prjct-cli 1.50.2 → 1.51.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +12 -0
- package/dist/bin/prjct-core.mjs +384 -360
- package/dist/cli/jira.mjs +7 -9
- package/dist/cli/linear.mjs +8 -10
- package/dist/daemon/entry.mjs +343 -319
- package/package.json +1 -1
package/dist/cli/jira.mjs
CHANGED
|
@@ -5,7 +5,7 @@ import { dirname as __pathDirname } from 'path';
|
|
|
5
5
|
var require = __createRequire(import.meta.url);
|
|
6
6
|
var __filename = __fileURLToPath(import.meta.url);
|
|
7
7
|
var __dirname = __pathDirname(__filename);
|
|
8
|
-
var Ft=Object.defineProperty;var o=(t,e)=>Ft(t,"name",{value:e,configurable:!0}),w=(t=>typeof require<"u"?require:typeof Proxy<"u"?new Proxy(t,{get:(e,r)=>(typeof require<"u"?require:e)[r]}):t)(function(t){if(typeof require<"u")return require.apply(this,arguments);throw Error('Dynamic require of "'+t+'" is not supported')});import St from"node:fs/promises";import xt from"node:os";import nt from"node:path";import gt from"node:fs";import ht from"node:path";import{z as l}from"zod";var T={create(t,e){class r extends Error{static{o(this,"TypedError")}errorName;data;isOperational=!0;constructor(i){let a=e.parse(i);super(`${t}: ${JSON.stringify(a)}`),this.name=t,this.errorName=t,this.data=a,Error.captureStackTrace?.(this,this.constructor)}static throw(i){throw new r(i)}static is(i){return i instanceof r&&i.errorName===t}static create(i){return new r(i)}}return r}},ce=T.create("FileError",l.object({path:l.string(),operation:l.enum(["read","write","delete","create","copy"]),reason:l.string().optional()})),ue=T.create("ValidationError",l.object({field:l.string(),expected:l.string(),received:l.string().optional(),message:l.string().optional()})),le=T.create("PermissionError",l.object({action:l.string(),resource:l.string(),reason:l.string().optional()})),pe=T.create("TaskError",l.object({taskId:l.string().optional(),operation:l.enum(["create","update","complete","pause","resume","delete"]),reason:l.string()})),de=T.create("SessionError",l.object({sessionId:l.string().optional(),reason:l.string()})),fe=T.create("SyncError",l.object({projectId:l.string().optional(),operation:l.enum(["push","pull","auth","connect"]),reason:l.string()}));import K from"node:fs";import V from"node:path";function
|
|
8
|
+
var Ft=Object.defineProperty;var o=(t,e)=>Ft(t,"name",{value:e,configurable:!0}),w=(t=>typeof require<"u"?require:typeof Proxy<"u"?new Proxy(t,{get:(e,r)=>(typeof require<"u"?require:e)[r]}):t)(function(t){if(typeof require<"u")return require.apply(this,arguments);throw Error('Dynamic require of "'+t+'" is not supported')});import St from"node:fs/promises";import xt from"node:os";import nt from"node:path";import gt from"node:fs";import ht from"node:path";import{z as l}from"zod";var T={create(t,e){class r extends Error{static{o(this,"TypedError")}errorName;data;isOperational=!0;constructor(i){let a=e.parse(i);super(`${t}: ${JSON.stringify(a)}`),this.name=t,this.errorName=t,this.data=a,Error.captureStackTrace?.(this,this.constructor)}static throw(i){throw new r(i)}static is(i){return i instanceof r&&i.errorName===t}static create(i){return new r(i)}}return r}},ce=T.create("FileError",l.object({path:l.string(),operation:l.enum(["read","write","delete","create","copy"]),reason:l.string().optional()})),ue=T.create("ValidationError",l.object({field:l.string(),expected:l.string(),received:l.string().optional(),message:l.string().optional()})),le=T.create("PermissionError",l.object({action:l.string(),resource:l.string(),reason:l.string().optional()})),pe=T.create("TaskError",l.object({taskId:l.string().optional(),operation:l.enum(["create","update","complete","pause","resume","delete"]),reason:l.string()})),de=T.create("SessionError",l.object({sessionId:l.string().optional(),reason:l.string()})),fe=T.create("SyncError",l.object({projectId:l.string().optional(),operation:l.enum(["push","pull","auth","connect"]),reason:l.string()}));import K from"node:fs";import V from"node:path";function Dt(t){return t instanceof Error&&"code"in t}o(Dt,"isNodeError");function _(t){return Dt(t)&&t.code==="ENOENT"}o(_,"isNotFoundError");function x(t){return t instanceof Error?t.message:typeof t=="string"?t:"Unknown error"}o(x,"getErrorMessage");var L=null,It=null,A=null;function ft(){if(A)return A;let t=__dirname;for(let e=0;e<5;e++){let r=V.join(t,"package.json");if(K.existsSync(r))try{if(JSON.parse(K.readFileSync(r,"utf-8")).name==="prjct-cli")return A=t,t}catch{}t=V.dirname(t)}return A=V.join(__dirname,"..","..",".."),A}o(ft,"getPackageRoot");function Z(){if(L)return L;try{let t=V.join(ft(),"package.json"),e=JSON.parse(K.readFileSync(t,"utf-8"));return L=e.version,It=e,L}catch(t){return console.error("Failed to read version from package.json:",x(t)),"0.0.0"}}o(Z,"getVersion");var Ee=Z(),Q=ft();var tt=null,mt=!1;function Jt(){if(mt)return tt;mt=!0;let t=ht.join(Q,"dist","templates.json");try{let e=gt.readFileSync(t,"utf-8");return tt=JSON.parse(e),tt}catch{return null}}o(Jt,"loadBundle");function yt(t){let e=Jt();if(e?.[t])return e[t];let r=ht.join(Q,"templates",t);try{return gt.readFileSync(r,"utf-8")}catch{return null}}o(yt,"getTemplateContent");import{exec as Lt,execFile as Vt}from"node:child_process";import{promisify as vt}from"node:util";var $e=vt(Lt),wt=vt(Vt);import et from"node:fs/promises";import qt from"node:path";async function q(t,e,r=2){let n=qt.dirname(t);await et.mkdir(n,{recursive:!0});let i=JSON.stringify(e,null,r);await et.writeFile(t,i,"utf-8")}o(q,"writeJson");async function rt(t){try{return(await et.stat(t)).isDirectory()}catch(e){if(_(e))return!1;throw e}}o(rt,"dirExists");var it={command:"npx",args:["-y","@upstash/context7-mcp@latest"]},j=null;function Ut(){let t=yt("mcp-config.json");if(!t)return{mcpServers:{context7:it}};try{return JSON.parse(t)}catch{return{mcpServers:{context7:it}}}}o(Ut,"parseTemplateConfig");function Tt(){return Ut().mcpServers?.context7||it}o(Tt,"getContext7Config");function Et(){return process.env.PRJCT_CONTEXT7_CONFIG?process.env.PRJCT_CONTEXT7_CONFIG:process.env.NODE_ENV==="test"?nt.join(xt.tmpdir(),"prjct-context7-test","mcp.json"):nt.join(xt.homedir(),".claude","mcp.json")}o(Et,"getConfigPath");async function Pt(t){try{let e=await St.readFile(t,"utf-8");return JSON.parse(e)}catch(e){if(_(e))return{};throw e}}o(Pt,"readConfig");async function Wt(){if(process.env.PRJCT_SKIP_CONTEXT7_SMOKE==="1"||process.env.NODE_ENV==="test")return;let t=Tt(),e=[...t.args||[],"--help"];await wt(t.command||"npx",e,{timeout:15e3})}o(Wt,"runSmokeCheck");var ot=class{static{o(this,"Context7Service")}async install(){let