-${h.version}`,h.isCurrent?"yes":"no",h.valid?"valid":"invalid",h.tokenFile??"\u2014",h.reason??(h.valid?"OK":"\u2014")]);c.push(_("Token Directories",$(["Directory","Current","Status","Token File","Details"],v)))}r.migrated&&c.push(g("success",`Tokens auto-migrated from ${x("node:path").basename(r.from)}.`)),s&&c.push(g("warn","Corrupted token files were cleaned up.")),d.installed?d.verified?c.push(g("success","Context7 MCP is healthy.")):c.push(g("warn",`Context7 MCP configured but not working: ${d.message??"smoke check failed"}. Run \`prjct sync\` to repair.`)):c.push(g("warn","Context7 MCP not configured. Run `prjct sync` to install.")),m.ready?c.push(g("success","READY \u2014 Linear OAuth tokens verified. Restart your AI client to activate.")):c.push(g("error",`NOT READY \u2014 ${m.hint}`)),console.log(X(...c));return}D({provider:"linear",command:"verify",expectedVersion:e.expectedVersion,dirs:e.dirs.map(c=>({version:c.version,isCurrent:c.isCurrent,valid:c.valid,tokenFile:c.tokenFile,reason:c.reason,hasAccessToken:c.hasAccessToken,hasRefreshToken:c.hasRefreshToken})),configValid:t.valid,configAutoFixed:t.autoFixed,migrated:r.migrated,migratedFrom:r.from,cleaned:s,ready:m.ready,hint:m.hint,context7:{installed:d.installed,verified:d.verified,message:d.message}})}o(Ke,"verify");async function Ze(){let e=await q("linear"),t=await H("linear"),n=e.configured?await W("linear"):null;if(G){let r=[];r.push("## Linear MCP Status");let i=[["MCP configured",e.configured?"yes":"no"],["Config valid",t.valid?"yes":`no (${t.issues.join(", ")})`]];n&&(i.push(["OAuth tokens",n.ready?"valid":"missing/invalid"]),n.migrated&&i.push(["Tokens migrated","yes"]),n.cleaned&&i.push(["Corrupted cleaned","yes"]));let a=e.providers.map(s=>[s.provider,s.configured?"yes":"no",s.path]);r.push($(["Check","Result"],i)),r.push(_("Providers",$(["Provider","Configured","Path"],a))),e.configured?n?.ready?r.push(g("success","Linear MCP is healthy. Restart your AI client if tools are not visible.")):r.push(g("warn",n?.hint??"OAuth tokens not found.")):r.push(g("error","Linear MCP not configured. Run `prjct linear setup` to configure.")),t.autoFixed&&r.push(g("info","MCP config was auto-fixed during this check.")),console.log(X(...r));return}D({provider:"linear",mode:"mcp",configured:e.configured,configValid:t.valid,configAutoFixed:t.autoFixed,oauthReady:n?.ready??!1,oauthValidated:n?.validated??!1,oauthMigrated:n?.migrated??!1,oauthCleaned:n?.cleaned??!1,providers:e.providers,hint:e.configured?n?.hint??"":"Run `prjct linear setup` to configure Linear MCP."})}o(Ze,"status");async function Qe(e,t){let{configured:n}=await q("linear");n||ue("Linear MCP is not configured. Run `prjct linear setup` first."),D({success:!0,provider:"linear",mode:"mcp",delegated:!0,command:e,args:t,hint:"Run this operation using Linear MCP tools in your current AI client session.",nextSteps:["Open your MCP-enabled AI client/session.",`Execute the Linear MCP operation for "${e}".`]})}o(Qe,"runMcpOperation");async function et(){try{switch(ce){case"setup":await Ye();break;case"verify":await Ke();break;case"status":await Ze();break;case"help":case"--help":case"-h":case void 0:D({usage:"prjct linear <command>",commands:{setup:"Configure Linear MCP server",verify:"Verify OAuth tokens after completing authorization",status:"Check Linear MCP configuration",sync:"Delegate issue sync via MCP tools",list:"Delegate issue listing via MCP tools",get:"Delegate issue retrieval via MCP tools",create:"Delegate issue creation via MCP tools",update:"Delegate issue update via MCP tools",start:"Delegate status transition to in-progress via MCP tools",done:"Delegate status transition to done via MCP tools",comment:"Delegate comment creation via MCP tools"},note:"Linear is MCP-only."});break;case"sync":case"list":case"get":case"create":case"update":case"start":case"done":case"comment":case"teams":case"projects":await Qe(ce,ze);break;default:ue(`Unknown command: ${ce}. Use --help to see available commands.`)}}catch(e){ue(E(e))}}o(et,"main");et();
|