e=Et(),r=nt.dirname(e);await St.mkdir(r,{recursive:!0});let n=await Pt(e),i=n.mcpServers||{};return i.context7=Tt(),n.mcpServers=i,await q(e,n),j=null,{installed:!0,verified:!1,configPath:e,message:"Context7 MCP configured"}}async verify(){if(j&&Date.now()-j.at<3e5)return j.status;let e=Et(),i=((await Pt(e)).mcpServers||{}).context7;if(!i?.command||!Array.isArray(i.args)||i.args.length===0)return{installed:!1,verified:!1,configPath:e,message:"Context7 MCP not configured in ~/.claude/mcp.json"};try{await Wt();let a={installed:!0,verified:!0,configPath:e};return j={at:Date.now(),status:a},a}catch(a){let s={installed:!0,verified:!1,configPath:e,message:`Context7 smoke check failed: ${x(a)}`};return j={at:Date.now(),status:s},s}}async ensureReady(){await this.install();let e=await this.verify();if(!e.verified){let r=e.message||"Context7 MCP is required but not ready. Run `prjct start` to repair configuration.";throw new Error(r)}return e}},jt=new ot;import Ct from"node:fs";import B from"node:path";function Ht(){return typeof globalThis<"u"&&"Bun"in globalThis?"bun":"node"}o(Ht,"detectRuntime");function kt(){return Ht()==="bun"}o(kt,"isBun");function Xt(t){if(kt()){let{Database:i}=w("bun:sqlite");return new i(t,{create:!0})}let e=w("better-sqlite3"),r=new e(t),n=r.exec.bind(r);return r.run=i=>n(i),r}o(Xt,"openDatabase");var st=class{static{o(this,"SystemDatabase")}db=null;dbPath;constructor(){let e=process.env.PRJCT_CLI_HOME?.trim(),r=e?B.resolve(e):B.join(w("node:os").homedir(),".prjct-cli");this.dbPath=B.join(r,"system.db")}getDb(){if(this.db)return this.db;let e=B.dirname(this.dbPath);Ct.existsSync(e)||Ct.mkdirSync(e,{recursive:!0});let r=Xt(this.dbPath);return r.run("PRAGMA journal_mode = WAL"),r.run("PRAGMA synchronous = NORMAL"),r.run("PRAGMA cache_size = -1000"),r.run("PRAGMA temp_store = MEMORY"),this.runMigrations(r),this.db=r,r}runMigrations(e){e.run(`
|
|
9
9
|
CREATE TABLE IF NOT EXISTS _system_migrations (
|
|
10
10
|
version INTEGER PRIMARY KEY,
|
|
11
11
|
name TEXT NOT NULL,
|
|
@@ -26,15 +26,13 @@ var Ft=Object.defineProperty;var o=(t,e)=>Ft(t,"name",{value:e,configurable:!0})
|
|
|
26
26
|
INSERT OR REPLACE INTO mcp_health
|
|
27
27
|
(provider, status, last_checked, last_error, token_version, config_valid, oauth_valid, updated_at)
|
|
28
28
|
VALUES (?, ?, ?, ?, ?, ?, ?, ?)
|
|
29
|
-
`).run(e,r.status,i,r.lastError??null,r.tokenVersion??null,r.configValid?1:0,r.oauthValid?1:0,i)}clearMcpHealth(e){this.getDb().prepare("DELETE FROM mcp_health WHERE provider = ?").run(e)}close(){this.db&&(this.db.close(),this.db=null)}},k=new st;import g from"node:fs/promises";import C from"node:os";import d from"node:path";var $="mcp-remote@0.1.38",at={linear:{command:"npx",args:["-y",$,"https://mcp.linear.app/mcp"],description:"Linear MCP server (OAuth)"},jira:{command:"npx",args:["-y",$,"https://mcp.atlassian.com/v1/mcp"],description:"Atlassian MCP server for Jira (OAuth)"}},P={linear:`npx -y ${$} https://mcp.linear.app/mcp`,jira:`npx -y ${$} https://mcp.atlassian.com/v1/mcp`};function b(){return $.split("@")[1]}o(b,"getMcpRemoteVersion");function
|
|
30
|
-
|
|
31
|
-
---`}o(zt,"mdHeader");function Kt(){return`---
|
|
32
|
-
\u26A1 prjct \xB7 v${Z()}`}o(Kt,"mdFooter");function Y(...t){return Zt(zt(),...t.filter(Boolean),Kt())}o(Y,"mdOutput");function F(t,e){let r=`| ${t.join(" | ")} |`,n=`|${t.map(()=>"---").join("|")}|`,i=e.map(a=>`| ${a.join(" | ")} |`);return[r,n,...i].join(`
|
|
29
|
+
`).run(e,r.status,i,r.lastError??null,r.tokenVersion??null,r.configValid?1:0,r.oauthValid?1:0,i)}clearMcpHealth(e){this.getDb().prepare("DELETE FROM mcp_health WHERE provider = ?").run(e)}close(){this.db&&(this.db.close(),this.db=null)}},k=new st;import g from"node:fs/promises";import C from"node:os";import d from"node:path";var $="mcp-remote@0.1.38",at={linear:{command:"npx",args:["-y",$,"https://mcp.linear.app/mcp"],description:"Linear MCP server (OAuth)"},jira:{command:"npx",args:["-y",$,"https://mcp.atlassian.com/v1/mcp"],description:"Atlassian MCP server for Jira (OAuth)"}},P={linear:`npx -y ${$} https://mcp.linear.app/mcp`,jira:`npx -y ${$} https://mcp.atlassian.com/v1/mcp`};function b(){return $.split("@")[1]}o(b,"getMcpRemoteVersion");function N(){return process.env.PRJCT_TEST_MODE==="1"?d.join(C.tmpdir(),"prjct-context7-test","mcp.json"):d.join(C.homedir(),".claude","mcp.json")}o(N,"getClaudeMcpConfigPath");async function ct(){if(process.env.PRJCT_TEST_MODE==="1")return[{provider:"claude",configPath:N(),mergeIntoExisting:!1}];let t=C.homedir(),e=[],r=d.join(t,".claude");await rt(r)&&e.push({provider:"claude",configPath:d.join(r,"mcp.json"),mergeIntoExisting:!1});let n=d.join(t,".gemini");return await rt(n)&&e.push({provider:"gemini",configPath:d.join(n,"settings.json"),mergeIntoExisting:!0}),e}o(ct,"getActiveMcpConfigPaths");async function bt(t,e){let r=await ct();return Promise.all(r.map(async n=>{let i=await Gt(t,e,n.configPath);return{provider:n.provider,...i}}))}o(bt,"upsertMcpServerAll");async function R(t){let e=await ct(),r=await Promise.all(e.map(async n=>({provider:n.provider,configured:await Yt(t,n.configPath),path:n.configPath})));return{configured:r.some(n=>n.configured),providers:r}}o(R,"hasMcpServerAny");async function U(t){let e;try{e=await g.readdir(t)}catch{return{valid:!1,reason:"directory not found"}}if(e.length===0)return{valid:!1,reason:"directory empty"};let r=e.filter(n=>n.endsWith("_tokens.json")||n.endsWith(".json"));if(r.length===0)return{valid:!1,reason:"no token files found"};for(let n of r){let i=d.join(t,n);try{let a=await g.readFile(i,"utf-8"),s=JSON.parse(a);if(s.access_token||s.refresh_token)return{valid:!0}}catch{return{valid:!1,reason:`corrupt JSON in ${n}`}}}return{valid:!1,reason:"no valid tokens (missing access_token/refresh_token)"}}o(U,"validateTokenFiles");async function W(){let t=b(),e=d.join(C.homedir(),".mcp-auth"),r=d.join(e,`mcp-remote-${t}`);if((await U(r)).valid)return{migrated:!1,from:null,to:r};let i;try{i=await g.readdir(e)}catch{return{migrated:!1,from:null,to:r}}let a=i.filter(s=>s.startsWith("mcp-remote-")&&s!==`mcp-remote-${t}`).sort().reverse();for(let s of a){let c=d.join(e,s);if((await U(c)).valid){await g.mkdir(r,{recursive:!0});let p=await g.readdir(c);for(let u of p)await g.copyFile(d.join(c,u),d.join(r,u));return{migrated:!0,from:c,to:r}}}return{migrated:!1,from:null,to:r}}o(W,"migrateOAuthTokens");async function H(t){if((await U(t)).valid)return!1;try{let r=await g.readdir(t);for(let n of r)await g.unlink(d.join(t,n));return await g.rmdir(t),!0}catch{return!1}}o(H,"cleanCorruptedTokens");async function X(t){let e=[],r=!1,n=await ct();for(let i of n){let a=await ut(i.configPath),s=a.mcpServers?.[t];if(!s){e.push(`${i.provider}: no ${t} entry in mcp.json`);continue}let c=at[t];if(s.command!==c.command||JSON.stringify(s.args)!==JSON.stringify(c.args)){e.push(`${i.provider}: ${t} config doesn't match preset (stale version?)`);let m={...a.mcpServers||{}};m[t]=c,a.mcpServers=m,await Mt(a,i.configPath),r=!0}}return{valid:e.length===0,issues:e,autoFixed:r}}o(X,"validateMcpConfig");async function G(t){let e=b(),r=d.join(C.homedir(),".mcp-auth"),n=d.join(r,`mcp-remote-${e}`),i=!1,a=!1,s=await U(n);if(s.valid)return k.setMcpHealth(t,{status:"healthy",tokenVersion:e,oauthValid:!0}),{ready:!0,tokenDir:n,hint:"OAuth tokens verified \u2014 restart your AI client.",validated:!0,migrated:!1,cleaned:!1};s.reason&&s.reason!=="directory not found"&&s.reason!=="directory empty"&&(a=await H(n));let c=await W();if(c.migrated)return i=!0,k.setMcpHealth(t,{status:"healthy",tokenVersion:e,oauthValid:!0}),{ready:!0,tokenDir:n,hint:`Tokens migrated from ${d.basename(c.from)} \u2014 restart your AI client.`,validated:!0,migrated:!0,cleaned:a};let m=[];try{m=(await g.readdir(r)).filter(y=>y.startsWith("mcp-remote-")&&y!==`mcp-remote-${e}`)}catch{}let p=a?`Previous tokens were invalid and cleaned. Run in a terminal: ${P[t]}`:m.length>0?`Legacy tokens found (${m.join(", ")}) but invalid. Run: ${P[t]}`:`OAuth not completed. Run in a terminal: ${P[t]}`;return k.setMcpHealth(t,{status:"unhealthy",lastError:p,tokenVersion:e,oauthValid:!1}),{ready:!1,tokenDir:null,hint:p,validated:!1,migrated:!1,cleaned:a}}o(G,"checkOAuthTokens");async function Rt(){let t=b(),e=d.join(C.homedir(),".mcp-auth"),r=[],n;try{n=await g.readdir(e)}catch{return{expectedVersion:t,dirs:r}}let i=n.filter(a=>a.startsWith("mcp-remote-")).sort();for(let a of i){let s=d.join(e,a),c=a.replace("mcp-remote-",""),m=c===t,p=[];try{if(!(await g.stat(s)).isDirectory())continue;p=await g.readdir(s)}catch{continue}let u=p.find(E=>E.endsWith("_tokens.json"))??null,y=!1,h,M=!1,O=!1,z;if(u)try{let E=await g.readFile(d.join(s,u),"utf-8"),v=JSON.parse(E);M=!!v.access_token,O=!!v.refresh_token,v.expires_in&&(z=v.expires_in),y=M||O,y||(h="no valid tokens (missing access_token/refresh_token)")}catch{h=`corrupt JSON in ${u}`}else{let E=p.filter(v=>v.endsWith(".json"));if(E.length===0)h="no token files found";else{for(let v of E)try{let Nt=await g.readFile(d.join(s,v),"utf-8"),J=JSON.parse(Nt);J.access_token&&(M=!0),J.refresh_token&&(O=!0),J.expires_in&&(z=J.expires_in)}catch{h=`corrupt JSON in ${v}`}y=M||O,!y&&!h&&(h="no valid tokens (missing access_token/refresh_token)")}}r.push({version:c,path:s,isCurrent:m,files:p,tokenFile:u,valid:y,reason:h,hasAccessToken:M,hasRefreshToken:O,expiresIn:z})}return{expectedVersion:t,dirs:r}}o(Rt,"scanTokenDirectories");async function ut(t=N()){try{let e=await g.readFile(t,"utf-8");return JSON.parse(e)}catch(e){let r=x(e).toLowerCase();if(r.includes("no such file")||r.includes("enoent"))return{};throw new Error(`Failed to read MCP config at ${t}: ${x(e)}`)}}o(ut,"readMcpConfig");async function Mt(t,e=N()){await q(e,t)}o(Mt,"writeMcpConfig");async function Gt(t,e,r=N()){let n=await ut(r),i={...n.mcpServers||{}},a=i[t];i[t]=e,n.mcpServers=i;let s=JSON.stringify(a)!==JSON.stringify(e);return await Mt(n,r),{path:r,changed:s}}o(Gt,"upsertMcpServer");async function Yt(t,e=N()){return!!(await ut(e)).mcpServers?.[t]}o(Yt,"hasMcpServer");function zt(){return"---"}o(zt,"mdHeader");function Kt(){return`---
|
|
30
|
+
prjct v${Z()}`}o(Kt,"mdFooter");function Y(...t){return Zt(zt(),...t.filter(Boolean),Kt())}o(Y,"mdOutput");function F(t,e){let r=`| ${t.join(" | ")} |`,n=`|${t.map(()=>"---").join("|")}|`,i=e.map(a=>`| ${a.join(" | ")} |`);return[r,n,...i].join(`
|
|
33
31
|
`)}o(F,"mdTable");function Ot(t,e=""){return`\`\`\`${e}
|
|
34
32
|
${t}
|
|
35
|
-
\`\`\``}o(Ot,"mdCodeBlock");function f(t,e){return`>
|
|
36
|
-
${e}`}o(
|
|
33
|
+
\`\`\``}o(Ot,"mdCodeBlock");function f(t,e){return`> **${{success:"OK",warn:"WARNING",error:"ERROR",info:"INFO"}[t]}:** ${e}`}o(f,"mdCallout");function D(t,e,r=3){return`### ${t}
|
|
34
|
+
${e}`}o(D,"mdSection");function _t(t,e=!1){return t.map((r,n)=>e?`${n+1}. ${r}`:`- ${r}`).join(`
|
|
37
35
|
`)}o(_t,"mdList");function Zt(...t){return t.filter(Boolean).join(`
|
|
38
36
|
|
|
39
|
-
`)}o(Zt,"mdJoin");function At(t=process.argv){let e=t.slice(2),r=e.indexOf("--json"),n=r!==-1;n&&e.splice(r,1);let i=e.indexOf("--md"),a=i!==-1;a&&e.splice(i,1);let[s,...c]=e;return{command:s,commandArgs:c,jsonMode:n,mdMode:a}}o(At,"parseCliArgs");var{command:lt,commandArgs:pt,jsonMode:$t,mdMode:dt}=At();function S(t){if($t){console.log(JSON.stringify(t,null,2));return}if(typeof t=="string"){console.log(t);return}console.log(JSON.stringify(t,null,2))}o(S,"output");function I(t,e=1){console.error($t?JSON.stringify({error:t}):`Error: ${t}`),process.exit(e)}o(I,"error");async function Qt(){let t=b(),e=w("node:path").join(w("node:os").homedir(),".mcp-auth",`mcp-remote-${t}`),r=await X("jira"),n=await H(e),i=await bt("jira",at.jira),a=await W(),s=await G("jira");if(k.setMcpHealth("jira",{status:s.ready?"healthy":"unhealthy",tokenVersion:t,configValid:!0,oauthValid:s.ready,lastError:s.ready?null:s.hint}),dt){let c=[];c.push("## Jira MCP Setup"),r.autoFixed&&c.push(f("warn","MCP config was outdated and has been auto-fixed.")),n&&c.push(f("warn","Corrupted token files were cleaned up."));let m=i.map(p=>[p.provider,p.path,p.changed?"updated":"unchanged"]);c.push(
|
|
40
|
-
${Ot(P.jira,"bash")}`,"Complete OAuth authorization in the browser.","Run `prjct jira verify --md` to confirm tokens were saved.","Restart your AI client. Jira MCP tools will be ready."],!0)))),console.log(Y(...c));return}S({success:!0,provider:"jira",mode:"mcp",configAutoFixed:r.autoFixed,tokensCleaned:n,tokensMigrated:a.migrated,oauthReady:s.ready,installedIn:i.map(c=>({provider:c.provider,path:c.path,updated:c.changed})),nextSteps:s.ready?["Restart your AI client \u2014 Jira MCP is ready."]:[`STEP 1 (done): MCP config written to ${i.map(c=>c.provider).join(", ")}.`,`STEP 2: Open a NEW terminal and run: ${P.jira}`,"STEP 2: A browser will open for OAuth \u2014 complete the authorization.","STEP 3: Run `prjct jira verify` to confirm tokens were saved.","STEP 4: Restart your AI client. Jira MCP tools will be ready."],authCommand:P.jira})}o(Qt,"setup");async function te(){let t=await Rt(),e=await X("jira"),r=await R("jira"),n=await W(),i=b(),a=w("node:path").join(w("node:os").homedir(),".mcp-auth",`mcp-remote-${i}`),s=!1,c=t.dirs.find(u=>u.isCurrent);c&&!c.valid&&c.files.length>0&&!n.migrated&&(s=await H(a));let m=await G("jira"),p={installed:!1,verified:!1};try{p=await jt.verify()}catch(u){p={installed:!1,verified:!1,message:`check failed: ${u instanceof Error?u.message:"unknown"}`}}if(dt){let u=[];if(u.push("## Jira MCP Verification"),r.configured?e.autoFixed&&u.push(f("warn","MCP config was outdated and has been auto-fixed.")):u.push(f("error","Jira MCP not configured. Run `prjct jira setup` first.")),t.dirs.length===0)u.push(f("error","No token directories found in `~/.mcp-auth/`. OAuth has not been completed."));else{let y=t.dirs.map(h=>[`mcp-remote-${h.version}`,h.isCurrent?"yes":"no",h.valid?"valid":"invalid",h.tokenFile??"\u2014",h.reason??(h.valid?"OK":"\u2014")]);u.push(
|
|
37
|
+
`)}o(Zt,"mdJoin");function At(t=process.argv){let e=t.slice(2),r=e.indexOf("--json"),n=r!==-1;n&&e.splice(r,1);let i=e.indexOf("--md"),a=i!==-1;a&&e.splice(i,1);let[s,...c]=e;return{command:s,commandArgs:c,jsonMode:n,mdMode:a}}o(At,"parseCliArgs");var{command:lt,commandArgs:pt,jsonMode:$t,mdMode:dt}=At();function S(t){if($t){console.log(JSON.stringify(t,null,2));return}if(typeof t=="string"){console.log(t);return}console.log(JSON.stringify(t,null,2))}o(S,"output");function I(t,e=1){console.error($t?JSON.stringify({error:t}):`Error: ${t}`),process.exit(e)}o(I,"error");async function Qt(){let t=b(),e=w("node:path").join(w("node:os").homedir(),".mcp-auth",`mcp-remote-${t}`),r=await X("jira"),n=await H(e),i=await bt("jira",at.jira),a=await W(),s=await G("jira");if(k.setMcpHealth("jira",{status:s.ready?"healthy":"unhealthy",tokenVersion:t,configValid:!0,oauthValid:s.ready,lastError:s.ready?null:s.hint}),dt){let c=[];c.push("## Jira MCP Setup"),r.autoFixed&&c.push(f("warn","MCP config was outdated and has been auto-fixed.")),n&&c.push(f("warn","Corrupted token files were cleaned up."));let m=i.map(p=>[p.provider,p.path,p.changed?"updated":"unchanged"]);c.push(D("MCP Config",F(["Provider","Path","Status"],m))),a.migrated&&c.push(f("success",`Tokens migrated from ${w("node:path").basename(a.from)}.`)),s.ready?c.push(f("success","Jira MCP is ready. Restart your AI client to activate.")):(c.push(f("info","OAuth required \u2014 complete the steps below.")),c.push(D("Next Steps",_t([`Open a NEW terminal and run:
|
|
38
|
+
${Ot(P.jira,"bash")}`,"Complete OAuth authorization in the browser.","Run `prjct jira verify --md` to confirm tokens were saved.","Restart your AI client. Jira MCP tools will be ready."],!0)))),console.log(Y(...c));return}S({success:!0,provider:"jira",mode:"mcp",configAutoFixed:r.autoFixed,tokensCleaned:n,tokensMigrated:a.migrated,oauthReady:s.ready,installedIn:i.map(c=>({provider:c.provider,path:c.path,updated:c.changed})),nextSteps:s.ready?["Restart your AI client \u2014 Jira MCP is ready."]:[`STEP 1 (done): MCP config written to ${i.map(c=>c.provider).join(", ")}.`,`STEP 2: Open a NEW terminal and run: ${P.jira}`,"STEP 2: A browser will open for OAuth \u2014 complete the authorization.","STEP 3: Run `prjct jira verify` to confirm tokens were saved.","STEP 4: Restart your AI client. Jira MCP tools will be ready."],authCommand:P.jira})}o(Qt,"setup");async function te(){let t=await Rt(),e=await X("jira"),r=await R("jira"),n=await W(),i=b(),a=w("node:path").join(w("node:os").homedir(),".mcp-auth",`mcp-remote-${i}`),s=!1,c=t.dirs.find(u=>u.isCurrent);c&&!c.valid&&c.files.length>0&&!n.migrated&&(s=await H(a));let m=await G("jira"),p={installed:!1,verified:!1};try{p=await jt.verify()}catch(u){p={installed:!1,verified:!1,message:`check failed: ${u instanceof Error?u.message:"unknown"}`}}if(dt){let u=[];if(u.push("## Jira MCP Verification"),r.configured?e.autoFixed&&u.push(f("warn","MCP config was outdated and has been auto-fixed.")):u.push(f("error","Jira MCP not configured. Run `prjct jira setup` first.")),t.dirs.length===0)u.push(f("error","No token directories found in `~/.mcp-auth/`. OAuth has not been completed."));else{let y=t.dirs.map(h=>[`mcp-remote-${h.version}`,h.isCurrent?"yes":"no",h.valid?"valid":"invalid",h.tokenFile??"\u2014",h.reason??(h.valid?"OK":"\u2014")]);u.push(D("Token Directories",F(["Directory","Current","Status","Token File","Details"],y)))}n.migrated&&u.push(f("success",`Tokens auto-migrated from ${w("node:path").basename(n.from)}.`)),s&&u.push(f("warn","Corrupted token files were cleaned up.")),p.installed?p.verified?u.push(f("success","Context7 MCP is healthy.")):u.push(f("warn",`Context7 MCP configured but not working: ${p.message??"smoke check failed"}. Run \`prjct sync\` to repair.`)):u.push(f("warn","Context7 MCP not configured. Run `prjct sync` to install.")),m.ready?u.push(f("success","READY \u2014 Jira OAuth tokens verified. Restart your AI client to activate.")):u.push(f("error",`NOT READY \u2014 ${m.hint}`)),console.log(Y(...u));return}S({provider:"jira",command:"verify",expectedVersion:t.expectedVersion,dirs:t.dirs.map(u=>({version:u.version,isCurrent:u.isCurrent,valid:u.valid,tokenFile:u.tokenFile,reason:u.reason,hasAccessToken:u.hasAccessToken,hasRefreshToken:u.hasRefreshToken})),configValid:e.valid,configAutoFixed:e.autoFixed,migrated:n.migrated,migratedFrom:n.from,cleaned:s,ready:m.ready,hint:m.hint,context7:{installed:p.installed,verified:p.verified,message:p.message}})}o(te,"verify");async function ee(){let t=await R("jira"),e=await X("jira"),r=t.configured?await G("jira"):null;if(dt){let n=[];n.push("## Jira MCP Status");let i=[["MCP configured",t.configured?"yes":"no"],["Config valid",e.valid?"yes":`no (${e.issues.join(", ")})`]];r&&(i.push(["OAuth tokens",r.ready?"valid":"missing/invalid"]),r.migrated&&i.push(["Tokens migrated","yes"]),r.cleaned&&i.push(["Corrupted cleaned","yes"]));let a=t.providers.map(s=>[s.provider,s.configured?"yes":"no",s.path]);n.push(F(["Check","Result"],i)),n.push(D("Providers",F(["Provider","Configured","Path"],a))),t.configured?r?.ready?n.push(f("success","Jira MCP is healthy. Restart your AI client if tools are not visible.")):n.push(f("warn",r?.hint??"OAuth tokens not found.")):n.push(f("error","Jira MCP not configured. Run `prjct jira setup` to configure.")),e.autoFixed&&n.push(f("info","MCP config was auto-fixed during this check.")),console.log(Y(...n));return}S({provider:"jira",mode:"mcp",configured:t.configured,configValid:e.valid,configAutoFixed:e.autoFixed,oauthReady:r?.ready??!1,oauthValidated:r?.validated??!1,oauthMigrated:r?.migrated??!1,oauthCleaned:r?.cleaned??!1,providers:t.providers,hint:t.configured?r?.hint??"":"Run `prjct jira setup` to configure Jira MCP."})}o(ee,"status");async function re(t,e,r){let{configured:n}=await R("jira");n||I("Jira MCP is not configured. Run `prjct jira setup` first.");let i={success:!0,provider:"jira",mode:"mcp",delegated:!0,command:t,args:e,hint:r?.hint??"Run this operation using Jira MCP tools in your current AI client session.",nextSteps:["Open your MCP-enabled AI client/session.",`Execute the Jira MCP operation for "${t}".`]};r?.jql&&(i.jql=r.jql),r?.scope&&(i.scope=r.scope),S(i)}o(re,"runMcpOperation");async function ne(t){let{configured:e}=await R("jira");e||I("Jira MCP is not configured. Run `prjct jira setup` first."),S({success:!0,provider:"jira",mode:"mcp",delegated:!0,command:"sprint",scope:"active_sprint",args:t,jql:"sprint = currentSprint() AND assignee = currentUser() ORDER BY priority DESC",hint:"Fetch your issues in the active sprint via Jira MCP tools.",nextSteps:["Use the Jira MCP search tool with the JQL above to list your active sprint issues.","Issues returned include sprint metadata (sprint name, start/end dates)."]})}o(ne,"sprintOperation");async function ie(t){let{configured:e}=await R("jira");e||I("Jira MCP is not configured. Run `prjct jira setup` first."),S({success:!0,provider:"jira",mode:"mcp",delegated:!0,command:"backlog",scope:"backlog",args:t,jql:"sprint is EMPTY AND assignee = currentUser() AND statusCategory != Done ORDER BY priority DESC",hint:"Fetch your backlog issues (not in any sprint) via Jira MCP tools.",nextSteps:["Use the Jira MCP search tool with the JQL above to list your backlog issues.","Backlog issues have no sprint assigned \u2014 differentiate from sprint issues by the sprint field being empty."]})}o(ie,"backlogOperation");async function oe(){try{switch(lt){case"setup":await Qt();break;case"verify":await te();break;case"status":await ee();break;case"help":case"--help":case"-h":case void 0:S({usage:"prjct jira <command>",commands:{setup:"Configure Jira MCP server",verify:"Verify OAuth tokens after completing authorization",status:"Check Jira MCP configuration",sprint:"List your issues in the active sprint (MCP)",backlog:"List your backlog issues not in any sprint (MCP)",sync:"Delegate issue sync via MCP tools",list:"Delegate issue listing via MCP tools",get:"Delegate issue retrieval via MCP tools",create:"Delegate issue creation via MCP tools",update:"Delegate issue update via MCP tools",start:"Delegate status transition to in-progress via MCP tools",done:"Delegate status transition to done via MCP tools",transition:"Delegate workflow transition via MCP tools"},note:"Jira is MCP-only. sprint/backlog provide JQL for your AI client MCP session."});break;case"sprint":await ne(pt);break;case"backlog":await ie(pt);break;case"sync":case"start":case"done":case"list":case"get":case"create":case"update":case"transition":case"comment":case"projects":case"boards":await re(lt,pt);break;default:I(`Unknown command: ${lt}. Use --help to see available commands.`)}}catch(t){I(x(t))}}o(oe,"main");oe();
|
package/dist/cli/linear.mjs
CHANGED
|
@@ -5,7 +5,7 @@ import { dirname as __pathDirname } from 'path';
|
|
|
5
5
|
var require = __createRequire(import.meta.url);
|
|
6
6
|
var __filename = __fileURLToPath(import.meta.url);
|
|
7
7
|
var __dirname = __pathDirname(__filename);
|
|
8
|
-
var
|
|
8
|
+
var Ne=Object.defineProperty;var o=(e,t)=>Ne(e,"name",{value:t,configurable:!0}),x=(e=>typeof require<"u"?require:typeof Proxy<"u"?new Proxy(e,{get:(t,r)=>(typeof require<"u"?require:t)[r]}):e)(function(e){if(typeof require<"u")return require.apply(this,arguments);throw Error('Dynamic require of "'+e+'" is not supported')});import Pe from"node:fs/promises";import xe from"node:os";import re from"node:path";import me from"node:fs";import ge from"node:path";import{z as l}from"zod";var T={create(e,t){class r extends Error{static{o(this,"TypedError")}errorName;data;isOperational=!0;constructor(i){let a=t.parse(i);super(`${e}: ${JSON.stringify(a)}`),this.name=e,this.errorName=e,this.data=a,Error.captureStackTrace?.(this,this.constructor)}static throw(i){throw new r(i)}static is(i){return i instanceof r&&i.errorName===e}static create(i){return new r(i)}}return r}},st=T.create("FileError",l.object({path:l.string(),operation:l.enum(["read","write","delete","create","copy"]),reason:l.string().optional()})),at=T.create("ValidationError",l.object({field:l.string(),expected:l.string(),received:l.string().optional(),message:l.string().optional()})),ct=T.create("PermissionError",l.object({action:l.string(),resource:l.string(),reason:l.string().optional()})),ut=T.create("TaskError",l.object({taskId:l.string().optional(),operation:l.enum(["create","update","complete","pause","resume","delete"]),reason:l.string()})),lt=T.create("SessionError",l.object({sessionId:l.string().optional(),reason:l.string()})),dt=T.create("SyncError",l.object({projectId:l.string().optional(),operation:l.enum(["push","pull","auth","connect"]),reason:l.string()}));import K from"node:fs";import L from"node:path";function Fe(e){return e instanceof Error&&"code"in e}o(Fe,"isNodeError");function M(e){return Fe(e)&&e.code==="ENOENT"}o(M,"isNotFoundError");function w(e){return e instanceof Error?e.message:typeof e=="string"?e:"Unknown error"}o(w,"getErrorMessage");var I=null,De=null,O=null;function pe(){if(O)return O;let e=__dirname;for(let t=0;t<5;t++){let r=L.join(e,"package.json");if(K.existsSync(r))try{if(JSON.parse(K.readFileSync(r,"utf-8")).name==="prjct-cli")return O=e,e}catch{}e=L.dirname(e)}return O=L.join(__dirname,"..","..",".."),O}o(pe,"getPackageRoot");function Y(){if(I)return I;try{let e=L.join(pe(),"package.json"),t=JSON.parse(K.readFileSync(e,"utf-8"));return I=t.version,De=t,I}catch(e){return console.error("Failed to read version from package.json:",w(e)),"0.0.0"}}o(Y,"getVersion");var xt=Y(),Z=pe();var Q=null,fe=!1;function Ie(){if(fe)return Q;fe=!0;let e=ge.join(Z,"dist","templates.json");try{let t=me.readFileSync(e,"utf-8");return Q=JSON.parse(t),Q}catch{return null}}o(Ie,"loadBundle");function he(e){let t=Ie();if(t?.[e])return t[e];let r=ge.join(Z,"templates",e);try{return me.readFileSync(r,"utf-8")}catch{return null}}o(he,"getTemplateContent");import{exec as Le,execFile as Ve}from"node:child_process";import{promisify as ve}from"node:util";var _t=ve(Le),ye=ve(Ve);import ee from"node:fs/promises";import Je from"node:path";async function V(e,t,r=2){let n=Je.dirname(e);await ee.mkdir(n,{recursive:!0});let i=JSON.stringify(t,null,r);await ee.writeFile(e,i,"utf-8")}o(V,"writeJson");async function te(e){try{return(await ee.stat(e)).isDirectory()}catch(t){if(M(t))return!1;throw t}}o(te,"dirExists");var ne={command:"npx",args:["-y","@upstash/context7-mcp@latest"]},S=null;function We(){let e=he("mcp-config.json");if(!e)return{mcpServers:{context7:ne}};try{return JSON.parse(e)}catch{return{mcpServers:{context7:ne}}}}o(We,"parseTemplateConfig");function Te(){return We().mcpServers?.context7||ne}o(Te,"getContext7Config");function we(){return process.env.PRJCT_CONTEXT7_CONFIG?process.env.PRJCT_CONTEXT7_CONFIG:process.env.NODE_ENV==="test"?re.join(xe.tmpdir(),"prjct-context7-test","mcp.json"):re.join(xe.homedir(),".claude","mcp.json")}o(we,"getConfigPath");async function Ee(e){try{let t=await Pe.readFile(e,"utf-8");return JSON.parse(t)}catch(t){if(M(t))return{};throw t}}o(Ee,"readConfig");async function Be(){if(process.env.PRJCT_SKIP_CONTEXT7_SMOKE==="1"||process.env.NODE_ENV==="test")return;let e=Te(),t=[...e.args||[],"--help"];await ye(e.command||"npx",t,{timeout:15e3})}o(Be,"runSmokeCheck");var ie=class{static{o(this,"Context7Service")}async install(){let t=we(),r=re.dirname(t);await Pe.mkdir(r,{recursive:!0});let n=await Ee(t),i=n.mcpServers||{};return i.context7=Te(),n.mcpServers=i,await V(t,n),S=null,{installed:!0,verified:!1,configPath:t,message:"Context7 MCP configured"}}async verify(){if(S&&Date.now()-S.at<3e5)return S.status;let t=we(),i=((await Ee(t)).mcpServers||{}).context7;if(!i?.command||!Array.isArray(i.args)||i.args.length===0)return{installed:!1,verified:!1,configPath:t,message:"Context7 MCP not configured in ~/.claude/mcp.json"};try{await Be();let a={installed:!0,verified:!0,configPath:t};return S={at:Date.now(),status:a},a}catch(a){let s={installed:!0,verified:!1,configPath:t,message:`Context7 smoke check failed: ${w(a)}`};return S={at:Date.now(),status:s},s}}async ensureReady(){await this.install();let t=await this.verify();if(!t.verified){let r=t.message||"Context7 MCP is required but not ready. Run `prjct start` to repair configuration.";throw new Error(r)}return t}},Se=new ie;import Ce from"node:fs";import J from"node:path";function Ue(){return typeof globalThis<"u"&&"Bun"in globalThis?"bun":"node"}o(Ue,"detectRuntime");function ke(){return Ue()==="bun"}o(ke,"isBun");function He(e){if(ke()){let{Database:i}=x("bun:sqlite");return new i(e,{create:!0})}let t=x("better-sqlite3"),r=new t(e),n=r.exec.bind(r);return r.run=i=>n(i),r}o(He,"openDatabase");var oe=class{static{o(this,"SystemDatabase")}db=null;dbPath;constructor(){let t=process.env.PRJCT_CLI_HOME?.trim(),r=t?J.resolve(t):J.join(x("node:os").homedir(),".prjct-cli");this.dbPath=J.join(r,"system.db")}getDb(){if(this.db)return this.db;let t=J.dirname(this.dbPath);Ce.existsSync(t)||Ce.mkdirSync(t,{recursive:!0});let r=He(this.dbPath);return r.run("PRAGMA journal_mode = WAL"),r.run("PRAGMA synchronous = NORMAL"),r.run("PRAGMA cache_size = -1000"),r.run("PRAGMA temp_store = MEMORY"),this.runMigrations(r),this.db=r,r}runMigrations(t){t.run(`
|
|
9
9
|
CREATE TABLE IF NOT EXISTS _system_migrations (
|
|
10
10
|
version INTEGER PRIMARY KEY,
|
|
11
11
|
name TEXT NOT NULL,
|
|
@@ -26,15 +26,13 @@ var Fe=Object.defineProperty;var o=(e,t)=>Fe(e,"name",{value:t,configurable:!0})
|
|
|
26
26
|
INSERT OR REPLACE INTO mcp_health
|
|
27
27
|
(provider, status, last_checked, last_error, token_version, config_valid, oauth_valid, updated_at)
|
|
28
28
|
VALUES (?, ?, ?, ?, ?, ?, ?, ?)
|
|
29
|
-
`).run(t,r.status,i,r.lastError??null,r.tokenVersion??null,r.configValid?1:0,r.oauthValid?1:0,i)}clearMcpHealth(t){this.getDb().prepare("DELETE FROM mcp_health WHERE provider = ?").run(t)}close(){this.db&&(this.db.close(),this.db=null)}},k=new oe;import g from"node:fs/promises";import C from"node:os";import p from"node:path";var _="mcp-remote@0.1.38",se={linear:{command:"npx",args:["-y",_,"https://mcp.linear.app/mcp"],description:"Linear MCP server (OAuth)"},jira:{command:"npx",args:["-y",_,"https://mcp.atlassian.com/v1/mcp"],description:"Atlassian MCP server for Jira (OAuth)"}},P={linear:`npx -y ${_} https://mcp.linear.app/mcp`,jira:`npx -y ${_} https://mcp.atlassian.com/v1/mcp`};function
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
\u26A1 prjct \xB7 v${Y()}`}o(Ke,"mdFooter");function G(...e){return Ye(ze(),...e.filter(Boolean),Ke())}o(G,"mdOutput");function $(e,t){let r=`| ${e.join(" | ")} |`,n=`|${e.map(()=>"---").join("|")}|`,i=t.map(a=>`| ${a.join(" | ")} |`);return[r,n,...i].join(`
|
|
33
|
-
`)}o($,"mdTable");function Me(e,t=""){return`\`\`\`${t}
|
|
29
|
+
`).run(t,r.status,i,r.lastError??null,r.tokenVersion??null,r.configValid?1:0,r.oauthValid?1:0,i)}clearMcpHealth(t){this.getDb().prepare("DELETE FROM mcp_health WHERE provider = ?").run(t)}close(){this.db&&(this.db.close(),this.db=null)}},k=new oe;import g from"node:fs/promises";import C from"node:os";import p from"node:path";var _="mcp-remote@0.1.38",se={linear:{command:"npx",args:["-y",_,"https://mcp.linear.app/mcp"],description:"Linear MCP server (OAuth)"},jira:{command:"npx",args:["-y",_,"https://mcp.atlassian.com/v1/mcp"],description:"Atlassian MCP server for Jira (OAuth)"}},P={linear:`npx -y ${_} https://mcp.linear.app/mcp`,jira:`npx -y ${_} https://mcp.atlassian.com/v1/mcp`};function R(){return _.split("@")[1]}o(R,"getMcpRemoteVersion");function $(){return process.env.PRJCT_TEST_MODE==="1"?p.join(C.tmpdir(),"prjct-context7-test","mcp.json"):p.join(C.homedir(),".claude","mcp.json")}o($,"getClaudeMcpConfigPath");async function ae(){if(process.env.PRJCT_TEST_MODE==="1")return[{provider:"claude",configPath:$(),mergeIntoExisting:!1}];let e=C.homedir(),t=[],r=p.join(e,".claude");await te(r)&&t.push({provider:"claude",configPath:p.join(r,"mcp.json"),mergeIntoExisting:!1});let n=p.join(e,".gemini");return await te(n)&&t.push({provider:"gemini",configPath:p.join(n,"settings.json"),mergeIntoExisting:!0}),t}o(ae,"getActiveMcpConfigPaths");async function Re(e,t){let r=await ae();return Promise.all(r.map(async n=>{let i=await Xe(e,t,n.configPath);return{provider:n.provider,...i}}))}o(Re,"upsertMcpServerAll");async function W(e){let t=await ae(),r=await Promise.all(t.map(async n=>({provider:n.provider,configured:await Ge(e,n.configPath),path:n.configPath})));return{configured:r.some(n=>n.configured),providers:r}}o(W,"hasMcpServerAny");async function q(e){let t;try{t=await g.readdir(e)}catch{return{valid:!1,reason:"directory not found"}}if(t.length===0)return{valid:!1,reason:"directory empty"};let r=t.filter(n=>n.endsWith("_tokens.json")||n.endsWith(".json"));if(r.length===0)return{valid:!1,reason:"no token files found"};for(let n of r){let i=p.join(e,n);try{let a=await g.readFile(i,"utf-8"),s=JSON.parse(a);if(s.access_token||s.refresh_token)return{valid:!0}}catch{return{valid:!1,reason:`corrupt JSON in ${n}`}}}return{valid:!1,reason:"no valid tokens (missing access_token/refresh_token)"}}o(q,"validateTokenFiles");async function B(){let e=R(),t=p.join(C.homedir(),".mcp-auth"),r=p.join(t,`mcp-remote-${e}`);if((await q(r)).valid)return{migrated:!1,from:null,to:r};let i;try{i=await g.readdir(t)}catch{return{migrated:!1,from:null,to:r}}let a=i.filter(s=>s.startsWith("mcp-remote-")&&s!==`mcp-remote-${e}`).sort().reverse();for(let s of a){let c=p.join(t,s);if((await q(c)).valid){await g.mkdir(r,{recursive:!0});let d=await g.readdir(c);for(let u of d)await g.copyFile(p.join(c,u),p.join(r,u));return{migrated:!0,from:c,to:r}}}return{migrated:!1,from:null,to:r}}o(B,"migrateOAuthTokens");async function U(e){if((await q(e)).valid)return!1;try{let r=await g.readdir(e);for(let n of r)await g.unlink(p.join(e,n));return await g.rmdir(e),!0}catch{return!1}}o(U,"cleanCorruptedTokens");async function H(e){let t=[],r=!1,n=await ae();for(let i of n){let a=await ce(i.configPath),s=a.mcpServers?.[e];if(!s){t.push(`${i.provider}: no ${e} entry in mcp.json`);continue}let c=se[e];if(s.command!==c.command||JSON.stringify(s.args)!==JSON.stringify(c.args)){t.push(`${i.provider}: ${e} config doesn't match preset (stale version?)`);let m={...a.mcpServers||{}};m[e]=c,a.mcpServers=m,await je(a,i.configPath),r=!0}}return{valid:t.length===0,issues:t,autoFixed:r}}o(H,"validateMcpConfig");async function X(e){let t=R(),r=p.join(C.homedir(),".mcp-auth"),n=p.join(r,`mcp-remote-${t}`),i=!1,a=!1,s=await q(n);if(s.valid)return k.setMcpHealth(e,{status:"healthy",tokenVersion:t,oauthValid:!0}),{ready:!0,tokenDir:n,hint:"OAuth tokens verified \u2014 restart your AI client.",validated:!0,migrated:!1,cleaned:!1};s.reason&&s.reason!=="directory not found"&&s.reason!=="directory empty"&&(a=await U(n));let c=await B();if(c.migrated)return i=!0,k.setMcpHealth(e,{status:"healthy",tokenVersion:t,oauthValid:!0}),{ready:!0,tokenDir:n,hint:`Tokens migrated from ${p.basename(c.from)} \u2014 restart your AI client.`,validated:!0,migrated:!0,cleaned:a};let m=[];try{m=(await g.readdir(r)).filter(v=>v.startsWith("mcp-remote-")&&v!==`mcp-remote-${t}`)}catch{}let d=a?`Previous tokens were invalid and cleaned. Run in a terminal: ${P[e]}`:m.length>0?`Legacy tokens found (${m.join(", ")}) but invalid. Run: ${P[e]}`:`OAuth not completed. Run in a terminal: ${P[e]}`;return k.setMcpHealth(e,{status:"unhealthy",lastError:d,tokenVersion:t,oauthValid:!1}),{ready:!1,tokenDir:null,hint:d,validated:!1,migrated:!1,cleaned:a}}o(X,"checkOAuthTokens");async function be(){let e=R(),t=p.join(C.homedir(),".mcp-auth"),r=[],n;try{n=await g.readdir(t)}catch{return{expectedVersion:e,dirs:r}}let i=n.filter(a=>a.startsWith("mcp-remote-")).sort();for(let a of i){let s=p.join(t,a),c=a.replace("mcp-remote-",""),m=c===e,d=[];try{if(!(await g.stat(s)).isDirectory())continue;d=await g.readdir(s)}catch{continue}let u=d.find(E=>E.endsWith("_tokens.json"))??null,v=!1,h,b=!1,j=!1,z;if(u)try{let E=await g.readFile(p.join(s,u),"utf-8"),y=JSON.parse(E);b=!!y.access_token,j=!!y.refresh_token,y.expires_in&&(z=y.expires_in),v=b||j,v||(h="no valid tokens (missing access_token/refresh_token)")}catch{h=`corrupt JSON in ${u}`}else{let E=d.filter(y=>y.endsWith(".json"));if(E.length===0)h="no token files found";else{for(let y of E)try{let Ae=await g.readFile(p.join(s,y),"utf-8"),D=JSON.parse(Ae);D.access_token&&(b=!0),D.refresh_token&&(j=!0),D.expires_in&&(z=D.expires_in)}catch{h=`corrupt JSON in ${y}`}v=b||j,!v&&!h&&(h="no valid tokens (missing access_token/refresh_token)")}}r.push({version:c,path:s,isCurrent:m,files:d,tokenFile:u,valid:v,reason:h,hasAccessToken:b,hasRefreshToken:j,expiresIn:z})}return{expectedVersion:e,dirs:r}}o(be,"scanTokenDirectories");async function ce(e=$()){try{let t=await g.readFile(e,"utf-8");return JSON.parse(t)}catch(t){let r=w(t).toLowerCase();if(r.includes("no such file")||r.includes("enoent"))return{};throw new Error(`Failed to read MCP config at ${e}: ${w(t)}`)}}o(ce,"readMcpConfig");async function je(e,t=$()){await V(t,e)}o(je,"writeMcpConfig");async function Xe(e,t,r=$()){let n=await ce(r),i={...n.mcpServers||{}},a=i[e];i[e]=t,n.mcpServers=i;let s=JSON.stringify(a)!==JSON.stringify(t);return await je(n,r),{path:r,changed:s}}o(Xe,"upsertMcpServer");async function Ge(e,t=$()){return!!(await ce(t)).mcpServers?.[e]}o(Ge,"hasMcpServer");function ze(){return"---"}o(ze,"mdHeader");function Ke(){return`---
|
|
30
|
+
prjct v${Y()}`}o(Ke,"mdFooter");function G(...e){return Ye(ze(),...e.filter(Boolean),Ke())}o(G,"mdOutput");function A(e,t){let r=`| ${e.join(" | ")} |`,n=`|${e.map(()=>"---").join("|")}|`,i=t.map(a=>`| ${a.join(" | ")} |`);return[r,n,...i].join(`
|
|
31
|
+
`)}o(A,"mdTable");function Me(e,t=""){return`\`\`\`${t}
|
|
34
32
|
${e}
|
|
35
|
-
\`\`\``}o(Me,"mdCodeBlock");function f(e,t){return`>
|
|
36
|
-
${t}`}o(
|
|
33
|
+
\`\`\``}o(Me,"mdCodeBlock");function f(e,t){return`> **${{success:"OK",warn:"WARNING",error:"ERROR",info:"INFO"}[e]}:** ${t}`}o(f,"mdCallout");function N(e,t,r=3){return`### ${e}
|
|
34
|
+
${t}`}o(N,"mdSection");function Oe(e,t=!1){return e.map((r,n)=>t?`${n+1}. ${r}`:`- ${r}`).join(`
|
|
37
35
|
`)}o(Oe,"mdList");function Ye(...e){return e.filter(Boolean).join(`
|
|
38
36
|
|
|
39
|
-
`)}o(Ye,"mdJoin");function _e(e=process.argv){let t=e.slice(2),r=t.indexOf("--json"),n=r!==-1;n&&t.splice(r,1);let i=t.indexOf("--md"),a=i!==-1;a&&t.splice(i,1);let[s,...c]=t;return{command:s,commandArgs:c,jsonMode:n,mdMode:a}}o(_e,"parseCliArgs");var{command:ue,commandArgs:Ze,jsonMode
|
|
40
|
-
${Me(P.linear,"bash")}`,"Complete OAuth authorization in the browser.","Run `prjct linear verify --md` to confirm tokens were saved.","Restart your AI client. Linear MCP tools will be ready."],!0)))),console.log(G(...c));return}
|
|
37
|
+
`)}o(Ye,"mdJoin");function _e(e=process.argv){let t=e.slice(2),r=t.indexOf("--json"),n=r!==-1;n&&t.splice(r,1);let i=t.indexOf("--md"),a=i!==-1;a&&t.splice(i,1);let[s,...c]=t;return{command:s,commandArgs:c,jsonMode:n,mdMode:a}}o(_e,"parseCliArgs");var{command:ue,commandArgs:Ze,jsonMode:$e,mdMode:de}=_e();function F(e){if($e){console.log(JSON.stringify(e,null,2));return}if(typeof e=="string"){console.log(e);return}console.log(JSON.stringify(e,null,2))}o(F,"output");function le(e,t=1){console.error($e?JSON.stringify({error:e}):`Error: ${e}`),process.exit(t)}o(le,"error");async function Qe(){let e=R(),t=x("node:path").join(x("node:os").homedir(),".mcp-auth",`mcp-remote-${e}`),r=await H("linear"),n=await U(t),i=await Re("linear",se.linear),a=await B(),s=await X("linear");if(k.setMcpHealth("linear",{status:s.ready?"healthy":"unhealthy",tokenVersion:e,configValid:!0,oauthValid:s.ready,lastError:s.ready?null:s.hint}),de){let c=[];c.push("## Linear MCP Setup"),r.autoFixed&&c.push(f("warn","MCP config was outdated and has been auto-fixed.")),n&&c.push(f("warn","Corrupted token files were cleaned up."));let m=i.map(d=>[d.provider,d.path,d.changed?"updated":"unchanged"]);c.push(N("MCP Config",A(["Provider","Path","Status"],m))),a.migrated&&c.push(f("success",`Tokens migrated from ${x("node:path").basename(a.from)}.`)),s.ready?c.push(f("success","Linear MCP is ready. Restart your AI client to activate.")):(c.push(f("info","OAuth required \u2014 complete the steps below.")),c.push(N("Next Steps",Oe([`Open a NEW terminal and run:
|
|
38
|
+
${Me(P.linear,"bash")}`,"Complete OAuth authorization in the browser.","Run `prjct linear verify --md` to confirm tokens were saved.","Restart your AI client. Linear MCP tools will be ready."],!0)))),console.log(G(...c));return}F({success:!0,provider:"linear",mode:"mcp",configAutoFixed:r.autoFixed,tokensCleaned:n,tokensMigrated:a.migrated,oauthReady:s.ready,installedIn:i.map(c=>({provider:c.provider,path:c.path,updated:c.changed})),nextSteps:s.ready?["Restart your AI client \u2014 Linear MCP is ready."]:[`STEP 1 (done): MCP config written to ${i.map(c=>c.provider).join(", ")}.`,`STEP 2: Open a NEW terminal and run: ${P.linear}`,"STEP 2: A browser will open for OAuth \u2014 complete the authorization.","STEP 3: Run `prjct linear verify` to confirm tokens were saved.","STEP 4: Restart your AI client. Linear MCP tools will be ready."],authCommand:P.linear})}o(Qe,"setup");async function et(){let e=await be(),t=await H("linear"),r=await W("linear"),n=await B(),i=R(),a=x("node:path").join(x("node:os").homedir(),".mcp-auth",`mcp-remote-${i}`),s=!1,c=e.dirs.find(u=>u.isCurrent);c&&!c.valid&&c.files.length>0&&!n.migrated&&(s=await U(a));let m=await X("linear"),d={installed:!1,verified:!1};try{d=await Se.verify()}catch(u){d={installed:!1,verified:!1,message:`check failed: ${u instanceof Error?u.message:"unknown"}`}}if(de){let u=[];if(u.push("## Linear MCP Verification"),r.configured?t.autoFixed&&u.push(f("warn","MCP config was outdated and has been auto-fixed.")):u.push(f("error","Linear MCP not configured. Run `prjct linear setup` first.")),e.dirs.length===0)u.push(f("error","No token directories found in `~/.mcp-auth/`. OAuth has not been completed."));else{let v=e.dirs.map(h=>[`mcp-remote-${h.version}`,h.isCurrent?"yes":"no",h.valid?"valid":"invalid",h.tokenFile??"\u2014",h.reason??(h.valid?"OK":"\u2014")]);u.push(N("Token Directories",A(["Directory","Current","Status","Token File","Details"],v)))}n.migrated&&u.push(f("success",`Tokens auto-migrated from ${x("node:path").basename(n.from)}.`)),s&&u.push(f("warn","Corrupted token files were cleaned up.")),d.installed?d.verified?u.push(f("success","Context7 MCP is healthy.")):u.push(f("warn",`Context7 MCP configured but not working: ${d.message??"smoke check failed"}. Run \`prjct sync\` to repair.`)):u.push(f("warn","Context7 MCP not configured. Run `prjct sync` to install.")),m.ready?u.push(f("success","READY \u2014 Linear OAuth tokens verified. Restart your AI client to activate.")):u.push(f("error",`NOT READY \u2014 ${m.hint}`)),console.log(G(...u));return}F({provider:"linear",command:"verify",expectedVersion:e.expectedVersion,dirs:e.dirs.map(u=>({version:u.version,isCurrent:u.isCurrent,valid:u.valid,tokenFile:u.tokenFile,reason:u.reason,hasAccessToken:u.hasAccessToken,hasRefreshToken:u.hasRefreshToken})),configValid:t.valid,configAutoFixed:t.autoFixed,migrated:n.migrated,migratedFrom:n.from,cleaned:s,ready:m.ready,hint:m.hint,context7:{installed:d.installed,verified:d.verified,message:d.message}})}o(et,"verify");async function tt(){let e=await W("linear"),t=await H("linear"),r=e.configured?await X("linear"):null;if(de){let n=[];n.push("## Linear MCP Status");let i=[["MCP configured",e.configured?"yes":"no"],["Config valid",t.valid?"yes":`no (${t.issues.join(", ")})`]];r&&(i.push(["OAuth tokens",r.ready?"valid":"missing/invalid"]),r.migrated&&i.push(["Tokens migrated","yes"]),r.cleaned&&i.push(["Corrupted cleaned","yes"]));let a=e.providers.map(s=>[s.provider,s.configured?"yes":"no",s.path]);n.push(A(["Check","Result"],i)),n.push(N("Providers",A(["Provider","Configured","Path"],a))),e.configured?r?.ready?n.push(f("success","Linear MCP is healthy. Restart your AI client if tools are not visible.")):n.push(f("warn",r?.hint??"OAuth tokens not found.")):n.push(f("error","Linear MCP not configured. Run `prjct linear setup` to configure.")),t.autoFixed&&n.push(f("info","MCP config was auto-fixed during this check.")),console.log(G(...n));return}F({provider:"linear",mode:"mcp",configured:e.configured,configValid:t.valid,configAutoFixed:t.autoFixed,oauthReady:r?.ready??!1,oauthValidated:r?.validated??!1,oauthMigrated:r?.migrated??!1,oauthCleaned:r?.cleaned??!1,providers:e.providers,hint:e.configured?r?.hint??"":"Run `prjct linear setup` to configure Linear MCP."})}o(tt,"status");async function rt(e,t){let{configured:r}=await W("linear");r||le("Linear MCP is not configured. Run `prjct linear setup` first."),F({success:!0,provider:"linear",mode:"mcp",delegated:!0,command:e,args:t,hint:"Run this operation using Linear MCP tools in your current AI client session.",nextSteps:["Open your MCP-enabled AI client/session.",`Execute the Linear MCP operation for "${e}".`]})}o(rt,"runMcpOperation");async function nt(){try{switch(ue){case"setup":await Qe();break;case"verify":await et();break;case"status":await tt();break;case"help":case"--help":case"-h":case void 0:F({usage:"prjct linear <command>",commands:{setup:"Configure Linear MCP server",verify:"Verify OAuth tokens after completing authorization",status:"Check Linear MCP configuration",sync:"Delegate issue sync via MCP tools",list:"Delegate issue listing via MCP tools",get:"Delegate issue retrieval via MCP tools",create:"Delegate issue creation via MCP tools",update:"Delegate issue update via MCP tools",start:"Delegate status transition to in-progress via MCP tools",done:"Delegate status transition to done via MCP tools",comment:"Delegate comment creation via MCP tools"},note:"Linear is MCP-only."});break;case"sync":case"list":case"get":case"create":case"update":case"start":case"done":case"comment":case"teams":case"projects":await rt(ue,Ze);break;default:le(`Unknown command: ${ue}. Use --help to see available commands.`)}}catch(e){le(w(e))}}o(nt,"main");nt();
|